The script will also output the certificates and keys which should be uploaded to the BIG-IP /var/tmp directory and run file check_certs.sh and load_certs.sh to check and load the certs and keys.
Works with Python v2 and v3.
If you want something to be added then message me with details of the text and i will try to add it.
Feel free to add or change anything
Code :
#!/usr/bin/env python
# v1.1 14/3/2018 Deal with lack of text in monitors ( line 157 )
# v2 3/1/2019 Updated after changes suggested by Avinash Piare
# v3 6/11/2019 Updated to deal with \\r\n at the end of the line
# v3.1 6/11/2019 Minor changes to handle VS names with spaces
# 3.4 18/4/2020 Fixed minor issues
# Peter White 6/11/2019
# usage ./rad2f5 [partition]
import sys
import re
import textwrap
import ipaddress
print ("Running with Python v" + sys.version)
# Set debug to true to output the workings of the script ie the arrays etc
debug = False
def parse_options(options):
# Function to split options and return a dict containing option and value
# Example: -pl 27 -v 123 -pa 172.28.1.234
# Return: { 'pl':'27', 'v':'123', 'pa':'172.28.1.234' }
output = dict()
# Deal with non-quotes eg -b 12345
for r in re.finditer(r'-(\w{1,3}) (\S+)',options):
output[r.group(1)] = r.group(2)
# Deal with quotes eg -u "User Name"
for v in re.finditer(r'-(\w{1,3}) (".+")',options):
output[v.group(1)] = v.group(2)
return output
def splitvars(vars):
# Split a string on | and then =, return a dict of ABC=XYZ
# eg HDR=User-Agent|TKN=Googlebot-Video/1.0|TMATCH=EQ|
# Return is { 'HDR':'User-Agent','TKN': 'Googlebot-Video/1.0', 'TMATCH': 'EQ' }
vlist = vars.split("|")
o = {}
for v in vlist:
if v == '':
continue
w = v.split("=")
if len(w) > 1:
o[w[0]] = w[1]
else:
o[w[0]] = ''
return o
def array_add(a,d):
# Function to safely add to an array
#global a
if not len(a):
a = [ d ]
else:
a.append( d )
return a
def setup_pools(name):
global pools
if not name in pools:
pools[name] = { 'destinations': [], 'member-disabled': [], 'member-ids': [], 'priority-group': [] }
else:
if not 'destinations' in pools[name]:
pools[name]['destinations'] = []
if not 'member-disabled' in pools[name]:
pools[name]['member-disabled'] = []
if not 'member-ids' in pools[name]:
pools[name]['member-ids'] = []
if not 'priority-group' in pools[name]:
pools[name]['priority-group'] = []
def getVsFromPool(poolname):
# This retrieves the names of virtual servers that use a specific pool
global farm2vs
if poolname in farm2vs:
return farm2vs[poolname]
else:
return False
def is_ipv6(ip):
if ':' in ip:
return True
else:
return False
# Check there is an argument given
if not len(sys.argv) > 1:
exit("Usage: rad2f5 [partition]")
if len(sys.argv) > 2:
# Second command-line variable is the partition
partition = "/" + sys.argv[2] + "/"
print ("Using partition " + partition)
else:
partition = "/Common/"
# Check input file
fh = open(sys.argv[1],"r")
if not fh:
exit("Cannot open file " + argv[1])
rawfile = fh.read()
# v2
# Remove any instances of slash at the end of line
# eg health-monitoring check create\
# HC_DNS -id 5 -m DNS -p 53 -a \
#HOST=ns.domain.com|ADDR=1.1.1.1| -d 2.2.2.2
#file = re.sub('^security certificate table\\\\\n','',rawfile)
file = re.sub('\\\\\n','',rawfile)
file = re.sub('\\\\\r\n','',file)
################ LACP trunks ##########################
#
#
#
#############################################################
#net linkaggr trunks set T-1 -lap G-13,G-14 -lam Manual -lat Fast -law 3 -laa 32767
trunks = {}
for r in re.finditer(r'net linkaggr trunks set (\S+) (.+)',file):
name = r.group(1)
options = parse_options(r.group(2))
if 'lap' in options:
# Manage interfaces
ints = options['lap'].split(',')
trunks[name] = { 'interfaces': ints }
print ("LACP trunks:" + str(len(trunks)))
if debug:
print('DEBUG LACP trunks: ' + str(trunks))
################ IP routes ##########################
#
#
#
#############################################################
routes = {}
for r in re.finditer(r'net route table create (\S+) (\S+) (\S+) (\S+)',file):
if r.group(1) == '0.0.0.0':
name = 'default'
else:
name = r.group(1) + "_" + r.group(2)
routes[name] = { 'network': r.group(1), 'mask': r.group(2), 'gateway': r.group(3), 'interface': r.group(4)}
print ("IP routes:" + str(len(routes)))
if debug:
print('DEBUG routes: ' + str(routes))
################ Non-floating self-IPs ###############
#
#
#
#
#############################################################
selfIpNonFloating = {}
for s in re.finditer(r'net ip-interface create (\S+) (\S+) (.+)',file):
output = { 'interface': s.group(2) }
opts = parse_options(s.group(3))
if 'pl' in opts:
output['mask'] = opts['pl']
if 'v' in opts:
output['vlan'] = opts['v']
if 'pa' in opts:
output['peerAddress'] = opts['pa']
selfIpNonFloating[s.group(1)] = output
print ("Non-floating IP interfaces:" + str(len(selfIpNonFloating)))
if debug:
print("DEBUG non-floating IPs: " + str(selfIpNonFloating))
################ Floating self-IPs ###################
#
#
#
#############################################################
selfIpFloating = {}
for s in re.finditer(r'redundancy vrrp virtual-routers create (\S+) (\S+) (\S+) (.+)',file):
output = { 'version': s.group(1),'interface': s.group(3), 'ipAddresses': []}
opts = parse_options(s.group(4))
#if 'as' in opts:
# Enabled - assume all are enabled
if 'pip' in opts:
output['peerIpAddress'] = opts['pip']
selfIpFloating[s.group(2)] = output
# Retrieve IP addresses for Floating self-IPs
#
for s in re.finditer(r'redundancy vrrp associated-ip create (\S+) (\S+) (\S+) (\S+)',file):
selfIpFloating[s.group(2)]['ipAddresses'] = array_add(selfIpFloating[s.group(2)]['ipAddresses'],s.group(4))
print ("Floating IP interfaces:" + str(len(selfIpFloating)))
if debug:
print("DEBUG Floating IPs: " + str(selfIpFloating))
################ Monitors ###########################
#
# -m XYZ is the monitor type may or may not be present ( not present for icmp type )
# -id is the monitor ID, -p is the port, -d is the destination
#
#############################################################
monitors = {}
for m in re.finditer(r'health-monitoring check create (\S+) (.+)',file):
output = { 'name': m.group(1) }
opts = parse_options(m.group(2))
if 'id' in opts:
id = opts['id']
else:
print ("No ID for monitor " + m.group(1))
continue
if 'm' in opts:
output['type'] = opts['m']
else:
output['type'] = 'icmp'
if 'a' in opts:
output['text'] = opts['a']
else:
# Added in v2
output['text'] = ''
if 'p' in opts:
output['port'] = opts['p']
else:
output['port'] = ''
monitors[id] = output
print ("Monitors:" + str(len(monitors)))
if debug:
print("DEBUG Monitors:" + str(monitors))
################ Virtual Servers #####################
#
# 0 = name, 1= IP, 2=protocol, 3=port, 4=source 5=options
# -ta = type, -ht = http policy, -fn = pool name, -sl = ssl profile name, -ipt = translation?
# -po = policy name
#
#############################################################
farm2vs = {}
virtuals = {}
snatPools = {}
for v in re.finditer(r'appdirector l4-policy table create (\S+) (\S+) (\S+) (\S+) (\S+) (.*)',file):
# Puke if VS has quotes
if v.group(1).startswith('"'):
name = v.group(1).strip('"').replace(' ','_') + v.group(2).strip('"').replace(' ','_')
address,protocol,port = v.group(3),v.group(4),v.group(5)
source = v.group(6).split(' ')[0]
options = ' '.join(v.group(6).split(' ')[1:])
else:
name,address,protocol,port,source,options = v.group(1),v.group(2),v.group(3),v.group(4),v.group(5),v.group(6)
opts = parse_options(options)
# Get rid of ICMP virtual servers
if protocol == 'ICMP':
continue
print ("Name " + name + " has quotes, address: " + address + " protocol: " + protocol)
if port == 'Any':
port = '0'
output = {'source': source, 'destination': address + ":" + port, 'protocol': protocol, 'port': port }
if 'fn' in opts:
output['pool'] = opts['fn']
if not opts['fn'] in farm2vs:
farm2vs[opts['fn']] = []
farm2vs[opts['fn']].append(name)
output['port'] = port
if 'po' in opts:
output['policy'] = opts['po']
if 'ipt' in opts:
output['snat'] = 'snatpool_' + opts['ipt']
if not 'snatpool_' + opts['ipt'] in snatPools:
#Create snatpool
snatPools['snatpool_' + opts['ipt']] = { 'members': [opts['ipt']] }
# Set the correct profiles
profiles = []
# Layer 4
if protocol == "TCP" or protocol == "UDP":
profiles.append(protocol.lower())
else:
profiles.append('ipother')
# http
if port == '80' or port == '8080':
profiles.append('http')
profiles.append('oneconnect')
# ftp
if port == '21':
profiles.append('ftp')
# RADIUS
if port == '1812' or port == '1813':
profiles.append('radius')
# SSL
if 'sl' in opts:
profiles.append(opts['sl'])
profiles.append('http')
profiles.append('oneconnect')
output['profiles'] = profiles
#
virtuals[name] = output
print ("Virtual Servers:" + str(len(virtuals)))
if debug:
print("DEBUG Virtual Servers:" + str(virtuals))
#print("DEBUG Farm to VS Mapping:" + str(farm2vs))
################ Pools ###############################
#
# Pools config options are distributed across multiple tables
# This sets the global config such as load balancing algorithm
# -dm This sets the distribution method. cyclic = Round Robin, Fewest Number of Users = least conn, Weighted Cyclic = ratio, Response Time = fastest
# -as this is the admin state
# -cm is the checking method ie monitor
# -at is the activation time
#############################################################
pools = {}
for p in re.finditer(r'appdirector farm table setCreate (\S+) (.*)',file):
name = p.group(1)
setup_pools(name)
opts = parse_options(p.group(2))
output = {}
# Admin state
output['poolDisabled'] = False
if 'as' in opts:
if opts['as'] == 'Disabled':
output['poolDisabled'] = True
# Deal with distribution methods
method = 'round-robin'
if 'dm' in opts:
if opts['dm'] == '"Fewest Number of Users"':
method = 'least-conn'
elif opts['dm'] == 'Hashing':
method = 'hash'
else:
method = 'round-robin'
output['lbMethod'] = method
if 'at' in opts:
output['slowRamp'] = opts['at']
pools[name] = output
# This sets the pool members
# 0=name, 1=node, 2=node address, 3=node port, 4=? -id =id -sd ? -as admin state eg Disable, -om operation mode eg Backup ( fallback server ), -rt backup server address 0.0.0.0
for p in re.finditer(r'appdirector farm server table create (\S+) (\S+) (\S+) (\S+) (\S+) (.*)',file):
name,node,node_address,node_port,node_hostname = p.group(1),p.group(2),p.group(3),p.group(4),p.group(5)
opts = parse_options(p.group(6))
setup_pools(name)
if node_port == 'None':
node_port = '0'
pools[name]['destinations'] = array_add(pools[name]['destinations'],node_address + ":" + node_port)
# Manage monitor
if node_port == '80' or node_port == '8080':
monitor = 'http'
elif node_port == '443':
monitor = 'https'
elif node_port == '53':
monitor = 'dns'
elif node_port == '21':
monitor = 'ftp'
elif node_port == '0':
monitor = 'gateway-icmp'
else:
monitor = 'tcp'
pools[name]['monitor'] = monitor
# Retrieve pool member ID
if 'id' in opts:
pools[name]['member-ids'] = array_add(pools[name]['member-ids'],opts['id'])
else:
print ("ID not found for pool " + name)
# Check if member is disabled
if 'as' in opts and opts['as'] == 'Disabled':
# This pool member is disabled
pools[name]['member-disabled'] = array_add(pools[name]['member-disabled'],True)
else:
pools[name]['member-disabled'] = array_add(pools[name]['member-disabled'],False)
# Check if member is backup ie Priority Groups
if 'om' in opts and opts['om'] == 'Backup':
pools[name]['priority-group'] = array_add(pools[name]['priority-group'],20)
else:
pools[name]['priority-group'] = array_add(pools[name]['priority-group'],0)
print ("Pools:" + str(len(pools)) )
if debug:
print("DEBUG pools: " + str(pools))
################ SSL certificates ###################
#
#
#Name: certificate_name \
#Type: certificate \
#-----BEGIN CERTIFICATE----- \
#MIIEcyFCA7agAwIAAgISESFWs9QGF
#
#############################################################
certs = {}
for r in re.finditer(r'Name: (\S+) Type: (\S+) (-----BEGIN CERTIFICATE-----.+?-----END CERTIFICATE-----)',file):
name,type,text = r.group(1),r.group(2),r.group(3)
certs[name] = { 'type': type,'text': text.replace(' \\\r\n','') }
# Print out to file or something
print ("SSL Certificates: " + str(len(certs)))
if debug:
print("DEBUG certs: " + str(certs))
################ SSL Keys ###################
#
#
#Name: New_Root_Cert Type: key Passphrase: -----BEGIN RSA PRIVATE KEY----- Proc-Type: 4,ENCRYPTED DEK-Info: [key] [key] -----END RSA PRIVATE KEY----- \
#
#############################################################
keys = {}
# Keys with passphrase
for r in re.finditer(r'Name: (\S+) Type: key Passphrase: (\S+) (-----BEGIN RSA PRIVATE KEY-----.+?-----END RSA PRIVATE KEY-----)',file):
name,passphrase,text = r.group(1),r.group(2),r.group(3)
keys[name] = { 'passphrase': passphrase,'text': text.replace(' \\\r\n','') }
# Keys without passphrase
for r in re.finditer(r'Name: (\S+) Type: key (-----BEGIN RSA PRIVATE KEY-----.+?-----END RSA PRIVATE KEY-----)',file):
name,text = r.group(1),r.group(2)
keys[name] = { 'text': text.replace(' \\\r\n','') }
print ("SSL Keys: " + str(len(keys)))
if debug:
print("DEBUG SSL keys: " + str(keys))
################ SSL profiles ########################
#
# -c is cert, -u is ciphers, -t is chain cert, -fv - versions
##############################################################
sslProfiles = {}
for s in re.finditer(r'^appdirector l4-policy ssl-policy create (\S+) (.+)',file.replace('\\\r\n',''),re.MULTILINE):
name = s.group(1)
output = {}
opts = parse_options(s.group(2))
if 'c' in opts:
# Certificate
output['certificate'] = opts['c']
if 't' in opts:
# Chain cert
output['chaincert'] = opts['t']
if 'fv' in opts:
# TLS Version
output['version'] = opts['fv']
if 'u' in opts:
# User-defined Ciphers
output['cipher'] = opts['u']
if 'lp' in opts:
# ?
output['lp'] = opts['lp']
if 'pa' in opts:
# ?
output['pa'] = opts['pa']
if 'cb' in opts:
# ?
output['cb'] = opts['cb']
if 'i' in opts:
# Backend SSL Cipher -> Values: Low, Medium, High, User Defined
output['i'] = opts['i']
if 'bs' in opts:
# Backend SSL in use ie serverSSL
output['serverssl'] = opts['bs']
sslProfiles[name] = output
print ("SSL profiles: " + str(len(sslProfiles)))
if debug:
print("DEBUG SSL Profiles: " + str(sslProfiles))
################ SNAT pools ##########################
#
# Note that this only works for addresses in the same /24 subnet
#############################################################
for s in re.finditer(r'appdirector nat client address-range create (\S+) (\S+)',file):
name = s.group(1)
if sys.version.startswith('2'):
start = ipaddress.ip_address(unicode(name,'utf_8'))
end = ipaddress.ip_address(unicode(s.group(2),'utf_8'))
else:
start = ipaddress.ip_address(name)
end = ipaddress.ip_address(s.group(2))
current = start
ipAddresses = []
while current <= end:
ipAddresses.append(str(current))
current += 1
snatPools['snatpool_' + name] = { 'members': ipAddresses }
print ("SNAT Pools:" + str(len(snatPools)))
if debug:
print("DEBUG SNAT Pools: " + str(snatPools))
####################################################################
################ Layer 7 functions ##########################
#
#
####################################################################
l7rules = { }
for r in re.finditer(r'appdirector l7 farm-selection method-table setCreate (\S+) (.+)',file):
name = r.group(1)
l7rules[name] = { 'match': [], 'action': [] }
opts = parse_options(r.group(2))
if 'cm' in opts and opts['cm'] == '"Header Field"' and 'ma' in opts:
# This is a rule to insert a header
params = splitvars(opts['ma'])
if 'HDR' in params and 'TKN' in params:
if params['TKN'] == "$Client_IP":
params['TKN'] = '[IP::client_addr]'
l7rules[name]['action'].append("http-header\ninsert\nname " + params['HDR'] + "\nvalue " + params['TKN'])
if 'cm' in opts and opts['cm'] == 'URL' and 'ma' in opts:
# This does a match on Host and URL
params = splitvars(opts['ma'])
if 'HN' in params:
l7rules[name]['match'].append("http-host\nhost\nvalues { " + params['HN'] + " }")
if 'P' in params:
l7rules[name]['match'].append("http-uri\npath\nvalues { " + params['P'] + " }")
if 'cm' in opts and opts['cm'] == '"Regular Expression"' and 'ma' in opts:
params = splitvars(opts['ma'])
if 'EXP' in params and params['EXP'] == '.':
# This is a regex which matches everything
print ("REGEX: " + name)
else:
print ("WARNING! Found L7 Regular Expression at \"appdirector l7 farm-selection method-table setCreate " + name + "\". Manually set the match in output config.")
# Note that there can be multiple entries ie multiple rules per policy
l7policies = {}
for p in re.finditer(r'appdirector l7 farm-selection policy-table setCreate (\S+) (\d+) (.+)',file):
name = p.group(1)
precedence = p.group(2)
opts = parse_options(p.group(3))
if 'fn' in opts:
farm = opts['fn']
else:
farm = ''
if 'm1' in opts:
rule = opts['m1']
if 'pa' in opts:
# Retain HTTP Persistency (PRSST)-If the argument is ON (or undefined), AppDirector maintains HTTP 1.1
# HTTP Redirect To (RDR)-Performs HTTP redirection to the specified name or IP address.
# HTTPS Redirect To (RDRS)-AppDirector redirects the HTTP request to the specified name or IP address and modifies the request to a HTTPS request.
# Redirection Code (RDRC)-Defines the code to be used for redirection.
# RDRC=PRMN stand for Permanent I assume , as in HTTP 301
# SIP Redirect To (RDRSIP)-Performs SIP redirection to the specified name or IP address.
params = splitvars(opts['pa'])
if 'RDR' in params:
url = 'http://' + params['RDR']
elif 'RDRS' in params:
url = 'https://' + params['RDRS']
else:
url = ''
if not name in l7policies:
l7policies[name] = []
if rule in l7rules:
if farm != '':
l7rules[rule]['action'].append("forward\nselect\npool " + farm)
elif url != '':
l7rules[rule]['action'].append("http-redirect\nhost " + url)
l7policies[name].append({ 'precedence': precedence, 'farm': farm, 'rule': rule })
print ("Layer 7 rules:" + str(len(l7rules)))
print ("Layer 7 policies:" + str(len(l7policies)))
if debug:
print("DEBUG L7 rules: " + str(l7rules))
print("DEBUG L7 policies: " + str(l7policies))
#
# We have retrieved the required configuration from the input file
# Now start outputting the config
################# output SSL certificates import script ######################
#
#
########################################################################
if len(certs):
print ("-- Creating SSL certs and keys --")
with open("load_certs.sh",'w') as loadScript:
loadScript.write("#!/bin/bash\n# Script to load SSL certs and keys from /var/tmp\n")
##### Manage Certificates ########
for cert in certs:
# Write certs to load_certs.sh
if certs[cert]['type'] == 'certificate' or certs[cert]['type'] == 'interm':
loadScript.write("tmsh install sys crypto cert " + partition + cert + ".crt from-local-file /var/tmp/" + cert + ".crt\n")
# Create the certificate files
with open(cert + ".crt","w") as certFile:
for m in re.finditer(r'(-----BEGIN CERTIFICATE-----)\s?(.+)\s?(-----END CERTIFICATE-----)',certs[cert]['text']):
certFile.write(m.group(1) + "\n")
certFile.write(textwrap.fill(m.group(2),64) + "\n")
certFile.write(m.group(3) + "\n")
print ("Created SSL certificate file " + cert + ".crt")
##### Manage Keys #################
for key in keys:
# Write keys to load_certs.sh
loadScript.write("tmsh install sys crypto key " + partition + key + ".key")
if 'passphrase' in keys[key]:
loadScript.write(" passphrase " + keys[key]['passphrase'])
loadScript.write(" from-local-file /var/tmp/" + key + ".key\n")
# Create the key files
with open(key + ".key","w") as keyFile:
for n in re.finditer(r'(-----BEGIN RSA PRIVATE KEY-----)(.+)(-----END RSA PRIVATE KEY-----)',keys[key]['text']):
keyFile.write(n.group(1) + "\n")
if 'Proc-Type:' in n.group(2) and 'DEK-Info:' in n.group(2):
# File is encrypted, separate the first lines
for o in re.finditer(r'(Proc-Type: \S+) (DEK-Info: \S+) (.+)',n.group(2)):
keyFile.write(o.group(1) + "\n")
keyFile.write(o.group(2) + "\n\n")
keyFile.write(textwrap.fill(o.group(3),64) + "\n")
else:
# File is not encrypted, output as it is
keyFile.write(textwrap.fill(n.group(2),64) + "\n")
keyFile.write(n.group(3) + "\n")
print ("Created SSL key file " + key + ".key")
print ("-- Finished creating SSL certs and keys --")
print ("!! Copy all .crt and .key SSL files to BIG-IP /var/tmp and use load_certs.sh to load !!" )
#######################################################################
################# output SSL certificates checking script ######################
#
#
########################################################################
with open("check_certs.sh",'w') as checkScript:
checkScript.write("#!/bin/bash\n# Script to check SSL certs and keys\n")
checkScript.write("\n# Check SSL Certs\n")
for cert in certs:
if certs[cert]['type'] == 'certificate' or certs[cert]['type'] == 'interm':
checkScript.write("openssl x509 -in " + cert + ".crt -noout || echo \"Error with file " + cert + ".crt\"\n")
checkScript.write("\n# Check SSL Keys\n")
for key in keys:
checkScript.write("openssl rsa -in " + key + ".key -check || echo \"Error with file " + key + ".key\"\n")
print ("!! Run the check_certs.sh script to check the certificates are valid !!" )
#######################################################################
#
#
#
#
#
#
#
#
print ("\n\n\n\n\n\n# Configuration \n#--------------------------------------#")
################# output policy config #####################
#
#
#############################################################
#print ("L7 rules: " + str(l7rules))
for i in l7policies.keys():
output = "ltm policy " + partition + i + " {\n\tcontrols { forwarding }\n\trequires { http }\n\t"
output += "rules {\n\t"
ordinal = 1
for j in l7policies[i]:
output += "\t" + j['rule'] + " { \n"
if len(l7rules[j['rule']]['match']):
# Deal with conditions
output += "\t\t\tconditions { \n"
l = 0
for k in l7rules[j['rule']]['match']:
output += "\t\t\t\t" + str(l) + " { \n\t\t\t\t\t" + k.replace('\n','\n\t\t\t\t\t')
l += 1
output += "\n\t\t\t\t }\n"
output += "\n\t\t\t }\n"
if len(l7rules[j['rule']]['action']):
# Deal with actions
output += "\t\t\tactions { \n"
m = 0
for n in l7rules[j['rule']]['action']:
output += "\t\t\t\t" + str(m) + " { \n\t\t\t\t\t" + n.replace('\n','\n\t\t\t\t\t')
m += 1
output += "\n\t\t\t\t }\n"
output += "\n\t\t\t }\n"
output += "\t\tordinal " + str(ordinal)
output += "\n\t\t}\n\t"
ordinal += 1
output += "\n\t}\n}\n"
print (output)
################# output LACP trunk config ##############
#
#
#############################################################
for trunk in trunks.keys():
output = "net trunk " + partition + trunk + " {\n"
if 'interfaces' in trunks[trunk]:
output += "\tinterfaces {\n"
for int in trunks[trunk]['interfaces']:
output += "\t\t" + int + "\n"
output += "\t}\n"
output += "}\n"
print (output)
################# output vlan config ##############
#
#
#############################################################
for ip in selfIpNonFloating.keys():
output = ""
if 'vlan' in selfIpNonFloating[ip]:
vlanName = "VLAN-" + selfIpNonFloating[ip]['vlan']
output += "net vlan " + partition + vlanName + " {\n"
if 'interface' in selfIpNonFloating[ip]:
output += "\tinterfaces {\n"
output += "\t\t" + selfIpNonFloating[ip]['interface'] + " {\n"
output += "\t\t\ttagged\n\t\t}\n"
output += "\t}\n"
output += "\ttag " + selfIpNonFloating[ip]['vlan'] + "\n}\n"
print(output)
################# output non-floating self-ip config #######
#
#
#############################################################
for ip in selfIpNonFloating.keys():
output = ""
if 'mask' in selfIpNonFloating[ip]:
mask = "/" + selfIpNonFloating[ip]['mask']
else:
if is_ipv6(ip):
mask = "/64"
else:
mask = "/32"
if 'vlan' in selfIpNonFloating[ip]:
vlanName = "VLAN-" + selfIpNonFloating[ip]['vlan']
else:
continue
output += "net self " + partition + "selfip_" + ip + " {\n\taddress " + ip + mask + "\n\t"
output += "allow-service none\n\t"
output += "traffic-group traffic-group-local-only\n"
output += "\tvlan " + vlanName + "\n"
output += "}\n"
print (output)
################# output network route config ##############
#
#
#############################################################
for route in routes.keys():
network,mask,gateway = routes[route]['network'],routes[route]['mask'],routes[route]['gateway']
output = "net route " + partition + route + " {\n\tnetwork " + network + "/" + mask + "\n\t"
output += "gateway " + gateway + "\n}"
print (output)
################# output SSL profiles config ##########################
#
#
########################################################################
for s in sslProfiles:
#print (str(sslProfiles[s]))
output = "ltm profile client-ssl " + partition + s + " {\n"
output += "\tcert-key-chain { " + s + " { cert "
output += sslProfiles[s]['certificate'] + ".crt "
output += " key "
output += sslProfiles[s]['certificate'] + ".key "
if 'chaincert' in sslProfiles[s]:
output += "chain " + sslProfiles[s]['chaincert']
output += " }\n\tdefaults-from /Common/clientssl\n}\n"
print (output)
if 'serverssl' in sslProfiles[s]:
print("WARNING: VSs using Client SSL profile " + s + " should have Server SSL profile assigned")
################# output monitor config ####################
#
#
#############################################################
for m in monitors.keys():
if monitors[m]['type'] == '"TCP Port"':
output = "ltm monitor tcp " + partition + monitors[m]['name'] + " {\n\tdefaults-from /Common/tcp\n}\n"
if monitors[m]['type'] == '"UDP Port"':
output = "ltm monitor udp " + partition + monitors[m]['name'] + " {\n\tdefaults-from /Common/udp\n}\n"
if monitors[m]['type'] == 'HTTP':
'''
https://webhelp.radware.com/AppDirector/v214/214Traffic%20Management%20and%20Application%20Acceleration.03.001.htm
https://webhelp.radware.com/AppDirector/v214/HM_Checks_Table.htm
Arguments:
Host name - HOST=10.10.10.53
path - PATH=/hc.htm
HTTP Header
HTTP method - MTD=G (G/H/P)
send HTTP standard request or proxy request - PRX=N
use of no-cache - NOCACHE=N
text for search within a HTTP header and body, and an indication whether the text appears
Username and Password for basic authentication
NTLM authentication option - AUTH=B
Up to four valid HTTP return codes - C1=200
-a PATH=/hc.htm|C1=200|MEXIST=Y|MTD=G|PRX=N|NOCACHE=N|AUTH=B|
'''
output = "ltm monitor http " + partition + monitors[m]['name'] + " {\n\tdefaults-from /Common/http\n"
vars = splitvars(monitors[m]['text'])
output += "\tsend \""
if 'MTD' in vars:
if vars['MTD'] == 'G':
output += "GET "
elif vars['MTD'] == 'P':
output += "POST "
elif vars['MTD'] == 'H':
output += "HEAD "
else:
output += "GET "
if 'PATH' in vars:
output += vars['PATH'] + ' HTTP/1.0\\r\\n\\r\\n"\n'
if 'C1' in vars:
output += "\trecv \"^HTTP/1\.. " + vars['C1'] + "\"\n"
output += "}\n"
if monitors[m]['type'] == 'HTTPS':
output = "ltm monitor https " + partition + monitors[m]['name'] + " {\n\tdefaults-from /Common/https\n"
vars = splitvars(monitors[m]['text'])
output += "\tsend \""
if 'MTD' in vars:
if vars['MTD'] == 'G':
output += "GET "
elif vars['MTD'] == 'P':
output += "POST "
elif vars['MTD'] == 'H':
output += "HEAD "
else:
output += "GET "
if 'PATH' in vars:
output += vars['PATH'] + ' HTTP/1.0\\r\\n\\r\\n"\n'
output += "}\n"
if monitors[m]['type'] == 'LDAP':
'''
The Health Monitoring module enhances the health checks for LDAP servers by allowing performing searches in the LDAP server. Before Health Monitoring performs the search, it issues a Bind request command to the LDAP server.
