Fortios ipv4 policy (#21849)
* New module fortios_address_group * New module fortios_ipv4_policy * New module fortios_ipv4_policy * Fix pep8 * Fix alias doc problem * Fix string format for 2.5 compat + close cnx * Forgoten if string != "" * Fix doc, change action to policy_action & add action as alias * fix doc + bug in timeout + duplicate code for config compare * Create class AnsibleFortios in module_utils/forios.py + use in ipv4_policy module * remove json import * python3 error handling compatibility bad examples for srcadd or dstaddr s/any/all/ remove pyFG dependency in module (moved to module_utils) id type is int but casted as string call fortiosansible object sooner typo in doc
This commit is contained in:
parent
17a4a655a3
commit
2ee3a5aa07
2 changed files with 400 additions and 0 deletions
|
@ -29,6 +29,17 @@
|
||||||
import os
|
import os
|
||||||
import time
|
import time
|
||||||
|
|
||||||
|
from ansible.module_utils.basic import AnsibleModule
|
||||||
|
from ansible.module_utils.pycompat24 import get_exception
|
||||||
|
|
||||||
|
|
||||||
|
#check for pyFG lib
|
||||||
|
try:
|
||||||
|
from pyFG import FortiOS, FortiConfig
|
||||||
|
from pyFG.exceptions import CommandExecutionException, FailedCommit
|
||||||
|
HAS_PYFG=True
|
||||||
|
except:
|
||||||
|
HAS_PYFG=False
|
||||||
|
|
||||||
fortios_argument_spec = dict(
|
fortios_argument_spec = dict(
|
||||||
host = dict(required=True ),
|
host = dict(required=True ),
|
||||||
|
@ -45,6 +56,13 @@ fortios_required_if = [
|
||||||
['backup', True , ['backup_path'] ],
|
['backup', True , ['backup_path'] ],
|
||||||
]
|
]
|
||||||
|
|
||||||
|
|
||||||
|
fortios_error_codes = {
|
||||||
|
'-3':"Object not found",
|
||||||
|
'-61':"Command error"
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
def backup(module,running_config):
|
def backup(module,running_config):
|
||||||
backup_path = module.params['backup_path']
|
backup_path = module.params['backup_path']
|
||||||
if not os.path.exists(backup_path):
|
if not os.path.exists(backup_path):
|
||||||
|
@ -58,3 +76,96 @@ def backup(module,running_config):
|
||||||
open(filename, 'w').write(running_config)
|
open(filename, 'w').write(running_config)
|
||||||
except:
|
except:
|
||||||
module.fail_json(msg="Can't create backup file {0} Permission denied ?".format(filename))
|
module.fail_json(msg="Can't create backup file {0} Permission denied ?".format(filename))
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
class AnsibleFortios(object):
|
||||||
|
def __init__(self, module):
|
||||||
|
if not HAS_PYFG:
|
||||||
|
module.fail_json(msg='Could not import the python library pyFG required by this module')
|
||||||
|
|
||||||
|
self.result = {
|
||||||
|
'changed': False,
|
||||||
|
}
|
||||||
|
self.module = module
|
||||||
|
|
||||||
|
|
||||||
|
def _connect(self):
|
||||||
|
host = self.module.params['host']
|
||||||
|
username = self.module.params['username']
|
||||||
|
password = self.module.params['password']
|
||||||
|
timeout = self.module.params['timeout']
|
||||||
|
vdom = self.module.params['vdom']
|
||||||
|
|
||||||
|
self.forti_device = FortiOS(host, username=username, password=password, timeout=timeout, vdom=vdom)
|
||||||
|
|
||||||
|
try:
|
||||||
|
self.forti_device.open()
|
||||||
|
except Exception:
|
||||||
|
e = get_exception()
|
||||||
|
self.module.fail_json(msg='Error connecting device. %s' % e)
|
||||||
|
|
||||||
|
|
||||||
|
def load_config(self, path):
|
||||||
|
self._connect()
|
||||||
|
self.path = path
|
||||||
|
#get config
|
||||||
|
try:
|
||||||
|
self.forti_device.load_config(path=path)
|
||||||
|
self.result['running_config'] = self.forti_device.running_config.to_text()
|
||||||
|
except Exception:
|
||||||
|
self.forti_device.close()
|
