diff --git a/.gitignore b/.gitignore
index 66a8b13e8..485b46d59 100644
--- a/.gitignore
+++ b/.gitignore
@@ -1,4 +1,5 @@
*.pyc
+*.swp
/netbox/netbox/configuration.py
/netbox/netbox/ldap_config.py
/netbox/reports/*
@@ -6,15 +7,14 @@
/netbox/scripts/*
!/netbox/scripts/__init__.py
/netbox/static
-.idea
+/venv/
/*.sh
!upgrade.sh
fabfile.py
-*.swp
-gunicorn_config.py
gunicorn.py
netbox.log
netbox.pid
.DS_Store
-.vscode
+.idea
.coverage
+.vscode
diff --git a/.travis.yml b/.travis.yml
index 872121c21..8bd352dd5 100644
--- a/.travis.yml
+++ b/.travis.yml
@@ -7,6 +7,8 @@ addons:
language: python
python:
- "3.5"
+ - "3.6"
+ - "3.7"
install:
- pip install -r requirements.txt
- pip install pycodestyle
diff --git a/README.md b/README.md
index 5167c53c4..be69a9e52 100644
--- a/README.md
+++ b/README.md
@@ -1,5 +1,7 @@

+**The [2020 NetBox user survey](https://docs.google.com/forms/d/1OVZuC4kQ-6kJbVf0bDB6vgkL9H96xF6phvYzby23elk/edit) is open!** Your feedback helps guide the project's long-term development.
+
NetBox is an IP address management (IPAM) and data center infrastructure
management (DCIM) tool. Initially conceived by the network engineering team at
[DigitalOcean](https://www.digitalocean.com/), NetBox was developed specifically
@@ -22,7 +24,7 @@ or join us in the #netbox Slack channel on [NetworkToCode](https://networktocode
| **master** | [](https://travis-ci.com/netbox-community/netbox/) |
| **develop** | [](https://travis-ci.com/netbox-community/netbox/) |
-## Screenshots
+### Screenshots

@@ -34,13 +36,13 @@ or join us in the #netbox Slack channel on [NetworkToCode](https://networktocode

-# Installation
+## Installation
Please see [the documentation](http://netbox.readthedocs.io/en/stable/) for
instructions on installing NetBox. To upgrade NetBox, please download the [latest release](https://github.com/netbox-community/netbox/releases)
and run `upgrade.sh`.
-# Providing Feedback
+## Providing Feedback
Feature requests and bug reports must be submitted as GiHub issues. (Please be
sure to use the [appropriate template](https://github.com/netbox-community/netbox/issues/new/choose).)
@@ -49,6 +51,6 @@ For general discussion, please consider joining our [mailing list](https://group
If you are interested in contributing to the development of NetBox, please read
our [contributing guide](CONTRIBUTING.md) prior to beginning any work.
-# Related projects
+## Related projects
Please see [our wiki](https://github.com/netbox-community/netbox/wiki/Community-Contributions) for a list of relevant community projects.
diff --git a/base_requirements.txt b/base_requirements.txt
index ed42b6c08..ab33b1c06 100644
--- a/base_requirements.txt
+++ b/base_requirements.txt
@@ -58,6 +58,10 @@ djangorestframework
# https://github.com/axnsan12/drf-yasg
drf-yasg[validation]
+# WSGI HTTP server
+# https://gunicorn.org/
+gunicorn
+
# Platform-agnostic template rendering engine
# https://github.com/pallets/jinja
Jinja2
@@ -98,3 +102,7 @@ redis
# SVG image rendering (used for rack elevations)
# https://github.com/mozman/svgwrite
svgwrite
+
+# Python package management tool
+# https://pythonwheels.com/
+wheel
diff --git a/contrib/netbox-rq.service b/contrib/netbox-rq.service
index 7a300a195..77d70910c 100644
--- a/contrib/netbox-rq.service
+++ b/contrib/netbox-rq.service
@@ -7,12 +7,11 @@ Wants=network-online.target
[Service]
Type=simple
-User=www-data
-Group=www-data
-
+User=netbox
+Group=netbox
WorkingDirectory=/opt/netbox
-ExecStart=/usr/bin/python3 /opt/netbox/netbox/manage.py rqworker
+ExecStart=/opt/netbox/venv/bin/python3 /opt/netbox/netbox/manage.py rqworker
Restart=on-failure
RestartSec=30
diff --git a/contrib/netbox.service b/contrib/netbox.service
index 3cc9069c6..18eb0457c 100644
--- a/contrib/netbox.service
+++ b/contrib/netbox.service
@@ -7,12 +7,12 @@ Wants=network-online.target
[Service]
Type=simple
-User=www-data
-Group=www-data
+User=netbox
+Group=netbox
PIDFile=/var/tmp/netbox.pid
WorkingDirectory=/opt/netbox
-ExecStart=/usr/local/bin/gunicorn --pid /var/tmp/netbox.pid --pythonpath /opt/netbox/netbox --config /opt/netbox/gunicorn.py netbox.wsgi
+ExecStart=/opt/netbox/venv/bin/gunicorn --pid /var/tmp/netbox.pid --pythonpath /opt/netbox/netbox --config /opt/netbox/gunicorn.py netbox.wsgi
Restart=on-failure
RestartSec=30
diff --git a/docs/additional-features/caching.md b/docs/additional-features/caching.md
index 32ac77cbf..0e6513602 100644
--- a/docs/additional-features/caching.md
+++ b/docs/additional-features/caching.md
@@ -3,7 +3,7 @@
To improve performance, NetBox supports caching for most object and list views. Caching is implemented using Redis,
and [django-cacheops](https://github.com/Suor/django-cacheops)
-Several management commands are avaliable for administrators to manaully invalidate cache entries in extenuating circumstances.
+Several management commands are avaliable for administrators to manually invalidate cache entries in extenuating circumstances.
To invalidate a specifc model instance (for example a Device with ID 34):
```
diff --git a/docs/additional-features/napalm.md b/docs/additional-features/napalm.md
index c8e8b8b3a..304d892c4 100644
--- a/docs/additional-features/napalm.md
+++ b/docs/additional-features/napalm.md
@@ -3,7 +3,7 @@
NetBox supports integration with the [NAPALM automation](https://napalm-automation.net/) library. NAPALM allows NetBox to fetch live data from devices and return it to a requester via its REST API.
!!! info
- To enable the integration, the NAPALM library must be installed. See [installation steps](../../installation/2-netbox/#napalm-automation-optional) for more information.
+ To enable the integration, the NAPALM library must be installed. See [installation steps](../../installation/3-netbox/#napalm-automation-optional) for more information.
```
GET /api/dcim/devices/1/napalm/?method=get_environment
diff --git a/docs/api/filtering.md b/docs/api/filtering.md
new file mode 100644
index 000000000..e7b51d303
--- /dev/null
+++ b/docs/api/filtering.md
@@ -0,0 +1,71 @@
+# API Filtering
+
+The NetBox API supports robust filtering of results based on the fields of each model.
+Generally speaking you are able to filter based on the attributes (fields) present in
+the response body. Please note however that certain read-only or metadata fields are not
+filterable.
+
+Filtering is achieved by passing HTTP query parameters and the parameter name is the
+name of the field you wish to filter on and the value is the field value.
+
+E.g. filtering based on a device's name:
+```
+/api/dcim/devices/?name=DC-SPINE-1
+```
+
+## Multi Value Logic
+
+While you are able to filter based on an arbitrary number of fields, you are also able to
+pass multiple values for the same field. In most cases filtering on multiple values is
+implemented as a logical OR operation. A notible exception is the `tag` filter which
+is a logical AND. Passing multiple values for one field, can be combined with other fields.
+
+For example, filtering for devices with either the name of DC-SPINE-1 _or_ DC-LEAF-4:
+```
+/api/dcim/devices/?name=DC-SPINE-1&name=DC-LEAF-4
+```
+
+Filtering for devices with tag `router` and `customer-a` will return only devices with
+_both_ of those tags applied:
+```
+/api/dcim/devices/?tag=router&tag=customer-a
+```
+
+## Lookup Expressions
+
+Certain model fields also support filtering using additonal lookup expressions. This allows
+for negation and other context specific filtering.
+
+These lookup expressions can be applied by adding a suffix to the desired field's name.
+E.g. `mac_address__n`. In this case, the filter expression is for negation and it is seperated
+by two underscores. Below are the lookup expressions that are supported across different field
+types.
+
+### Numeric Fields
+
+Numeric based fields (ASN, VLAN ID, etc) support these lookup expressions:
+
+- `n` - not equal (negation)
+- `lt` - less than
+- `lte` - less than or equal
+- `gt` - greater than
+- `gte` - greater than or equal
+
+### String Fields
+
+String based (char) fields (Name, Address, etc) support these lookup expressions:
+
+- `n` - not equal (negation)
+- `ic` - case insensitive contains
+- `nic` - negated case insensitive contains
+- `isw` - case insensitive starts with
+- `nisw` - negated case insensitive starts with
+- `iew` - case insensitive ends with
+- `niew` - negated case insensitive ends with
+- `ie` - case sensitive exact match
+- `nie` - negated case sensitive exact match
+
+### Foreign Keys & Other Fields
+
+Certain other fields, namely foreign key relationships support just the negation
+expression: `n`.
diff --git a/docs/api/overview.md b/docs/api/overview.md
index 3841e8bbf..daa4f7c63 100644
--- a/docs/api/overview.md
+++ b/docs/api/overview.md
@@ -62,6 +62,8 @@ Lists of objects can be filtered using a set of query parameters. For example, t
GET /api/dcim/interfaces/?device_id=123
```
+See [filtering](filtering.md) for more details.
+
# Serialization
The NetBox API employs three types of serializers to represent model data:
diff --git a/docs/index.md b/docs/index.md
index a68d5a6bf..b3c367165 100644
--- a/docs/index.md
+++ b/docs/index.md
@@ -53,6 +53,10 @@ NetBox is built on the [Django](https://djangoproject.com/) Python framework and
| Task queuing | Redis/django-rq |
| Live device access | NAPALM |
+## Supported Python Version
+
+NetBox supports Python 3.5, 3.6, and 3.7 environments currently. Python 3.5 is scheduled to be unsupported in NetBox v2.8.
+
# Getting Started
See the [installation guide](installation/index.md) for help getting NetBox up and running quickly.
diff --git a/docs/installation/1-postgresql.md b/docs/installation/1-postgresql.md
index 376a62ae2..d038abb44 100644
--- a/docs/installation/1-postgresql.md
+++ b/docs/installation/1-postgresql.md
@@ -1,14 +1,13 @@
-NetBox requires a PostgreSQL database to store data. This can be hosted locally or on a remote server. (Please note that MySQL is not supported, as NetBox leverages PostgreSQL's built-in [network address types](https://www.postgresql.org/docs/current/static/datatype-net-types.html).)
-
-!!! note
- The installation instructions provided here have been tested to work on Ubuntu 18.04 and CentOS 7.5. The particular commands needed to install dependencies on other distributions may vary significantly. Unfortunately, this is outside the control of the NetBox maintainers. Please consult your distribution's documentation for assistance with any errors.
+This section entails the installation and configuration of a local PostgreSQL database. If you already have a PostgreSQL database service in place, skip to [the next section](2-redis.md).
!!! warning
- NetBox requires PostgreSQL 9.4 or higher.
+ NetBox requires PostgreSQL 9.4 or higher. Please note that MySQL and other relational databases are **not** supported.
-# Installation
+The installation instructions provided here have been tested to work on Ubuntu 18.04 and CentOS 7.5. The particular commands needed to install dependencies on other distributions may vary significantly. Unfortunately, this is outside the control of the NetBox maintainers. Please consult your distribution's documentation for assistance with any errors.
-**Ubuntu**
+## Installation
+
+#### Ubuntu
If a recent enough version of PostgreSQL is not available through your distribution's package manager, you'll need to install it from an official [PostgreSQL repository](https://wiki.postgresql.org/wiki/Apt).
@@ -17,13 +16,13 @@ If a recent enough version of PostgreSQL is not available through your distribut
# apt-get install -y postgresql libpq-dev
```
-**CentOS**
+#### CentOS
CentOS 7.5 does not ship with a recent enough version of PostgreSQL, so it will need to be installed from an external repository. The instructions below show the installation of PostgreSQL 9.6.
```no-highlight
-# yum install https://download.postgresql.org/pub/repos/yum/9.6/redhat/rhel-7-x86_64/pgdg-centos96-9.6-3.noarch.rpm
-# yum install postgresql96 postgresql96-server postgresql96-devel
+# yum install -y https://download.postgresql.org/pub/repos/yum/9.6/redhat/rhel-7-x86_64/pgdg-centos96-9.6-3.noarch.rpm
+# yum install -y postgresql96 postgresql96-server postgresql96-devel
# /usr/pgsql-9.6/bin/postgresql96-setup initdb
```
@@ -41,7 +40,7 @@ Then, start the service and enable it to run at boot:
# systemctl enable postgresql-9.6
```
-# Database Creation
+## Database Creation
At a minimum, we need to create a database for NetBox and assign it a username and password for authentication. This is done with the following commands.
@@ -62,6 +61,8 @@ GRANT
postgres=# \q
```
+## Verify Service Status
+
You can verify that authentication works issuing the following command and providing the configured password. (Replace `localhost` with your database server if using a remote database.)
```no-highlight
diff --git a/docs/installation/2-redis.md b/docs/installation/2-redis.md
new file mode 100644
index 000000000..421225443
--- /dev/null
+++ b/docs/installation/2-redis.md
@@ -0,0 +1,27 @@
+[Redis](https://redis.io/) is an in-memory key-value store which NetBox employs for caching and queuing. This section entails the installation and configuration of a local Redis instance. If you already have a Redis service in place, skip to [the next section](3-netbox.md).
+
+#### Ubuntu
+
+```no-highlight
+# apt-get install -y redis-server
+```
+
+#### CentOS
+
+```no-highlight
+# yum install -y epel-release
+# yum install -y redis
+# systemctl start redis
+# systemctl enable redis
+```
+
+You may wish to modify the Redis configuration at `/etc/redis.conf` or `/etc/redis/redis.conf`, however in most cases the default configuration is sufficient.
+
+## Verify Service Status
+
+Use the `redis-cli` utility to ensure the Redis service is functional:
+
+```no-highlight
+$ redis-cli ping
+PONG
+```
diff --git a/docs/installation/2-netbox.md b/docs/installation/3-netbox.md
similarity index 76%
rename from docs/installation/2-netbox.md
rename to docs/installation/3-netbox.md
index cbe2c70c0..4ea5a8302 100644
--- a/docs/installation/2-netbox.md
+++ b/docs/installation/3-netbox.md
@@ -1,25 +1,25 @@
-# Installation
-
This section of the documentation discusses installing and configuring the NetBox application. Begin by installing all system packages required by NetBox and its dependencies:
-**Ubuntu**
+## Install System Packages
+
+#### Ubuntu
```no-highlight
-# apt-get install -y python3 python3-pip python3-dev build-essential libxml2-dev libxslt1-dev libffi-dev libpq-dev libssl-dev redis-server zlib1g-dev
+# apt-get install -y python3 python3-pip python3-venv python3-dev build-essential libxml2-dev libxslt1-dev libffi-dev libpq-dev libssl-dev zlib1g-dev
```
-**CentOS**
+#### CentOS
```no-highlight
-# yum install -y epel-release
-# yum install -y gcc python36 python36-devel python36-setuptools libxml2-devel libxslt-devel libffi-devel openssl-devel redhat-rpm-config redis
+# yum install -y gcc python36 python36-devel python36-setuptools libxml2-devel libxslt-devel libffi-devel openssl-devel redhat-rpm-config
# easy_install-3.6 pip
-# ln -s /usr/bin/python3.6 /usr/bin/python3
```
+## Download NetBox
+
You may opt to install NetBox either from a numbered release or by cloning the master branch of its repository on GitHub.
-## Option A: Download a Release
+### Option A: Download a Release
Download the [latest stable release](https://github.com/netbox-community/netbox/releases) from GitHub as a tarball or ZIP archive and extract it to your desired path. In this example, we'll use `/opt/netbox`.
@@ -31,7 +31,7 @@ Download the [latest stable release](https://github.com/netbox-community/netbox/
# cd /opt/netbox/
```
-## Option B: Clone the Git Repository
+### Option B: Clone the Git Repository
Create the base directory for the NetBox installation. For this guide, we'll use `/opt/netbox`.
@@ -41,13 +41,13 @@ Create the base directory for the NetBox installation. For this guide, we'll use
If `git` is not already installed, install it:
-**Ubuntu**
+#### Ubuntu
```no-highlight
# apt-get install -y git
```
-**CentOS**
+#### CentOS
```no-highlight
# yum install -y git
@@ -66,45 +66,56 @@ Resolving deltas: 100% (1495/1495), done.
Checking connectivity... done.
```
-!!! warning
- Ensure that the media directory (`/opt/netbox/netbox/media/` in this example) and all its subdirectories are writable by the user account as which NetBox runs. If the NetBox process does not have permission to write to this directory, attempts to upload files (e.g. image attachments) will fail. (The appropriate user account will vary by platform.)
+## Create the NetBox User
- `# chown -R netbox:netbox /opt/netbox/netbox/media/`
-
-# Install Python Packages
-
-Install the required Python packages using pip. (If you encounter any compilation errors during this step, ensure that you've installed all of the system dependencies listed above.)
-
-```no-highlight
-# pip3 install -r requirements.txt
-```
+Create a system user account named `netbox`. We'll configure the WSGI and HTTP services to run under this account. We'll also assign this user ownership of the media directory. This ensures that NetBox will be able to save local files.
!!! note
- If you encounter errors while installing the required packages, check that you're running a recent version of pip (v9.0.1 or higher) with the command `pip3 -V`.
+ CentOS users may need to create the `netbox` group first.
-## NAPALM Automation (Optional)
-
-NetBox supports integration with the [NAPALM automation](https://napalm-automation.net/) library. NAPALM allows NetBox to fetch live data from devices and return it to a requester via its REST API. Installation of NAPALM is optional. To enable it, install the `napalm` package using pip or pip3:
-
-```no-highlight
-# pip3 install napalm
+```
+# adduser --system --group netbox
+# chown --recursive netbox /opt/netbox/netbox/media/
```
-## Remote File Storage (Optional)
+## Set Up Python Environment
+
+We'll use a Python [virtual environment](https://docs.python.org/3.6/tutorial/venv.html) to ensure NetBox's required packages don't conflict with anything in the base system. This will create a directory named `venv` in our NetBox root.
+
+```no-highlight
+# python3 -m venv /opt/netbox/venv
+```
+
+Next, activate the virtual environment and install the required Python packages. You should see your console prompt change to indicate the active environment. (Activating the virtual environment updates your command shell to use the local copy of Python that we just installed for NetBox instead of the system's Python interpreter.)
+
+```no-highlight
+# source venv/bin/activate
+(venv) # pip3 install -r requirements.txt
+```
+
+#### NAPALM Automation (Optional)
+
+NetBox supports integration with the [NAPALM automation](https://napalm-automation.net/) library. NAPALM allows NetBox to fetch live data from devices and return it to a requester via its REST API. Installation of NAPALM is optional. To enable it, install the `napalm` package:
+
+```no-highlight
+(venv) # pip3 install napalm
+```
+
+#### Remote File Storage (Optional)
By default, NetBox will use the local filesystem to storage uploaded files. To use a remote filesystem, install the [`django-storages`](https://django-storages.readthedocs.io/en/stable/) library and configure your [desired backend](../../configuration/optional-settings/#storage_backend) in `configuration.py`.
```no-highlight
-# pip3 install django-storages
+(venv) # pip3 install django-storages
```
-# Configuration
+## Configuration
Move into the NetBox configuration directory and make a copy of `configuration.example.py` named `configuration.py`.
```no-highlight
-# cd netbox/netbox/
-# cp configuration.example.py configuration.py
+(venv) # cd netbox/netbox/
+(venv) # cp configuration.example.py configuration.py
```
Open `configuration.py` with your preferred editor and set the following variables:
@@ -114,7 +125,7 @@ Open `configuration.py` with your preferred editor and set the following variabl
* `REDIS`
* `SECRET_KEY`
-## ALLOWED_HOSTS
+### ALLOWED_HOSTS
This is a list of the valid hostnames by which this server can be reached. You must specify at least one name or IP address.
@@ -124,7 +135,7 @@ Example:
ALLOWED_HOSTS = ['netbox.example.com', '192.0.2.123']
```
-## DATABASE
+### DATABASE
This parameter holds the database configuration details. You must define the username and password used when you configured PostgreSQL. If the service is running on a remote host, replace `localhost` with its address. See the [configuration documentation](../../configuration/required-settings/#database) for more detail on individual parameters.
@@ -141,7 +152,7 @@ DATABASE = {
}
```
-## REDIS
+### REDIS
Redis is a in-memory key-value store required as part of the NetBox installation. It is used for features such as webhooks and caching. Redis typically requires minimal configuration; the values below should suffice for most installations. See the [configuration documentation](../../configuration/required-settings/#redis) for more detail on individual parameters.
@@ -166,7 +177,7 @@ REDIS = {
}
```
-## SECRET_KEY
+### SECRET_KEY
Generate a random secret key of at least 50 alphanumeric characters. This key must be unique to this installation and must not be shared outside the local system.
@@ -175,13 +186,13 @@ You may use the script located at `netbox/generate_secret_key.py` to generate a
!!! note
In the case of a highly available installation with multiple web servers, `SECRET_KEY` must be identical among all servers in order to maintain a persistent user session state.
-# Run Database Migrations
+## Run Database Migrations
Before NetBox can run, we need to install the database schema. This is done by running `python3 manage.py migrate` from the `netbox` directory (`/opt/netbox/netbox/` in our example):
```no-highlight
-# cd /opt/netbox/netbox/
-# python3 manage.py migrate
+(venv) # cd /opt/netbox/netbox/
+(venv) # python3 manage.py migrate
Operations to perform:
Apply all migrations: dcim, sessions, admin, ipam, utilities, auth, circuits, contenttypes, extras, secrets, users
Running migrations:
@@ -194,12 +205,12 @@ Running migrations:
If this step results in a PostgreSQL authentication error, ensure that the username and password created in the database match what has been specified in `configuration.py`
-# Create a Super User
+## Create a Super User
NetBox does not come with any predefined user accounts. You'll need to create a super user to be able to log into NetBox:
```no-highlight
-# python3 manage.py createsuperuser
+(venv) # python3 manage.py createsuperuser
Username: admin
Email address: admin@example.com
Password:
@@ -207,20 +218,20 @@ Password (again):
Superuser created successfully.
```
-# Collect Static Files
+## Collect Static Files
```no-highlight
-# python3 manage.py collectstatic --no-input
+(venv) # python3 manage.py collectstatic --no-input
959 static files copied to '/opt/netbox/netbox/static'.
```
-# Test the Application
+## Test the Application
At this point, NetBox should be able to run. We can verify this by starting a development instance:
```no-highlight
-# python3 manage.py runserver 0.0.0.0:8000 --insecure
+(venv) # python3 manage.py runserver 0.0.0.0:8000 --insecure
Performing system checks...
System check identified no issues (0 silenced).
diff --git a/docs/installation/3-http-daemon.md b/docs/installation/4-http-daemon.md
similarity index 83%
rename from docs/installation/3-http-daemon.md
rename to docs/installation/4-http-daemon.md
index 4225f8413..fabb270cb 100644
--- a/docs/installation/3-http-daemon.md
+++ b/docs/installation/4-http-daemon.md
@@ -3,9 +3,9 @@ We'll set up a simple WSGI front end using [gunicorn](http://gunicorn.org/) for
!!! info
For the sake of brevity, only Ubuntu 18.04 instructions are provided here, but this sort of web server and WSGI configuration is not unique to NetBox. Please consult your distribution's documentation for assistance if needed.
-# Web Server Installation
+## HTTP Daemon Installation
-## Option A: nginx
+### Option A: nginx
The following will serve as a minimal nginx configuration. Be sure to modify your server name and installation path appropriately.
@@ -52,7 +52,7 @@ Restart the nginx service to use the new configuration.
To enable SSL, consider this guide on [securing nginx with Let's Encrypt](https://www.digitalocean.com/community/tutorials/how-to-secure-nginx-with-let-s-encrypt-on-ubuntu-16-04).
-## Option B: Apache
+### Option B: Apache
```no-highlight
# apt-get install -y apache2 libapache2-mod-wsgi-py3
@@ -102,15 +102,9 @@ To enable SSL, consider this guide on [securing Apache with Let's Encrypt](https
!!! note
Certain components of NetBox (such as the display of rack elevation diagrams) rely on the use of embedded objects. Ensure that your HTTP server configuration does not override the `X-Frame-Options` response header set by NetBox.
