content
stringlengths
7
1.05M
fixed_cases
stringlengths
1
1.28M
class noise: def __init__(self, mean=0., std = 1., mag = 0.1): self.mean = mean self.std = std self.mag = mag self.rg = Generator(PCG64()) def draw(self): return self.mag * self.rg.normal(self.mean, self.std)
class Noise: def __init__(self, mean=0.0, std=1.0, mag=0.1): self.mean = mean self.std = std self.mag = mag self.rg = generator(pcg64()) def draw(self): return self.mag * self.rg.normal(self.mean, self.std)
# _*_coding:utf-8_*_ class Solution: def ReverseSentence(self, s): if None is s or len(s) <= 0: return "" word = "" result = "" for item in s: if ' ' == item: result = word + result result = item + result word = "" else: word += item result = word + result return result s = Solution() print(s.ReverseSentence("I am a student.")) print(s.ReverseSentence("")) print(s.ReverseSentence(None))
class Solution: def reverse_sentence(self, s): if None is s or len(s) <= 0: return '' word = '' result = '' for item in s: if ' ' == item: result = word + result result = item + result word = '' else: word += item result = word + result return result s = solution() print(s.ReverseSentence('I am a student.')) print(s.ReverseSentence('')) print(s.ReverseSentence(None))
""" Given an array of integers A and let n to be its length. Assume Bk to be an array obtained by rotating the array A k positions clock-wise, we define a "rotation function" F on A as follow: F(k) = 0 * Bk[0] + 1 * Bk[1] + ... + (n-1) * Bk[n-1]. Calculate the maximum value of F(0), F(1), ..., F(n-1). Note: n is guaranteed to be less than 105. Example: A = [4, 3, 2, 6] F(0) = (0 * 4) + (1 * 3) + (2 * 2) + (3 * 6) = 0 + 3 + 4 + 18 = 25 F(1) = (0 * 6) + (1 * 4) + (2 * 3) + (3 * 2) = 0 + 4 + 6 + 6 = 16 F(2) = (0 * 2) + (1 * 6) + (2 * 4) + (3 * 3) = 0 + 6 + 8 + 9 = 23 F(3) = (0 * 3) + (1 * 2) + (2 * 6) + (3 * 4) = 0 + 2 + 12 + 12 = 26 So the maximum value of F(0), F(1), F(2), F(3) is F(3) = 26. """ class Solution(object): def maxRotateFunction(self, A): """ :type A: List[int] :rtype: int """ if not A: return 0 size = len(A) curr = sum( [index * num for (index, num) in enumerate(A)] ) best = curr total = sum(A) for index in range(size-1, 0, -1): num = A[index] curr = curr + total - num * (size) best = max(best, curr) return best
""" Given an array of integers A and let n to be its length. Assume Bk to be an array obtained by rotating the array A k positions clock-wise, we define a "rotation function" F on A as follow: F(k) = 0 * Bk[0] + 1 * Bk[1] + ... + (n-1) * Bk[n-1]. Calculate the maximum value of F(0), F(1), ..., F(n-1). Note: n is guaranteed to be less than 105. Example: A = [4, 3, 2, 6] F(0) = (0 * 4) + (1 * 3) + (2 * 2) + (3 * 6) = 0 + 3 + 4 + 18 = 25 F(1) = (0 * 6) + (1 * 4) + (2 * 3) + (3 * 2) = 0 + 4 + 6 + 6 = 16 F(2) = (0 * 2) + (1 * 6) + (2 * 4) + (3 * 3) = 0 + 6 + 8 + 9 = 23 F(3) = (0 * 3) + (1 * 2) + (2 * 6) + (3 * 4) = 0 + 2 + 12 + 12 = 26 So the maximum value of F(0), F(1), F(2), F(3) is F(3) = 26. """ class Solution(object): def max_rotate_function(self, A): """ :type A: List[int] :rtype: int """ if not A: return 0 size = len(A) curr = sum([index * num for (index, num) in enumerate(A)]) best = curr total = sum(A) for index in range(size - 1, 0, -1): num = A[index] curr = curr + total - num * size best = max(best, curr) return best
old_ops = parent().findChildren( type = containerCOMP, depth = 1 ) config_DAT = op( 'select_config' ) def delete_old_ops(): for each_op in old_ops: each_op.destroy() return def create_new_ops(): new_op = parent().create( containerCOMP, 'container_' + config_DAT[ 0, 0 ] ) new_op.par.externaltox = config_DAT[ 0, 1 ] new_op.par.savebackup = 0 new_op.par.reinitnet.pulse() return delete_old_ops() create_new_ops()
old_ops = parent().findChildren(type=containerCOMP, depth=1) config_dat = op('select_config') def delete_old_ops(): for each_op in old_ops: each_op.destroy() return def create_new_ops(): new_op = parent().create(containerCOMP, 'container_' + config_DAT[0, 0]) new_op.par.externaltox = config_DAT[0, 1] new_op.par.savebackup = 0 new_op.par.reinitnet.pulse() return delete_old_ops() create_new_ops()
def get_digits(n): while str(n): yield n % 10 n = n // 10 if not n: break digit = get_digits(1729) print(next(digit)) # 9 print(next(digit)) # 2 print(next(digit)) # 7 print(next(digit)) # 1 for digit in get_digits(74831965): print(digit) # 5 # 6 # 9 # 1 # 3 # 8 # 4 # 7 # >>> def letter(name): # ... for ch in name: # ... yield ch # ... # >>> # >>> char = letter("RISHIKESH") # >>> # >>> next(char) # 'R' # >>> # >>> "Second letter is my name is: " + next(char) # 'Second letter is my name is: I' # >>> # >>> "3rd one: " + next(char) # '3rd one: S' # >>> # >>> next(char) # 'H' # >>>
def get_digits(n): while str(n): yield (n % 10) n = n // 10 if not n: break digit = get_digits(1729) print(next(digit)) print(next(digit)) print(next(digit)) print(next(digit)) for digit in get_digits(74831965): print(digit)
# Project Euler # Problem 18 - Maximum path sum I # (c) 2020-2022 Jordan Sola. All rights reserved. (MIT License) # Written by Jordan Sola 2021 def compute(): set = [ [75], [95,64], [17,47,82], [18,35,87,10], [20, 4,82,47,65], [19, 1,23,75, 3,34], [88, 2,77,73, 7,63,67], [99,65, 4,28,6,16,70,92], [41,41,26,56,83,40,80,70,33], [41,48,72,33,47,32,37,16,94,29], [53,71,44,65,25,43,91,52,97,51,14], [70,11,33,28,77,73,17,78,39,68,17,57], [91,71,52,38,17,14,91,43,58,50,27,29,48], [63,66, 4,68,89,53,67,30,73,16,69,87,40,31], [ 4,62,98,27,23, 9,70,98,73,93,38,53,60, 4,23] ] # - Adding the maximum value from the adjacent leafs in a # tree, leading up to the root of the tree, gives us the # absolute max sum from all paths at the root node. for row in range(len(set)-1 , 0, -1): for col in range(0, row): set[row-1][col] += max(set[row][col], set[row][col+1]) max_path = set[0][0] return max_path if __name__ == "__main__": print(compute()) # Answer: 1074 # Asymptotic complexity: O(N) # M1 (3.2 GHz CPU) ARMv8-A64 (64 bit): 10000 loops, best of 5: 21.1 usec per loop
def compute(): set = [[75], [95, 64], [17, 47, 82], [18, 35, 87, 10], [20, 4, 82, 47, 65], [19, 1, 23, 75, 3, 34], [88, 2, 77, 73, 7, 63, 67], [99, 65, 4, 28, 6, 16, 70, 92], [41, 41, 26, 56, 83, 40, 80, 70, 33], [41, 48, 72, 33, 47, 32, 37, 16, 94, 29], [53, 71, 44, 65, 25, 43, 91, 52, 97, 51, 14], [70, 11, 33, 28, 77, 73, 17, 78, 39, 68, 17, 57], [91, 71, 52, 38, 17, 14, 91, 43, 58, 50, 27, 29, 48], [63, 66, 4, 68, 89, 53, 67, 30, 73, 16, 69, 87, 40, 31], [4, 62, 98, 27, 23, 9, 70, 98, 73, 93, 38, 53, 60, 4, 23]] for row in range(len(set) - 1, 0, -1): for col in range(0, row): set[row - 1][col] += max(set[row][col], set[row][col + 1]) max_path = set[0][0] return max_path if __name__ == '__main__': print(compute())
class Solution: def getPermutation(self, n, k): """ :type n: int :type k: int :rtype: str """ nums = list(range(1, n+1)) factorials = [1] for i in range(1, n): factorials.append(i*factorials[-1]) cnt = n k -= 1 result = [] while cnt > 0: quotient = k // factorials[cnt-1] reminder = k % factorials[cnt-1] result.append(str(nums[quotient])) k = reminder cnt -= 1 nums.pop(quotient) return ''.join(result)
class Solution: def get_permutation(self, n, k): """ :type n: int :type k: int :rtype: str """ nums = list(range(1, n + 1)) factorials = [1] for i in range(1, n): factorials.append(i * factorials[-1]) cnt = n k -= 1 result = [] while cnt > 0: quotient = k // factorials[cnt - 1] reminder = k % factorials[cnt - 1] result.append(str(nums[quotient])) k = reminder cnt -= 1 nums.pop(quotient) return ''.join(result)
class ResourceMetamodel(object): def __init__(self, resource): self.resource = resource def _request(self, obj): form = self.resource._get_form(inst=obj, initial=self.resource._get_form_initial(obj)) result = {} for key, field in form.fields.items(): choices = getattr(field, 'choices', None) if choices: choices = list(choices) result[key] = { 'type': field.__class__.__name__, 'is_required': field.required, 'verbose_name': field.label, 'initial': form[key].value(), 'widget': field.widget.__class__.__name__, 'help_text': field.help_text, 'choices': choices, } return result def _get_resource_method_fields(self, fields): out = dict() # TODO for field in fields.flat(): t = getattr(self.resource, str(field), None) if t and callable(t): out[field] = t return out def _get_model_fields(self): out = dict() for f in self.resource.model._meta.fields: out[f.name] = f return out def _get_m2m_fields(self): out = dict() for mf in self.resource.model._meta.many_to_many: if mf.serialize: out[mf.name] = mf return out def _response(self, obj): result = {} fields = self.resource.get_fields(obj) resource_method_fields = self._get_resource_method_fields(fields) model_fields = self._get_model_fields() m2m_fields = self._get_m2m_fields() for field_name in fields.flat(): if field_name in resource_method_fields: result[field_name] = { 'type': 'method', 'verbose_name': getattr(resource_method_fields[field_name], 'short_description', None), } elif field_name in m2m_fields: result[field_name] = { 'type': m2m_fields[field_name].__class__.__name__, 'verbose_name': m2m_fields[field_name].verbose_name, } elif field_name in model_fields: result[field_name] = { 'type': model_fields[field_name].__class__.__name__, 'verbose_name': model_fields[field_name].verbose_name, } else: deskriptor = getattr(self.resource.model, field_name, None) if deskriptor and hasattr(deskriptor, 'related'): result[field_name] = { 'type': deskriptor.__class__.__name__, } else: result[field_name] = { 'type': 'method', } return result def get(self, obj): return { 'RESPONSE': self._response(obj) } def post(self, obj): return { 'REQUEST': self._request(obj), 'RESPONSE': self._response(obj) } def put(self, obj): return { 'REQUEST': self._request(obj), 'RESPONSE': self._response(obj) }
