Compare commits
114 Commits
Author | SHA1 | Date | |
---|---|---|---|
6c5434ee20 | |||
8e0c795791 | |||
1fd8d105e6 | |||
fe4df4f70a | |||
650e62f44f | |||
f8451b0c0a | |||
3af075e039 | |||
26d45b1e85 | |||
9b6c476bf9 | |||
c5a1557800 | |||
9d476fa9af | |||
9142aaf78e | |||
b258b6578c | |||
289540f576 | |||
26a3f5fcc0 | |||
18ea220102 | |||
3c01985e20 | |||
275d2673b4 | |||
746aa9b4a6 | |||
c13bec47b8 | |||
9953d11fd8 | |||
b2ee468871 | |||
dd41d09b43 | |||
abfa6c989f | |||
bb3d964b89 | |||
6bbc7a3a84 | |||
17b1a5022d | |||
e38d646e8e | |||
bb298e7a01 | |||
98840382b9 | |||
b8ff0a1d43 | |||
15b097bd3e | |||
e0b34b8c67 | |||
3aad44d68c | |||
6658d069fb | |||
52f097d4a2 | |||
f4e9ebcfb5 | |||
057728b774 | |||
5b618851c0 | |||
9f531ce0f7 | |||
dd732d7bc2 | |||
05bb40adb1 | |||
240326ef37 | |||
c49fa313ed | |||
ff6bd95fce | |||
0def662e53 | |||
49b7c267b9 | |||
02f30f3a68 | |||
e2cc9386fb | |||
43b8b36951 | |||
4d320f34d5 | |||
676ca798cd | |||
60428d5639 | |||
fd55ec220c | |||
73b07a7181 | |||
1f3d9463f9 | |||
8678ad92ce | |||
5b34df1471 | |||
3d063a4b35 | |||
f924e76adf | |||
604ff3b76d | |||
96545135cb | |||
474ca9e78f | |||
12401f2a3f | |||
528bc17eb8 | |||
4e31218ce6 | |||
d1b70ba2d4 | |||
ff0bc9757a | |||
a1e0c52825 | |||
45889c3811 | |||
71d8ac10ac | |||
744ed91e2a | |||
b1bcfcbc4e | |||
a7a5d13637 | |||
5d4ecb7f9e | |||
69dd87689c | |||
9fab9a3434 | |||
b69a97d2ca | |||
8176ef8499 | |||
eb5cc88b25 | |||
f2731d3fe6 | |||
6f4d025cb7 | |||
222ede2c4b | |||
5304c8f901 | |||
28a26288c9 | |||
53d759e263 | |||
6879412e2b | |||
a89d2e035c | |||
d5c92e9a7d | |||
c7df608696 | |||
eee07f703a | |||
6e7d5a6f59 | |||
752f592e58 | |||
f637de88f0 | |||
a5da38203f | |||
14c0d17704 | |||
a572d5f5de | |||
3673196c16 | |||
9874cef369 | |||
1c4b6741ac | |||
b18e4aaf92 | |||
45824ba4f3 | |||
5944086435 | |||
a2e33c166d | |||
9ab202f921 | |||
cca79b5dbd | |||
61eecdd343 | |||
ce6fe5cb83 | |||
8f119ede13 | |||
edb61f3d90 | |||
f19d650412 | |||
0dec4d8df4 | |||
22186b267d | |||
020e0adeb4 |
7
.github/workflows/push.yml
vendored
7
.github/workflows/push.yml
vendored
@ -14,9 +14,12 @@ jobs:
|
|||||||
name: Checks syntax of our code
|
name: Checks syntax of our code
|
||||||
steps:
|
steps:
|
||||||
- uses: actions/checkout@v2
|
- uses: actions/checkout@v2
|
||||||
|
with:
|
||||||
|
# Full git history is needed to get a proper list of changed files within `super-linter`
|
||||||
|
fetch-depth: 0
|
||||||
- uses: actions/setup-python@v2
|
- uses: actions/setup-python@v2
|
||||||
- name: Lint Code Base
|
- name: Lint Code Base
|
||||||
uses: github/super-linter@v3
|
uses: github/super-linter@v4
|
||||||
env:
|
env:
|
||||||
DEFAULT_BRANCH: develop
|
DEFAULT_BRANCH: develop
|
||||||
GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }}
|
GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }}
|
||||||
@ -39,7 +42,7 @@ jobs:
|
|||||||
build_cmd:
|
build_cmd:
|
||||||
- ./build-latest.sh
|
- ./build-latest.sh
|
||||||
- PRERELEASE=true ./build-latest.sh
|
- PRERELEASE=true ./build-latest.sh
|
||||||
- ./build-next.sh
|
- ./build.sh feature
|
||||||
- ./build.sh develop
|
- ./build.sh develop
|
||||||
docker_from:
|
docker_from:
|
||||||
- '' # use the default of the build script
|
- '' # use the default of the build script
|
||||||
|
2
.github/workflows/release.yml
vendored
2
.github/workflows/release.yml
vendored
@ -14,7 +14,7 @@ jobs:
|
|||||||
build_cmd:
|
build_cmd:
|
||||||
- ./build-latest.sh
|
- ./build-latest.sh
|
||||||
- PRERELEASE=true ./build-latest.sh
|
- PRERELEASE=true ./build-latest.sh
|
||||||
- ./build-next.sh
|
- ./build.sh feature
|
||||||
- ./build.sh develop
|
- ./build.sh develop
|
||||||
fail-fast: false
|
fail-fast: false
|
||||||
runs-on: ubuntu-latest
|
runs-on: ubuntu-latest
|
||||||
|
3
.gitignore
vendored
3
.gitignore
vendored
@ -7,6 +7,9 @@ configuration/*
|
|||||||
!configuration/configuration.py
|
!configuration/configuration.py
|
||||||
!configuration/extra.py
|
!configuration/extra.py
|
||||||
configuration/ldap/*
|
configuration/ldap/*
|
||||||
|
!configuration/ldap/extra.py
|
||||||
!configuration/ldap/ldap_config.py
|
!configuration/ldap/ldap_config.py
|
||||||
|
!configuration/logging.py
|
||||||
|
!configuration/plugins.py
|
||||||
prometheus.yml
|
prometheus.yml
|
||||||
super-linter.log
|
super-linter.log
|
||||||
|
@ -11,7 +11,7 @@ RUN apk add --no-cache \
|
|||||||
jpeg-dev \
|
jpeg-dev \
|
||||||
libevent-dev \
|
libevent-dev \
|
||||||
libffi-dev \
|
libffi-dev \
|
||||||
libressl-dev \
|
openssl-dev \
|
||||||
libxslt-dev \
|
libxslt-dev \
|
||||||
musl-dev \
|
musl-dev \
|
||||||
openldap-dev \
|
openldap-dev \
|
||||||
@ -45,12 +45,11 @@ RUN apk add --no-cache \
|
|||||||
libevent \
|
libevent \
|
||||||
libffi \
|
libffi \
|
||||||
libjpeg-turbo \
|
libjpeg-turbo \
|
||||||
libressl \
|
openssl \
|
||||||
libxslt \
|
libxslt \
|
||||||
postgresql-libs \
|
postgresql-libs \
|
||||||
python3 \
|
python3 \
|
||||||
py3-pip \
|
py3-pip \
|
||||||
ttf-ubuntu-font-family \
|
|
||||||
unit \
|
unit \
|
||||||
unit-python3
|
unit-python3
|
||||||
|
|
||||||
@ -75,6 +74,8 @@ WORKDIR /opt/netbox/netbox
|
|||||||
# to g+w so that pictures can be uploaded to netbox.
|
# to g+w so that pictures can be uploaded to netbox.
|
||||||
RUN mkdir -p static /opt/unit/state/ /opt/unit/tmp/ \
|
RUN mkdir -p static /opt/unit/state/ /opt/unit/tmp/ \
|
||||||
&& chmod -R g+w media /opt/unit/ \
|
&& chmod -R g+w media /opt/unit/ \
|
||||||
|
&& cd /opt/netbox/ && /opt/netbox/venv/bin/python -m mkdocs build \
|
||||||
|
--config-file /opt/netbox/mkdocs.yml --site-dir /opt/netbox/netbox/project-static/docs/ \
|
||||||
&& SECRET_KEY="dummy" /opt/netbox/venv/bin/python /opt/netbox/netbox/manage.py collectstatic --no-input
|
&& SECRET_KEY="dummy" /opt/netbox/venv/bin/python /opt/netbox/netbox/manage.py collectstatic --no-input
|
||||||
|
|
||||||
ENTRYPOINT [ "/opt/netbox/docker-entrypoint.sh" ]
|
ENTRYPOINT [ "/opt/netbox/docker-entrypoint.sh" ]
|
||||||
|
@ -134,8 +134,7 @@ It runs NetBox's own unit tests and ensures that all initializers work:
|
|||||||
IMAGE=netboxcommunity/netbox:latest ./test.sh
|
IMAGE=netboxcommunity/netbox:latest ./test.sh
|
||||||
```
|
```
|
||||||
|
|
||||||
## About
|
## Support
|
||||||
|
|
||||||
This repository is currently maintained and funded by [nxt][nxt].
|
This repository is currently maintained by the community.
|
||||||
|
Please consider sponsoring the maintainers of this project.
|
||||||
[nxt]: https://nxt.engineering/en/
|
|
||||||
|
@ -1,39 +0,0 @@
|
|||||||
#!/bin/bash
|
|
||||||
# Builds develop, develop-* and master branches of NetBox
|
|
||||||
|
|
||||||
echo "▶️ $0 $*"
|
|
||||||
|
|
||||||
###
|
|
||||||
# Checking for the presence of GITHUB_OAUTH_CLIENT_ID
|
|
||||||
# and GITHUB_OAUTH_CLIENT_SECRET
|
|
||||||
###
|
|
||||||
if [ -n "${GITHUB_OAUTH_CLIENT_ID}" ] && [ -n "${GITHUB_OAUTH_CLIENT_SECRET}" ]; then
|
|
||||||
echo "🗝 Performing authenticated Github API calls."
|
|
||||||
GITHUB_OAUTH_PARAMS="client_id=${GITHUB_OAUTH_CLIENT_ID}&client_secret=${GITHUB_OAUTH_CLIENT_SECRET}"
|
|
||||||
else
|
|
||||||
echo "🕶 Performing unauthenticated Github API calls. This might result in lower Github rate limits!"
|
|
||||||
GITHUB_OAUTH_PARAMS=""
|
|
||||||
fi
|
|
||||||
|
|
||||||
###
|
|
||||||
# Calling Github to get the all branches
|
|
||||||
###
|
|
||||||
ORIGINAL_GITHUB_REPO="${SRC_ORG-netbox-community}/${SRC_REPO-netbox}"
|
|
||||||
GITHUB_REPO="${GITHUB_REPO-$ORIGINAL_GITHUB_REPO}"
|
|
||||||
URL_RELEASES="https://api.github.com/repos/${GITHUB_REPO}/branches?${GITHUB_OAUTH_PARAMS}"
|
|
||||||
|
|
||||||
# Composing the JQ commans to extract the most recent version number
|
|
||||||
JQ_NEXT='map(.name) | .[] | scan("^[^v].+") | match("^(develop-).*") | .string'
|
|
||||||
|
|
||||||
CURL="curl -sS"
|
|
||||||
|
|
||||||
# Querying the Github API to fetch all branches
|
|
||||||
NEXT=$($CURL "${URL_RELEASES}" | jq -r "$JQ_NEXT")
|
|
||||||
|
|
||||||
if [ -n "$NEXT" ]; then
|
|
||||||
# shellcheck disable=SC2068
|
|
||||||
./build.sh "${NEXT}" $@
|
|
||||||
else
|
|
||||||
echo "No branch matching 'develop-*' found"
|
|
||||||
echo "::set-output name=skipped::true"
|
|
||||||
fi
|
|
7
build.sh
7
build.sh
@ -49,7 +49,7 @@ if [ "${1}x" == "x" ] || [ "${1}" == "--help" ] || [ "${1}" == "-h" ]; then
|
|||||||
echo " DOCKERFILE The name of Dockerfile to use."
|
echo " DOCKERFILE The name of Dockerfile to use."
|
||||||
echo " Default: Dockerfile"
|
echo " Default: Dockerfile"
|
||||||
echo " DOCKER_FROM The base image to use."
|
echo " DOCKER_FROM The base image to use."
|
||||||
echo " Default: 'alpine:3.13'"
|
echo " Default: 'alpine:3.14'"
|
||||||
echo " DOCKER_TARGET A specific target to build."
|
echo " DOCKER_TARGET A specific target to build."
|
||||||
echo " It's currently not possible to pass multiple targets."
|
echo " It's currently not possible to pass multiple targets."
