summaryrefslogtreecommitdiffstats
path: root/collections-debian-merged/ansible_collections/dellemc/os9/plugins
diff options
context:
space:
mode:
authorDaniel Baumann <daniel.baumann@progress-linux.org>2024-05-14 20:03:01 +0000
committerDaniel Baumann <daniel.baumann@progress-linux.org>2024-05-14 20:03:01 +0000
commita453ac31f3428614cceb99027f8efbdb9258a40b (patch)
treef61f87408f32a8511cbd91799f9cececb53e0374 /collections-debian-merged/ansible_collections/dellemc/os9/plugins
parentInitial commit. (diff)
downloadansible-a453ac31f3428614cceb99027f8efbdb9258a40b.tar.xz
ansible-a453ac31f3428614cceb99027f8efbdb9258a40b.zip
Adding upstream version 2.10.7+merged+base+2.10.8+dfsg.upstream/2.10.7+merged+base+2.10.8+dfsgupstream
Signed-off-by: Daniel Baumann <daniel.baumann@progress-linux.org>
Diffstat (limited to 'collections-debian-merged/ansible_collections/dellemc/os9/plugins')
-rw-r--r--collections-debian-merged/ansible_collections/dellemc/os9/plugins/action/__init__.py0
-rw-r--r--collections-debian-merged/ansible_collections/dellemc/os9/plugins/action/os9.py95
-rw-r--r--collections-debian-merged/ansible_collections/dellemc/os9/plugins/cliconf/__init__.py0
-rw-r--r--collections-debian-merged/ansible_collections/dellemc/os9/plugins/cliconf/os9.py88
-rw-r--r--collections-debian-merged/ansible_collections/dellemc/os9/plugins/doc_fragments/__init__.py0
-rw-r--r--collections-debian-merged/ansible_collections/dellemc/os9/plugins/doc_fragments/os9.py74
-rw-r--r--collections-debian-merged/ansible_collections/dellemc/os9/plugins/module_utils/__init__.py0
-rw-r--r--collections-debian-merged/ansible_collections/dellemc/os9/plugins/module_utils/network/__init__.py0
-rw-r--r--collections-debian-merged/ansible_collections/dellemc/os9/plugins/module_utils/network/os9.py146
-rw-r--r--collections-debian-merged/ansible_collections/dellemc/os9/plugins/modules/__init__.py0
-rw-r--r--collections-debian-merged/ansible_collections/dellemc/os9/plugins/modules/os9_command.py233
-rw-r--r--collections-debian-merged/ansible_collections/dellemc/os9/plugins/modules/os9_config.py350
-rw-r--r--collections-debian-merged/ansible_collections/dellemc/os9/plugins/modules/os9_facts.py565
-rw-r--r--collections-debian-merged/ansible_collections/dellemc/os9/plugins/terminal/__init__.py0
-rw-r--r--collections-debian-merged/ansible_collections/dellemc/os9/plugins/terminal/os9.py83
15 files changed, 1634 insertions, 0 deletions
diff --git a/collections-debian-merged/ansible_collections/dellemc/os9/plugins/action/__init__.py b/collections-debian-merged/ansible_collections/dellemc/os9/plugins/action/__init__.py
new file mode 100644
index 00000000..e69de29b
--- /dev/null
+++ b/collections-debian-merged/ansible_collections/dellemc/os9/plugins/action/__init__.py
diff --git a/collections-debian-merged/ansible_collections/dellemc/os9/plugins/action/os9.py b/collections-debian-merged/ansible_collections/dellemc/os9/plugins/action/os9.py
new file mode 100644
index 00000000..0cbfa910
--- /dev/null
+++ b/collections-debian-merged/ansible_collections/dellemc/os9/plugins/action/os9.py
@@ -0,0 +1,95 @@
+#
+# (c) 2020 Red Hat Inc.
+#
+# Copyright (c) 2020 Dell Inc.
+#
+# This file is part of Ansible
+#
+# Ansible is free software: you can redistribute it and/or modify
+# it under the terms of the GNU General Public License as published by
+# the Free Software Foundation, either version 3 of the License, or
+# (at your option) any later version.
+#
+# Ansible is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with Ansible. If not, see <http://www.gnu.org/licenses/>.
+#
+from __future__ import (absolute_import, division, print_function)
+__metaclass__ = type
+
+import sys
+import copy
+
+from ansible import constants as C
+from ansible.module_utils._text import to_text
+from ansible.module_utils.connection import Connection
+from ansible_collections.ansible.netcommon.plugins.action.network import ActionModule as ActionNetworkModule
+from ansible_collections.ansible.netcommon.plugins.module_utils.network.common.utils import load_provider
+from ansible_collections.dellemc.os9.plugins.module_utils.network.os9 import os9_provider_spec
+from ansible.utils.display import Display
+
+display = Display()
+
+
+class ActionModule(ActionNetworkModule):
+
+ def run(self, tmp=None, task_vars=None):
+ del tmp # tmp no longer has any effect
+
+ module_name = self._task.action.split('.')[-1]
+ self._config_module = True if module_name == 'os9_config' else False
+ socket_path = None
+ persistent_connection = self._play_context.connection.split('.')[-1]
+
+ if persistent_connection == 'network_cli':
+ provider = self._task.args.get('provider', {})
+ if any(provider.values()):
+ display.warning('provider is unnecessary when using network_cli and will be ignored')
+ del self._task.args['provider']
+ elif self._play_context.connection == 'local':
+ provider = load_provider(os9_provider_spec, self._task.args)
+ pc = copy.deepcopy(self._play_context)
+ pc.connection = 'network_cli'
+ pc.network_os = 'dellemc.os9.os9'
+ pc.remote_addr = provider['host'] or self._play_context.remote_addr
+ pc.port = int(provider['port'] or self._play_context.port or 22)
+ pc.remote_user = provider['username'] or self._play_context.connection_user
+ pc.password = provider['password'] or self._play_context.password
+ pc.private_key_file = provider['ssh_keyfile'] or self._play_context.private_key_file
+ command_timeout = int(provider['timeout'] or C.PERSISTENT_COMMAND_TIMEOUT)
+ pc.become = provider['authorize'] or False
+ if pc.become:
+ pc.become_method = 'enable'
+ pc.become_pass = provider['auth_pass']
+
+ display.vvv('using connection plugin %s' % pc.connection, pc.remote_addr)
+ connection = self._shared_loader_obj.connection_loader.get('persistent', pc, sys.stdin)
+ connection.set_options(direct={'persistent_command_timeout': command_timeout})
+
+ socket_path = connection.run()
+ display.vvvv('socket_path: %s' % socket_path, pc.remote_addr)
+ if not socket_path:
+ return {'failed': True,
+ 'msg': 'unable to open shell. Please see: ' +
+ 'https://docs.ansible.com/ansible/network_debug_troubleshooting.html#unable-to-open-shell'}
+
+ task_vars['ansible_socket'] = socket_path
+
+ # make sure we are in the right cli context which should be
+ # enable mode and not config module
+ if socket_path is None:
+ socket_path = self._connection.socket_path
+
+ conn = Connection(socket_path)
+ out = conn.get_prompt()
+ while to_text(out, errors='surrogate_then_replace').strip().endswith(')#'):
+ display.vvvv('wrong context, sending exit to device', self._play_context.remote_addr)
+ conn.send_command('exit')
+ out = conn.get_prompt()
+
+ result = super(ActionModule, self).run(task_vars=task_vars)
+ return result
diff --git a/collections-debian-merged/ansible_collections/dellemc/os9/plugins/cliconf/__init__.py b/collections-debian-merged/ansible_collections/dellemc/os9/plugins/cliconf/__init__.py
new file mode 100644
index 00000000..e69de29b
--- /dev/null
+++ b/collections-debian-merged/ansible_collections/dellemc/os9/plugins/cliconf/__init__.py
diff --git a/collections-debian-merged/ansible_collections/dellemc/os9/plugins/cliconf/os9.py b/collections-debian-merged/ansible_collections/dellemc/os9/plugins/cliconf/os9.py
new file mode 100644
index 00000000..95334bfd
--- /dev/null
+++ b/collections-debian-merged/ansible_collections/dellemc/os9/plugins/cliconf/os9.py
@@ -0,0 +1,88 @@
+#
+# (c) 2020 Red Hat Inc.
