2016-09-02 17:01:59 +00:00
|
|
|
#!/usr/bin/python
|
|
|
|
#
|
|
|
|
# This file is part of Ansible
|
|
|
|
#
|
|
|
|
# Ansible is free software: you can redistribute it and/or modify
|
|
|
|
# it under the terms of the GNU General Public License as published by
|
|
|
|
# the Free Software Foundation, either version 3 of the License, or
|
|
|
|
# (at your option) any later version.
|
|
|
|
#
|
|
|
|
# Ansible is distributed in the hope that it will be useful,
|
|
|
|
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
# GNU General Public License for more details.
|
|
|
|
#
|
|
|
|
# You should have received a copy of the GNU General Public License
|
|
|
|
# along with Ansible. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
#
|
|
|
|
|
|
|
|
|
2017-08-16 03:16:38 +00:00
|
|
|
ANSIBLE_METADATA = {'metadata_version': '1.1',
|
|
|
|
'status': ['preview'],
|
2017-08-16 04:10:36 +00:00
|
|
|
'supported_by': 'network'}
|
2016-12-06 10:35:05 +00:00
|
|
|
|
2016-09-02 17:01:59 +00:00
|
|
|
DOCUMENTATION = '''
|
|
|
|
---
|
|
|
|
module: nxos_hsrp
|
2017-03-06 13:53:33 +00:00
|
|
|
extends_documentation_fragment: nxos
|
2016-09-02 17:01:59 +00:00
|
|
|
version_added: "2.2"
|
2016-12-08 02:33:38 +00:00
|
|
|
short_description: Manages HSRP configuration on NX-OS switches.
|
2016-09-02 17:01:59 +00:00
|
|
|
description:
|
2017-05-19 16:40:42 +00:00
|
|
|
- Manages HSRP configuration on NX-OS switches.
|
2016-09-02 17:01:59 +00:00
|
|
|
author:
|
2017-05-19 16:40:42 +00:00
|
|
|
- Jason Edelman (@jedelman8)
|
|
|
|
- Gabriele Gerbino (@GGabriele)
|
2016-09-02 17:01:59 +00:00
|
|
|
notes:
|
2017-08-24 12:27:39 +00:00
|
|
|
- Tested against NXOSv 7.3.(0)D1(1) on VIRL
|
2017-05-19 16:40:42 +00:00
|
|
|
- HSRP feature needs to be enabled first on the system.
|
|
|
|
- SVIs must exist before using this module.
|
|
|
|
- Interface must be a L3 port before using this module.
|
|
|
|
- HSRP cannot be configured on loopback interfaces.
|
|
|
|
- MD5 authentication is only possible with HSRPv2 while it is ignored if
|
|
|
|
HSRPv1 is used instead, while it will not raise any error. Here we allow
|
|
|
|
MD5 authentication only with HSRPv2 in order to enforce better practice.
|
2016-09-02 17:01:59 +00:00
|
|
|
options:
|
2017-05-19 16:40:42 +00:00
|
|
|
group:
|
|
|
|
description:
|
|
|
|
- HSRP group number.
|
|
|
|
required: true
|
|
|
|
interface:
|
|
|
|
description:
|
|
|
|
- Full name of interface that is being managed for HSRP.
|
|
|
|
required: true
|
|
|
|
version:
|
|
|
|
description:
|
|
|
|
- HSRP version.
|
2018-04-10 03:54:05 +00:00
|
|
|
default: 1
|
2017-05-19 16:40:42 +00:00
|
|
|
choices: ['1','2']
|
|
|
|
priority:
|
|
|
|
description:
|
2018-04-10 03:54:05 +00:00
|
|
|
- HSRP priority or keyword 'default'.
|
2018-01-16 12:53:58 +00:00
|
|
|
preempt:
|
|
|
|
description:
|
|
|
|
- Enable/Disable preempt.
