Add iosxr_acl_interfaces RM (#66936)
Signed-off-by: NilashishC <nilashishchakraborty8@gmail.com>
This commit is contained in:
parent
493dda94e9
commit
e632d93371
26 changed files with 2205 additions and 8 deletions
|
@ -0,0 +1,88 @@
|
||||||
|
#
|
||||||
|
# -*- coding: utf-8 -*-
|
||||||
|
# Copyright 2019 Red Hat
|
||||||
|
# GNU General Public License v3.0+
|
||||||
|
# (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt)
|
||||||
|
|
||||||
|
#############################################
|
||||||
|
# WARNING #
|
||||||
|
#############################################
|
||||||
|
#
|
||||||
|
# This file is auto generated by the resource
|
||||||
|
# module builder playbook.
|
||||||
|
#
|
||||||
|
# Do not edit this file manually.
|
||||||
|
#
|
||||||
|
# Changes to this file will be over written
|
||||||
|
# by the resource module builder.
|
||||||
|
#
|
||||||
|
# Changes should be made in the model used to
|
||||||
|
# generate this file or in the resource module
|
||||||
|
# builder template.
|
||||||
|
#
|
||||||
|
#############################################
|
||||||
|
"""
|
||||||
|
The arg spec for the iosxr_acl_interfaces module
|
||||||
|
"""
|
||||||
|
|
||||||
|
from __future__ import absolute_import, division, print_function
|
||||||
|
__metaclass__ = type
|
||||||
|
|
||||||
|
|
||||||
|
class Acl_interfacesArgs(object): # pylint: disable=R0903
|
||||||
|
"""The arg spec for the iosxr_acl_interfaces module
|
||||||
|
"""
|
||||||
|
def __init__(self, **kwargs):
|
||||||
|
pass
|
||||||
|
|
||||||
|
argument_spec = {
|
||||||
|
'running_config': {
|
||||||
|
'type': 'str'
|
||||||
|
},
|
||||||
|
'config': {
|
||||||
|
'elements': 'dict',
|
||||||
|
'options': {
|
||||||
|
'access_groups': {
|
||||||
|
'elements': 'dict',
|
||||||
|
'options': {
|
||||||
|
'acls': {
|
||||||
|
'elements': 'dict',
|
||||||
|
'options': {
|
||||||
|
'direction': {
|
||||||
|
'choices': ['in', 'out'],
|
||||||
|
'type': 'str',
|
||||||
|
'required': True
|
||||||
|
},
|
||||||
|
'name': {
|
||||||
|
'type': 'str',
|
||||||
|
'required': True
|
||||||
|
}
|
||||||
|
},
|
||||||
|
'type': 'list'
|
||||||
|
},
|
||||||
|
'afi': {
|
||||||
|
'choices': ['ipv4', 'ipv6'],
|
||||||
|
'type': 'str',
|
||||||
|
'required': True
|
||||||
|
}
|
||||||
|
},
|
||||||
|
'type': 'list'
|
||||||
|
},
|
||||||
|
'name': {
|
||||||
|
'type': 'str',
|
||||||
|
'required': True
|
||||||
|
}
|
||||||
|
},
|
||||||
|
'type': 'list'
|
||||||
|
},
|
||||||
|
'state': {
|
||||||
|
'choices': [
|
||||||
|
'merged', 'replaced', 'overridden', 'deleted', 'gathered',
|
||||||
|
'parsed', 'rendered'
|
||||||
|
],
|
||||||
|
'default':
|
||||||
|
'merged',
|
||||||
|
'type':
|
||||||
|
'str'
|
||||||
|
}
|
||||||
|
} # pylint: disable=C0301
|
|
@ -0,0 +1,318 @@
|
||||||
|
#
|
||||||
|
# -*- coding: utf-8 -*-
|
||||||
|
# Copyright 2019 Red Hat
|
||||||
|
# GNU General Public License v3.0+
|
||||||
|
# (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt)
|
||||||
|
"""
|
||||||
|
The iosxr_acl_interfaces class
|
||||||
|
It is in this file where the current configuration (as dict)
|
||||||
|
is compared to the provided configuration (as dict) and the command set
|
||||||
|
necessary to bring the current configuration to it's desired end-state is
|
||||||
|
created
|
||||||
|
"""
|
||||||
|
|
||||||
|
from __future__ import absolute_import, division, print_function
|
||||||
|
__metaclass__ = type
|
||||||
|
|
||||||
|
|
||||||
|
from ansible.module_utils.network.common.cfg.base import ConfigBase
|
||||||
|
from ansible.module_utils.network.iosxr.facts.facts import Facts
|
||||||
|
from ansible.module_utils.network.iosxr.utils.utils import normalize_interface, diff_list_of_dicts, pad_commands
|
||||||
|
from ansible.module_utils.network.common.utils \
|
||||||
|
import (
|
||||||
|
to_list,
|
||||||
|
dict_diff,
|
||||||
|
search_obj_in_list,
|
||||||
|
remove_empties
|
||||||
|
)
|
||||||
|
|
||||||
|
|
||||||
|
class Acl_interfaces(ConfigBase):
|
||||||
|
"""
|
||||||
|
The iosxr_acl_interfaces class
|
||||||
|
"""
|
||||||
|
|
||||||
|
gather_subset = [
|
||||||
|
'!all',
|
||||||
|
'!min',
|
||||||
|
]
|
||||||
|
|
||||||
|
gather_network_resources = [
|
||||||
|
'acl_interfaces',
|
||||||
|
]
|
||||||
|
|
||||||
|
def __init__(self, module):
|
||||||
|
super(Acl_interfaces, self).__init__(module)
|
||||||
|
|
||||||
|
def get_acl_interfaces_facts(self, data=None):
|
||||||
|
""" Get the 'facts' (the current configuration)
|
||||||
|
|
||||||
|
:rtype: A dictionary
|
||||||
|
:returns: The current configuration as a dictionary
|
||||||
|
"""
|
||||||
|
facts, _warnings = Facts(self._module).get_facts(
|
||||||
|
self.gather_subset, self.gather_network_resources, data=data)
|
||||||
|
acl_interfaces_facts = facts['ansible_network_resources'].get(
|
||||||
|
'acl_interfaces')
|
||||||
|
if not acl_interfaces_facts:
|
||||||
|
return []
|
||||||
|
return acl_interfaces_facts
|
||||||
|
|
||||||
|
def execute_module(self):
|
||||||
|
""" Execute the module
|
||||||
|
|
||||||
|
:rtype: A dictionary
|
||||||
|
:returns: The result from module execution
|
||||||
|
"""
|
||||||
|
result = {'changed': False}
|
||||||
|
warnings = list()
|
||||||
|
commands = list()
|
||||||
|
|
||||||
|
if self.state in self.ACTION_STATES:
|
||||||
|
existing_acl_interfaces_facts = self.get_acl_interfaces_facts()
|
||||||
|
else:
|
||||||
|
existing_acl_interfaces_facts = []
|
||||||
|
|
||||||
|
if self.state in self.ACTION_STATES or self.state == "rendered":
|
||||||
|
commands.extend(self.set_config(existing_acl_interfaces_facts))
|
||||||
|
|
||||||
|
if commands and self.state in self.ACTION_STATES:
|
||||||
|
if not self._module.check_mode:
|
||||||
|
self._connection.edit_config(commands)
|
||||||
|
result["changed"] = True
|
||||||
|
|
||||||
|
if self.state in self.ACTION_STATES:
|
||||||
|
result["commands"] = commands
|
||||||
|
|
||||||
|
if self.state in self.ACTION_STATES or self.state == "gathered":
|
||||||
|
changed_acl_interfaces_facts = self.get_acl_interfaces_facts()
|
||||||
|
|
||||||
|
elif self.state == "rendered":
|
||||||
|
result["rendered"] = commands
|
||||||
|
|
||||||
|
elif self.state == "parsed":
|
||||||
|
running_config = self._module.params["running_config"]
|
||||||
|
if not running_config:
|
||||||
|
self._module.fail_json(msg="value of running_config parameter must not be empty for state parsed")
|
||||||
|
result["parsed"] = self.get_acl_interfaces_facts(
|
||||||
|
data=running_config)
|
||||||
|
|
||||||
|
if self.state in self.ACTION_STATES:
|
||||||
|
result["before"] = existing_acl_interfaces_facts
|
||||||
|
if result["changed"]:
|
||||||
|
result["after"] = changed_acl_interfaces_facts
|
||||||
|
|
||||||
|
elif self.state == "gathered":
|
||||||
|
result["gathered"] = changed_acl_interfaces_facts
|
||||||
|
|
||||||
|
result["warnings"] = warnings
|
||||||
|
return result
|
||||||
|
|
||||||
|
def set_config(self, existing_acl_interfaces_facts):
|
||||||
|
""" Collect the configuration from the args passed to the module,
|
||||||
|
collect the current configuration (as a dict from facts)
|
||||||
|
|
||||||
|
:rtype: A list
|
||||||
|
:returns: the commands necessary to migrate the current configuration
|
||||||
|
to the desired configuration
|
||||||
|
"""
|
||||||
|
want = self._module.params['config']
|
||||||
|
if want:
|
||||||
|
for item in want:
|
||||||
|
item['name'] = normalize_interface(item['name'])
|
||||||
|
if 'members' in want and want['members']:
|
||||||
|
for item in want['members']:
|
||||||
|
item.update({
|
||||||
|
'member':
|
||||||
|
normalize_interface(item['member']),
|
||||||
|
'mode':
|
||||||
|
item['mode']
|
||||||
|
})
|
||||||
|
have = existing_acl_interfaces_facts
|
||||||
|
resp = self.set_state(want, have)
|
||||||
|
return to_list(resp)
|
||||||
|
|
||||||
|
def set_state(self, want, have):
|
||||||
|
""" Select the appropriate function based on the state provided
|
||||||
|
|
||||||
|
:param want: the desired configuration as a dictionary
|
||||||
|
:param have: the current configuration as a dictionary
|
||||||
|
:rtype: A list
|
||||||
|
:returns: the commands necessary to migrate the current configuration
|
||||||
|
to the desired configuration
|
||||||
|
"""
|
||||||
|
state = self._module.params['state']
|
||||||
|
commands = []
|
||||||
|
|
||||||
|
if state in ('overridden', 'merged', 'replaced', 'rendered') and not want:
|
||||||
|
self._module.fail_json(msg='value of config parameter must not be empty for state {0}'.format(state))
|
||||||
|
|
||||||
|
if state == 'overridden':
|
||||||
|
commands.extend(self._state_overridden(want, have))
|
||||||
|
|
||||||
|
elif state == 'deleted':
|
||||||
|
if not want:
|
||||||
|
for intf in have:
|
||||||
|
commands.extend(self._state_deleted({}, intf))
|
||||||
|
else:
|
||||||
|
for item in want:
|
||||||
|
obj_in_have = search_obj_in_list(item['name'], have) or {}
|
||||||
|
commands.extend(
|
||||||
|
self._state_deleted(remove_empties(item), obj_in_have))
|
||||||
|
|
||||||
|
else:
|
||||||
|
# Instead of passing entire want and have
|
||||||
|
# list of dictionaries to the respective
|
||||||
|
# _state_* methods we are passing the want
|
||||||
|
# and have dictionaries per interface
|
||||||
|
for item in want:
|
||||||
|
name = item['name']
|
||||||
|
obj_in_have = search_obj_in_list(name, have) or {}
|
||||||
|
|
||||||
|
if state == 'merged' or state == 'rendered':
|
||||||
|
commands.extend(self._state_merged(item, obj_in_have))
|
||||||
|
|
||||||
|
elif state == 'replaced':
|
||||||
|
commands.extend(self._state_replaced(item, obj_in_have))
|
||||||
|
|
||||||
|
return commands
|
||||||
|
|
||||||
|
def _state_replaced(self, want, have):
|
||||||
|
""" The command generator when state is replaced
|
||||||
|
|
||||||
|
:rtype: A list
|
||||||
|
:returns: the commands necessary to migrate the current configuration
|
||||||
|
to the desired configuration
|
||||||
|
"""
|
||||||
|
commands = []
|
||||||
|
|
||||||
|
want = remove_empties(want)
|
||||||
|
|
||||||
|
delete_commands = []
|
||||||
|
for have_afi in have.get('access_groups', []):
|
||||||
|
want_afi = search_obj_in_list(have_afi['afi'],
|
||||||
|
want.get('access_groups', []),
|
||||||
|
key='afi') or {}
|
||||||
|
afi = have_afi.get('afi')
|
||||||
|
|
||||||
|
for acl in have_afi.get('acls', []):
|
||||||
|
if acl not in want_afi.get('acls', []):
|
||||||
|
delete_commands.extend(
|
||||||
|
self._compute_commands(afi, [acl], remove=True))
|
||||||
|
|
||||||
|
if delete_commands:
|
||||||
|
pad_commands(delete_commands, want['name'])
|
||||||
|
commands.extend(delete_commands)
|
||||||
|
|
||||||
|
merged_commands = self._state_merged(want, have)
|
||||||
|
if merged_commands and delete_commands:
|
||||||
|
del merged_commands[0]
|
||||||
|
|
||||||
|
commands.extend(merged_commands)
|
||||||
|
|
||||||
|
return commands
|
||||||
|
|
||||||
|
def _state_overridden(self, want, have):
|
||||||
|
""" The command generator when state is overridden
|
||||||
|
|
||||||
|
:rtype: A list
|
||||||
|
:returns: the commands necessary to migrate the current configuration
|
||||||
|
to the desired configuration
|
||||||
|
"""
|
||||||
|
commands = []
|
||||||
|
|
||||||
|
for have_intf in have:
|
||||||
|
want_intf = search_obj_in_list(have_intf['name'], want) or {}
|
||||||
|
if not want_intf:
|
||||||
|
commands.extend(self._state_deleted(want_intf, have_intf))
|
||||||
|
|
||||||
|
for want_intf in want:
|
||||||
|
have_intf = search_obj_in_list(want_intf['name'], have) or {}
|
||||||
|
commands.extend(self._state_replaced(want_intf, have_intf))
|
||||||
|
|
||||||
|
return commands
|
||||||
|
|
||||||
|
def _state_merged(self, want, have):
|
||||||
|
""" The command generator when state is merged
|
||||||
|
|
||||||
|
:rtype: A list
|
||||||
|
:returns: the commands necessary to merge the provided into
|
||||||
|
the current configuration
|
||||||
|
"""
|
||||||
|
commands = []
|
||||||
|
|
||||||
|
want = remove_empties(want)
|
||||||
|
|
||||||
|
for want_afi in want.get('access_groups', []):
|
||||||
|
have_afi = search_obj_in_list(want_afi['afi'],
|
||||||
|
have.get('access_groups', []),
|
||||||
|
key='afi') or {}
|
||||||
|
delta = diff_list_of_dicts(want_afi['acls'],
|
||||||
|
have_afi.get('acls', []),
|
||||||
|
key='direction')
|
||||||
|
commands.extend(self._compute_commands(want_afi['afi'], delta))
|
||||||
|
|
||||||
|
if commands:
|
||||||
|
pad_commands(commands, want['name'])
|
||||||
|
|
||||||
|
return commands
|
||||||
|
|
||||||
|
def _state_deleted(self, want, have):
|
||||||
|
""" The command generator when state is deleted
|
||||||
|
|
||||||
|
:rtype: A list
|
||||||
|
:returns: the commands necessary to remove the current configuration
|
||||||
|
of the provided objects
|
||||||
|
"""
|
||||||
|
commands = []
|
||||||
|
|
||||||
|
# This handles deletion for both empty/no config
|
||||||
|
# and just interface name provided.
|
||||||
|
if 'access_groups' not in want:
|
||||||
|
for x in have.get('access_groups', []):
|
||||||
|
afi = x.get('afi')
|
||||||
|
for have_acl in x.get('acls', []):
|
||||||
|
commands.extend(
|
||||||
|
self._compute_commands(afi, [have_acl], remove=True))
|
||||||
|
|
||||||
|
else:
|
||||||
|
for want_afi in want['access_groups']:
|
||||||
|
have_afi = search_obj_in_list(want_afi['afi'],
|
||||||
|
have.get('access_groups', []),
|
||||||
|
key='afi') or {}
|
||||||
|
afi = have_afi.get('afi')
|
||||||
|
|
||||||
|
# If only the AFI has be specified, we
|
||||||
|
# delete all the access-groups for that AFI
|
||||||
|
if 'acls' not in want_afi:
|
||||||
|
for have_acl in have_afi.get('acls', []):
|
||||||
|
commands.extend(
|
||||||
|
self._compute_commands(afi, [have_acl],
|
||||||
|
remove=True))
|
||||||
|
|
||||||
|
# If one or more acl has been explicitly specified, we
|
||||||
|
# delete that and leave the rest untouched
|
||||||
|
else:
|
||||||
|
for acl in want_afi['acls']:
|
||||||
|
if acl in have_afi.get('acls', []):
|
||||||
|
commands.extend(
|
||||||
|
self._compute_commands(afi, [acl],
|
||||||
|
remove=True))
|
||||||
|
|
||||||
|
if commands:
|
||||||
|
pad_commands(commands, have['name'])
|
||||||
|
|
||||||
|
return commands
|
||||||
|
|
||||||
|
def _compute_commands(self, afi, delta, remove=False):
|
||||||
|
updates = []
|
||||||
|
map_dir = {'in': 'ingress', 'out': 'egress'}
|
||||||
|
|
||||||
|
for x in delta:
|
||||||
|
cmd = "{0} access-group {1} {2}".format(afi, x['name'],
|
||||||
|
map_dir[x['direction']])
|
||||||
|
if remove:
|
||||||
|
cmd = "no " + cmd
|
||||||
|
updates.append(cmd)
|
||||||
|
|
||||||
|
return updates
|
|
@ -0,0 +1,104 @@
|
||||||
|
#
|
||||||
|
# -*- coding: utf-8 -*-
|
||||||
|
# Copyright 2019 Red Hat
|
||||||
|
# GNU General Public License v3.0+
|
||||||
|
# (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt)
|
||||||
|
"""
|
||||||
|
The iosxr acl_interfaces fact class
|
||||||
|
It is in this file the configuration is collected from the device
|
||||||
|
for a given resource, parsed, and the facts tree is populated
|
||||||
|
based on the configuration.
|
||||||
|
"""
|
||||||
|
|
||||||
|
from __future__ import absolute_import, division, print_function
|
||||||
|
__metaclass__ = type
|
||||||
|
|
||||||
|
import re
|
||||||
|
from copy import deepcopy
|
||||||
|
from ansible.module_utils.six import iteritems
|
||||||
|
from ansible.module_utils.network.common import utils
|
||||||
|
from ansible.module_utils.network.iosxr.argspec.acl_interfaces.acl_interfaces import Acl_interfacesArgs
|
||||||
|
|
||||||
|
|
||||||
|
class Acl_interfacesFacts(object):
|
||||||
|
""" The iosxr acl_interfaces fact class
|
||||||
|
"""
|
||||||
|
def __init__(self, module, subspec='config', options='options'):
|
||||||
|
self._module = module
|
||||||
|
self.argument_spec = Acl_interfacesArgs.argument_spec
|
||||||
|
spec = deepcopy(self.argument_spec)
|
||||||
|
if subspec:
|
||||||
|
if options:
|
||||||
|
facts_argument_spec = spec[subspec][options]
|
||||||
|
else:
|
||||||
|
facts_argument_spec = spec[subspec]
|
||||||
|
else:
|
||||||
|
facts_argument_spec = spec
|
||||||
|
|
||||||
|
self.generated_spec = utils.generate_dict(facts_argument_spec)
|
||||||
|
|
||||||
|
def populate_facts(self, connection, ansible_facts, data=None):
|
||||||
|
""" Populate the facts for acl_interfaces
|
||||||
|
:param connection: the device connection
|
||||||
|
:param ansible_facts: Facts dictionary
|
||||||
|
:param data: previously collected conf
|
||||||
|
:rtype: dictionary
|
||||||
|
:returns: facts
|
||||||
|
"""
|
||||||
|
|
||||||
|
if not data:
|
||||||
|
data = connection.get_config(flags='interface')
|
||||||
|
|
||||||
|
interfaces = data.split('interface ')
|
||||||
|
|
||||||
|
objs = []
|
||||||
|
for interface in interfaces:
|
||||||
|
obj = self.render_config(self.generated_spec, interface)
|
||||||
|
if obj:
|
||||||
|
objs.append(obj)
|
||||||
|
|
||||||
|
ansible_facts['ansible_network_resources'].pop('acl_interfaces', None)
|
||||||
|
facts = {}
|
||||||
|
facts['acl_interfaces'] = []
|
||||||
|
params = utils.validate_config(self.argument_spec, {'config': objs})
|
||||||
|
for cfg in params['config']:
|
||||||
|
facts['acl_interfaces'].append(utils.remove_empties(cfg))
|
||||||
|
|
||||||
|
ansible_facts['ansible_network_resources'].update(facts)
|
||||||
|
return ansible_facts
|
||||||
|
|
||||||
|
def render_config(self, spec, conf):
|
||||||
|
"""
|
||||||
|
Render config as dictionary structure and delete keys
|
||||||
|
from spec for null values
|
||||||
|
|
||||||
|
:param spec: The facts tree, generated from the argspec
|
||||||
|
:param conf: The configuration
|
||||||
|
:rtype: dictionary
|
||||||
|
:returns: The generated config
|
||||||
|
"""
|
||||||
|
config = deepcopy(spec)
|
||||||
|
config['access_groups'] = []
|
||||||
|
map_dir = {'ingress': 'in', 'egress': 'out'}
|
||||||
|
|
||||||
|
match = re.search(r'(?:preconfigure)*(?:\s*)(\S+)', conf, re.M)
|
||||||
|
if match:
|
||||||
|
config['name'] = match.group(1)
|
||||||
|
acls = {'ipv4': [], 'ipv6': []}
|
||||||
|
for item in conf.split('\n'):
|
||||||
|
item = item.strip()
|
||||||
|
if item.startswith('ipv4 access-group'):
|
||||||
|
acls['ipv4'].append(item)
|
||||||
|
elif item.startswith('ipv6 access-group'):
|
||||||
|
acls['ipv6'].append(item)
|
||||||
|
|
||||||
|
for key, value in iteritems(acls):
|
||||||
|
if value:
|
||||||
|
entry = {'afi': key, 'acls': []}
|
||||||
|
for item in value:
|
||||||
|
entry['acls'].append({'name': item.split()[2], 'direction': map_dir[item.split()[3]]})
|
||||||
|
config['access_groups'].append(entry)
|
||||||
|
|
||||||
|
config['access_groups'] = sorted(config['access_groups'], key=lambda i: i['afi'])
|
||||||
|
|
||||||
|
return utils.remove_empties(config)
|
|
@ -23,7 +23,7 @@ from ansible.module_utils.network.iosxr.facts.interfaces.interfaces import Inter
|
||||||
from ansible.module_utils.network.iosxr.facts.lag_interfaces.lag_interfaces import Lag_interfacesFacts
|
from ansible.module_utils.network.iosxr.facts.lag_interfaces.lag_interfaces import Lag_interfacesFacts
|
||||||
from ansible.module_utils.network.iosxr.facts.l2_interfaces.l2_interfaces import L2_InterfacesFacts
|
from ansible.module_utils.network.iosxr.facts.l2_interfaces.l2_interfaces import L2_InterfacesFacts
|
||||||
from ansible.module_utils.network.iosxr.facts.l3_interfaces.l3_interfaces import L3_InterfacesFacts
|
from ansible.module_utils.network.iosxr.facts.l3_interfaces.l3_interfaces import L3_InterfacesFacts
|
||||||
|
from ansible.module_utils.network.iosxr.facts.acl_interfaces.acl_interfaces import Acl_interfacesFacts
|
||||||
|
|
||||||
FACT_LEGACY_SUBSETS = dict(
|
FACT_LEGACY_SUBSETS = dict(
|
||||||
default=Default,
|
default=Default,
|
||||||
|
@ -39,7 +39,8 @@ FACT_RESOURCE_SUBSETS = dict(
|
||||||
interfaces=InterfacesFacts,
|
interfaces=InterfacesFacts,
|
||||||
l2_interfaces=L2_InterfacesFacts,
|
l2_interfaces=L2_InterfacesFacts,
|
||||||
lag_interfaces=Lag_interfacesFacts,
|
lag_interfaces=Lag_interfacesFacts,
|
||||||
l3_interfaces=L3_InterfacesFacts
|
l3_interfaces=L3_InterfacesFacts,
|
||||||
|
acl_interfaces=Acl_interfacesFacts
|
||||||
)
|
)
|
||||||
|
|
||||||
|
|
||||||
|
|
|
@ -98,7 +98,10 @@ def filter_dict_having_none_value(want, have):
|
||||||
test_dict.update({'ipv4': test_key_dict})
|
test_dict.update({'ipv4': test_key_dict})
|
||||||
# Checks if want doesn't have secondary IP but have has secondary IP set
|
# Checks if want doesn't have secondary IP but have has secondary IP set
|
||||||
elif have.get('ipv4'):
|
elif have.get('ipv4'):
|
||||||
if [True for each_have in have.get('ipv4') if 'secondary' in each_have]:
|
if [
|
||||||
|
True for each_have in have.get('ipv4')
|
||||||
|
if 'secondary' in each_have
|
||||||
|
]:
|
||||||
test_dict.update({'ipv4': {'secondary': True}})
|
test_dict.update({'ipv4': {'secondary': True}})
|
||||||
if k == 'l2protocol':
|
if k == 'l2protocol':
|
||||||
if want[k] != have.get('l2protocol') and have.get('l2protocol'):
|
if want[k] != have.get('l2protocol') and have.get('l2protocol'):
|
||||||
|
@ -167,7 +170,7 @@ def pad_commands(commands, interface):
|
||||||
commands.insert(0, 'interface {0}'.format(interface))
|
commands.insert(0, 'interface {0}'.format(interface))
|
||||||
|
|
||||||
|
|
||||||
def diff_list_of_dicts(w, h):
|
def diff_list_of_dicts(w, h, key='member'):
|
||||||
"""
|
"""
|
||||||
Returns a list containing diff between
|
Returns a list containing diff between
|
||||||
two list of dictionaries
|
two list of dictionaries
|
||||||
|
@ -179,11 +182,11 @@ def diff_list_of_dicts(w, h):
|
||||||
|
|
||||||
diff = []
|
diff = []
|
||||||
for w_item in w:
|
for w_item in w:
|
||||||
h_item = search_obj_in_list(w_item['member'], h, key='member') or {}
|
h_item = search_obj_in_list(w_item[key], h, key=key) or {}
|
||||||
d = dict_diff(h_item, w_item)
|
d = dict_diff(h_item, w_item)
|
||||||
if d:
|
if d:
|
||||||
if 'member' not in d.keys():
|
if key not in d.keys():
|
||||||
d['member'] = w_item['member']
|
d[key] = w_item[key]
|
||||||
diff.append(d)
|
diff.append(d)
|
||||||
|
|
||||||
return diff
|
return diff
|
||||||
|
@ -196,7 +199,9 @@ def validate_ipv4(value, module):
|
||||||
module.fail_json(msg='address format is <ipv4 address>/<mask>, got invalid format {0}'.format(value))
|
module.fail_json(msg='address format is <ipv4 address>/<mask>, got invalid format {0}'.format(value))
|
||||||
|
|
||||||
if not is_masklen(address[1]):
|
if not is_masklen(address[1]):
|
||||||
module.fail_json(msg='invalid value for mask: {0}, mask should be in range 0-32'.format(address[1]))
|
module.fail_json(
|
||||||
|
msg='invalid value for mask: {0}, mask should be in range 0-32'
|
||||||
|
.format(address[1]))
|
||||||
|
|
||||||
|
|
||||||
def validate_ipv6(value, module):
|
def validate_ipv6(value, module):
