Anons79 Mini Shell

Directory : /lib/python2.7/site-packages/ansible/modules/network/f5/
Upload File :
Current File : //lib/python2.7/site-packages/ansible/modules/network/f5/bigip_device_auth_ldap.pyo

�
�Udac@`scddlmZmZmZeZidd6dgd6dd6ZdZd	Zd
Z	ddl
mZy�ddlm
Z
dd
lmZddlmZddlmZddlmZddlmZddlmZddlmZWn�ek
ryddlm
Z
dd
lmZddlmZddlmZddlmZddlmZddlmZddlmZnXdefd��YZdefd��YZdefd��YZdefd��YZdefd��YZdefd��YZ d e!fd!��YZ"d"e!fd#��YZ#d$e!fd%��YZ$d&�Z%e&d'kr_e%�nd(S()i(tabsolute_importtdivisiontprint_functions1.1tmetadata_versiontpreviewtstatust	certifiedtsupported_bys
---
module: bigip_device_auth_ldap
short_description: Manage LDAP device authentication settings on BIG-IP
description:
  - Manage LDAP device authentication settings on BIG-IP.
version_added: 2.8
options:
  servers:
    description:
      - Specifies the LDAP servers that the system must use to obtain
        authentication information. You must specify a server when you
        create an LDAP configuration object.
    type: list
  port:
    description:
      - Specifies the port that the system uses for access to the remote host server.
      - When configuring LDAP device authentication for the first time, if this parameter
        is not specified, the default port is C(389).
    type: int
  remote_directory_tree:
    description:
      - Specifies the file location (tree) of the user authentication database on the
        server.
    type: str
  scope:
    description:
      - Specifies the level of the remote Active Directory or LDAP directory that the
        system should search for the user authentication.
    type: str
    choices:
      - sub
      - one
      - base
  bind_dn:
    description:
      - Specifies the distinguished name for the Active Directory or LDAP server user
        ID.
      - The BIG-IP client authentication module does not support Active Directory or
        LDAP servers that do not perform bind referral when authenticating referred
        accounts.
      - Therefore, if you plan to use Active Directory or LDAP as your authentication
        source and want to use referred accounts, make sure your servers perform bind
        referral.
    type: str
  bind_password:
    description:
      - Specifies a password for the Active Directory or LDAP server user ID.
    type: str
  user_template:
    description:
      - Specifies the distinguished name of the user who is logging on.
      - You specify the template as a variable that the system replaces with user-specific
        information during the logon attempt.
      - For example, you could specify a user template such as C(%[email protected]) or
        C(uxml:id=%s,ou=people,dc=siterequest,dc=com).
      - When a user attempts to log on, the system replaces C(%s) with the name the user
        specified in the Basic Authentication dialog box, and passes that as the
        distinguished name for the bind operation.
      - The system passes the associated password as the password for the bind operation.
      - This field can contain only one C(%s) and cannot contain any other format
        specifiers.
    type: str
  check_member_attr:
    description:
      - Checks the user's member attribute in the remote LDAP or AD group.
    type: bool
  ssl:
    description:
      - Specifies whether the system uses an SSL port to communicate with the LDAP server.
    type: str
    choices:
      - "yes"
      - "no"
      - start-tls
  ca_cert:
    description:
      - Specifies the name of an SSL certificate from a certificate authority (CA).
      - To remove this value, use the reserved value C(none).
    type: str
    aliases: [ ssl_ca_cert ]
  client_key:
    description:
      - Specifies the name of an SSL client key.
      - To remove this value, use the reserved value C(none).
    type: str
    aliases: [ ssl_client_key ]
  client_cert:
    description:
      - Specifies the name of an SSL client certificate.
      - To remove this value, use the reserved value C(none).
    type: str
    aliases: [ ssl_client_cert ]
  validate_certs:
    description:
      - Specifies whether the system checks an SSL peer, as a result of which the
        system requires and verifies the server certificate.
    type: bool
    aliases: [ ssl_check_peer ]
  login_ldap_attr:
    description:
      - Specifies the LDAP directory attribute containing the local user name that is
        associated with the selected directory entry.
      - When configuring LDAP device authentication for the first time, if this parameter
        is not specified, the default port is C(samaccountname).
    type: str
  fallback_to_local:
    description:
      - Specifies that the system uses the Local authentication method if the remote
        authentication method is not available.
    type: bool
  state:
    description:
      - When C(present), ensures the device authentication method exists.
      - When C(absent), ensures the device authentication method does not exist.
    type: str
    choices:
      - present
      - absent
    default: present
  update_password:
    description:
      - C(always) will always update the C(bind_password).
      - C(on_create) will only set the C(bind_password) for newly created authentication
        mechanisms.
    type: str
    choices:
      - always
      - on_create
    default: always
extends_documentation_fragment: f5
author:
  - Tim Rupp (@caphrim007)
  - Wojciech Wypior (@wojtek0806)
s�
- name: Create an LDAP authentication object
  bigip_device_auth_ldap:
    name: foo
    provider:
      password: secret
      server: lb.mydomain.com
      user: admin
  delegate_to: localhost
sI
servers:
  description: LDAP servers used by the system to obtain authentication information.
  returned: changed
  type: list
  sample: ['192.168.1.1', '192.168.1.2']
port:
  description: The port that the system uses for access to the remote LDAP server.
  returned: changed
  type: int
  sample: 389
remote_directory_tree:
