icontrol 0.3.1 → 0.3.2
Sign up to get free protection for your applications and to get access to all the features.
- data/lib/icontrol/arx.rb +38 -8
- data/lib/icontrol/arx/api.rb +1 -0
- data/lib/icontrol/arx/chassis.rb +11 -0
- data/lib/icontrol/arx/export.rb +4 -1
- data/lib/icontrol/arx/file_change_notification.rb +25 -4
- data/lib/icontrol/arx/file_server.rb +2 -0
- data/lib/icontrol/arx/namespace.rb +2 -0
- data/lib/icontrol/arx/network.rb +3 -0
- data/lib/icontrol/arx/policy.rb +3 -0
- data/lib/icontrol/arx/share.rb +2 -0
- data/lib/icontrol/arx/virtual_service.rb +3 -0
- data/lib/icontrol/arx/volume.rb +2 -0
- data/lib/icontrol/asm.rb +18 -3
- data/lib/icontrol/asm/object_params.rb +12 -6
- data/lib/icontrol/asm/policy.rb +118 -79
- data/lib/icontrol/asm/system_configuration.rb +27 -19
- data/lib/icontrol/asm/web_application.rb +74 -52
- data/lib/icontrol/asm/web_application_group.rb +33 -24
- data/lib/icontrol/base.rb +1 -0
- data/lib/icontrol/base/exception.rb +1 -0
- data/lib/icontrol/base/icontrol/local_lb/pool.rb +7 -0
- data/lib/icontrol/base/icontrol_overlay.rb +6 -0
- data/lib/icontrol/base/predeclarations.rb +5 -4
- data/lib/icontrol/base/struct.rb +6 -2
- data/lib/icontrol/common.rb +55 -4
- data/lib/icontrol/global_lb.rb +22 -3
- data/lib/icontrol/global_lb/application.rb +63 -44
- data/lib/icontrol/global_lb/data_center.rb +82 -58
- data/lib/icontrol/global_lb/dnssec_key.rb +152 -90
- data/lib/icontrol/global_lb/dnssec_zone.rb +55 -35
- data/lib/icontrol/global_lb/globals.rb +662 -430
- data/lib/icontrol/global_lb/link.rb +181 -131
- data/lib/icontrol/global_lb/monitor.rb +174 -104
- data/lib/icontrol/global_lb/pool.rb +290 -203
- data/lib/icontrol/global_lb/pool_member.rb +118 -71
- data/lib/icontrol/global_lb/region.rb +37 -25
- data/lib/icontrol/global_lb/rule.rb +53 -37
- data/lib/icontrol/global_lb/server.rb +176 -124
- data/lib/icontrol/global_lb/topology.rb +41 -27
- data/lib/icontrol/global_lb/virtual_server.rb +118 -84
- data/lib/icontrol/global_lb/wide_ip.rb +168 -117
- data/lib/icontrol/local_lb.rb +81 -10
- data/lib/icontrol/local_lb/klass.rb +233 -153
- data/lib/icontrol/local_lb/monitor.rb +158 -96
- data/lib/icontrol/local_lb/nat.rb +74 -52
- data/lib/icontrol/local_lb/node_address.rb +123 -86
- data/lib/icontrol/local_lb/pool.rb +229 -164
- data/lib/icontrol/local_lb/pool_member.rb +134 -76
- data/lib/icontrol/local_lb/profile_auth.rb +103 -75
- data/lib/icontrol/local_lb/profile_client_ssl.rb +284 -201
- data/lib/icontrol/local_lb/profile_diameter.rb +113 -71
- data/lib/icontrol/local_lb/profile_dns.rb +65 -46
- data/lib/icontrol/local_lb/profile_fast_http.rb +265 -178
- data/lib/icontrol/local_lb/profile_fast_l4.rb +283 -194
- data/lib/icontrol/local_lb/profile_ftp.rb +81 -58
- data/lib/icontrol/local_lb/profile_http.rb +701 -433
- data/lib/icontrol/local_lb/profile_http_class.rb +169 -121
- data/lib/icontrol/local_lb/profile_iiop.rb +87 -63
- data/lib/icontrol/local_lb/profile_one_connect.rb +99 -71
- data/lib/icontrol/local_lb/profile_persistence.rb +326 -203
- data/lib/icontrol/local_lb/profile_radius.rb +94 -62
- data/lib/icontrol/local_lb/profile_rtsp.rb +207 -129
- data/lib/icontrol/local_lb/profile_sctp.rb +231 -167
- data/lib/icontrol/local_lb/profile_server_ssl.rb +268 -189
- data/lib/icontrol/local_lb/profile_sip.rb +145 -99
- data/lib/icontrol/local_lb/profile_stream.rb +71 -51
- data/lib/icontrol/local_lb/profile_tcp.rb +455 -296
- data/lib/icontrol/local_lb/profile_udp.rb +109 -78
- data/lib/icontrol/local_lb/profile_user_statistic.rb +77 -46
- data/lib/icontrol/local_lb/profile_xml.rb +116 -79
- data/lib/icontrol/local_lb/ram_cache_information.rb +43 -20
- data/lib/icontrol/local_lb/rate_class.rb +523 -318
- data/lib/icontrol/local_lb/rule.rb +53 -37
- data/lib/icontrol/local_lb/snat.rb +96 -65
- data/lib/icontrol/local_lb/snat_pool.rb +54 -39
- data/lib/icontrol/local_lb/snat_pool_member.rb +22 -15
- data/lib/icontrol/local_lb/snat_translation_address.rb +94 -69
- data/lib/icontrol/local_lb/virtual_address.rb +99 -70
- data/lib/icontrol/local_lb/virtual_server.rb +358 -243
- data/lib/icontrol/lt_config.rb +8 -1
- data/lib/icontrol/lt_config/field.rb +87 -53
- data/lib/icontrol/lt_config/klass.rb +59 -43
- data/lib/icontrol/management.rb +80 -38
- data/lib/icontrol/management/ccldap_configuration.rb +218 -144
- data/lib/icontrol/management/change_control.rb +67 -41
- data/lib/icontrol/management/crldp_configuration.rb +73 -52
- data/lib/icontrol/management/crldp_server.rb +55 -39
- data/lib/icontrol/management/db_variable.rb +32 -21
- data/lib/icontrol/management/event_notification.rb +19 -8
- data/lib/icontrol/management/event_subscription.rb +121 -74
- data/lib/icontrol/management/key_certificate.rb +235 -138
- data/lib/icontrol/management/ldap_configuration.rb +249 -179
- data/lib/icontrol/management/license_administration.rb +97 -56
- data/lib/icontrol/management/named.rb +103 -67
- data/lib/icontrol/management/ocsp_configuration.rb +33 -24
- data/lib/icontrol/management/ocsp_responder.rb +294 -165
- data/lib/icontrol/management/partition.rb +42 -23
- data/lib/icontrol/management/provision.rb +73 -39
- data/lib/icontrol/management/radius_configuration.rb +85 -57
- data/lib/icontrol/management/radius_server.rb +51 -37
- data/lib/icontrol/management/resource_record.rb +163 -121
- data/lib/icontrol/management/snmp_configuration.rb +675 -390
- data/lib/icontrol/management/tacacs_configuration.rb +99 -67
- data/lib/icontrol/management/tmos_module.rb +20 -8
- data/lib/icontrol/management/user_management.rb +198 -124
- data/lib/icontrol/management/view.rb +33 -24
- data/lib/icontrol/management/zone.rb +49 -34
- data/lib/icontrol/management/zone_runner.rb +11 -7
- data/lib/icontrol/networking.rb +31 -4
- data/lib/icontrol/networking/admin_ip.rb +92 -71
- data/lib/icontrol/networking/arp.rb +41 -28
- data/lib/icontrol/networking/i_session_advertised_route.rb +47 -32
- data/lib/icontrol/networking/i_session_local_interface.rb +72 -52
- data/lib/icontrol/networking/i_session_peer_discovery.rb +105 -68
- data/lib/icontrol/networking/i_session_remote_interface.rb +105 -76
- data/lib/icontrol/networking/interfaces.rb +241 -142
- data/lib/icontrol/networking/packet_filter.rb +111 -69
- data/lib/icontrol/networking/packet_filter_globals.rb +39 -28
- data/lib/icontrol/networking/port_mirror.rb +39 -27
- data/lib/icontrol/networking/profile_gre.rb +63 -41
- data/lib/icontrol/networking/profile_ipip.rb +38 -25
- data/lib/icontrol/networking/profile_wccpgre.rb +85 -55
- data/lib/icontrol/networking/route_domain.rb +70 -44
- data/lib/icontrol/networking/route_table.rb +128 -91
- data/lib/icontrol/networking/self_ip.rb +57 -39
- data/lib/icontrol/networking/self_ip_port_lockdown.rb +34 -22
- data/lib/icontrol/networking/stp_globals.rb +115 -63
- data/lib/icontrol/networking/stp_instance.rb +166 -68
- data/lib/icontrol/networking/trunk.rb +165 -101
- data/lib/icontrol/networking/tunnel.rb +77 -52
- data/lib/icontrol/networking/vlan.rb +140 -98
- data/lib/icontrol/networking/vlan_group.rb +145 -101
- data/lib/icontrol/system.rb +70 -33
- data/lib/icontrol/system/cluster.rb +103 -81
- data/lib/icontrol/system/config_sync.rb +128 -72
- data/lib/icontrol/system/connections.rb +27 -17
- data/lib/icontrol/system/disk.rb +134 -67
- data/lib/icontrol/system/failover.rb +44 -27
- data/lib/icontrol/system/geo_ip.rb +16 -5
- data/lib/icontrol/system/inet.rb +47 -30
- data/lib/icontrol/system/internal.rb +13 -9
- data/lib/icontrol/system/services.rb +75 -42
- data/lib/icontrol/system/software_management.rb +132 -83
- data/lib/icontrol/system/statistics.rb +443 -298
- data/lib/icontrol/system/system_info.rb +137 -95
- data/lib/icontrol/web_accelerator/applications.rb +17 -10
- data/lib/icontrol/web_accelerator/policies.rb +13 -9
- data/lib/icontrol/web_accelerator/proxy_message.rb +11 -7
- data/spec/icontrol/local_lb/pool_member_spec.rb +495 -0
- data/spec/icontrol/local_lb/profile_http_class_spec.rb +514 -0
- metadata +10 -4
@@ -7,9 +7,10 @@ module IControl::Management
|
|
7
7
|
|
8
8
|
##
|
9
9
|
# Adds/associates servers to this TACACS configurations.
|
10
|
-
# @
|
11
|
-
# @raise [IControl::Common::
|
12
|
-
# @raise [IControl::Common::
|
10
|
+
# @rspec_example
|
11
|
+
# @raise [IControl::IControl::Common::AccessDenied] raised if the client credentials are not valid.
|
12
|
+
# @raise [IControl::IControl::Common::InvalidArgument] raised if one of the arguments is invalid.
|
13
|
+
# @raise [IControl::IControl::Common::OperationFailed] raised if an operation error occurs.
|
13
14
|
# @param [Hash] opts
|
14
15
|
# @option opts [String[]] :servers The servers to add to the TACACS configurations.
|
15
16
|
def add_server(opts)
