From 14b0ab63aceaa401794bc06b4d3210e7397bb7a2 Mon Sep 17 00:00:00 2001 From: Ansible Core Team Date: Mon, 9 Mar 2020 09:40:34 +0000 Subject: Migrated to arista.eos --- .../eos/argspec/acl_interfaces/acl_interfaces.py | 88 -- .../module_utils/network/eos/argspec/acls/acls.py | 468 ------- .../network/eos/argspec/facts/facts.py | 22 - .../network/eos/argspec/interfaces/interfaces.py | 50 - .../eos/argspec/l2_interfaces/l2_interfaces.py | 50 - .../eos/argspec/l3_interfaces/l3_interfaces.py | 53 - .../module_utils/network/eos/argspec/lacp/lacp.py | 51 - .../eos/argspec/lacp_interfaces/lacp_interfaces.py | 48 - .../eos/argspec/lag_interfaces/lag_interfaces.py | 55 - .../network/eos/argspec/lldp_global/lldp_global.py | 58 - .../eos/argspec/lldp_interfaces/lldp_interfaces.py | 49 - .../eos/argspec/static_routes/static_routes.py | 115 -- .../network/eos/argspec/vlans/vlans.py | 54 - .../eos/config/acl_interfaces/acl_interfaces.py | 394 ------ .../module_utils/network/eos/config/acls/acls.py | 483 ------- .../network/eos/config/interfaces/interfaces.py | 236 ---- .../eos/config/l2_interfaces/l2_interfaces.py | 250 ---- .../eos/config/l3_interfaces/l3_interfaces.py | 263 ---- .../module_utils/network/eos/config/lacp/lacp.py | 161 --- .../eos/config/lacp_interfaces/lacp_interfaces.py | 214 --- .../eos/config/lag_interfaces/lag_interfaces.py | 225 --- .../network/eos/config/lldp_global/lldp_global.py | 166 --- .../eos/config/lldp_interfaces/lldp_interfaces.py | 216 --- .../eos/config/static_routes/static_routes.py | 390 ------ .../module_utils/network/eos/config/vlans/vlans.py | 224 --- lib/ansible/module_utils/network/eos/eos.py | 630 --------- .../eos/facts/acl_interfaces/acl_interfaces.py | 133 -- .../module_utils/network/eos/facts/acls/acls.py | 300 ---- .../module_utils/network/eos/facts/facts.py | 72 - .../network/eos/facts/interfaces/interfaces.py | 107 -- .../eos/facts/l2_interfaces/l2_interfaces.py | 108 -- .../eos/facts/l3_interfaces/l3_interfaces.py | 101 -- .../module_utils/network/eos/facts/lacp/lacp.py | 89 -- .../eos/facts/lacp_interfaces/lacp_interfaces.py | 90 -- .../eos/facts/lag_interfaces/lag_interfaces.py | 103 -- .../module_utils/network/eos/facts/legacy/base.py | 182 --- .../network/eos/facts/lldp_global/lldp_global.py | 86 -- .../eos/facts/lldp_interfaces/lldp_interfaces.py | 92 -- .../eos/facts/static_routes/static_routes.py | 202 --- .../module_utils/network/eos/facts/vlans/vlans.py | 108 -- .../eos/providers/cli/config/bgp/address_family.py | 129 -- .../eos/providers/cli/config/bgp/neighbors.py | 173 --- .../eos/providers/cli/config/bgp/process.py | 163 --- .../module_utils/network/eos/providers/module.py | 62 - .../network/eos/providers/providers.py | 120 -- .../module_utils/network/eos/utils/utils.py | 54 - lib/ansible/modules/network/eos/_eos_interface.py | 486 ------- .../modules/network/eos/_eos_l2_interface.py | 324 ----- .../modules/network/eos/_eos_l3_interface.py | 302 ---- lib/ansible/modules/network/eos/_eos_linkagg.py | 354 ----- .../modules/network/eos/_eos_static_route.py | 291 ---- lib/ansible/modules/network/eos/_eos_vlan.py | 356 ----- .../modules/network/eos/eos_acl_interfaces.py | 415 ------ lib/ansible/modules/network/eos/eos_acls.py | 925 ------------- lib/ansible/modules/network/eos/eos_banner.py | 199 --- lib/ansible/modules/network/eos/eos_bgp.py | 394 ------ lib/ansible/modules/network/eos/eos_command.py | 248 ---- lib/ansible/modules/network/eos/eos_config.py | 516 ------- lib/ansible/modules/network/eos/eos_eapi.py | 435 ------ lib/ansible/modules/network/eos/eos_facts.py | 208 --- lib/ansible/modules/network/eos/eos_interfaces.py | 298 ---- .../modules/network/eos/eos_l2_interfaces.py | 312 ----- .../modules/network/eos/eos_l3_interfaces.py | 305 ----- lib/ansible/modules/network/eos/eos_lacp.py | 178 --- .../modules/network/eos/eos_lacp_interfaces.py | 254 ---- .../modules/network/eos/eos_lag_interfaces.py | 251 ---- lib/ansible/modules/network/eos/eos_lldp.py | 114 -- lib/ansible/modules/network/eos/eos_lldp_global.py | 246 ---- .../modules/network/eos/eos_lldp_interfaces.py | 252 ---- lib/ansible/modules/network/eos/eos_logging.py | 412 ------ .../modules/network/eos/eos_static_routes.py | 1444 -------------------- lib/ansible/modules/network/eos/eos_system.py | 339 ----- lib/ansible/modules/network/eos/eos_user.py | 400 ------ lib/ansible/modules/network/eos/eos_vlans.py | 240 ---- lib/ansible/modules/network/eos/eos_vrf.py | 348 ----- lib/ansible/plugins/action/eos.py | 134 -- lib/ansible/plugins/cliconf/eos.py | 306 ----- lib/ansible/plugins/doc_fragments/eos.py | 115 -- lib/ansible/plugins/httpapi/eos.py | 171 --- lib/ansible/plugins/terminal/eos.py | 92 -- 80 files changed, 19151 deletions(-) delete mode 100644 lib/ansible/module_utils/network/eos/argspec/acl_interfaces/acl_interfaces.py delete mode 100644 lib/ansible/module_utils/network/eos/argspec/acls/acls.py delete mode 100644 lib/ansible/module_utils/network/eos/argspec/facts/facts.py delete mode 100644 lib/ansible/module_utils/network/eos/argspec/interfaces/interfaces.py delete mode 100644 lib/ansible/module_utils/network/eos/argspec/l2_interfaces/l2_interfaces.py delete mode 100644 lib/ansible/module_utils/network/eos/argspec/l3_interfaces/l3_interfaces.py delete mode 100644 lib/ansible/module_utils/network/eos/argspec/lacp/lacp.py delete mode 100644 lib/ansible/module_utils/network/eos/argspec/lacp_interfaces/lacp_interfaces.py delete mode 100644 lib/ansible/module_utils/network/eos/argspec/lag_interfaces/lag_interfaces.py delete mode 100644 lib/ansible/module_utils/network/eos/argspec/lldp_global/lldp_global.py delete mode 100644 lib/ansible/module_utils/network/eos/argspec/lldp_interfaces/lldp_interfaces.py delete mode 100644 lib/ansible/module_utils/network/eos/argspec/static_routes/static_routes.py delete mode 100644 lib/ansible/module_utils/network/eos/argspec/vlans/vlans.py delete mode 100644 lib/ansible/module_utils/network/eos/config/acl_interfaces/acl_interfaces.py delete mode 100644 lib/ansible/module_utils/network/eos/config/acls/acls.py delete mode 100644 lib/ansible/module_utils/network/eos/config/interfaces/interfaces.py delete mode 100644 lib/ansible/module_utils/network/eos/config/l2_interfaces/l2_interfaces.py delete mode 100644 lib/ansible/module_utils/network/eos/config/l3_interfaces/l3_interfaces.py delete mode 100644 lib/ansible/module_utils/network/eos/config/lacp/lacp.py delete mode 100644 lib/ansible/module_utils/network/eos/config/lacp_interfaces/lacp_interfaces.py delete mode 100644 lib/ansible/module_utils/network/eos/config/lag_interfaces/lag_interfaces.py delete mode 100644 lib/ansible/module_utils/network/eos/config/lldp_global/lldp_global.py delete mode 100644 lib/ansible/module_utils/network/eos/config/lldp_interfaces/lldp_interfaces.py delete mode 100644 lib/ansible/module_utils/network/eos/config/static_routes/static_routes.py delete mode 100644 lib/ansible/module_utils/network/eos/config/vlans/vlans.py delete mode 100644 lib/ansible/module_utils/network/eos/eos.py delete mode 100644 lib/ansible/module_utils/network/eos/facts/acl_interfaces/acl_interfaces.py delete mode 100644 lib/ansible/module_utils/network/eos/facts/acls/acls.py delete mode 100644 lib/ansible/module_utils/network/eos/facts/facts.py delete mode 100644 lib/ansible/module_utils/network/eos/facts/interfaces/interfaces.py delete mode 100644 lib/ansible/module_utils/network/eos/facts/l2_interfaces/l2_interfaces.py delete mode 100644 lib/ansible/module_utils/network/eos/facts/l3_interfaces/l3_interfaces.py delete mode 100644 lib/ansible/module_utils/network/eos/facts/lacp/lacp.py delete mode 100644 lib/ansible/module_utils/network/eos/facts/lacp_interfaces/lacp_interfaces.py delete mode 100644 lib/ansible/module_utils/network/eos/facts/lag_interfaces/lag_interfaces.py delete mode 100644 lib/ansible/module_utils/network/eos/facts/legacy/base.py delete mode 100644 lib/ansible/module_utils/network/eos/facts/lldp_global/lldp_global.py delete mode 100644 lib/ansible/module_utils/network/eos/facts/lldp_interfaces/lldp_interfaces.py delete mode 100644 lib/ansible/module_utils/network/eos/facts/static_routes/static_routes.py delete mode 100644 lib/ansible/module_utils/network/eos/facts/vlans/vlans.py delete mode 100644 lib/ansible/module_utils/network/eos/providers/cli/config/bgp/address_family.py delete mode 100644 lib/ansible/module_utils/network/eos/providers/cli/config/bgp/neighbors.py delete mode 100644 lib/ansible/module_utils/network/eos/providers/cli/config/bgp/process.py delete mode 100644 lib/ansible/module_utils/network/eos/providers/module.py delete mode 100644 lib/ansible/module_utils/network/eos/providers/providers.py delete mode 100644 lib/ansible/module_utils/network/eos/utils/utils.py delete mode 100644 lib/ansible/modules/network/eos/_eos_interface.py delete mode 100644 lib/ansible/modules/network/eos/_eos_l2_interface.py delete mode 100644 lib/ansible/modules/network/eos/_eos_l3_interface.py delete mode 100644 lib/ansible/modules/network/eos/_eos_linkagg.py delete mode 100644 lib/ansible/modules/network/eos/_eos_static_route.py delete mode 100644 lib/ansible/modules/network/eos/_eos_vlan.py delete mode 100644 lib/ansible/modules/network/eos/eos_acl_interfaces.py delete mode 100644 lib/ansible/modules/network/eos/eos_acls.py delete mode 100644 lib/ansible/modules/network/eos/eos_banner.py delete mode 100644 lib/ansible/modules/network/eos/eos_bgp.py delete mode 100644 lib/ansible/modules/network/eos/eos_command.py delete mode 100644 lib/ansible/modules/network/eos/eos_config.py delete mode 100644 lib/ansible/modules/network/eos/eos_eapi.py delete mode 100644 lib/ansible/modules/network/eos/eos_facts.py delete mode 100644 lib/ansible/modules/network/eos/eos_interfaces.py delete mode 100644 lib/ansible/modules/network/eos/eos_l2_interfaces.py delete mode 100644 lib/ansible/modules/network/eos/eos_l3_interfaces.py delete mode 100644 lib/ansible/modules/network/eos/eos_lacp.py delete mode 100644 lib/ansible/modules/network/eos/eos_lacp_interfaces.py delete mode 100644 lib/ansible/modules/network/eos/eos_lag_interfaces.py delete mode 100644 lib/ansible/modules/network/eos/eos_lldp.py delete mode 100644 lib/ansible/modules/network/eos/eos_lldp_global.py delete mode 100644 lib/ansible/modules/network/eos/eos_lldp_interfaces.py delete mode 100644 lib/ansible/modules/network/eos/eos_logging.py delete mode 100644 lib/ansible/modules/network/eos/eos_static_routes.py delete mode 100644 lib/ansible/modules/network/eos/eos_system.py delete mode 100644 lib/ansible/modules/network/eos/eos_user.py delete mode 100644 lib/ansible/modules/network/eos/eos_vlans.py delete mode 100644 lib/ansible/modules/network/eos/eos_vrf.py delete mode 100644 lib/ansible/plugins/action/eos.py delete mode 100644 lib/ansible/plugins/cliconf/eos.py delete mode 100644 lib/ansible/plugins/doc_fragments/eos.py delete mode 100644 lib/ansible/plugins/httpapi/eos.py delete mode 100644 lib/ansible/plugins/terminal/eos.py (limited to 'lib') diff --git a/lib/ansible/module_utils/network/eos/argspec/acl_interfaces/acl_interfaces.py b/lib/ansible/module_utils/network/eos/argspec/acl_interfaces/acl_interfaces.py deleted file mode 100644 index 7e1409a7d9..0000000000 --- a/lib/ansible/module_utils/network/eos/argspec/acl_interfaces/acl_interfaces.py +++ /dev/null @@ -1,88 +0,0 @@ -# -# -*- coding: utf-8 -*- -# Copyright 2019 Red Hat -# GNU General Public License v3.0+ -# (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt) - -############################################# -# WARNING # -############################################# -# -# This file is auto generated by the resource -# module builder playbook. -# -# Do not edit this file manually. -# -# Changes to this file will be over written -# by the resource module builder. -# -# Changes should be made in the model used to -# generate this file or in the resource module -# builder template. -# -############################################# -""" -The arg spec for the eos_acl_interfaces module -""" - -from __future__ import (absolute_import, division, print_function) -__metaclass__ = type - - -class Acl_interfacesArgs(object): # pylint: disable=R0903 - """The arg spec for the eos_acl_interfaces module - """ - def __init__(self, **kwargs): - pass - - argument_spec = { - 'config': { - 'elements': 'dict', - 'options': { - 'access_groups': { - 'elements': 'dict', - 'options': { - 'acls': { - 'elements': 'dict', - 'options': { - 'direction': { - 'required': True, - 'choices': ['in', 'out'], - 'type': 'str' - }, - 'name': { - 'required': True, - 'type': 'str' - } - }, - 'type': 'list' - }, - 'afi': { - 'required': True, - 'choices': ['ipv4', 'ipv6'], - 'type': 'str' - } - }, - 'type': 'list' - }, - 'name': { - 'required': True, - 'type': 'str' - } - }, - 'type': 'list' - }, - 'running_config': { - 'type': 'str' - }, - 'state': { - 'choices': [ - 'merged', 'replaced', 'overridden', 'deleted', 'gathered', - 'parsed', 'rendered' - ], - 'default': - 'merged', - 'type': - 'str' - } - } # pylint: disable=C0301 diff --git a/lib/ansible/module_utils/network/eos/argspec/acls/acls.py b/lib/ansible/module_utils/network/eos/argspec/acls/acls.py deleted file mode 100644 index f998982404..0000000000 --- a/lib/ansible/module_utils/network/eos/argspec/acls/acls.py +++ /dev/null @@ -1,468 +0,0 @@ -# -# -*- coding: utf-8 -*- -# Copyright 2019 Red Hat -# GNU General Public License v3.0+ -# (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt) - -############################################# -# WARNING # -############################################# -# -# This file is auto generated by the resource -# module builder playbook. -# -# Do not edit this file manually. -# -# Changes to this file will be over written -# by the resource module builder. -# -# Changes should be made in the model used to -# generate this file or in the resource module -# builder template. -# -############################################# -""" -The arg spec for the eos_acls module -""" - -from __future__ import (absolute_import, division, print_function) -__metaclass__ = type - - -class AclsArgs(object): # pylint: disable=R0903 - """The arg spec for the eos_acls module - """ - def __init__(self, **kwargs): - pass - - argument_spec = { - 'config': { - 'elements': 'dict', - 'options': { - 'acls': { - 'elements': 'dict', - 'options': { - 'aces': { - 'elements': 'dict', - 'options': { - 'destination': { - 'mutually_exclusive': - [['address', 'subnet_address', 'any', 'host'], - ['wildcard_bits', 'subnet_address', 'any', 'host']], - 'options': { - 'address': { - 'type': 'str' - }, - 'any': { - 'type': 'bool' - }, - 'host': { - 'type': 'str' - }, - 'port_protocol': { - 'type': 'dict' - }, - 'subnet_address': { - 'type': 'str' - }, - 'wildcard_bits': { - 'type': 'str' - } - }, - 'required_together': - [['address', 'wildcard_bits']], - 'type': - 'dict' - }, - 'fragment_rules': { - 'type': 'bool' - }, - 'fragments': { - 'type': 'bool' - }, - 'grant': { - 'choices': ['permit', 'deny'], - 'type': 'str' - }, - 'line': { - 'type': 'str', - 'aliases': ['ace'] - }, - 'hop_limit': { - 'type': 'dict' - }, - 'log': { - 'type': 'bool' - }, - 'protocol': { - 'type': 'str' - }, - 'protocol_options': { - 'options': { - 'icmp': { - 'options': { - 'administratively_prohibited': - { - 'type': 'bool' - }, - 'alternate_address': { - 'type': 'bool' - }, - 'conversion_error': { - 'type': 'bool' - }, - 'dod_host_prohibited': { - 'type': 'bool' - }, - 'dod_net_prohibited': { - 'type': 'bool' - }, - 'echo': { - 'type': 'bool' - }, - 'echo_reply': { - 'type': 'bool' - }, - 'general_parameter_problem': { - 'type': 'bool' - }, - 'host_isolated': { - 'type': 'bool' - }, - 'host_precedence_unreachable': - { - 'type': 'bool' - }, - 'host_redirect': { - 'type': 'bool' - }, - 'host_tos_redirect': { - 'type': 'bool' - }, - 'host_tos_unreachable': { - 'type': 'bool' - }, - 'host_unknown': { - 'type': 'bool' - }, - 'host_unreachable': { - 'type': 'bool' - }, - 'information_reply': { - 'type': 'bool' - }, - 'information_request': { - 'type': 'bool' - }, - 'mask_reply': { - 'type': 'bool' - }, - 'mask_request': { - 'type': 'bool' - }, - 'message_code': { - 'type': 'int' - }, - 'message_num': { - 'type': 'int' - }, - 'message_type': { - 'type': 'int' - }, - 'mobile_redirect': { - 'type': 'bool' - }, - 'net_redirect': { - 'type': 'bool' - }, - 'net_tos_redirect': { - 'type': 'bool' - }, - 'net_tos_unreachable': { - 'type': 'bool' - }, - 'net_unreachable': { - 'type': 'bool' - }, - 'network_unknown': { - 'type': 'bool' - }, - 'no_room_for_option': { - 'type': 'bool' - }, - 'option_missing': { - 'type': 'bool' - }, - 'packet_too_big': { - 'type': 'bool' - }, - 'parameter_problem': { - 'type': 'bool' - }, - 'port_unreachable': { - 'type': 'bool' - }, - 'precedence_unreachable': { - 'type': 'bool' - }, - 'protocol_unreachable': { - 'type': 'bool' - }, - 'reassembly_timeout': { - 'type': 'bool' - }, - 'redirect': { - 'type': 'bool' - }, - 'router_advertisement': { - 'type': 'bool' - }, - 'router_solicitation': { - 'type': 'bool' - }, - 'source_quench': { - 'type': 'bool' - }, - 'source_route_failed': { - 'type': 'bool' - }, - 'time_exceeded': { - 'type': 'bool' - }, - 'timestamp_reply': { - 'type': 'bool' - }, - 'timestamp_request': { - 'type': 'bool' - }, - 'traceroute': { - 'type': 'bool' - }, - 'ttl_exceeded': { - 'type': 'bool' - }, - 'unreachable': { - 'type': 'bool' - } - }, - 'type': 'dict' - }, - 'icmpv6': { - 'options': { - 'address_unreachable': { - 'type': 'bool' - }, - 'beyond_scope': { - 'type': 'bool' - }, - 'echo_reply': { - 'type': 'bool' - }, - 'echo_request': { - 'type': 'bool' - }, - 'erroneous_header': { - 'type': 'bool' - }, - 'fragment_reassembly_exceeded': - { - 'type': 'bool' - }, - 'hop_limit_exceeded': { - 'type': 'bool' - }, - 'neighbor_advertisement': { - 'type': 'bool' - }, - 'neighbor_solicitation': { - 'type': 'bool' - }, - 'no_admin': { - 'type': 'bool' - }, - 'no_route': { - 'type': 'bool' - }, - 'packet_too_big': { - 'type': 'bool' - }, - 'parameter_problem': { - 'type': 'bool' - }, - 'port_unreachable': { - 'type': 'bool' - }, - 'redirect_message': { - 'type': 'bool' - }, - 'reject_route': { - 'type': 'bool' - }, - 'router_advertisement': { - 'type': 'bool' - }, - 'router_solicitation': { - 'type': 'bool' - }, - 'source_address_failed': { - 'type': 'bool' - }, - 'source_routing_error': { - 'type': 'bool' - }, - 'time_exceeded': { - 'type': 'bool' - }, - 'unreachable': { - 'type': 'bool' - }, - 'unrecognized_ipv6_option': { - 'type': 'bool' - }, - 'unrecognized_next_header': { - 'type': 'bool' - } - }, - 'type': 'dict' - }, - 'ip': { - 'options': { - 'nexthop_group': { - 'type': 'str' - } - }, - 'type': 'dict' - }, - 'ipv6': { - 'options': { - 'nexthop_group': { - 'type': 'str' - } - }, - 'type': 'dict' - }, - 'tcp': { - 'options': { - 'flags': { - 'options': { - 'ack': { - 'type': 'bool' - }, - 'established': { - 'type': 'bool' - }, - 'fin': { - 'type': 'bool' - }, - 'psh': { - 'type': 'bool' - }, - 'rst': { - 'type': 'bool' - }, - 'syn': { - 'type': 'bool' - }, - 'urg': { - 'type': 'bool' - } - }, - 'type': 'dict' - } - }, - 'type': 'dict' - } - }, - 'type': 'dict' - }, - 'remark': { - 'type': 'str' - }, - 'sequence': { - 'type': 'int' - }, - 'source': { - 'mutually_exclusive': - [['address', 'subnet_address', 'any', 'host'], - ['wildcard_bits', 'subnet_address', 'any', 'host']], - 'options': { - 'address': { - 'type': 'str' - }, - 'any': { - 'type': 'bool' - }, - 'host': { - 'type': 'str' - }, - 'port_protocol': { - 'type': 'dict' - }, - 'subnet_address': { - 'type': 'str' - }, - 'wildcard_bits': { - 'type': 'str' - } - }, - 'required_together': [['address', 'wildcard_bits']], - 'type': 'dict' - }, - 'tracked': { - 'type': 'bool' - }, - 'ttl': { - 'options': { - 'eq': { - 'type': 'int' - }, - 'gt': { - 'type': 'int' - }, - 'lt': { - 'type': 'int' - }, - 'neq': { - 'type': 'int' - } - }, - 'type': 'dict' - }, - 'vlan': { - 'type': 'str' - } - }, - 'type': 'list' - }, - 'name': { - 'required': True, - 'type': 'str' - }, - 'standard': { - 'type': 'bool' - } - }, - 'type': 'list' - }, - 'afi': { - 'choices': ['ipv4', 'ipv6'], - 'required': True, - 'type': 'str' - } - }, - 'type': 'list' - }, - 'running_config': { - 'type': 'str' - }, - 'state': { - 'choices': [ - 'deleted', 'merged', 'overridden', 'replaced', 'gathered', - 'rendered', 'parsed' - ], - 'default': - 'merged', - 'type': - 'str' - } - } # pylint: disable=C0301 diff --git a/lib/ansible/module_utils/network/eos/argspec/facts/facts.py b/lib/ansible/module_utils/network/eos/argspec/facts/facts.py deleted file mode 100644 index 79446b03be..0000000000 --- a/lib/ansible/module_utils/network/eos/argspec/facts/facts.py +++ /dev/null @@ -1,22 +0,0 @@ -# -*- coding: utf-8 -*- -# Copyright 2019 Red Hat -# GNU General Public License v3.0+ (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt) -""" -The arg spec for the eos facts module. -""" - -from __future__ import (absolute_import, division, print_function) -__metaclass__ = type - - -class FactsArgs(object): - """ The arg spec for the eos facts module - """ - - def __init__(self, **kwargs): - pass - - argument_spec = { - 'gather_subset': dict(default=['!config'], type='list'), - 'gather_network_resources': dict(type='list'), - } diff --git a/lib/ansible/module_utils/network/eos/argspec/interfaces/interfaces.py b/lib/ansible/module_utils/network/eos/argspec/interfaces/interfaces.py deleted file mode 100644 index 880e5126e7..0000000000 --- a/lib/ansible/module_utils/network/eos/argspec/interfaces/interfaces.py +++ /dev/null @@ -1,50 +0,0 @@ -# -*- coding: utf-8 -*- -# Copyright 2019 Red Hat -# GNU General Public License v3.0+ (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt) - -############################################## -# WARNING # -############################################## -# -# This file is auto generated by the resource -# module builder playbook. -# -# Do not edit this file manually. -# -# Changes to this file will be over written -# by the resource module builder. -# -# Changes should be made in the model used to -# generate this file or in the resource module -# builder template. -# -############################################## - -""" -The arg spec for the eos_interfaces module -""" - -from __future__ import (absolute_import, division, print_function) -__metaclass__ = type - - -class InterfacesArgs(object): - """The arg spec for the eos_interfaces module - """ - - def __init__(self, **kwargs): - pass - - argument_spec = { - 'config': { - 'options': { - 'name': {'required': True, 'type': 'str'}, - 'description': {'required': False, 'type': 'str'}, - 'enabled': {'default': True, 'required': False, 'type': 'bool'}, - 'mtu': {'required': False, 'type': 'int'}, - 'speed': {'required': False, 'type': 'str'}, - 'duplex': {'required': False, 'type': 'str'} - }, - 'type': 'list'}, - 'state': {'default': 'merged', 'choices': ['merged', 'replaced', 'overridden', 'deleted'], 'required': False, 'type': 'str'} - } diff --git a/lib/ansible/module_utils/network/eos/argspec/l2_interfaces/l2_interfaces.py b/lib/ansible/module_utils/network/eos/argspec/l2_interfaces/l2_interfaces.py deleted file mode 100644 index e9b9a5be19..0000000000 --- a/lib/ansible/module_utils/network/eos/argspec/l2_interfaces/l2_interfaces.py +++ /dev/null @@ -1,50 +0,0 @@ -# -*- coding: utf-8 -*- -# Copyright 2019 Red Hat -# GNU General Public License v3.0+ (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt) - -############################################## -# WARNING # -############################################## -# -# This file is auto generated by the resource -# module builder playbook. -# -# Do not edit this file manually. -# -# Changes to this file will be over written -# by the resource module builder. -# -# Changes should be made in the model used to -# generate this file or in the resource module -# builder template. -# -############################################## - -""" -The arg spec for the eos_l2_interfaces module -""" - -from __future__ import (absolute_import, division, print_function) -__metaclass__ = type - - -class L2_interfacesArgs(object): - """The arg spec for the eos_l2_interfaces module - """ - - def __init__(self, **kwargs): - pass - - argument_spec = { - 'config': { - 'elements': 'dict', - 'options': { - 'access': {'options': {'vlan': {'type': 'int'}}, - 'type': 'dict'}, - 'mode': {'type': 'str', 'choices': ['access', 'trunk']}, - 'name': {'required': True, 'type': 'str'}, - 'trunk': {'options': {'native_vlan': {'type': 'int'}, 'trunk_allowed_vlans': {'type': 'list'}}, - 'type': 'dict'}}, - 'type': 'list'}, - 'state': {'default': 'merged', 'choices': ['merged', 'replaced', 'overridden', 'deleted'], 'required': False, 'type': 'str'} - } diff --git a/lib/ansible/module_utils/network/eos/argspec/l3_interfaces/l3_interfaces.py b/lib/ansible/module_utils/network/eos/argspec/l3_interfaces/l3_interfaces.py deleted file mode 100644 index 2708b47c42..0000000000 --- a/lib/ansible/module_utils/network/eos/argspec/l3_interfaces/l3_interfaces.py +++ /dev/null @@ -1,53 +0,0 @@ -# -*- coding: utf-8 -*- -# Copyright 2019 Red Hat -# GNU General Public License v3.0+ -# (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt) - -############################################# -# WARNING # -############################################# -# -# This file is auto generated by the resource -# module builder playbook. -# -# Do not edit this file manually. -# -# Changes to this file will be over written -# by the resource module builder. -# -# Changes should be made in the model used to -# generate this file or in the resource module -# builder template. -# -############################################# - -""" -The arg spec for the eos_l3_interfaces module -""" - -from __future__ import (absolute_import, division, print_function) -__metaclass__ = type - - -class L3_interfacesArgs(object): - """The arg spec for the eos_l3_interfaces module - """ - - def __init__(self, **kwargs): - pass - - argument_spec = { - 'config': { - 'elements': 'dict', - 'options': { - 'name': {'required': True, 'type': 'str'}, - 'ipv4': {'elements': 'dict', - 'options': {'address': {'type': 'str'}, 'secondary': {'type': 'bool'}}, - 'type': 'list'}, - 'ipv6': {'elements': 'dict', - 'options': {'address': {'type': 'str'}}, - 'type': 'list'}, - }, - 'type': 'list'}, - 'state': {'default': 'merged', 'choices': ['merged', 'replaced', 'overridden', 'deleted'], 'type': 'str'} - } diff --git a/lib/ansible/module_utils/network/eos/argspec/lacp/lacp.py b/lib/ansible/module_utils/network/eos/argspec/lacp/lacp.py deleted file mode 100644 index b0862a222e..0000000000 --- a/lib/ansible/module_utils/network/eos/argspec/lacp/lacp.py +++ /dev/null @@ -1,51 +0,0 @@ -# -*- coding: utf-8 -*- -# Copyright 2019 Red Hat -# GNU General Public License v3.0+ -# (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt) - -############################################# -# WARNING # -############################################# -# -# This file is auto generated by the resource -# module builder playbook. -# -# Do not edit this file manually. -# -# Changes to this file will be over written -# by the resource module builder. -# -# Changes should be made in the model used to -# generate this file or in the resource module -# builder template. -# -############################################# - -""" -The arg spec for the eos_lacp module -""" - -from __future__ import (absolute_import, division, print_function) -__metaclass__ = type - - -class LacpArgs(object): - """The arg spec for the eos_lacp module - """ - - def __init__(self, **kwargs): - pass - - argument_spec = { - 'config': { - 'options': { - 'system': { - 'options': { - 'priority': {'type': 'int'} - }, - 'type': 'dict' - } - }, - 'type': 'dict' - }, - 'state': {'choices': ['merged', 'replaced', 'deleted'], 'default': 'merged', 'type': 'str'}} diff --git a/lib/ansible/module_utils/network/eos/argspec/lacp_interfaces/lacp_interfaces.py b/lib/ansible/module_utils/network/eos/argspec/lacp_interfaces/lacp_interfaces.py deleted file mode 100644 index bbe20867f0..0000000000 --- a/lib/ansible/module_utils/network/eos/argspec/lacp_interfaces/lacp_interfaces.py +++ /dev/null @@ -1,48 +0,0 @@ -# -# -*- coding: utf-8 -*- -# Copyright 2019 Red Hat -# GNU General Public License v3.0+ -# (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt) - -############################################# -# WARNING # -############################################# -# -# This file is auto generated by the resource -# module builder playbook. -# -# Do not edit this file manually. -# -# Changes to this file will be over written -# by the resource module builder. -# -# Changes should be made in the model used to -# generate this file or in the resource module -# builder template. -# -############################################# - -""" -The arg spec for the eos_lacp_interfaces module -""" - -from __future__ import (absolute_import, division, print_function) -__metaclass__ = type - - -class Lacp_interfacesArgs(object): - """The arg spec for the eos_lacp_interfaces module - """ - - def __init__(self, **kwargs): - pass - - argument_spec = { - 'config': {'elements': 'dict', - 'options': {'name': {'type': 'str'}, - 'port_priority': {'type': 'int'}, - 'rate': {'choices': ['fast', 'normal'], 'type': 'str'}}, - 'type': 'list'}, - 'state': {'choices': ['merged', 'replaced', 'overridden', 'deleted'], - 'default': 'merged', - 'type': 'str'}} diff --git a/lib/ansible/module_utils/network/eos/argspec/lag_interfaces/lag_interfaces.py b/lib/ansible/module_utils/network/eos/argspec/lag_interfaces/lag_interfaces.py deleted file mode 100644 index ff672ffb93..0000000000 --- a/lib/ansible/module_utils/network/eos/argspec/lag_interfaces/lag_interfaces.py +++ /dev/null @@ -1,55 +0,0 @@ -# -*- coding: utf-8 -*- -# Copyright 2019 Red Hat -# GNU General Public License v3.0+ -# (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt) - -############################################# -# WARNING # -############################################# -# -# This file is auto generated by the resource -# module builder playbook. -# -# Do not edit this file manually. -# -# Changes to this file will be over written -# by the resource module builder. -# -# Changes should be made in the model used to -# generate this file or in the resource module -# builder template. -# -############################################# - -""" -The arg spec for the eos_lag_interfaces module -""" - -from __future__ import (absolute_import, division, print_function) -__metaclass__ = type - - -class Lag_interfacesArgs(object): - """The arg spec for the eos_lag_interfaces module - """ - - def __init__(self, **kwargs): - pass - - argument_spec = { - 'config': { - 'elements': 'dict', - 'options': { - 'name': {'required': True, 'type': 'str'}, - 'members': { - 'elements': 'dict', - 'options': { - 'member': {'type': 'str'}, - 'mode': {'choices': ['active', 'on', 'passive'], 'type': 'str'}, - }, - 'type': 'list', - }, - }, - 'type': 'list'}, - 'state': {'default': 'merged', 'choices': ['merged', 'replaced', 'overridden', 'deleted'], 'type': 'str'} - } diff --git a/lib/ansible/module_utils/network/eos/argspec/lldp_global/lldp_global.py b/lib/ansible/module_utils/network/eos/argspec/lldp_global/lldp_global.py deleted file mode 100644 index 2dc3e0cf58..0000000000 --- a/lib/ansible/module_utils/network/eos/argspec/lldp_global/lldp_global.py +++ /dev/null @@ -1,58 +0,0 @@ -# -# -*- coding: utf-8 -*- -# Copyright 2019 Red Hat -# GNU General Public License v3.0+ -# (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt) - -############################################# -# WARNING # -############################################# -# -# This file is auto generated by the resource -# module builder playbook. -# -# Do not edit this file manually. -# -# Changes to this file will be over written -# by the resource module builder. -# -# Changes should be made in the model used to -# generate this file or in the resource module -# builder template. -# -############################################# - -""" -The arg spec for the eos_lldp_global module -""" - -from __future__ import (absolute_import, division, print_function) -__metaclass__ = type - - -class Lldp_globalArgs(object): - """The arg spec for the eos_lldp_global module - """ - - def __init__(self, **kwargs): - pass - - argument_spec = { - 'config': { - 'options': { - 'holdtime': {'type': 'int'}, - 'reinit': {'type': 'int'}, - 'timer': {'type': 'int'}, - 'tlv_select': { - 'options': { - 'link_aggregation': {'type': 'bool'}, - 'management_address': {'type': 'bool'}, - 'max_frame_size': {'type': 'bool'}, - 'port_description': {'type': 'bool'}, - 'system_capabilities': {'type': 'bool'}, - 'system_description': {'type': 'bool'}, - 'system_name': {'type': 'bool'}}, - 'type': 'dict'}}, - 'type': 'dict'}, - 'state': {'choices': ['merged', 'replaced', 'deleted'], 'default': 'merged', 'type': 'str'} - } diff --git a/lib/ansible/module_utils/network/eos/argspec/lldp_interfaces/lldp_interfaces.py b/lib/ansible/module_utils/network/eos/argspec/lldp_interfaces/lldp_interfaces.py deleted file mode 100644 index 2cdc866891..0000000000 --- a/lib/ansible/module_utils/network/eos/argspec/lldp_interfaces/lldp_interfaces.py +++ /dev/null @@ -1,49 +0,0 @@ -# -# -*- coding: utf-8 -*- -# Copyright 2019 Red Hat -# GNU General Public License v3.0+ -# (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt) - -############################################# -# WARNING # -############################################# -# -# This file is auto generated by the resource -# module builder playbook. -# -# Do not edit this file manually. -# -# Changes to this file will be over written -# by the resource module builder. -# -# Changes should be made in the model used to -# generate this file or in the resource module -# builder template. -# -############################################# - -""" -The arg spec for the eos_lldp_interfaces module -""" - -from __future__ import (absolute_import, division, print_function) -__metaclass__ = type - - -class Lldp_interfacesArgs(object): - """The arg spec for the eos_lldp_interfaces module - """ - - def __init__(self, **kwargs): - pass - - argument_spec = { - 'config': { - 'elements': 'dict', - 'options': {'name': {'type': 'str'}, - 'receive': {'type': 'bool'}, - 'transmit': {'type': 'bool'}}, - 'type': 'list'}, - 'state': {'choices': ['merged', 'replaced', 'overridden', 'deleted'], - 'default': 'merged', - 'type': 'str'}} diff --git a/lib/ansible/module_utils/network/eos/argspec/static_routes/static_routes.py b/lib/ansible/module_utils/network/eos/argspec/static_routes/static_routes.py deleted file mode 100644 index f4b9277b1e..0000000000 --- a/lib/ansible/module_utils/network/eos/argspec/static_routes/static_routes.py +++ /dev/null @@ -1,115 +0,0 @@ -# -# -*- coding: utf-8 -*- -# Copyright 2019 Red Hat -# GNU General Public License v3.0+ -# (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt) - -############################################# -# WARNING # -############################################# -# -# This file is auto generated by the resource -# module builder playbook. -# -# Do not edit this file manually. -# -# Changes to this file will be over written -# by the resource module builder. -# -# Changes should be made in the model used to -# generate this file or in the resource module -# builder template. -# -############################################# -""" -The arg spec for the eos_static_routes module -""" - -from __future__ import (absolute_import, division, print_function) -__metaclass__ = type - - -class Static_routesArgs(object): - """The arg spec for the eos_static_routes module - """ - def __init__(self, **kwargs): - pass - - argument_spec = { - 'config': { - 'elements': 'dict', - 'options': { - 'address_families': { - 'elements': 'dict', - 'options': { - 'afi': { - 'choices': ['ipv4', 'ipv6'], - 'required': True, - 'type': 'str' - }, - 'routes': { - 'elements': 'dict', - 'options': { - 'dest': { - 'required': True, - 'type': 'str' - }, - 'next_hops': { - 'elements': 'dict', - 'options': { - 'admin_distance': { - 'type': 'int' - }, - 'description': { - 'type': 'str' - }, - 'forward_router_address': { - 'type': 'str' - }, - 'interface': { - 'type': 'str' - }, - 'nexthop_grp': { - 'type': 'str' - }, - 'mpls_label': { - 'type': 'int' - }, - 'tag': { - 'type': 'int' - }, - 'track': { - 'type': 'str' - }, - 'vrf': { - 'type': 'str' - } - }, - 'type': 'list' - } - }, - 'type': 'list' - } - }, - 'type': 'list' - }, - 'vrf': { - 'type': 'str' - } - }, - 'type': 'list' - }, - 'running_config': { - 'type': 'str' - }, - 'state': { - 'choices': [ - 'deleted', 'merged', 'overridden', 'replaced', 'gathered', - 'rendered', 'parsed' - ], - 'default': - 'merged', - 'type': - 'str' - } - } # pylint: disable=C0301 diff --git a/lib/ansible/module_utils/network/eos/argspec/vlans/vlans.py b/lib/ansible/module_utils/network/eos/argspec/vlans/vlans.py deleted file mode 100644 index ea2211ca3d..0000000000 --- a/lib/ansible/module_utils/network/eos/argspec/vlans/vlans.py +++ /dev/null @@ -1,54 +0,0 @@ -# -*- coding: utf-8 -*- -# Copyright 2019 Red Hat -# GNU General Public License v3.0+ -# (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt) - -############################################# -# WARNING # -############################################# -# -# This file is auto generated by the resource -# module builder playbook. -# -# Do not edit this file manually. -# -# Changes to this file will be over written -# by the resource module builder. -# -# Changes should be made in the model used to -# generate this file or in the resource module -# builder template. -# -############################################# - -""" -The arg spec for the eos_vlans module -""" - -from __future__ import (absolute_import, division, print_function) -__metaclass__ = type - - -class VlansArgs(object): - """The arg spec for the eos_vlans module - """ - - def __init__(self, **kwargs): - pass - - argument_spec = { - 'config': { - 'elements': 'dict', - 'options': { - 'vlan_id': {'required': True, 'type': 'int'}, - 'name': {'type': 'str'}, - 'state': {'choices': ['active', 'suspend'], 'type': 'str'}, - }, - 'type': 'list', - }, - 'state': { - 'choices': ['merged', 'replaced', 'overridden', 'deleted'], - 'default': 'merged', - 'type': 'str', - }, - } diff --git a/lib/ansible/module_utils/network/eos/config/acl_interfaces/acl_interfaces.py b/lib/ansible/module_utils/network/eos/config/acl_interfaces/acl_interfaces.py deleted file mode 100644 index c3eb56ace2..0000000000 --- a/lib/ansible/module_utils/network/eos/config/acl_interfaces/acl_interfaces.py +++ /dev/null @@ -1,394 +0,0 @@ -# -# -*- coding: utf-8 -*- -# Copyright 2019 Red Hat -# GNU General Public License v3.0+ -# (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt) -""" -The eos_acl_interfaces class -It is in this file where the current configuration (as dict) -is compared to the provided configuration (as dict) and the command set -necessary to bring the current configuration to it's desired end-state is -created -""" - -from __future__ import (absolute_import, division, print_function) -__metaclass__ = type - -import itertools - -from ansible.module_utils.network.common.cfg.base import ConfigBase -from ansible.module_utils.network.common.utils import to_list, search_obj_in_list -from ansible.module_utils.network.eos.facts.facts import Facts - - -class Acl_interfaces(ConfigBase): - """ - The eos_acl_interfaces class - """ - - gather_subset = [ - '!all', - '!min', - ] - - gather_network_resources = [ - 'acl_interfaces', - ] - - def __init__(self, module): - super(Acl_interfaces, self).__init__(module) - - def get_acl_interfaces_facts(self, data=None): - """ Get the 'facts' (the current configuration) - - :rtype: A dictionary - :returns: The current configuration as a dictionary - """ - facts, _warnings = Facts(self._module).get_facts(self.gather_subset, self.gather_network_resources, data=data) - acl_interfaces_facts = facts['ansible_network_resources'].get('acl_interfaces') - if not acl_interfaces_facts: - return [] - return acl_interfaces_facts - - def execute_module(self): - """ Execute the module - - :rtype: A dictionary - :returns: The result from module execution - """ - result = {'changed': False} - warnings = list() - commands = list() - changed = False - - if self.state in self.ACTION_STATES: - existing_acl_interfaces_facts = self.get_acl_interfaces_facts() - else: - existing_acl_interfaces_facts = [] - if self.state in self.ACTION_STATES or self.state == 'rendered': - commands.extend(self.set_config(existing_acl_interfaces_facts)) - if commands and self.state in self.ACTION_STATES: - if not self._module.check_mode: - self._connection.edit_config(commands) - changed = True - if changed: - result['changed'] = True - if self.state in self.ACTION_STATES: - result['commands'] = commands - if self.state in self.ACTION_STATES or self.state == 'gathered': - changed_acl_interfaces_facts = self.get_acl_interfaces_facts() - elif self.state == 'rendered': - result['rendered'] = commands - elif self.state == 'parsed': - if not self._module.params['running_config']: - self._module.fail_json(msg="Value of running_config parameter must not be empty for state parsed") - result['parsed'] = self.get_acl_interfaces_facts(data=self._module.params['running_config']) - else: - changed_acl_interfaces_facts = [] - if self.state in self.ACTION_STATES: - result['before'] = existing_acl_interfaces_facts - if result['changed']: - result['after'] = changed_acl_interfaces_facts - elif self.state == 'gathered': - result['gathered'] = changed_acl_interfaces_facts - - result['warnings'] = warnings - return result - - def set_config(self, existing_acl_interfaces_facts): - """ Collect the configuration from the args passed to the module, - collect the current configuration (as a dict from facts) - - :rtype: A list - :returns: the commands necessary to migrate the current configuration - to the desired configuration - """ - want = self._module.params['config'] - have = existing_acl_interfaces_facts - resp = self.set_state(want, have) - return to_list(resp) - - def set_state(self, want, have): - """ Select the appropriate function based on the state provided - - :param want: the desired configuration as a dictionary - :param have: the current configuration as a dictionary - :rtype: A list - :returns: the commands necessary to migrate the current configuration - to the desired configuration - """ - commands = [] - if self.state in ('merged', 'replaced', 'overridden') and not want: - self._module.fail_json(msg='value of config parameter must not be empty for state {0}'.format(self.state)) - state = self._module.params['state'] - if state == 'overridden': - commands = self._state_overridden(want, have) - elif state == 'deleted': - commands = self._state_deleted(want, have) - elif state == 'merged' or self.state == 'rendered': - commands = self._state_merged(want, have) - elif state == 'replaced': - commands = self._state_replaced(want, have) - return commands - - def _state_replaced(self, want, have): - """ The command generator when state is replaced - - :rtype: A list - :returns: the commands necessary to migrate the current configuration - to the desired configuration - """ - commandset = [] - want_interface = [] - for w in want: - commands = [] - diff_access_group = [] - want_interface.append(w['name']) - obj_in_have = search_obj_in_list(w['name'], have, 'name') - if not obj_in_have or 'access_groups' not in obj_in_have.keys(): - commands.append(add_commands(w['access_groups'], w['name'])) - else: - if 'access_groups' in obj_in_have.keys(): - obj = self.get_acl_diff(obj_in_have, w) - if obj[0]: - to_delete = {'access_groups': [{'acls': obj[0], 'afi': 'ipv4'}]} - commands.append(remove_commands(to_delete, w['name'])) - if obj[1]: - to_delete = {'access_groups': [{'acls': obj[1], 'afi': 'ipv6'}]} - commands.append(remove_commands(to_delete, w['name'])) - diff = self.get_acl_diff(w, obj_in_have) - if diff[0]: - diff_access_group.append({'afi': 'ipv4', 'acls': diff[0]}) - if diff[1]: - diff_access_group.append({'afi': 'ipv6', 'acls': diff[1]}) - if diff_access_group: - commands.append(add_commands(diff_access_group, w['name'])) - if commands: - intf_command = ["interface " + w['name']] - commands = list(itertools.chain(*commands)) - commandset.append(intf_command) - commandset.append(commands) - - if commandset: - commandset = list(itertools.chain(*commandset)) - return commandset - - def _state_overridden(self, want, have): - """ The command generator when state is overridden - - :rtype: A list - :returns: the commands necessary to migrate the current configuration - to the desired configuration - """ - commandset = [] - want_interface = [] - for w in want: - commands = [] - diff_access_group = [] - want_interface.append(w['name']) - obj_in_have = search_obj_in_list(w['name'], have, 'name') - if not obj_in_have or 'access_groups' not in obj_in_have.keys(): - commands.append(add_commands(w['access_groups'], w['name'])) - else: - if 'access_groups' in obj_in_have.keys(): - obj = self.get_acl_diff(obj_in_have, w) - if obj[0]: - to_delete = {'access_groups': [{'acls': obj[0], 'afi': 'ipv4'}]} - commands.append(remove_commands(to_delete, w['name'])) - if obj[1]: - to_delete = {'access_groups': [{'acls': obj[1], 'afi': 'ipv6'}]} - commands.append(remove_commands(to_delete, w['name'])) - diff = self.get_acl_diff(w, obj_in_have) - if diff[0]: - diff_access_group.append({'afi': 'ipv4', 'acls': diff[0]}) - if diff[1]: - diff_access_group.append({'afi': 'ipv6', 'acls': diff[1]}) - if diff_access_group: - commands.append(add_commands(diff_access_group, w['name'])) - if commands: - intf_command = ["interface " + w['name']] - commands = list(itertools.chain(*commands)) - commandset.append(intf_command) - commandset.append(commands) - for h in have: - commands = [] - if 'access_groups' in h.keys() and h['access_groups']: - if h['name'] not in want_interface: - for h_group in h['access_groups']: - to_delete = {'access_groups': [h_group]} - commands.append(remove_commands(to_delete, h['name'])) - if commands: - intf_command = ["interface " + h['name']] - commands = list(itertools.chain(*commands)) - commandset.append(intf_command) - commandset.append(commands) - - if commandset: - commandset = list(itertools.chain(*commandset)) - - return commandset - - def _state_merged(self, want, have): - """ The command generator when state is merged - - :rtype: A list - :returns: the commands necessary to merge the provided into - the current configuration - """ - commandset = [] - for w in want: - commands = [] - diff_access_group = [] - obj_in_have = search_obj_in_list(w['name'], have, 'name') - if not obj_in_have: - commands = add_commands(w['access_groups'], w['name']) - else: - if 'access_groups' in obj_in_have.keys(): - diff = self.get_acl_diff(w, obj_in_have) - if diff[0]: - diff_access_group.append({'afi': 'ipv4', 'acls': diff[0]}) - if diff[1]: - diff_access_group.append({'afi': 'ipv6', 'acls': diff[1]}) - if diff_access_group: - commands = add_commands(diff_access_group, w['name']) - else: - commands = add_commands(w['access_groups'], w['name']) - if commands: - intf_command = ["interface " + w['name']] - commandset.append(intf_command) - commandset.append(commands) - if commandset: - commandset = list(itertools.chain(*commandset)) - return commandset - - def _state_deleted(self, want, have): - """ The command generator when state is deleted - - :rtype: A list - :returns: the commands necessary to remove the current configuration - of the provided objects - """ - commandset = [] - for w in want: - commands = [] - intf_command = ["interface " + w['name']] - obj_in_have = search_obj_in_list(w['name'], have, 'name') - if 'access_groups' not in w.keys() or not w['access_groups']: - commands = remove_commands(obj_in_have, w['name']) - if w['access_groups']: - for w_grp in w['access_groups']: - if 'acls' not in w_grp.keys() or not w_grp['acls']: - obj = self.get_acls_from_afi(w['name'], w_grp['afi'], have) - to_delete = {'access_groups': [{'acls': obj, 'afi': w_grp['afi']}]} - commands = remove_commands(to_delete, w['name']) - else: - if 'access_groups' not in obj_in_have.keys() or not obj_in_have['access_groups']: - continue - group = {'access_groups': [w_grp]} - obj = self.get_acl_diff(group, obj_in_have, True) - if obj[0]: - to_delete = {'access_groups': [{'acls': obj[0], 'afi': 'ipv4'}]} - commands.append(remove_commands(to_delete, w['name'])) - if obj[1]: - to_delete = {'access_groups': [{'acls': obj[1], 'afi': 'ipv6'}]} - commands.append(remove_commands(to_delete, w['name'])) - if commands: - commands = list(itertools.chain(*commands)) - if commands: - commandset.append(intf_command) - commandset.append(commands) - - if commandset: - commandset = list(itertools.chain(*commandset)) - return commandset - - def get_acl_diff(self, w, h, intersection=False): - diff_v4 = [] - diff_v6 = [] - w_acls_v4 = [] - w_acls_v6 = [] - h_acls_v4 = [] - h_acls_v6 = [] - for w_group in w['access_groups']: - if w_group['afi'] == 'ipv4': - w_acls_v4 = w_group['acls'] - if w_group['afi'] == 'ipv6': - w_acls_v6 = w_group['acls'] - for h_group in h['access_groups']: - if h_group['afi'] == 'ipv4': - h_acls_v4 = h_group['acls'] - if h_group['afi'] == 'ipv6': - h_acls_v6 = h_group['acls'] - for item in w_acls_v4: - match = list(filter(lambda x: x['name'] == item['name'], h_acls_v4)) - if match: - if item['direction'] == match[0]['direction']: - if intersection: - diff_v4.append(item) - else: - if not intersection: - diff_v4.append(item) - else: - if not intersection: - diff_v4.append(item) - for item in w_acls_v6: - match = list(filter(lambda x: x['name'] == item['name'], h_acls_v6)) - if match: - if item['direction'] == match[0]['direction']: - if intersection: - diff_v6.append(item) - else: - if not intersection: - diff_v6.append(item) - else: - if not intersection: - diff_v6.append(item) - return diff_v4, diff_v6 - - def get_acls_from_afi(self, interface, afi, have): - config = [] - for h in have: - if h['name'] == interface: - if 'access_groups' not in h.keys() or not h['access_groups']: - continue - if h['access_groups']: - for h_grp in h['access_groups']: - if h_grp['afi'] == afi: - config = h_grp['acls'] - return config - - -def add_commands(want, interface): - commands = [] - - for w in want: - # This module was verified on an ios device since vEOS doesnot support - # acl_interfaces cnfiguration. In ios, ipv6 acl is configured as - # traffic-filter and in eos it is access-group - - # a_cmd = "traffic-filter" if w['afi'] == 'ipv6' else "access-group" - a_cmd = "access-group" - afi = 'ip' if w['afi'] == 'ipv4' else w['afi'] - if 'acls' in w.keys(): - for acl in w['acls']: - commands.append(afi + " " + a_cmd + " " + acl['name'] + " " + acl['direction']) - return commands - - -def remove_commands(want, interface): - commands = [] - if 'access_groups' not in want.keys() or not want['access_groups']: - return commands - for w in want['access_groups']: - # This module was verified on an ios device since vEOS doesnot support - # acl_interfaces cnfiguration. In ios, ipv6 acl is configured as - # traffic-filter and in eos it is access-group - - # a_cmd = "traffic-filter" if w['afi'] == 'ipv6' else "access-group" - a_cmd = "access-group" - - afi = 'ip' if w['afi'] == 'ipv4' else w['afi'] - if 'acls' in w.keys(): - for acl in w['acls']: - commands.append("no " + afi + " " + a_cmd + " " + acl['name'] + " " + acl['direction']) - return commands diff --git a/lib/ansible/module_utils/network/eos/config/acls/acls.py b/lib/ansible/module_utils/network/eos/config/acls/acls.py deleted file mode 100644 index 90fee80b04..0000000000 --- a/lib/ansible/module_utils/network/eos/config/acls/acls.py +++ /dev/null @@ -1,483 +0,0 @@ -# -# -*- coding: utf-8 -*- -# Copyright 2019 Red Hat -# GNU General Public License v3.0+ -# (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt) -""" -The eos_acls class -It is in this file where the current configuration (as dict) -is compared to the provided configuration (as dict) and the command set -necessary to bring the current configuration to it's desired end-state is -created -""" - -from __future__ import (absolute_import, division, print_function) -__metaclass__ = type - -import socket -import re -import itertools - -from ansible.module_utils.network.common.cfg.base import ConfigBase -from ansible.module_utils.network.common.utils import to_list -from ansible.module_utils.network.common.utils import remove_empties, dict_diff -from ansible.module_utils.network.eos.facts.facts import Facts - - -class Acls(ConfigBase): - """ - The eos_acls class - """ - - gather_subset = [ - '!all', - '!min', - ] - - gather_network_resources = [ - 'acls', - ] - - def __init__(self, module): - super(Acls, self).__init__(module) - - def get_acls_facts(self, data=None): - """ Get the 'facts' (the current configuration) - - :rtype: A dictionary - :returns: The current configuration as a dictionary - """ - facts, _warnings = Facts(self._module).get_facts(self.gather_subset, self.gather_network_resources, data=data) - acls_facts = facts['ansible_network_resources'].get('acls') - if not acls_facts: - return [] - return acls_facts - - def execute_module(self): - """ Execute the module - - :rtype: A dictionary - :returns: The result from module execution - """ - result = {'changed': False} - warnings = list() - commands = list() - changed = False - - if self.state in self.ACTION_STATES: - existing_acls_facts = self.get_acls_facts() - else: - existing_acls_facts = [] - if self.state in self.ACTION_STATES or self.state == 'rendered': - commands.extend(self.set_config(existing_acls_facts)) - if commands and self.state in self.ACTION_STATES: - if not self._module.check_mode: - self._connection.edit_config(commands) - changed = True - if changed: - result['changed'] = True - if self.state in self.ACTION_STATES: - result['commands'] = commands - if self.state in self.ACTION_STATES or self.state == 'gathered': - changed_acls_facts = self.get_acls_facts() - elif self.state == 'rendered': - commands = list(itertools.chain(*commands)) - result['rendered'] = commands - elif self.state == 'parsed': - if not self._module.params['running_config']: - self._module.fail_json(msg="Value of running_config parameter must not be empty for state parsed") - result['parsed'] = self.get_acls_facts(data=self._module.params['running_config']) - else: - changed_acls_facts = [] - if self.state in self.ACTION_STATES: - result['before'] = existing_acls_facts - if result['changed']: - result['after'] = changed_acls_facts - elif self.state == 'gathered': - result['gathered'] = changed_acls_facts - - result['warnings'] = warnings - return result - - def set_config(self, existing_acls_facts): - """ Collect the configuration from the args passed to the module, - collect the current configuration (as a dict from facts) - - :rtype: A list - :returns: the commands necessary to migrate the current configuration - to the desired configuration - """ - config = self._module.params.get('config') - want = [] - onbox_configs = [] - for h in existing_acls_facts: - have_configs = add_commands(remove_empties(h)) - onbox_configs.append(have_configs) - if config: - for w in config: - want.append(remove_empties(w)) - have = existing_acls_facts - resp = self.set_state(want, have) - if self.state == 'merged': - to_config = self.compare_configs(onbox_configs, to_list(resp)) - else: - to_config = resp - return to_config - - def compare_configs(self, have, want): - commands = [] - want = list(itertools.chain(*want)) - have = list(itertools.chain(*have)) - h_index = 0 - config = list(want) - for w in want: - access_list = re.findall(r'(ip.*) access-list (.*)', w) - if access_list: - if w in have: - h_index = have.index(w) - else: - for num, h in enumerate(have, start=h_index + 1): - if "access-list" not in h: - seq_num = re.search(r'(\d+) (.*)', w) - if seq_num: - have_seq_num = re.search(r'(\d+) (.*)', h) - if seq_num.group(1) == have_seq_num.group(1) and have_seq_num.group(2) != seq_num.group(2): - negate_cmd = "no " + seq_num.group(1) - config.insert(config.index(w), negate_cmd) - if w in h: - config.pop(config.index(w)) - break - for c in config: - access_list = re.findall(r'(ip.*) access-list (.*)', c) - if access_list: - acl_index = config.index(c) - else: - if config[acl_index] not in commands: - commands.append(config[acl_index]) - commands.append(c) - return commands - - def set_state(self, want, have): - """ Select the appropriate function based on the state provided - - :param want: the desired configuration as a dictionary - :param have: the current configuration as a dictionary - :rtype: A list - :returns: the commands necessary to migrate the current configuration - to the desired configuration - """ - commands = [] - if self.state in ('merged', 'replaced', 'overridden', 'rendered') and not want: - self._module.fail_json(msg='value of config parameter must not be empty for state {0}'.format(self.state)) - state = self._module.params['state'] - if state == 'overridden': - commands = self._state_overridden(want, have) - elif state == 'deleted': - commands = self._state_deleted(want, have) - elif state == 'merged' or self.state == 'rendered': - commands = self._state_merged(want, have) - elif state == 'replaced': - commands = self._state_replaced(want, have) - return commands - - @staticmethod - def _state_replaced(want, have): - """ The command generator when state is replaced - - :rtype: A list - :returns: the commands necessary to migrate the current configuration - to the desired configuration - """ - commands = [] - have_commands = [] - remove_cmds = [] - diff = {} - present = False - diff_present = False - for w in want: - afi = "ipv6" if w["afi"] == "ipv6" else "ipv4" - for acl in w["acls"]: - name = acl["name"] - want_ace = acl["aces"] - for h in have: - if h["afi"] == afi: - for h_acl in h["acls"]: - if h_acl["name"] == name: - present = True - h = {"afi": afi, "acls": [{"name": name}]} - for h_ace in h_acl['aces']: - diff = get_ace_diff(h_ace, want_ace) - if diff: - diff_present = True - h = {"afi": afi, "acls": [{"name": name, "aces": [h_ace]}]} - remove_cmds.append(del_commands(h, have)) - if diff_present or not present: - config_cmds = set_commands(want, have) - config_cmds = list(itertools.chain(*config_cmds)) - for cmd in have: - have_configs = add_commands(cmd) - have_commands.append(have_configs) - have_commands = list(itertools.chain(*have_commands)) - if remove_cmds: - remove_cmds = list(itertools.chain(*remove_cmds)) - commands.append(remove_cmds) - commands.append(config_cmds) - commands = list(itertools.chain(*commands)) - commandset = [] - [commandset.append(cmd) for cmd in commands if cmd not in commandset] - return commandset - - @staticmethod - def _state_overridden(want, have): - """ The command generator when state is overridden - - :rtype: A list - :returns: the commands necessary to migrate the current configuration - to the desired configuration - """ - commands = [] - ace_diff = {} - h_afi_list = [] - w_afi_list = [] - diff = False - for h in have: - h_afi_list.append(h["afi"]) - for w in want: - w_afi_list.append(w["afi"]) - for hafi in h_afi_list: - if hafi not in w_afi_list: - h = {"afi": hafi} - remove_cmds = del_commands(h, have) - commands.append(remove_cmds) - for w in want: - w_names = [] - for h in have: - h_names = [] - if w["afi"] == h["afi"]: - for w_acl in w["acls"]: - w_names.append(w_acl["name"]) - for h_acl in h["acls"]: - h_names.append(h_acl["name"]) - if h_acl["name"] == w_acl["name"]: - for w_ace in w_acl['aces']: - ace_diff = get_ace_diff(w_ace, h_acl["aces"]) - if ace_diff: - diff = True - h = {"afi": h["afi"], "acls": [{"name": h_acl["name"], "aces": h_acl["aces"]}]} - remove_cmds = del_commands(h, have) - commands.append(remove_cmds) - for hname in h_names: - if hname not in w_names: - h = {"afi": h["afi"], "acls": [{"name": hname}]} - remove_cmds = del_commands(h, have) - if remove_cmds not in commands: - commands.append(remove_cmds) - - if diff: - config_cmds = set_commands(want, have) - config_cmds = list(itertools.chain(*config_cmds)) - commands.append(config_cmds) - if commands: - commands = list(itertools.chain(*commands)) - return commands - - @staticmethod - def _state_merged(want, have): - """ The command generator when state is merged - - :rtype: A list - :returns: the commands necessary to merge the provided into - the current configuration - """ - return set_commands(want, have) - - @staticmethod - def _state_deleted(want, have): - """ The command generator when state is deleted - - :rtype: A list - :returns: the commands necessary to remove the current configuration - of the provided objects - """ - commands = [] - if not want: - for h in have: - return_command = add_commands(h) - for command in return_command: - command = "no " + command - commands.append(command) - else: - for w in want: - return_command = del_commands(w, have) - commands.append(return_command) - commands = list(itertools.chain(*commands)) - return commands - - -def set_commands(want, have): - commands = [] - for w in want: - wace_updated = [] - for h in have: - if w['afi'] == h['afi']: - for wacl in w["acls"]: - for hacl in h["acls"]: - if wacl['name'] == hacl['name']: - want_aces = wacl['aces'] - for wace in wacl['aces']: - for hace in hacl['aces']: - if 'sequence' in wace.keys() and 'sequence' in hace.keys(): - if wace['sequence'] == hace['sequence']: - wace_updated = get_updated_ace(wace, hace) - if wace_updated: - want_aces.pop(want_aces.index(wace)) - want_aces.append(wace_updated) - return_command = add_commands(w) - commands.append(return_command) - return commands - - -def get_updated_ace(w, h): - # gives the ace to be updated in case of merge update. - w_updated = w.copy() - for hkey in h.keys(): - if hkey not in w.keys(): - w_updated.update({hkey: h[hkey]}) - else: - w_updated.update({hkey: w[hkey]}) - return w_updated - - -def add_commands(want): - commandset = [] - protocol_name = {"51": "ahp", "47": "gre", "1": "icmp", "2": "igmp", - "4": "ip", "89": "ospf", "103": "pim", "6": "tcp", - "17": "udp", "112": "vrrp"} - if not want: - return commandset - command = "" - afi = "ip" if want["afi"] == "ipv4" else "ipv6" - for acl in want["acls"]: - if "standard" in acl.keys() and acl["standard"]: - command = afi + " access-list standard " + acl["name"] - else: - command = afi + " access-list " + acl["name"] - commandset.append(command) - if "aces" not in acl.keys(): - continue - for ace in acl["aces"]: - command = "" - if "sequence" in ace.keys(): - command = str(ace["sequence"]) - if "remark" in ace.keys(): - command = command + " remark " + ace["remark"] - if "fragment_rules" in ace.keys() and ace["fragment_rules"]: - command = command + " fragment-rules" - if "grant" in ace.keys(): - command = command + " " + ace["grant"] - if "vlan" in ace.keys(): - command = command + " vlan " + ace["vlan"] - if "protocol" in ace.keys(): - protocol = ace["protocol"] - if protocol.isdigit(): - if protocol in protocol_name.keys(): - protocol = protocol_name[protocol] - command = command + " " + protocol - if "source" in ace.keys(): - if "any" in ace["source"].keys(): - command = command + " any" - elif "subnet_address" in ace["source"].keys(): - command = command + " " + ace["source"]["subnet_address"] - elif "host" in ace["source"].keys(): - command = command + " host " + ace["source"]["host"] - elif "address" in ace["source"].keys(): - command = command + " " + ace["source"]["address"] + " " + ace["source"]["wildcard_bits"] - if "port_protocol" in ace["source"].keys(): - for op, val in ace["source"]["port_protocol"].items(): - if val.isdigit(): - val = socket.getservbyport(int(val)) - command = command + " " + op + " " + val - if "destination" in ace.keys(): - if "any" in ace["destination"].keys(): - command = command + " any" - elif "subnet_address" in ace["destination"].keys(): - command = command + " " + ace["destination"]["subnet_address"] - elif "host" in ace["destination"].keys(): - command = command + " host " + ace["destination"]["host"] - elif "address" in ace["destination"].keys(): - command = command + " " + ace["destination"]["address"] + " " + ace["destination"]["wildcard_bits"] - if "port_protocol" in ace["destination"].keys(): - for op in ace["destination"]["port_protocol"].keys(): - command = command + " " + op + " " + ace["destination"]["port_protocol"][op] - if "protocol_options" in ace.keys(): - for proto in ace["protocol_options"].keys(): - if proto == "icmp" or proto == "icmpv6": - for icmp_msg in ace["protocol_options"][proto].keys(): - command = command + " " + icmp_msg - elif proto == "ip" or proto == "ipv6": - command = command + " nexthop-group " + ace["protocol_options"][proto]["nexthop_group"] - elif proto == "tcp": - for flag, val in ace["prtocol_options"][proto]["flags"].items(): - command = command + " " + val - if "hop_limit" in ace.keys(): - for op, val in ace["hop_limit"].items(): - command = command + " hop-limit " + op + " " + val - if "tracked" in ace.keys() and ace["tracked"]: - command = command + " tracked" - if "ttl" in ace.keys(): - for op, val in ace["ttl"].items(): - command = command + " ttl " + op + " " + str(val) - if "fragments" in ace.keys(): - command = command + " fragments" - if "log" in ace.keys(): - command = command + " log" - commandset.append(command.strip()) - return commandset - - -def del_commands(want, have): - commandset = [] - command = "" - have_command = [] - for h in have: - have_configs = add_commands(h) - have_command.append(have_configs) - have_command = list(itertools.chain(*have_command)) - afi = "ip" if want["afi"] == "ipv4" else "ipv6" - if "acls" not in want.keys(): - for have_cmd in have_command: - access_list = re.search(r'(ip.*)\s+access-list .*', have_cmd) - if access_list and access_list.group(1) == afi: - commandset.append("no " + have_cmd) - return commandset - - for acl in want["acls"]: - ace_present = True - if "standard" in acl.keys() and acl["standard"]: - command = afi + " access-list standard " + acl["name"] - else: - command = afi + " access-list " + acl["name"] - if "aces" not in acl.keys(): - ace_present = False - commandset.append("no " + command) - if ace_present: - return_command = add_commands(want) - for cmd in return_command: - if "access-list" in cmd: - commandset.append(cmd) - continue - seq = re.search(r'(\d+) (permit|deny|fragment-rules|remark) .