  description: File location (tree) of the user authentication database on the server.
  returned: changed
  type: str
  sample: "CN=Users,DC=FOOBAR,DC=LOCAL"
scope:
  description: The level of the remote Active Directory or LDAP directory searched for user authentication.
  returned: changed
  type: str
  sample: base
bind_dn:
  description: The distinguished name for the Active Directory or LDAP server user ID.
  returned: changed
  type: str
  sample: "[email protected]"
user_template:
  description: The distinguished name of the user who is logging on.
  returned: changed
  type: str
  sample: "uid=%s,ou=people,dc=foobar,dc=local"
check_member_attr:
  description: The user's member attribute in the remote LDAP or AD group.
  returned: changed
  type: bool
  sample: yes
ssl:
  description: Specifies whether the system uses an SSL port to communicate with the LDAP server.
  returned: changed
  type: str
  sample: start-tls
ca_cert:
  description: The name of an SSL certificate from a certificate authority.
  returned: changed
  type: str
  sample: My-Trusted-CA-Bundle.crt
client_key:
  description: The name of an SSL client key.
  returned: changed
  type: str
  sample: MyKey.key
client_cert:
  description: The name of an SSL client certificate.
  returned: changed
  type: str
  sample: MyCert.crt
validate_certs:
  description: Indicates if the system checks an SSL peer.
  returned: changed
  type: bool
  sample: yes
login_ldap_attr:
  description: The LDAP directory attribute containing the local user name associated with the selected directory entry.
  returned: changed
  type: str
  sample: samaccountname
fallback_to_local:
  description: Specifies that the system uses the Local authentication method as fallback
  returned: changed
  type: bool
  sample: yes
(t
AnsibleModule(tF5RestClient(t
F5ModuleError(tAnsibleF5Parameters(tfq_name(ttransform_name(tf5_argument_spec(tflatten_boolean(tcmp_str_with_nonet
ParameterscB`sxeZidd6dd6dd6dd6dd	6d
d6dd
6dd6dd6dd6dd6Zdddd	dddddddd
ddgZdddddddddddd
dddgZdddddddddddddddgZed��Zed��Zed ��Z	ed!��Z
ed"��Zed#��Zed$��Z
ed%��Zed&��ZRS('tbind_dntbindDnt
bind_passwordtbindPwt
user_templatetuserTemplatetfallback_to_localtfallbacktlogin_ldap_attrtloginAttributetvalidate_certstsslCheckPeertclient_certt
sslClientCertt
client_keytsslClientKeytca_certt
sslCaCertFiletcheck_member_attrtcheckRolesGrouptremote_directory_treetsearchBaseDntporttscopetserverstssltssl_ca_certtssl_check_peertssl_client_certtssl_client_keycC`sE|jddkrdS|jddkr.dSt|j|jd�S(NR,tnonet(R0R1(t_valuestNoneRt	partition(tself((sU/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_device_auth_ldap.pyR,Es
cC`sE|jddkrdS|jddkr.dSt|j|jd�S(NR/R0R1(snoneR1(R2R3RR4(R5((sU/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_device_auth_ldap.pyR/Ms
cC`sE|jddkrdS|jddkr.dSt|j|jd�S(NR.R0R1(snoneR1(R2R3RR4(R5((sU/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_device_auth_ldap.pyR.Us
cC`st|jd�S(NR-(RR2(R5((sU/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_device_auth_ldap.pyR-]scC`st|jd�S(NR(RR2(R5((sU/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_device_auth_ldap.pyRascC`st|jd�S(NR$(RR2(R5((sU/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_device_auth_ldap.pyR$escC`s9|jddkrdS|jddkr.dS|jdS(NRR0R1(snoneR1(R2R3(R5((sU/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_device_auth_ldap.pyRis
cC`s9|jddkrdS|jddkr.dS|jdS(NRR0R1(snoneR1(R2R3(R5((sU/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_device_auth_ldap.pyRqs
cC`s?|jddkrdS|jddkr.dSt|jd�S(NR+s	start-tls(R2R3R(R5((sU/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_device_auth_ldap.pyR+ys
(t__name__t
__module__tapi_maptapi_attributestreturnablest
updatablestpropertyR,R/R.R-RR$RRR+(((sU/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_device_auth_ldap.pyRs�
			t
ApiParameterscB`seZRS((R6R7(((sU/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_device_auth_ldap.pyR=�stModuleParameterscB`seZRS((R6R7(((sU/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_device_auth_ldap.pyR>�stChangescB`seZd�ZRS(cC`sXi}y:x$|jD]}t||�||<qW|j|�}Wntk
rSnX|S(N(R:tgetattrt_filter_paramst	Exception(R5tresultt
returnable((sU/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_device_auth_ldap.pyt	to_return�s
(R6R7RE(((sU/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_device_auth_ldap.pyR?�st
UsableChangescB`sDeZed��Zed��Zed��Zed��ZRS(cC`s2|jddkrdS|jddkr.dSdS(NR-tyestenabledtdisabled(R2R3(R5((sU/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_device_auth_ldap.pyR-�s
cC`s2|jddkrdS|jddkr.dSdS(NRRGttruetfalse(R2R3(R5((sU/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_device_auth_ldap.pyR�s
cC`s2|jddkrdS|jddkr.dSdS(NR$RGRHRI(R2R3(R5((sU/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_device_auth_ldap.pyR$�s
cC`sI|jddkrdS|jddkr.dS|jddkrEdSdS(NR+s	start-tlsRGRHRI(R2R3(R5((sU/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_device_auth_ldap.pyR+�s(R6R7R<R-RR$R+(((sU/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_device_auth_ldap.pyRF�stReportableChangescB`sDeZed��Zed��Zed��Zed��ZRS(cC`sdS(N(R3(R5((sU/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_device_auth_ldap.pyR�scC`st|jd�S(NR-(RR2(R5((sU/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_device_auth_ldap.pyR-�scC`st|jd�S(NR$(RR2(R5((sU/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_device_auth_ldap.pyR$�scC`s?|jddkrdS|jddkr.dSt|jd�S(NR+s	start-tls(R2R3R(R5((sU/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_device_auth_ldap.pyR+�s
(R6R7R<RR-R$R+(((sU/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_device_auth_ldap.pyRL�st
DifferencecB`s�eZd	d�Zd�Zd�Zed��Zed��Zed��Z	ed��Z
ed��Zed��ZRS(
cC`s||_||_dS(N(twantthave(R5RNRO((sU/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_device_auth_ldap.pyt__init__�s	cC`s9yt||�}|SWntk
r4|j|�SXdS(N(R@tAttributeErrort_Difference__default(R5tparamRC((sU/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_device_auth_ldap.pytcompare�s

