Anons79 Mini Shell

Directory : /lib/python2.7/site-packages/ansible/modules/network/f5/
Upload File :
Current File : //lib/python2.7/site-packages/ansible/modules/network/f5/bigip_device_auth.pyo

�
�Udac@`s�ddlmZmZmZeZidd6dgd6dd6ZdZd	Zd
Z	ddl
mZddlm
Z
yDdd
lmZddlmZddlmZddlmZWnQek
r	dd
lmZddlmZddlmZddlmZnXdefd��YZdefd��YZdefd��YZdefd��YZdefd��YZdefd��YZdefd��YZdefd ��YZd!efd"��YZd#eefd$��YZ d%e fd&��YZ!d'e fd(��YZ"d)e#fd*��YZ$d+e#fd,��YZ%d-e%fd.��YZ&d/e%fd0��YZ'd1e#fd2��YZ(d3e#fd4��YZ)d5�Z*e+d6kr�e*�nd7S(8i(tabsolute_importtdivisiontprint_functions1.1tmetadata_versiontpreviewtstatust	certifiedtsupported_bys@
---
module: bigip_device_auth
short_description: Manage system authentication on a BIG-IP
description:
  - Manage the system authentication configuration. This module can assist in configuring
    a number of different system authentication types. Note that this module can not be used
    to configure APM authentication types.
version_added: 2.7
options:
  type:
    description:
      - The authentication type to manage with this module.
      - Take special note that the parameters supported by this module will vary depending
        on the C(type) that you are configuring.
      - This module only supports a subset, at this time, of the total available auth types.
    type: str
    choices:
      - tacacs
      - local
  servers:
    description:
      - Specifies a list of the IPv4 addresses for servers using the Terminal
        Access Controller Access System (TACACS)+ protocol with which the system
        communicates to obtain authorization data.
      - For each address, an alternate TCP port number may be optionally specified
        by specifying the C(port) key.
      - If no port number is specified, the default port C(49163) is used.
      - This parameter is supported by the C(tacacs) type.
    type: raw
    suboptions:
      address:
        description:
          - The IP address of the server.
          - This field is required, unless you are specifying a simple list of servers.
            In that case, the simple list can specify server IPs. See examples for
            more clarification.
      port:
        description:
          - The port of the server.
        default: 49163
  secret:
    description:
      - Secret key used to encrypt and decrypt packets sent or received from the
        server.
      - B(Do not) use the pound/hash sign in the secret for TACACS+ servers.
      - When configuring TACACS+ auth for the first time, this value is required.
    type: str
  service_name:
    description:
      - Specifies the name of the service that the user is requesting to be
        authorized to use.
      - Identifying what the user is asking to be authorized for, enables the
        TACACS+ server to behave differently for different types of authorization
        requests.
      - When configuring this form of system authentication, this setting is required.
      - Note that the majority of TACACS+ implementations are of service type C(ppp),
        so try that first.
    type: str
    choices:
      - slip
      - ppp
      - arap
      - shell
      - tty-daemon
      - connection
      - system
      - firewall
  protocol_name:
    description:
      - Specifies the protocol associated with the value specified in C(service_name),
        which is a subset of the associated service being used for client authorization
        or system accounting.
      - Note that the majority of TACACS+ implementations are of protocol type C(ip),
        so try that first.
    type: str
    choices:
      - lcp
      - ip
      - ipx
      - atalk
      - vines
      - lat
      - xremote
      - tn3270
      - telnet
      - rlogin
      - pad
      - vpdn
      - ftp
      - http
      - deccp
      - osicp
      - unknown
  authentication:
    description:
      - Specifies the process the system employs when sending authentication requests.
      - When C(use-first-server), specifies that the system sends authentication
        attempts to only the first server in the list.
      - When C(use-all-servers), specifies that the system sends an authentication
        request to each server until authentication succeeds, or until the system has
        sent a request to all servers in the list.
      - This parameter is supported by the C(tacacs) type.
    type: str
    choices:
      - use-first-server
      - use-all-servers
  use_for_auth:
    description:
      - Specifies whether or not this auth source is put in use on the system.
    type: bool
  state:
    description:
      - The state of the authentication configuration on the system.
      - When C(present), guarantees that the system is configured for the specified C(type).
      - When C(absent), sets the system auth source back to C(local).
    type: str
    choices:
      - absent
      - present
    default: present
  update_secret:
    description:
      - C(always) will allow to update secrets if the user chooses to do so.
      - C(on_create) will only set the secret when a C(use_auth_source) is C(yes)
        and TACACS+ is not currently the auth source.
    type: str
    choices:
      - always
      - on_create
    default: always
extends_documentation_fragment: f5
author:
  - Tim Rupp (@caphrim007)
sA
- name: Set the system auth to TACACS+, default server port
  bigip_device_auth:
    type: tacacs
    authentication: use-all-servers
    protocol_name: ip
    secret: secret
    servers:
      - 10.10.10.10
      - 10.10.10.11
    service_name: ppp
    state: present
    use_for_auth: yes
    provider:
      password: secret
      server: lb.mydomain.com
      user: admin
  delegate_to: localhost

