diff options
author | Sumit Jaiswal <sjaiswal@redhat.com> | 2020-02-28 22:06:38 +0530 |
---|---|---|
committer | GitHub <noreply@github.com> | 2020-02-28 22:06:38 +0530 |
commit | 9392912608f82ed2a38ab4abc6e3b4db0a61d637 (patch) | |
tree | a47cbf47b92b5a54f72cddf687a3d60d9e2775f3 /lib | |
parent | 32a76f0aa191d1d0a08a8b3fde0b217101cbfd82 (diff) | |
download | ansible-9392912608f82ed2a38ab4abc6e3b4db0a61d637.tar.gz |
Resource module for IOS ACL (#66629)
* fix ios_acl
Diffstat (limited to 'lib')
10 files changed, 3265 insertions, 5 deletions
diff --git a/lib/ansible/module_utils/network/ios/argspec/acls/__init__.py b/lib/ansible/module_utils/network/ios/argspec/acls/__init__.py new file mode 100644 index 0000000000..e69de29bb2 --- /dev/null +++ b/lib/ansible/module_utils/network/ios/argspec/acls/__init__.py diff --git a/lib/ansible/module_utils/network/ios/argspec/acls/acls.py b/lib/ansible/module_utils/network/ios/argspec/acls/acls.py new file mode 100644 index 0000000000..ca8982e557 --- /dev/null +++ b/lib/ansible/module_utils/network/ios/argspec/acls/acls.py @@ -0,0 +1,593 @@ +# +# -*- coding: utf-8 -*- +# Copyright 2019 Red Hat +# GNU General Public License v3.0+ +# (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt) + +############################################# +# WARNING # +############################################# +# +# This file is auto generated by the resource +# module builder playbook. +# +# Do not edit this file manually. +# +# Changes to this file will be over written +# by the resource module builder. +# +# Changes should be made in the model used to +# generate this file or in the resource module +# builder template. +# +############################################# +""" +The arg spec for the ios_acls module +""" + +from __future__ import absolute_import, division, print_function +__metaclass__ = type + + +class AclsArgs(object): + """The arg spec for the ios_acls module + """ + def __init__(self, **kwargs): + pass + + argument_spec = { + 'config': { + 'elements': 'dict', + 'options': { + 'afi': { + 'required': True, + 'choices': ['ipv4', 'ipv6'], + 'type': 'str' + }, + 'acls': { + 'elements': 'dict', + 'type': 'list', + 'options': { + 'name': { + 'required': True, + 'type': 'str' + }, + 'acl_type': { + 'choices': ['extended', 'standard'], + 'type': 'str' + }, + 'aces': { + 'elements': 'dict', + 'type': 'list', + 'options': { + 'grant': { + 'choices': ['permit', 'deny'], + 'type': 'str' + }, + 'sequence': { + 'type': 'int' + }, + 'source': { + 'type': + 'dict', + 'mutually_exclusive': + [['address', 'any', 'host'], + ['wildcard_bits', 'any', 'host']], + 'options': { + 'address': { + 'type': 'str' + }, + 'wildcard_bits': { + 'type': 'str' + }, + 'any': { + 'type': 'bool' + }, + 'host': { + 'type': 'str' + }, + 'port_protocol': { + 'type': 'dict', + 'options': { + 'eq': { + 'type': 'str' + }, + 'gt': { + 'type': 'str' + }, + 'lt': { + 'type': 'str' + }, + 'neq': { + 'type': 'str' + }, + 'range': { + 'type': 'dict', + 'options': { + 'start': { + 'type': 'int' + }, + 'end': { + 'type': 'int' + } + } + } + } + } + }, + }, + 'destination': { + 'type': + 'dict', + 'mutually_exclusive': + [['address', 'any', 'host'], + ['wildcard_bits', 'any', 'host']], + 'options': { + 'address': { + 'type': 'str' + }, + 'wildcard_bits': { + 'type': 'str' + }, + 'any': { + 'type': 'bool' + }, + 'host': { + 'type': 'str' + }, + 'port_protocol': { + 'type': 'dict', + 'options': { + 'eq': { + 'type': 'str' + }, + 'gt': { + 'type': 'str' + }, + 'lt': { + 'type': 'str' + }, + 'neq': { + 'type': 'str' + }, + 'range': { + 'type': 'dict', + 'options': { + 'start': { + 'type': 'int' + }, + 'end': { + 'type': 'int' + } + } + } + } + } + } + }, + 'protocol': { + 'type': 'str' + }, + 'protocol_options': { + 'type': 'dict', + 'options': { + 'protocol_number': { + 'type': 'int' + }, + 'ahp': { + 'type': 'bool' + }, + 'eigrp': { + 'type': 'bool' + }, + 'esp': { + 'type': 'bool' + }, + 'gre': { + 'type': 'bool' + }, + 'hbh': { + 'type': 'bool' + }, + 'icmp': { + 'type': 'dict', + 'options': { + 'administratively_prohibited': + { + 'type': 'bool' + }, + 'alternate_address': { + 'type': 'bool' + }, + 'conversion_error': { + 'type': 'bool' + }, + 'dod_host_prohibited': { + 'type': 'bool' + }, + 'dod_net_prohibited': { + 'type': 'bool' + }, + 'echo': { + 'type': 'bool' + }, + 'echo_reply': { + 'type': 'bool' + }, + 'general_parameter_problem': { + 'type': 'bool' + }, + 'host_isolated': { + 'type': 'bool' + }, + 'host_precedence_unreachable': + { + 'type': 'bool' + }, + 'host_redirect': { + 'type': 'bool' + }, + 'host_tos_redirect': { + 'type': 'bool' + }, + 'host_tos_unreachable': { + 'type': 'bool' + }, + 'host_unknown': { + 'type': 'bool' + }, + 'host_unreachable': { + 'type': 'bool' + }, + 'information_reply': { + 'type': 'bool' + }, + 'information_request': { + 'type': 'bool' + }, + 'mask_reply': { + 'type': 'bool' + }, + 'mask_request': { + 'type': 'bool' + }, + 'mobile_redirect': { + 'type': 'bool' + }, + 'net_redirect': { + 'type': 'bool' + }, + 'net_tos_redirect': { + 'type': 'bool' + }, + 'net_tos_unreachable': { + 'type': 'bool' + }, + 'net_unreachable': { + 'type': 'bool' + }, + 'network_unknown': { + 'type': 'bool' + }, + 'no_room_for_option': { + 'type': 'bool' + }, + 'option_missing': { + 'type': 'bool' + }, + 'packet_too_big': { + 'type': 'bool' + }, + 'parameter_problem': { + 'type': 'bool' + }, + 'port_unreachable': { + 'type': 'bool' + }, + 'precedence_unreachable': { + 'type': 'bool' + }, + 'protocol_unreachable': { + 'type': 'bool' + }, + 'reassembly_timeout': { + 'type': 'bool' + }, + 'redirect': { + 'type': 'bool' + }, + 'router_advertisement': { + 'type': 'bool' + }, + 'router_solicitation': { + 'type': 'bool' + }, + 'source_quench': { + 'type': 'bool' + }, + 'source_route_failed': { + 'type': 'bool' + }, + 'time_exceeded': { + 'type': 'bool' + }, + 'timestamp_reply': { + 'type': 'bool' + }, + 'timestamp_request': { + 'type': 'bool' + }, + 'traceroute': { + 'type': 'bool' + }, + 'ttl_exceeded': { + 'type': 'bool' + }, + 'unreachable': { + 'type': 'bool' + }, + } + }, + 'igmp': { + 'type': 'dict', + 'options': { + 'dvmrp': { + 'type': 'bool' + }, + 'host_query': { + 'type': 'bool' + }, + 'mtrace_resp': { + 'type': 'bool' + }, + 'mtrace_route': { + 'type': 'bool' + }, + 'pim': { + 'type': 'bool' + }, + 'trace': { + 'type': 'bool' + }, + 'v1host_report': { + 'type': 'bool' + }, + 'v2host_report': { + 'type': 'bool' + }, + 'v2leave_group': { + 'type': 'bool' + }, + 'v3host_report': { + 'type': 'bool' + } + } + }, + 'ip': { + 'type': 'bool' + }, + 'ipv6': { + 'type': 'bool' + }, + 'ipinip': { + 'type': 'bool' + }, + 'nos': { + 'type': 'bool' + }, + 'ospf': { + 'type': 'bool' + }, + 'pcp': { + 'type': 'bool' + }, + 'pim': { + 'type': 'bool' + }, + 'sctp': { + 'type': 'bool' + }, + 'tcp': { + 'options': { + 'ack': { + 'type': 'bool' + }, + 'established': { + 'type': 'bool' + }, + 'fin': { + 'type': 'bool' + }, + 'psh': { + 'type': 'bool' + }, + 'rst': { + 'type': 'bool' + }, + 'syn': { + 'type': 'bool' + }, + 'urg': { + 'type': 'bool' + } + }, + 'type': 'dict' + }, + 'udp': { + 'type': 'bool' + } + } + }, + 'dscp': { + 'type': 'str' + }, + 'fragments': { + 'type': 'str' + }, + 'log': { + 'type': 'str' + }, + 'log_input': { + 'type': 'str' + }, + 'option': { + 'type': 'dict', + 'options': { + 'add_ext': { + 'type': 'bool' + }, + 'any_options': { + 'type': 'bool' + }, + 'com_security': { + 'type': 'bool' + }, + 'dps': { + 'type': 'bool' + }, + 'encode': { + 'type': 'bool' + }, + 'eool': { + 'type': 'bool' + }, + 'ext_ip': { + 'type': 'bool' + }, + 'ext_security': { + 'type': 'bool' + }, + 'finn': { + 'type': 'bool' + }, + 'imitd': { + 'type': 'bool' + }, + 'lsr': { + 'type': 'bool' + }, + 'mtup': { + 'type': 'bool' + }, + 'mtur': { + 'type': 'bool' + }, + 'no_op': { + 'type': 'bool' + }, + 'nsapa': { + 'type': 'bool' + }, + 'record_route': { + 'type': 'bool' + }, + 'router_alert': { + 'type': 'bool' + }, + 'sdb': { + 'type': 'bool' + }, + 'security': { + 'type': 'bool' + }, + 'ssr': { + 'type': 'bool' + }, + 'stream_id': { + 'type': 'bool' + }, + 'timestamp': { + 'type': 'bool' + }, + 'traceroute': { + 'type': 'bool' + }, + 'ump': { + 'type': 'bool' + }, + 'visa': { + 'type': 'bool' + }, + 'zsu': { + 'type': 'bool' + } + } + }, + 'precedence': { + 'type': 'int' + }, + 'time_range': { + 'type': 'str' + }, + 'tos': { + 'type': 'dict', + 'options': { + 'service_value': { + 'type': 'int' + }, + 'max_reliability': { + 'type': 'bool' + }, + 'max_throughput': { + 'type': 'bool' + }, + 'min_delay': { + 'type': 'bool' + }, + 'min_monetary_cost': { + 'type': 'bool' + }, + 'normal': { + 'type': 'bool' + } + } + }, + 'ttl': { + 'type': 'dict', + 'options': { + 'eq': { + 'type': 'int' + }, + 'gt': { + 'type': 'int' + }, + 'lt': { + 'type': 'int' + }, + 'neq': { + 'type': 'int' + }, + 'range': { + 'type': 'dict', + 'options': { + 'start': { + 'type': 'int' + }, + 'end': { + 'type': 'int' + } + } + } + } + }, + } + } + } + }, + }, + 'type': 'list' + }, + 'running_config': { + 'type': 'str' + }, + 'state': { + 'choices': [ + 'merged', 'replaced', 'overridden', 'deleted', 'gathered', + 'rendered', 'parsed' + ], + 'default': + 'merged', + 'type': + 'str' + } + } diff --git a/lib/ansible/module_utils/network/ios/config/acls/__init__.py b/lib/ansible/module_utils/network/ios/config/acls/__init__.py new file mode 100644 index 0000000000..e69de29bb2 --- /dev/null +++ b/lib/ansible/module_utils/network/ios/config/acls/__init__.py diff --git a/lib/ansible/module_utils/network/ios/config/acls/acls.py b/lib/ansible/module_utils/network/ios/config/acls/acls.py new file mode 100644 index 0000000000..2a3f3f244b --- /dev/null +++ b/lib/ansible/module_utils/network/ios/config/acls/acls.py @@ -0,0 +1,717 @@ +# +# -*- coding: utf-8 -*- +# Copyright 2019 Red Hat Inc. +# GNU General Public License v3.0+ (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt) +""" +The ios_acls class +It is in this file where the current configuration (as dict) +is compared to the provided configuration (as dict) and the command set +necessary to bring the current configuration to it's desired end-state is +created +""" + +from __future__ import absolute_import, division, print_function +__metaclass__ = type + +import copy +from ansible.module_utils.network.common.cfg.base import ConfigBase +from ansible.module_utils.network.common.utils import to_list +from ansible.module_utils.network.ios.facts.facts import Facts +from ansible.module_utils.six import iteritems +from ansible.module_utils.network.common.utils import remove_empties +from ansible.module_utils.network.ios.utils.utils import new_dict_to_set + + +class Acls(ConfigBase): + """ + The ios_acls class + """ + + gather_subset = [ + '!all', + '!min', + ] + + gather_network_resources = [ + 'acls', + ] + + def __init__(self, module): + super(Acls, self).