#!/usr/bin/python # -*- coding: utf-8 -*- # (c) 2015, Etienne Carriere # # This file is part of Ansible # # Ansible is free software: you can redistribute it and/or modify # it under the terms of the GNU General Public License as published by # the Free Software Foundation, either version 3 of the License, or # (at your option) any later version. # # Ansible is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # # You should have received a copy of the GNU General Public License # along with Ansible. If not, see . DOCUMENTATION = ''' --- module: bigip_virtual_server short_description: "Manages F5 BIG-IP LTM virtual servers" description: - "Manages F5 BIG-IP LTM virtual servers via iControl SOAP API" version_added: "2.1" author: - Etienne Carriere (@Etienne-Carriere) - Tim Rupp (@caphrim007) notes: - "Requires BIG-IP software version >= 11" - "F5 developed module 'bigsuds' required (see http://devcentral.f5.com)" - "Best run as a local_action in your playbook" requirements: - bigsuds options: server: description: - BIG-IP host required: true server_port: description: - BIG-IP server port required: false default: 443 version_added: "2.2" user: description: - BIG-IP username required: true password: description: - BIG-IP password required: true validate_certs: description: - If C(no), SSL certificates will not be validated. This should only be used on personally controlled sites using self-signed certificates. required: false default: 'yes' choices: - yes - no state: description: - Virtual Server state - Absent, delete the VS if present - C(present) (and its synonym enabled), create if needed the VS and set state to enabled - C(disabled), create if needed the VS and set state to disabled required: false default: present choices: - present - absent - enabled - disabled aliases: [] partition: description: - Partition required: false default: 'Common' name: description: - Virtual server name required: true aliases: - vs destination: description: - Destination IP of the virtual server (only host is currently supported). Required when state=present and vs does not exist. required: true aliases: - address - ip port: description: - Port of the virtual server . Required when state=present and vs does not exist required: false default: None all_profiles: description: - List of all Profiles (HTTP,ClientSSL,ServerSSL,etc) that must be used by the virtual server required: false default: None all_rules: version_added: "2.2" description: - List of rules to be applied in priority order required: false default: None pool: description: - Default pool for the virtual server required: false default: None snat: description: - Source network address policy required: false default: None default_persistence_profile: description: - Default Profile which manages the session persistence required: false default: None description: description: - Virtual server description required: false default: None ''' EXAMPLES = ''' - name: Add virtual server bigip_virtual_server: server: lb.mydomain.net user: admin password: secret state: present partition: MyPartition name: myvirtualserver destination: "{{ ansible_default_ipv4['address'] }}" port: 443 pool: "{{ mypool }}" snat: Automap description: Test Virtual Server all_profiles: - http - clientssl delegate_to: localhost - name: Modify Port of the Virtual Server bigip_virtual_server: server: lb.mydomain.net user: admin password: secret state: present partition: MyPartition name: myvirtualserver port: 8080 delegate_to: localhost - name: Delete virtual server bigip_virtual_server: server: lb.mydomain.net user: admin password: secret state: absent partition: MyPartition name: myvirtualserver delegate_to: localhost ''' RETURN = ''' --- deleted: description: Name of a virtual server that was deleted returned: changed type: string sample: "my-virtual-server" ''' # map of state values STATES = { 'enabled': 'STATE_ENABLED', 'disabled': 'STATE_DISABLED' } STATUSES = { 'enabled': 'SESSION_STATUS_ENABLED', 'disabled': 'SESSION_STATUS_DISABLED', 'offline': 'SESSION_STATUS_FORCED_DISABLED' } def vs_exists(api, vs): # hack to determine if pool exists result = False try: api.LocalLB.VirtualServer.get_object_status(virtual_servers=[vs]) result = True except bigsuds.OperationFailed as e: if "was not found" in str(e): result = False else: # genuine exception raise return result def vs_create(api, name, destination, port, pool): _profiles = [[{'profile_context': 'PROFILE_CONTEXT_TYPE_ALL', 'profile_name': 'tcp'}]] created = False # a bit of a hack to handle concurrent runs of this module. # even though we've checked the vs doesn't exist, # it may exist by the time we run create_vs(). # this catches the exception and does something smart # about it! try: api.LocalLB.VirtualServer.create( definitions=[{'name': [name], 'address': [destination], 'port': port, 'protocol': 'PROTOCOL_TCP'}], wildmasks=['255.255.255.255'], resources=[{'type': 'RESOURCE_TYPE_POOL', 'default_pool_name': pool}], profiles=_profiles) created = True return created except bigsuds.OperationFailed as e: if "already exists" not in str(e): raise Exception('Error on creating Virtual Server : %s' % e) def vs_remove(api, name): api.LocalLB.VirtualServer.delete_virtual_server( virtual_servers=[name] ) def