mirror of
https://github.com/ansible-collections/community.general.git
synced 2025-07-25 14:20:22 -07:00
Refactor dimensiondata_network module (#21043)
* Refactor dimensiondata_network to use shared base class for common functionality. * Experiment: remove the assignments in the "except ImportError:" block that keep PyCharm happy. If this fixes the build, then I reckon there's a bug in the validate-modules script (https://github.com/ansible/ansible/blob/devel/test/sanity/validate-modules/validate-modules#L322). * Remove unused imports. * Changes based on feedback from @gundalow for ansible/ansible#21043. - Use no_log=True for mcp_password parameter. - Collapse module parameter definitions. * Use shared definitions and doc fragments for common module arguments (ansible/ansible#21043). * Make default network plan "ESSENTIALS", rather than "ADVANCED" (this is consistent with our other tooling). Tidy up module parameter documentation. * Simplify dimensiondata module documentation fragments (didn't know you could include multiple fragments). * Change 'verify_ssl_cert' module parameter to 'validate_certs'.
This commit is contained in:
parent
b5811ccb8a
commit
1a28a48176
4 changed files with 560 additions and 563 deletions
|
@ -20,119 +20,305 @@
|
||||||
# - Mark Maglana <mmaglana@gmail.com>
|
# - Mark Maglana <mmaglana@gmail.com>
|
||||||
# - Adam Friedman <tintoy@tintoy.io>
|
# - Adam Friedman <tintoy@tintoy.io>
|
||||||
#
|
#
|
||||||
# Common methods to be used by versious module components
|
# Common functionality to be used by versious module components
|
||||||
|
|
||||||
import os
|
import os
|
||||||
from ansible.module_utils.six.moves.configparser import ConfigParser
|
import re
|
||||||
from ansible.module_utils.pycompat24 import get_exception
|
|
||||||
|
from ansible.module_utils.basic import AnsibleModule
|
||||||
|
from ansible.module_utils.six.moves import configparser
|
||||||
from os.path import expanduser
|
from os.path import expanduser
|
||||||
from uuid import UUID
|
from uuid import UUID
|
||||||
|
|
||||||
try:
|
try:
|
||||||
from libcloud.common.dimensiondata import \
|
from libcloud.common.dimensiondata import API_ENDPOINTS, DimensionDataAPIException, DimensionDataStatus
|
||||||
API_ENDPOINTS, DimensionDataAPIException
|
from libcloud.compute.base import Node, NodeLocation
|
||||||
|
from libcloud.compute.providers import get_driver
|
||||||
|
from libcloud.compute.types import Provider
|
||||||
|
|
||||||
|
import libcloud.security
|
||||||
|
|
||||||
HAS_LIBCLOUD = True
|
HAS_LIBCLOUD = True
|
||||||
except ImportError:
|
except ImportError:
|
||||||
HAS_LIBCLOUD = False
|
HAS_LIBCLOUD = False
|
||||||
|
|
||||||
|
# MCP 2.x version patten for location (datacenter) names.
|
||||||
|
#
|
||||||
|
# Note that this is not a totally reliable way of determining MCP version.
|
||||||
|
# Unfortunately, libcloud's NodeLocation currently makes no provision for extended properties.
|
||||||
|
# At some point we may therefore want to either enhance libcloud or enable overriding mcp_version
|
||||||
|
# by specifying it in the module parameters.
|
||||||
|
MCP_2_LOCATION_NAME_PATTERN = re.compile(r".*MCP\s?2.*")
|
||||||
|
|
||||||
|
|
||||||
|
class DimensionDataModule(object):
|
||||||
|
"""
|
||||||
|
The base class containing common functionality used by Dimension Data modules for Ansible.
|
||||||
|
"""
|
||||||
|
|
||||||
|
def __init__(self, module):
|
||||||
|
"""
|
||||||
|
Create a new DimensionDataModule.
|
||||||
|
|
||||||
|
Will fail if Apache libcloud is not present.
|
||||||
|
|
||||||
|
:param module: The underlying Ansible module.
|
||||||
|
:type module: AnsibleModule
|
||||||
|
"""
|
||||||
|
|
||||||
|
self.module = module
|
||||||
|
|
||||||
|
if not HAS_LIBCLOUD:
|
||||||
|
self.module.fail_json(msg='libcloud is required for this module.')
|
||||||
|
|
||||||
|
return
|
||||||
|
|
||||||
|
# Credentials are common to all Dimension Data modules.
|
||||||
|
credentials = self.get_credentials()
|
||||||
|
self.user_id = credentials['user_id']
|
||||||
|
self.key = credentials['key']
|
||||||
|
|
||||||
|
# Region and location are common to all Dimension Data modules.
|
||||||
|
region = self.module.params['region']
|
||||||
|
self.region = 'dd-{}'.format(region)
|
||||||
|
self.location = self.module.params['location']
|
||||||
|
|
||||||
|
libcloud.security.VERIFY_SSL_CERT = self.module.params['validate_certs']
|
||||||
|
|
||||||
|
self.driver = get_driver(Provider.DIMENSIONDATA)(
|
||||||
|
self.user_id,
|
||||||
|
self.key,
|
||||||
|
region=self.region
|
||||||
|
)
|
||||||
|
|
||||||
|
# Determine the MCP API version (this depends on the target datacenter).
|
||||||
|
self.mcp_version = self.get_mcp_version(self.location)
|
||||||
|
|
||||||
|
# Optional "wait-for-completion" arguments
|
||||||
|
if 'wait' in self.module.params:
|
||||||
|
self.wait = self.module.params['wait']
|
||||||
|
self.wait_time = self.module.params['wait_time']
|
||||||
|
self.wait_poll_interval = self.module.params['wait_poll_interval']
|
||||||
|
else:
|
||||||
|
self.wait = False
|
||||||
|
self.wait_time = 0
|
||||||
|
self.wait_poll_interval = 0
|
||||||
|
|
||||||
|
def get_credentials(self):
|
||||||
|
"""
|
||||||
|
Get user_id and key from module configuration, environment, or dotfile.
|
||||||
|
Order of priority is module, environment, dotfile.
|
||||||
|
|
||||||
|
To set in environment:
|
||||||
|
|
||||||
|
export MCP_USER='myusername'
|
||||||
|
export MCP_PASSWORD='mypassword'
|
||||||
|
|
||||||
|
To set in dot file place a file at ~/.dimensiondata with
|
||||||
|
the following contents:
|
||||||
|
|
||||||
|
[dimensiondatacloud]
|
||||||
|
MCP_USER: myusername
|
||||||
|
MCP_PASSWORD: mypassword
|
||||||
|
"""
|
||||||
|
|
||||||
|
if not HAS_LIBCLOUD:
|
||||||
|
self.module.fail_json(msg='libcloud is required for this module.')
|
||||||
|
|
||||||
|
return None
|
||||||
|
|
||||||
|
user_id = None
|
||||||
|
key = None
|
||||||
|
|
||||||
|
# First, try the module configuration
|
||||||
|
if 'mcp_user' in self.module.params:
|
||||||
|
if 'mcp_password' not in self.module.params:
|
||||||
|
self.module.fail_json(
|
||||||
|
msg='"mcp_user" parameter was specified, but not "mcp_password" (either both must be specified, or neither).'
