2015-05-10 01:32:16 +02:00
#!/usr/bin/python
# -*- coding: utf-8 -*-
# (c) 2015, Etienne Carriere <etienne.carriere@gmail.com>
#
# This file is part of Ansible
#
# Ansible is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation, either version 3 of the License, or
# (at your option) any later version.
#
# Ansible is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with Ansible. If not, see <http://www.gnu.org/licenses/>.
DOCUMENTATION = '''
- - -
module : bigip_virtual_server
short_description : " Manages F5 BIG-IP LTM virtual servers "
description :
2016-06-29 09:09:37 +02:00
- " Manages F5 BIG-IP LTM virtual servers via iControl SOAP API "
2016-01-11 20:34:44 +01:00
version_added : " 2.1 "
2016-06-23 11:33:49 +02:00
author :
2016-06-29 09:09:37 +02:00
- Etienne Carriere ( @Etienne - Carriere )
- Tim Rupp ( @caphrim007 )
2015-05-10 01:32:16 +02:00
notes :
2016-06-29 09:09:37 +02:00
- " Requires BIG-IP software version >= 11 "
- " F5 developed module ' bigsuds ' required (see http://devcentral.f5.com) "
- " Best run as a local_action in your playbook "
2015-05-10 01:32:16 +02:00
requirements :
2016-06-29 09:09:37 +02:00
- bigsuds
2015-05-10 01:32:16 +02:00
options :
2016-06-29 09:09:37 +02:00
server :
2015-05-10 01:32:16 +02:00
description :
2016-06-29 09:09:37 +02:00
- BIG - IP host
required : true
server_port :
description :
- BIG - IP server port
required : false
default : 443
version_added : " 2.2 "
user :
description :
- BIG - IP username
required : true
password :
description :
- BIG - IP password
required : true
validate_certs :
description :
- If C ( no ) , SSL certificates will not be validated . This should only be used
on personally controlled sites using self - signed certificates .
required : false
default : ' yes '
choices :
- yes
- no
state :
description :
- Virtual Server state
- Absent , delete the VS if present
- C ( present ) ( and its synonym enabled ) , create if needed the VS and set
state to enabled
- C ( disabled ) , create if needed the VS and set state to disabled
required : false
default : present
choices :
- present
- absent
- enabled
- disabled
aliases : [ ]
partition :
description :
- Partition
required : false
default : ' Common '
name :
description :
- Virtual server name
required : true
aliases :
- vs
destination :
description :
- Destination IP of the virtual server ( only host is currently supported ) .
Required when state = present and vs does not exist .
required : true
aliases :
- address
- ip
port :
description :
- Port of the virtual server . Required when state = present and vs does not exist
required : false
default : None
all_profiles :
description :
- List of all Profiles ( HTTP , ClientSSL , ServerSSL , etc ) that must be used
by the virtual server
required : false
default : None
all_rules :
version_added : " 2.2 "
description :
- List of rules to be applied in priority order
required : false
default : None
pool :
description :
- Default pool for the virtual server
required : false
default : None
snat :
description :
- Source network address policy
required : false
default : None
default_persistence_profile :
description :
- Default Profile which manages the session persistence
required : false
default : None
description :
description :
- Virtual server description
required : false
default : None
2015-05-10 01:32:16 +02:00
'''
EXAMPLES = '''
2016-06-29 09:09:37 +02:00
- name : Add virtual server
bigip_virtual_server :
server : lb . mydomain . net
user : admin
password : secret
state : present
partition : MyPartition
name : myvirtualserver
destination : " {{ ansible_default_ipv4[ ' address ' ] }} "
port : 443
pool : " {{ mypool }} "
snat : Automap
description : Test Virtual Server
all_profiles :
- http