||||||
|
e = get_exception()
|
||||||
|
self.module.fail_json(msg='Error reading running config. %s' % e)
|
||||||
|
|
||||||
|
#backup if needed
|
||||||
|
if self.module.params['backup']:
|
||||||
|
backup(self.module, self.result['running_config'])
|
||||||
|
|
||||||
|
self.candidate_config = self.forti_device.candidate_config
|
||||||
|
|
||||||
|
|
||||||
|
def apply_changes(self):
|
||||||
|
change_string = self.forti_device.compare_config()
|
||||||
|
if change_string:
|
||||||
|
self.result['change_string'] = change_string
|
||||||
|
self.result['changed'] = True
|
||||||
|
|
||||||
|
#Commit if not check mode
|
||||||
|
if change_string and not self.module.check_mode:
|
||||||
|
try:
|
||||||
|
self.forti_device.commit()
|
||||||
|
except FailedCommit:
|
||||||
|
#Something's wrong (rollback is automatic)
|
||||||
|
self.forti_device.close()
|
||||||
|
e = get_exception()
|
||||||
|
error_list = self.get_error_infos(e)
|
||||||
|
self.module.fail_json(msg_error_list=error_list, msg="Unable to commit change, check your args, the error was %s" % e.message )
|
||||||
|
|
||||||
|
self.forti_device.close()
|
||||||
|
self.module.exit_json(**self.result)
|
||||||
|
|
||||||
|
|
||||||
|
def del_block(self, block_id):
|
||||||
|
self.forti_device.candidate_config[self.path].del_block(block_id)
|
||||||
|
|
||||||
|
|
||||||
|
def add_block(self, block_id, block):
|
||||||
|
self.forti_device.candidate_config[self.path][block_id] = block
|
||||||
|
|
||||||
|
|
||||||
|
def get_error_infos(self, cli_errors):
|
||||||
|
error_list = []
|
||||||
|
for errors in cli_errors.args:
|
||||||
|
for error in errors:
|
||||||
|
error_code = error[0]
|
||||||
|
error_string = error[1]
|
||||||
|
error_type = fortios_error_codes.get(error_code,"unknown")
|
||||||
|
error_list.append(dict(error_code=error_code, error_type=error_type, error_string= error_string))
|
||||||
|
|
||||||
|
return error_list
|
||||||
|
|
||||||
|
def get_empty_configuration_block(self, block_name, block_type):
|
||||||
|
return FortiConfig(block_name, block_type)
|
||||||
|
|
||||||
|
|
289
lib/ansible/modules/network/fortios/fortios_ipv4_policy.py
Normal file
289
lib/ansible/modules/network/fortios/fortios_ipv4_policy.py
Normal file
|
@ -0,0 +1,289 @@
|
||||||
|
#!/usr/bin/python
|
||||||
|
#
|
||||||
|
# Ansible module to manage IPv4 policy objects in fortigate devices
|
||||||
|
# (c) 2017, Benjamin Jolivot <bjolivot@gmail.com>
|
||||||
|
#
|
||||||
|
# This file is part of Ansible
|
||||||
|
#
|
||||||
|
# Ansible is free software: you can redistribute it and/or modify
|
||||||
|
# it under the terms of the GNU General Public License as published by
|
||||||
|
# the Free Software Foundation, either version 3 of the License, or
|
||||||
|
# (at your option) any later version.
|
||||||
|
#
|
||||||
|
# Ansible is distributed in the hope that it will be useful,
|
||||||
|
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||||
|
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||||
|
# GNU General Public License for more details.
|
||||||
|
#
|
||||||
|
# You should have received a copy of the GNU General Public License
|
||||||
|
# along with Ansible. If not, see <http://www.gnu.org/licenses/>.
|
||||||
|
#
|
||||||
|
|
||||||
|
ANSIBLE_METADATA = {
|
||||||
|
'status': ['preview'],
|
||||||
|
'supported_by': 'community',
|
||||||
|
'version': '1.0'
|
||||||
|
}
|
||||||
|
|
||||||
|
DOCUMENTATION = """
|
||||||
|
---
|
||||||
|
module: fortios_ipv4_policy
|
||||||
|
version_added: "2.3"
|
||||||
|
author: "Benjamin Jolivot (@bjolivot)"
|
||||||
|
short_description: Manage fortios firewall IPv4 policy objects
|
||||||
|
description:
|
||||||
|
- This module provides management of firewall IPv4 policies on FortiOS devices.
