����JFIF���������
__ __ __ __ _____ _ _ _____ _ _ _ | \/ | \ \ / / | __ \ (_) | | / ____| | | | | | \ / |_ __\ V / | |__) | __ ___ ____ _| |_ ___ | (___ | |__ ___| | | | |\/| | '__|> < | ___/ '__| \ \ / / _` | __/ _ \ \___ \| '_ \ / _ \ | | | | | | |_ / . \ | | | | | |\ V / (_| | || __/ ____) | | | | __/ | | |_| |_|_(_)_/ \_\ |_| |_| |_| \_/ \__,_|\__\___| |_____/|_| |_|\___V 2.1 if you need WebShell for Seo everyday contact me on Telegram Telegram Address : @jackleetFor_More_Tools:
#
# This file is part of Ansible
#
# Ansible is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation, either version 3 of the License, or
# (at your option) any later version.
#
# Ansible is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with Ansible. If not, see <http://www.gnu.org/licenses/>.
#
from __future__ import (absolute_import, division, print_function)
__metaclass__ = type
DOCUMENTATION = '''
---
module: ce_acl
short_description: Manages base ACL configuration on HUAWEI CloudEngine switches.
description:
- Manages base ACL configurations on HUAWEI CloudEngine switches.
author:
- wangdezhuang (@QijunPan)
notes:
- This module requires the netconf system service be enabled on the remote device being managed.
- Recommended connection is C(netconf).
- This module also works with C(local) connections for legacy playbooks.
options:
state:
description:
- Specify desired state of the resource.
default: present
choices: ['present','absent','delete_acl']
acl_name:
description:
- ACL number or name.
For a numbered rule group, the value ranging from 2000 to 2999 indicates a basic ACL.
For a named rule group, the value is a string of 1 to 32 case-sensitive characters starting
with a letter, spaces not supported.
required: true
acl_num:
description:
- ACL number.
The value is an integer ranging from 2000 to 2999.
acl_step:
description:
- ACL step.
The value is an integer ranging from 1 to 20. The default value is 5.
acl_description:
description:
- ACL description.
The value is a string of 1 to 127 characters.
rule_name:
description:
- Name of a basic ACL rule.
The value is a string of 1 to 32 characters.
The value is case-insensitive, and cannot contain spaces or begin with an underscore (_).
rule_id:
description:
- ID of a basic ACL rule in configuration mode.
The value is an integer ranging from 0 to 4294967294.
rule_action:
description:
- Matching mode of basic ACL rules.
choices: ['permit','deny']
source_ip:
description:
- Source IP address.
The value is a string of 0 to 255 characters.The default value is 0.0.0.0.
The value is in dotted decimal notation.
src_mask:
description:
- Mask of a source IP address.
The value is an integer ranging from 1 to 32.
frag_type:
description:
- Type of packet fragmentation.
choices: ['fragment', 'clear_fragment']
vrf_name:
description:
- VPN instance name.
The value is a string of 1 to 31 characters.The default value is _public_.
time_range:
description:
- Name of a time range in which an ACL rule takes effect.
The value is a string of 1 to 32 characters.
The value is case-insensitive, and cannot contain spaces. The name must start with an uppercase
or lowercase letter. In addition, the word "all" cannot be specified as a time range name.
rule_description:
description:
- Description about an ACL rule.
The value is a string of 1 to 127 characters.
log_flag:
description:
- Flag of logging matched data packets.
type: bool
default: 'no'
'''
EXAMPLES = '''
- name: CloudEngine acl test
hosts: cloudengine
connection: local
gather_facts: no
tasks:
- name: "Config ACL"
community.network.ce_acl:
state: present
acl_name: 2200
- name: "Undo ACL"
community.network.ce_acl:
state: delete_acl
acl_name: 2200
- name: "Config ACL base rule"
community.network.ce_acl:
state: present
acl_name: 2200
rule_name: test_rule
rule_id: 111
rule_action: permit
source_ip: 10.10.10.10
src_mask: 24
frag_type: fragment
time_range: wdz_acl_time
- name: "undo ACL base rule"
community.network.ce_acl:
state: absent
acl_name: 2200
rule_name: test_rule
rule_id: 111
rule_action: permit
source_ip: 10.10.10.10
src_mask: 24
frag_type: fragment
time_range: wdz_acl_time
'''
RETURN = '''
changed:
description: check to see if a change was made on the device
returned: always
type: bool
sample: true
proposed:
description: k/v pairs of parameters passed into module
returned: always
type: dict
sample: {"acl_name": "test", "state": "delete_acl"}
existing:
description: k/v pairs of existing aaa server
returned: always
type: dict
sample: {"aclNumOrName": "test", "aclType": "Basic"}
end_state:
description: k/v pairs of aaa params after module execution
returned: always
type: dict
sample: {}
updates:
description: command sent to the device
returned: always
type: list
sample: ["undo acl name test"]
'''
from xml.etree import ElementTree
from ansible.module_utils.basic import AnsibleModule
from ansible_collections.community.network.plugins.module_utils.network.cloudengine.ce import get_nc_config, set_nc_config, ce_argument_spec, check_ip_addr
# get acl
CE_GET_ACL_HEADER = """
<filter type="subtree">
<acl xmlns="http://www.huawei.com/netconf/vrp" content-version="1.0" format-version="1.0">
<aclGroups>
<aclGroup>
<aclNumOrName></aclNumOrName>
"""
CE_GET_ACL_TAIL = """
</aclGroup>
</aclGroups>
</acl>
</filter>
"""
# merge acl
CE_MERGE_ACL_HEADER = """
<config>
<acl xmlns="http://www.huawei.com/netconf/vrp" content-version="1.0" format-version="1.0">
<aclGroups>
