@itentialopensource/adapter-meraki 0.8.0 → 0.8.1

Sign up to get free protection for your applications and to get access to all the features.
package/README.md CHANGED
@@ -1,30 +1,51 @@
1
- # Adapter for Meraki
1
+ # Adapter for Meraki
2
+
3
+ ## Table of Contents
4
+
5
+ * [Overview](./SUMMARY.md)
6
+ * [Versioning](#versioning)
7
+ * [Supported IAP Versions](#supported-iap-versions)
8
+ * [Getting Started](#getting-started)
9
+ * [Helpful Background Information](#helpful-background-information)
10
+ * [Prerequisites](#prerequisites)
11
+ * [How to Install](#how-to-install)
12
+ * [Testing](#testing)
13
+ * [Configuration](./PROPERTIES.md)
14
+ * [Using this Adapter](./CALLS.md)
15
+ * [Additional Information](#additional-information)
16
+ * [Enhancements](./ENHANCE.md)
17
+ * [Contributing](./CONTRIBUTING.md)
18
+ * [Helpful Links](#helpful-links)
19
+ * [Node Scripts](#node-scripts)
20
+ * [Troubleshoot](./TROUBLESHOOT.md)
21
+ * [License and Maintainers](#license-and-maintainers)
22
+ * [Product License](#product-license)
23
+
24
+ ## [Overview](./SUMMARY.md)
2
25
 
3
- This adapter is used to integrate the Itential Automation Platform (IAP) with the Meraki System. The API for Meraki is available at [undefined API URL]. The adapter utilizes the Meraki API to provide the integrations that are deemed pertinent to IAP. This ReadMe file is intended to provide information on this adapter.
4
-
5
- >**Note**: It is possible that some integrations will be supported through the Meraki adapter while other integrations will not.
26
+ ## Versioning
6
27
 
7
- Itential provides information on all of its product adapters in the Customer Knowledge Base. Information in the [Customer Knowledge Base](https://itential.atlassian.net/servicedesk/customer/portals) is consistently maintained and goes through documentation reviews. As a result, it should be the first place to go for information.
28
+ Itential Product and opensource adapters utilize SemVer for versioning. The current version of the adapter can be found in the `package.json` file or viewed in the IAP GUI on the System page. All Itential opensource adapters can be found in the [Itential OpenSource Repository](https://gitlab.com/itentialopensource/adapters).
8
29
 
9
- For custom built adapters, it is a starting point to understand what you have built, provide the information for you to be able to update the adapter, and assist you with deploying the adapter into IAP.
30
+ Any release prior to 1.0.0 is a pre-release. Initial builds of adapters are generally set up as pre-releases as there is often work that needs to be done to configure the adapter and make sure the authentication process to Meraki works appropriately.
10
31
 
11
- ## Versioning
32
+ Release notes can be viewed in CHANGELOG.md or in the [Customer Knowledge Base](https://itential.atlassian.net/servicedesk/customer/portals) for Itential adapters.
12
33
 
13
- Itential Product adapters utilize SemVer for versioning. The current version of the adapter can be found in the `package.json` file or viewed in the IAP GUI on the System page. For Open Source Adapters, the versions available can be found in the [Itential OpenSource Repository](https://www.npmjs.com/search?q=itentialopensource%2Fadapter).
34
+ ## Supported IAP Versions
14
35
 
15
- ## Release History
36
+ Itential Product adapters are built for particular versions of IAP and packaged with the versions they work with.
16
37
 
17
- Any release prior to 1.0.0 is a pre-release. Initial builds of adapters are generally set up as pre-releases as there is often work that needs to be done to configure the adapter and make sure the authentication process to Meraki works appropriately.
38
+ Itential opensource adapter as well as custom adapters built with the Itential Adapter Builder work acoss many releases of IAP. As a result, it is not often necessary to modify an adapter when upgrading IAP. If IAP has changes that impact the pronghorn.json, like adding a new required section, this will most likely require changes to all adapters when upgrading IAP.
18
39
 
19
- Release notes can be viewed in CHANGELOG.md or in the [Customer Knowledge Base](https://itential.atlassian.net/servicedesk/customer/portals) for Itential adapters.
40
+ Many of the scripts that come with all adapters built using the Itential Adapter Builder do have some dependencies on IAP or the IAP database schema and so it is possible these scripts could stop working in different versions of IAP. If you notify Itential of any issues, the Adapter Team will attempt to fix the scripts for newer releases of IAP.
20
41
 
21
42
  ## Getting Started
22
43
 
23
44
  These instructions will help you get a copy of the project on your local machine for development and testing. Reading this section is also helpful for deployments as it provides you with pertinent information on prerequisites and properties.
24
45
 
25
- ### Adapter Technical Resources
46
+ ### Helpful Background Information
26
47
 
27
- There is adapter documentation available on the Itential Developer Site [HERE](https://developer.itential.io/adapters-resources/). This documentation includes information and examples that are helpful for:
48
+ There is adapter documentation available on the Itential Developer Site [HERE](https://www.itential.com/automation-platform/integrations/adapters-resources/). This documentation includes information and examples that are helpful for:
28
49
 
29
50
  ```text
30
51
  Authentication
@@ -38,11 +59,11 @@ Troubleshooting
38
59
  ```
39
60
 
40
61
  Others will be added over time.
41
- Want to build a new adapter? Use the Adapter Builder [HERE](https://adapters.itential.io)
62
+ Want to build a new adapter? Use the Itential Adapter Builder [HERE](https://adapters.itential.io)
42
63
 
