ansible-collection-hetzner-.../plugins/modules/firewall.py

439 lines
16 KiB
Python
Raw Normal View History

#!/usr/bin/python
# Copyright: (c) 2020, Hetzner Cloud GmbH <info@hetzner-cloud.de>
# GNU General Public License v3.0+ (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt)
from __future__ import annotations
DOCUMENTATION = """
---
module: firewall
short_description: Create and manage firewalls on the Hetzner Cloud.
description:
- Create, update and manage firewalls on the Hetzner Cloud.
author:
- Lukas Kaemmerling (@lkaemmerling)
options:
id:
description:
- The ID of the Hetzner Cloud Firewall to manage.
- Only required if no firewall O(name) is given.
type: int
name:
description:
- The Name of the Hetzner Cloud Firewall to manage.
- Only required if no firewall O(id) is given, or the firewall does not exist.
type: str
labels:
description:
- User-defined labels (key-value pairs).
type: dict
rules:
description:
- List of rules the firewall contain.
type: list
elements: dict
suboptions:
description:
description:
- User defined description of this rule.
type: str
direction:
description:
- The direction of the firewall rule.
type: str
choices: [in, out]
protocol:
description:
- The protocol of the firewall rule.
type: str
choices: [icmp, tcp, udp, esp, gre]
port:
description:
- The port or port range allowed by this rule.
- A port range can be specified by separating two ports with a dash, e.g 1024-5000.
- Only used if O(rules[].protocol=tcp) or O(rules[].protocol=udp).
type: str
source_ips:
description:
- List of CIDRs that are allowed within this rule.
- Use 0.0.0.0/0 to allow all IPv4 addresses and ::/0 to allow all IPv6 addresses.
- Only used if O(rules[].direction=in).
type: list
elements: str
default: []
destination_ips:
description:
- List of CIDRs that are allowed within this rule.
- Use 0.0.0.0/0 to allow all IPv4 addresses and ::/0 to allow all IPv6 addresses.
- Only used if O(rules[].direction=out).
type: list
elements: str
default: []
force:
description:
- Force the deletion of the Firewall when still in use.
type: bool
default: false
state:
description:
- State of the firewall.
default: present
choices: [absent, present]
type: str
extends_documentation_fragment:
- hetzner.hcloud.hcloud
"""
EXAMPLES = """
- name: Create a basic firewall
hetzner.hcloud.firewall:
name: my-firewall
state: present
- name: Create a firewall with rules
hetzner.hcloud.firewall:
name: my-firewall
rules:
- description: allow icmp from everywhere
direction: in
deps: update pre-commit hook ansible/ansible-lint to v6.21.0 (#365) [![Mend Renovate](https://app.renovatebot.com/images/banner.svg)](https://renovatebot.com) This PR contains the following updates: | Package | Type | Update | Change | |---|---|---|---| | [ansible/ansible-lint](https://togithub.com/ansible/ansible-lint) | repository | minor | `v6.20.3` -> `v6.21.0` | Note: The `pre-commit` manager in Renovate is not supported by the `pre-commit` maintainers or community. Please do not report any problems there, instead [create a Discussion in the Renovate repository](https://togithub.com/renovatebot/renovate/discussions/new) if you have any questions. --- ### Release Notes <details> <summary>ansible/ansible-lint (ansible/ansible-lint)</summary> ### [`v6.21.0`](https://togithub.com/ansible/ansible-lint/releases/tag/v6.21.0) [Compare Source](https://togithub.com/ansible/ansible-lint/compare/v6.20.3...v6.21.0) #### Minor Changes - Allow linting plugin EXAMPLES as playbooks ([#&#8203;3309](https://togithub.com/ansible/ansible-lint/issues/3309)) [@&#8203;Qalthos](https://togithub.com/Qalthos) #### Bugfixes - Add support for Rocky ([#&#8203;3843](https://togithub.com/ansible/ansible-lint/issues/3843)) [@&#8203;facorazza](https://togithub.com/facorazza) - Update supported Ubuntu versions in `meta.json` ([#&#8203;3845](https://togithub.com/ansible/ansible-lint/issues/3845)) [@&#8203;mcdonnnj](https://togithub.com/mcdonnnj) - Avoid false positives for handler in roles handlers directory ([#&#8203;3838](https://togithub.com/ansible/ansible-lint/issues/3838)) [@&#8203;ajinkyau](https://togithub.com/ajinkyau) - Hide stacktrace when loading