2017-01-25 15:15:26 +00:00
|
|
|
# (c) 2016 Red Hat Inc.
|
2017-08-20 15:20:30 +00:00
|
|
|
# (c) 2017 Ansible Project
|
|
|
|
# GNU General Public License v3.0+ (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt)
|
|
|
|
|
2017-09-08 18:08:31 +00:00
|
|
|
from __future__ import (absolute_import, division, print_function)
|
|
|
|
__metaclass__ = type
|
|
|
|
|
|
|
|
DOCUMENTATION = """
|
2017-08-20 15:20:30 +00:00
|
|
|
author: Ansible Networking Team
|
|
|
|
connection: netconf
|
|
|
|
short_description: Use netconf to run command on network appliances
|
|
|
|
description:
|
|
|
|
- Use netconf to run command on network appliances
|
|
|
|
version_added: "2.3"
|
|
|
|
options:
|
|
|
|
network_os:
|
|
|
|
description:
|
|
|
|
- Appliance specific OS
|
|
|
|
default: 'default'
|
|
|
|
vars:
|
|
|
|
- name: ansible_netconf_network_os
|
|
|
|
password:
|
|
|
|
description:
|
|
|
|
- Secret used to authenticate
|
|
|
|
vars:
|
|
|
|
- name: ansible_pass
|
|
|
|
- name: ansible_netconf_pass
|
|
|
|
private_key_file:
|
|
|
|
description:
|
|
|
|
- Key or certificate file used for authentication
|
|
|
|
vars:
|
|
|
|
- name: ansible_private_key_file
|
|
|
|
- name: ansible_netconf_private_key_file
|
|
|
|
ssh_config:
|
|
|
|
type: boolean
|
|
|
|
default: False
|
|
|
|
description:
|
|
|
|
- Flag to decide if we use SSH configuration options with netconf
|
|
|
|
vars:
|
|
|
|
- name: ansible_netconf_ssh_config
|
|
|
|
env:
|
|
|
|
- name: ANSIBLE_NETCONF_SSH_CONFIG
|
|
|
|
user:
|
|
|
|
description:
|
|
|
|
- User to authenticate as
|
|
|
|
vars:
|
|
|
|
- name: ansible_user
|
|
|
|
- name: ansible_netconf_user
|
|
|
|
port:
|
|
|
|
type: int
|
|
|
|
description:
|
|
|
|
- port to connect to on the remote
|
|
|
|
default: 830
|
|
|
|
vars:
|
|
|
|
- name: ansible_port
|
|
|
|
- name: ansible_netconf_port
|
|
|
|
timeout:
|
|
|
|
type: int
|
|
|
|
description:
|
|
|
|
- Connection timeout in seconds
|
|
|
|
default: 120
|
|
|
|
host_key_checking:
|
|
|
|
type: boolean
|
|
|
|
description:
|
|
|
|
- Flag to control wether we check for validity of the host key of the remote
|
|
|
|
default: True
|
|
|
|
# TODO:
|
|
|
|
#look_for_keys=C.PARAMIKO_LOOK_FOR_KEYS,
|
|
|
|
#allow_agent=self.allow_agent,
|
|
|
|
"""
|
2017-01-25 15:15:26 +00:00
|
|
|
|
|
|
|
import os
|
2017-03-21 02:26:18 +00:00
|
|
|
import logging
|
2017-01-25 15:15:26 +00:00
|
|
|
|
|
|
|
from ansible import constants as C
|
|
|
|
from ansible.errors import AnsibleConnectionFailure, AnsibleError
|
2017-11-09 20:04:40 +00:00
|
|
|
from ansible.module_utils._text import to_bytes, to_native
|
2017-08-22 11:25:19 +00:00
|
|
|
from ansible.module_utils.parsing.convert_bool import BOOLEANS_TRUE
|
2017-08-15 20:38:59 +00:00
|
|
|
from ansible.plugins.loader import netconf_loader
|
2017-01-25 15:15:26 +00:00
|
|
|
from ansible.plugins.connection import ConnectionBase, ensure_connect
|
2017-11-09 20:04:40 +00:00
|
|
|
from ansible.plugins.connection.local import Connection as LocalConnection
|
2017-01-25 15:15:26 +00:00
|
|
|
|
|
|
|
try:
|
|
|
|
from ncclient import manager
|
|
|
|
from ncclient.operations import RPCError
|
|
|
|
