cisco_node_utils 0.9.0
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +7 -0
- data/.gitignore +2 -0
- data/.rubocop.yml +3 -0
- data/.rubocop_todo.yml +293 -0
- data/CHANGELOG.md +5 -0
- data/CONTRIBUTING.md +31 -0
- data/Gemfile +4 -0
- data/LICENSE +201 -0
- data/README.md +113 -0
- data/Rakefile +4 -0
- data/cisco_node_utils.gemspec +30 -0
- data/lib/cisco_node_utils.rb +33 -0
- data/lib/cisco_node_utils/README_YAML.md +333 -0
- data/lib/cisco_node_utils/cisco_cmn_utils.rb +92 -0
- data/lib/cisco_node_utils/command_reference.rb +415 -0
- data/lib/cisco_node_utils/command_reference_common.yaml +845 -0
- data/lib/cisco_node_utils/command_reference_n3064.yaml +13 -0
- data/lib/cisco_node_utils/command_reference_n7k.yaml +48 -0
- data/lib/cisco_node_utils/command_reference_n9k.yaml +35 -0
- data/lib/cisco_node_utils/configparser_lib.rb +196 -0
- data/lib/cisco_node_utils/interface.rb +501 -0
- data/lib/cisco_node_utils/interface_ospf.rb +241 -0
- data/lib/cisco_node_utils/node.rb +673 -0
- data/lib/cisco_node_utils/platform.rb +184 -0
- data/lib/cisco_node_utils/platform_info.rb +58 -0
- data/lib/cisco_node_utils/platform_info.yaml +10 -0
- data/lib/cisco_node_utils/router_ospf.rb +96 -0
- data/lib/cisco_node_utils/router_ospf_vrf.rb +258 -0
- data/lib/cisco_node_utils/snmpcommunity.rb +91 -0
- data/lib/cisco_node_utils/snmpgroup.rb +55 -0
- data/lib/cisco_node_utils/snmpserver.rb +150 -0
- data/lib/cisco_node_utils/snmpuser.rb +342 -0
- data/lib/cisco_node_utils/tacacs_server.rb +175 -0
- data/lib/cisco_node_utils/tacacs_server_host.rb +128 -0
- data/lib/cisco_node_utils/version.rb +17 -0
- data/lib/cisco_node_utils/vlan.rb +153 -0
- data/lib/cisco_node_utils/vtp.rb +127 -0
- data/lib/cisco_node_utils/yum.rb +84 -0
- data/tests/basetest.rb +93 -0
- data/tests/ciscotest.rb +136 -0
- data/tests/cmd_config.yaml +51 -0
- data/tests/cmd_config_invalid.yaml +16 -0
- data/tests/test_all_cisco.rb +46 -0
- data/tests/test_command_config.rb +192 -0
- data/tests/test_command_reference.rb +222 -0
- data/tests/test_interface.rb +1017 -0
- data/tests/test_interface_ospf.rb +763 -0
- data/tests/test_interface_svi.rb +267 -0
- data/tests/test_interface_switchport.rb +722 -0
- data/tests/test_node.rb +108 -0
- data/tests/test_node_ext.rb +450 -0
- data/tests/test_platform.rb +188 -0
- data/tests/test_router_ospf.rb +164 -0
- data/tests/test_router_ospf_vrf.rb +753 -0
- data/tests/test_snmpcommunity.rb +344 -0
- data/tests/test_snmpgroup.rb +71 -0
- data/tests/test_snmpserver.rb +443 -0
- data/tests/test_snmpuser.rb +803 -0
- data/tests/test_tacacs_server.rb +388 -0
- data/tests/test_tacacs_server_host.rb +391 -0
- data/tests/test_vlan.rb +264 -0
