#!/usr/bin/python # -*- coding: utf-8 -*- # # Copyright (c) 2017 F5 Networks Inc. # GNU General Public License v3.0 (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt) from __future__ import absolute_import, division, print_function __metaclass__ = type ANSIBLE_METADATA = {'metadata_version': '1.1', 'status': ['preview'], 'supported_by': 'community'} DOCUMENTATION = r''' --- module: bigip_provision short_description: Manage BIG-IP module provisioning description: - Manage BIG-IP module provisioning. This module will only provision at the standard levels of Dedicated, Nominal, and Minimum. version_added: 2.4 options: module: description: - The module to provision in BIG-IP. required: true choices: - am - afm - apm - asm - avr - cgnat - fps - gtm - ilx - lc - ltm - pem - sam - swg - vcmp aliases: - name level: description: - Sets the provisioning level for the requested modules. Changing the level for one module may require modifying the level of another module. For example, changing one module to C(dedicated) requires setting all others to C(none). Setting the level of a module to C(none) means that the module is not activated. - This parameter is not relevant to C(cgnat) and will not be applied to the C(cgnat) module. default: nominal choices: - dedicated - nominal - minimum state: description: - The state of the provisioned module on the system. When C(present), guarantees that the specified module is provisioned at the requested level provided that there are sufficient resources on the device (such as physical RAM) to support the provisioned module. When C(absent), de-provision the module. default: present choices: - present - absent extends_documentation_fragment: f5 author: - Tim Rupp (@caphrim007) ''' EXAMPLES = r''' - name: Provision PEM at "nominal" level bigip_provision: server: lb.mydomain.com module: pem level: nominal password: secret user: admin validate_certs: no delegate_to: localhost - name: Provision a dedicated SWG. This will unprovision every other module bigip_provision: server: lb.mydomain.com module: swg password: secret level: dedicated user: admin validate_certs: no delegate_to: localhost ''' RETURN = r''' level: description: The new provisioning level of the module. returned: changed type: string sample: minimum ''' import time from ansible.module_utils.basic import AnsibleModule try: from library.module_utils.network.f5.bigip import HAS_F5SDK from library.module_utils.network.f5.bigip import F5Client from library.module_utils.network.f5.common import F5ModuleError from library.module_utils.network.f5.common import AnsibleF5Parameters from library.module_utils.network.f5.common import cleanup_tokens from library.module_utils.network.f5.common import f5_argument_spec try: from library.module_utils.network.f5.common import iControlUnexpectedHTTPError from f5.bigip.contexts import TransactionContextManager from f5.sdk_exception import LazyAttributesRequired except ImportError: HAS_F5SDK = False except ImportError: from ansible.module_utils.network.f5.bigip import HAS_F5SDK from ansible.module_utils.network.f5.bigip import F5Client from ansible.module_utils.network.f5.common import F5ModuleError from ansible.module_utils.network.f5.common import AnsibleF5Parameters from ansible.module_utils.network.f5.common import cleanup_tokens from ansible.module_utils.network.f5.common import f5_argument_spec try: from ansible.module_utils.network.f5.common import iControlUnexpectedHTTPError from f5.bigip.contexts import TransactionContextManager from f5.sdk_exception import LazyAttributesRequired except ImportError: HAS_F5SDK = False class Parameters(AnsibleF5Parameters): api_attributes = ['level'] returnables = ['level'] updatables = ['level', 'cgnat'] def to_return(self): result = {} try: for returnable in self.returnables: result[returnable] = getattr(self, returnable) result = self._filter_params(result) return result except Exception: return result @property def level(self): if self._values['level'] is None: return None if self.state == 'absent': return 'none' return str(self._values['level']) class ApiParameters(Parameters): pass class ModuleParameters(Parameters): pass class Changes(Parameters): pass class UsableChanges(Parameters): pass class ReportableChanges(Parameters): pass class Difference(object): def __init__(self, want, have=None): self.want = want self.have = have def compare(self, param): try: result = getattr(self, param) return result except AttributeError: result = self.