*', cmd) - if seq: - commandset.append("no " + seq.group(1)) - else: - commandset.append("no " + cmd) - return commandset - - -def get_ace_diff(want_ace, have_ace): - # gives the diff of the aces passed. - for h_a in have_ace: - d = dict_diff(want_ace, h_a) - if not d: - break - return d diff --git a/lib/ansible/module_utils/network/eos/config/interfaces/interfaces.py b/lib/ansible/module_utils/network/eos/config/interfaces/interfaces.py deleted file mode 100644 index 7687ae296f..0000000000 --- a/lib/ansible/module_utils/network/eos/config/interfaces/interfaces.py +++ /dev/null @@ -1,236 +0,0 @@ -# -*- coding: utf-8 -*- -# Copyright 2019 Red Hat -# GNU General Public License v3.0+ -# (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt) -""" -The eos_interfaces class -It is in this file where the current configuration (as dict) -is compared to the provided configuration (as dict) and the command set -necessary to bring the current configuration to it's desired end-state is -created -""" - -from __future__ import (absolute_import, division, print_function) -__metaclass__ = type - -from ansible.module_utils.network.common.cfg.base import ConfigBase -from ansible.module_utils.network.common.utils import to_list, dict_diff, param_list_to_dict -from ansible.module_utils.network.eos.facts.facts import Facts -from ansible.module_utils.network.eos.utils.utils import normalize_interface - - -class Interfaces(ConfigBase): - """ - The eos_interfaces class - """ - - gather_subset = [ - '!all', - '!min', - ] - - gather_network_resources = [ - 'interfaces', - ] - - def get_interfaces_facts(self): - """ Get the 'facts' (the current configuration) - - :rtype: A dictionary - :returns: The current configuration as a dictionary - """ - facts, _warnings = Facts(self._module).get_facts(self.gather_subset, self.gather_network_resources) - interfaces_facts = facts['ansible_network_resources'].get('interfaces') - if not interfaces_facts: - return [] - return interfaces_facts - - def execute_module(self): - """ Execute the module - - :rtype: A dictionary - :returns: The result from module execution - """ - result = {'changed': False} - commands = list() - warnings = list() - - existing_interfaces_facts = self.get_interfaces_facts() - commands.extend(self.set_config(existing_interfaces_facts)) - if commands: - if not self._module.check_mode: - self._connection.edit_config(commands) - result['changed'] = True - result['commands'] = commands - - changed_interfaces_facts = self.get_interfaces_facts() - - result['before'] = existing_interfaces_facts - if result['changed']: - result['after'] = changed_interfaces_facts - - result['warnings'] = warnings - return result - - def set_config(self, existing_interfaces_facts): - """ Collect the configuration from the args passed to the module, - collect the current configuration (as a dict from facts) - - :rtype: A list - :returns: the commands necessary to migrate the current configuration - to the desired configuration - """ - want = self._module.params['config'] - have = existing_interfaces_facts - resp = self.set_state(want, have) - return to_list(resp) - - def set_state(self, want, have): - """ Select the appropriate function based on the state provided - - :param want: the desired configuration as a dictionary - :param have: the current configuration as a dictionary - :rtype: A list - :returns: the commands necessary to migrate the current configuration - to the desired configuration - """ - state = self._module.params['state'] - want = param_list_to_dict(want) - have = param_list_to_dict(have) - if state == 'overridden': - commands = self._state_overridden(want, have) - elif state == 'deleted': - commands = self._state_deleted(want, have) - elif state == 'merged': - commands = self._state_merged(want, have) - elif state == 'replaced': - commands = self._state_replaced(want, have) - return commands - - @staticmethod - def _state_replaced(want, have): - """ The command generator when state is replaced - - :rtype: A list - :returns: the commands necessary to migrate the current configuration - to the desired configuration - """ - commands = [] - for key, desired in want.items(): - interface_name = normalize_interface(key) - if interface_name in have: - extant = have[interface_name] - else: - extant = dict() - - add_config = dict_diff(extant, desired) - del_config = dict_diff(desired, extant) - - commands.extend(generate_commands(key, add_config, del_config)) - - return commands - - @staticmethod - def _state_overridden(want, have): - """ The command generator when state is overridden - - :rtype: A list - :returns: the commands necessary to migrate the current configuration - to the desired configuration - """ - commands = [] - for key, extant in have.items(): - if key in want: - desired = want[key] - else: - desired = dict() - - add_config = dict_diff(extant, desired) - del_config = dict_diff(desired, extant) - - commands.extend(generate_commands(key, add_config, del_config)) - - return commands - - @staticmethod - def _state_merged(want, have): - """ The command generator when state is merged - - :rtype: A list - :returns: the commands necessary to merge the provided into - the current configuration - """ - commands = [] - for key, desired in want.items(): - interface_name = normalize_interface(key) - if interface_name in have: - extant = have[interface_name] - else: - extant = dict() - - add_config = dict_diff(extant, desired) - - commands.extend(generate_commands(key, add_config, {})) - - return commands - - @staticmethod - def _state_deleted(want, have): - """ The command generator when state is deleted - - :rtype: A list - :returns: the commands necessary to remove the current configuration - of the provided objects - """ - commands = [] - for key in want: - desired = dict() - if key in have: - extant = have[key] - else: - continue - - del_config = dict_diff(desired, extant) - - commands.extend(generate_commands(key, {}, del_config)) - - return commands - - -def generate_commands(interface, to_set, to_remove): - commands = [] - for key, value in to_set.items(): - if value is None: - continue - - if key == "enabled": - commands.append('{0}shutdown'.format('no ' if value else '')) - elif key == "speed": - if value == "auto": - commands.append("{0} {1}".format(key, value)) - else: - commands.append('speed {0}{1}'.format(value, to_set['duplex'])) - elif key == "duplex": - # duplex is handled with speed - continue - else: - commands.append("{0} {1}".format(key, value)) - - # Don't try to also remove the same key, if present in to_remove - to_remove.pop(key, None) - - for key in to_remove.keys(): - if key == "enabled": - commands.append('no shutdown') - elif key == "speed": - commands.append("speed auto") - elif key == "duplex": - # duplex is handled with speed - continue - else: - commands.append("no {0}".format(key)) - - if commands: - commands.insert(0, "interface {0}".format(interface)) - - return commands diff --git a/lib/ansible/module_utils/network/eos/config/l2_interfaces/l2_interfaces.py b/lib/ansible/module_utils/network/eos/config/l2_interfaces/l2_interfaces.py deleted file mode 100644 index 32e4c62306..0000000000 --- a/lib/ansible/module_utils/network/eos/config/l2_interfaces/l2_interfaces.py +++ /dev/null @@ -1,250 +0,0 @@ -# -*- coding: utf-8 -*- -# Copyright 2019 Red Hat -# GNU General Public License v3.0+ -# (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt) -""" -The eos_l2_interfaces class -It is in this file where the current configuration (as dict) -is compared to the provided configuration (as dict) and the command set -necessary to bring the current configuration to it's desired end-state is -created -""" - -from __future__ import (absolute_import, division, print_function) -__metaclass__ = type - -from ansible.module_utils.network.common.cfg.base import ConfigBase -from ansible.module_utils.network.common.utils import to_list, param_list_to_dict -from ansible.module_utils.network.eos.facts.facts import Facts -from ansible.module_utils.network.eos.utils.utils import normalize_interface - - -class L2_interfaces(ConfigBase): - """ - The eos_l2_interfaces class - """ - - gather_subset = [ - '!all', - '!min', - ] - - gather_network_resources = [ - 'l2_interfaces', - ] - - def get_l2_interfaces_facts(self): - """ Get the 'facts' (the current configuration) - - :rtype: A dictionary - :returns: The current configuration as a dictionary - """ - facts, _warnings = Facts(self._module).get_facts(self.gather_subset, self.gather_network_resources) - l2_interfaces_facts = facts['ansible_network_resources'].get('l2_interfaces') - if not l2_interfaces_facts: - return [] - return l2_interfaces_facts - - def execute_module(self): - """ Execute the module - - :rtype: A dictionary - :returns: The result from module execution - """ - result = {'changed': False} - commands = list() - warnings = list() - - existing_l2_interfaces_facts = self.get_l2_interfaces_facts() - commands.extend(self.set_config(existing_l2_interfaces_facts)) - if commands: - if not self._module.check_mode: - self._connection.edit_config(commands) - result['changed'] = True - result['commands'] = commands - - changed_l2_interfaces_facts = self.get_l2_interfaces_facts() - - result['before'] = existing_l2_interfaces_facts - if result['changed']: - result['after'] = changed_l2_interfaces_facts - - result['warnings'] = warnings - return result - - def set_config(self, existing_l2_interfaces_facts): - """ Collect the configuration from the args passed to the module, - collect the current configuration (as a dict from facts) - - :rtype: A list - :returns: the commands necessary to migrate the current configuration - to the desired configuration - """ - want = self._module.params['config'] - have = existing_l2_interfaces_facts - resp = self.set_state(want, have) - return to_list(resp) - - def set_state(self, want, have): - """ Select the appropriate function based on the state provided - - :param want: the desired configuration as a dictionary - :param have: the current configuration as a dictionary - :rtype: A list - :returns: the commands necessary to migrate the current configuration - to the desired configuration - """ - state = self._module.params['state'] - want = param_list_to_dict(want) - have = param_list_to_dict(have) - if state == 'overridden': - commands = self._state_overridden(want, have) - elif state == 'deleted': - commands = self._state_deleted(want, have) - elif state == 'merged': - commands = self._state_merged(want, have) - elif state == 'replaced': - commands = self._state_replaced(want, have) - return commands - - @staticmethod - def _state_replaced(want, have): - """ The command generator when state is replaced - - :rtype: A list - :returns: the commands necessary to migrate the current configuration - to the desired configuration - """ - commands = [] - for key, desired in want.items(): - interface_name = normalize_interface(key) - if interface_name in have: - extant = have[interface_name] - else: - extant = dict() - - intf_commands = set_interface(desired, extant) - intf_commands.extend(clear_interface(desired, extant)) - - if intf_commands: - commands.append("interface {0}".format(interface_name)) - commands.extend(intf_commands) - - return commands - - @staticmethod - def _state_overridden(want, have): - """ The command generator when state is overridden - - :rtype: A list - :returns: the commands necessary to migrate the current configuration - to the desired configuration - """ - commands = [] - for key, extant in have.items(): - if key in want: - desired = want[key] - else: - desired = dict() - - intf_commands = set_interface(desired, extant) - intf_commands.extend(clear_interface(desired, extant)) - - if intf_commands: - commands.append("interface {0}".format(key)) - commands.extend(intf_commands) - - return commands - - @staticmethod - def _state_merged(want, have): - """ The command generator when state is merged - - :rtype: A list - :returns: the commands necessary to merge the provided into - the current configuration - """ - commands = [] - for key, desired in want.items(): - interface_name = normalize_interface(key) - if interface_name in have: - extant = have[interface_name] - else: - extant = dict() - - intf_commands = set_interface(desired, extant) - - if intf_commands: - commands.append("interface {0}".format(interface_name)) - commands.extend(intf_commands) - - return commands - - @staticmethod - def _state_deleted(want, have): - """ The command generator when state is deleted - - :rtype: A list - :returns: the commands necessary to remove the current configuration - of the provided objects - """ - commands = [] - for key in want: - desired = dict() - if key in have: - extant = have[key] - else: - continue - - intf_commands = clear_interface(desired, extant) - - if intf_commands: - commands.append("interface {0}".format(key)) - commands.extend(intf_commands) - - return commands - - -def set_interface(want, have): - commands = [] - - want_mode = want.get("mode") - if want_mode and want_mode != have.get("mode"): - commands.append("switchport mode {0}".format(want_mode)) - - wants_access = want.get("access") - if wants_access: - access_vlan = wants_access.get("vlan") - if access_vlan and access_vlan != have.get("access", {}).get("vlan"): - commands.append("switchport access vlan {0}".format(access_vlan)) - - wants_trunk = want.get("trunk") - if wants_trunk: - has_trunk = have.get("trunk", {}) - native_vlan = wants_trunk.get("native_vlan") - if native_vlan and native_vlan != has_trunk.get("native_vlan"): - commands.append("switchport trunk native vlan {0}".format(native_vlan)) - - allowed_vlans = want['trunk'].get("trunk_allowed_vlans") - if allowed_vlans: - allowed_vlans = ','.join(allowed_vlans) - commands.append("switchport trunk allowed vlan {0}".format(allowed_vlans)) - return commands - - -def clear_interface(want, have): - commands = [] - - if 'mode' in have and want.get('mode') is None: - commands.append("no switchport mode") - - if "access" in have and not want.get('access'): - commands.append("no switchport access vlan") - - has_trunk = have.get("trunk") or {} - wants_trunk = want.get("trunk") or {} - if "trunk_allowed_vlans" in has_trunk and "trunk_allowed_vlans" not in wants_trunk: - commands.append("no switchport trunk allowed vlan") - if "native_vlan" in has_trunk and "native_vlan" not in wants_trunk: - commands.append("no switchport trunk native vlan") - return commands diff --git a/lib/ansible/module_utils/network/eos/config/l3_interfaces/l3_interfaces.py b/lib/ansible/module_utils/network/eos/config/l3_interfaces/l3_interfaces.py deleted file mode 100644 index d32743fa86..0000000000 --- a/lib/ansible/module_utils/network/eos/config/l3_interfaces/l3_interfaces.py +++ /dev/null @@ -1,263 +0,0 @@ -# -*- coding: utf-8 -*- -# Copyright 2019 Red Hat -# GNU General Public License v3.0+ -# (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt) -""" -The eos_l3_interfaces class -It is in this file where the current configuration (as dict) -is compared to the provided configuration (as dict) and the command set -necessary to bring the current configuration to it's desired end-state is -created -""" - -from __future__ import (absolute_import, division, print_function) -__metaclass__ = type - -from ansible.module_utils.network.common.cfg.base import ConfigBase -from ansible.module_utils.network.common.utils import to_list, param_list_to_dict -from ansible.module_utils.network.eos.facts.facts import Facts -from ansible.module_utils.network.eos.utils.utils import normalize_interface - - -class L3_interfaces(ConfigBase): - """ - The eos_l3_interfaces class - """ - - gather_subset = [ - '!all', - '!min', - ] - - gather_network_resources = [ - 'l3_interfaces', - ] - - def get_l3_interfaces_facts(self): - """ Get the 'facts' (the current configuration) - - :rtype: A dictionary - :returns: The current configuration as a dictionary - """ - facts, _warnings = Facts(self._module).get_facts(self.gather_subset, self.gather_network_resources) - l3_interfaces_facts = facts['ansible_network_resources'].get('l3_interfaces') - if not l3_interfaces_facts: - return [] - return l3_interfaces_facts - - def execute_module(self): - """ Execute the module - - :rtype: A dictionary - :returns: The result from module execution - """ - result = {'changed': False} - commands = list() - warnings = list() - - existing_l3_interfaces_facts = self.get_l3_interfaces_facts() - commands.extend(self.set_config(existing_l3_interfaces_facts)) - if commands: - if not self._module.check_mode: - self._connection.edit_config(commands) - result['changed'] = True - result['commands'] = commands - - changed_l3_interfaces_facts = self.get_l3_interfaces_facts() - - result['before'] = existing_l3_interfaces_facts - if result['changed']: - result['after'] = changed_l3_interfaces_facts - - result['warnings'] = warnings - return result - - def set_config(self, existing_l3_interfaces_facts): - """ Collect the configuration from the args passed to the module, - collect the current configuration (as a dict from facts) - - :rtype: A list - :returns: the commands necessary to migrate the current configuration - to the desired configuration - """ - want = self._module.params['config'] - have = existing_l3_interfaces_facts - resp = self.set_state(want, have) - return to_list(resp) - - def set_state(self, want, have): - """ Select the appropriate function based on the state provided - - :param want: the desired configuration as a dictionary - :param have: the current configuration as a dictionary - :rtype: A list - :returns: the commands necessary to migrate the current configuration - to the desired configuration - """ - state = self._module.params['state'] - want = param_list_to_dict(want) - have = param_list_to_dict(have) - if state == 'overridden': - commands = self._state_overridden(want, have) - elif state == 'deleted': - commands = self._state_deleted(want, have) - elif state == 'merged': - commands = self._state_merged(want, have) - elif state == 'replaced': - commands = self._state_replaced(want, have) - return commands - - @staticmethod - def _state_replaced(want, have): - """ The command generator when state is replaced - - :rtype: A list - :returns: the commands necessary to migrate the current configuration - to the desired configuration - """ - commands = [] - for key, desired in want.items(): - interface_name = normalize_interface(key) - if interface_name in have: - extant = have[interface_name] - else: - extant = dict() - intf_commands = set_interface(desired, extant) - intf_commands.extend(clear_interface(desired, extant)) - - if intf_commands: - commands.append("interface {0}".format(interface_name)) - commands.extend(intf_commands) - - return commands - - @staticmethod - def _state_overridden(want, have): - """ The command generator when state is overridden - - :rtype: A list - :returns: the commands necessary to migrate the current configuration - to the desired configuration - """ - commands = [] - for key, extant in have.items(): - if key in want: - desired = want[key] - else: - desired = dict() - if desired.get("ipv4"): - for ipv4 in desired["ipv4"]: - if ipv4["secondary"] is None: - del ipv4["secondary"] - - intf_commands = set_interface(desired, extant) - intf_commands.extend(clear_interface(desired, extant)) - - if intf_commands: - commands.append("interface {0}".format(key)) - commands.extend(intf_commands) - - return commands - - @staticmethod - def _state_merged(want, have): - """ The command generator when state is merged - - :rtype: A list - :returns: the commands necessary to merge the provided into - the current configuration - """ - commands = [] - for key, desired in want.items(): - interface_name = normalize_interface(key) - if interface_name in have: - extant = have[interface_name] - else: - extant = dict() - - intf_commands = set_interface(desired, extant) - if intf_commands: - commands.append("interface {0}".format(interface_name)) - commands.extend(intf_commands) - - return commands - - @staticmethod - def _state_deleted(want, have): - """ The command generator when state is deleted - - :rtype: A list - :returns: the commands necessary to remove the current configuration - of the provided objects - """ - commands = [] - for key in want: - desired = dict() - if key in have: - extant = have[key] - else: - continue - - intf_commands = clear_interface(desired, extant) - - if intf_commands: - commands.append("interface {0}".format(key)) - commands.extend(intf_commands) - - return commands - - -def set_interface(want, have): - commands = [] - - want_ipv4 = set(tuple(address.items()) for address in want.get("ipv4") or []) - have_ipv4 = set(tuple(address.items()) for address in have.get("ipv4") or []) - for address in want_ipv4 - have_ipv4: - address = dict(address) - if "secondary" in address and not address["secondary"]: - del address["secondary"] - if tuple(address.items()) in have_ipv4: - continue - - address_cmd = "ip address {0}".format(address["address"]) - if address.get("secondary"): - address_cmd += " secondary" - commands.append(address_cmd) - - want_ipv6 = set(tuple(address.items()) for address in want.get("ipv6") or []) - have_ipv6 = set(tuple(address.items()) for address in have.get("ipv6") or []) - for address in want_ipv6 - have_ipv6: - address = dict(address) - commands.append("ipv6 address {0}".format(address["address"])) - return commands - - -def clear_interface(want, have): - commands = [] - - want_ipv4 = set(tuple(address.items()) for address in want.get("ipv4") or []) - have_ipv4 = set(tuple(address.items()) for address in have.get("ipv4") or []) - if not want_ipv4 and have_ipv4: - commands.append("no ip address") - else: - for address in have_ipv4 - want_ipv4: - address = dict(address) - if "secondary" not in address: - address["secondary"] = False - if tuple(address.items()) in want_ipv4: - continue - - if address.get("secondary"): - address_cmd = " {0} secondary".format(address["address"]) - commands.append(address_cmd) - - if "secondary" not in address: - # Removing non-secondary removes all other interfaces - break - - want_ipv6 = set(tuple(address.items()) for address in want.get("ipv6") or []) - have_ipv6 = set(tuple(address.items()) for address in have.get("ipv6") or []) - for address in have_ipv6 - want_ipv6: - address = dict(address) - commands.append("no ipv6 address {0}".format(address["address"])) - return commands diff --git a/lib/ansible/module_utils/network/eos/config/lacp/lacp.py b/lib/ansible/module_utils/network/eos/config/lacp/lacp.py deleted file mode 100644 index 38d368238a..0000000000 --- a/lib/ansible/module_utils/network/eos/config/lacp/lacp.py +++ /dev/null @@ -1,161 +0,0 @@ -# -*- coding: utf-8 -*- -# Copyright 2019 Red Hat -# GNU General Public License v3.0+ -# (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt) -""" -The eos_lacp class -It is in this file where the current configuration (as dict) -is compared to the provided configuration (as dict) and the command set -necessary to bring the current configuration to it's desired end-state is -created -""" - -from __future__ import (absolute_import, division, print_function) -__metaclass__ = type - -from ansible.module_utils.network.common.cfg.base import ConfigBase -from ansible.module_utils.network.common.utils import to_list, dict_diff -from ansible.module_utils.network.eos.facts.facts import Facts - - -class Lacp(ConfigBase): - """ - The eos_lacp class - """ - - gather_subset = [ - '!all', - '!min', - ] - - gather_network_resources = [ - 'lacp', - ] - - def get_lacp_facts(self): - """ Get the 'facts' (the current configuration) - - :rtype: A dictionary - :returns: The current configuration as a dictionary - """ - facts, _warnings = Facts(self._module).get_facts(self.gather_subset, self.gather_network_resources) - lacp_facts = facts['ansible_network_resources'].get('lacp') - if not lacp_facts: - return {} - return lacp_facts - - def execute_module(self): - """ Execute the module - - :rtype: A dictionary - :returns: The result from module execution - """ - result = {'changed': False} - warnings = list() - commands = list() - - existing_lacp_facts = self.get_lacp_facts() - commands.extend(self.set_config(existing_lacp_facts)) - if commands: - if not self._module.check_mode: - self._connection.edit_config(commands) - result['changed'] = True - result['commands'] = commands - - changed_lacp_facts = self.get_lacp_facts() - - result['before'] = existing_lacp_facts - if result['changed']: - result['after'] = changed_lacp_facts - - result['warnings'] = warnings - return result - - def set_config(self, existing_lacp_facts): - """ Collect the configuration from the args passed to the module, - collect the current configuration (as a dict from facts) - - :rtype: A list - :returns: the commands necessary to migrate the current configuration - to the desired configuration - """ - want = self._module.params['config'] or {} - have = existing_lacp_facts - resp = self.set_state(want, have) - return to_list(resp) - - def set_state(self, want, have): - """ Select the appropriate function based on the state provided - - :param want: the desired configuration as a dictionary - :param have: the current configuration as a dictionary - :rtype: A list - :returns: the commands necessary to migrate the current configuration - to the desired configuration - """ - state = self._module.params['state'] - if state == 'deleted': - commands = self._state_deleted(want, have) - elif state == 'merged': - commands = self._state_merged(want, have) - elif state == 'replaced': - commands = self._state_replaced(want, have) - return commands - - @staticmethod - def _state_replaced(want, have): - """ The command generator when state is replaced - - :rtype: A list - :returns: the commands necessary to migrate the current configuration - to the desired configuration - """ - commands = [] - to_set = dict_diff(have, want) - if 'system' in to_set: - system = to_set['system'] - if 'priority' in system: - commands.append('lacp system-priority {0}'.format(system['priority'])) - - to_del = dict_diff(want, have) - if 'system' in to_del: - system = to_del['system'] - system_set = to_set.get('system', {}) - if 'priority' in system and 'priority' not in system_set: - commands.append('no lacp system-priority') - - return commands - - @staticmethod - def _state_merged(want, have): - """ The command generator when state is merged - - :rtype: A list - :returns: the commands necessary to merge the provided into - the current configuration - """ - commands = [] - to_set = dict_diff(have, want) - if 'system' in to_set: - system = to_set['system'] - if 'priority' in system: - commands.append('lacp system-priority {0}'.format(system['priority'])) - - return commands - - @staticmethod - def _state_deleted(want, have): - """ The command generator when state is deleted - - :rtype: A list - :returns: the commands necessary to remove the current configuration - of the provided objects - """ - commands = [] - to_del = dict_diff(want, have) - if 'system' in to_del: - system = to_del['system'] - if 'priority' in system: - commands.append('no lacp system-priority') - - return commands diff --git a/lib/ansible/module_utils/network/eos/config/lacp_interfaces/lacp_interfaces.py b/lib/ansible/module_utils/network/eos/config/lacp_interfaces/lacp_interfaces.py deleted file mode 100644 index ffd2f36676..0000000000 --- a/lib/ansible/module_utils/network/eos/config/lacp_interfaces/lacp_interfaces.py +++ /dev/null @@ -1,214 +0,0 @@ -# -*- coding: utf-8 -*- -# Copyright 2019 Red Hat -# GNU General Public License v3.0+ -# (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt) -""" -The eos_lacp_interfaces class -It is in this file where the current configuration (as dict) -is compared to the provided configuration (as dict) and the command set -necessary to bring the current configuration to it's desired end-state is -created -""" - -from __future__ import (absolute_import, division, print_function) -__metaclass__ = type - -from ansible.module_utils.network.common.cfg.base import ConfigBase -from ansible.module_utils.network.common.utils import to_list, dict_diff, param_list_to_dict -from ansible.module_utils.network.eos.facts.facts import Facts -from ansible.module_utils.network.eos.utils.utils import normalize_interface - - -class Lacp_interfaces(ConfigBase): - """ - The eos_lacp_interfaces class - """ - - gather_subset = [ - '!all', - '!min', - ] - - gather_network_resources = [ - 'lacp_interfaces', - ] - - def get_lacp_interfaces_facts(self): - """ Get the 'facts' (the current configuration) - - :rtype: A dictionary - :returns: The current configuration as a dictionary - """ - facts, _warnings = Facts(self._module).get_facts(self.gather_subset, self.gather_network_resources) - lacp_interfaces_facts = facts['ansible_network_resources'].get('lacp_interfaces') - if not lacp_interfaces_facts: - return [] - return lacp_interfaces_facts - - def execute_module(self): - """ Execute the module - - :rtype: A dictionary - :returns: The result from module execution - """ - result = {'changed': False} - warnings = list() - commands = list() - - existing_lacp_interfaces_facts = self.get_lacp_interfaces_facts() - commands.extend(self.set_config(existing_lacp_interfaces_facts)) - if commands: - if not self._module.check_mode: - self._connection.edit_config(commands) - result['changed'] = True - result['commands'] = commands - - changed_lacp_interfaces_facts = self.get_lacp_interfaces_facts() - - result['before'] = existing_lacp_interfaces_facts - if result['changed']: - result['after'] = changed_lacp_interfaces_facts - - result['warnings'] = warnings - return result - - def set_config(self, existing_lacp_interfaces_facts): - """ Collect the configuration from the args passed to the module, - collect the current configuration (as a dict from facts) - - :rtype: A list - :returns: the commands necessary to migrate the current configuration - to the desired configuration - """ - want = self._module.params['config'] - have = existing_lacp_interfaces_facts - resp = self.set_state(want, have) - return to_list(resp) - - def set_state(self, want, have): - """ Select the appropriate function based on the state provided - - :param want: the desired configuration as a dictionary - :param have: the current configuration as a dictionary - :rtype: A list - :returns: the commands necessary to migrate the current configuration - to the desired configuration - """ - state = self._module.params['state'] - want = param_list_to_dict(want) - have = param_list_to_dict(have) - if state == 'overridden': - commands = self._state_overridden(want, have) - elif state == 'deleted': - commands = self._state_deleted(want, have) - elif state == 'merged': - commands = self._state_merged(want, have) - elif state == 'replaced': - commands = self._state_replaced(want, have) - return commands - - @staticmethod - def _state_replaced(want, have): - """ The command generator when state is replaced - - :rtype: A list - :returns: the commands necessary to migrate the current configuration - to the desired configuration - """ - commands = [] - for key, desired in want.items(): - interface_name = normalize_interface(key) - if interface_name in have: - extant = have[interface_name] - else: - extant = dict() - - add_config = dict_diff(extant, desired) - del_config = dict_diff(desired, extant) - - commands.extend(generate_commands(key, add_config, del_config)) - - return commands - - @staticmethod - def _state_overridden(want, have): - """ The command generator when state is overridden - - :rtype: A list - :returns: the commands necessary to migrate the current configuration - to the desired configuration - """ - commands = [] - for key, extant in have.items(): - if key in want: - desired = want[key] - else: - desired = dict() - - add_config = dict_diff(extant, desired) - del_config = dict_diff(desired, extant) - - commands.extend(generate_commands(key, add_config, del_config)) - - return commands - - @staticmethod - def _state_merged(want, have): - """ The command generator when state is merged - - :rtype: A list - :returns: the commands necessary to merge the provided into - the current configuration - """ - commands = [] - for key, desired in want.items(): - interface_name = normalize_interface(key) - if interface_name in have: - extant = have[interface_name] - else: - extant = dict() - - add_config = dict_diff(extant, desired) - - commands.extend(generate_commands(key, add_config, {})) - - return commands - - @staticmethod - def _state_deleted(want, have): - """ The command generator when state is deleted - - :rtype: A list - :returns: the commands necessary to remove the current configuration - of the provided objects - """ - commands = [] - for key in want: - desired = dict() - if key in have: - extant = have[key] - else: - continue - - del_config = dict_diff(desired, extant) - - commands.extend(generate_commands(key, {}, del_config)) - - return commands - - -def generate_commands(interface, to_set, to_remove): - commands = [] - for key in to_remove.keys(): - commands.append("no lacp {0}".format(key.replace("_", "-"))) - - for key, value in to_set.items(): - if value is None: - continue - - commands.append("lacp {0} {1}".format(key.replace("_", "-"), value)) - - if commands: - commands.insert(0, "interface {0}".format(interface)) - - return commands diff --git a/lib/ansible/module_utils/network/eos/config/lag_interfaces/lag_interfaces.py b/lib/ansible/module_utils/network/eos/config/lag_interfaces/lag_interfaces.py deleted file mode 100644 index f9affa404a..0000000000 --- a/lib/ansible/module_utils/network/eos/config/lag_interfaces/lag_interfaces.py +++ /dev/null @@ -1,225 +0,0 @@ -# -*- coding: utf-8 -*- -# Copyright 2019 Red Hat -# GNU General Public License v3.0+ -# (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt) -""" -The eos_lag_interfaces class -It is in this file where the current configuration (as dict) -is compared to the provided configuration (as dict) and the command set -necessary to bring the current configuration to it's desired end-state is -created -""" - -from __future__ import (absolute_import, division, print_function) -__metaclass__ = type - -from ansible.module_utils.network.common.utils import to_list, dict_diff - -from ansible.module_utils.network.common.cfg.base import ConfigBase -from ansible.module_utils.network.eos.facts.facts import Facts -from ansible.module_utils.network.eos.utils.utils import normalize_interface - - -class Lag_interfaces(ConfigBase): - """ - The eos_lag_interfaces class - """ - - gather_subset = [ - '!all', - '!min', - ] - - gather_network_resources = [ - 'lag_interfaces', - ] - - def get_lag_interfaces_facts(self): - """ Get the 'facts' (the current configuration) - - :rtype: A dictionary - :returns: The current configuration as a dictionary - """ - facts, _warnings = Facts(self._module).get_facts(self.gather_subset, self.gather_network_resources) - lag_interfaces_facts = facts['ansible_network_resources'].get('lag_interfaces') - if not lag_interfaces_facts: - return [] - return lag_interfaces_facts - - def execute_module(self): - """ Execute the module - - :rtype: A dictionary - :returns: The result from module execution - """ - result = {'changed': False} - commands = list() - warnings = list() - - existing_lag_interfaces_facts = self.get_lag_interfaces_facts() - commands.extend(self.set_config(existing_lag_interfaces_facts)) - if commands: - if not self._module.check_mode: - self._connection.edit_config(commands) - result['changed'] = True - result['commands'] = commands - - changed_lag_interfaces_facts = self.get_lag_interfaces_facts() - - result['before'] = existing_lag_interfaces_facts - if result['changed']: - result['after'] = changed_lag_interfaces_facts - - result['warnings'] = warnings - return result - - def set_config(self, existing_lag_interfaces_facts): - """ Collect the configuration from the args passed to the module, - collect the current configuration (as a dict from facts) - - :rtype: A list - :returns: the commands necessary to migrate the current configuration - to the desired configuration - """ - want = self._module.params['config'] - have = existing_lag_interfaces_facts - resp = self.set_state(want, have) - return to_list(resp) - - def set_state(self, want, have): - """ Select the appropriate function based on the state provided - - :param want: the desired configuration as a dictionary - :param have: the current configuration as a dictionary - :rtype: A list - :returns: the commands necessary to migrate the current configuration - to the desired configuration - """ - state = self._module.params['state'] - if state == 'overridden': - commands = self._state_overridden(want, have) - elif state == 'deleted': - commands = self._state_deleted(want, have) - elif state == 'merged': - commands = self._state_merged(want, have) - elif state == 'replaced': - commands = self._state_replaced(want, have) - return commands - - @staticmethod - def _state_replaced(want, have): - """ The command generator when state is replaced - :rtype: A list - :returns: the commands necessary to migrate the current configuration - to the desired configuration - """ - commands = [] - for interface in want: - interface_name = normalize_interface(interface["name"]) - for extant in have: - if extant["name"] == interface_name: - break - else: - extant = dict(name=interface_name) - - commands.extend(set_config(interface, extant)) - commands.extend(remove_config(interface, extant)) - - return commands - - @staticmethod - def _state_overridden(want, have): - """ The command generator when state is overridden - :rtype: A list - :returns: the commands necessary to migrate the current configuration - to the desired configuration - """ - commands = [] - for extant in have: - for interface in want: - if normalize_interface(interface["name"]) == extant["name"]: - break - else: - interface = dict(name=extant["name"]) - commands.extend(remove_config(interface, extant)) - - for interface in want: - interface_name = normalize_interface(interface["name"]) - for extant in have: - if extant["name"] == interface_name: - break - else: - extant = dict(name=interface_name) - commands.extend(set_config(interface, extant)) - - return commands - - @staticmethod - def _state_merged(want, have): - """ The command generator when state is merged - :rtype: A list - :returns: the commands necessary to merge the provided into - the current configuration - """ - commands = [] - for interface in want: - interface_name = normalize_interface(interface["name"]) - for extant in have: - if extant["name"] == interface_name: - break - else: - extant = dict(name=interface_name) - - commands.extend(set_config(interface, extant)) - - return commands - - @staticmethod - def _state_deleted(want, have): - """ The command generator when state is deleted - :rtype: A list - :returns: the commands necessary to remove the current configuration - of the provided objects - """ - commands = [] - for interface in want: - interface_name = normalize_interface(interface["name"]) - for extant in have: - if extant["name"] == interface_name: - break - else: - extant = dict(name=interface_name) - - # Clearing all args, send empty dictionary - interface = dict(name=interface_name) - commands.extend(remove_config(interface, extant)) - - return commands - - -def set_config(want, have): - commands = [] - to_set = dict_diff(have, want) - for member in to_set.get("members", []): - channel_id = want["name"][12:] - commands.extend([ - "interface {0}".format(member["member"]), - "channel-group {0} mode {1}".format(channel_id, member["mode"]), - ]) - - return commands - - -def remove_config(want, have): - commands = [] - if not want.get("members"): - return ["no interface {0}".format(want["name"])] - - to_remove = dict_diff(want, have) - for member in to_remove.get("members", []): - commands.extend([ - "interface {0}".format(member["member"]), - "no channel-group", - ]) - - return commands diff --git a/lib/ansible/module_utils/network/eos/config/lldp_global/lldp_global.py b/lib/ansible/module_utils/network/eos/config/lldp_global/lldp_global.py deleted file mode 100644 index 94f00087c2..0000000000 --- a/lib/ansible/module_utils/network/eos/config/lldp_global/lldp_global.py +++ /dev/null @@ -1,166 +0,0 @@ -# -# -*- coding: utf-8 -*- -# Copyright 2019 Red Hat -# GNU General Public License v3.0+ -# (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt) -""" -The eos_lldp_global class -It is in this file where the current configuration (as dict) -is compared to the provided configuration (as dict) and the command set -necessary to bring the current configuration to it's desired end-state is -created -""" - -from __future__ import (absolute_import, division, print_function) -__metaclass__ = type - -from ansible.module_utils.network.common.cfg.base import ConfigBase -from ansible.module_utils.network.common.utils import dict_diff, to_list -from ansible.module_utils.network.eos.facts.facts import Facts - - -class Lldp_global(ConfigBase): - """ - The eos_lldp_global class - """ - - gather_subset = [ - '!all', - '!min', - ] - - gather_network_resources = [ - 'lldp_global', - ] - - def __init__(self, module): - super(Lldp_global, self).__init__(module) - - def get_lldp_global_facts(self): - """ Get the 'facts' (the current configuration) - - :rtype: A dictionary - :returns: The current configuration as a dictionary - """ - facts, _warnings = Facts(self._module).get_facts(self.gather_subset, self.gather_network_resources) - lldp_global_facts = facts['ansible_network_resources'].get('lldp_global') - if not lldp_global_facts: - return {} - return lldp_global_facts - - def execute_module(self): - """ Execute the module - - :rtype: A dictionary - :returns: The result from module execution - """ - result = {'changed': False} - warnings = list() - commands = list() - - existing_lldp_global_facts = self.get_lldp_global_facts() - commands.extend(self.set_config(existing_lldp_global_facts)) - if commands: - if not self._module.check_mode: - self._connection.edit_config(commands) - result['changed'] = True - result['commands'] = commands - - changed_lldp_global_facts = self.get_lldp_global_facts() - - result['before'] = existing_lldp_global_facts - if result['changed']: - result['after'] = changed_lldp_global_facts - - result['warnings'] = warnings - return result - - def set_config(self, existing_lldp_global_facts): - """ Collect the configuration from the args passed to the module, - collect the current configuration (as a dict from facts) - - :rtype: A list - :returns: the commands necessary to migrate the current configuration - to the desired configuration - """ - want = self._module.params['config'] or {} - have = existing_lldp_global_facts - resp = self.set_state(want, have) - return to_list(resp) - - def set_state(self, want, have): - """ Select the appropriate function based on the state provided - - :param want: the desired configuration as a dictionary - :param have: the current configuration as a dictionary - :rtype: A list - :returns: the commands necessary to migrate the current configuration - to the desired configuration - """ - state = self._module.params['state'] - if state == 'deleted': - commands = state_deleted(want, have) - elif state == 'merged': - commands = state_merged(want, have) - elif state == 'replaced': - commands = state_replaced(want, have) - return commands - - -def state_replaced(want, have): - """ The command generator when state is replaced - - :rtype: A list - :returns: the commands necessary to migrate the current configuration - to the desired configuration - """ - commands = set() - # merged and deleted are likely to emit duplicate tlv-select commands - commands.update(state_merged(want, have)) - commands.update(state_deleted(want, have)) - - return list(commands) - - -def state_merged(want, have): - """ The command generator when state is merged - - :rtype: A list - :returns: the commands necessary to merge the provided into - the current configuration - """ - commands = [] - to_set = dict_diff(have, want) - tlv_options = to_set.pop("tlv_select", {}) - for key, value in to_set.items(): - commands.append("lldp {0} {1}".format(key, value)) - for key, value in tlv_options.items(): - device_option = key.replace("_", "-") - if value is True: - commands.append("lldp tlv-select {0}".format(device_option)) - elif value is False: - commands.append("no lldp tlv-select {0}".format(device_option)) - - return commands - - -def state_deleted(want, have): - """ The command generator when state is deleted - - :rtype: A list - :returns: the commands necessary to remove the current configuration - of the provided objects - """ - commands = [] - to_remove = dict_diff(want, have) - tlv_options = to_remove.pop("tlv_select", {}) - for key in to_remove: - commands.append("no lldp {0}".format(key)) - for key, value in tlv_options.items(): - device_option = key.replace("_", "-") - if value is False: - commands.append("lldp tlv-select {0}".format(device_option)) - elif value is True: - commands.append("no lldp tlv-select {0}".format(device_option)) - - return commands diff --git a/lib/ansible/module_utils/network/eos/config/lldp_interfaces/lldp_interfaces.py b/lib/ansible/module_utils/network/eos/config/lldp_interfaces/lldp_interfaces.py deleted file mode 100644 index 93dcd8db9d..0000000000 --- a/lib/ansible/module_utils/network/eos/config/lldp_interfaces/lldp_interfaces.py +++ /dev/null @@ -1,216 +0,0 @@ -# -*- coding: utf-8 -*- -# Copyright 2019 Red Hat -# GNU General Public License v3.0+ -# (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt) -""" -The eos_lldp_interfaces class -It is in this file where the current configuration (as dict) -is compared to the provided configuration (as dict) and the command set -necessary to bring the current configuration to it's desired end-state is -created -""" - -from __future__ import (absolute_import, division, print_function) -__metaclass__ = type - -from ansible.module_utils.network.common.cfg.base import ConfigBase -from ansible.module_utils.network.common.utils import to_list, dict_diff, param_list_to_dict -from ansible.module_utils.network.eos.facts.facts import Facts -from ansible.module_utils.network.eos.utils.utils import normalize_interface - - -class Lldp_interfaces(ConfigBase): - """ - The eos_lldp_interfaces class - """ - - gather_subset = [ - '!all', - '!min', - ] - - gather_network_resources = [ - 'lldp_interfaces', - ] - - def get_lldp_interfaces_facts(self): - """ Get the 'facts' (the current configuration) - - :rtype: A dictionary - :returns: The current configuration as a dictionary - """ - facts, _warnings = Facts(self._module).get_facts(self.gather_subset, self.gather_network_resources) - lldp_interfaces_facts = facts['ansible_network_resources'].get('lldp_interfaces') - if not lldp_interfaces_facts: - return [] - return lldp_interfaces_facts - - def execute_module(self): - """ Execute the module - - :rtype: A dictionary - :returns: The result from module execution - """ - result = {'changed': False} - warnings = list() - commands = list() - - existing_lldp_interfaces_facts = self.get_lldp_interfaces_facts() - commands.extend(self.set_config(existing_lldp_interfaces_facts)) - if commands: - if not self._module.check_mode: - self._connection.edit_config(commands) - result['changed'] = True - result['commands'] = commands - - changed_lldp_interfaces_facts = self.get_lldp_interfaces_facts() - - result['before'] = existing_lldp_interfaces_facts - if result['changed']: - result['after'] = changed_lldp_interfaces_facts - - result['warnings'] = warnings - return result - - def set_config(self, existing_lldp_interfaces_facts): - """ Collect the configuration from the args passed to the module, - collect the current configuration (as a dict from facts) - - :rtype: A list - :returns: the commands necessary to migrate the current configuration - to the desired configuration - """ - want = self._module.params['config'] - have = existing_lldp_interfaces_facts - resp = self.set_state(want, have) - return to_list(resp) - - def set_state(self, want, have): - """ Select the appropriate function based on the state provided - - :param want: the desired configuration as a dictionary - :param have: the current configuration as a dictionary - :rtype: A list - :returns: the commands necessary to migrate the current configuration - to the desired configuration - """ - state = self._module.params['state'] - want = param_list_to_dict(want, remove_key=False) - have = param_list_to_dict(have, remove_key=False) - if state == 'overridden': - commands = self._state_overridden(want, have) - elif state == 'deleted': - commands = self._state_deleted(want, have) - elif state == 'merged': - commands = self._state_merged(want, have) - elif state == 'replaced': - commands = self._state_replaced(want, have) - return commands - - @staticmethod - def _state_replaced(want, have): - """ The command generator when state is replaced - - :rtype: A list - :returns: the commands necessary to migrate the current configuration - to the desired configuration - """ - commands = [] - for key, desired in want.items(): - interface_name = normalize_interface(key) - if interface_name in have: - extant = have[interface_name] - else: - extant = dict(name=interface_name) - - add_config = dict_diff(extant, desired) - del_config = dict_diff(desired, extant) - - commands.extend(generate_commands(interface_name, add_config, del_config)) - - return commands - - @staticmethod - def _state_overridden(want, have): - """ The command generator when state is overridden - - :rtype: A list - :returns: the commands necessary to migrate the current configuration - to the desired configuration - """ - commands = [] - for key, extant in have.items(): - if key in want: - desired = want[key] - else: - desired = dict(name=key) - - add_config = dict_diff(extant, desired) - del_config = dict_diff(desired, extant) - - commands.extend(generate_commands(key, add_config, del_config)) - - return commands - - @staticmethod - def _state_merged(want, have): - """ The command generator when state is merged - - :rtype: A list - :returns: the commands necessary to merge the provided into - the current configuration - """ - commands = [] - for key, desired in want.items(): - interface_name = normalize_interface(key) - if interface_name in have: - extant = have[interface_name] - else: - extant = dict(name=interface_name) - - add_config = dict_diff(extant, desired) - - commands.extend(generate_commands(interface_name, add_config, {})) - - return commands - - @staticmethod - def _state_deleted(want, have): - """ The command generator when state is deleted - - :rtype: A list - :returns: the commands necessary to remove the current configuration - of the provided objects - """ - commands = [] - for key in want.keys(): - interface_name = normalize_interface(key) - desired = dict(name=interface_name) - if interface_name in have: - extant = have[interface_name] - else: - continue - - del_config = dict_diff(desired, extant) - - commands.extend(generate_commands(interface_name, {}, del_config)) - - return commands - - -def generate_commands(name, to_set, to_remove): - commands = [] - for key, value in to_set.items(): - if value is None: - continue - - prefix = "" if value else "no " - commands.append("{0}lldp {1}".format(prefix, key)) - - for key in to_remove: - commands.append("lldp {0}".format(key)) - - if commands: - commands.insert(0, "interface {0}".format(name)) - - return commands diff --git a/lib/ansible/module_utils/network/eos/config/static_routes/static_routes.py b/lib/ansible/module_utils/network/eos/config/static_routes/static_routes.py deleted file mode 100644 index ae3e4609c1..0000000000 --- a/lib/ansible/module_utils/network/eos/config/static_routes/static_routes.py +++ /dev/null @@ -1,390 +0,0 @@ -# -# -*- coding: utf-8 -*- -# Copyright 2019 Red Hat -# GNU General Public License v3.0+ -# (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt) -""" -The eos_static_routes class -It is in this file where the current configuration (as dict) -is compared to the provided configuration (as dict) and the command set -necessary to bring the current configuration to it's desired end-state is -created -""" - -from __future__ import (absolute_import, division, print_function) -__metaclass__ = type - -import re -from ansible.module_utils.network.common.cfg.base import ConfigBase -from ansible.module_utils.network.common.utils import remove_empties -from ansible.module_utils.network.eos.facts.facts import Facts - - -class Static_routes(ConfigBase): - """ - The eos_static_routes class - """ - - gather_subset = [ - '!all', - '!min', - ] - - gather_network_resources = [ - 'static_routes', - ] - - def __init__(self, module): - super(Static_routes, self).__init__(module) - - def get_static_routes_facts(self, data=None): - """ Get the 'facts' (the current configuration) - - :rtype: A dictionary - :returns: The current configuration as a dictionary - """ - facts, _warnings = Facts(self._module).get_facts(self.gather_subset, self.gather_network_resources, data=data) - static_routes_facts = facts['ansible_network_resources'].get('static_routes') - if not static_routes_facts: - return [] - return static_routes_facts - - def execute_module(self): - """ Execute the module - - :rtype: A dictionary - :returns: The result from module execution - """ - result = {'changed': False} - warnings = list() - commands = list() - if self.state in self.ACTION_STATES: - existing_static_routes_facts = self.get_static_routes_facts() - else: - existing_static_routes_facts = [] - - if self.state in self.ACTION_STATES or self.state == 'rendered': - commands.extend(self.set_config(existing_static_routes_facts)) - - if commands and self.state in self.ACTION_STATES: - if not self._module.check_mode: - for command in commands: - self._connection.edit_config(command) - result['changed'] = True - if self.state in self.ACTION_STATES: - result['commands'] = commands - if self.state in self.ACTION_STATES or self.state == 'gathered': - changed_static_routes_facts = self.get_static_routes_facts() - elif self.state == 'rendered': - result['rendered'] = commands - elif self.state == 'parsed': - if not self._module.params['running_config']: - self._module.fail_json(msg="Value of running_config parameter must not be empty for state parsed") - result['parsed'] = self.get_static_routes_facts(data=self._module.params['running_config']) - else: - changed_static_routes_facts = [] - - if self.state in self.ACTION_STATES: - result['before'] = existing_static_routes_facts - if result['changed']: - result['after'] = changed_static_routes_facts - elif self.state == 'gathered': - result['gathered'] = changed_static_routes_facts - - result['warnings'] = warnings - return result - - def set_config(self, existing_static_routes_facts): - """ Collect the configuration from the args passed to the module, - collect the current configuration (as a dict from facts) - - :rtype: A list - :returns: the commands necessary to migrate the current configuration - to the desired configuration - """ - commands = [] - onbox_configs = [] - for h in existing_static_routes_facts: - return_command = add_commands(h) - for command in return_command: - onbox_configs.append(command) - config = self._module.params.get('config') - want = [] - if config: - for w in config: - want.append(remove_empties(w)) - have = existing_static_routes_facts - resp = self.set_state(want, have) - for want_config in resp: - if want_config not in onbox_configs: - commands.append(want_config) - return commands - - def set_state(self, want, have): - """ Select the appropriate function based on the state provided - - :param want: the desired configuration as a dictionary - :param have: the current configuration as a dictionary - :rtype: A list - :returns: the commands necessary to migrate the current configuration - to the desired configuration - """ - commands = [] - if self.state in ('merged', 'replaced', 'overridden') and not want: - self._module.fail_json(msg='value of config parameter must not be empty for state {0}'.format(self.state)) - state = self._module.params['state'] - if state == 'overridden': - commands = self._state_overridden(want, have) - elif state == 'deleted': - commands = self._state_deleted(want, have) - elif state == 'merged' or self.state == 'rendered': - commands = self._state_merged(want, have) - elif state == 'replaced': - commands = self._state_replaced(want, have) - return commands - - @staticmethod - def _state_replaced(want, have): - """ The command generator when state is replaced - - :rtype: A list - :returns: the commands necessary to migrate the current configuration - to the desired configuration - """ - commands = [] - haveconfigs = [] - vrf = get_vrf(want) - dest = get_dest(want) - for h in have: - return_command = add_commands(h) - for command in return_command: - for d in dest: - if d in command: - if vrf is None: - if "vrf" not in command: - haveconfigs.append(command) - else: - if vrf in command: - haveconfigs.append(command) - wantconfigs = set_commands(want, have) - - removeconfigs = list(set(haveconfigs) - set(wantconfigs)) - for command in removeconfigs: - commands.append("no " + command) - for wantcmd in wantconfigs: - commands.append(wantcmd) - return commands - - @staticmethod - def _state_overridden(want, have): - """ The command generator when state is overridden - - :rtype: A list - :returns: the commands necessary to migrate the current configuration - to the desired configuration - """ - commands = [] - haveconfigs = [] - for h in have: - return_command = add_commands(h) - for command in return_command: - haveconfigs.append(command) - wantconfigs = set_commands(want, have) - idempotentconfigs = list(set(haveconfigs) - set(wantconfigs)) - if not idempotentconfigs: - return idempotentconfigs - removeconfigs = list(set(haveconfigs) - set(wantconfigs)) - for command in removeconfigs: - commands.append("no " + command) - for wantcmd in wantconfigs: - commands.append(wantcmd) - return commands - - @staticmethod - def _state_merged(want, have): - """ The command generator when state is merged - - :rtype: A list - :returns: the commands necessary to merge the provided into - the current configuration - """ - return set_commands(want, have) - - @staticmethod - def _state_deleted(want, have): - """ The command generator when state is deleted - - :rtype: A list - :returns: the commands necessary to remove the current configuration - of the provided objects - """ - commands = [] - if not want: - for h in have: - return_command = add_commands(h) - for command in return_command: - command = "no " + command - commands.append(command) - else: - for w in want: - return_command = del_commands(w, have) - for command in return_command: - commands.append(command) - return commands - - -def set_commands(want, have): - commands = [] - for w in want: - return_command = add_commands(w) - for command in return_command: - commands.append(command) - return commands - - -def add_commands(want): - commandset = [] - if not want: - return commandset - vrf = want["vrf"] if "vrf" in want.keys() and want["vrf"] is not None else None - for address_family in want["address_families"]: - for route in address_family["routes"]: - for next_hop in route["next_hops"]: - commands = [] - if address_family["afi"] == "ipv4": - commands.append('ip route') - else: - commands.append('ipv6 route') - if vrf: - commands.append(' vrf ' + vrf) - if not re.search(r'/', route["dest"]): - mask = route["dest"].split()[1] - cidr = get_net_size(mask) - commands.append(' ' + route["dest"].split()[0] + '/' + cidr) - else: - commands.append(' ' + route["dest"]) - if "interface" in next_hop.keys(): - commands.append(' ' + next_hop["interface"]) - if "nexthop_grp" in next_hop.keys(): - commands.append(' Nexthop-Group' + ' ' + next_hop["nexthop_grp"]) - if "forward_router_address" in next_hop.keys(): - commands.append(' ' + next_hop["forward_router_address"]) - if "mpls_label" in next_hop.keys(): - commands.append(' label ' + str(next_hop["mpls_label"])) - if "track" in next_hop.keys(): - commands.append(' track ' + next_hop["track"]) - if "admin_distance" in next_hop.keys(): - commands.append(' ' + str(next_hop["admin_distance"])) - if "description" in next_hop.keys(): - commands.append(' name ' + str(next_hop["description"])) - if "tag" in next_hop.keys(): - commands.append(' tag ' + str(next_hop["tag"])) - - config_commands = "".join(commands) - commandset.append(config_commands) - return commandset - - -def del_commands(want, have): - commandset = [] - haveconfigs = [] - for h in have: - return_command = add_commands(h) - for command in return_command: - command = "no " + command - haveconfigs.append(command) - if want is None or "address_families" not in want.keys(): - commandset = haveconfigs - if "address_families" not in want.keys() and "vrf" in want.keys(): - commandset = [] - for command in haveconfigs: - if want["vrf"] in command: - commandset.append(command) - elif want is not None and "vrf" not in want.keys() and "address_families" not in want.keys(): - commandset = [] - for command in haveconfigs: - if "vrf" not in command: - commandset.append(command) - - elif want["address_families"]: - vrf = want["vrf"] if "vrf" in want.keys() and want["vrf"] else None - for address_family in want["address_families"]: - if "routes" not in address_family.keys(): - for command in haveconfigs: - afi = "ip " if address_family["afi"] == "ipv4" else "ipv6" - if afi in command: - if vrf: - if vrf in command: - commandset.append(command) - else: - commandset.append(command) - else: - for route in address_family["routes"]: - if not re.search(r'/', route["dest"]): - mask = route["dest"].split()[1] - cidr = get_net_size(mask) - destination = route["dest"].split()[0] + '/' + cidr - else: - destination = route["dest"] - if "next_hops" not in route.keys(): - for command in haveconfigs: - if destination in command: - if vrf: - if vrf in command: - commandset.append(command) - else: - commandset.append(command) - else: - for next_hop in route["next_hops"]: - commands = [] - if address_family["afi"] == "ipv4": - commands.append('no ip route') - else: - commands.append('no ipv6 route') - if vrf: - commands.append(' vrf ' + vrf) - commands.append(' ' + destination) - if "interface" in next_hop.keys(): - commands.append(' ' + next_hop["interface"]) - if "nexhop_grp" in next_hop.keys(): - commands.append(' Nexthop-Group' + ' ' + next_hop["nexthop_grp"]) - if "forward_router_address" in next_hop.keys(): - commands.append(' ' + next_hop["forward_router_address"]) - if "mpls_label" in next_hop.keys(): - commands.append(' label ' + str(next_hop["mpls_label"])) - if "track" in next_hop.keys(): - commands.append(' track ' + next_hop["track"]) - if "admin_distance" in next_hop.keys(): - commands.append(' ' + str(next_hop["admin_distance"])) - if "description" in next_hop.keys(): - commands.append(' name ' + str(next_hop["description"])) - if "tag" in next_hop.keys(): - commands.append(' tag ' + str(next_hop["tag"])) - - config_commands = "".join(commands) - commandset.append(config_commands) - return commandset - - -def get_net_size(netmask): - binary_str = '' - netmask = netmask.split('.') - for octet in netmask: - binary_str += bin(int(octet))[2:].zfill(8) - return str(len(binary_str.rstrip('0'))) - - -def get_vrf(config): - vrf = "" - for c in config: - vrf = c["vrf"] if "vrf" in c.keys() and c["vrf"] else None - return vrf - - -def get_dest(config): - dest = [] - for c in config: - for address_family in c["address_families"]: - for route in address_family["routes"]: - dest.append(route['dest']) - return dest diff --git a/lib/ansible/module_utils/network/eos/config/vlans/vlans.py b/lib/ansible/module_utils/network/eos/config/vlans/vlans.py deleted file mode 100644 index c2a701637d..0000000000 --- a/lib/ansible/module_utils/network/eos/config/vlans/vlans.py +++ /dev/null @@ -1,224 +0,0 @@ -# -*- coding: utf-8 -*- -# Copyright 2019 Red Hat -# GNU General Public License v3.0+ -# (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt) -""" -The eos_vlans class -It is in this file where the current configuration (as dict) -is compared to the provided configuration (as dict) and the command set -necessary to bring the current configuration to it's desired end-state is -created -""" - -from __future__ import (absolute_import, division, print_function) -__metaclass__ = type - -from ansible.module_utils.network.common.cfg.base import ConfigBase -from ansible.module_utils.network.common.utils import to_list, dict_diff, param_list_to_dict -from ansible.module_utils.network.eos.facts.facts import Facts - - -class Vlans(ConfigBase): - """ - The eos_vlans class - """ - - gather_subset = [ - '!all', - '!min', - ] - - gather_network_resources = [ - 'vlans', - ] - - def get_vlans_facts(self): - """ Get the 'facts' (the current configuration) - - :rtype: A dictionary - :returns: The current configuration as a dictionary - """ - facts, _warnings = Facts(self._module).get_facts(self.gather_subset, self.gather_network_resources) - vlans_facts = facts['ansible_network_resources'].get('vlans') - if not vlans_facts: - return [] - return vlans_facts - - def execute_module(self): - """ Execute the module - - :rtype: A dictionary - :returns: The result from module execution - """ - result = {'changed': False} - warnings = list() - commands = list() - - existing_vlans_facts = self.get_vlans_facts() - commands.extend(self.set_config(existing_vlans_facts)) - if commands: - if not self._module.check_mode: - self._connection.edit_config(commands) - result['changed'] = True - result['commands'] = commands - - changed_vlans_facts = self.get_vlans_facts() - - result['before'] = existing_vlans_facts - if result['changed']: - result['after'] = changed_vlans_facts - - result['warnings'] = warnings - return result - - def set_config(self, existing_vlans_facts): - """ Collect the configuration from the args passed to the module, - collect the current configuration (as a dict from facts) - - :rtype: A list - :returns: the commands necessary to migrate the current configuration - to the desired configuration - """ - want = self._module.params['config'] - have = existing_vlans_facts - resp = self.set_state(want, have) - return to_list(resp) - - def set_state(self, want, have): - """ Select the appropriate function based on the state provided - - :param want: the desired configuration as a dictionary - :param have: the current configuration as a dictionary - :rtype: A list - :returns: the commands necessary to migrate the current configuration - to the desired configuration - """ - state = self._module.params['state'] - want = param_list_to_dict(want, "vlan_id", remove_key=False) - have = param_list_to_dict(have, "vlan_id", remove_key=False) - if state == 'overridden': - commands = self._state_overridden(want, have) - elif state == 'deleted': - commands = self._state_deleted(want, have) - elif state == 'merged': - commands = self._state_merged(want, have) - elif state == 'replaced': - commands = self._state_replaced(want, have) - return commands - - @staticmethod - def _state_replaced(want, have): - """ The command generator when state is replaced - - :rtype: A list - :returns: the commands necessary to migrate the current configuration - to the desired configuration - """ - commands = [] - for vlan_id, desired in want.items(): - if vlan_id in have: - extant = have[vlan_id] - else: - extant = dict() - - add_config = dict_diff(extant, desired) - del_config = dict_diff(desired, extant) - - commands.extend(generate_commands(vlan_id, add_config, del_config)) - - return commands - - @staticmethod - def _state_overridden(want, have): - """ The command generator when state is overridden - - :rtype: A list - :returns: the commands necessary to migrate the current configuration - to the desired configuration - """ - commands = [] - for vlan_id, extant in have.items(): - if vlan_id in want: - desired = want[vlan_id] - else: - desired = dict() - - add_config = dict_diff(extant, desired) - del_config = dict_diff(desired, extant) - - commands.extend(generate_commands(vlan_id, add_config, del_config)) - - # Handle vlans not already in config - new_vlans = [vlan_id for