cC`sQt|j|�}y&t|j|�}||kr7|SWntk
rL|SXdS(N(R@RNRORQ(R5RStattr1tattr2((sU/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_device_auth_ldap.pyt	__default�s
cC`st|jj|jj�S(N(RRNRRO(R5((sU/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_device_auth_ldap.pyR�scC`st|jj|jj�S(N(RRNRRO(R5((sU/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_device_auth_ldap.pyR�scC`st|jj|jj�S(N(RRNR,RO(R5((sU/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_device_auth_ldap.pyR,�scC`st|jj|jj�S(N(RRNR/RO(R5((sU/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_device_auth_ldap.pyR/�scC`st|jj|jj�S(N(RRNR.RO(R5((sU/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_device_auth_ldap.pyR.�scC`s8|jj|jjkr4|jjdkr4|jjSdS(Ntalways(RNRROtupdate_password(R5((sU/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_device_auth_ldap.pyR�s*N(
R6R7R3RPRTRRR<RRR,R/R.R(((sU/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_device_auth_ldap.pyRM�s			t
ModuleManagercB`s�eZd�Zd�Zd�Zd�Zd�Zd�Zd�Zd�Z	d�Z
d	�Zd
�Zd�Z
d�Zd
�Zd�Zd�Zd�Zd�ZRS(cO`s^|jdd�|_t|jj�|_td|jj�|_t�|_	t
�|_dS(Ntmoduletparams(tgetR3R[R	R\tclientR>RNR=RORFtchanges(R5targstkwargs((sU/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_device_auth_ldap.pyRPs
cC`sji}xBtjD]7}t|j|�dk	rt|j|�||<qqW|rftd|�|_ndS(NR\(RR:R@RNR3RFR_(R5tchangedtkey((sU/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_device_auth_ldap.pyt_set_changed_optionsscC`s�t|j|j�}tj}t�}xX|D]P}|j|�}|dkrUq.q.t|t�rt|j	|�q.|||<q.W|r�t
d|�|_tSt
S(NR\(RMRNRORR;tdictRTR3t
isinstancetupdateRFR_tTruetFalse(R5tdiffR;Rbtktchange((sU/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_device_auth_ldap.pyt_update_changed_optionss		
cC`sK|jdg�}x2|D]*}|jjjd|dd|d�qWdS(Nt
__warningstmsgtversion(tpopR^R[t	deprecate(R5RCtwarningstwarning((sU/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_device_auth_ldap.pyt_announce_deprecations!s


