From 3691c784d25c173f0967f536c52ee0c15922948d Mon Sep 17 00:00:00 2001 From: Brian Coca Date: Tue, 20 Dec 2016 10:50:42 -0500 Subject: [PATCH] fix check mode for all options also simplified code paths and changed import away from * fixes #19476 --- lib/ansible/modules/system/iptables.py | 62 ++++++++++++-------------- 1 file changed, 29 insertions(+), 33 deletions(-) diff --git a/lib/ansible/modules/system/iptables.py b/lib/ansible/modules/system/iptables.py index 521ad6b043a..ef45a1cdb68 100644 --- a/lib/ansible/modules/system/iptables.py +++ b/lib/ansible/modules/system/iptables.py @@ -342,6 +342,9 @@ EXAMPLES = ''' protocol: tcp ''' +# import module snippets +from ansible.module_utils.basic import AnsibleModule + def append_param(rule, param, flag, is_list): if is_list: for item in param: @@ -519,46 +522,39 @@ def main(): # Check if chain option is required if args['flush'] is False and args['chain'] is None: - module.fail_json( - msg="Either chain or flush parameter must be specified.") + module.fail_json( msg="Either chain or flush parameter must be specified.") # Flush the table - if args['flush'] is True: - flush_table(iptables_path, module, module.params) - module.exit_json(**args) + if args['flush']: + args['changed'] = True + if not module.check_mode: + flush_table(iptables_path, module, module.params) # Set the policy - if module.params['policy']: - set_chain_policy(iptables_path, module, module.params) - module.exit_json(**args) - - insert = (module.params['action'] == 'insert') - rule_is_present = check_present(iptables_path, module, module.params) - should_be_present = (args['state'] == 'present') - - # Check if target is up to date - args['changed'] = (rule_is_present != should_be_present) - - # Check only; don't modify - if module.check_mode: - module.exit_json(changed=args['changed']) - - # Target is already up to date - if args['changed'] is False: - module.exit_json(**args) - - if should_be_present: - if insert: - insert_rule(iptables_path, module, module.params) - else: - append_rule(iptables_path, module, module.params) + elif module.params['policy']: + args['changed'] = True + if not module.check_mode: + set_chain_policy(iptables_path, module, module.params) + + # Chain else: - remove_rule(iptables_path, module, module.params) + insert = (module.params['action'] == 'insert') + rule_is_present = check_present(iptables_path, module, module.params) + should_be_present = (args['state'] == 'present') + + # Check if target is up to date + args['changed'] = (rule_is_present != should_be_present) + + if args['changed'] and not module.check_mode: + if should_be_present: + if insert: + insert_rule(iptables_path, module, module.params) + else: + append_rule(iptables_path, module, module.params) + else: + remove_rule(iptables_path, module, module.params) module.exit_json(**args) -# import module snippets -from ansible.module_utils.basic import * - if __name__ == '__main__': main()