After performing the search, it closes the connection with the Unbind command. A successful search receives an answer from the server that includes a "searchResultEntry" message. An unsuccessful search receives an answer that only includes only a "searchResultDone" message.
Arguments:
Username A user with privileges to search the LDAP server.
Password The password of the user.
Base Object The location in the directory from which the LDAP search begins.
Attribute Name The attribute to look for. For example, CN - Common Name.
Search Value The value to search for.
Search scope baseObject, singleLevel, wholeSubtree
Search Deref Aliases neverDerefAliases, dereflnSearching, derefFindingBaseObj, derefAlways
USER=cn=healthcheck,dc=domain|PASS=1234|BASE=dc=domain|ATTR=cn|VAL=healthcheck|SCP=1|DEREF=3|
'''
output = "ltm monitor ldap " + partition + monitors[m]['name'] + " {\n\tdefaults-from /Common/ldap\n"
vars = splitvars(monitors[m]['text'])
if 'BASE' in vars:
output += "\tbase \"" + vars['BASE'] + "\"\n"
if 'USER' in vars:
output += "\tusername \"" + vars['USER'] + "\"\n"
if 'PASS' in vars:
output += "\tpassword \"" + vars['PASS'] + "\"\n"
output += "}\n"
if monitors[m]['type'] == 'icmp':
output = "ltm monitor gateway-icmp " + partition + monitors[m]['name'] + " {\n\tdefaults-from /Common/gateway-icmp\n}\n"
if monitors[m]['type'] == 'DNS':
output = "ltm monitor dns " + partition + monitors[m]['name'] + " {\n\tdefaults-from /Common/dns\n"
vars = splitvars(monitors[m]['text'])
if 'HOST' in vars:
output += "\tqname \"" + vars['HOST'] + "\"\n"
if 'ADDR' in vars:
output += "\trecv \"" + vars['ADDR'] + "\"\n"
output += "}\n"
if monitors[m]['type'] == '"Radius Accounting"':
output = "ltm monitor radius-accounting " + partition + monitors[m]['name'] + " {\n\tdefaults-from /Common/radius-accounting\n"
vars = splitvars(monitors[m]['text'])
if 'USER' in vars:
output += "\tusername \"" + vars['USER'] + "\"\n"
#if 'PASS' in vars:
if 'SECRET' in vars:
output += "\tsecret \"" + vars['SECRET'] + "\"\n"
output += "}\n"
if monitors[m]['type'] == '"Radius Authentication"':
output = "ltm monitor radius " + partition + monitors[m]['name'] + " {\n\tdefaults-from /Common/radius\n"
vars = splitvars(monitors[m]['text'])
if 'USER' in vars:
output += "\tusername \"" + vars['USER'] + "\"\n"
#if 'PASS' in vars:
if 'SECRET' in vars:
output += "\tsecret \"" + vars['SECRET'] + "\"\n"
output += "}\n"
print (output)
################# output SNAT pool config ######################
#
#
#############################################################
for s in snatPools.keys():
output = "ltm snatpool " + partition + s + " {\n\t"
output += "members {\n"
#run through pool range and add members as individual IP addresses below each other
for member in snatPools[s]['members']:
output += "\t " + member + "\n"
output += "\t}"
output += "\n}"
print (output)
################# output pool config ######################
#
#
#############################################################
for p in pools.keys():
output = "ltm pool " + partition + p + " {\n\t"
if 'monitor' in pools[p]:
output += "monitor min 1 of { " + pools[p]['monitor'] + " }\n\t"
if 'lbMethod' in pools[p]:
output += "load-balancing-mode " + pools[p]['lbMethod'] + "\n\t"
output += "members {\n"
if 'destinations' in pools[p] and len(pools[p]['destinations']):
for i,v in enumerate(pools[p]['destinations']):
d = re.sub(':\d+$','',v)
output += "\t\t" + v + " {\n\t\t\taddress " + d + "\n"
if pools[p]['member-disabled'][i]:
output += "\t\t\tstate down\n"
output += "\t\t\tpriority-group " + str(pools[p]['priority-group'][i]) + "\n"
output += "\t\t}\n"
output += "\t}\n}"
print (output)
################# output virtual server config ######################
#
#
######################################################################
for v in virtuals:
output = "ltm virtual " + partition + v + " {\n"
output += "\tdestination " + virtuals[v]['destination'] + "\n"
output += "\tip-protocol " + virtuals[v]['protocol'].lower() + "\n"
if 'pool' in virtuals[v] and virtuals[v]['pool']:
output += "\tpool " + virtuals[v]['pool'] + "\n"
if 'profiles' in virtuals[v] and len(virtuals[v]['profiles']):
output += "\tprofiles {\n"
for p in virtuals[v]['profiles']:
output += "\t\t" + p + " { }\n"
output += "\t}\n"
if 'snat' in virtuals[v]:
output += "\tsource-address-translation {\n\t"
if virtuals[v]['snat'] == 'automap':
output += "\ttype automap\n\t"
else:
output += "\ttype snat\n\t"
output += "\tpool " + virtuals[v]['snat'] + "\n\t"
output += "}\n"
if 'policy' in virtuals[v]:
output += "\tpolicies {\n\t"
output += "\t" + virtuals[v]['policy'] + " { }\n\t}\n"
output += "}"
print (output)
"}},"componentScriptGroups({\"componentId\":\"custom.widget.Beta_Footer\"})":{"__typename":"ComponentScriptGroups","scriptGroups":{"__typename":"ComponentScriptGroupsDefinition","afterInteractive":{"__typename":"PageScriptGroupDefinition","group":"AFTER_INTERACTIVE","scriptIds":[]},"lazyOnLoad":{"__typename":"PageScriptGroupDefinition","group":"LAZY_ON_LOAD","scriptIds":[]}},"componentScripts":[]},"component({\"componentId\":\"custom.widget.Tag_Manager_Helper\"})":{"__typename":"Component","render({\"context\":{\"component\":{\"entities\":[],\"props\":{}},\"page\":{\"entities\":[\"board:codeshare\",\"message:285011\"],\"name\":\"TkbMessagePage\",\"props\":{},\"url\":\"https://community.f5.com/kb/codeshare/radware-config-translation/285011\"}}})":{"__typename":"ComponentRenderResult","html":" "}},"componentScriptGroups({\"componentId\":\"custom.widget.Tag_Manager_Helper\"})":{"__typename":"ComponentScriptGroups","scriptGroups":{"__typename":"ComponentScriptGroupsDefinition","afterInteractive":{"__typename":"PageScriptGroupDefinition","group":"AFTER_INTERACTIVE","scriptIds":[]},"lazyOnLoad":{"__typename":"PageScriptGroupDefinition","group":"LAZY_ON_LOAD","scriptIds":[]}},"componentScripts":[]},"component({\"componentId\":\"custom.widget.Consent_Blackbar\"})":{"__typename":"Component","render({\"context\":{\"component\":{\"entities\":[],\"props\":{}},\"page\":{\"entities\":[\"board:codeshare\",\"message:285011\"],\"name\":\"TkbMessagePage\",\"props\":{},\"url\":\"https://community.f5.com/kb/codeshare/radware-config-translation/285011\"}}})":{"__typename":"ComponentRenderResult","html":""}},"componentScriptGroups({\"componentId\":\"custom.widget.Consent_Blackbar\"})":{"__typename":"ComponentScriptGroups","scriptGroups":{"__typename":"ComponentScriptGroupsDefinition","afterInteractive":{"__typename":"PageScriptGroupDefinition","group":"AFTER_INTERACTIVE","scriptIds":[]},"lazyOnLoad":{"__typename":"PageScriptGroupDefinition","group":"LAZY_ON_LOAD","scriptIds":[]}},"componentScripts":[]},"cachedText({\"lastModified\":\"1743097580000\",\"locale\":\"en-US\",\"namespaces\":[\"shared/client/components/common/QueryHandler\"]})":[{"__ref":"CachedAsset:text:en_US-shared/client/components/common/QueryHandler-1743097580000"}],"cachedText({\"lastModified\":\"1743097580000\",\"locale\":\"en-US\",\"namespaces\":[\"components/community/NavbarDropdownToggle\"]})":[{"__ref":"CachedAsset:text:en_US-components/community/NavbarDropdownToggle-1743097580000"}],"cachedText({\"lastModified\":\"1743097580000\",\"locale\":\"en-US\",\"namespaces\":[\"components/messages/MessageView/MessageViewStandard\"]})":[{"__ref":"CachedAsset:text:en_US-components/messages/MessageView/MessageViewStandard-1743097580000"}],"cachedText({\"lastModified\":\"1743097580000\",\"locale\":\"en-US\",\"namespaces\":[\"components/messages/ThreadedReplyList\"]})":[{"__ref":"CachedAsset:text:en_US-components/messages/ThreadedReplyList-1743097580000"}],"cachedText({\"lastModified\":\"1743097580000\",\"locale\":\"en-US\",\"namespaces\":[\"components/messages/MessageReplyCallToAction\"]})":[{"__ref":"CachedAsset:text:en_US-components/messages/MessageReplyCallToAction-1743097580000"}],"cachedText({\"lastModified\":\"1743097580000\",\"locale\":\"en-US\",\"namespaces\":[\"components/messages/MessageSubject\"]})":[{"__ref":"CachedAsset:text:en_US-components/messages/MessageSubject-1743097580000"}],"cachedText({\"lastModified\":\"1743097580000\",\"locale\":\"en-US\",\"namespaces\":[\"components/messages/MessageBody\"]})":[{"__ref":"CachedAsset:text:en_US-components/messages/MessageBody-1743097580000"}],"cachedText({\"lastModified\":\"1743097580000\",\"locale\":\"en-US\",\"namespaces\":[\"components/messages/MessageCustomFields\"]})":[{"__ref":"CachedAsset:text:en_US-components/messages/MessageCustomFields-1743097580000"}],"cachedText({\"lastModified\":\"1743097580000\",\"locale\":\"en-US\",\"namespaces\":[\"components/messages/MessageRevision\"]})":[{"__ref":"CachedAsset:text:en_US-components/messages/MessageRevision-1743097580000"}],"cachedText({\"lastModified\":\"1743097580000\",\"locale\":\"en-US\",\"namespaces\":[\"components/messages/MessageReplyButton\"]})":[{"__ref":"CachedAsset:text:en_US-components/messages/MessageReplyButton-1743097580000"}],"cachedText({\"lastModified\":\"1743097580000\",\"locale\":\"en-US\",\"namespaces\":[\"components/messages/MessageAuthorBio\"]})":[{"__ref":"CachedAsset:text:en_US-components/messages/MessageAuthorBio-1743097580000"}],"cachedText({\"lastModified\":\"1743097580000\",\"locale\":\"en-US\",\"namespaces\":[\"components/guides/GuideBottomNavigation\"]})":[{"__ref":"CachedAsset:text:en_US-components/guides/GuideBottomNavigation-1743097580000"}],"cachedText({\"lastModified\":\"1743097580000\",\"locale\":\"en-US\",\"namespaces\":[\"components/users/UserLink\"]})":[{"__ref":"CachedAsset:text:en_US-components/users/UserLink-1743097580000"}],"cachedText({\"lastModified\":\"1743097580000\",\"locale\":\"en-US\",\"namespaces\":[\"shared/client/components/users/UserRank\"]})":[{"__ref":"CachedAsset:text:en_US-shared/client/components/users/UserRank-1743097580000"}],"cachedText({\"lastModified\":\"1743097580000\",\"locale\":\"en-US\",\"namespaces\":[\"components/messages/MessageTime\"]})":[{"__ref":"CachedAsset:text:en_US-components/messages/MessageTime-1743097580000"}],"cachedText({\"lastModified\":\"1743097580000\",\"locale\":\"en-US\",\"namespaces\":[\"shared/client/components/common/Pager/PagerLoadMorePreviousNextLinkable\"]})":[{"__ref":"CachedAsset:text:en_US-shared/client/components/common/Pager/PagerLoadMorePreviousNextLinkable-1743097580000"}],"cachedText({\"lastModified\":\"1743097580000\",\"locale\":\"en-US\",\"namespaces\":[\"components/customComponent/CustomComponent\"]})":[{"__ref":"CachedAsset:text:en_US-components/customComponent/CustomComponent-1743097580000"}],"message({\"id\":\"message:285021\"})":{"__ref":"TkbReplyMessage:message:285021"},"message({\"id\":\"message:285012\"})":{"__ref":"TkbReplyMessage:message:285012"},"message({\"id\":\"message:285013\"})":{"__ref":"TkbReplyMessage:message:285013"},"message({\"id\":\"message:285014\"})":{"__ref":"TkbReplyMessage:message:285014"},"message({\"id\":\"message:285015\"})":{"__ref":"TkbReplyMessage:message:285015"},"message({\"id\":\"message:285016\"})":{"__ref":"TkbReplyMessage:message:285016"},"message({\"id\":\"message:285017\"})":{"__ref":"TkbReplyMessage:message:285017"},"message({\"id\":\"message:285018\"})":{"__ref":"TkbReplyMessage:message:285018"},"message({\"id\":\"message:285019\"})":{"__ref":"TkbReplyMessage:message:285019"},"message({\"id\":\"message:285020\"})":{"__ref":"TkbReplyMessage:message:285020"},"cachedText({\"lastModified\":\"1743097580000\",\"locale\":\"en-US\",\"namespaces\":[\"shared/client/components/users/UserAvatar\"]})":[{"__ref":"CachedAsset:text:en_US-shared/client/components/users/UserAvatar-1743097580000"}],"cachedText({\"lastModified\":\"1743097580000\",\"locale\":\"en-US\",\"namespaces\":[\"shared/client/components/ranks/UserRankLabel\"]})":[{"__ref":"CachedAsset:text:en_US-shared/client/components/ranks/UserRankLabel-1743097580000"}],"cachedText({\"lastModified\":\"1743097580000\",\"locale\":\"en-US\",\"namespaces\":[\"components/users/UserRegistrationDate\"]})":[{"__ref":"CachedAsset:text:en_US-components/users/UserRegistrationDate-1743097580000"}],"cachedText({\"lastModified\":\"1743097580000\",\"locale\":\"en-US\",\"namespaces\":[\"components/tags/TagView/TagViewChip\"]})":[{"__ref":"CachedAsset:text:en_US-components/tags/TagView/TagViewChip-1743097580000"}]},"CachedAsset:pages-1743753930903":{"__typename":"CachedAsset","id":"pages-1743753930903","value":[{"lastUpdatedTime":1743753930903,"localOverride":null,"page":{"id":"HowDoI.GetInvolved.MvpProgram","type":"COMMUNITY","urlPath":"/c/how-do-i/get-involved/mvp-program","__typename":"PageDescriptor"},"__typename":"PageResource"},{"lastUpdatedTime":1743753930903,"localOverride":null,"page":{"id":"BlogViewAllPostsPage","type":"BLOG","urlPath":"/category/:categoryId/blog/:boardId/all-posts/(/:after|/:before)?","__typename":"PageDescriptor"},"__typename":"PageResource"},{"lastUpdatedTime":1743753930903,"localOverride":null,"page":{"id":"CasePortalPage","type":"CASE_PORTAL","urlPath":"/caseportal","__typename":"PageDescriptor"},"__typename":"PageResource"},{"lastUpdatedTime":1743753930903,"localOverride":null,"page":{"id":"CreateGroupHubPage","type":"GROUP_HUB","urlPath":"/groups/create","__typename":"PageDescriptor"},"__typename":"PageResource"},{"lastUpdatedTime":1743753930903,"localOverride":null,"page":{"id":"CaseViewPage","type":"CASE_DETAILS","urlPath":"/case/:caseId/:caseNumber","__typename":"PageDescriptor"},"__typename":"PageResource"},{"lastUpdatedTime":1743753930903,"localOverride":null,"page":{"id":"InboxPage","type":"COMMUNITY","urlPath":"/inbox","__typename":"PageDescriptor"},"__typename":"PageResource"},{"lastUpdatedTime":1743753930903,"localOverride":null,"page":{"id":"HowDoI.GetInvolved.AdvocacyProgram","type":"COMMUNITY","urlPath":"/c/how-do-i/get-involved/advocacy-program","__typename":"PageDescriptor"},"__typename":"PageResource"},{"lastUpdatedTime":1743753930903,"localOverride":null,"page":{"id":"HowDoI.GetHelp.NonCustomer","type":"COMMUNITY","urlPath":"/c/how-do-i/get-help/non-customer","__typename":"PageDescriptor"},"__typename":"PageResource"},{"lastUpdatedTime":1743753930903,"localOverride":null,"page":{"id":"HelpFAQPage","type":"COMMUNITY","urlPath":"/help","__typename":"PageDescriptor"},"__typename":"PageResource"},{"lastUpdatedTime":1743753930903,"localOverride":null,"page":{"id":"HowDoI.GetHelp.F5Customer","type":"COMMUNITY","urlPath":"/c/how-do-i/get-help/f5-customer","__typename":"PageDescriptor"},"__typename":"PageResource"},{"lastUpdatedTime":1743753930903,"localOverride":null,"page":{"id":"IdeaMessagePage","type":"IDEA_POST","urlPath":"/idea/:boardId/:messageSubject/:messageId","__typename":"PageDescriptor"},"__typename":"PageResource"},{"lastUpdatedTime":1743753930903,"localOverride":null,"page":{"id":"IdeaViewAllIdeasPage","type":"IDEA","urlPath":"/category/:categoryId/ideas/:boardId/all-ideas/(/:after|/:before)?","__typename":"PageDescriptor"},"__typename":"PageResource"},{"lastUpdatedTime":1743753930903,"localOverride":null,"page":{"id":"LoginPage","type":"USER","urlPath":"/signin","__typename":"PageDescriptor"},"__typename":"PageResource"},{"lastUpdatedTime":1743753930903,"localOverride":null,"page":{"id":"BlogPostPage","type":"BLOG","urlPath":"/category/:categoryId/blogs/:boardId/create","__typename":"PageDescriptor"},"__typename":"PageResource"},{"lastUpdatedTime":1743753930903,"localOverride":null,"page":{"id":"HowDoI.GetInvolved","type":"COMMUNITY","urlPath":"/c/how-do-i/get-involved","__typename":"PageDescriptor"},"__typename":"PageResource"},{"lastUpdatedTime":1743753930903,"localOverride":null,"page":{"id":"HowDoI.Learn","type":"COMMUNITY","urlPath":"/c/how-do-i/learn","__typename":"PageDescriptor"},"__typename":"PageResource"},{"lastUpdatedTime":1739501996000,"localOverride":null,"page":{"id":"Test","type":"CUSTOM","urlPath":"/custom-test-2","__typename":"PageDescriptor"},"__typename":"PageResource"},{"lastUpdatedTime":1743753930903,"localOverride":null,"page":{"id":"ThemeEditorPage","type":"COMMUNITY","urlPath":"/designer/themes","__typename":"PageDescriptor"},"__typename":"PageResource"},{"lastUpdatedTime":1743753930903,"localOverride":null,"page":{"id":"TkbViewAllArticlesPage","type":"TKB","urlPath":"/category/:categoryId/kb/:boardId/all-articles/(/:after|/:before)?","__typename":"PageDescriptor"},"__typename":"PageResource"},{"lastUpdatedTime":1743753930903,"localOverride":null,"page":{"id":"OccasionEditPage","type":"EVENT","urlPath":"/event/:boardId/:messageSubject/:messageId/edit","__typename":"PageDescriptor"},"__typename":"PageResource"},{"lastUpdatedTime":1743753930903,"localOverride":null,"page":{"id":"OAuthAuthorizationAllowPage","type":"USER","urlPath":"/auth/authorize/allow","__typename":"PageDescriptor"},"__typename":"PageResource"},{"lastUpdatedTime":1743753930903,"localOverride":null,"page":{"id":"PageEditorPage","type":"COMMUNITY","urlPath":"/designer/pages","__typename":"PageDescriptor"},"__typename":"PageResource"},{"lastUpdatedTime":1743753930903,"localOverride":null,"page":{"id":"PostPage","type":"COMMUNITY","urlPath":"/category/:categoryId/:boardId/create","__typename":"PageDescriptor"},"__typename":"PageResource"},{"lastUpdatedTime":1743753930903,"localOverride":null,"page":{"id":"ForumBoardPage","type":"FORUM","urlPath":"/category/:categoryId/discussions/:boardId","__typename":"PageDescriptor"},"__typename":"PageResource"},{"lastUpdatedTime":1743753930903,"localOverride":null,"page":{"id":"TkbBoardPage","type":"TKB","urlPath":"/category/:categoryId/kb/:boardId","__typename":"PageDescriptor"},"__typename":"PageResource"},{"lastUpdatedTime":1743753930903,"localOverride":null,"page":{"id":"EventPostPage","type":"EVENT","urlPath":"/category/:categoryId/events/:boardId/create","__typename":"PageDescriptor"},"__typename":"PageResource"},{"lastUpdatedTime":1743753930903,"localOverride":null,"page":{"id":"UserBadgesPage","type":"COMMUNITY","urlPath":"/users/:login/:userId/badges","__typename":"PageDescriptor"},"__typename":"PageResource"},{"lastUpdatedTime":1743753930903,"localOverride":null,"page":{"id":"GroupHubMembershipAction","type":"GROUP_HUB","urlPath":"/membership/join/:nodeId/:membershipType","__typename":"PageDescriptor"},"__typename":"PageResource"},{"lastUpdatedTime":1743753930903,"localOverride":null,"page":{"id":"MaintenancePage","type":"COMMUNITY","urlPath":"/maintenance","__typename":"PageDescriptor"},"__typename":"PageResource"},{"lastUpdatedTime":1743753930903,"localOverride":null,"page":{"id":"IdeaReplyPage","type":"IDEA_REPLY","urlPath":"/idea/:boardId/:messageSubject/:messageId/comments/:replyId","__typename":"PageDescriptor"},"__typename":"PageResource"},{"lastUpdatedTime":1743753930903,"localOverride":null,"page":{"id":"UserSettingsPage","type":"USER","urlPath":"/mysettings/:userSettingsTab","__typename":"PageDescriptor"},"__typename":"PageResource"},{"lastUpdatedTime":1743753930903,"localOverride":null,"page":{"id":"GroupHubsPage","type":"GROUP_HUB","urlPath":"/groups","__typename":"PageDescriptor"},"__typename":"PageResource"},{"lastUpdatedTime":1743753930903,"localOverride":null,"page":{"id":"ForumPostPage","type":"FORUM","urlPath":"/category/:categoryId/discussions/:boardId/create","__typename":"PageDescriptor"},"__typename":"PageResource"},{"lastUpdatedTime":1743753930903,"localOverride":null,"page":{"id":"OccasionRsvpActionPage","type":"OCCASION","urlPath":"/event/:boardId/:messageSubject/:messageId/rsvp/:responseType","__typename":"PageDescriptor"},"__typename":"PageResource"},{"lastUpdatedTime":1743753930903,"localOverride":null,"page":{"id":"VerifyUserEmailPage","type":"USER","urlPath":"/verifyemail/:userId/:verifyEmailToken","__typename":"PageDescriptor"},"__typename":"PageResource"},{"lastUpdatedTime":1743753930903,"localOverride":null,"page":{"id":"AllOccasionsPage","type":"OCCASION","urlPath":"/category/:categoryId/events/:boardId/all-events/(/:after|/:before)?","__typename":"PageDescriptor"},"__typename":"PageResource"},{"lastUpdatedTime":1743753930903,"localOverride":null,"page":{"id":"EventBoardPage","type":"EVENT","urlPath":"/category/:categoryId/events/:boardId","__typename":"PageDescriptor"},"__typename":"PageResource"},{"lastUpdatedTime":1743753930903,"localOverride":null,"page":{"id":"TkbReplyPage","type":"TKB_REPLY","urlPath":"/kb/:boardId/:messageSubject/:messageId/comments/:replyId","__typename":"PageDescriptor"},"__typename":"PageResource"},{"lastUpdatedTime":1743753930903,"localOverride":null,"page":{"id":"IdeaBoardPage","type":"IDEA","urlPath":"/category/:categoryId/ideas/:boardId","__typename":"PageDescriptor"},"__typename":"PageResource"},{"lastUpdatedTime":1743753930903,"localOverride":null,"page":{"id":"CommunityGuideLinesPage","type":"COMMUNITY","urlPath":"/communityguidelines","__typename":"PageDescriptor"},"__typename":"PageResource"},{"lastUpdatedTime":1743753930903,"localOverride":null,"page":{"id":"CaseCreatePage","type":"SALESFORCE_CASE_CREATION","urlPath":"/caseportal/create","__typename":"PageDescriptor"},"__typename":"PageResource"},{"lastUpdatedTime":1743753930903,"localOverride":null,"page":{"id":"TkbEditPage","type":"TKB","urlPath":"/kb/:boardId/:messageSubject/:messageId/edit","__typename":"PageDescriptor"},"__typename":"PageResource"},{"lastUpdatedTime":1743753930903,"localOverride":null,"page":{"id":"ForgotPasswordPage","type":"USER","urlPath":"/forgotpassword","__typename":"PageDescriptor"},"__typename":"PageResource"},{"lastUpdatedTime":1743753930903,"localOverride":null,"page":{"id":"IdeaEditPage","type":"IDEA","urlPath":"/idea/:boardId/:messageSubject/:messageId/edit","__typename":"PageDescriptor"},"__typename":"PageResource"},{"lastUpdatedTime":1743753930903,"localOverride":null,"page":{"id":"TagPage","type":"COMMUNITY","urlPath":"/tag/:tagName","__typename":"PageDescriptor"},"__typename":"PageResource"},{"lastUpdatedTime":1743753930903,"localOverride":null,"page":{"id":"BlogBoardPage","type":"BLOG","urlPath":"/category/:categoryId/blog/:boardId","__typename":"PageDescriptor"},"__typename":"PageResource"},{"lastUpdatedTime":1743753930903,"localOverride":null,"page":{"id":"OccasionMessagePage","type":"OCCASION_TOPIC","urlPath":"/event/:boardId/:messageSubject/:messageId","__typename":"PageDescriptor"},"__typename":"PageResource"},{"lastUpdatedTime":1743753930903,"localOverride":null,"page":{"id":"ManageContentPage","type":"COMMUNITY","urlPath":"/managecontent","__typename":"PageDescriptor"},"__typename":"PageResource"},{"lastUpdatedTime":1743753930903,"localOverride":null,"page":{"id":"ClosedMembershipNodeNonMembersPage","type":"GROUP_HUB","urlPath":"/closedgroup/:groupHubId","__typename":"PageDescriptor"},"__typename":"PageResource"},{"lastUpdatedTime":1743753930903,"localOverride":null,"page":{"id":"HowDoI.GetHelp.Community","type":"COMMUNITY","urlPath":"/c/how-do-i/get-help/community","__typename":"PageDescriptor"},"__typename":"PageResource"},{"lastUpdatedTime":1743753930903,"localOverride":null,"page":{"id":"CommunityPage","type":"COMMUNITY","urlPath":"/","__typename":"PageDescriptor"},"__typename":"PageResource"},{"lastUpdatedTime":1743753930903,"localOverride":null,"page":{"id":"HowDoI.GetInvolved.ContributeCode","type":"COMMUNITY","urlPath":"/c/how-do-i/get-involved/contribute-code","__typename":"PageDescriptor"},"__typename":"PageResource"},{"lastUpdatedTime":1743753930903,"localOverride":null,"page":{"id":"ForumMessagePage","type":"FORUM_TOPIC","urlPath":"/discussions/:boardId/:messageSubject/:messageId","__typename":"PageDescriptor"},"__typename":"PageResource"},{"lastUpdatedTime":1743753930903,"localOverride":null,"page":{"id":"IdeaPostPage","type":"IDEA","urlPath":"/category/:categoryId/ideas/:boardId/create","__typename":"PageDescriptor"},"__typename":"PageResource"},{"lastUpdatedTime":1743753930903,"localOverride":null,"page":{"id":"BlogMessagePage","type":"BLOG_ARTICLE","urlPath":"/blog/:boardId/:messageSubject/:messageId","__typename":"PageDescriptor"},"__typename":"PageResource"},{"lastUpdatedTime":1743753930903,"localOverride":null,"page":{"id":"RegistrationPage","type":"USER","urlPath":"/register","__typename":"PageDescriptor"},"__typename":"PageResource"},{"lastUpdatedTime":1743753930903,"localOverride":null,"page":{"id":"EditGroupHubPage","type":"GROUP_HUB","urlPath":"/group/:groupHubId/edit","__typename":"PageDescriptor"},"__typename":"PageResource"},{"lastUpdatedTime":1743753930903,"localOverride":null,"page":{"id":"ForumEditPage","type":"FORUM","urlPath":"/discussions/:boardId/:messageSubject/:messageId/edit","__typename":"PageDescriptor"},"__typename":"PageResource"},{"lastUpdatedTime":1743753930903,"localOverride":null,"page":{"id":"ResetPasswordPage","type":"USER","urlPath":"/resetpassword/:userId/:resetPasswordToken","__typename":"PageDescriptor"},"__typename":"PageResource"},{"lastUpdatedTime":1743753930903,"localOverride":null,"page":{"id":"TkbMessagePage","type":"TKB_ARTICLE","urlPath":"/kb/:boardId/:messageSubject/:messageId","__typename":"PageDescriptor"},"__typename":"PageResource"},{"lastUpdatedTime":1743753930903,"localOverride":null,"page":{"id":"HowDoI.Learn.AboutIrules","type":"COMMUNITY","urlPath":"/c/how-do-i/learn/about-irules","__typename":"PageDescriptor"},"__typename":"PageResource"},{"lastUpdatedTime":1743753930903,"localOverride":null,"page":{"id":"BlogEditPage","type":"BLOG","urlPath":"/blog/:boardId/:messageSubject/:messageId/edit","__typename":"PageDescriptor"},"__typename":"PageResource"},{"lastUpdatedTime":1743753930903,"localOverride":null,"page":{"id":"HowDoI.GetHelp.F5Support","type":"COMMUNITY","urlPath":"/c/how-do-i/get-help/f5-support","__typename":"PageDescriptor"},"__typename":"PageResource"},{"lastUpdatedTime":1743753930903,"localOverride":null,"page":{"id":"ManageUsersPage","type":"USER","urlPath":"/users/manage/:tab?