|
||||||
|
extends_documentation_fragment: fortios
|
||||||
|
options:
|
||||||
|
id:
|
||||||
|
description:
|
||||||
|
- Policy ID.
|
||||||
|
required: true
|
||||||
|
state:
|
||||||
|
description:
|
||||||
|
- Specifies if address need to be added or deleted.
|
||||||
|
choices: ['present', 'absent']
|
||||||
|
default: present
|
||||||
|
src_intf:
|
||||||
|
description:
|
||||||
|
- Specifies source interface name.
|
||||||
|
default: any
|
||||||
|
dst_intf:
|
||||||
|
description:
|
||||||
|
- Specifies destination interface name.
|
||||||
|
default: any
|
||||||
|
src_addr:
|
||||||
|
description:
|
||||||
|
- Specifies source address (or group) object name(s).
|
||||||
|
required: true
|
||||||
|
src_addr_negate:
|
||||||
|
description:
|
||||||
|
- Negate source address param.
|
||||||
|
default: false
|
||||||
|
choices: ["true", "false"]
|
||||||
|
dst_addr:
|
||||||
|
description:
|
||||||
|
- Specifies destination address (or group) object name(s).
|
||||||
|
required: true
|
||||||
|
dst_addr_negate:
|
||||||
|
description:
|
||||||
|
- Negate destination address param.
|
||||||
|
default: false
|
||||||
|
choices: ["true", "false"]
|
||||||
|
policy_action:
|
||||||
|
description:
|
||||||
|
- Specifies accept or deny action policy.
|
||||||
|
choices: ['accept', 'deny']
|
||||||
|
required: true
|
||||||
|
aliases: ['action']
|
||||||
|
service:
|
||||||
|
description:
|
||||||
|
- "Specifies policy service(s), could be a list (ex: ['MAIL','DNS'])."
|
||||||
|
required: true
|
||||||
|
aliases:
|
||||||
|
- services
|
||||||
|
service_negate:
|
||||||
|
description:
|
||||||
|
- Negate policy service(s) defined in service value.
|
||||||
|
default: false
|
||||||
|
choices: ["true", "false"]
|
||||||
|
schedule:
|
||||||
|
description:
|
||||||
|
- defines policy schedule.
|
||||||
|
default: 'always'
|
||||||
|
nat:
|
||||||
|
description:
|
||||||
|
- Enable or disable Nat.
|
||||||
|
default: false
|
||||||
|
choices: ["true", "false"]
|
||||||
|
fixedport:
|
||||||
|
description:
|
||||||
|
- Use fixed port for nat.
|
||||||
|
default: false
|
||||||
|
choices: ["true", "false"]
|
||||||
|
poolname:
|
||||||
|
description:
|
||||||
|
- Specifies NAT pool name.
|
||||||
|
av_profile:
|
||||||
|
description:
|
||||||
|
- Specifies Antivirus profile name.
|
||||||
|
webfilter_profile:
|
||||||
|
description:
|
||||||
|
- Specifies Webfilter profile name.
|
||||||
|
ips_sensor:
|
||||||
|
description:
|
||||||
|
- Specifies IPS Sensor profile name.
|
||||||
|
application_list:
|
||||||
|
description:
|
||||||
|
- Specifies Application Control name.
|
||||||
|
comment:
|
||||||
|
description:
|
||||||
|
- free text to describe policy.
|
||||||
|
notes:
|
||||||
|
- This module requires pyFG library.
