netbox-agent/netbox_agent/ipmi.py

78 lines
2.3 KiB
Python
Raw Normal View History

import logging
import subprocess
from netaddr import IPNetwork
2024-10-21 12:55:54 +02:00
class IPMI:
"""
Parse IPMI output
ie:
Set in Progress : Set Complete
Auth Type Support :
Auth Type Enable : Callback :
: User :
: Operator :
: Admin :
: OEM :
IP Address Source : DHCP Address
IP Address : 10.192.2.1
Subnet Mask : 255.255.240.0
MAC Address : 98:f2:b3:f0:ee:1e
SNMP Community String :
BMC ARP Control : ARP Responses Enabled, Gratuitous ARP Disabled
Default Gateway IP : 10.192.2.254
802.1q VLAN ID : Disabled
802.1q VLAN Priority : 0
RMCP+ Cipher Suites : 0,1,2,3
Cipher Suite Priv Max : XuuaXXXXXXXXXXX
: X=Cipher Suite Unused
: c=CALLBACK
: u=USER
: o=OPERATOR
: a=ADMIN
: O=OEM
Bad Password Threshold : Not Available
"""
2020-02-02 20:08:56 +01:00
def __init__(self):
2024-10-21 12:55:54 +02:00
self.ret, self.output = subprocess.getstatusoutput("ipmitool lan print")
if self.ret != 0:
2024-10-21 12:55:54 +02:00
logging.error("Cannot get ipmi info: {}".format(self.output))
def parse(self):
_ipmi = {}
if self.ret != 0:
return _ipmi
for line in self.output.splitlines():
2024-10-21 12:55:54 +02:00
key = line.split(":")[0].strip()
if key not in [
"802.1q VLAN ID",
"IP Address",
"Subnet Mask",
"MAC Address",
]:
continue
2024-10-21 12:55:54 +02:00
value = ":".join(line.split(":")[1:]).strip()
_ipmi[key] = value
ret = {}
2024-10-21 12:55:54 +02:00
ret["name"] = "IPMI"
ret["mtu"] = 1500
2024-10-21 12:55:54 +02:00
ret["bonding"] = False
ret["mac"] = _ipmi["MAC Address"]
ret["vlan"] = (
int(_ipmi["802.1q VLAN ID"])
if _ipmi["802.1q VLAN ID"] != "Disabled"
else None
)
ip = _ipmi["IP Address"]
netmask = _ipmi["Subnet Mask"]
address = str(IPNetwork("{}/{}".format(ip, netmask)))
2024-10-21 12:55:54 +02:00
ret["ip"] = [address]
ret["ipmi"] = True
return ret