from ncclient.transport.errors import SSHUnknownHostError
|
|
|
|
from ncclient.xml_ import to_ele, to_xml
|
|
|
|
except ImportError:
|
|
|
|
raise AnsibleError("ncclient is not installed")
|
|
|
|
|
2017-03-21 03:08:02 +00:00
|
|
|
try:
|
|
|
|
from __main__ import display
|
|
|
|
except ImportError:
|
|
|
|
from ansible.utils.display import Display
|
|
|
|
display = Display()
|
|
|
|
|
2017-03-21 02:26:18 +00:00
|
|
|
logging.getLogger('ncclient').setLevel(logging.INFO)
|
2017-01-25 15:15:26 +00:00
|
|
|
|
2017-03-23 14:29:24 +00:00
|
|
|
|
2017-11-09 20:04:40 +00:00
|
|
|
class Connection(ConnectionBase):
|
2017-06-06 08:26:25 +00:00
|
|
|
"""NetConf connections"""
|
2017-01-25 15:15:26 +00:00
|
|
|
|
|
|
|
transport = 'netconf'
|
|
|
|
has_pipelining = False
|
2017-11-09 20:04:40 +00:00
|
|
|
force_persistence = True
|
2017-01-25 15:15:26 +00:00
|
|
|
|
|
|
|
def __init__(self, play_context, new_stdin, *args, **kwargs):
|
|
|
|
super(Connection, self).__init__(play_context, new_stdin, *args, **kwargs)
|
|
|
|
|
|
|
|
self._network_os = self._play_context.network_os or 'default'
|
2017-03-21 03:08:02 +00:00
|
|
|
display.display('network_os is set to %s' % self._network_os, log_only=True)
|
2017-01-25 15:15:26 +00:00
|
|
|
|
|
|
|
self._manager = None
|
|
|
|
self._connected = False
|
|
|
|
|
2017-11-09 20:04:40 +00:00
|
|
|
self._local = LocalConnection(play_context, new_stdin, *args, **kwargs)
|
|
|
|
|
|
|
|
def exec_command(self, request, in_data=None, sudoable=True):
|
|
|
|
"""Sends the request to the node and returns the reply
|
|
|
|
The method accepts two forms of request. The first form is as a byte
|
|
|
|
string that represents xml string be send over netconf session.
|
|
|
|
The second form is a json-rpc (2.0) byte string.
|
|
|
|
"""
|
|
|
|
if self._manager:
|
|
|
|
# to_ele operates on native strings
|
|
|
|
request = to_ele(to_native(request, errors='surrogate_or_strict'))
|
|
|
|
|
|
|
|
if request is None:
|
|
|
|
return 'unable to parse request'
|
|
|
|
|
|
|
|
try:
|
|
|
|
reply = self._manager.rpc(request)
|
|
|
|
except RPCError as exc:
|
|
|
|
return to_xml(exc.xml)
|
|
|
|
|
|
|
|
return reply.data_xml
|
|
|
|
else:
|
|
|
|
return self._local.exec_command(request, in_data, sudoable)
|
|
|
|
|
|
|
|
def put_file(self, in_path, out_path):
|
|
|
|
"""Transfer a file from local to remote"""
|
|
|
|
return self._local.put_file(in_path, out_path)
|
|
|
|
|
|
|
|
def fetch_file(self, in_path, out_path):
|
|
|
|
"""Fetch a file from remote to local"""
|
|
|
|
return self._local.fetch_file(in_path, out_path)
|
|
|
|
|
2017-01-25 15:15:26 +00:00
|
|
|
def _connect(self):
|
|
|
|
super(Connection, self)._connect()
|
|
|
|
|
2017-11-09 20:04:40 +00:00
|
|
|
display.display('ssh connection done, starting ncclient', log_only=True)
|
2017-03-21 02:26:18 +00:00
|
|
|
|
2017-11-09 20:04:40 +00:00
|
|
|
allow_agent = True
|
2017-01-25 15:15:26 +00:00
|
|
|
if self._play_context.password is not None:
|
2017-11-09 20:04:40 +00:00
|
|
|
allow_agent = False
|
2017-01-25 15:15:26 +00:00
|
|
|
|
2017-11-09 20:04:40 +00:00
|
|
|
key_filename = None
|
2017-01-25 15:15:26 +00:00