vlan_id in want if vlan_id not in have] - for vlan_id in new_vlans: - desired = want[vlan_id] - extant = dict(vlan_id=vlan_id) - add_config = dict_diff(extant, desired) - - commands.extend(generate_commands(vlan_id, add_config, {})) - - return commands - - @staticmethod - def _state_merged(want, have): - """ The command generator when state is merged - - :rtype: A list - :returns: the commands necessary to merge the provided into - the current configuration - """ - commands = [] - for vlan_id, desired in want.items(): - if vlan_id in have: - extant = have[vlan_id] - else: - extant = dict() - - add_config = dict_diff(extant, desired) - - commands.extend(generate_commands(vlan_id, add_config, {})) - - return commands - - @staticmethod - def _state_deleted(want, have): - """ The command generator when state is deleted - - :rtype: A list - :returns: the commands necessary to remove the current configuration - of the provided objects - """ - commands = [] - for vlan_id in want: - desired = dict() - if vlan_id in have: - extant = have[vlan_id] - else: - continue - - del_config = dict_diff(desired, extant) - - commands.extend(generate_commands(vlan_id, {}, del_config)) - - return commands - - -def generate_commands(vlan_id, to_set, to_remove): - commands = [] - if "vlan_id" in to_remove: - return ["no vlan {0}".format(vlan_id)] - - for key in to_remove: - if key in to_set.keys(): - continue - commands.append("no {0}".format(key)) - - for key, value in to_set.items(): - if key == "vlan_id" or value is None: - continue - - commands.append("{0} {1}".format(key, value)) - - if commands: - commands.insert(0, "vlan {0}".format(vlan_id)) - return commands diff --git a/lib/ansible/module_utils/network/eos/eos.py b/lib/ansible/module_utils/network/eos/eos.py deleted file mode 100644 index 22c675153e..0000000000 --- a/lib/ansible/module_utils/network/eos/eos.py +++ /dev/null @@ -1,630 +0,0 @@ -# -# This code is part of Ansible, but is an independent component. -# -# This particular file snippet, and this file snippet only, is BSD licensed. -# Modules you write using this snippet, which is embedded dynamically by Ansible -# still belong to the author of the module, and may assign their own license -# to the complete work. -# -# (c) 2017 Red Hat, Inc. -# -# Redistribution and use in source and binary forms, with or without modification, -# are permitted provided that the following conditions are met: -# -# * Redistributions of source code must retain the above copyright -# notice, this list of conditions and the following disclaimer. -# * Redistributions in binary form must reproduce the above copyright notice, -# this list of conditions and the following disclaimer in the documentation -# and/or other materials provided with the distribution. -# -# THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND -# ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED -# WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. -# IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, -# INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, -# PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS -# INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT -# LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE -# USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. -# -import json -import os -import time - -from ansible.module_utils._text import to_text -from ansible.module_utils.basic import env_fallback -from ansible.module_utils.connection import Connection, ConnectionError -from ansible.module_utils.network.common.config import NetworkConfig, dumps -from ansible.module_utils.network.common.utils import to_list, ComplexList -from ansible.module_utils.urls import fetch_url - -_DEVICE_CONNECTION = None - -eos_provider_spec = { - 'host': dict(), - 'port': dict(type='int'), - 'username': dict(fallback=(env_fallback, ['ANSIBLE_NET_USERNAME'])), - 'password': dict(fallback=(env_fallback, ['ANSIBLE_NET_PASSWORD']), no_log=True), - 'ssh_keyfile': dict(fallback=(env_fallback, ['ANSIBLE_NET_SSH_KEYFILE']), type='path'), - - 'authorize': dict(fallback=(env_fallback, ['ANSIBLE_NET_AUTHORIZE']), type='bool'), - 'auth_pass': dict(no_log=True, fallback=(env_fallback, ['ANSIBLE_NET_AUTH_PASS'])), - - 'use_ssl': dict(default=True, type='bool'), - 'use_proxy': dict(default=True, type='bool'), - 'validate_certs': dict(default=True, type='bool'), - 'timeout': dict(type='int'), - - 'transport': dict(default='cli', choices=['cli', 'eapi']) -} -eos_argument_spec = { - 'provider': dict(type='dict', options=eos_provider_spec, removed_in_version=2.14), -} - - -def get_provider_argspec(): - return eos_provider_spec - - -def get_connection(module): - global _DEVICE_CONNECTION - if not _DEVICE_CONNECTION: - if is_local_eapi(module): - conn = LocalEapi(module) - else: - connection_proxy = Connection(module._socket_path) - cap = json.loads(connection_proxy.get_capabilities()) - if cap['network_api'] == 'cliconf': - conn = Cli(module) - elif cap['network_api'] == 'eapi': - conn = HttpApi(module) - _DEVICE_CONNECTION = conn - return _DEVICE_CONNECTION - - -class Cli: - - def __init__(self, module): - self._module = module - self._device_configs = {} - self._session_support = None - self._connection = None - - @property - def supports_sessions(self): - if self._session_support is None: - self._session_support = self._get_connection().supports_sessions() - return self._session_support - - def _get_connection(self): - if self._connection: - return self._connection - self._connection = Connection(self._module._socket_path) - - return self._connection - - def get_config(self, flags=None): - """Retrieves the current config from the device or cache - """ - flags = [] if flags is None else flags - - cmd = 'show running-config ' - cmd += ' '.join(flags) - cmd = cmd.strip() - - try: - return self._device_configs[cmd] - except KeyError: - conn = self._get_connection() - try: - out = conn.get_config(flags=flags) - except ConnectionError as exc: - self._module.fail_json(msg=to_text(exc, errors='surrogate_then_replace')) - - cfg = to_text(out, errors='surrogate_then_replace').strip() - self._device_configs[cmd] = cfg - return cfg - - def run_commands(self, commands, check_rc=True): - """Run list of commands on remote device and return results - """ - connection = self._get_connection() - try: - response = connection.run_commands(commands=commands, check_rc=check_rc) - except ConnectionError as exc: - self._module.fail_json(msg=to_text(exc, errors='surrogate_then_replace')) - return response - - def load_config(self, commands, commit=False, replace=False): - """Loads the config commands onto the remote device - """ - conn = self._get_connection() - try: - response = conn.edit_config(commands, commit, replace) - except ConnectionError as exc: - message = getattr(exc, 'err', to_text(exc)) - if "check mode is not supported without configuration session" in message: - self._module.warn("EOS can not check config without config session") - response = {'changed': True} - else: - self._module.fail_json(msg="%s" % message, data=to_text(message, errors='surrogate_then_replace')) - - return response - - def get_diff(self, candidate=None, running=None, diff_match='line', diff_ignore_lines=None, path=None, diff_replace='line'): - conn = self._get_connection() - try: - diff = conn.get_diff(candidate=candidate, running=running, diff_match=diff_match, diff_ignore_lines=diff_ignore_lines, path=path, - diff_replace=diff_replace) - except ConnectionError as exc: - self._module.fail_json(msg=to_text(exc, errors='surrogate_then_replace')) - return diff - - def get_capabilities(self): - """Returns platform info of the remove device - """ - if hasattr(self._module, '_capabilities'): - return self._module._capabilities - - connection = self._get_connection() - try: - capabilities = connection.get_capabilities() - except ConnectionError as exc: - self._module.fail_json(msg=to_text(exc, errors='surrogate_then_replace')) - self._module._capabilities = json.loads(capabilities) - return self._module._capabilities - - -class LocalEapi: - - def __init__(self, module): - self._module = module - self._enable = None - self._session_support = None - self._device_configs = {} - - provider = module.params.get("provider") or {} - host = provider.get('host') - port = provider.get('port') - - self._module.params['url_username'] = provider.get('username') - self._module.params['url_password'] = provider.get('password') - - if provider.get('use_ssl'): - proto = 'https' - else: - proto = 'http' - - module.params['validate_certs'] = provider.get('validate_certs') - - self._url = '%s://%s:%s/command-api' % (proto, host, port) - - if provider.get("auth_pass"): - self._enable = {'cmd': 'enable', 'input': provider.get('auth_pass')} - else: - self._enable = 'enable' - - @property - def supports_sessions(self): - if self._session_support is None: - response = self.send_request(['show configuration sessions']) - self._session_support = 'error' not in response - return self._session_support - - def _request_builder(self, commands, output, reqid=None): - params = dict(version=1, cmds=commands, format=output) - return dict(jsonrpc='2.0', id=reqid, method='runCmds', params=params) - - def send_request(self, commands, output='text'): - commands = to_list(commands) - - if self._enable: - commands.insert(0, self._enable) - - body = self._request_builder(commands, output) - data = self._module.jsonify(body) - - headers = {'Content-Type': 'application/json-rpc'} - timeout = self._module.params['provider']['timeout'] - use_proxy = self._module.params['provider']['use_proxy'] - - response, headers = fetch_url( - self._module, self._url, data=data, headers=headers, - method='POST', timeout=timeout, use_proxy=use_proxy - ) - - if headers['status'] != 200: - self._module.fail_json(**headers) - - try: - data = response.read() - response = self._module.from_json(to_text(data, errors='surrogate_then_replace')) - except ValueError: - self._module.fail_json(msg='unable to load response from device', data=data) - - if self._enable and 'result' in response: - response['result'].pop(0) - - return response - - def run_commands(self, commands, check_rc=True): - """Runs list of commands on remote device and returns results - """ - output = None - queue = list() - responses = list() - - def _send(commands, output): - response = self.send_request(commands, output=output) - if 'error' in response: - err = response['error'] - self._module.fail_json(msg=err['message'], code=err['code']) - return response['result'] - - for item in to_list(commands): - if is_json(item['command']): - item['command'] = str(item['command']).replace('| json', '') - item['output'] = 'json' - - if output and output != item['output']: - responses.extend(_send(queue, output)) - queue = list() - - output = item['output'] or 'json' - queue.append(item['command']) - - if queue: - responses.extend(_send(queue, output)) - - for index, item in enumerate(commands): - try: - responses[index] = responses[index]['output'].strip() - except KeyError: - pass - - return responses - - def get_config(self, flags=None): - """Retrieves the current config from the device or cache - """ - flags = [] if flags is None else flags - - cmd = 'show running-config ' - cmd += ' '.join(flags) - cmd = cmd.strip() - - try: - return self._device_configs[cmd] - except KeyError: - out = self.send_request(cmd) - cfg = str(out['result'][0]['output']).strip() - self._device_configs[cmd] = cfg - return cfg - - def configure(self, commands): - """Sends the ordered set of commands to the device - """ - cmds = ['configure terminal'] - cmds.extend(commands) - - responses = self.send_request(commands) - if 'error' in responses: - err = responses['error'] - self._module.fail_json(msg=err['message'], code=err['code']) - - return responses[1:] - - def load_config(self, config, commit=False, replace=False): - """Loads the configuration onto the remote devices - - If the device doesn't support configuration sessions, this will - fallback to using configure() to load the commands. If that happens, - there will be no returned diff or session values - """ - use_session = os.getenv('ANSIBLE_EOS_USE_SESSIONS', True) - try: - use_session = int(use_session) - except ValueError: - pass - - if not all((bool(use_session), self.supports_sessions)): - if commit: - return self.configure(config) - else: - self._module.warn("EOS can not check config without config session") - result = {'changed': True} - return result - - session = 'ansible_%s' % int(time.time()) - result = {'session': session} - commands = ['configure session %s' % session] - - if replace: - commands.append('rollback clean-config') - - commands.extend(config) - - response = self.send_request(commands) - if 'error' in response: - commands = ['configure session %s' % session, 'abort'] - self.send_request(commands) - err = response['error'] - error_text = [] - for data in err['data']: - error_text.extend(data.get('errors', [])) - error_text = '\n'.join(error_text) or err['message'] - self._module.fail_json(msg=error_text, code=err['code']) - - commands = ['configure session %s' % session, 'show session-config diffs'] - if commit: - commands.append('commit') - else: - commands.append('abort') - - response = self.send_request(commands, output='text') - diff = response['result'][1]['output'] - if len(diff) > 0: - result['diff'] = diff - - return result - - # get_diff added here to support connection=local and transport=eapi scenario - def get_diff(self, candidate, running=None, diff_match='line', diff_ignore_lines=None, path=None, diff_replace='line'): - diff = {} - - # prepare candidate configuration - candidate_obj = NetworkConfig(indent=3) - candidate_obj.load(candidate) - - if running and diff_match != 'none' and diff_replace != 'config': - # running configuration - running_obj = NetworkConfig(indent=3, contents=running, ignore_lines=diff_ignore_lines) - configdiffobjs = candidate_obj.difference(running_obj, path=path, match=diff_match, replace=diff_replace) - - else: - configdiffobjs = candidate_obj.items - - configdiff = dumps(configdiffobjs, 'commands') if configdiffobjs else '' - diff['config_diff'] = configdiff if configdiffobjs else {} - return diff - - def get_capabilities(self): - # Implement the bare minimum to support eos_facts - return dict( - device_info=dict( - network_os="eos", - ), - network_api="eapi", - ) - - -class HttpApi: - def __init__(self, module): - self._module = module - self._device_configs = {} - self._session_support = None - self._connection_obj = None - - @property - def _connection(self): - if not self._connection_obj: - self._connection_obj = Connection(self._module._socket_path) - - return self._connection_obj - - @property - def supports_sessions(self): - if self._session_support is None: - self._session_support = self._connection.supports_sessions() - return self._session_support - - def run_commands(self, commands, check_rc=True): - """Runs list of commands on remote device and returns results - """ - output = None - queue = list() - responses = list() - - def run_queue(queue, output): - try: - response = to_list(self._connection.send_request(queue, output=output)) - except ConnectionError as exc: - if check_rc: - raise - return to_list(to_text(exc)) - - if output == 'json': - response = [json.loads(item) for item in response] - return response - - for item in to_list(commands): - cmd_output = 'text' - if isinstance(item, dict): - command = item['command'] - if 'output' in item: - cmd_output = item['output'] - else: - command = item - - # Emulate '| json' from CLI - if is_json(command): - command = command.rsplit('|', 1)[0] - cmd_output = 'json' - - if output and output != cmd_output: - responses.extend(run_queue(queue, output)) - queue = list() - - output = cmd_output - queue.append(command) - - if queue: - responses.extend(run_queue(queue, output)) - - return responses - - def get_config(self, flags=None): - """Retrieves the current config from the device or cache - """ - flags = [] if flags is None else flags - - cmd = 'show running-config ' - cmd += ' '.join(flags) - cmd = cmd.strip() - - try: - return self._device_configs[cmd] - except KeyError: - try: - out = self._connection.send_request(cmd) - except ConnectionError as exc: - self._module.fail_json(msg=to_text(exc, errors='surrogate_then_replace')) - - cfg = to_text(out).strip() - self._device_configs[cmd] = cfg - return cfg - - def get_diff(self, candidate=None, running=None, diff_match='line', diff_ignore_lines=None, path=None, diff_replace='line'): - diff = {} - - # prepare candidate configuration - candidate_obj = NetworkConfig(indent=3) - candidate_obj.load(candidate) - - if running and diff_match != 'none' and diff_replace != 'config': - # running configuration - running_obj = NetworkConfig(indent=3, contents=running, ignore_lines=diff_ignore_lines) - configdiffobjs = candidate_obj.difference(running_obj, path=path, match=diff_match, replace=diff_replace) - - else: - configdiffobjs = candidate_obj.items - - diff['config_diff'] = dumps(configdiffobjs, 'commands') if configdiffobjs else {} - return diff - - def load_config(self, config, commit=False, replace=False): - """Loads the configuration onto the remote devices - - If the device doesn't support configuration sessions, this will - fallback to using configure() to load the commands. If that happens, - there will be no returned diff or session values - """ - return self.edit_config(config, commit, replace) - - def edit_config(self, config, commit=False, replace=False): - """Loads the configuration onto the remote devices - - If the device doesn't support configuration sessions, this will - fallback to using configure() to load the commands. If that happens, - there will be no returned diff or session values - """ - session = 'ansible_%s' % int(time.time()) - result = {'session': session} - banner_cmd = None - banner_input = [] - - commands = ['configure session %s' % session] - if replace: - commands.append('rollback clean-config') - - for command in config: - if command.startswith('banner'): - banner_cmd = command - banner_input = [] - elif banner_cmd: - if command == 'EOF': - command = {'cmd': banner_cmd, 'input': '\n'.join(banner_input)} - banner_cmd = None - commands.append(command) - else: - banner_input.append(command) - continue - else: - commands.append(command) - - try: - response = self._connection.send_request(commands) - except Exception: - commands = ['configure session %s' % session, 'abort'] - response = self._connection.send_request(commands, output='text') - raise - - commands = ['configure session %s' % session, 'show session-config diffs'] - if commit: - commands.append('commit') - else: - commands.append('abort') - - response = self._connection.send_request(commands, output='text') - diff = response[1].strip() - if diff: - result['diff'] = diff - - return result - - def get_capabilities(self): - """Returns platform info of the remove device - """ - try: - capabilities = self._connection.get_capabilities() - except ConnectionError as exc: - self._module.fail_json(msg=to_text(exc, errors='surrogate_then_replace')) - - return json.loads(capabilities) - - -def is_json(cmd): - return to_text(cmd, errors='surrogate_then_replace').endswith('| json') - - -def is_local_eapi(module): - provider = module.params.get('provider') - if provider: - return provider.get('transport') == 'eapi' - return False - - -def to_command(module, commands): - if is_local_eapi(module): - default_output = 'json' - else: - default_output = 'text' - - transform = ComplexList(dict( - command=dict(key=True), - output=dict(default=default_output), - prompt=dict(type='list'), - answer=dict(type='list'), - newline=dict(type='bool', default=True), - sendonly=dict(type='bool', default=False), - check_all=dict(type='bool', default=False), - ), module) - - return transform(to_list(commands)) - - -def get_config(module, flags=None): - flags = None if flags is None else flags - - conn = get_connection(module) - return conn.get_config(flags) - - -def run_commands(module, commands, check_rc=True): - conn = get_connection(module) - return conn.run_commands(to_command(module, commands), check_rc=check_rc) - - -def load_config(module, config, commit=False, replace=False): - conn = get_connection(module) - return conn.load_config(config, commit, replace) - - -def get_diff(self, candidate=None, running=None, diff_match='line', diff_ignore_lines=None, path=None, diff_replace='line'): - conn = self.get_connection() - return conn.get_diff(candidate=candidate, running=running, diff_match=diff_match, diff_ignore_lines=diff_ignore_lines, path=path, diff_replace=diff_replace) - - -def get_capabilities(module): - conn = get_connection(module) - return conn.get_capabilities() diff --git a/lib/ansible/module_utils/network/eos/facts/acl_interfaces/acl_interfaces.py b/lib/ansible/module_utils/network/eos/facts/acl_interfaces/acl_interfaces.py deleted file mode 100644 index 89c3336a62..0000000000 --- a/lib/ansible/module_utils/network/eos/facts/acl_interfaces/acl_interfaces.py +++ /dev/null @@ -1,133 +0,0 @@ -# -# -*- coding: utf-8 -*- -# Copyright 2019 Red Hat -# GNU General Public License v3.0+ -# (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt) -""" -The eos acl_interfaces fact class -It is in this file the configuration is collected from the device -for a given resource, parsed, and the facts tree is populated -based on the configuration. -""" - -from __future__ import (absolute_import, division, print_function) -__metaclass__ = type - - -import re -from copy import deepcopy - -from ansible.module_utils.network.common import utils -from ansible.module_utils.network.eos.argspec.acl_interfaces.acl_interfaces import Acl_interfacesArgs - - -class Acl_interfacesFacts(object): - """ The eos acl_interfaces fact class - """ - - def __init__(self, module, subspec='config', options='options'): - self._module = module - self.argument_spec = Acl_interfacesArgs.argument_spec - spec = deepcopy(self.argument_spec) - if subspec: - if options: - facts_argument_spec = spec[subspec][options] - else: - facts_argument_spec = spec[subspec] - else: - facts_argument_spec = spec - - self.generated_spec = utils.generate_dict(facts_argument_spec) - - def get_device_data(self, connection): - return connection.get('show running-config | include interface | access-group | traffic-filter') - - def populate_facts(self, connection, ansible_facts, data=None): - """ Populate the facts for acl_interfaces - :param connection: the device connection - :param ansible_facts: Facts dictionary - :param data: previously collected conf - :rtype: dictionary - :returns: facts - """ - - if not data: - data = self.get_device_data(connection) - # split the config into instances of the resource - resource_delim = 'interface' - find_pattern = r'(?:^|\n)%s.*?(?=(?:^|\n)%s|$)' % (resource_delim, - resource_delim) - resources = [p.strip() for p in re.findall(find_pattern, - data, - re.DOTALL)] - objs = [] - for resource in resources: - if resource: - obj = self.render_config(self.generated_spec, resource) - if obj: - objs.append(obj) - - ansible_facts['ansible_network_resources'].pop('acl_interfaces', None) - facts = {} - if objs: - params = utils.validate_config(self.argument_spec, {'config': objs}) - facts['acl_interfaces'] = [utils.remove_empties(cfg) for cfg in params['config']] - - ansible_facts['ansible_network_resources'].update(facts) - return ansible_facts - - def render_config(self, spec, conf): - """ - Render config as dictionary structure and delete keys - from spec for null values - - :param spec: The facts tree, generated from the argspec - :param conf: The configuration - :rtype: dictionary - :returns: The generated config - """ - config = deepcopy(spec) - access_group_list = [] - access_group_v6_list = [] - acls_list = [] - group_list = [] - group_dict = {} - config['name'] = utils.parse_conf_arg(conf, 'interface') - conf_lines = conf.split('\n') - for line in conf_lines: - if config['name'] in line: - continue - access_group = utils.parse_conf_arg(line, 'ip access-group') - # This module was verified on an ios device since vEOS doesnot support - # acl_interfaces cnfiguration. In ios, ipv6 acl is configured as - # traffic-filter and in eos it is access-group - - # access_group_v6 = utils.parse_conf_arg(line, 'ipv6 traffic-filter') - access_group_v6 = utils.parse_conf_arg(line, 'ipv6 access-group') - if access_group: - access_group_list.append(access_group) - if access_group_v6: - access_group_v6_list.append(access_group_v6) - if access_group_list: - for acl in access_group_list: - a_name = acl.split()[0] - a_dir = acl.split()[1] - acls_dict = {"name": a_name, "direction": a_dir} - acls_list.append(acls_dict) - group_dict = {"afi": "ipv4", "acls": acls_list} - group_list.append(group_dict) - acls_list = [] - if group_list: - config['access_groups'] = group_list - if access_group_v6_list: - for acl in access_group_v6_list: - a_name = acl.split()[0] - a_dir = acl.split()[1] - acls_dict = {"name": a_name, "direction": a_dir} - acls_list.append(acls_dict) - group_dict = {"acls": acls_list, "afi": "ipv6"} - group_list.append(group_dict) - acls_list = [] - if group_list: - config['access_groups'] = group_list - return utils.remove_empties(config) diff --git a/lib/ansible/module_utils/network/eos/facts/acls/acls.py b/lib/ansible/module_utils/network/eos/facts/acls/acls.py deleted file mode 100644 index edd7752c13..0000000000 --- a/lib/ansible/module_utils/network/eos/facts/acls/acls.py +++ /dev/null @@ -1,300 +0,0 @@ -# -# -*- coding: utf-8 -*- -# Copyright 2019 Red Hat -# GNU General Public License v3.0+ -# (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt) -""" -The eos acls fact class -It is in this file the configuration is collected from the device -for a given resource, parsed, and the facts tree is populated -based on the configuration. -""" - -from __future__ import (absolute_import, division, print_function) -__metaclass__ = type - -import re -from copy import deepcopy - -from ansible.module_utils.network.common import utils -from ansible.module_utils.network.eos.argspec.acls.acls import AclsArgs - - -class AclsFacts(object): - """ The eos acls fact class - """ - - def __init__(self, module, subspec='config', options='options'): - self._module = module - self.argument_spec = AclsArgs.argument_spec - spec = deepcopy(self.argument_spec) - if subspec: - if options: - facts_argument_spec = spec[subspec][options] - else: - facts_argument_spec = spec[subspec] - else: - facts_argument_spec = spec - - self.generated_spec = utils.generate_dict(facts_argument_spec) - - def get_device_data(self, connection): - return connection.get('show running-config | section access-list') - - def populate_facts(self, connection, ansible_facts, data=None): - """ Populate the facts for acls - :param connection: the device connection - :param ansible_facts: Facts dictionary - :param data: previously collected conf - :rtype: dictionary - :returns: facts - """ - if not data: - data = self.get_device_data(connection) - - # split the config into instances of the resource - find_pattern = r'(?:^|\n)(?:ip|ipv6) access\-list.*?(?=(?:^|\n)(?:ip|ipv6) access\-list|$)' - resources = [p for p in re.findall(find_pattern, - data, - re.DOTALL)] - - objs = [] - ipv4list = [] - ipv6list = [] - for resource in resources: - if "ipv6" in resource: - ipv6list.append(resource) - else: - ipv4list.append(resource) - ipv4list = ["\n".join(ipv4list)] - ipv6list = ["\n".join(ipv6list)] - for resource in ipv4list: - if resource: - obj = self.render_config(self.generated_spec, resource) - if obj: - objs.append(obj) - for resource in ipv6list: - if resource: - obj = self.render_config(self.generated_spec, resource) - if obj: - objs.append(obj) - - ansible_facts['ansible_network_resources'].pop('acls', None) - facts = {} - if objs: - facts['acls'] = [] - params = utils.validate_config(self.argument_spec, {'config': objs}) - for cfg in params['config']: - facts['acls'].append(utils.remove_empties(cfg)) - - ansible_facts['ansible_network_resources'].update(facts) - return ansible_facts - - def render_config(self, spec, conf): - """ - Render config as dictionary structure and delete keys - from spec for null values - - :param spec: The facts tree, generated from the argspec - :param conf: The configuration - :rtype: dictionary - :returns: The generated config - """ - config = deepcopy(spec) - afi_list = [] - acls_list = [] - name_dict = {} - standard = 0 - operator = ['eq', 'lt', 'neq', 'range', 'gt'] - flags = ['ack', 'established', 'fin', 'psh', 'rst', 'syn', 'urg'] - others = ['hop_limit', 'log', 'ttl', 'fragments', 'tracked'] - for dev_config in conf.split('\n'): - ace_dict = {} - if not dev_config: - continue - if dev_config == '!': - continue - dev_config = dev_config.strip() - matches = re.findall(r'(ip.*?) access-list (.*)', dev_config) - if matches: - afi = "ipv4" if matches[0][0] == "ip" else "ipv6" - ace_list = [] - if bool(name_dict): - acls_list.append(name_dict.copy()) - name_dict = {} - if afi not in afi_list: - afi_list.append(afi) - config.update({"afi": afi}) - if "standard" in matches[0][1]: - standard = 1 - name = matches[0][1].split() - name_dict.update({"name": name[1]}) - name_dict.update({"standard": True}) - else: - name_dict.update({"name": matches[0][1]}) - else: - source_dict = {} - dest_dict = {} - dev_config = re.sub('-', '_', dev_config) - dev_config_remainder = dev_config.split() - if "fragment_rules" in dev_config: - ace_dict.update({"sequence": dev_config_remainder.pop(0)}) - ace_dict.update({"fragment_rules": True}) - if "remark" in dev_config: - ace_dict.update({"sequence": dev_config_remainder.pop(0)}) - ace_dict.update({"remark": ' '.join(dev_config_remainder[1:])}) - seq = re.search(r'\d+ (permit|deny) .*', dev_config) - if seq: - ace_dict.update({"sequence": dev_config_remainder.pop(0)}) - ace_dict.update({"grant": dev_config_remainder.pop(0)}) - if dev_config_remainder[0] == "vlan": - vlan_str = "" - dev_config_remainder.pop(0) - if dev_config_remainder[0] == "inner": - vlan_str = dev_config_remainder.pop(0) + " " - vlan_str = dev_config_remainder.pop(0) + " " + dev_config_remainder.pop(0) - ace_dict.update({"vlan": vlan_str}) - if not standard: - protocol = dev_config_remainder[0] - ace_dict.update({"protocol": dev_config_remainder.pop(0)}) - src_prefix = re.search(r'/', dev_config_remainder[0]) - src_address = re.search(r'[a-z\d:\.]+', dev_config_remainder[0]) - if dev_config_remainder[0] == "host": - source_dict.update({"host": dev_config_remainder.pop(1)}) - dev_config_remainder.pop(0) - elif dev_config_remainder[0] == "any": - source_dict.update({"any": True}) - dev_config_remainder.pop(0) - elif src_prefix: - source_dict.update({"subnet_address": dev_config_remainder.pop(0)}) - elif src_address: - source_dict.update({"address": dev_config_remainder.pop(0)}) - source_dict.update({"wildcard_bits": dev_config_remainder.pop(0)}) - if dev_config_remainder: - if dev_config_remainder[0] in operator: - port_dict = {} - src_port = "" - src_opr = dev_config_remainder.pop(0) - portlist = dev_config_remainder[:] - for config_remainder in portlist: - addr = re.search(r'[\.\:]', config_remainder) - if config_remainder == "any" or config_remainder == "host" or addr: - break - else: - src_port = src_port + " " + config_remainder - dev_config_remainder.pop(0) - src_port = src_port.strip() - port_dict.update({src_opr: src_port}) - source_dict.update({"port_protocol": port_dict}) - ace_dict.update({"source": source_dict}) - if not dev_config_remainder or standard: - if dev_config_remainder and "log" in dev_config_remainder: - ace_dict.update({"log": True}) - if bool(ace_dict): - ace_list.append(ace_dict.copy()) - if len(ace_list): - name_dict = name_dict.copy() - name_dict.update({"aces": ace_list[:]}) - # acls_list.append(name_dict) - continue - dest_prefix = re.search(r'/', dev_config_remainder[0]) - dest_address = re.search(r'[a-z\d:\.]+', dev_config_remainder[0]) - if dev_config_remainder[0] == "host": - dest_dict.update({"host": dev_config_remainder.pop(1)}) - dev_config_remainder.pop(0) - elif dev_config_remainder[0] == "any": - dest_dict.update({"any": True}) - dev_config_remainder.pop(0) - elif dest_prefix: - dest_dict.update({"subnet_address": dev_config_remainder.pop(0)}) - elif dest_address: - dest_dict.update({"address": dev_config_remainder.pop(0)}) - dest_dict.update({"wildcard_bits": dev_config_remainder.pop(0)}) - if dev_config_remainder: - if dev_config_remainder[0] in operator: - port_dict = {} - dest_port = "" - dest_opr = dev_config_remainder.pop(0) - portlist = dev_config_remainder[:] - for config_remainder in portlist: - if config_remainder in operator or config_remainder in others: - break - else: - dest_port = dest_port + " " + config_remainder - dev_config_remainder.pop(0) - dest_port = dest_port.strip() - port_dict.update({dest_opr: dest_port}) - dest_dict.update({"port_protocol": port_dict}) - ace_dict.update({"destination": dest_dict}) - protocol_option_dict = {} - tcp_dict = {} - icmp_dict = {} - ip_dict = {} - if not dev_config_remainder: - if bool(ace_dict): - ace_list.append(ace_dict.copy()) - if len(ace_list): - name_dict = name_dict.copy() - name_dict.update({"aces": ace_list[:]}) - # acls_list.append(name_dict) - continue - if protocol == "tcp" or "6": - protocol = "tcp" - flags_dict = {} - if dev_config_remainder[0] in flags: - flaglist = dev_config_remainder.copy() - for config_remainder in flaglist: - if config_remainder not in flags: - break - else: - flags_dict.update({config_remainder: True}) - dev_config_remainder.pop(0) - if bool(flags_dict): - tcp_dict.update({"flags": flags_dict}) - if bool(tcp_dict): - protocol_option_dict.update({"tcp": tcp_dict}) - if protocol == "icmp" or protocol == "icmpv6" \ - or protocol == "1" or protocol == "58": - if protocol == "1": - protocol = "icmp" - elif protocol == "58": - protocol = "icmpv6" - if dev_config_remainder[0] not in others: - icmp_dict.update({dev_config_remainder[0]: True}) - dev_config_remainder.pop(0) - if bool(icmp_dict): - protocol_option_dict.update({protocol: icmp_dict}) - if protocol == "ip" or "ipv6": - if dev_config_remainder[0] == "nexthop_group": - dev_config_remainder.pop(0) - ip_dict.update({"nexthop_group": dev_config_remainder.pop(0)}) - if bool(ip_dict): - protocol_option_dict.update({protocol: ip_dict}) - if bool(protocol_option_dict): - ace_dict.update({"protocol_options": protocol_option_dict}) - if dev_config_remainder[0] == "ttl": - dev_config_remainder.pop(0) - op = dev_config_remainder.pop(0) - ttl_dict = {op: dev_config_remainder.pop(0)} - ace_dict.update({"ttl": ttl_dict}) - for config_remainder in dev_config_remainder: - if config_remainder in others: - if config_remainder == "hop_limit": - hop_index = dev_config_remainder.index(config_remainder) - hoplimit_dict = {dev_config_remainder[hop_index + 1]: dev_config_remainder[hop_index + 2]} - ace_dict.update({"hop_limit": hoplimit_dict}) - dev_config_remainder.pop(0) - continue - ace_dict.update({config_remainder: True}) - dev_config_remainder.pop(0) - if dev_config_remainder: - config.update({"line": dev_config}) - return utils.remove_empties(config) - if bool(ace_dict): - ace_list.append(ace_dict.copy()) - if len(ace_list): - name_dict = name_dict.copy() - name_dict.update({"aces": ace_list[:]}) - acls_list.append(name_dict.copy()) - config.update({"acls": acls_list}) - return utils.remove_empties(config) diff --git a/lib/ansible/module_utils/network/eos/facts/facts.py b/lib/ansible/module_utils/network/eos/facts/facts.py deleted file mode 100644 index 4ff7d87150..0000000000 --- a/lib/ansible/module_utils/network/eos/facts/facts.py +++ /dev/null @@ -1,72 +0,0 @@ -# -*- coding: utf-8 -*- -# Copyright 2019 Red Hat -# GNU General Public License v3.0+ (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt) -""" -The facts class for eos -this file validates each subset of facts and selectively -calls the appropriate facts gathering function -""" - -from __future__ import (absolute_import, division, print_function) -__metaclass__ = type - -from ansible.module_utils.network.common.facts.facts import FactsBase -from ansible.module_utils.network.eos.facts.interfaces.interfaces import InterfacesFacts -from ansible.module_utils.network.eos.facts.l2_interfaces.l2_interfaces import L2_interfacesFacts -from ansible.module_utils.network.eos.facts.l3_interfaces.l3_interfaces import L3_interfacesFacts -from ansible.module_utils.network.eos.facts.lacp.lacp import LacpFacts -from ansible.module_utils.network.eos.facts.lacp_interfaces.lacp_interfaces import Lacp_interfacesFacts -from ansible.module_utils.network.eos.facts.lag_interfaces.lag_interfaces import Lag_interfacesFacts -from ansible.module_utils.network.eos.facts.lldp_global.lldp_global import Lldp_globalFacts -from ansible.module_utils.network.eos.facts.lldp_interfaces.lldp_interfaces import Lldp_interfacesFacts -from ansible.module_utils.network.eos.facts.vlans.vlans import VlansFacts -from ansible.module_utils.network.eos.facts.legacy.base import Default, Hardware, Config, Interfaces -from ansible.module_utils.network.eos.facts.acl_interfaces.acl_interfaces import Acl_interfacesFacts -from ansible.module_utils.network.eos.facts.acls.acls import AclsFacts -from ansible.module_utils.network.eos.facts.static_routes.static_routes import Static_routesFacts - - -FACT_LEGACY_SUBSETS = dict( - default=Default, - hardware=Hardware, - interfaces=Interfaces, - config=Config, -) -FACT_RESOURCE_SUBSETS = dict( - interfaces=InterfacesFacts, - l2_interfaces=L2_interfacesFacts, - l3_interfaces=L3_interfacesFacts, - lacp=LacpFacts, - lacp_interfaces=Lacp_interfacesFacts, - lag_interfaces=Lag_interfacesFacts, - lldp_global=Lldp_globalFacts, - lldp_interfaces=Lldp_interfacesFacts, - vlans=VlansFacts, - acl_interfaces=Acl_interfacesFacts, - acls=AclsFacts, - static_routes=Static_routesFacts, -) - - -class Facts(FactsBase): - """ The fact class for eos - """ - - VALID_LEGACY_GATHER_SUBSETS = frozenset(FACT_LEGACY_SUBSETS.keys()) - VALID_RESOURCE_SUBSETS = frozenset(FACT_RESOURCE_SUBSETS.keys()) - - def get_facts(self, legacy_facts_type=None, resource_facts_type=None, data=None): - """ Collect the facts for eos - :param legacy_facts_type: List of legacy facts types - :param resource_facts_type: List of resource fact types - :param data: previously collected conf - :rtype: dict - :return: the facts gathered - """ - if self.VALID_RESOURCE_SUBSETS: - self.get_network_resources_facts(FACT_RESOURCE_SUBSETS, resource_facts_type, data) - - if self.VALID_LEGACY_GATHER_SUBSETS: - self.get_network_legacy_facts(FACT_LEGACY_SUBSETS, legacy_facts_type) - - return self.ansible_facts, self._warnings diff --git a/lib/ansible/module_utils/network/eos/facts/interfaces/interfaces.py b/lib/ansible/module_utils/network/eos/facts/interfaces/interfaces.py deleted file mode 100644 index c3c515e6f5..0000000000 --- a/lib/ansible/module_utils/network/eos/facts/interfaces/interfaces.py +++ /dev/null @@ -1,107 +0,0 @@ -# -*- coding: utf-8 -*- -# Copyright 2019 Red Hat -# GNU General Public License v3.0+ -# (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt) -""" -The eos interfaces fact class -It is in this file the configuration is collected from the device -for a given resource, parsed, and the facts tree is populated -based on the configuration. -""" - -from __future__ import (absolute_import, division, print_function) -__metaclass__ = type - -from copy import deepcopy -import re - -from ansible.module_utils.network.common import utils -from ansible.module_utils.network.eos.argspec.interfaces.interfaces import InterfacesArgs - - -class InterfacesFacts(object): - """ The eos interfaces fact class - """ - - def __init__(self, module, subspec='config', options='options'): - self._module = module - self.argument_spec = InterfacesArgs.argument_spec - spec = deepcopy(self.argument_spec) - if subspec: - if options: - facts_argument_spec = spec[subspec][options] - else: - facts_argument_spec = spec[subspec] - else: - facts_argument_spec = spec - - self.generated_spec = utils.generate_dict(facts_argument_spec) - - def get_device_data(self, connection): - return connection.get('show running-config | section ^interface') - - def populate_facts(self, connection, ansible_facts, data=None): - """ Populate the facts for interfaces - - :param connection: the device connection - :param ansible_facts: Facts dictionary - :param data: previously collected configuration - :rtype: dictionary - :returns: facts - """ - if not data: - data = self.get_device_data(connection) - - # operate on a collection of resource x - config = data.split('interface ') - objs = [] - for conf in config: - if conf: - obj = self.render_config(self.generated_spec, conf) - if obj: - objs.append(obj) - facts = {'interfaces': []} - if objs: - params = utils.validate_config(self.argument_spec, {'config': objs}) - for cfg in params['config']: - facts['interfaces'].append(utils.remove_empties(cfg)) - ansible_facts['ansible_network_resources'].update(facts) - - return ansible_facts - - def render_config(self, spec, conf): - """ - Render config as dictionary structure and delete keys from spec for null values - - :param spec: The facts tree, generated from the argspec - :param conf: The configuration - :rtype: dictionary - :returns: The generated config - """ - config = deepcopy(spec) - - # populate the facts from the configuration - config['name'] = re.match(r'(\S+)', conf).group(1) - description = utils.parse_conf_arg(conf, 'description') - if description is not None: - config['description'] = description.replace('"', '') - shutdown = utils.parse_conf_cmd_arg(conf, 'shutdown', False) - config['enabled'] = shutdown if shutdown is False else True - config['mtu'] = utils.parse_conf_arg(conf, 'mtu') - - speed_pair = utils.parse_conf_arg(conf, 'speed') - if speed_pair: - state = speed_pair.split() - if state[0] == 'forced': - state = state[1] - else: - state = state[0] - - if state == 'auto': - config['duplex'] = state - else: - # remaining options are all e.g., 10half or 40gfull - config['speed'] = state[:-4] - config['duplex'] = state[-4:] - - return utils.remove_empties(config) diff --git a/lib/ansible/module_utils/network/eos/facts/l2_interfaces/l2_interfaces.py b/lib/ansible/module_utils/network/eos/facts/l2_interfaces/l2_interfaces.py deleted file mode 100644 index 86e8109864..0000000000 --- a/lib/ansible/module_utils/network/eos/facts/l2_interfaces/l2_interfaces.py +++ /dev/null @@ -1,108 +0,0 @@ -# -*- coding: utf-8 -*- -# Copyright 2019 Red Hat -# GNU General Public License v3.0+ -# (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt) -""" -The eos l2_interfaces fact class -It is in this file the configuration is collected from the device -for a given resource, parsed, and the facts tree is populated -based on the configuration. -""" - -from __future__ import (absolute_import, division, print_function) -__metaclass__ = type - -from copy import deepcopy -import re - -from ansible.module_utils.network.common import utils -from ansible.module_utils.network.eos.argspec.l2_interfaces.l2_interfaces import L2_interfacesArgs - - -class L2_interfacesFacts(object): - """ The eos l2_interfaces fact class - """ - - def __init__(self, module, subspec='config', options='options'): - self._module = module - self.argument_spec = L2_interfacesArgs.argument_spec - spec = deepcopy(self.argument_spec) - if subspec: - if options: - facts_argument_spec = spec[subspec][options] - else: - facts_argument_spec = spec[subspec] - else: - facts_argument_spec = spec - - self.generated_spec = utils.generate_dict(facts_argument_spec) - - def get_device_data(self, connection): - return connection.get('show running-config | section ^interface') - - def populate_facts(self, connection, ansible_facts, data=None): - """ Populate the facts for l2_interfaces - - :param connection: the device connection - :param ansible_facts: Facts dictionary - :param data: previously collected configuration - :rtype: dictionary - :returns: facts - """ - if not data: - data = self.get_device_data(connection) - - # operate on a collection of resource x - config = data.split('interface ') - objs = [] - for conf in config: - if conf: - obj = self.render_config(self.generated_spec, conf) - if obj: - objs.append(obj) - facts = {} - if objs: - params = utils.validate_config(self.argument_spec, {'config': objs}) - facts['l2_interfaces'] = [utils.remove_empties(cfg) for cfg in params['config']] - ansible_facts['ansible_network_resources'].update(facts) - - return ansible_facts - - def render_config(self, spec, conf): - """ - Render config as dictionary structure and delete keys from spec for null values - - :param spec: The facts tree, generated from the argspec - :param conf: The configuration - :rtype: dictionary - :returns: The generated config - """ - config = deepcopy(spec) - - # populate the facts from the configuration - config['name'] = re.match(r'(\S+)', conf).group(1).replace('"', '') - has_mode = re.search(r"switchport mode (\S+)", conf) - if has_mode: - config["mode"] = has_mode.group(1) - - has_access = re.search(r"switchport access vlan (\d+)", conf) - if has_access: - config["access"] = {"vlan": int(has_access.group(1))} - - has_trunk = re.findall(r"switchport trunk (.+)", conf) - if has_trunk: - trunk = {} - for match in has_trunk: - has_native = re.match(r"native vlan (\d+)", match) - if has_native: - trunk["native_vlan"] = int(has_native.group(1)) - continue - - has_allowed = re.match(r"allowed vlan (\S+)", match) - if has_allowed: - # TODO: listify? - trunk["trunk_allowed_vlans"] = has_allowed.group(1) - continue - config['trunk'] = trunk - - return utils.remove_empties(config) diff --git a/lib/ansible/module_utils/network/eos/facts/l3_interfaces/l3_interfaces.py b/lib/ansible/module_utils/network/eos/facts/l3_interfaces/l3_interfaces.py deleted file mode 100644 index 67041729df..0000000000 --- a/lib/ansible/module_utils/network/eos/facts/l3_interfaces/l3_interfaces.py +++ /dev/null @@ -1,101 +0,0 @@ -# -*- coding: utf-8 -*- -# Copyright 2019 Red Hat -# GNU General Public License v3.0+ -# (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt) -""" -The eos l3_interfaces fact class -It is in this file the configuration is collected from the device -for a given resource, parsed, and the facts tree is populated -based on the configuration. -""" - -from __future__ import (absolute_import, division, print_function) -__metaclass__ = type - -from copy import deepcopy -import re - -from ansible.module_utils.network.common import utils -from ansible.module_utils.network.eos.argspec.l3_interfaces.l3_interfaces import L3_interfacesArgs - - -class L3_interfacesFacts(object): - """ The eos l3_interfaces fact class - """ - - def __init__(self, module, subspec='config', options='options'): - self._module = module - self.argument_spec = L3_interfacesArgs.argument_spec - spec = deepcopy(self.argument_spec) - if subspec: - if options: - facts_argument_spec = spec[subspec][options] - else: - facts_argument_spec = spec[subspec] - else: - facts_argument_spec = spec - - self.generated_spec = utils.generate_dict(facts_argument_spec) - - def populate_facts(self, connection, ansible_facts, data=None): - """ Populate the facts for l3_interfaces - :param connection: the device connection - :param ansible_facts: Facts dictionary - :param data: previously collected configuration - :rtype: dictionary - :returns: facts - """ - if not data: - data = connection.get('show running-config | section ^interface') - - # split the config into instances of the resource - resource_delim = 'interface' - find_pattern = r'(?:^|\n)%s.*?(?=(?:^|\n)%s|$)' % (resource_delim, resource_delim) - resources = [p.strip() for p in re.findall(find_pattern, data, re.DOTALL)] - - objs = [] - for resource in resources: - if resource: - obj = self.render_config(self.generated_spec, resource) - if obj: - objs.append(obj) - facts = {} - if objs: - params = utils.validate_config(self.argument_spec, {'config': objs}) - facts['l3_interfaces'] = [utils.remove_empties(cfg) for cfg in params['config']] - ansible_facts['ansible_network_resources'].update(facts) - return ansible_facts - - def render_config(self, spec, conf): - """ - Render config as dictionary structure and delete keys - from spec for null values - - :param spec: The facts tree, generated from the argspec - :param conf: The configuration - :rtype: dictionary - :returns: The generated config - """ - config = deepcopy(spec) - - config['name'] = utils.parse_conf_arg(conf, 'interface') - - matches = re.findall(r'.*ip address (.+)$', conf, re.MULTILINE) - if matches: - config["ipv4"] = [] - for match in matches: - address, dummy, remainder = match.partition(" ") - ipv4 = {"address": address} - if remainder == "secondary": - ipv4["secondary"] = True - config['ipv4'].append(ipv4) - - matches = re.findall(r'.*ipv6 address (.+)$', conf, re.MULTILINE) - if matches: - config["ipv6"] = [] - for match in matches: - address, dummy, remainder = match.partition(" ") - ipv6 = {"address": address} - config['ipv6'].append(ipv6) - - return utils.remove_empties(config) diff --git a/lib/ansible/module_utils/network/eos/facts/lacp/lacp.py b/lib/ansible/module_utils/network/eos/facts/lacp/lacp.py deleted file mode 100644 index 370cb9df67..0000000000 --- a/lib/ansible/module_utils/network/eos/facts/lacp/lacp.py +++ /dev/null @@ -1,89 +0,0 @@ -# -*- coding: utf-8 -*- -# Copyright 2019 Red Hat -# GNU General Public License v3.0+ -# (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt) -""" -The eos lacp fact class -It is in this file the configuration is collected from the device -for a given resource, parsed, and the facts tree is populated -based on the configuration. -""" - -from __future__ import (absolute_import, division, print_function) -__metaclass__ = type - -import re -from copy import deepcopy - -from ansible.module_utils.network.common import utils -from ansible.module_utils.network.eos.argspec.lacp.lacp import LacpArgs - - -class LacpFacts(object): - """ The eos lacp fact class - """ - - def __init__(self, module, subspec='config', options='options'): - self._module = module - self.argument_spec = LacpArgs.argument_spec - spec = deepcopy(self.argument_spec) - if subspec: - if options: - facts_argument_spec = spec[subspec][options] - else: - facts_argument_spec = spec[subspec] - else: - facts_argument_spec = spec - - self.generated_spec = utils.generate_dict(facts_argument_spec) - - def get_device_data(self, connection): - return connection.get('show running-config | section ^lacp') - - def populate_facts(self, connection, ansible_facts, data=None): - """ Populate the facts for lacp - :param connection: the device connection - :param ansible_facts: Facts dictionary - :param data: previously collected configuration - :rtype: dictionary - :returns: facts - """ - if not data: - data = self.get_device_data(connection) - - # split the config into instances of the resource - resource_delim = 'lacp' - find_pattern = r'(?:^|\n)%s.*?(?=(?:^|\n)%s|$)' % (resource_delim, - resource_delim) - resources = [p.strip() for p in re.findall(find_pattern, data, re.DOTALL)] - - objs = {} - for resource in resources: - if resource: - obj = self.render_config(self.generated_spec, resource) - if obj: - objs.update(obj) - - ansible_facts['ansible_network_resources'].pop('lacp', None) - facts = {'lacp': {}} - if objs: - params = utils.validate_config(self.argument_spec, {'config': objs}) - facts['lacp'] = utils.remove_empties(params['config']) - - ansible_facts['ansible_network_resources'].update(facts) - return ansible_facts - - def render_config(self, spec, conf): - """ - Render config as dictionary structure and delete keys - from spec for null values - - :param spec: The facts tree, generated from the argspec - :param conf: The configuration - :rtype: dictionary - :returns: The generated config - """ - config = deepcopy(spec) - config['system']['priority'] = utils.parse_conf_arg(conf, 'system-priority') - - return utils.remove_empties(config) diff --git a/lib/ansible/module_utils/network/eos/facts/lacp_interfaces/lacp_interfaces.py b/lib/ansible/module_utils/network/eos/facts/lacp_interfaces/lacp_interfaces.py deleted file mode 100644 index 6f0560fe3b..0000000000 --- a/lib/ansible/module_utils/network/eos/facts/lacp_interfaces/lacp_interfaces.py +++ /dev/null @@ -1,90 +0,0 @@ -# -*- coding: utf-8 -*- -# Copyright 2019 Red Hat -# GNU General Public License v3.0+ -# (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt) -""" -The eos lacp_interfaces fact class -It is in this file the configuration is collected from the device -for a given resource, parsed, and the facts tree is populated -based on the configuration. -""" - -from __future__ import (absolute_import, division, print_function) -__metaclass__ = type - -import re -from copy import deepcopy - -from ansible.module_utils.network.common import utils -from ansible.module_utils.network.eos.argspec.lacp_interfaces.lacp_interfaces import Lacp_interfacesArgs - - -class Lacp_interfacesFacts(object): - """ The eos lacp_interfaces fact class - """ - - def __init__(self, module, subspec='config', options='options'): - self._module = module - self.argument_spec = Lacp_interfacesArgs.argument_spec - spec = deepcopy(self.argument_spec) - if subspec: - if options: - facts_argument_spec = spec[subspec][options] - else: - facts_argument_spec = spec[subspec] - else: - facts_argument_spec = spec - - self.generated_spec = utils.generate_dict(facts_argument_spec) - - def get_device_data(self, connection): - return connection.get('show running-config | section lacp') - - def populate_facts(self, connection, ansible_facts, data=None): - """ Populate the facts for lacp_interfaces - :param connection: the device connection - :param ansible_facts: Facts dictionary - :param data: previously collected configuration - :rtype: dictionary - :returns: facts - """ - if not data: - data = self.get_device_data(connection) - - # split the config into instances of the resource - resource_delim = 'interface' - find_pattern = r'(?:^|\n)%s.*?(?=(?:^|\n)%s|$)' % (resource_delim, resource_delim) - resources = [p.strip() for p in re.findall(find_pattern, data, re.DOTALL)] - - objs = [] - for resource in resources: - if resource: - obj = self.render_config(self.generated_spec, resource) - if obj: - objs.append(obj) - - ansible_facts['ansible_network_resources'].pop('lacp_interfaces', None) - facts = {} - if objs: - params = utils.validate_config(self.argument_spec, {'config': objs}) - facts['lacp_interfaces'] = [utils.remove_empties(cfg) for cfg in params['config']] - - ansible_facts['ansible_network_resources'].update(facts) - return ansible_facts - - def render_config(self, spec, conf): - """ - Render config as dictionary structure and delete keys - from spec for null values - - :param spec: The facts tree, generated from the argspec - :param conf: The configuration - :rtype: dictionary - :returns: The generated config - """ - config = deepcopy(spec) - config['name'] = utils.parse_conf_arg(conf, 'interface') - config['port_priority'] = utils.parse_conf_arg(conf, 'port-priority') - config['rate'] = utils.parse_conf_arg(conf, 'rate') - - return utils.remove_empties(config) diff --git a/lib/ansible/module_utils/network/eos/facts/lag_interfaces/lag_interfaces.py b/lib/ansible/module_utils/network/eos/facts/lag_interfaces/lag_interfaces.py deleted file mode 100644 index d93152a01b..0000000000 --- a/lib/ansible/module_utils/network/eos/facts/lag_interfaces/lag_interfaces.py +++ /dev/null @@ -1,103 +0,0 @@ -# -*- coding: utf-8 -*- -# Copyright 2019 Red Hat -# GNU General Public License v3.0+ -# (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt) -""" -The eos lag_interfaces fact class -It is in this file the configuration is collected from the device -for a given resource, parsed, and the facts tree is populated -based on the configuration. -""" - -from __future__ import (absolute_import, division, print_function) -__metaclass__ = type - -from copy import deepcopy -import re - -from ansible.module_utils.network.common import utils -from ansible.module_utils.network.eos.argspec.lag_interfaces.lag_interfaces import Lag_interfacesArgs - - -class Lag_interfacesFacts(object): - """ The eos lag_interfaces fact class - """ - - def __init__(self, module, subspec='config', options='options'): - self._module = module - self.argument_spec = Lag_interfacesArgs.argument_spec - spec = deepcopy(self.argument_spec) - if subspec: - if options: - facts_argument_spec = spec[subspec][options] - else: - facts_argument_spec = spec[subspec] - else: - facts_argument_spec = spec - - self.generated_spec = utils.generate_dict(facts_argument_spec) - - def populate_facts(self, connection, ansible_facts, data=None): - """ Populate the facts for lag_interfaces - :param connection: the device connection - :param ansible_facts: Facts dictionary - :param data: previously collected configuration - :rtype: dictionary - :returns: facts - """ - if not data: - data = connection.get('show running-config | section ^interface') - - # split the config into instances of the resource - resource_delim = 'interface' - find_pattern = r'(?:^|\n)%s.*?(?=(?:^|\n)%s|$)' % (resource_delim, - resource_delim) - resources = [p.strip() for p in re.findall(find_pattern, - data, - re.DOTALL)] - - objs = {} - for resource in resources: - if resource: - obj = self.render_config(self.generated_spec, resource) - if obj: - group_name = obj['name'] - if group_name in objs and "members" in obj: - config = objs[group_name] - if "members" not in config: - config["members"] = [] - objs[group_name]['members'].extend(obj['members']) - else: - objs[group_name] = obj - objs = list(objs.values()) - facts = {'lag_interfaces': []} - if objs: - params = utils.validate_config(self.argument_spec, {'config': objs}) - facts['lag_interfaces'] = [utils.remove_empties(cfg) for cfg in params['config']] - ansible_facts['ansible_network_resources'].update(facts) - return ansible_facts - - def render_config(self, spec, conf): - """ - Render config as dictionary structure and delete keys - from spec for null values - - :param spec: The facts tree, generated from the argspec - :param conf: The configuration - :rtype: dictionary - :returns: The generated config - """ - config = deepcopy(spec) - interface_name = utils.parse_conf_arg(conf, 'interface') - if interface_name.startswith("Port-Channel"): - config["name"] = interface_name - return utils.remove_empties(config) - - interface = {'member': interface_name} - match = re.match(r'.*channel-group (\d+) mode (\S+)', conf, re.MULTILINE | re.DOTALL) - if match: - config['name'], interface['mode'] = match.groups() - config["name"] = "Port-Channel" + config["name"] - config['members'] = [interface] - - return utils.remove_empties(config) diff --git a/lib/ansible/module_utils/network/eos/facts/legacy/base.py b/lib/ansible/module_utils/network/eos/facts/legacy/base.py deleted file mode 100644 index 50bb82e849..0000000000 --- a/lib/ansible/module_utils/network/eos/facts/legacy/base.py +++ /dev/null @@ -1,182 +0,0 @@ -# -*- coding: utf-8 -*- -# Copyright 2019 Red Hat -# GNU General Public License v3.0+ -# (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt) - -from __future__ import (absolute_import, division, print_function) -__metaclass__ = type - -import platform -import re - -from ansible.module_utils.six import iteritems -from ansible.module_utils.network.eos.eos import run_commands, get_capabilities - - -class FactsBase(object): - - COMMANDS = frozenset() - - def __init__(self, module): - self.module = module - self.warnings = list() - self.facts = dict() - self.responses = None - - def populate(self): - self.responses = run_commands(self.module, list(self.COMMANDS), check_rc=False) - - -class Default(FactsBase): - - SYSTEM_MAP = { - 'serialNumber': 'serialnum', - } - - COMMANDS = [ - 'show version | json', - 'show hostname | json', - ] - - def populate(self): - super(Default, self).populate() - data = self.responses[0] - for key, value in iteritems(self.SYSTEM_MAP): - if key in data: - self.facts[value] = data[key] - - self.facts.update(self.responses[1]) - self.facts.update(self.platform_facts()) - - def platform_facts(self): - platform_facts = {} - - resp = get_capabilities(self.module) - device_info = resp['device_info'] - - platform_facts['system'] = device_info['network_os'] - - for item in ('model', 'image', 'version', 'platform', 'hostname'): - val = device_info.get('network_os_%s' % item) - if val: - platform_facts[item] = val - - platform_facts['api'] = resp['network_api'] - platform_facts['python_version'] = platform.python_version() - - return platform_facts - - -class Hardware(FactsBase): - - COMMANDS = [ - 'dir all-filesystems', - 'show version | json' - ] - - def populate(self): - super(Hardware, self).populate() - self.facts.update(self.populate_filesystems()) - self.facts.update(self.populate_memory()) - - def populate_filesystems(self): - data = self.responses[0] - - if isinstance(data, dict): - data = data['messages'][0] - - fs = re.findall(r'^Directory of (.+)/', data, re.M) - return dict(filesystems=fs) - - def populate_memory(self): - values = self.responses[1] - return dict( - memfree_mb=int(values['memFree']) / 1024, - memtotal_mb=int(values['memTotal']) / 1024 - ) - - -class Config(FactsBase): - - COMMANDS = ['show running-config'] - - def populate(self): - super(Config, self).populate() - self.facts['config'] = self.responses[0] - - -class Interfaces(FactsBase): - - INTERFACE_MAP = { - 'description': 'description', - 'physicalAddress': 'macaddress', - 'mtu': 'mtu', - 'bandwidth': 'bandwidth', - 'duplex': 'duplex', - 'lineProtocolStatus': 'lineprotocol', - 'interfaceStatus': 'operstatus', - 'forwardingModel': 'type' - } - - COMMANDS = [ - 'show interfaces | json', - 'show lldp neighbors | json' - ] - - def populate(self): - super(Interfaces, self).populate() - - self.facts['all_ipv4_addresses'] = list() - self.facts['all_ipv6_addresses'] = list() - - data = self.responses[0] - self.facts['interfaces'] = self.populate_interfaces(data) - - data = self.responses[1] - if data: - self.facts['neighbors'] = self.populate_neighbors(data['lldpNeighbors']) - - def populate_interfaces(self, data): - facts = dict() - for key, value in iteritems(data['interfaces']): - intf = dict() - - for remote, local in iteritems(self.INTERFACE_MAP): - if remote in value: - intf[local] = value[remote] - - if 'interfaceAddress' in value: - intf['ipv4'] = dict() - for entry in value['interfaceAddress']: - intf['ipv4']['address'] = entry['primaryIp']['address'] - intf['ipv4']['masklen'] = entry['primaryIp']['maskLen'] - self.add_ip_address(entry['primaryIp']['address'], 'ipv4') - - if 'interfaceAddressIp6' in value: - intf['ipv6'] = dict() - for entry in value['interfaceAddressIp6']['globalUnicastIp6s']: - intf['ipv6']['address'] = entry['address'] - intf['ipv6']['subnet'] = entry['subnet'] - self.add_ip_address(entry['address'], 'ipv6') - - facts[key] = intf - - return facts - - def add_ip_address(self, address, family): - if family == 'ipv4': - self.facts['all_ipv4_addresses'].append(address) - else: - self.facts['all_ipv6_addresses'].append(address) - - def populate_neighbors(self, neighbors): - facts = dict() - for value in neighbors: - port = value['port'] - if port not in facts: - facts[port] = list() - lldp = dict() - lldp['host'] = value['neighborDevice'] - lldp['port'] = value['neighborPort'] - facts[port].append(lldp) - return facts diff --git a/lib/ansible/module_utils/network/eos/facts/lldp_global/lldp_global.py b/lib/ansible/module_utils/network/eos/facts/lldp_global/lldp_global.py deleted file mode 100644 index b74469d700..0000000000 --- a/lib/ansible/module_utils/network/eos/facts/lldp_global/lldp_global.py +++ /dev/null @@ -1,86 +0,0 @@ -# -# -*- coding: utf-8 -*- -# Copyright 2019 Red Hat -# GNU General Public License v3.0+ -# (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt) -""" -The eos lldp_global fact class -It is in this file the configuration is collected from the device -for a given resource, parsed, and the facts tree is populated -based on the configuration. -""" - -from __future__ import (absolute_import, division, print_function) -__metaclass__ = type - -import re -from copy import deepcopy - -from ansible.module_utils.network.common import utils -from ansible.module_utils.network.eos.argspec.lldp_global.lldp_global import Lldp_globalArgs - - -class Lldp_globalFacts(object): - """ The eos lldp_global fact class - """ - - def __init__(self, module, subspec='config', options='options'): - self._module = module - self.argument_spec = Lldp_globalArgs.argument_spec - spec = deepcopy(self.argument_spec) - if subspec: - if options: - facts_argument_spec = spec[subspec][options] - else: - facts_argument_spec = spec[subspec] - else: - facts_argument_spec = spec - - self.generated_spec = utils.generate_dict(facts_argument_spec) - - def populate_facts(self, connection, ansible_facts, data=None): - """ Populate the facts for lldp_global - :param connection: the device connection - :param ansible_facts: Facts dictionary - :param data: previously collected conf - :rtype: dictionary - :returns: facts - """ - if not data: - data = connection.get('show running-config | section lldp') - - obj = {} - if data: - obj.update(self.render_config(self.generated_spec, data)) - - ansible_facts['ansible_network_resources'].pop('lldp_global', None) - facts = {} - if obj: - params = utils.validate_config(self.argument_spec, {'config': obj}) - facts['lldp_global'] = utils.remove_empties(params['config']) - else: - facts['lldp_global'] = {} - - ansible_facts['ansible_network_resources'].update(facts) - return ansible_facts - - def render_config(self, spec, conf): - """ - Render config as dictionary structure and delete keys - from spec for null values - - :param spec: The facts tree, generated from the argspec - :param conf: The configuration - :rtype: dictionary - :returns: The generated config - """ - config = deepcopy(spec) - config['holdtime'] = utils.parse_conf_arg(conf, 'holdtime') - config['reinit'] = utils.parse_conf_arg(conf, 'reinit') - config['timer'] = utils.parse_conf_arg(conf, 'timer') - - for match in re.findall(r'^(no)? lldp tlv-select (\S+)', conf, re.MULTILINE): - tlv_option = match[1].replace("-", "_") - config['tlv_select'][tlv_option] = bool(match[0] != "no") - - return utils.remove_empties(config) diff --git a/lib/ansible/module_utils/network/eos/facts/lldp_interfaces/lldp_interfaces.py b/lib/ansible/module_utils/network/eos/facts/lldp_interfaces/lldp_interfaces.py deleted file mode 100644 index 8fa02697f6..0000000000 --- a/lib/ansible/module_utils/network/eos/facts/lldp_interfaces/lldp_interfaces.py +++ /dev/null @@ -1,92 +0,0 @@ -# -*- coding: utf-8 -*- -# Copyright 2019 Red Hat -# GNU General Public License v3.0+ -# (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt) -""" -The eos lldp_interfaces fact class -It is in this file the configuration is collected from the device -for a given resource, parsed, and the facts tree is populated -based on the configuration. -""" - -from __future__ import (absolute_import, division, print_function) -__metaclass__ = type - -import re -from copy import deepcopy - -from ansible.module_utils.network.common import utils -from ansible.module_utils.network.eos.argspec.lldp_interfaces.lldp_interfaces import Lldp_interfacesArgs - - -class Lldp_interfacesFacts(object): - """ The eos lldp_interfaces fact class - """ - - def __init__(self, module, subspec='config', options='options'): - self._module = module - self.argument_spec = Lldp_interfacesArgs.argument_spec - spec = deepcopy(self.argument_spec) - if subspec: - if options: - facts_argument_spec = spec[subspec][options] - else: - facts_argument_spec = spec[subspec] - else: - facts_argument_spec = spec - - self.generated_spec = utils.generate_dict(facts_argument_spec) - - def populate_facts(self, connection, ansible_facts, data=None): - """ Populate the facts for lldp_interfaces - :param connection: the device connection - :param ansible_facts: Facts dictionary - :param data: previously collected configuration - :rtype: dictionary - :returns: facts - """ - if not data: - data = connection.get('show running-config | section lldp') - - # split the config into instances of the resource - resource_delim = 'interface' - find_pattern = r'(?:^|\n)%s.