mirror of https://github.com/ansible/ansible.git
New module - meraki_mr_l3_firewall (#42328)
* Initial commit for meraki_mr_l3_firewall module - CRUD functionality for layer 3 firewall rules on the Meraki MR access points - Complimentary integration test - Need to add support for SSID lookup * Added support for specifying SSID name and improved documentation * Added examples to documentation * Removed whitespacepull/42439/merge
parent
3d3d919c11
commit
132943cac5
@ -0,0 +1,277 @@
|
||||
#!/usr/bin/python
|
||||
# -*- coding: utf-8 -*-
|
||||
|
||||
# Copyright: (c) 2018, Kevin Breit (@kbreit) <kevin.breit@kevinbreit.net>
|
||||
# GNU General Public License v3.0+ (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt)
|
||||
|
||||
from __future__ import absolute_import, division, print_function
|
||||
__metaclass__ = type
|
||||
|
||||
ANSIBLE_METADATA = {
|
||||
'metadata_version': '1.1',
|
||||
'status': ['preview'],
|
||||
'supported_by': 'community'
|
||||
}
|
||||
|
||||
DOCUMENTATION = r'''
|
||||
---
|
||||
module: meraki_mr_l3_firewall
|
||||
short_description: Manage MR access point layer 3 firewalls in the Meraki cloud
|
||||
version_added: "2.7"
|
||||
description:
|
||||
- Allows for creation, management, and visibility into layer 3 firewalls implemented on Meraki MR access points.
|
||||
options:
|
||||
state:
|
||||
description:
|
||||
- Create or modify an organization.
|
||||
default: present
|
||||
choices: [present, query]
|
||||
org_name:
|
||||
description:
|
||||
- Name of organization.
|
||||
org_id:
|
||||
description:
|
||||
- ID of organization.
|
||||
net_name:
|
||||
description:
|
||||
- Name of network containing access points.
|
||||
net_id:
|
||||
description:
|
||||
- ID of network containing access points.
|
||||
number:
|
||||
description:
|
||||
- Number of SSID to apply firewall rule to.
|
||||
aliases: [ssid_number]
|
||||
ssid_name:
|
||||
description:
|
||||
- Name of SSID to apply firewall rule to.
|
||||
aliases: [ssid]
|
||||
allow_lan_access:
|
||||
description:
|
||||
- Sets whether devices can talk to other devices on the same LAN.
|
||||
type: bool
|
||||
default: yes
|
||||
rules:
|
||||
description:
|
||||
- List of firewall rules.
|
||||
suboptions:
|
||||
policy:
|
||||
description:
|
||||
- Specifies the action that should be taken when rule is hit.
|
||||
choices: [allow, deny]
|
||||
protocol:
|
||||
description:
|
||||
- Specifies protocol to match against.
|
||||
choices: [any, icmp, tcp, udp]
|
||||
dest_port:
|
||||
description:
|
||||
- Comma separated list of destination ports to match.
|
||||
dest_cidr:
|
||||
description:
|
||||
- Comma separated list of CIDR notation networks to match.
|
||||
comment:
|
||||
description:
|
||||
- Optional comment describing the firewall rule.
|
||||
author:
|
||||
- Kevin Breit (@kbreit)
|
||||
extends_documentation_fragment: meraki
|
||||
'''
|
||||
|
||||
EXAMPLES = r'''
|
||||
- name: Create single firewall rule
|
||||
meraki_mr_l3_firewall:
|
||||
auth_key: abc123
|
||||
state: present
|
||||
org_name: YourOrg
|
||||
net_id: 12345
|
||||
number: 1
|
||||
rules:
|
||||
- comment: Integration test rule
|
||||
policy: allow
|
||||
protocol: tcp
|
||||
dest_port: 80
|
||||
dest_cidr: 192.0.2.0/24
|
||||
allow_lan_access: no
|
||||
delegate_to: localhost
|
||||
|
||||
- name: Enable local LAN access
|
||||
meraki_mr_l3_firewall:
|
||||
auth_key: abc123
|
||||
state: present
|
||||
org_name: YourOrg
|
||||
net_id: 123
|
||||
number: 1
|
||||
rules:
|
||||
allow_lan_access: yes
|
||||
delegate_to: localhost
|
||||
|
||||
- name: Query firewall rules
|
||||
meraki_mr_l3_firewall:
|
||||
auth_key: abc123
|
||||
state: query
|
||||
org_name: YourOrg
|
||||
net_name: YourNet
|
||||
number: 1
|
||||
delegate_to: localhost
|
||||
'''
|
||||
|
||||
RETURN = r'''
|
||||
|
||||
'''
|
||||
|
||||
import os
|
||||
from ansible.module_utils.basic import AnsibleModule, json, env_fallback
|
||||
from ansible.module_utils.urls import fetch_url
|
||||
from ansible.module_utils._text import to_native
|
||||
from ansible.module_utils.network.meraki.meraki import MerakiModule, meraki_argument_spec
|
||||
|
||||
|
||||
def assemble_payload(meraki):
|
||||
params_map = {'policy': 'policy',
|
||||
'protocol': 'protocol',
|
||||
'dest_port': 'destPort',
|
||||
'dest_cidr': 'destCidr',
|
||||
'comment': 'comment',
|
||||
}
|
||||
rules = []
|
||||
for rule in meraki.params['rules']:
|
||||
proposed_rule = dict()
|
||||
for k, v in rule.items():
|
||||
proposed_rule[params_map[k]] = v
|
||||
rules.append(proposed_rule)
|
||||
payload = {'rules': rules}
|
||||
return payload
|
||||
|
||||
|
||||
def get_rules(meraki, net_id, number):
|
||||
path = meraki.construct_path('get_all', net_id=net_id)
|
||||
path = path + number + '/l3FirewallRules'
|
||||
response = meraki.request(path, method='GET')
|
||||
if meraki.status == 200:
|
||||
return response
|
||||
|
||||
|
||||
def get_ssid_number(name, data):
|
||||
for ssid in data:
|
||||
if name == ssid['name']:
|
||||
return ssid['number']
|
||||
return False
|
||||
|
||||
|
||||
def get_ssids(meraki, net_id):
|
||||
path = meraki.construct_path('get_all', net_id=net_id)
|
||||
return meraki.request(path, method='GET')
|
||||
|
||||
|
||||
def main():
|
||||
# define the available arguments/parameters that a user can pass to
|
||||
# the module
|
||||
|
||||
fw_rules = dict(policy=dict(type='str', choices=['allow', 'deny']),
|
||||
protocol=dict(type='str', choices=['tcp', 'udp', 'icmp', 'any']),
|
||||
dest_port=dict(type='str'),
|
||||
dest_cidr=dict(type='str'),
|
||||
comment=dict(type='str'),
|
||||
)
|
||||
|
||||
argument_spec = meraki_argument_spec()
|
||||
argument_spec.update(state=dict(type='str', choices=['present', 'query'], default='present'),
|
||||
net_name=dict(type='str'),
|
||||
net_id=dict(type='str'),
|
||||
number=dict(type='str', aliases=['ssid_number']),
|
||||
ssid_name=dict(type='str', aliases=['ssid']),
|
||||
rules=dict(type='list', default=None, elements='dict', options=fw_rules),
|
||||
allow_lan_access=dict(type='bool', default=True),
|
||||
)
|
||||
|
||||
# seed the result dict in the object
|
||||
# we primarily care about changed and state
|
||||
# change is if this module effectively modified the target
|
||||
# state will include any data that you want your module to pass back
|
||||
# for consumption, for example, in a subsequent task
|
||||
result = dict(
|
||||
changed=False,
|
||||
)
|
||||
# the AnsibleModule object will be our abstraction working with Ansible
|
||||
# this includes instantiation, a couple of common attr would be the
|
||||
# args/params passed to the execution, as well as if the module
|
||||
# supports check mode
|
||||
module = AnsibleModule(argument_spec=argument_spec,
|
||||
supports_check_mode=True,
|
||||
)
|
||||
meraki = MerakiModule(module, function='mr_l3_firewall')
|
||||
|
||||
meraki.params['follow_redirects'] = 'all'
|
||||
|
||||
query_urls = {'mr_l3_firewall': '/networks/{net_id}/ssids/'}
|
||||
update_urls = {'mr_l3_firewall': '/networks/{net_id}/ssids/'}
|
||||
|
||||
meraki.url_catalog['get_all'].update(query_urls)
|
||||
meraki.url_catalog['update'] = update_urls
|
||||
|
||||
payload = None
|
||||
|
||||
# if the user is working with this module in only check mode we do not
|
||||
# want to make any changes to the environment, just return the current
|
||||
# state with no modifications
|
||||
# FIXME: Work with Meraki so they can implement a check mode
|
||||
if module.check_mode:
|
||||
meraki.exit_json(**meraki.result)
|
||||
|
||||
# execute checks for argument completeness
|
||||
|
||||
# manipulate or modify the state as needed (this is going to be the
|
||||
# part where your module will do what it needs to do)
|
||||
org_id = meraki.params['org_id']
|
||||
orgs = None
|
||||
if org_id is None:
|
||||
orgs = meraki.get_orgs()
|
||||
for org in orgs:
|
||||
if org['name'] == meraki.params['org_name']:
|
||||
org_id = org['id']
|
||||
net_id = meraki.params['net_id']
|
||||
if net_id is None:
|
||||
if orgs is None:
|
||||
orgs = meraki.get_orgs()
|
||||
