123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254 |
- #!/usr/bin/python
- # -*- coding: utf-8 -*-
- from subprocess import call, check_output
- DOCUMENTATION = '''
- ---
- module: os_firewall_manage_iptables
- short_description: This module manages iptables rules for a given chain
- author: Jason DeTiberus
- requirements: [ ]
- '''
- EXAMPLES = '''
- '''
- class IpTablesError(Exception):
- def __init__(self, msg, cmd, exit_code, output):
- self.msg = msg
- self.cmd = cmd
- self.exit_code = exit_code
- self.output = output
- class IpTablesAddRuleError(IpTablesError):
- pass
- class IpTablesRemoveRuleError(IpTablesError):
- pass
- class IpTablesSaveError(IpTablesError):
- pass
- class IpTablesCreateChainError(IpTablesError):
- def __init__(self, chain, msg, cmd, exit_code, output):
- super(IpTablesCreateChainError, self).__init__(msg, cmd, exit_code, output)
- self.chain = chain
- class IpTablesCreateJumpRuleError(IpTablesError):
- def __init__(self, chain, msg, cmd, exit_code, output):
- super(IpTablesCreateJumpRuleError, self).__init__(msg, cmd, exit_code,
- output)
- self.chain = chain
- # TODO: impliment rollbacks for any events that where successful and an
- # exception was thrown later. for example, when the chain is created
- # successfully, but the add/remove rule fails.
- class IpTablesManager:
- def __init__(self, module, ip_version, check_mode, chain):
- self.module = module
- self.ip_version = ip_version
- self.check_mode = check_mode
- self.chain = chain
- self.cmd = self.gen_cmd()
- self.save_cmd = self.gen_save_cmd()
- self.output = []
- self.changed = False
- def save(self):
- try:
- self.output.append(check_output(self.save_cmd,
- stderr=subprocess.STDOUT))
- except subprocess.CalledProcessError as e:
- raise IpTablesSaveError(
- msg="Failed to save iptables rules",
- cmd=e.cmd, exit_code=e.returncode, output=e.output)
- def add_rule(self, port, proto):
- rule = self.gen_rule(port, proto)
- if not self.rule_exists(rule):
- if not self.chain_exists():
- self.create_chain()
- if not self.jump_rule_exists():
- self.create_jump_rule()
- if self.check_mode:
- self.changed = True
- self.output.append("Create rule for %s %s" % (proto, port))
- else:
- cmd = self.cmd + ['-A'] + rule
- try:
- self.output.append(check_output(cmd))
- self.changed = True
- self.save()
- except subprocess.CalledProcessError as e:
- raise IpTablesCreateChainError(
- chain=self.chain,
- msg="Failed to create rule for "
- "%s %s" % (self.proto, self.port),
- cmd=e.cmd, exit_code=e.returncode,
- output=e.output)
- def remove_rule(self, port, proto):
- rule = self.gen_rule(port, proto)
- if self.rule_exists(rule):
- if self.check_mode:
- self.changed = True
- self.output.append("Remove rule for %s %s" % (proto, port))
- else:
- cmd = self.cmd + ['-D'] + rule
- try:
- self.output.append(check_output(cmd))
- self.changed = True
- self.save()
- except subprocess.CalledProcessError as e:
- raise IpTablesRemoveChainError(
- chain=self.chain,
- msg="Failed to remove rule for %s %s" % (proto, port),
- cmd=e.cmd, exit_code=e.returncode, output=e.output)
- def rule_exists(self, rule):
- check_cmd = self.cmd + ['-C'] + rule
- return True if subprocess.call(check_cmd) == 0 else False
- def gen_rule(self, port, proto):
- return [self.chain, '-p', proto, '-m', 'state', '--state', 'NEW',
- '-m', proto, '--dport', str(port), '-j', 'ACCEPT']
- def create_jump_rule(self):
- if self.check_mode:
- self.changed = True
- self.output.append("Create jump rule for chain %s" % self.chain)
- else:
- try:
- cmd = self.cmd + ['-L', 'INPUT', '--line-numbers']
- output = check_output(cmd, stderr=subprocess.STDOUT)
- # break the input rules into rows and columns
- input_rules = map(lambda s: s.split(), output.split('\n'))
- # Find the last numbered rule
- last_rule_num = None
- last_rule_target = None
- for rule in input_rules[:-1]:
- if rule:
- try:
- last_rule_num = int(rule[0])
- except ValueError:
- continue
- last_rule_target = rule[1]
- # Raise an exception if we do not find a valid INPUT rule
- if not last_rule_num or not last_rule_target:
- raise IpTablesCreateJumpRuleError(
- chain=self.chain,
- msg="Failed to find existing INPUT rules",
- cmd=None, exit_code=None, output=None)
- # Naively assume that if the last row is a REJECT rule, then
- # we can add insert our rule right before it, otherwise we
- # assume that we can just append the rule.
