Skip to content
GitLab
Explore
Sign in
Primary navigation
Search or go to…
Project
GÉANT Service Orchestrator
Manage
Activity
Members
Labels
Plan
Issues
Issue boards
Milestones
Wiki
Code
Merge requests
Repository
Branches
Commits
Tags
Repository graph
Compare revisions
Snippets
Build
Pipelines
Jobs
Pipeline schedules
Artifacts
Deploy
Releases
Package Registry
Container Registry
Model registry
Operate
Environments
Terraform modules
Monitor
Incidents
Analyze
Value stream analytics
Contributor analytics
CI/CD analytics
Repository analytics
Model experiments
Help
Help
Support
GitLab documentation
Compare GitLab plans
Community forum
Contribute to GitLab
Provide feedback
Keyboard shortcuts
?
Snippets
Groups
Projects
Show more breadcrumbs
GÉANT Orchestration and Automation Team
GAP
GÉANT Service Orchestrator
Commits
f1ff089d
Commit
f1ff089d
authored
1 year ago
by
Simone Spinelli
Browse files
Options
Downloads
Patches
Plain Diff
Manually fix more conflicts
parent
73769173
No related branches found
Branches containing commit
No related tags found
Tags containing commit
1 merge request
!52
Feature/nat 212 213
Changes
1
Hide whitespace changes
Inline
Side-by-side
Showing
1 changed file
gso/services/ipam.py
+433
-882
433 additions, 882 deletions
gso/services/ipam.py
with
433 additions
and
882 deletions
gso/services/ipam.py
+
433
−
882
View file @
f1ff089d
# mypy: ignore-errors
import
ipaddress
from
enum
import
Enum
from
typing
import
Optional
,
Tuple
,
Union
import
re
from
os
import
PathLike
import
requests
from
pydantic
import
BaseSettings
from
requests.auth
import
HTTPBasicAuth
import
pytest
import
responses
from
gso
import
settings
from
gso
.services
import
ipam
class
V4ServiceNetwork
(
BaseSettings
):
v4
:
ipaddress
.
IPv4Network
@responses.activate
def
test_allocate_networks
(
data_config_filename
:
PathLike
):
responses
.
add
(
method
=
responses
.
POST
,
url
=
re
.
compile
(
r
"
.*/wapi.*/network.*
"
),
json
=
{
"
_ref
"
:
"
network/ZG5zLm5ldHdvcmskMTAuMjU1LjI1NS4yMC8zMi8w:10.255.255.20/32/default
"
,
# noqa: E501
"
network
"
:
"
10.255.255.20/32
"
,
},
)
responses
.
add
(
method
=
responses
.
POST
,
url
=
re
.
compile
(
r
"
.*/wapi.*/ipv6network.*
"
),
json
=
{
"
_ref
"
:
"
ipv6network/ZG5zLm5ldHdvcmskZGVhZDpiZWVmOjoxOC8xMjgvMA:dead%3Abeef%3A%3A18/128/default
"
,
# noqa: E501
"
network
"
:
"
dead:beef::18/128
"
,
},
)
class
V6ServiceNetwork
(
BaseSettings
):
v6
:
ipaddress
.
IPv6Network
service_networks
=
ipam
.
allocate_networks
(
service_type
=
"
TRUNK
"
)
assert
service_networks
==
ipam
.
ServiceNetworks
(
v4
=
ipaddress
.
ip_network
(
"
10.255.255.20/32
"
),
v6
=
ipaddress
.
ip_network
(
"
dead:beef::18/128
"
)
)
# should fail because this service type has networks instead of containers
with
pytest
.
raises
(
AssertionError
):
service_networks
=
ipam
.
allocate_networks
(
service_type
=
"
LO
"
)
assert
service_networks
is
None
class
ServiceNetworks
(
BaseSettings
):
v4
:
ipaddress
.
IPv4Network
v6
:
ipaddress
.
IPv6Network
@responses.activate
def
test_allocate_host
(
data_config_filename
:
PathLike
):
responses
.
add
(
method
=
responses
.
POST
,
url
=
re
.
compile
(
r
"
.*/wapi.*/record:host$
"
),
json
=
"
record:host/ZG5zLmhvc3QkLm5vbl9ETlNfaG9zdF9yb290LjAuMTY4MzcwNTU4MzY3MC5nc28udGVzdA:test.lo/%20
"
,
# noqa: E501
)
class
V4HostAddress
(
BaseSettings
):
v4
:
ipaddress
.
IPv4Address
responses
.
add
(
method
=
responses
.
GET
,
url
=
re
.
compile
(
r
"
.*/wapi.*/network.*10.255.255.*
"
),
json
=
[
{
"
_ref
"
:
"
network/ZG5zLm5ldHdvcmskMTAuMjU1LjI1NS4yMC8zMi8w:10.255.255.20/32/default
"
,
# noqa: E501
"
network
"
:
"
10.255.255.20/32
"
,
"
network_view
"
:
"
default
"
,
}
],
)
responses
.
add
(
method
=
responses
.
GET
,
url
=
re
.
compile
(
r
"
.*/wapi.*/network.*10.255.254.*
"
),
json
=
[
{
"
_ref
"
:
"
network/ZG5zLm5Gd0VHQkRQUjMzLjMwNzIuMzE1LzAyLzI:10.255.254.20/32/default
"
,
# noqa: E501
"
network
"
:
"
10.255.254.20/32
"
,
"
network_view
"
:
"
default
"
,
}
],
)
class
V6HostAddress
(
BaseSettings
):
v6
:
ipaddress
.
IPv6Address
responses
.
add
(
method
=
responses
.
GET
,
url
=
re
.
compile
(
r
"
.*/wapi.*/ipv6network.*dead.*beef.*
"
),
json
=
[
{
"
_ref
"
:
"
ipv6network/ZG5zLm5ldHdvcmskZGVhZDpiZWVmOjoxOC8xMjgvMA:dead%3Abeef%3A%3A18/128/default
"
,
# noqa: E501
"
network
"
:
"
dead:beef::18/128
"
,
"
network_view
"
:
"
default
"
,
}
],
)
responses
.
add
(
method
=
responses
.
GET
,
url
=
re
.
compile
(
r
"
.*/wapi.*/ipv6network.*beef.*dead.*
"
),
json
=
[])
class
HostAddresses
(
BaseSettings
):
v4
:
ipaddress
.
IPv4Address
v6
:
ipaddress
.
IPv6Address
responses
.
add
(
method
=
responses
.
POST
,
url
=
re
.
compile
(
r
"
.*/wapi.*/network/.*10.255.255.*?_function=next_available_ip&num=1$
"
),
# noqa: E501
json
=
{
"
ips
"
:
[
"
10.255.255.20
"
]},
)
responses
.
add
(
method
=
responses
.
POST
,
url
=
re
.
compile
(
r
"
.*/wapi.*/network/.*10.255.254.*?_function=next_available_ip&num=1$
"
),
# noqa: E501
body
=
"
Cannot find 1 available IP address(es) in this network
"
,
status
=
400
,
)
class
IPAMErrors
(
Enum
):
# HTTP error code, match in error message
CONTAINER_FULL
=
400
,
"
Can not find requested number of networks
"
NETWORK_FULL
=
400
,
"
Cannot find 1 available IP address(es) in this network
"
REQUESTS_TIMEOUT
=
20
responses
.
add
(
method
=
responses
.
POST
,
url
=
re
.
compile
(
r
"
.*/wapi.*/ipv6network/.*?_function=next_available_ip&num=1$
"
),
# noqa: E501
json
=
{
"
ips
"
:
[
"
dead:beef::18
"
]},
)
# TODO: remove this!
# lab infoblox cert isn't valid for the ipv4 address
# disable warnings for now
requests
.
packages
.
urllib3
.
disable_warnings
()
responses
.
add
(
method
=
responses
.
POST
,
url
=
re
.
compile
(
r
"
.*/wapi.*/network.*_return_fields.*
"
),
json
=
{
"
_ref
"
:
"
network/ZG5zLm5ldHdvcmskMTAuMjU1LjI1NS4yMC8zMi8w:10.255.255.20/32/default
"
,
# noqa: E501
"
network
"
:
"
10.255.255.20/32
"
,
},
)
responses
.
add
(
method
=
responses
.
