Skip to content

Commit fb58b52

Browse files
Added fix for purpose field. Added description field in ansible.
Issue: #485
1 parent 854442f commit fb58b52

File tree

2 files changed

+94
-95
lines changed

2 files changed

+94
-95
lines changed

plugins/modules/ntnx_security_rules.py

Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -61,6 +61,10 @@
6161
description: security_rule Name
6262
required: false
6363
type: str
64+
description:
65+
description: security_rule Description
66+
required: false
67+
type: str
6468
security_rule_uuid:
6569
description:
6670
- security_rule UUID
@@ -881,6 +885,7 @@
881885
- name: create app security rule
882886
ntnx_security_rules:
883887
name: test_app_rule
888+
description: App Security Rule
884889
allow_ipv6_traffic: true
885890
policy_hitlog: true
886891
app_rule:
@@ -986,6 +991,7 @@
986991
type: dict
987992
sample:
988993
name: test_app_rule
994+
description: App Security Rule
989995
resources:
990996
allow_ipv6_traffic: true
991997
app_rule:
@@ -1184,6 +1190,7 @@ def get_module_spec():
11841190
)
11851191
module_args = dict(
11861192
name=dict(type="str"),
1193+
description=dict(type="str"),
11871194
security_rule_uuid=dict(type="str"),
11881195
allow_ipv6_traffic=dict(type="bool"),
11891196
policy_hitlog=dict(type="bool"),
Lines changed: 87 additions & 95 deletions
Original file line numberDiff line numberDiff line change
@@ -1,81 +1,74 @@
11
- name: create app security rule with inbound and outbound list
22
ntnx_security_rules:
33
name: test_app_rule
4+
description: App Security Rule
45
app_rule:
56
target_group:
6-
categories:
7-
apptype: Apache_Spark
8-
apptype_filter_by_category:
9-
AppFamily:
10-
- Backup
11-
apptiers:
12-
- "{{categories.apptiers[0]}}"
13-
- "{{categories.apptiers[1]}}"
7+
categories:
8+
apptype: Apache_Spark
9+
apptype_filter_by_category:
10+
AppFamily:
11+
- Backup
12+
apptiers:
13+
- "{{categories.apptiers[0]}}"
14+
- "{{categories.apptiers[1]}}"
1415

15-
default_internal_policy: DENY_ALL
16+
default_internal_policy: DENY_ALL
1617

1718
inbounds:
18-
-
19-
categories:
20-
AppFamily:
21-
- Databases
22-
- DevOps
23-
description: test description
24-
protocol:
25-
tcp:
26-
- start_port: 22
27-
end_port: 80
28-
-
29-
categories:
30-
AppFamily:
31-
- Databases
32-
- DevOps
33-
protocol:
34-
icmp:
35-
- code: 1
36-
type: 1
37-
-
38-
categories:
39-
AppFamily:
40-
- Databases
41-
- DevOps
42-
protocol:
43-
udp:
44-
- start_port: 82
45-
end_port: 8080
46-
-
47-
categories:
48-
AppFamily:
49-
- Databases
50-
- DevOps
51-
protocol:
52-
service:
53-
name: 6a44
54-
-
55-
ip_subnet:
56-
prefix_length: 24
57-
ip: 192.168.1.0
58-
description: test description
59-
-
60-
address:
19+
- categories:
20+
AppFamily:
21+
- Databases
22+
- DevOps
23+
description: test description
24+
protocol:
25+
tcp:
26+
- start_port: 22
27+
end_port: 80
28+
- categories:
29+
AppFamily:
30+
- Databases
31+
- DevOps
32+
protocol:
33+
icmp:
34+
- code: 1
35+
type: 1
36+
- categories:
37+
AppFamily:
38+
- Databases
39+
- DevOps
40+
protocol:
41+
udp:
42+
- start_port: 82
43+
end_port: 8080
44+
- categories:
45+
AppFamily:
46+
- Databases
47+
- DevOps
48+
protocol:
49+
service:
50+
name: 6a44
51+
- ip_subnet:
52+
prefix_length: 24
53+
ip: 192.168.1.0
54+
description: test description
55+
- address:
6156
name: dest
6257
outbounds:
63-
-
64-
categories:
65-
AppFamily:
66-
- Databases
67-
- DevOps
68-
protocol:
69-
icmp:
70-
- code: 1
71-
type: 1
58+
- categories:
59+
AppFamily:
60+
- Databases
61+
- DevOps
62+
protocol:
63+
icmp:
64+
- code: 1
65+
type: 1
7266
policy_mode: MONITOR
7367
allow_ipv6_traffic: true
7468
policy_hitlog: true
7569
register: result
7670
ignore_errors: true
7771

