|
1
|
|
|
#!/usr/bin/python |
|
2
|
|
|
|
|
3
|
|
|
import requests |
|
4
|
|
|
import sys |
|
5
|
|
|
import json |
|
6
|
|
|
import time |
|
7
|
|
|
|
|
8
|
|
|
|
|
9
|
|
|
class Vadc: |
|
10
|
|
|
|
|
11
|
|
|
DEBUG = False |
|
12
|
|
|
|
|
13
|
|
|
def __init__(self, host, user, passwd, logger): |
|
14
|
|
|
requests.packages.urllib3.disable_warnings() |
|
15
|
|
|
self.host = host |
|
16
|
|
|
self.user = user |
|
17
|
|
|
self.passwd = passwd |
|
18
|
|
|
self.logger = logger |
|
19
|
|
|
self.client = None |
|
20
|
|
|
self._cache = {} |
|
21
|
|
|
|
|
22
|
|
|
def _debug(self, message): |
|
23
|
|
|
if Vadc.DEBUG: |
|
24
|
|
|
self.logger.debug(message) |
|
25
|
|
|
|
|
26
|
|
|
def _initHTTP(self): |
|
27
|
|
|
self.client = requests.Session() |
|
28
|
|
|
self.client.auth = (self.user, self.passwd) |
|
29
|
|
|
|
|
30
|
|
|
def _getConfig(self, url): |
|
31
|
|
|
self._debug("URL: " + url) |
|
32
|
|
|
try: |
|
33
|
|
|
self._initHTTP() |
|
34
|
|
|
response = self.client.get(url, verify=False) |
|
35
|
|
|
except: |
|
36
|
|
|
self.logger.error("Error: Unable to connect to API") |
|
37
|
|
|
raise Exception("Error: Unable to connect to API") |
|
38
|
|
|
self._debug("Status: {}".format(response.status_code)) |
|
39
|
|
|
self._debug("Body: " + response.text) |
|
40
|
|
|
return response |
|
41
|
|
|
|
|
42
|
|
|
def _pushConfig(self, url, config, method="PUT", ct="application/json"): |
|
43
|
|
|
self._debug("URL: " + url) |
|
44
|
|
|
try: |
|
45
|
|
|
self._initHTTP() |
|
46
|
|
|
config = json.dumps(config) |
|
47
|
|
|
if method == "PUT": |
|
48
|
|
|
response = self.client.put(url, verify=False, data=config, |
|
49
|
|
|
headers={"Content-Type": ct}) |
|
50
|
|
|
else: |
|
51
|
|
|
response = self.client.post(url, verify=False, data=config, |
|
52
|
|
|
headers={"Content-Type": ct}) |
|
53
|
|
|
except requests.exceptions.ConnectionError: |
|
54
|
|
|
self.logger.error("Error: Unable to connect to API") |
|
55
|
|
|
raise Exception("Error: Unable to connect to API") |
|
56
|
|
|
|
|
57
|
|
|
self._debug("DATA: " + config) |
|
58
|
|
|
self._debug("Status: {}".format(response.status_code)) |
|
59
|
|
|
self._debug("Body: " + response.text) |
|
60
|
|
|
return response |
|
61
|
|
|
|
|
62
|
|
|
def _delConfig(self, url): |
|
63
|
|
|
self._debug("URL: " + url) |
|
64
|
|
|
try: |
|
65
|
|
|
self._initHTTP() |
|
66
|
|
|
response = self.client.delete(url, verify=False) |
|
67
|
|
|
except requests.exceptions.ConnectionError: |
|
68
|
|
|
sys.stderr.write("Error: Unable to connect to API {}".format(url)) |
|
69
|
|
|
raise Exception("Error: Unable to connect to API") |
|
70
|
|
|
|
|
71
|
|
|
self._debug("Status: {}".format(response.status_code)) |
|
72
|
|
|
self._debug("Body: " + response.text) |
|
73
|
|
|
return response |
|
74
|
|
|
|
|
75
|
|
|
def _dictify(self, listing, keyName): |
|
76
|
|