get_rules(api, name): return api.LocalLB.VirtualServer.get_rule( virtual_servers=[name] )[0] def set_rules(api, name, rules_list): updated = False if rules_list is None: return False rules_list = list(enumerate(rules_list)) try: current_rules = map(lambda x: (x['priority'], x['rule_name']), get_rules(api, name)) to_add_rules = [] for i, x in rules_list: if (i, x) not in current_rules: to_add_rules.append({'priority': i, 'rule_name': x}) to_del_rules = [] for i, x in current_rules: if (i, x) not in rules_list: to_del_rules.append({'priority': i, 'rule_name': x}) if len(to_del_rules) > 0: api.LocalLB.VirtualServer.remove_rule( virtual_servers=[name], rules=[to_del_rules] ) updated = True if len(to_add_rules) > 0: api.LocalLB.VirtualServer.add_rule( virtual_servers=[name], rules=[to_add_rules] ) updated = True return updated except bigsuds.OperationFailed as e: raise Exception('Error on setting profiles : %s' % e) def get_profiles(api, name): return api.LocalLB.VirtualServer.get_profile( virtual_servers=[name] )[0] def set_profiles(api, name, profiles_list): updated = False try: if profiles_list is None: return False current_profiles = map(lambda x: x['profile_name'], get_profiles(api, name)) to_add_profiles = [] for x in profiles_list: if x not in current_profiles: to_add_profiles.append({'profile_context': 'PROFILE_CONTEXT_TYPE_ALL', 'profile_name': x}) to_del_profiles = [] for x in current_profiles: if (x not in profiles_list) and (x != "/Common/tcp"): to_del_profiles.append({'profile_context': 'PROFILE_CONTEXT_TYPE_ALL', 'profile_name': x}) if len(to_del_profiles) > 0: api.LocalLB.VirtualServer.remove_profile( virtual_servers=[name], profiles=[to_del_profiles] ) updated = True if len(to_add_profiles) > 0: api.LocalLB.VirtualServer.add_profile( virtual_servers=[name], profiles=[to_add_profiles] ) updated = True return updated except bigsuds.OperationFailed as e: raise Exception('Error on setting profiles : %s' % e) def set_snat(api, name, snat): updated = False try: current_state = get_snat_type(api, name) if snat is None: return updated elif snat == 'None' and current_state != 'SRC_TRANS_NONE': api.LocalLB.VirtualServer.set_source_address_translation_none( virtual_servers=[name] ) updated = True elif snat == 'Automap' and current_state != 'SRC_TRANS_AUTOMAP': api.LocalLB.VirtualServer.set_source_address_translation_automap( virtual_servers=[name] ) updated = True return updated except bigsuds.OperationFailed as e: raise Exception('Error on setting snat : %s' % e) def get_snat_type(api, name): return api.LocalLB.VirtualServer.get_source_address_translation_type( virtual_servers=[name] )[0] def get_pool(api, name): return api.LocalLB.VirtualServer.get_default_pool_name( virtual_servers=[name] )[0] def set_pool(api, name, pool): updated = False try: current_pool = get_pool(api, name) if pool is not None and (pool != current_pool): api.LocalLB.VirtualServer.set_default_pool_name( virtual_servers=[name], default_pools=[pool] ) updated = True return updated except bigsuds.OperationFailed as e: raise Exception('Error on setting pool : %s' % e) def get_destination(api, name): return api.LocalLB.VirtualServer.get_destination_v2( virtual_servers=[name] )[0] def set_destination(api, name, destination): updated = False try: current_destination = get_destination(api, name) if destination is not None and destination != current_destination['address']: api.LocalLB.VirtualServer.set_destination_v2( virtual_servers=[name], destinations=[{'address': destination, 'port': current_destination['port']}] ) updated = True return updated except bigsuds.OperationFailed as e: raise Exception('Error on setting destination : %s' % e) def set_port(api, name, port): updated = False try: current_destination = get_destination(api, name) if port is not None and port != current_destination['port']: api.LocalLB.VirtualServer.set_destination_v2( virtual_servers=[name], destinations=[{'address': current_destination['address'], 'port': port}] ) updated = True return updated except bigsuds.OperationFailed as e: raise Exception('Error on setting port : %s' % e) def get_state(api, name): return api.LocalLB.VirtualServer.get_enabled_state( virtual_servers=[name] )[0] def set_state(api, name, state): updated = False try: current_state = get_state(api, name) # We consider that being present is equivalent to enabled if state == 'present': state = 'enabled' if STATES[state] != current_state: api.LocalLB.VirtualServer.set_enabled_state( virtual_servers=[name], states=[STATES[state]] ) updated = True return updated except bigsuds.OperationFailed as e: raise Exception('Error on setting state : %s' % e) def get_description(api, name): return api.LocalLB.VirtualServer.get_description( virtual_servers=[name] )[0] def set_description(api, name, description): updated = False try: current_description = get_description(api, name) if description is not None and current_description != description: api.LocalLB.VirtualServer.set_description( virtual_servers=[name], descriptions=[description] ) updated = True return updated except bigsuds.OperationFailed as e: raise Exception('Error on setting description : %s ' % e) def