summaryrefslogtreecommitdiff
path: root/tests/integration/targets/vyos_firewall_rules/vars/v1_4.yaml
blob: 20ee461b63a7a3041654e4a50d18ac476fc6d6dc (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
---
merged_commands:
  - set firewall ipv6 name UPLINK default-action 'accept'
  - set firewall ipv6 name UPLINK description 'This is ipv6 specific rule-set'
  - set firewall ipv6 name UPLINK rule 1 action 'accept'
  - set firewall ipv6 name UPLINK rule 1
  - set firewall ipv6 name UPLINK rule 1 description 'Fwipv6-Rule 1 is configured by Ansible'
  - set firewall ipv6 name UPLINK rule 1 protocol 'tcp'
  - set firewall ipv6 name UPLINK rule 2 action 'accept'
  - set firewall ipv6 name UPLINK rule 2
  - set firewall ipv6 name UPLINK rule 2 description 'Fwipv6-Rule 2 is configured by Ansible'
  - set firewall ipv6 name UPLINK rule 2 protocol 'tcp'
  - set firewall ipv4 name INBOUND default-action 'accept'
  - set firewall ipv4 name INBOUND description 'IPv4 INBOUND rule set'
  - set firewall ipv4 name INBOUND rule 101 action 'accept'
  - set firewall ipv4 name INBOUND rule 101 disable
  - set firewall ipv4 name INBOUND rule 101
  - set firewall ipv4 name INBOUND rule 101 description 'Rule 101 is configured by Ansible'
  - set firewall ipv4 name INBOUND rule 101 protocol 'tcp'
  - set firewall ipv4 name INBOUND rule 102 action 'reject'
  - set firewall ipv4 name INBOUND rule 102 disable
  - set firewall ipv4 name INBOUND rule 102
  - set firewall ipv4 name INBOUND rule 102 description 'Rule 102 is configured by Ansible'
  - set firewall ipv4 name INBOUND rule 102 protocol 'tcp'
  - set firewall ipv4 name INBOUND rule 103 description 'Rule 103 is configured by Ansible'
  - set firewall ipv4 name INBOUND rule 103 destination group address-group inbound
  - set firewall ipv4 name INBOUND rule 103
  - set firewall ipv4 name INBOUND rule 103 source address 192.0.2.0
  - set firewall ipv4 name INBOUND rule 103 state established
  - set firewall ipv4 name INBOUND rule 103 state related
  - set firewall ipv4 name INBOUND rule 103 action 'accept'

populate_config:
  - set firewall group address-group 'inbound'
  - set firewall ipv6 name UPLINK default-action 'accept'
  - set firewall ipv6 name UPLINK description 'This is ipv6 specific rule-set'
  - set firewall ipv6 name UPLINK rule 1 action 'accept'
  - set firewall ipv6 name UPLINK rule 1 description 'Fwipv6-Rule 1 is configured by Ansible'
  - set firewall ipv6 name UPLINK rule 1 protocol 'tcp'
  - set firewall ipv6 name UPLINK rule 2 action 'accept'
  - set firewall ipv6 name UPLINK rule 2 description 'Fwipv6-Rule 2 is configured by Ansible'
  - set firewall ipv6 name UPLINK rule 2 protocol 'tcp'
  - set firewall ipv4 name INBOUND default-action 'accept'
  - set firewall ipv4 name INBOUND description 'IPv4 INBOUND rule set'
  - set firewall ipv4 name INBOUND rule 101 action 'accept'
  - set firewall ipv4 name INBOUND rule 101 description 'Rule 101 is configured by Ansible'
  - set firewall ipv4 name INBOUND rule 101 protocol 'tcp'
  - set firewall ipv4 name INBOUND rule 102 action 'reject'
  - set firewall ipv4 name INBOUND rule 102 description 'Rule 102 is configured by Ansible'
  - set firewall ipv4 name INBOUND rule 102 protocol 'tcp'
  - set firewall ipv4 name INBOUND rule 103 action 'accept'
  - set firewall ipv4 name INBOUND rule 103 description 'Rule 103 is configured by Ansible'
  - set firewall ipv4 name INBOUND rule 103 destination group address-group 'inbound'
  - set firewall ipv4 name INBOUND rule 103 source address '192.0.2.0'
  - set firewall ipv4 name INBOUND rule 103 state established
  - set firewall ipv4 name INBOUND rule 103 state related

remove_config:
  - delete firewall ipv4
  - delete firewall ipv6

parsed_config_file: "_parsed_config_1_4.cfg"

replaced_commands:
  - delete firewall ipv6 name UPLINK rule 1
  - delete firewall ipv6 name UPLINK rule 2
  - delete firewall ipv4 name INBOUND rule 102
  - delete firewall ipv4 name INBOUND rule 103
  - set firewall ipv4 name INBOUND rule 104 action 'reject'
  - set firewall ipv4 name INBOUND rule 104 description 'Rule 104 is configured by Ansible'
  - set firewall ipv4 name INBOUND rule 104
  - set firewall ipv4 name INBOUND rule 104 protocol 'udp'

overridden_commands:
  - delete firewall ipv6 name UPLINK
  - delete firewall ipv4 name INBOUND
  - set firewall ipv4 name Downlink default-action 'accept'
  - set firewall ipv4 name Downlink description 'IPv4 INBOUND rule set'
  - set firewall ipv4 name Downlink rule 501 action 'accept'
  - set firewall ipv4 name Downlink rule 501
  - set firewall ipv4 name Downlink rule 501 description 'Rule 501 is configured by Ansible'
  - set firewall ipv4 name Downlink rule 501 protocol 'tcp'
  - set firewall ipv4 name Downlink rule 502 action 'reject'
  - set firewall ipv4 name Downlink rule 502
  - set firewall ipv4 name Downlink rule 502 description 'Rule 502 is configured by Ansible'
  - set firewall ipv4 name Downlink rule 502 protocol 'tcp'

