#!/usr/bin/python
#
# This file is part of Ansible
#
# Ansible is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation, either version 3 of the License, or
# (at your option) any later version.
#
# Ansible is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with Ansible. If not, see .
#
from __future__ import (absolute_import, division, print_function)
__metaclass__ = type
ANSIBLE_METADATA = {'metadata_version': '1.1',
'status': ['preview'],
'supported_by': 'community'}
DOCUMENTATION = '''
---
module: ce_evpn_bd_vni
short_description: Manages EVPN VXLAN Network Identifier (VNI) on HUAWEI CloudEngine switches.
description:
- Manages Ethernet Virtual Private Network (EVPN) VXLAN Network
Identifier (VNI) configurations on HUAWEI CloudEngine switches.
author: Zhijin Zhou (@QijunPan)
notes:
- Ensure that EVPN has been configured to serve as the VXLAN control plane when state is present.
- Ensure that a bridge domain (BD) has existed when state is present.
- Ensure that a VNI has been created and associated with a broadcast domain (BD) when state is present.
- If you configure evpn:false to delete an EVPN instance, all configurations in the EVPN instance are deleted.
- After an EVPN instance has been created in the BD view, you can configure an RD using route_distinguisher
parameter in BD-EVPN instance view.
- Before configuring VPN targets for a BD EVPN instance, ensure that an RD has been configured
for the BD EVPN instance
- If you unconfigure route_distinguisher, all VPN target attributes for the BD EVPN instance will be removed at the same time.
- When using state:absent, evpn is not supported and it will be ignored.
- When using state:absent to delete VPN target attributes, ensure the configuration of VPN target attributes has
existed and otherwise it will report an error.
- This module requires the netconf system service be enabled on the remote device being managed.
- Recommended connection is C(netconf).
- This module also works with C(local) connections for legacy playbooks.
options:
bridge_domain_id:
description:
- Specify an existed bridge domain (BD).The value is an integer ranging from 1 to 16777215.
required: true
evpn:
description:
- Create or delete an EVPN instance for a VXLAN in BD view.
choices: ['enable','disable']
default: 'enable'
route_distinguisher:
description:
- Configures a route distinguisher (RD) for a BD EVPN instance.
The format of an RD can be as follows
- 1) 2-byte AS number:4-byte user-defined number, for example, 1:3. An AS number is an integer ranging from
0 to 65535, and a user-defined number is an integer ranging from 0 to 4294967295. The AS and user-defined
numbers cannot be both 0s. This means that an RD cannot be 0:0.
- 2) Integral 4-byte AS number:2-byte user-defined number, for example, 65537:3. An AS number is an integer
ranging from 65536 to 4294967295, and a user-defined number is an integer ranging from 0 to 65535.
- 3) 4-byte AS number in dotted notation:2-byte user-defined number, for example, 0.0:3 or 0.1:0. A 4-byte
AS number in dotted notation is in the format of x.y, where x and y are integers ranging from 0 to 65535.
- 4) A user-defined number is an integer ranging from 0 to 65535. The AS and user-defined numbers cannot be
both 0s. This means that an RD cannot be 0.0:0.
- 5) 32-bit IP address:2-byte user-defined number. For example, 192.168.122.15:1. An IP address ranges from
0.0.0.0 to 255.255.255.255, and a user-defined number is an integer ranging from 0 to 65535.
- 6) 'auto' specifies the RD that is automatically generated.
vpn_target_both:
description:
- Add VPN targets to both the import and export VPN target lists of a BD EVPN instance.
The format is the same as route_distinguisher.
vpn_target_import:
description:
- Add VPN targets to the import VPN target list of a BD EVPN instance.
The format is the same as route_distinguisher.
required: true
vpn_target_export:
description:
- Add VPN targets to the export VPN target list of a BD EVPN instance.