|
|
|
|
choices: ['enabled', 'disabled']
|
2017-05-19 16:40:42 +00:00
|
|
|
vip:
|
|
|
|
description:
|
2018-04-10 03:54:05 +00:00
|
|
|
- HSRP virtual IP address or keyword 'default'
|
2017-05-19 16:40:42 +00:00
|
|
|
auth_string:
|
|
|
|
description:
|
2018-04-10 03:54:05 +00:00
|
|
|
- Authentication string. If this needs to be hidden(for md5 type), the string
|
|
|
|
should be 7 followed by the key string. Otherwise, it can be 0 followed by
|
|
|
|
key string or just key string (for backward compatibility). For text type,
|
|
|
|
this should be just be a key string. if this is 'default', authentication
|
|
|
|
is removed.
|
2017-05-19 16:40:42 +00:00
|
|
|
auth_type:
|
|
|
|
description:
|
|
|
|
- Authentication type.
|
|
|
|
choices: ['text','md5']
|
|
|
|
state:
|
|
|
|
description:
|
|
|
|
- Specify desired state of the resource.
|
|
|
|
choices: ['present','absent']
|
|
|
|
default: 'present'
|
2016-09-02 17:01:59 +00:00
|
|
|
'''
|
|
|
|
|
|
|
|
EXAMPLES = '''
|
2016-11-22 16:07:21 +00:00
|
|
|
- name: Ensure HSRP is configured with following params on a SVI
|
|
|
|
nxos_hsrp:
|
|
|
|
group: 10
|
|
|
|
vip: 10.1.1.1
|
|
|
|
priority: 150
|
|
|
|
interface: vlan10
|
|
|
|
preempt: enabled
|
|
|
|
host: 68.170.147.165
|
|
|
|
|
|
|
|
- name: Ensure HSRP is configured with following params on a SVI
|
2018-04-10 03:54:05 +00:00
|
|
|
with clear text authentication
|
2016-11-22 16:07:21 +00:00
|
|
|
nxos_hsrp:
|
|
|
|
group: 10
|
|
|
|
vip: 10.1.1.1
|
|
|
|
priority: 150
|
|
|
|
interface: vlan10
|
|
|
|
preempt: enabled
|
|
|
|
host: 68.170.147.165
|
|
|
|
auth_type: text
|
|
|
|
auth_string: CISCO
|
|
|
|
|
2018-04-10 03:54:05 +00:00
|
|
|
- name: Ensure HSRP is configured with md5 authentication and clear
|
|
|
|
authentication string
|
|
|
|
nxos_hsrp:
|
|
|
|
group: 10
|
|
|
|
vip: 10.1.1.1
|
|
|
|
priority: 150
|
|
|
|
interface: vlan10
|
|
|
|
preempt: enabled
|
|
|
|
host: 68.170.147.165
|
|
|
|
auth_type: md5
|
|
|
|
auth_string: "0 1234"
|
|
|
|
|
|
|
|
- name: Ensure HSRP is configured with md5 authentication and hidden
|
|
|
|
authentication string
|
|
|
|
nxos_hsrp:
|
|
|
|
group: 10
|
|
|
|
vip: 10.1.1.1
|
|
|
|
priority: 150
|
|
|
|
interface: vlan10
|
|
|
|
preempt: enabled
|
|
|
|
host: 68.170.147.165
|
|
|
|
auth_type: md5
|
|
|
|
auth_string: "7 1234"
|
|
|
|
|
2016-11-22 16:07:21 +00:00
|
|
|
- name: Remove HSRP config for given interface, group, and VIP
|
|
|
|
nxos_hsrp:
|
|
|
|
group: 10
|
|
|
|
interface: vlan10
|
|
|
|
vip: 10.1.1.1
|
|
|
|
host: 68.170.147.165
|
|
|
|
state: absent
|
2016-09-02 17:01:59 +00:00
|
|
|
'''
|
|
|
|
|
|
|
|
RETURN = '''
|
2017-05-19 16:40:42 +00:00
|
|
|
commands:
|
2016-09-02 17:01:59 +00:00
|
|
|
description: commands sent to the device
|
|
|
|
returned: always
|
|
|
|
type: list
|
|
|
|