|
@@ -19,9 +20,10 @@ module IControl::Management
|
|
19
20
|
|
20
21
|
##
|
21
22
|
# Creates this TACACS configurations.
|
22
|
-
# @
|
23
|
-
# @raise [IControl::Common::
|
24
|
-
# @raise [IControl::Common::
|
23
|
+
# @rspec_example
|
24
|
+
# @raise [IControl::IControl::Common::AccessDenied] raised if the client credentials are not valid.
|
25
|
+
# @raise [IControl::IControl::Common::InvalidArgument] raised if one of the arguments is invalid.
|
26
|
+
# @raise [IControl::IControl::Common::OperationFailed] raised if an operation error occurs.
|
25
27
|
# @param [Hash] opts
|
26
28
|
# @option opts [String] :secrets The secret keys used to encrypt/decrypt packets sent/received from the servers.
|
27
29
|
# @option opts [String] :service_names The TACACS+ servers' listening service names used by the configurations.
|
@@ -34,114 +36,131 @@ module IControl::Management
|
|
34
36
|
|
35
37
|
##
|
36
38
|
# Deletes all TACACS configurations.
|
37
|
-
# @
|
38
|
-
# @raise [IControl::Common::
|
39
|
-
# @raise [IControl::Common::
|
39
|
+
# @rspec_example
|
40
|
+
# @raise [IControl::IControl::Common::AccessDenied] raised if the client credentials are not valid.
|
41
|
+
# @raise [IControl::IControl::Common::InvalidArgument] raised if one of the arguments is invalid.
|
42
|
+
# @raise [IControl::IControl::Common::OperationFailed] raised if an operation error occurs.
|
40
43
|
def delete_all_configurations
|
41
44
|
super
|
42
45
|
end
|
43
46
|
|
44
47
|
##
|
45
48
|
# Deletes this TACACS configurations.
|
46
|
-
# @
|
47
|
-
# @raise [IControl::Common::
|
48
|
-
# @raise [IControl::Common::
|
49
|
+
# @rspec_example
|
50
|
+
# @raise [IControl::IControl::Common::AccessDenied] raised if the client credentials are not valid.
|
51
|
+
# @raise [IControl::IControl::Common::InvalidArgument] raised if one of the arguments is invalid.
|
52
|
+
# @raise [IControl::IControl::Common::OperationFailed] raised if an operation error occurs.
|
49
53
|
def delete_configuration
|
50
54
|
super
|
51
55
|
end
|
52
56
|
|
53
57
|
##
|
54
|
-
# Gets the states such that if enabled and if multiple servers are defined, send accounting
|
58
|
+
# Gets the states such that if enabled and if multiple servers are defined, send accounting
|
59
|
+
# start/stop packets to all servers (if session accounting has been enabled in the
|
60
|
+
# PAM service configuration).
|
61
|
+
# @rspec_example
|
55
62
|
# @return [EnabledState]
|
56
|
-
# @raise [IControl::Common::AccessDenied] raised if the client credentials are not valid.
|
57
|
-
# @raise [IControl::Common::InvalidArgument] raised if one of the arguments is invalid.
|
58
|
-
# @raise [IControl::Common::OperationFailed] raised if an operation error occurs.
|
63
|
+
# @raise [IControl::IControl::Common::AccessDenied] raised if the client credentials are not valid.
|
64
|
+
# @raise [IControl::IControl::Common::InvalidArgument] raised if one of the arguments is invalid.
|
65
|
+
# @raise [IControl::IControl::Common::OperationFailed] raised if an operation error occurs.
|
59
66
|
def accounting_to_all_state
|
60
67
|
super
|
61
68
|
end
|
62
69
|
|
63
70
|
##
|
64
71
|
# Gets the states indicating whether syslog debugging is enabled/disabled.
|
72
|
+
# @rspec_example
|
65
73
|
# @return [EnabledState]
|
66
|
-
# @raise [IControl::Common::AccessDenied] raised if the client credentials are not valid.
|
67
|
-
# @raise [IControl::Common::InvalidArgument] raised if one of the arguments is invalid.
|
68
|
-
# @raise [IControl::Common::OperationFailed] raised if an operation error occurs.
|
74
|
+
# @raise [IControl::IControl::Common::AccessDenied] raised if the client credentials are not valid.
|
75
|
+
# @raise [IControl::IControl::Common::InvalidArgument] raised if one of the arguments is invalid.
|
76
|
+
# @raise [IControl::IControl::Common::OperationFailed] raised if an operation error occurs.
|
69
77
|
def debug_state
|
70
78
|
super
|
71
79
|
end
|
72
80
|
|
73
81
|
##
|
74
82
|
# Gets the states indicating whether encryption on TACACS+ packets is enabled/disabled.
|
83
|
+
# @rspec_example
|
75
84
|
# @return [EnabledState]
|
76
|
-
# @raise [IControl::Common::AccessDenied] raised if the client credentials are not valid.
|
77
|
-
# @raise [IControl::Common::InvalidArgument] raised if one of the arguments is invalid.
|
78
|
-
# @raise [IControl::Common::OperationFailed] raised if an operation error occurs.
|
85
|
+
# @raise [IControl::IControl::Common::AccessDenied] raised if the client credentials are not valid.
|
86
|
+
# @raise [IControl::IControl::Common::InvalidArgument] raised if one of the arguments is invalid.
|
87
|
+
# @raise [IControl::IControl::Common::OperationFailed] raised if an operation error occurs.
|
79
88
|
def encryption_state
|
80
89
|
super
|
81
90
|
end
|
82
91
|
|
83
92
|
##
|
84
|
-
# Gets the states such that if enabled and if multiple servers are defined, try to
|
93
|
+
# Gets the states such that if enabled and if multiple servers are defined, try to
|
94
|
+
# authenticate the user on all servers until the first authentication succeeds, or
|
95
|
+
# until all servers have been queried. The first success response results in the auth
|
96
|
+
# succeeding.
|
97
|
+
# @rspec_example
|
85
98
|
# @return [EnabledState]
|
86
|
-
# @raise [IControl::Common::AccessDenied] raised if the client credentials are not valid.
|
87
|
-
# @raise [IControl::Common::InvalidArgument] raised if one of the arguments is invalid.
|
88
|
-
# @raise [IControl::Common::OperationFailed] raised if an operation error occurs.
|
99
|
+
# @raise [IControl::IControl::Common::AccessDenied] raised if the client credentials are not valid.
|
100
|
+
# @raise [IControl::IControl::Common::InvalidArgument] raised if one of the arguments is invalid.
|
101
|
+
# @raise [IControl::IControl::Common::OperationFailed] raised if an operation error occurs.
|
89
102
|
def first_hit_state
|
90
103
|
super
|
91
104
|
end
|
92
105
|
|
93
106
|
##
|
94
107
|
# Gets a list of all TACACS configurations.
|
108
|
+
# @rspec_example
|
95
109
|
# @return [String]
|
96
|
-
# @raise [IControl::Common::AccessDenied] raised if the client credentials are not valid.
|
97
|
-
# @raise [IControl::Common::InvalidArgument] raised if one of the arguments is invalid.
|
98
|
-
# @raise [IControl::Common::OperationFailed] raised if an operation error occurs.
|
110
|
+
# @raise [IControl::IControl::Common::AccessDenied] raised if the client credentials are not valid.
|
111
|
+
# @raise [IControl::IControl::Common::InvalidArgument] raised if one of the arguments is invalid.
|
112
|
+
# @raise [IControl::IControl::Common::OperationFailed] raised if an operation error occurs.
|
99
113
|
def list
|
100
114
|
super
|
101
115
|
end
|
102
116
|
|
103
117
|
##
|
104
118
|
# Gets the names of the TACACS+ servers' listening protocols used by the configurations.
|
119
|
