diff --git a/lib/ansible/module_utils/network/ftd/configuration.py b/lib/ansible/module_utils/network/ftd/configuration.py index aba2615f66..be2b490280 100644 --- a/lib/ansible/module_utils/network/ftd/configuration.py +++ b/lib/ansible/module_utils/network/ftd/configuration.py @@ -35,6 +35,8 @@ MULTIPLE_DUPLICATES_FOUND_ERROR = ( "Multiple objects returned according to filters being specified. " "Please specify more specific filters which can find exact object that caused duplication error") +PATH_PARAMS_FOR_DEFAULT_OBJ = {'objId': 'default'} + class OperationNamePrefix: ADD = 'add' diff --git a/lib/ansible/module_utils/network/ftd/device.py b/lib/ansible/module_utils/network/ftd/device.py new file mode 100644 index 0000000000..3a8dfb1cd6 --- /dev/null +++ b/lib/ansible/module_utils/network/ftd/device.py @@ -0,0 +1,137 @@ +# Copyright (c) 2019 Cisco and/or its affiliates. +# +# This file is part of Ansible +# +# Ansible is free software: you can redistribute it and/or modify +# it under the terms of the GNU General Public License as published by +# the Free Software Foundation, either version 3 of the License, or +# (at your option) any later version. +# +# Ansible is distributed in the hope that it will be useful, +# but WITHOUT ANY WARRANTY; without even the implied warranty of +# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the +# GNU General Public License for more details. +# +# You should have received a copy of the GNU General Public License +# along with Ansible. If not, see . +# + +from ansible.module_utils.six.moves.urllib.parse import urlparse + +try: + from kick.device2.ftd5500x.actions.ftd5500x import Ftd5500x + from kick.device2.kp.actions import Kp + + HAS_KICK = True +except ImportError: + HAS_KICK = False + + +def assert_kick_is_installed(module): + if not HAS_KICK: + module.fail_json(msg='Firepower-kick library is required to run this module. ' + 'Please, install it with `pip install firepower-kick` command and run the playbook again.') + + +class FtdModel: + FTD_ASA5506_X = 'Cisco ASA5506-X Threat Defense' + FTD_ASA5508_X = 'Cisco ASA5508-X Threat Defense' + FTD_ASA5516_X = 'Cisco ASA5516-X Threat Defense' + + FTD_2110 = 'Cisco Firepower 2110 Threat Defense' + FTD_2120 = 'Cisco Firepower 2120 Threat Defense' + FTD_2130 = 'Cisco Firepower 2130 Threat Defense' + FTD_2140 = 'Cisco Firepower 2140 Threat Defense' + + @classmethod + def supported_models(cls): + return [getattr(cls, item) for item in dir(cls) if item.startswith('FTD_')] + + +class FtdPlatformFactory(object): + + @staticmethod + def create(model, module_params): + for cls in AbstractFtdPlatform.__subclasses__(): + if cls.supports_ftd_model(model): + return cls(module_params) + raise ValueError("FTD model '%s' is not supported by this module." % model) + + +class AbstractFtdPlatform(object): + PLATFORM_MODELS = [] + + def install_ftd_image(self, params): + raise NotImplementedError('The method should be overridden in subclass') + + @classmethod + def supports_ftd_model(cls, model): + return model in cls.PLATFORM_MODELS + + @staticmethod + def parse_rommon_file_location(rommon_file_location): + rommon_url = urlparse(rommon_file_location) + if rommon_url.scheme != 'tftp': + raise ValueError('The ROMMON image must be downloaded from TFTP server, other protocols are not supported.') + return rommon_url.netloc, rommon_url.path + + +class Ftd2100Platform(AbstractFtdPlatform): + PLATFORM_MODELS = [FtdModel.FTD_2110, FtdModel.FTD_2120, FtdModel.FTD_2130, FtdModel.FTD_2140] + + def __init__(self, params): + self._ftd = Kp(hostname=params["device_hostname"], + login_username=params["device_username"], + login_password=params["device_password"], + sudo_password=params.get("device_sudo_password") or params["device_password"]) + + def install_ftd_image(self, params): + line = self._ftd.ssh_console(ip=params["console_ip"], + port=params["console_port"], + username=params["console_username"], + password=params["console_password"]) + + try: + rommon_server, rommon_path = self.parse_rommon_file_location(params["rommon_file_location"]) + line.baseline_fp2k_ftd(tftp_server=rommon_server, + rommon_file=rommon_path, + uut_hostname=params["device_hostname"], + uut_username=params["device_username"], + uut_password=params.get("device_new_password") or