43
- ### Environment Prerequisites
64
+ ### Prerequisites
44
65
 
45
- The following is a list of required packages for an adapter.
66
+ The following is a list of required packages for installation on the system the adapter will run on:
46
67
 
47
68
  ```text
48
69
  Node.js
@@ -50,26 +71,26 @@ npm
50
71
  Git
51
72
  ```
52
73
 
53
- ### Adapter Prerequisites
54
-
55
- The following list of packages are required for Itential product adapters or custom adapters that have been built utilizing the Itential Adapter Builder.
74
+ The following list of packages are required for Itential opensource adapters or custom adapters that have been built utilizing the Itential Adapter Builder. You can install these packages by running npm install inside the adapter directory.
56
75
 
57
76
  | Package | Description |
58
77
  | ------- | ------- |
59
- | @itentialopensource/adapter-utils | Runtime library classes for all adapters; includes request handling, connection, throttling, and translation. |
78
+ | @itentialopensource/adapter-utils | Runtime library classes for all adapters; includes request handling, connection, authentication throttling, and translation. |
60
79
  | ajv | Required for validation of adapter properties to integrate with Meraki. |
61
80
  | axios | Utilized by the node scripts that are included with the adapter; helps to build and extend the functionality. |
62
81
  | commander | Utilized by the node scripts that are included with the adapter; helps to build and extend the functionality. |
63
82
  | fs-extra | Utilized by the node scripts that are included with the adapter; helps to build and extend the functionality. |
83
+ | mocha | Testing library that is utilized by some of the node scripts that are included with the adapter. |
84
+ | mocha-param | Testing library that is utilized by some of the node scripts that are included with the adapter. |
85
+ | mongodb | Utilized by the node scripts that are included with the adapter; helps to build and extend the functionality. |
86
+
64
87
  | network-diagnostics | Utilized by the node scripts that are included with the adapter; helps to build and extend the functionality. |
88
+ | nyc | Testing coverage library that is utilized by some of the node scripts that are included with the adapter. |
65
89
  | readline-sync | Utilized by the node script that comes with the adapter; helps to test unit and integration functionality. |
66
90
  | semver | Utilized by the node scripts that are included with the adapter; helps to build and extend the functionality. |
91
+ | winston | Utilized by the node scripts that are included with the adapter; helps to build and extend the functionality. |
67
92
 
68
- Some of the adapter node scripts run testing scripts which require the dev dependencies listed below.
69
-
70
- ### Additional Prerequisites for Development and Testing
71
-
72
- If you are developing and testing a custom adapter, or have testing capabilities on an Itential product adapter, you will need to install these packages as well.
93
+ If you are developing and testing a custom adapter, or have testing capabilities on an Itential opensource adapter, you will need to install these packages as well.
73
94
 
74
95
  ```text
75
96
  chai
@@ -77,274 +98,77 @@ eslint
77
98
  eslint-config-airbnb-base
78
99
  eslint-plugin-import
79
100
  eslint-plugin-json
80
- mocha
81
- mocha-param
82
- nyc
83
101
  package-json-validator
84
102
  testdouble
85
- winston
86
103
  ```
87
104
 
88
- ### Creating a Workspace
105
+ ### How to Install
89
106
 
90
- The following provides a local copy of the repository along with adapter dependencies.
107
+ 1. Set up the name space location in your IAP node_modules.
91
108
 
92
109
  ```bash
93
- git clone git@gitlab.com:\@itentialopensource/adapters/adapter-meraki
94
- npm install
95
- ```
96
-
97
- ## Adapter Properties and Descriptions
98
-
99
- This section defines **all** the properties that are available for the adapter, including detailed information on what each property is for. If you are not using certain capabilities with this adapter, you do not need to define all of the properties. An example of how the properties for this adapter can be used with tests or IAP are provided in the **Installation** section.
100
-
101
- ```json
102
- {
103
- "id": "ALL ADAPTER PROPERTIES!!!",
104
- "properties": {
105
- "host": "system.access.resolved",
106
- "port": 443,
107
- "base_path": "/",
108
- "version": "v1",
109
- "cache_location": "local",
110
- "encode_pathvars": true,
111
- "save_metric": true,
112
- "stub": false,
113
- "protocol": "https",
114
- "authentication": {
115
- "auth_method": "basic user_password",
116
- "username": "username",
117
- "password": "password",
118
- "token": "token",
119
- "invalid_token_error": 401,
120
- "token_timeout": 0,
121
- "token_cache": "local",
122
- "auth_field": "header.headers.X-AUTH-TOKEN",
123
- "auth_field_format": "{token}",
124
- "auth_logging": false
125
- },
126
- "healthcheck": {
127
- "type": "startup",
128
- "frequency": 300000,
129
- "query_object": {}
130
- },
131
- "request": {
132
- "number_redirects": 0,
133
- "number_retries": 3,
134
- "limit_retry_error": [401],
135
- "failover_codes": [404, 405],
136
- "attempt_timeout": 5000,
137
- "global_request": {
138
- "payload": {},
139
- "uriOptions": {},
140
- "addlHeaders": {},
141
- "authData": {}
142
- },
143
- "healthcheck_on_timeout": false,
144
- "return_raw": false,
145
- "archiving": false,
146
- "return_request": false
147
- },
148
- "ssl": {
149
- "ecdhCurve": "",
150
- "enabled": false,
151
- "accept_invalid_cert": false,
152
- "ca_file": "",
153
- "key_file": "",
154
- "cert_file": "",
155
- "secure_protocol": "",
156
- "ciphers": ""
157
- },
158
- "throttle": {
159
- "throttle_enabled": false,
160
- "number_pronghorns": 1,
161
- "sync_async": "sync",
162
- "max_in_queue": 1000,
163
- "concurrent_max": 1,
164
- "expire_timeout": 0,
165
- "avg_runtime": 200,
166
- "priorities": []
167
- },
168
- "proxy": {
169
- "enabled": false,
170
- "host": "localhost",
171
- "port": 9999,
172
- "protocol": "http",
173
- "username": "",
174
- "password": "",
175
- },
176
- "mongo": {
177
- "host": "",
178
- "port": 0,
179
- "database": "",
180
- "username": "",
181
- "password": "",
182
- "replSet": "",
183
- "db_ssl": {
184
- "enabled": false,
185
- "accept_invalid_cert": false,
186
- "ca_file": "",
187
- "key_file": "",
188
- "cert_file": ""
189
- }
190
- }
191
- },
192
- "type": "YOUR ADAPTER CLASS"
193
- }
110
+ cd /opt/pronghorn/current/node_modules (* could be in a different place)
111
+ if the @itentialopensource directory does not exist, create it:
112
+ mkdir @itentialopensource
194
113
  ```
195
114
 