class Resourcemetamodel(object): def __init__(self, resource): self.resource = resource def _request(self, obj): form = self.resource._get_form(inst=obj, initial=self.resource._get_form_initial(obj)) result = {} for (key, field) in form.fields.items(): choices = getattr(field, 'choices', None) if choices: choices = list(choices) result[key] = {'type': field.__class__.__name__, 'is_required': field.required, 'verbose_name': field.label, 'initial': form[key].value(), 'widget': field.widget.__class__.__name__, 'help_text': field.help_text, 'choices': choices} return result def _get_resource_method_fields(self, fields): out = dict() for field in fields.flat(): t = getattr(self.resource, str(field), None) if t and callable(t): out[field] = t return out def _get_model_fields(self): out = dict() for f in self.resource.model._meta.fields: out[f.name] = f return out def _get_m2m_fields(self): out = dict() for mf in self.resource.model._meta.many_to_many: if mf.serialize: out[mf.name] = mf return out def _response(self, obj): result = {} fields = self.resource.get_fields(obj) resource_method_fields = self._get_resource_method_fields(fields) model_fields = self._get_model_fields() m2m_fields = self._get_m2m_fields() for field_name in fields.flat(): if field_name in resource_method_fields: result[field_name] = {'type': 'method', 'verbose_name': getattr(resource_method_fields[field_name], 'short_description', None)} elif field_name in m2m_fields: result[field_name] = {'type': m2m_fields[field_name].__class__.__name__, 'verbose_name': m2m_fields[field_name].verbose_name} elif field_name in model_fields: result[field_name] = {'type': model_fields[field_name].__class__.__name__, 'verbose_name': model_fields[field_name].verbose_name} else: deskriptor = getattr(self.resource.model, field_name, None) if deskriptor and hasattr(deskriptor, 'related'): result[field_name] = {'type': deskriptor.__class__.__name__} else: result[field_name] = {'type': 'method'} return result def get(self, obj): return {'RESPONSE': self._response(obj)} def post(self, obj): return {'REQUEST': self._request(obj), 'RESPONSE': self._response(obj)} def put(self, obj): return {'REQUEST': self._request(obj), 'RESPONSE': self._response(obj)}
ged_data = [] def initialize_file(): global ged_data ged_data = [] def add_line(hierarchy,type,value=None): global ged_data if value: ged_data.append(str(hierarchy) + ' ' + str(type) + ' ' + str(value)) else: ged_data.append(str(hierarchy) + ' ' + str(type)) def append_record(parent,hierarchy,type,value=None): new_record = "" insert_before = None existing_key_index = None if (value): new_record = (str(hierarchy) + ' ' + str(type) + ' ' + str(value)) else: new_record = (str(hierarchy) + ' ' + str(type)) global ged_data try: existing_key_index = ged_data.index(parent) except: pass if existing_key_index: for i, elem in enumerate(ged_data[existing_key_index+1:]): if '0 @' in elem: insert_before = i+existing_key_index+1 break if insert_before: ged_data.insert(insert_before,new_record) def render_output(): add_line(0,"TRLR") return "\n".join(ged_data) def already_exists(record_id,record_type): #check for duplicates record = "" if record_type=="FAM": record = "0 @F{}@ FAM".format(str(record_id)) elif record_type=='INDI': record = "0 @I{}@ INDI".format(str(record_id)) else: raise Exception ('Invalid record type specified.') if record in ged_data: return True else: return False
ged_data = [] def initialize_file(): global ged_data ged_data = [] def add_line(hierarchy, type, value=None): global ged_data if value: ged_data.append(str(hierarchy) + ' ' + str(type) + ' ' + str(value)) else: ged_data.append(str(hierarchy) + ' ' + str(type)) def append_record(parent, hierarchy, type, value=None): new_record = '' insert_before = None existing_key_index = None if value: new_record = str(hierarchy) + ' ' + str(type) + ' ' + str(value) else: new_record = str(hierarchy) + ' ' + str(type) global ged_data try: existing_key_index = ged_data.index(parent) except: pass if existing_key_index: for (i, elem) in enumerate(ged_data[existing_key_index + 1:]): if '0 @' in elem: insert_before = i + existing_key_index + 1 break if insert_before: ged_data.insert(insert_before, new_record) def render_output(): add_line(0, 'TRLR') return '\n'.join(ged_data) def already_exists(record_id, record_type): record = '' if record_type == 'FAM': record = '0 @F{}@ FAM'.format(str(record_id)) elif record_type == 'INDI': record = '0 @I{}@ INDI'.format(str(record_id)) else: raise exception('Invalid record type specified.') if record in ged_data: return True else: return False
#List 1 a = ['physics','chemistry',2003,2009] #List 2 b = [1,2,3,4,5] #List 3 c = ["p","r","s"] a.insert(0,'Biology') b.insert(5,6) c.insert(1,"q") print(a,b,c) #Result #['Biology', 'physics', 'chemistry', 2003, 2009] [1, 2, 3, 4, 5, 6] ['p', 'q', 'r', 's']
a = ['physics', 'chemistry', 2003, 2009] b = [1, 2, 3, 4, 5] c = ['p', 'r', 's'] a.insert(0, 'Biology') b.insert(5, 6) c.insert(1, 'q') print(a, b, c)
# # PySNMP MIB module SUN-ILOM-CONTROL-MIB (http://snmplabs.com/pysmi) # ASN.1 source file:///Users/davwang4/Dev/mibs.snmplabs.com/asn1/SUN-ILOM-CONTROL-MIB # Produced by pysmi-0.3.4 at Wed May 1 15:12:04 2019 # On host DAVWANG4-M-1475 platform Darwin version 18.5.0 by user davwang4 # Using Python version 3.7.3 (default, Mar 27 2019, 09:23:15) # Integer, OctetString, ObjectIdentifier = mibBuilder.importSymbols("ASN1", "Integer", "OctetString", "ObjectIdentifier") NamedValues, = mibBuilder.importSymbols("ASN1-ENUMERATION", "NamedValues") SingleValueConstraint, ConstraintsUnion, ValueRangeConstraint, ConstraintsIntersection, ValueSizeConstraint = mibBuilder.importSymbols("ASN1-REFINEMENT", "SingleValueConstraint", "ConstraintsUnion", "ValueRangeConstraint", "ConstraintsIntersection", "ValueSizeConstraint") SnmpAdminString, = mibBuilder.importSymbols("SNMP-FRAMEWORK-MIB", "SnmpAdminString") ObjectGroup, ModuleCompliance, NotificationGroup = mibBuilder.importSymbols("SNMPv2-CONF", "ObjectGroup", "ModuleCompliance", "NotificationGroup") ObjectIdentity, ModuleIdentity, Bits, Integer32, NotificationType, Gauge32, Counter32, MibIdentifier, Unsigned32, enterprises, iso, Counter64, IpAddress, TimeTicks, MibScalar, MibTable, MibTableRow, MibTableColumn = mibBuilder.importSymbols("SNMPv2-SMI", "ObjectIdentity", "ModuleIdentity", "Bits", "Integer32", "NotificationType", "Gauge32", "Counter32", "MibIdentifier", "Unsigned32", "enterprises", "iso", "Counter64", "IpAddress", "TimeTicks", "MibScalar", "MibTable", "MibTableRow", "MibTableColumn") TruthValue, RowStatus, DateAndTime, TextualConvention, DisplayString = mibBuilder.importSymbols("SNMPv2-TC", "TruthValue", "RowStatus", "DateAndTime", "TextualConvention", "DisplayString") sun = MibIdentifier((1, 3, 6, 1, 4, 1, 42)) products = MibIdentifier((1, 3, 6, 1, 4, 1, 42, 2)) ilom = MibIdentifier((1, 3, 6, 1, 4, 1, 42, 2, 175)) ilomCtrlMIB = ModuleIdentity((1, 3, 6, 1, 4, 1, 42, 2, 175, 102)) ilomCtrlMIB.setRevisions(('2010-06-11 00:00', '2010-06-08 00:00', '2009-03-30 00:00', '2009-03-03 00:00', '2008-05-15 00:00', '2008-04-11 00:00', '2007-02-20 00:00', '2006-12-15 00:00', '2005-12-19 00:00',)) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): if mibBuilder.loadTexts: ilomCtrlMIB.setRevisionsDescriptions(("Add support for the SPARC diagnostic 'HW change' trigger", 'Add ActiveDirectory parameter ilomCtrlActiveDirStrictCredentialErrorEnabled', 'Add LdapSsl optional User Mapping parameters.', 'Add ActiveDirectory parameter ilomCtrlActiveDirExpSearchEnabled.', "Version 3.0 Released with ILOM version 3.0 Added alert event class/type filtering Added Telemetry Harness Daemon (THD) Added dns-locator objects and certificate params for ActiveDirectory Added ilomCtrlLdapSsl Unify POST knobs for Volume and Enterprise Products Added BackupAndRestore configuration XML file support Added DNS configuration support Added factory to ILOMCtrlResetToDefaultsAction Added 'other' values to several TCs Added ilomCtrlSPARCHostHypervisorVersion Added ilomCtrlSPARCHostSysFwVersion Added ilomCtrlSPARCHostSendBreakAction Added sideband management support", 'Add destinationport for use with trap type alerts. Remove range from ilomCtrlEventLogRecordID.', 'Version 2.0', 'Version: 1.1 Released with ILOM version 1.1.5', 'Version: 0.7 Initial Release',)) if mibBuilder.loadTexts: ilomCtrlMIB.setLastUpdated('201006110000Z') if mibBuilder.loadTexts: ilomCtrlMIB.setOrganization('Oracle Corporation') if mibBuilder.loadTexts: ilomCtrlMIB.setContactInfo('Oracle Corporation 500 Oracle Parkway Redwood Shores, CA 95065 U.S.A. http://www.oracle.com') if mibBuilder.loadTexts: ilomCtrlMIB.setDescription('SUN-ILOM-CONTROL-MIB.mib Version 3.0 Copyright (c) 2005, 2010, Oracle and/or its affiliates. All rights reserved. This MIB controls all Sun Integrated Lights Out Management devices.') ilomCtrlClients = MibIdentifier((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1)) ilomCtrlServices = MibIdentifier((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 2)) ilomCtrlNetwork = MibIdentifier((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 3)) ilomCtrlUsers = MibIdentifier((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 4)) ilomCtrlSessions = MibIdentifier((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 5)) ilomCtrlFirmwareMgmt = MibIdentifier((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 6)) ilomCtrlLogs = MibIdentifier((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 7)) ilomCtrlAlerts = MibIdentifier((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 8)) ilomCtrlClock = MibIdentifier((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 9)) ilomCtrlSerial = MibIdentifier((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 10)) ilomCtrlPowerReset = MibIdentifier((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 11)) ilomCtrlRedundancy = MibIdentifier((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 12)) ilomCtrlPolicy = MibIdentifier((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 13)) ilomCtrlConfigMgmt = MibIdentifier((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 14)) ilomCtrlSPARC = MibIdentifier((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 15)) ilomCtrlIdentification = MibIdentifier((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 16)) ilomCtrlThd = MibIdentifier((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 17)) ilomCtrlConformances = MibIdentifier((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 18)) ilomCtrlNtp = MibIdentifier((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 1)) ilomCtrlLdap = MibIdentifier((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 2)) ilomCtrlRadius = MibIdentifier((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 3)) ilomCtrlRemoteSyslog = MibIdentifier((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 4)) ilomCtrlActiveDirectory = MibIdentifier((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 5)) ilomCtrlSMTP = MibIdentifier((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 6)) ilomCtrlLdapSsl = MibIdentifier((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 7)) ilomCtrlDNS = MibIdentifier((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 8)) ilomCtrlHttp = MibIdentifier((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 2, 1)) ilomCtrlHttps = MibIdentifier((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 2, 2)) ilomCtrlSsh = MibIdentifier((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 2, 3)) ilomCtrlSingleSignon = MibIdentifier((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 2, 4)) ilomCtrlEventLog = MibIdentifier((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 7, 1)) ilomCtrlPowerControl = MibIdentifier((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 11, 1)) ilomCtrlResetControl = MibIdentifier((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 11, 2)) ilomCtrlBackupAndRestore = MibIdentifier((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 14, 2)) ilomCtrlSPARCDiags = MibIdentifier((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 15, 1)) ilomCtrlSPARCHostControl = MibIdentifier((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 15, 2)) ilomCtrlSPARCBootMode = MibIdentifier((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 15, 3)) ilomCtrlSPARCKeySwitch = MibIdentifier((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 15, 4)) ilomCtrlCompliances = MibIdentifier((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 18, 1)) ilomCtrlGroups = MibIdentifier((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 18, 2)) class ILOMCtrlTargetIndex(TextualConvention, OctetString): description = 'A string that is short enough to be used properly as an index without overflowing the maximum number of subOIDs.' status = 'current' subtypeSpec = OctetString.subtypeSpec + ValueSizeConstraint(0, 110) class ILOMCtrlModTargetIndex(TextualConvention, OctetString): description = 'A string that is short enough to be used properly along with ILOMCtrlInstanceTargetIndex as a pair of indexes without overflowing the maximum number of subOIDs.' status = 'current' subtypeSpec = OctetString.subtypeSpec + ValueSizeConstraint(0, 12) class ILOMCtrlInstanceTargetIndex(TextualConvention, OctetString): description = 'A string that is short enough to be used properly along with ILOMCtrlModTargetIndex as a pair of indexes without overflowing the maximum number of subOIDs.' status = 'current' subtypeSpec = OctetString.subtypeSpec + ValueSizeConstraint(0, 100) class ILOMCtrlSessionsConnectionType(TextualConvention, Integer32): description = 'An enumerated value which describes possible connection types by which a user can be log in.' status = 'current' subtypeSpec = Integer32.subtypeSpec + ConstraintsUnion(SingleValueConstraint(1, 2, 3, 4)) namedValues = NamedValues(("shell", 1), ("web", 2), ("other", 3), ("snmp", 4)) class ILOMCtrlLocalUserUsername(TextualConvention, OctetString): description = "A local user username. This must start with an alphabetical letter and may contain alphabetical letters, digits, hyphens and underscores. This can not be 'password'. This can not contain spaces." status = 'current' subtypeSpec = OctetString.subtypeSpec + ValueSizeConstraint(4, 16) class ILOMCtrlLocalUserPassword(TextualConvention, OctetString): description = 'A local user password.' status = 'current' subtypeSpec = OctetString.subtypeSpec + ValueSizeConstraint(8, 16) class ILOMCtrlUserRole(TextualConvention, Integer32): description = 'An enumerated value which describes possible privilege levels (also known as roles) a user can have. ***NOTE: this textual-convention is deprecated and replaced by ILOMCtrlUserRoles.' status = 'deprecated' subtypeSpec = Integer32.subtypeSpec + ConstraintsUnion(SingleValueConstraint(1, 2, 3, 4)) namedValues = NamedValues(("administrator", 1), ("operator", 2), ("none", 3), ("other", 4)) class ILOMCtrlUserRoles(TextualConvention, OctetString): description = "A set of role-IDs which describe the possible privilege levels (also known as roles) for a user. This property supports the legacy roles of 'Administrator' or 'Operator', or any of the individual role ID combinations of 'a', 'u', 'c', 'r', 'o' and 's' (like 'aucro') where a-admin, u-user, c-console, r-reset, s-service and o-readOnly." status = 'current' subtypeSpec = OctetString.subtypeSpec + ValueSizeConstraint(0, 13) class ILOMCtrlLocalUserAuthCLIMode(TextualConvention, Integer32): description = "An enumerated value which describes the possible CLI modes. The 'default' mode corresponds to the ILOM DMTF CLP. The 'alom' mode corresponds to the ALOM CMT." status = 'current' subtypeSpec = Integer32.subtypeSpec + ConstraintsUnion(SingleValueConstraint(1, 2)) namedValues = NamedValues(("default", 1), ("alom", 2)) class ILOMCtrlPowerAction(TextualConvention, Integer32): description = 'An enumerated value which describes possible actions that can applied to a power control target.' status = 'current' subtypeSpec = Integer32.subtypeSpec + ConstraintsUnion(SingleValueConstraint(1, 2, 3, 4)) namedValues = NamedValues(("powerOn", 1), ("powerOff", 2), ("powerCycle", 3), ("powerSoft", 4)) class ILOMCtrlResetAction(TextualConvention, Integer32): description = 'An enumerated value which describes possible actions that can applied to a reset control target.' status = 'current' subtypeSpec = Integer32.subtypeSpec + ConstraintsUnion(SingleValueConstraint(1, 2, 3)) namedValues = NamedValues(("reset", 1), ("resetNonMaskableInterrupt", 2), ("force", 3)) class ILOMCtrlNetworkIpDiscovery(TextualConvention, Integer32): description = 'An enumerated value which determines whether the IP settings should static or dynamic (DHCP).' status = 'current' subtypeSpec = Integer32.subtypeSpec + ConstraintsUnion(SingleValueConstraint(1, 2, 3)) namedValues = NamedValues(("static", 1), ("dynamic", 2), ("other", 3)) class ILOMCtrlEventLogType(TextualConvention, Integer32): description = 'An enumerated value which describes the possible event log type.' status = 'current' subtypeSpec = Integer32.subtypeSpec + ConstraintsUnion(SingleValueConstraint(1, 2, 3, 4, 5, 6)) namedValues = NamedValues(("log", 1), ("action", 2), ("fault", 3), ("state", 4), ("repair", 5), ("other", 6)) class ILOMCtrlEventLogClass(TextualConvention, Integer32): description = 'An enumerated value which describes the possible event log class.' status = 'current' subtypeSpec = Integer32.subtypeSpec + ConstraintsUnion(SingleValueConstraint(1, 2, 3, 4, 5, 6, 7)) namedValues = NamedValues(("audit", 1), ("ipmi", 2), ("chassis", 3), ("fma", 4), ("system", 5), ("pcm", 6), ("other", 7)) class ILOMCtrlEventSeverity(TextualConvention, Integer32): description = 'An enumerated value which describes the possible event severities.' status = 'current' subtypeSpec = Integer32.subtypeSpec + ConstraintsUnion(SingleValueConstraint(1, 2, 3, 4, 5, 6)) namedValues = NamedValues(("disable", 1), ("critical", 2), ("major", 3), ("minor", 4), ("down", 5), ("other", 6)) class ILOMCtrlAlertType(TextualConvention, Integer32): description = 'An enumerated value which describes the possible alert notification types.' status = 'current' subtypeSpec = Integer32.subtypeSpec + ConstraintsUnion(SingleValueConstraint(1, 2, 3)) namedValues = NamedValues(("email", 1), ("snmptrap", 2), ("ipmipet", 3)) class ILOMCtrlAlertSNMPVersion(TextualConvention, Integer32): description = 'An enumeration of the possible SNMP versions for traps generated by configuring alert rules.' status = 'current' subtypeSpec = Integer32.subtypeSpec + ConstraintsUnion(SingleValueConstraint(1, 2, 3)) namedValues = NamedValues(("v1", 1), ("v2c", 2), ("v3", 3)) class ILOMCtrlBaudRate(TextualConvention, Integer32): description = 'An enumerated value which describes the possible baud rates for serial ports.' status = 'current' subtypeSpec = Integer32.subtypeSpec + ConstraintsUnion(SingleValueConstraint(1, 2, 3, 4, 5)) namedValues = NamedValues(("baud9600", 1), ("baud19200", 2), ("baud38400", 3), ("baud57600", 4), ("baud115200", 5)) class ILOMCtrlFlowControl(TextualConvention, Integer32): description = 'An enumerated value which describes the possible flowcontrol settings for serial ports.' status = 'current' subtypeSpec = Integer32.subtypeSpec + ConstraintsUnion(SingleValueConstraint(1, 2, 3, 4)) namedValues = NamedValues(("unknown", 1), ("hardware", 2), ("software", 3), ("none", 4)) class ILOMCtrlFirmwareUpdateStatus(TextualConvention, Integer32): description = 'An enumerated value which contains all the possible status values during a firmware update.' status = 'current' subtypeSpec = Integer32.subtypeSpec + ConstraintsUnion(SingleValueConstraint(1, 2, 3, 4, 5)) namedValues = NamedValues(("tftpError", 1), ("imageVerificationFailed", 2), ("inProgress", 3), ("success", 4), ("other", 5)) class ILOMCtrlFirmwareUpdateAction(TextualConvention, Integer32): description = 'An enumerated value which contains all the possible firmware management actions.' status = 'current' subtypeSpec = Integer32.subtypeSpec + ConstraintsUnion(SingleValueConstraint(1, 2)) namedValues = NamedValues(("clearProperties", 1), ("initiate", 2)) class ILOMCtrlResetToDefaultsAction(TextualConvention, Integer32): description = 'An enumerated value indicating possible actions for resetting the SP back to factory defaults.' status = 'current' subtypeSpec = Integer32.subtypeSpec + ConstraintsUnion(SingleValueConstraint(1, 2, 3)) namedValues = NamedValues(("none", 1), ("all", 2), ("factory", 3)) class ILOMCtrlRedundancyStatus(TextualConvention, Integer32): description = 'An enumerated value which contains all the possible states a device can have in a redundant configuration.' status = 'current' subtypeSpec = Integer32.subtypeSpec + ConstraintsUnion(SingleValueConstraint(1, 2, 3, 4, 5)) namedValues = NamedValues(("initializing", 1), ("active", 2), ("standby", 3), ("standAlone", 4), ("other", 5)) class ILOMCtrlRedundancyAction(TextualConvention, Integer32): description = 'Setting the redundancy action to initiateFailover will cause the current SC to switch mastership. i.e., it will initiate actions to become master if it is standby or to become standby if it is master. No action is taken if the SC is initializing or running in standalone mode.' status = 'current' subtypeSpec = Integer32.subtypeSpec + ConstraintsUnion(SingleValueConstraint(1, 2)) namedValues = NamedValues(("ready", 1), ("initiateFailover", 2)) class ILOMCtrlSPARCDiagsLevel(TextualConvention, Integer32): description = "An enumerated value which contains all the possible states for embedded diagnostics for the host. The min value is the same as the 'enabled' value on some platforms and the max value is the same as the 'extended' value. ***NOTE: this textual-convention is deprecated and replaced with ILOMCtrlSPARCDiagsLevelAdv." status = 'deprecated' subtypeSpec = Integer32.subtypeSpec + ConstraintsUnion(SingleValueConstraint(1, 2, 3)) namedValues = NamedValues(("min", 1), ("max", 2), ("advsettings", 3)) class ILOMCtrlSPARCDiagsLevelAdv(TextualConvention, Integer32): description = "An enumerated value which contains all the possible states for embedded diagnostics for the host. The min value is the same as the 'enabled' value on some platforms and the max value is the same as the 'extended' value." status = 'current' subtypeSpec = Integer32.subtypeSpec + ConstraintsUnion(SingleValueConstraint(1, 2, 3, 4, 5)) namedValues = NamedValues(("init", 1), ("minimum", 2), ("normal", 3), ("maximum", 4), ("other", 5)) class ILOMCtrlSPARCDiagsTrigger(TextualConvention, Integer32): description = "An enumerated value which contains all the possible states for the trigger for embedded diagnostics on the host. x64 platforms with embedded diagnostics only support 'all-resets' and 'none' as possible states." status = 'current' subtypeSpec = Integer32.subtypeSpec + ConstraintsUnion(SingleValueConstraint(1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11)) namedValues = NamedValues(("allResets", 1), ("none", 2), ("userReset", 3), ("powerOnReset", 4), ("errorTest", 5), ("userResetandpowerOnReset", 6), ("userResetanderrorTest", 7), ("userTestandpowerOnReset", 8), ("hwChange", 9), ("hwChangeandpowerOnReset", 10), ("hwChangeanderrorTest", 11)) class ILOMCtrlSPARCDiagsMode(TextualConvention, Integer32): description = 'An enumerated value which contains all the possible OPS modes specified to POST.' status = 'current' subtypeSpec = Integer32.subtypeSpec + ConstraintsUnion(SingleValueConstraint(1, 2, 3, 4)) namedValues = NamedValues(("off", 1), ("normal", 2), ("service", 3), ("unknown", 4)) class ILOMCtrlSPARCDiagsVerbosity(TextualConvention, Integer32): description = 'An enumerated value which contains all the possible states for the verbosity level for embedded diagnostics on the host. ***NOTE: this textual-convention is deprecated and replaced with ILOMCtrlSPARCDiagsVerbosityAdv.' status = 'deprecated' subtypeSpec = Integer32.subtypeSpec + ConstraintsUnion(SingleValueConstraint(1, 2, 3)) namedValues = NamedValues(("min", 1), ("max", 2), ("advsettings", 3)) class ILOMCtrlSPARCDiagsVerbosityAdv(TextualConvention, Integer32): description = 'An enumerated value which contains all the possible states for the verbosity level for embedded diagnostics on the host.' status = 'current' subtypeSpec = Integer32.subtypeSpec + ConstraintsUnion(SingleValueConstraint(1, 2, 3, 4, 5)) namedValues = NamedValues(("none", 1), ("minimum", 2), ("normal", 3), ("maximum", 4), ("debug", 5)) class ILOMCtrlSPARCHostAutoRestartPolicy(TextualConvention, Integer32): description = 'An enumerated value which contains all the possible actions to perform when the SP determines that the host has hung.' status = 'current' subtypeSpec = Integer32.subtypeSpec + ConstraintsUnion(SingleValueConstraint(1, 2, 3)) namedValues = NamedValues(("none", 1), ("reset", 2), ("dumpcore", 3)) class ILOMCtrlSPARCHostBootRestart(TextualConvention, Integer32): description = 'An enumerated value which contains all the possible actions to perform when the boot timer expires.' status = 'current' subtypeSpec = Integer32.subtypeSpec + ConstraintsUnion(SingleValueConstraint(1, 2)) namedValues = NamedValues(("none", 1), ("reset", 2)) class ILOMCtrlSPARCHostBootFailRecovery(TextualConvention, Integer32): description = 'An enumerated value which contains all the possible actions to perform when the max boot failures allowed is reached.' status = 'current' subtypeSpec = Integer32.subtypeSpec + ConstraintsUnion(SingleValueConstraint(1, 2, 3)) namedValues = NamedValues(("none", 1), ("powercycle", 2), ("poweroff", 3)) class ILOMCtrlSPARCHostSendBreakAction(TextualConvention, Integer32): description = 'Send Break Action to Host.' status = 'current' subtypeSpec = Integer32.subtypeSpec + ConstraintsUnion(SingleValueConstraint(1, 2, 3)) namedValues = NamedValues(("nop", 1), ("break", 2), ("dumpcore", 3)) class ILOMCtrlSPARCHostIoReconfigurePolicy(TextualConvention, Integer32): description = 'An enumerated value which contains all the possible states for the host IO reconfiguration policy that is applied at next host power-on.' status = 'current' subtypeSpec = Integer32.subtypeSpec + ConstraintsUnion(SingleValueConstraint(1, 2, 3)) namedValues = NamedValues(("false", 1), ("nextboot", 2), ("true", 3)) class ILOMCtrlSPARCBootModeState(TextualConvention, Integer32): description = 'An enumerated value which contains all the possible states for the boot mode state.' status = 'current' subtypeSpec = Integer32.subtypeSpec + ConstraintsUnion(SingleValueConstraint(1, 2)) namedValues = NamedValues(("normal", 1), ("resetNvram", 2)) class ILOMCtrlSPARCKeySwitchState(TextualConvention, Integer32): description = 'An enumerated value which contains all the possible states for the key switch.' status = 'current' subtypeSpec = Integer32.subtypeSpec + ConstraintsUnion(SingleValueConstraint(1, 2, 3, 4)) namedValues = NamedValues(("normal", 1), ("standby", 2), ("diag", 3), ("locked", 4)) class ILOMCtrlSPARCDiagsAction(TextualConvention, Integer32): description = 'An action to take to control POST running on the host.' status = 'current' subtypeSpec = Integer32.subtypeSpec + ConstraintsUnion(SingleValueConstraint(1, 2)) namedValues = NamedValues(("stop", 1), ("start", 2)) class ILOMCtrlSshKeyGenType(TextualConvention, Integer32): description = 'An enumerated value which contains all the possible key types for ssh.' status = 'current' subtypeSpec = Integer32.subtypeSpec + ConstraintsUnion(SingleValueConstraint(1, 2, 3)) namedValues = NamedValues(("none", 1), ("rsa", 2), ("dsa", 3)) class ILOMCtrlThdAction(TextualConvention, Integer32): description = 'An enumerated value which contains all the possible control actions for a THD module.' status = 'current' subtypeSpec = Integer32.subtypeSpec + ConstraintsUnion(SingleValueConstraint(1, 2, 3)) namedValues = NamedValues(("suspend", 1), ("resume", 2), ("nop", 3)) class ILOMCtrlBackupAndRestoreAction(TextualConvention, Integer32): description = 'An action to start Backup or Restore operation.' status = 'current' subtypeSpec = Integer32.subtypeSpec + ConstraintsUnion(SingleValueConstraint(1, 2)) namedValues = NamedValues(("backup", 1), ("restore", 2)) ilomCtrlDeviceNTPServerOneIP = MibScalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 1, 1), IpAddress()).setMaxAccess("readwrite") if mibBuilder.loadTexts: ilomCtrlDeviceNTPServerOneIP.setStatus('current') if mibBuilder.loadTexts: ilomCtrlDeviceNTPServerOneIP.setDescription('The IP address of the first NTP server used by the device. This property is ignored if NTP is not enabled.') ilomCtrlDeviceNTPServerTwoIP = MibScalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 1, 2), IpAddress()).setMaxAccess("readwrite") if mibBuilder.loadTexts: ilomCtrlDeviceNTPServerTwoIP.setStatus('current') if mibBuilder.loadTexts: ilomCtrlDeviceNTPServerTwoIP.setDescription('The IP address of the second NTP server used by the device. This property is ignored if NTP is not enabled.') ilomCtrlLdapEnabled = MibScalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 2, 1), TruthValue()).setMaxAccess("readwrite") if mibBuilder.loadTexts: ilomCtrlLdapEnabled.setStatus('current') if mibBuilder.loadTexts: ilomCtrlLdapEnabled.setDescription('Specifies whether or not the LDAP client is enabled.') ilomCtrlLdapServerIP = MibScalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 2, 2), IpAddress()).setMaxAccess("readwrite") if mibBuilder.loadTexts: ilomCtrlLdapServerIP.setStatus('current') if mibBuilder.loadTexts: ilomCtrlLdapServerIP.setDescription('The IP address of the LDAP server used as a name service for user accounts.') ilomCtrlLdapPortNumber = MibScalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 2, 3), Integer32().subtype(subtypeSpec=ValueRangeConstraint(0, 65535))).setMaxAccess("readwrite") if mibBuilder.loadTexts: ilomCtrlLdapPortNumber.setStatus('current') if mibBuilder.loadTexts: ilomCtrlLdapPortNumber.setDescription('Specifies the port number for the LDAP client.') ilomCtrlLdapBindDn = MibScalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 2, 4), SnmpAdminString()).setMaxAccess("readwrite") if mibBuilder.loadTexts: ilomCtrlLdapBindDn.setStatus('current') if mibBuilder.loadTexts: ilomCtrlLdapBindDn.setDescription('The distinguished name (DN) for the read-only proxy user used to bind to the LDAP server. Example: cn=proxyuser,ou=people,dc=sun,dc=com') ilomCtrlLdapBindPassword = MibScalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 2, 5), SnmpAdminString()).setMaxAccess("readwrite") if mibBuilder.loadTexts: ilomCtrlLdapBindPassword.setStatus('current') if mibBuilder.loadTexts: ilomCtrlLdapBindPassword.setDescription('The password of a read-only proxy user which is used to bind to the LDAP server. This property is essentially write-only. The write-only access level is no longer supported as of SNMPv2. This property must return a null value when read.') ilomCtrlLdapSearchBase = MibScalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 2, 6), SnmpAdminString()).setMaxAccess("readwrite") if mibBuilder.loadTexts: ilomCtrlLdapSearchBase.setStatus('current') if mibBuilder.loadTexts: ilomCtrlLdapSearchBase.setDescription('A search base in the LDAP database below which to find users. Example: ou=people,dc=sun,dc=com') ilomCtrlLdapDefaultRole = MibScalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 2, 7), ILOMCtrlUserRole()).setMaxAccess("readwrite") if mibBuilder.loadTexts: ilomCtrlLdapDefaultRole.setStatus('deprecated') if mibBuilder.loadTexts: ilomCtrlLdapDefaultRole.setDescription('Specifies the role that a user authenticated via LDAP should have. ***NOTE: this object is deprecated and replaced by ilomCtrlLdapDefaultRoles.') ilomCtrlLdapDefaultRoles = MibScalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 2, 8), ILOMCtrlUserRoles()).setMaxAccess("readwrite") if mibBuilder.loadTexts: ilomCtrlLdapDefaultRoles.setStatus('current') if mibBuilder.loadTexts: ilomCtrlLdapDefaultRoles.setDescription("Specifies the role that a user authenticated via LDAP should have. This property supports the legacy roles of 'Administrator' or 'Operator', or any of the individual role ID combinations of 'a', 'u', 'c', 'r', 'o' and 's' (like 'aucro') where a-admin, u-user, c-console, r-reset, s-service and o-readOnly.") ilomCtrlRadiusEnabled = MibScalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 3, 1), TruthValue()).setMaxAccess("readwrite") if mibBuilder.loadTexts: ilomCtrlRadiusEnabled.setStatus('current') if mibBuilder.loadTexts: ilomCtrlRadiusEnabled.setDescription('Specifies whether or not the RADIUS client is enabled.') ilomCtrlRadiusServerIP = MibScalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 3, 2), IpAddress()).setMaxAccess("readwrite") if mibBuilder.loadTexts: ilomCtrlRadiusServerIP.setStatus('current') if mibBuilder.loadTexts: ilomCtrlRadiusServerIP.setDescription('The IP address of the RADIUS server used as a name service for user accounts.') ilomCtrlRadiusPortNumber = MibScalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 3, 3), Integer32().subtype(subtypeSpec=ValueRangeConstraint(0, 65535))).setMaxAccess("readwrite") if mibBuilder.loadTexts: ilomCtrlRadiusPortNumber.setStatus('current') if mibBuilder.loadTexts: ilomCtrlRadiusPortNumber.setDescription('Specifies the port number for the RADIUS client.') ilomCtrlRadiusSecret = MibScalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 3, 4), SnmpAdminString()).setMaxAccess("readwrite") if mibBuilder.loadTexts: ilomCtrlRadiusSecret.setStatus('current') if mibBuilder.loadTexts: ilomCtrlRadiusSecret.setDescription('The shared secret encryption key that is used to encypt traffic between the RADIUS client and server.') ilomCtrlRadiusDefaultRole = MibScalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 3, 5), ILOMCtrlUserRole()).setMaxAccess("readwrite") if mibBuilder.loadTexts: ilomCtrlRadiusDefaultRole.setStatus('deprecated') if mibBuilder.loadTexts: ilomCtrlRadiusDefaultRole.setDescription('Specifies the role that a user authenticated via RADIUS should have. ***NOTE: this object is deprecated and replaced by ILOMCtrlUserRoles.') ilomCtrlRadiusDefaultRoles = MibScalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 3, 6), ILOMCtrlUserRoles()).setMaxAccess("readwrite") if mibBuilder.loadTexts: ilomCtrlRadiusDefaultRoles.setStatus('current') if mibBuilder.loadTexts: ilomCtrlRadiusDefaultRoles.setDescription("Specifies the role that a user authenticated via RADIUS should have. This property supports the legacy roles of 'Administrator' or 'Operator', or any of the individual role ID combinations of 'a', 'u', 'c', 'r', 'o' and 's' (like 'aucro') where a-admin, u-user, c-console, r-reset, s-service and o-readOnly.") ilomCtrlRemoteSyslogDest1 = MibScalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 4, 1), IpAddress()).setMaxAccess("readwrite") if mibBuilder.loadTexts: ilomCtrlRemoteSyslogDest1.setStatus('current') if mibBuilder.loadTexts: ilomCtrlRemoteSyslogDest1.setDescription('The IP address of the first remote syslog destination (log host).') ilomCtrlRemoteSyslogDest2 = MibScalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 4, 2), IpAddress()).setMaxAccess("readwrite") if mibBuilder.loadTexts: ilomCtrlRemoteSyslogDest2.setStatus('current') if mibBuilder.loadTexts: ilomCtrlRemoteSyslogDest2.setDescription('The IP address of the second remote syslog destination (log host).') ilomCtrlHttpEnabled = MibScalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 2, 1, 1), TruthValue()).setMaxAccess("readwrite") if mibBuilder.loadTexts: ilomCtrlHttpEnabled.setStatus('current') if mibBuilder.loadTexts: ilomCtrlHttpEnabled.setDescription('Specifies whether or not the embedded web server should be running and listening on the HTTP port.') ilomCtrlHttpPortNumber = MibScalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 2, 1, 2), Integer32().subtype(subtypeSpec=ValueRangeConstraint(0, 65535))).setMaxAccess("readwrite") if mibBuilder.loadTexts: ilomCtrlHttpPortNumber.setStatus('current') if mibBuilder.loadTexts: ilomCtrlHttpPortNumber.setDescription('Specifies the port number that the embedded web server should listen to for HTTP requests.') ilomCtrlHttpSecureRedirect = MibScalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 2, 1, 3), TruthValue()).setMaxAccess("readwrite") if mibBuilder.loadTexts: ilomCtrlHttpSecureRedirect.setStatus('current') if mibBuilder.loadTexts: ilomCtrlHttpSecureRedirect.setDescription('Specifies whether or not the embedded web server should redirect HTTP connections to HTTPS.') ilomCtrlHttpsEnabled = MibScalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 2, 2, 1), TruthValue()).setMaxAccess("readwrite") if mibBuilder.loadTexts: ilomCtrlHttpsEnabled.setStatus('current') if mibBuilder.loadTexts: ilomCtrlHttpsEnabled.setDescription('Specifies whether or not the embedded web server should be running and listening on the HTTPS port.') ilomCtrlHttpsPortNumber = MibScalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 2, 2, 2), Integer32().subtype(subtypeSpec=ValueRangeConstraint(0, 65535))).setMaxAccess("readwrite") if mibBuilder.loadTexts: ilomCtrlHttpsPortNumber.setStatus('current') if mibBuilder.loadTexts: ilomCtrlHttpsPortNumber.setDescription('Specifies the port number that the embedded web server should listen to for HTTPS requests.') ilomCtrlSshRsaKeyFingerprint = MibScalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 2, 3, 1), SnmpAdminString()).setMaxAccess("readonly") if mibBuilder.loadTexts: ilomCtrlSshRsaKeyFingerprint.setStatus('current') if mibBuilder.loadTexts: ilomCtrlSshRsaKeyFingerprint.setDescription('The fingerprint of the RSA key used for the SSH protocol.') ilomCtrlSshRsaKeyLength = MibScalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 2, 3, 2), Integer32().subtype(subtypeSpec=ValueRangeConstraint(0, 65535))).setMaxAccess("readonly") if mibBuilder.loadTexts: ilomCtrlSshRsaKeyLength.setStatus('current') if mibBuilder.loadTexts: ilomCtrlSshRsaKeyLength.setDescription('The length of the RSA key used for the SSH protocol.') ilomCtrlSshDsaKeyFingerprint = MibScalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 2, 3, 3), SnmpAdminString()).setMaxAccess("readonly") if mibBuilder.loadTexts: ilomCtrlSshDsaKeyFingerprint.setStatus('current') if mibBuilder.loadTexts: ilomCtrlSshDsaKeyFingerprint.setDescription('The fingerprint of the DSA key used for the SSH protocol.') ilomCtrlSshDsaKeyLength = MibScalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 2, 3, 4), Integer32().subtype(subtypeSpec=ValueRangeConstraint(0, 65535))).setMaxAccess("readonly") if mibBuilder.loadTexts: ilomCtrlSshDsaKeyLength.setStatus('current') if mibBuilder.loadTexts: ilomCtrlSshDsaKeyLength.setDescription('The length of the DSA key used for the SSH protocol.') ilomCtrlSshGenerateNewKeyAction = MibScalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 2, 3, 5), TruthValue()).setMaxAccess("readwrite") if mibBuilder.loadTexts: ilomCtrlSshGenerateNewKeyAction.setStatus('current') if mibBuilder.loadTexts: ilomCtrlSshGenerateNewKeyAction.setDescription('This property is used to initiate a new public key generation.') ilomCtrlSshGenerateNewKeyType = MibScalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 2, 3, 6), ILOMCtrlSshKeyGenType()).setMaxAccess("readwrite") if mibBuilder.loadTexts: ilomCtrlSshGenerateNewKeyType.setStatus('current') if mibBuilder.loadTexts: ilomCtrlSshGenerateNewKeyType.setDescription('SSH new key type. The possible type are rsa(2), dsa(3).') ilomCtrlSshRestartSshdAction = MibScalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 2, 3, 7), TruthValue()).setMaxAccess("readwrite") if mibBuilder.loadTexts: ilomCtrlSshRestartSshdAction.setStatus('current') if mibBuilder.loadTexts: ilomCtrlSshRestartSshdAction.setDescription('This property is used to initiate sshd restart.') ilomCtrlSshEnabled = MibScalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 2, 3, 8), TruthValue()).setMaxAccess("readwrite") if mibBuilder.loadTexts: ilomCtrlSshEnabled.setStatus('current') if mibBuilder.loadTexts: ilomCtrlSshEnabled.setDescription('Speicfies whether or not the SSHD is enabled.') ilomCtrlSingleSignonEnabled = MibScalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 2, 4, 1), TruthValue()).setMaxAccess("readwrite") if mibBuilder.loadTexts: ilomCtrlSingleSignonEnabled.setStatus('current') if mibBuilder.loadTexts: ilomCtrlSingleSignonEnabled.setDescription('Specified whether single sign-on authentication should be enabled on the device. Single sign-on allows tokens to be passed around so that it is not necessary to re-enter passwords between different applications. This would allow single sign-on between the SC web interface and the SP web interface, between the SC command-line interface and the SP command-line interface, and between the SC and SP interfaces and the Java Remote Console application.') ilomCtrlNetworkTable = MibTable((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 3, 1), ) if mibBuilder.loadTexts: ilomCtrlNetworkTable.setStatus('current') if mibBuilder.loadTexts: ilomCtrlNetworkTable.setDescription('A table listing all targets whose networks can be controlled.') ilomCtrlNetworkEntry = MibTableRow((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 3, 1, 1), ).setIndexNames((0, "SUN-ILOM-CONTROL-MIB", "ilomCtrlNetworkTarget")) if mibBuilder.loadTexts: ilomCtrlNetworkEntry.setStatus('current') if mibBuilder.loadTexts: ilomCtrlNetworkEntry.setDescription('An entry for a target which can be reset.') ilomCtrlNetworkTarget = MibTableColumn((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 3, 1, 1, 1), SnmpAdminString()) if mibBuilder.loadTexts: ilomCtrlNetworkTarget.setStatus('current') if mibBuilder.loadTexts: ilomCtrlNetworkTarget.setDescription("This is the nomenclature name for a target which has a configurable network. On some systems, there are multiple targets which have networks. On a traditional, non-blade system, this table will contain only one row for the network configuration of the service processor, which has a nomenclature name of '/SP'. On blade systems, this table will contain multiple rows. There will be a row for '/SC' which allows for configuration of the system controller's network settings. In addition, there will be rows for each blade's service processor. For example, a blade's service processor nomenclature takes the form of '/CH/BL0/SP', '/CH/BL1/SP' and so on. This will allow for the configuration of the service processors from the system controller. In the case of redundant system controllers, the floating master IP addressed can be configured using a name of /MASTERSC.") ilomCtrlNetworkMacAddress = MibTableColumn((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 3, 1, 1, 2), SnmpAdminString()).setMaxAccess("readonly") if mibBuilder.loadTexts: ilomCtrlNetworkMacAddress.setStatus('current') if mibBuilder.loadTexts: ilomCtrlNetworkMacAddress.setDescription('Specifies the MAC address of the service processor or system controller.') ilomCtrlNetworkIpDiscovery = MibTableColumn((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 3, 1, 1, 3), ILOMCtrlNetworkIpDiscovery()).setMaxAccess("readonly") if mibBuilder.loadTexts: ilomCtrlNetworkIpDiscovery.setStatus('current') if mibBuilder.loadTexts: ilomCtrlNetworkIpDiscovery.setDescription('Specifies whether the current target is configured to have static IP settings or whether these settings are retrieved dynamically from DHCP.') ilomCtrlNetworkIpAddress = MibTableColumn((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 3, 1, 1, 4), IpAddress()).setMaxAccess("readonly") if mibBuilder.loadTexts: ilomCtrlNetworkIpAddress.setStatus('current') if mibBuilder.loadTexts: ilomCtrlNetworkIpAddress.setDescription('Indicates the current IP address for the given target.') ilomCtrlNetworkIpGateway = MibTableColumn((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 3, 1, 1, 5), IpAddress()).setMaxAccess("readonly") if mibBuilder.loadTexts: ilomCtrlNetworkIpGateway.setStatus('current') if mibBuilder.loadTexts: ilomCtrlNetworkIpGateway.setDescription('Indicates the current IP gateway for the given target.') ilomCtrlNetworkIpNetmask = MibTableColumn((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 3, 1, 1, 6), IpAddress()).setMaxAccess("readonly") if mibBuilder.loadTexts: ilomCtrlNetworkIpNetmask.setStatus('current') if mibBuilder.loadTexts: ilomCtrlNetworkIpNetmask.setDescription('Indicates the current IP netmask for the given target.') ilomCtrlNetworkPendingIpDiscovery = MibTableColumn((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 3, 1, 1, 7), ILOMCtrlNetworkIpDiscovery()).setMaxAccess("readwrite") if mibBuilder.loadTexts: ilomCtrlNetworkPendingIpDiscovery.setStatus('current') if mibBuilder.loadTexts: ilomCtrlNetworkPendingIpDiscovery.setDescription('This property is used to set the pending value for the mode of IP discovery for the given target. The possible values are static(1) or dynamic(2). Static values can be specified by setting the other pending properties in this table: ilomCtrlNetworkPendingIpAddress, ilomCtrlNetworkPendingIpGateway, and ilomCtrlNetworkPendingIpNetmask. If dynamic is specified, the other pending properties should not be set. This property does not take effect until the ilomCtrlNetworkCommitPending property is set to true for the given row.') ilomCtrlNetworkPendingIpAddress = MibTableColumn((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 3, 1, 1, 8), IpAddress()).setMaxAccess("readwrite") if mibBuilder.loadTexts: ilomCtrlNetworkPendingIpAddress.setStatus('current') if mibBuilder.loadTexts: ilomCtrlNetworkPendingIpAddress.setDescription('This property is used to set the pending IP address for the given target. This property does not take effect until the ilomCtrlNetworkCommitPending property is set to true for the given row.') ilomCtrlNetworkPendingIpGateway = MibTableColumn((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 3, 1, 1, 9), IpAddress()).setMaxAccess("readwrite") if mibBuilder.loadTexts: ilomCtrlNetworkPendingIpGateway.setStatus('current') if mibBuilder.loadTexts: ilomCtrlNetworkPendingIpGateway.setDescription('This property is used to set the pending IP gateway for the given target. This property does not take effect until the ilomCtrlNetworkCommitPending property is set to true for the given row.') ilomCtrlNetworkPendingIpNetmask = MibTableColumn((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 3, 1, 1, 10), IpAddress()).setMaxAccess("readwrite") if mibBuilder.loadTexts: ilomCtrlNetworkPendingIpNetmask.setStatus('current') if mibBuilder.loadTexts: ilomCtrlNetworkPendingIpNetmask.setDescription('This property is used to set the pending IP netmask for the given target. This property does not take effect until the ilomCtrlNetworkCommitPending property is set to true for the given row.') ilomCtrlNetworkCommitPending = MibTableColumn((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 3, 1, 1, 11), TruthValue()).setMaxAccess("readwrite") if mibBuilder.loadTexts: ilomCtrlNetworkCommitPending.setStatus('current') if mibBuilder.loadTexts: ilomCtrlNetworkCommitPending.setDescription('This property is used to commit pending properties for the given row. Settings this property to true(1) will cause the network to be reconfigured according to the values specified in the other pending properties.') ilomCtrlNetworkOutOfBandMacAddress = MibTableColumn((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 3, 1, 1, 12), SnmpAdminString()).setMaxAccess("readonly") if mibBuilder.loadTexts: ilomCtrlNetworkOutOfBandMacAddress.setStatus('current') if mibBuilder.loadTexts: ilomCtrlNetworkOutOfBandMacAddress.setDescription('Specifies the MAC address of the out of band management interface (where applicable)') ilomCtrlNetworkSidebandMacAddress = MibTableColumn((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 3, 1, 1, 13), SnmpAdminString()).setMaxAccess("readonly") if mibBuilder.loadTexts: ilomCtrlNetworkSidebandMacAddress.setStatus('current') if mibBuilder.loadTexts: ilomCtrlNetworkSidebandMacAddress.setDescription('Specifies the MAC address of the sideband management interface (where applicable)') ilomCtrlNetworkPendingManagementPort = MibTableColumn((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 3, 1, 1, 14), SnmpAdminString()).setMaxAccess("readwrite") if mibBuilder.loadTexts: ilomCtrlNetworkPendingManagementPort.setStatus('current') if mibBuilder.loadTexts: ilomCtrlNetworkPendingManagementPort.setDescription('This property is used to set the pending management port for the giventarget. This property does not take effect until the ilomCtrlNetworkCommitPending property is set to true for the given row.') ilomCtrlNetworkManagementPort = MibTableColumn((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 3, 1, 1, 15), SnmpAdminString()).setMaxAccess("readwrite") if mibBuilder.loadTexts: ilomCtrlNetworkManagementPort.setStatus('current') if mibBuilder.loadTexts: ilomCtrlNetworkManagementPort.setDescription('Indicates the current managment port for the given target') ilomCtrlNetworkDHCPServerAddr = MibTableColumn((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 3, 1, 1, 16), IpAddress()).setMaxAccess("readonly") if mibBuilder.loadTexts: ilomCtrlNetworkDHCPServerAddr.setStatus('current') if mibBuilder.loadTexts: ilomCtrlNetworkDHCPServerAddr.setDescription('The address of the DHCP server for this row.') ilomCtrlNetworkState = MibTableColumn((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 3, 1, 1, 17), TruthValue()).setMaxAccess("readwrite") if mibBuilder.loadTexts: ilomCtrlNetworkState.setStatus('current') if mibBuilder.loadTexts: ilomCtrlNetworkState.setDescription('Specifies whether or not the row is enabled.') ilomCtrlLocalUserAuthTable = MibTable((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 4, 1), ) if mibBuilder.loadTexts: ilomCtrlLocalUserAuthTable.setStatus('deprecated') if mibBuilder.loadTexts: ilomCtrlLocalUserAuthTable.setDescription('This table provides a listing of the current local users on a system along with their password state. ***NOTE: this table is deprecated and replaced with ilomCtrlLocalUserTable.') ilomCtrlLocalUserAuthEntry = MibTableRow((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 4, 1, 1), ).setIndexNames((0, "SUN-ILOM-CONTROL-MIB", "ilomCtrlLocalUserAuthUsername")) if mibBuilder.loadTexts: ilomCtrlLocalUserAuthEntry.setStatus('deprecated') if mibBuilder.loadTexts: ilomCtrlLocalUserAuthEntry.setDescription('An entry containing objects for a local user in the database. ***NOTE: this object is deprecated and replaced with ilomCtrlLocalUserEntry.') ilomCtrlLocalUserAuthUsername = MibTableColumn((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 4, 1, 1, 1), SnmpAdminString()) if mibBuilder.loadTexts: ilomCtrlLocalUserAuthUsername.setStatus('deprecated') if mibBuilder.loadTexts: ilomCtrlLocalUserAuthUsername.setDescription('The username of a local user on the device. ***NOTE: this object is deprecated and replaced with ilomCtrlLocalUserUsername.') ilomCtrlLocalUserAuthPassword = MibTableColumn((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 4, 1, 1, 2), SnmpAdminString()).setMaxAccess("readcreate") if mibBuilder.loadTexts: ilomCtrlLocalUserAuthPassword.setStatus('deprecated') if mibBuilder.loadTexts: ilomCtrlLocalUserAuthPassword.setDescription('The password of a local user on the device. This property is essentially write-only. The write-only access level is no longer supported as of SNMPv2. This property must return a null value when read. ***NOTE: this object is deprecated and replaced with ilomCtrlLocalUserPassword.') ilomCtrlLocalUserAuthRole = MibTableColumn((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 4, 1, 1, 3), ILOMCtrlUserRole()).setMaxAccess("readwrite") if mibBuilder.loadTexts: ilomCtrlLocalUserAuthRole.setStatus('deprecated') if mibBuilder.loadTexts: ilomCtrlLocalUserAuthRole.setDescription("Specifies whether a user's password is assigned or unassigned. ***NOTE: this object is deprecated and replaced with