views.py 57 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135113611371138113911401141114211431144114511461147114811491150115111521153115411551156115711581159116011611162116311641165116611671168116911701171117211731174117511761177117811791180118111821183118411851186118711881189119011911192119311941195119611971198119912001201120212031204120512061207120812091210121112121213121412151216121712181219122012211222122312241225122612271228122912301231123212331234123512361237123812391240124112421243124412451246124712481249125012511252125312541255125612571258125912601261126212631264126512661267126812691270127112721273127412751276127712781279128012811282128312841285128612871288128912901291129212931294129512961297129812991300130113021303130413051306130713081309131013111312131313141315131613171318131913201321132213231324132513261327132813291330133113321333133413351336133713381339134013411342134313441345134613471348134913501351135213531354135513561357135813591360136113621363136413651366136713681369137013711372137313741375137613771378137913801381138213831384138513861387138813891390139113921393139413951396139713981399140014011402140314041405140614071408140914101411141214131414141514161417141814191420142114221423
  1. import logging
  2. import re
  3. import sys
  4. from copy import deepcopy
  5. from django.contrib import messages
  6. from django.contrib.auth.decorators import login_required
  7. from django.contrib.contenttypes.models import ContentType
  8. from django.contrib.auth.mixins import AccessMixin
  9. from django.core.exceptions import FieldDoesNotExist, ImproperlyConfigured, ObjectDoesNotExist, ValidationError
  10. from django.db import transaction, IntegrityError
  11. from django.db.models import ManyToManyField, ProtectedError
  12. from django.forms import Form, ModelMultipleChoiceField, MultipleHiddenInput, Textarea
  13. from django.http import HttpResponse, HttpResponseServerError
  14. from django.shortcuts import get_object_or_404, redirect, render
  15. from django.template import loader
  16. from django.template.exceptions import TemplateDoesNotExist
  17. from django.urls import reverse
  18. from django.urls.exceptions import NoReverseMatch
  19. from django.utils.decorators import method_decorator
  20. from django.utils.html import escape
  21. from django.utils.http import is_safe_url
  22. from django.utils.safestring import mark_safe
  23. from django.views.decorators.csrf import requires_csrf_token
  24. from django.views.defaults import ERROR_500_TEMPLATE_NAME
  25. from django.views.generic import View
  26. from django_tables2 import RequestConfig
  27. from extras.models import CustomField, CustomFieldValue, ExportTemplate
  28. from extras.querysets import CustomFieldQueryset
  29. from utilities.exceptions import AbortTransaction
  30. from utilities.forms import BootstrapMixin, BulkRenameForm, CSVDataField, TableConfigForm, restrict_form_fields
  31. from utilities.permissions import get_permission_for_model, resolve_permission
  32. from utilities.utils import csv_format, normalize_querydict, prepare_cloned_fields
  33. from .error_handlers import handle_protectederror
  34. from .forms import ConfirmationForm, ImportForm
  35. from .paginator import EnhancedPaginator, get_paginate_count
  36. #
  37. # Mixins
  38. #
  39. class ContentTypePermissionRequiredMixin(AccessMixin):
  40. """
  41. Similar to Django's built-in PermissionRequiredMixin, but extended to check model-level permission assignments.
  42. This is related to ObjectPermissionRequiredMixin, except that is does not enforce object-level permissions,
  43. and fits within NetBox's custom permission enforcement system.
  44. additional_permissions: An optional iterable of statically declared permissions to evaluate in addition to those
  45. derived from the object type
  46. """
  47. additional_permissions = list()
  48. def get_required_permission(self):
  49. """
  50. Return the specific permission necessary to perform the requested action on an object.
  51. """
  52. raise NotImplementedError(f"{self.__class__.__name__} must implement get_required_permission()")
  53. def has_permission(self):
  54. user = self.request.user
  55. permission_required = self.get_required_permission()
  56. # Check that the user has been granted the required permission(s).
  57. if user.has_perms((permission_required, *self.additional_permissions)):
  58. return True
  59. return False
  60. def dispatch(self, request, *args, **kwargs):
  61. if not self.has_permission():
  62. return self.handle_no_permission()
  63. return super().dispatch(request, *args, **kwargs)
  64. class ObjectPermissionRequiredMixin(AccessMixin):
  65. """
  66. Similar to Django's built-in PermissionRequiredMixin, but extended to check for both model-level and object-level
  67. permission assignments. If the user has only object-level permissions assigned, the view's queryset is filtered
  68. to return only those objects on which the user is permitted to perform the specified action.
  69. additional_permissions: An optional iterable of statically declared permissions to evaluate in addition to those
  70. derived from the object type
  71. """
  72. additional_permissions = list()
  73. def get_required_permission(self):
  74. """
  75. Return the specific permission necessary to perform the requested action on an object.
  76. """
  77. raise NotImplementedError(f"{self.__class__.__name__} must implement get_required_permission()")
  78. def has_permission(self):
  79. user = self.request.user
  80. permission_required = self.get_required_permission()
  81. # Check that the user has been granted the required permission(s).
  82. if user.has_perms((permission_required, *self.additional_permissions)):
  83. # Update the view's QuerySet to filter only the permitted objects
  84. action = resolve_permission(permission_required)[1]
  85. self.queryset = self.queryset.restrict(user, action)
  86. return True
  87. return False
  88. def dispatch(self, request, *args, **kwargs):
  89. if not hasattr(self, 'queryset'):
  90. raise ImproperlyConfigured(
  91. '{} has no queryset defined. ObjectPermissionRequiredMixin may only be used on views which define '
  92. 'a base queryset'.format(self.__class__.__name__)
  93. )
  94. if not self.has_permission():
  95. return self.handle_no_permission()
  96. return super().dispatch(request, *args, **kwargs)
  97. class GetReturnURLMixin:
  98. """
  99. Provides logic for determining where a user should be redirected after processing a form.
  100. """
  101. default_return_url = None
  102. def get_return_url(self, request, obj=None):
  103. # First, see if `return_url` was specified as a query parameter or form data. Use this URL only if it's
  104. # considered safe.
  105. query_param = request.GET.get('return_url') or request.POST.get('return_url')
  106. if query_param and is_safe_url(url=query_param, allowed_hosts=request.get_host()):
  107. return query_param
  108. # Next, check if the object being modified (if any) has an absolute URL.
  109. if obj is not None and obj.pk and hasattr(obj, 'get_absolute_url'):
  110. return obj.get_absolute_url()
  111. # Fall back to the default URL (if specified) for the view.