__init__(module) + + def get_acl_facts(self, data=None): + """ Get the 'facts' (the current configuration) + + :rtype: A dictionary + :returns: The current configuration as a dictionary + """ + facts, _warnings = Facts(self._module).get_facts(self.gather_subset, self.gather_network_resources, data=data) + acl_facts = facts['ansible_network_resources'].get('acls') + if not acl_facts: + return [] + + return acl_facts + + def execute_module(self): + """ Execute the module + + :rtype: A dictionary + :returns: The result from moduel execution + """ + result = {'changed': False} + commands = list() + warnings = list() + + if self.state in self.ACTION_STATES: + existing_acl_facts = self.get_acl_facts() + else: + existing_acl_facts = [] + + if self.state in self.ACTION_STATES or self.state == 'rendered': + commands.extend(self.set_config(existing_acl_facts)) + + if commands and self.state in self.ACTION_STATES: + if not self._module.check_mode: + self._connection.edit_config(commands) + result['changed'] = True + + if self.state in self.ACTION_STATES: + result['commands'] = commands + + if self.state in self.ACTION_STATES or self.state == 'gathered': + changed_acl_facts = self.get_acl_facts() + elif self.state == 'rendered': + result['rendered'] = commands + elif self.state == 'parsed': + running_config = self._module.params['running_config'] + if not running_config: + self._module.fail_json(msg="value of running_config parameter must not be empty for state parsed") + result['parsed'] = self.get_acl_facts(data=running_config) + else: + changed_acl_facts = [] + + if self.state in self.ACTION_STATES: + result['before'] = existing_acl_facts + if result['changed']: + result['after'] = changed_acl_facts + elif self.state == 'gathered': + result['gathered'] = changed_acl_facts + + result['warnings'] = warnings + + return result + + def set_config(self, existing_acl_facts): + """ Collect the configuration from the args passed to the module, + collect the current configuration (as a dict from facts) + + :rtype: A list + :returns: the commands necessary to migrate the current configuration + to the deisred configuration + """ + want = self._module.params['config'] + have = existing_acl_facts + resp = self.set_state(want, have) + return to_list(resp) + + def set_state(self, want, have): + """ Select the appropriate function based on the state provided + + :param want: the desired configuration as a dictionary + :param have: the current configuration as a dictionary + :rtype: A list + :returns: the commands necessary to migrate the current configuration + to the deisred configuration + """ + commands = [] + + state = self._module.params['state'] + if state in ('overridden', 'merged', 'replaced', 'rendered') and not want: + self._module.fail_json(msg='value of config parameter must not be empty for state {0}'.format(state)) + + if state == 'overridden': + commands = self._state_overridden(want, have) + elif state == 'deleted': + commands = self._state_deleted(want, have) + elif state == 'merged' or state == 'rendered': + commands = self._state_merged(want, have) + elif state == 'replaced': + commands = self._state_replaced(want, have) + + return commands + + def _state_replaced(self, want, have): + """ The command generator when state is replaced + + :param want: the desired configuration as a dictionary + :param have: the current configuration as a dictionary + :rtype: A list + :returns: the commands necessary to migrate the current configuration + to the deisred configuration + """ + commands = [] + + for config_want in want: + for acls_want in config_want.get('acls'): + for ace_want in acls_want.get('aces'): + check = False + for config_have in have: + for acls_have in config_have.get('acls'): + for ace_have in acls_have.get('aces'): + if acls_want.get('name') == acls_have.get('name'): + ace_want = remove_empties(ace_want) + acls_want = remove_empties(acls_want) + cmd, change = self._set_config(ace_want, + ace_have, + acls_want, + config_want['afi']) + if cmd: + for temp_acls_have in config_have.get('acls'): + for temp_ace_have in temp_acls_have.get('aces'): + if acls_want.get('name') == temp_acls_have.get('name'): + commands.extend( + self._clear_config(temp_acls_have, + config_have, + temp_ace_have.get('sequence'))) + commands.extend(cmd) + check = True + if check: + break + if check: + break + if not check: + # For configuring any non-existing want config + ace_want = remove_empties(ace_want) + cmd, change = self._set_config(ace_want, + {}, + acls_want, + config_want['afi']) + commands.extend(cmd) + # Split and arrange the config commands + commands = self.split_set_cmd(commands) + + return commands + + def _state_overridden(self, want, have): + """ The command generator when state is overridden + :param want: the desired configuration as a dictionary + :param have: the current configuration as a dictionary + :rtype: A list + :returns: the commands necessary to migrate the current configuration + to the desired configuration + """ + commands = [] + # Creating a copy of want, so that want dict is intact even after delete operation + # performed during override want n have comparison + temp_want = copy.deepcopy(want) + + for config_have in have: + for acls_have in config_have.get('acls'): + for ace_have in acls_have.get('aces'): + check = False + for config_want in temp_want: + count = 0 + for acls_want in config_want.get('acls'): + for ace_want in acls_want.get('aces'): + if acls_want.get('name') == acls_have.get('name'): + ace_want = remove_empties(ace_want) + acls_want = remove_empties(acls_want) + cmd, change = self._set_config(ace_want, ace_have, acls_want, config_want['afi']) + if cmd: + for temp_acls_have in config_have.get('acls'): + for temp_ace_have in temp_acls_have.get('aces'): + if acls_want.get('name') == temp_acls_have.get('name'): + commands.extend( + self._clear_config(temp_acls_have, + config_have, + temp_ace_have.get('sequence'))) + commands.extend(cmd) + check = True + if check: + del config_want.get('acls')[count] + else: + count += 1 + if check: + break + if check: + break + if not check: + # Delete the config not present in want config + commands.extend(self._clear_config(acls_have, config_have)) + + # For configuring any non-existing want config + for config_want in temp_want: + for acls_want in config_want.get('acls'): + for ace_want in acls_want.get('aces'): + ace_want = remove_empties(ace_want) + cmd, change = self._set_config(ace_want, + {}, + acls_want, + config_want['afi']) + commands.extend(cmd) + + # Split and arrange the config commands + commands = self.split_set_cmd(commands) + # Arranging the cmds suct that all delete cmds are fired before all set cmds + negate_commands = [each for each in commands if 'no' in each and 'access-list' in each] + negate_commands.extend([each for each in commands if each not in negate_commands]) + commands = negate_commands + + return commands + + def _state_merged(self, want, have): + """ The command generator when state is merged + + :param want: the additive configuration as a dictionary + :param have: the current configuration as a dictionary + :rtype: A list + :returns: the commands necessary to merge the provided into + the current configuration + """ + commands = [] + + for config_want in want: + for acls_want in config_want.get('acls'): + for ace_want in acls_want.get('aces'): + check = False + for config_have in have: + for acls_have in config_have.get('acls'): + for ace_have in acls_have.get('aces'): + if acls_want.get('name') == acls_have.get('name') and \ + ace_want.get('sequence') == ace_have.get('sequence'): + ace_want = remove_empties(ace_want) + cmd, change = self._set_config(ace_want, + ace_have, + acls_want, + config_want['afi']) + # clear config will be fired only when there's command wrt to config + if config_want.get('afi') == 'ipv4' and change: + # for ipv4 only inplace update cannot be done, so deleting the sequence ace + # and then updating the want ace changes + commands.extend(self._clear_config(acls_want, + config_want, + ace_want.get('sequence'))) + commands.extend(cmd) + check = True + elif acls_want.get('name') == acls_have.get('name'): + ace_want = remove_empties(ace_want) + cmd, check = self.common_condition_check(ace_want, + ace_have, + acls_want, + config_want, + check, + acls_have) + if acls_have.get('acl_type') == 'standard': + check = True + commands.extend(cmd) + if check: + break + if check: + break + if not check: + # For configuring any non-existing want config + ace_want = remove_empties(ace_want) + cmd, change = self._set_config(ace_want, + {}, + acls_want, + config_want['afi']) + commands.extend(cmd) + # Split and arrange the config commands + commands = self.split_set_cmd(commands) + + return commands + + def _state_deleted(self, want, have): + """ The command generator when state is deleted + + :param want: the objects from which the configuration should be removed + :param have: the current configuration as a dictionary + :rtype: A list + :returns: the commands necessary to remove the current configuration + of the provided objects + """ + commands = [] + if want: + for config_want in want: + if config_want.get('acls'): + for acls_want in config_want.get('acls'): + if acls_want.get('aces'): + for ace_want in acls_want.get('aces'): + for config_have in have: + for acls_have in config_have.get('acls'): + if acls_want.get('name') == acls_have.get('name'): + if ace_want.get('sequence'): + commands.extend(self._clear_config(acls_want, + config_want, + ace_want.get('sequence'))) + else: + commands.extend(self._clear_config(acls_want, + config_want)) + else: + for config_have in have: + for acls_have in config_have.get('acls'): + if acls_want.get('name') == acls_have.get('name'): + commands.extend(self._clear_config(acls_want, + config_want)) + else: + afi_want = config_want.get('afi') + for config_have in have: + if config_have.get('afi') == afi_want: + for acls_have in config_have.get('acls'): + commands.extend(self._clear_config(acls_have, config_want)) + # Split and arrange the config commands + commands = self.split_set_cmd(commands) + else: + for config_have in have: + for acls_have in config_have.get('acls'): + commands.extend(self._clear_config(acls_have, config_have)) + + return commands + + def common_condition_check(self, want, have, acls_want, config_want, check, state='', acls_have=None): + """ The command formatter from the generated command + :param want: want config + :param have: have config + :param acls_want: acls want config + :param config_want: want config list + :param check: for same acls in want and have config, check=True + :param state: operation state + :rtype: A list + :returns: commands generated from want n have config diff + """ + commands = [] + + if want.get('source') and want.get('destination') and have.get('source') and have.get('destination'): + if want.get('destination') and