|
require 'ipaddr'
|
|
|
|
class Subnet < ApplicationRecord
|
|
audited
|
|
IP_FIELDS = [:network, :mask, :gateway, :dns_primary, :dns_secondary, :from, :to]
|
|
REQUIRED_IP_FIELDS = [:network, :mask]
|
|
SUBNET_TYPES = {:'Subnet::Ipv4' => N_('IPv4'), :'Subnet::Ipv6' => N_('IPv6')}
|
|
BOOT_MODES = {:static => N_('Static'), :dhcp => N_('DHCP')}
|
|
|
|
include Authorizable
|
|
prepend Foreman::STI
|
|
extend FriendlyId
|
|
friendly_id :name
|
|
include Taxonomix
|
|
include Parameterizable::ByIdName
|
|
include Exportable
|
|
include BelongsToProxies
|
|
include ScopedSearchExtensions
|
|
include ParameterSearch
|
|
include Foreman::ObservableModel
|
|
|
|
attr_exportable :name, :network, :mask, :gateway, :dns_primary, :dns_secondary, :from, :to, :boot_mode,
|
|
:ipam, :vlanid, :mtu, :nic_delay, :network_type, :description
|
|
|
|
# This sets the rails model name of all child classes to the
|
|
# model name of the parent class, i.e. Subnet.
|
|
# This is necessary for all STI classes to share the same
|
|
# route_key, param_key, ...
|
|
def self.inherited(child)
|
|
child.instance_eval do
|
|
# rubocop:disable Rails/Delegate
|
|
def model_name
|
|
superclass.model_name
|
|
end
|
|
# rubocop:enable Rails/Delegate
|
|
end
|
|
super
|
|
end
|
|
|
|
graphql_type '::Types::Subnet'
|
|
|
|
validates_lengths_from_database :except => [:gateway]
|
|
before_destroy EnsureNotUsedBy.new(:hosts, :hostgroups, :interfaces, :domains)
|
|
|
|
belongs_to_proxy :dhcp,
|
|
:feature => 'DHCP',
|
|
:label => N_('DHCP Proxy'),
|
|
:description => N_('DHCP Proxy to use within this subnet'),
|
|
:api_description => N_('DHCP Proxy ID to use within this subnet'),
|
|
:if => ->(subnet) { subnet.supports_ipam_mode?(:dhcp) }
|
|
|
|
belongs_to_proxy :tftp,
|
|
:feature => N_('TFTP'),
|
|
:label => N_('TFTP Proxy'),
|
|
:api_description => N_('TFTP Proxy ID to use within this subnet'),
|
|
:description => N_('TFTP Proxy to use within this subnet')
|
|
|
|
belongs_to_proxy :httpboot,
|
|
:feature => N_('HTTPBoot'),
|
|
:label => N_('HTTPBoot Proxy'),
|
|
:api_description => N_('HTTPBoot Proxy ID to use within this subnet'),
|
|
:description => N_('HTTPBoot Proxy to use within this subnet')
|
|
|
|
belongs_to_proxy :externalipam,
|
|
:feature => N_('External IPAM'),
|
|
:label => N_('External IPAM'),
|
|
:api_description => N_('External IPAM Proxy ID to use within this subnet'),
|
|
:description => N_('External IPAM Proxy to use within this subnet')
|
|
|
|
belongs_to_proxy :dns,
|
|
:feature => N_('DNS'),
|
|
:label => N_('Reverse DNS Proxy'),
|
|
:api_description => N_('DNS Proxy ID to use within this subnet'),
|
|
:description => N_('DNS Proxy to use within this subnet for managing PTR records, note that A and AAAA records are managed via Domain DNS proxy')
|
|
|
|
belongs_to_proxy :template,
|
|
:feature => N_('Templates'),
|
|
:label => N_('Template Proxy'),
|
|
:api_description => N_('Template HTTP(S) Proxy ID to use within this subnet'),
|
|
:description => N_('Template HTTP(S) Proxy to use within this subnet to allow access templating endpoint from isolated networks')
|
|
|
|
belongs_to_proxy :bmc,
|
|
:feature => N_('BMC'),
|
|
:label => N_('BMC Proxy'),
|
|
:api_description => N_('BMC Proxy ID to use within this subnet'),
|
|
:description => N_('BMC Proxy to use within this subnet for management access')
|
|
|
|
has_many :hostgroups
|
|
has_many :subnet_domains, :dependent => :destroy, :inverse_of => :subnet
|
|
has_many :domains, :through => :subnet_domains
|
|
has_many :subnet_parameters, :dependent => :destroy, :foreign_key => :reference_id, :inverse_of => :subnet