*?(?=(?:^|\n)%s|$)' % (resource_delim, - resource_delim) - resources = [p.strip() for p in re.findall(find_pattern, - data, - re.DOTALL)] - - objs = [] - for resource in resources: - if resource: - obj = self.render_config(self.generated_spec, resource) - if obj: - objs.append(obj) - - ansible_facts['ansible_network_resources'].pop('lldp_interfaces', None) - facts = {} - if objs: - params = utils.validate_config(self.argument_spec, {'config': objs}) - facts['lldp_interfaces'] = [utils.remove_empties(cfg) for cfg in params['config']] - - ansible_facts['ansible_network_resources'].update(facts) - return ansible_facts - - def render_config(self, spec, conf): - """ - Render config as dictionary structure and delete keys - from spec for null values - - :param spec: The facts tree, generated from the argspec - :param conf: The configuration - :rtype: dictionary - :returns: The generated config - """ - config = deepcopy(spec) - config['name'] = utils.parse_conf_arg(conf, 'interface') - - matches = re.findall(r'(no )?lldp (\S+)', conf) - for match in matches: - config[match[1]] = not bool(match[0]) - - return utils.remove_empties(config) diff --git a/lib/ansible/module_utils/network/eos/facts/static_routes/static_routes.py b/lib/ansible/module_utils/network/eos/facts/static_routes/static_routes.py deleted file mode 100644 index 810b2bfa0e..0000000000 --- a/lib/ansible/module_utils/network/eos/facts/static_routes/static_routes.py +++ /dev/null @@ -1,202 +0,0 @@ -# -# -*- coding: utf-8 -*- -# Copyright 2019 Red Hat -# GNU General Public License v3.0+ -# (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt) -""" -The eos static_routes fact class -It is in this file the configuration is collected from the device -for a given resource, parsed, and the facts tree is populated -based on the configuration. -""" - -from __future__ import (absolute_import, division, print_function) -__metaclass__ = type - -import re -from copy import deepcopy - -from ansible.module_utils.network.common import utils -from ansible.module_utils.network.eos.argspec.static_routes.static_routes import Static_routesArgs - - -class Static_routesFacts(object): - """ The eos static_routes fact class - """ - - def __init__(self, module, subspec='config', options='options'): - self._module = module - self.argument_spec = Static_routesArgs.argument_spec - spec = deepcopy(self.argument_spec) - if subspec: - if options: - facts_argument_spec = spec[subspec][options] - else: - facts_argument_spec = spec[subspec] - else: - facts_argument_spec = spec - - self.generated_spec = utils.generate_dict(facts_argument_spec) - - def get_device_data(self, connection): - return connection.get('show running-config | grep route') - - def populate_facts(self, connection, ansible_facts, data=None): - """ Populate the facts for static_routes - :param connection: the device connection - :param ansible_facts: Facts dictionary - :param data: previously collected conf - :rtype: dictionary - :returns: facts - """ - if not data: - data = self.get_device_data(connection) - - # split the config into instances of the resource - resource_delim = 'ip.* route' - find_pattern = r'(?:^|\n)%s.*?(?=(?:^|\n)%s|$)' % (resource_delim, - resource_delim) - resources = [p.strip() for p in re.findall(find_pattern, data)] - resources_without_vrf = [] - resource_vrf = {} - for resource in resources: - if resource and "vrf" not in resource: - resources_without_vrf.append(resource) - else: - vrf = re.search(r'ip(v6)* route vrf (.*?) .*', resource) - if vrf.group(2) in resource_vrf.keys(): - vrf_val = resource_vrf[vrf.group(2)] - vrf_val.append(resource) - resource_vrf.update({vrf.group(2): vrf_val}) - else: - resource_vrf.update({vrf.group(2): [resource]}) - resources_without_vrf = ["\n".join(resources_without_vrf)] - for vrf in resource_vrf.keys(): - vrflist = ["\n".join(resource_vrf[vrf])] - resource_vrf.update({vrf: vrflist}) - objs = [] - for resource in resources_without_vrf: - if resource: - obj = self.render_config(self.generated_spec, resource) - if obj: - objs.append(obj) - for resource in resource_vrf.keys(): - if resource: - obj = self.render_config(self.generated_spec, resource_vrf[resource][0]) - if obj: - objs.append(obj) - ansible_facts['ansible_network_resources'].pop('static_routes', None) - facts = {} - if objs: - facts['static_routes'] = [] - params = utils.validate_config(self.argument_spec, {'config': objs}) - for cfg in params['config']: - facts['static_routes'].append(utils.remove_empties(cfg)) - ansible_facts['ansible_network_resources'].update(facts) - return ansible_facts - - def render_config(self, spec, conf): - """ - Render config as dictionary structure and delete keys - from spec for null values - - :param spec: The facts tree, generated from the argspec - :param conf: The configuration - :rtype: dictionary - :returns: The generated config - """ - config = deepcopy(spec) - address_family_dict = {} - route_dict = {} - dest_list = [] - afi_list = [] - vrf_list = [] - routes = [] - config["address_families"] = [] - next_hops = {} - interface_list = ["Ethernet", "Loopback", "Management", - "Port-Channel", "Tunnel", "Vlan", "Vxlan", "vtep"] - conf_list = conf.split('\n') - for conf_elem in conf_list: - matches = re.findall(r'(ip|ipv6) route ([\d\.\/:]+|vrf) (.+)$', conf_elem) - if matches: - remainder = matches[0][2].split() - route_update = False - if matches[0][1] == "vrf": - vrf = remainder.pop(0) - # new vrf - if vrf not in vrf_list and vrf_list: - route_dict.update({"next_hops": next_hops}) - routes.append(route_dict) - address_family_dict.update({"routes": routes}) - config["address_families"].append(address_family_dict) - route_update = True - config.update({"vrf": vrf}) - vrf_list.append(vrf) - dest = remainder.pop(0) - else: - config["vrf"] = None - dest = matches[0][1] - afi = "ipv4" if matches[0][0] == "ip" else "ipv6" - if afi not in afi_list: - if afi_list and not route_update: - # new afi and not the first updating all prev configs - route_dict.update({"next_hops": next_hops}) - routes.append(route_dict) - address_family_dict.update({"routes": routes}) - config["address_families"].append(address_family_dict) - route_update = True - address_family_dict = {} - address_family_dict.update({"afi": afi}) - routes = [] - afi_list.append(afi) - # To check the format of the dest - prefix = re.search(r'/', dest) - if not prefix: - dest = dest + ' ' + remainder.pop(0) - if dest not in dest_list: - # For new dest and not the first dest - if dest_list and not route_update: - route_dict.update({"next_hops": next_hops}) - routes.append(route_dict) - dest_list.append(dest) - next_hops = [] - route_dict = {} - route_dict.update({"dest": dest}) - nexthops = {} - nxthop_addr = re.search(r'[\.\:]', remainder[0]) - if nxthop_addr: - nexthops.update({"interface": remainder.pop(0)}) - if remainder and remainder[0] == "label": - nexthops.update({"mpls_label": remainder.pop(1)}) - remainder.pop(0) - elif re.search(r'Nexthop-Group', remainder[0]): - nexthops.update({"nexthop_grp": remainder.pop(1)}) - remainder.pop(0) - else: - interface = remainder.pop(0) - if interface in interface_list: - interface = interface + " " + remainder.pop(0) - nexthops.update({"interface": interface}) - for attribute in remainder: - forward_addr = re.search(r'([\dA-Fa-f]+[:\.]+)+[\dA-Fa-f]+', attribute) - if forward_addr: - nexthops.update({"forward_router_address": remainder.pop(remainder.index(attribute))}) - for attribute in remainder: - for params in ["tag", "name", "track"]: - if attribute == params: - keyname = params - if attribute == "name": - keyname = "description" - nexthops.update({keyname: remainder.pop(remainder.index(attribute) + 1)}) - remainder.pop(remainder.index(attribute)) - if remainder: - metric = re.search(r'\d+', remainder[0]) - if metric: - nexthops.update({"admin_distance": remainder.pop(0)}) - next_hops.append(nexthops) - route_dict.update({"next_hops": next_hops}) - routes.append(route_dict) - address_family_dict.update({"routes": routes}) - config["address_families"].append(address_family_dict) - return utils.remove_empties(config) diff --git a/lib/ansible/module_utils/network/eos/facts/vlans/vlans.py b/lib/ansible/module_utils/network/eos/facts/vlans/vlans.py deleted file mode 100644 index 0e01b6c216..0000000000 --- a/lib/ansible/module_utils/network/eos/facts/vlans/vlans.py +++ /dev/null @@ -1,108 +0,0 @@ -# -*- coding: utf-8 -*- -# Copyright 2019 Red Hat -# GNU General Public License v3.0+ -# (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt) -""" -The eos vlans fact class -It is in this file the configuration is collected from the device -for a given resource, parsed, and the facts tree is populated -based on the configuration. -""" - -from __future__ import (absolute_import, division, print_function) -__metaclass__ = type - -from copy import deepcopy -import re - -from ansible.module_utils.network.common import utils -from ansible.module_utils.network.eos.argspec.vlans.vlans import VlansArgs - - -class VlansFacts(object): - """ The eos vlans fact class - """ - - def __init__(self, module, subspec='config', options='options'): - self._module = module - self.argument_spec = VlansArgs.argument_spec - spec = deepcopy(self.argument_spec) - if subspec: - if options: - facts_argument_spec = spec[subspec][options] - else: - facts_argument_spec = spec[subspec] - else: - facts_argument_spec = spec - - self.generated_spec = utils.generate_dict(facts_argument_spec) - - def populate_facts(self, connection, ansible_facts, data=None): - """ Populate the facts for vlans - :param connection: the device connection - :param ansible_facts: Facts dictionary - :param data: previously collected conf - :rtype: dictionary - :returns: facts - """ - if not data: - data = connection.get('show running-config | section ^vlan') - - # split the config into instances of the resource - resource_delim = 'vlan' - find_pattern = r'(?:^|\n)%s.*?(?=(?:^|\n)%s|$)' % (resource_delim, - resource_delim) - resources = [p.strip() for p in re.findall(find_pattern, - data, - re.DOTALL)] - - objs = [] - for resource in resources: - if resource: - obj = self.render_config(self.generated_spec, resource) - if obj: - objs.extend(obj) - - ansible_facts['ansible_network_resources'].pop('vlans', None) - facts = {} - if objs: - params = utils.validate_config(self.argument_spec, {'config': objs}) - facts['vlans'] = [utils.remove_empties(cfg) for cfg in params['config']] - - ansible_facts['ansible_network_resources'].update(facts) - return ansible_facts - - def render_config(self, spec, conf): - """ - Render config as dictionary structure and delete keys - from spec for null values - - :param spec: The facts tree, generated from the argspec - :param conf: The configuration - :rtype: dictionary - :returns: The generated config - """ - config = deepcopy(spec) - vlans = [] - - vlan_list = vlan_to_list(utils.parse_conf_arg(conf, 'vlan')) - for vlan in vlan_list: - config['vlan_id'] = vlan - config['name'] = utils.parse_conf_arg(conf, 'name') - config['state'] = utils.parse_conf_arg(conf, 'state') - - vlans.append(utils.remove_empties(config)) - - return vlans - - -def vlan_to_list(vlan_str): - vlans = [] - for vlan in vlan_str.split(','): - if '-' in vlan: - start, stop = vlan.split('-') - vlans.extend(range(int(start), int(stop) + 1)) - else: - vlans.append(int(vlan)) - - return vlans diff --git a/lib/ansible/module_utils/network/eos/providers/cli/config/bgp/address_family.py b/lib/ansible/module_utils/network/eos/providers/cli/config/bgp/address_family.py deleted file mode 100644 index 0e50f6d518..0000000000 --- a/lib/ansible/module_utils/network/eos/providers/cli/config/bgp/address_family.py +++ /dev/null @@ -1,129 +0,0 @@ -# -# (c) 2019, Ansible by Red Hat, inc -# GNU General Public License v3.0+ (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt) -# -import re - -from ansible.module_utils.six import iteritems -from ansible.module_utils.network.common.utils import to_list -from ansible.module_utils.network.eos.providers.providers import CliProvider -from ansible.module_utils.network.eos.providers.cli.config.bgp.neighbors import AFNeighbors - - -class AddressFamily(CliProvider): - - def render(self, config=None): - commands = list() - safe_list = list() - - router_context = 'router bgp %s' % self.get_value('config.bgp_as') - context_config = None - - for item in self.get_value('config.address_family'): - context = 'address-family %s' % item['afi'] - context_commands = list() - - if config: - context_path = [router_context, context] - context_config = self.get_config_context(config, context_path, indent=2) - - for key, value in iteritems(item): - if value is not None: - meth = getattr(self, '_render_%s' % key, None) - if meth: - resp = meth(item, context_config) - if resp: - context_commands.extend(to_list(resp)) - - if context_commands: - commands.append(context) - commands.extend(context_commands) - commands.append('exit') - - safe_list.append(context) - - if self.params['operation'] == 'replace': - if config: - resp = self._negate_config(config, safe_list) - commands.extend(resp) - - return commands - - def _negate_config(self, config, safe_list=None): - commands = list() - matches = re.findall(r'(address-family .+)$', config, re.M) - for item in set(matches).difference(safe_list): - commands.append('no %s' % item) - return commands - - def _render_auto_summary(self, item, config=None): - cmd = 'auto-summary' - if item['auto_summary'] is False: - cmd = 'no %s' % cmd - if not config or cmd not in config: - return cmd - - def _render_synchronization(self, item, config=None): - cmd = 'synchronization' - if item['synchronization'] is False: - cmd = 'no %s' % cmd - if not config or cmd not in config: - return cmd - - def _render_networks(self, item, config=None): - commands = list() - safe_list = list() - - for entry in item['networks']: - network = entry['prefix'] - if entry['masklen']: - network = '%s/%s' % (entry['prefix'], entry['masklen']) - safe_list.append(network) - - cmd = 'network %s' % network - - if entry['route_map']: - cmd += ' route-map %s' % entry['route_map'] - - if not config or cmd not in config: - commands.append(cmd) - - if self.params['operation'] == 'replace': - if config: - matches = re.findall(r'network (\S+)', config, re.M) - for entry in set(matches).difference(safe_list): - commands.append('no network %s' % entry) - - return commands - - def _render_redistribute(self, item, config=None): - commands = list() - safe_list = list() - - for entry in item['redistribute']: - option = entry['protocol'] - - cmd = 'redistribute %s' % entry['protocol'] - - if entry['route_map']: - cmd += ' route-map %s' % entry['route_map'] - - if not config or cmd not in config: - commands.append(cmd) - - safe_list.append(option) - - if self.params['operation'] == 'replace': - if config: - matches = re.findall(r'redistribute (\S+)(?:\s*)(\d*)', config, re.M) - for i in range(0, len(matches)): - matches[i] = ' '.join(matches[i]).strip() - for entry in set(matches).difference(safe_list): - commands.append('no redistribute %s' % entry) - - return commands - - def _render_neighbors(self, item, config): - """ generate bgp neighbor configuration - """ - return AFNeighbors(self.params).render(config, nbr_list=item['neighbors']) diff --git a/lib/ansible/module_utils/network/eos/providers/cli/config/bgp/neighbors.py b/lib/ansible/module_utils/network/eos/providers/cli/config/bgp/neighbors.py deleted file mode 100644 index 329916b69f..0000000000 --- a/lib/ansible/module_utils/network/eos/providers/cli/config/bgp/neighbors.py +++ /dev/null @@ -1,173 +0,0 @@ -# -# (c) 2019, Ansible by Red Hat, inc -# GNU General Public License v3.0+ (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt) -# -import re - -from ansible.module_utils.six import iteritems -from ansible.module_utils.network.common.utils import to_list -from ansible.module_utils.network.eos.providers.providers import CliProvider - - -class Neighbors(CliProvider): - - def render(self, config=None, nbr_list=None): - commands = list() - safe_list = list() - if not nbr_list: - nbr_list = self.get_value('config.neighbors') - - for item in nbr_list: - neighbor_commands = list() - context = 'neighbor %s' % item['neighbor'] - cmd = '%s remote-as %s' % (context, item['remote_as']) - - if not config or cmd not in config: - neighbor_commands.append(cmd) - - for key, value in iteritems(item): - if value is not None: - meth = getattr(self, '_render_%s' % key, None) - if meth: - resp = meth(item, config) - if resp: - neighbor_commands.extend(to_list(resp)) - - commands.extend(neighbor_commands) - safe_list.append(context) - - if self.params['operation'] == 'replace': - if config and safe_list: - commands.extend(self._negate_config(config, safe_list)) - - return commands - - def _negate_config(self, config, safe_list=None): - commands = list() - matches = re.findall(r'(neighbor \S+)', config, re.M) - for item in set(matches).difference(safe_list): - commands.append('no %s' % item) - return commands - - def _render_description(self, item, config=None): - cmd = 'neighbor %s description %s' % (item['neighbor'], item['description']) - if not config or cmd not in config: - return cmd - - def _render_enabled(self, item, config=None): - cmd = 'neighbor %s shutdown' % item['neighbor'] - if item['enabled'] is True: - if not config or cmd in config: - cmd = 'no %s' % cmd - return cmd - elif not config or cmd not in config: - return cmd - - def _render_update_source(self, item, config=None): - cmd = 'neighbor %s update-source %s' % (item['neighbor'], item['update_source']) - if not config or cmd not in config: - return cmd - - def _render_password(self, item, config=None): - cmd = 'neighbor %s password %s' % (item['neighbor'], item['password']) - if not config or cmd not in config: - return cmd - - def _render_ebgp_multihop(self, item, config=None): - cmd = 'neighbor %s ebgp-multihop %s' % (item['neighbor'], item['ebgp_multihop']) - if not config or cmd not in config: - return cmd - - def _render_peer_group(self, item, config=None): - cmd = 'neighbor %s peer-group %s' % (item['neighbor'], item['peer_group']) - if not config or cmd not in config: - return cmd - - def _render_route_reflector_client(self, item, config=None): - cmd = 'neighbor %s route-reflector-client' % item['neighbor'] - if item['route_reflector_client'] is False: - if not config or cmd in config: - cmd = 'no %s' % cmd - return cmd - elif not config or cmd not in config: - return cmd - - def _render_maximum_prefix(self, item, config=None): - cmd = 'neighbor %s maximum-routes %s' % (item['neighbor'], item['maximum_prefix']) - if not config or cmd not in config: - return cmd - - def _render_remove_private_as(self, item, config=None): - cmd = 'neighbor %s remove-private-AS' % item['neighbor'] - if item['remove_private_as'] is False: - if not config or cmd in config: - cmd = 'no %s' % cmd - return cmd - elif not config or cmd not in config: - return cmd - - def _render_timers(self, item, config): - """generate bgp timer related configuration - """ - keepalive = item['timers']['keepalive'] - holdtime = item['timers']['holdtime'] - neighbor = item['neighbor'] - - if keepalive and holdtime: - cmd = 'neighbor %s timers %s %s' % (neighbor, keepalive, holdtime) - if not config or cmd not in config: - return cmd - - -class AFNeighbors(CliProvider): - - def render(self, config=None, nbr_list=None): - commands = list() - if not nbr_list: - return - - for item in nbr_list: - neighbor_commands = list() - for key, value in iteritems(item): - if value is not None: - meth = getattr(self, '_render_%s' % key, None) - if meth: - resp = meth(item, config) - if resp: - neighbor_commands.extend(to_list(resp)) - - commands.extend(neighbor_commands) - - return commands - - def _render_activate(self, item, config=None): - cmd = 'neighbor %s activate' % item['neighbor'] - if item['activate'] is False: - if not config or cmd in config: - cmd = 'no %s' % cmd - return cmd - elif not config or cmd not in config: - return cmd - - def _render_default_originate(self, item, config=None): - cmd = 'neighbor %s default-originate' % item['neighbor'] - if item['activate'] is False: - if not config or cmd in config: - cmd = 'no %s' % cmd - return cmd - elif not config or cmd not in config: - return cmd - - def _render_graceful_restart(self, item, config=None): - cmd = 'neighbor %s graceful-restart' % item['neighbor'] - if item['activate'] is False: - if not config or cmd in config: - cmd = 'no %s' % cmd - return cmd - elif not config or cmd not in config: - return cmd - - def _render_weight(self, item, config=None): - cmd = 'neighbor %s weight %s' % (item['neighbor'], item['weight']) - if not config or cmd not in config: - return cmd diff --git a/lib/ansible/module_utils/network/eos/providers/cli/config/bgp/process.py b/lib/ansible/module_utils/network/eos/providers/cli/config/bgp/process.py deleted file mode 100644 index a2f40affae..0000000000 --- a/lib/ansible/module_utils/network/eos/providers/cli/config/bgp/process.py +++ /dev/null @@ -1,163 +0,0 @@ -# -# (c) 2019, Ansible by Red Hat, inc -# GNU General Public License v3.0+ (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt) -# -import re - -from ansible.module_utils.six import iteritems -from ansible.module_utils.network.common.utils import to_list -from ansible.module_utils.network.eos.providers.providers import register_provider -from ansible.module_utils.network.eos.providers.providers import CliProvider -from ansible.module_utils.network.eos.providers.cli.config.bgp.neighbors import Neighbors -from ansible.module_utils.network.eos.providers.cli.config.bgp.address_family import AddressFamily - -REDISTRIBUTE_PROTOCOLS = frozenset(['ospf', 'ospf3', 'rip', 'isis', 'static', 'connected']) - - -@register_provider('eos', 'eos_bgp') -class Provider(CliProvider): - - def render(self, config=None): - commands = list() - - existing_as = None - if config: - match = re.search(r'router bgp (\d+)', config, re.M) - if match: - existing_as = match.group(1) - - operation = self.params['operation'] - - context = None - if self.params['config']: - context = 'router bgp %s' % self.get_value('config.bgp_as') - - if operation == 'delete': - if existing_as: - commands.append('no router bgp %s' % existing_as) - elif context: - commands.append('no %s' % context) - - else: - self._validate_input(config) - if operation == 'replace': - if existing_as and int(existing_as) != self.get_value('config.bgp_as'): - commands.append('no router bgp %s' % existing_as) - config = None - - elif operation == 'override': - if existing_as: - commands.append('no router bgp %s' % existing_as) - config = None - - context_commands = list() - - for key, value in iteritems(self.get_value('config')): - if value is not None: - meth = getattr(self, '_render_%s' % key, None) - if meth: - resp = meth(config) - if resp: - context_commands.extend(to_list(resp)) - - if context and context_commands: - commands.append(context) - commands.extend(context_commands) - commands.append('exit') - return commands - - def _render_router_id(self, config=None): - cmd = 'router-id %s' % self.get_value('config.router_id') - if not config or cmd not in config: - return cmd - - def _render_log_neighbor_changes(self, config=None): - cmd = 'bgp log-neighbor-changes' - log_neighbor_changes = self.get_value('config.log_neighbor_changes') - if log_neighbor_changes is True: - if not config or cmd not in config: - return cmd - elif log_neighbor_changes is False: - if config and cmd in config: - return 'no %s' % cmd - - def _render_networks(self, config=None): - commands = list() - safe_list = list() - - for entry in self.get_value('config.networks'): - network = entry['prefix'] - if entry['masklen']: - network = '%s/%s' % (entry['prefix'], entry['masklen']) - safe_list.append(network) - - cmd = 'network %s' % network - - if entry['route_map']: - cmd += ' route-map %s' % entry['route_map'] - - if not config or cmd not in config: - commands.append(cmd) - - if self.params['operation'] == 'replace': - if config: - matches = re.findall(r'network (\S+)', config, re.M) - for entry in set(matches).difference(safe_list): - commands.append('no network %s' % entry) - - return commands - - def _render_redistribute(self, config=None): - commands = list() - safe_list = list() - - for entry in self.get_value('config.redistribute'): - option = entry['protocol'] - - cmd = 'redistribute %s' % entry['protocol'] - - if entry['route_map']: - cmd += ' route-map %s' % entry['route_map'] - - if not config or cmd not in config: - commands.append(cmd) - - safe_list.append(option) - - if self.params['operation'] == 'replace': - if config: - matches = re.findall(r'redistribute (\S+)(?:\s*)(\d*)', config, re.M) - for i in range(0, len(matches)): - matches[i] = ' '.join(matches[i]).strip() - for entry in set(matches).difference(safe_list): - commands.append('no redistribute %s' % entry) - - return commands - - def _render_neighbors(self, config): - """ generate bgp neighbor configuration - """ - return Neighbors(self.params).render(config) - - def _render_address_family(self, config): - """ generate address-family configuration - """ - return AddressFamily(self.params).render(config) - - def _validate_input(self, config): - def device_has_AF(config): - return re.search(r'address-family (?:.*)', config) - - address_family = self.get_value('config.address_family') - root_networks = self.get_value('config.networks') - operation = self.params['operation'] - - if operation == 'replace' and root_networks: - if address_family: - for item in address_family: - if item['networks']: - raise ValueError('operation is replace but provided both root level networks and networks under %s address family' - % item['afi']) - - if config and device_has_AF(config): - raise ValueError('operation is replace and device has one or more address family activated but root level network(s) provided') diff --git a/lib/ansible/module_utils/network/eos/providers/module.py b/lib/ansible/module_utils/network/eos/providers/module.py deleted file mode 100644 index 2d8fd67ebc..0000000000 --- a/lib/ansible/module_utils/network/eos/providers/module.py +++ /dev/null @@ -1,62 +0,0 @@ -# -# (c) 2019, Ansible by Red Hat, inc -# GNU General Public License v3.0+ (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt) -# -from ansible.module_utils.basic import AnsibleModule -from ansible.module_utils.connection import Connection -from ansible.module_utils.network.eos.providers import providers -from ansible.module_utils._text import to_text - - -class NetworkModule(AnsibleModule): - - fail_on_missing_provider = True - - def __init__(self, connection=None, *args, **kwargs): - super(NetworkModule, self).__init__(*args, **kwargs) - - if connection is None: - connection = Connection(self._socket_path) - - self.connection = connection - - @property - def provider(self): - if not hasattr(self, '_provider'): - capabilities = self.from_json(self.connection.get_capabilities()) - - network_os = capabilities['device_info']['network_os'] - network_api = capabilities['network_api'] - - if network_api == 'cliconf': - connection_type = 'network_cli' - - cls = providers.get(network_os, self._name.split('.')[-1], connection_type) - - if not cls: - msg = 'unable to find suitable provider for network os %s' % network_os - if self.fail_on_missing_provider: - self.fail_json(msg=msg) - else: - self.warn(msg) - - obj = cls(self.params, self.connection, self.check_mode) - - setattr(self, '_provider', obj) - - return getattr(self, '_provider') - - def get_facts(self, subset=None): - try: - self.provider.get_facts(subset) - except Exception as exc: - self.fail_json(msg=to_text(exc)) - - def edit_config(self, config_filter=None): - current_config = self.connection.get_config(flags=config_filter) - try: - commands = self.provider.edit_config(current_config) - changed = bool(commands) - return {'commands': commands, 'changed': changed} - except Exception as exc: - self.fail_json(msg=to_text(exc)) diff --git a/lib/ansible/module_utils/network/eos/providers/providers.py b/lib/ansible/module_utils/network/eos/providers/providers.py deleted file mode 100644 index be429dc0f8..0000000000 --- a/lib/ansible/module_utils/network/eos/providers/providers.py +++ /dev/null @@ -1,120 +0,0 @@ -# -# (c) 2019, Ansible by Red Hat, inc -# GNU General Public License v3.0+ (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt) -# -import json - -from threading import RLock - -from ansible.module_utils.six import itervalues -from ansible.module_utils.network.common.utils import to_list -from ansible.module_utils.network.common.config import NetworkConfig - - -_registered_providers = {} -_provider_lock = RLock() - - -def register_provider(network_os, module_name): - def wrapper(cls): - _provider_lock.acquire() - try: - if network_os not in _registered_providers: - _registered_providers[network_os] = {} - for ct in cls.supported_connections: - if ct not in _registered_providers[network_os]: - _registered_providers[network_os][ct] = {} - for item in to_list(module_name): - for entry in itervalues(_registered_providers[network_os]): - entry[item] = cls - finally: - _provider_lock.release() - return cls - return wrapper - - -def get(network_os, module_name, connection_type): - network_os_providers = _registered_providers.get(network_os) - if network_os_providers is None: - raise ValueError('unable to find a suitable provider for this module') - if connection_type not in network_os_providers: - raise ValueError('provider does not support this connection type') - elif module_name not in network_os_providers[connection_type]: - raise ValueError('could not find a suitable provider for this module') - return network_os_providers[connection_type][module_name] - - -class ProviderBase(object): - - supported_connections = () - - def __init__(self, params, connection=None, check_mode=False): - self.params = params - self.connection = connection - self.check_mode = check_mode - - @property - def capabilities(self): - if not hasattr(self, '_capabilities'): - resp = self.from_json(self.connection.get_capabilities()) - setattr(self, '_capabilities', resp) - return getattr(self, '_capabilities') - - def get_value(self, path): - params = self.params.copy() - for key in path.split('.'): - params = params[key] - return params - - def get_facts(self, subset=None): - raise NotImplementedError(self.__class__.__name__) - - def edit_config(self): - raise NotImplementedError(self.__class__.__name__) - - -class CliProvider(ProviderBase): - - supported_connections = ('network_cli',) - - @property - def capabilities(self): - if not hasattr(self, '_capabilities'): - resp = self.from_json(self.connection.get_capabilities()) - setattr(self, '_capabilities', resp) - return getattr(self, '_capabilities') - - def get_config_context(self, config, path, indent=2): - if config is not None: - netcfg = NetworkConfig(indent=indent, contents=config) - try: - config = netcfg.get_block_config(to_list(path)) - except ValueError: - config = None - return config - - def render(self, config=None): - raise NotImplementedError(self.__class__.__name__) - - def cli(self, command): - try: - if not hasattr(self, '_command_output'): - setattr(self, '_command_output', {}) - return self._command_output[command] - except KeyError: - out = self.connection.get(command) - try: - out = json.loads(out) - except ValueError: - pass - self._command_output[command] = out - return out - - def get_facts(self, subset=None): - return self.populate() - - def edit_config(self, config=None): - commands = self.render(config) - if commands and self.check_mode is False: - self.connection.edit_config(commands) - return commands diff --git a/lib/ansible/module_utils/network/eos/utils/utils.py b/lib/ansible/module_utils/network/eos/utils/utils.py deleted file mode 100644 index beb3a6fd2e..0000000000 --- a/lib/ansible/module_utils/network/eos/utils/utils.py +++ /dev/null @@ -1,54 +0,0 @@ -# -*- coding: utf-8 -*- -# Copyright 2019 Red Hat -# GNU General Public License v3.0+ -# (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt) - -# utils - -from __future__ import absolute_import, division, print_function -__metaclass__ = type - - -def get_interface_number(name): - digits = '' - for char in name: - if char.isdigit() or char in '/.': - digits += char - return digits - - -def normalize_interface(name): - """Return the normalized interface name - """ - if not name: - return None - - if name.lower().startswith('et'): - if_type = 'Ethernet' - elif name.lower().startswith('lo'): - if_type = 'Loopback' - elif name.lower().startswith('ma'): - if_type = 'Management' - elif name.lower().startswith('po'): - if_type = 'Port-Channel' - elif name.lower().startswith('tu'): - if_type = 'Tunnel' - elif name.lower().startswith('vl'): - if_type = 'Vlan' - elif name.lower().startswith('vx'): - if_type = 'Vxlan' - else: - if_type = None - - number_list = name.split(' ') - if len(number_list) == 2: - number = number_list[-1].strip() - else: - number = get_interface_number(name) - - if if_type: - proper_interface = if_type + number - else: - proper_interface = name - - return proper_interface diff --git a/lib/ansible/modules/network/eos/_eos_interface.py b/lib/ansible/modules/network/eos/_eos_interface.py deleted file mode 100644 index c6f08ed63f..0000000000 --- a/lib/ansible/modules/network/eos/_eos_interface.py +++ /dev/null @@ -1,486 +0,0 @@ -#!/usr/bin/python -# -*- coding: utf-8 -*- - -# Copyright: (c) 2017, Ansible by Red Hat, inc -# GNU General Public License v3.0+ (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt) - -from __future__ import absolute_import, division, print_function -__metaclass__ = type - - -ANSIBLE_METADATA = {'metadata_version': '1.1', - 'status': ['deprecated'], - 'supported_by': 'network'} - - -DOCUMENTATION = """ ---- -module: eos_interface -version_added: "2.5" -author: "Ganesh Nalawade (@ganeshrn)" -short_description: Manage Interface on Arista EOS network devices -description: - - This module provides declarative management of Interfaces - on Arista EOS network devices. -deprecated: - removed_in: "2.13" - alternative: eos_interfaces - why: Updated modules released with more functionality -notes: - - Tested against EOS 4.15 -options: - name: - description: - - Name of the Interface to be configured on remote device. The name of interface - should be in expanded format and not abbreviated. - type: str - required: true - description: - description: - - Description of Interface upto 240 characters. - type: str - enabled: - description: - - Interface link status. If the value is I(True) the interface state will be - enabled, else if value is I(False) interface will be in disable (shutdown) state. - default: True - type: bool - speed: - description: - - This option configures autoneg and speed/duplex/flowcontrol for the interface - given in C(name) option. - type: str - mtu: - description: - - Set maximum transmission unit size in bytes of transmit packet for the interface given - in C(name) option. - type: str - tx_rate: - description: - - Transmit rate in bits per second (bps) for the interface given in C(name) option. - - This is state check parameter only. - - Supports conditionals, see L(Conditionals in Networking Modules,../network/user_guide/network_working_with_command_output.html) - type: str - rx_rate: - description: - - Receiver rate in bits per second (bps) for the interface given in C(name) option. - - This is state check parameter only. - - Supports conditionals, see L(Conditionals in Networking Modules,../network/user_guide/network_working_with_command_output.html) - type: str - neighbors: - description: - - Check the operational state of given interface C(name) for LLDP neighbor. - - The following suboptions are available. - type: list - suboptions: - host: - description: - - "LLDP neighbor host for given interface C(name)." - port: - description: - - "LLDP neighbor port to which given interface C(name) is connected." - aggregate: - description: - - List of Interfaces definitions. Each of the entry in aggregate list should - define name of interface C(name) and other options as required. - type: list - delay: - description: - - Time in seconds to wait before checking for the operational state on remote - device. This wait is applicable for operational state argument which are - I(state) with values C(up)/C(down), I(tx_rate) and I(rx_rate). - default: 10 - type: int - state: - description: - - State of the Interface configuration, C(up) means present and - operationally up and C(down) means present and operationally C(down) - default: present - type: str - choices: ['present', 'absent', 'up', 'down'] -extends_documentation_fragment: eos -""" - -EXAMPLES = """ -- name: configure interface - eos_interface: - name: ethernet1 - description: test-interface - speed: 100full - mtu: 512 - -- name: remove interface - eos_interface: - name: ethernet1 - state: absent - -- name: make interface up - eos_interface: - name: ethernet1 - enabled: True - -- name: make interface down - eos_interface: - name: ethernet1 - enabled: False - -- name: Check intent arguments - eos_interface: - name: ethernet1 - state: up - tx_rate: ge(0) - rx_rate: le(0) - -- name: Check neighbors intent arguments - eos_interface: - name: ethernet1 - neighbors: - - port: eth0 - host: netdev - -- name: Configure interface in disabled state and check if the operational state is disabled or not - eos_interface: - name: ethernet1 - enabled: False - state: down - -- name: Add interface using aggregate - eos_interface: - aggregate: - - { name: ethernet1, mtu: 256, description: test-interface-1 } - - { name: ethernet2, mtu: 516, description: test-interface-2 } - speed: 100full - state: present - -- name: Delete interface using aggregate - eos_interface: - aggregate: - - name: loopback9 - - name: loopback10 - state: absent -""" - -RETURN = """ -commands: - description: The list of configuration mode commands to send to the device. - returned: always, except for the platforms that use Netconf transport to manage the device. - type: list - sample: - - interface ethernet1 - - description test-interface - - speed 100full - - mtu 512 -""" -import re -from copy import deepcopy -from time import sleep - -from ansible.module_utils.basic import AnsibleModule -from ansible.module_utils.network.common.config import NetworkConfig -from ansible.module_utils.network.common.utils import conditional, remove_default_spec -from ansible.module_utils.network.eos.eos import get_config, load_config, run_commands -from ansible.module_utils.network.eos.eos import eos_argument_spec - - -def validate_mtu(value, module): - if value and not 68 <= int(value) <= 65535: - module.fail_json(msg='mtu must be between 68 and 65535') - - -def validate_param_values(module, obj, param=None): - if param is None: - param = module.params - for key in obj: - # validate the param value (if validator func exists) - validator = globals().get('validate_%s' % key) - if callable(validator): - validator(param.get(key), module) - - -def parse_shutdown(configobj, name): - cfg = configobj['interface %s' % name] - cfg = '\n'.join(cfg.children) - match = re.search(r'shutdown', cfg, re.M) - return bool(match) - - -def parse_config_argument(configobj, name, arg=None): - cfg = configobj['interface %s' % name] - cfg = '\n'.join(cfg.children) - match = re.search(r'%s (.+)$' % arg, cfg, re.M) - if match: - return match.group(1) - - -def search_obj_in_list(name, lst): - for o in lst: - if o['name'] == name: - return o - - return None - - -def add_command_to_interface(interface, cmd, commands): - if interface not in commands: - commands.append(interface) - commands.append(cmd) - - -def map_config_to_obj(module): - config = get_config(module) - configobj = NetworkConfig(indent=3, contents=config) - - match = re.findall(r'^interface (\S+)', config, re.M) - if not match: - return list() - - instances = list() - - for item in set(match): - obj = { - 'name': item.lower(), - 'description': parse_config_argument(configobj, item, 'description'), - 'speed': parse_config_argument(configobj, item, 'speed'), - 'mtu': parse_config_argument(configobj, item, 'mtu'), - 'disable': parse_shutdown(configobj, item), - 'state': 'present' - } - instances.append(obj) - return instances - - -def map_params_to_obj(module): - obj = [] - aggregate = module.params.get('aggregate') - if aggregate: - for item in aggregate: - for key in item: - if item.get(key) is None: - item[key] = module.params[key] - - item['name'] = item['name'].lower() - validate_param_values(module, item, item) - d = item.copy() - - if d['enabled']: - d['disable'] = False - else: - d['disable'] = True - - obj.append(d) - - else: - params = { - 'name': module.params['name'].lower(), - 'description': module.params['description'], - 'speed': module.params['speed'], - 'mtu': module.params['mtu'], - 'state': module.params['state'], - 'delay': module.params['delay'], - 'tx_rate': module.params['tx_rate'], - 'rx_rate': module.params['rx_rate'], - 'neighbors': module.params['neighbors'] - } - - validate_param_values(module, params) - if module.params['enabled']: - params.update({'disable': False}) - else: - params.update({'disable': True}) - - obj.append(params) - return obj - - -def map_obj_to_commands(updates, modules): - commands = list() - want, have = updates - - args = ('speed', 'description', 'mtu') - for w in want: - name = w['name'] - disable = w['disable'] - state = w['state'] - - obj_in_have = search_obj_in_list(name, have) - interface = 'interface ' + name - - if state == 'absent' and obj_in_have: - commands.append('no ' + interface) - - elif state in ('present', 'up', 'down'): - if obj_in_have: - for item in args: - candidate = w.get(item) - running = obj_in_have.get(item) - if candidate != running: - if candidate: - cmd = "{0} {1}".format(item, candidate) - add_command_to_interface(interface, cmd, commands) - - if disable and not obj_in_have.get('disable', False): - add_command_to_interface(interface, 'shutdown', commands) - elif not disable and obj_in_have.get('disable', False): - add_command_to_interface(interface, 'no shutdown', commands) - else: - commands.append(interface) - for item in args: - value = w.get(item) - if value: - commands.append("{0} {1}".format(item, value)) - - if disable: - commands.append('no shutdown') - return commands - - -def check_declarative_intent_params(module, want, result): - failed_conditions = [] - have_neighbors = None - for w in want: - want_state = w.get('state') - want_tx_rate = w.get('tx_rate') - want_rx_rate = w.get('rx_rate') - want_neighbors = w.get('neighbors') - - if want_state not in ('up', 'down') and not want_tx_rate and not want_rx_rate and not want_neighbors: - continue - - if result['changed']: - sleep(w['delay']) - - command = {'command': 'show interfaces %s' % w['name'], 'output': 'text'} - output = run_commands(module, [command]) - - if want_state in ('up', 'down'): - match = re.search(r'%s (\w+)' % 'line protocol is', output[0], re.M) - have_state = None - if match: - have_state = match.group(1) - if have_state is None or not conditional(want_state, have_state.strip()): - failed_conditions.append('state ' + 'eq(%s)' % want_state) - - if want_tx_rate: - match = re.search(r'%s (\d+)' % 'output rate', output[0], re.M) - have_tx_rate = None - if match: - have_tx_rate = match.group(1) - - if have_tx_rate is None or not conditional(want_tx_rate, have_tx_rate.strip(), cast=int): - failed_conditions.append('tx_rate ' + want_tx_rate) - - if want_rx_rate: - match = re.search(r'%s (\d+)' % 'input rate', output[0], re.M) - have_rx_rate = None - if match: - have_rx_rate = match.group(1) - - if have_rx_rate is None or not conditional(want_rx_rate, have_rx_rate.strip(), cast=int): - failed_conditions.append('rx_rate ' + want_rx_rate) - - if want_neighbors: - have_host = [] - have_port = [] - if have_neighbors is None: - command = {'command': 'show lldp neighbors {0}'.format(w['name']), 'output': 'text'} - have_neighbors = run_commands(module, [command]) - - if have_neighbors[0]: - lines = have_neighbors[0].strip().split('\n') - col = None - for index, line in enumerate(lines): - if re.search(r"^Port\s+Neighbor Device ID\s+Neighbor Port ID\s+TTL", line): - col = index - break - - if col and col < len(lines) - 1: - for items in lines[col + 1:]: - value = re.split(r'\s+', items) - try: - have_port.append(value[2]) - have_host.append(value[1]) - except IndexError: - pass - - for item in want_neighbors: - host = item.get('host') - port = item.get('port') - if host and host not in have_host: - failed_conditions.append('host ' + host) - if port and port not in have_port: - failed_conditions.append('port ' + port) - return failed_conditions - - -def main(): - """ main entry point for module execution - """ - neighbors_spec = dict( - host=dict(), - port=dict() - ) - - element_spec = dict( - name=dict(), - description=dict(), - speed=dict(), - mtu=dict(), - enabled=dict(default=True, type='bool'), - tx_rate=dict(), - rx_rate=dict(), - neighbors=dict(type='list', elements='dict', options=neighbors_spec), - delay=dict(default=10, type='int'), - state=dict(default='present', - choices=['present', 'absent', 'up', 'down']) - ) - - aggregate_spec = deepcopy(element_spec) - aggregate_spec['name'] = dict(required=True) - - # remove default in aggregate spec, to handle common arguments - remove_default_spec(aggregate_spec) - - argument_spec = dict( - aggregate=dict(type='list', elements='dict', options=aggregate_spec), - ) - - argument_spec.update(element_spec) - argument_spec.update(eos_argument_spec) - - required_one_of = [['name', 'aggregate']] - mutually_exclusive = [['name', 'aggregate']] - - module = AnsibleModule(argument_spec=argument_spec, - required_one_of=required_one_of, - mutually_exclusive=mutually_exclusive, - supports_check_mode=True) - - warnings = list() - result = {'changed': False} - if warnings: - result['warnings'] = warnings - - want = map_params_to_obj(module) - have = map_config_to_obj(module) - commands = map_obj_to_commands((want, have), module) - result['commands'] = commands - - if commands: - commit = not module.check_mode - response = load_config(module, commands, commit=commit) - if response.get('diff') and module._diff: - result['diff'] = {'prepared': response.get('diff')} - result['session_name'] = response.get('session') - result['changed'] = True - - failed_conditions = check_declarative_intent_params(module, want, result) - - if failed_conditions: - msg = 'One or more conditional statements have not been satisfied' - module.fail_json(msg=msg, failed_conditions=failed_conditions) - - module.exit_json(**result) - - -if __name__ == '__main__': - main() diff --git a/lib/ansible/modules/network/eos/_eos_l2_interface.py b/lib/ansible/modules/network/eos/_eos_l2_interface.py deleted file mode 100644 index 82c10982f2..0000000000 --- a/lib/ansible/modules/network/eos/_eos_l2_interface.py +++ /dev/null @@ -1,324 +0,0 @@ -#!/usr/bin/python -# -*- coding: utf-8 -*- - -# (c) 2017, Ansible by Red Hat, inc -# GNU General Public License v3.0+ (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt) - -from __future__ import absolute_import, division, print_function -__metaclass__ = type - - -ANSIBLE_METADATA = {'metadata_version': '1.1', - 'status': ['deprecated'], - 'supported_by': 'network'} - -DOCUMENTATION = """ ---- -module: eos_l2_interface -version_added: "2.5" -author: "Ricardo Carrillo Cruz (@rcarrillocruz)" -short_description: Manage L2 interfaces on Arista EOS network devices. -description: - - This module provides declarative management of L2 interfaces - on Arista EOS network devices. -deprecated: - removed_in: "2.13" - alternative: eos_l2_interfaces - why: Updated modules released with more functionality -notes: - - Tested against EOS 4.15 -options: - name: - description: - - Name of the interface - required: true - aliases: ['interface'] - mode: - description: - - Mode in which interface needs to be configured. - choices: ['access','trunk'] - access_vlan: - description: - - Configure given VLAN in access port. - If C(mode=access), used as the access VLAN ID. - native_vlan: - description: - - Native VLAN to be configured in trunk port. - If C(mode=trunk), used as the trunk native VLAN ID. - trunk_allowed_vlans: - description: - - List of allowed VLANs in a given trunk port. - If C(mode=trunk), these are the ONLY VLANs that will be - configured on the trunk, i.e. C(2-10,15). - aliases: ['trunk_vlans'] - aggregate: - description: - - List of Layer-2 interface definitions. - state: - description: - - Manage the state of the Layer-2 Interface configuration. - default: present - choices: ['present','absent', 'unconfigured'] -extends_documentation_fragment: eos -""" - -EXAMPLES = """ -- name: Ensure Ethernet1 does not have any switchport - eos_l2_interface: - name: Ethernet1 - state: absent - -- name: Ensure Ethernet1 is configured for access vlan 20 - eos_l2_interface: - name: Ethernet1 - mode: access - access_vlan: 20 - -- name: Ensure Ethernet1 is a trunk port and ensure 2-50 are being tagged (doesn't mean others aren't also being tagged) - eos_l2_interface: - name: Ethernet1 - mode: trunk - native_vlan: 10 - trunk_allowed_vlans: 2-50 - -- name: Set switchports on aggregate - eos_l2_interface: - aggregate: - - { name: ethernet1, mode: access, access_vlan: 20} - - { name: ethernet2, mode: trunk, native_vlan: 10} -""" - -RETURN = """ -commands: - description: The list of configuration mode commands to send to the device - returned: always. - type: list - sample: - - interface ethernet1 - - switchport access vlan 20 -""" -import re -from copy import deepcopy - -from ansible.module_utils.basic import AnsibleModule -from ansible.module_utils.network.common.config import NetworkConfig -from ansible.module_utils.network.common.utils import remove_default_spec -from ansible.module_utils.network.eos.eos import get_config, load_config, run_commands -from ansible.module_utils.network.eos.eos import eos_argument_spec - - -def parse_config_argument(configobj, name, arg=None): - cfg = configobj['interface %s' % name] - cfg = '\n'.join(cfg.children) - match = re.search(r'%s (.+)$' % arg, cfg, re.M) - if match: - return match.group(1).strip() - - -def search_obj_in_list(name, lst): - for o in lst: - if o['name'] == name: - return o - - return None - - -def map_obj_to_commands(want, have, module): - commands = list() - - for w in want: - name = w['name'] - state = w['state'] - mode = w['mode'] - access_vlan = w['access_vlan'] - native_vlan = w['native_vlan'] - trunk_allowed_vlans = w['trunk_allowed_vlans'] - - interface = 'interface ' + name - commands.append(interface) - - obj_in_have = search_obj_in_list(name, have) - if not obj_in_have: - module.fail_json(msg='invalid interface {0}'.format(name)) - - if state == 'absent': - if obj_in_have['mode'] == 'access': - commands.append('no switchport access vlan {0}'.format(obj_in_have['access_vlan'])) - - if obj_in_have['mode'] == 'trunk': - commands.append('no switchport mode trunk') - - if obj_in_have['native_vlan']: - commands.append('no switchport trunk native vlan {0}'.format(obj_in_have['native_vlan'])) - - if obj_in_have['trunk_allowed_vlans']: - commands.append('no switchport trunk allowed vlan {0}'.format(obj_in_have['trunk_allowed_vlans'])) - - if obj_in_have['state'] == 'present': - commands.append('no switchport') - else: - if obj_in_have['state'] == 'absent': - commands.append('switchport') - commands.append('switchport mode {0}'.format(mode)) - - if access_vlan: - commands.append('switchport access vlan {0}'.format(access_vlan)) - - if native_vlan: - commands.append('switchport trunk native vlan {0}'.format(native_vlan)) - - if trunk_allowed_vlans: - commands.append('switchport trunk allowed vlan {0}'.format(trunk_allowed_vlans)) - else: - if mode != obj_in_have['mode']: - if obj_in_have['mode'] == 'access': - commands.append('no switchport access vlan {0}'.format(obj_in_have['access_vlan'])) - commands.append('switchport mode trunk') - if native_vlan: - commands.append('switchport trunk native vlan {0}'.format(native_vlan)) - if trunk_allowed_vlans: - commands.append('switchport trunk allowed vlan {0}'.format(trunk_allowed_vlans)) - else: - if obj_in_have['native_vlan']: - commands.append('no switchport trunk native vlan {0}'.format(obj_in_have['native_vlan'])) - commands.append('no switchport mode trunk') - if obj_in_have['trunk_allowed_vlans']: - commands.append('no switchport trunk allowed vlan {0}'.format(obj_in_have['trunk_allowed_vlans'])) - commands.append('no switchport mode trunk') - commands.append('switchport access vlan {0}'.format(access_vlan)) - else: - if mode == 'access': - if access_vlan != obj_in_have['access_vlan']: - commands.append('switchport access vlan {0}'.format(access_vlan)) - else: - if native_vlan != obj_in_have['native_vlan'] and native_vlan: - commands.append('switchport trunk native vlan {0}'.format(native_vlan)) - if trunk_allowed_vlans != obj_in_have['trunk_allowed_vlans'] and trunk_allowed_vlans: - commands.append('switchport trunk allowed vlan {0}'.format(trunk_allowed_vlans)) - - if commands[-1] == interface: - commands.pop(-1) - - return commands - - -def map_config_to_obj(module, warnings): - config = get_config(module, flags=['| section interface']) - configobj = NetworkConfig(indent=3, contents=config) - - match = re.findall(r'^interface (\S+)', config, re.M) - if not match: - return list() - - instances = list() - - for item in set(match): - command = {'command': 'show interfaces {0} switchport | include Switchport'.format(item), - 'output': 'text'} - command_result = run_commands(module, command, check_rc=False) - if "Interface does not exist" in command_result[0]: - warnings.append("Could not gather switchport information for {0}: {1}".format(item, command_result[0])) - continue - - if command_result[0]: - switchport_cfg = command_result[0].split(':')[1].strip() - - if switchport_cfg == 'Enabled': - state = 'present' - else: - state = 'absent' - - obj = { - 'name': item.lower(), - 'state': state, - 'access_vlan': parse_config_argument(configobj, item, 'switchport access vlan'), - 'native_vlan': parse_config_argument(configobj, item, 'switchport trunk native vlan'), - 'trunk_allowed_vlans': parse_config_argument(configobj, item, 'switchport trunk allowed vlan'), - } - if obj['access_vlan']: - obj['mode'] = 'access' - else: - obj['mode'] = 'trunk' - - instances.append(obj) - - return instances - - -def map_params_to_obj(module): - obj = [] - - aggregate = module.params.get('aggregate') - if aggregate: - for item in aggregate: - for key in item: - if item.get(key) is None: - item[key] = module.params[key] - - item['name'] = item['name'].lower() - obj.append(item.copy()) - else: - obj.append({ - 'name': module.params['name'].lower(), - 'mode': module.params['mode'], - 'access_vlan': module.params['access_vlan'], - 'native_vlan': module.params['native_vlan'], - 'trunk_allowed_vlans': module.params['trunk_allowed_vlans'], - 'state': module.params['state'] - }) - - return obj - - -def main(): - """ main entry point for module execution - """ - element_spec = dict( - name=dict(type='str', aliases=['interface']), - mode=dict(choices=['access', 'trunk']), - access_vlan=dict(type='str'), - native_vlan=dict(type='str'), - trunk_allowed_vlans=dict(type='str', aliases=['trunk_vlans']), - state=dict(default='present', - choices=['present', 'absent']) - ) - - aggregate_spec = deepcopy(element_spec) - aggregate_spec['name'] = dict(required=True) - - # remove default in aggregate spec, to handle common arguments - remove_default_spec(aggregate_spec) - - argument_spec = dict( - aggregate=dict(type='list', elements='dict', options=aggregate_spec), - ) - - argument_spec.update(element_spec) - argument_spec.update(eos_argument_spec) - - module = AnsibleModule(argument_spec=argument_spec, - mutually_exclusive=[['access_vlan', 'native_vlan'], - ['access_vlan', 'trunk_allowed_vlans']], - supports_check_mode=True) - - warnings = list() - result = {'changed': False, 'warnings': warnings} - - want = map_params_to_obj(module) - have = map_config_to_obj(module, warnings) - commands = map_obj_to_commands(want, have, module) - result['commands'] = commands - - if commands: - commit = not module.check_mode - response = load_config(module, commands, commit=commit) - if response.get('diff') and module._diff: - result['diff'] = {'prepared': response.get('diff')} - result['session_name'] = response.get('session') - result['changed'] = True - - module.exit_json(**result) - - -if __name__ == '__main__': - main() diff --git a/lib/ansible/modules/network/eos/_eos_l3_interface.py b/lib/ansible/modules/network/eos/_eos_l3_interface.py deleted file mode 100644 index e6941db908..0000000000 --- a/lib/ansible/modules/network/eos/_eos_l3_interface.py +++ /dev/null @@ -1,302 +0,0 @@ -#!/usr/bin/python -# -*- coding: utf-8 -*- - -# Copyright: (c) 2017, Ansible by Red Hat, inc -# GNU General Public License v3.0+ (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt) - -from __future__ import absolute_import, division, print_function -__metaclass__ = type - - -ANSIBLE_METADATA = {'metadata_version': '1.1', - 'status': ['deprecated'], - 'supported_by': 'network'} - -DOCUMENTATION = """ ---- -module: eos_l3_interface -version_added: "2.5" -author: "Ganesh Nalawade (@ganeshrn)" -short_description: Manage L3 interfaces on Arista EOS network devices. -description: - - This module provides declarative management of L3 interfaces - on Arista EOS network devices. -deprecated: - removed_in: "2.13" - alternative: eos_l3_interfaces - why: Updated modules released with more functionality -notes: - - Tested against EOS 4.15 -options: - name: - description: - - Name of the L3 interface to be configured eg. ethernet1 - ipv4: - description: - - IPv4 address to be set for the L3 interface mentioned in I(name) option. - The address format is /, the mask is number - in range 0-32 eg. 192.168.0.1/24 - ipv6: - description: - - IPv6 address to be set for the L3 interface mentioned in I(name) option. - The address format is /, the mask is number - in range 0-128 eg. fd5d:12c9:2201:1::1/64 - - aggregate: - description: - - List of L3 interfaces definitions. Each of the entry in aggregate list should - define name of interface C(name) and a optional C(ipv4) or C(ipv6) address. - state: - description: - - State of the L3 interface configuration. It indicates if the configuration should - be present or absent on remote device. - default: present - choices: ['present', 'absent'] -extends_documentation_fragment: eos -""" - -EXAMPLES = """ -- name: Remove ethernet1 IPv4 and IPv6 address - eos_l3_interface: - name: ethernet1 - state: absent - -- name: Set ethernet1 IPv4 address - eos_l3_interface: - name: ethernet1 - ipv4: 192.168.0.1/24 - -- name: Set ethernet1 IPv6 address - eos_l3_interface: - name: ethernet1 - ipv6: "fd5d:12c9:2201:1::1/64" - -- name: Set interface Vlan1 (SVI) IPv4 address - eos_l3_interface: - name: Vlan1 - ipv4: 192.168.0.5/24 - -- name: Set IP addresses on aggregate - eos_l3_interface: - aggregate: - - { name: ethernet1, ipv4: 192.168.2.10/24 } - - { name: ethernet1, ipv4: 192.168.3.10/24, ipv6: "fd5d:12c9:2201:1::1/64" } - -- name: Remove IP addresses on aggregate - eos_l3_interface: - aggregate: - - { name: ethernet1, ipv4: 192.168.2.10/24 } - - { name: ethernet1, ipv4: 192.168.3.10/24, ipv6: "fd5d:12c9:2201:1::1/64" } - state: absent -""" - -RETURN = """ -commands: - description: The list of configuration mode commands to send to the device - returned: always, except for the platforms that use Netconf transport to manage the device. - type: list - sample: - - interface ethernet1 - - ip address 192.168.0.1/24 - - ipv6 address fd5d:12c9:2201:1::1/64 -""" -import re -from copy import deepcopy - -from ansible.module_utils.basic import AnsibleModule -from ansible.module_utils.network.common.config import NetworkConfig -from ansible.module_utils.network.common.utils import remove_default_spec -from ansible.module_utils.network.eos.eos import get_config, load_config -from ansible.module_utils.network.eos.eos import eos_argument_spec -from ansible.module_utils.network.common.utils import is_masklen - - -def validate_ipv4(value, module): - if value: - address = value.split('/') - if len(address) != 2: - module.fail_json(msg='address format is /, got invalid format %s' % value) - - if not is_masklen(address[1]): - module.fail_json(msg='invalid value for mask: %s, mask should be in range 0-32' % address[1]) - - -def validate_ipv6(value, module): - if value: - address = value.split('/') - if len(address) != 2: - module.fail_json(msg='address format is /, got invalid format %s' % value) - else: - if not 0 <= int(address[1]) <= 128: - module.fail_json(msg='invalid value for mask: %s, mask should be in range 0-128' % address[1]) - - -def validate_param_values(module, obj, param=None): - if param is None: - param = module.params - for key in obj: - # validate the param value (if validator func exists) - validator = globals().get('validate_%s' % key) - if callable(validator): - validator(param.get(key), module) - - -def parse_config_argument(configobj, name, arg=None): - cfg = configobj['interface %s' % name] - cfg = '\n'.join(cfg.children) - match = re.search(r'%s (.+)$' % arg, cfg, re.M) - if match: - return match.group(1).strip() - - -def search_obj_in_list(name, lst): - for o in lst: - if o['name'] == name: - return o - - return None - - -def map_obj_to_commands(updates, module): - commands = list() - want, have = updates - - for w in want: - name = w['name'] - ipv4 = w['ipv4'] - ipv6 = w['ipv6'] - state = w['state'] - - interface = 'interface ' + name - commands.append(interface) - - obj_in_have = search_obj_in_list(name, have) - if state == 'absent' and obj_in_have: - if obj_in_have['ipv4']: - if ipv4: - commands.append('no ip address {0}'.format(ipv4)) - else: - commands.append('no ip address') - if obj_in_have['ipv6']: - if ipv6: - commands.append('no ipv6 address {0}'.format(ipv6)) - else: - commands.append('no ipv6 address') - - elif state == 'present': - if ipv4: - if obj_in_have is None or obj_in_have['ipv4'] is None or ipv4 != obj_in_have['ipv4']: - commands.append('ip address {0}'.format(ipv4)) - - if ipv6: - if obj_in_have is None or obj_in_have['ipv6'] is None or ipv6.lower() != obj_in_have['ipv6'].lower(): - commands.append('ipv6 address {0}'.format(ipv6)) - - if commands[-1] == interface: - commands.pop(-1) - - return commands - - -def map_config_to_obj(module): - config = get_config(module, flags=['| section interface']) - configobj = NetworkConfig(indent=3, contents=config) - - match = re.findall(r'^interface (\S+)', config, re.M) - if not match: - return list() - - instances = list() - - for item in set(match): - obj = { - 'name': item.lower(), - 'ipv4': parse_config_argument(configobj, item, 'ip address'), - 'ipv6': parse_config_argument(configobj, item, 'ipv6 address'), - 'state': 'present' - } - instances.append(obj) - - return instances - - -def map_params_to_obj(module): - obj = [] - - aggregate = module.params.get('aggregate') - if aggregate: - for item in aggregate: - for key in item: - if item.get(key) is None: - item[key] = module.params[key] - - item['name'] = item['name'].lower() - validate_param_values(module, item, item) - obj.append(item.copy()) - else: - obj.append({ - 'name': module.params['name'].lower(), - 'ipv4': module.params['ipv4'], - 'ipv6': module.params['ipv6'], - 'state': module.params['state'] - }) - - validate_param_values(module, obj) - - return obj - - -def main(): - """ main entry point for module execution - """ - element_spec = dict( - name=dict(), - ipv4=dict(), - ipv6=dict(), - state=dict(default='present', - choices=['present', 'absent']) - ) - - aggregate_spec = deepcopy(element_spec) - aggregate_spec['name'] = dict(required=True) - - # remove default in aggregate spec, to handle common arguments - remove_default_spec(aggregate_spec) - - argument_spec = dict( - aggregate=dict(type='list', elements='dict', options=aggregate_spec), - ) - - argument_spec.update(element_spec) - argument_spec.update(eos_argument_spec) - - required_one_of = [['name', 'aggregate']] - mutually_exclusive = [['name', 'aggregate']] - module = AnsibleModule(argument_spec=argument_spec, - required_one_of=required_one_of, - mutually_exclusive=mutually_exclusive, - supports_check_mode=True) - - warnings = list() - result = {'changed': False} - if warnings: - result['warnings'] = warnings - - want = map_params_to_obj(module) - have = map_config_to_obj(module) - commands = map_obj_to_commands((want, have), module) - result['commands'] = commands - - if commands: - commit = not module.check_mode - response = load_config(module, commands, commit=commit) - if response.get('diff') and module._diff: - result['diff'] = {'prepared': response.get('diff')} - result['session_name'] = response.get('session') - result['changed'] = True - - module.exit_json(**result) - - -if __name__ == '__main__': - main() diff --git a/lib/ansible/modules/network/eos/_eos_linkagg.py b/lib/ansible/modules/network/eos/_eos_linkagg.py deleted file mode 100644 index 4750413bc0..0000000000 --- a/lib/ansible/modules/network/eos/_eos_linkagg.py +++ /dev/null @@ -1,354 +0,0 @@ -#!