|
||||||
|
)
|
||||||
|
|
||||||
|
return None
|
||||||
|
|
||||||
|
user_id = self.module.params['mcp_user']
|
||||||
|
key = self.module.params['mcp_password']
|
||||||
|
|
||||||
|
# Fall back to environment
|
||||||
|
if not user_id or not key:
|
||||||
|
user_id = os.environ.get('MCP_USER', None)
|
||||||
|
key = os.environ.get('MCP_PASSWORD', None)
|
||||||
|
|
||||||
|
# Finally, try dotfile (~/.dimensiondata)
|
||||||
|
if not user_id or not key:
|
||||||
|
home = expanduser('~')
|
||||||
|
config = configparser.RawConfigParser()
|
||||||
|
config.read("%s/.dimensiondata" % home)
|
||||||
|
|
||||||
|
try:
|
||||||
|
user_id = config.get("dimensiondatacloud", "MCP_USER")
|
||||||
|
key = config.get("dimensiondatacloud", "MCP_PASSWORD")
|
||||||
|
except (configparser.NoSectionError, configparser.NoOptionError):
|
||||||
|
pass
|
||||||
|
|
||||||
|
# One or more credentials not found. Function can't recover from this
|
||||||
|
# so it has to raise an error instead of fail silently.
|
||||||
|
if not user_id:
|
||||||
|
raise MissingCredentialsError("Dimension Data user id not found")
|
||||||
|
elif not key:
|
||||||
|
raise MissingCredentialsError("Dimension Data key not found")
|
||||||
|
|
||||||
|
# Both found, return data
|
||||||
|
return dict(user_id=user_id, key=key)
|
||||||
|
|
||||||
|
def get_mcp_version(self, location):
|
||||||
|
"""
|
||||||
|
Get the MCP version for the specified location.
|
||||||
|
"""
|
||||||
|
|
||||||
|
location = self.driver.ex_get_location_by_id(location)
|
||||||
|
if MCP_2_LOCATION_NAME_PATTERN.match(location.name):
|
||||||
|
return '2.0'
|
||||||
|
|
||||||
|
return '1.0'
|
||||||
|
|
||||||
|
def get_network_domain(self, locator, location):
|
||||||
|
"""
|
||||||
|
Retrieve a network domain by its name or Id.
|
||||||
|
"""
|
||||||
|
|
||||||
|
if is_uuid(locator):
|
||||||
|
network_domain = self.driver.ex_get_network_domain(locator)
|
||||||
|
else:
|
||||||
|
matching_network_domains = [
|
||||||
|
network_domain for network_domain in self.driver.ex_list_network_domains(location=location)
|
||||||
|
if network_domain.name == locator
|
||||||
|
]
|
||||||
|
|
||||||
|
if matching_network_domains:
|
||||||
|
network_domain = matching_network_domains[0]
|
||||||
|
else:
|
||||||
|
network_domain = None
|
||||||
|
|
||||||
|
if network_domain:
|
||||||
|
return network_domain
|
||||||
|
|
||||||
|
raise UnknownNetworkError("Network '%s' could not be found" % locator)
|
||||||
|
|
||||||
|
def get_vlan(self, locator, location, network_domain):
|
||||||
|
"""
|
||||||
|
Get a VLAN object by its name or id
|
||||||
|
"""
|
||||||
|
if is_uuid(locator):
|
||||||
|
vlan = self.driver.ex_get_vlan(locator)
|
||||||
|
else:
|
||||||
|
matching_vlans = [
|
||||||
|
vlan for vlan in self.driver.ex_list_vlans(location, network_domain)
|
||||||
|
if vlan.name == locator
|
||||||
|
]
|
||||||
|
|
||||||
|
if matching_vlans:
|
||||||
|
vlan = matching_vlans[0]
|
||||||
|
else:
|
||||||
|
vlan = None
|
||||||
|
|
||||||
|
if vlan:
|
||||||
|
return vlan
|
||||||
|
|
||||||
|
raise UnknownVLANError("VLAN '%s' could not be found" % locator)
|
||||||
|
|
||||||
|
@staticmethod
|
||||||
|
def argument_spec(**additional_argument_spec):
|
||||||
|
"""
|
||||||
|
Build an argument specification for a Dimension Data module.
|
||||||
|
:param additional_argument_spec: An optional dictionary representing the specification for additional module arguments (if any).
|
||||||
|
:return: A dict containing the argument specification.
|
||||||
|
"""
|
||||||
|
|
||||||
|
spec = dict(
|
||||||
|
region=dict(type='str', default='na'),
|
||||||
|
mcp_user=dict(type='str', required=False),
|
||||||
|
mcp_password=dict(type='str', required=False, no_log=True),
|
||||||
|
location=dict(type='str', required=True),
|
||||||
|
validate_certs=dict(type='bool', required=False, default=True)
|
||||||
|
)
|
||||||
|
|
||||||
|
if additional_argument_spec:
|
||||||
|
spec.update(additional_argument_spec)
|
||||||
|
|
||||||
|
return spec
|
||||||
|
|
||||||
|
@staticmethod
|
||||||
|
def argument_spec_with_wait(**additional_argument_spec):
|
||||||
|
"""
|
||||||
|
Build an argument specification for a Dimension Data module that includes "wait for completion" arguments.
|
||||||
|
:param additional_argument_spec: An optional dictionary representing the specification for additional module arguments (if any).
|
||||||
|
:return: A dict containing the argument specification.
|
||||||
|
"""
|
||||||
|
|
||||||
|
spec = DimensionDataModule.argument_spec(
|
||||||
|
wait=dict(type='bool', required=False, default=False),
|
||||||
|
wait_time=dict(type='int', required=False, default=600),
|
||||||
|
wait_poll_interval=dict(type='int', required=False, default=2)
|
||||||
|
)
|
||||||
|
|
||||||
|
if additional_argument_spec:
|
||||||
|
spec.update(additional_argument_spec)
|
||||||
|
|
||||||
|
return spec
|
||||||
|
|
||||||
|
@staticmethod
|
||||||
|
def required_together(*additional_required_together):
|
||||||
|
"""
|
||||||
|
Get the basic argument specification for Dimension Data modules indicating which arguments are must be specified together.
|
||||||
|
:param additional_required_together: An optional list representing the specification for additional module arguments that must be specified together.
|
||||||
|
:return: An array containing the argument specifications.
|
||||||
|
"""
|
||||||
|
|
||||||
|
required_together = [
|
||||||
|
['mcp_user', 'mcp_password']
|
||||||
|
]
|
||||||
|
|
||||||
|
if additional_required_together:
|
||||||
|
required_together.extend(additional_required_together)
|
||||||
|
|
||||||
|
return required_together
|
||||||
|
|
||||||
# Custom Exceptions
|
|
||||||
|
|
||||||
class LibcloudNotFound(Exception):
|
class LibcloudNotFound(Exception):
|
||||||
|
"""
|
||||||
|
Exception raised when Apache libcloud cannot be found.
|
||||||
|
"""
|
||||||
|
|
||||||
pass
|
pass
|
||||||
|
|
||||||
|
|
||||||
class MissingCredentialsError(Exception):
|
class MissingCredentialsError(Exception):
|
||||||
|
"""
|
||||||
|
Exception raised when credentials for Dimension Data CloudControl cannot be found.
|
||||||
|
"""
|
||||||
|
|
||||||
pass
|
pass
|
||||||
|
|
||||||
|
|
||||||
class UnknownNetworkError(Exception):
|
class UnknownNetworkError(Exception):
|
||||||
|
"""
|
||||||
|
Exception raised when a network or network domain cannot be found.