|
||||||
echo " Default: main ldap"
|
echo " Default: main ldap"
|
||||||
@ -125,7 +125,7 @@ if [ "${2}" != "--push-only" ] && [ -z "${SKIP_GIT}" ]; then
|
|||||||
|
|
||||||
(
|
(
|
||||||
$DRY cd "${NETBOX_PATH}"
|
$DRY cd "${NETBOX_PATH}"
|
||||||
|
# shellcheck disable=SC2030
|
||||||
if [ -n "${HTTP_PROXY}" ]; then
|
if [ -n "${HTTP_PROXY}" ]; then
|
||||||
git config http.proxy "${HTTP_PROXY}"
|
git config http.proxy "${HTTP_PROXY}"
|
||||||
fi
|
fi
|
||||||
@ -157,7 +157,7 @@ fi
|
|||||||
# Determining the value for DOCKER_FROM
|
# Determining the value for DOCKER_FROM
|
||||||
###
|
###
|
||||||
if [ -z "$DOCKER_FROM" ]; then
|
if [ -z "$DOCKER_FROM" ]; then
|
||||||
DOCKER_FROM="alpine:3.13"
|
DOCKER_FROM="alpine:3.14"
|
||||||
fi
|
fi
|
||||||
|
|
||||||
###
|
###
|
||||||
@ -345,6 +345,7 @@ for DOCKER_TARGET in "${DOCKER_TARGETS[@]}"; do
|
|||||||
if [ -n "${DOCKER_FROM}" ]; then
|
if [ -n "${DOCKER_FROM}" ]; then
|
||||||
DOCKER_BUILD_ARGS+=(--build-arg "FROM=${DOCKER_FROM}")
|
DOCKER_BUILD_ARGS+=(--build-arg "FROM=${DOCKER_FROM}")
|
||||||
fi
|
fi
|
||||||
|
# shellcheck disable=SC2031
|
||||||
if [ -n "${HTTP_PROXY}" ]; then
|
if [ -n "${HTTP_PROXY}" ]; then
|
||||||
DOCKER_BUILD_ARGS+=(--build-arg "http_proxy=${HTTP_PROXY}")
|
DOCKER_BUILD_ARGS+=(--build-arg "http_proxy=${HTTP_PROXY}")
|
||||||
DOCKER_BUILD_ARGS+=(--build-arg "https_proxy=${HTTPS_PROXY}")
|
DOCKER_BUILD_ARGS+=(--build-arg "https_proxy=${HTTPS_PROXY}")
|
||||||
|
@ -48,6 +48,8 @@ DATABASE = {
|
|||||||
# Database connection SSLMODE
|
# Database connection SSLMODE
|
||||||
'CONN_MAX_AGE': int(environ.get('DB_CONN_MAX_AGE', '300')),
|
'CONN_MAX_AGE': int(environ.get('DB_CONN_MAX_AGE', '300')),
|
||||||
# Max database connection age
|
# Max database connection age
|
||||||
|
'DISABLE_SERVER_SIDE_CURSORS': environ.get('DB_DISABLE_SERVER_SIDE_CURSORS', 'False').lower() == 'true',
|
||||||
|
# Disable the use of server-side cursors transaction pooling
|
||||||
}
|
}
|
||||||
|
|
||||||
# Redis database settings. Redis is used for caching and for queuing background tasks such as webhook events. A separate
|
# Redis database settings. Redis is used for caching and for queuing background tasks such as webhook events. A separate
|
||||||
@ -106,9 +108,6 @@ BANNER_LOGIN = environ.get('BANNER_LOGIN', '')
|
|||||||
# BASE_PATH = 'netbox/'
|
# BASE_PATH = 'netbox/'
|
||||||
BASE_PATH = environ.get('BASE_PATH', '')
|
BASE_PATH = environ.get('BASE_PATH', '')
|
||||||
|
|
||||||
# Cache timeout in seconds. Set to 0 to dissable caching. Defaults to 900 (15 minutes)
|
|
||||||
CACHE_TIMEOUT = int(environ.get('CACHE_TIMEOUT', 900))
|
|
||||||
|
|
||||||
# Maximum number of days to retain logged changes. Set to 0 to retain changes indefinitely. (Default: 90)
|
# Maximum number of days to retain logged changes. Set to 0 to retain changes indefinitely. (Default: 90)
|
||||||
CHANGELOG_RETENTION = int(environ.get('CHANGELOG_RETENTION', 90))
|
CHANGELOG_RETENTION = int(environ.get('CHANGELOG_RETENTION', 90))
|
||||||
|
|
||||||
@ -210,9 +209,6 @@ REMOTE_AUTH_HEADER = environ.get('REMOTE_AUTH_HEADER', 'HTTP_REMOTE_USER')
|
|||||||
REMOTE_AUTH_AUTO_CREATE_USER = environ.get('REMOTE_AUTH_AUTO_CREATE_USER', 'True').lower() == 'true'
|
REMOTE_AUTH_AUTO_CREATE_USER = environ.get('REMOTE_AUTH_AUTO_CREATE_USER', 'True').lower() == 'true'
|
||||||
REMOTE_AUTH_DEFAULT_GROUPS = list(filter(None, environ.get('REMOTE_AUTH_DEFAULT_GROUPS', '').split(' ')))
|
REMOTE_AUTH_DEFAULT_GROUPS = list(filter(None, environ.get('REMOTE_AUTH_DEFAULT_GROUPS', '').split(' ')))
|
||||||
|
|
||||||
# This determines how often the GitHub API is called to check the latest release of NetBox. Must be at least 1 hour.
|
|
||||||
RELEASE_CHECK_TIMEOUT = int(environ.get('RELEASE_CHECK_TIMEOUT', 24 * 3600))
