summaryrefslogtreecommitdiff
path: root/lib/ansible/modules/network/panos/panos_nat_policy.py
diff options
context:
space:
mode:
authorJohn R Barker <john@johnrbarker.com>2018-01-30 12:23:52 +0000
committerGitHub <noreply@github.com>2018-01-30 12:23:52 +0000
commita23c95023b3e4d79b971b75cc8c5878c62ebf501 (patch)
tree9b88fd6be81a2bf2cc3bf613802c83be069bb6ef /lib/ansible/modules/network/panos/panos_nat_policy.py
parent7c83f006c0bd77e9288388d7de62cee6cf10d5ee (diff)
downloadansible-a23c95023b3e4d79b971b75cc8c5878c62ebf501.tar.gz
Module deprecation: docs, scheme and tests (#34100)
Enforce module deprecation. After module has reached the end of it's deprecation cycle we will replace it with a docs stub. * Replace deprecated modules with docs-only sub * Use of deprecated past deprecation cycle gives meaningful message (see examples below) * Enforce documentation.deprecation dict via `schema.py` * Update `ansible-doc` and web docs to display documentation.deprecation * Document that structure in `dev_guide` * Ensure that all modules starting with `_` have a `deprecation:` block * Ensure `deprecation:` block is only used on modules that start with `_` * `removed_in` A string which represents when this module needs **deleting** * CHANGELOG.md and porting_guide_2.5.rst list removed modules as well as alternatives * CHANGELOG.md links to porting guide index To ensure that meaningful messages are given to the user if they try to use a module at the end of it's deprecation cycle we enforce the module to contain: ```python if __name__ == '__main__': removed_module() ```
Diffstat (limited to 'lib/ansible/modules/network/panos/panos_nat_policy.py')
-rw-r--r--lib/ansible/modules/network/panos/panos_nat_policy.py352
1 files changed, 0 insertions, 352 deletions
diff --git a/lib/ansible/modules/network/panos/panos_nat_policy.py b/lib/ansible/modules/network/panos/panos_nat_policy.py
deleted file mode 100644
index 67cdefbf0b..0000000000
--- a/lib/ansible/modules/network/panos/panos_nat_policy.py
+++ /dev/null
@@ -1,352 +0,0 @@
-#!/usr/bin/python
-# -*- coding: utf-8 -*-
-#
-# Ansible module to manage PaloAltoNetworks Firewall
-# (c) 2016, techbizdev <techbizdev@paloaltonetworks.com>
-#
-# This file is part of Ansible
-#
-# Ansible is free software: you can redistribute it and/or modify
-# it under the terms of the GNU General Public License as published by
-# the Free Software Foundation, either version 3 of the License, or
-# (at your option) any later version.
-#
-# Ansible is distributed in the hope that it will be useful,
-# but WITHOUT ANY WARRANTY; without even the implied warranty of
-# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
-# GNU General Public License for more details.
-#
-# You should have received a copy of the GNU General Public License
-# along with Ansible. If not, see <http://www.gnu.org/licenses/>.
-
-DOCUMENTATION = '''
----
-module: panos_nat_policy
-short_description: create a policy NAT rule
-description:
- - Create a policy nat rule. Keep in mind that we can either end up configuring source NAT, destination NAT, or both. Instead of splitting it
- into two we will make a fair attempt to determine which one the user wants.
-author: "Luigi Mori (@jtschichold), Ivan Bojer (@ivanbojer)"
-version_added: "2.3"
-requirements:
- - pan-python
-deprecated: In 2.4 use M(panos_nat_rule) instead.