196
- ### Connection Properties
197
-
198
- These base properties are used to connect to Meraki upon the adapter initially coming up. It is important to set these properties appropriately.
199
-
200
- | Property | Description |
201
- | ------- | ------- |
202
- | host | Required. A fully qualified domain name or IP address.|
203
- | port | Required. Used to connect to the server.|
204
- | base_path | Optional. Used to define part of a path that is consistent for all or most endpoints. It makes the URIs easier to use and maintain but can be overridden on individual calls. An example **base_path** might be `/rest/api`. Default is ``.|
205
- | version | Optional. Used to set a global version for action endpoints. This makes it faster to update the adapter when endpoints change. As with the base-path, version can be overridden on individual endpoints. Default is ``.|
206
- | cache\_location | Optional. Used to define where the adapter cache is located. The cache is used to maintain an entity list to improve performance. Storage locally is lost when the adapter is restarted. Storage in Redis is preserved upon adapter restart. Default is none which means no caching of the entity list.|
207
- | encode\_pathvars | Optional. Used to tell the adapter to encode path variables or not. The default behavior is to encode them so this property can b e used to stop that behavior.|
208
- | save\_metric | Optional. Used to tell the adapter to save metric information (this does not impact metrics returned on calls). This allows the adapter to gather metrics over time. Metric data can be stored in a database or on the file system.|
209
- | stub | Optional. Indicates whether the stub should run instead of making calls to Meraki (very useful during basic testing). Default is false (which means connect to Meraki).|
210
- | protocol | Optional. Notifies the adapter whether to use HTTP or HTTPS. Default is HTTP.|
211
-
212
- A connectivity check tells IAP the adapter has loaded successfully.
115
+ 2. Clone/unzip/tar the adapter into your IAP environment.
213
116
 