|
|
||||||
|
|
||||||
# This repository is used to check whether there is a new release of NetBox available. Set to None to disable the
|
# This repository is used to check whether there is a new release of NetBox available. Set to None to disable the
|
||||||
# version check or use the URL below to check for release in the official NetBox repository.
|
# version check or use the URL below to check for release in the official NetBox repository.
|
||||||
# https://api.github.com/repos/netbox-community/netbox/releases
|
# https://api.github.com/repos/netbox-community/netbox/releases
|
||||||
|
28
configuration/ldap/extra.py
Normal file
28
configuration/ldap/extra.py
Normal file
@ -0,0 +1,28 @@
|
|||||||
|
####
|
||||||
|
## This file contains extra configuration options that can't be configured
|
||||||
|
## directly through environment variables.
|
||||||
|
## All vairables set here overwrite any existing found in ldap_config.py
|
||||||
|
####
|
||||||
|
|
||||||
|
# # This Python script inherits all the imports from ldap_config.py
|
||||||
|
# from django_auth_ldap.config import LDAPGroupQuery # Imported since not in ldap_config.py
|
||||||
|
|
||||||
|
# # Sets a base requirement of membetship to netbox-user-ro, netbox-user-rw, or netbox-user-admin.
|
||||||
|
# AUTH_LDAP_REQUIRE_GROUP = (
|
||||||
|
# LDAPGroupQuery("cn=netbox-user-ro,ou=groups,dc=example,dc=com")
|
||||||
|
# | LDAPGroupQuery("cn=netbox-user-rw,ou=groups,dc=example,dc=com")
|
||||||
|
# | LDAPGroupQuery("cn=netbox-user-admin,ou=groups,dc=example,dc=com")
|
||||||
|
# )
|
||||||
|
|
||||||
|
# # Sets LDAP Flag groups variables with example.
|
||||||
|
# AUTH_LDAP_USER_FLAGS_BY_GROUP = {
|
||||||
|
# "is_staff": (
|
||||||
|
# LDAPGroupQuery("cn=netbox-user-ro,ou=groups,dc=example,dc=com")
|
||||||
|
# | LDAPGroupQuery("cn=netbox-user-rw,ou=groups,dc=example,dc=com")
|
||||||
|
# | LDAPGroupQuery("cn=netbox-user-admin,ou=groups,dc=example,dc=com")
|
||||||
|
# ),
|
||||||
|
# "is_superuser": "cn=netbox-user-admin,ou=groups,dc=example,dc=com",
|
||||||
|
# }
|
||||||
|
|
||||||
|
# # Sets LDAP Mirror groups variables with example groups
|
||||||
|
# AUTH_LDAP_MIRROR_GROUPS = ["netbox-user-ro", "netbox-user-rw", "netbox-user-admin"]
|
55
configuration/logging.py
Normal file
55
configuration/logging.py
Normal file
@ -0,0 +1,55 @@
|
|||||||
|
# # Remove first comment(#) on each line to implement this working logging example.
|
||||||
|
# # Add LOGLEVEL environment variable to netbox if you use this example & want a different log level.
|
||||||
|
# from os import environ
|
||||||
|
|
||||||
|
# # Set LOGLEVEL in netbox.env or docker-compose.overide.yml to override a logging level of INFO.
|
||||||
|
# LOGLEVEL = environ.get('LOGLEVEL', 'INFO')
|
||||||
|
|
||||||
|
# LOGGING = {
|
||||||
|
|
||||||
|
# 'version': 1,
|
||||||
|
# 'disable_existing_loggers': False,
|
||||||
|
# 'formatters': {
|
||||||
|
# 'verbose': {
|
||||||
|
# 'format': '{levelname} {asctime} {module} {process:d} {thread:d} {message}',
|
||||||
|
# 'style': '{',
|
||||||
|
# },
|
||||||
|
# 'simple': {
|
||||||
|
# 'format': '{levelname} {message}',
|
||||||
|
# 'style': '{',
|
||||||
|
# },
|
||||||
|
# },
|
||||||
|
# 'filters': {
|
||||||
|
# 'require_debug_false': {
|
||||||
|
# '()': 'django.utils.log.RequireDebugFalse',
|
||||||
|
# },
|
||||||
|
# },
|
||||||
|
# 'handlers': {
|
||||||
|
# 'console': {
|
||||||
|
# 'level': LOGLEVEL,
|
||||||
|
# 'filters': ['require_debug_false'],
|
||||||
|
# 'class': 'logging.StreamHandler',
|
||||||
|
# 'formatter': 'simple'
|
||||||
|
# },
|
||||||
|
# 'mail_admins': {
|
||||||
|
# 'level': 'ERROR',
|
||||||
|
# 'class': 'django.utils.log.AdminEmailHandler',
|
||||||
|
# 'filters': ['require_debug_false']
|
||||||
|
# }
|
||||||
|
# },
|
||||||
|
# 'loggers': {
|
||||||
|
# 'django': {
|
||||||
|
# 'handlers': ['console'],
|
||||||
|
# 'propagate': True,
|
||||||
|
# },
|
||||||
|
# 'django.request': {
|
||||||
|
# 'handlers': ['mail_admins'],
|
||||||
|
# 'level': 'ERROR',
|
||||||
|
# 'propagate': False,
|
||||||
|
# },
|
||||||
|
# 'django_auth_ldap': {
|
||||||
|
# 'handlers': ['console',],
|
||||||
|
# 'level': LOGLEVEL,
|
||||||
|
# }
|
||||||
|
# }
|
||||||
|
# }
|
13
configuration/plugins.py
Normal file
13
configuration/plugins.py
Normal file
@ -0,0 +1,13 @@
|
|||||||
|
# Add your plugins and plugin settings here.
|
||||||
|
# Of course uncomment this file out.
|
||||||
|
|
||||||
|
# To learn how to build images with your required plugins
|
||||||
|
# See https://github.com/netbox-community/netbox-docker/wiki/Using-Netbox-Plugins
|
||||||
|
|
||||||
|
# PLUGINS = ["netbox_bgp"]
|
||||||
|
|
||||||
|
# PLUGINS_CONFIG = {
|
||||||
|
# "netbox_bgp": {
|
||||||
|
# ADD YOUR SETTINGS HERE
|
||||||
|
# }
|
||||||
|
# }
|
5
docker-compose.override.yml.example
Normal file
5
docker-compose.override.yml.example
Normal file
@ -0,0 +1,5 @@
|
|||||||
|
version: '3.4'
|
||||||
|
services:
|
||||||
|
netbox:
|
||||||
|
ports:
|
||||||
|
- 8000:8080
|
@ -20,7 +20,7 @@ services:
|
|||||||
ports:
|
ports:
|
||||||
- 8080
|
- 8080
|
||||||
postgres:
|
postgres:
|
||||||
image: postgres:12-alpine
|
image: postgres:13-alpine
|
||||||
env_file: env/postgres.env
|
env_file: env/postgres.env
|
||||||
redis:
|
redis:
|
||||||
image: redis:6-alpine
|
image: redis:6-alpine
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
version: '3.4'
|
version: '3.4'
|
||||||
services:
|
services:
|
||||||
netbox: &netbox
|
netbox: &netbox
|
||||||
image: netboxcommunity/netbox:${VERSION-latest}
|
image: netboxcommunity/netbox:${VERSION-v3.0}
|
||||||
depends_on:
|
depends_on:
|
||||||
- postgres
|
- postgres
|
||||||
- redis
|
- redis
|
||||||
@ -16,8 +16,6 @@ services:
|
|||||||
- ./reports:/etc/netbox/reports:z,ro
|
- ./reports:/etc/netbox/reports:z,ro
|
||||||
- ./scripts:/etc/netbox/scripts:z,ro
|
- ./scripts:/etc/netbox/scripts:z,ro
|
||||||
- netbox-media-files:/opt/netbox/netbox/media:z
|
- netbox-media-files:/opt/netbox/netbox/media:z
|
||||||
ports:
|
|
||||||
- "8080"
|
|
||||||
netbox-worker:
|
netbox-worker:
|
||||||
<<: *netbox
|
<<: *netbox
|
||||||
depends_on:
|
depends_on:
|
||||||
@ -31,7 +29,7 @@ services:
|
|||||||
|
|
||||||
# postgres
|
# postgres
|
||||||
postgres:
|
postgres:
|
||||||
image: postgres:12-alpine
|
image: postgres:13-alpine
|
||||||
env_file: env/postgres.env
|
env_file: env/postgres.env
|
||||||
volumes:
|
volumes:
|
||||||
- netbox-postgres-data:/var/lib/postgresql/data
|
- netbox-postgres-data:/var/lib/postgresql/data
|
||||||
|
@ -15,7 +15,7 @@ source /opt/netbox/venv/bin/activate
|
|||||||
DB_WAIT_TIMEOUT=${DB_WAIT_TIMEOUT-3}
|
DB_WAIT_TIMEOUT=${DB_WAIT_TIMEOUT-3}
|
||||||
MAX_DB_WAIT_TIME=${MAX_DB_WAIT_TIME-30}
|
MAX_DB_WAIT_TIME=${MAX_DB_WAIT_TIME-30}
|
||||||
CUR_DB_WAIT_TIME=0
|
CUR_DB_WAIT_TIME=0
|
||||||
while ! ./manage.py migrate 2>&1 && [ "${CUR_DB_WAIT_TIME}" -lt "${MAX_DB_WAIT_TIME}" ]; do
|
while ! ./manage.py showmigrations >/dev/null 2>&1 && [ "${CUR_DB_WAIT_TIME}" -lt "${MAX_DB_WAIT_TIME}" ]; do
|
||||||
echo "⏳ Waiting on DB... (${CUR_DB_WAIT_TIME}s / ${MAX_DB_WAIT_TIME}s)"
|
echo "⏳ Waiting on DB... (${CUR_DB_WAIT_TIME}s / ${MAX_DB_WAIT_TIME}s)"
|
||||||
sleep "${DB_WAIT_TIMEOUT}"
|
sleep "${DB_WAIT_TIMEOUT}"
|
||||||
CUR_DB_WAIT_TIME=$((CUR_DB_WAIT_TIME + DB_WAIT_TIMEOUT))
|
CUR_DB_WAIT_TIME=$((CUR_DB_WAIT_TIME + DB_WAIT_TIMEOUT))
|
||||||
@ -24,6 +24,17 @@ if [ "${CUR_DB_WAIT_TIME}" -ge "${MAX_DB_WAIT_TIME}" ]; then
|
|||||||
echo "❌ Waited ${MAX_DB_WAIT_TIME}s or more for the DB to become ready."
|
echo "❌ Waited ${MAX_DB_WAIT_TIME}s or more for the DB to become ready."
