2017-06-17 11:47:13 +00:00
|
|
|
#!/usr/bin/python
|
|
|
|
# -*- coding: utf-8 -*-
|
|
|
|
#
|
2017-10-04 19:16:17 +00:00
|
|
|
# Copyright (c) 2017 F5 Networks Inc.
|
|
|
|
# GNU General Public License v3.0 (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt)
|
2017-06-17 11:47:13 +00:00
|
|
|
|
2017-08-16 03:16:38 +00:00
|
|
|
ANSIBLE_METADATA = {'metadata_version': '1.1',
|
|
|
|
'status': ['preview'],
|
|
|
|
'supported_by': 'community'}
|
2017-06-17 11:47:13 +00:00
|
|
|
|
|
|
|
DOCUMENTATION = '''
|
|
|
|
---
|
|
|
|
module: bigip_iapp_service
|
|
|
|
short_description: Manages TCL iApp services on a BIG-IP.
|
|
|
|
description:
|
|
|
|
- Manages TCL iApp services on a BIG-IP.
|
|
|
|
version_added: "2.4"
|
|
|
|
options:
|
|
|
|
name:
|
|
|
|
description:
|
|
|
|
- The name of the iApp service that you want to deploy.
|
|
|
|
required: True
|
|
|
|
template:
|
|
|
|
description:
|
|
|
|
- The iApp template from which to instantiate a new service. This
|
|
|
|
template must exist on your BIG-IP before you can successfully
|
|
|
|
create a service. This parameter is required if the C(state)
|
|
|
|
parameter is C(present).
|
|
|
|
parameters:
|
|
|
|
description:
|
|
|
|
- A hash of all the required template variables for the iApp template.
|
|
|
|
If your parameters are stored in a file (the more common scenario)
|
|
|
|
it is recommended you use either the `file` or `template` lookups
|
|
|
|
to supply the expected parameters.
|
|
|
|
force:
|
|
|
|
description:
|
|
|
|
- Forces the updating of an iApp service even if the parameters to the
|
|
|
|
service have not changed. This option is of particular importance if
|
|
|
|
the iApp template that underlies the service has been updated in-place.
|
|
|
|
This option is equivalent to re-configuring the iApp if that template
|
|
|
|
has changed.
|
|
|
|
default: False
|
|
|
|
state:
|
|
|
|
description:
|
|
|
|
- When C(present), ensures that the iApp service is created and running.
|
|
|
|
When C(absent), ensures that the iApp service has been removed.
|
|
|
|
default: present
|
|
|
|
choices:
|
|
|
|
- present
|
|
|
|
- absent
|
|
|
|
notes:
|
|
|
|
- Requires the f5-sdk Python package on the host. This is as easy as pip
|
|
|
|
install f5-sdk.
|
|
|
|
- Requires the deepdiff Python package on the host. This is as easy as pip
|
|
|
|
install f5-sdk.
|
|
|
|
requirements:
|
|
|
|
- f5-sdk
|
|
|
|
- deepdiff
|
|
|
|
extends_documentation_fragment: f5
|
|
|
|
author:
|
|
|
|
- Tim Rupp (@caphrim007)
|
|
|
|
'''
|
|
|
|
|
|
|
|
EXAMPLES = '''
|
|
|
|
- name: Create HTTP iApp service from iApp template
|
|
|
|
bigip_iapp_service:
|
|
|
|
name: "foo-service"
|
|
|
|
template: "f5.http"
|
|
|
|
parameters: "{{ lookup('file', 'f5.http.parameters.json') }}"
|
|
|
|
