<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: WebAPI &amp;quot;add-access-role&amp;quot;:  invalid parameter for [users] in API / CLI Discussion</title>
    <link>https://community.checkpoint.com/t5/API-CLI-Discussion/WebAPI-quot-add-access-role-quot-invalid-parameter-for-users/m-p/101814#M5305</link>
    <description>&lt;P&gt;Just to update. The issue with the equals API is in plans of being fixed in next jumbo HF for R80.20 - R80.40 and R81. Once the fix is in place there should not be any need for the suggested W/A of updating the comment.&lt;/P&gt;</description>
    <pubDate>Wed, 11 Nov 2020 17:48:58 GMT</pubDate>
    <dc:creator>Jim_Oqvist</dc:creator>
    <dc:date>2020-11-11T17:48:58Z</dc:date>
    <item>
      <title>WebAPI "add-access-role":  invalid parameter for [users]</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/WebAPI-quot-add-access-role-quot-invalid-parameter-for-users/m-p/101590#M5296</link>
      <description>&lt;P&gt;I'm trying to create an acces role. with the parameter "users" : "any" it works without problems. but if i want to add an AD Group i always run into an error. does anyone have an idea&lt;/P&gt;&lt;P&gt;&lt;A href="https://sc1.checkpoint.com/documents/latest/APIs/?#web/add-access-role~v1.5%20" target="_blank" rel="noopener"&gt;https://sc1.checkpoint.com/documents/latest/APIs/?#web/add-access-role~v1.5%20&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;R80.30 T217&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Postman&lt;/STRONG&gt;:&lt;/P&gt;&lt;DIV&gt;&lt;DIV&gt;&lt;DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;{&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;"name"&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;:&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;"MyRole1112"&lt;/SPAN&gt;&lt;SPAN&gt;,&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;"networks"&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;:&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;"any"&lt;/SPAN&gt;&lt;SPAN&gt;,&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;"users"&lt;/SPAN&gt;&lt;SPAN&gt;:&amp;nbsp;[&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;{&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;"source"&lt;/SPAN&gt;&lt;SPAN&gt;:&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;"qa.mydom.com__AD"&lt;/SPAN&gt;&lt;SPAN&gt;,&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;"selection"&lt;/SPAN&gt;&lt;SPAN&gt;:&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;"my-ad-group"&lt;/SPAN&gt;&lt;SPAN&gt;,&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;"base_dn"&lt;/SPAN&gt;&lt;SPAN&gt;:&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;"qa.mydom.com/my/Base/DN/"&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;}&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;],&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;"machines"&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;:&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;"all&amp;nbsp;identified"&lt;/SPAN&gt;&lt;SPAN&gt;,&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;"remote-access-clients"&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;:&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;"any"&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;Status 400 Bad Request&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;{&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;"code"&lt;/SPAN&gt;&lt;SPAN&gt;:&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;"generic_err_invalid_parameter"&lt;/SPAN&gt;&lt;SPAN&gt;,&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;"message"&lt;/SPAN&gt;&lt;SPAN&gt;:&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;"Invalid&amp;nbsp;parameter&amp;nbsp;for&amp;nbsp;[users].&amp;nbsp;Invalid&amp;nbsp;value"&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;}&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&lt;STRONG&gt;Ansible Error (WebAPI] :&lt;/STRONG&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;-&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;name&lt;/SPAN&gt;&lt;SPAN&gt;:&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;ADD-Access-Role&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;uri&lt;/SPAN&gt;&lt;SPAN&gt;:&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;url&lt;/SPAN&gt;&lt;SPAN&gt;:&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;"&lt;A