The format is the same as route_distinguisher.
state:
description:
- Manage the state of the resource.
choices: ['present','absent']
default: 'present'
'''
EXAMPLES = '''
- name: EVPN BD VNI test
hosts: cloudengine
connection: local
gather_facts: no
vars:
cli:
host: "{{ inventory_hostname }}"
port: "{{ ansible_ssh_port }}"
username: "{{ username }}"
password: "{{ password }}"
transport: cli
tasks:
- name: "Configure an EVPN instance for a VXLAN in BD view"
ce_evpn_bd_vni:
bridge_domain_id: 20
evpn: enable
provider: "{{ cli }}"
- name: "Configure a route distinguisher (RD) for a BD EVPN instance"
ce_evpn_bd_vni:
bridge_domain_id: 20
route_distinguisher: '22:22'
provider: "{{ cli }}"
- name: "Configure VPN targets to both the import and export VPN target lists of a BD EVPN instance"
ce_evpn_bd_vni:
bridge_domain_id: 20
vpn_target_both: 22:100,22:101
provider: "{{ cli }}"
- name: "Configure VPN targets to the import VPN target list of a BD EVPN instance"
ce_evpn_bd_vni:
bridge_domain_id: 20
vpn_target_import: 22:22,22:23
provider: "{{ cli }}"
- name: "Configure VPN targets to the export VPN target list of a BD EVPN instance"
ce_evpn_bd_vni:
bridge_domain_id: 20
vpn_target_export: 22:38,22:39
provider: "{{ cli }}"
- name: "Unconfigure VPN targets to both the import and export VPN target lists of a BD EVPN instance"
ce_evpn_bd_vni:
bridge_domain_id: 20
vpn_target_both: '22:100'
state: absent
provider: "{{ cli }}"
- name: "Unconfigure VPN targets to the import VPN target list of a BD EVPN instance"
ce_evpn_bd_vni:
bridge_domain_id: 20
vpn_target_import: '22:22'
state: absent
provider: "{{ cli }}"
- name: "Unconfigure VPN targets to the export VPN target list of a BD EVPN instance"
ce_evpn_bd_vni:
bridge_domain_id: 20
vpn_target_export: '22:38'
state: absent
provider: "{{ cli }}"
- name: "Unconfigure a route distinguisher (RD) of a BD EVPN instance"
ce_evpn_bd_vni:
bridge_domain_id: 20
route_distinguisher: '22:22'
state: absent
provider: "{{ cli }}"
- name: "Unconfigure an EVPN instance for a VXLAN in BD view"
ce_evpn_bd_vni:
bridge_domain_id: 20
evpn: disable
provider: "{{ cli }}"
'''
RETURN = '''
proposed:
description: k/v pairs of parameters passed into module
returned: always
type: dict
sample: {
"bridge_domain_id": "2",
"evpn": "enable",
"route_distinguisher": "22:22",
"state": "present",
"vpn_target_both": [
"22:100",
"22:101"
],
"vpn_target_export": [
"22:38",
"22:39"
],
"vpn_target_import": [
"22:22",
"22:23"
]
}
existing:
description: k/v pairs of existing attributes on the device
returned: always
type: dict
sample: {
"bridge_domain_id": "2",
"evpn": "disable",
"route_distinguisher": null,
"vpn_target_both": [],
"vpn_target_export": [],
"vpn_target_import": []
}
end_state:
description: k/v pairs of end attributes on the device
returned: always
type: dict
sample: {
"bridge_domain_id": "2",
"evpn": "enable",
"route_distinguisher": "22:22",
"vpn_target_both": [
"22:100",
"22:101"
],
"vpn_target_export": [
"22:38",
"22:39"
],
"vpn_target_import": [
"22:22",
"22:23"
]
}
updates:
description: command list sent to the device
returned: always
type: list
sample: [
"bridge-domain 2",
" evpn",
" route-distinguisher 22:22",
" vpn-target 22:38 export-extcommunity",
" vpn-target 22:39 export-extcommunity",