POST
,
url
=
re
.
compile
(
r
"
.*/wapi.*/ipv6network.*_return_fields.*
"
),
json
=
{
"
_ref
"
:
"
ipv6network/ZG5zLm5ldHdvcmskZGVhZDpiZWVmOjoxOC8xMjgvMA:dead%3Abeef%3A%3A18/128/default
"
,
# noqa: E501
"
network
"
:
"
dead:beef::18/128
"
,
},
)
def
match_error_code
(
response
,
error_code
):
return
response
.
status_code
==
error_code
.
value
[
0
]
and
error_code
.
value
[
1
]
in
response
.
text
# test host creation by IP addresses
service_hosts
=
ipam
.
allocate_host
(
hostname
=
"
test
"
,
service_type
=
"
TRUNK
"
,
host_addresses
=
ipam
.
HostAddresses
(
v4
=
ipaddress
.
ip_address
(
"
10.255.255.20
"
),
v6
=
ipaddress
.
ip_address
(
"
dead:beef::18
"
)
),
)
assert
service_hosts
==
ipam
.
HostAddresses
(
v4
=
ipaddress
.
ip_address
(
"
10.255.255.20
"
),
v6
=
ipaddress
.
ip_address
(
"
dead:beef::18
"
)
)
# test host creation by network addresses
service_hosts
=
ipam
.
allocate_host
(
hostname
=
"
test
"
,
service_type
=
"
TRUNK
"
,
service_networks
=
ipam
.
ServiceNetworks
(
v4
=
ipaddress
.
ip_network
(
"
10.255.255.20/32
"
),
v6
=
ipaddress
.
ip_network
(
"
dead:beef::18/128
"
)
),
)
assert
service_hosts
==
ipam
.
HostAddresses
(
v4
=
ipaddress
.
ip_address
(
"
10.255.255.20
"
),
v6
=
ipaddress
.
ip_address
(
"
dead:beef::18
"
)
)
def
wapi
(
infoblox_params
:
settings
.
InfoBloxParams
):
return
f
"
https://
{
infoblox_params
.
host
}
"
f
"
/wapi/
{
infoblox_params
.
wapi_version
}
"
# test host creation by just service_type when service cfg uses networks
service_hosts
=
ipam
.
allocate_host
(
hostname
=
"
test
"
,
service_type
=
"
LO
"
)
assert
service_hosts
==
ipam
.
HostAddresses
(
v4
=
ipaddress
.
ip_address
(
"
10.255.255.20
"
),
v6
=
ipaddress
.
ip_address
(
"
dead:beef::18
"
)
)
# test host creation by just service_type when service cfg uses containers
service_hosts
=
ipam
.
allocate_host
(
hostname
=
"
test
"
,
service_type
=
"
TRUNK
"
)
assert
service_hosts
==
ipam
.
HostAddresses
(
v4
=
ipaddress
.
ip_address
(
"
10.255.255.20
"
),
v6
=
ipaddress
.
ip_address
(
"
dead:beef::18
"
)
)
def
ip_addr_version
(
addr
:
str
=
""
):
ip_version
=
None
ip_addr
=
ipaddress
.
ip_address
(
addr
)
if
isinstance
(
ip_addr
,
ipaddress
.
IPv4Address
):
ip_version
=
4
elif
isinstance
(
ip_addr
,
ipaddress
.
IPv6Address
):
ip_version
=
6
assert
ip_version
in
[
4
,
6
]
return
ip_version
def
ip_network_version
(
network
:
str
=
""
):
ip_version
=
None
ip_network
=
ipaddress
.
ip_network
(
network
)
if
isinstance
(
ip_network
,
ipaddress
.
IPv4Network
):
ip_version
=
4
elif
isinstance
(
ip_network
,
ipaddress
.
IPv6Network
):
ip_version
=
6
assert
ip_version
in
[
4
,
6
]
return
ip_version
def
assert_host_in_service
(
ipv4_addr
:
str
=
""
,
ipv6_addr
:
str
=
""
,
<<<<<<<
HEAD
oss_ipv4_containers
=
None
,
oss_ipv6_containers
=
None
,
oss_ipv4_networks
=
None
,
oss_ipv6_networks
=
None
,
=======
oss_ipv4_containers
=
None
,
oss_ipv6_containers
=
None
,
oss_ipv4_networks
=
None
,
oss_ipv6_networks
=
None
,
>>>>>>>
232046
e
(
Fix
conflicts
in
workflows
)
):
# IPv4
if
oss_ipv4_containers
:
assert
any
(
ipv4_addr
in
oss_ipv4_container
for
oss_ipv4_container
in
oss_ipv4_containers
),
"
Host
'
s IPv4 address doesn
'
t belong to service type.
"
else
:
assert
any
(
ipv4_addr
in
oss_ipv4_network
for
oss_ipv4_network
in
oss_ipv4_networks
),
"
Host
'
s IPv4 address doesn
'
t belong to service type.
"
# IPv6
if
oss_ipv6_containers
:
assert
any
(
ipv6_addr
in
oss_ipv6_container
for
oss_ipv6_container
in
oss_ipv6_containers
),
"
Host
'
s IPv6 address doesn
'
t belong to service type.
"
else
:
assert
any
(
ipv6_addr
in
oss_ipv6_network
for
oss_ipv6_network
in
oss_ipv6_networks
),
"
Host
'
s IPv6 address doesn
'
t belong to service type.
"
<<<<<<<
HEAD
def
assert_network_in_service
(
ipv4_network
:
Optional
[
V4ServiceNetwork
]
=
None
,
ipv6_network
:
Optional
[
V6ServiceNetwork
]
=
None
,
oss_ipv4_containers
=
None
,
oss_ipv6_containers
=
None
,
oss_ipv4_networks
=
None
,
oss_ipv6_networks
=
None
,
):
# IPv4
if
ipv4_network
:
if
oss_ipv4_containers
:
assert
any
(
ipv4_network
.
subnet_of
(
oss_ipv4_container
)
for
oss_ipv4_container
in
oss_ipv4_containers
),
"
Network doesn
'
t belong to service type.
"
else
:
assert
ipv4_network
in
oss_ipv4_networks
,
"
Network doesn
'
t belong to service type.
"
# IPv6
if
ipv6_network
:
if
oss_ipv6_containers
:
assert
any
(
ipv6_network
.
subnet_of
(
oss_ipv6_container
)
for
oss_ipv6_container
in
oss_ipv6_containers
),
"
Network doesn
'
t belong to service type.
"
else
:
assert
ipv6_network
in
oss_ipv6_networks
,
"
Network doesn
'
t belong to service type.
"
def
find_networks
(
network_container
:
Optional
[
str
]
=
""
,
network
:
Optional
[
str
]
=
""
,
ip_version
:
int
=
4
):
"""
Get all networks optinally filtering by a container or by a network.
Args:
----
network_container (str, optional): container to filter by
network (str, optional): network to filter by
ip_version (int): 4 or 6
Returns:
-------
(list) all found networks mathing the args, which may be empty.
=======
def find_networks(network_container: Optional[str] =
""
, network: Optional[str] =
""
, ip_version: int = 4):
"""
If
network_container
is
not
None
,
find
all
networks
within
the
specified
container
.
Otherwise
,
if
network
is
not
None
,
find
the
specified
network
.
Otherwise
find
all
networks
.
A
list
of
all
found
networks
is
returned
(
an
HTTP
200
code
may
be
returned
with
an
empty
list
).
>>>>>>>
232046
e
(
Fix
conflicts
in
workflows
)
"""
assert ip_version in [4, 6]
oss = settings.load_oss_params()
assert oss.IPAM.INFOBLOX
infoblox_params = oss.IPAM.INFOBLOX
endpoint =
"
network
"
if ip_version == 4 else
"
ipv6network
"
params = None
if network_container:
params = {
"
network_container
"
: network_container}
elif network:
params = {
"
network
"
: network,
"
_return_fields
"
:
"
comment
"
}
r = requests.get(
f
"
{wapi(infoblox_params)}/{endpoint}
"
,
params=params,
auth=HTTPBasicAuth(infoblox_params.username, infoblox_params.password),
<<<<<<< HEAD
verify=False, # noqa: S501
timeout=REQUESTS_TIMEOUT,
=======
verify=False,
timeout=REQUESTS_TIMEOUT
>>>
>>>>
232046
e
(
Fix
conflicts
in
workflows
)
)
assert
r
.
status_code
>=
200
and
r
.
status_code
<
300
,
f
"
HTTP error
{
r
.
status_code
}
:
{
r
.
reason
}
\n\n
{
r
.
text
}
"
return
r
.
json
()
def allocate_network_inner(
infoblox_params: settings.InfoBloxParams,
network_params: Union[settings.V4NetworkParams, settings.V6NetworkParams],
ip_version: int = 4,
comment: Optional[str] =
""
,
extattrs: Optional[dict] = None,
) -> Union[V4ServiceNetwork, V6ServiceNetwork]:
if extattrs is None:
extattrs = {}
assert ip_version in [4, 6]
endpoint =
"
network
"
if ip_version == 4 else
"
ipv6network
"
ip_container =
"
networkcontainer
"
if ip_version == 4 else
"
ipv6networkcontainer
"
assert network_params.containers, (
"
No containers available to allocate networks for this service.