+#
+# (c) 2020 Dell Inc.
+#
+# This file is part of Ansible
+#
+# Ansible is free software: you can redistribute it and/or modify
+# it under the terms of the GNU General Public License as published by
+# the Free Software Foundation, either version 3 of the License, or
+# (at your option) any later version.
+#
+# Ansible is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with Ansible. If not, see <http://www.gnu.org/licenses/>.
+#
+from __future__ import (absolute_import, division, print_function)
+__metaclass__ = type
+
+DOCUMENTATION = """
+---
+cliconf: os9
+short_description: Use os9 cliconf to run command on Dell OS9 platform
+description:
+ - This os9 plugin provides low level abstraction apis for
+ sending and receiving CLI commands from Dell OS9 network devices.
+"""
+
+import re
+import json
+
+from itertools import chain
+
+from ansible.module_utils._text import to_bytes, to_text
+from ansible_collections.ansible.netcommon.plugins.module_utils.network.common.utils import to_list
+from ansible.plugins.cliconf import CliconfBase, enable_mode
+
+
+class Cliconf(CliconfBase):
+
+ def get_device_info(self):
+ device_info = {}
+
+ device_info['network_os'] = 'dellemc.os9.os9'
+ reply = self.get('show version')
+ data = to_text(reply, errors='surrogate_or_strict').strip()
+
+ match = re.search(r'Software Version (\S+)', data)
+ if match:
+ device_info['network_os_version'] = match.group(1)
+
+ match = re.search(r'System Type (\S+)', data, re.M)
+ if match:
+ device_info['network_os_model'] = match.group(1)
+
+ reply = self.get('show running-config | grep hostname')
+ data = to_text(reply, errors='surrogate_or_strict').strip()
+ match = re.search(r'^hostname (.+)', data, re.M)
+ if match:
+ device_info['network_os_hostname'] = match.group(1)
+
+ return device_info
+
+ @enable_mode
+ def get_config(self, source='running', format='text', flags=None):
+ if source not in ('running', 'startup'):
+ return self.invalid_params("fetching configuration from %s is not supported" % source)
+# if source == 'running':
+# cmd = 'show running-config all'
+ else:
+ cmd = 'show startup-config'
+ return self.send_command(cmd)
+
+ @enable_mode
+ def edit_config(self, command):
+ for cmd in chain(['configure terminal'], to_list(command), ['end']):
+ self.send_command(cmd)
+
+ def get(self, command, prompt=None, answer=None, sendonly=False, newline=True, check_all=False):
+ return self.send_command(command=command, prompt=prompt, answer=answer, sendonly=sendonly, newline=newline, check_all=check_all)
+
+ def get_capabilities(self):
+ result = super(Cliconf, self).get_capabilities()
+ return json.dumps(result)
diff --git a/collections-debian-merged/ansible_collections/dellemc/os9/plugins/doc_fragments/__init__.py b/collections-debian-merged/ansible_collections/dellemc/os9/plugins/doc_fragments/__init__.py
new file mode 100644
index 00000000..e69de29b
--- /dev/null
+++ b/collections-debian-merged/ansible_collections/dellemc/os9/plugins/doc_fragments/__init__.py
diff --git a/collections-debian-merged/ansible_collections/dellemc/os9/plugins/doc_fragments/os9.py b/collections-debian-merged/ansible_collections/dellemc/os9/plugins/doc_fragments/os9.py
new file mode 100644
index 00000000..1b1c0d1a
--- /dev/null
+++ b/collections-debian-merged/ansible_collections/dellemc/os9/plugins/doc_fragments/os9.py
@@ -0,0 +1,74 @@
+# -*- coding: utf-8 -*-
+
+# Copyright: (c) 2020, Peter Sprygada <psprygada@ansible.com>
+# Copyright: (c) 2020, Dell Inc.
+# GNU General Public License v3.0+ (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt)
+
+from __future__ import absolute_import, division, print_function
+__metaclass__ = type
+
+
+class ModuleDocFragment(object):
+
+ # Standard files documentation fragment
+ DOCUMENTATION = r'''
+options:
+ provider:
+ description:
+ - A dict object containing connection details.
+ type: dict
+ suboptions:
+ host:
+ description:
+ - Specifies the DNS host name or address for connecting to the remote
+ device over the specified transport. The value of host is used as
+ the destination address for the transport.
+ type: str
+ port:
+ description:
+ - Specifies the port to use when building the connection to the remote
+ device.
+ type: int
+ username:
+ description:
+ - User to authenticate the SSH session to the remote device. If the
+ value is not specified in the task, the value of environment variable
+ C(ANSIBLE_NET_USERNAME) will be used instead.
+ type: str
+ password:
+ description:
+ - Password to authenticate the SSH session to the remote device. If the
+ value is not specified in the task, the value of environment variable
+ C(ANSIBLE_NET_PASSWORD) will be used instead.
+ type: str
+ ssh_keyfile:
+ description:
+ - Path to an ssh key used to authenticate the SSH session to the remote
+ device. If the value is not specified in the task, the value of
+ environment variable C(ANSIBLE_NET_SSH_KEYFILE) will be used instead.
+ type: path
+ timeout:
+ description:
+ - Specifies idle timeout (in seconds) for the connection. Useful if the
+ console freezes before continuing. For example when saving
+ configurations.
+ type: int
+ authorize:
+ description:
+ - Instructs the module to enter privileged mode on the remote device before
+ sending any commands. If not specified, the device will attempt to execute
+ all commands in non-privileged mode. If the value is not specified in the
+ task, the value of environment variable C(ANSIBLE_NET_AUTHORIZE) will be
+ used instead.
+ type: bool
+ default: false
+ auth_pass:
+ description:
+ - Specifies the password to use if required to enter privileged mode on the
+ remote device. If I(authorize) is false, then this argument does nothing.
+ If the value is not specified in the task, the value of environment variable
+ C(ANSIBLE_NET_AUTH_PASS) will be used instead.
+ type: str
+notes:
+ - For more information on using Ansible to manage Dell EMC Network devices see U(https://www.ansible.com/ansible-dell-networking).
+'''
diff --git a/collections-debian-merged/ansible_collections/dellemc/os9/plugins/module_utils/__init__.py b/collections-debian-merged/ansible_collections/dellemc/os9/plugins/module_utils/__init__.py
new file mode 100644
index 00000000..e69de29b
--- /dev/null
+++ b/collections-debian-merged/ansible_collections/dellemc/os9/plugins/module_utils/__init__.py
diff --git a/collections-debian-merged/ansible_collections/dellemc/os9/plugins/module_utils/network/__init__.py b/collections-debian-merged/ansible_collections/dellemc/os9/plugins/module_utils/network/__init__.py
new file mode 100644
index 00000000..e69de29b
--- /dev/null
+++ b/collections-debian-merged/ansible_collections/dellemc/os9/plugins/module_utils/network/__init__.py
diff --git a/collections-debian-merged/ansible_collections/dellemc/os9/plugins/module_utils/network/os9.py b/collections-debian-merged/ansible_collections/dellemc/os9/plugins/module_utils/network/os9.py
new file mode 100644
index 00000000..14c77773
--- /dev/null
+++ b/collections-debian-merged/ansible_collections/dellemc/os9/plugins/module_utils/network/os9.py
@@ -0,0 +1,146 @@
+#
+# (c) 2020 Peter Sprygada, <psprygada@ansible.com>
+# (c) 2020 Red Hat, Inc
+#
+# Copyright (c) 2020 Dell Inc.