href="https://1.2.3.4/web_api/add-access-role" target="_blank" rel="noopener"&gt;https://1.2.3.4/web_api/add-access-role&lt;/A&gt;"&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;validate_certs&lt;/SPAN&gt;&lt;SPAN&gt;:&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;false&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;method&lt;/SPAN&gt;&lt;SPAN&gt;:&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;POST&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;body_format&lt;/SPAN&gt;&lt;SPAN&gt;:&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;json&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;headers&lt;/SPAN&gt;&lt;SPAN&gt;:&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;X-chkp-sid&lt;/SPAN&gt;&lt;SPAN&gt;:&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;"{{&amp;nbsp;loginoutput.json.sid&amp;nbsp;}}"&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;body&lt;/SPAN&gt;&lt;SPAN&gt;:&amp;nbsp;&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;name&lt;/SPAN&gt;&lt;SPAN&gt;:&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;"MyRole1112"&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;networks&lt;/SPAN&gt;&lt;SPAN&gt;:&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;"any"&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;users&lt;/SPAN&gt;&lt;SPAN&gt;:&amp;nbsp;&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;source&lt;/SPAN&gt;&lt;SPAN&gt;:&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;"qa.mydom.com__AD"&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;selection&lt;/SPAN&gt;&lt;SPAN&gt;:&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;"my-ad-group"&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;base_dn&lt;/SPAN&gt;&lt;SPAN&gt;:&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;"qa.mydom.com/my/Base/DN/"&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;machines&lt;/SPAN&gt;&lt;SPAN&gt;:&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;"all&amp;nbsp;identified"&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;remote-access-clients&lt;/SPAN&gt;&lt;SPAN&gt;:&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;"any"&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;register&lt;/SPAN&gt;&lt;SPAN&gt;:&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;role_response&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;TASK [ADD-Access-Role] ***************************************************************************************************************************&lt;BR /&gt;fatal: [1.2.3.4]: FAILED! =&amp;gt; {"changed": false, "connection": "close", "content": "{\n \"code\" : \"generic_err_invalid_parameter\",\n \"message\" : \"Invalid parameter for [users]. The invalid value [source=\\\"qa.mydom.com__AD\\\" selection=\\\"my-ad-group\\\" base_dn=\\\"my/Base/DN/\\\"] should be replaced by one of the following values: [any, all identified]\"\n}", "content_type": "application/json",&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;DIV&gt;&lt;DIV class="gtx-trans-icon"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;/DIV&gt;</description>
      <pubDate>Tue, 10 Nov 2020 09:30:36 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/WebAPI-quot-add-access-role-quot-invalid-parameter-for-users/m-p/101590#M5296</guid>
      <dc:creator>Rene_Dreher</dc:creator>
      <dc:date>2020-11-10T09:30:36Z</dc:date>
    </item>
    <item>
      <title>Re: WebAPI "add-access-role":  invalid parameter for [users]</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/WebAPI-quot-add-access-role-quot-invalid-parameter-for-users/m-p/101640#M5297</link>
      <description>&lt;P&gt;Hi Rene,&lt;/P&gt;
&lt;P&gt;Your postman example is missing a closing bracket in the end "}"&lt;/P&gt;
&lt;P&gt;Why not use the official module from the Check Point collection for Ansible for this?&lt;BR /&gt;&lt;A href="https://docs.ansible.com/ansible/latest/collections/check_point/mgmt/cp_mgmt_access_role_module.html#ansible-collections-check-point-mgmt-cp-mgmt-access-role-module" target="_blank" rel="noopener"&gt;https://docs.ansible.com/ansible/latest/collections/check_point/mgmt/cp_mgmt_access_role_module.html#ansible-collections-check-point-mgmt-cp-mgmt-access-role-module&lt;/A&gt;&lt;BR /&gt;Latest collection is available here:&amp;nbsp;&lt;A href="https://galaxy.ansible.com/check_point/mgmt" target="_blank" rel="noopener"&gt;https://galaxy.ansible.com/check_point/mgmt&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Your base_dn is not correct.&lt;BR /&gt;Please note that base_dn is only required if selection is not a unique name in active directory&lt;BR /&gt;Also note that base_dn is a unique identifier, the API is not really looking for the base DN it is looking for the CN of the object in LDAP, that parameter is a bit misleading&lt;/P&gt;
&lt;P&gt;Here is a working example where the domain is darkness.local&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;---
- name: playbook name
  hosts: localhost
  gather_facts: false
  connection: local
  tasks:
    - name: ADD-Access-Role
      uri:
         url: "https://192.168.233.70/web_api/add-access-role"
         validate_certs: false
         method: POST
         body_format: json
         headers:
          X-chkp-sid: "{{ loginoutput.json.sid }}"
         body: 
          name: "Ansible_Role2"
          networks: "any"
          users: 
            source: "darkness.local__AD"     
            selection: "Domain Admins"
            base-dn: "CN=Domain Admins,DC=darkness,DC=local"
          machines: "all identified"
          remote-access-clients: "any"
      register: role_response&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I think your example should look something like this.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;---
- name: playbook name
  hosts: localhost