<aclGroup operation="merge">
<aclNumOrName>%s</aclNumOrName>
"""
CE_MERGE_ACL_TAIL = """
</aclGroup>
</aclGroups>
</acl>
</config>
"""
# delete acl
CE_DELETE_ACL_HEADER = """
<config>
<acl xmlns="http://www.huawei.com/netconf/vrp" content-version="1.0" format-version="1.0">
<aclGroups>
<aclGroup operation="delete">
<aclNumOrName>%s</aclNumOrName>
"""
CE_DELETE_ACL_TAIL = """
</aclGroup>
</aclGroups>
</acl>
</config>
"""
# get acl base rule
CE_GET_ACL_BASE_RULE_HEADER = """
<filter type="subtree">
<acl xmlns="http://www.huawei.com/netconf/vrp" content-version="1.0" format-version="1.0">
<aclGroups>
<aclGroup>
<aclNumOrName>%s</aclNumOrName>
<aclRuleBas4s>
<aclRuleBas4>
<aclRuleName></aclRuleName>
"""
CE_GET_ACL_BASE_RULE_TAIL = """
</aclRuleBas4>
</aclRuleBas4s>
</aclGroup>
</aclGroups>
</acl>
</filter>
"""
# merge acl base rule
CE_MERGE_ACL_BASE_RULE_HEADER = """
<config>
<acl xmlns="http://www.huawei.com/netconf/vrp" content-version="1.0" format-version="1.0">
<aclGroups>
<aclGroup>
<aclNumOrName>%s</aclNumOrName>
<aclRuleBas4s>
<aclRuleBas4 operation="merge">
<aclRuleName>%s</aclRuleName>
"""
CE_MERGE_ACL_BASE_RULE_TAIL = """
</aclRuleBas4>
</aclRuleBas4s>
</aclGroup>
</aclGroups>
</acl>
</config>
"""
# delete acl base rule
CE_DELETE_ACL_BASE_RULE_HEADER = """
<config>
<acl xmlns="http://www.huawei.com/netconf/vrp" content-version="1.0" format-version="1.0">
<aclGroups>
<aclGroup>
<aclNumOrName>%s</aclNumOrName>
<aclRuleBas4s>
<aclRuleBas4 operation="delete">
<aclRuleName>%s</aclRuleName>
"""
CE_DELETE_ACL_BASE_RULE_TAIL = """
</aclRuleBas4>
</aclRuleBas4s>
</aclGroup>
</aclGroups>
</acl>
</config>
"""
class BaseAcl(object):
""" Manages base acl configuration """
def __init__(self, **kwargs):
""" Class init """
# argument spec
argument_spec = kwargs["argument_spec"]
self.spec = argument_spec
self.module = AnsibleModule(argument_spec=self.spec, supports_check_mode=True)
# module args
self.state = self.module.params['state']
self.acl_name = self.module.params['acl_name'] or None
self.acl_num = self.module.params['acl_num'] or None
self.acl_type = None
self.acl_step = self.module.params['acl_step'] or None
self.acl_description = self.module.params['acl_description'] or None
self.rule_name = self.module.params['rule_name'] or None
self.rule_id = self.module.params['rule_id'] or None
self.rule_action = self.module.params['rule_action'] or None
self.source_ip = self.module.params['source_ip'] or None
self.src_mask = self.module.params['src_mask'] or None
self.src_wild = None
self.frag_type = self.module.params['frag_type'] or None
self.vrf_name = self.module.params['vrf_name'] or None
self.time_range = self.module.params['time_range'] or None
self.rule_description = self.module.params['rule_description'] or None
self.log_flag = self.module.params['log_flag']
# cur config
self.cur_acl_cfg = dict()
self.cur_base_rule_cfg = dict()
# state
self.changed = False
self.updates_cmd = list()
self.results = dict()
self.proposed = dict()
self.existing = dict()
self.end_state = dict()
def netconf_get_config(self, conf_str):
""" Get configure by netconf """
xml_str = get_nc_config(self.module, conf_str)
return xml_str
def netconf_set_config(self, conf_str):
""" Set configure by netconf """
xml_str = set_nc_config(self.module, conf_str)
return xml_str
def get_wildcard_mask(self):
""" convert mask length to ip address wildcard mask, i.e. 24 to 0.0.0.255 """
mask_int = ["255"] * 4
value = int(self.src_mask)
if value > 32:
self.module.fail_json(msg='Error: IPv4 ipaddress mask length is invalid.')
if value < 8:
mask_int[0] = str(int(~(0xFF << (8 - value % 8)) & 0xFF))
if value >= 8:
mask_int[0] = '0'
mask_int[1] = str(int(~(0xFF << (16 - (value % 16))) & 0xFF))
if value >= 16:
mask_int[1] = '0'
mask_int[2] = str(int(~(0xFF << (24 - (value % 24))) & 0xFF))
if value >= 24:
mask_int[2] = '0'
mask_int[3] = str(int(~(0xFF << (32 - (value % 32))) & 0xFF))
if value == 32:
mask_int[3] = '0'
return '.'.join(mask_int)
def check_acl_args(self):
""" Check acl invalid args """
need_cfg = False
find_flag = False
self.cur_acl_cfg["acl_info"] = []
if self.acl_name:
if self.acl_name.isdigit():
if int(self.acl_name) < 2000 or int(self.acl_name) > 2999:
self.module.fail_json(
msg='Error: The value of acl_name is out of [2000-2999] for base ACL.')
if self.acl_num:
self.module.fail_json(
msg='Error: The acl_name is digit, so should not input acl_num at the same time.')
else:
self.acl_type = "Basic"
if len(self.acl_name) < 1 or len(self.acl_name) > 32:
self.module.fail_json(
msg='Error: The len of acl_name is out of [1 - 32].')
if self.state == "present":
if not self.acl_num and not self.acl_type and not self.rule_name:
self.module.fail_json(
msg='Error: Please input acl_num or acl_type when config ACL.')
if self.acl_num:
if self.acl_num.isdigit():
if int(self.acl_num) < 2000 or int(self.acl_num) > 2999:
self.module.fail_json(
msg='Error: The value of acl_name is out of [2000-2999] for base ACL.')
else:
self.module.fail_json(
msg='Error: The acl_num is not digit.')
if self.acl_step:
if self.acl_step.isdigit():
if int(self.acl_step) < 1 or int(self.acl_step) > 20:
self.module.fail_json(
msg='Error: The value of acl_step is out of [1 - 20].')
else:
self.module.fail_json(
msg='Error: The acl_step is not digit.')
if self.acl_description:
if len(self.acl_description) < 1 or len(self.acl_description) > 127:
self.module.fail_json(
msg='Error: The len of acl_description is out of [1 - 127].')
