8
0
Fork 0
mirror of https://gitlab2.federez.net/re2o/re2o synced 2024-11-30 16:42:25 +00:00
re2o/machines/views.py
2018-04-15 10:52:26 +00:00

1670 lines
50 KiB
Python

# -*- mode: python; coding: utf-8 -*-
# Re2o est un logiciel d'administration développé initiallement au rezometz. Il
# se veut agnostique au réseau considéré, de manière à être installable en
# quelques clics.
#
# Copyright © 2017 Gabriel Détraz
# Copyright © 2017 Goulven Kermarec
# Copyright © 2017 Augustin Lemesle
# Copyright © 2017 Maël Kervella
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation; either version 2 of the License, or
# (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License along
# with this program; if not, write to the Free Software Foundation, Inc.,
# 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
# App de gestion des machines pour re2o
# Gabriel Détraz, Augustin Lemesle
# Gplv2
from __future__ import unicode_literals
from django.urls import reverse
from django.http import HttpResponse
from django.shortcuts import render, redirect
from django.shortcuts import get_object_or_404
from django.template.context_processors import csrf
from django.template import Context, RequestContext, loader
from django.contrib import messages
from django.contrib.auth.decorators import login_required, permission_required
from django.db.models import ProtectedError, F
from django.forms import ValidationError, modelformset_factory
from django.contrib.auth import authenticate, login
from django.views.decorators.csrf import csrf_exempt
from rest_framework.renderers import JSONRenderer
from machines.serializers import (
FullInterfaceSerializer,
InterfaceSerializer,
TypeSerializer,
DomainSerializer,
TxtSerializer,
SrvSerializer,
MxSerializer,
ExtensionSerializer,
ServiceServersSerializer,
NsSerializer,
OuverturePortsSerializer
)
from reversion import revisions as reversion
from reversion.models import Version
import re
from .forms import (
NewMachineForm,
EditMachineForm,
EditInterfaceForm,
AddInterfaceForm,
MachineTypeForm,
DelMachineTypeForm,
ExtensionForm,
DelExtensionForm,
)
from .forms import (
EditIpTypeForm,
IpTypeForm,
DelIpTypeForm,
DomainForm,
AliasForm,
DelAliasForm,
SOAForm,
DelSOAForm,
NsForm,
DelNsForm,
TxtForm,
DelTxtForm,
MxForm,
DelMxForm,
VlanForm,
DelVlanForm,
ServiceForm,
DelServiceForm,
NasForm,
DelNasForm,
SrvForm,
DelSrvForm,
Ipv6ListForm,
)
from .forms import EditOuverturePortListForm, EditOuverturePortConfigForm
from .models import (
IpType,
Machine,
Interface,
IpList,
MachineType,
Extension,
SOA,
Mx,
Ns,
Domain,
Service,
Service_link,
Vlan,
Nas,
Txt,
Srv,
OuverturePortList,
OuverturePort,
Ipv6List,
)
from users.models import User
from preferences.models import GeneralOption, OptionalMachine
from re2o.utils import (
all_active_assigned_interfaces,
all_has_access,
filter_active_interfaces,
SortTable,
re2o_paginator,
)
from re2o.acl import (
can_create,
can_edit,
can_delete,
can_view,
can_view_all,
can_delete_set,
)
from re2o.views import form
def f_type_id(is_type_tt):
""" The id that will be used in HTML to store the value of the field
type. Depends on the fact that type is generate using typeahead or not
"""
return 'id_Interface-type_hidden' if is_type_tt else 'id_Interface-type'
def generate_ipv4_choices(form):
""" Generate the parameter choices for the massive_bootstrap_form tag
"""
f_ipv4 = form.fields['ipv4']
used_mtype_id = []
choices = '{"":[{key:"",value:"Choisissez d\'abord un type de machine"},'
mtype_id = -1
for ip in (f_ipv4.queryset
.annotate(mtype_id=F('ip_type__machinetype__id'))
.order_by('mtype_id', 'id')):
if mtype_id != ip.mtype_id:
mtype_id = ip.mtype_id
used_mtype_id.append(mtype_id)
choices += '],"{t}":[{{key:"",value:"{v}"}},'.format(
t=mtype_id,
v=f_ipv4.empty_label or '""'
)
choices += '{{key:{k},value:"{v}"}},'.format(
k=ip.id,
v=ip.ipv4
)
for t in form.fields['type'].queryset.exclude(id__in=used_mtype_id):
choices += '], "'+str(t.id)+'": ['
choices += '{key: "", value: "' + str(f_ipv4.empty_label) + '"},'
choices += ']}'
return choices
def generate_ipv4_engine(is_type_tt):
""" Generate the parameter engine for the massive_bootstrap_form tag
"""
return (
'new Bloodhound( {{'
'datumTokenizer: Bloodhound.tokenizers.obj.whitespace( "value" ),'
'queryTokenizer: Bloodhound.tokenizers.whitespace,'
'local: choices_ipv4[ $( "#{type_id}" ).val() ],'
'identify: function( obj ) {{ return obj.key; }}'
'}} )'
).format(
type_id=f_type_id(is_type_tt)
)
def generate_ipv4_match_func(is_type_tt):
""" Generate the parameter match_func for the massive_bootstrap_form tag
"""
return (
'function(q, sync) {{'
'if (q === "") {{'
'var first = choices_ipv4[$("#{type_id}").val()].slice(0, 5);'
'first = first.map( function (obj) {{ return obj.key; }} );'
'sync(engine_ipv4.get(first));'
'}} else {{'
'engine_ipv4.search(q, sync);'
'}}'
'}}'
).format(
type_id=f_type_id(is_type_tt)
)
def generate_ipv4_mbf_param(form, is_type_tt):
""" Generate all the parameters to use with the massive_bootstrap_form
tag """
i_choices = {'ipv4': generate_ipv4_choices(form)}
i_engine = {'ipv4': generate_ipv4_engine(is_type_tt)}
i_match_func = {'ipv4': generate_ipv4_match_func(is_type_tt)}
i_update_on = {'ipv4': [f_type_id(is_type_tt)]}
i_gen_select = {'ipv4': False}
i_mbf_param = {
'choices': i_choices,
'engine': i_engine,
'match_func': i_match_func,
'update_on': i_update_on,
'gen_select': i_gen_select
}
return i_mbf_param
@login_required
@can_create(Machine)
@can_edit(User)
def new_machine(request, user, userid):
""" Fonction de creation d'une machine. Cree l'objet machine,
le sous objet interface et l'objet domain à partir de model forms.
