content
stringlengths
7
1.05M
fixed_cases
stringlengths
1
1.28M
num = int(raw_input("Enter a number: ")) fact=1; for i in range(num ,1,-1): fact *= i print(fact)
num = int(raw_input('Enter a number: ')) fact = 1 for i in range(num, 1, -1): fact *= i print(fact)
n=int(input());r=0;k=2 n*=2 while n>=k: r+=k*(n//k-n//(2*k)) k*=2 print(r)
n = int(input()) r = 0 k = 2 n *= 2 while n >= k: r += k * (n // k - n // (2 * k)) k *= 2 print(r)
JINJA_FUNCTIONS = [] def add_jinja_global(arg=None): def decorator(func): JINJA_FUNCTIONS.append(func) return func if callable(arg): return decorator(arg) # return 'wrapper' else: return decorator # ... or 'decorator'
jinja_functions = [] def add_jinja_global(arg=None): def decorator(func): JINJA_FUNCTIONS.append(func) return func if callable(arg): return decorator(arg) else: return decorator
class Solution: def minPathSum(self, grid): ''' the first row each column equal the sum of itself with the previous colmuns. The same applied for the first column, the first column of each row equals the sume of itself with the previous ones in. ''' rows, cols = len(grid), len(grid[0]) for row in range(rows): for col in range(cols): if row == 0 and col == 0: continue elif row == 0: grid[0][col] += grid[0][col - 1] elif col == 0: grid[row][0] += grid[row - 1][0] else: grid[row][col] += min(grid[row - 1][col], grid[row][col - 1]) return grid[-1][-1]
class Solution: def min_path_sum(self, grid): """ the first row each column equal the sum of itself with the previous colmuns. The same applied for the first column, the first column of each row equals the sume of itself with the previous ones in. """ (rows, cols) = (len(grid), len(grid[0])) for row in range(rows): for col in range(cols): if row == 0 and col == 0: continue elif row == 0: grid[0][col] += grid[0][col - 1] elif col == 0: grid[row][0] += grid[row - 1][0] else: grid[row][col] += min(grid[row - 1][col], grid[row][col - 1]) return grid[-1][-1]
class Morton(object): def __init__(self, dimensions=2, bits=32): assert dimensions > 0, 'dimensions should be greater than zero' assert bits > 0, 'bits should be greater than zero' def flp2(x): '''Greatest power of 2 less than or equal to x, branch-free.''' x |= x >> 1 x |= x >> 2 x |= x >> 4 x |= x >> 8 x |= x >> 16 x |= x >> 32 x -= x >> 1 return x shift = flp2(dimensions * (bits - 1)) masks = [] lshifts = [] max_value = (1 << (shift*bits))-1 while shift > 0: mask = 0 shifted = 0 for bit in range(bits): distance = (dimensions * bit) - bit shifted |= shift & distance mask |= 1 << bit << (((shift - 1) ^ max_value) & distance) if shifted != 0: masks.append(mask) lshifts.append(shift) shift >>= 1 self.dimensions = dimensions self.bits = bits self.lshifts = [0] + lshifts self.rshifts = lshifts + [0] self.masks = [(1 << bits) - 1] + masks self._size = self.bits * self.dimensions def __repr__(self): return '<Morton dimensions={}, bits={}>'.format( self.dimensions, self.bits) def split(self, value): # type: (int) -> int masks = self.masks lshifts = self.lshifts for o in range(len(masks)): value = (value | (value << lshifts[o])) & masks[o] return value def compact(self, code): # type: (int) -> int masks = self.masks rshifts = self.rshifts for o in range(len(masks)-1, -1, -1): code = (code | (code >> rshifts[o])) & masks[o] return code def shift_sign(self, value): # type: (int) -> int assert not(value >= (1<<(self.bits-1)) or value <= -(1<<(self.bits-1))), (value, self.bits) if value < 0: value = -value value |= 1 << (self.bits - 1) return value def unshift_sign(self, value): # type: (int) -> int sign = value & (1 << (self.bits - 1)) value &= (1 << (self.bits - 1)) - 1 if sign != 0: value = -value return value def pack(self, *args): # type: (List[int]) -> int assert len(args) <= self.dimensions assert all([(v < (1 << self.bits)) and (v >= 0) for v in args]) code = 0 for i in range(self.dimensions): code |= self.split(args[i]) << i return code def unpack(self, code): # type: (int) -> List[int] values = [] for i in range(self.dimensions): values.append(self.compact(code >> i)) return values def spack(self, *args): # type: (List[int]) -> int code = self.pack(*map(self.shift_sign, args)) # convert from unsigned to signed return code if code < ((1 << self._size - 1) - 1) else code - (1 << self._size) def sunpack(self, code): # type: (int) -> List[int] values = self.unpack(code) return list(map(self.unshift_sign, values)) def __eq__(self, other): return ( self.dimensions == other.dimensions and self.bits == other.bits )
class Morton(object): def __init__(self, dimensions=2, bits=32): assert dimensions > 0, 'dimensions should be greater than zero' assert bits > 0, 'bits should be greater than zero' def flp2(x): """Greatest power of 2 less than or equal to x, branch-free.""" x |= x >> 1 x |= x >> 2 x |= x >> 4 x |= x >> 8 x |= x >> 16 x |= x >> 32 x -= x >> 1 return x shift = flp2(dimensions * (bits - 1)) masks = [] lshifts = [] max_value = (1 << shift * bits) - 1 while shift > 0: mask = 0 shifted = 0 for bit in range(bits): distance = dimensions * bit - bit shifted |= shift & distance mask |= 1 << bit << ((shift - 1 ^ max_value) & distance) if shifted != 0: masks.append(mask) lshifts.append(shift) shift >>= 1 self.dimensions = dimensions self.bits = bits self.lshifts = [0] + lshifts self.rshifts = lshifts + [0] self.masks = [(1 << bits) - 1] + masks self._size = self.bits * self.dimensions def __repr__(self): return '<Morton dimensions={}, bits={}>'.format(self.dimensions, self.bits) def split(self, value): masks = self.masks lshifts = self.lshifts for o in range(len(masks)): value = (value | value << lshifts[o]) & masks[o] return value def compact(self, code): masks = self.masks rshifts = self.rshifts for o in range(len(masks) - 1, -1, -1): code = (code | code >> rshifts[o]) & masks[o] return code def shift_sign(self, value): assert not (value >= 1 << self.bits - 1 or value <= -(1 << self.bits - 1)), (value, self.bits) if value < 0: value = -value value |= 1 << self.bits - 1 return value def unshift_sign(self, value): sign = value & 1 << self.bits - 1 value &= (1 << self.bits - 1) - 1 if sign != 0: value = -value return value def pack(self, *args): assert len(args) <= self.dimensions assert all([v < 1 << self.bits and v >= 0 for v in args]) code = 0 for i in range(self.dimensions): code |= self.split(args[i]) << i return code def unpack(self, code): values = [] for i in range(self.dimensions): values.append(self.compact(code >> i)) return values def spack(self, *args): code = self.pack(*map(self.shift_sign, args)) return code if code < (1 << self._size - 1) - 1 else code - (1 << self._size) def sunpack(self, code): values = self.unpack(code) return list(map(self.unshift_sign, values)) def __eq__(self, other): return self.dimensions == other.dimensions and self.bits == other.bits
config = { 'http': { '400': '400 Bad Request', '401': '401 Unauthorized', '500': '500 Internal Server Error', '503': '503 Service Unavailable', }, }
config = {'http': {'400': '400 Bad Request', '401': '401 Unauthorized', '500': '500 Internal Server Error', '503': '503 Service Unavailable'}}
loss_window = vis.line( Y=torch.zeros((1),device=device), X=torch.zeros((1),device=device), opts=dict(xlabel='epoch',ylabel='Loss',title='training loss',legend=['Loss'])) vis.line(X=torch.ones((1,1),device=device)*epoch,Y=torch.Tensor([epoch_loss],device=device).unsqueeze(0),win=loss_window,update='append')
loss_window = vis.line(Y=torch.zeros(1, device=device), X=torch.zeros(1, device=device), opts=dict(xlabel='epoch', ylabel='Loss', title='training loss', legend=['Loss'])) vis.line(X=torch.ones((1, 1), device=device) * epoch, Y=torch.Tensor([epoch_loss], device=device).unsqueeze(0), win=loss_window, update='append')
### PRIMITIVE class fixed2: def __init__(self, xu = 0.0, yv = 0.0): self.two = [xu, yv] def __copy__(self): return fixed2(*self.two[:]) def __str__(self): return str(self.two) @property def x(self): return self.two[0] @x.setter def x(self, value): self.two[0] = value @property def u(self): return self.two[0] @u.setter def u(self, value): self.two[0] = value @property def y(self): return self.two[1] @y.setter def y(self, value): self.two[1] = value @property def v(self): return self.two[1] @v.setter def v(self, value): self.two[1] = value @property def xy(self): return self.two[:] @xy.setter def xy(self, value): self.two[:] = value[:] @property def uv(self): return self.two[:] @uv.setter def uv(self, value): self.two[:] = value[:] class fixed4: def __init__(self, xr = 0.0, yg = 0.0, zb = 0.0, wa = 0.0): self.four = [xr, yg, zb, wa] def __copy__(self): return fixed4(*self.four[:]) def __str__(self): return str(self.four) @property def x(self): return self.four[0] @x.setter def x(self, value): self.four[0] = value @property def r(self): return self.four[0] @r.setter def r(self, value): self.four[0] = value @property def y(self): return self.four[1] @y.setter def y(self, value): self.four[1] = value @property def g(self): return self.four[1] @g.setter def g(self, value): self.four[1] = value @property def z(self): return self.four[2] @z.setter def z(self, value): self.four[2] = value @property def b(self): return self.four[2] @b.setter def b(self, value): self.four[2] = value @property def w(self): return self.four[3] @w.setter def w(self, value): self.four[3] = value @property def a(self): return self.four[3] @a.setter def a(self, value): self.four[3] = value @property def rgb(self): return self.four[:3] @rgb.setter def rgb(self, value): self.four[:3] = value[:3] @property def xyz(self): return self.four[:3] @xyz.setter def xyz(self, value): self.four[:3] = value[:3] @property def rgba(self): return self.four[:] @rgba.setter def rgba(self, value): self.four[:] = value[:] @property def xyzw(self): return self.four[:] @xyzw.setter def xyzw(self, value): self.four[:] = value[:] class shaderdata: def copy(self): newobj = self.__class__() for obj in dir(self): try: oldprop = getattr(self, obj) newprop = oldprop.__class__() if (hasattr(oldprop, "__copy__")): newprop = oldprop.__copy__() setattr(newobj, obj, newprop) except Exception as error: #print(error) #Suppress non-writeable props error pass return newobj
class Fixed2: def __init__(self, xu=0.0, yv=0.0): self.two = [xu, yv] def __copy__(self): return fixed2(*self.two[:]) def __str__(self): return str(self.two) @property def x(self): return self.two[0] @x.setter def x(self, value): self.two[0] = value @property def u(self): return self.two[0] @u.setter def u(self, value): self.two[0] = value @property def y(self): return self.two[1] @y.setter def y(self, value): self.two[1] = value @property def v(self): return self.two[1] @v.setter def v(self, value): self.two[1] = value @property def xy(self): return self.two[:] @xy.setter def xy(self, value): self.two[:] = value[:] @property def uv(self): return self.two[:] @uv.setter def uv(self, value): self.two[:] = value[:] class Fixed4: def __init__(self, xr=0.0, yg=0.0, zb=0.0, wa=0.0): self.four = [xr, yg, zb, wa] def __copy__(self): return fixed4(*self.four[:]) def __str__(self): return str(self.four) @property def x(self): return self.four[0] @x.setter def x(self, value): self.four[0] = value @property def r(self): return self.four[0] @r.setter def r(self, value): self.four[0] = value @property def y(self): return self.four[1] @y.setter def y(self, value): self.four[1] = value @property def g(self): return self.four[1] @g.setter def g(self, value): self.four[1] = value @property def z(self): return self.four[2] @z.setter def z(self, value): self.four[2] = value @property def b(self): return self.four[2] @b.setter def b(self, value): self.four[2] = value @property def w(self): return self.four[3] @w.setter def w(self, value): self.four[3] = value @property def a(self): return self.four[3] @a.setter def a(self, value): self.four[3] = value @property def rgb(self): return self.four[:3] @rgb.setter def rgb(self, value): self.four[:3] = value[:3] @property def xyz(self): return self.four[:3] @xyz.setter def xyz(self, value): self.four[:3] = value[:3] @property def rgba(self): return self.four[:] @rgba.setter def rgba(self, value): self.four[:] = value[:] @property def xyzw(self): return self.four[:] @xyzw.setter def xyzw(self, value): self.four[:] = value[:] class Shaderdata: def copy(self): newobj = self.__class__() for obj in dir(self): try: oldprop = getattr(self, obj) newprop = oldprop.__class__() if hasattr(oldprop, '__copy__'): newprop = oldprop.__copy__() setattr(newobj, obj, newprop) except Exception as error: pass return newobj
def common_function(): print('This is coming from the common function') return 'Hello Common'
def common_function(): print('This is coming from the common function') return 'Hello Common'
def acos(): pass def acosh(): pass def asin(): pass def asinh(): pass def atan(): pass def atanh(): pass def cos(): pass def cosh(): pass def exp(): pass def isinf(): pass def isnan(): pass def log(): pass def log10(): pass def phase(): pass def polar(): pass def rect(): pass def sin(): pass def sinh(): pass def sqrt(): pass def tan(): pass def tanh(): pass e = 2.718281828459045 pi = 3.141592653589793
def acos(): pass def acosh(): pass def asin(): pass def asinh(): pass def atan(): pass def atanh(): pass def cos(): pass def cosh(): pass def exp(): pass def isinf(): pass def isnan(): pass def log(): pass def log10(): pass def phase(): pass def polar(): pass def rect(): pass def sin(): pass def sinh(): pass def sqrt(): pass def tan(): pass def tanh(): pass e = 2.718281828459045 pi = 3.141592653589793
def sumOfTwo(a, b, v): # result = {True for x in a for y in b if x + y == v} # print(type(result)) # print(result) # return True if True in result else False for i in a: for j in b: if i + j == v: return True return False a = [0, 1, 2, 3] b = [10, 20, 39, 40] v = 42 print(sumOfTwo(a, b, v))
def sum_of_two(a, b, v): for i in a: for j in b: if i + j == v: return True return False a = [0, 1, 2, 3] b = [10, 20, 39, 40] v = 42 print(sum_of_two(a, b, v))
class PrefixUnaryExpressionSyntax(object): def __init__(self, kind, operator_token, operand): self.kind = kind self.operator_token = operator_token self.operand = operand def __str__(self): return f"{self.operator_token}{self.operand}"
class Prefixunaryexpressionsyntax(object): def __init__(self, kind, operator_token, operand): self.kind = kind self.operator_token = operator_token self.operand = operand def __str__(self): return f'{self.operator_token}{self.operand}'
# # PySNMP MIB module CISCO-PAE-MIB (http://snmplabs.com/pysmi) # ASN.1 source file:///Users/davwang4/Dev/mibs.snmplabs.com/asn1/CISCO-PAE-MIB # Produced by pysmi-0.3.4 at Wed May 1 12:09:18 2019 # On host DAVWANG4-M-1475 platform Darwin version 18.5.0 by user davwang4 # Using Python version 3.7.3 (default, Mar 27 2019, 09:23:15) # ObjectIdentifier, OctetString, Integer = mibBuilder.importSymbols("ASN1", "ObjectIdentifier", "OctetString", "Integer") NamedValues, = mibBuilder.importSymbols("ASN1-ENUMERATION", "NamedValues") ValueSizeConstraint, ConstraintsIntersection, ConstraintsUnion, ValueRangeConstraint, SingleValueConstraint = mibBuilder.importSymbols("ASN1-REFINEMENT", "ValueSizeConstraint", "ConstraintsIntersection", "ConstraintsUnion", "ValueRangeConstraint", "SingleValueConstraint") CnnEouPostureTokenString, CnnEouPostureToken = mibBuilder.importSymbols("CISCO-NAC-TC-MIB", "CnnEouPostureTokenString", "CnnEouPostureToken") CpgPolicyNameOrEmpty, = mibBuilder.importSymbols("CISCO-POLICY-GROUP-MIB", "CpgPolicyNameOrEmpty") ciscoMgmt, = mibBuilder.importSymbols("CISCO-SMI", "ciscoMgmt") CiscoURLString, = mibBuilder.importSymbols("CISCO-TC", "CiscoURLString") VlanIndex, = mibBuilder.importSymbols("CISCO-VTP-MIB", "VlanIndex") dot1xAuthConfigEntry, dot1xPaePortNumber, dot1xPaePortEntry, PaeControlledPortStatus, dot1xAuthPaeState = mibBuilder.importSymbols("IEEE8021-PAE-MIB", "dot1xAuthConfigEntry", "dot1xPaePortNumber", "dot1xPaePortEntry", "PaeControlledPortStatus", "dot1xAuthPaeState") InterfaceIndex, = mibBuilder.importSymbols("IF-MIB", "InterfaceIndex") InetAddressType, InetAddress = mibBuilder.importSymbols("INET-ADDRESS-MIB", "InetAddressType", "InetAddress") SnmpAdminString, = mibBuilder.importSymbols("SNMP-FRAMEWORK-MIB", "SnmpAdminString") ObjectGroup, ModuleCompliance, NotificationGroup = mibBuilder.importSymbols("SNMPv2-CONF", "ObjectGroup", "ModuleCompliance", "NotificationGroup") IpAddress, Unsigned32, iso, Integer32, Counter64, NotificationType, Bits, TimeTicks, MibIdentifier, ModuleIdentity, Counter32, MibScalar, MibTable, MibTableRow, MibTableColumn, Gauge32, ObjectIdentity = mibBuilder.importSymbols("SNMPv2-SMI", "IpAddress", "Unsigned32", "iso", "Integer32", "Counter64", "NotificationType", "Bits", "TimeTicks", "MibIdentifier", "ModuleIdentity", "Counter32", "MibScalar", "MibTable", "MibTableRow", "MibTableColumn", "Gauge32", "ObjectIdentity") RowStatus, DisplayString, TextualConvention, TruthValue, MacAddress = mibBuilder.importSymbols("SNMPv2-TC", "RowStatus", "DisplayString", "TextualConvention", "TruthValue", "MacAddress") ciscoPaeMIB = ModuleIdentity((1, 3, 6, 1, 4, 1, 9, 9, 220)) ciscoPaeMIB.setRevisions(('2009-12-10 00:00', '2008-07-07 00:00', '2008-04-09 00:00', '2007-04-25 00:00', '2007-04-16 00:00', '2007-01-27 00:00', '2005-09-22 00:00', '2004-04-23 00:00', '2004-04-01 00:00', '2003-04-08 00:00', '2002-10-16 00:00', '2001-05-24 10:16',)) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): if mibBuilder.loadTexts: ciscoPaeMIB.setRevisionsDescriptions(('Added cpaeSuppPortProfileGroup, and cpaeSuppHostInfoGroup.', 'Added TEXTUAL-CONVENTION CpaeAuthState. Added enumerated value other(4) to cpaePortMode. Added cpaeHostSessionIdGroup, cpaeGuestVlanNotifEnableGroup, cpaeGuestVlanNotifGroup, cpaeAuthFailVlanNotifEnableGrp, cpaeAuthFailVlanNotifGroup, cpaeHostAuthInfoGroup, cpaePortCapabilitiesConfigGroup, cpaeDot1xSuppToGuestVlanGroup. Deprecated cpaePortAuthFailVlanGroup, replaced by cpaePortAuthFailVlanConfigGroup and cpaePortAuthFailUserInfoGroup. Deprecated cpaeCompliance8, replaced by cpaeCompliance9.', "Added cpaeMabAuditInfoGroup, cpaeHostUrlRedirectGroup, cpaeMabPortIpDevTrackConfGroup, cpaePortIpDevTrackConfGroup, cpaeWebAuthIpDevTrackingGroup, cpaeWebAuthUnAuthTimeoutGroup, cpaeGlobalAuthFailVlanGroup, cpaeGlobalSecViolationGroup, cpaeCriticalEapolConfigGroup. Deprecated cpaeMacAuthBypassGroup and replace it by cpaeMacAuthBypassPortEnableGroup, and cpaeMacAuthBypassGroup4; Deprecated cpaeAuthConfigGroup and replace it by cpaeAuthIabConfigGroup, cpaeAuthConfigGroup3 and cpaeAuthConfigGroup4. Modified cpaeMacAuthBypassPortAuthState to add 'ipAwaiting' and 'policyConfig' enum values.", 'Added cpaeMacAuthBypassGroup3, and cpaeHostPostureTokenGroup.', 'Add cpaeHostInfoGroup3.', "Added 'aaaFail' state to cpaeMacAuthBypassPortAuthState and cpaeWebAuthHostState. Added cpaePortAuthFailVlanGroup2, cpaeWebAuthAaaFailGroup, cpaeMacAuthBypassGroup2, cpaePortEapolTestGroup, cpaeHostInfoGroup2, cpaeAuthConfigGroup2, cpaeCriticalRecoveryDelayGroup, cpaeMacAuthBypassCriticalGroup, and cpaeWebAuthCriticalGroup. Obsoleted cpaeHostInfoPostureToken object.", 'Added cpaeGuestVlanGroup3, cpaePortAuthFailVlanGroup, cpaePortOperVlanGroup, cpaeNoGuestVlanNotifEnableGrp, cpaeNoAuthFailVlanNotifEnableGrp, cpaeNoGuestVlanNotifGroup, cpaeNoAuthFailVlanNotifGroup, cpaeMacAuthBypassGroup, cpaeWebAuthGroup, cpaeAuthConfigGroup and cpaeHostInfoGroup. Deprecated cpaeInGuestVlan, cpaeGuestVlanGroup2.', 'Modified the DESCRIPTION clauses of cpaeGuestVlanNumber and cpaeGuestVlanId.', 'Added cpaeUserGroupGroup and cpaeRadiusConfigGroup.', 'Added cpaeGuestVlanGroup2 and cpaeShutdownTimeoutGroup. Deprecated cpaeGuestVlanGroup.', 'Added cpaePortEntryGroup and cpaeGuestVlanGroup. Deprecated cpaeMultipleHostGroup.', 'Initial version of this MIB module.',)) if mibBuilder.loadTexts: ciscoPaeMIB.setLastUpdated('200912100000Z') if mibBuilder.loadTexts: ciscoPaeMIB.setOrganization('Cisco System, Inc.') if mibBuilder.loadTexts: ciscoPaeMIB.setContactInfo('Cisco Systems Customer Service Postal: 170 W Tasman Drive San Jose, CA 95134 USA Tel: +1 800 553-NETS E-mail: cs-ibns@cisco.com, cs-lan-switch-snmp@cisco.com') if mibBuilder.loadTexts: ciscoPaeMIB.setDescription('Cisco Port Access Entity (PAE) module for managing IEEE Std 802.1x. This MIB provides Port Access Entity information that are either excluded by IEEE8021-PAE-MIB or specific to Cisco products.') cpaeMIBNotification = MibIdentifier((1, 3, 6, 1, 4, 1, 9, 9, 220, 0)) cpaeMIBObject = MibIdentifier((1, 3, 6, 1, 4, 1, 9, 9, 220, 1)) cpaeMIBConformance = MibIdentifier((1, 3, 6, 1, 4, 1, 9, 9, 220, 2)) class ReAuthPeriodSource(TextualConvention, Integer32): description = 'Source of the reAuthPeriod constant, used by the 802.1x Reauthentication Timer state machine. local : local configured reauthentication period specified by the object dot1xAuthReAuthPeriod will be used. server: the reauthentication period will be received from the Authentication server. auto : source of reauthentication period will be decided by the system.' status = 'current' subtypeSpec = Integer32.subtypeSpec + ConstraintsUnion(SingleValueConstraint(1, 2, 3)) namedValues = NamedValues(("local", 1), ("server", 2), ("auto", 3)) class CpaeAuthState(TextualConvention, Integer32): description = "The Authenticator PAE state machine value. other :None of the following states. initialize :The PAE state machine is being initialized. disconnected :An explicit logoff request is received from the Supplicant, or the number of permissible reauthentication attempts has been exceeded. connecting :Attempting to establish a communication with a Supplicant. authenticating:A Supplicant is being authenticated. authenticated :The Authenticator has successfully authenticated the Supplicant. aborting :The authentication process is prematurely aborted due to receipt of a reauthentication request, or an EAPOL-Start frame, or an EAPOL-Logoff frame, or an authTimeout. held :The state machine ignores and discards all EAPOL packets, so as to discourage brute force attacks. This state is entered from the 'authenticating' state following an authentication failure. At the expiration of the quietWhile timer, the state machine transitions to the 'connecting' state. forceAuth :The port is set to Authorized, and a canned EAP Success packet is sent to the Supplicant. forceUnauth :The port is set to Unauthorized, and a canned EAP Failure packet is sent to the Supplicant. If EAP-Start messages are received from the Supplicant, the state is re-entered and further EAP Failure messages are sent. guestVlan :The port has been moved to a configured Guest VLAN. authFailVlan :The port has been moved to a configured Authentication Failed VLAN. criticalAuth :The port has been authorized by Critical Authentication because RADIUS server is not reachable, or does not response. ipAwaiting :The port is waiting for an IP address from DHCP server. policyConfig :This state is entered from 'ipAwaiting' state if an IP address is received and the corresponding policies are being installed. authFinished :The port is set to Authorized by MAC Authentication Bypass feature. restart :The PAE state machine has been restarted. authFallback :Fallback mechanism is applied to the authentication process. authCResult :Authentication completed and the validity of the authorization features is checked. authZSuccess :Authorization policies based on the authentication result are applied. If the policies are applied successfully then the port is authorized otherwise unauthorized." status = 'current' subtypeSpec = Integer32.subtypeSpec + ConstraintsUnion(SingleValueConstraint(1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20)) namedValues = NamedValues(("other", 1), ("initialize", 2), ("disconnected", 3), ("connecting", 4), ("authenticating", 5), ("authenticated", 6), ("aborting", 7), ("held", 8), ("forceAuth", 9), ("forceUnauth", 10), ("guestVlan", 11), ("authFailVlan", 12), ("criticalAuth", 13), ("ipAwaiting", 14), ("policyConfig", 15), ("authFinished", 16), ("restart", 17), ("authFallback", 18), ("authCResult", 19), ("authZSuccess", 20)) cpaePortTable = MibTable((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 1), ) if mibBuilder.loadTexts: cpaePortTable.setReference('802.1X-2001 9.6.1, 802.1X-2004 9.6.1') if mibBuilder.loadTexts: cpaePortTable.setStatus('current') if mibBuilder.loadTexts: cpaePortTable.setDescription('A table of system level information for each port supported by the Port Access Entity. An entry appears in this table for each PAE port of this system. This table contains additional objects for the dot1xPaePortTable.') cpaePortEntry = MibTableRow((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 1, 1), ) dot1xPaePortEntry.registerAugmentions(("CISCO-PAE-MIB", "cpaePortEntry")) cpaePortEntry.setIndexNames(*dot1xPaePortEntry.getIndexNames()) if mibBuilder.loadTexts: cpaePortEntry.setStatus('current') if mibBuilder.loadTexts: cpaePortEntry.setDescription('An entry containing additional management information applicable to a particular PAE port.') cpaeMultipleHost = MibTableColumn((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 1, 1, 1), TruthValue()).setMaxAccess("readwrite") if mibBuilder.loadTexts: cpaeMultipleHost.setStatus('deprecated') if mibBuilder.loadTexts: cpaeMultipleHost.setDescription('Specifies whether the port allows multiple-host connection or not.') cpaePortMode = MibTableColumn((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 1, 1, 2), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(1, 2, 3, 4))).clone(namedValues=NamedValues(("singleHost", 1), ("multiHost", 2), ("multiAuth", 3), ("other", 4)))).setMaxAccess("readwrite") if mibBuilder.loadTexts: cpaePortMode.setStatus('current') if mibBuilder.loadTexts: cpaePortMode.setDescription('Specifies the current mode of dot1x operation on the port. singleHost(1): port allows one host to connect and authenticate. multiHost(2) : port allows multiple hosts to connect. Once a host is authenticated, all remaining hosts are also authorized. multiAuth(3) : port allows multiple hosts to connect and each host is authenticated. other(4) : none of the above. This is a read-only value which can not be used in set operation. If the port security feature is enabled on the interface, the configuration of the port security (such as the number of the hosts allowed, the security violation action, etc) will apply to the interface.') cpaeGuestVlanNumber = MibTableColumn((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 1, 1, 3), VlanIndex()).setMaxAccess("readwrite") if mibBuilder.loadTexts: cpaeGuestVlanNumber.setStatus('current') if mibBuilder.loadTexts: cpaeGuestVlanNumber.setDescription("Specifies the Guest Vlan of the interface. An interface with cpaePortMode value of 'singleHost' will be moved to its Guest Vlan if the supplicant on the interface is not capable of IEEE-802.1x authentication. A value of zero for this object indicates no Guest Vlan configured for the interface.") cpaeInGuestVlan = MibTableColumn((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 1, 1, 4), TruthValue()).setMaxAccess("readonly") if mibBuilder.loadTexts: cpaeInGuestVlan.setStatus('deprecated') if mibBuilder.loadTexts: cpaeInGuestVlan.setDescription('Indicates whether the interface is in its Guest Vlan or not. The object is deprecated in favor of newly added object cpaePortOperVlanType.') cpaeShutdownTimeoutEnabled = MibTableColumn((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 1, 1, 5), TruthValue()).setMaxAccess("readwrite") if mibBuilder.loadTexts: cpaeShutdownTimeoutEnabled.setStatus('current') if mibBuilder.loadTexts: cpaeShutdownTimeoutEnabled.setDescription('Specifies whether shutdown timeout feature is enabled on the interface.') cpaePortAuthFailVlan = MibTableColumn((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 1, 1, 6), VlanIndex()).setMaxAccess("readwrite") if mibBuilder.loadTexts: cpaePortAuthFailVlan.setStatus('current') if mibBuilder.loadTexts: cpaePortAuthFailVlan.setDescription('Specifies the Auth-Fail (Authentication Fail) Vlan of the port. A port is moved to Auth-Fail Vlan if the supplicant which support IEEE-802.1x authentication is unsuccessfully authenticated. A value of zero for this object indicates no Auth-Fail Vlan configured for the port.') cpaePortOperVlan = MibTableColumn((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 1, 1, 7), VlanIndex()).setMaxAccess("readonly") if mibBuilder.loadTexts: cpaePortOperVlan.setStatus('current') if mibBuilder.loadTexts: cpaePortOperVlan.setDescription('The VlanIndex of the Vlan which is assigned to this port via IEEE-802.1x and related methods of authentication supported by the system. A value of zero for this object indicates that no Vlan is assigned to this port via IEEE-802.1x authentication.') cpaePortOperVlanType = MibTableColumn((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 1, 1, 8), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(1, 2, 3, 4))).clone(namedValues=NamedValues(("other", 1), ("none", 2), ("guest", 3), ("authFail", 4)))).setMaxAccess("readonly") if mibBuilder.loadTexts: cpaePortOperVlanType.setStatus('current') if mibBuilder.loadTexts: cpaePortOperVlanType.setDescription("The type of the Vlan which is assigned to this port via IEEE-802.1x and related methods of authentication supported by the system. A value of 'other' for this object indicates type of Vlan assigned to this port; via IEEE-802.1x authentication; is other than the ones specified by listed enumerations for this object. A value of 'none' for this object indicates that there is no Vlan assigned to this port via IEEE-802.1x authentication. For such a case, corresponding value of cpaePortOperVlan object will be zero. A value of 'guest' for this object indicates that Vlan assigned to this port; via IEEE-802.1x authentication; is of type Guest Vlan and specified by the object cpaeGuestVlanNumber for this entry. A value of 'authFail' for this object indicates that Vlan assigned to this port; via IEEE-802.1x authentication; is of type Auth-Fail Vlan and specified by the object cpaePortAuthFailVlan for this entry.") cpaeAuthFailVlanMaxAttempts = MibTableColumn((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 1, 1, 9), Unsigned32()).setMaxAccess("readwrite") if mibBuilder.loadTexts: cpaeAuthFailVlanMaxAttempts.setStatus('current') if mibBuilder.loadTexts: cpaeAuthFailVlanMaxAttempts.setDescription('Specifies the maximum number of authentication attempts should be made before the port is moved into the Auth-Fail Vlan.') cpaePortCapabilitiesEnabled = MibTableColumn((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 1, 1, 10), Bits().clone(namedValues=NamedValues(("authenticator", 0), ("supplicant", 1)))).setMaxAccess("readwrite") if mibBuilder.loadTexts: cpaePortCapabilitiesEnabled.setReference('802.1X-2001 9.6.1, PAE Capabilities, 802.1X-2004 9.6.1, PAE Capabilities') if mibBuilder.loadTexts: cpaePortCapabilitiesEnabled.setStatus('current') if mibBuilder.loadTexts: cpaePortCapabilitiesEnabled.setDescription('Specifies the type of PAE functionality of the port which are enabled. authenticator: PAE Authenticator functions are enabled. supplicant : PAE Supplicant functions are enabled. Only those supported PAE functions which are listed in the corresponding instance of dot1xPaePortCapabilities can be enabled.') cpaeGuestVlanId = MibScalar((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 2), VlanIndex()).setMaxAccess("readwrite") if mibBuilder.loadTexts: cpaeGuestVlanId.setStatus('deprecated') if mibBuilder.loadTexts: cpaeGuestVlanId.setDescription("Specifies the Guest Vlan of the system. An interface with cpaePortMode value of 'singleHost' will be moved to Guest Vlan if the supplicant on the interface is not IEEE-802.1x capable. A value of zero indicates no Guest Vlan configured in the system. If the platform supports per-port guest Vlan ID configuration, this object is not instantiated.") cpaeShutdownTimeout = MibScalar((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 3), Unsigned32().subtype(subtypeSpec=ValueRangeConstraint(0, 65535))).setUnits('seconds').setMaxAccess("readwrite") if mibBuilder.loadTexts: cpaeShutdownTimeout.setStatus('current') if mibBuilder.loadTexts: cpaeShutdownTimeout.setDescription("Specifies the shutdown timeout interval to enable the interface automatically in case it is shutdown due to security violation. If the value of this object is 0, the interfaces shutdown due to the security violation will not be enabled automatically. The value of this object is applicable to the interface only when cpaeShutdownTimeoutEnabled is 'true', and port security feature is disabled on the interface.") cpaeRadiusAccountingEnabled = MibScalar((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 4), TruthValue()).setMaxAccess("readwrite") if mibBuilder.loadTexts: cpaeRadiusAccountingEnabled.setStatus('current') if mibBuilder.loadTexts: cpaeRadiusAccountingEnabled.setDescription('Specifies if RADIUS accounting is enabled for 802.1x on this devices.') cpaeUserGroupTable = MibTable((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 5), ) if mibBuilder.loadTexts: cpaeUserGroupTable.setStatus('current') if mibBuilder.loadTexts: cpaeUserGroupTable.setDescription('A table of Group Manager and authenticated users information on the device.') cpaeUserGroupEntry = MibTableRow((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 5, 1), ).setIndexNames((0, "CISCO-PAE-MIB", "cpaeUserGroupName"), (0, "CISCO-PAE-MIB", "cpaeUserGroupUserIndex")) if mibBuilder.loadTexts: cpaeUserGroupEntry.setStatus('current') if mibBuilder.loadTexts: cpaeUserGroupEntry.setDescription('Information about an 802.1x authenticated user on the devices.') cpaeUserGroupName = MibTableColumn((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 5, 1, 1), SnmpAdminString().subtype(subtypeSpec=ValueSizeConstraint(1, 100))) if mibBuilder.loadTexts: cpaeUserGroupName.setStatus('current') if mibBuilder.loadTexts: cpaeUserGroupName.setDescription('Specifies the name of the group that the user belongs to.') cpaeUserGroupUserIndex = MibTableColumn((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 5, 1, 2), Unsigned32()) if mibBuilder.loadTexts: cpaeUserGroupUserIndex.setStatus('current') if mibBuilder.loadTexts: cpaeUserGroupUserIndex.setDescription('The index of an user within a group.') cpaeUserGroupUserName = MibTableColumn((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 5, 1, 3), SnmpAdminString()).setMaxAccess("readonly") if mibBuilder.loadTexts: cpaeUserGroupUserName.setStatus('current') if mibBuilder.loadTexts: cpaeUserGroupUserName.setDescription('Specifies the name of the user authenticated on a port of the device.') cpaeUserGroupUserAddrType = MibTableColumn((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 5, 1, 4), InetAddressType()).setMaxAccess("readonly") if mibBuilder.loadTexts: cpaeUserGroupUserAddrType.setStatus('current') if mibBuilder.loadTexts: cpaeUserGroupUserAddrType.setDescription('Specifies the type of address used to determine the address of the user.') cpaeUserGroupUserAddr = MibTableColumn((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 5, 1, 5), InetAddress()).setMaxAccess("readonly") if mibBuilder.loadTexts: cpaeUserGroupUserAddr.setStatus('current') if mibBuilder.loadTexts: cpaeUserGroupUserAddr.setDescription('Specifies the address of the host that the user logging from.') cpaeUserGroupUserInterface = MibTableColumn((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 5, 1, 6), InterfaceIndex()).setMaxAccess("readonly") if mibBuilder.loadTexts: cpaeUserGroupUserInterface.setStatus('current') if mibBuilder.loadTexts: cpaeUserGroupUserInterface.setDescription('Specifies the interface index that the user is authenticated on.') cpaeUserGroupUserVlan = MibTableColumn((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 5, 1, 7), VlanIndex()).setMaxAccess("readonly") if mibBuilder.loadTexts: cpaeUserGroupUserVlan.setStatus('current') if mibBuilder.loadTexts: cpaeUserGroupUserVlan.setDescription('Specifies the vlan that the user belongs to.') cpaeAuthFailUserTable = MibTable((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 6), ) if mibBuilder.loadTexts: cpaeAuthFailUserTable.setStatus('current') if mibBuilder.loadTexts: cpaeAuthFailUserTable.setDescription('A table to list user information for each port on the system supported by the Port Access Entity and assigned to Auth-Fail Vlan.') cpaeAuthFailUserEntry = MibTableRow((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 6, 1), ).setIndexNames((0, "IEEE8021-PAE-MIB", "dot1xPaePortNumber")) if mibBuilder.loadTexts: cpaeAuthFailUserEntry.setStatus('current') if mibBuilder.loadTexts: cpaeAuthFailUserEntry.setDescription("An entry appears in this table for each PAE port on the system which is assigned to Vlan of type 'authFail' via IEEE-802.1x authentication.") cpaeAuthFailUserName = MibTableColumn((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 6, 1, 1), SnmpAdminString()).setMaxAccess("readonly") if mibBuilder.loadTexts: cpaeAuthFailUserName.setStatus('current') if mibBuilder.loadTexts: cpaeAuthFailUserName.setDescription('Indicates the name of the user who failed IEEE-802.1x authentication and hence now assigned to Auth-Fail Vlan. The Auth-Fail Vlan to which the user belongs is determined by the value of object cpaePortAuthFailVlan for this port.') cpaeNotificationControl = MibIdentifier((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 7)) cpaeNoGuestVlanNotifEnable = MibScalar((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 7, 1), TruthValue()).setMaxAccess("readwrite") if mibBuilder.loadTexts: cpaeNoGuestVlanNotifEnable.setStatus('current') if mibBuilder.loadTexts: cpaeNoGuestVlanNotifEnable.setDescription("This object specifies whether the system produces the cpaeNoGuestVlanNotif. A 'false' value will prevent cpaeNoGuestVlanNotif from being generated by this system.") cpaeNoAuthFailVlanNotifEnable = MibScalar((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 7, 2), TruthValue()).setMaxAccess("readwrite") if mibBuilder.loadTexts: cpaeNoAuthFailVlanNotifEnable.setStatus('current') if mibBuilder.loadTexts: cpaeNoAuthFailVlanNotifEnable.setDescription("This object specifies whether the system produces the cpaeNoAuthFailVlanNotif. A 'false' value will prevent cpaeNoAuthFailVlanNotif from being generated by this system.") cpaeGuestVlanNotifEnable = MibScalar((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 7, 3), TruthValue()).setMaxAccess("readwrite") if mibBuilder.loadTexts: cpaeGuestVlanNotifEnable.setStatus('current') if mibBuilder.loadTexts: cpaeGuestVlanNotifEnable.setDescription("This object specifies whether the system produces the cpaeGuestVlanNotif. A 'false' value will prevent cpaeGuestVlanNotif from being generated by this system.") cpaeAuthFailVlanNotifEnable = MibScalar((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 7, 4), TruthValue()).setMaxAccess("readwrite") if mibBuilder.loadTexts: cpaeAuthFailVlanNotifEnable.setStatus('current') if mibBuilder.loadTexts: cpaeAuthFailVlanNotifEnable.setDescription("This object specifies whether the system produces the cpaeAuthFailVlanNotif. A 'false' value will prevent cpaeAuthFailVlanNotif from being generated by this system.") cpaeMacAuthBypass = MibIdentifier((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 8)) cpaeMacAuthBypassReAuthTimeout = MibScalar((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 8, 1), Unsigned32()).setUnits('seconds').setMaxAccess("readwrite") if mibBuilder.loadTexts: cpaeMacAuthBypassReAuthTimeout.setStatus('current') if mibBuilder.loadTexts: cpaeMacAuthBypassReAuthTimeout.setDescription('Specifies the waiting time before reauthentication is triggered on all MAC Auth-bypass authenticated ports.') cpaeMacAuthBypassReAuthEnabled = MibScalar((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 8, 2), TruthValue()).setMaxAccess("readwrite") if mibBuilder.loadTexts: cpaeMacAuthBypassReAuthEnabled.setStatus('current') if mibBuilder.loadTexts: cpaeMacAuthBypassReAuthEnabled.setDescription("The reauthentication control for all MAC Auth-bypass ports. Setting this object to 'true' causes every MAC Auth-Bypass authenticated port to reauthenticate the device connecting to the port, after every period of time specified by the object cpaeMacAuthBypassReAuthTimeout. Setting this object to 'false' will disable the MAC Auth-Bypass global reauthentication.") cpaeMacAuthBypassViolation = MibScalar((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 8, 3), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(1, 2))).clone(namedValues=NamedValues(("restrict", 1), ("shutdown", 2)))).setMaxAccess("readwrite") if mibBuilder.loadTexts: cpaeMacAuthBypassViolation.setStatus('current') if mibBuilder.loadTexts: cpaeMacAuthBypassViolation.setDescription('Specifies the action upon reception of a security violation event. restrict(1): Packets from MAC address of the device causing security violation will be dropped. shutdown(2): The port that causes security violation will be shutdown.') cpaeMacAuthBypassShutdownTimeout = MibScalar((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 8, 4), Unsigned32()).setUnits('seconds').setMaxAccess("readwrite") if mibBuilder.loadTexts: cpaeMacAuthBypassShutdownTimeout.setStatus('current') if mibBuilder.loadTexts: cpaeMacAuthBypassShutdownTimeout.setDescription('Specifies time before a port is auto-enabled after being shutdown due to a MAC Auth-bypass security violation.') cpaeMacAuthBypassAuthFailTimeout = MibScalar((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 8, 5), Unsigned32()).setUnits('seconds').setMaxAccess("readwrite") if mibBuilder.loadTexts: cpaeMacAuthBypassAuthFailTimeout.setStatus('current') if mibBuilder.loadTexts: cpaeMacAuthBypassAuthFailTimeout.setDescription('Specifies the time a MAC Auth-bypass unauthenticated port waits before trying the authentication process again.') cpaeMacAuthBypassPortTable = MibTable((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 8, 6), ) if mibBuilder.loadTexts: cpaeMacAuthBypassPortTable.setStatus('current') if mibBuilder.loadTexts: cpaeMacAuthBypassPortTable.setDescription('A table of MAC Authentication Bypass (MAC Auth-Bypass) configuration and information for ports in the device.') cpaeMacAuthBypassPortEntry = MibTableRow((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 8, 6, 1), ).setIndexNames((0, "IEEE8021-PAE-MIB", "dot1xPaePortNumber")) if mibBuilder.loadTexts: cpaeMacAuthBypassPortEntry.setStatus('current') if mibBuilder.loadTexts: cpaeMacAuthBypassPortEntry.setDescription('An entry containing management information for MAC Auth-Bypass feature on a port.') cpaeMacAuthBypassPortEnabled = MibTableColumn((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 8, 6, 1, 1), TruthValue()).setMaxAccess("readwrite") if mibBuilder.loadTexts: cpaeMacAuthBypassPortEnabled.setStatus('current') if mibBuilder.loadTexts: cpaeMacAuthBypassPortEnabled.setDescription('Specifies whether MAC Auth-Bypass is enabled on the port.') cpaeMacAuthBypassPortInitialize = MibTableColumn((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 8, 6, 1, 2), TruthValue()).setMaxAccess("readwrite") if mibBuilder.loadTexts: cpaeMacAuthBypassPortInitialize.setStatus('current') if mibBuilder.loadTexts: cpaeMacAuthBypassPortInitialize.setDescription("The initialization control for this port. Setting this object to 'true' causes the MAC Auth-bypass state machine to be initialized on the port. Setting this object to 'false' has no effect. This object always returns 'false' when it is read.") cpaeMacAuthBypassPortReAuth = MibTableColumn((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 8, 6, 1, 3), TruthValue()).setMaxAccess("readwrite") if mibBuilder.loadTexts: cpaeMacAuthBypassPortReAuth.setStatus('current') if mibBuilder.loadTexts: cpaeMacAuthBypassPortReAuth.setDescription("The reauthentication control for this port. Setting this object to 'true' causes the MAC address of the device connecting to the port to be reauthenticated. Setting this object to 'false' has no effect. This object always returns 'false' when it is read.") cpaeMacAuthBypassPortMacAddress = MibTableColumn((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 8, 6, 1, 4), MacAddress()).setMaxAccess("readonly") if mibBuilder.loadTexts: cpaeMacAuthBypassPortMacAddress.setStatus('current') if mibBuilder.loadTexts: cpaeMacAuthBypassPortMacAddress.setDescription('Indicates the MAC address of the device connecting to the port.') cpaeMacAuthBypassPortAuthState = MibTableColumn((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 8, 6, 1, 5), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(1, 2, 3, 4, 5, 6, 7, 8, 9))).clone(namedValues=NamedValues(("other", 1), ("waiting", 2), ("authenticating", 3), ("authenticated", 4), ("fail", 5), ("finished", 6), ("aaaFail", 7), ("ipAwaiting", 8), ("policyConfig", 9)))).setMaxAccess("readonly") if mibBuilder.loadTexts: cpaeMacAuthBypassPortAuthState.setStatus('current') if mibBuilder.loadTexts: cpaeMacAuthBypassPortAuthState.setDescription("Indicates the current state of the MAC Auth-Bypass state machine. other(1) : An unknown state. waiting(2) : Waiting to receive the MAC address that needs to be authenticated. authenticating(3): In authentication process. authenticated(4) : MAC address of the device connecting to the port is authenticated. fail(5) : MAC Auth-bypass authentication failed. Port waits for a period of time before moving to the 'waiting' state, if there is no other authentication features available in the system. finished(6) : MAC Auth-bypass authentication failed. Port is authenticated by another authentication feature. aaaFail(7) : AAA server is not reachable after sending the authentication request or after the expiration of re-authentication timeout, with IAB (Inaccessible Authentication Bypass) enabled on the port. ipAwaiting(8) : Corresponding QoS/Security ACLs and other Vendor Specific Attributes are being configured on the port, after which IP address will be obtained via DHCP snooping or ARP inspection. policyConfig(9) : Policy Groups or downloaded ACLs are being configured on the port.") cpaeMacAuthBypassPortTermAction = MibTableColumn((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 8, 6, 1, 6), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(1, 2, 3))).clone(namedValues=NamedValues(("other", 1), ("init", 2), ("reauth", 3)))).setMaxAccess("readonly") if mibBuilder.loadTexts: cpaeMacAuthBypassPortTermAction.setStatus('current') if mibBuilder.loadTexts: cpaeMacAuthBypassPortTermAction.setDescription('Indicates the termination action received from RADIUS server that will be applied on the port when the current session timeout expired. other : none of the following. init : current session will be terminated and a new authentication process will be initiated. reauth: reauthentication will be applied without terminating the current session.') cpaeMacAuthBypassSessionTimeLeft = MibTableColumn((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 8, 6, 1, 7), Unsigned32()).setUnits('seconds').setMaxAccess("readonly") if mibBuilder.loadTexts: cpaeMacAuthBypassSessionTimeLeft.setStatus('current') if mibBuilder.loadTexts: cpaeMacAuthBypassSessionTimeLeft.setDescription('Indicates the leftover time of the current MAC Auth-Bypass session on this port.') cpaeMacAuthBypassPortAuthMethod = MibTableColumn((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 8, 6, 1, 8), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(1, 2))).clone(namedValues=NamedValues(("radius", 1), ("eap", 2)))).setMaxAccess("readwrite") if mibBuilder.loadTexts: cpaeMacAuthBypassPortAuthMethod.setStatus('current') if mibBuilder.loadTexts: cpaeMacAuthBypassPortAuthMethod.setDescription('Specifies the authentication method used by MAC Authentication Bypass. radius(1) : communication with authentication server is performed via RADIUS messages. eap(2) : communication with authentication server is performed via EAP messages.') cpaeMacAuthBypassPortSessionId = MibTableColumn((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 8, 6, 1, 9), SnmpAdminString()).setMaxAccess("readonly") if mibBuilder.loadTexts: cpaeMacAuthBypassPortSessionId.setStatus('current') if mibBuilder.loadTexts: cpaeMacAuthBypassPortSessionId.setDescription("Indicates the session ID of the MAC Auth-Bypass Audit session on the port. A zero length string will be returned for this object if value of the corresponding instance of cpaeMacAuthBypassPortEnabled is 'false'.") cpaeMacAuthBypassPortUrlRedirect = MibTableColumn((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 8, 6, 1, 10), SnmpAdminString()).setMaxAccess("readonly") if mibBuilder.loadTexts: cpaeMacAuthBypassPortUrlRedirect.setStatus('current') if mibBuilder.loadTexts: cpaeMacAuthBypassPortUrlRedirect.setDescription("Indicates the URL of an Audit server, provided by AAA server, to which a MAC auth-Bypass host will be redirected to when an Audit session starts off. A zero-length string indicates that the audit process will be performed via port scan instead, or value of the corresponding instance of cpaeMacAuthBypassPortEnabled is 'false'.") cpaeMacAuthBypassPortPostureTok = MibTableColumn((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 8, 6, 1, 11), CnnEouPostureTokenString().subtype(subtypeSpec=ValueSizeConstraint(0, 255))).setMaxAccess("readonly") if mibBuilder.loadTexts: cpaeMacAuthBypassPortPostureTok.setStatus('current') if mibBuilder.loadTexts: cpaeMacAuthBypassPortPostureTok.setDescription("Indicates the Posture Token assigned to the MAC Auth-Bypass host connected to this port. A zero length string will be returned for this object if value of the corresponding instance of cpaeMacAuthBypassPortEnabled is 'false'.") cpaeMacAuthBypassAcctEnable = MibScalar((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 8, 7), TruthValue()).setMaxAccess("readwrite") if mibBuilder.loadTexts: cpaeMacAuthBypassAcctEnable.setStatus('current') if mibBuilder.loadTexts: cpaeMacAuthBypassAcctEnable.setDescription('Specifies if accounting is enabled for Mac Authentication Bypass feature on this device.') cpaeMabCriticalRecoveryDelay = MibScalar((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 8, 8), Unsigned32()).setUnits('milli-seconds').setMaxAccess("readwrite") if mibBuilder.loadTexts: cpaeMabCriticalRecoveryDelay.setStatus('current') if mibBuilder.loadTexts: cpaeMabCriticalRecoveryDelay.setDescription('This object specifies the critical recovery delay time for Mac Authentication Bypass in the system. A value of zero indicates that critical recovery delay for MAC Authentication Bypass is disabled.') cpaeMabPortIpDevTrackConfTable = MibTable((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 8, 9), ) if mibBuilder.loadTexts: cpaeMabPortIpDevTrackConfTable.setStatus('current') if mibBuilder.loadTexts: cpaeMabPortIpDevTrackConfTable.setDescription('A table of IP Device Tracking configuration for MAC Auth-Bypass interfaces in the system.') cpaeMabPortIpDevTrackConfEntry = MibTableRow((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 8, 9, 1), ).setIndexNames((0, "IEEE8021-PAE-MIB", "dot1xPaePortNumber")) if mibBuilder.loadTexts: cpaeMabPortIpDevTrackConfEntry.setStatus('current') if mibBuilder.loadTexts: cpaeMabPortIpDevTrackConfEntry.setDescription('An entry of MAC Auth-Bypass configuration for IP Device Tracking on an MAC Auth-Bypass capable interface.') cpaeMabPortIpDevTrackEnabled = MibTableColumn((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 8, 9, 1, 1), TruthValue()).setMaxAccess("readwrite") if mibBuilder.loadTexts: cpaeMabPortIpDevTrackEnabled.setStatus('current') if mibBuilder.loadTexts: cpaeMabPortIpDevTrackEnabled.setDescription('Specifies whether IP Device Tracking is enabled or not on this port for the corresponding MAC Auth-bypass authenticated host.') cpaeWebAuth = MibIdentifier((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 9)) cpaeWebAuthEnabled = MibScalar((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 9, 1), TruthValue()).setMaxAccess("readwrite") if mibBuilder.loadTexts: cpaeWebAuthEnabled.setStatus('current') if mibBuilder.loadTexts: cpaeWebAuthEnabled.setDescription('Specifies whether Web Proxy Authentication is enabled in the system.') cpaeWebAuthSessionPeriod = MibScalar((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 9, 2), Unsigned32()).setUnits('seconds').setMaxAccess("readwrite") if mibBuilder.loadTexts: cpaeWebAuthSessionPeriod.setStatus('current') if mibBuilder.loadTexts: cpaeWebAuthSessionPeriod.setDescription('Specifies the Web Proxy Authentication session period for the system. Session period is the time after which an Web Proxy Authenticated session is terminated.') cpaeWebAuthLoginPage = MibScalar((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 9, 3), CiscoURLString()).setMaxAccess("readwrite") if mibBuilder.loadTexts: cpaeWebAuthLoginPage.setStatus('current') if mibBuilder.loadTexts: cpaeWebAuthLoginPage.setDescription('Specifies the customized login page for Web Proxy Authentication, in the format of an URL. A customized login page is required to support the same input fields as the default login page for users to input credentials. If this object contains a zero length string, the default login page will be used.') cpaeWebAuthLoginFailedPage = MibScalar((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 9, 4), CiscoURLString()).setMaxAccess("readwrite") if mibBuilder.loadTexts: cpaeWebAuthLoginFailedPage.setStatus('current') if mibBuilder.loadTexts: cpaeWebAuthLoginFailedPage.setDescription('Specifies the customized login-failed page for Web Proxy Authentication, in the format of an URL. Login-failed page is sent back to the client upon an authentication failure. A login-failed page requires to have all the input fields of the login page, in addition to the authentication failure information. If this object contains a zero length string, the default login-failed page will be used.') cpaeWebAuthQuietPeriod = MibScalar((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 9, 5), Unsigned32()).setUnits('seconds').setMaxAccess("readwrite") if mibBuilder.loadTexts: cpaeWebAuthQuietPeriod.setStatus('current') if mibBuilder.loadTexts: cpaeWebAuthQuietPeriod.setDescription("Specifies the time a Web Proxy Authentication state machine will be held in 'blackListed' state after maximum authentication attempts.") cpaeWebAuthMaxRetries = MibScalar((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 9, 6), Unsigned32()).setMaxAccess("readwrite") if mibBuilder.loadTexts: cpaeWebAuthMaxRetries.setStatus('current') if mibBuilder.loadTexts: cpaeWebAuthMaxRetries.setDescription('Specifies the maximum number of unsuccessful login attempts a user is allowed to make.') cpaeWebAuthPortTable = MibTable((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 9, 7), ) if mibBuilder.loadTexts: cpaeWebAuthPortTable.setStatus('current') if mibBuilder.loadTexts: cpaeWebAuthPortTable.setDescription('A table of Web Proxy Authentication configuration and information for the feature capable ports in the device.') cpaeWebAuthPortEntry = MibTableRow((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 9, 7, 1), ).setIndexNames((0, "IEEE8021-PAE-MIB", "dot1xPaePortNumber")) if mibBuilder.loadTexts: cpaeWebAuthPortEntry.setStatus('current') if mibBuilder.loadTexts: cpaeWebAuthPortEntry.setDescription('An entry containing management information for Web Proxy Authentication feature on a port.') cpaeWebAuthPortEnabled = MibTableColumn((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 9, 7, 1, 1), TruthValue()).setMaxAccess("readwrite") if mibBuilder.loadTexts: cpaeWebAuthPortEnabled.setStatus('current') if mibBuilder.loadTexts: cpaeWebAuthPortEnabled.setDescription('Specifies whether Web Proxy Authentication is enabled on the port.') cpaeWebAuthPortInitialize = MibTableColumn((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 9, 7, 1, 2), TruthValue()).setMaxAccess("readwrite") if mibBuilder.loadTexts: cpaeWebAuthPortInitialize.setStatus('current') if mibBuilder.loadTexts: cpaeWebAuthPortInitialize.setDescription("The initialization control for this port. Setting this object to 'true' causes Web Proxy Authentication state machine to be initialized for all the hosts connecting to the port. Setting this object to 'false' has no effect. This object always returns 'false' when it is