|
dictionary = {} |
|
77
|
|
|
for item in listing: |
|
78
|
|
|
k = item.pop(keyName) |
|
79
|
|
|
dictionary[k] = item |
|
80
|
|
|
|
|
81
|
|
|
def _cacheStore(self, key, data, timeout=10): |
|
82
|
|
|
exp = time.time() + timeout |
|
83
|
|
|
self._debug("Cache Store: {}".format(key)) |
|
84
|
|
|
self._cache[key] = {"exp": exp, "data": data} |
|
85
|
|
|
|
|
86
|
|
|
def _cacheLookup(self, key): |
|
87
|
|
|
now = time.time() |
|
88
|
|
|
if key in self._cache: |
|
89
|
|
|
entry = self._cache[key] |
|
90
|
|
|
if entry["exp"] > now: |
|
91
|
|
|
self._debug("Cache Hit: {}".format(key)) |
|
92
|
|
|
return entry["data"] |
|
93
|
|
|
self._debug("Cache Miss: {}".format(key)) |
|
94
|
|
|
return None |
|
95
|
|
|
|
|
96
|
|
|
def dumpCache(self): |
|
97
|
|
|
return json.dumps(self._cache, encoding="utf-8") |
|
98
|
|
|
|
|
99
|
|
|
def loadCache(self, cache): |
|
100
|
|
|
self._cache = json.loads(cache, encoding="utf-8") |
|
101
|
|
|
|
|
102
|
|
|
|
|
103
|
|
|
class Bsd(Vadc): |
|
104
|
|
|
|
|
105
|
|
|
def __init__(self, config, logger): |
|
106
|
|
|
|
|
107
|
|
|
try: |
|
108
|
|
|
host = config['brcd_sd_host'] |
|
109
|
|
|
user = config['brcd_sd_user'] |
|
110
|
|
|
passwd = config['brcd_sd_pass'] |
|
111
|
|
|
except KeyError: |
|
112
|
|
|
raise ValueError("brcd_sd_host, brcd_sd_user, and brcd_sd_pass must be configured") |
|
113
|
|
|
|
|
114
|
|
|
Vadc.__init__(self, host, user, passwd, logger) |
|
115
|
|
|
if host.endswith('/') == False: |
|
116
|
|
|
host += "/" |
|
117
|
|
|
self.baseUrl = host + "api/tmcm/2.2" |
|
118
|
|
|
|
|
119
|
|
|
def addVtm(self, vtm, password, address, bw, fp): |
|
120
|
|
|
url = self.baseUrl + "/instance/?managed=false" |
|
121
|
|
|
|
|
122
|
|
|
if address is None: |
|
123
|
|
|
address = vtm |
|
124
|
|
|
|
|
125
|
|
|
config = {"bandwidth": bw, "tag": vtm, "owner": "stanley", "stm_feature_pack": fp, |
|
126
|
|
|
"rest_address": address + ":9070", "admin_username": "admin", "rest_enabled": False, |
|
127
|
|
|
"host_name": address, "management_address": address} |
|
128
|
|
|
|
|
129
|
|
|
if password is not None: |
|
130
|
|
|
config["admin_password"] = password |
|
131
|
|
|
config["rest_enabled"] = True |
|
132
|
|
|
config["license_name"] = "universal_v3" |
|
133
|
|
|
|
|
134
|
|
|
res = self._pushConfig(url, config, "POST") |
|
135
|
|
|
if res.status_code != 201: |
|
136
|
|
|
raise Exception("Failed to add vTM. Response: {}, {}".format(res.status_code, res.text)) |
|
137
|
|
|
return res.json() |
|
138
|
|
|
|
|
139
|
|
|
def delVtm(self, vtm): |
|
140
|
|
|
url = self.baseUrl + "/instance/" + vtm |
|
141
|
|
|
config = {"status": "deleted"} |
|
142
|
|
|
res = self._pushConfig(url, config, "POST") |
|
143
|
|
|
if res.status_code != 200: |
|
144
|
|
|
raise Exception("Failed to del vTM. Response: {}, {}".format(res.status_code, res.text)) |
|
145
|
