Anons79 Mini Shell

Directory : /lib/python2.7/site-packages/ansible/modules/network/f5/
Upload File :
Current File : //lib/python2.7/site-packages/ansible/modules/network/f5/bigip_firewall_log_profile_network.pyo

�
�Udac@`ssddlmZmZmZeZidd6dgd6dd6ZdZd	Zd
Z	ddl
mZddl
mZy�dd
l
mZddlmZddlmZddlmZddlmZddlmZddlmZddlmZWn�ek
r�dd
lmZddlmZddlmZddlmZddlmZddlmZddlmZddlmZnXdefd��YZdefd��YZdefd��YZdefd��YZdefd��YZ defd ��YZ!d!e"fd"��YZ#d#e"fd$��YZ$d%e"fd&��YZ%d'�Z&e'd(kroe&�nd)S(*i(tabsolute_importtdivisiontprint_functions1.1tmetadata_versiontpreviewtstatust	certifiedtsupported_bys#"
---
module: bigip_firewall_log_profile_network
short_description: Configures Network Firewall related settings of the log profile
description:
  - Configures Network Firewall related settings of the log profile.
version_added: 2.9
options:
  profile_name:
    description:
      - Specifies the name of the AFM log profile to be updated.
    type: str
    required: True
  log_publisher:
    description:
      - Specifies the name of the log publisher used for Network events.
      - To specify the log_publisher on a different partition from the AFM log profile, specify the name in fullpath
        format, e.g. C(/Foobar/log-publisher), otherwise the partition for log publisher is inferred from C(partition)
        module parameter.
    type: str
  rate_limit:
    description:
      - Defines a rate limit for all combined network firewall log messages per second. Beyond this rate limit,
        log messages are not logged.
      - To specify an indefinite rate, use the value C(indefinite).
      - If specifying a numeric rate, the value must be between C(1) and C(4294967295).
    type: str
  log_matches_accept_rule:
    description:
      - Modify log settings for ACL rules configured with an "accept" or "accept decisively" action.
    suboptions:
      enabled:
        description:
          - This option is used to enable or disable the logging of packets that match ACL rules configured with
            an "accept" or "accept decisively" action.
        type: bool
      rate_limit:
        description:
          - This option is used to set rate limits for the logging of packets that match ACL rules
            configured with an "accept" or "accept decisively" action.
          - This option is effective only if logging of this message type is enabled.
        type: int
    type: dict
  log_matches_drop_rule:
    description:
      - Modify log settings for ACL rules configured with a drop action.
    suboptions:
      enabled:
        description:
          - This option is used to enable or disable the logging of packets that match ACL rules
            configured with a drop action.
        type: bool
      rate_limit:
        description:
          - This option is used to set rate limits for the logging of packets that match ACL rules
            configured with a drop action.
          - This option is effective only if logging of this message type is enabled.
        type: int
    type: dict
  log_matches_reject_rule:
    description:
      - Modify log settings for ACL rules configured with a reject action.
    suboptions:
      enabled:
        description:
          - This option is used to enable or disable the logging of packets that match ACL rules
            configured with a reject action.
        type: bool
      rate_limit:
        description:
          - This option is used to set rate limits for the logging of packets that match ACL rules
            configured with a reject action.
          - This option is effective only if logging of this message type is enabled.
        type: int
    type: dict
  log_ip_errors:
    description:
      - Modify log settings for logging of IP error packets.
    suboptions:
      enabled:
        description:
          - This option is used to enable or disable the logging of IP error packets.
        type: bool
      rate_limit:
        description:
          - This option is used to set rate limits for the logging of IP error packets.
          - This option is effective only if logging of this message type is enabled.
        type: int
    type: dict
  log_tcp_errors:
    description:
      - Modify log settings for logging of TCP error packets.
    suboptions:
      enabled:
        description:
          - This option is used to enable or disable the logging of TCP error packets.
        type: bool
      rate_limit:
        description:
          - This option is used to set rate limits for the logging of TCP error packets.
          - This option is effective only if logging of this message type is enabled.
        type: int
    type: dict
  log_tcp_events:
    description:
      - Modify log settings for logging of TCP events on the client side.
    suboptions:
      enabled:
        description:
          - This option is used to enable or disable the logging of TCP events on the client side.
