community.general/lib/ansible/modules/cloud/azure/azure_rm_azurefirewall.py
Zim Kalinowski b37ae35ba0 azure_rm_azurefirewall (#56359)
* azure_rm_azurefirewall

* a few updates

* fixed mistake

* updated docs, fixed syntax

* updated priority

* use checkmode for idempotence test, as it's very long

* fix check mode
2019-05-20 10:38:55 -07:00

716 lines
24 KiB
Python

#!/usr/bin/python
#
# Copyright (c) 2019 Zim Kalinowski, (@zikalino), Jurijs Fadejevs (@needgithubid)
#
# GNU General Public License v3.0+ (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt)
from __future__ import absolute_import, division, print_function
__metaclass__ = type
ANSIBLE_METADATA = {'metadata_version': '1.1',
'status': ['preview'],
'supported_by': 'community'}
DOCUMENTATION = '''
---
module: azure_rm_azurefirewall
version_added: '2.9'
short_description: Manage Azure Firewall instance.
description:
- 'Create, update and delete instance of Azure Firewall.'
options:
resource_group:
description:
- The name of the resource group.
required: true
name:
description:
- The name of the Azure Firewall.
required: true
location:
description:
- Resource location.
application_rule_collections:
description:
- Collection of application rule collections used by Azure Firewall.
type: list
suboptions:
priority:
description:
- Priority of the application rule collection resource.
type: int
action:
description:
- The action type of a rule collection
choices:
- allow
- deny
rules:
description:
- Collection of rules used by a application rule collection.
type: list
suboptions:
name:
description:
- Name of the application rule.
description:
description:
- Description of the rule.
source_addresses:
description:
- List of source IP addresses for this rule.
type: list
protocols:
description:
- Array of ApplicationRuleProtocols.
type: list
target_fqdns:
description:
- List of FQDNs for this rule.
type: list
fqdn_tags:
description:
- List of FQDN Tags for this rule.
type: list
name:
description:
- >-
Gets name of the resource that is unique within a resource group.
This name can be used to access the resource.
nat_rule_collections:
description:
- Collection of NAT rule collections used by Azure Firewall.
type: list
suboptions:
priority:
description:
- Priority of the NAT rule collection resource.
type: int
action:
description:
- The action type of a NAT rule collection
choices:
- snat
- dnat
rules:
description:
- Collection of rules used by a NAT rule collection.
type: list
suboptions:
name:
description:
- Name of the NAT rule.
description:
description:
- Description of the rule.
source_addresses:
description:
- List of source IP addresses for this rule.
type: list
destination_addresses:
description:
- List of destination IP addresses for this rule.
type: list
destination_ports:
description:
- List of destination ports.
type: list
protocols:
description:
- >-
Array of AzureFirewallNetworkRuleProtocols applicable to this
NAT rule.
type: list
translated_address:
description:
- The translated address for this NAT rule.
translated_port:
description:
- The translated port for this NAT rule.
name:
description:
- >-
Gets name of the resource that is unique within a resource group.
This name can be used to access the resource.
network_rule_collections:
description:
- Collection of network rule collections used by Azure Firewall.
type: list
suboptions:
priority:
description:
- Priority of the network rule collection resource.
type: int
action:
description:
- The action type of a rule collection
choices:
- allow
- deny
rules:
description:
- Collection of rules used by a network rule collection.
type: list
suboptions:
name:
description:
- Name of the network rule.
description:
description:
- Description of the rule.
protocols:
description:
- Array of AzureFirewallNetworkRuleProtocols.
type: list
source_addresses:
description:
- List of source IP addresses for this rule.
type: list
destination_addresses:
description:
- List of destination IP addresses.
type: list
destination_ports:
description:
- List of destination ports.
type: list
name:
description:
- >-
Gets name of the resource that is unique within a resource group.
This name can be used to access the resource.
ip_configurations:
description:
- IP configuration of the Azure Firewall resource.
type: list
suboptions:
subnet:
description:
- Existing subnet.
- It can be a string containing subnet resource id.
- It can be a dictionary containing C(name), C(virtual_network_name) and optionally C(resource_group) .
public_ip_address:
description:
- Existing public IP address
- It can be a string containing resource id.
- It can be a string containing a name in current resource group.
- It can be a dictionary containing C(name) and optionally C(resource_group).
name:
description:
- >-
Name of the resource that is unique within a resource group. This
name can be used to access the resource.
state:
description:
- Assert the state of the AzureFirewall.
- >-
Use C(present) to create or update an AzureFirewall and C(absent) to
delete it.
default: present
choices:
- absent
- present
extends_documentation_fragment:
- azure
- azure_tags
author:
- Zim Kalinowski (@zikalino)
- Jurijs Fadejevs (@needgithubid)
'''
EXAMPLES = '''
- name: Create Azure Firewall
azure_rm_azurefirewall:
resource_group: myResourceGroup
name: myAzureFirewall
tags:
key1: value1
application_rule_collections:
- priority: 110
action:
type: deny
rules:
- name: rule1
description: Deny inbound rule
source_addresses:
- 216.58.216.164
- 10.0.0.0/24
protocols:
- type: https
port: '443'
target_fqdns:
- www.test.com
name: apprulecoll
nat_rule_collections:
- priority: 112
action:
type: dnat
rules:
- name: DNAT-HTTPS-traffic
description: D-NAT all outbound web traffic for inspection
source_addresses:
- '*'
destination_addresses:
- 1.2.3.4
destination_ports:
- '443'
protocols:
- tcp
translated_address: 1.2.3.5
translated_port: '8443'
name: natrulecoll
network_rule_collections:
- priority: 112
action:
type: deny
rules:
- name: L4-traffic
description: Block traffic based on source IPs and ports
protocols:
- tcp
source_addresses:
- 192.168.1.1-192.168.1.12
- 10.1.4.12-10.1.4.255
destination_addresses:
- '*'
destination_ports:
- 443-444
- '8443'
name: netrulecoll
ip_configurations:
- subnet: >-
/subscriptions/xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx/resourceGroups/myResourceGroup
/providers/Microsoft.Network/virtualNetworks/myVirtualNetwork
/subnets/AzureFirewallSubnet
public_ip_address: >-
/subscriptions/xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx/resourceGroups/myResourceGroup
/providers/Microsoft.Network/publicIPAddresses/
myPublicIpAddress
name: azureFirewallIpConfiguration
- name: Delete Azure Firewall
azure_rm_azurefirewall:
resource_group: myResourceGroup
name: myAzureFirewall
state: absent
'''
RETURN = '''
id:
description:
- Resource ID.
returned: always
type: str
sample: /subscriptions/xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx/resourceGroups/myResourceGroup/providers/Microsoft.Network/azureFirewalls/myAzureFirewall
'''
import time
import json
import re
from ansible.module_utils.azure_rm_common_ext import AzureRMModuleBaseExt
from ansible.module_utils.azure_rm_common_rest import GenericRestClient
from copy import deepcopy
try:
from msrestazure.azure_exceptions import CloudError
except ImportError:
# This is handled in azure_rm_common
pass
class Actions:
NoAction, Create, Update, Delete = range(4)
class AzureRMAzureFirewalls(AzureRMModuleBaseExt):
def __init__(self):
self.module_arg_spec = dict(
resource_group=dict(
type='str',
disposition='resource_group_name',
required=True
),
name=dict(
type='str',
disposition='azure_firewall_name',
required=True
),
location=dict(
type='str',
updatable=False,
disposition='/',
comparison='location'
),
application_rule_collections=dict(
type='list',
disposition='/properties/applicationRuleCollections',
options=dict(
priority=dict(
type='int',
disposition='properties/*'
),
action=dict(
type='str',
choices=['allow',
'deny'],
disposition='properties/action/type',
pattern='camelize'
),
rules=dict(
type='list',
disposition='properties/*',
options=dict(
name=dict(
type='str'
),
description=dict(
type='str'
),
source_addresses=dict(
type='list',
disposition='sourceAddresses'
),
protocols=dict(
type='list',
options=dict(
type=dict(
type='str',
disposition='protocolType'
),
port=dict(
type='str'
)
)
),
target_fqdns=dict(
type='list',
disposition='targetFqdns'
),
fqdn_tags=dict(
type='list',
disposition='fqdnTags'
)
)
),
name=dict(
type='str'
)
)
),
nat_rule_collections=dict(
type='list',
disposition='/properties/natRuleCollections',
options=dict(
priority=dict(
type='int',
disposition='properties/*'
),
action=dict(
type='str',
disposition='properties/action/type',
choices=['snat',
'dnat'],
pattern='camelize'
),
rules=dict(
type='list',
disposition='properties/*',
options=dict(
name=dict(
type='str'
),
description=dict(
type='str'
),
source_addresses=dict(
type='list',
disposition='sourceAddresses'
),
destination_addresses=dict(
type='list',
disposition='destinationAddresses'
),
destination_ports=dict(
type='list',
disposition='destinationPorts'
),
protocols=dict(
type='list'
),
translated_address=dict(
type='str',
disposition='translatedAddress'
),
translated_port=dict(
type='str',
disposition='translatedPort'
)
)
),
name=dict(
type='str'
)
)
),
network_rule_collections=dict(
type='list',
disposition='/properties/networkRuleCollections',
options=dict(
priority=dict(
type='int',
disposition='properties/*'
),
action=dict(
type='str',
choices=['allow',
'deny'],
disposition='properties/action/type',
pattern='camelize'
),
rules=dict(
type='list',
disposition='properties/*',
options=dict(
name=dict(
type='str'
),
description=dict(
type='str'
),
protocols=dict(
type='list'
),
source_addresses=dict(
type='list',
disposition='sourceAddresses'
),
destination_addresses=dict(
type='list',
disposition='destinationAddresses'
),
destination_ports=dict(
type='list',
disposition='destinationPorts'
)
)
),
name=dict(
type='str'
)
)
),
ip_configurations=dict(
type='list',
disposition='/properties/ipConfigurations',