  gather_facts: false
  connection: local
  tasks:
    - name: ADD-Access-Role
      uri:
         url: "https://1.2.3.4/web_api/add-access-role"
         validate_certs: false
         method: POST
         body_format: json
         headers:
          X-chkp-sid: "{{ loginoutput.json.sid }}"
         body: 
          name: "MyRole1112"
          networks: "any"
          users: 
            source: "qa.mydom.com__AD"     
            selection: "Domain Admins"
            base-dn: "CN=Domain Admins,CN=Users,DC=qa,DC=mydom,DC=com"
          machines: "all identified"
          remote-access-clients: "any"
      register: role_response&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 10 Nov 2020 15:19:13 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/WebAPI-quot-add-access-role-quot-invalid-parameter-for-users/m-p/101640#M5297</guid>
      <dc:creator>Jim_Oqvist</dc:creator>
      <dc:date>2020-11-10T15:19:13Z</dc:date>
    </item>
    <item>
      <title>Re: WebAPI "add-access-role":  invalid parameter for [users]</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/WebAPI-quot-add-access-role-quot-invalid-parameter-for-users/m-p/101711#M5299</link>
      <description>&lt;P&gt;Hi Jim,&lt;/P&gt;&lt;P&gt;thank you very much for your support. You are absolutely right, the Base DN is faulty. I have commented this one out and it works. Unfortunately the correct format is not described in the API documentation.&lt;/P&gt;&lt;P&gt;I copied the Base DN from an old script which uses the old Ansible module. &lt;A href="https://github.com/CheckPointSW/cpAnsible" target="_blank"&gt;https://github.com/CheckPointSW/cpAnsible&lt;/A&gt;&amp;nbsp;with the old module the BaseDN worked in this format.&lt;/P&gt;&lt;P&gt;I have looked at the Ansible Galaxy ChekPoint module in version 2 and started with it. But I had two problems for my use case:&lt;BR /&gt;- set-group: I cannot add a single host to a group. I have to read the group, save the result and then add all hosts again.&lt;BR /&gt;-add-access-rule -&amp;gt; position: Can I add the rule to a specific rule number or to the top or bottom of the rule set. Unfortunately I cannot assign it to a section like this example:&lt;BR /&gt;{&lt;BR /&gt;"layer" : "network",&lt;BR /&gt;"position" : {&lt;BR /&gt;"bottom" : "My Access Section"&lt;BR /&gt;},&lt;BR /&gt;"name" : "Last rule in the section"&lt;BR /&gt;}&lt;BR /&gt;This also still worked in the "old" Ansible module.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;So I'm testing everything to decide later if I want to do everything in Ansible or via the WebAPI.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Best greetings from Hamburg Germany&lt;/P&gt;&lt;P&gt;Rene&lt;/P&gt;</description>
      <pubDate>Wed, 11 Nov 2020 07:51:03 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/WebAPI-quot-add-access-role-quot-invalid-parameter-for-users/m-p/101711#M5299</guid>
      <dc:creator>Rene_Dreher</dc:creator>
      <dc:date>2020-11-11T07:51:03Z</dc:date>
    </item>
    <item>
      <title>Re: WebAPI "add-access-role":  invalid parameter for [users]</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/WebAPI-quot-add-access-role-quot-invalid-parameter-for-users/m-p/101732#M5301</link>
      <description>&lt;P&gt;Hi Rene, thanks for your feedback.&amp;nbsp;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;With the current cp_mgmt_access_rule, you are indeed correct. It is not possible to place it in top or bottom of a specific section identified by uid or name or before and after&amp;nbsp;specific section/rule identified by uid or name. &lt;BR /&gt;As you say you can only place it in the top, bottom or at a specific rule number.&lt;/LI&gt;
&lt;LI&gt;For the cp_mgmt_group you are actually able to remove and add objects in a group. The only thing that does not work is when you try to remove all objects from the group, since the module will at that moment not take the "members" information of the group object into account when comparing your code in the playbook with the reality.&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;I do recommend you to open two issues at&amp;nbsp;&lt;A href="https://github.com/CheckPointSW/CheckPointAnsibleMgmtCollection/issues" target="_blank" rel="noopener"&gt;https://github.com/CheckPointSW/CheckPointAnsibleMgmtCollection/issues&lt;/A&gt;&amp;nbsp;for 1 and 2 in order to get the modules improved.&lt;/P&gt;
&lt;P&gt;Here is a working example where you can try to add and remove host objects from an existing group. just uncomment the re comment the different members between your playbook runs.&lt;/P&gt;
&lt;P&gt;cp_mgmt_group.yml&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;---
# To Run
# ansible-playbook cp_mgmt_group.yml -e "target=192.168.233.70" -i 192.168.233.70,
#
- name: Build Ansible demo policy automation_policy on Check Point management server {{ target }}
  hosts: "{{ target }}"
  connection: httpapi
  vars:
      # Credentials for cp_mgmt* modules and Settings for the Check Point httpapi plugin that provides methods to connect to Checkpoint devices over a HTTP(S)-based api.