|
||||||
|
|
743
lib/ansible/modules/network/iosxr/iosxr_acl_interfaces.py
Normal file
743
lib/ansible/modules/network/iosxr/iosxr_acl_interfaces.py
Normal file
|
@ -0,0 +1,743 @@
|
||||||
|
#!/usr/bin/python
|
||||||
|
# -*- coding: utf-8 -*-
|
||||||
|
# Copyright 2019 Red Hat
|
||||||
|
# GNU General Public License v3.0+
|
||||||
|
# (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt)
|
||||||
|
|
||||||
|
#############################################
|
||||||
|
# WARNING #
|
||||||
|
#############################################
|
||||||
|
#
|
||||||
|
# This file is auto generated by the resource
|
||||||
|
# module builder playbook.
|
||||||
|
#
|
||||||
|
# Do not edit this file manually.
|
||||||
|
#
|
||||||
|
# Changes to this file will be over written
|
||||||
|
# by the resource module builder.
|
||||||
|
#
|
||||||
|
# Changes should be made in the model used to
|
||||||
|
# generate this file or in the resource module
|
||||||
|
# builder template.
|
||||||
|
#
|
||||||
|
#############################################
|
||||||
|
|
||||||
|
"""
|
||||||
|
The module file for iosxr_acl_interfaces
|
||||||
|
"""
|
||||||
|
|
||||||
|
from __future__ import absolute_import, division, print_function
|
||||||
|
__metaclass__ = type
|
||||||
|
|
||||||
|
ANSIBLE_METADATA = {
|
||||||
|
'metadata_version': '1.1',
|
||||||
|
'status': ['preview'],
|
||||||
|
'supported_by': 'network'
|
||||||
|
}
|
||||||
|
|
||||||
|
DOCUMENTATION = """
|
||||||
|
---
|
||||||
|
module: iosxr_acl_interfaces
|
||||||
|
version_added: "2.10"
|
||||||
|
short_description: Manage Access Control Lists (ACLs) configuration for interfaces in IOS-XR.
|
||||||
|
description:
|
||||||
|
- This module manages adding and removing Access Control Lists (ACLs) from interfaces on devices running IOS-XR software.
|
||||||
|
author: Nilashish Chakraborty (@NilashishC)
|
||||||
|
options:
|
||||||
|
config:
|
||||||
|
description: A dictionary of ACL options for interfaces.
|
||||||
|
type: list
|
||||||
|
elements: dict
|
||||||
|
suboptions:
|
||||||
|
name:
|
||||||
|
description:
|
||||||
|
- Name/Identifier for the interface
|
||||||
|
type: str
|
||||||
|
required: True
|
||||||
|
access_groups:
|
||||||
|
type: list
|
||||||
|
elements: dict
|
||||||
|
description:
|
||||||
|
- Specifies ACLs attached to the interfaces.
|
||||||
|
suboptions:
|
||||||
|
afi:
|
||||||
|
description:
|
||||||
|
- Specifies the AFI for the ACL(s) to be configured on this interface.
|
||||||
|
type: str
|
||||||
|
choices: ['ipv4', 'ipv6']
|
||||||
|
required: True
|
||||||
|
acls:
|
||||||
|
type: list
|
||||||
|
description:
|
||||||
|
- Specifies the ACLs for the provided AFI.
|
||||||
|
elements: dict
|
||||||
|
suboptions:
|
||||||
|
name:
|
||||||
|
description:
|
||||||
|
- Specifies the name of the IPv4/IPv6 ACL for the interface.
|
||||||
|
type: str
|
||||||
|
required: True
|
||||||
|
direction:
|
||||||
|
description:
|
||||||
|
- Specifies the direction of packets that the ACL will be applied on.
|
||||||
|
type: str
|
||||||
|
choices: ['in', 'out']
|
||||||
|
required: True
|
||||||
|
running_config:
|
||||||
|
description:
|
||||||
|
- The module, by default, will connect to the remote device and
|
||||||
|
retrieve the current running-config to use as a base for comparing
|
||||||
|
against the contents of source. There are times when it is not
|
||||||
|
desirable to have the task get the current running-config for
|
||||||
|
every task in a playbook. The I(running_config) argument allows the
|
||||||
|
implementer to pass in the configuration to use as the base
|
||||||
|
config for comparison. This value of this option should be the
|
||||||
|
output received from device by executing command
|
||||||
|
B(show running-config interface).
|
||||||
|
type: str
|
||||||
|
state:
|
||||||
|
description:
|
||||||
|
- The state the configuration should be left in.
|
||||||
|
type: str
|
||||||
|
choices:
|
||||||
|
- merged
|
||||||
|
- replaced
|
||||||
|
- overridden
|
||||||
|
- deleted
|
||||||
|
- gathered
|
||||||
|
- parsed
|
||||||
|
- rendered
|
||||||
|
default: merged
|
||||||
|
"""
|
||||||
|
EXAMPLES = """
|
||||||
|
# Using merged
|
||||||
|
|
||||||
|
# Before state:
|
||||||
|
# -------------
|
||||||
|
#
|
||||||
|
# RP/0/RP0/CPU0:ios#sh running-config interface
|
||||||
|
# Wed Jan 15 12:22:32.911 UTC
|
||||||
|
# interface MgmtEth0/RP0/CPU0/0
|
||||||
|
# ipv4 address dhcp
|
||||||
|
# !
|
||||||
|
# interface GigabitEthernet0/0/0/0
|
||||||
|
# shutdown
|
||||||
|
# !
|
||||||
|
# interface GigabitEthernet0/0/0/1
|
||||||
|
# shutdown
|
||||||
|
# !
|
||||||
|
|
||||||
|
- name: Merge the provided configuration with the existing running configuration
|
||||||
|
iosxr_acl_interfaces:
|
||||||
|
config:
|
||||||
|
- name: GigabitEthernet0/0/0/0
|
||||||
|
access_groups:
|
||||||
|
- afi: ipv4
|
||||||
|
acls:
|
||||||
|
- name: acl_1
|
||||||
|
direction: in
|
||||||
|
- name: acl_2
|
||||||
|
direction: out
|
||||||
|
- afi: ipv6
|
||||||
|
acls:
|
||||||
|
- name: acl6_1
|
||||||
|
direction: in
|
||||||
|
- name: acl6_2
|
||||||
|
direction: out
|
||||||
|
|
||||||
|
- name: GigabitEthernet0/0/0/1
|
||||||
|
access_groups:
|
||||||
|
- afi: ipv4
|
||||||
|
acls:
|
||||||
|
- name: acl_1
|
||||||
|
direction: out
|
||||||
|
state: merged
|
||||||
|
|
||||||
|
# After state:
|
||||||
|
# -------------
|
||||||
|
#
|
||||||
|
# RP/0/RP0/CPU0:ios#sh running-config interface
|
||||||
|
# Wed Jan 15 12:27:49.378 UTC
|
||||||
|
# interface MgmtEth0/RP0/CPU0/0
|
||||||
|
# ipv4 address dhcp
|
||||||
|
# !
|
||||||
|
# interface GigabitEthernet0/0/0/0
|
||||||
|
# shutdown
|
||||||
|
# ipv4 access-group acl_1 ingress
|
||||||
|
# ipv4 access-group acl_2 egress
|
||||||
|
# ipv6 access-group acl6_1 ingress
|
||||||
|
# ipv6 access-group acl6_2 egress
|
||||||
|
# !
|
||||||
|
# interface GigabitEthernet0/0/0/1
|
||||||
|
# shutdown
|
||||||
|
# ipv4 access-group acl_1 egress
|
||||||
|
# !
|
||||||
|
|
||||||
|
# Using merged to update interface ACL configuration
|
||||||
|
|
||||||
|
# Before state:
|
||||||
|
# -------------
|
||||||
|
#
|
||||||
|
# RP/0/RP0/CPU0:ios#sh running-config interface
|
||||||
|
# Wed Jan 15 12:27:49.378 UTC
|
||||||
|
# interface MgmtEth0/RP0/CPU0/0
|
||||||
|
# ipv4 address dhcp
|
||||||
|
# !
|
||||||
|
# interface GigabitEthernet0/0/0/0
|
||||||
|
# shutdown
|
||||||
|
# ipv4 access-group acl_1 ingress
|
||||||
|
# ipv4 access-group acl_2 egress
|
||||||
|
# ipv6 access-group acl6_1 ingress
|
||||||
|
# ipv6 access-group acl6_2 egress
|
||||||
|
# !
|
||||||
|
# interface GigabitEthernet0/0/0/1
|
||||||
|
# shutdown
|
||||||
|
# ipv4 access-group acl_1 egress
|
||||||
|
# !
|
||||||
|
#
|
||||||
|
|
||||||
|
- name: Update acl_interfaces configuration using merged
|
||||||
|
iosxr_acl_interfaces:
|
||||||
|
config:
|
||||||
|
- name: GigabitEthernet0/0/0/1
|
||||||
|
access_groups:
|
||||||
|
- afi: ipv4
|
||||||
|
acls:
|
||||||
|
- name: acl_2
|
||||||
|
direction: out
|
||||||
|
- name: acl_1
|
||||||
|
direction: in
|
||||||
|
state: merged
|
||||||
|
|
||||||
|
# After state:
|
||||||
|
# -------------
|
||||||
|
#
|
||||||
|
# RP/0/RP0/CPU0:ios#sh running-config interface
|
||||||
|
# Wed Jan 15 12:27:49.378 UTC
|
||||||
|
# interface MgmtEth0/RP0/CPU0/0
|
||||||
|
# ipv4 address dhcp
|
||||||
|
# !
|
||||||
|
# interface GigabitEthernet0/0/0/0
|
||||||
|
# shutdown
|
||||||
|
# ipv4 access-group acl_1 ingress
|
||||||
|
# ipv4 access-group acl_2 egress
|
||||||
|
# ipv6 access-group acl6_1 ingress
|
||||||
|
# ipv6 access-group acl6_2 egress
|
||||||
|
# !
|
||||||
|
# interface GigabitEthernet0/0/0/1
|
||||||
|
# shutdown
|
||||||
|
# ipv4 access-group acl_1 ingress
|
||||||
|
# ipv4 access-group acl_2 egress
|
||||||
|
# !
|
||||||
|
#
|
||||||
|
|
||||||
|
# Using replaced
|
||||||
|
|
||||||
|
# Before state:
|
||||||
|
# -------------
|
||||||
|
#
|
||||||
|
# RP/0/RP0/CPU0:ios#sh running-config interface
|
||||||
|
# Wed Jan 15 12:34:56.689 UTC
|
||||||
|
# interface MgmtEth0/RP0/CPU0/0
|
||||||
|
# ipv4 address dhcp
|
||||||
|
# !
|
||||||
|
# interface GigabitEthernet0/0/0/0
|
||||||
|
# shutdown
|
||||||
|
# ipv4 access-group acl_1 ingress
|
||||||
|
# ipv4 access-group acl_2 egress
|
||||||
|
# ipv6 access-group acl6_1 ingress
|
||||||
|
# ipv6 access-group acl6_2 egress
|
||||||
|
# !
|
||||||
|
# interface GigabitEthernet0/0/0/1
|
||||||
|
# shutdown
|
||||||
|
# ipv4 access-group acl_1 egress
|
||||||
|
# !
|
||||||
|
|
||||||
|
- name: Replace device configurations of listed interface with provided configurations
|
||||||
|
iosxr_acl_interfaces:
|
||||||
|
config:
|
||||||
|
- name: GigabitEthernet0/0/0/0
|
||||||
|
access_groups:
|
||||||
|
- afi: ipv6
|
||||||
|
acls:
|
||||||
|
- name: acl6_3
|
||||||
|
direction: in
|
||||||
|
state: replaced
|
||||||
|
|
||||||
|
# After state:
|
||||||
|
# -------------
|
||||||
|
#
|
||||||
|
# RP/0/RP0/CPU0:ios#sh running-config interface
|
||||||
|
# Wed Jan 15 12:34:56.689 UTC
|
||||||
|
# interface MgmtEth0/RP0/CPU0/0
|
||||||
|
# ipv4 address dhcp
|
||||||
|
# !
|
||||||
|
# interface GigabitEthernet0/0/0/0
|
||||||
|
# shutdown
|
||||||
|
# ipv6 access-group acl6_3 ingress
|
||||||
|
# !
|
||||||
|
# interface GigabitEthernet0/0/0/1
|
||||||
|
# shutdown
|
||||||
|
# ipv4 access-group acl_1 egress
|
||||||
|
# !
|
||||||
|
#
|
||||||
|
|
||||||
|
# Using overridden
|
||||||
|
|
||||||
|
# Before state:
|
||||||
|
# -------------
|
||||||
|
#
|
||||||
|
# RP/0/RP0/CPU0:ios#sh running-config interface
|
||||||
|
# Wed Jan 15 12:34:56.689 UTC
|
||||||
|
# interface MgmtEth0/RP0/CPU0/0
|
||||||
|
# ipv4 address dhcp
|
||||||
|
# !
|
||||||
|
# interface GigabitEthernet0/0/0/0
|
||||||
|
# shutdown
|
||||||
|
# ipv4 access-group acl_1 ingress
|
||||||
|
# ipv4 access-group acl_2 egress
|
||||||
|
# ipv6 access-group acl6_1 ingress
|
||||||
|
# ipv6 access-group acl6_2 egress
|
||||||
|
# !
|
||||||
|
# interface GigabitEthernet0/0/0/1
|
||||||
|
# shutdown
|
||||||
|
# ipv4 access-group acl_1 egress
|
||||||
|
# !
|
||||||
|
#
|
||||||
|
|
||||||
|
- name: Overridde all interface ACL configuration with provided configuration
|
||||||
|
iosxr_acl_interfaces:
|
||||||
|
config:
|
||||||
|
- name: GigabitEthernet0/0/0/1
|
||||||
|
access_groups:
|
||||||
|
- afi: ipv4
|
||||||
|
acls:
|
||||||
|
- name: acl_2
|
||||||
|
direction: in
|
||||||
|
- afi: ipv6
|
||||||
|
acls:
|
||||||
|
- name: acl6_3
|
||||||
|
direction: out
|
||||||
|
state: overridden
|
||||||
|
|
||||||
|
# After state:
|
||||||
|
# -------------
|
||||||
|
#
|
||||||
|
# RP/0/RP0/CPU0:ios#sh running-config interface
|
||||||
|
# Wed Jan 15 12:34:56.689 UTC
|
||||||
|
# interface MgmtEth0/RP0/CPU0/0
|
||||||
|
# ipv4 address dhcp
|
||||||
|
# !
|
||||||
|
# interface GigabitEthernet0/0/0/0
|
||||||
|
# shutdown
|
||||||
|
# !
|
||||||
|
# interface GigabitEthernet0/0/0/1
|
||||||
|
# shutdown
|
||||||
|
# ipv4 access-group acl_2 ingress
|
||||||
|
# ipv6 access-group acl6_3 egress
|
||||||
|
# !
|
||||||
|
#
|
||||||
|
|
||||||
|
# Using 'deleted' to delete all ACL attributes of a single interface
|
||||||
|
|
||||||
|
# Before state:
|
||||||
|
# -------------
|
||||||
|
#
|
||||||
|
# RP/0/RP0/CPU0:ios#sh running-config interface
|
||||||
|
# Wed Jan 15 12:34:56.689 UTC
|
||||||
|
# interface MgmtEth0/RP0/CPU0/0
|
||||||
|
# ipv4 address dhcp
|
||||||
|
# !
|
||||||
|
# interface GigabitEthernet0/0/0/0
|
||||||
|
# shutdown
|
||||||
|
# ipv4 access-group acl_1 ingress
|
||||||
|
# ipv4 access-group acl_2 egress
|
||||||
|
# ipv6 access-group acl6_1 ingress
|
||||||
|
# ipv6 access-group acl6_2 egress
|
||||||
|
# !
|
||||||
|
# interface GigabitEthernet0/0/0/1
|
||||||
|
# shutdown
|
||||||
|
# ipv4 access-group acl_1 egress
|
||||||
|
# !
|
||||||
|
#
|
||||||
|
|
||||||
|
- name: Delete all ACL attributes of GigabitEthernet0/0/0/1
|
||||||
|
iosxr_acl_interfaces:
|
||||||
|
config:
|
||||||
|
- name: GigabitEthernet0/0/0/1
|
||||||
|
state: deleted
|
||||||
|
|
||||||
|
# After state:
|
||||||
|
# -------------
|
||||||
|
#
|
||||||
|
# RP/0/RP0/CPU0:ios#sh running-config interface
|
||||||
|
# Wed Jan 15 12:34:56.689 UTC
|
||||||
|
# interface MgmtEth0/RP0/CPU0/0
|
||||||
|
# ipv4 address dhcp
|
||||||
|
# !
|
||||||
|
# interface GigabitEthernet0/0/0/0
|
||||||
|
# shutdown
|
||||||
|
# ipv4 access-group acl_1 ingress
|
||||||
|
# ipv4 access-group acl_2 egress
|
||||||
|
# ipv6 access-group acl6_1 ingress
|
||||||
|
# ipv6 access-group acl6_2 egress
|
||||||
|
# !
|
||||||
|
# interface GigabitEthernet0/0/0/1
|
||||||
|
# shutdown
|
||||||
|
# !
|
||||||
|
#
|
||||||
|
|
||||||
|
# Using 'deleted' to delete a single attached ACL from an interface
|
||||||
|
|
||||||
|
# Before state:
|
||||||
|
# -------------
|
||||||
|
#
|
||||||
|
# RP/0/RP0/CPU0:ios#sh running-config interface
|
||||||
|
# Wed Jan 15 12:34:56.689 UTC
|
||||||
|
# interface MgmtEth0/RP0/CPU0/0
|
||||||
|
# ipv4 address dhcp
|
||||||
|
# !
|
||||||
|
# interface GigabitEthernet0/0/0/0
|
||||||
|
# shutdown
|
||||||
|
# ipv4 access-group acl_1 ingress
|
||||||
|
# ipv4 access-group acl_2 egress
|
||||||
|
# ipv6 access-group acl6_1 ingress
|
||||||
|
# ipv6 access-group acl6_2 egress
|
||||||
|
# !
|
||||||
|
# interface GigabitEthernet0/0/0/1
|
||||||
|
# shutdown
|
||||||
|
# ipv4 access-group acl_1 egress
|
||||||
|
# !
|
||||||
|
#
|
||||||
|
|
||||||
|
- name: Delete a single ACL attached to GigabitEthernet0/0/0/0
|
||||||
|
iosxr_acl_interfaces:
|
||||||
|
config:
|
||||||
|
- name: GigabitEthernet0/0/0/0
|
||||||
|
access_groups:
|
||||||
|
- afi: ipv4
|
||||||
|
acls:
|
||||||
|
- name: acl_2
|
||||||
|
direction: out
|
||||||
|
state: deleted
|
||||||
|
|
||||||
|
# After state:
|
||||||
|
# -------------
|
||||||
|
#
|
||||||
|
# RP/0/RP0/CPU0:ios#sh running-config interface
|
||||||
|
# Wed Jan 15 12:34:56.689 UTC
|
||||||
|
# interface MgmtEth0/RP0/CPU0/0
|
||||||
|
# ipv4 address dhcp
|
||||||
|
# !
|
||||||
|
# interface GigabitEthernet0/0/0/0
|
||||||
|
# shutdown
|
||||||
|
# ipv4 access-group acl_1 ingress
|
||||||
|
# ipv6 access-group acl6_1 ingress
|
||||||
|
# ipv6 access-group acl6_2 egress
|
||||||
|
# !
|
||||||
|
# interface GigabitEthernet0/0/0/1
|
||||||
|
# shutdown
|
||||||
|
# !
|
||||||
|
#
|
||||||
|
|
||||||
|
# Using 'deleted' to delete all ACLs of a particular AFI from an interface
|
||||||
|
|
||||||
|
# Before state:
|
||||||
|
# -------------
|
||||||
|
#
|
||||||
|
# RP/0/RP0/CPU0:ios#sh running-config interface
|
||||||
|
# Wed Jan 15 12:34:56.689 UTC
|
||||||
|
# interface MgmtEth0/RP0/CPU0/0
|
||||||
|
# ipv4 address dhcp
|
||||||
|
# !
|
||||||
|
# interface GigabitEthernet0/0/0/0
|
||||||
|
# shutdown
|
||||||
|
# ipv4 access-group acl_1 ingress
|
||||||
|
# ipv4 access-group acl_2 egress
|
||||||
|
# ipv6 access-group acl6_1 ingress
|
||||||
|
# ipv6 access-group acl6_2 egress
|
||||||
|
# !
|
||||||
|
# interface GigabitEthernet0/0/0/1
|
||||||
|
# shutdown
|
||||||
|
# ipv4 access-group acl_1 egress
|
||||||
|
# !
|
||||||
|
#
|
||||||
|
|
||||||
|
- name: Delete all IPv6 ACLs attached to GigabitEthernet0/0/0/0
|
||||||
|
iosxr_acl_interfaces:
|
||||||
|
config:
|
||||||
|
- name: GigabitEthernet0/0/0/0
|
||||||
|
access_groups:
|
||||||
|
- afi: ipv6
|
||||||
|
state: deleted
|
||||||
|
|
||||||
|
# After state:
|
||||||
|
# -------------
|
||||||
|
#
|
||||||
|
# RP/0/RP0/CPU0:ios#sh running-config interface
|
||||||
|
# Wed Jan 15 12:34:56.689 UTC
|
||||||
|
# interface MgmtEth0/RP0/CPU0/0
|
||||||
|
# ipv4 address dhcp
|
||||||
|
# !
|
||||||
|
# interface GigabitEthernet0/0/0/0
|
||||||
|
# shutdown
|
||||||
|
# ipv4 access-group acl_1 ingress
|
||||||
|
# ipv4 access-group acl_2 egress
|
||||||
|
# !
|
||||||
|
# interface GigabitEthernet0/0/0/1
|
||||||
|
# shutdown
|
||||||
|
# !
|
||||||
|
#
|
||||||
|
|
||||||
|
# Using 'deleted' to remove all ACLs attached to all the interfaces in the device
|
||||||
|
|
||||||
|
# Before state:
|
||||||
|
# -------------
|
||||||
|
#
|
||||||
|
# RP/0/RP0/CPU0:ios#sh running-config interface
|
||||||
|
# Wed Jan 15 12:34:56.689 UTC
|
||||||
|
# interface MgmtEth0/RP0/CPU0/0
|
||||||
|
# ipv4 address dhcp
|
||||||
|
# !
|
||||||
|
# interface GigabitEthernet0/0/0/0
|
||||||
|
# shutdown
|
||||||
|
# ipv4 access-group acl_1 ingress
|
||||||
|
# ipv4 access-group acl_2 egress
|
||||||
|
# ipv6 access-group acl6_1 ingress
|
||||||
|
# ipv6 access-group acl6_2 egress
|
||||||
|
# !
|
||||||
|
# interface GigabitEthernet0/0/0/1
|
||||||
|
# shutdown
|
||||||
|
# ipv4 access-group acl_1 egress
|
||||||
|
# !
|
||||||
|
#
|
||||||
|
|
||||||
|
- name: Delete all ACL interfaces configuration from the device
|
||||||
|
iosxr_acl_interfaces:
|
||||||
|
state: deleted
|
||||||
|
|
||||||
|
# After state:
|
||||||
|
# -------------
|
||||||
|
#
|
||||||
|
# RP/0/RP0/CPU0:ios#sh running-config interface
|
||||||
|
# Wed Jan 15 12:34:56.689 UTC
|
||||||
|
# interface MgmtEth0/RP0/CPU0/0
|
||||||
|
# ipv4 address dhcp
|
||||||
|
# !
|
||||||
|
# interface GigabitEthernet0/0/0/0
|
||||||
|
# shutdown
|
||||||
|
# !
|
||||||
|
# interface GigabitEthernet0/0/0/1
|
||||||
|
# shutdown
|
||||||
|
# !
|
||||||
|
#
|
||||||
|
|
||||||
|
# Using parsed
|
||||||
|
|
||||||
|
# parsed.cfg
|
||||||
|
# ------------
|
||||||
|
#
|
||||||
|
# interface MgmtEth0/RP0/CPU0/0
|
||||||
|
# ipv4 address dhcp
|
||||||
|
# !
|
||||||
|
# interface GigabitEthernet0/0/0/0
|
||||||
|
# shutdown
|
||||||
|
# ipv4 access-group acl_1 ingress
|
||||||
|
# ipv4 access-group acl_2 egress
|
||||||
|
# ipv6 access-group acl6_1 ingress
|
||||||
|
# ipv6 access-group acl6_2 egress
|
||||||
|
# !
|
||||||
|
# interface GigabitEthernet0/0/0/1
|
||||||
|
# shutdown
|
||||||
|
# ipv4 access-group acl_1 egress
|
||||||
|
# !
|
||||||
|
|
||||||
|
# - name: Convert ACL interfaces config to argspec without connecting to the appliance
|
||||||
|
# iosxr_acl_interfaces:
|
||||||
|
# running_config: "{{ lookup('file', './parsed.cfg') }}"
|
||||||
|
# state: parsed
|
||||||
|
|
||||||
|
|
||||||
|
# Task Output (redacted)
|
||||||
|
# -----------------------
|
||||||
|
|
||||||
|
# "parsed": [
|
||||||
|
# {
|
||||||
|
# "name": "MgmtEth0/RP0/CPU0/0"
|
||||||
|
# },
|
||||||
|
# {
|
||||||
|
# "access_groups": [
|
||||||
|
# {
|
||||||
|
# "acls": [
|
||||||
|
# {
|
||||||
|
# "direction": "in",
|
||||||
|
# "name": "acl_1"
|
||||||
|
# },
|
||||||
|
# {
|
||||||
|
# "direction": "out",
|
||||||
|
# "name": "acl_2"
|
||||||
|
# }
|
||||||
|
# ],
|
||||||
|
# "afi": "ipv4"
|
||||||
|
# },
|
||||||
|
# {
|
||||||
|
# "acls": [
|
||||||
|
# {
|
||||||
|
# "direction": "in",
|
||||||
|
# "name": "acl6_1"
|
||||||
|
# },
|
||||||
|
# {
|
||||||
|
# "direction": "out",
|
||||||
|
# "name": "acl6_2"
|
||||||
|
# }
|
||||||
|
# ],
|
||||||
|
# "afi": "ipv6"
|
||||||
|
# }
|
||||||
|
# ],
|
||||||
|
# "name": "GigabitEthernet0/0/0/0"
|
||||||
|
# },
|
||||||
|
# {
|
||||||
|
# "access_groups": [
|
||||||
|
# {
|
||||||
|
# "acls": [
|
||||||
|
# {
|
||||||
|
# "direction": "out",
|
||||||
|
# "name": "acl_1"
|
||||||
|
# }
|
||||||
|
# ],
|
||||||
|
# "afi": "ipv4"
|
||||||
|
# }
|
||||||
|
# ],
|
||||||
|
# "name": "GigabitEthernet0/0/0/1"
|
||||||
|
# }
|
||||||
|
# ]
|
||||||
|
# }
|
||||||
|
|
||||||
|
|
||||||
|
# Using gathered
|
||||||
|
|
||||||
|
- name: Gather ACL interfaces facts using gathered state
|
||||||
|
iosxr_acl_interfaces:
|
||||||
|
state: gathered
|
||||||
|
|
||||||
|
|
||||||
|
# Task Output (redacted)
|
||||||
|
# -----------------------
|
||||||
|
#
|
||||||
|
# "gathered": [
|
||||||
|
# {
|
||||||
|
# "name": "MgmtEth0/RP0/CPU0/0"
|
||||||
|
# },
|
||||||
|
# {
|
||||||
|
# "access_groups": [
|
||||||
|
# {
|
||||||
|
# "acls": [
|
||||||
|
# {
|
||||||
|
# "direction": "in",
|
||||||
|
# "name": "acl_1"
|
||||||
|
# },
|
||||||
|
# {
|
||||||
|
# "direction": "out",
|
||||||
|
# "name": "acl_2"
|
||||||
|
# }
|
||||||
|
# ],
|
||||||
|
# "afi": "ipv4"
|
||||||
|
# }
|
||||||
|
# "name": "GigabitEthernet0/0/0/0"
|
||||||
|
# },
|
||||||
|
# {
|
||||||
|
# "access_groups": [
|
||||||
|
# {
|
||||||
|
# "acls": [
|
||||||
|
# {
|
||||||
|
# "direction": "in",
|
||||||
|
# "name": "acl6_1"
|
||||||
|
# }
|
||||||
|
# ],
|
||||||
|
# "afi": "ipv6"
|
||||||
|
# }
|
||||||
|
# "name": "GigabitEthernet0/0/0/1"
|
||||||
|
# }
|
||||||
|
# ]
|
||||||
|
|
||||||
|
|
||||||
|
# Using rendered
|
||||||
|
|
||||||
|
- name: Render platform specific commands from task input using rendered state
|
||||||
|
iosxr_acl_interfaces:
|
||||||
|
config:
|
||||||
|
- name: GigabitEthernet0/0/0/0
|
||||||
|
access_groups:
|
||||||
|
- afi: ipv4
|
||||||
|
acls:
|
||||||
|
- name: acl_1
|
||||||
|
direction: in
|
||||||
|
- name: acl_2
|
||||||
|
direction: out
|
||||||
|
state: rendered
|
||||||
|
|
||||||
|
# Task Output (redacted)
|
||||||
|
# -----------------------
|
||||||
|
|
||||||
|
# "rendered": [
|
||||||
|
# "interface GigabitEthernet0/0/0/0",
|
||||||
|
# "ipv4 access-group acl_1 ingress",
|
||||||
|
# "ipv4 access-group acl_2 egress"
|
||||||
|
# ]
|
||||||
|
"""
|
||||||
|
RETURN = """
|
||||||
|
before:
|
||||||
|
description: The configuration prior to the model invocation.
|
||||||
|
returned: always
|
||||||
|
type: list
|
||||||
|
sample: >
|
||||||
|
The configuration returned will always be in the same format
|
||||||
|
of the parameters above.
|
||||||
|
after:
|
||||||
|
description: The resulting configuration model invocation.
|
||||||
|
returned: when changed
|
||||||
|
type: list
|
||||||
|
sample: >
|
||||||
|
The configuration returned will always be in the same format
|
||||||
|
of the parameters above.
|
||||||
|
commands:
|
||||||
|
description: The set of commands pushed to the remote device.
|
||||||
|
returned: always
|
||||||
|
type: list
|
||||||
|
sample:
|
||||||
|
- "interface GigabitEthernet0/0/0/1"
|
||||||
|
- "ipv4 access-group acl_1 ingress"
|
||||||
|
- "ipv4 access-group acl_2 egress"
|
||||||
|
- "ipv6 access-group acl6_1 ingress"
|
||||||
|
- "interface GigabitEthernet0/0/0/2"
|
||||||
|
- "no ipv4 access-group acl_3 ingress"
|
||||||
|
- "ipv4 access-group acl_4 egress"
|
||||||
|
"""
|
||||||
|
|
||||||
|
|
||||||
|
from ansible.module_utils.basic import AnsibleModule
|
||||||
|
from ansible.module_utils.network.iosxr.argspec.acl_interfaces.acl_interfaces import Acl_interfacesArgs
|
||||||
|
from ansible.module_utils.network.iosxr.config.acl_interfaces.acl_interfaces import Acl_interfaces
|
||||||
|
|
||||||
|
|
||||||
|
def main():
|
||||||
|
"""
|
||||||
|
Main entry point for module execution
|
||||||
|
|
||||||
|
:returns: the result form module invocation
|
||||||
|
"""
|
||||||
|
required_if = [('state', 'merged', ('config',)),
|
||||||
|
('state', 'replaced', ('config',)),
|
||||||
|
('state', 'overridden', ('config',)),
|
||||||
|
('state', 'rendered', ('config',)),
|
||||||
|
('state', 'parsed', ('running_config',))]
|
||||||
|
|
||||||
|
module = AnsibleModule(argument_spec=Acl_interfacesArgs.argument_spec, required_if=required_if,
|
||||||
|
supports_check_mode=True)
|
||||||
|
|
||||||
|
result = Acl_interfaces(module).execute_module()
|
||||||
|
module.exit_json(**result)
|
||||||
|
|
||||||
|
|
||||||
|
if __name__ == '__main__':
|
||||||
|
main()
|
|
@ -0,0 +1,3 @@
|
||||||
|
---
|
||||||
|
testcase: "[^_].*"
|
||||||
|
test_items: []
|
20
test/integration/targets/iosxr_acl_interfaces/tasks/cli.yaml
Normal file
20
test/integration/targets/iosxr_acl_interfaces/tasks/cli.yaml
Normal file
|
@ -0,0 +1,20 @@
|
||||||
|
---
|
||||||
|
- name: Collect all cli test cases
|
||||||
|
find:
|
||||||
|
paths: "{{ role_path }}/tests/cli"
|
||||||
|
patterns: "{{ testcase }}.yaml"
|
||||||
|
use_regex: true
|
||||||
|
register: test_cases
|
||||||
|
delegate_to: localhost
|
||||||
|
|
||||||
|
- name: Set test_items
|
||||||
|
set_fact: test_items="{{ test_cases.files | map(attribute='path') | list }}"
|
||||||
|
delegate_to: localhost
|
||||||
|
|
||||||
|
- name: Run test case (connection=network_cli)
|
||||||
|
include: "{{ test_case_to_run }}"
|
||||||
|
vars:
|
||||||
|
ansible_connection: network_cli
|
||||||
|
with_items: "{{ test_items }}"
|
||||||
|
loop_control:
|
||||||
|
loop_var: test_case_to_run
|
|
@ -0,0 +1,2 @@
|
||||||
|
---
|
||||||
|
- { include: cli.yaml, tags: ['cli'] }
|
|
@ -0,0 +1,31 @@
|
||||||
|
---
|
||||||
|
- name: Populate the device with ACLs
|
||||||
|
iosxr_config:
|
||||||
|
lines: |
|
||||||
|
ipv4 access-list acl_1
|
||||||
|
10 permit ipv4 any any
|
||||||
|
ipv4 access-list acl_2
|
||||||
|
10 permit ipv4 any any
|
||||||
|
ipv4 access-list acl_3
|
||||||
|
10 permit ipv4 any any
|
||||||
|
ipv6 access-list acl6_1
|
||||||
|
10 permit ipv6 any any
|
||||||
|
ipv6 access-list acl6_2
|
||||||
|
10 permit ipv6 any any
|
||||||
|
ipv6 access-list acl6_3
|
||||||
|
10 permit ipv6 any any
|
||||||
|
|
||||||
|
- name: Setup ACL interfaces configuration for GigabitEthernet0/0/0/0
|
||||||
|
iosxr_config:
|
||||||
|
lines: |
|
||||||
|
ipv4 access-group acl_1 ingress
|
||||||
|
ipv4 access-group acl_2 egress
|
||||||
|
ipv6 access-group acl6_1 ingress
|
||||||
|
ipv6 access-group acl6_2 egress
|
||||||
|
parents: interface GigabitEthernet0/0/0/0
|
||||||
|
|
||||||
|
- name: Setup ACL interfaces configuration for GigabitEthernet0/0/0/1
|
||||||
|
iosxr_config:
|
||||||
|
lines: ipv4 access-group acl_1 egress
|
||||||
|
parents: interface GigabitEthernet0/0/0/1
|
||||||
|
|
|
@ -0,0 +1,34 @@
|
||||||
|
---
|
||||||
|
- name: Remove/Default Resources
|
||||||
|
cli_config:
|
||||||
|
config: "{{ lines }}"
|
||||||
|
vars:
|
||||||
|
lines: |
|
||||||
|
default interface GigabitEthernet0/0/0/0
|
||||||
|
default interface GigabitEthernet0/0/0/1
|
||||||
|
no ipv4 access-list acl_1
|
||||||
|
no ipv4 access-list acl_2
|
||||||
|
no ipv6 access-list acl6_1
|
||||||
|
no ipv6 access-list acl6_2
|
||||||
|
no ipv6 access-list acl6_3
|
||||||
|
|
||||||
|
- name: Initialize interfaces
|
||||||
|
iosxr_config:
|
||||||
|
lines: shutdown
|
||||||
|
parents: "{{ item }}"
|
||||||
|
loop:
|
||||||
|
- interface GigabitEthernet0/0/0/0
|
||||||
|
- interface GigabitEthernet0/0/0/1
|
||||||
|
|
||||||
|
# To make sure our assertions are not affected by
|
||||||
|
# spill overs from previous tests
|
||||||
|
- name: Remove unwanted interfaces from config
|
||||||
|
iosxr_config:
|
||||||
|
lines:
|
||||||
|
- "no interface GigabitEthernet{{ item }}"
|
||||||
|
loop:
|
||||||
|
- 0/0/0/2
|
||||||
|
- 0/0/0/3
|
||||||
|
- 0/0/0/4
|
||||||
|
- 0/0/0/5
|
||||||
|
ignore_errors: yes
|
|
@ -0,0 +1,85 @@
|
||||||
|
---
|
||||||
|
- debug:
|
||||||
|
msg: "Start iosxr_acl_interfaces deleted integration tests ansible_connection={{ ansible_connection }}"
|
||||||
|
|
||||||
|
- include_tasks: _remove_config.yaml
|
||||||
|
|
||||||
|
- include_tasks: _populate.yaml
|
||||||
|
|
||||||
|
- block:
|
||||||
|
- name: Delete ACL attributes of GigabitEthernet0/0/0/1
|
||||||
|
iosxr_acl_interfaces: &deleted
|
||||||
|
config:
|
||||||
|
- name: GigabitEthernet0/0/0/1
|
||||||
|
state: deleted
|
||||||
|
register: result
|
||||||
|
|
||||||
|
- assert:
|
||||||
|
that:
|
||||||
|
- "'interface GigabitEthernet0/0/0/1' in result.commands"
|
||||||
|
- "'no ipv4 access-group acl_1 egress' in result.commands"
|
||||||
|
- "result.commands|length == 2"
|
||||||
|
|
||||||
|
- name: Delete ACL attributes of GigabitEthernet0/0/0/1 (IDEMPOTENT)
|
||||||
|
iosxr_acl_interfaces: *deleted
|
||||||
|
register: result
|
||||||
|
|
||||||
|
- assert:
|
||||||
|
that:
|
||||||
|
- "result.changed == False"
|
||||||
|
- "result.commands|length == 0"
|
||||||
|
|
||||||
|
- name: Delete a single ACL attached to GigabitEthernet0/0/0/0
|
||||||
|
iosxr_acl_interfaces: &deleted_1
|
||||||
|
config:
|
||||||
|
- name: GigabitEthernet0/0/0/0
|
||||||
|
access_groups:
|
||||||
|
- afi: ipv4
|
||||||
|
acls:
|
||||||
|
- name: acl_2
|
||||||
|
direction: out
|
||||||
|
state: deleted
|
||||||
|
register: result
|
||||||
|
|
||||||
|
- assert:
|
||||||
|
that:
|
||||||
|
- "'interface GigabitEthernet0/0/0/0' in result.commands"
|
||||||
|
- "'no ipv4 access-group acl_2 egress' in result.commands"
|
||||||
|
- "result.commands|length == 2"
|
||||||
|
|
||||||
|
- name: Delete a single ACL attached to GigabitEthernet0/0/0/0 (IDEMPOTENT)
|
||||||
|
iosxr_acl_interfaces: *deleted_1
|
||||||
|
register: result
|
||||||
|
|
||||||
|
- assert:
|
||||||
|
that:
|
||||||
|
- "result.changed == False"
|
||||||
|
- "result.commands|length == 0"
|
||||||
|
|
||||||
|
- name: Delete all IPv6 ACLs attached to GigabitEthernet0/0/0/0
|
||||||
|
iosxr_acl_interfaces: &deleted_2
|
||||||
|
config:
|
||||||
|
- name: GigabitEthernet0/0/0/0
|
||||||
|
access_groups:
|
||||||
|
- afi: ipv6
|
||||||
|
state: deleted
|
||||||
|
register: result
|
||||||
|
|
||||||
|
- assert:
|
||||||
|
that:
|
||||||
|
- "'interface GigabitEthernet0/0/0/0' in result.commands"
|
||||||
|
- "'no ipv6 access-group acl6_1 ingress' in result.commands"
|
||||||
|
- "'no ipv6 access-group acl6_2 egress' in result.commands"
|
||||||
|
- "result.commands|length == 3"
|
||||||
|
|
||||||
|
- name: Delete all IPv6 ACLs attached to GigabitEthernet0/0/0/0 (IDEMPOTENT)
|
||||||
|
iosxr_acl_interfaces: *deleted_2
|
||||||
|
register: result
|
||||||
|
|
||||||
|
- assert:
|
||||||
|
that:
|
||||||
|
- "result.changed == False"
|
||||||
|
- "result.commands|length == 0"
|
||||||
|
|
||||||
|
always:
|
||||||
|
- include_tasks: _remove_config.yaml
|
|
@ -0,0 +1,46 @@
|
||||||
|
---
|
||||||
|
- debug:
|
||||||
|
msg: "Start iosxr_acl_interfaces deleted integration tests ansible_connection={{ ansible_connection }}"
|
||||||
|
|
||||||
|
- include_tasks: _remove_config.yaml
|
||||||
|
|
||||||
|
- include_tasks: _populate.yaml
|
||||||
|
|
||||||
|
- block:
|
||||||
|
- name: Delete all ACL interfaces configuration from the device
|
||||||
|
iosxr_acl_interfaces: &deleted_3
|
||||||
|
state: deleted
|
||||||
|
register: result
|
||||||
|
|
||||||
|
- name: Assert that the before dicts were correctly generated
|
||||||
|
assert:
|
||||||
|
that:
|
||||||
|
- "{{ merged['after'] | symmetric_difference(result['before']) |length == 0 }}"
|
||||||
|
|
||||||
|
- name: Assert that the correct set of commands were generated
|
||||||
|
assert:
|
||||||
|
that:
|
||||||
|
- "{{ deleted['commands'] | symmetric_difference(result['commands']) |length == 0 }}"
|
||||||
|
|
||||||
|
- name: Assert that the after dicts were correctly generated
|
||||||
|
assert:
|
||||||
|
that:
|
||||||
|
- "{{ deleted['after'] | symmetric_difference(result['after']) |length == 0 }}"
|
||||||
|
|
||||||
|
- name: Delete ACL attributes of all interfaces (IDEMPOTENT)
|
||||||
|
iosxr_acl_interfaces: *deleted_3
|
||||||
|
register: result
|
||||||
|
|
||||||
|
- name: Assert that the previous task was idempotent
|
||||||
|
assert:
|
||||||
|
that:
|
||||||
|
- "result.changed == false"
|
||||||
|
- "result.commands|length == 0"
|
||||||
|
|
||||||
|
- name: Assert that the before dicts were correctly generated
|
||||||
|
assert:
|
||||||
|
that:
|
||||||
|
- "{{ deleted['after'] | symmetric_difference(result['before']) |length == 0 }}"
|
||||||
|
|
||||||
|
always:
|
||||||
|
- include_tasks: _remove_config.yaml
|
|
@ -0,0 +1,58 @@
|
||||||
|
---
|
||||||
|
- debug:
|
||||||
|
msg: "START iosxr_acl_interfaces empty_config integration tests on connection={{ ansible_connection }}"
|
||||||
|
|
||||||
|
- name: Merged with empty config should give appropriate error message
|
||||||
|
iosxr_acl_interfaces:
|
||||||
|
config:
|
||||||
|
state: merged
|
||||||
|
register: result
|
||||||
|
ignore_errors: True
|
||||||
|
|
||||||
|
- assert:
|
||||||
|
that:
|
||||||
|
- result.msg == 'value of config parameter must not be empty for state merged'
|
||||||
|
|
||||||
|
- name: Replaced with empty config should give appropriate error message
|
||||||
|
iosxr_acl_interfaces:
|
||||||
|
config:
|
||||||
|
state: replaced
|
||||||
|
register: result
|
||||||
|
ignore_errors: True
|
||||||
|
|
||||||
|
- assert:
|
||||||
|
that:
|
||||||
|
- result.msg == 'value of config parameter must not be empty for state replaced'
|
||||||
|
|
||||||
|
- name: Overridden with empty config should give appropriate error message
|
||||||
|
iosxr_acl_interfaces:
|
||||||
|
config:
|
||||||
|
state: overridden
|
||||||
|
register: result
|
||||||
|
ignore_errors: True
|
||||||
|
|
||||||
|
- assert:
|
||||||
|
that:
|
||||||
|
- result.msg == 'value of config parameter must not be empty for state overridden'
|
||||||
|
|
||||||
|
- name: Rendered with empty config should give appropriate error message
|
||||||
|
iosxr_acl_interfaces:
|
||||||
|
config:
|
||||||
|
state: rendered
|
||||||
|
register: result
|
||||||
|
ignore_errors: True
|
||||||
|
|
||||||
|
- assert:
|
||||||
|
that:
|
||||||
|
- result.msg == 'value of config parameter must not be empty for state rendered'
|
||||||
|
|
||||||
|
- name: Parsed with empty config should give appropriate error message
|
||||||
|
iosxr_acl_interfaces:
|
||||||
|
running_config:
|
||||||
|
state: parsed
|
||||||
|
register: result
|
||||||
|
ignore_errors: True
|
||||||
|
|
||||||
|
- assert:
|
||||||
|
that:
|
||||||
|
- result.msg == 'value of running_config parameter must not be empty for state parsed'
|
|
@ -0,0 +1,14 @@
|
||||||
|
interface MgmtEth0/0/CPU0/0
|
||||||
|
ipv4 address dhcp
|
||||||
|
!
|
||||||
|
interface GigabitEthernet0/0/0/0
|
||||||
|
shutdown
|
||||||
|
ipv4 access-group acl_1 ingress
|
||||||
|
ipv4 access-group acl_2 egress
|
||||||
|
ipv6 access-group acl6_1 ingress
|
||||||
|
ipv6 access-group acl6_2 egress
|
||||||
|
!
|
||||||
|
interface GigabitEthernet0/0/0/1
|
||||||
|
shutdown
|
||||||
|
ipv4 access-group acl_1 egress
|
||||||
|
!
