def main(): """ Main function """ argument_spec = dict(credential=dict(required=True, type='dict', no_log=True), vfid=dict(required=False, type='int'), throttle=dict(required=False, type='float'), gather_subset=dict(required=True, type='list')) module = AnsibleModule(argument_spec=argument_spec, supports_check_mode=False) input_params = module.params # Set up state variables fos_ip_addr = input_params['credential']['fos_ip_addr'] fos_user_name = input_params['credential']['fos_user_name'] fos_password = input_params['credential']['fos_password'] https = input_params['credential']['https'] ssh_hostkeymust = True if 'ssh_hostkeymust' in input_params['credential']: ssh_hostkeymust = input_params['credential']['ssh_hostkeymust'] throttle = input_params['throttle'] vfid = input_params['vfid'] gather_subset = input_params['gather_subset'] result = {"changed": False} if vfid is None: vfid = 128 ret_code, auth, fos_version = login(fos_ip_addr, fos_user_name, fos_password, https, throttle, result) if ret_code != 0: module.exit_json(**result) facts = {} facts['ssh_hostkeymust'] = ssh_hostkeymust for area in valid_areas: if (gather_subset is None or area in gather_subset or "all" in gather_subset): if area == "brocade_interface_fibrechannel": ret_code, response = fc_port_get(fos_ip_addr, https, auth, vfid, result) if ret_code != 0: exit_after_login(fos_ip_addr, https, auth, result, module) interface = {} interface["fibrechannel"] = ( response["Response"]["fibrechannel"]) for port in interface["fibrechannel"]: to_human_fc(port) ret_code, response = fc_port_stats_get(fos_ip_addr, https, auth, vfid, result) if ret_code != 0: exit_after_login(fos_ip_addr, https, auth, result, module) interface["fibrechannel-statistics"] = ( response["Response"]["fibrechannel-statistics"]) facts[area] = interface if area == "brocade_zoning": ret_code, response = defined_get(fos_ip_addr, https, auth, vfid, result) if ret_code != 0: exit_after_login(fos_ip_addr, https, auth, result, module) zoning = {} zoning["defined-configuration"] = ( response["Response"]["defined-configuration"]) ret_code, response = effective_get(fos_ip_addr, https, auth, vfid, result) if ret_code != 0: exit_after_login(fos_ip_addr, https, auth, result, module) zoning["effective-configuration"] = ( response["Response"]["effective-configuration"]) to_human_zoning(zoning["effective-configuration"]) facts[area] = zoning if area == "brocade_chassis": ret_code, response = chassis_get(fos_user_name, fos_password, fos_ip_addr, fos_version, https, auth, vfid, result, ssh_hostkeymust) if ret_code != 0: exit_after_login(fos_ip_addr, https, auth, result, module) to_human_chassis(response["Response"]["chassis"]) facts[area] = response["Response"]["chassis"] if area == "brocade_fibrechannel_configuration_fabric": ret_code, response = fabric_get(fos_user_name, fos_password, fos_ip_addr, fos_version, https, auth, vfid, result, ssh_hostkeymust) if ret_code != 0: exit_after_login(fos_ip_addr, https, auth, result, module) to_human_fabric(response["Response"]["fabric"]) facts[area] = response["Response"]["fabric"] if area == "brocade_fibrechannel_configuration_port_configuration": ret_code, response = port_configuration_get( fos_user_name, fos_password, fos_ip_addr, fos_version, https, auth, vfid, result, ssh_hostkeymust) if ret_code != 0: exit_after_login(fos_ip_addr, https, auth, result, module) to_human_port_configuration( response["Response"]["port-configuration"]) facts[area] = response["Response"]["port-configuration"] if area == "brocade_fibrechannel_switch": ret_code, response = fc_switch_get(fos_user_name, fos_password, fos_ip_addr, fos_version, https, auth, vfid, result, ssh_hostkeymust) if ret_code != 0: exit_after_login(fos_ip_addr, https, auth, result, module) to_human_switch(response["Response"]["fibrechannel-switch"]) facts[area] = response["Response"]["fibrechannel-switch"] if area == "brocade_time_clock_server": ret_code, response = clock_server_get(fos_ip_addr, https, auth, vfid, result) if ret_code != 0: exit_after_login(fos_ip_addr, https, auth, result, module) to_human_clock_server(response["Response"]["clock-server"]) facts[area] = response["Response"]["clock-server"] if area == "brocade_time_time_zone": ret_code, response = time_zone_get(fos_ip_addr, https, auth, vfid, result) if ret_code != 0: exit_after_login(fos_ip_addr, https, auth, result, module) to_human_time_zone(response["Response"]["time-zone"]) facts[area] = response["Response"]["time-zone"] if area == "brocade_logging_syslog_server": ret_code, response = syslog_server_get(fos_ip_addr, https, auth, vfid, result) if ret_code != 0: exit_after_login(fos_ip_addr, https, auth, result, module) if isinstance(response["Response"]["syslog-server"], list): servers = response["Response"]["syslog-server"] else: servers = [response["Response"]["syslog-server"]] for server in servers: to_human_syslog_server(server) facts[area] = servers if area == "brocade_logging_audit": ret_code, response = audit_get(fos_ip_addr, https, auth, vfid, result) if ret_code != 0: exit_after_login(fos_ip_addr, https, auth, result, module) to_human_audit(response["Response"]["audit"]) facts[area] = response["Response"]["audit"] if