|
|
return res.json() |
|
146
|
|
|
|
|
147
|
|
|
def getVtm(self, tag): |
|
148
|
|
|
vtm = self._cacheLookup("getVtm_" + tag) |
|
149
|
|
|
if vtm is None: |
|
150
|
|
|
url = self.baseUrl + "/instance/" + tag |
|
151
|
|
|
res = self._getConfig(url) |
|
152
|
|
|
if res.status_code != 200: |
|
153
|
|
|
raise Exception("Failed to get vTM {}. Response: {}, {}".format( |
|
154
|
|
|
vtm, res.status_code, res.text)) |
|
155
|
|
|
vtm = res.json() |
|
156
|
|
|
self._cacheStore("getVtm_" + tag, vtm) |
|
157
|
|
|
return vtm |
|
158
|
|
|
|
|
159
|
|
|
def listVtms(self, full, deleted, stringify): |
|
160
|
|
|
instances = self._cacheLookup("listVtms") |
|
161
|
|
|
if instances is None: |
|
162
|
|
|
url = self.baseUrl + "/instance/" |
|
163
|
|
|
res = self._getConfig(url) |
|
164
|
|
|
if res.status_code != 200: |
|
165
|
|
|
raise Exception("Failed to list vTMs. Response: {}, {}".format( |
|
166
|
|
|
res.status_code, res.text)) |
|
167
|
|
|
instances = res.json() |
|
168
|
|
|
self._cacheStore("listVtms", instances) |
|
169
|
|
|
|
|
170
|
|
|
output = [] |
|
171
|
|
|
for instance in instances["children"]: |
|
172
|
|
|
config = self.getVtm(instance["name"]) |
|
173
|
|
|
if deleted is False and config["status"] == "Deleted": |
|
174
|
|
|
continue |
|
175
|
|
|
if full: |
|
176
|
|
|
config["name"] = instance["name"] |
|
177
|
|
|
output.append(config) |
|
178
|
|
|
else: |
|
179
|
|
|
out_dict = {k: config[k] for k in ("host_name", "tag", "status", |
|
180
|
|
|
"stm_feature_pack", "bandwidth")} |
|
181
|
|
|
out_dict["name"] = instance["name"] |
|
182
|
|
|
output.append(out_dict) |
|
183
|
|
|
|
|
184
|
|
|
if stringify: |
|
185
|
|
|
return json.dumps(output, encoding="utf-8") |
|
186
|
|
|
else: |
|
187
|
|
|
return output |
|
188
|
|
|
|
|
189
|
|
|
def getStatus(self, vtm=None, stringify=False): |
|
190
|
|
|
instances = self._cacheLookup("getStatus") |
|
191
|
|
|
if instances is None: |
|
192
|
|
|
url = self.baseUrl + "/monitoring/instance" |
|
193
|
|
|
res = self._getConfig(url) |
|
194
|
|
|
if res.status_code != 200: |
|
195
|
|
|
raise Exception("Failed get Status. Result: {}, {}".format( |
|
196
|
|
|
res.status_code, res.text)) |
|
197
|
|
|
|
|
198
|
|
|
instances = res.json() |
|
199
|
|
|
self._cacheStore("getStatus", instances) |
|
200
|
|
|
|
|
201
|
|
|
if vtm is not None: |
|
202
|
|
|
for instance in instances: |
|
203
|
|
|
if instance["tag"] != vtm and instance["name"] != vtm: |
|
204
|
|
|
instances.remove(instance) |
|
205
|
|
|
|
|
206
|
|
|
if stringify: |
|
207
|
|
|
return json.dumps(instances, encoding="utf-8") |
|
208
|
|
|
else: |
|
209
|
|
|
return instances |
|
210
|
|
|
|
|
211
|
|
|
def getErrors(self, stringify=False): |
|
212
|
|
|
instances = self.getStatus() |
|
213
|
|
|
errors = {} |
|
214
|
|
|
for instance in instances: |
|
215
|
|
|
error = {} |
|
216
|
|