/usr/bin/python -# -*- coding: utf-8 -*- - -# Copyright: (c) 2017, Ansible by Red Hat, inc -# GNU General Public License v3.0+ (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt) - -from __future__ import absolute_import, division, print_function -__metaclass__ = type - - -ANSIBLE_METADATA = {'metadata_version': '1.1', - 'status': ['deprecated'], - 'supported_by': 'network'} - -DOCUMENTATION = """ ---- -module: eos_linkagg -version_added: "2.5" -author: "Trishna Guha (@trishnaguha)" -short_description: Manage link aggregation groups on Arista EOS network devices -description: - - This module provides declarative management of link aggregation groups - on Arista EOS network devices. -deprecated: - removed_in: "2.13" - alternative: eos_lag_interfaces - why: Updated modules released with more functionality -notes: - - Tested against EOS 4.15 -options: - group: - description: - - Channel-group number for the port-channel - Link aggregation group. Range 1-2000. - mode: - description: - - Mode of the link aggregation group. - choices: ['active', 'on', 'passive'] - members: - description: - - List of members of the link aggregation group. - min_links: - description: - - Minimum number of ports required up - before bringing up the link aggregation group. - aggregate: - description: List of link aggregation definitions. - state: - description: - - State of the link aggregation group. - default: present - choices: ['present', 'absent'] - purge: - description: - - Purge links not defined in the I(aggregate) parameter. - default: no - type: bool -extends_documentation_fragment: eos -""" - -EXAMPLES = """ -- name: create link aggregation group - eos_linkagg: - group: 10 - state: present - -- name: delete link aggregation group - eos_linkagg: - group: 10 - state: absent - -- name: set link aggregation group to members - eos_linkagg: - group: 200 - min_links: 3 - mode: active - members: - - Ethernet0 - - Ethernet1 - -- name: remove link aggregation group from Ethernet0 - eos_linkagg: - group: 200 - min_links: 3 - mode: active - members: - - Ethernet1 - -- name: Create aggregate of linkagg definitions - eos_linkagg: - aggregate: - - { group: 3, mode: on, members: [Ethernet1] } - - { group: 100, mode: passive, min_links: 3, members: [Ethernet2] } - -- name: Remove aggregate of linkagg definitions - eos_linkagg: - aggregate: - - { group: 3, mode: on, members: [Ethernet1] } - - { group: 100, mode: passive, min_links: 3, members: [Ethernet2] } - state: absent -""" - -RETURN = """ -commands: - description: The list of configuration mode commands to send to the device - returned: always, except for the platforms that use Netconf transport to manage the device. - type: list - sample: - - interface port-channel 30 - - port-channel min-links 5 - - interface Ethernet3 - - channel-group 30 mode on - - no interface port-channel 30 -""" - -import re -from copy import deepcopy - -from ansible.module_utils.basic import AnsibleModule -from ansible.module_utils.network.common.utils import remove_default_spec -from ansible.module_utils.network.eos.eos import get_config, load_config -from ansible.module_utils.network.eos.eos import eos_argument_spec - - -def search_obj_in_list(group, lst): - for o in lst: - if o['group'] == group: - return o - - -def map_obj_to_commands(updates, module): - commands = list() - want, have = updates - purge = module.params['purge'] - - for w in want: - group = w['group'] - mode = w['mode'] - min_links = w['min_links'] - members = w.get('members') or [] - state = w['state'] - del w['state'] - - obj_in_have = search_obj_in_list(group, have) - - if state == 'absent': - if obj_in_have: - commands.append('no interface port-channel {0}'.format(group)) - - elif state == 'present': - cmd = ['interface port-channel {0}'.format(group), - 'end'] - if not obj_in_have: - if not group: - module.fail_json(msg='group is a required option') - commands.extend(cmd) - - if min_links != 'None': - commands.append('port-channel min-links {0}'.format(min_links)) - - if members: - for m in members: - commands.append('interface {0}'.format(m)) - commands.append('channel-group {0} mode {1}'.format(group, mode)) - - else: - if members: - if 'members' not in obj_in_have.keys(): - for m in members: - commands.extend(cmd) - commands.append('interface {0}'.format(m)) - commands.append('channel-group {0} mode {1}'.format(group, mode)) - - elif set(members) != set(obj_in_have['members']): - missing_members = list(set(members) - set(obj_in_have['members'])) - for m in missing_members: - commands.extend(cmd) - commands.append('interface {0}'.format(m)) - commands.append('channel-group {0} mode {1}'.format(group, mode)) - - superfluous_members = list(set(obj_in_have['members']) - set(members)) - for m in superfluous_members: - commands.extend(cmd) - commands.append('interface {0}'.format(m)) - commands.append('no channel-group {0}'.format(group)) - - if purge: - for h in have: - obj_in_want = search_obj_in_list(h['group'], want) - if not obj_in_want: - commands.append('no interface port-channel {0}'.format(h['group'])) - - return commands - - -def map_params_to_obj(module, required_together=None): - obj = [] - - aggregate = module.params.get('aggregate') - if aggregate: - for item in aggregate: - for key in item: - if item.get(key) is None: - item[key] = module.params[key] - - module._check_required_together(required_together, item) - d = item.copy() - d['group'] = str(d['group']) - d['min_links'] = str(d['min_links']) - - obj.append(d) - else: - obj.append({ - 'group': str(module.params['group']), - 'mode': module.params['mode'], - 'min_links': str(module.params['min_links']), - 'members': module.params['members'], - 'state': module.params['state'] - }) - - return obj - - -def parse_mode(group, member, config): - mode = None - - for line in config.strip().split('!'): - match_int = re.findall(r'interface {0}\\b'.format(member), line, re.M) - if match_int: - match = re.search(r'channel-group {0} mode (\S+)'.format(group), line, re.M) - if match: - mode = match.group(1) - - return mode - - -def parse_members(group, config): - members = [] - - for line in config.strip().split('!'): - match_group = re.findall(r'channel-group {0} mode'.format(group), line, re.M) - if match_group: - match = re.search(r'interface (\S+)', line, re.M) - if match: - members.append(match.group(1)) - - return members - - -def get_channel(group, module): - channel = {} - config = get_config(module, flags=['| section channel-group']) - - for line in config.split('\n'): - l = line.strip() - match = re.search(r'interface (\S+)', l, re.M) - - if match: - member = match.group(1) - channel['mode'] = parse_mode(group, member, config) - channel['members'] = parse_members(group, config) - - return channel - - -def parse_min_links(group, config): - min_links = '' - - for line in config.strip().split('!'): - match_pc = re.findall(r'interface Port-Channel{0}\\b'.format(group), line, re.M) - if match_pc: - match = re.search(r'port-channel min-links (\S+)', line, re.M) - if match: - min_links = match.group(1) - - return min_links - - -def map_config_to_obj(module): - objs = list() - config = get_config(module, flags=['| section port-channel']) - - for line in config.split('\n'): - l = line.strip() - match = re.search(r'interface Port-Channel(\S+)', l, re.M) - if match: - obj = {} - group = match.group(1) - obj['group'] = group - obj['min_links'] = parse_min_links(group, config) - obj.update(get_channel(group, module)) - objs.append(obj) - - return objs - - -def main(): - """ main entry point for module execution - """ - element_spec = dict( - group=dict(type='int'), - mode=dict(choices=['active', 'on', 'passive']), - min_links=dict(type='int'), - members=dict(type='list'), - state=dict(default='present', - choices=['present', 'absent']) - ) - - aggregate_spec = deepcopy(element_spec) - aggregate_spec['group'] = dict(required=True) - - # remove default in aggregate spec, to handle common arguments - remove_default_spec(aggregate_spec) - - argument_spec = dict( - aggregate=dict(type='list', elements='dict', options=aggregate_spec), - purge=dict(default=False, type='bool') - ) - - argument_spec.update(element_spec) - argument_spec.update(eos_argument_spec) - - required_one_of = [['group', 'aggregate']] - required_together = [['members', 'mode']] - mutually_exclusive = [['group', 'aggregate']] - module = AnsibleModule(argument_spec=argument_spec, - required_one_of=required_one_of, - required_together=required_together, - mutually_exclusive=mutually_exclusive, - supports_check_mode=True) - - warnings = list() - result = {'changed': False} - if warnings: - result['warnings'] = warnings - - want = map_params_to_obj(module) - have = map_config_to_obj(module) - commands = map_obj_to_commands((want, have), module) - result['commands'] = commands - - if commands: - commit = not module.check_mode - response = load_config(module, commands, commit=commit) - if response.get('diff') and module._diff: - result['diff'] = {'prepared': response.get('diff')} - result['session_name'] = response.get('session') - result['changed'] = True - - module.exit_json(**result) - - -if __name__ == '__main__': - main() diff --git a/lib/ansible/modules/network/eos/_eos_static_route.py b/lib/ansible/modules/network/eos/_eos_static_route.py deleted file mode 100644 index ad244e4b35..0000000000 --- a/lib/ansible/modules/network/eos/_eos_static_route.py +++ /dev/null @@ -1,291 +0,0 @@ -#!/usr/bin/python -# -*- coding: utf-8 -*- - -# Copyright: (c) 2017, Ansible by Red Hat, inc -# GNU General Public License v3.0+ (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt) - -from __future__ import absolute_import, division, print_function -__metaclass__ = type - - -ANSIBLE_METADATA = {'metadata_version': '1.1', - 'status': ['deprecated'], - 'supported_by': 'network'} - -DOCUMENTATION = """ ---- -module: eos_static_route -version_added: "2.5" -author: "Trishna Guha (@trishnaguha)" -short_description: Manage static IP routes on Arista EOS network devices -description: - - This module provides declarative management of static - IP routes on Arista EOS network devices. -deprecated: - removed_in: '2.13' - alternative: eos_static_routes - why: Updated modules with more functionality -notes: - - Tested against EOS 4.15 -options: - address: - description: - - Network address with prefix of the static route. - required: true - aliases: ['prefix'] - next_hop: - description: - - Next hop IP of the static route. - required: true - vrf: - description: - - VRF for static route. - default: default - version_added: 2.9 - admin_distance: - description: - - Admin distance of the static route. - default: 1 - aggregate: - description: List of static route definitions - state: - description: - - State of the static route configuration. - default: present - choices: ['present', 'absent'] -extends_documentation_fragment: eos -""" - -EXAMPLES = """ -- name: configure static route - eos_static_route: - address: 10.0.2.0/24 - next_hop: 10.8.38.1 - admin_distance: 2 -- name: delete static route - eos_static_route: - address: 10.0.2.0/24 - next_hop: 10.8.38.1 - state: absent -- name: configure static routes using aggregate - eos_static_route: - aggregate: - - { address: 10.0.1.0/24, next_hop: 10.8.38.1 } - - { address: 10.0.3.0/24, next_hop: 10.8.38.1 } -- name: Delete static route using aggregate - eos_static_route: - aggregate: - - { address: 10.0.1.0/24, next_hop: 10.8.38.1 } - - { address: 10.0.3.0/24, next_hop: 10.8.38.1 } - state: absent -""" - -RETURN = """ -commands: - description: The list of configuration mode commands to send to the device - returned: always - type: list - sample: - - ip route 10.0.2.0/24 10.8.38.1 3 - - no ip route 10.0.2.0/24 10.8.38.1 -""" - -import re - -from copy import deepcopy - -from ansible.module_utils.basic import AnsibleModule -from ansible.module_utils.network.common.utils import is_masklen, validate_ip_address -from ansible.module_utils.network.common.utils import remove_default_spec, validate_prefix -from ansible.module_utils.network.eos.eos import get_config, load_config -from ansible.module_utils.network.eos.eos import eos_argument_spec - - -def is_address(value): - if value: - address = value.split('/') - if is_masklen(address[1]) and validate_ip_address(address[0]): - return True - return False - - -def is_hop(value): - if value: - if validate_ip_address(value): - return True - return False - - -def map_obj_to_commands(updates, module): - commands = list() - want, have = updates - - for w in want: - address = w['address'] - next_hop = w['next_hop'] - admin_distance = w['admin_distance'] - vrf = w['vrf'] - state = w['state'] - del w['state'] - - if state == 'absent' and w in have: - if vrf == 'default': - commands.append('no ip route %s %s' % (address, next_hop)) - else: - commands.append('no ip route vrf %s %s %s' % (vrf, address, next_hop)) - elif state == 'present' and w not in have: - if vrf == 'default': - commands.append('ip route %s %s %d' % (address, next_hop, admin_distance)) - else: - commands.append('ip route vrf %s %s %s %d' % (vrf, address, next_hop, admin_distance)) - - return commands - - -def map_params_to_obj(module, required_together=None): - obj = [] - - aggregate = module.params.get('aggregate') - if aggregate: - for item in aggregate: - for key in item: - if item.get(key) is None: - item[key] = module.params[key] - - module._check_required_together(required_together, item) - d = item.copy() - - obj.append(d) - else: - obj.append({ - 'address': module.params['address'].strip(), - 'next_hop': module.params['next_hop'].strip(), - 'admin_distance': module.params['admin_distance'], - 'state': module.params['state'], - 'vrf': module.params['vrf'] - }) - - return obj - - -def map_config_to_obj(module): - objs = [] - - try: - out = get_config(module, flags=['| include ip.route']) - except IndexError: - out = '' - if out: - lines = out.splitlines() - for line in lines: - obj = {} - add_match = re.search(r'ip route ([\d\./]+)', line, re.M) - if add_match: - obj['vrf'] = 'default' - address = add_match.group(1) - if is_address(address): - obj['address'] = address - hop_match = re.search(r'ip route {0} ([\d\./]+)'.format(address), line, re.M) - if hop_match: - hop = hop_match.group(1) - if is_hop(hop): - obj['next_hop'] = hop - dist_match = re.search(r'ip route {0} {1} (\d+)'.format(address, hop), line, re.M) - if dist_match: - distance = dist_match.group(1) - obj['admin_distance'] = int(distance) - else: - obj['admin_distance'] = 1 - - vrf_match = re.search(r'ip route vrf ([\w]+) ([\d\./]+)', line, re.M) - if vrf_match: - vrf = vrf_match.group(1) - obj['vrf'] = vrf - address = vrf_match.group(2) - if is_address(address): - obj['address'] = address - hop_vrf_match = re.search(r'ip route vrf {0} {1} ([\d\./]+)'.format(vrf, address), line, re.M) - if hop_vrf_match: - hop = hop_vrf_match.group(1) - if is_hop(hop): - obj['next_hop'] = hop - dist_vrf_match = re.search(r'ip route vrf {0} {1} {2} (\d+)'.format(vrf, address, hop), line, re.M) - if dist_vrf_match: - distance = dist_vrf_match.group(1) - obj['admin_distance'] = int(distance) - else: - obj['admin_distance'] = 1 - - objs.append(obj) - - return objs - - -def main(): - """ main entry point for module execution - """ - element_spec = dict( - address=dict(type='str', aliases=['prefix']), - next_hop=dict(type='str'), - vrf=dict(type='str', default='default'), - admin_distance=dict(default=1, type='int'), - state=dict(default='present', choices=['present', 'absent']) - ) - - aggregate_spec = deepcopy(element_spec) - aggregate_spec['address'] = dict(required=True) - - # remove default in aggregate spec, to handle common arguments - remove_default_spec(aggregate_spec) - - argument_spec = dict( - aggregate=dict(type='list', elements='dict', options=aggregate_spec), - ) - - argument_spec.update(element_spec) - argument_spec.update(eos_argument_spec) - - required_one_of = [['aggregate', 'address']] - required_together = [['address', 'next_hop']] - mutually_exclusive = [['aggregate', 'address']] - - module = AnsibleModule(argument_spec=argument_spec, - required_one_of=required_one_of, - required_together=required_together, - mutually_exclusive=mutually_exclusive, - supports_check_mode=True) - - address = module.params['address'] - if address is not None: - prefix = address.split('/')[-1] - - if address and prefix: - if '/' not in address or not validate_ip_address(address.split('/')[0]): - module.fail_json(msg='{0} is not a valid IP address'.format(address)) - - if not validate_prefix(prefix): - module.fail_json(msg='Length of prefix should be between 0 and 32 bits') - - warnings = list() - result = {'changed': False} - if warnings: - result['warnings'] = warnings - - want = map_params_to_obj(module) - have = map_config_to_obj(module) - commands = map_obj_to_commands((want, have), module) - result['commands'] = commands - - if commands: - commit = not module.check_mode - response = load_config(module, commands, commit=commit) - if response.get('diff') and module._diff: - result['diff'] = {'prepared': response.get('diff')} - result['session_name'] = response.get('session') - result['changed'] = True - - module.exit_json(**result) - - -if __name__ == '__main__': - main() diff --git a/lib/ansible/modules/network/eos/_eos_vlan.py b/lib/ansible/modules/network/eos/_eos_vlan.py deleted file mode 100644 index a38cd671d2..0000000000 --- a/lib/ansible/modules/network/eos/_eos_vlan.py +++ /dev/null @@ -1,356 +0,0 @@ -#!/usr/bin/python -# -*- coding: utf-8 -*- - -# (c) 2017, Ansible by Red Hat, inc -# -# This file is part of Ansible by Red Hat -# -# Ansible is free software: you can redistribute it and/or modify -# it under the terms of the GNU General Public License as published by -# the Free Software Foundation, either version 3 of the License, or -# (at your option) any later version. -# -# Ansible is distributed in the hope that it will be useful, -# but WITHOUT ANY WARRANTY; without even the implied warranty of -# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the -# GNU General Public License for more details. -# -# You should have received a copy of the GNU General Public License -# along with Ansible. If not, see . -# - -ANSIBLE_METADATA = {'metadata_version': '1.1', - 'status': ['deprecated'], - 'supported_by': 'network'} - - -DOCUMENTATION = """ ---- -module: eos_vlan -version_added: "2.4" -author: "Ricardo Carrillo Cruz (@rcarrillocruz)" -short_description: Manage VLANs on Arista EOS network devices -description: - - This module provides declarative management of VLANs - on Arista EOS network devices. -deprecated: - removed_in: "2.13" - alternative: eos_vlans - why: Updated modules released with more functionality -notes: - - Tested against EOS 4.15 -options: - name: - description: - - Name of the VLAN. - vlan_id: - description: - - ID of the VLAN. - required: true - interfaces: - description: - - List of interfaces that should be associated to the VLAN. The name of interface is - case sensitive and should be in expanded format and not abbreviated. - associated_interfaces: - description: - - This is a intent option and checks the operational state of the for given vlan C(name) - for associated interfaces. The name of interface is case sensitive and should be in - expanded format and not abbreviated. If the value in the C(associated_interfaces) - does not match with the operational state of vlan interfaces on device it will result in failure. - version_added: "2.5" - delay: - description: - - Delay the play should wait to check for declarative intent params values. - default: 10 - aggregate: - description: List of VLANs definitions. - purge: - description: - - Purge VLANs not defined in the I(aggregate) parameter. - default: no - type: bool - state: - description: - - State of the VLAN configuration. - default: present - choices: ['present', 'absent', 'active', 'suspend'] -extends_documentation_fragment: eos -""" - -EXAMPLES = """ -- name: Create vlan - eos_vlan: - vlan_id: 4000 - name: vlan-4000 - state: present - -- name: Add interfaces to vlan - eos_vlan: - vlan_id: 4000 - state: present - interfaces: - - Ethernet1 - - Ethernet2 - -- name: Check if interfaces is assigned to vlan - eos_vlan: - vlan_id: 4000 - associated_interfaces: - - Ethernet1 - - Ethernet2 - -- name: Suspend vlan - eos_vlan: - vlan_id: 4000 - state: suspend - -- name: Unsuspend vlan - eos_vlan: - vlan_id: 4000 - state: active - -- name: Create aggregate of vlans - eos_vlan: - aggregate: - - vlan_id: 4000 - - {vlan_id: 4001, name: vlan-4001} -""" - -RETURN = """ -commands: - description: The list of configuration mode commands to send to the device - returned: always - type: list - sample: - - vlan 20 - - name test-vlan -""" -import time - -from copy import deepcopy - -from ansible.module_utils.basic import AnsibleModule -from ansible.module_utils.network.common.utils import remove_default_spec -from ansible.module_utils.network.eos.eos import load_config, run_commands -from ansible.module_utils.network.eos.eos import eos_argument_spec - - -def search_obj_in_list(vlan_id, lst): - for o in lst: - if o['vlan_id'] == vlan_id: - return o - - -def map_obj_to_commands(updates, module): - commands = list() - want, have = updates - purge = module.params['purge'] - - for w in want: - vlan_id = w['vlan_id'] - state = w['state'] - - obj_in_have = search_obj_in_list(vlan_id, have) - - if state == 'absent': - if obj_in_have: - commands.append('no vlan %s' % w['vlan_id']) - elif state == 'present': - if not obj_in_have: - commands.append('vlan %s' % w['vlan_id']) - if w['name']: - commands.append('name %s' % w['name']) - - if w['interfaces']: - for i in w['interfaces']: - commands.append('interface %s' % i) - commands.append('switchport access vlan %s' % w['vlan_id']) - else: - if w['name'] and w['name'] != obj_in_have['name']: - commands.append('vlan %s' % w['vlan_id']) - commands.append('name %s' % w['name']) - - if w['interfaces']: - if not obj_in_have['interfaces']: - for i in w['interfaces']: - commands.append('vlan %s' % w['vlan_id']) - commands.append('interface %s' % i) - commands.append('switchport access vlan %s' % w['vlan_id']) - elif set(w['interfaces']) != obj_in_have['interfaces']: - missing_interfaces = list(set(w['interfaces']) - set(obj_in_have['interfaces'])) - for i in missing_interfaces: - commands.append('vlan %s' % w['vlan_id']) - commands.append('interface %s' % i) - commands.append('switchport access vlan %s' % w['vlan_id']) - - superfluous_interfaces = list(set(obj_in_have['interfaces']) - set(w['interfaces'])) - for i in superfluous_interfaces: - commands.append('vlan %s' % w['vlan_id']) - commands.append('interface %s' % i) - commands.append('no switchport access vlan %s' % w['vlan_id']) - else: - if not obj_in_have: - commands.append('vlan %s' % w['vlan_id']) - if w['name']: - commands.append('name %s' % w['name']) - commands.append('state %s' % w['state']) - elif (w['name'] and obj_in_have['name'] != w['name']) or obj_in_have['state'] != w['state']: - commands.append('vlan %s' % w['vlan_id']) - - if w['name']: - if obj_in_have['name'] != w['name']: - commands.append('name %s' % w['name']) - - if obj_in_have['state'] != w['state']: - commands.append('state %s' % w['state']) - - if purge: - for h in have: - obj_in_want = search_obj_in_list(h['vlan_id'], want) - if not obj_in_want and h['vlan_id'] != '1': - commands.append('no vlan %s' % h['vlan_id']) - - return commands - - -def map_config_to_obj(module): - objs = [] - vlans = run_commands(module, ['show vlan configured-ports | json']) - - for vlan in vlans[0]['vlans']: - obj = {} - obj['vlan_id'] = vlan - obj['name'] = vlans[0]['vlans'][vlan]['name'] - obj['state'] = vlans[0]['vlans'][vlan]['status'] - obj['interfaces'] = [] - - interfaces = vlans[0]['vlans'][vlan] - - for interface in interfaces['interfaces']: - obj['interfaces'].append(interface) - - if obj['state'] == 'suspended': - obj['state'] = 'suspend' - - objs.append(obj) - - return objs - - -def map_params_to_obj(module): - obj = [] - aggregate = module.params.get('aggregate') - if aggregate: - for item in aggregate: - for key in item: - if item.get(key) is None: - item[key] = module.params[key] - - if item.get('interfaces'): - item['interfaces'] = [intf.replace(" ", "") for intf in item.get('interfaces') if intf] - - if item.get('associated_interfaces'): - item['associated_interfaces'] = [intf.replace(" ", "") for intf in item.get('associated_interfaces') if intf] - - d = item.copy() - d['vlan_id'] = str(d['vlan_id']) - - obj.append(d) - else: - obj.append({ - 'vlan_id': str(module.params['vlan_id']), - 'name': module.params['name'], - 'state': module.params['state'], - 'interfaces': [intf.replace(" ", "") for intf in module.params['interfaces']] if module.params['interfaces'] else [], - 'associated_interfaces': [intf.replace(" ", "") for intf in - module.params['associated_interfaces']] if module.params['associated_interfaces'] else [] - - }) - - return obj - - -def check_declarative_intent_params(want, module, result): - have = None - is_delay = False - - for w in want: - if w.get('associated_interfaces') is None: - continue - - if result['changed'] and not is_delay: - time.sleep(module.params['delay']) - is_delay = True - - if have is None: - have = map_config_to_obj(module) - - for i in w['associated_interfaces']: - obj_in_have = search_obj_in_list(w['vlan_id'], have) - - if obj_in_have and 'interfaces' in obj_in_have and i not in obj_in_have['interfaces']: - module.fail_json(msg="Interface %s not configured on vlan %s" % (i, w['vlan_id'])) - - -def main(): - """ main entry point for module execution - """ - element_spec = dict( - vlan_id=dict(type='int'), - name=dict(), - interfaces=dict(type='list'), - associated_interfaces=dict(type='list'), - delay=dict(default=10, type='int'), - state=dict(default='present', - choices=['present', 'absent', 'active', 'suspend']) - ) - - aggregate_spec = deepcopy(element_spec) - aggregate_spec['vlan_id'] = dict(required=True) - - # remove default in aggregate spec, to handle common arguments - remove_default_spec(aggregate_spec) - - argument_spec = dict( - aggregate=dict(type='list', elements='dict', options=aggregate_spec), - purge=dict(default=False, type='bool') - ) - - argument_spec.update(element_spec) - argument_spec.update(eos_argument_spec) - - required_one_of = [['vlan_id', 'aggregate']] - mutually_exclusive = [['vlan_id', 'aggregate']] - module = AnsibleModule(argument_spec=argument_spec, - supports_check_mode=True, - required_one_of=required_one_of, - mutually_exclusive=mutually_exclusive) - - warnings = list() - - result = {'changed': False} - - if warnings: - result['warnings'] = warnings - - want = map_params_to_obj(module) - have = map_config_to_obj(module) - - commands = map_obj_to_commands((want, have), module) - result['commands'] = commands - - if commands: - commit = not module.check_mode - response = load_config(module, commands, commit=commit) - if response.get('diff') and module._diff: - result['diff'] = {'prepared': response.get('diff')} - result['session_name'] = response.get('session') - result['changed'] = True - - check_declarative_intent_params(want, module, result) - - module.exit_json(**result) - - -if __name__ == '__main__': - main() diff --git a/lib/ansible/modules/network/eos/eos_acl_interfaces.py b/lib/ansible/modules/network/eos/eos_acl_interfaces.py deleted file mode 100644 index b9b16c6e5d..0000000000 --- a/lib/ansible/modules/network/eos/eos_acl_interfaces.py +++ /dev/null @@ -1,415 +0,0 @@ -#!/usr/bin/python -# -*- coding: utf-8 -*- -# Copyright 2019 Red Hat -# GNU General Public License v3.0+ -# (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt) - -############################################# -# WARNING # -############################################# -# -# This file is auto generated by the resource -# module builder playbook. -# -# Do not edit this file manually. -# -# Changes to this file will be over written -# by the resource module builder. -# -# Changes should be made in the model used to -# generate this file or in the resource module -# builder template. -# -############################################# - -""" -The module file for eos_acl_interfaces -""" - -from __future__ import absolute_import, division, print_function -__metaclass__ = type - -ANSIBLE_METADATA = { - 'metadata_version': '1.1', - 'status': ['preview'], - 'supported_by': 'network' -} - -DOCUMENTATION = """ ---- -module: eos_acl_interfaces -version_added: "2.10" -short_description: Manage adding and removing Access Control Lists (ACLs) from interfaces on devices running EOS software. -description: - - This module manages adding and removing Access Control Lists (ACLs) from interfaces on devices running EOS software. -author: GomathiSelvi S (@GomathiselviS) -options: - config: - description: A dictionary of ACL options for interfaces. - type: list - elements: dict - suboptions: - name: - description: - - Name/Identifier for the interface. - type: str - required: True - access_groups: - type: list - elements: dict - description: - - Specifies ACLs attached to the interfaces. - suboptions: - afi: - description: - - Specifies the AFI for the ACL(s) to be configured on this interface. - type: str - choices: ['ipv4', 'ipv6'] - required: True - acls: - type: list - description: - - Specifies the ACLs for the provided AFI. - elements: dict - suboptions: - name: - description: - - Specifies the name of the IPv4/IPv4 ACL for the interface. - type: str - required: True - direction: - description: - - Specifies the direction of packets that the ACL will be applied on. - type: str - choices: ['in', 'out'] - required: True - running_config: - description: - - The module, by default, will connect to the remote device and - retrieve the current running-config to use as a base for comparing - against the contents of source. There are times when it is not - desirable to have the task get the current running-config for - every task in a playbook. The I(running_config) argument allows the - implementer to pass in the configuration to use as the base - config for comparison. This value of this option should be the - output received from device by executing command - version_added: "2.10" - type: str - state: - description: - - The state the configuration should be left in. - type: str - choices: - - merged - - replaced - - overridden - - deleted - - gathered - - parsed - - rendered - default: merged -""" -EXAMPLES = """ -# Using Merged - -# Before state: -# ------------- -# -# eos#sh running-config | include interface|access-group -# interface Ethernet1 -# interface Ethernet2 -# interface Ethernet3 - -- name: "Merge module attributes of given access-groups" - eos_acl_interfaces: - config: - - name: Ethernet2 - access_groups: - - afi: ipv4 - acls: - name: acl01 - direction: in - - afi: ipv6 - acls: - name: acl03 - direction: out - state: merged - -# Commands Fired: -# --------------- -# -# interface Ethernet2 -# ip access-group acl01 in -# ipv6 access-group acl03 out - -# After state: -# ------------- -# -# eos#sh running-config | include interface| access-group -# interface Loopback888 -# interface Ethernet1 -# interface Ethernet2 -# ip access-group acl01 in -# ipv6 access-group acl03 out -# interface Ethernet3 - - -# Using Replaced - -# Before state: -# ------------- -# -# eos#sh running-config | include interface|access-group -# interface Ethernet1 -# interface Ethernet2 -# ip access-group acl01 in -# ipv6 access-group acl03 out -# interface Ethernet3 -# ip access-group acl01 in - -- name: "Replace module attributes of given access-groups" - eos_acl_interfaces: - config: - - name: Ethernet2 - access_groups: - - afi: ipv4 - acls: - name: acl01 - direction: out - state: replaced - -# Commands Fired: -# --------------- -# -# interface Ethernet2 -# no ip access-group acl01 in -# no ipv6 access-group acl03 out -# ip access-group acl01 out - -# After state: -# ------------- -# -# eos#sh running-config | include interface| access-group -# interface Loopback888 -# interface Ethernet1 -# interface Ethernet2 -# ip access-group acl01 out -# interface Ethernet3 -# ip access-group acl01 in - - -# Using Overridden - -# Before state: -# ------------- -# -# eos#sh running-config | include interface|access-group -# interface Ethernet1 -# interface Ethernet2 -# ip access-group acl01 in -# ipv6 access-group acl03 out -# interface Ethernet3 -# ip access-group acl01 in - -- name: "Override module attributes of given access-groups" - eos_acl_interfaces: - config: - - name: Ethernet2 - access_groups: - - afi: ipv4 - acls: - name: acl01 - direction: out - state: overridden - -# Commands Fired: -# --------------- -# -# interface Ethernet2 -# no ip access-group acl01 in -# no ipv6 access-group acl03 out -# ip access-group acl01 out -# interface Ethernet3 -# no ip access-group acl01 in - -# After state: -# ------------- -# -# eos#sh running-config | include interface| access-group -# interface Loopback888 -# interface Ethernet1 -# interface Ethernet2 -# ip access-group acl01 out -# interface Ethernet3 - - -# Using Deleted - -# Before state: -# ------------- -# -# eos#sh running-config | include interface|access-group -# interface Ethernet1 -# interface Ethernet2 -# ip access-group acl01 in -# ipv6 access-group acl03 out -# interface Ethernet3 -# ip access-group acl01 out - -- name: "Delete module attributes of given access-groups" - eos_acl_interfaces: - config: - - name: Ethernet2 - access_groups: - - afi: ipv4 - acls: - name: acl01 - direction: in - - afi: ipv6 - acls: - name: acl03 - direction: out - state: deleted - -# Commands Fired: -# --------------- -# -# interface Ethernet2 -# no ip access-group acl01 in -# no ipv6 access-group acl03 out - -# After state: -# ------------- -# -# eos#sh running-config | include interface| access-group -# interface Loopback888 -# interface Ethernet1 -# interface Ethernet2 -# interface Ethernet3 -# ip access-group acl01 out - - -# Before state: -# ------------- -# -# eos#sh running-config | include interface| access-group -# interface Ethernet1 -# interface Ethernet2 -# ip access-group acl01 in -# ipv6 access-group acl03 out -# interface Ethernet3 -# ip access-group acl01 out - -- name: "Delete module attributes of given access-groups from ALL Interfaces" - eos_acl_interfaces: - config: - state: deleted - -# Commands Fired: -# --------------- -# -# interface Ethernet2 -# no ip access-group acl01 in -# no ipv6 access-group acl03 out -# interface Ethernet3 -# no ip access-group acl01 out - -# After state: -# ------------- -# -# eos#sh running-config | include interface| access-group -# interface Loopback888 -# interface Ethernet1 -# interface Ethernet2 -# interface Ethernet3 - -# Before state: -# ------------- -# -# eos#sh running-config | include interface| access-group -# interface Ethernet1 -# interface Ethernet2 -# ip access-group acl01 in -# ipv6 access-group acl03 out -# interface Ethernet3 -# ip access-group acl01 out - -- name: "Delete acls under afi" - eos_acl_interfaces: - config: - - name: Ethernet3 - access_groups: - - afi: "ipv4" - - name: Ethernet2 - access_groups: - - afi: "ipv6" - state: deleted - -# Commands Fired: -# --------------- -# -# interface Ethernet2 -# no ipv6 access-group acl03 out -# interface Ethernet3 -# no ip access-group acl01 out - -# After state: -# ------------- -# -# eos#sh running-config | include interface| access-group -# interface Loopback888 -# interface Ethernet1 -# interface Ethernet2 -# ip access-group acl01 in -# interface Ethernet3 - - -""" -RETURN = """ -before: - description: The configuration prior to the model invocation. - returned: always - type: list - sample: > - The configuration returned will always be in the same format - of the parameters above. -after: - description: The resulting configuration model invocation. - returned: when changed - type: list - sample: > - The configuration returned will always be in the same format - of the parameters above. -commands: - description: The set of commands pushed to the remote device. - returned: always - type: list - sample: - - interface Ethernet2 - - ip access-group acl01 in - - ipv6 access-group acl03 out - - interface Ethernet3 - - ip access-group acl01 out -""" - - -from ansible.module_utils.basic import AnsibleModule -from ansible.module_utils.network.eos.argspec.acl_interfaces.acl_interfaces import Acl_interfacesArgs -from ansible.module_utils.network.eos.config.acl_interfaces.acl_interfaces import Acl_interfaces - - -def main(): - """ - Main entry point for module execution - - :returns: the result form module invocation - """ - module = AnsibleModule(argument_spec=Acl_interfacesArgs.argument_spec, - supports_check_mode=True) - - result = Acl_interfaces(module).execute_module() - module.exit_json(**result) - - -if __name__ == '__main__': - main() diff --git a/lib/ansible/modules/network/eos/eos_acls.py b/lib/ansible/modules/network/eos/eos_acls.py deleted file mode 100644 index 0dffd2c6df..0000000000 --- a/lib/ansible/modules/network/eos/eos_acls.py +++ /dev/null @@ -1,925 +0,0 @@ -#!/usr/bin/python -# -*- coding: utf-8 -*- -# Copyright 2019 Red Hat -# GNU General Public License v3.0+ -# (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt) - -############################################# -# WARNING # -############################################# -# -# This file is auto generated by the resource -# module builder playbook. -# -# Do not edit this file manually. -# -# Changes to this file will be over written -# by the resource module builder. -# -# Changes should be made in the model used to -# generate this file or in the resource module -# builder template. -# -############################################# - -""" -The module file for eos_acls -""" - -from __future__ import absolute_import, division, print_function -__metaclass__ = type - -ANSIBLE_METADATA = {'metadata_version': '1.1', - 'status': ['preview'], - 'supported_by': 'network'} - -DOCUMENTATION = """ ---- -module: eos_acls -version_added: '2.10' -short_description: 'Manages IP access-list attributes of Arista EOS interfaces' -description: This module manages the IP access-list attributes of Arista EOS interfaces. -author: Gomathiselvi S (@GomathiselviS) -notes: -- Tested against Arista vEOS v4.20.10M -options: - config: - description: A dictionary of IP access-list options - type: list - elements: dict - suboptions: - afi: - description: - - The Address Family Indicator (AFI) for the Access Control Lists (ACL). - type: str - required: true - choices: ['ipv4', 'ipv6'] - acls: - description: - - A list of Access Control Lists (ACL). - type: list - elements: dict - suboptions: - standard: - description: standard access-list or not - type: bool - default: False - name: - description: Name of the acl-list - type: str - required: true - aces: - description: Filtering data - type: list - elements: dict - suboptions: - sequence: - description: sequence number for the ordered list of rules - type: int - remark: - description: Specify a comment - type: str - fragment_rules: - description: Add fragment rules - type: bool - grant: - description: Action to be applied on the rule - type: str - choices: ['permit', 'deny'] - line: - description: For fact gathering, any ACE that is not fully parsed, while show up as a value of this attribute. - type: str - aliases: ['ace'] - protocol: - description: - - Specify the protocol to match. - - Refer to vendor documentation for valid values. - type: str - vlan: - description: Vlan options - type: str - protocol_options: - description: All the possible sub options for the protocol chosen. - type: dict - suboptions: - tcp: - description: Options for tcp protocol. - type: dict - suboptions: - flags: - description: Match TCP packet flags - type: dict - suboptions: - ack: - description: Match on the ACK bit - type: bool - established: - description: Match established connections - type: bool - fin: - description: Match on the FIN bit - type: bool - psh: - description: Match on the PSH bit - type: bool - rst: - description: Match on the RST bit - type: bool - syn: - description: Match on the SYN bit - type: bool - urg: - description: Match on the URG bit - type: bool - icmp: - description: - - Internet Control Message Protocol settings. - type: dict - suboptions: - administratively_prohibited: - description: Administratively prohibited - type: bool - alternate_address: - description: Alternate address - type: bool - conversion_error: - description: Datagram conversion - type: bool - dod_host_prohibited: - description: Host prohibited - type: bool - dod_net_prohibited: - description: Net prohibited - type: bool - echo: - description: Echo (ping) - type: bool - echo_reply: - description: Echo reply - type: bool - general_parameter_problem: - description: Parameter problem - type: bool - host_isolated: - description: Host isolated - type: bool - host_precedence_unreachable: - description: Host unreachable for precedence - type: bool - host_redirect: - description: Host redirect - type: bool - host_tos_redirect: - description: Host redirect for TOS - type: bool - host_tos_unreachable: - description: Host unreachable for TOS - type: bool - host_unknown: - description: Host unknown - type: bool - host_unreachable: - description: Host unreachable - type: bool - information_reply: - description: Information replies - type: bool - information_request: - description: Information requests - type: bool - mask_reply: - description: Mask replies - type: bool - mask_request: - description: Mask requests - type: bool - message_code: - description: ICMP message code - type: int - message_type: - description: ICMP message type - type: int - mobile_redirect: - description: Mobile host redirect - type: bool - net_redirect: - description: Network redirect - type: bool - net_tos_redirect: - description: Net redirect for TOS - type: bool - net_tos_unreachable: - description: Network unreachable for TOS - type: bool - net_unreachable: - description: Net unreachable - type: bool - network_unknown: - description: Network unknown - type: bool - no_room_for_option: - description: Parameter required but no room - type: bool - option_missing: - description: Parameter required but not present - type: bool - packet_too_big: - description: Fragmentation needed and DF set - type: bool - parameter_problem: - description: All parameter problems - type: bool - port_unreachable: - description: Port unreachable - type: bool - precedence_unreachable: - description: Precedence cutoff - type: bool - protocol_unreachable: - description: Protocol unreachable - type: bool - reassembly_timeout: - description: Reassembly timeout - type: bool - redirect: - description: All redirects - type: bool - router_advertisement: - description: Router discovery advertisements - type: bool - router_solicitation: - description: Router discovery solicitations - type: bool - source_quench: - description: Source quenches - type: bool - source_route_failed: - description: Source route failed - type: bool - time_exceeded: - description: All time exceededs - type: bool - timestamp_reply: - description: Timestamp replies - type: bool - timestamp_request: - description: Timestamp requests - type: bool - traceroute: - description: Traceroute - type: bool - ttl_exceeded: - description: TTL exceeded - type: bool - unreachable: - description: All unreachables - type: bool - message_num: - description: icmp msg type number. - type: int - icmpv6: - description: Options for icmpv6. - type: dict - suboptions: - address_unreachable: - description: address unreachable - type: bool - beyond_scope: - description: beyond_scope - type: bool - echo_reply: - description: echo_reply - type: bool - echo_request: - description: echo reques - type: bool - erroneous_header: - description: erroneous header - type: bool - fragment_reassembly_exceeded: - description: fragment_reassembly_exceeded - type: bool - hop_limit_exceeded: - description: hop limit exceeded - type: bool - neighbor_advertisement: - description: neighbor advertisement - type: bool - neighbor_solicitation: - description: neighbor_solicitation - type: bool - no_admin: - description: no admin - type: bool - no_route: - description: no route - type: bool - packet_too_big: - description: packet too big - type: bool - parameter_problem: - description: parameter problem - type: bool - port_unreachable: - description: port unreachable - type: bool - redirect_message: - description: redirect message - type: bool - reject_route: - description: reject route - type: bool - router_advertisement: - description: router_advertisement - type: bool - router_solicitation: - description: router_solicitation - type: bool - source_address_failed: - description: source_address_failed - type: bool - source_routing_error: - description: source_routing_error - type: bool - time_exceeded: - description: time_exceeded - type: bool - unreachable: - description: unreachable - type: bool - unrecognized_ipv6_option: - description: unrecognized_ipv6_option - type: bool - unrecognized_next_header: - description: unrecognized_next_header - type: bool - ip: - description : Internet Protocol. - type: dict - suboptions: - nexthop_group: - description: Nexthop-group name. - type: str - ipv6: - description : Internet V6 Protocol. - type: dict - suboptions: - nexthop_group: - description: Nexthop-group name. - type: str - source: - description: The packet's source address - type: dict - suboptions: - address: - description: dotted decimal notation of IP address - type: str - wildcard_bits: - description: Source wildcard bits - type: str - subnet_address: - description: A subnet address - type: str - host: - description: Host IP address - type: str - any: - description: Rule matches all source addresses - type: bool - port_protocol: - description: Specify source port/protocoli, along with operator. (comes with tcp/udp). - type: dict - destination: - description: The packet's destination address - type: dict - suboptions: - address: - description: dotted decimal notation of IP address - type: str - wildcard_bits: - description: Source wildcard bits - type: str - subnet_address: - description: A subnet address - type: str - host: - description: Host IP address - type: str - any: - description: Rule matches all source addresses - type: bool - port_protocol: - description: Specify dest port/protocol, along with operator . (comes with tcp/udp). - type: dict - ttl: - description: Compares the TTL (time-to-live) value in the packet to a specified value - type: dict - suboptions: - eq: - description: Match a single TTL value - type: int - lt: - description: Match TTL lesser than this number - type: int - gt: - description: Match TTL greater than this number - type: int - neq: - description: Match TTL not equal to this value - type: int - fragments: - description: Match non-head fragment packets - type: bool - log: - description: Log matches against this rule - type: bool - tracked: - description: Match packets in existing ICMP/UDP/TCP connections - type: bool - hop_limit: - description: Hop limit value. - type: dict - running_config: - description: - - The module, by default, will connect to the remote device and - retrieve the current running-config to use as a base for comparing - against the contents of source. There are times when it is not - desirable to have the task get the current running-config for - every task in a playbook. The I(running_config) argument allows the - implementer to pass in the configuration to use as the base - config for comparison. This value of this option should be the - output received from device by executing command - version_added: "2.10" - type: str - - state: - description: - - The state the configuration should be left in. - type: str - choices: - ['deleted', 'merged', 'overridden', 'replaced', 'gathered', 'rendered', 'parsed'] - default: - merged -""" -EXAMPLES = """ -# Using merged - -# Before state: -# ------------- -# show running-config | section access-list -# ip access-list test1 -# 10 permit ip 10.10.10.0/24 any ttl eq 200 -# 20 permit ip 10.30.10.0/24 host 10.20.10.1 -# 30 deny tcp host 10.10.20.1 eq finger www any syn log -# 40 permit ip any any -# ipv6 access-list test2 -# 10 deny icmpv6 any any reject-route hop-limit eq 20 - -- name: Merge provided configuration with device configuration - eos_acls: - config: - - afi: "ipv4" - acls: - - name: test1 - aces: - - sequence: 35 - grant: "deny" - protocol: "ospf" - source: - subnet_address: 20.0.0.0/8 - destnation: - any: true - state: merged - -# After state: -# ------------ -# -# show running-config | section access-list -# ip access-list test1 -# 10 permit ip 10.10.10.0/24 any ttl eq 200 -# 20 permit ip 10.30.10.0/24 host 10.20.10.1 -# 30 deny tcp host 10.10.20.1 eq finger www any syn log -# 35 deny ospf 20.0.0.0/8 any -# 40 permit ip any any -# ipv6 access-list test2 -# 10 deny icmpv6 any any reject-route hop-limit eq 20 - -# Using merged - -# Before state: -# ------------- -# show running-config | section access-list -# ip access-list test1 -# 10 permit ip 10.10.10.0/24 any ttl eq 200 -# 20 permit ip 10.30.10.0/24 host 10.20.10.1 -# 30 deny tcp host 10.10.20.1 eq finger www any syn log -# 40 permit ip any any -# ipv6 access-list test2 -# 10 deny icmpv6 any any reject-route hop-limit eq 20 - -- name: Merge to update the given configuration with an existing ace - eos_acls: - config: - - afi: "ipv4" - acls: - - name: test1 - aces: - - sequence: 35 - log : true - ttl: - eq: 33 - state: merged - -# After state: -# ------------ -# -# show running-config | section access-list -# ip access-list test1 -# 10 permit ip 10.10.10.0/24 any ttl eq 200 -# 20 permit ip 10.30.10.0/24 host 10.20.10.1 -# 30 deny tcp host 10.10.20.1 eq finger www any syn log -# 35 deny ospf 20.0.0.0/8 any ttl eq 33 log -# 40 permit ip any any -# ipv6 access-list test2 -# 10 deny icmpv6 any any reject-route hop-limit eq 20 - -# Using replaced - -# Before state: -# ------------- -# show running-config | section access-list -# ip access-list test1 -# 10 permit ip 10.10.10.0/24 any ttl eq 200 -# 20 permit ip 10.30.10.0/24 host 10.20.10.1 -# 30 deny tcp host 10.10.20.1 eq finger www any syn log -# 40 permit ip any any -# ! -# ip access-list test3 -# 10 permit ip 35.33.0.0/16 any log -# ! -# ipv6 access-list test2 -# 10 deny icmpv6 any any reject-route hop-limit eq 20 - - - -- name: Replace device configuration with provided configuration - eos_acls: - config: - - afi: "ipv4" - acls: - - name: test1 - aces: - - sequence: 35 - grant: "permit" - protocol: "ospf" - source: - subnet_address: 20.0.0.0/8 - destination: - any: true - state: replaced - -# After state: -# ------------ -# -# show running-config | section access-list -# ip access-list test1 -# 35 permit ospf 20.0.0.0/8 any -# ! -# ip access-list test3 -# 10 permit ip 35.33.0.0/16 any log -# ! -# ipv6 access-list test2 -# 10 deny icmpv6 any any reject-route hop-limit eq 20 - - -# Using overridden - -# Before state: -# ------------- -# show running-config | section access-list -# ip access-list test1 -# 10 permit ip 10.10.10.0/24 any ttl eq 200 -# 20 permit ip 10.30.10.0/24 host 10.20.10.1 -# 30 deny tcp host 10.10.20.1 eq finger www any syn log -# 40 permit ip any any -# ! -# ip access-list test3 -# 10 permit ip 35.33.0.0/16 any log -# ! -# ipv6 access-list test2 -# 10 deny icmpv6 any any reject-route hop-limit eq 20 - - - -- name: override device configuration with provided configuration - eos_acls: - config: - - afi: "ipv4" - acls: - - name: test1 - aces: - - sequence: 35 - action: "permit" - protocol: "ospf" - source: - subnet_address: 20.0.0.0/8 - destination: - any: true - state: overridden - -# After state: -# ------------ -# -# show running-config | section access-list -# ip access-list test1 -# 35 permit ospf 20.0.0.0/8 any -# ! - - -# Using deleted - -# Before state: -# ------------- -# show running-config | section access-list -# ip access-list test1 -# 10 permit ip 10.10.10.0/24 any ttl eq 200 -# 20 permit ip 10.30.10.0/24 host 10.20.10.1 -# 30 deny tcp host 10.10.20.1 eq finger www any syn log -# 40 permit ip any any -# ! -# ipv6 access-list test2 -# 10 deny icmpv6 any any reject-route hop-limit eq 20 - - -- name: Delete provided configuration - eos_acls: - config: - - afi: "ipv4" - acls: - - name: test1 - aces: - - sequence: 30 - state: deleted - -# After state: -# ------------ -# -# show running-config | section access-list -# ip access-list test1 -# 10 permit ip 10.10.10.0/24 any ttl eq 200 -# 20 permit ip 10.30.10.0/24 host 10.20.10.1 -# 40 permit ip any any -# ! -# ipv6 access-list test2 -# 10 deny icmpv6 any any reject-route hop-limit eq 20 - - - -# Before state: -# ------------- -# show running-config | section access-list -# ip access-list test1 -# 10 permit ip 10.10.10.0/24 any ttl eq 200 -# 20 permit ip 10.30.10.0/24 host 10.20.10.1 -# 30 deny tcp host 10.10.20.1 eq finger www any syn log -# 40 permit ip any any -# ipv6 access-list test2 -# 10 deny icmpv6 any any reject-route hop-limit eq 20 - -# ! - -- name: Delete provided configuration - eos_acls: - config: - - afi: "ipv4" - acls: - - name: test1 - state: deleted - -# After state: -# ------------ -# -# show running-config | section access-list - -# ipv6 access-list test2 -# 10 deny icmpv6 any any reject-route hop-limit eq 20 - - -# using gathered - -# ip access-list test1 -# 35 deny ospf 20.0.0.0/8 any -# ip access-list test2 -# 40 permit vlan 55 0xE2 icmpv6 any any log - -- name: Gather the exisitng condiguration - eos_acls: - state: gathered - -# returns: - - -# eos_acls: -# config: -# - afi: "ipv4" -# acls: -# - name: test1 -# aces: -# - sequence: 35 -# grant: "deny" -# protocol: "ospf" -# source: -# subnet_address: 20.0.0.0/8 -# destination: -# any: true -# - afi: "ipv6" -# acls: -# - name: test2 -# aces: -# - sequence: 40 -# grant: "permit" -# vlan: "55 0xE2" -# protocol: "icmpv6" -# log: true -# source: -# any: true -# destination: -# any: true - - -# using rendered - -- name: Delete provided configuration - eos_acls: - config: - - afi: "ipv4" - acls: - - name: test1 - aces: - - sequence: 35 - grant: "deny" - protocol: "ospf" - source: - subnet_address: 20.0.0.0/8 - destination: - any: true - - afi: "ipv6" - acls: - - name: test2 - aces: - - sequence: 40 - grant: "permit" - vlan: "55 0xE2" - protocol: "icmpv6" - log: true - source: - any: true - destination: - any: true - state: rendered - -# returns: - -# ip access-list test1 -# 35 deny ospf 20.0.0.0/8 any -# ip access-list test2 -# 40 permit vlan 55 0xE2 icmpv6 any any log - - -# Using Parsed - -# parsed_acls.cfg - -# ipv6 access-list standard test2 -# 10 permit any log -# ! -# ip access-list test1 -# 35 deny ospf 20.0.0.0/8 any -# 45 remark Run by ansible -# 55 permit tcp any any -# ! - -- name: parse configs - eos_acls: - running_config: "{{ lookup('file', './parsed_acls.cfg') }}" - state: parsed - -# returns -# "parsed": [ -# { -# "acls": [ -# { -# "aces": [ -# { -# "destination": { -# "any": true -# }, -# "grant": "deny", -# "protocol": "ospf", -# "sequence": 35, -# "source": { -# "subnet_address": "20.0.0.0/8" -# } -# }, -# { -# "remark": "Run by ansible", -# "sequence": 45 -# }, -# { -# "destination": { -# "any": true -# }, -# "grant": "permit", -# "protocol": "tcp", -# "sequence": 55, -# "source": { -# "any": true -# } -# } -# ], -# "name": "test1" -# } -# ], -# "afi": "ipv4" -# }, -# { -# "acls": [ -# { -# "aces": [ -# { -# "grant": "permit", -# "log": true, -# "sequence": 10, -# "source": { -# "any": true -# } -# } -# ], -# "name": "test2", -# "standard": true -# } -# ], -# "afi": "ipv6" -# } -# ] - -""" -RETURN = """ -before: - description: The configuration prior to the model invocation. - returned: always - type: list - sample: > - The configuration returned will always be in the same format - of the parameters above. -after: - description: The resulting configuration model invocation. - returned: when changed - type: list - sample: > - The configuration returned will always be in the same format - of the parameters above. -commands: - description: The set of commands pushed to the remote device. - returned: always - type: list - sample: - - ipv6 access-list standard test2 - - 10 permit any log - - ip access-list test1 - - 35 deny ospf 20.0.0.0/8 any - - 45 remark Run by ansible - - 55 permit tcp any any -""" - - -from ansible.module_utils.basic import AnsibleModule -from ansible.module_utils.network.eos.argspec.acls.acls import AclsArgs -from ansible.module_utils.network.eos.config.acls.acls import Acls - - -def main(): - """ - Main entry point for module execution - - :returns: the result form module invocation - """ - - required_if = [('state', 'merged', ('config',)), - ('state', 'replaced', ('config',)), - ('state', 'overridden', ('config',)), - ('state', 'rendered', ('config',)), - ('state', 'parsed', ('running_config',))] - mutually_exclusive = [('config', 'running_config')] - - module = AnsibleModule(argument_spec=AclsArgs.argument_spec, - required_if=required_if, - supports_check_mode=True, - mutually_exclusive=mutually_exclusive) - - result = Acls(module).execute_module() - module.exit_json(**result) - - -if __name__ == '__main__': - main() diff --git a/lib/ansible/modules/network/eos/eos_banner.py b/lib/ansible/modules/network/eos/eos_banner.py deleted file mode 100644 index c716d192b6..0000000000 --- a/lib/ansible/modules/network/eos/eos_banner.py +++ /dev/null @@ -1,199 +0,0 @@ -#!/usr/bin/python -# -# This file is part of Ansible -# -# Ansible is free software: you can redistribute it and/or modify -# it under the terms of the GNU General Public License as published by -# the Free Software Foundation, either version 3 of the License, or -# (at your option) any later version. -# -# Ansible is distributed in the hope that it will be useful, -# but WITHOUT ANY WARRANTY; without even the implied warranty of -# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the -# GNU General Public License for more details. -# -# You should have received a copy of the GNU General Public License -# along with Ansible. If not, see . -# - -ANSIBLE_METADATA = {'metadata_version': '1.1', - 'status': ['preview'], - 'supported_by': 'network'} - - -DOCUMENTATION = """ ---- -module: eos_banner -version_added: "2.3" -author: "Peter Sprygada (@privateip)" -short_description: Manage multiline banners on Arista EOS devices -description: - - This will configure both login and motd banners on remote devices - running Arista EOS. It allows playbooks to add or remote - banner text from the active running configuration. -extends_documentation_fragment: eos -notes: - - Tested against EOS 4.15 -options: - banner: - description: - - Specifies which banner that should be - configured on the remote device. - required: true - choices: ['login', 'motd'] - text: - description: - - The banner text that should be - present in the remote device running configuration. This argument - accepts a multiline string. Requires I(state=present). - state: - description: - - Specifies whether or not the configuration is - present in the current devices active running configuration. - default: present - choices: ['present', 'absent'] -""" - -EXAMPLES = """ -- name: configure the login banner - eos_banner: - banner: login - text: | - this is my login banner - that contains a multiline - string - state: present - -- name: remove the motd banner - eos_banner: - banner: motd - state: absent -""" - -RETURN = """ -commands: - description: The list of configuration mode commands to send to the device - returned: always - type: list - sample: - - banner login - - this is my login banner - - that contains a multiline - - string - - EOF -session_name: - description: The EOS config session name used to load the configuration - returned: if changes - type: str - sample: ansible_1479315771 -""" -from ansible.module_utils.basic import AnsibleModule -from ansible.module_utils.network.eos.eos import load_config, run_commands -from ansible.module_utils.network.eos.eos import eos_argument_spec, is_local_eapi -from ansible.module_utils.six import string_types -from ansible.module_utils._text import to_text - - -def map_obj_to_commands(updates, module): - commands = list() - want, have = updates - state = module.params['state'] - - if state == 'absent' and have.get('text'): - if isinstance(have['text'], string_types): - commands.append('no banner %s' % module.params['banner']) - elif have['text'].get('loginBanner') or have['text'].get('motd'): - commands.append({'cmd': 'no banner %s' % module.params['banner']}) - - elif state == 'present': - if isinstance(have['text'], string_types): - if want['text'] != have['text']: - commands.append('banner %s' % module.params['banner']) - commands.extend(want['text'].strip().split('\n')) - commands.append('EOF') - else: - have_text = have['text'].get('loginBanner') or have['text'].get('motd') - if have_text: - have_text = have_text.strip() - - if to_text(want['text']) != have_text or not have_text: - # For EAPI we need to construct a dict with cmd/input - # key/values for the banner - commands.append({'cmd': 'banner %s' % module.params['banner'], - 'input': want['text'].strip('\n')}) - - return commands - - -def map_config_to_obj(module): - output = run_commands(module, ['show banner %s' % module.params['banner']]) - obj = {'banner': module.params['banner'], 'state': 'absent'} - if output: - if is_local_eapi(module): - # On EAPI we need to extract the banner text from dict key - # 'loginBanner' - if module.params['banner'] == 'login': - banner_response_key = 'loginBanner' - else: - banner_response_key = 'motd' - if isinstance(output[0], dict) and banner_response_key in output[0].keys(): - obj['text'] = output[0] - else: - obj['text'] = output[0] - obj['state'] = 'present' - return obj - - -def map_params_to_obj(module): - text = module.params['text'] - if text: - text = to_text(text).strip() - - return { - 'banner': module.params['banner'], - 'text': text, - 'state': module.params['state'] - } - - -def main(): - """ main entry point for module execution - """ - argument_spec = dict( - banner=dict(required=True, choices=['login', 'motd']), - text=dict(), - state=dict(default='present', choices=['present', 'absent']) - ) - - argument_spec.update(eos_argument_spec) - - required_if = [('state', 'present', ('text',))] - - module = AnsibleModule(argument_spec=argument_spec, - required_if=required_if, - supports_check_mode=True) - - warnings = list() - - result = {'changed': False} - if warnings: - result['warnings'] = warnings - want = map_params_to_obj(module) - have = map_config_to_obj(module) - - commands = map_obj_to_commands((want, have), module) - result['commands'] = commands - - if commands: - commit = not module.check_mode - response = load_config(module, commands, commit=commit) - if response.get('diff') and module._diff: - result['diff'] = {'prepared': response.get('diff')} - result['session_name'] = response.get('session') - result['changed'] = True - - module.exit_json(**result) - - -if __name__ == '__main__': - main() diff --git a/lib/ansible/modules/network/eos/eos_bgp.py b/lib/ansible/modules/network/eos/eos_bgp.py deleted file mode 100644 index 547524eba4..0000000000 --- a/lib/ansible/modules/network/eos/eos_bgp.py +++ /dev/null @@ -1,394 +0,0 @@ -#!/usr/bin/python -# -*- coding: utf-8 -*- -# -# (c) 2019, Ansible by Red Hat, inc -# GNU General Public License v3.0+ (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt) -# - -from __future__ import absolute_import, division, print_function -__metaclass__ = type - - -ANSIBLE_METADATA = {'metadata_version': '1.1', - 'status': ['preview'], - 'supported_by': 'network'} - - -DOCUMENTATION = """ ---- -module: eos_bgp -version_added: "2.8" -author: "Nilashish Chakraborty (@NilashishC)" -short_description: Configure global BGP protocol settings on Arista EOS. -description: - - This module provides configuration management of global BGP parameters - on Arista EOS devices. -notes: - - Tested against Arista vEOS Version 4.15.9M. -options: - config: - description: - - Specifies the BGP related configuration. - suboptions: - bgp_as: - description: - - Specifies the BGP Autonomous System (AS) number to configure on the device. - type: int - required: true - router_id: - description: - - Configures the BGP routing process router-id value. - default: null - log_neighbor_changes: - description: - - Enable/disable logging neighbor up/down and reset reason. - type: bool - neighbors: - description: - - Specifies BGP neighbor related configurations. - suboptions: - neighbor: - description: - - Neighbor router address. - required: True - remote_as: - description: - - Remote AS of the BGP neighbor to configure. - type: int - required: True - update_source: - description: - - Source of the routing updates. - password: - description: - - Password to authenticate the BGP peer connection. - description: - description: - - Neighbor specific description. - ebgp_multihop: - description: - - Specifies the maximum hop count for EBGP neighbors not on directly connected networks. - - The range is from 1 to 255. - type: int - peer_group: - description: - - Name of the peer group that the neighbor is a member of. - timers: - description: - - Specifies BGP neighbor timer related configurations. - suboptions: - keepalive: - description: - - Frequency (in seconds) with which the device sends keepalive messages to its peer. - - The range is from 0 to 3600. - type: int - required: True - holdtime: - description: - - Interval (in seconds) after not receiving a keepalive message that device declares a peer dead. - - The range is from 3 to 7200. - - Setting this value to 0 will not send keep-alives (hold forever). - type: int - required: True - route_reflector_client: - description: - - Specify a neighbor as a route reflector client. - type: bool - remove_private_as: - description: - - Remove the private AS number from outbound updates. - type: bool - enabled: - description: - - Administratively shutdown or enable a neighbor. - maximum_prefix: - description: - - Maximum number of prefixes to accept from this peer. - - The range is from 0 to 4294967294. - type: int - redistribute: - description: - - Specifies the redistribute information from another routing protocol. - suboptions: - protocol: - description: - - Specifies the protocol for configuring redistribute information. - required: True - route_map: - description: - - Specifies the route map reference. - networks: - description: - - Specify Networks to announce via BGP. - - For operation replace, this option is mutually exclusive with networks option under address_family. - - For operation replace, if the device already has an address family activated, this option is not allowed. - suboptions: - prefix: - description: - - Network ID to announce via BGP. - required: True - masklen: - description: - - Subnet mask length for the Network to announce(e.g, 8, 16, 24, etc.). - route_map: - description: - - Route map to modify the attributes. - address_family: - description: - - Specifies BGP address family related configurations. - suboptions: - afi: - description: - - Type of address family to configure. - choices: - - ipv4 - - ipv6 - required: True - redistribute: - description: - - Specifies the redistribute information from another routing protocol. - suboptions: - protocol: - description: - - Specifies the protocol for configuring redistribute information. - required: True - route_map: - description: - - Specifies the route map reference. - networks: - description: - - Specify Networks to announce via BGP. - - For operation replace, this option is mutually exclusive with root level networks option. - suboptions: - prefix: - description: - - Network ID to announce via BGP. - required: True - masklen: - description: - - Subnet mask length for the Network to announce(e.g, 8, 16, 24, etc.). - route_map: - description: - - Route map to modify the attributes. - neighbors: - description: - - Specifies BGP neighbor related configurations in Address Family configuration mode. - suboptions: - neighbor: - description: - - Neighbor router address. - required: True - activate: - description: - - Enable the Address Family for this Neighbor. - type: bool - default_originate: - description: - - Originate default route to this neighbor. - type: bool - graceful_restart: - description: - - Enable/disable graceful restart mode for this neighbor. - type: bool - weight: - description: - - Assign weight for routes learnt from this neighbor. - - The range is from 0 to 65535 - type: int - operation: - description: - - Specifies the operation to be performed on the BGP process configured on the device. - - In case of merge, the input configuration will be merged with the existing BGP configuration on the device. - - In case of replace, if there is a diff between the existing configuration and the input configuration, the - existing configuration will be replaced by the input configuration for every option that has the diff. - - In case of override, all the existing BGP configuration will be removed from the device and replaced with - the input configuration. - - In case of delete the existing BGP configuration will be removed from the device. - default: merge - choices: ['merge', 'replace', 'override', 'delete'] -""" - -EXAMPLES = """ -- name: configure global bgp as 64496 - eos_bgp: - config: - bgp_as: 64496 - router_id: 192.0.2.1 - log_neighbor_changes: True - neighbors: - - neighbor: 203.0.113.5 - remote_as: 64511 - timers: - keepalive: 300 - holdtime: 360 - - neighbor: 198.51.100.2 - remote_as: 64498 - networks: - - prefix: 198.51.100.0 - route_map: RMAP_1 - - prefix: 192.0.2.0 - masklen: 23 - address_family: - - afi: ipv4 - safi: unicast - redistribute: - - protocol: isis - route_map: RMAP_1 - operation: merge - -- name: Configure BGP neighbors - eos_bgp: - config: - bgp_as: 64496 - neighbors: - - neighbor: 192.0.2.10 - remote_as: 64496 - description: IBGP_NBR_1 - ebgp_multihop: 100 - timers: - keepalive: 300 - holdtime: 360 - - - neighbor: 192.0.2.15 - remote_as: 64496 - description: IBGP_NBR_2 - ebgp_multihop: 150 - operation: merge - -- name: Configure root-level networks for BGP - eos_bgp: - config: - bgp_as: 64496 - networks: - - prefix: 203.0.113.0 - masklen: 27 - route_map: RMAP_1 - - - prefix: 203.0.113.32 - masklen: 27 - route_map: RMAP_2 - operation: merge - -- name: Configure BGP neighbors under address family mode - eos_bgp: - config: - bgp_as: 64496 - address_family: - - afi: ipv4 - neighbors: - - neighbor: 203.0.113.10 - activate: yes - default_originate: True - - - neighbor: 192.0.2.15 - activate: yes - graceful_restart: True - operation: merge - -- name: remove bgp as 64496 from config - eos_bgp: - config: - bgp_as: 64496 - operation: delete -""" - -RETURN = """ -commands: - description: The list of configuration mode commands to send to the device - returned: always - type: list - sample: - - router bgp 64496 - - bgp router-id 192.0.2.1 - - bgp log-neighbor-changes - - neighbor 203.0.113.5 remote-as 64511 - - neighbor 203.0.113.5 timers 300 360 - - neighbor 198.51.100.2 remote-as 64498 - - network 198.51.100.0 route-map RMAP_1 - - network 192.0.2.0 mask 255.255.254.0 - - address-family ipv4 - - redistribute isis route-map RMAP_1 - - exit-address-family -""" -from ansible.module_utils._text import to_text -from ansible.module_utils.network.eos.providers.module import NetworkModule -from ansible.module_utils.network.eos.providers.cli.config.bgp.process import REDISTRIBUTE_PROTOCOLS - - -def main(): - """ main entry point for module execution - """ - network_spec = { - 'prefix': dict(required=True), - 'masklen': dict(type='int'), - 'route_map': dict(), - } - - redistribute_spec = { - 'protocol': dict(choices=REDISTRIBUTE_PROTOCOLS, required=True), - 'route_map': dict(), - } - - timer_spec = { - 'keepalive': dict(type='int', required=True), - 'holdtime': dict(type='int', required=True), - } - - neighbor_spec = { - 'neighbor': dict(required=True), - 'remote_as': dict(type='int', required=True), - 'update_source': dict(), - 'password': dict(no_log=True), - 'enabled': dict(type='bool'), - 'description': dict(), - 'ebgp_multihop': dict(type='int'), - 'timers': dict(type='dict', options=timer_spec), - 'peer_group': dict(), - 'maximum_prefix': dict(type='int'), - 'route_reflector_client': dict(type='int'), - 'remove_private_as': dict(type='bool') - } - - af_neighbor_spec = { - 'neighbor': dict(required=True), - 'activate': dict(type='bool'), - 'default_originate': dict(type='bool'), - 'graceful_restart': dict(type='bool'), - 'weight': dict(type='int'), - } - - address_family_spec = { - 'afi': dict(choices=['ipv4', 'ipv6'], required=True), - 'networks': dict(type='list', elements='dict', options=network_spec), - 'redistribute': dict(type='list', elements='dict', options=redistribute_spec), - 'neighbors': dict(type='list', elements='dict', options=af_neighbor_spec), - } - - config_spec = { - 'bgp_as': dict(type='int', required=True), - 'router_id': dict(), - 'log_neighbor_changes': dict(type='bool'), - 'neighbors': dict(type='list', elements='dict', options=neighbor_spec), - 'address_family': dict(type='list', elements='dict', options=address_family_spec), - 'redistribute': dict(type='list', elements='dict', options=redistribute_spec), - 'networks': dict(type='list', elements='dict', options=network_spec) - } - - argument_spec = { - 'config': dict(type='dict', options=config_spec), - 'operation': dict(default='merge', choices=['merge', 'replace', 'override', 'delete']) - } - - module = NetworkModule(argument_spec=argument_spec, - supports_check_mode=True) - - try: - result = module.edit_config(config_filter='| section bgp') - except Exception as exc: - module.fail_json(msg=to_text(exc)) - - module.exit_json(**result) - - -if __name__ == '__main__': - main() diff --git a/lib/ansible/modules/network/eos/eos_command.py b/lib/ansible/modules/network/eos/eos_command.py deleted file mode 100644 index 0db5c26a74..0000000000 --- a/lib/ansible/modules/network/eos/eos_command.py +++ /dev/null @@ -1,248 +0,0 @@ -#!