rendered:
  commands:
    - set firewall ipv6 name UPLINK default-action 'accept'
    - set firewall ipv6 name UPLINK description 'This is ipv6 specific rule-set'
    - set firewall ipv4 name INBOUND default-action 'accept'
    - set firewall ipv4 name INBOUND description 'IPv4 INBOUND rule set'
    - set firewall ipv4 name INBOUND rule 101 action 'accept'
    - set firewall ipv4 name INBOUND rule 101
    - set firewall ipv4 name INBOUND rule 101 description 'Rule 101 is configured by Ansible'
    - set firewall ipv4 name INBOUND rule 101 protocol 'tcp'
    - set firewall ipv4 name INBOUND rule 102 action 'reject'
    - set firewall ipv4 name INBOUND rule 102
    - set firewall ipv4 name INBOUND rule 102 description 'Rule 102 is configured by Ansible'
    - set firewall ipv4 name INBOUND rule 102 protocol 'tcp'
    - set firewall ipv4 name INBOUND rule 103 description 'Rule 103 is configured by Ansible'
    - set firewall ipv4 name INBOUND rule 103 destination group address-group inbound
    - set firewall ipv4 name INBOUND rule 103
    - set firewall ipv4 name INBOUND rule 103 source address 192.0.2.0
    - set firewall ipv4 name INBOUND rule 103 state established
    - set firewall ipv4 name INBOUND rule 103 state related
    - set firewall ipv4 name INBOUND rule 103 action 'accept'
deleted_rs:
  commands:
    - delete firewall ipv6 name UPLINK
    - delete firewall ipv4 name INBOUND
  after: []
deleted_afi_all:
  commands:
    - delete firewall ipv6
    - delete firewall ipv4
  after: []

state_dict:
  established: true
  related: true

replaced_diff_01:
  config:
    - afi: ipv6
      rule_sets:
        - name: UPLINK
          description: This is ipv6 specific rule-set
          default_action: accept
          rules:
            - number: 1
              action: accept
              description: Fwipv6-Rule 1 is configured by Ansible
              protocol: tcp
            - number: 2
              action: accept
              description: Fwipv6-Rule 2 is configured by Ansible
              protocol: tcp
    - afi: ipv4
      rule_sets:
        - name: INBOUND
          description: IPv4 INBOUND rule set
          default_action: accept
          rules:
            - number: 101
              action: reject
              description: Rule 101 is configured by Ansible
              protocol: tcp
            - number: 102
              action: reject
              description: Rule 102 is configured by Ansible
              protocol: tcp
            - number: 103
              action: accept
              description: Rule 103 is configured by Ansible
              destination:
                group:
                  address_group: inbound
              source:
                address: 192.0.2.0
              state: "{{ state_dict }}"
  diff: |-
    [firewall ipv4 name INBOUND rule 101]
    - action \"accept\"
    + action \"reject\"


    [edit]

replaced_diff_02:
  config:
    - afi: ipv6
      rule_sets:
        - name: UPLINK
          description: This is ipv6 specific rule-set
          default_action: accept
          rules:
            - number: 1
              action: accept
              description: Fwipv6-Rule 1 is configured by Ansible
              protocol: tcp
            - number: 2
              action: accept
              description: Fwipv6-Rule 2 is configured by Ansible
              protocol: tcp
    - afi: ipv4
      rule_sets:
        - name: INBOUND
          description: IPv4 INBOUND rule set
          default_action: accept
          rules:
            - number: 101
              action: reject
              description: Rule 101 is configured by Ansible
              protocol: tcp
            - number: 102
              action: accept
              description: Rule 102 is configured by Ansible
              protocol: udp
            - number: 103
              action: accept
              description: Rule 103 is configured by Ansible
              destination:
                group:
                  address_group: inbound
              source:
                address: 192.0.2.0
              state: "{{ state_dict }}"
  diff: |-
    [firewall ipv4 name INBOUND rule 102]
    - action \"reject\"
    + action \"accept\"
    - protocol \"tcp\"
    + protocol \"udp\"


    [edit]

replaced_diff_03:
  config:
    - afi: ipv6
      rule_sets:
        - name: UPLINK
          description: This is ipv6 specific rule-set
          default_action: accept
          rules:
            - number: 1
              action: reject
              description: Fwipv6-Rule 1 is configured by Ansible
              protocol: udp
            - number: 2
              action: accept
              description: Fwipv6-Rule 2 is configured by Ansible
              protocol: tcp
    - afi: ipv4
      rule_sets:
        - name: INBOUND
          description: IPv4 INBOUND rule set
          default_action: accept
          rules:
            - number: 101
              action: reject
              description: Rule 101 is configured by Ansible
              protocol: tcp
            - number: 102
              action: accept
              description: Rule 102 is configured by Ansible
              protocol: tcp
            - number: 103
              action: accept
              description: Rule 103 is configured by Ansible
              destination:
                group:
                  address_group: inbound
              source:
                address: 192.0.2.0
              state: "{{ state_dict }}"
  diff: |-
    [firewall ipv4 name INBOUND rule 102]
    - protocol \"udp\"
    + protocol \"tcp\"
    [firewall ipv6 name UPLINK rule 1]
    - action \"accept\"
    + action \"reject\"
    - protocol \"tcp\"
    + protocol \"udp\"


    [edit]