+#
+# This code is part of Ansible, but is an independent component.
+# This particular file snippet, and this file snippet only, is BSD licensed.
+# Modules you write using this snippet, which is embedded dynamically by Ansible
+# still belong to the author of the module, and may assign their own license
+# to the complete work.
+#
+# Redistribution and use in source and binary forms, with or without modification,
+# are permitted provided that the following conditions are met:
+#
+# * Redistributions of source code must retain the above copyright
+# notice, this list of conditions and the following disclaimer.
+# * Redistributions in binary form must reproduce the above copyright notice,
+# this list of conditions and the following disclaimer in the documentation
+# and/or other materials provided with the distribution.
+#
+# THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND
+# ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
+# WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
+# IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT,
+# INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
+# PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
+# INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
+# LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE
+# USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
+#
+
+
+from __future__ import absolute_import, division, print_function
+__metaclass__ = type
+
+
+import re
+
+from ansible.module_utils._text import to_text
+from ansible.module_utils.basic import env_fallback
+from ansible_collections.ansible.netcommon.plugins.module_utils.network.common.utils import to_list, ComplexList
+from ansible.module_utils.connection import exec_command
+from ansible_collections.ansible.netcommon.plugins.module_utils.network.common.config import NetworkConfig, ConfigLine
+
+_DEVICE_CONFIGS = {}
+
+WARNING_PROMPTS_RE = [
+ r"[\r\n]?\[confirm yes/no\]:\s?$",
+ r"[\r\n]?\[y/n\]:\s?$",
+ r"[\r\n]?\[yes/no\]:\s?$"
+]
+
+os9_provider_spec = {
+ 'host': dict(),
+ 'port': dict(type='int'),
+ 'username': dict(fallback=(env_fallback, ['ANSIBLE_NET_USERNAME'])),
+ 'password': dict(fallback=(env_fallback, ['ANSIBLE_NET_PASSWORD']), no_log=True),
+ 'ssh_keyfile': dict(fallback=(env_fallback, ['ANSIBLE_NET_SSH_KEYFILE']), type='path'),
+ 'authorize': dict(fallback=(env_fallback, ['ANSIBLE_NET_AUTHORIZE']), type='bool'),
+ 'auth_pass': dict(fallback=(env_fallback, ['ANSIBLE_NET_AUTH_PASS']), no_log=True),
+ 'timeout': dict(type='int'),
+}
+os9_argument_spec = {
+ 'provider': dict(type='dict', options=os9_provider_spec),
+}
+
+
+def check_args(module, warnings):
+ pass
+
+
+def get_config(module, flags=None):
+ flags = [] if flags is None else flags
+
+ cmd = 'show running-config '
+ cmd += ' '.join(flags)
+ cmd = cmd.strip()
+
+ try:
+ return _DEVICE_CONFIGS[cmd]
+ except KeyError:
+ rc, out, err = exec_command(module, cmd)
+ if rc != 0:
+ module.fail_json(msg='unable to retrieve current config', stderr=to_text(err, errors='surrogate_or_strict'))
+ cfg = to_text(out, errors='surrogate_or_strict').strip()
+ _DEVICE_CONFIGS[cmd] = cfg
+ return cfg
+
+
+def to_commands(module, commands):
+ spec = {
+ 'command': dict(key=True),
+ 'prompt': dict(),
+ 'answer': dict()
+ }
+ transform = ComplexList(spec, module)
+ return transform(commands)
+
+
+def run_commands(module, commands, check_rc=True):
+ responses = list()
+ commands = to_commands(module, to_list(commands))
+ for cmd in commands:
+ cmd = module.jsonify(cmd)
+ rc, out, err = exec_command(module, cmd)
+ if check_rc and rc != 0:
+ module.fail_json(msg=to_text(err, errors='surrogate_or_strict'), rc=rc)
+ responses.append(to_text(out, errors='surrogate_or_strict'))
+ return responses
+
+
+def load_config(module, commands):
+ rc, out, err = exec_command(module, 'configure terminal')
+ if rc != 0:
+ module.fail_json(msg='unable to enter configuration mode', err=to_text(err, errors='surrogate_or_strict'))
+
+ for command in to_list(commands):
+ if command == 'end':
+ continue
+ rc, out, err = exec_command(module, command)
+ if rc != 0:
+ module.fail_json(msg=to_text(err, errors='surrogate_or_strict'), command=command, rc=rc)
+
+ exec_command(module, 'end')
+
+
+def get_sublevel_config(running_config, module):
+ contents = list()
+ current_config_contents = list()
+ running_config = NetworkConfig(contents=running_config, indent=1)
+ obj = running_config.get_object(module.params['parents'])
+ if obj:
+ contents = obj.children
+ contents[:0] = module.params['parents']
+
+ indent = 0
+ for c in contents:
+ if isinstance(c, str):
+ current_config_contents.append(c.rjust(len(c) + indent, ' '))
+ if isinstance(c, ConfigLine):
+ current_config_contents.append(c.raw)
+ indent = 1
+ sublevel_config = '\n'.join(current_config_contents)
+
+ return sublevel_config
diff --git a/collections-debian-merged/ansible_collections/dellemc/os9/plugins/modules/__init__.py b/collections-debian-merged/ansible_collections/dellemc/os9/plugins/modules/__init__.py
new file mode 100644
index 00000000..e69de29b
--- /dev/null
+++ b/collections-debian-merged/ansible_collections/dellemc/os9/plugins/modules/__init__.py
diff --git a/collections-debian-merged/ansible_collections/dellemc/os9/plugins/modules/os9_command.py b/collections-debian-merged/ansible_collections/dellemc/os9/plugins/modules/os9_command.py
new file mode 100644
index 00000000..c9d4f0f3
--- /dev/null
+++ b/collections-debian-merged/ansible_collections/dellemc/os9/plugins/modules/os9_command.py
@@ -0,0 +1,233 @@
+#!/usr/bin/python
+# -*- coding: utf-8 -*-
+
+# Copyright: (c) 2020, Peter Sprygada <psprygada@ansible.com>
+# Copyright: (c) 2020, Dell Inc.
+# GNU General Public License v3.0+ (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt)
+
+
+from __future__ import absolute_import, division, print_function
+__metaclass__ = type
+
+
+ANSIBLE_METADATA = {'metadata_version': '1.1',
+ 'status': ['preview'],
+ 'supported_by': 'community'}
+
+DOCUMENTATION = """
+---
+module: os9_command
+author: "Dhivya P (@dhivyap)"
+short_description: Run commands on remote devices running Dell OS9
+description:
+ - Sends arbitrary commands to a Dell OS9 node and returns the results
+ read from the device. This module includes an
+ argument that will cause the module to wait for a specific condition
+ before returning or timing out if the condition is not met.
+ - This module does not support running commands in configuration mode.
+ Please use M(dellemc_os9_os9_config) to configure Dell OS9 devices.
+extends_documentation_fragment: dellemc.os9.os9
+options:
+ commands:
+ description:
+ - List of commands to send to the remote os9 device over the
+ configured provider. The resulting output from the command
+ is returned. If the I(wait_for) argument is provided, the
+ module is not returned until the condition is satisfied or
+ the number of retries has expired.
+ type: list
+ elements: dict
+ required: true
+ wait_for:
+ description:
+ - List of conditions to evaluate against the output of the
+ command. The task will wait for each condition to be true
+ before moving forward. If the conditional is not true
+ within the configured number of I(retries), the task fails.
+ See examples.
+ type: list
+ elements: str
+ match:
+ description:
+ - The I(match) argument is used in conjunction with the
+ I(wait_for) argument to specify the match policy. Valid
+ values are C(all) or C(any). If the value is set to C(all)
+ then all conditionals in the wait_for must be satisfied. If
+ the value is set to C(any) then only one of the values must be
+ satisfied.