read.") cpaeWebAuthPortAaaFailPolicy = MibTableColumn((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 9, 7, 1, 3), CpgPolicyNameOrEmpty()).setMaxAccess("readwrite") if mibBuilder.loadTexts: cpaeWebAuthPortAaaFailPolicy.setStatus('current') if mibBuilder.loadTexts: cpaeWebAuthPortAaaFailPolicy.setDescription("Specifies the policy name to be applied on the port when the corresponding cpaeWebAuthHostState is 'aaaFail'. The specified policy name must either be an existing entry in cpgPolicyTable defined in CISCO-POLICY-GROUP-MIB, or an empty string which indicates that there will be no policy name applied on the port when the corresponding cpaeWebAuthHostState is 'aaaFail'.") cpaeWebAuthPortIpDevTrackEnabled = MibTableColumn((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 9, 7, 1, 4), TruthValue()).setMaxAccess("readwrite") if mibBuilder.loadTexts: cpaeWebAuthPortIpDevTrackEnabled.setStatus('current') if mibBuilder.loadTexts: cpaeWebAuthPortIpDevTrackEnabled.setDescription('Specifies whether IP Device Tracking is enabled or not on this port for the corresponding Web Proxy authenticated host.') cpaeWebAuthHostTable = MibTable((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 9, 8), ) if mibBuilder.loadTexts: cpaeWebAuthHostTable.setStatus('current') if mibBuilder.loadTexts: cpaeWebAuthHostTable.setDescription('A table of Web Proxy Authentication information for hosts currently managed by the feature. An entry is added to the table when a host is detected and Web Proxy Authentication state machine is initiated for the host.') cpaeWebAuthHostEntry = MibTableRow((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 9, 8, 1), ).setIndexNames((0, "IEEE8021-PAE-MIB", "dot1xPaePortNumber"), (0, "CISCO-PAE-MIB", "cpaeWebAuthHostAddrType"), (0, "CISCO-PAE-MIB", "cpaeWebAuthHostAddress")) if mibBuilder.loadTexts: cpaeWebAuthHostEntry.setStatus('current') if mibBuilder.loadTexts: cpaeWebAuthHostEntry.setDescription('An entry containing management information for Web Proxy Authentication feature on a host.') cpaeWebAuthHostAddrType = MibTableColumn((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 9, 8, 1, 1), InetAddressType()) if mibBuilder.loadTexts: cpaeWebAuthHostAddrType.setStatus('current') if mibBuilder.loadTexts: cpaeWebAuthHostAddrType.setDescription('Indicates the Internet address type for the host.') cpaeWebAuthHostAddress = MibTableColumn((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 9, 8, 1, 2), InetAddress().subtype(subtypeSpec=ValueSizeConstraint(0, 64))) if mibBuilder.loadTexts: cpaeWebAuthHostAddress.setStatus('current') if mibBuilder.loadTexts: cpaeWebAuthHostAddress.setDescription('Indicates the Internet address for the host. The type of this address is determined by the value of cpaeWebAuthHostAddrType.') cpaeWebAuthAaaSessionPeriod = MibTableColumn((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 9, 8, 1, 3), Unsigned32()).setUnits('seconds').setMaxAccess("readonly") if mibBuilder.loadTexts: cpaeWebAuthAaaSessionPeriod.setStatus('current') if mibBuilder.loadTexts: cpaeWebAuthAaaSessionPeriod.setDescription('Indicates the session period for a Web Proxy Authenticated session on this host, supplied by the AAA server. If value of this object is none zero, it will take precedence over the period specified by cpaeWebAuthPortSessionPeriod.') cpaeWebAuthHostSessionTimeLeft = MibTableColumn((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 9, 8, 1, 4), Unsigned32()).setUnits('seconds').setMaxAccess("readonly") if mibBuilder.loadTexts: cpaeWebAuthHostSessionTimeLeft.setStatus('current') if mibBuilder.loadTexts: cpaeWebAuthHostSessionTimeLeft.setDescription('Indicates the leftover time of the current Web Proxy Authenticated session for this host.') cpaeWebAuthHostState = MibTableColumn((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 9, 8, 1, 5), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(1, 2, 3, 4, 5, 6, 7, 8, 9))).clone(namedValues=NamedValues(("initialize", 1), ("connecting", 2), ("authenticating", 3), ("authenticated", 4), ("authFailed", 5), ("parseError", 6), ("sessionTimeout", 7), ("blackListed", 8), ("aaaFail", 9)))).setMaxAccess("readonly") if mibBuilder.loadTexts: cpaeWebAuthHostState.setStatus('current') if mibBuilder.loadTexts: cpaeWebAuthHostState.setDescription("Indicates the current state of the Web Proxy Authentication state machine. initialize : Initial state of the Web Proxy Authentication state machine. connecting : Login page is sent to the client, waiting for response from the client. authenticating: Credentials are extracted from client's response and authenticating with the AAA server. authenticated : Web Proxy Authentication succeeded. Session timer is started, policies are applied, and success page is sent back to client. authFailed : Web Proxy Authentication failed. Login page is resent with authentication failure information embedded, if retry count has not exceeded the maximum number of retry attempts. Otherwise, move to 'blackListed' state. parseError : Failed to extract user's credentials from the client's response. sessionTimeout: Session timer expired, user's policies are removed, state machine will moves to 'initialize' state after that. blackListed : Web Proxy Authentication retry count has exceeded the maximum number of retry attempts. Only setting the state machine to 'initialize' will take it out of this state. aaaFail : AAA server is not reachable after sending the authentication request, or after host has been in 'blackListed' state for the period of time specified by cpaeWebAuthQuietPeriod, with IAB (Inaccessible Authentication Bypass) enabled on the corresponding port connected to the host.") cpaeWebAuthHostInitialize = MibTableColumn((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 9, 8, 1, 6), TruthValue()).setMaxAccess("readwrite") if mibBuilder.loadTexts: cpaeWebAuthHostInitialize.setStatus('current') if mibBuilder.loadTexts: cpaeWebAuthHostInitialize.setDescription("The initialization control for this host. Setting this object to 'true' causes Web Proxy Authentication state machine to be initialized for the host. Setting this object to 'false' has no effect. This object always returns 'false' when it is read.") cpaeWebAuthCriticalRecoveryDelay = MibScalar((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 9, 9), Unsigned32()).setUnits('milli-seconds').setMaxAccess("readwrite") if mibBuilder.loadTexts: cpaeWebAuthCriticalRecoveryDelay.setStatus('current') if mibBuilder.loadTexts: cpaeWebAuthCriticalRecoveryDelay.setDescription('This object specifies the critical recovery delay time for Web Proxy Authentication in the system. A value of zero indicates that critical recovery delay for Web Proxy Authentication is disabled.') cpaeWebAuthUnAuthStateTimeout = MibScalar((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 9, 10), Unsigned32().subtype(subtypeSpec=ValueRangeConstraint(1, 4294967295))).setUnits('minutes').setMaxAccess("readwrite") if mibBuilder.loadTexts: cpaeWebAuthUnAuthStateTimeout.setStatus('current') if mibBuilder.loadTexts: cpaeWebAuthUnAuthStateTimeout.setDescription("The authentication timeout period for Web Proxy Authentication. Once a host enters 'initialize' state as indicated by its corresponding cpaeWebAuthHostState, such host will be removed if it can not be authenticated within the timeout period.") cpaeAuthConfigTable = MibTable((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 10), ) if mibBuilder.loadTexts: cpaeAuthConfigTable.setStatus('current') if mibBuilder.loadTexts: cpaeAuthConfigTable.setDescription('A table containing the configuration objects for the Authenticator PAE associated with each port. An entry appears in this table for each PAE port that may authenticate access to itself. This table contain additional objects for the dot1xAuthConfigTable.') cpaeAuthConfigEntry = MibTableRow((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 10, 1), ) dot1xAuthConfigEntry.registerAugmentions(("CISCO-PAE-MIB", "cpaeAuthConfigEntry")) cpaeAuthConfigEntry.setIndexNames(*dot1xAuthConfigEntry.getIndexNames()) if mibBuilder.loadTexts: cpaeAuthConfigEntry.setStatus('current') if mibBuilder.loadTexts: cpaeAuthConfigEntry.setDescription('An entry containing additional management information applicable to a particular Authenticator PAE.') cpaeAuthReAuthPeriodSrcAdmin = MibTableColumn((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 10, 1, 1), ReAuthPeriodSource()).setMaxAccess("readwrite") if mibBuilder.loadTexts: cpaeAuthReAuthPeriodSrcAdmin.setStatus('current') if mibBuilder.loadTexts: cpaeAuthReAuthPeriodSrcAdmin.setDescription('Specifies the source of the reAuthPeriod constant to be used by the Reauthentication Timer state machine.') cpaeAuthReAuthPeriodSrcOper = MibTableColumn((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 10, 1, 2), ReAuthPeriodSource()).setMaxAccess("readonly") if mibBuilder.loadTexts: cpaeAuthReAuthPeriodSrcOper.setStatus('current') if mibBuilder.loadTexts: cpaeAuthReAuthPeriodSrcOper.setDescription('Indicates the source of the reAuthPeriod constant currently in use by the Reauthentication Timer state machine.') cpaeAuthReAuthPeriodOper = MibTableColumn((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 10, 1, 3), Unsigned32()).setUnits('seconds').setMaxAccess("readonly") if mibBuilder.loadTexts: cpaeAuthReAuthPeriodOper.setStatus('current') if mibBuilder.loadTexts: cpaeAuthReAuthPeriodOper.setDescription('Indicates the operational reauthentication period for this port.') cpaeAuthTimeToNextReAuth = MibTableColumn((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 10, 1, 4), Unsigned32()).setUnits('seconds').setMaxAccess("readonly") if mibBuilder.loadTexts: cpaeAuthTimeToNextReAuth.setStatus('current') if mibBuilder.loadTexts: cpaeAuthTimeToNextReAuth.setDescription('Indicates the leftover time of the current session for this port.') cpaeAuthReAuthAction = MibTableColumn((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 10, 1, 5), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(1, 2, 3))).clone(namedValues=NamedValues(("terminate", 1), ("reAuth", 2), ("noReAuth", 3)))).setMaxAccess("readonly") if mibBuilder.loadTexts: cpaeAuthReAuthAction.setStatus('current') if mibBuilder.loadTexts: cpaeAuthReAuthAction.setDescription("Indicates the reauthentication action for this port. terminate: Session will be terminated, with the corresponding Authenticator PAE state machine transits to 'disconnected'. reAuth : The port will be reauthenticated. noReAuth : The port will not be reauthenticated.") cpaeAuthReAuthMax = MibTableColumn((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 10, 1, 6), Unsigned32()).setMaxAccess("readwrite") if mibBuilder.loadTexts: cpaeAuthReAuthMax.setReference('IEEE Std 802.1X-2004, 8.2.4.1.2, reAuthMax') if mibBuilder.loadTexts: cpaeAuthReAuthMax.setStatus('current') if mibBuilder.loadTexts: cpaeAuthReAuthMax.setDescription('This object specifies the number of reauthentication attempts that are permitted before the port becomes unauthorized. The value of this object is used as the reAuthMax constant by the Authenticator PAE state machine.') cpaeAuthIabEnabled = MibTableColumn((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 10, 1, 7), TruthValue()).setMaxAccess("readwrite") if mibBuilder.loadTexts: cpaeAuthIabEnabled.setStatus('current') if mibBuilder.loadTexts: cpaeAuthIabEnabled.setDescription("Specifies whether the PAE port is declared as Inaccessible Authentication Bypass (IAB). IAB ports will be granted network access via the administrative configured VLAN if it failed to connect to the Authentication server. The only way to bring an IAB port back to the Backend Authentication state machine is through setting dot1xPaePortInitialize in the corresponding entry in dot1xPaePortTable to 'true'. 802.1x reauthentication will be temporary disabled on an authenticated IAB port if the connection to the Authentication server is broken, and enable again when the connection is resumed.") cpaeAuthPaeState = MibTableColumn((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 10, 1, 8), CpaeAuthState()).setMaxAccess("readonly") if mibBuilder.loadTexts: cpaeAuthPaeState.setStatus('current') if mibBuilder.loadTexts: cpaeAuthPaeState.setDescription('Indicates the current value of the Authenticator PAE state machine on the port.') cpaeHostInfoTable = MibTable((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 11), ) if mibBuilder.loadTexts: cpaeHostInfoTable.setStatus('current') if mibBuilder.loadTexts: cpaeHostInfoTable.setDescription('A table containing 802.1x authentication information for hosts connecting to PAE ports in the system.') cpaeHostInfoEntry = MibTableRow((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 11, 1), ).setIndexNames((0, "IEEE8021-PAE-MIB", "dot1xPaePortNumber"), (0, "CISCO-PAE-MIB", "cpaeHostInfoHostIndex")) if mibBuilder.loadTexts: cpaeHostInfoEntry.setStatus('current') if mibBuilder.loadTexts: cpaeHostInfoEntry.setDescription('An entry appears in the table for each 802.1x capable host connecting to an PAE port, providing its authentication information.') cpaeHostInfoHostIndex = MibTableColumn((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 11, 1, 1), Unsigned32()) if mibBuilder.loadTexts: cpaeHostInfoHostIndex.setStatus('current') if mibBuilder.loadTexts: cpaeHostInfoHostIndex.setDescription('An arbitrary index assigned by the agent to identify the host.') cpaeHostInfoMacAddress = MibTableColumn((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 11, 1, 2), MacAddress()).setMaxAccess("readonly") if mibBuilder.loadTexts: cpaeHostInfoMacAddress.setStatus('current') if mibBuilder.loadTexts: cpaeHostInfoMacAddress.setDescription('Indicates the Mac Address of the host.') cpaeHostInfoPostureToken = MibTableColumn((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 11, 1, 3), CnnEouPostureToken()).setMaxAccess("readonly") if mibBuilder.loadTexts: cpaeHostInfoPostureToken.setStatus('obsolete') if mibBuilder.loadTexts: cpaeHostInfoPostureToken.setDescription('Indicates the posture token assigned to the host. This object has been obsoleted and replaced by cpaeHostPostureTokenStr.') cpaeHostInfoUserName = MibTableColumn((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 11, 1, 4), SnmpAdminString()).setMaxAccess("readonly") if mibBuilder.loadTexts: cpaeHostInfoUserName.setStatus('current') if mibBuilder.loadTexts: cpaeHostInfoUserName.setDescription('Indicates the name of the authenticated user on the host.') cpaeHostInfoAddrType = MibTableColumn((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 11, 1, 5), InetAddressType()).setMaxAccess("readonly") if mibBuilder.loadTexts: cpaeHostInfoAddrType.setStatus('current') if mibBuilder.loadTexts: cpaeHostInfoAddrType.setDescription('Indicates the type of Internet address of the host.') cpaeHostInfoAddr = MibTableColumn((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 11, 1, 6), InetAddress()).setMaxAccess("readonly") if mibBuilder.loadTexts: cpaeHostInfoAddr.setStatus('current') if mibBuilder.loadTexts: cpaeHostInfoAddr.setDescription('Indicates the Internet address of the host. The type of this address is determined by the value of cpaeHostInfoAddrType object.') cpaeHostPostureTokenStr = MibTableColumn((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 11, 1, 7), CnnEouPostureTokenString()).setMaxAccess("readonly") if mibBuilder.loadTexts: cpaeHostPostureTokenStr.setStatus('current') if mibBuilder.loadTexts: cpaeHostPostureTokenStr.setDescription('Indicates the posture token assigned to the host.') cpaeHostUrlRedirection = MibTableColumn((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 11, 1, 8), SnmpAdminString()).setMaxAccess("readonly") if mibBuilder.loadTexts: cpaeHostUrlRedirection.setStatus('current') if mibBuilder.loadTexts: cpaeHostUrlRedirection.setDescription('Indicates the URL-redirection assigned for this host by AAA server.') cpaeHostAuthPaeState = MibTableColumn((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 11, 1, 9), CpaeAuthState()).setMaxAccess("readonly") if mibBuilder.loadTexts: cpaeHostAuthPaeState.setReference('802.1X-2001 9.4.1, Authenticator PAE state, 802.1X-2004 9.4.1, Authenticator PAE state') if mibBuilder.loadTexts: cpaeHostAuthPaeState.setStatus('current') if mibBuilder.loadTexts: cpaeHostAuthPaeState.setDescription('Indicates the current value of the Authenticator PAE state machine for the host.') cpaeHostBackendState = MibTableColumn((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 11, 1, 10), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(1, 2, 3, 4, 5, 6, 7, 8))).clone(namedValues=NamedValues(("request", 1), ("response", 2), ("success", 3), ("fail", 4), ("timeout", 5), ("idle", 6), ("initialize", 7), ("ignore", 8)))).setMaxAccess("readonly") if mibBuilder.loadTexts: cpaeHostBackendState.setReference('802.1X-2001 9.4.1, Backend Authentication state, 802.1X-2004 9.4.1, Backend Authentication state.') if mibBuilder.loadTexts: cpaeHostBackendState.setStatus('current') if mibBuilder.loadTexts: cpaeHostBackendState.setDescription('Indicates the current state of the Backend Authentication state machine of the host.') cpaeHostSessionId = MibTableColumn((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 11, 1, 11), OctetString().subtype(subtypeSpec=ValueSizeConstraint(1, 64))).setMaxAccess("readonly") if mibBuilder.loadTexts: cpaeHostSessionId.setStatus('current') if mibBuilder.loadTexts: cpaeHostSessionId.setDescription('A unique identifier of the 802.1x session.') cpaePortEapolTestLimits = MibScalar((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 12), Unsigned32()).setMaxAccess("readonly") if mibBuilder.loadTexts: cpaePortEapolTestLimits.setStatus('current') if mibBuilder.loadTexts: cpaePortEapolTestLimits.setDescription('Indicates the maximum number of entries allowed in cpaePortEapolTestTable.') cpaePortEapolTestTable = MibTable((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 13), ) if mibBuilder.loadTexts: cpaePortEapolTestTable.setStatus('current') if mibBuilder.loadTexts: cpaePortEapolTestTable.setDescription('A table for testing EAPOL (Extensible Authentication Protocol Over LAN) capable information of hosts connecting to PAE ports in the device.') cpaePortEapolTestEntry = MibTableRow((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 13, 1), ).setIndexNames((0, "IEEE8021-PAE-MIB", "dot1xPaePortNumber")) if mibBuilder.loadTexts: cpaePortEapolTestEntry.setStatus('current') if mibBuilder.loadTexts: cpaePortEapolTestEntry.setDescription('An entry containing EAPOL capable information for hosts connecting to a PAE port.') cpaePortEapolTestResult = MibTableColumn((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 13, 1, 1), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(1, 2, 3))).clone(namedValues=NamedValues(("inProgress", 1), ("notCapable", 2), ("capable", 3)))).setMaxAccess("readonly") if mibBuilder.loadTexts: cpaePortEapolTestResult.setStatus('current') if mibBuilder.loadTexts: cpaePortEapolTestResult.setDescription('Indicates the test result of whether there is EAPOL supporting host connecting to the port. inProgress: the test is in progress. notCapable: there is no EAPOL supporting host connecting to the port. capable : there is EAPOL supporting host connecting to the port.') cpaePortEapolTestStatus = MibTableColumn((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 13, 1, 2), RowStatus()).setMaxAccess("readcreate") if mibBuilder.loadTexts: cpaePortEapolTestStatus.setStatus('current') if mibBuilder.loadTexts: cpaePortEapolTestStatus.setDescription("This object is used to manage the creation, and deletion of rows in the table. An entry can be created by setting the instance value of this object to 'createAndGo', and deleted by setting the instance value of this object to 'destroy'.") cpaeCriticalConfig = MibIdentifier((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 14)) cpaeCriticalEapolEnabled = MibScalar((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 14, 1), TruthValue()).setMaxAccess("readwrite") if mibBuilder.loadTexts: cpaeCriticalEapolEnabled.setStatus('current') if mibBuilder.loadTexts: cpaeCriticalEapolEnabled.setDescription('Specifies if the device will send an EAPOL-Success message on successful Critical Authentication for a supplicant.') cpaeCriticalRecoveryDelay = MibScalar((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 14, 2), Unsigned32()).setUnits('milli-seconds').setMaxAccess("readwrite") if mibBuilder.loadTexts: cpaeCriticalRecoveryDelay.setStatus('current') if mibBuilder.loadTexts: cpaeCriticalRecoveryDelay.setDescription('This object specifies the critical recovery delay time for 802.1x in the system. A value of zero indicates that Critical Authentication recovery delay for 802.1x is disabled.') cpaePortIpDevTrackConfigTable = MibTable((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 15), ) if mibBuilder.loadTexts: cpaePortIpDevTrackConfigTable.setStatus('current') if mibBuilder.loadTexts: cpaePortIpDevTrackConfigTable.setDescription('A table of IP Device Tracking configuration for PAE ports in the system.') cpaePortIpDevTrackConfigEntry = MibTableRow((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 15, 1), ).setIndexNames((0, "IEEE8021-PAE-MIB", "dot1xPaePortNumber")) if mibBuilder.loadTexts: cpaePortIpDevTrackConfigEntry.setStatus('current') if mibBuilder.loadTexts: cpaePortIpDevTrackConfigEntry.setDescription('An entry of IP Device Tracking configuration on a PAE port.') cpaePortIpDevTrackEnabled = MibTableColumn((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 15, 1, 1), TruthValue()).setMaxAccess("readwrite") if mibBuilder.loadTexts: cpaePortIpDevTrackEnabled.setStatus('current') if mibBuilder.loadTexts: cpaePortIpDevTrackEnabled.setDescription('Specifies if IP Device Tracking is enabled on this port for the corresponding 802.1x authenticated host.') cpaeGlobalAuthFailMaxAttempts = MibScalar((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 16), Unsigned32().subtype(subtypeSpec=ValueRangeConstraint(1, 4294967295))).setMaxAccess("readwrite") if mibBuilder.loadTexts: cpaeGlobalAuthFailMaxAttempts.setStatus('current') if mibBuilder.loadTexts: cpaeGlobalAuthFailMaxAttempts.setDescription('A global configuration to specify the maximum number of authentication attempts that should be made before a port is moved into its Auth-Fail VLAN.') cpaeGlobalSecViolationAction = MibScalar((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 17), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(1, 2))).clone(namedValues=NamedValues(("restrict", 1), ("shutdown", 2)))).setMaxAccess("readwrite") if mibBuilder.loadTexts: cpaeGlobalSecViolationAction.setStatus('current') if mibBuilder.loadTexts: cpaeGlobalSecViolationAction.setDescription('A global configuration to specify the action that will be applied to a PAE port upon reception of a security violation event. restrict: Packets from MAC address of the device causing security violation will be dropped. shutdown: The port that causes security violation will be shutdown.') cpaeDot1xSuppToGuestVlanAllowed = MibScalar((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 18), TruthValue()).setMaxAccess("readwrite") if mibBuilder.loadTexts: cpaeDot1xSuppToGuestVlanAllowed.setStatus('current') if mibBuilder.loadTexts: cpaeDot1xSuppToGuestVlanAllowed.setDescription('Specifies whether ports associated with 802.1x supplicants are allowed to move to Guest Vlan when they stop responding to EAPOL inquiries.') cpaeSupplicantObjects = MibIdentifier((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 19)) cpaeSuppPortTable = MibTable((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 19, 1), ) if mibBuilder.loadTexts: cpaeSuppPortTable.setStatus('current') if mibBuilder.loadTexts: cpaeSuppPortTable.setDescription('A list of objects providing information and configuration for the Supplicant PAE associated with each port. This table provides additional objects for the dot1xSuppConfigTable.') cpaeSuppPortEntry = MibTableRow((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 19, 1, 1), ).setIndexNames((0, "IEEE8021-PAE-MIB", "dot1xPaePortNumber")) if mibBuilder.loadTexts: cpaeSuppPortEntry.setStatus('current') if mibBuilder.loadTexts: cpaeSuppPortEntry.setDescription('An entry containing supplicant configuration information for a particular PAE port.') cpaeSuppPortCredentialProfileName = MibTableColumn((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 19, 1, 1, 1), SnmpAdminString()).setMaxAccess("readwrite") if mibBuilder.loadTexts: cpaeSuppPortCredentialProfileName.setStatus('current') if mibBuilder.loadTexts: cpaeSuppPortCredentialProfileName.setDescription('Specifies the credentials profile of the Supplicant PAE. A zero length string for this object indicates that the Supplicant PAE does not have credential profile.') cpaeSuppPortEapProfileName = MibTableColumn((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 19, 1, 1, 2), SnmpAdminString()).setMaxAccess("readwrite") if mibBuilder.loadTexts: cpaeSuppPortEapProfileName.setStatus('current') if mibBuilder.loadTexts: cpaeSuppPortEapProfileName.setDescription('Specifies the EAP profile of the Supplicant PAE. A zero length string for this object indicates that the Supplicant PAE does not have EAP profile.') cpaeSuppHostInfoTable = MibTable((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 19, 2), ) if mibBuilder.loadTexts: cpaeSuppHostInfoTable.setStatus('current') if mibBuilder.loadTexts: cpaeSuppHostInfoTable.setDescription('A list of dot1x supplicants in the system.') cpaeSuppHostInfoEntry = MibTableRow((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 19, 2, 1), ).setIndexNames((0, "IEEE8021-PAE-MIB", "dot1xPaePortNumber"), (0, "CISCO-PAE-MIB", "cpaeSuppHostInfoSuppIndex")) if mibBuilder.loadTexts: cpaeSuppHostInfoEntry.setStatus('current') if mibBuilder.loadTexts: cpaeSuppHostInfoEntry.setDescription('An entry containing dot1x supplicant information for a supplicant on a particular PAE port in the system.') cpaeSuppHostInfoSuppIndex = MibTableColumn((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 19, 2, 1, 1), Unsigned32().subtype(subtypeSpec=ValueRangeConstraint(1, 65535))) if mibBuilder.loadTexts: cpaeSuppHostInfoSuppIndex.setStatus('current') if mibBuilder.loadTexts: cpaeSuppHostInfoSuppIndex.setDescription('An arbitrary index assigned by the agent to identify the supplicant.') cpaeSuppHostAuthMacAddress = MibTableColumn((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 19, 2, 1, 2), MacAddress()).setMaxAccess("readonly") if mibBuilder.loadTexts: cpaeSuppHostAuthMacAddress.setStatus('current') if mibBuilder.loadTexts: cpaeSuppHostAuthMacAddress.setDescription('Indicates the MAC address of the authenticator, which authenticates the supplicant.') cpaeSuppHostPaeState = MibTableColumn((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 19, 2, 1, 3), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(1, 2, 3, 4, 5, 6, 7, 8, 9, 10))).clone(namedValues=NamedValues(("disconnected", 1), ("logoff", 2), ("connecting", 3), ("authenticating", 4), ("authenticated", 5), ("acquired", 6), ("held", 7), ("restart", 8), ("sForceAuth", 9), ("sForceUnauth", 10)))).setMaxAccess("readonly") if mibBuilder.loadTexts: cpaeSuppHostPaeState.setReference('802.1X-2004 9.5.1, Supplicant PAE State') if mibBuilder.loadTexts: cpaeSuppHostPaeState.setStatus('current') if mibBuilder.loadTexts: cpaeSuppHostPaeState.setDescription('Indicates the current state of the Supplicant PAE State machine.') cpaeSuppHostBackendState = MibTableColumn((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 19, 2, 1, 4), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(1, 2, 3, 4, 5, 6, 7, 8))).clone(namedValues=NamedValues(("initialize", 1), ("idle", 2), ("request", 3), ("response", 4), ("receive", 5), ("fail", 6), ("success", 7), ("timeout", 8)))).setMaxAccess("readonly") if mibBuilder.loadTexts: cpaeSuppHostBackendState.setReference('802.1X-2004 9.5.1, Backend Supplicant state') if mibBuilder.loadTexts: cpaeSuppHostBackendState.setStatus('current') if mibBuilder.loadTexts: cpaeSuppHostBackendState.setDescription('Indicates the current state of the Supplicant Backend state machine.') cpaeSuppHostStatus = MibTableColumn((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 19, 2, 1, 5), PaeControlledPortStatus()).setMaxAccess("readonly") if mibBuilder.loadTexts: cpaeSuppHostStatus.setReference('802.1X-2004 9.5.1, SuppControlledPortStatus') if mibBuilder.loadTexts: cpaeSuppHostStatus.setStatus('current') if mibBuilder.loadTexts: cpaeSuppHostStatus.setDescription('Indicates the status of the supplicant.') cpaeNoGuestVlanNotif = NotificationType((1, 3, 6, 1, 4, 1, 9, 9, 220, 0, 1)).setObjects(("IEEE8021-PAE-MIB", "dot1xAuthPaeState")) if mibBuilder.loadTexts: cpaeNoGuestVlanNotif.setStatus('current') if mibBuilder.loadTexts: cpaeNoGuestVlanNotif.setDescription("A cpaeNoGuestVlanNotif is sent if a non-802.1x supplicant is detected on a PAE port for which the value of corresponding instance of dot1xAuthAuthControlledPortControl is 'auto' and the value of corresponding instance of cpaeGuestVlanNumber is zero.") cpaeNoAuthFailVlanNotif = NotificationType((1, 3, 6, 1, 4, 1, 9, 9, 220, 0, 2)).setObjects(("IEEE8021-PAE-MIB", "dot1xAuthPaeState")) if mibBuilder.loadTexts: cpaeNoAuthFailVlanNotif.setStatus('current') if mibBuilder.loadTexts: cpaeNoAuthFailVlanNotif.setDescription("A cpaeNoAuthFailVlanNotif is sent if a 802.1x supplicant fails to authenticate on a PAE port for which the value of corresponding instance of dot1xAuthAuthControlledPortControl is 'auto' and the value of corresponding instance of cpaePortAuthFailVlan is zero.") cpaeGuestVlanNotif = NotificationType((1, 3, 6, 1, 4, 1, 9, 9, 220, 0, 3)).setObjects(("CISCO-PAE-MIB", "cpaeGuestVlanNumber"), ("IEEE8021-PAE-MIB", "dot1xAuthPaeState")) if mibBuilder.loadTexts: cpaeGuestVlanNotif.setStatus('current') if mibBuilder.loadTexts: cpaeGuestVlanNotif.setDescription("A cpaeGuestVlanNotif is sent if value of the instance of cpaeGuestVlanNotifEnable is set to 'true', and a PAE port is being moved to the VLAN specified by value of the corresponding instance of cpaeGuestVlanNumber.") cpaeAuthFailVlanNotif = NotificationType((1, 3, 6, 1, 4, 1, 9, 9, 220, 0, 4)).setObjects(("CISCO-PAE-MIB", "cpaePortAuthFailVlan"), ("IEEE8021-PAE-MIB", "dot1xAuthPaeState")) if mibBuilder.loadTexts: cpaeAuthFailVlanNotif.setStatus('current') if mibBuilder.loadTexts: cpaeAuthFailVlanNotif.setDescription("A cpaeAuthFailVlanNotif is sent if value of the instance of cpaeAuthFailVlanNotifEnable is set to 'true', and a PAE port is being moved to the VLAN specified by value of the corresponding instance of cpaePortAuthFailVlan.") cpaeMIBCompliances = MibIdentifier((1, 3, 6, 1, 4, 1, 9, 9, 220, 2, 1)) cpaeMIBGroups = MibIdentifier((1, 3, 6, 1, 4, 1, 9, 9, 220, 2, 2)) cpaeCompliance = ModuleCompliance((1, 3, 6, 1, 4, 1, 9, 9, 220, 2, 1, 1)).setObjects(("CISCO-PAE-MIB", "cpaeMultipleHostGroup")) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): cpaeCompliance = cpaeCompliance.setStatus('deprecated') if mibBuilder.loadTexts: cpaeCompliance.setDescription('The compliance statement for devices that implement the CISCO-PAE-MIB.') cpaeCompliance2 = ModuleCompliance((1, 3, 6, 1, 4, 1, 9, 9, 220, 2, 1, 2)).setObjects(("CISCO-PAE-MIB", "cpaePortEntryGroup"), ("CISCO-PAE-MIB", "cpaeGuestVlanGroup")) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): cpaeCompliance2 = cpaeCompliance2.setStatus('deprecated') if mibBuilder.loadTexts: cpaeCompliance2.setDescription('The compliance statement for devices that implement the CISCO-PAE-MIB.') cpaeCompliance3 = ModuleCompliance((1, 3, 6, 1, 4, 1, 9, 9, 220, 2, 1, 3)).setObjects(("CISCO-PAE-MIB", "cpaePortEntryGroup"), ("CISCO-PAE-MIB", "cpaeGuestVlanGroup2"), ("CISCO-PAE-MIB", "cpaeShutdownTimeoutGroup")) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): cpaeCompliance3 = cpaeCompliance3.setStatus('deprecated') if mibBuilder.loadTexts: cpaeCompliance3.setDescription('The compliance statement for devices that implement the CISCO-PAE-MIB.') cpaeCompliance4 = ModuleCompliance((1, 3, 6, 1, 4, 1, 9, 9, 220, 2, 1, 4)).setObjects(("CISCO-PAE-MIB", "cpaePortEntryGroup"), ("CISCO-PAE-MIB", "cpaeGuestVlanGroup2"), ("CISCO-PAE-MIB", "cpaeShutdownTimeoutGroup"), ("CISCO-PAE-MIB", "cpaeRadiusConfigGroup"), ("CISCO-PAE-MIB", "cpaeUserGroupGroup")) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): cpaeCompliance4 = cpaeCompliance4.setStatus('deprecated') if mibBuilder.loadTexts: cpaeCompliance4.setDescription('The compliance statement for devices that implement the CISCO-PAE-MIB.') cpaeCompliance5 = ModuleCompliance((1, 3, 6, 1, 4, 1, 9, 9, 220, 2, 1, 5)).setObjects(("CISCO-PAE-MIB", "cpaePortEntryGroup"), ("CISCO-PAE-MIB", "cpaeGuestVlanGroup3"), ("CISCO-PAE-MIB", "cpaeShutdownTimeoutGroup"), ("CISCO-PAE-MIB", "cpaeRadiusConfigGroup"), ("CISCO-PAE-MIB", "cpaeUserGroupGroup"), ("CISCO-PAE-MIB", "cpaePortOperVlanGroup"), ("CISCO-PAE-MIB", "cpaePortAuthFailVlanGroup"), ("CISCO-PAE-MIB", "cpaeNoGuestVlanNotifEnableGrp"), ("CISCO-PAE-MIB", "cpaeNoAuthFailVlanNotifEnableGrp"), ("CISCO-PAE-MIB", "cpaeNoGuestVlanNotifGroup"), ("CISCO-PAE-MIB", "cpaeNoAuthFailVlanNotifGroup"), ("CISCO-PAE-MIB", "cpaeMacAuthBypassGroup"), ("CISCO-PAE-MIB", "cpaeWebAuthGroup"), ("CISCO-PAE-MIB", "cpaeAuthConfigGroup"), ("CISCO-PAE-MIB", "cpaeHostInfoGroup")) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): cpaeCompliance5 = cpaeCompliance5.setStatus('obsolete') if mibBuilder.loadTexts: cpaeCompliance5.setDescription('The compliance statement for devices that implement the CISCO-PAE-MIB.') cpaeCompliance6 = ModuleCompliance((1, 3, 6, 1, 4, 1, 9, 9, 220, 2, 1, 6)).setObjects(("CISCO-PAE-MIB", "cpaePortEntryGroup"), ("CISCO-PAE-MIB", "cpaeGuestVlanGroup3"), ("CISCO-PAE-MIB", "cpaeShutdownTimeoutGroup"), ("CISCO-PAE-MIB", "cpaeRadiusConfigGroup"), ("CISCO-PAE-MIB", "cpaeUserGroupGroup"), ("CISCO-PAE-MIB", "cpaePortOperVlanGroup"), ("CISCO-PAE-MIB", "cpaePortAuthFailVlanGroup"), ("CISCO-PAE-MIB", "cpaeNoGuestVlanNotifEnableGrp"), ("CISCO-PAE-MIB", "cpaeNoAuthFailVlanNotifEnableGrp"), ("CISCO-PAE-MIB", "cpaeNoGuestVlanNotifGroup"), ("CISCO-PAE-MIB", "cpaeNoAuthFailVlanNotifGroup"), ("CISCO-PAE-MIB", "cpaeMacAuthBypassGroup"), ("CISCO-PAE-MIB", "cpaeMacAuthBypassGroup2"), ("CISCO-PAE-MIB", "cpaeWebAuthGroup"), ("CISCO-PAE-MIB", "cpaeWebAuthAaaFailGroup"), ("CISCO-PAE-MIB", "cpaeHostInfoGroup2"), ("CISCO-PAE-MIB", "cpaePortEapolTestGroup"), ("CISCO-PAE-MIB", "cpaePortAuthFailVlanGroup2"), ("CISCO-PAE-MIB", "cpaeAuthConfigGroup"), ("CISCO-PAE-MIB", "cpaeAuthConfigGroup2"), ("CISCO-PAE-MIB", "cpaeCriticalRecoveryDelayGroup"), ("CISCO-PAE-MIB", "cpaeMacAuthBypassCriticalGroup"), ("CISCO-PAE-MIB", "cpaeWebAuthCriticalGroup")) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): cpaeCompliance6 = cpaeCompliance6.setStatus('deprecated') if mibBuilder.loadTexts: cpaeCompliance6.setDescription('The compliance statement for devices that implement the CISCO-PAE-MIB.') cpaeCompliance7 = ModuleCompliance((1, 3, 6, 1, 4, 1, 9, 9, 220, 2, 1, 7)).setObjects(("CISCO-PAE-MIB", "cpaePortEntryGroup"), ("CISCO-PAE-MIB", "cpaeGuestVlanGroup3"), ("CISCO-PAE-MIB", "cpaeShutdownTimeoutGroup"), ("CISCO-PAE-MIB", "cpaeRadiusConfigGroup"), ("CISCO-PAE-MIB", "cpaeUserGroupGroup"), ("CISCO-PAE-MIB", "cpaePortOperVlanGroup"), ("CISCO-PAE-MIB", "cpaePortAuthFailVlanGroup"), ("CISCO-PAE-MIB", "cpaeNoGuestVlanNotifEnableGrp"), ("CISCO-PAE-MIB", "cpaeNoAuthFailVlanNotifEnableGrp"), ("CISCO-PAE-MIB", "cpaeNoGuestVlanNotifGroup"), ("CISCO-PAE-MIB", "cpaeNoAuthFailVlanNotifGroup"), ("CISCO-PAE-MIB", "cpaeMacAuthBypassGroup"), ("CISCO-PAE-MIB", "cpaeMacAuthBypassGroup2"), ("CISCO-PAE-MIB", "cpaeMacAuthBypassGroup3"), ("CISCO-PAE-MIB", "cpaeWebAuthGroup"), ("CISCO-PAE-MIB", "cpaeWebAuthAaaFailGroup"), ("CISCO-PAE-MIB", "cpaeHostInfoGroup2"), ("CISCO-PAE-MIB", "cpaeHostInfoGroup3"), ("CISCO-PAE-MIB", "cpaePortEapolTestGroup"), ("CISCO-PAE-MIB", "cpaePortAuthFailVlanGroup2"), ("CISCO-PAE-MIB", "cpaeAuthConfigGroup"), ("CISCO-PAE-MIB", "cpaeAuthConfigGroup2"), ("CISCO-PAE-MIB", "cpaeCriticalRecoveryDelayGroup"), ("CISCO-PAE-MIB", "cpaeMacAuthBypassCriticalGroup"), ("CISCO-PAE-MIB", "cpaeWebAuthCriticalGroup"), ("CISCO-PAE-MIB", "cpaeHostPostureTokenGroup")) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): cpaeCompliance7 = cpaeCompliance7.setStatus('deprecated') if mibBuilder.loadTexts: cpaeCompliance7.setDescription('The compliance statement for devices that implement the CISCO-PAE-MIB.') cpaeCompliance8 = ModuleCompliance((1, 3, 6, 1, 4, 1, 9, 9, 220, 2, 1, 8)).setObjects(("CISCO-PAE-MIB", "cpaePortEntryGroup"), ("CISCO-PAE-MIB", "cpaeGuestVlanGroup3"), ("CISCO-PAE-MIB", "cpaeShutdownTimeoutGroup"), ("CISCO-PAE-MIB", "cpaeRadiusConfigGroup"), ("CISCO-PAE-MIB", "cpaeUserGroupGroup"), ("CISCO-PAE-MIB", "cpaePortOperVlanGroup"), ("CISCO-PAE-MIB", "cpaePortAuthFailVlanGroup"), ("CISCO-PAE-MIB", "cpaeNoGuestVlanNotifEnableGrp"), ("CISCO-PAE-MIB", "cpaeNoAuthFailVlanNotifEnableGrp"), ("CISCO-PAE-MIB", "cpaeNoGuestVlanNotifGroup"), ("CISCO-PAE-MIB", "cpaeNoAuthFailVlanNotifGroup"), ("CISCO-PAE-MIB", "cpaeMacAuthBypassGroup2"), ("CISCO-PAE-MIB", "cpaeMacAuthBypassGroup3"), ("CISCO-PAE-MIB", "cpaeWebAuthGroup"), ("CISCO-PAE-MIB", "cpaeWebAuthAaaFailGroup"), ("CISCO-PAE-MIB", "cpaeHostInfoGroup2"), ("CISCO-PAE-MIB", "cpaeHostInfoGroup3"), ("CISCO-PAE-MIB", "cpaePortEapolTestGroup"), ("CISCO-PAE-MIB", "cpaePortAuthFailVlanGroup2"), ("CISCO-PAE-MIB", "cpaeAuthConfigGroup2"), ("CISCO-PAE-MIB", "cpaeCriticalRecoveryDelayGroup"), ("CISCO-PAE-MIB", "cpaeMacAuthBypassCriticalGroup"), ("CISCO-PAE-MIB", "cpaeWebAuthCriticalGroup"), ("CISCO-PAE-MIB", "cpaeHostPostureTokenGroup"), ("CISCO-PAE-MIB", "cpaeMabAuditInfoGroup"), ("CISCO-PAE-MIB", "cpaeMabPortIpDevTrackConfGroup"), ("CISCO-PAE-MIB", "cpaePortIpDevTrackConfGroup"), ("CISCO-PAE-MIB", "cpaeHostUrlRedirectGroup"), ("CISCO-PAE-MIB", "cpaeWebAuthIpDevTrackingGroup"), ("CISCO-PAE-MIB", "cpaeWebAuthUnAuthTimeoutGroup"), ("CISCO-PAE-MIB", "cpaeGlobalAuthFailVlanGroup"), ("CISCO-PAE-MIB", "cpaeGlobalSecViolationGroup"), ("CISCO-PAE-MIB", "cpaeCriticalEapolConfigGroup"), ("CISCO-PAE-MIB", "cpaeMacAuthBypassPortEnableGroup"), ("CISCO-PAE-MIB", "cpaeMacAuthBypassGroup4"), ("CISCO-PAE-MIB", "cpaeAuthIabConfigGroup"), ("CISCO-PAE-MIB", "cpaeAuthConfigGroup3"), ("CISCO-PAE-MIB", "cpaeAuthConfigGroup4")) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): cpaeCompliance8 = cpaeCompliance8.setStatus('deprecated') if mibBuilder.loadTexts: cpaeCompliance8.setDescription('The compliance statement for devices that implement the CISCO-PAE-MIB.') cpaeCompliance9 = ModuleCompliance((1, 3, 6, 1, 4, 1, 9, 9, 220, 2, 1, 9)).setObjects(("CISCO-PAE-MIB", "cpaePortEntryGroup"), ("CISCO-PAE-MIB", "cpaeGuestVlanGroup3"), ("CISCO-PAE-MIB", "cpaeShutdownTimeoutGroup"), ("CISCO-PAE-MIB", "cpaeRadiusConfigGroup"), ("CISCO-PAE-MIB", "cpaeUserGroupGroup"), ("CISCO-PAE-MIB", "cpaePortOperVlanGroup"), ("CISCO-PAE-MIB", "cpaePortAuthFailVlanGroup"), ("CISCO-PAE-MIB", "cpaeNoGuestVlanNotifEnableGrp"), ("CISCO-PAE-MIB", "cpaeNoAuthFailVlanNotifEnableGrp"), ("CISCO-PAE-MIB", "cpaeNoGuestVlanNotifGroup"), ("CISCO-PAE-MIB", "cpaeNoAuthFailVlanNotifGroup"), ("CISCO-PAE-MIB", "cpaeMacAuthBypassGroup2"), ("CISCO-PAE-MIB", "cpaeMacAuthBypassGroup3"), ("CISCO-PAE-MIB", "cpaeWebAuthGroup"), ("CISCO-PAE-MIB", "cpaeWebAuthAaaFailGroup"), ("CISCO-PAE-MIB", "cpaeHostInfoGroup2"), ("CISCO-PAE-MIB", "cpaeHostInfoGroup3"), ("CISCO-PAE-MIB", "cpaePortEapolTestGroup"), ("CISCO-PAE-MIB", "cpaePortAuthFailVlanGroup2"), ("CISCO-PAE-MIB", "cpaeAuthConfigGroup2"), ("CISCO-PAE-MIB", "cpaeCriticalRecoveryDelayGroup"), ("CISCO-PAE-MIB", "cpaeMacAuthBypassCriticalGroup"), ("CISCO-PAE-MIB", "cpaeWebAuthCriticalGroup"), ("CISCO-PAE-MIB", "cpaeHostPostureTokenGroup"), ("CISCO-PAE-MIB", "cpaeMabAuditInfoGroup"), ("CISCO-PAE-MIB", "cpaeMabPortIpDevTrackConfGroup"), ("CISCO-PAE-MIB", "cpaePortIpDevTrackConfGroup"), ("CISCO-PAE-MIB", "cpaeHostUrlRedirectGroup"), ("CISCO-PAE-MIB", "cpaeWebAuthIpDevTrackingGroup"), ("CISCO-PAE-MIB", "cpaeWebAuthUnAuthTimeoutGroup"), ("CISCO-PAE-MIB", "cpaeGlobalAuthFailVlanGroup"), ("CISCO-PAE-MIB", "cpaeGlobalSecViolationGroup"), ("CISCO-PAE-MIB", "cpaeCriticalEapolConfigGroup"), ("CISCO-PAE-MIB", "cpaeMacAuthBypassPortEnableGroup"), ("CISCO-PAE-MIB", "cpaeMacAuthBypassGroup4"), ("CISCO-PAE-MIB", "cpaeAuthIabConfigGroup"), ("CISCO-PAE-MIB", "cpaeAuthConfigGroup3"), ("CISCO-PAE-MIB", "cpaeAuthConfigGroup4"), ("CISCO-PAE-MIB", "cpaeHostSessionIdGroup"), ("CISCO-PAE-MIB", "cpaeHostAuthInfoGroup"), ("CISCO-PAE-MIB", "cpaePortCapabilitiesConfigGroup"), ("CISCO-PAE-MIB", "cpaeDot1xSuppToGuestVlanGroup"), ("CISCO-PAE-MIB", "cpaeGuestVlanNotifEnableGroup"), ("CISCO-PAE-MIB", "cpaeGuestVlanNotifGroup"), ("CISCO-PAE-MIB", "cpaeAuthFailVlanNotifEnableGrp"), ("CISCO-PAE-MIB", "cpaeAuthFailVlanNotifGroup"), ("CISCO-PAE-MIB", "cpaePortAuthFailVlanConfigGroup"), ("CISCO-PAE-MIB", "cpaePortAuthFailUserInfoGroup")) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): cpaeCompliance9 = cpaeCompliance9.setStatus('deprecated') if mibBuilder.loadTexts: cpaeCompliance9.setDescription('The compliance statement for devices that implement the CISCO-PAE-MIB.') cpaeCompliance10 = ModuleCompliance((1, 3, 6, 1, 4, 1, 9, 9, 220, 2, 1, 10)).setObjects(("CISCO-PAE-MIB", "cpaePortEntryGroup"), ("CISCO-PAE-MIB", "cpaeGuestVlanGroup3"), ("CISCO-PAE-MIB", "cpaeShutdownTimeoutGroup"), ("CISCO-PAE-MIB", "cpaeRadiusConfigGroup"), ("CISCO-PAE-MIB", "cpaeUserGroupGroup"), ("CISCO-PAE-MIB", "cpaePortOperVlanGroup"), ("CISCO-PAE-MIB", "cpaeNoGuestVlanNotifEnableGrp"), ("CISCO-PAE-MIB", "cpaeNoAuthFailVlanNotifEnableGrp"), ("CISCO-PAE-MIB", "cpaeNoGuestVlanNotifGroup"), ("CISCO-PAE-MIB", "cpaeNoAuthFailVlanNotifGroup"), ("CISCO-PAE-MIB", "cpaeMacAuthBypassGroup2"), ("CISCO-PAE-MIB", "cpaeMacAuthBypassGroup3"), ("CISCO-PAE-MIB", "cpaeWebAuthGroup"), ("CISCO-PAE-MIB", "cpaeWebAuthAaaFailGroup"), ("CISCO-PAE-MIB", "cpaeHostInfoGroup2"), ("CISCO-PAE-MIB", "cpaeHostInfoGroup3"), ("CISCO-PAE-MIB", "cpaePortEapolTestGroup"), ("CISCO-PAE-MIB", "cpaePortAuthFailVlanGroup2"), ("CISCO-PAE-MIB", "cpaeAuthConfigGroup2"), ("CISCO-PAE-MIB", "cpaeCriticalRecoveryDelayGroup"), ("CISCO-PAE-MIB", "cpaeMacAuthBypassCriticalGroup"), ("CISCO-PAE-MIB", "cpaeWebAuthCriticalGroup"), ("CISCO-PAE-MIB", "cpaeHostPostureTokenGroup"), ("CISCO-PAE-MIB", "cpaeMabAuditInfoGroup"), ("CISCO-PAE-MIB", "cpaeMabPortIpDevTrackConfGroup"), ("CISCO-PAE-MIB", "cpaePortIpDevTrackConfGroup"), ("CISCO-PAE-MIB", "cpaeHostUrlRedirectGroup"), ("CISCO-PAE-MIB", "cpaeWebAuthIpDevTrackingGroup"), ("CISCO-PAE-MIB", "cpaeWebAuthUnAuthTimeoutGroup"), ("CISCO-PAE-MIB", "cpaeGlobalAuthFailVlanGroup"), ("CISCO-PAE-MIB", "cpaeGlobalSecViolationGroup"), ("CISCO-PAE-MIB", "cpaeCriticalEapolConfigGroup"), ("CISCO-PAE-MIB", "cpaeMacAuthBypassPortEnableGroup"), ("CISCO-PAE-MIB", "cpaeMacAuthBypassGroup4"), ("CISCO-PAE-MIB", "cpaeAuthIabConfigGroup"), ("CISCO-PAE-MIB", "cpaeAuthConfigGroup3"), ("CISCO-PAE-MIB", "cpaeAuthConfigGroup4"), ("CISCO-PAE-MIB", "cpaeHostSessionIdGroup"), ("CISCO-PAE-MIB", "cpaeHostAuthInfoGroup"), ("CISCO-PAE-MIB", "cpaePortCapabilitiesConfigGroup"), ("CISCO-PAE-MIB", "cpaeDot1xSuppToGuestVlanGroup"), ("CISCO-PAE-MIB", "cpaeGuestVlanNotifEnableGroup"), ("CISCO-PAE-MIB", "cpaeGuestVlanNotifGroup"), ("CISCO-PAE-MIB", "cpaeAuthFailVlanNotifEnableGrp"), ("CISCO-PAE-MIB", "cpaeAuthFailVlanNotifGroup"), ("CISCO-PAE-MIB", "cpaePortAuthFailVlanConfigGroup"), ("CISCO-PAE-MIB", "cpaePortAuthFailUserInfoGroup"), ("CISCO-PAE-MIB", "cpaeSuppPortProfileGroup"), ("CISCO-PAE-MIB", "cpaeSuppHostInfoGroup")) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): cpaeCompliance10 = cpaeCompliance10.setStatus('current') if mibBuilder.loadTexts: cpaeCompliance10.setDescription('The compliance statement for devices that implement the CISCO-PAE-MIB.') cpaeMultipleHostGroup = ObjectGroup((1, 3, 6, 1, 4, 1, 9, 9, 220, 2, 2, 1)).setObjects(("CISCO-PAE-MIB", "cpaeMultipleHost")) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): cpaeMultipleHostGroup = cpaeMultipleHostGroup.setStatus('deprecated') if mibBuilder.loadTexts: cpaeMultipleHostGroup.setDescription('A collection of objects that provide the multiple host configuration information for a PAE port. These are additional to the IEEE Std 802.1x PAE MIB.') cpaePortEntryGroup = ObjectGroup((1, 3, 6, 1, 4, 1, 9, 9, 220, 2, 2, 2)).setObjects(("CISCO-PAE-MIB", "cpaePortMode")) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): cpaePortEntryGroup = cpaePortEntryGroup.setStatus('current') if mibBuilder.loadTexts: cpaePortEntryGroup.setDescription('A collection of objects that provides the port-mode configuration for a PAE port.') cpaeGuestVlanGroup = ObjectGroup((1, 3, 6, 1, 4, 1, 9, 9, 220, 2, 2, 3)).setObjects(("CISCO-PAE-MIB", "cpaeGuestVlanId")) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): cpaeGuestVlanGroup = cpaeGuestVlanGroup.setStatus('deprecated') if mibBuilder.loadTexts: cpaeGuestVlanGroup.setDescription('A collection of objects that provides the Guest Vlan configuration information for the system.') cpaeGuestVlanGroup2 = ObjectGroup((1, 3, 6, 1, 4, 1, 9, 9, 220, 2, 2, 4)).setObjects(("CISCO-PAE-MIB", "cpaeGuestVlanNumber"), ("CISCO-PAE-MIB", "cpaeInGuestVlan")) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): cpaeGuestVlanGroup2 = cpaeGuestVlanGroup2.setStatus('deprecated') if mibBuilder.loadTexts: cpaeGuestVlanGroup2.setDescription('A collection of objects that provides the per-interface Guest Vlan configuration information for the system.') cpaeShutdownTimeoutGroup = ObjectGroup((1, 3, 6, 1, 4, 1, 9, 9, 220, 2, 2, 5)).setObjects(("CISCO-PAE-MIB", "cpaeShutdownTimeout"), ("CISCO-PAE-MIB", "cpaeShutdownTimeoutEnabled")) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): cpaeShutdownTimeoutGroup = cpaeShutdownTimeoutGroup.setStatus('current') if mibBuilder.loadTexts: cpaeShutdownTimeoutGroup.setDescription('A collection of objects that provides the dot1x shutdown timeout configuration information for the system.') cpaeRadiusConfigGroup = ObjectGroup((1, 3, 6, 1, 4, 1, 9, 9, 220, 2, 2, 6)).setObjects(("CISCO-PAE-MIB", "cpaeRadiusAccountingEnabled")) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): cpaeRadiusConfigGroup = cpaeRadiusConfigGroup.setStatus('current') if mibBuilder.loadTexts: cpaeRadiusConfigGroup.setDescription('A collection of objects that provides the RADIUS configuration information for the system.') cpaeUserGroupGroup = ObjectGroup((1, 3, 6, 1, 4, 1, 9, 9, 220, 2, 2, 7)).setObjects(("CISCO-PAE-MIB", "cpaeUserGroupUserName"), ("CISCO-PAE-MIB", "cpaeUserGroupUserAddrType"), ("CISCO-PAE-MIB", "cpaeUserGroupUserAddr"), ("CISCO-PAE-MIB", "cpaeUserGroupUserInterface"), ("CISCO-PAE-MIB", "cpaeUserGroupUserVlan")) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): cpaeUserGroupGroup = cpaeUserGroupGroup.setStatus('current') if mibBuilder.loadTexts: cpaeUserGroupGroup.setDescription('A collection of objects that provides the group manager information of authenticated users in the system.') cpaeGuestVlanGroup3 = ObjectGroup((1, 3, 6, 1, 4, 1, 9, 9, 220, 2, 2, 8)).setObjects(("CISCO-PAE-MIB", "cpaeGuestVlanNumber")) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): cpaeGuestVlanGroup3 = cpaeGuestVlanGroup3.setStatus('current') if mibBuilder.loadTexts: cpaeGuestVlanGroup3.setDescription('A collection of objects that provides the per-interface Guest Vlan configuration information for the system.') cpaePortOperVlanGroup = ObjectGroup((1, 3, 6, 1, 4, 1, 9, 9, 220, 2, 2, 9)).setObjects(("CISCO-PAE-MIB", "cpaePortOperVlan"), ("CISCO-PAE-MIB", "cpaePortOperVlanType")) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): cpaePortOperVlanGroup = cpaePortOperVlanGroup.setStatus('current') if mibBuilder.loadTexts: cpaePortOperVlanGroup.setDescription('A collection of object(s) that provides the information about Operational Vlan for each PAE port.') cpaePortAuthFailVlanGroup = ObjectGroup((1, 3, 6, 1, 4, 1, 9, 9, 220, 2, 2, 10)).setObjects(("CISCO-PAE-MIB", "cpaePortAuthFailVlan"), ("CISCO-PAE-MIB", "cpaeAuthFailUserName")) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): cpaePortAuthFailVlanGroup = cpaePortAuthFailVlanGroup.setStatus('deprecated') if mibBuilder.loadTexts: cpaePortAuthFailVlanGroup.setDescription('A collection of object(s) that provides the Auth-Fail (Authentication Fail) Vlan configuration and Auth-Fail user information for the system.') cpaeNoGuestVlanNotifEnableGrp = ObjectGroup((1, 3, 6, 1, 4, 1, 9, 9, 220, 2, 2, 11)).setObjects(("CISCO-PAE-MIB", "cpaeNoGuestVlanNotifEnable")) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): cpaeNoGuestVlanNotifEnableGrp = cpaeNoGuestVlanNotifEnableGrp.setStatus('current') if mibBuilder.loadTexts: cpaeNoGuestVlanNotifEnableGrp.setDescription('A collection of object(s) that provides control over Guest Vlan related notification(s).') cpaeNoAuthFailVlanNotifEnableGrp = ObjectGroup((1, 3, 6, 1, 4, 1, 9, 9, 220, 2, 2, 12)).setObjects(("CISCO-PAE-MIB", "cpaeNoAuthFailVlanNotifEnable")) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): cpaeNoAuthFailVlanNotifEnableGrp = cpaeNoAuthFailVlanNotifEnableGrp.setStatus('current') if mibBuilder.loadTexts: cpaeNoAuthFailVlanNotifEnableGrp.setDescription('A collection of object(s) that provides control over Auth-Fail related notification(s).') cpaeNoGuestVlanNotifGroup = NotificationGroup((1, 3, 6, 1, 4, 1, 9, 9, 220, 2, 2, 13)).setObjects(("CISCO-PAE-MIB", "cpaeNoGuestVlanNotif")) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): cpaeNoGuestVlanNotifGroup = cpaeNoGuestVlanNotifGroup.setStatus('current') if mibBuilder.loadTexts: cpaeNoGuestVlanNotifGroup.setDescription('A collection of notification(s) providing the information for unconfigured Guest Vlan.') cpaeNoAuthFailVlanNotifGroup = NotificationGroup((1, 3, 6, 1, 4, 1, 9, 9, 220, 2, 2, 14)).setObjects(("CISCO-PAE-MIB", "cpaeNoAuthFailVlanNotif")) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): cpaeNoAuthFailVlanNotifGroup = cpaeNoAuthFailVlanNotifGroup.setStatus('current') if mibBuilder.loadTexts: cpaeNoAuthFailVlanNotifGroup.setDescription('A collection of notifications providing the information for unconfigured Auth-Fail Vlan.') cpaeMacAuthBypassGroup = ObjectGroup((1, 3, 6, 1, 4, 1, 9, 9, 220, 2, 2, 15)).setObjects(("CISCO-PAE-MIB", "cpaeMacAuthBypassReAuthTimeout"), ("CISCO-PAE-MIB", "cpaeMacAuthBypassReAuthEnabled"), ("CISCO-PAE-MIB", "cpaeMacAuthBypassViolation"), ("CISCO-PAE-MIB", "cpaeMacAuthBypassShutdownTimeout"), ("CISCO-PAE-MIB", "cpaeMacAuthBypassAuthFailTimeout"), ("CISCO-PAE-MIB", "cpaeMacAuthBypassPortEnabled"), ("CISCO-PAE-MIB", "cpaeMacAuthBypassPortInitialize"), ("CISCO-PAE-MIB", "cpaeMacAuthBypassPortReAuth"), ("CISCO-PAE-MIB", "cpaeMacAuthBypassPortMacAddress"), ("CISCO-PAE-MIB", "cpaeMacAuthBypassPortAuthState"), ("CISCO-PAE-MIB", "cpaeMacAuthBypassAcctEnable")) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): cpaeMacAuthBypassGroup = cpaeMacAuthBypassGroup.setStatus('deprecated') if mibBuilder.loadTexts: cpaeMacAuthBypassGroup.setDescription('A collection of object(s) that provides the MAC Auth-Bypass configuration and information for the system.') cpaeWebAuthGroup = ObjectGroup((1, 3, 6, 1, 4, 1, 9, 9, 220, 2, 2, 16)).setObjects(("CISCO-PAE-MIB", "cpaeWebAuthEnabled"), ("CISCO-PAE-MIB", "cpaeWebAuthSessionPeriod"), ("CISCO-PAE-MIB", "cpaeWebAuthLoginPage"), ("CISCO-PAE-MIB", "cpaeWebAuthLoginFailedPage"), ("CISCO-PAE-MIB", "cpaeWebAuthQuietPeriod"), ("CISCO-PAE-MIB", "cpaeWebAuthMaxRetries"), ("CISCO-PAE-MIB", "cpaeWebAuthPortEnabled"), ("CISCO-PAE-MIB", "cpaeWebAuthPortInitialize"), ("CISCO-PAE-MIB", "cpaeWebAuthAaaSessionPeriod"), ("CISCO-PAE-MIB", "cpaeWebAuthHostSessionTimeLeft"), ("CISCO-PAE-MIB", "cpaeWebAuthHostState"), ("CISCO-PAE-MIB", "cpaeWebAuthHostInitialize")) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): cpaeWebAuthGroup = cpaeWebAuthGroup.setStatus('current') if mibBuilder.loadTexts: cpaeWebAuthGroup.setDescription('A collection of object(s) that provides the Web Proxy Authentication configuration and information for the system.') cpaeAuthConfigGroup = ObjectGroup((1, 3, 6, 1, 4, 1, 9, 9, 220, 2, 2, 17)).setObjects(("CISCO-PAE-MIB", "cpaeAuthReAuthPeriodSrcAdmin"), ("CISCO-PAE-MIB", "cpaeAuthReAuthPeriodSrcOper"), ("CISCO-PAE-MIB", "cpaeAuthReAuthPeriodOper"), ("CISCO-PAE-MIB", "cpaeAuthTimeToNextReAuth"), ("CISCO-PAE-MIB", "cpaeAuthReAuthAction"), ("CISCO-PAE-MIB", "cpaeAuthReAuthMax"), ("CISCO-PAE-MIB", "cpaeAuthIabEnabled")) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): cpaeAuthConfigGroup = cpaeAuthConfigGroup.setStatus('deprecated') if mibBuilder.loadTexts: cpaeAuthConfigGroup.setDescription('A collection of object(s) that provides additional configuration information about an Authenticator PAE.') cpaeHostInfoGroup = ObjectGroup((1, 3, 6, 1, 4, 1, 9, 9, 220, 2, 2, 18)).setObjects(("CISCO-PAE-MIB", "cpaeHostInfoMacAddress"), ("CISCO-PAE-MIB", "cpaeHostInfoPostureToken")) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): cpaeHostInfoGroup = cpaeHostInfoGroup.setStatus('obsolete') if mibBuilder.loadTexts: cpaeHostInfoGroup.setDescription('A collection of object(s) that provides information about an host connecting to a PAE port.') cpaeWebAuthAaaFailGroup = ObjectGroup((1, 3, 6, 1, 4, 1, 9, 9, 220, 2, 2, 19)).setObjects(("CISCO-PAE-MIB", "cpaeWebAuthPortAaaFailPolicy")) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): cpaeWebAuthAaaFailGroup = cpaeWebAuthAaaFailGroup.setStatus('current') if mibBuilder.loadTexts: cpaeWebAuthAaaFailGroup.setDescription('A collection of object(s) that provides Inaccessible Authentication Bypass configuration and information for Web Proxy Authentication in the system.') cpaeMacAuthBypassGroup2 = ObjectGroup((1, 3, 6, 1, 4, 1, 9, 9, 220, 2, 2, 20)).setObjects(("CISCO-PAE-MIB", "cpaeMacAuthBypassPortTermAction"), ("CISCO-PAE-MIB", "cpaeMacAuthBypassSessionTimeLeft")) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): cpaeMacAuthBypassGroup2 = cpaeMacAuthBypassGroup2.setStatus('current') if mibBuilder.loadTexts: cpaeMacAuthBypassGroup2.setDescription('A collection of object(s) that provides additional information of MAC Auth-bypass feature in the system.') cpaePortEapolTestGroup = ObjectGroup((1, 3, 6, 1, 4, 1, 9, 9, 220, 2, 2, 21)).setObjects(("CISCO-PAE-MIB", "cpaePortEapolTestLimits"), ("CISCO-PAE-MIB", "cpaePortEapolTestResult"), ("CISCO-PAE-MIB", "cpaePortEapolTestStatus")) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): cpaePortEapolTestGroup = cpaePortEapolTestGroup.setStatus('current') if mibBuilder.loadTexts: cpaePortEapolTestGroup.setDescription('A collection of object(s) that provides information about if connecting hosts are EAPOL capable.') cpaeHostInfoGroup2 = ObjectGroup((1, 3, 6, 1, 4, 1, 9, 9, 220, 2, 2, 22)).setObjects(("CISCO-PAE-MIB", "cpaeHostInfoMacAddress")) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): cpaeHostInfoGroup2 = cpaeHostInfoGroup2.setStatus('current') if mibBuilder.loadTexts: cpaeHostInfoGroup2.setDescription('A collection of object(s) that provides information about an host connecting to a PAE port.') cpaeMacAuthBypassGroup3 = ObjectGroup((1, 3, 6, 1, 4, 1, 9, 9, 220, 2, 2, 23)).setObjects(("CISCO-PAE-MIB", "cpaeMacAuthBypassPortAuthMethod")) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): cpaeMacAuthBypassGroup3 = cpaeMacAuthBypassGroup3.setStatus('current') if mibBuilder.loadTexts: cpaeMacAuthBypassGroup3.setDescription('A collection of object(s) that provides configuration for authentication method for MAC Auth-bypass feature in the system.') cpaePortAuthFailVlanGroup2 = ObjectGroup((1, 3, 6, 1, 4, 1, 9, 9, 220, 2, 2, 24)).setObjects(("CISCO-PAE-MIB", "cpaeAuthFailVlanMaxAttempts")) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): cpaePortAuthFailVlanGroup2 = cpaePortAuthFailVlanGroup2.setStatus('current') if mibBuilder.loadTexts: cpaePortAuthFailVlanGroup2.setDescription('A collection of object(s) that provides configuration for maximum authentication attempts for Auth-Fail Vlan feature in the system.') cpaeAuthConfigGroup2 = ObjectGroup((1, 3, 6, 1, 4, 1, 9, 9, 220, 2, 2, 25)).setObjects(("CISCO-PAE-MIB", "cpaeAuthPaeState")) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): cpaeAuthConfigGroup2 = cpaeAuthConfigGroup2.setStatus('current') if