- data/tests/test_vtp.rb +319 -0
- data/tests/test_yum.rb +106 -0
- metadata +188 -0
@@ -0,0 +1,175 @@
|
|
1
|
+
# TacacsServer provider class
|
2
|
+
#
|
3
|
+
# Mike Wiebe, January 2015
|
4
|
+
#
|
5
|
+
# Copyright (c) 2015 Cisco and/or its affiliates.
|
6
|
+
#
|
7
|
+
# Licensed under the Apache License, Version 2.0 (the "License");
|
8
|
+
# you may not use this file except in compliance with the License.
|
9
|
+
# You may obtain a copy of the License at
|
10
|
+
#
|
11
|
+
# http://www.apache.org/licenses/LICENSE-2.0
|
12
|
+
#
|
13
|
+
# Unless required by applicable law or agreed to in writing, software
|
14
|
+
# distributed under the License is distributed on an "AS IS" BASIS,
|
15
|
+
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
16
|
+
# See the License for the specific language governing permissions and
|
17
|
+
# limitations under the License.
|
18
|
+
|
19
|
+
require File.join(File.dirname(__FILE__), 'node')
|
20
|
+
|
21
|
+
module Cisco
|
22
|
+
TACACS_SERVER_ENC_NONE = 0
|
23
|
+
TACACS_SERVER_ENC_CISCO_TYPE_7 = 7
|
24
|
+
TACACS_SERVER_ENC_UNKNOWN = 8
|
25
|
+
|
26
|
+
class TacacsServer
|
27
|
+
@@node = Cisco::Node.instance
|
28
|
+
|
29
|
+
def initialize(instantiate=true)
|
30
|
+
enable if instantiate and not TacacsServer.enabled
|
31
|
+
end
|
32
|
+
|
33
|
+
# Check feature enablement
|
34
|
+
def TacacsServer.enabled
|
35
|
+
feat = @@node.config_get("tacacs_server", "feature")
|
36
|
+
return (!feat.nil? and !feat.empty?)
|
37
|
+
rescue Cisco::CliError => e
|
38
|
+
# cmd will syntax reject when feature is not enabled
|
39
|
+
raise unless e.clierror =~ /Syntax error/
|
40
|
+
return false
|
41
|
+
end
|
42
|
+
|
43
|
+
# Enable tacacs_server feature
|
44
|
+
def enable
|
45
|
+
@@node.config_set("tacacs_server", "feature", "")
|
46
|
+
end
|
47
|
+
|
48
|
+
# Disable tacacs_server feature
|
49
|
+
def destroy
|
50
|
+
@@node.config_set("tacacs_server", "feature", "no")
|
51
|
+
end
|
52
|
+
|
53
|
+
# --------------------
|
54
|
+
# Getters and Setters
|
55
|
+
# --------------------
|
56
|
+
|
57
|
+
# Set timeout
|
58
|
+
def timeout=(timeout)
|
59
|
+
# 'no tacacs timeout' will fail, just set it to the requested timeout value.
|
60
|
+
@@node.config_set("tacacs_server", "timeout", "", timeout)
|
61
|
+
end
|
62
|
+
|
63
|
+
# Get timeout
|
64
|
+
def timeout
|
65
|
+
match = @@node.config_get("tacacs_server", "timeout")
|
66
|
+
match.nil? ? TacacsServer.default_timeout : match.first.to_i
|
67
|
+
end
|
68
|
+
|
69
|
+
# Get default timeout
|
70
|
+
def TacacsServer.default_timeout
|
71
|
+
@@node.config_get_default("tacacs_server", "timeout")
|
72
|
+
end
|
73
|
+
|
74
|
+
# Set deadtime
|
75
|
+
def deadtime=(deadtime)