Trop complexe, devrait être simplifié"""
machine = NewMachineForm(request.POST or None, user=request.user)
interface = AddInterfaceForm(
request.POST or None,
user=request.user
)
domain = DomainForm(request.POST or None, user=user)
if machine.is_valid() and interface.is_valid():
new_machine = machine.save(commit=False)
new_machine.user = user
new_interface = interface.save(commit=False)
domain.instance.interface_parent = new_interface
if domain.is_valid():
new_domain = domain.save(commit=False)
new_machine.save()
new_interface.machine = new_machine
new_interface.save()
new_domain.interface_parent = new_interface
new_domain.save()
messages.success(request, "La machine a été créée")
return redirect(reverse(
'users:profil',
kwargs={'userid': str(user.id)}
))
i_mbf_param = generate_ipv4_mbf_param(interface, False)
return form(
{
'machineform': machine,
'interfaceform': interface,
'domainform': domain,
'i_mbf_param': i_mbf_param,
'action_name': 'Créer une machine'
},
'machines/machine.html',
request
)
@login_required
@can_edit(Interface)
def edit_interface(request, interface_instance, interfaceid):
""" Edition d'une interface. Distingue suivant les droits les valeurs
de interfaces et machines que l'user peut modifier infra permet de
modifier le propriétaire"""
machine_form = EditMachineForm(
request.POST or None,
instance=interface_instance.machine,
user=request.user
)
interface_form = EditInterfaceForm(
request.POST or None,
instance=interface_instance,
user=request.user
)
domain_form = DomainForm(
request.POST or None,
instance=interface_instance.domain
)
if (machine_form.is_valid() and
interface_form.is_valid() and
domain_form.is_valid()):
new_machine = machine_form.save(commit=False)
new_interface = interface_form.save(commit=False)
new_domain = domain_form.save(commit=False)
if machine_form.changed_data:
new_machine.save()
if interface_form.changed_data:
new_interface.save()
if domain_form.changed_data:
new_domain.save()
messages.success(request, "La machine a été modifiée")
return redirect(reverse(
'users:profil',
kwargs={'userid': str(interface_instance.machine.user.id)}
))
i_mbf_param = generate_ipv4_mbf_param(interface_form, False)
return form(
{
'machineform': machine_form,
'interfaceform': interface_form,
'domainform': domain_form,
'i_mbf_param': i_mbf_param,
'action_name': 'Editer une interface'
},
'machines/machine.html',
request
)
@login_required
@can_delete(Machine)
def del_machine(request, machine, machineid):
""" Supprime une machine, interfaces en mode cascade"""
if request.method == "POST":
machine.delete()
messages.success(request, "La machine a été détruite")
return redirect(reverse(
'users:profil',
kwargs={'userid': str(machine.user.id)}
))
return form(
{'objet': machine, 'objet_name': 'machine'},
'machines/delete.html',
request
)
@login_required
@can_create(Interface)
@can_edit(Machine)
def new_interface(request, machine, machineid):
""" Ajoute une interface et son domain associé à une machine existante"""
interface_form = AddInterfaceForm(request.POST or None, user=request.user)
domain_form = DomainForm(request.POST or None)
if interface_form.is_valid():
new_interface = interface_form.save(commit=False)
domain_form.instance.interface_parent = new_interface
new_interface.machine = machine
if domain_form.is_valid():
new_domain = domain_form.save(commit=False)
new_interface.save()
new_domain.interface_parent = new_interface
new_domain.save()
messages.success(request, "L'interface a été ajoutée")
return redirect(reverse(
'users:profil',
kwargs={'userid': str(machine.user.id)}
))
i_mbf_param = generate_ipv4_mbf_param(interface_form, False)
return form(
{
'interfaceform': interface_form,
'domainform': domain_form,
'i_mbf_param': i_mbf_param,
'action_name': 'Créer une interface'
},
'machines/machine.html',
request
)
@login_required
@can_delete(Interface)
def del_interface(request, interface, interfaceid):
""" Supprime une interface. Domain objet en mode cascade"""
if request.method == "POST":
machine = interface.machine
interface.delete()
if not machine.interface_set.all():
machine.delete()
messages.success(request, "L'interface a été détruite")
return redirect(reverse(
'users:profil',
kwargs={'userid': str(request.user.id)}
))
return form(
{'objet': interface, 'objet_name': 'interface'},
'machines/delete.html',
request
)
@login_required
@can_create(Ipv6List)
@can_edit(Interface)
def new_ipv6list(request, interface, interfaceid):
"""Nouvelle ipv6"""
ipv6list_instance = Ipv6List(interface=interface)
ipv6 = Ipv6ListForm(
request.POST or None,
instance=ipv6list_instance,
user=request.user
)
if ipv6.is_valid():
ipv6.save()
messages.success(request, "Ipv6 ajoutée")
return redirect(reverse(
'machines:index-ipv6',
kwargs={'interfaceid': str(interface.id)}
))
return form(
{'ipv6form': ipv6, 'action_name': 'Créer'},
