oxidized 0.32.0 → 0.33.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (57) hide show
  1. checksums.yaml +4 -4
  2. data/.github/ISSUE_TEMPLATE/bug_report.md +42 -0
  3. data/.github/ISSUE_TEMPLATE/feature_request.md +22 -0
  4. data/.github/ISSUE_TEMPLATE/support-request.md +36 -0
  5. data/.github/workflows/publishdocker.yml +35 -16
  6. data/.github/workflows/ruby.yml +0 -6
  7. data/.gitignore +1 -0
  8. data/.rubocop.yml +5 -5
  9. data/.rubocop_todo.yml +5 -31
  10. data/CHANGELOG.md +60 -0
  11. data/CONTRIBUTING.md +10 -7
  12. data/Dockerfile +37 -64
  13. data/README.md +4 -95
  14. data/Rakefile +8 -9
  15. data/docs/Configuration.md +139 -27
  16. data/docs/Docker.md +240 -0
  17. data/docs/Issues.md +17 -0
  18. data/docs/Model-Notes/EatonNetwork.md +18 -0
  19. data/docs/Model-Notes/HPEAruba.md +3 -2
  20. data/docs/Release.md +21 -3
  21. data/docs/Supported-OS-Types.md +3 -0
  22. data/docs/Troubleshooting.md +6 -1
  23. data/extra/rest_client.rb +1 -1
  24. data/lib/oxidized/config/vars.rb +18 -14
  25. data/lib/oxidized/config.rb +3 -1
  26. data/lib/oxidized/core.rb +26 -5
  27. data/lib/oxidized/input/http.rb +1 -1
  28. data/lib/oxidized/model/aos7.rb +3 -0
  29. data/lib/oxidized/model/eatonnetwork.rb +65 -0
  30. data/lib/oxidized/model/fortios.rb +3 -3
  31. data/lib/oxidized/model/ingate.rb +47 -0
  32. data/lib/oxidized/model/ios.rb +1 -0
  33. data/lib/oxidized/model/netgear.rb +6 -0
  34. data/lib/oxidized/model/powerconnect.rb +32 -11
  35. data/lib/oxidized/model/srosmd.rb +1 -1
  36. data/lib/oxidized/model/unifiap.rb +142 -0
  37. data/lib/oxidized/output/git.rb +82 -32
  38. data/lib/oxidized/output/gitcrypt.rb +3 -0
  39. data/lib/oxidized/version.rb +6 -4
  40. data/lib/oxidized/worker.rb +2 -5
  41. data/lib/refinements.rb +2 -0
  42. data/oxidized.gemspec +19 -11
  43. metadata +41 -63
  44. data/examples/podman-compose/Makefile +0 -103
  45. data/examples/podman-compose/README.md +0 -94
  46. data/examples/podman-compose/docker-compose.yml +0 -30
  47. data/examples/podman-compose/gitserver/.gitignore +0 -1
  48. data/examples/podman-compose/gitserver/Dockerfile +0 -14
  49. data/examples/podman-compose/model-simulation/Dockerfile-model +0 -13
  50. data/examples/podman-compose/model-simulation/asternos.sh +0 -36
  51. data/examples/podman-compose/oxidized-config/.gitignore +0 -10
  52. data/examples/podman-compose/oxidized-config/config +0 -46
  53. data/examples/podman-compose/oxidized-config/config_csv-file +0 -46
  54. data/examples/podman-compose/oxidized-config/config_csv-gitserver +0 -56
  55. data/examples/podman-compose/oxidized-config/router.db +0 -1
  56. data/examples/podman-compose/oxidized-ssh/.gitignore +0 -1
  57. data/examples/podman-compose/oxidized-ssh/README.md +0 -14
@@ -1,94 +0,0 @@
1
- # Running Oxidized with podman-compose
2
- This example demonstrates running Oxidized within an OCI container using
3
- podman-compose. It’s actively used in Oxidized development to validate the
4
- container’s functionality and to simulate potential issues.
5
-
6
- While this example uses podman and podman-compose, it should also be compatible
7
- with docker, as podman supports docker’s CLI.
8
-
9
- To make this example work seamlessly, a simulated network device is included.
10
- The asternos model is used here for simplicity, as it requires minimal commands
11
- to implement. The simulated output doesn’t replicate real device responses but
12
- provides changing lines over time to test Oxidized’s functionality.