-# gunicorn Installation
+## gunicorn Configuration
-Install gunicorn:
-
-```no-highlight
-# pip3 install gunicorn
-```
-
-Copy `/opt/netbox/contrib/gunicorn.py` to `/opt/netbox/gunicorn.py`. We make a copy of this file to ensure that any changes to it do not get overwritten by a future upgrade.
+Copy `/opt/netbox/contrib/gunicorn.py` to `/opt/netbox/gunicorn.py`. (We make a copy of this file to ensure that any changes to it do not get overwritten by a future upgrade.)
```no-highlight
# cd /opt/netbox
@@ -119,7 +113,7 @@ Copy `/opt/netbox/contrib/gunicorn.py` to `/opt/netbox/gunicorn.py`. We make a c
You may wish to edit this file to change the bound IP address or port number, or to make performance-related adjustments.
-# systemd configuration
+## systemd Configuration
We'll use systemd to control the daemonization of NetBox services. First, copy `contrib/netbox.service` and `contrib/netbox-rq.service` to the `/etc/systemd/system/` directory:
@@ -127,17 +121,12 @@ We'll use systemd to control the daemonization of NetBox services. First, copy `
# cp contrib/*.service /etc/systemd/system/
```
-!!! note
- These service files assume that gunicorn is installed at `/usr/local/bin/gunicorn`. If the output of `which gunicorn` indicates a different path, you'll need to correct the `ExecStart` path in both files.
-
Then, start the `netbox` and `netbox-rq` services and enable them to initiate at boot time:
```no-highlight
# systemctl daemon-reload
-# systemctl start netbox.service
-# systemctl start netbox-rq.service
-# systemctl enable netbox.service
-# systemctl enable netbox-rq.service
+# systemctl start netbox netbox-rq
+# systemctl enable netbox netbox-rq
```
You can use the command `systemctl status netbox` to verify that the WSGI service is running:
@@ -157,7 +146,20 @@ You can use the command `systemctl status netbox` to verify that the WSGI servic
...
```
-At this point, you should be able to connect to the HTTP service at the server name or IP address you provided. If you are unable to connect, check that the nginx service is running and properly configured. If you receive a 502 (bad gateway) error, this indicates that gunicorn is misconfigured or not running.
+At this point, you should be able to connect to the HTTP service at the server name or IP address you provided.
!!! info
Please keep in mind that the configurations provided here are bare minimums required to get NetBox up and running. You may want to make adjustments to better suit your production environment.
+
+## Troubleshooting
+
+If you are unable to connect to the HTTP server, check that:
+
+* Nginx/Apache is running and configured to listen on the correct port.
+* Access is not being blocked by a firewall. (Try connecting locally from the server itself.)
+
+If you are able to connect but receive a 502 (bad gateway) error, check the following:
+
+* The NetBox system process (gunicorn) is running: `systemctl status netbox`
+* nginx/Apache is configured to connect to the port on which gunicorn is listening (default is 8001).
+* SELinux is not preventing the reverse proxy connection. You may need to allow HTTP network connections with the command `setsebool -P httpd_can_network_connect 1`
diff --git a/docs/installation/4-ldap.md b/docs/installation/5-ldap.md
similarity index 96%
rename from docs/installation/4-ldap.md
rename to docs/installation/5-ldap.md
index 953d3cb28..0a5a4f76a 100644
--- a/docs/installation/4-ldap.md
+++ b/docs/installation/5-ldap.md
@@ -1,8 +1,8 @@
This guide explains how to implement LDAP authentication using an external server. User authentication will fall back to built-in Django users in the event of a failure.
-# Requirements
+## Install Requirements
-## Install openldap-devel
+#### Install openldap-devel
On Ubuntu:
@@ -16,17 +16,17 @@ On CentOS:
sudo yum install -y openldap-devel
```
-## Install django-auth-ldap
+#### Install django-auth-ldap
```no-highlight
pip3 install django-auth-ldap
```
-# Configuration
+## Configuration
Create a file in the same directory as `configuration.py` (typically `netbox/netbox/`) named `ldap_config.py`. Define all of the parameters required below in `ldap_config.py`. Complete documentation of all `django-auth-ldap` configuration options is included in the project's [official documentation](http://django-auth-ldap.readthedocs.io/).
-## General Server Configuration
+### General Server Configuration
!!! info
When using Windows Server 2012 you may need to specify a port on `AUTH_LDAP_SERVER_URI`. Use `3269` for secure, or `3268` for non-secure.
@@ -54,7 +54,7 @@ LDAP_IGNORE_CERT_ERRORS = True
STARTTLS can be configured by setting `AUTH_LDAP_START_TLS = True` and using the `ldap://` URI scheme.
-## User Authentication
+### User Authentication
!!! info
When using Windows Server 2012, `AUTH_LDAP_USER_DN_TEMPLATE` should be set to None.
@@ -79,7 +79,7 @@ AUTH_LDAP_USER_ATTR_MAP = {
}
```
-# User Groups for Permissions
+## User Groups for Permissions
!!! info
When using Microsoft Active Directory, support for nested groups can be activated by using `NestedGroupOfNamesType()` instead of `GroupOfNamesType()` for `AUTH_LDAP_GROUP_TYPE`. You will also need to modify the import line to use `NestedGroupOfNamesType` instead of `GroupOfNamesType` .
@@ -121,7 +121,7 @@ AUTH_LDAP_CACHE_TIMEOUT = 3600
!!! warning
Authentication will fail if the groups (the distinguished names) do not exist in the LDAP directory.
-# Troubleshooting LDAP
+## Troubleshooting LDAP
`supervisorctl restart netbox` restarts the Netbox service, and initiates any changes made to `ldap_config.py`. If there are syntax errors present, the NetBox process will not spawn an instance, and errors should be logged to `/var/log/supervisor/`.
diff --git a/docs/installation/index.md b/docs/installation/index.md
index 59631bf7a..082c94ec3 100644
--- a/docs/installation/index.md
+++ b/docs/installation/index.md
@@ -3,14 +3,13 @@
The following sections detail how to set up a new instance of NetBox:
1. [PostgreSQL database](1-postgresql.md)
-2. [NetBox components](2-netbox.md)
-3. [HTTP daemon](3-http-daemon.md)
-4. [LDAP authentication](4-ldap.md) (optional)
+1. [Redis](2-redis.md)
+3. [NetBox components](3-netbox.md)
+4. [HTTP daemon](4-http-daemon.md)
+5. [LDAP authentication](5-ldap.md) (optional)
# Upgrading
If you are upgrading from an existing installation, please consult the [upgrading guide](upgrading.md).
-NetBox v2.5 and later requires Python 3.5 or higher. Please see the instructions for [migrating to Python 3](migrating-to-python3.md) if you are still using Python 2.
-
Netbox v2.5.9 and later moved to using systemd instead of supervisord. Please see the instructions for [migrating to systemd](migrating-to-systemd.md) if you are still using supervisord.
diff --git a/docs/installation/migrating-to-python3.md b/docs/installation/migrating-to-python3.md
deleted file mode 100644
index 2c2c2b917..000000000
--- a/docs/installation/migrating-to-python3.md
+++ /dev/null
@@ -1,38 +0,0 @@
-# Migration
-
-!!! warning
- As of version 2.5, NetBox no longer supports Python 2. Python 3 is required to run any 2.5 release or later.
-
-## Ubuntu
-
-Remove the Python2 version of gunicorn:
-
-```no-highlight
-# pip uninstall -y gunicorn
-```
-
-Install Python3 and pip3, Python's package management tool:
-
-```no-highlight
-# apt-get update
-# apt-get install -y python3 python3-dev python3-setuptools
-# easy_install3 pip
-```
-
-Install the Python3 packages required by NetBox:
-
-```no-highlight
-# pip3 install -r requirements.txt
-```
-
-Replace gunicorn with the Python3 version:
-
-```no-highlight
-# pip3 install gunicorn
-```
-
-If using LDAP authentication, install the `django-auth-ldap` package:
-
-```no-highlight
-# pip3 install django-auth-ldap
-```
diff --git a/docs/installation/migrating-to-systemd.md b/docs/installation/migrating-to-systemd.md
index f5fcb7598..34ce70bb6 100644
--- a/docs/installation/migrating-to-systemd.md
+++ b/docs/installation/migrating-to-systemd.md
@@ -1,16 +1,17 @@
-# Migration
-
-Migration is not required, as supervisord will still continue to function.
+This document contains instructions for migrating from a legacy NetBox deployment using [supervisor](http://supervisord.org/) to a systemd-based approach.
## Ubuntu
-### Remove supervisord:
+### Uninstall supervisord:
```no-highlight
# apt-get remove -y supervisord
```
-### systemd configuration:
+### Configure systemd:
+
+!!! note
+ These instructions assume the presence of a Python virtual environment at `/opt/netbox/venv`. If you have not created this environment, please refer to the [installation instructions](3-netbox.md#set-up-python-environment) for direction.
We'll use systemd to control the daemonization of NetBox services. First, copy `contrib/netbox.service` and `contrib/netbox-rq.service` to the `/etc/systemd/system/` directory:
@@ -19,19 +20,14 @@ We'll use systemd to control the daemonization of NetBox services. First, copy `
```
!!! note
- These service files assume that gunicorn is installed at `/usr/local/bin/gunicorn`. If the output of `which gunicorn` indicates a different path, you'll need to correct the `ExecStart` path in both files.
-
-!!! note
- You may need to modify the user that the systemd service runs as. Please verify the user for httpd on your specific release and edit both files to match your httpd service under user and group. The username could be "nobody", "nginx", "apache", "www-data" or any number of other usernames.
+ You may need to modify the user that the systemd service runs as. Please verify the user for httpd on your specific release and edit both files to match your httpd service under user and group. The username could be "nobody", "nginx", "apache", "www-data", or something else.
Then, start the `netbox` and `netbox-rq` services and enable them to initiate at boot time:
```no-highlight
# systemctl daemon-reload
-# systemctl start netbox.service
-# systemctl start netbox-rq.service
-# systemctl enable netbox.service
-# systemctl enable netbox-rq.service
+# systemctl start netbox netbox-rq
+# systemctl enable netbox netbox-rq
```
You can use the command `systemctl status netbox` to verify that the WSGI service is running:
@@ -51,7 +47,7 @@ You can use the command `systemctl status netbox` to verify that the WSGI servic
...
```
-At this point, you should be able to connect to the HTTP service at the server name or IP address you provided. If you are unable to connect, check that the nginx service is running and properly configured. If you receive a 502 (bad gateway) error, this indicates that gunicorn is misconfigured or not running.
+At this point, you should be able to connect to the HTTP service at the server name or IP address you provided. If you are unable to connect, check that the nginx service is running and properly configured. If you receive a 502 (bad gateway) error, this indicates that gunicorn is misconfigured or not running. Issue the command `journalctl -xe` to see why the services were unable to start.
!!! info
Please keep in mind that the configurations provided here are bare minimums required to get NetBox up and running. You may want to make adjustments to better suit your production environment.
diff --git a/docs/installation/upgrading.md b/docs/installation/upgrading.md
index e5cf93a28..79f94fd17 100644
--- a/docs/installation/upgrading.md
+++ b/docs/installation/upgrading.md
@@ -1,12 +1,12 @@
-# Review the Release Notes
+## Review the Release Notes
Prior to upgrading your NetBox instance, be sure to carefully review all [release notes](../../release-notes/) that have been published since your current version was released. Although the upgrade process typically does not involve additional work, certain releases may introduce breaking or backward-incompatible changes. These are called out in the release notes under the version in which the change went into effect.
-# Install the Latest Code
+## Install the Latest Code
As with the initial installation, you can upgrade NetBox by either downloading the latest release package or by cloning the `master` branch of the git repository.
-## Option A: Download a Release
+### Option A: Download a Release
Download the [latest stable release](https://github.com/netbox-community/netbox/releases) from GitHub as a tarball or ZIP archive. Extract it to your desired path. In this example, we'll use `/opt/netbox`.
@@ -34,7 +34,7 @@ Be sure to replicate your uploaded media as well. (The exact action necessary wi
Also make sure to copy over any reports that you've made. Note that if you made them in a separate directory (`/opt/netbox-reports` for example), then you will not need to copy them - the config file that you copied earlier will point to the correct location.
```no-highlight
-# cp -r /opt/netbox-X.Y.X/netbox/reports /opt/netbox/netbox/reports/
+# cp -r /opt/netbox-X.Y.Z/netbox/reports /opt/netbox/netbox/reports/
```
If you followed the original installation guide to set up gunicorn, be sure to copy its configuration as well:
@@ -49,7 +49,7 @@ Copy the LDAP configuration if using LDAP:
# cp netbox-X.Y.Z/netbox/netbox/ldap_config.py netbox/netbox/netbox/ldap_config.py
```
-## Option B: Clone the Git Repository (latest master release)
+### Option B: Clone the Git Repository (latest master release)
This guide assumes that NetBox is installed at `/opt/netbox`. Pull down the most recent iteration of the master branch:
@@ -60,9 +60,9 @@ This guide assumes that NetBox is installed at `/opt/netbox`. Pull down the most
# git status
```
-# Run the Upgrade Script
+## Run the Upgrade Script
-Once the new code is in place, run the upgrade script (which may need to be run as root depending on how your environment is configured).
+Once the new code is in place, run the upgrade script:
```no-highlight
# ./upgrade.sh
@@ -70,9 +70,13 @@ Once the new code is in place, run the upgrade script (which may need to be run
This script:
-* Installs or upgrades any new required Python packages
+* Destroys and rebuilds the Python virtual environment
+* Installs all required Python packages
* Applies any database migrations that were included in the release
* Collects all static files to be served by the HTTP service
+* Deletes stale content types from the database
+* Deletes all expired user sessions from the database
+* Clears all cached data to prevent conflicts with the new release
!!! note
It's possible that the upgrade script will display a notice warning of unreflected database migrations:
@@ -82,14 +86,16 @@ This script:
This may occur due to semantic differences in environment, and can be safely ignored. Never attempt to create new migrations unless you are intentionally modifying the database schema.
-# Restart the WSGI Service
+## Restart the NetBox Services
-Finally, restart the WSGI services to run the new code. If you followed this guide for the initial installation, this is done using `systemctl:
+!!! warning
+ If you are upgrading from an installation that does not use a Python virtual environment, you'll need to update the systemd service files to reference the new Python and gunicorn executables before restarting the services. These are located in `/opt/netbox/venv/bin/`. See the example service files in `/opt/netbox/contrib/` for reference.
+
+Finally, restart the gunicorn and RQ services:
```no-highlight
-# sudo systemctl restart netbox
-# sudo systemctl restart netbox-rq
+# sudo systemctl restart netbox netbox-rq
```
!!! note
- It's possible you are still using supervisord instead of the linux native systemd. If you are still using supervisord you can restart the services by either restarting supervisord or by using supervisorctl to restart netbox.
+ It's possible you are still using supervisord instead of systemd. If so, please see the instructions for [migrating to systemd](migrating-to-systemd.md).
diff --git a/docs/release-notes/version-2.7.md b/docs/release-notes/version-2.7.md
index f9557bf34..07457fba8 100644
--- a/docs/release-notes/version-2.7.md
+++ b/docs/release-notes/version-2.7.md
@@ -1,3 +1,33 @@
+# v2.7.9 (2020-03-06)
+
+**Note:** This release will deploy a Python virtual environment on upgrade in the `venv/` directory. This will require modifying the paths to your Python and gunicorn executables in the systemd service files. For more detail, please see the [upgrade instructions](https://netbox.readthedocs.io/en/stable/installation/upgrading/).
+
+## Enhancements
+
+* [#3949](https://github.com/netbox-community/netbox/issues/3949) - Revised the installation docs and upgrade script to employ a Python virtual environment
+* [#4062](https://github.com/netbox-community/netbox/issues/4062) - Enumerate ChoiceField type and value in API
+* [#4119](https://github.com/netbox-community/netbox/issues/4119) - Extend upgrade script to clear expired user sessions
+* [#4121](https://github.com/netbox-community/netbox/issues/4121) - Add dynamic lookup expressions for all filters
+* [#4218](https://github.com/netbox-community/netbox/issues/4218) - Allow negative voltage for DC power feeds
+* [#4281](https://github.com/netbox-community/netbox/issues/4281) - Allow filtering device component list views by type
+* [#4284](https://github.com/netbox-community/netbox/issues/4284) - Add MRJ21 port and cable types
+* [#4290](https://github.com/netbox-community/netbox/issues/4290) - Include device name in tooltip on rack elevations
+* [#4305](https://github.com/netbox-community/netbox/issues/4305) - Add 10-inch option for rack width
+
+## Bug Fixes
+
+* [#4274](https://github.com/netbox-community/netbox/issues/4274) - Fix incorrect schema definition of `int` type choicefields
+* [#4277](https://github.com/netbox-community/netbox/issues/4277) - Fix filtering of clusters by tenant
+* [#4282](https://github.com/netbox-community/netbox/issues/4282) - Fix label on export button for device types
+* [#4285](https://github.com/netbox-community/netbox/issues/4285) - Include A/Z termination sites in provider circuits table
+* [#4295](https://github.com/netbox-community/netbox/issues/4295) - Fix assignment of parent LAG during interface bulk edit
+* [#4298](https://github.com/netbox-community/netbox/issues/4298) - Fix bulk creation of objects with custom fields via REST API
+* [#4300](https://github.com/netbox-community/netbox/issues/4300) - Pass "commit" argument when executing scripts via REST API
+* [#4301](https://github.com/netbox-community/netbox/issues/4301) - Fix exception when deleting device type with components
+* [#4306](https://github.com/netbox-community/netbox/issues/4306) - Fix toggling of device images for all racks in elevations view
+
+---
+
# v2.7.8 (2020-02-25)
## Enhancements
diff --git a/mkdocs.yml b/mkdocs.yml
index 4ba91dfe5..7579a4b00 100644
--- a/mkdocs.yml
+++ b/mkdocs.yml
@@ -1,17 +1,22 @@
-site_name: NetBox
-theme: readthedocs
+site_name: NetBox Documentation
+site_url: https://netbox.readthedocs.io/
repo_url: https://github.com/netbox-community/netbox
+theme:
+ name: readthedocs
+ navigation_depth: 3
+markdown_extensions:
+ - admonition:
-pages:
+nav:
- Introduction: 'index.md'
- Installation:
- Installing NetBox: 'installation/index.md'
- 1. PostgreSQL: 'installation/1-postgresql.md'
- - 2. NetBox: 'installation/2-netbox.md'
- - 3. HTTP Daemon: 'installation/3-http-daemon.md'
- - 4. LDAP (Optional): 'installation/4-ldap.md'
+ - 2. Redis: 'installation/2-redis.md'
+ - 3. NetBox: 'installation/3-netbox.md'
+ - 4. HTTP Daemon: 'installation/4-http-daemon.md'
+ - 5. LDAP (Optional): 'installation/5-ldap.md'
- Upgrading NetBox: 'installation/upgrading.md'
- - Migrating to Python3: 'installation/migrating-to-python3.md'
- Migrating to systemd: 'installation/migrating-to-systemd.md'
- Configuration:
- Configuring NetBox: 'configuration/index.md'
@@ -50,6 +55,7 @@ pages:
- Authentication: 'api/authentication.md'
- Working with Secrets: 'api/working-with-secrets.md'
- Examples: 'api/examples.md'
+ - Filtering: 'api/filtering.md'
- Development:
- Introduction: 'development/index.md'
- Style Guide: 'development/style-guide.md'
@@ -76,6 +82,3 @@ pages:
- Version 1.2: 'release-notes/version-1.2.md'
- Version 1.1: 'release-notes/version-1.1.md'
- Version 1.0: 'release-notes/version-1.0.md'
-
-markdown_extensions:
- - admonition:
diff --git a/netbox/circuits/filters.py b/netbox/circuits/filters.py
index c27ffb8d7..4bd5fa158 100644
--- a/netbox/circuits/filters.py
+++ b/netbox/circuits/filters.py
@@ -4,7 +4,9 @@ from django.db.models import Q
from dcim.models import Region, Site
from extras.filters import CustomFieldFilterSet, CreatedUpdatedFilterSet
from tenancy.filters import TenancyFilterSet
-from utilities.filters import NameSlugSearchFilterSet, NumericInFilter, TagFilter, TreeNodeMultipleChoiceFilter
+from utilities.filters import (
+ BaseFilterSet, NameSlugSearchFilterSet, NumericInFilter, TagFilter, TreeNodeMultipleChoiceFilter
+)
from .choices import *
from .models import Circuit, CircuitTermination, CircuitType, Provider
@@ -16,7 +18,7 @@ __all__ = (
)
-class ProviderFilterSet(CustomFieldFilterSet, CreatedUpdatedFilterSet):
+class ProviderFilterSet(BaseFilterSet, CustomFieldFilterSet, CreatedUpdatedFilterSet):
id__in = NumericInFilter(
field_name='id',
lookup_expr='in'
@@ -27,12 +29,14 @@ class ProviderFilterSet(CustomFieldFilterSet, CreatedUpdatedFilterSet):
)
region_id = TreeNodeMultipleChoiceFilter(
queryset=Region.objects.all(),
- field_name='circuits__terminations__site__region__in',
+ field_name='circuits__terminations__site__region',
+ lookup_expr='in',
label='Region (ID)',
)
region = TreeNodeMultipleChoiceFilter(
queryset=Region.objects.all(),
- field_name='circuits__terminations__site__region__in',
+ field_name='circuits__terminations__site__region',
+ lookup_expr='in',
to_field_name='slug',
label='Region (slug)',
)
@@ -65,14 +69,14 @@ class ProviderFilterSet(CustomFieldFilterSet, CreatedUpdatedFilterSet):
)
-class CircuitTypeFilterSet(NameSlugSearchFilterSet):
+class CircuitTypeFilterSet(BaseFilterSet, NameSlugSearchFilterSet):
class Meta:
model = CircuitType
fields = ['id', 'name', 'slug']
-class CircuitFilterSet(CustomFieldFilterSet, TenancyFilterSet, CreatedUpdatedFilterSet):
+class CircuitFilterSet(BaseFilterSet, CustomFieldFilterSet, TenancyFilterSet, CreatedUpdatedFilterSet):
id__in = NumericInFilter(
field_name='id',
lookup_expr='in'
@@ -118,12 +122,14 @@ class CircuitFilterSet(CustomFieldFilterSet, TenancyFilterSet, CreatedUpdatedFil
)
region_id = TreeNodeMultipleChoiceFilter(
queryset=Region.objects.all(),
- field_name='terminations__site__region__in',
+ field_name='terminations__site__region',
+ lookup_expr='in',
label='Region (ID)',
)
region = TreeNodeMultipleChoiceFilter(
queryset=Region.objects.all(),
- field_name='terminations__site__region__in',
+ field_name='terminations__site__region',
+ lookup_expr='in',
to_field_name='slug',
label='Region (slug)',
)
@@ -146,7 +152,7 @@ class CircuitFilterSet(CustomFieldFilterSet, TenancyFilterSet, CreatedUpdatedFil
).distinct()
-class CircuitTerminationFilterSet(django_filters.FilterSet):
+class CircuitTerminationFilterSet(BaseFilterSet):
q = django_filters.CharFilter(
method='search',
label='Search',
diff --git a/netbox/circuits/models.py b/netbox/circuits/models.py
index 59f6e2004..812eaa79e 100644
--- a/netbox/circuits/models.py
+++ b/netbox/circuits/models.py
@@ -10,6 +10,7 @@ from extras.models import CustomFieldModel, ObjectChange, TaggedItem
from utilities.models import ChangeLoggedModel
from utilities.utils import serialize_object
from .choices import *
+from .querysets import CircuitQuerySet
__all__ = (
@@ -184,6 +185,7 @@ class Circuit(ChangeLoggedModel, CustomFieldModel):
object_id_field='obj_id'
)
+ objects = CircuitQuerySet.as_manager()
tags = TaggableManager(through=TaggedItem)
csv_headers = [
diff --git a/netbox/circuits/querysets.py b/netbox/circuits/querysets.py
new file mode 100644
index 000000000..60956f32a
--- /dev/null
+++ b/netbox/circuits/querysets.py
@@ -0,0 +1,15 @@
+from django.db.models import OuterRef, QuerySet, Subquery
+
+
+class CircuitQuerySet(QuerySet):
+
+ def annotate_sites(self):
+ """
+ Annotate the A and Z termination site names for ordering.