sample: ["interface vlan10", "hsrp version 2", "hsrp 30", "ip 10.30.1.1"]
|
|
|
|
'''
|
|
|
|
|
2017-12-03 16:12:30 +00:00
|
|
|
from ansible.module_utils.network.nxos.nxos import load_config, run_commands
|
2017-12-19 06:52:33 +00:00
|
|
|
from ansible.module_utils.network.nxos.nxos import get_capabilities, nxos_argument_spec
|
2018-05-29 15:36:08 +00:00
|
|
|
from ansible.module_utils.network.nxos.nxos import get_interface_type
|
2017-02-15 16:43:09 +00:00
|
|
|
from ansible.module_utils.basic import AnsibleModule
|
2016-09-02 17:01:59 +00:00
|
|
|
|
|
|
|
|
2018-04-10 03:54:05 +00:00
|
|
|
PARAM_TO_DEFAULT_KEYMAP = {
|
|
|
|
'vip': None,
|
|
|
|
'priority': '100',
|
|
|
|
'auth_type': 'text',
|
|
|
|
'auth_string': 'cisco',
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2016-09-02 17:01:59 +00:00
|
|
|
def apply_key_map(key_map, table):
|
|
|
|
new_dict = {}
|
2017-05-19 16:40:42 +00:00
|
|
|
for key in table:
|
2016-09-02 17:01:59 +00:00
|
|
|
new_key = key_map.get(key)
|
|
|
|
if new_key:
|
|
|
|
value = table.get(key)
|
|
|
|
if value:
|
|
|
|
new_dict[new_key] = str(value)
|
|
|
|
else:
|
|
|
|
new_dict[new_key] = value
|
|
|
|
return new_dict
|
|
|
|
|
|
|
|
|
|
|
|
def get_interface_mode(interface, intf_type, module):
|
2018-05-29 16:13:34 +00:00
|
|
|
command = 'show interface {0} | json'.format(interface)
|
2016-09-02 17:01:59 +00:00
|
|
|
interface = {}
|
|
|
|
mode = 'unknown'
|
2017-05-19 16:40:42 +00:00
|
|
|
try:
|
2018-05-29 16:13:34 +00:00
|
|
|
body = run_commands(module, [command])[0]
|
2017-05-19 16:40:42 +00:00
|
|
|
except IndexError:
|
|
|
|
return None
|
2016-09-02 17:01:59 +00:00
|
|
|
|
|
|
|
if intf_type in ['ethernet', 'portchannel']:
|
|
|
|
interface_table = body['TABLE_interface']['ROW_interface']
|
|
|
|
mode = str(interface_table.get('eth_mode', 'layer3'))
|
|
|
|
if mode == 'access' or mode == 'trunk':
|
|
|
|
mode = 'layer2'
|
|
|
|
elif intf_type == 'svi':
|
|
|
|
mode = 'layer3'
|
|
|
|
return mode
|
|
|
|
|
|
|
|
|
|
|
|
def get_hsrp_group(group, interface, module):
|
2018-05-29 16:13:34 +00:00
|
|
|
command = 'show hsrp group {0} all | json'.format(group)
|
2016-09-02 17:01:59 +00:00
|
|
|
hsrp = {}
|
|
|
|
|
|
|
|
hsrp_key = {
|
|
|
|
'sh_if_index': 'interface',
|
|
|
|
'sh_group_num': 'group',
|
|
|
|
'sh_group_version': 'version',
|
|
|
|
'sh_cfg_prio': 'priority',
|
|
|
|
'sh_preempt': 'preempt',
|
|
|
|
'sh_vip': 'vip',
|
|
|
|
'sh_authentication_type': 'auth_type',
|
2018-04-10 03:54:05 +00:00
|
|
|
'sh_keystring_attr': 'auth_enc',
|
2016-09-02 17:01:59 +00:00
|
|
|
'sh_authentication_data': 'auth_string'
|
|
|
|
}
|
|
|
|
|
|
|
|
try:
|
2018-05-29 16:13:34 +00:00
|
|
|
body = run_commands(module, [command])[0]
|
2017-05-19 16:40:42 +00:00
|
|
|
hsrp_table = body['TABLE_grp_detail']['ROW_grp_detail']
|
2018-05-29 16:13:34 +00:00
|
|
|