214
- ### Authentication Properties
215
-
216
- The following properties are used to define the authentication process to Meraki.
217
-
218
- >**Note**: Depending on the method that is used to authenticate with Meraki, you may not need to set all of the authentication properties.
219
-
220
- | Property | Description |
221
- | ------- | ------- |
222
- | auth\_method | Required. Used to define the type of authentication currently supported. Authentication methods currently supported are: `basic user_password`, `static_token`, `request_token`, and `no_authentication`.|
223
- | username | Used to authenticate with Meraki on every request or when pulling a token that will be used in subsequent requests.|
224
- | password | Used to authenticate with Meraki on every request or when pulling a token that will be used in subsequent requests.|
225
- | token | Defines a static token that can be used on all requests. Only used with `static_token` as an authentication method (auth\_method).|
226
- | invalid\_token\_error | Defines the HTTP error that is received when the token is invalid. Notifies the adapter to pull a new token and retry the request. Default is 401.|
227
- | token\_timeout | Defines how long a token is valid. Measured in milliseconds. Once a dynamic token is no longer valid, the adapter has to pull a new token. If the token\_timeout is set to -1, the adapter will pull a token on every request to Meraki. If the timeout\_token is 0, the adapter will use the expiration from the token response to determine when the token is no longer valid.|
228
- | token\_cache | Used to determine where the token should be stored (local memory or in Redis).|
229
- | auth\_field | Defines the request field the authentication (e.g., token are basic auth credentials) needs to be placed in order for the calls to work.|
230
- | auth\_field\_format | Defines the format of the auth\_field. See examples below. Items enclosed in {} inform the adapter to perofrm an action prior to sending the data. It may be to replace the item with a value or it may be to encode the item. |
231
- | auth\_logging | Setting this true will add some additional logs but this should only be done when trying to debug an issue as certain credential information may be logged out when this is true. |
232
-
233
- #### Examples of authentication field format
234
-
235
- ```json
236
- "{token}"
237
- "Token {token}"
238
- "{username}:{password}"
239
- "Basic {b64}{username}:{password}{/b64}"
117
+ ```bash
118
+ cd \@itentialopensource
119
+ git clone git@gitlab.com:\@itentialopensource/adapters/adapter-meraki
120
+ or
121
+ unzip adapter-meraki.zip
122
+ or
123
+ tar -xvf adapter-meraki.tar
240
124
  ```
241
125
 
242
- ### Healthcheck Properties
243
-
244
- The healthcheck properties defines the API that runs the healthcheck to tell the adapter that it can reach Meraki. There are currently three types of healthchecks.
245
-
246
- - None - Not recommended. Adapter will not run a healthcheck. Consequently, unable to determine before making a request if the adapter can reach Meraki.
247
- - Startup - Adapter will check for connectivity when the adapter initially comes up, but it will not check afterwards.
248
- - Intermittent - Adapter will check connectivity to Meraki at a frequency defined in the `frequency` property.
249
-
250
- | Property | Description |
251
- | ------- | ------- |
252
- | type | Required. The type of health check to run. |
253
- | frequency | Required if intermittent. Defines how often the health check should run. Measured in milliseconds. Default is 300000.|
254
- | query_object | Query parameters to be added to the adapter healthcheck call.|
126
+ 3. Run the adapter install script.
255
127
 
256
- ### Request Properties
128
+ ```bash
129
+ cd adapter-meraki
130
+ npm run adapter:install
131
+ ```
257
132
 
258
- The request section defines properties to help handle requests.
133
+ 4. Restart IAP
259
134
 
260
- | Property | Description |
261
- | ------- | ------- |
262
- | number\_redirects | Optional. Tells the adapter that the request may be redirected and gives it a maximum number of redirects to allow before returning an error. Default is 0 - no redirects.|
263
- | number\_retries | Tells the adapter how many times to retry a request that has either aborted or reached a limit error before giving up and returning an error.|
264
- | limit\_retry\_error | Optional. Can be either an integer or an array. Indicates the http error status number to define that no capacity was available and, after waiting a short interval, the adapter can retry the request. If an array is provvided, the array can contain integers or strings. Strings in the array are used to define ranges (e.g. "502-506"). Default is [0].|
265
- | failover\_codes | An array of error codes for which the adapter will send back a failover flag to IAP so that the Platform can attempt the action in another adapter.|
266
- | attempt\_timeout | Optional. Tells how long the adapter should wait before aborting the attempt. On abort, the adapter will do one of two things: 1) return the error; or 2) if **healthcheck\_on\_timeout** is set to true, it will abort the request and run a Healthcheck until it re-establishes connectivity to Meraki, and then will re-attempt the request that aborted. Default is 5000 milliseconds.|
267
- | global\_request | Optional. This is information that the adapter can include in all requests to the other system. This is easier to define and maintain than adding this information in either the code (adapter.js) or the action files.|
268
- | global\_request -> payload | Optional. Defines any information that should be included on all requests sent to the other system that have a payload/body.|
269
- | global\_request -> uriOptions | Optional. Defines any information that should be sent as untranslated query options (e.g. page, size) on all requests to the other system.|
270
- | global\_request -> addlHeaders | Optioonal. Defines any headers that should be sent on all requests to the other system.|
271
- | global\_request -> authData | Optional. Defines any additional authentication data used to authentice with the other system. This authData needs to be consistent on every request.|
272
- | healthcheck\_on\_timeout | Required. Defines if the adapter should run a health check on timeout. If set to true, the adapter will abort the request and run a health check until it re-establishes connectivity and then it will re-attempt the request.|
273
- | return\_raw | Optional. Tells the adapter whether the raw response should be returned as well as the IAP response. This is helpful when running integration tests to save mock data. It does add overhead to the response object so it is not ideal from production.|
274
- | archiving | Optional flag. Default is false. It archives the request, the results and the various times (wait time, Meraki time and overall time) in the `adapterid_results` collection in MongoDB. Although archiving might be desirable, be sure to develop a strategy before enabling this capability. Consider how much to archive and what strategy to use for cleaning up the collection in the database so that it does not become too large, especially if the responses are large.|
275
- | return\_request | Optional flag. Default is false. Will return the actual request that is made including headers. This should only be used during debugging issues as there could be credentials in the actual request.|
276
-
277
- ### SSL Properties
278
-
279
- The SSL section defines the properties utilized for ssl authentication with Meraki. SSL can work two different ways: set the `accept\_invalid\_certs` flag to true (only recommended for lab environments), or provide a `ca\_file`.
280
-
281
- | Property | Description |
282
- | ------- | ------- |
283
- | enabled | If SSL is required, set to true. |
284
- | accept\_invalid\_certs | Defines if the adapter should accept invalid certificates (only recommended for lab environments). Required if SSL is enabled. Default is false.|
285
- | ca\_file | Defines the path name to the CA file used for SSL. If SSL is enabled and the accept invalid certifications is false, then ca_file is required.|
286
- | key\_file | Defines the path name to the Key file used for SSL. The key_file may be needed for some systems but it is not required for SSL.|