net_id = meraki.get_net_id(net_name=meraki.params['net_name'],
|
||||
data=meraki.get_nets(org_id=org_id))
|
||||
number = meraki.params['number']
|
||||
if meraki.params['ssid_name']:
|
||||
number = get_ssid_number(meraki.params['ssid_name'], get_ssids(meraki, net_id))
|
||||
|
||||
if meraki.params['state'] == 'query':
|
||||
meraki.result['data'] = get_rules(meraki, net_id, number)
|
||||
elif meraki.params['state'] == 'present':
|
||||
rules = get_rules(meraki, net_id, number)
|
||||
path = meraki.construct_path('get_all', net_id=net_id)
|
||||
path = path + number + '/l3FirewallRules'
|
||||
if meraki.params['rules']:
|
||||
payload = assemble_payload(meraki)
|
||||
else:
|
||||
payload = dict()
|
||||
update = False
|
||||
try:
|
||||
if len(rules) != len(payload['rules']): # Quick and simple check to avoid more processing
|
||||
update = True
|
||||
if update is False:
|
||||
for r in range(len(rules) - 2):
|
||||
if meraki.is_update_required(rules[r], payload[r]) is True:
|
||||
update = True
|
||||
except KeyError:
|
||||
pass
|
||||
if rules[len(rules) - 2] != meraki.params['allow_lan_access']:
|
||||
update = True
|
||||
if update is True:
|
||||
payload['allowLanAccess'] = meraki.params['allow_lan_access']
|
||||
response = meraki.request(path, method='PUT', payload=json.dumps(payload))
|
||||
if meraki.status == 200:
|
||||
meraki.result['data'] = response
|
||||
meraki.result['changed'] = True
|
||||
|
||||
# in the event of a successful module execution, you will want to
|
||||
# simple AnsibleModule.exit_json(), passing the key/value results
|
||||
meraki.exit_json(**meraki.result)
|
||||
|
||||
|
||||
if __name__ == '__main__':
|
||||
main()
|
@ -0,0 +1 @@
|
||||
unsupported
|
@ -0,0 +1,86 @@
|
||||
# Test code for the Meraki modules
|
||||
# Copyright: (c) 2018, Kevin Breit (@kbreit)
|
||||
|
||||
# GNU General Public License v3.0+ (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt)
|
||||
---
|
||||
- name: Create wireless network
|
||||
meraki_network:
|
||||
auth_key: '{{ auth_key }}'
|
||||
state: present
|
||||
org_name: '{{test_org_name}}'
|
||||
net_name: TestNetWireless
|
||||
type: wireless
|
||||
delegate_to: localhost
|
||||
register: new_net
|
||||
|
||||
- set_fact:
|
||||
net: '{{new_net.data.id}}'
|
||||
|
||||
- name: Create single firewall rule
|
||||
meraki_mr_l3_firewall:
|
||||
auth_key: '{{ auth_key }}'
|
||||
state: present
|
||||
org_name: '{{test_org_name}}'
|
||||
net_id: '{{net}}'
|
||||
number: 1
|
||||
rules:
|
||||
- comment: Integration test rule
|
||||
policy: allow
|
||||
protocol: tcp
|
||||
dest_port: 80
|
||||
dest_cidr: 192.0.2.0/24
|
||||
allow_lan_access: no
|
||||
delegate_to: localhost
|
||||
register: create_one
|
||||
|
||||
- debug:
|
||||
msg: '{{create_one}}'
|
||||
|
||||
- assert:
|
||||
that:
|
||||
- create_one.data.0.comment == 'Integration test rule'
|
||||
- create_one.data.1.policy == 'deny'
|
||||
|
||||
- name: Enable local LAN access
|
||||
meraki_mr_l3_firewall:
|
||||
auth_key: '{{ auth_key }}'
|
||||
state: present
|
||||
org_name: '{{test_org_name}}'
|
||||
net_id: '{{net}}'
|
||||
number: 1
|
||||
rules:
|
||||
allow_lan_access: yes
|
||||
delegate_to: localhost
|
||||
register: enable_lan
|
||||
|
||||
- assert:
|
||||
that:
|
||||
- enable_lan.data.1.policy == 'allow'
|
||||
|
||||
- name: Query firewall rules
|
||||
meraki_mr_l3_firewall:
|
||||
auth_key: '{{ auth_key }}'
|
||||
state: query
|
||||
org_name: '{{test_org_name}}'
|
||||
net_id: '{{net}}'
|
||||
number: 1
|
||||
delegate_to: localhost
|
||||
register: query
|
||||
|
||||
- debug:
|
||||
msg: '{{query}}'
|
||||
|
||||
- assert:
|
||||
that:
|
||||
- query.data.1.comment == 'Wireless clients accessing LAN'
|
||||
- query.data.2.comment == 'Default rule'
|
||||
- query.changed == False
|
||||
|
||||
- name: Delete wireless network
|
||||
meraki_network:
|
||||
auth_key: '{{ auth_key }}'
|
||||
state: absent
|
||||
org_name: '{{test_org_name}}'
|
||||
net_id: '{{net}}'
|
||||
number: 1
|
||||
delegate_to: localhost
|
Loading…
Reference in New Issue