+ """
+ from circuits.models import CircuitTermination
+ _terminations = CircuitTermination.objects.filter(circuit=OuterRef('pk'))
+ return self.annotate(
+ a_side=Subquery(_terminations.filter(term_side='A').values('site__name')[:1]),
+ z_side=Subquery(_terminations.filter(term_side='Z').values('site__name')[:1]),
+ )
diff --git a/netbox/circuits/tests/test_filters.py b/netbox/circuits/tests/test_filters.py
index 46c2bacbe..63681899a 100644
--- a/netbox/circuits/tests/test_filters.py
+++ b/netbox/circuits/tests/test_filters.py
@@ -4,6 +4,7 @@ from circuits.choices import *
from circuits.filters import *
from circuits.models import Circuit, CircuitTermination, CircuitType, Provider
from dcim.models import Region, Site
+from tenancy.models import Tenant, TenantGroup
class ProviderTestCase(TestCase):
@@ -138,6 +139,20 @@ class CircuitTestCase(TestCase):
)
Site.objects.bulk_create(sites)
+ tenant_groups = (
+ TenantGroup(name='Tenant group 1', slug='tenant-group-1'),
+ TenantGroup(name='Tenant group 2', slug='tenant-group-2'),
+ TenantGroup(name='Tenant group 3', slug='tenant-group-3'),
+ )
+ TenantGroup.objects.bulk_create(tenant_groups)
+
+ tenants = (
+ Tenant(name='Tenant 1', slug='tenant-1', group=tenant_groups[0]),
+ Tenant(name='Tenant 2', slug='tenant-2', group=tenant_groups[1]),
+ Tenant(name='Tenant 3', slug='tenant-3', group=tenant_groups[2]),
+ )
+ Tenant.objects.bulk_create(tenants)
+
circuit_types = (
CircuitType(name='Test Circuit Type 1', slug='test-circuit-type-1'),
CircuitType(name='Test Circuit Type 2', slug='test-circuit-type-2'),
@@ -151,12 +166,12 @@ class CircuitTestCase(TestCase):
Provider.objects.bulk_create(providers)
circuits = (
- Circuit(provider=providers[0], type=circuit_types[0], cid='Test Circuit 1', install_date='2020-01-01', commit_rate=1000, status=CircuitStatusChoices.STATUS_ACTIVE),
- Circuit(provider=providers[0], type=circuit_types[0], cid='Test Circuit 2', install_date='2020-01-02', commit_rate=2000, status=CircuitStatusChoices.STATUS_ACTIVE),
- Circuit(provider=providers[0], type=circuit_types[0], cid='Test Circuit 3', install_date='2020-01-03', commit_rate=3000, status=CircuitStatusChoices.STATUS_PLANNED),
- Circuit(provider=providers[1], type=circuit_types[1], cid='Test Circuit 4', install_date='2020-01-04', commit_rate=4000, status=CircuitStatusChoices.STATUS_PLANNED),
- Circuit(provider=providers[1], type=circuit_types[1], cid='Test Circuit 5', install_date='2020-01-05', commit_rate=5000, status=CircuitStatusChoices.STATUS_OFFLINE),
- Circuit(provider=providers[1], type=circuit_types[1], cid='Test Circuit 6', install_date='2020-01-06', commit_rate=6000, status=CircuitStatusChoices.STATUS_OFFLINE),
+ Circuit(provider=providers[0], tenant=tenants[0], type=circuit_types[0], cid='Test Circuit 1', install_date='2020-01-01', commit_rate=1000, status=CircuitStatusChoices.STATUS_ACTIVE),
+ Circuit(provider=providers[0], tenant=tenants[0], type=circuit_types[0], cid='Test Circuit 2', install_date='2020-01-02', commit_rate=2000, status=CircuitStatusChoices.STATUS_ACTIVE),
+ Circuit(provider=providers[0], tenant=tenants[1], type=circuit_types[0], cid='Test Circuit 3', install_date='2020-01-03', commit_rate=3000, status=CircuitStatusChoices.STATUS_PLANNED),
+ Circuit(provider=providers[1], tenant=tenants[1], type=circuit_types[1], cid='Test Circuit 4', install_date='2020-01-04', commit_rate=4000, status=CircuitStatusChoices.STATUS_PLANNED),
+ Circuit(provider=providers[1], tenant=tenants[2], type=circuit_types[1], cid='Test Circuit 5', install_date='2020-01-05', commit_rate=5000, status=CircuitStatusChoices.STATUS_OFFLINE),
+ Circuit(provider=providers[1], tenant=tenants[2], type=circuit_types[1], cid='Test Circuit 6', install_date='2020-01-06', commit_rate=6000, status=CircuitStatusChoices.STATUS_OFFLINE),
)
Circuit.objects.bulk_create(circuits)
@@ -216,6 +231,20 @@ class CircuitTestCase(TestCase):
params = {'site': [sites[0].slug, sites[1].slug]}
self.assertEqual(self.filterset(params, self.queryset).qs.count(), 2)
+ def test_tenant(self):
+ tenants = Tenant.objects.all()[:2]
+ params = {'tenant_id': [tenants[0].pk, tenants[1].pk]}
+ self.assertEqual(self.filterset(params, self.queryset).qs.count(), 4)
+ params = {'tenant': [tenants[0].slug, tenants[1].slug]}
+ self.assertEqual(self.filterset(params, self.queryset).qs.count(), 4)
+
+ def test_tenant_group(self):
+ tenant_groups = TenantGroup.objects.all()[:2]
+ params = {'tenant_group_id': [tenant_groups[0].pk, tenant_groups[1].pk]}
+ self.assertEqual(self.filterset(params, self.queryset).qs.count(), 4)
+ params = {'tenant_group': [tenant_groups[0].slug, tenant_groups[1].slug]}
+ self.assertEqual(self.filterset(params, self.queryset).qs.count(), 4)
+
class CircuitTerminationTestCase(TestCase):
queryset = CircuitTermination.objects.all()
diff --git a/netbox/circuits/views.py b/netbox/circuits/views.py
index ba873f23f..b092e1855 100644
--- a/netbox/circuits/views.py
+++ b/netbox/circuits/views.py
@@ -37,10 +37,14 @@ class ProviderView(PermissionRequiredMixin, View):
def get(self, request, slug):
provider = get_object_or_404(Provider, slug=slug)
- circuits = Circuit.objects.filter(provider=provider).prefetch_related('type', 'tenant', 'terminations__site')
+ circuits = Circuit.objects.filter(
+ provider=provider
+ ).prefetch_related(
+ 'type', 'tenant', 'terminations__site'
+ ).annotate_sites()
show_graphs = Graph.objects.filter(type__model='provider').exists()
- circuits_table = tables.CircuitTable(circuits, orderable=False)
+ circuits_table = tables.CircuitTable(circuits)
circuits_table.columns.hide('provider')
paginate = {
@@ -142,10 +146,7 @@ class CircuitListView(PermissionRequiredMixin, ObjectListView):
_terminations = CircuitTermination.objects.filter(circuit=OuterRef('pk'))
queryset = Circuit.objects.prefetch_related(
'provider', 'type', 'tenant', 'terminations__site'
- ).annotate(
- a_side=Subquery(_terminations.filter(term_side='A').values('site__name')[:1]),
- z_side=Subquery(_terminations.filter(term_side='Z').values('site__name')[:1]),
- )
+ ).annotate_sites()
filterset = filters.CircuitFilterSet
filterset_form = forms.CircuitFilterForm
table = tables.CircuitTable
diff --git a/netbox/dcim/choices.py b/netbox/dcim/choices.py
index c1d7b4053..79f00bce4 100644
--- a/netbox/dcim/choices.py
+++ b/netbox/dcim/choices.py
@@ -55,10 +55,12 @@ class RackTypeChoices(ChoiceSet):
class RackWidthChoices(ChoiceSet):
+ WIDTH_10IN = 10
WIDTH_19IN = 19
WIDTH_23IN = 23
CHOICES = (
+ (WIDTH_10IN, '10 inches'),
(WIDTH_19IN, '19 inches'),
(WIDTH_23IN, '23 inches'),
)
@@ -836,6 +838,7 @@ class PortTypeChoices(ChoiceSet):
TYPE_8P8C = '8p8c'
TYPE_110_PUNCH = '110-punch'
TYPE_BNC = 'bnc'
+ TYPE_MRJ21 = 'mrj21'
TYPE_ST = 'st'
TYPE_SC = 'sc'
TYPE_SC_APC = 'sc-apc'
@@ -854,6 +857,7 @@ class PortTypeChoices(ChoiceSet):
(TYPE_8P8C, '8P8C'),
(TYPE_110_PUNCH, '110 Punch'),
(TYPE_BNC, 'BNC'),
+ (TYPE_MRJ21, 'MRJ21'),
),
),
(
@@ -904,6 +908,7 @@ class CableTypeChoices(ChoiceSet):
TYPE_CAT7 = 'cat7'
TYPE_DAC_ACTIVE = 'dac-active'
TYPE_DAC_PASSIVE = 'dac-passive'
+ TYPE_MRJ21_TRUNK = 'mrj21-trunk'
TYPE_COAXIAL = 'coaxial'
TYPE_MMF = 'mmf'
TYPE_MMF_OM1 = 'mmf-om1'
@@ -927,6 +932,7 @@ class CableTypeChoices(ChoiceSet):
(TYPE_CAT7, 'CAT7'),
(TYPE_DAC_ACTIVE, 'Direct Attach Copper (Active)'),
(TYPE_DAC_PASSIVE, 'Direct Attach Copper (Passive)'),
+ (TYPE_MRJ21_TRUNK, 'MRJ21 Trunk'),
(TYPE_COAXIAL, 'Coaxial'),
),
),
diff --git a/netbox/dcim/elevations.py b/netbox/dcim/elevations.py
index a3672f60d..a1af3968c 100644
--- a/netbox/dcim/elevations.py
+++ b/netbox/dcim/elevations.py
@@ -20,6 +20,16 @@ class RackElevationSVG:
self.rack = rack
self.include_images = include_images
+ def _get_device_description(self, device):
+ return '{} ({}) — {} ({}U) {} {}'.format(
+ device.name,
+ device.device_role,
+ device.device_type.display_name,
+ device.device_type.u_height,
+ device.asset_tag or '',
+ device.serial or ''
+ )
+
@staticmethod
def _add_gradient(drawing, id_, color):
gradient = drawing.linearGradient(
@@ -64,10 +74,7 @@ class RackElevationSVG:
fill='black'
)
)
- link.set_desc('{} — {} ({}U) {} {}'.format(
- device.device_role, device.device_type.display_name,
- device.device_type.u_height, device.asset_tag or '', device.serial or ''
- ))
+ link.set_desc(self._get_device_description(device))
link.add(drawing.rect(start, end, style='fill: #{}'.format(color), class_='slot'))
hex_color = '#{}'.format(foreground_color(color))
link.add(drawing.text(str(name), insert=text, fill=hex_color))
@@ -81,10 +88,7 @@ class RackElevationSVG:
def _draw_device_rear(self, drawing, device, start, end, text):
rect = drawing.rect(start, end, class_="slot blocked")
- rect.set_desc('{} — {} ({}U) {} {}'.format(
- device.device_role, device.device_type.display_name,
- device.device_type.u_height, device.asset_tag or '', device.serial or ''
- ))
+ rect.set_desc(self._get_device_description(device))
drawing.add(rect)
drawing.add(drawing.text(str(device), insert=text))
diff --git a/netbox/dcim/filters.py b/netbox/dcim/filters.py
index 7b278ca0e..7b98359c8 100644
--- a/netbox/dcim/filters.py
+++ b/netbox/dcim/filters.py
@@ -6,8 +6,8 @@ from tenancy.filters import TenancyFilterSet
from tenancy.models import Tenant
from utilities.constants import COLOR_CHOICES
from utilities.filters import (
- MultiValueCharFilter, MultiValueMACAddressFilter, MultiValueNumberFilter, NameSlugSearchFilterSet, NumericInFilter,
- TagFilter, TreeNodeMultipleChoiceFilter,
+ BaseFilterSet, MultiValueCharFilter, MultiValueMACAddressFilter, MultiValueNumberFilter,
+ NameSlugSearchFilterSet, NumericInFilter, TagFilter, TreeNodeMultipleChoiceFilter,
)
from virtualization.models import Cluster
from .choices import *
@@ -60,7 +60,7 @@ __all__ = (
)
-class RegionFilterSet(NameSlugSearchFilterSet):
+class RegionFilterSet(BaseFilterSet, NameSlugSearchFilterSet):
parent_id = django_filters.ModelMultipleChoiceFilter(
queryset=Region.objects.all(),
label='Parent region (ID)',
@@ -77,7 +77,7 @@ class RegionFilterSet(NameSlugSearchFilterSet):
fields = ['id', 'name', 'slug']
-class SiteFilterSet(TenancyFilterSet, CustomFieldFilterSet, CreatedUpdatedFilterSet):
+class SiteFilterSet(BaseFilterSet, TenancyFilterSet, CustomFieldFilterSet, CreatedUpdatedFilterSet):
id__in = NumericInFilter(
field_name='id',
lookup_expr='in'
@@ -92,12 +92,14 @@ class SiteFilterSet(TenancyFilterSet, CustomFieldFilterSet, CreatedUpdatedFilter
)
region_id = TreeNodeMultipleChoiceFilter(
queryset=Region.objects.all(),
- field_name='region__in',
+ field_name='region',
+ lookup_expr='in',
label='Region (ID)',
)
region = TreeNodeMultipleChoiceFilter(
queryset=Region.objects.all(),
- field_name='region__in',
+ field_name='region',
+ lookup_expr='in',
to_field_name='slug',
label='Region (slug)',
)
@@ -131,15 +133,17 @@ class SiteFilterSet(TenancyFilterSet, CustomFieldFilterSet, CreatedUpdatedFilter
return queryset.filter(qs_filter)
-class RackGroupFilterSet(NameSlugSearchFilterSet):
+class RackGroupFilterSet(BaseFilterSet, NameSlugSearchFilterSet):
region_id = TreeNodeMultipleChoiceFilter(
queryset=Region.objects.all(),
- field_name='site__region__in',
+ field_name='site__region',
+ lookup_expr='in',
label='Region (ID)',
)
region = TreeNodeMultipleChoiceFilter(
queryset=Region.objects.all(),
- field_name='site__region__in',
+ field_name='site__region',
+ lookup_expr='in',
to_field_name='slug',
label='Region (slug)',
)
@@ -159,14 +163,14 @@ class RackGroupFilterSet(NameSlugSearchFilterSet):
fields = ['id', 'name', 'slug']
-class RackRoleFilterSet(NameSlugSearchFilterSet):
+class RackRoleFilterSet(BaseFilterSet, NameSlugSearchFilterSet):
class Meta:
model = RackRole
fields = ['id', 'name', 'slug', 'color']
-class RackFilterSet(TenancyFilterSet, CustomFieldFilterSet, CreatedUpdatedFilterSet):
+class RackFilterSet(BaseFilterSet, TenancyFilterSet, CustomFieldFilterSet, CreatedUpdatedFilterSet):
id__in = NumericInFilter(
field_name='id',
lookup_expr='in'
@@ -177,12 +181,14 @@ class RackFilterSet(TenancyFilterSet, CustomFieldFilterSet, CreatedUpdatedFilter
)
region_id = TreeNodeMultipleChoiceFilter(
queryset=Region.objects.all(),
- field_name='site__region__in',
+ field_name='site__region',
+ lookup_expr='in',
label='Region (ID)',
)
region = TreeNodeMultipleChoiceFilter(
queryset=Region.objects.all(),
- field_name='site__region__in',
+ field_name='site__region',
+ lookup_expr='in',
to_field_name='slug',
label='Region (slug)',
)
@@ -244,7 +250,7 @@ class RackFilterSet(TenancyFilterSet, CustomFieldFilterSet, CreatedUpdatedFilter
)
-class RackReservationFilterSet(TenancyFilterSet):
+class RackReservationFilterSet(BaseFilterSet, TenancyFilterSet):
id__in = NumericInFilter(
field_name='id',
lookup_expr='in'
@@ -305,14 +311,14 @@ class RackReservationFilterSet(TenancyFilterSet):
)
-class ManufacturerFilterSet(NameSlugSearchFilterSet):
+class ManufacturerFilterSet(BaseFilterSet, NameSlugSearchFilterSet):
class Meta:
model = Manufacturer
fields = ['id', 'name', 'slug']
-class DeviceTypeFilterSet(CustomFieldFilterSet, CreatedUpdatedFilterSet):
+class DeviceTypeFilterSet(BaseFilterSet, CustomFieldFilterSet, CreatedUpdatedFilterSet):
id__in = NumericInFilter(
field_name='id',
lookup_expr='in'
@@ -410,70 +416,70 @@ class DeviceTypeComponentFilterSet(NameSlugSearchFilterSet):
)
-class ConsolePortTemplateFilterSet(DeviceTypeComponentFilterSet):
+class ConsolePortTemplateFilterSet(BaseFilterSet, DeviceTypeComponentFilterSet):
class Meta:
model = ConsolePortTemplate
fields = ['id', 'name', 'type']
-class ConsoleServerPortTemplateFilterSet(DeviceTypeComponentFilterSet):
+class ConsoleServerPortTemplateFilterSet(BaseFilterSet, DeviceTypeComponentFilterSet):
class Meta:
model = ConsoleServerPortTemplate
fields = ['id', 'name', 'type']
-class PowerPortTemplateFilterSet(DeviceTypeComponentFilterSet):
+class PowerPortTemplateFilterSet(BaseFilterSet, DeviceTypeComponentFilterSet):
class Meta:
model = PowerPortTemplate
fields = ['id', 'name', 'type', 'maximum_draw', 'allocated_draw']
-class PowerOutletTemplateFilterSet(DeviceTypeComponentFilterSet):
+class PowerOutletTemplateFilterSet(BaseFilterSet, DeviceTypeComponentFilterSet):
class Meta:
model = PowerOutletTemplate
fields = ['id', 'name', 'type', 'feed_leg']
-class InterfaceTemplateFilterSet(DeviceTypeComponentFilterSet):
+class InterfaceTemplateFilterSet(BaseFilterSet, DeviceTypeComponentFilterSet):
class Meta:
model = InterfaceTemplate
fields = ['id', 'name', 'type', 'mgmt_only']
-class FrontPortTemplateFilterSet(DeviceTypeComponentFilterSet):
+class FrontPortTemplateFilterSet(BaseFilterSet, DeviceTypeComponentFilterSet):
class Meta:
model = FrontPortTemplate
fields = ['id', 'name', 'type']
-class RearPortTemplateFilterSet(DeviceTypeComponentFilterSet):
+class RearPortTemplateFilterSet(BaseFilterSet, DeviceTypeComponentFilterSet):
class Meta:
model = RearPortTemplate
fields = ['id', 'name', 'type', 'positions']
-class DeviceBayTemplateFilterSet(DeviceTypeComponentFilterSet):
+class DeviceBayTemplateFilterSet(BaseFilterSet, DeviceTypeComponentFilterSet):
class Meta:
model = DeviceBayTemplate
fields = ['id', 'name']
-class DeviceRoleFilterSet(NameSlugSearchFilterSet):
+class DeviceRoleFilterSet(BaseFilterSet, NameSlugSearchFilterSet):
class Meta:
model = DeviceRole
fields = ['id', 'name', 'slug', 'color', 'vm_role']
-class PlatformFilterSet(NameSlugSearchFilterSet):
+class PlatformFilterSet(BaseFilterSet, NameSlugSearchFilterSet):
manufacturer_id = django_filters.ModelMultipleChoiceFilter(
field_name='manufacturer',
queryset=Manufacturer.objects.all(),
@@ -491,7 +497,13 @@ class PlatformFilterSet(NameSlugSearchFilterSet):
fields = ['id', 'name', 'slug', 'napalm_driver']
-class DeviceFilterSet(LocalConfigContextFilterSet, TenancyFilterSet, CustomFieldFilterSet, CreatedUpdatedFilterSet):
+class DeviceFilterSet(
+ BaseFilterSet,
+ TenancyFilterSet,
+ LocalConfigContextFilterSet,
+ CustomFieldFilterSet,
+ CreatedUpdatedFilterSet
+):
id__in = NumericInFilter(
field_name='id',
lookup_expr='in'
@@ -538,12 +550,14 @@ class DeviceFilterSet(LocalConfigContextFilterSet, TenancyFilterSet, CustomField
)
region_id = TreeNodeMultipleChoiceFilter(
queryset=Region.objects.all(),
- field_name='site__region__in',
+ field_name='site__region',
+ lookup_expr='in',
label='Region (ID)',
)
region = TreeNodeMultipleChoiceFilter(
queryset=Region.objects.all(),
- field_name='site__region__in',
+ field_name='site__region',
+ lookup_expr='in',
to_field_name='slug',
label='Region (slug)',
)
@@ -697,12 +711,14 @@ class DeviceComponentFilterSet(django_filters.FilterSet):
)
region_id = TreeNodeMultipleChoiceFilter(
queryset=Region.objects.all(),
- field_name='device__site__region__in',
+ field_name='device__site__region',
+ lookup_expr='in',
label='Region (ID)',
)
region = TreeNodeMultipleChoiceFilter(
queryset=Region.objects.all(),
- field_name='device__site__region__in',
+ field_name='device__site__region',
+ lookup_expr='in',
to_field_name='slug',
label='Region (slug)',
)
@@ -738,7 +754,7 @@ class DeviceComponentFilterSet(django_filters.FilterSet):
)
-class ConsolePortFilterSet(DeviceComponentFilterSet):
+class ConsolePortFilterSet(BaseFilterSet, DeviceComponentFilterSet):
type = django_filters.MultipleChoiceFilter(
choices=ConsolePortTypeChoices,
null_value=None
@@ -754,7 +770,7 @@ class ConsolePortFilterSet(DeviceComponentFilterSet):
fields = ['id', 'name', 'description', 'connection_status']
-class ConsoleServerPortFilterSet(DeviceComponentFilterSet):
+class ConsoleServerPortFilterSet(BaseFilterSet, DeviceComponentFilterSet):
type = django_filters.MultipleChoiceFilter(
choices=ConsolePortTypeChoices,
null_value=None
@@ -770,7 +786,7 @@ class ConsoleServerPortFilterSet(DeviceComponentFilterSet):
fields = ['id', 'name', 'description', 'connection_status']
-class PowerPortFilterSet(DeviceComponentFilterSet):
+class PowerPortFilterSet(BaseFilterSet, DeviceComponentFilterSet):
type = django_filters.MultipleChoiceFilter(
choices=PowerPortTypeChoices,
null_value=None
@@ -786,7 +802,7 @@ class PowerPortFilterSet(DeviceComponentFilterSet):
fields = ['id', 'name', 'maximum_draw', 'allocated_draw', 'description', 'connection_status']
-class PowerOutletFilterSet(DeviceComponentFilterSet):
+class PowerOutletFilterSet(BaseFilterSet, DeviceComponentFilterSet):
type = django_filters.MultipleChoiceFilter(
choices=PowerOutletTypeChoices,
null_value=None
@@ -802,7 +818,7 @@ class PowerOutletFilterSet(DeviceComponentFilterSet):
fields = ['id', 'name', 'feed_leg', 'description', 'connection_status']
-class InterfaceFilterSet(DeviceComponentFilterSet):
+class InterfaceFilterSet(BaseFilterSet, DeviceComponentFilterSet):
q = django_filters.CharFilter(
method='search',
label='Search',
@@ -900,7 +916,7 @@ class InterfaceFilterSet(DeviceComponentFilterSet):
}.get(value, queryset.none())
-class FrontPortFilterSet(DeviceComponentFilterSet):
+class FrontPortFilterSet(BaseFilterSet, DeviceComponentFilterSet):
cabled = django_filters.BooleanFilter(
field_name='cable',
lookup_expr='isnull',
@@ -912,7 +928,7 @@ class FrontPortFilterSet(DeviceComponentFilterSet):
fields = ['id', 'name', 'type', 'description']
-class RearPortFilterSet(DeviceComponentFilterSet):
+class RearPortFilterSet(BaseFilterSet, DeviceComponentFilterSet):
cabled = django_filters.BooleanFilter(
field_name='cable',
lookup_expr='isnull',
@@ -924,26 +940,28 @@ class RearPortFilterSet(DeviceComponentFilterSet):
fields = ['id', 'name', 'type', 'positions', 'description']
-class DeviceBayFilterSet(DeviceComponentFilterSet):
+class DeviceBayFilterSet(BaseFilterSet, DeviceComponentFilterSet):
class Meta:
model = DeviceBay
fields = ['id', 'name', 'description']
-class InventoryItemFilterSet(DeviceComponentFilterSet):
+class InventoryItemFilterSet(BaseFilterSet, DeviceComponentFilterSet):
q = django_filters.CharFilter(
method='search',
label='Search',
)
region_id = TreeNodeMultipleChoiceFilter(
queryset=Region.objects.all(),
- field_name='device__site__region__in',
+ field_name='device__site__region',
+ lookup_expr='in',
label='Region (ID)',
)
region = TreeNodeMultipleChoiceFilter(
queryset=Region.objects.all(),