|
self._debug(instance) |
|
217
|
|
|
if instance["id_health"]["alert_level"] != 1: |
|
218
|
|
|
error["id_health"] = instance["id_health"] |
|
219
|
|
|
if instance["rest_access"]["alert_level"] != 1: |
|
220
|
|
|
error["rest_access"] = instance["rest_access"] |
|
221
|
|
|
if instance["licensing_activity"]["alert_level"] != 1: |
|
222
|
|
|
error["licensing_activity"] = instance["licensing_activity"] |
|
223
|
|
|
if instance["traffic_health"]["error_level"] != "ok": |
|
224
|
|
|
error["traffic_health"] = instance["traffic_health"] |
|
225
|
|
|
if len(error) != 0: |
|
226
|
|
|
error["tag"] = instance["tag"] |
|
227
|
|
|
error["name"] = instance["name"] |
|
228
|
|
|
if "traffic_health" in error: |
|
229
|
|
|
if "virtual_servers" in error["traffic_health"]: |
|
230
|
|
|
del error["traffic_health"]["virtual_servers"] |
|
231
|
|
|
errors[instance["name"]] = error |
|
232
|
|
|
|
|
233
|
|
|
if stringify: |
|
234
|
|
|
return json.dumps(errors, encoding="utf-8") |
|
235
|
|
|
else: |
|
236
|
|
|
return errors |
|
237
|
|
|
|
|
238
|
|
|
def getMonitorIntervals(self, setting=None): |
|
239
|
|
|
intervals = self._cacheLookup("getMonitorIntervals") |
|
240
|
|
|
if intervals is None: |
|
241
|
|
|
url = self.baseUrl + "/settings/monitoring" |
|
242
|
|
|
res = self._getConfig(url) |
|
243
|
|
|
if res.status_code != 200: |
|
244
|
|
|
raise Exception("Failed to get Monitoring Intervals. Result: {}, {}".format( |
|
245
|
|
|
res.status_code, res.text)) |
|
246
|
|
|
|
|
247
|
|
|
intervals = res.json() |
|
248
|
|
|
self._cacheStore("getMonitorIntervals", intervals) |
|
249
|
|
|
|
|
250
|
|
|
if setting is not None: |
|
251
|
|
|
if setting not in intervals: |
|
252
|
|
|
raise Exception("Setting: {} does not exist.".format(setting)) |
|
253
|
|
|
return intervals[setting] |
|
254
|
|
|
return intervals |
|
255
|
|
|
|
|
256
|
|
|
def getBandwidth(self, vtm=None, stringify=False): |
|
257
|
|
|
instances = self.getStatus(vtm) |
|
258
|
|
|
bandwidth = {} |
|
259
|
|
|
for instance in instances: |
|
260
|
|
|
config = self.getVtm(instance["name"]) |
|
261
|
|
|
tag = config["tag"] |
|
262
|
|
|
# Bytes/Second |
|
263
|
|
|
if "throughput_out" in instance: |
|
264
|
|
|
current = (instance["throughput_out"] / 1000000.0) * 8 |
|
265
|
|
|
else: |
|
266
|
|
|
current = 0.0 |
|
267
|
|
|
# Mbps |
|
268
|
|
|
assigned = config["bandwidth"] |
|
269
|
|
|
# Bytes/Second |
|
270
|
|
|
if "metrics_peak_throughput" in config: |
|
271
|
|
|
peak = (config["metrics_peak_throughput"] / 1000000.0) * 8 |
|
272
|
|
|
else: |
|
273
|
|
|
peak = 0.0 |
|
274
|
|
|
bandwidth[instance["name"]] = {"tag": tag, "current": current, |
|
275
|
|
|
"assigned": assigned, "peak": peak} |
|
276
|
|
|
|
|
277
|
|
|
if stringify: |
|
278
|
|
|
return json.dumps(bandwidth, encoding="utf-8") |
|
279
|
|
|
else: |
|
280
|
|
|
return bandwidth |