invalid yaml ([#&#8203;3844](https://togithub.com/ansible/ansible-lint/issues/3844)) [@&#8203;ajinkyau](https://togithub.com/ajinkyau) - Add some platforms to `meta.json` ([#&#8203;3841](https://togithub.com/ansible/ansible-lint/issues/3841)) [@&#8203;mcdonnnj](https://togithub.com/mcdonnnj) - Temporary avoid auto-fixing YAML files not owned by ansible ([#&#8203;3837](https://togithub.com/ansible/ansible-lint/issues/3837)) [@&#8203;ssbarnea](https://togithub.com/ssbarnea) - Add environment variable for skipping schema update ([#&#8203;3835](https://togithub.com/ansible/ansible-lint/issues/3835)) [@&#8203;ajinkyau](https://togithub.com/ajinkyau) - Avoid creating temporary YAML files inside source tree ([#&#8203;3819](https://togithub.com/ansible/ansible-lint/issues/3819)) [@&#8203;Qalthos](https://togithub.com/Qalthos) - Document environment variables ([#&#8203;3833](https://togithub.com/ansible/ansible-lint/issues/3833)) [@&#8203;ssbarnea](https://togithub.com/ssbarnea) - Update schemas ([#&#8203;3832](https://togithub.com/ansible/ansible-lint/issues/3832)) [@&#8203;ssbarnea](https://togithub.com/ssbarnea) - Support complex requirements in argument_specs.yml ([#&#8203;3823](https://togithub.com/ansible/ansible-lint/issues/3823)) [@&#8203;tapetersen](https://togithub.com/tapetersen) - Fix SARIF-formatter severity levels ([#&#8203;3824](https://togithub.com/ansible/ansible-lint/issues/3824)) [@&#8203;4ch1m](https://togithub.com/4ch1m) - Add play level autofix for key-order rule ([#&#8203;3815](https://togithub.com/ansible/ansible-lint/issues/3815)) [@&#8203;ajinkyau](https://togithub.com/ajinkyau) - Add support for python 3.12 ([#&#8203;3813](https://togithub.com/ansible/ansible-lint/issues/3813)) [@&#8203;ssbarnea](https://togithub.com/ssbarnea) - Update SPDX license list ([#&#8203;3814](https://togithub.com/ansible/ansible-lint/issues/3814)) [@&#8203;ssbarnea](https://togithub.com/ssbarnea) - Use checkout action in install docs ([#&#8203;3810](https://togithub.com/ansible/ansible-lint/issues/3810)) [@&#8203;gma](https://togithub.com/gma) - Fix actions-tagger arguments ([#&#8203;3808](https://togithub.com/ansible/ansible-lint/issues/3808)) [@&#8203;ssbarnea](https://togithub.com/ssbarnea) </details> --- ### Configuration 📅 **Schedule**: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined). 🚦 **Automerge**: Disabled by config. Please merge this manually once you are satisfied. ♻ **Rebasing**: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox. 🔕 **Ignore**: Close this PR and you won't be reminded about this update again. --- - [ ] <!-- rebase-check -->If you want to rebase/retry this PR, check this box --- This PR has been generated by [Mend Renovate](https://www.mend.io/free-developer-tools/renovate/). View repository job log [here](https://developer.mend.io/github/ansible-collections/hetzner.hcloud). <!--renovate-debug:eyJjcmVhdGVkSW5WZXIiOiIzNy4xOS4yIiwidXBkYXRlZEluVmVyIjoiMzcuMTkuMiIsInRhcmdldEJyYW5jaCI6Im1haW4ifQ==--> --------- Co-authored-by: renovate[bot] <29139614+renovate[bot]@users.noreply.github.com> Co-authored-by: jo <ljonas@riseup.net>
2023-10-19 10:41:44 +00:00
protocol: icmp
source_ips:
- 0.0.0.0/0
- ::/0
state: present
- name: Create a firewall with labels
hetzner.hcloud.firewall:
name: my-firewall
labels:
deps: update pre-commit hook ansible/ansible-lint to v6.21.0 (#365) [![Mend Renovate](https://app.renovatebot.com/images/banner.svg)](https://renovatebot.com) This PR contains the following updates: | Package | Type | Update | Change | |---|---|---|---| | [ansible/ansible-lint](https://togithub.com/ansible/ansible-lint) | repository | minor | `v6.20.3` -> `v6.21.0` | Note: The `pre-commit` manager in Renovate is not supported by the `pre-commit` maintainers or community. Please do not report any problems there, instead [create a Discussion in the Renovate repository](https://togithub.com/renovatebot/renovate/discussions/new) if you have any questions. --- ### Release Notes <details> <summary>ansible/ansible-lint (ansible/ansible-lint)</summary> ### [`v6.21.0`](https://togithub.com/ansible/ansible-lint/releases/tag/v6.21.0) [Compare