params["device_password"], + uut_ip=params["device_ip"], + uut_netmask=params["device_netmask"], + uut_gateway=params["device_gateway"], + dns_servers=params["dns_server"], + search_domains=params["search_domains"], + fxos_url=params["image_file_location"], + ftd_version=params["image_version"]) + finally: + line.disconnect() + + +class FtdAsa5500xPlatform(AbstractFtdPlatform): + PLATFORM_MODELS = [FtdModel.FTD_ASA5506_X, FtdModel.FTD_ASA5508_X, FtdModel.FTD_ASA5516_X] + + def __init__(self, params): + self._ftd = Ftd5500x(hostname=params["device_hostname"], + login_password=params["device_password"], + sudo_password=params.get("device_sudo_password") or params["device_password"]) + + def install_ftd_image(self, params): + line = self._ftd.ssh_console(ip=params["console_ip"], + port=params["console_port"], + username=params["console_username"], + password=params["console_password"]) + try: + rommon_server, rommon_path = self.parse_rommon_file_location(params["rommon_file_location"]) + line.rommon_to_new_image(rommon_tftp_server=rommon_server, + rommon_image=rommon_path, + pkg_image=params["image_file_location"], + uut_ip=params["device_ip"], + uut_netmask=params["device_netmask"], + uut_gateway=params["device_gateway"], + dns_server=params["dns_server"], + search_domains=params["search_domains"], + hostname=params["device_hostname"]) + finally: + line.disconnect() diff --git a/lib/ansible/module_utils/network/ftd/operation.py b/lib/ansible/module_utils/network/ftd/operation.py new file mode 100644 index 0000000000..6006fbae56 --- /dev/null +++ b/lib/ansible/module_utils/network/ftd/operation.py @@ -0,0 +1,41 @@ +# Copyright (c) 2018 Cisco and/or its affiliates. +# +# This file is part of Ansible +# +# Ansible is free software: you can redistribute it and/or modify +# it under the terms of the GNU General Public License as published by +# the Free Software Foundation, either version 3 of the License, or +# (at your option) any later version. +# +# Ansible is distributed in the hope that it will be useful, +# but WITHOUT ANY WARRANTY; without even the implied warranty of +# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the +# GNU General Public License for more details. +# +# You should have received a copy of the GNU General Public License +# along with Ansible. If not, see . +# + +from ansible.module_utils.network.ftd.configuration import ParamName, PATH_PARAMS_FOR_DEFAULT_OBJ + + +class FtdOperations: + """ + Utility class for common operation names + """ + GET_SYSTEM_INFO = 'getSystemInformation' + GET_MANAGEMENT_IP_LIST = 'getManagementIPList' + GET_DNS_SETTING_LIST = 'getDeviceDNSSettingsList' + GET_DNS_SERVER_GROUP = 'getDNSServerGroup' + + +def get_system_info(resource): + """ + Executes `getSystemInformation` operation and returns information about the system. + + :param resource: a BaseConfigurationResource object to connect to the device + :return: a dictionary with system information about the device and its software + """ + path_params = {ParamName.PATH_PARAMS: PATH_PARAMS_FOR_DEFAULT_OBJ} + system_info = resource.execute_operation(FtdOperations.GET_SYSTEM_INFO, path_params) + return system_info diff --git a/lib/ansible/modules/network/ftd/ftd_install.py b/lib/ansible/modules/network/ftd/ftd_install.py new file mode 100644 index 0000000000..8affbb72bc --- /dev/null +++ b/lib/ansible/modules/network/ftd/ftd_install.py @@ -0,0 +1,295 @@ +#!/usr/bin/python + +# Copyright (c) 2019 Cisco and/or its affiliates. +# +# This file is part of Ansible +# +# Ansible is free software: you can redistribute it and/or modify +# it under the terms of the GNU General Public License as published by +# the Free Software Foundation, either version 3 of the License, or +# (at your option) any later version. +# +# Ansible is distributed in the hope that it will be useful, +# but WITHOUT ANY WARRANTY; without even the implied warranty of +# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the +# GNU General Public License for more details. +# +# You should have received a copy of the GNU General Public License +# along with Ansible. If not, see . +# + +from __future__ import absolute_import, division, print_function + +__metaclass__ = type + +ANSIBLE_METADATA = {'metadata_version': '1.1', + 'status': ['preview'], + 'supported_by': 'community'} + +DOCUMENTATION = """ +--- +module: ftd_install +short_description: Installs FTD pkg image on the firewall +description: + - Provisioning module for FTD devices that installs ROMMON image (if needed) and + FTD pkg image on the firewall. + - Can be used with `httpapi` and `local` connection types. The `httpapi` is preferred, + the `local` connection should be used only when the device cannot be accessed via + REST API. +version_added: "2.8" +requirements: [ "python >= 3.5", "firepower-kick" ] +notes: + - Requires `firepower-kick` library that should be installed separately and requires Python >= 3.5. + - On localhost, Ansible can be still run with Python >= 2.7, but the interpreter for this particular module must be + Python >= 3.5. + - Python interpreter for the module can overwritten in `ansible_python_interpreter` variable. +author: "Cisco Systems, Inc. (@annikulin)" +options: + device_hostname: + description: + - Hostname of the device as appears in the prompt (e.g., 'firepower-5516'). + required: true + type: str + device_username: + description: + - Username to login on the device. + - Defaulted to 'admin' if not specified. + required: false + type: str + default: admin + device_password: + description: + - Password to login on the device. + required: true + type: str + device_sudo_password: + description: + - Root password for the device. If not specified, `device_password` is used. + required: false + type: str + device_new_password: + description: + - New device password to set after image installation. + - If not specified, current password from `device_password` property is reused. + - Not applicable for ASA5500-X series devices. + required: false + type: str + device_ip: + description: + - Device IP address of management interface. + - If not specified and connection is 'httpapi`, the module tries to fetch the existing value via REST API. + - For 'local' connection type, this parameter is mandatory. + required: false + type: str + device_gateway: + description: + - Device gateway of management interface. + - If not specified and connection is 'httpapi`, the module tries to fetch the existing value via REST API. + - For 'local' connection type, this parameter is mandatory. + required: false + type: str + device_netmask: + description: + - Device netmask of management interface. + - If not specified and connection is 'httpapi`, the module tries to fetch the existing value via REST API. + - For 'local' connection type, this parameter is mandatory. + required: false + type: str + device_model: + description: + - Platform model of the device (e.g., 'Cisco ASA5506-X Threat Defense'). + - If not specified and connection is 'httpapi`, the module tries to fetch the device model via REST API. + - For 'local' connection type, this parameter is mandatory. + required: false + type: str + choices: + - Cisco ASA5506-X Threat Defense + - Cisco ASA5508-X Threat Defense + - Cisco ASA5516-X Threat Defense + - Cisco Firepower 2110 Threat Defense + - Cisco Firepower 2120 Threat Defense + - Cisco Firepower 2130 Threat Defense + - Cisco Firepower 2140 Threat Defense + dns_server: + description: + - DNS IP address of management interface. + - If not specified and connection is 'httpapi`, the module tries to fetch the existing value via REST API. + - For 'local' connection type, this parameter is mandatory. + required: false + type: str + console_ip: + description: + - IP address of a terminal server. + - Used to set up an SSH connection with device's console port through the terminal server. + required: true + type: str + console_port: + description: + - Device's port on a terminal server. + required: true + type: str + console_username: + description: + - Username to login on a terminal server. + required: true + type: str + console_password: + description: + - Password to login on a terminal server. + required: true + type: str + rommon_file_location: + description: + - Path to the boot (ROMMON) image on TFTP server. + - Only TFTP is supported. + required: true + type: str + image_file_location: + description: + - Path to the FTD pkg image on the server to be