|
281
|
|
|
|
|
282
|
|
|
def setBandwidth(self, vtm, bw): |
|
283
|
|
|
url = self.baseUrl + "/instance/" + vtm |
|
284
|
|
|
config = {"bandwidth": bw} |
|
285
|
|
|
res = self._pushConfig(url, config) |
|
286
|
|
|
if res.status_code != 200: |
|
287
|
|
|
raise Exception("Failed to set Bandwidth. Result: {}, {}".format( |
|
288
|
|
|
res.status_code, res.text)) |
|
289
|
|
|
config = res.json() |
|
290
|
|
|
return config |
|
291
|
|
|
|
|
292
|
|
|
|
|
293
|
|
|
class Vtm(Vadc): |
|
294
|
|
|
|
|
295
|
|
|
def __init__(self, config, logger, vtm): |
|
296
|
|
|
|
|
297
|
|
|
try: |
|
298
|
|
|
self._proxy = config['brcd_sd_proxy'] |
|
299
|
|
|
if self._proxy: |
|
300
|
|
|
host = config['brcd_sd_host'] |
|
301
|
|
|
user = config['brcd_sd_user'] |
|
302
|
|
|
passwd = config['brcd_sd_pass'] |
|
303
|
|
|
else: |
|
304
|
|
|
host = config['brcd_vtm_host'] |
|
305
|
|
|
user = config['brcd_vtm_user'] |
|
306
|
|
|
passwd = config['brcd_vtm_pass'] |
|
307
|
|
|
except KeyError: |
|
308
|
|
|
raise ValueError("You must set key brcd_sd_proxy, and either " + |
|
309
|
|
|
"brcd_sd_[host|user|pass] or brcd_vtm_[host|user|pass].") |
|
310
|
|
|
|
|
311
|
|
|
Vadc.__init__(self, host, user, passwd, logger) |
|
312
|
|
|
if host.endswith('/') == False: |
|
313
|
|
|
host += "/" |
|
314
|
|
|
if self._proxy: |
|
315
|
|
|
self.baseUrl = host + "api/tmcm/2.2/instance/{}/tm/3.8/config/active".format(vtm) |
|
316
|
|
|
else: |
|
317
|
|
|
self.baseUrl = host + "api/tm/3.8/config/active" |
|
318
|
|
|
|
|
319
|
|
|
def _getNodeTable(self, name): |
|
320
|
|
|
url = self.baseUrl + "/pools/" + name |
|
321
|
|
|
res = self._getConfig(url) |
|
322
|
|
|
if res.status_code != 200: |
|
323
|
|
|
raise Exception("Failed to get pool. Result: {}, {}".format(res.status_code, res.text)) |
|
324
|
|
|
|
|
325
|
|
|
config = res.json() |
|
326
|
|
|
return config["properties"]["basic"]["nodes_table"] |
|
327
|
|
|
|
|
328
|
|
|
def _getVSConfig(self, name): |
|
329
|
|
|
url = self.baseUrl + "/virtual_servers/" + name |
|
330
|
|
|
res = self._getConfig(url) |
|
331
|
|
|
if res.status_code != 200: |
|
332
|
|
|
raise Exception("Failed to get VS. Result: {}, {}".format(res.status_code, res.text)) |
|
333
|
|
|
|
|
334
|
|
|
config = res.json() |
|
335
|
|
|
return config |
|
336
|
|
|
|
|
337
|
|
|
def _setVSConfig(self, name, config): |
|
338
|
|
|
url = self.baseUrl + "/virtual_servers/" + name |
|
339
|
|
|
res = self._pushConfig(url, config) |
|
340
|
|
|
if res.status_code != 200: |
|
341
|
|
|
raise Exception("Failed to set VS. Result: {}, {}".format(res.status_code, res.text)) |
|
342
|
|
|
config = res.json() |
|
343
|
|
|
return config |
|
344
|
|
|
|
|
345
|
|
|
def _getVSRules(self, name): |
|
346
|
|
|
config = self._getVSConfig(name) |
|
347
|
|
|
rules = {k: config["properties"]["basic"][k] for k in |
|
348
|
|
|