- name: Set the system auth to TACACS+, override server port
  bigip_device_auth:
    type: tacacs
    authentication: use-all-servers
    protocol_name: ip
    secret: secret
    servers:
      - address: 10.10.10.10
        port: 1234
      - 10.10.10.11
    service_name: ppp
    use_for_auth: yes
    state: present
    provider:
      password: secret
      server: lb.mydomain.com
      user: admin
  delegate_to: localhost
s^
servers:
  description: List of servers used in TACACS authentication.
  returned: changed
  type: list
  sample: ['1.2.2.1', '4.5.5.4']
authentication:
  description: Process the system uses to serve authentication requests when using TACACS.
  returned: changed
  type: str
  sample: use-all-servers
service_name:
  description: Name of the service the user is requesting to be authorized to use.
  returned: changed
  type: str
  sample: ppp
protocol_name:
  description: Name of the protocol associated with C(service_name) used for client authentication.
  returned: changed
  type: str
  sample: ip
(t
AnsibleModule(tstring_types(tF5RestClient(t
F5ModuleError(tAnsibleF5Parameters(tf5_argument_spectBaseParameterscB`sDeZed��Zed��Zed��Zed��ZRS(cC`siS(N((tself((sP/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_device_auth.pytapi_map�scC`sgS(N((R((sP/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_device_auth.pytapi_attributes�scC`sgS(N((R((sP/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_device_auth.pytreturnables�scC`sgS(N((R((sP/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_device_auth.pyt
updatables�s(t__name__t
__module__tpropertyRRRR(((sP/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_device_auth.pyR�stBaseApiParameterscB`seZRS((RR(((sP/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_device_auth.pyR�stBaseModuleParameterscB`seZRS((RR(((sP/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_device_auth.pyR�stBaseChangescB`seZd�ZRS(cC`sXi}y:x$|jD]}t||�||<qW|j|�}Wntk
rSnX|S(N(Rtgetattrt_filter_paramst	Exception(Rtresultt
returnable((sP/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_device_auth.pyt	to_return�s
(RRR(((sP/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_device_auth.pyR�stBaseUsableChangescB`seZRS((RR(((sP/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_device_auth.pyR 
stBaseReportableChangescB`seZRS((RR(((sP/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_device_auth.pyR!stTacacsParameterscB`s^eZidd6dd6ZdddddgZdddddgZddddddgZRS(t
protocol_nametprotocoltservice_nametservicetauthenticationtsecrettserverstauth_source(RRRRRR(((sP/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_device_auth.pyR"s&
		tTacacsApiParameterscB`seZRS((RR(((sP/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_device_auth.pyR+2stTacacsModuleParameterscB`s&eZed��Zed��ZRS(cC`s�|jddkrdSg}x�|jdD]�}t|t�rd|kr[td��n|jd�}|jdd�}nt|t�r�|}d}n|jdj||��q+W|S(NR)taddresss_An 'address' field must be provided when specifying separate fields to the 'servers' parameter.tporti�s{0}:{1}(	t_valuestNonet
isinstancetdictRtgetR	tappendtformat(RRtserverR-R.((sP/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_device_auth.pyR)7s	cC`sdS(Nttacacs((R((sP/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_device_auth.pyR*Js(RRRR)R*(((sP/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_device_auth.pyR,6st
TacacsChangescB`seZRS((RR(((sP/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_device_auth.pyR8OstTacacsUsableChangescB`seZRS((RR(((sP/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_device_auth.pyR9SstTacacsReportableChangescB`seZed��ZRS(cC`sdS(N(R0(R((sP/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_device_auth.pyR(Xs(RRRR((((sP/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_device_auth.pyR:Wst
DifferencecB`s5eZdd�Zd�Zd�Zed��ZRS(cC`s||_||_dS(N(twantthave(RR<R=((sP/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_device_auth.pyt__init__^s	cC`s9yt||�}|SWntk
r4|j|�SXdS(N(RtAttributeErrort_Difference__default(RtparamR((sP/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_device_auth.pytcomparebs