+
# @rspec_example
|
105
120
|
# @return [String]
|
106
|
-
# @raise [IControl::Common::AccessDenied] raised if the client credentials are not valid.
|
107
|
-
# @raise [IControl::Common::InvalidArgument] raised if one of the arguments is invalid.
|
108
|
-
# @raise [IControl::Common::OperationFailed] raised if an operation error occurs.
|
121
|
+
# @raise [IControl::IControl::Common::AccessDenied] raised if the client credentials are not valid.
|
122
|
+
# @raise [IControl::IControl::Common::InvalidArgument] raised if one of the arguments is invalid.
|
123
|
+
# @raise [IControl::IControl::Common::OperationFailed] raised if an operation error occurs.
|
109
124
|
def protocol_name
|
110
125
|
super
|
111
126
|
end
|
112
127
|
|
113
128
|
##
|
114
129
|
# Gets the secret keys used to encrypt/decrypt packets sent/received from the server.
|
130
|
+
# @rspec_example
|
115
131
|
# @return [String]
|
116
|
-
# @raise [IControl::Common::AccessDenied] raised if the client credentials are not valid.
|
117
|
-
# @raise [IControl::Common::InvalidArgument] raised if one of the arguments is invalid.
|
118
|
-
# @raise [IControl::Common::OperationFailed] raised if an operation error occurs.
|
132
|
+
# @raise [IControl::IControl::Common::AccessDenied] raised if the client credentials are not valid.
|
133
|
+
# @raise [IControl::IControl::Common::InvalidArgument] raised if one of the arguments is invalid.
|
134
|
+
# @raise [IControl::IControl::Common::OperationFailed] raised if an operation error occurs.
|
119
135
|
def secret
|
120
136
|
super
|
121
137
|
end
|
122
138
|
|
123
139
|
##
|
124
140
|
# Gets the lists of servers this TACACS configurations are associated with.
|
141
|
+
# @rspec_example
|
125
142
|
# @return [String[]]
|
126
|
-
# @raise [IControl::Common::AccessDenied] raised if the client credentials are not valid.
|
127
|
-
# @raise [IControl::Common::InvalidArgument] raised if one of the arguments is invalid.
|
128
|
-
# @raise [IControl::Common::OperationFailed] raised if an operation error occurs.
|
143
|
+
# @raise [IControl::IControl::Common::AccessDenied] raised if the client credentials are not valid.
|
144
|
+
# @raise [IControl::IControl::Common::InvalidArgument] raised if one of the arguments is invalid.
|
145
|
+
# @raise [IControl::IControl::Common::OperationFailed] raised if an operation error occurs.
|
129
146
|
def server
|
130
147
|
super
|
131
148
|
end
|
132
149
|
|
133
150
|
##
|
134
151
|
# Gets the names of the TACACS+ servers' listening services used by the configurations.
|
152
|
+
# @rspec_example
|
135
153
|
# @return [String]
|
136
|
-
# @raise [IControl::Common::AccessDenied] raised if the client credentials are not valid.
|
137
|
-
# @raise [IControl::Common::InvalidArgument] raised if one of the arguments is invalid.
|
138
|
-
# @raise [IControl::Common::OperationFailed] raised if an operation error occurs.
|
154
|
+
# @raise [IControl::IControl::Common::AccessDenied] raised if the client credentials are not valid.
|
155
|
+
# @raise [IControl::IControl::Common::InvalidArgument] raised if one of the arguments is invalid.
|
156
|
+
# @raise [IControl::IControl::Common::OperationFailed] raised if an operation error occurs.
|
139
157
|
def service_name
|
140
158
|
super
|
141
159
|
end
|
142
160
|
|
143
161
|
##
|
144
162
|
# Gets the version information for this interface.
|
163
|
+
# @rspec_example
|
145
164
|
# @return [String]
|
146
165
|
def version
|
147
166
|
super
|
@@ -149,9 +168,10 @@ module IControl::Management
|
|
149
168
|
|
150
169
|
##
|
151
170
|
# Removes servers from this TACACS configurations.
|
152
|
-
# @
|
153
|
-
# @raise [IControl::Common::
|
154
|
-
# @raise [IControl::Common::
|
171
|
+
# @rspec_example
|
172
|
+
# @raise [IControl::IControl::Common::AccessDenied] raised if the client credentials are not valid.
|
173
|
+
# @raise [IControl::IControl::Common::InvalidArgument] raised if one of the arguments is invalid.
|
174
|
+
# @raise [IControl::IControl::Common::OperationFailed] raised if an operation error occurs.
|
155
175
|
# @param [Hash] opts
|
156
176
|
# @option opts [String[]] :servers The servers to remove from the TACACS configurations.
|
157
177
|
def remove_server(opts)
|
@@ -160,10 +180,13 @@ module IControl::Management
|
|
160
180
|
end
|
161
181
|
|
162
182
|
##
|
163
|
-
# Sets the states such that if enabled and if multiple servers are defined, send accounting
|
164
|
-
#
|
165
|
-
#
|
166
|
-
# @
|
183
|
+
# Sets the states such that if enabled and if multiple servers are defined, send accounting
|
184
|
+
# start/stop packets to all servers (if session accounting has been enabled in the
|
185
|
+
# PAM service configuration).
|
186
|
+
# @rspec_example
|
187
|
+
# @raise [IControl::IControl::Common::AccessDenied] raised if the client credentials are not valid.
|
188
|
+
# @raise [IControl::IControl::Common::InvalidArgument] raised if one of the arguments is invalid.
|
189
|
+
# @raise [IControl::IControl::Common::OperationFailed] raised if an operation error occurs.
|
167
190
|
# @param [Hash] opts
|
168
191
|
# @option opts [IControl::Common::EnabledState] :states The accounting-to-all states of the specified configurations.
|
169
192
|
def set_accounting_to_all_state(opts)
|
@@ -173,9 +196,10 @@ module IControl::Management
|
|
173
196
|
|
174
197
|
##
|
175
198
|
# Sets the states indicating whether syslog debugging is enabled/disabled.
|
176
|
-
# @
|
177
|
-
# @raise [IControl::Common::
|
178
|
-
# @raise [IControl::Common::
|
199
|
+
# @rspec_example
|
200
|
+
# @raise [IControl::IControl::Common::AccessDenied] raised if the client credentials are not valid.
|
201
|
+
# @raise [IControl::IControl::Common::InvalidArgument] raised if one of the arguments is invalid.
|
202
|
+
# @raise [IControl::IControl::Common::OperationFailed] raised if an operation error occurs.
|
179
203
|
# @param [Hash] opts
|
180
204
|
# @option opts [IControl::Common::EnabledState] :states The syslog debugging states of the specified configurations.
|
181
205
|
def set_debug_state(opts)
|
@@ -185,9 +209,10 @@ module IControl::Management
|
|
185
209
|
|
186
210
|
##
|
187
211
|
# Sets the states indicating whether encryption on TACACS+ packets is enabled/disabled.
|
188
|
-
# @
|
189
|
-
# @raise [IControl::Common::
|
190
|
-
# @raise [IControl::Common::
|
212
|
+
# @rspec_example
|
213
|
+
# @raise [IControl::IControl::Common::AccessDenied] raised if the client credentials are not valid.
|
214
|
+
# @raise [IControl::IControl::Common::InvalidArgument] raised if one of the arguments is invalid.
|
215
|
+
# @raise [IControl::IControl::Common::OperationFailed] raised if an operation error occurs.
|
191
216
|
# @param [Hash] opts
|
192
217
|
# @option opts [IControl::Common::EnabledState] :states The encryption states of the specified configurations.
|
193
218
|
def set_encryption_state(opts)