+ type: str
+ default: all
+ choices: [ all, any ]
+ retries:
+ description:
+ - Specifies the number of retries a command should be tried
+ before it is considered failed. The command is run on the
+ target device every retry and evaluated against the
+ I(wait_for) conditions.
+ type: int
+ default: 10
+ interval:
+ description:
+ - Configures the interval in seconds to wait between retries
+ of the command. If the command does not pass the specified
+ conditions, the interval indicates how long to wait before
+ trying the command again.
+ type: int
+ default: 1
+notes:
+ - This module requires Dell OS9 version 9.10.0.1P13 or above.
+ - This module requires to increase the ssh connection rate limit.
+ Use the following command I(ip ssh connection-rate-limit 60)
+ to configure the same. This can be done via M(os9_config) module
+ as well.
+"""
+
+EXAMPLES = """
+tasks:
+ - name: run show version on remote devices
+ os9_command:
+ commands: show version
+ - name: run show version and check to see if output contains OS9
+ os9_command:
+ commands: show version
+ wait_for: result[0] contains OS9
+ - name: run multiple commands on remote nodes
+ os9_command:
+ commands:
+ - show version
+ - show interfaces
+ - name: run multiple commands and evaluate the output
+ os9_command:
+ commands:
+ - show version
+ - show interfaces
+ wait_for:
+ - result[0] contains OS9
+ - result[1] contains Loopback
+"""
+
+RETURN = """
+stdout:
+ description: The set of responses from the commands
+ returned: always apart from low level errors (such as action plugin)
+ type: list
+ sample: ['...', '...']
+stdout_lines:
+ description: The value of stdout split into a list
+ returned: always apart from low level errors (such as action plugin)
+ type: list
+ sample: [['...', '...'], ['...'], ['...']]
+failed_conditions:
+ description: The list of conditionals that have failed
+ returned: failed
+ type: list
+ sample: ['...', '...']
+warnings:
+ description: The list of warnings (if any) generated by module based on arguments
+ returned: always
+ type: list
+ sample: ['...', '...']
+"""
+import time
+
+from ansible.module_utils.basic import AnsibleModule
+from ansible_collections.dellemc.os9.plugins.module_utils.network.os9 import run_commands
+from ansible_collections.dellemc.os9.plugins.module_utils.network.os9 import os9_argument_spec, check_args
+from ansible_collections.ansible.netcommon.plugins.module_utils.network.common.utils import ComplexList
+from ansible_collections.ansible.netcommon.plugins.module_utils.network.common.parsing import Conditional
+from ansible.module_utils.six import string_types
+
+
+def to_lines(stdout):
+ for item in stdout:
+ if isinstance(item, string_types):
+ item = str(item).split('\n')
+ yield item
+
+
+def parse_commands(module, warnings):
+ command = ComplexList(dict(
+ command=dict(key=True),
+ prompt=dict(),
+ answer=dict()
+ ), module)
+ commands = command(module.params['commands'])
+ for index, item in enumerate(commands):
+ if module.check_mode and not item['command'].startswith('show'):
+ warnings.append(
+ 'only show commands are supported when using check mode, not '
+ 'executing `%s`' % item['command']
+ )
+ elif item['command'].startswith('conf'):
+ module.fail_json(
+ msg='os9_command does not support running config mode '
+ 'commands. Please use os9_config instead'
+ )
+ return commands
+
+
+def main():
+ """main entry point for module execution
+ """
+ argument_spec = dict(
+ # { command: <str>, prompt: <str>, response: <str> }
+ commands=dict(type='list', elements='dict', required=True),
+
+ wait_for=dict(type='list', elements='str'),
+ match=dict(default='all', choices=['all', 'any']),
+
+ retries=dict(default=10, type='int'),
+ interval=dict(default=1, type='int')
+ )
+
+ argument_spec.update(os9_argument_spec)
+
+ module = AnsibleModule(argument_spec=argument_spec,
+ supports_check_mode=True)
+
+ result = {'changed': False}
+
+ warnings = list()
+ check_args(module, warnings)
+ commands = parse_commands(module, warnings)
+ result['warnings'] = warnings
+
+ wait_for = module.params['wait_for'] or list()
+ conditionals = [Conditional(c) for c in wait_for]
+
+ retries = module.params['retries']
+ interval = module.params['interval']
+ match = module.params['match']
+
+ while retries > 0:
+ responses = run_commands(module, commands)
+
+ for item in list(conditionals):
+ if item(responses):
+ if match == 'any':
+ conditionals = list()
+ break
+ conditionals.remove(item)
+
+ if not conditionals:
+ break
+
+ time.sleep(interval)
+ retries -= 1
+
+ if conditionals:
+ failed_conditions = [item.raw for item in conditionals]
+ msg = 'One or more conditional statements have not been satisfied'
+ module.fail_json(msg=msg, failed_conditions=failed_conditions)
+
+ result.update({
+ 'changed': False,
+ 'stdout': responses,
+ 'stdout_lines': list(to_lines(responses))
+ })
+
+ module.exit_json(**result)
+
+
+if __name__ == '__main__':
+ main()
diff --git a/collections-debian-merged/ansible_collections/dellemc/os9/plugins/modules/os9_config.py b/collections-debian-merged/ansible_collections/dellemc/os9/plugins/modules/os9_config.py
new file mode 100644
index 00000000..a6d20ed0
--- /dev/null
+++ b/collections-debian-merged/ansible_collections/dellemc/os9/plugins/modules/os9_config.py
@@ -0,0 +1,350 @@
+#!/usr/bin/python
+#
+# (c) 2020 Peter Sprygada, <psprygada@ansible.com>
+# Copyright (c) 2020 Dell Inc.
+# GNU General Public License v3.0+ (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt)
+
+from __future__ import absolute_import, division, print_function
+__metaclass__ = type
+
+
+ANSIBLE_METADATA = {'metadata_version': '1.1',
+ 'status': ['preview'],
+ 'supported_by': 'community'}
+
+
+DOCUMENTATION = """
+---
+module: os9_config
+author: "Dhivya P (@dhivyap)"
+short_description: Manage Dell EMC Networking OS9 configuration sections
+description:
+ - OS9 configurations use a simple block indent file syntax
+ for segmenting configuration into sections. This module provides
+ an implementation for working with OS9 configuration sections in
+ a deterministic way.
+extends_documentation_fragment: dellemc.os9.os9
+options:
+ lines:
+ description:
+ - The ordered set of commands that should be configured in the
+ section. The commands must be the exact same commands as found
+ in the device running-config. Be sure to note the configuration
+ command syntax as some commands are automatically modified by the
+ device config parser. This argument is mutually exclusive with I(src).
+ type: list
+ aliases: ['commands']
+ parents:
+ description:
+ - The ordered set of parents that uniquely identify the section or hierarchy
+ the commands should be checked against. If the parents argument
+ is omitted, the commands are checked against the set of top
+ level or global commands.
+ type: list
+ src:
+ description:
+ - Specifies the source path to the file that contains the configuration
+ or configuration template to load. The path to the source file can
+ either be the full path on the Ansible control host or a relative
+ path from the playbook or role root directory. This argument is
+ mutually exclusive with I(lines).
+ type: path
+ before:
+ description:
+ - The ordered set of commands to push on to the command stack if
+ a change needs to be made. This allows the playbook designer
+ the opportunity to perform configuration commands prior to pushing
+ any changes without affecting how the set of commands are matched
+ against the system.
+ type: list
+ after:
+ description:
+ - The ordered set of commands to append to the end of the command
+ stack if a change needs to be made. Just like with I(before) this
+ allows the playbook designer to append a set of commands to be
+ executed after the command set.