|
||||||
|
"""
|
||||||
|
|
||||||
pass
|
pass
|
||||||
|
|
||||||
|
|
||||||
class UnknownVLANError(Exception):
|
class UnknownVLANError(Exception):
|
||||||
|
"""
|
||||||
|
Exception raised when a VLAN cannot be found.
|
||||||
|
"""
|
||||||
|
|
||||||
pass
|
pass
|
||||||
|
|
||||||
|
|
||||||
def check_libcloud_or_fail():
|
|
||||||
"""
|
|
||||||
Checks if libcloud is installed and fails if not
|
|
||||||
"""
|
|
||||||
if not HAS_LIBCLOUD:
|
|
||||||
raise LibcloudNotFound("apache-libcloud is required.")
|
|
||||||
|
|
||||||
|
|
||||||
def get_credentials(module):
|
|
||||||
"""
|
|
||||||
Get user_id and key from module configuration, environment, or dotfile.
|
|
||||||
Order of priority is module, environment, dotfile.
|
|
||||||
|
|
||||||
To set in environment:
|
|
||||||
|
|
||||||
export MCP_USER='myusername'
|
|
||||||
export MCP_PASSWORD='mypassword'
|
|
||||||
|
|
||||||
To set in dot file place a file at ~/.dimensiondata with
|
|
||||||
the following contents:
|
|
||||||
|
|
||||||
[dimensiondatacloud]
|
|
||||||
MCP_USER: myusername
|
|
||||||
MCP_PASSWORD: mypassword
|
|
||||||
"""
|
|
||||||
|
|
||||||
if not HAS_LIBCLOUD:
|
|
||||||
module.fail_json(msg='libcloud is required for this module.')
|
|
||||||
|
|
||||||
return None
|
|
||||||
|
|
||||||
user_id = None
|
|
||||||
key = None
|
|
||||||
|
|
||||||
# First, try the module configuration
|
|
||||||
if 'mcp_user' in module.params:
|
|
||||||
if 'mcp_password' not in module.params:
|
|
||||||
module.fail_json(
|
|
||||||
'"mcp_user" parameter was specified, but not "mcp_password" ' +
|
|
||||||
'(either both must be specified, or neither).'
|
|
||||||
)
|
|
||||||
|
|
||||||
return None
|
|
||||||
|
|
||||||
user_id = module.params['mcp_user']
|
|
||||||
key = module.params['mcp_password']
|
|
||||||
|
|
||||||
# Fall back to environment
|
|
||||||
if not user_id or not key:
|
|
||||||
user_id = os.environ.get('MCP_USER', None)
|
|
||||||
key = os.environ.get('MCP_PASSWORD', None)
|
|
||||||
|
|
||||||
# Finally, try dotfile (~/.dimensiondata)
|
|
||||||
if not user_id or not key:
|
|
||||||
home = expanduser('~')
|
|
||||||
config = ConfigParser.RawConfigParser()
|
|
||||||
config.read("%s/.dimensiondata" % home)
|
|
||||||
|
|
||||||
try:
|
|
||||||
user_id = config.get("dimensiondatacloud", "MCP_USER")
|
|
||||||
key = config.get("dimensiondatacloud", "MCP_PASSWORD")
|
|
||||||
except (ConfigParser.NoSectionError, ConfigParser.NoOptionError):
|
|
||||||
pass
|
|
||||||
|
|
||||||
# One or more credentials not found. Function can't recover from this
|
|
||||||
# so it has to raise an error instead of fail silently.
|
|
||||||
if not user_id:
|
|
||||||
raise MissingCredentialsError("Dimension Data user id not found")
|
|
||||||
elif not key:
|
|
||||||
raise MissingCredentialsError("Dimension Data key not found")
|
|
||||||
|
|
||||||
# Both found, return data
|
|
||||||
return dict(user_id=user_id, key=key)
|
|
||||||
|
|
||||||
|
|
||||||
def get_dd_regions():
|
def get_dd_regions():
|
||||||
"""
|
"""
|
||||||
Get the list of available regions whose vendor is Dimension Data.
|
Get the list of available regions whose vendor is Dimension Data.
|
||||||
"""
|
"""
|
||||||
check_libcloud_or_fail()
|
|
||||||
|
|
||||||
# Get endpoints
|
# Get endpoints
|
||||||
all_regions = API_ENDPOINTS.keys()
|
all_regions = API_ENDPOINTS.keys()
|
||||||
|
@ -143,284 +329,13 @@ def get_dd_regions():
|
||||||
return regions
|
return regions
|
||||||
|
|
||||||
|
|
||||||
def get_network_domain_by_name(driver, name, location):
|
|
||||||
"""
|
|
||||||
Get a network domain object by its name
|
|
||||||
"""
|
|
||||||
networks = driver.ex_list_network_domains(location=location)
|
|
||||||
found_networks = [network for network in networks if network.name == name]
|
|
||||||
|
|
||||||
if not found_networks:
|
|
||||||
raise UnknownNetworkError("Network '%s' could not be found" % name)
|
|
||||||
|
|
||||||
return found_networks[0]
|
|
||||||
|
|
||||||
|
|
||||||
def get_network_domain(driver, locator, location):
|
|
||||||
"""
|
|
||||||
Get a network domain object by its name or id
|
|
||||||
"""
|
|
||||||
if is_uuid(locator):
|
|
||||||
net_id = locator
|
|
||||||
else:
|
|
||||||
name = locator
|
|
||||||
networks = driver.ex_list_network_domains(location=location)
|
|
||||||
found_networks = [network for network in networks if network.name == name]
|
|
||||||
|
|
||||||
if not found_networks:
|
|
||||||
raise UnknownNetworkError("Network '%s' could not be found" % name)
|
|
||||||
|
|
||||||
net_id = found_networks[0].id
|
|
||||||
|
|
||||||
return driver.ex_get_network_domain(net_id)
|
|
||||||
|
|
||||||
|
|
||||||
def get_vlan(driver, locator, location, network_domain):
|
|
||||||
"""
|
|
||||||
Get a VLAN object by its name or id
|
|
||||||
"""
|
|
||||||
if is_uuid(locator):
|
|
||||||
vlan_id = locator
|
|
||||||
else:
|
|
||||||
vlans = driver.ex_list_vlans(location=location,
|
|
||||||
network_domain=network_domain)
|
|
||||||
found_vlans = [vlan for vlan in vlans if vlan.name == locator]
|
|
||||||
|
|
||||||
if not found_vlans:
|
|
||||||
raise UnknownVLANError("VLAN '%s' could not be found" % locator)
|
|
||||||
|
|
||||||
vlan_id = found_vlans[0].id
|
|
||||||
|
|
||||||
return driver.ex_get_vlan(vlan_id)
|
|
||||||
|
|
||||||
|
|
||||||
def get_mcp_version(driver, location):
|
|
||||||
"""
|
|
||||||
Get a locations MCP version
|
|
||||||
"""
|
|
||||||
# Get location to determine if MCP 1.0 or 2.0
|
|
||||||
location = driver.ex_get_location_by_id(location)
|
|
||||||
if 'MCP 2.0' in location.name:
|
|
||||||
return '2.0'
|
|
||||||
return '1.0'
|
|
||||||
|
|
||||||
|
|
||||||
def is_uuid(u, version=4):
|
def is_uuid(u, version=4):
|
||||||
"""
|
"""
|
||||||
Test if valid v4 UUID
|
Test if valid v4 UUID
|
||||||
"""
|
"""
|
||||||
try:
|
try:
|
||||||
uuid_obj = UUID(u, version=version)
|
uuid_obj = UUID(u, version=version)
|
||||||
|
|
||||||
return str(uuid_obj) == u
|
return str(uuid_obj) == u
|
||||||
except:
|
except ValueError:
|
||||||
return False
|
return False
|
||||||
|
|
||||||
|
|
||||||
def expand_ip_block(block):
|
|
||||||
"""
|
|
||||||
Expand public IP block to show all addresses
|
|
||||||
"""
|
|
||||||
addresses = []
|
|
||||||
ip_r = block.base_ip.split('.')
