adds eos_local shared module to handle local connections (#20960)
* adds support for eapi * adds support for cli * adds doc fragement
This commit is contained in:
parent
309a37de86
commit
1d7c71ce50
2 changed files with 550 additions and 0 deletions
445
lib/ansible/module_utils/eos_local.py
Normal file
445
lib/ansible/module_utils/eos_local.py
Normal file
|
@ -0,0 +1,445 @@
|
||||||
|
#
|
||||||
|
# This code is part of Ansible, but is an independent component.
|
||||||
|
#
|
||||||
|
# This particular file snippet, and this file snippet only, is BSD licensed.
|
||||||
|
# Modules you write using this snippet, which is embedded dynamically by Ansible
|
||||||
|
# still belong to the author of the module, and may assign their own license
|
||||||
|
# to the complete work.
|
||||||
|
#
|
||||||
|
# (c) 2017 Red Hat, Inc.
|
||||||
|
#
|
||||||
|
# Redistribution and use in source and binary forms, with or without modification,
|
||||||
|
# are permitted provided that the following conditions are met:
|
||||||
|
#
|
||||||
|
# * Redistributions of source code must retain the above copyright
|
||||||
|
# notice, this list of conditions and the following disclaimer.
|
||||||
|
# * Redistributions in binary form must reproduce the above copyright notice,
|
||||||
|
# this list of conditions and the following disclaimer in the documentation
|
||||||
|
# and/or other materials provided with the distribution.
|
||||||
|
#
|
||||||
|
# THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND
|
||||||
|
# ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
|
||||||
|
# WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
|
||||||
|
# IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT,
|
||||||
|
# INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
|
||||||
|
# PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
|
||||||
|
# INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
||||||
|
# LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE
|
||||||
|
# USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
||||||
|
#
|
||||||
|
import re
|
||||||
|
import time
|
||||||
|
|
||||||
|
from ansible.module_utils.shell import CliBase
|
||||||
|
from ansible.module_utils.basic import env_fallback, get_exception
|
||||||
|
from ansible.module_utils.network_common import to_list
|
||||||
|
from ansible.module_utils.netcli import Command
|
||||||
|
from ansible.module_utils.six import iteritems
|
||||||
|
from ansible.module_utils.network import NetworkError
|
||||||
|
from ansible.module_utils.urls import fetch_url
|
||||||
|
|
||||||
|
_DEVICE_CONNECTION = None
|
||||||
|
|
||||||
|
eos_local_argument_spec = {
|
||||||
|
'host': dict(),
|
||||||
|
'port': dict(type='int'),
|
||||||
|
|
||||||
|
'username': dict(fallback=(env_fallback, ['ANSIBLE_NET_USERNAME'])),
|
||||||
|
'password': dict(fallback=(env_fallback, ['ANSIBLE_NET_PASSWORD']), no_log=True),
|
||||||
|
|
||||||
|
'authorize': dict(fallback=(env_fallback, ['ANSIBLE_NET_AUTHORIZE']), type='bool'),
|
||||||
|
'auth_pass': dict(no_log=True, fallback=(env_fallback, ['ANSIBLE_NET_AUTH_PASS'])),
|
||||||
|
|
||||||
|
'use_ssl': dict(type='bool'),
|
||||||
|
'validate_certs': dict(type='bool'),
|
||||||
|
'timeout': dict(type='int'),
|
||||||
|
|
||||||
|
'provider': dict(type='dict'),
|
||||||
|
|
||||||
|
'transport': dict(choices=['cli', 'eapi'])
|
||||||
|
}
|
||||||
|
|
||||||
|
def check_args(module, warnings):
|
||||||
|
provider = module.params['provider'] or {}
|
||||||
|
for key in ('host', 'username', 'password'):
|
||||||
|
if not module.params[key] and not provider.get(key):
|
||||||
|
module.fail_json(msg='missing required argument %s' % key)
|
||||||
|
|
||||||
|