|
|
@ -0,0 +1,57 @@
|
||||||
|
---
|
||||||
|
- debug:
|
||||||
|
msg: "START iosxr_acl_interfaces gathered integration tests on connection={{ ansible_connection }}"
|
||||||
|
|
||||||
|
- include_tasks: _remove_config.yaml
|
||||||
|
|
||||||
|
- name: Populate the device with ACLs
|
||||||
|
iosxr_config:
|
||||||
|
lines: |
|
||||||
|
ipv4 access-list acl_1
|
||||||
|
10 permit ipv4 any any
|
||||||
|
ipv4 access-list acl_2
|
||||||
|
10 permit ipv4 any any
|
||||||
|
ipv6 access-list acl6_1
|
||||||
|
10 permit ipv6 any any
|
||||||
|
ipv6 access-list acl6_2
|
||||||
|
10 permit ipv6 any any
|
||||||
|
|
||||||
|
- block:
|
||||||
|
- name: Merge the provided configuration with the existing running configuration
|
||||||
|
iosxr_acl_interfaces: &merged
|
||||||
|
config:
|
||||||
|
- name: GigabitEthernet0/0/0/0
|
||||||
|
access_groups:
|
||||||
|
- afi: ipv4
|
||||||
|
acls:
|
||||||
|
- name: acl_1
|
||||||
|
direction: in
|
||||||
|
- name: acl_2
|
||||||
|
direction: out
|
||||||
|
- afi: ipv6
|
||||||
|
acls:
|
||||||
|
- name: acl6_1
|
||||||
|
direction: in
|
||||||
|
- name: acl6_2
|
||||||
|
direction: out
|
||||||
|
|
||||||
|
- name: GigabitEthernet0/0/0/1
|
||||||
|
access_groups:
|
||||||
|
- afi: ipv4
|
||||||
|
acls:
|
||||||
|
- name: acl_1
|
||||||
|
direction: out
|
||||||
|
state: merged
|
||||||
|
register: result
|
||||||
|
|
||||||
|
- name: Gather ACL interfaces facts using gathered state
|
||||||
|
iosxr_acl_interfaces:
|
||||||
|
state: gathered
|
||||||
|
register: result
|
||||||
|
|
||||||
|
- name: Assert that facts were correctly generated
|
||||||
|
assert:
|
||||||
|
that: "{{ merged['after'] | symmetric_difference(result['gathered']) |length == 0 }}"
|
||||||
|
|
||||||
|
always:
|
||||||
|
- include_tasks: _remove_config.yaml
|
|
@ -0,0 +1,115 @@
|
||||||
|
---
|
||||||
|
- debug:
|
||||||
|
msg: "START iosxr_acl_interfaces merged integration tests on connection={{ ansible_connection }}"
|
||||||
|
|
||||||
|
- include_tasks: _remove_config.yaml
|
||||||
|
|
||||||
|
- name: Populate the device with ACLs
|
||||||
|
iosxr_config:
|
||||||
|
lines: |
|
||||||
|
ipv4 access-list acl_1
|
||||||
|
10 permit ipv4 any any
|
||||||
|
ipv4 access-list acl_2
|
||||||
|
10 permit ipv4 any any
|
||||||
|
ipv6 access-list acl6_1
|
||||||
|
10 permit ipv6 any any
|
||||||
|
ipv6 access-list acl6_2
|
||||||
|
10 permit ipv6 any any
|
||||||
|
|
||||||
|
- block:
|
||||||
|
- name: Merge the provided configuration with the existing running configuration
|
||||||
|
iosxr_acl_interfaces: &merged
|
||||||
|
config:
|
||||||
|
- name: GigabitEthernet0/0/0/0
|
||||||
|
access_groups:
|
||||||
|
- afi: ipv4
|
||||||
|
acls:
|
||||||
|
- name: acl_1
|
||||||
|
direction: in
|
||||||
|
- name: acl_2
|
||||||
|
direction: out
|
||||||
|
- afi: ipv6
|
||||||
|
acls:
|
||||||
|
- name: acl6_1
|
||||||
|
direction: in
|
||||||
|
- name: acl6_2
|
||||||
|
direction: out
|
||||||
|
|
||||||
|
- name: GigabitEthernet0/0/0/1
|
||||||
|
access_groups:
|
||||||
|
- afi: ipv4
|
||||||
|
acls:
|
||||||
|
- name: acl_1
|
||||||
|
direction: out
|
||||||
|
state: merged
|
||||||
|
register: result
|
||||||
|
|
||||||
|
- name: Assert that before dicts were correctly generated
|
||||||
|
assert:
|
||||||
|
that: "{{ merged['before'] | symmetric_difference(result['before']) |length == 0 }}"
|
||||||
|
|
||||||
|
- name: Assert that correct set of commands were generated
|
||||||
|
assert:
|
||||||
|
that:
|
||||||
|
- "{{ merged['commands'] | symmetric_difference(result['commands']) |length == 0 }}"
|
||||||
|
|
||||||
|
- name: Assert that after dicts was correctly generated
|
||||||
|
assert:
|
||||||
|
that:
|
||||||
|
- "{{ merged['after'] | symmetric_difference(result['after']) |length == 0 }}"
|
||||||
|
|
||||||
|
- name: Merge the provided configuration with the existing running configuration (IDEMPOTENT)
|
||||||
|
iosxr_acl_interfaces: *merged
|
||||||
|
register: result
|
||||||
|
|
||||||
|
- name: Assert that the previous task was idempotent
|
||||||
|
assert:
|
||||||
|
that:
|
||||||
|
- "result['changed'] == false"
|
||||||
|
- "result.commands|length == 0"
|
||||||
|
|
||||||
|
- name: Assert that before dicts were correctly generated
|
||||||
|
assert:
|
||||||
|
that:
|
||||||
|
- "{{ merged['after'] | symmetric_difference(result['before']) |length == 0 }}"
|
||||||
|
|
||||||
|
- name: Update acl_interfaces configuration using merged
|
||||||
|
iosxr_acl_interfaces: &merged_update
|
||||||
|
config:
|
||||||
|
- name: GigabitEthernet0/0/0/1
|
||||||
|
access_groups:
|
||||||
|
- afi: ipv4
|
||||||
|
acls:
|
||||||
|
- name: acl_2
|
||||||
|
direction: out
|
||||||
|
- name: acl_1
|
||||||
|
direction: in
|
||||||
|
state: merged
|
||||||
|
register: result
|
||||||
|
|
||||||
|
- name: Assert that before dicts were correctly generated
|
||||||
|
assert:
|
||||||
|
that: "{{ merged['update_before'] | symmetric_difference(result['before']) |length == 0 }}"
|
||||||
|
|
||||||
|
- name: Assert that correct set of commands were generated
|
||||||
|
assert:
|
||||||
|
that:
|
||||||
|
- "{{ merged['update_commands'] | symmetric_difference(result['commands']) |length == 0 }}"
|
||||||
|
|
||||||
|
- name: Assert that after dicts was correctly generated
|
||||||
|
assert:
|
||||||
|
that:
|
||||||
|
- "{{ merged['update_after'] | symmetric_difference(result['after']) |length == 0 }}"
|
||||||
|
|
||||||
|
- name: Update acl_interfaces configuration using merged (IDEMPOTENT)
|
||||||
|
iosxr_acl_interfaces: *merged_update
|
||||||
|
register: result
|
||||||
|
|
||||||
|
- name: Assert that the previous task was idempotent
|
||||||
|
assert:
|
||||||
|
that:
|
||||||
|
- "result['changed'] == false"
|
||||||
|
- "result.commands|length == 0"
|
||||||
|
|
||||||
|
always:
|
||||||
|
- include_tasks: _remove_config.yaml
|
|
@ -0,0 +1,64 @@
|
||||||
|
---
|
||||||
|
- debug:
|
||||||
|
msg: "START iosxr_acl_interfaces overridden integration tests on connection={{ ansible_connection }}"
|
||||||
|
|
||||||
|
- include_tasks: _remove_config.yaml
|
||||||
|
|
||||||
|
- include_tasks: _populate.yaml
|
||||||
|
|
||||||
|
- block:
|
||||||
|
- name: Overridde all interface ACL configuration with provided configuration
|
||||||
|
iosxr_acl_interfaces: &overridden
|
||||||
|
config:
|
||||||
|
- name: GigabitEthernet0/0/0/0
|
||||||
|
access_groups:
|
||||||
|
- afi: ipv6
|
||||||
|
acls:
|
||||||
|
- name: acl6_3
|
||||||
|
direction: in
|
||||||
|
|
||||||
|
- name: GigabitEthernet0/0/0/1
|
||||||
|
access_groups:
|
||||||
|
- afi: ipv4
|
||||||
|
acls:
|
||||||
|
- name: acl_2
|
||||||
|
direction: in
|
||||||
|
- afi: ipv6
|
||||||
|
acls:
|
||||||
|
- name: acl6_3
|
||||||
|
direction: out
|
||||||
|
state: overridden
|
||||||
|
register: result
|
||||||
|
|
||||||
|
- name: Assert that correct set of commands were generated
|
||||||
|
assert:
|
||||||
|
that:
|
||||||
|
- "{{ overridden['commands'] | symmetric_difference(result['commands']) |length == 0 }}"
|
||||||
|
|
||||||
|
- name: Assert that before dicts are correctly generated
|
||||||
|
assert:
|
||||||
|
that:
|
||||||
|
- "{{ merged['after'] | symmetric_difference(result['before']) |length == 0 }}"
|
||||||
|
|
||||||
|
- name: Assert that after dict is correctly generated
|
||||||
|
assert:
|
||||||
|
that:
|
||||||
|
- "{{ overridden['after'] | symmetric_difference(result['after']) |length == 0 }}"
|
||||||
|
|
||||||
|
- name: Overridde all interface LACP configuration with provided configuration (IDEMPOTENT)
|
||||||
|
iosxr_acl_interfaces: *overridden
|
||||||
|
register: result
|
||||||
|
|
||||||
|
- name: Assert that task was idempotent
|
||||||
|
assert:
|
||||||
|
that:
|
||||||
|
- "result['changed'] == false"
|
||||||
|
- "result.commands|length == 0"
|
||||||
|
|
||||||
|
- name: Assert that before dict is correctly generated
|
||||||
|
assert:
|
||||||
|
that:
|
||||||
|
- "{{ overridden['after'] | symmetric_difference(result['before']) |length == 0 }}"
|
||||||
|
|
||||||
|
always:
|
||||||
|
- include_tasks: _remove_config.yaml
|
|
@ -0,0 +1,14 @@
|
||||||
|
---
|
||||||
|
- debug:
|
||||||
|
msg: "START iosxr_acl_interfaces parsed integration tests on connection={{ ansible_connection }}"
|
||||||
|
|
||||||
|
- name: Parse externally provided ACL interfaces config to agnostic model
|
||||||
|
iosxr_acl_interfaces:
|
||||||
|
running_config: "{{ lookup('file', './fixtures/parsed.cfg') }}"
|
||||||
|
state: parsed
|
||||||
|
register: result
|
||||||
|
|
||||||
|
- name: Assert that config was correctly parsed
|
||||||
|
assert:
|
||||||
|
that:
|
||||||
|
- "{{ merged['after'] | symmetric_difference(result['parsed']) |length == 0 }}"
|
|
@ -0,0 +1,35 @@
|
||||||
|
---
|
||||||
|
- debug:
|
||||||
|
msg: "START iosxr_acl_interfaces rendered integration tests on connection={{ ansible_connection }}"
|
||||||
|
|
||||||
|
- name: Render platform specific commands from task input using rendered state
|
||||||
|
iosxr_acl_interfaces:
|
||||||
|
config:
|
||||||
|
- name: GigabitEthernet0/0/0/0
|
||||||
|
access_groups:
|
||||||
|
- afi: ipv4
|
||||||
|
acls:
|
||||||
|
- name: acl_1
|
||||||
|
direction: in
|
||||||
|
- name: acl_2
|
||||||
|
direction: out
|
||||||
|
- afi: ipv6
|
||||||
|
acls:
|
||||||
|
- name: acl6_1
|
||||||
|
direction: in
|
||||||
|
- name: acl6_2
|
||||||
|
direction: out
|
||||||
|
|
||||||
|
- name: GigabitEthernet0/0/0/1
|
||||||
|
access_groups:
|
||||||
|
- afi: ipv4
|
||||||
|
acls:
|
||||||
|
- name: acl_1
|
||||||
|
direction: out
|
||||||
|
state: rendered
|
||||||
|
register: result
|
||||||
|
|
||||||
|
- name: Assert that correct set of commands were rendered
|
||||||
|
assert:
|
||||||
|
that:
|
||||||
|
- "{{ merged['commands'] | symmetric_difference(result['rendered']) |length == 0 }}"
|
|
@ -0,0 +1,53 @@
|
||||||
|
---
|
||||||
|
- debug:
|
||||||
|
msg: "START iosxr_acl_interfaces replaced integration tests on connection={{ ansible_connection }}"
|
||||||
|
|
||||||
|
- include_tasks: _remove_config.yaml
|
||||||
|
|
||||||
|
- include_tasks: _populate.yaml
|
||||||
|
|
||||||
|
- block:
|
||||||
|
- name: Replace device configurations of listed interface with provided configurations
|
||||||
|
iosxr_acl_interfaces: &replaced
|
||||||
|
config:
|
||||||
|
- name: GigabitEthernet0/0/0/0
|
||||||
|
access_groups:
|
||||||
|
- afi: ipv6
|
||||||
|
acls:
|
||||||