          - Only 'Established' and 'Closed' states of a TCP session are logged if this option is enabled.
        type: bool
      rate_limit:
        description:
          - This option is used to set rate limits for the logging of TCP events on the client side.
          - This option is effective only if logging of this message type is enabled.
        type: int
    type: dict
  log_translation_fields:
    description:
      - This option is used to enable or disable the logging of translated (i.e server side) fields in ACL
        match and TCP events.
      - Translated fields include (but are not limited to) source address/port, destination address/port,
        IP protocol, route domain, and VLAN.
    type: bool
  log_storage_format:
    description:
      - Specifies the type of the storage format.
      - When creating a new log profile, if this parameter is not specified, the default is C(none).
      - When C(field-list), specifies that the log displays only the items you specify in the C(log_message_fields) list
        with C(log_format_delimiter) as the delimiter between the items.
      - When C(none), the messages will be logged in the default format, which is C("management_ip_address",
        "bigip_hostname","context_type", "context_name","src_geo","src_ip", "dest_geo","dest_ip","src_port",
        "dest_port","vlan","protocol","route_domain", "translated_src_ip", "translated_dest_ip",
        "translated_src_port","translated_dest_port", "translated_vlan","translated_ip_protocol",
        "translated_route_domain", "acl_policy_type", "acl_policy_name","acl_rule_name","action",
        "drop_reason","sa_translation_type", "sa_translation_pool","flow_id", "source_user",
        "source_fqdn","dest_fqdn").
    choices:
      - field-list
      - none
    type: str
  log_format_delimiter:
    description:
      - Specifies the delimiter string when using a C(log_storage_format) of C(field-list).
      - When creating a new profile, if this parameter is not specified, the default value of C(,)
        (the comma character) will be used.
      - This option is valid when the C(log_storage_format) is set to C(field-list). It will be ignored otherwise.
      - Depending on the delimiter used, it may be necessary to wrap the delimiter
        in quotes to prevent YAML errors from occurring.
      - The special character C($) should not be used, and will raise an error if used,
        as it is reserved for internal use.
      - The maximum length allowed for this parameter is C(31) characters.
    type: str
  log_message_fields:
    description:
      - Specifies a set of fields to be logged.
      - This option is valid when the C(log_storage_format) is set to C(field-list). It will be ignored otherwise.
      - The order of the list is important as the server displays the selected traffic items in the log
        sequentially according to it.
    type: list
    choices:
      - acl_policy_name
      - acl_policy_type
      - acl_rule_name
      - action
      - bigip_hostname
      - context_name
      - context_type
      - date_time
      - dest_fqdn
      - dest_geo
      - dest_ip
      - dest_port
      - drop_reason
      - management_ip_address
      - protocol
      - route_domain
      - sa_translation_pool
      - sa_translation_type
      - source_fqdn
      - source_user
      - src_geo
      - src_ip
      - src_port
      - translated_dest_ip
      - translated_dest_port
      - translated_ip_protocol
      - translated_route_domain
      - translated_src_ip
      - translated_src_port
      - translated_vlan
      - vlan
  partition:
    description:
      - Device partition to create log profile on.
      - Parameter also used when specifying names for log publishers, unless log publisher names are in fullpath format.
    type: str
    default: Common
  state:
    description:
      - When C(state) is C(present), ensures the resource exists.
      - Only built-in profile that allows updating network log settings is global-network, attempts to do so on other
        built-in profiles will be ignored.
      - When C(state) is C(absent), ensures that resource is removed.
      - The C(absent) state is ignored for global-network log profile.
    type: str
    choices:
      - present
      - absent
    default: present
extends_documentation_fragment: f5
author:
  - Wojciech Wypior (@wojtek0806)
su
- name: Add network settings to log profile
  bigip_firewall_log_profile_network:
    profile_name: barbaz
    rate_limit: 150000
    log_publisher: local-db-pub
    log_tcp_errors:
      enabled: yes
      rate_limit: 10000
    log_tcp_events:
      enabled: yes
      rate_limit: 40000
    log_storage_format: "field-list"
    log_message_fields:
      - vlan
      - translated_vlan
      - src_ip
    provider:
      password: secret
      server: lb.mydomain.com
      user: admin
  delegate_to: localhost

