mirror of
https://github.com/netbox-community/netbox.git
synced 2024-05-10 07:54:54 +00:00
910 lines
30 KiB
Python
910 lines
30 KiB
Python
import netaddr
|
|
from django.contrib.contenttypes.fields import GenericForeignKey
|
|
from django.contrib.contenttypes.models import ContentType
|
|
from django.core.exceptions import ValidationError
|
|
from django.db import models
|
|
from django.db.models import F
|
|
from django.urls import reverse
|
|
from django.utils.functional import cached_property
|
|
|
|
from dcim.fields import ASNField
|
|
from dcim.models import Device
|
|
from extras.utils import extras_features
|
|
from netbox.models import OrganizationalModel, PrimaryModel
|
|
from ipam.choices import *
|
|
from ipam.constants import *
|
|
from ipam.fields import IPNetworkField, IPAddressField
|
|
from ipam.managers import IPAddressManager
|
|
from ipam.querysets import PrefixQuerySet
|
|
from ipam.validators import DNSValidator
|
|
from netbox.config import get_config
|
|
from virtualization.models import VirtualMachine
|
|
|
|
|
|
__all__ = (
|
|
'Aggregate',
|
|
'ASN',
|
|
'IPAddress',
|
|
'IPRange',
|
|
'Prefix',
|
|
'RIR',
|
|
'Role',
|
|
)
|
|
|
|
|
|
@extras_features('custom_fields', 'custom_links', 'export_templates', 'tags', 'webhooks')
|
|
class RIR(OrganizationalModel):
|
|
"""
|
|
A Regional Internet Registry (RIR) is responsible for the allocation of a large portion of the global IP address
|
|
space. This can be an organization like ARIN or RIPE, or a governing standard such as RFC 1918.
|
|
"""
|
|
name = models.CharField(
|
|
max_length=100,
|
|
unique=True
|
|
)
|
|
slug = models.SlugField(
|
|
max_length=100,
|
|
unique=True
|
|
)
|
|
is_private = models.BooleanField(
|
|
default=False,
|
|
verbose_name='Private',
|
|
help_text='IP space managed by this RIR is considered private'
|
|
)
|
|
description = models.CharField(
|
|
max_length=200,
|
|
blank=True
|
|
)
|
|
|
|
class Meta:
|
|
ordering = ['name']
|
|
verbose_name = 'RIR'
|
|
verbose_name_plural = 'RIRs'
|
|
|
|
def __str__(self):
|
|
return self.name
|
|
|
|
def get_absolute_url(self):
|
|
return reverse('ipam:rir', args=[self.pk])
|
|
|
|
|
|
@extras_features('custom_fields', 'custom_links', 'export_templates', 'tags', 'webhooks')
|
|
class ASN(PrimaryModel):
|
|
"""
|
|
An autonomous system (AS) number is typically used to represent an independent routing domain. A site can have
|
|
one or more ASNs assigned to it.
|
|
"""
|
|
asn = ASNField(
|
|
unique=True,
|
|
verbose_name='ASN',
|
|
help_text='32-bit autonomous system number'
|
|
)
|
|
description = models.CharField(
|
|
max_length=200,
|
|
blank=True
|
|
)
|
|
rir = models.ForeignKey(
|
|
to='ipam.RIR',
|
|
on_delete=models.PROTECT,
|
|
related_name='asns',
|
|
verbose_name='RIR'
|
|
)
|
|
tenant = models.ForeignKey(
|
|
to='tenancy.Tenant',
|
|
on_delete=models.PROTECT,
|
|
related_name='asns',
|
|
blank=True,
|
|
null=True
|
|
)
|
|
|
|
class Meta:
|
|
ordering = ['asn']
|
|
verbose_name = 'ASN'
|
|
verbose_name_plural = 'ASNs'
|
|
|
|
def __str__(self):
|
|
return f'AS{self.asn}'
|
|
|
|
def get_absolute_url(self):
|
|
return reverse('ipam:asn', args=[self.pk])
|
|
|
|
|
|
@extras_features('custom_fields', 'custom_links', 'export_templates', 'tags', 'webhooks')
|
|
class Aggregate(PrimaryModel):
|
|
"""
|
|
An aggregate exists at the root level of the IP address space hierarchy in NetBox. Aggregates are used to organize
|
|
the hierarchy and track the overall utilization of available address space. Each Aggregate is assigned to a RIR.