'machines/machine.html',
request
)
@login_required
@can_edit(Ipv6List)
def edit_ipv6list(request, ipv6list_instance, ipv6listid):
"""Edition d'une ipv6"""
ipv6 = Ipv6ListForm(
request.POST or None,
instance=ipv6list_instance,
user=request.user
)
if ipv6.is_valid():
if ipv6.changed_data:
ipv6.save()
messages.success(request, "Ipv6 modifiée")
return redirect(reverse(
'machines:index-ipv6',
kwargs={'interfaceid': str(ipv6list_instance.interface.id)}
))
return form(
{'ipv6form': ipv6, 'action_name': 'Editer'},
'machines/machine.html',
request
)
@login_required
@can_delete(Ipv6List)
def del_ipv6list(request, ipv6list, ipv6listid):
""" Supprime une ipv6"""
if request.method == "POST":
interfaceid = ipv6list.interface.id
ipv6list.delete()
messages.success(request, "L'ipv6 a été détruite")
return redirect(reverse(
'machines:index-ipv6',
kwargs={'interfaceid': str(interfaceid)}
))
return form(
{'objet': ipv6list, 'objet_name': 'ipv6'},
'machines/delete.html',
request
)
@login_required
@can_create(IpType)
def add_iptype(request):
""" Ajoute un range d'ip. Intelligence dans le models, fonction views
minimaliste"""
iptype = IpTypeForm(request.POST or None)
if iptype.is_valid():
iptype.save()
messages.success(request, "Ce type d'ip a été ajouté")
return redirect(reverse('machines:index-iptype'))
return form(
{'iptypeform': iptype, 'action_name': 'Créer'},
'machines/machine.html',
request
)
@login_required
@can_edit(IpType)
def edit_iptype(request, iptype_instance, iptypeid):
""" Edition d'un range. Ne permet pas de le redimensionner pour éviter
l'incohérence"""
iptype = EditIpTypeForm(request.POST or None, instance=iptype_instance)
if iptype.is_valid():
if iptype.changed_data:
iptype.save()
messages.success(request, "Type d'ip modifié")
return redirect(reverse('machines:index-iptype'))
return form(
{'iptypeform': iptype, 'action_name': 'Editer'},
'machines/machine.html',
request
)
@login_required
@can_delete_set(IpType)
def del_iptype(request, instances):
""" Suppression d'un range ip. Supprime les objets ip associés"""
iptype = DelIpTypeForm(request.POST or None, instances=instances)
if iptype.is_valid():
iptype_dels = iptype.cleaned_data['iptypes']
for iptype_del in iptype_dels:
try:
iptype_del.delete()
messages.success(request, "Le type d'ip a été supprimé")
except ProtectedError:
messages.error(
request,
("Le type d'ip %s est affectée à au moins une machine, "
"vous ne pouvez pas le supprimer" % iptype_del)
)
return redirect(reverse('machines:index-iptype'))
return form(
{'iptypeform': iptype, 'action_name': 'Supprimer'},
'machines/machine.html',
request
)
@login_required
@can_create(MachineType)
def add_machinetype(request):
machinetype = MachineTypeForm(request.POST or None)
if machinetype.is_valid():
machinetype.save()
messages.success(request, "Ce type de machine a été ajouté")
return redirect(reverse('machines:index-machinetype'))
return form(
{'machinetypeform': machinetype, 'action_name': 'Créer'},
'machines/machine.html',
request
)
@login_required
@can_edit(MachineType)
def edit_machinetype(request, machinetype_instance, machinetypeid):
machinetype = MachineTypeForm(
request.POST or None,
instance=machinetype_instance
)
if machinetype.is_valid():
if machinetype.changed_data:
machinetype.save()
messages.success(request, "Type de machine modifié")
return redirect(reverse('machines:index-machinetype'))
return form(
{'machinetypeform': machinetype, 'action_name': 'Editer'},
'machines/machine.html',
request
)
@login_required
@can_delete_set(MachineType)
def del_machinetype(request, instances):
machinetype = DelMachineTypeForm(request.POST or None, instances=instances)
if machinetype.is_valid():
machinetype_dels = machinetype.cleaned_data['machinetypes']
for machinetype_del in machinetype_dels:
try:
machinetype_del.delete()
messages.success(request, "Le type de machine a été supprimé")
except ProtectedError:
messages.error(
request,
("Le type de machine %s est affectée à au moins une "
"machine, vous ne pouvez pas le supprimer"
% machinetype_del)
)
return redirect(reverse('machines:index-machinetype'))
return form(
{'machinetypeform': machinetype, 'action_name': 'Supprimer'},
'machines/machine.html',
request
)
@login_required
@can_create(Extension)
def add_extension(request):
extension = ExtensionForm(request.POST or None)
if extension.is_valid():
extension.save()
messages.success(request, "Cette extension a été ajoutée")
return redirect(reverse('machines:index-extension'))
return form(
{'extensionform': extension, 'action_name': 'Créer'},
'machines/machine.html',
request
)
@login_required
@can_edit(Extension)
def edit_extension(request, extension_instance, extensionid):
extension = ExtensionForm(
request.POST or None,
instance=extension_instance
)
if extension.is_valid():
if extension.changed_data:
extension.save()
messages.success(request, "Extension modifiée")