/usr/bin/python -# -# This file is part of Ansible -# -# Ansible is free software: you can redistribute it and/or modify -# it under the terms of the GNU General Public License as published by -# the Free Software Foundation, either version 3 of the License, or -# (at your option) any later version. -# -# Ansible is distributed in the hope that it will be useful, -# but WITHOUT ANY WARRANTY; without even the implied warranty of -# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the -# GNU General Public License for more details. -# -# You should have received a copy of the GNU General Public License -# along with Ansible. If not, see . -# - -ANSIBLE_METADATA = {'metadata_version': '1.1', - 'status': ['preview'], - 'supported_by': 'network'} - - -DOCUMENTATION = """ ---- -module: eos_command -version_added: "2.1" -author: "Peter Sprygada (@privateip)" -short_description: Run arbitrary commands on an Arista EOS device -description: - - Sends an arbitrary set of commands to an EOS node and returns the results - read from the device. This module includes an - argument that will cause the module to wait for a specific condition - before returning or timing out if the condition is not met. -extends_documentation_fragment: eos -notes: - - Tested against EOS 4.15 -options: - commands: - description: - - The commands to send to the remote EOS device over the - configured provider. The resulting output from the command - is returned. If the I(wait_for) argument is provided, the - module is not returned until the condition is satisfied or - the number of I(retries) has been exceeded. - required: true - wait_for: - description: - - Specifies what to evaluate from the output of the command - and what conditionals to apply. This argument will cause - the task to wait for a particular conditional to be true - before moving forward. If the conditional is not true - by the configured retries, the task fails. - Note - With I(wait_for) the value in C(result['stdout']) can be accessed - using C(result), that is to access C(result['stdout'][0]) use C(result[0]) See examples. - aliases: ['waitfor'] - version_added: "2.2" - match: - description: - - The I(match) argument is used in conjunction with the - I(wait_for) argument to specify the match policy. Valid - values are C(all) or C(any). If the value is set to C(all) - then all conditionals in the I(wait_for) must be satisfied. If - the value is set to C(any) then only one of the values must be - satisfied. - default: all - choices: ['any', 'all'] - version_added: "2.2" - retries: - description: - - Specifies the number of retries a command should be tried - before it is considered failed. The command is run on the - target device every retry and evaluated against the I(wait_for) - conditionals. - default: 10 - interval: - description: - - Configures the interval in seconds to wait between retries - of the command. If the command does not pass the specified - conditional, the interval indicates how to long to wait before - trying the command again. - default: 1 -""" - -EXAMPLES = """ -- name: run show version on remote devices - eos_command: - commands: show version - -- name: run show version and check to see if output contains Arista - eos_command: - commands: show version - wait_for: result[0] contains Arista - -- name: run multiple commands on remote nodes - eos_command: - commands: - - show version - - show interfaces - -- name: run multiple commands and evaluate the output - eos_command: - commands: - - show version - - show interfaces - wait_for: - - result[0] contains Arista - - result[1] contains Loopback0 - -- name: run commands and specify the output format - eos_command: - commands: - - command: show version - output: json - -- name: using cli transport, check whether the switch is in maintenance mode - eos_command: - commands: show maintenance - wait_for: result[0] contains 'Under Maintenance' - -- name: using cli transport, check whether the switch is in maintenance mode using json output - eos_command: - commands: show maintenance | json - wait_for: result[0].units.System.state eq 'underMaintenance' - -- name: "using eapi transport check whether the switch is in maintenance, - with 8 retries and 2 second interval between retries" - eos_command: - commands: show maintenance - wait_for: result[0]['units']['System']['state'] eq 'underMaintenance' - interval: 2 - retries: 8 - provider: - transport: eapi -""" - -RETURN = """ -stdout: - description: The set of responses from the commands - returned: always apart from low level errors (such as action plugin) - type: list - sample: ['...', '...'] -stdout_lines: - description: The value of stdout split into a list - returned: always apart from low level errors (such as action plugin) - type: list - sample: [['...', '...'], ['...'], ['...']] -failed_conditions: - description: The list of conditionals that have failed - returned: failed - type: list - sample: ['...', '...'] -""" -import time - -from ansible.module_utils._text import to_text -from ansible.module_utils.basic import AnsibleModule -from ansible.module_utils.network.common.parsing import Conditional -from ansible.module_utils.network.common.utils import transform_commands, to_lines -from ansible.module_utils.network.eos.eos import run_commands -from ansible.module_utils.network.eos.eos import eos_argument_spec - - -def parse_commands(module, warnings): - commands = transform_commands(module) - - if module.check_mode: - for item in list(commands): - if not item['command'].startswith('show'): - warnings.append( - 'Only show commands are supported when using check mode, not ' - 'executing %s' % item['command'] - ) - commands.remove(item) - - return commands - - -def to_cli(obj): - cmd = obj['command'] - if obj.get('output') == 'json': - cmd += ' | json' - return cmd - - -def main(): - """entry point for module execution - """ - argument_spec = dict( - commands=dict(type='list', required=True), - - wait_for=dict(type='list', aliases=['waitfor']), - match=dict(default='all', choices=['all', 'any']), - - retries=dict(default=10, type='int'), - interval=dict(default=1, type='int') - ) - - argument_spec.update(eos_argument_spec) - - module = AnsibleModule(argument_spec=argument_spec, - supports_check_mode=True) - - warnings = list() - result = {'changed': False, 'warnings': warnings} - commands = parse_commands(module, warnings) - wait_for = module.params['wait_for'] or list() - - try: - conditionals = [Conditional(c) for c in wait_for] - except AttributeError as exc: - module.fail_json(msg=to_text(exc)) - - retries = module.params['retries'] - interval = module.params['interval'] - match = module.params['match'] - - while retries > 0: - responses = run_commands(module, commands) - - for item in list(conditionals): - if item(responses): - if match == 'any': - conditionals = list() - break - conditionals.remove(item) - - if not conditionals: - break - - time.sleep(interval) - retries -= 1 - - if conditionals: - failed_conditions = [item.raw for item in conditionals] - msg = 'One or more conditional statements have not been satisfied' - module.fail_json(msg=msg, failed_conditions=failed_conditions) - - result.update({ - 'stdout': responses, - 'stdout_lines': list(to_lines(responses)), - }) - - module.exit_json(**result) - - -if __name__ == '__main__': - main() diff --git a/lib/ansible/modules/network/eos/eos_config.py b/lib/ansible/modules/network/eos/eos_config.py deleted file mode 100644 index 6aef5f9e87..0000000000 --- a/lib/ansible/modules/network/eos/eos_config.py +++ /dev/null @@ -1,516 +0,0 @@ -#!/usr/bin/python -# -# This file is part of Ansible -# -# Ansible is free software: you can redistribute it and/or modify -# it under the terms of the GNU General Public License as published by -# the Free Software Foundation, either version 3 of the License, or -# (at your option) any later version. -# -# Ansible is distributed in the hope that it will be useful, -# but WITHOUT ANY WARRANTY; without even the implied warranty of -# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the -# GNU General Public License for more details. -# -# You should have received a copy of the GNU General Public License -# along with Ansible. If not, see . -# - -ANSIBLE_METADATA = {'metadata_version': '1.1', - 'status': ['preview'], - 'supported_by': 'network'} - - -DOCUMENTATION = """ ---- -module: eos_config -version_added: "2.1" -author: "Peter Sprygada (@privateip)" -short_description: Manage Arista EOS configuration sections -description: - - Arista EOS configurations use a simple block indent file syntax - for segmenting configuration into sections. This module provides - an implementation for working with EOS configuration sections in - a deterministic way. This module works with either CLI or eAPI - transports. -extends_documentation_fragment: eos -notes: - - Tested against EOS 4.15 - - Abbreviated commands are NOT idempotent, see - L(Network FAQ,../network/user_guide/faq.html#why-do-the-config-modules-always-return-changed-true-with-abbreviated-commands). -options: - lines: - description: - - The ordered set of commands that should be configured in the - section. The commands must be the exact same commands as found - in the device running-config. Be sure to note the configuration - command syntax as some commands are automatically modified by the - device config parser. - aliases: ['commands'] - parents: - description: - - The ordered set of parents that uniquely identify the section or hierarchy - the commands should be checked against. If the parents argument - is omitted, the commands are checked against the set of top - level or global commands. - src: - description: - - The I(src) argument provides a path to the configuration file - to load into the remote system. The path can either be a full - system path to the configuration file if the value starts with / - or relative to the root of the implemented role or playbook. - This argument is mutually exclusive with the I(lines) and - I(parents) arguments. It can be a Jinja2 template as well. - src file must have same indentation as a live switch config. - Arista EOS device config has 3 spaces indentation. - version_added: "2.2" - before: - description: - - The ordered set of commands to push on to the command stack if - a change needs to be made. This allows the playbook designer - the opportunity to perform configuration commands prior to pushing - any changes without affecting how the set of commands are matched - against the system. - after: - description: - - The ordered set of commands to append to the end of the command - stack if a change needs to be made. Just like with I(before) this - allows the playbook designer to append a set of commands to be - executed after the command set. - match: - description: - - Instructs the module on the way to perform the matching of - the set of commands against the current device config. If - match is set to I(line), commands are matched line by line. If - match is set to I(strict), command lines are matched with respect - to position. If match is set to I(exact), command lines - must be an equal match. Finally, if match is set to I(none), the - module will not attempt to compare the source configuration with - the running configuration on the remote device. - default: line - choices: ['line', 'strict', 'exact', 'none'] - replace: - description: - - Instructs the module on the way to perform the configuration - on the device. If the replace argument is set to I(line) then - the modified lines are pushed to the device in configuration - mode. If the replace argument is set to I(block) then the entire - command block is pushed to the device in configuration mode if any - line is not correct. - default: line - choices: ['line', 'block', 'config'] - backup: - description: - - This argument will cause the module to create a full backup of - the current C(running-config) from the remote device before any - changes are made. If the C(backup_options) value is not given, - the backup file is written to the C(backup) folder in the playbook - root directory or role root directory, if playbook is part of an - ansible role. If the directory does not exist, it is created. - type: bool - default: 'no' - version_added: "2.2" - running_config: - description: - - The module, by default, will connect to the remote device and - retrieve the current running-config to use as a base for comparing - against the contents of source. There are times when it is not - desirable to have the task get the current running-config for - every task in a playbook. The I(running_config) argument allows the - implementer to pass in the configuration to use as the base - config for this module. - type: str - aliases: ['config'] - version_added: "2.4" - defaults: - description: - - The I(defaults) argument will influence how the running-config - is collected from the device. When the value is set to true, - the command used to collect the running-config is append with - the all keyword. When the value is set to false, the command - is issued without the all keyword - type: bool - default: 'no' - version_added: "2.2" - save_when: - description: - - When changes are made to the device running-configuration, the - changes are not copied to non-volatile storage by default. Using - this argument will change that before. If the argument is set to - I(always), then the running-config will always be copied to the - startup-config and the I(modified) flag will always be set to - True. If the argument is set to I(modified), then the running-config - will only be copied to the startup-config if it has changed since - the last save to startup-config. If the argument is set to - I(never), the running-config will never be copied to the - startup-config. If the argument is set to I(changed), then the running-config - will only be copied to the startup-config if the task has made a change. - I(changed) was added in Ansible 2.5. - default: never - choices: ['always', 'never', 'modified', 'changed'] - version_added: "2.4" - diff_against: - description: - - When using the C(ansible-playbook --diff) command line argument - the module can generate diffs against different sources. - - When this option is configure as I(startup), the module will return - the diff of the running-config against the startup-config. - - When this option is configured as I(intended), the module will - return the diff of the running-config against the configuration - provided in the C(intended_config) argument. - - When this option is configured as I(running), the module will - return the before and after diff of the running-config with respect - to any changes made to the device configuration. - - When this option is configured as C(session), the diff returned will - be based on the configuration session. - default: session - choices: ['startup', 'running', 'intended', 'session'] - version_added: "2.4" - diff_ignore_lines: - description: - - Use this argument to specify one or more lines that should be - ignored during the diff. This is used for lines in the configuration - that are automatically updated by the system. This argument takes - a list of regular expressions or exact line matches. - version_added: "2.4" - intended_config: - description: - - The C(intended_config) provides the master configuration that - the node should conform to and is used to check the final - running-config against. This argument will not modify any settings - on the remote device and is strictly used to check the compliance - of the current device's configuration against. When specifying this - argument, the task should also modify the C(diff_against) value and - set it to I(intended). - type: str - version_added: "2.4" - backup_options: - description: - - This is a dict object containing configurable options related to backup file path. - The value of this option is read only when C(backup) is set to I(yes), if C(backup) is set - to I(no) this option will be silently ignored. - suboptions: - filename: - description: - - The filename to be used to store the backup configuration. If the filename - is not given it will be generated based on the hostname, current time and date - in format defined by _config.@ - dir_path: - description: - - This option provides the path ending with directory name in which the backup - configuration file will be stored. If the directory does not exist it will be first - created and the filename is either the value of C(filename) or default filename - as described in C(filename) options description. If the path value is not given - in that case a I(backup) directory will be created in the current working directory - and backup configuration will be copied in C(filename) within I(backup) directory. - type: path - type: dict - version_added: "2.8" -""" - -EXAMPLES = """ -- name: configure top level settings - eos_config: - lines: hostname {{ inventory_hostname }} - -- name: load an acl into the device - eos_config: - lines: - - 10 permit ip host 192.0.2.1 any log - - 20 permit ip host 192.0.2.2 any log - - 30 permit ip host 192.0.2.3 any log - - 40 permit ip host 192.0.2.4 any log - parents: ip access-list test - before: no ip access-list test - replace: block - -- name: load configuration from file - eos_config: - src: eos.cfg - -- name: render a Jinja2 template onto an Arista switch - eos_config: - backup: yes - src: eos_template.j2 - -- name: diff the running config against a master config - eos_config: - diff_against: intended - intended_config: "{{ lookup('file', 'master.cfg') }}" - -- name: for idempotency, use full-form commands - eos_config: - lines: - # - shut - - shutdown - # parents: int eth1 - parents: interface Ethernet1 - -- name: configurable backup path - eos_config: - src: eos_template.j2 - backup: yes - backup_options: - filename: backup.cfg - dir_path: /home/user -""" - -RETURN = """ -commands: - description: The set of commands that will be pushed to the remote device - returned: always - type: list - sample: ['hostname switch01', 'interface Ethernet1', 'no shutdown'] -updates: - description: The set of commands that will be pushed to the remote device - returned: always - type: list - sample: ['hostname switch01', 'interface Ethernet1', 'no shutdown'] -backup_path: - description: The full path to the backup file - returned: when backup is yes - type: str - sample: /playbooks/ansible/backup/eos_config.2016-07-16@22:28:34 -filename: - description: The name of the backup file - returned: when backup is yes and filename is not specified in backup options - type: str - sample: eos_config.2016-07-16@22:28:34 -shortname: - description: The full path to the backup file excluding the timestamp - returned: when backup is yes and filename is not specified in backup options - type: str - sample: /playbooks/ansible/backup/eos_config -date: - description: The date extracted from the backup file name - returned: when backup is yes - type: str - sample: "2016-07-16" -time: - description: The time extracted from the backup file name - returned: when backup is yes - type: str - sample: "22:28:34" -""" -from ansible.module_utils._text import to_text -from ansible.module_utils.basic import AnsibleModule -from ansible.module_utils.connection import ConnectionError -from ansible.module_utils.network.common.config import NetworkConfig, dumps -from ansible.module_utils.network.eos.eos import get_config, load_config, get_connection -from ansible.module_utils.network.eos.eos import run_commands -from ansible.module_utils.network.eos.eos import eos_argument_spec - - -def get_candidate(module): - candidate = '' - if module.params['src']: - candidate = module.params['src'] - elif module.params['lines']: - candidate_obj = NetworkConfig(indent=3) - parents = module.params['parents'] or list() - candidate_obj.add(module.params['lines'], parents=parents) - candidate = dumps(candidate_obj, 'raw') - return candidate - - -def get_running_config(module, config=None, flags=None): - contents = module.params['running_config'] - if not contents: - if config: - contents = config - else: - contents = get_config(module, flags=flags) - return contents - - -def save_config(module, result): - result['changed'] = True - if not module.check_mode: - cmd = {'command': 'copy running-config startup-config', 'output': 'text'} - run_commands(module, [cmd]) - else: - module.warn('Skipping command `copy running-config startup-config` ' - 'due to check_mode. Configuration not copied to ' - 'non-volatile storage') - - -def main(): - """ main entry point for module execution - """ - backup_spec = dict( - filename=dict(), - dir_path=dict(type='path') - ) - argument_spec = dict( - src=dict(type='path'), - - lines=dict(aliases=['commands'], type='list'), - parents=dict(type='list'), - - before=dict(type='list'), - after=dict(type='list'), - - match=dict(default='line', choices=['line', 'strict', 'exact', 'none']), - replace=dict(default='line', choices=['line', 'block', 'config']), - - defaults=dict(type='bool', default=False), - backup=dict(type='bool', default=False), - backup_options=dict(type='dict', options=backup_spec), - - save_when=dict(choices=['always', 'never', 'modified', 'changed'], default='never'), - - diff_against=dict(choices=['startup', 'session', 'intended', 'running'], default='session'), - diff_ignore_lines=dict(type='list'), - - running_config=dict(aliases=['config']), - intended_config=dict(), - ) - - argument_spec.update(eos_argument_spec) - - mutually_exclusive = [('lines', 'src'), - ('parents', 'src')] - - required_if = [('match', 'strict', ['lines']), - ('match', 'exact', ['lines']), - ('replace', 'block', ['lines']), - ('replace', 'config', ['src']), - ('diff_against', 'intended', ['intended_config'])] - - module = AnsibleModule(argument_spec=argument_spec, - mutually_exclusive=mutually_exclusive, - required_if=required_if, - supports_check_mode=True) - - warnings = list() - - result = {'changed': False} - if warnings: - result['warnings'] = warnings - - diff_ignore_lines = module.params['diff_ignore_lines'] - config = None - contents = None - flags = ['all'] if module.params['defaults'] else [] - connection = get_connection(module) - - # Refuse to diff_against: session if sessions are disabled - if module.params['diff_against'] == 'session' and not connection.supports_sessions: - module.fail_json(msg="Cannot diff against sessions when sessions are disabled. Please change diff_against to another value") - - if module.params['backup'] or (module._diff and module.params['diff_against'] == 'running'): - contents = get_config(module, flags=flags) - config = NetworkConfig(indent=1, contents=contents) - if module.params['backup']: - result['__backup__'] = contents - - if any((module.params['src'], module.params['lines'])): - match = module.params['match'] - replace = module.params['replace'] - path = module.params['parents'] - - candidate = get_candidate(module) - running = get_running_config(module, contents, flags=flags) - - try: - response = connection.get_diff(candidate=candidate, running=running, diff_match=match, diff_ignore_lines=diff_ignore_lines, path=path, - diff_replace=replace) - except ConnectionError as exc: - module.fail_json(msg=to_text(exc, errors='surrogate_then_replace')) - - config_diff = response['config_diff'] - - if config_diff: - commands = config_diff.split('\n') - - if module.params['before']: - commands[:0] = module.params['before'] - - if module.params['after']: - commands.extend(module.params['after']) - - result['commands'] = commands - result['updates'] = commands - - replace = module.params['replace'] == 'config' - commit = not module.check_mode - - response = load_config(module, commands, replace=replace, commit=commit) - - result['changed'] = True - - if module.params['diff_against'] == 'session': - if 'diff' in response: - result['diff'] = {'prepared': response['diff']} - else: - result['changed'] = False - - if 'session' in response: - result['session'] = response['session'] - - running_config = module.params['running_config'] - startup_config = None - - if module.params['save_when'] == 'always': - save_config(module, result) - elif module.params['save_when'] == 'modified': - output = run_commands(module, [{'command': 'show running-config', 'output': 'text'}, - {'command': 'show startup-config', 'output': 'text'}]) - - running_config = NetworkConfig(indent=3, contents=output[0], ignore_lines=diff_ignore_lines) - startup_config = NetworkConfig(indent=3, contents=output[1], ignore_lines=diff_ignore_lines) - - if running_config.sha1 != startup_config.sha1: - save_config(module, result) - - elif module.params['save_when'] == 'changed' and result['changed']: - save_config(module, result) - - if module._diff: - if not running_config: - output = run_commands(module, {'command': 'show running-config', 'output': 'text'}) - contents = output[0] - else: - contents = running_config - - # recreate the object in order to process diff_ignore_lines - running_config = NetworkConfig(indent=3, contents=contents, ignore_lines=diff_ignore_lines) - - if module.params['diff_against'] == 'running': - if module.check_mode: - module.warn("unable to perform diff against running-config due to check mode") - contents = None - else: - contents = config.config_text - - elif module.params['diff_against'] == 'startup': - if not startup_config: - output = run_commands(module, {'command': 'show startup-config', 'output': 'text'}) - contents = output[0] - else: - contents = startup_config.config_text - - elif module.params['diff_against'] == 'intended': - contents = module.params['intended_config'] - - if contents is not None: - base_config = NetworkConfig(indent=3, contents=contents, ignore_lines=diff_ignore_lines) - - if running_config.sha1 != base_config.sha1: - if module.params['diff_against'] == 'intended': - before = running_config - after = base_config - elif module.params['diff_against'] in ('startup', 'running'): - before = base_config - after = running_config - - result.update({ - 'changed': True, - 'diff': {'before': str(before), 'after': str(after)} - }) - - module.exit_json(**result) - - -if __name__ == '__main__': - main() diff --git a/lib/ansible/modules/network/eos/eos_eapi.py b/lib/ansible/modules/network/eos/eos_eapi.py deleted file mode 100644 index 2a67c57e94..0000000000 --- a/lib/ansible/modules/network/eos/eos_eapi.py +++ /dev/null @@ -1,435 +0,0 @@ -#!/usr/bin/python -# -# This file is part of Ansible -# -# Ansible is free software: you can redistribute it and/or modify -# it under the terms of the GNU General Public License as published by -# the Free Software Foundation, either version 3 of the License, or -# (at your option) any later version. -# -# Ansible is distributed in the hope that it will be useful, -# but WITHOUT ANY WARRANTY; without even the implied warranty of -# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the -# GNU General Public License for more details. -# -# You should have received a copy of the GNU General Public License -# along with Ansible. If not, see . -# - -ANSIBLE_METADATA = {'metadata_version': '1.1', - 'status': ['preview'], - 'supported_by': 'network'} - - -DOCUMENTATION = """ ---- -module: eos_eapi -version_added: "2.1" -author: "Peter Sprygada (@privateip)" -short_description: Manage and configure Arista EOS eAPI. -requirements: - - "EOS v4.12 or greater" -description: - - Use to enable or disable eAPI access, and set the port and state - of http, https, local_http and unix-socket servers. - - When enabling eAPI access the default is to enable HTTP on port - 80, enable HTTPS on port 443, disable local HTTP, and disable - Unix socket server. Use the options listed below to override the - default configuration. - - Requires EOS v4.12 or greater. -extends_documentation_fragment: eos -options: - http: - description: - - The C(http) argument controls the operating state of the HTTP - transport protocol when eAPI is present in the running-config. - When the value is set to True, the HTTP protocol is enabled and - when the value is set to False, the HTTP protocol is disabled. - By default, when eAPI is first configured, the HTTP protocol is - disabled. - type: bool - default: 'no' - aliases: ['enable_http'] - http_port: - description: - - Configures the HTTP port that will listen for connections when - the HTTP transport protocol is enabled. This argument accepts - integer values in the valid range of 1 to 65535. - default: 80 - https: - description: - - The C(https) argument controls the operating state of the HTTPS - transport protocol when eAPI is present in the running-config. - When the value is set to True, the HTTPS protocol is enabled and - when the value is set to False, the HTTPS protocol is disabled. - By default, when eAPI is first configured, the HTTPS protocol is - enabled. - type: bool - default: 'yes' - aliases: ['enable_https'] - https_port: - description: - - Configures the HTTP port that will listen for connections when - the HTTP transport protocol is enabled. This argument accepts - integer values in the valid range of 1 to 65535. - default: 443 - local_http: - description: - - The C(local_http) argument controls the operating state of the - local HTTP transport protocol when eAPI is present in the - running-config. When the value is set to True, the HTTP protocol - is enabled and restricted to connections from localhost only. When - the value is set to False, the HTTP local protocol is disabled. - - Note is value is independent of the C(http) argument - type: bool - default: 'no' - aliases: ['enable_local_http'] - local_http_port: - description: - - Configures the HTTP port that will listen for connections when - the HTTP transport protocol is enabled. This argument accepts - integer values in the valid range of 1 to 65535. - default: 8080 - socket: - description: - - The C(socket) argument controls the operating state of the UNIX - Domain Socket used to receive eAPI requests. When the value - of this argument is set to True, the UDS will listen for eAPI - requests. When the value is set to False, the UDS will not be - available to handle requests. By default when eAPI is first - configured, the UDS is disabled. - type: bool - default: 'no' - aliases: ['enable_socket'] - timeout: - description: - - The time (in seconds) to wait for the eAPI configuration to be - reflected in the running-config. - type: int - default: 30 - vrf: - description: - - The C(vrf) argument will configure eAPI to listen for connections - in the specified VRF. By default, eAPI transports will listen - for connections in the global table. This value requires the - VRF to already be created otherwise the task will fail. - default: default - version_added: "2.2" - config: - description: - - The module, by default, will connect to the remote device and - retrieve the current running-config to use as a base for comparing - against the contents of source. There are times when it is not - desirable to have the task get the current running-config for - every task in a playbook. The I(config) argument allows the - implementer to pass in the configuration to use as the base - config for comparison. - version_added: "2.2" - state: - description: - - The C(state) argument controls the operational state of eAPI - on the remote device. When this argument is set to C(started), - eAPI is enabled to receive requests and when this argument is - C(stopped), eAPI is disabled and will not receive requests. - default: started - choices: ['started', 'stopped'] -""" - -EXAMPLES = """ -- name: Enable eAPI access with default configuration - eos_eapi: - state: started - -- name: Enable eAPI with no HTTP, HTTPS at port 9443, local HTTP at port 80, and socket enabled - eos_eapi: - state: started - http: false - https_port: 9443 - local_http: yes - local_http_port: 80 - socket: yes - -- name: Shutdown eAPI access - eos_eapi: - state: stopped -""" - -RETURN = """ -commands: - description: The list of configuration mode commands to send to the device - returned: always - type: list - sample: - - management api http-commands - - protocol http port 81 - - no protocol https -urls: - description: Hash of URL endpoints eAPI is listening on per interface - returned: when eAPI is started - type: dict - sample: {'Management1': ['http://172.26.10.1:80']} -session_name: - description: The EOS config session name used to load the configuration - returned: when changed is True - type: str - sample: ansible_1479315771 -""" -import re -import time - -from ansible.module_utils.basic import AnsibleModule -from ansible.module_utils.network.eos.eos import run_commands, load_config -from ansible.module_utils.six import iteritems -from ansible.module_utils.network.eos.eos import eos_argument_spec - - -def check_transport(module): - transport = (module.params['provider'] or {}).get('transport') - - if transport == 'eapi': - module.fail_json(msg='eos_eapi module is only supported over cli transport') - - -def validate_http_port(value, module): - if not 1 <= value <= 65535: - module.fail_json(msg='http_port must be between 1 and 65535') - - -def validate_https_port(value, module): - if not 1 <= value <= 65535: - module.fail_json(msg='http_port must be between 1 and 65535') - - -def validate_local_http_port(value, module): - if not 1 <= value <= 65535: - module.fail_json(msg='http_port must be between 1 and 65535') - - -def validate_vrf(value, module): - out = run_commands(module, ['show vrf']) - configured_vrfs = [] - lines = out[0].strip().splitlines()[3:] - for l in lines: - if not l: - continue - splitted_line = re.split(r'\s{2,}', l.strip()) - if len(splitted_line) > 2: - configured_vrfs.append(splitted_line[0]) - - configured_vrfs.append('default') - if value not in configured_vrfs: - module.fail_json(msg='vrf `%s` is not configured on the system' % value) - - -def map_obj_to_commands(updates, module, warnings): - commands = list() - want, have = updates - - def needs_update(x): - return want.get(x) is not None and (want.get(x) != have.get(x)) - - def add(cmd): - if 'management api http-commands' not in commands: - commands.insert(0, 'management api http-commands') - commands.append(cmd) - - if any((needs_update('http'), needs_update('http_port'))): - if want['http'] is False: - add('no protocol http') - else: - if have['http'] is False and want['http'] in (False, None): - warnings.append('protocol http is not enabled, not configuring http port value') - else: - port = want['http_port'] or 80 - add('protocol http port %s' % port) - - if any((needs_update('https'), needs_update('https_port'))): - if want['https'] is False: - add('no protocol https') - else: - if have['https'] is False and want['https'] in (False, None): - warnings.append('protocol https is not enabled, not configuring https port value') - else: - port = want['https_port'] or 443 - add('protocol https port %s' % port) - - if any((needs_update('local_http'), needs_update('local_http_port'))): - if want['local_http'] is False: - add('no protocol http localhost') - else: - if have['local_http'] is False and want['local_http'] in (False, None): - warnings.append('protocol local_http is not enabled, not configuring local_http port value') - else: - port = want['local_http_port'] or 8080 - add('protocol http localhost port %s' % port) - - if any((needs_update('socket'), needs_update('socket'))): - if want['socket'] is False: - add('no protocol unix-socket') - else: - add('protocol unix-socket') - if needs_update('state'): - if want['state'] == 'stopped': - add('shutdown') - elif want['state'] == 'started': - add('no shutdown') - - if needs_update('vrf'): - add('vrf %s' % want['vrf']) - # switching operational vrfs here - # need to add the desired state as well - if want['state'] == 'stopped': - add('shutdown') - elif want['state'] == 'started': - add('no shutdown') - - return commands - - -def parse_state(data): - if data[0]['enabled']: - return 'started' - else: - return 'stopped' - - -def map_config_to_obj(module): - out = run_commands(module, ['show management api http-commands | json']) - return { - 'http': out[0]['httpServer']['configured'], - 'http_port': out[0]['httpServer']['port'], - 'https': out[0]['httpsServer']['configured'], - 'https_port': out[0]['httpsServer']['port'], - 'local_http': out[0]['localHttpServer']['configured'], - 'local_http_port': out[0]['localHttpServer']['port'], - 'socket': out[0]['unixSocketServer']['configured'], - 'vrf': out[0]['vrf'] or "default", - 'state': parse_state(out) - } - - -def map_params_to_obj(module): - obj = { - 'http': module.params['http'], - 'http_port': module.params['http_port'], - 'https': module.params['https'], - 'https_port': module.params['https_port'], - 'local_http': module.params['local_http'], - 'local_http_port': module.params['local_http_port'], - 'socket': module.params['socket'], - 'vrf': module.params['vrf'], - 'state': module.params['state'] - } - - for key, value in iteritems(obj): - if value: - validator = globals().get('validate_%s' % key) - if validator: - validator(value, module) - - return obj - - -def verify_state(updates, module): - want, have = updates - - invalid_state = [('http', 'httpServer'), - ('https', 'httpsServer'), - ('local_http', 'localHttpServer'), - ('socket', 'unixSocketServer')] - - timeout = module.params["timeout"] - state = module.params['state'] - - while invalid_state: - out = run_commands(module, ['show management api http-commands | json']) - for index, item in enumerate(invalid_state): - want_key, eapi_key = item - if want[want_key] is not None: - if want[want_key] == out[0][eapi_key]['running']: - del invalid_state[index] - elif state == 'stopped': - if not out[0][eapi_key]['running']: - del invalid_state[index] - else: - del invalid_state[index] - time.sleep(1) - timeout -= 1 - if timeout == 0: - module.fail_json(msg='timeout expired before eapi running state changed') - - -def collect_facts(module, result): - out = run_commands(module, ['show management api http-commands | json']) - facts = dict(eos_eapi_urls=dict()) - for each in out[0]['urls']: - intf, url = each.split(' : ') - key = str(intf).strip() - if key not in facts['eos_eapi_urls']: - facts['eos_eapi_urls'][key] = list() - facts['eos_eapi_urls'][key].append(str(url).strip()) - result['ansible_facts'] = facts - - -def main(): - """ main entry point for module execution - """ - argument_spec = dict( - http=dict(aliases=['enable_http'], type='bool'), - http_port=dict(type='int'), - - https=dict(aliases=['enable_https'], type='bool'), - https_port=dict(type='int'), - - local_http=dict(aliases=['enable_local_http'], type='bool'), - local_http_port=dict(type='int'), - - socket=dict(aliases=['enable_socket'], type='bool'), - timeout=dict(type="int", default=30), - - vrf=dict(default='default'), - - config=dict(), - state=dict(default='started', choices=['stopped', 'started']), - ) - - argument_spec.update(eos_argument_spec) - - module = AnsibleModule(argument_spec=argument_spec, - supports_check_mode=True) - - check_transport(module) - - result = {'changed': False} - - warnings = list() - if module.params['config']: - warnings.append('config parameter is no longer necessary and will be ignored') - - want = map_params_to_obj(module) - have = map_config_to_obj(module) - - commands = map_obj_to_commands((want, have), module, warnings) - result['commands'] = commands - - if commands: - commit = not module.check_mode - response = load_config(module, commands, commit=commit) - if response.get('diff') and module._diff: - result['diff'] = {'prepared': response.get('diff')} - result['session_name'] = response.get('session') - result['changed'] = True - - if result['changed']: - verify_state((want, have), module) - - collect_facts(module, result) - - if warnings: - result['warnings'] = warnings - - module.exit_json(**result) - - -if __name__ == '__main__': - main() diff --git a/lib/ansible/modules/network/eos/eos_facts.py b/lib/ansible/modules/network/eos/eos_facts.py deleted file mode 100644 index a410c5640d..0000000000 --- a/lib/ansible/modules/network/eos/eos_facts.py +++ /dev/null @@ -1,208 +0,0 @@ -#!/usr/bin/python -# -*- coding: utf-8 -*- -# Copyright 2019 Red Hat -# GNU General Public License v3.0+ (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt) - -from __future__ import absolute_import, division, print_function -__metaclass__ = type - -ANSIBLE_METADATA = {'metadata_version': '1.1', - 'status': ['preview'], - 'supported_by': 'network'} - - -DOCUMENTATION = """ ---- -module: eos_facts -version_added: "2.2" -author: - - "Peter Sprygada (@privateip)" - - "Nathaniel Case (@Qalthos)" -short_description: Collect facts from remote devices running Arista EOS -description: - - Collects facts from Arista devices running the EOS operating - system. This module places the facts gathered in the fact tree keyed by the - respective resource name. The facts module will always collect a - base set of facts from the device and can enable or disable - collection of additional facts. -extends_documentation_fragment: eos -options: - gather_subset: - description: - - When supplied, this argument will restrict the facts collected - to a given subset. Possible values for this argument include - all, hardware, config, and interfaces. Can specify a list of - values to include a larger subset. Values can also be used - with an initial C(M(!)) to specify that a specific subset should - not be collected. - required: false - type: list - default: '!config' - gather_network_resources: - description: - - When supplied, this argument will restrict the facts collected - to a given subset. Possible values for this argument include - all and the resources like interfaces, vlans etc. - Can specify a list of values to include a larger subset. Values - can also be used with an initial C(M(!)) to specify that a - specific subset should not be collected. Values can also be used - with an initial C(M(!)) to specify that a specific subset should - not be collected. - Valid subsets are 'all', 'interfaces', 'l2_interfaces', 'l3_interfaces', - 'lacp', 'lacp_interfaces', 'lag_interfaces', 'lldp_global', 'lldp_interfaces', - 'vlans', 'acls'. - required: false - type: list - version_added: "2.9" -""" - -EXAMPLES = """ -- name: Gather all legacy facts -- eos_facts: - gather_subset: all - -- name: Gather only the config and default facts - eos_facts: - gather_subset: - - config - -- name: Do not gather hardware facts - eos_facts: - gather_subset: - - "!hardware" - -- name: Gather legacy and resource facts - eos_facts: - gather_subset: all - gather_network_resources: all - -- name: Gather only the interfaces resource facts and no legacy facts -- eos_facts: - gather_subset: - - '!all' - - '!min' - gather_network_resources: - - interfaces - -- name: Gather all resource facts and minimal legacy facts - eos_facts: - gather_subset: min - gather_network_resources: all -""" - -RETURN = """ -ansible_net_gather_subset: - description: The list of fact subsets collected from the device - returned: always - type: list - -ansible_net_gather_network_resources: - description: The list of fact for network resource subsets collected from the device - returned: when the resource is configured - type: list - -# default -ansible_net_model: - description: The model name returned from the device - returned: always - type: str -ansible_net_serialnum: - description: The serial number of the remote device - returned: always - type: str -ansible_net_version: - description: The operating system version running on the remote device - returned: always - type: str -ansible_net_hostname: - description: The configured hostname of the device - returned: always - type: str -ansible_net_image: - description: The image file the device is running - returned: always - type: str -ansible_net_fqdn: - description: The fully qualified domain name of the device - returned: always - type: str -ansible_net_api: - description: The name of the transport - returned: always - type: str -ansible_net_python_version: - description: The Python version Ansible controller is using - returned: always - type: str - -# hardware -ansible_net_filesystems: - description: All file system names available on the device - returned: when hardware is configured - type: list -ansible_net_memfree_mb: - description: The available free memory on the remote device in Mb - returned: when hardware is configured - type: int -ansible_net_memtotal_mb: - description: The total memory on the remote device in Mb - returned: when hardware is configured - type: int - -# config -ansible_net_config: - description: The current active config from the device - returned: when config is configured - type: str - -# interfaces -ansible_net_all_ipv4_addresses: - description: All IPv4 addresses configured on the device - returned: when interfaces is configured - type: list -ansible_net_all_ipv6_addresses: - description: All IPv6 addresses configured on the device - returned: when interfaces is configured - type: list -ansible_net_interfaces: - description: A hash of all interfaces running on the system - returned: when interfaces is configured - type: dict -ansible_net_neighbors: - description: The list of LLDP neighbors from the remote device - returned: when interfaces is configured - type: dict -""" - -from ansible.module_utils.basic import AnsibleModule -from ansible.module_utils.network.eos.argspec.facts.facts import FactsArgs -from ansible.module_utils.network.eos.facts.facts import Facts -from ansible.module_utils.network.eos.eos import eos_argument_spec - - -def main(): - """ - Main entry point for module execution - - :returns: ansible_facts - """ - argument_spec = FactsArgs.argument_spec - argument_spec.update(eos_argument_spec) - - module = AnsibleModule(argument_spec=argument_spec, - supports_check_mode=True) - - warnings = [] - if module.params["gather_subset"] == "!config": - warnings.append('default value for `gather_subset` will be changed to `min` from `!config` v2.11 onwards') - - result = Facts(module).get_facts() - - ansible_facts, additional_warnings = result - warnings.extend(additional_warnings) - - module.exit_json(ansible_facts=ansible_facts, warnings=warnings) - - -if __name__ == '__main__': - main() diff --git a/lib/ansible/modules/network/eos/eos_interfaces.py b/lib/ansible/modules/network/eos/eos_interfaces.py deleted file mode 100644 index d8f4e56c82..0000000000 --- a/lib/ansible/modules/network/eos/eos_interfaces.py +++ /dev/null @@ -1,298 +0,0 @@ -#!/usr/bin/python -# -*- coding: utf-8 -*- -# Copyright 2019 Red Hat -# GNU General Public License v3.0+ -# (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt) - -############################################## -# WARNING # -############################################## -# -# This file is auto generated by the resource -# module builder playbook. -# -# Do not edit this file manually. -# -# Changes to this file will be over written -# by the resource module builder. -# -# Changes should be made in the model used to -# generate this file or in the resource module -# builder template. -# -############################################## - -""" -The module file for eos_interfaces -""" - -from __future__ import absolute_import, division, print_function -__metaclass__ = type - - -ANSIBLE_METADATA = {'metadata_version': '1.1', - 'status': ['preview'], - 'supported_by': 'network'} - - -DOCUMENTATION = """ ---- -module: eos_interfaces -version_added: 2.9 -short_description: Manages interface attributes of Arista EOS interfaces -description: ['This module manages the interface attributes of Arista EOS interfaces.'] -author: ['Nathaniel Case (@qalthos)'] -notes: -- Tested against Arista EOS 4.20.10M -- This module works with connection C(network_cli). See the - L(EOS Platform Options,../network/user_guide/platform_eos.html). -options: - config: - description: The provided configuration - type: list - suboptions: - name: - description: - - Full name of the interface, e.g. GigabitEthernet1. - type: str - required: true - description: - description: - - Interface description - type: str - duplex: - description: - - Interface link status. Applicable for Ethernet interfaces only. - - Values other than C(auto) must also set I(speed). - - Ignored when I(speed) is set above C(1000). - type: str - enabled: - default: true - description: - - Administrative state of the interface. - - Set the value to C(true) to administratively enable the interface or C(false) - to disable it. - type: bool - mtu: - description: - - MTU for a specific interface. Must be an even number between 576 and 9216. - Applicable for Ethernet interfaces only. - type: int - speed: - description: - - Interface link speed. Applicable for Ethernet interfaces only. - type: str - state: - choices: - - merged - - replaced - - overridden - - deleted - default: merged - description: - - The state of the configuration after module completion. - type: str - -""" - -EXAMPLES = """ ---- - -# Using merged - -# Before state: -# ------------- -# -# veos#show running-config | section interface -# interface Ethernet1 -# description "Interface 1" -# ! -# interface Ethernet2 -# ! -# interface Management1 -# description "Management interface" -# ip address dhcp -# ! - -- name: Merge provided configuration with device configuration - eos_interfaces: - config: - - name: Ethernet1 - enabled: True - - name: Ethernet2 - description: 'Configured by Ansible' - enabled: False - state: merged - -# After state: -# ------------ -# -# veos#show running-config | section interface -# interface Ethernet1 -# description "Interface 1" -# ! -# interface Ethernet2 -# description "Configured by Ansible" -# shutdown -# ! -# interface Management1 -# description "Management interface" -# ip address dhcp -# ! - -# Using replaced - -# Before state: -# ------------- -# -# veos#show running-config | section interface -# interface Ethernet1 -# description "Interface 1" -# ! -# interface Ethernet2 -# ! -# interface Management1 -# description "Management interface" -# ip address dhcp -# ! - -- name: Replaces device configuration of listed interfaces with provided configuration - eos_interfaces: - config: - - name: Ethernet1 - enabled: True - - name: Ethernet2 - description: 'Configured by Ansible' - enabled: False - state: replaced - -# After state: -# ------------ -# -# veos#show running-config | section interface -# interface Ethernet1 -# ! -# interface Ethernet2 -# description "Configured by Ansible" -# shutdown -# ! -# interface Management1 -# description "Management interface" -# ip address dhcp -# ! - -# Using overridden - -# Before state: -# ------------- -# -# veos#show running-config | section interface -# interface Ethernet1 -# description "Interface 1" -# ! -# interface Ethernet2 -# ! -# interface Management1 -# description "Management interface" -# ip address dhcp -# ! - -- name: Overrides all device configuration with provided configuration - eos_interfaces: - config: - - name: Ethernet1 - enabled: True - - name: Ethernet2 - description: 'Configured by Ansible' - enabled: False - state: overridden - -# After state: -# ------------ -# -# veos#show running-config | section interface -# interface Ethernet1 -# ! -# interface Ethernet2 -# description "Configured by Ansible" -# shutdown -# ! -# interface Management1 -# ip address dhcp -# ! - -# Using deleted - -# Before state: -# ------------- -# -# veos#show running-config | section interface -# interface Ethernet1 -# description "Interface 1" -# ! -# interface Ethernet2 -# ! -# interface Management1 -# description "Management interface" -# ip address dhcp -# ! - -- name: Delete or return interface parameters to default settings - eos_interfaces: - config: - - name: Ethernet1 - state: deleted - -# After state: -# ------------ -# -# veos#show running-config | section interface -# interface Ethernet1 -# ! -# interface Ethernet2 -# ! -# interface Management1 -# description "Management interface" -# ip address dhcp -# ! -""" - -RETURN = """ -before: - description: The configuration as structured data prior to module invocation. - returned: always - type: dict - sample: The configuration returned will always be in the same format of the parameters above. -after: - description: The configuration as structured data after module completion. - returned: when changed - type: dict - sample: The configuration returned will always be in the same format of the parameters above. -commands: - description: The set of commands pushed to the remote device. - returned: always - type: list - sample: ['interface Ethernet2', 'shutdown', 'speed 10full'] -""" - - -from ansible.module_utils.basic import AnsibleModule -from ansible.module_utils.network.eos.argspec.interfaces.interfaces import InterfacesArgs -from ansible.module_utils.network.eos.config.interfaces.interfaces import Interfaces - - -def main(): - """ - Main entry point for module execution - - :returns: the result form module invocation - """ - module = AnsibleModule(argument_spec=InterfacesArgs.argument_spec, - supports_check_mode=True) - - result = Interfaces(module).execute_module() - module.exit_json(**result) - - -if __name__ == '__main__': - main() diff --git a/lib/ansible/modules/network/eos/eos_l2_interfaces.py b/lib/ansible/modules/network/eos/eos_l2_interfaces.py deleted file mode 100644 index 7429086ff1..0000000000 --- a/lib/ansible/modules/network/eos/eos_l2_interfaces.py +++ /dev/null @@ -1,312 +0,0 @@ -#!/usr/bin/python -# -*- coding: utf-8 -*- -# Copyright 2019 Red Hat -# GNU General Public License v3.0+ (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt) - -############################################## -# WARNING # -############################################## -# -# This file is auto generated by the resource -# module builder playbook. -# -# Do not edit this file manually. -# -# Changes to this file will be over written -# by the resource module builder. -# -# Changes should be made in the model used to -# generate this file or in the resource module -# builder template. -# -############################################## - -""" -The module file for eos_l2_interfaces -""" - -from __future__ import absolute_import, division, print_function -__metaclass__ = type - -ANSIBLE_METADATA = { - 'metadata_version': '1.1', - 'status': ['preview'], - 'supported_by': 'network' -} - -DOCUMENTATION = """ ---- -module: eos_l2_interfaces -version_added: 2.9 -short_description: Manages Layer-2 interface attributes of Arista EOS devices -description: This module provides declarative management of Layer-2 interface on Arista EOS devices. -author: Nathaniel Case (@qalthos) -notes: -- Tested against Arista EOS 4.20.10M -- This module works with connection C(network_cli). See the - L(EOS Platform Options,../network/user_guide/platform_eos.html). -options: - config: - description: A dictionary of Layer-2 interface options - type: list - elements: dict - suboptions: - name: - description: - - Full name of interface, e.g. Ethernet1. - type: str - required: True - access: - description: - - Switchport mode access command to configure the interface as a layer 2 access. - type: dict - suboptions: - vlan: - description: - - Configure given VLAN in access port. It's used as the access VLAN ID. - type: int - trunk: - description: - - Switchport mode trunk command to configure the interface as a Layer 2 trunk. - type: dict - suboptions: - native_vlan: - description: - - Native VLAN to be configured in trunk port. It is used as the trunk native VLAN ID. - type: int - trunk_allowed_vlans: - description: - - List of allowed VLANs in a given trunk port. These are the only VLANs that will be - configured on the trunk. - type: list - mode: - description: - - Mode in which interface needs to be configured. - - Access mode is not shown in interface facts, so idempotency will not be - maintained for switchport mode access and every time the output will come - as changed=True. - version_added: '2.10' - type: str - choices: ['access', 'trunk'] - state: - choices: - - merged - - replaced - - overridden - - deleted - default: merged - description: - - The state of the configuration after module completion - type: str -""" - -EXAMPLES = """ ---- - -# Using merged - -# Before state: -# ------------- -# -# veos#show running-config | section interface -# interface Ethernet1 -# switchport access vlan 20 -# ! -# interface Ethernet2 -# switchport trunk native vlan 20 -# switchport mode trunk -# ! -# interface Management1 -# ip address dhcp -# ipv6 address auto-config -# ! - -- name: Merge provided configuration with device configuration. - eos_l2_interfaces: - config: - - name: Ethernet1 - trunk: - native_vlan: 10 - - name: Ethernet2 - access: - vlan: 30 - state: merged - -# After state: -# ------------ -# -# veos#show running-config | section interface -# interface Ethernet1 -# switchport trunk native vlan 10 -# switchport mode trunk -# ! -# interface Ethernet2 -# switchport access vlan 30 -# ! -# interface Management1 -# ip address dhcp -# ipv6 address auto-config -# ! - -# Using replaced - -# Before state: -# ------------- -# -# veos2#show running-config | s int -# interface Ethernet1 -# switchport access vlan 20 -# ! -# interface Ethernet2 -# switchport trunk native vlan 20 -# switchport mode trunk -# ! -# interface Management1 -# ip address dhcp -# ipv6 address auto-config -# ! - -- name: Replace device configuration of specified L2 interfaces with provided configuration. - eos_l2_interfaces: - config: - - name: Ethernet1 - trunk: - native_vlan: 20 - trunk_vlans: 5-10, 15 - state: replaced - -# After state: -# ------------ -# -# veos#show running-config | section interface -# interface Ethernet1 -# switchport trunk native vlan 20 -# switchport trunk allowed vlan 5-10,15 -# switchport mode trunk -# ! -# interface Ethernet2 -# switchport trunk native vlan 20 -# switchport mode trunk -# ! -# interface Management1 -# ip address dhcp -# ipv6 address auto-config -# ! - -# Using overridden - -# Before state: -# ------------- -# -# veos#show running-config | section interface -# interface Ethernet1 -# switchport access vlan 20 -# ! -# interface Ethernet2 -# switchport trunk native vlan 20 -# switchport mode trunk -# ! -# interface Management1 -# ip address dhcp -# ipv6 address auto-config -# ! - -- name: Override device configuration of all L2 interfaces on device with provided configuration. - eos_l2_interfaces: - config: - - name: Ethernet2 - access: - vlan: 30 - state: overridden - -# After state: -# ------------ -# -# veos#show running-config | section interface -# interface Ethernet1 -# ! -# interface Ethernet2 -# switchport access vlan 30 -# ! -# interface Management1 -# ip address dhcp -# ipv6 address auto-config -# ! - -# Using deleted - -# Before state: -# ------------- -# -# veos#show running-config | section interface -# interface Ethernet1 -# switchport access vlan 20 -# ! -# interface Ethernet2 -# switchport trunk native vlan 20 -# switchport mode trunk -# ! -# interface Management1 -# ip address dhcp -# ipv6 address auto-config -# ! - -- name: Delete EOS L2 interfaces as in given arguments. - eos_l2_interfaces: - config: - - name: Ethernet1 - - name: Ethernet2 - state: deleted - -# After state: -# ------------ -# -# veos#show running-config | section interface -# interface Ethernet1 -# ! -# interface Ethernet2 -# ! -# interface Management1 -# ip address dhcp -# ipv6 address auto-config -""" - -RETURN = """ -before: - description: The configuration as structured data prior to module invocation. - returned: always - type: list - sample: The configuration returned will always be in the same format of the parameters above. -after: - description: The configuration as structured data after module completion. - returned: when changed - type: list - sample: The configuration returned will always be in the same format of the parameters above. -commands: - description: The set of commands pushed to the remote device. - returned: always - type: list - sample: ['interface Ethernet2', 'switchport access vlan 20'] -""" - - -from ansible.module_utils.basic import AnsibleModule -from ansible.module_utils.network.eos.argspec.l2_interfaces.l2_interfaces import L2_interfacesArgs -from ansible.module_utils.network.eos.config.l2_interfaces.l2_interfaces import L2_interfaces - - -def main(): - """ - Main entry point for module execution - - :returns: the result form module invocation - """ - module = AnsibleModule(argument_spec=L2_interfacesArgs.argument_spec, - supports_check_mode=True) - - result = L2_interfaces(module).execute_module() - module.exit_json(**result) - - -if __name__ == '__main__': - main() diff --git a/lib/ansible/modules/network/eos/eos_l3_interfaces.py b/lib/ansible/modules/network/eos/eos_l3_interfaces.py deleted file mode 100644 index 38f8077c0e..0000000000 --- a/lib/ansible/modules/network/eos/eos_l3_interfaces.py +++ /dev/null @@ -1,305 +0,0 @@ -#!