- field_name='device__site__region__in',
+ field_name='device__site__region',
+ lookup_expr='in',
to_field_name='slug',
label='Region (slug)',
)
@@ -1002,19 +1020,21 @@ class InventoryItemFilterSet(DeviceComponentFilterSet):
return queryset.filter(qs_filter)
-class VirtualChassisFilterSet(django_filters.FilterSet):
+class VirtualChassisFilterSet(BaseFilterSet):
q = django_filters.CharFilter(
method='search',
label='Search',
)
region_id = TreeNodeMultipleChoiceFilter(
queryset=Region.objects.all(),
- field_name='master__site__region__in',
+ field_name='master__site__region',
+ lookup_expr='in',
label='Region (ID)',
)
region = TreeNodeMultipleChoiceFilter(
queryset=Region.objects.all(),
- field_name='master__site__region__in',
+ field_name='master__site__region',
+ lookup_expr='in',
to_field_name='slug',
label='Region (slug)',
)
@@ -1056,7 +1076,7 @@ class VirtualChassisFilterSet(django_filters.FilterSet):
return queryset.filter(qs_filter)
-class CableFilterSet(django_filters.FilterSet):
+class CableFilterSet(BaseFilterSet):
q = django_filters.CharFilter(
method='search',
label='Search',
@@ -1119,7 +1139,7 @@ class CableFilterSet(django_filters.FilterSet):
return queryset
-class ConsoleConnectionFilterSet(django_filters.FilterSet):
+class ConsoleConnectionFilterSet(BaseFilterSet):
site = django_filters.CharFilter(
method='filter_site',
label='Site (slug)',
@@ -1150,7 +1170,7 @@ class ConsoleConnectionFilterSet(django_filters.FilterSet):
)
-class PowerConnectionFilterSet(django_filters.FilterSet):
+class PowerConnectionFilterSet(BaseFilterSet):
site = django_filters.CharFilter(
method='filter_site',
label='Site (slug)',
@@ -1181,7 +1201,7 @@ class PowerConnectionFilterSet(django_filters.FilterSet):
)
-class InterfaceConnectionFilterSet(django_filters.FilterSet):
+class InterfaceConnectionFilterSet(BaseFilterSet):
site = django_filters.CharFilter(
method='filter_site',
label='Site (slug)',
@@ -1215,7 +1235,7 @@ class InterfaceConnectionFilterSet(django_filters.FilterSet):
)
-class PowerPanelFilterSet(django_filters.FilterSet):
+class PowerPanelFilterSet(BaseFilterSet):
id__in = NumericInFilter(
field_name='id',
lookup_expr='in'
@@ -1226,12 +1246,14 @@ class PowerPanelFilterSet(django_filters.FilterSet):
)
region_id = TreeNodeMultipleChoiceFilter(
queryset=Region.objects.all(),
- field_name='site__region__in',
+ field_name='site__region',
+ lookup_expr='in',
label='Region (ID)',
)
region = TreeNodeMultipleChoiceFilter(
queryset=Region.objects.all(),
- field_name='site__region__in',
+ field_name='site__region',
+ lookup_expr='in',
to_field_name='slug',
label='Region (slug)',
)
@@ -1264,7 +1286,7 @@ class PowerPanelFilterSet(django_filters.FilterSet):
return queryset.filter(qs_filter)
-class PowerFeedFilterSet(CustomFieldFilterSet, CreatedUpdatedFilterSet):
+class PowerFeedFilterSet(BaseFilterSet, CustomFieldFilterSet, CreatedUpdatedFilterSet):
id__in = NumericInFilter(
field_name='id',
lookup_expr='in'
@@ -1275,12 +1297,14 @@ class PowerFeedFilterSet(CustomFieldFilterSet, CreatedUpdatedFilterSet):
)
region_id = TreeNodeMultipleChoiceFilter(
queryset=Region.objects.all(),
- field_name='power_panel__site__region__in',
+ field_name='power_panel__site__region',
+ lookup_expr='in',
label='Region (ID)',
)
region = TreeNodeMultipleChoiceFilter(
queryset=Region.objects.all(),
- field_name='power_panel__site__region__in',
+ field_name='power_panel__site__region',
+ lookup_expr='in',
to_field_name='slug',
label='Region (slug)',
)
diff --git a/netbox/dcim/forms.py b/netbox/dcim/forms.py
index 0e5fb382a..9ba5cb7c2 100644
--- a/netbox/dcim/forms.py
+++ b/netbox/dcim/forms.py
@@ -2344,6 +2344,11 @@ class DeviceBulkAddInterfaceForm(DeviceBulkAddComponentForm):
class ConsolePortFilterForm(DeviceComponentFilterForm):
model = ConsolePort
+ type = forms.MultipleChoiceField(
+ choices=ConsolePortTypeChoices,
+ required=False,
+ widget=StaticSelect2Multiple()
+ )
tag = TagFilterField(model)
@@ -2429,6 +2434,11 @@ class ConsolePortCSVForm(forms.ModelForm):
class ConsoleServerPortFilterForm(DeviceComponentFilterForm):
model = ConsoleServerPort
+ type = forms.MultipleChoiceField(
+ choices=ConsolePortTypeChoices,
+ required=False,
+ widget=StaticSelect2Multiple()
+ )
tag = TagFilterField(model)
@@ -2528,6 +2538,11 @@ class ConsoleServerPortCSVForm(forms.ModelForm):
class PowerPortFilterForm(DeviceComponentFilterForm):
model = PowerPort
+ type = forms.MultipleChoiceField(
+ choices=PowerPortTypeChoices,
+ required=False,
+ widget=StaticSelect2Multiple()
+ )
tag = TagFilterField(model)
@@ -2633,6 +2648,11 @@ class PowerPortCSVForm(forms.ModelForm):
class PowerOutletFilterForm(DeviceComponentFilterForm):
model = PowerOutlet
+ type = forms.MultipleChoiceField(
+ choices=PowerOutletTypeChoices,
+ required=False,
+ widget=StaticSelect2Multiple()
+ )
tag = TagFilterField(model)
@@ -2821,6 +2841,11 @@ class PowerOutletBulkDisconnectForm(ConfirmationForm):
class InterfaceFilterForm(DeviceComponentFilterForm):
model = Interface
+ type = forms.MultipleChoiceField(
+ choices=InterfaceTypeChoices,
+ required=False,
+ widget=StaticSelect2Multiple()
+ )
enabled = forms.NullBooleanField(
required=False,
widget=StaticSelect2(
@@ -3190,6 +3215,11 @@ class InterfaceBulkDisconnectForm(ConfirmationForm):
class FrontPortFilterForm(DeviceComponentFilterForm):
model = FrontPort
+ type = forms.MultipleChoiceField(
+ choices=PortTypeChoices,
+ required=False,
+ widget=StaticSelect2Multiple()
+ )
tag = TagFilterField(model)
@@ -3379,6 +3409,11 @@ class FrontPortBulkDisconnectForm(ConfirmationForm):
class RearPortFilterForm(DeviceComponentFilterForm):
model = RearPort
+ type = forms.MultipleChoiceField(
+ choices=PortTypeChoices,
+ required=False,
+ widget=StaticSelect2Multiple()
+ )
tag = TagFilterField(model)
diff --git a/netbox/dcim/migrations/0071_device_components_add_description_squashed_0088_powerfeed_available_power.py b/netbox/dcim/migrations/0071_device_components_add_description_squashed_0088_powerfeed_available_power.py
deleted file mode 100644
index f74572c6f..000000000
--- a/netbox/dcim/migrations/0071_device_components_add_description_squashed_0088_powerfeed_available_power.py
+++ /dev/null
@@ -1,839 +0,0 @@
-import sys
-
-import django.core.validators
-import django.db.models.deletion
-import taggit.managers
-from django.db import migrations, models
-
-SITE_STATUS_CHOICES = (
- (1, 'active'),
- (2, 'planned'),
- (4, 'retired'),
-)
-
-RACK_TYPE_CHOICES = (
- (100, '2-post-frame'),
- (200, '4-post-frame'),
- (300, '4-post-cabinet'),
- (1000, 'wall-frame'),
- (1100, 'wall-cabinet'),
-)
-
-RACK_STATUS_CHOICES = (
- (0, 'reserved'),
- (1, 'available'),
- (2, 'planned'),
- (3, 'active'),
- (4, 'deprecated'),
-)
-
-RACK_DIMENSION_CHOICES = (
- (1000, 'mm'),
- (2000, 'in'),
-)
-
-SUBDEVICE_ROLE_CHOICES = (
- ('true', 'parent'),
- ('false', 'child'),
-)
-
-DEVICE_FACE_CHOICES = (
- (0, 'front'),
- (1, 'rear'),
-)
-
-DEVICE_STATUS_CHOICES = (
- (0, 'offline'),
- (1, 'active'),
- (2, 'planned'),
- (3, 'staged'),
- (4, 'failed'),
- (5, 'inventory'),
- (6, 'decommissioning'),
-)
-
-INTERFACE_TYPE_CHOICES = (
- (0, 'virtual'),
- (200, 'lag'),
- (800, '100base-tx'),
- (1000, '1000base-t'),
- (1050, '1000base-x-gbic'),
- (1100, '1000base-x-sfp'),
- (1120, '2.5gbase-t'),
- (1130, '5gbase-t'),
- (1150, '10gbase-t'),
- (1170, '10gbase-cx4'),
- (1200, '10gbase-x-sfpp'),
- (1300, '10gbase-x-xfp'),
- (1310, '10gbase-x-xenpak'),
- (1320, '10gbase-x-x2'),
- (1350, '25gbase-x-sfp28'),
- (1400, '40gbase-x-qsfpp'),
- (1420, '50gbase-x-sfp28'),
- (1500, '100gbase-x-cfp'),
- (1510, '100gbase-x-cfp2'),
- (1520, '100gbase-x-cfp4'),
- (1550, '100gbase-x-cpak'),
- (1600, '100gbase-x-qsfp28'),
- (1650, '200gbase-x-cfp2'),
- (1700, '200gbase-x-qsfp56'),
- (1750, '400gbase-x-qsfpdd'),
- (1800, '400gbase-x-osfp'),
- (2600, 'ieee802.11a'),
- (2610, 'ieee802.11g'),
- (2620, 'ieee802.11n'),
- (2630, 'ieee802.11ac'),
- (2640, 'ieee802.11ad'),
- (2810, 'gsm'),
- (2820, 'cdma'),
- (2830, 'lte'),
- (6100, 'sonet-oc3'),
- (6200, 'sonet-oc12'),
- (6300, 'sonet-oc48'),
- (6400, 'sonet-oc192'),
- (6500, 'sonet-oc768'),
- (6600, 'sonet-oc1920'),
- (6700, 'sonet-oc3840'),
- (3010, '1gfc-sfp'),
- (3020, '2gfc-sfp'),
- (3040, '4gfc-sfp'),
- (3080, '8gfc-sfpp'),
- (3160, '16gfc-sfpp'),
- (3320, '32gfc-sfp28'),
- (3400, '128gfc-sfp28'),
- (7010, 'inifiband-sdr'),
- (7020, 'inifiband-ddr'),
- (7030, 'inifiband-qdr'),
- (7040, 'inifiband-fdr10'),
- (7050, 'inifiband-fdr'),
- (7060, 'inifiband-edr'),
- (7070, 'inifiband-hdr'),
- (7080, 'inifiband-ndr'),
- (7090, 'inifiband-xdr'),
- (4000, 't1'),
- (4010, 'e1'),
- (4040, 't3'),
- (4050, 'e3'),
- (5000, 'cisco-stackwise'),
- (5050, 'cisco-stackwise-plus'),
- (5100, 'cisco-flexstack'),
- (5150, 'cisco-flexstack-plus'),
- (5200, 'juniper-vcp'),
- (5300, 'extreme-summitstack'),
- (5310, 'extreme-summitstack-128'),
- (5320, 'extreme-summitstack-256'),
- (5330, 'extreme-summitstack-512'),
-)
-
-INTERFACE_MODE_CHOICES = (
- (100, 'access'),
- (200, 'tagged'),
- (300, 'tagged-all'),
-)
-
-PORT_TYPE_CHOICES = (
- (1000, '8p8c'),
- (1100, '110-punch'),
- (1200, 'bnc'),
- (2000, 'st'),
- (2100, 'sc'),
- (2110, 'sc-apc'),
- (2200, 'fc'),
- (2300, 'lc'),
- (2310, 'lc-apc'),
- (2400, 'mtrj'),
- (2500, 'mpo'),
- (2600, 'lsh'),
- (2610, 'lsh-apc'),
-)
-
-CABLE_TYPE_CHOICES = (
- (1300, 'cat3'),
- (1500, 'cat5'),
- (1510, 'cat5e'),
- (1600, 'cat6'),
- (1610, 'cat6a'),
- (1700, 'cat7'),
- (1800, 'dac-active'),
- (1810, 'dac-passive'),
- (1900, 'coaxial'),
- (3000, 'mmf'),
- (3010, 'mmf-om1'),
- (3020, 'mmf-om2'),
- (3030, 'mmf-om3'),
- (3040, 'mmf-om4'),
- (3500, 'smf'),
- (3510, 'smf-os1'),
- (3520, 'smf-os2'),
- (3800, 'aoc'),
- (5000, 'power'),
-)
-
-CABLE_STATUS_CHOICES = (
- ('true', 'connected'),
- ('false', 'planned'),
-)
-
-CABLE_LENGTH_UNIT_CHOICES = (
- (1200, 'm'),
- (1100, 'cm'),
- (2100, 'ft'),
- (2000, 'in'),
-)
-
-POWERFEED_STATUS_CHOICES = (
- (0, 'offline'),
- (1, 'active'),
- (2, 'planned'),
- (4, 'failed'),
-)
-
-POWERFEED_TYPE_CHOICES = (
- (1, 'primary'),
- (2, 'redundant'),
-)
-
-POWERFEED_SUPPLY_CHOICES = (
- (1, 'ac'),
- (2, 'dc'),
-)
-
-POWERFEED_PHASE_CHOICES = (
- (1, 'single-phase'),
- (3, 'three-phase'),
-)
-
-POWEROUTLET_FEED_LEG_CHOICES_CHOICES = (
- (1, 'A'),
- (2, 'B'),
- (3, 'C'),
-)
-
-
-def cache_cable_devices(apps, schema_editor):
- Cable = apps.get_model('dcim', 'Cable')
-
- if 'test' not in sys.argv:
- print("\nUpdating cable device terminations...")
- cable_count = Cable.objects.count()
-
- # Cache A/B termination devices on all existing Cables. Note that the custom save() method on Cable is not
- # available during a migration, so we replicate its logic here.
- for i, cable in enumerate(Cable.objects.all(), start=1):
-
- if not i % 1000 and 'test' not in sys.argv:
- print("[{}/{}]".format(i, cable_count))
-
- termination_a_model = apps.get_model(cable.termination_a_type.app_label, cable.termination_a_type.model)
- termination_a_device = None
- if hasattr(termination_a_model, 'device'):
- termination_a = termination_a_model.objects.get(pk=cable.termination_a_id)
- termination_a_device = termination_a.device
-
- termination_b_model = apps.get_model(cable.termination_b_type.app_label, cable.termination_b_type.model)
- termination_b_device = None
- if hasattr(termination_b_model, 'device'):
- termination_b = termination_b_model.objects.get(pk=cable.termination_b_id)
- termination_b_device = termination_b.device
-
- Cable.objects.filter(pk=cable.pk).update(
- _termination_a_device=termination_a_device,
- _termination_b_device=termination_b_device
- )
-
-
-def site_status_to_slug(apps, schema_editor):
- Site = apps.get_model('dcim', 'Site')
- for id, slug in SITE_STATUS_CHOICES:
- Site.objects.filter(status=str(id)).update(status=slug)
-
-
-def rack_type_to_slug(apps, schema_editor):
- Rack = apps.get_model('dcim', 'Rack')
- for id, slug in RACK_TYPE_CHOICES:
- Rack.objects.filter(type=str(id)).update(type=slug)
-
-
-def rack_status_to_slug(apps, schema_editor):
- Rack = apps.get_model('dcim', 'Rack')
- for id, slug in RACK_STATUS_CHOICES:
- Rack.objects.filter(status=str(id)).update(status=slug)
-
-
-def rack_outer_unit_to_slug(apps, schema_editor):
- Rack = apps.get_model('dcim', 'Rack')
- for id, slug in RACK_DIMENSION_CHOICES:
- Rack.objects.filter(status=str(id)).update(status=slug)
-
-
-def devicetype_subdevicerole_to_slug(apps, schema_editor):
- DeviceType = apps.get_model('dcim', 'DeviceType')
- for boolean, slug in SUBDEVICE_ROLE_CHOICES:
- DeviceType.objects.filter(subdevice_role=boolean).update(subdevice_role=slug)
-
-
-def device_face_to_slug(apps, schema_editor):
- Device = apps.get_model('dcim', 'Device')
- for id, slug in DEVICE_FACE_CHOICES:
- Device.objects.filter(face=str(id)).update(face=slug)
-
-
-def device_status_to_slug(apps, schema_editor):
- Device = apps.get_model('dcim', 'Device')
- for id, slug in DEVICE_STATUS_CHOICES:
- Device.objects.filter(status=str(id)).update(status=slug)
-
-
-def interfacetemplate_type_to_slug(apps, schema_editor):
- InterfaceTemplate = apps.get_model('dcim', 'InterfaceTemplate')
- for id, slug in INTERFACE_TYPE_CHOICES:
- InterfaceTemplate.objects.filter(type=id).update(type=slug)
-
-
-def interface_type_to_slug(apps, schema_editor):
- Interface = apps.get_model('dcim', 'Interface')
- for id, slug in INTERFACE_TYPE_CHOICES:
- Interface.objects.filter(type=id).update(type=slug)
-
-
-def interface_mode_to_slug(apps, schema_editor):
- Interface = apps.get_model('dcim', 'Interface')
- for id, slug in INTERFACE_MODE_CHOICES:
- Interface.objects.filter(mode=id).update(mode=slug)
-
-
-def frontporttemplate_type_to_slug(apps, schema_editor):
- FrontPortTemplate = apps.get_model('dcim', 'FrontPortTemplate')
- for id, slug in PORT_TYPE_CHOICES:
- FrontPortTemplate.objects.filter(type=id).update(type=slug)
-
-
-def rearporttemplate_type_to_slug(apps, schema_editor):
- RearPortTemplate = apps.get_model('dcim', 'RearPortTemplate')
- for id, slug in PORT_TYPE_CHOICES:
- RearPortTemplate.objects.filter(type=id).update(type=slug)
-
-
-def frontport_type_to_slug(apps, schema_editor):
- FrontPort = apps.get_model('dcim', 'FrontPort')
- for id, slug in PORT_TYPE_CHOICES:
- FrontPort.objects.filter(type=id).update(type=slug)
-
-
-def rearport_type_to_slug(apps, schema_editor):
- RearPort = apps.get_model('dcim', 'RearPort')
- for id, slug in PORT_TYPE_CHOICES:
- RearPort.objects.filter(type=id).update(type=slug)
-
-
-def cable_type_to_slug(apps, schema_editor):
- Cable = apps.get_model('dcim', 'Cable')
- for id, slug in CABLE_TYPE_CHOICES:
- Cable.objects.filter(type=id).update(type=slug)
-
-
-def cable_status_to_slug(apps, schema_editor):
- Cable = apps.get_model('dcim', 'Cable')
- for bool_str, slug in CABLE_STATUS_CHOICES:
- Cable.objects.filter(status=bool_str).update(status=slug)
-
-
-def cable_length_unit_to_slug(apps, schema_editor):
- Cable = apps.get_model('dcim', 'Cable')
- for id, slug in CABLE_LENGTH_UNIT_CHOICES:
- Cable.objects.filter(length_unit=id).update(length_unit=slug)
-
-
-def powerfeed_status_to_slug(apps, schema_editor):
- PowerFeed = apps.get_model('dcim', 'PowerFeed')
- for id, slug in POWERFEED_STATUS_CHOICES:
- PowerFeed.objects.filter(status=id).update(status=slug)
-
-
-def powerfeed_type_to_slug(apps, schema_editor):
- PowerFeed = apps.get_model('dcim', 'PowerFeed')
- for id, slug in POWERFEED_TYPE_CHOICES:
- PowerFeed.objects.filter(type=id).update(type=slug)
-
-
-def powerfeed_supply_to_slug(apps, schema_editor):
- PowerFeed = apps.get_model('dcim', 'PowerFeed')
- for id, slug in POWERFEED_SUPPLY_CHOICES:
- PowerFeed.objects.filter(supply=id).update(supply=slug)
-
-
-def powerfeed_phase_to_slug(apps, schema_editor):
- PowerFeed = apps.get_model('dcim', 'PowerFeed')
- for id, slug in POWERFEED_PHASE_CHOICES:
- PowerFeed.objects.filter(phase=id).update(phase=slug)
-
-
-def poweroutlettemplate_feed_leg_to_slug(apps, schema_editor):
- PowerOutletTemplate = apps.get_model('dcim', 'PowerOutletTemplate')
- for id, slug in POWEROUTLET_FEED_LEG_CHOICES_CHOICES:
- PowerOutletTemplate.objects.filter(feed_leg=id).update(feed_leg=slug)
-
-
-def poweroutlet_feed_leg_to_slug(apps, schema_editor):
- PowerOutlet = apps.get_model('dcim', 'PowerOutlet')
- for id, slug in POWEROUTLET_FEED_LEG_CHOICES_CHOICES:
- PowerOutlet.objects.filter(feed_leg=id).update(feed_leg=slug)
-
-
-class Migration(migrations.Migration):
-
- replaces = [('dcim', '0071_device_components_add_description'), ('dcim', '0072_powerfeeds'), ('dcim', '0073_interface_form_factor_to_type'), ('dcim', '0074_increase_field_length_platform_name_slug'), ('dcim', '0075_cable_devices'), ('dcim', '0076_console_port_types'), ('dcim', '0077_power_types'), ('dcim', '0078_3569_site_fields'), ('dcim', '0079_3569_rack_fields'), ('dcim', '0080_3569_devicetype_fields'), ('dcim', '0081_3569_device_fields'), ('dcim', '0082_3569_interface_fields'), ('dcim', '0082_3569_port_fields'), ('dcim', '0083_3569_cable_fields'), ('dcim', '0084_3569_powerfeed_fields'), ('dcim', '0085_3569_poweroutlet_fields'), ('dcim', '0086_device_name_nonunique'), ('dcim', '0087_role_descriptions'), ('dcim', '0088_powerfeed_available_power')]
-
- dependencies = [
- ('dcim', '0070_custom_tag_models'),
- ('extras', '0021_add_color_comments_changelog_to_tag'),
- ('tenancy', '0006_custom_tag_models'),
- ]
-
- operations = [
- migrations.AddField(
- model_name='consoleport',
- name='description',
- field=models.CharField(blank=True, max_length=100),
- ),
- migrations.AddField(
- model_name='consoleserverport',
- name='description',
- field=models.CharField(blank=True, max_length=100),
- ),
- migrations.AddField(
- model_name='devicebay',
- name='description',
- field=models.CharField(blank=True, max_length=100),
- ),
- migrations.AddField(
- model_name='poweroutlet',
- name='description',
- field=models.CharField(blank=True, max_length=100),
- ),
- migrations.AddField(
- model_name='powerport',
- name='description',
- field=models.CharField(blank=True, max_length=100),
- ),
- migrations.CreateModel(
- name='PowerPanel',
- fields=[
- ('id', models.AutoField(auto_created=True, primary_key=True, serialize=False)),
- ('created', models.DateField(auto_now_add=True, null=True)),
- ('last_updated', models.DateTimeField(auto_now=True, null=True)),
- ('name', models.CharField(max_length=50)),
- ('rack_group', models.ForeignKey(blank=True, null=True, on_delete=django.db.models.deletion.PROTECT, to='dcim.RackGroup')),
- ('site', models.ForeignKey(on_delete=django.db.models.deletion.PROTECT, to='dcim.Site')),
- ],
- options={
- 'ordering': ['site', 'name'],
- 'unique_together': {('site', 'name')},
- },
- ),
- migrations.CreateModel(
- name='PowerFeed',
- fields=[
- ('id', models.AutoField(auto_created=True, primary_key=True, serialize=False)),
- ('created', models.DateField(auto_now_add=True, null=True)),
- ('last_updated', models.DateTimeField(auto_now=True, null=True)),
- ('name', models.CharField(max_length=50)),
- ('status', models.PositiveSmallIntegerField(default=1)),
- ('type', models.PositiveSmallIntegerField(default=1)),
- ('supply', models.PositiveSmallIntegerField(default=1)),
- ('phase', models.PositiveSmallIntegerField(default=1)),
- ('voltage', models.PositiveSmallIntegerField(default=120, validators=[django.core.validators.MinValueValidator(1)])),
- ('amperage', models.PositiveSmallIntegerField(default=20, validators=[django.core.validators.MinValueValidator(1)])),
- ('max_utilization', models.PositiveSmallIntegerField(default=80, validators=[django.core.validators.MinValueValidator(1), django.core.validators.MaxValueValidator(100)])),
- ('available_power', models.PositiveSmallIntegerField(default=0, editable=False)),
- ('comments', models.TextField(blank=True)),
- ('cable', models.ForeignKey(blank=True, null=True, on_delete=django.db.models.deletion.SET_NULL, related_name='+', to='dcim.Cable')),
- ('power_panel', models.ForeignKey(on_delete=django.db.models.deletion.PROTECT, related_name='powerfeeds', to='dcim.PowerPanel')),
- ('rack', models.ForeignKey(blank=True, null=True, on_delete=django.db.models.deletion.PROTECT, to='dcim.Rack')),
