mirror of
https://github.com/ansible-collections/community.general.git
synced 2024-09-14 20:13:21 +02:00
ACI Filter Entry: New Module (#28200)
* ACI Filter Entry: New Module * fix aliases key
This commit is contained in:
parent
835ef7dd66
commit
24ec04cbfc
1 changed files with 237 additions and 0 deletions
237
lib/ansible/modules/network/aci/aci_filter_entry.py
Normal file
237
lib/ansible/modules/network/aci/aci_filter_entry.py
Normal file
|
@ -0,0 +1,237 @@
|
|||
#!/usr/bin/python
|
||||
# -*- coding: utf-8 -*-
|
||||
|
||||
# GNU General Public License v3.0+ (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt)
|
||||
|
||||
from __future__ import absolute_import, division, print_function
|
||||
__metaclass__ = type
|
||||
|
||||
ANSIBLE_METADATA = {'metadata_version': '1.0',
|
||||
'status': ['preview'],
|
||||
'supported_by': 'community'}
|
||||
|
||||
DOCUMENTATION = r'''
|
||||
---
|
||||
module: aci_filter_entry
|
||||
short_description: Manage filter entries on Cisco ACI fabrics
|
||||
description:
|
||||
- Manage filter entries for a filter on Cisco ACI fabrics.
|
||||
author:
|
||||
- Swetha Chunduri (@schunduri)
|
||||
- Dag Wieers (@dagwieers)
|
||||
- Jacob McGill (@jmcgill298)
|
||||
version_added: '2.4'
|
||||
requirements:
|
||||
- Tested with ACI Fabric 1.0(3f)+
|
||||
notes:
|
||||
- The tenant used must exist before using this module in your playbook. The M(aci_tenant) module can be used for this.
|
||||
- The filter used must exist before using this module in your playbook. The M(aci_filter) module can be used for this.
|
||||
options:
|
||||
arp_flag:
|
||||
description:
|
||||
- The arp flag to use when the ether_type is arp.
|
||||
choices: [ arp_reply, arp_request, unspecified ]
|
||||
description:
|
||||
description:
|
||||
- Description for the Filter Entry.
|
||||
aliases: [ descr ]
|
||||
dst_port:
|
||||
description:
|
||||
- Used to set both destination start and end ports to the same value when ip_protocol is tcp or udp.
|
||||
choices: [ Valid TCP/UDP Port Ranges]
|
||||
dst_port_end:
|
||||
description:
|
||||
- Used to set the destination end port when ip_protocol is tcp or udp.
|
||||
choices: [ Valid TCP/UDP Port Ranges]
|
||||
dst_port_start:
|
||||
description:
|
||||
- Used to set the destination start port when ip_protocol is tcp or udp.
|
||||
choices: [ Valid TCP/UDP Port Ranges]
|
||||
entry:
|
||||
description:
|
||||
- Then name of the Filter Entry.
|
||||
aliases: [ entry_name, name ]
|
||||
ether_type:
|
||||
description:
|
||||
- The Ethernet type.
|
||||
choices: [ arp, fcoe, ip, mac_security, mpls_ucast, trill, unspecified ]
|
||||
filter_name:
|
||||
description:
|
||||
The name of Filter that the entry should belong to.
|
||||
icmp_msg_type:
|
||||
description:
|
||||
- ICMPv4 message type; used when ip_protocol is icmp.
|
||||
choices: [ dst_unreachable, echo, echo_reply, src_quench, time_exceeded, unspecified ]
|
||||
icmp6_msg_type:
|
||||
description:
|
||||
- ICMPv6 message type; used when ip_protocol is icmpv6.
|
||||
choices: [ dst_unreachable, echo_request, echo_reply, neighbor_advertisement, neighbor_solicitation, redirect, time_exceeded, unspecified ]
|
||||
ip_protocol:
|
||||
description:
|
||||
- The IP Protocol type when ether_type is ip.
|
||||
choices: [ eigrp, egp, icmp, icmpv6, igmp, igp, l2tp, ospfigp, pim, tcp, udp, unspecified ]
|
||||
state:
|
||||
description:
|
||||
- present, absent, query
|
||||
default: present
|
||||
choices: [ absent, present, query ]
|
||||
stateful:
|
||||
description:
|
||||
- Determines the statefulness of the filter entry.
|
||||
tenant:
|
||||
description:
|
||||
- The name of the tenant.
