mirror of
https://github.com/ansible-collections/community.general.git
synced 2024-09-14 20:13:21 +02:00
parent
eea18e9875
commit
ad6c4a544e
4 changed files with 93 additions and 85 deletions
|
@ -16,9 +16,11 @@
|
||||||
# along with Ansible. If not, see <http://www.gnu.org/licenses/>.
|
# along with Ansible. If not, see <http://www.gnu.org/licenses/>.
|
||||||
#
|
#
|
||||||
|
|
||||||
ANSIBLE_METADATA = {'metadata_version': '1.0',
|
ANSIBLE_METADATA = {
|
||||||
'status': ['preview'],
|
'metadata_version': '1.0',
|
||||||
'supported_by': 'community'}
|
'status': ['preview'],
|
||||||
|
'supported_by': 'community',
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
DOCUMENTATION = '''
|
DOCUMENTATION = '''
|
||||||
|
@ -31,84 +33,51 @@ description:
|
||||||
- Manages configuration of a Protocol Independent Multicast (PIM) instance.
|
- Manages configuration of a Protocol Independent Multicast (PIM) instance.
|
||||||
author: Gabriele Gerbino (@GGabriele)
|
author: Gabriele Gerbino (@GGabriele)
|
||||||
options:
|
options:
|
||||||
ssm_range:
|
ssm_range:
|
||||||
description:
|
description:
|
||||||
- Configure group ranges for Source Specific Multicast (SSM).
|
- Configure group ranges for Source Specific Multicast (SSM).
|
||||||
Valid values are multicast addresses or the keyword 'none'.
|
Valid values are multicast addresses or the keyword 'none'.
|
||||||
required: true
|
required: true
|
||||||
'''
|
'''
|
||||||
EXAMPLES = '''
|
EXAMPLES = '''
|
||||||
- nxos_pim:
|
- nxos_pim:
|
||||||
ssm_range: "232.0.0.0/8"
|
ssm_range: "232.0.0.0/8"
|
||||||
username: "{{ un }}"
|
|
||||||
password: "{{ pwd }}"
|
|
||||||
host: "{{ inventory_hostname }}"
|
|
||||||
'''
|
'''
|
||||||
|
|
||||||
RETURN = '''
|
RETURN = '''
|
||||||
proposed:
|
commands:
|
||||||
description: k/v pairs of parameters passed into module
|
|
||||||
returned: verbose mode
|
|
||||||
type: dict
|
|
||||||
sample: {"ssm_range": "232.0.0.0/8"}
|
|
||||||
existing:
|
|
||||||
description: k/v pairs of existing PIM configuration
|
|
||||||
returned: verbose mode
|
|
||||||
type: dict
|
|
||||||
sample: {"ssm_range": none}
|
|
||||||
end_state:
|
|
||||||
description: k/v pairs of BGP configuration after module execution
|
|
||||||
returned: verbose mode
|
|
||||||
type: dict
|
|
||||||
sample: {"ssm_range": "232.0.0.0/8"}
|
|
||||||
updates:
|
|
||||||
description: commands sent to the device
|
description: commands sent to the device
|
||||||
returned: always
|
returned: always
|
||||||
type: list
|
type: list
|
||||||
sample: ["ip pim ssm range 232.0.0.0/8"]
|
sample: ["ip pim ssm range 232.0.0.0/8"]
|
||||||
changed:
|
|
||||||
description: check to see if a change was made on the device
|
|
||||||
returned: always
|
|
||||||
type: boolean
|
|
||||||
sample: true
|
|
||||||
'''
|
'''
|
||||||
|
|
||||||
|
|
||||||
import re
|
import re
|
||||||
from ansible.module_utils.nxos import get_config, load_config, run_commands
|
|
||||||
|
from ansible.module_utils.nxos import get_config, load_config
|
||||||
from ansible.module_utils.nxos import nxos_argument_spec, check_args
|
from ansible.module_utils.nxos import nxos_argument_spec, check_args
|
||||||
from ansible.module_utils.basic import AnsibleModule
|
from ansible.module_utils.basic import AnsibleModule
|
||||||
from ansible.module_utils.netcfg import CustomNetworkConfig
|
from ansible.module_utils.netcfg import CustomNetworkConfig
|
||||||
|
|
||||||
import re
|
|
||||||
|
|
||||||
|
|
||||||
PARAM_TO_COMMAND_KEYMAP = {
|