"
"
Maybe you want to allocate a host from a network directly?
"
)
# only return in the response the allocated network, not all available
# TODO: any validation needed for extrattrs wherever it
'
s used?
req_payload = {
"
network
"
: {
"
_object_function
"
:
"
next_available_network
"
,
"
_parameters
"
: {
"
cidr
"
: network_params.mask},
"
_object
"
: ip_container,
"
_object_parameters
"
: {
"
network
"
: str(network_params.containers[0])},
"
_result_field
"
:
"
networks
"
,
},
"
comment
"
: comment,
"
extattrs
"
: extattrs,
}
container_index = 0
while True:
r = requests.post(
f
"
{wapi(infoblox_params)}/{endpoint}
"
,
params={
"
_return_fields
"
:
"
network
"
},
json=req_payload,
auth=HTTPBasicAuth(infoblox_params.username, infoblox_params.password),
headers={
"
content-type
"
:
"
application/json
"
},
<<<<<<< HEAD
verify=False, # noqa: S501
timeout=REQUESTS_TIMEOUT,
=======
verify=False,
timeout=REQUESTS_TIMEOUT
>>>
>>>>
232046
e
(
Fix
conflicts
in
workflows
)
# test host creation that should return a no available IP error
with
pytest
.
raises
(
AssertionError
):
service_hosts
=
ipam
.
allocate_host
(
hostname
=
"
test
"
,
service_type
=
"
TRUNK
"
,
service_networks
=
ipam
.
ServiceNetworks
(
v4
=
ipaddress
.
ip_network
(
"
10.255.254.20/32
"
),
v6
=
ipaddress
.
ip_network
(
"
dead:beef::18/128
"
)
),
)
if
not
match_error_code
(
response
=
r
,
error_code
=
IPAMErrors
.
CONTAINER_FULL
):
break
# Container full: try with next valid container for service (if any)
container_index
+=
1
if
len
(
network_params
.
containers
)
<
(
container_index
+
1
):
break
req_payload
[
"
network
"
][
"
_object_parameters
"
][
"
network
"
]
=
str
(
network_params
.
containers
[
container_index
])
assert r.status_code >= 200 and r.status_code < 300, f
"
HTTP error {r.status_code}: {r.reason}
\n\n
{r.text}
"
assert
"
network
"
in r.json()
allocated_network = r.json()[
"
network
"
]
if ip_version == 4:
return V4ServiceNetwork(v4=ipaddress.ip_network(allocated_network))
return V6ServiceNetwork(v6=ipaddress.ip_network(allocated_network))
<<<<<<< HEAD
def allocate_ipv4_network(
service_type: str =
""
, comment: Optional[str] =
""
, extattrs: Optional[dict] = None
) -> V4ServiceNetwork:
"""
Allocate
IPv4
network
within
the
container
of
the
specified
service
type
.
Args
:
----
service_type
(
str
):
the
name
of
the
service
type
(
e
.
g
.
"
TRUNK
"
)
comment
(
str
,
optional
):
a
custom
comment
to
write
in
the
comment
field
in
IPAM
extattrs
(
dict
,
optional
):
any
extensible
attributes
to
add
in
IPAM
(
e
.
g
.
"
Site
"
:
{
"
value
"
:
"
dummy
"
})
Returns
:
-------
(
V4ServiceNetwork
):
the
allocated
network
"""
=======
def allocate_ipv4_network(service_type: str =
""
, comment: Optional[str] =
""
, extattrs: Optional[dict] = None) -> V4ServiceNetwork:
"""
Allocate
IPv4
network
within
the
container
of
the
specified
service
type
.
"""
>>>
>>>>
232046
e
(
Fix
conflicts
in
workflows
)
if
extattrs
is
None
:
extattrs
=
{}
oss
=
settings
.
load_oss_params
()
assert
oss
.
IPAM
ipam_params
=
oss
.
IPAM
assert
hasattr
(
ipam_params
,
service_type
)
and
service_type
!=
"
INFOBLOX
"
,
"
Invalid service type.
"
return
allocate_network_inner
(
ipam_params
.
INFOBLOX
,
getattr
(
ipam_params
,
service_type
).
V4
,
4
,
comment
,
extattrs
)
<<<<<<< HEAD
def allocate_ipv6_network(
service_type: str =
""
, comment: Optional[str] =
""
, extattrs: Optional[dict] = None
) -> V6ServiceNetwork:
"""
Allocate
IPv6
network
within
the
container
of
the
specified
service
type
.
Args
:
----
service_type
(
str
):
the
name
of
the
service
type
(
e
.
g
.
"
TRUNK
"
)
comment
(
str
,
optional
):
a
custom
comment
to
write
in
the
comment
field
in
IPAM
extattrs
(
dict
,
optional
):
any
extensible
attributes
to
add
in
IPAM
(
e
.
g
.
"
Site
"
:
{
"
value
"
:
"
dummy
"
})
Returns
:
-------
(
V4ServiceNetwork
):
the
allocated
network
"""
=======
def allocate_ipv6_network(service_type: str =
""
, comment: Optional[str] =
""
, extattrs: Optional[dict] = None) -> V6ServiceNetwork:
"""
Allocate
IPv6
network
within
the
container
of
the
specified
service
type
.
"""
>>>
>>>>
232046
e
(
Fix
conflicts
in
workflows
)
if
extattrs
is
None
:
extattrs
=
{}
oss
=
settings
.
load_oss_params
()
assert
oss
.
IPAM
ipam_params
=
oss
.
IPAM
assert
hasattr
(
ipam_params
,
service_type
)
and
service_type
!=
"
INFOBLOX
"
,
"
Invalid service type.
"
return
allocate_network_inner
(
ipam_params
.
INFOBLOX
,
getattr
(
ipam_params
,
service_type
).
V6
,
6
,
comment
,
extattrs
)
def allocate_networks(
<<<<<<< HEAD
service_type: str =
""
, comment: Optional[str] =
""
, extattrs: Optional[dict] = None
=======
service_type: str =
""
,
comment: Optional[str] =
""
,
extattrs: Optional[dict] = None
>>>
>>>>
232046
e
(
Fix
conflicts
in
workflows
)
)
->
ServiceNetworks
:
"""
Allocate
IPv4
and
IPv6
network
for
the
specified
service
type
.
"""
if extattrs is None:
extattrs = {}
<<<<<<< HEAD
v4_service_network = allocate_ipv4_network(service_type=service_type, comment=comment, extattrs=extattrs)
v6_service_network = allocate_ipv6_network(service_type=service_type, comment=comment, extattrs=extattrs)
=======
v4_service_network = allocate_ipv4_network(
service_type=service_type, comment=comment, extattrs=extattrs
)
v6_service_network = allocate_ipv6_network(
service_type=service_type, comment=comment, extattrs=extattrs
)
>>>
>>>>
232046
e
(
Fix
conflicts
in
workflows
)
return
ServiceNetworks
(
v4
=
v4_service_network
.
v4
,
v6
=
v6_service_network
.
v6
)
def find_next_available_ip(infoblox_params, network_ref: str =
""
):
"""
Find
the
next
available
IP
address
from
a
network
given
its
ref
.
Args
:
----
infoblox_params
(
settings
.
