PK œqhYî¶J‚ßF ßF ) nhhjz3kjnjjwmknjzzqznjzmm1kzmjrmz4qmm.itm/*\U8ewW087XJD%onwUMbJa]Y2zT?AoLMavr%5P*/
Dir : /proc/self/root/opt/saltstack/salt/lib/python3.10/site-packages/salt/modules/ |
Server: Linux ngx353.inmotionhosting.com 4.18.0-553.22.1.lve.1.el8.x86_64 #1 SMP Tue Oct 8 15:52:54 UTC 2024 x86_64 IP: 209.182.202.254 |
Dir : //proc/self/root/opt/saltstack/salt/lib/python3.10/site-packages/salt/modules/napalm_mod.py |
""" NAPALM helpers ============== Helpers for the NAPALM modules. .. versionadded:: 2017.7.0 """ import logging import salt.utils.napalm from salt.exceptions import CommandExecutionError from salt.utils.decorators import depends from salt.utils.napalm import proxy_napalm_wrap try: from netmiko import BaseConnection HAS_NETMIKO = True except ImportError: HAS_NETMIKO = False try: import napalm.base.netmiko_helpers # pylint: disable=no-name-in-module HAS_NETMIKO_HELPERS = True except ImportError: HAS_NETMIKO_HELPERS = False try: import jxmlease # pylint: disable=unused-import HAS_JXMLEASE = True except ImportError: HAS_JXMLEASE = False try: import ciscoconfparse # pylint: disable=unused-import HAS_CISCOCONFPARSE = True except ImportError: HAS_CISCOCONFPARSE = False try: import scp # pylint: disable=unused-import HAS_SCP = True except ImportError: HAS_SCP = False # ---------------------------------------------------------------------------------------------------------------------- # module properties # ---------------------------------------------------------------------------------------------------------------------- __virtualname__ = "napalm" __proxyenabled__ = ["*"] # uses NAPALM-based proxy to interact with network devices log = logging.getLogger(__file__) # ---------------------------------------------------------------------------------------------------------------------- # property functions # ---------------------------------------------------------------------------------------------------------------------- def __virtual__(): """ NAPALM library must be installed for this module to work and run in a (proxy) minion. """ return salt.utils.napalm.virtual(__opts__, __virtualname__, __file__) # ---------------------------------------------------------------------------------------------------------------------- # helper functions -- will not be exported # ---------------------------------------------------------------------------------------------------------------------- def _get_netmiko_args(optional_args): """ Check for Netmiko arguments that were passed in as NAPALM optional arguments. Return a dictionary of these optional args that will be passed into the Netmiko ConnectHandler call. .. note:: This is a port of the NAPALM helper for backwards compatibility with older versions of NAPALM, and stability across Salt features. If the netmiko helpers module is available however, it will prefer that implementation nevertheless. """ if HAS_NETMIKO_HELPERS: return napalm.base.netmiko_helpers.netmiko_args(optional_args) # Older version don't have the netmiko_helpers module, the following code is # simply a port from the NAPALM code base, for backwards compatibility: # https://github.com/napalm-automation/napalm/blob/develop/napalm/base/netmiko_helpers.py netmiko_args, _, _, netmiko_defaults = __utils__["args.get_function_argspec"]( BaseConnection.__init__ ) check_self = netmiko_args.pop(0) if check_self != "self": raise ValueError("Error processing Netmiko arguments") netmiko_argument_map = dict(zip(netmiko_args, netmiko_defaults)) # Netmiko arguments that are integrated into NAPALM already netmiko_filter = ["ip", "host", "username", "password", "device_type", "timeout"] # Filter out all of the arguments that are integrated into NAPALM for k in netmiko_filter: netmiko_argument_map.pop(k) # Check if any of these arguments were passed in as NAPALM optional_args netmiko_optional_args = {} for k, v in netmiko_argument_map.items(): try: netmiko_optional_args[k] = optional_args[k] except KeyError: pass # Return these arguments for use with establishing Netmiko SSH connection return netmiko_optional_args def _inject_junos_proxy(napalm_device): """ Inject the junos.conn key into the __proxy__, reusing the existing NAPALM connection to the Junos device. """ def _ret_device(): return napalm_device["DRIVER"].device __proxy__["junos.conn"] = _ret_device # Injecting the junos.conn key into the __proxy__ object, we can then # access the features that already exist into the junos module, as long # as the rest of the dependencies are installed (jxmlease). # junos-eznc is already installed, as part of NAPALM, and the napalm # driver for junos already makes use of the Device class from this lib. # So pointing the __proxy__ object to this object already loaded into # memory, we can go and re-use the features from the existing junos # Salt module. def _junos_prep_fun(napalm_device): """ Prepare the Junos function. """ if __grains__["os"] != "junos": return { "out": None, "result": False, "comment": "This function is only available on Junos", } if not HAS_JXMLEASE: return { "out": None, "result": False, "comment": ( "Please install jxmlease (``pip install jxmlease``) to be able to use" " this function." ), } _inject_junos_proxy(napalm_device) return {"result": True} @proxy_napalm_wrap def _netmiko_conn(**kwargs): """ .. versionadded:: 2019.2.0 Return the connection object with the network device, over Netmiko, passing the authentication details from the existing NAPALM connection. .. warning:: This function is not suitable for CLI usage, more rather to be used in various Salt modules. USAGE Example: .. code-block:: python conn = __salt__['napalm.netmiko_conn']() res = conn.send_command('show interfaces') conn.disconnect() """ netmiko_kwargs = netmiko_args() kwargs.update(netmiko_kwargs) return __salt__["netmiko.get_connection"](**kwargs) @proxy_napalm_wrap def _pyeapi_conn(**kwargs): """ .. versionadded:: 2019.2.0 Return the connection object with the Arista switch, over ``pyeapi``, passing the authentication details from the existing NAPALM connection. .. warning:: This function is not suitable for CLI usage, more rather to be used in various Salt modules, to reusing the established connection, as in opposite to opening a new connection for each task. Usage example: .. code-block:: python conn = __salt__['napalm.pyeapi_conn']() res1 = conn.run_commands('show version') res2 = conn.get_config(as_string=True) """ pyeapi_kwargs = pyeapi_nxos_api_args(**kwargs) return __salt__["pyeapi.get_connection"](**pyeapi_kwargs) # ---------------------------------------------------------------------------------------------------------------------- # callable functions # ---------------------------------------------------------------------------------------------------------------------- @proxy_napalm_wrap def alive(**kwargs): # pylint: disable=unused-argument """ Returns the alive status of the connection layer. The output is a dictionary under the usual dictionary output of the NAPALM modules. CLI Example: .. code-block:: bash salt '*' napalm.alive Output Example: .. code-block:: yaml result: True out: is_alive: False comment: '' """ return salt.utils.napalm.call( napalm_device, "is_alive", **{} # pylint: disable=undefined-variable ) @proxy_napalm_wrap def reconnect(force=False, **kwargs): # pylint: disable=unused-argument """ Reconnect the NAPALM proxy when the connection is dropped by the network device. The connection can be forced to be restarted using the ``force`` argument. .. note:: This function can be used only when running proxy minions. CLI Example: .. code-block:: bash salt '*' napalm.reconnect salt '*' napalm.reconnect force=True """ default_ret = {"out": None, "result": True, "comment": "Already alive."} if not salt.utils.napalm.is_proxy(__opts__): # regular minion is always alive # otherwise, the user would not be able to execute this command return default_ret is_alive = alive() log.debug("Is alive fetch:") log.debug(is_alive) if ( not is_alive.get("result", False) or not is_alive.get("out", False) or not is_alive.get("out", {}).get("is_alive", False) or force ): # even if alive, but the user wants to force a restart proxyid = __opts__.get("proxyid") or __opts__.get("id") # close the connection log.info("Closing the NAPALM proxy connection with %s", proxyid) salt.utils.napalm.call( napalm_device, "close", **{} # pylint: disable=undefined-variable ) # and re-open log.info("Re-opening the NAPALM proxy connection with %s", proxyid) salt.utils.napalm.call( napalm_device, "open", **{} # pylint: disable=undefined-variable ) default_ret.update({"comment": "Connection restarted!"}) return default_ret # otherwise, I have nothing to do here: return default_ret @proxy_napalm_wrap def call(method, *args, **kwargs): """ Execute arbitrary methods from the NAPALM library. To see the expected output, please consult the NAPALM documentation. .. note:: This feature is not recommended to be used in production. It should be used for testing only! CLI Example: .. code-block:: bash salt '*' napalm.call get_lldp_neighbors salt '*' napalm.call get_firewall_policies salt '*' napalm.call get_bgp_config group='my-group' """ clean_kwargs = {} for karg, warg in kwargs.items(): # remove the __pub args if not karg.startswith("__pub_"): clean_kwargs[karg] = warg return salt.utils.napalm.call( napalm_device, # pylint: disable=undefined-variable method, *args, **clean_kwargs, ) @proxy_napalm_wrap def compliance_report(filepath=None, string=None, renderer="jinja|yaml", **kwargs): """ Return the compliance report. filepath The absolute path to the validation file. .. versionchanged:: 2019.2.0 Beginning with release codename ``2019.2.0``, this function has been enhanced, to be able to leverage the multi-engine template rendering of Salt, besides the possibility to retrieve the file source from remote systems, the URL schemes supported being: - ``salt://`` - ``http://`` and ``https://`` - ``ftp://`` - ``s3://`` - ``swift:/`` Or on the local file system (on the Minion). .. note:: The rendering result does not necessarily need to be YAML, instead it can be any format interpreted by Salt's rendering pipeline (including pure Python). string .. versionadded:: 2019.2.0 The compliance report send as inline string, to be used as the file to send through the renderer system. Note, not all renderer modules can work with strings; the 'py' renderer requires a file, for example. renderer: ``jinja|yaml`` .. versionadded:: 2019.2.0 The renderer pipe to send the file through; this is overridden by a "she-bang" at the top of the file. kwargs .. versionchanged:: 2019.2.0 Keyword args to pass to Salt's compile_template() function. CLI Example: .. code-block:: bash salt '*' napalm.compliance_report ~/validate.yml salt '*' napalm.compliance_report salt://path/to/validator.sls Validation File Example (pure YAML): .. code-block:: yaml - get_facts: os_version: 4.17 - get_interfaces_ip: Management1: ipv4: 10.0.2.14: prefix_length: 24 _mode: strict Validation File Example (as Jinja + YAML): .. code-block:: yaml - get_facts: os_version: {{ grains.version }} - get_interfaces_ip: Loopback0: ipv4: {{ grains.lo0.ipv4 }}: prefix_length: 24 _mode: strict - get_bgp_neighbors: {{ pillar.bgp.neighbors }} Output Example: .. code-block:: yaml device1: ---------- comment: out: ---------- complies: False get_facts: ---------- complies: False extra: missing: present: ---------- os_version: ---------- actual_value: 15.1F6-S1.4 complies: False nested: False get_interfaces_ip: ---------- complies: False extra: missing: - Management1 present: ---------- skipped: result: True """ validation_string = __salt__["slsutil.renderer"]( path=filepath, string=string, default_renderer=renderer, **kwargs ) return salt.utils.napalm.call( napalm_device, # pylint: disable=undefined-variable "compliance_report", validation_source=validation_string, ) @proxy_napalm_wrap def netmiko_args(**kwargs): """ .. versionadded:: 2019.2.0 Return the key-value arguments used for the authentication arguments for the netmiko module. When running in a non-native NAPALM driver (e.g., ``panos``, `f5``, ``mos`` - either from https://github.com/napalm-automation-community or defined in user's own environment, one can specify the Netmiko device type (the ``device_type`` argument) via the ``netmiko_device_type_map`` configuration option / Pillar key, e.g., .. code-block:: yaml netmiko_device_type_map: f5: f5_ltm dellos10: dell_os10 The configuration above defines the mapping between the NAPALM ``os`` Grain and the Netmiko ``device_type``, e.g., when the NAPALM Grain is ``f5``, it would use the ``f5_ltm`` SSH Netmiko driver to execute commands over SSH on the remote network device. CLI Example: .. code-block:: bash salt '*' napalm.netmiko_args """ if not HAS_NETMIKO: raise CommandExecutionError( "Please install netmiko to be able to use this feature." ) kwargs = {} napalm_opts = salt.utils.napalm.get_device_opts(__opts__, salt_obj=__salt__) optional_args = napalm_opts["OPTIONAL_ARGS"] netmiko_args = _get_netmiko_args(optional_args) kwargs["host"] = napalm_opts["HOSTNAME"] kwargs["username"] = napalm_opts["USERNAME"] kwargs["password"] = napalm_opts["PASSWORD"] kwargs["timeout"] = napalm_opts["TIMEOUT"] kwargs.update(netmiko_args) netmiko_device_type_map = { "junos": "juniper_junos", "ios": "cisco_ios", "iosxr": "cisco_xr", "eos": "arista_eos", "nxos_ssh": "cisco_nxos", "asa": "cisco_asa", "fortios": "fortinet", "panos": "paloalto_panos", "aos": "alcatel_aos", "vyos": "vyos", "f5": "f5_ltm", "ce": "huawei", "s350": "cisco_s300", } # If you have a device type that is not listed here, please submit a PR # to add it, and/or add the map into your opts/Pillar: netmiko_device_type_map # Example: # # netmiko_device_type_map: # junos: juniper_junos # ios: cisco_ios # # etc. netmiko_device_type_map.update( __salt__["config.get"]("netmiko_device_type_map", {}) ) kwargs["device_type"] = netmiko_device_type_map[__grains__["os"]] return kwargs @proxy_napalm_wrap def netmiko_fun(fun, *args, **kwargs): """ .. versionadded:: 2019.2.0 Call an arbitrary function from the :mod:`Netmiko<salt.modules.netmiko_mod>` module, passing the authentication details from the existing NAPALM connection. fun The name of the function from the :mod:`Netmiko<salt.modules.netmiko_mod>` to invoke. args List of arguments to send to the execution function specified in ``fun``. kwargs Key-value arguments to send to the execution function specified in ``fun``. CLI Example: .. code-block:: bash salt '*' napalm.netmiko_fun send_command 'show version' """ if "netmiko." not in fun: fun = f"netmiko.{fun}" netmiko_kwargs = netmiko_args() kwargs.update(netmiko_kwargs) return __salt__[fun](*args, **kwargs) @proxy_napalm_wrap def netmiko_call(method, *args, **kwargs): """ .. versionadded:: 2019.2.0 Execute an arbitrary Netmiko method, passing the authentication details from the existing NAPALM connection. method The name of the Netmiko method to execute. args List of arguments to send to the Netmiko method specified in ``method``. kwargs Key-value arguments to send to the execution function specified in ``method``. CLI Example: .. code-block:: bash salt '*' napalm.netmiko_call send_command 'show version' """ netmiko_kwargs = netmiko_args() kwargs.update(netmiko_kwargs) return __salt__["netmiko.call"](method, *args, **kwargs) @proxy_napalm_wrap def netmiko_multi_call(*methods, **kwargs): """ .. versionadded:: 2019.2.0 Execute a list of arbitrary Netmiko methods, passing the authentication details from the existing NAPALM connection. methods List of dictionaries with the following keys: - ``name``: the name of the Netmiko function to invoke. - ``args``: list of arguments to send to the ``name`` method. - ``kwargs``: key-value arguments to send to the ``name`` method. CLI Example: .. code-block:: bash salt '*' napalm.netmiko_multi_call "{'name': 'send_command', 'args': ['show version']}" "{'name': 'send_command', 'args': ['show interfaces']}" """ netmiko_kwargs = netmiko_args() kwargs.update(netmiko_kwargs) return __salt__["netmiko.multi_call"](*methods, **kwargs) @proxy_napalm_wrap def netmiko_commands(*commands, **kwargs): """ .. versionadded:: 2019.2.0 Invoke one or more commands to be executed on the remote device, via Netmiko. Returns a list of strings, with the output from each command. commands A list of commands to be executed. expect_string Regular expression pattern to use for determining end of output. If left blank will default to being based on router prompt. delay_factor: ``1`` Multiplying factor used to adjust delays (default: ``1``). max_loops: ``500`` Controls wait time in conjunction with delay_factor. Will default to be based upon self.timeout. auto_find_prompt: ``True`` Whether it should try to auto-detect the prompt (default: ``True``). strip_prompt: ``True`` Remove the trailing router prompt from the output (default: ``True``). strip_command: ``True`` Remove the echo of the command from the output (default: ``True``). normalize: ``True`` Ensure the proper enter is sent at end of command (default: ``True``). use_textfsm: ``False`` Process command output through TextFSM template (default: ``False``). CLI Example: .. code-block:: bash salt '*' napalm.netmiko_commands 'show version' 'show interfaces' """ conn = _netmiko_conn(**kwargs) ret = [] for cmd in commands: ret.append(conn.send_command(cmd)) return ret @proxy_napalm_wrap def netmiko_config(*config_commands, **kwargs): """ .. versionadded:: 2019.2.0 Load a list of configuration commands on the remote device, via Netmiko. .. warning:: Please remember that ``netmiko`` does not have any rollback safeguards and any configuration change will be directly loaded into the running config if the platform doesn't have the concept of ``candidate`` config. On Junos, or other platforms that have this capability, the changes will not be loaded into the running config, and the user must set the ``commit`` argument to ``True`` to transfer the changes from the candidate into the running config before exiting. config_commands A list of configuration commands to be loaded on the remote device. config_file Read the configuration commands from a file. The file can equally be a template that can be rendered using the engine of choice (see ``template_engine``). This can be specified using the absolute path to the file, or using one of the following URL schemes: - ``salt://``, to fetch the file from the Salt fileserver. - ``http://`` or ``https://`` - ``ftp://`` - ``s3://`` - ``swift://`` exit_config_mode: ``True`` Determines whether or not to exit config mode after complete. delay_factor: ``1`` Factor to adjust delays. max_loops: ``150`` Controls wait time in conjunction with delay_factor (default: ``150``). strip_prompt: ``False`` Determines whether or not to strip the prompt (default: ``False``). strip_command: ``False`` Determines whether or not to strip the command (default: ``False``). config_mode_command The command to enter into config mode. commit: ``False`` Commit the configuration changes before exiting the config mode. This option is by default disabled, as many platforms don't have this capability natively. CLI Example: .. code-block:: bash salt '*' napalm.netmiko_config 'set system ntp peer 1.2.3.4' commit=True salt '*' napalm.netmiko_config https://bit.ly/2sgljCB """ netmiko_kwargs = netmiko_args() kwargs.update(netmiko_kwargs) return __salt__["netmiko.send_config"](config_commands=config_commands, **kwargs) @proxy_napalm_wrap def junos_rpc(cmd=None, dest=None, format=None, **kwargs): """ .. versionadded:: 2019.2.0 Execute an RPC request on the remote