Skip to content

Commit d7f8e7d

Browse files
authored
YAML + API v1 support
The scripts now use YAML file format instead of CSV. Updated to be compatible with the Meraki Dashboard API v1 Python module
1 parent 1d9f094 commit d7f8e7d

File tree

2 files changed

+68
-96
lines changed

2 files changed

+68
-96
lines changed

export_mx_s2svpn.py

+24-19
Original file line numberDiff line numberDiff line change
@@ -4,24 +4,25 @@
44
=== PREREQUISITES ===
55
Run in Python 3
66
7-
Install both requests & Meraki Dashboard API Python modules:
7+
Install Requests, PyYAML and Meraki Dashboard API Python modules:
88
pip[3] install --upgrade requests
99
pip[3] install --upgrade meraki
10+
pip[3] install --upgrade pyyaml
1011
1112
=== DESCRIPTION ===
12-
Exports CSV of MX site-to-site VPN rules from Dashboard network.
13+
Exports YAML of MX site-to-site VPN rules from Dashboard network.
1314
1415
=== USAGE ===
1516
python export_mx_s2svpn.py -k <api_key> -o <org_id>
1617
'''
1718

1819

19-
import csv
2020
from datetime import datetime
2121
import getopt
22-
import logging
2322
import sys
24-
from meraki import meraki
23+
import os
24+
import meraki
25+
import yaml
2526

2627
# Prints READ_ME help message for user to read
2728
def print_help():
@@ -53,24 +54,28 @@ def main(argv):
5354
if api_key == None or org_id == None:
5455
print_help()
5556
sys.exit(2)
56-
57-
# Set the CSV output file and write the header row
57+
58+
dashboard = meraki.DashboardAPI(
59+
api_key=api_key,
60+
base_url='https://api-mp.meraki.com/api/v1/',
61+
output_log=True,
62+
log_file_prefix=os.path.basename(__file__)[:-3],
63+
log_path='',
64+
print_console=False
65+
)
66+
67+
# Set the output file
5868
timenow = '{:%Y%m%d_%H%M%S}'.format(datetime.now())
59-
filename = 'mx_s2svpnfw_rules_{0}.csv'.format(timenow)
60-
output_file = open(filename, mode='w', newline='\n')
61-
field_names = ['policy','protocol','srcCidr','srcPort','destCidr','destPort','comment','logging']
62-
csv_writer = csv.writer(output_file, delimiter=',', quotechar='"', quoting=csv.QUOTE_ALL)
63-
csv_writer.writerow(field_names)
69+
filename = 'mx_s2svpnfw_rules_{0}.yaml'.format(timenow)
6470

6571
# Read Dashboard configuration of MX L3 firewall rules
66-
fw_rules = meraki.getmxvpnfwrules(api_key, org_id)
67-
68-
# Loop through each firewall rule and write to CSV
69-
for rule in fw_rules:
70-
csv_row = [rule['policy'], rule['protocol'], rule['srcCidr'], rule['srcPort'], rule['destCidr'], rule['destPort'], rule['comment'], rule['syslogEnabled']]
71-
csv_writer.writerow(csv_row)
72+
fw_rules = dashboard.appliance.getOrganizationApplianceVpnVpnFirewallRules(org_id)
73+
74+
print(fw_rules)
75+
76+
with open(filename, 'w') as file:
77+
documents = yaml.dump(fw_rules, file)
7278

73-
output_file.close()
7479
print('Export completed to file {0}'.format(filename))
7580

7681

import_mx_s2svpn.py

+44-77
Original file line numberDiff line numberDiff line change
@@ -4,46 +4,36 @@
44
=== PREREQUISITES ===
55
Run in Python 3
66
7-
Install both requests & Meraki Dashboard API Python modules:
7+
Install Requests, PyYAML and Meraki Dashboard API Python modules:
88
pip[3] install --upgrade requests
99
pip[3] install --upgrade meraki
10+
pip[3] install --upgrade pyyaml
1011
1112
=== DESCRIPTION ===
12-
Imports CSV of MX site-to-site VPN firewall rules into Dashboard network. Note
13+
Imports YAML of MX site-to-site VPN firewall rules into Dashboard network. Note
1314
that if logging is enabled for any rule, then a syslog server needs to be
1415
configured on the Network-wide > General page.
1516
1617
=== USAGE ===
1718
python import_mx_s2svpn.py -k <api_key> -o <org_id> -f <file> [-m <mode>]
18-
The -f parameter is the path to the CSV file with MX S2S VPN firewall rules.
19+
The -f parameter is the path to the YAML file with MX S2S VPN firewall rules.
1920
The optional -m parameter is either "simulate" (default) to only print changes,
2021
or "commit" to also apply those changes to Dashboard.
2122
'''
2223

23-
24-
import csv
2524
from datetime import datetime
2625
import getopt
27-
import logging
2826
import sys
29-
from meraki import meraki
27+
import os
28+
import meraki
29+
import yaml
3030

3131
# Prints READ_ME help message for user to read
3232
def print_help():
3333
lines = READ_ME.split('\n')
3434
for line in lines:
3535
print('# {0}'.format(line))
3636

37-
logger = logging.getLogger(__name__)
38-
39-
def configure_logging():
40-
logging.basicConfig(
41-
filename='{}_log_{:%Y%m%d_%H%M%S}.txt'.format(sys.argv[0].split('.')[0], datetime.now()),
42-
level=logging.DEBUG,
43-
format='%(asctime)s: %(levelname)7s: [%(name)s]: %(message)s',
44-
datefmt='%Y-%m-%d %H:%M:%S'
45-
)
46-
4737