have.get('destination') or \ + want.get('source').get('address') and have.get('source'): + if want.get('destination').get('address') == \ + have.get('destination').get('address') and \ + want.get('source').get('address') == \ + have.get('source').get('address'): + cmd, change = self._set_config(want, + have, + acls_want, + config_want['afi']) + commands.extend(cmd) + check = True + if commands: + if state == 'replaced' or state == 'overridden': + commands.extend(self._clear_config(acls_want, config_want)) + elif want.get('destination').get('any') == \ + have.get('destination').get('any') and \ + want.get('source').get('address') == \ + have.get('source').get('address') and \ + want.get('destination').get('any'): + cmd, change = self._set_config(want, + have, + acls_want, + config_want['afi']) + commands.extend(cmd) + check = True + if commands: + if state == 'replaced' or state == 'overridden': + commands.extend(self._clear_config(acls_want, config_want)) + elif want.get('destination').get('address') == \ + have.get('destination').get('address') and \ + want.get('source').get('any') == have.get('source').get('any') and \ + want.get('source').get('any'): + cmd, change = self._set_config(want, + have, + acls_want, + config_want['afi']) + commands.extend(cmd) + check = True + if commands: + if state == 'replaced' or state == 'overridden': + commands.extend(self._clear_config(acls_want, config_want)) + elif want.get('destination').get('any') == \ + have.get('destination').get('any') and \ + want.get('source').get('any') == have.get('source').get('any') and \ + want.get('destination').get('any'): + cmd, change = self._set_config(want, + have, + acls_want, + config_want['afi']) + commands.extend(cmd) + check = True + if commands: + if state == 'replaced' or state == 'overridden': + commands.extend(self._clear_config(acls_want, config_want)) + elif acls_have and acls_have.get('acl_type') == 'standard': + check = True + if want.get('source') == have.get('source'): + cmd, change = self._set_config(want, + have, + acls_want, + config_want['afi']) + commands.extend(cmd) + + return commands, check + + def split_set_cmd(self, cmds): + """ The command formatter from the generated command + :param cmds: generated command + :rtype: A list + :returns: the formatted commands which is compliant and + actually fired on the device + """ + command = [] + + def common_code(access_grant, cmd, command): + cmd = cmd.split(access_grant) + access_list = cmd[0].strip(' ') + if access_list not in command: + command.append(access_list) + command_items = len(command) + # get the last index of the list and push the trimmed cmd at the end of list + index = command.index(access_list) + (command_items - command.index(access_list)) + cmd = access_grant + cmd[1] + command.insert(index + 1, cmd) + + def sequence_common_code(sequence_index, each_list, command): + # Command to split + def join_list_to_str(temp_list, cmd=''): + for item in temp_list: + cmd += item + cmd += ' ' + return cmd + + temp_list = each_list[:sequence_index] + cmd = join_list_to_str(temp_list).rstrip(' ') + if cmd not in command: + command.append(cmd) + temp_list = each_list[sequence_index:] + cmd = join_list_to_str(temp_list).rstrip(' ') + command.append(cmd) + + def grant_common_code(cmd_list, grant_type, command): + index = cmd_list.index(grant_type) + if 'extended' in each_list: + if cmd_list.index('extended') == (index - 2): + common_code(grant_type, each, command) + else: + sequence_common_code((index - 1), each_list, command) + elif 'standard' in each_list: + if cmd_list.index('standard') == (index - 2): + common_code(grant_type, each, command) + else: + sequence_common_code((index - 1), each_list, command) + elif 'ipv6' in each_list: + if 'sequence' in each_list: + sequence_index = each_list.index('sequence') + sequence_common_code(sequence_index, each_list, command) + else: + common_code(grant_type, each, command) + return command + + for each in cmds: + each_list = each.split(' ') + if 'no' in each: + if each_list.index('no') == 0: + command.append(each) + else: + common_code('no', each, command) + if 'deny' in each: + grant_common_code(each_list, 'deny', command) + if 'permit' in each: + grant_common_code(each_list, 'permit', command) + + return command + + def source_dest_config(self, config, cmd, protocol_option): + """ Function to populate source/destination address and port protocol options + :param config: want and have diff config + :param cmd: source/destination command + :param protocol_option: source/destination protocol option + :rtype: A list + :returns: the commands generated based on input source/destination params + """ + if 'ipv6' in cmd: + address = config.get('address') + host = config.get('host') + if (address and '::' not in address) or (host and '::' not in host): + self._module.fail_json(msg='Incorrect IPV6 address!') + else: + address = config.get('address') + wildcard = config.get('wildcard_bits') + host = config.get('host') + any = config.get('any') + if 'standard' in cmd and address and not wildcard: + cmd = cmd + ' {0}'.format(address) + elif address and wildcard: + cmd = cmd + ' {0} {1}'.format(address, wildcard) + elif host: + cmd = cmd + ' host {0}'.format(host) + if any: + cmd = cmd + ' {0}'.format('any') + port_protocol = config.get('port_protocol') + if port_protocol and (protocol_option.get('tcp') or protocol_option.get('udp')): + cmd = cmd + ' {0} {1}'.format(list(port_protocol)[0], list(port_protocol.values())[0]) + elif port_protocol and not (protocol_option.get('tcp') or protocol_option.get('udp')): + self._module.fail_json(msg='Port Protocol option is valid only with TCP/UDP Protocol option!') + + return cmd + + def _set_config(self, want, have, acl_want, afi): + """ Function that sets the acls config based on the want and have config + :param want: want config + :param have: have config + :param acl_want: want acls config + :param afi: acls afi type + :rtype: A list + :returns: the commands generated based on input want/have params + """ + commands = [] + change = False + want_set = set() + have_set = set() + # Convert the want and have dict to its respective set for taking the set diff + new_dict_to_set(want, [], want_set) + new_dict_to_set(have, [], have_set) + diff = want_set - have_set + + # Populate the config only when there's a diff b/w want and have config + if diff: + name = acl_want.get('name') + if afi == 'ipv4': + try: + name = int(name) + # If name is numbered acls + if name <= 99: + cmd = 'ip access-list standard {0}'.format(name) + elif name >= 100: + cmd = 'ip access-list extended {0}'.format(name) + except ValueError: + # If name is named acls + acl_type = acl_want.get('acl_type') + if acl_type: + cmd = 'ip access-list {0} {1}'.format(acl_type, name) + else: + self._module.fail_json(msg='ACL type value is required for Named ACL!') + + elif afi == 'ipv6': + cmd = 'ipv6 access-list {0}'.format(name) + + # Get all of aces option values from diff dict + sequence = want.get('sequence') + grant = want.get('grant') + source = want.get('source') + destination = want.get('destination') + po = want.get('protocol_options') + protocol = want.get('protocol') + dscp = want.get('dscp') + fragments = want.get('fragments') + log = want.get('log') + log_input = want.get('log_input') + option = want.get('option') + precedence = want.get('precedence') + time_range = want.get('time_range') + tos = want.get('tos') + ttl = want.get('ttl') + + if sequence: + if afi == 'ipv6': + cmd = cmd + ' sequence {0}'.format(sequence) + else: + cmd = cmd + ' {0}'.format(sequence) + if grant: + cmd = cmd + ' {0}'.format(grant) + if po and isinstance(po, dict): + po_key = list(po)[0] + if protocol and protocol != po_key: + self._module.fail_json(msg='Protocol value cannot be different from Protocol option protocol value!') + cmd = cmd + ' {0}'.format(po_key) + if po.get('icmp'): + po_val = po.get('icmp') + elif po.get('igmp'): + po_val = po.get('igmp') + elif po.get('tcp'): + po_val = po.get('tcp') + elif protocol: + cmd = cmd + ' {0}'.format(protocol) + if source: + cmd = self.source_dest_config(source, cmd, po) + if destination: + cmd = self.source_dest_config(destination, cmd, po) + if po: + cmd = cmd + ' {0}'.format(list(po_val)[0]) + if dscp: + cmd = cmd + ' dscp {0}'.format(dscp) + if fragments: + cmd = cmd + ' fragments {0}'.format(fragments) + if log: + cmd = cmd + ' log {0}'.format(log) + if log_input: + cmd = cmd + ' log-input {0}'.format(log_input) + if option: + cmd = cmd + ' option {0}'.format(list(option)[0]) + if precedence: + cmd = cmd + ' precedence {0}'.format(precedence) + if time_range: + cmd = cmd + ' time-range {0}'.format(time_range) + if tos: + for k, v in iteritems(tos): + if k == 'service_value': + cmd = cmd + ' tos {0}'.format(v) + else: + cmd = cmd + ' tos {0}'.format(v) + if ttl: + for k, v in iteritems(ttl): + if k == 'range' and v: + start = v.get('start') + end = v.get('start') + cmd = cmd + ' ttl {0} {1}'.format(start, end) + elif v: + cmd = cmd + ' ttl {0} {1}'.format(k, v) + + commands.append(cmd) + if commands: + change = True + + return commands, change + + def _clear_config(self, acls, config, sequence=''): + """ Function that deletes the acls config based on the want and have config + :param acls: acls config + :param config: config + :rtype: A list + :returns: the commands generated based on input acls/config params + """ + commands = [] + afi = config.get('afi') + name = acls.get('name') + if afi == 'ipv4' and name: + try: + name = int(name) + if name <= 99 and not sequence: + cmd = 'no ip access-list standard {0}'.format(name) + elif name >= 100 and not sequence: + cmd = 'no ip access-list extended {0}'.format(name) + elif sequence: + if name <= 99: + cmd = 'ip access-list standard {0} '.format(name) + elif name >= 100: + cmd = 'ip access-list extended {0} '.format(name) + cmd += 'no {0}'.format(sequence) + except ValueError: + acl_type = acls.get('acl_type') + if acl_type == 'extended' and not sequence: + cmd = 'no ip access-list extended {0}'.format(name) + elif acl_type == 'standard' and not sequence: + cmd = 'no ip access-list standard {0}'.format(name) + elif sequence: + if acl_type == 'extended': + cmd = 'ip access-list extended {0} '.format(name) + elif acl_type == 'standard': + cmd = 'ip access-list standard {0}'.format(name) + cmd += 'no {0}'.format(sequence) + else: + self._module.fail_json(msg="ACL type value is required for Named ACL!") + elif afi == 'ipv6' and name: + if sequence: + cmd = 'no sequence {0}'.format(sequence) + else: + cmd = 'no ipv6 access-list {0}'.format(name) + commands.append(cmd) + + return commands diff --git a/lib/ansible/module_utils/network/ios/facts/acls/__init__.py b/lib/ansible/module_utils/network/ios/facts/acls/__init__.py new file mode 100644 index 0000000000..e69de29bb2 --- /dev/null +++ b/lib/ansible/module_utils/network/ios/facts/acls/__init__.py