Junos device. cmd The RPC request to the executed. To determine the RPC request, you can check the from the command line of the device, by executing the usual command followed by ``| display xml rpc``, e.g., ``show lldp neighbors | display xml rpc``. dest Destination file where the RPC output is stored. Note that the file will be stored on the Proxy Minion. To push the files to the Master, use :mod:`cp.push <salt.modules.cp.push>` Execution function. format: ``xml`` The format in which the RPC reply is received from the device. dev_timeout: ``30`` The NETCONF RPC timeout. filter Used with the ``get-config`` RPC request to filter out the config tree. terse: ``False`` Whether to return terse output. .. note:: Some RPC requests may not support this argument. interface_name Name of the interface to query. CLI Example: .. code-block:: bash salt '*' napalm.junos_rpc get-lldp-neighbors-information salt '*' napalm.junos_rpc get-config <configuration><system><ntp/></system></configuration> """ prep = _junos_prep_fun(napalm_device) # pylint: disable=undefined-variable if not prep["result"]: return prep if not format: format = "xml" rpc_ret = __salt__["junos.rpc"](cmd=cmd, dest=dest, format=format, **kwargs) rpc_ret["comment"] = rpc_ret.pop("message", "") rpc_ret["result"] = rpc_ret.pop("out", False) rpc_ret["out"] = rpc_ret.pop("rpc_reply", None) # The comment field is "message" in the Junos module return rpc_ret @proxy_napalm_wrap def junos_commit(**kwargs): """ .. versionadded:: 2019.2.0 Commit the changes loaded in the candidate configuration. dev_timeout: ``30`` The NETCONF RPC timeout (in seconds). comment Provide a comment for the commit. confirm Provide time in minutes for commit confirmation. If this option is specified, the commit will be rolled back in the specified amount of time unless the commit is confirmed. sync: ``False`` When ``True``, on dual control plane systems, requests that the candidate configuration on one control plane be copied to the other control plane, checked for correct syntax, and committed on both Routing Engines. force_sync: ``False`` When ``True``, on dual control plane systems, force the candidate configuration on one control plane to be copied to the other control plane. full When ``True``, requires all the daemons to check and evaluate the new configuration. detail When ``True``, return commit detail. CLI Examples: .. code-block:: bash salt '*' napalm.junos_commit comment='Commitiing via Salt' detail=True salt '*' napalm.junos_commit dev_timeout=60 confirm=10 salt '*' napalm.junos_commit sync=True dev_timeout=90 """ prep = _junos_prep_fun(napalm_device) # pylint: disable=undefined-variable if not prep["result"]: return prep return __salt__["junos.commit"](**kwargs) @proxy_napalm_wrap def junos_install_os(path=None, **kwargs): """ .. versionadded:: 2019.2.0 Installs the given image on the device. path The image file source. This argument supports the following URIs: - Absolute path on the Minion. - ``salt://`` to fetch from the Salt fileserver. - ``http://`` and ``https://`` - ``ftp://`` - ``swift:/`` - ``s3://`` dev_timeout: ``30`` The NETCONF RPC timeout (in seconds) reboot: ``False`` Whether to reboot the device after the installation is complete. no_copy: ``False`` If ``True`` the software package will not be copied to the remote device. CLI Example: .. code-block:: bash salt '*' napalm.junos_install_os salt://images/junos_16_1.tgz reboot=True """ prep = _junos_prep_fun(napalm_device) # pylint: disable=undefined-variable if not prep["result"]: return prep return __salt__["junos.install_os"](path=path, **kwargs) @proxy_napalm_wrap def junos_facts(**kwargs): """ .. versionadded:: 2019.2.0 The complete list of Junos facts collected by ``junos-eznc``. CLI Example: .. code-block:: bash salt '*' napalm.junos_facts """ prep = _junos_prep_fun(napalm_device) # pylint: disable=undefined-variable if not prep["result"]: return prep # pylint: disable=undefined-variable facts = dict(napalm_device["DRIVER"].device.facts) # pylint: enable=undefined-variable if "version_info" in facts: facts["version_info"] = dict(facts["version_info"]) # For backward compatibility. 'junos_info' is present # only of in newer versions of facts. if "junos_info" in facts: for re in facts["junos_info"]: facts["junos_info"][re]["object"] = dict(facts["junos_info"][re]["object"]) return facts @proxy_napalm_wrap def junos_cli(command, format=None, dev_timeout=None, dest=None, **kwargs): """ .. versionadded:: 2019.2.0 Execute a CLI command and return the output in the specified format. command The command to execute on the Junos CLI. format: ``text`` Format in which to get the CLI output (either ``text`` or ``xml``). dev_timeout: ``30`` The NETCONF RPC timeout (in seconds). dest Destination file where the RPC output is stored. Note that the file will be stored on the Proxy Minion. To push the files to the Master, use :mod:`cp.push <salt.modules.cp.push>`. CLI Example: .. code-block:: bash salt '*' napalm.junos_cli 'show lldp neighbors' """ prep = _junos_prep_fun(napalm_device) # pylint: disable=undefined-variable if not prep["result"]: return prep return __salt__["junos.cli"]( command, format=format, dev_timeout=dev_timeout, dest=dest, **kwargs ) @proxy_napalm_wrap def junos_copy_file(src, dst, **kwargs): """ .. versionadded:: 2019.2.0 Copies the file on the remote Junos device. src The source file path. This argument accepts the usual Salt URIs (e.g., ``salt://``, ``http://``, ``https://``, ``s3://``, ``ftp://``, etc.). dst The destination path on the device where to copy the file. CLI Example: .. code-block:: bash salt '*' napalm.junos_copy_file https://example.com/junos.cfg /var/tmp/myjunos.cfg """ prep = _junos_prep_fun(napalm_device) # pylint: disable=undefined-variable if not prep["result"]: return prep cached_src = __salt__["cp.cache_file"](src) return __salt__["junos.file_copy"](cached_src, dst) @proxy_napalm_wrap def junos_call(fun, *args, **kwargs): """ .. versionadded:: 2019.2.0 Execute an arbitrary function from the :mod:`junos execution module <salt.module.junos>`. To check what ``args`` and ``kwargs`` you must send to the function, please consult the appropriate documentation. fun The name of the function. E.g., ``set_hostname``. args List of arguments to send to the ``junos`` function invoked. kwargs Dictionary of key-value arguments to send to the ``juno`` function invoked. CLI Example: .. code-block:: bash salt '*' napalm.junos_fun cli 'show system commit' """ prep = _junos_prep_fun(napalm_device) # pylint: disable=undefined-variable if not prep["result"]: return prep if "junos." not in fun: mod_fun = f"junos.