password: "secret"
|
|
|
|
server: "lb.mydomain.com"
|
|
|
|
state: "present"
|
|
|
|
user: "admin"
|
|
|
|
delegate_to: localhost
|
|
|
|
|
|
|
|
- name: Upgrade foo-service to v1.2.0rc4 of the f5.http template
|
|
|
|
bigip_iapp_service:
|
|
|
|
name: "foo-service"
|
|
|
|
template: "f5.http.v1.2.0rc4"
|
|
|
|
password: "secret"
|
|
|
|
server: "lb.mydomain.com"
|
|
|
|
state: "present"
|
|
|
|
user: "admin"
|
|
|
|
delegate_to: localhost
|
|
|
|
|
|
|
|
- name: Configure a service using parameters in YAML
|
|
|
|
bigip_iapp_service:
|
|
|
|
name: "tests"
|
|
|
|
template: "web_frontends"
|
|
|
|
password: "admin"
|
|
|
|
server: "{{ inventory_hostname }}"
|
|
|
|
server_port: "{{ bigip_port }}"
|
|
|
|
validate_certs: "{{ validate_certs }}"
|
|
|
|
state: "present"
|
|
|
|
user: "admin"
|
|
|
|
parameters:
|
|
|
|
variables:
|
|
|
|
- name: "var__vs_address"
|
|
|
|
value: "1.1.1.1"
|
|
|
|
- name: "pm__apache_servers_for_http"
|
|
|
|
value: "2.2.2.1:80"
|
|
|
|
- name: "pm__apache_servers_for_https"
|
|
|
|
value: "2.2.2.2:80"
|
|
|
|
delegate_to: localhost
|
|
|
|
|
|
|
|
- name: Re-configure a service whose underlying iApp was updated in place
|
|
|
|
bigip_iapp_service:
|
|
|
|
name: "tests"
|
|
|
|
template: "web_frontends"
|
|
|
|
password: "admin"
|
|
|
|
force: yes
|
|
|
|
server: "{{ inventory_hostname }}"
|
|
|
|
server_port: "{{ bigip_port }}"
|
|
|
|
validate_certs: "{{ validate_certs }}"
|
|
|
|
state: "present"
|
|
|
|
user: "admin"
|
|
|
|
parameters:
|
|
|
|
variables:
|
|
|
|
- name: "var__vs_address"
|
|
|
|
value: "1.1.1.1"
|
|
|
|
- name: "pm__apache_servers_for_http"
|
|
|
|
value: "2.2.2.1:80"
|
|
|
|
- name: "pm__apache_servers_for_https"
|
|
|
|
value: "2.2.2.2:80"
|
|
|
|
delegate_to: localhost
|
|
|
|
'''
|
|
|
|
|
|
|
|
RETURN = '''
|
|
|
|
# only common fields returned
|
|
|
|
'''
|
|
|
|
|
|
|
|
from ansible.module_utils.f5_utils import (
|
|
|
|
AnsibleF5Client,
|
|
|
|
AnsibleF5Parameters,
|
|
|
|
HAS_F5SDK,
|
|
|
|
F5ModuleError,
|
|
|
|
iteritems,
|
|
|
|
iControlUnexpectedHTTPError
|
|
|
|
)
|
|
|
|
from deepdiff import DeepDiff
|
|
|
|
|
|
|
|
|
|
|
|
class Parameters(AnsibleF5Parameters):
|
|
|
|
returnables = []
|
|
|
|
api_attributes = [
|
2017-07-10 06:27:49 +00:00
|
|
|
'tables', 'variables', 'template', 'lists', 'deviceGroup',
|
|
|
|
'inheritedDevicegroup', 'inheritedTrafficGroup', 'trafficGroup'
|
2017-06-17 11:47:13 +00:00
|
|
|
]
|
|
|
|
updatables = ['tables', 'variables', 'lists']
|
|
|
|
|
|
|
|
def to_return(self):
|
|
|
|
result = {}
|
|
|
|
for returnable in self.returnables:
|
|
|
|
result[returnable] = getattr(self, returnable)
|
|
|
|
result = self._filter_params(result)
|
|
|
|
return result
|
|
|
|
|
|
|
|
def api_params(self):
|
|
|
|
result = {}
|
|
|
|