- ('tags', taggit.managers.TaggableManager(help_text='A comma-separated list of tags.', through='extras.TaggedItem', to='extras.Tag', verbose_name='Tags')),
- ('connected_endpoint', models.OneToOneField(blank=True, null=True, on_delete=django.db.models.deletion.SET_NULL, related_name='+', to='dcim.PowerPort')),
- ('connection_status', models.NullBooleanField()),
- ],
- options={
- 'ordering': ['power_panel', 'name'],
- 'unique_together': {('power_panel', 'name')},
- },
- ),
- migrations.RenameField(
- model_name='powerport',
- old_name='connected_endpoint',
- new_name='_connected_poweroutlet',
- ),
- migrations.AddField(
- model_name='powerport',
- name='_connected_powerfeed',
- field=models.OneToOneField(blank=True, null=True, on_delete=django.db.models.deletion.SET_NULL, related_name='+', to='dcim.PowerFeed'),
- ),
- migrations.AddField(
- model_name='powerport',
- name='allocated_draw',
- field=models.PositiveSmallIntegerField(blank=True, null=True, validators=[django.core.validators.MinValueValidator(1)]),
- ),
- migrations.AddField(
- model_name='powerport',
- name='maximum_draw',
- field=models.PositiveSmallIntegerField(blank=True, null=True, validators=[django.core.validators.MinValueValidator(1)]),
- ),
- migrations.AddField(
- model_name='powerporttemplate',
- name='allocated_draw',
- field=models.PositiveSmallIntegerField(blank=True, null=True, validators=[django.core.validators.MinValueValidator(1)]),
- ),
- migrations.AddField(
- model_name='powerporttemplate',
- name='maximum_draw',
- field=models.PositiveSmallIntegerField(blank=True, null=True, validators=[django.core.validators.MinValueValidator(1)]),
- ),
- migrations.AddField(
- model_name='poweroutlet',
- name='feed_leg',
- field=models.PositiveSmallIntegerField(blank=True, null=True),
- ),
- migrations.AddField(
- model_name='poweroutlet',
- name='power_port',
- field=models.ForeignKey(blank=True, null=True, on_delete=django.db.models.deletion.SET_NULL, related_name='poweroutlets', to='dcim.PowerPort'),
- ),
- migrations.AddField(
- model_name='poweroutlettemplate',
- name='feed_leg',
- field=models.PositiveSmallIntegerField(blank=True, null=True),
- ),
- migrations.AddField(
- model_name='poweroutlettemplate',
- name='power_port',
- field=models.ForeignKey(blank=True, null=True, on_delete=django.db.models.deletion.SET_NULL, related_name='poweroutlet_templates', to='dcim.PowerPortTemplate'),
- ),
- migrations.RenameField(
- model_name='interface',
- old_name='form_factor',
- new_name='type',
- ),
- migrations.RenameField(
- model_name='interfacetemplate',
- old_name='form_factor',
- new_name='type',
- ),
- migrations.AlterField(
- model_name='platform',
- name='name',
- field=models.CharField(max_length=100, unique=True),
- ),
- migrations.AlterField(
- model_name='platform',
- name='slug',
- field=models.SlugField(max_length=100, unique=True),
- ),
- migrations.AddField(
- model_name='cable',
- name='_termination_a_device',
- field=models.ForeignKey(blank=True, null=True, on_delete=django.db.models.deletion.CASCADE, related_name='+', to='dcim.Device'),
- ),
- migrations.AddField(
- model_name='cable',
- name='_termination_b_device',
- field=models.ForeignKey(blank=True, null=True, on_delete=django.db.models.deletion.CASCADE, related_name='+', to='dcim.Device'),
- ),
- migrations.RunPython(
- code=cache_cable_devices,
- reverse_code=django.db.migrations.operations.special.RunPython.noop,
- ),
- migrations.AddField(
- model_name='consoleport',
- name='type',
- field=models.CharField(blank=True, max_length=50),
- ),
- migrations.AddField(
- model_name='consoleporttemplate',
- name='type',
- field=models.CharField(blank=True, max_length=50),
- ),
- migrations.AddField(
- model_name='consoleserverport',
- name='type',
- field=models.CharField(blank=True, max_length=50),
- ),
- migrations.AddField(
- model_name='consoleserverporttemplate',
- name='type',
- field=models.CharField(blank=True, max_length=50),
- ),
- migrations.AddField(
- model_name='poweroutlet',
- name='type',
- field=models.CharField(blank=True, max_length=50),
- ),
- migrations.AddField(
- model_name='poweroutlettemplate',
- name='type',
- field=models.CharField(blank=True, max_length=50),
- ),
- migrations.AddField(
- model_name='powerport',
- name='type',
- field=models.CharField(blank=True, max_length=50),
- ),
- migrations.AddField(
- model_name='powerporttemplate',
- name='type',
- field=models.CharField(blank=True, max_length=50),
- ),
- migrations.AlterField(
- model_name='site',
- name='status',
- field=models.CharField(default='active', max_length=50),
- ),
- migrations.RunPython(
- code=site_status_to_slug,
- ),
- migrations.AlterField(
- model_name='rack',
- name='type',
- field=models.CharField(blank=True, default='', max_length=50),
- ),
- migrations.RunPython(
- code=rack_type_to_slug,
- ),
- migrations.AlterField(
- model_name='rack',
- name='type',
- field=models.CharField(blank=True, max_length=50),
- ),
- migrations.AlterField(
- model_name='rack',
- name='status',
- field=models.CharField(default='active', max_length=50),
- ),
- migrations.RunPython(
- code=rack_status_to_slug,
- ),
- migrations.AlterField(
- model_name='rack',
- name='outer_unit',
- field=models.CharField(blank=True, default='', max_length=50),
- ),
- migrations.RunPython(
- code=rack_outer_unit_to_slug,
- ),
- migrations.AlterField(
- model_name='rack',
- name='outer_unit',
- field=models.CharField(blank=True, max_length=50),
- ),
- migrations.AlterField(
- model_name='devicetype',
- name='subdevice_role',
- field=models.CharField(blank=True, default='', max_length=50),
- ),
- migrations.RunPython(
- code=devicetype_subdevicerole_to_slug,
- ),
- migrations.AlterField(
- model_name='devicetype',
- name='subdevice_role',
- field=models.CharField(blank=True, max_length=50),
- ),
- migrations.AlterField(
- model_name='device',
- name='face',
- field=models.CharField(blank=True, default='', max_length=50),
- ),
- migrations.RunPython(
- code=device_face_to_slug,
- ),
- migrations.AlterField(
- model_name='device',
- name='face',
- field=models.CharField(blank=True, max_length=50),
- ),
- migrations.AlterField(
- model_name='device',
- name='status',
- field=models.CharField(default='active', max_length=50),
- ),
- migrations.RunPython(
- code=device_status_to_slug,
- ),
- migrations.AlterField(
- model_name='interfacetemplate',
- name='type',
- field=models.CharField(max_length=50),
- ),
- migrations.RunPython(
- code=interfacetemplate_type_to_slug,
- ),
- migrations.AlterField(
- model_name='interface',
- name='type',
- field=models.CharField(max_length=50),
- ),
- migrations.RunPython(
- code=interface_type_to_slug,
- ),
- migrations.AlterField(
- model_name='interface',
- name='mode',
- field=models.CharField(blank=True, default='', max_length=50),
- ),
- migrations.RunPython(
- code=interface_mode_to_slug,
- ),
- migrations.AlterField(
- model_name='interface',
- name='mode',
- field=models.CharField(blank=True, max_length=50),
- ),
- migrations.AlterField(
- model_name='frontporttemplate',
- name='type',
- field=models.CharField(max_length=50),
- ),
- migrations.RunPython(
- code=frontporttemplate_type_to_slug,
- ),
- migrations.AlterField(
- model_name='rearporttemplate',
- name='type',
- field=models.CharField(max_length=50),
- ),
- migrations.RunPython(
- code=rearporttemplate_type_to_slug,
- ),
- migrations.AlterField(
- model_name='frontport',
- name='type',
- field=models.CharField(max_length=50),
- ),
- migrations.RunPython(
- code=frontport_type_to_slug,
- ),
- migrations.AlterField(
- model_name='rearport',
- name='type',
- field=models.CharField(max_length=50),
- ),
- migrations.RunPython(
- code=rearport_type_to_slug,
- ),
- migrations.AlterField(
- model_name='cable',
- name='type',
- field=models.CharField(blank=True, default='', max_length=50),
- ),
- migrations.RunPython(
- code=cable_type_to_slug,
- ),
- migrations.AlterField(
- model_name='cable',
- name='type',
- field=models.CharField(blank=True, max_length=50),
- ),
- migrations.AlterField(
- model_name='cable',
- name='status',
- field=models.CharField(default='connected', max_length=50),
- ),
- migrations.RunPython(
- code=cable_status_to_slug,
- ),
- migrations.AlterField(
- model_name='cable',
- name='length_unit',
- field=models.CharField(blank=True, default='', max_length=50),
- ),
- migrations.RunPython(
- code=cable_length_unit_to_slug,
- ),
- migrations.AlterField(
- model_name='cable',
- name='length_unit',
- field=models.CharField(blank=True, max_length=50),
- ),
- migrations.AlterField(
- model_name='powerfeed',
- name='status',
- field=models.CharField(default='active', max_length=50),
- ),
- migrations.RunPython(
- code=powerfeed_status_to_slug,
- ),
- migrations.AlterField(
- model_name='powerfeed',
- name='type',
- field=models.CharField(default='primary', max_length=50),
- ),
- migrations.RunPython(
- code=powerfeed_type_to_slug,
- ),
- migrations.AlterField(
- model_name='powerfeed',
- name='supply',
- field=models.CharField(default='ac', max_length=50),
- ),
- migrations.RunPython(
- code=powerfeed_supply_to_slug,
- ),
- migrations.AlterField(
- model_name='powerfeed',
- name='phase',
- field=models.CharField(default='single-phase', max_length=50),
- ),
- migrations.RunPython(
- code=powerfeed_phase_to_slug,
- ),
- migrations.AlterField(
- model_name='poweroutlettemplate',
- name='feed_leg',
- field=models.CharField(blank=True, default='', max_length=50),
- ),
- migrations.RunPython(
- code=poweroutlettemplate_feed_leg_to_slug,
- ),
- migrations.AlterField(
- model_name='poweroutlettemplate',
- name='feed_leg',
- field=models.CharField(blank=True, max_length=50),
- ),
- migrations.AlterField(
- model_name='poweroutlet',
- name='feed_leg',
- field=models.CharField(blank=True, default='', max_length=50),
- ),
- migrations.RunPython(
- code=poweroutlet_feed_leg_to_slug,
- ),
- migrations.AlterField(
- model_name='poweroutlet',
- name='feed_leg',
- field=models.CharField(blank=True, max_length=50),
- ),
- migrations.AlterField(
- model_name='device',
- name='name',
- field=models.CharField(blank=True, max_length=64, null=True),
- ),
- migrations.AlterUniqueTogether(
- name='device',
- unique_together={('rack', 'position', 'face'), ('site', 'tenant', 'name'), ('virtual_chassis', 'vc_position')},
- ),
- migrations.AddField(
- model_name='devicerole',
- name='description',
- field=models.CharField(blank=True, max_length=100),
- ),
- migrations.AddField(
- model_name='rackrole',
- name='description',
- field=models.CharField(blank=True, max_length=100),
- ),
- migrations.AlterField(
- model_name='powerfeed',
- name='available_power',
- field=models.PositiveIntegerField(default=0, editable=False),
- ),
- ]
diff --git a/netbox/dcim/migrations/0099_powerfeed_negative_voltage.py b/netbox/dcim/migrations/0099_powerfeed_negative_voltage.py
new file mode 100644
index 000000000..db16fbc91
--- /dev/null
+++ b/netbox/dcim/migrations/0099_powerfeed_negative_voltage.py
@@ -0,0 +1,19 @@
+# Generated by Django 2.2.10 on 2020-03-03 16:59
+
+from django.db import migrations, models
+import utilities.validators
+
+
+class Migration(migrations.Migration):
+
+ dependencies = [
+ ('dcim', '0098_devicetype_images'),
+ ]
+
+ operations = [
+ migrations.AlterField(
+ model_name='powerfeed',
+ name='voltage',
+ field=models.SmallIntegerField(default=120, validators=[utilities.validators.ExclusionValidator([0])]),
+ ),
+ ]
diff --git a/netbox/dcim/models/__init__.py b/netbox/dcim/models/__init__.py
index 821b8eeb7..8b84c79d8 100644
--- a/netbox/dcim/models/__init__.py
+++ b/netbox/dcim/models/__init__.py
@@ -24,6 +24,7 @@ from extras.models import ConfigContextModel, CustomFieldModel, ObjectChange, Ta
from utilities.fields import ColorField, NaturalOrderingField
from utilities.models import ChangeLoggedModel
from utilities.utils import serialize_object, to_meters
+from utilities.validators import ExclusionValidator
from .device_component_templates import (
ConsolePortTemplate, ConsoleServerPortTemplate, DeviceBayTemplate, FrontPortTemplate, InterfaceTemplate,
PowerOutletTemplate, PowerPortTemplate, RearPortTemplate,
@@ -1775,9 +1776,9 @@ class PowerFeed(ChangeLoggedModel, CableTermination, CustomFieldModel):
choices=PowerFeedPhaseChoices,
default=PowerFeedPhaseChoices.PHASE_SINGLE
)
- voltage = models.PositiveSmallIntegerField(
- validators=[MinValueValidator(1)],
- default=POWERFEED_VOLTAGE_DEFAULT
+ voltage = models.SmallIntegerField(
+ default=POWERFEED_VOLTAGE_DEFAULT,
+ validators=[ExclusionValidator([0])]
)
amperage = models.PositiveSmallIntegerField(
validators=[MinValueValidator(1)],
@@ -1859,10 +1860,16 @@ class PowerFeed(ChangeLoggedModel, CableTermination, CustomFieldModel):
self.rack, self.rack.site, self.power_panel, self.power_panel.site
))
+ # AC voltage cannot be negative
+ if self.voltage < 0 and self.supply == PowerFeedSupplyChoices.SUPPLY_AC:
+ raise ValidationError({
+ "voltage": "Voltage cannot be negative for AC supply"
+ })
+
def save(self, *args, **kwargs):
# Cache the available_power property on the instance
- kva = self.voltage * self.amperage * (self.max_utilization / 100)
+ kva = abs(self.voltage) * self.amperage * (self.max_utilization / 100)
if self.phase == PowerFeedPhaseChoices.PHASE_3PHASE:
self.available_power = round(kva * 1.732)
else:
diff --git a/netbox/dcim/models/device_component_templates.py b/netbox/dcim/models/device_component_templates.py
index faa42b035..164d37d77 100644
--- a/netbox/dcim/models/device_component_templates.py
+++ b/netbox/dcim/models/device_component_templates.py
@@ -1,4 +1,4 @@
-from django.core.exceptions import ValidationError
+from django.core.exceptions import ObjectDoesNotExist, ValidationError
from django.core.validators import MaxValueValidator, MinValueValidator
from django.db import models
@@ -37,11 +37,17 @@ class ComponentTemplateModel(models.Model):
raise NotImplementedError()
def to_objectchange(self, action):
+ # Annotate the parent DeviceType
+ try:
+ device_type = self.device_type
+ except ObjectDoesNotExist:
+ # The parent DeviceType has already been deleted
+ device_type = None
return ObjectChange(
changed_object=self,
object_repr=str(self),
action=action,
- related_object=self.device_type,
+ related_object=device_type,
object_data=serialize_object(self)
)
diff --git a/netbox/dcim/tests/test_filters.py b/netbox/dcim/tests/test_filters.py
index 83f40fe56..c93a3a5f6 100644
--- a/netbox/dcim/tests/test_filters.py
+++ b/netbox/dcim/tests/test_filters.py
@@ -11,7 +11,7 @@ from dcim.models import (
VirtualChassis,
)
from ipam.models import IPAddress
-from tenancy.models import Tenant
+from tenancy.models import Tenant, TenantGroup
from virtualization.models import Cluster, ClusterType
@@ -76,10 +76,24 @@ class SiteTestCase(TestCase):
for region in regions:
region.save()
+ tenant_groups = (
+ TenantGroup(name='Tenant group 1', slug='tenant-group-1'),
+ TenantGroup(name='Tenant group 2', slug='tenant-group-2'),
+ TenantGroup(name='Tenant group 3', slug='tenant-group-3'),
+ )
+ TenantGroup.objects.bulk_create(tenant_groups)
+
+ tenants = (
+ Tenant(name='Tenant 1', slug='tenant-1', group=tenant_groups[0]),
+ Tenant(name='Tenant 2', slug='tenant-2', group=tenant_groups[1]),
+ Tenant(name='Tenant 3', slug='tenant-3', group=tenant_groups[2]),
+ )
+ Tenant.objects.bulk_create(tenants)
+
sites = (
- Site(name='Site 1', slug='site-1', region=regions[0], status=SiteStatusChoices.STATUS_ACTIVE, facility='Facility 1', asn=65001, latitude=10, longitude=10, contact_name='Contact 1', contact_phone='123-555-0001', contact_email='contact1@example.com'),
- Site(name='Site 2', slug='site-2', region=regions[1], status=SiteStatusChoices.STATUS_PLANNED, facility='Facility 2', asn=65002, latitude=20, longitude=20, contact_name='Contact 2', contact_phone='123-555-0002', contact_email='contact2@example.com'),
- Site(name='Site 3', slug='site-3', region=regions[2], status=SiteStatusChoices.STATUS_RETIRED, facility='Facility 3', asn=65003, latitude=30, longitude=30, contact_name='Contact 3', contact_phone='123-555-0003', contact_email='contact3@example.com'),
+ Site(name='Site 1', slug='site-1', region=regions[0], tenant=tenants[0], status=SiteStatusChoices.STATUS_ACTIVE, facility='Facility 1', asn=65001, latitude=10, longitude=10, contact_name='Contact 1', contact_phone='123-555-0001', contact_email='contact1@example.com'),
+ Site(name='Site 2', slug='site-2', region=regions[1], tenant=tenants[1], status=SiteStatusChoices.STATUS_PLANNED, facility='Facility 2', asn=65002, latitude=20, longitude=20, contact_name='Contact 2', contact_phone='123-555-0002', contact_email='contact2@example.com'),
+ Site(name='Site 3', slug='site-3', region=regions[2], tenant=tenants[2], status=SiteStatusChoices.STATUS_RETIRED, facility='Facility 3', asn=65003, latitude=30, longitude=30, contact_name='Contact 3', contact_phone='123-555-0003', contact_email='contact3@example.com'),
)
Site.objects.bulk_create(sites)
@@ -140,6 +154,20 @@ class SiteTestCase(TestCase):
params = {'region': [regions[0].slug, regions[1].slug]}
self.assertEqual(self.filterset(params, self.queryset).qs.count(), 2)
+ def test_tenant(self):
+ tenants = Tenant.objects.all()[:2]
+ params = {'tenant_id': [tenants[0].pk, tenants[1].pk]}
+ self.assertEqual(self.filterset(params, self.queryset).qs.count(), 2)
+ params = {'tenant': [tenants[0].slug, tenants[1].slug]}
+ self.assertEqual(self.filterset(params, self.queryset).qs.count(), 2)
+
+ def test_tenant_group(self):
+ tenant_groups = TenantGroup.objects.all()[:2]
+ params = {'tenant_group_id': [tenant_groups[0].pk, tenant_groups[1].pk]}
+ self.assertEqual(self.filterset(params, self.queryset).qs.count(), 2)
+ params = {'tenant_group': [tenant_groups[0].slug, tenant_groups[1].slug]}
+ self.assertEqual(self.filterset(params, self.queryset).qs.count(), 2)
+
class RackGroupTestCase(TestCase):
queryset = RackGroup.objects.all()
@@ -266,10 +294,24 @@ class RackTestCase(TestCase):
)
RackRole.objects.bulk_create(rack_roles)
+ tenant_groups = (
+ TenantGroup(name='Tenant group 1', slug='tenant-group-1'),
+ TenantGroup(name='Tenant group 2', slug='tenant-group-2'),
+ TenantGroup(name='Tenant group 3', slug='tenant-group-3'),
+ )
+ TenantGroup.objects.bulk_create(tenant_groups)
+
+ tenants = (
+ Tenant(name='Tenant 1', slug='tenant-1', group=tenant_groups[0]),
+ Tenant(name='Tenant 2', slug='tenant-2', group=tenant_groups[1]),
+ Tenant(name='Tenant 3', slug='tenant-3', group=tenant_groups[2]),
+ )
+ Tenant.objects.bulk_create(tenants)
+
racks = (
- Rack(name='Rack 1', facility_id='rack-1', site=sites[0], group=rack_groups[0], status=RackStatusChoices.STATUS_ACTIVE, role=rack_roles[0], serial='ABC', asset_tag='1001', type=RackTypeChoices.TYPE_2POST, width=RackWidthChoices.WIDTH_19IN, u_height=42, desc_units=False, outer_width=100, outer_depth=100, outer_unit=RackDimensionUnitChoices.UNIT_MILLIMETER),
- Rack(name='Rack 2', facility_id='rack-2', site=sites[1], group=rack_groups[1], status=RackStatusChoices.STATUS_PLANNED, role=rack_roles[1], serial='DEF', asset_tag='1002', type=RackTypeChoices.TYPE_4POST, width=RackWidthChoices.WIDTH_19IN, u_height=43, desc_units=False, outer_width=200, outer_depth=200, outer_unit=RackDimensionUnitChoices.UNIT_MILLIMETER),
- Rack(name='Rack 3', facility_id='rack-3', site=sites[2], group=rack_groups[2], status=RackStatusChoices.STATUS_RESERVED, role=rack_roles[2], serial='GHI', asset_tag='1003', type=RackTypeChoices.TYPE_CABINET, width=RackWidthChoices.WIDTH_23IN, u_height=44, desc_units=True, outer_width=300, outer_depth=300, outer_unit=RackDimensionUnitChoices.UNIT_INCH),
+ Rack(name='Rack 1', facility_id='rack-1', site=sites[0], group=rack_groups[0], tenant=tenants[0], status=RackStatusChoices.STATUS_ACTIVE, role=rack_roles[0], serial='ABC', asset_tag='1001', type=RackTypeChoices.TYPE_2POST, width=RackWidthChoices.WIDTH_19IN, u_height=42, desc_units=False, outer_width=100, outer_depth=100, outer_unit=RackDimensionUnitChoices.UNIT_MILLIMETER),
