2020-03-09 10:11:07 +01:00
|
|
|
# Copyright (c) 2017-2018 Dell EMC Inc.
|
|
|
|
# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt)
|
|
|
|
|
|
|
|
from __future__ import absolute_import, division, print_function
|
|
|
|
__metaclass__ = type
|
|
|
|
|
|
|
|
import json
|
|
|
|
from ansible.module_utils.urls import open_url
|
2021-06-27 09:39:18 +02:00
|
|
|
from ansible.module_utils.common.text.converters import to_native
|
|
|
|
from ansible.module_utils.common.text.converters import to_text
|
2020-03-09 10:11:07 +01:00
|
|
|
from ansible.module_utils.six.moves import http_client
|
|
|
|
from ansible.module_utils.six.moves.urllib.error import URLError, HTTPError
|
2020-06-11 20:24:41 +02:00
|
|
|
from ansible.module_utils.six.moves.urllib.parse import urlparse
|
2020-03-09 10:11:07 +01:00
|
|
|
|
|
|
|
GET_HEADERS = {'accept': 'application/json', 'OData-Version': '4.0'}
|
|
|
|
POST_HEADERS = {'content-type': 'application/json', 'accept': 'application/json',
|
|
|
|
'OData-Version': '4.0'}
|
|
|
|
PATCH_HEADERS = {'content-type': 'application/json', 'accept': 'application/json',
|
|
|
|
'OData-Version': '4.0'}
|
|
|
|
DELETE_HEADERS = {'accept': 'application/json', 'OData-Version': '4.0'}
|
|
|
|
|
2021-03-09 21:23:20 +01:00
|
|
|
FAIL_MSG = 'Issuing a data modification command without specifying the '\
|
|
|
|
'ID of the target %(resource)s resource when there is more '\
|
|
|
|
'than one %(resource)s is no longer allowed. Use the `resource_id` '\
|
|
|
|
'option to specify the target %(resource)s ID.'
|
2020-03-09 10:11:07 +01:00
|
|
|
|
|
|
|
|
|
|
|
class RedfishUtils(object):
|
|
|
|
|
|
|
|
def __init__(self, creds, root_uri, timeout, module, resource_id=None,
|
|
|
|
data_modification=False):
|
|
|
|
self.root_uri = root_uri
|
|
|
|
self.creds = creds
|
|
|
|
self.timeout = timeout
|
|
|
|
self.module = module
|
|
|
|
self.service_root = '/redfish/v1/'
|
|
|
|
self.resource_id = resource_id
|
|
|
|
self.data_modification = data_modification
|
|
|
|
self._init_session()
|
|
|
|
|
2021-03-19 21:14:33 +01:00
|
|
|
def _auth_params(self, headers):
|
|
|
|
"""
|
|
|
|
Return tuple of required authentication params based on the presence
|
|
|
|
of a token in the self.creds dict. If using a token, set the
|
|
|
|
X-Auth-Token header in the `headers` param.
|
|
|
|
|
|
|
|
:param headers: dict containing headers to send in request
|
|
|
|
:return: tuple of username, password and force_basic_auth
|
|
|
|
"""
|
|
|
|
if self.creds.get('token'):
|
|
|
|
username = None
|
|
|
|
password = None
|
|
|
|
force_basic_auth = False
|
|
|
|
headers['X-Auth-Token'] = self.creds['token']
|
|
|
|
else:
|
|
|
|
username = self.creds['user']
|
|
|
|
password = self.creds['pswd']
|
|
|
|
force_basic_auth = True
|
|
|
|
return username, password, force_basic_auth
|
|
|
|
|
2020-03-09 10:11:07 +01:00
|
|
|
# The following functions are to send GET/POST/PATCH/DELETE requests
|
|
|
|
def get_request(self, uri):
|
2021-03-19 21:14:33 +01:00
|
|
|
req_headers = dict(GET_HEADERS)
|
|
|
|
username, password, basic_auth = self._auth_params(req_headers)
|
2020-03-09 10:11:07 +01:00
|
|
|
try:
|
2021-03-19 21:14:33 +01:00
|
|
|
resp = open_url(uri, method="GET", headers=req_headers,
|
|
|
|
url_username=username, url_password=password,
|
|
|
|
force_basic_auth=basic_auth, validate_certs=False,
|
2020-03-09 10:11:07 +01:00
|
|
|
follow_redirects='all',
|
|
|
|
use_proxy=True, timeout=self.timeout)
|
2020-07-24 23:35:33 +02:00
|
|
|
data = json.loads(to_native(resp.read()))
|
2020-03-09 10:11:07 +01:00
|
|
|
headers = dict((k.lower(), v) for (k, v) in resp.info().items())
|
|
|
|
except HTTPError as e:
|
|
|
|
msg = self._get_extended_message(e)
|
|
|
|
return {'ret': False,
|
|
|
|
'msg': "HTTP Error %s on GET request to '%s', extended message: '%s'"
|
|
|
|
% (e.code, uri, msg),
|
|
|
|
'status': e.code}
|
|
|
|
except URLError as e:
|
|
|
|
return {'ret': False, 'msg': "URL Error on GET request to '%s': '%s'"
|
|
|
|
% (uri, e.reason)}
|
|
|
|
# Almost all errors should be caught above, but just in case
|
|
|
|
except Exception as e:
|
|
|
|
return {'ret': False,
|
|
|
|
'msg': "Failed GET request to '%s': '%s'" % (uri, to_text(e))}
|
|
|
|
return {'ret': True, 'data': data, 'headers': headers}
|
|
|
|
|
|
|
|
def post_request(self, uri, pyld):
|
2021-03-19 21:14:33 +01:00
|
|
|
req_headers = dict(POST_HEADERS)
|
|
|
|
username, password, basic_auth = self._auth_params(req_headers)
|
2020-03-09 10:11:07 +01:00
|
|
|
try:
|
|
|
|
resp = open_url(uri, data=json.dumps(pyld),
|
2021-03-19 21:14:33 +01:00
|
|
|
headers=req_headers, method="POST",
|
|
|
|
url_username=username, url_password=password,
|
|
|
|
force_basic_auth=basic_auth, validate_certs=False,
|
2020-03-09 10:11:07 +01:00
|
|
|
follow_redirects='all',
|
|
|
|
use_proxy=True, timeout=self.timeout)
|
2021-03-19 21:14:33 +01:00
|
|
|
headers = dict((k.lower(), v) for (k, v) in resp.info().items())
|
2020-03-09 10:11:07 +01:00
|
|
|
except HTTPError as e:
|
|
|
|
msg = self._get_extended_message(e)
|
|
|
|
return {'ret': False,
|
|
|
|
'msg': "HTTP Error %s on POST request to '%s', extended message: '%s'"
|
|
|
|
% (e.code, uri, msg),
|
|
|
|
'status': e.code}
|
|
|
|
except URLError as e:
|
|
|
|
return {'ret': False, 'msg': "URL Error on POST request to '%s': '%s'"
|
|
|
|
% (uri, e.reason)}
|
|
|
|
# Almost all errors should be caught above, but just in case
|
|
|
|
except Exception as e:
|
|
|
|
return {'ret': False,
|
|
|
|
'msg': "Failed POST request to '%s': '%s'" % (uri, to_text(e))}
|
2021-03-19 21:14:33 +01:00
|
|
|
return {'ret': True, 'headers': headers, 'resp': resp}
|
2020-03-09 10:11:07 +01:00
|
|
|
|
|
|
|
def patch_request(self, uri, pyld):
|
2021-03-19 21:14:33 +01:00
|
|
|
req_headers = dict(PATCH_HEADERS)
|
2020-03-09 10:11:07 +01:00
|
|
|
r = self.get_request(uri)
|
|
|
|
if r['ret']:
|
|
|
|
# Get etag from etag header or @odata.etag property
|
|
|
|
etag = r['headers'].get('etag')
|
|
|
|
if not etag:
|
|
|
|
etag = r['data'].get('@odata.etag')
|
|
|
|
if etag:
|
2021-03-19 21:14:33 +01:00
|
|
|
req_headers['If-Match'] = etag
|
|
|
|
username, password, basic_auth = self._auth_params(req_headers)
|
2020-03-09 10:11:07 +01:00
|
|
|
try:
|
|
|
|
resp = open_url(uri, data=json.dumps(pyld),
|
2021-03-19 21:14:33 +01:00
|
|
|
headers=req_headers, method="PATCH",
|
|
|
|
url_username=username, url_password=password,
|
|
|
|
force_basic_auth=basic_auth, validate_certs=False,
|
2020-03-09 10:11:07 +01:00
|
|
|
follow_redirects='all',
|
|
|
|
use_proxy=True, timeout=self.timeout)
|
|
|
|
except HTTPError as e:
|
|
|
|
msg = self._get_extended_message(e)
|
|
|
|
return {'ret': False,
|
|
|
|
'msg': "HTTP Error %s on PATCH request to '%s', extended message: '%s'"
|
|
|
|
% (e.code, uri, msg),
|
|
|
|
'status': e.code}
|
|
|
|
except URLError as e:
|
|
|
|
return {'ret': False, 'msg': "URL Error on PATCH request to '%s': '%s'"
|
|
|
|
% (uri, e.reason)}
|
|
|
|
# Almost all errors should be caught above, but just in case
|
|
|
|
except Exception as e:
|
|
|
|
return {'ret': False,
|
|
|
|
'msg': "Failed PATCH request to '%s': '%s'" % (uri, to_text(e))}
|
|
|
|
return {'ret': True, 'resp': resp}
|
|
|
|
|
|
|
|
def delete_request(self, uri, pyld=None):
|
2021-03-19 21:14:33 +01:00
|
|
|
req_headers = dict(DELETE_HEADERS)
|
|
|
|
username, password, basic_auth = self._auth_params(req_headers)
|
2020-03-09 10:11:07 +01:00
|
|
|
try:
|
|
|
|
data = json.dumps(pyld) if pyld else None
|
|
|
|
resp = open_url(uri, data=data,
|
2021-03-19 21:14:33 +01:00
|
|
|
headers=req_headers, method="DELETE",
|
|
|
|
url_username=username, url_password=password,
|
|
|
|
force_basic_auth=basic_auth, validate_certs=False,
|
2020-03-09 10:11:07 +01:00
|
|
|
follow_redirects='all',
|
|
|
|
use_proxy=True, timeout=self.timeout)
|
|
|
|
except HTTPError as e:
|
|
|
|
msg = self._get_extended_message(e)
|
|
|
|
return {'ret': False,
|
|
|
|
'msg': "HTTP Error %s on DELETE request to '%s', extended message: '%s'"
|
|
|
|
% (e.code, uri, msg),
|
|
|
|
'status': e.code}
|
|
|
|
except URLError as e:
|
|
|
|
return {'ret': False, 'msg': "URL Error on DELETE request to '%s': '%s'"
|
|
|
|
% (uri, e.reason)}
|
|
|
|
# Almost all errors should be caught above, but just in case
|
|
|
|
except Exception as e:
|
|
|
|
return {'ret': False,
|
|
|
|
'msg': "Failed DELETE request to '%s': '%s'" % (uri, to_text(e))}
|
|
|
|
return {'ret': True, 'resp': resp}
|
|
|
|
|
|
|
|
@staticmethod
|
|
|
|
def _get_extended_message(error):
|
|
|
|
"""
|
|
|
|
Get Redfish ExtendedInfo message from response payload if present
|
|
|
|
:param error: an HTTPError exception
|
|
|
|
:type error: HTTPError
|
|
|
|
:return: the ExtendedInfo message if present, else standard HTTP error
|
|
|
|
"""
|
|
|
|
msg = http_client.responses.get(error.code, '')
|
|
|
|
if error.code >= 400:
|
|
|
|
try:
|
|
|
|
body = error.read().decode('utf-8')
|
|
|
|
data = json.loads(body)
|
|
|
|
ext_info = data['error']['@Message.ExtendedInfo']
|
|
|
|
msg = ext_info[0]['Message']
|
|
|
|
except Exception:
|
|
|
|
pass
|
|
|
|
return msg
|
|
|
|
|
|
|
|
def _init_session(self):
|
|
|
|
pass
|
|
|
|
|
|
|
|
def _find_accountservice_resource(self):
|
|
|
|
response = self.get_request(self.root_uri + self.service_root)
|
|
|
|
if response['ret'] is False:
|
|
|
|
return response
|
|
|
|
data = response['data']
|
|
|
|
if 'AccountService' not in data:
|
|
|
|
return {'ret': False, 'msg': "AccountService resource not found"}
|
|
|
|
else:
|
|
|
|
account_service = data["AccountService"]["@odata.id"]
|
|
|
|
response = self.get_request(self.root_uri + account_service)
|
|
|
|
if response['ret'] is False:
|
|
|
|
return response
|
|
|
|
data = response['data']
|
|
|
|
accounts = data['Accounts']['@odata.id']
|
|
|
|
if accounts[-1:] == '/':
|
|
|
|
accounts = accounts[:-1]
|
|
|
|
self.accounts_uri = accounts
|
|
|
|
return {'ret': True}
|
|
|
|
|
|
|
|
def _find_sessionservice_resource(self):
|
|
|
|
response = self.get_request(self.root_uri + self.service_root)
|
|
|
|
if response['ret'] is False:
|
|
|
|
return response
|
|
|
|
data = response['data']
|
|
|
|
if 'SessionService' not in data:
|
|
|
|
return {'ret': False, 'msg': "SessionService resource not found"}
|
|
|
|
else:
|
|
|
|
session_service = data["SessionService"]["@odata.id"]
|
|
|
|
response = self.get_request(self.root_uri + session_service)
|
|
|
|
if response['ret'] is False:
|
|
|
|
return response
|
|
|
|
data = response['data']
|
|
|
|
sessions = data['Sessions']['@odata.id']
|
|
|
|
if sessions[-1:] == '/':
|
|
|
|
sessions = sessions[:-1]
|
|
|
|
self.sessions_uri = sessions
|
|
|
|
return {'ret': True}
|
|
|
|
|
|
|
|
def _get_resource_uri_by_id(self, uris, id_prop):
|
|
|
|
for uri in uris:
|
|
|
|
response = self.get_request(self.root_uri + uri)
|
|
|
|
if response['ret'] is False:
|
|
|
|
continue
|
|
|
|
data = response['data']
|
|
|
|
if id_prop == data.get('Id'):
|
|
|
|
return uri
|
|
|
|
return None
|
|
|
|
|
|
|
|
def _find_systems_resource(self):
|
|
|
|
response = self.get_request(self.root_uri + self.service_root)
|
|
|
|
if response['ret'] is False:
|
|
|
|
return response
|
|
|
|
data = response['data']
|
|
|
|
if 'Systems' not in data:
|
|
|
|
return {'ret': False, 'msg': "Systems resource not found"}
|
|
|
|
response = self.get_request(self.root_uri + data['Systems']['@odata.id'])
|
|
|
|
if response['ret'] is False:
|
|
|
|
return response
|
|
|
|
self.systems_uris = [
|
|
|
|
i['@odata.id'] for i in response['data'].get('Members', [])]
|
|
|
|
if not self.systems_uris:
|
|
|
|
return {
|
|
|
|
'ret': False,
|
|
|
|
'msg': "ComputerSystem's Members array is either empty or missing"}
|
|
|
|
self.systems_uri = self.systems_uris[0]
|
|
|
|
if self.data_modification:
|
|
|
|
if self.resource_id:
|
|
|
|
self.systems_uri = self._get_resource_uri_by_id(self.systems_uris,
|
|
|
|
self.resource_id)
|
|
|
|
if not self.systems_uri:
|
|
|
|
return {
|
|
|
|
'ret': False,
|
|
|
|
'msg': "System resource %s not found" % self.resource_id}
|
|
|
|
elif len(self.systems_uris) > 1:
|
2021-03-09 21:23:20 +01:00
|
|
|
self.module.fail_json(msg=FAIL_MSG % {'resource': 'System'})
|
2020-03-09 10:11:07 +01:00
|
|
|
return {'ret': True}
|
|
|
|
|
|
|
|
def _find_updateservice_resource(self):
|
|
|
|
response = self.get_request(self.root_uri + self.service_root)
|
|
|
|
if response['ret'] is False:
|
|
|
|
return response
|
|
|
|
data = response['data']
|
|
|
|
if 'UpdateService' not in data:
|
|
|
|
return {'ret': False, 'msg': "UpdateService resource not found"}
|
|
|
|
else:
|
|
|
|
update = data["UpdateService"]["@odata.id"]
|
|
|
|
self.update_uri = update
|
|
|
|
response = self.get_request(self.root_uri + update)
|
|
|
|
if response['ret'] is False:
|
|
|
|
return response
|
|
|
|
data = response['data']
|
|
|
|
self.firmware_uri = self.software_uri = None
|
|
|
|
if 'FirmwareInventory' in data:
|
|
|
|
self.firmware_uri = data['FirmwareInventory'][u'@odata.id']
|
|
|
|
if 'SoftwareInventory' in data:
|
|
|
|
self.software_uri = data['SoftwareInventory'][u'@odata.id']
|
|
|
|
return {'ret': True}
|
|
|
|
|
|
|
|
def _find_chassis_resource(self):
|
|
|
|
response = self.get_request(self.root_uri + self.service_root)
|
|
|
|
if response['ret'] is False:
|
|
|
|
return response
|
|
|
|
data = response['data']
|
|
|
|
if 'Chassis' not in data:
|
|
|
|
return {'ret': False, 'msg': "Chassis resource not found"}
|
|
|
|
chassis = data["Chassis"]["@odata.id"]
|
|
|
|
response = self.get_request(self.root_uri + chassis)
|
|
|
|
if response['ret'] is False:
|
|
|
|
return response
|
|
|
|
self.chassis_uris = [
|
|
|
|
i['@odata.id'] for i in response['data'].get('Members', [])]
|
|
|
|
if not self.chassis_uris:
|
|
|
|
return {'ret': False,
|
|
|
|
'msg': "Chassis Members array is either empty or missing"}
|
|
|
|
self.chassis_uri = self.chassis_uris[0]
|
|
|
|
if self.data_modification:
|
|
|
|
if self.resource_id:
|
|
|
|
self.chassis_uri = self._get_resource_uri_by_id(self.chassis_uris,
|
|
|
|
self.resource_id)
|
|
|
|
if not self.chassis_uri:
|
|
|
|
return {
|
|
|
|
'ret': False,
|
|
|
|
'msg': "Chassis resource %s not found" % self.resource_id}
|
|
|
|
elif len(self.chassis_uris) > 1:
|
2021-03-09 21:23:20 +01:00
|
|
|
self.module.fail_json(msg=FAIL_MSG % {'resource': 'Chassis'})
|
2020-03-09 10:11:07 +01:00
|
|
|
return {'ret': True}
|
|
|
|
|
|
|
|
def _find_managers_resource(self):
|
|
|
|
response = self.get_request(self.root_uri + self.service_root)
|
|
|
|
if response['ret'] is False:
|
|
|
|
return response
|
|
|
|
data = response['data']
|
|
|
|
if 'Managers' not in data:
|
|
|
|
return {'ret': False, 'msg': "Manager resource not found"}
|
|
|
|
manager = data["Managers"]["@odata.id"]
|
|
|
|
response = self.get_request(self.root_uri + manager)
|
|
|
|
if response['ret'] is False:
|
|
|
|
return response
|
|
|
|
self.manager_uris = [
|
|
|
|
i['@odata.id'] for i in response['data'].get('Members', [])]
|
|
|
|
if not self.manager_uris:
|
|
|
|
return {'ret': False,
|
|
|
|
'msg': "Managers Members array is either empty or missing"}
|
|
|
|
self.manager_uri = self.manager_uris[0]
|
|
|
|
if self.data_modification:
|
|
|
|
if self.resource_id:
|
|
|
|
self.manager_uri = self._get_resource_uri_by_id(self.manager_uris,
|
|
|
|
self.resource_id)
|
|
|
|
if not self.manager_uri:
|
|
|
|
return {
|
|
|
|
'ret': False,
|
|
|
|
'msg': "Manager resource %s not found" % self.resource_id}
|
|
|
|
elif len(self.manager_uris) > 1:
|
2021-03-09 21:23:20 +01:00
|
|
|
self.module.fail_json(msg=FAIL_MSG % {'resource': 'Manager'})
|
2020-03-09 10:11:07 +01:00
|
|
|
return {'ret': True}
|
|
|
|
|
2020-06-11 20:24:41 +02:00
|
|
|
def _get_all_action_info_values(self, action):
|
|
|
|
"""Retrieve all parameter values for an Action from ActionInfo.