|
|
||||||
last_quad = int(ip_r[3])
|
|
||||||
address_root = "%s.%s.%s." % (ip_r[0], ip_r[1], ip_r[2])
|
|
||||||
for i in range(int(block.size)):
|
|
||||||
addresses.append(address_root + str(last_quad + i))
|
|
||||||
return addresses
|
|
||||||
|
|
||||||
|
|
||||||
def get_public_ip_block(module, driver, network_domain, block_id=False,
|
|
||||||
base_ip=False):
|
|
||||||
"""
|
|
||||||
Get public IP block details
|
|
||||||
"""
|
|
||||||
# Block ID given, try to use it.
|
|
||||||
if block_id is not False:
|
|
||||||
try:
|
|
||||||
block = driver.ex_get_public_ip_block(block_id)
|
|
||||||
except DimensionDataAPIException:
|
|
||||||
e = get_exception()
|
|
||||||
# 'UNEXPECTED_ERROR' should be removed once upstream bug is fixed.
|
|
||||||
# Currently any call to ex_get_public_ip_block where the block does
|
|
||||||
# not exist will return UNEXPECTED_ERROR rather than
|
|
||||||
# 'RESOURCE_NOT_FOUND'.
|
|
||||||
if e.code == "RESOURCE_NOT_FOUND" or e.code == 'UNEXPECTED_ERROR':
|
|
||||||
module.exit_json(changed=False, msg="Public IP Block does "
|
|
||||||
"not exist")
|
|
||||||
else:
|
|
||||||
module.fail_json(msg="Unexpected error while retrieving "
|
|
||||||
"block: %s" % e.code)
|
|
||||||
module.fail_json(msg="Error retreving Public IP Block " +
|
|
||||||
"'%s': %s" % (block.id, e.message))
|
|
||||||
# Block ID not given, try to use base_ip.
|
|
||||||
else:
|
|
||||||
blocks = list_public_ip_blocks(module, driver, network_domain)
|
|
||||||
if blocks is not False:
|
|
||||||
block = next(block for block in blocks if block.base_ip == base_ip)
|
|
||||||
else:
|
|
||||||
module.exit_json(changed=False, msg="IP block starting with "
|
|
||||||
"'%s' does not exist." % base_ip)
|
|
||||||
return block
|
|
||||||
|
|
||||||
|
|
||||||
def list_nat_rules(module, driver, network_domain):
|
|
||||||
"""
|
|
||||||
Get list of NAT rules for domain
|
|
||||||
"""
|
|
||||||
try:
|
|
||||||
return driver.ex_list_nat_rules(network_domain)
|
|
||||||
except DimensionDataAPIException:
|
|
||||||
e = get_exception()
|
|
||||||
module.fail_json(msg="Failed to list NAT rules: %s" % e.message)
|
|
||||||
|
|
||||||
|
|
||||||
def list_public_ip_blocks(module, driver, network_domain):
|
|
||||||
"""
|
|
||||||
Get list of public IP blocks for a domain
|
|
||||||
"""
|
|
||||||
try:
|
|
||||||
blocks = driver.ex_list_public_ip_blocks(network_domain)
|
|
||||||
return blocks
|
|
||||||
except DimensionDataAPIException:
|
|
||||||
e = get_exception()
|
|
||||||
|
|
||||||
module.fail_json(msg="Error retreving Public IP Blocks: %s" % e)
|
|
||||||
|
|
||||||
|
|
||||||
def get_block_allocation(module, cp_driver, lb_driver, network_domain, block):
|
|
||||||
"""
|
|
||||||
Get public IP block allocation details. Shows all ips in block and if
|
|
||||||
they are allocated. Example:
|
|
||||||
|
|
||||||
{'id': 'eb8b16ca-3c91-45fb-b04b-5d7d387a9f4a',
|
|
||||||
'addresses': [{'address': '162.2.100.100',
|
|
||||||
'allocated': True
|
|
||||||
},
|
|
||||||
{'address': '162.2.100.101',
|
|
||||||
'allocated': False
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
"""
|
|
||||||
nat_rules = list_nat_rules(module, cp_driver, network_domain)
|
|
||||||
balancers = list_balancers(module, lb_driver)
|
|
||||||
pub_ip_block = get_public_ip_block(module, cp_driver, network_domain,
|
|
||||||
block.id, False)
|
|
||||||
pub_ips = expand_ip_block(pub_ip_block)
|
|
||||||
block_detailed = {'id': block.id, 'addresses': []}
|
|
||||||
for ip in pub_ips:
|
|
||||||
allocated = False
|
|
||||||
|
|
||||||
nat_match = [nat_rule for nat_rule in nat_rules
|
|
||||||
if nat_rule.external_ip == ip]
|
|
||||||
lb_match = [balancer for balancer in balancers
|
|
||||||
if balancer.ip == ip]
|
|
||||||
|
|
||||||
if len(nat_match) > 0 or len(lb_match) > 0:
|
|
||||||
allocated = True
|
|
||||||
else:
|
|
||||||
allocated = False
|
|
||||||
|
|
||||||
block_detailed['addresses'].append({'address': ip,
|
|
||||||
'allocated': allocated})
|
|
||||||
return block_detailed
|
|
||||||
|
|
||||||
|
|
||||||
def list_balancers(module, lb_driver):
|
|
||||||
try:
|
|
||||||
return lb_driver.list_balancers()
|
|
||||||
except DimensionDataAPIException:
|
|
||||||
e = get_exception()
|
|
||||||
|
|
||||||
module.fail_json(msg="Failed to list Load Balancers: %s" % e.message)
|
|
||||||
|
|
||||||
|
|
||||||
def get_blocks_with_unallocated(module, cp_driver, lb_driver, network_domain):
|
|
||||||
"""
|
|
||||||
Gets ip blocks with one or more unallocated IPs.