|
||||||
exit 1
|
exit 1
|
||||||
fi
|
fi
|
||||||
|
# Check if update is needed
|
||||||
|
if ! ./manage.py migrate --check >/dev/null 2>&1; then
|
||||||
|
echo "⚙️ Applying database migrations"
|
||||||
|
./manage.py migrate --no-input
|
||||||
|
echo "⚙️ Running trace_paths"
|
||||||
|
./manage.py trace_paths --no-input
|
||||||
|
echo "⚙️ Removing stale content types"
|
||||||
|
./manage.py remove_stale_contenttypes --no-input
|
||||||
|
echo "⚙️ Removing expired user sessions"
|
||||||
|
./manage.py clearsessions
|
||||||
|
fi
|
||||||
|
|
||||||
# Create Superuser if required
|
# Create Superuser if required
|
||||||
if [ "$SKIP_SUPERUSER" == "true" ]; then
|
if [ "$SKIP_SUPERUSER" == "true" ]; then
|
||||||
@ -68,6 +79,4 @@ echo "✅ Initialisation is done."
|
|||||||
|
|
||||||
# Launch whatever is passed by docker
|
# Launch whatever is passed by docker
|
||||||
# (i.e. the RUN instruction in the Dockerfile)
|
# (i.e. the RUN instruction in the Dockerfile)
|
||||||
#
|
exec "$@"