" vpn-target 22:100 export-extcommunity",
" vpn-target 22:101 export-extcommunity",
" vpn-target 22:22 import-extcommunity",
" vpn-target 22:23 import-extcommunity",
" vpn-target 22:100 import-extcommunity",
" vpn-target 22:101 import-extcommunity"
]
changed:
description: check to see if a change was made on the device
returned: always
type: bool
sample: true
'''
import re
import copy
from xml.etree import ElementTree
from ansible.module_utils.basic import AnsibleModule
from ansible_collections.community.general.plugins.module_utils.network.cloudengine.ce import get_nc_config, set_nc_config, ce_argument_spec
CE_NC_GET_VNI_BD = """
"""
CE_NC_GET_EVPN_CONFIG = """
%s
%s
"""
CE_NC_DELETE_EVPN_CONFIG = """
%s
%s
"""
CE_NC_DELETE_EVPN_CONFIG_HEAD = """
%s
%s
"""
CE_NC_MERGE_EVPN_CONFIG_HEAD = """
%s
%s
"""
CE_NC_MERGE_EVPN_AUTORTS_HEAD = """
"""
CE_NC_MERGE_EVPN_AUTORTS_TAIL = """
"""
CE_NC_DELETE_EVPN_AUTORTS_CONTEXT = """
%s
"""
CE_NC_MERGE_EVPN_AUTORTS_CONTEXT = """
%s
"""
CE_NC_MERGE_EVPN_RTS_HEAD = """
"""
CE_NC_MERGE_EVPN_RTS_TAIL = """
"""
CE_NC_DELETE_EVPN_RTS_CONTEXT = """
%s
%s
"""
CE_NC_MERGE_EVPN_RTS_CONTEXT = """
%s
%s
"""
CE_NC_MERGE_EVPN_CONFIG_TAIL = """
"""
def is_valid_value(vrf_targe_value):
"""check whether VPN target value is valid"""
each_num = None
if len(vrf_targe_value) > 21 or len(vrf_targe_value) < 3:
return False
if vrf_targe_value.find(':') == -1:
return False
elif vrf_targe_value == '0:0':
return False
elif vrf_targe_value == '0.0:0':
return False
else:
value_list = vrf_targe_value.split(':')
if value_list[0].find('.') != -1:
if not value_list[1].isdigit():
return False
if int(value_list[1]) > 65535:
return False
value = value_list[0].split('.')
if len(value) == 4:
for each_num in value:
if not each_num.isdigit():
return False
if int(each_num) > 255:
return False
return True
elif len(value) == 2:
for each_num in value:
if not each_num.isdigit():
return False
if int(each_num) > 65535:
return False
return True
else:
return False
elif not value_list[0].isdigit():
return False
elif not value_list[1].isdigit():
return False
elif int(value_list[0]) < 65536 and int(value_list[1]) < 4294967296:
return True
elif int(value_list[0]) > 65535 and int(value_list[0]) < 4294967296:
return bool(int(value_list[1]) < 65536)
else:
return False
class EvpnBd(object):
"""Manage evpn instance in BD view"""
def __init__(self, argument_spec, ):
self.spec = argument_spec
self.module = None
self.__init_module__()
# EVPN instance info
self.bridge_domain_id = self.module.params['bridge_domain_id']
self.evpn = self.module.params['evpn']
self.route_distinguisher = self.module.params['route_distinguisher']
self.vpn_target_both = self.module.params['vpn_target_both'] or list()
self.vpn_target_import = self.module.params[
'vpn_target_import'] or list()
self.vpn_target_export = self.module.params[
'vpn_target_export'] or list()
self.state = self.module.params['state']
self.__string_to_lowercase__()
self.commands = list()
self.evpn_info = dict()
self.conf_exist = False
# state
self.changed = False
self.updates_cmd = list()
self.results = dict()
self.proposed = dict()
self.existing = dict()
self.end_state = dict()
def __init_module__(self):
"""Init module"""
self.module = AnsibleModule(