def load_params(module):
|
||||||
|
provider = module.params.get('provider') or dict()
|
||||||
|
for key, value in iteritems(provider):
|
||||||
|
if key in eos_local_argument_spec:
|
||||||
|
if module.params.get(key) is None and value is not None:
|
||||||
|
module.params[key] = value
|
||||||
|
|
||||||
|
def get_connection(module):
|
||||||
|
global _DEVICE_CONNECTION
|
||||||
|
if not _DEVICE_CONNECTION:
|
||||||
|
load_params(module)
|
||||||
|
if module.params['transport'] == 'eapi':
|
||||||
|
conn = Eapi(module)
|
||||||
|
else:
|
||||||
|
conn = Cli(module)
|
||||||
|
_DEVICE_CONNECTION = conn
|
||||||
|
return _DEVICE_CONNECTION
|
||||||
|
|
||||||
|
|
||||||
|
class Cli(CliBase):
|
||||||
|
|
||||||
|
CLI_PROMPTS_RE = [
|
||||||
|
re.compile(r"[\r\n]?[\w+\-\.:\/\[\]]+(?:\([^\)]+\)){,3}(?:>|#) ?$"),
|
||||||
|
re.compile(r"\[\w+\@[\w\-\.]+(?: [^\]])\] ?[>#\$] ?$")
|
||||||
|
]
|
||||||
|
|
||||||
|
CLI_ERRORS_RE = [
|
||||||
|
re.compile(r"% ?Error"),
|
||||||
|
re.compile(r"^% \w+", re.M),
|
||||||
|
re.compile(r"% ?Bad secret"),
|
||||||
|
re.compile(r"invalid input", re.I),
|
||||||
|
re.compile(r"(?:incomplete|ambiguous) command", re.I),
|
||||||
|
re.compile(r"connection timed out", re.I),
|
||||||
|
re.compile(r"[^\r\n]+ not found", re.I),
|
||||||
|
re.compile(r"'[^']' +returned error code: ?\d+"),
|
||||||
|
re.compile(r"[^\r\n]\/bin\/(?:ba)?sh")
|
||||||
|
]
|
||||||
|
|
||||||
|
def __init__(self, module):
|
||||||
|
self._module = module
|
||||||
|
super(Cli, self).__init__()
|
||||||
|
|
||||||
|
try:
|
||||||
|
self.connect()
|
||||||
|
except NetworkError:
|
||||||
|
exc = get_exception()
|
||||||
|
self._module.fail_json(msg=str(exc))
|
||||||
|
|
||||||
|
if module.params['authorize']:
|
||||||
|
self.authorize()
|
||||||
|
|
||||||
|
def connect(self):
|
||||||
|
super(Cli, self).connect(self._module.params, kickstart=False)
|
||||||
|
self.shell.send('terminal length 0')
|
||||||
|
|
||||||
|
def authorize(self):
|
||||||
|
passwd = self._module.params['auth_pass']
|
||||||
|
if passwd:
|
||||||
|
prompt = r"[\r\n]?Password: $"
|
||||||
|
self.execute(dict(command='enable', prompt=prompt, response=passwd))
|
||||||
|
else:
|
||||||
|
self.exec_command('enable')
|
||||||
|
|
||||||
|
def check_authorization(self):
|
||||||
|
for cmd in ['show clock', 'prompt()']:
|
||||||
|
rc, out, err = self.exec_command(cmd)
|
||||||
|
return out.endswith('#')
|
||||||
|
|
||||||
|
def supports_sessions(self):
|
||||||
|
conn = get_connection(self)
|
||||||
|
rc, out, err = self.exec_command('show configuration sessions')
|
||||||
|
return rc == 0
|
||||||
|
|
||||||
|
def get_config(self, flags=[]):
|
||||||
|
"""Retrieves the current config from the device or cache
|
||||||
|
"""
|
||||||
|
cmd = 'show running-config '
|
||||||
|
cmd += ' '.join(flags)
|
||||||
|
cmd = cmd.strip()
|
||||||
|
|
||||||
|
try:
|
||||||
|
return _DEVICE_CONFIGS[cmd]
|
||||||
|
except KeyError:
|
||||||
|
conn = get_connection(self)
|
||||||
|
rc, out, err = self.exec_command(cmd)
|
||||||
|
if rc != 0:
|
||||||
|
self._module.fail_json(msg=err)
|
||||||
|
cfg = str(out).strip()
|
||||||
|
_DEVICE_CONFIGS[cmd] = cfg
|
||||||
|
return cfg
|
||||||
|
|
||||||
|
def run_commands(self, commands, check_rc=True):
|
||||||
|
"""Run list of commands on remote device and return results
|
||||||
|
"""
|
||||||
|
responses = list()
|
||||||
|
|
||||||
|
for cmd in to_list(commands):
|
||||||
|
rc, out, err = self.exec_command(cmd)
|
||||||
|
|
||||||
|
if check_rc and rc != 0:
|
||||||
|
self._module.fail_json(msg=err)
|
||||||
|
|
||||||
|
try:
|
||||||
|
out = self._module.from_json(out)
|
||||||
|
except ValueError:
|
||||||
|
out = str(out).strip()
|
||||||
|
|