|
||||||
# shellcheck disable=SC2068
|
|
||||||
exec $@
|
|
||||||
|
@ -10,12 +10,12 @@
|
|||||||
## Examples:
|
## Examples:
|
||||||
|
|
||||||
# - name: link_to_repo
|
# - name: link_to_repo
|
||||||
# text: 'Link to Netbox Docker'
|
# link_text: 'Link to Netbox Docker'
|
||||||
# url: 'https://github.com/netbox-community/netbox-docker'
|
# link_url: 'https://github.com/netbox-community/netbox-docker'
|
||||||
# new_window: False
|
# new_window: False
|
||||||
# content_type: device
|
# content_type: device
|
||||||
# - name: link_to_localhost
|
# - name: link_to_localhost
|
||||||
# text: 'Link to localhost'
|
# link_text: 'Link to localhost'
|
||||||
# url: 'http://localhost'
|
# link_url: 'http://localhost'
|
||||||
# new_window: True
|
# new_window: True
|
||||||
# content_type: device
|
# content_type: device
|
||||||
|
@ -42,3 +42,12 @@
|
|||||||
# position: 3
|
# position: 3
|
||||||
# custom_field_data:
|
# custom_field_data:
|
||||||
# text_field: Description
|
# text_field: Description
|
||||||
|
# - name: server04
|
||||||
|
# device_role: server
|
||||||
|
# device_type: Other
|
||||||
|
# site: SING 1
|
||||||
|
# location: cage 101
|
||||||
|
# face: front
|
||||||
|
# position: 3
|
||||||
|
# custom_field_data:
|
||||||
|
# text_field: Description
|
||||||
|
@ -1,35 +1,9 @@
|
|||||||
## To list all permissions, run:
|
|
||||||
##
|
|
||||||
## docker-compose run --rm --entrypoint /bin/bash netbox
|
|
||||||
## $ ./manage.py migrate
|
|
||||||
## $ ./manage.py shell
|
|
||||||
## > from django.contrib.auth.models import Permission
|
|
||||||
## > print('\n'.join([p.codename for p in Permission.objects.all()]))
|
|
||||||
##
|
|
||||||
## Permission lists support wildcards. See the examples below.
|
|
||||||
##
|
|
||||||
## Examples:
|
|
||||||
|
|
||||||
# applications:
|
# applications:
|
||||||
# users:
|
# users:
|
||||||
# - technical_user
|
# - technical_user
|
||||||
# readers:
|
# readers:
|
||||||
# users:
|
# users:
|
||||||
# - reader
|
# - reader
|
||||||
# writers:
|
# writers:
|
||||||
# users:
|
# users:
|
||||||
# - writer
|
# - writer
|
||||||
# permissions:
|
|
||||||
# - delete_device
|
|
||||||
# - delete_virtualmachine
|
|
||||||
# - add_*
|
|
||||||
# - change_*
|
|
||||||
# vm_managers:
|
|
||||||
# permissions:
|
|
||||||
# - '*_virtualmachine'
|
|
||||||
# device_managers:
|
|
||||||
# permissions:
|
|
||||||
# - '*device*'
|
|
||||||
# creators:
|
|
||||||
# permissions:
|
|
||||||
# - add_*
|
|
||||||
|
48
initializers/object_permissions.yml
Normal file
48
initializers/object_permissions.yml
Normal file
@ -0,0 +1,48 @@
|
|||||||
|
# all.ro:
|
||||||
|
# actions:
|
||||||
|
# - view
|
||||||
|
# description: 'Read Only for All Objects'
|
||||||
|
# enabled: true
|
||||||
|
# groups:
|
||||||
|
# - applications
|
||||||
|
# - readers
|
||||||
|
# object_types: all
|
||||||
|
# users:
|
||||||
|
# - jdoe
|
||||||
|
# all.rw:
|
||||||
|
# actions:
|
||||||
|
# - add
|
||||||
|
# - change
|
||||||
|
# - delete
|
||||||
|
# - view
|
||||||
|
# description: 'Read/Write for All Objects'
|
||||||
|
# enabled: true
|
||||||
|
# groups:
|
||||||
|
# - writers
|
||||||
|
# object_types: all
|
||||||
|
# network_team.rw:
|
||||||
|
# actions:
|
||||||
|
# - add
|
||||||
|
# - change
|
||||||
|
# - delete
|
||||||
|
# - view
|
||||||
|
# description: "Network Team Permissions"
|
||||||
|
# enabled: true
|
||||||
|
# object_types:
|
||||||
|
# circuits:
|
||||||
|
# - circuit
|
||||||
|
# - circuittermination
|
||||||
|
# - circuittype
|
||||||
|
# - provider
|
||||||
|
# dcim: all
|
||||||
|
# ipam:
|
||||||
|
# - aggregate
|
||||||
|
# - ipaddress
|
||||||
|
# - prefix
|
||||||
|
# - rir
|
||||||
|
# - role
|
||||||
|
# - routetarget
|
||||||
|
# - service
|
||||||
|
# - vlan
|
||||||
|
# - vlangroup
|
||||||
|
# - vrf
|
@ -2,4 +2,4 @@
|
|||||||
# site: AMS 1
|
# site: AMS 1
|
||||||
# - name: power panel SING 1
|
# - name: power panel SING 1
|
||||||
# site: SING 1
|
# site: SING 1
|
||||||
# rack_group: cage 101
|
# location: cage 101
|
||||||
|
@ -32,7 +32,7 @@
|
|||||||
# text_field: Description
|
# text_field: Description
|
||||||
# - site: SING 1
|
# - site: SING 1
|
||||||
# name: rack-03
|
# name: rack-03
|
||||||
# group: cage 101
|
# location: cage 101
|
||||||
# role: Role 3
|
# role: Role 3
|
||||||
# type: 4-post-cabinet
|
# type: 4-post-cabinet
|
||||||
# width: 19
|
# width: 19
|
||||||
|
@ -1,4 +0,0 @@
|
|||||||
# - name: Super Secret Passwords
|
|
||||||
# slug: super-secret
|
|
||||||
# - name: SNMP Communities
|
|
||||||
# slug: snmp
|
|
@ -20,6 +20,7 @@
|
|||||||
# status: active
|
# status: active
|
||||||
# facility: Amsterdam 3
|
# facility: Amsterdam 3
|
||||||
# asn: 67890
|
# asn: 67890
|
||||||
|
# tenant: tenant1
|
||||||
# custom_field_data:
|
# custom_field_data:
|
||||||
# text_field: Description for AMS3
|
# text_field: Description for AMS3
|
||||||
# - name: SING 1
|
# - name: SING 1
|
||||||
@ -28,5 +29,6 @@
|
|||||||
# status: active
|
# status: active
|
||||||
# facility: Singapore 1
|
# facility: Singapore 1
|
||||||
# asn: 09876
|
# asn: 09876
|
||||||
|
# tenant: tenant2
|
||||||
# custom_field_data:
|
# custom_field_data:
|
||||||
# text_field: Description for SING1
|
# text_field: Description for SING1
|
||||||
|
@ -1,23 +1,14 @@
|
|||||||
## To list all permissions, run:
|
|
||||||
##
|
|
||||||
## docker-compose run --rm --entrypoint /bin/bash netbox
|
|
||||||
## $ ./manage.py migrate
|
|
||||||
## $ ./manage.py shell
|
|
||||||
## > from django.contrib.auth.models import Permission
|
|
||||||
## > print('\n'.join([p.codename for p in Permission.objects.all()]))
|
|
||||||
##
|
|
||||||
## Permission lists support wildcards. See the examples below.
|
|
||||||
##
|
|
||||||
## Examples:
|
|
||||||
|
|
||||||
# technical_user:
|
# technical_user:
|
||||||
# api_token: 0123456789technicaluser789abcdef01234567 # must be looooong!
|
# api_token: 0123456789technicaluser789abcdef01234567 # must be looooong!
|
||||||
# reader:
|
# reader:
|
||||||
# password: reader
|
# password: reader
|
||||||
# writer:
|
# writer:
|
||||||
# password: writer
|
# password: writer
|
||||||
# permissions:
|
# jdoe:
|
||||||
# - delete_device
|
# first_name: John
|
||||||
# - delete_virtualmachine
|
# last_name: Doe
|
||||||
# - add_*
|
# api_token: 0123456789jdoe789abcdef01234567jdoe
|
||||||
# - change_*
|
# is_active: True
|
||||||
|
# is_superuser: False
|
||||||
|
# is_staff: False
|
||||||
|
# email: john.doe@example.com
|
||||||
|
@ -1,6 +1,24 @@
|
|||||||
# - name: VLAN group 1
|
# - name: VLAN group 1
|
||||||
# site: AMS 1
|
# scope_type: dcim.region
|
||||||
|
# scope: Amsterdam
|
||||||
# slug: vlan-group-1
|
# slug: vlan-group-1
|
||||||
# - name: VLAN group 2
|
# - name: VLAN group 2
|
||||||
# site: AMS 1
|
# scope_type: dcim.site
|
||||||
|
# scope: AMS 1
|
||||||
# slug: vlan-group-2
|
# slug: vlan-group-2
|
||||||
|
# - name: VLAN group 3
|
||||||
|
# scope_type: dcim.location
|
||||||
|
# scope: cage 101
|
||||||
|
# slug: vlan-group-3
|
||||||
|
# - name: VLAN group 4
|
||||||
|
# scope_type: dcim.rack
|
||||||
|
# scope: rack-01
|
||||||
|
# slug: vlan-group-4
|
||||||
|
# - name: VLAN group 5
|
||||||
|
# scope_type: virtualization.cluster
|
||||||
|
# scope: cluster1
|
||||||
|
# slug: vlan-group-5
|
||||||
|
# - name: VLAN group 6
|
||||||
|
# scope_type: virtualization.clustergroup
|
||||||
|
# scope: Group 1
|
||||||
|
# slug: vlan-group-6
|
||||||
|
@ -1,6 +1,7 @@
|
|||||||
{
|
{
|
||||||
"extends": [
|
"extends": [
|
||||||
"config:base"
|
"config:base",
|
||||||
|
":disableDependencyDashboard"
|
||||||
],
|
],
|
||||||
"enabled": true,
|
"enabled": true,
|
||||||
"labels": ["maintenance"],