mibBuilder.loadTexts: cpaeAuthConfigGroup2.setDescription('A collection of object(s) that provides additional states in the PAE state machine.') cpaeCriticalRecoveryDelayGroup = ObjectGroup((1, 3, 6, 1, 4, 1, 9, 9, 220, 2, 2, 26)).setObjects(("CISCO-PAE-MIB", "cpaeCriticalRecoveryDelay")) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): cpaeCriticalRecoveryDelayGroup = cpaeCriticalRecoveryDelayGroup.setStatus('current') if mibBuilder.loadTexts: cpaeCriticalRecoveryDelayGroup.setDescription('A collection of object(s) that provides recovery delay configuration for 802.1x Critical Authentication in the system.') cpaeAuthConfigGroup3 = ObjectGroup((1, 3, 6, 1, 4, 1, 9, 9, 220, 2, 2, 27)).setObjects(("CISCO-PAE-MIB", "cpaeAuthReAuthPeriodSrcAdmin"), ("CISCO-PAE-MIB", "cpaeAuthReAuthPeriodSrcOper"), ("CISCO-PAE-MIB", "cpaeAuthReAuthPeriodOper"), ("CISCO-PAE-MIB", "cpaeAuthTimeToNextReAuth"), ("CISCO-PAE-MIB", "cpaeAuthReAuthAction")) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): cpaeAuthConfigGroup3 = cpaeAuthConfigGroup3.setStatus('current') if mibBuilder.loadTexts: cpaeAuthConfigGroup3.setDescription('A collection of object(s) that provides configuration and information related to re-authentication of 802.1x ports in the system.') cpaeAuthConfigGroup4 = ObjectGroup((1, 3, 6, 1, 4, 1, 9, 9, 220, 2, 2, 28)).setObjects(("CISCO-PAE-MIB", "cpaeAuthReAuthMax")) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): cpaeAuthConfigGroup4 = cpaeAuthConfigGroup4.setStatus('current') if mibBuilder.loadTexts: cpaeAuthConfigGroup4.setDescription('A collection of object(s) that provides configuration of maximum reauthentication attempts of 802.1x ports in the system.') cpaeAuthIabConfigGroup = ObjectGroup((1, 3, 6, 1, 4, 1, 9, 9, 220, 2, 2, 29)).setObjects(("CISCO-PAE-MIB", "cpaeAuthIabEnabled")) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): cpaeAuthIabConfigGroup = cpaeAuthIabConfigGroup.setStatus('current') if mibBuilder.loadTexts: cpaeAuthIabConfigGroup.setDescription('A collection of object(s) to enable/disable IAB feature on capable interface for the system.') cpaeGlobalAuthFailVlanGroup = ObjectGroup((1, 3, 6, 1, 4, 1, 9, 9, 220, 2, 2, 30)).setObjects(("CISCO-PAE-MIB", "cpaeGlobalAuthFailMaxAttempts")) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): cpaeGlobalAuthFailVlanGroup = cpaeGlobalAuthFailVlanGroup.setStatus('current') if mibBuilder.loadTexts: cpaeGlobalAuthFailVlanGroup.setDescription('A collection of object(s) that provides global configuration and information about maximum authentication attempts for Auth-Fail Vlan feature in the system.') cpaeMacAuthBypassCriticalGroup = ObjectGroup((1, 3, 6, 1, 4, 1, 9, 9, 220, 2, 2, 31)).setObjects(("CISCO-PAE-MIB", "cpaeMabCriticalRecoveryDelay")) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): cpaeMacAuthBypassCriticalGroup = cpaeMacAuthBypassCriticalGroup.setStatus('current') if mibBuilder.loadTexts: cpaeMacAuthBypassCriticalGroup.setDescription('A collection of object(s) that provides control over critical configuration for Mac Authentication Bypass.') cpaeWebAuthCriticalGroup = ObjectGroup((1, 3, 6, 1, 4, 1, 9, 9, 220, 2, 2, 32)).setObjects(("CISCO-PAE-MIB", "cpaeWebAuthCriticalRecoveryDelay")) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): cpaeWebAuthCriticalGroup = cpaeWebAuthCriticalGroup.setStatus('current') if mibBuilder.loadTexts: cpaeWebAuthCriticalGroup.setDescription('A collection of object(s) that provides control over critical configuration for Web Proxy Authentication.') cpaeCriticalEapolConfigGroup = ObjectGroup((1, 3, 6, 1, 4, 1, 9, 9, 220, 2, 2, 33)).setObjects(("CISCO-PAE-MIB", "cpaeCriticalEapolEnabled")) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): cpaeCriticalEapolConfigGroup = cpaeCriticalEapolConfigGroup.setStatus('current') if mibBuilder.loadTexts: cpaeCriticalEapolConfigGroup.setDescription('A collection of object(s) that provides EAPOL configuration for 802.1x Critical Authentication in the system.') cpaeHostPostureTokenGroup = ObjectGroup((1, 3, 6, 1, 4, 1, 9, 9, 220, 2, 2, 34)).setObjects(("CISCO-PAE-MIB", "cpaeHostPostureTokenStr")) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): cpaeHostPostureTokenGroup = cpaeHostPostureTokenGroup.setStatus('current') if mibBuilder.loadTexts: cpaeHostPostureTokenGroup.setDescription('A collection of object(s) that provides information about Posture Token of an host connecting to a PAE port.') cpaeMabAuditInfoGroup = ObjectGroup((1, 3, 6, 1, 4, 1, 9, 9, 220, 2, 2, 35)).setObjects(("CISCO-PAE-MIB", "cpaeMacAuthBypassPortSessionId"), ("CISCO-PAE-MIB", "cpaeMacAuthBypassPortUrlRedirect"), ("CISCO-PAE-MIB", "cpaeMacAuthBypassPortPostureTok")) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): cpaeMabAuditInfoGroup = cpaeMabAuditInfoGroup.setStatus('current') if mibBuilder.loadTexts: cpaeMabAuditInfoGroup.setDescription('A collection of object(s) that provides information about MAC Auth-Bypass Audit sessions.') cpaeMabPortIpDevTrackConfGroup = ObjectGroup((1, 3, 6, 1, 4, 1, 9, 9, 220, 2, 2, 36)).setObjects(("CISCO-PAE-MIB", "cpaeMabPortIpDevTrackEnabled")) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): cpaeMabPortIpDevTrackConfGroup = cpaeMabPortIpDevTrackConfGroup.setStatus('current') if mibBuilder.loadTexts: cpaeMabPortIpDevTrackConfGroup.setDescription('A collection of object(s) that provides configuration and information about MAC Auth-Bypass IP Device Tracking feature.') cpaePortIpDevTrackConfGroup = ObjectGroup((1, 3, 6, 1, 4, 1, 9, 9, 220, 2, 2, 37)).setObjects(("CISCO-PAE-MIB", "cpaePortIpDevTrackEnabled")) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): cpaePortIpDevTrackConfGroup = cpaePortIpDevTrackConfGroup.setStatus('current') if mibBuilder.loadTexts: cpaePortIpDevTrackConfGroup.setDescription('A collection of object(s) that provides configuration and information about 802.1x IP Device Tracking feature.') cpaeHostUrlRedirectGroup = ObjectGroup((1, 3, 6, 1, 4, 1, 9, 9, 220, 2, 2, 38)).setObjects(("CISCO-PAE-MIB", "cpaeHostUrlRedirection")) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): cpaeHostUrlRedirectGroup = cpaeHostUrlRedirectGroup.setStatus('current') if mibBuilder.loadTexts: cpaeHostUrlRedirectGroup.setDescription('A collection of object(s) that provides information about URL-redirection of 802.1x authenticated hosts.') cpaeWebAuthIpDevTrackingGroup = ObjectGroup((1, 3, 6, 1, 4, 1, 9, 9, 220, 2, 2, 39)).setObjects(("CISCO-PAE-MIB", "cpaeWebAuthPortIpDevTrackEnabled")) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): cpaeWebAuthIpDevTrackingGroup = cpaeWebAuthIpDevTrackingGroup.setStatus('current') if mibBuilder.loadTexts: cpaeWebAuthIpDevTrackingGroup.setDescription('A collection of object(s) that provides configuration and information about Web Proxy Authentication IP Device Tracking feature.') cpaeWebAuthUnAuthTimeoutGroup = ObjectGroup((1, 3, 6, 1, 4, 1, 9, 9, 220, 2, 2, 40)).setObjects(("CISCO-PAE-MIB", "cpaeWebAuthUnAuthStateTimeout")) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): cpaeWebAuthUnAuthTimeoutGroup = cpaeWebAuthUnAuthTimeoutGroup.setStatus('current') if mibBuilder.loadTexts: cpaeWebAuthUnAuthTimeoutGroup.setDescription('A collection of object(s) that provides configuration and information about Init State Timeout of Web Proxy Authentication.') cpaeHostInfoGroup3 = ObjectGroup((1, 3, 6, 1, 4, 1, 9, 9, 220, 2, 2, 41)).setObjects(("CISCO-PAE-MIB", "cpaeHostInfoUserName"), ("CISCO-PAE-MIB", "cpaeHostInfoAddrType"), ("CISCO-PAE-MIB", "cpaeHostInfoAddr")) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): cpaeHostInfoGroup3 = cpaeHostInfoGroup3.setStatus('current') if mibBuilder.loadTexts: cpaeHostInfoGroup3.setDescription('A collection of object(s) that provides user and the address information for 802.1x authenticated host.') cpaeGlobalSecViolationGroup = ObjectGroup((1, 3, 6, 1, 4, 1, 9, 9, 220, 2, 2, 42)).setObjects(("CISCO-PAE-MIB", "cpaeGlobalSecViolationAction")) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): cpaeGlobalSecViolationGroup = cpaeGlobalSecViolationGroup.setStatus('current') if mibBuilder.loadTexts: cpaeGlobalSecViolationGroup.setDescription('A collection of object(s) that provides global configuration and information about security violation action on PAE ports in the system.') cpaeMacAuthBypassPortEnableGroup = ObjectGroup((1, 3, 6, 1, 4, 1, 9, 9, 220, 2, 2, 43)).setObjects(("CISCO-PAE-MIB", "cpaeMacAuthBypassPortEnabled")) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): cpaeMacAuthBypassPortEnableGroup = cpaeMacAuthBypassPortEnableGroup.setStatus('current') if mibBuilder.loadTexts: cpaeMacAuthBypassPortEnableGroup.setDescription('A collection of object(s) to enable/disable Mac Auth-Bypass on capable interfaces for the system.') cpaeMacAuthBypassGroup4 = ObjectGroup((1, 3, 6, 1, 4, 1, 9, 9, 220, 2, 2, 44)).setObjects(("CISCO-PAE-MIB", "cpaeMacAuthBypassReAuthEnabled"), ("CISCO-PAE-MIB", "cpaeMacAuthBypassReAuthTimeout"), ("CISCO-PAE-MIB", "cpaeMacAuthBypassViolation"), ("CISCO-PAE-MIB", "cpaeMacAuthBypassShutdownTimeout"), ("CISCO-PAE-MIB", "cpaeMacAuthBypassAuthFailTimeout"), ("CISCO-PAE-MIB", "cpaeMacAuthBypassPortInitialize"), ("CISCO-PAE-MIB", "cpaeMacAuthBypassPortReAuth"), ("CISCO-PAE-MIB", "cpaeMacAuthBypassPortMacAddress"), ("CISCO-PAE-MIB", "cpaeMacAuthBypassPortAuthState"), ("CISCO-PAE-MIB", "cpaeMacAuthBypassAcctEnable")) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): cpaeMacAuthBypassGroup4 = cpaeMacAuthBypassGroup4.setStatus('current') if mibBuilder.loadTexts: cpaeMacAuthBypassGroup4.setDescription('A collection of object(s) that provides the MAC Auth-Bypass configuration and information for the system.') cpaeHostSessionIdGroup = ObjectGroup((1, 3, 6, 1, 4, 1, 9, 9, 220, 2, 2, 45)).setObjects(("CISCO-PAE-MIB", "cpaeHostSessionId")) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): cpaeHostSessionIdGroup = cpaeHostSessionIdGroup.setStatus('current') if mibBuilder.loadTexts: cpaeHostSessionIdGroup.setDescription('A collection of object(s) that provides session identification information for 802.1x hosts in the system.') cpaeHostAuthInfoGroup = ObjectGroup((1, 3, 6, 1, 4, 1, 9, 9, 220, 2, 2, 46)).setObjects(("CISCO-PAE-MIB", "cpaeHostAuthPaeState"), ("CISCO-PAE-MIB", "cpaeHostBackendState")) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): cpaeHostAuthInfoGroup = cpaeHostAuthInfoGroup.setStatus('current') if mibBuilder.loadTexts: cpaeHostAuthInfoGroup.setDescription('A collection of object(s) that provides state machines and authentication information for 802.1x authenticated hosts in the system.') cpaePortCapabilitiesConfigGroup = ObjectGroup((1, 3, 6, 1, 4, 1, 9, 9, 220, 2, 2, 47)).setObjects(("CISCO-PAE-MIB", "cpaePortCapabilitiesEnabled")) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): cpaePortCapabilitiesConfigGroup = cpaePortCapabilitiesConfigGroup.setStatus('current') if mibBuilder.loadTexts: cpaePortCapabilitiesConfigGroup.setDescription('A collection of object(s) that provides configuration and information about PAE functionalities of ports in the systems.') cpaeDot1xSuppToGuestVlanGroup = ObjectGroup((1, 3, 6, 1, 4, 1, 9, 9, 220, 2, 2, 48)).setObjects(("CISCO-PAE-MIB", "cpaeDot1xSuppToGuestVlanAllowed")) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): cpaeDot1xSuppToGuestVlanGroup = cpaeDot1xSuppToGuestVlanGroup.setStatus('current') if mibBuilder.loadTexts: cpaeDot1xSuppToGuestVlanGroup.setDescription('A collection of object(s) that provides configuration that allows moving ports with 802.1x supplicants to Guest Vlan.') cpaeGuestVlanNotifEnableGroup = ObjectGroup((1, 3, 6, 1, 4, 1, 9, 9, 220, 2, 2, 49)).setObjects(("CISCO-PAE-MIB", "cpaeGuestVlanNotifEnable")) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): cpaeGuestVlanNotifEnableGroup = cpaeGuestVlanNotifEnableGroup.setStatus('current') if mibBuilder.loadTexts: cpaeGuestVlanNotifEnableGroup.setDescription('A collection of object(s) that provides control over Guest Vlan related notification(s).') cpaeGuestVlanNotifGroup = NotificationGroup((1, 3, 6, 1, 4, 1, 9, 9, 220, 2, 2, 50)).setObjects(("CISCO-PAE-MIB", "cpaeGuestVlanNotif")) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): cpaeGuestVlanNotifGroup = cpaeGuestVlanNotifGroup.setStatus('current') if mibBuilder.loadTexts: cpaeGuestVlanNotifGroup.setDescription('A collection of notifications providing information for Guest Vlan.') cpaeAuthFailVlanNotifEnableGrp = ObjectGroup((1, 3, 6, 1, 4, 1, 9, 9, 220, 2, 2, 51)).setObjects(("CISCO-PAE-MIB", "cpaeAuthFailVlanNotifEnable")) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): cpaeAuthFailVlanNotifEnableGrp = cpaeAuthFailVlanNotifEnableGrp.setStatus('current') if mibBuilder.loadTexts: cpaeAuthFailVlanNotifEnableGrp.setDescription('A collection of object(s) that provides control over Auth-Fail Vlan related notification(s).') cpaeAuthFailVlanNotifGroup = NotificationGroup((1, 3, 6, 1, 4, 1, 9, 9, 220, 2, 2, 52)).setObjects(("CISCO-PAE-MIB", "cpaeAuthFailVlanNotif")) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): cpaeAuthFailVlanNotifGroup = cpaeAuthFailVlanNotifGroup.setStatus('current') if mibBuilder.loadTexts: cpaeAuthFailVlanNotifGroup.setDescription('A collection of notifications providing information for Auth-Fail Vlan.') cpaePortAuthFailVlanConfigGroup = ObjectGroup((1, 3, 6, 1, 4, 1, 9, 9, 220, 2, 2, 53)).setObjects(("CISCO-PAE-MIB", "cpaePortAuthFailVlan")) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): cpaePortAuthFailVlanConfigGroup = cpaePortAuthFailVlanConfigGroup.setStatus('current') if mibBuilder.loadTexts: cpaePortAuthFailVlanConfigGroup.setDescription('A collection of object(s) that provides the Auth-Fail (Authentication Fail) Vlan configuration for the system.') cpaePortAuthFailUserInfoGroup = ObjectGroup((1, 3, 6, 1, 4, 1, 9, 9, 220, 2, 2, 54)).setObjects(("CISCO-PAE-MIB", "cpaeAuthFailUserName")) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): cpaePortAuthFailUserInfoGroup = cpaePortAuthFailUserInfoGroup.setStatus('current') if mibBuilder.loadTexts: cpaePortAuthFailUserInfoGroup.setDescription('A collection of object(s) that provides the Auth-Fail user information for the system.') cpaeSuppPortProfileGroup = ObjectGroup((1, 3, 6, 1, 4, 1, 9, 9, 220, 2, 2, 55)).setObjects(("CISCO-PAE-MIB", "cpaeSuppPortCredentialProfileName"), ("CISCO-PAE-MIB", "cpaeSuppPortEapProfileName")) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): cpaeSuppPortProfileGroup = cpaeSuppPortProfileGroup.setStatus('current') if mibBuilder.loadTexts: cpaeSuppPortProfileGroup.setDescription('A collection of object(s) that provides Credential and EAP profiles configuration for a Supplicant PAE.') cpaeSuppHostInfoGroup = ObjectGroup((1, 3, 6, 1, 4, 1, 9, 9, 220, 2, 2, 56)).setObjects(("CISCO-PAE-MIB", "cpaeSuppHostAuthMacAddress"), ("CISCO-PAE-MIB", "cpaeSuppHostPaeState"), ("CISCO-PAE-MIB", "cpaeSuppHostBackendState"), ("CISCO-PAE-MIB", "cpaeSuppHostStatus")) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): cpaeSuppHostInfoGroup = cpaeSuppHostInfoGroup.setStatus('current') if mibBuilder.loadTexts: cpaeSuppHostInfoGroup.setDescription('A collection of object(s) that provides information about supplicants in the system.') mibBuilder.exportSymbols("CISCO-PAE-MIB", cpaeWebAuthAaaFailGroup=cpaeWebAuthAaaFailGroup, cpaeMacAuthBypassPortAuthMethod=cpaeMacAuthBypassPortAuthMethod, cpaeWebAuth=cpaeWebAuth, cpaeHostSessionId=cpaeHostSessionId, cpaePortCapabilitiesConfigGroup=cpaePortCapabilitiesConfigGroup, cpaeMultipleHostGroup=cpaeMultipleHostGroup, cpaeUserGroupGroup=cpaeUserGroupGroup, cpaePortOperVlan=cpaePortOperVlan, cpaeWebAuthLoginFailedPage=cpaeWebAuthLoginFailedPage, cpaePortEapolTestTable=cpaePortEapolTestTable, cpaeAuthFailVlanNotif=cpaeAuthFailVlanNotif, cpaeWebAuthQuietPeriod=cpaeWebAuthQuietPeriod, PYSNMP_MODULE_ID=ciscoPaeMIB, cpaeAuthConfigEntry=cpaeAuthConfigEntry, cpaeWebAuthHostState=cpaeWebAuthHostState, cpaeUserGroupName=cpaeUserGroupName, cpaeGuestVlanNotifEnableGroup=cpaeGuestVlanNotifEnableGroup, cpaeAuthConfigGroup2=cpaeAuthConfigGroup2, cpaeMacAuthBypassPortEnabled=cpaeMacAuthBypassPortEnabled, cpaeGlobalSecViolationAction=cpaeGlobalSecViolationAction, cpaeWebAuthLoginPage=cpaeWebAuthLoginPage, cpaeMacAuthBypassPortMacAddress=cpaeMacAuthBypassPortMacAddress, cpaeHostUrlRedirectGroup=cpaeHostUrlRedirectGroup, cpaeSuppPortTable=cpaeSuppPortTable, cpaeAuthFailVlanNotifGroup=cpaeAuthFailVlanNotifGroup, cpaeUserGroupUserVlan=cpaeUserGroupUserVlan, cpaeAuthFailVlanNotifEnable=cpaeAuthFailVlanNotifEnable, cpaePortAuthFailVlan=cpaePortAuthFailVlan, cpaeSuppHostBackendState=cpaeSuppHostBackendState, cpaeCompliance10=cpaeCompliance10, cpaePortOperVlanGroup=cpaePortOperVlanGroup, cpaeGlobalSecViolationGroup=cpaeGlobalSecViolationGroup, cpaeHostInfoPostureToken=cpaeHostInfoPostureToken, cpaeSuppHostPaeState=cpaeSuppHostPaeState, cpaePortEapolTestLimits=cpaePortEapolTestLimits, cpaeUserGroupUserIndex=cpaeUserGroupUserIndex, cpaeWebAuthSessionPeriod=cpaeWebAuthSessionPeriod, cpaePortAuthFailUserInfoGroup=cpaePortAuthFailUserInfoGroup, cpaeAuthIabEnabled=cpaeAuthIabEnabled, cpaeUserGroupUserInterface=cpaeUserGroupUserInterface, cpaeCompliance4=cpaeCompliance4, cpaeUserGroupUserName=cpaeUserGroupUserName, cpaeHostInfoGroup3=cpaeHostInfoGroup3, cpaeNoAuthFailVlanNotifEnable=cpaeNoAuthFailVlanNotifEnable, CpaeAuthState=CpaeAuthState, cpaeCriticalEapolEnabled=cpaeCriticalEapolEnabled, cpaeMacAuthBypassPortSessionId=cpaeMacAuthBypassPortSessionId, cpaeMacAuthBypass=cpaeMacAuthBypass, cpaeSuppPortProfileGroup=cpaeSuppPortProfileGroup, cpaePortAuthFailVlanGroup=cpaePortAuthFailVlanGroup, cpaeCompliance5=cpaeCompliance5, cpaeMIBNotification=cpaeMIBNotification, cpaeMacAuthBypassPortTable=cpaeMacAuthBypassPortTable, cpaeHostInfoGroup=cpaeHostInfoGroup, cpaeMacAuthBypassAcctEnable=cpaeMacAuthBypassAcctEnable, cpaeMacAuthBypassCriticalGroup=cpaeMacAuthBypassCriticalGroup, cpaeRadiusAccountingEnabled=cpaeRadiusAccountingEnabled, cpaePortIpDevTrackConfigEntry=cpaePortIpDevTrackConfigEntry, cpaeUserGroupUserAddr=cpaeUserGroupUserAddr, cpaeMacAuthBypassAuthFailTimeout=cpaeMacAuthBypassAuthFailTimeout, cpaeMabPortIpDevTrackEnabled=cpaeMabPortIpDevTrackEnabled, cpaeAuthConfigTable=cpaeAuthConfigTable, cpaeHostAuthPaeState=cpaeHostAuthPaeState, cpaeSupplicantObjects=cpaeSupplicantObjects, ciscoPaeMIB=ciscoPaeMIB, cpaeCompliance9=cpaeCompliance9, cpaeCompliance7=cpaeCompliance7, cpaeWebAuthPortTable=cpaeWebAuthPortTable, cpaeShutdownTimeoutEnabled=cpaeShutdownTimeoutEnabled, cpaeWebAuthCriticalRecoveryDelay=cpaeWebAuthCriticalRecoveryDelay, cpaeAuthReAuthAction=cpaeAuthReAuthAction, cpaeGuestVlanNotifGroup=cpaeGuestVlanNotifGroup, cpaeMacAuthBypassPortEnableGroup=cpaeMacAuthBypassPortEnableGroup, cpaeUserGroupEntry=cpaeUserGroupEntry, cpaeWebAuthHostTable=cpaeWebAuthHostTable, cpaeAuthFailUserTable=cpaeAuthFailUserTable, cpaeMacAuthBypassReAuthTimeout=cpaeMacAuthBypassReAuthTimeout, cpaeHostInfoUserName=cpaeHostInfoUserName, cpaeMacAuthBypassPortEntry=cpaeMacAuthBypassPortEntry, cpaeGuestVlanNotifEnable=cpaeGuestVlanNotifEnable, cpaeMacAuthBypassPortTermAction=cpaeMacAuthBypassPortTermAction, cpaeGuestVlanGroup3=cpaeGuestVlanGroup3, cpaeGlobalAuthFailVlanGroup=cpaeGlobalAuthFailVlanGroup, cpaeMacAuthBypassGroup3=cpaeMacAuthBypassGroup3, cpaeMacAuthBypassReAuthEnabled=cpaeMacAuthBypassReAuthEnabled, cpaeAuthIabConfigGroup=cpaeAuthIabConfigGroup, cpaeSuppPortEntry=cpaeSuppPortEntry, cpaeWebAuthIpDevTrackingGroup=cpaeWebAuthIpDevTrackingGroup, cpaeHostInfoEntry=cpaeHostInfoEntry, cpaeSuppHostStatus=cpaeSuppHostStatus, cpaePortEapolTestGroup=cpaePortEapolTestGroup, cpaeSuppHostInfoEntry=cpaeSuppHostInfoEntry, ReAuthPeriodSource=ReAuthPeriodSource, cpaeCompliance=cpaeCompliance, cpaeInGuestVlan=cpaeInGuestVlan, cpaeSuppHostInfoSuppIndex=cpaeSuppHostInfoSuppIndex, cpaeMacAuthBypassShutdownTimeout=cpaeMacAuthBypassShutdownTimeout, cpaeMacAuthBypassGroup4=cpaeMacAuthBypassGroup4, cpaePortOperVlanType=cpaePortOperVlanType, cpaeMacAuthBypassPortReAuth=cpaeMacAuthBypassPortReAuth, cpaeWebAuthEnabled=cpaeWebAuthEnabled, cpaeUserGroupTable=cpaeUserGroupTable, cpaeWebAuthHostAddrType=cpaeWebAuthHostAddrType, cpaePortIpDevTrackEnabled=cpaePortIpDevTrackEnabled, cpaeNoGuestVlanNotif=cpaeNoGuestVlanNotif, cpaeAuthConfigGroup3=cpaeAuthConfigGroup3, cpaePortMode=cpaePortMode, cpaeNoGuestVlanNotifEnable=cpaeNoGuestVlanNotifEnable, cpaeMabPortIpDevTrackConfGroup=cpaeMabPortIpDevTrackConfGroup, cpaeMIBCompliances=cpaeMIBCompliances, cpaeWebAuthPortIpDevTrackEnabled=cpaeWebAuthPortIpDevTrackEnabled, cpaeMacAuthBypassSessionTimeLeft=cpaeMacAuthBypassSessionTimeLeft, cpaeAuthTimeToNextReAuth=cpaeAuthTimeToNextReAuth, cpaeWebAuthGroup=cpaeWebAuthGroup, cpaeMIBGroups=cpaeMIBGroups, cpaeWebAuthHostEntry=cpaeWebAuthHostEntry, cpaeDot1xSuppToGuestVlanAllowed=cpaeDot1xSuppToGuestVlanAllowed, cpaeWebAuthPortAaaFailPolicy=cpaeWebAuthPortAaaFailPolicy, cpaeNoGuestVlanNotifEnableGrp=cpaeNoGuestVlanNotifEnableGrp, cpaeWebAuthHostInitialize=cpaeWebAuthHostInitialize, cpaeHostInfoMacAddress=cpaeHostInfoMacAddress, cpaeMabCriticalRecoveryDelay=cpaeMabCriticalRecoveryDelay, cpaePortCapabilitiesEnabled=cpaePortCapabilitiesEnabled, cpaeCriticalRecoveryDelayGroup=cpaeCriticalRecoveryDelayGroup, cpaeAuthReAuthPeriodSrcOper=cpaeAuthReAuthPeriodSrcOper, cpaeShutdownTimeoutGroup=cpaeShutdownTimeoutGroup, cpaeHostUrlRedirection=cpaeHostUrlRedirection, cpaeSuppHostAuthMacAddress=cpaeSuppHostAuthMacAddress, cpaeMIBObject=cpaeMIBObject, cpaePortAuthFailVlanConfigGroup=cpaePortAuthFailVlanConfigGroup, cpaeSuppPortEapProfileName=cpaeSuppPortEapProfileName, cpaePortTable=cpaePortTable, cpaeWebAuthHostAddress=cpaeWebAuthHostAddress, cpaeGuestVlanNotif=cpaeGuestVlanNotif, cpaeCompliance8=cpaeCompliance8, cpaePortEapolTestStatus=cpaePortEapolTestStatus, cpaeRadiusConfigGroup=cpaeRadiusConfigGroup, cpaeWebAuthCriticalGroup=cpaeWebAuthCriticalGroup, cpaeMacAuthBypassPortInitialize=cpaeMacAuthBypassPortInitialize, cpaeHostSessionIdGroup=cpaeHostSessionIdGroup, cpaeNoAuthFailVlanNotifEnableGrp=cpaeNoAuthFailVlanNotifEnableGrp, cpaeMacAuthBypassViolation=cpaeMacAuthBypassViolation, cpaePortIpDevTrackConfGroup=cpaePortIpDevTrackConfGroup, cpaeNoAuthFailVlanNotifGroup=cpaeNoAuthFailVlanNotifGroup, cpaeHostInfoHostIndex=cpaeHostInfoHostIndex, cpaeHostPostureTokenStr=cpaeHostPostureTokenStr, cpaeCompliance2=cpaeCompliance2, cpaeWebAuthPortEntry=cpaeWebAuthPortEntry, cpaeUserGroupUserAddrType=cpaeUserGroupUserAddrType, cpaePortIpDevTrackConfigTable=cpaePortIpDevTrackConfigTable, cpaeCompliance6=cpaeCompliance6, cpaeMabPortIpDevTrackConfTable=cpaeMabPortIpDevTrackConfTable, cpaeHostInfoAddr=cpaeHostInfoAddr, cpaeSuppHostInfoTable=cpaeSuppHostInfoTable, cpaeGuestVlanNumber=cpaeGuestVlanNumber, cpaeAuthFailVlanNotifEnableGrp=cpaeAuthFailVlanNotifEnableGrp, cpaeAuthReAuthMax=cpaeAuthReAuthMax, cpaeWebAuthHostSessionTimeLeft=cpaeWebAuthHostSessionTimeLeft, cpaeAuthConfigGroup=cpaeAuthConfigGroup, cpaeMacAuthBypassPortUrlRedirect=cpaeMacAuthBypassPortUrlRedirect, cpaeWebAuthMaxRetries=cpaeWebAuthMaxRetries, cpaeAuthPaeState=cpaeAuthPaeState, cpaeDot1xSuppToGuestVlanGroup=cpaeDot1xSuppToGuestVlanGroup, cpaeAuthConfigGroup4=cpaeAuthConfigGroup4, cpaeHostInfoAddrType=cpaeHostInfoAddrType, cpaeCriticalEapolConfigGroup=cpaeCriticalEapolConfigGroup, cpaeGuestVlanGroup2=cpaeGuestVlanGroup2, cpaeMultipleHost=cpaeMultipleHost, cpaePortAuthFailVlanGroup2=cpaePortAuthFailVlanGroup2, cpaeAuthFailUserName=cpaeAuthFailUserName, cpaeMabPortIpDevTrackConfEntry=cpaeMabPortIpDevTrackConfEntry, cpaeWebAuthAaaSessionPeriod=cpaeWebAuthAaaSessionPeriod, cpaeAuthReAuthPeriodSrcAdmin=cpaeAuthReAuthPeriodSrcAdmin, cpaeHostInfoGroup2=cpaeHostInfoGroup2, cpaeMacAuthBypassGroup=cpaeMacAuthBypassGroup, cpaeMIBConformance=cpaeMIBConformance, cpaeCompliance3=cpaeCompliance3, cpaeNoGuestVlanNotifGroup=cpaeNoGuestVlanNotifGroup, cpaeMacAuthBypassPortAuthState=cpaeMacAuthBypassPortAuthState, cpaeAuthReAuthPeriodOper=cpaeAuthReAuthPeriodOper, cpaePortEapolTestResult=cpaePortEapolTestResult, cpaeHostPostureTokenGroup=cpaeHostPostureTokenGroup, cpaePortEntry=cpaePortEntry, cpaeNoAuthFailVlanNotif=cpaeNoAuthFailVlanNotif, cpaeWebAuthPortEnabled=cpaeWebAuthPortEnabled, cpaeGuestVlanId=cpaeGuestVlanId, cpaeHostBackendState=cpaeHostBackendState, cpaeSuppPortCredentialProfileName=cpaeSuppPortCredentialProfileName, cpaeShutdownTimeout=cpaeShutdownTimeout, cpaeCriticalRecoveryDelay=cpaeCriticalRecoveryDelay, cpaeHostInfoTable=cpaeHostInfoTable, cpaeHostAuthInfoGroup=cpaeHostAuthInfoGroup, cpaeMacAuthBypassPortPostureTok=cpaeMacAuthBypassPortPostureTok, cpaeNotificationControl=cpaeNotificationControl, cpaeMabAuditInfoGroup=cpaeMabAuditInfoGroup, cpaeAuthFailVlanMaxAttempts=cpaeAuthFailVlanMaxAttempts, cpaeSuppHostInfoGroup=cpaeSuppHostInfoGroup, cpaeMacAuthBypassGroup2=cpaeMacAuthBypassGroup2, cpaeWebAuthPortInitialize=cpaeWebAuthPortInitialize, cpaePortEntryGroup=cpaePortEntryGroup, cpaeWebAuthUnAuthTimeoutGroup=cpaeWebAuthUnAuthTimeoutGroup, cpaeWebAuthUnAuthStateTimeout=cpaeWebAuthUnAuthStateTimeout, cpaeAuthFailUserEntry=cpaeAuthFailUserEntry, cpaeCriticalConfig=cpaeCriticalConfig, cpaeGlobalAuthFailMaxAttempts=cpaeGlobalAuthFailMaxAttempts, cpaePortEapolTestEntry=cpaePortEapolTestEntry, cpaeGuestVlanGroup=cpaeGuestVlanGroup)
(object_identifier, octet_string, integer) = mibBuilder.importSymbols('ASN1', 'ObjectIdentifier', 'OctetString', 'Integer') (named_values,) = mibBuilder.importSymbols('ASN1-ENUMERATION', 'NamedValues') (value_size_constraint, constraints_intersection, constraints_union, value_range_constraint, single_value_constraint) = mibBuilder.importSymbols('ASN1-REFINEMENT', 'ValueSizeConstraint', 'ConstraintsIntersection', 'ConstraintsUnion', 'ValueRangeConstraint', 'SingleValueConstraint') (cnn_eou_posture_token_string, cnn_eou_posture_token) = mibBuilder.importSymbols('CISCO-NAC-TC-MIB', 'CnnEouPostureTokenString', 'CnnEouPostureToken') (cpg_policy_name_or_empty,) = mibBuilder.importSymbols('CISCO-POLICY-GROUP-MIB', 'CpgPolicyNameOrEmpty') (cisco_mgmt,) = mibBuilder.importSymbols('CISCO-SMI', 'ciscoMgmt') (cisco_url_string,) = mibBuilder.importSymbols('CISCO-TC', 'CiscoURLString') (vlan_index,) = mibBuilder.importSymbols('CISCO-VTP-MIB', 'VlanIndex') (dot1x_auth_config_entry, dot1x_pae_port_number, dot1x_pae_port_entry, pae_controlled_port_status, dot1x_auth_pae_state) = mibBuilder.importSymbols('IEEE8021-PAE-MIB', 'dot1xAuthConfigEntry', 'dot1xPaePortNumber', 'dot1xPaePortEntry', 'PaeControlledPortStatus', 'dot1xAuthPaeState') (interface_index,) = mibBuilder.importSymbols('IF-MIB', 'InterfaceIndex') (inet_address_type, inet_address) = mibBuilder.importSymbols('INET-ADDRESS-MIB', 'InetAddressType', 'InetAddress') (snmp_admin_string,) = mibBuilder.importSymbols('SNMP-FRAMEWORK-MIB', 'SnmpAdminString') (object_group, module_compliance, notification_group) = mibBuilder.importSymbols('SNMPv2-CONF', 'ObjectGroup', 'ModuleCompliance', 'NotificationGroup') (ip_address, unsigned32, iso, integer32, counter64, notification_type, bits, time_ticks, mib_identifier, module_identity, counter32, mib_scalar, mib_table, mib_table_row, mib_table_column, gauge32, object_identity) = mibBuilder.importSymbols('SNMPv2-SMI', 'IpAddress', 'Unsigned32', 'iso', 'Integer32', 'Counter64', 'NotificationType', 'Bits', 'TimeTicks', 'MibIdentifier', 'ModuleIdentity', 'Counter32', 'MibScalar', 'MibTable', 'MibTableRow', 'MibTableColumn', 'Gauge32', 'ObjectIdentity') (row_status, display_string, textual_convention, truth_value, mac_address) = mibBuilder.importSymbols('SNMPv2-TC', 'RowStatus', 'DisplayString', 'TextualConvention', 'TruthValue', 'MacAddress') cisco_pae_mib = module_identity((1, 3, 6, 1, 4, 1, 9, 9, 220)) ciscoPaeMIB.setRevisions(('2009-12-10 00:00', '2008-07-07 00:00', '2008-04-09 00:00', '2007-04-25 00:00', '2007-04-16 00:00', '2007-01-27 00:00', '2005-09-22 00:00', '2004-04-23 00:00', '2004-04-01 00:00', '2003-04-08 00:00', '2002-10-16 00:00', '2001-05-24 10:16')) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): if mibBuilder.loadTexts: ciscoPaeMIB.setRevisionsDescriptions(('Added cpaeSuppPortProfileGroup, and cpaeSuppHostInfoGroup.', 'Added TEXTUAL-CONVENTION CpaeAuthState. Added enumerated value other(4) to cpaePortMode. Added cpaeHostSessionIdGroup, cpaeGuestVlanNotifEnableGroup, cpaeGuestVlanNotifGroup, cpaeAuthFailVlanNotifEnableGrp, cpaeAuthFailVlanNotifGroup, cpaeHostAuthInfoGroup, cpaePortCapabilitiesConfigGroup, cpaeDot1xSuppToGuestVlanGroup. Deprecated cpaePortAuthFailVlanGroup, replaced by cpaePortAuthFailVlanConfigGroup and cpaePortAuthFailUserInfoGroup. Deprecated cpaeCompliance8, replaced by cpaeCompliance9.', "Added cpaeMabAuditInfoGroup, cpaeHostUrlRedirectGroup, cpaeMabPortIpDevTrackConfGroup, cpaePortIpDevTrackConfGroup, cpaeWebAuthIpDevTrackingGroup, cpaeWebAuthUnAuthTimeoutGroup, cpaeGlobalAuthFailVlanGroup, cpaeGlobalSecViolationGroup, cpaeCriticalEapolConfigGroup. Deprecated cpaeMacAuthBypassGroup and replace it by cpaeMacAuthBypassPortEnableGroup, and cpaeMacAuthBypassGroup4; Deprecated cpaeAuthConfigGroup and replace it by cpaeAuthIabConfigGroup, cpaeAuthConfigGroup3 and cpaeAuthConfigGroup4. Modified cpaeMacAuthBypassPortAuthState to add 'ipAwaiting' and 'policyConfig' enum values.", 'Added cpaeMacAuthBypassGroup3, and cpaeHostPostureTokenGroup.', 'Add cpaeHostInfoGroup3.', "Added 'aaaFail' state to cpaeMacAuthBypassPortAuthState and cpaeWebAuthHostState. Added cpaePortAuthFailVlanGroup2, cpaeWebAuthAaaFailGroup, cpaeMacAuthBypassGroup2, cpaePortEapolTestGroup, cpaeHostInfoGroup2, cpaeAuthConfigGroup2, cpaeCriticalRecoveryDelayGroup, cpaeMacAuthBypassCriticalGroup, and cpaeWebAuthCriticalGroup. Obsoleted cpaeHostInfoPostureToken object.", 'Added cpaeGuestVlanGroup3, cpaePortAuthFailVlanGroup, cpaePortOperVlanGroup, cpaeNoGuestVlanNotifEnableGrp, cpaeNoAuthFailVlanNotifEnableGrp, cpaeNoGuestVlanNotifGroup, cpaeNoAuthFailVlanNotifGroup, cpaeMacAuthBypassGroup, cpaeWebAuthGroup, cpaeAuthConfigGroup and cpaeHostInfoGroup. Deprecated cpaeInGuestVlan, cpaeGuestVlanGroup2.', 'Modified the DESCRIPTION clauses of cpaeGuestVlanNumber and cpaeGuestVlanId.', 'Added cpaeUserGroupGroup and cpaeRadiusConfigGroup.', 'Added cpaeGuestVlanGroup2 and cpaeShutdownTimeoutGroup. Deprecated cpaeGuestVlanGroup.', 'Added cpaePortEntryGroup and cpaeGuestVlanGroup. Deprecated cpaeMultipleHostGroup.', 'Initial version of this MIB module.')) if mibBuilder.loadTexts: ciscoPaeMIB.setLastUpdated('200912100000Z') if mibBuilder.loadTexts: ciscoPaeMIB.setOrganization('Cisco System, Inc.') if mibBuilder.loadTexts: ciscoPaeMIB.setContactInfo('Cisco Systems Customer Service Postal: 170 W Tasman Drive San Jose, CA 95134 USA Tel: +1 800 553-NETS E-mail: cs-ibns@cisco.com, cs-lan-switch-snmp@cisco.com') if mibBuilder.loadTexts: ciscoPaeMIB.setDescription('Cisco Port Access Entity (PAE) module for managing IEEE Std 802.1x. This MIB provides Port Access Entity information that are either excluded by IEEE8021-PAE-MIB or specific to Cisco products.') cpae_mib_notification = mib_identifier((1, 3, 6, 1, 4, 1, 9, 9, 220, 0)) cpae_mib_object = mib_identifier((1, 3, 6, 1, 4, 1, 9, 9, 220, 1)) cpae_mib_conformance = mib_identifier((1, 3, 6, 1, 4, 1, 9, 9, 220, 2)) class Reauthperiodsource(TextualConvention, Integer32): description = 'Source of the reAuthPeriod constant, used by the 802.1x Reauthentication Timer state machine. local : local configured reauthentication period specified by the object dot1xAuthReAuthPeriod will be used. server: the reauthentication period will be received from the Authentication server. auto : source of reauthentication period will be decided by the system.' status = 'current' subtype_spec = Integer32.subtypeSpec + constraints_union(single_value_constraint(1, 2, 3)) named_values = named_values(('local', 1), ('server', 2), ('auto', 3)) class Cpaeauthstate(TextualConvention, Integer32): description = "The Authenticator PAE state machine value. other :None of the following states. initialize :The PAE state machine is being initialized. disconnected :An explicit logoff request is received from the Supplicant, or the number of permissible reauthentication attempts has been exceeded. connecting :Attempting to establish a communication with a Supplicant. authenticating:A Supplicant is being authenticated. authenticated :The Authenticator has successfully authenticated the Supplicant. aborting :The authentication process is prematurely aborted due to receipt of a reauthentication request, or an EAPOL-Start frame, or an EAPOL-Logoff frame, or an authTimeout. held :The state machine ignores and discards all EAPOL packets, so as to discourage brute force attacks. This state is entered from the 'authenticating' state following an authentication failure. At the expiration of the quietWhile timer, the state machine transitions to the 'connecting' state. forceAuth :The port is set to Authorized, and a canned EAP Success packet is sent to the Supplicant. forceUnauth :The port is set to Unauthorized, and a canned EAP Failure packet is sent to the Supplicant. If EAP-Start messages are received from the Supplicant, the state is re-entered and further EAP Failure messages are sent. guestVlan :The port has been moved to a configured Guest VLAN. authFailVlan :The port has been moved to a configured Authentication Failed VLAN. criticalAuth :The port has been authorized by Critical Authentication because RADIUS server is not reachable, or does not response. ipAwaiting :The port is waiting for an IP address from DHCP server. policyConfig :This state is entered from 'ipAwaiting' state if an IP address is received and the corresponding policies are being installed. authFinished :The port is set to Authorized by MAC Authentication Bypass feature. restart :The PAE state machine has been restarted. authFallback :Fallback mechanism is applied to the authentication process. authCResult :Authentication completed and the validity of the authorization features is checked. authZSuccess :Authorization policies based on the authentication result are applied. If the policies are applied successfully then the port is authorized otherwise unauthorized." status = 'current' subtype_spec = Integer32.subtypeSpec + constraints_union(single_value_constraint(1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20)) named_values = named_values(('other', 1), ('initialize', 2), ('disconnected', 3), ('connecting', 4), ('authenticating', 5), ('authenticated', 6), ('aborting', 7), ('held', 8), ('forceAuth', 9), ('forceUnauth', 10), ('guestVlan', 11), ('authFailVlan', 12), ('criticalAuth', 13), ('ipAwaiting', 14), ('policyConfig', 15), ('authFinished', 16), ('restart', 17), ('authFallback', 18), ('authCResult', 19), ('authZSuccess', 20)) cpae_port_table = mib_table((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 1)) if mibBuilder.loadTexts: cpaePortTable.setReference('802.1X-2001 9.6.1, 802.1X-2004 9.6.1') if mibBuilder.loadTexts: cpaePortTable.setStatus('current') if mibBuilder.loadTexts: cpaePortTable.setDescription('A table of system level information for each port supported by the Port Access Entity. An entry appears in this table for each PAE port of this system. This table contains additional objects for the dot1xPaePortTable.') cpae_port_entry = mib_table_row((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 1, 1)) dot1xPaePortEntry.registerAugmentions(('CISCO-PAE-MIB', 'cpaePortEntry')) cpaePortEntry.setIndexNames(*dot1xPaePortEntry.getIndexNames()) if mibBuilder.loadTexts: cpaePortEntry.setStatus('current') if mibBuilder.loadTexts: cpaePortEntry.setDescription('An entry containing additional management information applicable to a particular PAE port.') cpae_multiple_host = mib_table_column((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 1, 1, 1), truth_value()).setMaxAccess('readwrite') if mibBuilder.loadTexts: cpaeMultipleHost.setStatus('deprecated') if mibBuilder.loadTexts: cpaeMultipleHost.setDescription('Specifies whether the port allows multiple-host connection or not.') cpae_port_mode = mib_table_column((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 1, 1, 2), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(1, 2, 3, 4))).clone(namedValues=named_values(('singleHost', 1), ('multiHost', 2), ('multiAuth', 3), ('other', 4)))).setMaxAccess('readwrite') if mibBuilder.loadTexts: cpaePortMode.setStatus('current') if mibBuilder.loadTexts: cpaePortMode.setDescription('Specifies the current mode of dot1x operation on the port. singleHost(1): port allows one host to connect and authenticate. multiHost(2) : port allows multiple hosts to connect. Once a host is authenticated, all remaining hosts are also authorized. multiAuth(3) : port allows multiple hosts to connect and each host is authenticated. other(4) : none of the above. This is a read-only value which can not be used in set operation. If the port security feature is enabled on the interface, the configuration of the port security (such as the number of the hosts allowed, the security violation action, etc) will apply to the interface.') cpae_guest_vlan_number = mib_table_column((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 1, 1, 3), vlan_index()).setMaxAccess('readwrite') if mibBuilder.loadTexts: cpaeGuestVlanNumber.setStatus('current') if mibBuilder.loadTexts: cpaeGuestVlanNumber.setDescription("Specifies the Guest Vlan of the interface. An interface with cpaePortMode value of 'singleHost' will be moved to its Guest Vlan if the supplicant on the interface is not capable of IEEE-802.1x authentication. A value of zero for this object indicates no Guest Vlan configured for the interface.") cpae_in_guest_vlan = mib_table_column((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 1, 1, 4), truth_value()).setMaxAccess('readonly') if mibBuilder.loadTexts: cpaeInGuestVlan.setStatus('deprecated') if mibBuilder.loadTexts: cpaeInGuestVlan.setDescription('Indicates whether the interface is in its Guest Vlan or not. The object is deprecated in favor of newly added object cpaePortOperVlanType.') cpae_shutdown_timeout_enabled = mib_table_column((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 1, 1, 5), truth_value()).setMaxAccess('readwrite') if mibBuilder.loadTexts: cpaeShutdownTimeoutEnabled.setStatus('current') if mibBuilder.loadTexts: cpaeShutdownTimeoutEnabled.setDescription('Specifies whether shutdown timeout feature is enabled on the interface.') cpae_port_auth_fail_vlan = mib_table_column((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 1, 1, 6), vlan_index()).setMaxAccess('readwrite') if mibBuilder.loadTexts: cpaePortAuthFailVlan.setStatus('current') if mibBuilder.loadTexts: cpaePortAuthFailVlan.setDescription('Specifies the Auth-Fail (Authentication Fail) Vlan of the port. A port is moved to Auth-Fail Vlan if the supplicant which support IEEE-802.1x authentication is unsuccessfully authenticated. A value of zero for this object indicates no Auth-Fail Vlan configured for the port.') cpae_port_oper_vlan = mib_table_column((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 1, 1, 7), vlan_index()).setMaxAccess('readonly') if mibBuilder.loadTexts: cpaePortOperVlan.setStatus('current') if mibBuilder.loadTexts: cpaePortOperVlan.setDescription('The VlanIndex of the Vlan which is assigned to this port via IEEE-802.1x and related methods of authentication supported by the system. A value of zero for this object indicates that no Vlan is assigned to this port via IEEE-802.1x authentication.') cpae_port_oper_vlan_type = mib_table_column((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 1, 1, 8), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(1, 2, 3, 4))).clone(namedValues=named_values(('other', 1), ('none', 2), ('guest', 3), ('authFail', 4)))).setMaxAccess('readonly') if mibBuilder.loadTexts: cpaePortOperVlanType.setStatus('current') if mibBuilder.loadTexts: cpaePortOperVlanType.setDescription("The type of the Vlan which is assigned to this port via IEEE-802.1x and related methods of authentication supported by the system. A value of 'other' for this object indicates type of Vlan assigned to this port; via IEEE-802.1x authentication; is other than the ones specified by listed enumerations for this object. A value of 'none' for this object indicates that there is no Vlan assigned to this port via IEEE-802.1x authentication. For such a case, corresponding value of cpaePortOperVlan object will be zero. A value of 'guest' for this object indicates that Vlan assigned to this port; via IEEE-802.1x authentication; is of type Guest Vlan and specified by the object cpaeGuestVlanNumber for this entry. A value of 'authFail' for this object indicates that Vlan assigned to this port; via IEEE-802.1x authentication; is of type Auth-Fail Vlan and specified by the object cpaePortAuthFailVlan for this entry.") cpae_auth_fail_vlan_max_attempts = mib_table_column((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 1, 1, 9), unsigned32()).setMaxAccess('readwrite') if mibBuilder.loadTexts: cpaeAuthFailVlanMaxAttempts.setStatus('current') if mibBuilder.loadTexts: cpaeAuthFailVlanMaxAttempts.setDescription('Specifies the maximum number of authentication attempts should be made before the port is moved into the Auth-Fail Vlan.') cpae_port_capabilities_enabled = mib_table_column((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 1, 1, 10), bits().clone(namedValues=named_values(('authenticator', 0), ('supplicant', 1)))).setMaxAccess('readwrite') if mibBuilder.loadTexts: cpaePortCapabilitiesEnabled.setReference('802.1X-2001 9.6.1, PAE Capabilities, 802.1X-2004 9.6.1, PAE Capabilities') if mibBuilder.loadTexts: cpaePortCapabilitiesEnabled.setStatus('current') if mibBuilder.loadTexts: cpaePortCapabilitiesEnabled.setDescription('Specifies the type of PAE functionality of the port which are enabled. authenticator: PAE Authenticator functions are enabled. supplicant : PAE Supplicant functions are enabled. Only those supported PAE functions which are listed in the corresponding instance of dot1xPaePortCapabilities can be enabled.') cpae_guest_vlan_id = mib_scalar((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 2), vlan_index()).setMaxAccess('readwrite') if mibBuilder.loadTexts: cpaeGuestVlanId.setStatus('deprecated') if mibBuilder.loadTexts: cpaeGuestVlanId.setDescription("Specifies the Guest Vlan of the system. An interface with cpaePortMode value of 'singleHost' will be moved to Guest Vlan if the supplicant on the interface is not IEEE-802.1x capable. A value of zero indicates no Guest Vlan configured in the system. If the platform supports per-port guest Vlan ID configuration, this object is not instantiated.") cpae_shutdown_timeout = mib_scalar((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 3), unsigned32().subtype(subtypeSpec=value_range_constraint(0, 65535))).setUnits('seconds').setMaxAccess('readwrite') if mibBuilder.loadTexts: cpaeShutdownTimeout.setStatus('current') if mibBuilder.loadTexts: cpaeShutdownTimeout.setDescription("Specifies the shutdown timeout interval to enable the interface automatically in case it is shutdown due to security violation. If the value of this object is 0, the interfaces shutdown due to the security violation will not be enabled automatically. The value of this object is applicable to the interface only when cpaeShutdownTimeoutEnabled is 'true', and port security feature is disabled on the interface.") cpae_radius_accounting_enabled = mib_scalar((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 4), truth_value()).setMaxAccess('readwrite') if mibBuilder.loadTexts: cpaeRadiusAccountingEnabled.setStatus('current') if mibBuilder.loadTexts: cpaeRadiusAccountingEnabled.setDescription('Specifies if RADIUS accounting is enabled for 802.1x on this devices.') cpae_user_group_table = mib_table((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 5)) if mibBuilder.loadTexts: cpaeUserGroupTable.setStatus('current') if mibBuilder.loadTexts: cpaeUserGroupTable.setDescription('A table of Group Manager and authenticated users information on the device.') cpae_user_group_entry = mib_table_row((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 5, 1)).setIndexNames((0, 'CISCO-PAE-MIB', 'cpaeUserGroupName'), (0, 'CISCO-PAE-MIB', 'cpaeUserGroupUserIndex')) if mibBuilder.loadTexts: cpaeUserGroupEntry.setStatus('current') if mibBuilder.loadTexts: cpaeUserGroupEntry.setDescription('Information about an 802.1x authenticated user on the devices.') cpae_user_group_name = mib_table_column((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 5, 1, 1), snmp_admin_string().subtype(subtypeSpec=value_size_constraint(1, 100))) if mibBuilder.loadTexts: cpaeUserGroupName.setStatus('current') if mibBuilder.loadTexts: cpaeUserGroupName.setDescription('Specifies the name of the group that the user belongs to.') cpae_user_group_user_index = mib_table_column((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 5, 1, 2), unsigned32()) if mibBuilder.loadTexts: cpaeUserGroupUserIndex.setStatus('current') if mibBuilder.loadTexts: cpaeUserGroupUserIndex.setDescription('The index of an user within a group.') cpae_user_group_user_name = mib_table_column((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 5, 1, 3), snmp_admin_string()).setMaxAccess('readonly') if mibBuilder.loadTexts: cpaeUserGroupUserName.setStatus('current') if mibBuilder.loadTexts: cpaeUserGroupUserName.setDescription('Specifies the name of the user authenticated on a port of the device.') cpae_user_group_user_addr_type = mib_table_column((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 5, 1, 4), inet_address_type()).setMaxAccess('readonly') if mibBuilder.loadTexts: cpaeUserGroupUserAddrType.setStatus('current') if mibBuilder.loadTexts: cpaeUserGroupUserAddrType.setDescription('Specifies the type of address used to determine the address of the user.') cpae_user_group_user_addr = mib_table_column((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 5, 1, 5), inet_address()).setMaxAccess('readonly') if mibBuilder.loadTexts: cpaeUserGroupUserAddr.setStatus('current') if mibBuilder.loadTexts: cpaeUserGroupUserAddr.setDescription('Specifies the address of the host that the user logging from.') cpae_user_group_user_interface = mib_table_column((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 5, 1, 6), interface_index()).setMaxAccess('readonly') if mibBuilder.loadTexts: cpaeUserGroupUserInterface.setStatus('current') if mibBuilder.loadTexts: cpaeUserGroupUserInterface.setDescription('Specifies the interface index that the user is authenticated on.') cpae_user_group_user_vlan = mib_table_column((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 5, 1, 7), vlan_index()).setMaxAccess('readonly') if mibBuilder.loadTexts: cpaeUserGroupUserVlan.setStatus('current') if mibBuilder.loadTexts: cpaeUserGroupUserVlan.setDescription('Specifies the vlan that the user belongs to.') cpae_auth_fail_user_table = mib_table((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 6)) if mibBuilder.loadTexts: cpaeAuthFailUserTable.setStatus('current') if mibBuilder.loadTexts: cpaeAuthFailUserTable.setDescription('A table to list user information for each port on the system supported by the Port Access Entity and assigned to Auth-Fail Vlan.') cpae_auth_fail_user_entry = mib_table_row((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 6, 1)).setIndexNames((0, 'IEEE8021-PAE-MIB', 'dot1xPaePortNumber')) if mibBuilder.loadTexts: cpaeAuthFailUserEntry.setStatus('current') if mibBuilder.loadTexts: cpaeAuthFailUserEntry.setDescription("An entry appears in this table for each PAE port on the system which is assigned to Vlan of type 'authFail' via IEEE-802.1x authentication.") cpae_auth_fail_user_name = mib_table_column((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 6, 1, 1), snmp_admin_string()).setMaxAccess('readonly') if mibBuilder.loadTexts: cpaeAuthFailUserName.setStatus('current') if mibBuilder.loadTexts: cpaeAuthFailUserName.setDescription('Indicates the name of the user who failed IEEE-802.1x authentication and hence now assigned to Auth-Fail Vlan. The Auth-Fail Vlan to which the user belongs is determined by the value of object cpaePortAuthFailVlan for this port.') cpae_notification_control = mib_identifier((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 7)) cpae_no_guest_vlan_notif_enable = mib_scalar((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 7, 1), truth_value()).setMaxAccess('readwrite') if mibBuilder.loadTexts: cpaeNoGuestVlanNotifEnable.setStatus('current') if mibBuilder.loadTexts: cpaeNoGuestVlanNotifEnable.setDescription("This object specifies whether the system produces the cpaeNoGuestVlanNotif. A 'false' value will prevent cpaeNoGuestVlanNotif from being generated by this system.") cpae_no_auth_fail_vlan_notif_enable = mib_scalar((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 7, 2), truth_value()).setMaxAccess('readwrite') if mibBuilder.loadTexts: cpaeNoAuthFailVlanNotifEnable.setStatus('current') if mibBuilder.loadTexts: cpaeNoAuthFailVlanNotifEnable.setDescription("This object specifies whether the system produces the cpaeNoAuthFailVlanNotif. A 'false' value will prevent cpaeNoAuthFailVlanNotif from being generated by this system.") cpae_guest_vlan_notif_enable = mib_scalar((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 7, 3), truth_value()).setMaxAccess('readwrite') if mibBuilder.loadTexts: cpaeGuestVlanNotifEnable.setStatus('current') if mibBuilder.loadTexts: cpaeGuestVlanNotifEnable.setDescription("This object specifies whether the system produces the cpaeGuestVlanNotif. A 'false' value will prevent cpaeGuestVlanNotif from being generated by this system.") cpae_auth_fail_vlan_notif_enable = mib_scalar((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 7, 4), truth_value()).setMaxAccess('readwrite') if mibBuilder.loadTexts: cpaeAuthFailVlanNotifEnable.setStatus('current') if mibBuilder.loadTexts: cpaeAuthFailVlanNotifEnable.setDescription("This object specifies whether the system produces the cpaeAuthFailVlanNotif. A 'false' value will prevent cpaeAuthFailVlanNotif from being generated by this system.") cpae_mac_auth_bypass = mib_identifier((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 8)) cpae_mac_auth_bypass_re_auth_timeout = mib_scalar((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 8, 1), unsigned32()).setUnits('seconds').setMaxAccess('readwrite') if mibBuilder.loadTexts: cpaeMacAuthBypassReAuthTimeout.setStatus('current') if mibBuilder.loadTexts: cpaeMacAuthBypassReAuthTimeout.setDescription('Specifies the waiting time before reauthentication is triggered on all MAC Auth-bypass authenticated ports.') cpae_mac_auth_bypass_re_auth_enabled = mib_scalar((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 8, 2), truth_value()).setMaxAccess('readwrite') if mibBuilder.loadTexts: cpaeMacAuthBypassReAuthEnabled.setStatus('current') if mibBuilder.loadTexts: cpaeMacAuthBypassReAuthEnabled.setDescription("The reauthentication control for all MAC Auth-bypass ports. Setting this object to 'true' causes every MAC Auth-Bypass authenticated port to reauthenticate the device connecting to the port, after every period of time specified by the object cpaeMacAuthBypassReAuthTimeout. Setting this object to 'false' will disable the MAC Auth-Bypass global reauthentication.") cpae_mac_auth_bypass_violation = mib_scalar((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 8, 3), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(1, 2))).clone(namedValues=named_values(('restrict', 1), ('shutdown', 2)))).setMaxAccess('readwrite') if mibBuilder.loadTexts: cpaeMacAuthBypassViolation.setStatus('current') if mibBuilder.loadTexts: cpaeMacAuthBypassViolation.setDescription('Specifies the action upon reception of a security violation event. restrict(1): Packets from MAC address of the device causing security violation will be dropped. shutdown(2): The port that causes security violation will be shutdown.') cpae_mac_auth_bypass_shutdown_timeout = mib_scalar((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 8, 4), unsigned32()).setUnits('seconds').setMaxAccess('readwrite') if mibBuilder.loadTexts: cpaeMacAuthBypassShutdownTimeout.setStatus('current') if mibBuilder.loadTexts: cpaeMacAuthBypassShutdownTimeout.setDescription('Specifies time before a port is auto-enabled after being shutdown due to a MAC Auth-bypass security violation.') cpae_mac_auth_bypass_auth_fail_timeout = mib_scalar((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 8, 5), unsigned32()).setUnits('seconds').setMaxAccess('readwrite') if mibBuilder.loadTexts: cpaeMacAuthBypassAuthFailTimeout.setStatus('current') if mibBuilder.loadTexts: cpaeMacAuthBypassAuthFailTimeout.setDescription('Specifies the time a MAC Auth-bypass unauthenticated port waits before trying the authentication process again.') cpae_mac_auth_bypass_port_table = mib_table((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 8, 6)) if mibBuilder.loadTexts: cpaeMacAuthBypassPortTable.setStatus('current') if mibBuilder.loadTexts: cpaeMacAuthBypassPortTable.setDescription('A table of MAC Authentication Bypass (MAC Auth-Bypass) configuration and information for ports in the device.') cpae_mac_auth_bypass_port_entry = mib_table_row((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 8, 6, 1)).setIndexNames((0, 'IEEE8021-PAE-MIB', 'dot1xPaePortNumber')) if mibBuilder.loadTexts: cpaeMacAuthBypassPortEntry.setStatus('current') if mibBuilder.loadTexts: cpaeMacAuthBypassPortEntry.setDescription('An entry containing management information for MAC Auth-Bypass feature on a port.') cpae_mac_auth_bypass_port_enabled = mib_table_column((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 8, 6, 1, 1), truth_value()).setMaxAccess('readwrite') if mibBuilder.loadTexts: cpaeMacAuthBypassPortEnabled.setStatus('current') if mibBuilder.loadTexts: cpaeMacAuthBypassPortEnabled.setDescription('Specifies whether MAC Auth-Bypass is enabled on the port.') cpae_mac_auth_bypass_port_initialize = mib_table_column((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 8, 6, 1, 2), truth_value()).setMaxAccess('readwrite') if mibBuilder.loadTexts: cpaeMacAuthBypassPortInitialize.setStatus('current') if mibBuilder.loadTexts: cpaeMacAuthBypassPortInitialize.setDescription("The initialization control for this port. Setting this object to 'true' causes the MAC Auth-bypass state machine to be initialized on the port. Setting this object to 'false' has no effect. This object always returns 'false' when it is read.") cpae_mac_auth_bypass_port_re_auth = mib_table_column((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 8, 6, 1, 3), truth_value()).setMaxAccess('readwrite') if mibBuilder.loadTexts: cpaeMacAuthBypassPortReAuth.setStatus('current') if mibBuilder.loadTexts: cpaeMacAuthBypassPortReAuth.setDescription("The reauthentication control for this port. Setting this object to 'true' causes the MAC address of the device connecting to the port to be reauthenticated. Setting this object to 'false' has no effect. This object always returns 'false' when it is read.") cpae_mac_auth_bypass_port_mac_address = mib_table_column((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 8, 6, 1, 4), mac_address()).setMaxAccess('readonly') if mibBuilder.loadTexts: cpaeMacAuthBypassPortMacAddress.setStatus('current') if mibBuilder.loadTexts: cpaeMacAuthBypassPortMacAddress.setDescription('Indicates the MAC address of the device connecting to the port.') cpae_mac_auth_bypass_port_auth_state = mib_table_column((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 8, 6, 1, 5), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(1, 2, 3, 4, 5, 6, 7, 8, 9))).clone(namedValues=named_values(('other', 1), ('waiting', 2), ('authenticating', 3), ('authenticated', 4), ('fail', 5), ('finished', 6), ('aaaFail', 7), ('ipAwaiting', 8), ('policyConfig', 9)))).setMaxAccess('readonly') if mibBuilder.loadTexts: cpaeMacAuthBypassPortAuthState.setStatus('current') if mibBuilder.loadTexts: cpaeMacAuthBypassPortAuthState.setDescription("Indicates the current state of the MAC Auth-Bypass state machine. other(1) : An unknown state. waiting(2) : Waiting to receive the MAC address that needs to be authenticated. authenticating(3): In authentication process. authenticated(4) : MAC address of the device connecting to the port is authenticated. fail(5) : MAC Auth-bypass authentication failed. Port waits for a period of time before moving to the 'waiting' state, if there is no other authentication features available in the system. finished(6) : MAC Auth-bypass authentication failed. Port is authenticated by another authentication feature. aaaFail(7) : AAA server is not reachable after sending the authentication request or after the expiration of re-authentication timeout, with IAB (Inaccessible Authentication Bypass) enabled on the port. ipAwaiting(8) : Corresponding QoS/Security ACLs and other Vendor Specific Attributes are being configured on the port, after which IP address will be obtained via DHCP snooping or ARP inspection. policyConfig(9) : Policy Groups or downloaded ACLs are being configured on the port.") cpae_mac_auth_bypass_port_term_action = mib_table_column((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 8, 6, 1, 6), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(1, 2, 3))).clone(namedValues=named_values(('other', 1), ('init', 2), ('reauth', 3)))).setMaxAccess('readonly') if mibBuilder.loadTexts: cpaeMacAuthBypassPortTermAction.setStatus('current') if mibBuilder.loadTexts: cpaeMacAuthBypassPortTermAction.setDescription('Indicates the termination action received from RADIUS server that will be applied on the port when the current session timeout expired. other : none of the following. init : current session will be terminated and a new authentication process will be initiated. reauth: reauthentication will be applied without terminating the current session.') cpae_mac_auth_bypass_session_time_left = mib_table_column((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 8, 6, 1, 7), unsigned32()).setUnits('seconds').setMaxAccess('readonly') if mibBuilder.loadTexts: cpaeMacAuthBypassSessionTimeLeft.setStatus('current') if mibBuilder.loadTexts: cpaeMacAuthBypassSessionTimeLeft.setDescription('Indicates the leftover time of the current MAC Auth-Bypass session on this port.') cpae_mac_auth_bypass_port_auth_method = mib_table_column((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 8, 6, 1, 8), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(1, 2))).clone(namedValues=named_values(('radius', 1), ('eap', 2)))).setMaxAccess('readwrite') if mibBuilder.loadTexts: cpaeMacAuthBypassPortAuthMethod.setStatus('current') if mibBuilder.loadTexts: cpaeMacAuthBypassPortAuthMethod.setDescription('Specifies the authentication method used by MAC Authentication Bypass. radius(1) : communication with authentication server is performed via RADIUS messages. eap(2) : communication with authentication server is performed via EAP messages.') cpae_mac_auth_bypass_port_session_id = mib_table_column((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 8, 6, 1, 9), snmp_admin_string()).setMaxAccess('readonly') if mibBuilder.loadTexts: cpaeMacAuthBypassPortSessionId.setStatus('current') if mibBuilder.loadTexts: cpaeMacAuthBypassPortSessionId.setDescription("Indicates the session ID of the MAC Auth-Bypass Audit session on the port. A zero length string will be returned for this object if value of the corresponding instance of cpaeMacAuthBypassPortEnabled is 'false'.") cpae_mac_auth_bypass_port_url_redirect = mib_table_column((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 8, 6, 1, 10), snmp_admin_string()).setMaxAccess('readonly') if mibBuilder.loadTexts: cpaeMacAuthBypassPortUrlRedirect.setStatus('current') if mibBuilder.loadTexts: cpaeMacAuthBypassPortUrlRedirect.setDescription("Indicates the URL of an Audit server, provided by AAA server, to which a MAC auth-Bypass host will be redirected to when an Audit session starts off. A zero-length string indicates that the audit process will be performed via port scan instead, or value of the corresponding instance of cpaeMacAuthBypassPortEnabled is 'false'.") cpae_mac_auth_bypass_port_posture_tok = mib_table_column((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 8, 6, 1, 11), cnn_eou_posture_token_string().subtype(subtypeSpec=value_size_constraint(0, 255))).setMaxAccess('readonly') if mibBuilder.loadTexts: cpaeMacAuthBypassPortPostureTok.setStatus('current') if mibBuilder.loadTexts: cpaeMacAuthBypassPortPostureTok.setDescription("Indicates the Posture Token assigned to the MAC Auth-Bypass host connected to this port. A zero length string will be returned for this object if value of the corresponding instance of cpaeMacAuthBypassPortEnabled is 'false'.") cpae_mac_auth_bypass_acct_enable = mib_scalar((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 8, 7), truth_value()).setMaxAccess('readwrite') if mibBuilder.loadTexts: cpaeMacAuthBypassAcctEnable.setStatus('current') if mibBuilder.loadTexts: cpaeMacAuthBypassAcctEnable.setDescription('Specifies if accounting is enabled for Mac Authentication Bypass feature on this device.') cpae_mab_critical_recovery_delay = mib_scalar((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 8, 8), unsigned32()).setUnits('milli-seconds').setMaxAccess('readwrite') if mibBuilder.loadTexts: cpaeMabCriticalRecoveryDelay.setStatus('current') if mibBuilder.loadTexts: cpaeMabCriticalRecoveryDelay.setDescription('This object specifies the critical recovery delay time for Mac Authentication Bypass in the system. A value of zero indicates that critical recovery delay for MAC Authentication Bypass is disabled.') cpae_mab_port_ip_dev_track_conf_table = mib_table((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 8, 9)) if mibBuilder.loadTexts: cpaeMabPortIpDevTrackConfTable.setStatus('current') if mibBuilder.loadTexts: cpaeMabPortIpDevTrackConfTable.setDescription('A table of IP Device Tracking configuration for MAC Auth-Bypass interfaces in the system.') cpae_mab_port_ip_dev_track_conf_entry = mib_table_row((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 8, 9, 1)).setIndexNames((0, 'IEEE8021-PAE-MIB', 'dot1xPaePortNumber')) if mibBuilder.loadTexts: cpaeMabPortIpDevTrackConfEntry.setStatus('current') if mibBuilder.loadTexts: cpaeMabPortIpDevTrackConfEntry.setDescription('An entry of MAC Auth-Bypass configuration for IP Device Tracking on an MAC Auth-Bypass capable interface.') cpae_mab_port_ip_dev_track_enabled = mib_table_column((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 8, 9, 1, 1), truth_value()).setMaxAccess('readwrite') if mibBuilder.loadTexts: cpaeMabPortIpDevTrackEnabled.setStatus('current') if mibBuilder.loadTexts: cpaeMabPortIpDevTrackEnabled.setDescription('Specifies whether IP Device Tracking is enabled or not on this port for the corresponding MAC Auth-bypass authenticated host.') cpae_web_auth = mib_identifier((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 9)) cpae_web_auth_enabled = mib_scalar((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 9, 1), truth_value()).setMaxAccess('readwrite') if mibBuilder.loadTexts: cpaeWebAuthEnabled.setStatus('current') if mibBuilder.loadTexts: cpaeWebAuthEnabled.setDescription('Specifies whether Web Proxy Authentication is enabled in the system.') cpae_web_auth_session_period = mib_scalar((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 9, 2), unsigned32()).setUnits('seconds').setMaxAccess('readwrite') if mibBuilder.loadTexts: cpaeWebAuthSessionPeriod.setStatus('current') if mibBuilder.loadTexts: cpaeWebAuthSessionPeriod.setDescription('Specifies the Web Proxy Authentication session period for the system. Session period is the time after which an Web Proxy Authenticated session is terminated.') cpae_web_auth_login_page = mib_scalar((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 9, 3), cisco_url_string()).setMaxAccess('readwrite') if mibBuilder.loadTexts: cpaeWebAuthLoginPage.setStatus('current') if mibBuilder.loadTexts: cpaeWebAuthLoginPage.setDescription('Specifies the customized login page for Web Proxy Authentication, in the format of an URL. A customized login page is required to support the same input fields as the default login page for users to input credentials. If this object contains a zero length string, the default login page will be used.') cpae_web_auth_login_failed_page = mib_scalar((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 9, 4), cisco_url_string()).setMaxAccess('readwrite') if mibBuilder.loadTexts: cpaeWebAuthLoginFailedPage.setStatus('current') if mibBuilder.loadTexts: cpaeWebAuthLoginFailedPage.setDescription('Specifies the customized login-failed page for Web Proxy Authentication, in the format of an URL. Login-failed page is sent back to the client upon an authentication failure. A login-failed page requires to have all the input fields of the login page, in addition to the authentication failure information. If this object contains a zero length string, the default login-failed page will be used.') cpae_web_auth_quiet_period = mib_scalar((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 9, 5), unsigned32()).setUnits('seconds').setMaxAccess('readwrite') if mibBuilder.loadTexts: cpaeWebAuthQuietPeriod.setStatus('current') if mibBuilder.loadTexts: cpaeWebAuthQuietPeriod.setDescription("Specifies the time a Web Proxy Authentication state machine will be held in 'blackListed' state after maximum authentication attempts.") cpae_web_auth_max_retries = mib_scalar((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 9, 6), unsigned32()).setMaxAccess('readwrite') if mibBuilder.loadTexts: cpaeWebAuthMaxRetries.setStatus('current') if mibBuilder.loadTexts: cpaeWebAuthMaxRetries.setDescription('Specifies the maximum number of unsuccessful login attempts a user is allowed to make.') cpae_web_auth_port_table = mib_table((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 9, 7)) if mibBuilder.loadTexts: cpaeWebAuthPortTable.setStatus('current') if mibBuilder.loadTexts: cpaeWebAuthPortTable.setDescription('A table of Web Proxy Authentication configuration and information for the feature capable ports in the device.') cpae_web_auth_port_entry = mib_table_row((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 9, 7, 1)).setIndexNames((0, 'IEEE8021-PAE-MIB', 'dot1xPaePortNumber')) if mibBuilder.loadTexts: cpaeWebAuthPortEntry.setStatus('current') if mibBuilder.loadTexts: cpaeWebAuthPortEntry.setDescription('An entry containing management information for Web Proxy Authentication feature on a port.') cpae_web_auth_port_enabled = mib_table_column((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 9, 7, 1, 1), truth_value()).setMaxAccess('readwrite') if mibBuilder.loadTexts: cpaeWebAuthPortEnabled.setStatus('current') if mibBuilder.loadTexts: cpaeWebAuthPortEnabled.setDescription('Specifies whether Web Proxy Authentication is enabled on the port.') cpae_web_auth_port_initialize = mib_table_column((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 9, 7, 1, 2), truth_value()).setMaxAccess('readwrite') if mibBuilder.loadTexts: cpaeWebAuthPortInitialize.setStatus('current') if mibBuilder.loadTexts: cpaeWebAuthPortInitialize.setDescription("The initialization control for this port. Setting this object to 'true' causes Web Proxy Authentication state machine to be initialized for all the hosts connecting to the port. Setting this object to 'false' has no effect. This object always returns 'false' when it is read.") cpae_web_auth_port_aaa_fail_policy = mib_table_column((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 9, 7, 1, 3), cpg_policy_name_or_empty()).setMaxAccess('readwrite') if mibBuilder.loadTexts: cpaeWebAuthPortAaaFailPolicy.setStatus('current') if mibBuilder.loadTexts: cpaeWebAuthPortAaaFailPolicy.setDescription("Specifies the policy name to be applied on the port when the corresponding cpaeWebAuthHostState is 'aaaFail'. The specified policy name must either be an existing entry in cpgPolicyTable defined in CISCO-POLICY-GROUP-MIB, or an empty string which indicates that there will be no policy name applied on the port when the corresponding cpaeWebAuthHostState is 'aaaFail'.") cpae_web_auth_port_ip_dev_track_enabled = mib_table_column((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 9, 7, 1, 4), truth_value()).setMaxAccess('readwrite') if mibBuilder.loadTexts: cpaeWebAuthPortIpDevTrackEnabled.setStatus('current') if mibBuilder.loadTexts: cpaeWebAuthPortIpDevTrackEnabled.setDescription('Specifies whether IP Device Tracking is enabled or not on this port for the corresponding Web Proxy authenticated host.') cpae_web_auth_host_table = mib_table((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 9, 8)) if mibBuilder.loadTexts: cpaeWebAuthHostTable.setStatus('current') if mibBuilder.loadTexts: cpaeWebAuthHostTable.setDescription('A table of Web Proxy Authentication information for hosts currently managed by the feature. An entry is added to the table when a host is detected and Web Proxy Authentication state machine is initiated for the host.') cpae_web_auth_host_entry = mib_table_row((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 9, 8, 1)).setIndexNames((0, 'IEEE8021-PAE-MIB', 'dot1xPaePortNumber'), (0, 'CISCO-PAE-MIB', 'cpaeWebAuthHostAddrType'), (0, 'CISCO-PAE-MIB', 'cpaeWebAuthHostAddress')) if mibBuilder.loadTexts: cpaeWebAuthHostEntry.setStatus('current') if mibBuilder.loadTexts: cpaeWebAuthHostEntry.setDescription('An entry containing management information for Web Proxy Authentication feature on a host.') cpae_web_auth_host_addr_type = mib_table_column((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 9, 8, 1, 1), inet_address_type()) if mibBuilder.loadTexts: cpaeWebAuthHostAddrType.setStatus('current') if mibBuilder.loadTexts: cpaeWebAuthHostAddrType.setDescription('Indicates the Internet address type for the host.') cpae_web_auth_host_address = mib_table_column((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 9, 8, 1, 2), inet_address().subtype(subtypeSpec=value_size_constraint(0, 64))) if mibBuilder.loadTexts: cpaeWebAuthHostAddress.setStatus('current') if mibBuilder.loadTexts: cpaeWebAuthHostAddress.setDescription('Indicates the Internet address for the host. The type of this address is determined by the value of cpaeWebAuthHostAddrType.') cpae_web_auth_aaa_session_period = mib_table_column((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 9, 8, 1, 3), unsigned32()).setUnits('seconds').setMaxAccess('readonly') if mibBuilder.loadTexts: cpaeWebAuthAaaSessionPeriod.setStatus('current') if mibBuilder.loadTexts: cpaeWebAuthAaaSessionPeriod.setDescription('Indicates the session period for a Web Proxy Authenticated session on this host, supplied by the AAA server. If value of this object is none zero, it will take precedence over the period specified by cpaeWebAuthPortSessionPeriod.') cpae_web_auth_host_session_time_left = mib_table_column((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 9, 8, 1, 4), unsigned32()).setUnits('seconds').setMaxAccess('readonly') if mibBuilder.loadTexts: cpaeWebAuthHostSessionTimeLeft.setStatus('current') if mibBuilder.loadTexts: cpaeWebAuthHostSessionTimeLeft.setDescription('Indicates the leftover time of the current Web Proxy Authenticated session for this host.') cpae_web_auth_host_state = mib_table_column((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 9, 8, 1, 5), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(1, 2, 3, 4, 5, 6, 7, 8, 9))).clone(namedValues=named_values(('initialize', 1), ('connecting', 2), ('authenticating', 3), ('authenticated', 4), ('authFailed', 5), ('parseError', 6), ('sessionTimeout', 7), ('blackListed', 8), ('aaaFail', 9)))).setMaxAccess('readonly') if mibBuilder.loadTexts: cpaeWebAuthHostState.setStatus('current') if mibBuilder.loadTexts: cpaeWebAuthHostState.setDescription("Indicates the current state of the Web Proxy Authentication state machine. initialize : Initial state of the Web Proxy Authentication state machine. connecting : Login page is sent to the client, waiting for response from the client. authenticating: Credentials are extracted from client's response and authenticating with the AAA server. authenticated : Web Proxy Authentication succeeded. Session timer is started, policies are applied, and success page is sent back to client. authFailed : Web Proxy Authentication failed. Login page is resent with authentication failure information embedded, if retry count has not exceeded the maximum number of retry attempts. Otherwise, move to 'blackListed' state. parseError : Failed to extract user's credentials from the client's response. sessionTimeout: Session timer expired, user's policies are removed, state machine will moves to 'initialize' state after that. blackListed : Web Proxy Authentication retry count has exceeded the maximum number of retry attempts. Only setting the state machine to 'initialize' will take it out of this state. aaaFail : AAA server is not reachable after sending the authentication request, or after host has been in 'blackListed' state for the period of time specified by cpaeWebAuthQuietPeriod, with IAB (Inaccessible Authentication Bypass) enabled on the corresponding port connected to the host.") cpae_web_auth_host_initialize = mib_table_column((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 9, 8, 1, 6), truth_value()).setMaxAccess('readwrite') if mibBuilder.loadTexts: cpaeWebAuthHostInitialize.setStatus('current') if mibBuilder.loadTexts: cpaeWebAuthHostInitialize.setDescription("The initialization control for this host. Setting this object to 'true' causes Web Proxy Authentication state machine to be initialized for the host. Setting this object to 'false' has no effect. This object always returns 'false' when it is read.") cpae_web_auth_critical_recovery_delay = mib_scalar((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 9, 9), unsigned32()).setUnits('milli-seconds').setMaxAccess('readwrite') if mibBuilder.loadTexts: cpaeWebAuthCriticalRecoveryDelay.setStatus('current') if mibBuilder.loadTexts: cpaeWebAuthCriticalRecoveryDelay.setDescription('This object specifies the critical recovery delay time for Web Proxy Authentication in the system. A value of zero indicates that critical recovery delay for Web Proxy Authentication is disabled.') cpae_web_auth_un_auth_state_timeout = mib_scalar((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 9, 10), unsigned32().subtype(subtypeSpec=value_range_constraint(1, 4294967295))).setUnits('minutes').setMaxAccess('readwrite') if mibBuilder.loadTexts: cpaeWebAuthUnAuthStateTimeout.setStatus('current') if mibBuilder.loadTexts: cpaeWebAuthUnAuthStateTimeout.setDescription("The authentication timeout period for Web Proxy Authentication. Once a host enters 'initialize' state as indicated by its corresponding cpaeWebAuthHostState, such host will be removed if it can not be authenticated within the timeout period.") cpae_auth_config_table = mib_table((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 10)) if mibBuilder.loadTexts: cpaeAuthConfigTable.setStatus('current') if mibBuilder.loadTexts: cpaeAuthConfigTable.setDescription('A table containing the configuration objects for the Authenticator PAE associated with each port. An entry appears in this table for each PAE port that may authenticate access to itself. This table contain additional objects for the dot1xAuthConfigTable.') cpae_auth_config_entry = mib_table_row((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 10, 1)) dot1xAuthConfigEntry.registerAugmentions(('CISCO-PAE-MIB', 'cpaeAuthConfigEntry')) cpaeAuthConfigEntry.setIndexNames(*dot1xAuthConfigEntry.getIndexNames()) if mibBuilder.loadTexts: cpaeAuthConfigEntry.setStatus('current') if mibBuilder.loadTexts: cpaeAuthConfigEntry.setDescription('An entry containing additional management information applicable to a particular Authenticator PAE.') cpae_auth_re_auth_period_src_admin = mib_table_column((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 10, 1, 1), re_auth_period_source()).setMaxAccess('readwrite') if mibBuilder.loadTexts: cpaeAuthReAuthPeriodSrcAdmin.setStatus('current') if mibBuilder.loadTexts: cpaeAuthReAuthPeriodSrcAdmin.setDescription('Specifies the source of the reAuthPeriod constant to be used by the Reauthentication Timer state machine.') cpae_auth_re_auth_period_src_oper = mib_table_column((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 10, 1, 2), re_auth_period_source()).setMaxAccess('readonly') if mibBuilder.loadTexts: cpaeAuthReAuthPeriodSrcOper.setStatus('current') if mibBuilder.loadTexts: cpaeAuthReAuthPeriodSrcOper.setDescription('Indicates the source of the reAuthPeriod constant currently in use by the Reauthentication Timer state machine.') cpae_auth_re_auth_period_oper = mib_table_column((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 10, 1, 3), unsigned32()).setUnits('seconds').setMaxAccess('readonly') if mibBuilder.loadTexts: cpaeAuthReAuthPeriodOper.setStatus('current') if mibBuilder.loadTexts: cpaeAuthReAuthPeriodOper.setDescription('Indicates the operational reauthentication period for this port.') cpae_auth_time_to_next_re_auth = mib_table_column((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 10, 1, 4), unsigned32()).setUnits('seconds').setMaxAccess('readonly') if mibBuilder.loadTexts: cpaeAuthTimeToNextReAuth.setStatus('current') if mibBuilder.loadTexts: cpaeAuthTimeToNextReAuth.setDescription('Indicates the leftover time of the current session for this port.') cpae_auth_re_auth_action = mib_table_column((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 10, 1, 5), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(1, 2, 3))).clone(namedValues=named_values(('terminate', 1), ('reAuth', 2), ('noReAuth', 3)))).setMaxAccess('readonly') if mibBuilder.loadTexts: cpaeAuthReAuthAction.setStatus('current') if mibBuilder.loadTexts: cpaeAuthReAuthAction.setDescription("Indicates the reauthentication action for this port. terminate: Session will be terminated, with the corresponding Authenticator PAE state machine transits to 'disconnected'. reAuth : The port will be reauthenticated. noReAuth : The port will not be reauthenticated.") cpae_auth_re_auth_max = mib_table_column((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 10, 1, 6), unsigned32()).setMaxAccess('readwrite') if mibBuilder.loadTexts: cpaeAuthReAuthMax.setReference('IEEE Std 802.1X-2004, 8.2.4.1.2, reAuthMax') if mibBuilder.loadTexts: cpaeAuthReAuthMax.setStatus('current') if mibBuilder.loadTexts: cpaeAuthReAuthMax.setDescription('This object specifies the number of reauthentication attempts that are permitted before the port becomes unauthorized. The value of this object is used as the reAuthMax constant by the Authenticator PAE state machine.') cpae_auth_iab_enabled = mib_table_column((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 10, 1, 7), truth_value()).setMaxAccess('readwrite') if mibBuilder.loadTexts: cpaeAuthIabEnabled.setStatus('current') if mibBuilder.loadTexts: cpaeAuthIabEnabled.setDescription("Specifies whether the PAE port is declared as Inaccessible Authentication Bypass (IAB). IAB ports will be granted network access via the administrative configured VLAN if it failed to connect to the Authentication server. The only way to bring an IAB port back to the Backend Authentication state machine is through setting dot1xPaePortInitialize in the corresponding entry in dot1xPaePortTable to 'true'. 802.1x reauthentication will be temporary disabled on an authenticated IAB port if the connection to the Authentication server is broken, and enable again when the connection is resumed.") cpae_auth_pae_state = mib_table_column((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 10, 1, 8), cpae_auth_state()).setMaxAccess('readonly') if mibBuilder.loadTexts: cpaeAuthPaeState.setStatus('current') if mibBuilder.loadTexts: cpaeAuthPaeState.setDescription('Indicates the current value of the Authenticator PAE state machine on the port.') cpae_host_info_table = mib_table((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 11)) if mibBuilder.loadTexts: cpaeHostInfoTable.setStatus('current') if mibBuilder.loadTexts: cpaeHostInfoTable.setDescription('A table containing 802.1x authentication information for hosts connecting to PAE ports in the system.') cpae_host_info_entry = mib_table_row((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 11, 1)).setIndexNames((0, 'IEEE8021-PAE-MIB', 'dot1xPaePortNumber'), (0, 'CISCO-PAE-MIB', 'cpaeHostInfoHostIndex')) if mibBuilder.loadTexts: cpaeHostInfoEntry.setStatus('current') if mibBuilder.loadTexts: cpaeHostInfoEntry.setDescription('An entry appears in the table for each 802.1x capable host connecting to an PAE port, providing its authentication information.') cpae_host_info_host_index = mib_table_column((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 11, 1, 1), unsigned32()) if mibBuilder.loadTexts: cpaeHostInfoHostIndex.setStatus('current') if mibBuilder.loadTexts: cpaeHostInfoHostIndex.setDescription('An arbitrary index assigned by the agent to identify the host.') cpae_host_info_mac_address = mib_table_column((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 11, 1, 2), mac_address()).setMaxAccess('readonly') if mibBuilder.loadTexts: cpaeHostInfoMacAddress.setStatus('current') if mibBuilder.loadTexts: cpaeHostInfoMacAddress.setDescription('Indicates the Mac Address of the host.') cpae_host_info_posture_token = mib_table_column((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 11, 1, 3), cnn_eou_posture_token()).setMaxAccess('readonly') if mibBuilder.loadTexts: cpaeHostInfoPostureToken.setStatus('obsolete') if mibBuilder.loadTexts: cpaeHostInfoPostureToken.setDescription('Indicates the posture token assigned to the host. This object has been obsoleted and replaced by cpaeHostPostureTokenStr.') cpae_host_info_user_name = mib_table_column((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 11, 1, 4), snmp_admin_string()).setMaxAccess('readonly') if mibBuilder.loadTexts: cpaeHostInfoUserName.setStatus('current') if mibBuilder.loadTexts: cpaeHostInfoUserName.setDescription('Indicates the name of the authenticated user on the host.') cpae_host_info_addr_type = mib_table_column((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 11, 1, 5), inet_address_type()).setMaxAccess('readonly') if mibBuilder.loadTexts: cpaeHostInfoAddrType.setStatus('current') if mibBuilder.loadTexts: cpaeHostInfoAddrType.setDescription('Indicates the type of Internet address of the host.') cpae_host_info_addr = mib_table_column((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 11, 1, 6), inet_address()).setMaxAccess('readonly') if mibBuilder.loadTexts: cpaeHostInfoAddr.setStatus('current') if mibBuilder.loadTexts: cpaeHostInfoAddr.setDescription('Indicates the Internet address of the host. The type of this address is determined by the value of cpaeHostInfoAddrType object.') cpae_host_posture_token_str = mib_table_column((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 11, 1, 7), cnn_eou_posture_token_string()).setMaxAccess('readonly') if mibBuilder.loadTexts: cpaeHostPostureTokenStr.setStatus('current') if mibBuilder.loadTexts: cpaeHostPostureTokenStr.setDescription('Indicates the posture token assigned to the host.') cpae_host_url_redirection = mib_table_column((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 11, 1, 8), snmp_admin_string()).setMaxAccess('readonly') if mibBuilder.loadTexts: cpaeHostUrlRedirection.setStatus('current') if mibBuilder.loadTexts: cpaeHostUrlRedirection.setDescription('Indicates the URL-redirection assigned for this host by AAA server.') cpae_host_auth_pae_state = mib_table_column((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 11, 1, 9), cpae_auth_state()).setMaxAccess('readonly') if mibBuilder.loadTexts: cpaeHostAuthPaeState.setReference('802.1X-2001 9.4.1, Authenticator PAE state, 802.1X-2004 9.4.1, Authenticator PAE state') if mibBuilder.loadTexts: cpaeHostAuthPaeState.setStatus('current') if mibBuilder.loadTexts: cpaeHostAuthPaeState.setDescription('Indicates the current value of the Authenticator PAE state machine for the host.') cpae_host_backend_state = mib_table_column((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 11, 1, 10), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(1, 2, 3, 4, 5, 6, 7, 8))).clone(namedValues=named_values(('request', 1), ('response', 2), ('success', 3), ('fail', 4), ('timeout', 5), ('idle', 6), ('initialize', 7), ('ignore', 8)))).setMaxAccess('readonly') if mibBuilder.loadTexts: cpaeHostBackendState.setReference('802.1X-2001 9.4.1, Backend Authentication state, 802.1X-2004 9.4.1, Backend Authentication state.') if mibBuilder.loadTexts: cpaeHostBackendState.setStatus('current') if mibBuilder.loadTexts: cpaeHostBackendState.setDescription('Indicates the current state of the Backend Authentication state machine of the host.') cpae_host_session_id = mib_table_column((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 11, 1, 11), octet_string().subtype(subtypeSpec=value_size_constraint(1, 64))).setMaxAccess('readonly') if mibBuilder.loadTexts: cpaeHostSessionId.setStatus('current') if mibBuilder.loadTexts: cpaeHostSessionId.setDescription('A unique identifier of the 802.1x session.') cpae_port_eapol_test_limits = mib_scalar((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 12), unsigned32()).setMaxAccess('readonly') if mibBuilder.loadTexts: cpaePortEapolTestLimits.setStatus('current') if mibBuilder.loadTexts: cpaePortEapolTestLimits.setDescription('Indicates the maximum number of entries allowed in cpaePortEapolTestTable.') cpae_port_eapol_test_table = mib_table((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 13)) if mibBuilder.loadTexts: cpaePortEapolTestTable.setStatus('current') if mibBuilder.loadTexts: cpaePortEapolTestTable.setDescription('A table for testing EAPOL (Extensible Authentication Protocol Over LAN) capable information of hosts connecting to PAE ports in the device.') cpae_port_eapol_test_entry = mib_table_row((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 13, 1)).setIndexNames((0, 'IEEE8021-PAE-MIB', 'dot1xPaePortNumber')) if mibBuilder.loadTexts: cpaePortEapolTestEntry.setStatus('current') if mibBuilder.loadTexts: cpaePortEapolTestEntry.setDescription('An entry containing EAPOL capable information for hosts connecting to a PAE port.') cpae_port_eapol_test_result = mib_table_column((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 13, 1, 1), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(1, 2, 3))).clone(namedValues=named_values(('inProgress', 1), ('notCapable', 2), ('capable', 3)))).setMaxAccess('readonly') if mibBuilder.loadTexts: cpaePortEapolTestResult.setStatus('current') if mibBuilder.loadTexts: cpaePortEapolTestResult.setDescription('Indicates the test result of whether there is EAPOL supporting host connecting to the port. inProgress: the test is in progress. notCapable: there is no EAPOL supporting host connecting to the port. capable : there is EAPOL supporting host connecting to the port.') cpae_port_eapol_test_status = mib_table_column((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 13, 1, 2), row_status()).setMaxAccess('readcreate') if mibBuilder.loadTexts: cpaePortEapolTestStatus.setStatus('current') if mibBuilder.loadTexts: cpaePortEapolTestStatus.setDescription("This object is used to manage the creation, and deletion of rows in the table. An entry can be created by setting the instance value of this object to 'createAndGo', and deleted by setting the instance value of this object to 'destroy'.") cpae_critical_config = mib_identifier((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 14)) cpae_critical_eapol_enabled = mib_scalar((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 14, 1), truth_value()).setMaxAccess('readwrite') if mibBuilder.loadTexts: cpaeCriticalEapolEnabled.setStatus('current') if mibBuilder.loadTexts: cpaeCriticalEapolEnabled.setDescription('Specifies if the device will send an EAPOL-Success message on successful Critical Authentication for a supplicant.') cpae_critical_recovery_delay = mib_scalar((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 14, 2), unsigned32()).setUnits('milli-seconds').setMaxAccess('readwrite') if mibBuilder.loadTexts: cpaeCriticalRecoveryDelay.setStatus('current') if mibBuilder.loadTexts: cpaeCriticalRecoveryDelay.setDescription('This object specifies the critical recovery delay time for 802.1x in the system. A value of zero indicates that Critical Authentication recovery delay for 802.1x is disabled.') cpae_port_ip_dev_track_config_table = mib_table((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 15)) if mibBuilder.loadTexts: cpaePortIpDevTrackConfigTable.setStatus('current') if mibBuilder.loadTexts: cpaePortIpDevTrackConfigTable.setDescription('A table of IP Device Tracking configuration for PAE ports in the system.') cpae_port_ip_dev_track_config_entry = mib_table_row((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 15, 1)).setIndexNames((0, 'IEEE8021-PAE-MIB', 'dot1xPaePortNumber')) if mibBuilder.loadTexts: cpaePortIpDevTrackConfigEntry.setStatus('current') if mibBuilder.loadTexts: cpaePortIpDevTrackConfigEntry.setDescription('An entry of IP Device Tracking configuration on a PAE port.') cpae_port_ip_dev_track_enabled = mib_table_column((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 15, 1, 1), truth_value()).setMaxAccess('readwrite') if mibBuilder.loadTexts: cpaePortIpDevTrackEnabled.setStatus('current') if mibBuilder.loadTexts: cpaePortIpDevTrackEnabled.setDescription('Specifies if IP Device Tracking is enabled on this port for the corresponding 802.1x authenticated host.') cpae_global_auth_fail_max_attempts = mib_scalar((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 16), unsigned32().subtype(subtypeSpec=value_range_constraint(1, 4294967295))).setMaxAccess('readwrite') if mibBuilder.loadTexts: cpaeGlobalAuthFailMaxAttempts.setStatus('current') if mibBuilder.loadTexts: cpaeGlobalAuthFailMaxAttempts.setDescription('A global configuration to specify the maximum number of authentication attempts that should be made before a port is moved into its Auth-Fail VLAN.') cpae_global_sec_violation_action = mib_scalar((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 17), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(1, 2))).clone(namedValues=named_values(('restrict', 1), ('shutdown', 2)))).setMaxAccess('readwrite') if mibBuilder.loadTexts: cpaeGlobalSecViolationAction.setStatus('current') if mibBuilder.loadTexts: cpaeGlobalSecViolationAction.setDescription('A global configuration to specify the action that will be applied to a PAE port upon reception of a security violation event. restrict: Packets from MAC address of the device causing security violation will be dropped. shutdown: The port that causes security violation will be shutdown.') cpae_dot1x_supp_to_guest_vlan_allowed = mib_scalar((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 18), truth_value()).setMaxAccess('readwrite') if mibBuilder.loadTexts: cpaeDot1xSuppToGuestVlanAllowed.setStatus('current') if mibBuilder.loadTexts: cpaeDot1xSuppToGuestVlanAllowed.setDescription('Specifies whether ports associated with 802.1x supplicants are allowed to move to Guest Vlan when they stop responding to EAPOL inquiries.') cpae_supplicant_objects = mib_identifier((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 19)) cpae_supp_port_table = mib_table((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 19, 1)) if mibBuilder.loadTexts: cpaeSuppPortTable.setStatus('current') if mibBuilder.loadTexts: cpaeSuppPortTable.setDescription('A list of objects providing information and configuration for the Supplicant PAE associated with each port. This table provides additional objects for the dot1xSuppConfigTable.') cpae_supp_port_entry = mib_table_row((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 19, 1, 1)).setIndexNames((0, 'IEEE8021-PAE-MIB', 'dot1xPaePortNumber')) if mibBuilder.loadTexts: cpaeSuppPortEntry.setStatus('current') if mibBuilder.loadTexts: cpaeSuppPortEntry.setDescription('An entry containing supplicant configuration information for a particular PAE port.') cpae_supp_port_credential_profile_name = mib_table_column((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 19, 1, 1, 1), snmp_admin_string()).setMaxAccess('readwrite') if mibBuilder.loadTexts: cpaeSuppPortCredentialProfileName.setStatus('current') if mibBuilder.loadTexts: cpaeSuppPortCredentialProfileName.setDescription('Specifies the credentials profile of the Supplicant PAE. A zero length string for this object indicates that the Supplicant PAE does not have credential profile.') cpae_supp_port_eap_profile_name = mib_table_column((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 19, 1, 1, 2), snmp_admin_string()).setMaxAccess('readwrite') if mibBuilder.loadTexts: cpaeSuppPortEapProfileName.setStatus('current') if mibBuilder.loadTexts: cpaeSuppPortEapProfileName.setDescription('Specifies the EAP profile of the Supplicant PAE. A zero length string for this object indicates that the Supplicant PAE does not have EAP profile.') cpae_supp_host_info_table = mib_table((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 19, 2)) if mibBuilder.loadTexts: cpaeSuppHostInfoTable.setStatus('current') if mibBuilder.loadTexts: cpaeSuppHostInfoTable.setDescription('A list of dot1x supplicants in the system.') cpae_supp_host_info_entry = mib_table_row((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 19, 2, 1)).setIndexNames((0, 'IEEE8021-PAE-MIB', 'dot1xPaePortNumber'), (0, 'CISCO-PAE-MIB', 'cpaeSuppHostInfoSuppIndex')) if mibBuilder.loadTexts: cpaeSuppHostInfoEntry.setStatus('current') if mibBuilder.loadTexts: cpaeSuppHostInfoEntry.setDescription('An entry containing dot1x supplicant information for a supplicant on a particular PAE port in the system.') cpae_supp_host_info_supp_index = mib_table_column((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 19, 2, 1, 1), unsigned32().subtype(subtypeSpec=value_range_constraint(1, 65535))) if mibBuilder.loadTexts: cpaeSuppHostInfoSuppIndex.setStatus('current') if mibBuilder.loadTexts: cpaeSuppHostInfoSuppIndex.setDescription('An arbitrary index assigned by the agent to identify the supplicant.') cpae_supp_host_auth_mac_address = mib_table_column((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 19, 2, 1, 2), mac_address()).setMaxAccess('readonly') if mibBuilder.loadTexts: cpaeSuppHostAuthMacAddress.setStatus('current') if mibBuilder.loadTexts: cpaeSuppHostAuthMacAddress.setDescription('Indicates the MAC address of the authenticator, which authenticates the supplicant.') cpae_supp_host_pae_state = mib_table_column((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 19, 2, 1, 3), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(1, 2, 3, 4, 5, 6, 7, 8, 9, 10))).clone(namedValues=named_values(('disconnected', 1), ('logoff', 2), ('connecting', 3), ('authenticating', 4), ('authenticated', 5), ('acquired', 6), ('held', 7), ('restart', 8), ('sForceAuth', 9), ('sForceUnauth', 10)))).setMaxAccess('readonly') if mibBuilder.loadTexts: cpaeSuppHostPaeState.setReference('802.1X-2004 9.5.1, Supplicant PAE State') if mibBuilder.loadTexts: cpaeSuppHostPaeState.setStatus('current') if mibBuilder.loadTexts: cpaeSuppHostPaeState.setDescription('Indicates the current state of the Supplicant PAE State machine.') cpae_supp_host_backend_state = mib_table_column((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 19, 2, 1, 4), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(1, 2, 3, 4, 5, 6, 7, 8))).clone(namedValues=named_values(('initialize', 1), ('idle', 2), ('request', 3), ('response', 4), ('receive', 5), ('fail', 6), ('success', 7), ('timeout', 8)))).setMaxAccess('readonly') if mibBuilder.loadTexts: cpaeSuppHostBackendState.setReference('802.1X-2004 9.5.1, Backend Supplicant state') if mibBuilder.loadTexts: cpaeSuppHostBackendState.setStatus('current') if mibBuilder.loadTexts: cpaeSuppHostBackendState.setDescription('Indicates the current state of the Supplicant Backend state machine.') cpae_supp_host_status = mib_table_column((1, 3, 6, 1, 4, 1, 9, 9, 220, 1, 19, 2, 1, 5), pae_controlled_port_status()).setMaxAccess('readonly') if mibBuilder.loadTexts: cpaeSuppHostStatus.setReference('802.1X-2004 9.5.1, SuppControlledPortStatus') if mibBuilder.loadTexts: cpaeSuppHostStatus.setStatus('current') if mibBuilder.loadTexts: cpaeSuppHostStatus.setDescription('Indicates the status of the supplicant.') cpae_no_guest_vlan_notif = notification_type((1, 3, 6, 1, 4, 1, 9, 9, 220, 0, 1)).setObjects(('IEEE8021-PAE-MIB', 'dot1xAuthPaeState')) if mibBuilder.loadTexts: cpaeNoGuestVlanNotif.setStatus('current') if mibBuilder.loadTexts: cpaeNoGuestVlanNotif.setDescription("A cpaeNoGuestVlanNotif is sent if a non-802.1x supplicant is detected on a PAE port for which the value of corresponding instance of dot1xAuthAuthControlledPortControl is 'auto' and the value of corresponding instance of cpaeGuestVlanNumber is zero.") cpae_no_auth_fail_vlan_notif = notification_type((1, 3, 6, 1, 4, 1, 9, 9, 220, 0, 2)).setObjects(('IEEE8021-PAE-MIB', 'dot1xAuthPaeState')) if mibBuilder.loadTexts: cpaeNoAuthFailVlanNotif.setStatus('current') if mibBuilder.loadTexts: cpaeNoAuthFailVlanNotif.setDescription("A cpaeNoAuthFailVlanNotif is sent if a 802.1x supplicant fails to authenticate on a PAE port for which the value of corresponding instance of dot1xAuthAuthControlledPortControl is 'auto' and the value of corresponding instance of cpaePortAuthFailVlan is zero.") cpae_guest_vlan_notif = notification_type((1, 3, 6, 1, 4, 1, 9, 9, 220, 0, 3)).setObjects(('CISCO-PAE-MIB', 'cpaeGuestVlanNumber'), ('IEEE8021-PAE-MIB', 'dot1xAuthPaeState')) if mibBuilder.loadTexts: cpaeGuestVlanNotif.setStatus('current') if mibBuilder.loadTexts: cpaeGuestVlanNotif.setDescription("A cpaeGuestVlanNotif is sent if value of the instance of cpaeGuestVlanNotifEnable is set to 'true', and a PAE port is being moved to the VLAN specified by value of the corresponding instance of cpaeGuestVlanNumber.") cpae_auth_fail_vlan_notif = notification_type((1, 3, 6, 1, 4, 1, 9, 9, 220, 0, 4)).setObjects(('CISCO-PAE-MIB', 'cpaePortAuthFailVlan'), ('IEEE8021-PAE-MIB', 'dot1xAuthPaeState')) if mibBuilder.loadTexts: cpaeAuthFailVlanNotif.setStatus('current') if mibBuilder.loadTexts: cpaeAuthFailVlanNotif.setDescription("A cpaeAuthFailVlanNotif is sent if value of the instance of cpaeAuthFailVlanNotifEnable is set to 'true', and a PAE port is being moved to the VLAN specified by value of the corresponding instance of cpaePortAuthFailVlan.") cpae_mib_compliances = mib_identifier((1, 3, 6, 1, 4, 1, 9, 9, 220, 2, 1)) cpae_mib_groups = mib_identifier((1, 3, 6, 1, 4, 1, 9, 9, 220, 2, 2)) cpae_compliance = module_compliance((1, 3, 6, 1, 4, 1, 9, 9, 220, 2, 1, 1)).setObjects(('CISCO-PAE-MIB', 'cpaeMultipleHostGroup')) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): cpae_compliance = cpaeCompliance.setStatus('deprecated') if mibBuilder.loadTexts: cpaeCompliance.setDescription('The compliance statement for devices that implement the CISCO-PAE-MIB.') cpae_compliance2 = module_compliance((1, 3, 6, 1, 4, 1, 9, 9, 220, 2, 1, 2)).setObjects(('CISCO-PAE-MIB', 'cpaePortEntryGroup'), ('CISCO-PAE-MIB', 'cpaeGuestVlanGroup')) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): cpae_compliance2 = cpaeCompliance2.setStatus('deprecated') if mibBuilder.loadTexts: cpaeCompliance2.setDescription('The compliance statement for devices that implement the CISCO-PAE-MIB.') cpae_compliance3 = module_compliance((1, 3, 6, 1, 4, 1, 9, 9, 220, 2, 1, 3)).setObjects(('CISCO-PAE-MIB', 'cpaePortEntryGroup'), ('CISCO-PAE-MIB', 'cpaeGuestVlanGroup2'), ('CISCO-PAE-MIB', 'cpaeShutdownTimeoutGroup')) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): cpae_compliance3 = cpaeCompliance3.setStatus('deprecated') if mibBuilder.loadTexts: cpaeCompliance3.setDescription('The compliance statement for devices that implement the CISCO-PAE-MIB.') cpae_compliance4 = module_compliance((1, 3, 6, 1, 4, 1, 9, 9, 220, 2, 1, 4)).setObjects(('CISCO-PAE-MIB', 'cpaePortEntryGroup'), ('CISCO-PAE-MIB', 'cpaeGuestVlanGroup2'), ('CISCO-PAE-MIB', 'cpaeShutdownTimeoutGroup'), ('CISCO-PAE-MIB', 'cpaeRadiusConfigGroup'), ('CISCO-PAE-MIB', 'cpaeUserGroupGroup')) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): cpae_compliance4 = cpaeCompliance4.setStatus('deprecated') if mibBuilder.loadTexts: cpaeCompliance4.setDescription('The compliance statement for devices that implement the CISCO-PAE-MIB.') cpae_compliance5 = module_compliance((1, 3, 6, 1, 4, 1, 9, 9, 220, 2, 1, 5)).setObjects(('CISCO-PAE-MIB', 'cpaePortEntryGroup'), ('CISCO-PAE-MIB', 'cpaeGuestVlanGroup3'), ('CISCO-PAE-MIB', 'cpaeShutdownTimeoutGroup'), ('CISCO-PAE-MIB', 'cpaeRadiusConfigGroup'), ('CISCO-PAE-MIB', 'cpaeUserGroupGroup'), ('CISCO-PAE-MIB', 'cpaePortOperVlanGroup'), ('CISCO-PAE-MIB', 'cpaePortAuthFailVlanGroup'), ('CISCO-PAE-MIB', 'cpaeNoGuestVlanNotifEnableGrp'), ('CISCO-PAE-MIB', 'cpaeNoAuthFailVlanNotifEnableGrp'), ('CISCO-PAE-MIB', 'cpaeNoGuestVlanNotifGroup'), ('CISCO-PAE-MIB', 'cpaeNoAuthFailVlanNotifGroup'), ('CISCO-PAE-MIB', 'cpaeMacAuthBypassGroup'), ('CISCO-PAE-MIB', 'cpaeWebAuthGroup'), ('CISCO-PAE-MIB', 'cpaeAuthConfigGroup'), ('CISCO-PAE-MIB', 'cpaeHostInfoGroup')) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): cpae_compliance5 = cpaeCompliance5.setStatus('obsolete') if mibBuilder.loadTexts: cpaeCompliance5.setDescription('The compliance statement for devices that implement the CISCO-PAE-MIB.') cpae_compliance6 = module_compliance((1, 3, 6, 1, 4, 1, 9, 9, 220, 2, 1, 6)).setObjects(('CISCO-PAE-MIB', 'cpaePortEntryGroup'), ('CISCO-PAE-MIB', 'cpaeGuestVlanGroup3'), ('CISCO-PAE-MIB', 'cpaeShutdownTimeoutGroup'), ('CISCO-PAE-MIB', 'cpaeRadiusConfigGroup'), ('CISCO-PAE-MIB', 'cpaeUserGroupGroup'), ('CISCO-PAE-MIB', 'cpaePortOperVlanGroup'), ('CISCO-PAE-MIB', 'cpaePortAuthFailVlanGroup'), ('CISCO-PAE-MIB', 'cpaeNoGuestVlanNotifEnableGrp'), ('CISCO-PAE-MIB', 'cpaeNoAuthFailVlanNotifEnableGrp'), ('CISCO-PAE-MIB', 'cpaeNoGuestVlanNotifGroup'), ('CISCO-PAE-MIB', 'cpaeNoAuthFailVlanNotifGroup'), ('CISCO-PAE-MIB', 'cpaeMacAuthBypassGroup'), ('CISCO-PAE-MIB', 'cpaeMacAuthBypassGroup2'), ('CISCO-PAE-MIB', 'cpaeWebAuthGroup'), ('CISCO-PAE-MIB', 'cpaeWebAuthAaaFailGroup'), ('CISCO-PAE-MIB', 'cpaeHostInfoGroup2'), ('CISCO-PAE-MIB', 'cpaePortEapolTestGroup'), ('CISCO-PAE-MIB', 'cpaePortAuthFailVlanGroup2'), ('CISCO-PAE-MIB', 'cpaeAuthConfigGroup'), ('CISCO-PAE-MIB', 'cpaeAuthConfigGroup2'), ('CISCO-PAE-MIB', 'cpaeCriticalRecoveryDelayGroup'), ('CISCO-PAE-MIB', 'cpaeMacAuthBypassCriticalGroup'), ('CISCO-PAE-MIB', 'cpaeWebAuthCriticalGroup')) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): cpae_compliance6 = cpaeCompliance6.setStatus('deprecated') if mibBuilder.loadTexts: cpaeCompliance6.setDescription('The compliance statement for devices that implement the CISCO-PAE-MIB.') cpae_compliance7 = module_compliance((1, 3, 6, 1, 4, 1, 9, 9, 220, 2, 1, 7)).setObjects(('CISCO-PAE-MIB', 'cpaePortEntryGroup'), ('CISCO-PAE-MIB', 'cpaeGuestVlanGroup3'), ('CISCO-PAE-MIB', 'cpaeShutdownTimeoutGroup'), ('CISCO-PAE-MIB', 'cpaeRadiusConfigGroup'), ('CISCO-PAE-MIB', 'cpaeUserGroupGroup'), ('CISCO-PAE-MIB', 'cpaePortOperVlanGroup'), ('CISCO-PAE-MIB', 'cpaePortAuthFailVlanGroup'), ('CISCO-PAE-MIB', 'cpaeNoGuestVlanNotifEnableGrp'), ('CISCO-PAE-MIB', 'cpaeNoAuthFailVlanNotifEnableGrp'), ('CISCO-PAE-MIB', 'cpaeNoGuestVlanNotifGroup'), ('CISCO-PAE-MIB', 'cpaeNoAuthFailVlanNotifGroup'), ('CISCO-PAE-MIB', 'cpaeMacAuthBypassGroup'), ('CISCO-PAE-MIB', 'cpaeMacAuthBypassGroup2'), ('CISCO-PAE-MIB', 'cpaeMacAuthBypassGroup3'), ('CISCO-PAE-MIB', 'cpaeWebAuthGroup'), ('CISCO-PAE-MIB', 'cpaeWebAuthAaaFailGroup'), ('CISCO-PAE-MIB', 'cpaeHostInfoGroup2'), ('CISCO-PAE-MIB', 'cpaeHostInfoGroup3'), ('CISCO-PAE-MIB', 'cpaePortEapolTestGroup'), ('CISCO-PAE-MIB', 'cpaePortAuthFailVlanGroup2'), ('CISCO-PAE-MIB', 'cpaeAuthConfigGroup'), ('CISCO-PAE-MIB', 'cpaeAuthConfigGroup2'), ('CISCO-PAE-MIB', 'cpaeCriticalRecoveryDelayGroup'), ('CISCO-PAE-MIB', 'cpaeMacAuthBypassCriticalGroup'), ('CISCO-PAE-MIB', 'cpaeWebAuthCriticalGroup'), ('CISCO-PAE-MIB', 'cpaeHostPostureTokenGroup')) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): cpae_compliance7 = cpaeCompliance7.setStatus('deprecated') if mibBuilder.loadTexts: cpaeCompliance7.setDescription('The compliance statement for devices that implement the CISCO-PAE-MIB.') cpae_compliance8 = module_compliance((1, 3, 6, 1, 4, 1, 9, 9, 220, 2, 1, 8)).setObjects(('CISCO-PAE-MIB', 'cpaePortEntryGroup'), ('CISCO-PAE-MIB', 'cpaeGuestVlanGroup3'), ('CISCO-PAE-MIB', 'cpaeShutdownTimeoutGroup'), ('CISCO-PAE-MIB', 'cpaeRadiusConfigGroup'), ('CISCO-PAE-MIB', 'cpaeUserGroupGroup'), ('CISCO-PAE-MIB', 'cpaePortOperVlanGroup'), ('CISCO-PAE-MIB', 'cpaePortAuthFailVlanGroup'), ('CISCO-PAE-MIB', 'cpaeNoGuestVlanNotifEnableGrp'), ('CISCO-PAE-MIB', 'cpaeNoAuthFailVlanNotifEnableGrp'), ('CISCO-PAE-MIB', 'cpaeNoGuestVlanNotifGroup'), ('CISCO-PAE-MIB', 'cpaeNoAuthFailVlanNotifGroup'), ('CISCO-PAE-MIB', 'cpaeMacAuthBypassGroup2'), ('CISCO-PAE-MIB', 'cpaeMacAuthBypassGroup3'), ('CISCO-PAE-MIB', 'cpaeWebAuthGroup'), ('CISCO-PAE-MIB', 'cpaeWebAuthAaaFailGroup'), ('CISCO-PAE-MIB', 'cpaeHostInfoGroup2'), ('CISCO-PAE-MIB', 'cpaeHostInfoGroup3'), ('CISCO-PAE-MIB', 'cpaePortEapolTestGroup'), ('CISCO-PAE-MIB', 'cpaePortAuthFailVlanGroup2'), ('CISCO-PAE-MIB', 'cpaeAuthConfigGroup2'), ('CISCO-PAE-MIB', 'cpaeCriticalRecoveryDelayGroup'), ('CISCO-PAE-MIB', 'cpaeMacAuthBypassCriticalGroup'), ('CISCO-PAE-MIB', 'cpaeWebAuthCriticalGroup'), ('CISCO-PAE-MIB', 'cpaeHostPostureTokenGroup'), ('CISCO-PAE-MIB', 'cpaeMabAuditInfoGroup'), ('CISCO-PAE-MIB', 'cpaeMabPortIpDevTrackConfGroup'), ('CISCO-PAE-MIB', 'cpaePortIpDevTrackConfGroup'), ('CISCO-PAE-MIB', 'cpaeHostUrlRedirectGroup'), ('CISCO-PAE-MIB', 'cpaeWebAuthIpDevTrackingGroup'), ('CISCO-PAE-MIB', 'cpaeWebAuthUnAuthTimeoutGroup'), ('CISCO-PAE-MIB', 'cpaeGlobalAuthFailVlanGroup'), ('CISCO-PAE-MIB', 'cpaeGlobalSecViolationGroup'), ('CISCO-PAE-MIB', 'cpaeCriticalEapolConfigGroup'), ('CISCO-PAE-MIB', 'cpaeMacAuthBypassPortEnableGroup'), ('CISCO-PAE-MIB', 'cpaeMacAuthBypassGroup4'), ('CISCO-PAE-MIB', 'cpaeAuthIabConfigGroup'), ('CISCO-PAE-MIB', 'cpaeAuthConfigGroup3'), ('CISCO-PAE-MIB', 'cpaeAuthConfigGroup4')) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): cpae_compliance8 = cpaeCompliance8.setStatus('deprecated') if mibBuilder.loadTexts: cpaeCompliance8.setDescription('The compliance statement for devices that implement the CISCO-PAE-MIB.') cpae_compliance9 = module_compliance((1, 3, 6, 1, 4, 1, 9, 9, 220, 2, 1, 9)).setObjects(('CISCO-PAE-MIB', 'cpaePortEntryGroup'), ('CISCO-PAE-MIB', 'cpaeGuestVlanGroup3'), ('CISCO-PAE-MIB', 'cpaeShutdownTimeoutGroup'), ('CISCO-PAE-MIB', 'cpaeRadiusConfigGroup'), ('CISCO-PAE-MIB', 'cpaeUserGroupGroup'), ('CISCO-PAE-MIB', 'cpaePortOperVlanGroup'), ('CISCO-PAE-MIB', 'cpaePortAuthFailVlanGroup'), ('CISCO-PAE-MIB', 'cpaeNoGuestVlanNotifEnableGrp'), ('CISCO-PAE-MIB', 'cpaeNoAuthFailVlanNotifEnableGrp'), ('CISCO-PAE-MIB', 'cpaeNoGuestVlanNotifGroup'), ('CISCO-PAE-MIB', 'cpaeNoAuthFailVlanNotifGroup'), ('CISCO-PAE-MIB', 'cpaeMacAuthBypassGroup2'), ('CISCO-PAE-MIB', 'cpaeMacAuthBypassGroup3'), ('CISCO-PAE-MIB', 'cpaeWebAuthGroup'), ('CISCO-PAE-MIB', 'cpaeWebAuthAaaFailGroup'), ('CISCO-PAE-MIB', 'cpaeHostInfoGroup2'), ('CISCO-PAE-MIB', 'cpaeHostInfoGroup3'), ('CISCO-PAE-MIB', 'cpaePortEapolTestGroup'), ('CISCO-PAE-MIB', 'cpaePortAuthFailVlanGroup2'), ('CISCO-PAE-MIB', 'cpaeAuthConfigGroup2'), ('CISCO-PAE-MIB', 'cpaeCriticalRecoveryDelayGroup'), ('CISCO-PAE-MIB', 'cpaeMacAuthBypassCriticalGroup'), ('CISCO-PAE-MIB', 'cpaeWebAuthCriticalGroup'), ('CISCO-PAE-MIB', 'cpaeHostPostureTokenGroup'), ('CISCO-PAE-MIB', 'cpaeMabAuditInfoGroup'), ('CISCO-PAE-MIB', 'cpaeMabPortIpDevTrackConfGroup'), ('CISCO-PAE-MIB', 'cpaePortIpDevTrackConfGroup'), ('CISCO-PAE-MIB', 'cpaeHostUrlRedirectGroup'), ('CISCO-PAE-MIB', 'cpaeWebAuthIpDevTrackingGroup'), ('CISCO-PAE-MIB', 'cpaeWebAuthUnAuthTimeoutGroup'), ('CISCO-PAE-MIB', 'cpaeGlobalAuthFailVlanGroup'), ('CISCO-PAE-MIB', 'cpaeGlobalSecViolationGroup'), ('CISCO-PAE-MIB', 'cpaeCriticalEapolConfigGroup'), ('CISCO-PAE-MIB', 'cpaeMacAuthBypassPortEnableGroup'), ('CISCO-PAE-MIB', 'cpaeMacAuthBypassGroup4'), ('CISCO-PAE-MIB', 'cpaeAuthIabConfigGroup'), ('CISCO-PAE-MIB', 'cpaeAuthConfigGroup3'), ('CISCO-PAE-MIB', 'cpaeAuthConfigGroup4'), ('CISCO-PAE-MIB', 'cpaeHostSessionIdGroup'), ('CISCO-PAE-MIB', 'cpaeHostAuthInfoGroup'), ('CISCO-PAE-MIB', 'cpaePortCapabilitiesConfigGroup'), ('CISCO-PAE-MIB', 'cpaeDot1xSuppToGuestVlanGroup'), ('CISCO-PAE-MIB', 'cpaeGuestVlanNotifEnableGroup'), ('CISCO-PAE-MIB', 'cpaeGuestVlanNotifGroup'), ('CISCO-PAE-MIB', 'cpaeAuthFailVlanNotifEnableGrp'), ('CISCO-PAE-MIB', 'cpaeAuthFailVlanNotifGroup'), ('CISCO-PAE-MIB', 'cpaePortAuthFailVlanConfigGroup'), ('CISCO-PAE-MIB', 'cpaePortAuthFailUserInfoGroup')) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): cpae_compliance9 = cpaeCompliance9.setStatus('deprecated') if mibBuilder.loadTexts: cpaeCompliance9.setDescription('The compliance statement for devices that implement the CISCO-PAE-MIB.') cpae_compliance10 = module_compliance((1, 3, 6, 1, 4, 1, 9, 9, 220, 2, 1, 10)).setObjects(('CISCO-PAE-MIB', 'cpaePortEntryGroup'), ('CISCO-PAE-MIB', 'cpaeGuestVlanGroup3'), ('CISCO-PAE-MIB', 'cpaeShutdownTimeoutGroup'), ('CISCO-PAE-MIB', 'cpaeRadiusConfigGroup'), ('CISCO-PAE-MIB', 'cpaeUserGroupGroup'), ('CISCO-PAE-MIB', 'cpaePortOperVlanGroup'), ('CISCO-PAE-MIB', 'cpaeNoGuestVlanNotifEnableGrp'), ('CISCO-PAE-MIB', 'cpaeNoAuthFailVlanNotifEnableGrp'), ('CISCO-PAE-MIB', 'cpaeNoGuestVlanNotifGroup'), ('CISCO-PAE-MIB', 'cpaeNoAuthFailVlanNotifGroup'), ('CISCO-PAE-MIB', 'cpaeMacAuthBypassGroup2'), ('CISCO-PAE-MIB', 'cpaeMacAuthBypassGroup3'), ('CISCO-PAE-MIB', 'cpaeWebAuthGroup'), ('CISCO-PAE-MIB', 'cpaeWebAuthAaaFailGroup'), ('CISCO-PAE-MIB', 'cpaeHostInfoGroup2'), ('CISCO-PAE-MIB', 'cpaeHostInfoGroup3'), ('CISCO-PAE-MIB', 'cpaePortEapolTestGroup'), ('CISCO-PAE-MIB', 'cpaePortAuthFailVlanGroup2'), ('CISCO-PAE-MIB', 'cpaeAuthConfigGroup2'), ('CISCO-PAE-MIB', 'cpaeCriticalRecoveryDelayGroup'), ('CISCO-PAE-MIB', 'cpaeMacAuthBypassCriticalGroup'), ('CISCO-PAE-MIB', 'cpaeWebAuthCriticalGroup'), ('CISCO-PAE-MIB', 'cpaeHostPostureTokenGroup'), ('CISCO-PAE-MIB', 'cpaeMabAuditInfoGroup'), ('CISCO-PAE-MIB', 'cpaeMabPortIpDevTrackConfGroup'), ('CISCO-PAE-MIB', 'cpaePortIpDevTrackConfGroup'), ('CISCO-PAE-MIB', 'cpaeHostUrlRedirectGroup'), ('CISCO-PAE-MIB', 'cpaeWebAuthIpDevTrackingGroup'), ('CISCO-PAE-MIB', 'cpaeWebAuthUnAuthTimeoutGroup'), ('CISCO-PAE-MIB', 'cpaeGlobalAuthFailVlanGroup'), ('CISCO-PAE-MIB', 'cpaeGlobalSecViolationGroup'), ('CISCO-PAE-MIB', 'cpaeCriticalEapolConfigGroup'), ('CISCO-PAE-MIB', 'cpaeMacAuthBypassPortEnableGroup'), ('CISCO-PAE-MIB', 'cpaeMacAuthBypassGroup4'), ('CISCO-PAE-MIB', 'cpaeAuthIabConfigGroup'), ('CISCO-PAE-MIB', 'cpaeAuthConfigGroup3'), ('CISCO-PAE-MIB', 'cpaeAuthConfigGroup4'), ('CISCO-PAE-MIB', 'cpaeHostSessionIdGroup'), ('CISCO-PAE-MIB', 'cpaeHostAuthInfoGroup'), ('CISCO-PAE-MIB', 'cpaePortCapabilitiesConfigGroup'), ('CISCO-PAE-MIB', 'cpaeDot1xSuppToGuestVlanGroup'), ('CISCO-PAE-MIB', 'cpaeGuestVlanNotifEnableGroup'), ('CISCO-PAE-MIB', 'cpaeGuestVlanNotifGroup'), ('CISCO-PAE-MIB', 'cpaeAuthFailVlanNotifEnableGrp'), ('CISCO-PAE-MIB', 'cpaeAuthFailVlanNotifGroup'), ('CISCO-PAE-MIB', 'cpaePortAuthFailVlanConfigGroup'), ('CISCO-PAE-MIB', 'cpaePortAuthFailUserInfoGroup'), ('CISCO-PAE-MIB', 'cpaeSuppPortProfileGroup'), ('CISCO-PAE-MIB', 'cpaeSuppHostInfoGroup')) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): cpae_compliance10 = cpaeCompliance10.setStatus('current') if mibBuilder.loadTexts: cpaeCompliance10.setDescription('The compliance statement for devices that implement the CISCO-PAE-MIB.') cpae_multiple_host_group = object_group((1, 3, 6, 1, 4, 1, 9, 9, 220, 2, 2, 1)).setObjects(('CISCO-PAE-MIB', 'cpaeMultipleHost')) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): cpae_multiple_host_group = cpaeMultipleHostGroup.setStatus('deprecated') if mibBuilder.loadTexts: cpaeMultipleHostGroup.setDescription('A collection of objects that provide the multiple host configuration information for a PAE port. These are additional to the IEEE Std 802.1x PAE MIB.') cpae_port_entry_group = object_group((1, 3, 6, 1, 4, 1, 9, 9, 220, 2, 2, 2)).setObjects(('CISCO-PAE-MIB', 'cpaePortMode')) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): cpae_port_entry_group = cpaePortEntryGroup.setStatus('current') if mibBuilder.loadTexts: cpaePortEntryGroup.setDescription('A collection of objects that provides the port-mode configuration for a PAE port.') cpae_guest_vlan_group = object_group((1, 3, 6, 1, 4, 1, 9, 9, 220, 2, 2, 3)).setObjects(('CISCO-PAE-MIB', 'cpaeGuestVlanId')) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): cpae_guest_vlan_group = cpaeGuestVlanGroup.setStatus('deprecated') if mibBuilder.loadTexts: cpaeGuestVlanGroup.setDescription('A collection of objects that provides the Guest Vlan configuration information for the system.') cpae_guest_vlan_group2 = object_group((1, 3, 6, 1, 4, 1, 9, 9, 220, 2, 2, 4)).setObjects(('CISCO-PAE-MIB', 'cpaeGuestVlanNumber'), ('CISCO-PAE-MIB', 'cpaeInGuestVlan')) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): cpae_guest_vlan_group2 = cpaeGuestVlanGroup2.setStatus('deprecated') if mibBuilder.loadTexts: cpaeGuestVlanGroup2.setDescription('A collection of objects that provides the per-interface Guest Vlan configuration information for the system.') cpae_shutdown_timeout_group = object_group((1, 3, 6, 1, 4, 1, 9, 9, 220, 2, 2, 5)).setObjects(('CISCO-PAE-MIB', 'cpaeShutdownTimeout'), ('CISCO-PAE-MIB', 'cpaeShutdownTimeoutEnabled')) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): cpae_shutdown_timeout_group = cpaeShutdownTimeoutGroup.setStatus('current') if mibBuilder.loadTexts: cpaeShutdownTimeoutGroup.setDescription('A collection of objects that provides the dot1x shutdown timeout configuration information for the system.') cpae_radius_config_group = object_group((1, 3, 6, 1, 4, 1, 9, 9, 220, 2, 2, 6)).setObjects(('CISCO-PAE-MIB', 'cpaeRadiusAccountingEnabled')) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): cpae_radius_config_group = cpaeRadiusConfigGroup.setStatus('current') if mibBuilder.loadTexts: cpaeRadiusConfigGroup.setDescription('A collection of objects that provides the RADIUS configuration information for the system.') cpae_user_group_group = object_group((1, 3, 6, 1, 4, 1, 9, 9, 220, 2, 2, 7)).setObjects(('CISCO-PAE-MIB', 'cpaeUserGroupUserName'), ('CISCO-PAE-MIB', 'cpaeUserGroupUserAddrType'), ('CISCO-PAE-MIB', 'cpaeUserGroupUserAddr'), ('CISCO-PAE-MIB', 'cpaeUserGroupUserInterface'), ('CISCO-PAE-MIB', 'cpaeUserGroupUserVlan')) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): cpae_user_group_group = cpaeUserGroupGroup.setStatus('current') if mibBuilder.loadTexts: cpaeUserGroupGroup.setDescription('A collection of objects that provides the group manager information of authenticated users in the system.') cpae_guest_vlan_group3 = object_group((1, 3, 6, 1, 4, 1, 9, 9, 220, 2, 2, 8)).setObjects(('CISCO-PAE-MIB', 'cpaeGuestVlanNumber')) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): cpae_guest_vlan_group3 = cpaeGuestVlanGroup3.setStatus('current') if mibBuilder.loadTexts: cpaeGuestVlanGroup3.setDescription('A collection of objects that provides the per-interface Guest Vlan configuration information for the system.') cpae_port_oper_vlan_group = object_group((1, 3, 6, 1, 4, 1, 9, 9, 220, 2, 2, 9)).setObjects(('CISCO-PAE-MIB', 'cpaePortOperVlan'), ('CISCO-PAE-MIB', 'cpaePortOperVlanType')) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): cpae_port_oper_vlan_group = cpaePortOperVlanGroup.setStatus('current') if mibBuilder.loadTexts: cpaePortOperVlanGroup.setDescription('A collection of object(s) that provides the information about Operational Vlan for each PAE port.') cpae_port_auth_fail_vlan_group = object_group((1, 3, 6, 1, 4, 1, 9, 9, 220, 2, 2, 10)).setObjects(('CISCO-PAE-MIB', 'cpaePortAuthFailVlan'), ('CISCO-PAE-MIB', 'cpaeAuthFailUserName')) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): cpae_port_auth_fail_vlan_group = cpaePortAuthFailVlanGroup.setStatus('deprecated') if mibBuilder.loadTexts: cpaePortAuthFailVlanGroup.setDescription('A collection of object(s) that provides the Auth-Fail (Authentication Fail) Vlan configuration and Auth-Fail user information for the system.') cpae_no_guest_vlan_notif_enable_grp = object_group((1, 3, 6, 1, 4, 1, 9, 9, 220, 2, 2, 11)).setObjects(('CISCO-PAE-MIB', 'cpaeNoGuestVlanNotifEnable')) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): cpae_no_guest_vlan_notif_enable_grp = cpaeNoGuestVlanNotifEnableGrp.setStatus('current') if mibBuilder.loadTexts: cpaeNoGuestVlanNotifEnableGrp.setDescription('A collection of object(s) that provides control over Guest Vlan related notification(s).') cpae_no_auth_fail_vlan_notif_enable_grp = object_group((1, 3, 6, 1, 4, 1, 9, 9, 220, 2, 2, 12)).setObjects(('CISCO-PAE-MIB', 'cpaeNoAuthFailVlanNotifEnable')) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): cpae_no_auth_fail_vlan_notif_enable_grp = cpaeNoAuthFailVlanNotifEnableGrp.setStatus('current') if mibBuilder.loadTexts: cpaeNoAuthFailVlanNotifEnableGrp.setDescription('A collection of object(s) that provides control over Auth-Fail related notification(s).') cpae_no_guest_vlan_notif_group = notification_group((1, 3, 6, 1, 4, 1, 9, 9, 220, 2, 2, 13)).setObjects(('CISCO-PAE-MIB', 'cpaeNoGuestVlanNotif')) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): cpae_no_guest_vlan_notif_group = cpaeNoGuestVlanNotifGroup.setStatus('current') if mibBuilder.loadTexts: cpaeNoGuestVlanNotifGroup.setDescription('A collection of notification(s) providing the information for unconfigured Guest Vlan.') cpae_no_auth_fail_vlan_notif_group = notification_group((1, 3, 6, 1, 4, 1, 9, 9, 220, 2, 2, 14)).setObjects(('CISCO-PAE-MIB', 'cpaeNoAuthFailVlanNotif')) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): cpae_no_auth_fail_vlan_notif_group = cpaeNoAuthFailVlanNotifGroup.setStatus('current') if mibBuilder.loadTexts: cpaeNoAuthFailVlanNotifGroup.setDescription('A collection of notifications providing the information for unconfigured Auth-Fail Vlan.') cpae_mac_auth_bypass_group = object_group((1, 3, 6, 1, 4, 1, 9, 9, 220, 2, 2, 15)).setObjects(('CISCO-PAE-MIB', 'cpaeMacAuthBypassReAuthTimeout'), ('CISCO-PAE-MIB', 'cpaeMacAuthBypassReAuthEnabled'), ('CISCO-PAE-MIB', 'cpaeMacAuthBypassViolation'), ('CISCO-PAE-MIB', 'cpaeMacAuthBypassShutdownTimeout'), ('CISCO-PAE-MIB', 'cpaeMacAuthBypassAuthFailTimeout'), ('CISCO-PAE-MIB', 'cpaeMacAuthBypassPortEnabled'), ('CISCO-PAE-MIB', 'cpaeMacAuthBypassPortInitialize'), ('CISCO-PAE-MIB', 'cpaeMacAuthBypassPortReAuth'), ('CISCO-PAE-MIB', 'cpaeMacAuthBypassPortMacAddress'), ('CISCO-PAE-MIB', 'cpaeMacAuthBypassPortAuthState'), ('CISCO-PAE-MIB', 'cpaeMacAuthBypassAcctEnable')) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): cpae_mac_auth_bypass_group = cpaeMacAuthBypassGroup.setStatus('deprecated') if mibBuilder.loadTexts: cpaeMacAuthBypassGroup.setDescription('A collection of object(s) that provides the MAC Auth-Bypass configuration and information for the system.') cpae_web_auth_group = object_group((1, 3, 6, 1, 4, 1, 9, 9, 220, 2, 2, 16)).setObjects(('CISCO-PAE-MIB', 'cpaeWebAuthEnabled'), ('CISCO-PAE-MIB', 'cpaeWebAuthSessionPeriod'), ('CISCO-PAE-MIB', 'cpaeWebAuthLoginPage'), ('CISCO-PAE-MIB', 'cpaeWebAuthLoginFailedPage'), ('CISCO-PAE-MIB', 'cpaeWebAuthQuietPeriod'), ('CISCO-PAE-MIB', 'cpaeWebAuthMaxRetries'), ('CISCO-PAE-MIB', 'cpaeWebAuthPortEnabled'), ('CISCO-PAE-MIB', 'cpaeWebAuthPortInitialize'), ('CISCO-PAE-MIB', 'cpaeWebAuthAaaSessionPeriod'), ('CISCO-PAE-MIB', 'cpaeWebAuthHostSessionTimeLeft'), ('CISCO-PAE-MIB', 'cpaeWebAuthHostState'), ('CISCO-PAE-MIB', 'cpaeWebAuthHostInitialize')) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): cpae_web_auth_group = cpaeWebAuthGroup.setStatus('current') if mibBuilder.loadTexts: cpaeWebAuthGroup.setDescription('A collection of object(s) that provides the Web Proxy Authentication configuration and information for the system.') cpae_auth_config_group = object_group((1, 3, 6, 1, 4, 1, 9, 9, 220, 2, 2, 17)).setObjects(('CISCO-PAE-MIB', 'cpaeAuthReAuthPeriodSrcAdmin'), ('CISCO-PAE-MIB', 'cpaeAuthReAuthPeriodSrcOper'), ('CISCO-PAE-MIB', 'cpaeAuthReAuthPeriodOper'), ('CISCO-PAE-MIB', 'cpaeAuthTimeToNextReAuth'), ('CISCO-PAE-MIB', 'cpaeAuthReAuthAction'), ('CISCO-PAE-MIB', 'cpaeAuthReAuthMax'), ('CISCO-PAE-MIB', 'cpaeAuthIabEnabled')) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): cpae_auth_config_group = cpaeAuthConfigGroup.setStatus('deprecated') if mibBuilder.loadTexts: cpaeAuthConfigGroup.setDescription('A collection of object(s) that provides additional configuration information about an Authenticator PAE.') cpae_host_info_group = object_group((1, 3, 6, 1, 4, 1, 9, 9, 220, 2, 2, 18)).setObjects(('CISCO-PAE-MIB', 'cpaeHostInfoMacAddress'), ('CISCO-PAE-MIB', 'cpaeHostInfoPostureToken')) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): cpae_host_info_group = cpaeHostInfoGroup.setStatus('obsolete') if mibBuilder.loadTexts: cpaeHostInfoGroup.setDescription('A collection of object(s) that provides information about an host connecting to a PAE port.') cpae_web_auth_aaa_fail_group = object_group((1, 3, 6, 1, 4, 1, 9, 9, 220, 2, 2, 19)).setObjects(('CISCO-PAE-MIB', 'cpaeWebAuthPortAaaFailPolicy')) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): cpae_web_auth_aaa_fail_group = cpaeWebAuthAaaFailGroup.setStatus('current') if mibBuilder.loadTexts: cpaeWebAuthAaaFailGroup.setDescription('A collection of object(s) that provides Inaccessible Authentication Bypass configuration and information for Web Proxy Authentication in the system.') cpae_mac_auth_bypass_group2 = object_group((1, 3, 6, 1, 4, 1, 9, 9, 220, 2, 2, 20)).setObjects(('CISCO-PAE-MIB', 'cpaeMacAuthBypassPortTermAction'), ('CISCO-PAE-MIB', 'cpaeMacAuthBypassSessionTimeLeft')) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): cpae_mac_auth_bypass_group2 = cpaeMacAuthBypassGroup2.setStatus('current') if mibBuilder.loadTexts: cpaeMacAuthBypassGroup2.setDescription('A collection of object(s) that provides additional information of MAC Auth-bypass feature in the system.') cpae_port_eapol_test_group = object_group((1, 3, 6, 1, 4, 1, 9, 9, 220, 2, 2, 21)).setObjects(('CISCO-PAE-MIB', 'cpaePortEapolTestLimits'), ('CISCO-PAE-MIB', 'cpaePortEapolTestResult'), ('CISCO-PAE-MIB', 'cpaePortEapolTestStatus')) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): cpae_port_eapol_test_group = cpaePortEapolTestGroup.setStatus('current') if mibBuilder.loadTexts: cpaePortEapolTestGroup.setDescription('A collection of object(s) that provides information about if connecting hosts are EAPOL capable.') cpae_host_info_group2 = object_group((1, 3, 6, 1, 4, 1, 9, 9, 220, 2, 2, 22)).setObjects(('CISCO-PAE-MIB', 'cpaeHostInfoMacAddress')) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): cpae_host_info_group2 = cpaeHostInfoGroup2.setStatus('current') if mibBuilder.loadTexts: cpaeHostInfoGroup2.setDescription('A collection of object(s) that provides information about an host connecting to a PAE port.') cpae_mac_auth_bypass_group3 = object_group((1, 3, 6, 1, 4, 1, 9, 9, 220, 2, 2, 23)).setObjects(('CISCO-PAE-MIB', 'cpaeMacAuthBypassPortAuthMethod')) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): cpae_mac_auth_bypass_group3 = cpaeMacAuthBypassGroup3.setStatus('current') if mibBuilder.loadTexts: cpaeMacAuthBypassGroup3.setDescription('A collection of object(s) that provides configuration for authentication method for MAC Auth-bypass feature in the system.') cpae_port_auth_fail_vlan_group2 = object_group((1, 3, 6, 1, 4, 1, 9, 9, 220, 2, 2, 24)).setObjects(('CISCO-PAE-MIB', 'cpaeAuthFailVlanMaxAttempts')) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): cpae_port_auth_fail_vlan_group2 = cpaePortAuthFailVlanGroup2.setStatus('current') if mibBuilder.loadTexts: cpaePortAuthFailVlanGroup2.setDescription('A collection of object(s) that provides configuration for maximum authentication attempts for Auth-Fail Vlan feature in the system.') cpae_auth_config_group2 = object_group((1, 3, 6, 1, 4, 1, 9, 9, 220, 2, 2, 25)).setObjects(('CISCO-PAE-MIB', 'cpaeAuthPaeState')) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): cpae_auth_config_group2 = cpaeAuthConfigGroup2.setStatus('current') if mibBuilder.loadTexts: cpaeAuthConfigGroup2.setDescription('A collection of object(s) that provides additional states in the PAE state machine.') cpae_critical_recovery_delay_group = object_group((1, 3, 6, 1, 4, 1, 9, 9, 220, 2, 2, 26)).setObjects(('CISCO-PAE-MIB', 'cpaeCriticalRecoveryDelay')) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): cpae_critical_recovery_delay_group = cpaeCriticalRecoveryDelayGroup.setStatus('current') if mibBuilder.loadTexts: cpaeCriticalRecoveryDelayGroup.setDescription('A collection of object(s) that provides recovery delay configuration for 802.1x Critical Authentication in the system.') cpae_auth_config_group3 = object_group((1, 3, 6, 1, 4, 1, 9, 9, 220, 2, 2, 27)).setObjects(('CISCO-PAE-MIB', 'cpaeAuthReAuthPeriodSrcAdmin'), ('CISCO-PAE-MIB', 'cpaeAuthReAuthPeriodSrcOper'), ('CISCO-PAE-MIB', 'cpaeAuthReAuthPeriodOper'), ('CISCO-PAE-MIB', 'cpaeAuthTimeToNextReAuth'), ('CISCO-PAE-MIB', 'cpaeAuthReAuthAction')) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): cpae_auth_config_group3 = cpaeAuthConfigGroup3.setStatus('current') if mibBuilder.loadTexts: cpaeAuthConfigGroup3.setDescription('A collection of object(s) that provides configuration and information related to re-authentication of 802.1x ports in the system.') cpae_auth_config_group4 = object_group((1, 3, 6, 1, 4, 1, 9, 9, 220, 2, 2, 28)).setObjects(('CISCO-PAE-MIB', 'cpaeAuthReAuthMax')) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): cpae_auth_config_group4 = cpaeAuthConfigGroup4.setStatus('current') if mibBuilder.loadTexts: cpaeAuthConfigGroup4.setDescription('A collection of object(s) that provides configuration of maximum reauthentication attempts of 802.1x ports in the system.') cpae_auth_iab_config_group = object_group((1, 3, 6, 1, 4, 1, 9, 9, 220, 2, 2, 29)).setObjects(('CISCO-PAE-MIB', 'cpaeAuthIabEnabled')) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): cpae_auth_iab_config_group = cpaeAuthIabConfigGroup.setStatus('current') if mibBuilder.loadTexts: cpaeAuthIabConfigGroup.setDescription('A collection of object(s) to enable/disable IAB feature on capable interface for the system.') cpae_global_auth_fail_vlan_group = object_group((1, 3, 6, 1, 4, 1, 9, 9, 220, 2, 2, 30)).setObjects(('CISCO-PAE-MIB', 'cpaeGlobalAuthFailMaxAttempts')) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): cpae_global_auth_fail_vlan_group = cpaeGlobalAuthFailVlanGroup.setStatus('current') if mibBuilder.loadTexts: cpaeGlobalAuthFailVlanGroup.setDescription('A collection of object(s) that provides global configuration and information about maximum authentication attempts for Auth-Fail Vlan feature in the system.') cpae_mac_auth_bypass_critical_group = object_group((1, 3, 6, 1, 4, 1, 9, 9, 220, 2, 2, 31)).setObjects(('CISCO-PAE-MIB', 'cpaeMabCriticalRecoveryDelay')) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): cpae_mac_auth_bypass_critical_group = cpaeMacAuthBypassCriticalGroup.setStatus('current') if mibBuilder.loadTexts: cpaeMacAuthBypassCriticalGroup.setDescription('A collection of object(s) that provides control over critical configuration for Mac Authentication Bypass.') cpae_web_auth_critical_group = object_group((1, 3, 6, 1, 4, 1, 9, 9, 220, 2, 2, 32)).setObjects(('CISCO-PAE-MIB', 'cpaeWebAuthCriticalRecoveryDelay')) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): cpae_web_auth_critical_group = cpaeWebAuthCriticalGroup.setStatus('current') if mibBuilder.loadTexts: cpaeWebAuthCriticalGroup.setDescription('A collection of object(s) that provides control over critical configuration for Web Proxy Authentication.') cpae_critical_eapol_config_group = object_group((1, 3, 6, 1, 4, 1, 9, 9, 220, 2, 2, 33)).setObjects(('CISCO-PAE-MIB', 'cpaeCriticalEapolEnabled')) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): cpae_critical_eapol_config_group = cpaeCriticalEapolConfigGroup.setStatus('current') if mibBuilder.loadTexts: cpaeCriticalEapolConfigGroup.setDescription('A collection of object(s) that provides EAPOL configuration for 802.1x Critical Authentication in the system.') cpae_host_posture_token_group = object_group((1, 3, 6, 1, 4, 1, 9, 9, 220, 2, 2, 34)).setObjects(('CISCO-PAE-MIB', 'cpaeHostPostureTokenStr')) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): cpae_host_posture_token_group = cpaeHostPostureTokenGroup.setStatus('current') if mibBuilder.loadTexts: cpaeHostPostureTokenGroup.setDescription('A collection of object(s) that provides information about Posture Token of an host connecting to a PAE port.') cpae_mab_audit_info_group = object_group((1, 3, 6, 1, 4, 1, 9, 9, 220, 2, 2, 35)).setObjects(('CISCO-PAE-MIB', 'cpaeMacAuthBypassPortSessionId'), ('CISCO-PAE-MIB', 'cpaeMacAuthBypassPortUrlRedirect'), ('CISCO-PAE-MIB', 'cpaeMacAuthBypassPortPostureTok')) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): cpae_mab_audit_info_group = cpaeMabAuditInfoGroup.setStatus('current') if mibBuilder.loadTexts: cpaeMabAuditInfoGroup.setDescription('A collection of object(s) that provides information about MAC Auth-Bypass Audit sessions.') cpae_mab_port_ip_dev_track_conf_group = object_group((1, 3, 6, 1, 4, 1, 9, 9, 220, 2, 2, 36)).setObjects(('CISCO-PAE-MIB', 'cpaeMabPortIpDevTrackEnabled')) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): cpae_mab_port_ip_dev_track_conf_group = cpaeMabPortIpDevTrackConfGroup.setStatus('current') if mibBuilder.loadTexts: cpaeMabPortIpDevTrackConfGroup.setDescription('A collection of object(s) that provides configuration and information about MAC Auth-Bypass IP Device Tracking feature.') cpae_port_ip_dev_track_conf_group = object_group((1, 3, 6, 1, 4, 1, 9, 9, 220, 2, 2, 37)).setObjects(('CISCO-PAE-MIB', 'cpaePortIpDevTrackEnabled')) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): cpae_port_ip_dev_track_conf_group = cpaePortIpDevTrackConfGroup.setStatus('current') if mibBuilder.loadTexts: cpaePortIpDevTrackConfGroup.setDescription('A collection of object(s) that provides configuration and information about 802.1x IP Device Tracking feature.') cpae_host_url_redirect_group = object_group((1, 3, 6, 1, 4, 1, 9, 9, 220, 2, 2, 38)).setObjects(('CISCO-PAE-MIB', 'cpaeHostUrlRedirection')) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): cpae_host_url_redirect_group = cpaeHostUrlRedirectGroup.setStatus('current') if mibBuilder.loadTexts: cpaeHostUrlRedirectGroup.setDescription('A collection of object(s) that provides information about URL-redirection of 802.1x authenticated hosts.') cpae_web_auth_ip_dev_tracking_group = object_group((1, 3, 6, 1, 4, 1, 9, 9, 220, 2, 2, 39)).setObjects(('CISCO-PAE-MIB', 'cpaeWebAuthPortIpDevTrackEnabled')) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): cpae_web_auth_ip_dev_tracking_group = cpaeWebAuthIpDevTrackingGroup.setStatus('current') if mibBuilder.loadTexts: cpaeWebAuthIpDevTrackingGroup.setDescription('A collection of object(s) that provides configuration and information about Web Proxy Authentication IP Device Tracking feature.') cpae_web_auth_un_auth_timeout_group = object_group((1, 3, 6, 1, 4, 1, 9, 9, 220, 2, 2, 40)).setObjects(('CISCO-PAE-MIB', 'cpaeWebAuthUnAuthStateTimeout')) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): cpae_web_auth_un_auth_timeout_group = cpaeWebAuthUnAuthTimeoutGroup.setStatus('current') if mibBuilder.loadTexts: cpaeWebAuthUnAuthTimeoutGroup.setDescription('A collection of object(s) that provides configuration and information about Init State Timeout of Web Proxy Authentication.') cpae_host_info_group3 = object_group((1, 3, 6, 1, 4, 1, 9, 9, 220, 2, 2, 41)).setObjects(('CISCO-PAE-MIB', 'cpaeHostInfoUserName'), ('CISCO-PAE-MIB', 'cpaeHostInfoAddrType'), ('CISCO-PAE-MIB', 'cpaeHostInfoAddr')) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): cpae_host_info_group3 = cpaeHostInfoGroup3.setStatus('current') if mibBuilder.loadTexts: cpaeHostInfoGroup3.setDescription('A collection of object(s) that provides user and the address information for 802.1x authenticated host.') cpae_global_sec_violation_group = object_group((1, 3, 6, 1, 4, 1, 9, 9, 220, 2, 2, 42)).setObjects(('CISCO-PAE-MIB', 'cpaeGlobalSecViolationAction')) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): cpae_global_sec_violation_group = cpaeGlobalSecViolationGroup.setStatus('current') if mibBuilder.loadTexts: cpaeGlobalSecViolationGroup.setDescription('A collection of object(s) that provides global configuration and information about security violation action on PAE ports in the system.') cpae_mac_auth_bypass_port_enable_group = object_group((1, 3, 6, 1, 4, 1, 9, 9, 220, 2, 2, 43)).setObjects(('CISCO-PAE-MIB', 'cpaeMacAuthBypassPortEnabled')) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): cpae_mac_auth_bypass_port_enable_group = cpaeMacAuthBypassPortEnableGroup.setStatus('current') if mibBuilder.loadTexts: cpaeMacAuthBypassPortEnableGroup.setDescription('A collection of object(s) to enable/disable Mac Auth-Bypass on capable interfaces for the system.') cpae_mac_auth_bypass_group4 = object_group((1, 3, 6, 1, 4, 1, 9, 9, 220, 2, 2, 44)).setObjects(('CISCO-PAE-MIB', 'cpaeMacAuthBypassReAuthEnabled'), ('CISCO-PAE-MIB', 'cpaeMacAuthBypassReAuthTimeout'), ('CISCO-PAE-MIB', 'cpaeMacAuthBypassViolation'), ('CISCO-PAE-MIB', 'cpaeMacAuthBypassShutdownTimeout'), ('CISCO-PAE-MIB', 'cpaeMacAuthBypassAuthFailTimeout'), ('CISCO-PAE-MIB', 'cpaeMacAuthBypassPortInitialize'), ('CISCO-PAE-MIB', 'cpaeMacAuthBypassPortReAuth'), ('CISCO-PAE-MIB', 'cpaeMacAuthBypassPortMacAddress'), ('CISCO-PAE-MIB', 'cpaeMacAuthBypassPortAuthState'), ('CISCO-PAE-MIB', 'cpaeMacAuthBypassAcctEnable')) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): cpae_mac_auth_bypass_group4 = cpaeMacAuthBypassGroup4.setStatus('current') if mibBuilder.loadTexts: cpaeMacAuthBypassGroup4.setDescription('A collection of object(s) that provides the MAC Auth-Bypass configuration and information for the system.') cpae_host_session_id_group = object_group((1, 3, 6, 1, 4, 1, 9, 9, 220, 2, 2, 45)).setObjects(('CISCO-PAE-MIB', 'cpaeHostSessionId')) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): cpae_host_session_id_group = cpaeHostSessionIdGroup.setStatus('current') if mibBuilder.loadTexts: cpaeHostSessionIdGroup.setDescription('A collection of object(s) that provides session identification information for 802.1x hosts in the system.') cpae_host_auth_info_group = object_group((1, 3, 6, 1, 4, 1, 9, 9, 220, 2, 2, 46)).setObjects(('CISCO-PAE-MIB', 'cpaeHostAuthPaeState'), ('CISCO-PAE-MIB', 'cpaeHostBackendState')) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): cpae_host_auth_info_group = cpaeHostAuthInfoGroup.setStatus('current') if mibBuilder.loadTexts: cpaeHostAuthInfoGroup.setDescription('A collection of object(s) that provides state machines and authentication information for 802.1x authenticated hosts in the system.') cpae_port_capabilities_config_group = object_group((1, 3, 6, 1, 4, 1, 9, 9, 220, 2, 2, 47)).setObjects(('CISCO-PAE-MIB', 'cpaePortCapabilitiesEnabled')) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): cpae_port_capabilities_config_group = cpaePortCapabilitiesConfigGroup.setStatus('current') if mibBuilder.loadTexts: cpaePortCapabilitiesConfigGroup.setDescription('A collection of object(s) that provides configuration and information about PAE functionalities of ports in the systems.') cpae_dot1x_supp_to_guest_vlan_group = object_group((1, 3, 6, 1, 4, 1, 9, 9, 220, 2, 2, 48)).setObjects(('CISCO-PAE-MIB', 'cpaeDot1xSuppToGuestVlanAllowed')) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): cpae_dot1x_supp_to_guest_vlan_group = cpaeDot1xSuppToGuestVlanGroup.setStatus('current') if mibBuilder.loadTexts: cpaeDot1xSuppToGuestVlanGroup.setDescription('A collection of object(s) that provides configuration that allows moving ports with 802.1x supplicants to Guest Vlan.') cpae_guest_vlan_notif_enable_group = object_group((1, 3, 6, 1, 4, 1, 9, 9, 220, 2, 2, 49)).setObjects(('CISCO-PAE-MIB', 'cpaeGuestVlanNotifEnable')) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): cpae_guest_vlan_notif_enable_group = cpaeGuestVlanNotifEnableGroup.setStatus('current') if mibBuilder.loadTexts: cpaeGuestVlanNotifEnableGroup.setDescription('A collection of object(s) that provides control over Guest Vlan related notification(s).') cpae_guest_vlan_notif_group = notification_group((1, 3, 6, 1, 4, 1, 9, 9, 220, 2, 2, 50)).setObjects(('CISCO-PAE-MIB', 'cpaeGuestVlanNotif')) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): cpae_guest_vlan_notif_group = cpaeGuestVlanNotifGroup.setStatus('current') if mibBuilder.loadTexts: cpaeGuestVlanNotifGroup.setDescription('A collection of notifications providing information for Guest Vlan.') cpae_auth_fail_vlan_notif_enable_grp = object_group((1, 3, 6, 1, 4, 1, 9, 9, 220, 2, 2, 51)).setObjects(('CISCO-PAE-MIB', 'cpaeAuthFailVlanNotifEnable')) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): cpae_auth_fail_vlan_notif_enable_grp = cpaeAuthFailVlanNotifEnableGrp.setStatus('current') if mibBuilder.loadTexts: cpaeAuthFailVlanNotifEnableGrp.setDescription('A collection of object(s) that provides control over Auth-Fail Vlan related notification(s).') cpae_auth_fail_vlan_notif_group = notification_group((1, 3, 6, 1, 4, 1, 9, 9, 220, 2, 2, 52)).setObjects(('CISCO-PAE-MIB', 'cpaeAuthFailVlanNotif')) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): cpae_auth_fail_vlan_notif_group = cpaeAuthFailVlanNotifGroup.setStatus('current') if mibBuilder.loadTexts: cpaeAuthFailVlanNotifGroup.setDescription('A collection of notifications providing information for Auth-Fail Vlan.') cpae_port_auth_fail_vlan_config_group = object_group((1, 3, 6, 1, 4, 1, 9, 9, 220, 2, 2, 53)).setObjects(('CISCO-PAE-MIB', 'cpaePortAuthFailVlan')) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): cpae_port_auth_fail_vlan_config_group = cpaePortAuthFailVlanConfigGroup.setStatus('current') if mibBuilder.loadTexts: cpaePortAuthFailVlanConfigGroup.setDescription('A collection of object(s) that provides the Auth-Fail (Authentication Fail) Vlan configuration for the system.') cpae_port_auth_fail_user_info_group = object_group((1, 3, 6, 1, 4, 1, 9, 9, 220, 2, 2, 54)).setObjects(('CISCO-PAE-MIB', 'cpaeAuthFailUserName')) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): cpae_port_auth_fail_user_info_group = cpaePortAuthFailUserInfoGroup.setStatus('current') if mibBuilder.loadTexts: cpaePortAuthFailUserInfoGroup.setDescription('A collection of object(s) that provides the Auth-Fail user information for the system.') cpae_supp_port_profile_group = object_group((1, 3, 6, 1, 4, 1, 9, 9, 220, 2, 2, 55)).setObjects(('CISCO-PAE-MIB', 'cpaeSuppPortCredentialProfileName'), ('CISCO-PAE-MIB', 'cpaeSuppPortEapProfileName')) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): cpae_supp_port_profile_group = cpaeSuppPortProfileGroup.setStatus('current') if mibBuilder.loadTexts: cpaeSuppPortProfileGroup.setDescription('A collection of object(s) that provides Credential and EAP profiles configuration for a Supplicant PAE.') cpae_supp_host_info_group = object_group((1, 3, 6, 1, 4, 1, 9, 9, 220, 2, 2, 56)).setObjects(('CISCO-PAE-MIB', 'cpaeSuppHostAuthMacAddress'), ('CISCO-PAE-MIB', 'cpaeSuppHostPaeState'), ('CISCO-PAE-MIB', 'cpaeSuppHostBackendState'), ('CISCO-PAE-MIB', 'cpaeSuppHostStatus')) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): cpae_supp_host_info_group = cpaeSuppHostInfoGroup.setStatus('current') if mibBuilder.loadTexts: cpaeSuppHostInfoGroup.setDescription('A collection of object(s) that provides information about supplicants in the system.') mibBuilder.exportSymbols('CISCO-PAE-MIB', cpaeWebAuthAaaFailGroup=cpaeWebAuthAaaFailGroup, cpaeMacAuthBypassPortAuthMethod=cpaeMacAuthBypassPortAuthMethod, cpaeWebAuth=cpaeWebAuth, cpaeHostSessionId=cpaeHostSessionId, cpaePortCapabilitiesConfigGroup=cpaePortCapabilitiesConfigGroup, cpaeMultipleHostGroup=cpaeMultipleHostGroup, cpaeUserGroupGroup=cpaeUserGroupGroup, cpaePortOperVlan=cpaePortOperVlan, cpaeWebAuthLoginFailedPage=cpaeWebAuthLoginFailedPage, cpaePortEapolTestTable=cpaePortEapolTestTable, cpaeAuthFailVlanNotif=cpaeAuthFailVlanNotif, cpaeWebAuthQuietPeriod=cpaeWebAuthQuietPeriod, PYSNMP_MODULE_ID=ciscoPaeMIB, cpaeAuthConfigEntry=cpaeAuthConfigEntry, cpaeWebAuthHostState=cpaeWebAuthHostState, cpaeUserGroupName=cpaeUserGroupName, cpaeGuestVlanNotifEnableGroup=cpaeGuestVlanNotifEnableGroup, cpaeAuthConfigGroup2=cpaeAuthConfigGroup2, cpaeMacAuthBypassPortEnabled=cpaeMacAuthBypassPortEnabled, cpaeGlobalSecViolationAction=cpaeGlobalSecViolationAction, cpaeWebAuthLoginPage=cpaeWebAuthLoginPage, cpaeMacAuthBypassPortMacAddress=cpaeMacAuthBypassPortMacAddress, cpaeHostUrlRedirectGroup=cpaeHostUrlRedirectGroup, cpaeSuppPortTable=cpaeSuppPortTable, cpaeAuthFailVlanNotifGroup=cpaeAuthFailVlanNotifGroup, cpaeUserGroupUserVlan=cpaeUserGroupUserVlan, cpaeAuthFailVlanNotifEnable=cpaeAuthFailVlanNotifEnable, cpaePortAuthFailVlan=cpaePortAuthFailVlan, cpaeSuppHostBackendState=cpaeSuppHostBackendState, cpaeCompliance10=cpaeCompliance10, cpaePortOperVlanGroup=cpaePortOperVlanGroup, cpaeGlobalSecViolationGroup=cpaeGlobalSecViolationGroup, cpaeHostInfoPostureToken=cpaeHostInfoPostureToken, cpaeSuppHostPaeState=cpaeSuppHostPaeState, cpaePortEapolTestLimits=cpaePortEapolTestLimits, cpaeUserGroupUserIndex=cpaeUserGroupUserIndex, cpaeWebAuthSessionPeriod=cpaeWebAuthSessionPeriod, cpaePortAuthFailUserInfoGroup=cpaePortAuthFailUserInfoGroup, cpaeAuthIabEnabled=cpaeAuthIabEnabled, cpaeUserGroupUserInterface=cpaeUserGroupUserInterface, cpaeCompliance4=cpaeCompliance4, cpaeUserGroupUserName=cpaeUserGroupUserName, cpaeHostInfoGroup3=cpaeHostInfoGroup3, cpaeNoAuthFailVlanNotifEnable=cpaeNoAuthFailVlanNotifEnable, CpaeAuthState=CpaeAuthState, cpaeCriticalEapolEnabled=cpaeCriticalEapolEnabled, cpaeMacAuthBypassPortSessionId=cpaeMacAuthBypassPortSessionId, cpaeMacAuthBypass=cpaeMacAuthBypass, cpaeSuppPortProfileGroup=cpaeSuppPortProfileGroup, cpaePortAuthFailVlanGroup=cpaePortAuthFailVlanGroup, cpaeCompliance5=cpaeCompliance5, cpaeMIBNotification=cpaeMIBNotification, cpaeMacAuthBypassPortTable=cpaeMacAuthBypassPortTable, cpaeHostInfoGroup=cpaeHostInfoGroup, cpaeMacAuthBypassAcctEnable=cpaeMacAuthBypassAcctEnable, cpaeMacAuthBypassCriticalGroup=cpaeMacAuthBypassCriticalGroup, cpaeRadiusAccountingEnabled=cpaeRadiusAccountingEnabled, cpaePortIpDevTrackConfigEntry=cpaePortIpDevTrackConfigEntry, cpaeUserGroupUserAddr=cpaeUserGroupUserAddr, cpaeMacAuthBypassAuthFailTimeout=cpaeMacAuthBypassAuthFailTimeout, cpaeMabPortIpDevTrackEnabled=cpaeMabPortIpDevTrackEnabled, cpaeAuthConfigTable=cpaeAuthConfigTable, cpaeHostAuthPaeState=cpaeHostAuthPaeState, cpaeSupplicantObjects=cpaeSupplicantObjects, ciscoPaeMIB=ciscoPaeMIB, cpaeCompliance9=cpaeCompliance9, cpaeCompliance7=cpaeCompliance7, cpaeWebAuthPortTable=cpaeWebAuthPortTable, cpaeShutdownTimeoutEnabled=cpaeShutdownTimeoutEnabled, cpaeWebAuthCriticalRecoveryDelay=cpaeWebAuthCriticalRecoveryDelay, cpaeAuthReAuthAction=cpaeAuthReAuthAction, cpaeGuestVlanNotifGroup=cpaeGuestVlanNotifGroup, cpaeMacAuthBypassPortEnableGroup=cpaeMacAuthBypassPortEnableGroup, cpaeUserGroupEntry=cpaeUserGroupEntry, cpaeWebAuthHostTable=cpaeWebAuthHostTable, cpaeAuthFailUserTable=cpaeAuthFailUserTable, cpaeMacAuthBypassReAuthTimeout=cpaeMacAuthBypassReAuthTimeout, cpaeHostInfoUserName=cpaeHostInfoUserName, cpaeMacAuthBypassPortEntry=cpaeMacAuthBypassPortEntry, cpaeGuestVlanNotifEnable=cpaeGuestVlanNotifEnable, cpaeMacAuthBypassPortTermAction=cpaeMacAuthBypassPortTermAction, cpaeGuestVlanGroup3=cpaeGuestVlanGroup3, cpaeGlobalAuthFailVlanGroup=cpaeGlobalAuthFailVlanGroup, cpaeMacAuthBypassGroup3=cpaeMacAuthBypassGroup3, cpaeMacAuthBypassReAuthEnabled=cpaeMacAuthBypassReAuthEnabled, cpaeAuthIabConfigGroup=cpaeAuthIabConfigGroup, cpaeSuppPortEntry=cpaeSuppPortEntry, cpaeWebAuthIpDevTrackingGroup=cpaeWebAuthIpDevTrackingGroup, cpaeHostInfoEntry=cpaeHostInfoEntry, cpaeSuppHostStatus=cpaeSuppHostStatus, cpaePortEapolTestGroup=cpaePortEapolTestGroup, cpaeSuppHostInfoEntry=cpaeSuppHostInfoEntry, ReAuthPeriodSource=ReAuthPeriodSource, cpaeCompliance=cpaeCompliance, cpaeInGuestVlan=cpaeInGuestVlan, cpaeSuppHostInfoSuppIndex=cpaeSuppHostInfoSuppIndex, cpaeMacAuthBypassShutdownTimeout=cpaeMacAuthBypassShutdownTimeout, cpaeMacAuthBypassGroup4=cpaeMacAuthBypassGroup4, cpaePortOperVlanType=cpaePortOperVlanType, cpaeMacAuthBypassPortReAuth=cpaeMacAuthBypassPortReAuth, cpaeWebAuthEnabled=cpaeWebAuthEnabled, cpaeUserGroupTable=cpaeUserGroupTable, cpaeWebAuthHostAddrType=cpaeWebAuthHostAddrType, cpaePortIpDevTrackEnabled=cpaePortIpDevTrackEnabled, cpaeNoGuestVlanNotif=cpaeNoGuestVlanNotif, cpaeAuthConfigGroup3=cpaeAuthConfigGroup3, cpaePortMode=cpaePortMode, cpaeNoGuestVlanNotifEnable=cpaeNoGuestVlanNotifEnable, cpaeMabPortIpDevTrackConfGroup=cpaeMabPortIpDevTrackConfGroup, cpaeMIBCompliances=cpaeMIBCompliances, cpaeWebAuthPortIpDevTrackEnabled=cpaeWebAuthPortIpDevTrackEnabled, cpaeMacAuthBypassSessionTimeLeft=cpaeMacAuthBypassSessionTimeLeft, cpaeAuthTimeToNextReAuth=cpaeAuthTimeToNextReAuth, cpaeWebAuthGroup=cpaeWebAuthGroup, cpaeMIBGroups=cpaeMIBGroups, cpaeWebAuthHostEntry=cpaeWebAuthHostEntry, cpaeDot1xSuppToGuestVlanAllowed=cpaeDot1xSuppToGuestVlanAllowed, cpaeWebAuthPortAaaFailPolicy=cpaeWebAuthPortAaaFailPolicy, cpaeNoGuestVlanNotifEnableGrp=cpaeNoGuestVlanNotifEnableGrp, cpaeWebAuthHostInitialize=cpaeWebAuthHostInitialize, cpaeHostInfoMacAddress=cpaeHostInfoMacAddress, cpaeMabCriticalRecoveryDelay=cpaeMabCriticalRecoveryDelay, cpaePortCapabilitiesEnabled=cpaePortCapabilitiesEnabled, cpaeCriticalRecoveryDelayGroup=cpaeCriticalRecoveryDelayGroup, cpaeAuthReAuthPeriodSrcOper=cpaeAuthReAuthPeriodSrcOper, cpaeShutdownTimeoutGroup=cpaeShutdownTimeoutGroup, cpaeHostUrlRedirection=cpaeHostUrlRedirection, cpaeSuppHostAuthMacAddress=cpaeSuppHostAuthMacAddress, cpaeMIBObject=cpaeMIBObject, cpaePortAuthFailVlanConfigGroup=cpaePortAuthFailVlanConfigGroup, cpaeSuppPortEapProfileName=cpaeSuppPortEapProfileName, cpaePortTable=cpaePortTable, cpaeWebAuthHostAddress=cpaeWebAuthHostAddress, cpaeGuestVlanNotif=cpaeGuestVlanNotif, cpaeCompliance8=cpaeCompliance8, cpaePortEapolTestStatus=cpaePortEapolTestStatus, cpaeRadiusConfigGroup=cpaeRadiusConfigGroup, cpaeWebAuthCriticalGroup=cpaeWebAuthCriticalGroup, cpaeMacAuthBypassPortInitialize=cpaeMacAuthBypassPortInitialize, cpaeHostSessionIdGroup=cpaeHostSessionIdGroup, cpaeNoAuthFailVlanNotifEnableGrp=cpaeNoAuthFailVlanNotifEnableGrp, cpaeMacAuthBypassViolation=cpaeMacAuthBypassViolation, cpaePortIpDevTrackConfGroup=cpaePortIpDevTrackConfGroup, cpaeNoAuthFailVlanNotifGroup=cpaeNoAuthFailVlanNotifGroup, cpaeHostInfoHostIndex=cpaeHostInfoHostIndex, cpaeHostPostureTokenStr=cpaeHostPostureTokenStr, cpaeCompliance2=cpaeCompliance2, cpaeWebAuthPortEntry=cpaeWebAuthPortEntry, cpaeUserGroupUserAddrType=cpaeUserGroupUserAddrType, cpaePortIpDevTrackConfigTable=cpaePortIpDevTrackConfigTable, cpaeCompliance6=cpaeCompliance6, cpaeMabPortIpDevTrackConfTable=cpaeMabPortIpDevTrackConfTable, cpaeHostInfoAddr=cpaeHostInfoAddr, cpaeSuppHostInfoTable=cpaeSuppHostInfoTable, cpaeGuestVlanNumber=cpaeGuestVlanNumber, cpaeAuthFailVlanNotifEnableGrp=cpaeAuthFailVlanNotifEnableGrp, cpaeAuthReAuthMax=cpaeAuthReAuthMax, cpaeWebAuthHostSessionTimeLeft=cpaeWebAuthHostSessionTimeLeft, cpaeAuthConfigGroup=cpaeAuthConfigGroup, cpaeMacAuthBypassPortUrlRedirect=cpaeMacAuthBypassPortUrlRedirect, cpaeWebAuthMaxRetries=cpaeWebAuthMaxRetries, cpaeAuthPaeState=cpaeAuthPaeState, cpaeDot1xSuppToGuestVlanGroup=cpaeDot1xSuppToGuestVlanGroup, cpaeAuthConfigGroup4=cpaeAuthConfigGroup4, cpaeHostInfoAddrType=cpaeHostInfoAddrType, cpaeCriticalEapolConfigGroup=cpaeCriticalEapolConfigGroup, cpaeGuestVlanGroup2=cpaeGuestVlanGroup2, cpaeMultipleHost=cpaeMultipleHost, cpaePortAuthFailVlanGroup2=cpaePortAuthFailVlanGroup2, cpaeAuthFailUserName=cpaeAuthFailUserName, cpaeMabPortIpDevTrackConfEntry=cpaeMabPortIpDevTrackConfEntry, cpaeWebAuthAaaSessionPeriod=cpaeWebAuthAaaSessionPeriod, cpaeAuthReAuthPeriodSrcAdmin=cpaeAuthReAuthPeriodSrcAdmin, cpaeHostInfoGroup2=cpaeHostInfoGroup2, cpaeMacAuthBypassGroup=cpaeMacAuthBypassGroup, cpaeMIBConformance=cpaeMIBConformance, cpaeCompliance3=cpaeCompliance3, cpaeNoGuestVlanNotifGroup=cpaeNoGuestVlanNotifGroup, cpaeMacAuthBypassPortAuthState=cpaeMacAuthBypassPortAuthState, cpaeAuthReAuthPeriodOper=cpaeAuthReAuthPeriodOper, cpaePortEapolTestResult=cpaePortEapolTestResult, cpaeHostPostureTokenGroup=cpaeHostPostureTokenGroup, cpaePortEntry=cpaePortEntry, cpaeNoAuthFailVlanNotif=cpaeNoAuthFailVlanNotif, cpaeWebAuthPortEnabled=cpaeWebAuthPortEnabled, cpaeGuestVlanId=cpaeGuestVlanId, cpaeHostBackendState=cpaeHostBackendState, cpaeSuppPortCredentialProfileName=cpaeSuppPortCredentialProfileName, cpaeShutdownTimeout=cpaeShutdownTimeout, cpaeCriticalRecoveryDelay=cpaeCriticalRecoveryDelay, cpaeHostInfoTable=cpaeHostInfoTable, cpaeHostAuthInfoGroup=cpaeHostAuthInfoGroup, cpaeMacAuthBypassPortPostureTok=cpaeMacAuthBypassPortPostureTok, cpaeNotificationControl=cpaeNotificationControl, cpaeMabAuditInfoGroup=cpaeMabAuditInfoGroup, cpaeAuthFailVlanMaxAttempts=cpaeAuthFailVlanMaxAttempts, cpaeSuppHostInfoGroup=cpaeSuppHostInfoGroup, cpaeMacAuthBypassGroup2=cpaeMacAuthBypassGroup2, cpaeWebAuthPortInitialize=cpaeWebAuthPortInitialize, cpaePortEntryGroup=cpaePortEntryGroup, cpaeWebAuthUnAuthTimeoutGroup=cpaeWebAuthUnAuthTimeoutGroup, cpaeWebAuthUnAuthStateTimeout=cpaeWebAuthUnAuthStateTimeout, cpaeAuthFailUserEntry=cpaeAuthFailUserEntry, cpaeCriticalConfig=cpaeCriticalConfig, cpaeGlobalAuthFailMaxAttempts=cpaeGlobalAuthFailMaxAttempts, cpaePortEapolTestEntry=cpaePortEapolTestEntry, cpaeGuestVlanGroup=cpaeGuestVlanGroup)
arr = list(map(int, input().split())) flag=True for i in range(len(arr)): if arr[i]!=arr[len(arr)-1-i]: flag=False break if flag: print('symmetric') else: print('not symmetric')
arr = list(map(int, input().split())) flag = True for i in range(len(arr)): if arr[i] != arr[len(arr) - 1 - i]: flag = False break if flag: print('symmetric') else: print('not symmetric')
def selectionSort(lst): for selectedLocation in range(len(lst)-1,0,-1): maxPosition=0 for currentindex in range(1,selectedLocation+1): #since range(0,4) is exclusive to 4 if lst[currentindex]>lst[maxPosition]: maxPosition = currentindex lst[selectedLocation], lst[maxPosition] = lst[maxPosition],lst[selectedLocation] ##swapping a,b = b,a swaps a to b and b to a ##implementation lst = [] print ("input array size") i = int(input()) for a in range(0,i): ele= int(input(print("Enter element {0} ".format(a+1)))) lst.append(ele) selectionSort(lst) print(lst)
def selection_sort(lst): for selected_location in range(len(lst) - 1, 0, -1): max_position = 0 for currentindex in range(1, selectedLocation + 1): if lst[currentindex] > lst[maxPosition]: max_position = currentindex (lst[selectedLocation], lst[maxPosition]) = (lst[maxPosition], lst[selectedLocation]) lst = [] print('input array size') i = int(input()) for a in range(0, i): ele = int(input(print('Enter element {0} '.format(a + 1)))) lst.append(ele) selection_sort(lst) print(lst)
def get_coupons(self): return self.handle_response( self.request("/coupons"), "coupons" ) def create_coupon(self, **kwargs): return self.handle_response( self.request("/coupons", "POST", kwargs), "uniqid" ) def get_coupon(self, uniqid): return self.handle_response( self.request(f"/coupons/{uniqid}"), "coupon" ) def update_coupon(self, uniqid, **kwargs): return self.handle_response( self.request(f"/coupons/{uniqid}", "PUT", kwargs) ) def delete_coupon(self, uniqid): return self.handle_response( self.request(f"/coupons/{uniqid}", "DELETE") )
def get_coupons(self): return self.handle_response(self.request('/coupons'), 'coupons') def create_coupon(self, **kwargs): return self.handle_response(self.request('/coupons', 'POST', kwargs), 'uniqid') def get_coupon(self, uniqid): return self.handle_response(self.request(f'/coupons/{uniqid}'), 'coupon') def update_coupon(self, uniqid, **kwargs): return self.handle_response(self.request(f'/coupons/{uniqid}', 'PUT', kwargs)) def delete_coupon(self, uniqid): return self.handle_response(self.request(f'/coupons/{uniqid}', 'DELETE'))
def main() -> None: if __name__ == "__main__": champernownes_constant = ''.join(str(x) for x in range(1, 1_000_000 + 1)) ans = int(champernownes_constant[1 - 1]) ans *= int(champernownes_constant[10 - 1]) ans *= int(champernownes_constant[100 - 1]) ans *= int(champernownes_constant[1_000 - 1]) ans *= int(champernownes_constant[10_000 - 1]) ans *= int(champernownes_constant[100_000 - 1]) ans *= int(champernownes_constant[1_000_000 - 1]) print(ans) if __name__ == '__main__': main()
def main() -> None: if __name__ == '__main__': champernownes_constant = ''.join((str(x) for x in range(1, 1000000 + 1))) ans = int(champernownes_constant[1 - 1]) ans *= int(champernownes_constant[10 - 1]) ans *= int(champernownes_constant[100 - 1]) ans *= int(champernownes_constant[1000 - 1]) ans *= int(champernownes_constant[10000 - 1]) ans *= int(champernownes_constant[100000 - 1]) ans *= int(champernownes_constant[1000000 - 1]) print(ans) if __name__ == '__main__': main()
ies = [] ies.append({ "ie_type" : "Node ID", "ie_value" : "Node ID", "presence" : "M", "instance" : "0", "comment" : "This IE shall contain the unique identifier of the sending Node."}) ies.append({ "ie_type" : "Cause", "ie_value" : "Cause", "presence" : "M", "instance" : "0", "comment" : "This IE shall indicate the acceptance or the rejection of the corresponding request message."}) msg_list[key]["ies"] = ies
ies = [] ies.append({'ie_type': 'Node ID', 'ie_value': 'Node ID', 'presence': 'M', 'instance': '0', 'comment': 'This IE shall contain the unique identifier of the sending Node.'}) ies.append({'ie_type': 'Cause', 'ie_value': 'Cause', 'presence': 'M', 'instance': '0', 'comment': 'This IE shall indicate the acceptance or the rejection of the corresponding request message.'}) msg_list[key]['ies'] = ies
# coding: utf-8 # # Variable Types - Boolean # In the last lesson we learnt how to index and slice strings. We also learnt how to use some common string functions such as the <code>len()</code> function. # # In this lesson, we'll learn about Boolean values. Boolean values evaluate to either True or False and are commonly used for comparisons of equality and inequality, as well as controlling the flow of a program. # ## Boolean Values # Boolean values evaluate to True or False. You can see how Jupyter highlights these keywords: # In[1]: boolTrue = True boolFalse = False # Integers, floats and strings can be evaluated to a boolean value by using the <code>bool()</code> function. # # All non-zero numbers evaluate to <code>True</code> whilst 0 evaluates to <code>False</code>: # In[2]: bool(0) # In[3]: bool(0.00000000001) # In[4]: bool(10) # All non-empty strings evaluate to <code>True</code>, whilst an empty string evaluates to <code>False</code>: # In[5]: bool("hi") # In[6]: bool(' ') # In[7]: bool('') # ## And, Or and Not # # You can also create more complex boolean expressions by using <code>and</code>, <code>or</code> and <code>not</code> to compare multiple expressions. # # <code>and</code> only returns <code>True</code> if all the boolean expressions evaluate to <code>True</code>: # In[8]: print(True and True) # In[9]: print(True and False) # In[10]: print(True and True and True and True and False) # <code>or</code> returns <code>True</code> if at least one expression evalutes to <code>True</code>: # In[11]: print(True or False) # In[12]: print(False or False) # In[13]: print(False or False or False or False or True) # <code>not</code> inverts the boolean expression; <code>True</code> becomes <code>False</code> and vice versa: # In[14]: print(not True) # In[15]: print(not False) # In[16]: print(not(True and True)) # You can use brackets to create complex expressions. What do you think this evaluates to? # In[17]: print(not (True or False) and not(False and True)) # ## Logical comparisons # # We've just seen the basics of boolean values, however comparing <code>True</code> and <code>False</code> isn't particularly useful. The power of boolean values lies in how we can use them to compare values. # # In Python, we can test for equality by using the <code>==</code> symbol; this test for equality returns a boolean value: # In[18]: 5 == 5 # In[19]: 5 == 10 # We can also test for inequality using <code>!=</code>; this also returns a boolean value: # In[20]: 1 != 2 # In[21]: 1 != 1 # <code>==</code> and <code>!=</code> both work on strings: # In[22]: 'hi' == 'hi' # In[23]: 'hi' != 'ho' # We can test if a number is greater than another number using <code>></code>: # In[24]: 5 > 4 # In[25]: 5 > 10 # We can test if a number is greater than or equal to another number by using <code>>=</code> # In[26]: 5 >= 4 # In[27]: 5 >= 5 # In[28]: 5 >= 6 # We can also test if a number is less than another number by using <code>&lt;</code>: # In[29]: 5 < 4 # In[30]: 10 < 100 # An we can test if a number is less than or equal to another number by using <code>&lt;=</code>: # In[31]: 5 <= 7 # In[32]: 5 <= 5 # In[33]: 5 <= 4 # We can also do these comparisons on strings. Python compares the first two items in the string and if they differ, this determines the outcome of the comparison. If they're the same, the next two items are compared: # In[34]: 'a' < 'b' # In[35]: 'hi' < 'ho' # In[36]: 'z' < 'x' # ### Combining comparisons with And, Or and Not # We now know how to create complex comparisons of strings and numbers. For the following examples, try to figure out what the answer will be before you run the cell. # In[37]: 1 != 3 and 2 == 5 # In[38]: "test" != "testing" and 5 == 5 # In[39]: "one" == 1 # In[40]: not (True and False) # In[41]: not (4 == 4 and 0 != 10) # ### What have we learnt this lesson? # In this class we've learnt about Boolean values and how to use them for comparisons of equality and inequality, as well as how to make complex comparisons. We also briefly touched upon using Boolean values to control the flow of a program. We'll return to this in a later lesson. # If you have any questions, please ask in the comments section or email <a href="mailto:me@richard-muir.com">me@richard-muir.com</a>
bool_true = True bool_false = False bool(0) bool(1e-11) bool(10) bool('hi') bool(' ') bool('') print(True and True) print(True and False) print(True and True and True and True and False) print(True or False) print(False or False) print(False or False or False or False or True) print(not True) print(not False) print(not (True and True)) print(not (True or False) and (not (False and True))) 5 == 5 5 == 10 1 != 2 1 != 1 'hi' == 'hi' 'hi' != 'ho' 5 > 4 5 > 10 5 >= 4 5 >= 5 5 >= 6 5 < 4 10 < 100 5 <= 7 5 <= 5 5 <= 4 'a' < 'b' 'hi' < 'ho' 'z' < 'x' 1 != 3 and 2 == 5 'test' != 'testing' and 5 == 5 'one' == 1 not (True and False) not (4 == 4 and 0 != 10)
RAW_PATH = "./data/raw/" INTERIM_PATH = "./data/interim/" REFINED_PATH = "./data/refined/" EXTERNAL_PATH = "./data/external/" SUBMIT_PATH = "./data/submission/" MODELS_PATH = "./data/models/" CAL_DTYPES = { "event_name_1": "category", "event_name_2": "category", "event_type_1": "category", "event_type_2": "category", "weekday": "category", "wm_yr_wk": "int16", "wday": "int16", "month": "int16", "year": "int16", "snap_CA": "float32", "snap_TX": "float32", "snap_WI": "float32", } PRICE_DTYPES = { "store_id": "category", "item_id": "category", "wm_yr_wk": "int16", "sell_price": "float32", } ## features cat_feats = ['item_id', 'dept_id', 'store_id', 'cat_id', 'state_id'] + \ ["event_name_1", "event_name_2", "event_type_1", "event_type_2"] useless_cols = ["id", "date", "sales", "d", "wm_yr_wk", "weekday", "rate" ]
raw_path = './data/raw/' interim_path = './data/interim/' refined_path = './data/refined/' external_path = './data/external/' submit_path = './data/submission/' models_path = './data/models/' cal_dtypes = {'event_name_1': 'category', 'event_name_2': 'category', 'event_type_1': 'category', 'event_type_2': 'category', 'weekday': 'category', 'wm_yr_wk': 'int16', 'wday': 'int16', 'month': 'int16', 'year': 'int16', 'snap_CA': 'float32', 'snap_TX': 'float32', 'snap_WI': 'float32'} price_dtypes = {'store_id': 'category', 'item_id': 'category', 'wm_yr_wk': 'int16', 'sell_price': 'float32'} cat_feats = ['item_id', 'dept_id', 'store_id', 'cat_id', 'state_id'] + ['event_name_1', 'event_name_2', 'event_type_1', 'event_type_2'] useless_cols = ['id', 'date', 'sales', 'd', 'wm_yr_wk', 'weekday', 'rate']
# model settings norm_cfg = dict(type='SyncBN', requires_grad=True) model = dict( type='CascadeEncoderDecoder', num_stages=2, pretrained='open-mmlab://resnet50_v1c', backbone=dict( type='ResNetV1c', depth=50, num_stages=4, out_indices=(0, 1, 2, 3), dilations=(1, 1, 2, 4), strides=(1, 2, 1, 1), norm_cfg=norm_cfg, norm_eval=False, style='pytorch', contract_dilation=True), decode_head=[ dict( type='FCNHead', in_channels=1024, in_index=2, channels=256, num_convs=1, concat_input=False, dropout_ratio=0.1, num_classes=3, norm_cfg=norm_cfg, align_corners=False, loss_decode=dict( type='CrossEntropyLoss', use_sigmoid=False, loss_weight=0.4)), dict( type='OCRHead', in_channels=2048, in_index=3, channels=512, ocr_channels=256, dropout_ratio=0.1, num_classes=3, norm_cfg=norm_cfg, align_corners=False, loss_decode=dict( type='CrossEntropyLoss', use_sigmoid=False, loss_weight=1.0)) ], # model training and testing settings train_cfg=dict(), test_cfg=dict(mode='whole'))
norm_cfg = dict(type='SyncBN', requires_grad=True) model = dict(type='CascadeEncoderDecoder', num_stages=2, pretrained='open-mmlab://resnet50_v1c', backbone=dict(type='ResNetV1c', depth=50, num_stages=4, out_indices=(0, 1, 2, 3), dilations=(1, 1, 2, 4), strides=(1, 2, 1, 1), norm_cfg=norm_cfg, norm_eval=False, style='pytorch', contract_dilation=True), decode_head=[dict(type='FCNHead', in_channels=1024, in_index=2, channels=256, num_convs=1, concat_input=False, dropout_ratio=0.1, num_classes=3, norm_cfg=norm_cfg, align_corners=False, loss_decode=dict(type='CrossEntropyLoss', use_sigmoid=False, loss_weight=0.4)), dict(type='OCRHead', in_channels=2048, in_index=3, channels=512, ocr_channels=256, dropout_ratio=0.1, num_classes=3, norm_cfg=norm_cfg, align_corners=False, loss_decode=dict(type='CrossEntropyLoss', use_sigmoid=False, loss_weight=1.0))], train_cfg=dict(), test_cfg=dict(mode='whole'))
{ 'variables': { 'chromium_code': 1, 'pdf_engine%': 0, # 0 PDFium }, 'target_defaults': { 'cflags': [ '-fPIC', ], }, 'targets': [ { 'target_name': 'pdf', 'type': 'loadable_module', 'msvs_guid': '647863C0-C7A3-469A-B1ED-AD7283C34BED', 'dependencies': [ '../base/base.gyp:base', '../net/net.gyp:net', '../ppapi/ppapi.gyp:ppapi_cpp', '../third_party/pdfium/pdfium.gyp:pdfium', ], 'xcode_settings': { 'INFOPLIST_FILE': 'Info.plist', }, 'mac_framework_dirs': [ '$(SDKROOT)/System/Library/Frameworks/ApplicationServices.framework/Frameworks', ], 'ldflags': [ '-L<(PRODUCT_DIR)',], 'sources': [ 'button.h', 'button.cc', 'chunk_stream.h', 'chunk_stream.cc', 'control.h', 'control.cc', 'document_loader.h', 'document_loader.cc', 'draw_utils.cc', 'draw_utils.h', 'fading_control.cc', 'fading_control.h', 'fading_controls.cc', 'fading_controls.h', 'instance.cc', 'instance.h', 'number_image_generator.cc', 'number_image_generator.h', 'out_of_process_instance.cc', 'out_of_process_instance.h', 'page_indicator.cc', 'page_indicator.h', 'paint_aggregator.cc', 'paint_aggregator.h', 'paint_manager.cc', 'paint_manager.h', 'pdf.cc', 'pdf.h', 'pdf.rc', 'progress_control.cc', 'progress_control.h', 'pdf_engine.h', 'preview_mode_client.cc', 'preview_mode_client.h', 'resource.h', 'resource_consts.h', 'thumbnail_control.cc', 'thumbnail_control.h', '../chrome/browser/chrome_page_zoom_constants.cc', '../content/common/page_zoom.cc', ], 'conditions': [ ['pdf_engine==0', { 'sources': [ 'pdfium/pdfium_assert_matching_enums.cc', 'pdfium/pdfium_engine.cc', 'pdfium/pdfium_engine.h', 'pdfium/pdfium_mem_buffer_file_read.cc', 'pdfium/pdfium_mem_buffer_file_read.h', 'pdfium/pdfium_mem_buffer_file_write.cc', 'pdfium/pdfium_mem_buffer_file_write.h', 'pdfium/pdfium_page.cc', 'pdfium/pdfium_page.h', 'pdfium/pdfium_range.cc', 'pdfium/pdfium_range.h', ], }], ['OS!="win"', { 'sources!': [ 'pdf.rc', ], }], ['OS=="mac"', { 'mac_bundle': 1, 'product_name': 'PDF', 'product_extension': 'plugin', # Strip the shipping binary of symbols so "Foxit" doesn't appear in # the binary. Symbols are stored in a separate .dSYM. 'variables': { 'mac_real_dsym': 1, }, 'sources+': [ 'Info.plist' ], }], ['OS=="win"', { 'defines': [ 'COMPILE_CONTENT_STATICALLY', ], # TODO(jschuh): crbug.com/167187 fix size_t to int truncations. 'msvs_disabled_warnings': [ 4267, ], }], ['OS=="linux"', { 'configurations': { 'Release_Base': { #'cflags': [ '-fno-weak',], # get rid of symbols that strip doesn't remove. # Don't do this for now since official builder will take care of it. That # way symbols can still be uploaded to the crash server. #'ldflags': [ '-s',], # strip local symbols from binary. }, }, }], ], }, ], 'conditions': [ # CrOS has a separate step to do this. ['OS=="linux" and chromeos==0', { 'targets': [ { 'target_name': 'pdf_linux_symbols', 'type': 'none', 'conditions': [ ['linux_dump_symbols==1', { 'actions': [ { 'action_name': 'dump_symbols', 'inputs': [ '<(DEPTH)/build/linux/dump_app_syms', '<(PRODUCT_DIR)/dump_syms', '<(PRODUCT_DIR)/libpdf.so', ], 'outputs': [ '<(PRODUCT_DIR)/libpdf.so.breakpad.<(target_arch)', ], 'action': ['<(DEPTH)/build/linux/dump_app_syms', '<(PRODUCT_DIR)/dump_syms', '<(linux_strip_binary)', '<(PRODUCT_DIR)/libpdf.so', '<@(_outputs)'], 'message': 'Dumping breakpad symbols to <(_outputs)', 'process_outputs_as_sources': 1, }, ], 'dependencies': [ 'pdf', '../breakpad/breakpad.gyp:dump_syms', ], }], ], }, ], },], # OS=="linux" and chromeos==0 ['OS=="win" and fastbuild==0 and target_arch=="ia32" and syzyasan==1', { 'variables': { 'dest_dir': '<(PRODUCT_DIR)/syzygy', }, 'targets': [ { 'target_name': 'pdf_syzyasan', 'type': 'none', 'sources' : [], 'dependencies': [ 'pdf', ], # Instrument PDFium with SyzyAsan. 'actions': [ { 'action_name': 'Instrument PDFium with SyzyAsan', 'inputs': [ '<(PRODUCT_DIR)/pdf.dll', ], 'outputs': [ '<(dest_dir)/pdf.dll', '<(dest_dir)/pdf.dll.pdb', ], 'action': [ 'python', '<(DEPTH)/chrome/tools/build/win/syzygy/instrument.py', '--mode', 'asan', '--input_executable', '<(PRODUCT_DIR)/pdf.dll', '--input_symbol', '<(PRODUCT_DIR)/pdf.dll.pdb', '--destination_dir', '<(dest_dir)', ], }, ], }, ], }], # OS=="win" and fastbuild==0 and target_arch=="ia32" and syzyasan==1 ], }
{'variables': {'chromium_code': 1, 'pdf_engine%': 0}, 'target_defaults': {'cflags': ['-fPIC']}, 'targets': [{'target_name': 'pdf', 'type': 'loadable_module', 'msvs_guid': '647863C0-C7A3-469A-B1ED-AD7283C34BED', 'dependencies': ['../base/base.gyp:base', '../net/net.gyp:net', '../ppapi/ppapi.gyp:ppapi_cpp', '../third_party/pdfium/pdfium.gyp:pdfium'], 'xcode_settings': {'INFOPLIST_FILE': 'Info.plist'}, 'mac_framework_dirs': ['$(SDKROOT)/System/Library/Frameworks/ApplicationServices.framework/Frameworks'], 'ldflags': ['-L<(PRODUCT_DIR)'], 'sources': ['button.h', 'button.cc', 'chunk_stream.h', 'chunk_stream.cc', 'control.h', 'control.cc', 'document_loader.h', 'document_loader.cc', 'draw_utils.cc', 'draw_utils.h', 'fading_control.cc', 'fading_control.h', 'fading_controls.cc', 'fading_controls.h', 'instance.cc', 'instance.h', 'number_image_generator.cc', 'number_image_generator.h', 'out_of_process_instance.cc', 'out_of_process_instance.h', 'page_indicator.cc', 'page_indicator.h', 'paint_aggregator.cc', 'paint_aggregator.h', 'paint_manager.cc', 'paint_manager.h', 'pdf.cc', 'pdf.h', 'pdf.rc', 'progress_control.cc', 'progress_control.h', 'pdf_engine.h', 'preview_mode_client.cc', 'preview_mode_client.h', 'resource.h', 'resource_consts.h', 'thumbnail_control.cc', 'thumbnail_control.h', '../chrome/browser/chrome_page_zoom_constants.cc', '../content/common/page_zoom.cc'], 'conditions': [['pdf_engine==0', {'sources': ['pdfium/pdfium_assert_matching_enums.cc', 'pdfium/pdfium_engine.cc', 'pdfium/pdfium_engine.h', 'pdfium/pdfium_mem_buffer_file_read.cc', 'pdfium/pdfium_mem_buffer_file_read.h', 'pdfium/pdfium_mem_buffer_file_write.cc', 'pdfium/pdfium_mem_buffer_file_write.h', 'pdfium/pdfium_page.cc', 'pdfium/pdfium_page.h', 'pdfium/pdfium_range.cc', 'pdfium/pdfium_range.h']}], ['OS!="win"', {'sources!': ['pdf.rc']}], ['OS=="mac"', {'mac_bundle': 1, 'product_name': 'PDF', 'product_extension': 'plugin', 'variables': {'mac_real_dsym': 1}, 'sources+': ['Info.plist']}], ['OS=="win"', {'defines': ['COMPILE_CONTENT_STATICALLY'], 'msvs_disabled_warnings': [4267]}], ['OS=="linux"', {'configurations': {'Release_Base': {}}}]]}], 'conditions': [['OS=="linux" and chromeos==0', {'targets': [{'target_name': 'pdf_linux_symbols', 'type': 'none', 'conditions': [['linux_dump_symbols==1', {'actions': [{'action_name': 'dump_symbols', 'inputs': ['<(DEPTH)/build/linux/dump_app_syms', '<(PRODUCT_DIR)/dump_syms', '<(PRODUCT_DIR)/libpdf.so'], 'outputs': ['<(PRODUCT_DIR)/libpdf.so.breakpad.<(target_arch)'], 'action': ['<(DEPTH)/build/linux/dump_app_syms', '<(PRODUCT_DIR)/dump_syms', '<(linux_strip_binary)', '<(PRODUCT_DIR)/libpdf.so', '<@(_outputs)'], 'message': 'Dumping breakpad symbols to <(_outputs)', 'process_outputs_as_sources': 1}], 'dependencies': ['pdf', '../breakpad/breakpad.gyp:dump_syms']}]]}]}], ['OS=="win" and fastbuild==0 and target_arch=="ia32" and syzyasan==1', {'variables': {'dest_dir': '<(PRODUCT_DIR)/syzygy'}, 'targets': [{'target_name': 'pdf_syzyasan', 'type': 'none', 'sources': [], 'dependencies': ['pdf'], 'actions': [{'action_name': 'Instrument PDFium with SyzyAsan', 'inputs': ['<(PRODUCT_DIR)/pdf.dll'], 'outputs': ['<(dest_dir)/pdf.dll', '<(dest_dir)/pdf.dll.pdb'], 'action': ['python', '<(DEPTH)/chrome/tools/build/win/syzygy/instrument.py', '--mode', 'asan', '--input_executable', '<(PRODUCT_DIR)/pdf.dll', '--input_symbol', '<(PRODUCT_DIR)/pdf.dll.pdb', '--destination_dir', '<(dest_dir)']}]}]}]]}