- name: Change delimiter and log fields
  bigip_firewall_log_profile_network:
    profile_name: barbaz
    log_format_delimiter: '.'
    log_message_fields:
      - translated_dest_ip
      - translated_dest_port
    provider:
      password: secret
      server: lb.mydomain.com
      user: admin
  delegate_to: localhost

- name: Modify built-in profile
  bigip_firewall_log_profile_network:
    profile_name: "global-network"
    log_publisher: "/foobar/log1"
    log_ip_errors:
      enabled: yes
      rate_limit: 60000
    log_matches_reject_rule:
      enabled: yes
      rate_limit: 2000
    log_translation_fields: yes
    log_storage_format: "field-list"
    log_format_delimiter: '.'
    log_message_fields:
      - protocol
      - dest_ip
      - dest_port
    provider:
      password: secret
      server: lb.mydomain.com
      user: admin
  delegate_to: localhost

- name: Remove custom log profile network log settings
  bigip_firewall_log_profile_network:
    profile_name: "{{ log_profile }}"
    state: absent
    provider:
      password: secret
      server: lb.mydomain.com
      user: admin
  delegate_to: localhost
s6
log_publisher:
  description: The name of the log publisher used for Network events.
  returned: changed
  type: str
  sample: /Common/log-publisher
rate_limit:
  description: The rate limit for all combined network firewall log messages per second.
  returned: changed
  type: str
  sample: "indefinite"
log_matches_accept_rule:
  description: Log settings for ACL rules configured with an "accept" or "accept decisively" action.
  type: complex
  returned: changed
  contains:
    enabled:
      description: Enable or disable the logging of packets that match ACL rules.
      returned: changed
      type: bool
      sample: yes
    rate_limit:
      description: The rate limit for the logging of packets that match ACL rules.
      returned: changed
      type: str
      sample: "indefinite"
  sample: hash/dictionary of values
log_matches_drop_rule:
  description: Log settings for ACL rules configured with a drop action.
  type: complex
  returned: changed
  contains:
    enabled:
      description: Enable or disable the logging of packets that match ACL rules.
      returned: changed
      type: bool
      sample: yes
    rate_limit:
      description: The rate limit for the logging of packets that match ACL rules.
      returned: changed
      type: str
      sample: "indefinite"
  sample: hash/dictionary of values
log_matches_reject_rule:
  description: Log settings for ACL rules configured with a reject action.
  type: complex
  returned: changed
  contains:
    enabled:
      description: Enable or disable the logging of packets that match ACL rules.
      returned: changed
      type: bool
      sample: yes
    rate_limit:
      description: The rate limit for the logging of packets that match ACL rules.
      returned: changed
      type: str
      sample: "indefinite"
  sample: hash/dictionary of values
log_ip_errors:
  description: Log settings for logging of IP error packets.
  type: complex
  returned: changed
  contains:
    enabled:
      description: Enable or disable the logging of IP error packets.
      returned: changed
      type: bool
      sample: yes
    rate_limit:
      description: The rate limit for the logging of IP error packets.
      returned: changed
      type: str
      sample: "indefinite"
  sample: hash/dictionary of values
log_tcp_errors:
  description: Log settings for logging of TCP error packets.
  type: complex
  returned: changed
  contains:
    enabled:
      description: Enable or disable the logging of TCP error packets.
      returned: changed
      type: bool
      sample: yes
    rate_limit:
      description: The rate limit for the logging of TCP error packets.
      returned: changed
      type: str
      sample: "indefinite"
  sample: hash/dictionary of values
log_tcp_events:
  description: Log settings for logging of TCP events on the client side.
