|
1 | 1 | - name: create app security rule with inbound and outbound list
|
2 | 2 | ntnx_security_rules:
|
3 | 3 | name: test_app_rule
|
| 4 | + description: App Security Rule |
4 | 5 | app_rule:
|
5 | 6 | target_group:
|
6 |
| - categories: |
7 |
| - apptype: Apache_Spark |
8 |
| - apptype_filter_by_category: |
9 |
| - AppFamily: |
10 |
| - - Backup |
11 |
| - apptiers: |
12 |
| - - "{{categories.apptiers[0]}}" |
13 |
| - - "{{categories.apptiers[1]}}" |
| 7 | + categories: |
| 8 | + apptype: Apache_Spark |
| 9 | + apptype_filter_by_category: |
| 10 | + AppFamily: |
| 11 | + - Backup |
| 12 | + apptiers: |
| 13 | + - "{{categories.apptiers[0]}}" |
| 14 | + - "{{categories.apptiers[1]}}" |
14 | 15 |
|
15 |
| - default_internal_policy: DENY_ALL |
| 16 | + default_internal_policy: DENY_ALL |
16 | 17 |
|
17 | 18 | inbounds:
|
18 |
| - - |
19 |
| - categories: |
20 |
| - AppFamily: |
21 |
| - - Databases |
22 |
| - - DevOps |
23 |
| - description: test description |
24 |
| - protocol: |
25 |
| - tcp: |
26 |
| - - start_port: 22 |
27 |
| - end_port: 80 |
28 |
| - - |
29 |
| - categories: |
30 |
| - AppFamily: |
31 |
| - - Databases |
32 |
| - - DevOps |
33 |
| - protocol: |
34 |
| - icmp: |
35 |
| - - code: 1 |
36 |
| - type: 1 |
37 |
| - - |
38 |
| - categories: |
39 |
| - AppFamily: |
40 |
| - - Databases |
41 |
| - - DevOps |
42 |
| - protocol: |
43 |
| - udp: |
44 |
| - - start_port: 82 |
45 |
| - end_port: 8080 |
46 |
| - - |
47 |
| - categories: |
48 |
| - AppFamily: |
49 |
| - - Databases |
50 |
| - - DevOps |
51 |
| - protocol: |
52 |
| - service: |
53 |
| - name: 6a44 |
54 |
| - - |
55 |
| - ip_subnet: |
56 |
| - prefix_length: 24 |
57 |
| - ip: 192.168.1.0 |
58 |
| - description: test description |
59 |
| - - |
60 |
| - address: |
| 19 | + - categories: |
| 20 | + AppFamily: |
| 21 | + - Databases |
| 22 | + - DevOps |
| 23 | + description: test description |
| 24 | + protocol: |
| 25 | + tcp: |
| 26 | + - start_port: 22 |
| 27 | + end_port: 80 |
| 28 | + - categories: |
| 29 | + AppFamily: |
| 30 | + - Databases |
| 31 | + - DevOps |
| 32 | + protocol: |
| 33 | + icmp: |
| 34 | + - code: 1 |
| 35 | + type: 1 |
| 36 | + - categories: |
| 37 | + AppFamily: |
| 38 | + - Databases |
| 39 | + - DevOps |
| 40 | + protocol: |
| 41 | + udp: |
| 42 | + - start_port: 82 |
| 43 | + end_port: 8080 |
| 44 | + - categories: |
| 45 | + AppFamily: |
| 46 | + - Databases |
| 47 | + - DevOps |
| 48 | + protocol: |
| 49 | + service: |
| 50 | + name: 6a44 |
| 51 | + - ip_subnet: |
| 52 | + prefix_length: 24 |
| 53 | + ip: 192.168.1.0 |
| 54 | + description: test description |
| 55 | + - address: |
61 | 56 | name: dest
|
62 | 57 | outbounds:
|
63 |
| - - |
64 |
| - categories: |
65 |
| - AppFamily: |
66 |
| - - Databases |
67 |
| - - DevOps |
68 |
| - protocol: |
69 |
| - icmp: |
70 |
| - - code: 1 |
71 |
| - type: 1 |
| 58 | + - categories: |
| 59 | + AppFamily: |
| 60 | + - Databases |
| 61 | + - DevOps |
| 62 | + protocol: |
| 63 | + icmp: |
| 64 | + - code: 1 |
| 65 | + type: 1 |
72 | 66 | policy_mode: MONITOR
|
73 | 67 | allow_ipv6_traffic: true
|
74 | 68 | policy_hitlog: true
|
75 | 69 | register: result
|
76 | 70 | ignore_errors: true
|
77 | 71 |
|
78 |
| - |
79 | 72 | - name: Creation Status
|
80 | 73 | assert:
|
81 | 74 | that:
|
|
84 | 77 | - result.response.status.state == 'COMPLETE'
|
85 | 78 | - result.response.status.name=="test_app_rule"
|
86 | 79 | - result.response.status.resources.app_rule.target_group.filter.params.AppTier | length == 2
|
87 |
| - fail_msg: ' fail: unable to create app security rule with inbound and outbound list' |
88 |
| - success_msg: 'pass: create app security rule with inbound and outbound list successfully' |
| 80 | + - result.response.description=="App Security Rule" |
| 81 | + fail_msg: " fail: unable to create app security rule with inbound and outbound list" |
| 82 | + success_msg: "pass: create app security rule with inbound and outbound list successfully" |
89 | 83 |
|
90 | 84 | - name: update app security rule by adding to outbound list and remove tule from inbound list
|
91 | 85 | ntnx_security_rules:
|
92 |
| - security_rule_uuid: '{{ result.response.metadata.uuid }}' |
| 86 | + security_rule_uuid: "{{ result.response.metadata.uuid }}" |
93 | 87 | app_rule:
|
94 | 88 | policy_mode: APPLY
|
95 | 89 | inbounds:
|
96 |