initials = [ "b", "c", "ch", "d", "f", "g", "h", "j", "k", "l", "m", "n", "p", "q", "r", "s", "sh", "t", "w", "x", "y", "z", "zh", ] finals = [ "a1", "a2", "a3", "a4", "a5", "ai1", "ai2", "ai3", "ai4", "ai5", "an1", "an2", "an3", "an4", "an5", "ang1", "ang2", "ang3", "ang4", "ang5", "ao1", "ao2", "ao3", "ao4", "ao5", "e1", "e2", "e3", "e4", "e5", "ei1", "ei2", "ei3", "ei4", "ei5", "en1", "en2", "en3", "en4", "en5", "eng1", "eng2", "eng3", "eng4", "eng5", "er1", "er2", "er3", "er4", "er5", "i1", "i2", "i3", "i4", "i5", "ia1", "ia2", "ia3", "ia4", "ia5", "ian1", "ian2", "ian3", "ian4", "ian5", "iang1", "iang2", "iang3", "iang4", "iang5", "iao1", "iao2", "iao3", "iao4", "iao5", "ie1", "ie2", "ie3", "ie4", "ie5", "ii1", "ii2", "ii3", "ii4", "ii5", "iii1", "iii2", "iii3", "iii4", "iii5", "in1", "in2", "in3", "in4", "in5", "ing1", "ing2", "ing3", "ing4", "ing5", "iong1", "iong2", "iong3", "iong4", "iong5", "iou1", "iou2", "iou3", "iou4", "iou5", "o1", "o2", "o3", "o4", "o5", "ong1", "ong2", "ong3", "ong4", "ong5", "ou1", "ou2", "ou3", "ou4", "ou5", "u1", "u2", "u3", "u4", "u5", "ua1", "ua2", "ua3", "ua4", "ua5", "uai1", "uai2", "uai3", "uai4", "uai5", "uan1", "uan2", "uan3", "uan4", "uan5", "uang1", "uang2", "uang3", "uang4", "uang5", "uei1", "uei2", "uei3", "uei4", "uei5", "uen1", "uen2", "uen3", "uen4", "uen5", "uo1", "uo2", "uo3", "uo4", "uo5", "v1", "v2", "v3", "v4", "v5", "van1", "van2", "van3", "van4", "van5", "ve1", "ve2", "ve3", "ve4", "ve5", "vn1", "vn2", "vn3", "vn4", "vn5", ] valid_symbols = initials + finals + ["rr"]
initials = ['b', 'c', 'ch', 'd', 'f', 'g', 'h', 'j', 'k', 'l', 'm', 'n', 'p', 'q', 'r', 's', 'sh', 't', 'w', 'x', 'y', 'z', 'zh'] finals = ['a1', 'a2', 'a3', 'a4', 'a5', 'ai1', 'ai2', 'ai3', 'ai4', 'ai5', 'an1', 'an2', 'an3', 'an4', 'an5', 'ang1', 'ang2', 'ang3', 'ang4', 'ang5', 'ao1', 'ao2', 'ao3', 'ao4', 'ao5', 'e1', 'e2', 'e3', 'e4', 'e5', 'ei1', 'ei2', 'ei3', 'ei4', 'ei5', 'en1', 'en2', 'en3', 'en4', 'en5', 'eng1', 'eng2', 'eng3', 'eng4', 'eng5', 'er1', 'er2', 'er3', 'er4', 'er5', 'i1', 'i2', 'i3', 'i4', 'i5', 'ia1', 'ia2', 'ia3', 'ia4', 'ia5', 'ian1', 'ian2', 'ian3', 'ian4', 'ian5', 'iang1', 'iang2', 'iang3', 'iang4', 'iang5', 'iao1', 'iao2', 'iao3', 'iao4', 'iao5', 'ie1', 'ie2', 'ie3', 'ie4', 'ie5', 'ii1', 'ii2', 'ii3', 'ii4', 'ii5', 'iii1', 'iii2', 'iii3', 'iii4', 'iii5', 'in1', 'in2', 'in3', 'in4', 'in5', 'ing1', 'ing2', 'ing3', 'ing4', 'ing5', 'iong1', 'iong2', 'iong3', 'iong4', 'iong5', 'iou1', 'iou2', 'iou3', 'iou4', 'iou5', 'o1', 'o2', 'o3', 'o4', 'o5', 'ong1', 'ong2', 'ong3', 'ong4', 'ong5', 'ou1', 'ou2', 'ou3', 'ou4', 'ou5', 'u1', 'u2', 'u3', 'u4', 'u5', 'ua1', 'ua2', 'ua3', 'ua4', 'ua5', 'uai1', 'uai2', 'uai3', 'uai4', 'uai5', 'uan1', 'uan2', 'uan3', 'uan4', 'uan5', 'uang1', 'uang2', 'uang3', 'uang4', 'uang5', 'uei1', 'uei2', 'uei3', 'uei4', 'uei5', 'uen1', 'uen2', 'uen3', 'uen4', 'uen5', 'uo1', 'uo2', 'uo3', 'uo4', 'uo5', 'v1', 'v2', 'v3', 'v4', 'v5', 'van1', 'van2', 'van3', 'van4', 'van5', 've1', 've2', 've3', 've4', 've5', 'vn1', 'vn2', 'vn3', 'vn4', 'vn5'] valid_symbols = initials + finals + ['rr']
class Programa: def __init__(self, nome, ano): self._nome = nome.title() self.ano = ano self._likes = 0 @property def likes(self): return self.__likes def dar_like(self): self._likes += 1 @property def nome(self): return self._nome @nome.setter def nome(self, novo_nome): self._nome = novo_nome.title() class Filme(Programa): def __init__(self, nome, ano, duracao): super().__init__(nome, ano) self.duracao = duracao class Serie(Programa): def __init__(self, nome, ano, temporadas): super(Serie, self).__init__(nome, ano) self.temporadas = temporadas
class Programa: def __init__(self, nome, ano): self._nome = nome.title() self.ano = ano self._likes = 0 @property def likes(self): return self.__likes def dar_like(self): self._likes += 1 @property def nome(self): return self._nome @nome.setter def nome(self, novo_nome): self._nome = novo_nome.title() class Filme(Programa): def __init__(self, nome, ano, duracao): super().__init__(nome, ano) self.duracao = duracao class Serie(Programa): def __init__(self, nome, ano, temporadas): super(Serie, self).__init__(nome, ano) self.temporadas = temporadas
# -*- coding: utf-8 -*- def main(): s = input() n = len(s) ans = 0 for i in range(1, n + 1): cur = s[i - 1] if cur == 'U': upper = 1 else: upper = 2 ans += (n - i) * upper if cur == 'U': lower = 2 else: lower = 1 ans += (i - 1) * lower print(ans) if __name__ == '__main__': main()
def main(): s = input() n = len(s) ans = 0 for i in range(1, n + 1): cur = s[i - 1] if cur == 'U': upper = 1 else: upper = 2 ans += (n - i) * upper if cur == 'U': lower = 2 else: lower = 1 ans += (i - 1) * lower print(ans) if __name__ == '__main__': main()
''' Given an absolute path for a file (Unix-style), simplify it. Or in other words, convert it to the canonical path. In a UNIX-style file system, a period . refers to the current directory. Furthermore, a double period .. moves the directory up a level. Note that the returned canonical path must always begin with a slash /, and there must be only a single slash / between two directory names. The last directory name (if it exists) must not end with a trailing /. Also, the canonical path must be the shortest string representing the absolute path. Example 1: Input: "/home/" Output: "/home" Explanation: Note that there is no trailing slash after the last directory name. Example 2: Input: "/../" Output: "/" Explanation: Going one level up from the root directory is a no-op, as the root level is the highest level you can go. Example 3: Input: "/home//foo/" Output: "/home/foo" Explanation: In the canonical path, multiple consecutive slashes are replaced by a single one. Example 4: Input: "/a/./b/../../c/" Output: "/c" Example 5: Input: "/a/../../b/../c//.//" Output: "/c" Example 6: Input: "/a//b////c/d//././/.." Output: "/a/b/c" ''' class Solution: def simplifyPath(self, path: str) -> str: path = path.split('/') output = [] for idx, x in enumerate(path): if x == '..': output = output[:-1] elif x == '.' or x == '': continue else: output.append(x) return '/' + '/'.join(output)
""" Given an absolute path for a file (Unix-style), simplify it. Or in other words, convert it to the canonical path. In a UNIX-style file system, a period . refers to the current directory. Furthermore, a double period .. moves the directory up a level. Note that the returned canonical path must always begin with a slash /, and there must be only a single slash / between two directory names. The last directory name (if it exists) must not end with a trailing /. Also, the canonical path must be the shortest string representing the absolute path. Example 1: Input: "/home/" Output: "/home" Explanation: Note that there is no trailing slash after the last directory name. Example 2: Input: "/../" Output: "/" Explanation: Going one level up from the root directory is a no-op, as the root level is the highest level you can go. Example 3: Input: "/home//foo/" Output: "/home/foo" Explanation: In the canonical path, multiple consecutive slashes are replaced by a single one. Example 4: Input: "/a/./b/../../c/" Output: "/c" Example 5: Input: "/a/../../b/../c//.//" Output: "/c" Example 6: Input: "/a//b////c/d//././/.." Output: "/a/b/c" """ class Solution: def simplify_path(self, path: str) -> str: path = path.split('/') output = [] for (idx, x) in enumerate(path): if x == '..': output = output[:-1] elif x == '.' or x == '': continue else: output.append(x) return '/' + '/'.join(output)
#import In.entity class Thodar(In.entity.Entity): '''Thodar Entity class. ''' entity_type = '' entity_id = 0 #def __init__(self, data = None, items = None, **args): #super().__init__(data, items, **args) @IN.register('Thodar', type = 'Entitier') class ThodarEntitier(In.entity.EntityEntitier): '''Base Thodar Entitier''' # Thodar needs entity insert/update/delete hooks invoke_entity_hook = True # load all is very heavy entity_load_all = False @IN.register('Thodar', type = 'Model') class ThodarModel(In.entity.EntityModel): '''Thodar Model''' @IN.register('Thodar', type = 'Themer') class ThodarThemer(In.entity.EntityThemer): '''Thodar themer''' @IN.hook def entity_model(): return { 'Thodar' : { # entity name 'table' : { # table 'name' : 'thodar', 'columns' : { # table columns / entity attributes 'id' : {}, 'type' : {}, 'created' : {}, 'status' : {}, 'nabar_id' : {}, 'entity_type' : {}, 'entity_id' : {}, 'parent_entity_type' : {}, 'parent_entity_id' : {}, 'weight' : {}, 'level' : {}, }, 'keys' : { 'primary' : 'id', }, }, }, }
class Thodar(In.entity.Entity): """Thodar Entity class. """ entity_type = '' entity_id = 0 @IN.register('Thodar', type='Entitier') class Thodarentitier(In.entity.EntityEntitier): """Base Thodar Entitier""" invoke_entity_hook = True entity_load_all = False @IN.register('Thodar', type='Model') class Thodarmodel(In.entity.EntityModel): """Thodar Model""" @IN.register('Thodar', type='Themer') class Thodarthemer(In.entity.EntityThemer): """Thodar themer""" @IN.hook def entity_model(): return {'Thodar': {'table': {'name': 'thodar', 'columns': {'id': {}, 'type': {}, 'created': {}, 'status': {}, 'nabar_id': {}, 'entity_type': {}, 'entity_id': {}, 'parent_entity_type': {}, 'parent_entity_id': {}, 'weight': {}, 'level': {}}, 'keys': {'primary': 'id'}}}}
# Given an array of meeting time intervals consisting of start and end times # [[s1,e1],[s2,e2],...] (si < ei), determine if a person could attend all meetings. # # Example 1: # # Input: [[0,30],[5,10],[15,20]] # Output: false # Example 2: # # Input: [[7,10],[2,4]] # Output: true class Solution: def canAttendMeetings(self, intervals): intervals.sort(key=lambda x: [x[0]]) for i in range(len(intervals) - 1): if intervals[i][1] > intervals[i + 1][0]: return False return True
class Solution: def can_attend_meetings(self, intervals): intervals.sort(key=lambda x: [x[0]]) for i in range(len(intervals) - 1): if intervals[i][1] > intervals[i + 1][0]: return False return True
class _Object(object): def __init__(self, name): self.name = name def __str__(self): return self.name def __repr__(self): return "'%s'" % self.name STRING = 'Hello world!' INTEGER = 42 FLOAT = -1.2 BOOLEAN = True NONE_VALUE = None ESCAPES = 'one \\ two \\\\ ${non_existing}' NO_VALUE = '' LIST = ['Hello', 'world', '!'] LIST_WITH_NON_STRINGS = [42, -1.2, True, None] LIST_WITH_ESCAPES = ['one \\', 'two \\\\', 'three \\\\\\', '${non_existing}'] OBJECT = _Object('dude') LIST__ONE_ITEM = ['Hello again?'] LIST__LIST_2 = ['Hello', 'again', '?'] LIST__LIST_WITH_ESCAPES_2 = LIST_WITH_ESCAPES[:] LIST__EMPTY_LIST = [] LIST__OBJECTS = [STRING, INTEGER, LIST, OBJECT] lowercase = 'Variable name in lower case' LIST__lowercase_list = [lowercase] Und_er__scores_____ = 'Variable name with under scores' LIST________UN__der__SCO__r_e_s__liST__ = [Und_er__scores_____] PRIORITIES_1 = PRIORITIES_2 = PRIORITIES_3 = PRIORITIES_4 = PRIORITIES_4B \ = 'Variable File'
class _Object(object): def __init__(self, name): self.name = name def __str__(self): return self.name def __repr__(self): return "'%s'" % self.name string = 'Hello world!' integer = 42 float = -1.2 boolean = True none_value = None escapes = 'one \\ two \\\\ ${non_existing}' no_value = '' list = ['Hello', 'world', '!'] list_with_non_strings = [42, -1.2, True, None] list_with_escapes = ['one \\', 'two \\\\', 'three \\\\\\', '${non_existing}'] object = __object('dude') list__one_item = ['Hello again?'] list__list_2 = ['Hello', 'again', '?'] list__list_with_escapes_2 = LIST_WITH_ESCAPES[:] list__empty_list = [] list__objects = [STRING, INTEGER, LIST, OBJECT] lowercase = 'Variable name in lower case' list__lowercase_list = [lowercase] und_er__scores_____ = 'Variable name with under scores' list________un__der__sco__r_e_s__li_st__ = [Und_er__scores_____] priorities_1 = priorities_2 = priorities_3 = priorities_4 = priorities_4_b = 'Variable File'
#!/usr/bin/python3 # iterators.py by Bill Weinman [http://bw.org/] # This is an exercise file from Python 3 Essential Training on lynda.com # Copyright 2010 The BearHeart Group, LLC def main(): fh = open('lines.txt') for line in fh.readlines(): print(line) if __name__ == "__main__": main()
def main(): fh = open('lines.txt') for line in fh.readlines(): print(line) if __name__ == '__main__': main()
def adder(num1, num2): return num1 + num2 def main(): print(adder(5, 3)) main()
def adder(num1, num2): return num1 + num2 def main(): print(adder(5, 3)) main()
class RateLimitExceeded(Exception): def __init__(self, key: str, retry_after: float): self.key = key self.retry_after = retry_after super().__init__()
class Ratelimitexceeded(Exception): def __init__(self, key: str, retry_after: float): self.key = key self.retry_after = retry_after super().__init__()
#DEFINE ALL THE FORMS HERE AS JSON #DEFINITIONS ARE LOADED AS DIJIT WIDGETS #VARIABLES LISTED HERE AS DICTIONARY NEEDS TO BE IMPORTED BACK INTO MODELS.PY WHEN FORMS ARE DEFINED TASK_DETAIL_FORM_CONSTANTS = { 'name':{ 'max_length': 30, "data-dojo-type": "dijit.form.ValidationTextBox", "data-dojo-props": r"'required' :true ,'regExp':'[a-zA-Z\'-. ]+','invalidMessage':'Invalid Character' " }, 'description':{ 'max_length': 1000, "data-dojo-type": "dijit.form.TextBox", "data-dojo-props": r"'required' : true ,'regExp':'[a-zA-Z\'-. ]+','invalidMessage' : 'Invalid Character'" }, 'deadline':{ 'max_length': 30, "data-dojo-type": "dijit.form.DateBox", "data-dojo-props": r"'required' : true ,'regExp':'[a-zA-Z\'-. ]+','invalidMessage' : 'Invalid Character'" }, 'priority':{ 'max_length': 30, "data-dojo-type": "dijit.form.Select", "data-dojo-props": r"'required' : true ,'regExp':'[\\w]+','invalidMessage' : 'Invalid Character'" }, 'status':{ 'max_length': 30, "data-dojo-type": "dijit.form.Select", "data-dojo-props": r"'required' : true ,'regExp':'\\d{1,3}','invalidMessage' : 'Invalid Charected chosen!'" }, 'assigned_to':{ 'max_length': 30, "data-dojo-type": "dijit.form.Select", "data-dojo-props": r"'required' : true ,'regExp':'[\\w]+','invalidMessage' : ''" } }
task_detail_form_constants = {'name': {'max_length': 30, 'data-dojo-type': 'dijit.form.ValidationTextBox', 'data-dojo-props': "'required' :true ,'regExp':'[a-zA-Z\\'-. ]+','invalidMessage':'Invalid Character' "}, 'description': {'max_length': 1000, 'data-dojo-type': 'dijit.form.TextBox', 'data-dojo-props': "'required' : true ,'regExp':'[a-zA-Z\\'-. ]+','invalidMessage' : 'Invalid Character'"}, 'deadline': {'max_length': 30, 'data-dojo-type': 'dijit.form.DateBox', 'data-dojo-props': "'required' : true ,'regExp':'[a-zA-Z\\'-. ]+','invalidMessage' : 'Invalid Character'"}, 'priority': {'max_length': 30, 'data-dojo-type': 'dijit.form.Select', 'data-dojo-props': "'required' : true ,'regExp':'[\\\\w]+','invalidMessage' : 'Invalid Character'"}, 'status': {'max_length': 30, 'data-dojo-type': 'dijit.form.Select', 'data-dojo-props': "'required' : true ,'regExp':'\\\\d{1,3}','invalidMessage' : 'Invalid Charected chosen!'"}, 'assigned_to': {'max_length': 30, 'data-dojo-type': 'dijit.form.Select', 'data-dojo-props': "'required' : true ,'regExp':'[\\\\w]+','invalidMessage' : ''"}}
def standard_deviation(x): n = len(x) mean = sum(x) / n ssq = sum((x_i-mean)**2 for x_i in x) stdev = (ssq/n)**0.5 return(stdev)
def standard_deviation(x): n = len(x) mean = sum(x) / n ssq = sum(((x_i - mean) ** 2 for x_i in x)) stdev = (ssq / n) ** 0.5 return stdev
m = int(input()) for i in range(0,m): n = int(input()) bandera = True for i in range(0,n): temp = input() for j in range(0,n): if i==int(n/2): if j==int(n/2): if temp[j]!='#': bandera=False break else: if temp[j]!='+': bandera=False break else: if j == i or n-i-1 == j: if temp[j] != '#': bandera = False break elif j==int(n/2): if temp[j] != '+': bandera=False break elif temp[j] != '0': bandera = False break if bandera: print("Bandera britanica") else: print("Ni idea")
m = int(input()) for i in range(0, m): n = int(input()) bandera = True for i in range(0, n): temp = input() for j in range(0, n): if i == int(n / 2): if j == int(n / 2): if temp[j] != '#': bandera = False break elif temp[j] != '+': bandera = False break elif j == i or n - i - 1 == j: if temp[j] != '#': bandera = False break elif j == int(n / 2): if temp[j] != '+': bandera = False break elif temp[j] != '0': bandera = False break if bandera: print('Bandera britanica') else: print('Ni idea')
# Use the file name mbox-short.txt as the file name fname = input("Enter file name: ") fh = open(fname) avg = 0.0; count = 0; for line in fh: if not line.startswith("X-DSPAM-Confidence:") : continue pos = line.find(':'); substring = line[pos+1:]; snum = substring.strip(); num = float(snum); avg += num; count = count + 1; favg = avg/count; print("Average spam confidence:" , favg)
fname = input('Enter file name: ') fh = open(fname) avg = 0.0 count = 0 for line in fh: if not line.startswith('X-DSPAM-Confidence:'): continue pos = line.find(':') substring = line[pos + 1:] snum = substring.strip() num = float(snum) avg += num count = count + 1 favg = avg / count print('Average spam confidence:', favg)
def factorial(num: int) -> int: product = 1 for mult in range(1, num + 1): product *= mult return product algorithm = factorial name = 'for loop'
def factorial(num: int) -> int: product = 1 for mult in range(1, num + 1): product *= mult return product algorithm = factorial name = 'for loop'
n = int(input()) for i in range(1, n+1, 2): for j in range(i): print("*", end="") for j in range(n+n-i-i): print(" ", end="") for j in range(i): print("*", end="") print() for i in range(n-2, 0, -2): for j in range(i): print("*", end="") for j in range(n+n-i-i): print(" ", end="") for j in range(i): print("*", end="") print()
n = int(input()) for i in range(1, n + 1, 2): for j in range(i): print('*', end='') for j in range(n + n - i - i): print(' ', end='') for j in range(i): print('*', end='') print() for i in range(n - 2, 0, -2): for j in range(i): print('*', end='') for j in range(n + n - i - i): print(' ', end='') for j in range(i): print('*', end='') print()
class Point: def __init__(self, x, y): self.x = x self.y = y def __lt__(self, other): return self.x < other.x def __str__(self): return "(" + str(self.x) + "," + str(self.y) + ")" def test(): points = [Point(2, 1), Point(1, 1)] points.sort() for p in points: print(p) test()
class Point: def __init__(self, x, y): self.x = x self.y = y def __lt__(self, other): return self.x < other.x def __str__(self): return '(' + str(self.x) + ',' + str(self.y) + ')' def test(): points = [point(2, 1), point(1, 1)] points.sort() for p in points: print(p) test()
class UI_UL_list: pass
class Ui_Ul_List: pass
class Solution: def reverseList(self, head: Optional[ListNode]) -> Optional[ListNode]: curr, pre = head, None while curr: temp = curr.next curr.next = pre pre = curr curr = temp return pre
class Solution: def reverse_list(self, head: Optional[ListNode]) -> Optional[ListNode]: (curr, pre) = (head, None) while curr: temp = curr.next curr.next = pre pre = curr curr = temp return pre
expected_output = { 'vrf': { 'default': { 'address_family': { 'ipv6': { 'routes': { '2001:0:10:204:0:30:0:2/128': { 'active': True, 'next_hop': { 'outgoing_interface': { 'Bundle-Ether10': { 'outgoing_interface': 'Bundle-Ether10', 'updated': '00:54:06' } } }, 'route': '2001:0:10:204:0:30:0:2/128', 'source_protocol': 'local', 'source_protocol_codes': 'L' }, '2001:0:10:204:0:30::/126': { 'active': True, 'next_hop': { 'outgoing_interface': { 'Bundle-Ether10': { 'outgoing_interface': 'Bundle-Ether10', 'updated': '00:54:06' } } }, 'route': '2001:0:10:204:0:30::/126', 'source_protocol': 'connected', 'source_protocol_codes': 'C' }, '2001:0:10:204:0:33::/126': { 'active': True, 'metric': 11, 'next_hop': { 'next_hop_list': { 1: { 'index': 1, 'next_hop': 'fe80::226:88ff:fe55:6f17', 'outgoing_interface': 'TenGigE0/0/0/1', 'updated': '00:53:18' } } }, 'route': '2001:0:10:204:0:33::/126', 'route_preference': 115, 'source_protocol': 'isis', 'source_protocol_codes': 'i ' 'L2' }, '2001:db8:1b7f:8e5c::8/128': { 'active': True, 'metric': 11, 'next_hop': { 'next_hop_list': { 1: { 'index': 1, 'next_hop': 'fe80::226:88ff:fe55:6f17', 'outgoing_interface': 'TenGigE0/0/0/1', 'updated': '00:53:18' } } }, 'route': '2001:db8:1b7f:8e5c::8/128', 'route_preference': 115, 'source_protocol': 'isis', 'source_protocol_codes': 'i ' 'L2' }, '2001:db8:4:4::1/128': { 'active': True, 'next_hop': { 'outgoing_interface': { 'Loopback60': { 'outgoing_interface': 'Loopback60', 'updated': '00:54:19' } } }, 'route': '2001:db8:4:4::1/128', 'source_protocol': 'local', 'source_protocol_codes': 'L' }, '::/0': { 'active': True, 'metric': 11, 'next_hop': { 'next_hop_list': { 1: { 'index': 1, 'next_hop': 'fe80::226:88ff:fe55:6f17', 'outgoing_interface': 'TenGigE0/0/0/1', 'updated': '00:00:10' } } }, 'route': '::/0', 'route_preference': 115, 'source_protocol': 'isis', 'source_protocol_codes': 'i* ' 'L2' }, 'fc00:a0:1:216::1/128': { 'active': True, 'metric': 20, 'next_hop': { 'next_hop_list': { 1: { 'index': 1, 'next_hop': 'fe80::464c:a8ff:fe96:a25f', 'outgoing_interface': 'Bundle-Ether10', 'updated': '00:53:55' } } }, 'route': 'fc00:a0:1:216::1/128', 'route_preference': 115, 'source_protocol': 'isis', 'source_protocol_codes': 'i ' 'L2' }, 'fc00:a0:1::/64': { 'active': True, 'next_hop': { 'outgoing_interface': { 'TenGigE0/0/0/0': { 'outgoing_interface': 'TenGigE0/0/0/0', 'updated': '00:54:18' } } }, 'route': 'fc00:a0:1::/64', 'source_protocol': 'connected', 'source_protocol_codes': 'C' }, 'fc00:a0:1::2/128': { 'active': True, 'next_hop': { 'outgoing_interface': { 'TenGigE0/0/0/0': { 'outgoing_interface': 'TenGigE0/0/0/0', 'updated': '00:54:18' } } }, 'route': 'fc00:a0:1::2/128', 'source_protocol': 'local', 'source_protocol_codes': 'L' }, 'fc00:a0:2::/64': { 'active': True, 'metric': 11, 'next_hop': { 'next_hop_list': { 1: { 'index': 1, 'next_hop': 'fe80::226:88ff:fe55:6f17', 'outgoing_interface': 'TenGigE0/0/0/1', 'updated': '00:53:18' } } }, 'route': 'fc00:a0:2::/64', 'route_preference': 115, 'source_protocol': 'isis', 'source_protocol_codes': 'i ' 'L2' }, 'fc00:a0:5::/64': { 'active': True, 'next_hop': { 'outgoing_interface': { 'TenGigE0/0/0/1': { 'outgoing_interface': 'TenGigE0/0/0/1', 'updated': '00:54:18' } } }, 'route': 'fc00:a0:5::/64', 'source_protocol': 'connected', 'source_protocol_codes': 'C' }, 'fc00:a0:5::2/128': { 'active': True, 'next_hop': { 'outgoing_interface': { 'TenGigE0/0/0/1': { 'outgoing_interface': 'TenGigE0/0/0/1', 'updated': '00:54:18' } } }, 'route': 'fc00:a0:5::2/128', 'source_protocol': 'local', 'source_protocol_codes': 'L' } } } }, 'last_resort': { 'gateway': 'fe80::226:88ff:fe55:6f17', 'to_network': '::' } } } }
expected_output = {'vrf': {'default': {'address_family': {'ipv6': {'routes': {'2001:0:10:204:0:30:0:2/128': {'active': True, 'next_hop': {'outgoing_interface': {'Bundle-Ether10': {'outgoing_interface': 'Bundle-Ether10', 'updated': '00:54:06'}}}, 'route': '2001:0:10:204:0:30:0:2/128', 'source_protocol': 'local', 'source_protocol_codes': 'L'}, '2001:0:10:204:0:30::/126': {'active': True, 'next_hop': {'outgoing_interface': {'Bundle-Ether10': {'outgoing_interface': 'Bundle-Ether10', 'updated': '00:54:06'}}}, 'route': '2001:0:10:204:0:30::/126', 'source_protocol': 'connected', 'source_protocol_codes': 'C'}, '2001:0:10:204:0:33::/126': {'active': True, 'metric': 11, 'next_hop': {'next_hop_list': {1: {'index': 1, 'next_hop': 'fe80::226:88ff:fe55:6f17', 'outgoing_interface': 'TenGigE0/0/0/1', 'updated': '00:53:18'}}}, 'route': '2001:0:10:204:0:33::/126', 'route_preference': 115, 'source_protocol': 'isis', 'source_protocol_codes': 'i L2'}, '2001:db8:1b7f:8e5c::8/128': {'active': True, 'metric': 11, 'next_hop': {'next_hop_list': {1: {'index': 1, 'next_hop': 'fe80::226:88ff:fe55:6f17', 'outgoing_interface': 'TenGigE0/0/0/1', 'updated': '00:53:18'}}}, 'route': '2001:db8:1b7f:8e5c::8/128', 'route_preference': 115, 'source_protocol': 'isis', 'source_protocol_codes': 'i L2'}, '2001:db8:4:4::1/128': {'active': True, 'next_hop': {'outgoing_interface': {'Loopback60': {'outgoing_interface': 'Loopback60', 'updated': '00:54:19'}}}, 'route': '2001:db8:4:4::1/128', 'source_protocol': 'local', 'source_protocol_codes': 'L'}, '::/0': {'active': True, 'metric': 11, 'next_hop': {'next_hop_list': {1: {'index': 1, 'next_hop': 'fe80::226:88ff:fe55:6f17', 'outgoing_interface': 'TenGigE0/0/0/1', 'updated': '00:00:10'}}}, 'route': '::/0', 'route_preference': 115, 'source_protocol': 'isis', 'source_protocol_codes': 'i* L2'}, 'fc00:a0:1:216::1/128': {'active': True, 'metric': 20, 'next_hop': {'next_hop_list': {1: {'index': 1, 'next_hop': 'fe80::464c:a8ff:fe96:a25f', 'outgoing_interface': 'Bundle-Ether10', 'updated': '00:53:55'}}}, 'route': 'fc00:a0:1:216::1/128', 'route_preference': 115, 'source_protocol': 'isis', 'source_protocol_codes': 'i L2'}, 'fc00:a0:1::/64': {'active': True, 'next_hop': {'outgoing_interface': {'TenGigE0/0/0/0': {'outgoing_interface': 'TenGigE0/0/0/0', 'updated': '00:54:18'}}}, 'route': 'fc00:a0:1::/64', 'source_protocol': 'connected', 'source_protocol_codes': 'C'}, 'fc00:a0:1::2/128': {'active': True, 'next_hop': {'outgoing_interface': {'TenGigE0/0/0/0': {'outgoing_interface': 'TenGigE0/0/0/0', 'updated': '00:54:18'}}}, 'route': 'fc00:a0:1::2/128', 'source_protocol': 'local', 'source_protocol_codes': 'L'}, 'fc00:a0:2::/64': {'active': True, 'metric': 11, 'next_hop': {'next_hop_list': {1: {'index': 1, 'next_hop': 'fe80::226:88ff:fe55:6f17', 'outgoing_interface': 'TenGigE0/0/0/1', 'updated': '00:53:18'}}}, 'route': 'fc00:a0:2::/64', 'route_preference': 115, 'source_protocol': 'isis', 'source_protocol_codes': 'i L2'}, 'fc00:a0:5::/64': {'active': True, 'next_hop': {'outgoing_interface': {'TenGigE0/0/0/1': {'outgoing_interface': 'TenGigE0/0/0/1', 'updated': '00:54:18'}}}, 'route': 'fc00:a0:5::/64', 'source_protocol': 'connected', 'source_protocol_codes': 'C'}, 'fc00:a0:5::2/128': {'active': True, 'next_hop': {'outgoing_interface': {'TenGigE0/0/0/1': {'outgoing_interface': 'TenGigE0/0/0/1', 'updated': '00:54:18'}}}, 'route': 'fc00:a0:5::2/128', 'source_protocol': 'local', 'source_protocol_codes': 'L'}}}}, 'last_resort': {'gateway': 'fe80::226:88ff:fe55:6f17', 'to_network': '::'}}}}
# http://www.codewars.com/kata/523b66342d0c301ae400003b/ def multiply(a, b): return a * b
def multiply(a, b): return a * b
# Author: AKHILESH SANTOSHWAR # Input: root node, key # # Output: predecessor node, successor node # 1. If root is NULL # then return # 2. if key is found then # a. If its left subtree is not null # Then predecessor will be the right most # child of left subtree or left child itself. # b. If its right subtree is not null # The successor will be the left most child # of right subtree or right child itself. # return # 3. If key is smaller then root node # set the successor as root # search recursively into left subtree # else # set the predecessor as root # search recursively into right subtree # Python program to find predecessor and successor in a BST # A BST node class Node(object): # Constructor to create a new node def __init__(self, data): self.data = data self.left = None self.right = None # for finding the predecessor and successor of the node def findPredecessorAndSuccessor(self, data): global predecessor, successor predecessor = None successor = None if self is None: return # if the data is in the root itself if self.data == data: # the maximum value in the left subtree is the predecessor if self.left is not None: temp = self.left if temp.right is not None: while(temp.right): temp = temp.right predecessor = temp # the minimum of the right subtree is the successor if self.right is not None: temp = self.right while(temp.left): temp = temp.left successor = temp return #if key is smaller than root, go to left subtree if data < self.data: print('Left') self.left.findPredecessorAndSuccessor(data) else: print('Right') self.right.findPredecessorAndSuccessor(data) def insert(self, data): ''' For inserting the data in the Tree ''' if self.data == data: return False # As BST cannot contain duplicate data elif data < self.data: ''' Data less than the root data is placed to the left of the root ''' if self.left: return self.left.insert(data) else: self.left = Node(data) return True else: ''' Data greater than the root data is placed to the right of the root ''' if self.right: return self.right.insert(data) else: self.right = Node(data) return True if __name__ == '__main__': root = Node(50) root.insert(30) root.insert(20) root.insert(40) root.insert(70) root.insert(60) root.insert(80) # following BST is created # 50 # / \ # 30 70 # / \ / \ # 20 40 60 80 root.findPredecessorAndSuccessor(70) if (predecessor is not None) and (successor is not None): print('Predecessor:', predecessor.data, 'Successor:', successor.data) else: print('Predecessor:', predecessor, 'Successor:', successor)
class Node(object): def __init__(self, data): self.data = data self.left = None self.right = None def find_predecessor_and_successor(self, data): global predecessor, successor predecessor = None successor = None if self is None: return if self.data == data: if self.left is not None: temp = self.left if temp.right is not None: while temp.right: temp = temp.right predecessor = temp if self.right is not None: temp = self.right while temp.left: temp = temp.left successor = temp return if data < self.data: print('Left') self.left.findPredecessorAndSuccessor(data) else: print('Right') self.right.findPredecessorAndSuccessor(data) def insert(self, data): """ For inserting the data in the Tree """ if self.data == data: return False elif data < self.data: ' Data less than the root data is placed to the left of the root ' if self.left: return self.left.insert(data) else: self.left = node(data) return True else: ' Data greater than the root data is placed to the right of the root ' if self.right: return self.right.insert(data) else: self.right = node(data) return True if __name__ == '__main__': root = node(50) root.insert(30) root.insert(20) root.insert(40) root.insert(70) root.insert(60) root.insert(80) root.findPredecessorAndSuccessor(70) if predecessor is not None and successor is not None: print('Predecessor:', predecessor.data, 'Successor:', successor.data) else: print('Predecessor:', predecessor, 'Successor:', successor)
bmi = '' while True: input_numbers = input() if ( '-1' == input_numbers ) or ( -1 == input_numbers.find(' ') ): break input_numbers = input_numbers.split() weight = int(input_numbers[0]) height = int(input_numbers[1]) tmp = weight / ( height / 100 ) ** 2 bmi += str(tmp) + "\n" print(bmi.strip())
bmi = '' while True: input_numbers = input() if '-1' == input_numbers or -1 == input_numbers.find(' '): break input_numbers = input_numbers.split() weight = int(input_numbers[0]) height = int(input_numbers[1]) tmp = weight / (height / 100) ** 2 bmi += str(tmp) + '\n' print(bmi.strip())
def partition(number): answer = set() answer.add((number, )) for x in range(1, number): for y in partition(number - x): answer.add(tuple(sorted((x, ) + y))) return answer def euler78(): num = -1 i = 30 while True: i += 1 print(str(i)) t = len(partition(i)) print(str(t)) if t % 1000000 == 0: break return i
def partition(number): answer = set() answer.add((number,)) for x in range(1, number): for y in partition(number - x): answer.add(tuple(sorted((x,) + y))) return answer def euler78(): num = -1 i = 30 while True: i += 1 print(str(i)) t = len(partition(i)) print(str(t)) if t % 1000000 == 0: break return i
n = 0 row = 5 while n < row: n += 1 end = row * 2 - 1 right = row - n left = row + n l = 1 while l < row * 2: if l > right and l < left: print("*", end='') # print('%') else: print(' ', end='') # print('$') l += 1 print() #2 row = 5 for seet in range(row): for i in range(row - seet - 1): print(' ', end='') for j in range(seet * 2 + 1): print('*', end='') print()
n = 0 row = 5 while n < row: n += 1 end = row * 2 - 1 right = row - n left = row + n l = 1 while l < row * 2: if l > right and l < left: print('*', end='') else: print(' ', end='') l += 1 print() row = 5 for seet in range(row): for i in range(row - seet - 1): print(' ', end='') for j in range(seet * 2 + 1): print('*', end='') print()
class localStorage: def __init__(self, driver) : self.driver = driver def __len__(self): return self.driver.execute_script("return window.localStorage.length;") def items(self) : return self.driver.execute_script( \ "var ls = window.localStorage, items = {}; " \ "for (var i = 0, k; i < ls.length; ++i) " \ " items[k = ls.key(i)] = ls.getItem(k); " \ "return items; ") def keys(self) : return self.driver.execute_script( \ "var ls = window.localStorage, keys = []; " \ "for (var i = 0; i < ls.length; ++i) " \ " keys[i] = ls.key(i); " \ "return keys; ") def get(self, key): return self.driver.execute_script("return window.localStorage.getItem(arguments[0]);", key) def set(self, key, value): self.driver.execute_script("window.localStorage.setItem(arguments[0], arguments[1]);", key, value) def has(self, key): return key in self.keys() def remove(self, key): self.driver.execute_script("window.localStorage.removeItem(arguments[0]);", key) def clear(self): self.driver.execute_script("window.localStorage.clear();") def __getitem__(self, key) : value = self.get(key) if value is None : raise KeyError(key) return value def __setitem__(self, key, value): self.set(key, value) def __contains__(self, key): return key in self.keys() def __iter__(self): return self.items().__iter__() def __repr__(self): return self.items().__str__()
class Localstorage: def __init__(self, driver): self.driver = driver def __len__(self): return self.driver.execute_script('return window.localStorage.length;') def items(self): return self.driver.execute_script('var ls = window.localStorage, items = {}; for (var i = 0, k; i < ls.length; ++i) items[k = ls.key(i)] = ls.getItem(k); return items; ') def keys(self): return self.driver.execute_script('var ls = window.localStorage, keys = []; for (var i = 0; i < ls.length; ++i) keys[i] = ls.key(i); return keys; ') def get(self, key): return self.driver.execute_script('return window.localStorage.getItem(arguments[0]);', key) def set(self, key, value): self.driver.execute_script('window.localStorage.setItem(arguments[0], arguments[1]);', key, value) def has(self, key): return key in self.keys() def remove(self, key): self.driver.execute_script('window.localStorage.removeItem(arguments[0]);', key) def clear(self): self.driver.execute_script('window.localStorage.clear();') def __getitem__(self, key): value = self.get(key) if value is None: raise key_error(key) return value def __setitem__(self, key, value): self.set(key, value) def __contains__(self, key): return key in self.keys() def __iter__(self): return self.items().__iter__() def __repr__(self): return self.items().__str__()
__________________________________________________________________________________________________ class Solution: def twoSumLessThanK(self, A: List[int], K: int) -> int: maxx = -float('inf') for i in range(len(A)): for j in range(i+1, len(A)): if maxx < A[i] +A[j] and A[i] + A[j] < K: maxx = A[i] + A[j] return maxx if maxx != -float('inf') else -1 __________________________________________________________________________________________________ __________________________________________________________________________________________________
__________________________________________________________________________________________________ class Solution: def two_sum_less_than_k(self, A: List[int], K: int) -> int: maxx = -float('inf') for i in range(len(A)): for j in range(i + 1, len(A)): if maxx < A[i] + A[j] and A[i] + A[j] < K: maxx = A[i] + A[j] return maxx if maxx != -float('inf') else -1 __________________________________________________________________________________________________ __________________________________________________________________________________________________
#!/usr/bin/env python '''@package docstring Just a giant list of processes and properties ''' processes = { 'DY1JetsToLL_M-10to50_TuneCUETP8M1_13TeV-madgraphMLM-pythia8':('DY1JetsToLL_M-10to50_TuneCUETP8M1_13TeV-madgraphMLM-pythia8','MC',729.726349), 'DY2JetsToLL_M-10to50_TuneCUETP8M1_13TeV-madgraphMLM-pythia8':('DY2JetsToLL_M-10to50_TuneCUETP8M1_13TeV-madgraphMLM-pythia8','MC',387.472359), 'DY3JetsToLL_M-10to50_TuneCUETP8M1_13TeV-madgraphMLM-pythia8':('DY3JetsToLL_M-10to50_TuneCUETP8M1_13TeV-madgraphMLM-pythia8','MC',95.033555), 'DY4JetsToLL_M-10to50_TuneCUETP8M1_13TeV-madgraphMLM-pythia8':('DY4JetsToLL_M-10to50_TuneCUETP8M1_13TeV-madgraphMLM-pythia8','MC',36.698502), 'DY1JetsToLL_M-50_TuneCUETP8M1_13TeV-madgraphMLM-pythia8':('DY1JetsToLL_M-50_TuneCUETP8M1_13TeV-madgraphMLM-pythia8','MC',1012.296845), 'DY2JetsToLL_M-50_TuneCUETP8M1_13TeV-madgraphMLM-pythia8':('DY2JetsToLL_M-50_TuneCUETP8M1_13TeV-madgraphMLM-pythia8','MC',334.717838), 'DY3JetsToLL_M-50_TuneCUETP8M1_13TeV-madgraphMLM-pythia8':('DY3JetsToLL_M-50_TuneCUETP8M1_13TeV-madgraphMLM-pythia8','MC',102.462800), 'DY4JetsToLL_M-50_TuneCUETP8M1_13TeV-madgraphMLM-pythia8':('DY4JetsToLL_M-50_TuneCUETP8M1_13TeV-madgraphMLM-pythia8','MC',54.481360), 'DYJetsToLL_Zpt-0To50_TuneCUETP8M1_13TeV-amcatnloFXFX-pythia8' :('DYJetsToLL_Zpt-0To50_TuneCUETP8M1_13TeV-amcatnloFXFX-pythia8','MC' ,5512.4400), 'DYJetsToLL_Pt-50To100_TuneCUETP8M1_13TeV-amcatnloFXFX-pythia8' :('DYJetsToLL_Pt-50To100_TuneCUETP8M1_13TeV-amcatnloFXFX-pythia8','MC' , 374.6800), 'DYJetsToLL_Pt-100To250_TuneCUETP8M1_13TeV-amcatnloFXFX-pythia8':('DYJetsToLL_Pt-100To250_TuneCUETP8M1_13TeV-amcatnloFXFX-pythia8','MC', 86.5200), 'DYJetsToLL_Pt-250To400_TuneCUETP8M1_13TeV-amcatnloFXFX-pythia8':('DYJetsToLL_Pt-250To400_TuneCUETP8M1_13TeV-amcatnloFXFX-pythia8','MC', 3.3247), 'DYJetsToLL_Pt-400To650_TuneCUETP8M1_13TeV-amcatnloFXFX-pythia8':('DYJetsToLL_Pt-400To650_TuneCUETP8M1_13TeV-amcatnloFXFX-pythia8','MC', 0.4491), 'DYJetsToLL_Pt-650ToInf_TuneCUETP8M1_13TeV-amcatnloFXFX-pythia8':('DYJetsToLL_Pt-650ToInf_TuneCUETP8M1_13TeV-amcatnloFXFX-pythia8','MC', 0.0422), 'DYJetsToTauTau_ForcedMuEleDecay_M-50_TuneCUETP8M1_13TeV-amcatnloFXFX-pythia8':('DYJetsToTauTau_ForcedMuEleDecay_M-50_TuneCUETP8M1_13TeV-amcatnloFXFX-pythia8','MC',2008.4*(0.1739+0.1782)*(0.1739+0.1782)), 'DYJetsToLL_M-10to50_TuneCUETP8M1_13TeV-madgraphMLM-pythia8':('DYJetsToLL_M-10to50_TuneCUETP8M1_13TeV-madgraphMLM-pythia8','MC',2008.4*3*3.78), 'DYJetsToLL_M-50_TuneCUETP8M1_13TeV-amcatnloFXFX-pythia8':('DYJetsToLL_M-50_TuneCUETP8M1_13TeV-amcatnloFXFX-pythia8','MC',2008.4*3), 'DYJetsToLL_M-50_TuneCUETP8M1_13TeV-madgraphMLM-pythia8':('DYJetsToLL_M-50_TuneCUETP8M1_13TeV-madgraphMLM-pythia8','MC',2008.4*3), 'DYJetsToLL_Zpt-100to200_M-50_TuneCUETP8M1_13TeV-madgraphMLM-pythia8':('DYJetsToLL_Zpt-100to200_M-50_TuneCUETP8M1_13TeV-madgraphMLM-pythia8','MC',69.586), 'DYJetsToLL_Zpt-200toInf_M-50_TuneCUETP8M1_13TeV-madgraphMLM-pythia8':('DYJetsToLL_Zpt-200toInf_M-50_TuneCUETP8M1_13TeV-madgraphMLM-pythia8','MC',8.186), 'ZToMuMu_NNPDF30_13TeV-powheg_M_50_120':('ZToMuMu_NNPDF30_13TeV-powheg_M_50_120','MC',1975), 'ZToEE_NNPDF30_13TeV-powheg_M_50_120':('ZToEE_NNPDF30_13TeV-powheg_M_50_120','MC',1975), 'ZToMuMu_NNPDF30_13TeV-powheg_M_120_200':('ZToMuMu_NNPDF30_13TeV-powheg_M_120_200','MC',19.32), 'ZToEE_NNPDF30_13TeV-powheg_M_120_200':('ZToEE_NNPDF30_13TeV-powheg_M_120_200','MC',19.32), 'tZq_ll_4f_13TeV-amcatnlo-pythia8':('tZq_ll_4f_13TeV-amcatnlo-pythia8','MC',0.0758), 'tZq_nunu_4f_13TeV-amcatnlo-pythia8_TuneCUETP8M1':('tZq_nunu_4f_13TeV-amcatnlo-pythia8_TuneCUETP8M1','MC',0.1379), 'ZZTo2L2Nu_13TeV_powheg_pythia8':('ZZTo2L2Nu_13TeV_powheg_pythia8','MC',0.564), 'ZZTo2L2Q_13TeV_amcatnloFXFX_madspin_pythia8':('ZZTo2L2Q_13TeV_amcatnloFXFX_madspin_pythia8','MC',3.220*1.1), 'ZZTo4L_13TeV_powheg_pythia8':('ZZTo4L_13TeV_powheg_pythia8','MC',1.256), 'GluGluToContinToZZTo2e2mu_13TeV_MCFM701_pythia8':('GluGluToContinToZZTo2e2mu_13TeV_MCFM701_pythia8','MC',0.003194*2.3), 'GluGluToContinToZZTo2e2tau_13TeV_MCFM701_pythia8':('GluGluToContinToZZTo2e2tau_13TeV_MCFM701_pythia8','MC',0.003194*2.3), 'GluGluToContinToZZTo2mu2tau_13TeV_MCFM701_pythia8':('GluGluToContinToZZTo2mu2tau_13TeV_MCFM701_pythia8','MC',0.003194*2.3), 'GluGluToContinToZZTo4e_13TeV_MCFM701_pythia8':('GluGluToContinToZZTo4e_13TeV_MCFM701_pythia8','MC',0.001586*2.3), 'GluGluToContinToZZTo4mu_13TeV_MCFM701_pythia8':('GluGluToContinToZZTo4mu_13TeV_MCFM701_pythia8','MC',0.001586*2.3), 'GluGluToContinToZZTo4tau_13TeV_MCFM701_pythia8':('GluGluToContinToZZTo4tau_13TeV_MCFM701_pythia8','MC',0.001586*2.3), 'GluGluToContinToZZTo2e2nu_13TeV_MCFM701_pythia8':('GluGluToContinToZZTo2e2nu_13TeV_MCFM701_pythia8','MC',0.001720*2.3), 'GluGluToContinToZZTo2mu2nu_13TeV_MCFM701_pythia8':('GluGluToContinToZZTo2mu2nu_13TeV_MCFM701_pythia8','MC',0.001720*2.3), 'GluGluHToZZTo4L_M125_13TeV_powheg2_JHUgenV6_pythia8':('GluGluHToZZTo4L_M125_13TeV_powheg2_JHUgenV6_pythia8','MC',48.580*0.0264*0.101*0.101), 'VBF_HToZZTo4L_M125_13TeV_powheg2_JHUgenV6_pythia8':('VBF_HToZZTo4L_M125_13TeV_powheg2_JHUgenV6_pythia8','MC',3.7820*0.0264*0.101*0.101), 'GluGluHToWWTo2L2Nu_M125_13TeV_powheg_JHUgen_pythia8':('GluGluHToWWTo2L2Nu_M125_13TeV_powheg_JHUgen_pythia8','MC',48.580*0.2150*0.1086*0.1086*9), 'VBFHToWWTo2L2Nu_M125_13TeV_powheg_JHUgenv628_pythia8':('VBFHToWWTo2L2Nu_M125_13TeV_powheg_JHUgenv628_pythia8','MC',3.7820*0.2150*0.1086*0.1086*9), 'GluGluHToTauTau_M125_13TeV_powheg_pythia8':('GluGluHToTauTau_M125_13TeV_powheg_pythia8','MC',48.580*0.0632), 'VBFHToTauTau_M125_13TeV_powheg_pythia8':('VBFHToTauTau_M125_13TeV_powheg_pythia8','MC',3.7820*0.0632), 'ttHToNonbb_M125_TuneCUETP8M2_ttHtranche3_13TeV-powheg-pythia8':('ttHToNonbb_M125_TuneCUETP8M2_ttHtranche3_13TeV-powheg-pythia8','MC',0.5071*(1-0.577)), 'VHToNonbb_M125_13TeV_amcatnloFXFX_madspin_pythia8':('VHToNonbb_M125_13TeV_amcatnloFXFX_madspin_pythia8','MC',(0.8839+0.8400+0.5328)*(1-0.577)), 'WWW_4F_TuneCUETP8M1_13TeV-amcatnlo-pythia8':('WWW_4F_TuneCUETP8M1_13TeV-amcatnlo-pythia8','MC',0.2086), 'WWZ_TuneCUETP8M1_13TeV-amcatnlo-pythia8':('WWZ_TuneCUETP8M1_13TeV-amcatnlo-pythia8','MC',0.16510), 'WZZ_TuneCUETP8M1_13TeV-amcatnlo-pythia8':('WZZ_TuneCUETP8M1_13TeV-amcatnlo-pythia8','MC',0.05565), 'ZZZ_TuneCUETP8M1_13TeV-amcatnlo-pythia8':('ZZZ_TuneCUETP8M1_13TeV-amcatnlo-pythia8','MC',0.01398), 'WWG_TuneCUETP8M1_13TeV-amcatnlo-pythia8':('WWG_TuneCUETP8M1_13TeV-amcatnlo-pythia8','MC',0.2147) , 'WZTo1L1Nu2Q_13TeV_amcatnloFXFX_madspin_pythia8':('WZTo1L1Nu2Q_13TeV_amcatnloFXFX_madspin_pythia8','MC',10.71*1.109), 'WZTo1L3Nu_13TeV_amcatnloFXFX_madspin_pythia8':('WZTo1L3Nu_13TeV_amcatnloFXFX_madspin_pythia8','MC',3.033*1.109), 'WZTo2L2Q_13TeV_amcatnloFXFX_madspin_pythia8':('WZTo2L2Q_13TeV_amcatnloFXFX_madspin_pythia8','MC',5.595*1.109), 'WZTo3LNu_TuneCUETP8M1_13TeV-powheg-pythia8':('WZTo3LNu_TuneCUETP8M1_13TeV-powheg-pythia8','MC',4.42965*1.109), 'WWTo2L2Nu_13TeV-powheg':('WWTo2L2Nu_13TeV-powheg','MC',(118.7-3.974)*0.1086*0.1086*9), 'WWTo2L2Nu_DoubleScattering_13TeV-pythia8':('WWTo2L2Nu_DoubleScattering_13TeV-pythia8','MC',0.1729), 'GluGluWWTo2L2Nu_MCFM_13TeV':('GluGluWWTo2L2Nu_MCFM_13TeV','MC',3.974*0.1086*0.1086*9*1.4), 'WpWpJJ_EWK-QCD_TuneCUETP8M1_13TeV-madgraph-pythia8':('WpWpJJ_EWK-QCD_TuneCUETP8M1_13TeV-madgraph-pythia8','MC',0.0538980), 'WpWpJJ_EWK_TuneCUETP8M1_13TeV-madgraph-pythia8':('WpWpJJ_EWK_TuneCUETP8M1_13TeV-madgraph-pythia8','MC',0.0269642), 'WpWpJJ_QCD_TuneCUETP8M1_13TeV-madgraph-pythia8':('WpWpJJ_QCD_TuneCUETP8M1_13TeV-madgraph-pythia8','MC',0.0261515), 'TTGJets_TuneCUETP8M1_13TeV-amcatnloFXFX-madspin-pythia8':('TTGJets_TuneCUETP8M1_13TeV-amcatnloFXFX-madspin-pythia8','MC',1.444*3.2), 'TTZToLLNuNu_M-10_TuneCUETP8M1_13TeV-amcatnlo-pythia8':('TTZToLLNuNu_M-10_TuneCUETP8M1_13TeV-amcatnlo-pythia8','MC',0.2529), 'TTZToQQ_TuneCUETP8M1_13TeV-amcatnlo-pythia8':('TTZToQQ_TuneCUETP8M1_13TeV-amcatnlo-pythia8','MC',0.5297), 'TTWJetsToLNu_TuneCUETP8M1_13TeV-amcatnloFXFX-madspin-pythia8':('TTWJetsToLNu_TuneCUETP8M1_13TeV-amcatnloFXFX-madspin-pythia8','MC',0.2043), 'TTWJetsToQQ_TuneCUETP8M1_13TeV-amcatnloFXFX-madspin-pythia8':('TTWJetsToQQ_TuneCUETP8M1_13TeV-amcatnloFXFX-madspin-pythia8','MC',0.4062), 'TTTo2L2Nu_TuneCUETP8M2_ttHtranche3_13TeV-powheg-pythia8':('TTTo2L2Nu_TuneCUETP8M2_ttHtranche3_13TeV-powheg-pythia8','MC',831.76*0.1086*0.1086*9), 'ST_tW_antitop_5f_inclusiveDecays_13TeV-powheg-pythia8_TuneCUETP8M1':('ST_tW_antitop_5f_inclusiveDecays_13TeV-powheg-pythia8_TuneCUETP8M1','MC',35.6), 'ST_tW_top_5f_inclusiveDecays_13TeV-powheg-pythia8_TuneCUETP8M1':('ST_tW_top_5f_inclusiveDecays_13TeV-powheg-pythia8_TuneCUETP8M1','MC',35.6), 'WGstarToLNuEE_012Jets_13TeV-madgraph':('WGstarToLNuEE_012Jets_13TeV-madgraph','MC',3.526), 'WGstarToLNuMuMu_012Jets_13TeV-madgraph':('WGstarToLNuMuMu_012Jets_13TeV-madgraph','MC',2.793), 'WGToLNuG_TuneCUETP8M1_13TeV-madgraphMLM-pythia8':('WGToLNuG_TuneCUETP8M1_13TeV-madgraphMLM-pythia8','MC',489.0), 'ZGTo2LG_TuneCUETP8M1_13TeV-amcatnloFXFX-pythia8':('ZGTo2LG_TuneCUETP8M1_13TeV-amcatnloFXFX-pythia8','MC',123.9*1.06), 'TT_TuneCUETP8M2T4_13TeV-powheg-pythia8':('TT_TuneCUETP8M2T4_13TeV-powheg-pythia8','MC',831.76), 'WJetsToLNu_TuneCUETP8M1_13TeV-amcatnloFXFX-pythia8':('WJetsToLNu_TuneCUETP8M1_13TeV-amcatnloFXFX-pythia8','MC',20508.9*3), 'DarkPhoton_ZH_powheg_M-125':('DarkPhoton_ZH_powheg_M-125','MC',0.8839*0.101*0.10), }
"""@package docstring Just a giant list of processes and properties """ processes = {'DY1JetsToLL_M-10to50_TuneCUETP8M1_13TeV-madgraphMLM-pythia8': ('DY1JetsToLL_M-10to50_TuneCUETP8M1_13TeV-madgraphMLM-pythia8', 'MC', 729.726349), 'DY2JetsToLL_M-10to50_TuneCUETP8M1_13TeV-madgraphMLM-pythia8': ('DY2JetsToLL_M-10to50_TuneCUETP8M1_13TeV-madgraphMLM-pythia8', 'MC', 387.472359), 'DY3JetsToLL_M-10to50_TuneCUETP8M1_13TeV-madgraphMLM-pythia8': ('DY3JetsToLL_M-10to50_TuneCUETP8M1_13TeV-madgraphMLM-pythia8', 'MC', 95.033555), 'DY4JetsToLL_M-10to50_TuneCUETP8M1_13TeV-madgraphMLM-pythia8': ('DY4JetsToLL_M-10to50_TuneCUETP8M1_13TeV-madgraphMLM-pythia8', 'MC', 36.698502), 'DY1JetsToLL_M-50_TuneCUETP8M1_13TeV-madgraphMLM-pythia8': ('DY1JetsToLL_M-50_TuneCUETP8M1_13TeV-madgraphMLM-pythia8', 'MC', 1012.296845), 'DY2JetsToLL_M-50_TuneCUETP8M1_13TeV-madgraphMLM-pythia8': ('DY2JetsToLL_M-50_TuneCUETP8M1_13TeV-madgraphMLM-pythia8', 'MC', 334.717838), 'DY3JetsToLL_M-50_TuneCUETP8M1_13TeV-madgraphMLM-pythia8': ('DY3JetsToLL_M-50_TuneCUETP8M1_13TeV-madgraphMLM-pythia8', 'MC', 102.4628), 'DY4JetsToLL_M-50_TuneCUETP8M1_13TeV-madgraphMLM-pythia8': ('DY4JetsToLL_M-50_TuneCUETP8M1_13TeV-madgraphMLM-pythia8', 'MC', 54.48136), 'DYJetsToLL_Zpt-0To50_TuneCUETP8M1_13TeV-amcatnloFXFX-pythia8': ('DYJetsToLL_Zpt-0To50_TuneCUETP8M1_13TeV-amcatnloFXFX-pythia8', 'MC', 5512.44), 'DYJetsToLL_Pt-50To100_TuneCUETP8M1_13TeV-amcatnloFXFX-pythia8': ('DYJetsToLL_Pt-50To100_TuneCUETP8M1_13TeV-amcatnloFXFX-pythia8', 'MC', 374.68), 'DYJetsToLL_Pt-100To250_TuneCUETP8M1_13TeV-amcatnloFXFX-pythia8': ('DYJetsToLL_Pt-100To250_TuneCUETP8M1_13TeV-amcatnloFXFX-pythia8', 'MC', 86.52), 'DYJetsToLL_Pt-250To400_TuneCUETP8M1_13TeV-amcatnloFXFX-pythia8': ('DYJetsToLL_Pt-250To400_TuneCUETP8M1_13TeV-amcatnloFXFX-pythia8', 'MC', 3.3247), 'DYJetsToLL_Pt-400To650_TuneCUETP8M1_13TeV-amcatnloFXFX-pythia8': ('DYJetsToLL_Pt-400To650_TuneCUETP8M1_13TeV-amcatnloFXFX-pythia8', 'MC', 0.4491), 'DYJetsToLL_Pt-650ToInf_TuneCUETP8M1_13TeV-amcatnloFXFX-pythia8': ('DYJetsToLL_Pt-650ToInf_TuneCUETP8M1_13TeV-amcatnloFXFX-pythia8', 'MC', 0.0422), 'DYJetsToTauTau_ForcedMuEleDecay_M-50_TuneCUETP8M1_13TeV-amcatnloFXFX-pythia8': ('DYJetsToTauTau_ForcedMuEleDecay_M-50_TuneCUETP8M1_13TeV-amcatnloFXFX-pythia8', 'MC', 2008.4 * (0.1739 + 0.1782) * (0.1739 + 0.1782)), 'DYJetsToLL_M-10to50_TuneCUETP8M1_13TeV-madgraphMLM-pythia8': ('DYJetsToLL_M-10to50_TuneCUETP8M1_13TeV-madgraphMLM-pythia8', 'MC', 2008.4 * 3 * 3.78), 'DYJetsToLL_M-50_TuneCUETP8M1_13TeV-amcatnloFXFX-pythia8': ('DYJetsToLL_M-50_TuneCUETP8M1_13TeV-amcatnloFXFX-pythia8', 'MC', 2008.4 * 3), 'DYJetsToLL_M-50_TuneCUETP8M1_13TeV-madgraphMLM-pythia8': ('DYJetsToLL_M-50_TuneCUETP8M1_13TeV-madgraphMLM-pythia8', 'MC', 2008.4 * 3), 'DYJetsToLL_Zpt-100to200_M-50_TuneCUETP8M1_13TeV-madgraphMLM-pythia8': ('DYJetsToLL_Zpt-100to200_M-50_TuneCUETP8M1_13TeV-madgraphMLM-pythia8', 'MC', 69.586), 'DYJetsToLL_Zpt-200toInf_M-50_TuneCUETP8M1_13TeV-madgraphMLM-pythia8': ('DYJetsToLL_Zpt-200toInf_M-50_TuneCUETP8M1_13TeV-madgraphMLM-pythia8', 'MC', 8.186), 'ZToMuMu_NNPDF30_13TeV-powheg_M_50_120': ('ZToMuMu_NNPDF30_13TeV-powheg_M_50_120', 'MC', 1975), 'ZToEE_NNPDF30_13TeV-powheg_M_50_120': ('ZToEE_NNPDF30_13TeV-powheg_M_50_120', 'MC', 1975), 'ZToMuMu_NNPDF30_13TeV-powheg_M_120_200': ('ZToMuMu_NNPDF30_13TeV-powheg_M_120_200', 'MC', 19.32), 'ZToEE_NNPDF30_13TeV-powheg_M_120_200': ('ZToEE_NNPDF30_13TeV-powheg_M_120_200', 'MC', 19.32), 'tZq_ll_4f_13TeV-amcatnlo-pythia8': ('tZq_ll_4f_13TeV-amcatnlo-pythia8', 'MC', 0.0758), 'tZq_nunu_4f_13TeV-amcatnlo-pythia8_TuneCUETP8M1': ('tZq_nunu_4f_13TeV-amcatnlo-pythia8_TuneCUETP8M1', 'MC', 0.1379), 'ZZTo2L2Nu_13TeV_powheg_pythia8': ('ZZTo2L2Nu_13TeV_powheg_pythia8', 'MC', 0.564), 'ZZTo2L2Q_13TeV_amcatnloFXFX_madspin_pythia8': ('ZZTo2L2Q_13TeV_amcatnloFXFX_madspin_pythia8', 'MC', 3.22 * 1.1), 'ZZTo4L_13TeV_powheg_pythia8': ('ZZTo4L_13TeV_powheg_pythia8', 'MC', 1.256), 'GluGluToContinToZZTo2e2mu_13TeV_MCFM701_pythia8': ('GluGluToContinToZZTo2e2mu_13TeV_MCFM701_pythia8', 'MC', 0.003194 * 2.3), 'GluGluToContinToZZTo2e2tau_13TeV_MCFM701_pythia8': ('GluGluToContinToZZTo2e2tau_13TeV_MCFM701_pythia8', 'MC', 0.003194 * 2.3), 'GluGluToContinToZZTo2mu2tau_13TeV_MCFM701_pythia8': ('GluGluToContinToZZTo2mu2tau_13TeV_MCFM701_pythia8', 'MC', 0.003194 * 2.3), 'GluGluToContinToZZTo4e_13TeV_MCFM701_pythia8': ('GluGluToContinToZZTo4e_13TeV_MCFM701_pythia8', 'MC', 0.001586 * 2.3), 'GluGluToContinToZZTo4mu_13TeV_MCFM701_pythia8': ('GluGluToContinToZZTo4mu_13TeV_MCFM701_pythia8', 'MC', 0.001586 * 2.3), 'GluGluToContinToZZTo4tau_13TeV_MCFM701_pythia8': ('GluGluToContinToZZTo4tau_13TeV_MCFM701_pythia8', 'MC', 0.001586 * 2.3), 'GluGluToContinToZZTo2e2nu_13TeV_MCFM701_pythia8': ('GluGluToContinToZZTo2e2nu_13TeV_MCFM701_pythia8', 'MC', 0.00172 * 2.3), 'GluGluToContinToZZTo2mu2nu_13TeV_MCFM701_pythia8': ('GluGluToContinToZZTo2mu2nu_13TeV_MCFM701_pythia8', 'MC', 0.00172 * 2.3), 'GluGluHToZZTo4L_M125_13TeV_powheg2_JHUgenV6_pythia8': ('GluGluHToZZTo4L_M125_13TeV_powheg2_JHUgenV6_pythia8', 'MC', 48.58 * 0.0264 * 0.101 * 0.101), 'VBF_HToZZTo4L_M125_13TeV_powheg2_JHUgenV6_pythia8': ('VBF_HToZZTo4L_M125_13TeV_powheg2_JHUgenV6_pythia8', 'MC', 3.782 * 0.0264 * 0.101 * 0.101), 'GluGluHToWWTo2L2Nu_M125_13TeV_powheg_JHUgen_pythia8': ('GluGluHToWWTo2L2Nu_M125_13TeV_powheg_JHUgen_pythia8', 'MC', 48.58 * 0.215 * 0.1086 * 0.1086 * 9), 'VBFHToWWTo2L2Nu_M125_13TeV_powheg_JHUgenv628_pythia8': ('VBFHToWWTo2L2Nu_M125_13TeV_powheg_JHUgenv628_pythia8', 'MC', 3.782 * 0.215 * 0.1086 * 0.1086 * 9), 'GluGluHToTauTau_M125_13TeV_powheg_pythia8': ('GluGluHToTauTau_M125_13TeV_powheg_pythia8', 'MC', 48.58 * 0.0632), 'VBFHToTauTau_M125_13TeV_powheg_pythia8': ('VBFHToTauTau_M125_13TeV_powheg_pythia8', 'MC', 3.782 * 0.0632), 'ttHToNonbb_M125_TuneCUETP8M2_ttHtranche3_13TeV-powheg-pythia8': ('ttHToNonbb_M125_TuneCUETP8M2_ttHtranche3_13TeV-powheg-pythia8', 'MC', 0.5071 * (1 - 0.577)), 'VHToNonbb_M125_13TeV_amcatnloFXFX_madspin_pythia8': ('VHToNonbb_M125_13TeV_amcatnloFXFX_madspin_pythia8', 'MC', (0.8839 + 0.84 + 0.5328) * (1 - 0.577)), 'WWW_4F_TuneCUETP8M1_13TeV-amcatnlo-pythia8': ('WWW_4F_TuneCUETP8M1_13TeV-amcatnlo-pythia8', 'MC', 0.2086), 'WWZ_TuneCUETP8M1_13TeV-amcatnlo-pythia8': ('WWZ_TuneCUETP8M1_13TeV-amcatnlo-pythia8', 'MC', 0.1651), 'WZZ_TuneCUETP8M1_13TeV-amcatnlo-pythia8': ('WZZ_TuneCUETP8M1_13TeV-amcatnlo-pythia8', 'MC', 0.05565), 'ZZZ_TuneCUETP8M1_13TeV-amcatnlo-pythia8': ('ZZZ_TuneCUETP8M1_13TeV-amcatnlo-pythia8', 'MC', 0.01398), 'WWG_TuneCUETP8M1_13TeV-amcatnlo-pythia8': ('WWG_TuneCUETP8M1_13TeV-amcatnlo-pythia8', 'MC', 0.2147), 'WZTo1L1Nu2Q_13TeV_amcatnloFXFX_madspin_pythia8': ('WZTo1L1Nu2Q_13TeV_amcatnloFXFX_madspin_pythia8', 'MC', 10.71 * 1.109), 'WZTo1L3Nu_13TeV_amcatnloFXFX_madspin_pythia8': ('WZTo1L3Nu_13TeV_amcatnloFXFX_madspin_pythia8', 'MC', 3.033 * 1.109), 'WZTo2L2Q_13TeV_amcatnloFXFX_madspin_pythia8': ('WZTo2L2Q_13TeV_amcatnloFXFX_madspin_pythia8', 'MC', 5.595 * 1.109), 'WZTo3LNu_TuneCUETP8M1_13TeV-powheg-pythia8': ('WZTo3LNu_TuneCUETP8M1_13TeV-powheg-pythia8', 'MC', 4.42965 * 1.109), 'WWTo2L2Nu_13TeV-powheg': ('WWTo2L2Nu_13TeV-powheg', 'MC', (118.7 - 3.974) * 0.1086 * 0.1086 * 9), 'WWTo2L2Nu_DoubleScattering_13TeV-pythia8': ('WWTo2L2Nu_DoubleScattering_13TeV-pythia8', 'MC', 0.1729), 'GluGluWWTo2L2Nu_MCFM_13TeV': ('GluGluWWTo2L2Nu_MCFM_13TeV', 'MC', 3.974 * 0.1086 * 0.1086 * 9 * 1.4), 'WpWpJJ_EWK-QCD_TuneCUETP8M1_13TeV-madgraph-pythia8': ('WpWpJJ_EWK-QCD_TuneCUETP8M1_13TeV-madgraph-pythia8', 'MC', 0.053898), 'WpWpJJ_EWK_TuneCUETP8M1_13TeV-madgraph-pythia8': ('WpWpJJ_EWK_TuneCUETP8M1_13TeV-madgraph-pythia8', 'MC', 0.0269642), 'WpWpJJ_QCD_TuneCUETP8M1_13TeV-madgraph-pythia8': ('WpWpJJ_QCD_TuneCUETP8M1_13TeV-madgraph-pythia8', 'MC', 0.0261515), 'TTGJets_TuneCUETP8M1_13TeV-amcatnloFXFX-madspin-pythia8': ('TTGJets_TuneCUETP8M1_13TeV-amcatnloFXFX-madspin-pythia8', 'MC', 1.444 * 3.2), 'TTZToLLNuNu_M-10_TuneCUETP8M1_13TeV-amcatnlo-pythia8': ('TTZToLLNuNu_M-10_TuneCUETP8M1_13TeV-amcatnlo-pythia8', 'MC', 0.2529), 'TTZToQQ_TuneCUETP8M1_13TeV-amcatnlo-pythia8': ('TTZToQQ_TuneCUETP8M1_13TeV-amcatnlo-pythia8', 'MC', 0.5297), 'TTWJetsToLNu_TuneCUETP8M1_13TeV-amcatnloFXFX-madspin-pythia8': ('TTWJetsToLNu_TuneCUETP8M1_13TeV-amcatnloFXFX-madspin-pythia8', 'MC', 0.2043), 'TTWJetsToQQ_TuneCUETP8M1_13TeV-amcatnloFXFX-madspin-pythia8': ('TTWJetsToQQ_TuneCUETP8M1_13TeV-amcatnloFXFX-madspin-pythia8', 'MC', 0.4062), 'TTTo2L2Nu_TuneCUETP8M2_ttHtranche3_13TeV-powheg-pythia8': ('TTTo2L2Nu_TuneCUETP8M2_ttHtranche3_13TeV-powheg-pythia8', 'MC', 831.76 * 0.1086 * 0.1086 * 9), 'ST_tW_antitop_5f_inclusiveDecays_13TeV-powheg-pythia8_TuneCUETP8M1': ('ST_tW_antitop_5f_inclusiveDecays_13TeV-powheg-pythia8_TuneCUETP8M1', 'MC', 35.6), 'ST_tW_top_5f_inclusiveDecays_13TeV-powheg-pythia8_TuneCUETP8M1': ('ST_tW_top_5f_inclusiveDecays_13TeV-powheg-pythia8_TuneCUETP8M1', 'MC', 35.6), 'WGstarToLNuEE_012Jets_13TeV-madgraph': ('WGstarToLNuEE_012Jets_13TeV-madgraph', 'MC', 3.526), 'WGstarToLNuMuMu_012Jets_13TeV-madgraph': ('WGstarToLNuMuMu_012Jets_13TeV-madgraph', 'MC', 2.793), 'WGToLNuG_TuneCUETP8M1_13TeV-madgraphMLM-pythia8': ('WGToLNuG_TuneCUETP8M1_13TeV-madgraphMLM-pythia8', 'MC', 489.0), 'ZGTo2LG_TuneCUETP8M1_13TeV-amcatnloFXFX-pythia8': ('ZGTo2LG_TuneCUETP8M1_13TeV-amcatnloFXFX-pythia8', 'MC', 123.9 * 1.06), 'TT_TuneCUETP8M2T4_13TeV-powheg-pythia8': ('TT_TuneCUETP8M2T4_13TeV-powheg-pythia8', 'MC', 831.76), 'WJetsToLNu_TuneCUETP8M1_13TeV-amcatnloFXFX-pythia8': ('WJetsToLNu_TuneCUETP8M1_13TeV-amcatnloFXFX-pythia8', 'MC', 20508.9 * 3), 'DarkPhoton_ZH_powheg_M-125': ('DarkPhoton_ZH_powheg_M-125', 'MC', 0.8839 * 0.101 * 0.1)}
src = ['board.c'] component = aos_board_component('board_mk3060', 'moc108', src) aos_global_config.add_ld_files('memory.ld.S') supported_targets="helloworld linuxapp meshapp uDataapp networkapp linkkitapp" build_types="release"
src = ['board.c'] component = aos_board_component('board_mk3060', 'moc108', src) aos_global_config.add_ld_files('memory.ld.S') supported_targets = 'helloworld linuxapp meshapp uDataapp networkapp linkkitapp' build_types = 'release'
#!/usr/bin/env python3 no_c = __import__('5-no_c').no_c print(no_c("a software development program")) print(no_c("Chicago")) print(no_c("C is fun!"))