  112. if self.default_return_url is not None:
  113. return reverse(self.default_return_url)
  114. # Attempt to dynamically resolve the list view for the object
  115. if hasattr(self, 'queryset'):
  116. model_opts = self.queryset.model._meta
  117. try:
  118. return reverse(f'{model_opts.app_label}:{model_opts.model_name}_list')
  119. except NoReverseMatch:
  120. pass
  121. # If all else fails, return home. Ideally this should never happen.
  122. return reverse('home')
  123. #
  124. # Generic views
  125. #
  126. class ObjectView(ObjectPermissionRequiredMixin, View):
  127. """
  128. Retrieve a single object for display.
  129. queryset: The base queryset for retrieving the object.
  130. """
  131. queryset = None
  132. def get_required_permission(self):
  133. return get_permission_for_model(self.queryset.model, 'view')
  134. def get_template_name(self):
  135. """
  136. Return self.template_name if set. Otherwise, resolve the template path by model app_label and name.
  137. """
  138. if hasattr(self, 'template_name'):
  139. return self.template_name
  140. model_opts = self.queryset.model._meta
  141. return f'{model_opts.app_label}/{model_opts.model_name}.html'
  142. def get(self, request, pk):
  143. """
  144. Generic GET handler for accessing an object by PK
  145. """
  146. instance = get_object_or_404(self.queryset, pk=pk)
  147. return render(request, self.get_template_name(), {
  148. 'instance': instance,
  149. })
  150. class ObjectListView(ObjectPermissionRequiredMixin, View):
  151. """
  152. List a series of objects.
  153. queryset: The queryset of objects to display
  154. filter: A django-filter FilterSet that is applied to the queryset
  155. filter_form: The form used to render filter options
  156. table: The django-tables2 Table used to render the objects list
  157. template_name: The name of the template
  158. """
  159. queryset = None
  160. filterset = None
  161. filterset_form = None
  162. table = None
  163. template_name = 'utilities/obj_list.html'
  164. action_buttons = ('add', 'import', 'export')
  165. def get_required_permission(self):
  166. return get_permission_for_model(self.queryset.model, 'view')
  167. def queryset_to_yaml(self):
  168. """
  169. Export the queryset of objects as concatenated YAML documents.
  170. """
  171. yaml_data = [obj.to_yaml() for obj in self.queryset]
  172. return '---\n'.join(yaml_data)
  173. def queryset_to_csv(self):
  174. """
  175. Export the queryset of objects as comma-separated value (CSV), using the model's to_csv() method.
  176. """
  177. csv_data = []
  178. custom_fields = []
  179. # Start with the column headers
  180. headers = self.queryset.model.csv_headers.copy()
  181. # Add custom field headers, if any
  182. if hasattr(self.queryset.model, 'get_custom_fields'):
  183. for custom_field in self.queryset.model().get_custom_fields():
  184. headers.append(custom_field.name)
  185. custom_fields.append(custom_field.name)
  186. csv_data.append(','.join(headers))
  187. # Iterate through the queryset appending each object
  188. for obj in self.queryset:
  189. data = obj.to_csv()
  190. for custom_field in custom_fields:
  191. data += (obj.cf.get(custom_field, ''),)
  192. csv_data.append(csv_format(data))
  193. return '\n'.join(csv_data)
  194. def get(self, request):
  195. model = self.queryset.model
  196. content_type = ContentType.objects.get_for_model(model)
  197. if self.filterset:
  198. self.queryset = self.filterset(request.GET, self.queryset).qs
  199. # If this type of object has one or more custom fields, prefetch any relevant custom field values
  200. custom_fields = CustomField.objects.filter(
  201. obj_type=ContentType.objects.get_for_model(model)
  202. ).prefetch_related('choices')
  203. if custom_fields:
  204. self.queryset = self.queryset.prefetch_related('custom_field_values')
  205. # Check for export template rendering
  206. if request.GET.get('export'):
  207. et = get_object_or_404(ExportTemplate, content_type=content_type, name=request.GET.get('export'))
  208. queryset = CustomFieldQueryset(self.queryset, custom_fields) if custom_fields else self.queryset
  209. try:
  210. return et.render_to_response(queryset)
  211. except Exception as e:
  212. messages.error(
  213. request,
  214. "There was an error rendering the selected export template ({}): {}".format(
  215. et.name, e
  216. )
  217. )
  218. # Check for YAML export support
  219. elif 'export' in request.GET and hasattr(model, 'to_yaml'):
  220. response = HttpResponse(self.queryset_to_yaml(), content_type='text/yaml')
  221. filename = 'netbox_{}.yaml'.format(self.queryset.model._meta.verbose_name_plural)
  222. response['Content-Disposition'] = 'attachment; filename="{}"'.format(filename)
  223. return response
  224. # Fall back to built-in CSV formatting if export requested but no template specified
  225. elif 'export' in request.GET and hasattr(model, 'to_csv'):
  226. response = HttpResponse(self.queryset_to_csv(), content_type='text/csv')
  227. filename = 'netbox_{}.csv'.format(self.queryset.model._meta.verbose_name_plural)
  228. response['Content-Disposition'] = 'attachment; filename="{}"'.format(filename)
  229. return response
  230. # Provide a hook to tweak the queryset based on the request immediately prior to rendering the object list
  231. self.queryset = self.alter_queryset(request)
  232. # Compile a dictionary indicating which permissions are available to the current user for this model
  233. permissions = {}
  234. for action in ('add', 'change', 'delete', 'view'):
  235. perm_name = get_permission_for_model(model, action)
  236. permissions[action] = request.user.has_perm(perm_name)
  237. # Construct the table based on the user's permissions
  238. if request.user.is_authenticated:
  239. columns = request.user.config.get(f"tables.{self.table.__name__}.columns")
  240. else:
  241. columns = None
  242. table = self.table(self.queryset, columns=columns)
  243. if 'pk' in table.base_columns and (permissions['change'] or permissions['delete']):
  244. table.columns.show('pk')
  245. # Apply the request context
  246. paginate = {
  247. 'paginator_class': EnhancedPaginator,
  248. 'per_page': get_paginate_count(request)
  249. }
  250. RequestConfig(request, paginate).configure(table)
  251. context = {
  252. 'content_type': content_type,
  253. 'table': table,
  254. 'permissions': permissions,
  255. 'action_buttons': self.action_buttons,
  256. 'table_config_form': TableConfigForm(table=table),
  257. 'filter_form': self.filterset_form(request.GET, label_suffix='') if self.filterset_form else None,
  258. }
  259. context.update(self.extra_context())
  260. return render(request, self.template_name, context)
  261. @method_decorator(login_required)
  262. def post(self, request):
  263. # Update the user's table configuration
  264. table = self.table(self.queryset)
  265. form = TableConfigForm(table=table, data=request.POST)
  266. preference_name = f"tables.{self.table.__name__}.columns"
  267. if form.is_valid():
  268. if 'set' in request.POST:
  269. request.user.config.set(preference_name, form.cleaned_data['columns'], commit=True)
  270. elif 'clear' in request.POST:
  271. request.user.config.clear(preference_name, commit=True)
  272. messages.success(request, "Your preferences have been updated.")