-options:
- ip_address:
- description:
- - IP address (or hostname) of PAN-OS device
- required: true
- password:
- description:
- - password for authentication
- required: true
- username:
- description:
- - username for authentication
- required: false
- default: "admin"
- rule_name:
- description:
- - name of the SNAT rule
- required: true
- from_zone:
- description:
- - list of source zones
- required: true
- to_zone:
- description:
- - destination zone
- required: true
- source:
- description:
- - list of source addresses
- required: false
- default: ["any"]
- destination:
- description:
- - list of destination addresses
- required: false
- default: ["any"]
- service:
- description:
- - service
- required: false
- default: "any"
- snat_type:
- description:
- - type of source translation
- required: false
- default: None
- snat_address:
- description:
- - snat translated address
- required: false
- default: None
- snat_interface:
- description:
- - snat interface
- required: false
- default: None
- snat_interface_address:
- description:
- - snat interface address
- required: false
- default: None
- snat_bidirectional:
- description:
- - bidirectional flag
- required: false
- default: "false"
- dnat_address:
- description:
- - dnat translated address
- required: false
- default: None
- dnat_port:
- description:
- - dnat translated port
- required: false
- default: None
- override:
- description:
- - attempt to override rule if one with the same name already exists
- required: false
- default: "false"
- commit:
- description:
- - commit if changed
- required: false
- default: true
-'''
-
-EXAMPLES = '''
-# Create a source and destination nat rule
- - name: create nat SSH221 rule for 10.0.1.101
- panos_nat:
- ip_address: "192.168.1.1"
- password: "admin"
- rule_name: "Web SSH"
- from_zone: ["external"]
- to_zone: "external"
- source: ["any"]
- destination: ["10.0.0.100"]
- service: "service-tcp-221"
- snat_type: "dynamic-ip-and-port"
- snat_interface: "ethernet1/2"
- dnat_address: "10.0.1.101"
- dnat_port: "22"
- commit: False
-'''
-
-RETURN = '''
-# Default return values
-'''
-
-ANSIBLE_METADATA = {'metadata_version': '1.1',
- 'status': ['preview'],
- 'supported_by': 'community'}
-
-
-from ansible.module_utils.basic import AnsibleModule
-from ansible.module_utils.basic import get_exception
-
-try:
- import pan.xapi
- from pan.xapi import PanXapiError
-
- HAS_LIB = True
-except ImportError:
- HAS_LIB = False
-
-_NAT_XPATH = "/config/devices/entry[@name='localhost.localdomain']" + \
- "/vsys/entry[@name='vsys1']" + \
- "/rulebase/nat/rules/entry[@name='%s']"
-
-
-def nat_rule_exists(xapi, rule_name):
- xapi.get(_NAT_XPATH % rule_name)
- e = xapi.element_root.find('.//entry')
- if e is None:
- return False
- return True
-
-
-def dnat_xml(m, dnat_address, dnat_port):
- if dnat_address is None and dnat_port is None:
- return None
-
- exml = ["<destination-translation>"]
- if dnat_address is not None:
- exml.append("<translated-address>%s</translated-address>" %
- dnat_address)
- if dnat_port is not None:
- exml.append("<translated-port>%s</translated-port>" %
- dnat_port)
- exml.append('</destination-translation>')
-
- return ''.join(exml)
-
-
-def snat_xml(m, snat_type, snat_address, snat_interface,
- snat_interface_address, snat_bidirectional):
- if snat_type == 'static-ip':
- if snat_address is None:
- m.fail_json(msg="snat_address should be speicified "
- "for snat_type static-ip")
-
- exml = ["<source-translation>", "<static-ip>"]
- if snat_bidirectional:
- exml.append('<bi-directional>%s</bi-directional>' % 'yes')
- else:
- exml.append('<bi-directional>%s</bi-directional>' % 'no')
- exml.append('<translated-address>%s</translated-address>' %
- snat_address)
- exml.append('</static-ip>')
- exml.append('</source-translation>')
- elif snat_type == 'dynamic-ip-and-port':
- exml = ["<source-translation>",
- "<dynamic-ip-and-port>"]
- if snat_interface is not None:
- exml = exml + [
- "<interface-address>",