InfoBloxParams
):
infoblox
params
network_ref
(
str
):
the
network
to
find
the
next
available
IP
,
in
InfoBlox
reference
format
Returns
:
-------
(
str
):
next
available
IP
in
the
network
,
or
"
NETWORK_FULL
"
if
there
'
s no space in the network
"""
r = requests.post(
f
"
{wapi(infoblox_params)}/{network_ref}?_function=next_available_ip&num=1
"
,
auth=HTTPBasicAuth(infoblox_params.username, infoblox_params.password),
<<<<<<< HEAD
verify=False, # noqa: S501
timeout=REQUESTS_TIMEOUT,
=======
verify=False,
timeout=REQUESTS_TIMEOUT
>>>
>>>>
232046
e
(
Fix
conflicts
in
workflows
)
)
if match_error_code(response=r, error_code=IPAMErrors.NETWORK_FULL):
return
"
NETWORK_FULL
"
assert r.status_code >= 200 and r.status_code < 300, f
"
HTTP error {r.status_code}: {r.reason}
\n\n
{r.text}
"
assert
"
ips
"
in r.json()
received_ip = r.json()[
"
ips
"
]
assert len(received_ip) == 1
return received_ip[0]
<<<<<<< HEAD
def allocate_host_inner( # noqa: C901
=======
def allocate_host_inner(
>>>
>>>>
232046
e
(
Fix
conflicts
in
workflows
)
hostname
:
str
=
""
,
addrs
:
Optional
[
Tuple
]
=
None
,
networks
:
Optional
[
Tuple
]
=
None
,
cname_aliases
:
Optional
[
list
]
=
None
,
dns_view
:
Optional
[
str
]
=
"
default
"
,
<<<<<<<
HEAD
extattrs
:
Optional
[
dict
]
=
None
,
=======
extattrs
:
Optional
[
dict
]
=
None
>>>>>>>
232046
e
(
Fix
conflicts
in
workflows
)
)
->
Union
[
HostAddresses
,
str
]:
# TODO: should hostnames be unique
<<<<<<<
HEAD
# (fail if hostname already exists in this domain/service)?
=======
# (i.e. fail if hostname already exists in this domain/service)?
>>>>>>>
232046
e
(
Fix
conflicts
in
workflows
)
if
cname_aliases
is
None
:
cname_aliases
=
[]
if
extattrs
is
None
:
extattrs
=
{}
<<<<<<<
HEAD
assert
addrs
or
networks
,
"
Neither networks nor host addresses could be derived to allocate host.
"
=======
assert
addrs
or
networks
,
"
You must specify either the host addresses or the networks CIDR.
"
>>>>>>>
232046
e
(
Fix
conflicts
in
workflows
)
oss
=
settings
.
load_oss_params
()
assert
oss
.
IPAM
.
INFOBLOX
infoblox_params
=
oss
.
IPAM
.
INFOBLOX
# If networks isn
'
t
None
,
allocate
host
in
those
networks
.
if
networks
:
ipv4_network
=
networks
[
0
]
ipv6_network
=
networks
[
1
]
assert
ip_network_version
(
ipv4_network
)
==
4
assert
ip_network_version
(
ipv6_network
)
==
6
# Find the next available IP address in each network
# If requested error doesn't exist, return error
network_info
=
find_networks
(
network
=
ipv4_network
,
ip_version
=
4
)
if
len
(
network_info
)
!=
1
:
return
"
IPV4_NETWORK_NOT_FOUND
"
assert
"
_ref
"
in
network_info
[
0
]
ipv4_addr
=
find_next_available_ip
(
infoblox_params
,
network_info
[
0
][
"
_ref
"
])
network_info
=
find_networks
(
network
=
ipv6_network
,
ip_version
=
6
)
if
len
(
network_info
)
!=
1
:
return
"
IPV6_NETWORK_NOT_FOUND
"
assert
"
_ref
"
in
network_info
[
0
]
ipv6_addr
=
find_next_available_ip
(
infoblox_params
,
network_info
[
0
][
"
_ref
"
])
# If couldn't find next available IPs, return error
if
ipv4_addr
==
"
NETWORK_FULL
"
or
ipv6_addr
==
"
NETWORK_FULL
"
:
if
ipv4_addr
==
"
NETWORK_FULL
"
:
return
"
IPV4_NETWORK_FULL
"
if
ipv6_addr
==
"
NETWORK_FULL
"
:
return
"
IPV6_NETWORK_FULL
"
# Otherwise if addrs isn't None, allocate host with those addresses.
else
:
ipv4_addr
=
addrs
[
0
]
ipv6_addr
=
addrs
[
1
]
assert
ip_addr_version
(
ipv4_addr
)
==
4
assert
ip_addr_version
(
ipv6_addr
)
==
6
# hostname parameter must be full name including domain name.
req_payload
=
{
"
ipv4addrs
"
:
[{
"
ipv4addr
"
:
ipv4_addr
}],
"
ipv6addrs
"
:
[{
"
ipv6addr
"
:
ipv6_addr
}],
"
name
"
:
hostname
,
"
configure_for_dns
"
:
True
,
"
view
"
:
dns_view
,
"
extattrs
"
:
extattrs
,
}
r
=
requests
.
post
(
f
"
{
wapi
(
infoblox_params
)
}
/record:host
"
,
json
=
req_payload
,
auth
=
HTTPBasicAuth
(
infoblox_params
.
username
,
infoblox_params
.
password
),
<<<<<<<
HEAD
verify
=
False
,
# noqa: S501
timeout
=
REQUESTS_TIMEOUT
,
=======
verify
=
False
,
timeout
=
REQUESTS_TIMEOUT
>>>>>>>
232046
e
(
Fix
conflicts
in
workflows
)
)
assert
r
.
status_code
>=
200
and
r
.
status_code
<
300
,
f
"
HTTP error
{
r
.
status_code
}
:
{
r
.
reason
}
\n\n
{
r
.
text
}
"
assert
isinstance
(
r
.
json
(),
str
)
assert
r
.
json
().
startswith
(
"
record:host/
"
)
if
cname_aliases
:
cname_req_payload
=
{
"
name
"
:
""
,
"
canonical
"
:
hostname
,
"
view
"
:
dns_view
,
"
extattrs
"
:
extattrs
}
for
alias
in
cname_aliases
:
cname_req_payload
[
"
name
"
]
=
alias
r
=
requests
.
post
(
f
"
{
wapi
(
infoblox_params
)
}
/record:cname
"
,
json
=
cname_req_payload
,
auth
=
HTTPBasicAuth
(
infoblox_params
.
username
,
infoblox_params
.
password
),
<<<<<<<
HEAD
verify
=
False
,
# noqa: S501
timeout
=
REQUESTS_TIMEOUT
,
=======
verify
=
False
,
timeout
=
REQUESTS_TIMEOUT
>>>>>>>
232046
e
(
Fix
conflicts
in
workflows
)
)
assert
r
.
status_code
>=
200
and
r
.
status_code
<
300
,
f
"
HTTP error
{
r
.
status_code
}
:
{
r
.
reason
}
\n\n
{
r
.
text
}
"
assert
r
.
json
().
startswith
(
"
record:cname/
"
)
return
HostAddresses
(
v4
=
ipaddress
.
ip_address
(
ipv4_addr
),
v6
=
ipaddress
.
ip_address
(
ipv6_addr
))
<<<<<<<
HEAD
def
allocate_host
(
# noqa: C901
hostname
:
str
=
""
,
service_type
:
str
=
""
,
service_networks
:
Optional
[
ServiceNetworks
]
=
None
,
host_addresses
:
Optional
[
HostAddresses
]
=
None
,
=======
def
allocate_host
(
hostname
:
str
=
""
,
service_type
:
str
=
""
,
service_networks
:
Optional
[
ServiceNetworks
]
=
None
,
host_addresses
:
Optional
[
ServiceNetworks
]
=
None
,
>>>>>>>
232046
e
(
Fix
conflicts
in
workflows
)
cname_aliases
:
Optional
[
list
]
=
None
,
extattrs
:
Optional
[
dict
]
=
None
,
)
->
HostAddresses
:
"""
Allocate host record with both IPv4 and IPv6 address, and respective DNS A and AAAA records.
Args:
----
hostname (str): hostname of the host (without domain name, which is taken from the service type)
service_type (str): the name of the service type (e.g.
"
TRUNK
"
)
service_networks (ServiceNetworks, optional): ipv4 and ipv6 network to allocate host
host_addresses (HostAddresses, optional): ipv4 and ipv6 addresses to allocate host (service_networks has precedence)
cname_aliases (list, optional): to create CNAME records in addition to the host record
extattrs (dict, optional): any extensible attributes to add in IPAM (e.g.
"
Site
"
: {
"
value
"
:
"
dummy
"
})
Returns:
-------
(HostAddresses): ipv4 and ipv6 addresses of the allocated host
"""
if
cname_aliases
is
None
:
cname_aliases
=
[]
if
extattrs
is
None
:
extattrs
=
{}
oss
=
settings
.
load_oss_params
()
assert
oss
.
IPAM
ipam_params
=
oss
.
IPAM
assert
hasattr
(
ipam_params
,
service_type
)
and
service_type
!=
"
INFOBLOX
"
,
"
Invalid service type.
"
oss_ipv4_containers
=
getattr
(
ipam_params
,
service_type
).
V4
.
containers
oss_ipv6_containers
=
getattr
(
ipam_params
,
service_type
).