+ type: list
+ match:
+ description:
+ - Instructs the module on the way to perform the matching of
+ the set of commands against the current device config. If
+ match is set to I(line), commands are matched line by line. If
+ match is set to I(strict), command lines are matched with respect
+ to position. If match is set to I(exact), command lines
+ must be an equal match. Finally, if match is set to I(none), the
+ module will not attempt to compare the source configuration with
+ the running configuration on the remote device.
+ type: str
+ default: line
+ choices: ['line', 'strict', 'exact', 'none']
+ replace:
+ description:
+ - Instructs the module on the way to perform the configuration
+ on the device. If the replace argument is set to I(line) then
+ the modified lines are pushed to the device in configuration
+ mode. If the replace argument is set to I(block) then the entire
+ command block is pushed to the device in configuration mode if any
+ line is not correct.
+ type: str
+ default: line
+ choices: ['line', 'block']
+ update:
+ description:
+ - The I(update) argument controls how the configuration statements
+ are processed on the remote device. Valid choices for the I(update)
+ argument are I(merge) and I(check). When you set this argument to
+ I(merge), the configuration changes merge with the current
+ device running configuration. When you set this argument to I(check)
+ the configuration updates are determined but not actually configured
+ on the remote device.
+ type: str
+ default: merge
+ choices: ['merge', 'check']
+ save:
+ description:
+ - The C(save) argument instructs the module to save the running-
+ config to the startup-config at the conclusion of the module
+ running. If check mode is specified, this argument is ignored.
+ type: bool
+ default: no
+ config:
+ description:
+ - The module, by default, will connect to the remote device and
+ retrieve the current running-config to use as a base for comparing
+ against the contents of source. There are times when it is not
+ desirable to have the task get the current running-config for
+ every task in a playbook. The I(config) argument allows the
+ implementer to pass in the configuration to use as the base
+ config for comparison.
+ type: str
+ backup:
+ description:
+ - This argument will cause the module to create a full backup of
+ the current C(running-config) from the remote device before any
+ changes are made. If the C(backup_options) value is not given,
+ the backup file is written to the C(backup) folder in the playbook
+ root directory. If the directory does not exist, it is created.
+ type: bool
+ default: 'no'
+ backup_options:
+ description:
+ - This is a dict object containing configurable options related to backup file path.
+ The value of this option is read only when C(backup) is set to I(yes), if C(backup) is set
+ to I(no) this option will be silently ignored.
+ suboptions:
+ filename:
+ description:
+ - The filename to be used to store the backup configuration. If the the filename
+ is not given it will be generated based on the hostname, current time and date
+ in format defined by <hostname>_config.<current-date>@<current-time>
+ type: str
+ dir_path:
+ description:
+ - This option provides the path ending with directory name in which the backup
+ configuration file will be stored. If the directory does not exist it will be first
+ created and the filename is either the value of C(filename) or default filename
+ as described in C(filename) options description. If the path value is not given
+ in that case a I(backup) directory will be created in the current working directory
+ and backup configuration will be copied in C(filename) within I(backup) directory.
+ type: path
+ type: dict
+notes:
+ - This module requires Dell OS9 version 9.10.0.1P13 or above.
+ - This module requires to increase the ssh connection rate limit.
+ Use the following command I(ip ssh connection-rate-limit 60)
+ to configure the same. This can also be done with the
+ M(os9_config) module.
+"""
+
+EXAMPLES = """
+- os9_config:
+ lines: ['hostname {{ inventory_hostname }}']
+ provider: "{{ cli }}"
+- os9_config:
+ lines:
+ - 10 permit ip host 1.1.1.1 any log
+ - 20 permit ip host 2.2.2.2 any log
+ - 30 permit ip host 3.3.3.3 any log
+ - 40 permit ip host 4.4.4.4 any log
+ - 50 permit ip host 5.5.5.5 any log
+ parents: ['ip access-list extended test']
+ before: ['no ip access-list extended test']
+ match: exact
+- os9_config:
+ lines:
+ - 10 permit ip host 1.1.1.1 any log
+ - 20 permit ip host 2.2.2.2 any log
+ - 30 permit ip host 3.3.3.3 any log
+ - 40 permit ip host 4.4.4.4 any log
+ parents: ['ip access-list extended test']
+ before: ['no ip access-list extended test']
+ replace: block
+- os9_config:
+ lines: ['hostname {{ inventory_hostname }}']
+ provider: "{{ cli }}"
+ backup: yes
+ backup_options:
+ filename: backup.cfg
+ dir_path: /home/user
+"""
+
+RETURN = """
+updates:
+ description: The set of commands that will be pushed to the remote device.
+ returned: always
+ type: list
+ sample: ['hostname foo', 'router bgp 1', 'bgp router-id 1.1.1.1']
+commands:
+ description: The set of commands that will be pushed to the remote device
+ returned: always
+ type: list
+ sample: ['hostname foo', 'router bgp 1', 'bgp router-id 1.1.1.1']
+saved:
+ description: Returns whether the configuration is saved to the startup
+ configuration or not.
+ returned: When not check_mode.
+ type: bool
+ sample: True
+backup_path:
+ description: The full path to the backup file
+ returned: when backup is yes
+ type: str
+ sample: /playbooks/ansible/backup/os9_config.2016-07-16@22:28:34
+"""
+from ansible.module_utils.basic import AnsibleModule
+from ansible_collections.dellemc.os9.plugins.module_utils.network.os9 import get_config, get_sublevel_config
+from ansible_collections.dellemc.os9.plugins.module_utils.network.os9 import os9_argument_spec, check_args
+from ansible_collections.dellemc.os9.plugins.module_utils.network.os9 import load_config, run_commands
+from ansible_collections.dellemc.os9.plugins.module_utils.network.os9 import WARNING_PROMPTS_RE
+from ansible_collections.ansible.netcommon.plugins.module_utils.network.common.config import NetworkConfig, dumps
+
+
+def get_candidate(module):
+ candidate = NetworkConfig(indent=1)
+ if module.params['src']:
+ candidate.load(module.params['src'])
+ elif module.params['lines']:
+ parents = module.params['parents'] or list()
+ commands = module.params['lines'][0]
+ if (isinstance(commands, dict)) and (isinstance(commands['command'], list)):
+ candidate.add(commands['command'], parents=parents)
+ elif (isinstance(commands, dict)) and (isinstance(commands['command'], str)):
+ candidate.add([commands['command']], parents=parents)
+ else:
+ candidate.add(module.params['lines'], parents=parents)
+ return candidate
+
+
+def get_running_config(module):
+ contents = module.params['config']
+ if not contents:
+ contents = get_config(module)
+ return contents
+
+
+def main():
+
+ backup_spec = dict(
+ filename=dict(),
+ dir_path=dict(type='path')
+ )