options=dict(
subnet=dict(
type='raw',
disposition='properties/subnet/id',
pattern=('/subscriptions/{subscription_id}/resourceGroups'
'/{resource_group}/providers/Microsoft.Network'
'/virtualNetworks/{virtual_network_name}/subnets'
'/{name}')
),
public_ip_address=dict(
type='raw',
disposition='properties/publicIPAddress/id',
pattern=('/subscriptions/{subscription_id}/resourceGroups'
'/{resource_group}/providers/Microsoft.Network'
'/publicIPAddresses/{name}')
),
name=dict(
type='str'
)
)
),
state=dict(
type='str',
default='present',
choices=['present', 'absent']
)
)
self.resource_group = None
self.name = None
self.body = {}
self.results = dict(changed=False)
self.mgmt_client = None
self.state = None
self.url = None
self.status_code = [200, 201, 202]
self.to_do = Actions.NoAction
self.body = {}
self.query_parameters = {}
self.query_parameters['api-version'] = '2018-11-01'
self.header_parameters = {}
self.header_parameters['Content-Type'] = 'application/json; charset=utf-8'
super(AzureRMAzureFirewalls, self).__init__(derived_arg_spec=self.module_arg_spec,
supports_check_mode=True,
supports_tags=True)
def exec_module(self, **kwargs):
for key in list(self.module_arg_spec.keys()):
if hasattr(self, key):
setattr(self, key, kwargs[key])
elif kwargs[key] is not None:
self.body[key] = kwargs[key]
self.inflate_parameters(self.module_arg_spec, self.body, 0)
old_response = None
response = None
self.mgmt_client = self.get_mgmt_svc_client(GenericRestClient,
base_url=self._cloud_environment.endpoints.resource_manager)
resource_group = self.get_resource_group(self.resource_group)
if 'location' not in self.body:
self.body['location'] = resource_group.location
self.url = ('/subscriptions' +
'/' + self.subscription_id +
'/resourceGroups' +
'/' + self.resource_group +
'/providers' +
'/Microsoft.Network' +
'/azureFirewalls' +
'/' + self.name)
old_response = self.get_resource()
if not old_response:
self.log("AzureFirewall instance doesn't exist")
if self.state == 'absent':
self.log("Old instance didn't exist")
else:
self.to_do = Actions.Create
else:
self.log('AzureFirewall instance already exists')
if self.state == 'absent':
self.to_do = Actions.Delete
else:
modifiers = {}
self.create_compare_modifiers(self.module_arg_spec, '', modifiers)
self.results['modifiers'] = modifiers
if not self.default_compare(modifiers, self.body, old_response, '', self.results):
self.to_do = Actions.Update
if (self.to_do == Actions.Create) or (self.to_do == Actions.Update):
self.log('Need to Create / Update the AzureFirewall instance')
if self.check_mode:
self.results['changed'] = True
return self.results
response = self.create_update_resource()
# if not old_response:
self.results['changed'] = True
# else:
# self.results['changed'] = old_response.__ne__(response)
self.log('Creation / Update done')
elif self.to_do == Actions.Delete:
self.log('AzureFirewall instance deleted')
self.results['changed'] = True
if self.check_mode:
return self.results
self.delete_resource()
# make sure instance is actually deleted, for some Azure resources, instance is hanging around
# for some time after deletion -- this should be really fixed in Azure
while self.get_resource():
time.sleep(20)
else:
self.log('AzureFirewall instance unchanged')
self.results['changed'] = False
response = old_response
if response:
self.results["id"] = response["id"]
while response['properties']['provisioningState'] == 'Updating':
time.sleep(30)
response = self.get_resource()
return self.results
def create_update_resource(self):
# self.log('Creating / Updating the AzureFirewall instance {0}'.format(self.))
try:
response = self.mgmt_client.query(self.url,
'PUT',
self.query_parameters,
self.header_parameters,
self.body,
self.status_code,
600,
30)
except CloudError as exc:
self.log('Error attempting to create the AzureFirewall instance.')
self.fail('Error creating the AzureFirewall instance: {0}'.format(str(exc)))
try:
response = json.loads(response.text)
except Exception:
response = {'text': response.text}
pass
return response
def delete_resource(self):
# self.log('Deleting the AzureFirewall instance {0}'.format(self.))
try:
response = self.mgmt_client.query(self.url,
'DELETE',
self.query_parameters,
self.header_parameters,
None,
self.status_code,
600,
30)
except CloudError as e:
self.log('Error attempting to delete the AzureFirewall instance.')
self.fail('Error deleting the AzureFirewall instance: {0}'.format(str(e)))
return True
def get_resource(self):
# self.log('Checking if the AzureFirewall instance {0} is present'.format(self.))
found = False
try:
response = self.mgmt_client.query(self.url,
'GET',
self.query_parameters,
self.header_parameters,
None,
self.status_code,
600,
30)
response = json.loads(response.text)
found = True
self.log("Response : {0}".format(response))
# self.log("AzureFirewall instance : {0} found".format(response.name))
except CloudError as e:
self.log('Did not find the AzureFirewall instance.')
if found is True:
return response
return False
def main():
AzureRMAzureFirewalls()
if __name__ == '__main__':
main()