import netaddr from django.contrib.contenttypes.fields import GenericForeignKey from django.contrib.contenttypes.models import ContentType from django.core.exceptions import ValidationError from django.db import models from django.db.models import F from django.urls import reverse from django.utils.functional import cached_property from dcim.fields import ASNField from dcim.models import Device from extras.utils import extras_features from netbox.models import OrganizationalModel, PrimaryModel from ipam.choices import * from ipam.constants import * from ipam.fields import IPNetworkField, IPAddressField from ipam.managers import IPAddressManager from ipam.querysets import PrefixQuerySet from ipam.validators import DNSValidator from netbox.config import get_config from virtualization.models import VirtualMachine __all__ = ( 'Aggregate', 'ASN', 'IPAddress', 'IPRange', 'Prefix', 'RIR', 'Role', ) @extras_features('custom_fields', 'custom_links', 'export_templates', 'tags', 'webhooks') class RIR(OrganizationalModel): """ A Regional Internet Registry (RIR) is responsible for the allocation of a large portion of the global IP address space. This can be an organization like ARIN or RIPE, or a governing standard such as RFC 1918. """ name = models.CharField( max_length=100, unique=True ) slug = models.SlugField( max_length=100, unique=True ) is_private = models.BooleanField( default=False, verbose_name='Private', help_text='IP space managed by this RIR is considered private' ) description = models.CharField( max_length=200, blank=True ) class Meta: ordering = ['name'] verbose_name = 'RIR' verbose_name_plural = 'RIRs' def __str__(self): return self.name def get_absolute_url(self): return reverse('ipam:rir', args=[self.pk]) @extras_features('custom_fields', 'custom_links', 'export_templates', 'tags', 'webhooks') class ASN(PrimaryModel): """ An autonomous system (AS) number is typically used to represent an independent routing domain. A site can have one or more ASNs assigned to it. """ asn = ASNField( unique=True, verbose_name='ASN', help_text='32-bit autonomous system number' ) description = models.CharField( max_length=200, blank=True ) rir = models.ForeignKey( to='ipam.RIR', on_delete=models.PROTECT, related_name='asns', verbose_name='RIR' ) tenant = models.ForeignKey( to='tenancy.Tenant', on_delete=models.PROTECT, related_name='asns', blank=True, null=True ) class Meta: ordering = ['asn'] verbose_name = 'ASN' verbose_name_plural = 'ASNs' def __str__(self): return f'AS{self.asn}' def get_absolute_url(self): return reverse('ipam:asn', args=[self.pk]) @extras_features('custom_fields', 'custom_links', 'export_templates', 'tags', 'webhooks') class Aggregate(PrimaryModel): """ An aggregate exists at the root level of the IP address space hierarchy in NetBox. Aggregates are used to organize the hierarchy and track the overall utilization of available address space. Each Aggregate is assigned to a RIR. """ prefix = IPNetworkField() rir = models.ForeignKey( to='ipam.RIR', on_delete=models.PROTECT, related_name='aggregates', verbose_name='RIR' ) tenant = models.ForeignKey( to='tenancy.Tenant', on_delete=models.PROTECT, related_name='aggregates', blank=True, null=True ) date_added = models.DateField( blank=True, null=True ) description = models.CharField( max_length=200, blank=True ) clone_fields = [ 'rir', 'tenant', 'date_added', 'description', ] class Meta: ordering = ('prefix', 'pk') # prefix may be non-unique def __str__(self): return str(self.prefix) def get_absolute_url(self): return reverse('ipam:aggregate', args=[self.pk]) def clean(self): super().clean() if self.prefix: # Clear host bits from prefix self.prefix = self.prefix.cidr # /0 masks are not acceptable if self.prefix.prefixlen == 0: raise ValidationError({ 'prefix': "Cannot create aggregate with /0 mask." }) # Ensure that the aggregate being added is not covered by an existing aggregate covering_aggregates = Aggregate.objects.filter( prefix__net_contains_or_equals=str(self.prefix) ) if self.pk: covering_aggregates = covering_aggregates.exclude(pk=self.pk) if covering_aggregates: raise ValidationError({ 'prefix': "Aggregates cannot overlap. {} is already covered by an existing aggregate ({}).".format( self.prefix, covering_aggregates[0] ) }) # Ensure that the aggregate being added does not cover an existing aggregate covered_aggregates = Aggregate.objects.filter(prefix__net_contained=str(self.prefix)) if self.pk: covered_aggregates = covered_aggregates.exclude(pk=self.pk) if covered_aggregates: raise ValidationError({ 'prefix': "Aggregates cannot overlap. {} covers an existing aggregate ({}).".format( self.prefix, covered_aggregates[0] ) }) @property def family(self): if self.prefix: return self.prefix.version return None def get_utilization(self): """ Determine the prefix utilization of the aggregate and return it as a percentage. """ queryset = Prefix.objects.filter(prefix__net_contained_or_equal=str(self.prefix)) child_prefixes = netaddr.IPSet([p.prefix for p in queryset]) utilization = int(float(child_prefixes.size) / self.prefix.size * 100) return min(utilization, 100) @extras_features('custom_fields', 'custom_links', 'export_templates', 'tags', 'webhooks') class Role(OrganizationalModel): """ A Role represents the functional role of a Prefix or VLAN; for example, "Customer," "Infrastructure," or "Management." """ name = models.CharField( max_length=100, unique=True ) slug = models.SlugField( max_length=100, unique=True ) weight = models.PositiveSmallIntegerField( default=1000 ) description = models.CharField( max_length=200, blank=True, ) class Meta: ordering = ['weight', 'name'] def __str__(self): return self.name def get_absolute_url(self): return reverse('ipam:role', args=[self.pk]) @extras_features('custom_fields', 'custom_links', 'export_templates', 'tags', 'webhooks') class Prefix(PrimaryModel): """ A Prefix represents an IPv4 or IPv6 network, including mask length. Prefixes can optionally be assigned to Sites and VRFs. A Prefix must be assigned a status and may optionally be assigned a used-define Role. A Prefix can also be assigned to a VLAN where appropriate. """ prefix = IPNetworkField( help_text='IPv4 or IPv6 network with mask' ) site = models.ForeignKey( to='dcim.Site', on_delete=models.PROTECT, related_name='prefixes', blank=True, null=True ) vrf = models.ForeignKey( to='ipam.VRF', on_delete=models.PROTECT, related_name='prefixes', blank=True, null=True, verbose_name='VRF' ) tenant = models.ForeignKey( to='tenancy.Tenant', on_delete=models.PROTECT, related_name='prefixes', blank=True, null=True ) vlan = models.ForeignKey( to='ipam.VLAN', on_delete=models.PROTECT, related_name='prefixes', blank=True, null=True, verbose_name='VLAN' ) status = models.CharField( max_length=50, choices=PrefixStatusChoices, default=PrefixStatusChoices.STATUS_ACTIVE, verbose_name='Status', help_text='Operational status of this prefix' ) role = models.ForeignKey( to='ipam.Role', on_delete=models.SET_NULL, related_name='prefixes', blank=True, null=True, help_text='The primary function of this prefix' ) is_pool = models.BooleanField( verbose_name='Is a pool', default=False, help_text='All IP addresses within this prefix are considered usable' ) mark_utilized = models.BooleanField( default=False, help_text="Treat as 100% utilized" ) description = models.CharField( max_length=200, blank=True ) # Cached depth & child counts _depth = models.PositiveSmallIntegerField( default=0, editable=False ) _children = models.PositiveBigIntegerField( default=0, editable=False ) objects = PrefixQuerySet.as_manager() clone_fields = [ 'site', 'vrf', 'tenant', 'vlan', 'status', 'role', 'is_pool', 'mark_utilized', 'description', ] class Meta: ordering = (F('vrf').asc(nulls_first=True), 'prefix', 'pk') # (vrf, prefix) may be non-unique verbose_name_plural = 'prefixes' def __init__(self, *args, **kwargs): super().