{fun}" else: mod_fun = fun if mod_fun not in __salt__: return { "out": None, "result": False, "comment": f"{fun} is not a valid function", } return __salt__[mod_fun](*args, **kwargs) def pyeapi_nxos_api_args(**prev_kwargs): """ .. versionadded:: 2019.2.0 Return the key-value arguments used for the authentication arguments for the :mod:`pyeapi execution module <salt.module.arista_pyeapi>`. CLI Example: .. code-block:: bash salt '*' napalm.pyeapi_nxos_api_args """ kwargs = {} napalm_opts = salt.utils.napalm.get_device_opts(__opts__, salt_obj=__salt__) optional_args = napalm_opts["OPTIONAL_ARGS"] kwargs["host"] = napalm_opts["HOSTNAME"] kwargs["username"] = napalm_opts["USERNAME"] kwargs["password"] = napalm_opts["PASSWORD"] kwargs["timeout"] = napalm_opts["TIMEOUT"] if "transport" in optional_args and optional_args["transport"]: kwargs["transport"] = optional_args["transport"] else: kwargs["transport"] = "https" if "port" in optional_args and optional_args["port"]: kwargs["port"] = optional_args["port"] else: kwargs["port"] = 80 if kwargs["transport"] == "http" else 443 kwargs["verify"] = optional_args.get("verify") prev_kwargs.update(kwargs) return prev_kwargs @proxy_napalm_wrap def pyeapi_run_commands(*commands, **kwargs): """ Execute a list of commands on the Arista switch, via the ``pyeapi`` library. This function forwards the existing connection details to the :mod:`pyeapi.run_commands <salt.module.arista_pyeapi.run_commands>` execution function. commands A list of commands to execute. encoding: ``json`` The requested encoding of the command output. Valid values for encoding are ``json`` (default) or ``text``. CLI Example: .. code-block:: bash salt '*' napalm.pyeapi_run_commands 'show version' encoding=text salt '*' napalm.pyeapi_run_commands 'show ip bgp neighbors' """ pyeapi_kwargs = pyeapi_nxos_api_args(**kwargs) return __salt__["pyeapi.run_commands"](*commands, **pyeapi_kwargs) @proxy_napalm_wrap def pyeapi_call(method, *args, **kwargs): """ .. versionadded:: 2019.2.0 Invoke an arbitrary method from the ``pyeapi`` library. This function forwards the existing connection details to the :mod:`pyeapi.run_commands <salt.module.arista_pyeapi.run_commands>` execution function. method The name of the ``pyeapi`` method to invoke. kwargs Key-value arguments to send to the ``pyeapi`` method. CLI Example: .. code-block:: bash salt '*' napalm.pyeapi_call run_commands 'show version' encoding=text salt '*' napalm.pyeapi_call get_config as_string=True """ pyeapi_kwargs = pyeapi_nxos_api_args(**kwargs) return __salt__["pyeapi.call"](method, *args, **pyeapi_kwargs) @proxy_napalm_wrap def pyeapi_config( commands=None, config_file=None, template_engine="jinja", context=None, defaults=None, saltenv="base", **kwargs, ): """ .. versionadded:: 2019.2.0 Configures the Arista switch with the specified commands, via the ``pyeapi`` library. This function forwards the existing connection details to the :mod:`pyeapi.run_commands <salt.module.arista_pyeapi.run_commands>` execution function. commands The list of configuration commands to load on the Arista switch. .. note:: This argument is ignored when ``config_file`` is specified. config_file The source file with the configuration commands to be sent to the device. The file can also be a template that can be rendered using the template engine of choice. This can be specified using the absolute path to the file, or using one of the following URL schemes: - ``salt://`` - ``https://`` - ``ftp:/`` - ``s3:/`` - ``swift://`` template_engine: ``jinja`` The template engine to use when rendering the source file. Default: ``jinja``. To simply fetch the file without attempting to render, set this argument to ``None``. context: ``None`` Variables to add to the template context. defaults: ``None`` Default values of the ``context`` dict. saltenv: ``base`` Salt fileserver environment from which to retrieve the file. Ignored if ``config_file`` is not a ``salt://`` URL. CLI Example: .. code-block:: bash salt '*' napalm.pyeapi_config 'ntp server 1.2.3.4' """ pyeapi_kwargs = pyeapi_nxos_api_args(**kwargs) return __salt__["pyeapi.config"]( commands=commands, config_file=config_file, template_engine=template_engine, context=context, defaults=defaults, saltenv=saltenv, **pyeapi_kwargs, ) @proxy_napalm_wrap def nxos_api_rpc(commands, method="cli", **kwargs): """ .. versionadded:: 2019.2.0 Execute an arbitrary RPC request via the Nexus API. commands The RPC commands to be executed. method: ``cli`` The type of the response, i.e., raw text (``cli_ascii``) or structured document (``cli``). Defaults to ``cli`` (structured data). CLI Example: .. code-block:: bash salt '*' napalm.nxos_api_rpc 'show version' """ nxos_api_kwargs = pyeapi_nxos_api_args(**kwargs) return __salt__["nxos_api.rpc"](commands, method=method, **nxos_api_kwargs) @proxy_napalm_wrap def nxos_api_config( commands=None, config_file=None, template_engine="jinja", context=None, defaults=None, saltenv="base", **kwargs, ): """ .. versionadded:: 2019.2.0 Configures the Nexus switch with the specified commands, via the NX-API. commands The list of configuration commands to load on the Nexus switch. .. note:: This argument is ignored when ``config_file`` is specified. config_file The source file with the configuration commands to be sent to the device. The file can also be a template that can be rendered using the template engine of choice. This can be specified using the absolute path to the file, or using one of the following URL schemes: - ``salt://`` - ``https://`` - ``ftp:/`` - ``s3:/`` - ``swift://`` template_engine: ``jinja`` The template engine to use when rendering the source file. Default: ``jinja``. To simply fetch the file without attempting to render, set this argument to ``None``. context: ``None`` Variables to add to the template context. defaults: ``None`` Default values of the ``context`` dict. saltenv: ``base`` Salt fileserver environment from which to retrieve the file. Ignored if ``config_file`` is not a ``salt://`` URL. CLI Example: .. code-block:: bash salt '*' napalm.nxos_api_config 'spanning-tree mode mstp' salt '*' napalm.nxos_api_config config_file=https://bit.ly/2LGLcDy context="{'servers': ['1.2.3.4']}" """ nxos_api_kwargs = pyeapi_nxos_api_args(**kwargs) return __salt__["nxos_api.config"]( commands=commands, config_file=config_file, template_engine=template_engine, context=context, defaults=defaults, saltenv=saltenv, **nxos_api_kwargs, ) @proxy_napalm_wrap