summaryrefslogtreecommitdiff
path: root/lib
diff options
context:
space:
mode:
authorSumit Jaiswal <sjaiswal@redhat.com>2020-02-28 22:06:38 +0530
committerGitHub <noreply@github.com>2020-02-28 22:06:38 +0530
commit9392912608f82ed2a38ab4abc6e3b4db0a61d637 (patch)
treea47cbf47b92b5a54f72cddf687a3d60d9e2775f3 /lib
parent32a76f0aa191d1d0a08a8b3fde0b217101cbfd82 (diff)
downloadansible-9392912608f82ed2a38ab4abc6e3b4db0a61d637.tar.gz
Resource module for IOS ACL (#66629)
* fix ios_acl
Diffstat (limited to 'lib')
-rw-r--r--lib/ansible/module_utils/network/ios/argspec/acls/__init__.py0
-rw-r--r--lib/ansible/module_utils/network/ios/argspec/acls/acls.py593
-rw-r--r--lib/ansible/module_utils/network/ios/config/acls/__init__.py0
-rw-r--r--lib/ansible/module_utils/network/ios/config/acls/acls.py717
-rw-r--r--lib/ansible/module_utils/network/ios/facts/acls/__init__.py0
-rw-r--r--lib/ansible/module_utils/network/ios/facts/acls/acls.py498
-rw-r--r--lib/ansible/module_utils/network/ios/facts/facts.py2
-rw-r--r--lib/ansible/module_utils/network/ios/utils/utils.py41
-rw-r--r--lib/ansible/modules/network/ios/ios_acls.py1417
-rw-r--r--lib/ansible/modules/network/ios/ios_facts.py2
10 files changed, 3265 insertions, 5 deletions
diff --git a/lib/ansible/module_utils/network/ios/argspec/acls/__init__.py b/lib/ansible/module_utils/network/ios/argspec/acls/__init__.py
new file mode 100644
index 0000000000..e69de29bb2
--- /dev/null
+++ b/lib/ansible/module_utils/network/ios/argspec/acls/__init__.py
diff --git a/lib/ansible/module_utils/network/ios/argspec/acls/acls.py b/lib/ansible/module_utils/network/ios/argspec/acls/acls.py
new file mode 100644
index 0000000000..ca8982e557
--- /dev/null
+++ b/lib/ansible/module_utils/network/ios/argspec/acls/acls.py
@@ -0,0 +1,593 @@
+#
+# -*- coding: utf-8 -*-
+# Copyright 2019 Red Hat
+# GNU General Public License v3.0+
+# (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt)
+
+#############################################
+# WARNING #
+#############################################
+#
+# This file is auto generated by the resource
+# module builder playbook.
+#
+# Do not edit this file manually.
+#
+# Changes to this file will be over written
+# by the resource module builder.
+#
+# Changes should be made in the model used to
+# generate this file or in the resource module
+# builder template.
+#
+#############################################
+"""
+The arg spec for the ios_acls module
+"""
+
+from __future__ import absolute_import, division, print_function
+__metaclass__ = type
+
+
+class AclsArgs(object):
+ """The arg spec for the ios_acls module
+ """
+ def __init__(self, **kwargs):
+ pass
+
+ argument_spec = {
+ 'config': {
+ 'elements': 'dict',
+ 'options': {
+ 'afi': {
+ 'required': True,
+ 'choices': ['ipv4', 'ipv6'],
+ 'type': 'str'
+ },
+ 'acls': {
+ 'elements': 'dict',
+ 'type': 'list',
+ 'options': {
+ 'name': {
+ 'required': True,
+ 'type': 'str'
+ },
+ 'acl_type': {
+ 'choices': ['extended', 'standard'],
+ 'type': 'str'
+ },
+ 'aces': {
+ 'elements': 'dict',
+ 'type': 'list',
+ 'options': {
+ 'grant': {
+ 'choices': ['permit', 'deny'],
+ 'type': 'str'
+ },
+ 'sequence': {
+ 'type': 'int'
+ },
+ 'source': {
+ 'type':
+ 'dict',
+ 'mutually_exclusive':
+ [['address', 'any', 'host'],
+ ['wildcard_bits', 'any', 'host']],
+ 'options': {
+ 'address': {
+ 'type': 'str'
+ },
+ 'wildcard_bits': {
+ 'type': 'str'
+ },
+ 'any': {
+ 'type': 'bool'
+ },
+ 'host': {
+ 'type': 'str'
+ },
+ 'port_protocol': {
+ 'type': 'dict',
+ 'options': {
+ 'eq': {
+ 'type': 'str'
+ },
+ 'gt': {
+ 'type': 'str'
+ },
+ 'lt': {
+ 'type': 'str'
+ },
+ 'neq': {
+ 'type': 'str'
+ },
+ 'range': {
+ 'type': 'dict',
+ 'options': {
+ 'start': {
+ 'type': 'int'
+ },
+ 'end': {
+ 'type': 'int'
+ }
+ }
+ }
+ }
+ }
+ },
+ },
+ 'destination': {
+ 'type':
+ 'dict',
+ 'mutually_exclusive':
+ [['address', 'any', 'host'],
+ ['wildcard_bits', 'any', 'host']],
+ 'options': {
+ 'address': {
+ 'type': 'str'
+ },
+ 'wildcard_bits': {
+ 'type': 'str'
+ },
+ 'any': {
+ 'type': 'bool'
+ },
+ 'host': {
+ 'type': 'str'
+ },
+ 'port_protocol': {
+ 'type': 'dict',
+ 'options': {
+ 'eq': {
+ 'type': 'str'
+ },
+ 'gt': {
+ 'type': 'str'
+ },
+ 'lt': {
+ 'type': 'str'
+ },
+ 'neq': {
+ 'type': 'str'
+ },
+ 'range': {
+ 'type': 'dict',
+ 'options': {
+ 'start': {
+ 'type': 'int'
+ },
+ 'end': {
+ 'type': 'int'
+ }
+ }
+ }
+ }
+ }
+ }
+ },
+ 'protocol': {
+ 'type': 'str'
+ },
+ 'protocol_options': {
+ 'type': 'dict',
+ 'options': {
+ 'protocol_number': {
+ 'type': 'int'
+ },
+ 'ahp': {
+ 'type': 'bool'
+ },
+ 'eigrp': {
+ 'type': 'bool'
+ },
+ 'esp': {
+ 'type': 'bool'
+ },
+ 'gre': {
+ 'type': 'bool'
+ },
+ 'hbh': {
+ 'type': 'bool'
+ },
+ 'icmp': {
+ 'type': 'dict',
+ 'options': {
+ 'administratively_prohibited':
+ {
+ 'type': 'bool'
+ },
+ 'alternate_address': {
+ 'type': 'bool'
+ },
+ 'conversion_error': {
+ 'type': 'bool'
+ },
+ 'dod_host_prohibited': {
+ 'type': 'bool'
+ },
+ 'dod_net_prohibited': {
+ 'type': 'bool'
+ },
+ 'echo': {
+ 'type': 'bool'
+ },
+ 'echo_reply': {
+ 'type': 'bool'
+ },
+ 'general_parameter_problem': {
+ 'type': 'bool'
+ },
+ 'host_isolated': {
+ 'type': 'bool'
+ },
+ 'host_precedence_unreachable':
+ {
+ 'type': 'bool'
+ },
+ 'host_redirect': {
+ 'type': 'bool'
+ },
+ 'host_tos_redirect': {
+ 'type': 'bool'
+ },
+ 'host_tos_unreachable': {
+ 'type': 'bool'
+ },
+ 'host_unknown': {
+ 'type': 'bool'
+ },
+ 'host_unreachable': {
+ 'type': 'bool'
+ },
+ 'information_reply': {
+ 'type': 'bool'
+ },
+ 'information_request': {
+ 'type': 'bool'
+ },
+ 'mask_reply': {
+ 'type': 'bool'
+ },
+ 'mask_request': {
+ 'type': 'bool'
+ },
+ 'mobile_redirect': {
+ 'type': 'bool'
+ },
+ 'net_redirect': {
+ 'type': 'bool'
+ },
+ 'net_tos_redirect': {
+ 'type': 'bool'
+ },
+ 'net_tos_unreachable': {
+ 'type': 'bool'
+ },
+ 'net_unreachable': {
+ 'type': 'bool'
+ },
+ 'network_unknown': {
+ 'type': 'bool'
+ },
+ 'no_room_for_option': {
+ 'type': 'bool'
+ },
+ 'option_missing': {
+ 'type': 'bool'
+ },
+ 'packet_too_big': {
+ 'type': 'bool'
+ },
+ 'parameter_problem': {
+ 'type': 'bool'
+ },
+ 'port_unreachable': {
+ 'type': 'bool'
+ },
+ 'precedence_unreachable': {
+ 'type': 'bool'
+ },
+ 'protocol_unreachable': {
+ 'type': 'bool'
+ },
+ 'reassembly_timeout': {
+ 'type': 'bool'
+ },
+ 'redirect': {
+ 'type': 'bool'
+ },
+ 'router_advertisement': {
+ 'type': 'bool'
+ },
+ 'router_solicitation': {
+ 'type': 'bool'
+ },
+ 'source_quench': {
+ 'type': 'bool'
+ },
+ 'source_route_failed': {
+ 'type': 'bool'
+ },
+ 'time_exceeded': {
+ 'type': 'bool'
+ },
+ 'timestamp_reply': {
+ 'type': 'bool'
+ },
+ 'timestamp_request': {
+ 'type': 'bool'
+ },
+ 'traceroute': {
+ 'type': 'bool'
+ },
+ 'ttl_exceeded': {
+ 'type': 'bool'
+ },
+ 'unreachable': {
+ 'type': 'bool'
+ },
+ }
+ },
+ 'igmp': {
+ 'type': 'dict',
+ 'options': {
+ 'dvmrp': {
+ 'type': 'bool'
+ },
+ 'host_query': {
+ 'type': 'bool'
+ },
+ 'mtrace_resp': {
+ 'type': 'bool'
+ },
+ 'mtrace_route': {
+ 'type': 'bool'
+ },
+ 'pim': {
+ 'type': 'bool'
+ },
+ 'trace': {
+ 'type': 'bool'
+ },
+ 'v1host_report': {
+ 'type': 'bool'
+ },
+ 'v2host_report': {
+ 'type': 'bool'
+ },
+ 'v2leave_group': {
+ 'type': 'bool'
+ },
+ 'v3host_report': {
+ 'type': 'bool'
+ }
+ }
+ },
+ 'ip': {
+ 'type': 'bool'
+ },
+ 'ipv6': {
+ 'type': 'bool'
+ },
+ 'ipinip': {
+ 'type': 'bool'
+ },
+ 'nos': {
+ 'type': 'bool'
+ },
+ 'ospf': {
+ 'type': 'bool'
+ },
+ 'pcp': {
+ 'type': 'bool'
+ },
+ 'pim': {
+ 'type': 'bool'
+ },
+ 'sctp': {
+ 'type': 'bool'
+ },
+ 'tcp': {
+ 'options': {
+ 'ack': {
+ 'type': 'bool'
+ },
+ 'established': {
+ 'type': 'bool'
+ },
+ 'fin': {
+ 'type': 'bool'
+ },
+ 'psh': {
+ 'type': 'bool'
+ },
+ 'rst': {
+ 'type': 'bool'
+ },
+ 'syn': {
+ 'type': 'bool'
+ },
+ 'urg': {
+ 'type': 'bool'
+ }
+ },
+ 'type': 'dict'
+ },
+ 'udp': {
+ 'type': 'bool'
+ }
+ }
+ },
+ 'dscp': {
+ 'type': 'str'
+ },
+ 'fragments': {
+ 'type': 'str'
+ },
+ 'log': {
+ 'type': 'str'
+ },
+ 'log_input': {
+ 'type': 'str'
+ },
+ 'option': {
+ 'type': 'dict',
+ 'options': {
+ 'add_ext': {
+ 'type': 'bool'
+ },
+ 'any_options': {
+ 'type': 'bool'
+ },
+ 'com_security': {
+ 'type': 'bool'
+ },
+ 'dps': {
+ 'type': 'bool'
+ },
+ 'encode': {
+ 'type': 'bool'
+ },
+ 'eool': {
+ 'type': 'bool'
+ },
+ 'ext_ip': {
+ 'type': 'bool'
+ },
+ 'ext_security': {
+ 'type': 'bool'
+ },
+ 'finn': {
+ 'type': 'bool'
+ },
+ 'imitd': {
+ 'type': 'bool'
+ },
+ 'lsr': {
+ 'type': 'bool'
+ },
+ 'mtup': {
+ 'type': 'bool'
+ },
+ 'mtur': {
+ 'type': 'bool'
+ },
+ 'no_op': {
+ 'type': 'bool'
+ },
+ 'nsapa': {
+ 'type': 'bool'
+ },
+ 'record_route': {
+ 'type': 'bool'
+ },
+ 'router_alert': {
+ 'type': 'bool'
+ },
+ 'sdb': {
+ 'type': 'bool'
+ },
+ 'security': {
+ 'type': 'bool'
+ },
+ 'ssr': {
+ 'type': 'bool'
+ },
+ 'stream_id': {
+ 'type': 'bool'
+ },
+ 'timestamp': {
+ 'type': 'bool'
+ },
+ 'traceroute': {
+ 'type': 'bool'
+ },
+ 'ump': {
+ 'type': 'bool'
+ },
+ 'visa': {
+ 'type': 'bool'
+ },
+ 'zsu': {
+ 'type': 'bool'
+ }
+ }
+ },
+ 'precedence': {
+ 'type': 'int'
+ },
+ 'time_range': {
+ 'type': 'str'
+ },
+ 'tos': {
+ 'type': 'dict',
+ 'options': {
+ 'service_value': {
+ 'type': 'int'
+ },
+ 'max_reliability': {
+ 'type': 'bool'
+ },
+ 'max_throughput': {
+ 'type': 'bool'
+ },
+ 'min_delay': {
+ 'type': 'bool'
+ },
+ 'min_monetary_cost': {
+ 'type': 'bool'
+ },
+ 'normal': {
+ 'type': 'bool'
+ }
+ }
+ },
+ 'ttl': {
+ 'type': 'dict',
+ 'options': {
+ 'eq': {
+ 'type': 'int'
+ },
+ 'gt': {
+ 'type': 'int'
+ },
+ 'lt': {
+ 'type': 'int'
+ },
+ 'neq': {
+ 'type': 'int'
+ },
+ 'range': {
+ 'type': 'dict',
+ 'options': {
+ 'start': {
+ 'type': 'int'
+ },
+ 'end': {
+ 'type': 'int'
+ }
+ }
+ }
+ }
+ },
+ }
+ }
+ }
+ },
+ },
+ 'type': 'list'
+ },
+ 'running_config': {
+ 'type': 'str'
+ },
+ 'state': {
+ 'choices': [
+ 'merged', 'replaced', 'overridden', 'deleted', 'gathered',
+ 'rendered', 'parsed'
+ ],
+ 'default':
+ 'merged',
+ 'type':
+ 'str'
+ }
+ }
diff --git a/lib/ansible/module_utils/network/ios/config/acls/__init__.py b/lib/ansible/module_utils/network/ios/config/acls/__init__.py
new file mode 100644
index 0000000000..e69de29bb2
--- /dev/null
+++ b/lib/ansible/module_utils/network/ios/config/acls/__init__.py
diff --git a/lib/ansible/module_utils/network/ios/config/acls/acls.py b/lib/ansible/module_utils/network/ios/config/acls/acls.py
new file mode 100644
index 0000000000..2a3f3f244b
--- /dev/null
+++ b/lib/ansible/module_utils/network/ios/config/acls/acls.py
@@ -0,0 +1,717 @@
+#
+# -*- coding: utf-8 -*-
+# Copyright 2019 Red Hat Inc.