("request_rules", "response_rules", "completionrules")} |
|
349
|
|
|
return rules |
|
350
|
|
|
|
|
351
|
|
|
def _setVSRules(self, name, rules): |
|
352
|
|
|
config = {"properties": {"basic": rules}} |
|
353
|
|
|
res = self._setVSConfig(name, config) |
|
354
|
|
|
if res.status_code != 200: |
|
355
|
|
|
raise Exception("Failed set VS Rules. Result: {}, {}".format(res.status_code, res.text)) |
|
356
|
|
|
|
|
357
|
|
|
def insertRule(self, vsname, rulename, insert=True): |
|
358
|
|
|
rules = self._getVSRules(vsname) |
|
359
|
|
|
if insert: |
|
360
|
|
|
if rulename in rules["request_rules"]: |
|
361
|
|
|
raise Exception("VServer {} already in maintenance".format(vsname)) |
|
362
|
|
|
rules["request_rules"].insert(0, rulename) |
|
363
|
|
|
else: |
|
364
|
|
|
if rulename not in rules["request_rules"]: |
|
365
|
|
|
raise Exception("VServer {} is not in maintenance".format(vsname)) |
|
366
|
|
|
rules["request_rules"].remove(rulename) |
|
367
|
|
|
self._setVSRules(vsname, rules) |
|
368
|
|
|
|
|
369
|
|
|
def enableMaintenance(self, vsname, rulename="maintenance", enable=True): |
|
370
|
|
|
self.insertRule(vsname, rulename, enable) |
|
371
|
|
|
|
|
372
|
|
|
def getPoolNodes(self, name): |
|
373
|
|
|
nodeTable = self._getNodeTable(name) |
|
374
|
|
|
nodes = {"active": [], "disabled": [], "draining": []} |
|
375
|
|
|
for node in nodeTable: |
|
376
|
|
|
if node["state"] == "active": |
|
377
|
|
|
nodes["active"].append(node["node"]) |
|
378
|
|
|
elif node["state"] == "disabled": |
|
379
|
|
|
nodes["disabled"].append(node["node"]) |
|
380
|
|
|
elif node["state"] == "draining": |
|
381
|
|
|
nodes["draining"].append(node["node"]) |
|
382
|
|
|
else: |
|
383
|
|
|
self.logger.warn("Unknown Node State: {}".format(node["state"])) |
|
384
|
|
|
|
|
385
|
|
|
return nodes |
|
386
|
|
|
|
|
387
|
|
|
def drainNodes(self, name, nodes, drain=True): |
|
388
|
|
|
url = self.baseUrl + "/pools/" + name |
|
389
|
|
|
nodeTable = self._getNodeTable(name) |
|
390
|
|
|
for entry in nodeTable: |
|
391
|
|
|
if entry["node"] in nodes: |
|
392
|
|
|
if drain: |
|
393
|
|
|
entry["state"] = "draining" |
|
394
|
|
|
else: |
|
395
|
|
|
entry["state"] = "active" |
|
396
|
|
|
|
|
397
|
|
|
config = {"properties": {"basic": {"nodes_table": nodeTable}}} |
|
398
|
|
|
res = self._pushConfig(url, config) |
|
399
|
|
|
if res.status_code != 201 and res.status_code != 200: |
|
400
|
|
|
raise Exception("Failed to add pool. Result: {}, {}".format(res.status_code, res.text)) |
|
401
|
|
|
|
|
402
|
|
|
def addPool(self, name, nodes, algorithm, persistence, monitors): |
|
403
|
|
|
url = self.baseUrl + "/pools/" + name |
|
404
|
|
|
|
|
405
|
|
|
nodeTable = [] |
|
406
|
|
|
for node in nodes: |
|
407
|
|
|
nodeTable.append({"node": node, "state": "active"}) |
|
408
|
|
|
|
|
409
|
|
|