cC`s�td|�}dj|jjd|jjd�}|jjj|d|�}y|j�}Wn%tk
r�}tt	|���nXd|kr�|ddkr�d|kr�t|d��q�t|j
��nd	S(
sSet the system auth source.

        Configuring the authentication source is only one step in the process of setting
        up an auth source. The other step is to inform the system of the auth source
        you want to use.

        This method is used for situations where

        * The ``use_for_auth`` parameter is set to ``yes``
        * The ``use_for_auth`` parameter is set to ``no``
        * The ``state`` parameter is set to ``absent``

        When ``state`` equal to ``absent``, before you can delete the TACACS+ configuration,
        you must set the system auth to "something else". The system ships with a system
        auth called "local", so this is the logical "something else" to use.

        When ``use_for_auth`` is no, the same situation applies as when ``state`` equal
        to ``absent`` is done above.

        When ``use_for_auth`` is ``yes``, this method will set the current system auth
        state to TACACS+.

        Arguments:
            source (string): The source that you want to set on the device.
        ttypes$https://{0}:{1}/mgmt/tm/auth/source/tservertserver_porttjsontcodei�tmessageN(RetformatR^tprovidertapitpatchRyt
ValueErrorR
tstrtcontent(R5tsourceR\turitresptresponsetex((sU/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_device_auth_ldap.pytupdate_auth_source_on_device)s	
cC`s�td|�}dj|jjd|jjd�}|jjj|d|�}y|j�}Wn%tk
r�}tt	|���nXd|kr�|ddkr�d|kr�t|d��q�t|j
��ndS(	NRs$https://{0}:{1}/mgmt/tm/auth/source/RwRxRyRzi�R{(ReR|R^R}R~RRyR�R
R�R�(R5RR\R�R�R�R�((sU/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_device_auth_ldap.pytupdate_fallback_on_deviceWs	
cC`s�t}t�}|jj}|dkr6|j�}n|dkrQ|j�}ntd|jj��}|j�}|j	|�|j	td|��|j
|�|S(NtpresenttabsentR\Rb(RiReRNtstateR�R�RLR_RERgRu(R5RbRCR�t
reportableR_((sU/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_device_auth_ldap.pytexec_modulels	

cC`s$|j�r|j�S|j�SdS(N(texistsRgtcreate(R5((sU/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_device_auth_ldap.pyR�}s
cC`s|j�r|j�StS(N(R�tremoveRi(R5((sU/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_device_auth_ldap.pyR��s
cC`s|j�}|rtStS(N(RmRhRi(R5RC((sU/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_device_auth_ldap.pyt
should_update�scC`s�|j�|_|j�stS|jjr/tS|j�|jj	dkr[|j
d�n"|jj	dkr}|j
d�ntS(NRGRJtnoRK(tread_current_from_deviceROR�RiR[t
check_modeRhtupdate_on_deviceRNRR�(R5((sU/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_device_auth_ldap.pyRg�s
cC`sF|jjrtS|jd�|j�|j�rBtd��ntS(NtlocalsFailed to delete the resource.(R[R�RhR�tremove_from_deviceR�R
(R5((sU/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_device_auth_ldap.pyR��s

cC`sl|j�|jjrtS|j�|jjdkrF|jd�n"|jjdkrh|jd�ntS(NRGRJR�RK(RdR[R�Rhtcreate_on_deviceRNRR�(R5((sU/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_device_auth_ldap.pyR��s

cC`s�dj|jjd|jjdtdd��}|jjj|�}y|j�}Wntk
rktSX|j	dks�d|kr�|ddkr�tSt
S(Ns%https://{0}:{1}/mgmt/tm/auth/ldap/{2}RwRxtCommonssystem-authi�Rz(R|R^R}R
R~R]RyR�RiRRh(R5R�R�R�((sU/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_device_auth_ldap.pyR��s


