summaryrefslogtreecommitdiff
path: root/lib/ansible/module_utils
diff options
context:
space:
mode:
authorAnsible Core Team <info@ansible.com>2020-03-09 09:40:36 +0000
committerAnsible Core Team <info@ansible.com>2020-03-09 09:40:36 +0000
commit6ea22818476eb22d761a958b27e01ee2dc1b9a55 (patch)
treef42ee7ae78f39caa05fe414b4e3e82b2031554f7 /lib/ansible/module_utils
parent91e8679f56be4d8fd78bb3e1b2d5da53f874f753 (diff)
downloadansible-6ea22818476eb22d761a958b27e01ee2dc1b9a55.tar.gz
Migrated to dellemc_networking.os6
Diffstat (limited to 'lib/ansible/module_utils')
-rw-r--r--lib/ansible/module_utils/network/dellos6/dellos6.py270
1 files changed, 0 insertions, 270 deletions
diff --git a/lib/ansible/module_utils/network/dellos6/dellos6.py b/lib/ansible/module_utils/network/dellos6/dellos6.py
deleted file mode 100644
index 545a82757f..0000000000
--- a/lib/ansible/module_utils/network/dellos6/dellos6.py
+++ /dev/null
@@ -1,270 +0,0 @@
-#
-# (c) 2015 Peter Sprygada, <psprygada@ansible.com>
-# (c) 2017 Red Hat, Inc
-#
-# Copyright (c) 2016 Dell Inc.
-#
-# This code is part of Ansible, but is an independent component.
-# This particular file snippet, and this file snippet only, is BSD licensed.
-# Modules you write using this snippet, which is embedded dynamically by Ansible
-# still belong to the author of the module, and may assign their own license
-# to the complete work.
-#
-# Redistribution and use in source and binary forms, with or without modification,
-# are permitted provided that the following conditions are met:
-#
-# * Redistributions of source code must retain the above copyright
-# notice, this list of conditions and the following disclaimer.
-# * Redistributions in binary form must reproduce the above copyright notice,
-# this list of conditions and the following disclaimer in the documentation
-# and/or other materials provided with the distribution.
-#
-# THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND
-# ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
-# WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
-# IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT,
-# INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
-# PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
-# INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
-# LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE
-# USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-#
-import re
-import json
-
-from ansible.module_utils._text import to_text
-from ansible.module_utils.basic import env_fallback
-from ansible.module_utils.network.common.utils import to_list, ComplexList
-from ansible.module_utils.connection import Connection, ConnectionError, exec_command
-from ansible.module_utils.network.common.config import NetworkConfig, ConfigLine, ignore_line
-
-_DEVICE_CONFIGS = {}
-
-WARNING_PROMPTS_RE = [
- r"[\r\n]?\[confirm yes/no\]:\s?$",
- r"[\r\n]?\[y/n\]:\s?$",
- r"[\r\n]?\[yes/no\]:\s?$"
-]
-
-dellos6_provider_spec = {
- 'host': dict(),
- 'port': dict(type='int'),
- 'username': dict(fallback=(env_fallback, ['ANSIBLE_NET_USERNAME'])),
- 'password': dict(fallback=(env_fallback, ['ANSIBLE_NET_PASSWORD']), no_log=True),
- 'ssh_keyfile': dict(fallback=(env_fallback, ['ANSIBLE_NET_SSH_KEYFILE']), type='path'),
- 'authorize': dict(fallback=(env_fallback, ['ANSIBLE_NET_AUTHORIZE']), type='bool'),
- 'auth_pass': dict(fallback=(env_fallback, ['ANSIBLE_NET_AUTH_PASS']), no_log=True),
- 'timeout': dict(type='int'),
-}
-dellos6_argument_spec = {
- 'provider': dict(type='dict', options=dellos6_provider_spec),
-}
-dellos6_top_spec = {
- 'host': dict(removed_in_version=2.9),
- 'port': dict(removed_in_version=2.9, type='int'),
- 'username': dict(removed_in_version=2.9),
- 'password': dict(removed_in_version=2.9, no_log=True),
- 'ssh_keyfile': dict(removed_in_version=2.9, type='path'),
- 'authorize': dict(removed_in_version=2.9, type='bool'),
- 'auth_pass': dict(removed_in_version=2.9, no_log=True),
- 'timeout': dict(removed_in_version=2.9, type='int'),
-}
-dellos6_argument_spec.update(dellos6_top_spec)
-
-
-def get_provider_argspec():
- return dellos6_provider_spec
-
-
-def get_connection(module):
- if hasattr(module, '_dellos6_connection'):
- return module._dellos6_connection
-
- capabilities = get_capabilities(module)
- network_api = capabilities.get('network_api')
- if network_api == 'cliconf':
- module._dellos6_connection = Connection(module._socket_path)
- else:
- module.fail_json(msg='Invalid connection type %s' % network_api)
-
- return module._dellos6_connection
-
-
-def get_capabilities(module):
- if hasattr(module, '_dellos6_capabilities'):
- return module._dellos6_capabilities
- try:
- capabilities = Connection(module._socket_path).get_capabilities()
- except ConnectionError as exc:
- module.fail_json(msg=to_text(exc, errors='surrogate_then_replace'))
- module._dellos6_capabilities = json.loads(capabilities)
- return module._dellos6_capabilities
-
-