except (AttributeError, IndexError, TypeError, KeyError):
|
2016-09-02 17:01:59 +00:00
|
|
|
return {}
|
|
|
|
|
|
|
|
if isinstance(hsrp_table, dict):
|
|
|
|
hsrp_table = [hsrp_table]
|
|
|
|
|
|
|
|
for hsrp_group in hsrp_table:
|
|
|
|
parsed_hsrp = apply_key_map(hsrp_key, hsrp_group)
|
|
|
|
|
|
|
|
parsed_hsrp['interface'] = parsed_hsrp['interface'].lower()
|
|
|
|
|
|
|
|
if parsed_hsrp['version'] == 'v1':
|
|
|
|
parsed_hsrp['version'] = '1'
|
|
|
|
elif parsed_hsrp['version'] == 'v2':
|
|
|
|
parsed_hsrp['version'] = '2'
|
|
|
|
|
2018-04-10 03:54:05 +00:00
|
|
|
if parsed_hsrp['auth_type'] == 'md5':
|
|
|
|
if parsed_hsrp['auth_enc'] == 'hidden':
|
|
|
|
parsed_hsrp['auth_enc'] = '7'
|
|
|
|
else:
|
|
|
|
parsed_hsrp['auth_enc'] = '0'
|
|
|
|
|
2016-09-02 17:01:59 +00:00
|
|
|
if parsed_hsrp['interface'] == interface:
|
|
|
|
return parsed_hsrp
|
|
|
|
|
|
|
|
return hsrp
|
|
|
|
|
|
|
|
|
|
|
|
def get_commands_remove_hsrp(group, interface):
|
2017-05-19 16:40:42 +00:00
|
|
|
commands = ['interface {0}'.format(interface), 'no hsrp {0}'.format(group)]
|
2016-09-02 17:01:59 +00:00
|
|
|
return commands
|
|
|
|
|
|
|
|
|
2018-04-10 03:54:05 +00:00
|
|
|
def get_commands_config_hsrp(delta, interface, args, existing):
|
2016-09-02 17:01:59 +00:00
|
|
|
commands = []
|
|
|
|
|
|
|
|
config_args = {
|
|
|
|
'group': 'hsrp {group}',
|
2018-04-10 03:54:05 +00:00
|
|
|
'priority': '{priority}',
|
2016-09-02 17:01:59 +00:00
|
|
|
'preempt': '{preempt}',
|
2018-04-10 03:54:05 +00:00
|
|
|
'vip': '{vip}'
|
2016-09-02 17:01:59 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
preempt = delta.get('preempt', None)
|
|
|
|
group = delta.get('group', None)
|
2018-04-10 03:54:05 +00:00
|
|
|
vip = delta.get('vip', None)
|
|
|
|
priority = delta.get('priority', None)
|
|
|
|
|
2016-09-02 17:01:59 +00:00
|
|
|
if preempt:
|
|
|
|
if preempt == 'enabled':
|
|
|
|
delta['preempt'] = 'preempt'
|
|
|
|
elif preempt == 'disabled':
|
|
|
|
delta['preempt'] = 'no preempt'
|
|
|
|
|
2018-04-10 03:54:05 +00:00
|
|
|
if priority:
|
|
|
|
if priority == 'default':
|
|
|
|
if existing and existing.get('priority') != PARAM_TO_DEFAULT_KEYMAP.get('priority'):
|
|
|
|
delta['priority'] = 'no priority'
|
|
|
|
else:
|
|
|
|
del(delta['priority'])
|
|
|
|
else:
|
|
|
|
delta['priority'] = 'priority {0}'.format(delta['priority'])
|
|
|
|
|
|
|
|
if vip:
|
|
|
|
if vip == 'default':
|
|
|
|
if existing and existing.get('vip') != PARAM_TO_DEFAULT_KEYMAP.get('vip'):
|
|
|
|
delta['vip'] = 'no ip'
|
|
|
|
else:
|
|
|
|
del(delta['vip'])
|
|
|
|
else:
|
|
|
|
delta['vip'] = 'ip {0}'.format(delta['vip'])
|
|
|
|
|
2017-05-19 16:40:42 +00:00
|
|
|
for key in delta:
|
2016-09-02 17:01:59 +00:00
|
|
|
command = config_args.get(key, 'DNE').format(**delta)
|
|
|
|
if command and command != 'DNE':
|
|
|
|
if key == 'group':