for api_attribute in self.api_attributes:
|
|
|
|
if self.api_map is not None and api_attribute in self.api_map:
|
|
|
|
result[api_attribute] = getattr(self, self.api_map[api_attribute])
|
|
|
|
else:
|
|
|
|
result[api_attribute] = getattr(self, api_attribute)
|
|
|
|
result = self._filter_params(result)
|
|
|
|
return result
|
|
|
|
|
|
|
|
@property
|
|
|
|
def tables(self):
|
|
|
|
result = []
|
|
|
|
if not self._values['tables']:
|
|
|
|
return None
|
|
|
|
tables = self._values['tables']
|
|
|
|
for table in tables:
|
|
|
|
tmp = dict()
|
|
|
|
name = table.get('name', None)
|
|
|
|
if name is None:
|
|
|
|
raise F5ModuleError(
|
|
|
|
"One of the provided tables does not have a name"
|
|
|
|
)
|
|
|
|
tmp['name'] = str(name)
|
|
|
|
columns = table.get('columnNames', None)
|
|
|
|
if columns:
|
|
|
|
tmp['columnNames'] = [str(x) for x in columns]
|
|
|
|
# You cannot have rows without columns
|
|
|
|
rows = table.get('rows', None)
|
|
|
|
if rows:
|
|
|
|
tmp['rows'] = []
|
|
|
|
for row in rows:
|
|
|
|
tmp['rows'].append(dict(row=[str(x) for x in row['row']]))
|
|
|
|
result.append(tmp)
|
|
|
|
result = sorted(result, key=lambda k: k['name'])
|
|
|
|
return result
|
|
|
|
|
|
|
|
@tables.setter
|
|
|
|
def tables(self, value):
|
|
|
|
self._values['tables'] = value
|
|
|
|
|
|
|
|
@property
|
|
|
|
def variables(self):
|
|
|
|
result = []
|
|
|
|
if not self._values['variables']:
|
|
|
|
return None
|
|
|
|
variables = self._values['variables']
|
|
|
|
for variable in variables:
|
|
|
|
tmp = dict((str(k), str(v)) for k, v in iteritems(variable))
|
|
|
|
if 'encrypted' not in tmp:
|
|
|
|
# BIG-IP will inject an 'encrypted' key if you don't provide one.
|
|
|
|
# If you don't provide one, then we give you the default 'no', by
|
|
|
|
# default.
|
|
|
|
tmp['encrypted'] = 'no'
|
|
|
|
if 'value' not in tmp:
|
|
|
|
tmp['value'] = ''
|
|
|
|
|
|
|
|
# This seems to happen only on 12.0.0
|
|
|
|
elif tmp['value'] == 'none':
|
|
|
|
tmp['value'] = ''
|
|
|
|
result.append(tmp)
|
|
|
|
result = sorted(result, key=lambda k: k['name'])
|
|
|
|
return result
|
|
|
|
|
|
|
|
@variables.setter
|
|
|
|
def variables(self, value):
|
|
|
|
self._values['variables'] = value
|
|
|
|
|
|
|
|
@property
|
|
|
|
def lists(self):
|
|
|
|
result = []
|
|
|
|
if not self._values['lists']:
|
|
|
|
return None
|
|
|
|
lists = self._values['lists']
|
|
|
|
for list in lists:
|
|
|
|
tmp = dict((str(k), str(v)) for k, v in iteritems(list) if k != 'value')
|
|
|
|
if 'encrypted' not in list:
|
|
|
|
# BIG-IP will inject an 'encrypted' key if you don't provide one.
|
|
|
|
# If you don't provide one, then we give you the default 'no', by
|
|
|
|
# default.
|
|
|
|
tmp['encrypted'] = 'no'
|
|
|
|
if 'value' in list:
|
|
|
|
if len(list['value']) > 0:
|
|
|
|
# BIG-IP removes empty values entries, so mimic this behavior
|
|
|
|
# for user-supplied values.
|
|
|
|
tmp['value'] = [str(x) for x in list['value']]
|
|
|
|
result.append(tmp)
|
|
|
|
result = sorted(result, key=lambda k: k['name'])
|
|
|
|
return result
|
|
|
|
|
|
|
|
@lists.setter
|
|
|
|
def lists(self, value):
|
|
|
|
self._values['lists'] = value
|
|
|
|
|
|
|
|
@property
|
|
|
|
def parameters(self):
|
|
|
|
return dict(
|
|
|
|
tables=self.tables,
|
|
|
|
variables=self.variables,
|
|
|
|
lists=self.lists
|
|
|
|
)
|
|
|
|
|
|
|
|
@parameters.setter
|
|
|
|
def parameters(self, value):
|
|
|
|
if value is None:
|
|
|
|
return
|
|
|
|
if 'tables' in value:
|
|
|
|
self.tables = value['tables']
|
|
|
|
if 'variables' in value:
|
|
|
|
self.variables = value['variables']
|
|
|
|
if 'lists' in value:
|
|
|
|
self.lists = value['lists']
|
2017-07-10 06:27:49 +00:00
|
|
|
if 'deviceGroup' in value:
|
|
|
|
self.deviceGroup = value['deviceGroup']
|
|
|
|
if 'inheritedDevicegroup' in value:
|
|
|
|
self.inheritedDevicegroup = value['inheritedDevicegroup']
|
|
|
|
if 'inheritedTrafficGroup' in value:
|
|
|
|
self.inheritedTrafficGroup = value['inheritedTrafficGroup']
|
|
|
|
if 'trafficGroup' in value:
|
|
|
|
self.trafficGroup = value['trafficGroup']
|
2017-06-17 11:47:13 +00:00
|
|
|
|
|
|
|
@property
|
|
|
|
def template(self):
|
|
|
|
if self._values['template'] is None:
|
|
|
|
return None
|
|
|
|
if self._values['template'].startswith("/" + self.partition):
|
|
|
|
return self._values['template']
|
2017-06-28 16:35:00 +00:00
|
|
|
elif self._values['template'].startswith("/"):
|
|
|
|
return self._values['template']
|
2017-06-17 11:47:13 +00:00
|
|
|
else:
|
|
|
|
return '/{0}/{1}'.format(
|
|
|
|
self.partition, self._values['template']
|
|
|
|
)
|
|
|
|
|
|
|
|
@template.setter
|
|
|
|
def template(self, value):
|
|
|
|
self._values['template'] = value
|
|
|
|
|
|
|
|
|
|
|
|
class ModuleManager(object):
|
|
|
|
def __init__(self, client):
|
|
|
|
self.client = client
|
|
|
|
self.have = None
|
|
|
|
self.want = Parameters(self.client.module.params)
|
|
|
|
self.changes = Parameters()
|
|
|
|
|
|
|
|
def _set_changed_options(self):
|
|
|
|
changed = {}
|
|
|
|
for key in Parameters.returnables:
|
|
|
|
if getattr(self.want, key) is not None:
|
|
|
|
changed[key] = getattr(self.want, key)
|
|
|
|
if changed:
|
|
|
|
self.changes = Parameters(changed)
|
|
|
|
|
|
|
|
def _update_changed_options(self):
|
|
|
|
changed = {}
|
|
|
|
for key in Parameters.updatables:
|
|
|
|
if getattr(self.want, key) is not None:
|
|
|
|
attr1 = getattr(self.want, key)
|
|
|
|
attr2 = getattr(self.have, key)
|
|
|
|
if attr1 != attr2:
|
|
|
|
changed[key] = str(DeepDiff(attr1, attr2))
|
|
|
|
if changed:
|
|
|
|
self.changes = Parameters(changed)
|
|
|
|
return True
|
|
|
|
return False
|
|
|
|
|
|
|
|
def exec_module(self):
|
|
|
|
changed = False
|
|
|
|
result = dict()
|
|
|
|
state = self.want.state
|
|
|
|
|
|
|
|
try:
|
|
|
|
if state == "present":
|
|
|
|
changed = self.present()
|
|
|
|
elif state == "absent":
|
|
|
|
changed = self.absent()
|
|
|
|
except iControlUnexpectedHTTPError as e:
|
|
|
|
raise F5ModuleError(str(e))
|
|
|
|
|
|
|
|
changes = self.changes.to_return()
|
|
|
|
result.update(**changes)
|
|
|
|
result.update(dict(changed=changed))
|
|
|
|
return result
|
|
|
|
|
|
|
|
def exists(self):
|
|
|
|
result = self.client.api.tm.sys.application.services.service.exists(