cC`sQt|j|�}y&t|j|�}||kr7|SWntk
rL|SXdS(N(RR<R=R?(RRAR<R=((sP/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_device_auth.pyt	__defaultis
cC`s8|jj|jjkr4|jjdkr4|jjSdS(Ntalways(R<R(R=t
update_secret(R((sP/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_device_auth.pyR(rs*N(RRR0R>RBR@RR((((sP/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_device_auth.pyR;]s			tBaseManagercB`sYeZd�Zd�Zd�Zd�Zd�Zd�Zd�Zd�Z	d�Z
RS(	cC`smi}xB|jD]7}t|j|�dk	rt|j|�||<qqW|ri|jd|�|_ndS(Ntparams(RRR<R0tget_usable_changestchanges(Rtchangedtkey((sP/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_device_auth.pyt_set_changed_optionsyscC`s�t|j|j�}|j}t�}xX|D]P}|j|�}|dkrUq.q.t|t�rt|j|�q.|||<q.W|r�|j	d|�|_
tStS(NRG(
R;R<R=RR2RBR0R1tupdateRHRItTruetFalse(RtdiffRRJtktchange((sP/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_device_auth.pyt_update_changed_options�s		
cC`s|j�}|rtStS(N(RSRNRO(RR((sP/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_device_auth.pyt
should_update�scC`s�t}t�}|jj}|dkr6|j�}n|dkrQ|j�}n|jd|jj��}|j�}|j	|�|j	td|��|j
|�|S(NtpresenttabsentRGRJ(ROR2R<tstateRURVtget_reportable_changesRIRRMt_announce_deprecations(RRJRRWt
reportableRI((sP/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_device_auth.pytexec_module�s	

cC`sK|jdg�}x2|D]*}|jjjd|dd|d�qWdS(Nt
__warningstmsgtversion(tpoptclienttmodulet	deprecate(RRtwarningstwarning((sP/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_device_auth.pyRY�s


cC`s |j�r|j�S|j�S(N(texistsRMtcreate(R((sP/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_device_auth.pyRU�s
cC`s|j�r|j�StS(N(RetremoveRO(R((sP/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_device_auth.pyRV�s
cC`s�td|�}dj|jjd|jjd�}|jjj|d|�}y|j�}Wn%tk
r�}tt	|���nXd|kr�|ddkr�d|kr�t|d��q�t|j
��nd	S(
sSet the system auth source.

        Configuring the authentication source is only one step in the process of setting
        up an auth source. The other step is to inform the system of the auth source
        you want to use.

        This method is used for situations where

        * The ``use_for_auth`` parameter is set to ``yes``
        * The ``use_for_auth`` parameter is set to ``no``
        * The ``state`` parameter is set to ``absent``

        When ``state`` equal to ``absent``, before you can delete the TACACS+ configuration,
        you must set the system auth to "something else". The system ships with a system
        auth called "local", so this is the logical "something else" to use.

        When ``use_for_auth`` is no, the same situation applies as when ``state`` equal
        to ``absent`` is done above.

        When ``use_for_auth`` is ``yes``, this method will set the current system auth
        state to TACACS+.