|
|
||||||
ex:
|
|
||||||
{'unallocated_count': <total count of unallocated ips>,
|
|
||||||
'ip_blocks': [<list of expanded blocks with details
|
|
||||||
(see get_block_allocation())>],
|
|
||||||
'unallocated_addresses': [<list of unallocated ip addresses>]
|
|
||||||
}
|
|
||||||
"""
|
|
||||||
total_unallocated_ips = 0
|
|
||||||
all_blocks = list_public_ip_blocks(module, cp_driver, network_domain)
|
|
||||||
unalloc_blocks = []
|
|
||||||
unalloc_addresses = []
|
|
||||||
for block in all_blocks:
|
|
||||||
d_blocks = get_block_allocation(module, cp_driver, lb_driver,
|
|
||||||
network_domain, block)
|
|
||||||
i = 0
|
|
||||||
for addr in d_blocks['addresses']:
|
|
||||||
if addr['allocated'] is False:
|
|
||||||
if i == 0:
|
|
||||||
unalloc_blocks.append(d_blocks)
|
|
||||||
unalloc_addresses.append(addr['address'])
|
|
||||||
total_unallocated_ips += 1
|
|
||||||
i += 1
|
|
||||||
return {'unallocated_count': total_unallocated_ips,
|
|
||||||
'ip_blocks': unalloc_blocks,
|
|
||||||
'unallocated_addresses': unalloc_addresses}
|
|
||||||
|
|
||||||
|
|
||||||
def get_unallocated_public_ips(module, cp_driver, lb_driver, network_domain,
|
|
||||||
reuse_free, count=0):
|
|
||||||
"""
|
|
||||||
Get and/or provision unallocated public IPs
|
|
||||||
"""
|
|
||||||
free_ips = []
|
|
||||||
if reuse_free is True:
|
|
||||||
blocks_with_unallocated = get_blocks_with_unallocated(module,
|
|
||||||
cp_driver,
|
|
||||||
lb_driver,
|
|
||||||
network_domain)
|
|
||||||
free_ips = blocks_with_unallocated['unallocated_addresses']
|
|
||||||
if len(free_ips) < count:
|
|
||||||
num_needed = count - len(free_ips)
|
|
||||||
for i in range(num_needed):
|
|
||||||
block = cp_driver.ex_add_public_ip_block_to_network_domain(
|
|
||||||
network_domain)
|
|
||||||
block_dict = get_block_allocation(module, cp_driver, lb_driver,
|
|
||||||
network_domain, block)
|
|
||||||
for addr in block_dict['addresses']:
|
|
||||||
free_ips.append(addr['address'])
|
|
||||||
if len(free_ips) >= count:
|
|
||||||
break
|
|
||||||
return {'changed': True, 'msg': 'Allocated public IP block(s)',
|
|
||||||
'addresses': free_ips[:count]}
|
|
||||||
else:
|
|
||||||
return {'changed': False, 'msg': 'Found enough unallocated IPs' +
|
|
||||||
' without provisioning.', 'addresses': free_ips}
|
|
||||||
|
|
||||||
|
|
||||||
def is_ipv4_addr(ip):
|
|
||||||
"""
|
|
||||||
Simple way to check if IPv4 address
|
|
||||||
"""
|
|
||||||
parts = ip.split('.')
|
|
||||||
try:
|
|
||||||
return len(parts) == 4 and all(0 <= int(part) < 256 for part in parts)
|
|
||||||
except:
|
|
||||||
return False
|
|
||||||
|
|
||||||
|
|
||||||
def get_node_by_name_and_ip(module, lb_driver, name, ip):
|
|
||||||
"""
|
|
||||||
Nodes do not have unique names, we need to match name and IP to be
|
|
||||||
sure we get the correct one
|
|
||||||
"""
|
|
||||||
nodes = lb_driver.ex_get_nodes()
|
|
||||||
found_nodes = []
|
|
||||||
if not is_ipv4_addr(ip):
|
|
||||||
module.fail_json(msg="Node '%s' ip is not a valid IPv4 address" % ip)
|
|
||||||
|
|
||||||
found_nodes = [node for node in nodes
|
|
||||||
if node.name == name and node.ip == ip]
|
|
||||||
if len(found_nodes) == 0:
|
|
||||||
return None
|
|
||||||
elif len(found_nodes) == 1:
|
|
||||||
return found_nodes[0]
|
|
||||||
else:
|
|
||||||
module.fail_json(msg="More than one node of name '%s' found." % name)
|
|
||||||
|
|
|
@ -22,42 +22,24 @@
|
||||||
# - Adam Friedman <tintoy@tintoy.io>
|
# - Adam Friedman <tintoy@tintoy.io>
|
||||||
#
|
#
|
||||||
|
|
||||||
ANSIBLE_METADATA = {'status': ['preview'],
|
ANSIBLE_METADATA = {
|
||||||
'supported_by': 'community',
|
'status': ['preview'],
|
||||||
'version': '1.0'}
|
'supported_by': 'community',
|
||||||
|
'version': '1.0'
|
||||||
|
}
|
||||||
|
|
||||||
DOCUMENTATION = '''
|
DOCUMENTATION = '''
|
||||||
---
|
---
|
||||||
module: dimensiondata_network
|
module: dimensiondata_network
|
||||||
short_description: Create, update, and delete MCP 1.0 & 2.0 networks
|
short_description: Create, update, and delete MCP 1.0 & 2.0 networks
|
||||||
|
extends_documentation_fragment:
|
||||||
|
- dimensiondata
|
||||||
|
- dimensiondata_wait
|
||||||
description:
|
description:
|
||||||
- Create, update, and delete MCP 1.0 & 2.0 networks
|
- Create, update, and delete MCP 1.0 & 2.0 networks
|
||||||
version_added: "2.3"
|
version_added: "2.3"
|
||||||
author: 'Aimon Bustardo (@aimonb)'
|
author: 'Aimon Bustardo (@aimonb)'
|
||||||
options:
|
options:
|
||||||
region:
|
|
||||||
description:
|
|
||||||
- The target region.
|
|
||||||
- Valid regions are defined in Apache libcloud project [libcloud/common/dimensiondata.py]
|
|
||||||
- Regions are also listed in https://libcloud.readthedocs.io/en/latest/compute/drivers/dimensiondata.html
|
|
||||||
- Note that the default value "na" stands for "North America".
|
|
||||||
- The module prepends 'dd-' to the region.
|
|
||||||
default: na
|
|
||||||
mcp_user:
|
|
||||||
description:
|
|
||||||
- The username used to authenticate to the CloudControl API.
|
|
||||||
- If not specified, will fall back to MCP_USER from environment variable or ~/.dimensiondata.
|
|
||||||
required: false
|
|
||||||
mcp_password:
|
|
||||||
description:
|
|
||||||
- The password used to authenticate to the CloudControl API.
|
|
||||||
- If not specified, will fall back to MCP_PASSWORD from environment variable or ~/.dimensiondata.
|
|
||||||
- Required if mcp_user is specified.
|
|
||||||
required: false
|
|
||||||
location:
|
|
||||||
description:
|
|
||||||
- The target datacenter.
|
|
||||||
required: true
|
|
||||||
name:
|
name:
|
||||||
description:
|
description:
|
||||||
- The name of the network domain to create.
|
- The name of the network domain to create.
|
||||||
|
@ -71,27 +53,7 @@ options:
|
||||||
- The service plan, either “ESSENTIALS” or “ADVANCED”.
|
- The service plan, either “ESSENTIALS” or “ADVANCED”.
|
||||||
- MCP 2.0 Only.
|
- MCP 2.0 Only.
|
||||||
choices: [ESSENTIALS, ADVANCED]
|
choices: [ESSENTIALS, ADVANCED]
|
||||||
default: ADVANCED
|
default: ESSENTIALS
|
||||||
verify_ssl_cert:
|
|
||||||
description:
|
|
||||||
- Check that SSL certificate is valid.
|
|
||||||
required: false
|
|
||||||
default: true
|
|
||||||
wait:
|
|
||||||
description:
|
|
||||||
- Should we wait for the task to complete before moving onto the next.