|
||||||
|
"""
|
||||||
|
|
||||||
|
EXAMPLES = """
|
||||||
|
- name: Allow external DNS call
|
||||||
|
fortios_ipv4_policy:
|
||||||
|
host: 192.168.0.254
|
||||||
|
username: admin
|
||||||
|
password: password
|
||||||
|
id: 42
|
||||||
|
srcaddr: internal_network
|
||||||
|
dstaddr: all
|
||||||
|
service: dns
|
||||||
|
nat: True
|
||||||
|
state: present
|
||||||
|
policy_action: accept
|
||||||
|
|
||||||
|
- name: Public Web
|
||||||
|
fortios_ipv4_policy:
|
||||||
|
host: 192.168.0.254
|
||||||
|
username: admin
|
||||||
|
password: password
|
||||||
|
id: 42
|
||||||
|
srcaddr: all
|
||||||
|
dstaddr: webservers
|
||||||
|
services:
|
||||||
|
- http
|
||||||
|
- https
|
||||||
|
state: present
|
||||||
|
policy_action: accept
|
||||||
|
"""
|
||||||
|
|
||||||
|
RETURN = """
|
||||||
|
firewall_address_config:
|
||||||
|
description: full firewall adresses config string
|
||||||
|
returned: always
|
||||||
|
type: string
|
||||||
|
change_string:
|
||||||
|
description: The commands executed by the module
|
||||||
|
returned: only if config changed
|
||||||
|
type: string
|
||||||
|
msg_error_list:
|
||||||
|
description: "List of errors returned by CLI (use -vvv for better readability)."
|
||||||
|
returned: only when error
|
||||||
|
type: string
|
||||||
|
"""
|
||||||
|
|
||||||
|
from ansible.module_utils.fortios import fortios_argument_spec, fortios_required_if
|
||||||
|
from ansible.module_utils.fortios import backup, AnsibleFortios
|
||||||
|
|
||||||
|
from ansible.module_utils.basic import AnsibleModule
|
||||||
|
from ansible.module_utils.pycompat24 import get_exception
|
||||||
|
|
||||||
|
|
||||||
|
def main():
|
||||||
|
argument_spec = dict(
|
||||||
|
comment = dict(type='str'),
|
||||||
|
id = dict(type='int', required=True),
|
||||||
|
src_intf = dict(default='any'),
|
||||||
|
dst_intf = dict(default='any'),
|
||||||
|
state = dict(choices=['present', 'absent'], default='present'),
|
||||||
|
src_addr = dict(required=True, type='list'),
|
||||||
|
dst_addr = dict(required=True, type='list'),
|
||||||
|
src_addr_negate = dict(type='bool', default=False),
|
||||||
|
dst_addr_negate = dict(type='bool', default=False),
|
||||||
|
policy_action = dict(choices=['accept','deny'], required=True, aliases=['action']),
|
||||||
|
service = dict(aliases=['services'], required=True, type='list'),
|
||||||
|
service_negate = dict(type='bool', default=False),
|
||||||
|
schedule = dict(type='str', default='always'),
|
||||||
|
nat = dict(type='bool', default=False),
|
||||||
|
fixedport = dict(type='bool', default=False),
|
||||||
|
poolname = dict(type='str'),
|
||||||
|
av_profile = dict(type='str'),
|
||||||
|
webfilter_profile = dict(type='str'),
|
||||||
|
ips_sensor = dict(type='str'),
|
||||||
|
application_list = dict(type='str'),
|
||||||
|
)
|
||||||
|
|
||||||
|
#merge global required_if & argument_spec from module_utils/fortios.py
|
||||||
|
argument_spec.update(fortios_argument_spec)
|
||||||
|
|
||||||
|
module = AnsibleModule(
|
||||||
|
argument_spec=argument_spec,
|
||||||
|
supports_check_mode=True,
|
||||||
|
required_if=fortios_required_if,
|
||||||
|
)
|
||||||
|
|
||||||
|
#init forti object
|
||||||
|
fortigate = AnsibleFortios(module)
|
||||||
|
|
||||||
|
#test params
|
||||||
|
#NAT related
|
||||||
|
if not module.params['nat']:
|
||||||
|
if module.params['poolname']:
|
||||||
|
module.fail_json(msg='Poolname param requires NAT to be true.')