argument_spec=self.spec, supports_check_mode=True)
def __check_response__(self, xml_str, xml_name):
"""Check if response message is already succeed"""
if "" not in xml_str:
self.module.fail_json(msg='Error: %s failed.' % xml_name)
def __string_to_lowercase__(self):
"""Convert string to lowercase"""
if self.route_distinguisher:
self.route_distinguisher = self.route_distinguisher.lower()
if self.vpn_target_export:
for index, ele in enumerate(self.vpn_target_export):
self.vpn_target_export[index] = ele.lower()
if self.vpn_target_import:
for index, ele in enumerate(self.vpn_target_import):
self.vpn_target_import[index] = ele.lower()
if self.vpn_target_both:
for index, ele in enumerate(self.vpn_target_both):
self.vpn_target_both[index] = ele.lower()
def get_all_evpn_rts(self, evpn_rts):
"""Get all EVPN RTS"""
rts = evpn_rts.findall("evpnRT")
if not rts:
return
for ele in rts:
vrf_rttype = ele.find('vrfRTType')
vrf_rtvalue = ele.find('vrfRTValue')
if vrf_rttype.text == 'export_extcommunity':
self.evpn_info['vpn_target_export'].append(vrf_rtvalue.text)
elif vrf_rttype.text == 'import_extcommunity':
self.evpn_info['vpn_target_import'].append(vrf_rtvalue.text)
def get_all_evpn_autorts(self, evpn_autorts):
""""Get all EVPN AUTORTS"""
autorts = evpn_autorts.findall("evpnAutoRT")
if not autorts:
return
for autort in autorts:
vrf_rttype = autort.find('vrfRTType')
if vrf_rttype.text == 'export_extcommunity':
self.evpn_info['vpn_target_export'].append('auto')
elif vrf_rttype.text == 'import_extcommunity':
self.evpn_info['vpn_target_import'].append('auto')
def process_rts_info(self):
"""Process RTS information"""
if not self.evpn_info['vpn_target_export'] or\
not self.evpn_info['vpn_target_import']:
return
vpn_target_export = copy.deepcopy(self.evpn_info['vpn_target_export'])
for ele in vpn_target_export:
if ele in self.evpn_info['vpn_target_import']:
self.evpn_info['vpn_target_both'].append(ele)
self.evpn_info['vpn_target_export'].remove(ele)
self.evpn_info['vpn_target_import'].remove(ele)
def get_evpn_instance_info(self):
"""Get current EVPN instance information"""
if not self.bridge_domain_id:
self.module.fail_json(msg='Error: The value of bridge_domain_id cannot be empty.')
self.evpn_info['route_distinguisher'] = None
self.evpn_info['vpn_target_import'] = list()
self.evpn_info['vpn_target_export'] = list()
self.evpn_info['vpn_target_both'] = list()
self.evpn_info['evpn_inst'] = 'enable'
xml_str = CE_NC_GET_EVPN_CONFIG % (
self.bridge_domain_id, self.bridge_domain_id)
xml_str = get_nc_config(self.module, xml_str)
if "" in xml_str:
self.evpn_info['evpn_inst'] = 'disable'
return
xml_str = xml_str.replace('\r', '').replace('\n', '').\
replace('xmlns="urn:ietf:params:xml:ns:netconf:base:1.0"', "").\
replace('xmlns="http://www.huawei.com/netconf/vrp"', "")
root = ElementTree.fromstring(xml_str)
evpn_inst = root.find("evpn/evpnInstances/evpnInstance")
if evpn_inst:
for eles in evpn_inst:
if eles.tag in ["evpnAutoRD", "evpnRD", "evpnRTs", "evpnAutoRTs"]:
if eles.tag == 'evpnAutoRD' and eles.text == 'true':
self.evpn_info['route_distinguisher'] = 'auto'
elif eles.tag == 'evpnRD' and self.evpn_info['route_distinguisher'] != 'auto':
self.evpn_info['route_distinguisher'] = eles.text
elif eles.tag == 'evpnRTs':