|
|
||||||
required: false
|
|
||||||
default: false
|
|
||||||
wait_time:
|
|
||||||
description:
|
|
||||||
- Only applicable if wait is true. This is the amount of time in seconds to wait
|
|
||||||
required: false
|
|
||||||
default: 600
|
|
||||||
wait_poll_interval:
|
|
||||||
description:
|
|
||||||
- The amount to time inbetween polling for task completion
|
|
||||||
required: false
|
|
||||||
default: 2
|
|
||||||
state:
|
state:
|
||||||
description:
|
description:
|
||||||
- Should the resource be present or absent.
|
- Should the resource be present or absent.
|
||||||
|
@ -124,7 +86,7 @@ EXAMPLES = '''
|
||||||
RETURN = '''
|
RETURN = '''
|
||||||
network:
|
network:
|
||||||
description: Dictionary describing the network.
|
description: Dictionary describing the network.
|
||||||
returned: On success when I(state) is 'present'
|
returned: On success when I(state=present).
|
||||||
type: dictionary
|
type: dictionary
|
||||||
contains:
|
contains:
|
||||||
id:
|
id:
|
||||||
|
@ -159,181 +121,198 @@ network:
|
||||||
|
|
||||||
|
|
||||||
from ansible.module_utils.basic import AnsibleModule
|
from ansible.module_utils.basic import AnsibleModule
|
||||||
from ansible.module_utils.dimensiondata import get_credentials, DimensionDataAPIException, LibcloudNotFound
|
from ansible.module_utils.dimensiondata import DimensionDataModule, DimensionDataAPIException
|
||||||
from ansible.module_utils.pycompat24 import get_exception
|
from ansible.module_utils.pycompat24 import get_exception
|
||||||
try:
|
try:
|
||||||
from libcloud.compute.types import Provider
|
|
||||||
from libcloud.compute.providers import get_driver
|
|
||||||
from libcloud.compute.base import NodeLocation
|
from libcloud.compute.base import NodeLocation
|
||||||
import libcloud.security
|
|
||||||
HAS_LIBCLOUD = True
|
HAS_LIBCLOUD = True
|
||||||
except ImportError:
|
except ImportError:
|
||||||
HAS_LIBCLOUD = False
|
HAS_LIBCLOUD = False
|
||||||
|
|
||||||
|
|
||||||
def network_obj_to_dict(network, version):
|
class DimensionDataNetworkModule(DimensionDataModule):
|
||||||
network_dict = dict(id=network.id, name=network.name,
|
"""
|
||||||
description=network.description)
|
The dimensiondata_network module for Ansible.
|
||||||
if isinstance(network.location, NodeLocation):
|
"""
|
||||||
network_dict['location'] = network.location.id
|
|
||||||
else:
|
|
||||||
network_dict['location'] = network.location
|
|
||||||
|
|
||||||
if version == '1.0':
|
def __init__(self):
|
||||||
network_dict['private_net'] = network.private_net
|
"""
|
||||||
network_dict['multicast'] = network.multicast
|
Create a new Dimension Data network module.
|
||||||
network_dict['status'] = None
|
"""
|
||||||
else:
|
|
||||||
network_dict['private_net'] = None
|
|
||||||
network_dict['multicast'] = None
|
|
||||||
network_dict['status'] = network.status
|
|
||||||
return network_dict
|
|
||||||
|
|
||||||
|
super(DimensionDataNetworkModule, self).__init__(
|
||||||
def get_mcp_version(driver, location):
|
module=AnsibleModule(
|
||||||
# Get location to determine if MCP 1.0 or 2.0
|
argument_spec=DimensionDataModule.argument_spec_with_wait(
|
||||||
location = driver.ex_get_location_by_id(location)
|
name=dict(type='str', required=True),
|
||||||
if 'MCP 2.0' in location.name:
|
description=dict(type='str', required=False),
|
||||||
return '2.0'
|
service_plan=dict(default='ESSENTIALS', choices=['ADVANCED', 'ESSENTIALS']),
|
||||||
return '1.0'
|
state=dict(default='present', choices=['present', 'absent'])
|
||||||
|
),
|
||||||
|
required_together=DimensionDataModule.required_together()
|
||||||
def create_network(module, driver, mcp_version, location,
|
)
|
||||||
name, description):
|
|
||||||
|
|
||||||
# Make sure service_plan argument is defined
|
|
||||||
if mcp_version == '2.0' and 'service_plan' not in module.params:
|
|
||||||
module.fail_json('service_plan required when creating network and ' +
|
|
||||||
'location is MCP 2.0')
|
|
||||||
service_plan = module.params['service_plan']
|
|
||||||
|
|
||||||
# Create network
|
|
||||||
try:
|
|
||||||
if mcp_version == '1.0':
|
|
||||||
res = driver.ex_create_network(location, name,
|
|
||||||
description=description)
|
|
||||||
else:
|
|
||||||
res = driver.ex_create_network_domain(location, name,
|
|
||||||
service_plan,
|
|
||||||
description=description)
|
|
||||||
except DimensionDataAPIException:
|
|
||||||
e = get_exception()
|
|
||||||
|
|
||||||
module.fail_json(msg="Failed to create new network: %s" % str(e))
|
|
||||||
|
|
||||||
if module.params['wait'] is True:
|
|
||||||
wait_for_network_state(module, driver, res.id, 'NORMAL')
|
|
||||||
msg = "Created network %s in %s" % (name, location)
|
|
||||||
network = network_obj_to_dict(res, mcp_version)
|
|
||||||
|
|
||||||
module.exit_json(changed=True, msg=msg, network=network)
|
|
||||||
|
|
||||||
|
|
||||||
def delete_network(module, driver, matched_network, mcp_version):
|
|
||||||
try:
|
|
||||||
if mcp_version == '1.0':
|
|
||||||
res = driver.ex_delete_network(matched_network[0])
|
|
||||||
else:
|
|
||||||
res = driver.ex_delete_network_domain(matched_network[0])
|
|
||||||
if res is True:
|
|
||||||
module.exit_json(changed=True,
|
|
||||||
msg="Deleted network with id %s" %
|
|
||||||
matched_network[0].id)
|
|
||||||
|
|
||||||
module.fail_json("Unexpected failure deleting network with " +
|
|
||||||
"id %s", matched_network[0].id)
|
|
||||||
except DimensionDataAPIException:
|
|
||||||
e = get_exception()
|
|
||||||
|
|
||||||
module.fail_json(msg="Failed to delete network: %s" % str(e))
|
|
||||||
|
|
||||||
|
|
||||||
def wait_for_network_state(module, driver, net_id, state_to_wait_for):
|
|
||||||
try:
|
|
||||||
return driver.connection.wait_for_state(
|
|
||||||
state_to_wait_for, driver.ex_get_network_domain,
|
|
||||||
module.params['wait_poll_interval'],
|
|
||||||
module.params['wait_time'], net_id
|
|
||||||
)
|
)
|
||||||
except DimensionDataAPIException:
|
|
||||||
e = get_exception()
|
|
||||||
|
|
||||||
module.fail_json(msg='Network did not reach % state in time: %s'
|
self.name = self.module.params['name']
|
||||||
% (state_to_wait_for, e.msg))
|
self.description = self.module.params['description']
|
||||||
|