+# GNU General Public License v3.0+ (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt)
+"""
+The ios_acls class
+It is in this file where the current configuration (as dict)
+is compared to the provided configuration (as dict) and the command set
+necessary to bring the current configuration to it's desired end-state is
+created
+"""
+
+from __future__ import absolute_import, division, print_function
+__metaclass__ = type
+
+import copy
+from ansible.module_utils.network.common.cfg.base import ConfigBase
+from ansible.module_utils.network.common.utils import to_list
+from ansible.module_utils.network.ios.facts.facts import Facts
+from ansible.module_utils.six import iteritems
+from ansible.module_utils.network.common.utils import remove_empties
+from ansible.module_utils.network.ios.utils.utils import new_dict_to_set
+
+
+class Acls(ConfigBase):
+ """
+ The ios_acls class
+ """
+
+ gather_subset = [
+ '!all',
+ '!min',
+ ]
+
+ gather_network_resources = [
+ 'acls',
+ ]
+
+ def __init__(self, module):
+ super(Acls, self).__init__(module)
+
+ def get_acl_facts(self, data=None):
+ """ Get the 'facts' (the current configuration)
+
+ :rtype: A dictionary
+ :returns: The current configuration as a dictionary
+ """
+ facts, _warnings = Facts(self._module).get_facts(self.gather_subset, self.gather_network_resources, data=data)
+ acl_facts = facts['ansible_network_resources'].get('acls')
+ if not acl_facts:
+ return []
+
+ return acl_facts
+
+ def execute_module(self):
+ """ Execute the module
+
+ :rtype: A dictionary
+ :returns: The result from moduel execution
+ """
+ result = {'changed': False}
+ commands = list()
+ warnings = list()
+
+ if self.state in self.ACTION_STATES:
+ existing_acl_facts = self.get_acl_facts()
+ else:
+ existing_acl_facts = []
+
+ if self.state in self.ACTION_STATES or self.state == 'rendered':
+ commands.extend(self.set_config(existing_acl_facts))
+
+ if commands and self.state in self.ACTION_STATES:
+ if not self._module.check_mode:
+ self._connection.edit_config(commands)
+ result['changed'] = True
+
+ if self.state in self.ACTION_STATES:
+ result['commands'] = commands
+
+ if self.state in self.ACTION_STATES or self.state == 'gathered':
+ changed_acl_facts = self.get_acl_facts()
+ elif self.state == 'rendered':
+ result['rendered'] = commands
+ elif self.state == 'parsed':
+ running_config = self._module.params['running_config']
+ if not running_config:
+ self._module.fail_json(msg="value of running_config parameter must not be empty for state parsed")
+ result['parsed'] = self.get_acl_facts(data=running_config)
+ else:
+ changed_acl_facts = []
+
+ if self.state in self.ACTION_STATES:
+ result['before'] = existing_acl_facts
+ if result['changed']:
+ result['after'] = changed_acl_facts
+ elif self.state == 'gathered':
+ result['gathered'] = changed_acl_facts
+
+ result['warnings'] = warnings
+
+ return result
+
+ def set_config(self, existing_acl_facts):
+ """ Collect the configuration from the args passed to the module,
+ collect the current configuration (as a dict from facts)
+
+ :rtype: A list
+ :returns: the commands necessary to migrate the current configuration
+ to the deisred configuration
+ """
+ want = self._module.params['config']
+ have = existing_acl_facts
+ resp = self.set_state(want, have)
+ return to_list(resp)
+
+ def set_state(self, want, have):
+ """ Select the appropriate function based on the state provided
+
+ :param want: the desired configuration as a dictionary
+ :param have: the current configuration as a dictionary
+ :rtype: A list
+ :returns: the commands necessary to migrate the current configuration
+ to the deisred configuration
+ """
+ commands = []
+
+ state = self._module.params['state']
+ if state in ('overridden', 'merged', 'replaced', 'rendered') and not want:
+ self._module.fail_json(msg='value of config parameter must not be empty for state {0}'.format(state))
+
+ if state == 'overridden':
+ commands = self._state_overridden(want, have)
+ elif state == 'deleted':
+ commands = self._state_deleted(want, have)
+ elif state == 'merged' or state == 'rendered':
+ commands = self._state_merged(want, have)
+ elif state == 'replaced':
+ commands = self._state_replaced(want, have)
+
+ return commands
+
+ def _state_replaced(self, want, have):
+ """ The command generator when state is replaced
+
+ :param want: the desired configuration as a dictionary
+ :param have: the current configuration as a dictionary
+ :rtype: A list
+ :returns: the commands necessary to migrate the current configuration
+ to the deisred configuration
+ """
+ commands = []
+
+ for config_want in want:
+ for acls_want in config_want.get('acls'):
+ for ace_want in acls_want.get('aces'):
+ check = False
+ for config_have in have:
+ for acls_have in config_have.get('acls'):
+ for ace_have in acls_have.get('aces'):
+ if acls_want.get('name') == acls_have.get('name'):
+ ace_want = remove_empties(ace_want)
+ acls_want = remove_empties(acls_want)
+ cmd, change = self._set_config(ace_want,
+ ace_have,
+ acls_want,
+ config_want['afi'])
+ if cmd:
+ for temp_acls_have in config_have.get('acls'):
+ for temp_ace_have in temp_acls_have.get('aces'):
+ if acls_want.get('name') == temp_acls_have.get('name'):
+ commands.extend(
+ self._clear_config(temp_acls_have,
+ config_have,
+ temp_ace_have.get('sequence')))
+ commands.extend(cmd)
+ check = True
+ if check:
+ break
+ if check:
+ break
+ if not check:
+ # For configuring any non-existing want config
+ ace_want = remove_empties(ace_want)
+ cmd, change = self._set_config(ace_want,
+ {},
+ acls_want,
+ config_want['afi'])
+ commands.extend(cmd)
+ # Split and arrange the config commands
+ commands = self.split_set_cmd(commands)
+
+ return commands
+
+ def _state_overridden(self, want, have):
+ """ The command generator when state is overridden
+ :param want: the desired configuration as a dictionary
+ :param have: the current configuration as a dictionary
+ :rtype: A list
+ :returns: the commands necessary to migrate the current configuration
+ to the desired configuration
+ """
+ commands = []
+ # Creating a copy of want, so that want dict is intact even after delete operation
+ # performed during override want n have comparison
+ temp_want = copy.deepcopy(want)
+
+ for config_have in have:
+ for acls_have in config_have.get('acls'):
+ for ace_have in acls_have.get('aces'):
+ check = False
+ for config_want in temp_want:
+ count = 0
+ for acls_want in config_want.get('acls'):
+ for ace_want in acls_want.get('aces'):
+ if acls_want.get('name') == acls_have.get('name'):
+ ace_want = remove_empties(ace_want)
+ acls_want = remove_empties(acls_want)
+ cmd, change = self._set_config(ace_want, ace_have, acls_want, config_want['afi'])
+ if cmd:
+ for temp_acls_have in config_have.get('acls'):
+ for temp_ace_have in temp_acls_have.get('aces'):
+ if acls_want.get('name') == temp_acls_have.get('name'):
+ commands.extend(
+ self._clear_config(temp_acls_have,
+ config_have,
+ temp_ace_have.get('sequence')))
+ commands.extend(cmd)
+ check = True
+ if check:
+ del config_want.get('acls')[count]
+ else:
+ count += 1
+ if check:
+ break
+ if check:
+ break
+ if not check:
+ # Delete the config not present in want config
+ commands.extend(self._clear_config(acls_have, config_have))
+
+ # For configuring any non-existing want config
+ for config_want in temp_want:
+ for acls_want in config_want.get('acls'):
+ for ace_want in acls_want.get('aces'):
+ ace_want = remove_empties(ace_want)
+ cmd, change = self._set_config(ace_want,
+ {},
+ acls_want,
+ config_want['afi'])
+ commands.extend(cmd)
+
+ # Split and arrange the config commands
+ commands = self.split_set_cmd(commands)
+ # Arranging the cmds suct that all delete cmds are fired before all set cmds
+ negate_commands = [each for each in commands if 'no' in each and 'access-list' in each]
+ negate_commands.extend([each for each in commands if each not in negate_commands])
+ commands = negate_commands
+
+ return commands
+
+ def _state_merged(self, want, have):
+ """ The command generator when state is merged
+
+ :param want: the additive configuration as a dictionary
+ :param have: the current configuration as a dictionary
+ :rtype: A list
+ :returns: the commands necessary to merge the provided into
+ the current configuration
+ """
+ commands = []
+
+ for config_want in want:
+ for acls_want in config_want.get('acls'):
+ for ace_want in acls_want.get('aces'):
+ check = False
+ for config_have in have:
+ for acls_have in config_have.get('acls'):
+ for ace_have in acls_have.get('aces'):
+ if acls_want.get('name') == acls_have.get('name') and \
+ ace_want.get('sequence') == ace_have.get('sequence'):
+ ace_want = remove_empties(ace_want)
+ cmd, change = self._set_config(ace_want,
+ ace_have,
+ acls_want,
+ config_want['afi'])
+ # clear config will be fired only when there's command wrt to config
+ if config_want.get('afi') == 'ipv4' and change:
+ # for ipv4 only inplace update cannot be done, so deleting the sequence ace
+ # and then updating the want ace changes
+ commands.extend(self._clear_config(acls_want,
+ config_want,
+ ace_want.get('sequence')))
+ commands.extend(cmd)
+ check = True
+ elif acls_want.get('name') == acls_have.get('name'):
+ ace_want = remove_empties(ace_want)
+ cmd, check = self.common_condition_check(ace_want,
+ ace_have,
+ acls_want,
+ config_want,
+ check,
+ acls_have)
+ if acls_have.get('acl_type') == 'standard':
+ check = True
+ commands.extend(cmd)
+ if check:
+ break
+ if check:
+ break
+ if not check:
+ # For configuring any non-existing want config
+ ace_want = remove_empties(ace_want)
+ cmd, change = self._set_config(ace_want,
+ {},
+ acls_want,
+ config_want['afi'])
+ commands.extend(cmd)
+ # Split and arrange the config commands
+ commands = self.split_set_cmd(commands)
+
+ return commands
+
+ def _state_deleted(self, want, have):
+ """ The command generator when state is deleted
+
+ :param want: the objects from which the configuration should be removed
+ :param have: the current configuration as a dictionary
+ :rtype: A list
+ :returns: the commands necessary to remove the current configuration
+ of the provided objects
+ """
+ commands = []
+ if want:
+ for config_want in want:
+ if config_want.get('acls'):
+ for acls_want in config_want.get('acls'):
+ if acls_want.get('aces'):
+ for ace_want in acls_want.get('aces'):
+ for config_have in have:
+ for acls_have in config_have.get('acls'):
+ if acls_want.get('name') == acls_have.get('name'):
+ if ace_want.get('sequence'):
+ commands.extend(self._clear_config(acls_want,
+ config_want,
+ ace_want.get('sequence')))
+ else:
+ commands.extend(self._clear_config(acls_want,
+ config_want))
+ else:
+ for config_have in have:
+ for acls_have in config_have.get('acls'):
+ if acls_want.get('name') == acls_have.get('name'):
+ commands.extend(self._clear_config(acls_want,
+ config_want))
+ else:
+ afi_want = config_want.get('afi')
+ for config_have in have:
+ if config_have.get('afi') == afi_want:
+ for acls_have in config_have.get('acls'):
+ commands.extend(self._clear_config(acls_have, config_want))
+ # Split and arrange the config commands
+ commands = self.split_set_cmd(commands)
+ else:
+ for config_have in have:
+ for acls_have in config_have.get('acls'):
+ commands.extend(self._clear_config(acls_have, config_have))
+
+ return commands
+
+ def common_condition_check(self, want, have, acls_want, config_want, check, state='', acls_have=None):
+ """ The command formatter from the generated command
+ :param want: want config
+ :param have: have config
+ :param acls_want: acls want config
+ :param config_want: want config list
+ :param check: for same acls in want and have config, check=True
+ :param state: operation state
+ :rtype: A list
+ :returns: commands generated from want n have config diff
+ """
+ commands = []
+
+ if want.get('source') and want.get('destination') and have.get('source') and have.get('destination'):
+ if want.get('destination') and have.get('destination') or \
+ want.get('source').get('address') and have.get('source'):
+ if want.get('destination').get('address') == \
+ have.get('destination').get('address') and \
+ want.get('source').get('address') == \
+ have.get('source').get('address'):
+ cmd, change = self._set_config(want,
+ have,
+ acls_want,
+ config_want['afi'])
+ commands.extend(cmd)
+ check = True
+ if commands:
+ if state == 'replaced' or state == 'overridden':
+ commands.extend(self._clear_config(acls_want, config_want))
+ elif want.get('destination').get('any') == \
+ have.get('destination').get('any') and \
+ want.get('source').get('address') == \
+ have.get('source').get('address') and \
+ want.get('destination').get('any'):
+ cmd, change = self._set_config(want,
+ have,
+ acls_want,
+ config_want['afi'])
+ commands.extend(cmd)
+ check = True
+ if commands:
+ if state == 'replaced' or state == 'overridden':
+ commands.extend(self._clear_config(acls_want, config_want))
+ elif want.get('destination').get('address') == \
+ have.get('destination').get('address') and \
+ want.get('source').get('any') == have.get('source').get('any') and \
+ want.get('source').get('any'):
+ cmd, change = self._set_config(want,
+ have,
+ acls_want,
+ config_want['afi'])
+ commands.extend(cmd)
+ check = True
+ if commands:
+ if state == 'replaced' or state == 'overridden':
+ commands.extend(self._clear_config(acls_want, config_want))
+ elif want.get('destination').get('any') == \
+ have.get('destination').get('any') and \
+ want.get('source').get('any') == have.get('source').get('any') and \
+ want.get('destination').get('any'):
+ cmd, change = self._set_config(want,
+ have,
+ acls_want,
+ config_want['afi'])
+ commands.extend(cmd)
+ check = True
+ if commands:
+ if state == 'replaced' or state == 'overridden':
+ commands.extend(self._clear_config(acls_want, config_want))
+ elif acls_have and acls_have.get('acl_type') == 'standard':
+ check = True
+ if want.get('source') == have.get('source'):
+ cmd, change = self._set_config(want,
+ have,
+ acls_want,
+ config_want['afi'])
+ commands.extend(cmd)
+
+ return commands, check
+
+ def split_set_cmd(self, cmds):
+ """ The command formatter from the generated command
+ :param cmds: generated command
+ :rtype: A list
+ :returns: the formatted commands which is compliant and
+ actually fired on the device
+ """
+ command = []
+
+ def common_code(access_grant, cmd, command):
+ cmd = cmd.split(access_grant)
+ access_list = cmd[0].strip(' ')
+ if access_list not in command:
+ command.append(access_list)
+ command_items = len(command)
+ # get the last index of the list and push the trimmed cmd at the end of list
+ index = command.index(access_list) + (command_items - command.index(access_list))
+ cmd = access_grant + cmd[1]
+ command.insert(index + 1, cmd)
+
+ def sequence_common_code(sequence_index, each_list, command):
+ # Command to split
+ def join_list_to_str(temp_list, cmd=''):
+ for item in temp_list:
+ cmd += item
+ cmd += ' '
+ return cmd
+
+ temp_list = each_list[:sequence_index]
+ cmd = join_list_to_str(temp_list).rstrip(' ')
+ if cmd not in command:
+ command.append(cmd)
+ temp_list = each_list[sequence_index:]
+ cmd = join_list_to_str(temp_list).rstrip(' ')
+ command.append(cmd)
+
+ def grant_common_code(cmd_list, grant_type, command):
+ index = cmd_list.index(grant_type)
+ if 'extended' in each_list:
+ if cmd_list.index('extended') == (index - 2):
+ common_code(grant_type, each, command)
+ else:
+ sequence_common_code((index - 1), each_list, command)
+ elif 'standard' in each_list:
+ if cmd_list.index('standard') == (index - 2):
+ common_code(grant_type, each, command)
+ else:
+ sequence_common_code((index - 1), each_list, command)
+ elif 'ipv6' in each_list:
+ if 'sequence' in each_list:
+ sequence_index = each_list.index('sequence')
+ sequence_common_code(sequence_index, each_list, command)
+ else:
+ common_code(grant_type, each, command)
+ return command
+
+ for each in cmds:
+ each_list = each.split(' ')
+ if 'no' in each:
+ if each_list.index('no') == 0:
+ command.append(each)
+ else:
+ common_code('no', each, command)
+ if 'deny' in each:
+ grant_common_code(each_list, 'deny', command)
+ if 'permit' in each:
+ grant_common_code(each_list, 'permit', command)
+
+ return command
+
+ def source_dest_config(self, config, cmd, protocol_option):
+ """ Function to populate source/destination address and port protocol options
+ :param config: want and have diff config
+ :param cmd: source/destination command
+ :param protocol_option: source/destination protocol option
+ :rtype: A list
+ :returns: the commands generated based on input source/destination params
+ """
+ if 'ipv6' in cmd:
+ address = config.get('address')
+ host = config.get('host')
+ if (address and '::' not in address) or (host and '::' not in host):
+ self._module.fail_json(msg='Incorrect IPV6 address!')
+ else:
+ address = config.get('address')
+ wildcard = config.get('wildcard_bits')
+ host = config.get('host')
+ any = config.get('any')
+ if 'standard' in cmd and address and not wildcard:
+ cmd = cmd + ' {0}'.format(address)
+ elif address and wildcard:
+ cmd = cmd + ' {0} {1}'.format(address, wildcard)
+ elif host:
+ cmd = cmd + ' host {0}'.format(host)
+ if any:
+ cmd = cmd + ' {0}'.format('any')
+ port_protocol = config.get('port_protocol')
+ if port_protocol and (protocol_option.get('tcp') or protocol_option.get('udp')):
+ cmd = cmd + ' {0} {1}'.format(list(port_protocol)[0], list(port_protocol.values())[0])
+ elif port_protocol and not (protocol_option.get('tcp') or protocol_option.get('udp')):
+ self._module.fail_json(msg='Port Protocol option is valid only with TCP/UDP Protocol option!')
+
+ return cmd
+
+ def _set_config(self, want, have, acl_want, afi):
+ """ Function that sets the acls config based on the want and have config
+ :param want: want config
+ :param have: have config
+ :param acl_want: want acls config
+ :param afi: acls afi type
+ :rtype: A list
+ :returns: the commands generated based on input want/have params
+ """
+ commands = []
+ change = False
+ want_set = set()
+ have_set = set()
+ # Convert the want and have dict to its respective set for taking the set diff
+ new_dict_to_set(want, [], want_set)
+ new_dict_to_set(have, [], have_set)
+ diff = want_set - have_set
+
+ # Populate the config only when there's a diff b/w want and have config
+ if diff:
+ name = acl_want.get('name')
+ if afi == 'ipv4':
+ try:
+ name = int(name)
+ # If name is numbered acls
+ if name <= 99:
+ cmd = 'ip access-list standard {0}'.format(name)
+ elif name >= 100:
+ cmd = 'ip access-list extended {0}'.format(name)
+ except ValueError:
+ # If name is named acls
+ acl_type = acl_want.get('acl_type')
+ if acl_type:
+ cmd = 'ip access-list {0} {1}'.format(acl_type, name)
+ else:
+ self._module.fail_json(msg='ACL type value is required for Named ACL!')
+
+ elif afi == 'ipv6':
+ cmd = 'ipv6 access-list {0}'.format(name)
+
+ # Get all of aces option values from diff dict
+ sequence = want.get('sequence')
+ grant = want.get('grant')
+ source = want.get('source')
+ destination = want.get('destination')
+ po = want.get('protocol_options')
+ protocol = want.get('protocol')
+ dscp = want.get('dscp')
+ fragments = want.get('fragments')
+ log = want.get('log')
+ log_input = want.get('log_input')
+ option = want.get('option')
+ precedence = want.get('precedence')
+ time_range = want.get('time_range')
+ tos = want.get('tos')
+ ttl = want.get('ttl')
+
+ if sequence:
+ if afi == 'ipv6':
+ cmd = cmd + ' sequence {0}'.format(sequence)
+ else:
+ cmd = cmd + ' {0}'.format(sequence)
+ if grant:
+ cmd = cmd + ' {0}'.format(grant)
+ if po and isinstance(po, dict):
+ po_key = list(po)[0]
+ if protocol and protocol != po_key:
+ self._module.fail_json(msg='Protocol value cannot be different from Protocol option protocol value!')
+ cmd = cmd + ' {0}'.format(po_key)
+ if po.get('icmp'):
+ po_val = po.get('icmp')
+ elif po.get('igmp'):
+ po_val = po.get('igmp')
+ elif po.get('tcp'):
+ po_val = po.get('tcp')
+ elif protocol:
+ cmd = cmd + ' {0}'.format(protocol)
+ if source:
+ cmd = self.source_dest_config(source, cmd, po)
+ if destination:
+ cmd = self.source_dest_config(destination, cmd, po)
+ if po:
+ cmd = cmd + ' {0}'.format(list(po_val)[0])
+ if dscp:
+ cmd = cmd + ' dscp {0}'.format(dscp)
+ if fragments:
+ cmd = cmd + ' fragments {0}'.format(fragments)
+ if log:
+ cmd = cmd + ' log {0}'.format(log)
+ if log_input:
+ cmd = cmd + ' log-input {0}'.format(log_input)
+ if option:
+ cmd = cmd + ' option {0}'.format(list(option)[0])
+ if precedence:
+ cmd = cmd + ' precedence {0}'.format(precedence)
+ if time_range:
+ cmd = cmd + ' time-range {0}'.format(time_range)
+ if tos:
+ for k, v in iteritems(tos):
+ if k == 'service_value':
+ cmd = cmd + ' tos {0}'.format(v)
+ else:
+ cmd = cmd + ' tos {0}'.format(v)
+ if ttl:
+ for k, v in iteritems(ttl):
+ if k == 'range' and v:
+ start = v.get('start')
+ end = v.get('start')
+ cmd = cmd + ' ttl {0} {1}'.format(start, end)
+ elif v:
+ cmd = cmd + ' ttl {0} {1}'.format(k, v)
+
+ commands.append(cmd)
+ if commands:
+ change = True
+
+ return commands, change
+
+ def _clear_config(self, acls, config, sequence=''):
+ """ Function that deletes the acls config based on the want and have config
+ :param acls: acls config
+ :param config: config
+ :rtype: A list
+ :returns: the commands generated based on input acls/config params
+ """
+ commands = []
+ afi = config.get('afi')
+ name = acls.get('name')
+ if afi == 'ipv4' and name:
+ try:
+ name = int(name)
+ if name <= 99 and not sequence:
+ cmd = 'no ip access-list standard {0}'.format(name)
+ elif name >= 100 and not sequence:
+ cmd = 'no ip access-list extended {0}'.format(name)
+ elif sequence:
+ if name <= 99:
+ cmd = 'ip access-list standard {0} '.format(name)
+ elif name >= 100:
+ cmd = 'ip access-list extended {0} '.format(name)
+ cmd += 'no {0}'.format(sequence)
+ except ValueError:
+ acl_type = acls.get('acl_type')
+ if acl_type == 'extended' and not sequence:
+ cmd = 'no ip access-list extended {0}'.format(name)
+ elif acl_type == 'standard' and not sequence:
+ cmd = 'no ip access-list standard {0}'.format(name)
+ elif sequence:
+ if acl_type == 'extended':
+ cmd = 'ip access-list extended {0} '.format(name)
+ elif acl_type == 'standard':
+ cmd = 'ip access-list standard {0}'.format(name)
+ cmd += 'no {0}'.format(sequence)
+ else:
+ self._module.fail_json(msg="ACL type value is required for Named ACL!")