config = {"properties": {"basic": {"nodes_table": nodeTable, "monitors": monitors, |
|
410
|
|
|
"persistence_class": persistence}, "load_balancing": {"algorithm": algorithm}}} |
|
411
|
|
|
|
|
412
|
|
|
res = self._pushConfig(url, config) |
|
413
|
|
|
if res.status_code != 201 and res.status_code != 200: |
|
414
|
|
|
raise Exception("Failed to add pool. Result: {}, {}".format(res.status_code, res.text)) |
|
415
|
|
|
|
|
416
|
|
|
def delPool(self, name): |
|
417
|
|
|
url = self.baseUrl + "/pools/" + name |
|
418
|
|
|
res = self._delConfig(url) |
|
419
|
|
|
if res.status_code != 204: |
|
420
|
|
|
raise Exception("Failed to del pool. Result: {}, {}".format(res.status_code, res.text)) |
|
421
|
|
|
|
|
422
|
|
|
def addVserver(self, name, pool, tip, port, protocol): |
|
423
|
|
|
url = self.baseUrl + "/virtual_servers/" + name |
|
424
|
|
|
config = {"properties": {"basic": {"pool": pool, "port": port, "protocol": protocol, |
|
425
|
|
|
"listen_on_any": False, "listen_on_traffic_ips": [tip], "enabled": True}}} |
|
426
|
|
|
|
|
427
|
|
|
res = self._pushConfig(url, config) |
|
428
|
|
|
if res.status_code != 201: |
|
429
|
|
|
raise Exception("Failed to add VS. Result: {}, {}".format(res.status_code, res.text)) |
|
430
|
|
|
|
|
431
|
|
|
def delVserver(self, name): |
|
432
|
|
|
url = self.baseUrl + "/virtual_servers/" + name |
|
433
|
|
|
res = self._delConfig(url) |
|
434
|
|
|
if res.status_code != 204: |
|
435
|
|
|
raise Exception("Failed to del VS. Result: {}, {}".format(res.status_code, res.text)) |
|
436
|
|
|
|
|
437
|
|
|
def addTip(self, name, vtms, addresses): |
|
438
|
|
|
url = self.baseUrl + "/traffic_ip_groups/" + name |
|
439
|
|
|
|
|
440
|
|
|
config = {"properties": {"basic": {"ipaddresses": addresses, |
|
441
|
|
|
"machines": vtms, "enabled": True}}} |
|
442
|
|
|
|
|
443
|
|
|
res = self._pushConfig(url, config) |
|
444
|
|
|
if res.status_code != 201: |
|
445
|
|
|
raise Exception("Failed to add TIP. Result: {}, {}".format(res.status_code, res.text)) |
|
446
|
|
|
|
|
447
|
|
|
def delTip(self, name): |
|
448
|
|
|
url = self.baseUrl + "/traffic_ip_groups/" + name |
|
449
|
|
|
res = self._delConfig(url) |
|
450
|
|
|
if res.status_code != 204: |
|
451
|
|
|
raise Exception("Failed to del TIP. Result: {}, {}".format(res.status_code, res.text)) |
|
452
|
|
|
|
|
453
|
|
|
def addServerCert(self, name, public, private): |
|
454
|
|
|
url = self.baseUrl + "/ssl/server_keys/" + name |
|
455
|
|
|
|
|
456
|
|
|
public = public.replace("\\n", "\n") |
|
457
|
|
|
private = private.replace("\\n", "\n") |
|
458
|
|
|
|
|
459
|
|
|
config = {"properties": {"basic": {"public": public, "private": private}}} |
|
460
|
|
|
|
|
461
|
|
|
res = self._pushConfig(url, config) |
|
462
|
|
|
if res.status_code != 201 and res.status_code != 200: |
|
463
|
|
|
raise Exception("Failed to add Server Certificate." + |
|
464
|
|
|