||||||
|
responses.append(out)
|
||||||
|
return responses
|
||||||
|
|
||||||
|
def send_config(self, commands):
|
||||||
|
multiline = False
|
||||||
|
for command in to_list(commands):
|
||||||
|
if command == 'end':
|
||||||
|
pass
|
||||||
|
|
||||||
|
if command.startswith('banner') or multiline:
|
||||||
|
multiline = True
|
||||||
|
command = self._module.jsonify({'command': command, 'sendonly': True})
|
||||||
|
elif command == 'EOF' and multiline:
|
||||||
|
multiline = False
|
||||||
|
|
||||||
|
rc, out, err = self.exec_command(command)
|
||||||
|
if rc != 0:
|
||||||
|
return (rc, out, err)
|
||||||
|
return (rc, 'ok','')
|
||||||
|
|
||||||
|
|
||||||
|
def configure(self, commands):
|
||||||
|
"""Sends configuration commands to the remote device
|
||||||
|
"""
|
||||||
|
if not check_authorization(self):
|
||||||
|
self._module.fail_json(msg='configuration operations require privilege escalation')
|
||||||
|
|
||||||
|
conn = get_connection(self)
|
||||||
|
|
||||||
|
rc, out, err = self.exec_command('configure')
|
||||||
|
if rc != 0:
|
||||||
|
self._module.fail_json(msg='unable to enter configuration mode', output=err)
|
||||||
|
|
||||||
|
rc, out, err = send_config(self, commands)
|
||||||
|
if rc != 0:
|
||||||
|
self._module.fail_json(msg=err)
|
||||||
|
|
||||||
|
self.exec_command('end')
|
||||||
|
return {}
|
||||||
|
|
||||||
|
def load_config(self, commands, commit=False, replace=False):
|
||||||
|
"""Loads the config commands onto the remote device
|
||||||
|
"""
|
||||||
|
if not check_authorization(self):
|
||||||
|
self._module.fail_json(msg='configuration operations require privilege escalation')
|
||||||
|
|
||||||
|
use_session = os.getenv('ANSIBLE_EOS_USE_SESSIONS', True)
|
||||||
|
try:
|
||||||
|
use_session = int(use_session)
|
||||||
|
except ValueError:
|
||||||
|
pass
|
||||||
|
|
||||||
|
if not all((bool(use_session), supports_sessions(self))):
|
||||||
|
return configure(self, commands)
|
||||||
|
|
||||||
|
conn = get_connection(self)
|
||||||
|
session = 'ansible_%s' % int(time.time())
|
||||||
|
result = {'session': session}
|
||||||
|
|
||||||
|
rc, out, err = self.exec_command('configure session %s' % session)
|
||||||
|
if rc != 0:
|
||||||
|
self._module.fail_json(msg='unable to enter configuration mode', output=err)
|
||||||
|
|
||||||
|
if replace:
|
||||||
|
self.exec_command('rollback clean-config', check_rc=True)
|
||||||
|
|
||||||
|
rc, out, err = send_config(self, commands)
|
||||||
|
if rc != 0:
|
||||||
|
self.exec_command('abort')
|
||||||
|
conn.fail_json(msg=err, commands=commands)
|
||||||
|
|
||||||
|
rc, out, err = self.exec_command('show session-config diffs')
|
||||||
|
if rc == 0:
|
||||||
|
result['diff'] = out.strip()
|
||||||
|
|
||||||
|
if commit:
|
||||||
|
self.exec_command('commit')
|
||||||
|
else:
|
||||||
|
self.exec_command('abort')
|
||||||
|
|
||||||
|
return result
|
||||||
|
|
||||||
|
class Eapi:
|
||||||
|
|
||||||
|
def __init__(self, module):
|
||||||
|
self._module = module
|
||||||
|
self._enable = None
|
||||||
|
self._session_support = None
|
||||||
|
self._device_config = {}
|
||||||
|
|
||||||
|
host = module.params['host']
|
||||||
|
port = module.params['port']
|
||||||
|
|
||||||
|
self._module.params['url_username'] = self._module.params['username']
|
||||||
|
self._module.params['url_password'] = self._module.params['password']
|
||||||
|
|
||||||
|
if module.params['use_ssl']:
|
||||||
|
proto = 'https'
|
||||||
|
if not port:
|
||||||
|
port = 443
|
||||||
|
else:
|
||||||
|
proto = 'http'
|
||||||
|
if not port:
|
||||||
|
port = 80
|
||||||
|
|
||||||
|
self._url = '%s://%s:%s/command-api' % (proto, host, port)
|
||||||
|
|
||||||
|