return redirect(reverse('machines:index-extension'))
return form(
{'extensionform': extension, 'action_name': 'Editer'},
'machines/machine.html',
request
)
@login_required
@can_delete_set(Extension)
def del_extension(request, instances):
extension = DelExtensionForm(request.POST or None, instances=instances)
if extension.is_valid():
extension_dels = extension.cleaned_data['extensions']
for extension_del in extension_dels:
try:
extension_del.delete()
messages.success(request, "L'extension a été supprimée")
except ProtectedError:
messages.error(
request,
("L'extension %s est affectée à au moins un type de "
"machine, vous ne pouvez pas la supprimer"
% extension_del)
)
return redirect(reverse('machines:index-extension'))
return form(
{'extensionform': extension, 'action_name': 'Supprimer'},
'machines/machine.html',
request
)
@login_required
@can_create(SOA)
def add_soa(request):
soa = SOAForm(request.POST or None)
if soa.is_valid():
soa.save()
messages.success(request, "Cet enregistrement SOA a été ajouté")
return redirect(reverse('machines:index-extension'))
return form(
{'soaform': soa, 'action_name': 'Créer'},
'machines/machine.html',
request
)
@login_required
@can_edit(SOA)
def edit_soa(request, soa_instance, soaid):
soa = SOAForm(request.POST or None, instance=soa_instance)
if soa.is_valid():
if soa.changed_data:
soa.save()
messages.success(request, "SOA modifié")
return redirect(reverse('machines:index-extension'))
return form(
{'soaform': soa, 'action_name': 'Editer'},
'machines/machine.html',
request
)
@login_required
@can_delete_set(SOA)
def del_soa(request, instances):
soa = DelSOAForm(request.POST or None, instances=instances)
if soa.is_valid():
soa_dels = soa.cleaned_data['soa']
for soa_del in soa_dels:
try:
soa_del.delete()
messages.success(request, "Le SOA a été supprimée")
except ProtectedError:
messages.error(
request,
("Erreur le SOA suivant %s ne peut être supprimé"
% soa_del)
)
return redirect(reverse('machines:index-extension'))
return form(
{'soaform': soa, 'action_name': 'Supprimer'},
'machines/machine.html',
request
)
@login_required
@can_create(Mx)
def add_mx(request):
mx = MxForm(request.POST or None)
if mx.is_valid():
mx.save()
messages.success(request, "Cet enregistrement mx a été ajouté")
return redirect(reverse('machines:index-extension'))
return form(
{'mxform': mx, 'action_name': 'Créer'},
'machines/machine.html',
request
)
@login_required
@can_edit(Mx)
def edit_mx(request, mx_instance, mxid):
mx = MxForm(request.POST or None, instance=mx_instance)
if mx.is_valid():
if mx.changed_data:
mx.save()
messages.success(request, "Mx modifié")
return redirect(reverse('machines:index-extension'))
return form(
{'mxform': mx, 'action_name': 'Editer'},
'machines/machine.html',
request
)
@login_required
@can_delete_set(Mx)
def del_mx(request, instances):
mx = DelMxForm(request.POST or None, instances=instances)
if mx.is_valid():
mx_dels = mx.cleaned_data['mx']
for mx_del in mx_dels:
try:
mx_del.delete()
messages.success(request, "L'mx a été supprimée")
except ProtectedError:
messages.error(
request,
("Erreur le Mx suivant %s ne peut être supprimé"
% mx_del)
)
return redirect(reverse('machines:index-extension'))
return form(
{'mxform': mx, 'action_name': 'Supprimer'},
'machines/machine.html',
request
)
@login_required
@can_create(Ns)
def add_ns(request):
ns = NsForm(request.POST or None)
if ns.is_valid():
ns.save()
messages.success(request, "Cet enregistrement ns a été ajouté")
return redirect(reverse('machines:index-extension'))
return form(
{'nsform': ns, 'action_name': 'Créer'},
'machines/machine.html',
request
)
@login_required
@can_edit(Ns)
def edit_ns(request, ns_instance, nsid):
ns = NsForm(request.POST or None, instance=ns_instance)
if ns.is_valid():
if ns.changed_data:
ns.save()
messages.success(request, "Ns modifié")
return redirect(reverse('machines:index-extension'))
return form(
{'nsform': ns, 'action_name': 'Editer'},
'machines/machine.html',
request
)
@login_required
@can_delete_set(Ns)
def del_ns(request, instances):
ns = DelNsForm(request.POST or None, instances=instances)
if ns.is_valid():
ns_dels = ns.cleaned_data['ns']
for ns_del in ns_dels:
try:
ns_del.delete()
messages.success(request, "Le ns a été supprimée")
except ProtectedError:
messages.error(
request,
("Erreur le Ns suivant %s ne peut être supprimé"
% ns_del)
)
return redirect(reverse('machines:index-extension'))
return form(
{'nsform': ns, 'action_name': 'Supprimer'},
'machines/machine.html',
request
)
@login_required
@can_create(Txt)
def add_txt(request):
txt = TxtForm(request.POST or None)
if txt.is_valid():
txt.save()
messages.success(request, "Cet enregistrement text a été ajouté")
return redirect(reverse('machines:index-extension'))
return form(
{'txtform': txt, 'action_name': 'Créer'},
'machines/machine.html',