- clientssl
delegate_to : localhost
- name : Modify Port of the Virtual Server
bigip_virtual_server :
server : lb . mydomain . net
user : admin
password : secret
state : present
partition : MyPartition
name : myvirtualserver
port : 8080
delegate_to : localhost
- name : Delete virtual server
bigip_virtual_server :
server : lb . mydomain . net
user : admin
password : secret
state : absent
partition : MyPartition
name : myvirtualserver
delegate_to : localhost
2015-05-10 01:32:16 +02:00
'''
2016-01-11 22:05:51 +01:00
RETURN = '''
- - -
deleted :
2016-06-29 09:09:37 +02:00
description : Name of a virtual server that was deleted
returned : changed
type : string
sample : " my-virtual-server "
2016-01-11 22:05:51 +01:00
'''
2015-05-10 01:32:16 +02:00
# map of state values
2016-06-29 09:09:37 +02:00
STATES = {
' enabled ' : ' STATE_ENABLED ' ,
' disabled ' : ' STATE_DISABLED '
}
STATUSES = {
' enabled ' : ' SESSION_STATUS_ENABLED ' ,
' disabled ' : ' SESSION_STATUS_DISABLED ' ,
' offline ' : ' SESSION_STATUS_FORCED_DISABLED '
}
2015-05-10 01:32:16 +02:00
def vs_exists ( api , vs ) :
# hack to determine if pool exists
result = False
try :
api . LocalLB . VirtualServer . get_object_status ( virtual_servers = [ vs ] )
result = True
2016-06-29 09:09:37 +02:00
except bigsuds . OperationFailed as e :
2015-05-10 01:32:16 +02:00
if " was not found " in str ( e ) :
result = False
else :
# genuine exception
raise
return result
2016-06-29 09:09:37 +02:00
def vs_create ( api , name , destination , port , pool ) :
_profiles = [ [ { ' profile_context ' : ' PROFILE_CONTEXT_TYPE_ALL ' , ' profile_name ' : ' tcp ' } ] ]
2015-07-02 07:35:19 +02:00
created = False
# a bit of a hack to handle concurrent runs of this module.
# even though we've checked the vs doesn't exist,
# it may exist by the time we run create_vs().
# this catches the exception and does something smart
# about it!
2015-05-10 01:32:16 +02:00
try :
api . LocalLB . VirtualServer . create (
2016-06-29 09:09:37 +02:00
definitions = [ { ' name ' : [ name ] , ' address ' : [ destination ] , ' port ' : port , ' protocol ' : ' PROTOCOL_TCP ' } ] ,
wildmasks = [ ' 255.255.255.255 ' ] ,
resources = [ { ' type ' : ' RESOURCE_TYPE_POOL ' , ' default_pool_name ' : pool } ] ,
profiles = _profiles )
2015-07-02 07:35:19 +02:00
created = True
return created
2016-06-29 09:09:37 +02:00
except bigsuds . OperationFailed as e :
2015-07-02 07:35:19 +02:00
if " already exists " not in str ( e ) :
raise Exception ( ' Error on creating Virtual Server : %s ' % e )
2015-05-10 01:32:16 +02:00
2016-06-29 09:09:37 +02:00
def vs_remove ( api , name ) :
api . LocalLB . VirtualServer . delete_virtual_server (
virtual_servers = [ name ]
)
2015-05-10 01:32:16 +02:00
2016-05-08 23:33:25 +02:00
2016-06-29 09:09:37 +02:00
def get_rules ( api , name ) :
return api . LocalLB . VirtualServer . get_rule (
virtual_servers = [ name ]
) [ 0 ]
2016-05-08 23:33:25 +02:00
2016-06-29 09:09:37 +02:00
def set_rules ( api , name , rules_list ) :
updated = False
2016-05-08 23:33:25 +02:00
if rules_list is None :
return False
rules_list = list ( enumerate ( rules_list ) )
try :
2016-06-29 09:09:37 +02:00
current_rules = map ( lambda x : ( x [ ' priority ' ] , x [ ' rule_name ' ] ) , get_rules ( api , name ) )
to_add_rules = [ ]
2016-05-08 23:33:25 +02:00
for i , x in rules_list :
2016-06-29 09:09:37 +02:00
if ( i , x ) not in current_rules :
2016-05-08 23:33:25 +02:00
to_add_rules . append ( { ' priority ' : i , ' rule_name ' : x } )
2016-06-29 09:09:37 +02:00
to_del_rules = [ ]
2016-05-08 23:33:25 +02:00
for i , x in current_rules :
if ( i , x ) not in rules_list :
to_del_rules . append ( { ' priority ' : i , ' rule_name ' : x } )
2016-06-29 09:09:37 +02:00