4838
def main(argv):
4939
# Set default values for command line arguments
@@ -76,75 +66,52 @@ def main(argv):
7666
# Assign default mode to "simulate" unless "commit" specified
7767
if arg_mode != 'commit':
7868
arg_mode = 'simulate'
69+
70+
dashboard = meraki.DashboardAPI(
71+
api_key=api_key,
72+
base_url='https://api-mp.meraki.com/api/v1/',
73+
output_log=True,
74+
log_file_prefix=os.path.basename(__file__)[:-3],
75+
log_path='',
76+
print_console=False
77+
)
7978

80-
# Read CSV input file, and skip header row
81-
input_file = open(arg_file)
82-
csv_reader = csv.reader(input_file, delimiter=',', quotechar='"', quoting=csv.QUOTE_ALL)
83-
next(csv_reader, None)
84-
logger.info('Reading file {0}'.format(arg_file))
85-
86-
# Loop through each firewall rule from CSV file and build PUT data
87-
fw_rules = []
88-
for row in csv_reader:
89-
rule = dict({'policy': row[0], 'protocol': row[1], 'srcCidr': row[2], 'srcPort': row[3], 'destCidr': row[4], 'destPort': row[5], 'comment': row[6], 'syslogEnabled': (row[7] == True or row[7] == 'True' or row[7] == 'true')})
90-
fw_rules.append(rule)
91-
old_rules = list(fw_rules)
92-
logger.info('Processed all {0} rules of file {1}'.format(len(fw_rules), arg_file))
93-
94-
# Check if last (default) rule exists, and if so, remove and check for default logging
95-
default_rule_exists = False
96-
default_logging = False
97-
last_rule = {'comment': 'Default rule', 'policy': 'allow', 'protocol': 'Any', 'srcPort': 'Any', 'srcCidr': 'Any', 'destPort': 'Any', 'destCidr': 'Any'}
98-
if all(item in fw_rules[-1].items() for item in last_rule.items()):
99-
default_rule_exists = True
100-
default_logging = (fw_rules.pop()['syslogEnabled'] == True)
101-
102-
# Update MX site-to-site VPN firewall rules
79+
# Read input file
80+
with open(arg_file) as file:
81+
loaded_rules = yaml.full_load(file)
82+
83+
#Remove default allow rule, if it exists in loaded rules
84+
default_allow_rule = {'comment': 'Default rule', 'destCidr': 'Any', 'destPort': 'Any',
85+
'policy': 'allow', 'protocol': 'Any', 'srcCidr': 'Any', 'srcPort': 'Any'}
86+
87+
last_line = loaded_rules['rules'][len(loaded_rules['rules'])-1]
88+
89+
matched_default = True
90+
for key in default_allow_rule:
91+
if key in last_line:
92+
if last_line[key] != default_allow_rule[key]:
93+
matched_default = False
94+
95+
if matched_default:
96+
processed_rules = loaded_rules['rules'][:-1]
97+
else:
98+
processed_rules = loaded_rules['rules']
99+
103100
if arg_mode == 'commit':
104-
meraki.updatemxvpnfwrules(api_key, org_id, fw_rules, default_logging)
105-
logger.info('Attempting update of site-to-site VPN firewall rules to organization {0}'.format(org_id))
106-
107-
# Confirm whether changes were successfully made
108-
new_rules = meraki.getmxvpnfwrules(api_key, org_id)
109-
if default_rule_exists and new_rules[:-1] == old_rules[:-1]:
110-
logger.info('Update successful!')
111-
elif not(default_rule_exists) and new_rules[:-1] == old_rules:
112-
logger.info('Update successful!')
113-
else:
114-
logger.error('Uh oh, something went wrong...')
101+
print("\nCOMMIT MODE ENABLED\n")
102+
result = dashboard.appliance.updateOrganizationApplianceVpnVpnFirewallRules(org_id, rules=processed_rules)
103+
print("Configuration updated. Result:\n\n%s" % result)
115104
else:
116-
logger.info('Simulating update of site-to-site VPN firewall rules to organization {0}'.format(org_id))
117-
118-
105+
print("\nSIMULATION MODE ENABLED\n")
106+
print('Use "-m commit" to apply the following VPN FW rules:\n')
107+
print(processed_rules)
108+
119109
if __name__ == '__main__':
120-
# Configure logging to stdout
121-
configure_logging()
122-
# Define a Handler which writes INFO messages or higher to the sys.stderr
123-
console = logging.StreamHandler()
124-
console.setLevel(logging.INFO)
125-
# Set a format which is simpler for console use
126-
formatter = logging.Formatter('%(name)-12s: %(levelname)-8s %(message)s')
127-
# Tell the handler to use this format
128-
console.setFormatter(formatter)
129-
# Add the handler to the root logger
130-
logging.getLogger('').addHandler(console)
131-
132-
# Output to logfile/console starting inputs
133-
start_time = datetime.now()
134-
logger.info('Started script at {0}'.format(start_time))
135110
inputs = sys.argv[1:]
136111
try:
137112
key_index = inputs.index('-k')
138113
except ValueError:
139114
print_help()
140115
sys.exit(2)
141-
inputs.pop(key_index+1)
142-
inputs.pop(key_index)
143-
logger.info('Input parameters: {0}'.format(inputs))
144116

145117
main(sys.argv[1:])
146-
147-
# Finish output to logfile/console
148-
end_time = datetime.now()
149-
logger.info('Ended script at {0}'.format(end_time))
150-
logger.info(f'Total run time = {end_time - start_time}')

0 commit comments

Comments
 (0)