mirror of
https://gitlab2.federez.net/re2o/re2o
synced 2024-11-30 08:32:26 +00:00
Mac_address is now uniq in one ip range
This commit is contained in:
parent
411467a520
commit
67b702f171
1 changed files with 37 additions and 30 deletions
|
@ -1110,23 +1110,6 @@ class Interface(RevMixin, AclMixin, FieldPermissionModelMixin, models.Model):
|
||||||
except:
|
except:
|
||||||
raise ValidationError(_("The given MAC address is invalid."))
|
raise ValidationError(_("The given MAC address is invalid."))
|
||||||
|
|
||||||
def clean(self, *args, **kwargs):
|
|
||||||
""" Formate l'addresse mac en mac_bare (fonction filter_mac)
|
|
||||||
et assigne une ipv4 dans le bon range si inexistante ou incohérente"""
|
|
||||||
# If type was an invalid value, django won't create an attribute type
|
|
||||||
# but try clean() as we may be able to create it from another value
|
|
||||||
# so even if the error as yet been detected at this point, django
|
|
||||||
# continues because the error might not prevent us from creating the
|
|
||||||
# instance.
|
|
||||||
# But in our case, it's impossible to create a type value so we raise
|
|
||||||
# the error.
|
|
||||||
if not hasattr(self, 'type'):
|
|
||||||
raise ValidationError(_("The selected IP type is invalid."))
|
|
||||||
self.filter_macaddress()
|
|
||||||
if not self.ipv4 or self.type.ip_type != self.ipv4.ip_type:
|
|
||||||
self.assign_ipv4()
|
|
||||||
super(Interface, self).clean(*args, **kwargs)
|
|
||||||
|
|
||||||
def assign_ipv4(self):
|
def assign_ipv4(self):
|
||||||
""" Assigne une ip à l'interface """
|
""" Assigne une ip à l'interface """
|
||||||
free_ips = self.type.ip_type.free_ip()
|
free_ips = self.type.ip_type.free_ip()
|
||||||
|
@ -1146,6 +1129,42 @@ class Interface(RevMixin, AclMixin, FieldPermissionModelMixin, models.Model):
|
||||||
self.clean()
|
self.clean()
|
||||||
self.save()
|
self.save()
|
||||||
|
|
||||||
|
def has_private_ip(self):
|
||||||
|
""" True si l'ip associée est privée"""
|
||||||
|
if self.ipv4:
|
||||||
|
return IPAddress(str(self.ipv4)).is_private()
|
||||||
|
else:
|
||||||
|
return False
|
||||||
|
|
||||||
|
def may_have_port_open(self):
|
||||||
|
""" True si l'interface a une ip et une ip publique.
|
||||||
|
Permet de ne pas exporter des ouvertures sur des ip privées
|
||||||
|
(useless)"""
|
||||||
|
return self.ipv4 and not self.has_private_ip()
|
||||||
|
|
||||||
|
def clean(self, *args, **kwargs):
|
||||||
|
""" Formate l'addresse mac en mac_bare (fonction filter_mac)
|
||||||
|
et assigne une ipv4 dans le bon range si inexistante ou incohérente"""
|
||||||
|
# If type was an invalid value, django won't create an attribute type
|
||||||
|
# but try clean() as we may be able to create it from another value
|
||||||
|
# so even if the error as yet been detected at this point, django
|
||||||
|
# continues because the error might not prevent us from creating the
|
||||||
|
# instance.
|
||||||
|
# But in our case, it's impossible to create a type value so we raise
|
||||||
|
# the error.
|
||||||
|
if not hasattr(self, 'type'):
|
||||||
|
raise ValidationError(_("The selected IP type is invalid."))
|
||||||
|
self.filter_macaddress()
|
||||||
|
if not self.ipv4 or self.type.ip_type != self.ipv4.ip_type:
|
||||||
|
self.assign_ipv4()
|
||||||
|
super(Interface, self).clean(*args, **kwargs)
|
||||||
|
|
||||||
|
def validate_unique(self, *args, **kwargs):
|
||||||
|
super(Interface, self).validate_unique(*args, **kwargs)
|
||||||
|
interfaces_similar = Interface.objects.filter(mac_address=self.mac_address, type__ip_type=self.type.ip_type)
|
||||||
|
if interfaces_similar and interfaces_similar.first() != self:
|
||||||
|
raise ValidationError(_("Mac address already registered in this Machine Type/Subnet"))
|
||||||
|
|
||||||
def save(self, *args, **kwargs):
|
def save(self, *args, **kwargs):
|
||||||
self.filter_macaddress()
|
self.filter_macaddress()
|
||||||
# On verifie la cohérence en forçant l'extension par la méthode
|
# On verifie la cohérence en forçant l'extension par la méthode
|
||||||
|
@ -1153,6 +1172,7 @@ class Interface(RevMixin, AclMixin, FieldPermissionModelMixin, models.Model):
|
||||||
if self.type.ip_type != self.ipv4.ip_type:
|
if self.type.ip_type != self.ipv4.ip_type:
|
||||||
raise ValidationError(_("The IPv4 address and the machine type"
|
raise ValidationError(_("The IPv4 address and the machine type"
|
||||||
" don't match."))
|
" don't match."))
|
||||||
|
self.validate_unique()
|
||||||
super(Interface, self).save(*args, **kwargs)
|
super(Interface, self).save(*args, **kwargs)
|
||||||
|
|
||||||
@staticmethod
|
@staticmethod
|
||||||
|
@ -1250,19 +1270,6 @@ class Interface(RevMixin, AclMixin, FieldPermissionModelMixin, models.Model):
|
||||||
domain = None
|
domain = None
|
||||||
return str(domain)
|
return str(domain)
|
||||||
|
|
||||||
def has_private_ip(self):
|
|
||||||
""" True si l'ip associée est privée"""
|
|
||||||
if self.ipv4:
|
|
||||||
return IPAddress(str(self.ipv4)).is_private()
|
|
||||||
else:
|
|
||||||
return False
|
|
||||||
|
|
||||||
def may_have_port_open(self):
|
|
||||||
""" True si l'interface a une ip et une ip publique.
|
|
||||||
Permet de ne pas exporter des ouvertures sur des ip privées
|
|
||||||
(useless)"""
|
|
||||||
return self.ipv4 and not self.has_private_ip()
|
|
||||||
|
|
||||||
|
|
||||||
class Ipv6List(RevMixin, AclMixin, FieldPermissionModelMixin, models.Model):
|
class Ipv6List(RevMixin, AclMixin, FieldPermissionModelMixin, models.Model):
|
||||||
""" A list of IPv6 """
|
""" A list of IPv6 """
|
||||||
|
|
Loading…
Reference in a new issue