ilomCtrlLocalUserRoles.") ilomCtrlLocalUserAuthRowStatus = MibTableColumn((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 4, 1, 1, 4), RowStatus()).setMaxAccess("readcreate") if mibBuilder.loadTexts: ilomCtrlLocalUserAuthRowStatus.setStatus('deprecated') if mibBuilder.loadTexts: ilomCtrlLocalUserAuthRowStatus.setDescription('This object is used to create a new row or to delete an existing row in the table. This property can be set to either createAndWait(5) or destroy(6), to create and remove a user respectively. ***NOTE: this object is deprecated and replaced with ilomCtrlLocalUserRowStatus.') ilomCtrlLocalUserAuthCLIMode = MibTableColumn((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 4, 1, 1, 5), ILOMCtrlLocalUserAuthCLIMode()).setMaxAccess("readwrite") if mibBuilder.loadTexts: ilomCtrlLocalUserAuthCLIMode.setStatus('deprecated') if mibBuilder.loadTexts: ilomCtrlLocalUserAuthCLIMode.setDescription("Allows the CLI mode to be configured on a per-user basis. The CLI mode determines which shell the user will interact with. If the 'default' mode is select, the user will see the DMTF CLP after logging in via ssh or the console. If the 'alom' mode is selected, the user will see the ALOM CMT shell after logging in via ssh or the console. ***NOTE: this object is deprecated and replaced with ilomCtrlLocalUserCLIMode.") ilomCtrlLocalUserTable = MibTable((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 4, 2), ) if mibBuilder.loadTexts: ilomCtrlLocalUserTable.setStatus('current') if mibBuilder.loadTexts: ilomCtrlLocalUserTable.setDescription('This table provides a listing of the current local users on a system along with their password state.') ilomCtrlLocalUserEntry = MibTableRow((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 4, 2, 1), ).setIndexNames((0, "SUN-ILOM-CONTROL-MIB", "ilomCtrlLocalUserUsername")) if mibBuilder.loadTexts: ilomCtrlLocalUserEntry.setStatus('current') if mibBuilder.loadTexts: ilomCtrlLocalUserEntry.setDescription('An entry containing objects for a local user in the database.') ilomCtrlLocalUserUsername = MibTableColumn((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 4, 2, 1, 1), ILOMCtrlLocalUserUsername()) if mibBuilder.loadTexts: ilomCtrlLocalUserUsername.setStatus('current') if mibBuilder.loadTexts: ilomCtrlLocalUserUsername.setDescription('The username of a local user on the device.') ilomCtrlLocalUserPassword = MibTableColumn((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 4, 2, 1, 2), ILOMCtrlLocalUserPassword()).setMaxAccess("readcreate") if mibBuilder.loadTexts: ilomCtrlLocalUserPassword.setStatus('current') if mibBuilder.loadTexts: ilomCtrlLocalUserPassword.setDescription('The password of a local user on the device. This property is essentially write-only. The write-only access level is no longer supported as of SNMPv2. This property must return a null value when read.') ilomCtrlLocalUserRoles = MibTableColumn((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 4, 2, 1, 3), ILOMCtrlUserRoles()).setMaxAccess("readwrite") if mibBuilder.loadTexts: ilomCtrlLocalUserRoles.setStatus('current') if mibBuilder.loadTexts: ilomCtrlLocalUserRoles.setDescription("Specifies the role that is associated with a user. The roles can be assigned for the legacy roles of 'Administrator' or 'Operator', or any of the individual role IDs of 'a', 'u', 'c', 'r', 'o' and 's'. The role IDs can be joined together 'aucros' where a-admin, u-user, c-console, r-reset, s-service and o-readOnly.") ilomCtrlLocalUserRowStatus = MibTableColumn((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 4, 2, 1, 4), RowStatus()).setMaxAccess("readcreate") if mibBuilder.loadTexts: ilomCtrlLocalUserRowStatus.setStatus('current') if mibBuilder.loadTexts: ilomCtrlLocalUserRowStatus.setDescription('This object is used to create a new row or to delete an existing row in the table. This property can be set to either createAndWait(5) or destroy(6), to create and remove a user respectively.') ilomCtrlLocalUserCLIMode = MibTableColumn((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 4, 2, 1, 5), ILOMCtrlLocalUserAuthCLIMode()).setMaxAccess("readwrite") if mibBuilder.loadTexts: ilomCtrlLocalUserCLIMode.setStatus('current') if mibBuilder.loadTexts: ilomCtrlLocalUserCLIMode.setDescription("Allows the CLI mode to be configured on a per-user basis. The CLI mode determines which shell the user will interact with. If the 'default' mode is select, the user will see the DMTF CLP after logging in via ssh or the console. If the 'alom' mode is selected, the user will see the ALOM CMT shell after logging in via ssh or the console.") ilomCtrlSessionsTable = MibTable((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 5, 1), ) if mibBuilder.loadTexts: ilomCtrlSessionsTable.setStatus('current') if mibBuilder.loadTexts: ilomCtrlSessionsTable.setDescription('A table listing the current user sessions.') ilomCtrlSessionsEntry = MibTableRow((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 5, 1, 1), ).setIndexNames((0, "SUN-ILOM-CONTROL-MIB", "ilomCtrlSessionsId")) if mibBuilder.loadTexts: ilomCtrlSessionsEntry.setStatus('current') if mibBuilder.loadTexts: ilomCtrlSessionsEntry.setDescription('An entry for a current session.') ilomCtrlSessionsId = MibTableColumn((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 5, 1, 1, 1), Integer32().subtype(subtypeSpec=ValueRangeConstraint(0, 65535))) if mibBuilder.loadTexts: ilomCtrlSessionsId.setStatus('current') if mibBuilder.loadTexts: ilomCtrlSessionsId.setDescription('The instance number of a given logged-in user. This property is necessary since the same user can be logged in multiple times.') ilomCtrlSessionsUsername = MibTableColumn((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 5, 1, 1, 2), SnmpAdminString()).setMaxAccess("readonly") if mibBuilder.loadTexts: ilomCtrlSessionsUsername.setStatus('current') if mibBuilder.loadTexts: ilomCtrlSessionsUsername.setDescription('The username of the user associated with the session.') ilomCtrlSessionsConnectionType = MibTableColumn((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 5, 1, 1, 3), ILOMCtrlSessionsConnectionType()).setMaxAccess("readonly") if mibBuilder.loadTexts: ilomCtrlSessionsConnectionType.setStatus('current') if mibBuilder.loadTexts: ilomCtrlSessionsConnectionType.setDescription('The type of connection that the given user is using to access the device.') ilomCtrlSessionsLoginTime = MibTableColumn((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 5, 1, 1, 4), DateAndTime()).setMaxAccess("readonly") if mibBuilder.loadTexts: ilomCtrlSessionsLoginTime.setStatus('current') if mibBuilder.loadTexts: ilomCtrlSessionsLoginTime.setDescription('The date and time that the logged into the device.') ilomCtrlFirmwareMgmtVersion = MibScalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 6, 1), SnmpAdminString()).setMaxAccess("readonly") if mibBuilder.loadTexts: ilomCtrlFirmwareMgmtVersion.setStatus('current') if mibBuilder.loadTexts: ilomCtrlFirmwareMgmtVersion.setDescription('The version of the current firmware image.') ilomCtrlFirmwareBuildNumber = MibScalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 6, 2), Integer32().subtype(subtypeSpec=ValueRangeConstraint(0, 65535))).setMaxAccess("readonly") if mibBuilder.loadTexts: ilomCtrlFirmwareBuildNumber.setStatus('current') if mibBuilder.loadTexts: ilomCtrlFirmwareBuildNumber.setDescription('The build number of the current firmware image.') ilomCtrlFirmwareBuildDate = MibScalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 6, 3), SnmpAdminString()).setMaxAccess("readonly") if mibBuilder.loadTexts: ilomCtrlFirmwareBuildDate.setStatus('current') if mibBuilder.loadTexts: ilomCtrlFirmwareBuildDate.setDescription('The build date and time of the current firmware image.') ilomCtrlFirmwareTFTPServerIP = MibScalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 6, 4), IpAddress()).setMaxAccess("readwrite") if mibBuilder.loadTexts: ilomCtrlFirmwareTFTPServerIP.setStatus('current') if mibBuilder.loadTexts: ilomCtrlFirmwareTFTPServerIP.setDescription('The IP address of the TFTP server which will be used to download the the firmware image.') ilomCtrlFirmwareTFTPFileName = MibScalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 6, 5), SnmpAdminString()).setMaxAccess("readwrite") if mibBuilder.loadTexts: ilomCtrlFirmwareTFTPFileName.setStatus('current') if mibBuilder.loadTexts: ilomCtrlFirmwareTFTPFileName.setDescription('The relative path of the new firmware image file on the TFTP server.') ilomCtrlFirmwarePreserveConfig = MibScalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 6, 6), TruthValue()).setMaxAccess("readwrite") if mibBuilder.loadTexts: ilomCtrlFirmwarePreserveConfig.setStatus('current') if mibBuilder.loadTexts: ilomCtrlFirmwarePreserveConfig.setDescription('This property determines whether the previous configuration of the device should be preserved after a firmware update. The configuration data includes all users information, configuration of clients and services, and any logs. The default value of this property is true.') ilomCtrlFirmwareMgmtStatus = MibScalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 6, 7), ILOMCtrlFirmwareUpdateStatus()).setMaxAccess("readonly") if mibBuilder.loadTexts: ilomCtrlFirmwareMgmtStatus.setStatus('current') if mibBuilder.loadTexts: ilomCtrlFirmwareMgmtStatus.setDescription('This property indicates the status of a firmware update. If a TFTP error occurred while attempting to upload a new firmware image, the value of this property will be tftpError(1). If the image was uploaded correctly but it did not pass verification, the value of this property will be imageVerificationFailed(2). Otherwise, the status will indicate that the update is inProgress(3) or is a success(4). A firmware update could take as long as 20 minutes. During this time, no other operations should be performed on the device. Upon success, the device will be reset.') ilomCtrlFirmwareMgmtAction = MibScalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 6, 8), ILOMCtrlFirmwareUpdateAction()).setMaxAccess("readwrite") if mibBuilder.loadTexts: ilomCtrlFirmwareMgmtAction.setStatus('current') if mibBuilder.loadTexts: ilomCtrlFirmwareMgmtAction.setDescription('This property is used to initiate a firmware update using the values of the