self.get_all_evpn_rts(eles)
elif eles.tag == 'evpnAutoRTs':
self.get_all_evpn_autorts(eles)
self.process_rts_info()
def get_existing(self):
"""Get existing config"""
self.existing = dict(bridge_domain_id=self.bridge_domain_id,
evpn=self.evpn_info['evpn_inst'],
route_distinguisher=self.evpn_info[
'route_distinguisher'],
vpn_target_both=self.evpn_info['vpn_target_both'],
vpn_target_import=self.evpn_info[
'vpn_target_import'],
vpn_target_export=self.evpn_info['vpn_target_export'])
def get_proposed(self):
"""Get proposed config"""
self.proposed = dict(bridge_domain_id=self.bridge_domain_id,
evpn=self.evpn,
route_distinguisher=self.route_distinguisher,
vpn_target_both=self.vpn_target_both,
vpn_target_import=self.vpn_target_import,
vpn_target_export=self.vpn_target_export,
state=self.state)
def get_end_state(self):
"""Get end config"""
self.get_evpn_instance_info()
self.end_state = dict(bridge_domain_id=self.bridge_domain_id,
evpn=self.evpn_info['evpn_inst'],
route_distinguisher=self.evpn_info[
'route_distinguisher'],
vpn_target_both=self.evpn_info[
'vpn_target_both'],
vpn_target_import=self.evpn_info[
'vpn_target_import'],
vpn_target_export=self.evpn_info['vpn_target_export'])
def show_result(self):
"""Show result"""
self.results['changed'] = self.changed
self.results['proposed'] = self.proposed
self.results['existing'] = self.existing
self.results['end_state'] = self.end_state
if self.changed:
self.results['updates'] = self.updates_cmd
else:
self.results['updates'] = list()
self.module.exit_json(**self.results)
def judge_if_vpn_target_exist(self, vpn_target_type):
"""Judge whether proposed vpn target has existed"""
vpn_target = list()
if vpn_target_type == 'vpn_target_import':
vpn_target.extend(self.existing['vpn_target_both'])
vpn_target.extend(self.existing['vpn_target_import'])
return set(self.proposed['vpn_target_import']).issubset(vpn_target)
elif vpn_target_type == 'vpn_target_export':
vpn_target.extend(self.existing['vpn_target_both'])
vpn_target.extend(self.existing['vpn_target_export'])
return set(self.proposed['vpn_target_export']).issubset(vpn_target)
return False
def judge_if_config_exist(self):
"""Judge whether configuration has existed"""
if self.state == 'absent':
if self.route_distinguisher or self.vpn_target_import or self.vpn_target_export or self.vpn_target_both:
return False
else:
return True
if self.evpn_info['evpn_inst'] != self.evpn:
return False
if self.evpn == 'disable' and self.evpn_info['evpn_inst'] == 'disable':
return True
if self.proposed['bridge_domain_id'] != self.existing['bridge_domain_id']:
return False
if self.proposed['route_distinguisher']:
if self.proposed['route_distinguisher'] != self.existing['route_distinguisher']:
return False
if self.proposed['vpn_target_both']:
if not self.existing['vpn_target_both']:
return False
if not set(self.proposed['vpn_target_both']).issubset(self.existing['vpn_target_both']):
return False
if self.proposed['vpn_target_import']:
if not self.judge_if_vpn_target_exist('vpn_target_import'):
return False
if self.proposed['vpn_target_export']:
if not self.judge_if_vpn_target_exist('vpn_target_export'):
return False
return True
def check_response(self, xml_str, xml_name):
"""Check if response message is already succeed."""