|
@@ -196,10 +221,14 @@ module IControl::Management
|
|
196
221
|
end
|
197
222
|
|
198
223
|
##
|
199
|
-
# Sets the states such that if enabled and if multiple servers are defined, try to
|
200
|
-
#
|
201
|
-
#
|
202
|
-
#
|
224
|
+
# Sets the states such that if enabled and if multiple servers are defined, try to
|
225
|
+
# authenticate the user on all servers until the first authentication succeeds, or
|
226
|
+
# until all servers have been queried. The first success response results in the auth
|
227
|
+
# succeeding.
|
228
|
+
# @rspec_example
|
229
|
+
# @raise [IControl::IControl::Common::AccessDenied] raised if the client credentials are not valid.
|
230
|
+
# @raise [IControl::IControl::Common::InvalidArgument] raised if one of the arguments is invalid.
|
231
|
+
# @raise [IControl::IControl::Common::OperationFailed] raised if an operation error occurs.
|
203
232
|
# @param [Hash] opts
|
204
233
|
# @option opts [IControl::Common::EnabledState] :states The first-hit states of the specified configurations.
|
205
234
|
def set_first_hit_state(opts)
|
@@ -209,9 +238,10 @@ module IControl::Management
|
|
209
238
|
|
210
239
|
##
|
211
240
|
# Sets the names of the TACACS+ servers' listening protocols used by the configurations.
|
212
|
-
# @
|
213
|
-
# @raise [IControl::Common::
|
214
|
-
# @raise [IControl::Common::
|
241
|
+
# @rspec_example
|
242
|
+
# @raise [IControl::IControl::Common::AccessDenied] raised if the client credentials are not valid.
|
243
|
+
# @raise [IControl::IControl::Common::InvalidArgument] raised if one of the arguments is invalid.
|
244
|
+
# @raise [IControl::IControl::Common::OperationFailed] raised if an operation error occurs.
|
215
245
|
# @param [Hash] opts
|
216
246
|
# @option opts [String] :protocol_names The service names used by the configurations.
|
217
247
|
def set_protocol_name(opts)
|
@@ -221,9 +251,10 @@ module IControl::Management
|
|
221
251
|
|
222
252
|
##
|
223
253
|
# Sets the secret keys used to encrypt/decrypt packets sent/received from the server.
|
224
|
-
# @
|
225
|
-
# @raise [IControl::Common::
|
226
|
-
# @raise [IControl::Common::
|
254
|
+
# @rspec_example
|
255
|
+
# @raise [IControl::IControl::Common::AccessDenied] raised if the client credentials are not valid.
|
256
|
+
# @raise [IControl::IControl::Common::InvalidArgument] raised if one of the arguments is invalid.
|
257
|
+
# @raise [IControl::IControl::Common::OperationFailed] raised if an operation error occurs.
|
227
258
|
# @param [Hash] opts
|
228
259
|
# @option opts [String] :secrets The secrets used by the configurations.
|
229
260
|
def set_secret(opts)
|
@@ -233,9 +264,10 @@ module IControl::Management
|
|
233
264
|
|
234
265
|
##
|
235
266
|
# Sets the names of the TACACS+ servers' listening services used by the configurations.
|
236
|
-
# @
|
237
|
-
# @raise [IControl::Common::
|
238
|
-
# @raise [IControl::Common::
|
267
|
+
# @rspec_example
|
268
|
+
# @raise [IControl::IControl::Common::AccessDenied] raised if the client credentials are not valid.
|
269
|
+
# @raise [IControl::IControl::Common::InvalidArgument] raised if one of the arguments is invalid.
|
270
|
+
# @raise [IControl::IControl::Common::OperationFailed] raised if an operation error occurs.
|
239
271
|
# @param [Hash] opts
|
240
272
|
# @option opts [String] :service_names The service names used by the configurations.
|
241
273
|
def set_service_name(opts)
|
@@ -1,32 +1,44 @@
|
|
1
1
|
module IControl::Management
|
2
2
|
##
|
3
|
-
# The Module interface enables you to manage the system's TMOS modules (e.g. LTM, GTM,
|
3
|
+
# The Module interface enables you to manage the system's TMOS modules (e.g. LTM, GTM,
|
4
|
+
# ASM). The methods and types here focus on the modules themselves; some of the specific
|
5
|
+
# questions you might ask about modules are broken out in other places, such as the
|
6
|
+
# Provision or LicenseAdministration interface.
|
4
7
|
class TMOSModule < IControl::Base
|
5
8
|
|
6
9
|
set_id_name "modules"
|
7
10
|
|
8
11
|
##
|
9
12
|
# Gets a list of descriptive names for the module given
|
13
|
+
# @rspec_example
|
10
14
|
# @return [String]
|
11
|
-
# @raise [IControl::Common::AccessDenied] raised if the client credentials are not valid.
|
12
|
-
# @raise [IControl::Common::InvalidArgument] raised if one of the arguments is invalid.
|
13
|
-
# @raise [IControl::Common::OperationFailed] raised if an operation error occurs.
|
15
|
+
# @raise [IControl::IControl::Common::AccessDenied] raised if the client credentials are not valid.
|
16
|
+
# @raise [IControl::IControl::Common::InvalidArgument] raised if one of the arguments is invalid.
|
17
|
+
# @raise [IControl::IControl::Common::OperationFailed] raised if an operation error occurs.
|
14
18
|
def descriptive_name
|
15
19
|
super
|
16
20
|
end
|
17
21
|
|
18
22
|
##
|
19
|
-
# Gets a list of all known module Caution! The list returned gives all module known,
|
23
|
+
# Gets a list of all known module Caution! The list returned gives all module known,
|
24
|
+
# even if they are not licensed or provisionable on this system. You could use this
|
25
|
+
# to get a general picture of what module are possible, but this list is not specific
|
26
|
+
# to the system you have. To determine the licensing status of the module on your system,
|
27
|
+
# see the LicenseAdministration interface. To determine which module are supported
|
28
|
+
# (i.e., provisionable) under your system or currently provisioned to run on your system,
|
29
|
+
# see the Provision interface.
|
30
|
+
# @rspec_example
|
20
31
|
# @return [TMOSModule]
|
21
|
-
# @raise [IControl::Common::AccessDenied] raised if the client credentials are not valid.
|
22
|
-
# @raise [IControl::Common::InvalidArgument] raised if one of the arguments is invalid.
|
23
|
-
# @raise [IControl::Common::OperationFailed] raised if an operation error occurs.
|
32
|
+
# @raise [IControl::IControl::Common::AccessDenied] raised if the client credentials are not valid.
|
33
|
+
# @raise [IControl::IControl::Common::InvalidArgument] raised if one of the arguments is invalid.
|
34
|
+
# @raise [IControl::IControl::Common::OperationFailed] raised if an operation error occurs.
|
24
35
|
def known_module_list
|
25
36
|
super
|
26
37
|
end
|
27
38
|
|
28
39
|
##
|
29
40
|
# Gets the version information for this interface.
|
41
|
+
# @rspec_example
|
30
42
|
# @return [String]
|
31
43
|
def version
|
32
44
|
super
|
@@ -1,6 +1,7 @@
|
|
1
1
|
module IControl::Management
|
2
2
|
##
|
3
|
-
# The UserManagement interface deals with adding/deleting and modifying users and user
|
3
|
+
# The UserManagement interface deals with adding/deleting and modifying users and user
|
4
|
+
# permission.
|
4
5
|
class UserManagement < IControl::Base
|
5
6
|
|
6
7
|
set_id_name "user_names"