diff --git a/lib/ansible/module_utils/network/ios/facts/acls/acls.py b/lib/ansible/module_utils/network/ios/facts/acls/acls.py new file mode 100644 index 0000000000..3b99a18f5c --- /dev/null +++ b/lib/ansible/module_utils/network/ios/facts/acls/acls.py @@ -0,0 +1,498 @@ +# +# -*- coding: utf-8 -*- +# Copyright 2019 Red Hat +# GNU General Public License v3.0+ +# (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt) +""" +The ios_acls fact class +It is in this file the configuration is collected from the device +for a given resource, parsed, and the facts tree is populated +based on the configuration. +""" + +from __future__ import absolute_import, division, print_function +__metaclass__ = type + + +from copy import deepcopy +import re +from ansible.module_utils.network.common import utils +from ansible.module_utils.network.ios.utils.utils import check_n_return_valid_ipv6_addr +from ansible.module_utils.network.ios.argspec.acls.acls import AclsArgs + + +class AclsFacts(object): + """ The ios_acls fact class + """ + + def __init__(self, module, subspec='config', options='options'): + + self._module = module + self.argument_spec = AclsArgs.argument_spec + spec = deepcopy(self.argument_spec) + if subspec: + if options: + facts_argument_spec = spec[subspec][options] + else: + facts_argument_spec = spec[subspec] + else: + facts_argument_spec = spec + + self.generated_spec = utils.generate_dict(facts_argument_spec) + + def get_acl_data(self, connection): + # Get the access-lists from the ios router + return connection.get('sh access-list') + + def populate_facts(self, connection, ansible_facts, data=None): + """ Populate the facts for acls + :param connection: the device connection + :param ansible_facts: Facts dictionary + :param data: previously collected conf + :rtype: dictionary + :returns: facts + """ + + if not data: + data = self.get_acl_data(connection) + # operate on a collection of resource x + config = data.split('\n') + spec = {'acls': list(), 'afi': None} + if config: + objs = self.render_config(spec, config) + # check if rendered config list has only empty dict + if len(objs) == 1 and objs[0] == {}: + objs = [] + facts = {} + + if objs: + facts['acls'] = [] + params = utils.validate_config(self.argument_spec, {'config': objs}) + for cfg in params['config']: + facts['acls'].append(utils.remove_empties(cfg)) + ansible_facts['ansible_network_resources'].update(facts) + + return ansible_facts + + def create_config_dict(self, config): + """ Function that parse the acls config and convert to module usable config + :param config: config + :rtype: A dict + :returns: the config generated based on have config params + """ + conf = {} + temp_list = [] + access_list_name = '' + count = 0 + if len(config) >= 1 and config[0] != '': + for each in config: + if 'access-list' in each: + temp = each.split('access-list ')[1].split(' ')[0] + if temp == 'extended' or temp == 'standard': + temp = each.split('access-list ')[1] + if not access_list_name: + access_list_name = temp + if 'access-list' not in each: + if 'extended' in temp or 'standard' in temp: + temp_list.append('ipv4 access-list ' + temp + each) + else: + temp_list.append('ipv6 access-list ' + temp + each) + if temp == access_list_name and 'access-list' in each and \ + not ('extended' in access_list_name or 'standard' in access_list_name): + temp_list.append(each) + elif temp != access_list_name: + conf[access_list_name] = temp_list + temp_list = list() + if 'permit' in each or 'deny' in each: + temp_list.append(each) + access_list_name = temp + count += 1 + if len(config) == count: + conf[access_list_name] = temp_list + temp_list = [] + return conf + + def populate_port_protocol(self, source, destination, each_list): + """ Function Populates port portocol wrt to source and destination + :param acls: source config + :param config: destination config + :param each_list: config + :rtype: A list + :returns: the commands generated based on source and destination params + """ + operators = ['eq', 'gt', 'lt', 'neq', 'range'] + for item in operators: + if item in each_list: + index = each_list.index(item) + if source.get('address') or source.get('any') or source.get('host') and not source.get('port_protocol'): + try: + source_index = each_list.index(source.get('address')) + except ValueError: + try: + source_index = each_list.index('any') + except ValueError: + source_index = each_list.index('host') + if source.get('address'): + if (source_index + 2) == index and 'ipv6' not in each_list: + source['port_protocol'] = {item: each_list[index + 1]} + each_list.remove(item) + del each_list[index] + elif (source_index + 1) == index and 'ipv6' in each_list: + source['port_protocol'] = {item: each_list[index + 1]} + each_list.remove(item) + del each_list[source_index] + del each_list[index - 1] + elif source.get('any'): + if (source_index + 1) == index: + source['port_protocol'] = {item: each_list[index + 1]} + each_list.remove(item) + del each_list[index - 1] + del each_list[source_index] + elif source.get('host'): + if (source_index + 1) == index: + source['port_protocol'] = {item: each_list[index + 1]} + each_list.remove(item) + del each_list[index - 1] + del each_list[source_index] + if destination.get('address') or destination.get('any') or destination.get('host'): + try: + destination_index = each_list.index(destination.get('address')) + except ValueError: + try: + destination_index = each_list.index('any') + except ValueError: + destination_index = each_list.index('host') + 1 + index -= 1 + if (destination_index + 1) == index or (destination_index + 2) == index: + destination['port_protocol'] = {item: each_list[index + 1]} + each_list.remove(item) + del each_list[index] + break + if 'eq' in each_list or 'gt' in each_list or 'lt' in each_list or 'neq' in each_list or 'range' in each_list: + self.populate_port_protocol(source, destination, each_list) + + def populate_source_destination(self, each, config, source, destination): + any = [] + if 'any' in each: + any = re.findall('any', each) + if len(any) == 2: + source['any'] = True + destination['any'] = True + elif 'host' in each: + host = re.findall('host', each) + each = each.split(' ') + if len(host) == 2: + host_index = each.index('host') + source['host'] = each[host_index + 1] + del each[host_index] + host_index = each.index('host') + destination['host'] = each[host_index + 1] + else: + ip_n_wildcard_bits = re.findall(r'[0-9]+(?:\.[0-9]+){3}', each) + ip_index = None + if ip_n_wildcard_bits: + ip_index = each.index(ip_n_wildcard_bits[0]) + host_index = each.index('host') + if ip_index: + if host_index < ip_index: + source['host'] = each(host_index + 1) + destination['address'] = ip_n_wildcard_bits[0] + destination['wildcard_bits'] = ip_n_wildcard_bits[1] + elif host_index > ip_index: + destination['host'] = each(host_index + 1) + source['address'] = ip_n_wildcard_bits[0] + source['wildcard_bits'] = ip_n_wildcard_bits[1] + else: + if config['afi'] == 'ipv4': + ip_n_wildcard_bits = re.findall(r'[0-9]+(?:\.[0-9]+){3}', each) + each = each.split(' ') + if len(ip_n_wildcard_bits) == 0 and len(any) == 1: + source['any'] = True + elif len(ip_n_wildcard_bits) == 1: + source['address'] = ip_n_wildcard_bits[0] + elif len(ip_n_wildcard_bits) == 2: + if 'any' in each: + if each.index('any') > each.index(ip_n_wildcard_bits[0]): + source['address'] = ip_n_wildcard_bits[0] + source['wildcard_bits'] = ip_n_wildcard_bits[1] + destination['any'] = True + elif each.index('any') < each.index(ip_n_wildcard_bits[0]): + source['any'] = True + destination['address'] = ip_n_wildcard_bits[0] + destination['wildcard_bits'] = ip_n_wildcard_bits[1] + else: + source['address'] = ip_n_wildcard_bits[0] + source['wildcard_bits'] = ip_n_wildcard_bits[1] + elif len(ip_n_wildcard_bits) == 4: + source['address'] = ip_n_wildcard_bits[0] + source['wildcard_bits'] = ip_n_wildcard_bits[1] + destination['address'] = ip_n_wildcard_bits[2] + destination['wildcard_bits'] = ip_n_wildcard_bits[3] + elif config['afi'] == 'ipv6': + temp_ipv6 = [] + each = each.split(' ') + check_n_return_valid_ipv6_addr(self._module, each, temp_ipv6) + count = 0 + for every in each: + if len(temp_ipv6) == 2: + if temp_ipv6[0] in every or temp_ipv6[1] in every: + temp_ipv6[count] = every + count += 1 + elif len(temp_ipv6) == 1: + if temp_ipv6[0] in every: + temp_ipv6[count] = every + if 'any' in each: + if each.index('any') > each.index(temp_ipv6[0]): + source['address'] = temp_ipv6[0] + destination['any'] = True + elif each.index('any') < each.index(temp_ipv6[0]): + source['any'] = True + destination['address'] = temp_ipv6[0] + elif len(temp_ipv6) == 2: + source['address'] = temp_ipv6[0] + destination['address'] = temp_ipv6[1] + + def parsed_config_facts(self, have_config): + """ + For parsed config have_config is string of commands which + need to be splitted before passing it through render_config + from spec for null values + :param have_config: The configuration + :rtype: list of have config + :returns: The splitted generated config + """ + split_config = re.split('ip|ipv6 access-list', have_config[0]) + temp_config = [] + + # common piece of code for populating the temp_config list + def common_config_code(each, grant, temp_config): + temp = re.split(grant, each) + temp_config.append(temp[0]) + temp_config.extend([grant + item for item in temp if 'access-list' not in item]) + + for each in split_config: + if 'v6' in each: + each = 'ipv6 ' + each.split('v6 ')[1] + if 'permit' in each: + common_config_code(each, 'permit', temp_config) + elif 'deny' in each: + common_config_code(each, 'deny', temp_config) + else: + each = 'ip' + each + if 'permit' in each: + common_config_code(each, 'permit', temp_config) + if 'deny' in each: + common_config_code(each, 'deny', temp_config) + return temp_config + + def render_config(self, spec, have_config): + """ + Render config as dictionary structure and delete keys + from spec for null values + :param spec: The facts tree, generated from the argspec + :param conf: The configuration + :rtype: dictionary + :returns: The generated config + """ + + # for parsed scnenario where commands are passed to generate the acls facts + if len(have_config) == 1: + have_config = self.parsed_config_facts(have_config) + + config = deepcopy(spec) + render_config = list() + acls = dict() + aces = list() + temp_name = '' + for each in have_config: + each_list = [val for val in each.split(' ') if val != ''] + if 'IPv6' in each or 'ipv6' in each: + if aces: + config['acls'].append(acls) + ip_config = config + if ip_config.get('acls'): + render_config.append(ip_config) + if not config['afi'] or config['afi'] == 'ipv4': + config = deepcopy(spec) + config['afi'] = 'ipv6' + acls = dict() + aces = list() + elif not config['afi'] and ('IP' in each or 'ip' in each): + config['afi'] = 'ipv4' + if 'access list' in each or 'access-list' in