|
76
|
+
# 'no tacacs deadtime' will fail, just set it to the requested timeout value.
|
77
|
+
@@node.config_set("tacacs_server", "deadtime", "", deadtime)
|
78
|
+
end
|
79
|
+
|
80
|
+
# Get deadtime
|
81
|
+
def deadtime
|
82
|
+
match = @@node.config_get("tacacs_server", "deadtime")
|
83
|
+
match.nil? ? TacacsServer.default_deadtime : match.first.to_i
|
84
|
+
end
|
85
|
+
|
86
|
+
# Get default deadtime
|
87
|
+
def TacacsServer.default_deadtime
|
88
|
+
@@node.config_get_default("tacacs_server", "deadtime")
|
89
|
+
end
|
90
|
+
|
91
|
+
# Set directed_request
|
92
|
+
def directed_request=(state)
|
93
|
+
raise TypeError unless state == true || state == false
|
94
|
+
state == TacacsServer.default_directed_request ?
|
95
|
+
@@node.config_set("tacacs_server", "directed_request", "no") :
|
96
|
+
@@node.config_set("tacacs_server", "directed_request", "")
|
97
|
+
end
|
98
|
+
|
99
|
+
# Check if directed request is enabled
|
100
|
+
def directed_request?
|
101
|
+
match = @@node.config_get("tacacs_server", "directed_request")
|
102
|
+
return TacacsServer.default_directed_request if match.nil?
|
103
|
+
match.first[/^no/] ? false : true
|
104
|
+
end
|
105
|
+
|
106
|
+
# Get default directed_request
|
107
|
+
def TacacsServer.default_directed_request
|
108
|
+
@@node.config_get_default("tacacs_server", "directed_request")
|
109
|
+
end
|
110
|
+
|
111
|
+
# Set source interface
|
112
|
+
def source_interface=(name)
|
113
|
+
raise TypeError unless name.is_a? String
|
114
|
+
name.empty? ?
|
115
|
+
@@node.config_set("tacacs_server", "source_interface", "no", "") :
|
116
|
+
@@node.config_set("tacacs_server", "source_interface", "", name)
|
117
|
+
end
|
118
|
+
|
119
|
+
# Get source interface
|
120
|
+
def source_interface
|
121
|
+
# Sample output
|
122
|
+
# ip tacacs source-interface Ethernet1/1
|
123
|
+
# no tacacs source-interface
|
124
|
+
match = @@node.config_get("tacacs_server", "source_interface")
|
125
|
+
return TacacsServer.default_source_interface if match.nil?
|
126
|
+
# match_data will contain one of the following
|
127
|
+
# [nil, " Ethernet1/1"] or ["no", nil]
|
128
|
+
match[0][0] == "no" ? TacacsServer.default_source_interface : match[0][1]
|
129
|
+
end
|
130
|
+
|
131
|
+
# Get default source interface
|
132
|
+
def TacacsServer.default_source_interface
|
133
|
+
@@node.config_get_default("tacacs_server", "source_interface")
|
134
|
+
end
|
135
|
+
|
136
|
+
# Get encryption type used for the key
|
137
|
+
def encryption_type
|
138
|
+
match = @@node.config_get("tacacs_server", "encryption_type")
|
139
|
+
match.nil? ? TACACS_SERVER_ENC_UNKNOWN : match[0][0].to_i
|
140
|
+
end
|
141
|
+
|
142
|
+
# Get default encryption type
|
143
|
+
def TacacsServer.default_encryption_type
|
144
|
+
@@node.config_get_default("tacacs_server", "encryption_type")
|
145
|
+
end
|
146
|
+
|
147
|
+
# Get encryption password
|
148
|
+
def encryption_password
|
149
|
+
match = @@node.config_get("tacacs_server", "encryption_password")
|
150
|
+
match.nil? ? TacacsServer.default_encryption_password : match[0][1]
|
151
|
+
end
|
152
|
+
|
153
|
+
# Get default encryption password
|
154
|
+