request
)
@login_required
@can_edit(Txt)
def edit_txt(request, txt_instance, txtid):
txt = TxtForm(request.POST or None, instance=txt_instance)
if txt.is_valid():
if txt.changed_data:
txt.save()
messages.success(request, "Txt modifié")
return redirect(reverse('machines:index-extension'))
return form(
{'txtform': txt, 'action_name': 'Editer'},
'machines/machine.html',
request
)
@login_required
@can_delete_set(Txt)
def del_txt(request, instances):
txt = DelTxtForm(request.POST or None, instances=instances)
if txt.is_valid():
txt_dels = txt.cleaned_data['txt']
for txt_del in txt_dels:
try:
txt_del.delete()
messages.success(request, "Le txt a été supprimé")
except ProtectedError:
messages.error(
request,
("Erreur le Txt suivant %s ne peut être supprimé"
% txt_del)
)
return redirect(reverse('machines:index-extension'))
return form(
{'txtform': txt, 'action_name': 'Supprimer'},
'machines/machine.html',
request
)
@login_required
@can_create(Srv)
def add_srv(request):
srv = SrvForm(request.POST or None)
if srv.is_valid():
srv.save()
messages.success(request, "Cet enregistrement srv a été ajouté")
return redirect(reverse('machines:index-extension'))
return form(
{'srvform': srv, 'action_name': 'Créer'},
'machines/machine.html',
request
)
@login_required
@can_edit(Srv)
def edit_srv(request, srv_instance, srvid):
srv = SrvForm(request.POST or None, instance=srv_instance)
if srv.is_valid():
if srv.changed_data:
srv.save()
messages.success(request, "Srv modifié")
return redirect(reverse('machines:index-extension'))
return form(
{'srvform': srv, 'action_name': 'Editer'},
'machines/machine.html',
request
)
@login_required
@can_delete_set(Srv)
def del_srv(request, instances):
srv = DelSrvForm(request.POST or None, instances=instances)
if srv.is_valid():
srv_dels = srv.cleaned_data['srv']
for srv_del in srv_dels:
try:
srv_del.delete()
messages.success(request, "L'srv a été supprimée")
except ProtectedError:
messages.error(
request,
("Erreur le Srv suivant %s ne peut être supprimé"
% srv_del)
)
return redirect(reverse('machines:index-extension'))
return form(
{'srvform': srv, 'action_name': 'Supprimer'},
'machines/machine.html',
request
)
@login_required
@can_create(Domain)
@can_edit(Interface)
def add_alias(request, interface, interfaceid):
alias = AliasForm(request.POST or None, user=request.user)
if alias.is_valid():
alias = alias.save(commit=False)
alias.cname = interface.domain
alias.save()
messages.success(request, "Cet alias a été ajouté")
return redirect(reverse(
'machines:index-alias',
kwargs={'interfaceid': str(interfaceid)}
))
return form(
{'aliasform': alias, 'action_name': 'Créer'},
'machines/machine.html',
request
)
@login_required
@can_edit(Domain)
def edit_alias(request, domain_instance, domainid):
alias = AliasForm(
request.POST or None,
instance=domain_instance,
user=request.user
)
if alias.is_valid():
if alias.changed_data:
domain_instance = alias.save()
messages.success(request, "Alias modifié")
return redirect(reverse(
'machines:index-alias',
kwargs={
'interfaceid': str(domain_instance.cname.interface_parent.id)
}
))
return form(
{'aliasform': alias, 'action_name': 'Editer'},
'machines/machine.html',
request
)
@login_required
@can_edit(Interface)
def del_alias(request, interface, interfaceid):
alias = DelAliasForm(request.POST or None, interface=interface)
if alias.is_valid():
alias_dels = alias.cleaned_data['alias']
for alias_del in alias_dels:
try:
alias_del.delete()
messages.success(
request,
"L'alias %s a été supprimé" % alias_del
)
except ProtectedError:
messages.error(
request,
("Erreur l'alias suivant %s ne peut être supprimé"
% alias_del)
)
return redirect(reverse(
'machines:index-alias',
kwargs={'interfaceid': str(interfaceid)}
))
return form(
{'aliasform': alias, 'action_name': 'Supprimer'},
'machines/machine.html',
request
)
@login_required
@can_create(Service)
def add_service(request):
service = ServiceForm(request.POST or None)
if service.is_valid():
service.save()
messages.success(request, "Cet enregistrement service a été ajouté")
return redirect(reverse('machines:index-service'))
return form(
{'serviceform': service, 'action_name': 'Créer'},
'machines/machine.html',
request
)
@login_required
@can_edit(Service)
def edit_service(request, service_instance, serviceid):
service = ServiceForm(request.POST or None, instance=service_instance)
if service.is_valid():
if service.changed_data:
service.save()
messages.success(request, "Service modifié")
return redirect(reverse('machines:index-service'))
return form(
{'serviceform': service, 'action_name': 'Editer'},
'machines/machine.html',
request
)
@login_required
@can_delete_set(Service)
def del_service(request, instances):
service = DelServiceForm(request.POST or None, instances=instances)
if service.is_valid():
service_dels = service.cleaned_data['service']