__init__(*args, **kwargs) # Cache the original prefix and VRF so we can check if they have changed on post_save self._prefix = self.prefix self._vrf = self.vrf def __str__(self): return str(self.prefix) def get_absolute_url(self): return reverse('ipam:prefix', args=[self.pk]) def clean(self): super().clean() if self.prefix: # /0 masks are not acceptable if self.prefix.prefixlen == 0: raise ValidationError({ 'prefix': "Cannot create prefix with /0 mask." }) # Enforce unique IP space (if applicable) if (self.vrf is None and get_config().ENFORCE_GLOBAL_UNIQUE) or (self.vrf and self.vrf.enforce_unique): duplicate_prefixes = self.get_duplicates() if duplicate_prefixes: raise ValidationError({ 'prefix': "Duplicate prefix found in {}: {}".format( "VRF {}".format(self.vrf) if self.vrf else "global table", duplicate_prefixes.first(), ) }) def save(self, *args, **kwargs): if isinstance(self.prefix, netaddr.IPNetwork): # Clear host bits from prefix self.prefix = self.prefix.cidr super().save(*args, **kwargs) @property def family(self): return self.prefix.version if self.prefix else None @property def mask_length(self): return self.prefix.prefixlen if self.prefix else None @property def depth(self): return self._depth @property def children(self): return self._children def _set_prefix_length(self, value): """ Expose the IPNetwork object's prefixlen attribute on the parent model so that it can be manipulated directly, e.g. for bulk editing. """ if self.prefix is not None: self.prefix.prefixlen = value prefix_length = property(fset=_set_prefix_length) def get_status_class(self): return PrefixStatusChoices.CSS_CLASSES.get(self.status) def get_parents(self, include_self=False): """ Return all containing Prefixes in the hierarchy. """ lookup = 'net_contains_or_equals' if include_self else 'net_contains' return Prefix.objects.filter(**{ 'vrf': self.vrf, f'prefix__{lookup}': self.prefix }) def get_children(self, include_self=False): """ Return all covered Prefixes in the hierarchy. """ lookup = 'net_contained_or_equal' if include_self else 'net_contained' return Prefix.objects.filter(**{ 'vrf': self.vrf, f'prefix__{lookup}': self.prefix }) def get_duplicates(self): return Prefix.objects.filter(vrf=self.vrf, prefix=str(self.prefix)).exclude(pk=self.pk) def get_child_prefixes(self): """ Return all Prefixes within this Prefix and VRF. If this Prefix is a container in the global table, return child Prefixes belonging to any VRF. """ if self.vrf is None and self.status == PrefixStatusChoices.STATUS_CONTAINER: return Prefix.objects.filter(prefix__net_contained=str(self.prefix)) else: return Prefix.objects.filter(prefix__net_contained=str(self.prefix), vrf=self.vrf) def get_child_ranges(self): """ Return all IPRanges within this Prefix and VRF. """ return IPRange.objects.filter( vrf=self.vrf, start_address__net_host_contained=str(self.prefix), end_address__net_host_contained=str(self.prefix) ) def get_child_ips(self): """ Return all IPAddresses within this Prefix and VRF. If this Prefix is a container in the global table, return child IPAddresses belonging to any VRF. """ if self.vrf is None and self.status == PrefixStatusChoices.STATUS_CONTAINER: return IPAddress.objects.filter(address__net_host_contained=str(self.prefix)) else: return IPAddress.objects.filter(address__net_host_contained=str(self.prefix), vrf=self.vrf) def get_available_prefixes(self): """ Return all available Prefixes within this prefix as an IPSet. """ prefix = netaddr.IPSet(self.prefix) child_prefixes = netaddr.IPSet([child.prefix for child in self.get_child_prefixes()]) available_prefixes = prefix - child_prefixes return available_prefixes def get_available_ips(self): """ Return all available IPs within this prefix as an IPSet. """ if self.mark_utilized: return list() prefix = netaddr.IPSet(self.prefix) child_ips = netaddr.IPSet([ip.address.ip for ip in self.get_child_ips()]) child_ranges = netaddr.IPSet() for iprange in self.get_child_ranges(): child_ranges.add(iprange.range) available_ips = prefix - child_ips - child_ranges # IPv6, pool, or IPv4 /31-/32 sets are fully usable if self.family == 6 or self.is_pool or (self.family == 4 and self.prefix.prefixlen >= 31): return available_ips # For "normal" IPv4 prefixes, omit first and