PARAM_TO_COMMAND_KEYMAP = {
|
||||||
'ssm_range': 'ip pim ssm range'
|
'ssm_range': 'ip pim ssm range'
|
||||||
}
|
}
|
||||||
PARAM_TO_DEFAULT_KEYMAP = {}
|
|
||||||
WARNINGS = []
|
|
||||||
|
|
||||||
|
|
||||||
def invoke(name, *args, **kwargs):
|
|
||||||
func = globals().get(name)
|
|
||||||
if func:
|
|
||||||
return func(*args, **kwargs)
|
|
||||||
|
|
||||||
|
|
||||||
def get_value(arg, config, module):
|
|
||||||
REGEX = re.compile(r'(?:{0}\s)(?P<value>.*)$'.format(PARAM_TO_COMMAND_KEYMAP[arg]), re.M)
|
|
||||||
value = ''
|
|
||||||
if PARAM_TO_COMMAND_KEYMAP[arg] in config:
|
|
||||||
value = REGEX.search(config).group('value')
|
|
||||||
return value
|
|
||||||
|
|
||||||
|
|
||||||
def get_existing(module, args):
|
def get_existing(module, args):
|
||||||
existing = {}
|
existing = {}
|
||||||
config = str(get_config(module))
|
config = str(get_config(module))
|
||||||
|
|
||||||
for arg in args:
|
for arg in args:
|
||||||
existing[arg] = get_value(arg, config, module)
|
command = PARAM_TO_COMMAND_KEYMAP[arg]
|
||||||
|
has_command = re.match(r'(?:{0}\s)(?P<value>.*)$'.format(command), config, re.M)
|
||||||
|
|
||||||
|
value = ''
|
||||||
|
if has_command:
|
||||||
|
value = has_command.group('value')
|
||||||
|
existing[arg] = value
|
||||||
return existing
|
return existing
|
||||||
|
|
||||||
|
|
||||||
|
@ -116,19 +85,14 @@ def apply_key_map(key_map, table):
|
||||||
new_dict = {}
|
new_dict = {}
|
||||||
for key, value in table.items():
|
for key, value in table.items():
|
||||||
new_key = key_map.get(key)
|
new_key = key_map.get(key)
|
||||||
if new_key:
|
if value:
|
||||||
value = table.get(key)
|
new_dict[new_key] = value
|
||||||
if value:
|
|
||||||
new_dict[new_key] = value
|
|
||||||
else:
|
|
||||||
new_dict[new_key] = value
|
|
||||||
return new_dict
|
return new_dict
|
||||||
|
|
||||||
|
|
||||||
def get_commands(module, existing, proposed, candidate):
|
def get_commands(module, existing, proposed, candidate):
|
||||||
commands = list()
|
commands = list()
|
||||||
proposed_commands = apply_key_map(PARAM_TO_COMMAND_KEYMAP, proposed)
|
proposed_commands = apply_key_map(PARAM_TO_COMMAND_KEYMAP, proposed)
|
||||||
existing_commands = apply_key_map(PARAM_TO_COMMAND_KEYMAP, existing)
|
|
||||||
|
|
||||||
for key, value in proposed_commands.items():
|
for key, value in proposed_commands.items():
|
||||||
command = '{0} {1}'.format(key, value)
|
command = '{0} {1}'.format(key, value)
|
||||||
|
@ -141,53 +105,39 @@ def get_commands(module, existing, proposed, candidate):
|
||||||
def main():
|
def main():
|
||||||
argument_spec = dict(
|
argument_spec = dict(
|
||||||
ssm_range=dict(required=True, type='str'),
|
ssm_range=dict(required=True, type='str'),
|
||||||
m_facts=dict(required=False, default=False, type='bool'),
|
|
||||||
include_defaults=dict(default=False),
|
|
||||||
config=dict(),
|
|
||||||
save=dict(type='bool', default=False)
|
|
||||||
)
|
)
|
||||||
|
|
||||||
argument_spec.update(nxos_argument_spec)
|
argument_spec.update(nxos_argument_spec)
|
||||||
|
|
||||||
module = AnsibleModule(argument_spec=argument_spec,
|
module = AnsibleModule(argument_spec=argument_spec,
|
||||||
supports_check_mode=True)
|
supports_check_mode=True)
|
||||||
|
|
||||||
warnings = list()
|
warnings = list()
|
||||||
check_args(module, warnings)
|
check_args(module, warnings)
|
||||||
|
result = {'changed': False, 'commands': [], 'warnings': warnings}
|
||||||
|
|
||||||
splitted_ssm_range = module.params['ssm_range'].split('.')