|
@@ -11,12 +12,22 @@ module IControl::Management
|
|
11
12
|
class UserInfo2 < IControl::Base::Struct; end
|
12
13
|
class UserInfo3 < IControl::Base::Struct; end
|
13
14
|
class UserPermission < IControl::Base::Struct; end
|
14
|
-
|
15
|
+
class PasswordInfoSequence < IControl::Base::Sequence ; end
|
16
|
+
class UserIDSequence < IControl::Base::Sequence ; end
|
17
|
+
class UserInfo2Sequence < IControl::Base::Sequence ; end
|
18
|
+
class UserInfo3Sequence < IControl::Base::Sequence ; end
|
19
|
+
class UserInfoSequence < IControl::Base::Sequence ; end
|
20
|
+
class UserPermissionSequence < IControl::Base::Sequence ; end
|
21
|
+
class UserPermissionSequenceSequence < IControl::Base::SequenceSequence ; end
|
22
|
+
class UserRoleSequence < IControl::Base::Sequence ; end
|
23
|
+
# An enumerated type that contains the possible roles a user may have. Refer to the
|
24
|
+
# product manual for a complete list of what each role means.
|
15
25
|
class UserRole < IControl::Base::Enumeration; end ##
|
16
26
|
# Change the password of the user making the request.
|
17
|
-
# @
|
18
|
-
# @raise [IControl::Common::
|
19
|
-
# @raise [IControl::Common::
|
27
|
+
# @rspec_example
|
28
|
+
# @raise [IControl::IControl::Common::AccessDenied] raised if the client credentials are not valid.
|
29
|
+
# @raise [IControl::IControl::Common::OperationFailed] raised if an operation error occurs.
|
30
|
+
# @raise [IControl::IControl::Common::InvalidArgument] raised if one of the arguments is invalid.
|
20
31
|
# @param [Hash] opts
|
21
32
|
# @option opts [IControl::Management::UserManagement::PasswordInfo] :password The new password.
|
22
33
|
def change_my_password(opts)
|
@@ -26,9 +37,10 @@ module IControl::Management
|
|
26
37
|
|
27
38
|
##
|
28
39
|
# Change the user's password.
|
29
|
-
# @
|
30
|
-
# @raise [IControl::Common::
|
31
|
-
# @raise [IControl::Common::
|
40
|
+
# @rspec_example
|
41
|
+
# @raise [IControl::IControl::Common::AccessDenied] raised if the client credentials are not valid.
|
42
|
+
# @raise [IControl::IControl::Common::OperationFailed] raised if an operation error occurs.
|
43
|
+
# @raise [IControl::IControl::Common::InvalidArgument] raised if one of the arguments is invalid.
|
32
44
|
# @param [Hash] opts
|
33
45
|
# @option opts [String] :passwords The new clear-text passwords.
|
34
46
|
def change_password(opts)
|
@@ -38,9 +50,10 @@ module IControl::Management
|
|
38
50
|
|
39
51
|
##
|
40
52
|
# Change the user's password.
|
41
|
-
# @
|
42
|
-
# @raise [IControl::Common::
|
43
|
-
# @raise [IControl::Common::
|
53
|
+
# @rspec_example
|
54
|
+
# @raise [IControl::IControl::Common::AccessDenied] raised if the client credentials are not valid.
|
55
|
+
# @raise [IControl::IControl::Common::OperationFailed] raised if an operation error occurs.
|
56
|
+
# @raise [IControl::IControl::Common::InvalidArgument] raised if one of the arguments is invalid.
|
44
57
|
# @param [Hash] opts
|
45
58
|
# @option opts [IControl::Management::UserManagement::PasswordInfo] :passwords The new passwords.
|
46
59
|
def change_password_2(opts)
|
@@ -49,10 +62,15 @@ module IControl::Management
|
|
49
62
|
end
|
50
63
|
|
51
64
|
##
|
52
|
-
# Note: this method is deprecated; please use create_user_3 and associated data. (home
|
53
|
-
#
|
54
|
-
#
|
55
|
-
#
|
65
|
+
# Note: this method is deprecated; please use create_user_3 and associated data. (home
|
66
|
+
# directory, user id, and group id are now computed by the system, and there is now
|
67
|
+
# a choice of whether the password is encrypted) Create this new user. Note: as of
|
68
|
+
# v10.1.0, this method will silently ignore any of user id, group id, and home directory
|
69
|
+
# passed in.
|
70
|
+
# @rspec_example
|
71
|
+
# @raise [IControl::IControl::Common::AccessDenied] raised if the client credentials are not valid.
|
72
|
+
# @raise [IControl::IControl::Common::OperationFailed] raised if an operation error occurs.
|
73
|
+
# @raise [IControl::IControl::Common::InvalidArgument] raised if one of the arguments is invalid.
|
56
74
|
# @param [Hash] opts
|
57
75
|
# @option opts [IControl::Management::UserManagement::UserInfo] :users The user's information.
|
58
76
|
def create_user(opts)
|
@@ -61,10 +79,14 @@ module IControl::Management
|
|
61
79
|
end
|
62
80
|
|
63
81
|
##
|
64
|
-
# Note: this method is deprecated; please use create_user_3 and associated data. (home
|
65
|
-
#
|
66
|
-
#
|
67
|
-
#
|
82
|
+
# Note: this method is deprecated; please use create_user_3 and associated data. (home
|
83
|
+
# directory, user id, and group id are now computed by the system) Create this new
|
84
|
+
# user. Note: as of v10.1.0, this method will silently ignore any of user id, group
|
85
|
+
# id, and home directory passed in.
|
86
|
+
# @rspec_example
|
87
|
+
# @raise [IControl::IControl::Common::AccessDenied] raised if the client credentials are not valid.
|
88
|
+
# @raise [IControl::IControl::Common::OperationFailed] raised if an operation error occurs.
|
89
|
+
# @raise [IControl::IControl::Common::InvalidArgument] raised if one of the arguments is invalid.
|
68
90
|
# @param [Hash] opts
|
69
91
|
# @option opts [IControl::Management::UserManagement::UserInfo2] :users The user's information.
|
70
92
|
def create_user_2(opts)
|
@@ -74,9 +96,10 @@ module IControl::Management
|
|
74
96
|
|
75
97
|
##
|
76
98
|
# Create this new user.
|
77
|
-
# @
|
78
|
-
# @raise [IControl::Common::
|
79
|
-
# @raise [IControl::Common::
|
99
|
+
# @rspec_example
|
100
|
+
# @raise [IControl::IControl::Common::AccessDenied] raised if the client credentials are not valid.
|
101
|
+
# @raise [IControl::IControl::Common::OperationFailed] raised if an operation error occurs.
|
102
|
+
# @raise [IControl::IControl::Common::InvalidArgument] raised if one of the arguments is invalid.
|
80
103
|
# @param [Hash] opts
|
81
104
|
# @option opts [IControl::Management::UserManagement::UserInfo3] :users The user's information.
|
82
105
|
def create_user_3(opts)
