Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Implementation of a TS Agent class for UserID #443

Open
wants to merge 7 commits into
base: develop
Choose a base branch
from

Conversation

A-Thomas-91
Copy link

@A-Thomas-91 A-Thomas-91 commented Apr 18, 2022

Description

I have implemented the ability to add TS Agent objects directly to the firewall.
https://docs.paloaltonetworks.com/compatibility-matrix/terminal-services-ts-agent

Motivation and Context

The company I work for uses Azure Virtual Desktop, we have different host pools in different regions and corresponding PA-VMs in the regions. Due to the dynamic nature of host creation, this has allowed us to add 30 hosts' (which have the TS agent installed) corresponding IP addresses and port numbers in a matter of seconds to our firewalls.

How Has This Been Tested?

We don't have a testing environment but at the time we had a spare physical PA device which the implementation was tested on, after running the tests, the TS agent objects were successfully added to the firewall. This was then tested in production and we began to instantly see users mapped to traffic on the newly added AVD hosts.

Types of changes

  • New feature (non-breaking change which adds functionality)

Checklist

Forgive me for not ticking the test tick boxes as this is my first ever pull request, I would love to work on other aspects of this project and implement different classes under guidance of understanding the API in full. Whilst I was able to read the code to implement this class I do not fully understand how I would implement decryption exlusion/decryption profile classes which I do have a need for.

  • I have updated the documentation accordingly.
  • I have read the CONTRIBUTING document.
  • I have added tests to cover my changes if appropriate.
  • All new and existing tests passed.

@welcome-to-palo-alto-networks

🎉 Thanks for opening this pull request! We really appreciate contributors like you! 🙌

panos/objects.py Outdated Show resolved Hide resolved
Copy link
Collaborator

@shinmog shinmog left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

lgtm, thanks!

Copy link
Collaborator

@shinmog shinmog left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Oh, actually, looks like the acctests are failing. There's no parent defined.

Seems this needs to be added to the CHILDTYPES of at least panos.firewall.Firewall and panos.device.Vsys.

@A-Thomas-91 A-Thomas-91 requested a review from shinmog May 11, 2022 18:55
@A-Thomas-91
Copy link
Author

Oh, actually, looks like the acctests are failing. There's no parent defined.

Seems this needs to be added to the CHILDTYPES of at least panos.firewall.Firewall and panos.device.Vsys.

I have updated both CHILDTYPES, hopefully the acctests should now pass.

@A-Thomas-91 A-Thomas-91 reopened this May 11, 2022
Copy link
Author

@A-Thomas-91 A-Thomas-91 left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I have updated both CHILDTYPES for this class

Copy link
Author

@A-Thomas-91 A-Thomas-91 left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Updated CHILDTYPES

@shinmog
Copy link
Collaborator

shinmog commented Jun 1, 2022

@A-Thomas-91

Some acctests are failing. You can do make test to verify the tests will pass, that's all the CI is running. Just needs a tweak to fix.

@A-Thomas-91
Copy link
Author

Changes completed under following pull :
All acctests passed
b2b1367

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants