Merge pull request #467 from resmo/feature/extend_cs_firewall
WIP: cloudstack: extend cs_firewall
This commit is contained in:
commit
d20d89948d
1 changed files with 95 additions and 23 deletions
|
@ -19,6 +19,7 @@
|
||||||
# along with Ansible. If not, see <http://www.gnu.org/licenses/>.
|
# along with Ansible. If not, see <http://www.gnu.org/licenses/>.
|
||||||
|
|
||||||
DOCUMENTATION = '''
|
DOCUMENTATION = '''
|
||||||
|
---
|
||||||
module: cs_firewall
|
module: cs_firewall
|
||||||
short_description: Manages firewall rules on Apache CloudStack based clouds.
|
short_description: Manages firewall rules on Apache CloudStack based clouds.
|
||||||
description:
|
description:
|
||||||
|
@ -52,9 +53,10 @@ options:
|
||||||
- Start port for this rule. Considered if C(protocol=tcp) or C(protocol=udp).
|
- Start port for this rule. Considered if C(protocol=tcp) or C(protocol=udp).
|
||||||
required: false
|
required: false
|
||||||
default: null
|
default: null
|
||||||
|
aliases: [ 'port' ]
|
||||||
end_port:
|
end_port:
|
||||||
description:
|
description:
|
||||||
- End port for this rule. Considered if C(protocol=tcp) or C(protocol=udp).
|
- End port for this rule. Considered if C(protocol=tcp) or C(protocol=udp). If not specified, equal C(start_port).
|
||||||
required: false
|
required: false
|
||||||
default: null
|
default: null
|
||||||
icmp_type:
|
icmp_type:
|
||||||
|
@ -67,9 +69,19 @@ options:
|
||||||
- Error code for this icmp message. Considered if C(protocol=icmp).
|
- Error code for this icmp message. Considered if C(protocol=icmp).
|
||||||
required: false
|
required: false
|
||||||
default: null
|
default: null
|
||||||
|
domain:
|
||||||
|
description:
|
||||||
|
- Domain the firewall rule is related to.
|
||||||
|
required: false
|
||||||
|
default: null
|
||||||
|
account:
|
||||||
|
description:
|
||||||
|
- Account the firewall rule is related to.
|
||||||
|
required: false
|
||||||
|
default: null
|
||||||
project:
|
project:
|
||||||
description:
|
description:
|
||||||
- Name of the project.
|
- Name of the project the firewall rule is related to.
|
||||||
required: false
|
required: false
|
||||||
default: null
|
default: null
|
||||||
extends_documentation_fragment: cloudstack
|
extends_documentation_fragment: cloudstack
|
||||||
|
@ -81,8 +93,7 @@ EXAMPLES = '''
|
||||||
- local_action:
|
- local_action:
|
||||||
module: cs_firewall
|
module: cs_firewall
|
||||||
ip_address: 4.3.2.1
|
ip_address: 4.3.2.1
|
||||||
start_port: 80
|
port: 80
|
||||||
end_port: 80
|
|
||||||
cidr: 1.2.3.4/32
|
cidr: 1.2.3.4/32
|
||||||
|
|
||||||
|
|
||||||
|
@ -90,8 +101,7 @@ EXAMPLES = '''
|
||||||
- local_action:
|
- local_action:
|
||||||
module: cs_firewall
|
module: cs_firewall
|
||||||
ip_address: 4.3.2.1
|
ip_address: 4.3.2.1
|
||||||
start_port: 53
|
port: 53
|
||||||
end_port: 53
|
|
||||||
protocol: '{{ item }}'
|
protocol: '{{ item }}'
|
||||||
with_items:
|
with_items:
|
||||||
- tcp
|
- tcp
|
||||||
|
@ -108,6 +118,45 @@ EXAMPLES = '''
|
||||||
state: absent
|
state: absent
|
||||||
'''
|
'''
|
||||||
|
|
||||||
|
RETURN = '''
|
||||||
|
---
|
||||||
|
ip_address:
|
||||||
|
description: IP address of the rule.
|
||||||
|
returned: success
|
||||||
|
type: string
|
||||||
|
sample: 10.100.212.10
|
||||||
|
cidr:
|
||||||
|
description: CIDR of the rule.
|
||||||
|
returned: success
|
||||||
|
type: string
|
||||||
|
sample: 0.0.0.0/0
|
||||||
|
protocol:
|
||||||
|
description: Protocol of the rule.