conf_str = CE_GET_ACL_HEADER
if self.acl_type:
conf_str += "<aclType></aclType>"
if self.acl_num or self.acl_name.isdigit():
conf_str += "<aclNumber></aclNumber>"
if self.acl_step:
conf_str += "<aclStep></aclStep>"
if self.acl_description:
conf_str += "<aclDescription></aclDescription>"
conf_str += CE_GET_ACL_TAIL
recv_xml = self.netconf_get_config(conf_str=conf_str)
if "<data/>" in recv_xml:
find_flag = False
else:
xml_str = recv_xml.replace('\r', '').replace('\n', '').\
replace('xmlns="urn:ietf:params:xml:ns:netconf:base:1.0"', "").\
replace('xmlns="http://www.huawei.com/netconf/vrp"', "")
root = ElementTree.fromstring(xml_str)
# parse acl
acl_info = root.findall(
"acl/aclGroups/aclGroup")
if acl_info:
for tmp in acl_info:
tmp_dict = dict()
for site in tmp:
if site.tag in ["aclNumOrName", "aclType", "aclNumber", "aclStep", "aclDescription"]:
tmp_dict[site.tag] = site.text
self.cur_acl_cfg["acl_info"].append(tmp_dict)
if self.cur_acl_cfg["acl_info"]:
find_list = list()
for tmp in self.cur_acl_cfg["acl_info"]:
cur_cfg_dict = dict()
exist_cfg_dict = dict()
if self.acl_name:
if self.acl_name.isdigit() and tmp.get("aclNumber"):
cur_cfg_dict["aclNumber"] = self.acl_name
exist_cfg_dict["aclNumber"] = tmp.get("aclNumber")
else:
cur_cfg_dict["aclNumOrName"] = self.acl_name
exist_cfg_dict["aclNumOrName"] = tmp.get("aclNumOrName")
if self.acl_type:
cur_cfg_dict["aclType"] = self.acl_type
exist_cfg_dict["aclType"] = tmp.get("aclType")
if self.acl_num:
cur_cfg_dict["aclNumber"] = self.acl_num
exist_cfg_dict["aclNumber"] = tmp.get("aclNumber")
if self.acl_step:
cur_cfg_dict["aclStep"] = self.acl_step
exist_cfg_dict["aclStep"] = tmp.get("aclStep")
if self.acl_description:
cur_cfg_dict["aclDescription"] = self.acl_description
exist_cfg_dict["aclDescription"] = tmp.get("aclDescription")
if cur_cfg_dict == exist_cfg_dict:
find_bool = True
else:
find_bool = False
find_list.append(find_bool)
for mem in find_list:
if mem:
find_flag = True
break
else:
find_flag = False
else:
find_flag = False
if self.state == "present":
need_cfg = bool(not find_flag)
elif self.state == "delete_acl":
need_cfg = bool(find_flag)
else:
need_cfg = False
self.cur_acl_cfg["need_cfg"] = need_cfg
def check_base_rule_args(self):
""" Check base rule invalid args """
need_cfg = False
find_flag = False
self.cur_base_rule_cfg["base_rule_info"] = []
if self.acl_name:
if self.state == "absent":
if not self.rule_name:
self.module.fail_json(
msg='Error: Please input rule_name when state is absent.')
# config rule
if self.rule_name:
if len(self.rule_name) < 1 or len(self.rule_name) > 32:
self.module.fail_json(
msg='Error: The len of rule_name is out of [1 - 32].')
if self.state != "delete_acl" and not self.rule_id:
self.module.fail_json(
msg='Error: Please input rule_id.')
if self.rule_id:
if self.rule_id.isdigit():
if int(self.rule_id) < 0 or int(self.rule_id) > 4294967294:
self.module.fail_json(
msg='Error: The value of rule_id is out of [0 - 4294967294].')
else:
self.module.fail_json(
msg='Error: The rule_id is not digit.')
if self.source_ip:
if not check_ip_addr(self.source_ip):
self.module.fail_json(
msg='Error: The source_ip %s is invalid.' % self.source_ip)
if not self.src_mask:
self.module.fail_json(
msg='Error: Please input src_mask.')
if self.src_mask:
if self.src_mask.isdigit():
if int(self.src_mask) < 1 or int(self.src_mask) > 32:
self.module.fail_json(
msg='Error: The src_mask is out of [1 - 32].')
self.src_wild = self.get_wildcard_mask()
else:
self.module.fail_json(
msg='Error: The src_mask is not digit.')
if self.vrf_name:
if len(self.vrf_name) < 1 or len(self.vrf_name) > 31:
self.module.fail_json(
msg='Error: The len of vrf_name is out of [1 - 31].')
if self.time_range:
if len(self.time_range) < 1 or len(self.time_range) > 32:
self.module.fail_json(
msg='Error: The len of time_range is out of [1 - 32].')
if self.rule_description:
if len(self.rule_description) < 1 or len(self.rule_description) > 127:
self.module.fail_json(
msg='Error: The len of rule_description is out of [1 - 127].')
if self.state != "delete_acl" and not self.rule_id:
self.module.fail_json(
msg='Error: Please input rule_id.')
conf_str = CE_GET_ACL_BASE_RULE_HEADER % self.acl_name
if self.rule_id:
conf_str += "<aclRuleID></aclRuleID>"
if self.rule_action:
conf_str += "<aclAction></aclAction>"
if self.source_ip:
conf_str += "<aclSourceIp></aclSourceIp>"
if self.src_wild:
conf_str += "<aclSrcWild></aclSrcWild>"
if self.frag_type:
conf_str += "<aclFragType></aclFragType>"
if self.vrf_name:
conf_str += "<vrfName></vrfName>"
if self.time_range:
conf_str += "<aclTimeName></aclTimeName>"
if self.rule_description:
conf_str += "<aclRuleDescription></aclRuleDescription>"
conf_str += "<aclLogFlag></aclLogFlag>"
conf_str += CE_GET_ACL_BASE_RULE_TAIL
recv_xml = self.netconf_get_config(conf_str=conf_str)
if "<data/>" in recv_xml:
find_flag = False
else:
xml_str = recv_xml.replace('\r', '').replace('\n', '').\
replace('xmlns="urn:ietf:params:xml:ns:netconf:base:1.0"', "").\
replace('xmlns="http://www.huawei.com/netconf/vrp"', "")
root = ElementTree.fromstring(xml_str)
# parse base rule
base_rule_info = root.findall(
"acl/aclGroups/aclGroup/aclRuleBas4s/aclRuleBas4")
if base_rule_info:
for tmp in base_rule_info:
tmp_dict = dict()
for site in tmp:
if site.tag in ["aclRuleName", "aclRuleID", "aclAction", "aclSourceIp", "aclSrcWild",
"aclFragType", "vrfName", "aclTimeName", "aclRuleDescription",
"aclLogFlag"]:
tmp_dict[site.tag] = site.text
self.cur_base_rule_cfg[
"base_rule_info"].append(tmp_dict)
if self.cur_base_rule_cfg["base_rule_info"]:
for tmp in self.cur_base_rule_cfg["base_rule_info"]:
find_flag = True
if self.rule_name and tmp.get("aclRuleName") != self.rule_name:
find_flag = False
if self.rule_id and tmp.get("aclRuleID") != self.rule_id:
find_flag = False
if self.rule_action and tmp.get("aclAction") != self.rule_action:
find_flag = False
if self.source_ip:
tmp_src_ip = self.source_ip.split(".")
tmp_src_wild = self.src_wild.split(".")