+ argument_spec = dict(
+ lines=dict(aliases=['commands'], type='list'),
+ parents=dict(type='list'),
+
+ src=dict(type='path'),
+
+ before=dict(type='list'),
+ after=dict(type='list'),
+
+ match=dict(default='line',
+ choices=['line', 'strict', 'exact', 'none']),
+ replace=dict(default='line', choices=['line', 'block']),
+
+ update=dict(choices=['merge', 'check'], default='merge'),
+ save=dict(type='bool', default=False),
+ config=dict(),
+ backup=dict(type='bool', default=False),
+ backup_options=dict(type='dict', options=backup_spec)
+ )
+
+ argument_spec.update(os9_argument_spec)
+
+ mutually_exclusive = [('lines', 'src'),
+ ('parents', 'src')]
+ module = AnsibleModule(argument_spec=argument_spec,
+ mutually_exclusive=mutually_exclusive,
+ supports_check_mode=True)
+
+ parents = module.params['parents'] or list()
+
+ match = module.params['match']
+ replace = module.params['replace']
+
+ warnings = list()
+ check_args(module, warnings)
+
+ result = dict(changed=False, saved=False, warnings=warnings)
+
+ candidate = get_candidate(module)
+
+ if module.params['backup']:
+ if not module.check_mode:
+ result['__backup__'] = get_config(module)
+ commands = list()
+
+ if any((module.params['lines'], module.params['src'])):
+ if match != 'none':
+ config = get_running_config(module)
+ if parents:
+ contents = get_sublevel_config(config, module)
+ config = NetworkConfig(contents=contents, indent=1)
+ else:
+ config = NetworkConfig(contents=config, indent=1)
+ configobjs = candidate.difference(config, match=match, replace=replace)
+ else:
+ configobjs = candidate.items
+
+ if configobjs:
+ commands = dumps(configobjs, 'commands')
+ if ((isinstance(module.params['lines'], list)) and
+ (isinstance(module.params['lines'][0], dict)) and
+ set(['prompt', 'answer']).issubset(module.params['lines'][0])):
+
+ cmd = {'command': commands,
+ 'prompt': module.params['lines'][0]['prompt'],
+ 'answer': module.params['lines'][0]['answer']}
+ commands = [module.jsonify(cmd)]
+ else:
+ commands = commands.split('\n')
+
+ if module.params['before']:
+ commands[:0] = module.params['before']
+
+ if module.params['after']:
+ commands.extend(module.params['after'])
+
+ if not module.check_mode and module.params['update'] == 'merge':
+ load_config(module, commands)
+
+ result['changed'] = True
+ result['commands'] = commands
+ result['updates'] = commands
+
+ if module.params['save']:
+ result['changed'] = True
+ if not module.check_mode:
+ cmd = {'command': 'copy running-config startup-config',
+ 'prompt': r'\[confirm yes/no\]:\s?$', 'answer': 'yes'}
+ run_commands(module, [cmd])
+ result['saved'] = True
+ else:
+ module.warn('Skipping command `copy running-config startup-config`'
+ 'due to check_mode. Configuration not copied to '
+ 'non-volatile storage')
+
+ module.exit_json(**result)
+
+
+if __name__ == '__main__':
+ main()
diff --git a/collections-debian-merged/ansible_collections/dellemc/os9/plugins/modules/os9_facts.py b/collections-debian-merged/ansible_collections/dellemc/os9/plugins/modules/os9_facts.py
new file mode 100644
index 00000000..20a87231
--- /dev/null
+++ b/collections-debian-merged/ansible_collections/dellemc/os9/plugins/modules/os9_facts.py
@@ -0,0 +1,565 @@
+#!/usr/bin/python
+#
+# (c) 2020 Peter Sprygada, <psprygada@ansible.com>
+# Copyright (c) 2020 Dell Inc.
+# GNU General Public License v3.0+ (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt)
+
+from __future__ import absolute_import, division, print_function
+__metaclass__ = type
+
+
+ANSIBLE_METADATA = {'metadata_version': '1.1',
+ 'status': ['preview'],
+ 'supported_by': 'community'}
+
+
+DOCUMENTATION = """
+---
+module: os9_facts
+author: "Dhivya P (@dhivyap)"
+short_description: Collect facts from remote devices running Dell EMC Networking OS9
+description:
+ - Collects a base set of device facts from a remote device that
+ is running OS9. This module prepends all of the
+ base network fact keys with C(ansible_net_<fact>). The facts
+ module will always collect a base set of facts from the device
+ and can enable or disable collection of additional facts.
+extends_documentation_fragment: dellemc.os9.os9
+options:
+ gather_subset:
+ description:
+ - When supplied, this argument will restrict the facts collected
+ to a given subset. Possible values for this argument include
+ all, hardware, config, and interfaces. Can specify a list of
+ values to include a larger subset. Values can also be used
+ with an initial C(M(!)) to specify that a specific subset should
+ not be collected.
+ type: list
+ default: [ '!config' ]
+notes:
+ - This module requires OS9 version 9.10.0.1P13 or above.
+ - This module requires an increase of the SSH connection rate limit.
+ Use the following command I(ip ssh connection-rate-limit 60)
+ to configure the same. This can be also be done with the M(os9_config) module.
+"""
+
+EXAMPLES = """
+# Collect all facts from the device
+- os9_facts:
+ gather_subset: all
+# Collect only the config and default facts
+- os9_facts:
+ gather_subset:
+ - config
+# Do not collect hardware facts
+- os9_facts:
+ gather_subset:
+ - "!hardware"
+"""
+
+RETURN = """
+ansible_net_gather_subset:
+ description: The list of fact subsets collected from the device
+ returned: always
+ type: list
+# default
+ansible_net_model:
+ description: The model name returned from the device
+ returned: always
+ type: str
+ansible_net_serialnum:
+ description: The serial number of the remote device
+ returned: always
+ type: str
+ansible_net_version:
+ description: The operating system version running on the remote device
+ returned: always
+ type: str
+ansible_net_hostname:
+ description: The configured hostname of the device
+ returned: always
+ type: str
+ansible_net_image:
+ description: The image file the device is running
+ returned: always
+ type: str
+# hardware
+ansible_net_filesystems:
+ description: All file system names available on the device
+ returned: when hardware is configured
+ type: list
+ansible_net_memfree_mb:
+ description: The available free memory on the remote device in Mb
+ returned: when hardware is configured
+ type: int
+ansible_net_memtotal_mb:
+ description: The total memory on the remote device in Mb
+ returned: when hardware is configured
+ type: int
+# config
+ansible_net_config:
+ description: The current active config from the device
+ returned: when config is configured
+ type: str
+# interfaces
+ansible_net_all_ipv4_addresses:
+ description: All IPv4 addresses configured on the device
+ returned: when interfaces is configured
+ type: list
+ansible_net_all_ipv6_addresses:
+ description: All IPv6 addresses configured on the device
+ returned: when interfaces is configured
+ type: list
+ansible_net_interfaces:
+ description: A hash of all interfaces running on the system
+ returned: when interfaces is configured
+ type: dict
+ansible_net_neighbors:
+ description: The list of LLDP neighbors from the remote device
+ returned: when interfaces is configured
+ type: dict
+"""
+import re
+try:
+ from itertools import izip
+except ImportError:
+ izip = zip
+
