summaryrefslogtreecommitdiff
path: root/lib/ansible/modules/network/f5/bigip_firewall_global_rules.py
diff options
context:
space:
mode:
Diffstat (limited to 'lib/ansible/modules/network/f5/bigip_firewall_global_rules.py')
-rw-r--r--lib/ansible/modules/network/f5/bigip_firewall_global_rules.py381
1 files changed, 0 insertions, 381 deletions
diff --git a/lib/ansible/modules/network/f5/bigip_firewall_global_rules.py b/lib/ansible/modules/network/f5/bigip_firewall_global_rules.py
deleted file mode 100644
index f0e036b2e7..0000000000
--- a/lib/ansible/modules/network/f5/bigip_firewall_global_rules.py
+++ /dev/null
@@ -1,381 +0,0 @@
-#!/usr/bin/python
-# -*- coding: utf-8 -*-
-#
-# Copyright: (c) 2018, F5 Networks Inc.
-# GNU General Public License v3.0 (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt)
-
-from __future__ import absolute_import, division, print_function
-__metaclass__ = type
-
-
-ANSIBLE_METADATA = {'metadata_version': '1.1',
- 'status': ['preview'],
- 'supported_by': 'certified'}
-
-DOCUMENTATION = r'''
----
-module: bigip_firewall_global_rules
-short_description: Manage AFM global rule settings on BIG-IP
-description:
- - Configures the global network firewall rules. These firewall rules are
- applied to all packets except those going through the management
- interface. They are applied first, before any firewall rules for the
- packet's virtual server, route domain, and/or self IP.
-version_added: 2.8
-options:
- enforced_policy:
- description:
- - Specifies an enforced firewall policy.
- - C(enforced_policy) rules are enforced globally.
- type: str
- service_policy:
- description:
- - Specifies a service policy that would apply to traffic globally.
- - The service policy is applied to all flows, provided if there are
- no other context specific service policy configuration that
- overrides the global service policy. For example, when a service
- policy is configured both at a global level, as well as on a
- firewall rule, and a flow matches the rule, the more specific
- service policy configuration in the rule will override the service
- policy setting at the global level.
- - The service policy associated here can be created using the
- C(bigip_service_policy) module.
- type: str
- staged_policy:
- description:
- - Specifies a staged firewall policy.
- - C(staged_policy) rules are not enforced while all the visibility
- aspects namely statistics, reporting and logging function as if
- the staged-policy rules were enforced globally.
- type: str
- description:
- description:
- - Description for the global list of firewall rules.
- type: str
-extends_documentation_fragment: f5
-author:
- - Tim Rupp (@caphrim007)
-'''
-
-EXAMPLES = r'''
-- name: Change enforced policy in AFM global rules
- bigip_firewall_global_rules:
- enforced_policy: enforcing1
- provider:
- password: secret
- server: lb.mydomain.com
- user: admin
- delegate_to: localhost
-'''
-
-RETURN = r'''
-enforced_policy:
- description: The new global Enforced Policy.
- returned: changed
- type: str
- sample: /Common/enforced1
-service_policy:
- description: The new global Service Policy.
- returned: changed
- type: str
- sample: /Common/service1
-staged_policy:
- description: The new global Staged Policy.
- returned: changed
- type: str
- sample: /Common/staged1
-description:
- description: The new description.
- returned: changed
- type: str
- sample: My description
-'''
-
-from ansible.module_utils.basic import AnsibleModule
-
-try:
- from library.module_utils.network.f5.bigip import F5RestClient
- from library.module_utils.network.f5.common import F5ModuleError
- from library.module_utils.network.f5.common import AnsibleF5Parameters
- from library.module_utils.network.f5.common import fq_name
- from library.module_utils.network.f5.common import f5_argument_spec
- from library.module_utils.network.f5.compare import cmp_str_with_none
-except ImportError:
- from ansible.module_utils.network.f5.bigip import F5RestClient
- from ansible.module_utils.network.f5.common import F5ModuleError
- from ansible.module_utils.network.f5.common import AnsibleF5Parameters
- from ansible.module_utils.network.f5.common import fq_name
- from ansible.module_utils.network.f5.common import f5_argument_spec
- from ansible.module_utils.network.f5.compare import cmp_str_with_none
-
-
-class Parameters(AnsibleF5Parameters):
- api_map = {
- 'enforcedPolicy': 'enforced_policy',
- 'servicePolicy': 'service_policy',
- 'stagedPolicy': 'staged_policy',
- }
-
- api_attributes = [
- 'enforcedPolicy',
- 'servicePolicy',
- 'stagedPolicy',
- 'description',
- ]
-
- returnables = [
- 'enforced_policy',
- 'service_policy',
- 'staged_policy',
- 'description',
- ]
-
- updatables = [
- 'enforced_policy',
- 'service_policy',
- 'staged_policy',
- 'description',
- ]
-
-
-class ApiParameters(Parameters):
- @property
- def description(self):
- if self._values['description'] in [None, 'none']:
- return None
- return self._values['description']
-
-
-class ModuleParameters(Parameters):
- @property
- def enforced_policy(self):
- if self._values['enforced_policy'] is None:
- return None
- if self._values['enforced_policy'] in ['', 'none']:
- return ''
- return fq_name(self.partition, self._values['enforced_policy'])
-
- @property
- def service_policy(self):
- if self._values['service_policy'] is None:
- return None
- if self._values['service_policy'] in ['', 'none']:
- return ''
- return fq_name(self.partition, self._values['service_policy'])
-
- @property
- def staged_policy(self):
- if self._values['staged_policy'] is None:
- return None
- if self._values['staged_policy'] in ['', 'none']:
- return ''
- return fq_name(self.partition, self._values['staged_policy'])
-
- @property
- def description(self):
- if self._values['description'] is None:
- return None
- elif self._values['description'] in ['none', '']:
- return ''
- return self._values['description']
-
-
-class Changes(Parameters):
- def to_return(self):
- result = {}
- try:
- for returnable in self.returnables:
- result[returnable] = getattr(self, returnable)
- result = self._filter_params(result)
- except Exception:
- pass
- return result
-
-
-class UsableChanges(Changes):
- pass
-
-
-class ReportableChanges(Changes):
- pass
-
-
-class Difference(object):
- def __init__(self, want, have=None):
- self.want = want
- self.have = have
-
- def compare(self, param):
- try:
- result = getattr(self, param)
- return result
- except AttributeError:
- return self.__default(param)
-
- def __default(self, param):
- attr1 = getattr(self.want, param)
- try:
- attr2 = getattr(self.have, param)
- if attr1 != attr2:
- return attr1
- except AttributeError:
- return attr1
-
- @property
- def description(self):
- return cmp_str_with_none(self.want.description, self.have.description)
-
- @property
- def enforced_policy(self):
- return cmp_str_with_none(self.want.enforced_policy, self.have.enforced_policy)
-
- @property
- def staged_policy(self):
- return cmp_str_with_none(self.want.staged_policy, self.have.staged_policy)
-
- @property
- def service_policy(self):
- return cmp_str_with_none(self.want.service_policy, self.have.service_policy)
-
-
-class ModuleManager(object):
- def __init__(self, *args, **kwargs):
- self.module = kwargs.get('module', None)
- self.client = F5RestClient(**self.module.params)
- self.want = ModuleParameters(params=self.module.params)
- self.have = ApiParameters()
- self.changes = UsableChanges()
-
- def _set_changed_options(self):
- changed = {}
- for key in Parameters.returnables:
- if getattr(self.want, key) is not None:
- changed[key] = getattr(self.want, key)
- if changed:
- self.changes = UsableChanges(params=changed)
-
- def _update_changed_options(self):
- diff = Difference(self.want, self.have)
- updatables = Parameters.updatables
- changed = dict()
- for k in updatables:
- change = diff.compare(k)
- if change is None:
- continue
- else:
- if isinstance(change, dict):
- changed.update(change)
- else:
- changed[k] = change
- if changed:
- self.changes = UsableChanges(params=changed)
- return True
- return False
-
- def should_update(self):
- result = self._update_changed_options()
- if result:
- return True
- return False
-
- def exec_module(self):
- result = dict()
-
- changed = self.present()
-
- reportable = ReportableChanges(params=self.changes.to_return())
- changes = reportable.to_return()
- result.update(**changes)
- result.update(dict(changed=changed))
- self._announce_deprecations(result)
- return result
-
- def _announce_deprecations(self, result):
- warnings = result.pop('__warnings', [])
- for warning in warnings:
- self.client.module.deprecate(
- msg=warning['msg'],
- version=warning['version']
- )
-
- def present(self):
- return self.update()
-
- def update(self):
- self.have = self.read_current_from_device()
- if not self.should_update():
- return False
- if self.module.check_mode:
- return True
- self.update_on_device()
- return True
-
- def update_on_device(self):
- params = self.changes.api_params()
- uri = "https://{0}:{1}/mgmt/tm/security/firewall/global-rules".format(
- self.client.provider['server'],
- self.client.provider['server_port']
- )
- resp = self.client.api.patch(uri, json=params)
- try:
- response = resp.json()
- except ValueError as ex:
- raise F5ModuleError(str(ex))
-
- if 'code' in response and response['code'] == 400:
- if 'message' in response:
- raise F5ModuleError(response['message'])
- else:
- raise F5ModuleError(resp.content)
-
- def read_current_from_device(self):
- uri = "https://{0}:{1}/mgmt/tm/security/firewall/global-rules".format(
- self.client.provider['server'],
- self.client.provider['server_port']
- )
- resp = self.client.api.get(uri)
- try:
- response = resp.json()
- except ValueError as ex:
- raise F5ModuleError(str(ex))
-
- if 'code' in response and response['code'] == 400:
- if 'message' in response:
- raise F5ModuleError(response['message'])
- else:
- raise F5ModuleError(resp.content)
- return ApiParameters(params=response)
-
-
-class ArgumentSpec(object):
- def __init__(self):
- self.supports_check_mode = True
- argument_spec = dict(
- enforced_policy=dict(),
- service_policy=dict(),
- staged_policy=dict(),
- description=dict(),
- )
- self.argument_spec = {}
- self.argument_spec.update(f5_argument_spec)
- self.argument_spec.update(argument_spec)
-
-
-def main():
- spec = ArgumentSpec()
-
- module = AnsibleModule(
- argument_spec=spec.argument_spec,
- supports_check_mode=spec.supports_check_mode,
- )
-
- try:
- mm = ModuleManager(module=module)
- results = mm.exec_module()
- module.exit_json(**results)
- except F5ModuleError as ex:
- module.fail_json(msg=str(ex))
-
-
-if __name__ == '__main__':
- main()