tmp_addr_item = []
for idx in range(4):
item1 = 255 - int(tmp_src_wild[idx])
item2 = item1 & int(tmp_src_ip[idx])
tmp_addr_item.append(item2)
tmp_addr = "%s.%s.%s.%s" % (tmp_addr_item[0], tmp_addr_item[1],
tmp_addr_item[2], tmp_addr_item[3])
if tmp_addr != tmp.get("aclSourceIp"):
find_flag = False
if self.src_wild and tmp.get("aclSrcWild") != self.src_wild:
find_flag = False
frag_type = "clear_fragment" if tmp.get("aclFragType") is None else tmp.get("aclFragType")
if self.frag_type and frag_type != self.frag_type:
find_flag = False
if self.vrf_name and tmp.get("vrfName") != self.vrf_name:
find_flag = False
if self.time_range and tmp.get("aclTimeName") != self.time_range:
find_flag = False
if self.rule_description and tmp.get("aclRuleDescription") != self.rule_description:
find_flag = False
if tmp.get("aclLogFlag") != str(self.log_flag).lower():
find_flag = False
if find_flag:
break
else:
find_flag = False
if self.state == "present":
need_cfg = bool(not find_flag)
elif self.state == "absent":
need_cfg = bool(find_flag)
else:
need_cfg = False
self.cur_base_rule_cfg["need_cfg"] = need_cfg
def get_proposed(self):
""" Get proposed state """
self.proposed["state"] = self.state
if self.acl_name:
self.proposed["acl_name"] = self.acl_name
if self.acl_num:
self.proposed["acl_num"] = self.acl_num
if self.acl_step:
self.proposed["acl_step"] = self.acl_step
if self.acl_description:
self.proposed["acl_description"] = self.acl_description
if self.rule_name:
self.proposed["rule_name"] = self.rule_name
if self.rule_id:
self.proposed["rule_id"] = self.rule_id
if self.rule_action:
self.proposed["rule_action"] = self.rule_action
if self.source_ip:
self.proposed["source_ip"] = self.source_ip
if self.src_mask:
self.proposed["src_mask"] = self.src_mask
if self.frag_type:
self.proposed["frag_type"] = self.frag_type
if self.vrf_name:
self.proposed["vrf_name"] = self.vrf_name
if self.time_range:
self.proposed["time_range"] = self.time_range
if self.rule_description:
self.proposed["rule_description"] = self.rule_description
if self.log_flag:
self.proposed["log_flag"] = self.log_flag
def get_existing(self):
""" Get existing state """
self.existing["acl_info"] = self.cur_acl_cfg["acl_info"]
self.existing["base_rule_info"] = self.cur_base_rule_cfg[
"base_rule_info"]
def get_end_state(self):
""" Get end state """
self.check_acl_args()
self.end_state["acl_info"] = self.cur_acl_cfg["acl_info"]
self.check_base_rule_args()
self.end_state["base_rule_info"] = self.cur_base_rule_cfg[
"base_rule_info"]
def merge_acl(self):
""" Merge acl operation """
conf_str = CE_MERGE_ACL_HEADER % self.acl_name
if self.acl_type:
conf_str += "<aclType>%s</aclType>" % self.acl_type
if self.acl_num:
conf_str += "<aclNumber>%s</aclNumber>" % self.acl_num
if self.acl_step:
conf_str += "<aclStep>%s</aclStep>" % self.acl_step
if self.acl_description:
conf_str += "<aclDescription>%s</aclDescription>" % self.acl_description
conf_str += CE_MERGE_ACL_TAIL
recv_xml = self.netconf_set_config(conf_str=conf_str)
if "<ok/>" not in recv_xml:
self.module.fail_json(msg='Error: Merge acl failed.')
if self.acl_name.isdigit():
cmd = "acl number %s" % self.acl_name
else:
if self.acl_type and not self.acl_num:
cmd = "acl name %s %s" % (self.acl_name, self.acl_type.lower())
elif self.acl_type and self.acl_num:
cmd = "acl name %s number %s" % (self.acl_name, self.acl_num)
elif not self.acl_type and self.acl_num:
cmd = "acl name %s number %s" % (self.acl_name, self.acl_num)
self.updates_cmd.append(cmd)
if self.acl_description:
cmd = "description %s" % self.acl_description
self.updates_cmd.append(cmd)
if self.acl_step:
cmd = "step %s" % self.acl_step
self.updates_cmd.append(cmd)
self.changed = True
def delete_acl(self):
""" Delete acl operation """
conf_str = CE_DELETE_ACL_HEADER % self.acl_name
if self.acl_type:
conf_str += "<aclType>%s</aclType>" % self.acl_type
if self.acl_num:
conf_str += "<aclNumber>%s</aclNumber>" % self.acl_num
if self.acl_step:
conf_str += "<aclStep>%s</aclStep>" % self.acl_step
if self.acl_description:
conf_str += "<aclDescription>%s</aclDescription>" % self.acl_description
conf_str += CE_DELETE_ACL_TAIL
recv_xml = self.netconf_set_config(conf_str=conf_str)
if "<ok/>" not in recv_xml:
self.module.fail_json(msg='Error: Delete acl failed.')
if self.acl_description:
cmd = "undo description"
self.updates_cmd.append(cmd)
if self.acl_step:
cmd = "undo step"
self.updates_cmd.append(cmd)
if self.acl_name.isdigit():
cmd = "undo acl number %s" % self.acl_name
else:
cmd = "undo acl name %s" % self.acl_name
self.updates_cmd.append(cmd)
self.changed = True
def merge_base_rule(self):
""" Merge base rule operation """
conf_str = CE_MERGE_ACL_BASE_RULE_HEADER % (
self.acl_name, self.rule_name)
if self.rule_id:
conf_str += "<aclRuleID>%s</aclRuleID>" % self.rule_id
if self.rule_action:
conf_str += "<aclAction>%s</aclAction>" % self.rule_action
if self.source_ip:
conf_str += "<aclSourceIp>%s</aclSourceIp>" % self.source_ip
if self.src_wild:
conf_str += "<aclSrcWild>%s</aclSrcWild>" % self.src_wild
if self.frag_type:
conf_str += "<aclFragType>%s</aclFragType>" % self.frag_type
if self.vrf_name:
conf_str += "<vrfName>%s</vrfName>" % self.vrf_name
if self.time_range:
conf_str += "<aclTimeName>%s</aclTimeName>" % self.time_range
if self.rule_description:
conf_str += "<aclRuleDescription>%s</aclRuleDescription>" % self.rule_description
conf_str += "<aclLogFlag>%s</aclLogFlag>" % str(self.log_flag).lower()
conf_str += CE_MERGE_ACL_BASE_RULE_TAIL
recv_xml = self.netconf_set_config(conf_str=conf_str)
if "<ok/>" not in recv_xml:
self.module.fail_json(msg='Error: Merge acl base rule failed.')