  type: complex
  returned: changed
  contains:
    enabled:
      description: Enable or disable the logging of TCP events on the client side.
      returned: changed
      type: bool
      sample: yes
    rate_limit:
      description: The rate limit for the logging of TCP events on the client side.
      returned: changed
      type: str
      sample: "indefinite"
  sample: hash/dictionary of values
log_translation_fields:
  description: Enable or disable the logging of translated (i.e server side) fields in ACL match and TCP events.
  returned: changed
  type: bool
  sample: yes
log_storage_format:
  description: The type of the storage format.
  returned: changed
  type: str
  sample: "field-list"
log_format_delimiter:
  description: The delimiter string when using a log_storage_format of field-list.
  returned: changed
  type: str
  sample: "."
log_message_fields:
  description: The delimiter string when using a log_storage_format of field-list.
  returned: changed
  type: list
  sample: ["acl_policy_name", "acl_policy_type"]
(t
AnsibleModule(tenv_fallback(tF5RestClient(t
F5ModuleError(tAnsibleF5Parameters(tfq_name(ttransform_name(tf5_argument_spec(tflatten_boolean(tcmp_str_with_nonet
ParameterscB`s�eZidd6dd6ZddddgZdddd	d
ddd
dddddddddddddgZdddd	d
ddd
ddddddddddgZRS(t
log_publishert	publishertrate_limitst	rateLimittformattfiltertrate_acl_match_accepttrate_acl_match_droptrate_acl_match_rejecttrate_tcp_errorstrate_tcp_eventstrate_ip_errorst
rate_limittlog_acl_match_accepttlog_acl_match_droptlog_acl_match_rejecttlog_tcp_errorstlog_tcp_eventst
log_ip_errorstlog_translation_fieldstlog_format_delimitertlog_storage_formattlog_message_fieldstlog_matches_accept_ruletlog_matches_drop_ruletlog_matches_reject_rule(t__name__t
__module__tapi_maptapi_attributestreturnablest
updatables(((sa/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_firewall_log_profile_network.pyR�s\
		t
ApiParameterscB`seZed��Zed��Zed��Zed��Zed��Zed��Zed��Z	ed��Z
ed��Zed	��Zed
��Z
ed��Zed��Zed
��Zed��Zed��Zed��ZRS(cC`s&|jddkrdS|jddS(NRtaclMatchAccept(t_valuestNone(tself((sa/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_firewall_log_profile_network.pyRscC`s&|jddkrdS|jddS(NRtlogAclMatchAccept(R5R6(R7((sa/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_firewall_log_profile_network.pyR scC`s&|jddkrdS|jddS(NRtaclMatchDrop(R5R6(R7((sa/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_firewall_log_profile_network.pyR
scC`s&|jddkrdS|jddS(NRtlogAclMatchDrop(R5R6(R7((sa/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_firewall_log_profile_network.pyR!scC`s&|jddkrdS|jddS(NRtaclMatchReject(R5R6(R7((sa/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_firewall_log_profile_network.pyRscC`s&|jddkrdS|jddS(NRtlogAclMatchReject(R5R6(R7((sa/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_firewall_log_profile_network.pyR"scC`s&|jddkrdS|jddS(NRt	tcpErrors(R5R6(R7((sa/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_firewall_log_profile_network.pyR%scC`s&|jddkrdS|jddS(NRtlogTcpErrors(R5R6(R7((sa/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_firewall_log_profile_network.pyR#+scC`s&|jddkrdS|jddS(NRt	tcpEvents(R5R6(R7((sa/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_firewall_log_profile_network.pyR1scC`s&|jddkrdS|jddS(NRtlogTcpEvents(R5R6(R7((sa/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_firewall_log_profile_network.pyR$7scC`s&|jddkrdS|jddS(NRtipErrors(R5R6(R7((sa/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_firewall_log_profile_network.pyR=scC`s&|jddkrdS|jddS(NRtlogIpErrors(R5R6(R7((sa/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_firewall_log_profile_network.pyR%CscC`s&|jddkrdS|jddS(NRtlogTranslationFields(R5R6(R7((sa/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_firewall_log_profile_network.pyR&IscC`s&|jddkrdS|jddS(NRt