Source](https://togithub.com/ansible/ansible-lint/compare/v6.20.3...v6.21.0) #### Minor Changes - Allow linting plugin EXAMPLES as playbooks ([#&#8203;3309](https://togithub.com/ansible/ansible-lint/issues/3309)) [@&#8203;Qalthos](https://togithub.com/Qalthos) #### Bugfixes - Add support for Rocky ([#&#8203;3843](https://togithub.com/ansible/ansible-lint/issues/3843)) [@&#8203;facorazza](https://togithub.com/facorazza) - Update supported Ubuntu versions in `meta.json` ([#&#8203;3845](https://togithub.com/ansible/ansible-lint/issues/3845)) [@&#8203;mcdonnnj](https://togithub.com/mcdonnnj) - Avoid false positives for handler in roles handlers directory ([#&#8203;3838](https://togithub.com/ansible/ansible-lint/issues/3838)) [@&#8203;ajinkyau](https://togithub.com/ajinkyau) - Hide stacktrace when loading invalid yaml ([#&#8203;3844](https://togithub.com/ansible/ansible-lint/issues/3844)) [@&#8203;ajinkyau](https://togithub.com/ajinkyau) - Add some platforms to `meta.json` ([#&#8203;3841](https://togithub.com/ansible/ansible-lint/issues/3841)) [@&#8203;mcdonnnj](https://togithub.com/mcdonnnj) - Temporary avoid auto-fixing YAML files not owned by ansible ([#&#8203;3837](https://togithub.com/ansible/ansible-lint/issues/3837)) [@&#8203;ssbarnea](https://togithub.com/ssbarnea) - Add environment variable for skipping schema update ([#&#8203;3835](https://togithub.com/ansible/ansible-lint/issues/3835)) [@&#8203;ajinkyau](https://togithub.com/ajinkyau) - Avoid creating temporary YAML files inside source tree ([#&#8203;3819](https://togithub.com/ansible/ansible-lint/issues/3819)) [@&#8203;Qalthos](https://togithub.com/Qalthos) - Document environment variables ([#&#8203;3833](https://togithub.com/ansible/ansible-lint/issues/3833)) [@&#8203;ssbarnea](https://togithub.com/ssbarnea) - Update schemas ([#&#8203;3832](https://togithub.com/ansible/ansible-lint/issues/3832)) [@&#8203;ssbarnea](https://togithub.com/ssbarnea) - Support complex requirements in argument_specs.yml ([#&#8203;3823](https://togithub.com/ansible/ansible-lint/issues/3823)) [@&#8203;tapetersen](https://togithub.com/tapetersen) - Fix SARIF-formatter severity levels ([#&#8203;3824](https://togithub.com/ansible/ansible-lint/issues/3824)) [@&#8203;4ch1m](https://togithub.com/4ch1m) - Add play level autofix for key-order rule ([#&#8203;3815](https://togithub.com/ansible/ansible-lint/issues/3815)) [@&#8203;ajinkyau](https://togithub.com/ajinkyau) - Add support for python 3.12 ([#&#8203;3813](https://togithub.com/ansible/ansible-lint/issues/3813)) [@&#8203;ssbarnea](https://togithub.com/ssbarnea) - Update SPDX license list ([#&#8203;3814](https://togithub.com/ansible/ansible-lint/issues/3814)) [@&#8203;ssbarnea](https://togithub.com/ssbarnea) - Use checkout action in install docs ([#&#8203;3810](https://togithub.com/ansible/ansible-lint/issues/3810)) [@&#8203;gma](https://togithub.com/gma) - Fix actions-tagger arguments ([#&#8203;3808](https://togithub.com/ansible/ansible-lint/issues/3808)) [@&#8203;ssbarnea](https://togithub.com/ssbarnea) </details> --- ### Configuration 📅 **Schedule**: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined). 🚦 **Automerge**: Disabled by config. Please merge this manually once you are satisfied. ♻ **Rebasing**: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox. 🔕 **Ignore**: Close this PR and you won't be reminded about this update again. --- - [ ] <!-- rebase-check -->If you want to rebase/retry this PR, check this box --- This PR has been generated by [Mend Renovate](https://www.mend.io/free-developer-tools/renovate/). View repository job log [here](https://developer.mend.io/github/ansible-collections/hetzner.hcloud). <!--renovate-debug:eyJjcmVhdGVkSW5WZXIiOiIzNy4xOS4yIiwidXBkYXRlZEluVmVyIjoiMzcuMTkuMiIsInRhcmdldEJyYW5jaCI6Im1haW4ifQ==--> --------- Co-authored-by: renovate[bot] <29139614+renovate[bot]@users.noreply.github.com> Co-authored-by: jo <ljonas@riseup.net>
2023-10-19 10:41:44 +00:00
key: value
mylabel: 123
state: present
- name: Ensure the firewall is absent (remove if needed)
hetzner.hcloud.firewall:
name: my-firewall
state: absent
"""
RETURN = """
hcloud_firewall:
description: The firewall instance.