no_c = __import__('5-no_c').no_c print(no_c('a software development program')) print(no_c('Chicago')) print(no_c('C is fun!'))
{ 7 : { "operator" : "join", "multimatch" : False, }, 9 : { "operator" : "selection", "selectivity" : 0.5 }, 10 : { "operator" : "join", "multimatch" : False, "selectivity" : 0.04 }, 12 : { "operator" : "selection", "selectivity" : 0.48 }, 13 : { "operator" : "join", "multimatch" : True, "selectivity" : 0.09 }, 3 : { "operator" : "selection", "selectivity" : 0.5 }, 14 : { "operator" : "antijoin", "selectivity" : 0.02, "htSizeFactor" : 1.0, "multimatch" : True }, 15 : { "operator" : "semijoin", "selectivity" : 0.02, "htSizeFactor" : 0.5, "multimatch" : True } }
{7: {'operator': 'join', 'multimatch': False}, 9: {'operator': 'selection', 'selectivity': 0.5}, 10: {'operator': 'join', 'multimatch': False, 'selectivity': 0.04}, 12: {'operator': 'selection', 'selectivity': 0.48}, 13: {'operator': 'join', 'multimatch': True, 'selectivity': 0.09}, 3: {'operator': 'selection', 'selectivity': 0.5}, 14: {'operator': 'antijoin', 'selectivity': 0.02, 'htSizeFactor': 1.0, 'multimatch': True}, 15: {'operator': 'semijoin', 'selectivity': 0.02, 'htSizeFactor': 0.5, 'multimatch': True}}
class Solution: # @param num, a list of integer # @return an integer def findPeakElement(self, num): left = 0 right = len(num) - 1 while left <= right: mid = (left + right) / 2 if not mid: leftValue = num[mid] - 1 else: leftValue = num[mid - 1] if mid + 1 == len(num): rightValue = num[mid] + 1 else: rightValue = num[mid + 1] if num[mid] > leftValue and num[mid] > rightValue: return mid if num[mid] > leftValue: left = mid + 1 else: right = mid - 1 return mid
class Solution: def find_peak_element(self, num): left = 0 right = len(num) - 1 while left <= right: mid = (left + right) / 2 if not mid: left_value = num[mid] - 1 else: left_value = num[mid - 1] if mid + 1 == len(num): right_value = num[mid] + 1 else: right_value = num[mid + 1] if num[mid] > leftValue and num[mid] > rightValue: return mid if num[mid] > leftValue: left = mid + 1 else: right = mid - 1 return mid
#========================================================================== # this choice mechanism is obviously stupid, but it's here to remind us # that this is intended as a source of platform-specific data, and so we # should be making changes to a specific platform's section, rather than # just adding code all willy-nilly TARGET_PLATFORM = 'ironpython' SOURCE_PLATFORM = 'win32' #========================================================================== if TARGET_PLATFORM == 'ironpython' and SOURCE_PLATFORM == 'win32': # ictype code | actual target platform type ICTYPE_2_MGDTYPE = { 'obj': 'object', 'ptr': 'IntPtr', 'str': 'string', 'void': 'void', 'char': 'byte', 'int': 'int', 'uint': 'uint', 'long': 'int', 'ulong': 'uint', 'llong': 'long', 'ullong': 'ulong', 'size': 'uint', 'ssize': 'int', 'double': 'double', 'cpx': 'Py_complex', } #==========================================================================
target_platform = 'ironpython' source_platform = 'win32' if TARGET_PLATFORM == 'ironpython' and SOURCE_PLATFORM == 'win32': ictype_2_mgdtype = {'obj': 'object', 'ptr': 'IntPtr', 'str': 'string', 'void': 'void', 'char': 'byte', 'int': 'int', 'uint': 'uint', 'long': 'int', 'ulong': 'uint', 'llong': 'long', 'ullong': 'ulong', 'size': 'uint', 'ssize': 'int', 'double': 'double', 'cpx': 'Py_complex'}
ten_things = "Apples Oranges Crows Telephone Light Sugar" print("Wait there are not 10 things in that list. Let's fix that.") stuff = ten_things.split(' ') more_stuff = ["Day", "Night", "Song", "Frisbee", "Corn", "Banana", "Girl", "Boy"] while len(stuff) != 10: next_one = more_stuff.pop() print("Adding: ", next_one) stuff.append(next_one) print(f"There are {len(stuff)} items now.") print("There we go: ", stuff) print("Let's do some things with stuff.") print(stuff[1]) print(stuff[-1]) # whoa! fancy print(stuff.pop()) print(' '.join(stuff)) # what? cool! print('#'.join(stuff[3:5])) # super stellar!
ten_things = 'Apples Oranges Crows Telephone Light Sugar' print("Wait there are not 10 things in that list. Let's fix that.") stuff = ten_things.split(' ') more_stuff = ['Day', 'Night', 'Song', 'Frisbee', 'Corn', 'Banana', 'Girl', 'Boy'] while len(stuff) != 10: next_one = more_stuff.pop() print('Adding: ', next_one) stuff.append(next_one) print(f'There are {len(stuff)} items now.') print('There we go: ', stuff) print("Let's do some things with stuff.") print(stuff[1]) print(stuff[-1]) print(stuff.pop()) print(' '.join(stuff)) print('#'.join(stuff[3:5]))
def playerIcons(poi): if poi['id'] == 'Player': poi['icon'] = "https://overviewer.org/avatar/%s" % poi['EntityId'] return "Last known location for %s" % poi['EntityId'] def signFilter(poi): if poi['id'] == 'Sign' or poi['id'] == 'minecraft:sign': if poi['Text4'] == '-- RENDER --': return "\n".join([poi['Text1'], poi['Text2'], poi['Text3']]) worlds['minecraft'] = "/home/minecraft/server/world" outputdir = "/home/minecraft/render/" markers = [ dict(name="Players", filterFunction=playerIcons), dict(name="Signs", filterFunction=signFilter) ] renders['day'] = { 'world': 'minecraft', 'title': 'Day', 'rendermode': 'smooth_lighting', 'dimension': 'overworld', 'markers': markers } renders['night'] = { 'world': 'minecraft', 'title': 'Night', 'rendermode': 'smooth_night', 'dimension': 'overworld', 'markers': markers } renders['cave'] = { 'world': 'minecraft', 'title': 'Cave', 'rendermode': 'cave', 'dimension': 'overworld', 'markers': markers } renders['nether'] = { 'world': 'minecraft', 'title': 'Nether', 'rendermode': 'nether_smooth_lighting', 'dimension': 'nether', 'markers': markers } renders['ender'] = { 'world': 'minecraft', 'title': 'Ender', 'rendermode': 'smooth_lighting', 'dimension': 'end', 'markers': markers }
def player_icons(poi): if poi['id'] == 'Player': poi['icon'] = 'https://overviewer.org/avatar/%s' % poi['EntityId'] return 'Last known location for %s' % poi['EntityId'] def sign_filter(poi): if poi['id'] == 'Sign' or poi['id'] == 'minecraft:sign': if poi['Text4'] == '-- RENDER --': return '\n'.join([poi['Text1'], poi['Text2'], poi['Text3']]) worlds['minecraft'] = '/home/minecraft/server/world' outputdir = '/home/minecraft/render/' markers = [dict(name='Players', filterFunction=playerIcons), dict(name='Signs', filterFunction=signFilter)] renders['day'] = {'world': 'minecraft', 'title': 'Day', 'rendermode': 'smooth_lighting', 'dimension': 'overworld', 'markers': markers} renders['night'] = {'world': 'minecraft', 'title': 'Night', 'rendermode': 'smooth_night', 'dimension': 'overworld', 'markers': markers} renders['cave'] = {'world': 'minecraft', 'title': 'Cave', 'rendermode': 'cave', 'dimension': 'overworld', 'markers': markers} renders['nether'] = {'world': 'minecraft', 'title': 'Nether', 'rendermode': 'nether_smooth_lighting', 'dimension': 'nether', 'markers': markers} renders['ender'] = {'world': 'minecraft', 'title': 'Ender', 'rendermode': 'smooth_lighting', 'dimension': 'end', 'markers': markers}
def str_to_int(s): ctr = i = 0 for c in reversed(s): i += (ord(c) - 48) * (10 ** ctr) ctr += 1 return i print() for s in ('0', '1', '2', '3', '12', '123', '234', '456', '567'): i = str_to_int(s) print("s = {}, i = {} |".format(s, i), end=' ') print() print() for i in range(50): s = str(i) j = str_to_int(s) print("s = {}, j = {} |".format(s, j), end=' ')
def str_to_int(s): ctr = i = 0 for c in reversed(s): i += (ord(c) - 48) * 10 ** ctr ctr += 1 return i print() for s in ('0', '1', '2', '3', '12', '123', '234', '456', '567'): i = str_to_int(s) print('s = {}, i = {} |'.format(s, i), end=' ') print() print() for i in range(50): s = str(i) j = str_to_int(s) print('s = {}, j = {} |'.format(s, j), end=' ')
# animals = ["Gully", "Rhubarb", "Zephyr", "Henry"] # for animal in enumerate(animals): # creates a list of Tuples # print(animal) # (0, 'Gully') # # (1, 'Rhubarb') # # (2, 'Zephyr') # # (3, 'Henry') # animals = ["Gully", "Rhubarb", "Zephyr", "Henry"] # for index, animal in enumerate(animals): # print(animal) # Gully # # Rhubarb # # Zephyr # # Henry # animals = ["Gully", "Rhubarb", "Zephyr", "Henry"] # for index, animal in enumerate(animals): # print(index, animal) # 0 Gully # # 1 Rhubarb # # 2 Zephyr # # 3 Henry # animals = ["Gully", "Rhubarb", "Zephyr", "Henry"] # for index, animal in enumerate(animals): # if index % 2 == 0: # continue # print(index, animal) # 1 Rhubarb # # 3 Henry animals = ["Gully", "Rhubarb", "Zephyr", "Henry"] for index, animal in enumerate(animals): # if index % 2 == 0: # continue print(f"{index}.\t {animal}") # 0. Gully # 1. Rhubarb # 2. Zephyr # 3. Henry
animals = ['Gully', 'Rhubarb', 'Zephyr', 'Henry'] for (index, animal) in enumerate(animals): print(f'{index}.\t {animal}')
def lines(file): for line in file: yield line yield "\n" def blocks(file): block = [] for line in lines(file): if line.strip(): block.append(line) elif block: yield "".join(block).strip() block = []
def lines(file): for line in file: yield line yield '\n' def blocks(file): block = [] for line in lines(file): if line.strip(): block.append(line) elif block: yield ''.join(block).strip() block = []
# coding: utf-8 cry_names = [ 'Nidoran_M', 'Nidoran_F', 'Slowpoke', 'Kangaskhan', 'Charmander', 'Grimer', 'Voltorb', 'Muk', 'Oddish', 'Raichu', 'Nidoqueen', 'Diglett', 'Seel', 'Drowzee', 'Pidgey', 'Bulbasaur', 'Spearow', 'Rhydon', 'Golem', 'Blastoise', 'Pidgeotto', 'Weedle', 'Caterpie', 'Ekans', 'Fearow', 'Clefairy', 'Venonat', 'Lapras', 'Metapod', 'Squirtle', 'Paras', 'Growlithe', 'Krabby', 'Psyduck', 'Rattata', 'Vileplume', 'Vulpix', 'Weepinbell', 'Marill', 'Spinarak', 'Togepi', 'Girafarig', 'Raikou', 'Mareep', 'Togetic', 'Hoothoot', 'Sentret', 'Slowking', 'Cyndaquil', 'Chikorita', 'Totodile', 'Gligar', 'Cleffa', 'Slugma', 'Ledyba', 'Entei', 'Wooper', 'Mantine', 'Typhlosion', 'Natu', 'Teddiursa', 'Sunflora', 'Ampharos', 'Magcargo', 'Pichu', 'Aipom', 'Dunsparce', 'Donphan', ]
cry_names = ['Nidoran_M', 'Nidoran_F', 'Slowpoke', 'Kangaskhan', 'Charmander', 'Grimer', 'Voltorb', 'Muk', 'Oddish', 'Raichu', 'Nidoqueen', 'Diglett', 'Seel', 'Drowzee', 'Pidgey', 'Bulbasaur', 'Spearow', 'Rhydon', 'Golem', 'Blastoise', 'Pidgeotto', 'Weedle', 'Caterpie', 'Ekans', 'Fearow', 'Clefairy', 'Venonat', 'Lapras', 'Metapod', 'Squirtle', 'Paras', 'Growlithe', 'Krabby', 'Psyduck', 'Rattata', 'Vileplume', 'Vulpix', 'Weepinbell', 'Marill', 'Spinarak', 'Togepi', 'Girafarig', 'Raikou', 'Mareep', 'Togetic', 'Hoothoot', 'Sentret', 'Slowking', 'Cyndaquil', 'Chikorita', 'Totodile', 'Gligar', 'Cleffa', 'Slugma', 'Ledyba', 'Entei', 'Wooper', 'Mantine', 'Typhlosion', 'Natu', 'Teddiursa', 'Sunflora', 'Ampharos', 'Magcargo', 'Pichu', 'Aipom', 'Dunsparce', 'Donphan']
a = [] b = [] for m in range(101): a.append(300 - m * 100) for n in range(101): b.append(a[n] + 200) c = 0 for a in b: if a < 0: c += 1 print(c)
a = [] b = [] for m in range(101): a.append(300 - m * 100) for n in range(101): b.append(a[n] + 200) c = 0 for a in b: if a < 0: c += 1 print(c)
def translate_table(line, suite_pos): fields = line.split("|") suite_name = fields[suite_pos] fields = suite_name.split("_") other = [] if fields[0] == "ade": template = "thereis" if fields[1] == "same": strategy = "ADE-SI" if fields[-1] == "tisce": other.append("sce") if fields[-1] == "ticat": other.append("cat") elif fields[1] == "diff": if fields[2] == "cat": strategy = "ADE-DC" else: strategy = "ADE-SC" if fields[-1] == "tisce": other.append("sce") if fields[-1] == "ticat": other.append("cat") if fields[1] == "tfidf" or fields[1] == "freq": s = fields[1][0].capitalize() + fields[1][1:] if fields[3] == "category": strategy = s + "-Cat" elif fields[3] == "scene": strategy = s + "-Sce" elif fields[3] == "obj": strategy = s + "-Obj" if strategy.endswith("Obj"): if len(fields) > 4 and fields[4] == "sce": other.append("sce") else: other.append("cat") elif strategy.endswith("Sce"): if "ticat" in suite_name: other.append("cat") else: other.append("sce") elif strategy.endswith("Cat"): other.append("cat") if "no_occ" in suite_name: other.append("no-occ") if "no-occ" in suite_name: other.append("no-occ") if fields[0] == "cxc": if fields[1] == "qa": template = "QA" elif fields[1] == "attr": template = "Obj-attr" elif fields[1] == "rel": template = "Rel-obj" elif fields[1] == "cap": template = "Cap-adj" elif fields[1] == "obj": template = "Obj-list" if not "wide" in suite_name: if "similar" in suite_name: strategy = "CXC-sim" elif "same" in suite_name: strategy = "CXC-same" elif "dissim" in suite_name: strategy = "CXC-dis" else: if "similar" in suite_name: strategy = "CXC-v-sim" elif "dissim" in suite_name: strategy = "CXC-v-dis" if "distant_words" in suite_name: strategy = "VS" if fields[-1] == "cap": other.append("+cap") if fields[0] == "cap": template = "cap-pair" if not "wide" in suite_name: if "dissim" in suite_name: strategy = "CXC-dis" elif "sim_img" in suite_name: strategy = "CXC-sim" elif "same" in suite_name: strategy = "CXC-same" else: if "dissim" in suite_name: strategy = "CXC-v-dis" elif "sim_img" in suite_name: strategy = "CXC-v-sim" if "cxc_sim" in suite_name: if "low" in suite_name: other.append("cxc-low") elif "high" in suite_name: other.append("cxc-high") elif "jacc_sim" in suite_name: if "low" in suite_name: other.append("jacc-low") elif "high" in suite_name: other.append("jacc-high") other = " ".join(other) return [template, strategy, other]
def translate_table(line, suite_pos): fields = line.split('|') suite_name = fields[suite_pos] fields = suite_name.split('_') other = [] if fields[0] == 'ade': template = 'thereis' if fields[1] == 'same': strategy = 'ADE-SI' if fields[-1] == 'tisce': other.append('sce') if fields[-1] == 'ticat': other.append('cat') elif fields[1] == 'diff': if fields[2] == 'cat': strategy = 'ADE-DC' else: strategy = 'ADE-SC' if fields[-1] == 'tisce': other.append('sce') if fields[-1] == 'ticat': other.append('cat') if fields[1] == 'tfidf' or fields[1] == 'freq': s = fields[1][0].capitalize() + fields[1][1:] if fields[3] == 'category': strategy = s + '-Cat' elif fields[3] == 'scene': strategy = s + '-Sce' elif fields[3] == 'obj': strategy = s + '-Obj' if strategy.endswith('Obj'): if len(fields) > 4 and fields[4] == 'sce': other.append('sce') else: other.append('cat') elif strategy.endswith('Sce'): if 'ticat' in suite_name: other.append('cat') else: other.append('sce') elif strategy.endswith('Cat'): other.append('cat') if 'no_occ' in suite_name: other.append('no-occ') if 'no-occ' in suite_name: other.append('no-occ') if fields[0] == 'cxc': if fields[1] == 'qa': template = 'QA' elif fields[1] == 'attr': template = 'Obj-attr' elif fields[1] == 'rel': template = 'Rel-obj' elif fields[1] == 'cap': template = 'Cap-adj' elif fields[1] == 'obj': template = 'Obj-list' if not 'wide' in suite_name: if 'similar' in suite_name: strategy = 'CXC-sim' elif 'same' in suite_name: strategy = 'CXC-same' elif 'dissim' in suite_name: strategy = 'CXC-dis' elif 'similar' in suite_name: strategy = 'CXC-v-sim' elif 'dissim' in suite_name: strategy = 'CXC-v-dis' if 'distant_words' in suite_name: strategy = 'VS' if fields[-1] == 'cap': other.append('+cap') if fields[0] == 'cap': template = 'cap-pair' if not 'wide' in suite_name: if 'dissim' in suite_name: strategy = 'CXC-dis' elif 'sim_img' in suite_name: strategy = 'CXC-sim' elif 'same' in suite_name: strategy = 'CXC-same' elif 'dissim' in suite_name: strategy = 'CXC-v-dis' elif 'sim_img' in suite_name: strategy = 'CXC-v-sim' if 'cxc_sim' in suite_name: if 'low' in suite_name: other.append('cxc-low') elif 'high' in suite_name: other.append('cxc-high') elif 'jacc_sim' in suite_name: if 'low' in suite_name: other.append('jacc-low') elif 'high' in suite_name: other.append('jacc-high') other = ' '.join(other) return [template, strategy, other]
firstStep = "1-1" print(firstStep) row = 1 column = 1 column += 1 while True: answer = int(input()) if column > 10: row += 1 column = 1 response = str(row) + "-" + str(column) column += 1 print(response)
first_step = '1-1' print(firstStep) row = 1 column = 1 column += 1 while True: answer = int(input()) if column > 10: row += 1 column = 1 response = str(row) + '-' + str(column) column += 1 print(response)
class node: def __init__(self, data): self.data = data self.next = None class linkedList: def __init__(self): self.head = None def printList(self): temp = self.head while (temp): print(temp.data, end=' ') temp = temp.next if __name__ == '__main__': llist = linkedList() llist.head = node(1) llist.head.next = node(2) llist.head.next.next = node(3) llist.printList()
class Node: def __init__(self, data): self.data = data self.next = None class Linkedlist: def __init__(self): self.head = None def print_list(self): temp = self.head while temp: print(temp.data, end=' ') temp = temp.next if __name__ == '__main__': llist = linked_list() llist.head = node(1) llist.head.next = node(2) llist.head.next.next = node(3) llist.printList()
class Solution: def minMoves2(self, nums: List[int]) -> int: temp = [] nums.sort() medile_p = len(nums) // 2 medile_num = nums[medile_p] nums.remove(medile_num) for i in nums: if medile_num >= i: step = medile_num - i temp.append(step) else: step = i - medile_num temp.append(step) return sum(temp)
class Solution: def min_moves2(self, nums: List[int]) -> int: temp = [] nums.sort() medile_p = len(nums) // 2 medile_num = nums[medile_p] nums.remove(medile_num) for i in nums: if medile_num >= i: step = medile_num - i temp.append(step) else: step = i - medile_num temp.append(step) return sum(temp)
class Sms: def __init__(self, number: str, message: str) -> None: self.to_phone = number self.message_body = message def get(self) -> dict: return { "to_phone": self.to_phone, "message_body": self.message_body, }
class Sms: def __init__(self, number: str, message: str) -> None: self.to_phone = number self.message_body = message def get(self) -> dict: return {'to_phone': self.to_phone, 'message_body': self.message_body}
files_c=[ 'C/7zBuf2.c', 'C/7zCrc.c', 'C/7zCrcOpt.c', 'C/7zStream.c', 'C/Aes.c', 'C/Alloc.c', 'C/Bcj2.c', 'C/Bcj2Enc.c', 'C/Blake2s.c', 'C/Bra.c', 'C/Bra86.c', 'C/BraIA64.c', 'C/BwtSort.c', 'C/CpuArch.c', 'C/Delta.c', 'C/HuffEnc.c', 'C/LzFind.c', 'C/LzFindMt.c', 'C/Lzma2Dec.c', 'C/Lzma2Enc.c', 'C/LzmaDec.c', 'C/LzmaEnc.c', 'C/MtCoder.c', 'C/Ppmd7.c', 'C/Ppmd7Dec.c', 'C/Ppmd7Enc.c', 'C/Ppmd8.c', 'C/Ppmd8Dec.c', 'C/Ppmd8Enc.c', 'C/Sha1.c', 'C/Sha256.c', 'C/Sort.c', 'C/Threads.c', 'C/Xz.c', 'C/XzCrc64.c', 'C/XzCrc64Opt.c', 'C/XzDec.c', 'C/XzEnc.c', 'C/XzIn.c', ] files_cpp=[ 'CPP/7zip/Archive/7z/7zCompressionMode.cpp', 'CPP/7zip/Archive/7z/7zDecode.cpp', 'CPP/7zip/Archive/7z/7zEncode.cpp', 'CPP/7zip/Archive/7z/7zExtract.cpp', 'CPP/7zip/Archive/7z/7zFolderInStream.cpp', 'CPP/7zip/Archive/7z/7zHandler.cpp', 'CPP/7zip/Archive/7z/7zHandlerOut.cpp', 'CPP/7zip/Archive/7z/7zHeader.cpp', 'CPP/7zip/Archive/7z/7zIn.cpp', 'CPP/7zip/Archive/7z/7zOut.cpp', 'CPP/7zip/Archive/7z/7zProperties.cpp', 'CPP/7zip/Archive/7z/7zRegister.cpp', 'CPP/7zip/Archive/7z/7zSpecStream.cpp', 'CPP/7zip/Archive/7z/7zUpdate.cpp', 'CPP/7zip/Archive/ApmHandler.cpp', 'CPP/7zip/Archive/ArHandler.cpp', 'CPP/7zip/Archive/ArchiveExports.cpp', 'CPP/7zip/Archive/ArjHandler.cpp', 'CPP/7zip/Archive/Bz2Handler.cpp', 'CPP/7zip/Archive/Cab/CabBlockInStream.cpp', 'CPP/7zip/Archive/Cab/CabHandler.cpp', 'CPP/7zip/Archive/Cab/CabHeader.cpp', 'CPP/7zip/Archive/Cab/CabIn.cpp', 'CPP/7zip/Archive/Cab/CabRegister.cpp', 'CPP/7zip/Archive/Chm/ChmHandler.cpp', 'CPP/7zip/Archive/Chm/ChmIn.cpp', 'CPP/7zip/Archive/ComHandler.cpp', 'CPP/7zip/Archive/Common/CoderMixer2.cpp', 'CPP/7zip/Archive/Common/DummyOutStream.cpp', 'CPP/7zip/Archive/Common/FindSignature.cpp', 'CPP/7zip/Archive/Common/HandlerOut.cpp', 'CPP/7zip/Archive/Common/InStreamWithCRC.cpp', 'CPP/7zip/Archive/Common/ItemNameUtils.cpp', 'CPP/7zip/Archive/Common/MultiStream.cpp', 'CPP/7zip/Archive/Common/OutStreamWithCRC.cpp', 'CPP/7zip/Archive/Common/OutStreamWithSha1.cpp', 'CPP/7zip/Archive/Common/ParseProperties.cpp', 'CPP/7zip/Archive/CpioHandler.cpp', 'CPP/7zip/Archive/CramfsHandler.cpp', 'CPP/7zip/Archive/DeflateProps.cpp', 'CPP/7zip/Archive/DllExports2.cpp', 'CPP/7zip/Archive/DmgHandler.cpp', 'CPP/7zip/Archive/ElfHandler.cpp', 'CPP/7zip/Archive/ExtHandler.cpp', 'CPP/7zip/Archive/FatHandler.cpp', 'CPP/7zip/Archive/FlvHandler.cpp', 'CPP/7zip/Archive/GzHandler.cpp', 'CPP/7zip/Archive/GptHandler.cpp', 'CPP/7zip/Archive/HandlerCont.cpp', 'CPP/7zip/Archive/HfsHandler.cpp', 'CPP/7zip/Archive/IhexHandler.cpp', 'CPP/7zip/Archive/Iso/IsoHandler.cpp', 'CPP/7zip/Archive/Iso/IsoHeader.cpp', 'CPP/7zip/Archive/Iso/IsoIn.cpp', 'CPP/7zip/Archive/Iso/IsoRegister.cpp', 'CPP/7zip/Archive/LzhHandler.cpp', 'CPP/7zip/Archive/LzmaHandler.cpp', 'CPP/7zip/Archive/MachoHandler.cpp', 'CPP/7zip/Archive/MbrHandler.cpp', 'CPP/7zip/Archive/MslzHandler.cpp', 'CPP/7zip/Archive/MubHandler.cpp', 'CPP/7zip/Archive/Nsis/NsisDecode.cpp', 'CPP/7zip/Archive/Nsis/NsisHandler.cpp', 'CPP/7zip/Archive/Nsis/NsisIn.cpp', 'CPP/7zip/Archive/Nsis/NsisRegister.cpp', 'CPP/7zip/Archive/NtfsHandler.cpp', 'CPP/7zip/Archive/PeHandler.cpp', 'CPP/7zip/Archive/PpmdHandler.cpp', 'CPP/7zip/Archive/QcowHandler.cpp', 'CPP/7zip/Archive/Rar/RarHandler.cpp', 'CPP/7zip/Archive/Rar/Rar5Handler.cpp', 'CPP/7zip/Archive/RpmHandler.cpp', 'CPP/7zip/Archive/SplitHandler.cpp', 'CPP/7zip/Archive/SquashfsHandler.cpp', 'CPP/7zip/Archive/SwfHandler.cpp', 'CPP/7zip/Archive/Tar/TarHandler.cpp', 'CPP/7zip/Archive/Tar/TarHandlerOut.cpp', 'CPP/7zip/Archive/Tar/TarHeader.cpp', 'CPP/7zip/Archive/Tar/TarIn.cpp', 'CPP/7zip/Archive/Tar/TarOut.cpp', 'CPP/7zip/Archive/Tar/TarRegister.cpp', 'CPP/7zip/Archive/Tar/TarUpdate.cpp', 'CPP/7zip/Archive/Udf/UdfHandler.cpp', 'CPP/7zip/Archive/Udf/UdfIn.cpp', 'CPP/7zip/Archive/UefiHandler.cpp', 'CPP/7zip/Archive/VdiHandler.cpp', 'CPP/7zip/Archive/VhdHandler.cpp', 'CPP/7zip/Archive/VmdkHandler.cpp', 'CPP/7zip/Archive/Wim/WimHandler.cpp', 'CPP/7zip/Archive/Wim/WimHandlerOut.cpp', 'CPP/7zip/Archive/Wim/WimIn.cpp', 'CPP/7zip/Archive/Wim/WimRegister.cpp', 'CPP/7zip/Archive/XarHandler.cpp', 'CPP/7zip/Archive/XzHandler.cpp', 'CPP/7zip/Archive/ZHandler.cpp', 'CPP/7zip/Archive/Zip/ZipAddCommon.cpp', 'CPP/7zip/Archive/Zip/ZipHandler.cpp', 'CPP/7zip/Archive/Zip/ZipHandlerOut.cpp', 'CPP/7zip/Archive/Zip/ZipIn.cpp', 'CPP/7zip/Archive/Zip/ZipItem.cpp', 'CPP/7zip/Archive/Zip/ZipOut.cpp', 'CPP/7zip/Archive/Zip/ZipRegister.cpp', 'CPP/7zip/Archive/Zip/ZipUpdate.cpp', 'CPP/7zip/Common/CWrappers.cpp', 'CPP/7zip/Common/CreateCoder.cpp', 'CPP/7zip/Common/FilterCoder.cpp', 'CPP/7zip/Common/InBuffer.cpp', 'CPP/7zip/Common/InOutTempBuffer.cpp', 'CPP/7zip/Common/LimitedStreams.cpp', 'CPP/7zip/Common/MemBlocks.cpp', 'CPP/7zip/Common/MethodId.cpp', 'CPP/7zip/Common/MethodProps.cpp', 'CPP/7zip/Common/OffsetStream.cpp', 'CPP/7zip/Common/OutBuffer.cpp', 'CPP/7zip/Common/OutMemStream.cpp', 'CPP/7zip/Common/ProgressMt.cpp', 'CPP/7zip/Common/ProgressUtils.cpp', 'CPP/7zip/Common/PropId.cpp', 'CPP/7zip/Common/StreamBinder.cpp', 'CPP/7zip/Common/StreamObjects.cpp', 'CPP/7zip/Common/StreamUtils.cpp', 'CPP/7zip/Common/UniqBlocks.cpp', 'CPP/7zip/Common/VirtThread.cpp', 'CPP/7zip/Compress/BZip2Crc.cpp', 'CPP/7zip/Compress/BZip2Decoder.cpp', 'CPP/7zip/Compress/BZip2Encoder.cpp', 'CPP/7zip/Compress/BZip2Register.cpp', 'CPP/7zip/Compress/Bcj2Coder.cpp', 'CPP/7zip/Compress/Bcj2Register.cpp', 'CPP/7zip/Compress/BcjCoder.cpp', 'CPP/7zip/Compress/BcjRegister.cpp', 'CPP/7zip/Compress/BitlDecoder.cpp', 'CPP/7zip/Compress/BranchMisc.cpp', 'CPP/7zip/Compress/BranchRegister.cpp', 'CPP/7zip/Compress/ByteSwap.cpp', 'CPP/7zip/Compress/CodecExports.cpp', 'CPP/7zip/Compress/CopyCoder.cpp', 'CPP/7zip/Compress/CopyRegister.cpp', 'CPP/7zip/Compress/Deflate64Register.cpp', 'CPP/7zip/Compress/DeflateDecoder.cpp', 'CPP/7zip/Compress/DeflateEncoder.cpp', 'CPP/7zip/Compress/DeflateRegister.cpp', 'CPP/7zip/Compress/DeltaFilter.cpp', 'CPP/7zip/Compress/ImplodeDecoder.cpp', 'CPP/7zip/Compress/ImplodeHuffmanDecoder.cpp', 'CPP/7zip/Compress/LzOutWindow.cpp', 'CPP/7zip/Compress/LzhDecoder.cpp', 'CPP/7zip/Compress/Lzma2Decoder.cpp', 'CPP/7zip/Compress/Lzma2Encoder.cpp', 'CPP/7zip/Compress/Lzma2Register.cpp', 'CPP/7zip/Compress/LzmaDecoder.cpp', 'CPP/7zip/Compress/LzmaEncoder.cpp', 'CPP/7zip/Compress/LzmaRegister.cpp', 'CPP/7zip/Compress/LzmsDecoder.cpp', 'CPP/7zip/Compress/LzxDecoder.cpp', 'CPP/7zip/Compress/PpmdDecoder.cpp', 'CPP/7zip/Compress/PpmdEncoder.cpp', 'CPP/7zip/Compress/PpmdRegister.cpp', 'CPP/7zip/Compress/PpmdZip.cpp', 'CPP/7zip/Compress/QuantumDecoder.cpp', 'CPP/7zip/Compress/ShrinkDecoder.cpp', 'CPP/7zip/Compress/ZDecoder.cpp', 'CPP/7zip/Compress/XpressDecoder.cpp', 'CPP/7zip/Compress/ZlibDecoder.cpp', 'CPP/7zip/Compress/ZlibEncoder.cpp', 'CPP/7zip/Crypto/7zAes.cpp', 'CPP/7zip/Crypto/7zAesRegister.cpp', 'CPP/7zip/Crypto/HmacSha1.cpp', 'CPP/7zip/Crypto/HmacSha256.cpp', 'CPP/7zip/Crypto/MyAes.cpp', 'CPP/7zip/Crypto/MyAesReg.cpp', 'CPP/7zip/Crypto/Pbkdf2HmacSha1.cpp', 'CPP/7zip/Crypto/RandGen.cpp', 'CPP/7zip/Crypto/Rar20Crypto.cpp', 'CPP/7zip/Crypto/Rar5Aes.cpp', 'CPP/7zip/Crypto/RarAes.cpp', 'CPP/7zip/Crypto/WzAes.cpp', 'CPP/7zip/Crypto/ZipCrypto.cpp', 'CPP/7zip/Crypto/ZipStrong.cpp', 'CPP/Common/CRC.cpp', 'CPP/Common/CrcReg.cpp', 'CPP/Common/DynLimBuf.cpp', 'CPP/Common/IntToString.cpp', 'CPP/Common/MyMap.cpp', 'CPP/Common/MyString.cpp', 'CPP/Common/MyVector.cpp', 'CPP/Common/MyWindows.cpp', 'CPP/Common/MyXml.cpp', 'CPP/Common/NewHandler.cpp', 'CPP/Common/Sha1Reg.cpp', 'CPP/Common/Sha256Reg.cpp', 'CPP/Common/StringConvert.cpp', 'CPP/Common/StringToInt.cpp', 'CPP/Common/UTFConvert.cpp', 'CPP/Common/Wildcard.cpp', 'CPP/Common/XzCrc64Reg.cpp', 'CPP/Windows/FileDir.cpp', 'CPP/Windows/FileFind.cpp', 'CPP/Windows/FileIO.cpp', 'CPP/Windows/FileName.cpp', 'CPP/Windows/PropVariant.cpp', 'CPP/Windows/PropVariantUtils.cpp', 'CPP/Windows/Synchronization.cpp', 'CPP/Windows/System.cpp', 'CPP/Windows/TimeUtils.cpp', 'CPP/myWindows/wine_date_and_time.cpp', ]
files_c = ['C/7zBuf2.c', 'C/7zCrc.c', 'C/7zCrcOpt.c', 'C/7zStream.c', 'C/Aes.c', 'C/Alloc.c', 'C/Bcj2.c', 'C/Bcj2Enc.c', 'C/Blake2s.c', 'C/Bra.c', 'C/Bra86.c', 'C/BraIA64.c', 'C/BwtSort.c', 'C/CpuArch.c', 'C/Delta.c', 'C/HuffEnc.c', 'C/LzFind.c', 'C/LzFindMt.c', 'C/Lzma2Dec.c', 'C/Lzma2Enc.c', 'C/LzmaDec.c', 'C/LzmaEnc.c', 'C/MtCoder.c', 'C/Ppmd7.c', 'C/Ppmd7Dec.c', 'C/Ppmd7Enc.c', 'C/Ppmd8.c', 'C/Ppmd8Dec.c', 'C/Ppmd8Enc.c', 'C/Sha1.c', 'C/Sha256.c', 'C/Sort.c', 'C/Threads.c', 'C/Xz.c', 'C/XzCrc64.c', 'C/XzCrc64Opt.c', 'C/XzDec.c', 'C/XzEnc.c', 'C/XzIn.c'] files_cpp = ['CPP/7zip/Archive/7z/7zCompressionMode.cpp', 'CPP/7zip/Archive/7z/7zDecode.cpp', 'CPP/7zip/Archive/7z/7zEncode.cpp', 'CPP/7zip/Archive/7z/7zExtract.cpp', 'CPP/7zip/Archive/7z/7zFolderInStream.cpp', 'CPP/7zip/Archive/7z/7zHandler.cpp', 'CPP/7zip/Archive/7z/7zHandlerOut.cpp', 'CPP/7zip/Archive/7z/7zHeader.cpp', 'CPP/7zip/Archive/7z/7zIn.cpp', 'CPP/7zip/Archive/7z/7zOut.cpp', 'CPP/7zip/Archive/7z/7zProperties.cpp', 'CPP/7zip/Archive/7z/7zRegister.cpp', 'CPP/7zip/Archive/7z/7zSpecStream.cpp', 'CPP/7zip/Archive/7z/7zUpdate.cpp', 'CPP/7zip/Archive/ApmHandler.cpp', 'CPP/7zip/Archive/ArHandler.cpp', 'CPP/7zip/Archive/ArchiveExports.cpp', 'CPP/7zip/Archive/ArjHandler.cpp', 'CPP/7zip/Archive/Bz2Handler.cpp', 'CPP/7zip/Archive/Cab/CabBlockInStream.cpp', 'CPP/7zip/Archive/Cab/CabHandler.cpp', 'CPP/7zip/Archive/Cab/CabHeader.cpp', 'CPP/7zip/Archive/Cab/CabIn.cpp', 'CPP/7zip/Archive/Cab/CabRegister.cpp', 'CPP/7zip/Archive/Chm/ChmHandler.cpp', 'CPP/7zip/Archive/Chm/ChmIn.cpp', 'CPP/7zip/Archive/ComHandler.cpp', 'CPP/7zip/Archive/Common/CoderMixer2.cpp', 'CPP/7zip/Archive/Common/DummyOutStream.cpp', 'CPP/7zip/Archive/Common/FindSignature.cpp', 'CPP/7zip/Archive/Common/HandlerOut.cpp', 'CPP/7zip/Archive/Common/InStreamWithCRC.cpp', 'CPP/7zip/Archive/Common/ItemNameUtils.cpp', 'CPP/7zip/Archive/Common/MultiStream.cpp', 'CPP/7zip/Archive/Common/OutStreamWithCRC.cpp', 'CPP/7zip/Archive/Common/OutStreamWithSha1.cpp', 'CPP/7zip/Archive/Common/ParseProperties.cpp', 'CPP/7zip/Archive/CpioHandler.cpp', 'CPP/7zip/Archive/CramfsHandler.cpp', 'CPP/7zip/Archive/DeflateProps.cpp', 'CPP/7zip/Archive/DllExports2.cpp', 'CPP/7zip/Archive/DmgHandler.cpp', 'CPP/7zip/Archive/ElfHandler.cpp', 'CPP/7zip/Archive/ExtHandler.cpp', 'CPP/7zip/Archive/FatHandler.cpp', 'CPP/7zip/Archive/FlvHandler.cpp', 'CPP/7zip/Archive/GzHandler.cpp', 'CPP/7zip/Archive/GptHandler.cpp', 'CPP/7zip/Archive/HandlerCont.cpp', 'CPP/7zip/Archive/HfsHandler.cpp', 'CPP/7zip/Archive/IhexHandler.cpp', 'CPP/7zip/Archive/Iso/IsoHandler.cpp', 'CPP/7zip/Archive/Iso/IsoHeader.cpp', 'CPP/7zip/Archive/Iso/IsoIn.cpp', 'CPP/7zip/Archive/Iso/IsoRegister.cpp', 'CPP/7zip/Archive/LzhHandler.cpp', 'CPP/7zip/Archive/LzmaHandler.cpp', 'CPP/7zip/Archive/MachoHandler.cpp', 'CPP/7zip/Archive/MbrHandler.cpp', 'CPP/7zip/Archive/MslzHandler.cpp', 'CPP/7zip/Archive/MubHandler.cpp', 'CPP/7zip/Archive/Nsis/NsisDecode.cpp', 'CPP/7zip/Archive/Nsis/NsisHandler.cpp', 'CPP/7zip/Archive/Nsis/NsisIn.cpp', 'CPP/7zip/Archive/Nsis/NsisRegister.cpp', 'CPP/7zip/Archive/NtfsHandler.cpp', 'CPP/7zip/Archive/PeHandler.cpp', 'CPP/7zip/Archive/PpmdHandler.cpp', 'CPP/7zip/Archive/QcowHandler.cpp', 'CPP/7zip/Archive/Rar/RarHandler.cpp', 'CPP/7zip/Archive/Rar/Rar5Handler.cpp', 'CPP/7zip/Archive/RpmHandler.cpp', 'CPP/7zip/Archive/SplitHandler.cpp', 'CPP/7zip/Archive/SquashfsHandler.cpp', 'CPP/7zip/Archive/SwfHandler.cpp', 'CPP/7zip/Archive/Tar/TarHandler.cpp', 'CPP/7zip/Archive/Tar/TarHandlerOut.cpp', 'CPP/7zip/Archive/Tar/TarHeader.cpp', 'CPP/7zip/Archive/Tar/TarIn.cpp', 'CPP/7zip/Archive/Tar/TarOut.cpp', 'CPP/7zip/Archive/Tar/TarRegister.cpp', 'CPP/7zip/Archive/Tar/TarUpdate.cpp', 'CPP/7zip/Archive/Udf/UdfHandler.cpp', 'CPP/7zip/Archive/Udf/UdfIn.cpp', 'CPP/7zip/Archive/UefiHandler.cpp', 'CPP/7zip/Archive/VdiHandler.cpp', 'CPP/7zip/Archive/VhdHandler.cpp', 'CPP/7zip/Archive/VmdkHandler.cpp', 'CPP/7zip/Archive/Wim/WimHandler.cpp', 'CPP/7zip/Archive/Wim/WimHandlerOut.cpp', 'CPP/7zip/Archive/Wim/WimIn.cpp', 'CPP/7zip/Archive/Wim/WimRegister.cpp', 'CPP/7zip/Archive/XarHandler.cpp', 'CPP/7zip/Archive/XzHandler.cpp', 'CPP/7zip/Archive/ZHandler.cpp', 'CPP/7zip/Archive/Zip/ZipAddCommon.cpp', 'CPP/7zip/Archive/Zip/ZipHandler.cpp', 'CPP/7zip/Archive/Zip/ZipHandlerOut.cpp', 'CPP/7zip/Archive/Zip/ZipIn.cpp', 'CPP/7zip/Archive/Zip/ZipItem.cpp', 'CPP/7zip/Archive/Zip/ZipOut.cpp', 'CPP/7zip/Archive/Zip/ZipRegister.cpp', 'CPP/7zip/Archive/Zip/ZipUpdate.cpp', 'CPP/7zip/Common/CWrappers.cpp', 'CPP/7zip/Common/CreateCoder.cpp', 'CPP/7zip/Common/FilterCoder.cpp', 'CPP/7zip/Common/InBuffer.cpp', 'CPP/7zip/Common/InOutTempBuffer.cpp', 'CPP/7zip/Common/LimitedStreams.cpp', 'CPP/7zip/Common/MemBlocks.cpp', 'CPP/7zip/Common/MethodId.cpp', 'CPP/7zip/Common/MethodProps.cpp', 'CPP/7zip/Common/OffsetStream.cpp', 'CPP/7zip/Common/OutBuffer.cpp', 'CPP/7zip/Common/OutMemStream.cpp', 'CPP/7zip/Common/ProgressMt.cpp', 'CPP/7zip/Common/ProgressUtils.cpp', 'CPP/7zip/Common/PropId.cpp', 'CPP/7zip/Common/StreamBinder.cpp', 'CPP/7zip/Common/StreamObjects.cpp', 'CPP/7zip/Common/StreamUtils.cpp', 'CPP/7zip/Common/UniqBlocks.cpp', 'CPP/7zip/Common/VirtThread.cpp', 'CPP/7zip/Compress/BZip2Crc.cpp', 'CPP/7zip/Compress/BZip2Decoder.cpp', 'CPP/7zip/Compress/BZip2Encoder.cpp', 'CPP/7zip/Compress/BZip2Register.cpp', 'CPP/7zip/Compress/Bcj2Coder.cpp', 'CPP/7zip/Compress/Bcj2Register.cpp', 'CPP/7zip/Compress/BcjCoder.cpp', 'CPP/7zip/Compress/BcjRegister.cpp', 'CPP/7zip/Compress/BitlDecoder.cpp', 'CPP/7zip/Compress/BranchMisc.cpp', 'CPP/7zip/Compress/BranchRegister.cpp', 'CPP/7zip/Compress/ByteSwap.cpp', 'CPP/7zip/Compress/CodecExports.cpp', 'CPP/7zip/Compress/CopyCoder.cpp', 'CPP/7zip/Compress/CopyRegister.cpp', 'CPP/7zip/Compress/Deflate64Register.cpp', 'CPP/7zip/Compress/DeflateDecoder.cpp', 'CPP/7zip/Compress/DeflateEncoder.cpp', 'CPP/7zip/Compress/DeflateRegister.cpp', 'CPP/7zip/Compress/DeltaFilter.cpp', 'CPP/7zip/Compress/ImplodeDecoder.cpp', 'CPP/7zip/Compress/ImplodeHuffmanDecoder.cpp', 'CPP/7zip/Compress/LzOutWindow.cpp', 'CPP/7zip/Compress/LzhDecoder.cpp', 'CPP/7zip/Compress/Lzma2Decoder.cpp', 'CPP/7zip/Compress/Lzma2Encoder.cpp', 'CPP/7zip/Compress/Lzma2Register.cpp', 'CPP/7zip/Compress/LzmaDecoder.cpp', 'CPP/7zip/Compress/LzmaEncoder.cpp', 'CPP/7zip/Compress/LzmaRegister.cpp', 'CPP/7zip/Compress/LzmsDecoder.cpp', 'CPP/7zip/Compress/LzxDecoder.cpp', 'CPP/7zip/Compress/PpmdDecoder.cpp', 'CPP/7zip/Compress/PpmdEncoder.cpp', 'CPP/7zip/Compress/PpmdRegister.cpp', 'CPP/7zip/Compress/PpmdZip.cpp', 'CPP/7zip/Compress/QuantumDecoder.cpp', 'CPP/7zip/Compress/ShrinkDecoder.cpp', 'CPP/7zip/Compress/ZDecoder.cpp', 'CPP/7zip/Compress/XpressDecoder.cpp', 'CPP/7zip/Compress/ZlibDecoder.cpp', 'CPP/7zip/Compress/ZlibEncoder.cpp', 'CPP/7zip/Crypto/7zAes.cpp', 'CPP/7zip/Crypto/7zAesRegister.cpp', 'CPP/7zip/Crypto/HmacSha1.cpp', 'CPP/7zip/Crypto/HmacSha256.cpp', 'CPP/7zip/Crypto/MyAes.cpp', 'CPP/7zip/Crypto/MyAesReg.cpp', 'CPP/7zip/Crypto/Pbkdf2HmacSha1.cpp', 'CPP/7zip/Crypto/RandGen.cpp', 'CPP/7zip/Crypto/Rar20Crypto.cpp', 'CPP/7zip/Crypto/Rar5Aes.cpp', 'CPP/7zip/Crypto/RarAes.cpp', 'CPP/7zip/Crypto/WzAes.cpp', 'CPP/7zip/Crypto/ZipCrypto.cpp', 'CPP/7zip/Crypto/ZipStrong.cpp', 'CPP/Common/CRC.cpp', 'CPP/Common/CrcReg.cpp', 'CPP/Common/DynLimBuf.cpp', 'CPP/Common/IntToString.cpp', 'CPP/Common/MyMap.cpp', 'CPP/Common/MyString.cpp', 'CPP/Common/MyVector.cpp', 'CPP/Common/MyWindows.cpp', 'CPP/Common/MyXml.cpp', 'CPP/Common/NewHandler.cpp', 'CPP/Common/Sha1Reg.cpp', 'CPP/Common/Sha256Reg.cpp', 'CPP/Common/StringConvert.cpp', 'CPP/Common/StringToInt.cpp', 'CPP/Common/UTFConvert.cpp', 'CPP/Common/Wildcard.cpp', 'CPP/Common/XzCrc64Reg.cpp', 'CPP/Windows/FileDir.cpp', 'CPP/Windows/FileFind.cpp', 'CPP/Windows/FileIO.cpp', 'CPP/Windows/FileName.cpp', 'CPP/Windows/PropVariant.cpp', 'CPP/Windows/PropVariantUtils.cpp', 'CPP/Windows/Synchronization.cpp', 'CPP/Windows/System.cpp', 'CPP/Windows/TimeUtils.cpp', 'CPP/myWindows/wine_date_and_time.cpp']
# multiple.sequences.while.py people = ["Conrad", "Deepak", "Heinrich", "Tom"] ages = [29, 30, 34, 36] position = 0 while position < len(people): person = people[position] age = ages[position] print(person, age) position += 1
people = ['Conrad', 'Deepak', 'Heinrich', 'Tom'] ages = [29, 30, 34, 36] position = 0 while position < len(people): person = people[position] age = ages[position] print(person, age) position += 1
{ 'target_defaults': { 'configurations': { 'Debug': { 'defines': [ 'DEBUG', '_DEBUG' ] }, 'Release': { 'defines': [ 'NDEBUG' ] } } }, 'targets': [ { 'target_name': 'mappedbuffer', 'sources': [ 'src/mappedbuffer.cc' ] } ] }
{'target_defaults': {'configurations': {'Debug': {'defines': ['DEBUG', '_DEBUG']}, 'Release': {'defines': ['NDEBUG']}}}, 'targets': [{'target_name': 'mappedbuffer', 'sources': ['src/mappedbuffer.cc']}]}
# Databricks notebook source # MAGIC %md # MAGIC # Project Timesheet Source Data # COMMAND ---------- spark.conf.set( "fs.azure.account.key.dmstore1.blob.core.windows.net", "s8aN23JQ1EboPql5lx++0zQOyYrYC2EvT7NbgewR/8yAmQzpPfojntRWrCr4XOuonMowUUXsEzSxP11Jzd3kTg==") # COMMAND ---------- # MAGIC %sql # MAGIC create database if not exists samples # COMMAND ---------- # MAGIC %sql # MAGIC drop table if exists samples.project_timesheet; # MAGIC create table samples.project_timesheet # MAGIC using csv # MAGIC options (path "wasbs://sample-data@dmstore1.blob.core.windows.net/timesheet/sample_data.csv", header "true", mode "FAILFAST", inferschema "true") # COMMAND ---------- # MAGIC %sql # MAGIC describe table samples.project_timesheet # COMMAND ---------- # MAGIC %sql # MAGIC select # MAGIC * # MAGIC from # MAGIC samples.project_timesheet # COMMAND ----------
spark.conf.set('fs.azure.account.key.dmstore1.blob.core.windows.net', 's8aN23JQ1EboPql5lx++0zQOyYrYC2EvT7NbgewR/8yAmQzpPfojntRWrCr4XOuonMowUUXsEzSxP11Jzd3kTg==')
class FormatSingle: def __init__(self, singleData: dict): self.data = singleData def getMonthDay(self): fullData = self.data["TimePeriod"]["Start"] return fullData[5:] def getAmount(self): stringAmountData = self.data["Total"]["BlendedCost"]["Amount"] return float(stringAmountData) def getAmountUnit(self): return self.data["Total"]["BlendedCost"]["Unit"]
class Formatsingle: def __init__(self, singleData: dict): self.data = singleData def get_month_day(self): full_data = self.data['TimePeriod']['Start'] return fullData[5:] def get_amount(self): string_amount_data = self.data['Total']['BlendedCost']['Amount'] return float(stringAmountData) def get_amount_unit(self): return self.data['Total']['BlendedCost']['Unit']
def login_to_foxford(driver): '''Foxford login''' driver.get("about:blank") driver.switch_to.window(driver.window_handles[0]) # <--- Needed in some cases when something popups driver.get("https://foxford.ru/user/login/")
def login_to_foxford(driver): """Foxford login""" driver.get('about:blank') driver.switch_to.window(driver.window_handles[0]) driver.get('https://foxford.ru/user/login/')
# -*- coding: utf-8 -*- LOG_TYPES = { "s": {"event": "Success Login", "level": 1}, # Info "seacft": {"event": "Success Exchange", "level": 1}, # Info "seccft": {"event": "Success Exchange (Client Credentials)", "level": 1}, # Info "feacft": {"event": "Failed Exchange", "level": 3}, # Error "feccft": {"event": "Failed Exchange (Client Credentials)", "level": 3}, # Error "f": {"event": "Failed Login", "level": 3}, # Error "w": {"event": "Warnings During Login", "level": 2}, # Warning "du": {"event": "Deleted User", "level": 1}, # Info "fu": {"event": "Failed Login (invalid email/username)", "level": 3}, # Error "fp": {"event": "Failed Login (wrong password)", "level": 3}, # Error "fc": {"event": "Failed by Connector", "level": 3}, # Error "fco": {"event": "Failed by CORS", "level": 3}, # Error "con": {"event": "Connector Online", "level": 1}, # Info "coff": {"event": "Connector Offline", "level": 3}, # Error "fcpro": {"event": "Failed Connector Provisioning", "level": 4}, # Critical "ss": {"event": "Success Signup", "level": 1}, # Info "fs": {"event": "Failed Signup", "level": 3}, # Error "cs": {"event": "Code Sent", "level": 0}, # Debug "cls": {"event": "Code/Link Sent", "level": 0}, # Debug "sv": {"event": "Success Verification Email", "level": 0}, # Debug "fv": {"event": "Failed Verification Email", "level": 0}, # Debug "scp": {"event": "Success Change Password", "level": 1}, # Info "fcp": {"event": "Failed Change Password", "level": 3}, # Error "sce": {"event": "Success Change Email", "level": 1}, # Info "fce": {"event": "Failed Change Email", "level": 3}, # Error "scu": {"event": "Success Change Username", "level": 1}, # Info "fcu": {"event": "Failed Change Username", "level": 3}, # Error "scpn": {"event": "Success Change Phone Number", "level": 1}, # Info "fcpn": {"event": "Failed Change Phone Number", "level": 3}, # Error "svr": {"event": "Success Verification Email Request", "level": 0}, # Debug "fvr": {"event": "Failed Verification Email Request", "level": 3}, # Error "scpr": {"event": "Success Change Password Request", "level": 0}, # Debug "fcpr": {"event": "Failed Change Password Request", "level": 3}, # Error "fn": {"event": "Failed Sending Notification", "level": 3}, # Error "sapi": {"event": "API Operation"}, "limit_wc": {"event": "Blocked Account", "level": 4}, # Critical "limit_ui": {"event": "Too Many Calls to /userinfo", "level": 4}, # Critical "api_limit": {"event": "Rate Limit On API", "level": 4}, # Critical "sdu": {"event": "Successful User Deletion", "level": 1}, # Info "fdu": {"event": "Failed User Deletion", "level": 3}, # Error "fapi": {"event": "Failed API Operation", "level": 3}, # Error "limit_mu": {"event": "Blocked IP Address", "level": 3}, # Error "slo": {"event": "Success Logout", "level": 1}, # Info "flo": {"event": "Failed Logout", "level": 3}, # Error "sd": {"event": "Success Delegation", "level": 1}, # Info "fd": {"event": "Failed Delegation", "level": 3}, # Error }
log_types = {'s': {'event': 'Success Login', 'level': 1}, 'seacft': {'event': 'Success Exchange', 'level': 1}, 'seccft': {'event': 'Success Exchange (Client Credentials)', 'level': 1}, 'feacft': {'event': 'Failed Exchange', 'level': 3}, 'feccft': {'event': 'Failed Exchange (Client Credentials)', 'level': 3}, 'f': {'event': 'Failed Login', 'level': 3}, 'w': {'event': 'Warnings During Login', 'level': 2}, 'du': {'event': 'Deleted User', 'level': 1}, 'fu': {'event': 'Failed Login (invalid email/username)', 'level': 3}, 'fp': {'event': 'Failed Login (wrong password)', 'level': 3}, 'fc': {'event': 'Failed by Connector', 'level': 3}, 'fco': {'event': 'Failed by CORS', 'level': 3}, 'con': {'event': 'Connector Online', 'level': 1}, 'coff': {'event': 'Connector Offline', 'level': 3}, 'fcpro': {'event': 'Failed Connector Provisioning', 'level': 4}, 'ss': {'event': 'Success Signup', 'level': 1}, 'fs': {'event': 'Failed Signup', 'level': 3}, 'cs': {'event': 'Code Sent', 'level': 0}, 'cls': {'event': 'Code/Link Sent', 'level': 0}, 'sv': {'event': 'Success Verification Email', 'level': 0}, 'fv': {'event': 'Failed Verification Email', 'level': 0}, 'scp': {'event': 'Success Change Password', 'level': 1}, 'fcp': {'event': 'Failed Change Password', 'level': 3}, 'sce': {'event': 'Success Change Email', 'level': 1}, 'fce': {'event': 'Failed Change Email', 'level': 3}, 'scu': {'event': 'Success Change Username', 'level': 1}, 'fcu': {'event': 'Failed Change Username', 'level': 3}, 'scpn': {'event': 'Success Change Phone Number', 'level': 1}, 'fcpn': {'event': 'Failed Change Phone Number', 'level': 3}, 'svr': {'event': 'Success Verification Email Request', 'level': 0}, 'fvr': {'event': 'Failed Verification Email Request', 'level': 3}, 'scpr': {'event': 'Success Change Password Request', 'level': 0}, 'fcpr': {'event': 'Failed Change Password Request', 'level': 3}, 'fn': {'event': 'Failed Sending Notification', 'level': 3}, 'sapi': {'event': 'API Operation'}, 'limit_wc': {'event': 'Blocked Account', 'level': 4}, 'limit_ui': {'event': 'Too Many Calls to /userinfo', 'level': 4}, 'api_limit': {'event': 'Rate Limit On API', 'level': 4}, 'sdu': {'event': 'Successful User Deletion', 'level': 1}, 'fdu': {'event': 'Failed User Deletion', 'level': 3}, 'fapi': {'event': 'Failed API Operation', 'level': 3}, 'limit_mu': {'event': 'Blocked IP Address', 'level': 3}, 'slo': {'event': 'Success Logout', 'level': 1}, 'flo': {'event': 'Failed Logout', 'level': 3}, 'sd': {'event': 'Success Delegation', 'level': 1}, 'fd': {'event': 'Failed Delegation', 'level': 3}}
# This sample tests error detection for certain cases that # are explicitly disallowed by PEP 572 for assignment expressions # when used in context of a list comprehension. pairs = [] stuff = [] # These should generate an error because assignment # expressions aren't allowed within an iterator expression # in a "for" clause of a list comprehension. [x for x, y in (pairs2 := pairs) if x % 2 == 0] [x for x, y in ([1, 2, 3, pairs2 := pairs]) if x % 2 == 0] {x: y for x, y in (pairs2 := pairs) if x % 2 == 0} {x for x, y in (pairs2 := pairs) if x % 2 == 0} foo = (x for x, y in ([1, 2, 3, pairs2 := pairs]) if x % 2 == 0) # This should generate an error because 'j' is used as a # "for target" and the target of an assignment expression. [[(j := j) for i in range(5)] for j in range(5)] [i := 0 for i, j in stuff] [i+1 for i in (i := stuff)] [False and (i := 0) for i, j in stuff] [i for i, j in stuff if True or (j := 1)] # These should generate an error because assignment # expressions aren't allowed within an iterator expression # in a "for" clause of a list comprehension. [i+1 for i in (j := stuff)] [i+1 for i in range(2) for j in (k := stuff)] [i+1 for i in [j for j in (k := stuff)]] [i+1 for i in (lambda: (j := stuff))()] class Example: # This should generate an error because the containing # scope for the list comprehension is a class. [(j := i) for i in range(5)] # This should generate an error because 'j' is used as a # "for target" and the target of an assignment expression. [i for i in [1, 2] if True or (j := 1) for j in range(10)]
pairs = [] stuff = [] [x for (x, y) in (pairs2 := pairs) if x % 2 == 0] [x for (x, y) in [1, 2, 3, (pairs2 := pairs)] if x % 2 == 0] {x: y for (x, y) in (pairs2 := pairs) if x % 2 == 0} {x for (x, y) in (pairs2 := pairs) if x % 2 == 0} foo = (x for (x, y) in [1, 2, 3, (pairs2 := pairs)] if x % 2 == 0) [[(j := j) for i in range(5)] for j in range(5)] [(i := 0) for (i, j) in stuff] [i + 1 for i in (i := stuff)] [False and (i := 0) for (i, j) in stuff] [i for (i, j) in stuff if True or (j := 1)] [i + 1 for i in (j := stuff)] [i + 1 for i in range(2) for j in (k := stuff)] [i + 1 for i in [j for j in (k := stuff)]] [i + 1 for i in (lambda : (j := stuff))()] class Example: [(j := i) for i in range(5)] [i for i in [1, 2] if True or (j := 1) for j in range(10)]
class Component: def __init__(self, id_, name_): self.id = id_ self.name = name_
class Component: def __init__(self, id_, name_): self.id = id_ self.name = name_
class Mods: __slots__ = ('map_changing', 'nf', 'ez', 'hd', 'hr', 'dt', 'ht', 'nc', 'fl', 'so', 'speed_changing', 'map_changing') def __init__(self, mods_str=''): self.nf = False self.ez = False self.hd = False self.hr = False self.dt = False self.ht = False self.nc = False self.fl = False self.so = False self.speed_changing = False self.map_changing = False if mods_str: self.from_str(mods_str) self.update_state() def update_state(self): # speed changing - dt or ht or nc is used self.speed_changing = self.dt or self.ht or self.nc # if hr or ez or dt or ht or nc self.map_changing = self.hr or self.ez or self.speed_changing def __str__(self): string = '' if self.nf: string += "NF" if self.ez: string += "EZ" if self.hd: string += "HD" if self.hr: string += "HR" if self.dt: string += "DT" if self.ht: string += "HT" if self.nc: string += "NC" if self.fl: string += "FL" if self.so: string += "SO" return string def from_str(self, mods): if not mods: return # split mods string to chunks with length of two characters mods = [mods[i:i + 2] for i in range(0, len(mods), 2)] if "NF" in mods: self.nf = True if "EZ" in mods: self.ez = True if "HD" in mods: self.hd = True if "HR" in mods: self.hr = True if "DT" in mods: self.dt = True if "HT" in mods: self.ht = True if "NC" in mods: self.nc = True if "FL" in mods: self.fl = True if "SO" in mods: self.so = True self.update_state() class HitObject: __slots__ = ('pos', 'time', 'h_type', 'end_time', 'slider') def __init__(self, pos, time, h_type, end_time, slider): self.pos = pos self.time = time self.h_type = h_type self.end_time = end_time self.slider = slider class SliderData: __slots__ = ('s_type', 'points', 'repeats', 'length') def __init__(self, s_type, points, repeats, length): self.s_type = s_type self.points = points self.repeats = repeats self.length = length class TimingPoint: __slots__ = ('time', 'ms_per_beat', 'inherited') def __init__(self, time, ms_per_beat, inherited): self.time = time self.ms_per_beat = ms_per_beat self.inherited = inherited