aggregateRate(R5R6(R7((sa/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_firewall_log_profile_network.pyROscC`s&|jddkrdS|jddS(NRtfieldListDelimiter(R5R6(R7((sa/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_firewall_log_profile_network.pyR'UscC`s&|jddkrdS|jddS(NRttype(R5R6(R7((sa/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_firewall_log_profile_network.pyR([scC`s=|jddkrdSd|jdkr9|jddSdS(NRt	fieldList(R5R6(R7((sa/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_firewall_log_profile_network.pyR)as(R-R.tpropertyRR RR!RR"RR#RR$RR%R&RR'R(R)(((sa/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_firewall_log_profile_network.pyR3s"tModuleParameterscB`seZd�Zed��Zed��Zed��Zed��Zed��Zed��Z	ed��Z
ed��Zed	��Zed
��Z
ed��Zed��Zed
��Zed��Zed��Zed��ZRS(cC`s\|dkrdS|dkr dSdt|�ko=dknrLt|�Std��dS(Nt
indefiniteI����isEValid 'maximum_age' must be in range 0 - 4294967295, or 'indefinite'.(R6tintR(R7taggregate_rate((sa/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_firewall_log_profile_network.pyt_validate_aggregate_ratejs"
cC`s/|jddkrdS|j|jdd�S(NR*R(R5R6RM(R7((sa/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_firewall_log_profile_network.pyRuscC`sR|jddkrdSt|jdd�}|dkr>dS|dkrNdS|S(NR*tenabledtyestnotdisabled(R5R6R(R7tresult((sa/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_firewall_log_profile_network.pyR {scC`s/|jddkrdS|j|jdd�S(NR+R(R5R6RM(R7((sa/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_firewall_log_profile_network.pyR�scC`sR|jddkrdSt|jdd�}|dkr>dS|dkrNdS|S(NR+RNRORPRQ(R5R6R(R7RR((sa/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_firewall_log_profile_network.pyR!�scC`s/|jddkrdS|j|jdd�S(NR,R(R5R6RM(R7((sa/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_firewall_log_profile_network.pyR�scC`sR|jddkrdSt|jdd�}|dkr>dS|dkrNdS|S(NR,RNRORPRQ(R5R6R(R7RR((sa/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_firewall_log_profile_network.pyR"�scC`s/|jddkrdS|j|jdd�S(NR#R(R5R6RM(R7((sa/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_firewall_log_profile_network.pyR�scC`sR|jddkrdSt|jdd�}|dkr>dS|dkrNdS|S(NR#RNRORPRQ(R5R6R(R7RR((sa/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_firewall_log_profile_network.pyR#�scC`s/|jddkrdS|j|jdd�S(NR$R(R5R6RM(R7((sa/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_firewall_log_profile_network.pyR�scC`sR|jddkrdSt|jdd�}|dkr>dS|dkrNdS|S(NR$RNRORPRQ(R5R6R(R7RR((sa/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_firewall_log_profile_network.pyR$�scC`s/|jddkrdS|j|jdd�S(NR%R(R5R6RM(R7((sa/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_firewall_log_profile_network.pyR�scC`sR|jddkrdSt|jdd�}|dkr>dS|dkrNdS|S(NR%RNRORPRQ(R5R6R(R7RR((sa/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_firewall_log_profile_network.pyR%�scC`s7t|jd�}|dkr#dS|dkr3dS|S(NR&RORNRPRQ(RR5(R7RR((sa/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_firewall_log_profile_network.pyR&�scC`s=|jd}|dkrdS|dkr-|St|j|�S(NRttnone(RSRT(R5R6R
t	partition(R7R((sa/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_firewall_log_profile_network.pyR�s
cC`s|j|jd�S(NR(RMR5(R7((sa/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_firewall_log_profile_network.pyR�scC`sl|jddkrdSt|jd�dkr?td��nd|jdkratd��n|jdS(NR'is1The maximum length of delimiter is 31 characters.t$s0Cannot use '$' character as a part of delimiter.(R5R6tlenR(R7((sa/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_firewall_log_profile_network.pyR'�s(R-R.RMRHRR RR!RR"RR#RR$RR%R&RRR'(((sa/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_firewall_log_profile_network.pyRIis"			tChangescB`seZd�ZRS(cC`sXi}y:x$|jD]}t||�||<qW|j|�}Wntk
rSnX|S(N(R1tgetattrt_filter_paramst	Exception(R7RRt
returnable((sa/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_firewall_log_profile_network.pyt	to_return�s
(R-R.R](((sa/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_firewall_log_profile_network.pyRX�st
UsableChangescB`s5eZed��Zed��Zed��ZRS(cC`swtd|jdd|jdd|jdd|jdd	|jd
d|jdd
|jd�}|j|�}|S(NR4RR9RR;RRARR=RR?RRDR(tdictR5RZ(R7t	to_filterRR((sa/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_firewall_log_profile_network.pyR	s