downloaded. + - FTP, SCP, SFTP, TFTP, or HTTP protocols are usually supported, but may depend on the device model. + required: true + type: str + image_version: + description: + - Version of FTD image to be installed. + - Helps to compare target and current FTD versions to prevent unnecessary reinstalls. + required: true + type: str + force_install: + description: + - Forces the FTD image to be installed even when the same version is already installed on the firewall. + - By default, the module stops execution when the target version is installed in the device. + required: false + type: bool + default: false + search_domains: + description: + - Search domains delimited by comma. + - Defaulted to 'cisco.com' if not specified. + required: false + type: str + default: cisco.com +""" + +EXAMPLES = """ + - name: Install image v6.3.0 on FTD 5516 + ftd_install: + device_hostname: firepower + device_password: pass + device_ip: 192.168.0.1 + device_netmask: 255.255.255.0 + device_gateway: 192.168.0.254 + dns_server: 8.8.8.8 + + console_ip: 10.89.0.0 + console_port: 2004 + console_username: console_user + console_password: console_pass + + rommon_file_location: 'tftp://10.89.0.11/installers/ftd-boot-9.10.1.3.lfbff' + image_file_location: 'https://10.89.0.11/installers/ftd-6.3.0-83.pkg' + image_version: 6.3.0-83 +""" + +RETURN = """ +msg: + description: The message saying whether the image was installed or explaining why the installation failed. + returned: always + type: str +""" +from ansible.module_utils.basic import AnsibleModule +from ansible.module_utils.connection import Connection +from ansible.module_utils.six import iteritems + +from ansible.module_utils.network.ftd.configuration import BaseConfigurationResource, ParamName +from ansible.module_utils.network.ftd.device import assert_kick_is_installed, FtdPlatformFactory, FtdModel +from ansible.module_utils.network.ftd.operation import FtdOperations, get_system_info + +REQUIRED_PARAMS_FOR_LOCAL_CONNECTION = ['device_ip', 'device_netmask', 'device_gateway', 'device_model', 'dns_server'] + + +def main(): + fields = dict( + device_hostname=dict(type='str', required=True), + device_username=dict(type='str', required=False, default='admin'), + device_password=dict(type='str', required=True, no_log=True), + device_sudo_password=dict(type='str', required=False, no_log=True), + device_new_password=dict(type='str', required=False, no_log=True), + device_ip=dict(type='str', required=False), + device_netmask=dict(type='str', required=False), + device_gateway=dict(type='str', required=False), + device_model=dict(type='str', required=False, choices=FtdModel.supported_models()), + dns_server=dict(type='str', required=False), + search_domains=dict(type='str', required=False, default='cisco.com'), + + console_ip=dict(type='str', required=True), + console_port=dict(type='str', required=True), + console_username=dict(type='str', required=True), + console_password=dict(type='str', required=True, no_log=True), + + rommon_file_location=dict(type='str', required=True), + image_file_location=dict(type='str', required=True), + image_version=dict(type='str', required=True), + force_install=dict(type='bool', required=False, default=False) + ) + module = AnsibleModule(argument_spec=fields) + assert_kick_is_installed(module) + + use_local_connection = module._socket_path is None + if use_local_connection: + check_required_params_for_local_connection(module, module.params) + platform_model = module.params['device_model'] + check_that_model_is_supported(module, platform_model) + else: + connection = Connection(module._socket_path) + resource = BaseConfigurationResource(connection, module.check_mode) + system_info = get_system_info(resource) + + platform_model = module.params['device_model'] or system_info['platformModel'] + check_that_model_is_supported(module, platform_model) + check_that_update_is_needed(module, system_info) + check_management_and_dns_params(resource, module.params) + + ftd_platform = FtdPlatformFactory.create(platform_model, module.params) + ftd_platform.install_ftd_image(module.params) + + module.exit_json(changed=True, + msg='Successfully installed FTD image %s on the firewall device.' % module.params["image_version"]) + + +def