+ elif afi == 'ipv6' and name:
+ if sequence:
+ cmd = 'no sequence {0}'.format(sequence)
+ else:
+ cmd = 'no ipv6 access-list {0}'.format(name)
+ commands.append(cmd)
+
+ return commands
diff --git a/lib/ansible/module_utils/network/ios/facts/acls/__init__.py b/lib/ansible/module_utils/network/ios/facts/acls/__init__.py
new file mode 100644
index 0000000000..e69de29bb2
--- /dev/null
+++ b/lib/ansible/module_utils/network/ios/facts/acls/__init__.py
diff --git a/lib/ansible/module_utils/network/ios/facts/acls/acls.py b/lib/ansible/module_utils/network/ios/facts/acls/acls.py
new file mode 100644
index 0000000000..3b99a18f5c
--- /dev/null
+++ b/lib/ansible/module_utils/network/ios/facts/acls/acls.py
@@ -0,0 +1,498 @@
+#
+# -*- coding: utf-8 -*-
+# Copyright 2019 Red Hat
+# GNU General Public License v3.0+
+# (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt)
+"""
+The ios_acls fact class
+It is in this file the configuration is collected from the device
+for a given resource, parsed, and the facts tree is populated
+based on the configuration.
+"""
+
+from __future__ import absolute_import, division, print_function
+__metaclass__ = type
+
+
+from copy import deepcopy
+import re
+from ansible.module_utils.network.common import utils
+from ansible.module_utils.network.ios.utils.utils import check_n_return_valid_ipv6_addr
+from ansible.module_utils.network.ios.argspec.acls.acls import AclsArgs
+
+
+class AclsFacts(object):
+ """ The ios_acls fact class
+ """
+
+ def __init__(self, module, subspec='config', options='options'):
+
+ self._module = module
+ self.argument_spec = AclsArgs.argument_spec
+ spec = deepcopy(self.argument_spec)
+ if subspec:
+ if options:
+ facts_argument_spec = spec[subspec][options]
+ else:
+ facts_argument_spec = spec[subspec]
+ else:
+ facts_argument_spec = spec
+
+ self.generated_spec = utils.generate_dict(facts_argument_spec)
+
+ def get_acl_data(self, connection):
+ # Get the access-lists from the ios router
+ return connection.get('sh access-list')
+
+ def populate_facts(self, connection, ansible_facts, data=None):
+ """ Populate the facts for acls
+ :param connection: the device connection
+ :param ansible_facts: Facts dictionary
+ :param data: previously collected conf
+ :rtype: dictionary
+ :returns: facts
+ """
+
+ if not data:
+ data = self.get_acl_data(connection)
+ # operate on a collection of resource x
+ config = data.split('\n')
+ spec = {'acls': list(), 'afi': None}
+ if config:
+ objs = self.render_config(spec, config)
+ # check if rendered config list has only empty dict
+ if len(objs) == 1 and objs[0] == {}:
+ objs = []
+ facts = {}
+
+ if objs:
+ facts['acls'] = []
+ params = utils.validate_config(self.argument_spec, {'config': objs})
+ for cfg in params['config']:
+ facts['acls'].append(utils.remove_empties(cfg))
+ ansible_facts['ansible_network_resources'].update(facts)
+
+ return ansible_facts
+
+ def create_config_dict(self, config):
+ """ Function that parse the acls config and convert to module usable config
+ :param config: config
+ :rtype: A dict
+ :returns: the config generated based on have config params
+ """
+ conf = {}
+ temp_list = []
+ access_list_name = ''
+ count = 0
+ if len(config) >= 1 and config[0] != '':
+ for each in config:
+ if 'access-list' in each:
+ temp = each.split('access-list ')[1].split(' ')[0]
+ if temp == 'extended' or temp == 'standard':
+ temp = each.split('access-list ')[1]
+ if not access_list_name:
+ access_list_name = temp
+ if 'access-list' not in each:
+ if 'extended' in temp or 'standard' in temp:
+ temp_list.append('ipv4 access-list ' + temp + each)
+ else:
+ temp_list.append('ipv6 access-list ' + temp + each)
+ if temp == access_list_name and 'access-list' in each and \
+ not ('extended' in access_list_name or 'standard' in access_list_name):
+ temp_list.append(each)
+ elif temp != access_list_name:
+ conf[access_list_name] = temp_list
+ temp_list = list()
+ if 'permit' in each or 'deny' in each:
+ temp_list.append(each)
+ access_list_name = temp
+ count += 1
+ if len(config) == count:
+ conf[access_list_name] = temp_list
+ temp_list = []
+ return conf
+
+ def populate_port_protocol(self, source, destination, each_list):
+ """ Function Populates port portocol wrt to source and destination
+ :param acls: source config
+ :param config: destination config
+ :param each_list: config
+ :rtype: A list
+ :returns: the commands generated based on source and destination params
+ """
+ operators = ['eq', 'gt', 'lt', 'neq', 'range']
+ for item in operators:
+ if item in each_list:
+ index = each_list.index(item)
+ if source.get('address') or source.get('any') or source.get('host') and not source.get('port_protocol'):
+ try:
+ source_index = each_list.index(source.get('address'))
+ except ValueError:
+ try:
+ source_index = each_list.index('any')
+ except ValueError:
+ source_index = each_list.index('host')
+ if source.get('address'):
+ if (source_index + 2) == index and 'ipv6' not in each_list:
+ source['port_protocol'] = {item: each_list[index + 1]}
+ each_list.remove(item)
+ del each_list[index]
+ elif (source_index + 1) == index and 'ipv6' in each_list:
+ source['port_protocol'] = {item: each_list[index + 1]}
+ each_list.remove(item)
+ del each_list[source_index]
+ del each_list[index - 1]
+ elif source.get('any'):
+ if (source_index + 1) == index:
+ source['port_protocol'] = {item: each_list[index + 1]}
+ each_list.remove(item)
+ del each_list[index - 1]
+ del each_list[source_index]
+ elif source.get('host'):
+ if (source_index + 1) == index:
+ source['port_protocol'] = {item: each_list[index + 1]}
+ each_list.remove(item)
+ del each_list[index - 1]
+ del each_list[source_index]
+ if destination.get('address') or destination.get('any') or destination.get('host'):
+ try:
+ destination_index = each_list.index(destination.get('address'))
+ except ValueError:
+ try:
+ destination_index = each_list.index('any')
+ except ValueError:
+ destination_index = each_list.index('host') + 1
+ index -= 1
+ if (destination_index + 1) == index or (destination_index + 2) == index:
+ destination['port_protocol'] = {item: each_list[index + 1]}
+ each_list.remove(item)
+ del each_list[index]
+ break
+ if 'eq' in each_list or 'gt' in each_list or 'lt' in each_list or 'neq' in each_list or 'range' in each_list:
+ self.populate_port_protocol(source, destination, each_list)
+
+ def populate_source_destination(self, each, config, source, destination):
+ any = []
+ if 'any' in each:
+ any = re.findall('any', each)
+ if len(any) == 2:
+ source['any'] = True
+ destination['any'] = True
+ elif 'host' in each:
+ host = re.findall('host', each)
+ each = each.split(' ')
+ if len(host) == 2:
+ host_index = each.index('host')
+ source['host'] = each[host_index + 1]
+ del each[host_index]
+ host_index = each.index('host')
+ destination['host'] = each[host_index + 1]
+ else:
+ ip_n_wildcard_bits = re.findall(r'[0-9]+(?:\.[0-9]+){3}', each)
+ ip_index = None
+ if ip_n_wildcard_bits:
+ ip_index = each.index(ip_n_wildcard_bits[0])
+ host_index = each.index('host')
+ if ip_index:
+ if host_index < ip_index:
+ source['host'] = each(host_index + 1)
+ destination['address'] = ip_n_wildcard_bits[0]
+ destination['wildcard_bits'] = ip_n_wildcard_bits[1]
+ elif host_index > ip_index:
+ destination['host'] = each(host_index + 1)
+ source['address'] = ip_n_wildcard_bits[0]
+ source['wildcard_bits'] = ip_n_wildcard_bits[1]
+ else:
+ if config['afi'] == 'ipv4':
+ ip_n_wildcard_bits = re.findall(r'[0-9]+(?:\.[0-9]+){3}', each)
+ each = each.split(' ')
+ if len(ip_n_wildcard_bits) == 0 and len(any) == 1:
+ source['any'] = True
+ elif len(ip_n_wildcard_bits) == 1:
+ source['address'] = ip_n_wildcard_bits[0]
+ elif len(ip_n_wildcard_bits) == 2:
+ if 'any' in each:
+ if each.index('any') > each.index(ip_n_wildcard_bits[0]):
+ source['address'] = ip_n_wildcard_bits[0]
+ source['wildcard_bits'] = ip_n_wildcard_bits[1]
+ destination['any'] = True
+ elif each.index('any') < each.index(ip_n_wildcard_bits[0]):
+ source['any'] = True
+ destination['address'] = ip_n_wildcard_bits[0]
+ destination['wildcard_bits'] = ip_n_wildcard_bits[1]
+ else:
+ source['address'] = ip_n_wildcard_bits[0]
+ source['wildcard_bits'] = ip_n_wildcard_bits[1]
+ elif len(ip_n_wildcard_bits) == 4:
+ source['address'] = ip_n_wildcard_bits[0]
+ source['wildcard_bits'] = ip_n_wildcard_bits[1]
+ destination['address'] = ip_n_wildcard_bits[2]
+ destination['wildcard_bits'] = ip_n_wildcard_bits[3]
+ elif config['afi'] == 'ipv6':
+ temp_ipv6 = []
+ each = each.split(' ')
+ check_n_return_valid_ipv6_addr(self._module, each, temp_ipv6)
+ count = 0
+ for every in each:
+ if len(temp_ipv6) == 2:
+ if temp_ipv6[0] in every or temp_ipv6[1] in every:
+ temp_ipv6[count] = every
+ count += 1
+ elif len(temp_ipv6) == 1:
+ if temp_ipv6[0] in every:
+ temp_ipv6[count] = every
+ if 'any' in each:
+ if each.index('any') > each.index(temp_ipv6[0]):
+ source['address'] = temp_ipv6[0]
+ destination['any'] = True
+ elif each.index('any') < each.index(temp_ipv6[0]):
+ source['any'] = True
+ destination['address'] = temp_ipv6[0]
+ elif len(temp_ipv6) == 2:
+ source['address'] = temp_ipv6[0]
+ destination['address'] = temp_ipv6[1]
+
+ def parsed_config_facts(self, have_config):
+ """
+ For parsed config have_config is string of commands which
+ need to be splitted before passing it through render_config
+ from spec for null values
+ :param have_config: The configuration
+ :rtype: list of have config
+ :returns: The splitted generated config
+ """
+ split_config = re.split('ip|ipv6 access-list', have_config[0])
+ temp_config = []
+
+ # common piece of code for populating the temp_config list
+ def common_config_code(each, grant, temp_config):
+ temp = re.split(grant, each)
+ temp_config.append(temp[0])
+ temp_config.extend([grant + item for item in temp if 'access-list' not in item])
+
+ for each in split_config:
+ if 'v6' in each:
+ each = 'ipv6 ' + each.split('v6 ')[1]
+ if 'permit' in each:
+ common_config_code(each, 'permit', temp_config)
+ elif 'deny' in each:
+ common_config_code(each, 'deny', temp_config)
+ else:
+ each = 'ip' + each
+ if 'permit' in each:
+ common_config_code(each, 'permit', temp_config)
+ if 'deny' in each:
+ common_config_code(each, 'deny', temp_config)
+ return temp_config
+
+ def render_config(self, spec, have_config):
+ """
+ Render config as dictionary structure and delete keys
+ from spec for null values
+ :param spec: The facts tree, generated from the argspec
+ :param conf: The configuration
+ :rtype: dictionary
+ :returns: The generated config
+ """
+
+ # for parsed scnenario where commands are passed to generate the acls facts
+ if len(have_config) == 1:
+ have_config = self.parsed_config_facts(have_config)
+
+ config = deepcopy(spec)
+ render_config = list()
+ acls = dict()
+ aces = list()
+ temp_name = ''
+ for each in have_config:
+ each_list = [val for val in each.split(' ') if val != '']
+ if 'IPv6' in each or 'ipv6' in each:
+ if aces:
+ config['acls'].append(acls)
+ ip_config = config
+ if ip_config.get('acls'):
+ render_config.append(ip_config)
+ if not config['afi'] or config['afi'] == 'ipv4':
+ config = deepcopy(spec)
+ config['afi'] = 'ipv6'
+ acls = dict()
+ aces = list()
+ elif not config['afi'] and ('IP' in each or 'ip' in each):
+ config['afi'] = 'ipv4'
+ if 'access list' in each or 'access-list' in each:
+ try:
+ temp_index = each_list.index('list')
