Project

General

Profile

Download (8.84 KB) Statistics
| Branch: | Tag: | Revision:
require 'ipaddr'
class Subnet < ActiveRecord::Base
BOOT_MODES = {:static => N_('Static'), :dhcp => N_('DHCP')}
IPAM_MODES = {:dhcp => N_('DHCP'), :db => N_('Internal DB'), :none => N_('None')}

include Authorizable
extend FriendlyId
friendly_id :name
include Taxonomix
include Parameterizable::ByIdName
include EncOutput
audited :allow_mass_assignment => true

validates_lengths_from_database :except => [:gateway]
before_destroy EnsureNotUsedBy.new(:hosts, :hostgroups, :interfaces, :domains)
has_many :hostgroups
belongs_to :dhcp, :class_name => "SmartProxy"
belongs_to :tftp, :class_name => "SmartProxy"
belongs_to :dns, :class_name => "SmartProxy"
has_many :subnet_domains, :dependent => :destroy
has_many :domains, :through => :subnet_domains
has_many :interfaces, :class_name => 'Nic::Base'
has_many :primary_interfaces, :class_name => 'Nic::Base', :conditions => { :primary => true }
has_many :hosts, :through => :interfaces
has_many :primary_hosts, :through => :primary_interfaces, :source => :host
validates :network, :mask, :name, :presence => true
validates_associated :subnet_domains
validates :network, :format => {:with => Net::Validations::IP_REGEXP}
validates :gateway, :dns_primary, :dns_secondary,
:allow_blank => true,
:allow_nil => true,
:format => {:with => Net::Validations::IP_REGEXP},
:length => { :maximum => 15, :message => N_("is too long (maximum is 15 characters)") }
validates :mask, :format => {:with => Net::Validations::MASK_REGEXP}
validates :boot_mode, :inclusion => BOOT_MODES.values
validates :ipam, :inclusion => IPAM_MODES.values
validates :name, :length => {:maximum => 255}, :uniqueness => true

validate :ensure_ip_addr_new
before_validation :cleanup_addresses

validate :validate_ranges

default_scope lambda {
with_taxonomy_scope do
order('vlanid')
end
}

scoped_search :on => [:name, :network, :mask, :gateway, :dns_primary, :dns_secondary,
:vlanid, :ipam, :boot_mode], :complete_value => true

scoped_search :in => :domains, :on => :name, :rename => :domain, :complete_value => true

class Jail < ::Safemode::Jail
allow :name, :network, :mask, :cidr, :title, :to_label, :gateway, :dns_primary, :dns_secondary,
:vlanid, :boot_mode, :dhcp?, :nil?, :has_vlanid?, :dhcp_boot_mode?
end

def self.modes_with_translations(modes)
modes.map { |_, mode_name| [_(mode_name), mode_name] }
end

def self.boot_modes_with_translations
modes_with_translations(BOOT_MODES)
end

def self.ipam_modes_with_translations
modes_with_translations(IPAM_MODES)
end

# Subnets are displayed in the form of their network network/network mask
def network_address
"#{network}/#{cidr}"
end

def to_label
"#{name} (#{network_address})"
end

# Subnets are sorted on their priority value
# [+other+] : Subnet object with which to compare ourself
# +returns+ : Subnet object with higher precedence
def <=>(other)
if self.vlanid.present? && other.vlanid.present?
self.vlanid <=> other.vlanid
else
return -1
end
end

# Given an IP returns the subnet that contains that IP
# [+ip+] : "doted quad" string
# Returns : Subnet object or nil if not found
def self.subnet_for(ip)
Subnet.all.each {|s| return s if s.contains? IPAddr.new(ip)}
nil
end

# Indicates whether the IP is within this subnet
# [+ip+] String: Contains 4 dotted decimal values
# Returns Boolean: True if if ip is in this subnet
def contains?(ip)
IPAddr.new("#{network}/#{mask}", Socket::AF_INET).include? IPAddr.new(ip, Socket::AF_INET)
end

def cidr
IPAddr.new(mask).to_i.to_s(2).count("1")
end

def dhcp?
!!(dhcp and dhcp.url and !dhcp.url.blank?)
end

def dhcp_proxy(attrs = {})
@dhcp_proxy ||= ProxyAPI::DHCP.new({:url => dhcp.url}.merge(attrs)) if dhcp?
end

def tftp?
!!(tftp and tftp.url and !tftp.url.blank?)
end

def tftp_proxy(attrs = {})
@tftp_proxy ||= ProxyAPI::TFTP.new({:url => tftp.url}.merge(attrs)) if tftp?
end