287
- | cert\_file | Defines the path name to the Certificate file used for SSL. The cert_file may be needed for some systems but it is not required for SSL.|
288
- | secure\_protocol | Defines the protocol (e.g., SSLv3_method) to use on the SSL request.|
289
- | ciphers | Required if SSL enabled. Specifies a list of SSL ciphers to use.|
290
- | ecdhCurve | During testing on some Node 8 environments, you need to set `ecdhCurve` to auto. If you do not, you will receive PROTO errors when attempting the calls. This is the only usage of this property and to our knowledge it only impacts Node 8 and 9. |
135
+ ```bash
136
+ systemctl restart pronghorn
137
+ ```
291
138
 
292
- ### Throttle Properties
139
+ 5. Change the adapter service instance configuration (host, port, credentials, etc) in IAP Admin Essentials GUI
293
140
 
294
- The throttle section is used when requests to Meraki must be queued (throttled). All of the properties in this section are optional.
141
+ npm run adapter:install can be dependent on where the adapter is installed and on the version of IAP so it is subject to fail. If this happens you can replace step 3-5 above with these:
295
142
 
296
- | Property | Description |
297
- | ------- | ------- |
298
- | throttle\_enabled | Default is false. Defines if the adapter should use throttling o rnot. |
299
- | number\_pronghorns | Default is 1. Defines if throttling is done in a single Itential instance or whether requests are being throttled across multiple Itential instances (minimum = 1, maximum = 20). Throttling in a single Itential instance uses an in-memory queue so there is less overhead. Throttling across multiple Itential instances requires placing the request and queue information into a shared resource (e.g. database) so that each instance can determine what is running and what is next to run. Throttling across multiple instances requires additional I/O overhead.|
300
- | sync-async | This property is not used at the current time (it is for future expansion of the throttling engine).|
301
- | max\_in\_queue | Represents the maximum number of requests the adapter should allow into the queue before rejecting requests (minimum = 1, maximum = 5000). This is not a limit on what the adapter can handle but more about timely responses to requests. The default is currently 1000.|
302
- | concurrent\_max | Defines the number of requests the adapter can send to Meraki at one time (minimum = 1, maximum = 1000). The default is 1 meaning each request must be sent to Meraki in a serial manner. |
303
- | expire\_timeout | Default is 0. Defines a graceful timeout of the request session. After a request has completed, the adapter will wait additional time prior to sending the next request. Measured in milliseconds (minimum = 0, maximum = 60000).|
304
- | average\_runtime | Represents the approximate average of how long it takes Meraki to handle each request. Measured in milliseconds (minimum = 50, maximum = 60000). Default is 200. This metric has performance implications. If the runtime number is set too low, it puts extra burden on the CPU and memory as the requests will continually try to run. If the runtime number is set too high, requests may wait longer than they need to before running. The number does not need to be exact but your throttling strategy depends heavily on this number being within reason. If averages range from 50 to 250 milliseconds you might pick an average run-time somewhere in the middle so that when Meraki performance is exceptional you might run a little slower than you might like, but when it is poor you still run efficiently.|
305
- | priorities | An array of priorities and how to handle them in relation to the throttle queue. Array of objects that include priority value and percent of queue to put the item ex { value: 1, percent: 10 }|
143
+ 3. Install adapter dependencies and check the adapter.
306
144
 
307
- ### Proxy Properties
145
+ ```bash
146
+ cd adapter-meraki
147
+ npm run install
148
+ npm run lint:errors
149
+ npm run test
150
+ ```
308
151
 
309
- The proxy section defines the properties to utilize when Meraki is behind a proxy server.
152
+ 4. Restart IAP
310
153
 
311
- | Property | Description |
312
- | ------- | ------- |
313
- | enabled | Required. Default is false. If Meraki is behind a proxy server, set enabled flag to true. |
314
- | host | Host information for the proxy server. Required if `enabled` is true.|
315
- | port | Port information for the proxy server. Required if `enabled` is true.|
316
- | protocol | The protocol (i.e., http, https, etc.) used to connect to the proxy. Default is http.|
317
- | username | If there is authentication for the proxy, provide the username here.|
318
- | password | If there is authentication for the proxy, provide the password here.|
154
+ ```bash
155
+ systemctl restart pronghorn
156
+ ```
319
157
 
320
- ### Mongo Properties
158
+ 5. Create an adapter service instance configuration in IAP Admin Essentials GUI
321
159
 
322
- The mongo section defines the properties used to connect to a Mongo database. Mongo can be used for throttling as well as to persist metric data. If not provided, metrics will be stored in the file system.
160
+ 6. Copy the properties from the sampleProperties.json and paste them into the service instance configuration in the inner/second properties field.
323
161
 
324
- | Property | Description |
325
- | ------- | ------- |
326
- | host | Optional. Host information for the mongo server.|
327
- | port | Optional. Port information for the mongo server.|
328
- | database | Optional. The database for the adapter to use for its data.|
329
- | username | Optional. If credentials are required to access mongo, this is the user to login as.|
330
- | password | Optional. If credentials are required to access mongo, this is the password to login with.|
331
- | replSet | Optional. If the database is set up to use replica sets, define it here so it can be added to the database connection.|
332
- | db\_ssl | Optional. Contains information for SSL connectivity to the database.|
333
- | db\_ssl -> enabled | If SSL is required, set to true.|
334
- | db\_ssl -> accept_invalid_cert | Defines if the adapter should accept invalid certificates (only recommended for lab environments). Required if SSL is enabled. Default is false.|
335
- | db\_ssl -> ca_file | Defines the path name to the CA file used for SSL. If SSL is enabled and the accept invalid certifications is false, then ca_file is required.|
336
- | db\_ssl -> key_file | Defines the path name to the Key file used for SSL. The key_file may be needed for some systems but it is not required for SSL.|
337
- | db\_ssl -> cert_file | Defines the path name to the Certificate file used for SSL. The cert_file may be needed for some systems but it is not required for SSL.|
162
+ 7. Change the adapter service instance configuration (host, port, credentials, etc) in IAP Admin Essentials GUI
338
163
 
339
- ## Testing an Itential Product Adapter
164
+ ### Testing
340
165
 
341
- Mocha is generally used to test all Itential Product Adapters. There are unit tests as well as integration tests performed. Integration tests can generally be run as standalone using mock data and running the adapter in stub mode, or as integrated. When running integrated, every effort is made to prevent environmental failures, however there is still a possibility.
166
+ Mocha is generally used to test all Itential Opensource Adapters. There are unit tests as well as integration tests performed. Integration tests can generally be run as standalone using mock data and running the adapter in stub mode, or as integrated. When running integrated, every effort is made to prevent environmental failures, however there is still a possibility.
342
167
 
343
- ### Unit Testing
168
+ #### Unit Testing
344
169
 
345
170
  Unit Testing includes testing basic adapter functionality as well as error conditions that are triggered in the adapter prior to any integration. There are two ways to run unit tests. The prefered method is to use the testRunner script; however, both methods are provided here.
346
171
 
347
-
348
172
  ```bash
349
173
  node utils/testRunner --unit
350
174
 