      ansible_httpapi_use_ssl: True
      ansible_httpapi_validate_certs: False
      ansible_network_os: check_point.mgmt.checkpoint #Using Galaxy https://galaxy.ansible.com/check_point collection
      # ansible_checkpoint_domain: SMC User # Default domain for a SMS (SmartCenter), you only need to set the domain variable when connecting to a MDS
      ansible_user: api_user # Change to your Check Point management admin user
      ansible_ssh_pass: vpn123 # Change to your Check Point management admin password
      #ansible_api_key: xxxxxxxxxx # Optionally you can use API key instead of username and password
  gather_facts: no
  tasks:

    - name: add-group, set or delete Check Point group object
      check_point.mgmt.cp_mgmt_group:
        members:
#        - Mail server
#        - Web server
#        - DB server
        state: present
        name: Ansible Group
        color: forest green

    - name: Add, set or delete Check Point host object
      check_point.mgmt.cp_mgmt_host:
        state: present
        name: Mail server
        ip_address: 192.168.1.1
        color: red
        comments: my mail server host objects

    - name: Add, set or delete Check Point host object
      check_point.mgmt.cp_mgmt_host:
        state: present
        name: Web server
        ip_address: 10.1.1.55
        color: yellow
        comments: my blue jump host object

    - name: Add, set or delete Check Point host object
      check_point.mgmt.cp_mgmt_host:
        state: present
        name: DB server
        ip_address: 10.1.2.55
        color: red
        comments: my ubuntu host object

    - name: present
      cp_mgmt_publish:&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 11 Nov 2020 10:09:26 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/WebAPI-quot-add-access-role-quot-invalid-parameter-for-users/m-p/101732#M5301</guid>
      <dc:creator>Jim_Oqvist</dc:creator>
      <dc:date>2020-11-11T10:09:26Z</dc:date>
    </item>
    <item>
      <title>Re: WebAPI "add-access-role":  invalid parameter for [users]</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/WebAPI-quot-add-access-role-quot-invalid-parameter-for-users/m-p/101787#M5303</link>
      <description>&lt;P&gt;Yes, but you must specify each "member" individually in the group.&lt;/P&gt;&lt;P&gt;- name: add-group&lt;BR /&gt;&amp;nbsp; cp_mgmt_group:&lt;BR /&gt;&amp;nbsp; &amp;nbsp; members:&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; - host1&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; - host2&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; - ..........&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; - host150&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; - NewHost1&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; - NewHost2&lt;BR /&gt;&amp;nbsp; &amp;nbsp; name: MyGroup&lt;BR /&gt;&amp;nbsp; &amp;nbsp; state: present&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you have an existing group with e.g. 150 objects and want to assign an existing host to this group. There is no "add" only the new member to group. i have a workaround for this but i don't know if this is a nice way to do it in production. here the groups are also much bigger.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;-&amp;nbsp;name:&amp;nbsp;Playbook&amp;nbsp;Add&amp;nbsp;Host&amp;nbsp;to&amp;nbsp;Group&lt;BR /&gt;&amp;nbsp;&amp;nbsp;hosts:&amp;nbsp;check_point&lt;BR /&gt;&amp;nbsp;&amp;nbsp;#connection:&amp;nbsp;httpapi&lt;BR /&gt;&amp;nbsp;&amp;nbsp;vars_files:&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;-&amp;nbsp;my_vars.yml&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;tasks:&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;-&amp;nbsp;name:&amp;nbsp;add&amp;nbsp;host&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;cp_mgmt_host:&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;ipv4_address:&amp;nbsp;"{{&amp;nbsp;ip_addr&amp;nbsp;}}"&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;name:&amp;nbsp;"host_{{&amp;nbsp;ip_addr&amp;nbsp;}}"&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;state:&amp;nbsp;present&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;color:&amp;