last addresses available_ips -= netaddr.IPSet([ netaddr.IPAddress(self.prefix.first), netaddr.IPAddress(self.prefix.last), ]) return available_ips def get_first_available_prefix(self): """ Return the first available child prefix within the prefix (or None). """ available_prefixes = self.get_available_prefixes() if not available_prefixes: return None return available_prefixes.iter_cidrs()[0] def get_first_available_ip(self): """ Return the first available IP within the prefix (or None). """ available_ips = self.get_available_ips() if not available_ips: return None return '{}/{}'.format(next(available_ips.__iter__()), self.prefix.prefixlen) def get_utilization(self): """ Determine the utilization of the prefix and return it as a percentage. For Prefixes with a status of "container", calculate utilization based on child prefixes. For all others, count child IP addresses. """ if self.mark_utilized: return 100 if self.status == PrefixStatusChoices.STATUS_CONTAINER: queryset = Prefix.objects.filter( prefix__net_contained=str(self.prefix), vrf=self.vrf ) child_prefixes = netaddr.IPSet([p.prefix for p in queryset]) utilization = int(float(child_prefixes.size) / self.prefix.size * 100) else: # Compile an IPSet to avoid counting duplicate IPs child_ips = netaddr.IPSet( [_.range for _ in self.get_child_ranges()] + [_.address.ip for _ in self.get_child_ips()] ) prefix_size = self.prefix.size if self.prefix.version == 4 and self.prefix.prefixlen < 31 and not self.is_pool: prefix_size -= 2 utilization = int(float(child_ips.size) / prefix_size * 100) return min(utilization, 100) @extras_features('custom_fields', 'custom_links', 'export_templates', 'tags', 'webhooks') class IPRange(PrimaryModel): """ A range of IP addresses, defined by start and end addresses. """ start_address = IPAddressField( help_text='IPv4 or IPv6 address (with mask)' ) end_address = IPAddressField( help_text='IPv4 or IPv6 address (with mask)' ) size = models.PositiveIntegerField( editable=False ) vrf = models.ForeignKey( to='ipam.VRF', on_delete=models.PROTECT, related_name='ip_ranges', blank=True, null=True, verbose_name='VRF' ) tenant = models.ForeignKey( to='tenancy.Tenant', on_delete=models.PROTECT, related_name='ip_ranges', blank=True, null=True ) status = models.CharField( max_length=50, choices=IPRangeStatusChoices, default=IPRangeStatusChoices.STATUS_ACTIVE, help_text='Operational status of this range' ) role = models.ForeignKey( to='ipam.Role', on_delete=models.SET_NULL, related_name='ip_ranges', blank=True, null=True, help_text='The primary function of this range' ) description = models.CharField( max_length=200, blank=True ) clone_fields = [ 'vrf', 'tenant', 'status', 'role', 'description', ] class Meta: ordering = (F('vrf').asc(nulls_first=True), 'start_address', 'pk') # (vrf, start_address) may be non-unique verbose_name = 'IP range' verbose_name_plural = 'IP ranges' def __str__(self): return self.name def get_absolute_url(self): return reverse('ipam:iprange', args=[self.pk]) def clean(self): super().clean() if self.start_address and self.end_address: # Check that start & end IP versions match if self.start_address.version != self.end_address.version: raise ValidationError({ 'end_address': f"Ending address version (IPv{self.end_address.version}) does not match starting " f"address (IPv{self.start_address.version})" }) # Check that the start & end IP prefix lengths match if self.start_address.prefixlen != self.end_address.prefixlen: raise ValidationError({ 'end_address': f"Ending address mask (/{self.end_address.prefixlen}) does not match starting " f"address mask (/{self.start_address.prefixlen})" }) # Check that the ending address is greater than the starting address if not self.end_address > self.start_address: raise ValidationError({ 'end_address': f"Ending address must be lower than the starting address ({self.start_address})" }) # Check for overlapping ranges overlapping_range = IPRange.objects.exclude(pk=self.pk).filter(vrf=self.vrf).filter( Q(start_address__gte=self.start_address, start_address__lte=self.end_address) | # Starts