mirror of
https://github.com/ansible-collections/community.general.git
synced 2025-04-28 21:31:26 -07:00
parent
cf5aceb482
commit
eb790cd3c6
3 changed files with 128 additions and 0 deletions
|
@ -0,0 +1,3 @@
|
||||||
|
---
|
||||||
|
minor_changes:
|
||||||
|
- Added support for iptables module iprange and its parameters src-range and dst-range
|
|
@ -272,6 +272,16 @@ options:
|
||||||
- Possible states are C(INVALID), C(NEW), C(ESTABLISHED), C(RELATED), C(UNTRACKED), C(SNAT), C(DNAT)
|
- Possible states are C(INVALID), C(NEW), C(ESTABLISHED), C(RELATED), C(UNTRACKED), C(SNAT), C(DNAT)
|
||||||
type: list
|
type: list
|
||||||
default: []
|
default: []
|
||||||
|
src_range:
|
||||||
|
description:
|
||||||
|
- Specifies the source IP range to match in the iprange module.
|
||||||
|
type: str
|
||||||
|
version_added: "2.8"
|
||||||
|
dst_range:
|
||||||
|
description:
|
||||||
|
- Specifies the destination IP range to match in the iprange module.
|
||||||
|
type: str
|
||||||
|
version_added: "2.8"
|
||||||
limit:
|
limit:
|
||||||
description:
|
description:
|
||||||
- Specifies the maximum average number of matches to allow per second.
|
- Specifies the maximum average number of matches to allow per second.
|
||||||
|
@ -360,6 +370,13 @@ EXAMPLES = r'''
|
||||||
jump: ACCEPT
|
jump: ACCEPT
|
||||||
comment: Accept new SSH connections.
|
comment: Accept new SSH connections.
|
||||||
|
|
||||||
|
- name: Match on IP ranges
|
||||||
|
iptables:
|
||||||
|
chain: FORWARD
|
||||||
|
src_range: 192.168.1.100-192.168.1.199
|
||||||
|
dst_range: 10.0.0.1-10.0.0.50
|
||||||
|
jump: ACCEPT
|
||||||
|
|
||||||
- name: Tag all outbound tcp packets with DSCP mark 8
|
- name: Tag all outbound tcp packets with DSCP mark 8
|
||||||
iptables:
|
iptables:
|
||||||
chain: OUTPUT
|
chain: OUTPUT
|
||||||
|
@ -527,6 +544,13 @@ def construct_rule(params):
|
||||||
elif params['ctstate']:
|
elif params['ctstate']:
|
||||||
append_match(rule, params['ctstate'], 'conntrack')
|
append_match(rule, params['ctstate'], 'conntrack')
|
||||||
append_csv(rule, params['ctstate'], '--ctstate')
|
append_csv(rule, params['ctstate'], '--ctstate')
|
||||||
|
if 'iprange' in params['match']:
|
||||||
|
append_param(rule, params['src_range'], '--src-range', False)
|
||||||
|
append_param(rule, params['dst_range'], '--dst-range', False)
|
||||||
|
elif params['src_range'] or params['dst_range']:
|
||||||
|
append_match(rule, params['src_range'] or params['dst_range'], 'iprange')
|
||||||
|
append_param(rule, params['src_range'], '--src-range', False)
|
||||||
|
append_param(rule, params['dst_range'], '--dst-range', False)
|
||||||
append_match(rule, params['limit'] or params['limit_burst'], 'limit')
|
append_match(rule, params['limit'] or params['limit_burst'], 'limit')
|
||||||
append_param(rule, params['limit'], '--limit', False)
|
append_param(rule, params['limit'], '--limit', False)
|
||||||
append_param(rule, params['limit_burst'], '--limit-burst', False)
|
append_param(rule, params['limit_burst'], '--limit-burst', False)
|
||||||
|
@ -639,6 +663,8 @@ def main():
|
||||||
set_dscp_mark_class=dict(type='str'),
|
set_dscp_mark_class=dict(type='str'),
|
||||||
comment=dict(type='str'),
|
comment=dict(type='str'),
|
||||||
ctstate=dict(type='list', default=[]),
|
ctstate=dict(type='list', default=[]),
|
||||||
|
src_range=dict(type='str'),
|
||||||
|
dst_range=dict(type='str'),
|
||||||
limit=dict(type='str'),
|
limit=dict(type='str'),
|
||||||