|
|
|
|
Fall back to AllowableValue annotations if no ActionInfo found.
|
|
|
|
Return the result in an ActionInfo-like dictionary, keyed
|
|
|
|
by the name of the parameter. """
|
|
|
|
ai = {}
|
|
|
|
if '@Redfish.ActionInfo' in action:
|
|
|
|
ai_uri = action['@Redfish.ActionInfo']
|
|
|
|
response = self.get_request(self.root_uri + ai_uri)
|
|
|
|
if response['ret'] is True:
|
|
|
|
data = response['data']
|
|
|
|
if 'Parameters' in data:
|
|
|
|
params = data['Parameters']
|
|
|
|
ai = dict((p['Name'], p)
|
|
|
|
for p in params if 'Name' in p)
|
|
|
|
if not ai:
|
|
|
|
ai = dict((k[:-24],
|
|
|
|
{'AllowableValues': v}) for k, v in action.items()
|
|
|
|
if k.endswith('@Redfish.AllowableValues'))
|
|
|
|
return ai
|
|
|
|
|
|
|
|
def _get_allowable_values(self, action, name, default_values=None):
|
|
|
|
if default_values is None:
|
|
|
|
default_values = []
|
|
|
|
ai = self._get_all_action_info_values(action)
|
|
|
|
allowable_values = ai.get(name, {}).get('AllowableValues')
|
|
|
|
# fallback to default values
|
|
|
|
if allowable_values is None:
|
|
|
|
allowable_values = default_values
|
|
|
|
return allowable_values
|
|
|
|
|
2020-03-09 10:11:07 +01:00
|
|
|
def get_logs(self):
|
|
|
|
log_svcs_uri_list = []
|
|
|
|
list_of_logs = []
|
|
|
|
properties = ['Severity', 'Created', 'EntryType', 'OemRecordFormat',
|
|
|
|
'Message', 'MessageId', 'MessageArgs']
|
|
|
|
|
|
|
|
# Find LogService
|
|
|
|
response = self.get_request(self.root_uri + self.manager_uri)
|
|
|
|
if response['ret'] is False:
|
|
|
|
return response
|
|
|
|
data = response['data']
|
|
|
|
if 'LogServices' not in data:
|
|
|
|
return {'ret': False, 'msg': "LogServices resource not found"}
|
|
|
|
|
|
|
|
# Find all entries in LogServices
|
|
|
|
logs_uri = data["LogServices"]["@odata.id"]
|
|
|
|
response = self.get_request(self.root_uri + logs_uri)
|
|
|
|
if response['ret'] is False:
|
|
|
|
return response
|
|
|
|
data = response['data']
|
|
|
|
for log_svcs_entry in data.get('Members', []):
|
|
|
|
response = self.get_request(self.root_uri + log_svcs_entry[u'@odata.id'])
|
|
|
|
if response['ret'] is False:
|
|
|
|
return response
|
|
|
|
_data = response['data']
|
|
|
|
if 'Entries' in _data:
|
|
|
|
log_svcs_uri_list.append(_data['Entries'][u'@odata.id'])
|
|
|
|
|
|
|
|
# For each entry in LogServices, get log name and all log entries
|
|
|
|
for log_svcs_uri in log_svcs_uri_list:
|
|
|
|
logs = {}
|
|
|
|
list_of_log_entries = []
|
|
|
|
response = self.get_request(self.root_uri + log_svcs_uri)
|
|
|
|
if response['ret'] is False:
|
|
|
|
return response
|
|
|
|
data = response['data']
|
|
|
|
logs['Description'] = data.get('Description',
|
|
|
|
'Collection of log entries')
|
|
|
|
# Get all log entries for each type of log found
|
|
|
|
for logEntry in data.get('Members', []):
|
|
|
|
entry = {}
|
|
|
|
for prop in properties:
|
|
|
|
if prop in logEntry:
|
|
|
|
entry[prop] = logEntry.get(prop)
|
|
|
|
if entry:
|
|
|
|
list_of_log_entries.append(entry)
|
|
|
|
log_name = log_svcs_uri.split('/')[-1]
|
|
|
|
logs[log_name] = list_of_log_entries
|
|
|
|
list_of_logs.append(logs)
|
|
|
|
|
|
|
|
# list_of_logs[logs{list_of_log_entries[entry{}]}]
|
|
|
|
return {'ret': True, 'entries': list_of_logs}
|
|
|
|
|
|
|
|
def clear_logs(self):
|
|
|
|
# Find LogService
|
|
|
|
response = self.get_request(self.root_uri + self.manager_uri)
|
|
|
|
if response['ret'] is False:
|
|
|
|
return response
|
|
|
|
data = response['data']
|
|
|
|
if 'LogServices' not in data:
|
|
|
|
return {'ret': False, 'msg': "LogServices resource not found"}
|
|
|
|
|
|
|
|
# Find all entries in LogServices
|
|
|
|
logs_uri = data["LogServices"]["@odata.id"]
|
|
|
|
response = self.get_request(self.root_uri + logs_uri)
|
|
|
|
if response['ret'] is False:
|
|
|
|
return response
|
|
|
|
data = response['data']
|
|
|
|
|
|
|
|
for log_svcs_entry in data[u'Members']:
|
|
|
|
response = self.get_request(self.root_uri + log_svcs_entry["@odata.id"])
|
|
|
|
if response['ret'] is False:
|
|
|
|
return response
|
|
|
|
_data = response['data']
|
|
|
|
# Check to make sure option is available, otherwise error is ugly
|
|
|
|
if "Actions" in _data:
|
|
|
|
if "#LogService.ClearLog" in _data[u"Actions"]:
|
|
|
|
self.post_request(self.root_uri + _data[u"Actions"]["#LogService.ClearLog"]["target"], {})
|
|
|
|
if response['ret'] is False:
|
|
|
|
return response
|
|
|
|
return {'ret': True}
|
|
|
|
|
|
|
|
def aggregate(self, func, uri_list, uri_name):
|
|
|
|
ret = True
|
|
|
|
entries = []
|
|
|
|
for uri in uri_list:
|
|
|
|
inventory = func(uri)
|
|
|
|
ret = inventory.pop('ret') and ret
|
|
|
|
if 'entries' in inventory:
|
|
|
|
entries.append(({uri_name: uri},
|
|
|
|
inventory['entries']))
|
|
|
|
return dict(ret=ret, entries=entries)
|
|
|
|
|
|
|
|
def aggregate_chassis(self, func):
|
|
|
|
return self.aggregate(func, self.chassis_uris, 'chassis_uri')
|
|
|
|
|
|
|
|
def aggregate_managers(self, func):
|
|
|
|
return self.aggregate(func, self.manager_uris, 'manager_uri')
|
|
|
|
|
|
|
|
def aggregate_systems(self, func):
|
|
|
|
return self.aggregate(func, self.systems_uris, 'system_uri')
|
|
|
|
|
|
|
|
def get_storage_controller_inventory(self, systems_uri):
|
|
|
|
result = {}
|
|
|
|
controller_list = []
|
|
|
|
controller_results = []
|
|
|
|
# Get these entries, but does not fail if not found
|
|
|
|
properties = ['CacheSummary', 'FirmwareVersion', 'Identifiers',
|
2021-01-29 07:17:57 +01:00
|
|
|
'Location', 'Manufacturer', 'Model', 'Name', 'Id',
|
2020-03-09 10:11:07 +01:00
|
|
|
'PartNumber', 'SerialNumber', 'SpeedGbps', 'Status']
|
|
|
|
key = "StorageControllers"
|
|
|
|
|
|
|
|
# Find Storage service
|
|
|
|
response = self.get_request(self.root_uri + systems_uri)
|
|
|
|
if response['ret'] is False:
|
|
|
|
return response
|
|
|
|
data = response['data']
|
|
|
|
|
|
|
|
if 'Storage' not in data:
|
|
|
|
return {'ret': False, 'msg': "Storage resource not found"}
|
|
|
|
|
|
|
|
# Get a list of all storage controllers and build respective URIs
|
|
|
|
storage_uri = data['Storage']["@odata.id"]
|
|
|
|
response = self.get_request(self.root_uri + storage_uri)
|
|
|
|
if response['ret'] is False:
|
|
|
|
return response
|
|
|
|
result['ret'] = True
|
|
|
|
data = response['data']
|
|
|
|
|
|
|
|
# Loop through Members and their StorageControllers
|
|
|
|
# and gather properties from each StorageController
|
|
|
|
if data[u'Members']:
|
|
|
|
for storage_member in data[u'Members']:
|
|
|
|
storage_member_uri = storage_member[u'@odata.id']
|
|
|
|
response = self.get_request(self.root_uri + storage_member_uri)
|
|
|
|
data = response['data']
|
|
|
|
|
|
|
|
if key in data:
|
|
|
|
controller_list = data[key]
|
|
|
|
for controller in controller_list:
|
|
|
|
controller_result = {}
|
|
|
|
for property in properties:
|
|
|
|
if property in controller:
|
|
|
|
controller_result[property] = controller[property]
|
|
|
|
controller_results.append(controller_result)
|
|
|
|
result['entries'] = controller_results
|
|
|
|
return result
|
|
|
|
else:
|
|
|
|
return {'ret': False, 'msg': "Storage resource not found"}
|
|
|
|
|
|
|
|
def get_multi_storage_controller_inventory(self):
|
|
|
|
return self.aggregate_systems(self.get_storage_controller_inventory)
|
|
|
|
|
|
|
|
def get_disk_inventory(self, systems_uri):
|
|
|
|
result = {'entries': []}
|
|
|
|
controller_list = []
|
|
|
|
# Get these entries, but does not fail if not found
|
|
|
|
properties = ['BlockSizeBytes', 'CapableSpeedGbs', 'CapacityBytes',
|
|
|
|
'EncryptionAbility', 'EncryptionStatus',
|
|
|
|
'FailurePredicted', 'HotspareType', 'Id', 'Identifiers',
|
|
|
|
'Manufacturer', 'MediaType', 'Model', 'Name',
|
|
|
|
'PartNumber', 'PhysicalLocation', 'Protocol', 'Revision',
|
|
|
|
'RotationSpeedRPM', 'SerialNumber', 'Status']
|
|
|
|
|
|
|
|
# Find Storage service
|
|
|
|
response = self.get_request(self.root_uri + systems_uri)
|
|
|
|
if response['ret'] is False:
|
|
|
|
return response
|
|
|
|
data = response['data']
|
|
|
|
|
|
|
|
if 'SimpleStorage' not in data and 'Storage' not in data:
|
|
|
|
return {'ret': False, 'msg': "SimpleStorage and Storage resource \
|
|
|
|
not found"}
|
|
|
|
|
|
|
|
if 'Storage' in data:
|
|
|
|
# Get a list of all storage controllers and build respective URIs
|
|
|
|
storage_uri = data[u'Storage'][u'@odata.id']
|
|
|
|
response = self.get_request(self.root_uri + storage_uri)
|
|
|
|
if response['ret'] is False:
|
|
|
|
return response
|
|
|
|
result['ret'] = True
|
|
|
|
data = response['data']
|
|
|
|
|
|
|
|
if data[u'Members']:
|
|
|
|
for controller in data[u'Members']:
|
|
|
|
controller_list.append(controller[u'@odata.id'])
|
|
|
|
for c in controller_list:
|
|
|
|
uri = self.root_uri + c
|
|
|
|
response = self.get_request(uri)
|
|
|
|
if response['ret'] is False:
|
|
|
|
return response
|
|
|
|
data = response['data']
|
|
|
|
controller_name = 'Controller 1'
|
|
|
|
if 'StorageControllers' in data:
|
|
|
|
sc = data['StorageControllers']
|
|
|
|
if sc:
|
|
|
|
if 'Name' in sc[0]:
|
|
|
|
controller_name = sc[0]['Name']
|
|
|
|
else:
|
|
|
|
sc_id = sc[0].get('Id', '1')
|
|
|
|
controller_name = 'Controller %s' % sc_id
|
|
|
|
drive_results = []
|
|
|
|
if 'Drives' in data:
|
|
|
|
for device in data[u'Drives']:
|
|
|
|
disk_uri = self.root_uri + device[u'@odata.id']
|
|
|
|
response = self.get_request(disk_uri)
|
|
|
|
data = response['data']
|
|
|
|
|
|
|
|
drive_result = {}
|
|
|
|
for property in properties:
|
|
|
|
if property in data:
|
|
|
|
if data[property] is not None:
|
|
|
|
drive_result[property] = data[property]
|
|
|
|
drive_results.append(drive_result)
|
|
|
|
drives = {'Controller': controller_name,
|
|
|
|
'Drives': drive_results}
|
|
|
|
result["entries"].append(drives)
|
|
|
|
|
|
|
|
if 'SimpleStorage' in data:
|
|
|
|
# Get a list of all storage controllers and build respective URIs
|
|
|
|
storage_uri = data["SimpleStorage"]["@odata.id"]
|
|
|
|
response = self.get_request(self.root_uri + storage_uri)
|
|
|
|
if response['ret'] is False:
|
|
|
|
return response
|
|
|
|
result['ret'] = True
|
|
|
|
data = response['data']
|
|
|
|
|
|
|
|
for controller in data[u'Members']:
|
|
|
|
controller_list.append(controller[u'@odata.id'])
|
|
|
|
|
|
|
|
for c in controller_list:
|
|
|
|
uri = self.root_uri + c
|
|
|
|
response = self.get_request(uri)
|
|
|
|
if response['ret'] is False:
|
|
|
|
return response
|
|
|
|
data = response['data']
|
|
|
|
if 'Name' in data:
|
|
|
|
controller_name = data['Name']
|
|
|
|
else:
|
|
|
|
