From 36ff26b73400b010726048ff556f76e796e810f7 Mon Sep 17 00:00:00 2001 From: Claus Holbech Date: Mon, 15 Jan 2024 22:56:41 +0100 Subject: [PATCH] Fix(eos_cli_config_gen): Fix invalid valid value for ip_security.sa_policies.esp.encryption (#3499) --- .../avd/roles/eos_cli_config_gen/docs/tables/ip-security.md | 4 ++-- .../schemas/eos_cli_config_gen.jsonschema.json | 2 +- .../eos_cli_config_gen/schemas/eos_cli_config_gen.schema.yml | 2 +- .../schemas/schema_fragments/ip_security.schema.yml | 2 +- 4 files changed, 5 insertions(+), 5 deletions(-) diff --git a/ansible_collections/arista/avd/roles/eos_cli_config_gen/docs/tables/ip-security.md b/ansible_collections/arista/avd/roles/eos_cli_config_gen/docs/tables/ip-security.md index edd828f89ee..947a4ebc078 100644 --- a/ansible_collections/arista/avd/roles/eos_cli_config_gen/docs/tables/ip-security.md +++ b/ansible_collections/arista/avd/roles/eos_cli_config_gen/docs/tables/ip-security.md @@ -18,7 +18,7 @@ | [    - name](## "ip_security.sa_policies.[].name") | String | Required, Unique | | | Name of the SA policy. The "null" value is deprecated and will be removed in AVD 5.0.0 | | [      esp](## "ip_security.sa_policies.[].esp") | Dictionary | | | | | | [        integrity](## "ip_security.sa_policies.[].esp.integrity") | String | | | Valid Values:
- disabled
- sha1
- sha256
- null | | - | [        encryption](## "ip_security.sa_policies.[].esp.encryption") | String | | | Valid Values:
- disabled
- aes128
- aes128gcm128
- aes128gcm64
- aes256
- aes256gcm256
- null | | + | [        encryption](## "ip_security.sa_policies.[].esp.encryption") | String | | | Valid Values:
- disabled
- aes128
- aes128gcm128
- aes128gcm64
- aes256
- aes256gcm128
- null | | | [      pfs_dh_group](## "ip_security.sa_policies.[].pfs_dh_group") | Integer | | | Valid Values:
- 1
- 2
- 5
- 14
- 15
- 16
- 17
- 20
- 21
- 24 | | | [  profiles](## "ip_security.profiles") | List, items: Dictionary | | | | IPSec profiles. | | [    - name](## "ip_security.profiles.[].name") | String | Required, Unique | | | Name of the IPsec profile. | @@ -65,7 +65,7 @@ - name: esp: integrity: - encryption: + encryption: pfs_dh_group: # IPSec profiles. diff --git a/ansible_collections/arista/avd/roles/eos_cli_config_gen/schemas/eos_cli_config_gen.jsonschema.json b/ansible_collections/arista/avd/roles/eos_cli_config_gen/schemas/eos_cli_config_gen.jsonschema.json index 9674457a480..f27a921fbc0 100644 --- a/ansible_collections/arista/avd/roles/eos_cli_config_gen/schemas/eos_cli_config_gen.jsonschema.json +++ b/ansible_collections/arista/avd/roles/eos_cli_config_gen/schemas/eos_cli_config_gen.jsonschema.json @@ -7256,7 +7256,7 @@ "aes128gcm128", "aes128gcm64", "aes256", - "aes256gcm256", + "aes256gcm128", "null" ], "title": "Encryption" diff --git a/ansible_collections/arista/avd/roles/eos_cli_config_gen/schemas/eos_cli_config_gen.schema.yml b/ansible_collections/arista/avd/roles/eos_cli_config_gen/schemas/eos_cli_config_gen.schema.yml index f34dac555ce..6780261efd2 100644 --- a/ansible_collections/arista/avd/roles/eos_cli_config_gen/schemas/eos_cli_config_gen.schema.yml +++ b/ansible_collections/arista/avd/roles/eos_cli_config_gen/schemas/eos_cli_config_gen.schema.yml @@ -4291,7 +4291,7 @@ keys: - aes128gcm128 - aes128gcm64 - aes256 - - aes256gcm256 + - aes256gcm128 - 'null' pfs_dh_group: type: int diff --git a/ansible_collections/arista/avd/roles/eos_cli_config_gen/schemas/schema_fragments/ip_security.schema.yml b/ansible_collections/arista/avd/roles/eos_cli_config_gen/schemas/schema_fragments/ip_security.schema.yml index d6504b658e2..6fb8c744961 100644 --- a/ansible_collections/arista/avd/roles/eos_cli_config_gen/schemas/schema_fragments/ip_security.schema.yml +++ b/ansible_collections/arista/avd/roles/eos_cli_config_gen/schemas/schema_fragments/ip_security.schema.yml @@ -72,7 +72,7 @@ keys: - aes128gcm128 - aes128gcm64 - aes256 - - aes256gcm256 + - aes256gcm128 - "null" # TODO: AVD 5.0.0 pfs_dh_group: type: int