  273. return redirect(request.get_full_path())
  274. def alter_queryset(self, request):
  275. # .all() is necessary to avoid caching queries
  276. return self.queryset.all()
  277. def extra_context(self):
  278. return {}
  279. class ObjectEditView(GetReturnURLMixin, ObjectPermissionRequiredMixin, View):
  280. """
  281. Create or edit a single object.
  282. queryset: The base queryset for the object being modified
  283. model_form: The form used to create or edit the object
  284. template_name: The name of the template
  285. """
  286. queryset = None
  287. model_form = None
  288. template_name = 'utilities/obj_edit.html'
  289. def get_required_permission(self):
  290. # self._permission_action is set by dispatch() to either "add" or "change" depending on whether
  291. # we are modifying an existing object or creating a new one.
  292. return get_permission_for_model(self.queryset.model, self._permission_action)
  293. def get_object(self, kwargs):
  294. # Look up an existing object by slug or PK, if provided.
  295. if 'slug' in kwargs:
  296. return get_object_or_404(self.queryset, slug=kwargs['slug'])
  297. elif 'pk' in kwargs:
  298. return get_object_or_404(self.queryset, pk=kwargs['pk'])
  299. # Otherwise, return a new instance.
  300. return self.queryset.model()
  301. def alter_obj(self, obj, request, url_args, url_kwargs):
  302. # Allow views to add extra info to an object before it is processed. For example, a parent object can be defined
  303. # given some parameter from the request URL.
  304. return obj
  305. def dispatch(self, request, *args, **kwargs):
  306. # Determine required permission based on whether we are editing an existing object
  307. self._permission_action = 'change' if kwargs else 'add'
  308. return super().dispatch(request, *args, **kwargs)
  309. def get(self, request, *args, **kwargs):
  310. obj = self.alter_obj(self.get_object(kwargs), request, args, kwargs)
  311. initial_data = normalize_querydict(request.GET)
  312. form = self.model_form(instance=obj, initial=initial_data)
  313. restrict_form_fields(form, request.user)
  314. return render(request, self.template_name, {
  315. 'obj': obj,
  316. 'obj_type': self.queryset.model._meta.verbose_name,
  317. 'form': form,
  318. 'return_url': self.get_return_url(request, obj),
  319. })
  320. def post(self, request, *args, **kwargs):
  321. logger = logging.getLogger('netbox.views.ObjectEditView')
  322. obj = self.alter_obj(self.get_object(kwargs), request, args, kwargs)
  323. form = self.model_form(
  324. data=request.POST,
  325. files=request.FILES,
  326. instance=obj
  327. )
  328. restrict_form_fields(form, request.user)
  329. if form.is_valid():
  330. logger.debug("Form validation was successful")
  331. try:
  332. with transaction.atomic():
  333. obj = form.save()
  334. # Check that the new object conforms with any assigned object-level permissions
  335. self.queryset.get(pk=obj.pk)
  336. msg = '{} {}'.format(
  337. 'Created' if not form.instance.pk else 'Modified',
  338. self.queryset.model._meta.verbose_name
  339. )
  340. logger.info(f"{msg} {obj} (PK: {obj.pk})")
  341. if hasattr(obj, 'get_absolute_url'):
  342. msg = '{} <a href="{}">{}</a>'.format(msg, obj.get_absolute_url(), escape(obj))
  343. else:
  344. msg = '{} {}'.format(msg, escape(obj))
  345. messages.success(request, mark_safe(msg))
  346. if '_addanother' in request.POST:
  347. # If the object has clone_fields, pre-populate a new instance of the form
  348. if hasattr(obj, 'clone_fields'):
  349. url = '{}?{}'.format(request.path, prepare_cloned_fields(obj))
  350. return redirect(url)
  351. return redirect(request.get_full_path())
  352. return_url = form.cleaned_data.get('return_url')
  353. if return_url is not None and is_safe_url(url=return_url, allowed_hosts=request.get_host()):
  354. return redirect(return_url)
  355. else:
  356. return redirect(self.get_return_url(request, obj))
  357. except ObjectDoesNotExist:
  358. msg = "Object save failed due to object-level permissions violation"
  359. logger.debug(msg)
  360. form.add_error(None, msg)
  361. else:
  362. logger.debug("Form validation failed")
  363. return render(request, self.template_name, {
  364. 'obj': obj,
  365. 'obj_type': self.queryset.model._meta.verbose_name,
  366. 'form': form,
  367. 'return_url': self.get_return_url(request, obj),
  368. })
  369. class ObjectDeleteView(GetReturnURLMixin, ObjectPermissionRequiredMixin, View):
  370. """
  371. Delete a single object.
  372. queryset: The base queryset for the object being deleted
  373. template_name: The name of the template
  374. """
  375. queryset = None
  376. template_name = 'utilities/obj_delete.html'
  377. def get_required_permission(self):
  378. return get_permission_for_model(self.queryset.model, 'delete')
  379. def get_object(self, kwargs):
  380. # Look up object by slug if one has been provided. Otherwise, use PK.
