diff --git a/files/acl b/files/acl
new file mode 100644
index 00000000000..6ba1047b7e2
--- /dev/null
+++ b/files/acl
@@ -0,0 +1,156 @@
+#!/usr/bin/python
+# This file is part of Ansible
+#
+# Ansible is free software: you can redistribute it and/or modify
+# it under the terms of the GNU General Public License as published by
+# the Free Software Foundation, either version 3 of the License, or
+# (at your option) any later version.
+#
+# Ansible is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with Ansible. If not, see .
+
+DOCUMENTATION = '''
+---
+module: acl
+version_added: "1.3"
+short_description: set and retrieve file acl
+description:
+ - Sets and retrivies acl for a file
+options:
+ name:
+ required: true
+ default: None
+ description:
+ - The full path of the file/object to get the facts of
+ aliases: ['path']
+ entry:
+ required: false
+ default: None
+ description:
+ - The acl to set/remove. MUST always quote! In form of '::', qualifier may be empty for some types but type and perms are always requried. '-' can be used as placeholder when you don't care about permissions.
+ state:
+ required: false
+ default: get
+ choices: [ 'get', 'present', 'absent' ]
+ description:
+ - defines which operation you want to do. C(get) get the current acl C(present) sets/changes the acl, requires entry field C(absent) deletes the acl, requires entry field
+ follow:
+ required: false
+ default: yes
+ choices: [ 'yes', 'no' ]
+ description:
+ - if yes, dereferences symlinks and sets/gets attributes on symlink target, otherwise acts on symlink itself.
+author: Brian Coca
+notes:
+ - The "acl" module requires that acl is enabled on the target filesystem and that the setfacl and getfacl binaries are installed.
+'''
+
+EXAMPLES = '''
+# Obtain the acl of /etc/foo.conf
+- acl: name=/etc/foo.conf
+
+# Grants joe read access to foo
+- acl: name=/etc/foo.conf entry="u:joe:r" state=present
+
+# Removes the acl for joe
+- acl: name=/etc/foo.conf entry="u:joe" state=absent
+'''
+
+try:
+ import posix1e
+except:
+ module.fail_json(msg="Could not import required module pylibacl (posix1e)")
+
+def main():
+ module = AnsibleModule(
+ argument_spec = dict(
+ name = dict(required=True,aliases=['path']),
+ entry = dict(required=False, default=None),
+ state = dict(required=False, default='get', choices=[ 'get', 'present', 'absent' ], type='str'),
+ follow = dict(required=False, type='bool', default=True),
+ ),
+ supports_check_mode=True,
+ )
+ path = module.params.get('name')
+ entry = module.params.get('entry')
+ state = module.params.get('state')
+ follow = module.params.get('follow')
+
+ if not os.path.exists(path):
+ module.fail_json(msg="path not found or not accessible!")
+
+ if entry is None and state in ['present','absent']:
+ module.fail_json(msg="%s needs entry to be set" % state)
+
+ if entry.count(":") != 3:
+ module.fail_json(msg="Invalid entry: '%s', it requires 3 sections divided by ':'" % entry)
+
+ changed=False
+ changes=0
+ msg = ""
+ currentacl = posix1e.ACL(file=path)
+ newacl = currentacl
+ res = currentacl
+
+ if (state == 'present'):
+ for newe in posix1e.ACL(text=entry):
+ matched = False
+ for olde in currentacl:
+ diff = False
+ if olde.tag_type == newe.tag_type:
+ if newe.tag_type in [ posix1e.ACL_GROUP, posix1e.ACL_USER ]:
+ if olde.qualifier == newe.qualifier:
+ matched = True
+ if not str(olde.permset) == str(newe.permset):
+ diff = True
+ else:
+ matched = True
+ if not str(olde.permset) == str(newe.permset):
+ diff = True
+ if diff:
+ newacl.delete_entry(olde)
+ newacl.append(newe)
+ changes=changes+1
+ if matched:
+ break
+ if not matched:
+ newacl.append(newe)
+ changes=changes+1
+ msg="%s is present" % (entry)
+ elif state == 'absent':
+ for rme in posix1e.ACL(text=entry):
+ for olde in currentacl:
+ if olde.tag_type == rme.tag_type:
+ if rme.tag_type in [ posix1e.ACL_GROUP, posix1e.ACL_USER ]:
+ if olde.qualifier == rme.qualifier:
+ newacl.delete_entry(olde)
+ changes=changes+1
+ break
+ else:
+ newacl.delete_entry(olde)
+ changes=changes+1
+ break
+ msg="%s is absent" % (entry)
+ else:
+ msg="current acl"
+
+ if changes > 0:
+ if not newacl.valid():
+ module.fail_json("Invalid acl constructed: %s" % newacl.to_any_text())
+ if not module.check_mode:
+ newacl.applyto(path)
+ changed=True
+ res=newacl
+
+ msg="%s. %d entries changed" % (msg,changes)
+ module.exit_json(changed=changed, msg=msg, acl=res.to_any_text().split())
+
+# this is magic, see lib/ansible/module_common.py
+#<>
+
+main()