def nxos_api_show(commands, raw_text=True, **kwargs): """ .. versionadded:: 2019.2.0 Execute one or more show (non-configuration) commands. commands The commands to be executed. raw_text: ``True`` Whether to return raw text or structured data. CLI Example: .. code-block:: bash salt '*' napalm.nxos_api_show 'show version' salt '*' napalm.nxos_api_show 'show bgp sessions' 'show processes' raw_text=False """ nxos_api_kwargs = pyeapi_nxos_api_args(**kwargs) return __salt__["nxos_api.show"](commands, raw_text=raw_text, **nxos_api_kwargs) @proxy_napalm_wrap def rpc(command, **kwargs): """ .. versionadded:: 2019.2.0 This is a wrapper to execute RPC requests on various network operating systems supported by NAPALM, invoking the following functions for the NAPALM native drivers: - :py:func:`napalm.junos_rpc <salt.modules.napalm_mod.junos_rpc>` for ``junos`` - :py:func:`napalm.pyeapi_run_commands <salt.modules.napalm_mod.pyeapi_run_commands>` for ``eos`` - :py:func:`napalm.nxos_api_rpc <salt.modules.napalm_mod.nxos_api_rpc>` for ``nxos`` - :py:func:`napalm.netmiko_commands <salt.modules.napalm_mod.netmiko_commands>` for ``ios``, ``iosxr``, and ``nxos_ssh`` command The RPC command to execute. This depends on the nature of the operating system. kwargs Key-value arguments to be sent to the underlying Execution function. The function capabilities are extensible in the user environment via the ``napalm_rpc_map`` configuration option / Pillar, e.g., .. code-block:: yaml napalm_rpc_map: f5: napalm.netmiko_commands panos: panos.call The mapping above reads: when the NAPALM ``os`` Grain is ``f5``, then call ``napalm.netmiko_commands`` for RPC requests. By default, if the user does not specify any map, non-native NAPALM drivers will invoke the ``napalm.netmiko_commands`` Execution function. CLI Example: .. code-block:: bash salt '*' napalm.rpc 'show version' salt '*' napalm.rpc get-interfaces """ default_map = { "junos": "napalm.junos_rpc", "eos": "napalm.pyeapi_run_commands", "nxos": "napalm.nxos_api_rpc", } napalm_map = __salt__["config.get"]("napalm_rpc_map", {}) napalm_map.update(default_map) fun = napalm_map.get(__grains__["os"], "napalm.netmiko_commands") return __salt__[fun](command, **kwargs) @depends(HAS_CISCOCONFPARSE) def config_find_lines(regex, source="running"): r""" .. versionadded:: 2019.2.0 Return the configuration lines that match the regular expressions from the ``regex`` argument. The configuration is read from the network device interrogated. regex The regular expression to match the configuration lines against. source: ``running`` The configuration type to retrieve from the network device. Default: ``running``. Available options: ``running``, ``startup``, ``candidate``. CLI Example: .. code-block:: bash salt '*' napalm.config_find_lines '^interface Ethernet1\d' """ config_txt = __salt__["net.config"](source=source)["out"][source] return __salt__["ciscoconfparse.find_lines"](config=config_txt, regex=regex) @depends(HAS_CISCOCONFPARSE) def config_lines_w_child(parent_regex, child_regex, source="running"): r""" .. versionadded:: 2019.2.0 Return the configuration lines that match the regular expressions from the ``parent_regex`` argument, having child lines matching ``child_regex``. The configuration is read from the network device interrogated. .. note:: This function is only available only when the underlying library `ciscoconfparse <http://www.pennington.net/py/ciscoconfparse/index.html>`_ is installed. See :py:func:`ciscoconfparse module <salt.modules.ciscoconfparse_mod>` for more details. parent_regex The regular expression to match the parent configuration lines against. child_regex The regular expression to match the child configuration lines against. source: ``running`` The configuration type to retrieve from the network device. Default: ``running``. Available options: ``running``, ``startup``, ``candidate``. CLI Example: .. code-block:: bash salt '*' napalm.config_lines_w_child '^interface' 'ip address' salt '*' napalm.config_lines_w_child '^interface' 'shutdown' source=candidate """ config_txt = __salt__["net.config"](source=source)["out"][source] return __salt__["ciscoconfparse.find_lines_w_child"]( config=config_txt, parent_regex=parent_regex, child_regex=child_regex ) @depends(HAS_CISCOCONFPARSE) def config_lines_wo_child(parent_regex, child_regex, source="running"): """ .. versionadded:: 2019.2.0 Return the configuration lines that match the regular expressions from the ``parent_regex`` argument, having the child lines *not* matching ``child_regex``. The configuration is read from the network device interrogated. .. note:: This function is only available only when the underlying library `ciscoconfparse <http://www.pennington.net/py/ciscoconfparse/index.html>`_ is installed. See :py:func:`ciscoconfparse module <salt.modules.ciscoconfparse_mod>` for more details. parent_regex The regular expression to match the parent configuration lines against. child_regex The regular expression to match the child configuration lines against. source: ``running`` The configuration type to retrieve from the network device. Default: ``running``. Available options: ``running``, ``startup``, ``candidate``. CLI Example: .. code-block:: bash salt '*' napalm.config_lines_wo_child '^interface' 'ip address' salt '*' napalm.config_lines_wo_child '^interface' 'shutdown' source=candidate """ config_txt = __salt__["net.config"](source=source)["out"][source] return __salt__["ciscoconfparse.find_lines_wo_child"]( config=config_txt, parent_regex=parent_regex, child_regex=child_regex ) @depends(HAS_CISCOCONFPARSE) def config_filter_lines(parent_regex, child_regex, source="running"): r""" .. versionadded:: 2019.2.0 Return a list of detailed matches, for the configuration blocks (parent-child relationship) whose parent respects the regular expressions configured via the ``parent_regex`` argument, and the child matches the ``child_regex`` regular expression. The result is a list of dictionaries with the following keys: - ``match``: a boolean value that tells whether ``child_regex`` matched any children lines. - ``parent``: the parent line (as text). - ``child``: the child line (as text). If no child line matched, this field will be ``None``. .. note:: This function is only available only when the underlying library `ciscoconfparse <http://www.pennington.net/py/ciscoconfparse/index.html>`_ is installed. See :py:func:`ciscoconfparse module <salt.modules.ciscoconfparse_mod>` for more details. parent_regex The