+from ansible.module_utils.basic import AnsibleModule
+from ansible_collections.dellemc.os9.plugins.module_utils.network.os9 import run_commands
+from ansible_collections.dellemc.os9.plugins.module_utils.network.os9 import os9_argument_spec, check_args
+from ansible.module_utils.six import iteritems
+
+
+class FactsBase(object):
+
+ COMMANDS = list()
+
+ def __init__(self, module):
+ self.module = module
+ self.facts = dict()
+ self.responses = None
+
+ def populate(self):
+ self.responses = run_commands(self.module, self.COMMANDS, check_rc=False)
+
+ def run(self, cmd):
+ return run_commands(self.module, cmd, check_rc=False)
+
+
+class Default(FactsBase):
+
+ COMMANDS = [
+ 'show version',
+ 'show inventory',
+ 'show running-config | grep hostname'
+ ]
+
+ def populate(self):
+ super(Default, self).populate()
+ data = self.responses[0]
+ self.facts['version'] = self.parse_version(data)
+ self.facts['model'] = self.parse_model(data)
+ self.facts['image'] = self.parse_image(data)
+
+ data = self.responses[1]
+ self.facts['serialnum'] = self.parse_serialnum(data)
+
+ data = self.responses[2]
+ self.facts['hostname'] = self.parse_hostname(data)
+
+ def parse_version(self, data):
+ match = re.search(r'Software Version:\s*(.+)', data)
+ if match:
+ return match.group(1)
+
+ def parse_hostname(self, data):
+ match = re.search(r'^hostname (.+)', data, re.M)
+ if match:
+ return match.group(1)
+
+ def parse_model(self, data):
+ match = re.search(r'^System Type:\s*(.+)', data, re.M)
+ if match:
+ return match.group(1)
+
+ def parse_image(self, data):
+ match = re.search(r'image file is "(.+)"', data)
+ if match:
+ return match.group(1)
+
+ def parse_serialnum(self, data):
+ for line in data.split('\n'):
+ if line.startswith('*'):
+ match = re.search(
+ r'\s+(\S+)\s+(\S+)\s+(\S+)\s+(\S+)', line, re.M)
+ if match:
+ return match.group(3)
+
+
+class Hardware(FactsBase):
+
+ COMMANDS = [
+ 'show file-systems',
+ 'show memory | except Processor'
+ ]
+
+ def populate(self):
+ super(Hardware, self).populate()
+ data = self.responses[0]
+ self.facts['filesystems'] = self.parse_filesystems(data)
+
+ data = self.responses[1]
+ match = re.findall(r'\s(\d+)\s', data)
+ if match:
+ self.facts['memtotal_mb'] = int(match[0]) // 1024
+ self.facts['memfree_mb'] = int(match[2]) // 1024
+
+ def parse_filesystems(self, data):
+ return re.findall(r'\s(\S+):$', data, re.M)
+
+
+class Config(FactsBase):
+
+ COMMANDS = ['show running-config']
+
+ def populate(self):
+ super(Config, self).populate()
+ self.facts['config'] = self.responses[0]
+
+
+class Interfaces(FactsBase):
+
+ COMMANDS = [
+ 'show interfaces',
+ 'show ipv6 interface',
+ 'show lldp neighbors detail',
+ 'show inventory'
+ ]
+
+ def populate(self):
+ super(Interfaces, self).populate()
+ self.facts['all_ipv4_addresses'] = list()
+ self.facts['all_ipv6_addresses'] = list()
+
+ data = self.responses[0]
+ interfaces = self.parse_interfaces(data)
+
+ for key in list(interfaces.keys()):
+ if "ManagementEthernet" in key:
+ temp_parsed = interfaces[key]
+ del interfaces[key]
+ interfaces.update(self.parse_mgmt_interfaces(temp_parsed))
+
+ for key in list(interfaces.keys()):
+ if "Vlan" in key:
+ temp_parsed = interfaces[key]
+ del interfaces[key]
+ interfaces.update(self.parse_vlan_interfaces(temp_parsed))
+
+ self.facts['interfaces'] = self.populate_interfaces(interfaces)
+
+ data = self.responses[1]
+ if len(data) > 0:
+ data = self.parse_ipv6_interfaces(data)
+ self.populate_ipv6_interfaces(data)
+
+ data = self.responses[3]
+ if 'LLDP' in self.get_protocol_list(data):
+ neighbors = self.responses[2]
+ self.facts['neighbors'] = self.parse_neighbors(neighbors)
+
+ def get_protocol_list(self, data):
+ start = False
+ protocol_list = list()
+ for line in data.split('\n'):
+ match = re.search(r'Software Protocol Configured\s*', line)
+ if match:
+ start = True
+ continue
+ if start:
+ line = line.strip()
+ if line.isalnum():
+ protocol_list.append(line)
+ return protocol_list
+
+ def populate_interfaces(self, interfaces):
+ facts = dict()
+ for key, value in interfaces.items():
+ intf = dict()
+ intf['description'] = self.parse_description(value)
+ intf['macaddress'] = self.parse_macaddress(value)
+ ipv4 = self.parse_ipv4(value)
+ intf['ipv4'] = self.parse_ipv4(value)
+ if ipv4:
+ self.add_ip_address(ipv4['address'], 'ipv4')
+
+ intf['mtu'] = self.parse_mtu(value)
+ intf['bandwidth'] = self.parse_bandwidth(value)
+ intf['mediatype'] = self.parse_mediatype(value)
+ intf['duplex'] = self.parse_duplex(value)
+ intf['lineprotocol'] = self.parse_lineprotocol(value)
+ intf['operstatus'] = self.parse_operstatus(value)
+ intf['type'] = self.parse_type(value)
+
+ facts[key] = intf
+ return facts
+
+ def populate_ipv6_interfaces(self, data):
+ for key, value in data.items():
+ if key in self.facts['interfaces']:
+ self.facts['interfaces'][key]['ipv6'] = list()
+ addresses = re.findall(r'\s+(.+), subnet', value, re.M)
+ subnets = re.findall(r', subnet is (\S+)', value, re.M)
+ for addr, subnet in izip(addresses, subnets):
+ ipv6 = dict(address=addr.strip(), subnet=subnet.strip())
+ self.add_ip_address(addr.strip(), 'ipv6')
+ self.facts['interfaces'][key]['ipv6'].append(ipv6)
+
+ def add_ip_address(self, address, family):
+ if family == 'ipv4':
+ self.facts['all_ipv4_addresses'].append(address)
+ else:
+ self.facts['all_ipv6_addresses'].append(address)
+
+ def parse_neighbors(self, neighbors):
+ facts = dict()
+
+ for entry in neighbors.split(
+ '========================================================================'):
+ if entry == '':
+ continue
+
+ intf = self.parse_lldp_intf(entry)
+ if intf not in facts:
+ facts[intf] = list()
+ fact = dict()
+ fact['host'] = self.parse_lldp_host(entry)
+ fact['port'] = self.parse_lldp_port(entry)
+ facts[intf].append(fact)
+ return facts
+
+ def parse_interfaces(self, data):
+ parsed = dict()
+ newline_count = 0
+ interface_start = True
+
+ for line in data.split('\n'):
+ if interface_start:
+ newline_count = 0
+ if len(line) == 0:
+ newline_count += 1
+ if newline_count == 2:
+ interface_start = True
+ else:
+ match = re.match(r'^(\S+) (\S+)', line)
+ if match and interface_start:
+ interface_start = False
+ key = match.group(0)
+ parsed[key] = line
+ else:
+ parsed[key] += '\n%s' % line
+ return parsed
+
+ def parse_mgmt_interfaces(self, data):
+ parsed = dict()
+ interface_start = True
+ for line in data.split('\n'):
+ match = re.match(r'^(\S+) (\S+)', line)
+ if "Time since" in line:
+ interface_start = True
+ parsed[key] += '\n%s' % line
+ elif match and interface_start:
+ interface_start = False
+ key = match.group(0)
+ parsed[key] = line
+ else:
+ parsed[key] += '\n%s' % line
+ return parsed
+
+ def parse_vlan_interfaces(self, data):
+ parsed = dict()
+ interface_start = True
+ line_before_end = False
+ for line in data.split('\n'):
+ match = re.match(r'^(\S+) (\S+)', line)
+ match_endline = re.match(r'^\s*\d+ packets, \d+ bytes$', line)
+
+ if "Output Statistics" in line:
+ line_before_end = True
+ parsed[key] += '\n%s' % line
+ elif match_endline and line_before_end:
+ line_before_end = False
+ interface_start = True