def TacacsServer.default_encryption_password
|
155
|
+
@@node.config_get_default("tacacs_server", "encryption_password")
|
156
|
+
end
|
157
|
+
|
158
|
+
# Set encryption type and password
|
159
|
+
def encryption_key_set(enctype, password)
|
160
|
+
# if enctype is TACACS_SERVER_ENC_UNKNOWN, we will unset the key
|
161
|
+
if enctype == TACACS_SERVER_ENC_UNKNOWN
|
162
|
+
# if current encryption type is not TACACS_SERVER_ENC_UNKNOWN, we
|
163
|
+
# need to unset it. Otherwise the box is not configured with key, we
|
164
|
+
# don't need to do anything
|
165
|
+
if encryption_type != TACACS_SERVER_ENC_UNKNOWN
|
166
|
+
@@node.config_set("tacacs_server", "encryption", "no",
|
167
|
+
encryption_type,
|
168
|
+
encryption_password)
|
169
|
+
end
|
170
|
+
else
|
171
|
+
@@node.config_set("tacacs_server", "encryption", "", enctype, password)
|
172
|
+
end
|
173
|
+
end
|
174
|
+
end
|
175
|
+
end
|
@@ -0,0 +1,128 @@
|
|
1
|
+
# TacacsServerHost class
|
2
|
+
#
|
3
|
+
# Alex Hunsberger, March 2015
|
4
|
+
#
|
5
|
+
# Copyright (c) 2015 Cisco and/or its affiliates.
|
6
|
+
#
|
7
|
+
# Licensed under the Apache License, Version 2.0 (the "License");
|
8
|
+
# you may not use this file except in compliance with the License.
|
9
|
+
# You may obtain a copy of the License at
|
10
|
+
#
|
11
|
+
# http://www.apache.org/licenses/LICENSE-2.0
|
12
|
+
#
|
13
|
+
# Unless required by applicable law or agreed to in writing, software
|
14
|
+
# distributed under the License is distributed on an "AS IS" BASIS,
|
15
|
+
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
16
|
+
# See the License for the specific language governing permissions and
|
17
|
+
# limitations under the License.
|
18
|
+
|
19
|
+
require File.join(File.dirname(__FILE__), 'node')
|
20
|
+
require File.join(File.dirname(__FILE__), 'tacacs_server')
|
21
|
+
|
22
|
+
module Cisco
|
23
|
+
class TacacsServerHost
|
24
|
+
attr_reader :name
|
25
|
+
@@node = Cisco::Node.instance
|
26
|
+
@@hosts = {}
|
27
|
+
|
28
|
+
def initialize(name, create=true)
|
29
|
+
raise TypeError unless name.is_a? String
|
30
|
+
raise ArgumentError if name.empty?
|
31
|
+
@name = name
|
32
|
+
|
33
|
+
if create
|
34
|
+
# feature Tacacs+ must be enabled to create a host
|
35
|
+
TacacsServer.new.enable unless TacacsServer.enabled
|
36
|
+
@@node.config_set("tacacs_server_host", "host", "", name)
|
37
|
+
end
|
38
|
+
end
|
39
|
+
|
40
|
+
def TacacsServerHost.hosts
|
41
|
+
@@hosts = {}
|
42
|
+
|
43
|
+
return @@hosts unless TacacsServer.enabled
|
44
|
+
|
45
|
+
hosts = @@node.config_get("tacacs_server_host", "hosts")
|
46
|
+
unless hosts.nil?
|
47
|
+
hosts = [hosts] if hosts.is_a?(Hash)
|
48
|
+
hosts.each { |name|
|
49
|
+
@@hosts[name] = TacacsServerHost.new(name, false) if @@hosts[name].nil?
|
50
|
+
}
|
51
|
+
end
|
52
|
+
@@hosts
|
53
|
+
end
|
54
|
+
|
55
|
+
def destroy
|
56
|
+
@@node.config_set("tacacs_server_host", "host", "no", @name)
|
57
|
+
@@hosts.delete(@name) unless @@hosts.nil?
|
58
|
+
end
|
59
|
+
|
60
|
+
def port
|
61
|
+
p = @@node.config_get("tacacs_server_host", "port", @name)
|
62
|
+
raise "unable to retrieve port information for #{@name}" if p.nil?