area == "brocade_snmp_system": ret_code, response = system_get(fos_user_name, fos_password, fos_ip_addr, fos_version, https, auth, vfid, result) if ret_code != 0: exit_after_login(fos_ip_addr, https, auth, result, module) to_human_system(response["Response"]["system"]) facts[area] = response["Response"]["system"] if area == "brocade_security_ipfilter_rule": ret_code, response = ipfilter_rule_get(fos_ip_addr, https, auth, vfid, result) if ret_code != 0: exit_after_login(fos_ip_addr, https, auth, result, module) for rule in response["Response"]["ipfilter-rule"]: to_human_ipfilter_rule(rule) facts[area] = response["Response"]["ipfilter-rule"] if area == "brocade_security_ipfilter_policy": ret_code, response = ipfilter_policy_get( fos_ip_addr, https, auth, vfid, result) if ret_code != 0: exit_after_login(fos_ip_addr, https, auth, result, module) for rule in response["Response"]["ipfilter-policy"]: to_human_ipfilter_policy(rule) facts[area] = response["Response"]["ipfilter-policy"] if area == "brocade_security_user_config": ret_code, response = user_config_get(fos_ip_addr, https, auth, vfid, result) if ret_code != 0: exit_after_login(fos_ip_addr, https, auth, result, module) for rule in response["Response"]["user-config"]: to_human_user_config(rule) facts[area] = response["Response"]["user-config"] result["ansible_facts"] = facts logout(fos_ip_addr, https, auth, result) module.exit_json(**result)
def main(): """ Main function """ argument_spec = dict( credential=dict(required=True, type='dict'), vfid=dict(required=False, type='int'), throttle=dict(required=False, type='float'), ipfilter_rules=dict(required=True, type='list')) module = AnsibleModule( argument_spec=argument_spec, supports_check_mode=True ) input_params = module.params # Set up state variables fos_ip_addr = input_params['credential']['fos_ip_addr'] fos_user_name = input_params['credential']['fos_user_name'] fos_password = input_params['credential']['fos_password'] https = input_params['credential']['https'] throttle = input_params['throttle'] vfid = input_params['vfid'] ipfilter_rules = input_params['ipfilter_rules'] result = {"changed": False} if vfid is None: vfid = 128 ret_code, auth, fos_version = login(fos_ip_addr, fos_user_name, fos_password, https, throttle, result) if ret_code != 0: module.exit_json(**result) ret_code, response = ipfilter_rule_get( fos_ip_addr, https, auth, vfid, result) if ret_code != 0: exit_after_login(fos_ip_addr, https, auth, result, module) resp_ir = response["Response"]["ipfilter-rule"] if isinstance(resp_ir, list): c_rules = resp_ir else: c_rules = [resp_ir] # convert everything to human readable from REST for c_rule in c_rules: to_human_ipfilter_rule(c_rule) diff_rules = [] for new_ir in ipfilter_rules: for c_rule in c_rules: if new_ir["policy_name"] == c_rule["policy_name"] and str(new_ir["index"]) == c_rule["index"]: diff_attributes = generate_diff(result, c_rule, new_ir) if len(diff_attributes) > 0: result["c_rule"] = c_rule diff_attributes["policy_name"] = new_ir["policy_name"] diff_attributes["index"] = new_ir["index"] ret_code = to_fos_ipfilter_rule(diff_attributes, result) result["retcode"] = ret_code if ret_code != 0: exit_after_login(fos_ip_addr, https, auth, result, module) diff_rules.append(diff_attributes) add_rules = [] for new_ir in ipfilter_rules: found = False for c_rule in c_rules: if new_ir["policy_name"] == c_rule["policy_name"] and str(new_ir["index"]) == c_rule["index"]: found = True if not found: new_yang_rule = {} for k, v in new_ir.items(): new_yang_rule[k] = v ret_code = to_fos_ipfilter_rule(new_yang_rule, result) result["retcode"] = ret_code if ret_code != 0: exit_after_login(fos_ip_addr, https, auth, result, module) add_rules.append(new_yang_rule) delete_rules = [] for c_rule in c_rules: found = False for new_ir in ipfilter_rules: if new_ir["policy_name"] == c_rule["policy_name"] and str(new_ir["index"]) == c_rule["index"]: found = True if not found: delete_rule = {} delete_rule["policy-name"] = c_rule["policy_name"] delete_rule["index"] = c_rule["index"] delete_rules.append(delete_rule) result["resp_ir"] = resp_ir result["ipfilter_rules"] = ipfilter_rules result["diff_rules"] = diff_rules result["add_rules"] = add_rules result["delete_rules"] = delete_rules if len(diff_rules) > 0: if not module.check_mode: ret_code = ipfilter_rule_patch( fos_ip_addr, https, auth, vfid, result, diff_rules) if ret_code != 0: exit_after_login(fos_ip_addr, https, auth, result, module) result["changed"] = True if len(add_rules) > 0: if not module.check_mode: ret_code = ipfilter_rule_post( fos_ip_addr, https, auth, vfid, result, add_rules) if ret_code != 0: exit_after_login(fos_ip_addr, https, auth, result, module) result["changed"] = True # if len(delete_rules) > 0: # if not module.check_mode: # ret_code = ipfilter_rule_delete( # fos_ip_addr, https, # auth, vfid, result, delete_rules) # if ret_code != 0: # exit_after_login(fos_ip_addr, https, auth, result, module) # # result["changed"] = True logout(fos_ip_addr, https, auth, result) module.exit_json(**result)