limit_burst=dict(type='str'),
|
limit_burst=dict(type='str'),
|
||||||
uid_owner=dict(type='str'),
|
uid_owner=dict(type='str'),
|
||||||
|
|
|
@ -729,3 +729,102 @@ class TestIptables(ModuleTestCase):
|
||||||
'--log-prefix', '** DROP-this_ip **',
|
'--log-prefix', '** DROP-this_ip **',
|
||||||
'--log-level', log_lvl
|
'--log-level', log_lvl
|
||||||
])
|
])
|
||||||
|
|
||||||
|
def test_iprange(self):
|
||||||
|
""" Test iprange module with its flags src_range and dst_range """
|
||||||
|
set_module_args({
|
||||||
|
'chain': 'INPUT',
|
||||||
|
'match': ['iprange'],
|
||||||
|
'src_range': '192.168.1.100-192.168.1.199',
|
||||||
|
'jump': 'ACCEPT'
|
||||||
|
})
|
||||||
|
|
||||||
|
commands_results = [
|
||||||
|
(0, '', ''),
|
||||||
|
]
|
||||||
|
|
||||||
|
with patch.object(basic.AnsibleModule, 'run_command') as run_command:
|
||||||
|
run_command.side_effect = commands_results
|
||||||
|
with self.assertRaises(AnsibleExitJson) as result:
|
||||||
|
iptables.main()
|
||||||
|
self.assertTrue(result.exception.args[0]['changed'])
|
||||||
|
|
||||||
|
self.assertEqual(run_command.call_count, 1)
|
||||||
|
self.assertEqual(run_command.call_args_list[0][0][0], [
|
||||||
|
'/sbin/iptables',
|
||||||
|
'-t',
|
||||||
|
'filter',
|
||||||
|
'-C',
|
||||||
|
'INPUT',
|
||||||
|
'-m',
|
||||||
|
'iprange',
|
||||||
|
'-j',
|
||||||
|
'ACCEPT',
|
||||||
|
'--src-range',
|
||||||
|
'192.168.1.100-192.168.1.199',
|
||||||
|
])
|
||||||
|
|
||||||
|
set_module_args({
|
||||||
|
'chain': 'INPUT',
|
||||||
|
'src_range': '192.168.1.100-192.168.1.199',
|
||||||
|
'dst_range': '10.0.0.50-10.0.0.100',
|
||||||
|
'jump': 'ACCEPT'
|
||||||
|
})
|
||||||
|
|
||||||
|
commands_results = [
|
||||||
|
(0, '', ''),
|
||||||
|
]
|
||||||
|
|
||||||
|
with patch.object(basic.AnsibleModule, 'run_command') as run_command:
|
||||||
|
run_command.side_effect = commands_results
|
||||||
|
with self.assertRaises(AnsibleExitJson) as result:
|
||||||
|
iptables.main()
|
||||||
|
self.assertTrue(result.exception.args[0]['changed'])
|
||||||
|
|
||||||
|
self.assertEqual(run_command.call_count, 1)
|
||||||
|
self.assertEqual(run_command.call_args_list[0][0][0], [
|
||||||
|
'/sbin/iptables',
|
||||||
|
'-t',
|
||||||
|
'filter',
|
||||||
|
'-C',
|
||||||
|
'INPUT',
|
||||||
|
'-j',
|
||||||
|
'ACCEPT',
|
||||||
|
'-m',
|
||||||
|
'iprange',
|
||||||
|
'--src-range',
|
||||||
|
'192.168.1.100-192.168.1.199',
|
||||||
|
'--dst-range',
|
||||||
|
'10.0.0.50-10.0.0.100'
|
||||||
|
])
|
||||||
|
|
||||||
|
set_module_args({
|
||||||
|
'chain': 'INPUT',
|
||||||
|
'dst_range': '10.0.0.50-10.0.0.100',
|
||||||
|
'jump': 'ACCEPT'
|
||||||
|
})
|
||||||
|
|
||||||
|
commands_results = [
|
||||||
|
(0, '', ''),
|
||||||
|
]
|
||||||
|
|
||||||
|
with patch.object(basic.AnsibleModule, 'run_command') as run_command:
|
||||||
|
run_command.side_effect = commands_results
|
||||||
|
with self.assertRaises(AnsibleExitJson) as result:
|
||||||
|
iptables.main()
|
||||||
|
self.assertTrue(result.exception.args[0]['changed'])
|
||||||
|
|
||||||
|
self.assertEqual(run_command.call_count, 1)
|
||||||
|
self.assertEqual(run_command.call_args_list[0][0][0], [
|
||||||
|
'/sbin/iptables',
|
||||||
|
'-t',
|
||||||
|
'filter',
|
||||||
|
'-C',
|
||||||
|
'INPUT',
|
||||||
|
'-j',
|
||||||
|
'ACCEPT',
|
||||||
|
'-m',
|
||||||
|
'iprange',
|
||||||
|
'--dst-range',
|
||||||
|
'10.0.0.50-10.0.0.100'
|
||||||
|
])
|
||||||
|
|
Loading…
Add table
Add a link
Reference in a new issue