if len ( to_del_rules ) > 0 :
api . LocalLB . VirtualServer . remove_rule (
virtual_servers = [ name ] ,
rules = [ to_del_rules ]
)
updated = True
if len ( to_add_rules ) > 0 :
api . LocalLB . VirtualServer . add_rule (
virtual_servers = [ name ] ,
rules = [ to_add_rules ]
)
updated = True
2016-05-08 23:33:25 +02:00
return updated
2016-06-29 09:09:37 +02:00
except bigsuds . OperationFailed as e :
2016-05-08 23:33:25 +02:00
raise Exception ( ' Error on setting profiles : %s ' % e )
2016-06-29 09:09:37 +02:00
def get_profiles ( api , name ) :
return api . LocalLB . VirtualServer . get_profile (
virtual_servers = [ name ]
) [ 0 ]
2015-05-10 01:32:16 +02:00
2016-06-29 09:09:37 +02:00
def set_profiles ( api , name , profiles_list ) :
updated = False
2015-07-01 22:26:32 +02:00
try :
if profiles_list is None :
return False
2016-06-29 09:09:37 +02:00
current_profiles = map ( lambda x : x [ ' profile_name ' ] , get_profiles ( api , name ) )
to_add_profiles = [ ]
2015-07-01 22:26:32 +02:00
for x in profiles_list :
if x not in current_profiles :
to_add_profiles . append ( { ' profile_context ' : ' PROFILE_CONTEXT_TYPE_ALL ' , ' profile_name ' : x } )
2016-06-29 09:09:37 +02:00
to_del_profiles = [ ]
2015-07-01 22:26:32 +02:00
for x in current_profiles :
2016-06-29 09:09:37 +02:00
if ( x not in profiles_list ) and ( x != " /Common/tcp " ) :
2015-07-01 22:26:32 +02:00
to_del_profiles . append ( { ' profile_context ' : ' PROFILE_CONTEXT_TYPE_ALL ' , ' profile_name ' : x } )
2016-06-29 09:09:37 +02:00
if len ( to_del_profiles ) > 0 :
api . LocalLB . VirtualServer . remove_profile (
virtual_servers = [ name ] ,
profiles = [ to_del_profiles ]
)
updated = True
if len ( to_add_profiles ) > 0 :
api . LocalLB . VirtualServer . add_profile (
virtual_servers = [ name ] ,
profiles = [ to_add_profiles ]
)
updated = True
2015-07-01 22:26:32 +02:00
return updated
2016-06-29 09:09:37 +02:00
except bigsuds . OperationFailed as e :
2015-07-01 22:26:32 +02:00
raise Exception ( ' Error on setting profiles : %s ' % e )
2015-05-10 01:32:16 +02:00
2016-06-29 09:09:37 +02:00
def set_snat ( api , name , snat ) :
2015-07-01 22:26:32 +02:00
updated = False
try :
2016-06-29 09:09:37 +02:00
current_state = get_snat_type ( api , name )
2015-07-01 22:26:32 +02:00
if snat is None :
2015-10-01 20:59:28 +02:00
return updated
2015-11-18 06:09:28 +01:00
elif snat == ' None ' and current_state != ' SRC_TRANS_NONE ' :
2016-06-29 09:09:37 +02:00
api . LocalLB . VirtualServer . set_source_address_translation_none (
virtual_servers = [ name ]
)
2015-07-01 22:26:32 +02:00
updated = True
2015-11-18 06:09:28 +01:00
elif snat == ' Automap ' and current_state != ' SRC_TRANS_AUTOMAP ' :
2016-06-29 09:09:37 +02:00
api . LocalLB . VirtualServer . set_source_address_translation_automap (
virtual_servers = [ name ]
)
2015-07-01 22:26:32 +02:00
updated = True
return updated
2016-06-29 09:09:37 +02:00
except bigsuds . OperationFailed as e :
2015-07-01 22:26:32 +02:00
raise Exception ( ' Error on setting snat : %s ' % e )
2015-05-10 01:32:16 +02:00
2016-06-29 09:09:37 +02:00
def get_snat_type ( api , name ) :
return api . LocalLB . VirtualServer . get_source_address_translation_type (
virtual_servers = [ name ]
) [ 0 ]
2015-05-10 01:32:16 +02:00
2016-06-29 09:09:37 +02:00
def get_pool ( api , name ) :
return api . LocalLB . VirtualServer . get_default_pool_name (
virtual_servers = [ name ]
) [ 0 ]
def set_pool ( api , name , pool ) :
updated = False
2015-07-01 22:26:32 +02:00
try :
2016-06-29 09:09:37 +02:00
current_pool = get_pool ( api , name )
2015-07-01 22:26:32 +02:00
if pool is not None and ( pool != current_pool ) :
2016-06-29 09:09:37 +02:00
api . LocalLB . VirtualServer . set_default_pool_name (
virtual_servers = [ name ] ,
