mirror of
git://git.proxmox.com/git/pve-network.git
synced 2025-04-30 11:27:11 +02:00

Deleting a subnet did not delete any created entities in Netbox. Implement deletion of a subnet by deleting all entities that are created in Netbox upon creation of a subnet. We are checking for any leftover IP assignments before deleting the prefix, so we do not accidentally delete any manually created IP assignments. This method tries to check for any possible errors before editing the entities. There is still a small window where external changes can occur that lead to errors. We are touching multiple entities here, so in case of errors users have to fix their Netbox instance manually. Signed-off-by: Stefan Hanreich <s.hanreich@proxmox.com> Tested-by: Hannes Duerr <h.duerr@proxmox.com> Link: https://lore.proxmox.com/20250310085103.30549-2-s.hanreich@proxmox.com Signed-off-by: Thomas Lamprecht <t.lamprecht@proxmox.com>
360 lines
8.3 KiB
Perl
360 lines
8.3 KiB
Perl
package PVE::Network::SDN::Ipams::NetboxPlugin;
|
|
|
|
use strict;
|
|
use warnings;
|
|
use PVE::INotify;
|
|
use PVE::Cluster;
|
|
use PVE::Tools;
|
|
|
|
use base('PVE::Network::SDN::Ipams::Plugin');
|
|
|
|
sub type {
|
|
return 'netbox';
|
|
}
|
|
|
|
sub properties {
|
|
return {
|
|
};
|
|
}
|
|
|
|
sub options {
|
|
return {
|
|
url => { optional => 0},
|
|
token => { optional => 0 },
|
|
fingerprint => { optional => 1 },
|
|
};
|
|
}
|
|
|
|
sub netbox_api_request {
|
|
my ($config, $method, $path, $params) = @_;
|
|
|
|
return PVE::Network::SDN::api_request(
|
|
$method,
|
|
"$config->{url}${path}",
|
|
[
|
|
'Content-Type' => 'application/json; charset=UTF-8',
|
|
'Authorization' => "token $config->{token}"
|
|
],
|
|
$params,
|
|
$config->{fingerprint},
|
|
);
|
|
}
|
|
|
|
# Plugin implementation
|
|
|
|
sub add_subnet {
|
|
my ($class, $plugin_config, $subnetid, $subnet, $noerr) = @_;
|
|
|
|
my $cidr = $subnet->{cidr};
|
|
my $gateway = $subnet->{gateway};
|
|
|
|
if (get_prefix_id($plugin_config, $cidr, $noerr)) {
|
|
return if $noerr;
|
|
die "prefix $cidr already exists in netbox";
|
|
}
|
|
|
|
eval {
|
|
netbox_api_request($plugin_config, "POST", "/ipam/prefixes/", {
|
|
prefix => $cidr
|
|
});
|
|
};
|
|
if ($@) {
|
|
return if $noerr;
|
|
die "error adding subnet to ipam: $@";
|
|
}
|
|
}
|
|
|
|
sub del_subnet {
|
|
my ($class, $plugin_config, $subnetid, $subnet, $noerr) = @_;
|
|
|
|
my $cidr = $subnet->{cidr};
|
|
|
|
my $internalid = get_prefix_id($plugin_config, $cidr, $noerr);
|
|
|
|
# definedness check, because ID could be 0
|
|
if (!defined($internalid)) {
|
|
warn "could not find id for ip prefix $cidr";
|
|
return;
|
|
}
|
|
|
|
if (!is_prefix_empty($plugin_config, $cidr, $noerr)) {
|
|
return if $noerr;
|
|
die "not deleting prefix $cidr because it still contains entries";
|
|
}
|
|
|
|
# last IP is assumed to be the gateway, delete it
|
|
if (!$class->del_ip($plugin_config, $subnetid, $subnet, $subnet->{gateway}, $noerr)) {
|
|
return if $noerr;
|
|
die "could not delete gateway ip from subnet $subnetid";
|
|
}
|
|
|
|
eval {
|
|
netbox_api_request($plugin_config, "DELETE", "/ipam/prefixes/$internalid/");
|
|
};
|
|
die "error deleting subnet from ipam: $@" if $@ && !$noerr;
|
|
}
|
|
|
|
sub add_ip {
|
|
my ($class, $plugin_config, $subnetid, $subnet, $ip, $hostname, $mac, $vmid, $is_gateway, $noerr) = @_;
|
|
|
|
my $mask = $subnet->{mask};
|
|
|
|
my $description = undef;
|
|
if ($is_gateway) {
|
|
$description = 'gateway'
|
|
} elsif ($mac) {
|
|
$description = "mac:$mac";
|
|
}
|
|
|
|
eval {
|
|
netbox_api_request($plugin_config, "POST", "/ipam/ip-addresses/", {
|
|
address => "$ip/$mask",
|
|
dns_name => $hostname,
|
|
description => $description,
|
|
});
|
|
};
|
|
|
|
if ($@) {
|
|
if ($is_gateway) {
|
|
die "error add subnet ip to ipam: ip $ip already exist: $@"
|
|
if !is_ip_gateway($plugin_config, $ip, $noerr);
|
|
} elsif (!$noerr) {
|
|
die "error add subnet ip to ipam: ip already exist: $@";
|
|
}
|
|
}
|
|
}
|
|
|
|
sub update_ip {
|
|
my ($class, $plugin_config, $subnetid, $subnet, $ip, $hostname, $mac, $vmid, $is_gateway, $noerr) = @_;
|
|
|
|
my $mask = $subnet->{mask};
|
|
|
|
my $description = undef;
|
|
if ($is_gateway) {
|
|
$description = 'gateway'
|
|
} elsif ($mac) {
|
|
$description = "mac:$mac";
|
|
}
|
|
|
|
my $ip_id = get_ip_id($plugin_config, $ip, $noerr);
|
|
|
|
# definedness check, because ID could be 0
|
|
if (!defined($ip_id)) {
|
|
return if $noerr;
|
|
die "could not find id for ip address $ip";
|
|
}
|
|
|
|
eval {
|
|
netbox_api_request($plugin_config, "PATCH", "/ipam/ip-addresses/$ip_id/", {
|
|
address => "$ip/$mask",
|
|
dns_name => $hostname,
|
|
description => $description,
|
|
});
|
|
};
|
|
if ($@) {
|
|
die "error update ip $ip : $@" if !$noerr;
|
|
}
|
|
}
|
|
|
|
sub add_next_freeip {
|
|
my ($class, $plugin_config, $subnetid, $subnet, $hostname, $mac, $vmid, $noerr) = @_;
|
|
|
|
my $cidr = $subnet->{cidr};
|
|
|
|
my $internalid = get_prefix_id($plugin_config, $cidr, $noerr);
|
|
|
|
# definedness check, because ID could be 0
|
|
if (!defined($internalid)) {
|
|
return if $noerr;
|
|
die "could not find id for prefix $cidr";
|
|
}
|
|
|
|
my $description = "mac:$mac" if $mac;
|
|
|
|
eval {
|
|
my $result = netbox_api_request($plugin_config, "POST", "/ipam/prefixes/$internalid/available-ips/", {
|
|
dns_name => $hostname,
|
|
description => $description,
|
|
});
|
|
|
|
my ($ip, undef) = split(/\//, $result->{address});
|
|
return $ip;
|
|
};
|
|
|
|
if ($@) {
|
|
die "can't find free ip in subnet $cidr: $@" if !$noerr;
|
|
}
|
|
}
|
|
|
|
sub add_range_next_freeip {
|
|
my ($class, $plugin_config, $subnet, $range, $data, $noerr) = @_;
|
|
|
|
my $internalid = get_iprange_id($plugin_config, $range, $noerr);
|
|
|
|
# definedness check, because ID could be 0
|
|
if (!defined($internalid)) {
|
|
return if $noerr;
|
|
die "could not find id for ip range $range->{'start-address'}:$range->{'end-address'}";
|
|
}
|
|
|
|
my $description = "mac:$data->{mac}" if $data->{mac};
|
|
|
|
eval {
|
|
my $result = netbox_api_request($plugin_config, "POST", "/ipam/ip-ranges/$internalid/available-ips/", {
|
|
dns_name => $data->{hostname},
|
|
description => $description,
|
|
});
|
|
|
|
my ($ip, undef) = split(/\//, $result->{address});
|
|
print "found ip free $ip in range $range->{'start-address'}-$range->{'end-address'}\n" if $ip;
|
|
return $ip;
|
|
};
|
|
|
|
if ($@) {
|
|
die "can't find free ip in range $range->{'start-address'}-$range->{'end-address'}: $@" if !$noerr;
|
|
}
|
|
}
|
|
|
|
sub del_ip {
|
|
my ($class, $plugin_config, $subnetid, $subnet, $ip, $noerr) = @_;
|
|
|
|
return if !$ip;
|
|
|
|
my $ip_id = get_ip_id($plugin_config, $ip, $noerr);
|
|
if (!defined($ip_id)) {