  381. if 'slug' in kwargs:
  382. return get_object_or_404(self.queryset, slug=kwargs['slug'])
  383. else:
  384. return get_object_or_404(self.queryset, pk=kwargs['pk'])
  385. def get(self, request, **kwargs):
  386. obj = self.get_object(kwargs)
  387. form = ConfirmationForm(initial=request.GET)
  388. return render(request, self.template_name, {
  389. 'obj': obj,
  390. 'form': form,
  391. 'obj_type': self.queryset.model._meta.verbose_name,
  392. 'return_url': self.get_return_url(request, obj),
  393. })
  394. def post(self, request, **kwargs):
  395. logger = logging.getLogger('netbox.views.ObjectDeleteView')
  396. obj = self.get_object(kwargs)
  397. form = ConfirmationForm(request.POST)
  398. if form.is_valid():
  399. logger.debug("Form validation was successful")
  400. try:
  401. obj.delete()
  402. except ProtectedError as e:
  403. logger.info("Caught ProtectedError while attempting to delete object")
  404. handle_protectederror(obj, request, e)
  405. return redirect(obj.get_absolute_url())
  406. msg = 'Deleted {} {}'.format(self.queryset.model._meta.verbose_name, obj)
  407. logger.info(msg)
  408. messages.success(request, msg)
  409. return_url = form.cleaned_data.get('return_url')
  410. if return_url is not None and is_safe_url(url=return_url, allowed_hosts=request.get_host()):
  411. return redirect(return_url)
  412. else:
  413. return redirect(self.get_return_url(request, obj))
  414. else:
  415. logger.debug("Form validation failed")
  416. return render(request, self.template_name, {
  417. 'obj': obj,
  418. 'form': form,
  419. 'obj_type': self.queryset.model._meta.verbose_name,
  420. 'return_url': self.get_return_url(request, obj),
  421. })
  422. class BulkCreateView(GetReturnURLMixin, ObjectPermissionRequiredMixin, View):
  423. """
  424. Create new objects in bulk.
  425. queryset: Base queryset for the objects being created
  426. form: Form class which provides the `pattern` field
  427. model_form: The ModelForm used to create individual objects
  428. pattern_target: Name of the field to be evaluated as a pattern (if any)
  429. template_name: The name of the template
  430. """
  431. queryset = None
  432. form = None
  433. model_form = None
  434. pattern_target = ''
  435. template_name = None
  436. def get_required_permission(self):
  437. return get_permission_for_model(self.queryset.model, 'add')
  438. def get(self, request):
  439. # Set initial values for visible form fields from query args
  440. initial = {}
  441. for field in getattr(self.model_form._meta, 'fields', []):
  442. if request.GET.get(field):
  443. initial[field] = request.GET[field]
  444. form = self.form()
  445. model_form = self.model_form(initial=initial)
  446. return render(request, self.template_name, {
  447. 'obj_type': self.model_form._meta.model._meta.verbose_name,
  448. 'form': form,
  449. 'model_form': model_form,
  450. 'return_url': self.get_return_url(request),
  451. })
  452. def post(self, request):
  453. logger = logging.getLogger('netbox.views.BulkCreateView')
  454. model = self.queryset.model
  455. form = self.form(request.POST)
  456. model_form = self.model_form(request.POST)
  457. if form.is_valid():
  458. logger.debug("Form validation was successful")
  459. pattern = form.cleaned_data['pattern']
  460. new_objs = []
  461. try:
  462. with transaction.atomic():
  463. # Create objects from the expanded. Abort the transaction on the first validation error.
  464. for value in pattern:
  465. # Reinstantiate the model form each time to avoid overwriting the same instance. Use a mutable
  466. # copy of the POST QueryDict so that we can update the target field value.
  467. model_form = self.model_form(request.POST.copy())
  468. model_form.data[self.pattern_target] = value
  469. # Validate each new object independently.
  470. if model_form.is_valid():
  471. obj = model_form.save()
  472. logger.debug(f"Created {obj} (PK: {obj.pk})")
  473. new_objs.append(obj)
  474. else:
  475. # Copy any errors on the pattern target field to the pattern form.
  476. errors = model_form.errors.as_data()
  477. if errors.get(self.pattern_target):
  478. form.add_error('pattern', errors[self.pattern_target])
  479. # Raise an IntegrityError to break the for loop and abort the transaction.
  480. raise IntegrityError()
  481. # Enforce object-level permissions
  482. if self.queryset.filter(pk__in=[obj.pk for obj in new_objs]).count() != len(new_objs):
  483. raise ObjectDoesNotExist
  484. # If we make it to this point, validation has succeeded on all new objects.
  485. msg = "Added {} {}".format(len(new_objs), model._meta.verbose_name_plural)
  486. logger.info(msg)
  487. messages.success(request, msg)
  488. if '_addanother' in request.POST:
  489. return redirect(request.path)
  490. return redirect(self.get_return_url(request))
  491. except IntegrityError:
  492. pass
  493. except ObjectDoesNotExist:
  494. msg = "Object creation failed due to object-level permissions violation"
  495. logger.debug(msg)
  496. form.add_error(None, msg)
  497. else:
  498. logger.debug("Form validation failed")
  499. return render(request, self.template_name, {
  500. 'form': form,
  501. 'model_form': model_form,
  502. 'obj_type': model._meta.verbose_name,
  503. 'return_url': self.get_return_url(request),
  504. })
  505. class ObjectImportView(GetReturnURLMixin, ObjectPermissionRequiredMixin, View):
  506. """
  507. Import a single object (YAML or JSON format).
  508. queryset: Base queryset for the objects being created
  509. model_form: The ModelForm used to create individual objects
  510. related_object_forms: A dictionary mapping of forms to be used for the creation of related (child) objects
  511. template_name: The name of the template
  512. """
  513. queryset = None
  514. model_form = None
  515. related_object_forms = dict()
  516. template_name = 'utilities/obj_import.html'
  517. def get_required_permission(self):
  518. return get_permission_for_model(self.queryset.model, 'add')
  519. def get(self, request):
  520. form = ImportForm()
  521. return render(request, self.template_name, {
  522. 'form': form,
  523. 'obj_type': self.queryset.model._meta.verbose_name,
  524. 'return_url': self.get_return_url(request),
  525. })
  526. def post(self, request):
  527. logger = logging.getLogger('netbox.views.ObjectImportView')
  528. form = ImportForm(request.POST)
  529. if form.is_valid():
  530. logger.debug("Import form validation was successful")
  531. # Initialize model form
  532. data = form.cleaned_data['data']
  533. model_form = self.model_form(data)
  534. restrict_form_fields(model_form, request.user)
  535. # Assign default values for any fields which were not specified. We have to do this manually because passing
  536. # 'initial=' to the form on initialization merely sets default values for the widgets. Since widgets are not
  537. # used for YAML/JSON import, we first bind the imported data normally, then update the form's data with the
  538. # applicable field defaults as needed prior to form validation.
  539. for field_name, field in model_form.fields.items():
  540. if field_name not in data and hasattr(field, 'initial'):
  541. model_form.data[field_name] = field.initial
  542. if model_form.is_valid():
  543. try:
  544. with transaction.atomic():
  545. # Save the primary object
  546. obj = model_form.save()
  547. # Enforce object-level permissions
  548. self.queryset.get(pk=obj.pk)
  549. logger.debug(f"Created {obj} (PK: {obj.pk})")
  550. # Iterate through the related object forms (if any), validating and saving each instance.