check_required_params_for_local_connection(module, params): + missing_params = [k for k, v in iteritems(params) if k in REQUIRED_PARAMS_FOR_LOCAL_CONNECTION and v is None] + if missing_params: + message = "The following parameters are mandatory when the module is used with 'local' connection: %s." % \ + ', '.join(sorted(missing_params)) + module.fail_json(msg=message) + + +def check_that_model_is_supported(module, platform_model): + if platform_model not in FtdModel.supported_models(): + module.fail_json(msg="Platform model '%s' is not supported by this module." % platform_model) + + +def check_that_update_is_needed(module, system_info): + target_ftd_version = module.params["image_version"] + if not module.params["force_install"] and target_ftd_version == system_info['softwareVersion']: + module.exit_json(changed=False, msg="FTD already has %s version of software installed." % target_ftd_version) + + +def check_management_and_dns_params(resource, params): + if not all([params['device_ip'], params['device_netmask'], params['device_gateway']]): + management_ip = resource.execute_operation(FtdOperations.GET_MANAGEMENT_IP_LIST, {})['items'][0] + params['device_ip'] = params['device_ip'] or management_ip['ipv4Address'] + params['device_netmask'] = params['device_netmask'] or management_ip['ipv4NetMask'] + params['device_gateway'] = params['device_gateway'] or management_ip['ipv4Gateway'] + if not params['dns_server']: + dns_setting = resource.execute_operation(FtdOperations.GET_DNS_SETTING_LIST, {})['items'][0] + dns_server_group_id = dns_setting['dnsServerGroup']['id'] + dns_server_group = resource.execute_operation(FtdOperations.GET_DNS_SERVER_GROUP, + {ParamName.PATH_PARAMS: {'objId': dns_server_group_id}}) + params['dns_server'] = dns_server_group['dnsServers'][0]['ipAddress'] + + +if __name__ == '__main__': + main() diff --git a/test/units/module_utils/network/ftd/test_device.py b/test/units/module_utils/network/ftd/test_device.py new file mode 100644 index 0000000000..426c836a0b --- /dev/null +++ b/test/units/module_utils/network/ftd/test_device.py @@ -0,0 +1,145 @@ +# Copyright (c) 2019 Cisco and/or its affiliates. +# +# This file is part of Ansible +# +# Ansible is free software: you can redistribute it and/or modify +# it under the terms of the GNU General Public License as published by +# the Free Software Foundation, either version 3 of the License, or +# (at your option) any later version. +# +# Ansible is distributed in the hope that it will be useful, +# but WITHOUT ANY WARRANTY; without even the implied warranty of +# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the +# GNU General Public License for more details. +# +# You should have received a copy of the GNU General Public License +# along with Ansible. If not, see . +# + +import pytest + +pytest.importorskip("kick") + +from ansible.module_utils.network.ftd.device import FtdPlatformFactory, FtdModel, FtdAsa5500xPlatform, \ + Ftd2100Platform, AbstractFtdPlatform +from units.modules.network.ftd.test_ftd_install import DEFAULT_MODULE_PARAMS + + +class TestFtdModel(object): + + def test_has_value_should_return_true_for_existing_models(self): + assert FtdModel.FTD_2120 in FtdModel.supported_models() + assert FtdModel.FTD_ASA5516_X in FtdModel.supported_models() + + def test_has_value_should_return_false_for_non_existing_models(self): + assert 'nonExistingModel' not in FtdModel.supported_models() + assert None not in FtdModel.supported_models() + + +class TestFtdPlatformFactory(object): + + @pytest.fixture(autouse=True) + def mock_devices(self, mocker): + mocker.patch('ansible.module_utils.network.ftd.device.Kp') + mocker.patch('ansible.module_utils.network.ftd.device.Ftd5500x') + + def test_factory_should_return_corresponding_platform(self): + ftd_platform = FtdPlatformFactory.create(FtdModel.FTD_ASA5508_X, dict(DEFAULT_MODULE_PARAMS)) + assert type(ftd_platform) is FtdAsa5500xPlatform + ftd_platform = FtdPlatformFactory.create(FtdModel.FTD_2130, dict(DEFAULT_MODULE_PARAMS)) + assert type(ftd_platform) is Ftd2100Platform + + def test_factory_should_raise_error_with_not_supported_model(self): + with pytest.raises(ValueError) as ex: + FtdPlatformFactory.create('nonExistingModel', dict(DEFAULT_MODULE_PARAMS)) + assert "FTD model 