os_firewall_manage_iptables.py 9.2 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254
  1. #!/usr/bin/python
  2. # -*- coding: utf-8 -*-
  3. from subprocess import call, check_output
  4. DOCUMENTATION = '''
  5. ---
  6. module: os_firewall_manage_iptables
  7. short_description: This module manages iptables rules for a given chain
  8. author: Jason DeTiberus
  9. requirements: [ ]
  10. '''
  11. EXAMPLES = '''
  12. '''
  13. class IpTablesError(Exception):
  14. def __init__(self, msg, cmd, exit_code, output):
  15. self.msg = msg
  16. self.cmd = cmd
  17. self.exit_code = exit_code
  18. self.output = output
  19. class IpTablesAddRuleError(IpTablesError):
  20. pass
  21. class IpTablesRemoveRuleError(IpTablesError):
  22. pass
  23. class IpTablesSaveError(IpTablesError):
  24. pass
  25. class IpTablesCreateChainError(IpTablesError):
  26. def __init__(self, chain, msg, cmd, exit_code, output):
  27. super(IpTablesCreateChainError, self).__init__(msg, cmd, exit_code, output)
  28. self.chain = chain
  29. class IpTablesCreateJumpRuleError(IpTablesError):
  30. def __init__(self, chain, msg, cmd, exit_code, output):
  31. super(IpTablesCreateJumpRuleError, self).__init__(msg, cmd, exit_code,
  32. output)
  33. self.chain = chain
  34. # TODO: impliment rollbacks for any events that where successful and an
  35. # exception was thrown later. for example, when the chain is created
  36. # successfully, but the add/remove rule fails.
  37. class IpTablesManager:
  38. def __init__(self, module, ip_version, check_mode, chain):
  39. self.module = module
  40. self.ip_version = ip_version
  41. self.check_mode = check_mode
  42. self.chain = chain
  43. self.cmd = self.gen_cmd()
  44. self.save_cmd = self.gen_save_cmd()
  45. self.output = []
  46. self.changed = False
  47. def save(self):
  48. try:
  49. self.output.append(check_output(self.save_cmd,
  50. stderr=subprocess.STDOUT))
  51. except subprocess.CalledProcessError as e:
  52. raise IpTablesSaveError(
  53. msg="Failed to save iptables rules",
  54. cmd=e.cmd, exit_code=e.returncode, output=e.output)
  55. def add_rule(self, port, proto):
  56. rule = self.gen_rule(port, proto)
  57. if not self.rule_exists(rule):
  58. if not self.chain_exists():
  59. self.create_chain()
  60. if not self.jump_rule_exists():
  61. self.create_jump_rule()
  62. if self.check_mode:
  63. self.changed = True
  64. self.output.append("Create rule for %s %s" % (proto, port))
  65. else:
  66. cmd = self.cmd + ['-A'] + rule
  67. try:
  68. self.output.append(check_output(cmd))
  69. self.changed = True
  70. self.save()
  71. except subprocess.CalledProcessError as e:
  72. raise IpTablesCreateChainError(
  73. chain=self.chain,
  74. msg="Failed to create rule for "
  75. "%s %s" % (self.proto, self.port),
  76. cmd=e.cmd, exit_code=e.returncode,
  77. output=e.output)
  78. def remove_rule(self, port, proto):
  79. rule = self.gen_rule(port, proto)
  80. if self.rule_exists(rule):
  81. if self.check_mode:
  82. self.changed = True
  83. self.output.append("Remove rule for %s %s" % (proto, port))
  84. else:
  85. cmd = self.cmd + ['-D'] + rule
  86. try:
  87. self.output.append(check_output(cmd))
  88. self.changed = True
  89. self.save()
  90. except subprocess.CalledProcessError as e:
  91. raise IpTablesRemoveChainError(
  92. chain=self.chain,
  93. msg="Failed to remove rule for %s %s" % (proto, port),
  94. cmd=e.cmd, exit_code=e.returncode, output=e.output)
  95. def rule_exists(self, rule):
  96. check_cmd = self.cmd + ['-C'] + rule
  97. return True if subprocess.call(check_cmd) == 0 else False
  98. def gen_rule(self, port, proto):
  99. return [self.chain, '-p', proto, '-m', 'state', '--state', 'NEW',
  100. '-m', proto, '--dport', str(port), '-j', 'ACCEPT']
  101. def create_jump_rule(self):
  102. if self.check_mode:
  103. self.changed = True
  104. self.output.append("Create jump rule for chain %s" % self.chain)
  105. else:
  106. try:
  107. cmd = self.cmd + ['-L', 'INPUT', '--line-numbers']
  108. output = check_output(cmd, stderr=subprocess.STDOUT)
  109. # break the input rules into rows and columns
  110. input_rules = map(lambda s: s.split(), output.split('\n'))
  111. # Find the last numbered rule
  112. last_rule_num = None
  113. last_rule_target = None
  114. for rule in input_rules[:-1]:
  115. if rule:
  116. try:
  117. last_rule_num = int(rule[0])
  118. except ValueError:
  119. continue
  120. last_rule_target = rule[1]
  121. # Raise an exception if we do not find a valid INPUT rule
  122. if not last_rule_num or not last_rule_target:
  123. raise IpTablesCreateJumpRuleError(
  124. chain=self.chain,
  125. msg="Failed to find existing INPUT rules",
  126. cmd=None, exit_code=None, output=None)
  127. # Naively assume that if the last row is a REJECT rule, then
  128. # we can add insert our rule right before it, otherwise we
  129. # assume that we can just append the rule.