each: + try: + temp_index = each_list.index('list') + name = (each_list[temp_index + 1]) + except ValueError: + name = each_list[-1] + if temp_name != name: + if aces: + config['acls'].append(acls) + acls = dict() + aces = list() + temp_name = name + acls['name'] = name + if 'Extended' in each: + acls['acl_type'] = 'extended' + continue + elif 'Standard' in each: + acls['acl_type'] = 'standard' + continue + ace_options = {} + try: + if config['afi'] == 'ipv4': + if 'deny' in each_list or 'permit' in each_list: + ace_options['sequence'] = int(each_list[0]) + elif config['afi'] == 'ipv6': + if 'sequence' in each_list: + ace_options['sequence'] = int(each_list[each_list.index('sequence') + 1]) + except ValueError: + pass + if utils.parse_conf_arg(each, 'permit'): + ace_options['grant'] = 'permit' + each_list.remove('permit') + elif utils.parse_conf_arg(each, 'deny'): + ace_options['grant'] = 'deny' + each_list.remove('deny') + + protocol_option = ['ahp', 'eigrp', 'esp', 'gre', 'hbh', 'icmp', 'igmp', 'ip', 'ipv6', 'ipinip', 'nos', + 'ospf', 'pcp', 'pim', 'sctp', 'tcp', 'udp'] + tcp_flags = ['ack', 'established', 'fin', 'psh', 'rst', 'syn', 'urg'] + icmp_options = ['administratively_prohibited', 'alternate_address', 'conversion_error', + 'dod_host_prohibited', 'dod_net_prohibited', 'echo', 'echo_reply', + 'general_parameter_problem', 'host_isolated', 'host_precedence_unreachable', + 'host_redirect', 'host_tos_redirect', 'host_tos_unreachable', 'host_unknown', + 'host_unreachable', 'information_reply', 'information_request', 'mask_reply', + 'mask_request', 'mobile_redirect', 'net_redirect', 'net_tos_redirect', + 'net_tos_unreachable', 'net_unreachable', 'network_unknown', 'no_room_for_option', + 'option_missing', 'packet_too_big', 'parameter_problem', 'port_unreachable', + 'precedence_unreachable', 'protocol_unreachable', 'reassembly_timeout', 'redirect', + 'router_advertisement', 'router_solicitation', 'source_quench', 'source_route_failed', + 'time_exceeded', 'timestamp_reply', 'timestamp_request', 'traceroute', 'ttl_exceeded', + 'unreachable'] + igmp_options = ['dvmrp', 'host_query', 'mtrace_resp', 'mtrace_route', 'pim', 'trace', 'v1host_report', + 'v2host_report', 'v2leave_group', 'v3host_report'] + + temp_option = '' + for option in protocol_option: + if option in each_list and 'access' not in each_list[each_list.index(option) + 1]: + temp_option = option + each_list.remove(temp_option) + if temp_option == 'tcp': + temp_flag = [each_flag for each_flag in tcp_flags if each_flag in each] + if temp_flag: + flag = temp_flag[0] + if flag in each_list: + each_list.remove(flag) + temp_flag = flag + if temp_option == 'icmp': + temp_flag = [each_option for each_option in icmp_options if each_option in each] + if temp_flag: + flag = temp_flag[0] + if flag in each_list: + each_list.remove(flag) + temp_flag = flag + if temp_option == 'igmp': + temp_flag = [each_option for each_option in igmp_options if each_option in each] + if temp_flag: + flag = temp_flag[0] + if flag in each_list: + each_list.remove(flag) + temp_flag = flag + break + + dscp = utils.parse_conf_arg(each, 'dscp') + if dscp: + ace_options['dscp'] = dscp.split(' ')[0] + fragments = utils.parse_conf_arg(each, 'fragments') + if fragments: + ace_options['fragments'] = fragments.split(' ')[0] + log = utils.parse_conf_arg(each, 'log') + if log: + ace_options['log'] = log.split(' ')[0] + log_input = utils.parse_conf_arg(each, 'log_input') + if log_input: + ace_options['log_input'] = log_input.split(' ')[0] + option = utils.parse_conf_arg(each, 'option') + if option: + option = option.split(' ')[0] + option_dict = {} + option_dict[option] = True + ace_options['option'] = option_dict + precedence = utils.parse_conf_arg(each, 'precedence') + if precedence: + ace_options['precedence'] = precedence.split(' ')[0] + time_range = utils.parse_conf_arg(each, 'time_range') + if time_range: + ace_options['time_range'] = time_range.split(' ')[0] + tos = utils.parse_conf_arg(each, 'tos') + if tos: + tos_val = dict() + try: + tos_val['service_value'] = int(tos) + except ValueError: + tos = tos.replace('-', '_') + tos_val[tos] = True + ace_options['tos'] = tos_val + ttl = utils.parse_conf_arg(each, 'ttl') + if ttl: + temp_ttl = ttl.split(' ') + ttl = {} + ttl[temp_ttl[0]] = temp_ttl[1] + each_list = [item for item in each_list[:each_list.index('ttl')]] + ace_options['ttl'] = ttl + + source = {} + destination = {} + self.populate_source_destination(each, config, source, destination) + + if source.get('address') and source.get('address') == destination.get('address'): + self._module.fail_json(msg='Source and Destination address cannot be same!') + else: + self.populate_port_protocol(source, destination, each_list) + + if source: + ace_options['source'] = source + if destination: + ace_options['destination'] = destination + if temp_option: + protocol_options = {} + ace_options['protocol'] = temp_option + if temp_option == 'tcp': + tcp = {} + if temp_flag: + tcp[temp_flag] = True + else: + tcp['set'] = True + protocol_options[temp_option] = tcp + elif temp_option == 'icmp': + icmp = dict() + if temp_flag: + icmp[temp_flag] = True + else: + icmp['set'] = True + protocol_options[temp_option] = icmp + elif temp_option == 'igmp': + igmp = dict() + if temp_flag: + igmp[temp_flag] = True + else: + igmp['set'] = True + protocol_options[temp_option] = igmp + else: + protocol_options[temp_option] = True + ace_options['protocol_options'] = protocol_options + if ace_options: + aces.append(ace_options) + acls['aces'] = aces + if acls: + if not config.get('acls'): + config['acls'] = list() + config['acls'].append(acls) + + if config not in render_config: + render_config.append(utils.remove_empties(config)) + # delete the populated config + del config + + return render_config diff --git a/lib/ansible/module_utils/network/ios/facts/facts.py b/lib/ansible/module_utils/network/ios/facts/facts.py index 2a2f539fa1..8d66e87963 100644 --- a/lib/ansible/module_utils/network/ios/facts/facts.py +++ b/lib/ansible/module_utils/network/ios/facts/facts.py @@ -25,6 +25,7 @@ from ansible.module_utils.network.ios.facts.lldp_interfaces.lldp_interfaces impo from ansible.module_utils.network.ios.facts.l3_interfaces.l3_interfaces import L3_InterfacesFacts from ansible.module_utils.network.ios.facts.acl_interfaces.acl_interfaces import Acl_InterfacesFacts from ansible.module_utils.network.ios.facts.static_routes.static_routes import Static_RoutesFacts +from ansible.module_utils.network.ios.facts.acls.acls import AclsFacts from ansible.module_utils.network.ios.facts.legacy.base import Default, Hardware, Interfaces, Config @@ -47,6 +48,7 @@ FACT_RESOURCE_SUBSETS = dict( l3_interfaces=L3_InterfacesFacts, acl_interfaces=Acl_InterfacesFacts, static_routes=Static_RoutesFacts, + acls=AclsFacts, ) diff --git a/lib/ansible/module_utils/network/ios/utils/utils.py b/lib/ansible/module_utils/network/ios/utils/utils.py index 258a116190..cfcfe82dbc 100644 --- a/lib/ansible/module_utils/network/ios/utils/utils.py +++ b/lib/ansible/module_utils/network/ios/utils/utils.py @@ -9,6 +9,7 @@ from __future__ import absolute_import, division, print_function __metaclass__ = type +import socket from ansible.module_utils.six import iteritems from ansible.module_utils.network.common.utils import is_masklen, to_netmask @@ -28,7 +29,22 @@ def add_command_to_config_list(interface, cmd, commands): commands.append(cmd) -def new_dict_to_set(input_dict, temp_list, test_set, count): +def check_n_return_valid_ipv6_addr(module, input_list, filtered_ipv6_list): + # To verify the valid ipv6 address + try: + for each in input_list: + if '::' in each: + if '/' in each: + each = each.split('/')[0] + if socket.inet_pton(socket.AF_INET6, each): + filtered_ipv6_list.append(each) + return filtered_ipv6_list + except socket.error: + module.fail_json(msg='Incorrect IPV6 address!') + + +def new_dict_to_set(input_dict, temp_list, test_set, count=0): + # recursive function to convert input dict to set for comparision test_dict = dict() if isinstance(input_dict, dict): input_dict_len = len(input_dict) @@ -45,9 +61,26 @@ def new_dict_to_set(input_dict, temp_list, test_set, count): else: if v is not None: test_dict.update({k: v}) - if tuple(iteritems(test_dict)) not in test_set and count == input_dict_len: - test_set.add(tuple(iteritems(test_dict))) - count = 0 + try: + if tuple(iteritems(test_dict)) not in test_set and count == input_dict_len: + test_set.add(tuple(iteritems(test_dict))) + count = 0 + except TypeError: + temp_dict = {} + + def expand_dict(dict_to_expand): + temp = dict() + for k, v in iteritems(dict_to_expand): + if isinstance(v, dict): + expand_dict(v) + else: + if v is not None: + temp.update({k: v}) + temp_dict.update(tuple(iteritems(temp))) + new_dict = {k: v} + expand_dict(new_dict) + if tuple(iteritems(temp_dict)) not in test_set: + test_set.add(tuple(iteritems(temp_dict))) def dict_to_set(sample_dict): diff --git a/lib/ansible/modules/network/ios/ios_acls.py b/lib/ansible/modules/network/ios/ios_acls.py new file mode 100644 index 0000000000..a05214d8e1 --- /dev/null +++ b/lib/ansible/modules/network/ios/ios_acls.py @@ -0,0 +1,1417 @@ +#!/usr/bin/python +# -*- coding: utf-8 -*- +# Copyright 2019 Red Hat +# GNU General Public License v3.0+ +# (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt) + +############################################# +# WARNING # +############################################# +# +# This file is auto generated by the resource +# module builder playbook. +# +# Do not edit this file manually. +# +# Changes to this file will be over written +# by the resource module builder. +# +# Changes should be made in the model used to +# generate this file or in the resource module +# builder template. +# +############################################# + +""" +The module file for ios_acls +""" + +from __future__ import absolute_import, division, print_function +__metaclass__ = type + +ANSIBLE_METADATA = {'metadata_version': '1.1', + 'status': ['preview'], + 'supported_by': 'network'} + + +DOCUMENTATION = """ +--- +module: ios_acls +version_added: '2.10' +short_description: Manages named or numbered ACLs on IOS devices. +description: This module configures and manages the named or numbered ACLs on IOS platforms. +author: Sumit Jaiswal (@justjais) +notes: +- Tested against Cisco IOSv Version 15.2 on VIRL +- This module works with connection C(network_cli). + See L(IOS Platform Options,../network/user_guide/platform_ios.html). +options: + config: + description: A dictionary of ACL options. + type: list + elements: dict + suboptions: + afi: + description: + - The Address Family Indicator (AFI) for the Access Control Lists (ACL). + required: true + type: str + choices: + - ipv4 + - ipv6 + acls: + description: + - A list of Access Control Lists (ACL). + type: list + elements: dict + suboptions: + name: + description: The name or the number of the ACL. + required: true + type: str + acl_type: + description: + - ACL type + - Note, it's mandatory and required for Named ACL, but for + Numbered ACL it's not mandatory. + type: str + choices: + - extended + - standard + aces: + description: The entries within the ACL. + elements: dict + type: list + suboptions: + grant: + description: Specify the action. + type: str + choices: + - permit + - deny + sequence: + description: + - Sequence Number for the Access Control Entry(ACE). + - Refer to vendor documentation for valid values. + type: int + protocol: + description: + - Specify the protocol to match. + - Refer to vendor documentation for valid values. + type: str + protocol_options: + description: protocol type. + type: dict + suboptions: + protocol_number: + description: An IP protocol number + type: int + ahp: + description: Authentication Header Protocol. + type: bool + eigrp: + description: Cisco's EIGRP routing protocol. + type: bool + esp: + description: Encapsulation Security Payload. + type: bool + gre: + description: Cisco's GRE tunneling. + type: bool + hbh: + description: Hop by Hop options header. Valid for IPV6 + type: bool + icmp: + description: Internet Control Message Protocol. + type: dict + suboptions: + administratively_prohibited: + description: Administratively prohibited + type: bool + alternate_address: + description: Alternate address + type: bool + conversion_error: + description: Datagram conversion + type: bool + dod_host_prohibited: + description: Host prohibited + type: bool + dod_net_prohibited: + description: Net prohibited + type: bool + echo: + description: Echo (ping) + type: bool + echo_reply: + description: Echo reply + type: bool + general_parameter_problem: + description: Parameter problem + type: bool + host_isolated: + description: Host isolated + type: bool + host_precedence_unreachable: + description: Host unreachable for precedence + type: bool + host_redirect: + description: Host redirect + type: bool + host_tos_redirect: + description: Host redirect for TOS + type: bool + host_tos_unreachable: + description: Host unreachable for TOS + type: bool + host_unknown: + description: Host unknown + type: bool + host_unreachable: + description: Host unreachable + type: bool + information_reply: + description: Information replies + type: bool + information_request: + description: Information requests + type: bool + mask_reply: + description: Mask replies + type: bool + mask_request: + description: mask_request + type: bool + mobile_redirect: + description: Mobile host redirect + type: bool + net_redirect: + description: Network redirect + type: bool + net_tos_redirect: + description: Net redirect for TOS + type: bool + net_tos_unreachable: + description: Network unreachable for TOS + type: bool + net_unreachable: + description: Net unreachable + type: bool + network_unknown: + description: Network unknown + type: bool + no_room_for_option: + description: Parameter required but no room + type: bool + option_missing: + description: Parameter required but not present + type: bool + packet_too_big: + description: Fragmentation needed and DF set + type: bool + parameter_problem: + description: All parameter problems + type: bool + port_unreachable: + description: Port unreachable + type: bool + precedence_unreachable: + description: Precedence cutoff + type: bool + protocol_unreachable: + description: Protocol unreachable + type: bool + reassembly_timeout: + description: Reassembly timeout + type: bool + redirect: + description: All redirects + type: bool + router_advertisement: + description: Router discovery advertisements + type: bool + router_solicitation: + description: Router discovery solicitations + type: bool + source_quench: + description: Source quenches + type: bool + source_route_failed: + description: Source route failed + type: bool + time_exceeded: + description: All time exceededs + type: bool + timestamp_reply: + description: Timestamp replies + type: bool + timestamp_request: + description: Timestamp requests + type: bool + traceroute: + description: Traceroute + type: bool + ttl_exceeded: + description: TTL exceeded + type: bool + unreachable: + description: All unreachables + type: bool + igmp: + description: Internet Gateway Message Protocol. + type: dict + suboptions: + dvmrp: + description: Distance Vector Multicast Routing Protocol(2) + type: bool + host_query: + description: IGMP Membership Query(0) + type: bool + mtrace_resp: + description: Multicast Traceroute Response(7) + type: bool + mtrace_route: + description: Multicast Traceroute(8) + type: bool + pim: + description: Protocol Independent Multicast(3) + type: bool + trace: + description: Multicast trace(4) + type: bool + v1host_report: + description: IGMPv1 Membership Report(1) + type: bool + v2host_report: + description: IGMPv2 Membership Report(5) + type: bool + v2leave_group: + description: IGMPv2 Leave Group(6) + type: bool + v3host_report: + description: IGMPv3 Membership Report(9) + type: bool + ip: + description: Any Internet Protocol. + type: bool + ipv6: + description: Any IPv6. + type: bool + ipinip: + description: IP in IP tunneling. + type: bool + nos: + description: KA9Q NOS compatible IP over IP tunneling. + type: bool + ospf: + description: OSPF routing protocol. + type: bool + pcp: + description: Payload Compression Protocol. + type: bool + pim: + description: Protocol Independent Multicast. + type: bool + sctp: + description: Stream Control Transmission Protocol. + type: bool + udp: + description: User Datagram Protocol. + type: bool + tcp: + description: Match TCP packet flags + type: dict + suboptions: + ack: + description: Match on the ACK bit + type: bool + established: + description: Match established connections + type: bool + fin: + description: Match on the FIN bit + type: bool + psh: + description: Match on the PSH bit + type: bool + rst: + description: Match on the RST bit + type: bool + syn: + description: Match on the SYN bit + type: bool + urg: + description: Match on the URG bit + type: bool + source: + description: Specify the packet source. + type: dict + suboptions: + address: + description: Source network address. + type: str + wildcard_bits: + description: Destination wildcard bits, valid with IPV4 address. + type: str + any: + description: Match any source address. + type: bool + host: + description: A single source host + type: str + port_protocol: + description: + - Specify the destination port along with protocol. + - Note, Valid with TCP/UDP protocol_options + type: dict + suboptions: + eq: + description: Match only packets on a given port number. + type: str + gt: + description: Match only packets with a greater port number. + type: str + lt: + description: Match only packets with a lower port number. + type: str + neq: + description: Match only packets not on a given port number. + type: str + range: + description: Port group. + type: dict + suboptions: + start: + description: Specify the start of the port range. + type: int + end: + description: Specify the end of the port range. + type: int + destination: + description: Specify the packet destination. + type: dict + suboptions: + address: + description: Host address to match, or any single host address. + type: str + wildcard_bits: + description: Destination wildcard bits, valid with IPV4 address. + type: str + any: + description: Match any source address. + type: bool + host: + description: A single destination host + type: str + port_protocol: + description: + - Specify the destination port along with protocol. + - Note, Valid with TCP/UDP protocol_options + type: dict + suboptions: + eq: + description: Match only packets on a given port number. + type: str + gt: + description: Match only packets with a greater port number. + type: str + lt: + description: Match only packets with a lower port number. + type: str + neq: + description: Match only packets not on a given port number. + type: str + range: + description: Port group. + type: dict + suboptions: + start: + description: Specify the start of the port range. + type: int + end: + description: Specify the end of the port range. + type: int + dscp: + description: Match packets with given dscp value. + type: str + fragments: + description: Check non-initial fragments. + type: str + log: + description: Log matches against this entry. + type: str + log_input: + description: Log matches against this entry, including input interface. + type: str + option: + description: + - Match packets with given IP Options value. + - Valid only for named acls. + type: dict + suboptions: + add_ext: + description: Match packets with Address Extension Option (147). + type: bool + any_options: + description: Match packets with ANY Option. + type: bool + com_security: + description: Match packets with Commercial Security Option (134). + type: bool + dps: + description: Match packets with Dynamic Packet State Option (151). + type: bool + encode: + description: Match packets with Encode Option (15). + type: bool + eool: + description: Match packets with End of Options (0). + type: bool + ext_ip: + description: Match packets with Extended IP Option (145). + type: bool + ext_security: + description: Match packets with Extended Security Option (133). + type: bool + finn: + description: Match packets with Experimental Flow Control Option (205). + type: bool + imitd: + description: Match packets with IMI Traffic Desriptor Option (144). + type: bool + lsr: + description: Match packets with Loose Source Route Option (131). + type: bool + mtup: + description: Match packets with MTU Probe Option (11). + type: bool + mtur: + description: Match packets with MTU Reply Option (12). + type: bool + no_op: + description: Match packets with No Operation Option (1). + type: bool + nsapa: + description: Match packets with NSAP Addresses Option (150). + type: bool + record_route: + description: Match packets with Record Route Option (7). + type: bool + router_alert: + description: Match packets with Router Alert Option (148). + type: bool + sdb: + description: Match packets with Selective Directed Broadcast Option (149). + type: bool + security: + description: Match packets with Basic Security Option (130). + type: bool + ssr: + description: Match packets with Strict Source Routing Option (137). + type: bool + stream_id: + description: Match packets with Stream ID Option (136). + type: bool + timestamp: + description: Match packets with Time Stamp Option (68). + type: bool + traceroute: + description: Match packets with Trace Route Option (82). + type: bool + ump: + description: Match packets with Upstream Multicast Packet Option (152). + type: bool + visa: + description: Match packets with Experimental Access Control Option (142). + type: bool + zsu: + description: Match packets with Experimental Measurement Option (10). + type: bool + precedence: + description: Match packets with given precedence value. + type: int + time_range: + description: Specify a time-range. + type: str + tos: + description: + - Match packets with given TOS value. + - Note, DSCP and TOS are mutually exclusive + type: dict + suboptions: + service_value: + description: Type of service value + type: int + max_reliability: + description: Match packets with max reliable TOS (2). + type: bool + max_throughput: + description: Match packets with max throughput TOS (4). + type: bool + min_delay : + description: Match packets with min delay TOS (8). + type: bool + min_monetary_cost: + description: Match packets with min monetary cost TOS (1). + type: bool + normal: + description: Match packets with normal TOS (0). + type: bool + ttl: + description: Match packets with given TTL value. + type: dict + suboptions: + eq: + description: Match only packets on a given TTL number. + type: int + gt: + description: Match only packets with a greater TTL number. + type: int + lt: + description: Match only packets with a lower TTL number. + type: int + neq: + description: Match only packets not on a given TTL number. + type: int + range: + description: Match only packets in the range of TTLs. + type: dict + suboptions: + start: + description: Specify the start of the port range. + type: int + end: + description: Specify the end of the port range. + type: int + running_config: + description: + - The module, by default, will connect to the remote device and + retrieve the current running-config to use as a base for comparing + against the contents of source. There are times when it is not + desirable to have the task get the current running-config for + every task in a playbook. The I(running_config) argument allows the + implementer to pass in the configuration to use as the base + config for comparison. + type: str + state: + choices: + - merged + - replaced + - overridden + - deleted + - gathered + - rendered + - parsed + default: merged + description: + - The state of the configuration after module completion + type: str +""" + +EXAMPLES = """ +--- + +# Using merged + +# Before state: +# ------------- +# +# vios#sh access-lists +# Extended IP access list 110 +# 10 deny icmp 192.0.2.0 0.0.0.255 192.0.3.0 0.0.0.255 echo dscp ef ttl eq 10 + +- name: Merge provided configuration with device configuration + ios_acl: + config: + - afi: ipv4 + acls: + - name: std_acl + acl_type: standard + aces: + - grant: deny + source: + address: 192.168.1.200 + - grant: deny + source: + address: 192.168.2.0 + wildcard_bits: 0.0.0.255 + - name: 110 + aces: + - grant: deny + sequence: 10 + protocol_options: + icmp: + traceroute: true + source: + address: 192.0.2.0 + wildcard_bits: 0.0.0.255 + destination: + address: 192.0.3.0 + wildcard_bits: 0.0.0.255 + dscp: ef + ttl: + eq: 10 + - grant: deny + protocol_options: + tcp: + ack: true + source: + host: 198.51.100.0 + destination: + host: 198.51.110.0 + port_protocol: + eq: telnet + - name: test + acl_type: extended + aces: + - grant: deny + protocol_options: + tcp: + fin: true + source: + address: 192.0.2.0 + wildcard_bits: 0.0.0.255 + destination: + address: 192.0.3.0 + wildcard_bits: 0.0.0.255 + port_protocol: + eq: www + option: + traceroute: true + ttl: + eq: 10 + - name: 123 + aces: + - grant: deny + protocol_options: + tcp: + ack: true + source: + address: 198.51.100.0 + wildcard_bits: 0.0.0.255 + destination: + address: 198.51.101.0 + wildcard_bits: 0.0.0.255 + port_protocol: + eq: telnet + tos: + service_value: 12 + - grant: deny + protocol_options: + tcp: + ack: true + source: + address: 192.0.3.0 + wildcard_bits: 0.0.0.255 + destination: + address: 192.0.4.0 + wildcard_bits: 0.0.0.255 + port_protocol: + eq: www + dscp: ef + ttl: + lt: 20 + - afi: ipv6 + acls: + - name: R1_TRAFFIC + aces: + - grant: deny + protocol_options: + tcp: + ack: true + source: + any: true + port_protocol: + eq: www + destination: + any: true + port_protocol: + eq: telnet + dscp: af11 + state: merged + +# Commands fired: +# --------------- +# +# - ip access-list standard std_acl +# - deny 192.168.1.200 +# - deny 192.168.2.0 0.0.0.255 +# - ip access-list extended 110 +# - no 10 +# - 10 deny icmp 192.0.2.0 0.0.0.255 192.0.3.0 0.0.0.255 traceroute dscp ef ttl eq 10 +# - deny tcp host 198.51.100.0 host 198.51.110.0 eq telnet ack +# - ip access-list extended test +# - deny tcp 192.0.2.0 0.0.0.255 192.0.3.0 0.0.0.255 eq www fin option traceroute ttl eq 10 +# - ip access-list extended 123 +# - deny tcp 198.51.100.0 0.0.0.255 198.51.101.0 0.0.0.255 eq telnet ack tos 12 +# - deny tcp 192.0.3.0 0.0.0.255 192.0.4.0 0.0.0.255 eq www ack dscp ef ttl lt 20 +# - ipv6 access-list R1_TRAFFIC +# - deny tcp any eq www any eq telnet ack dscp af11 + +# After state: +# ------------ +# +# vios#sh access-lists +# Standard IP access list std_acl +# 10 deny 192.168.1.200 +# 20 deny 192.168.2.0, wildcard bits 0.0.0.255 +# Extended IP access list 110 +# 10 deny icmp 192.0.2.0 0.0.0.255 192.0.3.0 0.0.0.255 traceroute dscp ef ttl eq 10 +# 20 deny tcp host 198.51.100.0 host 198.51.110.0 eq telnet ack +# Extended IP access list 123 +# 10 deny tcp 198.51.100.0 0.0.0.255 198.51.101.0 0.0.0.255 eq telnet ack tos 12 +# 20 deny tcp 192.0.3.0 0.0.0.255 192.0.4.0 0.0.0.255 eq www ack dscp ef ttl lt 20 +# Extended IP access list test +# 10 deny tcp 192.0.2.0 0.0.0.255 192.0.3.0 0.0.0.255 eq www fin option traceroute ttl eq 10 +# IPv6 access list R1_TRAFFIC +# deny tcp any eq www any eq telnet ack dscp af11 sequence 10 + + +# Using replaced + +# Before state: +# ------------- +# +# vios#sh access-lists +# Standard IP access list std_acl +# 10 deny 192.168.1.200 +# 20 deny 192.168.2.0, wildcard bits 0.0.0.255 +# Extended IP access list 110 +# 10 deny icmp 192.0.2.0 0.0.0.255 192.0.3.0 0.0.0.255 traceroute dscp ef ttl eq 10 +# 20 deny tcp host 198.51.100.0 host 198.51.110.0 eq telnet ack +# Extended IP access list 123 +# 10 deny tcp 198.51.100.0 0.0.0.255 198.51.101.0 0.0.0.255 eq telnet ack tos 12 +# 20 deny tcp 192.0.3.0 0.0.0.255 192.0.4.0 0.0.0.255 eq www ack dscp ef ttl lt 20 +# Extended IP access list test +# 10 deny tcp 192.0.2.0 0.0.0.255 192.0.3.0 0.0.0.255 eq www fin option traceroute ttl eq 10 +# IPv6 access list R1_TRAFFIC +# deny tcp any eq www any eq telnet ack dscp af11 sequence 10 + + +- name: Replaces device configuration of listed acls with provided configuration + ios_acl: + config: + - afi: ipv4 + acls: + - name: 110 + aces: + - grant: deny + protocol_options: + tcp: + syn: true + source: + address: 192.0.2.0 + wildcard_bits: 0.0.0.255 + destination: + address: 192.0.3.0 + wildcard_bits: 0.0.0.255 + port_protocol: + eq: www + dscp: ef + ttl: + eq: 10 + - name: 150 + aces: + - grant: deny + sequence: 20 + protocol_options: + tcp: + syn: true + source: + address: 198.51.100.0 + wildcard_bits: 0.0.0.255 + port_protocol: + eq: telnet + destination: + address: 198.51.110.0 + wildcard_bits: 0.0.0.255 + port_protocol: + eq: telnet + dscp: ef + ttl: + eq: 10 + state: replaced + +# Commands fired: +# --------------- +# +# - no ip access-list extended 110 +# - ip access-list extended 110 +# - deny tcp 192.0.2.0 0.0.0.255 192.0.3.0 0.0.0.255 eq www syn dscp ef ttl eq 10 +# - ip access-list extended 150 +# - 20 deny tcp 198.51.100.0 0.0.0.255 eq telnet 198.51.110.0 0.0.0.255 eq telnet syn dscp ef ttl eq 10 + +# After state: +# ------------- +# +# vios#sh access-lists +# Standard IP access list std_acl +# 10 deny 192.168.1.200 +# 20 deny 192.168.2.0, wildcard bits 0.0.0.255 +# Extended IP access list 110 +# 10 deny tcp 192.0.2.0 0.0.0.255 192.0.3.0 0.0.0.255 eq www syn dscp ef ttl eq 10 +# Extended IP access list 123 +# 10 deny tcp 198.51.100.0 0.0.0.255 198.51.101.0 0.0.0.255 eq telnet ack tos 12 +# 20 deny tcp 192.0.3.0 0.0.0.255 192.0.4.0 0.0.0.255 eq www ack dscp ef ttl lt 20 +# Extended IP access list 150 +# 20 deny tcp 198.51.100.0 0.0.0.255 eq telnet 198.51.110.0 0.0.0.255 eq telnet syn dscp ef ttl eq 10 +# Extended IP access list test +# 10 deny tcp 192.0.2.0 0.0.0.255 192.0.3.0 0.0.0.255 eq www fin option traceroute ttl eq 10 +# IPv6 access list R1_TRAFFIC +# deny tcp any eq www any eq telnet ack dscp af11 sequence 10 + +# Using overridden + +# Before state: +# ------------- +# +# vios#sh access-lists +# Standard IP access list std_acl +# 10 deny 192.168.1.200 +# 20 deny 192.168.2.0, wildcard bits 0.0.0.255 +# Extended IP access list 110 +# 10 deny icmp 192.0.2.0 0.0.0.255 192.0.3.0 0.0.0.255 traceroute dscp ef ttl eq 10 +# 20 deny tcp host 198.51.100.0 host 198.51.110.0 eq telnet ack +# Extended IP access list 123 +# 10 deny tcp 198.51.100.0 0.0.0.255 198.51.101.0 0.0.0.255 eq telnet ack tos 12 +# 20 deny tcp 192.0.3.0 0.0.0.255 192.0.4.0 0.0.0.255 eq www ack dscp ef ttl lt 20 +# Extended IP access list test +# 10 deny tcp 192.0.2.0 0.0.0.255 192.0.3.0 0.0.0.255 eq www fin option traceroute ttl eq 10 +# IPv6 access list R1_TRAFFIC +# deny tcp any eq www any eq telnet ack dscp af11 sequence 10 + +- name: Override device configuration of all acls with provided configuration + ios_acl: + config: + - afi: ipv4 + acls: + - name: 110 + aces: + - grant: deny + sequence: 20 + protocol_options: + tcp: + ack: true + source: + address: 198.51.100.0 + wildcard_bits: 0.0.0.255 + port_protocol: + eq: telnet + destination: + address: 198.51.110.0 + wildcard_bits: 0.0.0.255 + port_protocol: + eq: www + dscp: ef + ttl: + eq: 10 + - name: 150 + aces: + - grant: deny + sequence: 10 + protocol_options: + tcp: + syn: true + source: + address: 198.51.100.0 + wildcard_bits: 0.0.0.255 + port_protocol: + eq: telnet + destination: + address: 198.51.110.0 + wildcard_bits: 0.0.0.255 + port_protocol: + eq: telnet + dscp: ef + ttl: + eq: 10 + state: overridden + +# Commands fired: +# --------------- +# +# - no ip access-list standard std_acl +# - no ip access-list extended 110 +# - no ip access-list extended 123 +# - no ip access-list extended 150 +# - no ip access-list extended test +# - no ipv6 access-list R1_TRAFFIC +# - ip access-list extended 150 +# - 10 deny tcp 198.51.100.0 0.0.0.255 eq telnet 198.51.110.0 0.0.0.255 eq telnet syn dscp ef ttl eq 10 +# - ip access-list extended 110 +# - 20 deny tcp 198.51.100.0 0.0.0.255 eq telnet 198.51.110.0 0.0.0.255 eq www ack dscp ef ttl eq 10 + +# After state: +# ------------- +# +# vios#sh access-lists +# Extended IP access list 110 +# 20 deny tcp 198.51.100.0 0.0.0.255 eq telnet 198.51.110.0 0.0.0.255 eq www ack dscp ef ttl eq 10 +# Extended IP access list 150 +# 10 deny tcp 198.51.100.0 0.0.0.255 eq telnet 198.51.110.0 0.0.0.255 eq telnet syn dscp ef ttl eq 10 + +# Using Deleted + +# Before state: +# ------------- +# +# vios#sh access-lists +# Standard IP access list std_acl +# 10 deny 192.168.1.200 +# 20 deny 192.168.2.0, wildcard bits 0.0.0.255 +# Extended IP access list 110 +# 10 deny icmp 192.0.2.0 0.0.0.255 192.0.3.0 0.0.0.255 traceroute