+ Rack(name='Rack 2', facility_id='rack-2', site=sites[1], group=rack_groups[1], tenant=tenants[1], status=RackStatusChoices.STATUS_PLANNED, role=rack_roles[1], serial='DEF', asset_tag='1002', type=RackTypeChoices.TYPE_4POST, width=RackWidthChoices.WIDTH_19IN, u_height=43, desc_units=False, outer_width=200, outer_depth=200, outer_unit=RackDimensionUnitChoices.UNIT_MILLIMETER),
+ Rack(name='Rack 3', facility_id='rack-3', site=sites[2], group=rack_groups[2], tenant=tenants[2], status=RackStatusChoices.STATUS_RESERVED, role=rack_roles[2], serial='GHI', asset_tag='1003', type=RackTypeChoices.TYPE_CABINET, width=RackWidthChoices.WIDTH_23IN, u_height=44, desc_units=True, outer_width=300, outer_depth=300, outer_unit=RackDimensionUnitChoices.UNIT_INCH),
)
Rack.objects.bulk_create(racks)
@@ -366,6 +408,20 @@ class RackTestCase(TestCase):
params = {'serial': 'abc'}
self.assertEqual(self.filterset(params, self.queryset).qs.count(), 1)
+ def test_tenant(self):
+ tenants = Tenant.objects.all()[:2]
+ params = {'tenant_id': [tenants[0].pk, tenants[1].pk]}
+ self.assertEqual(self.filterset(params, self.queryset).qs.count(), 2)
+ params = {'tenant': [tenants[0].slug, tenants[1].slug]}
+ self.assertEqual(self.filterset(params, self.queryset).qs.count(), 2)
+
+ def test_tenant_group(self):
+ tenant_groups = TenantGroup.objects.all()[:2]
+ params = {'tenant_group_id': [tenant_groups[0].pk, tenant_groups[1].pk]}
+ self.assertEqual(self.filterset(params, self.queryset).qs.count(), 2)
+ params = {'tenant_group': [tenant_groups[0].slug, tenant_groups[1].slug]}
+ self.assertEqual(self.filterset(params, self.queryset).qs.count(), 2)
+
class RackReservationTestCase(TestCase):
queryset = RackReservation.objects.all()
@@ -402,10 +458,24 @@ class RackReservationTestCase(TestCase):
)
User.objects.bulk_create(users)
+ tenant_groups = (
+ TenantGroup(name='Tenant group 1', slug='tenant-group-1'),
+ TenantGroup(name='Tenant group 2', slug='tenant-group-2'),
+ TenantGroup(name='Tenant group 3', slug='tenant-group-3'),
+ )
+ TenantGroup.objects.bulk_create(tenant_groups)
+
+ tenants = (
+ Tenant(name='Tenant 1', slug='tenant-1', group=tenant_groups[0]),
+ Tenant(name='Tenant 2', slug='tenant-2', group=tenant_groups[1]),
+ Tenant(name='Tenant 3', slug='tenant-3', group=tenant_groups[2]),
+ )
+ Tenant.objects.bulk_create(tenants)
+
reservations = (
- RackReservation(rack=racks[0], units=[1, 2, 3], user=users[0]),
- RackReservation(rack=racks[1], units=[4, 5, 6], user=users[1]),
- RackReservation(rack=racks[2], units=[7, 8, 9], user=users[2]),
+ RackReservation(rack=racks[0], units=[1, 2, 3], user=users[0], tenant=tenants[0]),
+ RackReservation(rack=racks[1], units=[4, 5, 6], user=users[1], tenant=tenants[1]),
+ RackReservation(rack=racks[2], units=[7, 8, 9], user=users[2], tenant=tenants[2]),
)
RackReservation.objects.bulk_create(reservations)
@@ -436,6 +506,20 @@ class RackReservationTestCase(TestCase):
# params = {'user': [users[0].username, users[1].username]}
# self.assertEqual(self.filterset(params, self.queryset).qs.count(), 2)
+ def test_tenant(self):
+ tenants = Tenant.objects.all()[:2]
+ params = {'tenant_id': [tenants[0].pk, tenants[1].pk]}
+ self.assertEqual(self.filterset(params, self.queryset).qs.count(), 2)
+ params = {'tenant': [tenants[0].slug, tenants[1].slug]}
+ self.assertEqual(self.filterset(params, self.queryset).qs.count(), 2)
+
+ def test_tenant_group(self):
+ tenant_groups = TenantGroup.objects.all()[:2]
+ params = {'tenant_group_id': [tenant_groups[0].pk, tenant_groups[1].pk]}
+ self.assertEqual(self.filterset(params, self.queryset).qs.count(), 2)
+ params = {'tenant_group': [tenant_groups[0].slug, tenant_groups[1].slug]}
+ self.assertEqual(self.filterset(params, self.queryset).qs.count(), 2)
+
class ManufacturerTestCase(TestCase):
queryset = Manufacturer.objects.all()
@@ -1099,10 +1183,24 @@ class DeviceTestCase(TestCase):
)
Cluster.objects.bulk_create(clusters)
+ tenant_groups = (
+ TenantGroup(name='Tenant group 1', slug='tenant-group-1'),
+ TenantGroup(name='Tenant group 2', slug='tenant-group-2'),
+ TenantGroup(name='Tenant group 3', slug='tenant-group-3'),
+ )
+ TenantGroup.objects.bulk_create(tenant_groups)
+
+ tenants = (
+ Tenant(name='Tenant 1', slug='tenant-1', group=tenant_groups[0]),
+ Tenant(name='Tenant 2', slug='tenant-2', group=tenant_groups[1]),
+ Tenant(name='Tenant 3', slug='tenant-3', group=tenant_groups[2]),
+ )
+ Tenant.objects.bulk_create(tenants)
+
devices = (
- Device(name='Device 1', device_type=device_types[0], device_role=device_roles[0], platform=platforms[0], serial='ABC', asset_tag='1001', site=sites[0], rack=racks[0], position=1, face=DeviceFaceChoices.FACE_FRONT, status=DeviceStatusChoices.STATUS_ACTIVE, cluster=clusters[0], local_context_data={"foo": 123}),
- Device(name='Device 2', device_type=device_types[1], device_role=device_roles[1], platform=platforms[1], serial='DEF', asset_tag='1002', site=sites[1], rack=racks[1], position=2, face=DeviceFaceChoices.FACE_FRONT, status=DeviceStatusChoices.STATUS_STAGED, cluster=clusters[1]),
- Device(name='Device 3', device_type=device_types[2], device_role=device_roles[2], platform=platforms[2], serial='GHI', asset_tag='1003', site=sites[2], rack=racks[2], position=3, face=DeviceFaceChoices.FACE_REAR, status=DeviceStatusChoices.STATUS_FAILED, cluster=clusters[2]),
+ Device(name='Device 1', device_type=device_types[0], device_role=device_roles[0], platform=platforms[0], tenant=tenants[0], serial='ABC', asset_tag='1001', site=sites[0], rack=racks[0], position=1, face=DeviceFaceChoices.FACE_FRONT, status=DeviceStatusChoices.STATUS_ACTIVE, cluster=clusters[0], local_context_data={"foo": 123}),
+ Device(name='Device 2', device_type=device_types[1], device_role=device_roles[1], platform=platforms[1], tenant=tenants[1], serial='DEF', asset_tag='1002', site=sites[1], rack=racks[1], position=2, face=DeviceFaceChoices.FACE_FRONT, status=DeviceStatusChoices.STATUS_STAGED, cluster=clusters[1]),
+ Device(name='Device 3', device_type=device_types[2], device_role=device_roles[2], platform=platforms[2], tenant=tenants[2], serial='GHI', asset_tag='1003', site=sites[2], rack=racks[2], position=3, face=DeviceFaceChoices.FACE_REAR, status=DeviceStatusChoices.STATUS_FAILED, cluster=clusters[2]),
)
Device.objects.bulk_create(devices)
@@ -1333,6 +1431,20 @@ class DeviceTestCase(TestCase):
params = {'local_context_data': 'false'}
self.assertEqual(self.filterset(params, self.queryset).qs.count(), 2)
+ def test_tenant(self):
+ tenants = Tenant.objects.all()[:2]
+ params = {'tenant_id': [tenants[0].pk, tenants[1].pk]}
+ self.assertEqual(self.filterset(params, self.queryset).qs.count(), 2)
+ params = {'tenant': [tenants[0].slug, tenants[1].slug]}
+ self.assertEqual(self.filterset(params, self.queryset).qs.count(), 2)
+
+ def test_tenant_group(self):
+ tenant_groups = TenantGroup.objects.all()[:2]
+ params = {'tenant_group_id': [tenant_groups[0].pk, tenant_groups[1].pk]}
+ self.assertEqual(self.filterset(params, self.queryset).qs.count(), 2)
+ params = {'tenant_group': [tenant_groups[0].slug, tenant_groups[1].slug]}
+ self.assertEqual(self.filterset(params, self.queryset).qs.count(), 2)
+
class ConsolePortTestCase(TestCase):
queryset = ConsolePort.objects.all()
diff --git a/netbox/extras/api/customfields.py b/netbox/extras/api/customfields.py
index 9a3041238..5bb1f033d 100644
--- a/netbox/extras/api/customfields.py
+++ b/netbox/extras/api/customfields.py
@@ -1,9 +1,11 @@
from datetime import datetime
from django.contrib.contenttypes.models import ContentType
+from django.core.exceptions import ObjectDoesNotExist
from django.db import transaction
from rest_framework import serializers
from rest_framework.exceptions import ValidationError
+from rest_framework.fields import CreateOnlyDefault
from extras.choices import *
from extras.models import CustomField, CustomFieldChoice, CustomFieldValue
@@ -14,6 +16,43 @@ from utilities.api import ValidatedModelSerializer
# Custom fields
#
+class CustomFieldDefaultValues:
+ """
+ Return a dictionary of all CustomFields assigned to the parent model and their default values.
+ """
+ def __call__(self):
+
+ # Retrieve the CustomFields for the parent model
+ content_type = ContentType.objects.get_for_model(self.model)
+ fields = CustomField.objects.filter(obj_type=content_type)
+
+ # Populate the default value for each CustomField
+ value = {}
+ for field in fields:
+ if field.default:
+ if field.type == CustomFieldTypeChoices.TYPE_INTEGER:
+ field_value = int(field.default)
+ elif field.type == CustomFieldTypeChoices.TYPE_BOOLEAN:
+ # TODO: Fix default value assignment for boolean custom fields
+ field_value = False if field.default.lower() == 'false' else bool(field.default)
+ elif field.type == CustomFieldTypeChoices.TYPE_SELECT:
+ try:
+ field_value = field.choices.get(value=field.default).pk
+ except ObjectDoesNotExist:
+ # Invalid default value
+ field_value = None
+ else:
+ field_value = field.default
+ value[field.name] = field_value
+ else:
+ value[field.name] = None
+
+ return value
+
+ def set_context(self, serializer_field):
+ self.model = serializer_field.parent.Meta.model
+
+
class CustomFieldsSerializer(serializers.BaseSerializer):
def to_representation(self, obj):
@@ -94,53 +133,35 @@ class CustomFieldModelSerializer(ValidatedModelSerializer):
"""
Extends ModelSerializer to render any CustomFields and their values associated with an object.
"""
- custom_fields = CustomFieldsSerializer(required=False)
+ custom_fields = CustomFieldsSerializer(
+ required=False,
+ default=CreateOnlyDefault(CustomFieldDefaultValues())
+ )
def __init__(self, *args, **kwargs):
-
- def _populate_custom_fields(instance, fields):
- instance.custom_fields = {}
- for field in fields:
- value = instance.cf.get(field.name)
- if field.type == CustomFieldTypeChoices.TYPE_SELECT and value is not None:
- instance.custom_fields[field.name] = CustomFieldChoiceSerializer(value).data
- else:
- instance.custom_fields[field.name] = value
-
super().__init__(*args, **kwargs)
- # Retrieve the set of CustomFields which apply to this type of object
- content_type = ContentType.objects.get_for_model(self.Meta.model)
- fields = CustomField.objects.filter(obj_type=content_type)
-
if self.instance is not None:
+ # Retrieve the set of CustomFields which apply to this type of object
+ content_type = ContentType.objects.get_for_model(self.Meta.model)
+ fields = CustomField.objects.filter(obj_type=content_type)
+
# Populate CustomFieldValues for each instance from database
try:
for obj in self.instance:
- _populate_custom_fields(obj, fields)
+ self._populate_custom_fields(obj, fields)
except TypeError:
- _populate_custom_fields(self.instance, fields)
+ self._populate_custom_fields(self.instance, fields)
- else:
-
- if not hasattr(self, 'initial_data'):
- self.initial_data = {}
-
- # Populate default values
- if fields and 'custom_fields' not in self.initial_data:
- self.initial_data['custom_fields'] = {}
-
- # Populate initial data using custom field default values
- for field in fields:
- if field.name not in self.initial_data['custom_fields'] and field.default:
- if field.type == CustomFieldTypeChoices.TYPE_SELECT:
- field_value = field.choices.get(value=field.default).pk
- elif field.type == CustomFieldTypeChoices.TYPE_BOOLEAN:
- field_value = bool(field.default)
- else:
- field_value = field.default
- self.initial_data['custom_fields'][field.name] = field_value
+ def _populate_custom_fields(self, instance, custom_fields):
+ instance.custom_fields = {}
+ for field in custom_fields:
+ value = instance.cf.get(field.name)
+ if field.type == CustomFieldTypeChoices.TYPE_SELECT and value is not None:
+ instance.custom_fields[field.name] = CustomFieldChoiceSerializer(value).data
+ else:
+ instance.custom_fields[field.name] = value
def _save_custom_fields(self, instance, custom_fields):
content_type = ContentType.objects.get_for_model(self.Meta.model)
diff --git a/netbox/extras/api/views.py b/netbox/extras/api/views.py
index 167768861..aa9e380ba 100644
--- a/netbox/extras/api/views.py
+++ b/netbox/extras/api/views.py
@@ -14,7 +14,7 @@ from extras.models import (
ConfigContext, CustomFieldChoice, ExportTemplate, Graph, ImageAttachment, ObjectChange, ReportResult, Tag,
)
from extras.reports import get_report, get_reports
-from extras.scripts import get_script, get_scripts
+from extras.scripts import get_script, get_scripts, run_script
from utilities.api import FieldChoicesViewSet, IsAuthenticatedOrLoginNotRequired, ModelViewSet
from . import serializers
@@ -265,8 +265,9 @@ class ScriptViewSet(ViewSet):
input_serializer = serializers.ScriptInputSerializer(data=request.data)
if input_serializer.is_valid():
- output = script.run(input_serializer.data['data'])
- script.output = output
+ data = input_serializer.data['data']
+ commit = input_serializer.data['commit']
+ script.output, execution_time = run_script(script, data, request, commit)
output_serializer = serializers.ScriptOutputSerializer(script)
return Response(output_serializer.data)
diff --git a/netbox/extras/filters.py b/netbox/extras/filters.py
index dcd4f3ede..ad414a691 100644
--- a/netbox/extras/filters.py
+++ b/netbox/extras/filters.py
@@ -4,6 +4,7 @@ from django.db.models import Q
from dcim.models import DeviceRole, Platform, Region, Site
from tenancy.models import Tenant, TenantGroup
+from utilities.filters import BaseFilterSet
from virtualization.models import Cluster, ClusterGroup
from .choices import *
from .models import ConfigContext, CustomField, Graph, ExportTemplate, ObjectChange, Tag
@@ -89,21 +90,21 @@ class CustomFieldFilterSet(django_filters.FilterSet):
self.filters['cf_{}'.format(cf.name)] = CustomFieldFilter(field_name=cf.name, custom_field=cf)
-class GraphFilterSet(django_filters.FilterSet):
+class GraphFilterSet(BaseFilterSet):
class Meta:
model = Graph
fields = ['type', 'name', 'template_language']
-class ExportTemplateFilterSet(django_filters.FilterSet):
+class ExportTemplateFilterSet(BaseFilterSet):
class Meta:
model = ExportTemplate
fields = ['content_type', 'name', 'template_language']
-class TagFilterSet(django_filters.FilterSet):
+class TagFilterSet(BaseFilterSet):
q = django_filters.CharFilter(
method='search',
label='Search',
@@ -122,7 +123,7 @@ class TagFilterSet(django_filters.FilterSet):
)
-class ConfigContextFilterSet(django_filters.FilterSet):
+class ConfigContextFilterSet(BaseFilterSet):
q = django_filters.CharFilter(
method='search',
label='Search',
@@ -244,7 +245,7 @@ class LocalConfigContextFilterSet(django_filters.FilterSet):
return queryset.exclude(local_context_data__isnull=value)
-class ObjectChangeFilterSet(django_filters.FilterSet):
+class ObjectChangeFilterSet(BaseFilterSet):
q = django_filters.CharFilter(
method='search',
label='Search',
diff --git a/netbox/extras/tests/test_api.py b/netbox/extras/tests/test_api.py
index 223e5a530..3e6e43789 100644
--- a/netbox/extras/tests/test_api.py
+++ b/netbox/extras/tests/test_api.py
@@ -582,7 +582,7 @@ class ScriptTest(APITestCase):
var2 = IntegerVar()
var3 = BooleanVar()
- def run(self, data):
+ def run(self, data, commit=True):
self.log_info(data['var1'])
self.log_success(data['var2'])
diff --git a/netbox/extras/tests/test_customfields.py b/netbox/extras/tests/test_customfields.py
index a6e2bfcec..d76532437 100644
--- a/netbox/extras/tests/test_customfields.py
+++ b/netbox/extras/tests/test_customfields.py
@@ -101,240 +101,329 @@ class CustomFieldTest(TestCase):
class CustomFieldAPITest(APITestCase):
- def setUp(self):
-
- super().setUp()
-
+ @classmethod
+ def setUpTestData(cls):
content_type = ContentType.objects.get_for_model(Site)
# Text custom field
- self.cf_text = CustomField(type=CustomFieldTypeChoices.TYPE_TEXT, name='magic_word')
- self.cf_text.save()
- self.cf_text.obj_type.set([content_type])
- self.cf_text.save()
+ cls.cf_text = CustomField(type=CustomFieldTypeChoices.TYPE_TEXT, name='text_field', default='foo')
+ cls.cf_text.save()
+ cls.cf_text.obj_type.set([content_type])
# Integer custom field
- self.cf_integer = CustomField(type=CustomFieldTypeChoices.TYPE_INTEGER, name='magic_number')
- self.cf_integer.save()
- self.cf_integer.obj_type.set([content_type])
- self.cf_integer.save()
+ cls.cf_integer = CustomField(type=CustomFieldTypeChoices.TYPE_INTEGER, name='number_field', default=123)
+ cls.cf_integer.save()
+ cls.cf_integer.obj_type.set([content_type])
# Boolean custom field
- self.cf_boolean = CustomField(type=CustomFieldTypeChoices.TYPE_BOOLEAN, name='is_magic')
- self.cf_boolean.save()
- self.cf_boolean.obj_type.set([content_type])
- self.cf_boolean.save()
+ cls.cf_boolean = CustomField(type=CustomFieldTypeChoices.TYPE_BOOLEAN, name='boolean_field', default=False)
+ cls.cf_boolean.save()
+ cls.cf_boolean.obj_type.set([content_type])
# Date custom field
- self.cf_date = CustomField(type=CustomFieldTypeChoices.TYPE_DATE, name='magic_date')
- self.cf_date.save()
- self.cf_date.obj_type.set([content_type])
- self.cf_date.save()
+ cls.cf_date = CustomField(type=CustomFieldTypeChoices.TYPE_DATE, name='date_field', default='2020-01-01')
+ cls.cf_date.save()
+ cls.cf_date.obj_type.set([content_type])
# URL custom field
- self.cf_url = CustomField(type=CustomFieldTypeChoices.TYPE_URL, name='magic_url')
- self.cf_url.save()
- self.cf_url.obj_type.set([content_type])
- self.cf_url.save()
+ cls.cf_url = CustomField(type=CustomFieldTypeChoices.TYPE_URL, name='url_field', default='http://example.com/1')
+ cls.cf_url.save()
+ cls.cf_url.obj_type.set([content_type])
# Select custom field
- self.cf_select = CustomField(type=CustomFieldTypeChoices.TYPE_SELECT, name='magic_choice')
- self.cf_select.save()
- self.cf_select.obj_type.set([content_type])
- self.cf_select.save()
- self.cf_select_choice1 = CustomFieldChoice(field=self.cf_select, value='Foo')
- self.cf_select_choice1.save()
- self.cf_select_choice2 = CustomFieldChoice(field=self.cf_select, value='Bar')
- self.cf_select_choice2.save()
- self.cf_select_choice3 = CustomFieldChoice(field=self.cf_select, value='Baz')
- self.cf_select_choice3.save()
+ cls.cf_select = CustomField(type=CustomFieldTypeChoices.TYPE_SELECT, name='choice_field')
+ cls.cf_select.save()
+ cls.cf_select.obj_type.set([content_type])
+ cls.cf_select_choice1 = CustomFieldChoice(field=cls.cf_select, value='Foo')
+ cls.cf_select_choice1.save()
+ cls.cf_select_choice2 = CustomFieldChoice(field=cls.cf_select, value='Bar')
+ cls.cf_select_choice2.save()
+ cls.cf_select_choice3 = CustomFieldChoice(field=cls.cf_select, value='Baz')
+ cls.cf_select_choice3.save()
- self.site = Site.objects.create(name='Test Site 1', slug='test-site-1')
+ cls.cf_select.default = cls.cf_select_choice1.value
+ cls.cf_select.save()
- def test_get_obj_without_custom_fields(self):
+ # Create some sites
+ cls.sites = (
+ Site(name='Site 1', slug='site-1'),
+ Site(name='Site 2', slug='site-2'),
+ )
+ Site.objects.bulk_create(cls.sites)
- url = reverse('dcim-api:site-detail', kwargs={'pk': self.site.pk})
- response = self.client.get(url, **self.header)
-
- self.assertEqual(response.data['name'], self.site.name)
- self.assertEqual(response.data['custom_fields'], {
- 'magic_word': None,
- 'magic_number': None,
- 'is_magic': None,
- 'magic_date': None,
- 'magic_url': None,
- 'magic_choice': None,
- })
-
- def test_get_obj_with_custom_fields(self):
-
- CUSTOM_FIELD_VALUES = [
- (self.cf_text, 'Test string'),
- (self.cf_integer, 1234),
- (self.cf_boolean, True),
- (self.cf_date, date(2016, 6, 23)),
- (self.cf_url, 'http://example.com/'),
- (self.cf_select, self.cf_select_choice1.pk),
- ]
- for field, value in CUSTOM_FIELD_VALUES:
- cfv = CustomFieldValue(field=field, obj=self.site)
+ # Assign custom field values for site 2
+ site2_cfvs = {
+ cls.cf_text: 'bar',
+ cls.cf_integer: 456,
+ cls.cf_boolean: True,
+ cls.cf_date: '2020-01-02',
+ cls.cf_url: 'http://example.com/2',
+ cls.cf_select: cls.cf_select_choice2.pk,
+ }
+ for field, value in site2_cfvs.items():
+ cfv = CustomFieldValue(field=field, obj=cls.sites[1])
cfv.value = value
cfv.save()
- url = reverse('dcim-api:site-detail', kwargs={'pk': self.site.pk})
+ def test_get_single_object_without_custom_field_values(self):
+ """
+ Validate that custom fields are present on an object even if it has no values defined.
