mirror of
git://git.proxmox.com/git/pve-network.git
synced 2025-04-30 11:27:11 +02:00

We use the IP ranges of netbox to represent the dhcp ranges. We were already querying the IP ranges for a IP when starting a guest, but we never created the IP ranges in the first place. Additionally implement deleting the IP ranges when the subnet gets deleted. These methods try to check for any possible errors before editing the entities. There is still a small window where external changes can occur that lead to errors. We are touching multiple entities here, so in case of errors users have to fix their Netbox instance manually. Signed-off-by: Stefan Hanreich <s.hanreich@proxmox.com> Tested-by: Hannes Duerr <h.duerr@proxmox.com> Link: https://lore.proxmox.com/20250310085103.30549-7-s.hanreich@proxmox.com Signed-off-by: Thomas Lamprecht <t.lamprecht@proxmox.com>
410 lines
9.6 KiB
Perl
410 lines
9.6 KiB
Perl
package PVE::Network::SDN::Ipams::NetboxPlugin;
|
|
|
|
use strict;
|
|
use warnings;
|
|
use PVE::INotify;
|
|
use PVE::Cluster;
|
|
use PVE::Tools;
|
|
|
|
use base('PVE::Network::SDN::Ipams::Plugin');
|
|
|
|
sub type {
|
|
return 'netbox';
|
|
}
|
|
|
|
sub properties {
|
|
return {
|
|
};
|
|
}
|
|
|
|
sub options {
|
|
return {
|
|
url => { optional => 0},
|
|
token => { optional => 0 },
|
|
fingerprint => { optional => 1 },
|
|
};
|
|
}
|
|
|
|
sub netbox_api_request {
|
|
my ($config, $method, $path, $params) = @_;
|
|
|
|
return PVE::Network::SDN::api_request(
|
|
$method,
|
|
"$config->{url}${path}",
|
|
[
|
|
'Content-Type' => 'application/json; charset=UTF-8',
|
|
'Authorization' => "token $config->{token}"
|
|
],
|
|
$params,
|
|
$config->{fingerprint},
|
|
);
|
|
}
|
|
|
|
sub add_dhcp_range {
|
|
my ($config, $dhcp_range, $noerr) = @_;
|
|
|
|
my $result = eval {
|
|
netbox_api_request($config, "POST", "/ipam/ip-ranges/", {
|
|
start_address => $dhcp_range->{'start-address'},
|
|
end_address => $dhcp_range->{'end-address'},
|
|
});
|
|
};
|
|
if ($@) {
|
|
return if $noerr;
|
|
die "could not create ip range $dhcp_range->{'start-address'}:$dhcp_range->{'end-address'}: $@";
|
|
}
|
|
|
|
return $result->{id};
|
|
}
|
|
|
|
sub del_dhcp_range {
|
|
my ($config, $id, $noerr) = @_;
|
|
|
|
eval {
|
|
netbox_api_request($config, "DELETE", "/ipam/ip-ranges/$id/");
|
|
};
|
|
|
|
die "could not create dhcp range: $@" if $@ && !$noerr;
|
|
}
|
|
|
|
# Plugin implementation
|
|
|
|
sub add_subnet {
|
|
my ($class, $plugin_config, $subnetid, $subnet, $noerr) = @_;
|
|
|
|
my $cidr = $subnet->{cidr};
|
|
my $gateway = $subnet->{gateway};
|
|
|
|
if (get_prefix_id($plugin_config, $cidr, $noerr)) {
|
|
return if $noerr;
|
|
die "prefix $cidr already exists in netbox";
|
|
}
|
|
|
|
eval {
|
|
netbox_api_request($plugin_config, "POST", "/ipam/prefixes/", {
|
|
prefix => $cidr
|
|
});
|
|
};
|
|
if ($@) {
|
|