sc_id = data.get('Id', '1')
|
|
|
|
controller_name = 'Controller %s' % sc_id
|
|
|
|
drive_results = []
|
|
|
|
for device in data[u'Devices']:
|
|
|
|
drive_result = {}
|
|
|
|
for property in properties:
|
|
|
|
if property in device:
|
|
|
|
drive_result[property] = device[property]
|
|
|
|
drive_results.append(drive_result)
|
|
|
|
drives = {'Controller': controller_name,
|
|
|
|
'Drives': drive_results}
|
|
|
|
result["entries"].append(drives)
|
|
|
|
|
|
|
|
return result
|
|
|
|
|
|
|
|
def get_multi_disk_inventory(self):
|
|
|
|
return self.aggregate_systems(self.get_disk_inventory)
|
|
|
|
|
|
|
|
def get_volume_inventory(self, systems_uri):
|
|
|
|
result = {'entries': []}
|
|
|
|
controller_list = []
|
|
|
|
volume_list = []
|
|
|
|
# Get these entries, but does not fail if not found
|
|
|
|
properties = ['Id', 'Name', 'RAIDType', 'VolumeType', 'BlockSizeBytes',
|
|
|
|
'Capacity', 'CapacityBytes', 'CapacitySources',
|
|
|
|
'Encrypted', 'EncryptionTypes', 'Identifiers',
|
|
|
|
'Operations', 'OptimumIOSizeBytes', 'AccessCapabilities',
|
|
|
|
'AllocatedPools', 'Status']
|
|
|
|
|
|
|
|
# Find Storage service
|
|
|
|
response = self.get_request(self.root_uri + systems_uri)
|
|
|
|
if response['ret'] is False:
|
|
|
|
return response
|
|
|
|
data = response['data']
|
|
|
|
|
|
|
|
if 'SimpleStorage' not in data and 'Storage' not in data:
|
|
|
|
return {'ret': False, 'msg': "SimpleStorage and Storage resource \
|
|
|
|
not found"}
|
|
|
|
|
|
|
|
if 'Storage' in data:
|
|
|
|
# Get a list of all storage controllers and build respective URIs
|
|
|
|
storage_uri = data[u'Storage'][u'@odata.id']
|
|
|
|
response = self.get_request(self.root_uri + storage_uri)
|
|
|
|
if response['ret'] is False:
|
|
|
|
return response
|
|
|
|
result['ret'] = True
|
|
|
|
data = response['data']
|
|
|
|
|
|
|
|
if data.get('Members'):
|
|
|
|
for controller in data[u'Members']:
|
|
|
|
controller_list.append(controller[u'@odata.id'])
|
|
|
|
for c in controller_list:
|
|
|
|
uri = self.root_uri + c
|
|
|
|
response = self.get_request(uri)
|
|
|
|
if response['ret'] is False:
|
|
|
|
return response
|
|
|
|
data = response['data']
|
|
|
|
controller_name = 'Controller 1'
|
|
|
|
if 'StorageControllers' in data:
|
|
|
|
sc = data['StorageControllers']
|
|
|
|
if sc:
|
|
|
|
if 'Name' in sc[0]:
|
|
|
|
controller_name = sc[0]['Name']
|
|
|
|
else:
|
|
|
|
sc_id = sc[0].get('Id', '1')
|
|
|
|
controller_name = 'Controller %s' % sc_id
|
|
|
|
volume_results = []
|
|
|
|
if 'Volumes' in data:
|
|
|
|
# Get a list of all volumes and build respective URIs
|
|
|
|
volumes_uri = data[u'Volumes'][u'@odata.id']
|
|
|
|
response = self.get_request(self.root_uri + volumes_uri)
|
|
|
|
data = response['data']
|
|
|
|
|
|
|
|
if data.get('Members'):
|
|
|
|
for volume in data[u'Members']:
|
|
|
|
volume_list.append(volume[u'@odata.id'])
|
|
|
|
for v in volume_list:
|
|
|
|
uri = self.root_uri + v
|
|
|
|
response = self.get_request(uri)
|
|
|
|
if response['ret'] is False:
|
|
|
|
return response
|
|
|
|
data = response['data']
|
|
|
|
|
|
|
|
volume_result = {}
|
|
|
|
for property in properties:
|
|
|
|
if property in data:
|
|
|
|
if data[property] is not None:
|
|
|
|
volume_result[property] = data[property]
|
|
|
|
|
|
|
|
# Get related Drives Id
|
|
|
|
drive_id_list = []
|
|
|
|
if 'Links' in data:
|
|
|
|
if 'Drives' in data[u'Links']:
|
|
|
|
for link in data[u'Links'][u'Drives']:
|
|
|
|
drive_id_link = link[u'@odata.id']
|
|
|
|
drive_id = drive_id_link.split("/")[-1]
|
|
|
|
drive_id_list.append({'Id': drive_id})
|
|
|
|
volume_result['Linked_drives'] = drive_id_list
|
|
|
|
volume_results.append(volume_result)
|
|
|
|
volumes = {'Controller': controller_name,
|
|
|
|
'Volumes': volume_results}
|
|
|
|
result["entries"].append(volumes)
|
|
|
|
else:
|
|
|
|
return {'ret': False, 'msg': "Storage resource not found"}
|
|
|
|
|
|
|
|
return result
|
|
|
|
|
|
|
|
def get_multi_volume_inventory(self):
|
|
|
|
return self.aggregate_systems(self.get_volume_inventory)
|
|
|
|
|
|
|
|
def manage_indicator_led(self, command):
|
|
|
|
result = {}
|
|
|
|
key = 'IndicatorLED'
|
|
|
|
|
|
|
|
payloads = {'IndicatorLedOn': 'Lit', 'IndicatorLedOff': 'Off', "IndicatorLedBlink": 'Blinking'}
|
|
|
|
|
|
|
|
result = {}
|
|
|
|
response = self.get_request(self.root_uri + self.chassis_uri)
|
|
|
|
if response['ret'] is False:
|
|
|
|
return response
|
|
|
|
result['ret'] = True
|
|
|
|
data = response['data']
|
|
|
|
if key not in data:
|
|
|
|
return {'ret': False, 'msg': "Key %s not found" % key}
|
|
|
|
|
|
|
|
if command in payloads.keys():
|
|
|
|
payload = {'IndicatorLED': payloads[command]}
|
|
|
|
response = self.patch_request(self.root_uri + self.chassis_uri, payload)
|
|
|
|
if response['ret'] is False:
|
|
|
|
return response
|
|
|
|
else:
|
|
|
|
return {'ret': False, 'msg': 'Invalid command'}
|
|
|
|
|
|
|
|
return result
|
|
|
|
|
|
|
|
def _map_reset_type(self, reset_type, allowable_values):
|
|
|
|
equiv_types = {
|
|
|
|
'On': 'ForceOn',
|
|
|
|
'ForceOn': 'On',
|
|
|
|
'ForceOff': 'GracefulShutdown',
|
|
|
|
'GracefulShutdown': 'ForceOff',
|
|
|
|
'GracefulRestart': 'ForceRestart',
|
|
|
|
'ForceRestart': 'GracefulRestart'
|
|
|
|
}
|
|
|
|
|
|
|
|
if reset_type in allowable_values:
|
|
|
|
return reset_type
|
|
|
|
if reset_type not in equiv_types:
|
|
|
|
return reset_type
|
|
|
|
mapped_type = equiv_types[reset_type]
|
|
|
|
if mapped_type in allowable_values:
|
|
|
|
return mapped_type
|
|
|
|
return reset_type
|
|
|
|
|
|
|
|
def manage_system_power(self, command):
|
2020-09-23 08:42:56 +02:00
|
|
|
return self.manage_power(command, self.systems_uri,
|
|
|
|
'#ComputerSystem.Reset')
|
|
|
|
|
|
|
|
def manage_manager_power(self, command):
|
|
|
|
return self.manage_power(command, self.manager_uri,
|
|
|
|
'#Manager.Reset')
|
|
|
|
|
|
|
|
def manage_power(self, command, resource_uri, action_name):
|
2020-03-09 10:11:07 +01:00
|
|
|
key = "Actions"
|
|
|
|
reset_type_values = ['On', 'ForceOff', 'GracefulShutdown',
|
|
|
|
'GracefulRestart', 'ForceRestart', 'Nmi',
|
|
|
|
'ForceOn', 'PushPowerButton', 'PowerCycle']
|
|
|
|
|
|
|
|
# command should be PowerOn, PowerForceOff, etc.
|
|
|
|
if not command.startswith('Power'):
|
|
|
|
return {'ret': False, 'msg': 'Invalid Command (%s)' % command}
|
|
|
|
reset_type = command[5:]
|
|
|
|
|
|
|
|
# map Reboot to a ResetType that does a reboot
|
|
|
|
if reset_type == 'Reboot':
|
|
|
|
reset_type = 'GracefulRestart'
|
|
|
|
|
|
|
|
if reset_type not in reset_type_values:
|
|
|
|
return {'ret': False, 'msg': 'Invalid Command (%s)' % command}
|
|
|
|
|
2020-09-23 08:42:56 +02:00
|
|
|
# read the resource and get the current power state
|
|
|
|
response = self.get_request(self.root_uri + resource_uri)
|
2020-03-09 10:11:07 +01:00
|
|
|
if response['ret'] is False:
|
|
|
|
return response
|
|
|
|
data = response['data']
|
|
|
|
power_state = data.get('PowerState')
|
|
|
|
|
|
|
|
# if power is already in target state, nothing to do
|
|
|
|
if power_state == "On" and reset_type in ['On', 'ForceOn']:
|
|
|
|
return {'ret': True, 'changed': False}
|
|
|
|
if power_state == "Off" and reset_type in ['GracefulShutdown', 'ForceOff']:
|
|
|
|
return {'ret': True, 'changed': False}
|
|
|
|
|
2020-09-23 08:42:56 +02:00
|
|
|
# get the reset Action and target URI
|
|
|
|
if key not in data or action_name not in data[key]:
|
|
|
|
return {'ret': False, 'msg': 'Action %s not found' % action_name}
|
|
|
|
reset_action = data[key][action_name]
|
2020-03-09 10:11:07 +01:00
|
|
|
if 'target' not in reset_action:
|
|
|
|
return {'ret': False,
|
2020-09-23 08:42:56 +02:00
|
|
|
'msg': 'target URI missing from Action %s' % action_name}
|
2020-03-09 10:11:07 +01:00
|
|
|
action_uri = reset_action['target']
|
|
|
|
|
2020-06-11 20:24:41 +02:00
|
|
|
# get AllowableValues
|
|
|
|
ai = self._get_all_action_info_values(reset_action)
|
|
|
|
allowable_values = ai.get('ResetType', {}).get('AllowableValues', [])
|
2020-03-09 10:11:07 +01:00
|
|
|
|
|
|
|
# map ResetType to an allowable value if needed
|
|
|
|
if reset_type not in allowable_values:
|
|
|
|
reset_type = self._map_reset_type(reset_type, allowable_values)
|
|
|
|
|
|
|
|
# define payload
|
|
|
|
payload = {'ResetType': reset_type}
|
|
|
|
|
|
|
|
# POST to Action URI
|
|
|
|
response = self.post_request(self.root_uri + action_uri, payload)
|
|
|
|
if response['ret'] is False:
|
|
|
|
return response
|
|
|
|
return {'ret': True, 'changed': True}
|
|
|
|
|
|
|
|
def _find_account_uri(self, username=None, acct_id=None):
|
|
|
|
if not any((username, acct_id)):
|
|
|
|
return {'ret': False, 'msg':
|
|
|
|
'Must provide either account_id or account_username'}
|
|
|
|
|
|
|
|
response = self.get_request(self.root_uri + self.accounts_uri)
|
|
|
|
if response['ret'] is False:
|
|
|
|
return response
|
|
|
|
data = response['data']
|
|
|
|
|
|
|
|
uris = [a.get('@odata.id') for a in data.get('Members', []) if
|
|
|
|
a.get('@odata.id')]
|
|
|
|
for uri in uris:
|
|
|
|
response = self.get_request(self.root_uri + uri)
|
|
|
|
if response['ret'] is False:
|
|
|
|
continue
|
|
|
|
data = response['data']
|
|
|
|
headers = response['headers']
|
|
|
|
if username:
|
|
|
|
if username == data.get('UserName'):
|
|
|
|
return {'ret': True, 'data': data,
|
|
|
|
'headers': headers, 'uri': uri}
|
|
|
|
if acct_id:
|
|
|
|
if acct_id == data.get('Id'):
|
|
|
|
return {'ret': True, 'data': data,
|
|
|
|
'headers': headers, 'uri': uri}
|
|
|
|
|
|
|
|
return {'ret': False, 'no_match': True, 'msg':
|
|
|
|
'No account with the given account_id or account_username found'}
|
|
|
|
|
|
|
|
def _find_empty_account_slot(self):
|
|
|
|
response = self.get_request(self.root_uri + self.accounts_uri)
|
|
|
|
if response['ret'] is False:
|
|
|
|
return response
|
|
|
|
data = response['data']
|
|
|
|
|
|
|
|
uris = [a.get('@odata.id') for a in data.get('Members', []) if
|
|
|
|
a.get('@odata.id')]
|
|
|
|
if uris:
|
|
|
|
# first slot may be reserved, so move to end of list
|
|
|
|
uris += [uris.pop(0)]
|
|
|
|
for uri in uris:
|
|
|
|
response = self.get_request(self.root_uri + uri)
|
|
|
|
if response['ret'] is False:
|
|
|
|
continue
|
|
|
|
data = response['data']
|
|
|
|
headers = response['headers']
|
|
|
|
if data.get('UserName') == "" and not data.get('Enabled', True):
|
|
|
|
return {'ret': True, 'data': data,
|
|
|
|
'headers': headers, 'uri': uri}
|
|
|
|
|
|
|
|
return {'ret': False, 'no_match': True, 'msg':
|
|
|
|
'No empty account slot found'}
|
|
|
|
|
|
|
|
def list_users(self):