+ name = (each_list[temp_index + 1])
+ except ValueError:
+ name = each_list[-1]
+ if temp_name != name:
+ if aces:
+ config['acls'].append(acls)
+ acls = dict()
+ aces = list()
+ temp_name = name
+ acls['name'] = name
+ if 'Extended' in each:
+ acls['acl_type'] = 'extended'
+ continue
+ elif 'Standard' in each:
+ acls['acl_type'] = 'standard'
+ continue
+ ace_options = {}
+ try:
+ if config['afi'] == 'ipv4':
+ if 'deny' in each_list or 'permit' in each_list:
+ ace_options['sequence'] = int(each_list[0])
+ elif config['afi'] == 'ipv6':
+ if 'sequence' in each_list:
+ ace_options['sequence'] = int(each_list[each_list.index('sequence') + 1])
+ except ValueError:
+ pass
+ if utils.parse_conf_arg(each, 'permit'):
+ ace_options['grant'] = 'permit'
+ each_list.remove('permit')
+ elif utils.parse_conf_arg(each, 'deny'):
+ ace_options['grant'] = 'deny'
+ each_list.remove('deny')
+
+ protocol_option = ['ahp', 'eigrp', 'esp', 'gre', 'hbh', 'icmp', 'igmp', 'ip', 'ipv6', 'ipinip', 'nos',
+ 'ospf', 'pcp', 'pim', 'sctp', 'tcp', 'udp']
+ tcp_flags = ['ack', 'established', 'fin', 'psh', 'rst', 'syn', 'urg']
+ icmp_options = ['administratively_prohibited', 'alternate_address', 'conversion_error',
+ 'dod_host_prohibited', 'dod_net_prohibited', 'echo', 'echo_reply',
+ 'general_parameter_problem', 'host_isolated', 'host_precedence_unreachable',
+ 'host_redirect', 'host_tos_redirect', 'host_tos_unreachable', 'host_unknown',
+ 'host_unreachable', 'information_reply', 'information_request', 'mask_reply',
+ 'mask_request', 'mobile_redirect', 'net_redirect', 'net_tos_redirect',
+ 'net_tos_unreachable', 'net_unreachable', 'network_unknown', 'no_room_for_option',
+ 'option_missing', 'packet_too_big', 'parameter_problem', 'port_unreachable',
+ 'precedence_unreachable', 'protocol_unreachable', 'reassembly_timeout', 'redirect',
+ 'router_advertisement', 'router_solicitation', 'source_quench', 'source_route_failed',
+ 'time_exceeded', 'timestamp_reply', 'timestamp_request', 'traceroute', 'ttl_exceeded',
+ 'unreachable']
+ igmp_options = ['dvmrp', 'host_query', 'mtrace_resp', 'mtrace_route', 'pim', 'trace', 'v1host_report',
+ 'v2host_report', 'v2leave_group', 'v3host_report']
+
+ temp_option = ''
+ for option in protocol_option:
+ if option in each_list and 'access' not in each_list[each_list.index(option) + 1]:
+ temp_option = option
+ each_list.remove(temp_option)
+ if temp_option == 'tcp':
+ temp_flag = [each_flag for each_flag in tcp_flags if each_flag in each]
+ if temp_flag:
+ flag = temp_flag[0]
+ if flag in each_list:
+ each_list.remove(flag)
+ temp_flag = flag
+ if temp_option == 'icmp':
+ temp_flag = [each_option for each_option in icmp_options if each_option in each]
+ if temp_flag:
+ flag = temp_flag[0]
+ if flag in each_list:
+ each_list.remove(flag)
+ temp_flag = flag
+ if temp_option == 'igmp':
+ temp_flag = [each_option for each_option in igmp_options if each_option in each]
+ if temp_flag:
+ flag = temp_flag[0]
+ if flag in each_list:
+ each_list.remove(flag)
+ temp_flag = flag
+ break
+
+ dscp = utils.parse_conf_arg(each, 'dscp')
+ if dscp:
+ ace_options['dscp'] = dscp.split(' ')[0]
+ fragments = utils.parse_conf_arg(each, 'fragments')
+ if fragments:
+ ace_options['fragments'] = fragments.split(' ')[0]
+ log = utils.parse_conf_arg(each, 'log')
+ if log:
+ ace_options['log'] = log.split(' ')[0]
+ log_input = utils.parse_conf_arg(each, 'log_input')
+ if log_input:
+ ace_options['log_input'] = log_input.split(' ')[0]
+ option = utils.parse_conf_arg(each, 'option')
+ if option:
+ option = option.split(' ')[0]
+ option_dict = {}
+ option_dict[option] = True
+ ace_options['option'] = option_dict
+ precedence = utils.parse_conf_arg(each, 'precedence')
+ if precedence:
+ ace_options['precedence'] = precedence.split(' ')[0]
+ time_range = utils.parse_conf_arg(each, 'time_range')
+ if time_range:
+ ace_options['time_range'] = time_range.split(' ')[0]
+ tos = utils.parse_conf_arg(each, 'tos')
+ if tos:
+ tos_val = dict()
+ try:
+ tos_val['service_value'] = int(tos)
+ except ValueError:
+ tos = tos.replace('-', '_')
+ tos_val[tos] = True
+ ace_options['tos'] = tos_val
+ ttl = utils.parse_conf_arg(each, 'ttl')
+ if ttl:
+ temp_ttl = ttl.split(' ')
+ ttl = {}
+ ttl[temp_ttl[0]] = temp_ttl[1]
+ each_list = [item for item in each_list[:each_list.index('ttl')]]
+ ace_options['ttl'] = ttl
+
+ source = {}
+ destination = {}
+ self.populate_source_destination(each, config, source, destination)
+
+ if source.get('address') and source.get('address') == destination.get('address'):
+ self._module.fail_json(msg='Source and Destination address cannot be same!')
+ else:
+ self.populate_port_protocol(source, destination, each_list)
+
+ if source:
+ ace_options['source'] = source
+ if destination:
+ ace_options['destination'] = destination
+ if temp_option:
+ protocol_options = {}
+ ace_options['protocol'] = temp_option
+ if temp_option == 'tcp':
+ tcp = {}
+ if temp_flag:
+ tcp[temp_flag] = True
+ else:
+ tcp['set'] = True
+ protocol_options[temp_option] = tcp
+ elif temp_option == 'icmp':
+ icmp = dict()
+ if temp_flag:
+ icmp[temp_flag] = True
+ else:
+ icmp['set'] = True
+ protocol_options[temp_option] = icmp
+ elif temp_option == 'igmp':
+ igmp = dict()
+ if temp_flag:
+ igmp[temp_flag] = True
+ else:
+ igmp['set'] = True
+ protocol_options[temp_option] = igmp
+ else:
+ protocol_options[temp_option] = True
+ ace_options['protocol_options'] = protocol_options
+ if ace_options:
+ aces.append(ace_options)
+ acls['aces'] = aces
+ if acls:
+ if not config.get('acls'):
+ config['acls'] = list()
+ config['acls'].append(acls)
+
+ if config not in render_config:
+ render_config.append(utils.remove_empties(config))
+ # delete the populated config
+ del config
+
+ return render_config
diff --git a/lib/ansible/module_utils/network/ios/facts/facts.py b/lib/ansible/module_utils/network/ios/facts/facts.py
index 2a2f539fa1..8d66e87963 100644
--- a/lib/ansible/module_utils/network/ios/facts/facts.py
+++ b/lib/ansible/module_utils/network/ios/facts/facts.py
@@ -25,6 +25,7 @@ from ansible.module_utils.network.ios.facts.lldp_interfaces.lldp_interfaces impo
from ansible.module_utils.network.ios.facts.l3_interfaces.l3_interfaces import L3_InterfacesFacts
from ansible.module_utils.network.ios.facts.acl_interfaces.acl_interfaces import Acl_InterfacesFacts
from ansible.module_utils.network.ios.facts.static_routes.static_routes import Static_RoutesFacts
+from ansible.module_utils.network.ios.facts.acls.acls import AclsFacts
from ansible.module_utils.network.ios.facts.legacy.base import Default, Hardware, Interfaces, Config
@@ -47,6 +48,7 @@ FACT_RESOURCE_SUBSETS = dict(
l3_interfaces=L3_InterfacesFacts,
acl_interfaces=Acl_InterfacesFacts,
static_routes=Static_RoutesFacts,
+ acls=AclsFacts,
)
diff --git a/lib/ansible/module_utils/network/ios/utils/utils.py b/lib/ansible/module_utils/network/ios/utils/utils.py
index 258a116190..cfcfe82dbc 100644
--- a/lib/ansible/module_utils/network/ios/utils/utils.py
+++ b/lib/ansible/module_utils/network/ios/utils/utils.py
@@ -9,6 +9,7 @@
from __future__ import absolute_import, division, print_function
__metaclass__ = type
+import socket
from ansible.module_utils.six import iteritems
from ansible.module_utils.network.common.utils import is_masklen, to_netmask
@@ -28,7 +29,22 @@ def add_command_to_config_list(interface, cmd, commands):
commands.append(cmd)
-def new_dict_to_set(input_dict, temp_list, test_set, count):
+def check_n_return_valid_ipv6_addr(module, input_list, filtered_ipv6_list):
+ # To verify the valid ipv6 address
+ try:
+ for each in input_list:
+ if '::' in each:
+ if '/' in each:
+ each = each.split('/')[0]
+ if socket.inet_pton(socket.AF_INET6, each):
+ filtered_ipv6_list.append(each)
+ return filtered_ipv6_list
+ except socket.error:
+ module.fail_json(msg='Incorrect IPV6 address!')
+
+
+def new_dict_to_set(input_dict, temp_list, test_set, count=0):
+ # recursive function to convert input dict to set for comparision
test_dict = dict()
if isinstance(input_dict, dict):
input_dict_len = len(input_dict)
@@ -45,9 +61,26 @@ def new_dict_to_set(input_dict, temp_list, test_set, count):
else:
if v is not None:
test_dict.update({k: v})
- if tuple(iteritems(test_dict)) not in test_set and count == input_dict_len:
- test_set.add(tuple(iteritems(test_dict)))
- count = 0
+ try:
+ if tuple(iteritems(test_dict)) not in test_set and count == input_dict_len:
+ test_set.add(tuple(iteritems(test_dict)))
+ count = 0
+ except TypeError:
+ temp_dict = {}
+
+ def expand_dict(dict_to_expand):
+ temp = dict()
+ for k, v in iteritems(dict_to_expand):
+ if isinstance(v, dict):
+ expand_dict(v)
+ else:
+ if v is not None:
+ temp.update({k: v})
+ temp_dict.update(tuple(iteritems(temp)))
+ new_dict = {k: v}
+ expand_dict(new_dict)
+ if tuple(iteritems(temp_dict)) not in test_set:
+ test_set.add(tuple(iteritems(temp_dict)))
def dict_to_set(sample_dict):
diff --git a/lib/ansible/modules/network/ios/ios_acls.py b/lib/ansible/modules/network/ios/ios_acls.py
new file mode 100644
index 0000000000..a05214d8e1
--- /dev/null
+++ b/lib/ansible/modules/network/ios/ios_acls.py
@@ -0,0 +1,1417 @@
+#!/usr/bin/python
+# -*- coding: utf-8 -*-
+# Copyright 2019 Red Hat
+# GNU General Public License v3.0+
+# (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt)
+
+#############################################
+# WARNING #
+#############################################
+#
+# This file is auto generated by the resource
+# module builder playbook.
+#
+# Do not edit this file manually.
+#
+# Changes to this file will be over written
+# by the resource module builder.
+#
+# Changes should be made in the model used to
+# generate this file or in the resource module
+# builder template.
+#
+#############################################
+
+"""
+The module file for ios_acls
+"""
+
+from __future__ import absolute_import, division, print_function
+__metaclass__ = type
+
+ANSIBLE_METADATA = {'metadata_version': '1.1',
+ 'status': ['preview'],
+ 'supported_by': 'network'}
+
+
+DOCUMENTATION = """
+---
+module: ios_acls
+version_added: '2.10'
+short_description: Manages named or numbered ACLs on IOS devices.
+description: This module configures and manages the named or numbered ACLs on IOS platforms.
+author: Sumit Jaiswal (@justjais)
+notes:
+- Tested against Cisco IOSv Version 15.2 on VIRL
+- This module works with connection C(network_cli).
+ See L(IOS Platform Options,../network/user_guide/platform_ios.html).
+options:
+ config:
+ description: A dictionary of ACL options.
+ type: list
+ elements: dict
+ suboptions:
+ afi:
+ description:
+ - The Address Family Indicator (AFI) for the Access Control Lists (ACL).
+ required: true
+ type: str
+ choices:
+ - ipv4
+ - ipv6
+ acls:
+ description:
+ - A list of Access Control Lists (ACL).
+ type: list
+ elements: dict
+ suboptions:
+ name:
+ description: The name or the number of the ACL.
+ required: true
+ type: str
+ acl_type:
+ description:
+ - ACL type
+ - Note, it's mandatory and required for Named ACL, but for
+ Numbered ACL it's not mandatory.
+ type: str
+ choices:
+ - extended
+ - standard
+ aces:
+ description: The entries within the ACL.
+ elements: dict
+ type: list
+ suboptions:
+ grant:
+ description: Specify the action.
+ type: str
+ choices:
+ - permit
+ - deny
+ sequence:
+ description:
+ - Sequence Number for the Access Control Entry(ACE).
+ - Refer to vendor documentation for valid values.