cC`sCtd|jdd|jdd|jd�}|j|�}|S(NRER'RFR(RGR)(R_R5RZ(R7R`RR((sa/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_firewall_log_profile_network.pyRs

cC`swtd|jdd|jdd|jdd|jdd	|jd
d|jdd
|jd�}|j|�}|S(NR8R R:R!R<R"RBR%R>R#R@R$RCR&(R_R5RZ(R7R`RR((sa/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_firewall_log_profile_network.pyR!s





(R-R.RHRRR(((sa/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_firewall_log_profile_network.pyR^s
tReportableChangescB`s�eZd�Zd�Zed��Zed��Zed��Zed��Zed��Z	ed��Z
ed��Zed	��Zed
��Z
ed��Zed��Zed
��Zed��Zed��Zed��ZRS(cC`s|dkrdS|SdS(NI����RJ((R7tvalue((sa/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_firewall_log_profile_network.pyt_change_aggregate_rate_value1scC`sEtdt|j|�d|j|j|��}|j|�}|S(NRNR(R_RR5RcRZ(R7RNRR`RR((sa/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_firewall_log_profile_network.pyt_rebuild_params7s
cC`s |jdd�}|r|SdS(NR R(Rd(R7RR((sa/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_firewall_log_profile_network.pyR*?scC`sdS(N(R6(R7((sa/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_firewall_log_profile_network.pyR EscC`sdS(N(R6(R7((sa/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_firewall_log_profile_network.pyRIscC`s |jdd�}|r|SdS(NR!R(Rd(R7RR((sa/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_firewall_log_profile_network.pyR+MscC`sdS(N(R6(R7((sa/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_firewall_log_profile_network.pyR!SscC`sdS(N(R6(R7((sa/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_firewall_log_profile_network.pyRWscC`s |jdd�}|r|SdS(NR"R(Rd(R7RR((sa/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_firewall_log_profile_network.pyR,[scC`sdS(N(R6(R7((sa/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_firewall_log_profile_network.pyR"ascC`sdS(N(R6(R7((sa/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_firewall_log_profile_network.pyRescC`s |jdd�}|r|SdS(NR%R(Rd(R7RR((sa/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_firewall_log_profile_network.pyR%iscC`sdS(N(R6(R7((sa/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_firewall_log_profile_network.pyRoscC`s |jdd�}|r|SdS(NR#R(Rd(R7RR((sa/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_firewall_log_profile_network.pyR#sscC`sdS(N(R6(R7((sa/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_firewall_log_profile_network.pyRyscC`s |jdd�}|r|SdS(NR$R(Rd(R7RR((sa/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_firewall_log_profile_network.pyR$}scC`sdS(N(R6(R7((sa/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_firewall_log_profile_network.pyR�s(R-R.RcRdRHR*R RR+R!RR,R"RR%RR#RR$R(((sa/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_firewall_log_profile_network.pyRa0s"		t
DifferencecB`sDeZdd�Zd�Zd�Zed��Zed��ZRS(cC`s||_||_dS(N(twantthave(R7RfRg((sa/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_firewall_log_profile_network.pyt__init__�s	cC`s9yt||�}|SWntk
r4|j|�SXdS(N(RYtAttributeErrort_Difference__default(R7tparamRR((sa/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_firewall_log_profile_network.pytcompare�s

cC`sQt|j|�}y&t|j|�}||kr7|SWntk
rL|SXdS(N(RYRfRgRi(R7Rktattr1tattr2((sa/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_firewall_log_profile_network.pyt	__default�s
cC`s�|jjdkrdSt|jj�dkr�|jjdkrZ|jjddkrZdS|jjdk	r�|jjddkr�gSn|jjdkr�|jjSt|jj�t|jj�kr�|jjSdS(NiiRSRT(RSsnone(RSsnone(RfR)R6RWRgtset(R7((sa/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_firewall_log_profile_network.pyR)�s((
$
cC`st|jj|jj�S(N(RRfRRg(R7((sa/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_firewall_log_profile_network.pyR�sN(	R-R.R6RhRlRjRHR)R(((sa/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_firewall_log_profile_network.pyRe�s
			t
ModuleManagercB`s�eZd�Zd�Zd�Zd�Zd�Zd�Zd�Zd�Z	d�Z
d	�Zd
�Zd�Z
d�Zd
�Zd�Zd�Zd�Zd�ZRS(cO`s^|jdd�|_t|jj�|_td|jj�|_t�|_	t
�|_dS(Ntmoduletparams(tgetR6RrR
RstclientRIRfR3RgR^tchanges(R7targstkwargs((sa/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_firewall_log_profile_network.pyRh�s
cC`sji}xBtjD]7}t|j|�dk	rt|j|�||<qqW|rftd|�|_ndS(NRs(RR1RYRfR6R^Rv(R7tchangedtkey((sa/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_firewall_log_profile_network.pyt_set_changed_options�scC`s�t|j|j�}tj}t�}xX|D]P}|j|�}|dkrUq.q.t|t�rt|j	|�q.|||<q.W|r�t
d|�|_tSt
S(NRs(ReRfRgRR2R_RlR6t
isinstancetupdateR^RvtTruetFalse(R7tdiffR2Rytktchange((sa/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_firewall_log_profile_network.pyt_update_changed_options�s		
cC`sK|jdg�}x2|D]*}|jjjd|dd|d�qWdS(Nt
__warningstmsgtversion(tpopRuRrt	deprecate(R7RRtwarningstwarning((sa/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_firewall_log_profile_network.pyt_announce_deprecations�s