" Result: {}, {}".format(res.status_code, res.text)) |
|
465
|
|
|
|
|
466
|
|
|
def delServerCert(self, name): |
|
467
|
|
|
url = self.baseUrl + "/ssl/server_keys/" + name |
|
468
|
|
|
res = self._delConfig(url) |
|
469
|
|
|
if res.status_code != 204: |
|
470
|
|
|
raise Exception("Failed to delete Server Certificate." + |
|
471
|
|
|
" Result: {}, {}".format(res.status_code, res.text)) |
|
472
|
|
|
|
|
473
|
|
|
def enableSSLOffload(self, name, cert="", on=True, xproto=False, headers=False): |
|
474
|
|
|
url = self.baseUrl + "/virtual_servers/" + name |
|
475
|
|
|
config = {"properties": {"basic": {"ssl_decrypt": on, "add_x_forwarded_proto": xproto}, |
|
476
|
|
|
"ssl": {"add_http_headers": headers, "server_cert_default": cert}}} |
|
477
|
|
|
|
|
478
|
|
|
res = self._pushConfig(url, config) |
|
479
|
|
|
if res.status_code != 200: |
|
480
|
|
|
raise Exception("Failed to configure SSl Offload on {}.".format(name) + |
|
481
|
|
|
" Result: {}, {}".format(res.status_code, res.text)) |
|
482
|
|
|
|
|
483
|
|
|
def enableSSLEncryption(self, name, on=True, verify=False): |
|
484
|
|
|
url = self.baseUrl + "/pools/" + name |
|
485
|
|
|
config = {"properties": {"ssl": {"enable": on, "strict_verify": verify}}} |
|
486
|
|
|
|
|
487
|
|
|
res = self._pushConfig(url, config) |
|
488
|
|
|
if res.status_code != 200: |
|
489
|
|
|
raise Exception("Failed to configure SSl Encryption on {}.".format(name) + |
|
490
|
|
|
" Result: {}, {}".format(res.status_code, res.text)) |
|
491
|
|
|
|
|
492
|
|
|
def addSessionPersistence(self, name, method, cookie=None): |
|
493
|
|
|
types = ["ip", "universal", "named", "transparent", "cookie", "j2ee", "asp", "ssl"] |
|
494
|
|
|
if method not in types: |
|
495
|
|
|
raise Exception("Failed to add SP Class. Invalid method: {}".format(method) + |
|
496
|
|
|
"Must be one of: {}".format(types)) |
|
497
|
|
|
if method == "cookie" and cookie is None: |
|
498
|
|
|
raise Exception("Failed to add SP Class. You must provide a cookie name.") |
|
499
|
|
|
|
|
500
|
|
|
if cookie is None: |
|
501
|
|
|
cookie = "" |
|
502
|
|
|
|
|
503
|
|
|
url = self.baseUrl + "/persistence/" + name |
|
504
|
|
|
config = {"properties": {"basic": {"type": method, "cookie": cookie}}} |
|
505
|
|
|
|
|
506
|
|
|
res = self._pushConfig(url, config) |
|
507
|
|
|
if res.status_code != 201 and res.status_code != 200: |
|
508
|
|
|
raise Exception("Failed to add Session Persistence Class" + |
|
509
|
|
|
" Result: {}, {}".format(res.status_code, res.text)) |
|
510
|
|
|
|
|
511
|
|
|
def delSessionPersistence(self, name): |
|
512
|
|
|
url = self.baseUrl + "/persistence/" + name |
|
513
|
|
|
res = self._delConfig(url) |
|
514
|
|
|
if res.status_code != 204: |
|
515
|
|
|
raise Exception("Failed to delete Session Persistence Class." + |
|
516
|
|
|
" Result: {}, {}".format(res.status_code, res.text)) |
|
517
|
|
|
|