78-
7972
- name: Creation Status
8073
assert:
8174
that:
@@ -84,28 +77,27 @@
8477
- result.response.status.state == 'COMPLETE'
8578
- result.response.status.name=="test_app_rule"
8679
- result.response.status.resources.app_rule.target_group.filter.params.AppTier | length == 2
87-
fail_msg: ' fail: unable to create app security rule with inbound and outbound list'
88-
success_msg: 'pass: create app security rule with inbound and outbound list successfully'
80+
- result.response.description=="App Security Rule"
81+
fail_msg: " fail: unable to create app security rule with inbound and outbound list"
82+
success_msg: "pass: create app security rule with inbound and outbound list successfully"
8983

9084
- name: update app security rule by adding to outbound list and remove tule from inbound list
9185
ntnx_security_rules:
92-
security_rule_uuid: '{{ result.response.metadata.uuid }}'
86+
security_rule_uuid: "{{ result.response.metadata.uuid }}"
9387
app_rule:
9488
policy_mode: APPLY
9589
inbounds:
96-
-
97-
rule_id: "{{result.response.spec.resources.app_rule.inbound_allow_list.0.rule_id}}"
90+
- rule_id: "{{result.response.spec.resources.app_rule.inbound_allow_list.0.rule_id}}"
9891
state: absent
9992
outbounds:
100-
-
101-
protocol:
102-
icmp:
103-
- code: 1
104-
type: 1
105-
categories:
106-
AppFamily:
107-
- Databases
108-
- DevOps
93+
- protocol:
94+
icmp:
95+
- code: 1
96+
type: 1
97+
categories:
98+
AppFamily:
99+
- Databases
100+
- DevOps
109101
register: result
110102
ignore_errors: true
111103

@@ -117,13 +109,13 @@
117109
- result.response.status.state == 'COMPLETE'
118110
- result.response.spec.resources.app_rule.action == "APPLY"
119111
- result.response.spec.resources.app_rule.outbound_allow_list.0.icmp_type_code_list is defined
120-
fail_msg: ' fail: unable to update app security rule with outbound list '
121-
success_msg: 'pass :update app security rule with outbound list successfully'
112+
fail_msg: " fail: unable to update app security rule with outbound list "
113+
success_msg: "pass :update app security rule with outbound list successfully"
122114

123115
- name: delete app security rule
124116
ntnx_security_rules:
125117
state: absent
126-
security_rule_uuid: '{{ result.response.metadata.uuid }}'
118+
security_rule_uuid: "{{ result.response.metadata.uuid }}"
127119
register: result
128120
ignore_errors: true
129121

@@ -133,22 +125,22 @@
133125
- result.response is defined
134126
- result.failed == false
135127
- result.response.status == 'SUCCEEDED'
136-
fail_msg: ' fail: unable to delete app security rule '
137-
success_msg: 'pass : delete app security rule successfully'
128+
fail_msg: " fail: unable to delete app security rule "
129+
success_msg: "pass : delete app security rule successfully"
138130
- name: create app security rule with allow all inbound and outbound list
139131
ntnx_security_rules:
140132
name: test_app_rule
141133
app_rule:
142134
target_group:
143-
categories:
144-
apptype: Apache_Spark
145-
apptype_filter_by_category:
146-
AppFamily:
147-
- Backup
148-
apptiers:
149-
- "{{categories.apptiers[0]}}"
150-
- "{{categories.apptiers[1]}}"
151-
default_internal_policy: DENY_ALL
135+
categories:
136+
apptype: Apache_Spark
137+
apptype_filter_by_category:
138+
AppFamily:
139+
- Backup
140+
apptiers:
141+
- "{{categories.apptiers[0]}}"
142+
- "{{categories.apptiers[1]}}"
143+
default_internal_policy: DENY_ALL
152144
allow_all_outbounds: true
153145
allow_all_inbounds: true
154146
policy_mode: MONITOR
@@ -166,12 +158,12 @@
166158
- result.response.spec.name=="test_app_rule"
167159
- result.response.status.resources.app_rule.target_group.filter.params.AppTier | length == 2
168160

169-
fail_msg: ' fail: unable to create app security rule with allow all inbound and outbound list'
170-
success_msg: 'pass: create app security rule with allow all inbound and outbound list successfully'
161+
fail_msg: " fail: unable to create app security rule with allow all inbound and outbound list"
162+
success_msg: "pass: create app security rule with allow all inbound and outbound list successfully"
171163
- name: delete app security rule
172164
ntnx_security_rules:
173165
state: absent
174-
security_rule_uuid: '{{ result.response.metadata.uuid }}'
166+
security_rule_uuid: "{{ result.response.metadata.uuid }}"
175167
register: result
176168
ignore_errors: true
177169

@@ -181,5 +173,5 @@
181173
- result.response is defined
182174
- result.failed == false
183175
- result.response.status == 'SUCCEEDED'
184-
fail_msg: ' fail: unable to delete app security rule '
185-
success_msg: 'pass : delete app security rule successfully'
176+
fail_msg: " fail: unable to delete app security rule "
177+
success_msg: "pass : delete app security rule successfully"

0 commit comments

Comments
 (0)