return if $noerr;
|
|
die "error adding subnet to ipam: $@";
|
|
}
|
|
|
|
my $dhcp_ranges = PVE::Network::SDN::Subnets::get_dhcp_ranges($subnet);
|
|
for my $dhcp_range (@$dhcp_ranges) {
|
|
add_dhcp_range($plugin_config, $dhcp_range, $noerr);
|
|
}
|
|
}
|
|
|
|
sub del_subnet {
|
|
my ($class, $plugin_config, $subnetid, $subnet, $noerr) = @_;
|
|
|
|
my $cidr = $subnet->{cidr};
|
|
|
|
my $internalid = get_prefix_id($plugin_config, $cidr, $noerr);
|
|
|
|
# definedness check, because ID could be 0
|
|
if (!defined($internalid)) {
|
|
warn "could not find id for ip prefix $cidr";
|
|
return;
|
|
}
|
|
|
|
if (!is_prefix_empty($plugin_config, $cidr, $noerr)) {
|
|
return if $noerr;
|
|
die "not deleting prefix $cidr because it still contains entries";
|
|
}
|
|
|
|
# last IP is assumed to be the gateway, delete it
|
|
if (!$class->del_ip($plugin_config, $subnetid, $subnet, $subnet->{gateway}, $noerr)) {
|
|
return if $noerr;
|
|
die "could not delete gateway ip from subnet $subnetid";
|
|
}
|
|
|
|
my $dhcp_ranges = PVE::Network::SDN::Subnets::get_dhcp_ranges($subnet);
|
|
for my $dhcp_range (@$dhcp_ranges) {
|
|
my $internalid = get_iprange_id($plugin_config, $dhcp_range, $noerr);
|
|
|
|
# definedness check, because ID could be 0
|
|
if (!defined($internalid)) {
|
|
warn "could not find id for ip range $dhcp_range->{'start-address'}:$dhcp_range->{'end-address'}";
|
|
next;
|
|
}
|
|
|
|
del_dhcp_range($plugin_config, $internalid, $noerr);
|
|
}
|
|
|
|
eval {
|
|
netbox_api_request($plugin_config, "DELETE", "/ipam/prefixes/$internalid/");
|
|
};
|
|
die "error deleting subnet from ipam: $@" if $@ && !$noerr;
|
|
}
|
|
|
|
sub add_ip {
|
|
my ($class, $plugin_config, $subnetid, $subnet, $ip, $hostname, $mac, $vmid, $is_gateway, $noerr) = @_;
|
|
|
|
my $mask = $subnet->{mask};
|
|
|
|
my $description = undef;
|
|
if ($is_gateway) {
|
|
$description = 'gateway'
|
|
} elsif ($mac) {
|
|
$description = "mac:$mac";
|
|
}
|
|
|
|
eval {
|
|
netbox_api_request($plugin_config, "POST", "/ipam/ip-addresses/", {
|
|
address => "$ip/$mask",
|
|
dns_name => $hostname,
|
|
description => $description,
|
|
});
|
|
};
|
|
|
|
if ($@) {
|
|
if ($is_gateway) {
|
|
die "error add subnet ip to ipam: ip $ip already exist: $@"
|
|
if !is_ip_gateway($plugin_config, $ip, $noerr);
|
|
} elsif (!$noerr) {
|
|
die "error add subnet ip to ipam: ip already exist: $@";
|
|
}
|
|
}
|
|
}
|
|
|
|
sub update_ip {
|
|
my ($class, $plugin_config, $subnetid, $subnet, $ip, $hostname, $mac, $vmid, $is_gateway, $noerr) = @_;
|
|
|
|
my $mask = $subnet->{mask};
|
|
|
|
my $description = undef;
|
|
if ($is_gateway) {
|
|
$description = 'gateway'
|
|
} elsif ($mac) {
|
|
$description = "mac:$mac";
|
|
}
|
|
|
|
my $ip_id = get_ip_id($plugin_config, $ip, $noerr);
|
|
|
|
# definedness check, because ID could be 0
|
|
if (!defined($ip_id)) {
|