dscp ef ttl eq 10 +# 20 deny tcp host 198.51.100.0 host 198.51.110.0 eq telnet ack +# Extended IP access list 123 +# 10 deny tcp 198.51.100.0 0.0.0.255 198.51.101.0 0.0.0.255 eq telnet ack tos 12 +# 20 deny tcp 192.0.3.0 0.0.0.255 192.0.4.0 0.0.0.255 eq www ack dscp ef ttl lt 20 +# Extended IP access list test +# 10 deny tcp 192.0.2.0 0.0.0.255 192.0.3.0 0.0.0.255 eq www fin option traceroute ttl eq 10 +# IPv6 access list R1_TRAFFIC +# deny tcp any eq www any eq telnet ack dscp af11 sequence 10 + +- name: "Delete module attributes of given acls (Note: This won't delete the interface itself)" + ios_acl: + config: + - afi: ipv4 + acls: + - name: test + acl_type: extended + - name: 110 + - name: 123 + aces: + - sequence: 10 + - afi: ipv6 + acls: + - name: R1_TRAFFIC + state: deleted + +# Commands fired: +# --------------- +# +# - no ip access-list extended test +# - no ip access-list extended 110 +# - ip access-list extended 123 +# - no 10 +# - no ipv6 access-list R1_TRAFFIC + +# After state: +# ------------- +# +# vios#sh access-lists +# Standard IP access list std_acl +# 10 deny 192.168.1.200 +# 20 deny 192.168.2.0, wildcard bits 0.0.0.255 +# Extended IP access list 123 +# 20 deny tcp 192.0.3.0 0.0.0.255 192.0.4.0 0.0.0.255 eq www ack dscp ef ttl lt 20 + +# Before state: +# ------------- +# +# vios#sh access-lists +# Standard IP access list std_acl +# 10 deny 192.168.1.200 +# 20 deny 192.168.2.0, wildcard bits 0.0.0.255 +# Extended IP access list 110 +# 10 deny icmp 192.0.2.0 0.0.0.255 192.0.3.0 0.0.0.255 traceroute dscp ef ttl eq 10 +# 20 deny tcp host 198.51.100.0 host 198.51.110.0 eq telnet ack +# Extended IP access list 123 +# 10 deny tcp 198.51.100.0 0.0.0.255 198.51.101.0 0.0.0.255 eq telnet ack tos 12 +# 20 deny tcp 192.0.3.0 0.0.0.255 192.0.4.0 0.0.0.255 eq www ack dscp ef ttl lt 20 +# Extended IP access list test +# 10 deny tcp 192.0.2.0 0.0.0.255 192.0.3.0 0.0.0.255 eq www fin option traceroute ttl eq 10 +# IPv6 access list R1_TRAFFIC +# deny tcp any eq www any eq telnet ack dscp af11 sequence 10 + +- name: "Delete module attributes of given ACL based on AFI (Note: This won't delete the interface itself)" + ios_acl: + config: + - afi: ipv4 + state: deleted + +# Commands fired: +# --------------- +# +# - no ip access-list standard std_acl +# - no ip access-list extended test +# - no ip access-list extended 110 +# - no ip access-list extended 123 + +# After state: +# ------------- +# +# vios#sh access-lists +# IPv6 access list R1_TRAFFIC +# deny tcp any eq www any eq telnet ack dscp af11 sequence 10 + +# Using Deleted without any config passed +#"(NOTE: This will delete all of configured resource module attributes from each configured interface)" + +# Before state: +# ------------- +# +# vios#sh access-lists +# Standard IP access list std_acl +# 10 deny 192.168.1.200 +# 20 deny 192.168.2.0, wildcard bits 0.0.0.255 +# Extended IP access list 110 +# 10 deny icmp 192.0.2.0 0.0.0.255 192.0.3.0 0.0.0.255 traceroute dscp ef ttl eq 10 +# 20 deny tcp host 198.51.100.0 host 198.51.110.0 eq telnet ack +# Extended IP access list 123 +# 10 deny tcp 198.51.100.0 0.0.0.255 198.51.101.0 0.0.0.255 eq telnet ack tos 12 +# 20 deny tcp 192.0.3.0 0.0.0.255 192.0.4.0 0.0.0.255 eq www ack dscp ef ttl lt 20 +# Extended IP access list test +# 10 deny tcp 192.0.2.0 0.0.0.255 192.0.3.0 0.0.0.255 eq www fin option traceroute ttl eq 10 +# IPv6 access list R1_TRAFFIC +# deny tcp any eq www any eq telnet ack dscp af11 sequence 10 + +- name: "Delete module attributes of all acls (Note: This won't delete the interface itself)" + ios_acl: + state: deleted + +# Commands fired: +# --------------- +# +# - no ip access-list extended test +# - no ip access-list extended 110 +# - no ip access-list extended 123 +# - no ip access-list extended test +# - no ipv6 access-list R1_TRAFFIC + +# After state: +# ------------- +# +# vios#sh access-lists + +# Using Gathered + +# Before state: +# ------------- +# +# vios#sh access-lists +# Standard IP access list std_acl +# 10 deny 192.168.1.200 +# 20 deny 192.168.2.0, wildcard bits 0.0.0.255 +# Extended IP access list 110 +# 10 deny icmp 192.0.2.0 0.0.0.255 192.0.3.0 0.0.0.255 traceroute dscp ef ttl eq 10 +# 20 deny tcp host 198.51.100.0 host 198.51.110.0 eq telnet ack +# Extended IP access list 123 +# 10 deny tcp 198.51.100.0 0.0.0.255 198.51.101.0 0.0.0.255 eq telnet ack tos 12 +# 20 deny tcp 192.0.3.0 0.0.0.255 192.0.4.0 0.0.0.255 eq www ack dscp ef ttl lt 20 +# Extended IP access list test +# 10 deny tcp 192.0.2.0 0.0.0.255 192.0.3.0 0.0.0.255 eq www fin option traceroute ttl eq 10 +# IPv6 access list R1_TRAFFIC +# deny tcp any eq www any eq telnet ack dscp af11 sequence 10 + +- name: Gather listed acls interfaces with provided configurations + ios_acl_interfaces: + config: + state: gathered + +# Module Execution Result: +# ------------------------ +# +# "gathered": [ +# { +# "acls": [ +# { +# "aces": [ +# { +# "destination": { +# "address": "192.0.3.0", +# "wildcard_bits": "0.0.0.255" +# }, +# "dscp": "ef", +# "grant": "deny", +# "protocol_options": { +# "icmp": { +# "echo": true +# } +# }, +# "sequence": 10, +# "source": { +# "address": "192.0.2.0", +# "wildcard_bits": "0.0.0.255" +# }, +# "ttl": { +# "eq": 10 +# } +# } +# ], +# "acl_type": "extended", +# "name": "110" +# }, +# { +# "aces": [ +# { +# "destination": { +# "address": "198.51.101.0", +# "port_protocol": { +# "eq": "telnet" +# }, +# "wildcard_bits": "0.0.0.255" +# }, +# "grant": "deny", +# "protocol_options": { +# "tcp": { +# "ack": true +# } +# }, +# "sequence": 10, +# "source": { +# "address": "198.51.100.0", +# "wildcard_bits": "0.0.0.255" +# }, +# "tos": { +# "service_value": 12 +# } +# }, +# { +# "destination": { +# "address": "192.0.4.0", +# "port_protocol": { +# "eq": "www" +# }, +# "wildcard_bits": "0.0.0.255" +# }, +# "dscp": "ef", +# "grant": "deny", +# "protocol_options": { +# "tcp": { +# "ack": true +# } +# }, +# "sequence": 20, +# "source": { +# "address": "192.0.3.0", +# "wildcard_bits": "0.0.0.255" +# }, +# "ttl": { +# "lt": 20 +# } +# } +# ], +# "acl_type": "extended", +# "name": "123" +# }, +# { +# "aces": [ +# { +# "destination": { +# "address": "192.0.3.0", +# "port_protocol": { +# "eq": "www" +# }, +# "wildcard_bits": "0.0.0.255" +# }, +# "grant": "deny", +# "option": { +# "traceroute": true +# }, +# "protocol_options": { +# "tcp": { +# "fin": true +# } +# }, +# "sequence": 10, +# "source": { +# "address": "192.0.2.0", +# "wildcard_bits": "0.0.0.255" +# }, +# "ttl": { +# "eq": 10 +# } +# } +# ], +# "acl_type": "extended", +# "name": "test_acl" +# } +# ], +# "afi": "ipv4" +# }, +# { +# "acls": [ +# { +# "aces": [ +# { +# "destination": { +# "any": true, +# "port_protocol": { +# "eq": "telnet" +# } +# }, +# "dscp": "af11", +# "grant": "deny", +# "protocol_options": { +# "tcp": { +# "ack": true +# } +# }, +# "sequence": 10, +# "source": { +# "any": true, +# "port_protocol": { +# "eq": "www" +# } +# } +# } +# ], +# "name": "R1_TRAFFIC" +# } +# ], +# "afi": "ipv6" +# } +# ] + +# Using Rendered + +- name: Rendered the provided configuration with the exisiting running configuration + ios_acl: + config: + - afi: ipv4 + acls: + - name: 110 + aces: + - grant: deny + sequence: 10 + protocol_options: + tcp: + syn: true + source: + address: 192.0.2.0 + wildcard_bits: 0.0.0.255 + destination: + address: 192.0.3.0 + wildcard_bits: 0.0.0.255 + port_protocol: + eq: www + dscp: ef + ttl: + eq: 10 + - name: 150 + aces: + - grant: deny + protocol_options: + tcp: + syn: true + source: + address: 198.51.100.0 + wildcard_bits: 0.0.0.255 + port_protocol: + eq: telnet + destination: + address: 198.51.110.0 + wildcard_bits: 0.0.0.255 + port_protocol: + eq: telnet + dscp: ef + ttl: + eq: 10 + state: rendered + +# Module Execution Result: +# ------------------------ +# +# "rendered": [ +# "ip access-list extended 110", +# "10 deny tcp 192.0.2.0 0.0.0.255 192.0.3.0 0.0.0.255 eq www syn dscp ef ttl eq 10", +# "ip access-list extended 150", +# "deny tcp 198.51.100.0 0.0.0.255 eq telnet 198.51.110.0 0.0.0.255 eq telnet syn dscp ef ttl eq 10" +# ] + +# Using Parsed + +- name: Parse the commands for provided configuration + ios_acl: + running_config: + "ipv6 access-list R1_TRAFFIC + deny tcp any eq www any eq telnet ack dscp af11" + state: parsed + +# Module Execution Result: +# ------------------------ +# +# "parsed": [ +# { +# "acls": [ +# { +# "aces": [ +# { +# "destination": { +# "any": true, +# "port_protocol": { +# "eq": "telnet" +# } +# }, +# "dscp": "af11", +# "grant": "deny", +# "protocol_options": { +# "tcp": { +# "ack": true +# } +# }, +# "source": { +# "any": true, +# "port_protocol": { +# "eq": "www" +# } +# } +# } +# ], +# "name": "R1_TRAFFIC" +# } +# ], +# "afi": "ipv6" +# } +# ] + +""" + +RETURN = """ +before: + description: The configuration as structured data prior to module invocation. + returned: always + type: list + sample: The configuration returned will always be in the same format of the parameters above. +after: + description: The configuration as structured data after module completion. + returned: when changed + type: list + sample: The configuration returned will always be in the same format of the parameters above. +commands: + description: The set of commands pushed to the remote device + returned: always + type: list + sample: ['ip access-list extended 110', 'deny icmp 192.0.2.0 0.0.0.255 192.0.3.0 0.0.0.255 echo dscp ef ttl eq 10'] +""" + +from ansible.module_utils.basic import AnsibleModule +from ansible.module_utils.network.ios.argspec.acls.acls import AclsArgs +from ansible.module_utils.network.ios.config.acls.acls import Acls + + +def main(): + """ + Main entry point for module execution + + :returns: the result form module invocation + """ + required_if = [('state', 'merged', ('config',)), + ('state', 'replaced', ('config',)), + ('state', 'overridden', ('config',)), + ('state', 'rendered', ('config',)), + ('state', 'parsed', ('running_config',))] + + mutually_exclusive = [('config', 'running_config')] + + module = AnsibleModule(argument_spec=AclsArgs.argument_spec, + required_if=required_if, + mutually_exclusive=mutually_exclusive, + supports_check_mode=True) + + result = Acls(module).execute_module() + module.exit_json(**result) + + +if __name__ == '__main__': + main() diff --git a/lib/ansible/modules/network/ios/ios_facts.py b/lib/ansible/modules/network/ios/ios_facts.py index 5c3ff8dae3..e2f147e669 100644 --- a/lib/ansible/modules/network/ios/ios_facts.py +++ b/lib/ansible/modules/network/ios/ios_facts.py @@ -58,7 +58,7 @@ options: a specific subset should not be collected. Valid subsets are 'all', 'interfaces', 'l2_interfaces', 'vlans', 'lag_interfaces', 'lacp', 'lacp_interfaces', 'lldp_global', - 'lldp_interfaces', 'l3_interfaces', 'acl_interfaces', 'static_routes'. + 'lldp_interfaces', 'l3_interfaces', 'acl_interfaces', 'static_routes', 'acls'. version_added: "2.9" """ |