if self.rule_action:
cmd = "rule"
if self.rule_id:
cmd += " %s" % self.rule_id
cmd += " %s" % self.rule_action
if self.frag_type == "fragment":
cmd += " fragment-type fragment"
if self.source_ip and self.src_wild:
cmd += " source %s %s" % (self.source_ip, self.src_wild)
if self.time_range:
cmd += " time-range %s" % self.time_range
if self.vrf_name:
cmd += " vpn-instance %s" % self.vrf_name
if self.log_flag:
cmd += " logging"
self.updates_cmd.append(cmd)
if self.rule_description:
cmd = "rule %s description %s" % (
self.rule_id, self.rule_description)
self.updates_cmd.append(cmd)
self.changed = True
def delete_base_rule(self):
""" Delete base rule operation """
conf_str = CE_DELETE_ACL_BASE_RULE_HEADER % (
self.acl_name, self.rule_name)
if self.rule_id:
conf_str += "<aclRuleID>%s</aclRuleID>" % self.rule_id
if self.rule_action:
conf_str += "<aclAction>%s</aclAction>" % self.rule_action
if self.source_ip:
conf_str += "<aclSourceIp>%s</aclSourceIp>" % self.source_ip
if self.src_wild:
conf_str += "<aclSrcWild>%s</aclSrcWild>" % self.src_wild
if self.frag_type:
conf_str += "<aclFragType>%s</aclFragType>" % self.frag_type
if self.vrf_name:
conf_str += "<vrfName>%s</vrfName>" % self.vrf_name
if self.time_range:
conf_str += "<aclTimeName>%s</aclTimeName>" % self.time_range
if self.rule_description:
conf_str += "<aclRuleDescription>%s</aclRuleDescription>" % self.rule_description
conf_str += "<aclLogFlag>%s</aclLogFlag>" % str(self.log_flag).lower()
conf_str += CE_DELETE_ACL_BASE_RULE_TAIL
recv_xml = self.netconf_set_config(conf_str=conf_str)
if "<ok/>" not in recv_xml:
self.module.fail_json(msg='Error: Delete acl base rule failed.')
if self.rule_description:
if self.acl_name.isdigit():
cmd = "acl number %s" % self.acl_name
else:
cmd = "acl name %s" % self.acl_name
self.updates_cmd.append(cmd)
cmd = "undo rule %s description" % self.rule_id
self.updates_cmd.append(cmd)
if self.rule_id:
if self.acl_name.isdigit():
cmd = "acl number %s" % self.acl_name
else:
cmd = "acl name %s" % self.acl_name
self.updates_cmd.append(cmd)
cmd = "undo rule %s" % self.rule_id
self.updates_cmd.append(cmd)
elif self.rule_action:
if self.acl_name.isdigit():
cmd = "acl number %s" % self.acl_name
else:
cmd = "acl name %s" % self.acl_name
self.updates_cmd.append(cmd)
cmd = "undo rule"
cmd += " %s" % self.rule_action
if self.frag_type == "fragment":
cmd += " fragment-type fragment"
if self.source_ip and self.src_wild:
cmd += " source %s %s" % (self.source_ip, self.src_wild)
if self.time_range:
cmd += " time-range %s" % self.time_range
if self.vrf_name:
cmd += " vpn-instance %s" % self.vrf_name
if self.log_flag:
cmd += " logging"
self.updates_cmd.append(cmd)
self.changed = True
def work(self):
""" Main work function """
self.check_acl_args()
self.check_base_rule_args()
self.get_proposed()
self.get_existing()
if self.state == "present":
if self.cur_acl_cfg["need_cfg"]:
self.merge_acl()
if self.cur_base_rule_cfg["need_cfg"]:
self.merge_base_rule()
elif self.state == "absent":
if self.cur_base_rule_cfg["need_cfg"]:
self.delete_base_rule()
elif self.state == "delete_acl":
if self.cur_acl_cfg["need_cfg"]:
self.delete_acl()
self.get_end_state()
self.results['changed'] = self.changed
self.results['proposed'] = self.proposed
self.results['existing'] = self.existing
self.results['end_state'] = self.end_state
self.results['updates'] = self.updates_cmd
self.module.exit_json(**self.results)
def main():
""" Module main """
argument_spec = dict(
state=dict(choices=['present', 'absent',
'delete_acl'], default='present'),
acl_name=dict(type='str', required=True),
acl_num=dict(type='str'),
acl_step=dict(type='str'),
acl_description=dict(type='str'),
rule_name=dict(type='str'),
rule_id=dict(type='str'),
rule_action=dict(choices=['permit', 'deny']),
source_ip=dict(type='str'),
src_mask=dict(type='str'),
frag_type=dict(choices=['fragment', 'clear_fragment']),
vrf_name=dict(type='str'),
time_range=dict(type='str'),
rule_description=dict(type='str'),
log_flag=dict(required=False, default=False, type='bool')
)
argument_spec.update(ce_argument_spec)
module = BaseAcl(argument_spec=argument_spec)
module.work()
if __name__ == '__main__':
main()
| Name | Type | Size | Permission | Actions |
|---|---|---|---|---|
| __pycache__ | Folder | 0755 |
|
|
| __init__.py | File | 0 B | 0644 |
|
| a10_server.py | File | 10.45 KB | 0644 |
|
| a10_server_axapi3.py | File | 8.67 KB | 0644 |
|
| a10_service_group.py | File | 12.91 KB | 0644 |
|
| a10_virtual_server.py | File | 10.92 KB | 0644 |
|
| aireos_command.py | File | 6.93 KB | 0644 |
|
| aireos_config.py | File | 13.73 KB | 0644 |
|
| apconos_command.py | File | 5.96 KB | 0644 |
|
| aruba_command.py | File | 6.7 KB | 0644 |
|
| aruba_config.py | File | 16.41 KB | 0644 |
|
| avi_actiongroupconfig.py | File | 5.3 KB | 0644 |
|
| avi_alertconfig.py | File | 12.43 KB | 0644 |
|
| avi_alertemailconfig.py | File | 3.73 KB | 0644 |
|
| avi_alertscriptconfig.py | File | 3.53 KB | 0644 |