|
|
|
|
commands.insert(0, command)
|
|
|
|
else:
|
|
|
|
commands.append(command)
|
|
|
|
command = None
|
|
|
|
|
|
|
|
auth_type = delta.get('auth_type', None)
|
|
|
|
auth_string = delta.get('auth_string', None)
|
2018-04-10 03:54:05 +00:00
|
|
|
auth_enc = delta.get('auth_enc', None)
|
2016-09-02 17:01:59 +00:00
|
|
|
if auth_type or auth_string:
|
|
|
|
if not auth_type:
|
|
|
|
auth_type = args['auth_type']
|
|
|
|
elif not auth_string:
|
|
|
|
auth_string = args['auth_string']
|
2018-04-10 03:54:05 +00:00
|
|
|
if auth_string != 'default':
|
|
|
|
if auth_type == 'md5':
|
|
|
|
command = 'authentication md5 key-string {0} {1}'.format(auth_enc, auth_string)
|
|
|
|
commands.append(command)
|
|
|
|
elif auth_type == 'text':
|
|
|
|
command = 'authentication text {0}'.format(auth_string)
|
|
|
|
commands.append(command)
|
|
|
|
else:
|
|
|
|
if existing and existing.get('auth_string') != PARAM_TO_DEFAULT_KEYMAP.get('auth_string'):
|
|
|
|
commands.append('no authentication')
|
2016-09-02 17:01:59 +00:00
|
|
|
|
|
|
|
if commands and not group:
|
|
|
|
commands.insert(0, 'hsrp {0}'.format(args['group']))
|
|
|
|
|
|
|
|
version = delta.get('version', None)
|
|
|
|
if version:
|
|
|
|
if version == '2':
|
|
|
|
command = 'hsrp version 2'
|
|
|
|
elif version == '1':
|
|
|
|
command = 'hsrp version 1'
|
|
|
|
commands.insert(0, command)
|
|
|
|
commands.insert(0, 'interface {0}'.format(interface))
|
|
|
|
|
|
|
|
if commands:
|
|
|
|
if not commands[0].startswith('interface'):
|
|
|
|
commands.insert(0, 'interface {0}'.format(interface))
|
|
|
|
|
|
|
|
return commands
|
|
|
|
|
|
|
|
|
|
|
|
def is_default(interface, module):
|
|
|
|
command = 'show run interface {0}'.format(interface)
|
|
|
|
|
|
|
|
try:
|
2018-05-29 16:13:34 +00:00
|
|
|
body = run_commands(module, [command], check_rc=False)[0]
|
2016-09-02 17:01:59 +00:00
|
|
|
if 'invalid' in body.lower():
|
|
|
|
return 'DNE'
|
|
|
|
else:
|
|
|
|
raw_list = body.split('\n')
|
|
|
|
if raw_list[-1].startswith('interface'):
|
|
|
|
return True
|
|
|
|
else:
|
|
|
|
return False
|
|
|
|
except (KeyError):
|
|
|
|
return 'DNE'
|
|
|
|
|
|
|
|
|
|
|
|
def validate_config(body, vip, module):
|
|
|
|
new_body = ''.join(body)
|
|
|
|
if "invalid ip address" in new_body.lower():
|
2017-01-30 23:31:59 +00:00
|
|
|
module.fail_json(msg="Invalid VIP. Possible duplicate IP address.",
|
|
|
|
vip=vip)
|
2016-09-02 17:01:59 +00:00
|
|
|
|
|
|
|
|
|
|
|
def main():
|
|
|
|
argument_spec = dict(
|
2017-01-29 07:28:53 +00:00
|
|
|
group=dict(required=True, type='str'),
|
|
|
|
interface=dict(required=True),
|
2018-04-10 03:54:05 +00:00
|
|
|
version=dict(choices=['1', '2'], default='1', required=False),
|
2017-01-29 07:28:53 +00:00
|
|
|
priority=dict(type='str', required=False),
|
2017-05-19 16:40:42 +00:00
|
|
|
