#!/usr/bin/python # -*- coding: utf-8 -*- # # Ansible module to manage PaloAltoNetworks Firewall # (c) 2016, techbizdev # # This file is part of Ansible # # Ansible is free software: you can redistribute it and/or modify # it under the terms of the GNU General Public License as published by # the Free Software Foundation, either version 3 of the License, or # (at your option) any later version. # # Ansible is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # # You should have received a copy of the GNU General Public License # along with Ansible. If not, see . DOCUMENTATION = ''' --- module: panos_pg short_description: create a security profiles group description: - Create a security profile group author: "Luigi Mori (@jtschichold), Ivan Bojer (@ivanbojer)" requirements: - pan-python deprecated: alternative: Use U(https://galaxy.ansible.com/PaloAltoNetworks/paloaltonetworks) instead. removed_in: "2.12" why: Consolidating code base. options: pg_name: description: - name of the security profile group required: true data_filtering: description: - name of the data filtering profile file_blocking: description: - name of the file blocking profile spyware: description: - name of the spyware profile url_filtering: description: - name of the url filtering profile virus: description: - name of the anti-virus profile vulnerability: description: - name of the vulnerability profile wildfire: description: - name of the wildfire analysis profile commit: description: - commit if changed type: bool default: 'yes' extends_documentation_fragment: - community.general.panos ''' EXAMPLES = ''' - name: setup security profile group panos_pg: ip_address: "192.168.1.1" password: "admin" username: "admin" pg_name: "pg-default" virus: "default" spyware: "default" vulnerability: "default" ''' RETURN = ''' # Default return values ''' ANSIBLE_METADATA = {'metadata_version': '1.1', 'status': ['deprecated'], 'supported_by': 'community'} from ansible.module_utils.basic import AnsibleModule from ansible.module_utils._text import to_native try: import pan.xapi from pan.xapi import PanXapiError HAS_LIB = True except ImportError: HAS_LIB = False _PG_XPATH = "/config/devices/entry[@name='localhost.localdomain']" +\ "/vsys/entry[@name='vsys1']" +\ "/profile-group/entry[@name='%s']" def pg_exists(xapi, pg_name): xapi.get(_PG_XPATH % pg_name) e = xapi.element_root.find('.//entry') if e is None: return False return True def add_pg(xapi, pg_name, data_filtering, file_blocking, spyware, url_filtering, virus, vulnerability, wildfire): if pg_exists(xapi, pg_name): return False exml = [] if data_filtering is not None: exml.append('%s' % data_filtering) if file_blocking is not None: exml.append('%s' % file_blocking) if spyware is not None: exml.append('%s' % spyware) if url_filtering is not None: exml.append('%s' % url_filtering) if virus is not None: exml.append('%s' % virus) if vulnerability is not None: exml.append('%s' % vulnerability) if wildfire is not None: exml.append('%s' % wildfire) exml = ''.join(exml) xapi.set(xpath=_PG_XPATH % pg_name, element=exml) return True def main(): argument_spec = dict( ip_address=dict(required=True), password=dict(required=True, no_log=True), username=dict(default='admin'), pg_name=dict(required=True), data_filtering=dict(), file_blocking=dict(), spyware=dict(), url_filtering=dict(), virus=dict(), vulnerability=dict(), wildfire=dict(), commit=dict(type='bool', default=True) ) module = AnsibleModule(argument_spec=argument_spec, supports_check_mode=False) if not HAS_LIB: module.fail_json(msg='pan-python is required for this module') ip_address = module.params["ip_address"] password = module.params["password"] username = module.params['username'] xapi = pan.xapi.PanXapi( hostname=ip_address, api_username=username, api_password=password ) pg_name = module.params['pg_name'] data_filtering = module.params['data_filtering'] file_blocking = module.params['file_blocking'] spyware = module.params['spyware'] url_filtering = module.params['url_filtering'] virus = module.params['virus'] vulnerability = module.params['vulnerability'] wildfire = module.params['wildfire'] commit = module.params['commit'] try: changed = add_pg(xapi, pg_name, data_filtering, file_blocking, spyware, url_filtering, virus, vulnerability, wildfire) if changed and commit: xapi.commit(cmd="", sync=True, interval=1) except PanXapiError as exc: module.fail_json(msg=to_native(exc)) module.exit_json(changed=changed, msg="okey dokey") if __name__ == '__main__': main()