-
Notifications
You must be signed in to change notification settings - Fork 171
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
ios_acls: Fix module failure when ARP ACLs are present on device #1131
base: main
Are you sure you want to change the base?
Conversation
for more information, see https://pre-commit.ci
for more information, see https://pre-commit.ci
"""\ | ||
ip access-list standard 10 | ||
10 permit 192.168.1.0 0.0.0.255 | ||
arp access-list arp-test |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Can we please add a integration test where we add a prepare test to add arp access-list and then gather facts so that we are sure with an appliance too that the facts are handled correctly?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Sure will do it thanks
SUMMARY
This PR fixes an issue with the ios_acls module where it fails when ARP ACLs are present on the device. The module was incorrectly parsing ARP ACL entries, causing errors when configuring extended ACLs with protocol options.
Initial ACL configuration:
Playbook:
Error:
FIX
Changes made in ios/plugins/module_utils/network/ios/facts/acls/acls.py
This ensures the module only processes IP ACLs and ignores ARP ACLs.
Fixes: #1111
ISSUE TYPE
Bugfix Pull Request
COMPONENT NAME
cisco.ios.ios_acls