+cC`s�|jj�}d|d<d|d<dj|jjd|jjd�}|jjj|d|�}y|j�}Wn%tk
r�}t	t
|���nXd	|kr�|d	d
kr�d|kr�t	|d��q�t	|j��ntS(Nssystem-authtnameR�R4s"https://{0}:{1}/mgmt/tm/auth/ldap/RwRxRyRzi�i�R{(i�i�(
R_t
api_paramsR|R^R}R~tpostRyR�R
R�R�Rh(R5R\R�R�R�R�((sU/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_device_auth_ldap.pyR��s 


cC`s�|jj�}|sdSdj|jjd|jjdtdd��}|jjj|d|�}y|j�}Wn%t	k
r�}t
t|���nXd|kr�|ddkr�d	|kr�t
|d	��q�t
|j��ndS(
Ns%https://{0}:{1}/mgmt/tm/auth/ldap/{2}RwRxR�ssystem-authRyRzi�R{(
R_R�R|R^R}R
R~RRyR�R
R�R�(R5R\R�R�R�R�((sU/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_device_auth_ldap.pyR��s 

cC`smdj|jjd|jjdtdd��}|jjj|�}|jdkrZtSt|j	��dS(Ns%https://{0}:{1}/mgmt/tm/auth/ldap/{2}RwRxR�ssystem-authi�(
R|R^R}R
R~tdeleteRRhR
R�(R5R�R�((sU/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_device_auth_ldap.pyR��s

cC`s�dj|jjd|jjdtdd��}|jjj|�}y|j�}Wn%tk
r~}tt	|���nXd|kr�|ddkr�d|kr�t|d��q�t|j
��ntd	|�}d
j|jjd|jjd�}|jjj|�}y|j�}Wn%tk
rM}tt	|���nXd|kr�|ddkr�d|kr�t|d��q�t|j
��n|ji|dd6�|S(Ns%https://{0}:{1}/mgmt/tm/auth/ldap/{2}RwRxR�ssystem-authRzi�R{R\s$https://{0}:{1}/mgmt/tm/auth/source/R(
R|R^R}R
R~R]RyR�R
R�R�R=Rg(R5R�R�R�R�RC((sU/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_device_auth_ldap.pyR��s8


(R6R7RPRdRmRuR�R�R�R�R�R�RgR�R�R�R�R�R�R�(((sU/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_device_auth_ldap.pyRZ�s$					.						
							tArgumentSpeccB`seZd�ZRS(c(C`sbt|_tdtdd�dtdd�dt�dtdd	d
dg�dt�d
tdt�dt�dtdd�dtddddg�dtddg�dtddg�dtddg�dtddddg�dt�d tdd�d!td"d#dd#d$g�d%td"d&dd'd&g��}i|_|jjt�|jj|�dS((NR*RvtlistR(tintR&R)tchoicestsubtonetbaseRRtno_logRR$tboolR+RGR�s	start-tlsR"taliasesR,R R/RR.RR-RRRYtdefaultRXt	on_createR�R�R�(Rhtsupports_check_modeRet
argument_specRgR(R5R�((sU/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_device_auth_ldap.pyRPs4						(R6R7RP(((sU/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_device_auth_ldap.pyR�scC`s�t�}td|jd|j�}y,td|�}|j�}|j|�Wn)tk
r{}|jdt	|��nXdS(NR�R�R[Ro(
R�RR�R�RZR�t	exit_jsonR
t	fail_jsonR�(tspecR[tmmtresultsR�((sU/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_device_auth_ldap.pytmain;s		t__main__N('t
__future__RRRRvt
__metaclass__tANSIBLE_METADATAt
DOCUMENTATIONtEXAMPLEStRETURNtansible.module_utils.basicRt%library.module_utils.network.f5.bigipR	t&library.module_utils.network.f5.commonR
RRR
RRt'library.module_utils.network.f5.compareRtImportErrort%ansible.module_utils.network.f5.bigipt&ansible.module_utils.network.f5.commont'ansible.module_utils.network.f5.compareRR=R>R?RFRLtobjectRMRZR�R�R6(((sU/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_device_auth_ldap.pyt<module>sN


�I
�$/�"	

Anons79 File Manager Version 1.0, Coded By Anons79
Email: [email protected]