|
|
has_many :parameters, :dependent => :destroy, :foreign_key => :reference_id, :class_name => "SubnetParameter"
|
|
accepts_nested_attributes_for :subnet_parameters, :allow_destroy => true
|
|
validates :network, :mask, :name, :cidr, :presence => true
|
|
validates_associated :subnet_domains
|
|
validates :boot_mode, :inclusion => BOOT_MODES.values
|
|
validates :ipam, :inclusion => {:in => proc { |subnet| subnet.supported_ipam_modes.map { |m| IPAM::MODES[m] } }, :message => N_('not supported by this protocol')}
|
|
validates :type, :inclusion => {:in => proc { Subnet::SUBNET_TYPES.keys.map(&:to_s) }, :message => N_("must be one of [ %s ]" % Subnet::SUBNET_TYPES.keys.map(&:to_s).join(', ')) }
|
|
validates :name, :length => {:maximum => 255}, :uniqueness => true
|
|
validates :vlanid, numericality: { only_integer: true, greater_than_or_equal_to: 0, less_than: 4096 }, allow_blank: true
|
|
validates :mtu, numericality: { only_integer: true, greater_than_or_equal_to: 68 }, presence: true
|
|
validates :nic_delay, numericality: { only_integer: true, greater_than_or_equal_to: 0, less_than: 1024 }, allow_blank: true
|
|
|
|
before_validation :normalize_addresses
|
|
after_validation :validate_against_external_ipam
|
|
validate :ensure_ip_addrs_valid
|
|
|
|
validate :validate_ranges
|
|
validate :check_if_type_changed, :on => :update
|
|
|
|
default_scope lambda {
|
|
with_taxonomy_scope do
|
|
order(:vlanid)
|
|
end
|
|
}
|
|
|
|
scoped_search :on => :id, :complete_enabled => false, :only_explicit => true, :validator => ScopedSearch::Validators::INTEGER
|
|
scoped_search :on => [:name, :network, :mask, :gateway, :dns_primary, :dns_secondary,
|
|
:vlanid, :mtu, :nic_delay, :ipam, :boot_mode, :type], :complete_value => true
|
|
|
|
scoped_search :relation => :domains, :on => :name, :rename => :domain, :complete_value => true
|
|
|
|
delegate :supports_ipam_mode?, :supported_ipam_modes, :show_mask?, to: 'self.class'
|
|
|
|
set_crud_hooks :subnet
|
|
|
|
apipie :class do
|
|
sections only: %w[all additional]
|
|
refs 'Subnet::Ipv4', 'Subnet::Ipv6'
|
|
prop_group :basic_model_props, ApplicationRecord
|
|
property :boot_mode, String, desc: 'Returns the default boot mode for interfaces assigned to this subnet, applied to hosts from provisioning templates, e.g static or DHCP'
|
|
property :cidr, Integer, desc: 'Returns the network prefix or nil in case of Invalid Error'
|
|
property :description, String, desc: 'Returns the subnet description'
|
|
property :httpboot?, one_of: [true, false], desc: 'Returns true if this subnet supports the HTTPBoot feature, false otherwise'
|
|
property :httpboot, 'SmartProxy', desc: 'Returns associated Smart Proxy with HTTPBoot feature'
|
|
property :ipam?, one_of: [true, false], desc: 'Returns true if this subnet has IPAM mode set, false otherwise'
|
|
property :ipam, String, desc: 'Returns IPAM mode set for this subnet'
|
|
property :dhcp?, one_of: [true, false], desc: 'Returns true if this subnet supports the DHCP IPAM mode, false otherwise'
|
|
property :dhcp, 'SmartProxy', desc: 'Returns associated Smart Proxy with DHCP feature'
|
|
property :dhcp_boot_mode?, one_of: [true, false], desc: 'Returns true if the subnet boot mode is DHCP, false otherwise'
|
|
property :dns?, one_of: [true, false], desc: 'Returns true if this subnet supports DNS for managing PTR records, false otherwise'
|
|
property :dns, 'SmartProxy', desc: 'Returns associated Smart Proxy with DNS for managing PTR records feature'
|
|
property :dns_primary, String, desc: 'Returns the primary DNS server address, e.g. 192.168.122.1'
|
|