V6
.
containers
oss_ipv4_networks
=
getattr
(
ipam_params
,
service_type
).
V4
.
networks
oss_ipv6_networks
=
getattr
(
ipam_params
,
service_type
).
V6
.
networks
domain_name
=
getattr
(
ipam_params
,
service_type
).
domain_name
dns_view
=
getattr
(
ipam_params
,
service_type
).
dns_view
assert
(
oss_ipv4_containers
and
oss_ipv6_containers
)
or
(
oss_ipv4_networks
and
oss_ipv6_networks
),
"
This service is missing either containers or networks configuration.
"
assert
domain_name
,
"
This service is missing domain_name configuration.
"
assert
dns_view
,
"
This service is missing dns_view configuration.
"
if
cname_aliases
:
cname_aliases
=
[
alias
+
domain_name
for
alias
in
cname_aliases
]
# When neither service_networks not host_addresses are provided:
# If service has configured containers, new ipv4 and ipv6 networks are created and those are used.
# Note that in this case extattrs is for the hosts and not for the networks.
# If service doesn't have configured containers and has configured networks instead, the configured
# networks are used (they are filled up in order of appearance in the configuration file).
if
not
service_networks
and
not
host_addresses
:
if
oss_ipv4_containers
and
oss_ipv6_containers
:
# This service has configured containers.
# Use them to allocate new networks that can allocate the hosts.
# IPv4
ipv4_network
=
str
(
allocate_ipv4_network
(
service_type
=
service_type
).
v4
)
assert
ipv4_network
,
"
No available space for IPv4 networks for this service type.
"
# IPv6
ipv6_network
=
str
(
allocate_ipv6_network
(
service_type
=
service_type
).
v6
)
assert
ipv6_network
,
"
No available space for IPv6 networks for this service type.
"
elif
oss_ipv4_networks
and
oss_ipv6_networks
:
# This service has configured networks.
# Allocate a host inside an ipv4 and ipv6 network from among them.
ipv4_network
=
str
(
oss_ipv4_networks
[
0
])
ipv6_network
=
str
(
oss_ipv6_networks
[
0
])
ipv4_network_index
=
0
ipv6_network_index
=
0
while
True
:
network_tuple
=
(
ipv4_network
,
ipv6_network
)
host
=
allocate_host_inner
(
hostname
=
hostname
+
domain_name
,
networks
=
network_tuple
,
cname_aliases
=
cname_aliases
,
dns_view
=
dns_view
,
extattrs
=
extattrs
,
)
if
"
NETWORK_FULL
"
not
in
host
and
"
NETWORK_NOT_FOUND
"
not
in
host
:
break
if
"
IPV4
"
in
host
:
ipv4_network_index
+=
1
assert
oss_ipv4_networks
,
"
No available space in any IPv4 network for this service.
"
assert
ipv4_network_index
<
len
(
oss_ipv4_networks
),
"
No available space in any IPv4 network for this service.
"
ipv4_network
=
str
(
oss_ipv4_networks
[
ipv4_network_index
])
else
:
# "IPV6" in host
ipv6_network_index
+=
1
assert
oss_ipv6_networks
,
"
No available space in any IPv6 network for this service.
"
assert
ipv6_network_index
<
len
(
oss_ipv6_networks
),
"
No available space in any IPv6 network for this service.
"
ipv6_network
=
str
(
oss_ipv6_networks
[
ipv6_network_index
])
elif
service_networks
:
ipv4_network
=
service_networks
.
v4
ipv6_network
=
service_networks
.
v6
assert_network_in_service
(
ipv4_network
,
ipv6_network
,
oss_ipv4_containers
,
oss_ipv6_containers
,
oss_ipv4_networks
,
oss_ipv6_networks
assert
service_hosts
is
None
# test host creation that should return a network not exist error
with
pytest
.
raises
(
AssertionError
):
service_hosts
=
ipam
.
allocate_host
(
hostname
=
"
test
"
,
service_type
=
"
TRUNK
"
,
service_networks
=
ipam
.
ServiceNetworks
(
v4
=
ipaddress
.
ip_network
(
"
10.255.255.20/32
"
),
v6
=
ipaddress
.
ip_network
(
"
beef:dead::18/128
"
)
),
)
assert
service_hosts
is
None
@responses.activate
def
test_delete_network
(
data_config_filename
:
PathLike
):
responses
.
add
(
method
=
responses
.
GET
,
url
=
re
.
compile
(
r
"
.*/wapi.*/network.*10.255.255.0.*
"
),
json
=
[
{
"
_ref
"
:
"
network/ZG5zLm5ldHdvcmskMTAuMjU1LjI1NS4yMC8zMi8w:10.255.255.0/26/default
"
,
# noqa: E501
"
network
"
:
"
10.255.255.0/26
"
,
"
network_view
"
:
"
default
"
,
}
],
)
responses
.
add
(
method
=
responses
.
GET
,
url
=
re
.
compile
(
r
"
.*/wapi.*/network.*10.255.255.20.*
"
),
json
=
[
{
"
_ref
"
:
"
network/ZG5zLm5Gd0VHQkRQUjMzLjMwNzIuMzE1LzAyLzI:100.255.255.20/32/default
"
,
# noqa: E501
"
network
"
:
"
100.255.255.20/32
"
,
"
network_view
"
:
"
default
"
,
}
],
)
responses
.
add
(
method
=
responses
.
GET
,
url
=
re
.
compile
(
r
"
.*/wapi.*/ipv6network.*dead.*beef.*
"
),
json
=
[
{
"
_ref
"
:
"
ipv6network/ZG5zLm5ldHdvcmskZGVhZDpiZWVmOjoxOC8xMjgvMA:dead%3Abeef%3A%3A18/128/default
"
,
# noqa: E501
"
network
"
:
"
dead:beef::18/128
"
,
"
network_view
"
:
"
default
"
,
}
],
)
responses
.
add
(
method
=
responses
.
GET
,
url
=
re
.
compile
(
r
"
.*/wapi.*/ipv6network.*beef.*dead.*
"
),
json
=
[
{
"
_ref
"
:
"
ipv6network/ZG5zLm5ldHdvcmskZGVhZDpiZWVmOjoxOC8xMjgvMA:beef%3Adead%3A%3A18/128/default
"
,
# noqa: E501
"
network
"
:
"
beef:dead::18/128
"
,
"
network_view
"
:
"
default
"
,
}
],
)
responses
.
add
(
method
=
responses
.
DELETE
,
url
=
re
.
compile
(
r
"
.*/wapi.*/network.*10.255.255.0.*
"
),
body
=
"
network/ZG5zLm5ldHdvcmskMTAuMjU1LjI1NS4yMC8zMi8w:10.255.255.0/26/default
"
,
# noqa: E501
)
responses
.
add
(
method
=
responses
.
DELETE
,
url
=
re
.
compile
(
r
"
.*/wapi.*/network.*100.255.255.*
"
),
body
=
"
network/ZG5zLm5Gd0VHQkRQUjMzLjMwNzIuMzE1LzAyLzI:100.255.255.20/32/default
"
,
# noqa: E501
)
responses
.
add
(
method
=
responses
.
DELETE
,
url
=
re
.
compile
(
r
"
.*/wapi.*/ipv6network.*dead.*beef.*
"
),
body
=
"
ipv6network/ZG5zLm5ldHdvcmskZGVhZDpiZWVmOjoxOC8xMjgvMA:dead%3Abeef%3A%3A18/128/default
"
,
# noqa: E501
)
responses
.
add
(
method
=
responses
.
DELETE
,
url
=
re
.
compile
(
r
"
.*/wapi.*/ipv6network.*beef.*dead.*
"
),
body
=
"
ipv6network/ZG5zLm5ldHdvcmskZGVhZDpiZWVmOjoxOC8xMjgvMA:beef%3Adead%3A%3A18/128/default
"
,
# noqa: E501
)
service_network
=
ipam
.
delete_network
(
network
=
ipaddress
.
ip_network
(
"
10.255.255.0/26
"
),
service_type
=
"
LO
"
)
assert
service_network
==
ipam
.
V4ServiceNetwork
(
v4
=
ipaddress
.
ip_network
(
"
10.255.255.0/26
"
))
with
pytest
.
raises
(
AssertionError
):
service_network
=
ipam
.
delete_network
(
network
=
ipaddress
.
ip_network
(
"
10.255.255.20/32
"
),
service_type
=
"
LO
"
)
assert
service_network
is
None
service_network
=
ipam
.
delete_network
(
network
=
ipaddress
.
ip_network
(
"
dead:beef::18/128
"
),
service_type
=
"
TRUNK
"
)
assert
service_network
==
ipam
.