|
@@ -86,184 +109,211 @@ module IControl::Management
|
|
86
109
|
|
87
110
|
##
|
88
111
|
# Delete this user.
|
89
|
-
# @
|
90
|
-
# @raise [IControl::Common::
|
91
|
-
# @raise [IControl::Common::
|
112
|
+
# @rspec_example
|
113
|
+
# @raise [IControl::IControl::Common::AccessDenied] raised if the client credentials are not valid.
|
114
|
+
# @raise [IControl::IControl::Common::OperationFailed] raised if an operation error occurs.
|
115
|
+
# @raise [IControl::IControl::Common::InvalidArgument] raised if one of the arguments is invalid.
|
92
116
|
def delete_user
|
93
117
|
super
|
94
118
|
end
|
95
119
|
|
96
120
|
##
|
97
121
|
# Get the authentication method that the system will use to authenticate user.
|
122
|
+
# @rspec_example
|
98
123
|
# @return [AuthenticationMethod]
|
99
|
-
# @raise [IControl::Common::AccessDenied] raised if the client credentials are not valid.
|
100
|
-
# @raise [IControl::Common::OperationFailed] raised if an operation error occurs.
|
101
|
-
# @raise [IControl::Common::InvalidArgument] raised if one of the arguments is invalid.
|
124
|
+
# @raise [IControl::IControl::Common::AccessDenied] raised if the client credentials are not valid.
|
125
|
+
# @raise [IControl::IControl::Common::OperationFailed] raised if an operation error occurs.
|
126
|
+
# @raise [IControl::IControl::Common::InvalidArgument] raised if one of the arguments is invalid.
|
102
127
|
def authentication_method
|
103
128
|
super
|
104
129
|
end
|
105
130
|
|
106
131
|
##
|
107
132
|
# Get the default user partition for the device.
|
133
|
+
# @rspec_example
|
108
134
|
# @return [String]
|
109
|
-
# @raise [IControl::Common::AccessDenied] raised if the client credentials are not valid.
|
110
|
-
# @raise [IControl::Common::OperationFailed] raised if an operation error occurs.
|
111
|
-
# @raise [IControl::Common::InvalidArgument] raised if one of the arguments is invalid.
|
135
|
+
# @raise [IControl::IControl::Common::AccessDenied] raised if the client credentials are not valid.
|
136
|
+
# @raise [IControl::IControl::Common::OperationFailed] raised if an operation error occurs.
|
137
|
+
# @raise [IControl::IControl::Common::InvalidArgument] raised if one of the arguments is invalid.
|
112
138
|
def default_partition
|
113
139
|
super
|
114
140
|
end
|
115
141
|
|
116
142
|
##
|
117
143
|
# Get the default user role for the device.
|
144
|
+
# @rspec_example
|
118
145
|
# @return [UserRole]
|
119
|
-
# @raise [IControl::Common::AccessDenied] raised if the client credentials are not valid.
|
120
|
-
# @raise [IControl::Common::OperationFailed] raised if an operation error occurs.
|
121
|
-
# @raise [IControl::Common::InvalidArgument] raised if one of the arguments is invalid.
|
146
|
+
# @raise [IControl::IControl::Common::AccessDenied] raised if the client credentials are not valid.
|
147
|
+
# @raise [IControl::IControl::Common::OperationFailed] raised if an operation error occurs.
|
148
|
+
# @raise [IControl::IControl::Common::InvalidArgument] raised if one of the arguments is invalid.
|
122
149
|
def default_role
|
123
150
|
super
|
124
151
|
end
|
125
152
|
|
126
153
|
##
|
127
154
|
# Gets the encrypted passwords of this user.
|
155
|
+
# @rspec_example
|
128
156
|
# @return [String]
|
129
|
-
# @raise [IControl::Common::AccessDenied] raised if the client credentials are not valid.
|
130
|
-
# @raise [IControl::Common::OperationFailed] raised if an operation error occurs.
|
131
|
-
# @raise [IControl::Common::InvalidArgument] raised if one of the arguments is invalid.
|
157
|
+
# @raise [IControl::IControl::Common::AccessDenied] raised if the client credentials are not valid.
|
158
|
+
# @raise [IControl::IControl::Common::OperationFailed] raised if an operation error occurs.
|
159
|
+
# @raise [IControl::IControl::Common::InvalidArgument] raised if one of the arguments is invalid.
|
132
160
|
def encrypted_password
|
133
161
|
super
|
134
162
|
end
|
135
163
|
|
136
164
|
##
|
137
165
|
# Get the full names for the given user.
|
166
|
+
# @rspec_example
|
138
167
|
# @return [String]
|
139
|
-
# @raise [IControl::Common::AccessDenied] raised if the client credentials are not valid.
|
140
|
-
# @raise [IControl::Common::OperationFailed] raised if an operation error occurs.
|
141
|
-
# @raise [IControl::Common::InvalidArgument] raised if one of the arguments is invalid.
|
168
|
+
# @raise [IControl::IControl::Common::AccessDenied] raised if the client credentials are not valid.
|
169
|
+
# @raise [IControl::IControl::Common::OperationFailed] raised if an operation error occurs.
|
170
|
+
# @raise [IControl::IControl::Common::InvalidArgument] raised if one of the arguments is invalid.
|
142
171
|
def fullname
|
143
172
|
super
|
144
173
|
end
|
145
174
|
|
146
175
|
##
|
147
176
|
# Get the Group IDs for the given usernames.
|
177
|
+
# @rspec_example
|
148
178
|
# @return [long]
|
149
|
-
# @raise [IControl::Common::AccessDenied] raised if the client credentials are not valid.
|
150
|
-
# @raise [IControl::Common::OperationFailed] raised if an operation error occurs.
|
151
|
-
# @raise [IControl::Common::InvalidArgument] raised if one of the arguments is invalid.
|
179
|
+
# @raise [IControl::IControl::Common::AccessDenied] raised if the client credentials are not valid.
|
180
|
+
# @raise [IControl::IControl::Common::OperationFailed] raised if an operation error occurs.
|
181
|
+
# @raise [IControl::IControl::Common::InvalidArgument] raised if one of the arguments is invalid.
|
152
182
|
def group_id
|
153
183
|
super
|
154
184
|
end
|
155
185
|
|
156
186
|
##
|
157
187
|
# Get the default home directories for the given usernames.
|
188
|
+
# @rspec_example
|
158
189
|
# @return [String]
|
159
|
-
# @raise [IControl::Common::AccessDenied] raised if the client credentials are not valid.
|
160
|
-
# @raise [IControl::Common::OperationFailed] raised if an operation error occurs.
|
161
|
-
# @raise [IControl::Common::InvalidArgument] raised if one of the arguments is invalid.
|
190
|
+
# @raise [IControl::IControl::Common::AccessDenied] raised if the client credentials are not valid.
|
191
|
+
# @raise [IControl::IControl::Common::OperationFailed] raised if an operation error occurs.
|
192
|
+
# @raise [IControl::IControl::Common::InvalidArgument] raised if one of the arguments is invalid.
|
162
193
|
def home_directory
|
163
194
|
super
|
164
195
|
end
|
165
196
|
|
166
197
|
##
|
167
198
|
# List all user.
|
199
|
+
# @rspec_example
|
168
200
|
# @return [UserID]
|
169
|
-
# @raise [IControl::Common::AccessDenied] raised if the client credentials are not valid.
|
170
|
-
# @raise [IControl::Common::OperationFailed] raised if an operation error occurs.
|
171
|
-
# @raise [IControl::Common::InvalidArgument] raised if one of the arguments is invalid.
|
201
|
+
# @raise [IControl::IControl::Common::AccessDenied] raised if the client credentials are not valid.
|
202
|
+
# @raise [IControl::IControl::Common::OperationFailed] raised if an operation error occurs.
|
203
|
+
# @raise [IControl::IControl::Common::InvalidArgument] raised if one of the arguments is invalid.
|
172
204
|
def list
|
173
205
|
super
|
174
206
|
end
|
175
207
|
|
176
208
|
##
|
177
209
|
# Get the login shells for the given usernames.
|
210
|
+
# @rspec_example
|
178
211
|
# @return [String]
|
179
|
-
# @raise [IControl::Common::AccessDenied] raised if the client credentials are not valid.
|
180
|
-
# @raise [IControl::Common::OperationFailed] raised if an operation error occurs.
|
181
|
-
# @raise [IControl::Common::InvalidArgument] raised if one of the arguments is invalid.
|
212
|
+
# @raise [IControl::IControl::Common::AccessDenied] raised if the client credentials are not valid.
|
213
|
+
# @raise [IControl::IControl::Common::OperationFailed] raised if an operation error occurs.
|
214
|
+
# @raise [IControl::IControl::Common::InvalidArgument] raised if one of the arguments is invalid.
|
182
215
|
def login_shell
|
183
216
|
super
|
184
217
|
end
|
185
218
|
|
186
219
|
##
|
187
|
-
# Gets the credentials of the user making the request. This is useful in getting your
|
220
|
+
# Gets the credentials of the user making the request. This is useful in getting your
|
221
|
+
# own permission information (regardless of which partitions you may otherwise read).
|
222
|
+
# The results indicate what role you have on a what partitions.
|
223
|
+
# @rspec_example
|
188
224
|
# @return [UserPermission]
|
189
|
-
# @raise [IControl::Common::AccessDenied] raised if the client credentials are not valid.
|
190
|
-
# @raise [IControl::Common::OperationFailed] raised if an operation error occurs.
|
191
|
-
# @raise [IControl::Common::InvalidArgument]
|
225
|
+
# @raise [IControl::IControl::Common::AccessDenied] raised if the client credentials are not valid.
|
226
|
+
# @raise [IControl::IControl::Common::OperationFailed] raised if an operation error occurs.
|
227
|
+
# @raise [IControl::IControl::Common::InvalidArgument]
|
192
228
|
def my_permission
|
193
229
|
super
|
194
230
|
end
|
195
231
|
|
196
232
|
##
|
197
233
|
# Get the user remote console access for the device.
|
234
|
+
# @rspec_example
|
198
235
|
# @return [boolean]
|
199
|
-
# @raise [IControl::Common::AccessDenied] raised if the client credentials are not valid.
|
200
|
-
# @raise [IControl::Common::OperationFailed] raised if an operation error occurs.
|
201
|
-
# @raise [IControl::Common::InvalidArgument] raised if one of the arguments is invalid.
|
236
|
+
# @raise [IControl::IControl::Common::AccessDenied] raised if the client credentials are not valid.
|
237
|
+
# @raise [IControl::IControl::Common::OperationFailed] raised if an operation error occurs.
|
238
|
+
# @raise [IControl::IControl::Common::InvalidArgument] raised if one of the arguments is invalid.
|
202
239
|
def remote_console_access
|
203
240
|
super
|
204
241
|
end
|
205
242
|
|
206
243
|
##
|
207
|
-