property :dns_secondary, String, desc: 'Returns the secondary DNS server address'
|
|
property :dns_servers, Array, desc: 'Returns an array of the DNS servers address'
|
|
property :gateway, String, desc: 'Returns the gateway address, e.g. 192.168.122.1'
|
|
property :has_vlanid?, one_of: [true, false], desc: 'Returns true is the subnet has a VLAN ID, false otherwise'
|
|
property :mask, String, desc: 'Returns the network mask, e.g. 255.255.255.0'
|
|
property :mtu, Integer, desc: 'Returns the MTU'
|
|
property :network, String, desc: 'Returns the network address, e.g. 192.168.122.0'
|
|
property :nic_delay, Array, desc: 'Returns the delay network activity during installation, NICs attached to this subnet will be have linksleep configured in Kickstart to given amount of seconds'
|
|
property :template?, one_of: [true, false], desc: 'Returns true if this subnet supports Templates feature, false otherwise'
|
|
property :template, 'SmartProxy', desc: 'Returns associated Smart Proxy with Templates feature'
|
|
property :tftp?, one_of: [true, false], desc: 'Returns true if this subnet supports TFTP feature, false otherwise'
|
|
property :tftp, 'SmartProxy', desc: 'Returns associated Smart Proxy with TFTP feature'
|
|
property :to_label, String, desc: 'Returns the the subnet label which is a combination of name and the network address'
|
|
property :vlanid, Integer, desc: 'Returns the VLAN ID for of this subnet'
|
|
end
|
|
class Jail < ::Safemode::Jail
|
|
allow :id, :name, :network, :mask, :cidr, :title, :to_label, :gateway, :dns_primary, :dns_secondary, :dns_servers,
|
|
:vlanid, :mtu, :nic_delay, :boot_mode, :nil?, :has_vlanid?, :dhcp_boot_mode?, :description, :present?,
|
|
:dhcp, :dhcp?, :tftp, :tftp?, :dns, :dns?, :httpboot, :httpboot?, :template, :template?, :ipam, :ipam?
|
|
end
|
|
|
|
def self.network_reorder(order_string = 'network')
|
|
adapter = connection.adapter_name.downcase
|
|
if adapter.starts_with?('postgresql')
|
|
reorder(Arel.sql(order_string.sub('network', 'inet(network)')))
|
|
else
|
|
self
|
|
end
|
|
end
|
|
|
|
# Subnets are displayed in the form of their network network/network mask
|
|
def network_address
|
|
"#{network}/#{cidr}"
|
|
end
|
|
|
|
def to_label
|
|
"#{name} (#{network_address})"
|
|
end
|
|
|
|
def to_s
|
|
name
|
|
end
|
|
|
|
def network_type
|
|
SUBNET_TYPES[type.to_sym]
|
|
end
|
|
|
|
def network_type=(value)
|
|
self[:type] = SUBNET_TYPES.key(value)
|
|
end
|
|
|
|
# Indicates whether the IP is within this subnet
|
|
# [+ip+] String: IPv4 or IPv6 address
|
|
# Returns Boolean: True if if ip is in this subnet
|
|
def contains?(ip)
|
|
ipaddr.include? IPAddr.new(ip, family)
|
|
end
|
|
|
|
def ipaddr
|
|
IPAddr.new("#{network}/#{mask}", family)
|
|
rescue IPAddr::InvalidAddressError => exception
|
|
raise ::Foreman::WrappedException.new exception, N_("Invalid address for subnet '#{network}/#{mask}'")
|
|
end
|
|
|
|
def cidr
|
|
return if mask.nil?
|
|
IPAddr.new(mask).to_i.to_s(2).count("1")
|
|
rescue invalid_address_error
|
|
nil
|
|
end
|
|
|
|
def cidr=(cidr)
|
|
return if cidr.nil?
|
|
self[:mask] = IPAddr.new(in_mask, family).mask(cidr).to_s
|
|
rescue invalid_address_error
|
|
nil
|
|
end
|
|
|
|
def dhcp?
|
|
supports_ipam_mode?(:dhcp) && dhcp && dhcp.url.present?
|
|
end
|
|
|
|
def dhcp_proxy(attrs = {})
|
|
@dhcp_proxy ||= ProxyAPI::DHCP.new({:url => dhcp.url}.merge(attrs)) if dhcp?
|
|
end
|
|
|
|
def tftp?
|
|
!!(tftp && tftp.url && tftp.url.present?)
|
|
end
|
|
|
|
def tftp_proxy(attrs = {})
|
|
@tftp_proxy ||= ProxyAPI::TFTP.new({:url => tftp.url}.merge(attrs)) if tftp?
|
|
end
|
|
|
|
def httpboot?