|
|
|
|
result = {}
|
|
|
|
# listing all users has always been slower than other operations, why?
|
|
|
|
user_list = []
|
|
|
|
users_results = []
|
|
|
|
# Get these entries, but does not fail if not found
|
|
|
|
properties = ['Id', 'Name', 'UserName', 'RoleId', 'Locked', 'Enabled']
|
|
|
|
|
|
|
|
response = self.get_request(self.root_uri + self.accounts_uri)
|
|
|
|
if response['ret'] is False:
|
|
|
|
return response
|
|
|
|
result['ret'] = True
|
|
|
|
data = response['data']
|
|
|
|
|
|
|
|
for users in data.get('Members', []):
|
|
|
|
user_list.append(users[u'@odata.id']) # user_list[] are URIs
|
|
|
|
|
|
|
|
# for each user, get details
|
|
|
|
for uri in user_list:
|
|
|
|
user = {}
|
|
|
|
response = self.get_request(self.root_uri + uri)
|
|
|
|
if response['ret'] is False:
|
|
|
|
return response
|
|
|
|
data = response['data']
|
|
|
|
|
|
|
|
for property in properties:
|
|
|
|
if property in data:
|
|
|
|
user[property] = data[property]
|
|
|
|
|
|
|
|
users_results.append(user)
|
|
|
|
result["entries"] = users_results
|
|
|
|
return result
|
|
|
|
|
|
|
|
def add_user_via_patch(self, user):
|
|
|
|
if user.get('account_id'):
|
|
|
|
# If Id slot specified, use it
|
|
|
|
response = self._find_account_uri(acct_id=user.get('account_id'))
|
|
|
|
else:
|
|
|
|
# Otherwise find first empty slot
|
|
|
|
response = self._find_empty_account_slot()
|
|
|
|
|
|
|
|
if not response['ret']:
|
|
|
|
return response
|
|
|
|
uri = response['uri']
|
|
|
|
payload = {}
|
|
|
|
if user.get('account_username'):
|
|
|
|
payload['UserName'] = user.get('account_username')
|
|
|
|
if user.get('account_password'):
|
|
|
|
payload['Password'] = user.get('account_password')
|
|
|
|
if user.get('account_roleid'):
|
|
|
|
payload['RoleId'] = user.get('account_roleid')
|
|
|
|
response = self.patch_request(self.root_uri + uri, payload)
|
|
|
|
if response['ret'] is False:
|
|
|
|
return response
|
|
|
|
return {'ret': True}
|
|
|
|
|
|
|
|
def add_user(self, user):
|
|
|
|
if not user.get('account_username'):
|
|
|
|
return {'ret': False, 'msg':
|
|
|
|
'Must provide account_username for AddUser command'}
|
|
|
|
|
|
|
|
response = self._find_account_uri(username=user.get('account_username'))
|
|
|
|
if response['ret']:
|
|
|
|
# account_username already exists, nothing to do
|
|
|
|
return {'ret': True, 'changed': False}
|
|
|
|
|
|
|
|
response = self.get_request(self.root_uri + self.accounts_uri)
|
|
|
|
if not response['ret']:
|
|
|
|
return response
|
|
|
|
headers = response['headers']
|
|
|
|
|
|
|
|
if 'allow' in headers:
|
|
|
|
methods = [m.strip() for m in headers.get('allow').split(',')]
|
|
|
|
if 'POST' not in methods:
|
|
|
|
# if Allow header present and POST not listed, add via PATCH
|
|
|
|
return self.add_user_via_patch(user)
|
|
|
|
|
|
|
|
payload = {}
|
|
|
|
if user.get('account_username'):
|
|
|
|
payload['UserName'] = user.get('account_username')
|
|
|
|
if user.get('account_password'):
|
|
|
|
payload['Password'] = user.get('account_password')
|
|
|
|
if user.get('account_roleid'):
|
|
|
|
payload['RoleId'] = user.get('account_roleid')
|
|
|
|
|
|
|
|
response = self.post_request(self.root_uri + self.accounts_uri, payload)
|
|
|
|
if not response['ret']:
|
|
|
|
if response.get('status') == 405:
|
|
|
|
# if POST returned a 405, try to add via PATCH
|
|
|
|
return self.add_user_via_patch(user)
|
|
|
|
else:
|
|
|
|
return response
|
|
|
|
return {'ret': True}
|
|
|
|
|
|
|
|
def enable_user(self, user):
|
|
|
|
response = self._find_account_uri(username=user.get('account_username'),
|
|
|
|
acct_id=user.get('account_id'))
|
|
|
|
if not response['ret']:
|
|
|
|
return response
|
|
|
|
uri = response['uri']
|
|
|
|
data = response['data']
|
|
|
|
|
|
|
|
if data.get('Enabled', True):
|
|
|
|
# account already enabled, nothing to do
|
|
|
|
return {'ret': True, 'changed': False}
|
|
|
|
|
|
|
|
payload = {'Enabled': True}
|
|
|
|
response = self.patch_request(self.root_uri + uri, payload)
|
|
|
|
if response['ret'] is False:
|
|
|
|
return response
|
|
|
|
return {'ret': True}
|
|
|
|
|
|
|
|
def delete_user_via_patch(self, user, uri=None, data=None):
|
|
|
|
if not uri:
|
|
|
|
response = self._find_account_uri(username=user.get('account_username'),
|
|
|
|
acct_id=user.get('account_id'))
|
|
|
|
if not response['ret']:
|
|
|
|
return response
|
|
|
|
uri = response['uri']
|
|
|
|
data = response['data']
|
|
|
|
|
|
|
|
if data and data.get('UserName') == '' and not data.get('Enabled', False):
|
|
|
|
# account UserName already cleared, nothing to do
|
|
|
|
return {'ret': True, 'changed': False}
|
|
|
|
|
|
|
|
payload = {'UserName': ''}
|
|
|
|
if data.get('Enabled', False):
|
|
|
|
payload['Enabled'] = False
|
|
|
|
response = self.patch_request(self.root_uri + uri, payload)
|
|
|
|
if response['ret'] is False:
|
|
|
|
return response
|
|
|
|
return {'ret': True}
|
|
|
|
|
|
|
|
def delete_user(self, user):
|
|
|
|
response = self._find_account_uri(username=user.get('account_username'),
|
|
|
|
acct_id=user.get('account_id'))
|
|
|
|
if not response['ret']:
|
|
|
|
if response.get('no_match'):
|
|
|
|
# account does not exist, nothing to do
|
|
|
|
return {'ret': True, 'changed': False}
|
|
|
|
else:
|
|
|
|
# some error encountered
|
|
|
|
return response
|
|
|
|
|
|
|
|
uri = response['uri']
|
|
|
|
headers = response['headers']
|
|
|
|
data = response['data']
|
|
|
|
|
|
|
|
if 'allow' in headers:
|
|
|
|
methods = [m.strip() for m in headers.get('allow').split(',')]
|
|
|
|
if 'DELETE' not in methods:
|
|
|
|
# if Allow header present and DELETE not listed, del via PATCH
|
|
|
|
return self.delete_user_via_patch(user, uri=uri, data=data)
|
|
|
|
|
|
|
|
response = self.delete_request(self.root_uri + uri)
|
|
|
|
if not response['ret']:
|
|
|
|
if response.get('status') == 405:
|
|
|
|
# if DELETE returned a 405, try to delete via PATCH
|
|
|
|
return self.delete_user_via_patch(user, uri=uri, data=data)
|
|
|
|
else:
|
|
|
|
return response
|
|
|
|
return {'ret': True}
|
|
|
|
|
|
|
|
def disable_user(self, user):
|
|
|
|
response = self._find_account_uri(username=user.get('account_username'),
|
|
|
|
acct_id=user.get('account_id'))
|
|
|
|
if not response['ret']:
|
|
|
|
return response
|
|
|
|
uri = response['uri']
|
|
|
|
data = response['data']
|
|
|
|
|
|
|
|
if not data.get('Enabled'):
|
|
|
|
# account already disabled, nothing to do
|
|
|
|
return {'ret': True, 'changed': False}
|
|
|
|
|
|
|
|
payload = {'Enabled': False}
|
|
|
|
response = self.patch_request(self.root_uri + uri, payload)
|
|
|
|
if response['ret'] is False:
|
|
|
|
return response
|
|
|
|
return {'ret': True}
|
|
|
|
|
|
|
|
def update_user_role(self, user):
|
|
|
|
if not user.get('account_roleid'):
|
|
|
|
return {'ret': False, 'msg':
|
|
|
|
'Must provide account_roleid for UpdateUserRole command'}
|
|
|
|
|
|
|
|
response = self._find_account_uri(username=user.get('account_username'),
|
|
|
|
acct_id=user.get('account_id'))
|
|
|
|
if not response['ret']:
|
|
|
|
return response
|
|
|
|
uri = response['uri']
|
|
|
|
data = response['data']
|
|
|
|
|
|
|
|
if data.get('RoleId') == user.get('account_roleid'):
|
|
|
|
# account already has RoleId , nothing to do
|
|
|
|
return {'ret': True, 'changed': False}
|
|
|
|
|
|
|
|
payload = {'RoleId': user.get('account_roleid')}
|
|
|
|
response = self.patch_request(self.root_uri + uri, payload)
|
|
|
|
if response['ret'] is False:
|
|
|
|
return response
|
|
|
|
return {'ret': True}
|
|
|
|
|
|
|
|
def update_user_password(self, user):
|
|
|
|
response = self._find_account_uri(username=user.get('account_username'),
|
|
|
|
acct_id=user.get('account_id'))
|
|
|
|
if not response['ret']:
|
|
|
|
return response
|
|
|
|
uri = response['uri']
|
|
|
|
payload = {'Password': user['account_password']}
|
|
|
|
response = self.patch_request(self.root_uri + uri, payload)
|
|
|
|
if response['ret'] is False:
|
|
|
|
return response
|
|
|
|
return {'ret': True}
|
|
|
|
|
|
|
|
def update_user_name(self, user):
|
|
|
|
if not user.get('account_updatename'):
|
|
|
|
return {'ret': False, 'msg':
|
|
|
|
'Must provide account_updatename for UpdateUserName command'}
|
|
|
|
|
|
|
|
response = self._find_account_uri(username=user.get('account_username'),
|
|
|
|
acct_id=user.get('account_id'))
|
|
|
|
if not response['ret']:
|
|
|
|
return response
|
|
|
|
uri = response['uri']
|
|
|
|
payload = {'UserName': user['account_updatename']}
|
|
|
|
response = self.patch_request(self.root_uri + uri, payload)
|
|
|
|
if response['ret'] is False:
|
|
|
|
return response
|
|
|
|
return {'ret': True}
|
|
|
|
|
|
|
|
def update_accountservice_properties(self, user):
|
|
|
|
if user.get('account_properties') is None:
|
|
|
|
return {'ret': False, 'msg':
|
|
|
|
'Must provide account_properties for UpdateAccountServiceProperties command'}
|
|
|
|
account_properties = user.get('account_properties')
|
|
|
|
|
|
|
|
# Find AccountService
|
|
|
|
response = self.get_request(self.root_uri + self.service_root)
|
|
|
|
if response['ret'] is False:
|
|
|
|
return response
|
|
|
|
data = response['data']
|
|
|
|
if 'AccountService' not in data:
|
|
|
|
return {'ret': False, 'msg': "AccountService resource not found"}
|
|
|
|
accountservice_uri = data["AccountService"]["@odata.id"]
|
|
|
|
|
|
|
|
# Check support or not
|
|
|
|
response = self.get_request(self.root_uri + accountservice_uri)
|
|
|
|
if response['ret'] is False:
|
|
|
|
return response
|
|
|
|
data = response['data']
|
|
|
|
for property_name in account_properties.keys():
|
|
|
|
if property_name not in data:
|
|
|
|
return {'ret': False, 'msg':
|
|
|
|
'property %s not supported' % property_name}
|
|
|
|
|
|
|
|
# if properties is already matched, nothing to do
|
|
|
|
need_change = False
|
|
|
|
for property_name in account_properties.keys():
|
|
|
|
if account_properties[property_name] != data[property_name]:
|
|
|
|
need_change = True
|
|
|
|
break
|
|
|
|
|
|
|
|
if not need_change:
|
|
|
|
return {'ret': True, 'changed': False, 'msg': "AccountService properties already set"}
|
|
|
|
|
|
|
|
payload = account_properties
|
|
|
|
response = self.patch_request(self.root_uri + accountservice_uri, payload)
|
|
|
|
if response['ret'] is False:
|
|
|
|
return response
|
|
|
|
return {'ret': True, 'changed': True, 'msg': "Modified AccountService properties"}
|
|
|
|
|
|
|
|
def get_sessions(self):
|
|
|
|
result = {}
|
|
|
|
# listing all users has always been slower than other operations, why?
|
|
|
|
session_list = []
|
|
|
|
sessions_results = []
|
|
|
|
# Get these entries, but does not fail if not found
|
|
|
|
properties = ['Description', 'Id', 'Name', 'UserName']
|
|
|
|
|
|
|
|
response = self.get_request(self.root_uri + self.sessions_uri)
|
|
|
|
if response['ret'] is False:
|
|
|
|
return response
|
|
|
|
result['ret'] = True
|
|
|
|
data = response['data']
|
|
|
|
|
|
|
|
for sessions in data[u'Members']:
|
|
|
|
session_list.append(sessions[u'@odata.id']) # session_list[] are URIs
|
|
|
|
|
|
|
|
# for each session, get details
|
|
|
|
for uri in session_list:
|
|
|
|
session = {}
|
|
|
|
response = self.get_request(self.root_uri + uri)
|
|
|
|
if response['ret'] is False:
|
|
|
|
return response
|
|
|
|
data = response['data']
|
|
|
|
|
|
|
|
for property in properties:
|
|
|
|
if property in data:
|
|
|
|
session[property] = data[property]
|
|
|
|
|
|
|
|
sessions_results.append(session)
|
|
|
|
result["entries"] = sessions_results
|
|
|
|
return result
|
|
|
|
|
|
|
|
def clear_sessions(self):
|
|
|
|
response = self.get_request(self.root_uri + self.sessions_uri)
|
|
|
|
if response['ret'] is False:
|
|
|
|
return response
|
|
|
|
data = response['data']
|
|
|
|
|
|
|
|
# if no active sessions, return as success
|
|
|
|
if data['Members@odata.count'] == 0:
|
|
|
|
return {'ret': True, 'changed': False, 'msg': "There is no active sessions"}
|
|
|
|
|
|
|
|
# loop to delete every active session
|
|
|
|
for session in data[u'Members']:
|
|
|
|
response = self.delete_request(self.root_uri + session[u'@odata.id'])
|
|
|
|
if response['ret'] is False:
|
|
|
|
return response
|
|
|
|
|
|
|
|
return {'ret': True, 'changed': True, 'msg': "Clear all sessions successfully"}
|
|
|
|
|
2021-03-19 21:14:33 +01:00
|
|
|
def create_session(self):
|
|
|
|
if not self.creds.get('user') or not self.creds.get('pswd'):
|
|
|
|
return {'ret': False, 'msg':
|
|
|
|
'Must provide the username and password parameters for '
|
|
|
|
'the CreateSession command'}
|
|
|
|
|
|
|
|
payload = {
|
|
|
|
'UserName': self.creds['user'],
|
|
|
|
'Password': self.creds['pswd']
|
|
|
|
}
|
|
|
|
response = self.post_request(self.root_uri + self.sessions_uri, payload)
|
|
|
|
if response['ret'] is False:
|
|
|
|
return response
|
|
|
|
|
|
|
|
headers = response['headers']
|
|
|
|
if 'x-auth-token' not in headers:
|
|
|
|
return {'ret': False, 'msg':
|
|
|
|
'The service did not return the X-Auth-Token header in '
|
|
|
|
'the response from the Sessions collection POST'}
|
|
|
|
|
|
|
|
if 'location' not in headers:
|
|
|
|
self.module.warn(
|
|
|
|
'The service did not return the Location header for the '
|
|
|
|
'session URL in the response from the Sessions collection '
|
|
|
|
'POST')
|
|
|
|
session_uri = None
|
|
|
|
else:
|
|
|
|
session_uri = urlparse(headers.get('location')).path
|
|
|
|
|
|
|
|
session = dict()
|
|
|
|
session['token'] = headers.get('x-auth-token')
|
|
|
|
session['uri'] = session_uri
|
|
|
|
return {'ret': True, 'changed': True, 'session': session,
|
|
|
|
'msg': 'Session created successfully'}
|
|
|
|
|
|
|
|
def delete_session(self, session_uri):
|
|
|
|
if not session_uri:
|
|
|
|
return {'ret': False, 'msg':
|
|
|
|
'Must provide the session_uri parameter for the '
|
|
|
|
'DeleteSession command'}
|
|
|
|
|
|
|
|
response = self.delete_request(self.root_uri + session_uri)
|
|
|
|
if response['ret'] is False:
|
|
|
|
return response
|
|
|
|
|
|
|
|
return {'ret': True, 'changed': True,
|
|
|
|
'msg': 'Session deleted successfully'}
|
|
|
|
|
2020-03-09 10:11:07 +01:00
|
|
|
def get_firmware_update_capabilities(self):
|
|
|
|
result = {}
|
|
|
|
response = self.get_request(self.root_uri + self.update_uri)
|
|
|
|
if response['ret'] is False:
|
|
|
|
return response
|
|
|
|
|
|
|
|
result['ret'] = True
|
|
|
|
|
|
|
|
result['entries'] = {}
|
|
|
|
|
|
|
|
data = response['data']
|
|
|
|
|
|
|
|
if "Actions" in data:
|
|
|
|
actions = data['Actions']
|
|
|
|
if len(actions) > 0:
|
|
|
|
for key in actions.keys():
|
|
|
|
action = actions.get(key)
|
|
|
|
if 'title' in action:
|
|
|
|
title = action['title']
|
|
|
|
else:
|
|
|
|
title = key
|
|
|
|
result['entries'][title] = action.get('TransferProtocol@Redfish.AllowableValues',
|
|
|
|
["Key TransferProtocol@Redfish.AllowableValues not found"])
|
|
|
|
else:
|
|
|
|
return {'ret': "False", 'msg': "Actions list is empty."}
|
|
|
|
else:
|
|
|
|
return {'ret': "False", 'msg': "Key Actions not found."}
|
|
|
|
return result
|
|
|
|
|
|
|
|
def _software_inventory(self, uri):
|
|
|
|
result = {}
|
|
|
|
response = self.get_request(self.root_uri + uri)
|
|
|
|
if response['ret'] is False:
|
|
|
|
return response
|
|
|
|
result['ret'] = True
|
|
|
|
data = response['data']
|
|
|
|
|
|
|
|
result['entries'] = []
|
|
|
|
for member in data[u'Members']:
|
|
|
|
uri = self.root_uri + member[u'@odata.id']
|
|
|
|
# Get details for each software or firmware member
|
|
|
|
response = self.get_request(uri)
|
|
|
|
if response['ret'] is False:
|
|
|
|
return response
|
|
|
|
result['ret'] = True
|
|
|
|
data = response['data']
|
|
|
|
software = {}
|
|
|
|
# Get these standard properties if present
|
|
|
|
for key in ['Name', 'Id', 'Status', 'Version', 'Updateable',
|
|
|
|
'SoftwareId', 'LowestSupportedVersion', 'Manufacturer',
|
|
|
|
'ReleaseDate']:
|
|
|
|
if key in data:
|
|
|
|
software[key] = data.get(key)
|
|
|
|
result['entries'].append(software)
|
|
|
|
return result
|
|
|
|
|
|
|
|
def get_firmware_inventory(self):
|
|
|
|
if self.firmware_uri is None:
|
|
|
|
return {'ret': False, 'msg': 'No FirmwareInventory resource found'}
|
|
|
|
else:
|
|
|
|
return self._software_inventory(self.firmware_uri)
|
|
|
|
|
|
|
|
def get_software_inventory(self):
|
|
|
|
if self.software_uri is None:
|
|
|
|
return {'ret': False, 'msg': 'No SoftwareInventory resource found'}
|
|
|
|
else:
|
|
|
|
return self._software_inventory(self.software_uri)
|
|
|
|
|
|
|
|
def simple_update(self, update_opts):
|
|
|
|
image_uri = update_opts.get('update_image_uri')
|
|
|
|
protocol = update_opts.get('update_protocol')
|
|
|
|
targets = update_opts.get('update_targets')
|
|
|
|
creds = update_opts.get('update_creds')
|
|
|
|
|
|
|
|
if not image_uri:
|
|
|
|
return {'ret': False, 'msg':
|
|
|
|
'Must specify update_image_uri for the SimpleUpdate command'}
|
|
|
|
|
|
|
|
response = self.get_request(self.root_uri + self.update_uri)
|
|
|
|
if response['ret'] is False:
|
|
|
|
return response
|
|
|
|
data = response['data']
|
|
|
|
if 'Actions' not in data:
|
|
|
|
return {'ret': False, 'msg': 'Service does not support SimpleUpdate'}
|
|
|
|
if '#UpdateService.SimpleUpdate' not in data['Actions']:
|
|
|
|
return {'ret': False, 'msg': 'Service does not support SimpleUpdate'}
|
|
|
|
action = data['Actions']['#UpdateService.SimpleUpdate']
|
|
|
|
if 'target' not in action:
|
|
|
|
return {'ret': False, 'msg': 'Service does not support SimpleUpdate'}
|
|
|
|
update_uri = action['target']
|
|
|
|
if protocol:
|
|
|
|
default_values = ['CIFS', 'FTP', 'SFTP', 'HTTP', 'HTTPS', 'NSF',
|
|
|
|
'SCP', 'TFTP', 'OEM', 'NFS']
|
|
|
|
allowable_values = self._get_allowable_values(action,
|
|
|
|
'TransferProtocol',
|
|
|
|
default_values)
|
|
|
|
if protocol not in allowable_values:
|
|
|
|
return {'ret': False,
|
|
|
|
'msg': 'Specified update_protocol (%s) not supported '
|
|
|
|
'by service. Supported protocols: %s' %
|
|
|
|
(protocol, allowable_values)}
|
|
|
|
if targets:
|
|
|
|
allowable_values = self._get_allowable_values(action, 'Targets')
|
|
|
|
if allowable_values:
|
|
|
|
for target in targets:
|
|
|
|
if target not in allowable_values:
|
|
|
|
return {'ret': False,
|
|
|
|
'msg': 'Specified target (%s) not supported '
|
|
|
|
'by service. Supported targets: %s' %
|
|
|
|
(target, allowable_values)}
|
|
|
|
|
|
|
|
payload = {
|
|
|
|
'ImageURI': image_uri
|
|
|
|
}
|
|
|
|
if protocol:
|
|
|
|
payload["TransferProtocol"] = protocol
|
|
|
|
if targets:
|
|
|
|
payload["Targets"] = targets
|
|
|
|
if creds:
|
|
|
|
if creds.get('username'):
|
|
|
|
payload["Username"] = creds.get('username')
|
|
|
|
if creds.get('password'):
|
|
|
|
payload["Password"] = creds.get('password')
|
|
|
|
response = self.post_request(self.root_uri + update_uri, payload)
|
|
|
|
if response['ret'] is False:
|
|
|
|
return response
|
|
|
|
return {'ret': True, 'changed': True,
|
|
|
|
'msg': "SimpleUpdate requested"}
|
|
|
|
|
|
|
|
def get_bios_attributes(self, systems_uri):
|
|
|
|
result = {}
|
|
|
|
bios_attributes = {}
|
|
|
|
key = "Bios"
|
|
|
|
|
|
|
|
# Search for 'key' entry and extract URI from it
|
|
|
|
response = self.get_request(self.root_uri + systems_uri)
|
|
|
|
if response['ret'] is False:
|
|
|
|
return response
|
|
|
|
result['ret'] = True
|
|
|
|
data = response['data']
|
|
|
|
|
|
|
|
if key not in data:
|
|
|
|
return {'ret': False, 'msg': "Key %s not found" % key}
|
|
|
|
|
|
|
|
bios_uri = data[key]["@odata.id"]
|
|
|
|
|
|
|
|
response = self.get_request(self.root_uri + bios_uri)
|
|
|
|
if response['ret'] is False:
|
|
|
|
return response
|
|
|
|
result['ret'] = True
|
|
|
|
data = response['data']
|
|
|
|
for attribute in data[u'Attributes'].items():
|
|
|
|
bios_attributes[attribute[0]] = attribute[1]
|
|
|
|
result["entries"] = bios_attributes
|
|
|
|
return result
|
|
|
|
|
|
|
|
def get_multi_bios_attributes(self):
|
|
|
|
return self.aggregate_systems(self.get_bios_attributes)
|
|
|
|
|
|
|
|
def _get_boot_options_dict(self, boot):
|
|
|
|
# Get these entries from BootOption, if present
|
|
|
|
properties = ['DisplayName', 'BootOptionReference']
|
|
|
|
|
|
|
|
# Retrieve BootOptions if present
|
|
|
|
if 'BootOptions' in boot and '@odata.id' in boot['BootOptions']:
|
|
|
|
boot_options_uri = boot['BootOptions']["@odata.id"]
|
|
|
|
# Get BootOptions resource
|
|
|
|
response = self.get_request(self.root_uri + boot_options_uri)
|
|
|
|
if response['ret'] is False:
|
|
|
|
return {}
|
|
|
|
data = response['data']
|
|
|
|
|
|
|
|
# Retrieve Members array
|
|
|
|
if 'Members' not in data:
|
|
|
|
return {}
|
|
|
|
members = data['Members']
|
|
|
|
else:
|
|
|
|
members = []
|
|
|
|
|
|
|
|
# Build dict of BootOptions keyed by BootOptionReference
|
|
|
|
boot_options_dict = {}
|
|
|
|
for member in members:
|
|
|
|
if '@odata.id' not in member:
|
|
|
|
return {}
|
|
|
|
boot_option_uri = member['@odata.id']
|
|
|
|
response = self.get_request(self.root_uri + boot_option_uri)
|
|
|
|
if response['ret'] is False:
|
|
|
|
return {}
|
|
|
|
data = response['data']
|
|
|
|
if 'BootOptionReference' not in data:
|
|
|
|
return {}
|
|
|
|
boot_option_ref = data['BootOptionReference']
|
|
|
|
|
|
|
|
# fetch the props to display for this boot device
|
|
|
|
boot_props = {}
|
|
|
|
for prop in properties:
|
|
|
|
if prop in data:
|
|
|
|
boot_props[prop] = data[prop]
|
|
|
|
|
|
|
|
boot_options_dict[boot_option_ref] = boot_props
|
|
|
|
|
|
|
|
return boot_options_dict
|
|
|
|
|
|
|
|
def get_boot_order(self, systems_uri):
|
|
|
|
result = {}
|
|
|
|
|
|
|
|
# Retrieve System resource
|
|
|
|
response = self.get_request(self.root_uri + systems_uri)
|
|
|
|
if response['ret'] is False:
|
|
|
|
return response
|
|
|
|
result['ret'] = True
|
|
|
|
data = response['data']
|
|
|
|
|
|
|
|
# Confirm needed Boot properties are present
|
|
|
|
if 'Boot' not in data or 'BootOrder' not in data['Boot']:
|
|
|
|
return {'ret': False, 'msg': "Key BootOrder not found"}
|
|
|
|
|
|
|
|
boot = data['Boot']
|
|
|
|
boot_order = boot['BootOrder']
|
|
|
|
boot_options_dict = self._get_boot_options_dict(boot)
|
|
|
|
|
|
|
|
# Build boot device list
|
|
|
|
boot_device_list = []
|
|
|
|
for ref in boot_order:
|
|
|
|
boot_device_list.append(
|
|
|
|
boot_options_dict.get(ref, {'BootOptionReference': ref}))
|
|
|
|
|
|
|
|
result["entries"] = boot_device_list
|
|
|
|
return result
|
|
|
|
|
|
|
|
def get_multi_boot_order(self):
|
|
|
|
return self.aggregate_systems(self.get_boot_order)
|
|
|
|
|
|
|
|
def get_boot_override(self, systems_uri):
|
|
|
|
result = {}
|
|
|
|
|
|
|
|
properties = ["BootSourceOverrideEnabled", "BootSourceOverrideTarget",
|
|
|
|
"BootSourceOverrideMode", "UefiTargetBootSourceOverride", "BootSourceOverrideTarget@Redfish.AllowableValues"]
|
|
|
|
|
|
|
|
response = self.get_request(self.root_uri + systems_uri)
|
|
|
|
if response['ret'] is False:
|
|
|
|
return response
|
|
|
|
result['ret'] = True
|
|
|
|
data = response['data']
|
|
|
|
|
|
|
|
if 'Boot' not in data:
|
|
|
|
return {'ret': False, 'msg': "Key Boot not found"}
|
|
|
|
|
|
|
|
boot = data['Boot']
|
|
|
|
|
|
|
|
boot_overrides = {}
|
|
|
|
if "BootSourceOverrideEnabled" in boot:
|
|
|
|
if boot["BootSourceOverrideEnabled"] is not False:
|
|
|
|
for property in properties:
|
|
|
|
if property in boot:
|
|
|
|
if boot[property] is not None:
|
|
|
|
boot_overrides[property] = boot[property]
|
|
|
|
else:
|
|
|
|
return {'ret': False, 'msg': "No boot override is enabled."}
|
|
|
|
|
|
|
|
result['entries'] = boot_overrides
|
|
|
|
return result
|
|
|
|
|
|
|
|
def get_multi_boot_override(self):
|
|
|
|
return self.aggregate_systems(self.get_boot_override)
|
|
|
|
|
|
|
|
def set_bios_default_settings(self):
|
|
|
|
result = {}
|
|
|
|
key = "Bios"
|
|
|
|
|
|
|
|
# Search for 'key' entry and extract URI from it
|
|
|
|
response = self.get_request(self.root_uri + self.systems_uri)
|
|
|
|
if response['ret'] is False:
|
|
|
|
return response
|
|
|
|
result['ret'] = True
|
|
|
|
data = response['data']
|
|
|
|
|
|
|
|
if key not in data:
|
|
|
|
return {'ret': False, 'msg': "Key %s not found" % key}
|
|
|
|
|
|
|
|
bios_uri = data[key]["@odata.id"]
|
|
|
|
|
|
|
|
# Extract proper URI
|
|
|
|
response = self.get_request(self.root_uri + bios_uri)
|
|
|
|
if response['ret'] is False:
|
|
|
|
return response
|
|
|
|
result['ret'] = True
|
|
|
|
data = response['data']
|
|
|
|
reset_bios_settings_uri = data["Actions"]["#Bios.ResetBios"]["target"]
|
|
|
|
|
|
|
|
response = self.post_request(self.root_uri + reset_bios_settings_uri, {})
|
|
|
|
if response['ret'] is False:
|
|
|
|
return response
|
|
|
|
return {'ret': True, 'changed': True, 'msg': "Set BIOS to default settings"}
|
|
|
|
|
2020-09-10 17:25:48 +02:00
|
|
|
def set_boot_override(self, boot_opts):
|
2020-03-09 10:11:07 +01:00
|
|
|
result = {}
|
|
|
|
key = "Boot"
|
|
|
|
|
2020-09-10 17:25:48 +02:00
|
|
|
bootdevice = boot_opts.get('bootdevice')
|
|
|
|
uefi_target = boot_opts.get('uefi_target')
|
|
|
|
boot_next = boot_opts.get('boot_next')
|
|
|
|
override_enabled = boot_opts.get('override_enabled')
|
|
|
|
|
|
|
|
if not bootdevice and override_enabled != 'Disabled':
|
2020-03-09 10:11:07 +01:00
|
|
|
return {'ret': False,
|
2020-09-10 17:25:48 +02:00
|
|
|
'msg': "bootdevice option required for temporary boot override"}
|
2020-03-09 10:11:07 +01:00
|
|
|
|
|
|
|
# Search for 'key' entry and extract URI from it
|
|
|
|
response = self.get_request(self.root_uri + self.systems_uri)
|
|
|
|
if response['ret'] is False:
|
|
|
|
return response
|
|
|
|
result['ret'] = True
|
|
|
|
data = response['data']
|
|
|
|
|
|
|
|
if key not in data:
|
|
|
|
return {'ret': False, 'msg': "Key %s not found" % key}
|
|
|
|
|
|
|
|
boot = data[key]
|
|
|
|
|
2021-07-16 19:18:46 +02:00
|
|
|
if override_enabled != 'Disabled':
|
|
|
|
annotation = 'BootSourceOverrideTarget@Redfish.AllowableValues'
|
|
|
|
if annotation in boot:
|
|
|
|
allowable_values = boot[annotation]
|
|
|
|
if isinstance(allowable_values, list) and bootdevice not in allowable_values:
|
|
|
|
return {'ret': False,
|
|
|
|
'msg': "Boot device %s not in list of allowable values (%s)" %
|
|
|
|
(bootdevice, allowable_values)}
|
2020-03-09 10:11:07 +01:00
|
|
|
|
|
|
|
# read existing values
|
2020-09-10 17:25:48 +02:00
|
|
|
cur_enabled = boot.get('BootSourceOverrideEnabled')
|
2020-03-09 10:11:07 +01:00
|
|
|
target = boot.get('BootSourceOverrideTarget')
|
|
|
|
cur_uefi_target = boot.get('UefiTargetBootSourceOverride')
|
|
|
|
cur_boot_next = boot.get('BootNext')
|
|
|
|
|
2020-09-10 17:25:48 +02:00
|
|
|
if override_enabled == 'Disabled':
|
|
|
|
payload = {
|
|
|
|
'Boot': {
|
|
|
|
'BootSourceOverrideEnabled': override_enabled
|
|
|
|
}
|
|
|
|
}
|
|
|
|
elif bootdevice == 'UefiTarget':
|
2020-03-09 10:11:07 +01:00
|
|
|
if not uefi_target:
|
|
|
|
return {'ret': False,
|
|
|
|
'msg': "uefi_target option required to SetOneTimeBoot for UefiTarget"}
|
2020-09-10 17:25:48 +02:00
|
|
|
if override_enabled == cur_enabled and target == bootdevice and uefi_target == cur_uefi_target:
|
2020-03-09 10:11:07 +01:00
|
|
|
# If properties are already set, no changes needed
|
|
|
|
return {'ret': True, 'changed': False}
|
|
|
|
payload = {
|
|
|
|
'Boot': {
|
2020-09-10 17:25:48 +02:00
|
|
|
'BootSourceOverrideEnabled': override_enabled,
|
2020-03-09 10:11:07 +01:00
|
|
|
'BootSourceOverrideTarget': bootdevice,
|
|
|
|
'UefiTargetBootSourceOverride': uefi_target
|
|
|
|
}
|
|
|
|
}
|
|
|
|
elif bootdevice == 'UefiBootNext':
|
|
|
|
if not boot_next:
|
|
|
|
return {'ret': False,
|
|
|
|
'msg': "boot_next option required to SetOneTimeBoot for UefiBootNext"}
|
2020-09-10 17:25:48 +02:00
|
|
|
if cur_enabled == override_enabled and target == bootdevice and boot_next == cur_boot_next:
|
2020-03-09 10:11:07 +01:00
|
|
|
# If properties are already set, no changes needed
|
|
|
|
return {'ret': True, 'changed': False}
|
|
|
|
payload = {
|
|
|
|
'Boot': {
|
2020-09-10 17:25:48 +02:00
|
|
|
'BootSourceOverrideEnabled': override_enabled,
|
2020-03-09 10:11:07 +01:00
|
|
|
'BootSourceOverrideTarget': bootdevice,
|
|
|
|
'BootNext': boot_next
|
|
|
|
}
|
|
|
|
}
|
|
|
|
else:
|
2020-09-10 17:25:48 +02:00
|
|
|
if cur_enabled == override_enabled and target == bootdevice:
|
2020-03-09 10:11:07 +01:00
|
|
|
# If properties are already set, no changes needed
|
|
|
|
return {'ret': True, 'changed': False}
|
|
|
|
payload = {
|
|
|
|
'Boot': {
|
2020-09-10 17:25:48 +02:00
|
|
|
'BootSourceOverrideEnabled': override_enabled,
|
2020-03-09 10:11:07 +01:00
|
|
|
'BootSourceOverrideTarget': bootdevice
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
response = self.patch_request(self.root_uri + self.systems_uri, payload)
|
|
|
|
if response['ret'] is False:
|
|
|
|
return response
|
|
|
|
return {'ret': True, 'changed': True}
|
|
|
|
|
|
|
|
def set_bios_attributes(self, attributes):
|
|
|
|
result = {}
|
|
|
|
key = "Bios"
|
|
|
|
|
|
|
|
# Search for 'key' entry and extract URI from it
|
|
|
|
response = self.get_request(self.root_uri + self.systems_uri)
|
|
|
|
if response['ret'] is False:
|
|
|
|
return response
|
|
|
|
result['ret'] = True
|
|
|
|
data = response['data']