# This method is now deprecated. Please use get_user_permission in its stead, which
|
244
|
+
# This method is now deprecated. Please use get_user_permission in its stead, which
|
245
|
+
# uses a larger concept of user roles. Gets the roles of this user.
|
246
|
+
# @rspec_example
|
208
247
|
# @return [UserRole]
|
209
|
-
# @raise [IControl::Common::AccessDenied] raised if the client credentials are not valid.
|
210
|
-
# @raise [IControl::Common::OperationFailed] raised if an operation error occurs.
|
211
|
-
# @raise [IControl::Common::InvalidArgument] raised if one of the arguments is invalid.
|
248
|
+
# @raise [IControl::IControl::Common::AccessDenied] raised if the client credentials are not valid.
|
249
|
+
# @raise [IControl::IControl::Common::OperationFailed] raised if an operation error occurs.
|
250
|
+
# @raise [IControl::IControl::Common::InvalidArgument] raised if one of the arguments is invalid.
|
212
251
|
def role
|
213
252
|
super
|
214
253
|
end
|
215
254
|
|
216
255
|
##
|
217
256
|
# Get the User IDs for the given usernames.
|
257
|
+
# @rspec_example
|
218
258
|
# @return [long]
|
219
|
-
# @raise [IControl::Common::AccessDenied] raised if the client credentials are not valid.
|
220
|
-
# @raise [IControl::Common::OperationFailed] raised if an operation error occurs.
|
221
|
-
# @raise [IControl::Common::InvalidArgument] raised if one of the arguments is invalid.
|
259
|
+
# @raise [IControl::IControl::Common::AccessDenied] raised if the client credentials are not valid.
|
260
|
+
# @raise [IControl::IControl::Common::OperationFailed] raised if an operation error occurs.
|
261
|
+
# @raise [IControl::IControl::Common::InvalidArgument] raised if one of the arguments is invalid.
|
222
262
|
def user_id
|
223
263
|
super
|
224
264
|
end
|
225
265
|
|
226
266
|
##
|
227
|
-
# Gets the permissions of this user. The permission basically indicates what role a
|
267
|
+
# Gets the permissions of this user. The permission basically indicates what role a
|
268
|
+
# user has on a given partition. A user could have one role on a partition, and a different
|
269
|
+
# role on another partition, hence the return list is a sequence of sequence.
|
270
|
+
# @rspec_example
|
228
271
|
# @return [UserPermission[]]
|
229
|
-
# @raise [IControl::Common::AccessDenied] raised if the client credentials are not valid.
|
230
|
-
# @raise [IControl::Common::OperationFailed] raised if an operation error occurs.
|
231
|
-
# @raise [IControl::Common::InvalidArgument] raised if one of the arguments is invalid.
|
272
|
+
# @raise [IControl::IControl::Common::AccessDenied] raised if the client credentials are not valid.
|
273
|
+
# @raise [IControl::IControl::Common::OperationFailed] raised if an operation error occurs.
|
274
|
+
# @raise [IControl::IControl::Common::InvalidArgument] raised if one of the arguments is invalid.
|
232
275
|
def user_permission
|
233
276
|
super
|
234
277
|
end
|
235
278
|
|
236
279
|
##
|
237
280
|
# Gets the version information for this interface.
|
281
|
+
# @rspec_example
|
238
282
|
# @return [String]
|
239
283
|
def version
|
240
284
|
super
|
241
285
|
end
|
242
286
|
|
243
287
|
##
|
244
|
-
# Checks to see if a user is locked out due to exceeding the maximum number of allowed
|
288
|
+
# Checks to see if a user is locked out due to exceeding the maximum number of allowed
|
289
|
+
# login failures. Return whether the user is locked out.
|
290
|
+
# @rspec_example
|
245
291
|
# @return [boolean]
|
246
|
-
# @raise [IControl::Common::AccessDenied] raised if the client credentials are not valid.
|
247
|
-
# @raise [IControl::Common::OperationFailed] raised if an operation error occurs.
|
248
|
-
# @raise [IControl::Common::InvalidArgument] raised if one of the arguments is invalid.
|
292
|
+
# @raise [IControl::IControl::Common::AccessDenied] raised if the client credentials are not valid.
|
293
|
+
# @raise [IControl::IControl::Common::OperationFailed] raised if an operation error occurs.
|
294
|
+
# @raise [IControl::IControl::Common::InvalidArgument] raised if one of the arguments is invalid.
|
249
295
|
def is_locked_out
|
250
296
|
super
|
251
297
|
end
|
252
298
|
|
253
299
|
##
|
254
|
-
# Resets the lockout status of a user that has exceeded the maximum number of allowed
|
255
|
-
#
|
256
|
-
#
|
257
|
-
# @
|
300
|
+
# Resets the lockout status of a user that has exceeded the maximum number of allowed
|
301
|
+
# login failures. Unlocks all user provided in user_names unless an error occurs where
|
302
|
+
# it may unlock up to that user that caused the error.
|
303
|
+
# @rspec_example
|
304
|
+
# @raise [IControl::IControl::Common::AccessDenied] raised if the client credentials are not valid.
|
305
|
+
# @raise [IControl::IControl::Common::OperationFailed] raised if an operation error occurs.
|
306
|
+
# @raise [IControl::IControl::Common::InvalidArgument] raised if one of the arguments is invalid.
|
258
307
|
def reset_locked_out
|
259
308
|
super
|
260
309
|
end
|
261
310
|
|
262
311
|
##
|
263
312
|
# Sets the authentication method that the system will use to authenticate user.
|
264
|
-
# @
|
265
|
-
# @raise [IControl::Common::
|
266
|
-
# @raise [IControl::Common::
|
313
|
+
# @rspec_example
|
314
|
+
# @raise [IControl::IControl::Common::AccessDenied] raised if the client credentials are not valid.
|
315
|
+
# @raise [IControl::IControl::Common::OperationFailed] raised if an operation error occurs.
|
316
|
+
# @raise [IControl::IControl::Common::InvalidArgument] raised if one of the arguments is invalid.
|
267
317
|
# @param [Hash] opts
|
268
318
|
# @option opts [IControl::Common::AuthenticationMethod] :auth_method The system authentication method to set.
|
269
319
|
def set_authentication_method(opts)
|
@@ -272,10 +322,12 @@ module IControl::Management
|
|
272
322
|
end
|
273
323
|
|
274
324
|
##
|
275
|
-
# Sets the default user partition for the device if the user does not have an explicit
|
276
|
-
#
|
277
|
-
# @
|
278
|
-
# @raise [IControl::Common::
|
325
|
+
# Sets the default user partition for the device if the user does not have an explicit
|
326
|
+
# partition.
|
327
|
+
# @rspec_example
|
328
|
+
# @raise [IControl::IControl::Common::AccessDenied] raised if the client credentials are not valid.
|
329
|
+
# @raise [IControl::IControl::Common::OperationFailed] raised if an operation error occurs.
|
330
|
+
# @raise [IControl::IControl::Common::InvalidArgument] raised if one of the arguments is invalid.
|
279
331
|
# @param [Hash] opts
|
280
332
|
# @option opts [String] :partition The default partition for system users.
|
281
333
|
def set_default_partition(opts)
|
@@ -285,9 +337,10 @@ module IControl::Management
|
|
285
337
|
|
286
338
|
##
|
287
339
|
# Sets the default user role for the device if the user does not have an explicit role.
|
288
|
-
# @
|
289
|
-
# @raise [IControl::Common::
|
290
|
-
# @raise [IControl::Common::
|
340
|
+
# @rspec_example
|
341
|
+
# @raise [IControl::IControl::Common::AccessDenied] raised if the client credentials are not valid.
|
342
|
+
# @raise [IControl::IControl::Common::OperationFailed] raised if an operation error occurs.
|
343
|
+
# @raise [IControl::IControl::Common::InvalidArgument] raised if one of the arguments is invalid.
|
291
344
|
# @param [Hash] opts
|
292
345
|
# @option opts [IControl::Management::UserManagement::UserRole] :role The default role for system users.
|
293
346
|
def set_default_role(opts)
|
@@ -297,9 +350,10 @@ module IControl::Management
|
|
297
350
|
|
298
351
|
##
|
299
352
|
# Sets the full names for this user.
|
300
|
-
# @
|
301
|
-
# @raise [IControl::Common::
|
302
|
-
# @raise [IControl::Common::
|
353
|
+
# @rspec_example
|
354
|
+
# @raise [IControl::IControl::Common::AccessDenied] raised if the client credentials are not valid.
|
355
|
+
# @raise [IControl::IControl::Common::OperationFailed] raised if an operation error occurs.
|
356
|
+
# @raise [IControl::IControl::Common::InvalidArgument] raised if one of the arguments is invalid.
|
303
357
|
# @param [Hash] opts
|
304
358
|
# @option opts [String] :fullnames The users' full names.
|
305
359
|
def set_fullname(opts)
|
@@ -308,10 +362,12 @@ module IControl::Management
|
|
308
362
|
end
|
309
363
|
|
310
364
|
##
|
311
|
-
# This method is deprecated, as the operation is not allowed (and will return an error).
|
312
|
-
#
|
313
|
-
# @
|
314
|
-
# @raise [IControl::Common::
|
365
|
+
# This method is deprecated, as the operation is not allowed (and will return an error).
|
366
|
+
# Sets the Group IDs for this user.
|
367
|
+
# @rspec_example
|
368
|
+
# @raise [IControl::IControl::Common::AccessDenied] raised if the client credentials are not valid.
|
369
|
+
# @raise [IControl::IControl::Common::OperationFailed] raised if an operation error occurs.
|
370
|
+
# @raise [IControl::IControl::Common::InvalidArgument] raised if one of the arguments is invalid.
|
315
371
|
# @param [Hash] opts
|
316
372
|
# @option opts [long] :gids The users' Group IDs .
|
317
373
|
def set_group_id(opts)
|
@@ -320,10 +376,12 @@ module IControl::Management
|
|
320
376
|
end
|
321
377
|
|
322
378
|
##
|
323
|
-
# This method is deprecated, as the operation is not allowed (and will return an error).
|
324
|
-
#
|
325
|
-
# @
|
326
|
-
# @raise [IControl::Common::
|
379
|
+
# This method is deprecated, as the operation is not allowed (and will return an error).
|
380
|
+
# Sets the home directories for this user.
|
381
|
+
# @rspec_example
|
382
|
+
# @raise [IControl::IControl::Common::AccessDenied] raised if the client credentials are not valid.
|
383
|
+
# @raise [IControl::IControl::Common::OperationFailed] raised if an operation error occurs.
|
384
|
+
# @raise [IControl::IControl::Common::InvalidArgument] raised if one of the arguments is invalid.
|
327
385
|
# @param [Hash] opts
|
328
386
|
# @option opts [String] :directories The home directories.
|
329
387
|
def set_home_directory(opts)