default_pools = [ pool ]
)
updated = True
2015-07-01 22:26:32 +02:00
return updated
2016-06-29 09:09:37 +02:00
except bigsuds . OperationFailed as e :
2015-07-01 22:26:32 +02:00
raise Exception ( ' Error on setting pool : %s ' % e )
2015-05-10 01:32:16 +02:00
2016-06-29 09:09:37 +02:00
def get_destination ( api , name ) :
return api . LocalLB . VirtualServer . get_destination_v2 (
virtual_servers = [ name ]
) [ 0 ]
2015-05-10 01:32:16 +02:00
2016-06-29 09:09:37 +02:00
def set_destination ( api , name , destination ) :
updated = False
2015-07-01 22:26:32 +02:00
try :
2016-06-29 09:09:37 +02:00
current_destination = get_destination ( api , name )
if destination is not None and destination != current_destination [ ' address ' ] :
api . LocalLB . VirtualServer . set_destination_v2 (
virtual_servers = [ name ] ,
destinations = [ { ' address ' : destination , ' port ' : current_destination [ ' port ' ] } ]
)
updated = True
2015-07-01 22:26:32 +02:00
return updated
2016-06-29 09:09:37 +02:00
except bigsuds . OperationFailed as e :
raise Exception ( ' Error on setting destination : %s ' % e )
2015-07-01 22:26:32 +02:00
2015-05-10 01:32:16 +02:00
2016-06-29 09:09:37 +02:00
def set_port ( api , name , port ) :
updated = False
2015-10-01 20:59:28 +02:00
try :
2016-06-29 09:09:37 +02:00
current_destination = get_destination ( api , name )
if port is not None and port != current_destination [ ' port ' ] :
api . LocalLB . VirtualServer . set_destination_v2 (
virtual_servers = [ name ] ,
destinations = [ { ' address ' : current_destination [ ' address ' ] , ' port ' : port } ]
)
updated = True
2015-10-01 20:59:28 +02:00
return updated
2016-06-29 09:09:37 +02:00
except bigsuds . OperationFailed as e :
raise Exception ( ' Error on setting port : %s ' % e )
2015-10-01 20:59:28 +02:00
2016-06-29 09:09:37 +02:00
def get_state ( api , name ) :
return api . LocalLB . VirtualServer . get_enabled_state (
virtual_servers = [ name ]
) [ 0 ]
2015-10-01 20:59:28 +02:00
2016-06-29 09:09:37 +02:00
def set_state ( api , name , state ) :
updated = False
2015-11-18 06:52:03 +01:00
try :
2016-06-29 09:09:37 +02:00
current_state = get_state ( api , name )
2015-11-18 06:52:03 +01:00
# We consider that being present is equivalent to enabled
if state == ' present ' :
2016-06-29 09:09:37 +02:00
state = ' enabled '
2015-11-18 06:52:03 +01:00
if STATES [ state ] != current_state :
2016-06-29 09:09:37 +02:00
api . LocalLB . VirtualServer . set_enabled_state (
virtual_servers = [ name ] ,
states = [ STATES [ state ] ]
)
updated = True
2015-11-18 06:52:03 +01:00
return updated
2016-06-29 09:09:37 +02:00
except bigsuds . OperationFailed as e :
raise Exception ( ' Error on setting state : %s ' % e )
2015-05-10 01:32:16 +02:00
2016-06-29 09:09:37 +02:00
def get_description ( api , name ) :
return api . LocalLB . VirtualServer . get_description (
virtual_servers = [ name ]
) [ 0 ]
2015-05-10 01:32:16 +02:00
2016-06-29 09:09:37 +02:00
def set_description ( api , name , description ) :
updated = False
2015-07-01 22:26:32 +02:00
try :
2016-06-29 09:09:37 +02:00
current_description = get_description ( api , name )
2015-07-01 22:26:32 +02:00
if description is not None and current_description != description :
2016-06-29 09:09:37 +02:00
api . LocalLB . VirtualServer . set_description (
virtual_servers = [ name ] ,
descriptions = [ description ]
)
updated = True
2015-07-01 22:26:32 +02:00
return updated
2016-06-29 09:09:37 +02:00
except bigsuds . OperationFailed as e :
2015-07-01 22:26:32 +02:00
raise Exception ( ' Error on setting description : %s ' % e )
2015-05-10 01:32:16 +02:00
2015-07-02 08:20:29 +02:00
2016-06-29 09:09:37 +02:00
def get_persistence_profiles ( api , name ) :