'nonExistingModel' is not supported by this module." == ex.value.args[0] + + +class TestAbstractFtdPlatform(object): + + def test_install_ftd_image_raise_error_on_abstract_class(self): + with pytest.raises(NotImplementedError): + AbstractFtdPlatform().install_ftd_image(dict(DEFAULT_MODULE_PARAMS)) + + def test_supports_ftd_model_should_return_true_for_supported_models(self): + assert Ftd2100Platform.supports_ftd_model(FtdModel.FTD_2120) + assert FtdAsa5500xPlatform.supports_ftd_model(FtdModel.FTD_ASA5516_X) + + def test_supports_ftd_model_should_return_false_for_non_supported_models(self): + assert not AbstractFtdPlatform.supports_ftd_model(FtdModel.FTD_2120) + assert not Ftd2100Platform.supports_ftd_model(FtdModel.FTD_ASA5508_X) + assert not FtdAsa5500xPlatform.supports_ftd_model(FtdModel.FTD_2120) + + def test_parse_rommon_file_location(self): + server, path = AbstractFtdPlatform.parse_rommon_file_location('tftp://1.2.3.4/boot/rommon-boot.foo') + assert '1.2.3.4' == server + assert '/boot/rommon-boot.foo' == path + + def test_parse_rommon_file_location_should_fail_for_non_tftp_protocol(self): + with pytest.raises(ValueError) as ex: + AbstractFtdPlatform.parse_rommon_file_location('http://1.2.3.4/boot/rommon-boot.foo') + assert 'The ROMMON image must be downloaded from TFTP server' in str(ex) + + +class TestFtd2100Platform(object): + + @pytest.fixture + def kp_mock(self, mocker): + return mocker.patch('ansible.module_utils.network.ftd.device.Kp') + + @pytest.fixture + def module_params(self): + return dict(DEFAULT_MODULE_PARAMS) + + def test_install_ftd_image_should_call_kp_module(self, kp_mock, module_params): + ftd = FtdPlatformFactory.create(FtdModel.FTD_2110, module_params) + ftd.install_ftd_image(module_params) + + assert kp_mock.called + assert kp_mock.return_value.ssh_console.called + ftd_line = kp_mock.return_value.ssh_console.return_value + assert ftd_line.baseline_fp2k_ftd.called + assert ftd_line.disconnect.called + + def test_install_ftd_image_should_call_disconnect_when_install_fails(self, kp_mock, module_params): + ftd_line = kp_mock.return_value.ssh_console.return_value + ftd_line.baseline_fp2k_ftd.side_effect = Exception('Something went wrong') + + ftd = FtdPlatformFactory.create(FtdModel.FTD_2120, module_params) + with pytest.raises(Exception): + ftd.install_ftd_image(module_params) + + assert ftd_line.baseline_fp2k_ftd.called + assert ftd_line.disconnect.called + + +class TestFtdAsa5500xPlatform(object): + + @pytest.fixture + def asa5500x_mock(self, mocker): + return mocker.patch('ansible.module_utils.network.ftd.device.Ftd5500x') + + @pytest.fixture + def module_params(self): + return dict(DEFAULT_MODULE_PARAMS) + + def test_install_ftd_image_should_call_kp_module(self, asa5500x_mock, module_params): + ftd = FtdPlatformFactory.create(FtdModel.FTD_ASA5508_X, module_params) + ftd.install_ftd_image(module_params) + + assert asa5500x_mock.called + assert asa5500x_mock.return_value.ssh_console.called + ftd_line = asa5500x_mock.return_value.ssh_console.return_value + assert ftd_line.rommon_to_new_image.called + assert ftd_line.disconnect.called + + def test_install_ftd_image_should_call_disconnect_when_install_fails(self, asa5500x_mock, module_params): + ftd_line = asa5500x_mock.return_value.ssh_console.return_value + ftd_line.rommon_to_new_image.side_effect = Exception('Something went wrong') + + ftd = FtdPlatformFactory.create(FtdModel.FTD_ASA5516_X, module_params) + with pytest.raises(Exception): + ftd.install_ftd_image(module_params) + + assert ftd_line.rommon_to_new_image.called + assert ftd_line.disconnect.called diff --git a/test/units/modules/network/ftd/test_ftd_install.py b/test/units/modules/network/ftd/test_ftd_install.py new file mode 100644 index 0000000000..aafd62f7a2 --- /dev/null +++ b/test/units/modules/network/ftd/test_ftd_install.py @@ -0,0 +1,248 @@ +# Copyright (c) 2019 Cisco and/or its affiliates. +# +# This file is part of Ansible +# +# Ansible is free software: you can redistribute it and/or modify +# it under the terms of the GNU General Public License as published by +# the Free Software Foundation, either version 3 of the License, or +# (at your option) any later version. +# +# Ansible is distributed in the hope that it will be useful, +# but