for service_del in service_dels:
try:
service_del.delete()
messages.success(request, "Le service a été supprimée")
except ProtectedError:
messages.error(
request,
("Erreur le service suivant %s ne peut être supprimé"
% service_del)
)
return redirect(reverse('machines:index-service'))
return form(
{'serviceform': service, 'action_name': 'Supprimer'},
'machines/machine.html',
request
)
@login_required
@can_create(Vlan)
def add_vlan(request):
vlan = VlanForm(request.POST or None)
if vlan.is_valid():
vlan.save()
messages.success(request, "Cet enregistrement vlan a été ajouté")
return redirect(reverse('machines:index-vlan'))
return form(
{'vlanform': vlan, 'action_name': 'Créer'},
'machines/machine.html',
request
)
@login_required
@can_edit(Vlan)
def edit_vlan(request, vlan_instance, vlanid):
vlan = VlanForm(request.POST or None, instance=vlan_instance)
if vlan.is_valid():
if vlan.changed_data:
vlan.save()
messages.success(request, "Vlan modifié")
return redirect(reverse('machines:index-vlan'))
return form(
{'vlanform': vlan, 'action_name': 'Editer'},
'machines/machine.html',
request
)
@login_required
@can_delete_set(Vlan)
def del_vlan(request, instances):
vlan = DelVlanForm(request.POST or None, instances=instances)
if vlan.is_valid():
vlan_dels = vlan.cleaned_data['vlan']
for vlan_del in vlan_dels:
try:
vlan_del.delete()
messages.success(request, "Le vlan a été supprimée")
except ProtectedError:
messages.error(
request,
("Erreur le Vlan suivant %s ne peut être supprimé"
% vlan_del)
)
return redirect(reverse('machines:index-vlan'))
return form(
{'vlanform': vlan, 'action_name': 'Supprimer'},
'machines/machine.html',
request
)
@login_required
@can_create(Nas)
def add_nas(request):
nas = NasForm(request.POST or None)
if nas.is_valid():
nas.save()
messages.success(request, "Cet enregistrement nas a été ajouté")
return redirect(reverse('machines:index-nas'))
return form(
{'nasform': nas, 'action_name': 'Créer'},
'machines/machine.html',
request
)
@login_required
@can_edit(Nas)
def edit_nas(request, nas_instance, nasid):
nas = NasForm(request.POST or None, instance=nas_instance)
if nas.is_valid():
if nas.changed_data:
nas.save()
messages.success(request, "Nas modifié")
return redirect(reverse('machines:index-nas'))
return form(
{'nasform': nas, 'action_name': 'Editer'},
'machines/machine.html',
request
)
@login_required
@can_delete_set(Nas)
def del_nas(request, instances):
nas = DelNasForm(request.POST or None, instances=instances)
if nas.is_valid():
nas_dels = nas.cleaned_data['nas']
for nas_del in nas_dels:
try:
nas_del.delete()
messages.success(request, "Le nas a été supprimé")
except ProtectedError:
messages.error(
request,
("Erreur le Nas suivant %s ne peut être supprimé"
% nas_del)
)
return redirect(reverse('machines:index-nas'))
return form(
{'nasform': nas, 'action_name': 'Supprimer'},
'machines/machine.html',
request
)
@login_required
@can_view_all(Machine)
def index(request):
pagination_large_number = (GeneralOption
.get_cached_value('pagination_large_number'))
machines_list = (Machine.objects
.select_related('user')
.prefetch_related('interface_set__domain__extension')
.prefetch_related('interface_set__ipv4__ip_type')
.prefetch_related(
'interface_set__type__ip_type__extension'
).prefetch_related(
'interface_set__domain__related_domain__extension'
).prefetch_related('interface_set__ipv6list'))
machines_list = SortTable.sort(
machines_list,
request.GET.get('col'),
request.GET.get('order'),
SortTable.MACHINES_INDEX
)
machines_list = re2o_paginator(
request,
machines_list,
pagination_large_number
)
return render(
request,
'machines/index.html',
{'machines_list': machines_list}
)
@login_required
@can_view_all(IpType)
def index_iptype(request):
iptype_list = (IpType.objects
.select_related('extension')
.select_related('vlan')
.order_by('type'))
return render(
request,
'machines/index_iptype.html',
{'iptype_list': iptype_list}
)
@login_required
@can_view_all(Vlan)
def index_vlan(request):
vlan_list = Vlan.objects.prefetch_related('iptype_set').order_by('vlan_id')
return render(
request,
'machines/index_vlan.html',
{'vlan_list': vlan_list}
)
@login_required
@can_view_all(MachineType)
def index_machinetype(request):
machinetype_list = (MachineType.objects
.select_related('ip_type')
.order_by('type'))
return render(
request,
'machines/index_machinetype.html',
{'machinetype_list': machinetype_list}
)
@login_required
@can_view_all(Nas)
def index_nas(request):
nas_list = (Nas.objects
.select_related('machine_type')
.select_related('nas_type')
.order_by('name'))
return render(request, 'machines/index_nas.html', {'nas_list': nas_list})
@login_required
@can_view_all(SOA)
@can_view_all(Mx)
@can_view_all(Ns)
@can_view_all(Txt)
@can_view_all(Srv)
@can_view_all(Extension)
def index_extension(request):
extension_list = (Extension.objects