|
|
"""
|
|
prefix = IPNetworkField()
|
|
rir = models.ForeignKey(
|
|
to='ipam.RIR',
|
|
on_delete=models.PROTECT,
|
|
related_name='aggregates',
|
|
verbose_name='RIR'
|
|
)
|
|
tenant = models.ForeignKey(
|
|
to='tenancy.Tenant',
|
|
on_delete=models.PROTECT,
|
|
related_name='aggregates',
|
|
blank=True,
|
|
null=True
|
|
)
|
|
date_added = models.DateField(
|
|
blank=True,
|
|
null=True
|
|
)
|
|
description = models.CharField(
|
|
max_length=200,
|
|
blank=True
|
|
)
|
|
|
|
clone_fields = [
|
|
'rir', 'tenant', 'date_added', 'description',
|
|
]
|
|
|
|
class Meta:
|
|
ordering = ('prefix', 'pk') # prefix may be non-unique
|
|
|
|
def __str__(self):
|
|
return str(self.prefix)
|
|
|
|
def get_absolute_url(self):
|
|
return reverse('ipam:aggregate', args=[self.pk])
|
|
|
|
def clean(self):
|
|
super().clean()
|
|
|
|
if self.prefix:
|
|
|
|
# Clear host bits from prefix
|
|
self.prefix = self.prefix.cidr
|
|
|
|
# /0 masks are not acceptable
|
|
if self.prefix.prefixlen == 0:
|
|
raise ValidationError({
|
|
'prefix': "Cannot create aggregate with /0 mask."
|
|
})
|
|
|
|
# Ensure that the aggregate being added is not covered by an existing aggregate
|
|
covering_aggregates = Aggregate.objects.filter(
|
|
prefix__net_contains_or_equals=str(self.prefix)
|
|
)
|
|
if self.pk:
|
|
covering_aggregates = covering_aggregates.exclude(pk=self.pk)
|
|
if covering_aggregates:
|
|
raise ValidationError({
|
|
'prefix': "Aggregates cannot overlap. {} is already covered by an existing aggregate ({}).".format(
|
|
self.prefix, covering_aggregates[0]
|
|
)
|
|
})
|
|
|
|
# Ensure that the aggregate being added does not cover an existing aggregate
|
|
covered_aggregates = Aggregate.objects.filter(prefix__net_contained=str(self.prefix))
|
|
if self.pk:
|
|
covered_aggregates = covered_aggregates.exclude(pk=self.pk)
|
|
if covered_aggregates:
|
|
raise ValidationError({
|
|
'prefix': "Aggregates cannot overlap. {} covers an existing aggregate ({}).".format(
|
|
self.prefix, covered_aggregates[0]
|
|
)
|
|
})
|
|
|
|
@property
|
|
def family(self):
|
|
if self.prefix:
|
|
return self.prefix.version
|
|
return None
|
|
|
|
def get_utilization(self):
|
|
"""
|
|
Determine the prefix utilization of the aggregate and return it as a percentage.
|
|
"""
|
|
queryset = Prefix.objects.filter(prefix__net_contained_or_equal=str(self.prefix))
|
|
child_prefixes = netaddr.IPSet([p.prefix for p in queryset])
|
|
utilization = int(float(child_prefixes.size) / self.prefix.size * 100)
|
|
|
|
return min(utilization, 100)
|
|
|
|
|
|
@extras_features('custom_fields', 'custom_links', 'export_templates', 'tags', 'webhooks')
|
|
class Role(OrganizationalModel):
|
|
"""
|
|
A Role represents the functional role of a Prefix or VLAN; for example, "Customer," "Infrastructure," or
|
|
"Management."
|
|
"""
|
|
name = models.CharField(
|
|
max_length=100,
|
|
unique=True
|
|
)
|
|
slug = models.SlugField(
|
|
max_length=100,
|
|
unique=True
|
|
)
|
|
weight = models.PositiveSmallIntegerField(
|
|
default=1000
|
|
)
|
|
description = models.CharField(
|
|
max_length=200,
|
|
blank=True,
|
|
)
|
|
|
|
class Meta:
|
|
ordering = ['weight', 'name']
|
|
|
|
def __str__(self):
|
|
return self.name
|
|
|
|
def get_absolute_url(self):
|
|
return reverse('ipam:role', args=[self.pk])
|
|
|
|
|
|
@extras_features('custom_fields', 'custom_links', 'export_templates', 'tags', 'webhooks')
|
|
class Prefix(PrimaryModel):
|
|
"""
|
|
A Prefix represents an IPv4 or IPv6 network, including mask length. Prefixes can optionally be assigned to Sites and
|
|
VRFs. A Prefix must be assigned a status and may optionally be assigned a used-define Role. A Prefix can also be
|
|
assigned to a VLAN where appropriate.