cC`s�t}t�}|jj}|dkr6|j�}n|dkrQ|j�}ntd|jj��}|j�}|j	|�|j	td|��|j
|�|S(NtpresenttabsentRsRy(RR_RftstateR�R�RaRvR]R}R�(R7RyRRR�t
reportableRv((sa/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_firewall_log_profile_network.pytexec_module�s	

cC`sIdddg}|jj|kr%tS|j�r;|j�S|j�SdS(NsLog all requestssLog illegal requestss	local-dos(Rftprofile_nameRtexistsR}tcreate(R7t	built_ins((sa/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_firewall_log_profile_network.pyR��s
cC`s0d|jjkrtS|j�r,|j�StS(Nsglobal-network(RfR�RR�tremove(R7((sa/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_firewall_log_profile_network.pyR��s

cC`s|j�}|rtStS(N(R�R~R(R7RR((sa/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_firewall_log_profile_network.pyt
should_update�scC`s=|j�|_|j�stS|jjr/tS|j�tS(N(tread_current_from_deviceRgR�RRrt
check_modeR~tupdate_on_device(R7((sa/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_firewall_log_profile_network.pyR}s
cC`s9|jjrtS|j�|j�r5td��ntS(NsFailed to delete the resource.(RrR�R~tremove_from_deviceR�R(R7((sa/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_firewall_log_profile_network.pyR�s
cC`s(|j�|jjrtS|j�tS(N(R{RrR�R~tcreate_on_device(R7((sa/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_firewall_log_profile_network.pyR�s


cC`s5|jj}|jj}d|kr(dSt||�S(Nsglobal-network(RfR�RUR(R7tnameRU((sa/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_firewall_log_profile_network.pyt_internal_names
cC`s�dj|jjd|jjdt|jj|jj��}|jjj|�}y|j	�}Wnt
k
rwtSX|jdks�d|kr�|ddkr�tSt
S(Ns1https://{0}:{1}/mgmt/tm/security/log/profile/{2}/tservertserver_porti�tcode(RRutproviderRRfRUR�tapiRttjsont
ValueErrorRRR~(R7turitresptresponse((sa/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_firewall_log_profile_network.pyt_profile_exists"s


+cC`s�|j�s*tdj|jj���ndj|jjd|jjdt|jj|jj�|j	��}|jj
j|�}y|j�}Wnt
k
r�tSX|jdks�d|kr�|ddkr�tStS(Ns-Specified AFM log profile: {0} does not exists<https://{0}:{1}/mgmt/tm/security/log/profile/{2}/network/{3}R�R�i�R�(R�RRRfR�RuR�RRUR�R�RtR�R�RRR~(R7R�R�R�((sa/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_firewall_log_profile_network.pyR�1s 


+cC`s|jj�}|jj|d<|jj|d<dj|jjd|jjdt|jj|jj��}|jj	j
|d|�}y|j�}Wn%tk
r�}t
t|���nXd|kr
|ddkr
d
|kr�t
|d
��q
t
|j��ntS(NR�RUs9https://{0}:{1}/mgmt/tm/security/log/profile/{2}/network/R�R�R�R�i�i�tmessage(i�i�(Rvt
api_paramsRfR�RURRuR�RR�tpostR�R�RtstrtcontentR~(R7RsR�R�R�tex((sa/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_firewall_log_profile_network.pyR�Es"