@@ -354,7 +178,7 @@ npm run test:baseunit
354
178
 
355
179
  To add new unit tests, edit the `test/unit/adapterTestUnit.js` file. The tests that are already in this file should provide guidance for adding additional tests.
356
180
 
357
- ### Integration Testing - Standalone
181
+ #### Integration Testing - Standalone
358
182
 
359
183
  Standalone Integration Testing requires mock data to be provided with the entities. If this data is not provided, standalone integration testing will fail. When the adapter is set to run in stub mode (setting the stub property to true), the adapter will run through its code up to the point of making the request. It will then retrieve the mock data and return that as if it had received that data as the response from Meraki. It will then translate the data so that the adapter can return the expected response to the rest of the Itential software. Standalone is the default integration test.
360
184
 
@@ -369,7 +193,7 @@ npm run test:integration
369
193
 
370
194
  To add new integration tests, edit the `test/integration/adapterTestIntegration.js` file. The tests that are already in this file should provide guidance for adding additional tests.
371
195
 
372
- ### Integration Testing
196
+ #### Integration Testing
373
197
 
374
198
  Integration Testing requires connectivity to Meraki. By using the testRunner script it prevents you from having to edit the integration test. It also resets the integration test after the test is complete so that credentials are not saved in the file.
375
199
 
@@ -385,9 +209,25 @@ Test should also be written to clean up after themselves. However, it is importa
385
209
 
386
210
  > **Reminder**: Do not check in code with actual credentials to systems.
387
211
 
388
- ## Adapter Node Scripts
212
+ ## [Configuration](./PROPERTIES.md)
213
+
214
+ ## [Using this Adapter](./CALLS.md)
215
+
216
+ ### [Authentication](./AUTH.md)
217
+
218
+ ## Additional Information
219
+
220
+ ### [Enhancements](./ENHANCE.md)
389
221
 
390
- There are several node scripts that now accompany the adapter. These scripts are provided to make several activities easier. Each of these scripts are described below.
222
+ ### [Contributing](./CONTRIBUTING.md)
223
+
224
+ ### Helpful Links
225
+
226
+ [Adapter Technical Resources](https://www.itential.com/automation-platform/integrations/adapters-resources/)
227
+
228
+ ### Node Scripts
229
+
230
+ There are several node scripts that now accompany the adapter. These scripts are provided to make several activities easier. Many of these scripts can have issues with different versions of IAP as they have dependencies on IAP and Mongo. If you have issues with the scripts please report them to the Itential Adapter Team. Each of these scripts are described below.
391
231
 
392
232
  | Run | Description |
393
233
  | ------- | ------- |
@@ -402,286 +242,16 @@ There are several node scripts that now accompany the adapter. These scripts are
402
242
  | npm run healthcheck | Checks whether the configured healthcheck call works to Meraki.|
403
243
  | npm run basicget | Checks whether the basic get calls works to Meraki.|
404
244
 