|
splitted_ssm_range = module.params['ssm_range'].split('.')
|
||||||
if len(splitted_ssm_range) != 4 and module.params['ssm_range'] != 'none':
|
if len(splitted_ssm_range) != 4 and module.params['ssm_range'] != 'none':
|
||||||
module.fail_json(msg="Valid ssm_range values are multicast addresses "
|
module.fail_json(msg="Valid ssm_range values are multicast addresses "
|
||||||
"or the keyword 'none'.")
|
"or the keyword 'none'.")
|
||||||
|
|
||||||
args = [
|
args = PARAM_TO_COMMAND_KEYMAP.keys()
|
||||||
'ssm_range'
|
|
||||||
]
|
|
||||||
|
|
||||||
existing = invoke('get_existing', module, args)
|
existing = get_existing(module, args)
|
||||||
end_state = existing
|
|
||||||
proposed = dict((k, v) for k, v in module.params.items()
|
proposed = dict((k, v) for k, v in module.params.items()
|
||||||
if v is not None and k in args)
|
if k in args and v != existing[k])
|
||||||
|
|
||||||
result = {}
|
|
||||||
candidate = CustomNetworkConfig(indent=3)
|
candidate = CustomNetworkConfig(indent=3)
|
||||||
invoke('get_commands', module, existing, proposed, candidate)
|
get_commands(module, existing, proposed, candidate)
|
||||||
response = load_config(module, candidate)
|
|
||||||
result.update(response)
|
|
||||||
|
|
||||||
if module._verbosity > 0:
|
if candidate:
|
||||||
end_state = invoke('get_existing', module, args)
|
candidate = candidate.items_text()
|
||||||
result['end_state'] = end_state
|
result['commands'] = candidate
|
||||||
result['existing'] = existing
|
result['changed'] = True
|
||||||
result['proposed'] = proposed
|
load_config(module, candidate)
|
||||||
|
|
||||||
if WARNINGS:
|
|
||||||
result['warnings'] = WARNINGS
|
|
||||||
|
|
||||||
module.exit_json(**result)
|
module.exit_json(**result)
|
||||||
|
|
||||||
|
|
||||||
if __name__ == '__main__':
|
if __name__ == '__main__':
|
||||||
main()
|
main()