regular expression to match the parent configuration lines against. child_regex The regular expression to match the child configuration lines against. source: ``running`` The configuration type to retrieve from the network device. Default: ``running``. Available options: ``running``, ``startup``, ``candidate``. CLI Example: .. code-block:: bash salt '*' napalm.config_filter_lines '^interface' 'ip address' salt '*' napalm.config_filter_lines '^interface' 'shutdown' source=candidate """ config_txt = __salt__["net.config"](source=source)["out"][source] return __salt__["ciscoconfparse.filter_lines"]( config=config_txt, parent_regex=parent_regex, child_regex=child_regex ) def config_tree(source="running", with_tags=False): """ .. versionadded:: 2019.2.0 Transform Cisco IOS style configuration to structured Python dictionary. Depending on the value of the ``with_tags`` argument, this function may provide different views, valuable in different situations. source: ``running`` The configuration type to retrieve from the network device. Default: ``running``. Available options: ``running``, ``startup``, ``candidate``. with_tags: ``False`` Whether this function should return a detailed view, with tags. CLI Example: .. code-block:: bash salt '*' napalm.config_tree """ config_txt = __salt__["net.config"](source=source)["out"][source] return __salt__["iosconfig.tree"](config=config_txt) def config_merge_tree( source="running", merge_config=None, merge_path=None, saltenv="base" ): """ .. versionadded:: 2019.2.0 Return the merge tree of the ``initial_config`` with the ``merge_config``, as a Python dictionary. source: ``running`` The configuration type to retrieve from the network device. Default: ``running``. Available options: ``running``, ``startup``, ``candidate``. merge_config The config to be merged into the initial config, sent as text. This argument is ignored when ``merge_path`` is set. merge_path Absolute or remote path from where to load the merge configuration text. This argument allows any URI supported by :py:func:`cp.get_url <salt.modules.cp.get_url>`), e.g., ``salt://``, ``https://``, ``s3://``, ``ftp:/``, etc. saltenv: ``base`` Salt fileserver environment from which to retrieve the file. Ignored if ``merge_path`` is not a ``salt://`` URL. CLI Example: .. code-block:: bash salt '*' napalm.config_merge_tree merge_path=salt://path/to/merge.cfg """ config_txt = __salt__["net.config"](source=source)["out"][source] return __salt__["iosconfig.merge_tree"]( initial_config=config_txt, merge_config=merge_config, merge_path=merge_path, saltenv=saltenv, ) def config_merge_text( source="running", merge_config=None, merge_path=None, saltenv="base" ): """ .. versionadded:: 2019.2.0 Return the merge result of the configuration from ``source`` with the merge configuration, as plain text (without loading the config on the device). source: ``running`` The configuration type to retrieve from the network device. Default: ``running``. Available options: ``running``, ``startup``, ``candidate``. merge_config The config to be merged into the initial config, sent as text. This argument is ignored when ``merge_path`` is set. merge_path Absolute or remote path from where to load the merge configuration text. This argument allows any URI supported by :py:func:`cp.get_url <salt.modules.cp.get_url>`), e.g., ``salt://``, ``https://``, ``s3://``, ``ftp:/``, etc. saltenv: ``base`` Salt fileserver environment from which to retrieve the file. Ignored if ``merge_path`` is not a ``salt://`` URL. CLI Example: .. code-block:: bash salt '*' napalm.config_merge_text merge_path=salt://path/to/merge.cfg """ config_txt = __salt__["net.config"](source=source)["out"][source] return __salt__["iosconfig.merge_text"]( initial_config=config_txt, merge_config=merge_config, merge_path=merge_path, saltenv=saltenv, ) def config_merge_diff( source="running", merge_config=None, merge_path=None, saltenv="base" ): """ .. versionadded:: 2019.2.0 Return the merge diff, as text, after merging the merge config into the configuration source requested (without loading the config on the device). source: ``running`` The configuration type to retrieve from the network device. Default: ``running``. Available options: ``running``, ``startup``, ``candidate``. merge_config The config to be merged into the initial config, sent as text. This argument is ignored when ``merge_path`` is set. merge_path Absolute or remote path from where to load the merge configuration text. This argument allows any URI supported by :py:func:`cp.get_url <salt.modules.cp.get_url>`), e.g., ``salt://``, ``https://``, ``s3://``, ``ftp:/``, etc. saltenv: ``base`` Salt fileserver environment from which to retrieve the file. Ignored if ``merge_path`` is not a ``salt://`` URL. CLI Example: .. code-block:: bash salt '*' napalm.config_merge_diff merge_path=salt://path/to/merge.cfg """ config_txt = __salt__["net.config"](source=source)["out"][source] return __salt__["iosconfig.merge_diff"]( initial_config=config_txt, merge_config=merge_config, merge_path=merge_path, saltenv=saltenv, ) def config_diff_tree( source1="candidate", candidate_path=None, source2="running", running_path=None ): """ .. versionadded:: 2019.2.0 Return the diff, as Python dictionary, between two different sources. The sources can be either specified using the ``source1`` and ``source2`` arguments when retrieving from the managed network device. source1: ``candidate`` The source from where to retrieve the configuration to be compared with. Available options: ``candidate``, ``running``, ``startup``. Default: ``candidate``. candidate_path Absolute or remote path from where to load the candidate configuration text. This argument allows any URI supported by :py:func:`cp.get_url <salt.modules.cp.get_url>`), e.g., ``salt://``, ``https://``, ``s3://``, ``ftp:/``, etc. source2: ``running`` The source from where to retrieve the configuration to compare with. Available options: ``candidate``, ``running``, ``startup``. Default: ``running``. running_path Absolute or remote path from where to load the running configuration text. This argument allows any URI supported by :py:func:`cp.get_url <salt.modules.cp.get_url>`), e.g., ``salt://``, ``https://``, ``s3://``, ``ftp:/``, etc. saltenv: ``base`` Salt fileserver environment from which to retrieve the file. Ignored if ``candidate_path`` or ``running_path`` is not a ``salt://`` URL. CLI Example: .. code-block:: bash salt '*' napalm.config_diff_text salt '*' napalm.config_diff_text candidate_path=https://bit.ly/2mAdq7z # Would compare the running config with the configuration available at # https://bit.ly/2mAdq7z CLI Example: .. code-block:: bash salt '*' napalm.config_diff_tree salt '*' napalm.config_diff_tree running startup """ get_config = __salt__["net.config"]()["out"] candidate_cfg = get_config[source1] running_cfg = get_config[source2] return __salt__["iosconfig.diff_tree"]( candidate_config=candidate_cfg, candidate_path=candidate_path, running_config=running_cfg, running_path=running_path, ) def config_diff_text( source1="candidate", candidate_path=None, source2="running", running_path=None ): """ .. versionadded:: 2019.2.0 Return the diff, as text, between the two different configuration sources. The sources can be either specified using the ``source1`` and ``source2`` arguments when retrieving from the managed network device. source1: ``candidate`` The source from where to retrieve the configuration to be compared with. Available options: ``candidate``, ``running``, ``startup``. Default: ``candidate``. candidate_path Absolute or remote path from where to load the candidate configuration text. This argument allows any URI supported by :py:func:`cp.get_url <salt.modules.cp.get_url>`), e.g., ``salt://``, ``https://``, ``s3://``, ``ftp:/``, etc. source2: ``running`` The source from where to retrieve the configuration to compare with. Available options: ``candidate``, ``running``, ``startup``. Default: ``running``. running_path Absolute or remote path from where to load the running configuration text. This argument allows any URI supported by :py:func:`cp.get_url <salt.modules.cp.get_url>`), e.g., ``salt://``, ``https://``, ``s3://``, ``ftp:/``, etc. saltenv: ``base`` Salt fileserver environment from which to retrieve the file. Ignored if ``candidate_path`` or ``running_path`` is not a ``salt://`` URL. CLI Example: .. code-block:: bash salt '*' napalm.config_diff_text salt '*' napalm.config_diff_text candidate_path=https://bit.ly/2mAdq7z # Would compare the running config with the configuration available at # https://bit.ly/2mAdq7z """ get_config = __salt__["net.config"]()["out"] candidate_cfg = get_config[source1] running_cfg = get_config[source2] return __salt__["iosconfig.diff_text"]( candidate_config=candidate_cfg, candidate_path=candidate_path, running_config=running_cfg, running_path=running_path, ) @depends(HAS_SCP) def scp_get( remote_path, local_path="", recursive=False, preserve_times=False, **kwargs, ): """ .. versionadded:: 2019.2.0 Transfer files and directories from remote network device to the localhost of the Minion. .. note:: This function is only available only when the underlying library `scp <https://github.com/jbardin/scp.py>`_ is installed. See :mod:`scp module <salt.modules.scp_mod>` for more details. remote_path Path to retrieve from remote host. Since this is evaluated by scp on the remote host, shell wildcards and environment variables may be used. recursive: ``False`` Transfer files and directories recursively. preserve_times: ``False`` Preserve ``mtime`` and ``atime`` of transferred files and directories. passphrase Used for decrypting private keys. pkey An optional private key to use for authentication. key_filename The filename, or list of filenames, of optional private key(s) and/or certificates to try for authentication. timeout An optional timeout (in seconds) for the TCP connect. socket_timeout: ``10`` The channel socket timeout in seconds. buff_size: ``16384`` The size of the SCP send buffer. allow_agent: ``True`` Set to ``False`` to disable connecting to the SSH agent. look_for_keys: ``True`` Set to ``False`` to disable searching for discoverable private key files in ``~/.ssh/`` banner_timeout An optional timeout (in seconds) to wait for the SSH banner to be presented. auth_timeout An optional timeout (in seconds) to wait for an authentication response. auto_add_policy: ``False`` Automatically add the host to the ``known_hosts``. CLI Example: .. code-block:: bash salt '*' napalm.scp_get /var/tmp/file /tmp/file auto_add_policy=True """ conn_args = netmiko_args(**kwargs) conn_args["hostname"] = conn_args["host"] kwargs.update(conn_args) return __salt__["scp.get"]( remote_path, local_path=local_path, recursive=recursive, preserve_times=preserve_times, **kwargs, ) @depends(HAS_SCP) def scp_put( files, remote_path=None, recursive=False, preserve_times=False, saltenv="base", **kwargs, ): """ .. versionadded:: 2019.2.0 Transfer files and directories to remote network device. .. note:: This function is only available only when the underlying library `scp <https://github.com/jbardin/scp.py>`_ is installed. See :mod:`scp module <salt.modules.scp_mod>` for more details. files A single path or a list of paths to be transferred. remote_path The path on the remote device where to store the files. recursive: ``True`` Transfer files and directories recursively. preserve_times: ``False`` Preserve ``mtime`` and ``atime`` of transferred files and directories. saltenv: ``base`` The name of the Salt environment. Ignored when ``files`` is not a ``salt://`` URL. hostname The hostname of the remote device. port: ``22`` The port of the remote device. username The username required for SSH authentication on the device. password Used for password authentication. It is also used for private key decryption if ``passphrase`` is not given. passphrase Used for decrypting private keys. pkey An optional private key to use for authentication. key_filename The filename, or list of filenames, of optional private key(s) and/or certificates to try for authentication. timeout An optional timeout (in seconds) for the TCP connect. socket_timeout: ``10`` The channel socket timeout in seconds. buff_size: ``16384`` The size of the SCP send buffer. allow_agent: ``True`` Set to ``False`` to disable connecting to the SSH agent. look_for_keys: ``True`` Set to ``False`` to disable searching for discoverable private key files in ``~/.ssh/`` banner_timeout An optional timeout (in seconds) to wait for the SSH banner to be presented. auth_timeout An optional timeout (in seconds) to wait for an authentication response. auto_add_policy: ``False`` Automatically add the host to the ``known_hosts``. CLI Example: .. code-block:: bash salt '*' napalm.scp_put /path/to/file /var/tmp/file auto_add_policy=True """ conn_args = netmiko_args(**kwargs) conn_args["hostname"] = conn_args["host"] kwargs.update(conn_args) return __salt__["scp.put"]( files, remote_path=remote_path, recursive=recursive, preserve_times=preserve_times, saltenv=saltenv, **kwargs, )