+ type: int
+ protocol:
+ description:
+ - Specify the protocol to match.
+ - Refer to vendor documentation for valid values.
+ type: str
+ protocol_options:
+ description: protocol type.
+ type: dict
+ suboptions:
+ protocol_number:
+ description: An IP protocol number
+ type: int
+ ahp:
+ description: Authentication Header Protocol.
+ type: bool
+ eigrp:
+ description: Cisco's EIGRP routing protocol.
+ type: bool
+ esp:
+ description: Encapsulation Security Payload.
+ type: bool
+ gre:
+ description: Cisco's GRE tunneling.
+ type: bool
+ hbh:
+ description: Hop by Hop options header. Valid for IPV6
+ type: bool
+ icmp:
+ description: Internet Control Message Protocol.
+ type: dict
+ suboptions:
+ administratively_prohibited:
+ description: Administratively prohibited
+ type: bool
+ alternate_address:
+ description: Alternate address
+ type: bool
+ conversion_error:
+ description: Datagram conversion
+ type: bool
+ dod_host_prohibited:
+ description: Host prohibited
+ type: bool
+ dod_net_prohibited:
+ description: Net prohibited
+ type: bool
+ echo:
+ description: Echo (ping)
+ type: bool
+ echo_reply:
+ description: Echo reply
+ type: bool
+ general_parameter_problem:
+ description: Parameter problem
+ type: bool
+ host_isolated:
+ description: Host isolated
+ type: bool
+ host_precedence_unreachable:
+ description: Host unreachable for precedence
+ type: bool
+ host_redirect:
+ description: Host redirect
+ type: bool
+ host_tos_redirect:
+ description: Host redirect for TOS
+ type: bool
+ host_tos_unreachable:
+ description: Host unreachable for TOS
+ type: bool
+ host_unknown:
+ description: Host unknown
+ type: bool
+ host_unreachable:
+ description: Host unreachable
+ type: bool
+ information_reply:
+ description: Information replies
+ type: bool
+ information_request:
+ description: Information requests
+ type: bool
+ mask_reply:
+ description: Mask replies
+ type: bool
+ mask_request:
+ description: mask_request
+ type: bool
+ mobile_redirect:
+ description: Mobile host redirect
+ type: bool
+ net_redirect:
+ description: Network redirect
+ type: bool
+ net_tos_redirect:
+ description: Net redirect for TOS
+ type: bool
+ net_tos_unreachable:
+ description: Network unreachable for TOS
+ type: bool
+ net_unreachable:
+ description: Net unreachable
+ type: bool
+ network_unknown:
+ description: Network unknown
+ type: bool
+ no_room_for_option:
+ description: Parameter required but no room
+ type: bool
+ option_missing:
+ description: Parameter required but not present
+ type: bool
+ packet_too_big:
+ description: Fragmentation needed and DF set
+ type: bool
+ parameter_problem:
+ description: All parameter problems
+ type: bool
+ port_unreachable:
+ description: Port unreachable
+ type: bool
+ precedence_unreachable:
+ description: Precedence cutoff
+ type: bool
+ protocol_unreachable:
+ description: Protocol unreachable
+ type: bool
+ reassembly_timeout:
+ description: Reassembly timeout
+ type: bool
+ redirect:
+ description: All redirects
+ type: bool
+ router_advertisement:
+ description: Router discovery advertisements
+ type: bool
+ router_solicitation:
+ description: Router discovery solicitations
+ type: bool
+ source_quench:
+ description: Source quenches
+ type: bool
+ source_route_failed:
+ description: Source route failed
+ type: bool
+ time_exceeded:
+ description: All time exceededs
+ type: bool
+ timestamp_reply:
+ description: Timestamp replies
+ type: bool
+ timestamp_request:
+ description: Timestamp requests
+ type: bool
+ traceroute:
+ description: Traceroute
+ type: bool
+ ttl_exceeded:
+ description: TTL exceeded
+ type: bool
+ unreachable:
+ description: All unreachables
+ type: bool
+ igmp:
+ description: Internet Gateway Message Protocol.
+ type: dict
+ suboptions:
+ dvmrp:
+ description: Distance Vector Multicast Routing Protocol(2)
+ type: bool
+ host_query:
+ description: IGMP Membership Query(0)
+ type: bool
+ mtrace_resp:
+ description: Multicast Traceroute Response(7)
+ type: bool
+ mtrace_route:
+ description: Multicast Traceroute(8)
+ type: bool
+ pim:
+ description: Protocol Independent Multicast(3)
+ type: bool
+ trace:
+ description: Multicast trace(4)
+ type: bool
+ v1host_report:
+ description: IGMPv1 Membership Report(1)
+ type: bool
+ v2host_report:
+ description: IGMPv2 Membership Report(5)
+ type: bool
+ v2leave_group:
+ description: IGMPv2 Leave Group(6)
+ type: bool
+ v3host_report:
+ description: IGMPv3 Membership Report(9)
+ type: bool
+ ip:
+ description: Any Internet Protocol.
+ type: bool
+ ipv6:
+ description: Any IPv6.
+ type: bool
+ ipinip:
+ description: IP in IP tunneling.
+ type: bool
+ nos:
+ description: KA9Q NOS compatible IP over IP tunneling.
+ type: bool
+ ospf:
+ description: OSPF routing protocol.
+ type: bool
+ pcp:
+ description: Payload Compression Protocol.
+ type: bool
+ pim:
+ description: Protocol Independent Multicast.
+ type: bool
+ sctp:
+ description: Stream Control Transmission Protocol.
+ type: bool
+ udp:
+ description: User Datagram Protocol.
+ type: bool
+ tcp:
+ description: Match TCP packet flags
+ type: dict
+ suboptions:
+ ack:
+ description: Match on the ACK bit
+ type: bool
+ established:
+ description: Match established connections
+ type: bool
+ fin:
+ description: Match on the FIN bit
+ type: bool
+ psh:
+ description: Match on the PSH bit
+ type: bool
+ rst:
+ description: Match on the RST bit
+ type: bool
+ syn:
+ description: Match on the SYN bit
+ type: bool
+ urg:
+ description: Match on the URG bit
+ type: bool
+ source:
+ description: Specify the packet source.
+ type: dict
+ suboptions:
+ address:
+ description: Source network address.
+ type: str
+ wildcard_bits:
+ description: Destination wildcard bits, valid with IPV4 address.
+ type: str
+ any:
+ description: Match any source address.
+ type: bool
+ host:
+ description: A single source host
+ type: str
+ port_protocol:
+ description:
+ - Specify the destination port along with protocol.
+ - Note, Valid with TCP/UDP protocol_options
+ type: dict
+ suboptions:
+ eq:
+ description: Match only packets on a given port number.
+ type: str
+ gt:
+ description: Match only packets with a greater port number.
+ type: str
+ lt:
+ description: Match only packets with a lower port number.
+ type: str
+ neq:
+ description: Match only packets not on a given port number.
+ type: str
+ range:
+ description: Port group.
+ type: dict
+ suboptions:
+ start:
+ description: Specify the start of the port range.
+ type: int
+ end:
+ description: Specify the end of the port range.
+ type: int
+ destination:
+ description: Specify the packet destination.
+ type: dict
+ suboptions:
+ address:
+ description: Host address to match, or any single host address.
+ type: str
+ wildcard_bits:
+ description: Destination wildcard bits, valid with IPV4 address.
+ type: str
+ any:
+ description: Match any source address.
+ type: bool
+ host:
+ description: A single destination host
+ type: str
+ port_protocol:
+ description:
+ - Specify the destination port along with protocol.
+ - Note, Valid with TCP/UDP protocol_options
+ type: dict
+ suboptions:
+ eq:
+ description: Match only packets on a given port number.
+ type: str
+ gt:
+ description: Match only packets with a greater port number.
+ type: str
+ lt:
+ description: Match only packets with a lower port number.
+ type: str
+ neq:
+ description: Match only packets not on a given port number.
+ type: str
+ range:
+ description: Port group.
+ type: dict
+ suboptions:
+ start:
+ description: Specify the start of the port range.
+ type: int
+ end:
+ description: Specify the end of the port range.
+ type: int
+ dscp:
+ description: Match packets with given dscp value.
+ type: str
+ fragments:
+ description: Check non-initial fragments.
+ type: str
+ log:
+ description: Log matches against this entry.
+ type: str
+ log_input:
+ description: Log matches against this entry, including input interface.
+ type: str
+ option:
+ description:
+ - Match packets with given IP Options value.
+ - Valid only for named acls.
+ type: dict
+ suboptions:
+ add_ext:
+ description: Match packets with Address Extension Option (147).
+ type: bool
+ any_options:
+ description: Match packets with ANY Option.
+ type: bool
+ com_security:
+ description: Match packets with Commercial Security Option (134).
+ type: bool
+ dps:
+ description: Match packets with Dynamic Packet State Option (151).
+ type: bool
+ encode:
+ description: Match packets with Encode Option (15).
+ type: bool
+ eool:
+ description: Match packets with End of Options (0).
+ type: bool
+ ext_ip:
+ description: Match packets with Extended IP Option (145).
+ type: bool
+ ext_security:
+ description: Match packets with Extended Security Option (133).
+ type: bool
+ finn:
+ description: Match packets with Experimental Flow Control Option (205).
+ type: bool
+ imitd:
+ description: Match packets with IMI Traffic Desriptor Option (144).
+ type: bool
+ lsr:
+ description: Match packets with Loose Source Route Option (131).
+ type: bool
+ mtup:
+ description: Match packets with MTU Probe Option (11).
+ type: bool
+ mtur:
+ description: Match packets with MTU Reply Option (12).
+ type: bool
+ no_op:
+ description: Match packets with No Operation Option (1).
+ type: bool
+ nsapa:
+ description: Match packets with NSAP Addresses Option (150).
+ type: bool
+ record_route:
+ description: Match packets with Record Route Option (7).
+ type: bool
+ router_alert:
+ description: Match packets with Router Alert Option (148).
+ type: bool
+ sdb:
+ description: Match packets with Selective Directed Broadcast Option (149).
+ type: bool
+ security:
+ description: Match packets with Basic Security Option (130).
+ type: bool
+ ssr:
+ description: Match packets with Strict Source Routing Option (137).
+ type: bool
+ stream_id:
+ description: Match packets with Stream ID Option (136).
+ type: bool
+ timestamp:
+ description: Match packets with Time Stamp Option (68).
+ type: bool
+ traceroute:
+ description: Match packets with Trace Route Option (82).
+ type: bool
+ ump:
+ description: Match packets with Upstream Multicast Packet Option (152).
+ type: bool
+ visa:
+ description: Match packets with Experimental Access Control Option (142).
+ type: bool
+ zsu:
+ description: Match packets with Experimental Measurement Option (10).
+ type: bool
+ precedence:
+ description: Match packets with given precedence value.
+ type: int
+ time_range:
+ description: Specify a time-range.
+ type: str
+ tos:
+ description:
+ - Match packets with given TOS value.
+ - Note, DSCP and TOS are mutually exclusive
+ type: dict
+ suboptions:
+ service_value:
+ description: Type of service value
+ type: int
+ max_reliability:
+ description: Match packets with max reliable TOS (2).
+ type: bool
+ max_throughput:
+ description: Match packets with max throughput TOS (4).
+ type: bool
+ min_delay :
+ description: Match packets with min delay TOS (8).
+ type: bool
+ min_monetary_cost:
+ description: Match packets with min monetary cost TOS (1).
+ type: bool
+ normal:
+ description: Match packets with normal TOS (0).
+ type: bool
+ ttl:
+ description: Match packets with given TTL value.
+ type: dict
+ suboptions:
+ eq:
+ description: Match only packets on a given TTL number.
+ type: int
+ gt:
+ description: Match only packets with a greater TTL number.
+ type: int
+ lt:
+ description: Match only packets with a lower TTL number.
+ type: int
+ neq:
+ description: Match only packets not on a given TTL number.
+ type: int
+ range:
+ description: Match only packets in the range of TTLs.
+ type: dict
+ suboptions:
+ start:
+ description: Specify the start of the port range.
+ type: int
+ end:
+ description: Specify the end of the port range.
+ type: int
+ running_config:
+ description:
+ - The module, by default, will connect to the remote device and
+ retrieve the current running-config to use as a base for comparing
+ against the contents of source. There are times when it is not
+ desirable to have the task get the current running-config for
+ every task in a playbook. The I(running_config) argument allows the
+ implementer to pass in the configuration to use as the base
+ config for comparison.