|
|
|
|
|
|
|
|
if key not in data:
|
|
|
|
return {'ret': False, 'msg': "Key %s not found" % key}
|
|
|
|
|
|
|
|
bios_uri = data[key]["@odata.id"]
|
|
|
|
|
|
|
|
# Extract proper URI
|
|
|
|
response = self.get_request(self.root_uri + bios_uri)
|
|
|
|
if response['ret'] is False:
|
|
|
|
return response
|
|
|
|
result['ret'] = True
|
|
|
|
data = response['data']
|
|
|
|
|
|
|
|
# Make a copy of the attributes dict
|
|
|
|
attrs_to_patch = dict(attributes)
|
2021-05-11 20:05:24 +02:00
|
|
|
# List to hold attributes not found
|
|
|
|
attrs_bad = {}
|
2020-03-09 10:11:07 +01:00
|
|
|
|
|
|
|
# Check the attributes
|
2021-05-11 20:05:24 +02:00
|
|
|
for attr_name, attr_value in attributes.items():
|
|
|
|
# Check if attribute exists
|
|
|
|
if attr_name not in data[u'Attributes']:
|
|
|
|
# Remove and proceed to next attribute if this isn't valid
|
|
|
|
attrs_bad.update({attr_name: attr_value})
|
|
|
|
del attrs_to_patch[attr_name]
|
|
|
|
continue
|
|
|
|
|
2020-03-09 10:11:07 +01:00
|
|
|
# If already set to requested value, remove it from PATCH payload
|
2021-05-11 20:05:24 +02:00
|
|
|
if data[u'Attributes'][attr_name] == attributes[attr_name]:
|
|
|
|
del attrs_to_patch[attr_name]
|
|
|
|
|
|
|
|
warning = ""
|
|
|
|
if attrs_bad:
|
|
|
|
warning = "Incorrect attributes %s" % (attrs_bad)
|
2020-03-09 10:11:07 +01:00
|
|
|
|
|
|
|
# Return success w/ changed=False if no attrs need to be changed
|
|
|
|
if not attrs_to_patch:
|
|
|
|
return {'ret': True, 'changed': False,
|
2021-05-11 20:05:24 +02:00
|
|
|
'msg': "BIOS attributes already set",
|
|
|
|
'warning': warning}
|
2020-03-09 10:11:07 +01:00
|
|
|
|
|
|
|
# Get the SettingsObject URI
|
|
|
|
set_bios_attr_uri = data["@Redfish.Settings"]["SettingsObject"]["@odata.id"]
|
|
|
|
|
|
|
|
# Construct payload and issue PATCH command
|
|
|
|
payload = {"Attributes": attrs_to_patch}
|
|
|
|
response = self.patch_request(self.root_uri + set_bios_attr_uri, payload)
|
|
|
|
if response['ret'] is False:
|
|
|
|
return response
|
2021-05-11 20:05:24 +02:00
|
|
|
return {'ret': True, 'changed': True,
|
|
|
|
'msg': "Modified BIOS attributes %s" % (attrs_to_patch),
|
|
|
|
'warning': warning}
|
2020-03-09 10:11:07 +01:00
|
|
|
|
|
|
|
def set_boot_order(self, boot_list):
|
|
|
|
if not boot_list:
|
|
|
|
return {'ret': False,
|
|
|
|
'msg': "boot_order list required for SetBootOrder command"}
|
|
|
|
|
|
|
|
systems_uri = self.systems_uri
|
|
|
|
response = self.get_request(self.root_uri + systems_uri)
|
|
|
|
if response['ret'] is False:
|
|
|
|
return response
|
|
|
|
data = response['data']
|
|
|
|
|
|
|
|
# Confirm needed Boot properties are present
|
|
|
|
if 'Boot' not in data or 'BootOrder' not in data['Boot']:
|
|
|
|
return {'ret': False, 'msg': "Key BootOrder not found"}
|
|
|
|
|
|
|
|
boot = data['Boot']
|
|
|
|
boot_order = boot['BootOrder']
|
|
|
|
boot_options_dict = self._get_boot_options_dict(boot)
|
|
|
|
|
|
|
|
# validate boot_list against BootOptionReferences if available
|
|
|
|
if boot_options_dict:
|
|
|
|
boot_option_references = boot_options_dict.keys()
|
|
|
|
for ref in boot_list:
|
|
|
|
if ref not in boot_option_references:
|
|
|
|
return {'ret': False,
|
|
|
|
'msg': "BootOptionReference %s not found in BootOptions" % ref}
|
|
|
|
|
|
|
|
# If requested BootOrder is already set, nothing to do
|
|
|
|
if boot_order == boot_list:
|
|
|
|
return {'ret': True, 'changed': False,
|
|
|
|
'msg': "BootOrder already set to %s" % boot_list}
|
|
|
|
|
|
|
|
payload = {
|
|
|
|
'Boot': {
|
|
|
|
'BootOrder': boot_list
|
|
|
|
}
|
|
|
|
}
|
|
|
|
response = self.patch_request(self.root_uri + systems_uri, payload)
|
|
|
|
if response['ret'] is False:
|
|
|
|
return response
|
|
|
|
return {'ret': True, 'changed': True, 'msg': "BootOrder set"}
|
|
|
|
|
|
|
|
def set_default_boot_order(self):
|
|
|
|
systems_uri = self.systems_uri
|
|
|
|
response = self.get_request(self.root_uri + systems_uri)
|
|
|
|
if response['ret'] is False:
|
|
|
|
return response
|
|
|
|
data = response['data']
|
|
|
|
|
|
|
|
# get the #ComputerSystem.SetDefaultBootOrder Action and target URI
|
|
|
|
action = '#ComputerSystem.SetDefaultBootOrder'
|
|
|
|
if 'Actions' not in data or action not in data['Actions']:
|
|
|
|
return {'ret': False, 'msg': 'Action %s not found' % action}
|
|
|
|
if 'target' not in data['Actions'][action]:
|
|
|
|
return {'ret': False,
|
|
|
|
'msg': 'target URI missing from Action %s' % action}
|
|
|
|
action_uri = data['Actions'][action]['target']
|
|
|
|
|
|
|
|
# POST to Action URI
|
|
|
|
payload = {}
|
|
|
|
response = self.post_request(self.root_uri + action_uri, payload)
|
|
|
|
if response['ret'] is False:
|
|
|
|
return response
|
|
|
|
return {'ret': True, 'changed': True,
|
|
|
|
'msg': "BootOrder set to default"}
|
|
|
|
|
|
|
|
def get_chassis_inventory(self):
|
|
|
|
result = {}
|
|
|
|
chassis_results = []
|
|
|
|
|
|
|
|
# Get these entries, but does not fail if not found
|
2021-01-29 07:17:57 +01:00
|
|
|
properties = ['Name', 'Id', 'ChassisType', 'PartNumber', 'AssetTag',
|
2020-03-09 10:11:07 +01:00
|
|
|
'Manufacturer', 'IndicatorLED', 'SerialNumber', 'Model']
|
|
|
|
|
|
|
|
# Go through list
|
|
|
|
for chassis_uri in self.chassis_uris:
|
|
|
|
response = self.get_request(self.root_uri + chassis_uri)
|
|
|
|
if response['ret'] is False:
|
|
|
|
return response
|
|
|
|
result['ret'] = True
|
|
|
|
data = response['data']
|
|
|
|
chassis_result = {}
|
|
|
|
for property in properties:
|
|
|
|
if property in data:
|
|
|
|
chassis_result[property] = data[property]
|
|
|
|
chassis_results.append(chassis_result)
|
|
|
|
|
|
|
|
result["entries"] = chassis_results
|
|
|
|
return result
|
|
|
|
|
|
|
|
def get_fan_inventory(self):
|
|
|
|
result = {}
|
|
|
|
fan_results = []
|
|
|
|
key = "Thermal"
|
|
|
|
# Get these entries, but does not fail if not found
|
2021-01-29 07:17:57 +01:00
|
|
|
properties = ['Name', 'FanName', 'Reading', 'ReadingUnits', 'Status']
|
2020-03-09 10:11:07 +01:00
|
|
|
|
|
|
|
# Go through list
|
|
|
|
for chassis_uri in self.chassis_uris:
|
|
|
|
response = self.get_request(self.root_uri + chassis_uri)
|
|
|
|
if response['ret'] is False:
|
|
|
|
return response
|
|
|
|
result['ret'] = True
|
|
|
|
data = response['data']
|
|
|
|
if key in data:
|
|
|
|
# match: found an entry for "Thermal" information = fans
|
|
|
|
thermal_uri = data[key]["@odata.id"]
|
|
|
|
response = self.get_request(self.root_uri + thermal_uri)
|
|
|
|
if response['ret'] is False:
|
|
|
|
return response
|
|
|
|
result['ret'] = True
|
|
|
|
data = response['data']
|
|
|
|
|
|
|
|
for device in data[u'Fans']:
|
|
|
|
fan = {}
|
|
|
|
for property in properties:
|
|
|
|
if property in device:
|
|
|
|
fan[property] = device[property]
|
|
|
|
fan_results.append(fan)
|
|
|
|
result["entries"] = fan_results
|
|
|
|
return result
|
|
|
|
|
|
|
|
def get_chassis_power(self):
|
|
|
|
result = {}
|
|
|
|
key = "Power"
|
|
|
|
|
|
|
|
# Get these entries, but does not fail if not found
|
|
|
|
properties = ['Name', 'PowerAllocatedWatts',
|
|
|
|
'PowerAvailableWatts', 'PowerCapacityWatts',
|
|
|
|
'PowerConsumedWatts', 'PowerMetrics',
|
|
|
|
'PowerRequestedWatts', 'RelatedItem', 'Status']
|
|
|
|
|
|
|
|
chassis_power_results = []
|
|
|
|
# Go through list
|
|
|
|
for chassis_uri in self.chassis_uris:
|
|
|
|
chassis_power_result = {}
|
|
|
|
response = self.get_request(self.root_uri + chassis_uri)
|
|
|
|
if response['ret'] is False:
|
|
|
|
return response
|
|
|
|
result['ret'] = True
|
|
|
|
data = response['data']
|
|
|
|
if key in data:
|
|
|
|
response = self.get_request(self.root_uri + data[key]['@odata.id'])
|
|
|
|
data = response['data']
|
|
|
|
if 'PowerControl' in data:
|
|
|
|
if len(data['PowerControl']) > 0:
|
|
|
|
data = data['PowerControl'][0]
|
|
|
|
for property in properties:
|
|
|
|
if property in data:
|
|
|
|
chassis_power_result[property] = data[property]
|
|
|
|
else:
|
|
|
|
return {'ret': False, 'msg': 'Key PowerControl not found.'}
|
|
|
|
chassis_power_results.append(chassis_power_result)
|
|
|
|
else:
|
|
|
|
return {'ret': False, 'msg': 'Key Power not found.'}
|
|
|
|
|
|
|
|
result['entries'] = chassis_power_results
|
|
|
|
return result
|
|
|
|
|
|
|
|
def get_chassis_thermals(self):
|
|
|
|
result = {}
|
|
|
|
sensors = []
|
|
|
|
key = "Thermal"
|
|
|
|
|
|
|
|
# Get these entries, but does not fail if not found
|
|
|
|
properties = ['Name', 'PhysicalContext', 'UpperThresholdCritical',
|
|
|
|
'UpperThresholdFatal', 'UpperThresholdNonCritical',
|
|
|
|
'LowerThresholdCritical', 'LowerThresholdFatal',
|
|
|
|
'LowerThresholdNonCritical', 'MaxReadingRangeTemp',
|
|
|
|
'MinReadingRangeTemp', 'ReadingCelsius', 'RelatedItem',
|
|
|
|
'SensorNumber']
|
|
|
|
|
|
|
|
# Go through list
|
|
|
|
for chassis_uri in self.chassis_uris:
|
|
|
|
response = self.get_request(self.root_uri + chassis_uri)
|
|
|
|
if response['ret'] is False:
|
|
|
|
return response
|
|
|
|
result['ret'] = True
|
|
|
|
data = response['data']
|
|
|
|
if key in data:
|
|
|
|
thermal_uri = data[key]["@odata.id"]
|
|
|
|
response = self.get_request(self.root_uri + thermal_uri)
|
|
|
|
if response['ret'] is False:
|
|
|
|
return response
|
|
|
|
result['ret'] = True
|
|
|
|
data = response['data']
|
|
|
|
if "Temperatures" in data:
|
|
|
|
for sensor in data[u'Temperatures']:
|
|
|
|
sensor_result = {}
|
|
|
|
for property in properties:
|
|
|
|
if property in sensor:
|
|
|
|
if sensor[property] is not None:
|
|
|
|
sensor_result[property] = sensor[property]
|
|
|
|
sensors.append(sensor_result)
|
|
|
|
|
|
|
|
if sensors is None:
|
|
|
|
return {'ret': False, 'msg': 'Key Temperatures was not found.'}
|
|
|
|
|
|
|
|
result['entries'] = sensors
|
|
|
|
return result
|
|
|
|
|
|
|
|
def get_cpu_inventory(self, systems_uri):
|
|
|
|
result = {}
|
|
|
|
cpu_list = []
|
|
|
|
cpu_results = []
|
|
|
|
key = "Processors"
|
|
|
|
# Get these entries, but does not fail if not found
|
2021-01-29 07:17:57 +01:00
|
|
|
properties = ['Id', 'Name', 'Manufacturer', 'Model', 'MaxSpeedMHz',
|
|
|
|
'TotalCores', 'TotalThreads', 'Status']
|
2020-03-09 10:11:07 +01:00
|
|
|
|
|
|
|
# Search for 'key' entry and extract URI from it
|
|
|
|
response = self.get_request(self.root_uri + systems_uri)
|
|
|
|
if response['ret'] is False:
|
|
|
|
return response
|
|
|
|
result['ret'] = True
|
|
|
|
data = response['data']
|
|
|
|
|
|
|
|
if key not in data:
|
|
|
|
return {'ret': False, 'msg': "Key %s not found" % key}
|
|
|
|
|
|
|
|
processors_uri = data[key]["@odata.id"]
|
|
|
|
|
|
|
|
# Get a list of all CPUs and build respective URIs
|
|
|
|
response = self.get_request(self.root_uri + processors_uri)
|
|
|
|
if response['ret'] is False:
|
|
|
|
return response
|
|
|
|
result['ret'] = True
|
|
|
|
data = response['data']
|
|
|
|
|
|
|
|
for cpu in data[u'Members']:
|
|
|
|
cpu_list.append(cpu[u'@odata.id'])
|
|
|
|
|
|
|
|
for c in cpu_list:
|
|
|
|
cpu = {}
|
|
|
|
uri = self.root_uri + c
|
|
|
|
response = self.get_request(uri)
|
|
|
|
if response['ret'] is False:
|
|
|
|
return response
|
|
|
|
data = response['data']
|
|
|
|
|
|
|
|
for property in properties:
|
|
|
|
if property in data:
|
|
|
|
cpu[property] = data[property]
|
|
|
|
|
|
|
|
cpu_results.append(cpu)
|
|
|
|
result["entries"] = cpu_results
|
|
|
|
return result
|
|
|
|
|
|
|
|
def get_multi_cpu_inventory(self):
|
|
|
|
return self.aggregate_systems(self.get_cpu_inventory)
|
|
|
|
|
|
|
|
def get_memory_inventory(self, systems_uri):
|
|
|
|
result = {}
|
|
|
|
memory_list = []
|
|
|
|
memory_results = []
|
|
|
|
key = "Memory"
|
|
|
|
# Get these entries, but does not fail if not found
|
2021-01-29 07:17:57 +01:00
|
|
|
properties = ['Id', 'SerialNumber', 'MemoryDeviceType', 'PartNumber',
|
2020-03-09 10:11:07 +01:00
|
|
|
'MemoryLocation', 'RankCount', 'CapacityMiB', 'OperatingMemoryModes', 'Status', 'Manufacturer', 'Name']
|
|
|
|
|
|
|
|
# Search for 'key' entry and extract URI from it
|
|
|
|
response = self.get_request(self.root_uri + systems_uri)
|
|
|
|
if response['ret'] is False:
|
|
|
|
return response
|
|
|
|
result['ret'] = True
|
|
|
|
data = response['data']
|
|
|
|
|
|
|
|
if key not in data:
|
|
|
|
return {'ret': False, 'msg': "Key %s not found" % key}
|
|
|
|
|
|
|
|
memory_uri = data[key]["@odata.id"]
|
|
|
|
|
|
|
|
# Get a list of all DIMMs and build respective URIs
|
|
|
|
response = self.get_request(self.root_uri + memory_uri)
|
|
|
|
if response['ret'] is False:
|
|
|
|
return response
|
|
|
|
result['ret'] = True
|
|
|
|
data = response['data']
|
|
|
|
|
|
|
|
for dimm in data[u'Members']:
|
|
|
|
memory_list.append(dimm[u'@odata.id'])
|
|
|
|
|
|
|
|
for m in memory_list:
|
|
|
|
dimm = {}
|
|
|
|
uri = self.root_uri + m
|
|
|
|
response = self.get_request(uri)
|
|
|
|
if response['ret'] is False:
|
|
|
|
return response
|
|
|
|
data = response['data']
|
|
|
|
|
|
|
|
if "Status" in data:
|
|
|
|
if "State" in data["Status"]:
|
|
|
|
if data["Status"]["State"] == "Absent":
|
|
|
|
continue
|
|
|
|
else:
|
|
|
|
continue
|
|
|
|
|
|
|
|
for property in properties:
|
|
|
|
if property in data:
|
|
|
|
dimm[property] = data[property]
|
|
|
|
|
|
|
|
memory_results.append(dimm)
|
|
|
|
result["entries"] = memory_results
|
|
|
|
return result
|
|
|
|
|
|
|
|
def get_multi_memory_inventory(self):
|
|
|
|
return self.aggregate_systems(self.get_memory_inventory)
|
|
|
|
|
|
|
|
def get_nic_inventory(self, resource_uri):
|
|
|
|
result = {}
|
|
|
|
nic_list = []
|
|
|
|
nic_results = []
|
|
|
|
key = "EthernetInterfaces"
|
|
|
|
# Get these entries, but does not fail if not found
|
2021-01-29 07:17:57 +01:00
|
|
|
properties = ['Name', 'Id', 'Description', 'FQDN', 'IPv4Addresses', 'IPv6Addresses',
|
2020-03-09 10:11:07 +01:00
|
|
|
'NameServers', 'MACAddress', 'PermanentMACAddress',
|
|
|
|
'SpeedMbps', 'MTUSize', 'AutoNeg', 'Status']
|
|
|
|
|
|
|
|
response = self.get_request(self.root_uri + resource_uri)
|
|
|
|
if response['ret'] is False:
|
|
|
|
return response
|
|
|
|
result['ret'] = True
|
|
|
|
data = response['data']
|
|
|
|
|
|
|
|
if key not in data:
|
|
|
|
return {'ret': False, 'msg': "Key %s not found" % key}
|
|
|
|
|
|
|
|
ethernetinterfaces_uri = data[key]["@odata.id"]
|
|
|
|
|
|
|
|
# Get a list of all network controllers and build respective URIs
|
|
|
|
response = self.get_request(self.root_uri + ethernetinterfaces_uri)
|
|
|
|
if response['ret'] is False:
|
|
|
|
return response
|
|
|
|
result['ret'] = True
|
|
|
|
data = response['data']
|
|
|
|
|
|
|
|
for nic in data[u'Members']:
|
|
|
|