|
||||||
|
if module.params['fixedport']:
|
||||||
|
module.fail_json(msg='Fixedport param requires NAT to be true.')
|
||||||
|
|
||||||
|
#id must be str(int) for pyFG to work
|
||||||
|
policy_id = str(module.params['id'])
|
||||||
|
|
||||||
|
#load config
|
||||||
|
fortigate.load_config('firewall policy')
|
||||||
|
|
||||||
|
#Absent State
|
||||||
|
if module.params['state'] == 'absent':
|
||||||
|
fortigate.candidate_config[path].del_block(policy_id)
|
||||||
|
|
||||||
|
#Present state
|
||||||
|
elif module.params['state'] == 'present':
|
||||||
|
new_policy = fortigate.get_empty_configuration_block(policy_id, 'edit')
|
||||||
|
|
||||||
|
#src / dest / service / interfaces
|
||||||
|
new_policy.set_param('srcintf', '"%s"' % (module.params['src_intf']))
|
||||||
|
new_policy.set_param('dstintf', '"%s"' % (module.params['dst_intf']))
|
||||||
|
|
||||||
|
|
||||||
|
new_policy.set_param('srcaddr', " ".join('"' + item + '"' for item in module.params['src_addr']))
|
||||||
|
new_policy.set_param('dstaddr', " ".join('"' + item + '"' for item in module.params['dst_addr']))
|
||||||
|
new_policy.set_param('service', " ".join('"' + item + '"' for item in module.params['service']))
|
||||||
|
|
||||||
|
# negate src / dest / service
|
||||||
|
if module.params['src_addr_negate']:
|
||||||
|
new_policy.set_param('srcaddr-negate', 'enable')
|
||||||
|
if module.params['dst_addr_negate']:
|
||||||
|
new_policy.set_param('dstaddr-negate', 'enable')
|
||||||
|
if module.params['service_negate']:
|
||||||
|
new_policy.set_param('service-negate', 'enable')
|
||||||
|
|
||||||
|
# action
|
||||||
|
new_policy.set_param('action', '%s' % (module.params['policy_action']))
|
||||||
|
|
||||||
|
# Schedule
|
||||||
|
new_policy.set_param('schedule', '%s' % (module.params['schedule']))
|
||||||
|
|
||||||
|
#NAT
|
||||||
|
if module.params['nat']:
|
||||||
|
new_policy.set_param('nat', 'enable')
|
||||||
|
if module.params['fixedport']:
|
||||||
|
new_policy.set_param('fixedport', 'enable')
|
||||||
|
if module.params['poolname'] is not None:
|
||||||
|
new_policy.set_param('ippool', 'enable')
|
||||||
|
new_policy.set_param('poolname', '"%s"' % (module.params['poolname']))
|
||||||
|
|
||||||
|
#security profiles:
|
||||||
|
if module.params['av_profile'] is not None:
|
||||||
|
new_policy.set_param('av-profile', '"%s"' % (module.params['av_profile']))
|
||||||
|
if module.params['webfilter_profile'] is not None:
|
||||||
|
new_policy.set_param('webfilter-profile', '"%s"' % (module.params['webfilter_profile']))
|
||||||
|
if module.params['ips_sensor'] is not None:
|
||||||
|
new_policy.set_param('ips-sensor', '"%s"' % (module.params['ips_sensor']))
|
||||||
|
if module.params['application_list'] is not None:
|
||||||
|
new_policy.set_param('application-list', '"%s"' % (module.params['application_list']))
|
||||||
|
|
||||||
|
# comment
|
||||||
|
if module.params['comment'] is not None:
|
||||||
|
new_policy.set_param('comment', '"%s"' % (module.params['comment']))
|
||||||
|
|
||||||
|
#add the new policy to the device
|
||||||
|
fortigate.add_block(policy_id, new_policy)
|
||||||
|
|
||||||
|
#Apply changes
|
||||||
|
fortigate.apply_changes()
|
||||||
|
|
||||||
|
if __name__ == '__main__':
|
||||||
|
main()
|
||||||
|
|
Loading…
Reference in a new issue