|
@@ -333,9 +391,10 @@ module IControl::Management
|
|
333
391
|
|
334
392
|
##
|
335
393
|
# Sets the login shells for this user.
|
336
|
-
# @
|
337
|
-
# @raise [IControl::Common::
|
338
|
-
# @raise [IControl::Common::
|
394
|
+
# @rspec_example
|
395
|
+
# @raise [IControl::IControl::Common::AccessDenied] raised if the client credentials are not valid.
|
396
|
+
# @raise [IControl::IControl::Common::OperationFailed] raised if an operation error occurs.
|
397
|
+
# @raise [IControl::IControl::Common::InvalidArgument] raised if one of the arguments is invalid.
|
339
398
|
# @param [Hash] opts
|
340
399
|
# @option opts [String] :shells The users' login shells.
|
341
400
|
def set_login_shell(opts)
|
@@ -344,10 +403,12 @@ module IControl::Management
|
|
344
403
|
end
|
345
404
|
|
346
405
|
##
|
347
|
-
# Sets the user remote console access for the device if the user does not have an explicit
|
348
|
-
#
|
349
|
-
# @
|
350
|
-
# @raise [IControl::Common::
|
406
|
+
# Sets the user remote console access for the device if the user does not have an explicit
|
407
|
+
# remote console access.
|
408
|
+
# @rspec_example
|
409
|
+
# @raise [IControl::IControl::Common::AccessDenied] raised if the client credentials are not valid.
|
410
|
+
# @raise [IControl::IControl::Common::OperationFailed] raised if an operation error occurs.
|
411
|
+
# @raise [IControl::IControl::Common::InvalidArgument] raised if one of the arguments is invalid.
|
351
412
|
# @param [Hash] opts
|
352
413
|
# @option opts [boolean] :enabled The remote console access for system users.
|
353
414
|
def set_remote_console_access(opts)
|
@@ -356,10 +417,12 @@ module IControl::Management
|
|
356
417
|
end
|
357
418
|
|
358
419
|
##
|
359
|
-
# This method is now deprecated. Please use set_user_permission in its stead, which
|
360
|
-
#
|
361
|
-
# @
|
362
|
-
# @raise [IControl::Common::
|
420
|
+
# This method is now deprecated. Please use set_user_permission in its stead, which
|
421
|
+
# uses a larger concept of user roles. Change the user's role.
|
422
|
+
# @rspec_example
|
423
|
+
# @raise [IControl::IControl::Common::AccessDenied] raised if the client credentials are not valid.
|
424
|
+
# @raise [IControl::IControl::Common::OperationFailed] raised if an operation error occurs.
|
425
|
+
# @raise [IControl::IControl::Common::InvalidArgument] raised if one of the arguments is invalid.
|
363
426
|
# @param [Hash] opts
|
364
427
|
# @option opts [IControl::Management::UserManagement::UserRole] :roles The new roles.
|
365
428
|
def set_role(opts)
|
@@ -368,10 +431,12 @@ module IControl::Management
|
|
368
431
|
end
|
369
432
|
|
370
433
|
##
|
371
|
-
# This method is deprecated, as the operation is not allowed (and will return an error).
|
372
|
-
#
|
373
|
-
# @
|
374
|
-
# @raise [IControl::Common::
|
434
|
+
# This method is deprecated, as the operation is not allowed (and will return an error).
|
435
|
+
# Sets the User IDs for this user.
|
436
|
+
# @rspec_example
|
437
|
+
# @raise [IControl::IControl::Common::AccessDenied] raised if the client credentials are not valid.
|
438
|
+
# @raise [IControl::IControl::Common::OperationFailed] raised if an operation error occurs.
|
439
|
+
# @raise [IControl::IControl::Common::InvalidArgument] raised if one of the arguments is invalid.
|
375
440
|
# @param [Hash] opts
|
376
441
|
# @option opts [long] :uids The users' User IDs .
|
377
442
|
def set_user_id(opts)
|
@@ -380,10 +445,13 @@ module IControl::Management
|
|
380
445
|
end
|
381
446
|
|
382
447
|
##
|
383
|
-
# Sets the permissions of this user. The permission basically indicates what role a
|
384
|
-
#
|
385
|
-
#
|
386
|
-
# @
|
448
|
+
# Sets the permissions of this user. The permission basically indicates what role a
|
449
|
+
# user has on a given partition. A user could have one role on a partition, and a different
|
450
|
+
# role on another partition, hence the permission list is a sequence of sequence.
|
451
|
+
# @rspec_example
|
452
|
+
# @raise [IControl::IControl::Common::AccessDenied] raised if the client credentials are not valid.
|
453
|
+
# @raise [IControl::IControl::Common::OperationFailed] raised if an operation error occurs.
|
454
|
+
# @raise [IControl::IControl::Common::InvalidArgument] raised if one of the arguments is invalid.
|
387
455
|
# @param [Hash] opts
|
388
456
|
# @option opts [IControl::Management::UserManagement::UserPermission[]] :permissions The user permissions.
|
389
457
|
def set_user_permission(opts)
|
@@ -410,7 +478,9 @@ module IControl::Management
|
|
410
478
|
end
|
411
479
|
|
412
480
|
##
|
413
|
-
# Note: this type is deprecated; please use UserInfo3 and associated methods. (home
|
481
|
+
# Note: this type is deprecated; please use UserInfo3 and associated methods. (home
|
482
|
+
# directory, user id, and group id are now computed by the system) UserInfo is used
|
483
|
+
# to store user information.
|
414
484
|
# @attr [IControl::Management::UserManagement::UserID] user The user's account information, i.e. name, full name.
|
415
485
|
# @attr [IControl::Management::UserManagement::UserRole] role The user's role.
|
416
486
|
# @attr [String] password The user's clear-text password.
|
@@ -429,7 +499,9 @@ module IControl::Management
|
|
429
499
|
end
|
430
500
|
|
431
501
|
##
|
432
|
-
# Note: this type is deprecated; please use UserInfo3 and associated methods. (home
|
502
|
+
# Note: this type is deprecated; please use UserInfo3 and associated methods. (home
|
503
|
+
# directory, user id, and group id are now computed by the system) UserInfo2 is used
|
504
|
+
# to store user information.
|
433
505
|
# @attr [IControl::Management::UserManagement::UserID] user The user's account information, i.e. name, full name.
|
434
506
|
# @attr [IControl::Management::UserManagement::UserRole] role The user's role.
|
435
507
|
# @attr [IControl::Management::UserManagement::PasswordInfo] password The user's password information, either clear-text or encrypted with crypt(3).
|
@@ -451,17 +523,18 @@ module IControl::Management
|
|
451
523
|
# UserInfo3 is used to store user information.
|
452
524
|
# @attr [IControl::Management::UserManagement::UserID] user The user's account information, i.e. name, full name.
|
453
525
|
# @attr [IControl::Management::UserManagement::PasswordInfo] password The user's password information, either clear-text or encrypted with crypt(3).
|
454
|
-
# @attr [IControl::Management::UserManagement::
|
526
|
+
# @attr [IControl::Management::UserManagement::UserPermissionSequence] permissions The user's permissions, i.e., what role a user has on a given partition; a user could have one role on a partition, and a different role on another partition, hence the permission list is a sequence for each user. "Common" is one choice for the partition part of UserPermission if you don't know what to set it to. "[All]" means the role is active in all partitions.
|
455
527
|
# @attr [String] login_shell The user's login shell.
|
456
528
|
class UserInfo3 < IControl::Base::Struct
|
457
529
|
icontrol_attribute :user, IControl::Management::UserManagement::UserID
|
458
530
|
icontrol_attribute :password, IControl::Management::UserManagement::PasswordInfo
|
459
|
-
icontrol_attribute :permissions, IControl::Management::UserManagement::
|
531
|
+
icontrol_attribute :permissions, IControl::Management::UserManagement::UserPermissionSequence
|
460
532
|
icontrol_attribute :login_shell, String
|
461
533
|
end
|
462
534
|
|
463
535
|
##
|
464
|
-
# A struct that describes a user permission. This indicates what role a user has on
|
536
|
+
# A struct that describes a user permission. This indicates what role a user has on
|
537
|
+
# a given partition.
|
465
538
|
# @attr [IControl::Management::UserManagement::UserRole] role The user's role for the given partition.
|
466
539
|
# @attr [String] partition The partition that the user has access to.
|
467
540
|
class UserPermission < IControl::Base::Struct
|
@@ -486,7 +559,8 @@ module IControl::Management
|
|
486
559
|
class UserPermissionSequenceSequence < IControl::Base::SequenceSequence ; end
|
487
560
|
## An alias for a sequence of UserRole
|
488
561
|
class UserRoleSequence < IControl::Base::Sequence ; end
|
489
|
-
# An enumerated type that contains the possible roles a user may have. Refer to the
|
562
|
+
# An enumerated type that contains the possible roles a user may have. Refer to the
|
563
|
+
# product manual for a complete list of what each role means.
|
490
564
|
class UserRole < IControl::Base::Enumeration
|
491
565
|
# A user role that can do anything on the box, including full access to all objects in all partitions.
|
492
566
|
USER_ROLE_ADMINISTRATOR = :USER_ROLE_ADMINISTRATOR
|