405
- ## Installing an Itential Product Adapter
406
-
407
- If you have App-Artifact installed in IAP, you can follow the instruction for that application to install the adapter into IAP. If not, follow these instructions.
408
-
409
- 1. Set up the name space location in your IAP node_modules.
410
-
411
- ```bash
412
- cd /opt/pronghorn/current/node_modules
413
- if the @itentialopensource directory does not exist, create it:
414
- mkdir @itentialopensource
415
- ```
416
-
417
- 2. Clone the adapter into your IAP environment.
418
-
419
- ```bash
420
- cd \@itentialopensource
421
- git clone git@gitlab.com:\@itentialopensource/adapters/adapter-meraki
422
- ```
423
-
424
- 3. Run the adapter install script.
425
-
426
- ```bash
427
- cd adapter-meraki
428
- npm run adapter:install
429
- ```
430
-
431
- 4. Restart IAP
432
-
433
- ```bash
434
- systemctl restart pronghorn
435
- ```
436
-
437
- ## Installing a Custom Adapter
438
-
439
- If you built this as a custom adapter through the Adapter Builder, it is recommended you go through setting up a development environment and testing the adapter before installing it. There is often configuration and authentication work that is required before the adapter will work in IAP.
440
-
441
- 1. Move the adapter into the IAP `node_modules` directory.
442
-
443
- ```text
444
- Depending on where your code is located, this process is different.
445
- Could be a tar, move, untar
446
- Could be a git clone of a repository
447
- Could also be a cp -R from a coding directory
448
- Adapter should be placed into: /opt/pronghorn/current/node_modules/\@itentialopensource
449
- ```
450
-
451
- 2. Follow Steps 3-4 (above) to install an Itential adapter to load your properties, dependencies and restart IAP.
452
-
453
- ## Using this Adapter
454
-
455
- The `adapter.js` file contains the calls the adapter makes available to the rest of the Itential Platform. The API detailed for these calls should be available through JSDOC. The following is a brief summary of the calls.
456
-
457
- ### Generic Adapter Calls
458
-
459
- The `connect` call is run when the Adapter is first loaded by he Itential Platform. It validates the properties have been provided correctly.
460
- ```js
461
- connect()
462
- ```
463
-
464
- The `healthCheck` call ensures that the adapter can communicate with Meraki. The actual call that is used is defined in the adapter properties.
465
- ```js
466
- healthCheck(callback)
467
- ```
468
-
469
- The `refreshProperties` call provides the adapter the ability to accept property changes without having to restart the adapter.
470
- ```js
471
- refreshProperties(properties)
472
- ```
473
-
474
- The `encryptProperty` call will take the provided property and technique, and return the property encrypted with the technique. This allows the property to be used in the adapterProps section for the credential password so that the password does not have to be in clear text. The adapter will decrypt the property as needed for communications with Meraki.
475
- ```js
476
- encryptProperty(property, technique, callback)
477
- ```
478
-
479
- The `addEntityCache` call will take the entities and add the list to the entity cache to expedite performance.
480
- ```js
481
- addEntityCache(entityType, entities, key, callback)
482
- ```
483
-
484
- The `capabilityResults` call will take the results from a verifyCompatibility and put them in the format to be passed back to the Itential Platform.
485
- ```js
486
- capabilityResults(results, callback)
487
- ```
488
-
489
- The `hasEntity` call verifies the adapter has the specific entity.
490
- ```js
491
- hasEntity(entityType, entityId, callback)
492
- ```
493
-
494
- The `verifyCapability` call verifies the adapter can perform the provided action on the specific entity.
495
- ```js
496
- verifyCapability(entityType, actionType, entityId, callback)
497
- ```
498
-
499
- The `updateEntityCache` call will update the entity cache.
500
- ```js
501
- updateEntityCache()
502
- ```
503
-
504
- The `updateAdapterConfiguration` call provides the ability to update the adapter configuration from IAP - includes actions, schema, mockdata and other configurations.
505
- ```js
506
- updateAdapterConfiguration(configFile, changes, entity, type, action, callback)
507
- ```
508
-
509
- The `suspend` call provides the ability to suspend the adapter and either have requests rejected or put into a queue to be processed after the adapter is resumed.
510
- ```js
511
- suspend(mode, callback)
512
- ```
513
-
514
- The `unsuspend` call provides the ability to resume a suspended adapter. Any requests in queue will be processed before new requests.
515
- ```js
516
- unsuspend(callback)
517
- ```
518
-
519
- The `findPath` call provides the ability to see if a particular API path is supported by the adapter.
520
- ```js
521
- findPath(apiPath, callback)
522
- ```
523
-
524
- The `troubleshoot` call can be used to check on the performance of the adapter - it checks connectivity, healthcheck and basic get calls.
525
- ```js
526
- troubleshoot(props, persistFlag, adapter, callback)
527
- ```
528
-
529
- The `runHealthcheck` call will return the results of a healthcheck.
530
- ```js
531
- runHealthcheck(adapter, callback)
532
- ```
533
-
534
- The `runConnectivity` call will return the results of a connectivity check.
535
- ```js
536
- runConnectivity(callback)
537
- ```
538
-
539
- The `runBasicGet` call will return the results of running basic get API calls.
540
- ```js
541
- runBasicGet(callback)
542
- ```
543
-
544
- The `getQueue` call will return the requests that are waiting in the queue if throttling is enabled.
545
- ```js
546
- getQueue(callback)
547
- ```
548
-
549
- ### Specific Adapter Calls
550
-
551
- Specific adapter calls are built based on the API of the Meraki. The Adapter Builder creates the proper method comments for generating JS-DOC for the adapter. This is the best way to get information on the calls.
552
-
553
-
554
- ## Extending/Enhancing the Adapter
555
-
556
- ### Adding a Second Instance of an Adapter
557
-
558
- You can add a second instance of this adapter without adding new code on the file system. To do this go into the IAP Admin Essentials and add a new service config for this adapter. The two instances of the adapter should have unique ids. In addition, they should point to different instances of the other system. For example, they should be configured to talk to different hosts.
559
-
560
- ### Adding Adapter Calls
561
-
562
- There are multiple ways to add calls to an existing adapter.
563
-
564
- The easiest way would be to use the Adapter Builder update process. This process takes in a Swagger or OpenAPI document, allows you to select the calls you want to add and then generates a zip file that can be used to update the adapter. Once you have the zip file simple put it in the adapter direcctory and execute `npm run adapter:update`.
565
-
566
- ```bash
567
- mv updatePackage.zip adapter-meraki
568
- cd adapter-meraki
569
- npm run adapter:update
570
- ```
571
-
572
- If you do not have a Swagger or OpenAPI document, you can use a Postman Collection and convert that to an OpenAPI document using APIMatic and then follow the first process.
573
-
574