|
|
"""
|
|
prefix = IPNetworkField(
|
|
help_text='IPv4 or IPv6 network with mask'
|
|
)
|
|
site = models.ForeignKey(
|
|
to='dcim.Site',
|
|
on_delete=models.PROTECT,
|
|
related_name='prefixes',
|
|
blank=True,
|
|
null=True
|
|
)
|
|
vrf = models.ForeignKey(
|
|
to='ipam.VRF',
|
|
on_delete=models.PROTECT,
|
|
related_name='prefixes',
|
|
blank=True,
|
|
null=True,
|
|
verbose_name='VRF'
|
|
)
|
|
tenant = models.ForeignKey(
|
|
to='tenancy.Tenant',
|
|
on_delete=models.PROTECT,
|
|
related_name='prefixes',
|
|
blank=True,
|
|
null=True
|
|
)
|
|
vlan = models.ForeignKey(
|
|
to='ipam.VLAN',
|
|
on_delete=models.PROTECT,
|
|
related_name='prefixes',
|
|
blank=True,
|
|
null=True,
|
|
verbose_name='VLAN'
|
|
)
|
|
status = models.CharField(
|
|
max_length=50,
|
|
choices=PrefixStatusChoices,
|
|
default=PrefixStatusChoices.STATUS_ACTIVE,
|
|
verbose_name='Status',
|
|
help_text='Operational status of this prefix'
|
|
)
|
|
role = models.ForeignKey(
|
|
to='ipam.Role',
|
|
on_delete=models.SET_NULL,
|
|
related_name='prefixes',
|
|
blank=True,
|
|
null=True,
|
|
help_text='The primary function of this prefix'
|
|
)
|
|
is_pool = models.BooleanField(
|
|
verbose_name='Is a pool',
|
|
default=False,
|
|
help_text='All IP addresses within this prefix are considered usable'
|
|
)
|
|
mark_utilized = models.BooleanField(
|
|
default=False,
|
|
help_text="Treat as 100% utilized"
|
|
)
|
|
description = models.CharField(
|
|
max_length=200,
|
|
blank=True
|
|
)
|
|
|
|
# Cached depth & child counts
|
|
_depth = models.PositiveSmallIntegerField(
|
|
default=0,
|
|
editable=False
|
|
)
|
|
_children = models.PositiveBigIntegerField(
|
|
default=0,
|
|
editable=False
|
|
)
|
|
|
|
objects = PrefixQuerySet.as_manager()
|
|
|
|
clone_fields = [
|
|
'site', 'vrf', 'tenant', 'vlan', 'status', 'role', 'is_pool', 'mark_utilized', 'description',
|
|
]
|
|
|
|
class Meta:
|
|
ordering = (F('vrf').asc(nulls_first=True), 'prefix', 'pk') # (vrf, prefix) may be non-unique
|
|
verbose_name_plural = 'prefixes'
|
|
|
|
def __init__(self, *args, **kwargs):
|
|
super().__init__(*args, **kwargs)
|
|
|
|
# Cache the original prefix and VRF so we can check if they have changed on post_save
|
|
self._prefix = self.prefix
|
|
self._vrf = self.vrf
|
|
|
|
def __str__(self):
|
|
return str(self.prefix)
|
|
|
|
def get_absolute_url(self):
|
|
return reverse('ipam:prefix', args=[self.pk])
|
|
|
|
def clean(self):
|
|
super().clean()
|
|
|
|
if self.prefix:
|
|
|
|
# /0 masks are not acceptable
|
|
if self.prefix.prefixlen == 0:
|
|
raise ValidationError({
|
|
'prefix': "Cannot create prefix with /0 mask."