+ type: str
+ state:
+ choices:
+ - merged
+ - replaced
+ - overridden
+ - deleted
+ - gathered
+ - rendered
+ - parsed
+ default: merged
+ description:
+ - The state of the configuration after module completion
+ type: str
+"""
+
+EXAMPLES = """
+---
+
+# Using merged
+
+# Before state:
+# -------------
+#
+# vios#sh access-lists
+# Extended IP access list 110
+# 10 deny icmp 192.0.2.0 0.0.0.255 192.0.3.0 0.0.0.255 echo dscp ef ttl eq 10
+
+- name: Merge provided configuration with device configuration
+ ios_acl:
+ config:
+ - afi: ipv4
+ acls:
+ - name: std_acl
+ acl_type: standard
+ aces:
+ - grant: deny
+ source:
+ address: 192.168.1.200
+ - grant: deny
+ source:
+ address: 192.168.2.0
+ wildcard_bits: 0.0.0.255
+ - name: 110
+ aces:
+ - grant: deny
+ sequence: 10
+ protocol_options:
+ icmp:
+ traceroute: true
+ source:
+ address: 192.0.2.0
+ wildcard_bits: 0.0.0.255
+ destination:
+ address: 192.0.3.0
+ wildcard_bits: 0.0.0.255
+ dscp: ef
+ ttl:
+ eq: 10
+ - grant: deny
+ protocol_options:
+ tcp:
+ ack: true
+ source:
+ host: 198.51.100.0
+ destination:
+ host: 198.51.110.0
+ port_protocol:
+ eq: telnet
+ - name: test
+ acl_type: extended
+ aces:
+ - grant: deny
+ protocol_options:
+ tcp:
+ fin: true
+ source:
+ address: 192.0.2.0
+ wildcard_bits: 0.0.0.255
+ destination:
+ address: 192.0.3.0
+ wildcard_bits: 0.0.0.255
+ port_protocol:
+ eq: www
+ option:
+ traceroute: true
+ ttl:
+ eq: 10
+ - name: 123
+ aces:
+ - grant: deny
+ protocol_options:
+ tcp:
+ ack: true
+ source:
+ address: 198.51.100.0
+ wildcard_bits: 0.0.0.255
+ destination:
+ address: 198.51.101.0
+ wildcard_bits: 0.0.0.255
+ port_protocol:
+ eq: telnet
+ tos:
+ service_value: 12
+ - grant: deny
+ protocol_options:
+ tcp:
+ ack: true
+ source:
+ address: 192.0.3.0
+ wildcard_bits: 0.0.0.255
+ destination:
+ address: 192.0.4.0
+ wildcard_bits: 0.0.0.255
+ port_protocol:
+ eq: www
+ dscp: ef
+ ttl:
+ lt: 20
+ - afi: ipv6
+ acls:
+ - name: R1_TRAFFIC
+ aces:
+ - grant: deny
+ protocol_options:
+ tcp:
+ ack: true
+ source:
+ any: true
+ port_protocol:
+ eq: www
+ destination:
+ any: true
+ port_protocol:
+ eq: telnet
+ dscp: af11
+ state: merged
+
+# Commands fired:
+# ---------------
+#
+# - ip access-list standard std_acl
+# - deny 192.168.1.200
+# - deny 192.168.2.0 0.0.0.255
+# - ip access-list extended 110
+# - no 10
+# - 10 deny icmp 192.0.2.0 0.0.0.255 192.0.3.0 0.0.0.255 traceroute dscp ef ttl eq 10
+# - deny tcp host 198.51.100.0 host 198.51.110.0 eq telnet ack
+# - ip access-list extended test
+# - deny tcp 192.0.2.0 0.0.0.255 192.0.3.0 0.0.0.255 eq www fin option traceroute ttl eq 10
+# - ip access-list extended 123
+# - deny tcp 198.51.100.0 0.0.0.255 198.51.101.0 0.0.0.255 eq telnet ack tos 12
+# - deny tcp 192.0.3.0 0.0.0.255 192.0.4.0 0.0.0.255 eq www ack dscp ef ttl lt 20
+# - ipv6 access-list R1_TRAFFIC
+# - deny tcp any eq www any eq telnet ack dscp af11
+
+# After state:
+# ------------
+#
+# vios#sh access-lists
+# Standard IP access list std_acl
+# 10 deny 192.168.1.200
+# 20 deny 192.168.2.0, wildcard bits 0.0.0.255
+# Extended IP access list 110
+# 10 deny icmp 192.0.2.0 0.0.0.255 192.0.3.0 0.0.0.255 traceroute dscp ef ttl eq 10
+# 20 deny tcp host 198.51.100.0 host 198.51.110.0 eq telnet ack
+# Extended IP access list 123
+# 10 deny tcp 198.51.100.0 0.0.0.255 198.51.101.0 0.0.0.255 eq telnet ack tos 12
+# 20 deny tcp 192.0.3.0 0.0.0.255 192.0.4.0 0.0.0.255 eq www ack dscp ef ttl lt 20
+# Extended IP access list test
+# 10 deny tcp 192.0.2.0 0.0.0.255 192.0.3.0 0.0.0.255 eq www fin option traceroute ttl eq 10
+# IPv6 access list R1_TRAFFIC
+# deny tcp any eq www any eq telnet ack dscp af11 sequence 10
+
+
+# Using replaced
+
+# Before state:
+# -------------
+#
+# vios#sh access-lists
+# Standard IP access list std_acl
+# 10 deny 192.168.1.200
+# 20 deny 192.168.2.0, wildcard bits 0.0.0.255
+# Extended IP access list 110
+# 10 deny icmp 192.0.2.0 0.0.0.255 192.0.3.0 0.0.0.255 traceroute dscp ef ttl eq 10
+# 20 deny tcp host 198.51.100.0 host 198.51.110.0 eq telnet ack
+# Extended IP access list 123
+# 10 deny tcp 198.51.100.0 0.0.0.255 198.51.101.0 0.0.0.255 eq telnet ack tos 12
+# 20 deny tcp 192.0.3.0 0.0.0.255 192.0.4.0 0.0.0.255 eq www ack dscp ef ttl lt 20
+# Extended IP access list test
+# 10 deny tcp 192.0.2.0 0.0.0.255 192.0.3.0 0.0.0.255 eq www fin option traceroute ttl eq 10
+# IPv6 access list R1_TRAFFIC
+# deny tcp any eq www any eq telnet ack dscp af11 sequence 10
+
+
+- name: Replaces device configuration of listed acls with provided configuration
+ ios_acl:
+ config:
+ - afi: ipv4
+ acls:
+ - name: 110
+ aces:
+ - grant: deny
+ protocol_options:
+ tcp:
+ syn: true
+ source:
+ address: 192.0.2.0
+ wildcard_bits: 0.0.0.255
+ destination:
+ address: 192.0.3.0
+ wildcard_bits: 0.0.0.255
+ port_protocol:
+ eq: www
+ dscp: ef
+ ttl:
+ eq: 10
+ - name: 150
+ aces:
+ - grant: deny
+ sequence: 20
+ protocol_options:
+ tcp:
+ syn: true
+ source:
+ address: 198.51.100.0
+ wildcard_bits: 0.0.0.255
+ port_protocol:
+ eq: telnet
+ destination:
+ address: 198.51.110.0
+ wildcard_bits: 0.0.0.255
+ port_protocol:
+ eq: telnet
+ dscp: ef
+ ttl:
+ eq: 10
+ state: replaced
+
+# Commands fired:
+# ---------------
+#
+# - no ip access-list extended 110
+# - ip access-list extended 110
+# - deny tcp 192.0.2.0 0.0.0.255 192.0.3.0 0.0.0.255 eq www syn dscp ef ttl eq 10
+# - ip access-list extended 150
+# - 20 deny tcp 198.51.100.0 0.0.0.255 eq telnet 198.51.110.0 0.0.0.255 eq telnet syn dscp ef ttl eq 10
+
+# After state:
+# -------------
+#
+# vios#sh access-lists
+# Standard IP access list std_acl
+# 10 deny 192.168.1.200
+# 20 deny 192.168.2.0, wildcard bits 0.0.0.255
+# Extended IP access list 110
+# 10 deny tcp 192.0.2.0 0.0.0.255 192.0.3.0 0.0.0.255 eq www syn dscp ef ttl eq 10
+# Extended IP access list 123
+# 10 deny tcp 198.51.100.0 0.0.0.255 198.51.101.0 0.0.0.255 eq telnet ack tos 12
+# 20 deny tcp 192.0.3.0 0.0.0.255 192.0.4.0 0.0.0.255 eq www ack dscp ef ttl lt 20
+# Extended IP access list 150
+# 20 deny tcp 198.51.100.0 0.0.0.255 eq telnet 198.51.110.0 0.0.0.255 eq telnet syn dscp ef ttl eq 10
+# Extended IP access list test
+# 10 deny tcp 192.0.2.0 0.0.0.255 192.0.3.0 0.0.0.255 eq www fin option traceroute ttl eq 10
+# IPv6 access list R1_TRAFFIC
+# deny tcp any eq www any eq telnet ack dscp af11 sequence 10
+
+# Using overridden
+
+# Before state:
+# -------------
+#
+# vios#sh access-lists
+# Standard IP access list std_acl
+# 10 deny 192.168.1.200
+# 20 deny 192.168.2.0, wildcard bits 0.0.0.255
+# Extended IP access list 110
+# 10 deny icmp 192.0.2.0 0.0.0.255 192.0.3.0 0.0.0.255 traceroute dscp ef ttl eq 10
+# 20 deny tcp host 198.51.100.0 host 198.51.110.0 eq telnet ack
+# Extended IP access list 123
+# 10 deny tcp 198.51.100.0 0.0.0.255 198.51.101.0 0.0.0.255 eq telnet ack tos 12
+# 20 deny tcp 192.0.3.0 0.0.0.255 192.0.4.0 0.0.0.255 eq www ack dscp ef ttl lt 20
+# Extended IP access list test
+# 10 deny tcp 192.0.2.0 0.0.0.255 192.0.3.0 0.0.0.255 eq www fin option traceroute ttl eq 10
+# IPv6 access list R1_TRAFFIC
+# deny tcp any eq www any eq telnet ack dscp af11 sequence 10
+
+- name: Override device configuration of all acls with provided configuration
+ ios_acl:
+ config:
+ - afi: ipv4
+ acls:
+ - name: 110
+ aces:
+ - grant: deny
+ sequence: 20
+ protocol_options:
+ tcp:
+ ack: true
+ source:
+ address: 198.51.100.0
+ wildcard_bits: 0.0.0.255
+ port_protocol:
+ eq: telnet
+ destination:
+ address: 198.51.110.0
+ wildcard_bits: 0.0.0.255
+ port_protocol:
+ eq: www
+ dscp: ef
+ ttl:
+ eq: 10
+ - name: 150
+ aces:
+ - grant: deny
+ sequence: 10
+ protocol_options:
+ tcp:
+ syn: true
+ source:
+ address: 198.51.100.0
+ wildcard_bits: 0.0.0.255
+ port_protocol:
+ eq: telnet
+ destination:
+ address: 198.51.110.0
+ wildcard_bits: 0.0.0.255
+ port_protocol:
+ eq: telnet
+ dscp: ef
+ ttl:
+ eq: 10
+ state: overridden
+
+# Commands fired:
+# ---------------
+#
+# - no ip access-list standard std_acl
+# - no ip access-list extended 110
+# - no ip access-list extended 123
+# - no ip access-list extended 150
+# - no ip access-list extended test
+# - no ipv6 access-list R1_TRAFFIC
+# - ip access-list extended 150
+# - 10 deny tcp 198.51.100.0 0.0.0.255 eq telnet 198.51.110.0 0.0.0.255 eq telnet syn dscp ef ttl eq 10
+# - ip access-list extended 110
+# - 20 deny tcp 198.51.100.0 0.0.0.255 eq telnet 198.51.110.0 0.0.0.255 eq www ack dscp ef ttl eq 10
+
+# After state:
+# -------------
+#
+# vios#sh access-lists
+# Extended IP access list 110
+# 20 deny tcp 198.51.100.0 0.0.0.255 eq telnet 198.51.110.0 0.0.0.255 eq www ack dscp ef ttl eq 10
+# Extended IP access list 150
+# 10 deny tcp 198.51.100.0 0.0.0.255 eq telnet 198.51.110.0 0.0.0.255 eq telnet syn dscp ef ttl eq 10
+
+# Using Deleted
+
+# Before state:
+# -------------
+#
+# vios#sh access-lists
+# Standard IP access list std_acl
+# 10 deny 192.168.1.200
+# 20 deny 192.168.2.0, wildcard bits 0.0.0.255
+# Extended IP access list 110
+# 10 deny icmp 192.0.2.0 0.0.0.255 192.0.3.0 0.0.0.255 traceroute dscp ef ttl eq 10
+# 20 deny tcp host 198.51.100.0 host 198.51.110.0 eq telnet ack
+# Extended IP access list 123
+# 10 deny tcp 198.51.100.0 0.0.0.255 198.51.101.0 0.0.0.255 eq telnet ack tos 12
+# 20 deny tcp 192.0.3.0 0.0.0.255 192.0.4.0 0.0.0.255 eq www ack dscp ef ttl lt 20
+# Extended IP access list test
+# 10 deny tcp 192.0.2.0 0.0.0.255 192.0.3.0 0.0.0.255 eq www fin option traceroute ttl eq 10
+# IPv6 access list R1_TRAFFIC
+# deny tcp any eq www any eq telnet ack dscp af11 sequence 10
+
+- name: "Delete module attributes of given acls (Note: This won't delete the interface itself)"
+ ios_acl:
+ config:
+ - afi: ipv4
+ acls:
+ - name: test
+ acl_type: extended
+ - name: 110
+ - name: 123
+ aces:
+ - sequence: 10
+ - afi: ipv6
+ acls:
+ - name: R1_TRAFFIC
+ state: deleted
+
+# Commands fired:
+# ---------------
+#
+# - no ip access-list extended test
+# - no ip access-list extended 110
+# - ip access-list extended 123