|
63
|
+
p.first.to_i
|
64
|
+
end
|
65
|
+
|
66
|
+
def port=(n)
|
67
|
+
@@node.config_set("tacacs_server_host", "port", @name, n.to_i)
|
68
|
+
end
|
69
|
+
|
70
|
+
def TacacsServerHost.default_port
|
71
|
+
@@node.config_get_default("tacacs_server_host", "port")
|
72
|
+
end
|
73
|
+
|
74
|
+
def encryption_type
|
75
|
+
type = @@node.config_get("tacacs_server_host", "encryption_type", @name)
|
76
|
+
type.nil? ? TACACS_SERVER_ENC_UNKNOWN : type.first.to_i
|
77
|
+
end
|
78
|
+
|
79
|
+
def TacacsServerHost.default_encryption_type
|
80
|
+
TacacsServer.default_encryption_type
|
81
|
+
end
|
82
|
+
|
83
|
+
def encryption_password
|
84
|
+
pass = @@node.config_get("tacacs_server_host", "encryption_password", @name)
|
85
|
+
pass.nil? ? TacacsServerHost.default_encryption_password : pass.first
|
86
|
+
end
|
87
|
+
|
88
|
+
def TacacsServerHost.default_encryption_password
|
89
|
+
@@node.config_get_default("tacacs_server_host", "encryption_password")
|
90
|
+
end
|
91
|
+
|
92
|
+
def encryption_key_set(enctype, password)
|
93
|
+
raise TypeError unless enctype.is_a? Fixnum
|
94
|
+
raise ArgumentError if password and not [TACACS_SERVER_ENC_NONE,
|
95
|
+
TACACS_SERVER_ENC_CISCO_TYPE_7,
|
96
|
+
TACACS_SERVER_ENC_UNKNOWN].include? enctype
|
97
|
+
# if enctype is TACACS_SERVER_ENC_UNKNOWN, we'll unset the key
|
98
|
+
if enctype == TACACS_SERVER_ENC_UNKNOWN
|
99
|
+
# if current encryption type is not TACACS_SERVER_ENC_UNKNOWN, we need
|
100
|
+
# to unset the key value. Otherwise, the box is not configured with key,
|
101
|
+
# thus we don't need to do anything
|
102
|
+
if encryption_type != TACACS_SERVER_ENC_UNKNOWN
|
103
|
+
@@node.config_set("tacacs_server_host", "encryption", "no", @name,
|
104
|
+
encryption_type,
|
105
|
+
encryption_password)
|
106
|
+
end
|
107
|
+
else
|
108
|
+
@@node.config_set("tacacs_server_host", "encryption", "", @name, enctype, password)
|
109
|
+
end
|
110
|
+
end
|
111
|
+
|
112
|
+
def timeout
|
113
|
+
t = @@node.config_get("tacacs_server_host", "timeout", @name)
|
114
|
+
t.nil? ? TacacsServerHost.default_timeout : t.first.to_i
|
115
|
+
end
|
116
|
+
|
117
|
+
def timeout=(t)
|
118
|
+
raise TypeError unless t.is_a? Fixnum
|
119
|
+
return if t == timeout
|
120
|
+
|
121
|
+
@@node.config_set("tacacs_server_host", "timeout", "", @name, t)
|
122
|
+
end
|
123
|
+
|
124
|
+
def TacacsServerHost.default_timeout
|
125
|
+
@@node.config_get_default("tacacs_server_host", "timeout")