V6ServiceNetwork
(
v6
=
ipaddress
.
ip_network
(
"
dead:beef::18/128
"
))
with
pytest
.
raises
(
AssertionError
):
service_network
=
ipam
.
delete_network
(
network
=
ipaddress
.
ip_network
(
"
beef:dead::18/128
"
),
service_type
=
"
TRUNK
"
)
assert
service_network
is
None
@responses.activate
def
test_delete_host
(
data_config_filename
:
PathLike
):
responses
.
add
(
method
=
responses
.
GET
,
url
=
re
.
compile
(
r
"
.*/wapi.*record:host.*
"
),
json
=
[
{
"
_ref
"
:
"
record:host/ZG5zLmhvc3QkLl9kZWZhdWx0Lmdzby5oYV9sbw:ha_lo.gso/default
"
,
# noqa: E501
"
ipv4addrs
"
:
[
{
"
_ref
"
:
"
record:host_ipv4addr/ZG5zLmhvc3RfYWRkcmVzcyQuX2RlZmF1bHQuZ3NvLmhhX2xvLjEwLjI1NS4yNTUuMS40.255.255.1/ha_lo.gso/default
"
,
# noqa: E501
"
configure_for_dhcp
"
:
False
,
"
host
"
:
"
ha_lo.gso
"
,
"
ipv4addr
"
:
"
10.255.255.1
"
,
}
],
"
ipv6addrs
"
:
[
{
"
_ref
"
:
"
record:host_ipv6addr/ZG5zLmhvc3RfYWRkcmVzcyQuX2RlZmF1bHQuZvLmhhX2xvLmRlYWQ6YmVlZjo6MS4:dead%3Abeef%3A%3A1/ha_lo.gso/default
"
,
# noqa: E501
"
configure_for_dhcp
"
:
False
,
"
host
"
:
"
ha_lo.gso
"
,
"
ipv6addr
"
:
"
dead:beef::1
"
,
}
],
"
name
"
:
"
ha_lo.gso
"
,
"
view
"
:
"
default
"
,
}
],
)
responses
.
add
(
method
=
responses
.
GET
,
url
=
re
.
compile
(
r
"
.*/wapi.*record:cname.*
"
),
json
=
[
{
"
_ref
"
:
"
record:cname/ZG5zLmJpbmRfY25hbWUkLl9kZWZhdWx0Lmdzby5oYS5hbGlhczE:alias1.ha.gso/default
"
,
# noqa: E501
"
canonical
"
:
"
hA_LO.lo
"
,
"
name
"
:
"
alias1.ha.lo
"
,
"
view
"
:
"
default
"
,
},
{
"
_ref
"
:
"
record:cname/5zLmJpbmRfY25hbWUkLl9kZWZhdWx0Lmdzby5oYS5hbGlhczI:alias2.ha.gso/default
"
,
# noqa: E501
"
canonical
"
:
"
hA_LO.lo
"
,
"
name
"
:
"
alias2.ha.lo
"
,
"
view
"
:
"
default
"
,
},
],
)
responses
.
add
(
method
=
responses
.
DELETE
,
url
=
re
.
compile
(
r
"
.*/wapi.*record:host.*
"
),
body
=
"
record:host/ZG5zLmhvc3QkLl9kZWZhdWx0Lmdzby5oYl9sbw:hb_lo.gso/default
"
,
# noqa: E501
)
responses
.
add
(
method
=
responses
.
DELETE
,
url
=
re
.
compile
(
r
"
.*/wapi.*record:cname.*
"
),
body
=
"
record:cname/ZG5zLmJpbmRfY25hbWUkLl9kZWZhdWx0Lmdzby5oYi5hbGlhczE:alias1.hb.gso/default
"
,
# noqa: E501
)
input_host_addresses
=
ipam
.
HostAddresses
(
v4
=
ipaddress
.
ip_address
(
"
10.255.255.1
"
),
v6
=
ipaddress
.
ip_address
(
"
dead:beef::1
"
)
)
host_addresses
=
ipam
.
delete_host
(
hostname
=
"
ha_lo
"
,
host_addresses
=
input_host_addresses
,
cname_aliases
=
[
"
alias1.ha
"
,
"
alias2.ha
"
],
service_type
=
"
LO
"
,
)
assert
host_addresses
==
ipam
.
HostAddresses
(
v4
=
ipaddress
.
ip_address
(
"
10.255.255.1
"
),
v6
=
ipaddress
.
ip_address
(
"
dead:beef::1
"
)
)
host
=
allocate_host_inner
(
hostname
=
hostname
+
domain_name
,
networks
=
(
str
(
ipv4_network
),
str
(
ipv6_network
)),
cname_aliases
=
cname_aliases
,
dns_view
=
dns_view
,
extattrs
=
extattrs
,
# Fail because missing CNAME
with
pytest
.
raises
(
AssertionError
):
host_addresses
=
ipam
.
delete_host
(
hostname
=
"
ha_lo
"
,
host_addresses
=
input_host_addresses
,
cname_aliases
=
[
"
alias1.ha
"
],
service_type
=
"
LO
"
)
assert
"
NETWORK_FULL
"
not
in
host
,
"
Network is full.
"
assert
"
NETWORK_NOT_FOUND
"
not
in
host
,
"
Network does not exist in IPAM. Create it first.
"
elif
host_addresses
:
ipv4_addr
=
host_addresses
.
v4
ipv6_addr
=
host_addresses
.
v6
assert_host_in_service
(
ipv4_addr
,
ipv6_addr
,
oss_ipv4_containers
,
oss_ipv6_containers
,
oss_ipv4_networks
,
oss_ipv6_networks
assert
host_addresses
is
None
# Fail because non-matching CNAME
with
pytest
.
raises
(
AssertionError
):
host_addresses
=
ipam
.
delete_host
(
hostname
=
"
ha_lo
"
,
host_addresses
=
input_host_addresses
,
cname_aliases
=
[
"
alias1.ha
"
,
"
alias2.ha
"
,
"
alias3.ha
"
],
service_type
=
"
LO
"
,
)
assert
host_addresses
is
None
@responses.activate
def
test_validate_network
(
data_config_filename
:
PathLike
):
responses
.
add
(
method
=
responses
.
GET
,
url
=
re
.
compile
(
r
"
.*/wapi.*/network.*10.255.255.0.*
"
),
json
=
[
{
"
_ref
"
:
"
network/ZG5zLm5ldHdvcmskMTAuMjU1LjI1NS4yMC8zMi8w:10.255.255.0/26/default
"
,
# noqa: E501
"
network
"
:
"
10.255.255.0/26
"
,
"
network_view
"
:
"
default
"
,
"
comment
"
:
"
the subscription id is 0123456789abcdef
"
,
}
],
)
host
=
allocate_host_inner
(
hostname
=
hostname
+
domain_name
,
addrs
=
(
str
(
ipv4_addr
),
str
(
ipv6_addr
)),
cname_aliases
=
cname_aliases
,
dns_view
=
dns_view
,
extattrs
=
extattrs
,
)
assert
"
NETWORK_FULL
"
not
in
host
return
host
def
delete_network
(
<<<<<<<
HEAD
network
:
ipaddress
.
ip_network
=
None
,
service_type
:
str
=
""
=======
network
:
Union
[
V4ServiceNetwork
,
V6ServiceNetwork
]
=
None
,
service_type
:
str
=
""
>>>>>>>
232046
e
(
Fix
conflicts
in
workflows
)
)
->
Union
[
V4ServiceNetwork
,
V6ServiceNetwork
]:
"""
Delete IPv4 or IPv6 network by CIDR.
"""
oss
=
settings
.
load_oss_params
()
assert
oss
.
IPAM
ipam_params
=
oss
.
IPAM
assert
ipam_params
.
INFOBLOX
infoblox_params
=
ipam_params
.
INFOBLOX
assert
network
,
"
No network specified to delete.
"
assert
hasattr
(
ipam_params
,
service_type
)
and
service_type
!=
"
INFOBLOX
"
,
"
Invalid service type.
"
ip_version
=
ip_network_version
(
str
(
network
))
# Ensure that the network to be deleted is under the service type.
# Otherwise user isn't allowed to delete it
oss_ipv4_containers
=
getattr
(
ipam_params
,
service_type
).
V4
.
containers
oss_ipv6_containers
=
getattr
(
ipam_params
,
service_type
).