|
"labels": ["maintenance"],
|
||||||
|
@ -1,4 +1,4 @@
|
|||||||
napalm==3.2.0
|
napalm==3.3.1
|
||||||
ruamel.yaml==0.16.13
|
ruamel.yaml==0.17.16
|
||||||
django-auth-ldap==2.3.0
|
django-auth-ldap==3.0.0
|
||||||
django-storages[azure,boto3,dropbox,google,libcloud,sftp]==1.11.1
|
django-storages[azure,boto3,dropbox,google,libcloud,sftp]==1.11.1
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
import sys
|
import sys
|
||||||
|
|
||||||
from django.contrib.auth.models import User
|
from django.contrib.auth.models import User
|
||||||
from startup_script_utils import load_yaml, set_permissions
|
from startup_script_utils import load_yaml
|
||||||
from users.models import Token
|
from users.models import Token
|
||||||
|
|
||||||
users = load_yaml("/opt/netbox/initializers/users.yml")
|
users = load_yaml("/opt/netbox/initializers/users.yml")
|
||||||
@ -19,6 +19,3 @@ for username, user_details in users.items():
|
|||||||
|
|
||||||
if user_details.get("api_token", 0):
|
if user_details.get("api_token", 0):
|
||||||
Token.objects.create(user=user, key=user_details["api_token"])
|
Token.objects.create(user=user, key=user_details["api_token"])
|
||||||
|
|
||||||
yaml_permissions = user_details.get("permissions", [])
|
|
||||||
set_permissions(user.user_permissions, yaml_permissions)
|
|
||||||
|
@ -1,23 +1,23 @@
|
|||||||
import sys
|
import sys
|
||||||
|
|
||||||
from django.contrib.auth.models import Group, User
|
from startup_script_utils import load_yaml
|
||||||
from startup_script_utils import load_yaml, set_permissions
|
from users.models import AdminGroup, AdminUser
|
||||||
|
|
||||||
groups = load_yaml("/opt/netbox/initializers/groups.yml")
|
groups = load_yaml("/opt/netbox/initializers/groups.yml")
|
||||||
if groups is None:
|
if groups is None:
|
||||||
sys.exit()
|
sys.exit()
|
||||||
|
|
||||||
for groupname, group_details in groups.items():
|
for groupname, group_details in groups.items():
|
||||||
group, created = Group.objects.get_or_create(name=groupname)
|
group, created = AdminGroup.objects.get_or_create(name=groupname)
|
||||||
|
|
||||||
if created:
|
if created:
|
||||||
print("👥 Created group", groupname)
|
print("👥 Created group", groupname)
|
||||||
|
|
||||||
for username in group_details.get("users", []):
|
for username in group_details.get("users", []):
|
||||||
user = User.objects.get(username=username)
|
user = AdminUser.objects.get(username=username)
|
||||||
|
|
||||||
if user:
|
if user:
|
||||||
user.groups.add(group)
|
group.user_set.add(user)
|
||||||
|
print(" 👤 Assigned user %s to group %s" % (username, AdminGroup.name))
|
||||||
|
|
||||||
yaml_permissions = group_details.get("permissions", [])
|
group.save()
|
||||||
set_permissions(group.permissions, yaml_permissions)
|
|
||||||
|
60
startup_scripts/015_object_permissions.py
Normal file
60
startup_scripts/015_object_permissions.py
Normal file
@ -0,0 +1,60 @@
|
|||||||
|
import sys
|
||||||
|
|
||||||
|
from django.contrib.contenttypes.models import ContentType
|
||||||
|
from startup_script_utils import load_yaml
|
||||||
|
from users.models import AdminGroup, AdminUser, ObjectPermission
|
||||||
|
|
||||||
|
object_permissions = load_yaml("/opt/netbox/initializers/object_permissions.yml")
|
||||||
|
|
||||||
|
if object_permissions is None:
|
||||||
|
sys.exit()
|
||||||
|
|
||||||
|
|
||||||
|
for permission_name, permission_details in object_permissions.items():
|
||||||
|
|
||||||
|
object_permission, created = ObjectPermission.objects.get_or_create(
|
||||||
|
name=permission_name,
|
||||||
|
description=permission_details["description"],
|
||||||
|
enabled=permission_details["enabled"],
|
||||||
|
actions=permission_details["actions"],
|
||||||
|
)
|
||||||
|
|
||||||
|
if permission_details.get("object_types", 0):
|
||||||
|
object_types = permission_details["object_types"]
|
||||||
|
|
||||||
|
if object_types == "all":
|
||||||
|
object_permission.object_types.set(ContentType.objects.all())
|
||||||
|
|
||||||
|
else:
|
||||||
|
for app_label, models in object_types.items():
|
||||||
|
if models == "all":
|
||||||
|
app_models = ContentType.objects.filter(app_label=app_label)
|
||||||
|
|
||||||
|
for app_model in app_models:
|
||||||
|
object_permission.object_types.add(app_model.id)
|
||||||
|
else:
|
||||||
|
# There is
|
||||||
|
for model in models:
|
||||||
|
object_permission.object_types.add(
|
||||||
|
ContentType.objects.get(app_label=app_label, model=model)
|
||||||
|
)
|
||||||
|
|
||||||
|
print("🔓 Created object permission", object_permission.name)
|
||||||
|
|
||||||
|
if permission_details.get("groups", 0):
|
||||||
|
for groupname in permission_details["groups"]:
|
||||||
|
group = AdminGroup.objects.filter(name=groupname).first()
|
||||||
|
|
||||||
|
if group:
|
||||||
|
object_permission.groups.add(group)
|
||||||
|
print(" 👥 Assigned group %s object permission of %s" % (groupname, groupname))
|
||||||
|
|
||||||
|
if permission_details.get("users", 0):
|
||||||
|
for username in permission_details["users"]:
|
||||||
|
user = AdminUser.objects.filter(username=username).first()
|
||||||
|
|
||||||
|
if user:
|
||||||
|
object_permission.users.add(user)
|
||||||
|
print(" 👤 Assigned user %s object permission of %s" % (username, groupname))
|
||||||
|
|
||||||
|
object_permission.save()
|
@ -1,9 +1,9 @@
|
|||||||
import sys
|
import sys
|
||||||
|
|
||||||
from dcim.models import RackGroup, Site
|
from dcim.models import Location, Site
|
||||||
from startup_script_utils import load_yaml
|
from startup_script_utils import load_yaml
|
||||||
|
|
||||||
rack_groups = load_yaml("/opt/netbox/initializers/rack_groups.yml")
|
rack_groups = load_yaml("/opt/netbox/initializers/locations.yml")
|
||||||
|
|
||||||
if rack_groups is None:
|
if rack_groups is None:
|
||||||
sys.exit()
|
sys.exit()
|
||||||
@ -17,7 +17,7 @@ for params in rack_groups:
|
|||||||
query = {field: params.pop(assoc)}
|
query = {field: params.pop(assoc)}
|
||||||
params[assoc] = model.objects.get(**query)
|
params[assoc] = model.objects.get(**query)
|
||||||
|
|
||||||
rack_group, created = RackGroup.objects.get_or_create(**params)
|
location, created = Location.objects.get_or_create(**params)
|
||||||
|
|
||||||
if created:
|
if created:
|
||||||
print("🎨 Created rack group", rack_group.name)
|
print("🎨 Created location", location.name)
|
@ -1,6 +1,6 @@
|
|||||||
import sys
|
import sys
|
||||||
|
|
||||||
from dcim.models import Rack, RackGroup, RackRole, Site
|
from dcim.models import Location, Rack, RackRole, Site
|
||||||
from startup_script_utils import load_yaml, pop_custom_fields, set_custom_fields_values
|
from startup_script_utils import load_yaml, pop_custom_fields, set_custom_fields_values
|
||||||
from tenancy.models import Tenant
|
from tenancy.models import Tenant
|
||||||
|
|
||||||
@ -14,7 +14,7 @@ required_assocs = {"site": (Site, "name")}
|
|||||||
optional_assocs = {
|
optional_assocs = {
|
||||||
"role": (RackRole, "name"),
|
"role": (RackRole, "name"),
|
||||||
"tenant": (Tenant, "name"),
|
"tenant": (Tenant, "name"),
|
||||||
"group": (RackGroup, "name"),
|
"location": (Location, "name"),
|
||||||
}
|
}
|
||||||
|
|
||||||
for params in racks:
|
for params in racks:
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
import sys
|
import sys
|
||||||
|
|
||||||
from dcim.models import Device, DeviceRole, DeviceType, Platform, Rack, Site
|
from dcim.models import Device, DeviceRole, DeviceType, Location, Platform, Rack, Site
|
||||||
from startup_script_utils import load_yaml, pop_custom_fields, set_custom_fields_values
|
from startup_script_utils import load_yaml, pop_custom_fields, set_custom_fields_values
|
||||||
from tenancy.models import Tenant