if "" not in xml_str:
self.module.fail_json(msg='Error: %s failed.' % xml_name)
def unconfig_evpn_instance(self):
"""Unconfigure EVPN instance"""
self.updates_cmd.append("bridge-domain %s" % self.bridge_domain_id)
xml_str = CE_NC_MERGE_EVPN_CONFIG_HEAD % (
self.bridge_domain_id, self.bridge_domain_id)
self.updates_cmd.append(" evpn")
# unconfigure RD
if self.route_distinguisher:
if self.route_distinguisher.lower() == 'auto':
xml_str += 'false'
self.updates_cmd.append(" undo route-distinguisher auto")
else:
xml_str += ''
self.updates_cmd.append(
" undo route-distinguisher %s" % self.route_distinguisher)
xml_str += CE_NC_MERGE_EVPN_CONFIG_TAIL
recv_xml = set_nc_config(self.module, xml_str)
self.check_response(recv_xml, "UNDO_EVPN_BD_RD")
self.changed = True
return
# process VPN target list
vpn_target_export = copy.deepcopy(self.vpn_target_export)
vpn_target_import = copy.deepcopy(self.vpn_target_import)
if self.vpn_target_both:
for ele in self.vpn_target_both:
if ele not in vpn_target_export:
vpn_target_export.append(ele)
if ele not in vpn_target_import:
vpn_target_import.append(ele)
# unconfig EVPN auto RTS
head_flag = False
if vpn_target_export:
for ele in vpn_target_export:
if ele.lower() == 'auto':
if not head_flag:
xml_str += CE_NC_MERGE_EVPN_AUTORTS_HEAD
head_flag = True
xml_str += CE_NC_DELETE_EVPN_AUTORTS_CONTEXT % (
'export_extcommunity')
self.updates_cmd.append(
" undo vpn-target auto export-extcommunity")
if vpn_target_import:
for ele in vpn_target_import:
if ele.lower() == 'auto':
if not head_flag:
xml_str += CE_NC_MERGE_EVPN_AUTORTS_HEAD
head_flag = True
xml_str += CE_NC_DELETE_EVPN_AUTORTS_CONTEXT % (
'import_extcommunity')
self.updates_cmd.append(
" undo vpn-target auto import-extcommunity")
if head_flag:
xml_str += CE_NC_MERGE_EVPN_AUTORTS_TAIL
# unconfig EVPN RTS
head_flag = False
if vpn_target_export:
for ele in vpn_target_export:
if ele.lower() != 'auto':
if not head_flag:
xml_str += CE_NC_MERGE_EVPN_RTS_HEAD
head_flag = True
xml_str += CE_NC_DELETE_EVPN_RTS_CONTEXT % (
'export_extcommunity', ele)
self.updates_cmd.append(
" undo vpn-target %s export-extcommunity" % ele)
if vpn_target_import:
for ele in vpn_target_import:
if ele.lower() != 'auto':
if not head_flag:
xml_str += CE_NC_MERGE_EVPN_RTS_HEAD
head_flag = True
xml_str += CE_NC_DELETE_EVPN_RTS_CONTEXT % (
'import_extcommunity', ele)
self.updates_cmd.append(
" undo vpn-target %s import-extcommunity" % ele)
if head_flag:
xml_str += CE_NC_MERGE_EVPN_RTS_TAIL
xml_str += CE_NC_MERGE_EVPN_CONFIG_TAIL
recv_xml = set_nc_config(self.module, xml_str)
self.check_response(recv_xml, "MERGE_EVPN_BD_VPN_TARGET_CONFIG")
self.changed = True
def config_evpn_instance(self):
"""Configure EVPN instance"""
self.updates_cmd.append("bridge-domain %s" % self.bridge_domain_id)
if self.evpn == 'disable':
xml_str = CE_NC_DELETE_EVPN_CONFIG % (
self.bridge_domain_id, self.bridge_domain_id)
recv_xml = set_nc_config(self.module, xml_str)
self.check_response(recv_xml, "MERGE_EVPN_BD_CONFIG")
self.updates_cmd.append(" undo evpn")
self.changed = True
return
xml_str = CE_NC_MERGE_EVPN_CONFIG_HEAD % (
self.bridge_domain_id, self.bridge_domain_id)
self.updates_cmd.append(" evpn")
# configure RD
if self.route_distinguisher:
if not self.existing['route_distinguisher']:
if self.route_distinguisher.lower() == 'auto':
xml_str += 'true'
self.updates_cmd.append(" route-distinguisher auto")
else:
xml_str += '%s' % self.route_distinguisher
self.updates_cmd.append(
" route-distinguisher %s" % self.route_distinguisher)
# process VPN target list
vpn_target_export = copy.deepcopy(self.vpn_target_export)
vpn_target_import = copy.deepcopy(self.vpn_target_import)
if self.vpn_target_both:
for ele in self.vpn_target_both:
if ele not in vpn_target_export:
vpn_target_export.append(ele)
if ele not in vpn_target_import:
vpn_target_import.append(ele)
# config EVPN auto RTS
head_flag = False
if vpn_target_export:
for ele in vpn_target_export:
if ele.lower() == 'auto' and \
(not self.is_vpn_target_exist('export_extcommunity', ele.lower())):
if not head_flag:
xml_str += CE_NC_MERGE_EVPN_AUTORTS_HEAD
head_flag = True
xml_str += CE_NC_MERGE_EVPN_AUTORTS_CONTEXT % (
'export_extcommunity')
self.updates_cmd.append(
" vpn-target auto export-extcommunity")
if vpn_target_import:
for ele in vpn_target_import:
if ele.lower() == 'auto' and \
(not self.is_vpn_target_exist('import_extcommunity', ele.lower())):
if not head_flag:
xml_str += CE_NC_MERGE_EVPN_AUTORTS_HEAD
head_flag = True
xml_str += CE_NC_MERGE_EVPN_AUTORTS_CONTEXT % (
'import_extcommunity')
self.updates_cmd.append(
" vpn-target auto import-extcommunity")
if head_flag:
xml_str += CE_NC_MERGE_EVPN_AUTORTS_TAIL
# config EVPN RTS
head_flag = False
if vpn_target_export:
for ele in vpn_target_export:
if ele.lower() != 'auto' and \
(not self.is_vpn_target_exist('export_extcommunity', ele.lower())):
if not head_flag:
xml_str += CE_NC_MERGE_EVPN_RTS_HEAD
head_flag = True
xml_str += CE_NC_MERGE_EVPN_RTS_CONTEXT % (
'export_extcommunity', ele)
self.updates_cmd.append(
" vpn-target %s export-extcommunity" % ele)
if vpn_target_import:
for ele in vpn_target_import:
if ele.lower() != 'auto' and \
(not self.is_vpn_target_exist('import_extcommunity', ele.lower())):
if not head_flag:
xml_str += CE_NC_MERGE_EVPN_RTS_HEAD
head_flag = True
xml_str += CE_NC_MERGE_EVPN_RTS_CONTEXT % (
'import_extcommunity', ele)
self.updates_cmd.append(
" vpn-target %s import-extcommunity" % ele)
if head_flag:
xml_str += CE_NC_MERGE_EVPN_RTS_TAIL
xml_str += CE_NC_MERGE_EVPN_CONFIG_TAIL
recv_xml = set_nc_config(self.module, xml_str)
self.check_response(recv_xml, "MERGE_EVPN_BD_CONFIG")
self.changed = True
def is_vpn_target_exist(self, target_type, value):
"""Judge whether VPN target has existed"""
if target_type == 'export_extcommunity':
if (value not in self.existing['vpn_target_export']) and\
(value not in self.existing['vpn_target_both']):
return False
return True
if target_type == 'import_extcommunity':
if (value not in self.existing['vpn_target_import']) and\
(value not in self.existing['vpn_target_both']):
return False
return True
return False
def config_evnp_bd(self):
"""Configure EVPN in BD view"""
if not self.conf_exist:
if self.state == 'present':
self.config_evpn_instance()
else:
self.unconfig_evpn_instance()
def process_input_params(self):
"""Process input parameters"""
if self.state == 'absent':
self.evpn = None
else:
if self.evpn == 'disable':
return
if self.vpn_target_both:
for ele in self.vpn_target_both:
if ele in self.vpn_target_export:
self.vpn_target_export.remove(ele)
if ele in self.vpn_target_import:
self.vpn_target_import.remove(ele)
if self.vpn_target_export and self.vpn_target_import:
vpn_target_export = copy.deepcopy(self.vpn_target_export)
for ele in vpn_target_export:
if ele in self.vpn_target_import:
self.vpn_target_both.append(ele)
self.vpn_target_import.remove(ele)
self.vpn_target_export.remove(ele)
def check_vpn_target_para(self):
"""Check whether VPN target value is valid"""
if self.route_distinguisher:
if self.route_distinguisher.lower() != 'auto' and\
not is_valid_value(self.route_distinguisher):
self.module.fail_json(
msg='Error: Route distinguisher has invalid value %s.' % self.route_distinguisher)
if self.vpn_target_export:
for ele in self.vpn_target_export:
if ele.lower() != 'auto' and not is_valid_value(ele):
self.module.fail_json(
msg='Error: VPN target extended community attribute has invalid value %s.' % ele)