/:manageUsersTab?","__typename":"PageDescriptor"},"__typename":"PageResource"},{"lastUpdatedTime":1743753930903,"localOverride":null,"page":{"id":"ForumReplyPage","type":"FORUM_REPLY","urlPath":"/discussions/:boardId/:messageSubject/:messageId/replies/:replyId","__typename":"PageDescriptor"},"__typename":"PageResource"},{"lastUpdatedTime":1743753930903,"localOverride":null,"page":{"id":"PrivacyPolicyPage","type":"COMMUNITY","urlPath":"/privacypolicy","__typename":"PageDescriptor"},"__typename":"PageResource"},{"lastUpdatedTime":1743753930903,"localOverride":null,"page":{"id":"NotificationPage","type":"COMMUNITY","urlPath":"/notifications","__typename":"PageDescriptor"},"__typename":"PageResource"},{"lastUpdatedTime":1743753930903,"localOverride":null,"page":{"id":"UserPage","type":"USER","urlPath":"/users/:login/:userId","__typename":"PageDescriptor"},"__typename":"PageResource"},{"lastUpdatedTime":1743753930903,"localOverride":null,"page":{"id":"HealthCheckPage","type":"COMMUNITY","urlPath":"/health","__typename":"PageDescriptor"},"__typename":"PageResource"},{"lastUpdatedTime":1743753930903,"localOverride":null,"page":{"id":"OccasionReplyPage","type":"OCCASION_REPLY","urlPath":"/event/:boardId/:messageSubject/:messageId/comments/:replyId","__typename":"PageDescriptor"},"__typename":"PageResource"},{"lastUpdatedTime":1743753930903,"localOverride":null,"page":{"id":"ManageMembersPage","type":"GROUP_HUB","urlPath":"/group/:groupHubId/manage/:tab?","__typename":"PageDescriptor"},"__typename":"PageResource"},{"lastUpdatedTime":1743753930903,"localOverride":null,"page":{"id":"SearchResultsPage","type":"COMMUNITY","urlPath":"/search","__typename":"PageDescriptor"},"__typename":"PageResource"},{"lastUpdatedTime":1743753930903,"localOverride":null,"page":{"id":"BlogReplyPage","type":"BLOG_REPLY","urlPath":"/blog/:boardId/:messageSubject/:messageId/replies/:replyId","__typename":"PageDescriptor"},"__typename":"PageResource"},{"lastUpdatedTime":1743753930903,"localOverride":null,"page":{"id":"GroupHubPage","type":"GROUP_HUB","urlPath":"/group/:groupHubId","__typename":"PageDescriptor"},"__typename":"PageResource"},{"lastUpdatedTime":1743753930903,"localOverride":null,"page":{"id":"TermsOfServicePage","type":"COMMUNITY","urlPath":"/termsofservice","__typename":"PageDescriptor"},"__typename":"PageResource"},{"lastUpdatedTime":1743753930903,"localOverride":null,"page":{"id":"HowDoI.GetHelp","type":"COMMUNITY","urlPath":"/c/how-do-i/get-help","__typename":"PageDescriptor"},"__typename":"PageResource"},{"lastUpdatedTime":1743753930903,"localOverride":null,"page":{"id":"HowDoI.GetHelp.SecurityIncident","type":"COMMUNITY","urlPath":"/c/how-do-i/get-help/security-incident","__typename":"PageDescriptor"},"__typename":"PageResource"},{"lastUpdatedTime":1743753930903,"localOverride":null,"page":{"id":"CategoryPage","type":"CATEGORY","urlPath":"/category/:categoryId","__typename":"PageDescriptor"},"__typename":"PageResource"},{"lastUpdatedTime":1743753930903,"localOverride":null,"page":{"id":"ForumViewAllTopicsPage","type":"FORUM","urlPath":"/category/:categoryId/discussions/:boardId/all-topics/(/:after|/:before)?","__typename":"PageDescriptor"},"__typename":"PageResource"},{"lastUpdatedTime":1743753930903,"localOverride":null,"page":{"id":"TkbPostPage","type":"TKB","urlPath":"/category/:categoryId/kbs/:boardId/create","__typename":"PageDescriptor"},"__typename":"PageResource"},{"lastUpdatedTime":1743753930903,"localOverride":null,"page":{"id":"GroupHubPostPage","type":"GROUP_HUB","urlPath":"/group/:groupHubId/:boardId/create","__typename":"PageDescriptor"},"__typename":"PageResource"},{"lastUpdatedTime":1743753930903,"localOverride":null,"page":{"id":"HowDoI","type":"COMMUNITY","urlPath":"/c/how-do-i","__typename":"PageDescriptor"},"__typename":"PageResource"}],"localOverride":false},"CachedAsset:text:en_US-components/context/AppContext/AppContextProvider-0":{"__typename":"CachedAsset","id":"text:en_US-components/context/AppContext/AppContextProvider-0","value":{"noCommunity":"Cannot find community","noUser":"Cannot find current user","noNode":"Cannot find node with id {nodeId}","noMessage":"Cannot find message with id {messageId}"},"localOverride":false},"CachedAsset:text:en_US-shared/client/components/common/Loading/LoadingDot-0":{"__typename":"CachedAsset","id":"text:en_US-shared/client/components/common/Loading/LoadingDot-0","value":{"title":"Loading..."},"localOverride":false},"User:user:-1":{"__typename":"User","id":"user:-1","uid":-1,"login":"Former Member","email":"","avatar":null,"rank":null,"kudosWeight":1,"registrationData":{"__typename":"RegistrationData","status":"ANONYMOUS","registrationTime":null,"confirmEmailStatus":false,"registrationAccessLevel":"VIEW","ssoRegistrationFields":[]},"ssoId":null,"profileSettings":{"__typename":"ProfileSettings","dateDisplayStyle":{"__typename":"InheritableStringSettingWithPossibleValues","key":"layout.friendly_dates_enabled","value":"false","localValue":"true","possibleValues":["true","false"]},"dateDisplayFormat":{"__typename":"InheritableStringSetting","key":"layout.format_pattern_date","value":"dd-MMM-yyyy","localValue":"MM-dd-yyyy"},"language":{"__typename":"InheritableStringSettingWithPossibleValues","key":"profile.language","value":"en-US","localValue":null,"possibleValues":["en-US"]}},"deleted":false},"Theme:customTheme1":{"__typename":"Theme","id":"customTheme1"},"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/bi04Ny0xOTQ1NWk4ODNCOUNEMkFDNDZCQjI0\"}":{"__typename":"AssociatedImage","url":"https://community.f5.com/t5/s/zihoc95639/images/bi04Ny0xOTQ1NWk4ODNCOUNEMkFDNDZCQjI0","mimeType":"image/png"},"Category:category:CrowdSRC":{"__typename":"Category","id":"category:CrowdSRC","entityType":"CATEGORY","displayId":"CrowdSRC","nodeType":"category","depth":1,"title":"CrowdSRC","shortTitle":"CrowdSRC","parent":{"__ref":"Category:category:top"},"categoryPolicies":{"__typename":"CategoryPolicies","canReadNode":{"__typename":"PolicyResult","failureReason":null}}},"Category:category:top":{"__typename":"Category","id":"category:top","displayId":"top","nodeType":"category","depth":0,"title":"Top","entityType":"CATEGORY","shortTitle":"Top"},"Tkb:board:codeshare":{"__typename":"Tkb","id":"board:codeshare","entityType":"TKB","displayId":"codeshare","nodeType":"board","depth":2,"conversationStyle":"TKB","title":"CodeShare","description":"Have some code. Share some code.","avatar":{"__ref":"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/bi04Ny0xOTQ1NWk4ODNCOUNEMkFDNDZCQjI0\"}"},"profileSettings":{"__typename":"ProfileSettings","language":null},"parent":{"__ref":"Category:category:CrowdSRC"},"ancestors":{"__typename":"CoreNodeConnection","edges":[{"__typename":"CoreNodeEdge","node":{"__ref":"Community:community:zihoc95639"}},{"__typename":"CoreNodeEdge","node":{"__ref":"Category:category:CrowdSRC"}}]},"userContext":{"__typename":"NodeUserContext","canAddAttachments":false,"canUpdateNode":false,"canPostMessages":false,"isSubscribed":false},"boardPolicies":{"__typename":"BoardPolicies","canPublishArticleOnCreate":{"__typename":"PolicyResult","failureReason":{"__typename":"FailureReason","message":"error.lithium.policies.forums.policy_can_publish_on_create_workflow_action.accessDenied","key":"error.lithium.policies.forums.policy_can_publish_on_create_workflow_action.accessDenied","args":[]}},"canReadNode":{"__typename":"PolicyResult","failureReason":null}},"shortTitle":"CodeShare","isManualSortOrderAvailable":false,"tkbPolicies":{"__typename":"TkbPolicies","canReadNode":{"__typename":"PolicyResult","failureReason":null}},"repliesProperties":{"__typename":"RepliesProperties","sortOrder":"PUBLISH_TIME","repliesFormat":"threaded"},"eventPath":"category:CrowdSRC/community:zihoc95639board:codeshare/","tagProperties":{"__typename":"TagNodeProperties","tagsEnabled":{"__typename":"PolicyResult","failureReason":null}},"requireTags":true,"tagType":"FREEFORM_AND_PRESET"},"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/cmstMjgtQ3U0RXo2\"}":{"__typename":"AssociatedImage","url":"https://community.f5.com/t5/s/zihoc95639/images/cmstMjgtQ3U0RXo2","height":0,"width":0,"mimeType":"image/svg+xml"},"Rank:rank:28":{"__typename":"Rank","id":"rank:28","position":5,"name":"Employee","color":"C20025","icon":{"__ref":"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/cmstMjgtQ3U0RXo2\"}"},"rankStyle":"OUTLINE"},"User:user:322278":{"__typename":"User","id":"user:322278","uid":322278,"login":"PeteWhite","deleted":false,"avatar":{"__typename":"UserAvatar","url":"https://community.f5.com/t5/s/zihoc95639/m_assets/avatars/default/avatar-5.svg?time=0"},"rank":{"__ref":"Rank:rank:28"},"email":"","messagesCount":832,"biography":null,"topicsCount":25,"kudosReceivedCount":101,"kudosGivenCount":14,"kudosWeight":1,"registrationData":{"__typename":"RegistrationData","status":null,"registrationTime":"2019-05-16T04:49:31.000-07:00","confirmEmailStatus":null},"followersCount":null,"solutionsCount":29,"entityType":"USER","eventPath":"community:zihoc95639/user:322278"},"TkbTopicMessage:message:285011":{"__typename":"TkbTopicMessage","uid":285011,"subject":"Radware config translation","id":"message:285011","revisionNum":3,"repliesCount":30,"author":{"__ref":"User:user:322278"},"depth":0,"hasGivenKudo":false,"helpful":null,"board":{"__ref":"Tkb:board:codeshare"},"conversation":{"__ref":"Conversation:conversation:285011"},"messagePolicies":{"__typename":"MessagePolicies","canPublishArticleOnEdit":{"__typename":"PolicyResult","failureReason":{"__typename":"FailureReason","message":"error.lithium.policies.forums.policy_can_publish_on_edit_workflow_action.accessDenied","key":"error.lithium.policies.forums.policy_can_publish_on_edit_workflow_action.accessDenied","args":[]}},"canModerateSpamMessage":{"__typename":"PolicyResult","failureReason":{"__typename":"FailureReason","message":"error.lithium.policies.feature.moderation_spam.action.moderate_entity.allowed.accessDenied","key":"error.lithium.policies.feature.moderation_spam.action.moderate_entity.allowed.accessDenied","args":[]}}},"contentWorkflow":{"__typename":"ContentWorkflow","state":"PUBLISH","scheduledPublishTime":null,"scheduledTimezone":null,"userContext":{"__typename":"MessageWorkflowContext","canSubmitForReview":null,"canEdit":false,"canRecall":null,"canSubmitForPublication":null,"canReturnToAuthor":null,"canPublish":null,"canReturnToReview":null,"canSchedule":false},"shortScheduledTimezone":null},"readOnly":false,"editFrozen":false,"moderationData":{"__ref":"ModerationData:moderation_data:285011"},"teaser":"","body":"
Problem this snippet solves:
This is a simple Python script that translates Radware text configuration file and outputs as config snippet and certificate files.
The script will also output the certificates and keys which should be uploaded to the BIG-IP /var/tmp directory and run file check_certs.sh and load_certs.sh to check and load the certs and keys.
\n
Works with Python v2 and v3.
\n
If you want something to be added then message me with details of the text and i will try to add it.
\n
Feel free to add or change anything
Code :
#!/usr/bin/env python\n# v1.1 14/3/2018 Deal with lack of text in monitors ( line 157 )\n# v2 3/1/2019 Updated after changes suggested by Avinash Piare\n# v3 6/11/2019 Updated to deal with \\\\r\\n at the end of the line\n# v3.1 6/11/2019 Minor changes to handle VS names with spaces\n# 3.4 18/4/2020 Fixed minor issues\n# Peter White 6/11/2019\n# usage ./rad2f5 [partition]\nimport sys\nimport re\nimport textwrap\nimport ipaddress\n\nprint (\"Running with Python v\" + sys.version)\n\n# Set debug to true to output the workings of the script ie the arrays etc\ndebug = False\n\ndef parse_options(options):\n # Function to split options and return a dict containing option and value\n # Example: -pl 27 -v 123 -pa 172.28.1.234\n # Return: { 'pl':'27', 'v':'123', 'pa':'172.28.1.234' }\n output = dict()\n # Deal with non-quotes eg -b 12345\n for r in re.finditer(r'-(\\w{1,3}) (\\S+)',options):\n output[r.group(1)] = r.group(2)\n # Deal with quotes eg -u \"User Name\"\n for v in re.finditer(r'-(\\w{1,3}) (\".+\")',options):\n output[v.group(1)] = v.group(2)\n return output\n\ndef splitvars(vars):\n # Split a string on | and then =, return a dict of ABC=XYZ\n # eg HDR=User-Agent|TKN=Googlebot-Video/1.0|TMATCH=EQ|\n # Return is { 'HDR':'User-Agent','TKN': 'Googlebot-Video/1.0', 'TMATCH': 'EQ' }\n vlist = vars.split(\"|\")\n o = {}\n for v in vlist:\n if v == '':\n continue\n w = v.split(\"=\")\n if len(w) > 1:\n o[w[0]] = w[1]\n else:\n o[w[0]] = ''\n return o \n \ndef array_add(a,d):\n # Function to safely add to an array\n #global a\n if not len(a):\n a = [ d ]\n else:\n a.append( d )\n return a\n \ndef setup_pools(name):\n global pools\n if not name in pools:\n pools[name] = { 'destinations': [], 'member-disabled': [], 'member-ids': [], 'priority-group': [] }\n else:\n if not 'destinations' in pools[name]:\n pools[name]['destinations'] = []\n if not 'member-disabled' in pools[name]:\n pools[name]['member-disabled'] = []\n if not 'member-ids' in pools[name]:\n pools[name]['member-ids'] = []\n if not 'priority-group' in pools[name]:\n pools[name]['priority-group'] = [] \n\ndef getVsFromPool(poolname):\n # This retrieves the names of virtual servers that use a specific pool\n global farm2vs\n if poolname in farm2vs:\n return farm2vs[poolname]\n else:\n return False\n\ndef is_ipv6(ip):\n if ':' in ip:\n return True\n else:\n return False\n\n# Check there is an argument given\nif not len(sys.argv) > 1:\n exit(\"Usage: rad2f5 [partition]\")\nif len(sys.argv) > 2:\n # Second command-line variable is the partition\n partition = \"/\" + sys.argv[2] + \"/\"\n print (\"Using partition \" + partition)\nelse:\n partition = \"/Common/\"\n \n# Check input file\nfh = open(sys.argv[1],\"r\")\nif not fh:\n exit(\"Cannot open file \" + argv[1])\nrawfile = fh.read()\n\n# v2\n# Remove any instances of slash at the end of line\n# eg health-monitoring check create\\\n# HC_DNS -id 5 -m DNS -p 53 -a \\\n#HOST=ns.domain.com|ADDR=1.1.1.1| -d 2.2.2.2\n#file = re.sub('^security certificate table\\\\\\\\\\n','',rawfile)\nfile = re.sub('\\\\\\\\\\n','',rawfile)\nfile = re.sub('\\\\\\\\\\r\\n','',file)\n\n################ LACP trunks ##########################\n#\n#\n#\n#############################################################\n#net linkaggr trunks set T-1 -lap G-13,G-14 -lam Manual -lat Fast -law 3 -laa 32767\ntrunks = {}\nfor r in re.finditer(r'net linkaggr trunks set (\\S+) (.+)',file):\n name = r.group(1)\n options = parse_options(r.group(2))\n if 'lap' in options:\n # Manage interfaces\n ints = options['lap'].split(',')\n trunks[name] = { 'interfaces': ints } \nprint (\"LACP trunks:\" + str(len(trunks)))\nif debug:\n print('DEBUG LACP trunks: ' + str(trunks))\n\n################ IP routes ##########################\n#\n#\n#\n#############################################################\nroutes = {}\nfor r in re.finditer(r'net route table create (\\S+) (\\S+) (\\S+) (\\S+)',file):\n if r.group(1) == '0.0.0.0':\n name = 'default'\n else:\n name = r.group(1) + \"_\" + r.group(2)\n routes[name] = { 'network': r.group(1), 'mask': r.group(2), 'gateway': r.group(3), 'interface': r.group(4)} \nprint (\"IP routes:\" + str(len(routes)))\nif debug:\n print('DEBUG routes: ' + str(routes))\n\n################ Non-floating self-IPs ###############\n#\n#\n#\n# \n#############################################################\nselfIpNonFloating = {}\nfor s in re.finditer(r'net ip-interface create (\\S+) (\\S+) (.+)',file):\n output = { 'interface': s.group(2) }\n opts = parse_options(s.group(3))\n if 'pl' in opts:\n output['mask'] = opts['pl']\n if 'v' in opts:\n output['vlan'] = opts['v']\n if 'pa' in opts:\n output['peerAddress'] = opts['pa']\n selfIpNonFloating[s.group(1)] = output\nprint (\"Non-floating IP interfaces:\" + str(len(selfIpNonFloating)))\nif debug:\n print(\"DEBUG non-floating IPs: \" + str(selfIpNonFloating))\n\n\n################ Floating self-IPs ###################\n#\n#\n# \n#############################################################\nselfIpFloating = {}\nfor s in re.finditer(r'redundancy vrrp virtual-routers create (\\S+) (\\S+) (\\S+) (.+)',file):\n output = { 'version': s.group(1),'interface': s.group(3), 'ipAddresses': []}\n opts = parse_options(s.group(4))\n #if 'as' in opts:\n # Enabled - assume all are enabled\n if 'pip' in opts:\n output['peerIpAddress'] = opts['pip']\n selfIpFloating[s.group(2)] = output\n\n# Retrieve IP addresses for Floating self-IPs\n#\nfor s in re.finditer(r'redundancy vrrp associated-ip create (\\S+) (\\S+) (\\S+) (\\S+)',file):\n selfIpFloating[s.group(2)]['ipAddresses'] = array_add(selfIpFloating[s.group(2)]['ipAddresses'],s.group(4))\nprint (\"Floating IP interfaces:\" + str(len(selfIpFloating)))\nif debug:\n print(\"DEBUG Floating IPs: \" + str(selfIpFloating))\n\n\n################ Monitors ###########################\n#\n# -m XYZ is the monitor type may or may not be present ( not present for icmp type )\n# -id is the monitor ID, -p is the port, -d is the destination\n# \n#############################################################\nmonitors = {}\nfor m in re.finditer(r'health-monitoring check create (\\S+) (.+)',file):\n output = { 'name': m.group(1) }\n opts = parse_options(m.group(2))\n if 'id' in opts:\n id = opts['id']\n else:\n print (\"No ID for monitor \" + m.group(1))\n continue\n if 'm' in opts:\n output['type'] = opts['m']\n else:\n output['type'] = 'icmp'\n if 'a' in opts:\n output['text'] = opts['a']\n else:\n # Added in v2\n output['text'] = ''\n if 'p' in opts:\n output['port'] = opts['p']\n else:\n output['port'] = ''\n monitors[id] = output\n\nprint (\"Monitors:\" + str(len(monitors)))\nif debug:\n print(\"DEBUG Monitors:\" + str(monitors))\n\n################ Virtual Servers #####################\n#\n# 0 = name, 1= IP, 2=protocol, 3=port, 4=source 5=options\n# -ta = type, -ht = http policy, -fn = pool name, -sl = ssl profile name, -ipt = translation?\n# -po = policy name\n# \n#############################################################\nfarm2vs = {}\nvirtuals = {}\nsnatPools = {}\nfor v in re.finditer(r'appdirector l4-policy table create (\\S+) (\\S+) (\\S+) (\\S+) (\\S+) (.*)',file):\n # Puke if VS has quotes\n if v.group(1).startswith('\"'):\n name = v.group(1).strip('\"').replace(' ','_') + v.group(2).strip('\"').replace(' ','_')\n address,protocol,port = v.group(3),v.group(4),v.group(5)\n source = v.group(6).split(' ')[0]\n options = ' '.join(v.group(6).split(' ')[1:])\n else:\n name,address,protocol,port,source,options = v.group(1),v.group(2),v.group(3),v.group(4),v.group(5),v.group(6)\n opts = parse_options(options)\n # Get rid of ICMP virtual servers\n if protocol == 'ICMP':\n continue\n \n print (\"Name \" + name + \" has quotes, address: \" + address + \" protocol: \" + protocol)\n if port == 'Any':\n port = '0'\n output = {'source': source, 'destination': address + \":\" + port, 'protocol': protocol, 'port': port }\n if 'fn' in opts:\n output['pool'] = opts['fn']\n if not opts['fn'] in farm2vs:\n farm2vs[opts['fn']] = []\n farm2vs[opts['fn']].append(name)\n output['port'] = port\n if 'po' in opts:\n output['policy'] = opts['po']\n if 'ipt' in opts:\n output['snat'] = 'snatpool_' + opts['ipt']\n if not 'snatpool_' + opts['ipt'] in snatPools:\n #Create snatpool\n snatPools['snatpool_' + opts['ipt']] = { 'members': [opts['ipt']] }\n \n # Set the correct profiles\n profiles = []\n # Layer 4\n if protocol == \"TCP\" or protocol == \"UDP\":\n profiles.append(protocol.lower())\n else:\n profiles.append('ipother')\n # http\n if port == '80' or port == '8080':\n profiles.append('http')\n profiles.append('oneconnect')\n\n # ftp\n if port == '21':\n profiles.append('ftp')\n\n # RADIUS\n if port == '1812' or port == '1813':\n profiles.append('radius')\n\n # SSL\n if 'sl' in opts:\n profiles.append(opts['sl'])\n profiles.append('http')\n profiles.append('oneconnect')\n output['profiles'] = profiles\n # \n virtuals[name] = output\n \nprint (\"Virtual Servers:\" + str(len(virtuals)))\nif debug:\n print(\"DEBUG Virtual Servers:\" + str(virtuals))\n #print(\"DEBUG Farm to VS Mapping:\" + str(farm2vs))\n\n \n\n################ Pools ###############################\n#\n# Pools config options are distributed across multiple tables\n# This sets the global config such as load balancing algorithm\n# -dm This sets the distribution method. cyclic = Round Robin, Fewest Number of Users = least conn, Weighted Cyclic = ratio, Response Time = fastest\n# -as this is the admin state\n# -cm is the checking method ie monitor\n# -at is the activation time\n#############################################################\npools = {}\nfor p in re.finditer(r'appdirector farm table setCreate (\\S+) (.*)',file):\n name = p.group(1)\n setup_pools(name)\n opts = parse_options(p.group(2))\n output = {}\n # Admin state\n output['poolDisabled'] = False\n if 'as' in opts:\n if opts['as'] == 'Disabled':\n output['poolDisabled'] = True \n # Deal with distribution methods\n method = 'round-robin'\n if 'dm' in opts:\n if opts['dm'] == '\"Fewest Number of Users\"':\n method = 'least-conn'\n elif opts['dm'] == 'Hashing':\n method = 'hash'\n else:\n method = 'round-robin'\n output['lbMethod'] = method\n \n if 'at' in opts:\n output['slowRamp'] = opts['at']\n pools[name] = output\n# This sets the pool members\n# 0=name, 1=node, 2=node address, 3=node port, 4=? -id =id -sd ? -as admin state eg Disable, -om operation mode eg Backup ( fallback server ), -rt backup server address 0.0.0.0\nfor p in re.finditer(r'appdirector farm server table create (\\S+) (\\S+) (\\S+) (\\S+) (\\S+) (.