|
|
!!(httpboot && httpboot.url && httpboot.url.present?)
|
|
end
|
|
|
|
def httpboot_proxy(attrs = {})
|
|
@httpboot_proxy ||= ProxyAPI::TFTP.new({:url => httpboot.url}.merge(attrs)) if httpboot?
|
|
end
|
|
|
|
# do we support DNS PTR records for this subnet
|
|
def dns?
|
|
!!(dns && dns.url && dns.url.present?)
|
|
end
|
|
|
|
def dns_proxy(attrs = {})
|
|
@dns_proxy ||= ProxyAPI::DNS.new({:url => dns.url}.merge(attrs)) if dns?
|
|
end
|
|
|
|
def template?
|
|
!!(template && template.url)
|
|
end
|
|
|
|
def template_proxy(attrs = {})
|
|
@template_proxy ||= ProxyAPI::Template.new({:url => template.url}.merge(attrs)) if template?
|
|
end
|
|
|
|
def bmc?
|
|
!!(bmc && bmc.url && bmc.url.present?)
|
|
end
|
|
|
|
def external_ipam?
|
|
supports_ipam_mode?(:external_ipam) && externalipam && externalipam.url.present?
|
|
end
|
|
|
|
def external_ipam_proxy(attrs = {})
|
|
@external_ipam_proxy ||= ProxyAPI::ExternalIpam.new({:url => externalipam.url}.merge(attrs)) if external_ipam?
|
|
end
|
|
|
|
def ipam?
|
|
ipam != IPAM::MODES[:none]
|
|
end
|
|
|
|
def ipam_needs_range?
|
|
ipam? && ipam != IPAM::MODES[:eui64] && ipam != IPAM::MODES[:external_ipam]
|
|
end
|
|
|
|
def ipam_needs_group?
|
|
ipam? && ipam == IPAM::MODES[:external_ipam]
|
|
end
|
|
|
|
def dhcp_boot_mode?
|
|
boot_mode == Subnet::BOOT_MODES[:dhcp]
|
|
end
|
|
|
|
def validate_against_external_ipam
|
|
return unless errors.full_messages.empty?
|
|
|
|
if ipam == IPAM::MODES[:external_ipam]
|
|
external_ipam_proxy = SmartProxy.with_features('External IPAM').first
|
|
|
|
if external_ipam_proxy.nil?
|
|
errors.add :ipam, _('There must be at least one Smart Proxy present with an External IPAM plugin installed and configured')
|
|
elsif self.external_ipam_proxy.nil?
|
|
errors.add :ipam, _('A Smart Proxy with an External IPAM feature enabled must be selected in the Proxies tab.')
|
|
elsif !subnet_exists_in_external_ipam
|
|
errors.add :network, _('Subnet not found in the configured External IPAM instance')
|
|
elsif !group_exists_in_external_ipam
|
|
errors.add :externalipam_group, _('Group not found in the configured External IPAM instance')
|
|
elsif !subnet_exists_in_group
|
|
errors.add :network, _('Subnet not found in the specified External IPAM group')
|
|
end
|
|
end
|
|
end
|
|
|
|
def subnet_exists_in_group
|
|
return true if externalipam_group.empty?
|
|
return false unless external_ipam_proxy
|
|
subnet = external_ipam_proxy.get_subnet(network_address, externalipam_group)
|
|
subnet.empty? ? false : true
|
|
end
|
|
|
|
def subnet_exists_in_external_ipam
|
|
return false unless external_ipam_proxy
|
|
subnet = external_ipam_proxy.get_subnet(network_address, externalipam_group)
|
|
subnet.empty? ? false : true
|
|
end
|
|
|
|
def group_exists_in_external_ipam
|
|
return true if externalipam_group.empty?
|
|
return false unless external_ipam_proxy
|
|
group = external_ipam_proxy.get_group(externalipam_group)
|
|
group.empty? ? false : true
|
|
end
|
|
|
|
def unused_ip(mac = nil, excluded_ips = [])
|
|
unless supported_ipam_modes.map { |m| IPAM::MODES[m] }.include?(ipam)
|
|
raise ::Foreman::Exception.new(N_("Unsupported IPAM mode for %s"), self.class.name)
|
|
end
|
|
|
|
opts = {:subnet => self, :mac => mac, :excluded_ips => excluded_ips}
|
|
IPAM.new(ipam, opts)
|
|
end
|
|
|
|
def known_ips
|
|
interfaces.reload
|
|
ips = interfaces.map(&ip_sym) + hosts.includes(:interfaces).map(&ip_sym)
|
|
ips += [gateway, dns_primary, dns_secondary].select(&:present?)
|
|
ips.compact.uniq
|
|
end
|
|
|
|
def proxies
|
|
[dhcp, tftp, dns, httpboot].compact
|
|
end
|
|
|
|
def has_vlanid?
|
|
vlanid.present?
|
|
end
|
|
|
|
# overwrite method in taxonomix, since subnet is not direct association of host anymore
|
|
def used_taxonomy_ids(type)
|
|
return [] if new_record?
|
|
Host::Base.joins(:primary_interface).where(:nics => {:subnet_id => id}).distinct.pluck(type).compact
|
|
end
|
|
|
|
def as_json(options = {})
|
|
super({:methods => [:to_label, :type]}.merge(options))
|
|
end
|
|
|
|
def dns_servers
|
|
[dns_primary, dns_secondary].select(&:present?)
|
|
end
|
|
|
|
private
|
|
|
|
def validate_ranges
|
|
if from.present? || to.present?
|
|
errors.add(:from, _("must be specified if to is defined")) if from.blank?
|
|
errors.add(:to, _("must be specified if from is defined")) if to.blank?
|
|
end
|
|
return if errors.key?(:from) || errors.key?(:to)
|
|
errors.add(:from, _("does not belong to subnet")) if from.present? && !contains?(f = IPAddr.new(from))
|
|
errors.add(:to, _("does not belong to subnet")) if to.present? && !contains?(t = IPAddr.new(to))
|
|
errors.add(:from, _("can't be bigger than to range")) if from.present? && t.present? && f > t
|
|
end
|
|
|
|
def check_if_type_changed
|
|
if type_changed?
|
|
errors.add(:type, _("can't be updated after subnet is saved"))
|
|
end
|
|
end
|
|
|
|
def normalize_addresses
|
|
IP_FIELDS.each do |f|
|
|
val = send(f)
|
|
send("#{f}=", normalize_ip(val)) if val.present?
|
|
end
|
|
self
|
|
end
|
|
|
|
def ensure_ip_addrs_valid
|
|
IP_FIELDS.each do |f|
|
|
errors.add(f, _("is invalid")) if (send(f).present? || REQUIRED_IP_FIELDS.include?(f)) && !validate_ip(send(f)) && !errors.key?(f)
|
|
end
|
|
end
|
|
|
|
class << self
|
|
def boot_modes_with_translations
|
|
BOOT_MODES.map { |_, mode_name| [_(mode_name), mode_name] }
|
|
end
|
|
|
|
def supports_ipam_mode?(mode)
|
|
supported_ipam_modes.include?(mode)
|
|
end
|
|
|
|
def supported_ipam_modes_with_translations
|
|
supported_ipam_modes.map { |mode| [_(IPAM::MODES[mode]), IPAM::MODES[mode]] }
|
|
end
|
|
|
|
# Given an IP returns the subnet that contains that IP preferring highest CIDR prefix
|
|
# [+ip+] : IPv4 or IPv6 address
|
|
# Returns : Subnet object or nil if not found
|
|
def subnet_for(ip)
|
|
return unless ip.present?
|
|
ip = IPAddr.new(ip)
|
|
Subnet.unscoped.all.select { |s| s.family == ip.family && s.contains?(ip) }.max_by(&:cidr)
|
|
end
|
|
|
|
# This casts Subnet to Subnet::Ipv4 if no type is set
|
|
def new(attributes = nil, &block)
|
|
type = attributes.with_indifferent_access.delete(:type) if attributes.is_a?(Hash)
|
|
return Subnet::Ipv4.new(attributes, &block) if self == Subnet && type.nil?
|
|
super
|
|
end
|
|
|
|
# allows to create a specific subnet class based on the network_type.
|
|
# network_type is more user friendly than the class names
|
|
def new_network_type(args)
|
|
network_type = args.delete(:network_type) || 'IPv4'
|
|
SUBNET_TYPES.each do |network_type_class, network_type_name|
|
|
return network_type_class.to_s.constantize.new(args) if network_type_name.downcase == network_type.downcase
|
|
end
|
|
raise ::Foreman::Exception.new N_("unknown network_type")
|
|
end
|
|
end
|
|
|
|
def invalid_address_error
|
|
# IPAddr::InvalidAddressError is undefined for ruby 1.9
|
|
return IPAddr::InvalidAddressError if IPAddr.const_defined?('InvalidAddressError')
|
|
ArgumentError
|
|
end
|
|
end
|