nbsp;black&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;-&amp;nbsp;name:&amp;nbsp;Read&amp;nbsp;greoup&amp;nbsp;content&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;cp_mgmt_group_facts:&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;name:&amp;nbsp;"{{&amp;nbsp;group&amp;nbsp;}}"&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;details_level:&amp;nbsp;standard&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;register:&amp;nbsp;groupcontent&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;-&amp;nbsp;name:&amp;nbsp;create&amp;nbsp;group&amp;nbsp;list&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;set_fact:&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;memberlist:&amp;nbsp;"{{&amp;nbsp;memberlist|default([])&amp;nbsp;+&amp;nbsp;[&amp;nbsp;item&amp;nbsp;]&amp;nbsp;}}"&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;with_items:&amp;nbsp;"{{&amp;nbsp;groupcontent.ansible_facts.group.members&amp;nbsp;|&amp;nbsp;json_query(jmesquery)&amp;nbsp;}}"&amp;nbsp;&amp;nbsp;&amp;nbsp;#var:&amp;nbsp;jmesquery:&amp;nbsp;"[*].name"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;-&amp;nbsp;name:&amp;nbsp;add&amp;nbsp;new&amp;nbsp;host&amp;nbsp;to&amp;nbsp;list&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;set_fact:&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;memberlist:&amp;nbsp;"{{&amp;nbsp;memberlist|default([])&amp;nbsp;+&amp;nbsp;[&amp;nbsp;hostname&amp;nbsp;]&amp;nbsp;}}"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;-&amp;nbsp;name:&amp;nbsp;add&amp;nbsp;list&amp;nbsp;2&amp;nbsp;the&amp;nbsp;group&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;cp_mgmt_group:&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;members:&amp;nbsp;"{{&amp;nbsp;memberlist&amp;nbsp;}}"&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;name:&amp;nbsp;"{{&amp;nbsp;group&amp;nbsp;}}"&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;state:&amp;nbsp;present&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;-&amp;nbsp;name:&amp;nbsp;Publish&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;cp_mgmt_publish:&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;another way is to use the "cp_mgmt_host" here you can create a host and assign it to a group. this works fine even if the host did not exist before. if the host exists before the script runs but ignores the "groups" and does not assign the host to the group.&amp;nbsp;is it also a bug of the ansible module ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;tasks:&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;-&amp;nbsp;name:&amp;nbsp;create&amp;nbsp;a&amp;nbsp;host&amp;nbsp;and&amp;nbsp;add&amp;nbsp;to&amp;nbsp;group&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;cp_mgmt_host:&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;ipv4_address:&amp;nbsp;"{{&amp;nbsp;ip_addr&amp;nbsp;}}"&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;name:&amp;nbsp;"host_{{&amp;nbsp;ip_addr&amp;nbsp;}}"&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;groups:&amp;nbsp;"{{&amp;nbsp;group&amp;nbsp;}}"&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;state:&amp;nbsp;present&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;color:&amp;nbsp;black&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 11 Nov 2020 14:24:16 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/WebAPI-quot-add-access-role-quot-invalid-parameter-for-users/m-p/101787#M5303</guid>
      <dc:creator>Rene_Dreher</dc:creator>
      <dc:date>2020-11-11T14:24:16Z</dc:date>
    </item>
    <item>
      <title>Re: WebAPI "add-access-role":  invalid parameter for [users]</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/WebAPI-quot-add-access-role-quot-invalid-parameter-for-users/m-p/101795#M5304</link>
      <description>&lt;P&gt;Hi Rene,&lt;/P&gt;
&lt;P&gt;yes it seems to be a issue in the equals API endpoint used by the Check Point collection for Ansible to verify if there is any diff between the reality and the code. where the equals API endpoint is not checking the value of the group membership on the object.&lt;/P&gt;
&lt;P&gt;Thanks for reporting this. I will notify our developers.&lt;/P&gt;