*)',file):\n name,node,node_address,node_port,node_hostname = p.group(1),p.group(2),p.group(3),p.group(4),p.group(5)\n opts = parse_options(p.group(6))\n setup_pools(name)\n if node_port == 'None':\n node_port = '0'\n pools[name]['destinations'] = array_add(pools[name]['destinations'],node_address + \":\" + node_port)\n # Manage monitor\n if node_port == '80' or node_port == '8080':\n monitor = 'http'\n elif node_port == '443':\n monitor = 'https'\n elif node_port == '53':\n monitor = 'dns'\n elif node_port == '21':\n monitor = 'ftp'\n elif node_port == '0':\n monitor = 'gateway-icmp'\n else:\n monitor = 'tcp'\n pools[name]['monitor'] = monitor\n \n # Retrieve pool member ID\n if 'id' in opts:\n pools[name]['member-ids'] = array_add(pools[name]['member-ids'],opts['id'])\n else:\n print (\"ID not found for pool \" + name)\n \n # Check if member is disabled\n if 'as' in opts and opts['as'] == 'Disabled':\n # This pool member is disabled\n pools[name]['member-disabled'] = array_add(pools[name]['member-disabled'],True)\n else:\n pools[name]['member-disabled'] = array_add(pools[name]['member-disabled'],False)\n \n # Check if member is backup ie Priority Groups\n if 'om' in opts and opts['om'] == 'Backup':\n pools[name]['priority-group'] = array_add(pools[name]['priority-group'],20)\n else:\n pools[name]['priority-group'] = array_add(pools[name]['priority-group'],0)\n\n \n \nprint (\"Pools:\" + str(len(pools)) )\nif debug:\n print(\"DEBUG pools: \" + str(pools))\n\n################ SSL certificates ###################\n#\n#\n#Name: certificate_name \\\n#Type: certificate \\\n#-----BEGIN CERTIFICATE----- \\\n#MIIEcyFCA7agAwIAAgISESFWs9QGF\n# \n#############################################################\ncerts = {}\nfor r in re.finditer(r'Name: (\\S+) Type: (\\S+) (-----BEGIN CERTIFICATE-----.+?-----END CERTIFICATE-----)',file):\n name,type,text = r.group(1),r.group(2),r.group(3)\n certs[name] = { 'type': type,'text': text.replace(' \\\\\\r\\n','') }\n # Print out to file or something\nprint (\"SSL Certificates: \" + str(len(certs)))\nif debug:\n print(\"DEBUG certs: \" + str(certs))\n \n################ SSL Keys ###################\n#\n#\n#Name: New_Root_Cert Type: key Passphrase: -----BEGIN RSA PRIVATE KEY----- Proc-Type: 4,ENCRYPTED DEK-Info: [key] [key] -----END RSA PRIVATE KEY----- \\\n# \n#############################################################\nkeys = {}\n# Keys with passphrase\nfor r in re.finditer(r'Name: (\\S+) Type: key Passphrase: (\\S+) (-----BEGIN RSA PRIVATE KEY-----.+?-----END RSA PRIVATE KEY-----)',file):\n name,passphrase,text = r.group(1),r.group(2),r.group(3)\n keys[name] = { 'passphrase': passphrase,'text': text.replace(' \\\\\\r\\n','') }\n# Keys without passphrase\nfor r in re.finditer(r'Name: (\\S+) Type: key (-----BEGIN RSA PRIVATE KEY-----.+?-----END RSA PRIVATE KEY-----)',file):\n name,text = r.group(1),r.group(2)\n keys[name] = { 'text': text.replace(' \\\\\\r\\n','') }\nprint (\"SSL Keys: \" + str(len(keys)))\nif debug:\n print(\"DEBUG SSL keys: \" + str(keys))\n\n################ SSL profiles ########################\n#\n# -c is cert, -u is ciphers, -t is chain cert, -fv - versions\n##############################################################\nsslProfiles = {}\nfor s in re.finditer(r'^appdirector l4-policy ssl-policy create (\\S+) (.+)',file.replace('\\\\\\r\\n',''),re.MULTILINE):\n name = s.group(1)\n output = {}\n opts = parse_options(s.group(2))\n if 'c' in opts:\n # Certificate\n output['certificate'] = opts['c']\n if 't' in opts:\n # Chain cert\n output['chaincert'] = opts['t']\n if 'fv' in opts:\n # TLS Version\n output['version'] = opts['fv']\n if 'u' in opts:\n # User-defined Ciphers\n output['cipher'] = opts['u']\n if 'lp' in opts:\n # ?\n output['lp'] = opts['lp']\n if 'pa' in opts:\n # ?\n output['pa'] = opts['pa']\n if 'cb' in opts:\n # ?\n output['cb'] = opts['cb']\n if 'i' in opts:\n # Backend SSL Cipher -> Values: Low, Medium, High, User Defined\n output['i'] = opts['i']\n if 'bs' in opts:\n # Backend SSL in use ie serverSSL\n output['serverssl'] = opts['bs']\n \n sslProfiles[name] = output\nprint (\"SSL profiles: \" + str(len(sslProfiles)))\nif debug:\n print(\"DEBUG SSL Profiles: \" + str(sslProfiles))\n \n################ SNAT pools ##########################\n# \n# Note that this only works for addresses in the same /24 subnet\n#############################################################\n\nfor s in re.finditer(r'appdirector nat client address-range create (\\S+) (\\S+)',file):\n name = s.group(1)\n if sys.version.startswith('2'):\n start = ipaddress.ip_address(unicode(name,'utf_8'))\n end = ipaddress.ip_address(unicode(s.group(2),'utf_8'))\n else:\n start = ipaddress.ip_address(name)\n end = ipaddress.ip_address(s.group(2))\n current = start\n ipAddresses = []\n while current <= end:\n ipAddresses.append(str(current))\n current += 1\n snatPools['snatpool_' + name] = { 'members': ipAddresses }\nprint (\"SNAT Pools:\" + str(len(snatPools)))\nif debug:\n print(\"DEBUG SNAT Pools: \" + str(snatPools))\n####################################################################\n\n\n\n################ Layer 7 functions ##########################\n#\n# \n####################################################################\nl7rules = { }\nfor r in re.finditer(r'appdirector l7 farm-selection method-table setCreate (\\S+) (.+)',file):\n name = r.group(1)\n l7rules[name] = { 'match': [], 'action': [] }\n opts = parse_options(r.group(2))\n if 'cm' in opts and opts['cm'] == '\"Header Field\"' and 'ma' in opts:\n # This is a rule to insert a header\n params = splitvars(opts['ma'])\n if 'HDR' in params and 'TKN' in params:\n if params['TKN'] == \"$Client_IP\":\n params['TKN'] = '[IP::client_addr]'\n l7rules[name]['action'].append(\"http-header\\ninsert\\nname \" + params['HDR'] + \"\\nvalue \" + params['TKN'])\n \n if 'cm' in opts and opts['cm'] == 'URL' and 'ma' in opts:\n # This does a match on Host and URL\n params = splitvars(opts['ma'])\n if 'HN' in params:\n l7rules[name]['match'].append(\"http-host\\nhost\\nvalues { \" + params['HN'] + \" }\")\n if 'P' in params:\n l7rules[name]['match'].append(\"http-uri\\npath\\nvalues { \" + params['P'] + \" }\")\n \n if 'cm' in opts and opts['cm'] == '\"Regular Expression\"' and 'ma' in opts:\n params = splitvars(opts['ma'])\n if 'EXP' in params and params['EXP'] == '.':\n # This is a regex which matches everything\n print (\"REGEX: \" + name)\n else:\n print (\"WARNING! Found L7 Regular Expression at \\\"appdirector l7 farm-selection method-table setCreate \" + name + \"\\\". Manually set the match in output config.\")\n\n# Note that there can be multiple entries ie multiple rules per policy\nl7policies = {}\nfor p in re.finditer(r'appdirector l7 farm-selection policy-table setCreate (\\S+) (\\d+) (.+)',file):\n name = p.group(1)\n precedence = p.group(2)\n opts = parse_options(p.group(3))\n \n if 'fn' in opts:\n farm = opts['fn']\n else:\n farm = ''\n if 'm1' in opts:\n rule = opts['m1']\n if 'pa' in opts:\n # Retain HTTP Persistency (PRSST)-If the argument is ON (or undefined), AppDirector maintains HTTP 1.1\n # HTTP Redirect To (RDR)-Performs HTTP redirection to the specified name or IP address.\n # HTTPS Redirect To (RDRS)-AppDirector redirects the HTTP request to the specified name or IP address and modifies the request to a HTTPS request.\n # Redirection Code (RDRC)-Defines the code to be used for redirection.\n # RDRC=PRMN stand for Permanent I assume , as in HTTP 301\n # SIP Redirect To (RDRSIP)-Performs SIP redirection to the specified name or IP address.\n \n params = splitvars(opts['pa'])\n if 'RDR' in params:\n url = 'http://' + params['RDR']\n elif 'RDRS' in params:\n url = 'https://' + params['RDRS']\n else:\n url = ''\n \n if not name in l7policies:\n l7policies[name] = []\n if rule in l7rules:\n if farm != '':\n l7rules[rule]['action'].append(\"forward\\nselect\\npool \" + farm)\n elif url != '':\n l7rules[rule]['action'].append(\"http-redirect\\nhost \" + url)\n l7policies[name].append({ 'precedence': precedence, 'farm': farm, 'rule': rule })\n\nprint (\"Layer 7 rules:\" + str(len(l7rules)))\nprint (\"Layer 7 policies:\" + str(len(l7policies)))\n\nif debug:\n print(\"DEBUG L7 rules: \" + str(l7rules))\n print(\"DEBUG L7 policies: \" + str(l7policies))\n\n#\n# We have retrieved the required configuration from the input file \n# Now start outputting the config\n\n\n\n\n################# output SSL certificates import script ######################\n#\n#\n########################################################################\nif len(certs):\n print (\"-- Creating SSL certs and keys --\")\n with open(\"load_certs.sh\",'w') as loadScript:\n loadScript.write(\"#!/bin/bash\\n# Script to load SSL certs and keys from /var/tmp\\n\")\n ##### Manage Certificates ########\n for cert in certs:\n # Write certs to load_certs.sh\n if certs[cert]['type'] == 'certificate' or certs[cert]['type'] == 'interm':\n loadScript.write(\"tmsh install sys crypto cert \" + partition + cert + \".crt from-local-file /var/tmp/\" + cert + \".crt\\n\")\n \n # Create the certificate files\n with open(cert + \".crt\",\"w\") as certFile:\n for m in re.finditer(r'(-----BEGIN CERTIFICATE-----)\\s?(.+)\\s?(-----END CERTIFICATE-----)',certs[cert]['text']):\n certFile.write(m.group(1) + \"\\n\")\n certFile.write(textwrap.fill(m.group(2),64) + \"\\n\")\n certFile.write(m.group(3) + \"\\n\")\n print (\"Created SSL certificate file \" + cert + \".crt\")\n ##### Manage Keys #################\n for key in keys:\n # Write keys to load_certs.sh\n loadScript.write(\"tmsh install sys crypto key \" + partition + key + \".key\")\n if 'passphrase' in keys[key]:\n loadScript.write(\" passphrase \" + keys[key]['passphrase'])\n loadScript.write(\" from-local-file /var/tmp/\" + key + \".key\\n\")\n \n \n # Create the key files\n with open(key + \".key\",\"w\") as keyFile:\n for n in re.finditer(r'(-----BEGIN RSA PRIVATE KEY-----)(.+)(-----END RSA PRIVATE KEY-----)',keys[key]['text']):\n keyFile.write(n.group(1) + \"\\n\")\n if 'Proc-Type:' in n.group(2) and 'DEK-Info:' in n.group(2):\n # File is encrypted, separate the first lines\n for o in re.finditer(r'(Proc-Type: \\S+) (DEK-Info: \\S+) (.+)',n.group(2)):\n keyFile.write(o.group(1) + \"\\n\")\n keyFile.write(o.group(2) + \"\\n\\n\")\n keyFile.write(textwrap.fill(o.group(3),64) + \"\\n\")\n else:\n # File is not encrypted, output as it is\n keyFile.write(textwrap.fill(n.group(2),64) + \"\\n\")\n keyFile.write(n.group(3) + \"\\n\")\n print (\"Created SSL key file \" + key + \".key\")\n print (\"-- Finished creating SSL certs and keys --\")\n print (\"!! Copy all .crt and .key SSL files to BIG-IP /var/tmp and use load_certs.sh to load !!\" )\n #######################################################################\n\n ################# output SSL certificates checking script ######################\n #\n #\n ########################################################################\n with open(\"check_certs.sh\",'w') as checkScript:\n checkScript.write(\"#!/bin/bash\\n# Script to check SSL certs and keys\\n\")\n checkScript.write(\"\\n# Check SSL Certs\\n\")\n for cert in certs:\n if certs[cert]['type'] == 'certificate' or certs[cert]['type'] == 'interm':\n checkScript.write(\"openssl x509 -in \" + cert + \".crt -noout || echo \\\"Error with file \" + cert + \".crt\\\"\\n\")\n \n checkScript.write(\"\\n# Check SSL Keys\\n\")\n for key in keys:\n checkScript.write(\"openssl rsa -in \" + key + \".key -check || echo \\\"Error with file \" + key + \".key\\\"\\n\")\n \n print (\"!! Run the check_certs.sh script to check the certificates are valid !!\" )\n#######################################################################\n\n#\n#\n#\n#\n#\n#\n#\n#\nprint (\"\\n\\n\\n\\n\\n\\n# Configuration \\n#--------------------------------------#\")\n################# output policy config #####################\n#\n#\n#############################################################\n#print (\"L7 rules: \" + str(l7rules))\nfor i in l7policies.keys():\n output = \"ltm policy \" + partition + i + \" {\\n\\tcontrols { forwarding }\\n\\trequires { http }\\n\\t\"\n output += \"rules {\\n\\t\"\n ordinal = 1\n for j in l7policies[i]:\n output += \"\\t\" + j['rule'] + \" { \\n\"\n if len(l7rules[j['rule']]['match']):\n # Deal with conditions\n output += \"\\t\\t\\tconditions { \\n\"\n l = 0\n for k in l7rules[j['rule']]['match']:\n output += \"\\t\\t\\t\\t\" + str(l) + \" { \\n\\t\\t\\t\\t\\t\" + k.replace('\\n','\\n\\t\\t\\t\\t\\t')\n l += 1\n output += \"\\n\\t\\t\\t\\t }\\n\"\n output += \"\\n\\t\\t\\t }\\n\"\n if len(l7rules[j['rule']]['action']):\n # Deal with actions\n output += \"\\t\\t\\tactions { \\n\"\n m = 0\n for n in l7rules[j['rule']]['action']:\n output += \"\\t\\t\\t\\t\" + str(m) + \" { \\n\\t\\t\\t\\t\\t\" + n.replace('\\n','\\n\\t\\t\\t\\t\\t') \n m += 1\n output += \"\\n\\t\\t\\t\\t }\\n\"\n output += \"\\n\\t\\t\\t }\\n\"\n output += \"\\t\\tordinal \" + str(ordinal)\n output += \"\\n\\t\\t}\\n\\t\"\n ordinal += 1\n output += \"\\n\\t}\\n}\\n\"\n print (output)\n\n\n################# output LACP trunk config ##############\n#\n#\n#############################################################\nfor trunk in trunks.keys():\n output = \"net trunk \" + partition + trunk + \" {\\n\"\n if 'interfaces' in trunks[trunk]:\n output += \"\\tinterfaces {\\n\"\n for int in trunks[trunk]['interfaces']:\n output += \"\\t\\t\" + int + \"\\n\"\n output += \"\\t}\\n\"\n output += \"}\\n\"\n print (output)\n \n################# output vlan config ##############\n#\n#\n#############################################################\n \nfor ip in selfIpNonFloating.keys():\n output = \"\"\n if 'vlan' in selfIpNonFloating[ip]:\n vlanName = \"VLAN-\" + selfIpNonFloating[ip]['vlan']\n output += \"net vlan \" + partition + vlanName + \" {\\n\"\n if 'interface' in selfIpNonFloating[ip]:\n output += \"\\tinterfaces {\\n\"\n output += \"\\t\\t\" + selfIpNonFloating[ip]['interface'] + \" {\\n\"\n output += \"\\t\\t\\ttagged\\n\\t\\t}\\n\"\n output += \"\\t}\\n\"\n output += \"\\ttag \" + selfIpNonFloating[ip]['vlan'] + \"\\n}\\n\"\n print(output)\n \n################# output non-floating self-ip config #######\n#\n#\n#############################################################\nfor ip in selfIpNonFloating.keys():\n output = \"\"\n if 'mask' in selfIpNonFloating[ip]:\n mask = \"/\" + selfIpNonFloating[ip]['mask']\n else:\n if is_ipv6(ip):\n mask = \"/64\"\n else:\n mask = \"/32\"\n if 'vlan' in selfIpNonFloating[ip]:\n vlanName = \"VLAN-\" + selfIpNonFloating[ip]['vlan']\n else:\n continue\n\n output += \"net self \" + partition + \"selfip_\" + ip + \" {\\n\\taddress \" + ip + mask + \"\\n\\t\"\n output += \"allow-service none\\n\\t\"\n output += \"traffic-group traffic-group-local-only\\n\"\n output += \"\\tvlan \" + vlanName + \"\\n\"\n output += \"}\\n\"\n print (output)\n \n################# output network route config ##############\n#\n#\n#############################################################\nfor route in routes.keys():\n network,mask,gateway = routes[route]['network'],routes[route]['mask'],routes[route]['gateway']\n output = \"net route \" + partition + route + \" {\\n\\tnetwork \" + network + \"/\" + mask + \"\\n\\t\"\n output += \"gateway \" + gateway + \"\\n}\"\n print (output)\n \n################# output SSL profiles config ##########################\n#\n#\n########################################################################\nfor s in sslProfiles:\n #print (str(sslProfiles[s]))\n output = \"ltm profile client-ssl \" + partition + s + \" {\\n\"\n output += \"\\tcert-key-chain { \" + s + \" { cert \"\n output += sslProfiles[s]['certificate'] + \".crt \"\n output += \" key \"\n output += sslProfiles[s]['certificate'] + \".key \"\n if 'chaincert' in sslProfiles[s]:\n output += \"chain \" + sslProfiles[s]['chaincert']\n output += \" }\\n\\tdefaults-from /Common/clientssl\\n}\\n\"\n print (output)\n if 'serverssl' in sslProfiles[s]:\n print(\"WARNING: VSs using Client SSL profile \" + s + \" should have Server SSL profile assigned\")\n \n################# output monitor config ####################\n#\n#\n#############################################################\nfor m in monitors.keys():\n if monitors[m]['type'] == '\"TCP Port\"':\n output = \"ltm monitor tcp \" + partition + monitors[m]['name'] + \" {\\n\\tdefaults-from /Common/tcp\\n}\\n\"\n if monitors[m]['type'] == '\"UDP Port\"':\n output = \"ltm monitor udp \" + partition + monitors[m]['name'] + \" {\\n\\tdefaults-from /Common/udp\\n}\\n\"\n if monitors[m]['type'] == 'HTTP':\n '''\n https://webhelp.radware.com/AppDirector/v214/214Traffic%20Management%20and%20Application%20Acceleration.03.001.htm\n https://webhelp.radware.com/AppDirector/v214/HM_Checks_Table.htm\n Arguments:\n Host name - HOST=10.10.10.53\n path - PATH=/hc.htm\n HTTP Header\n HTTP method - MTD=G (G/H/P)\n send HTTP standard request or proxy request - PRX=N\n use of no-cache - NOCACHE=N\n text for search within a HTTP header and body, and an indication whether the text appears\n Username and Password for basic authentication\n NTLM authentication option - AUTH=B\n Up to four valid HTTP return codes - C1=200\n -a PATH=/hc.htm|C1=200|MEXIST=Y|MTD=G|PRX=N|NOCACHE=N|AUTH=B|\n '''\n output = \"ltm monitor http \" + partition + monitors[m]['name'] + \" {\\n\\tdefaults-from /Common/http\\n\"\n vars = splitvars(monitors[m]['text'])\n output += \"\\tsend \\\"\"\n if 'MTD' in vars:\n if vars['MTD'] == 'G':\n output += \"GET \"\n elif vars['MTD'] == 'P':\n output += \"POST \"\n elif vars['MTD'] == 'H':\n output += \"HEAD \"\n else:\n output += \"GET \"\n if 'PATH' in vars:\n output += vars['PATH'] + ' HTTP/1.0\\\\r\\\\n\\\\r\\\\n\"\\n'\n if 'C1' in vars:\n output += \"\\trecv \\\"^HTTP/1\\.. \" + vars['C1'] + \"\\\"\\n\"\n output += \"}\\n\"\n if monitors[m]['type'] == 'HTTPS':\n output = \"ltm monitor https \" + partition + monitors[m]['name'] + \" {\\n\\tdefaults-from /Common/https\\n\"\n vars = splitvars(monitors[m]['text'])\n output += \"\\tsend \\\"\"\n if 'MTD' in vars:\n if vars['MTD'] == 'G':\n output += \"GET \"\n elif vars['MTD'] == 'P':\n output += \"POST \"\n elif vars['MTD'] == 'H':\n output += \"HEAD \"\n else:\n output += \"GET \"\n if 'PATH' in vars:\n output += vars['PATH'] + ' HTTP/1.0\\\\r\\\\n\\\\r\\\\n\"\\n'\n output += \"}\\n\"\n if monitors[m]['type'] == 'LDAP':\n '''\n The Health Monitoring module enhances the health checks for LDAP servers by allowing performing searches in the LDAP server. Before Health Monitoring performs the search, it issues a Bind request command to the LDAP server.\n After performing the search, it closes the connection with the Unbind command. A successful search receives an answer from the server that includes a \"searchResultEntry\" message. An unsuccessful search receives an answer that only includes only a \"searchResultDone\" message.\n Arguments:\n Username A user with privileges to search the LDAP server.\n Password The password of the user.\n Base Object The location in the directory from which the LDAP search begins.\n Attribute Name The attribute to look for. For example, CN - Common Name.\n Search Value The value to search for.\n Search scope baseObject, singleLevel, wholeSubtree\n Search Deref Aliases neverDerefAliases, dereflnSearching, derefFindingBaseObj, derefAlways\n USER=cn=healthcheck,dc=domain|PASS=1234|BASE=dc=domain|ATTR=cn|VAL=healthcheck|SCP=1|DEREF=3|\n '''\n output = \"ltm monitor ldap \" + partition + monitors[m]['name'] + \" {\\n\\tdefaults-from /Common/ldap\\n\"\n vars = splitvars(monitors[m]['text'])\n if 'BASE' in vars:\n output += \"\\tbase \\\"\" + vars['BASE'] + \"\\\"\\n\"\n if 'USER' in vars:\n output += \"\\tusername \\\"\" + vars['USER'] + \"\\\"\\n\"\n if 'PASS' in vars:\n output += \"\\tpassword \\\"\" + vars['PASS'] + \"\\\"\\n\"\n output += \"}\\n\"\n if monitors[m]['type'] == 'icmp':\n output = \"ltm monitor gateway-icmp \" + partition + monitors[m]['name'] + \" {\\n\\tdefaults-from /Common/gateway-icmp\\n}\\n\"\n if monitors[m]['type'] == 'DNS':\n output = \"ltm monitor dns \" + partition + monitors[m]['name'] + \" {\\n\\tdefaults-from /Common/dns\\n\"\n vars = splitvars(monitors[m]['text'])\n if 'HOST' in vars:\n output += \"\\tqname \\\"\" + vars['HOST'] + \"\\\"\\n\"\n if 'ADDR' in vars:\n output += \"\\trecv \\\"\" + vars['ADDR'] + \"\\\"\\n\"\n output += \"}\\n\"\n if monitors[m]['type'] == '\"Radius Accounting\"':\n output = \"ltm monitor radius-accounting \" + partition + monitors[m]['name'] + \" {\\n\\tdefaults-from /Common/radius-accounting\\n\"\n vars = splitvars(monitors[m]['text'])\n if 'USER' in vars:\n output += \"\\tusername \\\"\" + vars['USER'] + \"\\\"\\n\"\n #if 'PASS' in vars:\n if 'SECRET' in vars:\n output += \"\\tsecret \\\"\" + vars['SECRET'] + \"\\\"\\n\"\n output += \"}\\n\"\n if monitors[m]['type'] == '\"Radius Authentication\"':\n output = \"ltm monitor radius \" + partition + monitors[m]['name'] + \" {\\n\\tdefaults-from /Common/radius\\n\"\n vars = splitvars(monitors[m]['text'])\n if 'USER' in vars:\n output += \"\\tusername \\\"\" + vars['USER'] + \"\\\"\\n\"\n #if 'PASS' in vars:\n if 'SECRET' in vars:\n output += \"\\tsecret \\\"\" + vars['SECRET'] + \"\\\"\\n\"\n output += \"}\\n\"\n print (output)\n \n################# output SNAT pool config ######################\n#\n#\n#############################################################\nfor s in snatPools.keys():\n output = \"ltm snatpool \" + partition + s + \" {\\n\\t\"\n output += \"members {\\n\"\n #run through pool range and add members as individual IP addresses below each other\n for member in snatPools[s]['members']:\n output += \"\\t \" + member + \"\\n\"\n output += \"\\t}\"\n output += \"\\n}\"\n print (output) \n################# output pool config ######################\n#\n#\n#############################################################\nfor p in pools.keys():\n output = \"ltm pool \" + partition + p + \" {\\n\\t\" \n if 'monitor' in pools[p]:\n output += \"monitor min 1 of { \" + pools[p]['monitor'] + \" }\\n\\t\"\n if 'lbMethod' in pools[p]:\n output += \"load-balancing-mode \" + pools[p]['lbMethod'] + \"\\n\\t\"\n output += \"members {\\n\"\n if 'destinations' in pools[p] and len(pools[p]['destinations']):\n for i,v in enumerate(pools[p]['destinations']):\n d = re.sub(':\\d+$','',v)\n output += \"\\t\\t\" + v + \" {\\n\\t\\t\\taddress \" + d + \"\\n\"\n if pools[p]['member-disabled'][i]:\n output += \"\\t\\t\\tstate down\\n\"\n output += \"\\t\\t\\tpriority-group \" + str(pools[p]['priority-group'][i]) + \"\\n\"\n output += \"\\t\\t}\\n\"\n output += \"\\t}\\n}\" \n print (output)\n################# output virtual server config ######################\n#\n#\n######################################################################\nfor v in virtuals:\n output = \"ltm virtual \" + partition + v + \" {\\n\"\n output += \"\\tdestination \" + virtuals[v]['destination'] + \"\\n\"\n output += \"\\tip-protocol \" + virtuals[v]['protocol'].lower() + \"\\n\"\n if 'pool' in virtuals[v] and virtuals[v]['pool']:\n output += \"\\tpool \" + virtuals[v]['pool'] + \"\\n\"\n if 'profiles' in virtuals[v] and len(virtuals[v]['profiles']):\n output += \"\\tprofiles {\\n\"\n for p in virtuals[v]['profiles']:\n output += \"\\t\\t\" + p + \" { }\\n\"\n output += \"\\t}\\n\"\n if 'snat' in virtuals[v]:\n output += \"\\tsource-address-translation {\\n\\t\"\n if virtuals[v]['snat'] == 'automap':\n output += \"\\ttype automap\\n\\t\"\n else:\n output += \"\\ttype snat\\n\\t\"\n output += \"\\tpool \" + virtuals[v]['snat'] + \"\\n\\t\"\n output += \"}\\n\"\n if 'policy' in virtuals[v]:\n output += \"\\tpolicies {\\n\\t\"\n output += \"\\t\" + virtuals[v]['policy'] + \" { }\\n\\t}\\n\"\n output += \"}\"\n print (output)
Tested this on version:
12.0","body@stringLength":"39928","rawBody":"
Problem this snippet solves:
This is a simple Python script that translates Radware text configuration file and outputs as config snippet and certificate files.
The script will also output the certificates and keys which should be uploaded to the BIG-IP /var/tmp directory and run file check_certs.sh and load_certs.sh to check and load the certs and keys.
\n
Works with Python v2 and v3.
\n
If you want something to be added then message me with details of the text and i will try to add it.