|
|
|
if self._play_context.private_key_file:
|
2017-11-09 20:04:40 +00:00
|
|
|
key_filename = os.path.expanduser(self._play_context.private_key_file)
|
2017-01-25 15:15:26 +00:00
|
|
|
|
2017-06-28 05:37:38 +00:00
|
|
|
network_os = self._play_context.network_os
|
|
|
|
|
|
|
|
if not network_os:
|
|
|
|
for cls in netconf_loader.all(class_only=True):
|
|
|
|
network_os = cls.guess_network_os(self)
|
|
|
|
if network_os:
|
|
|
|
display.display('discovered network_os %s' % network_os, log_only=True)
|
|
|
|
|
|
|
|
if not network_os:
|
|
|
|
raise AnsibleConnectionFailure('Unable to automatically determine host network os. Please ansible_network_os value')
|
2017-03-21 02:26:18 +00:00
|
|
|
|
2017-08-18 18:04:30 +00:00
|
|
|
ssh_config = os.getenv('ANSIBLE_NETCONF_SSH_CONFIG', False)
|
2017-08-22 11:25:19 +00:00
|
|
|
if ssh_config in BOOLEANS_TRUE:
|
2017-08-18 18:04:30 +00:00
|
|
|
ssh_config = True
|
2017-08-22 11:25:19 +00:00
|
|
|
else:
|
|
|
|
ssh_config = None
|
2017-08-18 18:04:30 +00:00
|
|
|
|
2017-01-25 15:15:26 +00:00
|
|
|
try:
|
|
|
|
self._manager = manager.connect(
|
|
|
|
host=self._play_context.remote_addr,
|
|
|
|
port=self._play_context.port or 830,
|
|
|
|
username=self._play_context.remote_user,
|
|
|
|
password=self._play_context.password,
|
2017-11-09 20:04:40 +00:00
|
|
|
key_filename=str(key_filename),
|
2017-01-25 15:15:26 +00:00
|
|
|
hostkey_verify=C.HOST_KEY_CHECKING,
|
|
|
|
look_for_keys=C.PARAMIKO_LOOK_FOR_KEYS,
|
2017-11-09 20:04:40 +00:00
|
|
|
allow_agent=allow_agent,
|
2017-01-25 15:15:26 +00:00
|
|
|
timeout=self._play_context.timeout,
|
2017-08-18 18:04:30 +00:00
|
|
|
device_params={'name': network_os},
|
|
|
|
ssh_config=ssh_config
|
2017-01-25 15:15:26 +00:00
|
|
|
)
|
|
|
|
except SSHUnknownHostError as exc:
|
|
|
|
raise AnsibleConnectionFailure(str(exc))
|
2017-11-09 20:04:40 +00:00
|
|
|
except ImportError as exc:
|
|
|
|
raise AnsibleError("connection=netconf is not supported on {0}".format(network_os))
|
2017-01-25 15:15:26 +00:00
|
|
|
|
|
|
|
if not self._manager.connected:
|
2017-06-06 08:26:25 +00:00
|
|
|
return 1, b'', b'not connected'
|
2017-01-25 15:15:26 +00:00
|
|
|
|
2017-03-21 03:08:02 +00:00
|
|
|
display.display('ncclient manager object created successfully', log_only=True)
|
2017-03-21 02:26:18 +00:00
|
|
|
|
2017-01-25 15:15:26 +00:00
|
|
|
self._connected = True
|
2017-06-06 08:26:25 +00:00
|
|
|
|
2017-06-28 05:37:38 +00:00
|
|
|
self._netconf = netconf_loader.get(network_os, self)
|
2017-06-06 08:26:25 +00:00
|
|
|
if self._netconf:
|
2017-06-28 05:37:38 +00:00
|
|
|
display.display('loaded netconf plugin for network_os %s' % network_os, log_only=True)
|
2017-06-06 08:26:25 +00:00
|
|
|
else:
|
2017-06-28 05:37:38 +00:00
|
|
|
display.display('unable to load netconf for network_os %s' % network_os)
|
2017-06-06 08:26:25 +00:00
|
|
|
|
|
|
|
return 0, to_bytes(self._manager.session_id, errors='surrogate_or_strict'), b''
|
2017-01-25 15:15:26 +00:00
|
|
|
|
|
|
|
def close(self):
|
|
|
|
if self._manager:
|
|
|
|
self._manager.close_session()
|
|
|
|
self._connected = False
|
|
|
|
super(Connection, self).close()
|