|
|
warn "could not find id for ip $ip";
|
|
return;
|
|
}
|
|
|
|
eval {
|
|
netbox_api_request($plugin_config, "DELETE", "/ipam/ip-addresses/$ip_id/");
|
|
};
|
|
if ($@) {
|
|
die "error delete ip $ip : $@" if !$noerr;
|
|
}
|
|
|
|
return 1;
|
|
}
|
|
|
|
sub get_ips_from_mac {
|
|
my ($class, $plugin_config, $mac, $zoneid, $noerr) = @_;
|
|
|
|
my $ip4 = undef;
|
|
my $ip6 = undef;
|
|
|
|
my $data = eval {
|
|
netbox_api_request($plugin_config, "GET", "/ipam/ip-addresses/?description__ic=$mac");
|
|
};
|
|
|
|
for my $ip (@{$data->{results}}) {
|
|
if ($ip->{family}->{value} == 4 && !$ip4) {
|
|
($ip4, undef) = split(/\//, $ip->{address});
|
|
}
|
|
|
|
if ($ip->{family}->{value} == 6 && !$ip6) {
|
|
($ip6, undef) = split(/\//, $ip->{address});
|
|
}
|
|
}
|
|
|
|
return ($ip4, $ip6);
|
|
}
|
|
|
|
sub verify_api {
|
|
my ($class, $plugin_config) = @_;
|
|
|
|
eval { netbox_api_request($plugin_config, "GET", "/ipam/aggregates/"); };
|
|
if ($@) {
|
|
die "Can't connect to netbox api: $@";
|
|
}
|
|
}
|
|
|
|
sub on_update_hook {
|
|
my ($class, $plugin_config) = @_;
|
|
verify_api($class, $plugin_config);
|
|
}
|
|
|
|
# helpers
|
|
sub get_prefix_id {
|
|
my ($config, $cidr, $noerr) = @_;
|
|
|
|
# we need to supply any IP inside the prefix, without supplying the mask, so
|
|
# just take the one from the cidr
|
|
my ($ip, undef) = split(/\//, $cidr);
|
|
|
|
my $result = eval { netbox_api_request($config, "GET", "/ipam/prefixes/?q=$ip") };
|
|
if ($@) {
|
|
return if $noerr;
|
|
die "could not obtain ID for prefix $cidr: $@";
|
|
}
|
|
|
|
my $data = @{$result->{results}}[0];
|
|
my $internalid = $data->{id};
|
|
return $internalid;
|
|
}
|
|
|
|
sub get_iprange_id {
|
|
my ($config, $range, $noerr) = @_;
|
|
|
|
my $result = eval {
|
|
netbox_api_request(
|
|
$config,
|
|
"GET",
|
|
"/ipam/ip-ranges/?start_address=$range->{'start-address'}&end_address=$range->{'end-address'}",
|
|
);
|
|
};
|
|
if ($@) {
|
|
return if $noerr;
|
|
die "could not obtain ID for IP range $range->{'start-address'}:$range->{'end-address'}: $@";
|
|
}
|
|
|
|
my $data = @{$result->{results}}[0];
|
|
my $internalid = $data->{id};
|
|
return $internalid;
|
|
}
|
|
|
|
sub get_ip_id {
|
|
my ($config, $ip, $noerr) = @_;
|
|
|
|
my $result = eval { netbox_api_request($config, "GET", "/ipam/ip-addresses/?q=$ip") };
|
|
if ($@) {
|
|
return if $noerr;
|
|
die "could not obtain ID for IP $ip: $@";
|
|
}
|
|
|
|
my $data = @{$result->{results}}[0];
|
|
my $ip_id = $data->{id};
|
|
return $ip_id;
|
|
}
|
|
|
|
sub is_ip_gateway {
|
|
my ($config, $ip, $noerr) = @_;
|
|
|
|
my $result = eval { netbox_api_request($config, "GET", "/ipam/ip-addresses/?q=$ip") };
|
|
if ($@) {
|
|
return if $noerr;
|
|
die "could not obtain ipam entry for address $ip: $@";
|
|
}
|
|
|
|
my $data = @{$result->{data}}[0];
|
|
my $description = $data->{description};
|
|
my $is_gateway = 1 if $description eq 'gateway';
|
|
return $is_gateway;
|
|
}
|
|
|
|
sub is_prefix_empty {
|
|
my ($config, $cidr, $noerr) = @_;
|
|
|
|
my $result = eval { netbox_api_request($config, "GET", "/ipam/ip-addresses/?parent=$cidr") };
|
|
if ($@) {
|
|
return if $noerr;
|
|
die "could not query children for prefix $cidr: $@";
|
|
}
|
|
|
|
# checking against 1, because we do not count the gateway
|
|
return scalar(@{$result->{results}}) <= 1;
|
|
}
|
|
|
|
1;
|
|
|
|
|