\n
Feel free to add or change anything
Code :
#!/usr/bin/env python\n# v1.1 14/3/2018 Deal with lack of text in monitors ( line 157 )\n# v2 3/1/2019 Updated after changes suggested by Avinash Piare\n# v3 6/11/2019 Updated to deal with \\\\r\\n at the end of the line\n# v3.1 6/11/2019 Minor changes to handle VS names with spaces\n# 3.4 18/4/2020 Fixed minor issues\n# Peter White 6/11/2019\n# usage ./rad2f5 [partition]\nimport sys\nimport re\nimport textwrap\nimport ipaddress\n\nprint (\"Running with Python v\" + sys.version)\n\n# Set debug to true to output the workings of the script ie the arrays etc\ndebug = False\n\ndef parse_options(options):\n # Function to split options and return a dict containing option and value\n # Example: -pl 27 -v 123 -pa 172.28.1.234\n # Return: { 'pl':'27', 'v':'123', 'pa':'172.28.1.234' }\n output = dict()\n # Deal with non-quotes eg -b 12345\n for r in re.finditer(r'-(\\w{1,3}) (\\S+)',options):\n output[r.group(1)] = r.group(2)\n # Deal with quotes eg -u \"User Name\"\n for v in re.finditer(r'-(\\w{1,3}) (\".+\")',options):\n output[v.group(1)] = v.group(2)\n return output\n\ndef splitvars(vars):\n # Split a string on | and then =, return a dict of ABC=XYZ\n # eg HDR=User-Agent|TKN=Googlebot-Video/1.0|TMATCH=EQ|\n # Return is { 'HDR':'User-Agent','TKN': 'Googlebot-Video/1.0', 'TMATCH': 'EQ' }\n vlist = vars.split(\"|\")\n o = {}\n for v in vlist:\n if v == '':\n continue\n w = v.split(\"=\")\n if len(w) > 1:\n o[w[0]] = w[1]\n else:\n o[w[0]] = ''\n return o \n \ndef array_add(a,d):\n # Function to safely add to an array\n #global a\n if not len(a):\n a = [ d ]\n else:\n a.append( d )\n return a\n \ndef setup_pools(name):\n global pools\n if not name in pools:\n pools[name] = { 'destinations': [], 'member-disabled': [], 'member-ids': [], 'priority-group': [] }\n else:\n if not 'destinations' in pools[name]:\n pools[name]['destinations'] = []\n if not 'member-disabled' in pools[name]:\n pools[name]['member-disabled'] = []\n if not 'member-ids' in pools[name]:\n pools[name]['member-ids'] = []\n if not 'priority-group' in pools[name]:\n pools[name]['priority-group'] = [] \n\ndef getVsFromPool(poolname):\n # This retrieves the names of virtual servers that use a specific pool\n global farm2vs\n if poolname in farm2vs:\n return farm2vs[poolname]\n else:\n return False\n\ndef is_ipv6(ip):\n if ':' in ip:\n return True\n else:\n return False\n\n# Check there is an argument given\nif not len(sys.argv) > 1:\n exit(\"Usage: rad2f5 [partition]\")\nif len(sys.argv) > 2:\n # Second command-line variable is the partition\n partition = \"/\" + sys.argv[2] + \"/\"\n print (\"Using partition \" + partition)\nelse:\n partition = \"/Common/\"\n \n# Check input file\nfh = open(sys.argv[1],\"r\")\nif not fh:\n exit(\"Cannot open file \" + argv[1])\nrawfile = fh.read()\n\n# v2\n# Remove any instances of slash at the end of line\n# eg health-monitoring check create\\\n# HC_DNS -id 5 -m DNS -p 53 -a \\\n#HOST=ns.domain.com|ADDR=1.1.1.1| -d 2.2.2.2\n#file = re.sub('^security certificate table\\\\\\\\\\n','',rawfile)\nfile = re.sub('\\\\\\\\\\n','',rawfile)\nfile = re.sub('\\\\\\\\\\r\\n','',file)\n\n################ LACP trunks ##########################\n#\n#\n#\n#############################################################\n#net linkaggr trunks set T-1 -lap G-13,G-14 -lam Manual -lat Fast -law 3 -laa 32767\ntrunks = {}\nfor r in re.finditer(r'net linkaggr trunks set (\\S+) (.+)',file):\n name = r.group(1)\n options = parse_options(r.group(2))\n if 'lap' in options:\n # Manage interfaces\n ints = options['lap'].split(',')\n trunks[name] = { 'interfaces': ints } \nprint (\"LACP trunks:\" + str(len(trunks)))\nif debug:\n print('DEBUG LACP trunks: ' + str(trunks))\n\n################ IP routes ##########################\n#\n#\n#\n#############################################################\nroutes = {}\nfor r in re.finditer(r'net route table create (\\S+) (\\S+) (\\S+) (\\S+)',file):\n if r.group(1) == '0.0.0.0':\n name = 'default'\n else:\n name = r.group(1) + \"_\" + r.group(2)\n routes[name] = { 'network': r.group(1), 'mask': r.group(2), 'gateway': r.group(3), 'interface': r.group(4)} \nprint (\"IP routes:\" + str(len(routes)))\nif debug:\n print('DEBUG routes: ' + str(routes))\n\n################ Non-floating self-IPs ###############\n#\n#\n#\n# \n#############################################################\nselfIpNonFloating = {}\nfor s in re.finditer(r'net ip-interface create (\\S+) (\\S+) (.+)',file):\n output = { 'interface': s.group(2) }\n opts = parse_options(s.group(3))\n if 'pl' in opts:\n output['mask'] = opts['pl']\n if 'v' in opts:\n output['vlan'] = opts['v']\n if 'pa' in opts:\n output['peerAddress'] = opts['pa']\n selfIpNonFloating[s.group(1)] = output\nprint (\"Non-floating IP interfaces:\" + str(len(selfIpNonFloating)))\nif debug:\n print(\"DEBUG non-floating IPs: \" + str(selfIpNonFloating))\n\n\n################ Floating self-IPs ###################\n#\n#\n# \n#############################################################\nselfIpFloating = {}\nfor s in re.finditer(r'redundancy vrrp virtual-routers create (\\S+) (\\S+) (\\S+) (.+)',file):\n output = { 'version': s.group(1),'interface': s.group(3), 'ipAddresses': []}\n opts = parse_options(s.group(4))\n #if 'as' in opts:\n # Enabled - assume all are enabled\n if 'pip' in opts:\n output['peerIpAddress'] = opts['pip']\n selfIpFloating[s.group(2)] = output\n\n# Retrieve IP addresses for Floating self-IPs\n#\nfor s in re.finditer(r'redundancy vrrp associated-ip create (\\S+) (\\S+) (\\S+) (\\S+)',file):\n selfIpFloating[s.group(2)]['ipAddresses'] = array_add(selfIpFloating[s.group(2)]['ipAddresses'],s.group(4))\nprint (\"Floating IP interfaces:\" + str(len(selfIpFloating)))\nif debug:\n print(\"DEBUG Floating IPs: \" + str(selfIpFloating))\n\n\n################ Monitors ###########################\n#\n# -m XYZ is the monitor type may or may not be present ( not present for icmp type )\n# -id is the monitor ID, -p is the port, -d is the destination\n# \n#############################################################\nmonitors = {}\nfor m in re.finditer(r'health-monitoring check create (\\S+) (.+)',file):\n output = { 'name': m.group(1) }\n opts = parse_options(m.group(2))\n if 'id' in opts:\n id = opts['id']\n else:\n print (\"No ID for monitor \" + m.group(1))\n continue\n if 'm' in opts:\n output['type'] = opts['m']\n else:\n output['type'] = 'icmp'\n if 'a' in opts:\n output['text'] = opts['a']\n else:\n # Added in v2\n output['text'] = ''\n if 'p' in opts:\n output['port'] = opts['p']\n else:\n output['port'] = ''\n monitors[id] = output\n\nprint (\"Monitors:\" + str(len(monitors)))\nif debug:\n print(\"DEBUG Monitors:\" + str(monitors))\n\n################ Virtual Servers #####################\n#\n# 0 = name, 1= IP, 2=protocol, 3=port, 4=source 5=options\n# -ta = type, -ht = http policy, -fn = pool name, -sl = ssl profile name, -ipt = translation?\n# -po = policy name\n# \n#############################################################\nfarm2vs = {}\nvirtuals = {}\nsnatPools = {}\nfor v in re.finditer(r'appdirector l4-policy table create (\\S+) (\\S+) (\\S+) (\\S+) (\\S+) (.*)',file):\n # Puke if VS has quotes\n if v.group(1).startswith('\"'):\n name = v.group(1).strip('\"').replace(' ','_') + v.group(2).strip('\"').replace(' ','_')\n address,protocol,port = v.group(3),v.group(4),v.group(5)\n source = v.group(6).split(' ')[0]\n options = ' '.join(v.group(6).split(' ')[1:])\n else:\n name,address,protocol,port,source,options = v.group(1),v.group(2),v.group(3),v.group(4),v.group(5),v.group(6)\n opts = parse_options(options)\n # Get rid of ICMP virtual servers\n if protocol == 'ICMP':\n continue\n \n print (\"Name \" + name + \" has quotes, address: \" + address + \" protocol: \" + protocol)\n if port == 'Any':\n port = '0'\n output = {'source': source, 'destination': address + \":\" + port, 'protocol': protocol, 'port': port }\n if 'fn' in opts:\n output['pool'] = opts['fn']\n if not opts['fn'] in farm2vs:\n farm2vs[opts['fn']] = []\n farm2vs[opts['fn']].append(name)\n output['port'] = port\n if 'po' in opts:\n output['policy'] = opts['po']\n if 'ipt' in opts:\n output['snat'] = 'snatpool_' + opts['ipt']\n if not 'snatpool_' + opts['ipt'] in snatPools:\n #Create snatpool\n snatPools['snatpool_' + opts['ipt']] = { 'members': [opts['ipt']] }\n \n # Set the correct profiles\n profiles = []\n # Layer 4\n if protocol == \"TCP\" or protocol == \"UDP\":\n profiles.append(protocol.lower())\n else:\n profiles.append('ipother')\n # http\n if port == '80' or port == '8080':\n profiles.append('http')\n profiles.append('oneconnect')\n\n # ftp\n if port == '21':\n profiles.append('ftp')\n\n # RADIUS\n if port == '1812' or port == '1813':\n profiles.append('radius')\n\n # SSL\n if 'sl' in opts:\n profiles.append(opts['sl'])\n profiles.append('http')\n profiles.append('oneconnect')\n output['profiles'] = profiles\n # \n virtuals[name] = output\n \nprint (\"Virtual Servers:\" + str(len(virtuals)))\nif debug:\n print(\"DEBUG Virtual Servers:\" + str(virtuals))\n #print(\"DEBUG Farm to VS Mapping:\" + str(farm2vs))\n\n \n\n################ Pools ###############################\n#\n# Pools config options are distributed across multiple tables\n# This sets the global config such as load balancing algorithm\n# -dm This sets the distribution method. cyclic = Round Robin, Fewest Number of Users = least conn, Weighted Cyclic = ratio, Response Time = fastest\n# -as this is the admin state\n# -cm is the checking method ie monitor\n# -at is the activation time\n#############################################################\npools = {}\nfor p in re.finditer(r'appdirector farm table setCreate (\\S+) (.*)',file):\n name = p.group(1)\n setup_pools(name)\n opts = parse_options(p.group(2))\n output = {}\n # Admin state\n output['poolDisabled'] = False\n if 'as' in opts:\n if opts['as'] == 'Disabled':\n output['poolDisabled'] = True \n # Deal with distribution methods\n method = 'round-robin'\n if 'dm' in opts:\n if opts['dm'] == '\"Fewest Number of Users\"':\n method = 'least-conn'\n elif opts['dm'] == 'Hashing':\n method = 'hash'\n else:\n method = 'round-robin'\n output['lbMethod'] = method\n \n if 'at' in opts:\n output['slowRamp'] = opts['at']\n pools[name] = output\n# This sets the pool members\n# 0=name, 1=node, 2=node address, 3=node port, 4=? -id =id -sd ? -as admin state eg Disable, -om operation mode eg Backup ( fallback server ), -rt backup server address 0.0.0.0\nfor p in re.finditer(r'appdirector farm server table create (\\S+) (\\S+) (\\S+) (\\S+) (\\S+) (.*)',file):\n name,node,node_address,node_port,node_hostname = p.group(1),p.group(2),p.group(3),p.group(4),p.group(5)\n opts = parse_options(p.group(6))\n setup_pools(name)\n if node_port == 'None':\n node_port = '0'\n pools[name]['destinations'] = array_add(pools[name]['destinations'],node_address + \":\" + node_port)\n # Manage monitor\n if node_port == '80' or node_port == '8080':\n monitor = 'http'\n elif node_port == '443':\n monitor = 'https'\n elif node_port == '53':\n monitor = 'dns'\n elif node_port == '21':\n monitor = 'ftp'\n elif node_port == '0':\n monitor = 'gateway-icmp'\n else:\n monitor = 'tcp'\n pools[name]['monitor'] = monitor\n \n # Retrieve pool member ID\n if 'id' in opts:\n pools[name]['member-ids'] = array_add(pools[name]['member-ids'],opts['id'])\n else:\n print (\"ID not found for pool \" + name)\n \n # Check if member is disabled\n if 'as' in opts and opts['as'] == 'Disabled':\n # This pool member is disabled\n pools[name]['member-disabled'] = array_add(pools[name]['member-disabled'],True)\n else:\n pools[name]['member-disabled'] = array_add(pools[name]['member-disabled'],False)\n \n # Check if member is backup ie Priority Groups\n if 'om' in opts and opts['om'] == 'Backup':\n pools[name]['priority-group'] = array_add(pools[name]['priority-group'],20)\n else:\n pools[name]['priority-group'] = array_add(pools[name]['priority-group'],0)\n\n \n \nprint (\"Pools:\" + str(len(pools)) )\nif debug:\n print(\"DEBUG pools: \" + str(pools))\n\n################ SSL certificates ###################\n#\n#\n#Name: certificate_name \\\n#Type: certificate \\\n#-----BEGIN CERTIFICATE----- \\\n#MIIEcyFCA7agAwIAAgISESFWs9QGF\n# \n#############################################################\ncerts = {}\nfor r in re.finditer(r'Name: (\\S+) Type: (\\S+) (-----BEGIN CERTIFICATE-----.+?-----END CERTIFICATE-----)',file):\n name,type,text = r.group(1),r.group(2),r.group(3)\n certs[name] = { 'type': type,'text': text.replace(' \\\\\\r\\n','') }\n # Print out to file or something\nprint (\"SSL Certificates: \" + str(len(certs)))\nif debug:\n print(\"DEBUG certs: \" + str(certs))\n \n################ SSL Keys ###################\n#\n#\n#Name: New_Root_Cert Type: key Passphrase: -----BEGIN RSA PRIVATE KEY----- Proc-Type: 4,ENCRYPTED DEK-Info: [key] [key] -----END RSA PRIVATE KEY----- \\\n# \n#############################################################\nkeys = {}\n# Keys with passphrase\nfor r in re.finditer(r'Name: (\\S+) Type: key Passphrase: (\\S+) (-----BEGIN RSA PRIVATE KEY-----.+?-----END RSA PRIVATE KEY-----)',file):\n name,passphrase,text = r.group(1),r.group(2),r.group(3)\n keys[name] = { 'passphrase': passphrase,'text': text.replace(' \\\\\\r\\n','') }\n# Keys without passphrase\nfor r in re.finditer(r'Name: (\\S+) Type: key (-----BEGIN RSA PRIVATE KEY-----.+?-----END RSA PRIVATE KEY-----)',file):\n name,text = r.group(1),r.group(2)\n keys[name] = { 'text': text.replace(' \\\\\\r\\n','') }\nprint (\"SSL Keys: \" + str(len(keys)))\nif debug:\n print(\"DEBUG SSL keys: \" + str(keys))\n\n################ SSL profiles ########################\n#\n# -c is cert, -u is ciphers, -t is chain cert, -fv - versions\n##############################################################\nsslProfiles = {}\nfor s in re.finditer(r'^appdirector l4-policy ssl-policy create (\\S+) (.+)',file.replace('\\\\\\r\\n',''),re.MULTILINE):\n name = s.group(1)\n output = {}\n opts = parse_options(s.group(2))\n if 'c' in opts:\n # Certificate\n output['certificate'] = opts['c']\n if 't' in opts:\n # Chain cert\n output['chaincert'] = opts['t']\n if 'fv' in opts:\n # TLS Version\n output['version'] = opts['fv']\n if 'u' in opts:\n # User-defined Ciphers\n output['cipher'] = opts['u']\n if 'lp' in opts:\n # ?\n output['lp'] = opts['lp']\n if 'pa' in opts:\n # ?\n output['pa'] = opts['pa']\n if 'cb' in opts:\n # ?\n output['cb'] = opts['cb']\n if 'i' in opts:\n # Backend SSL Cipher -> Values: Low, Medium, High, User Defined\n output['i'] = opts['i']\n if 'bs' in opts:\n # Backend SSL in use ie serverSSL\n output['serverssl'] = opts['bs']\n \n sslProfiles[name] = output\nprint (\"SSL profiles: \" + str(len(sslProfiles)))\nif debug:\n print(\"DEBUG SSL Profiles: \" + str(sslProfiles))\n \n################ SNAT pools ##########################\n# \n# Note that this only works for addresses in the same /24 subnet\n#############################################################\n\nfor s in re.finditer(r'appdirector nat client address-range create (\\S+) (\\S+)',file):\n name = s.group(1)\n if sys.version.startswith('2'):\n start = ipaddress.ip_address(unicode(name,'utf_8'))\n end = ipaddress.ip_address(unicode(s.group(2),'utf_8'))\n else:\n start = ipaddress.ip_address(name)\n end = ipaddress.ip_address(s.group(2))\n current = start\n ipAddresses = []\n while current <= end:\n ipAddresses.append(str(current))\n current += 1\n snatPools['snatpool_' + name] = { 'members': ipAddresses }\nprint (\"SNAT Pools:\" + str(len(snatPools)))\nif debug:\n print(\"DEBUG SNAT Pools: \" + str(snatPools))\n####################################################################\n\n\n\n################ Layer 7 functions ##########################\n#\n# \n####################################################################\nl7rules = { }\nfor r in re.finditer(r'appdirector l7 farm-selection method-table setCreate (\\S+) (.+)',file):\n name = r.group(1)\n l7rules[name] = { 'match': [], 'action': [] }\n opts = parse_options(r.group(2))\n if 'cm' in opts and opts['cm'] == '\"Header Field\"' and 'ma' in opts:\n # This is a rule to insert a header\n params = splitvars(opts['ma'])\n if 'HDR' in params and 'TKN' in params:\n if params['TKN'] == \"$Client_IP\":\n params['TKN'] = '[IP::client_addr]'\n l7rules[name]['action'].append(\"http-header\\ninsert\\nname \" + params['HDR'] + \"\\nvalue \" + params['TKN'])\n \n if 'cm' in opts and opts['cm'] == 'URL' and 'ma' in opts:\n # This does a match on Host and URL\n params = splitvars(opts['ma'])\n if 'HN' in params:\n l7rules[name]['match'].append(\"http-host\\nhost\\nvalues { \" + params['HN'] + \" }\")\n if 'P' in params:\n l7rules[name]['match'].append(\"http-uri\\npath\\nvalues { \" + params['P'] + \" }\")\n \n if 'cm' in opts and opts['cm'] == '\"Regular Expression\"' and 'ma' in opts:\n params = splitvars(opts['ma'])\n if 'EXP' in params and params['EXP'] == '.':\n # This is a regex which matches everything\n print (\"REGEX: \" + name)\n else:\n print (\"WARNING! Found L7 Regular Expression at \\\"appdirector l7 farm-selection method-table setCreate \" + name + \"\\\". Manually set the match in output config.\")\n\n# Note that there can be multiple entries ie multiple rules per policy\nl7policies = {}\nfor p in re.finditer(r'appdirector l7 farm-selection policy-table setCreate (\\S+) (\\d+) (.+)',file):\n name = p.group(1)\n precedence = p.group(2)\n opts = parse_options(p.group(3))\n \n if 'fn' in opts:\n farm = opts['fn']\n else:\n farm = ''\n if 'm1' in opts:\n rule = opts['m1']\n if 'pa' in opts:\n # Retain HTTP Persistency (PRSST)-If the argument is ON (or undefined), AppDirector maintains HTTP 1.1\n # HTTP Redirect To (RDR)-Performs HTTP redirection to the specified name or IP address.\n # HTTPS Redirect To (RDRS)-AppDirector redirects the HTTP request to the specified name or IP address and modifies the request to a HTTPS request.\n # Redirection Code (RDRC)-Defines the code to be used for redirection.\n # RDRC=PRMN stand for Permanent I assume , as in HTTP 301\n # SIP Redirect To (RDRSIP)-Performs SIP redirection to the specified name or IP address.\n \n params = splitvars(opts['pa'])\n if 'RDR' in params:\n url = 'http://' + params['RDR']\n elif 'RDRS' in params:\n url = 'https://' + params['RDRS']\n else:\n url = ''\n \n if not name in l7policies:\n l7policies[name] = []\n if rule in l7rules:\n if farm != '':\n l7rules[rule]['action'].append(\"forward\\nselect\\npool \" + farm)\n elif url != '':\n l7rules[rule]['action'].append(\"http-redirect\\nhost \" + url)\n l7policies[name].append({ 'precedence': precedence, 'farm': farm, 'rule': rule })\n\nprint (\"Layer 7 rules:\" + str(len(l7rules)))\nprint (\"Layer 7 policies:\" + str(len(l7policies)))\n\nif debug:\n print(\"DEBUG L7 rules: \" + str(l7rules))\n print(\"DEBUG L7 policies: \" + str(l7policies))\n\n#\n# We have retrieved the required configuration from the input file \n# Now start outputting the config\n\n\n\n\n################# output SSL certificates import script ######################\n#\n#\n########################################################################\nif len(certs):\n print (\"-- Creating SSL certs and keys --\")\n with open(\"load_certs.sh\",'w') as loadScript:\n loadScript.write(\"#!/bin/bash\\n# Script to load SSL certs and keys from /var/tmp\\n\")\n ##### Manage Certificates ########\n for cert in certs:\n # Write certs to load_certs.sh\n if certs[cert]['type'] == 'certificate' or certs[cert]['type'] == 'interm':\n loadScript.write(\"tmsh install sys crypto cert \" + partition + cert + \".crt from-local-file /var/tmp/\" + cert + \".crt\\n\")\n \n # Create the certificate files\n with open(cert + \".crt\",\"w\") as certFile:\n for m in re.finditer(r'(-----BEGIN CERTIFICATE-----)\\s?(.+)\\s?(-----END CERTIFICATE-----)',certs[cert]['text']):\n certFile.write(m.group(1) + \"\\n\")\n certFile.write(textwrap.fill(m.group(2),64) + \"\\n\")\n certFile.write(m.group(3) + \"\\n\")\n print (\"Created SSL certificate file \" + cert + \".crt\")\n ##### Manage Keys #################\n for key in keys:\n # Write keys to load_certs.sh\n loadScript.write(\"tmsh install sys crypto key \" + partition + key + \".key\")\n if 'passphrase' in keys[key]:\n loadScript.write(\" passphrase \" + keys[key]['passphrase'])\n loadScript.write(\" from-local-file /var/tmp/\" + key + \".key\\n\")\n \n \n # Create the key files\n with open(key + \".key\",\"w\") as keyFile:\n for n in re.finditer(r'(-----BEGIN RSA PRIVATE KEY-----)(.+)(-----END RSA PRIVATE KEY-----)',keys[key]['text']):\n keyFile.write(n.group(1) + \"\\n\")\n if 'Proc-Type:' in n.group(2) and 'DEK-Info:' in n.group(2):\n # File is encrypted, separate the first lines\n for o in re.finditer(r'(Proc-Type: \\S+) (DEK-Info: \\S+) (.+)',n.group(2)):\n keyFile.write(o.group(1) + \"\\n\")\n keyFile.write(o.group(2) + \"\\n\\n\")\n keyFile.write(textwrap.fill(o.group(3),64) + \"\\n\")\n else:\n # File is not encrypted, output as it is\n keyFile.write(textwrap.fill(n.group(2),64) + \"\\n\")\n keyFile.write(n.group(3) + \"\\n\")\n print (\"Created SSL key file \" + key + \".key\")\n print (\"-- Finished creating SSL certs and keys --\")\n print (\"!! Copy all .crt and .key SSL files to BIG-IP /var/tmp and use load_certs.sh to load !!\" )\n #######################################################################\n\n ################# output SSL certificates checking script ######################\n #\n #\n ########################################################################\n with open(\"check_certs.sh\",'w') as checkScript:\n checkScript.write(\"#!/bin/bash\\n# Script to check SSL certs and keys\\n\")\n checkScript.write(\"\\n# Check SSL Certs\\n\")\n for cert in certs:\n if certs[cert]['type'] == 'certificate' or certs[cert]['type'] == 'interm':\n checkScript.write(\"openssl x509 -in \" + cert + \".crt -noout || echo \\\"Error with file \" + cert + \".crt\\\"\\n\")\n \n checkScript.write(\"\\n# Check SSL Keys\\n\")\n for key in keys:\n checkScript.write(\"openssl rsa -in \" + key + \".key -check || echo \\\"Error with file \" + key + \".key\\\"\\n\")\n \n print (\"!! Run the check_certs.sh script to check the certificates are valid !!\" )\n#######################################################################\n\n#\n#\n#\n#\n#\n#\n#\n#\nprint (\"\\n\\n\\n\\n\\n\\n# Configuration \\n#--------------------------------------#\")\n################# output policy config #####################\n#\n#\n#############################################################\n#print (\"L7 rules: \" + str(l7rules))\nfor i in l7policies.keys():\n output = \"ltm policy \" + partition + i + \" {\\n\\tcontrols { forwarding }\\n\\trequires { http }\\n\\t\"\n output += \"rules {\\n\\t\"\n ordinal = 1\n for j in l7policies[i]:\n output += \"\\t\" + j['rule'] + \" { \\n\"\n if len(l7rules[j['rule']]['match']):\n # Deal with conditions\n output += \"\\t\\t\\tconditions { \\n\"\n l = 0\n for k in l7rules[j['rule']]['match']:\n output += \"\\t\\t\\t\\t\" + str(l) + \" { \\n\\t\\t\\t\\t\\t\" + k.replace('\\n','\\n\\t\\t\\t\\t\\t')\n l += 1\n output += \"\\n\\t\\t\\t\\t }\\n\"\n output += \"\\n\\t\\t\\t }\\n\"\n if len(l7rules[j['rule']]['action']):\n # Deal with actions\n output += \"\\t\\t\\tactions { \\n\"\n m = 0\n for n in l7rules[j['rule']]['action']:\n output += \"\\t\\t\\t\\t\" + str(m) + \" { \\n\\t\\t\\t\\t\\t\" + n.replace('\\n','\\n\\t\\t\\t\\t\\t') \n m += 1\n output += \"\\n\\t\\t\\t\\t }\\n\"\n output += \"\\n\\t\\t\\t }\\n\"\n output += \"\\t\\tordinal \" + str(ordinal)\n output += \"\\n\\t\\t}\\n\\t\"\n ordinal += 1\n output += \"\\n\\t}\\n}\\n\"\n print (output)\n\n\n################# output LACP trunk config ##############\n#\n#\n#############################################################\nfor trunk in trunks.keys():\n output = \"net trunk \" + partition + trunk + \" {\\n\"\n if 'interfaces' in trunks[trunk]:\n output += \"\\tinterfaces {\\n\"\n for int in trunks[trunk]['interfaces']:\n output += \"\\t\\t\" + int + \"\\n\"\n output += \"\\t}\\n\"\n output += \"}\\n\"\n print (output)\n \n################# output vlan config ##############\n#\n#\n#############################################################\n \nfor ip in selfIpNonFloating.keys():\n output = \"\"\n if 'vlan' in selfIpNonFloating[ip]:\n vlanName = \"VLAN-\" + selfIpNonFloating[ip]['vlan']\n output += \"net vlan \" + partition + vlanName + \" {\\n\"\n if 'interface' in selfIpNonFloating[ip]:\n output += \"\\tinterfaces {\\n\"\n output += \"\\t\\t\" + selfIpNonFloating[ip]['interface'] + \" {\\n\"\n output += \"\\t\\t\\ttagged\\n\\t\\t}\\n\"\n output += \"\\t}\\n\"\n output += \"\\ttag \" + selfIpNonFloating[ip]['vlan'] + \"\\n}\\n\"\n print(output)\n \n################# output non-floating self-ip config #######\n#\n#\n#############################################################\nfor ip in selfIpNonFloating.keys():\n output = \"\"\n if 'mask' in selfIpNonFloating[ip]:\n mask = \"/\" + selfIpNonFloating[ip]['mask']\n else:\n if is_ipv6(ip):\n mask = \"/64\"\n else:\n mask = \"/32\"\n if 'vlan' in selfIpNonFloating[ip]:\n vlanName = \"VLAN-\" + selfIpNonFloating[ip]['vlan']\n else:\n continue\n\n output += \"net self \" + partition + \"selfip_\" + ip + \" {\\n\\taddress \" + ip + mask + \"\\n\\t\"\n output += \"allow-service none\\n\\t\"\n output += \"traffic-group traffic-group-local-only\\n\"\n output += \"\\tvlan \" + vlanName + \"\\n\"\n output += \"}\\n\"\n print (output)\n \n################# output network route config ##############\n#\n#\n#############################################################\nfor route in routes.keys():\n network,mask,gateway = routes[route]['network'],routes[route]['mask'],routes[route]['gateway']\n output = \"net route \" + partition + route + \" {\\n\\tnetwork \" + network + \"/\" + mask + \"\\n\\t\"\n output += \"gateway \" + gateway + \"\\n}\"\n print (output)\n \n################# output SSL profiles config ##########################\n#\n#\n########################################################################\nfor s in sslProfiles:\n #print (str(sslProfiles[s]))\n output = \"ltm profile client-ssl \" + partition + s + \" {\\n\"\n output += \"\\tcert-key-chain { \" + s + \" { cert \"\n output += sslProfiles[s]['certificate'] + \".crt \"\n output += \" key \"\n output += sslProfiles[s]['certificate'] + \".key \"\n if 'chaincert' in sslProfiles[s]:\n output += \"chain \" + sslProfiles[s]['chaincert']\n output += \" }\\n\\tdefaults-from /Common/clientssl\\n}\\n\"\n print (output)\n if 'serverssl' in sslProfiles[s]:\n print(\"WARNING: VSs using Client SSL profile \" + s + \" should have Server SSL profile assigned\")\n \n################# output monitor config ####################\n#\n#\n#############################################################\nfor m in monitors.keys():\n if monitors[m]['type'] == '\"TCP Port\"':\n output = \"ltm monitor tcp \" + partition + monitors[m]['name'] + \" {\\n\\tdefaults-from /Common/tcp\\n}\\n\"\n if monitors[m]['type'] == '\"UDP Port\"':\n output = \"ltm monitor udp \" + partition + monitors[m]['name'] + \" {\\n\\tdefaults-from /Common/udp\\n}\\n\"\n if monitors[m]['type'] == 'HTTP':\n '''\n https://webhelp.radware.com/AppDirector/v214/214Traffic%20Management%20and%20Application%20Acceleration.03.001.htm\n https://webhelp.radware.com/AppDirector/v214/HM_Checks_Table.htm\n Arguments:\n Host name - HOST=10.10.10.53\n path - PATH=/hc.htm\n HTTP Header\n HTTP method - MTD=G (G/H/P)\n send HTTP standard request or proxy request - PRX=N\n use of no-cache - NOCACHE=N\n text for search within a HTTP header and body, and an indication whether the text appears\n Username and Password for basic authentication\n NTLM authentication option - AUTH=B\n Up to four valid HTTP return codes - C1=200\n -a PATH=/hc.htm|C1=200|MEXIST=Y|MTD=G|PRX=N|NOCACHE=N|AUTH=B|\n '''\n output = \"ltm monitor http \" + partition + monitors[m]['name'] + \" {\\n\\tdefaults-from /Common/http\\n\"\n vars = splitvars(monitors[m]['text'])\n output += \"\\tsend \\\"\"\n if 'MTD' in vars:\n if vars['MTD'] == 'G':\n output += \"GET \"\n elif vars['MTD'] == 'P':\n output += \"POST \"\n elif vars['MTD'] == 'H':\n output += \"HEAD \"\n else:\n output += \"GET \"\n if 'PATH' in vars:\n output += vars['PATH'] + ' HTTP/1.0\\\\r\\\\n\\\\r\\\\n\"\\n'\n if 'C1' in vars:\n output += \"\\trecv \\\"^HTTP/1\\.. \" + vars['C1'] + \"\\\"\\n\"\n output += \"}\\n\"\n if monitors[m]['type'] == 'HTTPS':\n output = \"ltm monitor https \" + partition + monitors[m]['name'] + \" {\\n\\tdefaults-from /Common/https\\n\"\n vars = splitvars(monitors[m]['text'])\n output += \"\\tsend \\\"\"\n if 'MTD' in vars:\n if vars['MTD'] == 'G':\n output += \"GET \"\n elif vars['MTD'] == 'P':\n output += \"POST \"\n elif vars['MTD'] == 'H':\n output += \"HEAD \"\n else:\n output += \"GET \"\n if 'PATH' in vars:\n output += vars['PATH'] + ' HTTP/1.0\\\\r\\\\n\\\\r\\\\n\"\\n'\n output += \"}\\n\"\n if monitors[m]['type'] == 'LDAP':\n '''\n The Health Monitoring module enhances the health checks for LDAP servers by allowing performing searches in the LDAP server. Before Health Monitoring performs the search, it issues a Bind request command to the LDAP server.