|
126
|
+
end
|
127
|
+
end
|
128
|
+
end
|
@@ -0,0 +1,17 @@
|
|
1
|
+
# Copyright (c) 2015 Cisco and/or its affiliates.
|
2
|
+
#
|
3
|
+
# Licensed under the Apache License, Version 2.0 (the "License");
|
4
|
+
# you may not use this file except in compliance with the License.
|
5
|
+
# You may obtain a copy of the License at
|
6
|
+
#
|
7
|
+
# http://www.apache.org/licenses/LICENSE-2.0
|
8
|
+
#
|
9
|
+
# Unless required by applicable law or agreed to in writing, software
|
10
|
+
# distributed under the License is distributed on an "AS IS" BASIS,
|
11
|
+
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
12
|
+
# See the License for the specific language governing permissions and
|
13
|
+
# limitations under the License.
|
14
|
+
|
15
|
+
module CiscoNodeUtils
|
16
|
+
VERSION = "0.9.0"
|
17
|
+
end
|
@@ -0,0 +1,153 @@
|
|
1
|
+
# VLAN provider class
|
2
|
+
#
|
3
|
+
# Jie Yang, November 2014
|
4
|
+
#
|
5
|
+
# Copyright (c) 2014-2015 Cisco and/or its affiliates.
|
6
|
+
#
|
7
|
+
# Licensed under the Apache License, Version 2.0 (the "License");
|
8
|
+
# you may not use this file except in compliance with the License.
|
9
|
+
# You may obtain a copy of the License at
|
10
|
+
#
|
11
|
+
# http://www.apache.org/licenses/LICENSE-2.0
|
12
|
+
#
|
13
|
+
# Unless required by applicable law or agreed to in writing, software
|
14
|
+
# distributed under the License is distributed on an "AS IS" BASIS,
|
15
|
+
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
16
|
+
# See the License for the specific language governing permissions and
|
17
|
+
# limitations under the License.
|
18
|
+
|
19
|
+
require File.join(File.dirname(__FILE__), 'node')
|
20
|
+
require File.join(File.dirname(__FILE__), 'interface')
|
21
|
+
|
22
|
+
module Cisco
|
23
|
+
VLAN_NAME_SIZE = 33
|
24
|
+
|
25
|
+
class Vlan
|
26
|
+
attr_reader :name, :vlan_id
|
27
|
+
|
28
|
+
@@node = Node.instance
|
29
|
+
raise TypeError if @@node.nil?
|
30
|
+
|
31
|
+
def initialize(vlan_id, instantiate=true)
|
32
|
+
@vlan_id = vlan_id.to_s
|
33
|
+
raise ArgumentError,
|
34
|
+
"Invalid value(non-numeric Vlan id)" unless @vlan_id[/^\d+$/]
|
35
|
+
|
36
|
+
create if instantiate
|
37
|
+
end
|
38
|
+
|
39
|
+
def Vlan.vlans
|
40
|
+
hash = {}
|
41
|
+
vlan_list = @@node.config_get("vlan", "all_vlans")
|
42
|
+
return hash if vlan_list.nil?
|
43
|
+
|
44
|
+
vlan_list.each do |id|
|
45
|
+
hash[id] = Vlan.new(id, false)
|
46
|
+
end
|
47
|
+
hash
|
48
|
+
end
|
49
|
+
|
50
|
+
def create
|
51
|
+
@@node.config_set("vlan", "create", @vlan_id)
|
52
|
+
end
|
53
|
+
|
54
|
+
def destroy
|
55
|
+
@@node.config_set("vlan", "destroy", @vlan_id)
|
56
|
+
end
|
57
|
+
|
58
|
+
def cli_error_check(result)
|
59
|
+
# The NXOS vlan cli does not raise an exception in some conditions and
|
60
|
+
# instead just displays a STDOUT error message; thus NXAPI does not detect
|
61
|
+
# the failure and we must catch it by inspecting the "body" hash entry
|
62
|
+
# returned by NXAPI. This vlan cli behavior is unlikely to change.
|
63
|
+
raise result[2]["body"] unless result[2]["body"].empty?
|
64
|
+
end
|
65
|
+
|
66
|
+
def vlan_name
|
67
|
+
result = @@node.config_get("vlan", "name", @vlan_id)
|
68
|
+
return default_vlan_name if result.nil?