|
return if $noerr;
|
|
die "could not find id for ip address $ip";
|
|
}
|
|
|
|
eval {
|
|
netbox_api_request($plugin_config, "PATCH", "/ipam/ip-addresses/$ip_id/", {
|
|
address => "$ip/$mask",
|
|
dns_name => $hostname,
|
|
description => $description,
|
|
});
|
|
};
|
|
if ($@) {
|
|
die "error update ip $ip : $@" if !$noerr;
|
|
}
|
|
}
|
|
|
|
sub add_next_freeip {
|
|
my ($class, $plugin_config, $subnetid, $subnet, $hostname, $mac, $vmid, $noerr) = @_;
|
|
|
|
my $cidr = $subnet->{cidr};
|
|
|
|
my $internalid = get_prefix_id($plugin_config, $cidr, $noerr);
|
|
|
|
# definedness check, because ID could be 0
|
|
if (!defined($internalid)) {
|
|
return if $noerr;
|
|
die "could not find id for prefix $cidr";
|
|
}
|
|
|
|
my $description = undef;
|
|
$description = "mac:$mac" if $mac;
|
|
|
|
my $ip = eval {
|
|
my $result = netbox_api_request($plugin_config, "POST", "/ipam/prefixes/$internalid/available-ips/", {
|
|
dns_name => $hostname,
|
|
description => $description,
|
|
});
|
|
|
|
my ($ip, undef) = split(/\//, $result->{address});
|
|
return $ip;
|
|
};
|
|
|
|
if ($@) {
|
|
die "can't find free ip in subnet $cidr: $@" if !$noerr;
|
|
}
|
|
|
|
return $ip;
|
|
}
|
|
|
|
sub add_range_next_freeip {
|
|
my ($class, $plugin_config, $subnet, $range, $data, $noerr) = @_;
|
|
|
|
my $internalid = get_iprange_id($plugin_config, $range, $noerr);
|
|
|
|
# definedness check, because ID could be 0
|
|
if (!defined($internalid)) {
|
|
return if $noerr;
|
|
die "could not find id for ip range $range->{'start-address'}:$range->{'end-address'}";
|
|
}
|
|
|
|
my $description = undef;
|
|
$description = "mac:$data->{mac}" if $data->{mac};
|
|
|
|
my $ip = eval {
|
|
my $result = netbox_api_request($plugin_config, "POST", "/ipam/ip-ranges/$internalid/available-ips/", {
|
|
dns_name => $data->{hostname},
|
|
description => $description,
|
|
});
|
|
|
|
my ($ip, undef) = split(/\//, $result->{address});
|
|
print "found ip free $ip in range $range->{'start-address'}-$range->{'end-address'}\n" if $ip;
|
|
return $ip;
|
|
};
|
|
|
|
if ($@) {
|
|
die "can't find free ip in range $range->{'start-address'}-$range->{'end-address'}: $@" if !$noerr;
|
|
}
|
|
|
|
return $ip;
|
|
}
|
|
|
|
sub del_ip {
|
|
my ($class, $plugin_config, $subnetid, $subnet, $ip, $noerr) = @_;
|
|
|
|
return if !$ip;
|
|
|
|
my $ip_id = get_ip_id($plugin_config, $ip, $noerr);
|
|
if (!defined($ip_id)) {
|
|
warn "could not find id for ip $ip";
|
|
return;
|
|
}
|
|
|
|
eval {
|
|
netbox_api_request($plugin_config, "DELETE", "/ipam/ip-addresses/$ip_id/");
|
|
};
|
|
if ($@) {
|
|
die "error delete ip $ip : $@" if !$noerr;
|
|
}
|
|
|
|
return 1;
|
|
}
|
|
|
|
sub get_ips_from_mac {
|
|
my ($class, $plugin_config, $mac, $zoneid, $noerr) = @_;
|
|
|
|
my $ip4 = undef;
|
|
my $ip6 = undef;
|
|
|
|
my $data = eval {
|
|