cC`s�|jj�}dj|jjd|jjdt|jj|jj�|j	��}|jj
j|d|�}y|j�}Wn%t
k
r�}tt|���nXd|kr�|ddkr�d|kr�t|d��q�t|j��ndS(Ns<https://{0}:{1}/mgmt/tm/security/log/profile/{2}/network/{3}R�R�R�R�i�R�(RvR�RRuR�RRfRUR�R�R�tpatchR�R�RR�R�(R7RsR�R�R�R�((sa/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_firewall_log_profile_network.pyR�[s

cC`s�dj|jjd|jjdt|jj|jj�|j��}|jjj	|�}|j
dkrotSt|j
��dS(Ns<https://{0}:{1}/mgmt/tm/security/log/profile/{2}/network/{3}R�R�i�(RRuR�RRfRUR�R�R�tdeleteRR~RR�(R7R�R�((sa/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_firewall_log_profile_network.pyR�os

cC`s�dj|jjd|jjdt|jj|jj�|j��}|jjj	|�}y|j
�}Wn%tk
r�}tt
|���nXd|kr�|ddkr�d|kr�t|d��q�t|j��ntd|�S(Ns<https://{0}:{1}/mgmt/tm/security/log/profile/{2}/network/{3}R�R�R�i�R�Rs(RRuR�RRfRUR�R�R�RtR�R�RR�R�R3(R7R�R�R�R�((sa/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_firewall_log_profile_network.pyR�{s

(R-R.RhR{R�R�R�R�R�R�R}R�R�R�R�R�R�R�R�R�(((sa/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_firewall_log_profile_network.pyRq�s$																			tArgumentSpeccB`seZd�ZRS(c$C`sdt|_ddddddddd	d
ddd
ddddddddddddddddddg|_td td!t�d"t�d#t�d$td%d&d'td(td%d)�d"t���d*td%d&d'td(td%d)�d"t���d+td%d&d'td(td%d)�d"t���d,td%d&d'td(td%d)�d"t���d-td%d&d'td(td%d)�d"t���d.td%d&d'td(td%d)�d"t���d/td%d)�d0td1d2d3g�d4t�d5td%d6d1|j�d7td8d9d:td;gf�d<td8d=d1d=d>g��}i|_|jjt�|jj|�dS(?Ntacl_policy_nametacl_policy_typet
acl_rule_nametactiontbigip_hostnametcontext_nametcontext_typet	date_timet	dest_fqdntdest_geotdest_ipt	dest_porttdrop_reasontmanagement_ip_addresstprotocoltroute_domaintsa_translation_pooltsa_translation_typetsource_fqdntsource_usertsrc_geotsrc_iptsrc_portttranslated_dest_ipttranslated_dest_portttranslated_ip_protocolttranslated_route_domainttranslated_src_ipttranslated_src_portttranslated_vlantvlanR�trequiredRRR*RFR_toptionsRNtboolR+R,R#R$R%R&R(tchoicesRTs
field-listR'R)tlistRUtdefaulttCommontfallbacktF5_PARTITIONR�R�R�(R~tsupports_check_modeR�R_R	t
argument_specR}R(R7R�((sa/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_firewall_log_profile_network.pyRh�sx						(R-R.Rh(((sa/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_firewall_log_profile_network.pyR��scC`s�t�}td|jd|j�}y,td|�}|j�}|j|�Wn)tk
r{}|jdt	|��nXdS(NR�R�RrR�(
R�RR�R�RqR�t	exit_jsonRt	fail_jsonR�(tspecRrtmmtresultsR�((sa/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_firewall_log_profile_network.pytmain�s		t__main__N((t
__future__RRRRFt
__metaclass__tANSIBLE_METADATAt
DOCUMENTATIONtEXAMPLEStRETURNtansible.module_utils.basicRR	t%library.module_utils.network.f5.bigipR
t&library.module_utils.network.f5.commonRRR
RRRt'library.module_utils.network.f5.compareRtImportErrort%ansible.module_utils.network.f5.bigipt&ansible.module_utils.network.f5.commont'ansible.module_utils.network.f5.compareRR3RIRXR^RatobjectReRqR�R�R-(((sa/usr/lib/python2.7/site-packages/ansible/modules/network/f5/bigip_firewall_log_profile_network.pyt<module>sN


�F�
;i�(X)�T	

Anons79 File Manager Version 1.0, Coded By Anons79
Email: [email protected]