|
| avi_alertsyslogconfig.py | File | 3.69 KB | 0644 |
|
| avi_analyticsprofile.py | File | 31.36 KB | 0644 |
|
| avi_api_session.py | File | 8.86 KB | 0644 |
|
| avi_api_version.py | File | 2.65 KB | 0644 |
|
| avi_applicationpersistenceprofile.py | File | 6.47 KB | 0644 |
|
| avi_applicationprofile.py | File | 7.58 KB | 0644 |
|
| avi_authprofile.py | File | 5.06 KB | 0644 |
|
| avi_autoscalelaunchconfig.py | File | 4.38 KB | 0644 |
|
| avi_backup.py | File | 3.95 KB | 0644 |
|
| avi_backupconfiguration.py | File | 5.35 KB | 0644 |
|
| avi_certificatemanagementprofile.py | File | 3.64 KB | 0644 |
|
| avi_cloud.py | File | 11.09 KB | 0644 |
|
| avi_cloudconnectoruser.py | File | 4.57 KB | 0644 |
|
| avi_cloudproperties.py | File | 3.66 KB | 0644 |
|
| avi_cluster.py | File | 3.79 KB | 0644 |
|
| avi_clusterclouddetails.py | File | 3.47 KB | 0644 |
|
| avi_controllerproperties.py | File | 19.1 KB | 0644 |
|
| avi_customipamdnsprofile.py | File | 3.76 KB | 0644 |
|
| avi_dnspolicy.py | File | 3.69 KB | 0644 |
|
| avi_errorpagebody.py | File | 3.78 KB | 0644 |
|
| avi_errorpageprofile.py | File | 4.44 KB | 0644 |
|
| avi_gslb.py | File | 14.35 KB | 0644 |
|
| avi_gslbgeodbprofile.py | File | 4.07 KB | 0644 |
|
| avi_gslbservice.py | File | 9.43 KB | 0644 |
|
| avi_gslbservice_patch_member.py | File | 10.19 KB | 0644 |
|
| avi_hardwaresecuritymodulegroup.py | File | 3.5 KB | 0644 |
|
| avi_healthmonitor.py | File | 7.44 KB | 0644 |
|
| avi_httppolicyset.py | File | 5.22 KB | 0644 |
|
| avi_ipaddrgroup.py | File | 4.8 KB | 0644 |
|
| avi_ipamdnsproviderprofile.py | File | 6.04 KB | 0644 |
|
| avi_l4policyset.py | File | 4.03 KB | 0644 |
|
| avi_microservicegroup.py | File | 3.78 KB | 0644 |
|
| avi_network.py | File | 5.13 KB | 0644 |
|
| avi_networkprofile.py | File | 4.14 KB | 0644 |
|
| avi_networksecuritypolicy.py | File | 4.15 KB | 0644 |
|
| avi_pkiprofile.py | File | 5.32 KB | 0644 |
|
| avi_pool.py | File | 22.34 KB | 0644 |
|
| avi_poolgroup.py | File | 5.87 KB | 0644 |
|
| avi_poolgroupdeploymentpolicy.py | File | 5.49 KB | 0644 |
|
| avi_prioritylabels.py | File | 3.62 KB | 0644 |
|
| avi_role.py | File | 3.25 KB | 0644 |
|
| avi_scheduler.py | File | 5.08 KB | 0644 |
|
| avi_seproperties.py | File | 3.51 KB | 0644 |
|
| avi_serverautoscalepolicy.py | File | 7.22 KB | 0644 |
|
| avi_serviceengine.py | File | 5.74 KB | 0644 |
|
| avi_serviceenginegroup.py | File | 53.38 KB | 0644 |
|
| avi_snmptrapprofile.py | File | 3.4 KB | 0644 |
|
| avi_sslkeyandcertificate.py | File | 6.75 KB | 0644 |
|
| avi_sslprofile.py | File | 8.21 KB | 0644 |
|
| avi_stringgroup.py | File | 4.08 KB | 0644 |
|
| avi_systemconfiguration.py | File | 6.76 KB | 0644 |
|
| avi_tenant.py | File | 3.87 KB | 0644 |
|
| avi_trafficcloneprofile.py | File | 4.01 KB | 0644 |
|
| avi_user.py | File | 6.12 KB | 0644 |
|
| avi_useraccount.py | File | 5.02 KB | 0644 |
|
| avi_useraccountprofile.py | File | 4.65 KB | 0644 |
|
| avi_virtualservice.py | File | 29.62 KB | 0644 |
|
| avi_vrfcontext.py | File | 4.51 KB | 0644 |
|
| avi_vsdatascriptset.py | File | 4.86 KB | 0644 |
|
| avi_vsvip.py | File | 5.21 KB | 0644 |
|
| avi_webhook.py | File | 3.77 KB | 0644 |
|
| bcf_switch.py | File | 4.86 KB | 0644 |
|
| bigmon_chain.py | File | 3.99 KB | 0644 |
|
| bigmon_policy.py | File | 6.23 KB | 0644 |
|
| ce_aaa_server.py | File | 69.09 KB | 0644 |
|
| ce_aaa_server_host.py | File | 101.81 KB | 0644 |
|
| ce_acl.py | File | 35.95 KB | 0644 |
|
| ce_acl_advance.py | File | 73.4 KB | 0644 |
|
| ce_acl_interface.py | File | 10.36 KB | 0644 |
|
| ce_bfd_global.py | File | 21.02 KB | 0644 |
|
| ce_bfd_session.py | File | 21.99 KB | 0644 |
|
| ce_bfd_view.py | File | 19.71 KB | 0644 |
|
| ce_bgp.py | File | 79.52 KB | 0644 |
|
| ce_bgp_af.py | File | 133.02 KB | 0644 |
|
| ce_bgp_neighbor.py | File | 72.12 KB | 0644 |
|
| ce_bgp_neighbor_af.py | File | 110.55 KB | 0644 |
|
| ce_command.py | File | 7.79 KB | 0644 |
|
| ce_config.py | File | 17.88 KB | 0644 |
|
| ce_dldp.py | File | 18.62 KB | 0644 |
|
| ce_dldp_interface.py | File | 22.41 KB | 0644 |
|
| ce_eth_trunk.py | File | 22.44 KB | 0644 |
|
| ce_evpn_bd_vni.py | File | 39.01 KB | 0644 |
|
| ce_evpn_bgp.py | File | 26.71 KB | 0644 |
|
| ce_evpn_bgp_rr.py | File | 18 KB | 0644 |
|
| ce_evpn_global.py | File | 6.93 KB | 0644 |
|
| ce_facts.py | File | 11.4 KB | 0644 |
|
| ce_file_copy.py | File | 13.18 KB | 0644 |
|
| ce_info_center_debug.py | File | 21.33 KB | 0644 |
|
| ce_info_center_global.py | File | 67.85 KB | 0644 |
|
| ce_info_center_log.py | File | 20.09 KB | 0644 |
|
| ce_info_center_trap.py | File | 24.65 KB | 0644 |
|
| ce_interface.py | File | 31 KB | 0644 |
|
| ce_interface_ospf.py | File | 30.25 KB | 0644 |
|
| ce_ip_interface.py | File | 23.63 KB | 0644 |
|
| ce_is_is_instance.py | File | 8.95 KB | 0644 |
|
| ce_is_is_interface.py | File | 27.75 KB | 0644 |
|
| ce_is_is_view.py | File | 76.21 KB | 0644 |
|
| ce_lacp.py | File | 17.68 KB | 0644 |