  130. if last_rule_target == 'REJECT':
  131. # insert rule
  132. cmd = self.cmd + ['-I', 'INPUT', str(last_rule_num)]
  133. else:
  134. # append rule
  135. cmd = self.cmd + ['-A', 'INPUT']
  136. cmd += ['-j', self.chain]
  137. output = check_output(cmd, stderr=subprocess.STDOUT)
  138. changed = True
  139. self.output.append(output)
  140. except subprocess.CalledProcessError as e:
  141. if '--line-numbers' in e.cmd:
  142. raise IpTablesCreateJumpRuleError(
  143. chain=self.chain,
  144. msg="Failed to query existing INPUT rules to "
  145. "determine jump rule location",
  146. cmd=e.cmd, exit_code=e.returncode,
  147. output=e.output)
  148. else:
  149. raise IpTablesCreateJumpRuleError(
  150. chain=self.chain,
  151. msg="Failed to create jump rule for chain %s" %
  152. self.chain,
  153. cmd=e.cmd, exit_code=e.returncode,
  154. output=e.output)
  155. def create_chain(self):
  156. if self.check_mode:
  157. self.changed = True
  158. self.output.append("Create chain %s" % self.chain)
  159. else:
  160. try:
  161. cmd = self.cmd + ['-N', self.chain]
  162. self.output.append(check_output(cmd,
  163. stderr=subprocess.STDOUT))
  164. self.changed = True
  165. self.output.append("Successfully created chain %s" %
  166. self.chain)
  167. except subprocess.CalledProcessError as e:
  168. raise IpTablesCreateChainError(
  169. chain=self.chain,
  170. msg="Failed to create chain: %s" % self.chain,
  171. cmd=e.cmd, exit_code=e.returncode, output=e.output
  172. )
  173. def jump_rule_exists(self):
  174. cmd = self.cmd + ['-C', 'INPUT', '-j', self.chain]
  175. return True if subprocess.call(cmd) == 0 else False
  176. def chain_exists(self):
  177. cmd = self.cmd + ['-L', self.chain]
  178. return True if subprocess.call(cmd) == 0 else False
  179. def gen_cmd(self):
  180. cmd = 'iptables' if self.ip_version == 'ipv4' else 'ip6tables'
  181. return ["/usr/sbin/%s" % cmd]
  182. def gen_save_cmd(self):
  183. cmd = 'iptables' if self.ip_version == 'ipv4' else 'ip6tables'
  184. return ['/usr/libexec/iptables/iptables.init', 'save']
  185. def main():
  186. module = AnsibleModule(
  187. argument_spec=dict(
  188. name=dict(required=True),
  189. action=dict(required=True, choices=['add', 'remove']),
  190. protocol=dict(required=True, choices=['tcp', 'udp']),
  191. port=dict(required=True, type='int'),
  192. ip_version=dict(required=False, default='ipv4',
  193. choices=['ipv4', 'ipv6']),
  194. ),
  195. supports_check_mode=True
  196. )
  197. action = module.params['action']
  198. protocol = module.params['protocol']
  199. port = module.params['port']
  200. ip_version = module.params['ip_version']
  201. chain = 'OS_FIREWALL_ALLOW'
  202. iptables_manager = IpTablesManager(module, ip_version, module.check_mode, chain)
  203. try:
  204. if action == 'add':
  205. iptables_manager.add_rule(port, protocol)
  206. elif action == 'remove':
  207. iptables_manager.remove_rule(port, protocol)
  208. except IpTablesError as e:
  209. module.fail_json(msg=e.msg)
  210. return module.exit_json(changed=iptables_manager.changed,
  211. output=iptables_manager.output)
  212. # import module snippets
  213. from ansible.module_utils.basic import *
  214. main()