- "<interface>%s</interface>" % snat_interface]
- if snat_interface_address is not None:
- exml.append("<ip>%s</ip>" % snat_interface_address)
- exml.append("</interface-address>")
- elif snat_address is not None:
- exml.append("<translated-address>")
- for t in snat_address:
- exml.append("<member>%s</member>" % t)
- exml.append("</translated-address>")
- else:
- m.fail_json(msg="no snat_interface or snat_address "
- "specified for snat_type dynamic-ip-and-port")
- exml.append('</dynamic-ip-and-port>')
- exml.append('</source-translation>')
- else:
- m.fail_json(msg="unknown snat_type %s" % snat_type)
-
- return ''.join(exml)
-
-
-def add_nat(xapi, module, rule_name, from_zone, to_zone,
- source, destination, service, dnatxml=None, snatxml=None):
- exml = []
- if dnatxml:
- exml.append(dnatxml)
- if snatxml:
- exml.append(snatxml)
-
- exml.append("<to><member>%s</member></to>" % to_zone)
-
- exml.append("<from>")
- exml = exml + ["<member>%s</member>" % e for e in from_zone]
- exml.append("</from>")
-
- exml.append("<source>")
- exml = exml + ["<member>%s</member>" % e for e in source]
- exml.append("</source>")
-
- exml.append("<destination>")
- exml = exml + ["<member>%s</member>" % e for e in destination]
- exml.append("</destination>")
-
- exml.append("<service>%s</service>" % service)
-
- exml.append("<nat-type>ipv4</nat-type>")
-
- exml = ''.join(exml)
-
- xapi.set(xpath=_NAT_XPATH % rule_name, element=exml)
-
- return True
-
-
-def main():
- argument_spec = dict(
- ip_address=dict(required=True),
- password=dict(required=True, no_log=True),
- username=dict(default='admin'),
- rule_name=dict(required=True),
- from_zone=dict(type='list', required=True),
- to_zone=dict(required=True),
- source=dict(type='list', default=["any"]),
- destination=dict(type='list', default=["any"]),
- service=dict(default="any"),
- snat_type=dict(),
- snat_address=dict(),
- snat_interface=dict(),
- snat_interface_address=dict(),
- snat_bidirectional=dict(default=False),
- dnat_address=dict(),
- dnat_port=dict(),
- override=dict(type='bool', default=False),
- commit=dict(type='bool', default=True)
- )
- module = AnsibleModule(argument_spec=argument_spec, supports_check_mode=False)
-
- if module._name == 'panos_nat_policy':
- module.deprecate("The 'panos_nat_policy' module is being renamed 'panos_nat_rule'", version=2.8)
-
- if not HAS_LIB:
- module.fail_json(msg='pan-python is required for this module')
-
- ip_address = module.params["ip_address"]
- password = module.params["password"]
- username = module.params['username']
-
- xapi = pan.xapi.PanXapi(
- hostname=ip_address,
- api_username=username,
- api_password=password
- )
-
- rule_name = module.params['rule_name']
- from_zone = module.params['from_zone']
- to_zone = module.params['to_zone']
- source = module.params['source']
- destination = module.params['destination']
- service = module.params['service']
-
- snat_type = module.params['snat_type']
- snat_address = module.params['snat_address']
- snat_interface = module.params['snat_interface']
- snat_interface_address = module.params['snat_interface_address']
- snat_bidirectional = module.params['snat_bidirectional']
-
- dnat_address = module.params['dnat_address']
- dnat_port = module.params['dnat_port']
- commit = module.params['commit']
-
- override = module.params["override"]
- if not override and nat_rule_exists(xapi, rule_name):
- module.exit_json(changed=False, msg="rule exists")
-
- try:
- changed = add_nat(
- xapi,
- module,
- rule_name,
- from_zone,
- to_zone,
- source,
- destination,
- service,
- dnatxml=dnat_xml(module, dnat_address, dnat_port),
- snatxml=snat_xml(module, snat_type, snat_address,
- snat_interface, snat_interface_address,
- snat_bidirectional)
- )
-
- if changed and commit:
- xapi.commit(cmd="<commit></commit>", sync=True, interval=1)
-
- module.exit_json(changed=changed, msg="okey dokey")
-
- except PanXapiError:
- exc = get_exception()
- module.fail_json(msg=exc.message)
-
-
-if __name__ == '__main__':
- main()