/usr/bin/python -# -*- coding: utf-8 -*- -# Copyright 2019 Red Hat -# GNU General Public License v3.0+ -# (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt) - -############################################# -# WARNING # -############################################# -# -# This file is auto generated by the resource -# module builder playbook. -# -# Do not edit this file manually. -# -# Changes to this file will be over written -# by the resource module builder. -# -# Changes should be made in the model used to -# generate this file or in the resource module -# builder template. -# -############################################# - -""" -The module file for eos_l3_interfaces -""" - -from __future__ import absolute_import, division, print_function -__metaclass__ = type - -ANSIBLE_METADATA = { - 'metadata_version': '1.1', - 'status': ['preview'], - 'supported_by': 'network', -} - -DOCUMENTATION = """ ---- -module: eos_l3_interfaces -version_added: 2.9 -short_description: 'Manages L3 interface attributes of Arista EOS devices.' -description: 'This module provides declarative management of Layer 3 interfaces on Arista EOS devices.' -author: Nathaniel Case (@qalthos) -notes: -- Tested against Arista EOS 4.20.10M -- This module works with connection C(network_cli). See the - L(EOS Platform Options,../network/user_guide/platform_eos.html). -options: - config: - description: A dictionary of Layer 3 interface options - type: list - elements: dict - suboptions: - name: - description: - - Full name of the interface, i.e. Ethernet1. - type: str - required: True - ipv4: - description: - - List of IPv4 addresses to be set for the Layer 3 interface mentioned in I(name) option. - type: list - elements: dict - suboptions: - address: - description: - - IPv4 address to be set in the format / - eg. 192.0.2.1/24, or C(dhcp) to query DHCP for an IP address. - type: str - secondary: - description: - - Whether or not this address is a secondary address. - type: bool - default: False - ipv6: - description: - - List of IPv6 addresses to be set for the Layer 3 interface mentioned in I(name) option. - type: list - elements: dict - suboptions: - address: - description: - - IPv6 address to be set in the address format is / - eg. 2001:db8:2201:1::1/64 or C(auto-config) to use SLAAC to chose an address. - type: str - state: - description: - - The state of the configuration after module completion - type: str - choices: - - merged - - replaced - - overridden - - deleted - default: merged -""" - -EXAMPLES = """ ---- - -# Using deleted - -# Before state: -# ------------- -# -# veos#show running-config | section interface -# interface Ethernet1 -# ip address 192.0.2.12/24 -# ! -# interface Ethernet2 -# ipv6 address 2001:db8::1/64 -# ! -# interface Management1 -# ip address dhcp -# ipv6 address auto-config - -- name: Delete L3 attributes of given interfaces. - eos_l3_interfaces: - config: - - name: Ethernet1 - - name: Ethernet2 - state: deleted - -# After state: -# ------------ -# -# veos#show running-config | section interface -# interface Ethernet1 -# ! -# interface Ethernet2 -# ! -# interface Management1 -# ip address dhcp -# ipv6 address auto-config - - -# Using merged - -# Before state: -# ------------- -# -# veos#show running-config | section interface -# interface Ethernet1 -# ip address 192.0.2.12/24 -# ! -# interface Ethernet2 -# ipv6 address 2001:db8::1/64 -# ! -# interface Management1 -# ip address dhcp -# ipv6 address auto-config - -- name: Merge provided configuration with device configuration. - eos_l3_interfaces: - config: - - name: Ethernet1 - ipv4: - address: 198.51.100.14/24 - - name: Ethernet2 - ipv4: - address: 203.0.113.27/24 - state: merged - -# After state: -# ------------ -# -# veos#show running-config | section interface -# interface Ethernet1 -# ip address 198.51.100.14/24 -# ! -# interface Ethernet2 -# ip address 203.0.113.27/24 -# ipv6 address 2001:db8::1/64 -# ! -# interface Management1 -# ip address dhcp -# ipv6 address auto-config - - -# Using overridden - -# Before state: -# ------------- -# -# veos#show running-config | section interface -# interface Ethernet1 -# ip address 192.0.2.12/24 -# ! -# interface Ethernet2 -# ipv6 address 2001:db8::1/64 -# ! -# interface Management1 -# ip address dhcp -# ipv6 address auto-config - -- name: Override device configuration of all L2 interfaces on device with provided configuration. - eos_l3_interfaces: - config: - - name: Ethernet1 - ipv6: - address: 2001:db8:feed::1/96 - - name: Management1 - ipv4: - address: dhcp - ipv6: auto-config - state: overridden - -# After state: -# ------------ -# -# veos#show running-config | section interface -# interface Ethernet1 -# ipv6 address 2001:db8:feed::1/96 -# ! -# interface Ethernet2 -# ! -# interface Management1 -# ip address dhcp -# ipv6 address auto-config - - -# Using replaced - -# Before state: -# ------------- -# -# veos#show running-config | section interface -# interface Ethernet1 -# ip address 192.0.2.12/24 -# ! -# interface Ethernet2 -# ipv6 address 2001:db8::1/64 -# ! -# interface Management1 -# ip address dhcp -# ipv6 address auto-config - -- name: Replace device configuration of specified L2 interfaces with provided configuration. - eos_l3_interfaces: - config: - - name: Ethernet2 - ipv4: - address: 203.0.113.27/24 - state: replaced - -# After state: -# ------------ -# -# veos#show running-config | section interface -# interface Ethernet1 -# ip address 192.0.2.12/24 -# ! -# interface Ethernet2 -# ip address 203.0.113.27/24 -# ! -# interface Management1 -# ip address dhcp -# ipv6 address auto-config - - -""" -RETURN = """ -before: - description: The configuration as structured data prior to module invocation. - returned: always - type: list - sample: > - The configuration returned will always be in the same format - of the parameters above. -after: - description: The configuration as structured data after module completion. - returned: when changed - type: list - sample: > - The configuration returned will always be in the same format - of the parameters above. -commands: - description: The set of commands pushed to the remote device. - returned: always - type: list - sample: ['interface Ethernet2', 'ip address 192.0.2.12/24'] -""" - - -from ansible.module_utils.basic import AnsibleModule -from ansible.module_utils.network.eos.argspec.l3_interfaces.l3_interfaces import L3_interfacesArgs -from ansible.module_utils.network.eos.config.l3_interfaces.l3_interfaces import L3_interfaces - - -def main(): - """ - Main entry point for module execution - - :returns: the result form module invocation - """ - module = AnsibleModule(argument_spec=L3_interfacesArgs.argument_spec, - supports_check_mode=True) - - result = L3_interfaces(module).execute_module() - module.exit_json(**result) - - -if __name__ == '__main__': - main() diff --git a/lib/ansible/modules/network/eos/eos_lacp.py b/lib/ansible/modules/network/eos/eos_lacp.py deleted file mode 100644 index f19bcf85d1..0000000000 --- a/lib/ansible/modules/network/eos/eos_lacp.py +++ /dev/null @@ -1,178 +0,0 @@ -#!/usr/bin/python -# -*- coding: utf-8 -*- -# Copyright 2019 Red Hat -# GNU General Public License v3.0+ -# (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt) - -############################################# -# WARNING # -############################################# -# -# This file is auto generated by the resource -# module builder playbook. -# -# Do not edit this file manually. -# -# Changes to this file will be over written -# by the resource module builder. -# -# Changes should be made in the model used to -# generate this file or in the resource module -# builder template. -# -############################################# - -""" -The module file for eos_lacp -""" - -from __future__ import absolute_import, division, print_function -__metaclass__ = type - -ANSIBLE_METADATA = { - 'metadata_version': '1.1', - 'status': ['preview'], - 'supported_by': 'network' -} - -DOCUMENTATION = """ ---- -module: eos_lacp -version_added: 2.9 -short_description: Manage Global Link Aggregation Control Protocol (LACP) on Arista EOS devices. -description: - - This module manages Global Link Aggregation Control Protocol (LACP) on Arista EOS devices. -author: Nathaniel Case (@Qalthos) -notes: -- Tested against Arista EOS 4.20.10M -- This module works with connection C(network_cli). See the - L(EOS Platform Options,../network/user_guide/platform_eos.html). -options: - config: - description: LACP global options. - type: dict - suboptions: - system: - description: LACP system options. - type: dict - suboptions: - priority: - description: - - The system priority to use in LACP negotiations. - - Lower value is higher priority. - - Refer to vendor documentation for valid values. - type: int - state: - description: - - The state of the configuration after module completion. - type: str - choices: - - merged - - replaced - - deleted - default: merged -""" -EXAMPLES = """ -# Using merged - -# Before state: -# ------------- -# veos# show running-config | include lacp -# lacp system-priority 10 - -- name: Merge provided global LACP attributes with device attributes - eos_lacp: - config: - system: - priority: 20 - state: merged - -# After state: -# ------------ -# veos# show running-config | include lacp -# lacp system-priority 20 -# - - -# Using replaced - -# Before state: -# ------------- -# veos# show running-config | include lacp -# lacp system-priority 10 - -- name: Replace device global LACP attributes with provided attributes - eos_lacp: - config: - system: - priority: 20 - state: replaced - -# After state: -# ------------ -# veos# show running-config | include lacp -# lacp system-priority 20 -# - - -# Using deleted - -# Before state: -# ------------- -# veos# show running-config | include lacp -# lacp system-priority 10 - -- name: Delete global LACP attributes - eos_lacp: - state: deleted - -# After state: -# ------------ -# veos# show running-config | include lacp -# - - -""" -RETURN = """ -before: - description: The configuration as structured data prior to module invocation. - returned: always - type: dict - sample: > - The configuration returned will always be in the same format - of the parameters above. -after: - description: The configuration as structured data after module completion. - returned: when changed - type: dict - sample: > - The configuration returned will always be in the same format - of the parameters above. -commands: - description: The set of commands pushed to the remote device. - returned: always - type: list - sample: ['lacp system-priority 10'] -""" - - -from ansible.module_utils.basic import AnsibleModule -from ansible.module_utils.network.eos.argspec.lacp.lacp import LacpArgs -from ansible.module_utils.network.eos.config.lacp.lacp import Lacp - - -def main(): - """ - Main entry point for module execution - - :returns: the result form module invocation - """ - module = AnsibleModule(argument_spec=LacpArgs.argument_spec, - supports_check_mode=True) - - result = Lacp(module).execute_module() - module.exit_json(**result) - - -if __name__ == '__main__': - main() diff --git a/lib/ansible/modules/network/eos/eos_lacp_interfaces.py b/lib/ansible/modules/network/eos/eos_lacp_interfaces.py deleted file mode 100644 index 246c3ed5a2..0000000000 --- a/lib/ansible/modules/network/eos/eos_lacp_interfaces.py +++ /dev/null @@ -1,254 +0,0 @@ -#!/usr/bin/python -# -*- coding: utf-8 -*- -# Copyright 2019 Red Hat -# GNU General Public License v3.0+ -# (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt) - -############################################# -# WARNING # -############################################# -# -# This file is auto generated by the resource -# module builder playbook. -# -# Do not edit this file manually. -# -# Changes to this file will be over written -# by the resource module builder. -# -# Changes should be made in the model used to -# generate this file or in the resource module -# builder template. -# -############################################# - -""" -The module file for eos_lacp_interfaces -""" - -from __future__ import absolute_import, division, print_function -__metaclass__ = type - -ANSIBLE_METADATA = { - 'metadata_version': '1.1', - 'status': ['preview'], - 'supported_by': 'network' -} - -DOCUMENTATION = """ ---- -module: eos_lacp_interfaces -version_added: 2.9 -short_description: Manage Link Aggregation Control Protocol (LACP) attributes of interfaces on Arista EOS devices. -description: - - This module manages Link Aggregation Control Protocol (LACP) attributes of interfaces on Arista EOS devices. -author: Nathaniel Case (@Qalthos) -notes: -- Tested against Arista EOS 4.20.10M -- This module works with connection C(network_cli). See the - L(EOS Platform Options,../network/user_guide/platform_eos.html). -options: - config: - description: A dictionary of LACP interfaces options. - type: list - elements: dict - suboptions: - name: - description: - - Full name of the interface (i.e. Ethernet1). - type: str - port_priority: - description: - - LACP port priority for the interface. Range 1-65535. - type: int - rate: - description: - - Rate at which PDUs are sent by LACP. - At fast rate LACP is transmitted once every 1 second. - At normal rate LACP is transmitted every 30 seconds after the link is bundled. - type: str - choices: ['fast', 'normal'] - state: - description: - - The state of the configuration after module completion. - type: str - choices: - - merged - - replaced - - overridden - - deleted - default: merged -""" -EXAMPLES = """ -# Using merged -# -# -# ------------ -# Before state -# ------------ -# -# -# veos#show run | section ^interface -# interface Ethernet1 -# lacp port-priority 30 -# interface Ethernet2 -# lacp rate fast - -- name: Merge provided configuration with device configuration - eos_lacp_interfaces: - config: - - name: Ethernet1 - rate: fast - - name: Ethernet2 - rate: normal - state: merged - -# -# ----------- -# After state -# ----------- -# -# veos#show run | section ^interface -# interface Ethernet1 -# lacp port-priority 30 -# lacp rate fast -# interface Ethernet2 - - -# Using replaced -# -# -# ------------ -# Before state -# ------------ -# -# -# veos#show run | section ^interface -# interface Ethernet1 -# lacp port-priority 30 -# interface Ethernet2 -# lacp rate fast - -- name: Replace existing LACP configuration of specified interfaces with provided configuration - eos_lacp_interfaces: - config: - - name: Ethernet1 - rate: fast - state: replaced - -# -# ----------- -# After state -# ----------- -# -# veos#show run | section ^interface -# interface Ethernet1 -# lacp rate fast -# interface Ethernet2 -# lacp rate fast - - -# Using overridden -# -# -# ------------ -# Before state -# ------------ -# -# -# veos#show run | section ^interface -# interface Ethernet1 -# lacp port-priority 30 -# interface Ethernet2 -# lacp rate fast - -- name: Override the LACP configuration of all the interfaces with provided configuration - eos_lacp_interfaces: - config: - - name: Ethernet1 - rate: fast - state: overridden - -# -# ----------- -# After state -# -# -# veos#show run | section ^interface -# interface Ethernet1 -# lacp rate fast -# interface Ethernet2 - - -# Using deleted -# -# -# ------------ -# Before state -# ------------ -# -# -# veos#show run | section ^interface -# interface Ethernet1 -# lacp port-priority 30 -# interface Ethernet2 -# lacp rate fast - -- name: Delete LACP attributes of given interfaces (or all interfaces if none specified). - eos_lacp_interfaces: - state: deleted - -# -# ----------- -# After state -# ----------- -# -# veos#show run | section ^interface -# interface Ethernet1 -# interface Ethernet2 - - -""" -RETURN = """ -before: - description: The configuration as structured data prior to module invocation. - returned: always - type: list - sample: > - The configuration returned will always be in the same format - of the parameters above. -after: - description: The configuration as structured data after module completion. - returned: when changed - type: list - sample: > - The configuration returned will always be in the same format - of the parameters above. -commands: - description: The set of commands pushed to the remote device. - returned: always - type: list - sample: ['interface Ethernet1', 'lacp rate fast'] -""" - - -from ansible.module_utils.basic import AnsibleModule -from ansible.module_utils.network.eos.argspec.lacp_interfaces.lacp_interfaces import Lacp_interfacesArgs -from ansible.module_utils.network.eos.config.lacp_interfaces.lacp_interfaces import Lacp_interfaces - - -def main(): - """ - Main entry point for module execution - - :returns: the result form module invocation - """ - module = AnsibleModule(argument_spec=Lacp_interfacesArgs.argument_spec, - supports_check_mode=True) - - result = Lacp_interfaces(module).execute_module() - module.exit_json(**result) - - -if __name__ == '__main__': - main() diff --git a/lib/ansible/modules/network/eos/eos_lag_interfaces.py b/lib/ansible/modules/network/eos/eos_lag_interfaces.py deleted file mode 100644 index a82102e29b..0000000000 --- a/lib/ansible/modules/network/eos/eos_lag_interfaces.py +++ /dev/null @@ -1,251 +0,0 @@ -#!/usr/bin/python -# -*- coding: utf-8 -*- -# Copyright 2019 Red Hat -# GNU General Public License v3.0+ -# (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt) - -############################################# -# WARNING # -############################################# -# -# This file is auto generated by the resource -# module builder playbook. -# -# Do not edit this file manually. -# -# Changes to this file will be over written -# by the resource module builder. -# -# Changes should be made in the model used to -# generate this file or in the resource module -# builder template. -# -############################################# - -""" -The module file for eos_lag_interfaces -""" - -from __future__ import absolute_import, division, print_function -__metaclass__ = type - - -ANSIBLE_METADATA = { - 'metadata_version': '1.1', - 'status': ['preview'], - 'supported_by': 'network' -} - -DOCUMENTATION = """ ---- -module: eos_lag_interfaces -version_added: 2.9 -short_description: Manages link aggregation groups on Arista EOS devices -description: This module manages attributes of link aggregation groups on Arista EOS devices. -author: Nathaniel Case (@Qalthos) -notes: -- Tested against Arista EOS 4.20.10M -- This module works with connection C(network_cli). See the - L(EOS Platform Options,../network/user_guide/platform_eos.html). -options: - config: - description: A list of link aggregation group configurations. - type: list - elements: dict - suboptions: - name: - description: - - Name of the port-channel interface of the link aggregation group (LAG) e.g., Port-Channel5. - type: str - required: True - members: - description: - - Ethernet interfaces that are part of the group. - type: list - elements: dict - suboptions: - member: - description: - - Name of ethernet interface that is a member of the LAG. - type: str - mode: - description: - - LAG mode for this interface. - type: str - choices: - - active - - "on" - - passive - state: - description: - - The state of the configuration after module completion. - type: str - choices: - - merged - - replaced - - overridden - - deleted - default: merged -""" - -EXAMPLES = """ ---- - -# Using merged - -# Before state: -# ------------- -# -# veos#show running-config | section interface -# interface Ethernet1 -# channel group 5 mode on -# interface Ethernet2 - -- name: Merge provided LAG attributes with existing device configuration - eos_lag_interfaces: - config: - - name: 5 - members: - - member: Ethernet2 - mode: on - state: merged - -# After state: -# ------------ -# -# veos#show running-config | section interface -# interface Ethernet1 -# channel group 5 mode on -# interface Ethernet2 -# channel group 5 mode on - - -# Using replaced - -# Before state: -# ------------- -# -# veos#show running-config | section interface -# interface Ethernet1 -# channel group 5 mode on -# interface Ethernet2 - -- name: Replace all device configuration of specified LAGs with provided configuration - eos_lag_interfaces: - config: - - name: 5 - members: - - member: Ethernet2 - mode: on - state: replaced - -# After state: -# ------------ -# -# veos#show running-config | section interface -# interface Ethernet1 -# interface Ethernet2 -# channel group 5 mode on - - -# Using overridden - -# Before state: -# ------------- -# -# veos#show running-config | section interface -# interface Ethernet1 -# channel group 5 mode on -# interface Ethernet2 - -- name: Override all device configuration of all LAG attributes with provided configuration - eos_lag_interfaces: - config: - - name: 10 - members: - - member: Ethernet2 - mode: on - state: overridden - -# After state: -# ------------ -# -# veos#show running-config | section interface -# interface Ethernet1 -# interface Ethernet2 -# channel group 10 mode on - - -# Using deleted - -# Before state: -# ------------- -# -# veos#show running-config | section interface -# interface Ethernet1 -# channel group 5 mode on -# interface Ethernet2 -# channel group 5 mode on - -- name: Delete LAG attributes of the given interfaces. - eos_lag_interfaces: - config: - - name: 5 - members: - - member: Ethernet1 - state: deleted - -# After state: -# ------------ -# -# veos#show running-config | section interface -# interface Ethernet1 -# interface Ethernet2 -# channel group 5 mode on - - -""" - -RETURN = """ -before: - description: The configuration as structured data prior to module invocation. - returned: always - type: list - sample: > - The configuration returned will always be in the same format - of the parameters above. -after: - description: The configuration as structured data after module completion. - returned: when changed - type: list - sample: > - The configuration returned will always be in the same format - of the parameters above. -commands: - description: The set of commands pushed to the remote device. - returned: always - type: list - sample: ['command 1', 'command 2', 'command 3'] -""" - - -from ansible.module_utils.basic import AnsibleModule -from ansible.module_utils.network.eos.argspec.lag_interfaces.lag_interfaces import Lag_interfacesArgs -from ansible.module_utils.network.eos.config.lag_interfaces.lag_interfaces import Lag_interfaces - - -def main(): - """ - Main entry point for module execution - - :returns: the result form module invocation - """ - module = AnsibleModule(argument_spec=Lag_interfacesArgs.argument_spec, - supports_check_mode=True) - - result = Lag_interfaces(module).execute_module() - module.exit_json(**result) - - -if __name__ == '__main__': - main() diff --git a/lib/ansible/modules/network/eos/eos_lldp.py b/lib/ansible/modules/network/eos/eos_lldp.py deleted file mode 100644 index 0b556a1efd..0000000000 --- a/lib/ansible/modules/network/eos/eos_lldp.py +++ /dev/null @@ -1,114 +0,0 @@ -#!/usr/bin/python -# -*- coding: utf-8 -*- - -# (c) 2017, Ansible by Red Hat, inc -# GNU General Public License v3.0+ (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt) - -from __future__ import absolute_import, division, print_function -__metaclass__ = type - - -ANSIBLE_METADATA = {'metadata_version': '1.1', - 'status': ['preview'], - 'supported_by': 'network'} - - -DOCUMENTATION = """ ---- -module: eos_lldp -version_added: "2.5" -author: "Ganesh Nalawade (@ganeshrn)" -short_description: Manage LLDP configuration on Arista EOS network devices -description: - - This module provides declarative management of LLDP service - on Arista EOS network devices. -notes: - - Tested against EOS 4.15 -options: - state: - description: - - State of the LLDP configuration. If value is I(present) lldp will be enabled - else if it is I(absent) it will be disabled. - default: present - choices: ['present', 'absent'] -extends_documentation_fragment: eos -""" - -EXAMPLES = """ -- name: Enable LLDP service - eos_lldp: - state: present - -- name: Disable LLDP service - eos_lldp: - state: absent -""" - -RETURN = """ -commands: - description: The list of configuration mode commands to send to the device - returned: always, except for the platforms that use Netconf transport to manage the device. - type: list - sample: - - lldp run -""" -from ansible.module_utils.basic import AnsibleModule -from ansible.module_utils.network.eos.eos import get_config, load_config -from ansible.module_utils.network.eos.eos import eos_argument_spec - - -def has_lldp(module): - config = get_config(module, flags=['| section lldp']) - - is_lldp_enable = False - if "no lldp run" not in config: - is_lldp_enable = True - - return is_lldp_enable - - -def main(): - """ main entry point for module execution - """ - argument_spec = dict( - state=dict(default='present', - choices=['present', 'absent', - 'enabled', 'disabled']) - ) - - argument_spec.update(eos_argument_spec) - - module = AnsibleModule(argument_spec=argument_spec, - supports_check_mode=True) - - warnings = list() - - result = {'changed': False} - - if warnings: - result['warnings'] = warnings - - HAS_LLDP = has_lldp(module) - - commands = [] - - if module.params['state'] == 'absent' and HAS_LLDP: - commands.append('no lldp run') - elif module.params['state'] == 'present' and not HAS_LLDP: - commands.append('lldp run') - - result['commands'] = commands - - if commands: - commit = not module.check_mode - response = load_config(module, commands, commit=commit) - if response.get('diff') and module._diff: - result['diff'] = {'prepared': response.get('diff')} - result['session_name'] = response.get('session') - result['changed'] = True - - module.exit_json(**result) - - -if __name__ == '__main__': - main() diff --git a/lib/ansible/modules/network/eos/eos_lldp_global.py b/lib/ansible/modules/network/eos/eos_lldp_global.py deleted file mode 100644 index e9799a0cd6..0000000000 --- a/lib/ansible/modules/network/eos/eos_lldp_global.py +++ /dev/null @@ -1,246 +0,0 @@ -#!/usr/bin/python -# -*- coding: utf-8 -*- -# Copyright 2019 Red Hat -# GNU General Public License v3.0+ -# (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt) - -############################################# -# WARNING # -############################################# -# -# This file is auto generated by the resource -# module builder playbook. -# -# Do not edit this file manually. -# -# Changes to this file will be over written -# by the resource module builder. -# -# Changes should be made in the model used to -# generate this file or in the resource module -# builder template. -# -############################################# - -""" -The module file for eos_lldp_global -""" - -from __future__ import absolute_import, division, print_function -__metaclass__ = type - -ANSIBLE_METADATA = { - 'metadata_version': '1.1', - 'status': ['preview'], - 'supported_by': 'network' -} - -DOCUMENTATION = """ ---- -module: eos_lldp_global -version_added: 2.9 -short_description: Manage Global Link Layer Discovery Protocol (LLDP) settings on Arista EOS devices. -description: - - This module manages Global Link Layer Discovery Protocol (LLDP) settings on Arista EOS devices. -author: Nathaniel Case (@Qalthos) -notes: -- Tested against Arista EOS 4.20.10M -- This module works with connection C(network_cli). See the - L(EOS Platform Options,../network/user_guide/platform_eos.html). -options: - config: - description: The provided global LLDP configuration. - type: dict - suboptions: - holdtime: - description: - - Specifies the holdtime (in sec) to be sent in packets. - type: int - reinit: - description: - - Specifies the delay (in sec) for LLDP initialization on any interface. - type: int - timer: - description: - - Specifies the rate at which LLDP packets are sent (in sec). - type: int - tlv_select: - description: - - Specifies the LLDP TLVs to enable or disable. - type: dict - suboptions: - link_aggregation: - description: - - Enable or disable link aggregation TLV. - type: bool - management_address: - description: - - Enable or disable management address TLV. - type: bool - max_frame_size: - description: - - Enable or disable maximum frame size TLV. - type: bool - port_description: - description: - - Enable or disable port description TLV. - type: bool - system_capabilities: - description: - - Enable or disable system capabilities TLV. - type: bool - system_description: - description: - - Enable or disable system description TLV. - type: bool - system_name: - description: - - Enable or disable system name TLV. - type: bool - state: - description: - - The state of the configuration after module completion. - type: str - choices: - - merged - - replaced - - deleted - default: merged -""" -EXAMPLES = """ -# Using merged -# -# ------------ -# Before State -# ------------ -# -# veos# show run | section lldp -# lldp timer 3000 -# lldp holdtime 100 -# lldp reinit 5 -# no lldp tlv-select management-address -# no lldp tlv-select system-description - -- name: Merge provided LLDP configuration with the existing configuration - eos_lldp_global: - config: - holdtime: 100 - tlv_select: - management_address: False - port_description: False - system_description: True - state: merged - -# ----------- -# After state -# ----------- -# -# veos# show run | section lldp -# lldp timer 3000 -# lldp holdtime 100 -# lldp reinit 5 -# no lldp tlv-select management-address -# no lldp tlv-select port-description - - -# Using replaced -# -# ------------ -# Before State -# ------------ -# -# veos# show run | section lldp -# lldp timer 3000 -# lldp holdtime 100 -# lldp reinit 5 -# no lldp tlv-select management-address -# no lldp tlv-select system-description - -- name: Replace existing LLDP device configuration with provided configuration - eos_lldp_global: - config: - holdtime: 100 - tlv_select: - management_address: False - port_description: False - system_description: True - state: replaced - -# ----------- -# After state -# ----------- -# -# veos# show run | section lldp -# lldp holdtime 100 -# no lldp tlv-select management-address -# no lldp tlv-select port-description - - -# Using deleted -# -# ------------ -# Before State -# ------------ -# -# veos# show run | section lldp -# lldp timer 3000 -# lldp holdtime 100 -# lldp reinit 5 -# no lldp tlv-select management-address -# no lldp tlv-select system-description - -- name: Delete existing LLDP configurations from the device - eos_lldp_global: - state: deleted - -# ----------- -# After state -# ----------- -# -# veos# show run | section ^lldp - - -""" -RETURN = """ -before: - description: The configuration as structured data prior to module invocation. - returned: always - type: dict - sample: > - The configuration returned will always be in the same format - of the parameters above. -after: - description: The configuration as structured data after module completion. - returned: when changed - type: dict - sample: > - The configuration returned will always be in the same format - of the parameters above. -commands: - description: The set of commands pushed to the remote device. - returned: always - type: list - sample: ['lldp holdtime 100', 'no lldp timer', 'lldp tlv-select system-description'] -""" - - -from ansible.module_utils.basic import AnsibleModule -from ansible.module_utils.network.eos.argspec.lldp_global.lldp_global import Lldp_globalArgs -from ansible.module_utils.network.eos.config.lldp_global.lldp_global import Lldp_global - - -def main(): - """ - Main entry point for module execution - - :returns: the result form module invocation - """ - module = AnsibleModule(argument_spec=Lldp_globalArgs.argument_spec, - supports_check_mode=True) - - result = Lldp_global(module).execute_module() - module.exit_json(**result) - - -if __name__ == '__main__': - main() diff --git a/lib/ansible/modules/network/eos/eos_lldp_interfaces.py b/lib/ansible/modules/network/eos/eos_lldp_interfaces.py deleted file mode 100644 index 09e3178849..0000000000 --- a/lib/ansible/modules/network/eos/eos_lldp_interfaces.py +++ /dev/null @@ -1,252 +0,0 @@ -#!/usr/bin/python -# -*- coding: utf-8 -*- -# Copyright 2019 Red Hat -# GNU General Public License v3.0+ -# (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt) - -############################################# -# WARNING # -############################################# -# -# This file is auto generated by the resource -# module builder playbook. -# -# Do not edit this file manually. -# -# Changes to this file will be over written -# by the resource module builder. -# -# Changes should be made in the model used to -# generate this file or in the resource module -# builder template. -# -############################################# - -""" -The module file for eos_lldp_interfaces -""" - -from __future__ import absolute_import, division, print_function -__metaclass__ = type - -ANSIBLE_METADATA = { - 'metadata_version': '1.1', - 'status': ['preview'], - 'supported_by': 'network' -} - -DOCUMENTATION = """ ---- -module: eos_lldp_interfaces -version_added: 2.9 -short_description: Manage Link Layer Discovery Protocol (LLDP) attributes of interfaces on Arista EOS devices. -description: - - This module manages Link Layer Discovery Protocol (LLDP) attributes of interfaces on Arista EOS devices. -author: Nathaniel Case (@Qalthos) -notes: -- Tested against Arista EOS 4.20.10M -- This module works with connection C(network_cli). See the - L(EOS Platform Options,../network/user_guide/platform_eos.html). -options: - config: - description: A dictionary of LLDP interfaces options. - type: list - elements: dict - suboptions: - name: - description: - - Full name of the interface (i.e. Ethernet1). - type: str - receive: - description: - - Enable/disable LLDP RX on an interface. - type: bool - transmit: - description: - - Enable/disable LLDP TX on an interface. - type: bool - state: - description: - - The state of the configuration after module completion. - type: str - choices: - - merged - - replaced - - overridden - - deleted - default: merged -""" -EXAMPLES = """ -# Using merged -# -# -# ------------ -# Before state -# ------------ -# -# -# veos#show run | section ^interface -# interface Ethernet1 -# no lldp receive -# interface Ethernet2 -# no lldp transmit - -- name: Merge provided configuration with running configuration - eos_lldp_interfaces: - config: - - name: Ethernet1 - transmit: False - - name: Ethernet2 - transmit: False - state: merged - -# -# ------------ -# After state -# ------------ -# -# veos#show run | section ^interface -# interface Ethernet1 -# no lldp transmit -# no lldp receive -# interface Ethernet2 -# no lldp transmit - - -# Using replaced -# -# -# ------------ -# Before state -# ------------ -# -# -# veos#show run | section ^interface -# interface Ethernet1 -# no lldp receive -# interface Ethernet2 -# no lldp transmit - -- name: Replace existing LLDP configuration of specified interfaces with provided configuration - eos_lldp_interfaces: - config: - - name: Ethernet1 - transmit: False - state: replaced - -# -# ------------ -# After state -# ------------ -# -# veos#show run | section ^interface -# interface Ethernet1 -# no lldp transmit -# interface Ethernet2 -# no lldp transmit - - -# Using overridden -# -# -# ------------ -# Before state -# ------------ -# -# -# veos#show run | section ^interface -# interface Ethernet1 -# no lldp receive -# interface Ethernet2 -# no lldp transmit - -- name: Override the LLDP configuration of all the interfaces with provided configuration - eos_lldp_interfaces: - config: - - name: Ethernet1 - transmit: False - state: overridden - -# -# ------------ -# After state -# ------------ -# -# veos#show run | section ^interface -# interface Ethernet1 -# no lldp transmit -# interface Ethernet2 - - -# Using deleted -# -# -# ------------ -# Before state -# ------------ -# -# -# veos#show run | section ^interface -# interface Ethernet1 -# no lldp receive -# interface Ethernet2 -# no lldp transmit - -- name: Delete LLDP configuration of specified interfaces (or all interfaces if none are specified) - eos_lldp_interfaces: - state: deleted - -# -# ------------ -# After state -# ------------ -# -# veos#show run | section ^interface -# interface Ethernet1 -# interface Ethernet2 - - -""" -RETURN = """ -before: - description: The configuration as structured data prior to module invocation. - returned: always - type: list - sample: > - The configuration returned will always be in the same format - of the parameters above. -after: - description: The configuration as structured data after module completion. - returned: when changed - type: list - sample: > - The configuration returned will always be in the same format - of the parameters above. -commands: - description: The set of commands pushed to the remote device. - returned: always - type: list - sample: ['interface Ethernet1', 'no lldp transmit'] -""" - - -from ansible.module_utils.basic import AnsibleModule -from ansible.module_utils.network.eos.argspec.lldp_interfaces.lldp_interfaces import Lldp_interfacesArgs -from ansible.module_utils.network.eos.config.lldp_interfaces.lldp_interfaces import Lldp_interfaces - - -def main(): - """ - Main entry point for module execution - - :returns: the result form module invocation - """ - module = AnsibleModule(argument_spec=Lldp_interfacesArgs.argument_spec, - supports_check_mode=True) - - result = Lldp_interfaces(module).execute_module() - module.exit_json(**result) - - -if __name__ == '__main__': - main() diff --git a/lib/ansible/modules/network/eos/eos_logging.py b/lib/ansible/modules/network/eos/eos_logging.py deleted file mode 100644 index cdedcf5b01..0000000000 --- a/lib/ansible/modules/network/eos/eos_logging.py +++ /dev/null @@ -1,412 +0,0 @@ -#!/usr/bin/python -# -*- coding: utf-8 -*- - -# Copyright: (c) 2017, Ansible by Red Hat, inc -# GNU General Public License v3.0+ (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt) - - -ANSIBLE_METADATA = {'metadata_version': '1.1', - 'status': ['preview'], - 'supported_by': 'network'} - -DOCUMENTATION = """ ---- -module: eos_logging -version_added: "2.4" -author: "Trishna Guha (@trishnaguha)" -short_description: Manage logging on network devices -description: - - This module provides declarative management of logging - on Arista Eos devices. -notes: - - Tested against EOS 4.15 -options: - dest: - description: - - Destination of the logs. - choices: ['on', 'host', 'console', 'monitor', 'buffered'] - name: - description: - - The hostname or IP address of the destination. - - Required when I(dest=host). - size: - description: - - Size of buffer. The acceptable value is in range from 10 to - 2147483647 bytes. - facility: - description: - - Set logging facility. - level: - description: - - Set logging severity levels. - choices: ['emergencies', 'alerts', 'critical', 'errors', - 'warnings', 'notifications', 'informational', 'debugging'] - aggregate: - description: List of logging definitions. - state: - description: - - State of the logging configuration. - default: present - choices: ['present', 'absent'] -extends_documentation_fragment: eos -""" - -EXAMPLES = """ -- name: configure host logging - eos_logging: - dest: host - name: 172.16.0.1 - state: present - -- name: remove host logging configuration - eos_logging: - dest: host - name: 172.16.0.1 - state: absent - -- name: configure console logging level and facility - eos_logging: - dest: console - facility: local7 - level: debugging - state: present - -- name: enable logging to all - eos_logging: - dest : on - -- name: configure buffer size - eos_logging: - dest: buffered - size: 5000 - -- name: Configure logging using aggregate - eos_logging: - aggregate: - - { dest: console, level: warnings } - - { dest: buffered, size: 480000 } - state: present -""" - -RETURN = """ -commands: - description: The list of configuration mode commands to send to the device - returned: always - type: list - sample: - - logging facility local7 - - logging host 172.16.0.1 -""" - -import re - - -from copy import deepcopy -from ansible.module_utils.basic import AnsibleModule -from ansible.module_utils.network.common.utils import remove_default_spec -from ansible.module_utils.network.eos.eos import get_config, load_config -from ansible.module_utils.network.eos.eos import eos_argument_spec - - -DEST_GROUP = ['on', 'host', 'console', 'monitor', 'buffered'] -LEVEL_GROUP = ['emergencies', 'alerts', 'critical', 'errors', - 'warnings', 'notifications', 'informational', - 'debugging'] - - -def validate_size(value, module): - if value: - if not int(10) <= value <= int(2147483647): - module.fail_json(msg='size must be between 10 and 2147483647') - else: - return value - - -def map_obj_to_commands(updates, module): - commands = list() - want, have = updates - - for w in want: - dest = w['dest'] - name = w['name'] - size = w['size'] - facility = w['facility'] - level = w['level'] - state = w['state'] - del w['state'] - - if state == 'absent' and w in have: - if dest: - if dest == 'host': - commands.append('no logging host {0}'.format(name)) - - elif dest in DEST_GROUP: - commands.append('no logging {0}'.format(dest)) - - else: - module.fail_json(msg='dest must be among console, monitor, buffered, host, on') - - if facility: - commands.append('no logging facility {0}'.format(facility)) - - if state == 'present' and w not in have: - if facility: - present = False - - # Iterate over every dictionary in the 'have' list to check if - # similar configuration for facility exists or not - - for entry in have: - if not entry['dest'] and entry['facility'] == facility: - present = True - - if not present: - commands.append('logging facility {0}'.format(facility)) - - if dest == 'host': - commands.append('logging host {0}'.format(name)) - - elif dest == 'on': - commands.append('logging on') - - elif dest == 'buffered' and size: - - present = False - - # Deals with the following two cases: - # Case 1: logging buffered - # logging buffered - # - # Case 2: Same buffered logging configuration - # already exists (i.e., both size & - # level are same) - - for entry in have: - if entry['dest'] == 'buffered' and entry['size'] == size: - - if not level or entry['level'] == level: - present = True - - if not present: - if size and level: - commands.append('logging buffered {0} {1}'.format(size, level)) - else: - commands.append('logging buffered {0}'.format(size)) - - else: - if dest: - dest_cmd = 'logging {0}'.format(dest) - if level: - dest_cmd += ' {0}'.format(level) - - commands.append(dest_cmd) - return commands - - -def parse_facility(line): - facility = None - match = re.search(r'logging facility (\S+)', line, re.M) - if match: - facility = match.group(1) - - return facility - - -def parse_size(line, dest): - size = None - - if dest == 'buffered': - match = re.search(r'logging buffered (\S+)', line, re.M) - if match: - try: - int_size = int(match.group(1)) - except ValueError: - int_size = None - - if int_size: - if isinstance(int_size, int): - size = str(match.group(1)) - else: - size = str(10) - - return size - - -def parse_name(line, dest): - name = None - if dest == 'host': - match = re.search(r'logging host (\S+)', line, re.M) - if match: - name = match.group(1) - - return name - - -def parse_level(line, dest): - level = None - - if dest != 'host': - - # Line for buffer logging entry in running-config is of the form: - # logging buffered - - if dest == 'buffered': - match = re.search(r'logging buffered (?:\d+) (\S+)', line, re.M) - - else: - match = re.search(r'logging {0} (\S+)'.format(dest), line, re.M) - - if match: - if match.group(1) in LEVEL_GROUP: - level = match.group(1) - - return level - - -def map_config_to_obj(module): - obj = [] - - data = get_config(module, flags=['section logging']) - - for line in data.split('\n'): - - match = re.search(r'logging (\S+)', line, re.M) - - if match: - if match.group(1) in DEST_GROUP: - dest = match.group(1) - - else: - dest = None - - obj.append({'dest': dest, - 'name': parse_name(line, dest), - 'size': parse_size(line, dest), - 'facility': parse_facility(line), - 'level': parse_level(line, dest)}) - - return obj - - -def parse_obj(obj, module): - if module.params['size'] is None: - obj.append({ - 'dest': module.params['dest'], - 'name': module.params['name'], - 'size': module.params['size'], - 'facility': module.params['facility'], - 'level': module.params['level'], - 'state': module.params['state'] - }) - - else: - obj.append({ - 'dest': module.params['dest'], - 'name': module.params['name'], - 'size': str(validate_size(module.params['size'], module)), - 'facility': module.params['facility'], - 'level': module.params['level'], - 'state': module.params['state'] - }) - - return obj - - -def map_params_to_obj(module, required_if=None): - obj = [] - aggregate = module.params.get('aggregate') - if aggregate: - for item in aggregate: - for key in item: - if item.get(key) is None: - item[key] = module.params[key] - - module._check_required_if(required_if, item) - d = item.copy() - - if d['dest'] != 'host': - d['name'] = None - - if d['dest'] == 'buffered': - if 'size' in d: - d['size'] = str(validate_size(d['size'], module)) - elif 'size' not in d: - d['size'] = str(10) - else: - pass - - if d['dest'] != 'buffered': - d['size'] = None - - obj.append(d) - - else: - if module.params['dest'] != 'host': - module.params['name'] = None - - if module.params['dest'] == 'buffered': - if not module.params['size']: - module.params['size'] = str(10) - else: - module.params['size'] = None - - parse_obj(obj, module) - - return obj - - -def main(): - """ main entry point for module execution - """ - element_spec = dict( - dest=dict(choices=DEST_GROUP), - name=dict(), - size=dict(type='int'), - facility=dict(), - level=dict(choices=LEVEL_GROUP), - state=dict(default='present', choices=['present', 'absent']), - ) - - aggregate_spec = deepcopy(element_spec) - - # remove default in aggregate spec, to handle common arguments - remove_default_spec(aggregate_spec) - - argument_spec = dict( - aggregate=dict(type='list', elements='dict', options=aggregate_spec), - ) - - argument_spec.update(element_spec) - argument_spec.update(eos_argument_spec) - - required_if = [('dest', 'host', ['name'])] - - module = AnsibleModule(argument_spec=argument_spec, - required_if=required_if, - supports_check_mode=True) - - warnings = list() - - result = {'changed': False} - if warnings: - result['warnings'] = warnings - - have = map_config_to_obj(module) - want = map_params_to_obj(module, required_if=required_if) - - commands = map_obj_to_commands((want, have), module) - result['commands'] = commands - - if commands: - commit = not module.check_mode - response = load_config(module, commands, commit=commit) - if response.get('diff') and module._diff: - result['diff'] = {'prepared': response.get('diff')} - result['session_name'] = response.get('session') - result['changed'] = True - - module.exit_json(**result) - - -if __name__ == '__main__': - main() diff --git a/lib/ansible/modules/network/eos/eos_static_routes.py b/lib/ansible/modules/network/eos/eos_static_routes.py deleted file mode 100644 index c04491beb8..0000000000 --- a/lib/ansible/modules/network/eos/eos_static_routes.py +++ /dev/null @@ -1,1444 +0,0 @@ -#!/usr/bin/python -# -*- coding: utf-8 -*- -# Copyright 2019 Red Hat -# GNU General Public License v3.0+ -# (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt) - -############################################# -# WARNING # -############################################# -# -# This file is auto generated by the resource -# module builder playbook. -# -# Do not edit this file manually. -# -# Changes to this file will be over written -# by the resource module builder. -# -# Changes should be made in the model used to -# generate this file or in the resource module -# builder template. -# -############################################# - -""" -The module file for eos_static_routes -""" - -from __future__ import absolute_import, division, print_function -__metaclass__ = type - -ANSIBLE_METADATA = { - 'metadata_version': '1.1', - 'status': ['preview'], - 'supported_by': 'network' -} - -DOCUMENTATION = """ ---- -module: eos_static_routes -version_added: "2.10" -short_description: Configures and manages attributes of static routes on Arista EOS platforms. -description: This module configures and manages the attributes of static routes on Arista EOS platforms. -author: Gomathi Selvi Srinivasan (@GomathiselviS) -notes: -- Tested against Arista EOS 4.20.10M -- This module works with connection C(network_cli). See the - L(EOS Platform Options,../network/user_guide/platform_eos.html). -options: - config: - description: - - A list of configurations for static routes. - type: list - elements: dict - suboptions: - vrf: - description: - - The VRF to which the static route(s) belong. - type: str - address_families: - description: A dictionary specifying the address family to which the static route(s) belong. - type: list - elements: dict - suboptions: - afi: - description: - - Specifies the top level address family indicator. - type: str - choices: ['ipv4', 'ipv6'] - required: True - routes: - description: A dictionary that specifies the static route configurations. - elements: dict - type: list - suboptions: - dest: - description: - - Destination IPv4 subnet (CIDR or address-mask notation). - - The address format is / or . - - The mask is number in range 0-32 for IPv4 and in range 0-128 for IPv6. - type: str - required: True - next_hops: - description: - - Details of route to be taken. - type: list - elements: dict - suboptions: - forward_router_address: - description: - - Forwarding router's address on destination interface. - type: str - interface: - description: - - Outgoing interface to take. For anything except 'null0', then next hop IP address should also be configured. - - IP address of the next hop router or - - null0 Null0 interface or - - ethernet e_num Ethernet interface or - - loopback l_num Loopback interface or - - management m_num Management interface or - - port-channel p_num - - vlan v_num - - vxlan vx_num - - Nexthop-Group Specify nexthop group name - - Tunnel Tunnel interface - - vtep Configure VXLAN Tunnel End Points - type: str - nexthop_grp: - description: - - Nexthop group - type: str - admin_distance: - description: - - Preference or administrative distance of route (range 1-255). - type: int - description: - description: - - Name of the static route. - type: str - tag: - description: - - Route tag value (ranges from 0 to 4294967295). - type: int - track: - description: - - Track value (range 1 - 512). Track must already be configured on the device before adding the route. - type: str - mpls_label: - description: - - MPLS label - type: int - vrf: - description: - - VRF of the destination. - type: str - running_config: - description: - - The module, by default, will connect to the remote device and - retrieve the current running-config to use as a base for comparing - against the contents of source. There are times when it is not - desirable to have the task get the current running-config for - every task in a playbook. The I(running_config) argument allows the - implementer to pass in the configuration to use as the base - config for comparison. This value of this option should be the - output received from device by executing command - version_added: "2.10" - type: str - state: - description: - - The state the configuration should be left in. - type: str - choices: - ['deleted', 'merged', 'overridden', 'replaced', 'gathered', 'rendered', 'parsed'] - default: - merged -""" -EXAMPLES = """ -# Using deleted - -# Various scenarios for delete operations: - -# Before state: -# ------------ -# veos(config)#show running-config | grep route -# ip route 10.2.2.0/24 Ethernet1 -# ip route 10.2.2.0/24 64.1.1.1 label 17 33 -# ip route 33.33.33.0/24 Nexthop-Group testgrp -# ip route vrf testvrf 22.65.1.0/24 Null0 90 name testroute -# ipv6 route 5222:5::/64 Management1 4312:100::1 -# ipv6 route vrf testvrf 2222:6::/64 Management1 4312:100::1 -# ipv6 route vrf testvrf 2222:6::/64 Ethernet1 55 -# ipv6 route vrf testvrf 2222:6::/64 Null0 90 name testroute1 -# veos(config)# - -- name: Delete nexthop - eos_static_routes: - config: - - address_families: - - afi: ipv4 - routes: - - dest: 10.2.2.0/24 - next_hops: - - interface: 64.1.1.1 - mpls_label: 17 - admin_distance: 33 - - dest: "33.33.33.0 255.255.255.0" - next_hops: - - interface: 'Nexthop-Group testgrp' - state: "deleted" - -# "after": [ -# { -# "address_families": [ -# { -# "afi": "ipv4", -# "routes": [ -# { -# "dest": "10.2.2.0/24", -# "next_hops": [ -# { -# "interface": "Ethernet1" -# } -# ] -# } -# ] -# }, -# { -# "afi": "ipv6", -# "routes": [ -# { -# "dest": "5222:5::/64", -# "next_hops": [ -# { -# "forward_router_address": "4312:100::1", -# "interface": "Management1" -# } -# ] -# } -# ] -# } -# ] -# }, -# { -# "address_families": [ -# { -# "afi": "ipv4", -# "routes": [ -# { -# "dest": "22.65.1.0/24", -# "next_hops": [ -# { -# "admin_distance": 90, -# "description": "testroute", -# "interface": "Null0" -# } -# ] -# } -# ] -# }, -# { -# "afi": "ipv6", -# "routes": [ -# { -# "dest": "2222:6::/64", -# "next_hops": [ -# { -# "forward_router_address": "4312:100::1", -# "interface": "Management1" -# }, -# { -# "admin_distance": 55, -# "interface": "Ethernet1" -# }, -# { -# "admin_distance": 90, -# "description": "testroute1", -# "interface": "Null0" -# } -# ] -# } -# ] -# } -# ], -# "vrf": "testvrf" -# } -# ], -# "before": [ -# { -# "address_families": [ -# { -# "afi": "ipv4", -# "routes": [ -# { -# "dest": "10.2.2.0/24", -# "next_hops": [ -# { -# "interface": "Ethernet1" -# }, -# { -# "admin_distance": 33, -# "interface": "64.1.1.1", -# "mpls_label": 17 -# } -# ] -# }, -# { -# "dest": "33.33.33.0/24", -# "next_hops": [ -# { -# "nexthop_grp": "testgrp" -# } -# ] -# } -# ] -# }, -# { -# "afi": "ipv6", -# "routes": [ -# { -# "dest": "5222:5::/64", -# "next_hops": [ -# { -# "forward_router_address": "4312:100::1", -# "interface": "Management1" -# } -# ] -# } -# ] -# } -# ] -# }, -# { -# "address_families": [ -# { -# "afi": "ipv4", -# "routes": [ -# { -# "dest": "22.65.1.0/24", -# "next_hops": [ -# { -# "admin_distance": 90, -# "description": "testroute", -# "interface": "Null0" -# } -# ] -# } -# ] -# }, -# { -# "afi": "ipv6", -# "routes": [ -# { -# "dest": "2222:6::/64", -# "next_hops": [ -# { -# "forward_router_address": "4312:100::1", -# "interface": "Management1" -# }, -# { -# "admin_distance": 55, -# "interface": "Ethernet1" -# }, -# { -# "admin_distance": 90, -# "description": "testroute1", -# "interface": "Null0" -# } -# ] -# } -# ] -# } -# ], -# "vrf": "testvrf" -# } -# ], -# "changed": true, -# "commands": [ -# "no ip route 10.2.2.0/24 64.1.1.1 label 17 33", -# "no ip route 33.33.33.0/24 Nexthop-Group testgrp" -# ] - - -# After State -# ----------- - -# veos(config)#show running-config | grep route -# ip route 10.2.2.0/24 Ethernet1 -# ip route vrf testvrf 22.65.1.0/24 Null0 90 name testroute -# ipv6 route 5222:5::/64 Management1 4312:100::1 -# ipv6 route vrf testvrf 2222:6::/64 Management1 4312:100::1 -# ipv6 route vrf testvrf 2222:6::/64 Ethernet1 55 -# ipv6 route vrf testvrf 2222:6::/64 Null0 90 name testroute1 -# veos(config)# - - -# Before State -# ____________ - -# veos(config)#show running-config | grep route -# ip route 10.2.2.0/24 Ethernet1 -# ip route vrf testvrf 22.65.1.0/24 Null0 90 name testroute -# ipv6 route 5222:5::/64 Management1 4312:100::1 -# ipv6 route vrf testvrf 2222:6::/64 Management1 4312:100::1 -# ipv6 route vrf testvrf 2222:6::/64 Ethernet1 55 -# ipv6 route vrf testvrf 2222:6::/64 Null0 90 name testroute1 -# veos(config)# - -- name: Delete route - eos_static_routes: - config: - - address_families: - - afi: ipv4 - routes: - - dest: 10.2.2.0/24 - state: "deleted" - -# "after": [ -# { -# "address_families": [ -# { -# "afi": "ipv6", -# "routes": [ -# { -# "dest": "5222:5::/64", -# "next_hops": [ -# { -# "forward_router_address": "4312:100::1", -# "interface": "Management1" -# } -# ] -# } -# ] -# } -# ] -# }, -# { -# "address_families": [ -# { -# "afi": "ipv4", -# "routes": [ -# { -# "dest": "22.65.1.0/24", -# "next_hops": [ -# { -# "admin_distance": 90, -# "description": "testroute", -# "interface": "Null0" -# } -# ] -# } -# ] -# }, -# { -# "afi": "ipv6", -# "routes": [ -# { -# "dest": "2222:6::/64", -# "next_hops": [ -# { -# "forward_router_address": "4312:100::1", -# "interface": "Management1" -# }, -# { -# "admin_distance": 55, -# "interface": "Ethernet1" -# }, -# { -# "admin_distance": 90, -# "description": "testroute1", -# "interface": "Null0" -# } -# ] -# } -# ] -# } -# ], -# "vrf": "testvrf" -# } -# ], -# "before": [ -# { -# "address_families": [ -# { -# "afi": "ipv4", -# "routes": [ -# { -# "dest": "10.2.2.0/24", -# "next_hops": [ -# { -# "interface": "Ethernet1" -# } -# ] -# } -# ] -# }, -# { -# "afi": "ipv6", -# "routes": [ -# { -# "dest": "5222:5::/64", -# "next_hops": [ -# { -# "forward_router_address": "4312:100::1", -# "interface": "Management1" -# } -# ] -# } -# ] -# } -# ] -# }, -# { -# "address_families": [ -# { -# "afi": "ipv4", -# "routes": [ -# { -# "dest": "22.65.1.0/24", -# "next_hops": [ -# { -# "admin_distance": 90, -# "description": "testroute", -# "interface": "Null0" -# } -# ] -# } -# ] -# }, -# { -# "afi": "ipv6", -# "routes": [ -# { -# "dest": "2222:6::/64", -# "next_hops": [ -# { -# "forward_router_address": "4312:100::1", -# "interface": "Management1" -# }, -# { -# "admin_distance": 55, -# "interface": "Ethernet1" -# }, -# { -# "admin_distance": 90, -# "description": "testroute1", -# "interface": "Null0" -# } -# ] -# } -# ] -# } -# ], -# "vrf": "testvrf" -# } -# ], -# "changed": true, -# "commands": [ -# "no ip route 10.2.2.0/24 Ethernet1" -# ] - -# After State -# ----------- -# veos(config)#show running-config | grep route -# ip route vrf testvrf 22.65.1.0/24 Null0 90 name testroute -# ipv6 route 5222:5::/64 Management1 4312:100::1 -# ipv6 route vrf testvrf 2222:6::/64 Management1 4312:100::1 -# ipv6 route vrf testvrf 2222:6::/64 Ethernet1 55 -# ipv6 route vrf testvrf 2222:6::/64 Null0 90 name testroute1 -# veos(config)# - - -# Before State: -# ------------ - -# veos(config)#show running-config | grep route -# ip route vrf testvrf 22.65.1.0/24 Null0 90 name testroute -# ipv6 route 5222:5::/64 Management1 4312:100::1 -# ipv6 route vrf testvrf 2222:6::/64 Management1 4312:100::1 -# ipv6 route vrf testvrf 2222:6::/64 Ethernet1 55 -# ipv6 route vrf testvrf 2222:6::/64 Null0 90 name testroute1 -# veos(config)# - -- name: Delete afi - eos_static_routes: - config: - - vrf: "testvrf" - address_families: - - afi: "ipv4" - state: "deleted" - -# "after": [ -# { -# "address_families": [ -# { -# "afi": "ipv6", -# "routes": [ -# { -# "dest": "5222:5::/64", -# "next_hops": [ -# { -# "forward_router_address": "4312:100::1", -# "interface": "Management1" -# } -# ] -# } -# ] -# } -# ] -# }, -# { -# "address_families": [ -# { -# "afi": "ipv6", -# "routes": [ -# { -# "dest": "2222:6::/64", -# "next_hops": [ -# { -# "forward_router_address": "4312:100::1", -# "interface": "Management1" -# }, -# { -# "admin_distance": 55, -# "interface": "Ethernet1" -# }, -# { -# "admin_distance": 90, -# "description": "testroute1", -# "interface": "Null0" -# } -# ] -# } -# ] -# } -# ], -# "vrf": "testvrf" -# } -# ], -# "before": [ -# { -# "address_families": [ -# { -# "afi": "ipv6", -# "routes": [ -# { -# "dest": "5222:5::/64", -# "next_hops": [ -# { -# "forward_router_address": "4312:100::1", -# "interface": "Management1" -# } -# ] -# } -# ] -# } -# ] -# }, -# { -# "address_families": [ -# { -# "afi": "ipv4", -# "routes": [ -# { -# "dest": "22.65.1.0/24", -# "next_hops": [ -# { -# "admin_distance": 90, -# "description": "testroute", -# "interface": "Null0" -# } -# ] -# } -# ] -# }, -# { -# "afi": "ipv6", -# "routes": [ -# { -# "dest": "2222:6::/64", -# "next_hops": [ -# { -# "forward_router_address": "4312:100::1", -# "interface": "Management1" -# }, -# { -# "admin_distance": 55, -# "interface": "Ethernet1" -# }, -# { -# "admin_distance": 90, -# "description": "testroute1", -# "interface": "Null0" -# } -# ] -# } -# ] -# } -# ], -# "vrf": "testvrf" -# } -# ], -# "changed": true, -# "commands": [ -# "no ip route vrf testvrf 22.65.1.0/24 Null0 90 name testroute" -# ], - -# After State -# ___________ - -# veos(config)#show running-config | grep route -# ipv6 route 5222:5::/64 Management1 4312:100::1 -# ipv6 route vrf testvrf 2222:6::/64 Management1 4312:100::1 -# ipv6 route vrf testvrf 2222:6::/64 Ethernet1 55 -# ipv6 route vrf testvrf 2222:6::/64 Null0 90 name testroute1 - -# Before State -#------------- - -# veos(config)#show running-config | grep route -# ipv6 route 5222:5::/64 Management1 4312:100::1 -# ipv6 route vrf testvrf 2222:6::/64 Management1 4312:100::1 -# ipv6 route vrf testvrf 2222:6::/64 Ethernet1 55 -# ipv6 route vrf testvrf 2222:6::/64 Null0 90 name testroute1 - -- name: Delete vrf - eos_static_routes: - config: - - vrf: testvrf - state: "deleted" - -# "after": [ -# { -# "address_families": [ -# { -# "afi": "ipv6", -# "routes": [ -# { -# "dest": "5222:5::/64", -# "next_hops": [ -# { -# "forward_router_address": "4312:100::1", -# "interface": "Management1" -# } -# ] -# } -# ] -# } -# ] -# } -# ], -# "before": [ -# { -# "address_families": [ -# { -# "afi": "ipv6", -# "routes": [ -# { -# "dest": "5222:5::/64", -# "next_hops": [ -# { -# "forward_router_address": "4312:100::1", -# "interface": "Management1" -# } -# ] -# } -# ] -# } -# ] -# }, -# { -# "address_families": [ -# { -# "afi": "ipv6", -# "routes": [ -# { -# "dest": "2222:6::/64", -# "next_hops": [ -# { -# "forward_router_address": "4312:100::1", -# "interface": "Management1" -# }, -# { -# "admin_distance": 55, -# "interface": "Ethernet1" -# }, -# { -# "admin_distance": 90, -# "description": "testroute1", -# "interface": "Null0" -# } -# ] -# } -# ] -# } -# ], -# "vrf": "testvrf" -# } -# ], -# "changed": true, -# "commands": [ -# "no ipv6 route vrf testvrf 2222:6::/64 Management1 4312:100::1", -# "no ipv6 route vrf testvrf 2222:6::/64 Ethernet1 55", -# "no ipv6 route vrf testvrf 2222:6::/64 Null0 90 name testroute1" -# ] -# -# After State: -# ----------- - -# veos(config)#show running-config | grep route -# ipv6 route 5222:5::/64 Management1 4312:100::1 -# veos(config)# - - -# -# Using merged - -# Before : [ -# { -# "address_families": [ -# { -# "afi": "ipv4", -# "routes": [ -# { -# "dest": "165.10.1.0/24", -# "next_hops": [ -# { -# "admin_distance": 100, -# "interface": "Ethernet1" -# } -# ] -# }, -# { -# "dest": "172.17.252.0/24", -# "next_hops": [ -# { -# "nexthop_grp": "testgroup" -# } -# ] -# } -# ] -# }, -# { -# "afi": "ipv6", -# "routes": [ -# { -# "dest": "5001::/64", -# "next_hops": [ -# { -# "admin_distance": 50, -# "interface": "Ethernet1" -# } -# ] -# } -# ] -# } -# ] -# }, -# { -# "address_families": [ -# { -# "afi": "ipv4", -# "routes": [ -# { -# "dest": "130.1.122.0/24", -# "next_hops": [ -# { -# "interface": "Ethernet1", -# "tag": 50 -# } -# ] -# } -# ] -# } -# ], -# "vrf": "testvrf" -# } -# ] -# -# Before State -# ------------- -# veos(config)#show running-config | grep "route" -# ip route 165.10.1.0/24 Ethernet1 100 -# ip route 172.17.252.0/24 Nexthop-Group testgroup -# ip route vrf testvrf 130.1.122.0/24 Ethernet1 tag 50 -# ipv6 route 5001::/64 Ethernet1 50 -# veos(config)# - -- name: Merge new static route configuration - eos_static_routes: - config: - - vrf: testvrf - address_families: - - afi: ipv6 - routes: - - dest: 2211::0/64 - next_hop: - - forward_router_address: 100:1::2 - interface: "Ethernet1" - state: merged - -# After State -# ----------- - -#After [ -# { -# "address_families": [ -# { -# "afi": "ipv4", -# "routes": [ -# { -# "dest": "165.10.1.0/24", -# "next_hops": [ -# { -# "admin_distance": 100, -# "interface": "Ethernet1" -# } -# ] -# }, -# { -# "dest": "172.17.252.0/24", -# "next_hops": [ -# { -# "nexthop_grp": "testgroup" -# } -# ] -# } -# ] -# }, -# { -# "afi": "ipv6", -# "routes": [ -# { -# "dest": "5001::/64", -# "next_hops": [ -# { -# "admin_distance": 50, -# "interface": "Ethernet1" -# } -# ] -# } -# ] -# } -# ] -# }, -# { -# "address_families": [ -# { -# "afi": "ipv4", -# "routes": [ -# { -# "dest": "130.1.122.0/24", -# "next_hops": [ -# { -# "interface": "Ethernet1", -# "tag": 50 -# } -# ] -# } -# ] -# }, -# { -# "afi": "ipv6", -# "routes": [ -# { -# "dest": "2211::0/64", -# "next_hops": [ -# { -# "aforward_router_address": 100:1::2 -# "interface": "Ethernet1" -# } -# ] -# } -# ] -# } - -# ], -# "vrf": "testvrf" -# } -# ] -# -# veos(config)#show running-config | grep "route" -# ip route 165.10.1.0/24 Ethernet1 100 -# ip route 172.17.252.0/24 Nexthop-Group testgroup -# ip route vrf testvrf 130.1.122.0/24 Ethernet1 tag 50 -# ipv6 route 2211::/64 Ethernet1 100:1::2 -# ipv6 route 5001::/64 Ethernet1 50 -# veos(config)# - - -# Using overridden - - -# Before State -# ------------- - -# "before": [ -# { -# "address_families": [ -# { -# "afi": "ipv4", -# "routes": [ -# { -# "dest": "165.10.1.0/24", -# "next_hops": [ -# { -# "admin_distance": 100, -# "interface": "Ethernet1" -# } -# ] -# }, -# { -# "dest": "172.17.252.0/24", -# "next_hops": [ -# { -# "nexthop_grp": "testgroup" -# } -# ] -# } -# ] -# }, -# { -# "afi": "ipv6", -# "routes": [ -# { -# "dest": "5001::/64", -# "next_hops": [ -# { -# "admin_distance": 50, -# "interface": "Ethernet1" -# } -# ] -# } -# ] -# } -# ] -# }, -# { -# "address_families": [ -# { -# "afi": "ipv4", -# "routes": [ -# { -# "dest": "130.1.122.0/24", -# "next_hops": [ -# { -# "interface": "Ethernet1", -# "tag": 50 -# } -# ] -# } -# ] -# } -# ], -# "vrf": "testvrf" -# } -# ] -# veos(config)#show running-config | grep "route" -# ip route 165.10.1.0/24 Ethernet1 100 -# ip route 172.17.252.0/24 Nexthop-Group testgroup -# ip route vrf testvrf 130.1.122.0/24 Ethernet1 tag 50 -# ipv6 route 5001::/64 Ethernet1 50 -# veos(config)# - -- name: Overridden static route configuration - eos_static_routes: - config: - - address_families: - - afi: ipv4 - routes: - - dest: 10.2.2.0/24 - next_hop: - - interface: "Ethernet1" - state: replaced - -# After State -# ----------- - -# "after": [ -# { -# "address_families": [ -# { -# "afi": "ipv4", -# "routes": [ -# { -# "dest": "10.2.2.0/24", -# "next_hops": [ -# { -# "interface": "Ethernet1" -# } -# ] -# } -# ] -# } -# ] -# } -# ] -# veos(config)#show running-config | grep "route" -# ip route 10.2.2.0/24 Ethernet1 -# veos(config)# - - -# Using replaced - -# Before State -# ------------- - -# ip route 10.2.2.0/24 Ethernet1 -# ip route 10.2.2.0/24 64.1.1.1 label 17 33 -# ip route 33.33.33.0/24 Nexthop-Group testgrp -# ip route vrf testvrf 22.65.1.0/24 Null0 90 name testroute -# ipv6 route 5222:5::/64 Management1 4312:100::1 -# ipv6 route vrf testvrf 2222:6::/64 Management1 4312:100::1 -# ipv6 route vrf testvrf 2222:6::/64 Ethernet1 55 -# ipv6 route vrf testvrf 2222:6::/64 Null0 90 name testroute1 - -# [ -# { -# "address_families": [ -# { -# "afi": "ipv4", -# "routes": [ -# { -# "dest": "10.2.2.0/24", -# "next_hops": [ -# { -# "interface": "Ethernet1" -# }, -# { -# "admin_distance": 33, -# "interface": "64.1.1.1", -# "mpls_label": 17 -# } -# ] -# }, -# { -# "dest": "33.33.33.0/24", -# "next_hops": [ -# { -# "nexthop_grp": "testgrp" -# } -# ] -# } -# ] -# }, -# { -# "afi": "ipv6", -# "routes": [ -# { -# "dest": "5222:5::/64", -# "next_hops": [ -# { -# "forward_router_address": "4312:100::1", -# "interface": "Management1" -# } -# ] -# } -# ] -# } -# ] -# }, -# { -# "address_families": [ -# { -# "afi": "ipv4", -# "routes": [ -# { -# "dest": "22.65.1.0/24", -# "next_hops": [ -# { -# "admin_distance": 90, -# "description": "testroute", -# "interface": "Null0" -# } -# ] -# } -# ] -# }, -# { -# "afi": "ipv6", -# "routes": [ -# { -# "dest": "2222:6::/64", -# "next_hops": [ -# { -# "forward_router_address": "4312:100::1", -# "interface": "Management1" -# }, -# { -# "admin_distance": 90, -# "description": "testroute1", -# "interface": "Null0" -# } -# ] -# } -# ] -# } -# ], -# "vrf": "testvrf" -# } -# ] - -- name: Replace nexthop - eos_static_routes: - config: - - vrf: testvrf - address_families: - - afi: ipv6 - routes: - - dest: 2222:6::/64 - next_hops: - - admin_distance: 55 - interface: "Ethernet1" - state: "replaced" - -# After State -# ----------- - -# veos(config)#show running-config | grep route -# ip route 10.2.2.0/24 Ethernet1 -# ip route 10.2.2.0/24 64.1.1.1 label 17 33 -# ip route 33.33.33.0/24 Nexthop-Group testgrp -# ip route vrf testvrf 22.65.1.0/24 Null0 90 name testroute -# ipv6 route 5222:5::/64 Management1 4312:100::1 -# ipv6 route vrf testvrf 2222:6::/64 Ethernet1 55 - -# "after": [ -# { -# "address_families": [ -# { -# "afi": "ipv4", -# "routes": [ -# { -# "dest": "10.2.2.0/24", -# "next_hops": [ -# { -# "interface": "Ethernet1" -# }, -# { -# "admin_distance": 33, -# "interface": "64.1.1.1", -# "mpls_label": 17 -# } -# ] -# }, -# { -# "dest": "33.33.33.0/24", -# "next_hops": [ -# { -# "nexthop_grp": "testgrp" -# } -# ] -# } -# ] -# }, -# { -# "afi": "ipv6", -# "routes": [ -# { -# "dest": "5222:5::/64", -# "next_hops": [ -# { -# "forward_router_address": "4312:100::1", -# "interface": "Management1" -# } -# ] -# } -# ] -# } -# ] -# }, -# { -# "address_families": [ -# { -# "afi": "ipv4", -# "routes": [ -# { -# "dest": "22.65.1.0/24", -# "next_hops": [ -# { -# "admin_distance": 90, -# "description": "testroute", -# "interface": "Null0" -# } -# ] -# } -# ] -# }, -# { -# "afi": "ipv6", -# "routes": [ -# { -# "dest": "2222:6::/64", -# "next_hops": [ -# { -# "admin_distance": 55, -# "interface": "Ethernet1" -# } -# ] -# } -# ] -# } -# ], -# "vrf": "testvrf" -# } -# ] - -# Before State -# ------------- -# veos(config)#show running-config | grep "route" -# ip route 165.10.1.0/24 Ethernet1 10.1.1.2 100 -# ipv6 route 5001::/64 Ethernet1 -# veos(config)# - - -- name: Gather the exisitng condiguration - eos_static_routes: - state: gathered - -# returns : -# eos_static_routes: -# config: -# - address_families: -# - afi: ipv4 -# routes: -# - dest: 165.10.1.0/24 -# next_hop: -# - forward_router_address: 10.1.1.2 -# interface: "Ethernet1" -# admin_distance: 100 -# - afi: ipv6 -# routes: -# - dest: 5001::/64 -# next_hop: -# - interface: "Ethernet1" - - -# Using rendered - -# eos_static_routes: -# config: -# - address_families: -# - afi: ipv4 -# routes: -# - dest: 165.10.1.0/24 -# next_hop: -# - forward_router_address: 10.1.1.2 -# interface: "Ethernet1" -# admin_distance: 100 -# - afi: ipv6 -# routes: -# - dest: 5001::/64 -# next_hop: -# - interface: "Ethernet1" - -# returns: - -# ip route 165.10.1.0/24 Ethernet1 10.1.1.2 100 -# ipv6 route 5001::/64 Ethernet1 - - -""" -RETURN = """ -before: - description: The configuration prior to the model invocation. - returned: always - type: list - sample: > - The configuration returned will always be in the same format - of the parameters above. -after: - description: The resulting configuration model invocation. - returned: when changed - type: list - sample: > - The configuration returned will always be in the same format - of the parameters above. -commands: - description: The set of commands pushed to the remote device. - returned: always - type: list - sample: - - ip route vrf vrf1 192.2.2.0/24 125.2.3.1 93 -rendered: - description: The set of CLI commands generated from the value in C(config) option - returned: When C(state) is I(rendered) - type: list - sample: > - "address_families": [ - { - "afi": "ipv4", - "routes": [ - { - "dest": "192.2.2.0/24", - "next_hops": [ - { - "admin_distance": 93, - "description": null, - "forward_router_address": null, - "interface": "125.2.3.1", - "mpls_label": null, - "nexthop_grp": null, - "tag": null, - "track": null, - "vrf": null - } - ] - } - ] - } - ], - "vrf": "vrf1" - } - ], - "running_config": null, - "state": "rendered" - } -gathered: - description: The configuration as structured data transformed for the running configuration - fetched from remote host - returned: When C(state) is I(gathered) - type: list - sample: > - The configuration returned will always be in the same format - of the parameters above. -parsed: - description: The configuration as structured data transformed for the value of - C(running_config) option - returned: When C(state) is I(parsed) - type: list - sample: > - The configuration returned will always be in the same format - of the parameters above. -""" - - -from ansible.module_utils.basic import AnsibleModule -from ansible.module_utils.network.eos.argspec.static_routes.static_routes import Static_routesArgs -from ansible.module_utils.network.eos.config.static_routes.static_routes import Static_routes - - -def main(): - """ - Main entry point for module execution - - :returns: the result form module invocation - """ - - required_if = [('state', 'merged', ('config',)), - ('state', 'replaced', ('config',)), - ('state', 'overridden', ('config',)), - ('state', 'parsed', ('running_config',))] - mutually_exclusive = [('config', 'running_config')] - - module = AnsibleModule(argument_spec=Static_routesArgs.argument_spec, - required_if=required_if, - supports_check_mode=True, - mutually_exclusive=mutually_exclusive) - - result = Static_routes(module).execute_module() - module.exit_json(**result) - - -if __name__ == '__main__': - main() diff --git a/lib/ansible/modules/network/eos/eos_system.py b/lib/ansible/modules/network/eos/eos_system.py deleted file mode 100644 index 9d10393811..0000000000 --- a/lib/ansible/modules/network/eos/eos_system.py +++ /dev/null @@ -1,339 +0,0 @@ -#!