|
||||
aliases: [ tenant_name ]
|
||||
extends_documentation_fragment: aci
|
||||
'''
|
||||
|
||||
EXAMPLES = r'''
|
||||
- aci_filter_entry:
|
||||
action: "{{ action }}"
|
||||
entry: "{{ entry }}"
|
||||
tenant: "{{ tenant }}"
|
||||
ether_name: "{{ ether_name }}"
|
||||
icmp_msg_type: "{{ icmp_msg_type }}"
|
||||
filter_name: "{{ filter_name }}"
|
||||
descr: "{{ descr }}"
|
||||
host: "{{ inventory_hostname }}"
|
||||
username: "{{ user }}"
|
||||
password: "{{ pass }}"
|
||||
protocol: "{{ protocol }}"
|
||||
'''
|
||||
|
||||
RETURN = ''' # '''
|
||||
|
||||
from ansible.module_utils.aci import ACIModule, aci_argument_spec
|
||||
from ansible.module_utils.basic import AnsibleModule
|
||||
|
||||
VALID_ARP_FLAGS = ['arp_reply', 'arp_request', 'unspecified']
|
||||
VALID_ETHER_TYPES = ['arp', 'fcoe', 'ip', 'mac_security', 'mpls_ucast', 'trill', 'unspecified']
|
||||
VALID_ICMP_TYPES = ['dst_unreachable', 'echo', 'echo_reply', 'src_quench', 'time_exceeded',
|
||||
'unspecified', 'echo-rep', 'dst-unreach']
|
||||
VALID_ICMP6_TYPES = ['dst_unreachable', 'echo_request', 'echo_reply', 'neighbor_advertisement',
|
||||
'neighbor_solicitation', 'redirect', 'time_exceeded', 'unspecified']
|
||||
VALID_IP_PROTOCOLS = ['eigrp', 'egp', 'icmp', 'icmpv6', 'igmp', 'igp', 'l2tp', 'ospfigp', 'pim', 'tcp', 'udp', 'unspecified']
|
||||
|
||||
# mapping dicts are used to normalize the proposed data to what the APIC expects, which will keep diffs accurate
|
||||
ARP_FLAG_MAPPING = dict(arp_reply='reply', arp_request='req', unspecified=None)
|
||||
FILTER_PORT_MAPPING = {'443': 'https', '25': 'smtp', '80': 'http', '20': 'ftpData', '53': 'dns', '110': 'pop3', '554': 'rtsp'}
|
||||
ICMP_MAPPING = {'dst_unreachable': 'dst-unreach', 'echo': 'echo', 'echo_reply': 'echo-rep', 'src_quench': 'src-quench',
|
||||
'time_exceeded': 'time-exceeded', 'unspecified': 'unspecified', 'echo-re': 'echo-rep', 'dst-unreach': 'dst-unreach'}
|
||||
ICMP6_MAPPING = dict(dst_unreachable='dst-unreach', echo_request='echo-req', echo_reply='echo-rep', neighbor_advertisement='nbr-advert',
|
||||
neighbor_solicitation='nbr-solicit', redirect='redirect', time_exceeded='time-exceeded', unspecified='unspecified')
|
||||
|
||||
|
||||
def main():
|
||||
argument_spec = aci_argument_spec
|
||||
argument_spec.update(
|
||||
arp_flag=dict(type='str', choices=VALID_ARP_FLAGS),
|
||||
description=dict(type='str'),
|
||||
dst_port=dict(type='str'),
|
||||
dst_port_end=dict(type='str'),
|
||||
dst_port_start=dict(type='str'),
|
||||
entry=dict(type='str', aliases=['entry_name', 'name']),
|
||||
ether_type=dict(choices=VALID_ETHER_TYPES, type='str'),
|
||||
filter_name=dict(type='str'),
|
||||
icmp_msg_type=dict(type='str', choices=VALID_ICMP_TYPES),
|
||||
icmp6_msg_type=dict(type='str', choices=VALID_ICMP6_TYPES),
|
||||
ip_protocol=dict(choices=VALID_IP_PROTOCOLS, type='str'),
|
||||
state=dict(type='str', default='present', choices=['absent', 'present', 'query']),
|
||||
stateful=dict(type='str', choices=['no', 'yes']),
|
||||
tenant=dict(type="str", aliases=['tenant_name'])
|
||||
)
|
||||
|
||||
module = AnsibleModule(
|
||||
argument_spec=argument_spec,
|
||||
supports_check_mode=True,
|
||||
)
|
||||
|
||||
arp_flag = module.params['arp_flag']
|
||||
if arp_flag is not None:
|
||||
arp_flag = ARP_FLAG_MAPPING[arp_flag]
|
||||
description = module.params['description']
|
||||
dst_port = module.params['dst_port']
|
||||
if dst_port in FILTER_PORT_MAPPING.keys():
|
||||
dst_port = FILTER_PORT_MAPPING[dst_port]
|
||||
dst_end = module.params['dst_port_end']
|
||||
if dst_end in FILTER_PORT_MAPPING.keys():
|
||||
dst_end = FILTER_PORT_MAPPING[dst_end]
|
||||
dst_start = module.params['dst_port_start']
|
||||
if dst_start in FILTER_PORT_MAPPING.keys():
|
||||
dst_start = FILTER_PORT_MAPPING[dst_start]
|
||||
entry = module.params['entry']
|
||||
ether_type = module.params['ether_type']
|
||||
filter_name = module.params['filter_name']
|
||||
icmp_msg_type = module.params['icmp_msg_type']
|
||||
if icmp_msg_type is not None:
|
||||
icmp_msg_type = ICMP_MAPPING[icmp_msg_type]
|
||||
icmp6_msg_type = module.params['icmp6_msg_type']
|
||||
if icmp6_msg_type is not None:
|
||||
icmp6_msg_type = ICMP6_MAPPING[icmp6_msg_type]
|
||||
ip_protocol = module.params['ip_protocol']
|
||||
state = module.params['state']
|
||||
stateful = module.params['stateful']
|
||||
tenant = module.params['tenant']
|
||||
|
||||
aci = ACIModule(module)
|
||||
|
||||
# validate that dst_port is not passed with dst_start or dst_end
|
||||
if dst_port is not None and (dst_end is not None or dst_start is not None):
|
||||
module.fail_json(msg="Parameter 'dst_port' cannot be used with 'dst_end' and 'dst_start'")
|
||||
elif dst_port is not None:
|
||||
dst_end = dst_port
|
||||
dst_start = dst_port
|
||||
|
||||
# validate that filter_name is not passed without tenant
|
||||
if filter_name is not None and tenant is None:
|
||||
module.fail_json(msg="Parameter 'filter_name' cannot be used without 'tenant'")
|
||||
|
||||
# TODO: Think through the logic here and see if there is a better way
|
||||
if entry is not None:
|
||||
# fail when entry is provided without tenant and filter_name
|
||||
if tenant is not None and filter_name is not None:
|
||||
path = 'api/mo/uni/tn-%(tenant)s/flt-%(filter_name)s/e-%(entry)s.json' % module.params
|
||||
elif tenant is not None and state == 'query':
|
||||
path = 'api/mo/uni/tn-%(tenant)s.json?rsp-subtree=full&rsp-subtree-class=vzEntry&rsp-subtree-filter=eq(vzEntry.name, \
|
||||
\"%(entry)s\")&rsp-subtree-include=no-scoped' % module.params
|
||||
else:
|
||||
path = 'api/class/vzEntry.json?query-target-filter=eq(vzEntry.name, \"%(entry)s\")' % module.params
|
||||
elif state == 'query':
|
||||
if tenant is None:
|
||||
path = 'api/class/vzEntry.json'
|
||||
else:
|
||||
path = 'api/mo/uni/tn-%(tenant)s.json?rsp-subtree=full&rsp-subtree-class=vzEntry&rsp-subtree-include=no-scoped' % module.params
|
||||
else:
|
||||
module.fail_json(msg="Parameters 'tenant', 'filter_name', and 'entry' are required for state 'absent' or 'present'")
|
||||
|
||||
aci.result['url'] = '%(protocol)s://%(hostname)s/' % aci.params + path
|
||||
|
||||
aci.get_existing()
|
||||
|
||||
if state == 'present':
|
||||
# Filter out module params with null values
|
||||
aci.payload(aci_class='vzEntry', class_config=dict(arpOpc=arp_flag,
|
||||
descr=description,
|
||||
dFromPort=dst_start,
|
||||
dToPort=dst_end,
|
||||
etherT=ether_type,
|
||||
icmpv4T=icmp_msg_type,
|
||||
icmpv6T=icmp6_msg_type,
|
||||
name=entry,
|
||||
prot=ip_protocol,
|
||||
stateful=stateful))
|
||||
|
||||
# generate config diff which will be used as POST request body
|
||||
aci.get_diff(aci_class='vzEntry')
|
||||
|
||||
# submit changes if module not in check_mode and the proposed is different than existing
|
||||
aci.post_config()
|
||||
|
||||
elif state == 'absent':
|
||||
aci.delete_config()
|
||||
|
||||
module.exit_json(**aci.result)
|
||||
|
||||
|
||||
if __name__ == "__main__":
|
||||
main()
|
Loading…
Reference in a new issue