self.service_plan = self.module.params['service_plan']
|
||||||
|
self.state = self.module.params['state']
|
||||||
|
|
||||||
|
def state_present(self):
|
||||||
|
network = self._get_network()
|
||||||
|
|
||||||
|
if network:
|
||||||
|
self.module.exit_json(
|
||||||
|
changed=False,
|
||||||
|
msg='Network already exists',
|
||||||
|
network=self._network_to_dict(network)
|
||||||
|
)
|
||||||
|
|
||||||
|
return
|
||||||
|
|
||||||
|
network = self._create_network()
|
||||||
|
|
||||||
|
self.module.exit_json(
|
||||||
|
changed=True,
|
||||||
|
msg='Created network "%s" in datacenter "%s".' % (self.name, self.location),
|
||||||
|
network=self._network_to_dict(network)
|
||||||
|
)
|
||||||
|
|
||||||
|
def state_absent(self):
|
||||||
|
network = self._get_network()
|
||||||
|
|
||||||
|
if not network:
|
||||||
|
self.module.exit_json(
|
||||||
|
changed=False,
|
||||||
|
msg='Network "%s" does not exist' % self.name,
|
||||||
|
network=self._network_to_dict(network)
|
||||||
|
)
|
||||||
|
|
||||||
|
return
|
||||||
|
|
||||||
|
self._delete_network(network)
|
||||||
|
|
||||||
|
def _get_network(self):
|
||||||
|
if self.mcp_version == '1.0':
|
||||||
|
networks = self.driver.list_networks(location=self.location)
|
||||||
|
else:
|
||||||
|
networks = self.driver.ex_list_network_domains(location=self.location)
|
||||||
|
|
||||||
|
matched_network = [network for network in networks if network.name == self.name]
|
||||||
|
if matched_network:
|
||||||
|
return matched_network[0]
|
||||||
|
|
||||||
|
return None
|
||||||
|
|
||||||
|
def _network_to_dict(self, network):
|
||||||
|
network_dict = dict(
|
||||||
|
id=network.id,
|
||||||
|
name=network.name,
|
||||||
|
description=network.description
|
||||||
|
)
|
||||||
|
|
||||||
|
if isinstance(network.location, NodeLocation):
|
||||||
|
network_dict['location'] = network.location.id
|
||||||
|
else:
|
||||||
|
network_dict['location'] = network.location
|
||||||
|
|
||||||
|
if self.mcp_version == '1.0':
|
||||||
|
network_dict['private_net'] = network.private_net
|
||||||
|
network_dict['multicast'] = network.multicast
|
||||||
|
network_dict['status'] = None
|
||||||
|
else:
|
||||||
|
network_dict['private_net'] = None
|
||||||
|
network_dict['multicast'] = None
|
||||||
|
network_dict['status'] = network.status
|
||||||
|
|
||||||
|
return network_dict
|
||||||
|
|
||||||
|
def _create_network(self):
|
||||||
|
|
||||||
|
# Make sure service_plan argument is defined
|
||||||
|
if self.mcp_version == '2.0' and 'service_plan' not in self.module.params:
|
||||||
|
self.module.fail_json(
|
||||||
|
msg='service_plan required when creating network and location is MCP 2.0'
|
||||||
|
)
|
||||||
|
|
||||||
|
return None
|
||||||
|
|
||||||
|
# Create network
|
||||||
|
try:
|
||||||
|
if self.mcp_version == '1.0':
|
||||||
|
network = self.driver.ex_create_network(
|
||||||
|
self.location,
|
||||||
|
self.name,
|
||||||
|
description=self.description
|
||||||
|
)
|
||||||
|
else:
|
||||||
|
network = self.driver.ex_create_network_domain(
|
||||||
|
self.location,
|
||||||
|
self.name,
|
||||||
|
self.module.params['service_plan'],
|
||||||
|
description=self.description
|
||||||
|
)
|
||||||
|
except DimensionDataAPIException:
|
||||||
|
api_exception = get_exception()
|
||||||
|
|
||||||
|
self.module.fail_json(
|
||||||
|
msg="Failed to create new network: %s" % str(api_exception)
|
||||||
|
)
|
||||||
|
|
||||||
|
return None
|
||||||
|
|
||||||
|
if self.module.params['wait'] is True:
|
||||||
|
network = self._wait_for_network_state(network.id, 'NORMAL')
|
||||||
|
|
||||||
|
return network
|
||||||
|
|
||||||
|
def _delete_network(self, network):
|
||||||
|
try:
|
||||||
|
if self.mcp_version == '1.0':
|
||||||
|
deleted = self.driver.ex_delete_network(network)
|
||||||
|
else:
|
||||||
|
deleted = self.driver.ex_delete_network_domain(network)
|
||||||
|
|
||||||
|
if deleted:
|
||||||
|
self.module.exit_json(
|
||||||
|
changed=True,
|
||||||
|
msg="Deleted network with id %s" % network.id
|
||||||
|
)
|
||||||
|
|
||||||
|
self.module.fail_json(
|
||||||
|
"Unexpected failure deleting network with id %s", network.id
|
||||||
|
)
|
||||||
|
|
||||||
|
except DimensionDataAPIException:
|
||||||
|
api_exception = get_exception()
|
||||||
|
|
||||||
|
self.module.fail_json(
|
||||||
|
msg="Failed to delete network: %s" % str(api_exception)
|
||||||
|
)
|
||||||
|
|
||||||
|
def _wait_for_network_state(self, net_id, state_to_wait_for):
|
||||||
|
try:
|
||||||
|
return self.driver.connection.wait_for_state(
|
||||||
|
state_to_wait_for,
|
||||||
|
self.driver.ex_get_network_domain,
|
||||||
|
self.module.params['wait_poll_interval'],
|
||||||
|
self.module.params['wait_time'],
|
||||||
|
net_id
|
||||||
|
)
|
||||||
|
except DimensionDataAPIException:
|
||||||
|
api_exception = get_exception()
|
||||||
|
|
||||||
|
self.module.fail_json(
|
||||||
|
msg='Network did not reach % state in time: %s' % (state_to_wait_for, api_exception.msg)
|
||||||
|
)
|
||||||
|
|
||||||
|
|
||||||
def main():
|
def main():
|
||||||
module = AnsibleModule(
|
module = DimensionDataNetworkModule()
|
||||||
argument_spec=dict(
|
if module.state == 'present':
|
||||||
region=dict(default='na'),
|
module.state_present()
|
||||||
mcp_user=dict(required=False, type='str'),
|
elif module.state == 'absent':
|
||||||
mcp_password=dict(required=False, type='str'),
|
module.state_absent()
|
||||||
location=dict(required=True, type='str'),
|
|
||||||
name=dict(required=True, type='str'),
|
|
||||||
description=dict(required=False, type='str'),
|
|
||||||
service_plan=dict(default='ADVANCED', choices=['ADVANCED',
|
|
||||||
'ESSENTIALS']),
|
|
||||||
state=dict(default='present', choices=['present', 'absent']),
|
|
||||||
wait=dict(required=False, default=False, type='bool'),
|
|
||||||
wait_time=dict(required=False, default=600, type='int'),
|
|
||||||
wait_poll_interval=dict(required=False, default=2, type='int'),
|
|
||||||
verify_ssl_cert=dict(required=False, default=True, type='bool')
|
|
||||||
)
|
|
||||||
)
|
|
||||||
|
|
||||||
try:
|
|
||||||
credentials = get_credentials(module)
|
|
||||||
except LibcloudNotFound:
|
|
||||||
module.fail_json(msg='libcloud is required for this module.')