/usr/bin/python -# -# This file is part of Ansible -# -# Ansible is free software: you can redistribute it and/or modify -# it under the terms of the GNU General Public License as published by -# the Free Software Foundation, either version 3 of the License, or -# (at your option) any later version. -# -# Ansible is distributed in the hope that it will be useful, -# but WITHOUT ANY WARRANTY; without even the implied warranty of -# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the -# GNU General Public License for more details. -# -# You should have received a copy of the GNU General Public License -# along with Ansible. If not, see . -# - -ANSIBLE_METADATA = {'metadata_version': '1.1', - 'status': ['preview'], - 'supported_by': 'network'} - - -DOCUMENTATION = """ ---- -module: eos_system -version_added: "2.3" -author: "Peter Sprygada (@privateip)" -short_description: Manage the system attributes on Arista EOS devices -description: - - This module provides declarative management of node system attributes - on Arista EOS devices. It provides an option to configure host system - parameters or remove those parameters from the device active - configuration. -extends_documentation_fragment: eos -notes: - - Tested against EOS 4.15 -options: - hostname: - description: - - Configure the device hostname parameter. This option takes an ASCII string value. - domain_name: - description: - - Configure the IP domain name - on the remote device to the provided value. Value - should be in the dotted name form and will be - appended to the C(hostname) to create a fully-qualified - domain name. - domain_search: - description: - - Provides the list of domain suffixes to - append to the hostname for the purpose of doing name resolution. - This argument accepts a list of names and will be reconciled - with the current active configuration on the running node. - aliases: ['domain_list'] - lookup_source: - description: - - Provides one or more source - interfaces to use for performing DNS lookups. The interface - provided in C(lookup_source) can only exist in a single VRF. This - argument accepts either a list of interface names or a list of - hashes that configure the interface name and VRF name. See - examples. - name_servers: - description: - - List of DNS name servers by IP address to use to perform name resolution - lookups. This argument accepts either a list of DNS servers or - a list of hashes that configure the name server and VRF name. See - examples. - state: - description: - - State of the configuration - values in the device's current active configuration. When set - to I(present), the values should be configured in the device active - configuration and when set to I(absent) the values should not be - in the device active configuration - default: present - choices: ['present', 'absent'] -""" - -EXAMPLES = """ -- name: configure hostname and domain-name - eos_system: - hostname: eos01 - domain_name: test.example.com - -- name: remove configuration - eos_system: - state: absent - -- name: configure DNS lookup sources - eos_system: - lookup_source: Management1 - -- name: configure DNS lookup sources with VRF support - eos_system: - lookup_source: - - interface: Management1 - vrf: mgmt - - interface: Ethernet1 - vrf: myvrf - -- name: configure name servers - eos_system: - name_servers: - - 8.8.8.8 - - 8.8.4.4 - -- name: configure name servers with VRF support - eos_system: - name_servers: - - { server: 8.8.8.8, vrf: mgmt } - - { server: 8.8.4.4, vrf: mgmt } -""" - -RETURN = """ -commands: - description: The list of configuration mode commands to send to the device - returned: always - type: list - sample: - - hostname eos01 - - ip domain-name test.example.com -session_name: - description: The EOS config session name used to load the configuration - returned: changed - type: str - sample: ansible_1479315771 -""" -import re - -from ansible.module_utils.basic import AnsibleModule -from ansible.module_utils.network.common.utils import ComplexList -from ansible.module_utils.network.eos.eos import load_config, get_config -from ansible.module_utils.network.eos.eos import eos_argument_spec - -_CONFIGURED_VRFS = None - - -def has_vrf(module, vrf): - global _CONFIGURED_VRFS - if _CONFIGURED_VRFS is not None: - return vrf in _CONFIGURED_VRFS - config = get_config(module) - _CONFIGURED_VRFS = re.findall(r'vrf definition (\S+)', config) - _CONFIGURED_VRFS.append('default') - return vrf in _CONFIGURED_VRFS - - -def map_obj_to_commands(want, have, module): - commands = list() - state = module.params['state'] - - def needs_update(x): - return want.get(x) and (want.get(x) != have.get(x)) - - if state == 'absent': - if have['domain_name']: - commands.append('no ip domain-name') - - if have['hostname'] != 'localhost': - commands.append('no hostname') - - if state == 'present': - if needs_update('hostname'): - commands.append('hostname %s' % want['hostname']) - - if needs_update('domain_name'): - commands.append('ip domain-name %s' % want['domain_name']) - - if want['domain_list']: - # handle domain_list items to be removed - for item in set(have['domain_list']).difference(want['domain_list']): - commands.append('no ip domain-list %s' % item) - - # handle domain_list items to be added - for item in set(want['domain_list']).difference(have['domain_list']): - commands.append('ip domain-list %s' % item) - - if want['lookup_source']: - # handle lookup_source items to be removed - for item in have['lookup_source']: - if item not in want['lookup_source']: - if item['vrf']: - if not has_vrf(module, item['vrf']): - module.fail_json(msg='vrf %s is not configured' % item['vrf']) - values = (item['vrf'], item['interface']) - commands.append('no ip domain lookup vrf %s source-interface %s' % values) - else: - commands.append('no ip domain lookup source-interface %s' % item['interface']) - - # handle lookup_source items to be added - for item in want['lookup_source']: - if item not in have['lookup_source']: - if item['vrf']: - if not has_vrf(module, item['vrf']): - module.fail_json(msg='vrf %s is not configured' % item['vrf']) - values = (item['vrf'], item['interface']) - commands.append('ip domain lookup vrf %s source-interface %s' % values) - else: - commands.append('ip domain lookup source-interface %s' % item['interface']) - - if want['name_servers']: - # handle name_servers items to be removed. Order does matter here - # since name servers can only be in one vrf at a time - for item in have['name_servers']: - if item not in want['name_servers']: - if not has_vrf(module, item['vrf']): - module.fail_json(msg='vrf %s is not configured' % item['vrf']) - if item['vrf'] not in ('default', None): - values = (item['vrf'], item['server']) - commands.append('no ip name-server vrf %s %s' % values) - else: - commands.append('no ip name-server %s' % item['server']) - - # handle name_servers items to be added - for item in want['name_servers']: - if item not in have['name_servers']: - if not has_vrf(module, item['vrf']): - module.fail_json(msg='vrf %s is not configured' % item['vrf']) - if item['vrf'] not in ('default', None): - values = (item['vrf'], item['server']) - commands.append('ip name-server vrf %s %s' % values) - else: - commands.append('ip name-server %s' % item['server']) - - return commands - - -def parse_hostname(config): - match = re.search(r'^hostname (\S+)', config, re.M) - if match: - return match.group(1) - - -def parse_domain_name(config): - match = re.search(r'^ip domain-name (\S+)', config, re.M) - if match: - return match.group(1) - - -def parse_lookup_source(config): - objects = list() - regex = r'ip domain lookup (?:vrf (\S+) )*source-interface (\S+)' - for vrf, intf in re.findall(regex, config, re.M): - if len(vrf) == 0: - vrf = None - objects.append({'interface': intf, 'vrf': vrf}) - return objects - - -def parse_name_servers(config): - objects = list() - for vrf, addr in re.findall(r'ip name-server vrf (\S+) (\S+)', config, re.M): - objects.append({'server': addr, 'vrf': vrf}) - return objects - - -def map_config_to_obj(module): - config = get_config(module) - return { - 'hostname': parse_hostname(config), - 'domain_name': parse_domain_name(config), - 'domain_list': re.findall(r'^ip domain-list (\S+)', config, re.M), - 'lookup_source': parse_lookup_source(config), - 'name_servers': parse_name_servers(config) - } - - -def map_params_to_obj(module): - obj = { - 'hostname': module.params['hostname'], - 'domain_name': module.params['domain_name'], - 'domain_list': module.params['domain_list'] - } - - lookup_source = ComplexList(dict( - interface=dict(key=True), - vrf=dict() - ), module) - - name_servers = ComplexList(dict( - server=dict(key=True), - vrf=dict(default='default') - ), module) - - for arg, cast in [('lookup_source', lookup_source), ('name_servers', name_servers)]: - if module.params[arg] is not None: - obj[arg] = cast(module.params[arg]) - else: - obj[arg] = None - - return obj - - -def main(): - """ main entry point for module execution - """ - argument_spec = dict( - hostname=dict(), - - domain_name=dict(), - domain_list=dict(type='list', aliases=['domain_search']), - - # { interface: , vrf: } - lookup_source=dict(type='list'), - - # { server: ; vrf: } - name_servers=dict(type='list'), - - state=dict(default='present', choices=['present', 'absent']) - ) - - argument_spec.update(eos_argument_spec) - - module = AnsibleModule(argument_spec=argument_spec, - supports_check_mode=True) - - result = {'changed': False} - - want = map_params_to_obj(module) - have = map_config_to_obj(module) - - commands = map_obj_to_commands(want, have, module) - result['commands'] = commands - - if commands: - commit = not module.check_mode - response = load_config(module, commands, commit=commit) - if response.get('diff') and module._diff: - result['diff'] = {'prepared': response.get('diff')} - result['session_name'] = response.get('session') - result['changed'] = True - - module.exit_json(**result) - - -if __name__ == '__main__': - main() diff --git a/lib/ansible/modules/network/eos/eos_user.py b/lib/ansible/modules/network/eos/eos_user.py deleted file mode 100644 index d48fd0528d..0000000000 --- a/lib/ansible/modules/network/eos/eos_user.py +++ /dev/null @@ -1,400 +0,0 @@ -#!/usr/bin/python -# -# This file is part of Ansible -# -# Ansible is free software: you can redistribute it and/or modify -# it under the terms of the GNU General Public License as published by -# the Free Software Foundation, either version 3 of the License, or -# (at your option) any later version. -# -# Ansible is distributed in the hope that it will be useful, -# but WITHOUT ANY WARRANTY; without even the implied warranty of -# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the -# GNU General Public License for more details. -# -# You should have received a copy of the GNU General Public License -# along with Ansible. If not, see . -# - -ANSIBLE_METADATA = {'metadata_version': '1.1', - 'status': ['preview'], - 'supported_by': 'network'} - - -DOCUMENTATION = """ ---- -module: eos_user -version_added: "2.3" -author: "Peter Sprygada (@privateip)" -short_description: Manage the collection of local users on EOS devices -description: - - This module provides declarative management of the local usernames - configured on Arista EOS devices. It allows playbooks to manage - either individual usernames or the collection of usernames in the - current running config. It also supports purging usernames from the - configuration that are not explicitly defined. -extends_documentation_fragment: eos -notes: - - Tested against EOS 4.15 -options: - aggregate: - description: - - The set of username objects to be configured on the remote - Arista EOS device. The list entries can either be the username - or a hash of username and properties. This argument is mutually - exclusive with the C(username) argument. - aliases: ['users', 'collection'] - version_added: "2.4" - name: - description: - - The username to be configured on the remote Arista EOS - device. This argument accepts a stringv value and is mutually - exclusive with the C(aggregate) argument. - Please note that this option is not same as C(provider username). - version_added: "2.4" - configured_password: - description: - - The password to be configured on the remote Arista EOS device. The - password needs to be provided in clear and it will be encrypted - on the device. - Please note that this option is not same as C(provider password). - version_added: "2.4" - update_password: - description: - - Since passwords are encrypted in the device running config, this - argument will instruct the module when to change the password. When - set to C(always), the password will always be updated in the device - and when set to C(on_create) the password will be updated only if - the username is created. - default: always - choices: ['on_create', 'always'] - privilege: - description: - - The C(privilege) argument configures the privilege level of the - user when logged into the system. This argument accepts integer - values in the range of 1 to 15. - role: - description: - - Configures the role for the username in the - device running configuration. The argument accepts a string value - defining the role name. This argument does not check if the role - has been configured on the device. - sshkey: - description: - - Specifies the SSH public key to configure - for the given username. This argument accepts a valid SSH key value. - nopassword: - description: - - Defines the username without assigning - a password. This will allow the user to login to the system - without being authenticated by a password. - type: bool - purge: - description: - - Instructs the module to consider the - resource definition absolute. It will remove any previously - configured usernames on the device with the exception of the - `admin` user which cannot be deleted per EOS constraints. - type: bool - default: false - state: - description: - - Configures the state of the username definition - as it relates to the device operational configuration. When set - to I(present), the username(s) should be configured in the device active - configuration and when set to I(absent) the username(s) should not be - in the device active configuration - default: present - choices: ['present', 'absent'] -""" - -EXAMPLES = """ -- name: create a new user - eos_user: - name: ansible - sshkey: "{{ lookup('file', '~/.ssh/id_rsa.pub') }}" - state: present - -- name: remove all users except admin - eos_user: - purge: yes - -- name: set multiple users to privilege level 15 - eos_user: - aggregate: - - name: netop - - name: netend - privilege: 15 - state: present - -- name: Change Password for User netop - eos_user: - username: netop - configured_password: "{{ new_password }}" - update_password: always - state: present -""" - -RETURN = """ -commands: - description: The list of configuration mode commands to send to the device - returned: always - type: list - sample: - - name ansible secret password - - name admin secret admin -session_name: - description: The EOS config session name used to load the configuration - returned: when changed is True - type: str - sample: ansible_1479315771 -""" - -import re - -from copy import deepcopy -from functools import partial - -from ansible.module_utils.basic import AnsibleModule -from ansible.module_utils.network.common.utils import remove_default_spec -from ansible.module_utils.network.eos.eos import get_config, load_config -from ansible.module_utils.network.eos.eos import eos_argument_spec -from ansible.module_utils.six import iteritems - - -def validate_privilege(value, module): - if not 1 <= value <= 15: - module.fail_json(msg='privilege must be between 1 and 15, got %s' % value) - - -def map_obj_to_commands(updates, module): - commands = list() - update_password = module.params['update_password'] - - for update in updates: - want, have = update - - def needs_update(x): - return want.get(x) and (want.get(x) != have.get(x)) - - def add(x): - return commands.append('username %s %s' % (want['name'], x)) - - if want['state'] == 'absent': - commands.append('no username %s' % want['name']) - continue - - if needs_update('configured_password'): - if update_password == 'always' or not have: - add('secret %s' % want['configured_password']) - - if needs_update('role'): - add('role %s' % want['role']) - - if needs_update('privilege'): - add('privilege %s' % want['privilege']) - - if needs_update('sshkey'): - add('sshkey %s' % want['sshkey']) - - if needs_update('nopassword'): - if want['nopassword']: - add('nopassword') - else: - add('no username %s nopassword' % want['name']) - - if want.get('state') == 'present' and want.get('name'): - value = [want.get('configured_password'), want.get('nopassword'), want.get('sshkey')] - if all(v is None for v in value) is True: - module.fail_json(msg='configured_password, sshkey or nopassword should be provided') - - return commands - - -def parse_role(data): - match = re.search(r'role (\S+)', data, re.M) - if match: - return match.group(1) - - -def parse_sshkey(data): - match = re.search(r'sshkey (.+)$', data, re.M) - if match: - return match.group(1) - - -def parse_privilege(data): - match = re.search(r'privilege (\S+)', data, re.M) - if match: - return int(match.group(1)) - - -def map_config_to_obj(module): - data = get_config(module, flags=['section username']) - - match = re.findall(r'^username (\S+)', data, re.M) - if not match: - return list() - - instances = list() - - for user in set(match): - regex = r'username %s .+$' % user - cfg = re.findall(regex, data, re.M) - cfg = '\n'.join(cfg) - obj = { - 'name': user, - 'state': 'present', - 'nopassword': 'nopassword' in cfg, - 'configured_password': None, - 'sshkey': parse_sshkey(cfg), - 'privilege': parse_privilege(cfg), - 'role': parse_role(cfg) - } - instances.append(obj) - - return instances - - -def get_param_value(key, item, module): - # if key doesn't exist in the item, get it from module.params - if not item.get(key): - value = module.params[key] - - # if key does exist, do a type check on it to validate it - else: - value_type = module.argument_spec[key].get('type', 'str') - type_checker = module._CHECK_ARGUMENT_TYPES_DISPATCHER[value_type] - type_checker(item[key]) - value = item[key] - - # validate the param value (if validator func exists) - validator = globals().get('validate_%s' % key) - if all((value, validator)): - validator(value, module) - - return value - - -def map_params_to_obj(module): - aggregate = module.params['aggregate'] - if not aggregate: - if not module.params['name'] and module.params['purge']: - return list() - elif not module.params['name']: - module.fail_json(msg='name is required') - else: - collection = [{'name': module.params['name']}] - else: - collection = list() - for item in aggregate: - if not isinstance(item, dict): - collection.append({'name': item}) - elif 'name' not in item: - module.fail_json(msg='name is required') - else: - collection.append(item) - - objects = list() - - for item in collection: - get_value = partial(get_param_value, item=item, module=module) - item['configured_password'] = get_value('configured_password') - item['nopassword'] = get_value('nopassword') - item['privilege'] = get_value('privilege') - item['role'] = get_value('role') - item['sshkey'] = get_value('sshkey') - item['state'] = get_value('state') - objects.append(item) - - return objects - - -def update_objects(want, have): - updates = list() - for entry in want: - if 'name' in entry: - item = next((i for i in have if i['name'] == entry['name']), None) - if all((item is None, entry['state'] == 'present')): - updates.append((entry, {})) - elif item: - for key, value in iteritems(entry): - if value and value != item[key]: - updates.append((entry, item)) - return updates - - -def main(): - """ main entry point for module execution - """ - element_spec = dict( - name=dict(), - - configured_password=dict(no_log=True), - nopassword=dict(type='bool'), - update_password=dict(default='always', choices=['on_create', 'always']), - - privilege=dict(type='int'), - role=dict(), - - sshkey=dict(), - - state=dict(default='present', choices=['present', 'absent']) - ) - - aggregate_spec = deepcopy(element_spec) - - # remove default in aggregate spec, to handle common arguments - remove_default_spec(aggregate_spec) - - argument_spec = dict( - aggregate=dict(type='list', elements='dict', options=aggregate_spec, aliases=['collection', 'users']), - purge=dict(type='bool', default=False) - ) - - argument_spec.update(element_spec) - argument_spec.update(eos_argument_spec) - mutually_exclusive = [('name', 'aggregate')] - - module = AnsibleModule(argument_spec=argument_spec, - mutually_exclusive=mutually_exclusive, - supports_check_mode=True) - - warnings = list() - - result = {'changed': False} - if warnings: - result['warnings'] = warnings - - want = map_params_to_obj(module) - have = map_config_to_obj(module) - - commands = map_obj_to_commands(update_objects(want, have), module) - - if module.params['purge']: - want_users = [x['name'] for x in want] - have_users = [x['name'] for x in have] - for item in set(have_users).difference(want_users): - if item != 'admin': - commands.append('no username %s' % item) - - result['commands'] = commands - - # the eos cli prevents this by rule so capture it and display - # a nice failure message - if 'no username admin' in commands: - module.fail_json(msg='cannot delete the `admin` account') - - if commands: - commit = not module.check_mode - response = load_config(module, commands, commit=commit) - if response.get('diff') and module._diff: - result['diff'] = {'prepared': response.get('diff')} - result['session_name'] = response.get('session') - result['changed'] = True - - module.exit_json(**result) - - -if __name__ == '__main__': - main() diff --git a/lib/ansible/modules/network/eos/eos_vlans.py b/lib/ansible/modules/network/eos/eos_vlans.py deleted file mode 100644 index 2f0bdc72f3..0000000000 --- a/lib/ansible/modules/network/eos/eos_vlans.py +++ /dev/null @@ -1,240 +0,0 @@ -#!/usr/bin/python -# -*- coding: utf-8 -*- -# Copyright 2019 Red Hat -# GNU General Public License v3.0+ -# (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt) - -############################################# -# WARNING # -############################################# -# -# This file is auto generated by the resource -# module builder playbook. -# -# Do not edit this file manually. -# -# Changes to this file will be over written -# by the resource module builder. -# -# Changes should be made in the model used to -# generate this file or in the resource module -# builder template. -# -############################################# - -""" -The module file for eos_vlans -""" - -from __future__ import absolute_import, division, print_function -__metaclass__ = type - -ANSIBLE_METADATA = { - 'metadata_version': '1.1', - 'status': ['preview'], - 'supported_by': 'network' -} - -DOCUMENTATION = """ ---- -module: eos_vlans -version_added: 2.9 -short_description: Manage VLANs on Arista EOS devices. -description: This module provides declarative management of VLANs on Arista EOS network devices. -author: Nathaniel Case (@qalthos) -notes: -- Tested against Arista EOS 4.20.10M -- This module works with connection C(network_cli). See the - L(EOS Platform Options,../network/user_guide/platform_eos.html). -options: - config: - description: A dictionary of VLANs options - type: list - elements: dict - suboptions: - name: - description: - - Name of the VLAN. - type: str - vlan_id: - description: - - ID of the VLAN. Range 1-4094 - type: int - required: true - state: - description: - - Operational state of the VLAN - type: str - choices: - - active - - suspend - state: - description: - - The state of the configuration after module completion - type: str - choices: - - merged - - replaced - - overridden - - deleted - default: merged -""" -EXAMPLES = """ -# Using deleted - -# Before state: -# ------------- -# -# veos(config-vlan-20)#show running-config | section vlan -# vlan 10 -# name ten -# ! -# vlan 20 -# name twenty - -- name: Delete attributes of the given VLANs. - eos_vlans: - config: - - vlan_id: 20 - state: deleted - -# After state: -# ------------ -# -# veos(config-vlan-20)#show running-config | section vlan -# vlan 10 -# name ten - - -# Using merged - -# Before state: -# ------------- -# -# veos(config-vlan-20)#show running-config | section vlan -# vlan 10 -# name ten -# ! -# vlan 20 -# name twenty - -- name: Merge given VLAN attributes with device configuration - eos_vlans: - config: - - vlan_id: 20 - state: suspend - state: merged - -# After state: -# ------------ -# -# veos(config-vlan-20)#show running-config | section vlan -# vlan 10 -# name ten -# ! -# vlan 20 -# name twenty -# state suspend - - -# Using overridden - -# Before state: -# ------------- -# -# veos(config-vlan-20)#show running-config | section vlan -# vlan 10 -# name ten -# ! -# vlan 20 -# name twenty - -- name: Override device configuration of all VLANs with provided configuration - eos_vlans: - config: - - vlan_id: 20 - state: suspend - state: overridden - -# After state: -# ------------ -# -# veos(config-vlan-20)#show running-config | section vlan -# vlan 20 -# state suspend - - -# Using replaced - -# Before state: -# ------------- -# -# veos(config-vlan-20)#show running-config | section vlan -# vlan 10 -# name ten -# ! -# vlan 20 -# name twenty - -- name: Replace all attributes of specified VLANs with provided configuration - eos_vlans: - config: - - vlan_id: 20 - state: suspend - state: replaced - -# After state: -# ------------ -# -# veos(config-vlan-20)#show running-config | section vlan -# vlan 10 -# name ten -# ! -# vlan 20 -# state suspend - - -""" -RETURN = """ -before: - description: The configuration as structured data prior to module invocation. - returned: always - type: list - sample: > - The configuration returned will always be in the same format - of the parameters above. -after: - description: The configuration as structured data after module completion. - returned: when changed - type: list - sample: > - The configuration returned will always be in the same format - of the parameters above. -commands: - description: The set of commands pushed to the remote device. - returned: always - type: list - sample: ['vlan 10', 'no name', 'vlan 11', 'name Eleven'] -""" - - -from ansible.module_utils.basic import AnsibleModule -from ansible.module_utils.network.eos.argspec.vlans.vlans import VlansArgs -from ansible.module_utils.network.eos.config.vlans.vlans import Vlans - - -def main(): - """ - Main entry point for module execution - - :returns: the result form module invocation - """ - module = AnsibleModule(argument_spec=VlansArgs.argument_spec, - supports_check_mode=True) - - result = Vlans(module).execute_module() - module.exit_json(**result) - - -if __name__ == '__main__': - main() diff --git a/lib/ansible/modules/network/eos/eos_vrf.py b/lib/ansible/modules/network/eos/eos_vrf.py deleted file mode 100644 index 0684be033a..0000000000 --- a/lib/ansible/modules/network/eos/eos_vrf.py +++ /dev/null @@ -1,348 +0,0 @@ -#!/usr/bin/python -# -*- coding: utf-8 -*- - -# (c) 2017, Ansible by Red Hat, inc -# -# This file is part of Ansible by Red Hat -# -# Ansible is free software: you can redistribute it and/or modify -# it under the terms of the GNU General Public License as published by -# the Free Software Foundation, either version 3 of the License, or -# (at your option) any later version. -# -# Ansible is distributed in the hope that it will be useful, -# but WITHOUT ANY WARRANTY; without even the implied warranty of -# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the -# GNU General Public License for more details. -# -# You should have received a copy of the GNU General Public License -# along with Ansible. If not, see . -# - -ANSIBLE_METADATA = {'metadata_version': '1.1', - 'status': ['preview'], - 'supported_by': 'network'} - - -DOCUMENTATION = """ ---- -module: eos_vrf -version_added: "2.4" -author: "Ricardo Carrillo Cruz (@rcarrillocruz)" -short_description: Manage VRFs on Arista EOS network devices -description: - - This module provides declarative management of VRFs - on Arista EOS network devices. -notes: - - Tested against EOS 4.15 -options: - name: - description: - - Name of the VRF. - required: true - rd: - description: - - Route distinguisher of the VRF - interfaces: - description: - - Identifies the set of interfaces that - should be configured in the VRF. Interfaces must be routed - interfaces in order to be placed into a VRF. The name of interface - should be in expanded format and not abbreviated. - associated_interfaces: - description: - - This is a intent option and checks the operational state of the for given vrf C(name) - for associated interfaces. If the value in the C(associated_interfaces) does not match with - the operational state of vrf interfaces on device it will result in failure. - version_added: "2.5" - aggregate: - description: List of VRFs definitions - purge: - description: - - Purge VRFs not defined in the I(aggregate) parameter. - default: no - type: bool - delay: - description: - - Time in seconds to wait before checking for the operational state on remote - device. This wait is applicable for operational state arguments. - default: 10 - state: - description: - - State of the VRF configuration. - default: present - choices: ['present', 'absent'] -extends_documentation_fragment: eos -""" - -EXAMPLES = """ -- name: Create vrf - eos_vrf: - name: test - rd: 1:200 - interfaces: - - Ethernet2 - state: present - -- name: Delete VRFs - eos_vrf: - name: test - state: absent - -- name: Create aggregate of VRFs with purge - eos_vrf: - aggregate: - - { name: test4, rd: "1:204" } - - { name: test5, rd: "1:205" } - state: present - purge: yes - -- name: Delete aggregate of VRFs - eos_vrf: - aggregate: - - name: test2 - - name: test3 - - name: test4 - - name: test5 - state: absent -""" - -RETURN = """ -commands: - description: The list of configuration mode commands to send to the device - returned: always - type: list - sample: - - vrf definition test - - rd 1:100 - - interface Ethernet1 - - vrf forwarding test -""" -import re -import time - -from copy import deepcopy - -from ansible.module_utils.basic import AnsibleModule -from ansible.module_utils.network.common.utils import remove_default_spec -from ansible.module_utils.network.eos.eos import load_config, run_commands -from ansible.module_utils.network.eos.eos import eos_argument_spec - - -def search_obj_in_list(name, lst): - for o in lst: - if o['name'] == name: - return o - - -def map_obj_to_commands(updates, module): - commands = list() - want, have = updates - state = module.params['state'] - purge = module.params['purge'] - - for w in want: - name = w['name'] - rd = w['rd'] - - obj_in_have = search_obj_in_list(name, have) - - if state == 'absent': - if obj_in_have: - commands.append('no vrf definition %s' % name) - elif state == 'present': - if not obj_in_have: - commands.append('vrf definition %s' % name) - - if rd is not None: - commands.append('rd %s' % rd) - - if w['interfaces']: - for i in w['interfaces']: - commands.append('interface %s' % i) - commands.append('vrf forwarding %s' % w['name']) - else: - if w['rd'] is not None and w['rd'] != obj_in_have['rd']: - commands.append('vrf definition %s' % w['name']) - commands.append('rd %s' % w['rd']) - - if w['interfaces']: - if not obj_in_have['interfaces']: - for i in w['interfaces']: - commands.append('interface %s' % i) - commands.append('vrf forwarding %s' % w['name']) - elif set(w['interfaces']) != obj_in_have['interfaces']: - missing_interfaces = list(set(w['interfaces']) - set(obj_in_have['interfaces'])) - - for i in missing_interfaces: - commands.append('interface %s' % i) - commands.append('vrf forwarding %s' % w['name']) - - if purge: - for h in have: - obj_in_want = search_obj_in_list(h['name'], want) - if not obj_in_want: - commands.append('no vrf definition %s' % h['name']) - - return commands - - -def map_config_to_obj(module): - objs = [] - output = run_commands(module, {'command': 'show vrf', 'output': 'text'}) - - lines = output[0].strip().splitlines()[3:] - - out_len = len(lines) - index = 0 - while out_len > index: - line = lines[index] - if not line: - continue - - splitted_line = re.split(r'\s{2,}', line.strip()) - - if len(splitted_line) == 1: - index += 1 - continue - else: - obj = dict() - obj['name'] = splitted_line[0] - obj['rd'] = splitted_line[1] - obj['interfaces'] = [] - - if len(splitted_line) > 4: - obj['interfaces'] = [] - interfaces = splitted_line[4] - if interfaces.endswith(','): - while interfaces.endswith(','): - # gather all comma separated interfaces - if out_len <= index: - break - index += 1 - line = lines[index] - vrf_line = re.split(r'\s{2,}', line.strip()) - interfaces += vrf_line[-1] - - for i in interfaces.split(','): - obj['interfaces'].append(i.strip().lower()) - index += 1 - objs.append(obj) - - return objs - - -def map_params_to_obj(module): - obj = [] - aggregate = module.params.get('aggregate') - if aggregate: - for item in aggregate: - for key in item: - if item.get(key) is None: - item[key] = module.params[key] - - if item.get('interfaces'): - item['interfaces'] = [intf.replace(" ", "").lower() for intf in item.get('interfaces') if intf] - - if item.get('associated_interfaces'): - item['associated_interfaces'] = [intf.replace(" ", "").lower() for intf in item.get('associated_interfaces') if intf] - - obj.append(item.copy()) - else: - obj.append({ - 'name': module.params['name'], - 'state': module.params['state'], - 'rd': module.params['rd'], - 'interfaces': [intf.replace(" ", "").lower() for intf in module.params['interfaces']] if module.params['interfaces'] else [], - 'associated_interfaces': [intf.replace(" ", "").lower() for intf in - module.params['associated_interfaces']] if module.params['associated_interfaces'] else [] - - }) - - return obj - - -def check_declarative_intent_params(want, module, result): - have = None - is_delay = False - - for w in want: - if w.get('associated_interfaces') is None: - continue - - if result['changed'] and not is_delay: - time.sleep(module.params['delay']) - is_delay = True - - if have is None: - have = map_config_to_obj(module) - - for i in w['associated_interfaces']: - obj_in_have = search_obj_in_list(w['name'], have) - - if obj_in_have: - interfaces = obj_in_have.get('interfaces') - if interfaces is not None and i not in interfaces: - module.fail_json(msg="Interface %s not configured on vrf %s" % (i, w['name'])) - - -def main(): - """ main entry point for module execution - """ - element_spec = dict( - name=dict(), - interfaces=dict(type='list'), - associated_interfaces=dict(type='list'), - delay=dict(default=10, type='int'), - rd=dict(), - state=dict(default='present', choices=['present', 'absent']) - ) - - aggregate_spec = deepcopy(element_spec) - - # remove default in aggregate spec, to handle common arguments - remove_default_spec(aggregate_spec) - - argument_spec = dict( - aggregate=dict(type='list', elements='dict', options=aggregate_spec), - purge=dict(default=False, type='bool') - ) - - argument_spec.update(element_spec) - argument_spec.update(eos_argument_spec) - - required_one_of = [['name', 'aggregate']] - mutually_exclusive = [['name', 'aggregate']] - module = AnsibleModule(argument_spec=argument_spec, - required_one_of=required_one_of, - mutually_exclusive=mutually_exclusive, - supports_check_mode=True) - - warnings = list() - - result = {'changed': False} - - if warnings: - result['warnings'] = warnings - - want = map_params_to_obj(module) - have = map_config_to_obj(module) - - commands = map_obj_to_commands((want, have), module) - result['commands'] = commands - - if commands: - commit = not module.check_mode - response = load_config(module, commands, commit=commit) - if response.get('diff') and module._diff: - result['diff'] = {'prepared': response.get('diff')} - result['session_name'] = response.get('session') - result['changed'] = True - - check_declarative_intent_params(want, module, result) - - module.exit_json(**result) - - -if __name__ == '__main__': - main() diff --git a/lib/ansible/plugins/action/eos.py b/lib/ansible/plugins/action/eos.py deleted file mode 100644 index 1b76e1826f..0000000000 --- a/lib/ansible/plugins/action/eos.py +++ /dev/null @@ -1,134 +0,0 @@ -# -# (c) 2016 Red Hat Inc. -# -# This file is part of Ansible -# -# Ansible is free software: you can redistribute it and/or modify -# it under the terms of the GNU General Public License as published by -# the Free Software Foundation, either version 3 of the License, or -# (at your option) any later version. -# -# Ansible is distributed in the hope that it will be useful, -# but WITHOUT ANY WARRANTY; without even the implied warranty of -# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the -# GNU General Public License for more details. -# -# You should have received a copy of the GNU General Public License -# along with Ansible. If not, see . -# -from __future__ import (absolute_import, division, print_function) -__metaclass__ = type - -import sys -import copy - -from ansible import constants as C -from ansible.module_utils.network.eos.eos import eos_provider_spec -from ansible.plugins.action.network import ActionModule as ActionNetworkModule -from ansible.module_utils.network.common.utils import load_provider -from ansible.utils.display import Display - -display = Display() - - -class ActionModule(ActionNetworkModule): - - def run(self, tmp=None, task_vars=None): - del tmp # tmp no longer has any effect - - module_name = self._task.action.split('.')[-1] - self._config_module = True if module_name == 'eos_config' else False - persistent_connection = self._play_context.connection.split('.')[-1] - warnings = [] - - if persistent_connection in ('network_cli', 'httpapi'): - provider = self._task.args.get('provider', {}) - if any(provider.values()): - display.warning('provider is unnecessary when using %s and will be ignored' % self._play_context.connection) - del self._task.args['provider'] - if self._task.args.get('transport'): - display.warning('transport is unnecessary when using %s and will be ignored' % self._play_context.connection) - del self._task.args['transport'] - elif self._play_context.connection == 'local': - provider = load_provider(eos_provider_spec, self._task.args) - transport = provider['transport'] or 'cli' - - display.vvvv('connection transport is %s' % transport, self._play_context.remote_addr) - - if transport == 'cli': - pc = copy.deepcopy(self._play_context) - pc.connection = 'ansible.netcommon.network_cli' - pc.network_os = 'arista.eos.eos' - pc.remote_addr = provider['host'] or self._play_context.remote_addr - pc.port = int(provider['port'] or self._play_context.port or 22) - pc.remote_user = provider['username'] or self._play_context.connection_user - pc.password = provider['password'] or self._play_context.password - pc.private_key_file = provider['ssh_keyfile'] or self._play_context.private_key_file - pc.become = provider['authorize'] or False - if pc.become: - pc.become_method = 'enable' - pc.become_pass = provider['auth_pass'] - - connection = self._shared_loader_obj.connection_loader.get('ansible.netcommon.persistent', pc, sys.stdin, - task_uuid=self._task._uuid) - - # TODO: Remove below code after ansible minimal is cut out - if connection is None: - pc.connection = 'network_cli' - pc.network_os = 'eos' - connection = self._shared_loader_obj.connection_loader.get('persistent', pc, sys.stdin, task_uuid=self._task._uuid) - - display.vvv('using connection plugin %s (was local)' % pc.connection, pc.remote_addr) - - command_timeout = int(provider['timeout']) if provider['timeout'] else connection.get_option('persistent_command_timeout') - connection.set_options(direct={'persistent_command_timeout': command_timeout}) - - socket_path = connection.run() - display.vvvv('socket_path: %s' % socket_path, pc.remote_addr) - if not socket_path: - return {'failed': True, - 'msg': 'unable to open shell. Please see: ' + - 'https://docs.ansible.com/ansible/network_debug_troubleshooting.html#unable-to-open-shell'} - - task_vars['ansible_socket'] = socket_path - warnings.append(['connection local support for this module is deprecated and will be removed in version 2.14,' - ' use connection %s' % pc.connection]) - else: - self._task.args['provider'] = ActionModule.eapi_implementation(provider, self._play_context) - warnings.append(['connection local support for this module is deprecated and will be removed in version 2.14,' - ' use connection either httpapi or ansible.netcommon.httpapi (whichever is applicable)']) - else: - return {'failed': True, 'msg': 'Connection type %s is not valid for this module' % self._play_context.connection} - - result = super(ActionModule, self).run(task_vars=task_vars) - if warnings: - if 'warnings' in result: - result['warnings'].extend(warnings) - else: - result['warnings'] = warnings - return result - - @staticmethod - def eapi_implementation(provider, play_context): - provider['transport'] = 'eapi' - - if provider.get('host') is None: - provider['host'] = play_context.remote_addr - - if provider.get('port') is None: - default_port = 443 if provider['use_ssl'] else 80 - provider['port'] = int(play_context.port or default_port) - - if provider.get('timeout') is None: - provider['timeout'] = C.PERSISTENT_COMMAND_TIMEOUT - - if provider.get('username') is None: - provider['username'] = play_context.connection_user - - if provider.get('password') is None: - provider['password'] = play_context.password - - if provider.get('authorize') is None: - provider['authorize'] = False - - return provider diff --git a/lib/ansible/plugins/cliconf/eos.py b/lib/ansible/plugins/cliconf/eos.py deleted file mode 100644 index 9141e1d7f3..0000000000 --- a/lib/ansible/plugins/cliconf/eos.py +++ /dev/null @@ -1,306 +0,0 @@ -# -# (c) 2017 Red Hat Inc. -# -# This file is part of Ansible -# -# Ansible is free software: you can redistribute it and/or modify -# it under the terms of the GNU General Public License as published by -# the Free Software Foundation, either version 3 of the License, or -# (at your option) any later version. -# -# Ansible is distributed in the hope that it will be useful, -# but WITHOUT ANY WARRANTY; without even the implied warranty of -# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the -# GNU General Public License for more details. -# -# You should have received a copy of the GNU General Public License -# along with Ansible. If not, see . -# -from __future__ import (absolute_import, division, print_function) -__metaclass__ = type - -DOCUMENTATION = """ ---- -author: Ansible Networking Team -cliconf: eos -short_description: Use eos cliconf to run command on Arista EOS platform -description: - - This eos plugin provides low level abstraction apis for - sending and receiving CLI commands from Arista EOS network devices. -version_added: "2.4" -options: - eos_use_sessions: - type: boolean - default: yes - description: - - Specifies if sessions should be used on remote host or not - env: - - name: ANSIBLE_EOS_USE_SESSIONS - vars: - - name: ansible_eos_use_sessions - version_added: '2.7' -""" - -import json -import time -import re - -from ansible.errors import AnsibleConnectionFailure -from ansible.module_utils._text import to_text -from ansible.module_utils.common._collections_compat import Mapping -from ansible.module_utils.network.common.utils import to_list -from ansible.module_utils.network.common.config import NetworkConfig, dumps -from ansible.plugins.cliconf import CliconfBase, enable_mode - - -class Cliconf(CliconfBase): - - def __init__(self, *args, **kwargs): - super(Cliconf, self).__init__(*args, **kwargs) - self._session_support = None - - @enable_mode - def get_config(self, source='running', format='text', flags=None): - options_values = self.get_option_values() - if format not in options_values['format']: - raise ValueError("'format' value %s is invalid. Valid values are %s" % (format, ','.join(options_values['format']))) - - lookup = {'running': 'running-config', 'startup': 'startup-config'} - if source not in lookup: - raise ValueError("fetching configuration from %s is not supported" % source) - - cmd = 'show %s ' % lookup[source] - if format and format != 'text': - cmd += '| %s ' % format - - cmd += ' '.join(to_list(flags)) - cmd = cmd.strip() - return self.send_command(cmd) - - @enable_mode - def edit_config(self, candidate=None, commit=True, replace=None, comment=None): - - operations = self.get_device_operations() - self.check_edit_config_capability(operations, candidate, commit, replace, comment) - - if (commit is False) and (not self.supports_sessions()): - raise ValueError('check mode is not supported without configuration session') - - resp = {} - session = None - if self.supports_sessions(): - session = 'ansible_%s' % int(time.time()) - resp.update({'session': session}) - self.send_command('configure session %s' % session) - if replace: - self.send_command('rollback clean-config') - else: - self.send_command('configure') - - results = [] - requests = [] - multiline = False - for line in to_list(candidate): - if not isinstance(line, Mapping): - line = {'command': line} - - cmd = line['command'] - if cmd == 'end': - continue - elif cmd.startswith('banner') or multiline: - multiline = True - elif cmd == 'EOF' and multiline: - multiline = False - - if multiline: - line['sendonly'] = True - - if cmd != 'end' and cmd[0] != '!': - try: - results.append(self.send_command(**line)) - requests.append(cmd) - except AnsibleConnectionFailure as e: - self.discard_changes(session) - raise AnsibleConnectionFailure(e.message) - - resp['request'] = requests - resp['response'] = results - if self.supports_sessions(): - out = self.send_command('show session-config diffs') - if out: - resp['diff'] = out.strip() - - if commit: - self.commit() - else: - self.discard_changes(session) - else: - self.send_command('end') - return resp - - def get(self, command, prompt=None, answer=None, sendonly=False, output=None, newline=True, check_all=False): - if output: - command = self._get_command_with_output(command, output) - return self.send_command(command=command, prompt=prompt, answer=answer, sendonly=sendonly, newline=newline, check_all=check_all) - - def commit(self): - self.send_command('commit') - - def discard_changes(self, session=None): - commands = ['end'] - if self.supports_sessions(): - # to close session gracefully execute abort in top level session prompt. - commands.extend(['configure session %s' % session, 'abort']) - - for cmd in commands: - self.send_command(cmd) - - def run_commands(self, commands=None, check_rc=True): - if commands is None: - raise ValueError("'commands' value is required") - responses = list() - for cmd in to_list(commands): - if not isinstance(cmd, Mapping): - cmd = {'command': cmd} - - output = cmd.pop('output', None) - if output: - cmd['command'] = self._get_command_with_output(cmd['command'], output) - - try: - out = self.send_command(**cmd) - except AnsibleConnectionFailure as e: - if check_rc: - raise - out = getattr(e, 'err', e) - out = to_text(out, errors='surrogate_or_strict') - - if out is not None: - try: - out = json.loads(out) - except ValueError: - out = out.strip() - - responses.append(out) - return responses - - def get_diff(self, candidate=None, running=None, diff_match='line', diff_ignore_lines=None, path=None, diff_replace='line'): - diff = {} - device_operations = self.get_device_operations() - option_values = self.get_option_values() - - if candidate is None and device_operations['supports_generate_diff']: - raise ValueError("candidate configuration is required to generate diff") - - if diff_match not in option_values['diff_match']: - raise ValueError("'match' value %s in invalid, valid values are %s" % (diff_match, ', '.join(option_values['diff_match']))) - - if diff_replace not in option_values['diff_replace']: - raise ValueError("'replace' value %s in invalid, valid values are %s" % (diff_replace, ', '.join(option_values['diff_replace']))) - - # prepare candidate configuration - candidate_obj = NetworkConfig(indent=3) - candidate_obj.load(candidate) - - if running and diff_match != 'none' and diff_replace != 'config': - # running configuration - running_obj = NetworkConfig(indent=3, contents=running, ignore_lines=diff_ignore_lines) - configdiffobjs = candidate_obj.difference(running_obj, path=path, match=diff_match, replace=diff_replace) - - else: - configdiffobjs = candidate_obj.items - - diff['config_diff'] = dumps(configdiffobjs, 'commands') if configdiffobjs else '' - return diff - - def supports_sessions(self): - if not self.get_option('eos_use_sessions'): - self._session_support = False - else: - if self._session_support: - return self._session_support - - try: - self.get('show configuration sessions') - self._session_support = True - except AnsibleConnectionFailure: - self._session_support = False - - return self._session_support - - def get_device_info(self): - device_info = {} - - device_info['network_os'] = 'eos' - reply = self.get('show version | json') - data = json.loads(reply) - - device_info['network_os_version'] = data['version'] - device_info['network_os_model'] = data['modelName'] - - reply = self.get('show hostname | json') - data = json.loads(reply) - - device_info['network_os_hostname'] = data['hostname'] - - try: - reply = self.get('bash timeout 5 cat /mnt/flash/boot-config') - - match = re.search(r'SWI=(.+)$', reply, re.M) - if match: - device_info['network_os_image'] = match.group(1) - except AnsibleConnectionFailure: - # This requires enable mode to run - self._connection.queue_message('vvv', "Unable to gather network_os_image without enable mode") - - return device_info - - def get_device_operations(self): - return { - 'supports_diff_replace': True, - 'supports_commit': bool(self.supports_sessions()), - 'supports_rollback': False, - 'supports_defaults': False, - 'supports_onbox_diff': bool(self.supports_sessions()), - 'supports_commit_comment': False, - 'supports_multiline_delimiter': False, - 'supports_diff_match': True, - 'supports_diff_ignore_lines': True, - 'supports_generate_diff': not bool(self.supports_sessions()), - 'supports_replace': bool(self.supports_sessions()), - } - - def get_option_values(self): - return { - 'format': ['text', 'json'], - 'diff_match': ['line', 'strict', 'exact', 'none'], - 'diff_replace': ['line', 'block', 'config'], - 'output': ['text', 'json'] - } - - def get_capabilities(self): - result = super(Cliconf, self).get_capabilities() - result['rpc'] += ['commit', 'discard_changes', 'get_diff', 'run_commands', 'supports_sessions'] - result['device_operations'] = self.get_device_operations() - result.update(self.get_option_values()) - - return json.dumps(result) - - def set_cli_prompt_context(self): - """ - Make sure we are in the operational cli mode - :return: None - """ - if self._connection.connected: - self._update_cli_prompt_context(config_context='(config', exit_command='abort') - - def _get_command_with_output(self, command, output): - options_values = self.get_option_values() - if output not in options_values['output']: - raise ValueError("'output' value %s is invalid. Valid values are %s" % (output, ','.join(options_values['output']))) - - if output == 'json' and not command.endswith('| json'): - cmd = '%s | json' % command - else: - cmd = command - return cmd diff --git a/lib/ansible/plugins/doc_fragments/eos.py b/lib/ansible/plugins/doc_fragments/eos.py deleted file mode 100644 index d6fbc1caf5..0000000000 --- a/lib/ansible/plugins/doc_fragments/eos.py +++ /dev/null @@ -1,115 +0,0 @@ -# -*- coding: utf-8 -*- - -# Copyright: (c) 2015, Peter Sprygada -# GNU General Public License v3.0+ (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt) - - -class ModuleDocFragment(object): - - # Standard files documentation fragment - DOCUMENTATION = r''' -options: - provider: - description: - - B(Deprecated) - - "Starting with Ansible 2.5 we recommend using C(connection: network_cli)." - - This option is only required if you are using eAPI. - - For more information please see the L(EOS Platform Options guide, ../network/user_guide/platform_eos.html). - - HORIZONTALLINE - - A dict object containing connection details. - type: dict - suboptions: - host: - description: - - Specifies the DNS host name or address for connecting to the remote - device over the specified transport. The value of host is used as - the destination address for the transport. - type: str - required: true - port: - description: - - Specifies the port to use when building the connection to the remote - device. This value applies to either I(cli) or I(eapi). - - The port value will default to the appropriate transport common port - if none is provided in the task (cli=22, http=80, https=443). - type: int - default: 0 - username: - description: - - Configures the username to use to authenticate the connection to - the remote device. This value is used to authenticate - either the CLI login or the eAPI authentication depending on which - transport is used. If the value is not specified in the task, the - value of environment variable C(ANSIBLE_NET_USERNAME) will be used instead. - type: str - password: - description: - - Specifies the password to use to authenticate the connection to - the remote device. This is a common argument used for either I(cli) - or I(eapi) transports. If the value is not specified in the task, the - value of environment variable C(ANSIBLE_NET_PASSWORD) will be used instead. - type: str - timeout: - description: - - Specifies the timeout in seconds for communicating with the network device - for either connecting or sending commands. If the timeout is - exceeded before the operation is completed, the module will error. - type: int - ssh_keyfile: - description: - - Specifies the SSH keyfile to use to authenticate the connection to - the remote device. This argument is only used for I(cli) transports. - If the value is not specified in the task, the value of environment - variable C(ANSIBLE_NET_SSH_KEYFILE) will be used instead. - type: path - authorize: - description: - - Instructs the module to enter privileged mode on the remote device - before sending any commands. If not specified, the device will - attempt to execute all commands in non-privileged mode. If the value - is not specified in the task, the value of environment variable - C(ANSIBLE_NET_AUTHORIZE) will be used instead. - type: bool - default: no - auth_pass: - description: - - Specifies the password to use if required to enter privileged mode - on the remote device. If I(authorize) is false, then this argument - does nothing. If the value is not specified in the task, the value of - environment variable C(ANSIBLE_NET_AUTH_PASS) will be used instead. - type: str - transport: - description: - - Configures the transport connection to use when connecting to the - remote device. - required: true - type: str - choices: [ cli, eapi ] - default: cli - use_ssl: - description: - - Configures the I(transport) to use SSL if set to C(yes) only when the - C(transport=eapi). If the transport - argument is not eapi, this value is ignored. - type: bool - default: yes - validate_certs: - description: - - If C(no), SSL certificates will not be validated. This should only be used - on personally controlled sites using self-signed certificates. If the transport - argument is not eapi, this value is ignored. - type: bool - default: true - use_proxy: - description: - - If C(no), the environment variables C(http_proxy) and C(https_proxy) will be ignored. - type: bool - default: yes - version_added: "2.5" - -notes: - - For information on using CLI, eAPI and privileged mode see the :ref:`EOS Platform Options guide ` - - For more information on using Ansible to manage network devices see the :ref:`Ansible Network Guide ` - - For more information on using Ansible to manage Arista EOS devices see the `Arista integration page `_. - -''' diff --git a/lib/ansible/plugins/httpapi/eos.py b/lib/ansible/plugins/httpapi/eos.py deleted file mode 100644 index 325c31ede6..0000000000 --- a/lib/ansible/plugins/httpapi/eos.py +++ /dev/null @@ -1,171 +0,0 @@ -# (c) 2018 Red Hat Inc. -# GNU General Public License v3.0+ (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt) - -from __future__ import (absolute_import, division, print_function) -__metaclass__ = type - -DOCUMENTATION = """ ---- -author: Ansible Networking Team -httpapi: eos -short_description: Use eAPI to run command on eos platform -description: - - This eos plugin provides low level abstraction api's for - sending and receiving CLI commands with eos network devices. -version_added: "2.6" -options: - eos_use_sessions: - type: int - default: 1 - description: - - Specifies if sessions should be used on remote host or not - env: - - name: ANSIBLE_EOS_USE_SESSIONS - vars: - - name: ansible_eos_use_sessions - version_added: '2.8' -""" - -import json - -from ansible.module_utils._text import to_text -from ansible.module_utils.connection import ConnectionError -from ansible.module_utils.network.common.utils import to_list -from ansible.plugins.httpapi import HttpApiBase - - -OPTIONS = { - 'format': ['text', 'json'], - 'diff_match': ['line', 'strict', 'exact', 'none'], - 'diff_replace': ['line', 'block', 'config'], - 'output': ['text', 'json'] -} - - -class HttpApi(HttpApiBase): - def __init__(self, *args, **kwargs): - super(HttpApi, self).__init__(*args, **kwargs) - self._device_info = None - self._session_support = None - - def supports_sessions(self): - use_session = self.get_option('eos_use_sessions') - try: - use_session = int(use_session) - except ValueError: - pass - - if not bool(use_session): - self._session_support = False - else: - if self._session_support: - return self._session_support - - response = self.send_request('show configuration sessions') - self._session_support = 'error' not in response - - return self._session_support - - def send_request(self, data, **message_kwargs): - data = to_list(data) - become = self._become - if become: - self.connection.queue_message('vvvv', 'firing event: on_become') - data.insert(0, {"cmd": "enable", "input": self._become_pass}) - - output = message_kwargs.get('output', 'text') - request = request_builder(data, output) - headers = {'Content-Type': 'application/json-rpc'} - - response, response_data = self.connection.send('/command-api', request, headers=headers, method='POST') - - try: - response_data = json.loads(to_text(response_data.getvalue())) - except ValueError: - raise ConnectionError('Response was not valid JSON, got {0}'.format( - to_text(response_data.getvalue()) - )) - - results = handle_response(response_data) - - if become: - results = results[1:] - if len(results) == 1: - results = results[0] - - return results - - def get_device_info(self): - if self._device_info: - return self._device_info - - device_info = {} - - device_info['network_os'] = 'eos' - reply = self.send_request('show version', output='json') - data = json.loads(reply) - - device_info['network_os_version'] = data['version'] - device_info['network_os_model'] = data['modelName'] - - reply = self.send_request('show hostname | json') - data = json.loads(reply) - - device_info['network_os_hostname'] = data['hostname'] - - self._device_info = device_info - return self._device_info - - def get_device_operations(self): - return { - 'supports_diff_replace': True, - 'supports_commit': bool(self.supports_sessions()), - 'supports_rollback': False, - 'supports_defaults': False, - 'supports_onbox_diff': bool(self.supports_sessions()), - 'supports_commit_comment': False, - 'supports_multiline_delimiter': False, - 'supports_diff_match': True, - 'supports_diff_ignore_lines': True, - 'supports_generate_diff': not bool(self.supports_sessions()), - 'supports_replace': bool(self.supports_sessions()), - } - - def get_capabilities(self): - result = {} - result['rpc'] = [] - result['device_info'] = self.get_device_info() - result['device_operations'] = self.get_device_operations() - result.update(OPTIONS) - result['network_api'] = 'eapi' - - return json.dumps(result) - - -def handle_response(response): - if 'error' in response: - error = response['error'] - - error_text = [] - for data in error['data']: - error_text.extend(data.get('errors', [])) - error_text = '\n'.join(error_text) or error['message'] - - raise ConnectionError(error_text, code=error['code']) - - results = [] - - for result in response['result']: - if 'messages' in result: - results.append(result['messages'][0]) - elif 'output' in result: - results.append(result['output'].strip()) - else: - results.append(json.dumps(result)) - - return results - - -def request_builder(commands, output, reqid=None): - params = dict(version=1, cmds=commands, format=output) - return json.dumps(dict(jsonrpc='2.0', id=reqid, method='runCmds', params=params)) diff --git a/lib/ansible/plugins/terminal/eos.py b/lib/ansible/plugins/terminal/eos.py deleted file mode 100644 index 799a434c35..0000000000 --- a/lib/ansible/plugins/terminal/eos.py +++ /dev/null @@ -1,92 +0,0 @@ -# -# (c) 2016 Red Hat Inc. -# -# This file is part of Ansible -# -# Ansible is free software: you can redistribute it and/or modify -# it under the terms of the GNU General Public License as published by -# the Free Software Foundation, either version 3 of the License, or -# (at your option) any later version. -# -# Ansible is distributed in the hope that it will be useful, -# but WITHOUT ANY WARRANTY; without even the implied warranty of -# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the -# GNU General Public License for more details. -# -# You should have received a copy of the GNU General Public License -# along with Ansible. If not, see . -# -from __future__ import (absolute_import, division, print_function) -__metaclass__ = type - -import re -import json - -from ansible.plugins.terminal import TerminalBase -from ansible.errors import AnsibleConnectionFailure -from ansible.module_utils._text import to_bytes, to_text - - -class TerminalModule(TerminalBase): - - terminal_stdout_re = [ - re.compile(br"[\r\n]?[\w+\-\.:\/\[\]]+(?:\([^\)]+\)){,3}(?:>|#) ?$"), - re.compile(br"\[\w+\@[\w\-\.]+(?: [^\]])\] ?[>#\$] ?$") - ] - - terminal_stderr_re = [ - re.compile(br"% ?Error"), - # re.compile(br"^% \w+", re.M), - re.compile(br"% User not present"), - re.compile(br"% ?Bad secret"), - re.compile(br"invalid input", re.I), - re.compile(br"(?:incomplete|ambiguous) command", re.I), - re.compile(br"connection timed out", re.I), - # Strings like this regarding VLANs are not errors - re.compile(br"[^\r\n]+ not found(?! in current VLAN)", re.I), - re.compile(br"'[^']' +returned error code: ?\d+"), - re.compile(br"[^\r\n](?