netbox_api_request($plugin_config, "GET", "/ipam/ip-addresses/?description__ic=$mac");
|
|
};
|
|
if ($@) {
|
|
return if $noerr;
|
|
die "could not query ip address entry for mac $mac: $@";
|
|
}
|
|
|
|
for my $ip (@{$data->{results}}) {
|
|
if ($ip->{family}->{value} == 4 && !$ip4) {
|
|
($ip4, undef) = split(/\//, $ip->{address});
|
|
}
|
|
|
|
if ($ip->{family}->{value} == 6 && !$ip6) {
|
|
($ip6, undef) = split(/\//, $ip->{address});
|
|
}
|
|
}
|
|
|
|
return ($ip4, $ip6);
|
|
}
|
|
|
|
sub verify_api {
|
|
my ($class, $plugin_config) = @_;
|
|
|
|
eval { netbox_api_request($plugin_config, "GET", "/ipam/aggregates/"); };
|
|
if ($@) {
|
|
die "Can't connect to netbox api: $@";
|
|
}
|
|
}
|
|
|
|
sub on_update_hook {
|
|
my ($class, $plugin_config) = @_;
|
|
verify_api($class, $plugin_config);
|
|
}
|
|
|
|
# helpers
|
|
sub get_prefix_id {
|
|
my ($config, $cidr, $noerr) = @_;
|
|
|
|
# we need to supply any IP inside the prefix, without supplying the mask, so
|
|
# just take the one from the cidr
|
|
my ($ip, undef) = split(/\//, $cidr);
|
|
|
|
my $result = eval { netbox_api_request($config, "GET", "/ipam/prefixes/?q=$ip") };
|
|
if ($@) {
|
|
return if $noerr;
|
|
die "could not obtain ID for prefix $cidr: $@";
|
|
}
|
|
|
|
my $data = @{$result->{results}}[0];
|
|
return $data->{id};
|
|
}
|
|
|
|
sub get_iprange_id {
|
|
my ($config, $range, $noerr) = @_;
|
|
|
|
my $result = eval {
|
|
netbox_api_request(
|
|
$config,
|
|
"GET",
|
|
"/ipam/ip-ranges/?start_address=$range->{'start-address'}&end_address=$range->{'end-address'}",
|
|
);
|
|
};
|
|
if ($@) {
|
|
return if $noerr;
|
|
die "could not obtain ID for IP range $range->{'start-address'}:$range->{'end-address'}: $@";
|
|
}
|
|
|
|
my $data = @{$result->{results}}[0];
|
|
return $data->{id};
|
|
}
|
|
|
|
sub get_ip_id {
|
|
my ($config, $ip, $noerr) = @_;
|
|
|
|
my $result = eval { netbox_api_request($config, "GET", "/ipam/ip-addresses/?q=$ip") };
|
|
if ($@) {
|
|
return if $noerr;
|
|
die "could not obtain ID for IP $ip: $@";
|
|
}
|
|
|
|
my $data = @{$result->{results}}[0];
|
|
return $data->{id};
|
|
}
|
|
|
|
sub is_ip_gateway {
|
|
my ($config, $ip, $noerr) = @_;
|
|
|
|
my $result = eval { netbox_api_request($config, "GET", "/ipam/ip-addresses/?q=$ip") };
|
|
if ($@) {
|
|
return if $noerr;
|
|
die "could not obtain ipam entry for address $ip: $@";
|
|
}
|
|
|
|
my $data = @{$result->{data}}[0];
|
|
return $data->{description} eq 'gateway';
|
|
}
|
|
|
|
sub is_prefix_empty {
|
|
my ($config, $cidr, $noerr) = @_;
|
|
|
|
my $result = eval { netbox_api_request($config, "GET", "/ipam/ip-addresses/?parent=$cidr") };
|
|
if ($@) {
|
|
return if $noerr;
|
|
die "could not query children for prefix $cidr: $@";
|
|
}
|
|
|
|
# checking against 1, because we do not count the gateway
|
|
return scalar(@{$result->{results}}) <= 1;
|
|
}
|
|
|
|
1;
|
|
|
|
|