13
-
14
-
15
- The example also provides a Git server to test the interaction with it.
16
-
17
- # Run the example
18
- > :warning: the example builds local containers and will require at least 2 GB
19
- > of disk space along with some CPU and time during the first run.
20
-
21
- To start the example, simply run `make start`. Ensure you have installed the
22
- necessary [dependencies](#dependencies) before.
23
-
24
- To stop, press `CTRL-C` or run `make stop` in a separate shell. If you exit
25
- with `CTRL-C`, make sure to run `make stop` afterward to properly clean up the
26
- environment.
27
-
28
- ## Running Environment
29
- This example of oxidized with podman-compose is running on Debian
30
- Bookworm (Version 12). It should work with few adaptations on any Linux
31
- box running podman, and maybe also with docker.
32
-
33
- ## Dependencies
34
- To get started, install the required packages on your Debian system:
35
- ```shell
36
- sudo apt install podman containers-storage podman-compose make
37
- ```
38
-
39
- Ensure Podman is using the overlay driver for image storage.
40
- Without this driver, Podman may save every container layer separately rather
41
- than only the changes, which can quickly consume disk space.
42
-
43
- This issue can occur if podman was run before installing the
44
- `container-storage` package.
45
-
46
- ```shell
47
- podman info | grep graphDriverName
48
- ```
49
-
50
- You should get this reply
51
- ```shell
52
- graphDriverName: overlay
53
- ```
54
-
55
- If not, the quick way I found to solve it is to delete `~/.local/share/containers/`.
56
- Beware - this will delete **all** your containers!
57
-
58
- ## Adapting to your needs
59
- Feel free to customize this setup as you wish! You may want to edit
60
- `docker-compose.yml` to remove any containers simulating specific components.
61
-
62
- ## Use your own oxidized configuration in the git repository
63
- When developing oxidized or testing the container, you may want to use a custom
64
- configuration. This can be done by saving it under `oxidized-config/config.local`
65
-
66
- `make start-local` will recognize the local configuration and copy it to
67
- `oxidized-config/config` before starting the container.
68
-
69
- You should stop the container with `make stop-local` in order to restore the
70
- original configuration from the git repository.
71
-
72
- In the folder `oxidized-config/, you will also find some example configs,
73
- for example `config_csv-gitserver`. To use them, just copy the file to `config`.
74
-
75
- ## Git server public keys
76
- To enable Oxidized to access the Git server, you'll need to retrieve the
77
- servers' public SSH keys and store them under `oxidized-ssh/known_hosts`.
78
- Without this, you will encounter the following error:
79
-
80
- ```
81
- ERROR -- : Hook push_to_remote (#<GithubRepo:0x00007f4cff47d918>) failed (#<Rugged::SshError: invalid or unknown remote ssh hostkey>) for event :post_store
82
- ```
83
-
84
- While the container environment is running (`make start`), open a separate shell
85
- and run:
86
- ```
87
- make gitserver-getkey
88
- ```
89
-
90
- You do not need to restart the container environment; Oxidized will
91
- automatically use the key the next time it pushes to the remote Git repository.
92
-
93
-
94
-
@@ -1,30 +0,0 @@
1
- services:
2
- oxidized:
3
- # Choose the image that you want to test
4
- # image: docker.io/oxidized/oxidized:0.30.1
5
- # image: docker.io/oxidized/oxidized:latest
6
- # local/oxidized is build by "make oxidized-image" and "make run"
7
- image: local/oxidized
8
- ports:
9
- - 127.0.0.1:8042:8888/tcp
10
- environment:
11
- # Reload hosts list once per day
12
- CONFIG_RELOAD_INTERVAL: 86400
13
- # Needed when you push to a remote git repository
14
- OXIDIZED_SSH_PASSPHRASE: xxxxPassphasexxxx
15
- volumes:
16
- - ./oxidized-config:/home/oxidized/.config/oxidized
17
- - ./oxidized-ssh:/home/oxidized/.ssh
18
-
19
- # This is a simulated network device for the example to work out of the box
20
- asternos-device:
21
- image: localhost/local/model
22
- volumes:
23
- - ./model-simulation/asternos.sh:/home/oxidized/.profile
24
- - ./model-simulation/asternos.sh:/home/admin/.profile
25
-
26
- # This is a gitserver to push our configs
27
- gitserver:
28
- image: localhost/local/gitserver
29
- volumes:
30
- - ./gitserver/repo.git:/home/git/repo.git
@@ -1 +0,0 @@
1
- repo.git
@@ -1,14 +0,0 @@
1
- FROM docker.io/phusion/baseimage:noble-1.0.0
2
-
3
- # Use baseimage-docker's init system.