nic_list.append(nic[u'@odata.id'])
|
|
|
|
|
|
|
|
for n in nic_list:
|
|
|
|
nic = {}
|
|
|
|
uri = self.root_uri + n
|
|
|
|
response = self.get_request(uri)
|
|
|
|
if response['ret'] is False:
|
|
|
|
return response
|
|
|
|
data = response['data']
|
|
|
|
|
|
|
|
for property in properties:
|
|
|
|
if property in data:
|
|
|
|
nic[property] = data[property]
|
|
|
|
|
|
|
|
nic_results.append(nic)
|
|
|
|
result["entries"] = nic_results
|
|
|
|
return result
|
|
|
|
|
|
|
|
def get_multi_nic_inventory(self, resource_type):
|
|
|
|
ret = True
|
|
|
|
entries = []
|
|
|
|
|
|
|
|
# Given resource_type, use the proper URI
|
|
|
|
if resource_type == 'Systems':
|
|
|
|
resource_uris = self.systems_uris
|
|
|
|
elif resource_type == 'Manager':
|
|
|
|
resource_uris = self.manager_uris
|
|
|
|
|
|
|
|
for resource_uri in resource_uris:
|
|
|
|
inventory = self.get_nic_inventory(resource_uri)
|
|
|
|
ret = inventory.pop('ret') and ret
|
|
|
|
if 'entries' in inventory:
|
|
|
|
entries.append(({'resource_uri': resource_uri},
|
|
|
|
inventory['entries']))
|
|
|
|
return dict(ret=ret, entries=entries)
|
|
|
|
|
|
|
|
def get_virtualmedia(self, resource_uri):
|
|
|
|
result = {}
|
|
|
|
virtualmedia_list = []
|
|
|
|
virtualmedia_results = []
|
|
|
|
key = "VirtualMedia"
|
|
|
|
# Get these entries, but does not fail if not found
|
|
|
|
properties = ['Description', 'ConnectedVia', 'Id', 'MediaTypes',
|
|
|
|
'Image', 'ImageName', 'Name', 'WriteProtected',
|
|
|
|
'TransferMethod', 'TransferProtocolType']
|
|
|
|
|
|
|
|
response = self.get_request(self.root_uri + resource_uri)
|
|
|
|
if response['ret'] is False:
|
|
|
|
return response
|
|
|
|
result['ret'] = True
|
|
|
|
data = response['data']
|
|
|
|
|
|
|
|
if key not in data:
|
|
|
|
return {'ret': False, 'msg': "Key %s not found" % key}
|
|
|
|
|
|
|
|
virtualmedia_uri = data[key]["@odata.id"]
|
|
|
|
|
|
|
|
# Get a list of all virtual media and build respective URIs
|
|
|
|
response = self.get_request(self.root_uri + virtualmedia_uri)
|
|
|
|
if response['ret'] is False:
|
|
|
|
return response
|
|
|
|
result['ret'] = True
|
|
|
|
data = response['data']
|
|
|
|
|
|
|
|
for virtualmedia in data[u'Members']:
|
|
|
|
virtualmedia_list.append(virtualmedia[u'@odata.id'])
|
|
|
|
|
|
|
|
for n in virtualmedia_list:
|
|
|
|
virtualmedia = {}
|
|
|
|
uri = self.root_uri + n
|
|
|
|
response = self.get_request(uri)
|
|
|
|
if response['ret'] is False:
|
|
|
|
return response
|
|
|
|
data = response['data']
|
|
|
|
|
|
|
|
for property in properties:
|
|
|
|
if property in data:
|
|
|
|
virtualmedia[property] = data[property]
|
|
|
|
|
|
|
|
virtualmedia_results.append(virtualmedia)
|
|
|
|
result["entries"] = virtualmedia_results
|
|
|
|
return result
|
|
|
|
|
|
|
|
def get_multi_virtualmedia(self):
|
|
|
|
ret = True
|
|
|
|
entries = []
|
|
|
|
|
|
|
|
resource_uris = self.manager_uris
|
|
|
|
|
|
|
|
for resource_uri in resource_uris:
|
|
|
|
virtualmedia = self.get_virtualmedia(resource_uri)
|
|
|
|
ret = virtualmedia.pop('ret') and ret
|
|
|
|
if 'entries' in virtualmedia:
|
|
|
|
entries.append(({'resource_uri': resource_uri},
|
|
|
|
virtualmedia['entries']))
|
|
|
|
return dict(ret=ret, entries=entries)
|
|
|
|
|
2020-06-11 20:24:41 +02:00
|
|
|
@staticmethod
|
|
|
|
def _find_empty_virt_media_slot(resources, media_types,
|
|
|
|
media_match_strict=True):
|
|
|
|
for uri, data in resources.items():
|
|
|
|
# check MediaTypes
|
|
|
|
if 'MediaTypes' in data and media_types:
|
|
|
|
if not set(media_types).intersection(set(data['MediaTypes'])):
|
|
|
|
continue
|
|
|
|
else:
|
|
|
|
if media_match_strict:
|
|
|
|
continue
|
|
|
|
# if ejected, 'Inserted' should be False and 'ImageName' cleared
|
|
|
|
if (not data.get('Inserted', False) and
|
|
|
|
not data.get('ImageName')):
|
|
|
|
return uri, data
|
|
|
|
return None, None
|
|
|
|
|
|
|
|
@staticmethod
|
|
|
|
def _virt_media_image_inserted(resources, image_url):
|
|
|
|
for uri, data in resources.items():
|
|
|
|
if data.get('Image'):
|
|
|
|
if urlparse(image_url) == urlparse(data.get('Image')):
|
|
|
|
if data.get('Inserted', False) and data.get('ImageName'):
|
|
|
|
return True
|
|
|
|
return False
|
|
|
|
|
|
|
|
@staticmethod
|
|
|
|
def _find_virt_media_to_eject(resources, image_url):
|
|
|
|
matched_uri, matched_data = None, None
|
|
|
|
for uri, data in resources.items():
|
|
|
|
if data.get('Image'):
|
|
|
|
if urlparse(image_url) == urlparse(data.get('Image')):
|
|
|
|
matched_uri, matched_data = uri, data
|
|
|
|
if data.get('Inserted', True) and data.get('ImageName', 'x'):
|
|
|
|
return uri, data, True
|
|
|
|
return matched_uri, matched_data, False
|
|
|
|
|
|
|
|
def _read_virt_media_resources(self, uri_list):
|
|
|
|
resources = {}
|
|
|
|
headers = {}
|
|
|
|
for uri in uri_list:
|
|
|
|
response = self.get_request(self.root_uri + uri)
|
|
|
|
if response['ret'] is False:
|
|
|
|
continue
|
|
|
|
resources[uri] = response['data']
|
|
|
|
headers[uri] = response['headers']
|
|
|
|
return resources, headers
|
|
|
|
|
|
|
|
@staticmethod
|
|
|
|
def _insert_virt_media_payload(options, param_map, data, ai):
|
|
|
|
payload = {
|
|
|
|
'Image': options.get('image_url')
|
|
|
|
}
|
|
|
|
for param, option in param_map.items():
|
|
|
|
if options.get(option) is not None and param in data:
|
|
|
|
allowable = ai.get(param, {}).get('AllowableValues', [])
|
|
|
|
if allowable and options.get(option) not in allowable:
|
|
|
|
return {'ret': False,
|
|
|
|
'msg': "Value '%s' specified for option '%s' not "
|
|
|
|
"in list of AllowableValues %s" % (
|
|
|
|
options.get(option), option,
|
|
|
|
allowable)}
|
|
|
|
payload[param] = options.get(option)
|
|
|
|
return payload
|
|
|
|
|
|
|
|
def virtual_media_insert_via_patch(self, options, param_map, uri, data):
|
|
|
|
# get AllowableValues
|
|
|
|
ai = dict((k[:-24],
|
|
|
|
{'AllowableValues': v}) for k, v in data.items()
|
|
|
|
if k.endswith('@Redfish.AllowableValues'))
|
|
|
|
# construct payload
|
|
|
|
payload = self._insert_virt_media_payload(options, param_map, data, ai)
|
|
|
|
if 'Inserted' not in payload:
|
|
|
|
payload['Inserted'] = True
|
|
|
|
# PATCH the resource
|
|
|
|
response = self.patch_request(self.root_uri + uri, payload)
|
|
|
|
if response['ret'] is False:
|
|
|
|
return response
|
|
|
|
return {'ret': True, 'changed': True, 'msg': "VirtualMedia inserted"}
|
|
|
|
|
|
|
|
def virtual_media_insert(self, options):
|
|
|
|
param_map = {
|
|
|
|
'Inserted': 'inserted',
|
|
|
|
'WriteProtected': 'write_protected',
|
|
|
|
'UserName': 'username',
|
|
|
|
'Password': 'password',
|
|
|
|
'TransferProtocolType': 'transfer_protocol_type',
|
|
|
|
'TransferMethod': 'transfer_method'
|
|
|
|
}
|
|
|
|
image_url = options.get('image_url')
|
|
|
|
if not image_url:
|
|
|
|
return {'ret': False,
|
|
|
|
'msg': "image_url option required for VirtualMediaInsert"}
|
|
|
|
media_types = options.get('media_types')
|
|
|
|
|
|
|
|
# locate and read the VirtualMedia resources
|
|
|
|
response = self.get_request(self.root_uri + self.manager_uri)
|
|
|
|
if response['ret'] is False:
|
|
|
|
return response
|
|
|
|
data = response['data']
|
|
|
|
if 'VirtualMedia' not in data:
|
|
|
|
return {'ret': False, 'msg': "VirtualMedia resource not found"}
|
|
|
|
virt_media_uri = data["VirtualMedia"]["@odata.id"]
|
|
|
|
response = self.get_request(self.root_uri + virt_media_uri)
|
|
|
|
if response['ret'] is False:
|
|
|
|
return response
|
|
|
|
data = response['data']
|
|
|
|
virt_media_list = []
|
|
|
|
for member in data[u'Members']:
|
|
|
|
virt_media_list.append(member[u'@odata.id'])
|
|
|
|
resources, headers = self._read_virt_media_resources(virt_media_list)
|
|
|
|
|
|
|
|
# see if image already inserted; if so, nothing to do
|
|
|
|
if self._virt_media_image_inserted(resources, image_url):
|
|
|
|
return {'ret': True, 'changed': False,
|
|
|
|
'msg': "VirtualMedia '%s' already inserted" % image_url}
|
|
|
|
|
|
|
|
# find an empty slot to insert the media
|
|
|
|
# try first with strict media_type matching
|
|
|
|
uri, data = self._find_empty_virt_media_slot(
|
|
|
|
resources, media_types, media_match_strict=True)
|
|
|
|
if not uri:
|
|
|
|
# if not found, try without strict media_type matching
|
|
|
|
uri, data = self._find_empty_virt_media_slot(
|
|
|
|
resources, media_types, media_match_strict=False)
|
|
|
|
if not uri:
|
|
|
|
return {'ret': False,
|
|
|
|
'msg': "Unable to find an available VirtualMedia resource "
|
|
|
|
"%s" % ('supporting ' + str(media_types)
|
|
|
|
if media_types else '')}
|
|
|
|
|
|
|
|
# confirm InsertMedia action found
|
|
|
|
if ('Actions' not in data or
|
|
|
|
'#VirtualMedia.InsertMedia' not in data['Actions']):
|
|
|
|
# try to insert via PATCH if no InsertMedia action found
|
|
|
|
h = headers[uri]
|
|
|
|
if 'allow' in h:
|
|
|
|
methods = [m.strip() for m in h.get('allow').split(',')]
|
|
|
|
if 'PATCH' not in methods:
|
|
|
|
# if Allow header present and PATCH missing, return error
|
|
|
|
return {'ret': False,
|
|
|
|
'msg': "%s action not found and PATCH not allowed"
|
|
|
|
% '#VirtualMedia.InsertMedia'}
|
|
|
|
return self.virtual_media_insert_via_patch(options, param_map,
|
|
|
|
uri, data)
|
|
|
|
|
|
|
|
# get the action property
|
|
|
|
action = data['Actions']['#VirtualMedia.InsertMedia']
|
|
|
|
if 'target' not in action:
|
|
|
|
return {'ret': False,
|
|
|
|
'msg': "target URI missing from Action "
|
|
|
|
"#VirtualMedia.InsertMedia"}
|
|
|
|
action_uri = action['target']
|
|
|
|
# get ActionInfo or AllowableValues
|
|
|
|
ai = self._get_all_action_info_values(action)
|
|
|
|
# construct payload
|
|
|
|
payload = self._insert_virt_media_payload(options, param_map, data, ai)
|
|
|
|
# POST to action
|
|
|
|
response = self.post_request(self.root_uri + action_uri, payload)
|
|
|
|
if response['ret'] is False:
|
|
|
|
return response
|
|
|
|
return {'ret': True, 'changed': True, 'msg': "VirtualMedia inserted"}
|
|
|
|
|
|
|
|
def virtual_media_eject_via_patch(self, uri):
|
|
|
|
# construct payload
|
|
|
|
payload = {
|
|
|
|
'Inserted': False,
|
|
|
|
'Image': None
|
|
|
|
}
|
|
|
|
# PATCH resource
|
|
|
|
response = self.patch_request(self.root_uri + uri, payload)
|
|
|
|
if response['ret'] is False:
|
|
|
|
return response
|
|
|
|
return {'ret': True, 'changed': True,
|
|
|
|
'msg': "VirtualMedia ejected"}
|
|
|
|
|
|
|
|
def virtual_media_eject(self, options):
|
|
|
|
image_url = options.get('image_url')
|
|
|
|
if not image_url:
|
|
|
|
return {'ret': False,
|
|
|
|
'msg': "image_url option required for VirtualMediaEject"}
|
|
|
|
|
|
|
|
# locate and read the VirtualMedia resources
|
|
|
|
response = self.get_request(self.root_uri + self.manager_uri)
|
|
|
|
if response['ret'] is False:
|
|
|
|
return response
|
|
|
|
data = response['data']
|
|
|
|
if 'VirtualMedia' not in data:
|
|
|
|
return {'ret': False, 'msg': "VirtualMedia resource not found"}
|
|
|
|
virt_media_uri = data["VirtualMedia"]["@odata.id"]
|
|
|
|
response = self.get_request(self.root_uri + virt_media_uri)
|
|
|
|
if response['ret'] is False:
|
|
|
|
return response
|
|
|
|
data = response['data']
|
|
|
|
virt_media_list = []
|
|
|
|
for member in data[u'Members']:
|
|
|
|
virt_media_list.append(member[u'@odata.id'])
|
|
|
|
resources, headers = self._read_virt_media_resources(virt_media_list)
|
|
|
|
|
|
|
|
# find the VirtualMedia resource to eject
|
|
|
|
uri, data, eject = self._find_virt_media_to_eject(resources, image_url)
|
|
|
|
if uri and eject:
|
|
|
|
if ('Actions' not in data or
|
|
|
|
'#VirtualMedia.EjectMedia' not in data['Actions']):
|
|
|
|
# try to eject via PATCH if no EjectMedia action found
|
|
|
|
h = headers[uri]
|
|
|
|
if 'allow' in h:
|
|
|
|
methods = [m.strip() for m in h.get('allow').split(',')]
|
|
|
|
if 'PATCH' not in methods:
|
|
|
|
# if Allow header present and PATCH missing, return error
|
|
|
|
return {'ret': False,
|
|
|
|
'msg': "%s action not found and PATCH not allowed"
|
|
|
|
% '#VirtualMedia.EjectMedia'}
|
|
|
|
return self.virtual_media_eject_via_patch(uri)
|
|
|
|
else:
|
|
|
|
# POST to the EjectMedia Action
|
|
|
|
action = data['Actions']['#VirtualMedia.EjectMedia']
|
|
|
|
if 'target' not in action:
|
|
|
|
return {'ret': False,
|
|
|
|
'msg': "target URI property missing from Action "
|
|
|
|
"#VirtualMedia.EjectMedia"}
|
|
|
|
action_uri = action['target']
|
|
|
|
# empty payload for Eject action
|
|
|
|
payload = {}
|
|
|
|
# POST to action
|
|
|
|
response = self.post_request(self.root_uri + action_uri,
|
|
|
|
payload)
|
|
|
|
if response['ret'] is False:
|
|
|
|
return response
|
|
|
|
return {'ret': True, 'changed': True,
|
|
|
|
'msg': "VirtualMedia ejected"}
|
|
|
|
elif uri and not eject:
|
|
|
|
# already ejected: return success but changed=False
|
|
|
|
return {'ret': True, 'changed': False,
|
|
|
|
'msg': "VirtualMedia image '%s' already ejected" %
|
|
|
|
image_url}
|
|
|
|
else:
|
|
|
|
# return failure (no resources matching image_url found)
|
|
|
|
return {'ret': False, 'changed': False,
|
|
|
|
'msg': "No VirtualMedia resource found with image '%s' "
|
|
|
|
"inserted" % image_url}
|
|
|
|
|
2020-03-09 10:11:07 +01:00
|
|
|
def get_psu_inventory(self):
|
|
|
|
result = {}
|
|
|
|
psu_list = []
|
|
|
|
psu_results = []
|
|
|
|
key = "PowerSupplies"
|
|
|
|
# Get these entries, but does not fail if not found
|
|
|
|
properties = ['Name', 'Model', 'SerialNumber', 'PartNumber', 'Manufacturer',
|
|
|
|
'FirmwareVersion', 'PowerCapacityWatts', 'PowerSupplyType',
|
|
|
|
'Status']
|
|
|
|
|
|
|
|
# Get a list of all Chassis and build URIs, then get all PowerSupplies
|
|
|
|
# from each Power entry in the Chassis
|
|
|
|
chassis_uri_list = self.chassis_uris
|
|
|
|
for chassis_uri in chassis_uri_list:
|
|
|
|
response = self.get_request(self.root_uri + chassis_uri)
|
|
|
|
if response['ret'] is False:
|
|
|
|
return response
|
|
|
|
|
|
|
|
result['ret'] = True
|
|
|
|
data = response['data']
|
|
|
|
|
|
|
|
if 'Power' in data:
|
|
|
|
power_uri = data[u'Power'][u'@odata.id']
|
|
|
|
else:
|
|
|
|
continue
|
|
|
|
|
|
|
|
response = self.get_request(self.root_uri + power_uri)
|
|
|
|
data = response['data']
|
|
|
|
|
|
|
|
if key not in data:
|
|
|
|
return {'ret': False, 'msg': "Key %s not found" % key}
|
|
|
|
|
|
|
|
psu_list = data[key]
|
|
|
|
for psu in psu_list:
|
|
|
|
psu_not_present = False
|
|
|
|
psu_data = {}
|
|
|
|
for property in properties:
|
|
|
|
if property in psu:
|
|
|
|
if psu[property] is not None:
|
|
|
|
if property == 'Status':
|
|
|
|
if 'State' in psu[property]:
|
|
|
|