inside Q(end_address__gte=self.start_address, end_address__lte=self.end_address) | # Ends inside Q(start_address__lte=self.start_address, end_address__gte=self.end_address) # Starts & ends outside ).first() if overlapping_range: raise ValidationError(f"Defined addresses overlap with range {overlapping_range} in VRF {self.vrf}") # Validate maximum size MAX_SIZE = 2 ** 32 - 1 if int(self.end_address.ip - self.start_address.ip) + 1 > MAX_SIZE: raise ValidationError(f"Defined range exceeds maximum supported size ({MAX_SIZE})") def save(self, *args, **kwargs): # Record the range's size (number of IP addresses) self.size = int(self.end_address.ip - self.start_address.ip) + 1 super().save(*args, **kwargs) @property def family(self): return self.start_address.version if self.start_address else None @property def range(self): return netaddr.IPRange(self.start_address.ip, self.end_address.ip) @property def mask_length(self): return self.start_address.prefixlen if self.start_address else None @cached_property def name(self): """ Return an efficient string representation of the IP range. """ separator = ':' if self.family == 6 else '.' start_chunks = str(self.start_address.ip).split(separator) end_chunks = str(self.end_address.ip).split(separator) base_chunks = [] for a, b in zip(start_chunks, end_chunks): if a == b: base_chunks.append(a) base_str = separator.join(base_chunks) start_str = separator.join(start_chunks[len(base_chunks):]) end_str = separator.join(end_chunks[len(base_chunks):]) return f'{base_str}{separator}{start_str}-{end_str}/{self.start_address.prefixlen}' def _set_prefix_length(self, value): """ Expose the IPRange object's prefixlen attribute on the parent model so that it can be manipulated directly, e.g. for bulk editing. """ self.start_address.prefixlen = value self.end_address.prefixlen = value prefix_length = property(fset=_set_prefix_length) def get_status_class(self): return IPRangeStatusChoices.CSS_CLASSES.get(self.status) def get_child_ips(self): """ Return all IPAddresses within this IPRange and VRF. """ return IPAddress.objects.filter( address__gte=self.start_address, address__lte=self.end_address, vrf=self.vrf ) def get_available_ips(self): """ Return all available IPs within this range as an IPSet. """ range = netaddr.IPRange(self.start_address.ip, self.end_address.ip) child_ips = netaddr.IPSet([ip.address.ip for ip in self.get_child_ips()]) return netaddr.IPSet(range) - child_ips @cached_property def first_available_ip(self): """ Return the first available IP within the range (or None). """ available_ips = self.get_available_ips() if not available_ips: return None return '{}/{}'.format(next(available_ips.__iter__()), self.start_address.prefixlen) @cached_property def utilization(self): """ Determine the utilization of the range and return it as a percentage. """ # Compile an IPSet to avoid counting duplicate IPs child_count = netaddr.IPSet([ ip.address.ip for ip in self.get_child_ips() ]).size return int(float(child_count) / self.size * 100) @extras_features('custom_fields', 'custom_links', 'export_templates', 'tags', 'webhooks') class IPAddress(PrimaryModel): """ An IPAddress represents an individual IPv4 or IPv6 address and its mask. The mask length should match what is configured in the real world. (Typically, only loopback interfaces are configured with /32 or /128 masks.) Like Prefixes, IPAddresses can optionally be assigned to a VRF. An IPAddress can optionally be assigned to an Interface. Interfaces can have zero or more IPAddresses assigned to them. An IPAddress can also optionally point to a NAT inside IP, designating itself as a NAT outside IP. This is useful, for example, when mapping public addresses to private addresses. When an Interface has been assigned an IPAddress which has a NAT outside IP, that Interface's Device can use either the inside or outside IP as its primary IP. """ address = IPAddressField( help_text='IPv4 or IPv6 address (with mask)' ) vrf = models.ForeignKey( to='ipam.VRF', on_delete=models.PROTECT, related_name='ip_addresses', blank=True, null=True, verbose_name='VRF' ) tenant = models.ForeignKey( to='tenancy.Tenant', on_delete=models.PROTECT, related_name='ip_addresses', blank=True, null=True ) status = models.CharField( max_length=50, choices=IPAddressStatusChoices, default=IPAddressStatusChoices.STATUS_ACTIVE, help_text='The operational status of this IP' ) role = models.CharField( max_length=50, choices=IPAddressRoleChoices, blank=True, help_text='The functional role of this IP' ) assigned_object_type = models.ForeignKey( to=ContentType, limit_choices_to=IPADDRESS_ASSIGNMENT_MODELS, on_delete=models.PROTECT, related_name='+', blank=True, null=True ) assigned_object_id = models.PositiveIntegerField( blank=True, null=True ) assigned_object = GenericForeignKey( ct_field='assigned_object_type', fk_field='assigned_object_id' ) nat_inside = models.OneToOneField( to='self', on_delete=models.SET_NULL, related_name='nat_outside', blank=True, null=True, verbose_name='NAT (Inside)', help_text='The IP for which this address is the "outside" IP' ) dns_name = models.CharField( max_length=255, blank=True, validators=[DNSValidator], verbose_name='DNS Name', help_text='Hostname or FQDN (not case-sensitive)' ) description = models.CharField( max_length=200, blank=True ) objects = IPAddressManager() clone_fields = [ 'vrf', 'tenant', 'status', 'role', 'description', ] class Meta: ordering = ('address', 'pk') # address may be non-unique verbose_name = 'IP address' verbose_name_plural = 'IP addresses' def __str__(self): return str(self.address) def get_absolute_url(self): return reverse('ipam:ipaddress', args=[self.pk]) def get_duplicates(self): return IPAddress.objects.filter( vrf=self.vrf, address__net_host=str(self.address.ip) ).exclude(pk=self.pk) def clean(self): super().clean() if self.address: # /0 masks are not acceptable if self.address.prefixlen == 0: raise ValidationError({ 'address': "Cannot create IP address with /0 mask." }) # Enforce unique IP space (if applicable) if (self.vrf is None and get_config().ENFORCE_GLOBAL_UNIQUE) or (self.vrf and self.vrf.enforce_unique): duplicate_ips = self.get_duplicates() if duplicate_ips and ( self.role not in IPADDRESS_ROLES_NONUNIQUE or any(dip.role not in IPADDRESS_ROLES_NONUNIQUE for dip in duplicate_ips) ): raise ValidationError({ 'address': "Duplicate IP address found in {}: {}".format( "VRF {}".format(self.vrf) if self.vrf else "global table", duplicate_ips.first(), ) }) # Check for primary IP assignment that doesn't match the assigned device/VM if self.pk: for cls, attr in ((Device, 'device'), (VirtualMachine, 'virtual_machine')): parent = cls.objects.filter(Q(primary_ip4=self) | Q(primary_ip6=self)).first() if parent and getattr(self.assigned_object, attr, None) != parent: # Check for a NAT relationship if not self.nat_inside or getattr(self.nat_inside.assigned_object, attr, None) != parent: raise ValidationError({ 'interface': f"IP address is primary for {cls._meta.model_name} {parent} but " f"not assigned to it!" }) # Validate IP status selection if self.status == IPAddressStatusChoices.STATUS_SLAAC and self.family != 6: raise ValidationError({ 'status': "Only IPv6 addresses can be assigned SLAAC status" }) def save(self, *args, **kwargs): # Force dns_name to lowercase self.dns_name = self.dns_name.lower() super().save(*args, **kwargs) def to_objectchange(self, action): # Annotate the assigned object, if any return super().to_objectchange(action, related_object=self.assigned_object) @property def family(self): if self.address: return self.address.version return None def _set_mask_length(self, value): """ Expose the IPNetwork object's prefixlen attribute on the parent model so that it can be manipulated directly, e.g. for bulk editing. """ if self.address is not None: self.address.prefixlen = value mask_length = property(fset=_set_mask_length) def get_status_class(self): return IPAddressStatusChoices.CSS_CLASSES.get(self.status) def get_role_class(self): return IPAddressRoleChoices.CSS_CLASSES.get(self.role)