|
|
})
|
|
|
|
# Enforce unique IP space (if applicable)
|
|
if (self.vrf is None and get_config().ENFORCE_GLOBAL_UNIQUE) or (self.vrf and self.vrf.enforce_unique):
|
|
duplicate_prefixes = self.get_duplicates()
|
|
if duplicate_prefixes:
|
|
raise ValidationError({
|
|
'prefix': "Duplicate prefix found in {}: {}".format(
|
|
"VRF {}".format(self.vrf) if self.vrf else "global table",
|
|
duplicate_prefixes.first(),
|
|
)
|
|
})
|
|
|
|
def save(self, *args, **kwargs):
|
|
|
|
if isinstance(self.prefix, netaddr.IPNetwork):
|
|
|
|
# Clear host bits from prefix
|
|
self.prefix = self.prefix.cidr
|
|
|
|
super().save(*args, **kwargs)
|
|
|
|
@property
|
|
def family(self):
|
|
return self.prefix.version if self.prefix else None
|
|
|
|
@property
|
|
def mask_length(self):
|
|
return self.prefix.prefixlen if self.prefix else None
|
|
|
|
@property
|
|
def depth(self):
|
|
return self._depth
|
|
|
|
@property
|
|
def children(self):
|
|
return self._children
|
|
|
|
def _set_prefix_length(self, value):
|
|
"""
|
|
Expose the IPNetwork object's prefixlen attribute on the parent model so that it can be manipulated directly,
|
|
e.g. for bulk editing.
|
|
"""
|
|
if self.prefix is not None:
|
|
self.prefix.prefixlen = value
|
|
prefix_length = property(fset=_set_prefix_length)
|
|
|
|
def get_status_class(self):
|
|
return PrefixStatusChoices.CSS_CLASSES.get(self.status)
|
|
|
|
def get_parents(self, include_self=False):
|
|
"""
|
|
Return all containing Prefixes in the hierarchy.
|
|
"""
|
|
lookup = 'net_contains_or_equals' if include_self else 'net_contains'
|
|
return Prefix.objects.filter(**{
|
|
'vrf': self.vrf,
|
|
f'prefix__{lookup}': self.prefix
|
|
})
|
|
|
|
def get_children(self, include_self=False):
|
|
"""
|
|
Return all covered Prefixes in the hierarchy.
|
|
"""
|
|
lookup = 'net_contained_or_equal' if include_self else 'net_contained'
|
|
return Prefix.objects.filter(**{
|
|
'vrf': self.vrf,
|
|
f'prefix__{lookup}': self.prefix
|
|
})
|
|
|
|
def get_duplicates(self):
|
|
return Prefix.objects.filter(vrf=self.vrf, prefix=str(self.prefix)).exclude(pk=self.pk)
|
|
|
|
def get_child_prefixes(self):
|
|
"""
|
|
Return all Prefixes within this Prefix and VRF. If this Prefix is a container in the global table, return child
|
|
Prefixes belonging to any VRF.
|
|
"""
|
|
if self.vrf is None and self.status == PrefixStatusChoices.STATUS_CONTAINER:
|
|
return Prefix.objects.filter(prefix__net_contained=str(self.prefix))
|
|
else:
|
|
return Prefix.objects.filter(prefix__net_contained=str(self.prefix), vrf=self.vrf)
|
|
|
|
def get_child_ranges(self):
|
|
"""
|
|
Return all IPRanges within this Prefix and VRF.
|
|
"""
|
|
return IPRange.objects.filter(
|
|
vrf=self.vrf,
|
|
start_address__net_host_contained=str(self.prefix),
|
|
end_address__net_host_contained=str(self.prefix)
|
|
)
|
|
|
|
def get_child_ips(self):
|
|
"""
|
|
Return all IPAddresses within this Prefix and VRF. If this Prefix is a container in the global table, return
|
|
child IPAddresses belonging to any VRF.
|
|
"""
|
|
if self.vrf is None and self.status == PrefixStatusChoices.STATUS_CONTAINER:
|
|
return IPAddress.objects.filter(address__net_host_contained=str(self.prefix))
|
|
else:
|
|
return IPAddress.objects.filter(address__net_host_contained=str(self.prefix), vrf=self.vrf)
|
|
|
|
def get_available_prefixes(self):
|
|
"""
|
|
Return all available Prefixes within this prefix as an IPSet.
|
|
"""
|
|
prefix = netaddr.IPSet(self.prefix)
|
|
child_prefixes = netaddr.IPSet([child.prefix for child in self.get_child_prefixes()])
|
|
available_prefixes = prefix - child_prefixes
|
|
|
|
return available_prefixes
|
|
|
|
def get_available_ips(self):
|
|
"""
|
|
Return all available IPs within this prefix as an IPSet.