if self.vpn_target_import:
for ele in self.vpn_target_import:
if ele.lower() != 'auto' and not is_valid_value(ele):
self.module.fail_json(
msg='Error: VPN target extended community attribute has invalid value %s.' % ele)
if self.vpn_target_both:
for ele in self.vpn_target_both:
if ele.lower() != 'auto' and not is_valid_value(ele):
self.module.fail_json(
msg='Error: VPN target extended community attribute has invalid value %s.' % ele)
def check_undo_params_if_exist(self):
"""Check whether all undo parameters is existed"""
if self.vpn_target_import:
for ele in self.vpn_target_import:
if ele not in self.evpn_info['vpn_target_import'] and ele not in self.evpn_info['vpn_target_both']:
self.module.fail_json(
msg='Error: VPN target import attribute value %s does not exist.' % ele)
if self.vpn_target_export:
for ele in self.vpn_target_export:
if ele not in self.evpn_info['vpn_target_export'] and ele not in self.evpn_info['vpn_target_both']:
self.module.fail_json(
msg='Error: VPN target export attribute value %s does not exist.' % ele)
if self.vpn_target_both:
for ele in self.vpn_target_both:
if ele not in self.evpn_info['vpn_target_both']:
self.module.fail_json(
msg='Error: VPN target export and import attribute value %s does not exist.' % ele)
def check_params(self):
"""Check all input params"""
# bridge_domain_id check
if self.bridge_domain_id:
if not self.bridge_domain_id.isdigit():
self.module.fail_json(
msg='Error: The parameter of bridge domain id is invalid.')
if int(self.bridge_domain_id) > 16777215 or int(self.bridge_domain_id) < 1:
self.module.fail_json(
msg='Error: The bridge domain id must be an integer between 1 and 16777215.')
if self.state == 'absent':
self.check_undo_params_if_exist()
# check bd whether binding the vxlan vni
self.check_vni_bd()
self.check_vpn_target_para()
if self.state == 'absent':
if self.route_distinguisher:
if not self.evpn_info['route_distinguisher']:
self.module.fail_json(
msg='Error: Route distinguisher has not been configured.')
else:
if self.route_distinguisher != self.evpn_info['route_distinguisher']:
self.module.fail_json(
msg='Error: Current route distinguisher value is %s.' %
self.evpn_info['route_distinguisher'])
if self.state == 'present':
if self.route_distinguisher:
if self.evpn_info['route_distinguisher'] and\
self.route_distinguisher != self.evpn_info['route_distinguisher']:
self.module.fail_json(
msg='Error: Route distinguisher has already been configured.')
def check_vni_bd(self):
"""Check whether vxlan vni is configured in BD view"""
xml_str = CE_NC_GET_VNI_BD
xml_str = get_nc_config(self.module, xml_str)
if "" in xml_str or not re.findall(r'\S+\s+%s' % self.bridge_domain_id, xml_str):
self.module.fail_json(
msg='Error: The vxlan vni is not configured or the bridge domain id is invalid.')
def work(self):
"""Execute task"""
self.get_evpn_instance_info()
self.process_input_params()
self.check_params()
self.get_existing()
self.get_proposed()
self.conf_exist = self.judge_if_config_exist()
self.config_evnp_bd()
self.get_end_state()
self.show_result()
def main():
"""Main function entry"""
argument_spec = dict(
bridge_domain_id=dict(required=True, type='str'),
evpn=dict(required=False, type='str',
default='enable', choices=['enable', 'disable']),
route_distinguisher=dict(required=False, type='str'),
vpn_target_both=dict(required=False, type='list'),
vpn_target_import=dict(required=False, type='list'),
vpn_target_export=dict(required=False, type='list'),
state=dict(required=False, default='present',
choices=['present', 'absent'])
)
argument_spec.update(ce_argument_spec)
evpn_bd = EvpnBd(argument_spec)
evpn_bd.work()
if __name__ == '__main__':
main()