|
||||||
|
|
||||||
|
|
|
@ -371,7 +371,6 @@ lib/ansible/modules/network/nxos/nxos_ntp_auth.py
|
||||||
lib/ansible/modules/network/nxos/nxos_ntp_options.py
|
lib/ansible/modules/network/nxos/nxos_ntp_options.py
|
||||||
lib/ansible/modules/network/nxos/nxos_nxapi.py
|
lib/ansible/modules/network/nxos/nxos_nxapi.py
|
||||||
lib/ansible/modules/network/nxos/nxos_overlay_global.py
|
lib/ansible/modules/network/nxos/nxos_overlay_global.py
|
||||||
lib/ansible/modules/network/nxos/nxos_pim.py
|
|
||||||
lib/ansible/modules/network/nxos/nxos_pim_interface.py
|
lib/ansible/modules/network/nxos/nxos_pim_interface.py
|
||||||
lib/ansible/modules/network/nxos/nxos_pim_rp_address.py
|
lib/ansible/modules/network/nxos/nxos_pim_rp_address.py
|
||||||
lib/ansible/modules/network/nxos/nxos_ping.py
|
lib/ansible/modules/network/nxos/nxos_ping.py
|
||||||
|
|
|
@ -0,0 +1 @@
|
||||||
|
ip pim ssm range 127.0.0.0/31
|
58
test/units/modules/network/nxos/test_nxos_pim.py
Normal file
58
test/units/modules/network/nxos/test_nxos_pim.py
Normal file
|
@ -0,0 +1,58 @@
|
||||||
|
# (c) 2016 Red Hat Inc.
|
||||||
|
#
|
||||||
|
# This file is part of Ansible
|
||||||
|
#
|
||||||
|
# Ansible is free software: you can redistribute it and/or modify
|
||||||
|
# it under the terms of the GNU General Public License as published by
|
||||||
|
# the Free Software Foundation, either version 3 of the License, or
|
||||||
|
# (at your option) any later version.
|
||||||
|
#
|
||||||
|
# Ansible is distributed in the hope that it will be useful,
|
||||||
|
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||||
|
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||||
|
# GNU General Public License for more details.
|
||||||
|
#
|
||||||
|
# You should have received a copy of the GNU General Public License
|
||||||
|
# along with Ansible. If not, see <http://www.gnu.org/licenses/>.
|
||||||
|
|
||||||
|
# Make coding more python3-ish
|
||||||
|
from __future__ import (absolute_import, division, print_function)
|
||||||
|
__metaclass__ = type
|
||||||
|
|
||||||
|
import os
|
||||||
|
|
||||||
|
from ansible.compat.tests.mock import patch
|
||||||
|
from ansible.modules.network.nxos import nxos_pim
|
||||||
|
from .nxos_module import TestNxosModule, load_fixture, set_module_args
|
||||||
|
|
||||||
|
|
||||||
|
class TestNxosPimModule(TestNxosModule):
|
||||||
|
|
||||||
|
module = nxos_pim
|
||||||
|
|
||||||
|
def setUp(self):
|
||||||
|
self.mock_get_config = patch('ansible.modules.network.nxos.nxos_pim.get_config')
|
||||||
|
self.get_config = self.mock_get_config.start()
|
||||||
|
|
||||||
|
self.mock_load_config = patch('ansible.modules.network.nxos.nxos_pim.load_config')
|
||||||
|
self.load_config = self.mock_load_config.start()
|
||||||
|
|
||||||
|
def tearDown(self):
|
||||||
|
self.mock_get_config.stop()
|
||||||
|
self.mock_load_config.stop()
|
||||||
|
|
||||||
|
def load_fixtures(self, commands=None, device=''):
|
||||||
|
self.get_config.return_value = load_fixture('nxos_pim', 'config.cfg')
|
||||||
|
self.load_config.return_value = None
|
||||||
|
|
||||||
|
def test_nxos_pim(self):
|
||||||
|
set_module_args(dict(ssm_range='232.0.0.0/8'))
|
||||||
|
self.execute_module(changed=True, commands=['ip pim ssm range 232.0.0.0/8'])
|
||||||
|
|
||||||
|
def test_nxos_pim_none(self):
|
||||||
|
set_module_args(dict(ssm_range='none'))
|
||||||
|
self.execute_module(changed=True, commands=['ip pim ssm range none'])
|
||||||
|
|
||||||
|
def test_nxos_pim_no_change(self):
|
||||||
|
set_module_args(dict(ssm_range='127.0.0.0/31'))
|
||||||
|
self.execute_module(changed=False, commands=[])
|
Loading…
Reference in a new issue