summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorDavid Shrewsbury <shrewsbury.dave@gmail.com>2015-06-30 16:51:18 -0400
committerMonty Taylor <mordred@inaugust.com>2015-07-06 18:50:03 -0400
commit8664c884174736b803089c3d4a199461dff0af9e (patch)
tree9fda88956abc84de5ec220b1a5c136032514906b
parent9f03302b68b4038fa664230dcbb66920325dbd1f (diff)
downloadansible-modules-core-8664c884174736b803089c3d4a199461dff0af9e.tar.gz
Change required parameters for rules module
The ports and protocol are no longer required (and now depends on a new version of shade).
-rw-r--r--cloud/openstack/os_security_group_rule.py55
1 files changed, 49 insertions, 6 deletions
diff --git a/cloud/openstack/os_security_group_rule.py b/cloud/openstack/os_security_group_rule.py
index 7d86408b..2ec8e49b 100644
--- a/cloud/openstack/os_security_group_rule.py
+++ b/cloud/openstack/os_security_group_rule.py
@@ -18,8 +18,10 @@
try:
import shade
+ HAS_SHADE = True
except ImportError:
- print("failed=True msg='shade is required for this module'")
+ HAS_SHADE = False
+
DOCUMENTATION = '''
---
@@ -87,6 +89,41 @@ EXAMPLES = '''
remote_ip_prefix: 0.0.0.0/0
'''
+RETURN = '''
+id:
+ description: Unique rule UUID.
+ type: string
+direction:
+ description: The direction in which the security group rule is applied.
+ type: string
+ sample: 'egress'
+ethertype:
+ description: One of IPv4 or IPv6.
+ type: string
+ sample: 'IPv4'
+port_range_min:
+ description: The minimum port number in the range that is matched by
+ the security group rule.
+ type: int
+ sample: 8000
+port_range_max:
+ description: The maximum port number in the range that is matched by
+ the security group rule.
+ type: int
+ sample: 8000
+protocol:
+ description: The protocol that is matched by the security group rule.
+ type: string
+ sample: 'tcp'
+remote_ip_prefix:
+ description: The remote IP prefix to be associated with this security group rule.
+ type: string
+ sample: '0.0.0.0/0'
+security_group_id:
+ description: The security group ID to associate with this security group rule.
+ type: string
+'''
+
def _find_matching_rule(module, secgroup):
"""
@@ -140,10 +177,12 @@ def _system_state_change(module, secgroup):
def main():
argument_spec = openstack_full_argument_spec(
security_group = dict(required=True),
- protocol = dict(default='tcp',
- choices=['tcp', 'udp', 'icmp']),
- port_range_min = dict(required=True, type='int'),
- port_range_max = dict(required=True, type='int'),
+ # NOTE(Shrews): None is an acceptable protocol value for
+ # Neutron, but Nova will balk at this.
+ protocol = dict(default=None,
+ choices=[None, 'tcp', 'udp', 'icmp']),
+ port_range_min = dict(required=False, type='int'),
+ port_range_max = dict(required=False, type='int'),
remote_ip_prefix = dict(required=False, default=None),
# TODO(mordred): Make remote_group handle name and id
remote_group = dict(required=False, default=None),
@@ -165,6 +204,9 @@ def main():
supports_check_mode=True,
**module_kwargs)
+ if not HAS_SHADE:
+ module.fail_json(msg='shade is required for this module')
+
state = module.params['state']
security_group = module.params['security_group']
changed = False
@@ -211,4 +253,5 @@ def main():
from ansible.module_utils.basic import *
from ansible.module_utils.openstack import *
-main()
+if __name__ == '__main__':
+ main()