get_persistence_profiles(api, name): return api.LocalLB.VirtualServer.get_persistence_profile( virtual_servers=[name] )[0] def set_default_persistence_profiles(api, name, persistence_profile): updated = False if persistence_profile is None: return updated try: current_persistence_profiles = get_persistence_profiles(api, name) default = None for profile in current_persistence_profiles: if profile['default_profile']: default = profile['profile_name'] break if default is not None and default != persistence_profile: api.LocalLB.VirtualServer.remove_persistence_profile( virtual_servers=[name], profiles=[[{'profile_name': default, 'default_profile': True}]] ) if default != persistence_profile: api.LocalLB.VirtualServer.add_persistence_profile( virtual_servers=[name], profiles=[[{'profile_name': persistence_profile, 'default_profile': True}]] ) updated = True return updated except bigsuds.OperationFailed as e: raise Exception('Error on setting default persistence profile : %s' % e) def main(): argument_spec = f5_argument_spec() argument_spec.update(dict( state=dict(type='str', default='present', choices=['present', 'absent', 'disabled', 'enabled']), name=dict(type='str', required=True, aliases=['vs']), destination=dict(type='str', aliases=['address', 'ip']), port=dict(type='int'), all_profiles=dict(type='list'), all_rules=dict(type='list'), pool=dict(type='str'), description=dict(type='str'), snat=dict(type='str'), default_persistence_profile=dict(type='str') )) module = AnsibleModule( argument_spec=argument_spec, supports_check_mode=True ) if not bigsuds_found: module.fail_json(msg="the python bigsuds module is required") if module.params['validate_certs']: import ssl if not hasattr(ssl, 'SSLContext'): module.fail_json(msg='bigsuds does not support verifying certificates with python < 2.7.9. Either update python or set validate_certs=False on the task') server = module.params['server'] server_port = module.params['server_port'] user = module.params['user'] password = module.params['password'] state = module.params['state'] partition = module.params['partition'] validate_certs = module.params['validate_certs'] name = fq_name(partition, module.params['name']) destination = module.params['destination'] port = module.params['port'] all_profiles = fq_list_names(partition, module.params['all_profiles']) all_rules = fq_list_names(partition, module.params['all_rules']) pool = fq_name(partition, module.params['pool']) description = module.params['description'] snat = module.params['snat'] default_persistence_profile = fq_name(partition, module.params['default_persistence_profile']) if 1 > port > 65535: module.fail_json(msg="valid ports must be in range 1 - 65535") try: api = bigip_api(server, user, password, validate_certs, port=server_port) result = {'changed': False} # default if state == 'absent': if not module.check_mode: if vs_exists(api, name): # hack to handle concurrent runs of module # pool might be gone before we actually remove try: vs_remove(api, name) result = {'changed': True, 'deleted': name} except bigsuds.OperationFailed as e: if "was not found" in str(e): result['changed'] = False else: raise else: # check-mode return value result = {'changed': True} else: update = False if not vs_exists(api, name): if (not destination) or (not port): module.fail_json(msg="both destination and port must be supplied to create a VS") if not module.check_mode: # a bit of a hack to handle concurrent runs of this module. # even though we've checked the virtual_server doesn't exist, # it may exist by the time we run virtual_server(). # this catches the exception and does something smart # about it! try: vs_create(api, name, destination, port, pool) set_profiles(api, name, all_profiles) set_rules(api, name, all_rules) set_snat(api, name, snat) set_description(api, name, description) set_default_persistence_profiles(api, name, default_persistence_profile) set_state(api, name, state) result = {'changed': True} except bigsuds.OperationFailed as e: raise Exception('Error on creating Virtual Server : %s' % e) else: # check-mode return value result = {'changed': True} else: update = True if update: # VS exists if not module.check_mode: # Have a transaction for all the changes try: api.System.Session.start_transaction() result['changed'] |= set_destination(api, name, fq_name(partition, destination)) result['changed'] |= set_port(api, name, port) result['changed'] |= set_pool(api, name, pool) result['changed'] |= set_description(api, name, description) result['changed'] |= set_snat(api, name, snat) result['changed'] |= set_profiles(api, name, all_profiles) result['changed'] |= set_rules(api, name, all_rules) result['changed'] |= set_default_persistence_profiles(api, name, default_persistence_profile) result['changed'] |= set_state(api, name, state) api.System.Session.submit_transaction() except Exception as e: raise Exception("Error on updating Virtual Server : %s" % e) else: # check-mode return value result = {'changed': True} except Exception as e: module.fail_json(msg="received exception: %s" % e) module.exit_json(**result) # import module snippets from ansible.module_utils.basic import * from ansible.module_utils.f5 import * if __name__ == '__main__': main()