- if last_rule_target == 'REJECT':
- # insert rule
- cmd = self.cmd + ['-I', 'INPUT', str(last_rule_num)]
- else:
- # append rule
- cmd = self.cmd + ['-A', 'INPUT']
- cmd += ['-j', self.chain]
- output = check_output(cmd, stderr=subprocess.STDOUT)
- changed = True
- self.output.append(output)
- except subprocess.CalledProcessError as e:
- if '--line-numbers' in e.cmd:
- raise IpTablesCreateJumpRuleError(
- chain=self.chain,
- msg="Failed to query existing INPUT rules to "
- "determine jump rule location",
- cmd=e.cmd, exit_code=e.returncode,
- output=e.output)
- else:
- raise IpTablesCreateJumpRuleError(
- chain=self.chain,
- msg="Failed to create jump rule for chain %s" %
- self.chain,
- cmd=e.cmd, exit_code=e.returncode,
- output=e.output)
- def create_chain(self):
- if self.check_mode:
- self.changed = True
- self.output.append("Create chain %s" % self.chain)
- else:
- try:
- cmd = self.cmd + ['-N', self.chain]
- self.output.append(check_output(cmd,
- stderr=subprocess.STDOUT))
- self.changed = True
- self.output.append("Successfully created chain %s" %
- self.chain)
- except subprocess.CalledProcessError as e:
- raise IpTablesCreateChainError(
- chain=self.chain,
- msg="Failed to create chain: %s" % self.chain,
- cmd=e.cmd, exit_code=e.returncode, output=e.output
- )
- def jump_rule_exists(self):
- cmd = self.cmd + ['-C', 'INPUT', '-j', self.chain]
- return True if subprocess.call(cmd) == 0 else False
- def chain_exists(self):
- cmd = self.cmd + ['-L', self.chain]
- return True if subprocess.call(cmd) == 0 else False
- def gen_cmd(self):
- cmd = 'iptables' if self.ip_version == 'ipv4' else 'ip6tables'
- return ["/usr/sbin/%s" % cmd]
- def gen_save_cmd(self):
- cmd = 'iptables' if self.ip_version == 'ipv4' else 'ip6tables'
- return ['/usr/libexec/iptables/iptables.init', 'save']
- def main():
- module = AnsibleModule(
- argument_spec=dict(
- name=dict(required=True),
- action=dict(required=True, choices=['add', 'remove']),
- protocol=dict(required=True, choices=['tcp', 'udp']),
- port=dict(required=True, type='int'),
- ip_version=dict(required=False, default='ipv4',
- choices=['ipv4', 'ipv6']),
- ),
- supports_check_mode=True
- )
- action = module.params['action']
- protocol = module.params['protocol']
- port = module.params['port']
- ip_version = module.params['ip_version']
- chain = 'OS_FIREWALL_ALLOW'
- iptables_manager = IpTablesManager(module, ip_version, module.check_mode, chain)
- try:
- if action == 'add':
- iptables_manager.add_rule(port, protocol)
- elif action == 'remove':
- iptables_manager.remove_rule(port, protocol)
- except IpTablesError as e:
- module.fail_json(msg=e.msg)
- return module.exit_json(changed=iptables_manager.changed,
- output=iptables_manager.output)
- # import module snippets
- from ansible.module_utils.basic import *
- main()
|