        Arguments:
            source (string): The source that you want to set on the device.
        ttypes$https://{0}:{1}/mgmt/tm/auth/source/R6tserver_porttjsontcodei�tmessageN(R2R5R`tprovidertapitpatchRjt
ValueErrorRtstrtcontent(RtsourceRGturitresptresponsetex((sP/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_device_auth.pytupdate_auth_source_on_device�s	
cC`s�dj|jjd|jjd�}|jjj|�}y|j�}Wn%tk
rr}tt|���nXd|kr�|ddkr�d|kr�t|d��q�t|j	��n|dS(Ns#https://{0}:{1}/mgmt/tm/auth/sourceR6RiRki�RlRh(
R5R`RmRnR3RjRpRRqRr(RRtRuRvRw((sP/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_device_auth.pyt$read_current_auth_source_from_device�s
(RRRLRSRTR[RYRURVRxRy(((sP/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_device_auth.pyRFxs								.tLocalManagercB`s�eZd�Zed��Zed��Zdd�Zdd�Zdd�Z	dd�Z
dd�Zd�Zd	�Z
d
�Zd�ZRS(
cO`sg|jdd�|_t|jj�|_|jd|jj�|_|j�|_	|j
�|_dS(NRaRG(R3R0RaR
RGR`tget_module_parametersR<tget_api_parametersR=RHRI(Rtargstkwargs((sP/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_device_auth.pyR>�s
cC`sgS(N((R((sP/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_device_auth.pyRscC`sgS(N((R((sP/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_device_auth.pyRscC`s
td|�S(NRG(R(RRG((sP/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_device_auth.pytget_parametersscC`s
td|�S(NRG(R (RRG((sP/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_device_auth.pyRHscC`s
td|�S(NRG(R!(RRG((sP/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_device_auth.pyRXscC`s
td|�S(NRG(R(RRG((sP/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_device_auth.pyR{scC`s
td|�S(NRG(R(RRG((sP/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_device_auth.pyR|scC`s�dj|jjd|jjd�}|jjj|�}y|j�}Wn%tk
rr}tt|���nXd|kr�|ddkr�d|kr�t|d��q�t|j	��n|ddkr�t
StS(	Ns#https://{0}:{1}/mgmt/tm/auth/sourceR6RiRki�RlRhtlocal(R5R`RmRnR3RjRpRRqRrRNRO(RRtRuRvRw((sP/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_device_auth.pyRes
cC`s+|j�|jjrtS|jd�tS(NR�(RLRat
check_modeRNRx(R((sP/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_device_auth.pyRf.s


cC`s|j�s|j�SdS(N(ReRf(R((sP/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_device_auth.pyRU5scC`std��dS(Ns[The 'local' type cannot be removed. Instead, specify a 'state' of 'present' on other types.(R(R((sP/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_device_auth.pyRV9sN(RRR>RRRR0RRHRXR{R|ReRfRURV(((sP/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_device_auth.pyRz�s				t
TacacsManagercB`s�eZd�Zed��Zed��Zdd�Zdd�Zdd�Z	dd�Z
d�Zd�Zd	�Z
d
�Zd�Zd�Zd
�Zd�ZRS(cO`sg|jdd�|_t|jj�|_|jd|jj�|_|j�|_	|j
�|_dS(NRaRG(R3R0RaR
RGR`R{R<R|R=RHRI(RR}R~((sP/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_device_auth.pyR>As
cC`stjS(N(R"R(R((sP/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_device_auth.pyRHscC`stjS(N(R"R(R((sP/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_device_auth.pyRLscC`s
td|�S(NRG(R9(RRG((sP/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_device_auth.pyRHPscC`s
td|�S(NRG(R:(RRG((sP/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_device_auth.pyRXSscC`s
td|�S(NRG(R,(RRG((sP/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_device_auth.pyR{VscC`s
td|�S(NRG(R+(RRG((sP/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_device_auth.pyR|YscC`s�dj|jjd|jjd�}|jjj|�}y|j�}Wntk
r_tSX|jdks�d|kr�|ddkr�tSt	S(Ns7https://{0}:{1}/mgmt/tm/auth/tacacs/~Common~system-authR6Rii�Rk(
R5R`RmRnR3RjRpRORRN(RRtRuRv((sP/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_device_auth.pyRe\s

+cC`sD|j�|jjrtS|j�|jjr@|jd�ntS(NR7(RLRaR�RNtcreate_on_deviceR<tuse_for_authRx(R((sP/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_device_auth.pyRfjs

cC`s�|j�|_|j�stS|jjr/tSt}|j�rJt}n|jj	r~|j
jdkr~|jd�t}n|S(NR7(
tread_current_from_deviceR=RTRORaR�RNtupdate_on_deviceR<R�RIR*Rx(RR((sP/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_device_auth.pyRMss	
	cC`sF|jjrtS|jd�|j�|j�rBtd��ntS(NR�sFailed to delete the resource.(RaR�RNRxtremove_from_deviceReR(R((sP/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_device_auth.pyRg�s