+# - no 10
+# - no ipv6 access-list R1_TRAFFIC
+
+# After state:
+# -------------
+#
+# vios#sh access-lists
+# Standard IP access list std_acl
+# 10 deny 192.168.1.200
+# 20 deny 192.168.2.0, wildcard bits 0.0.0.255
+# Extended IP access list 123
+# 20 deny tcp 192.0.3.0 0.0.0.255 192.0.4.0 0.0.0.255 eq www ack dscp ef ttl lt 20
+
+# Before state:
+# -------------
+#
+# vios#sh access-lists
+# Standard IP access list std_acl
+# 10 deny 192.168.1.200
+# 20 deny 192.168.2.0, wildcard bits 0.0.0.255
+# Extended IP access list 110
+# 10 deny icmp 192.0.2.0 0.0.0.255 192.0.3.0 0.0.0.255 traceroute dscp ef ttl eq 10
+# 20 deny tcp host 198.51.100.0 host 198.51.110.0 eq telnet ack
+# Extended IP access list 123
+# 10 deny tcp 198.51.100.0 0.0.0.255 198.51.101.0 0.0.0.255 eq telnet ack tos 12
+# 20 deny tcp 192.0.3.0 0.0.0.255 192.0.4.0 0.0.0.255 eq www ack dscp ef ttl lt 20
+# Extended IP access list test
+# 10 deny tcp 192.0.2.0 0.0.0.255 192.0.3.0 0.0.0.255 eq www fin option traceroute ttl eq 10
+# IPv6 access list R1_TRAFFIC
+# deny tcp any eq www any eq telnet ack dscp af11 sequence 10
+
+- name: "Delete module attributes of given ACL based on AFI (Note: This won't delete the interface itself)"
+ ios_acl:
+ config:
+ - afi: ipv4
+ state: deleted
+
+# Commands fired:
+# ---------------
+#
+# - no ip access-list standard std_acl
+# - no ip access-list extended test
+# - no ip access-list extended 110
+# - no ip access-list extended 123
+
+# After state:
+# -------------
+#
+# vios#sh access-lists
+# IPv6 access list R1_TRAFFIC
+# deny tcp any eq www any eq telnet ack dscp af11 sequence 10
+
+# Using Deleted without any config passed
+#"(NOTE: This will delete all of configured resource module attributes from each configured interface)"
+
+# Before state:
+# -------------
+#
+# vios#sh access-lists
+# Standard IP access list std_acl
+# 10 deny 192.168.1.200
+# 20 deny 192.168.2.0, wildcard bits 0.0.0.255
+# Extended IP access list 110
+# 10 deny icmp 192.0.2.0 0.0.0.255 192.0.3.0 0.0.0.255 traceroute dscp ef ttl eq 10
+# 20 deny tcp host 198.51.100.0 host 198.51.110.0 eq telnet ack
+# Extended IP access list 123
+# 10 deny tcp 198.51.100.0 0.0.0.255 198.51.101.0 0.0.0.255 eq telnet ack tos 12
+# 20 deny tcp 192.0.3.0 0.0.0.255 192.0.4.0 0.0.0.255 eq www ack dscp ef ttl lt 20
+# Extended IP access list test
+# 10 deny tcp 192.0.2.0 0.0.0.255 192.0.3.0 0.0.0.255 eq www fin option traceroute ttl eq 10
+# IPv6 access list R1_TRAFFIC
+# deny tcp any eq www any eq telnet ack dscp af11 sequence 10
+
+- name: "Delete module attributes of all acls (Note: This won't delete the interface itself)"
+ ios_acl:
+ state: deleted
+
+# Commands fired:
+# ---------------
+#
+# - no ip access-list extended test
+# - no ip access-list extended 110
+# - no ip access-list extended 123
+# - no ip access-list extended test
+# - no ipv6 access-list R1_TRAFFIC
+
+# After state:
+# -------------
+#
+# vios#sh access-lists
+
+# Using Gathered
+
+# Before state:
+# -------------
+#
+# vios#sh access-lists
+# Standard IP access list std_acl
+# 10 deny 192.168.1.200
+# 20 deny 192.168.2.0, wildcard bits 0.0.0.255
+# Extended IP access list 110
+# 10 deny icmp 192.0.2.0 0.0.0.255 192.0.3.0 0.0.0.255 traceroute dscp ef ttl eq 10
+# 20 deny tcp host 198.51.100.0 host 198.51.110.0 eq telnet ack
+# Extended IP access list 123
+# 10 deny tcp 198.51.100.0 0.0.0.255 198.51.101.0 0.0.0.255 eq telnet ack tos 12
+# 20 deny tcp 192.0.3.0 0.0.0.255 192.0.4.0 0.0.0.255 eq www ack dscp ef ttl lt 20
+# Extended IP access list test
+# 10 deny tcp 192.0.2.0 0.0.0.255 192.0.3.0 0.0.0.255 eq www fin option traceroute ttl eq 10
+# IPv6 access list R1_TRAFFIC
+# deny tcp any eq www any eq telnet ack dscp af11 sequence 10
+
+- name: Gather listed acls interfaces with provided configurations
+ ios_acl_interfaces:
+ config:
+ state: gathered
+
+# Module Execution Result:
+# ------------------------
+#
+# "gathered": [
+# {
+# "acls": [
+# {
+# "aces": [
+# {
+# "destination": {
+# "address": "192.0.3.0",
+# "wildcard_bits": "0.0.0.255"
+# },
+# "dscp": "ef",
+# "grant": "deny",
+# "protocol_options": {
+# "icmp": {
+# "echo": true
+# }
+# },
+# "sequence": 10,
+# "source": {
+# "address": "192.0.2.0",
+# "wildcard_bits": "0.0.0.255"
+# },
+# "ttl": {
+# "eq": 10
+# }
+# }
+# ],
+# "acl_type": "extended",
+# "name": "110"
+# },
+# {
+# "aces": [
+# {
+# "destination": {
+# "address": "198.51.101.0",
+# "port_protocol": {
+# "eq": "telnet"
+# },
+# "wildcard_bits": "0.0.0.255"
+# },
+# "grant": "deny",
+# "protocol_options": {
+# "tcp": {
+# "ack": true
+# }
+# },
+# "sequence": 10,
+# "source": {
+# "address": "198.51.100.0",
+# "wildcard_bits": "0.0.0.255"
+# },
+# "tos": {
+# "service_value": 12
+# }
+# },
+# {
+# "destination": {
+# "address": "192.0.4.0",
+# "port_protocol": {
+# "eq": "www"
+# },
+# "wildcard_bits": "0.0.0.255"
+# },
+# "dscp": "ef",
+# "grant": "deny",
+# "protocol_options": {
+# "tcp": {
+# "ack": true
+# }
+# },
+# "sequence": 20,
+# "source": {
+# "address": "192.0.3.0",
+# "wildcard_bits": "0.0.0.255"
+# },
+# "ttl": {
+# "lt": 20
+# }
+# }
+# ],
+# "acl_type": "extended",
+# "name": "123"
+# },
+# {
+# "aces": [
+# {
+# "destination": {
+# "address": "192.0.3.0",
+# "port_protocol": {
+# "eq": "www"
+# },
+# "wildcard_bits": "0.0.0.255"
+# },
+# "grant": "deny",
+# "option": {
+# "traceroute": true
+# },
+# "protocol_options": {
+# "tcp": {
+# "fin": true
+# }
+# },
+# "sequence": 10,
+# "source": {
+# "address": "192.0.2.0",
+# "wildcard_bits": "0.0.0.255"
+# },
+# "ttl": {
+# "eq": 10
+# }
+# }
+# ],
+# "acl_type": "extended",
+# "name": "test_acl"
+# }
+# ],
+# "afi": "ipv4"
+# },
+# {
+# "acls": [
+# {
+# "aces": [
+# {
+# "destination": {
+# "any": true,
+# "port_protocol": {
+# "eq": "telnet"
+# }
+# },
+# "dscp": "af11",
+# "grant": "deny",
+# "protocol_options": {
+# "tcp": {
+# "ack": true
+# }
+# },
+# "sequence": 10,
+# "source": {
+# "any": true,
+# "port_protocol": {
+# "eq": "www"
+# }
+# }
+# }
+# ],
+# "name": "R1_TRAFFIC"
+# }
+# ],
+# "afi": "ipv6"
+# }
+# ]
+
+# Using Rendered
+
+- name: Rendered the provided configuration with the exisiting running configuration
+ ios_acl:
+ config:
+ - afi: ipv4
+ acls:
+ - name: 110
+ aces:
+ - grant: deny
+ sequence: 10
+ protocol_options:
+ tcp:
+ syn: true
+ source:
+ address: 192.0.2.0
+ wildcard_bits: 0.0.0.255
+ destination:
+ address: 192.0.3.0
+ wildcard_bits: 0.0.0.255
+ port_protocol:
+ eq: www
+ dscp: ef
+ ttl:
+ eq: 10
+ - name: 150
+ aces:
+ - grant: deny
+ protocol_options:
+ tcp:
+ syn: true
+ source:
+ address: 198.51.100.0
+ wildcard_bits: 0.0.0.255
+ port_protocol:
+ eq: telnet
+ destination:
+ address: 198.51.110.0
+ wildcard_bits: 0.0.0.255
+ port_protocol:
+ eq: telnet
+ dscp: ef
+ ttl:
+ eq: 10
+ state: rendered
+
+# Module Execution Result:
+# ------------------------
+#
+# "rendered": [
+# "ip access-list extended 110",
+# "10 deny tcp 192.0.2.0 0.0.0.255 192.0.3.0 0.0.0.255 eq www syn dscp ef ttl eq 10",
+# "ip access-list extended 150",
+# "deny tcp 198.51.100.0 0.0.0.255 eq telnet 198.51.110.0 0.0.0.255 eq telnet syn dscp ef ttl eq 10"
+# ]
+
+# Using Parsed
+
+- name: Parse the commands for provided configuration
+ ios_acl:
+ running_config:
+ "ipv6 access-list R1_TRAFFIC
+ deny tcp any eq www any eq telnet ack dscp af11"
+ state: parsed
+
+# Module Execution Result:
+# ------------------------
+#
+# "parsed": [
+# {
+# "acls": [
+# {
+# "aces": [
+# {
+# "destination": {
+# "any": true,
+# "port_protocol": {
+# "eq": "telnet"
+# }
+# },
+# "dscp": "af11",
+# "grant": "deny",
+# "protocol_options": {
+# "tcp": {
+# "ack": true
+# }
+# },
+# "source": {
+# "any": true,
+# "port_protocol": {
+# "eq": "www"
+# }
+# }
+# }
+# ],
+# "name": "R1_TRAFFIC"
+# }
+# ],
+# "afi": "ipv6"
+# }
+# ]
+
+"""
+
+RETURN = """
+before:
+ description: The configuration as structured data prior to module invocation.
+ returned: always
+ type: list
+ sample: The configuration returned will always be in the same format of the parameters above.
+after:
+ description: The configuration as structured data after module completion.
+ returned: when changed
+ type: list
+ sample: The configuration returned will always be in the same format of the parameters above.
+commands:
+ description: The set of commands pushed to the remote device
+ returned: always
+ type: list
+ sample: ['ip access-list extended 110', 'deny icmp 192.0.2.0 0.0.0.255 192.0.3.0 0.0.0.255 echo dscp ef ttl eq 10']
+"""
+
+from ansible.module_utils.basic import AnsibleModule
+from ansible.module_utils.network.ios.argspec.acls.acls import AclsArgs
+from ansible.module_utils.network.ios.config.acls.acls import Acls
+
+
+def main():
+ """
+ Main entry point for module execution
+
+ :returns: the result form module invocation
+ """
+ required_if = [('state', 'merged', ('config',)),
+ ('state', 'replaced', ('config',)),
+ ('state', 'overridden', ('config',)),
+ ('state', 'rendered', ('config',)),
+ ('state', 'parsed', ('running_config',))]
+
+ mutually_exclusive = [('config', 'running_config')]
+
+ module = AnsibleModule(argument_spec=AclsArgs.argument_spec,
+ required_if=required_if,
+ mutually_exclusive=mutually_exclusive,
+ supports_check_mode=True)
+
+ result = Acls(module).execute_module()
+ module.exit_json(**result)
+
+
+if __name__ == '__main__':
+ main()
diff --git a/lib/ansible/modules/network/ios/ios_facts.py b/lib/ansible/modules/network/ios/ios_facts.py
index 5c3ff8dae3..e2f147e669 100644
--- a/lib/ansible/modules/network/ios/ios_facts.py
+++ b/lib/ansible/modules/network/ios/ios_facts.py
@@ -58,7 +58,7 @@ options:
a specific subset should not be collected.
Valid subsets are 'all', 'interfaces', 'l2_interfaces', 'vlans',
'lag_interfaces', 'lacp', 'lacp_interfaces', 'lldp_global',
- 'lldp_interfaces', 'l3_interfaces', 'acl_interfaces', 'static_routes'.
+ 'lldp_interfaces', 'l3_interfaces', 'acl_interfaces', 'static_routes', 'acls'.
version_added: "2.9"
"""