if psu[property]['State'] == 'Absent':
|
|
|
|
psu_not_present = True
|
|
|
|
psu_data[property] = psu[property]
|
|
|
|
if psu_not_present:
|
|
|
|
continue
|
|
|
|
psu_results.append(psu_data)
|
|
|
|
|
|
|
|
result["entries"] = psu_results
|
|
|
|
if not result["entries"]:
|
|
|
|
return {'ret': False, 'msg': "No PowerSupply objects found"}
|
|
|
|
return result
|
|
|
|
|
|
|
|
def get_multi_psu_inventory(self):
|
|
|
|
return self.aggregate_systems(self.get_psu_inventory)
|
|
|
|
|
|
|
|
def get_system_inventory(self, systems_uri):
|
|
|
|
result = {}
|
|
|
|
inventory = {}
|
|
|
|
# Get these entries, but does not fail if not found
|
|
|
|
properties = ['Status', 'HostName', 'PowerState', 'Model', 'Manufacturer',
|
|
|
|
'PartNumber', 'SystemType', 'AssetTag', 'ServiceTag',
|
|
|
|
'SerialNumber', 'SKU', 'BiosVersion', 'MemorySummary',
|
2021-01-29 07:17:57 +01:00
|
|
|
'ProcessorSummary', 'TrustedModules', 'Name', 'Id']
|
2020-03-09 10:11:07 +01:00
|
|
|
|
|
|
|
response = self.get_request(self.root_uri + systems_uri)
|
|
|
|
if response['ret'] is False:
|
|
|
|
return response
|
|
|
|
result['ret'] = True
|
|
|
|
data = response['data']
|
|
|
|
|
|
|
|
for property in properties:
|
|
|
|
if property in data:
|
|
|
|
inventory[property] = data[property]
|
|
|
|
|
|
|
|
result["entries"] = inventory
|
|
|
|
return result
|
|
|
|
|
|
|
|
def get_multi_system_inventory(self):
|
|
|
|
return self.aggregate_systems(self.get_system_inventory)
|
|
|
|
|
|
|
|
def get_network_protocols(self):
|
|
|
|
result = {}
|
|
|
|
service_result = {}
|
|
|
|
# Find NetworkProtocol
|
|
|
|
response = self.get_request(self.root_uri + self.manager_uri)
|
|
|
|
if response['ret'] is False:
|
|
|
|
return response
|
|
|
|
data = response['data']
|
|
|
|
if 'NetworkProtocol' not in data:
|
|
|
|
return {'ret': False, 'msg': "NetworkProtocol resource not found"}
|
|
|
|
networkprotocol_uri = data["NetworkProtocol"]["@odata.id"]
|
|
|
|
|
|
|
|
response = self.get_request(self.root_uri + networkprotocol_uri)
|
|
|
|
if response['ret'] is False:
|
|
|
|
return response
|
|
|
|
data = response['data']
|
|
|
|
protocol_services = ['SNMP', 'VirtualMedia', 'Telnet', 'SSDP', 'IPMI', 'SSH',
|
|
|
|
'KVMIP', 'NTP', 'HTTP', 'HTTPS', 'DHCP', 'DHCPv6', 'RDP',
|
|
|
|
'RFB']
|
|
|
|
for protocol_service in protocol_services:
|
|
|
|
if protocol_service in data.keys():
|
|
|
|
service_result[protocol_service] = data[protocol_service]
|
|
|
|
|
|
|
|
result['ret'] = True
|
|
|
|
result["entries"] = service_result
|
|
|
|
return result
|
|
|
|
|
|
|
|
def set_network_protocols(self, manager_services):
|
|
|
|
# Check input data validity
|
|
|
|
protocol_services = ['SNMP', 'VirtualMedia', 'Telnet', 'SSDP', 'IPMI', 'SSH',
|
|
|
|
'KVMIP', 'NTP', 'HTTP', 'HTTPS', 'DHCP', 'DHCPv6', 'RDP',
|
|
|
|
'RFB']
|
|
|
|
protocol_state_onlist = ['true', 'True', True, 'on', 1]
|
|
|
|
protocol_state_offlist = ['false', 'False', False, 'off', 0]
|
|
|
|
payload = {}
|
|
|
|
for service_name in manager_services.keys():
|
|
|
|
if service_name not in protocol_services:
|
|
|
|
return {'ret': False, 'msg': "Service name %s is invalid" % service_name}
|
|
|
|
payload[service_name] = {}
|
|
|
|
for service_property in manager_services[service_name].keys():
|
|
|
|
value = manager_services[service_name][service_property]
|
|
|
|
if service_property in ['ProtocolEnabled', 'protocolenabled']:
|
|
|
|
if value in protocol_state_onlist:
|
|
|
|
payload[service_name]['ProtocolEnabled'] = True
|
|
|
|
elif value in protocol_state_offlist:
|
|
|
|
payload[service_name]['ProtocolEnabled'] = False
|
|
|
|
else:
|
|
|
|
return {'ret': False, 'msg': "Value of property %s is invalid" % service_property}
|
|
|
|
elif service_property in ['port', 'Port']:
|
|
|
|
if isinstance(value, int):
|
|
|
|
payload[service_name]['Port'] = value
|
|
|
|
elif isinstance(value, str) and value.isdigit():
|
|
|
|
payload[service_name]['Port'] = int(value)
|
|
|
|
else:
|
|
|
|
return {'ret': False, 'msg': "Value of property %s is invalid" % service_property}
|
|
|
|
else:
|
|
|
|
payload[service_name][service_property] = value
|
|
|
|
|
|
|
|
# Find NetworkProtocol
|
|
|
|
response = self.get_request(self.root_uri + self.manager_uri)
|
|
|
|
if response['ret'] is False:
|
|
|
|
return response
|
|
|
|
data = response['data']
|
|
|
|
if 'NetworkProtocol' not in data:
|
|
|
|
return {'ret': False, 'msg': "NetworkProtocol resource not found"}
|
|
|
|
networkprotocol_uri = data["NetworkProtocol"]["@odata.id"]
|
|
|
|
|
|
|
|
# Check service property support or not
|
|
|
|
response = self.get_request(self.root_uri + networkprotocol_uri)
|
|
|
|
if response['ret'] is False:
|
|
|
|
return response
|
|
|
|
data = response['data']
|
|
|
|
for service_name in payload.keys():
|
|
|
|
if service_name not in data:
|
|
|
|
return {'ret': False, 'msg': "%s service not supported" % service_name}
|
|
|
|
for service_property in payload[service_name].keys():
|
|
|
|
if service_property not in data[service_name]:
|
|
|
|
return {'ret': False, 'msg': "%s property for %s service not supported" % (service_property, service_name)}
|
|
|
|
|
|
|
|
# if the protocol is already set, nothing to do
|
|
|
|
need_change = False
|
|
|
|
for service_name in payload.keys():
|
|
|
|
for service_property in payload[service_name].keys():
|
|
|
|
value = payload[service_name][service_property]
|
|
|
|
if value != data[service_name][service_property]:
|
|
|
|
need_change = True
|
|
|
|
break
|
|
|
|
|
|
|
|
if not need_change:
|
|
|
|
return {'ret': True, 'changed': False, 'msg': "Manager NetworkProtocol services already set"}
|
|
|
|
|
|
|
|
response = self.patch_request(self.root_uri + networkprotocol_uri, payload)
|
|
|
|
if response['ret'] is False:
|
|
|
|
return response
|
|
|
|
return {'ret': True, 'changed': True, 'msg': "Modified Manager NetworkProtocol services"}
|
|
|
|
|
|
|
|
@staticmethod
|
|
|
|
def to_singular(resource_name):
|
|
|
|
if resource_name.endswith('ies'):
|
|
|
|
resource_name = resource_name[:-3] + 'y'
|
|
|
|
elif resource_name.endswith('s'):
|
|
|
|
resource_name = resource_name[:-1]
|
|
|
|
return resource_name
|
|
|
|
|
|
|
|
def get_health_resource(self, subsystem, uri, health, expanded):
|
|
|
|
status = 'Status'
|
|
|
|
|
|
|
|
if expanded:
|
|
|
|
d = expanded
|
|
|
|
else:
|
|
|
|
r = self.get_request(self.root_uri + uri)
|
|
|
|
if r.get('ret'):
|
|
|
|
d = r.get('data')
|
|
|
|
else:
|
|
|
|
return
|
|
|
|
|
|
|
|
if 'Members' in d: # collections case
|
|
|
|
for m in d.get('Members'):
|
|
|
|
u = m.get('@odata.id')
|
|
|
|
r = self.get_request(self.root_uri + u)
|
|
|
|
if r.get('ret'):
|
|
|
|
p = r.get('data')
|
|
|
|
if p:
|
|
|
|
e = {self.to_singular(subsystem.lower()) + '_uri': u,
|
|
|
|
status: p.get(status,
|
|
|
|
"Status not available")}
|
|
|
|
health[subsystem].append(e)
|
|
|
|
else: # non-collections case
|
|
|
|
e = {self.to_singular(subsystem.lower()) + '_uri': uri,
|
|
|
|
status: d.get(status,
|
|
|
|
"Status not available")}
|
|
|
|
health[subsystem].append(e)
|
|
|
|
|
|
|
|
def get_health_subsystem(self, subsystem, data, health):
|
|
|
|
if subsystem in data:
|
|
|
|
sub = data.get(subsystem)
|
|
|
|
if isinstance(sub, list):
|
|
|
|
for r in sub:
|
|
|
|
if '@odata.id' in r:
|
|
|
|
uri = r.get('@odata.id')
|
|
|
|
expanded = None
|
|
|
|
if '#' in uri and len(r) > 1:
|
|
|
|
expanded = r
|
|
|
|
self.get_health_resource(subsystem, uri, health, expanded)
|
|
|
|
elif isinstance(sub, dict):
|
|
|
|
if '@odata.id' in sub:
|
|
|
|
uri = sub.get('@odata.id')
|
|
|
|
self.get_health_resource(subsystem, uri, health, None)
|
|
|
|
elif 'Members' in data:
|
|
|
|
for m in data.get('Members'):
|
|
|
|
u = m.get('@odata.id')
|
|
|
|
r = self.get_request(self.root_uri + u)
|
|
|
|
if r.get('ret'):
|
|
|
|
d = r.get('data')
|
|
|
|
self.get_health_subsystem(subsystem, d, health)
|
|
|
|
|
|
|
|
def get_health_report(self, category, uri, subsystems):
|
|
|
|
result = {}
|
|
|
|
health = {}
|
|
|
|
status = 'Status'
|
|
|
|
|
|
|
|
# Get health status of top level resource
|
|
|
|
response = self.get_request(self.root_uri + uri)
|
|
|
|
if response['ret'] is False:
|
|
|
|
return response
|
|
|
|
result['ret'] = True
|
|
|
|
data = response['data']
|
|
|
|
health[category] = {status: data.get(status, "Status not available")}
|
|
|
|
|
|
|
|
# Get health status of subsystems
|
|
|
|
for sub in subsystems:
|
|
|
|
d = None
|
|
|
|
if sub.startswith('Links.'): # ex: Links.PCIeDevices
|
|
|
|
sub = sub[len('Links.'):]
|
|
|
|
d = data.get('Links', {})
|
|
|
|
elif '.' in sub: # ex: Thermal.Fans
|
|
|
|
p, sub = sub.split('.')
|
|
|
|
u = data.get(p, {}).get('@odata.id')
|
|
|
|
if u:
|
|
|
|
r = self.get_request(self.root_uri + u)
|
|
|
|
if r['ret']:
|
|
|
|
d = r['data']
|
|
|
|
if not d:
|
|
|
|
continue
|
|
|
|
else: # ex: Memory
|
|
|
|
d = data
|
|
|
|
health[sub] = []
|
|
|
|
self.get_health_subsystem(sub, d, health)
|
|
|
|
if not health[sub]:
|
|
|
|
del health[sub]
|
|
|
|
|
|
|
|
result["entries"] = health
|
|
|
|
return result
|
|
|
|
|
|
|
|
def get_system_health_report(self, systems_uri):
|
|
|
|
subsystems = ['Processors', 'Memory', 'SimpleStorage', 'Storage',
|
|
|
|
'EthernetInterfaces', 'NetworkInterfaces.NetworkPorts',
|
|
|
|
'NetworkInterfaces.NetworkDeviceFunctions']
|
|
|
|
return self.get_health_report('System', systems_uri, subsystems)
|
|
|
|
|
|
|
|
def get_multi_system_health_report(self):
|
|
|
|
return self.aggregate_systems(self.get_system_health_report)
|
|
|
|
|
|
|
|
def get_chassis_health_report(self, chassis_uri):
|
|
|
|
subsystems = ['Power.PowerSupplies', 'Thermal.Fans',
|
|
|
|
'Links.PCIeDevices']
|
|
|
|
return self.get_health_report('Chassis', chassis_uri, subsystems)
|
|
|
|
|
|
|
|
def get_multi_chassis_health_report(self):
|
|
|
|
return self.aggregate_chassis(self.get_chassis_health_report)
|
|
|
|
|
|
|
|
def get_manager_health_report(self, manager_uri):
|
|
|
|
subsystems = []
|
|
|
|
return self.get_health_report('Manager', manager_uri, subsystems)
|
|
|
|
|
|
|
|
def get_multi_manager_health_report(self):
|
|
|
|
return self.aggregate_managers(self.get_manager_health_report)
|
|
|
|
|
|
|
|
def set_manager_nic(self, nic_addr, nic_config):
|
|
|
|
# Get EthernetInterface collection
|
|
|
|
response = self.get_request(self.root_uri + self.manager_uri)
|
|
|
|
if response['ret'] is False:
|
|
|
|
return response
|
|
|
|
data = response['data']
|
|
|
|
if 'EthernetInterfaces' not in data:
|
|
|
|
return {'ret': False, 'msg': "EthernetInterfaces resource not found"}
|
|
|
|
ethernetinterfaces_uri = data["EthernetInterfaces"]["@odata.id"]
|
|
|
|
response = self.get_request(self.root_uri + ethernetinterfaces_uri)
|
|
|
|
if response['ret'] is False:
|
|
|
|
return response
|
|
|
|
data = response['data']
|
|
|
|
uris = [a.get('@odata.id') for a in data.get('Members', []) if
|
|
|
|
a.get('@odata.id')]
|
|
|
|
|
|
|
|
# Find target EthernetInterface
|
|
|
|
target_ethernet_uri = None
|
|
|
|
target_ethernet_current_setting = None
|
|
|
|
if nic_addr == 'null':
|
|
|
|
# Find root_uri matched EthernetInterface when nic_addr is not specified
|
|
|
|
nic_addr = (self.root_uri).split('/')[-1]
|
|
|
|
nic_addr = nic_addr.split(':')[0] # split port if existing
|
|
|
|
for uri in uris:
|
|
|
|
response = self.get_request(self.root_uri + uri)
|
|
|
|
if response['ret'] is False:
|
|
|
|
return response
|
|
|
|
data = response['data']
|
2021-02-10 19:47:09 +01:00
|
|
|
if '"' + nic_addr.lower() + '"' in str(data).lower() or "'" + nic_addr.lower() + "'" in str(data).lower():
|
2020-03-09 10:11:07 +01:00
|
|
|
target_ethernet_uri = uri
|
|
|
|
target_ethernet_current_setting = data
|
|
|
|
break
|
|
|
|
if target_ethernet_uri is None:
|
|
|
|
return {'ret': False, 'msg': "No matched EthernetInterface found under Manager"}
|
|
|
|
|
|
|
|
# Convert input to payload and check validity
|
|
|
|
payload = {}
|
|
|
|
for property in nic_config.keys():
|
|
|
|
value = nic_config[property]
|
|
|
|
if property not in target_ethernet_current_setting:
|
|
|
|
return {'ret': False, 'msg': "Property %s in nic_config is invalid" % property}
|
|
|
|
if isinstance(value, dict):
|
|
|
|
if isinstance(target_ethernet_current_setting[property], dict):
|
|
|
|
payload[property] = value
|
|
|
|
elif isinstance(target_ethernet_current_setting[property], list):
|
|
|
|
payload[property] = list()
|
|
|
|
payload[property].append(value)
|
|
|
|
else:
|
|
|
|
return {'ret': False, 'msg': "Value of property %s in nic_config is invalid" % property}
|
|
|
|
else:
|
|
|
|
payload[property] = value
|
|
|
|
|
|
|
|
# If no need change, nothing to do. If error detected, report it
|
|
|
|
need_change = False
|
|
|
|
for property in payload.keys():
|
|
|
|
set_value = payload[property]
|
|
|
|
cur_value = target_ethernet_current_setting[property]
|
|
|
|
# type is simple(not dict/list)
|
|
|
|
if not isinstance(set_value, dict) and not isinstance(set_value, list):
|
|
|
|
if set_value != cur_value:
|
|
|
|
need_change = True
|
|
|
|
# type is dict
|
|
|
|
if isinstance(set_value, dict):
|
|
|
|
for subprop in payload[property].keys():
|
|
|
|
if subprop not in target_ethernet_current_setting[property]:
|
|
|
|
return {'ret': False, 'msg': "Sub-property %s in nic_config is invalid" % subprop}
|
|
|
|
sub_set_value = payload[property][subprop]
|
|
|
|
sub_cur_value = target_ethernet_current_setting[property][subprop]
|
|
|
|
if sub_set_value != sub_cur_value:
|
|
|
|
need_change = True
|
|
|
|
# type is list
|
|
|
|
if isinstance(set_value, list):
|
2021-03-19 19:06:57 +01:00
|
|
|
if len(set_value) != len(cur_value):
|
|
|
|
# if arrays are not the same len, no need to check each element
|
|
|
|
need_change = True
|
|
|
|
continue
|
2020-03-09 10:11:07 +01:00
|
|
|
for i in range(len(set_value)):
|
|
|
|
for subprop in payload[property][i].keys():
|
|
|
|
if subprop not in target_ethernet_current_setting[property][i]:
|
|
|
|
return {'ret': False, 'msg': "Sub-property %s in nic_config is invalid" % subprop}
|
|
|
|
sub_set_value = payload[property][i][subprop]
|
|
|
|
sub_cur_value = target_ethernet_current_setting[property][i][subprop]
|
|
|
|
if sub_set_value != sub_cur_value:
|
|
|
|
need_change = True
|
|
|
|
|
|
|
|
if not need_change:
|
|
|
|
return {'ret': True, 'changed': False, 'msg': "Manager NIC already set"}
|
|
|
|
|
|
|
|
response = self.patch_request(self.root_uri + target_ethernet_uri, payload)
|
|
|
|
if response['ret'] is False:
|
|
|
|
return response
|
|
|
|
return {'ret': True, 'changed': True, 'msg': "Modified Manager NIC"}
|