|
|
"""
|
|
if self.mark_utilized:
|
|
return list()
|
|
|
|
prefix = netaddr.IPSet(self.prefix)
|
|
child_ips = netaddr.IPSet([ip.address.ip for ip in self.get_child_ips()])
|
|
child_ranges = netaddr.IPSet()
|
|
for iprange in self.get_child_ranges():
|
|
child_ranges.add(iprange.range)
|
|
available_ips = prefix - child_ips - child_ranges
|
|
|
|
# IPv6, pool, or IPv4 /31-/32 sets are fully usable
|
|
if self.family == 6 or self.is_pool or (self.family == 4 and self.prefix.prefixlen >= 31):
|
|
return available_ips
|
|
|
|
# For "normal" IPv4 prefixes, omit first and last addresses
|
|
available_ips -= netaddr.IPSet([
|
|
netaddr.IPAddress(self.prefix.first),
|
|
netaddr.IPAddress(self.prefix.last),
|
|
])
|
|
|
|
return available_ips
|
|
|
|
def get_first_available_prefix(self):
|
|
"""
|
|
Return the first available child prefix within the prefix (or None).
|
|
"""
|
|
available_prefixes = self.get_available_prefixes()
|
|
if not available_prefixes:
|
|
return None
|
|
return available_prefixes.iter_cidrs()[0]
|
|
|
|
def get_first_available_ip(self):
|
|
"""
|
|
Return the first available IP within the prefix (or None).
|
|
"""
|
|
available_ips = self.get_available_ips()
|
|
if not available_ips:
|
|
return None
|
|
return '{}/{}'.format(next(available_ips.__iter__()), self.prefix.prefixlen)
|
|
|
|
def get_utilization(self):
|
|
"""
|
|
Determine the utilization of the prefix and return it as a percentage. For Prefixes with a status of
|
|
"container", calculate utilization based on child prefixes. For all others, count child IP addresses.
|
|
"""
|
|
if self.mark_utilized:
|
|
return 100
|
|
|
|
if self.status == PrefixStatusChoices.STATUS_CONTAINER:
|
|
queryset = Prefix.objects.filter(
|
|
prefix__net_contained=str(self.prefix),
|
|
vrf=self.vrf
|
|
)
|
|
child_prefixes = netaddr.IPSet([p.prefix for p in queryset])
|
|
utilization = int(float(child_prefixes.size) / self.prefix.size * 100)
|
|
else:
|
|
# Compile an IPSet to avoid counting duplicate IPs
|
|
child_ips = netaddr.IPSet(
|
|
[_.range for _ in self.get_child_ranges()] + [_.address.ip for _ in self.get_child_ips()]
|
|
)
|
|
|
|
prefix_size = self.prefix.size
|
|
if self.prefix.version == 4 and self.prefix.prefixlen < 31 and not self.is_pool:
|
|
prefix_size -= 2
|
|
utilization = int(float(child_ips.size) / prefix_size * 100)
|
|
|
|
return min(utilization, 100)
|
|
|
|
|
|
@extras_features('custom_fields', 'custom_links', 'export_templates', 'tags', 'webhooks')
|
|
class IPRange(PrimaryModel):
|
|
"""
|
|
A range of IP addresses, defined by start and end addresses.
|
|
"""
|
|
start_address = IPAddressField(
|
|
help_text='IPv4 or IPv6 address (with mask)'
|
|
)
|
|
end_address = IPAddressField(
|
|
help_text='IPv4 or IPv6 address (with mask)'
|
|
)
|
|
size = models.PositiveIntegerField(
|
|
editable=False
|
|
)
|
|
vrf = models.ForeignKey(
|
|
to='ipam.VRF',
|
|
on_delete=models.PROTECT,
|
|
related_name='ip_ranges',
|
|
blank=True,
|
|
null=True,
|
|
verbose_name='VRF'
|
|
)
|
|
tenant = models.ForeignKey(
|
|
to='tenancy.Tenant',
|
|
on_delete=models.PROTECT,
|
|
related_name='ip_ranges',
|
|
blank=True,
|
|
null=True
|
|
)
|
|
status = models.CharField(
|
|
max_length=50,
|
|
choices=IPRangeStatusChoices,
|
|
default=IPRangeStatusChoices.STATUS_ACTIVE,
|
|
help_text='Operational status of this range'
|
|
)
|
|
role = models.ForeignKey(
|
|
to='ipam.Role',
|
|
on_delete=models.SET_NULL,
|
|
related_name='ip_ranges',
|
|
blank=True,
|
|
null=True,
|
|
help_text='The primary function of this range'
|
|
)
|
|
description = models.CharField(
|
|
max_length=200,
|
|