+ parsed[key] += '\n%s' % line
+ elif match and interface_start:
+ interface_start = False
+ key = match.group(0)
+ parsed[key] = line
+ else:
+ parsed[key] += '\n%s' % line
+ return parsed
+
+ def parse_ipv6_interfaces(self, data):
+ parsed = dict()
+ for line in data.split('\n'):
+ if len(line) == 0:
+ continue
+ if line[0] == ' ':
+ parsed[key] += '\n%s' % line
+ else:
+ match = re.match(r'^(\S+) (\S+)', line)
+ if match:
+ key = match.group(0)
+ parsed[key] = line
+ return parsed
+
+ def parse_description(self, data):
+ match = re.search(r'Description: (.+)$', data, re.M)
+ if match:
+ return match.group(1)
+
+ def parse_macaddress(self, data):
+ match = re.search(r'address is (\S+)', data)
+ if match:
+ if match.group(1) != "not":
+ return match.group(1)
+
+ def parse_ipv4(self, data):
+ match = re.search(r'Internet address is (\S+)', data)
+ if match:
+ if match.group(1) != "not":
+ addr, masklen = match.group(1).split('/')
+ return dict(address=addr, masklen=int(masklen))
+
+ def parse_mtu(self, data):
+ match = re.search(r'MTU (\d+)', data)
+ if match:
+ return int(match.group(1))
+
+ def parse_bandwidth(self, data):
+ match = re.search(r'LineSpeed (\d+)', data)
+ if match:
+ return int(match.group(1))
+
+ def parse_duplex(self, data):
+ match = re.search(r'(\w+) duplex', data, re.M)
+ if match:
+ return match.group(1)
+
+ def parse_mediatype(self, data):
+ media = re.search(r'(.+) media present, (.+)', data, re.M)
+ if media:
+ match = re.search(r'type is (.+)$', media.group(0), re.M)
+ return match.group(1)
+
+ def parse_type(self, data):
+ match = re.search(r'Hardware is (.+),', data, re.M)
+ if match:
+ return match.group(1)
+
+ def parse_lineprotocol(self, data):
+ match = re.search(r'line protocol is (\w+[ ]?\w*)\(?.*\)?$', data, re.M)
+ if match:
+ return match.group(1)
+
+ def parse_operstatus(self, data):
+ match = re.search(r'^(?:.+) is (.+),', data, re.M)
+ if match:
+ return match.group(1)
+
+ def parse_lldp_intf(self, data):
+ match = re.search(r'^\sLocal Interface (\S+\s\S+)', data, re.M)
+ if match:
+ return match.group(1)
+
+ def parse_lldp_host(self, data):
+ match = re.search(r'Remote System Name: (.+)$', data, re.M)
+ if match:
+ return match.group(1)
+
+ def parse_lldp_port(self, data):
+ match = re.search(r'Remote Port ID: (.+)$', data, re.M)
+ if match:
+ return match.group(1)
+
+
+FACT_SUBSETS = dict(
+ default=Default,
+ hardware=Hardware,
+ interfaces=Interfaces,
+ config=Config,
+)
+
+VALID_SUBSETS = frozenset(FACT_SUBSETS.keys())
+
+
+def main():
+ """main entry point for module execution
+ """
+ argument_spec = dict(
+ gather_subset=dict(default=['!config'], type='list')
+ )
+
+ argument_spec.update(os9_argument_spec)
+
+ module = AnsibleModule(argument_spec=argument_spec,
+ supports_check_mode=True)
+
+ gather_subset = module.params['gather_subset']
+
+ runable_subsets = set()
+ exclude_subsets = set()
+
+ for subset in gather_subset:
+ if subset == 'all':
+ runable_subsets.update(VALID_SUBSETS)
+ continue
+
+ if subset.startswith('!'):
+ subset = subset[1:]
+ if subset == 'all':
+ exclude_subsets.update(VALID_SUBSETS)
+ continue
+ exclude = True
+ else:
+ exclude = False
+
+ if subset not in VALID_SUBSETS:
+ module.fail_json(msg='Bad subset')
+
+ if exclude:
+ exclude_subsets.add(subset)
+ else:
+ runable_subsets.add(subset)
+
+ if not runable_subsets:
+ runable_subsets.update(VALID_SUBSETS)
+
+ runable_subsets.difference_update(exclude_subsets)
+ runable_subsets.add('default')
+
+ facts = dict()
+ facts['gather_subset'] = list(runable_subsets)
+
+ instances = list()
+ for key in runable_subsets:
+ instances.append(FACT_SUBSETS[key](module))
+
+ for inst in instances:
+ inst.populate()
+ facts.update(inst.facts)
+
+ ansible_facts = dict()
+ for key, value in iteritems(facts):
+ key = 'ansible_net_%s' % key
+ ansible_facts[key] = value
+
+ warnings = list()
+ check_args(module, warnings)
+
+ module.exit_json(ansible_facts=ansible_facts, warnings=warnings)
+
+
+if __name__ == '__main__':
+ main()
diff --git a/collections-debian-merged/ansible_collections/dellemc/os9/plugins/terminal/__init__.py b/collections-debian-merged/ansible_collections/dellemc/os9/plugins/terminal/__init__.py
new file mode 100644
index 00000000..e69de29b
--- /dev/null
+++ b/collections-debian-merged/ansible_collections/dellemc/os9/plugins/terminal/__init__.py
diff --git a/collections-debian-merged/ansible_collections/dellemc/os9/plugins/terminal/os9.py b/collections-debian-merged/ansible_collections/dellemc/os9/plugins/terminal/os9.py
new file mode 100644
index 00000000..e0052fc4
--- /dev/null
+++ b/collections-debian-merged/ansible_collections/dellemc/os9/plugins/terminal/os9.py
@@ -0,0 +1,83 @@
+#
+# (c) 2020 Red Hat Inc.
+#
+# Copyright (c) 2020 Dell Inc.
+#
+# This file is part of Ansible
+#
+# Ansible is free software: you can redistribute it and/or modify
+# it under the terms of the GNU General Public License as published by
+# the Free Software Foundation, either version 3 of the License, or
+# (at your option) any later version.
+#
+# Ansible is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with Ansible. If not, see <http://www.gnu.org/licenses/>.
+#
+from __future__ import (absolute_import, division, print_function)
+__metaclass__ = type
+
+import re
+import json
+
+from ansible.module_utils._text import to_text, to_bytes
+from ansible.plugins.terminal import TerminalBase
+from ansible.errors import AnsibleConnectionFailure
+
+
+class TerminalModule(TerminalBase):
+
+ terminal_stdout_re = [
+ re.compile(br"[\r\n]?[\w+\-\.:\/\[\]]+(?:\([^\)]+\)){,3}(?:>|#) ?$"),
+ re.compile(br"\[\w+\@[\w\-\.]+(?: [^\]])\] ?[>#\$] ?$")
+ ]
+
+ terminal_stderr_re = [
+ re.compile(br"% ?Error: (?:(?!\bdoes not exist\b)(?!\balready exists\b)(?!\bHost not found\b)(?!\bnot active\b).)*\n"),
+ re.compile(br"% ?Bad secret"),
+ re.compile(br"invalid input", re.I),
+ re.compile(br"(?:incomplete|ambiguous) command", re.I),
+ re.compile(br"connection timed out", re.I),
+ re.compile(br"'[^']' +returned error code: ?\d+"),
+ ]
+
+ terminal_initial_prompt = br"\[y/n\]:"
+
+ terminal_initial_answer = b"y"
+
+ def on_open_shell(self):
+ try:
+ self._exec_cli_command(b'terminal length 0')
+ except AnsibleConnectionFailure:
+ raise AnsibleConnectionFailure('unable to set terminal parameters')
+
+ def on_become(self, passwd=None):
+ if self._get_prompt().endswith(b'#'):
+ return
+
+ cmd = {u'command': u'enable'}
+ if passwd:
+ cmd[u'prompt'] = to_text(r"[\r\n]?password: $", errors='surrogate_or_strict')
+ cmd[u'answer'] = passwd
+
+ try:
+ self._exec_cli_command(to_bytes(json.dumps(cmd), errors='surrogate_or_strict'))
+ except AnsibleConnectionFailure:
+ raise AnsibleConnectionFailure('unable to elevate privilege to enable mode')
+
+ def on_unbecome(self):
+ prompt = self._get_prompt()
+ if prompt is None:
+ # if prompt is None most likely the terminal is hung up at a prompt
+ return
+
+ if prompt.strip().endswith(b')#'):
+ self._exec_cli_command(b'end')
+ self._exec_cli_command(b'disable')
+
+ elif prompt.endswith(b'#'):
+ self._exec_cli_command(b'disable')