|
| ce_link_status.py | File | 21.76 KB | 0644 |
|
| ce_lldp.py | File | 31.85 KB | 0644 |
|
| ce_lldp_interface.py | File | 68.35 KB | 0644 |
|
| ce_mdn_interface.py | File | 12.96 KB | 0644 |
|
| ce_mlag_config.py | File | 34.52 KB | 0644 |
|
| ce_mlag_interface.py | File | 36.1 KB | 0644 |
|
| ce_mtu.py | File | 18.87 KB | 0644 |
|
| ce_multicast_global.py | File | 8.98 KB | 0644 |
|
| ce_multicast_igmp_enable.py | File | 17.36 KB | 0644 |
|
| ce_netconf.py | File | 5.81 KB | 0644 |
|
| ce_netstream_aging.py | File | 18.14 KB | 0644 |
|
| ce_netstream_export.py | File | 18.9 KB | 0644 |
|
| ce_netstream_global.py | File | 36.93 KB | 0644 |
|
| ce_netstream_template.py | File | 16.57 KB | 0644 |
|
| ce_ntp.py | File | 20.32 KB | 0644 |
|
| ce_ntp_auth.py | File | 16.36 KB | 0644 |
|
| ce_ospf.py | File | 33.93 KB | 0644 |
|
| ce_ospf_vrf.py | File | 67.18 KB | 0644 |
|
| ce_reboot.py | File | 4.28 KB | 0644 |
|
| ce_rollback.py | File | 15.86 KB | 0644 |
|
| ce_sflow.py | File | 44.08 KB | 0644 |
|
| ce_snmp_community.py | File | 34.64 KB | 0644 |
|
| ce_snmp_contact.py | File | 7.23 KB | 0644 |
|
| ce_snmp_location.py | File | 6.96 KB | 0644 |
|
| ce_snmp_target_host.py | File | 32.84 KB | 0644 |
|
| ce_snmp_traps.py | File | 19.59 KB | 0644 |
|
| ce_snmp_user.py | File | 36.66 KB | 0644 |
|
| ce_startup.py | File | 15.45 KB | 0644 |
|
| ce_static_route.py | File | 29 KB | 0644 |
|
| ce_static_route_bfd.py | File | 60.9 KB | 0644 |
|
| ce_stp.py | File | 36.76 KB | 0644 |
|
| ce_switchport.py | File | 38.54 KB | 0644 |
|
| ce_vlan.py | File | 20.88 KB | 0644 |
|
| ce_vrf.py | File | 10.73 KB | 0644 |
|
| ce_vrf_af.py | File | 30.04 KB | 0644 |
|
| ce_vrf_interface.py | File | 15.17 KB | 0644 |
|
| ce_vrrp.py | File | 52.15 KB | 0644 |
|
| ce_vxlan_arp.py | File | 24.02 KB | 0644 |
|
| ce_vxlan_gateway.py | File | 33.38 KB | 0644 |
|
| ce_vxlan_global.py | File | 18.3 KB | 0644 |
|
| ce_vxlan_tunnel.py | File | 30.95 KB | 0644 |
|
| ce_vxlan_vap.py | File | 33.03 KB | 0644 |
|
| cnos_backup.py | File | 9.69 KB | 0644 |
|
| cnos_banner.py | File | 5.64 KB | 0644 |
|
| cnos_bgp.py | File | 43.15 KB | 0644 |
|
| cnos_command.py | File | 5.84 KB | 0644 |
|
| cnos_conditional_command.py | File | 5.62 KB | 0644 |
|
| cnos_conditional_template.py | File | 6.68 KB | 0644 |
|
| cnos_config.py | File | 10.86 KB | 0644 |
|
| cnos_factory.py | File | 3.36 KB | 0644 |
|
| cnos_facts.py | File | 17.45 KB | 0644 |
|
| cnos_image.py | File | 8.65 KB | 0644 |
|
| cnos_interface.py | File | 15.57 KB | 0644 |
|
| cnos_l2_interface.py | File | 17.75 KB | 0644 |
|
| cnos_l3_interface.py | File | 12.54 KB | 0644 |
|
| cnos_linkagg.py | File | 9.84 KB | 0644 |
|
| cnos_lldp.py | File | 4.13 KB | 0644 |
|
| cnos_logging.py | File | 12.73 KB | 0644 |
|
| cnos_reload.py | File | 3.25 KB | 0644 |
|
| cnos_rollback.py | File | 10.32 KB | 0644 |
|
| cnos_save.py | File | 3.42 KB | 0644 |
|
| cnos_showrun.py | File | 3.34 KB | 0644 |
|
| cnos_static_route.py | File | 9.47 KB | 0644 |
|
| cnos_system.py | File | 12.93 KB | 0644 |
|
| cnos_template.py | File | 5.25 KB | 0644 |
|
| cnos_user.py | File | 12.28 KB | 0644 |
|
| cnos_vlag.py | File | 15.19 KB | 0644 |
|
| cnos_vlan.py | File | 10.69 KB | 0644 |
|
| cnos_vrf.py | File | 11.64 KB | 0644 |
|
| cv_server_provision.py | File | 23.67 KB | 0644 |
|
| dladm_etherstub.py | File | 3.93 KB | 0644 |
|
| dladm_iptun.py | File | 7.49 KB | 0644 |
|
| dladm_linkprop.py | File | 7.53 KB | 0644 |
|
| dladm_vlan.py | File | 5.15 KB | 0644 |
|
| dladm_vnic.py | File | 6.43 KB | 0644 |
|
| edgeos_command.py | File | 5.57 KB | 0644 |
|
| edgeos_config.py | File | 10.65 KB | 0644 |
|
| edgeos_facts.py | File | 8.06 KB | 0644 |
|
| edgeswitch_facts.py | File | 7.56 KB | 0644 |
|
| edgeswitch_vlan.py | File | 15.03 KB | 0644 |
|
| enos_command.py | File | 6.07 KB | 0644 |
|
| enos_config.py | File | 10.95 KB | 0644 |
|
| enos_facts.py | File | 15.23 KB | 0644 |
|
| eric_eccli_command.py | File | 6.89 KB | 0644 |
|
| exos_command.py | File | 7.23 KB | 0644 |
|
| exos_config.py | File | 16.96 KB | 0644 |
|
| exos_facts.py | File | 5.72 KB | 0644 |
|
| exos_l2_interfaces.py | File | 26.19 KB | 0644 |
|
| exos_lldp_global.py | File | 10.39 KB | 0644 |
|
| exos_lldp_interfaces.py | File | 13.68 KB | 0644 |
|
| exos_vlans.py | File | 16.07 KB | 0644 |
|
| flowadm.py | File | 14.32 KB | 0644 |
|
| ftd_configuration.py | File | 4.93 KB | 0644 |
|
| ftd_file_download.py | File | 4.26 KB | 0644 |
|
| ftd_file_upload.py | File | 3.54 KB | 0644 |
|
| ftd_install.py | File | 11.54 KB | 0644 |
|
| iap_start_workflow.py | File | 5.21 KB | 0644 |
|
| iap_token.py | File | 3.83 KB | 0644 |
|
| icx_banner.py | File | 6.54 KB | 0644 |
|
| icx_command.py | File | 7.22 KB | 0644 |
|
| icx_config.py | File | 18.28 KB | 0644 |
|
| icx_copy.py | File | 15.16 KB | 0644 |
|
| icx_facts.py | File | 17 KB | 0644 |
|
| icx_interface.py | File | 23.05 KB | 0644 |