4
- CMD ["/sbin/my_init"]
5
-
6
- # enable ssh
7
- RUN rm -f /etc/service/sshd/down
8
- RUN /etc/my_init.d/00_regen_ssh_host_keys.sh
9
-
10
- # Add user for the gitserver. The password is "git"
11
- RUN useradd -m git -p '$6$32WDb0LTFyQkLffy$u15COVx7CQ4tgp4JT4DO4LJ96q/jwFSpuZC3WrllNQDNa6nW1LhJKW9rLV57ak3rj9Ln./aRA85jzeof1B0Gi1' -s /bin/bash -u 30001
12
-
13
- # And install git
14
- RUN install_clean git
@@ -1,13 +0,0 @@
1
- FROM docker.io/phusion/baseimage:noble-1.0.0
2
-
3
- # Use baseimage-docker's init system.
4
- CMD ["/sbin/my_init"]
5
-
6
- # enable ssh
7
- RUN rm -f /etc/service/sshd/down
8
- RUN /etc/my_init.d/00_regen_ssh_host_keys.sh
9
-
10
- # Add users to login. The password is "oxidized"
11
- RUN useradd -m oxidized -p '$y$j9T$UoDYxDiE.8iBGmoaD/acn1$kVvYvoEIJdKUmIKFVBRYKLIVzmEBP1RKrCM6Vfx.V55' -s /bin/bash
12
- RUN useradd -m admin -p '$y$j9T$UoDYxDiE.8iBGmoaD/acn1$kVvYvoEIJdKUmIKFVBRYKLIVzmEBP1RKrCM6Vfx.V55' -s /bin/bash
13
-
@@ -1,36 +0,0 @@
1
- # if running bash
2
- if [ -n "$BASH_VERSION" ]; then
3
- # include .bashrc if it exists
4
- if [ -f "$HOME/.bashrc" ]; then
5
- . "$HOME/.bashrc"
6
- fi
7
- fi
8
-
9
- # Display a MOTD
10
- cat << EOF
11
- This is the welcome message of this device
12
- it is muliline
13
- End of the MOTD
14
- EOF
15
-
16
- function show() {
17
- if [ "$*" == "version" ]; then
18
- echo "Version 1.2.3"
19
- # Make the output change over time
20
- date
21
- elif [ "$*" == "runningconfiguration all" ]; then
22
- cat << EOF
23
- ! begin of the configuration
24
- ! this is the running config
25
- !
26
- I have no idea how a configuration in asternos looks like ;-)
27
- !
28
- ! End of the Configuration
29
- EOF
30
- else
31
- echo "command 'show $*' not implemented"
32
- fi
33
- }
34
-
35
- PS1="asternos$"
36
-
@@ -1,10 +0,0 @@
1
- # Ignore local configurations, which will override the git config
2
- config.local
3
- router.db.local
4
-
5
- # Ignore logs, retrieved configs...