.select_related('origin')
.select_related('soa')
.order_by('name'))
soa_list = SOA.objects.order_by('name')
mx_list = (Mx.objects
.order_by('zone')
.select_related('zone')
.select_related('name__extension'))
ns_list = (Ns.objects
.order_by('zone')
.select_related('zone')
.select_related('ns__extension'))
txt_list = Txt.objects.all().select_related('zone')
srv_list = (Srv.objects
.all()
.select_related('extension')
.select_related('target__extension'))
return render(
request,
'machines/index_extension.html',
{
'extension_list': extension_list,
'soa_list': soa_list,
'mx_list': mx_list,
'ns_list': ns_list,
'txt_list': txt_list,
'srv_list': srv_list
}
)
@login_required
@can_edit(Interface)
def index_alias(request, interface, interfaceid):
alias_list = Domain.objects.filter(
cname=Domain.objects.filter(interface_parent=interface)
).order_by('name')
return render(
request,
'machines/index_alias.html',
{'alias_list': alias_list, 'interface_id': interfaceid}
)
@login_required
@can_edit(Interface)
def index_ipv6(request, interface, interfaceid):
ipv6_list = Ipv6List.objects.filter(interface=interface)
return render(
request,
'machines/index_ipv6.html',
{'ipv6_list': ipv6_list, 'interface_id': interfaceid}
)
@login_required
@can_view_all(Service)
def index_service(request):
service_list = (Service.objects
.prefetch_related(
'service_link_set__server__domain__extension'
).all())
servers_list = (Service_link.objects
.select_related('server__domain__extension')
.select_related('service')
.all())
return render(
request,
'machines/index_service.html',
{'service_list': service_list, 'servers_list': servers_list}
)
@login_required
@can_view_all(OuverturePortList)
def index_portlist(request):
port_list = (OuverturePortList.objects
.prefetch_related('ouvertureport_set')
.prefetch_related('interface_set__domain__extension')
.prefetch_related('interface_set__machine__user')
.order_by('name'))
return render(
request,
"machines/index_portlist.html",
{'port_list': port_list}
)
@login_required
@can_edit(OuverturePortList)
def edit_portlist(request, ouvertureportlist_instance, ouvertureportlistid):
port_list = EditOuverturePortListForm(
request.POST or None,
instance=ouvertureportlist_instance
)
port_formset = modelformset_factory(
OuverturePort,
fields=('begin', 'end', 'protocole', 'io'),
extra=0,
can_delete=True,
min_num=1,
validate_min=True,
)(
request.POST or None,
queryset=ouvertureportlist_instance.ouvertureport_set.all()
)
if port_list.is_valid() and port_formset.is_valid():
if port_list.changed_data:
pl = port_list.save()
else:
pl = ouvertureportlist_instance
instances = port_formset.save(commit=False)
for to_delete in port_formset.deleted_objects:
to_delete.delete()
for port in instances:
port.port_list = pl
port.save()
messages.success(request, "Liste de ports modifiée")
return redirect(reverse('machines:index-portlist'))
return form(
{'port_list': port_list, 'ports': port_formset},
'machines/edit_portlist.html',
request
)
@login_required
@can_delete(OuverturePortList)
def del_portlist(request, port_list_instance, ouvertureportlistid):
port_list_instance.delete()
messages.success(request, "La liste de ports a été supprimée")
return redirect(reverse('machines:index-portlist'))
@login_required
@can_create(OuverturePortList)
def add_portlist(request):
port_list = EditOuverturePortListForm(request.POST or None)
port_formset = modelformset_factory(
OuverturePort,
fields=('begin', 'end', 'protocole', 'io'),
extra=0,
can_delete=True,
min_num=1,
validate_min=True,
)(request.POST or None, queryset=OuverturePort.objects.none())
if port_list.is_valid() and port_formset.is_valid():
pl = port_list.save()
instances = port_formset.save(commit=False)
for to_delete in port_formset.deleted_objects:
to_delete.delete()
for port in instances:
port.port_list = pl
port.save()
messages.success(request, "Liste de ports créée")
return redirect(reverse('machines:index-portlist'))
return form(
{'port_list': port_list, 'ports': port_formset},
'machines/edit_portlist.html',
request
)
port_list = EditOuverturePortListForm(request.POST or None)
if port_list.is_valid():
port_list.save()
messages.success(request, "Liste de ports créée")
return redirect(reverse('machines:index-portlist'))
return form(
{'machineform': port_list, 'action_name': 'Créer'},
'machines/machine.html',
request
)
@login_required
@can_create(OuverturePort)
@can_edit(Interface)
def configure_ports(request, interface_instance, interfaceid):
if not interface_instance.may_have_port_open():
messages.error(
request,
("Attention, l'ipv4 n'est pas publique, l'ouverture n'aura pas "
"d'effet en v4")
)
interface = EditOuverturePortConfigForm(
request.POST or None,
instance=interface_instance
)
if interface.is_valid():
if interface.changed_data:
interface.save()
messages.success(request, "Configuration des ports mise à jour.")