-def check_args(module, warnings):
- pass
-
-
-def get_config(module, flags=None):
- flags = [] if flags is None else flags
-
- cmd = 'show running-config '
- cmd += ' '.join(flags)
- cmd = cmd.strip()
-
- try:
- return _DEVICE_CONFIGS[cmd]
- except KeyError:
- rc, out, err = exec_command(module, cmd)
- if rc != 0:
- module.fail_json(msg='unable to retrieve current config', stderr=to_text(err, errors='surrogate_or_strict'))
- cfg = to_text(out, errors='surrogate_or_strict').strip()
- _DEVICE_CONFIGS[cmd] = cfg
- return cfg
-
-
-def run_commands(module, commands, check_rc=True):
- connection = get_connection(module)
- try:
- return connection.run_commands(commands=commands, check_rc=check_rc)
- except ConnectionError as exc:
- module.fail_json(msg=to_text(exc))
-
-
-def load_config(module, commands):
- rc, out, err = exec_command(module, 'configure terminal')
- if rc != 0:
- module.fail_json(msg='unable to enter configuration mode', err=to_text(err, errors='surrogate_or_strict'))
-
- for command in to_list(commands):
- if command == 'end':
- continue
-# cmd = {'command': command, 'prompt': WARNING_PROMPTS_RE, 'answer': 'yes'}
- rc, out, err = exec_command(module, command)
- if rc != 0:
- module.fail_json(msg=to_text(err, errors='surrogate_or_strict'), command=command, rc=rc)
- exec_command(module, 'end')
-
-
-def get_sublevel_config(running_config, module):
- contents = list()
- current_config_contents = list()
- sublevel_config = Dellos6NetworkConfig(indent=0)
- obj = running_config.get_object(module.params['parents'])
- if obj:
- contents = obj._children
- for c in contents:
- if isinstance(c, ConfigLine):
- current_config_contents.append(c.raw)
- sublevel_config.add(current_config_contents, module.params['parents'])
- return sublevel_config
-
-
-def os6_parse(lines, indent=None, comment_tokens=None):
- sublevel_cmds = [
- re.compile(r'^vlan !(priority).*$'),
- re.compile(r'^stack.*$'),
- re.compile(r'^interface.*$'),
- re.compile(r'datacenter-bridging.*$'),
- re.compile(r'line (console|telnet|ssh).*$'),
- re.compile(r'ip ssh !(server).*$'),
- re.compile(r'(ip|mac|management|arp) access-list.*$'),
- re.compile(r'ip dhcp pool.*$'),
- re.compile(r'ip vrf !(forwarding).*$'),
- re.compile(r'ipv6 (dhcp pool|router).*$'),
- re.compile(r'mail-server.*$'),
- re.compile(r'vpc domain.*$'),
- re.compile(r'router.*$'),
- re.compile(r'route-map.*$'),
- re.compile(r'policy-map.*$'),
- re.compile(r'((class-map match-(all|any))|(class\s)).*$'),
- re.compile(r'captive-portal.*$'),
- re.compile(r'admin-profile.*$'),
- re.compile(r'link-dependency group.*$'),
- re.compile(r'banner motd.*$'),
- re.compile(r'openflow.*$'),
- re.compile(r'support-assist.*$'),
- re.compile(r'template.*$'),
- re.compile(r'address-family.*$'),
- re.compile(r'spanning-tree mst configuration.*$'),
- re.compile(r'logging (?!.*(cli-command|buffered|console|email|facility|file|monitor|protocol|snmp|source-interface|traps|web-session)).*$'),
- re.compile(r'(radius-server|tacacs-server) host.*$'),
- re.compile(r'radius server (auth|acct).*$'),
- re.compile(r'aaa server radius dynamic-author.*$')]
-
- childline = re.compile(r'^exit$')
- config = list()
- parent = list()
- children = []
- parent_match = False
- for line in str(lines).split('\n'):
- text = str(re.sub(r'([{};])', '', line)).strip()
- cfg = ConfigLine(text)
- cfg.raw = line
- if not text or ignore_line(text, comment_tokens):
- continue
-
- else:
- parent_match = False
- # handle sublevel parent
- for pr in sublevel_cmds:
- if pr.match(line):
- if len(parent) != 0:
- cfg._parents.extend(parent)
- parent.append(cfg)
- config.append(cfg)
- if children:
- children.insert(len(parent) - 1, [])
- children[len(parent) - 2].append(cfg)
- parent_match = True
- continue
- # handle exit
- if childline.match(line):
- if children:
- parent[len(children) - 1]._children.extend(children[len(children) - 1])
- if len(children) > 1:
- parent[len(children) - 2]._children.extend(parent[len(children) - 1]._children)
- cfg._parents.extend(parent)
- children.pop()
- parent.pop()
- if not children:
- children = list()
- if parent:
- cfg._parents.extend(parent)
- parent = list()
- config.append(cfg)
- # handle sublevel children
- elif parent_match is False and len(parent) > 0:
- if not children:
- cfglist = [cfg]
- children.append(cfglist)
- else:
- children[len(parent) - 1].append(cfg)
- cfg._parents.extend(parent)
- config.append(cfg)
- # handle global commands
- elif not parent:
- config.append(cfg)
- return config
-
-
-class Dellos6NetworkConfig(NetworkConfig):
-
- def load(self, contents):
- self._items = os6_parse(contents, self._indent)
-
- def _diff_line(self, other, path=None):
- diff = list()
- for item in self.items:
- if str(item) == "exit":
- for diff_item in diff:
- if diff_item._parents:
- if item._parents == diff_item._parents:
- diff.append(item)
- break
- else:
- diff.append(item)
- break
- elif item not in other:
- diff.append(item)
- return diff