__default(param) return result def __default(self, param): attr1 = getattr(self.want, param) try: attr2 = getattr(self.have, param) if attr1 != attr2: return attr1 except AttributeError: return attr1 @property def cgnat(self): if self.want.module == 'cgnat': if self.want.state == 'absent' and self.have.enabled is True: return True if self.want.state == 'present' and self.have.disabled is True: return True class ModuleManager(object): def __init__(self, *args, **kwargs): self.module = kwargs.get('module', None) self.client = kwargs.get('client', None) self.have = None self.want = ModuleParameters(params=self.module.params) self.changes = UsableChanges() def _update_changed_options(self): diff = Difference(self.want, self.have) updatables = Parameters.updatables changed = dict() for k in updatables: change = diff.compare(k) if change is None: continue else: if isinstance(change, dict): changed.update(change) else: changed[k] = change if changed: self.changes = UsableChanges(params=changed) return True return False def exec_module(self): if not HAS_F5SDK: raise F5ModuleError("The python f5-sdk module is required") changed = False result = dict() state = self.want.state try: if state == "present": changed = self.present() elif state == "absent": changed = self.absent() except iControlUnexpectedHTTPError as e: raise F5ModuleError(str(e)) changes = self.changes.to_return() result.update(**changes) result.update(dict(changed=changed)) return result def present(self): if self.exists(): return False return self.update() def exists(self): if self.want.module == 'cgnat': resource = self.client.api.tm.sys.feature_module.cgnat.load() if resource.disabled is True: return False elif resource.enabled is True: return True try: for x in range(0, 5): provision = self.client.api.tm.sys.provision resource = getattr(provision, self.want.module) resource = resource.load() result = resource.attrs if str(result['level']) != 'none' and self.want.level == 'none': return True if str(result['level']) == 'none' and self.want.level == 'none': return False if str(result['level']) == self.want.level: return True return False except Exception as ex: if 'not registered' in str(ex): return False time.sleep(1) def update(self): self.have = self.read_current_from_device() if not self.should_update(): return False if self.module.check_mode: return True result = self.update_on_device() if self.want.module == 'cgnat': return result self._wait_for_module_provisioning() if self.want.module == 'vcmp': self._wait_for_reboot() self._wait_for_module_provisioning() if self.want.module == 'asm': self._wait_for_asm_ready() if self.want.module == 'afm': self._wait_for_afm_ready() return True def should_reboot(self): for x in range(0, 24): try: resource = self.client.api.tm.sys.dbs.db.load(name='provision.action') if resource.value == 'reboot': return True elif resource.value == 'none': time.sleep(5) except Exception: time.sleep(5) return False def reboot_device(self): nops = 0 last_reboot = self._get_last_reboot() try: output = self.client.api.tm.util.bash.exec_cmd( 'run', utilCmdArgs='-c "/sbin/reboot"' ) if hasattr(output, 'commandResult'): return str(output.commandResult) except Exception: pass # Sleep a little to let rebooting take effect time.sleep(20) while nops < 6: try: self.client.reconnect() next_reboot = self._get_last_reboot() if next_reboot is None: nops = 0 if next_reboot == last_reboot: nops = 0 else: nops += 1 except Exception as ex: # This can be caused by restjavad restarting. pass time.sleep(10) return None def should_update(self): result = self._update_changed_options() if result: return True return False def update_on_device(self): if self.want.module == 'cgnat': if self.changes.cgnat: return self.provision_cgnat_on_device() return False elif self.want.level == 'dedicated': self.provision_dedicated_on_device() else: self.provision_non_dedicated_on_device() def provision_cgnat_on_device(self): resource = self.client.api.tm.sys.feature_module.cgnat.load() resource.modify( enabled=True ) return True def provision_dedicated_on_device(self): params = self.want.api_params() tx = self.client.api.tm.transactions.transaction collection = self.client.api.tm.sys.provision.get_collection() resources = [x['name'] for x in collection if x['name'] != self.want.module] with TransactionContextManager(tx) as api: provision = api.tm.sys.provision for resource in resources: resource = getattr(provision, resource) resource = resource.load() resource.update(level='none') resource = getattr(provision, self.want.module) resource = resource.load() resource.update(**params) def provision_non_dedicated_on_device(self): params = self.want.api_params() provision = self.client.api.tm.sys.provision resource = getattr(provision, self.want.module) resource = resource.load() resource.update(**params) def read_current_from_device(self): if self.want.module == 'cgnat': resource = self.client.api.tm.sys.feature_module.cgnat.load() result = resource.attrs else: provision = self.client.api.tm.sys.provision resource = getattr(provision, str(self.want.module)) resource = resource.load() result = resource.attrs return ApiParameters(params=result) def absent(self): if self.exists(): return self.remove() return False def remove(self): if self.module.check_mode: return True result = self.remove_from_device() if self.want.module == 'cgnat': return result self._wait_for_module_provisioning() # For vCMP, because it has to reboot, we also wait for mcpd to become available # before "moving on", or else the REST API would not be available and subsequent # Tasks would fail. if self.want.module == 'vcmp': self._wait_for_reboot() self._wait_for_module_provisioning() if self.should_reboot(): self.save_on_device() self.reboot_device() self._wait_for_module_provisioning() if self.exists(): raise F5ModuleError("Failed to de-provision the module") return True def save_on_device(self): command = 'tmsh save sys config' self.client.api.tm.util.bash.exec_cmd( 'run', utilCmdArgs='-c "{0}"'.format(command) ) def remove_from_device(self): if self.want.module == 'cgnat': if self.changes.cgnat: return self.deprovision_cgnat_on_device() return False provision = self.client.api.tm.sys.provision resource = getattr(provision, self.want.module) resource = resource.load() resource.update(level='none') def deprovision_cgnat_on_device(self): resource = self.client.api.tm.sys.feature_module.cgnat.load() resource.modify( disabled=True ) return True def _wait_for_module_provisioning(self): # To prevent things from running forever, the hack is to check # for mprov's status twice. If mprov is finished, then in most # cases (not ASM) the provisioning is probably ready. nops = 0 # Sleep a little to let provisioning settle and begin properly time.sleep(5) while nops < 3: try: if not self._is_mprov_running_on_device(): nops += 1 else: nops = 0 except Exception: # This can be caused by restjavad restarting. try: self.client.reconnect() except Exception: pass time.sleep(5) def _is_mprov_running_on_device(self): # /usr/libexec/qemu-kvm is added here to prevent vcmp provisioning # from never allowing the mprov provisioning to succeed. # # It turns out that the 'mprov' string is found when enabling vcmp. The # qemu-kvm command that is run includes it. # # For example, # /usr/libexec/qemu-kvm -rt-usecs 880 ... -mem-path /dev/mprov/vcmp -f5-tracing ... # try: output = self.client.api.tm.util.bash.exec_cmd( 'run', utilCmdArgs='-c "ps aux | grep \'[m]prov\' | grep -v /usr/libexec/qemu-kvm"' ) if hasattr(output, 'commandResult'): return True except Exception: pass return False def _wait_for_asm_ready(self): """Waits specifically for ASM On older versions, ASM can take longer to actually start up than all the previous checks take. This check here is specifically waiting for the Policies API to stop raising errors :return: """ nops = 0 restarted_asm = False while nops < 3: try: policies = self.client.api.tm.asm.policies_s.get_collection() if len(policies) >= 0: nops += 1 else: nops = 0 except Exception as ex: if not restarted_asm: self._restart_asm() restarted_asm = True time.sleep(5) def _wait_for_afm_ready(self): """Waits specifically for AFM AFM can take longer to actually start up than all the previous checks take. This check here is specifically waiting for the Security API to stop raising errors. :return: """ nops = 0 while nops < 3: try: security = self.client.api.tm.security.get_collection() if len(security) >= 0: nops += 1 else: nops = 0 except Exception as ex: pass time.sleep(5) def _restart_asm(self): try: self.client.api.tm.util.bash.exec_cmd( 'run', utilCmdArgs='-c "bigstart restart asm"' ) time.sleep(60) return True except Exception: pass return None def _get_last_reboot(self): try: output = self.client.api.tm.util.bash.exec_cmd( 'run', utilCmdArgs='-c "/usr/bin/last reboot | head -1"' ) if hasattr(output, 'commandResult'): return str(output.commandResult) except Exception: pass return None def _wait_for_reboot(self): nops = 0 last_reboot = self._get_last_reboot() # Sleep a little to let provisioning settle and begin properly time.sleep(5) while nops < 6: try: self.client.reconnect() next_reboot = self._get_last_reboot() if next_reboot is None: nops = 0 if next_reboot == last_reboot: nops = 0 else: nops += 1 except Exception as ex: # This can be caused by restjavad restarting. pass time.sleep(10) class ArgumentSpec(object): def __init__(self): self.supports_check_mode = True argument_spec = dict( module=dict( required=True, choices=[ 'afm', 'am', 'sam', 'asm', 'avr', 'fps', 'gtm', 'lc', 'ltm', 'pem', 'swg', 'ilx', 'apm', 'vcmp', 'cgnat' ], aliases=['name'] ), level=dict( default='nominal', choices=['nominal', 'dedicated', 'minimum'] ), state=dict( default='present', choices=['present', 'absent'] ) ) self.argument_spec = {} self.argument_spec.update(f5_argument_spec) self.argument_spec.update(argument_spec) self.mutually_exclusive = [ ['parameters', 'parameters_src'] ] def main(): spec = ArgumentSpec() module = AnsibleModule( argument_spec=spec.argument_spec, supports_check_mode=spec.supports_check_mode, mutually_exclusive=spec.mutually_exclusive ) if not HAS_F5SDK: module.fail_json(msg="The python f5-sdk module is required") try: client = F5Client(**module.params) mm = ModuleManager(module=module, client=client) results = mm.exec_module() cleanup_tokens(client) module.exit_json(**results) except F5ModuleError as ex: cleanup_tokens(client) module.fail_json(msg=str(ex)) if __name__ == '__main__': main()