\n After performing the search, it closes the connection with the Unbind command. A successful search receives an answer from the server that includes a \"searchResultEntry\" message. An unsuccessful search receives an answer that only includes only a \"searchResultDone\" message.\n Arguments:\n Username A user with privileges to search the LDAP server.\n Password The password of the user.\n Base Object The location in the directory from which the LDAP search begins.\n Attribute Name The attribute to look for. For example, CN - Common Name.\n Search Value The value to search for.\n Search scope baseObject, singleLevel, wholeSubtree\n Search Deref Aliases neverDerefAliases, dereflnSearching, derefFindingBaseObj, derefAlways\n USER=cn=healthcheck,dc=domain|PASS=1234|BASE=dc=domain|ATTR=cn|VAL=healthcheck|SCP=1|DEREF=3|\n '''\n output = \"ltm monitor ldap \" + partition + monitors[m]['name'] + \" {\\n\\tdefaults-from /Common/ldap\\n\"\n vars = splitvars(monitors[m]['text'])\n if 'BASE' in vars:\n output += \"\\tbase \\\"\" + vars['BASE'] + \"\\\"\\n\"\n if 'USER' in vars:\n output += \"\\tusername \\\"\" + vars['USER'] + \"\\\"\\n\"\n if 'PASS' in vars:\n output += \"\\tpassword \\\"\" + vars['PASS'] + \"\\\"\\n\"\n output += \"}\\n\"\n if monitors[m]['type'] == 'icmp':\n output = \"ltm monitor gateway-icmp \" + partition + monitors[m]['name'] + \" {\\n\\tdefaults-from /Common/gateway-icmp\\n}\\n\"\n if monitors[m]['type'] == 'DNS':\n output = \"ltm monitor dns \" + partition + monitors[m]['name'] + \" {\\n\\tdefaults-from /Common/dns\\n\"\n vars = splitvars(monitors[m]['text'])\n if 'HOST' in vars:\n output += \"\\tqname \\\"\" + vars['HOST'] + \"\\\"\\n\"\n if 'ADDR' in vars:\n output += \"\\trecv \\\"\" + vars['ADDR'] + \"\\\"\\n\"\n output += \"}\\n\"\n if monitors[m]['type'] == '\"Radius Accounting\"':\n output = \"ltm monitor radius-accounting \" + partition + monitors[m]['name'] + \" {\\n\\tdefaults-from /Common/radius-accounting\\n\"\n vars = splitvars(monitors[m]['text'])\n if 'USER' in vars:\n output += \"\\tusername \\\"\" + vars['USER'] + \"\\\"\\n\"\n #if 'PASS' in vars:\n if 'SECRET' in vars:\n output += \"\\tsecret \\\"\" + vars['SECRET'] + \"\\\"\\n\"\n output += \"}\\n\"\n if monitors[m]['type'] == '\"Radius Authentication\"':\n output = \"ltm monitor radius \" + partition + monitors[m]['name'] + \" {\\n\\tdefaults-from /Common/radius\\n\"\n vars = splitvars(monitors[m]['text'])\n if 'USER' in vars:\n output += \"\\tusername \\\"\" + vars['USER'] + \"\\\"\\n\"\n #if 'PASS' in vars:\n if 'SECRET' in vars:\n output += \"\\tsecret \\\"\" + vars['SECRET'] + \"\\\"\\n\"\n output += \"}\\n\"\n print (output)\n \n################# output SNAT pool config ######################\n#\n#\n#############################################################\nfor s in snatPools.keys():\n output = \"ltm snatpool \" + partition + s + \" {\\n\\t\"\n output += \"members {\\n\"\n #run through pool range and add members as individual IP addresses below each other\n for member in snatPools[s]['members']:\n output += \"\\t \" + member + \"\\n\"\n output += \"\\t}\"\n output += \"\\n}\"\n print (output) \n################# output pool config ######################\n#\n#\n#############################################################\nfor p in pools.keys():\n output = \"ltm pool \" + partition + p + \" {\\n\\t\" \n if 'monitor' in pools[p]:\n output += \"monitor min 1 of { \" + pools[p]['monitor'] + \" }\\n\\t\"\n if 'lbMethod' in pools[p]:\n output += \"load-balancing-mode \" + pools[p]['lbMethod'] + \"\\n\\t\"\n output += \"members {\\n\"\n if 'destinations' in pools[p] and len(pools[p]['destinations']):\n for i,v in enumerate(pools[p]['destinations']):\n d = re.sub(':\\d+$','',v)\n output += \"\\t\\t\" + v + \" {\\n\\t\\t\\taddress \" + d + \"\\n\"\n if pools[p]['member-disabled'][i]:\n output += \"\\t\\t\\tstate down\\n\"\n output += \"\\t\\t\\tpriority-group \" + str(pools[p]['priority-group'][i]) + \"\\n\"\n output += \"\\t\\t}\\n\"\n output += \"\\t}\\n}\" \n print (output)\n################# output virtual server config ######################\n#\n#\n######################################################################\nfor v in virtuals:\n output = \"ltm virtual \" + partition + v + \" {\\n\"\n output += \"\\tdestination \" + virtuals[v]['destination'] + \"\\n\"\n output += \"\\tip-protocol \" + virtuals[v]['protocol'].lower() + \"\\n\"\n if 'pool' in virtuals[v] and virtuals[v]['pool']:\n output += \"\\tpool \" + virtuals[v]['pool'] + \"\\n\"\n if 'profiles' in virtuals[v] and len(virtuals[v]['profiles']):\n output += \"\\tprofiles {\\n\"\n for p in virtuals[v]['profiles']:\n output += \"\\t\\t\" + p + \" { }\\n\"\n output += \"\\t}\\n\"\n if 'snat' in virtuals[v]:\n output += \"\\tsource-address-translation {\\n\\t\"\n if virtuals[v]['snat'] == 'automap':\n output += \"\\ttype automap\\n\\t\"\n else:\n output += \"\\ttype snat\\n\\t\"\n output += \"\\tpool \" + virtuals[v]['snat'] + \"\\n\\t\"\n output += \"}\\n\"\n if 'policy' in virtuals[v]:\n output += \"\\tpolicies {\\n\\t\"\n output += \"\\t\" + virtuals[v]['policy'] + \" { }\\n\\t}\\n\"\n output += \"}\"\n print (output)
Tested this on version:
12.0","kudosSumWeight":0,"postTime":"2018-03-08T03:41:00.000-08:00","images":{"__typename":"AssociatedImageConnection","edges":[],"totalCount":0,"pageInfo":{"__typename":"PageInfo","hasNextPage":false,"endCursor":null,"hasPreviousPage":false,"startCursor":null}},"attachments":{"__typename":"AttachmentConnection","pageInfo":{"__typename":"PageInfo","hasNextPage":false,"endCursor":null,"hasPreviousPage":false,"startCursor":null},"edges":[]},"tags":{"__typename":"TagConnection","pageInfo":{"__typename":"PageInfo","hasNextPage":false,"endCursor":null,"hasPreviousPage":false,"startCursor":null},"edges":[{"__typename":"TagEdge","cursor":"MjUuMnwyLjF8b3wxMHxfTlZffDE","node":{"__typename":"Tag","id":"tag:application delivery","text":"application delivery","time":"2021-06-30T01:48:44.000-07:00","lastActivityTime":null,"messagesCount":null,"followersCount":null}},{"__typename":"TagEdge","cursor":"MjUuMnwyLjF8b3wxMHxfTlZffDI","node":{"__typename":"Tag","id":"tag:BIG-IP","text":"BIG-IP","time":"2022-01-24T02:29:45.031-08:00","lastActivityTime":null,"messagesCount":null,"followersCount":null}},{"__typename":"TagEdge","cursor":"MjUuMnwyLjF8b3wxMHxfTlZffDM","node":{"__typename":"Tag","id":"tag:radware","text":"radware","time":"2022-01-24T02:31:10.744-08:00","lastActivityTime":null,"messagesCount":null,"followersCount":null}},{"__typename":"TagEdge","cursor":"MjUuMnwyLjF8b3wxMHxfTlZffDQ","node":{"__typename":"Tag","id":"tag:TMOS","text":"TMOS","time":"2022-01-24T02:29:45.281-08:00","lastActivityTime":null,"messagesCount":null,"followersCount":null}}]},"timeToRead":21,"rawTeaser":"","introduction":"","currentRevision":{"__ref":"Revision:revision:285011_3"},"latestVersion":{"__typename":"FriendlyVersion","major":"3","minor":"0"},"metrics":{"__typename":"MessageMetrics","views":2162},"visibilityScope":"PUBLIC","canonicalUrl":null,"seoTitle":null,"seoDescription":null,"placeholder":false,"originalMessageForPlaceholder":null,"contributors":{"__typename":"UserConnection","edges":[]},"nonCoAuthorContributors":{"__typename":"UserConnection","edges":[]},"coAuthors":{"__typename":"UserConnection","edges":[]},"tkbMessagePolicies":{"__typename":"TkbMessagePolicies","canDoAuthoringActionsOnTkb":{"__typename":"PolicyResult","failureReason":{"__typename":"FailureReason","message":"error.lithium.policies.tkb.policy_can_do_authoring_action.accessDenied","key":"error.lithium.policies.tkb.policy_can_do_authoring_action.accessDenied","args":[]}}},"archivalData":null,"replies":{"__typename":"MessageConnection","edges":[{"__typename":"MessageEdge","cursor":"MjUuMnwyLjF8aXwxMHwzOToxfGludCwyODUwMTIsMjg1MDEy","node":{"__ref":"TkbReplyMessage:message:285012"}},{"__typename":"MessageEdge","cursor":"MjUuMnwyLjF8aXwxMHwzOToxfGludCwyODUwMTIsMjg1MDEz","node":{"__ref":"TkbReplyMessage:message:285013"}},{"__typename":"MessageEdge","cursor":"MjUuMnwyLjF8aXwxMHwzOToxfGludCwyODUwMTIsMjg1MDE0","node":{"__ref":"TkbReplyMessage:message:285014"}},{"__typename":"MessageEdge","cursor":"MjUuMnwyLjF8aXwxMHwzOToxfGludCwyODUwMTIsMjg1MDE1","node":{"__ref":"TkbReplyMessage:message:285015"}},{"__typename":"MessageEdge","cursor":"MjUuMnwyLjF8aXwxMHwzOToxfGludCwyODUwMTIsMjg1MDE2","node":{"__ref":"TkbReplyMessage:message:285016"}},{"__typename":"MessageEdge","cursor":"MjUuMnwyLjF8aXwxMHwzOToxfGludCwyODUwMTIsMjg1MDE3","node":{"__ref":"TkbReplyMessage:message:285017"}},{"__typename":"MessageEdge","cursor":"MjUuMnwyLjF8aXwxMHwzOToxfGludCwyODUwMTIsMjg1MDE4","node":{"__ref":"TkbReplyMessage:message:285018"}},{"__typename":"MessageEdge","cursor":"MjUuMnwyLjF8aXwxMHwzOToxfGludCwyODUwMTIsMjg1MDE5","node":{"__ref":"TkbReplyMessage:message:285019"}},{"__typename":"MessageEdge","cursor":"MjUuMnwyLjF8aXwxMHwzOToxfGludCwyODUwMTIsMjg1MDIw","node":{"__ref":"TkbReplyMessage:message:285020"}},{"__typename":"MessageEdge","cursor":"MjUuMnwyLjF8aXwxMHwzOToxfGludCwyODUwMTIsMjg1MDIx","node":{"__ref":"TkbReplyMessage:message:285021"}}],"pageInfo":{"__typename":"PageInfo","hasNextPage":true,"endCursor":"MjUuMnwyLjF8aXwxMHwzOToxfGludCwyODUwMTIsMjg1MDIx","hasPreviousPage":false,"startCursor":null}},"customFields":[],"revisions({\"constraints\":{\"isPublished\":{\"eq\":true}},\"first\":1})":{"__typename":"RevisionConnection","totalCount":3}},"Conversation:conversation:285011":{"__typename":"Conversation","id":"conversation:285011","solved":false,"topic":{"__ref":"TkbTopicMessage:message:285011"},"lastPostingActivityTime":"2023-06-06T12:24:40.050-07:00","lastPostTime":"2021-05-26T05:55:33.000-07:00","unreadReplyCount":30,"isSubscribed":false},"ModerationData:moderation_data:285011":{"__typename":"ModerationData","id":"moderation_data:285011","status":"APPROVED","rejectReason":null,"isReportedAbuse":false,"rejectUser":null,"rejectTime":null,"rejectActorType":null},"Revision:revision:285011_3":{"__typename":"Revision","id":"revision:285011_3","lastEditTime":"2023-06-06T12:24:40.050-07:00"},"CachedAsset:theme:customTheme1-1743753930430":{"__typename":"CachedAsset","id":"theme:customTheme1-1743753930430","value":{"id":"customTheme1","animation":{"fast":"150ms","normal":"250ms","slow":"500ms","slowest":"750ms","function":"cubic-bezier(0.07, 0.91, 0.51, 1)","__typename":"AnimationThemeSettings"},"avatar":{"borderRadius":"50%","collections":["custom"],"__typename":"AvatarThemeSettings"},"basics":{"browserIcon":{"imageAssetName":"JimmyPackets-512-1702592938213.png","imageLastModified":"1702592945815","__typename":"ThemeAsset"},"customerLogo":{"imageAssetName":"f5_logo_fix-1704824537976.svg","imageLastModified":"1704824540697","__typename":"ThemeAsset"},"maximumWidthOfPageContent":"1600px","oneColumnNarrowWidth":"800px","gridGutterWidthMd":"30px","gridGutterWidthXs":"10px","pageWidthStyle":"WIDTH_OF_PAGE_CONTENT","__typename":"BasicsThemeSettings"},"buttons":{"borderRadiusSm":"5px","borderRadius":"5px","borderRadiusLg":"5px","paddingY":"5px","paddingYLg":"7px","paddingYHero":"var(--lia-bs-btn-padding-y-lg)","paddingX":"12px","paddingXLg":"14px","paddingXHero":"42px","fontStyle":"NORMAL","fontWeight":"400","textTransform":"NONE","disabledOpacity":0.5,"primaryTextColor":"var(--lia-bs-white)","primaryTextHoverColor":"var(--lia-bs-white)","primaryTextActiveColor":"var(--lia-bs-white)","primaryBgColor":"var(--lia-bs-primary)","primaryBgHoverColor":"hsl(var(--lia-bs-primary-h), var(--lia-bs-primary-s), calc(var(--lia-bs-primary-l) * 0.85))","primaryBgActiveColor":"hsl(var(--lia-bs-primary-h), var(--lia-bs-primary-s), calc(var(--lia-bs-primary-l) * 0.7))","primaryBorder":"1px solid transparent","primaryBorderHover":"1px solid transparent","primaryBorderActive":"1px solid transparent","primaryBorderFocus":"1px solid var(--lia-bs-white)","primaryBoxShadowFocus":"0 0 0 1px var(--lia-bs-primary), 0 0 0 4px hsla(var(--lia-bs-primary-h), var(--lia-bs-primary-s), var(--lia-bs-primary-l), 0.2)","secondaryTextColor":"var(--lia-bs-gray-900)","secondaryTextHoverColor":"hsl(var(--lia-bs-gray-900-h), var(--lia-bs-gray-900-s), calc(var(--lia-bs-gray-900-l) * 0.95))","secondaryTextActiveColor":"hsl(var(--lia-bs-gray-900-h), var(--lia-bs-gray-900-s), calc(var(--lia-bs-gray-900-l) * 0.9))","secondaryBgColor":"var(--lia-bs-gray-400)","secondaryBgHoverColor":"hsl(var(--lia-bs-gray-400-h), var(--lia-bs-gray-400-s), calc(var(--lia-bs-gray-400-l) * 0.96))","secondaryBgActiveColor":"hsl(var(--lia-bs-gray-400-h), var(--lia-bs-gray-400-s), calc(var(--lia-bs-gray-400-l) * 0.92))","secondaryBorder":"1px solid transparent","secondaryBorderHover":"1px solid transparent","secondaryBorderActive":"1px solid transparent","secondaryBorderFocus":"1px solid transparent","secondaryBoxShadowFocus":"0 0 0 1px var(--lia-bs-primary), 0 0 0 4px hsla(var(--lia-bs-primary-h), var(--lia-bs-primary-s), var(--lia-bs-primary-l), 0.2)","tertiaryTextColor":"var(--lia-bs-gray-900)","tertiaryTextHoverColor":"hsl(var(--lia-bs-gray-900-h), var(--lia-bs-gray-900-s), calc(var(--lia-bs-gray-900-l) * 0.95))","tertiaryTextActiveColor":"hsl(var(--lia-bs-gray-900-h), var(--lia-bs-gray-900-s), calc(var(--lia-bs-gray-900-l) * 0.9))","tertiaryBgColor":"transparent","tertiaryBgHoverColor":"transparent","tertiaryBgActiveColor":"hsla(var(--lia-bs-black-h), var(--lia-bs-black-s), var(--lia-bs-black-l), 0.04)","tertiaryBorder":"1px solid transparent","tertiaryBorderHover":"1px solid hsla(var(--lia-bs-black-h), var(--lia-bs-black-s), var(--lia-bs-black-l), 0.08)","tertiaryBorderActive":"1px solid transparent","tertiaryBorderFocus":"1px solid transparent","tertiaryBoxShadowFocus":"0 0 0 1px var(--lia-bs-primary), 0 0 0 4px hsla(var(--lia-bs-primary-h), var(--lia-bs-primary-s), var(--lia-bs-primary-l), 0.2)","destructiveTextColor":"var(--lia-bs-danger)","destructiveTextHoverColor":"hsl(var(--lia-bs-danger-h), var(--lia-bs-danger-s), calc(var(--lia-bs-danger-l) * 0.95))","destructiveTextActiveColor":"hsl(var(--lia-bs-danger-h), var(--lia-bs-danger-s), calc(var(--lia-bs-danger-l) * 0.9))","destructiveBgColor":"var(--lia-bs-gray-300)","destructiveBgHoverColor":"hsl(var(--lia-bs-gray-300-h), var(--lia-bs-gray-300-s), calc(var(--lia-bs-gray-300-l) * 0.96))","destructiveBgActiveColor":"hsl(var(--lia-bs-gray-300-h), var(--lia-bs-gray-300-s), calc(var(--lia-bs-gray-300-l) * 0.92))","destructiveBorder":"1px solid transparent","destructiveBorderHover":"1px solid transparent","destructiveBorderActive":"1px solid transparent","destructiveBorderFocus":"1px solid transparent","destructiveBoxShadowFocus":"0 0 0 1px var(--lia-bs-primary), 0 0 0 4px hsla(var(--lia-bs-primary-h), var(--lia-bs-primary-s), var(--lia-bs-primary-l), 0.2)","__typename":"ButtonsThemeSettings"},"border":{"color":"hsla(var(--lia-bs-black-h), var(--lia-bs-black-s), var(--lia-bs-black-l), 0.08)","mainContent":"NONE","sideContent":"NONE","radiusSm":"3px","radius":"5px","radiusLg":"9px","radius50":"100vw","__typename":"BorderThemeSettings"},"boxShadow":{"xs":"0 0 0 1px hsla(var(--lia-bs-gray-900-h), var(--lia-bs-gray-900-s), var(--lia-bs-gray-900-l), 0.08), 0 3px 0 -1px hsla(var(--lia-bs-gray-900-h), var(--lia-bs-gray-900-s), var(--lia-bs-gray-900-l), 0.08)","sm":"0 2px 4px hsla(var(--lia-bs-gray-900-h), var(--lia-bs-gray-900-s), var(--lia-bs-gray-900-l), 0.06)","md":"0 5px 15px hsla(var(--lia-bs-gray-900-h), var(--lia-bs-gray-900-s), var(--lia-bs-gray-900-l), 0.15)","lg":"0 10px 30px hsla(var(--lia-bs-gray-900-h), var(--lia-bs-gray-900-s), var(--lia-bs-gray-900-l), 0.15)","__typename":"BoxShadowThemeSettings"},"cards":{"bgColor":"var(--lia-panel-bg-color)","borderRadius":"var(--lia-panel-border-radius)","boxShadow":"var(--lia-box-shadow-xs)","__typename":"CardsThemeSettings"},"chip":{"maxWidth":"300px","height":"30px","__typename":"ChipThemeSettings"},"coreTypes":{"defaultMessageLinkColor":"var(--lia-bs-primary)","defaultMessageLinkDecoration":"none","defaultMessageLinkFontStyle":"NORMAL","defaultMessageLinkFontWeight":"400","defaultMessageFontStyle":"NORMAL","defaultMessageFontWeight":"400","forumColor":"#0C5C8D","forumFontFamily":"var(--lia-bs-font-family-base)","forumFontWeight":"var(--lia-default-message-font-weight)","forumLineHeight":"var(--lia-bs-line-height-base)","forumFontStyle":"var(--lia-default-message-font-style)","forumMessageLinkColor":"var(--lia-default-message-link-color)","forumMessageLinkDecoration":"var(--lia-default-message-link-decoration)","forumMessageLinkFontStyle":"var(--lia-default-message-link-font-style)","forumMessageLinkFontWeight":"var(--lia-default-message-link-font-weight)","forumSolvedColor":"#62C026","blogColor":"#730015","blogFontFamily":"var(--lia-bs-font-family-base)","blogFontWeight":"var(--lia-default-message-font-weight)","blogLineHeight":"1.75","blogFontStyle":"var(--lia-default-message-font-style)","blogMessageLinkColor":"var(--lia-default-message-link-color)","blogMessageLinkDecoration":"var(--lia-default-message-link-decoration)","blogMessageLinkFontStyle":"var(--lia-default-message-link-font-style)","blogMessageLinkFontWeight":"var(--lia-default-message-link-font-weight)","tkbColor":"#C20025","tkbFontFamily":"var(--lia-bs-font-family-base)","tkbFontWeight":"var(--lia-default-message-font-weight)","tkbLineHeight":"1.75","tkbFontStyle":"var(--lia-default-message-font-style)","tkbMessageLinkColor":"var(--lia-default-message-link-color)","tkbMessageLinkDecoration":"var(--lia-default-message-link-decoration)","tkbMessageLinkFontStyle":"var(--lia-default-message-link-font-style)","tkbMessageLinkFontWeight":"var(--lia-default-message-link-font-weight)","qandaColor":"#4099E2","qandaFontFamily":"var(--lia-bs-font-family-base)","qandaFontWeight":"var(--lia-default-message-font-weight)","qandaLineHeight":"var(--lia-bs-line-height-base)","qandaFontStyle":"var(--lia-default-message-link-font-style)","qandaMessageLinkColor":"var(--lia-default-message-link-color)","qandaMessageLinkDecoration":"var(--lia-default-message-link-decoration)","qandaMessageLinkFontStyle":"var(--lia-default-message-link-font-style)","qandaMessageLinkFontWeight":"var(--lia-default-message-link-font-weight)","qandaSolvedColor":"#3FA023","ideaColor":"#F3704B","ideaFontFamily":"var(--lia-bs-font-family-base)","ideaFontWeight":"var(--lia-default-message-font-weight)","ideaLineHeight":"var(--lia-bs-line-height-base)","ideaFontStyle":"var(--lia-default-message-font-style)","ideaMessageLinkColor":"var(--lia-default-message-link-color)","ideaMessageLinkDecoration":"var(--lia-default-message-link-decoration)","ideaMessageLinkFontStyle":"var(--lia-default-message-link-font-style)","ideaMessageLinkFontWeight":"var(--lia-default-message-link-font-weight)","contestColor":"#FCC845","contestFontFamily":"var(--lia-bs-font-family-base)","contestFontWeight":"var(--lia-default-message-font-weight)","contestLineHeight":"var(--lia-bs-line-height-base)","contestFontStyle":"var(--lia-default-message-link-font-style)","contestMessageLinkColor":"var(--lia-default-message-link-color)","contestMessageLinkDecoration":"var(--lia-default-message-link-decoration)","contestMessageLinkFontStyle":"ITALIC","contestMessageLinkFontWeight":"var(--lia-default-message-link-font-weight)","occasionColor":"#EE4B5B","occasionFontFamily":"var(--lia-bs-font-family-base)","occasionFontWeight":"var(--lia-default-message-font-weight)","occasionLineHeight":"var(--lia-bs-line-height-base)","occasionFontStyle":"var(--lia-default-message-font-style)","occasionMessageLinkColor":"var(--lia-default-message-link-color)","occasionMessageLinkDecoration":"var(--lia-default-message-link-decoration)","occasionMessageLinkFontStyle":"var(--lia-default-message-link-font-style)","occasionMessageLinkFontWeight":"var(--lia-default-message-link-font-weight)","grouphubColor":"#491B62","categoryColor":"#949494","communityColor":"#FFFFFF","productColor":"#949494","__typename":"CoreTypesThemeSettings"},"colors":{"black":"#000000","white":"#FFFFFF","gray100":"#F7F7F7","gray200":"#F7F7F7","gray300":"#E8E8E8","gray400":"#D9D9D9","gray500":"#CCCCCC","gray600":"#949494","gray700":"#707070","gray800":"#545454","gray900":"#333333","dark":"#545454","light":"#F7F7F7","primary":"#0C5C8D","secondary":"#333333","bodyText":"#222222","bodyBg":"#F5F5F5","info":"#1D9CD3","success":"#62C026","warning":"#FFD651","danger":"#C20025","alertSystem":"#FF6600","textMuted":"#707070","highlight":"#FFFCAD","outline":"var(--lia-bs-primary)","custom":["#C20025","#081B85","#009639","#B3C6D7","#7CC0EB","#F29A36"],"__typename":"ColorsThemeSettings"},"divider":{"size":"3px","marginLeft":"4px","marginRight":"4px","borderRadius":"50%","bgColor":"var(--lia-bs-gray-600)","bgColorActive":"var(--lia-bs-gray-600)","__typename":"DividerThemeSettings"},"dropdown":{"fontSize":"var(--lia-bs-font-size-sm)","borderColor":"var(--lia-bs-border-color)","borderRadius":"var(--lia-bs-border-radius-sm)","dividerBg":"var(--lia-bs-gray-300)","itemPaddingY":"5px","itemPaddingX":"20px","headerColor":"var(--lia-bs-gray-700)","__typename":"DropdownThemeSettings"},"email":{"link":{"color":"#0069D4","hoverColor":"#0061c2","decoration":"none","hoverDecoration":"underline","__typename":"EmailLinkSettings"},"border":{"color":"#e4e4e4","__typename":"EmailBorderSettings"},"buttons":{"borderRadiusLg":"5px","paddingXLg":"16px","paddingYLg":"7px","fontWeight":"700","primaryTextColor":"#ffffff","primaryTextHoverColor":"#ffffff","primaryBgColor":"#0069D4","primaryBgHoverColor":"#005cb8","primaryBorder":"1px solid transparent","primaryBorderHover":"1px solid transparent","__typename":"EmailButtonsSettings"},"panel":{"borderRadius":"5px","borderColor":"#e4e4e4","__typename":"EmailPanelSettings"},"__typename":"EmailThemeSettings"},"emoji":{"skinToneDefault":"#ffcd43","skinToneLight":"#fae3c5","skinToneMediumLight":"#e2cfa5","skinToneMedium":"#daa478","skinToneMediumDark":"#a78058","skinToneDark":"#5e4d43","__typename":"EmojiThemeSettings"},"heading":{"color":"var(--lia-bs-body-color)","fontFamily":"Inter","fontStyle":"NORMAL","fontWeight":"600","h1FontSize":"30px","h2FontSize":"25px","h3FontSize":"20px","h4FontSize":"18px","h5FontSize":"16px","h6FontSize":"16px","lineHeight":"1.2","subHeaderFontSize":"11px","subHeaderFontWeight":"500","h1LetterSpacing":"normal","h2LetterSpacing":"normal","h3LetterSpacing":"normal","h4LetterSpacing":"normal","h5LetterSpacing":"normal","h6LetterSpacing":"normal","subHeaderLetterSpacing":"2px","h1FontWeight":"var(--lia-bs-headings-font-weight)","h2FontWeight":"var(--lia-bs-headings-font-weight)","h3FontWeight":"var(--lia-bs-headings-font-weight)","h4FontWeight":"var(--lia-bs-headings-font-weight)","h5FontWeight":"var(--lia-bs-headings-font-weight)","h6FontWeight":"var(--lia-bs-headings-font-weight)","__typename":"HeadingThemeSettings"},"icons":{"size10":"10px","size12":"12px","size14":"14px","size16":"16px","size20":"20px","size24":"24px","size30":"30px","size40":"40px","size50":"50px","size60":"60px","size80":"80px","size120":"120px","size160":"160px","__typename":"IconsThemeSettings"},"imagePreview":{"bgColor":"var(--lia-bs-gray-900)","titleColor":"var(--lia-bs-white)","controlColor":"var(--lia-bs-white)","controlBgColor":"var(--lia-bs-gray-800)","__typename":"ImagePreviewThemeSettings"},"input":{"borderColor":"var(--lia-bs-gray-600)","disabledColor":"var(--lia-bs-gray-600)","focusBorderColor":"var(--lia-bs-primary)","labelMarginBottom":"10px","btnFontSize":"var(--lia-bs-font-size-sm)","focusBoxShadow":"0 