blank=True
|
|
)
|
|
|
|
clone_fields = [
|
|
'vrf', 'tenant', 'status', 'role', 'description',
|
|
]
|
|
|
|
class Meta:
|
|
ordering = (F('vrf').asc(nulls_first=True), 'start_address', 'pk') # (vrf, start_address) may be non-unique
|
|
verbose_name = 'IP range'
|
|
verbose_name_plural = 'IP ranges'
|
|
|
|
def __str__(self):
|
|
return self.name
|
|
|
|
def get_absolute_url(self):
|
|
return reverse('ipam:iprange', args=[self.pk])
|
|
|
|
def clean(self):
|
|
super().clean()
|
|
|
|
if self.start_address and self.end_address:
|
|
|
|
# Check that start & end IP versions match
|
|
if self.start_address.version != self.end_address.version:
|
|
raise ValidationError({
|
|
'end_address': f"Ending address version (IPv{self.end_address.version}) does not match starting "
|
|
f"address (IPv{self.start_address.version})"
|
|
})
|
|
|
|
# Check that the start & end IP prefix lengths match
|
|
if self.start_address.prefixlen != self.end_address.prefixlen:
|
|
raise ValidationError({
|
|
'end_address': f"Ending address mask (/{self.end_address.prefixlen}) does not match starting "
|
|
f"address mask (/{self.start_address.prefixlen})"
|
|
})
|
|
|
|
# Check that the ending address is greater than the starting address
|
|
if not self.end_address > self.start_address:
|
|
raise ValidationError({
|
|
'end_address': f"Ending address must be lower than the starting address ({self.start_address})"
|
|
})
|
|
|
|
# Check for overlapping ranges
|
|
overlapping_range = IPRange.objects.exclude(pk=self.pk).filter(vrf=self.vrf).filter(
|
|
Q(start_address__gte=self.start_address, start_address__lte=self.end_address) | # Starts inside
|
|
Q(end_address__gte=self.start_address, end_address__lte=self.end_address) | # Ends inside
|
|
Q(start_address__lte=self.start_address, end_address__gte=self.end_address) # Starts & ends outside
|
|
).first()
|
|
if overlapping_range:
|
|
raise ValidationError(f"Defined addresses overlap with range {overlapping_range} in VRF {self.vrf}")
|
|
|
|
# Validate maximum size
|
|
MAX_SIZE = 2 ** 32 - 1
|
|
if int(self.end_address.ip - self.start_address.ip) + 1 > MAX_SIZE:
|
|
raise ValidationError(f"Defined range exceeds maximum supported size ({MAX_SIZE})")
|
|
|
|
def save(self, *args, **kwargs):
|
|
|
|
# Record the range's size (number of IP addresses)
|
|
self.size = int(self.end_address.ip - self.start_address.ip) + 1
|
|
|
|
super().save(*args, **kwargs)
|
|
|
|
@property
|
|
def family(self):
|
|
return self.start_address.version if self.start_address else None
|
|
|
|
@property
|
|
def range(self):
|
|
return netaddr.IPRange(self.start_address.ip, self.end_address.ip)
|
|
|
|
@property
|
|
def mask_length(self):
|
|
return self.start_address.prefixlen if self.start_address else None
|
|
|
|
@cached_property
|
|
def name(self):
|
|
"""
|
|
Return an efficient string representation of the IP range.
|
|
"""
|
|
separator = ':' if self.family == 6 else '.'
|
|
start_chunks = str(self.start_address.ip).split(separator)
|
|
end_chunks = str(self.end_address.ip).split(separator)
|
|
|
|
base_chunks = []
|
|
for a, b in zip(start_chunks, end_chunks):
|
|
if a == b:
|
|
base_chunks.append(a)
|
|
|
|
base_str = separator.join(base_chunks)
|
|
start_str = separator.join(start_chunks[len(base_chunks):])
|
|
end_str = separator.join(end_chunks[len(base_chunks):])
|
|
|
|
return f'{base_str}{separator}{start_str}-{end_str}/{self.start_address.prefixlen}'
|
|
|
|
def _set_prefix_length(self, value):
|
|
"""
|
|
Expose the IPRange object's prefixlen attribute on the parent model so that it can be manipulated directly,
|
|
e.g. for bulk editing.