  551. for field_name, related_object_form in self.related_object_forms.items():
  552. logger.debug("Processing form for related objects: {related_object_form}")
  553. related_obj_pks = []
  554. for i, rel_obj_data in enumerate(data.get(field_name, list())):
  555. f = related_object_form(obj, rel_obj_data)
  556. for subfield_name, field in f.fields.items():
  557. if subfield_name not in rel_obj_data and hasattr(field, 'initial'):
  558. f.data[subfield_name] = field.initial
  559. if f.is_valid():
  560. related_obj = f.save()
  561. related_obj_pks.append(related_obj.pk)
  562. else:
  563. # Replicate errors on the related object form to the primary form for display
  564. for subfield_name, errors in f.errors.items():
  565. for err in errors:
  566. err_msg = "{}[{}] {}: {}".format(field_name, i, subfield_name, err)
  567. model_form.add_error(None, err_msg)
  568. raise AbortTransaction()
  569. # Enforce object-level permissions on related objects
  570. model = related_object_form.Meta.model
  571. if model.objects.filter(pk__in=related_obj_pks).count() != len(related_obj_pks):
  572. raise ObjectDoesNotExist
  573. except AbortTransaction:
  574. pass
  575. except ObjectDoesNotExist:
  576. msg = "Object creation failed due to object-level permissions violation"
  577. logger.debug(msg)
  578. form.add_error(None, msg)
  579. if not model_form.errors:
  580. logger.info(f"Import object {obj} (PK: {obj.pk})")
  581. messages.success(request, mark_safe('Imported object: <a href="{}">{}</a>'.format(
  582. obj.get_absolute_url(), obj
  583. )))
  584. if '_addanother' in request.POST:
  585. return redirect(request.get_full_path())
  586. return_url = form.cleaned_data.get('return_url')
  587. if return_url is not None and is_safe_url(url=return_url, allowed_hosts=request.get_host()):
  588. return redirect(return_url)
  589. else:
  590. return redirect(self.get_return_url(request, obj))
  591. else:
  592. logger.debug("Model form validation failed")
  593. # Replicate model form errors for display
  594. for field, errors in model_form.errors.items():
  595. for err in errors:
  596. if field == '__all__':
  597. form.add_error(None, err)
  598. else:
  599. form.add_error(None, "{}: {}".format(field, err))
  600. else:
  601. logger.debug("Import form validation failed")
  602. return render(request, self.template_name, {
  603. 'form': form,
  604. 'obj_type': self.queryset.model._meta.verbose_name,
  605. 'return_url': self.get_return_url(request),
  606. })
  607. class BulkImportView(GetReturnURLMixin, ObjectPermissionRequiredMixin, View):
  608. """
  609. Import objects in bulk (CSV format).
  610. queryset: Base queryset for the model
  611. model_form: The form used to create each imported object
  612. table: The django-tables2 Table used to render the list of imported objects
  613. template_name: The name of the template
  614. widget_attrs: A dict of attributes to apply to the import widget (e.g. to require a session key)
  615. """
  616. queryset = None
  617. model_form = None
  618. table = None
  619. template_name = 'utilities/obj_bulk_import.html'
  620. widget_attrs = {}
  621. def _import_form(self, *args, **kwargs):
  622. class ImportForm(BootstrapMixin, Form):
  623. csv = CSVDataField(
  624. from_form=self.model_form,
  625. widget=Textarea(attrs=self.widget_attrs)
  626. )
  627. return ImportForm(*args, **kwargs)
  628. def _save_obj(self, obj_form, request):
  629. """
  630. Provide a hook to modify the object immediately before saving it (e.g. to encrypt secret data).
  631. """
  632. return obj_form.save()
  633. def get_required_permission(self):
  634. return get_permission_for_model(self.queryset.model, 'add')
  635. def get(self, request):
  636. return render(request, self.template_name, {
  637. 'form': self._import_form(),
  638. 'fields': self.model_form().fields,
  639. 'obj_type': self.model_form._meta.model._meta.verbose_name,
  640. 'return_url': self.get_return_url(request),
  641. })
  642. def post(self, request):
  643. logger = logging.getLogger('netbox.views.BulkImportView')
  644. new_objs = []
  645. form = self._import_form(request.POST)
  646. if form.is_valid():
  647. logger.debug("Form validation was successful")
  648. try:
  649. # Iterate through CSV data and bind each row to a new model form instance.
  650. with transaction.atomic():
  651. headers, records = form.cleaned_data['csv']
  652. for row, data in enumerate(records, start=1):
  653. obj_form = self.model_form(data, headers=headers)
  654. restrict_form_fields(obj_form, request.user)
  655. if obj_form.is_valid():
  656. obj = self._save_obj(obj_form, request)
  657. new_objs.append(obj)
  658. else:
  659. for field, err in obj_form.errors.items():
  660. form.add_error('csv', "Row {} {}: {}".format(row, field, err[0]))
  661. raise ValidationError("")
  662. # Enforce object-level permissions
  663. if self.queryset.filter(pk__in=[obj.pk for obj in new_objs]).count() != len(new_objs):
  664. raise ObjectDoesNotExist
  665. # Compile a table containing the imported objects
  666. obj_table = self.table(new_objs)
  667. if new_objs:
  668. msg = 'Imported {} {}'.format(len(new_objs), new_objs[0]._meta.verbose_name_plural)
  669. logger.info(msg)
  670. messages.success(request, msg)
  671. return render(request, "import_success.html", {
  672. 'table': obj_table,
  673. 'return_url': self.get_return_url(request),
  674. })
  675. except ValidationError:
  676. pass
  677. except ObjectDoesNotExist:
  678. msg = "Object import failed due to object-level permissions violation"
  679. logger.debug(msg)
  680. form.add_error(None, msg)
  681. else:
  682. logger.debug("Form validation failed")
  683. return render(request, self.template_name, {
  684. 'form': form,
  685. 'fields': self.model_form().fields,
  686. 'obj_type': self.model_form._meta.model._meta.verbose_name,
  687. 'return_url': self.get_return_url(request),
  688. })
  689. class BulkEditView(GetReturnURLMixin, ObjectPermissionRequiredMixin, View):
  690. """
  691. Edit objects in bulk.
  692. queryset: Custom queryset to use when retrieving objects (e.g. to select related objects)
  693. filter: FilterSet to apply when deleting by QuerySet
  694. table: The table used to display devices being edited
  695. form: The form class used to edit objects in bulk
  696. template_name: The name of the template
  697. """
  698. queryset = None
  699. filterset = None
  700. table = None
  701. form = None
  702. template_name = 'utilities/obj_bulk_edit.html'
  703. def get_required_permission(self):
  704. return get_permission_for_model(self.queryset.model, 'change')
  705. def get(self, request):
  706. return redirect(self.get_return_url(request))
  707. def post(self, request, **kwargs):
  708. logger = logging.getLogger('netbox.views.BulkEditView')
  709. model = self.queryset.model
  710. # If we are editing *all* objects in the queryset, replace the PK list with all matched objects.