6
- pid
7
- configs/
8
- crash
9
- logs/
10
- oxidized.git/
@@ -1,46 +0,0 @@
1
- ---
2
- username: oxidized
3
- password: oxidized
4
- resolve_dns: true
5
- interval: 3600
6
- use_syslog: false
7
- debug: false
8
- threads: 30
9
- use_max_threads: true
10
- timeout: 20
11
- retries: 3
12
- prompt: !ruby/regexp /^([\w.@-]+[#>]\s?)$/
13
- rest: 0.0.0.0:8888
14
- next_adds_job: false
15
- vars: {}
16
- groups: {}
17
- group_map: {}
18
- models: {}
19
- pid: "~/.config/oxidized/pid"
20
- crash:
21
- directory: "~/.config/oxidized/crashes"
22
- hostnames: false
23
- stats:
24
- history_size: 10
25
- input:
26
- default: ssh
27
- debug: false
28
- ssh:
29
- secure: false
30
- ftp:
31
- passive: true
32
- utf8_encoded: true
33
- output:
34
- default: file
35
- file:
36
- directory: "~/.config/oxidized/configs/"
37
- source:
38
- default: csv
39
- csv:
40
- file: "~/.config/oxidized/router.db"
41
- delimiter: !ruby/regexp /:/
42
- map:
43
- name: 0
44
- model: 1
45
- ip: 2
46
- gpg: false
@@ -1,46 +0,0 @@
1
- ---
2
- username: oxidized
3
- password: oxidized
4
- resolve_dns: true
5
- interval: 3600
6
- use_syslog: false
7
- debug: false
8
- threads: 30
9
- use_max_threads: true
10
- timeout: 20
11
- retries: 3
12
- prompt: !ruby/regexp /^([\w.@-]+[#>]\s?)$/
13
- rest: 0.0.0.0:8888
14
- next_adds_job: false
15
- vars: {}
16
- groups: {}
17
- group_map: {}
18
- models: {}
19
- pid: "~/.config/oxidized/pid"
20
- crash:
21
- directory: "~/.config/oxidized/crashes"
22
- hostnames: false
23
- stats:
24
- history_size: 10
25
- input:
26
- default: ssh
27
- debug: false
28
- ssh:
29
- secure: false
30
- ftp:
31
- passive: true
32
- utf8_encoded: true
33
- output:
34
- default: file
35
- file:
36
- directory: "~/.config/oxidized/configs/"
37
- source:
38
- default: csv
39
- csv:
40
- file: "~/.config/oxidized/router.db"
41
- delimiter: !ruby/regexp /:/
42
- map:
43
- name: 0
44
- model: 1
45
- ip: 2
46
- gpg: false
@@ -1,56 +0,0 @@
1
- ---
2
- username: oxidized
3
- password: oxidized
4
- resolve_dns: true
5
- interval: 3600
6
- use_syslog: false
7
- debug: false
8
- threads: 30
9
- use_max_threads: true
10
- timeout: 20
11
- retries: 3
12
- prompt: !ruby/regexp /^([\w.@-]+[#>]\s?)$/
13
- rest: 0.0.0.0:8888
14
- next_adds_job: false
15
- vars: {}
16
- groups: {}
17
- group_map: {}
18
- models: {}
19
- pid: "~/.config/oxidized/pid"
20
- crash:
21
- directory: "~/.config/oxidized/crashes"
22
- hostnames: false
23
- stats:
24
- history_size: 10
25
- input:
26
- default: ssh
27
- debug: false
28
- ssh:
29
- secure: false
30
- ftp:
31
- passive: true
32
- utf8_encoded: true
33
- output:
34
- default: git
35
- git:
36
- user: Oxidized
37
- email: o@example.com
38
- repo: "~/.config/oxidized/oxidized.git"
39
- source:
40
- default: csv
41
- csv:
42
- file: "~/.config/oxidized/router.db"
43
- delimiter: !ruby/regexp /:/
44
- map:
45
- name: 0
46
- model: 1
47
- ip: 2
48
- gpg: false
49
- hooks:
50
- push_to_remote:
51
- type: githubrepo
52
- events:
53
- - post_store
54
- remote_repo: git@gitserver:repo.git
55
- username: git
56
- password: git
@@ -1 +0,0 @@
1
- asternos-device:asternos
@@ -1 +0,0 @@
1
- known_hosts
@@ -1,14 +0,0 @@
1
- This is `~/.ssh/` of the user oxidized inside the oxidized container.
2
-
3
- ## What you need here for the hook githubrepo
4
- You can store the SSH key needed to access a remote Git repository here. Here is
5
- an example how to generate this key.
6
- ```shell
7
- ssh-keygen -q -t ed25519 -C "Oxidized Push Key@`hostname`" -N "YOURPASSPHRASE" -m PEM -f oxidized-key
8
- ```
9
-
10
- You also need to store the public keys of the remote git server in known_hosts. If you do not,
11
- oxidized will refuse to push to the remote Git with the error `#<Rugged::SshError: invalid or unknown remote ssh hostkey>`, see Issue #2753.
12
- ```shell
13
- ssh-keyscan git-server.example.com > known_hosts
14
- ```