|
|
"""
|
|
self.start_address.prefixlen = value
|
|
self.end_address.prefixlen = value
|
|
prefix_length = property(fset=_set_prefix_length)
|
|
|
|
def get_status_class(self):
|
|
return IPRangeStatusChoices.CSS_CLASSES.get(self.status)
|
|
|
|
def get_child_ips(self):
|
|
"""
|
|
Return all IPAddresses within this IPRange and VRF.
|
|
"""
|
|
return IPAddress.objects.filter(
|
|
address__gte=self.start_address,
|
|
address__lte=self.end_address,
|
|
vrf=self.vrf
|
|
)
|
|
|
|
def get_available_ips(self):
|
|
"""
|
|
Return all available IPs within this range as an IPSet.
|
|
"""
|
|
range = netaddr.IPRange(self.start_address.ip, self.end_address.ip)
|
|
child_ips = netaddr.IPSet([ip.address.ip for ip in self.get_child_ips()])
|
|
|
|
return netaddr.IPSet(range) - child_ips
|
|
|
|
@cached_property
|
|
def first_available_ip(self):
|
|
"""
|
|
Return the first available IP within the range (or None).
|
|
"""
|
|
available_ips = self.get_available_ips()
|
|
if not available_ips:
|
|
return None
|
|
|
|
return '{}/{}'.format(next(available_ips.__iter__()), self.start_address.prefixlen)
|
|
|
|
@cached_property
|
|
def utilization(self):
|
|
"""
|
|
Determine the utilization of the range and return it as a percentage.
|
|
"""
|
|
# Compile an IPSet to avoid counting duplicate IPs
|
|
child_count = netaddr.IPSet([
|
|
ip.address.ip for ip in self.get_child_ips()
|
|
]).size
|
|
|
|
return int(float(child_count) / self.size * 100)
|
|
|
|
|
|
@extras_features('custom_fields', 'custom_links', 'export_templates', 'tags', 'webhooks')
|
|
class IPAddress(PrimaryModel):
|
|
"""
|
|
An IPAddress represents an individual IPv4 or IPv6 address and its mask. The mask length should match what is
|
|
configured in the real world. (Typically, only loopback interfaces are configured with /32 or /128 masks.) Like
|
|
Prefixes, IPAddresses can optionally be assigned to a VRF. An IPAddress can optionally be assigned to an Interface.
|
|
Interfaces can have zero or more IPAddresses assigned to them.
|
|
|
|
An IPAddress can also optionally point to a NAT inside IP, designating itself as a NAT outside IP. This is useful,
|
|
for example, when mapping public addresses to private addresses. When an Interface has been assigned an IPAddress
|
|
which has a NAT outside IP, that Interface's Device can use either the inside or outside IP as its primary IP.
|
|
"""
|
|
address = IPAddressField(
|
|
help_text='IPv4 or IPv6 address (with mask)'
|
|
)
|
|
vrf = models.ForeignKey(
|
|
to='ipam.VRF',
|
|
on_delete=models.PROTECT,
|
|
related_name='ip_addresses',
|
|
blank=True,
|
|
null=True,
|
|
verbose_name='VRF'
|
|
)
|
|
tenant = models.ForeignKey(
|
|
to='tenancy.Tenant',
|
|
on_delete=models.PROTECT,
|
|
related_name='ip_addresses',
|
|
blank=True,
|
|
null=True
|
|
)
|
|
status = models.CharField(
|
|
max_length=50,
|
|
choices=IPAddressStatusChoices,
|
|
default=IPAddressStatusChoices.STATUS_ACTIVE,
|
|
help_text='The operational status of this IP'
|
|
)
|
|
role = models.CharField(
|
|
max_length=50,
|
|
choices=IPAddressRoleChoices,
|
|
blank=True,
|
|
help_text='The functional role of this IP'
|
|
)
|
|
assigned_object_type = models.ForeignKey(
|
|
to=ContentType,
|
|
limit_choices_to=IPADDRESS_ASSIGNMENT_MODELS,
|
|
on_delete=models.PROTECT,
|
|
related_name='+',
|
|
blank=True,
|
|
null=True
|
|
)
|
|
assigned_object_id = models.PositiveIntegerField(
|
|
blank=True,
|
|
null=True
|
|
)
|
|
assigned_object = GenericForeignKey(
|
|
ct_field='assigned_object_type',
|
|
fk_field='assigned_object_id'
|
|
)
|
|
nat_inside = models.OneToOneField(
|
|
to='self',
|