  711. if request.POST.get('_all') and self.filterset is not None:
  712. pk_list = [
  713. obj.pk for obj in self.filterset(request.GET, self.queryset.only('pk')).qs
  714. ]
  715. else:
  716. pk_list = request.POST.getlist('pk')
  717. if '_apply' in request.POST:
  718. form = self.form(model, request.POST)
  719. restrict_form_fields(form, request.user)
  720. if form.is_valid():
  721. logger.debug("Form validation was successful")
  722. custom_fields = form.custom_fields if hasattr(form, 'custom_fields') else []
  723. standard_fields = [
  724. field for field in form.fields if field not in custom_fields + ['pk']
  725. ]
  726. nullified_fields = request.POST.getlist('_nullify')
  727. try:
  728. with transaction.atomic():
  729. updated_objects = []
  730. for obj in self.queryset.filter(pk__in=form.cleaned_data['pk']):
  731. # Update standard fields. If a field is listed in _nullify, delete its value.
  732. for name in standard_fields:
  733. try:
  734. model_field = model._meta.get_field(name)
  735. except FieldDoesNotExist:
  736. # This form field is used to modify a field rather than set its value directly
  737. model_field = None
  738. # Handle nullification
  739. if name in form.nullable_fields and name in nullified_fields:
  740. if isinstance(model_field, ManyToManyField):
  741. getattr(obj, name).set([])
  742. else:
  743. setattr(obj, name, None if model_field.null else '')
  744. # ManyToManyFields
  745. elif isinstance(model_field, ManyToManyField):
  746. if form.cleaned_data[name].count() > 0:
  747. getattr(obj, name).set(form.cleaned_data[name])
  748. # Normal fields
  749. elif form.cleaned_data[name] not in (None, ''):
  750. setattr(obj, name, form.cleaned_data[name])
  751. obj.full_clean()
  752. obj.save()
  753. updated_objects.append(obj)
  754. logger.debug(f"Saved {obj} (PK: {obj.pk})")
  755. # Update custom fields
  756. obj_type = ContentType.objects.get_for_model(model)
  757. for name in custom_fields:
  758. field = form.fields[name].model
  759. if name in form.nullable_fields and name in nullified_fields:
  760. CustomFieldValue.objects.filter(
  761. field=field, obj_type=obj_type, obj_id=obj.pk
  762. ).delete()
  763. elif form.cleaned_data[name] not in [None, '']:
  764. try:
  765. cfv = CustomFieldValue.objects.get(
  766. field=field, obj_type=obj_type, obj_id=obj.pk
  767. )
  768. except CustomFieldValue.DoesNotExist:
  769. cfv = CustomFieldValue(
  770. field=field, obj_type=obj_type, obj_id=obj.pk
  771. )
  772. cfv.value = form.cleaned_data[name]
  773. cfv.save()
  774. logger.debug(f"Saved custom fields for {obj} (PK: {obj.pk})")
  775. # Add/remove tags
  776. if form.cleaned_data.get('add_tags', None):
  777. obj.tags.add(*form.cleaned_data['add_tags'])
  778. if form.cleaned_data.get('remove_tags', None):
  779. obj.tags.remove(*form.cleaned_data['remove_tags'])
  780. # Enforce object-level permissions
  781. if self.queryset.filter(pk__in=[obj.pk for obj in updated_objects]).count() != len(updated_objects):
  782. raise ObjectDoesNotExist
  783. if updated_objects:
  784. msg = 'Updated {} {}'.format(len(updated_objects), model._meta.verbose_name_plural)
  785. logger.info(msg)
  786. messages.success(self.request, msg)
  787. return redirect(self.get_return_url(request))
  788. except ValidationError as e:
  789. messages.error(self.request, "{} failed validation: {}".format(obj, e))
  790. except ObjectDoesNotExist:
  791. msg = "Object update failed due to object-level permissions violation"
  792. logger.debug(msg)
  793. form.add_error(None, msg)
  794. else:
  795. logger.debug("Form validation failed")
  796. else:
  797. # Include the PK list as initial data for the form
  798. initial_data = {'pk': pk_list}
  799. # Check for other contextual data needed for the form. We avoid passing all of request.GET because the
  800. # filter values will conflict with the bulk edit form fields.
  801. # TODO: Find a better way to accomplish this
  802. if 'device' in request.GET:
  803. initial_data['device'] = request.GET.get('device')
  804. elif 'device_type' in request.GET:
  805. initial_data['device_type'] = request.GET.get('device_type')
  806. form = self.form(model, initial=initial_data)
  807. restrict_form_fields(form, request.user)
  808. # Retrieve objects being edited
  809. table = self.table(self.queryset.filter(pk__in=pk_list), orderable=False)
  810. if not table.rows:
  811. messages.warning(request, "No {} were selected.".format(model._meta.verbose_name_plural))
  812. return redirect(self.get_return_url(request))
  813. return render(request, self.template_name, {
  814. 'form': form,
  815. 'table': table,
  816. 'obj_type_plural': model._meta.verbose_name_plural,
  817. 'return_url': self.get_return_url(request),
  818. })
  819. class BulkRenameView(GetReturnURLMixin, ObjectPermissionRequiredMixin, View):
  820. """