WITHOUT ANY WARRANTY; without even the implied warranty of +# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the +# GNU General Public License for more details. +# +# You should have received a copy of the GNU General Public License +# along with Ansible. If not, see . +# + +from __future__ import absolute_import + +import pytest +from units.compat.mock import PropertyMock +from ansible.module_utils import basic +from units.modules.utils import set_module_args, exit_json, fail_json, AnsibleFailJson, AnsibleExitJson + +from ansible.modules.network.ftd import ftd_install +from ansible.module_utils.network.ftd.device import FtdModel + +DEFAULT_MODULE_PARAMS = dict( + device_hostname="firepower", + device_username="admin", + device_password="pass", + device_new_password="newpass", + device_sudo_password="sudopass", + device_ip="192.168.0.1", + device_netmask="255.255.255.0", + device_gateway="192.168.0.254", + device_model=FtdModel.FTD_ASA5516_X, + dns_server="8.8.8.8", + console_ip="10.89.0.0", + console_port="2004", + console_username="console_user", + console_password="console_pass", + rommon_file_location="tftp://10.0.0.1/boot/ftd-boot-1.9.2.0.lfbff", + image_file_location="http://10.0.0.1/Release/ftd-6.2.3-83.pkg", + image_version="6.2.3-83", + search_domains="cisco.com", + force_install=False +) + + +class TestFtdInstall(object): + module = ftd_install + + @pytest.fixture(autouse=True) + def module_mock(self, mocker): + mocker.patch.multiple(basic.AnsibleModule, exit_json=exit_json, fail_json=fail_json) + mocker.patch.object(basic.AnsibleModule, '_socket_path', new_callable=PropertyMock, create=True, + return_value=mocker.MagicMock()) + + @pytest.fixture(autouse=True) + def connection_mock(self, mocker): + connection_class_mock = mocker.patch('ansible.modules.network.ftd.ftd_install.Connection') + return connection_class_mock.return_value + + @pytest.fixture + def config_resource_mock(self, mocker): + resource_class_mock = mocker.patch('ansible.modules.network.ftd.ftd_install.BaseConfigurationResource') + return resource_class_mock.return_value + + @pytest.fixture(autouse=True) + def ftd_factory_mock(self, mocker): + return mocker.patch('ansible.modules.network.ftd.ftd_install.FtdPlatformFactory') + + @pytest.fixture(autouse=True) + def has_kick_mock(self, mocker): + return mocker.patch('ansible.module_utils.network.ftd.device.HAS_KICK', True) + + def test_module_should_fail_when_kick_is_not_installed(self, mocker): + mocker.patch('ansible.module_utils.network.ftd.device.HAS_KICK', False) + + set_module_args(dict(DEFAULT_MODULE_PARAMS)) + with pytest.raises(AnsibleFailJson) as ex: + self.module.main() + + result = ex.value.args[0] + assert result['failed'] + assert "Firepower-kick library is required to run this module" in result['msg'] + + def test_module_should_fail_when_platform_is_not_supported(self, config_resource_mock): + config_resource_mock.execute_operation.return_value = {'platformModel': 'nonSupportedModel'} + module_params = dict(DEFAULT_MODULE_PARAMS) + del module_params['device_model'] + + set_module_args(module_params) + with pytest.raises(AnsibleFailJson) as ex: + self.module.main() + + result = ex.value.args[0] + assert result['failed'] + assert result['msg'] == "Platform model 'nonSupportedModel' is not supported by this module." + + def test_module_should_fail_when_device_model_is_missing_with_local_connection(self, mocker): + mocker.patch.object(basic.AnsibleModule, '_socket_path', create=True, return_value=None) + module_params = dict(DEFAULT_MODULE_PARAMS) + del module_params['device_model'] + + set_module_args(module_params) + with pytest.raises(AnsibleFailJson) as ex: + self.module.main() + + result = ex.value.args[0] + assert result['failed'] + expected_msg = \ + "The following parameters are mandatory when the module is used with 'local' connection: device_model." + assert expected_msg == result['msg'] + + def test_module_should_fail_when_management_ip_values_are_missing_with_local_connection(self, mocker): + mocker.patch.object(basic.AnsibleModule, '_socket_path', create=True, return_value=None) + module_params = dict(DEFAULT_MODULE_PARAMS) + del module_params['device_ip'] + del module_params['device_netmask'] + del