|
|
||||||
|
|
||||||
if not credentials:
|
|
||||||
module.fail_json(msg="User credentials not found")
|
|
||||||
|
|
||||||
# set short vars for readability
|
|
||||||
user_id = credentials['user_id']
|
|
||||||
key = credentials['key']
|
|
||||||
region = 'dd-%s' % module.params['region']
|
|
||||||
location = module.params['location']
|
|
||||||
name = module.params['name']
|
|
||||||
description = module.params['description']
|
|
||||||
verify_ssl_cert = module.params['verify_ssl_cert']
|
|
||||||
state = module.params['state']
|
|
||||||
|
|
||||||
# Instantiate driver
|
|
||||||
libcloud.security.VERIFY_SSL_CERT = verify_ssl_cert
|
|
||||||
DimensionData = get_driver(Provider.DIMENSIONDATA)
|
|
||||||
driver = DimensionData(user_id, key, region=region)
|
|
||||||
|
|
||||||
# Get MCP API Version
|
|
||||||
mcp_version = get_mcp_version(driver, location)
|
|
||||||
|
|
||||||
# Get network list
|
|
||||||
if mcp_version == '1.0':
|
|
||||||
networks = driver.list_networks(location=location)
|
|
||||||
else:
|
|
||||||
networks = driver.ex_list_network_domains(location=location)
|
|
||||||
matched_network = [network for network in networks if network.name == name]
|
|
||||||
|
|
||||||
# Ensure network state
|
|
||||||
if state == 'present':
|
|
||||||
# Network already exists
|
|
||||||
if matched_network:
|
|
||||||
module.exit_json(
|
|
||||||
changed=False,
|
|
||||||
msg="Network already exists",
|
|
||||||
network=network_obj_to_dict(matched_network[0], mcp_version)
|
|
||||||
)
|
|
||||||
create_network(module, driver, mcp_version, location, name,
|
|
||||||
description)
|
|
||||||
elif state == 'absent':
|
|
||||||
# Destroy network
|
|
||||||
if matched_network:
|
|
||||||
delete_network(module, driver, matched_network, mcp_version)
|
|
||||||
else:
|
|
||||||
module.exit_json(changed=False, msg="Network does not exist")
|
|
||||||
else:
|
|
||||||
module.fail_json(msg="Requested state was " +
|
|
||||||
"'%s'. State must be 'absent' or 'present'" % state)
|
|
||||||
|
|
||||||
if __name__ == '__main__':
|
if __name__ == '__main__':
|
||||||
main()
|
main()
|
||||||
|
|
58
lib/ansible/utils/module_docs_fragments/dimensiondata.py
Normal file
58
lib/ansible/utils/module_docs_fragments/dimensiondata.py
Normal file
|
@ -0,0 +1,58 @@
|
||||||
|
# -*- coding: utf-8 -*-
|
||||||
|
#
|
||||||
|
# Copyright (c) 2016 Dimension Data
|
||||||
|
#
|
||||||
|
# This module is free software: you can redistribute it and/or modify
|
||||||
|
# it under the terms of the GNU General Public License as published by
|
||||||
|
# the Free Software Foundation, either version 3 of the License, or
|
||||||
|
# (at your option) any later version.
|
||||||
|
#
|
||||||
|
# This software is distributed in the hope that it will be useful,
|
||||||
|
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||||
|
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||||
|
# GNU General Public License for more details.
|
||||||
|
#
|
||||||
|
# You should have received a copy of the GNU General Public License
|
||||||
|
# along with this software. If not, see <http://www.gnu.org/licenses/>.
|
||||||
|
#
|
||||||
|
# Authors:
|
||||||
|
# - Adam Friedman <tintoy@tintoy.io>
|
||||||
|
|
||||||
|
|
||||||
|
class ModuleDocFragment(object):
|
||||||
|
|
||||||
|
# Dimension Data doc fragment
|
||||||
|
DOCUMENTATION = '''
|
||||||
|
|
||||||
|
options:
|
||||||
|
region:
|
||||||
|
description:
|
||||||
|
- The target region.
|
||||||
|
choices:
|
||||||
|
- Regions are defined in Apache libcloud project [libcloud/common/dimensiondata.py]
|
||||||
|
- They are also listed in U(https://libcloud.readthedocs.io/en/latest/compute/drivers/dimensiondata.html)
|
||||||
|
- Note that the default value "na" stands for "North America".
|
||||||
|
- The module prepends 'dd-' to the region choice.
|
||||||
|
default: na
|
||||||
|
mcp_user:
|
||||||
|
description:
|
||||||
|
- The username used to authenticate to the CloudControl API.
|
||||||
|
- If not specified, will fall back to C(MCP_USER) from environment variable or C(~/.dimensiondata).
|
||||||
|
required: false
|
||||||
|
mcp_password:
|
||||||
|
description:
|
||||||
|
- The password used to authenticate to the CloudControl API.
|
||||||
|
- If not specified, will fall back to C(MCP_PASSWORD) from environment variable or C(~/.dimensiondata).
|
||||||
|
- Required if I(mcp_user) is specified.
|
||||||
|
required: false
|
||||||
|
location:
|
||||||
|
description:
|
||||||
|
- The target datacenter.
|
||||||
|
required: true
|
||||||
|
validate_certs:
|
||||||
|
description:
|
||||||
|
- If C(false), SSL certificates will not be validated.
|
||||||
|
- This should only be used on private instances of the CloudControl API that use self-signed certificates.
|
||||||
|
required: false
|
||||||
|
default: true
|
||||||
|
'''
|
|
@ -0,0 +1,45 @@
|
||||||
|
# -*- coding: utf-8 -*-
|
||||||
|
#
|
||||||
|
# Copyright (c) 2016 Dimension Data
|
||||||
|
#
|
||||||
|
# This module is free software: you can redistribute it and/or modify
|
||||||
|
# it under the terms of the GNU General Public License as published by
|
||||||
|
# the Free Software Foundation, either version 3 of the License, or
|
||||||
|
# (at your option) any later version.
|
||||||
|
#
|
||||||
|
# This software is distributed in the hope that it will be useful,
|
||||||
|
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||||
|
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||||
|
# GNU General Public License for more details.
|
||||||
|
#
|
||||||
|
# You should have received a copy of the GNU General Public License
|
||||||
|
# along with this software. If not, see <http://www.gnu.org/licenses/>.
|
||||||
|
#
|
||||||
|
# Authors:
|
||||||
|
# - Adam Friedman <tintoy@tintoy.io>
|
||||||
|
|
||||||
|
|
||||||
|
class ModuleDocFragment(object):
|
||||||
|
|
||||||
|
# Dimension Data ("wait-for-completion" parameters) doc fragment
|
||||||
|
DOCUMENTATION = '''
|
||||||
|
|
||||||
|
options:
|
||||||
|
wait:
|
||||||
|
description:
|
||||||
|
- Should we wait for the task to complete before moving onto the next.
|
||||||
|
required: false
|
||||||
|
default: false
|
||||||
|
wait_time:
|
||||||
|
description:
|
||||||
|
- The maximum amount of time (in seconds) to wait for the task to complete.
|
||||||
|
- Only applicable if I(wait=true).
|
||||||
|
required: false
|
||||||
|
default: 600
|
||||||
|
wait_poll_interval:
|
||||||
|
description:
|
||||||
|
- The amount of time (in seconds) to wait between checks for task completion.
|
||||||
|
- Only applicable if I(wait=true).
|
||||||
|
required: false
|
||||||
|
default: 2
|
||||||
|
'''
|
Loading…
Add table
Add a link
Reference in a new issue