cC`s�|jj�}d|d<dj|jjd|jjd�}|jjj|d|�}y|j�}Wn%tk
r�}t	t
|���nXd|kr�|ddkr�d
|kr�t	|d
��q�t	|j��ndS(Nssystem-authtnames#https://{0}:{1}/mgmt/tm/auth/tacacsR6RiRjRki�i�Rl(i�i�(RIt
api_paramsR5R`RmRntpostRjRpRRqRr(RRGRtRuRvRw((sP/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_device_auth.pyR��s

cC`s�|jj�}|stSdj|jjd|jjd�}|jjj|d|�}y|j�}Wn%t	k
r�}t
t|���nXd|kr�|ddkr�d|kr�t
|d��q�t
|j��nt
S(Ns7https://{0}:{1}/mgmt/tm/auth/tacacs/~Common~system-authR6RiRjRki�Rl(RIR�ROR5R`RmRnRoRjRpRRqRrRN(RRGRtRuRvRw((sP/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_device_auth.pyR��s 
cC`sadj|jjd|jjd�}|jjj|�}|jdkrNtSt|j��dS(Ns7https://{0}:{1}/mgmt/tm/auth/tacacs/~Common~system-authR6Rii�(	R5R`RmRntdeleteRRNRRr(RRtRu((sP/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_device_auth.pyR��s
cC`s�dj|jjd|jjd�}|jjj|�}y|j�}Wn%tk
rr}tt|���nXd|kr�|ddkr�d|kr�t|d��q�t|j	��n|j
�|d<|jd|�S(	Ns7https://{0}:{1}/mgmt/tm/auth/tacacs/~Common~system-authR6RiRki�RlR*RG(R5R`RmRnR3RjRpRRqRrRyR|(RRtRuRvRw((sP/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_device_auth.pyR��s
N(RRR>RRRR0RHRXR{R|ReRfRMRgR�R�R�R�(((sP/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_device_auth.pyR�@s										
t
ModuleManagercB`s#eZd�Zd�Zd�ZRS(cO`s"|jdd�|_||_dS(NRa(R3R0RaR~(RR}R~((sP/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_device_auth.pyR>�scC`s#|j|jjd�}|j�S(NRh(tget_managerRaRGR[(Rtmanager((sP/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_device_auth.pyR[�scC`sB|dkrt|j�S|dkr2t|j�Std��dS(NR7R�sThe provided 'type' is unknown.(R�R~RzR(RRh((sP/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_device_auth.pyR��s

(RRR>R[R�(((sP/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_device_auth.pyR��s		tArgumentSpeccB`seZd�ZRS(cC`s;t|_tdtdtdddg�dtdd�dtd	t�d
tdddd
dddddg�dtdddddddddddddd d!d"d#d$g�d%tdd&d'g�d(tdd)�d*tdd+d,gd-d+�d.td-d/dd/d0g��	}i|_|jjt�|jj|�dS(1NRhtrequiredtchoicesR�R7R)trawR(tno_logR%tsliptppptaraptshells
tty-daemont
connectiontsystemtfirewallR#tlcptiptipxtatalktvinestlattxremotettn3270ttelnettrlogintpadtvpdntftpthttptdeccptosicptunknownR'suse-first-serversuse-all-serversR�tboolRERDt	on_createtdefaultRWRURV(RNtsupports_check_modeR2t
argument_specRMR
(RR�((sP/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_device_auth.pyR>�s6			(RRR>(((sP/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_device_auth.pyR��scC`s�t�}td|jd|j�}y,td|�}|j�}|j|�Wn)tk
r{}|jdt	|��nXdS(NR�R�RaR](
R�RR�R�R�R[t	exit_jsonRt	fail_jsonRq(tspecRatmmtresultsRw((sP/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_device_auth.pytmains		t__main__N(,t
__future__RRRRht
__metaclass__tANSIBLE_METADATAt
DOCUMENTATIONtEXAMPLEStRETURNtansible.module_utils.basicRtansible.module_utils.sixR	t%library.module_utils.network.f5.bigipR
t&library.module_utils.network.f5.commonRRR
tImportErrort%ansible.module_utils.network.f5.bigipt&ansible.module_utils.network.f5.commonRRRRR R!R"R+R,R8R9R:tobjectR;RFRzR�R�R�R�R(((sP/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_device_auth.pyt<module>sP


�'
 �D�-	

Anons79 File Manager Version 1.0, Coded By Anons79
Email: [email protected]