module_params['device_gateway'] + + set_module_args(module_params) + with pytest.raises(AnsibleFailJson) as ex: + self.module.main() + + result = ex.value.args[0] + assert result['failed'] + expected_msg = "The following parameters are mandatory when the module is used with 'local' connection: " \ + "device_gateway, device_ip, device_netmask." + assert expected_msg == result['msg'] + + def test_module_should_return_when_software_is_already_installed(self, config_resource_mock): + config_resource_mock.execute_operation.return_value = { + 'softwareVersion': '6.3.0-11', + 'platformModel': 'Cisco ASA5516-X Threat Defense' + } + module_params = dict(DEFAULT_MODULE_PARAMS) + module_params['image_version'] = '6.3.0-11' + + set_module_args(module_params) + with pytest.raises(AnsibleExitJson) as ex: + self.module.main() + + result = ex.value.args[0] + assert not result['changed'] + assert result['msg'] == 'FTD already has 6.3.0-11 version of software installed.' + + def test_module_should_proceed_if_software_is_already_installed_and_force_param_given(self, config_resource_mock): + config_resource_mock.execute_operation.return_value = { + 'softwareVersion': '6.3.0-11', + 'platformModel': 'Cisco ASA5516-X Threat Defense' + } + module_params = dict(DEFAULT_MODULE_PARAMS) + module_params['image_version'] = '6.3.0-11' + module_params['force_install'] = True + + set_module_args(module_params) + with pytest.raises(AnsibleExitJson) as ex: + self.module.main() + + result = ex.value.args[0] + assert result['changed'] + assert result['msg'] == 'Successfully installed FTD image 6.3.0-11 on the firewall device.' + + def test_module_should_install_ftd_image(self, config_resource_mock, ftd_factory_mock): + config_resource_mock.execute_operation.side_effect = [ + { + 'softwareVersion': '6.2.3-11', + 'platformModel': 'Cisco ASA5516-X Threat Defense' + } + ] + module_params = dict(DEFAULT_MODULE_PARAMS) + + set_module_args(module_params) + with pytest.raises(AnsibleExitJson) as ex: + self.module.main() + + result = ex.value.args[0] + assert result['changed'] + assert result['msg'] == 'Successfully installed FTD image 6.2.3-83 on the firewall device.' + ftd_factory_mock.create.assert_called_once_with('Cisco ASA5516-X Threat Defense', DEFAULT_MODULE_PARAMS) + ftd_factory_mock.create.return_value.install_ftd_image.assert_called_once_with(DEFAULT_MODULE_PARAMS) + + def test_module_should_fill_management_ip_values_when_missing(self, config_resource_mock, ftd_factory_mock): + config_resource_mock.execute_operation.side_effect = [ + { + 'softwareVersion': '6.3.0-11', + 'platformModel': 'Cisco ASA5516-X Threat Defense' + }, + { + 'items': [{ + 'ipv4Address': '192.168.1.1', + 'ipv4NetMask': '255.255.255.0', + 'ipv4Gateway': '192.168.0.1' + }] + } + ] + module_params = dict(DEFAULT_MODULE_PARAMS) + expected_module_params = dict(module_params) + del module_params['device_ip'] + del module_params['device_netmask'] + del module_params['device_gateway'] + expected_module_params.update( + device_ip='192.168.1.1', + device_netmask='255.255.255.0', + device_gateway='192.168.0.1' + ) + + set_module_args(module_params) + with pytest.raises(AnsibleExitJson): + self.module.main() + + ftd_factory_mock.create.assert_called_once_with('Cisco ASA5516-X Threat Defense', expected_module_params) + ftd_factory_mock.create.return_value.install_ftd_image.assert_called_once_with(expected_module_params) + + def test_module_should_fill_dns_server_when_missing(self, config_resource_mock, ftd_factory_mock): + config_resource_mock.execute_operation.side_effect = [ + { + 'softwareVersion': '6.3.0-11', + 'platformModel': 'Cisco ASA5516-X Threat Defense' + }, + { + 'items': [{ + 'dnsServerGroup': { + 'id': '123' + } + }] + }, + { + 'dnsServers': [{ + 'ipAddress': '8.8.9.9' + }] + } + ] + module_params = dict(DEFAULT_MODULE_PARAMS) + expected_module_params = dict(module_params) + del module_params['dns_server'] + expected_module_params['dns_server'] = '8.8.9.9' + + set_module_args(module_params) + with pytest.raises(AnsibleExitJson): + self.module.main() + + ftd_factory_mock.create.assert_called_once_with('Cisco ASA5516-X Threat Defense', expected_module_params) + ftd_factory_mock.create.return_value.install_ftd_image.assert_called_once_with(expected_module_params)