returned: always
type: dict
contains:
id:
description: Numeric identifier of the firewall.
returned: always
type: int
sample: 1937415
name:
description: Name of the firewall.
returned: always
type: str
sample: my-firewall
labels:
description: User-defined labels (key-value pairs).
returned: always
type: dict
rules:
description: List of rules the firewall contain.
returned: always
type: list
elements: dict
contains:
description:
description: User defined description of this rule.
type: str
returned: always
sample: allow http from anywhere
direction:
description: The direction of the firewall rule.
type: str
returned: always
sample: in
protocol:
description: The protocol of the firewall rule.
type: str
returned: always
sample: tcp
port:
description: The port or port range allowed by this rule.
type: str
returned: if RV(hcloud_firewall.rules[].protocol=tcp) or RV(hcloud_firewall.rules[].protocol=udp)
sample: "80"
source_ips:
description: List of source CIDRs that are allowed within this rule.
type: list
elements: str
returned: always
sample: ["0.0.0.0/0", "::/0"]
destination_ips:
description: List of destination CIDRs that are allowed within this rule.
type: list
elements: str
returned: always
sample: []
applied_to:
description: List of Resources the Firewall is applied to.
returned: always
type: list
elements: dict
contains:
type:
description: Type of the resource.
type: str
choices: [server, label_selector]
sample: label_selector
server:
description: ID of the server.
type: int
sample: 12345
label_selector:
description: Label selector value.
type: str
sample: env=prod
applied_to_resources:
description: List of Resources the Firewall label selector is applied to.
returned: if RV(hcloud_firewall.applied_to[].type=label_selector)
type: list
elements: dict
contains:
type:
description: Type of resource referenced.
type: str
choices: [server]
sample: server
server:
description: ID of the Server.
type: int
sample: 12345
"""
import time
from ansible.module_utils.basic import AnsibleModule
from ansible.module_utils.common.text.converters import to_native
from ..module_utils.hcloud import AnsibleHCloud
from ..module_utils.vendor.hcloud import APIException, HCloudException
from ..module_utils.vendor.hcloud.firewalls import (
BoundFirewall,
FirewallResource,
FirewallRule,
)
class AnsibleHCloudFirewall(AnsibleHCloud):
represent = "hcloud_firewall"
hcloud_firewall: BoundFirewall | None = None
def _prepare_result(self):
return {
"id": to_native(self.hcloud_firewall.id),
"name": to_native(self.hcloud_firewall.name),
"rules": [self._prepare_result_rule(rule) for rule in self.hcloud_firewall.rules],
"labels": self.hcloud_firewall.labels,
"applied_to": [self._prepare_result_applied_to(resource) for resource in self.hcloud_firewall.applied_to],
}
def _prepare_result_rule(self, rule: FirewallRule):
return {
"direction": to_native(rule.direction),
"protocol": to_native(rule.protocol),
"port": to_native(rule.port) if rule.port is not None else None,
"source_ips": [to_native(cidr) for cidr in rule.source_ips],
"destination_ips": [to_native(cidr) for cidr in rule.destination_ips],
"description": to_native(rule.description) if rule.description is not None else None,
}
def _prepare_result_applied_to(self, resource: FirewallResource):
result = {
"type": to_native(resource.type),
"server": to_native(resource.server.id) if resource.server is not None else None,
"label_selector": (
to_native(resource.label_selector.selector) if resource.label_selector is not None else None
),
}
if resource.applied_to_resources is not None:
result["applied_to_resources"] = [
{
"type": to_native(item.type),
"server": to_native(item.server.id) if item.server is not None else None,
}
for item in resource.applied_to_resources
]
return result
def _get_firewall(self):
try:
if self.module.params.get("id") is not None:
self.hcloud_firewall = self.client.firewalls.get_by_id(self.module.params.get("id"))
elif self.module.params.get("name") is not None:
self.hcloud_firewall = self.client.firewalls.get_by_name(self.module.params.get("name"))
except HCloudException as exception:
self.fail_json_hcloud(exception)
def _create_firewall(self):
self.module.fail_on_missing_params(required_params=["name"])
params = {
"name": self.module.params.get("name"),
"labels": self.module.params.get("labels"),
}
rules = self.module.params.get("rules")
if rules is not None:
params["rules"] = [
FirewallRule(
direction=rule["direction"],
protocol=rule["protocol"],
source_ips=rule["source_ips"] if rule["source_ips"] is not None else [],
destination_ips=rule["destination_ips"] if rule["destination_ips"] is not None else [],
port=rule["port"],
description=rule["description"],
)
for rule in rules
]
if not self.module.check_mode:
try:
self.client.firewalls.create(**params)
except HCloudException as exception:
self.fail_json_hcloud(exception, params=params)
self._mark_as_changed()
self._get_firewall()
def _update_firewall(self):
name = self.module.params.get("name")
if name is not None and self.hcloud_firewall.name != name:
self.module.fail_on_missing_params(required_params=["id"])
if not self.module.check_mode:
self.hcloud_firewall.update(name=name)
self._mark_as_changed()
labels = self.module.params.get("labels")
if labels is not None and self.hcloud_firewall.labels != labels:
if not self.module.check_mode:
self.hcloud_firewall.update(labels=labels)
self._mark_as_changed()
rules = self.module.params.get("rules")
if rules is not None and rules != [self._prepare_result_rule(rule) for rule in self.hcloud_firewall.rules]:
if not self.module.check_mode:
new_rules = [
FirewallRule(
direction=rule["direction"],
protocol=rule["protocol"],
source_ips=rule["source_ips"] if rule["source_ips"] is not None else [],
destination_ips=rule["destination_ips"] if rule["destination_ips"] is not None else [],
port=rule["port"],
description=rule["description"],
)
for rule in rules
]
self.hcloud_firewall.set_rules(new_rules)
self._mark_as_changed()
self._get_firewall()
def present_firewall(self):
self._get_firewall()
if self.hcloud_firewall is None:
self._create_firewall()
else:
self._update_firewall()
def delete_firewall(self):
self._get_firewall()
if self.hcloud_firewall is not None:
if not self.module.check_mode:
if self.hcloud_firewall.applied_to:
if self.module.params.get("force"):
actions = self.hcloud_firewall.remove_from_resources(self.hcloud_firewall.applied_to)
for action in actions:
action.wait_until_finished()
else:
self.module.warn(
f"Firewall {self.hcloud_firewall.name} is currently used by "
"other resources. You need to unassign the resources before "
"deleting the Firewall or use force=true."
)
retry_count = 0
while True:
try:
self.hcloud_firewall.delete()
break
except APIException as exception:
if "is still in use" in exception.message and retry_count < 10:
retry_count += 1
time.sleep(0.5 * retry_count)
continue
self.fail_json_hcloud(exception)
except HCloudException as exception:
self.fail_json_hcloud(exception)
self._mark_as_changed()
self.hcloud_firewall = None
@classmethod
def define_module(cls):
return AnsibleModule(
argument_spec=dict(
id={"type": "int"},
name={"type": "str"},
labels={"type": "dict"},
rules=dict(
type="list",
elements="dict",
options=dict(
description={"type": "str"},
direction={"type": "str", "choices": ["in", "out"]},
protocol={"type": "str", "choices": ["icmp", "udp", "tcp", "esp", "gre"]},
port={"type": "str"},
source_ips={"type": "list", "elements": "str", "default": []},
destination_ips={"type": "list", "elements": "str", "default": []},
),
required_together=[["direction", "protocol"]],
required_if=[
["protocol", "udp", ["port"]],
["protocol", "tcp", ["port"]],
],
),
force={"type": "bool", "default": False},
state={
"choices": ["absent", "present"],
"default": "present",
},
**super().base_module_arguments(),
),
required_one_of=[["id", "name"]],
required_if=[["state", "present", ["name"]]],
supports_check_mode=True,
)
def main():
module = AnsibleHCloudFirewall.define_module()
hcloud = AnsibleHCloudFirewall(module)
state = module.params.get("state")
if state == "absent":
hcloud.delete_firewall()
elif state == "present":
hcloud.present_firewall()
module.exit_json(**hcloud.get_result())
if __name__ == "__main__":
main()