|
69
|
+
result.shift
|
70
|
+
end
|
71
|
+
|
72
|
+
def vlan_name=(str)
|
73
|
+
raise TypeError unless str.is_a?(String)
|
74
|
+
if str.empty?
|
75
|
+
result = @@node.config_set("vlan", "name", @vlan_id, "no", "")
|
76
|
+
else
|
77
|
+
result = @@node.config_set("vlan", "name", @vlan_id, "", str)
|
78
|
+
end
|
79
|
+
cli_error_check(result)
|
80
|
+
rescue CliError => e
|
81
|
+
raise "[vlan #{@vlan_id}] '#{e.command}' : #{e.clierror}"
|
82
|
+
end
|
83
|
+
|
84
|
+
def default_vlan_name
|
85
|
+
"VLAN%04d" % @vlan_id
|
86
|
+
end
|
87
|
+
|
88
|
+
def state
|
89
|
+
result = @@node.config_get("vlan", "state", @vlan_id)
|
90
|
+
return default_state if result.nil?
|
91
|
+
case result.first
|
92
|
+
when /act/
|
93
|
+
return "active"
|
94
|
+
when /sus/
|
95
|
+
return "suspend"
|
96
|
+
end
|
97
|
+
end
|
98
|
+
|
99
|
+
def state=(str)
|
100
|
+
str = str.to_s
|
101
|
+
if str.empty?
|
102
|
+
result = @@node.config_set("vlan", "state", @vlan_id, "no", "")
|
103
|
+
else
|
104
|
+
result = @@node.config_set("vlan", "state", @vlan_id, "", str)
|
105
|
+
end
|
106
|
+
cli_error_check(result)
|
107
|
+
rescue CliError => e
|
108
|
+
raise "[vlan #{@vlan_id}] '#{e.command}' : #{e.clierror}"
|
109
|
+
end
|
110
|
+
|
111
|
+
def default_state
|
112
|
+
@@node.config_get_default("vlan", "state")
|
113
|
+
end
|
114
|
+
|
115
|
+
def shutdown
|
116
|
+
result = @@node.config_get("vlan", "shutdown", @vlan_id)
|
117
|
+
return default_shutdown if result.nil?
|
118
|
+
# valid result is either: "active"(aka no shutdown) or "shutdown"
|
119
|
+
result.first[/shut/] ? true : false
|
120
|
+
end
|
121
|
+
|
122
|
+
def shutdown=(val)
|
123
|
+
no_cmd = (val) ? "" : "no"
|
124
|
+
result = @@node.config_set("vlan", "shutdown", @vlan_id, no_cmd)
|
125
|
+
cli_error_check(result)
|
126
|
+
rescue CliError => e
|
127
|
+
raise "[vlan #{@vlan_id}] '#{e.command}' : #{e.clierror}"
|
128
|
+
end
|
129
|
+
|
130
|
+
def default_shutdown
|
131
|
+
@@node.config_get_default("vlan", "shutdown")
|
132
|
+
end
|
133
|
+
|
134
|
+
def add_interface(interface)
|
135
|
+
interface.access_vlan = @vlan_id
|
136
|
+
end
|
137
|
+
|
138
|
+
def remove_interface(interface)
|
139
|
+
interface.access_vlan = interface.default_access_vlan
|
140
|
+
end
|
141
|
+
|
142
|
+
def interfaces
|
143
|
+
all_interfaces = Interface.interfaces
|
144
|
+
interfaces = {}
|
145
|
+
all_interfaces.each do |name, i|
|
146
|
+
next unless i.switchport_mode == :access
|
147
|
+
next unless i.access_vlan == @vlan_id
|
148
|
+
interfaces[name] = i
|
149
|
+
end
|
150
|
+
interfaces
|
151
|
+
end
|
152
|
+
end # class
|
153
|
+
end # module
|