if module.params['auth_pass']:
|
||||||
|
self._enable = {'cmd': 'enable', 'input': module.params['auth_pass']}
|
||||||
|
else:
|
||||||
|
self._enable = 'enable'
|
||||||
|
|
||||||
|
def _request_builder(self, commands, output, reqid=None):
|
||||||
|
params = dict(version=1, cmds=commands, format=output)
|
||||||
|
return dict(jsonrpc='2.0', id=reqid, method='runCmds', params=params)
|
||||||
|
|
||||||
|
def send_request(self, commands, output='text'):
|
||||||
|
commands = to_list(commands)
|
||||||
|
|
||||||
|
if self._enable:
|
||||||
|
commands.insert(0, 'enable')
|
||||||
|
|
||||||
|
body = self._request_builder(commands, output)
|
||||||
|
data = self._module.jsonify(body)
|
||||||
|
|
||||||
|
headers = {'Content-Type': 'application/json-rpc'}
|
||||||
|
timeout = self._module.params['timeout']
|
||||||
|
|
||||||
|
response, headers = fetch_url(
|
||||||
|
self._module, self._url, data=data, headers=headers,
|
||||||
|
method='POST', timeout=timeout
|
||||||
|
)
|
||||||
|
|
||||||
|
if headers['status'] != 200:
|
||||||
|
self._module.fail_json(**headers)
|
||||||
|
|
||||||
|
try:
|
||||||
|
data = response.read()
|
||||||
|
response = self._module.from_json(data)
|
||||||
|
except ValueError:
|
||||||
|
self._module.fail_json(msg='unable to load response from device', data=data)
|
||||||
|
|
||||||
|
if self._enable and 'result' in response:
|
||||||
|
response['result'].pop(0)
|
||||||
|
|
||||||
|
return response
|
||||||
|
|
||||||
|
def run_commands(self, commands):
|
||||||
|
"""Runs list of commands on remote device and returns results
|
||||||
|
"""
|
||||||
|
output = None
|
||||||
|
queue = list()
|
||||||
|
responses = list()
|
||||||
|
|
||||||
|
def _send(commands, output):
|
||||||
|
response = self.send_request(commands, output=output)
|
||||||
|
if 'error' in response:
|
||||||
|
err = response['error']
|
||||||
|
self._module.fail_json(msg=err['message'], code=err['code'])
|
||||||
|
return response['result']
|
||||||
|
|
||||||
|
for item in to_list(commands):
|
||||||
|
if all((output == 'json', is_text(item))) or all((output =='text', is_json(item))):
|
||||||
|
responses.extend(_send(queue, output))
|
||||||
|
queue = list()
|
||||||
|
|
||||||
|
if is_json(item):
|
||||||
|
output = 'json'
|
||||||
|
else:
|
||||||
|
output = 'text'
|
||||||
|
|
||||||
|
queue.append(item)
|
||||||
|
|
||||||
|
if queue:
|
||||||
|
responses.extend(_send(queue, output))
|
||||||
|
|
||||||
|
for index, item in enumerate(commands):
|
||||||
|
if is_text(item):
|
||||||
|
responses[index] = responses[index]['output'].strip()
|
||||||
|
|
||||||
|
return responses
|
||||||
|
|
||||||
|
def get_config(self, flags=[]):
|
||||||
|
"""Retrieves the current config from the device or cache
|
||||||
|
"""
|
||||||
|
cmd = 'show running-config '
|
||||||
|
cmd += ' '.join(flags)
|
||||||
|
cmd = cmd.strip()
|
||||||
|
|
||||||
|
try:
|
||||||
|
return self._device_configs[cmd]
|
||||||
|
except KeyError:
|
||||||
|
out = self.send_request(cmd)
|
||||||
|
cfg = str(out['result'][0]['output']).strip()
|
||||||
|
self._device_configs[cmd] = cfg
|
||||||
|
return cfg
|
||||||
|
|
||||||
|
def supports_sessions(self):
|
||||||
|
if self._session_support:
|
||||||
|
return self._session_support
|
||||||
|
response = self.send_request(['show configuration sessions'])
|
||||||
|
self._session_support = 'error' not in response
|
||||||
|
return self._session_support
|
||||||
|
|
||||||
|
def configure(self, commands):
|
||||||
|
"""Sends the ordered set of commands to the device
|
||||||
|
"""
|
||||||
|
cmds = ['configure terminal']
|
||||||
|
cmds.extend(commands)
|
||||||
|
|
||||||
|
responses = self.send_request(commands)
|
||||||
|
if 'error' in response:
|
||||||
|
err = response['error']
|
||||||
|
self._module.fail_json(msg=err['message'], code=err['code'])
|
||||||
|
|
||||||
|
return responses[1:]
|
||||||
|
|
||||||
|
def load_config(self, config, commit=False, replace=False):
|
||||||
|
"""Loads the configuration onto the remote devices
|
||||||
|
|
||||||
|
If the device doesn't support configuration sessions, this will
|
||||||
|
fallback to using configure() to load the commands. If that happens,
|
||||||
|
there will be no returned diff or session values
|
||||||
|
"""
|
||||||
|
if not supports_sessions():
|
||||||
|
return configure(self, commands)
|
||||||
|
|
||||||
|
session = 'ansible_%s' % int(time.time())
|
||||||
|
result = {'session': session}
|
||||||
|
commands = ['configure session %s' % session]
|
||||||
|
|
||||||
|
if replace:
|
||||||
|
commands.append('rollback clean-config')
|
||||||
|
|
||||||
|
commands.extend(config)
|
||||||
|
|
||||||
|
response = self.send_request(commands)
|
||||||
|
if 'error' in response:
|
||||||
|
commands = ['configure session %s' % session, 'abort']
|
||||||
|
self.send_request(commands)
|
||||||
|
err = response['error']
|
||||||
|
self._module.fail_json(msg=err['message'], code=err['code'])
|
||||||
|
|
||||||
|
commands = ['configure session %s' % session, 'show session-config diffs']
|
||||||
|
if commit:
|
||||||
|
commands.append('commit')
|
||||||
|
else:
|
||||||
|
commands.append('abort')
|
||||||
|
|
||||||
|
response = self.send_request(commands, output='text')
|
||||||
|
diff = response['result'][1]['output']
|
||||||
|
if diff:
|
||||||
|
result['diff'] = diff
|
||||||
|
|
||||||
|
return result
|
||||||
|
|
||||||
|
is_json = lambda x: str(x).endswith('| json')
|
||||||
|
is_text = lambda x: not str(x).endswith('| json')
|
||||||
|
|
||||||
|
def get_config(module, flags=[]):
|
||||||
|
conn = get_connection(module)
|
||||||
|
return conn.get_config(flags)
|
||||||
|
|
||||||
|
def run_commands(module, commands):
|
||||||
|
conn = get_connection(module)
|
||||||
|
return conn.run_commands(commands)
|
||||||
|
|
||||||
|
def load_config(module, config, commit=False, replace=False):
|
||||||
|
conn = get_connection(module)
|
||||||
|
return conn.load_config(config, commit, replace)
|
||||||
|
|
105
lib/ansible/utils/module_docs_fragments/eos_local.py
Normal file
105
lib/ansible/utils/module_docs_fragments/eos_local.py
Normal file
|
@ -0,0 +1,105 @@
|
||||||
|
#
|
||||||
|
# (c) 2015, Peter Sprygada <psprygada@ansible.com>
|
||||||
|
#
|
||||||
|
# This file is part of Ansible
|
||||||
|
#
|
||||||
|
# Ansible is free software: you can redistribute it and/or modify
|
||||||
|
# it under the terms of the GNU General Public License as published by
|
||||||
|
# the Free Software Foundation, either version 3 of the License, or
|
||||||
|
# (at your option) any later version.
|
||||||
|
#
|
||||||
|
# Ansible is distributed in the hope that it will be useful,
|
||||||
|
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||||
|
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||||
|
# GNU General Public License for more details.
|
||||||
|
#
|
||||||
|
# You should have received a copy of the GNU General Public License
|
||||||
|
# along with Ansible. If not, see <http://www.gnu.org/licenses/>.
|
||||||
|
|
||||||
|
|
||||||
|
class ModuleDocFragment(object):
|
||||||
|
|
||||||
|
# Standard files documentation fragment
|
||||||
|
DOCUMENTATION = """
|
||||||
|
options:
|
||||||
|
host:
|
||||||
|
description:
|
||||||
|
- Specifies the DNS host name or address for connecting to the remote
|
||||||
|
device over the specified transport. The value of host is used as
|
||||||
|
the destination address for the transport.