return api . LocalLB . VirtualServer . get_persistence_profile (
virtual_servers = [ name ]
) [ 0 ]
def set_default_persistence_profiles ( api , name , persistence_profile ) :
updated = False
2015-07-02 08:20:29 +02:00
if persistence_profile is None :
return updated
try :
2016-06-29 09:09:37 +02:00
current_persistence_profiles = get_persistence_profiles ( api , name )
default = None
2015-07-02 08:20:29 +02:00
for profile in current_persistence_profiles :
if profile [ ' default_profile ' ] :
2016-06-29 09:09:37 +02:00
default = profile [ ' profile_name ' ]
2015-07-02 08:20:29 +02:00
break
if default is not None and default != persistence_profile :
2016-06-29 09:09:37 +02:00
api . LocalLB . VirtualServer . remove_persistence_profile (
virtual_servers = [ name ] ,
profiles = [ [ { ' profile_name ' : default , ' default_profile ' : True } ] ]
)
2015-07-02 08:20:29 +02:00
if default != persistence_profile :
2016-06-29 09:09:37 +02:00
api . LocalLB . VirtualServer . add_persistence_profile (
virtual_servers = [ name ] ,
profiles = [ [ { ' profile_name ' : persistence_profile , ' default_profile ' : True } ] ]
)
updated = True
2015-07-02 08:20:29 +02:00
return updated
2016-06-29 09:09:37 +02:00
except bigsuds . OperationFailed as e :
2015-07-02 08:20:29 +02:00
raise Exception ( ' Error on setting default persistence profile : %s ' % e )
2015-05-10 01:32:16 +02:00
2016-06-29 09:09:37 +02:00
2015-05-10 01:32:16 +02:00
def main ( ) :
2015-06-04 08:30:32 +02:00
argument_spec = f5_argument_spec ( )
2016-06-29 09:09:37 +02:00
argument_spec . update ( dict (
state = dict ( type = ' str ' , default = ' present ' ,
choices = [ ' present ' , ' absent ' , ' disabled ' , ' enabled ' ] ) ,
name = dict ( type = ' str ' , required = True , aliases = [ ' vs ' ] ) ,
destination = dict ( type = ' str ' , aliases = [ ' address ' , ' ip ' ] ) ,
port = dict ( type = ' int ' ) ,
all_profiles = dict ( type = ' list ' ) ,
all_rules = dict ( type = ' list ' ) ,
pool = dict ( type = ' str ' ) ,
description = dict ( type = ' str ' ) ,
snat = dict ( type = ' str ' ) ,
default_persistence_profile = dict ( type = ' str ' )
) )
2015-06-04 08:30:32 +02:00
module = AnsibleModule (
2016-06-29 09:09:37 +02:00
argument_spec = argument_spec ,
2015-05-10 01:32:16 +02:00
supports_check_mode = True
)
2016-05-04 07:50:45 +02:00
if not bigsuds_found :
module . fail_json ( msg = " the python bigsuds module is required " )
if module . params [ ' validate_certs ' ] :
import ssl
if not hasattr ( ssl , ' SSLContext ' ) :
module . fail_json ( msg = ' bigsuds does not support verifying certificates with python < 2.7.9. Either update python or set validate_certs=False on the task ' )
server = module . params [ ' server ' ]
2016-06-23 11:33:49 +02:00
server_port = module . params [ ' server_port ' ]
2016-05-04 07:50:45 +02:00
user = module . params [ ' user ' ]
password = module . params [ ' password ' ]
state = module . params [ ' state ' ]
partition = module . params [ ' partition ' ]
validate_certs = module . params [ ' validate_certs ' ]
2016-06-29 09:09:37 +02:00
name = fq_name ( partition , module . params [ ' name ' ] )
destination = module . params [ ' destination ' ]
port = module . params [ ' port ' ]
all_profiles = fq_list_names ( partition , module . params [ ' all_profiles ' ] )
all_rules = fq_list_names ( partition , module . params [ ' all_rules ' ] )
pool = fq_name ( partition , module . params [ ' pool ' ] )
2015-05-10 01:32:16 +02:00
description = module . params [ ' description ' ]
snat = module . params [ ' snat ' ]
2016-06-29 09:09:37 +02:00
default_persistence_profile = fq_name ( partition , module . params [ ' default_persistence_profile ' ] )
2015-05-10 01:32:16 +02:00
if 1 > port > 65535 :