  821. An extendable view for renaming objects in bulk.
  822. """
  823. queryset = None
  824. template_name = 'utilities/obj_bulk_rename.html'
  825. def __init__(self, *args, **kwargs):
  826. super().__init__(*args, **kwargs)
  827. # Create a new Form class from BulkRenameForm
  828. class _Form(BulkRenameForm):
  829. pk = ModelMultipleChoiceField(
  830. queryset=self.queryset,
  831. widget=MultipleHiddenInput()
  832. )
  833. self.form = _Form
  834. def get_required_permission(self):
  835. return get_permission_for_model(self.queryset.model, 'change')
  836. def post(self, request):
  837. logger = logging.getLogger('netbox.views.BulkRenameView')
  838. if '_preview' in request.POST or '_apply' in request.POST:
  839. form = self.form(request.POST, initial={'pk': request.POST.getlist('pk')})
  840. selected_objects = self.queryset.filter(pk__in=form.initial['pk'])
  841. if form.is_valid():
  842. try:
  843. with transaction.atomic():
  844. renamed_pks = []
  845. for obj in selected_objects:
  846. find = form.cleaned_data['find']
  847. replace = form.cleaned_data['replace']
  848. if form.cleaned_data['use_regex']:
  849. try:
  850. obj.new_name = re.sub(find, replace, obj.name)
  851. # Catch regex group reference errors
  852. except re.error:
  853. obj.new_name = obj.name
  854. else:
  855. obj.new_name = obj.name.replace(find, replace)
  856. renamed_pks.append(obj.pk)
  857. if '_apply' in request.POST:
  858. for obj in selected_objects:
  859. obj.name = obj.new_name
  860. obj.save()
  861. # Enforce constrained permissions
  862. if self.queryset.filter(pk__in=renamed_pks).count() != len(selected_objects):
  863. raise ObjectDoesNotExist
  864. messages.success(request, "Renamed {} {}".format(
  865. len(selected_objects),
  866. self.queryset.model._meta.verbose_name_plural
  867. ))
  868. return redirect(self.get_return_url(request))
  869. except ObjectDoesNotExist:
  870. msg = "Object update failed due to object-level permissions violation"
  871. logger.debug(msg)
  872. form.add_error(None, msg)
  873. else:
  874. form = self.form(initial={'pk': request.POST.getlist('pk')})
  875. selected_objects = self.queryset.filter(pk__in=form.initial['pk'])
  876. return render(request, self.template_name, {
  877. 'form': form,
  878. 'obj_type_plural': self.queryset.model._meta.verbose_name_plural,
  879. 'selected_objects': selected_objects,
  880. 'return_url': self.get_return_url(request),
  881. })
  882. class BulkDeleteView(GetReturnURLMixin, ObjectPermissionRequiredMixin, View):
  883. """
  884. Delete objects in bulk.
  885. queryset: Custom queryset to use when retrieving objects (e.g. to select related objects)
  886. filter: FilterSet to apply when deleting by QuerySet
  887. table: The table used to display devices being deleted
  888. form: The form class used to delete objects in bulk
  889. template_name: The name of the template
  890. """
  891. queryset = None
  892. filterset = None
  893. table = None
  894. form = None
  895. template_name = 'utilities/obj_bulk_delete.html'
  896. def get_required_permission(self):
  897. return get_permission_for_model(self.queryset.model, 'delete')
  898. def get(self, request):
  899. return redirect(self.get_return_url(request))
  900. def post(self, request, **kwargs):
  901. logger = logging.getLogger('netbox.views.BulkDeleteView')
  902. model = self.queryset.model
  903. # Are we deleting *all* objects in the queryset or just a selected subset?
  904. if request.POST.get('_all'):
  905. if self.filterset is not None:
  906. pk_list = [obj.pk for obj in self.filterset(request.GET, model.objects.only('pk')).qs]
  907. else:
  908. pk_list = model.objects.values_list('pk', flat=True)
  909. else:
  910. pk_list = [int(pk) for pk in request.POST.getlist('pk')]
  911. form_cls = self.get_form()
  912. if '_confirm' in request.POST:
  913. form = form_cls(request.POST)
  914. if form.is_valid():
  915. logger.debug("Form validation was successful")
  916. # Delete objects
  917. queryset = self.queryset.filter(pk__in=pk_list)
  918. try:
  919. deleted_count = queryset.delete()[1][model._meta.label]
  920. except ProtectedError as e:
  921. logger.info("Caught ProtectedError while attempting to delete objects")
  922. handle_protectederror(list(queryset), request, e)
  923. return redirect(self.get_return_url(request))
  924. msg = 'Deleted {} {}'.format(deleted_count, model._meta.verbose_name_plural)
  925. logger.info(msg)
  926. messages.success(request, msg)
  927. return redirect(self.get_return_url(request))
  928. else:
  929. logger.debug("Form validation failed")
  930. else:
  931. form = form_cls(initial={
  932. 'pk': pk_list,
  933. 'return_url': self.get_return_url(request),
  934. })
  935. # Retrieve objects being deleted
  936. table = self.table(self.queryset.filter(pk__in=pk_list), orderable=False)
  937. if not table.rows:
  938. messages.warning(request, "No {} were selected for deletion.".format(model._meta.verbose_name_plural))
  939. return redirect(self.get_return_url(request))
  940. return render(request, self.template_name, {
  941. 'form': form,
  942. 'obj_type_plural': model._meta.verbose_name_plural,
  943. 'table': table,
  944. 'return_url': self.get_return_url(request),
  945. })
  946. def get_form(self):
  947. """
  948. Provide a standard bulk delete form if none has been specified for the view
  949. """
  950. class BulkDeleteForm(ConfirmationForm):
  951. pk = ModelMultipleChoiceField(queryset=self.queryset, widget=MultipleHiddenInput)
  952. if self.form:
  953. return self.form
  954. return BulkDeleteForm
  955. #
  956. # Device/VirtualMachine components
  957. #
  958. # TODO: Replace with BulkCreateView
  959. class ComponentCreateView(GetReturnURLMixin, ObjectPermissionRequiredMixin, View):
  960. """