class Mods: __slots__ = ('map_changing', 'nf', 'ez', 'hd', 'hr', 'dt', 'ht', 'nc', 'fl', 'so', 'speed_changing', 'map_changing') def __init__(self, mods_str=''): self.nf = False self.ez = False self.hd = False self.hr = False self.dt = False self.ht = False self.nc = False self.fl = False self.so = False self.speed_changing = False self.map_changing = False if mods_str: self.from_str(mods_str) self.update_state() def update_state(self): self.speed_changing = self.dt or self.ht or self.nc self.map_changing = self.hr or self.ez or self.speed_changing def __str__(self): string = '' if self.nf: string += 'NF' if self.ez: string += 'EZ' if self.hd: string += 'HD' if self.hr: string += 'HR' if self.dt: string += 'DT' if self.ht: string += 'HT' if self.nc: string += 'NC' if self.fl: string += 'FL' if self.so: string += 'SO' return string def from_str(self, mods): if not mods: return mods = [mods[i:i + 2] for i in range(0, len(mods), 2)] if 'NF' in mods: self.nf = True if 'EZ' in mods: self.ez = True if 'HD' in mods: self.hd = True if 'HR' in mods: self.hr = True if 'DT' in mods: self.dt = True if 'HT' in mods: self.ht = True if 'NC' in mods: self.nc = True if 'FL' in mods: self.fl = True if 'SO' in mods: self.so = True self.update_state() class Hitobject: __slots__ = ('pos', 'time', 'h_type', 'end_time', 'slider') def __init__(self, pos, time, h_type, end_time, slider): self.pos = pos self.time = time self.h_type = h_type self.end_time = end_time self.slider = slider class Sliderdata: __slots__ = ('s_type', 'points', 'repeats', 'length') def __init__(self, s_type, points, repeats, length): self.s_type = s_type self.points = points self.repeats = repeats self.length = length class Timingpoint: __slots__ = ('time', 'ms_per_beat', 'inherited') def __init__(self, time, ms_per_beat, inherited): self.time = time self.ms_per_beat = ms_per_beat self.inherited = inherited
class Solution: def maxNumOfSubstrings(self, s: str) -> List[str]: start, end = {}, {} for i, c in enumerate(s): if c not in start: start[c] = i end[c] = i def checkSubstring(i): curr = i right = end[s[curr]] while curr <= right: if start[s[curr]] < i: return -1 right = max(right, end[s[curr]]) curr += 1 return right result = [] prevRight = -1 for i, c in enumerate(s): if i == start[c]: right = checkSubstring(i) if right != -1: if i > prevRight: result.append(s[i:right + 1]) else: result[-1] = s[i:right + 1] prevRight = right return result
class Solution: def max_num_of_substrings(self, s: str) -> List[str]: (start, end) = ({}, {}) for (i, c) in enumerate(s): if c not in start: start[c] = i end[c] = i def check_substring(i): curr = i right = end[s[curr]] while curr <= right: if start[s[curr]] < i: return -1 right = max(right, end[s[curr]]) curr += 1 return right result = [] prev_right = -1 for (i, c) in enumerate(s): if i == start[c]: right = check_substring(i) if right != -1: if i > prevRight: result.append(s[i:right + 1]) else: result[-1] = s[i:right + 1] prev_right = right return result
''' this code is for using PySpark to read straight from S3 bucket instead of using the default data source (AWS Glue Data Catalog). ''' #this is the default line that we will change: datasource0 = glueContext.create_dynamic_frame.from_catalog(database = "<DATABASE_NAME>", table_name = "<TABLE_NAME>", transformation_ctx = "datasource0") # so replace the previous code with this: obj_list = ['s3://<OBJECT_PATH>'] # list of all relevant objects datasource0 = glueContext.create_dynamic_frame_from_options(connection_type = "s3",connection_options={"paths": [obj_list]}, format = "csv", format_options={"withHeader": False,"separator": ","}) # for more info: https://docs.aws.amazon.com/glue/latest/dg/aws-glue-api-crawler-pyspark-extensions-glue-context.html#aws-glue-api-crawler-pyspark-extensions-glue-context-create_dynamic_frame_from_options
""" this code is for using PySpark to read straight from S3 bucket instead of using the default data source (AWS Glue Data Catalog). """ datasource0 = glueContext.create_dynamic_frame.from_catalog(database='<DATABASE_NAME>', table_name='<TABLE_NAME>', transformation_ctx='datasource0') obj_list = ['s3://<OBJECT_PATH>'] datasource0 = glueContext.create_dynamic_frame_from_options(connection_type='s3', connection_options={'paths': [obj_list]}, format='csv', format_options={'withHeader': False, 'separator': ','})
class Solution: def removePalindromeSub(self, s: str) -> int: if not s or len(s) == 0: return 0 left, right = 0, len(s) - 1 while left < right and s[left] == s[right]: left += 1 right -= 1 if left >= right: return 1 else: return 2
class Solution: def remove_palindrome_sub(self, s: str) -> int: if not s or len(s) == 0: return 0 (left, right) = (0, len(s) - 1) while left < right and s[left] == s[right]: left += 1 right -= 1 if left >= right: return 1 else: return 2
radious=2.5 area=3.14*radious**2 print("area of circle",area) circum=2*3.14*radious print("circumof",circum)
radious = 2.5 area = 3.14 * radious ** 2 print('area of circle', area) circum = 2 * 3.14 * radious print('circumof', circum)
# # SOFTWARE HISTORY # # Date Ticket# Engineer Description # ------------ ---------- ----------- -------------------------- # 09/10/14 #3623 randerso Manually created, do not regenerate # class SiteActivationNotification(object): def __init__(self): self.type = None self.status = None self.primarySite = None self.modifiedSite = None self.runMode = None self.serverName = None self.pluginName = None def getType(self): return self.type def setType(self, notificationType): self.type = notificationType def getStatus(self): return self.status def setStatus(self, status): self.status = status def getPrimarySite(self): return self.primarySite def setPrimarySite(self, primarysite): self.primarySite = primarysite def getModifiedSite(self): return self.modifiedSite def setModifiedSite(self, modifiedSite): self.modifiedSite = modifiedSite def getRunMode(self): return self.runMode def setRunMode(self, runMode): self.runMode = runMode def getServerName(self): return self.serverName def setServerName(self, serverName): self.serverName = serverName def getPluginName(self): return self.pluginName def setPluginName(self, pluginName): self.pluginName = pluginName def __str__(self): return self.pluginName.upper() + ":" \ + self.status + ":" \ + self.type + " " \ + self.modifiedSite.upper() + " on " \ + self.serverName + ":" \ + self.runMode
class Siteactivationnotification(object): def __init__(self): self.type = None self.status = None self.primarySite = None self.modifiedSite = None self.runMode = None self.serverName = None self.pluginName = None def get_type(self): return self.type def set_type(self, notificationType): self.type = notificationType def get_status(self): return self.status def set_status(self, status): self.status = status def get_primary_site(self): return self.primarySite def set_primary_site(self, primarysite): self.primarySite = primarysite def get_modified_site(self): return self.modifiedSite def set_modified_site(self, modifiedSite): self.modifiedSite = modifiedSite def get_run_mode(self): return self.runMode def set_run_mode(self, runMode): self.runMode = runMode def get_server_name(self): return self.serverName def set_server_name(self, serverName): self.serverName = serverName def get_plugin_name(self): return self.pluginName def set_plugin_name(self, pluginName): self.pluginName = pluginName def __str__(self): return self.pluginName.upper() + ':' + self.status + ':' + self.type + ' ' + self.modifiedSite.upper() + ' on ' + self.serverName + ':' + self.runMode
#!/usr/bin/env python3 # Change the variables and rename this file to secret.py # add your url here (without trailing / at the end!) url = "https://home-assistant.duckdns.org" # get a "Long-Lived Access Token" at YOUR_URL/profile token = "AJKSDHHASJKDHA871263291873KHGSDKAJSGD"
url = 'https://home-assistant.duckdns.org' token = 'AJKSDHHASJKDHA871263291873KHGSDKAJSGD'
# pylint: skip-file class OadmPolicyException(Exception): ''' Registry Exception Class ''' pass class OadmPolicyUserConfig(OpenShiftCLIConfig): ''' RegistryConfig is a DTO for the registry. ''' def __init__(self, namespace, kubeconfig, policy_options): super(OadmPolicyUserConfig, self).__init__(policy_options['name']['value'], namespace, kubeconfig, policy_options) self.kind = self.get_kind() self.namespace = namespace def get_kind(self): ''' return the kind we are working with ''' if self.config_options['resource_kind']['value'] == 'role': return 'rolebinding' elif self.config_options['resource_kind']['value'] == 'cluster-role': return 'clusterrolebinding' elif self.config_options['resource_kind']['value'] == 'scc': return 'scc' return None class OadmPolicyUser(OpenShiftCLI): ''' Class to wrap the oc command line tools ''' def __init__(self, policy_config, verbose=False): ''' Constructor for OadmPolicyUser ''' super(OadmPolicyUser, self).__init__(policy_config.namespace, policy_config.kubeconfig, verbose) self.config = policy_config self.verbose = verbose self._rolebinding = None self._scc = None @property def role_binding(self): ''' role_binding property ''' return self._rolebinding @role_binding.setter def role_binding(self, binding): ''' setter for role_binding property ''' self._rolebinding = binding @property def security_context_constraint(self): ''' security_context_constraint property ''' return self._scc @security_context_constraint.setter def security_context_constraint(self, scc): ''' setter for security_context_constraint property ''' self._scc = scc def get(self): '''fetch the desired kind''' resource_name = self.config.config_options['name']['value'] if resource_name == 'cluster-reader': resource_name += 's' return self._get(self.config.kind, resource_name) def exists_role_binding(self): ''' return whether role_binding exists ''' results = self.get() if results['returncode'] == 0: self.role_binding = RoleBinding(results['results'][0]) if self.role_binding.find_user_name(self.config.config_options['user']['value']) != None: return True return False elif '\"%s\" not found' % self.config.config_options['name']['value'] in results['stderr']: return False return results def exists_scc(self): ''' return whether scc exists ''' results = self.get() if results['returncode'] == 0: self.security_context_constraint = SecurityContextConstraints(results['results'][0]) if self.security_context_constraint.find_user(self.config.config_options['user']['value']): return True return False return results def exists(self): '''does the object exist?''' if self.config.config_options['resource_kind']['value'] == 'cluster-role': return self.exists_role_binding() elif self.config.config_options['resource_kind']['value'] == 'role': return self.exists_role_binding() elif self.config.config_options['resource_kind']['value'] == 'scc': return self.exists_scc() return False def perform(self): '''perform action on resource''' cmd = ['-n', self.config.namespace, 'policy', self.config.config_options['action']['value'], self.config.config_options['name']['value'], self.config.config_options['user']['value']] return self.openshift_cmd(cmd, oadm=True)
class Oadmpolicyexception(Exception): """ Registry Exception Class """ pass class Oadmpolicyuserconfig(OpenShiftCLIConfig): """ RegistryConfig is a DTO for the registry. """ def __init__(self, namespace, kubeconfig, policy_options): super(OadmPolicyUserConfig, self).__init__(policy_options['name']['value'], namespace, kubeconfig, policy_options) self.kind = self.get_kind() self.namespace = namespace def get_kind(self): """ return the kind we are working with """ if self.config_options['resource_kind']['value'] == 'role': return 'rolebinding' elif self.config_options['resource_kind']['value'] == 'cluster-role': return 'clusterrolebinding' elif self.config_options['resource_kind']['value'] == 'scc': return 'scc' return None class Oadmpolicyuser(OpenShiftCLI): """ Class to wrap the oc command line tools """ def __init__(self, policy_config, verbose=False): """ Constructor for OadmPolicyUser """ super(OadmPolicyUser, self).__init__(policy_config.namespace, policy_config.kubeconfig, verbose) self.config = policy_config self.verbose = verbose self._rolebinding = None self._scc = None @property def role_binding(self): """ role_binding property """ return self._rolebinding @role_binding.setter def role_binding(self, binding): """ setter for role_binding property """ self._rolebinding = binding @property def security_context_constraint(self): """ security_context_constraint property """ return self._scc @security_context_constraint.setter def security_context_constraint(self, scc): """ setter for security_context_constraint property """ self._scc = scc def get(self): """fetch the desired kind""" resource_name = self.config.config_options['name']['value'] if resource_name == 'cluster-reader': resource_name += 's' return self._get(self.config.kind, resource_name) def exists_role_binding(self): """ return whether role_binding exists """ results = self.get() if results['returncode'] == 0: self.role_binding = role_binding(results['results'][0]) if self.role_binding.find_user_name(self.config.config_options['user']['value']) != None: return True return False elif '"%s" not found' % self.config.config_options['name']['value'] in results['stderr']: return False return results def exists_scc(self): """ return whether scc exists """ results = self.get() if results['returncode'] == 0: self.security_context_constraint = security_context_constraints(results['results'][0]) if self.security_context_constraint.find_user(self.config.config_options['user']['value']): return True return False return results def exists(self): """does the object exist?""" if self.config.config_options['resource_kind']['value'] == 'cluster-role': return self.exists_role_binding() elif self.config.config_options['resource_kind']['value'] == 'role': return self.exists_role_binding() elif self.config.config_options['resource_kind']['value'] == 'scc': return self.exists_scc() return False def perform(self): """perform action on resource""" cmd = ['-n', self.config.namespace, 'policy', self.config.config_options['action']['value'], self.config.config_options['name']['value'], self.config.config_options['user']['value']] return self.openshift_cmd(cmd, oadm=True)
# Stage 3/6: More interaction # Description # We are going to make our program more complex. As you remember, # the conicoin rate was fixed in the previous stage. But in the real world, # things are different. It's time to write a program that takes your # conicoins and an up-to-date conicoin exchange rate, then counts how # many dollars you would get, and print the result. # Objectives # 1. Get the number of conicoins from the user input. # 2. Get the exchange rate from the user input. # 3. Calculate and print hte result. # Example # The greater-than symbol followed by a space ( > ) represents the user # input. Note that it's not part of the input. # Example 1: # Please, enter the number of conicoins you have: > 13 # Please, enter the exchange rate: > 2 # The total amount of dollars: 26 # Example 2: # Please, enter the number of conicoins you have: > 128 # Please, enter the exchange rate: > 3.21 # The total amount of dollars: 410.88 class CurrencyConverter: def __init__(self): self.exchange = 0 self.dollars = 0 self.coins = 0 self.conicoin_question = "Please, enter the number of conicoins you have: " self.exchange_question = "Please, enter the exchange rate: " self.amount_message = "The total amount of dollars:" def start(self): self.converter() def user(self, question): return input(question) def converter(self): self.coins = int(self.user(self.conicoin_question)) self.exchange = float(self.user(self.exchange_question)) self.dollars = self.coins * self.exchange print(self.amount_message, round(self.dollars) if self.dollars % 1 == 0 else round(self.dollars, 2)) def main(): cur = CurrencyConverter() cur.start() if __name__ == '__main__': main()
class Currencyconverter: def __init__(self): self.exchange = 0 self.dollars = 0 self.coins = 0 self.conicoin_question = 'Please, enter the number of conicoins you have: ' self.exchange_question = 'Please, enter the exchange rate: ' self.amount_message = 'The total amount of dollars:' def start(self): self.converter() def user(self, question): return input(question) def converter(self): self.coins = int(self.user(self.conicoin_question)) self.exchange = float(self.user(self.exchange_question)) self.dollars = self.coins * self.exchange print(self.amount_message, round(self.dollars) if self.dollars % 1 == 0 else round(self.dollars, 2)) def main(): cur = currency_converter() cur.start() if __name__ == '__main__': main()
class ForkName: Frontier = 'Frontier' Homestead = 'Homestead' EIP150 = 'EIP150' EIP158 = 'EIP158' Byzantium = 'Byzantium' Constantinople = 'Constantinople' Metropolis = 'Metropolis' ConstantinopleFix = 'ConstantinopleFix' Istanbul = 'Istanbul' Berlin = 'Berlin' London = 'London' ArrowGlacier = 'ArrowGlacier'
class Forkname: frontier = 'Frontier' homestead = 'Homestead' eip150 = 'EIP150' eip158 = 'EIP158' byzantium = 'Byzantium' constantinople = 'Constantinople' metropolis = 'Metropolis' constantinople_fix = 'ConstantinopleFix' istanbul = 'Istanbul' berlin = 'Berlin' london = 'London' arrow_glacier = 'ArrowGlacier'
class fruta: def __init__ (self,nombre, calorias, vitamina_c, porcentaje_fibra, porcentaje_potasio): self.nombre = nombre self.calorias = calorias self.vitamina_c = vitamina_c self.porcentaje_fibra = porcentaje_fibra self.porcentaje_potasio = porcentaje_potasio def get_calorias(self): return self.calorias def set_calorias(self): return self.calorias def __repr__ (self): return "Nombre: " +self.nombre+" Calorias: "+str(self.calorias)+"K " +" Vitamina C: "+str(self.vitamina_c)+ "mm/kg ""Porcentaje de fibra: "+str(self.porcentaje_fibra)+"% "+" Porcentaje de Potasio: " +str(self.porcentaje_potasio)+"% " def engorda (self): if self.calorias>100: return "Verdadero" else: return "Falso" def nogripe (self): if self.vitamina_c > 0: return "Verdadero" else: return "Falso" fruta1=fruta("banana",110,28,34,60) fruta2=fruta("manzana",80,0,40,5) fruta3=fruta("pera",90,8,37,8) print(fruta1) print(fruta2) print(fruta3) print("") print(fruta1.engorda()) print(fruta2.engorda()) print(fruta3.engorda()) print("") print(fruta1.nogripe()) print(fruta2.nogripe()) print(fruta3.nogripe())
class Fruta: def __init__(self, nombre, calorias, vitamina_c, porcentaje_fibra, porcentaje_potasio): self.nombre = nombre self.calorias = calorias self.vitamina_c = vitamina_c self.porcentaje_fibra = porcentaje_fibra self.porcentaje_potasio = porcentaje_potasio def get_calorias(self): return self.calorias def set_calorias(self): return self.calorias def __repr__(self): return 'Nombre: ' + self.nombre + ' Calorias: ' + str(self.calorias) + 'K ' + ' Vitamina C: ' + str(self.vitamina_c) + 'mm/kg Porcentaje de fibra: ' + str(self.porcentaje_fibra) + '% ' + ' Porcentaje de Potasio: ' + str(self.porcentaje_potasio) + '% ' def engorda(self): if self.calorias > 100: return 'Verdadero' else: return 'Falso' def nogripe(self): if self.vitamina_c > 0: return 'Verdadero' else: return 'Falso' fruta1 = fruta('banana', 110, 28, 34, 60) fruta2 = fruta('manzana', 80, 0, 40, 5) fruta3 = fruta('pera', 90, 8, 37, 8) print(fruta1) print(fruta2) print(fruta3) print('') print(fruta1.engorda()) print(fruta2.engorda()) print(fruta3.engorda()) print('') print(fruta1.nogripe()) print(fruta2.nogripe()) print(fruta3.nogripe())
# this is an embedded Python script it's really on GitHub # and this is only a reference - so when it changes people # will see the change on the webpage .. GOODTIMES ! pid = Runtime.start("pid","PID")
pid = Runtime.start('pid', 'PID')
def fram_write8(addr: number, val: number): pins.digital_write_pin(DigitalPin.P16, 0) pins.spi_write(OPCODE_WRITE) pins.spi_write(addr >> 8) pins.spi_write(addr & 0xff) pins.spi_write(val) pins.digital_write_pin(DigitalPin.P16, 1) def on_button_pressed_a(): fram_write8(0, 10) basic.pause(100) serial.write_line("FRAM at 0xFF: " + ("" + str(fram_read8(0)))) input.on_button_pressed(Button.A, on_button_pressed_a) def fram_getDeviceID(): global whoami, wh0, wh1, wh2, wh3 pins.digital_write_pin(DigitalPin.P16, 0) whoami = pins.spi_write(OPCODE_RDID) wh0 = pins.spi_write(255) wh1 = pins.spi_write(255) wh2 = pins.spi_write(255) wh3 = pins.spi_write(255) pins.digital_write_pin(DigitalPin.P16, 1) serial.write_line("WHOAMI: " + ("" + str(whoami)) + " wh0:" + ("" + str(wh0)) + " wh1:" + ("" + str(wh1)) + " wh2:" + ("" + str(wh2)) + " wh3:" + ("" + str(wh3))) if wh1 == 127: serial.write_line("FRAM Connected") def fram_write_enable(): global wh3 pins.digital_write_pin(DigitalPin.P16, 0) wh3 = pins.spi_write(OPCODE_WREN) pins.digital_write_pin(DigitalPin.P16, 1) serial.write_line("FRAM Writes Enabled") def fram_read8(addr: number): global wh3 pins.digital_write_pin(DigitalPin.P16, 0) pins.spi_write(OPCODE_READ) pins.spi_write(addr >> 8) pins.spi_write(addr & 0xff) wh3 = pins.spi_write(255) pins.digital_write_pin(DigitalPin.P16, 1) return wh3 wh3 = 0 wh2 = 0 wh1 = 0 wh0 = 0 whoami = 0 OPCODE_WREN = 0 OPCODE_RDID = 0 OPCODE_READ = 3 OPCODE_WRITE = 2 OPCODE_RDID = 159 OPCODE_WREN = 6 pins.digital_write_pin(DigitalPin.P16, 1) pins.spi_pins(DigitalPin.P15, DigitalPin.P14, DigitalPin.P13) pins.spi_format(8, 0) pins.spi_frequency(1000000) fram_getDeviceID() fram_write_enable()
def fram_write8(addr: number, val: number): pins.digital_write_pin(DigitalPin.P16, 0) pins.spi_write(OPCODE_WRITE) pins.spi_write(addr >> 8) pins.spi_write(addr & 255) pins.spi_write(val) pins.digital_write_pin(DigitalPin.P16, 1) def on_button_pressed_a(): fram_write8(0, 10) basic.pause(100) serial.write_line('FRAM at 0xFF: ' + ('' + str(fram_read8(0)))) input.on_button_pressed(Button.A, on_button_pressed_a) def fram_get_device_id(): global whoami, wh0, wh1, wh2, wh3 pins.digital_write_pin(DigitalPin.P16, 0) whoami = pins.spi_write(OPCODE_RDID) wh0 = pins.spi_write(255) wh1 = pins.spi_write(255) wh2 = pins.spi_write(255) wh3 = pins.spi_write(255) pins.digital_write_pin(DigitalPin.P16, 1) serial.write_line('WHOAMI: ' + ('' + str(whoami)) + ' wh0:' + ('' + str(wh0)) + ' wh1:' + ('' + str(wh1)) + ' wh2:' + ('' + str(wh2)) + ' wh3:' + ('' + str(wh3))) if wh1 == 127: serial.write_line('FRAM Connected') def fram_write_enable(): global wh3 pins.digital_write_pin(DigitalPin.P16, 0) wh3 = pins.spi_write(OPCODE_WREN) pins.digital_write_pin(DigitalPin.P16, 1) serial.write_line('FRAM Writes Enabled') def fram_read8(addr: number): global wh3 pins.digital_write_pin(DigitalPin.P16, 0) pins.spi_write(OPCODE_READ) pins.spi_write(addr >> 8) pins.spi_write(addr & 255) wh3 = pins.spi_write(255) pins.digital_write_pin(DigitalPin.P16, 1) return wh3 wh3 = 0 wh2 = 0 wh1 = 0 wh0 = 0 whoami = 0 opcode_wren = 0 opcode_rdid = 0 opcode_read = 3 opcode_write = 2 opcode_rdid = 159 opcode_wren = 6 pins.digital_write_pin(DigitalPin.P16, 1) pins.spi_pins(DigitalPin.P15, DigitalPin.P14, DigitalPin.P13) pins.spi_format(8, 0) pins.spi_frequency(1000000) fram_get_device_id() fram_write_enable()
class GumoBaseError(RuntimeError): pass class ConfigurationError(GumoBaseError): pass class ServiceAccountConfigurationError(ConfigurationError): pass class ObjectNotoFoundError(GumoBaseError): pass
class Gumobaseerror(RuntimeError): pass class Configurationerror(GumoBaseError): pass class Serviceaccountconfigurationerror(ConfigurationError): pass class Objectnotofounderror(GumoBaseError): pass
class CrudBackend(object): def __init__(self): pass def create(self, key, data=None): return NotImplementedError() def read(self, key): return NotImplementedError() def update(self, key, data): return NotImplementedError() def delete(self, key): return NotImplementedError() def has_node(self, key): return NotImplementedError()
class Crudbackend(object): def __init__(self): pass def create(self, key, data=None): return not_implemented_error() def read(self, key): return not_implemented_error() def update(self, key, data): return not_implemented_error() def delete(self, key): return not_implemented_error() def has_node(self, key): return not_implemented_error()
class CommonInfoAdminMixin: def get_readonly_fields(self, request, obj=None): return super().get_readonly_fields(request, obj) + ('created_by', 'lastmodified_by', 'created_at', 'lastmodified_at') def save_form(self, request, form, change): if form.instance and request.user: if not form.instance.id: form.instance.created_by = request.user form.instance.lastmodified_by = request.user return super().save_form(request, form, change)
class Commoninfoadminmixin: def get_readonly_fields(self, request, obj=None): return super().get_readonly_fields(request, obj) + ('created_by', 'lastmodified_by', 'created_at', 'lastmodified_at') def save_form(self, request, form, change): if form.instance and request.user: if not form.instance.id: form.instance.created_by = request.user form.instance.lastmodified_by = request.user return super().save_form(request, form, change)
# krotki k = ('a', 1, 'qqq', {1: 'x', 2: 'y'}) print(k) print(k[0]) print(k[-1]) print(k[1:-1]) print('------operacje ----------') # k.append('www') # k.remove('qq') print(k.index(1)) # print k.index('b') print(k.count('b')) print(len(k)) k[-1][1] = 'zzz' print(k) print('a' in k, 'z' in k) # krotka jako lista l = list(k) print(l) l[0] = 'x' # i znow jako krotka k = tuple(l) print(k) print(dir(tuple)) x = [] x.append(x) l = tuple(x) print(l)
k = ('a', 1, 'qqq', {1: 'x', 2: 'y'}) print(k) print(k[0]) print(k[-1]) print(k[1:-1]) print('------operacje ----------') print(k.index(1)) print(k.count('b')) print(len(k)) k[-1][1] = 'zzz' print(k) print('a' in k, 'z' in k) l = list(k) print(l) l[0] = 'x' k = tuple(l) print(k) print(dir(tuple)) x = [] x.append(x) l = tuple(x) print(l)
# # Licensed to the Apache Software Foundation (ASF) under one # or more contributor license agreements. See the NOTICE file # distributed with this work for additional information # regarding copyright ownership. The ASF licenses this file # to you under the Apache License, Version 2.0 (the # "License"); you may not use this file except in compliance # with the License. You may obtain a copy of the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or agreed to in writing, # software distributed under the License is distributed on an # "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY # KIND, either express or implied. See the License for the # specific language governing permissions and limitations # under the License. # def _assemble_versioned_impl(ctx): if not ctx.attr.version_file: version_file = ctx.actions.declare_file(ctx.attr.name + "__do_not_reference.version") version = ctx.var.get('version', '0.0.0') ctx.actions.run_shell( inputs = [], outputs = [version_file], command = "echo {} > {}".format(version, version_file.path) ) else: version_file = ctx.file.version_file # assemble-version.py $output $version $targets ctx.actions.run( inputs = ctx.files.targets + [version_file], outputs = [ctx.outputs.archive], executable = ctx.executable._assemble_versioned_py, arguments = [ctx.outputs.archive.path, version_file.path] + [target.path for target in ctx.files.targets], progress_message = "Versioning assembled distributions to {}".format(version_file.short_path) ) return DefaultInfo(data_runfiles = ctx.runfiles(files=[ctx.outputs.archive])) assemble_versioned = rule( attrs = { "targets": attr.label_list( allow_files = [".zip", ".tar.gz"], doc = "Archives to version and put into output archive" ), "version_file": attr.label( allow_single_file = True, doc = "File containing version string" ), "_assemble_versioned_py": attr.label( default = "//common/assemble_versioned:assemble-versioned", executable = True, cfg = "host" ) }, implementation = _assemble_versioned_impl, outputs = { "archive": "%{name}.zip" }, output_to_genfiles = True, doc = "Version multiple archives for subsequent simultaneous deployment" )
def _assemble_versioned_impl(ctx): if not ctx.attr.version_file: version_file = ctx.actions.declare_file(ctx.attr.name + '__do_not_reference.version') version = ctx.var.get('version', '0.0.0') ctx.actions.run_shell(inputs=[], outputs=[version_file], command='echo {} > {}'.format(version, version_file.path)) else: version_file = ctx.file.version_file ctx.actions.run(inputs=ctx.files.targets + [version_file], outputs=[ctx.outputs.archive], executable=ctx.executable._assemble_versioned_py, arguments=[ctx.outputs.archive.path, version_file.path] + [target.path for target in ctx.files.targets], progress_message='Versioning assembled distributions to {}'.format(version_file.short_path)) return default_info(data_runfiles=ctx.runfiles(files=[ctx.outputs.archive])) assemble_versioned = rule(attrs={'targets': attr.label_list(allow_files=['.zip', '.tar.gz'], doc='Archives to version and put into output archive'), 'version_file': attr.label(allow_single_file=True, doc='File containing version string'), '_assemble_versioned_py': attr.label(default='//common/assemble_versioned:assemble-versioned', executable=True, cfg='host')}, implementation=_assemble_versioned_impl, outputs={'archive': '%{name}.zip'}, output_to_genfiles=True, doc='Version multiple archives for subsequent simultaneous deployment')
MODAL_REQUEST = { "callback_id": "change_request_review", "type": "modal", "title": { "type": "plain_text", "text": "Switcher Change Request" }, "submit": { "type": "plain_text", "text": "Submit" }, "close": { "type": "plain_text", "text": "Cancel" }, "blocks": [ { "type": "context", "elements": [ { "type": "plain_text", "text": "Select the options below to request a Switcher status change." } ] }, { "type": "divider" }, { "type": "section", "text": { "type": "mrkdwn", "text": "Environment" }, "accessory": { "type": "static_select", "placeholder": { "type": "plain_text", "text": "Select an item" }, "options": [], "action_id": "selection_environment" } }, { "type": "section", "text": { "type": "mrkdwn", "text": "Group" }, "accessory": { "type": "static_select", "placeholder": { "type": "plain_text", "text": "Select an item" }, "options": [ { "text": { "type": "plain_text", "text": "-" }, "value": "-" } ], "action_id": "selection_group" } }, { "type": "section", "text": { "type": "mrkdwn", "text": "Switcher" }, "accessory": { "type": "static_select", "placeholder": { "type": "plain_text", "text": "Select an item" }, "options": [ { "text": { "type": "plain_text", "text": "-" }, "value": "-" } ], "action_id": "selection_switcher" } }, { "type": "section", "text": { "type": "mrkdwn", "text": "Status" }, "accessory": { "type": "static_select", "placeholder": { "type": "plain_text", "text": "Select an item" }, "options": [ { "text": { "type": "plain_text", "text": "-" }, "value": "-" } ], "action_id": "selection_status" } } ] } APP_HOME = { "type": "home", "blocks": [ { "type": "image", "image_url": "https://raw.githubusercontent.com/switcherapi/switcherapi-assets/master/samples/slack/logo.png", "alt_text": "Switcher Slack App" }, { "type": "context", "elements": [ { "type": "plain_text", "text": "What are you up today?" } ] }, { "type": "divider" }, { "type": "actions", "elements": [ { "type": "button", "text": { "type": "plain_text", "text": "Open Change Request" }, "action_id": "change_request" } ] } ] }
modal_request = {'callback_id': 'change_request_review', 'type': 'modal', 'title': {'type': 'plain_text', 'text': 'Switcher Change Request'}, 'submit': {'type': 'plain_text', 'text': 'Submit'}, 'close': {'type': 'plain_text', 'text': 'Cancel'}, 'blocks': [{'type': 'context', 'elements': [{'type': 'plain_text', 'text': 'Select the options below to request a Switcher status change.'}]}, {'type': 'divider'}, {'type': 'section', 'text': {'type': 'mrkdwn', 'text': 'Environment'}, 'accessory': {'type': 'static_select', 'placeholder': {'type': 'plain_text', 'text': 'Select an item'}, 'options': [], 'action_id': 'selection_environment'}}, {'type': 'section', 'text': {'type': 'mrkdwn', 'text': 'Group'}, 'accessory': {'type': 'static_select', 'placeholder': {'type': 'plain_text', 'text': 'Select an item'}, 'options': [{'text': {'type': 'plain_text', 'text': '-'}, 'value': '-'}], 'action_id': 'selection_group'}}, {'type': 'section', 'text': {'type': 'mrkdwn', 'text': 'Switcher'}, 'accessory': {'type': 'static_select', 'placeholder': {'type': 'plain_text', 'text': 'Select an item'}, 'options': [{'text': {'type': 'plain_text', 'text': '-'}, 'value': '-'}], 'action_id': 'selection_switcher'}}, {'type': 'section', 'text': {'type': 'mrkdwn', 'text': 'Status'}, 'accessory': {'type': 'static_select', 'placeholder': {'type': 'plain_text', 'text': 'Select an item'}, 'options': [{'text': {'type': 'plain_text', 'text': '-'}, 'value': '-'}], 'action_id': 'selection_status'}}]} app_home = {'type': 'home', 'blocks': [{'type': 'image', 'image_url': 'https://raw.githubusercontent.com/switcherapi/switcherapi-assets/master/samples/slack/logo.png', 'alt_text': 'Switcher Slack App'}, {'type': 'context', 'elements': [{'type': 'plain_text', 'text': 'What are you up today?'}]}, {'type': 'divider'}, {'type': 'actions', 'elements': [{'type': 'button', 'text': {'type': 'plain_text', 'text': 'Open Change Request'}, 'action_id': 'change_request'}]}]}
# File: wildfire_consts.py # # Copyright (c) 2016-2022 Splunk Inc. # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or agreed to in writing, software distributed under # the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, # either express or implied. See the License for the specific language governing permissions # and limitations under the License. WILDFIRE_JSON_BASE_URL = "base_url" WILDFIRE_JSON_TASK_ID = "task_id" WILDFIRE_JSON_API_KEY = "api_key" # pragma: allowlist secret WILDFIRE_JSON_MALWARE = "malware" WILDFIRE_JSON_TASK_ID = "id" WILDFIRE_JSON_URL = "url" WILDFIRE_JSON_HASH = "hash" WILDFIRE_JSON_PLATFORM = "platform" WILDFIRE_JSON_POLL_TIMEOUT_MINS = "timeout" WILDFIRE_ERR_UNABLE_TO_PARSE_REPLY = "Unable to parse reply from device" WILDFIRE_ERR_REPLY_FORMAT_KEY_MISSING = "None '{key}' missing in reply from device" WILDFIRE_ERR_REPLY_NOT_SUCCESS = "REST call returned '{status}'" WILDFIRE_SUCC_REST_CALL_SUCCEEDED = "REST Api call succeeded" WILDFIRE_ERR_REST_API = "REST Api Call returned error, status_code: {status_code}, detail: {detail}" WILDFIRE_ERR_FILE_NOT_FOUND_IN_VAULT = "File not found in vault" WILDFIRE_INVALID_INT = "Please provide a valid integer value in the {param}" WILDFIRE_ERR_INVALID_PARAM = "Please provide a non-zero positive integer in the {param}" WILDFIRE_ERR_NEGATIVE_INT_PARAM = "Please provide a valid non-negative integer value in the {param}" WILDFIRE_TEST_PDF_FILE = "wildfire_test_connectivity.pdf" WILDFIRE_SLEEP_SECS = 10 WILDFIRE_MSG_REPORT_PENDING = "Report Pending" WILDFIRE_MSG_MAX_POLLS_REACHED = ("Reached max polling attempts. " "Please use the MD5 or Sha256 of the file as a parameter to <b>get report</b> to query the report status.") WILDFIRE_TIMEOUT = "'timeout' action parameter" # in minutes WILDFIRE_MAX_TIMEOUT_DEF = 10
wildfire_json_base_url = 'base_url' wildfire_json_task_id = 'task_id' wildfire_json_api_key = 'api_key' wildfire_json_malware = 'malware' wildfire_json_task_id = 'id' wildfire_json_url = 'url' wildfire_json_hash = 'hash' wildfire_json_platform = 'platform' wildfire_json_poll_timeout_mins = 'timeout' wildfire_err_unable_to_parse_reply = 'Unable to parse reply from device' wildfire_err_reply_format_key_missing = "None '{key}' missing in reply from device" wildfire_err_reply_not_success = "REST call returned '{status}'" wildfire_succ_rest_call_succeeded = 'REST Api call succeeded' wildfire_err_rest_api = 'REST Api Call returned error, status_code: {status_code}, detail: {detail}' wildfire_err_file_not_found_in_vault = 'File not found in vault' wildfire_invalid_int = 'Please provide a valid integer value in the {param}' wildfire_err_invalid_param = 'Please provide a non-zero positive integer in the {param}' wildfire_err_negative_int_param = 'Please provide a valid non-negative integer value in the {param}' wildfire_test_pdf_file = 'wildfire_test_connectivity.pdf' wildfire_sleep_secs = 10 wildfire_msg_report_pending = 'Report Pending' wildfire_msg_max_polls_reached = 'Reached max polling attempts. Please use the MD5 or Sha256 of the file as a parameter to <b>get report</b> to query the report status.' wildfire_timeout = "'timeout' action parameter" wildfire_max_timeout_def = 10
birds = ( ('Passerculus sandwichensis','Savannah sparrow',18.7), ('Delichon urbica','House martin',19), ('Junco phaeonotus','Yellow-eyed junco',19.5), ('Junco hyemalis','Dark-eyed junco',19.6), ('Tachycineata bicolor','Tree swallow',20.2), ) #(1) Write three separate list comprehensions that create three different # lists containing the latin names, common names and mean body masses for # each species in birds, respectively. # (2) Now do the same using conventional loops (you can shoose to do this # before 1 !). # ANNOTATE WHAT EVERY BLOCK OR IF NECESSARY, LINE IS DOING! # ALSO, PLEASE INCLUDE A DOCSTRING AT THE BEGINNING OF THIS FILE THAT # SAYS WHAT THE SCRIPT DOES AND WHO THE AUTHOR IS.
birds = (('Passerculus sandwichensis', 'Savannah sparrow', 18.7), ('Delichon urbica', 'House martin', 19), ('Junco phaeonotus', 'Yellow-eyed junco', 19.5), ('Junco hyemalis', 'Dark-eyed junco', 19.6), ('Tachycineata bicolor', 'Tree swallow', 20.2))
COLORS = { 'PROBLEM': 'red', 'RECOVERY': 'green', 'UP': 'green', 'ACKNOWLEDGEMENT': 'purple', 'FLAPPINGSTART': 'yellow', 'WARNING': 'yellow', 'UNKNOWN': 'gray', 'CRITICAL': 'red', 'FLAPPINGEND': 'green', 'FLAPPINGSTOP': 'green', 'FLAPPINGDISABLED': 'purple', 'DOWNTIMESTART': 'red', 'DOWNTIMESTOP': 'green', 'DOWNTIMEEND': 'green' }
colors = {'PROBLEM': 'red', 'RECOVERY': 'green', 'UP': 'green', 'ACKNOWLEDGEMENT': 'purple', 'FLAPPINGSTART': 'yellow', 'WARNING': 'yellow', 'UNKNOWN': 'gray', 'CRITICAL': 'red', 'FLAPPINGEND': 'green', 'FLAPPINGSTOP': 'green', 'FLAPPINGDISABLED': 'purple', 'DOWNTIMESTART': 'red', 'DOWNTIMESTOP': 'green', 'DOWNTIMEEND': 'green'}
def load(h): return ({'abbr': 0, 'code': 0, 'title': 'Mass density (concentration)', 'units': 'kg m-3'}, {'abbr': 1, 'code': 1, 'title': 'Column-integrated mass density', 'units': 'kg m-2'}, {'abbr': 2, 'code': 2, 'title': 'Mass mixing ratio (mass fraction in air)', 'units': 'kg/kg'}, {'abbr': 3, 'code': 3, 'title': 'Atmosphere emission mass flux', 'units': 'kg m-2 s-1'}, {'abbr': 4, 'code': 4, 'title': 'Atmosphere net production mass flux', 'units': 'kg m-2 s-1'}, {'abbr': 5, 'code': 5, 'title': 'Atmosphere net production and emission mass flux', 'units': 'kg m-2 s-1'}, {'abbr': 6, 'code': 6, 'title': 'Surface dry deposition mass flux', 'units': 'kg m-2 s-1'}, {'abbr': 7, 'code': 7, 'title': 'Surface wet deposition mass flux', 'units': 'kg m-2 s-1'}, {'abbr': 8, 'code': 8, 'title': 'Atmosphere re-emission mass flux', 'units': 'kg m-2 s-1'}, {'abbr': 9, 'code': 9, 'title': 'Wet deposition by large-scale precipitation mass flux', 'units': 'kg m-2 s-1'}, {'abbr': 10, 'code': 10, 'title': 'Wet deposition by convective precipitation mass flux', 'units': 'kg m-2 s-1'}, {'abbr': 11, 'code': 11, 'title': 'Sedimentation mass flux', 'units': 'kg m-2 s-1'}, {'abbr': 12, 'code': 12, 'title': 'Dry deposition mass flux', 'units': 'kg m-2 s-1'}, {'abbr': 13, 'code': 13, 'title': 'Transfer from hydrophobic to hydrophilic', 'units': 'kg kg-1 s-1'}, {'abbr': 14, 'code': 14, 'title': 'Transfer from SO2 (sulphur dioxide) to SO4 (sulphate)', 'units': 'kg kg-1 s-1'}, {'abbr': 50, 'code': 50, 'title': 'Amount in atmosphere', 'units': 'mol'}, {'abbr': 51, 'code': 51, 'title': 'Concentration in air', 'units': 'mol m-3'}, {'abbr': 52, 'code': 52, 'title': 'Volume mixing ratio (fraction in air)', 'units': 'mol/mol'}, {'abbr': 53, 'code': 53, 'title': 'Chemical gross production rate of concentration', 'units': 'mol m-3 s-1'}, {'abbr': 54, 'code': 54, 'title': 'Chemical gross destruction rate of concentration', 'units': 'mol m-3 s-1'}, {'abbr': 55, 'code': 55, 'title': 'Surface flux', 'units': 'mol m-2 s-1'}, {'abbr': 56, 'code': 56, 'title': 'Changes of amount in atmosphere', 'units': 'mol/s'}, {'abbr': 57, 'code': 57, 'title': 'Total yearly average burden of the atmosphere', 'units': 'mol'}, {'abbr': 58, 'code': 58, 'title': 'Total yearly averaged atmospheric loss', 'units': 'mol/s'}, {'abbr': 59, 'code': 59, 'title': 'Aerosol number concentration', 'units': 'm-3'}, {'abbr': 60, 'code': 60, 'title': 'Aerosol specific number concentration', 'units': 'kg-1'}, {'abbr': 61, 'code': 61, 'title': 'Maximum of mass density in layer', 'units': 'kg m-3'}, {'abbr': 62, 'code': 62, 'title': 'Height of maximum mass density', 'units': 'm'}, {'abbr': 63, 'code': 63, 'title': 'Column-averaged mass density in layer', 'units': 'kg m-3'}, {'abbr': 100, 'code': 100, 'title': 'Surface area density (aerosol)', 'units': 'm-1'}, {'abbr': 101, 'code': 101, 'title': 'Vertical visual range', 'units': 'm'}, {'abbr': 102, 'code': 102, 'title': 'Aerosol optical thickness', 'units': 'Numeric'}, {'abbr': 103, 'code': 103, 'title': 'Single scattering albedo', 'units': 'Numeric'}, {'abbr': 104, 'code': 104, 'title': 'Asymmetry factor', 'units': 'Numeric'}, {'abbr': 105, 'code': 105, 'title': 'Aerosol extinction coefficient', 'units': 'm-1'}, {'abbr': 106, 'code': 106, 'title': 'Aerosol absorption coefficient', 'units': 'm-1'}, {'abbr': 107, 'code': 107, 'title': 'Aerosol lidar backscatter from satellite', 'units': 'm-1 sr-1'}, {'abbr': 108, 'code': 108, 'title': 'Aerosol lidar backscatter from the ground', 'units': 'm-1 sr-1'}, {'abbr': 109, 'code': 109, 'title': 'Aerosol lidar extinction from satellite', 'units': 'm-1'}, {'abbr': 110, 'code': 110, 'title': 'Aerosol lidar extinction from the ground', 'units': 'm-1'}, {'abbr': 111, 'code': 111, 'title': 'Angstrom exponent', 'units': 'Numeric'}, {'abbr': None, 'code': 255, 'title': 'Missing'})
def load(h): return ({'abbr': 0, 'code': 0, 'title': 'Mass density (concentration)', 'units': 'kg m-3'}, {'abbr': 1, 'code': 1, 'title': 'Column-integrated mass density', 'units': 'kg m-2'}, {'abbr': 2, 'code': 2, 'title': 'Mass mixing ratio (mass fraction in air)', 'units': 'kg/kg'}, {'abbr': 3, 'code': 3, 'title': 'Atmosphere emission mass flux', 'units': 'kg m-2 s-1'}, {'abbr': 4, 'code': 4, 'title': 'Atmosphere net production mass flux', 'units': 'kg m-2 s-1'}, {'abbr': 5, 'code': 5, 'title': 'Atmosphere net production and emission mass flux', 'units': 'kg m-2 s-1'}, {'abbr': 6, 'code': 6, 'title': 'Surface dry deposition mass flux', 'units': 'kg m-2 s-1'}, {'abbr': 7, 'code': 7, 'title': 'Surface wet deposition mass flux', 'units': 'kg m-2 s-1'}, {'abbr': 8, 'code': 8, 'title': 'Atmosphere re-emission mass flux', 'units': 'kg m-2 s-1'}, {'abbr': 9, 'code': 9, 'title': 'Wet deposition by large-scale precipitation mass flux', 'units': 'kg m-2 s-1'}, {'abbr': 10, 'code': 10, 'title': 'Wet deposition by convective precipitation mass flux', 'units': 'kg m-2 s-1'}, {'abbr': 11, 'code': 11, 'title': 'Sedimentation mass flux', 'units': 'kg m-2 s-1'}, {'abbr': 12, 'code': 12, 'title': 'Dry deposition mass flux', 'units': 'kg m-2 s-1'}, {'abbr': 13, 'code': 13, 'title': 'Transfer from hydrophobic to hydrophilic', 'units': 'kg kg-1 s-1'}, {'abbr': 14, 'code': 14, 'title': 'Transfer from SO2 (sulphur dioxide) to SO4 (sulphate)', 'units': 'kg kg-1 s-1'}, {'abbr': 50, 'code': 50, 'title': 'Amount in atmosphere', 'units': 'mol'}, {'abbr': 51, 'code': 51, 'title': 'Concentration in air', 'units': 'mol m-3'}, {'abbr': 52, 'code': 52, 'title': 'Volume mixing ratio (fraction in air)', 'units': 'mol/mol'}, {'abbr': 53, 'code': 53, 'title': 'Chemical gross production rate of concentration', 'units': 'mol m-3 s-1'}, {'abbr': 54, 'code': 54, 'title': 'Chemical gross destruction rate of concentration', 'units': 'mol m-3 s-1'}, {'abbr': 55, 'code': 55, 'title': 'Surface flux', 'units': 'mol m-2 s-1'}, {'abbr': 56, 'code': 56, 'title': 'Changes of amount in atmosphere', 'units': 'mol/s'}, {'abbr': 57, 'code': 57, 'title': 'Total yearly average burden of the atmosphere', 'units': 'mol'}, {'abbr': 58, 'code': 58, 'title': 'Total yearly averaged atmospheric loss', 'units': 'mol/s'}, {'abbr': 59, 'code': 59, 'title': 'Aerosol number concentration', 'units': 'm-3'}, {'abbr': 60, 'code': 60, 'title': 'Aerosol specific number concentration', 'units': 'kg-1'}, {'abbr': 61, 'code': 61, 'title': 'Maximum of mass density in layer', 'units': 'kg m-3'}, {'abbr': 62, 'code': 62, 'title': 'Height of maximum mass density', 'units': 'm'}, {'abbr': 63, 'code': 63, 'title': 'Column-averaged mass density in layer', 'units': 'kg m-3'}, {'abbr': 100, 'code': 100, 'title': 'Surface area density (aerosol)', 'units': 'm-1'}, {'abbr': 101, 'code': 101, 'title': 'Vertical visual range', 'units': 'm'}, {'abbr': 102, 'code': 102, 'title': 'Aerosol optical thickness', 'units': 'Numeric'}, {'abbr': 103, 'code': 103, 'title': 'Single scattering albedo', 'units': 'Numeric'}, {'abbr': 104, 'code': 104, 'title': 'Asymmetry factor', 'units': 'Numeric'}, {'abbr': 105, 'code': 105, 'title': 'Aerosol extinction coefficient', 'units': 'm-1'}, {'abbr': 106, 'code': 106, 'title': 'Aerosol absorption coefficient', 'units': 'm-1'}, {'abbr': 107, 'code': 107, 'title': 'Aerosol lidar backscatter from satellite', 'units': 'm-1 sr-1'}, {'abbr': 108, 'code': 108, 'title': 'Aerosol lidar backscatter from the ground', 'units': 'm-1 sr-1'}, {'abbr': 109, 'code': 109, 'title': 'Aerosol lidar extinction from satellite', 'units': 'm-1'}, {'abbr': 110, 'code': 110, 'title': 'Aerosol lidar extinction from the ground', 'units': 'm-1'}, {'abbr': 111, 'code': 111, 'title': 'Angstrom exponent', 'units': 'Numeric'}, {'abbr': None, 'code': 255, 'title': 'Missing'})
#=========================================================================== # # Port to use for the web server. Configure the Eagle to use this # port as it's 'cloud provider' using http://host:PORT # #=========================================================================== httpPort = 22042 #=========================================================================== # # MQTT topic names # #=========================================================================== # Meter reading topic (reports current meter reading in kWh) mqttEnergy = 'power/elec/Home/energy' # Instantaneous power usage topic (reports power usage in W) mqttPower = 'power/elec/Home/power' #Current price topic (returns current price of electricity from meter) mqttPrice = 'power/elec/Home/price' #Current rate label (returns rate label from meter) mqttRateLabel = 'power/elec/Home/ratelabel' #=========================================================================== # # Logging configuration. Env variables are allowed in the file name. # #=========================================================================== logFile = '/var/log/tHome/eagle.log' logLevel = 20
http_port = 22042 mqtt_energy = 'power/elec/Home/energy' mqtt_power = 'power/elec/Home/power' mqtt_price = 'power/elec/Home/price' mqtt_rate_label = 'power/elec/Home/ratelabel' log_file = '/var/log/tHome/eagle.log' log_level = 20