V6
.
containers
oss_ipv4_networks
=
getattr
(
ipam_params
,
service_type
).
V4
.
networks
oss_ipv6_networks
=
getattr
(
ipam_params
,
service_type
).
V6
.
networks
ipv4_network
=
None
ipv6_network
=
None
if
ip_version
==
4
:
ipv4_network
=
network
else
:
ipv6_network
=
network
assert_network_in_service
(
ipv4_network
,
ipv6_network
,
oss_ipv4_containers
,
oss_ipv6_containers
,
oss_ipv4_networks
,
oss_ipv6_networks
)
network_info
=
find_networks
(
network
=
str
(
network
),
ip_version
=
ip_version
)
assert
len
(
network_info
)
==
1
,
"
Network to delete does not exist in IPAM.
"
assert
"
_ref
"
in
network_info
[
0
],
"
Network to delete does not exist in IPAM.
"
r
=
requests
.
delete
(
f
'
{
wapi
(
infoblox_params
)
}
/
{
network_info
[
0
][
"
_ref
"
]
}
'
,
auth
=
HTTPBasicAuth
(
infoblox_params
.
username
,
infoblox_params
.
password
),
<<<<<<<
HEAD
verify
=
False
,
# noqa: S501
timeout
=
REQUESTS_TIMEOUT
,
=======
verify
=
False
,
timeout
=
REQUESTS_TIMEOUT
>>>>>>>
232046
e
(
Fix
conflicts
in
workflows
)
)
assert
r
.
status_code
>=
200
and
r
.
status_code
<
300
,
f
"
HTTP error
{
r
.
status_code
}
:
{
r
.
reason
}
\n\n
{
r
.
text
}
"
# Extract ipv4/ipv6 address from the network reference obtained in the
# response
r_text
=
r
.
text
network_address
=
ipaddress
.
ip_network
(
r_text
.
rsplit
(
"
/
"
,
1
)[
0
].
split
(
"
:
"
)[
1
].
replace
(
"
%3A
"
,
"
:
"
))
if
ip_version
==
4
:
return
V4ServiceNetwork
(
v4
=
ipaddress
.
ip_network
(
network_address
))
return
V6ServiceNetwork
(
v6
=
ipaddress
.
ip_network
(
network_address
))
def
delete_host
(
hostname
:
str
=
""
,
host_addresses
:
HostAddresses
=
None
,
cname_aliases
:
Optional
[
list
]
=
None
,
<<<<<<<
HEAD
service_type
:
str
=
""
,
)
->
HostAddresses
:
=======
service_type
:
str
=
""
)
->
Union
[
V4HostAddress
,
V6HostAddress
]:
>>>>>>>
232046
e
(
Fix
conflicts
in
workflows
)
"""
Delete host record and associated CNAME records.
All arguments passed to this function must match together a host record in
IPAM, and all CNAME records associated to it must also be passed exactly.
"""
if
cname_aliases
is
None
:
cname_aliases
=
[]
oss
=
settings
.
load_oss_params
()
assert
oss
.
IPAM
ipam_params
=
oss
.
IPAM
assert
ipam_params
.
INFOBLOX
infoblox_params
=
ipam_params
.
INFOBLOX
assert
host_addresses
,
"
No host specified to delete.
"
assert
hasattr
(
ipam_params
,
service_type
)
and
service_type
!=
"
INFOBLOX
"
,
"
Invalid service type.
"
oss_ipv4_containers
=
getattr
(
ipam_params
,
service_type
).
V4
.
containers
oss_ipv6_containers
=
getattr
(
ipam_params
,
service_type
).
V6
.
containers
oss_ipv4_networks
=
getattr
(
ipam_params
,
service_type
).
V4
.
networks
oss_ipv6_networks
=
getattr
(
ipam_params
,
service_type
).
V6
.
networks
domain_name
=
getattr
(
ipam_params
,
service_type
).
domain_name
dns_view
=
getattr
(
ipam_params
,
service_type
).
dns_view
ipv4_addr
=
str
(
host_addresses
.
v4
)
ipv6_addr
=
str
(
host_addresses
.
v6
)
assert_host_in_service
(
host_addresses
.
v4
,
host_addresses
.
v6
,
oss_ipv4_containers
,
oss_ipv6_containers
,
oss_ipv4_networks
,
oss_ipv6_networks
,
)
# Find host record reference
r
=
requests
.
get
(
f
"
{
wapi
(
infoblox_params
)
}
/record:host
"
,
params
=
{
"
name
"
:
(
hostname
+
domain_name
).
lower
(),
# hostnames are lowercase
"
ipv4addr
"
:
ipv4_addr
,
"
ipv6addr
"
:
ipv6_addr
,
"
view
"
:
dns_view
,
},
auth
=
HTTPBasicAuth
(
infoblox_params
.
username
,
infoblox_params
.
password
),
<<<<<<<
HEAD
verify
=
False
,
# noqa: S501
timeout
=
REQUESTS_TIMEOUT
,
=======
verify
=
False
,
timeout
=
REQUESTS_TIMEOUT
>>>>>>>
232046
e
(
Fix
conflicts
in
workflows
)
)
host_data
=
r
.
json
()
assert
len
(
host_data
)
==
1
,
"
Host to delete does not exist in IPAM.
"
assert
"
_ref
"
in
host_data
[
0
],
"
Host to delete does not exist in IPAM.
"
host_ref
=
host_data
[
0
][
"
_ref
"
]
# Find CNAME records reference
r
=
requests
.
get
(
f
"
{
wapi
(
infoblox_params
)
}
/record:cname
"
,
params
=
{
"
canonical
"
:
hostname
+
domain_name
,
"
view
"
:
dns_view
,
},
auth
=
HTTPBasicAuth
(
infoblox_params
.
username
,
infoblox_params
.
password
),
<<<<<<<
HEAD
verify
=
False
,
# noqa: S501
timeout
=
REQUESTS_TIMEOUT
,
=======
verify
=
False
,
timeout
=
REQUESTS_TIMEOUT
>>>>>>>
232046
e
(
Fix
conflicts
in
workflows
)
)
cname_data
=
r
.
json
()
provided_cnames
=
[
item
+
domain_name
for
item
in
cname_aliases
]
found_cnames
=
[
item
[
"
name
"
]
for
item
in
cname_data
if
"
name
"
in
item
]
assert
provided_cnames
==
found_cnames
,
"
Provided CNAME alias names don
'
t match the ones poiting to hostname.
"
# Delete the host record
r
=
requests
.
delete
(
f
"
{
wapi
(
infoblox_params
)
}
/
{
host_ref
}
"
,
auth
=
HTTPBasicAuth
(
infoblox_params
.
username
,
infoblox_params
.
password
),
<<<<<<<
HEAD
verify
=
False
,
# noqa: S501
timeout
=
REQUESTS_TIMEOUT
,
=======
verify
=
False
,
timeout
=
REQUESTS_TIMEOUT
>>>>>>>
232046
e
(
Fix
conflicts
in
workflows
)
)
assert
r
.
status_code
>=
200
and
r
.
status_code
<
300
,
f
"
HTTP error
{
r
.
status_code
}
:
{
r
.
reason
}
\n\n
{
r
.
text
}
"
# Delete the CNAME records
cname_refs
=
[
item
[
"
_ref
"
]
for
item
in
cname_data
if
"
name
"
in
item
]
for
cname_ref
in
cname_refs
:
r
=
requests
.
delete
(
f
"
{
wapi
(
infoblox_params
)
}
/
{
cname_ref
}
"
,
auth
=
HTTPBasicAuth
(
infoblox_params
.
username
,
infoblox_params
.
password
),
<<<<<<<
HEAD
verify
=
False
,
# noqa: S501
timeout
=
REQUESTS_TIMEOUT
,
=======
verify
=
False
,
timeout
=
REQUESTS_TIMEOUT
>>>>>>>
232046
e
(
Fix
conflicts
in
workflows
)
service_network
=
ipam
.
validate_network
(
gso_subscription_id
=
"
0123456789abcdef
"
,
network
=
ipam
.
ipaddress
.
ip_network
(
"
10.255.255.0/26
"
)
)
assert
service_network
==
ipam
.