  961. Add one or more components (e.g. interfaces, console ports, etc.) to a Device or VirtualMachine.
  962. """
  963. queryset = None
  964. form = None
  965. model_form = None
  966. template_name = None
  967. def get_required_permission(self):
  968. return get_permission_for_model(self.queryset.model, 'add')
  969. def get(self, request):
  970. form = self.form(initial=request.GET)
  971. return render(request, self.template_name, {
  972. 'component_type': self.queryset.model._meta.verbose_name,
  973. 'form': form,
  974. 'return_url': self.get_return_url(request),
  975. })
  976. def post(self, request):
  977. logger = logging.getLogger('netbox.views.ComponentCreateView')
  978. form = self.form(request.POST, initial=request.GET)
  979. if form.is_valid():
  980. new_components = []
  981. data = deepcopy(request.POST)
  982. names = form.cleaned_data['name_pattern']
  983. labels = form.cleaned_data.get('label_pattern')
  984. for i, name in enumerate(names):
  985. label = labels[i] if labels else None
  986. # Initialize the individual component form
  987. data['name'] = name
  988. data['label'] = label
  989. if hasattr(form, 'get_iterative_data'):
  990. data.update(form.get_iterative_data(i))
  991. component_form = self.model_form(data)
  992. if component_form.is_valid():
  993. new_components.append(component_form)
  994. else:
  995. for field, errors in component_form.errors.as_data().items():
  996. # Assign errors on the child form's name/label field to name_pattern/label_pattern on the parent form
  997. if field == 'name':
  998. field = 'name_pattern'
  999. elif field == 'label':
  1000. field = 'label_pattern'
  1001. for e in errors:
  1002. form.add_error(field, '{}: {}'.format(name, ', '.join(e)))
  1003. if not form.errors:
  1004. try:
  1005. with transaction.atomic():
  1006. # Create the new components
  1007. new_objs = []
  1008. for component_form in new_components:
  1009. obj = component_form.save()
  1010. new_objs.append(obj)
  1011. # Enforce object-level permissions
  1012. if self.queryset.filter(pk__in=[obj.pk for obj in new_objs]).count() != len(new_objs):
  1013. raise ObjectDoesNotExist
  1014. messages.success(request, "Added {} {}".format(
  1015. len(new_components), self.queryset.model._meta.verbose_name_plural
  1016. ))
  1017. if '_addanother' in request.POST:
  1018. return redirect(request.get_full_path())
  1019. elif 'device_type' in form.cleaned_data:
  1020. return redirect(form.cleaned_data['device_type'].get_absolute_url())
  1021. elif 'device' in form.cleaned_data:
  1022. return redirect(form.cleaned_data['device'].get_absolute_url())
  1023. else:
  1024. return redirect(self.get_return_url(request))
  1025. except ObjectDoesNotExist:
  1026. msg = "Component creation failed due to object-level permissions violation"
  1027. logger.debug(msg)
  1028. form.add_error(None, msg)
  1029. return render(request, self.template_name, {
  1030. 'component_type': self.queryset.model._meta.verbose_name,
  1031. 'form': form,
  1032. 'return_url': self.get_return_url(request),
  1033. })
  1034. class BulkComponentCreateView(GetReturnURLMixin, ObjectPermissionRequiredMixin, View):
  1035. """
  1036. Add one or more components (e.g. interfaces, console ports, etc.) to a set of Devices or VirtualMachines.
  1037. """
  1038. parent_model = None
  1039. parent_field = None
  1040. form = None
  1041. queryset = None
  1042. model_form = None
  1043. filterset = None
  1044. table = None
  1045. template_name = 'utilities/obj_bulk_add_component.html'
  1046. def get_required_permission(self):
  1047. return f'dcim.add_{self.queryset.model._meta.model_name}'
  1048. def post(self, request):
  1049. logger = logging.getLogger('netbox.views.BulkComponentCreateView')
  1050. parent_model_name = self.parent_model._meta.verbose_name_plural
  1051. model_name = self.queryset.model._meta.verbose_name_plural
  1052. # Are we editing *all* objects in the queryset or just a selected subset?
  1053. if request.POST.get('_all') and self.filterset is not None:
  1054. pk_list = [obj.pk for obj in self.filterset(request.GET, self.parent_model.objects.only('pk')).qs]
  1055. else:
  1056. pk_list = [int(pk) for pk in request.POST.getlist('pk')]
  1057. selected_objects = self.parent_model.objects.filter(pk__in=pk_list)
  1058. if not selected_objects:
  1059. messages.warning(request, "No {} were selected.".format(self.parent_model._meta.verbose_name_plural))
  1060. return redirect(self.get_return_url(request))
  1061. table = self.table(selected_objects)
  1062. if '_create' in request.POST:
  1063. form = self.form(request.POST)
  1064. if form.is_valid():
  1065. logger.debug("Form validation was successful")
  1066. new_components = []
  1067. data = deepcopy(form.cleaned_data)
  1068. try:
  1069. with transaction.atomic():
  1070. for obj in data['pk']:
  1071. names = data['name_pattern']
  1072. labels = data['label_pattern']
  1073. for i, name in enumerate(names):
  1074. label = labels[i] if labels else None
  1075. component_data = {
  1076. self.parent_field: obj.pk,
  1077. 'name': name,
  1078. 'label': label
  1079. }
  1080. component_data.update(data)
  1081. component_form = self.model_form(component_data)
  1082. if component_form.is_valid():
  1083. instance = component_form.save()
  1084. logger.debug(f"Created {instance} on {instance.parent}")
  1085. new_components.append(instance)
  1086. else:
  1087. for field, errors in component_form.errors.as_data().items():
  1088. for e in errors:
  1089. form.add_error(field, '{} {}: {}'.format(obj, name, ', '.join(e)))
  1090. # Enforce object-level permissions
  1091. if self.queryset.filter(pk__in=[obj.pk for obj in new_components]).count() != len(new_components):
  1092. raise ObjectDoesNotExist
  1093. except IntegrityError:
  1094. pass
  1095. except ObjectDoesNotExist:
  1096. msg = "Component creation failed due to object-level permissions violation"
  1097. logger.debug(msg)
  1098. form.add_error(None, msg)
  1099. if not form.errors:
  1100. msg = "Added {} {} to {} {}.".format(
  1101. len(new_components),
  1102. model_name,
  1103. len(form.cleaned_data['pk']),
  1104. parent_model_name
  1105. )
  1106. logger.info(msg)
  1107. messages.success(request, msg)
  1108. return redirect(self.get_return_url(request))
  1109. else:
  1110. logger.debug("Form validation failed")
  1111. else:
  1112. form = self.form(initial={'pk': pk_list})
  1113. return render(request, self.template_name, {
  1114. 'form': form,
  1115. 'parent_model_name': parent_model_name,
  1116. 'model_name': model_name,
  1117. 'table': table,
  1118. 'return_url': self.get_return_url(request),
  1119. })
  1120. @requires_csrf_token
  1121. def server_error(request, template_name=ERROR_500_TEMPLATE_NAME):
  1122. """
  1123. Custom 500 handler to provide additional context when rendering 500.html.
  1124. """
  1125. try:
  1126. template = loader.get_template(template_name)
  1127. except TemplateDoesNotExist:
  1128. return HttpResponseServerError('<h1>Server Error (500)</h1>', content_type='text/html')
  1129. type_, error, traceback = sys.exc_info()
  1130. return HttpResponseServerError(template.render({
  1131. 'exception': str(type_),
  1132. 'error': error,
  1133. }))