0 0 3px hsla(var(--lia-bs-primary-h), var(--lia-bs-primary-s), var(--lia-bs-primary-l), 0.2)","checkLabelMarginBottom":"2px","checkboxBorderRadius":"3px","borderRadiusSm":"var(--lia-bs-border-radius-sm)","borderRadius":"var(--lia-bs-border-radius)","borderRadiusLg":"var(--lia-bs-border-radius-lg)","formTextMarginTop":"4px","textAreaBorderRadius":"var(--lia-bs-border-radius)","activeFillColor":"var(--lia-bs-primary)","__typename":"InputThemeSettings"},"loading":{"dotDarkColor":"hsla(var(--lia-bs-black-h), var(--lia-bs-black-s), var(--lia-bs-black-l), 0.2)","dotLightColor":"hsla(var(--lia-bs-white-h), var(--lia-bs-white-s), var(--lia-bs-white-l), 0.5)","barDarkColor":"hsla(var(--lia-bs-black-h), var(--lia-bs-black-s), var(--lia-bs-black-l), 0.06)","barLightColor":"hsla(var(--lia-bs-white-h), var(--lia-bs-white-s), var(--lia-bs-white-l), 0.4)","__typename":"LoadingThemeSettings"},"link":{"color":"var(--lia-bs-primary)","hoverColor":"hsl(var(--lia-bs-primary-h), var(--lia-bs-primary-s), calc(var(--lia-bs-primary-l) - 10%))","decoration":"none","hoverDecoration":"underline","__typename":"LinkThemeSettings"},"listGroup":{"itemPaddingY":"15px","itemPaddingX":"15px","borderColor":"var(--lia-bs-gray-300)","__typename":"ListGroupThemeSettings"},"modal":{"contentTextColor":"var(--lia-bs-body-color)","contentBg":"var(--lia-bs-white)","backgroundBg":"var(--lia-bs-black)","smSize":"440px","mdSize":"760px","lgSize":"1080px","backdropOpacity":0.3,"contentBoxShadowXs":"var(--lia-bs-box-shadow-sm)","contentBoxShadow":"var(--lia-bs-box-shadow)","headerFontWeight":"700","__typename":"ModalThemeSettings"},"navbar":{"position":"FIXED","background":{"attachment":null,"clip":null,"color":"var(--lia-bs-white)","imageAssetName":null,"imageLastModified":"0","origin":null,"position":"CENTER_CENTER","repeat":"NO_REPEAT","size":"COVER","__typename":"BackgroundProps"},"backgroundOpacity":0.8,"paddingTop":"15px","paddingBottom":"15px","borderBottom":"1px solid var(--lia-bs-border-color)","boxShadow":"var(--lia-bs-box-shadow-sm)","brandMarginRight":"30px","brandMarginRightSm":"10px","brandLogoHeight":"30px","linkGap":"10px","linkJustifyContent":"flex-start","linkPaddingY":"5px","linkPaddingX":"10px","linkDropdownPaddingY":"9px","linkDropdownPaddingX":"var(--lia-nav-link-px)","linkColor":"var(--lia-bs-body-color)","linkHoverColor":"var(--lia-bs-primary)","linkFontSize":"var(--lia-bs-font-size-sm)","linkFontStyle":"NORMAL","linkFontWeight":"400","linkTextTransform":"NONE","linkLetterSpacing":"normal","linkBorderRadius":"var(--lia-bs-border-radius-sm)","linkBgColor":"transparent","linkBgHoverColor":"transparent","linkBorder":"none","linkBorderHover":"none","linkBoxShadow":"none","linkBoxShadowHover":"none","linkTextBorderBottom":"none","linkTextBorderBottomHover":"none","dropdownPaddingTop":"10px","dropdownPaddingBottom":"15px","dropdownPaddingX":"10px","dropdownMenuOffset":"2px","dropdownDividerMarginTop":"10px","dropdownDividerMarginBottom":"10px","dropdownBorderColor":"hsla(var(--lia-bs-black-h), var(--lia-bs-black-s), var(--lia-bs-black-l), 0.08)","controllerBgHoverColor":"hsla(var(--lia-bs-black-h), var(--lia-bs-black-s), var(--lia-bs-black-l), 0.1)","controllerIconColor":"var(--lia-bs-body-color)","controllerIconHoverColor":"var(--lia-bs-body-color)","controllerTextColor":"var(--lia-nav-controller-icon-color)","controllerTextHoverColor":"var(--lia-nav-controller-icon-hover-color)","controllerHighlightColor":"hsla(30, 100%, 50%)","controllerHighlightTextColor":"var(--lia-yiq-light)","controllerBorderRadius":"var(--lia-border-radius-50)","hamburgerColor":"var(--lia-nav-controller-icon-color)","hamburgerHoverColor":"var(--lia-nav-controller-icon-color)","hamburgerBgColor":"transparent","hamburgerBgHoverColor":"transparent","hamburgerBorder":"none","hamburgerBorderHover":"none","collapseMenuMarginLeft":"20px","collapseMenuDividerBg":"var(--lia-nav-link-color)","collapseMenuDividerOpacity":0.16,"__typename":"NavbarThemeSettings"},"pager":{"textColor":"var(--lia-bs-link-color)","textFontWeight":"var(--lia-font-weight-md)","textFontSize":"var(--lia-bs-font-size-sm)","__typename":"PagerThemeSettings"},"panel":{"bgColor":"var(--lia-bs-white)","borderRadius":"var(--lia-bs-border-radius)","borderColor":"var(--lia-bs-border-color)","boxShadow":"none","__typename":"PanelThemeSettings"},"popover":{"arrowHeight":"8px","arrowWidth":"16px","maxWidth":"300px","minWidth":"100px","headerBg":"var(--lia-bs-white)","borderColor":"var(--lia-bs-border-color)","borderRadius":"var(--lia-bs-border-radius)","boxShadow":"0 0.5rem 1rem hsla(var(--lia-bs-black-h), var(--lia-bs-black-s), var(--lia-bs-black-l), 0.15)","__typename":"PopoverThemeSettings"},"prism":{"color":"#000000","bgColor":"#f5f2f0","fontFamily":"var(--font-family-monospace)","fontSize":"var(--lia-bs-font-size-base)","fontWeightBold":"var(--lia-bs-font-weight-bold)","fontStyleItalic":"italic","tabSize":2,"highlightColor":"#b3d4fc","commentColor":"#62707e","punctuationColor":"#6f6f6f","namespaceOpacity":"0.7","propColor":"#990055","selectorColor":"#517a00","operatorColor":"#906736","operatorBgColor":"hsla(0, 0%, 100%, 0.5)","keywordColor":"#0076a9","functionColor":"#d3284b","variableColor":"#c14700","__typename":"PrismThemeSettings"},"rte":{"bgColor":"var(--lia-bs-white)","borderRadius":"var(--lia-panel-border-radius)","boxShadow":" var(--lia-panel-box-shadow)","customColor1":"#bfedd2","customColor2":"#fbeeb8","customColor3":"#f8cac6","customColor4":"#eccafa","customColor5":"#c2e0f4","customColor6":"#2dc26b","customColor7":"#f1c40f","customColor8":"#e03e2d","customColor9":"#b96ad9","customColor10":"#3598db","customColor11":"#169179","customColor12":"#e67e23","customColor13":"#ba372a","customColor14":"#843fa1","customColor15":"#236fa1","customColor16":"#ecf0f1","customColor17":"#ced4d9","customColor18":"#95a5a6","customColor19":"#7e8c8d","customColor20":"#34495e","customColor21":"#000000","customColor22":"#ffffff","defaultMessageHeaderMarginTop":"14px","defaultMessageHeaderMarginBottom":"10px","defaultMessageItemMarginTop":"0","defaultMessageItemMarginBottom":"10px","diffAddedColor":"hsla(170, 53%, 51%, 0.4)","diffChangedColor":"hsla(43, 97%, 63%, 0.4)","diffNoneColor":"hsla(0, 0%, 80%, 0.4)","diffRemovedColor":"hsla(9, 74%, 47%, 0.4)","specialMessageHeaderMarginTop":"14px","specialMessageHeaderMarginBottom":"10px","specialMessageItemMarginTop":"0","specialMessageItemMarginBottom":"10px","__typename":"RteThemeSettings"},"tags":{"bgColor":"var(--lia-bs-gray-200)","bgHoverColor":"var(--lia-bs-gray-400)","borderRadius":"var(--lia-bs-border-radius-sm)","color":"var(--lia-bs-body-color)","hoverColor":"var(--lia-bs-body-color)","fontWeight":"var(--lia-font-weight-md)","fontSize":"var(--lia-font-size-xxs)","textTransform":"UPPERCASE","letterSpacing":"0.5px","__typename":"TagsThemeSettings"},"toasts":{"borderRadius":"var(--lia-bs-border-radius)","paddingX":"12px","__typename":"ToastsThemeSettings"},"typography":{"fontFamilyBase":"Atkinson Hyperlegible","fontStyleBase":"NORMAL","fontWeightBase":"400","fontWeightLight":"300","fontWeightNormal":"400","fontWeightMd":"500","fontWeightBold":"700","letterSpacingSm":"normal","letterSpacingXs":"normal","lineHeightBase":"1.3","fontSizeBase":"15px","fontSizeXxs":"11px","fontSizeXs":"12px","fontSizeSm":"13px","fontSizeLg":"20px","fontSizeXl":"24px","smallFontSize":"14px","customFonts":[],"__typename":"TypographyThemeSettings"},"unstyledListItem":{"marginBottomSm":"5px","marginBottomMd":"10px","marginBottomLg":"15px","marginBottomXl":"20px","marginBottomXxl":"25px","__typename":"UnstyledListItemThemeSettings"},"yiq":{"light":"#ffffff","dark":"#000000","__typename":"YiqThemeSettings"},"colorLightness":{"primaryDark":0.36,"primaryLight":0.74,"primaryLighter":0.89,"primaryLightest":0.95,"infoDark":0.39,"infoLight":0.72,"infoLighter":0.85,"infoLightest":0.93,"successDark":0.24,"successLight":0.62,"successLighter":0.8,"successLightest":0.91,"warningDark":0.39,"warningLight":0.68,"warningLighter":0.84,"warningLightest":0.93,"dangerDark":0.41,"dangerLight":0.72,"dangerLighter":0.89,"dangerLightest":0.95,"__typename":"ColorLightnessThemeSettings"},"localOverride":false,"__typename":"Theme"},"localOverride":false},"CachedAsset:text:en_US-shared/client/components/common/Loading/LoadingDot-1743097580000":{"__typename":"CachedAsset","id":"text:en_US-shared/client/components/common/Loading/LoadingDot-1743097580000","value":{"title":"Loading..."},"localOverride":false},"CachedAsset:quilt:f5.prod:pages/kbs/TkbMessagePage:board:codeshare-1743753928671":{"__typename":"CachedAsset","id":"quilt:f5.prod:pages/kbs/TkbMessagePage:board:codeshare-1743753928671","value":{"id":"TkbMessagePage","container":{"id":"Common","headerProps":{"backgroundImageProps":null,"backgroundColor":null,"addComponents":null,"removeComponents":["community.widget.bannerWidget"],"componentOrder":null,"__typename":"QuiltContainerSectionProps"},"headerComponentProps":{"community.widget.breadcrumbWidget":{"disableLastCrumbForDesktop":false}},"footerProps":null,"footerComponentProps":null,"items":[{"id":"message-list","layout":"MAIN_SIDE","bgColor":"transparent","showTitle":true,"showDescription":true,"textPosition":"CENTER","textColor":"var(--lia-bs-body-color)","sectionEditLevel":null,"bgImage":null,"disableSpacing":null,"edgeToEdgeDisplay":null,"fullHeight":null,"showBorder":null,"__typename":"MainSideQuiltSection","columnMap":{"main":[{"id":"tkbs.widget.tkbArticleWidget","className":"lia-tkb-container","props":{"contributorListType":"panel","showHelpfulness":false,"showTimestamp":true,"showGuideNavigationSection":true,"showVersion":true,"lazyLoad":false,"editLevel":"CONFIGURE"},"__typename":"QuiltComponent"}],"side":[{"id":"featuredWidgets.widget.featuredContentWidget","className":null,"props":{"instanceId":"featuredWidgets.widget.featuredContentWidget-1702666556326","layoutProps":{"layout":"card","layoutOptions":{"useRepliesCount":false,"useAuthorRank":false,"useTimeToRead":true,"useKudosCount":false,"useViewCount":true,"usePreviewMedia":true,"useBody":false,"useCenteredCardContent":false,"useTags":true,"useTimestamp":false,"useBoardLink":true,"useAuthorLink":false,"useSolvedBadge":true}},"titleSrOnly":false,"showPager":true,"pageSize":3,"lazyLoad":true},"__typename":"QuiltComponent"},{"id":"messages.widget.relatedContentWidget","className":null,"props":{"hideIfEmpty":true,"enablePagination":true,"useTitle":true,"listVariant":{"type":"listGroup"},"pageSize":3,"style":"list","pagerVariant":{"type":"loadMore"},"viewVariant":{"type":"inline","props":{"useRepliesCount":true,"useMedia":true,"useAuthorRank":false,"useNode":true,"useTimeToRead":true,"useSpoilerFreeBody":true,"useKudosCount":true,"useNodeLink":true,"useViewCount":true,"usePreviewMedia":false,"useBody":false,"timeStampType":"postTime","useTags":true,"clampSubjectLines":2,"useBoardIcon":false,"useMessageTimeLink":true,"clampBodyLines":3,"useTextBody":true,"useSolvedBadge":true,"useAvatar":true,"useAuthorLogin":true,"useUnreadCount":true}},"lazyLoad":true,"panelType":"divider"},"__typename":"QuiltComponent"}],"__typename":"MainSideSectionColumns"}}],"__typename":"QuiltContainer"},"__typename":"Quilt","localOverride":false},"localOverride":false},"CachedAsset:text:en_US-components/common/EmailVerification-1743097580000":{"__typename":"CachedAsset","id":"text:en_US-components/common/EmailVerification-1743097580000","value":{"email.verification.title":"Email Verification Required","email.verification.message.update.email":"To participate in the community, you must first verify your email address. The verification email was sent to {email}. To change your email, visit My Settings.","email.verification.message.resend.email":"To participate in the community, you must first verify your email address. The verification email was sent to {email}. Resend email."},"localOverride":false},"CachedAsset:text:en_US-pages/kbs/TkbMessagePage-1743097580000":{"__typename":"CachedAsset","id":"text:en_US-pages/kbs/TkbMessagePage-1743097580000","value":{"title":"{contextMessageSubject} | {communityTitle}","errorMissing":"This article cannot be found","name":"TKB Message Page","section.message-list.title":"","archivedMessageTitle":"This Content Has Been Archived","section.erPqcf.title":"","section.erPqcf.description":"","section.message-list.description":""},"localOverride":false},"CachedAsset:quiltWrapper:f5.prod:Common:1743753824858":{"__typename":"CachedAsset","id":"quiltWrapper:f5.prod:Common:1743753824858","value":{"id":"Common","header":{"backgroundImageProps":{"assetName":"header.jpg","backgroundSize":"COVER","backgroundRepeat":"NO_REPEAT","backgroundPosition":"LEFT_CENTER","lastModified":"1702932449000","__typename":"BackgroundImageProps"},"backgroundColor":"transparent","items":[{"id":"custom.widget.Beta_MetaNav","props":{"widgetVisibility":"signedInOrAnonymous","useTitle":true,"useBackground":false,"title":"","lazyLoad":false},"__typename":"QuiltComponent"},{"id":"community.widget.navbarWidget","props":{"showUserName":false,"showRegisterLink":true,"style":{"boxShadow":"var(--lia-bs-box-shadow-sm)","linkFontWeight":"700","controllerHighlightColor":"hsla(30, 100%, 50%)","dropdownDividerMarginBottom":"10px","hamburgerBorderHover":"none","linkFontSize":"15px","linkBoxShadowHover":"none","backgroundOpacity":0.4,"controllerBorderRadius":"var(--lia-border-radius-50)","hamburgerBgColor":"transparent","linkTextBorderBottom":"none","hamburgerColor":"var(--lia-nav-controller-icon-color)","brandLogoHeight":"48px","linkLetterSpacing":"normal","linkBgHoverColor":"transparent","collapseMenuDividerOpacity":0.16,"paddingBottom":"10px","dropdownPaddingBottom":"15px","dropdownMenuOffset":"2px","hamburgerBgHoverColor":"transparent","borderBottom":"0","hamburgerBorder":"none","dropdownPaddingX":"10px","brandMarginRightSm":"10px","linkBoxShadow":"none","linkJustifyContent":"center","linkColor":"var(--lia-bs-primary)","collapseMenuDividerBg":"var(--lia-nav-link-color)","dropdownPaddingTop":"10px","controllerHighlightTextColor":"var(--lia-yiq-dark)","background":{"imageAssetName":"","color":"var(--lia-bs-white)","size":"COVER","repeat":"NO_REPEAT","position":"CENTER_CENTER","imageLastModified":""},"linkBorderRadius":"var(--lia-bs-border-radius-sm)","linkHoverColor":"var(--lia-bs-primary)","position":"FIXED","linkBorder":"none","linkTextBorderBottomHover":"2px solid #0C5C8D","brandMarginRight":"30px","hamburgerHoverColor":"var(--lia-nav-controller-icon-color)","linkBorderHover":"none","collapseMenuMarginLeft":"20px","linkFontStyle":"NORMAL","linkPaddingX":"10px","paddingTop":"10px","linkPaddingY":"5px","linkTextTransform":"NONE","dropdownBorderColor":"hsla(var(--lia-bs-black-h), var(--lia-bs-black-s), var(--lia-bs-black-l), 0.08)","controllerBgHoverColor":"hsla(var(--lia-bs-black-h), var(--lia-bs-black-s), var(--lia-bs-black-l), 0.1)","linkDropdownPaddingX":"var(--lia-nav-link-px)","linkBgColor":"transparent","linkDropdownPaddingY":"9px","controllerIconColor":"#0C5C8D","dropdownDividerMarginTop":"10px","linkGap":"10px","controllerIconHoverColor":"#0C5C8D"},"links":{"sideLinks":[],"mainLinks":[{"children":[{"linkType":"INTERNAL","id":"migrated-link-1","params":{"boardId":"TechnicalForum","categoryId":"Forums"},"routeName":"ForumBoardPage"},{"linkType":"INTERNAL","id":"migrated-link-2","params":{"boardId":"WaterCooler","categoryId":"Forums"},"routeName":"ForumBoardPage"}],"linkType":"INTERNAL","id":"migrated-link-0","params":{"categoryId":"Forums"},"routeName":"CategoryPage"},{"children":[{"linkType":"INTERNAL","id":"migrated-link-4","params":{"boardId":"codeshare","categoryId":"CrowdSRC"},"routeName":"TkbBoardPage"},{"linkType":"INTERNAL","id":"migrated-link-5","params":{"boardId":"communityarticles","categoryId":"CrowdSRC"},"routeName":"TkbBoardPage"}],"linkType":"INTERNAL","id":"migrated-link-3","params":{"categoryId":"CrowdSRC"},"routeName":"CategoryPage"},{"children":[{"linkType":"INTERNAL","id":"migrated-link-7","params":{"boardId":"TechnicalArticles","categoryId":"Articles"},"routeName":"TkbBoardPage"},{"linkType":"INTERNAL","id":"article-series","params":{"boardId":"article-series","categoryId":"Articles"},"routeName":"TkbBoardPage"},{"linkType":"INTERNAL","id":"security-insights","params":{"boardId":"security-insights","categoryId":"Articles"},"routeName":"TkbBoardPage"},{"linkType":"INTERNAL","id":"migrated-link-8","params":{"boardId":"DevCentralNews","categoryId":"Articles"},"routeName":"TkbBoardPage"}],"linkType":"INTERNAL","id":"migrated-link-6","params":{"categoryId":"Articles"},"routeName":"CategoryPage"},{"children":[{"linkType":"INTERNAL","id":"migrated-link-10","params":{"categoryId":"CommunityGroups"},"routeName":"CategoryPage"},{"linkType":"INTERNAL","id":"migrated-link-11","params":{"categoryId":"F5-Groups"},"routeName":"CategoryPage"}],"linkType":"INTERNAL","id":"migrated-link-9","params":{"categoryId":"GroupsCategory"},"routeName":"CategoryPage"},{"children":[],"linkType":"INTERNAL","id":"migrated-link-12","params":{"boardId":"Events","categoryId":"top"},"routeName":"EventBoardPage"},{"children":[],"linkType":"INTERNAL","id":"migrated-link-13","params":{"boardId":"Suggestions","categoryId":"top"},"routeName":"IdeaBoardPage"},{"children":[],"linkType":"EXTERNAL","id":"Common-external-link","url":"https://community.f5.com/c/how-do-i","target":"SELF"}]},"className":"QuiltComponent_lia-component-edit-mode__lQ9Z6","showSearchIcon":false},"__typename":"QuiltComponent"},{"id":"community.widget.bannerWidget","props":{"backgroundColor":"transparent","visualEffects":{"showBottomBorder":false},"backgroundImageProps":{"backgroundSize":"COVER","backgroundPosition":"CENTER_CENTER","backgroundRepeat":"NO_REPEAT"},"fontColor":"#222222"},"__typename":"QuiltComponent"},{"id":"community.widget.breadcrumbWidget","props":{"backgroundColor":"var(--lia-bs-primary)","linkHighlightColor":"#FFFFFF","visualEffects":{"showBottomBorder":false},"backgroundOpacity":60,"linkTextColor":"#FFFFFF"},"__typename":"QuiltComponent"}],"__typename":"QuiltWrapperSection"},"footer":{"backgroundImageProps":{"assetName":null,"backgroundSize":"COVER","backgroundRepeat":"NO_REPEAT","backgroundPosition":"CENTER_CENTER","lastModified":null,"__typename":"BackgroundImageProps"},"backgroundColor":"var(--lia-bs-body-color)","items":[{"id":"custom.widget.Beta_Footer","props":{"widgetVisibility":"signedInOrAnonymous","useTitle":true,"useBackground":false,"title":"","lazyLoad":false},"__typename":"QuiltComponent"},{"id":"custom.widget.Tag_Manager_Helper","props":{"widgetVisibility":"signedInOrAnonymous","useTitle":true,"useBackground":false,"title":"","lazyLoad":false},"__typename":"QuiltComponent"},{"id":"custom.widget.Consent_Blackbar","props":{"widgetVisibility":"signedInOrAnonymous","useTitle":true,"useBackground":false,"title":"","lazyLoad":false},"__typename":"QuiltComponent"}],"__typename":"QuiltWrapperSection"},"__typename":"QuiltWrapper","localOverride":false},"localOverride":false},"CachedAsset:text:en_US-components/common/ActionFeedback-1743097580000":{"__typename":"CachedAsset","id":"text:en_US-components/common/ActionFeedback-1743097580000","value":{"joinedGroupHub.title":"Welcome","joinedGroupHub.message":"You are now a member of this group and are subscribed to updates.","groupHubInviteNotFound.title":"Invitation Not Found","groupHubInviteNotFound.message":"Sorry, we could not find your invitation to the group. The owner may have canceled the invite.","groupHubNotFound.title":"Group Not Found","groupHubNotFound.message":"The grouphub you tried to join does not exist. It may have been deleted.","existingGroupHubMember.title":"Already Joined","existingGroupHubMember.message":"You are already a member of this group.","accountLocked.title":"Account Locked","accountLocked.message":"Your account has been locked due to multiple failed attempts. Try again in {lockoutTime} minutes.","editedGroupHub.title":"Changes Saved","editedGroupHub.message":"Your group has been updated.","leftGroupHub.title":"Goodbye","leftGroupHub.message":"You are no longer a member of this group and will not receive future updates.","deletedGroupHub.title":"Deleted","deletedGroupHub.message":"The group has been deleted.","groupHubCreated.title":"Group Created","groupHubCreated.message":"{groupHubName} is ready to use","accountClosed.title":"Account Closed","accountClosed.message":"The account has been closed and you will now be redirected to the homepage","resetTokenExpired.title":"Reset Password Link has Expired","resetTokenExpired.message":"Try resetting your password again","invalidUrl.title":"Invalid URL","invalidUrl.message":"The URL you're using is not recognized. Verify your URL and try again.","accountClosedForUser.title":"Account Closed","accountClosedForUser.message":"{userName}'s account is closed","inviteTokenInvalid.title":"Invitation Invalid","inviteTokenInvalid.message":"Your invitation to the community has been canceled or expired.","inviteTokenError.title":"Invitation Verification Failed","inviteTokenError.message":"The url you are utilizing is not recognized. Verify your URL and try again","pageNotFound.title":"Access Denied","pageNotFound.message":"You do not have access to this area of the community or it doesn't exist","eventAttending.title":"Responded as Attending","eventAttending.message":"You'll be notified when there's new activity and reminded as the event approaches","eventInterested.title":"Responded as Interested","eventInterested.message":"You'll be notified when there's new activity and reminded as the event approaches","eventNotFound.title":"Event Not Found","eventNotFound.message":"The event you tried to respond to does not exist.","redirectToRelatedPage.title":"Showing Related Content","redirectToRelatedPageForBaseUsers.title":"Showing Related Content","redirectToRelatedPageForBaseUsers.message":"The content you are trying to access is archived","redirectToRelatedPage.message":"The content you are trying to access is archived","relatedUrl.archivalLink.flyoutMessage":"The content you are trying to access is archived View Archived Content"},"localOverride":false},"CachedAsset:component:custom.widget.Beta_MetaNav-en-1743753946332":{"__typename":"CachedAsset","id":"component:custom.widget.Beta_MetaNav-en-1743753946332","value":{"component":{"id":"custom.widget.Beta_MetaNav","template":{"id":"Beta_MetaNav","markupLanguage":"HANDLEBARS","style":null,"texts":null,"defaults":{"config":{"applicablePages":[],"description":"MetaNav menu at the top of every page.","fetchedContent":null,"__typename":"ComponentConfiguration"},"props":[],"__typename":"ComponentProperties"},"components":[{"id":"custom.widget.Beta_MetaNav","form":null,"config":null,"props":[],"__typename":"Component"}],"grouping":"CUSTOM","__typename":"ComponentTemplate"},"properties":{"config":{"applicablePages":[],"description":"MetaNav menu at the top of every page.","fetchedContent":null,"__typename":"ComponentConfiguration"},"props":[],"__typename":"ComponentProperties"},"form":null,"__typename":"Component","localOverride":false},"globalCss":null,"form":null},"localOverride":false},"CachedAsset:component:custom.widget.Beta_Footer-en-1743753946332":{"__typename":"CachedAsset","id":"component:custom.widget.Beta_Footer-en-1743753946332","value":{"component":{"id":"custom.widget.Beta_Footer","template":{"id":"Beta_Footer","markupLanguage":"HANDLEBARS","style":null,"texts":null,"defaults":{"config":{"applicablePages":[],"description":"DevCentral´s custom footer.","fetchedContent":null,"__typename":"ComponentConfiguration"},"props":[],"__typename":"ComponentProperties"},"components":[{"id":"custom.widget.Beta_Footer","form":null,"config":null,"props":[],"__typename":"Component"}],"grouping":"CUSTOM","__typename":"ComponentTemplate"},"properties":{"config":{"applicablePages":[],"description":"DevCentral´s custom footer.","fetchedContent":null,"__typename":"ComponentConfiguration"},"props":[],"__typename":"ComponentProperties"},"form":null,"__typename":"Component","localOverride":false},"globalCss":null,"form":null},"localOverride":false},"CachedAsset:component:custom.widget.Tag_Manager_Helper-en-1743753946332":{"__typename":"CachedAsset","id":"component:custom.widget.Tag_Manager_Helper-en-1743753946332","value":{"component":{"id":"custom.widget.Tag_Manager_Helper","template":{"id":"Tag_Manager_Helper","markupLanguage":"HANDLEBARS","style":null,"texts":null,"defaults":{"config":{"applicablePages":[],"description":"Helper widget to inject Tag Manager scripts into head element","fetchedContent":null,"__typename":"ComponentConfiguration"},"props":[],"__typename":"ComponentProperties"},"components":[{"id":"custom.widget.Tag_Manager_Helper","form":null,"config":null,"props":[],"__typename":"Component"}],"grouping":"CUSTOM","__typename":"ComponentTemplate"},"properties":{"config":{"applicablePages":[],"description":"Helper widget to inject Tag Manager scripts into head element","fetchedContent":null,"__typename":"ComponentConfiguration"},"props":[],"__typename":"ComponentProperties"},"form":null,"__typename":"Component","localOverride":false},"globalCss":null,"form":null},"localOverride":false},"CachedAsset:component:custom.widget.Consent_Blackbar-en-1743753946332":{"__typename":"CachedAsset","id":"component:custom.widget.Consent_Blackbar-en-1743753946332","value":{"component":{"id":"custom.widget.Consent_Blackbar","template":{"id":"Consent_Blackbar","markupLanguage":"HTML","style":null,"texts":null,"defaults":{"config":{"applicablePages":[],"description":"","fetchedContent":null,"__typename":"ComponentConfiguration"},"props":[],"__typename":"ComponentProperties"},"components":[{"id":"custom.widget.Consent_Blackbar","form":null,"config":null,"props":[],"__typename":"Component"}],"grouping":"TEXTHTML","__typename":"ComponentTemplate"},"properties":{"config":{"applicablePages":[],"description":"","fetchedContent":null,"__typename":"ComponentConfiguration"},"props":[],"__typename":"ComponentProperties"},"form":null,"__typename":"Component","localOverride":false},"globalCss":null,"form":null},"localOverride":false},"CachedAsset:text:en_US-components/community/Breadcrumb-1743097580000":{"__typename":"CachedAsset","id":"text:en_US-components/community/Breadcrumb-1743097580000","value":{"navLabel":"Breadcrumbs","dropdown":"Additional