|
on_delete=models.SET_NULL,
|
|
related_name='nat_outside',
|
|
blank=True,
|
|
null=True,
|
|
verbose_name='NAT (Inside)',
|
|
help_text='The IP for which this address is the "outside" IP'
|
|
)
|
|
dns_name = models.CharField(
|
|
max_length=255,
|
|
blank=True,
|
|
validators=[DNSValidator],
|
|
verbose_name='DNS Name',
|
|
help_text='Hostname or FQDN (not case-sensitive)'
|
|
)
|
|
description = models.CharField(
|
|
max_length=200,
|
|
blank=True
|
|
)
|
|
|
|
objects = IPAddressManager()
|
|
|
|
clone_fields = [
|
|
'vrf', 'tenant', 'status', 'role', 'description',
|
|
]
|
|
|
|
class Meta:
|
|
ordering = ('address', 'pk') # address may be non-unique
|
|
verbose_name = 'IP address'
|
|
verbose_name_plural = 'IP addresses'
|
|
|
|
def __str__(self):
|
|
return str(self.address)
|
|
|
|
def get_absolute_url(self):
|
|
return reverse('ipam:ipaddress', args=[self.pk])
|
|
|
|
def get_duplicates(self):
|
|
return IPAddress.objects.filter(
|
|
vrf=self.vrf,
|
|
address__net_host=str(self.address.ip)
|
|
).exclude(pk=self.pk)
|
|
|
|
def clean(self):
|
|
super().clean()
|
|
|
|
if self.address:
|
|
|
|
# /0 masks are not acceptable
|
|
if self.address.prefixlen == 0:
|
|
raise ValidationError({
|
|
'address': "Cannot create IP address with /0 mask."
|
|
})
|
|
|
|
# Enforce unique IP space (if applicable)
|
|
if (self.vrf is None and get_config().ENFORCE_GLOBAL_UNIQUE) or (self.vrf and self.vrf.enforce_unique):
|
|
duplicate_ips = self.get_duplicates()
|
|
if duplicate_ips and (
|
|
self.role not in IPADDRESS_ROLES_NONUNIQUE or
|
|
any(dip.role not in IPADDRESS_ROLES_NONUNIQUE for dip in duplicate_ips)
|
|
):
|
|
raise ValidationError({
|
|
'address': "Duplicate IP address found in {}: {}".format(
|
|
"VRF {}".format(self.vrf) if self.vrf else "global table",
|
|
duplicate_ips.first(),
|
|
)
|
|
})
|
|
|
|
# Check for primary IP assignment that doesn't match the assigned device/VM
|
|
if self.pk:
|
|
for cls, attr in ((Device, 'device'), (VirtualMachine, 'virtual_machine')):
|
|
parent = cls.objects.filter(Q(primary_ip4=self) | Q(primary_ip6=self)).first()
|
|
if parent and getattr(self.assigned_object, attr, None) != parent:
|
|
# Check for a NAT relationship
|
|
if not self.nat_inside or getattr(self.nat_inside.assigned_object, attr, None) != parent:
|
|
raise ValidationError({
|
|
'interface': f"IP address is primary for {cls._meta.model_name} {parent} but "
|
|
f"not assigned to it!"
|
|
})
|
|
|
|
# Validate IP status selection
|
|
if self.status == IPAddressStatusChoices.STATUS_SLAAC and self.family != 6:
|
|
raise ValidationError({
|
|
'status': "Only IPv6 addresses can be assigned SLAAC status"
|
|
})
|
|
|
|
def save(self, *args, **kwargs):
|
|
|
|
# Force dns_name to lowercase
|
|
self.dns_name = self.dns_name.lower()
|
|
|
|
super().save(*args, **kwargs)
|
|
|
|
def to_objectchange(self, action):
|
|
# Annotate the assigned object, if any
|
|
return super().to_objectchange(action, related_object=self.assigned_object)
|
|
|
|
@property
|
|
def family(self):
|
|
if self.address:
|
|
return self.address.version
|
|
return None
|
|
|
|
def _set_mask_length(self, value):
|
|
"""
|
|
Expose the IPNetwork object's prefixlen attribute on the parent model so that it can be manipulated directly,
|
|
e.g. for bulk editing.
|
|
"""
|
|
if self.address is not None:
|
|
self.address.prefixlen = value
|
|
mask_length = property(fset=_set_mask_length)
|
|
|
|
def get_status_class(self):
|
|
return IPAddressStatusChoices.CSS_CLASSES.get(self.status)
|
|
|
|
def get_role_class(self):
|
|
return IPAddressRoleChoices.CSS_CLASSES.get(self.role)
|