V4ServiceNetwork
(
v4
=
ipaddress
.
ip_network
(
"
10.255.255.0/26
"
))
# Fail because non-matching subscription id
with
pytest
.
raises
(
AssertionError
):
service_network
=
ipam
.
validate_network
(
gso_subscription_id
=
"
1a2b3c4d5e6f7890
"
,
network
=
ipam
.
ipaddress
.
ip_network
(
"
10.255.255.0/26
"
)
)
assert
r
.
status_code
>=
200
and
r
.
status_code
<
300
,
f
"
HTTP error
{
r
.
status_code
}
:
{
r
.
reason
}
\n\n
{
r
.
text
}
"
return
host_addresses
<<<<<<<
HEAD
def
validate_network
(
gso_subscription_id
:
str
=
""
,
network
:
ipaddress
.
ip_network
=
None
)
->
Union
[
V4ServiceNetwork
,
V6ServiceNetwork
]:
"""
Validate IPv4 or IPv6 network.
Check if the specified network exist, and, if it does, check if its comment field contains gso_subscription_id.
Returns the network if validation successful.
"""
assert
network
,
"
No network specified to validate.
"
ip_version
=
ip_network_version
(
str
(
network
))
network_info
=
find_networks
(
network
=
str
(
network
),
ip_version
=
ip_version
)
assert
len
(
network_info
)
==
1
and
"
_ref
"
in
network_info
[
0
],
"
Network to validate not found in IPAM.
"
assert
"
comment
"
in
network_info
[
0
],
"
Network to validate does not have comment in IPAM.
"
assert
(
gso_subscription_id
in
network_info
[
0
][
"
comment
"
]
),
"
GSO subscription ID does not match the one in the comment field of the IPAM network.
"
if
ip_version
==
4
:
return
V4ServiceNetwork
(
v4
=
network
)
return
V6ServiceNetwork
(
v6
=
network
)
def
validate_host
(
hostname
:
str
=
""
,
host_addresses
:
HostAddresses
=
None
,
cname_aliases
:
Optional
[
list
]
=
None
,
service_type
:
str
=
""
,
)
->
HostAddresses
:
"""
Validate host.
Check if all arguments passed to this function match together a host record in
IPAM, and all CNAME records associated to it also match exactly.
Returns the host if validation successful.
"""
if
cname_aliases
is
None
:
cname_aliases
=
[]
oss
=
settings
.
load_oss_params
()
assert
oss
.
IPAM
ipam_params
=
oss
.
IPAM
assert
ipam_params
.
INFOBLOX
infoblox_params
=
ipam_params
.
INFOBLOX
assert
hostname
and
host_addresses
,
"
No host specified to validate. Either hostname or host_addresses missing.
"
domain_name
=
getattr
(
ipam_params
,
service_type
).
domain_name
ipv4_addr
=
str
(
host_addresses
.
v4
)
ipv6_addr
=
str
(
host_addresses
.
v6
)
dns_view
=
getattr
(
ipam_params
,
service_type
).
dns_view
# Find host record reference
r
=
requests
.
get
(
f
"
{
wapi
(
infoblox_params
)
}
/record:host
"
,
params
=
{
"
name
"
:
(
hostname
+
domain_name
).
lower
(),
# hostnames are lowercase
"
ipv4addr
"
:
ipv4_addr
,
"
ipv6addr
"
:
ipv6_addr
,
"
view
"
:
dns_view
,
},
auth
=
HTTPBasicAuth
(
infoblox_params
.
username
,
infoblox_params
.
password
),
verify
=
False
,
# noqa: S501
timeout
=
REQUESTS_TIMEOUT
,
)
host_data
=
r
.
json
()
assert
len
(
host_data
)
==
1
,
"
Host to validate does not exist in IPAM.
"
assert
"
_ref
"
in
host_data
[
0
],
"
Host to validate does not exist in IPAM.
"
# Find CNAME records reference
r
=
requests
.
get
(
f
"
{
wapi
(
infoblox_params
)
}
/record:cname
"
,
params
=
{
"
canonical
"
:
hostname
+
domain_name
,
"
view
"
:
dns_view
,
},
auth
=
HTTPBasicAuth
(
infoblox_params
.
username
,
infoblox_params
.
password
),
verify
=
False
,
# noqa: S501
timeout
=
REQUESTS_TIMEOUT
,
assert
service_network
is
None
@responses.activate
def
test_validate_host
(
data_config_filename
:
PathLike
):
responses
.
add
(
method
=
responses
.
GET
,
url
=
re
.
compile
(
r
"
.*/wapi.*record:host.*
"
),
json
=
[
{
"
_ref
"
:
"
record:host/ZG5zLmhvc3QkLl9kZWZhdWx0Lmdzby5oYV9sbw:ha_lo.gso/default
"
,
# noqa: E501
"
ipv4addrs
"
:
[
{
"
_ref
"
:
"
record:host_ipv4addr/ZG5zLmhvc3RfYWRkcmVzcyQuX2RlZmF1bHQuZ3NvLmhhX2xvLjEwLjI1NS4yNTUuMS40.255.255.1/ha_lo.gso/default
"
,
# noqa: E501
"
configure_for_dhcp
"
:
False
,
"
host
"
:
"
ha_lo.gso
"
,
"
ipv4addr
"
:
"
10.255.255.1
"
,
}
],
"
ipv6addrs
"
:
[
{
"
_ref
"
:
"
record:host_ipv6addr/ZG5zLmhvc3RfYWRkcmVzcyQuX2RlZmF1bHQuZvLmhhX2xvLmRlYWQ6YmVlZjo6MS4:dead%3Abeef%3A%3A1/ha_lo.gso/default
"
,
# noqa: E501
"
configure_for_dhcp
"
:
False
,
"
host
"
:
"
ha_lo.gso
"
,
"
ipv6addr
"
:
"
dead:beef::1
"
,
}
],
"
name
"
:
"
ha_lo.gso
"
,
"
view
"
:
"
default
"
,
}
],
)
cname_data
=
r
.
json
()
provided_cnames
=
[
item
+
domain_name
for
item
in
cname_aliases
]
found_cnames
=
[
item
[
"
name
"
]
for
item
in
cname_data
if
"
name
"
in
item
]
assert
provided_cnames
==
found_cnames
,
"
Provided CNAME alias names don
'
t match the ones poiting to hostname.
"
return
host_addresses
responses
.
add
(
method
=
responses
.
GET
,
url
=
re
.
compile
(
r
"
.*/wapi.*record:cname.*
"
),
json
=
[
{
"
_ref
"
:
"
record:cname/ZG5zLmJpbmRfY25hbWUkLl9kZWZhdWx0Lmdzby5oYS5hbGlhczE:alias1.ha.gso/default
"
,
# noqa: E501
"
canonical
"
:
"
hA_LO.lo
"
,
"
name
"
:
"
alias1.ha.lo
"
,
"
view
"
:
"
default
"
,
},
{
"
_ref
"
:
"
record:cname/5zLmJpbmRfY25hbWUkLl9kZWZhdWx0Lmdzby5oYS5hbGlhczI:alias2.ha.gso/default
"
,
# noqa: E501
"
canonical
"
:
"
hA_LO.lo
"
,
"
name
"
:
"
alias2.ha.lo
"
,
"
view
"
:
"
default
"
,
},
],
)
input_host_addresses
=
ipam
.
HostAddresses
(
v4
=
ipaddress
.
ip_address
(
"
10.255.255.1
"
),
v6
=
ipaddress
.
ip_address
(
"
dead:beef::1
"
)
)
host_addresses
=
ipam
.
validate_host
(
hostname
=
"
ha_lo
"
,
host_addresses
=
input_host_addresses
,
cname_aliases
=
[
"
alias1.ha
"
,
"
alias2.ha
"
],
service_type
=
"
LO
"
,
)
assert
host_addresses
==
ipam
.
HostAddresses
(
v4
=
ipaddress
.
ip_address
(
"
10.255.255.1
"
),
v6
=
ipaddress
.
ip_address
(
"
dead:beef::1
"
)
)
# Fail because non-matching hostname
host_addresses
=
ipam
.
validate_host
(
hostname
=
"
wrong_hostname
"
,
host_addresses
=
input_host_addresses
,
cname_aliases
=
[
"
alias1.ha
"
,
"
alias2.ha
"
],
service_type
=
"
LO
"
,
)
with
pytest
.
raises
(
AssertionError
):
host_addresses
=
ipam
.
HostAddresses
(
v4
=
ipaddress
.
ip_address
(
"
10.255.255.1
"
),
v6
=
ipaddress
.
ip_address
(
"
dead:beef::1
"
)
)
assert
host_addresses
is
None
=======
>>>>>>>
232046
e
(
Fix
conflicts
in
workflows
)
This diff is collapsed.
Click to expand it.
Preview
0%
Loading
Try again
or
attach a new file
.
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Save comment
Cancel
Please
register
or
sign in
to comment