preempt=dict(type='str', choices=['disabled', 'enabled'], required=False),
|
2017-01-29 07:28:53 +00:00
|
|
|
vip=dict(type='str', required=False),
|
|
|
|
auth_type=dict(choices=['text', 'md5'], required=False),
|
|
|
|
auth_string=dict(type='str', required=False),
|
2017-07-26 06:08:55 +00:00
|
|
|
state=dict(choices=['absent', 'present'], required=False, default='present')
|
2016-09-02 17:01:59 +00:00
|
|
|
)
|
2017-02-15 16:43:09 +00:00
|
|
|
|
|
|
|
argument_spec.update(nxos_argument_spec)
|
|
|
|
|
2017-05-19 16:40:42 +00:00
|
|
|
module = AnsibleModule(argument_spec=argument_spec, supports_check_mode=True)
|
2016-09-02 17:01:59 +00:00
|
|
|
|
2017-02-15 16:43:09 +00:00
|
|
|
warnings = list()
|
2017-05-19 16:40:42 +00:00
|
|
|
results = dict(changed=False, warnings=warnings)
|
2017-02-15 16:43:09 +00:00
|
|
|
|
2016-09-02 17:01:59 +00:00
|
|
|
interface = module.params['interface'].lower()
|
|
|
|
group = module.params['group']
|
|
|
|
version = module.params['version']
|
|
|
|
state = module.params['state']
|
|
|
|
priority = module.params['priority']
|
|
|
|
preempt = module.params['preempt']
|
|
|
|
vip = module.params['vip']
|
|
|
|
auth_type = module.params['auth_type']
|
2018-04-10 03:54:05 +00:00
|
|
|
auth_full_string = module.params['auth_string']
|
|
|
|
auth_enc = '0'
|
|
|
|
auth_string = None
|
|
|
|
if auth_full_string:
|
|
|
|
kstr = auth_full_string.split()
|
|
|
|
if len(kstr) == 2:
|
|
|
|
auth_enc = kstr[0]
|
|
|
|
auth_string = kstr[1]
|
|
|
|
elif len(kstr) == 1:
|
|
|
|
auth_string = kstr[0]
|
|
|
|
else:
|
|
|
|
module.fail_json(msg='Inavlid auth_string')
|
|
|
|
if auth_enc != '0' and auth_enc != '7':
|
|
|
|
module.fail_json(msg='Inavlid auth_string, only 0 or 7 allowed')
|
2016-09-02 17:01:59 +00:00
|
|
|
|
2017-12-19 06:52:33 +00:00
|
|
|
device_info = get_capabilities(module)
|
|
|
|
network_api = device_info.get('network_api', 'nxapi')
|
2016-09-02 17:01:59 +00:00
|
|
|
|
|
|
|
intf_type = get_interface_type(interface)
|
2017-12-19 06:52:33 +00:00
|
|
|
if (intf_type != 'ethernet' and network_api == 'cliconf'):
|
2016-09-02 17:01:59 +00:00
|
|
|
if is_default(interface, module) == 'DNE':
|
|
|
|
module.fail_json(msg='That interface does not exist yet. Create '
|
|
|
|
'it first.', interface=interface)
|
|
|
|
if intf_type == 'loopback':
|
|
|
|
module.fail_json(msg="Loopback interfaces don't support HSRP.",
|
|
|
|
interface=interface)
|
|
|
|
|
|
|
|
mode = get_interface_mode(interface, intf_type, module)
|
|
|
|
if mode == 'layer2':
|
|
|
|
module.fail_json(msg='That interface is a layer2 port.\nMake it '
|
|
|
|
'a layer 3 port first.', interface=interface)
|
|
|
|
|
|
|
|
if auth_type or auth_string:
|
|
|
|
if not (auth_type and auth_string):
|
|
|
|
module.fail_json(msg='When using auth parameters, you need BOTH '
|
|
|
|
'auth_type AND auth_string.')