return redirect(reverse('machines:index'))
return form(
{'interfaceform': interface, 'action_name': 'Editer la configuration'},
'machines/machine.html',
request
)
""" Framework Rest """
class JSONResponse(HttpResponse):
def __init__(self, data, **kwargs):
content = JSONRenderer().render(data)
kwargs['content_type'] = 'application/json'
super(JSONResponse, self).__init__(content, **kwargs)
@csrf_exempt
@login_required
@permission_required('machines.serveur')
def mac_ip_list(request):
interfaces = all_active_assigned_interfaces()
seria = InterfaceSerializer(interfaces, many=True)
return seria.data
@csrf_exempt
@login_required
@permission_required('machines.serveur')
def full_mac_ip_list(request):
interfaces = all_active_assigned_interfaces(full=True)
seria = FullInterfaceSerializer(interfaces, many=True)
return seria.data
@csrf_exempt
@login_required
@permission_required('machines.serveur')
def alias(request):
alias = (Domain.objects
.filter(interface_parent=None)
.filter(
cname__in=Domain.objects.filter(
interface_parent__in=Interface.objects.exclude(ipv4=None)
)
).select_related('extension')
.select_related('cname__extension'))
seria = DomainSerializer(alias, many=True)
return JSONResponse(seria.data)
@csrf_exempt
@login_required
@permission_required('machines.serveur')
def corresp(request):
type = IpType.objects.all().select_related('extension')
seria = TypeSerializer(type, many=True)
return JSONResponse(seria.data)
@csrf_exempt
@login_required
@permission_required('machines.serveur')
def mx(request):
mx = (Mx.objects.all()
.select_related('zone')
.select_related('name__extension'))
seria = MxSerializer(mx, many=True)
return JSONResponse(seria.data)
@csrf_exempt
@login_required
@permission_required('machines.serveur')
def txt(request):
txt = Txt.objects.all().select_related('zone')
seria = TxtSerializer(txt, many=True)
return JSONResponse(seria.data)
@csrf_exempt
@login_required
@permission_required('machines.serveur')
def srv(request):
srv = (Srv.objects
.all()
.select_related('extension')
.select_related('target__extension'))
seria = SrvSerializer(srv, many=True)
return JSONResponse(seria.data)
@csrf_exempt
@login_required
@permission_required('machines.serveur')
def ns(request):
ns = (Ns.objects
.exclude(
ns__in=Domain.objects.filter(
interface_parent__in=Interface.objects.filter(ipv4=None)
)
).select_related('zone')
.select_related('ns__extension'))
seria = NsSerializer(ns, many=True)
return JSONResponse(seria.data)
@csrf_exempt
@login_required
@permission_required('machines.serveur')
def zones(request):
zones = Extension.objects.all().select_related('origin')
seria = ExtensionSerializer(zones, many=True)
return JSONResponse(seria.data)
@csrf_exempt
@login_required
@permission_required('machines.serveur')
def mac_ip(request):
seria = mac_ip_list(request)
return JSONResponse(seria)
@csrf_exempt
@login_required
@permission_required('machines.serveur')
def mac_ip_dns(request):
seria = full_mac_ip_list(request)
return JSONResponse(seria)
@csrf_exempt
@login_required
@permission_required('machines.serveur')
def service_servers(request):
service_link = (Service_link.objects
.all()
.select_related('server__domain')
.select_related('service'))
seria = ServiceServersSerializer(service_link, many=True)
return JSONResponse(seria.data)
@csrf_exempt
@login_required
@permission_required('machines.serveur')
def ouverture_ports(request):
r = {'ipv4': {}, 'ipv6': {}}
for o in (OuverturePortList.objects
.all()
.prefetch_related('ouvertureport_set')
.prefetch_related('interface_set', 'interface_set__ipv4')):
pl = {
"tcp_in": set(map(
str,
o.ouvertureport_set.filter(
protocole=OuverturePort.TCP,
io=OuverturePort.IN
)
)),
"tcp_out": set(map(
str,
o.ouvertureport_set.filter(
protocole=OuverturePort.TCP,
io=OuverturePort.OUT
)
)),
"udp_in": set(map(
str,
o.ouvertureport_set.filter(
protocole=OuverturePort.UDP,
io=OuverturePort.IN
)
)),
"udp_out": set(map(
str,
o.ouvertureport_set.filter(
protocole=OuverturePort.UDP,
io=OuverturePort.OUT
)
)),
}
for i in filter_active_interfaces(o.interface_set):
if i.may_have_port_open():
d = r['ipv4'].get(i.ipv4.ipv4, {})
d["tcp_in"] = (d.get("tcp_in", set())
.union(pl["tcp_in"]))
d["tcp_out"] = (d.get("tcp_out", set())
.union(pl["tcp_out"]))
d["udp_in"] = (d.get("udp_in", set())
.union(pl["udp_in"]))
d["udp_out"] = (d.get("udp_out", set())
.union(pl["udp_out"]))
r['ipv4'][i.ipv4.ipv4] = d
if i.ipv6():
for ipv6 in i.ipv6():
d = r['ipv6'].get(ipv6.ipv6, {})
d["tcp_in"] = (d.get("tcp_in", set())
.union(pl["tcp_in"]))
d["tcp_out"] = (d.get("tcp_out", set())
.union(pl["tcp_out"]))
d["udp_in"] = (d.get("udp_in", set())
.union(pl["udp_in"]))
d["udp_out"] = (d.get("udp_out", set())
.union(pl["udp_out"]))
r['ipv6'][ipv6.ipv6] = d
return JSONResponse(r)
@csrf_exempt
@login_required
@permission_required('machines.serveur')
def regen_achieved(request):
obj = (Service_link.objects
.filter(
service__in=Service.objects.filter(
service_type=request.POST['service']
),
server__in=Interface.objects.filter(
domain__in=Domain.objects.filter(
name=request.POST['server']
)
)
))
if obj:
obj.first().done_regen()
return HttpResponse("Ok")