- If you want to manually update the adapter that can also be done the key thing is to make sure you update all of the right files. Within the entities directory you will find 1 or more entities. You can create a new entity or add to an existing entity. Each entity has an action.json file, any new call will need to be put in the action.json file. It will also need to be added to the enum for the ph_request_type in the appropriate schema files. Once this configuration is complete you will need to add the call to the adapter.js file and in order to make it available as a workflow task in IAP, it should also be added to the pronghorn.json file. You can optionally add it to the unit and integration test files. There is more information on how to work on each of these files in the Adapter Technical Resources on Dev Site [HERE](https://developer.itential.io/adapters-resources/)
575
-
576
- ```text
577
- Files to update
578
- * entities/<entity>/action.json: add an action
579
- * entities/<entity>/schema.json (or the schema defined on the action): add action to the enum for ph_request_type
580
- * adapter.js: add the new method and make sure it calls the proper entity and action
581
- * pronghorn.json: add the new method
582
- * test/unit/adapterTestUnit.js (optional but best practice): add unit test(s) - function is there, any required parameters error when not passed in
583
- * test/integration/adapterTestIntegration.js (optional but best practice): add integration test
584
- ```
585
-
586
- ### Adding Adapter Properties
587
-
588
- While changing adapter properties is done in the service instance configuration section of IAP, adding properties has to be done in the adapter. To add a property you should edit the propertiesSchema.json with the proper information for the property. In addition, you should modify the sampleProperties to have the new property in it.
589
-
590
- ```text
591
- Files to update
592
- * propertiesSchema.json: add the new property and how it is defined
593
- * sampleProperties: add the new property with a default value
594
- * test/unit/adapterTestUnit.js (optional but best practice): add the property to the global properties
595
- * test/integration/adapterTestIntegration.js (optional but best practice): add the property to the global properties
596
- ```
597
-
598
- ### Changing Adapter Authentication
599
-
600
- Often an adapter is built before knowing the authentication and authentication process can also change over time. The adapter supports many different kinds of authentication but it does require configuration. Some forms of authentication can be defined entirely with the adapter properties but others require configuration.
601
-
602
- ```text
603
- Files to update
604
- * entities/<entity>/action.json: change the getToken action as needed
605
- * entities/<entity>/schemaTokenReq.json: add input parameters (external name is name in other system)
606
- * entities/<entity>/schemaTokenResp.json: add response parameters (external name is name in other system)
607
- * propertiesSchema.json: add any new property and how it is defined
608
- * sampleProperties: add any new property with a default value
609
- * test/unit/adapterTestUnit.js (optional but best practice): add the property to the global properties
610
- * test/integration/adapterTestIntegration.js (optional but best practice): add the property to the global properties
611
- ```
612
-
613
- ### Enhancing Adapter Integration Tests
614
-
615
- The adapter integration tests are written to be able to test in either stub (standalone) mode or integrated to the other system. However, if integrating to the other system, you may need to provide better data than what the adapter provides by default as that data is likely to fail for create and update. To provide better data, edit the adapter integration test file. Make sure you do not remove the marker and keep custom code below the marker so you do not impact future migrations. Once the edits are complete, run the integration test as it instructs you to above. When you run integrated to the other system, you can also save mockdata for future use by changing the isSaveMockData flag to true.
616
-
617
- ```text
618
- Files to update
619
- * test/integration/adapterTestIntegration.js: add better data for the create and update calls so that they will not fail.
620
- ```
621
-
622
- As mentioned previously, for most of these changes as well as other possible changes, there is more information on how to work on an adapter in the Adapter Technical Resources on Dev Site [HERE](https://developer.itential.io/adapters-resources/)
623
-
624
- ## Troubleshooting the Adapter
625
-
626
- Run `npm run troubleshoot` to start the interactive troubleshooting process. The command allows user to verify and update connection, authentication as well as healthcheck configuration. After that it will test these properties by sending HTTP request to the endpoint. If the tests pass, it will persist these changes into IAP.
627
-
628
- User also have the option to run individual command to perform specific test
629
-
630
- - `npm run healthcheck` will perform a healthcheck request of with current setting.
631
- - `npm run basicget` will perform some non-parameter GET request with current setting.
632
- - `npm run connectivity` will perform networking diagnostics of the adatper endpoint.
633
-
634
- ### Connectivity Issues
635
-
636
- 1. You can run the adapter troubleshooting script which will check connectivity, run the healthcheck and run basic get calls.
637
-
638
- ```bash
639
- npm run troubleshoot
640
- ```
641
-
642
- 2. Verify the adapter properties are set up correctly.
643
-
644
- ```text
645
- Go into the Itential Platform GUI and verify/update the properties
646
- ```
647
-
648
- 3. Verify there is connectivity between the Itential Platform Server and Meraki Server.
649
-
650
- ```text
651
- ping the ip address of Meraki server
652
- try telnet to the ip address port of Meraki
653
- ```
654
-
655
- 4. Verify the credentials provided for Meraki.
656
-
657
- ```text
658
- login to Meraki using the provided credentials
659
- ```
660
-
661
- 5. Verify the API of the call utilized for Meraki Healthcheck.
662
-
663
- ```text
664
- Go into the Itential Platform GUI and verify/update the properties
665
- ```
666
-
667
- ### Functional Issues
668
-
669
- Adapter logs are located in `/var/log/pronghorn`. In older releases of the Itential Platform, there is a `pronghorn.log` file which contains logs for all of the Itential Platform. In newer versions, adapters are logging into their own files.
670
-
671
- ## Contributing to Meraki
672
-
673
- Please check out the [Contributing Guidelines](./CONTRIBUTING.md).
674
-
675
- ## License & Maintainers
245
+ ## [Troubleshoot](./TROUBLESHOOT.md)
676
246
 
677
- ### Maintained By
247
+ ## License and Maintainers
678
248
 
679
249
  ```text
680
- Itential Product Adapters are maintained by the Itential Adapter Team.
681
- Itential OpenSource Adapters are maintained by the community at large.
250
+ Itential Product Adapters are maintained by the Itential Product Team.
251
+ Itential OpenSource Adapters are maintained by the Itential Adapter Team and the community at large.
682
252
  Custom Adapters are maintained by other sources.
683
253
  ```
684
254
 
685
- ### Product License
255
+ ## Product License
686
256
 
687
257
  [Apache 2.0](./LICENSE)