parent page navigation"},"localOverride":false},"CachedAsset:text:en_US-components/messages/MessageBanner-1743097580000":{"__typename":"CachedAsset","id":"text:en_US-components/messages/MessageBanner-1743097580000","value":{"messageMarkedAsSpam":"This post has been marked as spam","messageMarkedAsSpam@board:TKB":"This article has been marked as spam","messageMarkedAsSpam@board:BLOG":"This post has been marked as spam","messageMarkedAsSpam@board:FORUM":"This discussion has been marked as spam","messageMarkedAsSpam@board:OCCASION":"This event has been marked as spam","messageMarkedAsSpam@board:IDEA":"This idea has been marked as spam","manageSpam":"Manage Spam","messageMarkedAsAbuse":"This post has been marked as abuse","messageMarkedAsAbuse@board:TKB":"This article has been marked as abuse","messageMarkedAsAbuse@board:BLOG":"This post has been marked as abuse","messageMarkedAsAbuse@board:FORUM":"This discussion has been marked as abuse","messageMarkedAsAbuse@board:OCCASION":"This event has been marked as abuse","messageMarkedAsAbuse@board:IDEA":"This idea has been marked as abuse","preModCommentAuthorText":"This comment will be published as soon as it is approved","preModCommentModeratorText":"This comment is awaiting moderation","messageMarkedAsOther":"This post has been rejected due to other reasons","messageMarkedAsOther@board:TKB":"This article has been rejected due to other reasons","messageMarkedAsOther@board:BLOG":"This post has been rejected due to other reasons","messageMarkedAsOther@board:FORUM":"This discussion has been rejected due to other reasons","messageMarkedAsOther@board:OCCASION":"This event has been rejected due to other reasons","messageMarkedAsOther@board:IDEA":"This idea has been rejected due to other reasons","messageArchived":"This post was archived on {date}","relatedUrl":"View Related Content","relatedContentText":"Showing related content","archivedContentLink":"View Archived Content"},"localOverride":false},"CachedAsset:text:en_US-components/tkbs/TkbArticleWidget-1743097580000":{"__typename":"CachedAsset","id":"text:en_US-components/tkbs/TkbArticleWidget-1743097580000","value":{},"localOverride":false},"Category:category:Forums":{"__typename":"Category","id":"category:Forums","categoryPolicies":{"__typename":"CategoryPolicies","canReadNode":{"__typename":"PolicyResult","failureReason":null}}},"Forum:board:TechnicalForum":{"__typename":"Forum","id":"board:TechnicalForum","forumPolicies":{"__typename":"ForumPolicies","canReadNode":{"__typename":"PolicyResult","failureReason":null}},"boardPolicies":{"__typename":"BoardPolicies","canReadNode":{"__typename":"PolicyResult","failureReason":null}}},"Forum:board:WaterCooler":{"__typename":"Forum","id":"board:WaterCooler","forumPolicies":{"__typename":"ForumPolicies","canReadNode":{"__typename":"PolicyResult","failureReason":null}},"boardPolicies":{"__typename":"BoardPolicies","canReadNode":{"__typename":"PolicyResult","failureReason":null}}},"Category:category:Articles":{"__typename":"Category","id":"category:Articles","categoryPolicies":{"__typename":"CategoryPolicies","canReadNode":{"__typename":"PolicyResult","failureReason":null}}},"Tkb:board:TechnicalArticles":{"__typename":"Tkb","id":"board:TechnicalArticles","tkbPolicies":{"__typename":"TkbPolicies","canReadNode":{"__typename":"PolicyResult","failureReason":null}},"boardPolicies":{"__typename":"BoardPolicies","canReadNode":{"__typename":"PolicyResult","failureReason":null}}},"Tkb:board:DevCentralNews":{"__typename":"Tkb","id":"board:DevCentralNews","tkbPolicies":{"__typename":"TkbPolicies","canReadNode":{"__typename":"PolicyResult","failureReason":null}},"boardPolicies":{"__typename":"BoardPolicies","canReadNode":{"__typename":"PolicyResult","failureReason":null}}},"Category:category:GroupsCategory":{"__typename":"Category","id":"category:GroupsCategory","categoryPolicies":{"__typename":"CategoryPolicies","canReadNode":{"__typename":"PolicyResult","failureReason":null}}},"Category:category:F5-Groups":{"__typename":"Category","id":"category:F5-Groups","categoryPolicies":{"__typename":"CategoryPolicies","canReadNode":{"__typename":"PolicyResult","failureReason":null}}},"Category:category:CommunityGroups":{"__typename":"Category","id":"category:CommunityGroups","categoryPolicies":{"__typename":"CategoryPolicies","canReadNode":{"__typename":"PolicyResult","failureReason":null}}},"Occasion:board:Events":{"__typename":"Occasion","id":"board:Events","boardPolicies":{"__typename":"BoardPolicies","canReadNode":{"__typename":"PolicyResult","failureReason":null}},"occasionPolicies":{"__typename":"OccasionPolicies","canReadNode":{"__typename":"PolicyResult","failureReason":null}}},"Idea:board:Suggestions":{"__typename":"Idea","id":"board:Suggestions","boardPolicies":{"__typename":"BoardPolicies","canReadNode":{"__typename":"PolicyResult","failureReason":null}},"ideaPolicies":{"__typename":"IdeaPolicies","canReadNode":{"__typename":"PolicyResult","failureReason":null}}},"Tkb:board:communityarticles":{"__typename":"Tkb","id":"board:communityarticles","tkbPolicies":{"__typename":"TkbPolicies","canReadNode":{"__typename":"PolicyResult","failureReason":null}},"boardPolicies":{"__typename":"BoardPolicies","canReadNode":{"__typename":"PolicyResult","failureReason":null}}},"Tkb:board:security-insights":{"__typename":"Tkb","id":"board:security-insights","tkbPolicies":{"__typename":"TkbPolicies","canReadNode":{"__typename":"PolicyResult","failureReason":null}},"boardPolicies":{"__typename":"BoardPolicies","canReadNode":{"__typename":"PolicyResult","failureReason":null}}},"Tkb:board:article-series":{"__typename":"Tkb","id":"board:article-series","tkbPolicies":{"__typename":"TkbPolicies","canReadNode":{"__typename":"PolicyResult","failureReason":null}},"boardPolicies":{"__typename":"BoardPolicies","canReadNode":{"__typename":"PolicyResult","failureReason":null}}},"CachedAsset:text:en_US-components/community/Navbar-1743097580000":{"__typename":"CachedAsset","id":"text:en_US-components/community/Navbar-1743097580000","value":{"community":"Community Home","inbox":"Inbox","manageContent":"Manage Content","tos":"Terms of Service","forgotPassword":"Forgot Password","themeEditor":"Theme Editor","edit":"Edit Navigation Bar","skipContent":"Skip to content","migrated-link-9":"Groups","migrated-link-7":"Technical Articles","migrated-link-8":"DevCentral News","migrated-link-1":"Technical Forum","migrated-link-10":"Community Groups","migrated-link-2":"Water Cooler","migrated-link-11":"F5 Groups","Common-external-link":"How Do I...?","migrated-link-0":"Forums","article-series":"Article Series","migrated-link-5":"Community Articles","migrated-link-6":"Articles","security-insights":"Security Insights","migrated-link-3":"CrowdSRC","migrated-link-4":"CodeShare","migrated-link-12":"Events","migrated-link-13":"Suggestions"},"localOverride":false},"CachedAsset:text:en_US-components/community/NavbarHamburgerDropdown-1743097580000":{"__typename":"CachedAsset","id":"text:en_US-components/community/NavbarHamburgerDropdown-1743097580000","value":{"hamburgerLabel":"Side Menu"},"localOverride":false},"CachedAsset:text:en_US-components/community/BrandLogo-1743097580000":{"__typename":"CachedAsset","id":"text:en_US-components/community/BrandLogo-1743097580000","value":{"logoAlt":"Khoros","themeLogoAlt":"Brand Logo"},"localOverride":false},"CachedAsset:text:en_US-components/community/NavbarTextLinks-1743097580000":{"__typename":"CachedAsset","id":"text:en_US-components/community/NavbarTextLinks-1743097580000","value":{"more":"More"},"localOverride":false},"CachedAsset:text:en_US-components/authentication/AuthenticationLink-1743097580000":{"__typename":"CachedAsset","id":"text:en_US-components/authentication/AuthenticationLink-1743097580000","value":{"title.login":"Sign In","title.registration":"Register","title.forgotPassword":"Forgot Password","title.multiAuthLogin":"Sign In"},"localOverride":false},"CachedAsset:text:en_US-components/nodes/NodeLink-1743097580000":{"__typename":"CachedAsset","id":"text:en_US-components/nodes/NodeLink-1743097580000","value":{"place":"Place {name}"},"localOverride":false},"QueryVariables:TopicReplyList:message:285011:3":{"__typename":"QueryVariables","id":"TopicReplyList:message:285011:3","value":{"id":"message:285011","first":10,"sorts":{"postTime":{"direction":"ASC"}},"repliesFirst":3,"repliesFirstDepthThree":1,"repliesSorts":{"postTime":{"direction":"ASC"}},"useAvatar":true,"useAuthorLogin":true,"useAuthorRank":true,"useBody":true,"useKudosCount":true,"useTimeToRead":false,"useMedia":false,"useReadOnlyIcon":false,"useRepliesCount":true,"useSearchSnippet":false,"useAcceptedSolutionButton":false,"useSolvedBadge":false,"useAttachments":false,"attachmentsFirst":5,"useTags":true,"useNodeAncestors":false,"useUserHoverCard":false,"useNodeHoverCard":false,"useModerationStatus":true,"usePreviewSubjectModal":false,"useMessageStatus":true}},"ROOT_MUTATION":{"__typename":"Mutation"},"CachedAsset:text:en_US-shared/client/components/common/QueryHandler-1743097580000":{"__typename":"CachedAsset","id":"text:en_US-shared/client/components/common/QueryHandler-1743097580000","value":{"title":"Query Handler"},"localOverride":false},"CachedAsset:text:en_US-components/community/NavbarDropdownToggle-1743097580000":{"__typename":"CachedAsset","id":"text:en_US-components/community/NavbarDropdownToggle-1743097580000","value":{"ariaLabelClosed":"Press the down arrow to open the menu"},"localOverride":false},"CachedAsset:text:en_US-components/messages/MessageView/MessageViewStandard-1743097580000":{"__typename":"CachedAsset","id":"text:en_US-components/messages/MessageView/MessageViewStandard-1743097580000","value":{"anonymous":"Anonymous","author":"{messageAuthorLogin}","authorBy":"{messageAuthorLogin}","board":"{messageBoardTitle}","replyToUser":" to {parentAuthor}","showMoreReplies":"Show More","replyText":"Reply","repliesText":"Replies","markedAsSolved":"Marked as Solved","movedMessagePlaceholder.BLOG":"{count, plural, =0 {This comment has been} other {These comments have been} }","movedMessagePlaceholder.TKB":"{count, plural, =0 {This comment has been} other {These comments have been} }","movedMessagePlaceholder.FORUM":"{count, plural, =0 {This reply has been} other {These replies have been} }","movedMessagePlaceholder.IDEA":"{count, plural, =0 {This comment has been} other {These comments have been} }","movedMessagePlaceholder.OCCASION":"{count, plural, =0 {This comment has been} other {These comments have been} }","movedMessagePlaceholderUrlText":"moved.","messageStatus":"Status: ","statusChanged":"Status changed: {previousStatus} to {currentStatus}","statusAdded":"Status added: {status}","statusRemoved":"Status removed: {status}","labelExpand":"expand replies","labelCollapse":"collapse replies","unhelpfulReason.reason1":"Content is outdated","unhelpfulReason.reason2":"Article is missing information","unhelpfulReason.reason3":"Content is for a different Product","unhelpfulReason.reason4":"Doesn't match what I was searching for"},"localOverride":false},"CachedAsset:text:en_US-components/messages/ThreadedReplyList-1743097580000":{"__typename":"CachedAsset","id":"text:en_US-components/messages/ThreadedReplyList-1743097580000","value":{"title":"{count, plural, one{# Reply} other{# Replies}}","title@board:BLOG":"{count, plural, one{# Comment} other{# Comments}}","title@board:TKB":"{count, plural, one{# Comment} other{# Comments}}","title@board:IDEA":"{count, plural, one{# Comment} other{# Comments}}","title@board:OCCASION":"{count, plural, one{# Comment} other{# Comments}}","noRepliesTitle":"No Replies","noRepliesTitle@board:BLOG":"No Comments","noRepliesTitle@board:TKB":"No Comments","noRepliesTitle@board:IDEA":"No Comments","noRepliesTitle@board:OCCASION":"No Comments","noRepliesDescription":"Be the first to reply","noRepliesDescription@board:BLOG":"Be the first to comment","noRepliesDescription@board:TKB":"Be the first to comment","noRepliesDescription@board:IDEA":"Be the first to comment","noRepliesDescription@board:OCCASION":"Be the first to comment","messageReadOnlyAlert:BLOG":"Comments have been turned off for this post","messageReadOnlyAlert:TKB":"Comments have been turned off for this article","messageReadOnlyAlert:IDEA":"Comments have been turned off for this idea","messageReadOnlyAlert:FORUM":"Replies have been turned off for this discussion","messageReadOnlyAlert:OCCASION":"Comments have been turned off for this event"},"localOverride":false},"CachedAsset:text:en_US-components/messages/MessageReplyCallToAction-1743097580000":{"__typename":"CachedAsset","id":"text:en_US-components/messages/MessageReplyCallToAction-1743097580000","value":{"leaveReply":"Leave a reply...","leaveReply@board:BLOG@message:root":"Leave a comment...","leaveReply@board:TKB@message:root":"Leave a comment...","leaveReply@board:IDEA@message:root":"Leave a comment...","leaveReply@board:OCCASION@message:root":"Leave a comment...","repliesTurnedOff.FORUM":"Replies are turned off for this topic","repliesTurnedOff.BLOG":"Comments are turned off for this topic","repliesTurnedOff.TKB":"Comments are turned off for this topic","repliesTurnedOff.IDEA":"Comments are turned off for this topic","repliesTurnedOff.OCCASION":"Comments are turned off for this topic","infoText":"Stop poking me!"},"localOverride":false},"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/cmstNDEtSzFzVEth\"}":{"__typename":"AssociatedImage","url":"https://community.f5.com/t5/s/zihoc95639/images/cmstNDEtSzFzVEth","height":0,"width":0,"mimeType":"image/svg+xml"},"Rank:rank:41":{"__typename":"Rank","id":"rank:41","position":18,"name":"Nimbostratus","color":"CCCCCC","icon":{"__ref":"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/cmstNDEtSzFzVEth\"}"},"rankStyle":"FILLED"},"User:user:88823":{"__typename":"User","id":"user:88823","uid":88823,"login":"Shahid-CRIS_355","biography":null,"registrationData":{"__typename":"RegistrationData","status":null,"registrationTime":"2019-05-05T08:36:07.000-07:00"},"deleted":false,"email":"","avatar":{"__typename":"UserAvatar","url":"https://community.f5.com/t5/s/zihoc95639/m_assets/avatars/default/avatar-2.svg?time=0"},"rank":{"__ref":"Rank:rank:41"},"entityType":"USER","eventPath":"community:zihoc95639/user:88823"},"ModerationData:moderation_data:285012":{"__typename":"ModerationData","id":"moderation_data:285012","status":"APPROVED","rejectReason":null,"isReportedAbuse":false,"rejectUser":null,"rejectTime":null,"rejectActorType":null},"TkbReplyMessage:message:285012":{"__typename":"TkbReplyMessage","author":{"__ref":"User:user:88823"},"id":"message:285012","revisionNum":1,"uid":285012,"depth":1,"hasGivenKudo":false,"subscribed":false,"board":{"__ref":"Tkb:board:codeshare"},"parent":{"__ref":"TkbTopicMessage:message:285011"},"conversation":{"__ref":"Conversation:conversation:285011"},"subject":"Re: Radware config translation","moderationData":{"__ref":"ModerationData:moderation_data:285012"},"body":"
Traceback (most recent call last):\n File \"rad2f5\", line 555, in \n vars = splitvars(monitors[m]['text'])\nKeyError: 'text'
Thanks for the response Shahid-CRIS, I have fixed this - it was because of an uninitialized variable so it now creates the variable as an empty string if the text doesn't exist.
\n
I have changed the file attached to the page so you can download and use that, or modify your own version as below:\nLine 157 or so:
\n
if 'a' in opts:\n output['text'] = opts['a']\n Added in v2\nelse:\n output['text'] = ''\n
Good! One point that i didn't make above is that the monitors are created but they are not assigned to the pools so you may want to do some manual assignment etc. This is because RadWare do monitor assignment to pool members and F5 generally do this at the pool level. I may look into fixing this.
\n
If you have any issues with syntax etc then let me know and i'll amend it - I have only really used a couple of configs and the RadWare documentation is not very good about the CLI so if you have any configs that have issues or you want specific config included then PM me with the config and an explanation and i'll try to include it.
Hi William, it looks like you have the wrong linefeeds in the file. Try looking through the script using vi and see if the lines have a ^M at the end. If so, transfer it to the platform using ASCII mode or copy/paste. Also, check that you have /usr/bin/perl as an interpreter for it to work. I built it on Cygwin.
I ran the script - on a mac - to test it and I ran into this error (btw. I changed the file name and added the .py extension)
\n
Traceback (most recent call last):\n File \"./rad2f5.py\", line 403, in \n if vars[1] and vars[1].startswith('P='):\n IndexError: list index out of range\n
\n\n
First I ran into this error
\n
File \"./rad2f5.py\", line 72\n print \"Using partition \" + partition\n ^\n SyntaxError: Missing parentheses in call to 'print'. Did you mean print(\"Using partition \" + partition)?\n
\n\n
I'm using Python 3.6.5 :: Anaconda, Inc. - I had to change all the print statements to surround them with ( ). Prolley a python distro/version specific thing. After the change the script ran fine until the line 403 error.
There are two things here - one is about print and I can answer that now - I wrote this in Python v2.7 and i'm sure you know that print is one of the big differences between v2 and v3. I will look into this and change it to work correctly with v3.
\n
On the failure point, I have a fair idea what the issue is - it's related to creating layer 7 rules and that part has quite a few options. Maybe you could PM me your config file and I will run it through and fix the issue.
I'm not that deep into Python (yet) but I figured the print had something to do with different versions.
\n
On the failure part - the source Radware config file had \\ at the end of almost every line. I think it might have something to do with that. I got hinted by the monitor output of the script. \nSo I'm editing the source config file to remove the backward slashes at the and and joining the config lines as one again.
\n
Hopefully that will solve the issue for me. I'll let you know once the test file is done and ran the script against it - lot of config lines in there to be corrected :-(
","body@stripHtml({\"removeProcessingText\":false,\"removeSpoilerMarkup\":false,\"removeTocMarkup\":false,\"truncateLength\":200})@stringLength":"218","kudosSumWeight":0,"repliesCount":0,"postTime":"2019-01-02T08:43:44.000-08:00","lastPublishTime":"2019-01-02T08:43:44.000-08:00","metrics":{"__typename":"MessageMetrics","views":1599},"visibilityScope":"PUBLIC","placeholder":false,"originalMessageForPlaceholder":null,"entityType":"TKB_REPLY","eventPath":"category:CrowdSRC/community:zihoc95639board:codeshare/message:285011/message:285021","replies":{"__typename":"MessageConnection","pageInfo":{"__typename":"PageInfo","hasNextPage":false,"endCursor":null,"hasPreviousPage":false,"startCursor":null},"edges":[]},"customFields":[],"attachments":{"__typename":"AttachmentConnection","edges":[],"pageInfo":{"__typename":"PageInfo","hasNextPage":false,"endCursor":null,"hasPreviousPage":false,"startCursor":null}}},"CachedAsset:text:en_US-components/messages/MessageSubject-1743097580000":{"__typename":"CachedAsset","id":"text:en_US-components/messages/MessageSubject-1743097580000","value":{"noSubject":"(no subject)"},"localOverride":false},"CachedAsset:text:en_US-components/messages/MessageBody-1743097580000":{"__typename":"CachedAsset","id":"text:en_US-components/messages/MessageBody-1743097580000","value":{"showMessageBody":"Show More","mentionsErrorTitle":"{mentionsType, select, board {Board} user {User} message {Message} other {}} No Longer Available","mentionsErrorMessage":"The {mentionsType} you are trying to view has been removed from the community.","videoProcessing":"Video is being processed. Please try again in a few minutes.","bannerTitle":"Video provider requires cookies to play the video. Accept to continue or {url} it directly on the provider's site.","buttonTitle":"Accept","urlText":"watch"},"localOverride":false},"CachedAsset:text:en_US-components/messages/MessageCustomFields-1743097580000":{"__typename":"CachedAsset","id":"text:en_US-components/messages/MessageCustomFields-1743097580000","value":{"CustomField.default.label":"Value of {name}"},"localOverride":false},"CachedAsset:text:en_US-components/messages/MessageRevision-1743097580000":{"__typename":"CachedAsset","id":"text:en_US-components/messages/MessageRevision-1743097580000","value":{"lastUpdatedDatePublished":"{publishCount, plural, one{Published} other{Updated}} {date}","lastUpdatedDateDraft":"Created {date}","version":"Version {major}.{minor}"},"localOverride":false},"CachedAsset:text:en_US-components/messages/MessageReplyButton-1743097580000":{"__typename":"CachedAsset","id":"text:en_US-components/messages/MessageReplyButton-1743097580000","value":{"repliesCount":"{count}","title":"Reply","title@board:BLOG@message:root":"Comment","title@board:TKB@message:root":"Comment","title@board:IDEA@message:root":"Comment","title@board:OCCASION@message:root":"Comment"},"localOverride":false},"CachedAsset:text:en_US-components/messages/MessageAuthorBio-1743097580000":{"__typename":"CachedAsset","id":"text:en_US-components/messages/MessageAuthorBio-1743097580000","value":{"sendMessage":"Send Message","actionMessage":"Follow this blog board to get notified when there's new activity","coAuthor":"CO-PUBLISHER","contributor":"CONTRIBUTOR","userProfile":"View Profile","iconlink":"Go to {name} {type}"},"localOverride":false},"CachedAsset:text:en_US-components/guides/GuideBottomNavigation-1743097580000":{"__typename":"CachedAsset","id":"text:en_US-components/guides/GuideBottomNavigation-1743097580000","value":{"nav.label":"Previous/Next Page","nav.previous":"Previous","nav.next":"Next"},"localOverride":false},"CachedAsset:text:en_US-components/users/UserLink-1743097580000":{"__typename":"CachedAsset","id":"text:en_US-components/users/UserLink-1743097580000","value":{"authorName":"View Profile: {author}","anonymous":"Anonymous"},"localOverride":false},"CachedAsset:text:en_US-shared/client/components/users/UserRank-1743097580000":{"__typename":"CachedAsset","id":"text:en_US-shared/client/components/users/UserRank-1743097580000","value":{"rankName":"{rankName}","userRank":"Author rank {rankName}"},"localOverride":false},"CachedAsset:text:en_US-components/messages/MessageTime-1743097580000":{"__typename":"CachedAsset","id":"text:en_US-components/messages/MessageTime-1743097580000","value":{"postTime":"Published: {time}","lastPublishTime":"Last Update: {time}","conversation.lastPostingActivityTime":"Last posting activity time: {time}","conversation.lastPostTime":"Last post time: {time}","moderationData.rejectTime":"Rejected time: {time}"},"localOverride":false},"CachedAsset:text:en_US-shared/client/components/common/Pager/PagerLoadMorePreviousNextLinkable-1743097580000":{"__typename":"CachedAsset","id":"text:en_US-shared/client/components/common/Pager/PagerLoadMorePreviousNextLinkable-1743097580000","value":{"loadMore":"Show More"},"localOverride":false},"CachedAsset:text:en_US-components/customComponent/CustomComponent-1743097580000":{"__typename":"CachedAsset","id":"text:en_US-components/customComponent/CustomComponent-1743097580000","value":{"errorMessage":"Error rendering component id: {customComponentId}","bannerTitle":"Video provider requires cookies to play the video. Accept to continue or {url} it directly on the provider's site.","buttonTitle":"Accept","urlText":"watch"},"localOverride":false},"CachedAsset:text:en_US-shared/client/components/users/UserAvatar-1743097580000":{"__typename":"CachedAsset","id":"text:en_US-shared/client/components/users/UserAvatar-1743097580000","value":{"altText":"{login}'s avatar","altTextGeneric":"User's avatar"},"localOverride":false},"CachedAsset:text:en_US-shared/client/components/ranks/UserRankLabel-1743097580000":{"__typename":"CachedAsset","id":"text:en_US-shared/client/components/ranks/UserRankLabel-1743097580000","value":{"altTitle":"Icon for {rankName} rank"},"localOverride":false},"CachedAsset:text:en_US-components/users/UserRegistrationDate-1743097580000":{"__typename":"CachedAsset","id":"text:en_US-components/users/UserRegistrationDate-1743097580000","value":{"noPrefix":"{date}","withPrefix":"Joined {date}"},"localOverride":false},"CachedAsset:text:en_US-components/tags/TagView/TagViewChip-1743097580000":{"__typename":"CachedAsset","id":"text:en_US-components/tags/TagView/TagViewChip-1743097580000","value":{"tagLabelName":"Tag name {tagName}"},"localOverride":false}}}},"page":"/kbs/TkbMessagePage/TkbMessagePage","query":{"boardId":"codeshare","messageSubject":"radware-config-translation","messageId":"285011"},"buildId":"q_bLpq2mflH0BeZigxpj6","runtimeConfig":{"buildInformationVisible":false,"logLevelApp":"info","logLevelMetrics":"info","openTelemetryClientEnabled":false,"openTelemetryConfigName":"f5","openTelemetryServiceVersion":"25.2.0","openTelemetryUniverse":"prod","openTelemetryCollector":"http://localhost:4318","openTelemetryRouteChangeAllowedTime":"5000","apolloDevToolsEnabled":false,"inboxMuteWipFeatureEnabled":false},"isFallback":false,"isExperimentalCompile":false,"dynamicIds":["./components/customComponent/CustomComponent/CustomComponent.tsx","./components/community/Navbar/NavbarWidget.tsx","./components/community/Breadcrumb/BreadcrumbWidget.tsx","./components/tkbs/TkbArticleWidget/TkbArticleWidget.tsx","./components/messages/MessageView/MessageViewStandard/MessageViewStandard.tsx","./components/messages/ThreadedReplyList/ThreadedReplyList.tsx","./components/customComponent/CustomComponentContent/TemplateContent.tsx","../shared/client/components/common/List/UnstyledList/UnstyledList.tsx","./components/messages/MessageView/MessageView.tsx","../shared/client/components/common/Pager/PagerLoadMorePreviousNextLinkable/PagerLoadMorePreviousNextLinkable.tsx","./components/customComponent/CustomComponentContent/HtmlContent.tsx","./components/customComponent/CustomComponentContent/CustomComponentScripts.tsx","../shared/client/components/common/List/UnwrappedList/UnwrappedList.tsx","./components/tags/TagView/TagView.tsx","./components/tags/TagView/TagViewChip/TagViewChip.tsx"],"appGip":true,"scriptLoader":[]}