| - - |
97 |
| - rule_id: "{{result.response.spec.resources.app_rule.inbound_allow_list.0.rule_id}}" |
| 90 | + - rule_id: "{{result.response.spec.resources.app_rule.inbound_allow_list.0.rule_id}}" |
98 | 91 | state: absent
|
99 | 92 | outbounds:
|
100 |
| - - |
101 |
| - protocol: |
102 |
| - icmp: |
103 |
| - - code: 1 |
104 |
| - type: 1 |
105 |
| - categories: |
106 |
| - AppFamily: |
107 |
| - - Databases |
108 |
| - - DevOps |
| 93 | + - protocol: |
| 94 | + icmp: |
| 95 | + - code: 1 |
| 96 | + type: 1 |
| 97 | + categories: |
| 98 | + AppFamily: |
| 99 | + - Databases |
| 100 | + - DevOps |
109 | 101 | register: result
|
110 | 102 | ignore_errors: true
|
111 | 103 |
|
|
117 | 109 | - result.response.status.state == 'COMPLETE'
|
118 | 110 | - result.response.spec.resources.app_rule.action == "APPLY"
|
119 | 111 | - result.response.spec.resources.app_rule.outbound_allow_list.0.icmp_type_code_list is defined
|
120 |
| - fail_msg: ' fail: unable to update app security rule with outbound list ' |
121 |
| - success_msg: 'pass :update app security rule with outbound list successfully' |
| 112 | + fail_msg: " fail: unable to update app security rule with outbound list " |
| 113 | + success_msg: "pass :update app security rule with outbound list successfully" |
122 | 114 |
|
123 | 115 | - name: delete app security rule
|
124 | 116 | ntnx_security_rules:
|
125 | 117 | state: absent
|
126 |
| - security_rule_uuid: '{{ result.response.metadata.uuid }}' |
| 118 | + security_rule_uuid: "{{ result.response.metadata.uuid }}" |
127 | 119 | register: result
|
128 | 120 | ignore_errors: true
|
129 | 121 |
|
|
133 | 125 | - result.response is defined
|
134 | 126 | - result.failed == false
|
135 | 127 | - result.response.status == 'SUCCEEDED'
|
136 |
| - fail_msg: ' fail: unable to delete app security rule ' |
137 |
| - success_msg: 'pass : delete app security rule successfully' |
| 128 | + fail_msg: " fail: unable to delete app security rule " |
| 129 | + success_msg: "pass : delete app security rule successfully" |
138 | 130 | - name: create app security rule with allow all inbound and outbound list
|
139 | 131 | ntnx_security_rules:
|
140 | 132 | name: test_app_rule
|
141 | 133 | app_rule:
|
142 | 134 | target_group:
|
143 |
| - categories: |
144 |
| - apptype: Apache_Spark |
145 |
| - apptype_filter_by_category: |
146 |
| - AppFamily: |
147 |
| - - Backup |
148 |
| - apptiers: |
149 |
| - - "{{categories.apptiers[0]}}" |
150 |
| - - "{{categories.apptiers[1]}}" |
151 |
| - default_internal_policy: DENY_ALL |
| 135 | + categories: |
| 136 | + apptype: Apache_Spark |
| 137 | + apptype_filter_by_category: |
| 138 | + AppFamily: |
| 139 | + - Backup |
| 140 | + apptiers: |
| 141 | + - "{{categories.apptiers[0]}}" |
| 142 | + - "{{categories.apptiers[1]}}" |
| 143 | + default_internal_policy: DENY_ALL |
152 | 144 | allow_all_outbounds: true
|
153 | 145 | allow_all_inbounds: true
|
154 | 146 | policy_mode: MONITOR
|
|
166 | 158 | - result.response.spec.name=="test_app_rule"
|
167 | 159 | - result.response.status.resources.app_rule.target_group.filter.params.AppTier | length == 2
|
168 | 160 |
|
169 |
| - fail_msg: ' fail: unable to create app security rule with allow all inbound and outbound list' |
170 |
| - success_msg: 'pass: create app security rule with allow all inbound and outbound list successfully' |
| 161 | + fail_msg: " fail: unable to create app security rule with allow all inbound and outbound list" |
| 162 | + success_msg: "pass: create app security rule with allow all inbound and outbound list successfully" |
171 | 163 | - name: delete app security rule
|
172 | 164 | ntnx_security_rules:
|
173 | 165 | state: absent
|
174 |
| - security_rule_uuid: '{{ result.response.metadata.uuid }}' |
| 166 | + security_rule_uuid: "{{ result.response.metadata.uuid }}" |
175 | 167 | register: result
|
176 | 168 | ignore_errors: true
|
177 | 169 |
|
|
181 | 173 | - result.response is defined
|
182 | 174 | - result.failed == false
|
183 | 175 | - result.response.status == 'SUCCEEDED'
|
184 |
| - fail_msg: ' fail: unable to delete app security rule ' |
185 |
| - success_msg: 'pass : delete app security rule successfully' |
| 176 | + fail_msg: " fail: unable to delete app security rule " |
| 177 | + success_msg: "pass : delete app security rule successfully" |
0 commit comments