+ """
+ url = reverse('dcim-api:site-detail', kwargs={'pk': self.sites[0].pk})
response = self.client.get(url, **self.header)
- self.assertEqual(response.data['name'], self.site.name)
- self.assertEqual(response.data['custom_fields'].get('magic_word'), CUSTOM_FIELD_VALUES[0][1])
- self.assertEqual(response.data['custom_fields'].get('magic_number'), CUSTOM_FIELD_VALUES[1][1])
- self.assertEqual(response.data['custom_fields'].get('is_magic'), CUSTOM_FIELD_VALUES[2][1])
- self.assertEqual(response.data['custom_fields'].get('magic_date'), CUSTOM_FIELD_VALUES[3][1])
- self.assertEqual(response.data['custom_fields'].get('magic_url'), CUSTOM_FIELD_VALUES[4][1])
- self.assertEqual(response.data['custom_fields'].get('magic_choice'), {
- 'value': self.cf_select_choice1.pk, 'label': 'Foo'
+ self.assertEqual(response.data['name'], self.sites[0].name)
+ self.assertEqual(response.data['custom_fields'], {
+ 'text_field': None,
+ 'number_field': None,
+ 'boolean_field': None,
+ 'date_field': None,
+ 'url_field': None,
+ 'choice_field': None,
})
- def test_set_custom_field_text(self):
-
- data = {
- 'name': 'Test Site 1',
- 'slug': 'test-site-1',
- 'custom_fields': {
- 'magic_word': 'Foo bar baz',
- }
- }
-
- url = reverse('dcim-api:site-detail', kwargs={'pk': self.site.pk})
- response = self.client.put(url, data, format='json', **self.header)
-
- self.assertHttpStatus(response, status.HTTP_200_OK)
- self.assertEqual(response.data['custom_fields'].get('magic_word'), data['custom_fields']['magic_word'])
- cfv = self.site.custom_field_values.get(field=self.cf_text)
- self.assertEqual(cfv.value, data['custom_fields']['magic_word'])
-
- def test_set_custom_field_integer(self):
-
- data = {
- 'name': 'Test Site 1',
- 'slug': 'test-site-1',
- 'custom_fields': {
- 'magic_number': 42,
- }
- }
-
- url = reverse('dcim-api:site-detail', kwargs={'pk': self.site.pk})
- response = self.client.put(url, data, format='json', **self.header)
-
- self.assertHttpStatus(response, status.HTTP_200_OK)
- self.assertEqual(response.data['custom_fields'].get('magic_number'), data['custom_fields']['magic_number'])
- cfv = self.site.custom_field_values.get(field=self.cf_integer)
- self.assertEqual(cfv.value, data['custom_fields']['magic_number'])
-
- def test_set_custom_field_boolean(self):
-
- data = {
- 'name': 'Test Site 1',
- 'slug': 'test-site-1',
- 'custom_fields': {
- 'is_magic': 0,
- }
- }
-
- url = reverse('dcim-api:site-detail', kwargs={'pk': self.site.pk})
- response = self.client.put(url, data, format='json', **self.header)
-
- self.assertHttpStatus(response, status.HTTP_200_OK)
- self.assertEqual(response.data['custom_fields'].get('is_magic'), data['custom_fields']['is_magic'])
- cfv = self.site.custom_field_values.get(field=self.cf_boolean)
- self.assertEqual(cfv.value, data['custom_fields']['is_magic'])
-
- def test_set_custom_field_date(self):
-
- data = {
- 'name': 'Test Site 1',
- 'slug': 'test-site-1',
- 'custom_fields': {
- 'magic_date': '2017-04-25',
- }
- }
-
- url = reverse('dcim-api:site-detail', kwargs={'pk': self.site.pk})
- response = self.client.put(url, data, format='json', **self.header)
-
- self.assertHttpStatus(response, status.HTTP_200_OK)
- self.assertEqual(response.data['custom_fields'].get('magic_date'), data['custom_fields']['magic_date'])
- cfv = self.site.custom_field_values.get(field=self.cf_date)
- self.assertEqual(cfv.value.isoformat(), data['custom_fields']['magic_date'])
-
- def test_set_custom_field_url(self):
-
- data = {
- 'name': 'Test Site 1',
- 'slug': 'test-site-1',
- 'custom_fields': {
- 'magic_url': 'http://example.com/2/',
- }
- }
-
- url = reverse('dcim-api:site-detail', kwargs={'pk': self.site.pk})
- response = self.client.put(url, data, format='json', **self.header)
-
- self.assertHttpStatus(response, status.HTTP_200_OK)
- self.assertEqual(response.data['custom_fields'].get('magic_url'), data['custom_fields']['magic_url'])
- cfv = self.site.custom_field_values.get(field=self.cf_url)
- self.assertEqual(cfv.value, data['custom_fields']['magic_url'])
-
- def test_set_custom_field_select(self):
-
- data = {
- 'name': 'Test Site 1',
- 'slug': 'test-site-1',
- 'custom_fields': {
- 'magic_choice': self.cf_select_choice2.pk,
- }
- }
-
- url = reverse('dcim-api:site-detail', kwargs={'pk': self.site.pk})
- response = self.client.put(url, data, format='json', **self.header)
-
- self.assertHttpStatus(response, status.HTTP_200_OK)
- self.assertEqual(response.data['custom_fields'].get('magic_choice'), data['custom_fields']['magic_choice'])
- cfv = self.site.custom_field_values.get(field=self.cf_select)
- self.assertEqual(cfv.value.pk, data['custom_fields']['magic_choice'])
-
- def test_set_custom_field_defaults(self):
+ def test_get_single_object_with_custom_field_values(self):
"""
- Create a new object with no custom field data. Custom field values should be created using the custom fields'
- default values.
+ Validate that custom fields are present and correctly set for an object with values defined.
"""
- CUSTOM_FIELD_DEFAULTS = {
- 'magic_word': 'foobar',
- 'magic_number': '123',
- 'is_magic': 'true',
- 'magic_date': '2019-12-13',
- 'magic_url': 'http://example.com/',
- 'magic_choice': self.cf_select_choice1.value,
+ site2_cfvs = {
+ cfv.field.name: cfv.value for cfv in self.sites[1].custom_field_values.all()
}
- # Update CustomFields to set default values
- for field_name, default_value in CUSTOM_FIELD_DEFAULTS.items():
- CustomField.objects.filter(name=field_name).update(default=default_value)
+ url = reverse('dcim-api:site-detail', kwargs={'pk': self.sites[1].pk})
+ response = self.client.get(url, **self.header)
+ self.assertEqual(response.data['name'], self.sites[1].name)
+ self.assertEqual(response.data['custom_fields']['text_field'], site2_cfvs['text_field'])
+ self.assertEqual(response.data['custom_fields']['number_field'], site2_cfvs['number_field'])
+ self.assertEqual(response.data['custom_fields']['boolean_field'], site2_cfvs['boolean_field'])
+ self.assertEqual(response.data['custom_fields']['date_field'], site2_cfvs['date_field'])
+ self.assertEqual(response.data['custom_fields']['url_field'], site2_cfvs['url_field'])
+ self.assertEqual(response.data['custom_fields']['choice_field']['label'], self.cf_select_choice2.value)
+
+ def test_create_single_object_with_defaults(self):
+ """
+ Create a new site with no specified custom field values and check that it received the default values.
+ """
data = {
- 'name': 'Test Site X',
- 'slug': 'test-site-x',
+ 'name': 'Site 3',
+ 'slug': 'site-3',
}
url = reverse('dcim-api:site-list')
response = self.client.post(url, data, format='json', **self.header)
-
self.assertHttpStatus(response, status.HTTP_201_CREATED)
- self.assertEqual(response.data['custom_fields']['magic_word'], CUSTOM_FIELD_DEFAULTS['magic_word'])
- self.assertEqual(response.data['custom_fields']['magic_number'], str(CUSTOM_FIELD_DEFAULTS['magic_number']))
- self.assertEqual(response.data['custom_fields']['is_magic'], bool(CUSTOM_FIELD_DEFAULTS['is_magic']))
- self.assertEqual(response.data['custom_fields']['magic_date'], CUSTOM_FIELD_DEFAULTS['magic_date'])
- self.assertEqual(response.data['custom_fields']['magic_url'], CUSTOM_FIELD_DEFAULTS['magic_url'])
- self.assertEqual(response.data['custom_fields']['magic_choice'], self.cf_select_choice1.pk)
+
+ # Validate response data
+ response_cf = response.data['custom_fields']
+ self.assertEqual(response_cf['text_field'], self.cf_text.default)
+ self.assertEqual(response_cf['number_field'], self.cf_integer.default)
+ self.assertEqual(response_cf['boolean_field'], self.cf_boolean.default)
+ self.assertEqual(response_cf['date_field'], self.cf_date.default)
+ self.assertEqual(response_cf['url_field'], self.cf_url.default)
+ self.assertEqual(response_cf['choice_field'], self.cf_select_choice1.pk)
+
+ # Validate database data
+ site = Site.objects.get(pk=response.data['id'])
+ cfvs = {
+ cfv.field.name: cfv.value for cfv in site.custom_field_values.all()
+ }
+ self.assertEqual(cfvs['text_field'], self.cf_text.default)
+ self.assertEqual(cfvs['number_field'], self.cf_integer.default)
+ self.assertEqual(cfvs['boolean_field'], self.cf_boolean.default)
+ self.assertEqual(str(cfvs['date_field']), self.cf_date.default)
+ self.assertEqual(cfvs['url_field'], self.cf_url.default)
+ self.assertEqual(cfvs['choice_field'].pk, self.cf_select_choice1.pk)
+
+ def test_create_single_object_with_values(self):
+ """
+ Create a single new site with a value for each type of custom field.
+ """
+ data = {
+ 'name': 'Site 3',
+ 'slug': 'site-3',
+ 'custom_fields': {
+ 'text_field': 'bar',
+ 'number_field': 456,
+ 'boolean_field': True,
+ 'date_field': '2020-01-02',
+ 'url_field': 'http://example.com/2',
+ 'choice_field': self.cf_select_choice2.pk,
+ },
+ }
+
+ url = reverse('dcim-api:site-list')
+ response = self.client.post(url, data, format='json', **self.header)
+ self.assertHttpStatus(response, status.HTTP_201_CREATED)
+
+ # Validate response data
+ response_cf = response.data['custom_fields']
+ data_cf = data['custom_fields']
+ self.assertEqual(response_cf['text_field'], data_cf['text_field'])
+ self.assertEqual(response_cf['number_field'], data_cf['number_field'])
+ self.assertEqual(response_cf['boolean_field'], data_cf['boolean_field'])
+ self.assertEqual(response_cf['date_field'], data_cf['date_field'])
+ self.assertEqual(response_cf['url_field'], data_cf['url_field'])
+ self.assertEqual(response_cf['choice_field'], data_cf['choice_field'])
+
+ # Validate database data
+ site = Site.objects.get(pk=response.data['id'])
+ cfvs = {
+ cfv.field.name: cfv.value for cfv in site.custom_field_values.all()
+ }
+ self.assertEqual(cfvs['text_field'], data_cf['text_field'])
+ self.assertEqual(cfvs['number_field'], data_cf['number_field'])
+ self.assertEqual(cfvs['boolean_field'], data_cf['boolean_field'])
+ self.assertEqual(str(cfvs['date_field']), data_cf['date_field'])
+ self.assertEqual(cfvs['url_field'], data_cf['url_field'])
+ self.assertEqual(cfvs['choice_field'].pk, data_cf['choice_field'])
+
+ def test_create_multiple_objects_with_defaults(self):
+ """
+ Create three news sites with no specified custom field values and check that each received
+ the default custom field values.
+ """
+ data = (
+ {
+ 'name': 'Site 3',
+ 'slug': 'site-3',
+ },
+ {
+ 'name': 'Site 4',
+ 'slug': 'site-4',
+ },
+ {
+ 'name': 'Site 5',
+ 'slug': 'site-5',
+ },
+ )
+
+ url = reverse('dcim-api:site-list')
+ response = self.client.post(url, data, format='json', **self.header)
+ self.assertHttpStatus(response, status.HTTP_201_CREATED)
+ self.assertEqual(len(response.data), len(data))
+
+ for i, obj in enumerate(data):
+
+ # Validate response data
+ response_cf = response.data[i]['custom_fields']
+ self.assertEqual(response_cf['text_field'], self.cf_text.default)
+ self.assertEqual(response_cf['number_field'], self.cf_integer.default)
+ self.assertEqual(response_cf['boolean_field'], self.cf_boolean.default)
+ self.assertEqual(response_cf['date_field'], self.cf_date.default)
+ self.assertEqual(response_cf['url_field'], self.cf_url.default)
+ self.assertEqual(response_cf['choice_field'], self.cf_select_choice1.pk)
+
+ # Validate database data
+ site = Site.objects.get(pk=response.data[i]['id'])
+ cfvs = {
+ cfv.field.name: cfv.value for cfv in site.custom_field_values.all()
+ }
+ self.assertEqual(cfvs['text_field'], self.cf_text.default)
+ self.assertEqual(cfvs['number_field'], self.cf_integer.default)
+ self.assertEqual(cfvs['boolean_field'], self.cf_boolean.default)
+ self.assertEqual(str(cfvs['date_field']), self.cf_date.default)
+ self.assertEqual(cfvs['url_field'], self.cf_url.default)
+ self.assertEqual(cfvs['choice_field'].pk, self.cf_select_choice1.pk)
+
+ def test_create_multiple_objects_with_values(self):
+ """
+ Create a three new sites, each with custom fields defined.
+ """
+ custom_field_data = {
+ 'text_field': 'bar',
+ 'number_field': 456,
+ 'boolean_field': True,
+ 'date_field': '2020-01-02',
+ 'url_field': 'http://example.com/2',
+ 'choice_field': self.cf_select_choice2.pk,
+ }
+ data = (
+ {
+ 'name': 'Site 3',
+ 'slug': 'site-3',
+ 'custom_fields': custom_field_data,
+ },
+ {
+ 'name': 'Site 4',
+ 'slug': 'site-4',
+ 'custom_fields': custom_field_data,
+ },
+ {
+ 'name': 'Site 5',
+ 'slug': 'site-5',
+ 'custom_fields': custom_field_data,
+ },
+ )
+
+ url = reverse('dcim-api:site-list')
+ response = self.client.post(url, data, format='json', **self.header)
+ self.assertHttpStatus(response, status.HTTP_201_CREATED)
+ self.assertEqual(len(response.data), len(data))
+
+ for i, obj in enumerate(data):
+
+ # Validate response data
+ response_cf = response.data[i]['custom_fields']
+ self.assertEqual(response_cf['text_field'], custom_field_data['text_field'])
+ self.assertEqual(response_cf['number_field'], custom_field_data['number_field'])
+ self.assertEqual(response_cf['boolean_field'], custom_field_data['boolean_field'])
+ self.assertEqual(response_cf['date_field'], custom_field_data['date_field'])
+ self.assertEqual(response_cf['url_field'], custom_field_data['url_field'])
+ self.assertEqual(response_cf['choice_field'], custom_field_data['choice_field'])
+
+ # Validate database data
+ site = Site.objects.get(pk=response.data[i]['id'])
+ cfvs = {
+ cfv.field.name: cfv.value for cfv in site.custom_field_values.all()
+ }
+ self.assertEqual(cfvs['text_field'], custom_field_data['text_field'])
+ self.assertEqual(cfvs['number_field'], custom_field_data['number_field'])
+ self.assertEqual(cfvs['boolean_field'], custom_field_data['boolean_field'])
+ self.assertEqual(str(cfvs['date_field']), custom_field_data['date_field'])
+ self.assertEqual(cfvs['url_field'], custom_field_data['url_field'])
+ self.assertEqual(cfvs['choice_field'].pk, custom_field_data['choice_field'])
+
+ def test_update_single_object_with_values(self):
+ """
+ Update an object with existing custom field values. Ensure that only the updated custom field values are
+ modified.
+ """
+ site2_original_cfvs = {
+ cfv.field.name: cfv.value for cfv in self.sites[1].custom_field_values.all()
+ }
+ data = {
+ 'custom_fields': {
+ 'text_field': 'ABCD',
+ 'number_field': 1234,
+ },
+ }
+
+ url = reverse('dcim-api:site-detail', kwargs={'pk': self.sites[1].pk})
+ response = self.client.patch(url, data, format='json', **self.header)
+ self.assertHttpStatus(response, status.HTTP_200_OK)
+
+ # Validate response data
+ response_cf = response.data['custom_fields']
+ data_cf = data['custom_fields']
+ self.assertEqual(response_cf['text_field'], data_cf['text_field'])
+ self.assertEqual(response_cf['number_field'], data_cf['number_field'])
+ # TODO: Non-updated fields are missing from the response data
+ # self.assertEqual(response_cf['boolean_field'], site2_original_cfvs['boolean_field'])
+ # self.assertEqual(response_cf['date_field'], site2_original_cfvs['date_field'])
+ # self.assertEqual(response_cf['url_field'], site2_original_cfvs['url_field'])
+ # self.assertEqual(response_cf['choice_field']['label'], site2_original_cfvs['choice_field'].value)
+
+ # Validate database data
+ site2_updated_cfvs = {
+ cfv.field.name: cfv.value for cfv in self.sites[1].custom_field_values.all()
+ }
+ self.assertEqual(site2_updated_cfvs['text_field'], data_cf['text_field'])
+ self.assertEqual(site2_updated_cfvs['number_field'], data_cf['number_field'])
+ self.assertEqual(site2_updated_cfvs['boolean_field'], site2_original_cfvs['boolean_field'])
+ self.assertEqual(site2_updated_cfvs['date_field'], site2_original_cfvs['date_field'])
+ self.assertEqual(site2_updated_cfvs['url_field'], site2_original_cfvs['url_field'])
+ self.assertEqual(site2_updated_cfvs['choice_field'], site2_original_cfvs['choice_field'])
class CustomFieldChoiceAPITest(APITestCase):
diff --git a/netbox/extras/tests/test_filters.py b/netbox/extras/tests/test_filters.py
index 5ef96faa2..ab559cf73 100644
--- a/netbox/extras/tests/test_filters.py
+++ b/netbox/extras/tests/test_filters.py
@@ -28,8 +28,8 @@ class GraphTestCase(TestCase):
Graph.objects.bulk_create(graphs)
def test_name(self):
- params = {'name': 'Graph 1'}
- self.assertEqual(self.filterset(params, self.queryset).qs.count(), 1)
+ params = {'name': ['Graph 1', 'Graph 2']}
+ self.assertEqual(self.filterset(params, self.queryset).qs.count(), 2)
def test_type(self):
content_type = ContentType.objects.filter(GRAPH_MODELS).first()
@@ -59,8 +59,8 @@ class ExportTemplateTestCase(TestCase):
ExportTemplate.objects.bulk_create(export_templates)
def test_name(self):
- params = {'name': 'Export Template 1'}
- self.assertEqual(self.filterset(params, self.queryset).qs.count(), 1)
+ params = {'name': ['Export Template 1', 'Export Template 2']}
+ self.assertEqual(self.filterset(params, self.queryset).qs.count(), 2)
def test_content_type(self):
params = {'content_type': ContentType.objects.get(model='site').pk}
@@ -154,8 +154,8 @@ class ConfigContextTestCase(TestCase):
c.tenants.set([tenants[i]])
def test_name(self):
- params = {'name': 'Config Context 1'}
- self.assertEqual(self.filterset(params, self.queryset).qs.count(), 1)
+ params = {'name': ['Config Context 1', 'Config Context 2']}
+ self.assertEqual(self.filterset(params, self.queryset).qs.count(), 2)
def test_is_active(self):
params = {'is_active': True}
diff --git a/netbox/ipam/filters.py b/netbox/ipam/filters.py
index 5f8bcabff..c2dbd573b 100644
--- a/netbox/ipam/filters.py
+++ b/netbox/ipam/filters.py
@@ -8,7 +8,8 @@ from dcim.models import Device, Interface, Region, Site
from extras.filters import CustomFieldFilterSet, CreatedUpdatedFilterSet
from tenancy.filters import TenancyFilterSet
from utilities.filters import (
- MultiValueCharFilter, MultiValueNumberFilter, NameSlugSearchFilterSet, NumericInFilter, TagFilter, TreeNodeMultipleChoiceFilter,
+ BaseFilterSet, MultiValueCharFilter, MultiValueNumberFilter, NameSlugSearchFilterSet,
+ NumericInFilter, TagFilter, TreeNodeMultipleChoiceFilter,
)
from virtualization.models import VirtualMachine
from .choices import *
@@ -28,7 +29,7 @@ __all__ = (
)
-class VRFFilterSet(TenancyFilterSet, CustomFieldFilterSet, CreatedUpdatedFilterSet):
+class VRFFilterSet(BaseFilterSet, TenancyFilterSet, CustomFieldFilterSet, CreatedUpdatedFilterSet):
id__in = NumericInFilter(
field_name='id',
lookup_expr='in'
@@ -53,7 +54,7 @@ class VRFFilterSet(TenancyFilterSet, CustomFieldFilterSet, CreatedUpdatedFilterS
fields = ['name', 'rd', 'enforce_unique']
-class RIRFilterSet(NameSlugSearchFilterSet):
+class RIRFilterSet(BaseFilterSet, NameSlugSearchFilterSet):
id__in = NumericInFilter(
field_name='id',
lookup_expr='in'
@@ -64,7 +65,7 @@ class RIRFilterSet(NameSlugSearchFilterSet):
fields = ['name', 'slug', 'is_private']
-class AggregateFilterSet(CustomFieldFilterSet, CreatedUpdatedFilterSet):
+class AggregateFilterSet(BaseFilterSet, CustomFieldFilterSet, CreatedUpdatedFilterSet):
id__in = NumericInFilter(
field_name='id',
lookup_expr='in'
@@ -114,7 +115,7 @@ class AggregateFilterSet(CustomFieldFilterSet, CreatedUpdatedFilterSet):
return queryset.none()
-class RoleFilterSet(NameSlugSearchFilterSet):
+class RoleFilterSet(BaseFilterSet, NameSlugSearchFilterSet):
q = django_filters.CharFilter(
method='search',
label='Search',
@@ -125,7 +126,7 @@ class RoleFilterSet(NameSlugSearchFilterSet):
fields = ['id', 'name', 'slug']
-class PrefixFilterSet(TenancyFilterSet, CustomFieldFilterSet, CreatedUpdatedFilterSet):
+class PrefixFilterSet(BaseFilterSet, TenancyFilterSet, CustomFieldFilterSet, CreatedUpdatedFilterSet):
id__in = NumericInFilter(
field_name='id',
lookup_expr='in'
@@ -166,12 +167,14 @@ class PrefixFilterSet(TenancyFilterSet, CustomFieldFilterSet, CreatedUpdatedFilt
)
region_id = TreeNodeMultipleChoiceFilter(
queryset=Region.objects.all(),
- field_name='site__region__in',
+ field_name='site__region',
+ lookup_expr='in',
label='Region (ID)',
)
region = TreeNodeMultipleChoiceFilter(
queryset=Region.objects.all(),
- field_name='site__region__in',
+ field_name='site__region',
+ lookup_expr='in',
to_field_name='slug',
label='Region (slug)',
)
@@ -273,7 +276,7 @@ class PrefixFilterSet(TenancyFilterSet, CustomFieldFilterSet, CreatedUpdatedFilt
return queryset.filter(prefix__net_mask_length=value)
-class IPAddressFilterSet(TenancyFilterSet, CustomFieldFilterSet, CreatedUpdatedFilterSet):
+class IPAddressFilterSet(BaseFilterSet, TenancyFilterSet, CustomFieldFilterSet, CreatedUpdatedFilterSet):
id__in = NumericInFilter(
field_name='id',
lookup_expr='in'
@@ -397,15 +400,17 @@ class IPAddressFilterSet(TenancyFilterSet, CustomFieldFilterSet, CreatedUpdatedF
return queryset.exclude(interface__isnull=value)
-class VLANGroupFilterSet(NameSlugSearchFilterSet):
+class VLANGroupFilterSet(BaseFilterSet, NameSlugSearchFilterSet):
region_id = TreeNodeMultipleChoiceFilter(
queryset=Region.objects.all(),
- field_name='site__region__in',
+ field_name='site__region',
+ lookup_expr='in',
label='Region (ID)',
)
region = TreeNodeMultipleChoiceFilter(