&lt;P&gt;You can work around this issue by changing for example the comment of the object at the same time as you change the group. this will force the equals process to understand that there is a diff and execute the set-host API endpoint, in order to update the host object with the new comment including the updated group membership.&lt;/P&gt;
&lt;P&gt;Please note, in order to remove a a host from all groups you need to send a empty (and update the comment section) list like this.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;- name: Add, set or delete Check Point host object
  check_point.mgmt.cp_mgmt_host:
    state: present
    name: DB server
    groups: []
    ip_address: 10.1.2.55
    color: red
    comments: 2 my ubuntu host object&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 11 Nov 2020 15:09:22 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/WebAPI-quot-add-access-role-quot-invalid-parameter-for-users/m-p/101795#M5304</guid>
      <dc:creator>Jim_Oqvist</dc:creator>
      <dc:date>2020-11-11T15:09:22Z</dc:date>
    </item>
    <item>
      <title>Re: WebAPI "add-access-role":  invalid parameter for [users]</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/WebAPI-quot-add-access-role-quot-invalid-parameter-for-users/m-p/101814#M5305</link>
      <description>&lt;P&gt;Just to update. The issue with the equals API is in plans of being fixed in next jumbo HF for R80.20 - R80.40 and R81. Once the fix is in place there should not be any need for the suggested W/A of updating the comment.&lt;/P&gt;</description>
      <pubDate>Wed, 11 Nov 2020 17:48:58 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/WebAPI-quot-add-access-role-quot-invalid-parameter-for-users/m-p/101814#M5305</guid>
      <dc:creator>Jim_Oqvist</dc:creator>
      <dc:date>2020-11-11T17:48:58Z</dc:date>
    </item>
    <item>
      <title>Re: WebAPI "add-access-role":  invalid parameter for [users]</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/WebAPI-quot-add-access-role-quot-invalid-parameter-for-users/m-p/101843#M5310</link>
      <description>&lt;P&gt;thx mate&lt;/P&gt;&lt;P&gt;i will wait for the hf and watch the changelog.&amp;nbsp;for the topic "policy position" i will create a issue on github&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 12 Nov 2020 07:58:22 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/WebAPI-quot-add-access-role-quot-invalid-parameter-for-users/m-p/101843#M5310</guid>
      <dc:creator>Rene_Dreher</dc:creator>
      <dc:date>2020-11-12T07:58:22Z</dc:date>
    </item>
    <item>
      <title>Re: WebAPI "add-access-role":  invalid parameter for [users]</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/WebAPI-quot-add-access-role-quot-invalid-parameter-for-users/m-p/101847#M5311</link>
      <description>&lt;P&gt;update: GitHub issue #33:&amp;nbsp;&amp;nbsp;&lt;A href="https://github.com/CheckPointSW/CheckPointAnsibleMgmtCollection/issues/33" target="_blank"&gt;https://github.com/CheckPointSW/CheckPointAnsibleMgmtCollection/issues/33&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 12 Nov 2020 08:36:22 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/WebAPI-quot-add-access-role-quot-invalid-parameter-for-users/m-p/101847#M5311</guid>
      <dc:creator>Rene_Dreher</dc:creator>
      <dc:date>2020-11-12T08:36:22Z</dc:date>
    </item>
    <item>
      <title>Re: WebAPI "add-access-role":  invalid parameter for [users]</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/WebAPI-quot-add-access-role-quot-invalid-parameter-for-users/m-p/102952#M5337</link>
      <description>&lt;P&gt;chkp-orso commented 7 days ago&lt;/P&gt;&lt;P&gt;Hi, Thanks for reaching us. We intentionally removed the first three options because it damages one of Ansible requirements for idempotency. Thanks, Or&lt;/P&gt;&lt;P&gt;CHKP-orso chkp-orso closed this 7 days ago&lt;/P&gt;</description>
      <pubDate>Mon, 23 Nov 2020 09:46:50 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/WebAPI-quot-add-access-role-quot-invalid-parameter-for-users/m-p/102952#M5337</guid>
      <dc:creator>Rene_Dreher</dc:creator>
      <dc:date>2020-11-23T09:46:50Z</dc:date>
    </item>
  </channel>
</rss>