|
||||||
|
required: true
|
||||||
|
port:
|
||||||
|
description:
|
||||||
|
- Specifies the port to use when building the connection to the remote
|
||||||
|
device. This value applies to either I(cli) or I(eapi). The port
|
||||||
|
value will default to the appropriate transport common port if
|
||||||
|
none is provided in the task. (cli=22, http=80, https=443).
|
||||||
|
required: false
|
||||||
|
default: null
|
||||||
|
username:
|
||||||
|
description:
|
||||||
|
- Configures the username to use to authenticate the connection to
|
||||||
|
the remote device. The value of I(username) is used to authenticate
|
||||||
|
either the CLI login or the eAPI authentication depending on which
|
||||||
|
transport is used. If the value is not specified in the task, the
|
||||||
|
value of environment variable C(ANSIBLE_NET_USERNAME) will be used instead.
|
||||||
|
required: false
|
||||||
|
password:
|
||||||
|
description:
|
||||||
|
- Specifies the password to use to authenticate the connection to
|
||||||
|
the remote device. This is a common argument used for either I(cli)
|
||||||
|
or I(eapi) transports. If the value is not specified in the task, the
|
||||||
|
value of environment variable C(ANSIBLE_NET_PASSWORD) will be used instead.
|
||||||
|
required: false
|
||||||
|
default: null
|
||||||
|
ssh_keyfile:
|
||||||
|
description:
|
||||||
|
- Specifies the SSH keyfile to use to authenticate the connection to
|
||||||
|
the remote device. This argument is only used for I(cli) transports.
|
||||||
|
If the value is not specified in the task, the value of environment
|
||||||
|
variable C(ANSIBLE_NET_SSH_KEYFILE) will be used instead.
|
||||||
|
required: false
|
||||||
|
authorize:
|
||||||
|
description:
|
||||||
|
- Instructs the module to enter privileged mode on the remote device
|
||||||
|
before sending any commands. If not specified, the device will
|
||||||
|
attempt to execute all commands in non-privileged mode. If the value
|
||||||
|
is not specified in the task, the value of environment variable
|
||||||
|
C(ANSIBLE_NET_AUTHORIZE) will be used instead.
|
||||||
|
required: false
|
||||||
|
default: null
|
||||||
|
choices: ['yes', 'no']
|
||||||
|
auth_pass:
|
||||||
|
description:
|
||||||
|
- Specifies the password to use if required to enter privileged mode
|
||||||
|
on the remote device. If I(authorize) is false, then this argument
|
||||||
|
does nothing. If the value is not specified in the task, the value of
|
||||||
|
environment variable C(ANSIBLE_NET_AUTH_PASS) will be used instead.
|
||||||
|
required: false
|
||||||
|
default: null
|
||||||
|
transport:
|
||||||
|
description:
|
||||||
|
- Configures the transport connection to use when connecting to the
|
||||||
|
remote device.
|
||||||
|
required: true
|
||||||
|
choices:
|
||||||
|
- eapi
|
||||||
|
- cli
|
||||||
|
default: null
|
||||||
|
use_ssl:
|
||||||
|
description:
|
||||||
|
- Configures the I(transport) to use SSL if set to true only when the
|
||||||
|
C(transport=eapi). If the transport
|
||||||
|
argument is not eapi, this value is ignored.
|
||||||
|
required: false
|
||||||
|
default: null
|
||||||
|
choices: ['yes', 'no']
|
||||||
|
provider:
|
||||||
|
description:
|
||||||
|
- Convenience method that allows all I(eos) arguments to be passed as
|
||||||
|
a dict object. All constraints (required, choices, etc) must be
|
||||||
|
met either by individual arguments or values in this dict.
|
||||||
|
required: false
|
||||||
|
default: null
|
||||||
|
|
||||||
|
"""
|
Loading…
Reference in a new issue