|
||||||
|
returned: success
|
||||||
|
type: string
|
||||||
|
sample: tcp
|
||||||
|
start_port:
|
||||||
|
description: Start port of the rule.
|
||||||
|
returned: success
|
||||||
|
type: int
|
||||||
|
sample: 80
|
||||||
|
end_port:
|
||||||
|
description: End port of the rule.
|
||||||
|
returned: success
|
||||||
|
type: int
|
||||||
|
sample: 80
|
||||||
|
icmp_code:
|
||||||
|
description: ICMP code of the rule.
|
||||||
|
returned: success
|
||||||
|
type: int
|
||||||
|
sample: 1
|
||||||
|
icmp_type:
|
||||||
|
description: ICMP type of the rule.
|
||||||
|
returned: success
|
||||||
|
type: int
|
||||||
|
sample: 1
|
||||||
|
'''
|
||||||
|
|
||||||
try:
|
try:
|
||||||
from cs import CloudStack, CloudStackException, read_config
|
from cs import CloudStack, CloudStackException, read_config
|
||||||
has_lib_cs = True
|
has_lib_cs = True
|
||||||
|
@ -128,12 +177,18 @@ class AnsibleCloudStackFirewall(AnsibleCloudStack):
|
||||||
self.firewall_rule = None
|
self.firewall_rule = None
|
||||||
|
|
||||||
|
|
||||||
|
def get_end_port(self):
|
||||||
|
if self.module.params.get('end_port'):
|
||||||
|
return self.module.params.get('end_port')
|
||||||
|
return self.module.params.get('start_port')
|
||||||
|
|
||||||
|
|
||||||
def get_firewall_rule(self):
|
def get_firewall_rule(self):
|
||||||
if not self.firewall_rule:
|
if not self.firewall_rule:
|
||||||
cidr = self.module.params.get('cidr')
|
cidr = self.module.params.get('cidr')
|
||||||
protocol = self.module.params.get('protocol')
|
protocol = self.module.params.get('protocol')
|
||||||
start_port = self.module.params.get('start_port')
|
start_port = self.module.params.get('start_port')
|
||||||
end_port = self.module.params.get('end_port')
|
end_port = self.get_end_port()
|
||||||
icmp_code = self.module.params.get('icmp_code')
|
icmp_code = self.module.params.get('icmp_code')
|
||||||
icmp_type = self.module.params.get('icmp_type')
|
icmp_type = self.module.params.get('icmp_type')
|
||||||
|
|
||||||
|
@ -144,8 +199,10 @@ class AnsibleCloudStackFirewall(AnsibleCloudStack):
|
||||||
self.module.fail_json(msg="no icmp_type set")
|
self.module.fail_json(msg="no icmp_type set")
|
||||||
|
|
||||||
args = {}
|
args = {}
|
||||||
args['ipaddressid'] = self.get_ip_address_id()
|
args['ipaddressid'] = self.get_ip_address('id')
|
||||||
args['projectid'] = self.get_project_id()
|
args['account'] = self.get_account('name')
|
||||||
|
args['domainid'] = self.get_domain('id')
|
||||||
|
args['projectid'] = self.get_project('id')
|
||||||
|
|
||||||
firewall_rules = self.cs.listFirewallRules(**args)
|
firewall_rules = self.cs.listFirewallRules(**args)
|
||||||
if firewall_rules and 'firewallrule' in firewall_rules:
|
if firewall_rules and 'firewallrule' in firewall_rules:
|
||||||
|
@ -183,14 +240,15 @@ class AnsibleCloudStackFirewall(AnsibleCloudStack):
|
||||||
firewall_rule = self.get_firewall_rule()
|
firewall_rule = self.get_firewall_rule()
|
||||||
if not firewall_rule:
|
if not firewall_rule:
|
||||||
self.result['changed'] = True
|
self.result['changed'] = True
|
||||||
|
|
||||||
args = {}
|
args = {}
|
||||||
args['cidrlist'] = self.module.params.get('cidr')
|
args['cidrlist'] = self.module.params.get('cidr')
|
||||||
args['protocol'] = self.module.params.get('protocol')
|
args['protocol'] = self.module.params.get('protocol')
|
||||||
args['startport'] = self.module.params.get('start_port')
|
args['startport'] = self.module.params.get('start_port')
|
||||||