|
|
|
|
name=self.want.name,
|
|
|
|
partition=self.want.partition
|
|
|
|
)
|
|
|
|
return result
|
|
|
|
|
|
|
|
def present(self):
|
|
|
|
if self.exists():
|
|
|
|
return self.update()
|
|
|
|
else:
|
|
|
|
return self.create()
|
|
|
|
|
|
|
|
def create(self):
|
|
|
|
self._set_changed_options()
|
|
|
|
if self.client.check_mode:
|
|
|
|
return True
|
|
|
|
self.create_on_device()
|
|
|
|
return True
|
|
|
|
|
|
|
|
def update(self):
|
|
|
|
self.have = self.read_current_from_device()
|
|
|
|
if not self.should_update() and not self.want.force:
|
|
|
|
return False
|
|
|
|
if self.client.check_mode:
|
|
|
|
return True
|
|
|
|
self.update_on_device()
|
|
|
|
return True
|
|
|
|
|
|
|
|
def should_update(self):
|
|
|
|
result = self._update_changed_options()
|
|
|
|
if result:
|
|
|
|
return True
|
|
|
|
return False
|
|
|
|
|
|
|
|
def update_on_device(self):
|
|
|
|
params = self.want.api_params()
|
|
|
|
params['execute-action'] = 'definition'
|
|
|
|
resource = self.client.api.tm.sys.application.services.service.load(
|
|
|
|
name=self.want.name,
|
|
|
|
partition=self.want.partition
|
|
|
|
)
|
|
|
|
resource.update(**params)
|
|
|
|
|
|
|
|
def read_current_from_device(self):
|
|
|
|
result = self.client.api.tm.sys.application.services.service.load(
|
|
|
|
name=self.want.name,
|
|
|
|
partition=self.want.partition
|
|
|
|
).to_dict()
|
|
|
|
result.pop('_meta_data', None)
|
|
|
|
return Parameters(result)
|
|
|
|
|
|
|
|
def create_on_device(self):
|
|
|
|
params = self.want.api_params()
|
|
|
|
self.client.api.tm.sys.application.services.service.create(
|
|
|
|
name=self.want.name,
|
|
|
|
partition=self.want.partition,
|
|
|
|
**params
|
|
|
|
)
|
|
|
|
|
|
|
|
def absent(self):
|
|
|
|
if self.exists():
|
|
|
|
return self.remove()
|
|
|
|
return False
|
|
|
|
|
|
|
|
def remove(self):
|
|
|
|
if self.client.check_mode:
|
|
|
|
return True
|
|
|
|
self.remove_from_device()
|
|
|
|
if self.exists():
|
|
|
|
raise F5ModuleError("Failed to delete the iApp service")
|
|
|
|
return True
|
|
|
|
|
|
|
|
def remove_from_device(self):
|
|
|
|
resource = self.client.api.tm.sys.application.services.service.load(
|
|
|
|
name=self.want.name,
|
|
|
|
partition=self.want.partition
|
|
|
|
)
|
|
|
|
if resource:
|
|
|
|
resource.delete()
|
|
|
|
|
|
|
|
|
|
|
|
class ArgumentSpec(object):
|
|
|
|
def __init__(self):
|
|
|
|
self.supports_check_mode = True
|
|
|
|
self.argument_spec = dict(
|
|
|
|
name=dict(required=True),
|
|
|
|
template=dict(),
|
|
|
|
parameters=dict(
|
|
|
|
type='dict'
|
|
|
|
),
|
|
|
|
state=dict(
|
|
|
|
default='present',
|
|
|
|
choices=['absent', 'present']
|
|
|
|
),
|
|
|
|
force=dict(
|
|
|
|
default=False,
|
|
|
|
type='bool'
|
|
|
|
)
|
|
|
|
)
|
|
|
|
self.f5_product_name = 'bigip'
|
|
|
|
|
|
|
|
|
|
|
|
def main():
|
|
|
|
if not HAS_F5SDK:
|
|
|
|
raise F5ModuleError("The python f5-sdk module is required")
|
|
|
|
|
|
|
|
spec = ArgumentSpec()
|
|
|
|
|
|
|
|
client = AnsibleF5Client(
|
|
|
|
argument_spec=spec.argument_spec,
|
|
|
|
supports_check_mode=spec.supports_check_mode,
|
|
|
|
f5_product_name=spec.f5_product_name
|
|
|
|
)
|
|
|
|
|
|
|
|
try:
|
|
|
|
mm = ModuleManager(client)
|
|
|
|
results = mm.exec_module()
|
|
|
|
client.module.exit_json(**results)
|
|
|
|
except F5ModuleError as e:
|
|
|
|
client.module.fail_json(msg=str(e))
|
|
|
|
|
|
|
|
|
|
|
|
if __name__ == '__main__':
|
|
|
|
main()
|