|
|
|
|
|
|
|
|
args = dict(group=group, version=version, priority=priority,
|
|
|
|
preempt=preempt, vip=vip, auth_type=auth_type,
|
2018-04-10 03:54:05 +00:00
|
|
|
auth_string=auth_string, auth_enc=auth_enc)
|
2016-09-02 17:01:59 +00:00
|
|
|
|
2016-12-12 23:16:23 +00:00
|
|
|
proposed = dict((k, v) for k, v in args.items() if v is not None)
|
2016-09-02 17:01:59 +00:00
|
|
|
|
|
|
|
existing = get_hsrp_group(group, interface, module)
|
|
|
|
|
|
|
|
# This will enforce better practice with md5 and hsrp version.
|
|
|
|
if proposed.get('auth_type', None) == 'md5':
|
|
|
|
if proposed['version'] == '1':
|
|
|
|
module.fail_json(msg="It's recommended to use HSRP v2 "
|
|
|
|
"when auth_type=md5")
|
|
|
|
|
|
|
|
elif not proposed.get('auth_type', None) and existing:
|
|
|
|
if (proposed['version'] == '1' and
|
2018-04-10 03:54:05 +00:00
|
|
|
existing['auth_type'] == 'md5') and state == 'present':
|
2016-09-02 17:01:59 +00:00
|
|
|
module.fail_json(msg="Existing auth_type is md5. It's recommended "
|
|
|
|
"to use HSRP v2 when using md5")
|
|
|
|
|
|
|
|
commands = []
|
|
|
|
if state == 'present':
|
|
|
|
delta = dict(
|
2017-01-29 07:28:53 +00:00
|
|
|
set(proposed.items()).difference(existing.items()))
|
2016-09-02 17:01:59 +00:00
|
|
|
if delta:
|
2018-04-10 03:54:05 +00:00
|
|
|
command = get_commands_config_hsrp(delta, interface, args, existing)
|
2016-09-02 17:01:59 +00:00
|
|
|
commands.extend(command)
|
|
|
|
|
|
|
|
elif state == 'absent':
|
|
|
|
if existing:
|
|
|
|
command = get_commands_remove_hsrp(group, interface)
|
|
|
|
commands.extend(command)
|
|
|
|
|
|
|
|
if commands:
|
|
|
|
if module.check_mode:
|
2017-05-19 16:40:42 +00:00
|
|
|
module.exit_json(**results)
|
2016-09-02 17:01:59 +00:00
|
|
|
else:
|
2017-02-15 16:43:09 +00:00
|
|
|
load_config(module, commands)
|
2017-07-26 06:08:55 +00:00
|
|
|
|
|
|
|
# validate IP
|
2017-12-19 06:52:33 +00:00
|
|
|
if network_api == 'cliconf' and state == 'present':
|
2017-07-26 06:08:55 +00:00
|
|
|
commands.insert(0, 'config t')
|
2017-05-05 03:06:00 +00:00
|
|
|
body = run_commands(module, commands)
|
2016-09-02 17:01:59 +00:00
|
|
|
validate_config(body, vip, module)
|
2017-07-26 06:08:55 +00:00
|
|
|
|
2017-05-19 16:40:42 +00:00
|
|
|
results['changed'] = True
|
2017-07-26 06:08:55 +00:00
|
|
|
|
2016-10-02 00:34:21 +00:00
|
|
|
if 'configure' in commands:
|
|
|
|
commands.pop(0)
|
2016-09-02 17:01:59 +00:00
|
|
|
|
2017-05-19 16:40:42 +00:00
|
|
|
results['commands'] = commands
|
2016-09-02 17:01:59 +00:00
|
|
|
module.exit_json(**results)
|
|
|
|
|
|
|
|
|
|
|
|
if __name__ == '__main__':
|
|
|
|
main()
|