module . fail_json ( msg = " valid ports must be in range 1 - 65535 " )
2016-06-29 09:09:37 +02:00
2015-05-10 01:32:16 +02:00
try :
2016-06-23 11:33:49 +02:00
api = bigip_api ( server , user , password , validate_certs , port = server_port )
2015-05-10 01:32:16 +02:00
result = { ' changed ' : False } # default
if state == ' absent ' :
2015-11-18 06:09:28 +01:00
if not module . check_mode :
2016-06-29 09:09:37 +02:00
if vs_exists ( api , name ) :
2015-11-18 06:09:28 +01:00
# hack to handle concurrent runs of module
# pool might be gone before we actually remove
try :
2016-06-29 09:09:37 +02:00
vs_remove ( api , name )
result = { ' changed ' : True , ' deleted ' : name }
except bigsuds . OperationFailed as e :
2015-11-18 06:09:28 +01:00
if " was not found " in str ( e ) :
2016-06-29 09:09:37 +02:00
result [ ' changed ' ] = False
2015-11-18 06:09:28 +01:00
else :
raise
else :
# check-mode return value
result = { ' changed ' : True }
2015-05-10 01:32:16 +02:00
2015-11-18 06:52:03 +01:00
else :
2015-05-10 01:32:16 +02:00
update = False
if not vs_exists ( api , name ) :
if ( not destination ) or ( not port ) :
module . fail_json ( msg = " both destination and port must be supplied to create a VS " )
if not module . check_mode :
# a bit of a hack to handle concurrent runs of this module.
2015-11-18 06:09:28 +01:00
# even though we've checked the virtual_server doesn't exist,
# it may exist by the time we run virtual_server().
2015-05-10 01:32:16 +02:00
# this catches the exception and does something smart
# about it!
try :
2016-06-29 09:09:37 +02:00
vs_create ( api , name , destination , port , pool )
set_profiles ( api , name , all_profiles )
set_rules ( api , name , all_rules )
set_snat ( api , name , snat )
set_description ( api , name , description )
set_default_persistence_profiles ( api , name , default_persistence_profile )
set_state ( api , name , state )
2015-07-02 07:35:19 +02:00
result = { ' changed ' : True }
2016-06-29 09:09:37 +02:00
except bigsuds . OperationFailed as e :
2015-11-18 06:09:28 +01:00
raise Exception ( ' Error on creating Virtual Server : %s ' % e )
2015-05-10 01:32:16 +02:00
else :
# check-mode return value
result = { ' changed ' : True }
else :
update = True
if update :
# VS exists
if not module . check_mode :
# Have a transaction for all the changes
2015-07-01 22:26:32 +02:00
try :
api . System . Session . start_transaction ( )
2016-06-29 09:09:37 +02:00
result [ ' changed ' ] | = set_destination ( api , name , fq_name ( partition , destination ) )
result [ ' changed ' ] | = set_port ( api , name , port )
result [ ' changed ' ] | = set_pool ( api , name , pool )
result [ ' changed ' ] | = set_description ( api , name , description )
result [ ' changed ' ] | = set_snat ( api , name , snat )
result [ ' changed ' ] | = set_profiles ( api , name , all_profiles )
result [ ' changed ' ] | = set_rules ( api , name , all_rules )
result [ ' changed ' ] | = set_default_persistence_profiles ( api , name , default_persistence_profile )
result [ ' changed ' ] | = set_state ( api , name , state )
2015-07-01 22:26:32 +02:00
api . System . Session . submit_transaction ( )
2016-06-29 09:09:37 +02:00
except Exception as e :
2015-07-01 22:26:32 +02:00
raise Exception ( " Error on updating Virtual Server : %s " % e )
2015-05-10 01:32:16 +02:00
else :
# check-mode return value
result = { ' changed ' : True }
2016-06-29 09:09:37 +02:00
except Exception as e :
2015-05-10 01:32:16 +02:00
module . fail_json ( msg = " received exception: %s " % e )
module . exit_json ( * * result )
# import module snippets
from ansible . module_utils . basic import *
2015-06-04 08:30:32 +02:00
from ansible . module_utils . f5 import *
2015-10-01 20:59:28 +02:00
if __name__ == ' __main__ ' :
main ( )