|
| icx_l3_interface.py | File | 14.56 KB | 0644 |
|
| icx_linkagg.py | File | 10.03 KB | 0644 |
|
| icx_lldp.py | File | 5.13 KB | 0644 |
|
| icx_logging.py | File | 18.1 KB | 0644 |
|
| icx_ping.py | File | 7.84 KB | 0644 |
|
| icx_static_route.py | File | 9.38 KB | 0644 |
|
| icx_system.py | File | 16.14 KB | 0644 |
|
| icx_user.py | File | 13.05 KB | 0644 |
|
| icx_vlan.py | File | 26.24 KB | 0644 |
|
| ig_config.py | File | 16 KB | 0644 |
|
| ig_unit_information.py | File | 3.9 KB | 0644 |
|
| ipadm_addr.py | File | 11.31 KB | 0644 |
|
| ipadm_addrprop.py | File | 6.86 KB | 0644 |
|
| ipadm_if.py | File | 5.47 KB | 0644 |
|
| ipadm_ifprop.py | File | 7.94 KB | 0644 |
|
| ipadm_prop.py | File | 6.79 KB | 0644 |
|
| ironware_command.py | File | 5.07 KB | 0644 |
|
| ironware_config.py | File | 11.11 KB | 0644 |
|
| ironware_facts.py | File | 19.45 KB | 0644 |
|
| nclu.py | File | 8.02 KB | 0644 |
|
| netact_cm_command.py | File | 11.77 KB | 0644 |
|
| netscaler_cs_action.py | File | 8.71 KB | 0644 |
|
| netscaler_cs_policy.py | File | 9.28 KB | 0644 |
|
| netscaler_cs_vserver.py | File | 42.83 KB | 0644 |
|
| netscaler_gslb_service.py | File | 23.35 KB | 0644 |
|
| netscaler_gslb_site.py | File | 13.73 KB | 0644 |
|
| netscaler_gslb_vserver.py | File | 32.98 KB | 0644 |
|
| netscaler_lb_monitor.py | File | 46.23 KB | 0644 |
|
| netscaler_lb_vserver.py | File | 70.58 KB | 0644 |
|
| netscaler_nitro_request.py | File | 27.82 KB | 0644 |
|
| netscaler_save_config.py | File | 4.67 KB | 0644 |
|
| netscaler_server.py | File | 12.88 KB | 0644 |
|
| netscaler_service.py | File | 30.9 KB | 0644 |
|
| netscaler_servicegroup.py | File | 34.33 KB | 0644 |
|
| netscaler_ssl_certkey.py | File | 11.6 KB | 0644 |
|
| nos_command.py | File | 7.15 KB | 0644 |
|
| nos_config.py | File | 14.61 KB | 0644 |
|
| nos_facts.py | File | 13.44 KB | 0644 |
|
| nuage_vspk.py | File | 41.3 KB | 0644 |
|
| opx_cps.py | File | 12.18 KB | 0644 |
|
| ordnance_config.py | File | 12.03 KB | 0644 |
|
| ordnance_facts.py | File | 8.26 KB | 0644 |
|
| pn_access_list.py | File | 4.29 KB | 0644 |
|
| pn_access_list_ip.py | File | 4.42 KB | 0644 |
|
| pn_admin_service.py | File | 5.62 KB | 0644 |
|
| pn_admin_session_timeout.py | File | 2.96 KB | 0644 |
|
| pn_admin_syslog.py | File | 6.4 KB | 0644 |
|
| pn_connection_stats_settings.py | File | 10.3 KB | 0644 |
|
| pn_cpu_class.py | File | 5.65 KB | 0644 |
|
| pn_cpu_mgmt_class.py | File | 3.75 KB | 0644 |
|
| pn_dhcp_filter.py | File | 4.66 KB | 0644 |
|
| pn_dscp_map.py | File | 4.03 KB | 0644 |
|
| pn_dscp_map_pri_map.py | File | 3.99 KB | 0644 |
|
| pn_fabric_local.py | File | 4.71 KB | 0644 |
|
| pn_igmp_snooping.py | File | 6.22 KB | 0644 |
|
| pn_ipv6security_raguard.py | File | 6.64 KB | 0644 |
|
| pn_ipv6security_raguard_port.py | File | 3.73 KB | 0644 |
|
| pn_ipv6security_raguard_vlan.py | File | 4.77 KB | 0644 |
|
| pn_log_audit_exception.py | File | 5.65 KB | 0644 |
|
| pn_port_config.py | File | 11.93 KB | 0644 |
|
| pn_port_cos_bw.py | File | 3.96 KB | 0644 |
|
| pn_port_cos_rate_setting.py | File | 5.67 KB | 0644 |
|
| pn_prefix_list.py | File | 4.12 KB | 0644 |
|
| pn_prefix_list_network.py | File | 5.06 KB | 0644 |
|
| pn_role.py | File | 6.14 KB | 0644 |
|
| pn_snmp_community.py | File | 4.99 KB | 0644 |
|
| pn_snmp_trap_sink.py | File | 6 KB | 0644 |
|
| pn_snmp_vacm.py | File | 6.09 KB | 0644 |
|
| pn_stp.py | File | 5.91 KB | 0644 |
|
| pn_stp_port.py | File | 5.02 KB | 0644 |
|
| pn_switch_setup.py | File | 12.88 KB | 0644 |
|
| pn_user.py | File | 5.11 KB | 0644 |
|
| pn_vflow_table_profile.py | File | 3.62 KB | 0644 |
|
| pn_vrouter_bgp.py | File | 16.33 KB | 0644 |
|
| pn_vrouter_bgp_network.py | File | 5.06 KB | 0644 |
|
| pn_vrouter_interface_ip.py | File | 7.05 KB | 0644 |
|
| pn_vrouter_loopback_interface.py | File | 6.4 KB | 0644 |
|
| pn_vrouter_ospf.py | File | 5.57 KB | 0644 |
|
| pn_vrouter_ospf6.py | File | 5.49 KB | 0644 |
|
| pn_vrouter_packet_relay.py | File | 5.49 KB | 0644 |
|
| pn_vrouter_pim_config.py | File | 4.77 KB | 0644 |
|
| pn_vtep.py | File | 5.1 KB | 0644 |
|
| slxos_command.py | File | 7.19 KB | 0644 |
|
| slxos_config.py | File | 17.87 KB | 0644 |
|
| slxos_facts.py | File | 13.43 KB | 0644 |
|
| slxos_interface.py | File | 14.25 KB | 0644 |
|
| slxos_l2_interface.py | File | 16.58 KB | 0644 |
|
| slxos_l3_interface.py | File | 9.41 KB | 0644 |
|
| slxos_linkagg.py | File | 9.57 KB | 0644 |
|
| slxos_lldp.py | File | 3.33 KB | 0644 |
|
| slxos_vlan.py | File | 9.39 KB | 0644 |
|
| sros_command.py | File | 6.66 KB | 0644 |
|
| sros_config.py | File | 10.97 KB | 0644 |
|
| sros_rollback.py | File | 6.26 KB | 0644 |
|
| vdirect_commit.py | File | 12.58 KB | 0644 |
|
| vdirect_file.py | File | 8.99 KB | 0644 |
|
| vdirect_runnable.py | File | 13.38 KB | 0644 |
|
| voss_command.py | File | 7.75 KB | 0644 |
|
| voss_config.py | File | 18.33 KB | 0644 |
|
| voss_facts.py | File | 15.67 KB | 0644 |
|