|
from tenancy.models import Tenant
|
||||||
from virtualization.models import Cluster
|
from virtualization.models import Cluster
|
||||||
@ -21,6 +21,7 @@ optional_assocs = {
|
|||||||
"platform": (Platform, "name"),
|
"platform": (Platform, "name"),
|
||||||
"rack": (Rack, "name"),
|
"rack": (Rack, "name"),
|
||||||
"cluster": (Cluster, "name"),
|
"cluster": (Cluster, "name"),
|
||||||
|
"location": (Location, "name"),
|
||||||
}
|
}
|
||||||
|
|
||||||
for params in devices:
|
for params in devices:
|
||||||
|
@ -1,51 +0,0 @@
|
|||||||
import sys
|
|
||||||
|
|
||||||
from dcim.models import Device, DeviceRole, DeviceType, Platform, Rack, Site
|
|
||||||
from startup_script_utils import load_yaml, pop_custom_fields, set_custom_fields_values
|
|
||||||
from tenancy.models import Tenant
|
|
||||||
from virtualization.models import Cluster
|
|
||||||
|
|
||||||
devices = load_yaml("/opt/netbox/initializers/devices.yml")
|
|
||||||
|
|
||||||
if devices is None:
|
|
||||||
sys.exit()
|
|
||||||
|
|
||||||
required_assocs = {
|
|
||||||
"device_role": (DeviceRole, "name"),
|
|
||||||
"device_type": (DeviceType, "model"),
|
|
||||||
"site": (Site, "name"),
|
|
||||||
}
|
|
||||||
|
|
||||||
optional_assocs = {
|
|
||||||
"tenant": (Tenant, "name"),
|
|
||||||
"platform": (Platform, "name"),
|
|
||||||
"rack": (Rack, "name"),
|
|
||||||
"cluster": (Cluster, "name"),
|
|
||||||
}
|
|
||||||
|
|
||||||
for params in devices:
|
|
||||||
custom_field_data = pop_custom_fields(params)
|
|
||||||
|
|
||||||
# primary ips are handled later in `270_primary_ips.py`
|
|
||||||
params.pop("primary_ip4", None)
|
|
||||||
params.pop("primary_ip6", None)
|
|
||||||
|
|
||||||
for assoc, details in required_assocs.items():
|
|
||||||
model, field = details
|
|
||||||
query = {field: params.pop(assoc)}
|
|
||||||
|
|
||||||
params[assoc] = model.objects.get(**query)
|
|
||||||
|
|
||||||
for assoc, details in optional_assocs.items():
|
|
||||||
if assoc in params:
|
|
||||||
model, field = details
|
|
||||||
query = {field: params.pop(assoc)}
|
|
||||||
|
|
||||||
params[assoc] = model.objects.get(**query)
|
|
||||||
|
|
||||||
device, created = Device.objects.get_or_create(**params)
|
|
||||||
|
|
||||||
if created:
|
|
||||||
set_custom_fields_values(device, custom_field_data)
|
|
||||||
|
|
||||||
print("🖥️ Created device", device.name)
|
|
@ -1,6 +1,6 @@
|
|||||||
import sys
|
import sys
|
||||||
|
|
||||||
from dcim.models import Site
|
from django.contrib.contenttypes.models import ContentType
|
||||||
from ipam.models import VLANGroup
|
from ipam.models import VLANGroup
|
||||||
from startup_script_utils import load_yaml, pop_custom_fields, set_custom_fields_values
|
from startup_script_utils import load_yaml, pop_custom_fields, set_custom_fields_values
|
||||||
|
|
||||||
@ -9,7 +9,7 @@ vlan_groups = load_yaml("/opt/netbox/initializers/vlan_groups.yml")
|
|||||||
if vlan_groups is None:
|
if vlan_groups is None:
|
||||||
sys.exit()
|
sys.exit()
|
||||||
|
|
||||||
optional_assocs = {"site": (Site, "name")}
|
optional_assocs = {"scope": (None, "name")}
|
||||||
|
|
||||||
for params in vlan_groups:
|
for params in vlan_groups:
|
||||||
custom_field_data = pop_custom_fields(params)
|
custom_field_data = pop_custom_fields(params)
|
||||||
@ -18,9 +18,20 @@ for params in vlan_groups:
|
|||||||
if assoc in params:
|
if assoc in params:
|
||||||
model, field = details
|
model, field = details
|
||||||
query = {field: params.pop(assoc)}
|
query = {field: params.pop(assoc)}
|
||||||
|
# Get model from Contenttype
|
||||||
params[assoc] = model.objects.get(**query)
|
scope_type = params.pop("scope_type", None)
|
||||||
|
if not scope_type:
|
||||||
|
print(f"VLAN Group '{params['name']}': scope_type is missing from VLAN Group")
|
||||||
|
continue
|
||||||
|
app_label, model = str(scope_type).split(".")
|
||||||
|
ct = ContentType.objects.filter(app_label=app_label, model=model).first()
|
||||||
|
if not ct:
|
||||||
|
print(
|
||||||
|
f"VLAN Group '{params['name']}': ContentType for "
|
||||||
|
+ f"app_label = '{app_label}' and model = '{model}' not found"
|
||||||
|
)
|
||||||
|
continue
|
||||||
|
params["scope_id"] = ct.model_class().objects.get(**query).id
|
||||||
vlan_group, created = VLANGroup.objects.get_or_create(**params)
|
vlan_group, created = VLANGroup.objects.get_or_create(**params)
|
||||||
|
|
||||||
if created:
|
if created:
|
||||||
|
@ -23,7 +23,7 @@ for link in custom_links:
|
|||||||
if link["content_type_id"] is None:
|
if link["content_type_id"] is None:
|
||||||
print(
|
print(
|
||||||
"⚠️ Unable to create Custom Link '{0}': The content_type '{1}' is unknown".format(
|
"⚠️ Unable to create Custom Link '{0}': The content_type '{1}' is unknown".format(
|
||||||
link.name, content_type
|
link.get("name"), content_type
|
||||||
)
|
)
|
||||||
)
|
)
|
||||||
continue
|
continue
|
||||||
|
@ -1,15 +0,0 @@
|
|||||||
import sys
|
|
||||||
from secrets.models import SecretRole
|
|
||||||
|
|
||||||
from startup_script_utils import load_yaml
|
|
||||||
|
|
||||||
secret_roles = load_yaml("/opt/netbox/initializers/secret_roles.yml")
|
|
||||||
|
|
||||||
if secret_roles is None:
|
|
||||||
sys.exit()
|
|
||||||
|
|
||||||
for params in secret_roles:
|
|
||||||
secret_role, created = SecretRole.objects.get_or_create(**params)
|
|
||||||
|
|
||||||
if created:
|
|
||||||
print("🔑 Created Secret Role", secret_role.name)
|
|
@ -1,6 +1,6 @@
|
|||||||
import sys
|
import sys
|
||||||
|
|
||||||
from dcim.models import PowerPanel, RackGroup, Site
|
from dcim.models import Location, PowerPanel, Site
|
||||||
from startup_script_utils import load_yaml, pop_custom_fields, set_custom_fields_values
|
from startup_script_utils import load_yaml, pop_custom_fields, set_custom_fields_values
|
||||||
|
|
||||||
power_panels = load_yaml("/opt/netbox/initializers/power_panels.yml")
|
power_panels = load_yaml("/opt/netbox/initializers/power_panels.yml")
|
||||||
@ -10,7 +10,7 @@ if power_panels is None:
|
|||||||
|
|
||||||
required_assocs = {"site": (Site, "name")}
|
required_assocs = {"site": (Site, "name")}
|
||||||
|
|
||||||
optional_assocs = {"rack_group": (RackGroup, "name")}
|
optional_assocs = {"location": (Location, "name")}
|
||||||
|
|
||||||
for params in power_panels:
|
for params in power_panels:
|
||||||
custom_field_data = pop_custom_fields(params)
|
custom_field_data = pop_custom_fields(params)
|
||||||
|
@ -1,3 +1,2 @@
|
|||||||
from .custom_fields import pop_custom_fields, set_custom_fields_values
|
from .custom_fields import pop_custom_fields, set_custom_fields_values
|
||||||
from .load_yaml import load_yaml
|
from .load_yaml import load_yaml
|
||||||
from .permissions import set_permissions
|
|
||||||
|
@ -1,22 +0,0 @@
|
|||||||
from django.contrib.auth.models import Permission
|
|
||||||
|
|
||||||
|
|
||||||
def set_permissions(subject, permission_filters):
|
|
||||||
if subject is None or permission_filters is None:
|
|
||||||
return
|
|
||||||
subject.clear()
|
|
||||||
for permission_filter in permission_filters:
|
|
||||||
if "*" in permission_filter:
|
|
||||||
permission_filter_regex = "^" + permission_filter.replace("*", ".*") + "$"
|
|
||||||
permissions = Permission.objects.filter(codename__iregex=permission_filter_regex)
|
|
||||||
print(
|
|
||||||
" ⚿ Granting",
|
|
||||||
permissions.count(),
|
|
||||||
"permissions matching '" + permission_filter + "'",
|
|
||||||
)
|
|
||||||
else:
|
|
||||||
permissions = Permission.objects.filter(codename=permission_filter)
|
|
||||||
print(" ⚿ Granting permission", permission_filter)
|
|
||||||
|
|
||||||
for permission in permissions:
|
|
||||||
subject.add(permission)
|
|
Reference in New Issue
Block a user