# do we support DNS PTR records for this subnet
def dns?
!!(dns and dns.url and !dns.url.blank?)
end

def dns_proxy(attrs = {})
@dns_proxy ||= ProxyAPI::DNS.new({:url => dns.url}.merge(attrs)) if dns?
end

def ipam?
self.ipam != IPAM_MODES[:none]
end

def dhcp_boot_mode?
self.boot_mode == Subnet::BOOT_MODES[:dhcp]
end

def unused_ip(mac = nil, excluded_ips = [])
unless ipam?
logger.debug "Not suggesting IP Address for #{self} as IPAM is disabled"
return
end

if self.ipam == IPAM_MODES[:dhcp] && dhcp?
# we have DHCP proxy so asking it for free IP
logger.debug "Asking #{dhcp.url} for free IP"
ip = dhcp_proxy.unused_ip(self, mac)["ip"]
logger.debug("Found #{ip}")
return(ip)
elsif self.ipam == IPAM_MODES[:db]
# we have no DHCP proxy configured so Foreman becomes `DHCP` and manages reservations internally
logger.debug "Trying to find free IP for subnet in internal DB"
subnet_range = IPAddr.new("#{network}/#{mask}", Socket::AF_INET).to_range.to_a
from = self.from.present? ? IPAddr.new(self.from) : subnet_range[1]
to = self.to.present? ? IPAddr.new(self.to) : subnet_range[-2]
(from..to).each do |address|
ip = address.to_s
if !self.known_ips.include?(ip) && !excluded_ips.include?(ip)
logger.debug("Found #{ip}")
return(ip)
end
end
logger.debug("Not suggesting IP Address for #{self} as no free IP found in our DB")
return
end
rescue => e
logger.warn "Failed to fetch a free IP from our proxy: #{e}"
nil
end

def known_ips
ips = self.interfaces.map(&:ip) + self.hosts.includes(:interfaces).map(&:ip)
ips += [self.gateway, self.dns_primary, self.dns_secondary].select(&:present?)
self.clear_association_cache
ips.uniq
end

# imports subnets from a dhcp smart proxy
def self.import(proxy)
return unless proxy.has_feature?('DHCP')
ProxyAPI::DHCP.new(:url => proxy.url).subnets.map do |s|
# do not import existing networks.
attrs = { :network => s["network"], :mask => s["netmask"] }
next if first(:conditions => attrs)
new(attrs.update(:dhcp => proxy))
end.compact
end

def proxies
[dhcp, tftp, dns].compact
end

def has_vlanid?
self.vlanid.present?
end

# overwrite method in taxonomix, since subnet is not direct association of host anymore
def used_taxonomy_ids(type)
return [] if new_record?
Host::Base.joins(:primary_interface).where(:nics => {:subnet_id => id}).uniq.pluck(type).compact
end

def as_json(options = {})
super({:methods => [:to_label]}.merge(options))
end

private

def validate_ranges
errors.add(:from, _("invalid IP address")) if from.present? and !from =~ Net::Validations::IP_REGEXP
errors.add(:to, _("invalid IP address")) if to.present? and !to =~ Net::Validations::IP_REGEXP
errors.add(:from, _("does not belong to subnet")) if from.present? and not self.contains?(f=IPAddr.new(from))
errors.add(:to, _("does not belong to subnet")) if to.present? and not self.contains?(t=IPAddr.new(to))
errors.add(:from, _("can't be bigger than to range")) if from.present? and t.present? and f > t
if from.present? or to.present?
errors.add(:from, _("must be specified if to is defined")) if from.blank?
errors.add(:to, _("must be specified if from is defined")) if to.blank?
end
end

def cleanup_addresses
self.network = cleanup_ip(network) if network.present?
self.mask = cleanup_ip(mask) if mask.present?
self.gateway = cleanup_ip(gateway) if gateway.present?
self.dns_primary = cleanup_ip(dns_primary) if dns_primary.present?
self.dns_secondary = cleanup_ip(dns_secondary) if dns_secondary.present?
self
end

def cleanup_ip(address)
address.gsub!(/\.\.+/, ".")
address.gsub!(/2555+/, "255")
address
end

def ensure_ip_addr_new
errors.add(:network, _("is invalid")) if network.present? && (IPAddr.new(network) rescue nil).nil? && !errors.keys.include?(:network)
errors.add(:mask, _("is invalid")) if mask.present? && (IPAddr.new(mask) rescue nil).nil? && !errors.keys.include?(:mask)
errors.add(:gateway, _("is invalid")) if gateway.present? && (IPAddr.new(gateway) rescue nil).nil? && !errors.keys.include?(:gateway)
errors.add(:dns_primary, _("is invalid")) if dns_primary.present? && (IPAddr.new(dns_primary) rescue nil).nil? && !errors.keys.include?(:dns_primary)
errors.add(:dns_secondary, _("is invalid")) if dns_secondary.present? && (IPAddr.new(dns_secondary) rescue nil).nil? && !errors.keys.include?(:dns_secondary)
end

private

def enc_attributes
@enc_attributes ||= %w(name network mask gateway dns_primary dns_secondary from to boot_mode ipam vlanid)
end
end
(46-46/61)