args['endport'] = self.module.params.get('end_port')
|
args['endport'] = self.get_end_port()
|
||||||
args['icmptype'] = self.module.params.get('icmp_type')
|
args['icmptype'] = self.module.params.get('icmp_type')
|
||||||
args['icmpcode'] = self.module.params.get('icmp_code')
|
args['icmpcode'] = self.module.params.get('icmp_code')
|
||||||
args['ipaddressid'] = self.get_ip_address_id()
|
args['ipaddressid'] = self.get_ip_address('id')
|
||||||
|
|
||||||
if not self.module.check_mode:
|
if not self.module.check_mode:
|
||||||
firewall_rule = self.cs.createFirewallRule(**args)
|
firewall_rule = self.cs.createFirewallRule(**args)
|
||||||
|
@ -212,29 +270,43 @@ class AnsibleCloudStackFirewall(AnsibleCloudStack):
|
||||||
|
|
||||||
|
|
||||||
def get_result(self, firewall_rule):
|
def get_result(self, firewall_rule):
|
||||||
|
if firewall_rule:
|
||||||
|
if 'cidrlist' in firewall_rule:
|
||||||
|
self.result['cidr'] = firewall_rule['cidrlist']
|
||||||
|
if 'startport' in firewall_rule:
|
||||||
|
self.result['start_port'] = int(firewall_rule['startport'])
|
||||||
|
if 'endport' in firewall_rule:
|
||||||
|
self.result['end_port'] = int(firewall_rule['endport'])
|
||||||
|
if 'protocol' in firewall_rule:
|
||||||
|
self.result['protocol'] = firewall_rule['protocol']
|
||||||
|
if 'ipaddress' in firewall_rule:
|
||||||
|
self.result['ip_address'] = firewall_rule['ipaddress']
|
||||||
|
if 'icmpcode' in firewall_rule:
|
||||||
|
self.result['icmp_code'] = int(firewall_rule['icmpcode'])
|
||||||
|
if 'icmptype' in firewall_rule:
|
||||||
|
self.result['icmp_type'] = int(firewall_rule['icmptype'])
|
||||||
return self.result
|
return self.result
|
||||||
|
|
||||||
|
|
||||||
def main():
|
def main():
|
||||||
module = AnsibleModule(
|
module = AnsibleModule(
|
||||||
argument_spec = dict(
|
argument_spec = dict(
|
||||||
ip_address = dict(required=True, default=None),
|
ip_address = dict(required=True),
|
||||||
cidr = dict(default='0.0.0.0/0'),
|
cidr = dict(default='0.0.0.0/0'),
|
||||||
protocol = dict(choices=['tcp', 'udp', 'icmp'], default='tcp'),
|
protocol = dict(choices=['tcp', 'udp', 'icmp'], default='tcp'),
|
||||||
icmp_type = dict(type='int', default=None),
|
icmp_type = dict(type='int', default=None),
|
||||||
icmp_code = dict(type='int', default=None),
|
icmp_code = dict(type='int', default=None),
|
||||||
start_port = dict(type='int', default=None),
|
start_port = dict(type='int', aliases=['port'], default=None),
|
||||||
end_port = dict(type='int', default=None),
|
end_port = dict(type='int', default=None),
|
||||||
state = dict(choices=['present', 'absent'], default='present'),
|
state = dict(choices=['present', 'absent'], default='present'),
|
||||||
|
domain = dict(default=None),
|
||||||
|
account = dict(default=None),
|
||||||
project = dict(default=None),
|
project = dict(default=None),
|
||||||
api_key = dict(default=None),
|
api_key = dict(default=None),
|
||||||
api_secret = dict(default=None),
|
api_secret = dict(default=None),
|
||||||
api_url = dict(default=None),
|
api_url = dict(default=None),
|
||||||
api_http_method = dict(default='get'),
|
api_http_method = dict(default='get'),
|
||||||
),
|
),
|
||||||
required_together = (
|
|
||||||
['start_port', 'end_port'],
|
|
||||||
),
|
|
||||||
mutually_exclusive = (
|
mutually_exclusive = (
|
||||||
['icmp_type', 'start_port'],
|
['icmp_type', 'start_port'],
|
||||||
['icmp_type', 'end_port'],
|
['icmp_type', 'end_port'],
|
||||||
|
|
Loading…
Reference in a new issue