|
- name: acl6_3
|
||||||
|
direction: in
|
||||||
|
state: replaced
|
||||||
|
register: result
|
||||||
|
|
||||||
|
- name: Assert that correct set of commands were generated
|
||||||
|
assert:
|
||||||
|
that:
|
||||||
|
- "{{ replaced['commands'] | symmetric_difference(result['commands']) |length == 0 }}"
|
||||||
|
|
||||||
|
- name: Assert that before dicts are correctly generated
|
||||||
|
assert:
|
||||||
|
that:
|
||||||
|
- "{{ merged['after'] | symmetric_difference(result['before']) |length == 0 }}"
|
||||||
|
|
||||||
|
- name: Assert that after dict is correctly generated
|
||||||
|
assert:
|
||||||
|
that:
|
||||||
|
- "{{ replaced['after'] | symmetric_difference(result['after']) |length == 0 }}"
|
||||||
|
|
||||||
|
- name: Replace device configurations of listed interfaces with provided configurarions (IDEMPOTENT)
|
||||||
|
iosxr_acl_interfaces: *replaced
|
||||||
|
register: result
|
||||||
|
|
||||||
|
- name: Assert that task was idempotent
|
||||||
|
assert:
|
||||||
|
that:
|
||||||
|
- "result['changed'] == false"
|
||||||
|
- "result.commands|length == 0"
|
||||||
|
|
||||||
|
- name: Assert that before dict is correctly generated
|
||||||
|
assert:
|
||||||
|
that:
|
||||||
|
- "{{ replaced['after'] | symmetric_difference(result['before']) |length == 0 }}"
|
||||||
|
|
||||||
|
always:
|
||||||
|
- include_tasks: _remove_config.yaml
|
102
test/integration/targets/iosxr_acl_interfaces/tests/cli/rtt.yaml
Normal file
102
test/integration/targets/iosxr_acl_interfaces/tests/cli/rtt.yaml
Normal file
|
@ -0,0 +1,102 @@
|
||||||
|
---
|
||||||
|
- debug:
|
||||||
|
msg: "START iosxr_acl_interfaces round trip integration tests on connection={{ ansible_connection }}"
|
||||||
|
|
||||||
|
- block:
|
||||||
|
- include_tasks: _remove_config.yaml
|
||||||
|
|
||||||
|
- name: Populate the device with ACLs
|
||||||
|
iosxr_config:
|
||||||
|
lines: |
|
||||||
|
ipv4 access-list acl_1
|
||||||
|
10 permit ipv4 any any
|
||||||
|
ipv4 access-list acl_2
|
||||||
|
10 permit ipv4 any any
|
||||||
|
ipv4 access-list acl_3
|
||||||
|
10 permit ipv4 any any
|
||||||
|
ipv6 access-list acl6_1
|
||||||
|
10 permit ipv6 any any
|
||||||
|
ipv6 access-list acl6_2
|
||||||
|
10 permit ipv6 any any
|
||||||
|
ipv6 access-list acl6_3
|
||||||
|
10 permit ipv6 any any
|
||||||
|
|
||||||
|
- name: Apply the provided configuration (base config)
|
||||||
|
iosxr_acl_interfaces:
|
||||||
|
config:
|
||||||
|
- name: GigabitEthernet0/0/0/0
|
||||||
|
access_groups:
|
||||||
|
- afi: ipv4
|
||||||
|
acls:
|
||||||
|
- name: acl_1
|
||||||
|
direction: in
|
||||||
|
- name: acl_2
|
||||||
|
direction: out
|
||||||
|
|
||||||
|
- afi: ipv6
|
||||||
|
acls:
|
||||||
|
- name: acl6_1
|
||||||
|
direction: in
|
||||||
|
- name: acl6_2
|
||||||
|
direction: out
|
||||||
|
|
||||||
|
- name: GigabitEthernet0/0/0/1
|
||||||
|
access_groups:
|
||||||
|
- afi: ipv4
|
||||||
|
acls:
|
||||||
|
- name: acl_1
|
||||||
|
direction: out
|
||||||
|
state: merged
|
||||||
|
|
||||||
|
- name: Gather interfaces facts
|
||||||
|
iosxr_facts:
|
||||||
|
gather_subset:
|
||||||
|
- "!all"
|
||||||
|
- "!min"
|
||||||
|
gather_network_resources:
|
||||||
|
- acl_interfaces
|
||||||
|
|
||||||
|
- name: Apply the provided configuration (config to be reverted)
|
||||||
|
iosxr_acl_interfaces:
|
||||||
|
config:
|
||||||
|
- name: GigabitEthernet0/0/0/1
|
||||||
|
access_groups:
|
||||||
|
- afi: ipv4
|
||||||
|
acls:
|
||||||
|
- name: acl_1
|
||||||
|
direction: in
|
||||||
|
- name: acl_2
|
||||||
|
direction: out
|
||||||
|
|
||||||
|
- afi: ipv6
|
||||||
|
acls:
|
||||||
|
- name: acl6_1
|
||||||
|
direction: in
|
||||||
|
- name: acl6_2
|
||||||
|
direction: out
|
||||||
|
|
||||||
|
- name: GigabitEthernet0/0/0/0
|
||||||
|
access_groups:
|
||||||
|
- afi: ipv4
|
||||||
|
acls:
|
||||||
|
- name: acl_1
|
||||||
|
direction: out
|
||||||
|
state: overridden
|
||||||
|
register: result
|
||||||
|
|
||||||
|
- name: Assert that changes were applied
|
||||||
|
assert:
|
||||||
|
that: "{{ round_trip['after'] | symmetric_difference(result['after']) |length == 0 }}"
|
||||||
|
|
||||||
|
- name: Revert back to base config using facts round trip
|
||||||
|
iosxr_acl_interfaces:
|
||||||
|
config: "{{ ansible_facts['network_resources']['acl_interfaces'] }}"
|
||||||
|
state: overridden
|
||||||
|
register: revert
|
||||||
|
|
||||||
|
- name: Assert that config was reverted
|
||||||
|
assert:
|
||||||
|
that: "{{ merged['after'] | symmetric_difference(revert['after']) |length == 0 }}"
|
||||||
|
|
||||||
|
always:
|
||||||
|
- include_tasks: _remove_config.yaml
|
205
test/integration/targets/iosxr_acl_interfaces/vars/main.yaml
Normal file
205
test/integration/targets/iosxr_acl_interfaces/vars/main.yaml
Normal file
|
@ -0,0 +1,205 @@
|
||||||
|
---
|
||||||
|
merged:
|
||||||
|
before:
|
||||||
|
- name: MgmtEth0/0/CPU0/0
|
||||||
|
|
||||||
|
- name: GigabitEthernet0/0/0/0
|
||||||
|
|
||||||
|
- name: GigabitEthernet0/0/0/1
|
||||||
|
|
||||||
|
commands:
|
||||||
|
- interface GigabitEthernet0/0/0/0
|
||||||
|
- ipv4 access-group acl_1 ingress
|
||||||
|
- ipv4 access-group acl_2 egress
|
||||||
|
- ipv6 access-group acl6_1 ingress
|
||||||
|
- ipv6 access-group acl6_2 egress
|
||||||
|
- interface GigabitEthernet0/0/0/1
|
||||||
|
- ipv4 access-group acl_1 egress
|
||||||
|
|
||||||
|
update_commands:
|
||||||
|
- interface GigabitEthernet0/0/0/1
|
||||||
|
- ipv4 access-group acl_2 egress
|
||||||
|
- ipv4 access-group acl_1 ingress
|
||||||
|
|
||||||
|
after:
|
||||||
|
- name: MgmtEth0/0/CPU0/0
|
||||||
|
|
||||||
|
- name: GigabitEthernet0/0/0/0
|
||||||
|
access_groups:
|
||||||
|
- acls:
|
||||||
|
- name: acl_1
|
||||||
|
direction: in
|
||||||
|
- name: acl_2
|
||||||
|
direction: out
|
||||||
|
afi: ipv4
|
||||||
|
|
||||||
|
- acls:
|
||||||
|
- name: acl6_1
|
||||||
|
direction: in
|
||||||
|
- name: acl6_2
|
||||||
|
direction: out
|
||||||
|
afi: ipv6
|
||||||
|
|
||||||
|
- name: GigabitEthernet0/0/0/1
|
||||||
|
access_groups:
|
||||||
|
- acls:
|
||||||
|
- name: acl_1
|
||||||
|
direction: out
|
||||||
|
afi: ipv4
|
||||||
|
|
||||||
|
update_before:
|
||||||
|
- name: MgmtEth0/0/CPU0/0
|
||||||
|
|
||||||
|
- access_groups:
|
||||||
|
- acls:
|
||||||
|
- direction: in
|
||||||
|
name: acl_1
|
||||||
|
- direction: out
|
||||||
|
name: acl_2
|
||||||
|
afi: ipv4
|
||||||
|
|
||||||
|
- acls:
|
||||||
|
- direction: in
|
||||||
|
name: acl6_1
|
||||||
|
- direction: out
|
||||||
|
name: acl6_2
|
||||||
|
afi: ipv6
|
||||||
|
name: GigabitEthernet0/0/0/0
|
||||||
|
|
||||||
|
- access_groups:
|
||||||
|
- acls:
|
||||||
|
- direction: out
|
||||||
|
name: acl_1
|
||||||
|
afi: ipv4
|
||||||
|
name: GigabitEthernet0/0/0/1
|
||||||
|
|
||||||
|
update_after:
|
||||||
|
- name: MgmtEth0/0/CPU0/0
|
||||||
|
|
||||||
|
- access_groups:
|
||||||
|
- acls:
|
||||||
|
- direction: in
|
||||||
|
name: acl_1
|
||||||
|
- direction: out
|
||||||
|
name: acl_2
|
||||||
|
afi: ipv4
|
||||||
|
- acls:
|
||||||
|
- direction: in
|
||||||
|
name: acl6_1
|
||||||
|
- direction: out
|
||||||
|
name: acl6_2
|
||||||
|
afi: ipv6
|
||||||
|
name: GigabitEthernet0/0/0/0
|
||||||
|
|
||||||
|
- access_groups:
|
||||||
|
- acls:
|
||||||
|
- direction: in
|
||||||
|
name: acl_1
|
||||||
|
- direction: out
|
||||||
|
name: acl_2
|
||||||
|
afi: ipv4
|
||||||
|
name: GigabitEthernet0/0/0/1
|
||||||
|
|
||||||
|
|
||||||
|
replaced:
|
||||||
|
commands:
|
||||||
|
- interface GigabitEthernet0/0/0/0
|
||||||
|
- no ipv4 access-group acl_1 ingress
|
||||||
|
- no ipv4 access-group acl_2 egress
|
||||||
|
- no ipv6 access-group acl6_1 ingress
|
||||||
|
- no ipv6 access-group acl6_2 egress
|
||||||
|
- ipv6 access-group acl6_3 ingress
|
||||||
|
|
||||||
|
after:
|
||||||
|
- name: MgmtEth0/0/CPU0/0
|
||||||
|
|
||||||
|
- name: GigabitEthernet0/0/0/0
|
||||||
|
access_groups:
|
||||||
|
- afi: ipv6
|
||||||
|
acls:
|
||||||
|
- name: acl6_3
|
||||||
|
direction: in
|
||||||
|
|
||||||
|
- name: GigabitEthernet0/0/0/1
|
||||||
|
access_groups:
|
||||||
|
- acls:
|
||||||
|
- name: acl_1
|
||||||
|
direction: out
|
||||||
|
afi: ipv4
|
||||||
|
|
||||||
|
overridden:
|
||||||
|
commands:
|
||||||
|
- interface GigabitEthernet0/0/0/0
|
||||||
|
- no ipv4 access-group acl_1 ingress
|
||||||
|
- no ipv4 access-group acl_2 egress
|
||||||
|
- no ipv6 access-group acl6_1 ingress
|
||||||
|
- no ipv6 access-group acl6_2 egress
|
||||||
|
- ipv6 access-group acl6_3 ingress
|
||||||
|
- interface GigabitEthernet0/0/0/1
|
||||||
|
- no ipv4 access-group acl_1 egress
|
||||||
|
- ipv4 access-group acl_2 ingress
|
||||||
|
- ipv6 access-group acl6_3 egress
|
||||||
|
|
||||||
|
after:
|
||||||
|
- name: MgmtEth0/0/CPU0/0
|
||||||
|
|
||||||
|
- name: GigabitEthernet0/0/0/0
|
||||||
|
access_groups:
|
||||||
|
- afi: ipv6
|
||||||
|
acls:
|
||||||
|
- name: acl6_3
|
||||||
|
direction: in
|
||||||
|
|
||||||
|
- name: GigabitEthernet0/0/0/1
|
||||||
|
access_groups:
|
||||||
|
- acls:
|
||||||
|
- name: acl_2
|
||||||
|
direction: in
|
||||||
|
afi: ipv4
|
||||||
|
|
||||||
|
- acls:
|
||||||
|
- name: acl6_3
|
||||||
|
direction: out
|
||||||
|
afi: ipv6
|
||||||
|
|
||||||
|
|
||||||
|
deleted:
|
||||||
|
commands:
|
||||||
|
- interface GigabitEthernet0/0/0/0
|
||||||
|
- no ipv4 access-group acl_1 ingress
|
||||||
|
- no ipv4 access-group acl_2 egress
|
||||||
|
- no ipv6 access-group acl6_1 ingress
|
||||||
|
- no ipv6 access-group acl6_2 egress
|
||||||
|
- interface GigabitEthernet0/0/0/1
|
||||||
|
- no ipv4 access-group acl_1 egress
|
||||||
|
|
||||||
|
after:
|
||||||
|
- name: MgmtEth0/0/CPU0/0
|
||||||
|
|
||||||
|
- name: GigabitEthernet0/0/0/0
|
||||||
|
|
||||||
|
- name: GigabitEthernet0/0/0/1
|
||||||
|
|
||||||
|
round_trip:
|
||||||
|
after:
|
||||||
|
- name: MgmtEth0/0/CPU0/0
|
||||||
|
- access_groups:
|
||||||
|
- acls:
|
||||||
|
- direction: out
|
||||||
|
name: acl_1
|
||||||
|
afi: ipv4
|
||||||
|
name: GigabitEthernet0/0/0/0
|
||||||
|
- access_groups:
|
||||||
|
- acls:
|
||||||
|
- direction: in
|
||||||
|
name: acl_1
|
||||||
|
- direction: out
|
||||||
|
name: acl_2
|
||||||
|
afi: ipv4
|
||||||
|
- acls:
|
||||||
|
- direction: in
|
||||||
|
name: acl6_1
|
||||||
|
- direction: out
|
||||||
|
name: acl6_2
|
||||||
|
afi: ipv6
|
||||||
|
name: GigabitEthernet0/0/0/1
|
Loading…
Reference in a new issue