queryset=Region.objects.all(),
- field_name='site__region__in',
+ field_name='site__region',
+ lookup_expr='in',
to_field_name='slug',
label='Region (slug)',
)
@@ -425,7 +430,7 @@ class VLANGroupFilterSet(NameSlugSearchFilterSet):
fields = ['id', 'name', 'slug']
-class VLANFilterSet(TenancyFilterSet, CustomFieldFilterSet, CreatedUpdatedFilterSet):
+class VLANFilterSet(BaseFilterSet, TenancyFilterSet, CustomFieldFilterSet, CreatedUpdatedFilterSet):
id__in = NumericInFilter(
field_name='id',
lookup_expr='in'
@@ -436,12 +441,14 @@ class VLANFilterSet(TenancyFilterSet, CustomFieldFilterSet, CreatedUpdatedFilter
)
region_id = TreeNodeMultipleChoiceFilter(
queryset=Region.objects.all(),
- field_name='site__region__in',
+ field_name='site__region',
+ lookup_expr='in',
label='Region (ID)',
)
region = TreeNodeMultipleChoiceFilter(
queryset=Region.objects.all(),
- field_name='site__region__in',
+ field_name='site__region',
+ lookup_expr='in',
to_field_name='slug',
label='Region (slug)',
)
@@ -496,7 +503,7 @@ class VLANFilterSet(TenancyFilterSet, CustomFieldFilterSet, CreatedUpdatedFilter
return queryset.filter(qs_filter)
-class ServiceFilterSet(CreatedUpdatedFilterSet):
+class ServiceFilterSet(BaseFilterSet, CreatedUpdatedFilterSet):
q = django_filters.CharFilter(
method='search',
label='Search',
diff --git a/netbox/ipam/tests/test_filters.py b/netbox/ipam/tests/test_filters.py
index 4737a0f53..12a777384 100644
--- a/netbox/ipam/tests/test_filters.py
+++ b/netbox/ipam/tests/test_filters.py
@@ -5,6 +5,7 @@ from ipam.choices import *
from ipam.filters import *
from ipam.models import Aggregate, IPAddress, Prefix, RIR, Role, Service, VLAN, VLANGroup, VRF
from virtualization.models import Cluster, ClusterType, VirtualMachine
+from tenancy.models import Tenant, TenantGroup
class VRFTestCase(TestCase):
@@ -14,13 +15,27 @@ class VRFTestCase(TestCase):
@classmethod
def setUpTestData(cls):
+ tenant_groups = (
+ TenantGroup(name='Tenant group 1', slug='tenant-group-1'),
+ TenantGroup(name='Tenant group 2', slug='tenant-group-2'),
+ TenantGroup(name='Tenant group 3', slug='tenant-group-3'),
+ )
+ TenantGroup.objects.bulk_create(tenant_groups)
+
+ tenants = (
+ Tenant(name='Tenant 1', slug='tenant-1', group=tenant_groups[0]),
+ Tenant(name='Tenant 2', slug='tenant-2', group=tenant_groups[1]),
+ Tenant(name='Tenant 3', slug='tenant-3', group=tenant_groups[2]),
+ )
+ Tenant.objects.bulk_create(tenants)
+
vrfs = (
- VRF(name='VRF 1', rd='65000:100', enforce_unique=False),
- VRF(name='VRF 2', rd='65000:200', enforce_unique=False),
- VRF(name='VRF 3', rd='65000:300', enforce_unique=False),
- VRF(name='VRF 4', rd='65000:400', enforce_unique=True),
- VRF(name='VRF 5', rd='65000:500', enforce_unique=True),
- VRF(name='VRF 6', rd='65000:600', enforce_unique=True),
+ VRF(name='VRF 1', rd='65000:100', tenant=tenants[0], enforce_unique=False),
+ VRF(name='VRF 2', rd='65000:200', tenant=tenants[0], enforce_unique=False),
+ VRF(name='VRF 3', rd='65000:300', tenant=tenants[1], enforce_unique=False),
+ VRF(name='VRF 4', rd='65000:400', tenant=tenants[1], enforce_unique=True),
+ VRF(name='VRF 5', rd='65000:500', tenant=tenants[2], enforce_unique=True),
+ VRF(name='VRF 6', rd='65000:600', tenant=tenants[2], enforce_unique=True),
)
VRF.objects.bulk_create(vrfs)
@@ -43,6 +58,20 @@ class VRFTestCase(TestCase):
params = {'id__in': ','.join([str(id) for id in id_list])}
self.assertEqual(self.filterset(params, self.queryset).qs.count(), 3)
+ def test_tenant(self):
+ tenants = Tenant.objects.all()[:2]
+ params = {'tenant_id': [tenants[0].pk, tenants[1].pk]}
+ self.assertEqual(self.filterset(params, self.queryset).qs.count(), 4)
+ params = {'tenant': [tenants[0].slug, tenants[1].slug]}
+ self.assertEqual(self.filterset(params, self.queryset).qs.count(), 4)
+
+ def test_tenant_group(self):
+ tenant_groups = TenantGroup.objects.all()[:2]
+ params = {'tenant_group_id': [tenant_groups[0].pk, tenant_groups[1].pk]}
+ self.assertEqual(self.filterset(params, self.queryset).qs.count(), 4)
+ params = {'tenant_group': [tenant_groups[0].slug, tenant_groups[1].slug]}
+ self.assertEqual(self.filterset(params, self.queryset).qs.count(), 4)
+
class RIRTestCase(TestCase):
queryset = RIR.objects.all()
@@ -198,15 +227,29 @@ class PrefixTestCase(TestCase):
)
Role.objects.bulk_create(roles)
+ tenant_groups = (
+ TenantGroup(name='Tenant group 1', slug='tenant-group-1'),
+ TenantGroup(name='Tenant group 2', slug='tenant-group-2'),
+ TenantGroup(name='Tenant group 3', slug='tenant-group-3'),
+ )
+ TenantGroup.objects.bulk_create(tenant_groups)
+
+ tenants = (
+ Tenant(name='Tenant 1', slug='tenant-1', group=tenant_groups[0]),
+ Tenant(name='Tenant 2', slug='tenant-2', group=tenant_groups[1]),
+ Tenant(name='Tenant 3', slug='tenant-3', group=tenant_groups[2]),
+ )
+ Tenant.objects.bulk_create(tenants)
+
prefixes = (
- Prefix(family=4, prefix='10.0.0.0/24', site=None, vrf=None, vlan=None, role=None, is_pool=True),
- Prefix(family=4, prefix='10.0.1.0/24', site=sites[0], vrf=vrfs[0], vlan=vlans[0], role=roles[0]),
- Prefix(family=4, prefix='10.0.2.0/24', site=sites[1], vrf=vrfs[1], vlan=vlans[1], role=roles[1], status=PrefixStatusChoices.STATUS_DEPRECATED),
- Prefix(family=4, prefix='10.0.3.0/24', site=sites[2], vrf=vrfs[2], vlan=vlans[2], role=roles[2], status=PrefixStatusChoices.STATUS_RESERVED),
- Prefix(family=6, prefix='2001:db8::/64', site=None, vrf=None, vlan=None, role=None, is_pool=True),
- Prefix(family=6, prefix='2001:db8:0:1::/64', site=sites[0], vrf=vrfs[0], vlan=vlans[0], role=roles[0]),
- Prefix(family=6, prefix='2001:db8:0:2::/64', site=sites[1], vrf=vrfs[1], vlan=vlans[1], role=roles[1], status=PrefixStatusChoices.STATUS_DEPRECATED),
- Prefix(family=6, prefix='2001:db8:0:3::/64', site=sites[2], vrf=vrfs[2], vlan=vlans[2], role=roles[2], status=PrefixStatusChoices.STATUS_RESERVED),
+ Prefix(family=4, prefix='10.0.0.0/24', tenant=None, site=None, vrf=None, vlan=None, role=None, is_pool=True),
+ Prefix(family=4, prefix='10.0.1.0/24', tenant=tenants[0], site=sites[0], vrf=vrfs[0], vlan=vlans[0], role=roles[0]),
+ Prefix(family=4, prefix='10.0.2.0/24', tenant=tenants[1], site=sites[1], vrf=vrfs[1], vlan=vlans[1], role=roles[1], status=PrefixStatusChoices.STATUS_DEPRECATED),
+ Prefix(family=4, prefix='10.0.3.0/24', tenant=tenants[2], site=sites[2], vrf=vrfs[2], vlan=vlans[2], role=roles[2], status=PrefixStatusChoices.STATUS_RESERVED),
+ Prefix(family=6, prefix='2001:db8::/64', tenant=None, site=None, vrf=None, vlan=None, role=None, is_pool=True),
+ Prefix(family=6, prefix='2001:db8:0:1::/64', tenant=tenants[0], site=sites[0], vrf=vrfs[0], vlan=vlans[0], role=roles[0]),
+ Prefix(family=6, prefix='2001:db8:0:2::/64', tenant=tenants[1], site=sites[1], vrf=vrfs[1], vlan=vlans[1], role=roles[1], status=PrefixStatusChoices.STATUS_DEPRECATED),
+ Prefix(family=6, prefix='2001:db8:0:3::/64', tenant=tenants[2], site=sites[2], vrf=vrfs[2], vlan=vlans[2], role=roles[2], status=PrefixStatusChoices.STATUS_RESERVED),
Prefix(family=4, prefix='10.0.0.0/16'),
Prefix(family=6, prefix='2001:db8::/32'),
)
@@ -285,6 +328,20 @@ class PrefixTestCase(TestCase):
params = {'status': [PrefixStatusChoices.STATUS_DEPRECATED, PrefixStatusChoices.STATUS_RESERVED]}
self.assertEqual(self.filterset(params, self.queryset).qs.count(), 4)
+ def test_tenant(self):
+ tenants = Tenant.objects.all()[:2]
+ params = {'tenant_id': [tenants[0].pk, tenants[1].pk]}
+ self.assertEqual(self.filterset(params, self.queryset).qs.count(), 4)
+ params = {'tenant': [tenants[0].slug, tenants[1].slug]}
+ self.assertEqual(self.filterset(params, self.queryset).qs.count(), 4)
+
+ def test_tenant_group(self):
+ tenant_groups = TenantGroup.objects.all()[:2]
+ params = {'tenant_group_id': [tenant_groups[0].pk, tenant_groups[1].pk]}
+ self.assertEqual(self.filterset(params, self.queryset).qs.count(), 4)
+ params = {'tenant_group': [tenant_groups[0].slug, tenant_groups[1].slug]}
+ self.assertEqual(self.filterset(params, self.queryset).qs.count(), 4)
+
class IPAddressTestCase(TestCase):
queryset = IPAddress.objects.all()
@@ -332,17 +389,31 @@ class IPAddressTestCase(TestCase):
)
Interface.objects.bulk_create(interfaces)
+ tenant_groups = (
+ TenantGroup(name='Tenant group 1', slug='tenant-group-1'),
+ TenantGroup(name='Tenant group 2', slug='tenant-group-2'),
+ TenantGroup(name='Tenant group 3', slug='tenant-group-3'),
+ )
+ TenantGroup.objects.bulk_create(tenant_groups)
+
+ tenants = (
+ Tenant(name='Tenant 1', slug='tenant-1', group=tenant_groups[0]),
+ Tenant(name='Tenant 2', slug='tenant-2', group=tenant_groups[1]),
+ Tenant(name='Tenant 3', slug='tenant-3', group=tenant_groups[2]),
+ )
+ Tenant.objects.bulk_create(tenants)
+
ipaddresses = (
- IPAddress(family=4, address='10.0.0.1/24', vrf=None, interface=None, status=IPAddressStatusChoices.STATUS_ACTIVE, dns_name='ipaddress-a'),
- IPAddress(family=4, address='10.0.0.2/24', vrf=vrfs[0], interface=interfaces[0], status=IPAddressStatusChoices.STATUS_ACTIVE, dns_name='ipaddress-b'),
- IPAddress(family=4, address='10.0.0.3/24', vrf=vrfs[1], interface=interfaces[1], status=IPAddressStatusChoices.STATUS_RESERVED, role=IPAddressRoleChoices.ROLE_VIP, dns_name='ipaddress-c'),
- IPAddress(family=4, address='10.0.0.4/24', vrf=vrfs[2], interface=interfaces[2], status=IPAddressStatusChoices.STATUS_DEPRECATED, role=IPAddressRoleChoices.ROLE_SECONDARY, dns_name='ipaddress-d'),
- IPAddress(family=4, address='10.0.0.1/25', vrf=None, interface=None, status=IPAddressStatusChoices.STATUS_ACTIVE),
- IPAddress(family=6, address='2001:db8::1/64', vrf=None, interface=None, status=IPAddressStatusChoices.STATUS_ACTIVE, dns_name='ipaddress-a'),
- IPAddress(family=6, address='2001:db8::2/64', vrf=vrfs[0], interface=interfaces[3], status=IPAddressStatusChoices.STATUS_ACTIVE, dns_name='ipaddress-b'),
- IPAddress(family=6, address='2001:db8::3/64', vrf=vrfs[1], interface=interfaces[4], status=IPAddressStatusChoices.STATUS_RESERVED, role=IPAddressRoleChoices.ROLE_VIP, dns_name='ipaddress-c'),
- IPAddress(family=6, address='2001:db8::4/64', vrf=vrfs[2], interface=interfaces[5], status=IPAddressStatusChoices.STATUS_DEPRECATED, role=IPAddressRoleChoices.ROLE_SECONDARY, dns_name='ipaddress-d'),
- IPAddress(family=6, address='2001:db8::1/65', vrf=None, interface=None, status=IPAddressStatusChoices.STATUS_ACTIVE),
+ IPAddress(family=4, address='10.0.0.1/24', tenant=None, vrf=None, interface=None, status=IPAddressStatusChoices.STATUS_ACTIVE, dns_name='ipaddress-a'),
+ IPAddress(family=4, address='10.0.0.2/24', tenant=tenants[0], vrf=vrfs[0], interface=interfaces[0], status=IPAddressStatusChoices.STATUS_ACTIVE, dns_name='ipaddress-b'),
+ IPAddress(family=4, address='10.0.0.3/24', tenant=tenants[1], vrf=vrfs[1], interface=interfaces[1], status=IPAddressStatusChoices.STATUS_RESERVED, role=IPAddressRoleChoices.ROLE_VIP, dns_name='ipaddress-c'),
+ IPAddress(family=4, address='10.0.0.4/24', tenant=tenants[2], vrf=vrfs[2], interface=interfaces[2], status=IPAddressStatusChoices.STATUS_DEPRECATED, role=IPAddressRoleChoices.ROLE_SECONDARY, dns_name='ipaddress-d'),
+ IPAddress(family=4, address='10.0.0.1/25', tenant=None, vrf=None, interface=None, status=IPAddressStatusChoices.STATUS_ACTIVE),
+ IPAddress(family=6, address='2001:db8::1/64', tenant=None, vrf=None, interface=None, status=IPAddressStatusChoices.STATUS_ACTIVE, dns_name='ipaddress-a'),
+ IPAddress(family=6, address='2001:db8::2/64', tenant=tenants[0], vrf=vrfs[0], interface=interfaces[3], status=IPAddressStatusChoices.STATUS_ACTIVE, dns_name='ipaddress-b'),
+ IPAddress(family=6, address='2001:db8::3/64', tenant=tenants[1], vrf=vrfs[1], interface=interfaces[4], status=IPAddressStatusChoices.STATUS_RESERVED, role=IPAddressRoleChoices.ROLE_VIP, dns_name='ipaddress-c'),
+ IPAddress(family=6, address='2001:db8::4/64', tenant=tenants[2], vrf=vrfs[2], interface=interfaces[5], status=IPAddressStatusChoices.STATUS_DEPRECATED, role=IPAddressRoleChoices.ROLE_SECONDARY, dns_name='ipaddress-d'),
+ IPAddress(family=6, address='2001:db8::1/65', tenant=None, vrf=None, interface=None, status=IPAddressStatusChoices.STATUS_ACTIVE),
)
IPAddress.objects.bulk_create(ipaddresses)
@@ -427,6 +498,20 @@ class IPAddressTestCase(TestCase):
params = {'role': [IPAddressRoleChoices.ROLE_SECONDARY, IPAddressRoleChoices.ROLE_VIP]}
self.assertEqual(self.filterset(params, self.queryset).qs.count(), 4)
+ def test_tenant(self):
+ tenants = Tenant.objects.all()[:2]
+ params = {'tenant_id': [tenants[0].pk, tenants[1].pk]}
+ self.assertEqual(self.filterset(params, self.queryset).qs.count(), 4)
+ params = {'tenant': [tenants[0].slug, tenants[1].slug]}
+ self.assertEqual(self.filterset(params, self.queryset).qs.count(), 4)
+
+ def test_tenant_group(self):
+ tenant_groups = TenantGroup.objects.all()[:2]
+ params = {'tenant_group_id': [tenant_groups[0].pk, tenant_groups[1].pk]}
+ self.assertEqual(self.filterset(params, self.queryset).qs.count(), 4)
+ params = {'tenant_group': [tenant_groups[0].slug, tenant_groups[1].slug]}
+ self.assertEqual(self.filterset(params, self.queryset).qs.count(), 4)
+
class VLANGroupTestCase(TestCase):
queryset = VLANGroup.objects.all()
@@ -524,13 +609,27 @@ class VLANTestCase(TestCase):
)
VLANGroup.objects.bulk_create(groups)
+ tenant_groups = (
+ TenantGroup(name='Tenant group 1', slug='tenant-group-1'),
+ TenantGroup(name='Tenant group 2', slug='tenant-group-2'),
+ TenantGroup(name='Tenant group 3', slug='tenant-group-3'),
+ )
+ TenantGroup.objects.bulk_create(tenant_groups)
+
+ tenants = (
+ Tenant(name='Tenant 1', slug='tenant-1', group=tenant_groups[0]),
+ Tenant(name='Tenant 2', slug='tenant-2', group=tenant_groups[1]),
+ Tenant(name='Tenant 3', slug='tenant-3', group=tenant_groups[2]),
+ )
+ Tenant.objects.bulk_create(tenants)
+
vlans = (
- VLAN(vid=101, name='VLAN 101', site=sites[0], group=groups[0], role=roles[0], status=VLANStatusChoices.STATUS_ACTIVE),
- VLAN(vid=102, name='VLAN 102', site=sites[0], group=groups[0], role=roles[0], status=VLANStatusChoices.STATUS_ACTIVE),
- VLAN(vid=201, name='VLAN 201', site=sites[1], group=groups[1], role=roles[1], status=VLANStatusChoices.STATUS_DEPRECATED),
- VLAN(vid=202, name='VLAN 202', site=sites[1], group=groups[1], role=roles[1], status=VLANStatusChoices.STATUS_DEPRECATED),
- VLAN(vid=301, name='VLAN 301', site=sites[2], group=groups[2], role=roles[2], status=VLANStatusChoices.STATUS_RESERVED),
- VLAN(vid=302, name='VLAN 302', site=sites[2], group=groups[2], role=roles[2], status=VLANStatusChoices.STATUS_RESERVED),
+ VLAN(vid=101, name='VLAN 101', site=sites[0], group=groups[0], role=roles[0], tenant=tenants[0], status=VLANStatusChoices.STATUS_ACTIVE),
+ VLAN(vid=102, name='VLAN 102', site=sites[0], group=groups[0], role=roles[0], tenant=tenants[0], status=VLANStatusChoices.STATUS_ACTIVE),
+ VLAN(vid=201, name='VLAN 201', site=sites[1], group=groups[1], role=roles[1], tenant=tenants[1], status=VLANStatusChoices.STATUS_DEPRECATED),
+ VLAN(vid=202, name='VLAN 202', site=sites[1], group=groups[1], role=roles[1], tenant=tenants[1], status=VLANStatusChoices.STATUS_DEPRECATED),
+ VLAN(vid=301, name='VLAN 301', site=sites[2], group=groups[2], role=roles[2], tenant=tenants[2], status=VLANStatusChoices.STATUS_RESERVED),
+ VLAN(vid=302, name='VLAN 302', site=sites[2], group=groups[2], role=roles[2], tenant=tenants[2], status=VLANStatusChoices.STATUS_RESERVED),
)
VLAN.objects.bulk_create(vlans)
@@ -579,6 +678,20 @@ class VLANTestCase(TestCase):
params = {'status': [VLANStatusChoices.STATUS_ACTIVE, VLANStatusChoices.STATUS_DEPRECATED]}
self.assertEqual(self.filterset(params, self.queryset).qs.count(), 4)
+ def test_tenant(self):
+ tenants = Tenant.objects.all()[:2]
+ params = {'tenant_id': [tenants[0].pk, tenants[1].pk]}
+ self.assertEqual(self.filterset(params, self.queryset).qs.count(), 4)
+ params = {'tenant': [tenants[0].slug, tenants[1].slug]}
+ self.assertEqual(self.filterset(params, self.queryset).qs.count(), 4)
+
+ def test_tenant_group(self):
+ tenant_groups = TenantGroup.objects.all()[:2]
+ params = {'tenant_group_id': [tenant_groups[0].pk, tenant_groups[1].pk]}
+ self.assertEqual(self.filterset(params, self.queryset).qs.count(), 4)
+ params = {'tenant_group': [tenant_groups[0].slug, tenant_groups[1].slug]}
+ self.assertEqual(self.filterset(params, self.queryset).qs.count(), 4)
+
class ServiceTestCase(TestCase):
queryset = Service.objects.all()
diff --git a/netbox/netbox/settings.py b/netbox/netbox/settings.py
index 3bc673796..19e124abc 100644
--- a/netbox/netbox/settings.py
+++ b/netbox/netbox/settings.py
@@ -12,7 +12,7 @@ from django.core.exceptions import ImproperlyConfigured
# Environment setup
#
-VERSION = '2.7.8'
+VERSION = '2.7.9'
# Hostname
HOSTNAME = platform.node()
@@ -506,6 +506,7 @@ REST_FRAMEWORK = {
SWAGGER_SETTINGS = {
'DEFAULT_AUTO_SCHEMA_CLASS': 'utilities.custom_inspectors.NetBoxSwaggerAutoSchema',
'DEFAULT_FIELD_INSPECTORS': [
+ 'utilities.custom_inspectors.JSONFieldInspector',
'utilities.custom_inspectors.NullableBooleanFieldInspector',
'utilities.custom_inspectors.CustomChoiceFieldInspector',
'utilities.custom_inspectors.TagListFieldInspector',
diff --git a/netbox/netbox/views.py b/netbox/netbox/views.py
index 904dc7375..05bcea90d 100644
--- a/netbox/netbox/views.py
+++ b/netbox/netbox/views.py
@@ -1,6 +1,6 @@
from collections import OrderedDict
-from django.db.models import Count, F, OuterRef, Subquery
+from django.db.models import Count, F
from django.shortcuts import render
from django.views.generic import View
from rest_framework.response import Response
@@ -8,7 +8,7 @@ from rest_framework.reverse import reverse
from rest_framework.views import APIView
from circuits.filters import CircuitFilterSet, ProviderFilterSet
-from circuits.models import Circuit, CircuitTermination, Provider
+from circuits.models import Circuit, Provider
from circuits.tables import CircuitTable, ProviderTable
from dcim.filters import (
CableFilterSet, DeviceFilterSet, DeviceTypeFilterSet, PowerFeedFilterSet, RackFilterSet, RackGroupFilterSet, SiteFilterSet,
@@ -50,15 +50,7 @@ SEARCH_TYPES = OrderedDict((
'permission': 'circuits.view_circuit',
'queryset': Circuit.objects.prefetch_related(
'type', 'provider', 'tenant', 'terminations__site'
- ).annotate(
- # Annotate A/Z terminations
- a_side=Subquery(
- CircuitTermination.objects.filter(circuit=OuterRef('pk')).filter(term_side='A').values('site__name')[:1]
- ),
- z_side=Subquery(
- CircuitTermination.objects.filter(circuit=OuterRef('pk')).filter(term_side='Z').values('site__name')[:1]
- ),
- ),
+ ).annotate_sites(),
'filterset': CircuitFilterSet,
'table': CircuitTable,
'url': 'circuits:circuit_list',
diff --git a/netbox/project-static/js/rack_elevations.js b/netbox/project-static/js/rack_elevations.js
index 138065e3c..9c58b82e3 100644
--- a/netbox/project-static/js/rack_elevations.js
+++ b/netbox/project-static/js/rack_elevations.js
@@ -1,14 +1,11 @@
// Toggle the display of device images within an SVG rack elevation
$('button.toggle-images').click(function() {
var selected = $(this).attr('selected');
- var rack_front = $("#rack_front");
- var rack_rear = $("#rack_rear");
+ var rack_elevation = $(".rack_elevation");
if (selected) {
- $('.device-image', rack_front.contents()).addClass('hidden');
- $('.device-image', rack_rear.contents()).addClass('hidden');
+ $('.device-image', rack_elevation.contents()).addClass('hidden');
} else {
- $('.device-image', rack_front.contents()).removeClass('hidden');
- $('.device-image', rack_rear.contents()).removeClass('hidden');
+ $('.device-image', rack_elevation.contents()).removeClass('hidden');
}
$(this).attr('selected', !selected);
$(this).children('span').toggleClass('glyphicon-check glyphicon-unchecked');
diff --git a/netbox/secrets/filters.py b/netbox/secrets/filters.py
index 0c2b01f4d..f32ac1c55 100644
--- a/netbox/secrets/filters.py
+++ b/netbox/secrets/filters.py
@@ -3,7 +3,7 @@ from django.db.models import Q
from dcim.models import Device
from extras.filters import CustomFieldFilterSet, CreatedUpdatedFilterSet
-from utilities.filters import NameSlugSearchFilterSet, NumericInFilter, TagFilter
+from utilities.filters import BaseFilterSet, NameSlugSearchFilterSet, NumericInFilter, TagFilter
from .models import Secret, SecretRole
@@ -13,14 +13,14 @@ __all__ = (
)
-class SecretRoleFilterSet(NameSlugSearchFilterSet):
+class SecretRoleFilterSet(BaseFilterSet, NameSlugSearchFilterSet):
class Meta:
model = SecretRole
fields = ['id', 'name', 'slug']
-class SecretFilterSet(CustomFieldFilterSet, CreatedUpdatedFilterSet):
+class SecretFilterSet(BaseFilterSet, CustomFieldFilterSet, CreatedUpdatedFilterSet):
id__in = NumericInFilter(
field_name='id',
lookup_expr='in'
diff --git a/netbox/templates/dcim/device.html b/netbox/templates/dcim/device.html
index 8c457121f..624e8d9ef 100644
--- a/netbox/templates/dcim/device.html
+++ b/netbox/templates/dcim/device.html
@@ -603,7 +603,7 @@
-