mirror of
https://github.com/netbox-community/netbox.git
synced 2025-08-26 17:26:10 -06:00
Update invalid input handling to return empty set instead of raising exception
This commit is contained in:
parent
1e2a33337f
commit
fe14cdf07c
@ -601,23 +601,33 @@ class IPAddressFilterSet(NetBoxModelFilterSet, TenancyFilterSet):
|
|||||||
return queryset.filter(q)
|
return queryset.filter(q)
|
||||||
|
|
||||||
def parse_inet_addresses(self, value):
|
def parse_inet_addresses(self, value):
|
||||||
try:
|
'''
|
||||||
parsed = []
|
Parse networks or IP addresses and cast to a format
|
||||||
for addr in value:
|
acceptable by the Postgres inet type.
|
||||||
if netaddr.valid_ipv4(addr) or netaddr.valid_ipv6(addr):
|
|
||||||
parsed.append(addr)
|
Skips invalid values.
|
||||||
continue
|
'''
|
||||||
|
parsed = []
|
||||||
|
for addr in value:
|
||||||
|
if netaddr.valid_ipv4(addr) or netaddr.valid_ipv6(addr):
|
||||||
|
parsed.append(addr)
|
||||||
|
continue
|
||||||
|
try:
|
||||||
network = netaddr.IPNetwork(addr)
|
network = netaddr.IPNetwork(addr)
|
||||||
parsed.append(str(network))
|
parsed.append(str(network))
|
||||||
return parsed
|
except (AddrFormatError, ValueError):
|
||||||
except (AddrFormatError, ValueError):
|
continue
|
||||||
raise serializers.ValidationError({
|
return parsed
|
||||||
'address': f'Invalid address {addr}. It must be a valid IPv4 or IPv6 address or network'
|
|
||||||
})
|
|
||||||
|
|
||||||
def filter_address(self, queryset, name, value):
|
def filter_address(self, queryset, name, value):
|
||||||
|
# Let's first parse the addresses passed
|
||||||
|
# as argument. If they are all invalid,
|
||||||
|
# we return an empty queryset
|
||||||
|
value = self.parse_inet_addresses(value)
|
||||||
|
if (len(value) == 0):
|
||||||
|
return queryset.none()
|
||||||
|
|
||||||
try:
|
try:
|
||||||
value = self.parse_inet_addresses(value)
|
|
||||||
return queryset.filter(address__net_in=value)
|
return queryset.filter(address__net_in=value)
|
||||||
except ValidationError:
|
except ValidationError:
|
||||||
return queryset.none()
|
return queryset.none()
|
||||||
|
@ -864,19 +864,13 @@ class IPAddressTestCase(TestCase, ChangeLoggedFilterSetTests):
|
|||||||
|
|
||||||
# Check for invalid input.
|
# Check for invalid input.
|
||||||
params = {'address': ['/24']}
|
params = {'address': ['/24']}
|
||||||
with self.assertRaises(serializers.ValidationError) as cm:
|
self.assertEqual(self.filterset(params, self.queryset).qs.count(), 0)
|
||||||
self.filterset(params, self.queryset).qs.count()
|
params = {'address': ['10.0.0.1/255.255.999.0']} # Invalid netmask
|
||||||
self.assertRegex(cm.exception.detail['address'], r'^Invalid address.*')
|
self.assertEqual(self.filterset(params, self.queryset).qs.count(), 0)
|
||||||
|
|
||||||
params = {'address': ['10.0.0.1/255.255.555.0']}
|
# Check for partially invalid input.
|
||||||
with self.assertRaises(serializers.ValidationError) as cm:
|
params = {'address': ['10.0.0.1', '/24', '10.0.0.10/24']}
|
||||||
self.filterset(params, self.queryset).qs.count()
|
self.assertEqual(self.filterset(params, self.queryset).qs.count(), 2)
|
||||||
self.assertRegex(cm.exception.detail['address'], r'^Invalid address.*')
|
|
||||||
|
|
||||||
params = {'address': ['10.0.0.1', '/24']}
|
|
||||||
with self.assertRaises(serializers.ValidationError) as cm:
|
|
||||||
self.filterset(params, self.queryset).qs.count()
|
|
||||||
self.assertRegex(cm.exception.detail['address'], r'^Invalid address.*')
|
|
||||||
|
|
||||||
def test_mask_length(self):
|
def test_mask_length(self):
|
||||||
params = {'mask_length': '24'}
|
params = {'mask_length': '24'}
|
||||||
|
Loading…
Reference in New Issue
Block a user