other firmware management properties as parameters. It can also clear the values of those parameters. To initiate a firmware update, set the value of this property to initate(2). To clear the values of the writeable firmware management properties, set this propery to clearProperties(1). Before initiating a firmware update, the ilomCtrlFirmwareTFTPServerIP, ilomCtrlFirmwareTFTPFileName, and ilomCtrlFirmwarePreserveConfig properties must be set. After intiating a firmware update, the ilomCtrlFirmwareMgmtStatus property can be used to determine if the operation was successful. This is effectively a write-only property.') ilomCtrlFirmwareMgmtFilesystemVersion = MibScalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 6, 9), SnmpAdminString()).setMaxAccess("readonly") if mibBuilder.loadTexts: ilomCtrlFirmwareMgmtFilesystemVersion.setStatus('current') if mibBuilder.loadTexts: ilomCtrlFirmwareMgmtFilesystemVersion.setDescription('The version of the current file system.') ilomCtrlFirmwareDelayBIOS = MibScalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 6, 10), TruthValue()).setMaxAccess("readwrite") if mibBuilder.loadTexts: ilomCtrlFirmwareDelayBIOS.setStatus('current') if mibBuilder.loadTexts: ilomCtrlFirmwareDelayBIOS.setDescription("On servers that support a BIOS, this property is used to postpone the BIOS upgrade until the next server poweroff. Setting this property to 'false' will cause the server to be forced off if a BIOS upgrade is necessary. The default value of this property is false.") ilomCtrlEventLogTable = MibTable((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 7, 1, 1), ) if mibBuilder.loadTexts: ilomCtrlEventLogTable.setStatus('current') if mibBuilder.loadTexts: ilomCtrlEventLogTable.setDescription('This table provides a list of the current entries in the event log.') ilomCtrlEventLogEntry = MibTableRow((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 7, 1, 1, 1), ).setIndexNames((0, "SUN-ILOM-CONTROL-MIB", "ilomCtrlEventLogRecordID")) if mibBuilder.loadTexts: ilomCtrlEventLogEntry.setStatus('current') if mibBuilder.loadTexts: ilomCtrlEventLogEntry.setDescription('An entry in the event logs table.') ilomCtrlEventLogRecordID = MibTableColumn((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 7, 1, 1, 1, 1), Unsigned32()) if mibBuilder.loadTexts: ilomCtrlEventLogRecordID.setStatus('current') if mibBuilder.loadTexts: ilomCtrlEventLogRecordID.setDescription('The record number for a given the event log entry.') ilomCtrlEventLogType = MibTableColumn((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 7, 1, 1, 1, 2), ILOMCtrlEventLogType()).setMaxAccess("readonly") if mibBuilder.loadTexts: ilomCtrlEventLogType.setStatus('current') if mibBuilder.loadTexts: ilomCtrlEventLogType.setDescription('An integer representing the type of event.') ilomCtrlEventLogTimestamp = MibTableColumn((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 7, 1, 1, 1, 3), DateAndTime()).setMaxAccess("readonly") if mibBuilder.loadTexts: ilomCtrlEventLogTimestamp.setStatus('current') if mibBuilder.loadTexts: ilomCtrlEventLogTimestamp.setDescription('The date and time that the event log entry was recorded.') ilomCtrlEventLogClass = MibTableColumn((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 7, 1, 1, 1, 4), ILOMCtrlEventLogClass()).setMaxAccess("readonly") if mibBuilder.loadTexts: ilomCtrlEventLogClass.setStatus('current') if mibBuilder.loadTexts: ilomCtrlEventLogClass.setDescription('An integer representing the class of event.') ilomCtrlEventLogSeverity = MibTableColumn((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 7, 1, 1, 1, 5), ILOMCtrlEventSeverity()).setMaxAccess("readonly") if mibBuilder.loadTexts: ilomCtrlEventLogSeverity.setStatus('current') if mibBuilder.loadTexts: ilomCtrlEventLogSeverity.setDescription('The event severity corresponding to the given log entry.') ilomCtrlEventLogDescription = MibTableColumn((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 7, 1, 1, 1, 6), SnmpAdminString()).setMaxAccess("readonly") if mibBuilder.loadTexts: ilomCtrlEventLogDescription.setStatus('current') if mibBuilder.loadTexts: ilomCtrlEventLogDescription.setDescription('A textual description of the event.') ilomCtrlEventLogClear = MibScalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 7, 1, 2), TruthValue()).setMaxAccess("readwrite") if mibBuilder.loadTexts: ilomCtrlEventLogClear.setStatus('current') if mibBuilder.loadTexts: ilomCtrlEventLogClear.setDescription("When set to 'true' clears the event log.") ilomCtrlAlertsTable = MibTable((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 8, 1), ) if mibBuilder.loadTexts: ilomCtrlAlertsTable.setStatus('current') if mibBuilder.loadTexts: ilomCtrlAlertsTable.setDescription('This table is used to view and add alert rules.') ilomCtrlAlertsEntry = MibTableRow((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 8, 1, 1), ).setIndexNames((0, "SUN-ILOM-CONTROL-MIB", "ilomCtrlAlertID")) if mibBuilder.loadTexts: ilomCtrlAlertsEntry.setStatus('current') if mibBuilder.loadTexts: ilomCtrlAlertsEntry.setDescription('An entry containing objects for an alert rule.') ilomCtrlAlertID = MibTableColumn((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 8, 1, 1, 1), Integer32().subtype(subtypeSpec=ValueRangeConstraint(0, 65535))) if mibBuilder.loadTexts: ilomCtrlAlertID.setStatus('current') if mibBuilder.loadTexts: ilomCtrlAlertID.setDescription('An integer ID associated with a given alert rule.') ilomCtrlAlertSeverity = MibTableColumn((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 8, 1, 1, 2), ILOMCtrlEventSeverity()).setMaxAccess("readwrite") if mibBuilder.loadTexts: ilomCtrlAlertSeverity.setStatus('current') if mibBuilder.loadTexts: ilomCtrlAlertSeverity.setDescription('This property specifies the mininum event severity which should trigger an alert, for a given class.') ilomCtrlAlertType = MibTableColumn((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 8, 1, 1, 3), ILOMCtrlAlertType()).setMaxAccess("readwrite") if mibBuilder.loadTexts: ilomCtrlAlertType.setStatus('current') if mibBuilder.loadTexts: ilomCtrlAlertType.setDescription('This property specifies the type of notification for a given alert. If the type is snmptrap(2) or ipmipet(3), the ilomCtrlAlertDestinationIP must be specified. If the type is email(1), the ilomCtrlAlertDestinationEmail must be specified.') ilomCtrlAlertDestinationIP = MibTableColumn((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 8, 1, 1, 4), IpAddress()).setMaxAccess("readwrite") if mibBuilder.loadTexts: ilomCtrlAlertDestinationIP.setStatus('current') if mibBuilder.loadTexts: ilomCtrlAlertDestinationIP.setDescription('This property species the IP address to send alert notifications when the alert type is snmptrap(2), ipmipet(3), or remotesyslog(4).') ilomCtrlAlertDestinationEmail = MibTableColumn((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 8, 1, 1, 5), SnmpAdminString()).setMaxAccess("readwrite") if mibBuilder.loadTexts: ilomCtrlAlertDestinationEmail.setStatus('current') if mibBuilder.loadTexts: ilomCtrlAlertDestinationEmail.setDescription('This property species the email address to send alert notifications when the alert type is email(1).') ilomCtrlAlertSNMPVersion = MibTableColumn((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 8, 1, 1, 6), ILOMCtrlAlertSNMPVersion()).setMaxAccess("readwrite") if mibBuilder.loadTexts: ilomCtrlAlertSNMPVersion.setStatus('current') if mibBuilder.loadTexts: ilomCtrlAlertSNMPVersion.setDescription('The version of SNMP trap that should be used for the given alert rule.') ilomCtrlAlertSNMPCommunityOrUsername = MibTableColumn((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 8, 1, 1, 7), SnmpAdminString()).setMaxAccess("readwrite") if mibBuilder.loadTexts: ilomCtrlAlertSNMPCommunityOrUsername.setStatus('current') if mibBuilder.loadTexts: ilomCtrlAlertSNMPCommunityOrUsername.setDescription("This string specifies the community string to be used when the ilomCtrlAlertSNMPVersion property is set to 'v1' or 'v2c'. Alternatively, this string specifies the SNMP username to use when the ilomCtrlAlertSNMPVersion is set to 'v3'.") ilomCtrlAlertDestinationPort = MibTableColumn((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 8, 1, 1, 8), Integer32().subtype(subtypeSpec=ValueRangeConstraint(0, 65535))).setMaxAccess("readwrite") if mibBuilder.loadTexts: ilomCtrlAlertDestinationPort.setStatus('current') if mibBuilder.loadTexts: ilomCtrlAlertDestinationPort.setDescription('Destination port for SNMP traps, 0 maps to the default') ilomCtrlAlertEmailEventClassFilter = MibTableColumn((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 8, 1, 1, 9), SnmpAdminString()).setMaxAccess("readwrite") if mibBuilder.loadTexts: ilomCtrlAlertEmailEventClassFilter.setStatus('current') if mibBuilder.loadTexts: ilomCtrlAlertEmailEventClassFilter.setDescription("A class name or 'all' to filter emailed alerts on.") ilomCtrlAlertEmailEventTypeFilter = MibTableColumn((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 8, 1, 1, 10), SnmpAdminString()).setMaxAccess("readwrite") if mibBuilder.loadTexts: ilomCtrlAlertEmailEventTypeFilter.setStatus('current') if mibBuilder.loadTexts: ilomCtrlAlertEmailEventTypeFilter.setDescription("A type name or 'all' to filter emailed alerts on.") ilomCtrlAlertEmailCustomSender = MibTableColumn((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 8, 1, 1, 11), SnmpAdminString().subtype(subtypeSpec=ValueSizeConstraint(0, 80))).setMaxAccess("readwrite") if mibBuilder.loadTexts: ilomCtrlAlertEmailCustomSender.setStatus('current') if mibBuilder.loadTexts: ilomCtrlAlertEmailCustomSender.setDescription("An optional format to identify the sender or the 'from' address. Customizing this string allows the user to specify the exact contents (up to 80 chars) of the 'from' field in the email message. Either one of the substitution strings '<IPADDRESS>' or '<HOSTNAME>' can be used as needed. By default, this parameter is an empty string, which results in the standard ILOM formatted originator for the alerts. e.g., ilom-sp@sp1302.dev.sun.com, sun-ilom@[<IPADDRESS>], or ilom-alert@<HOSTNAME>.abc.com") ilomCtrlAlertEmailMessagePrefix = MibTableColumn((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 8, 1, 1, 12), SnmpAdminString().subtype(subtypeSpec=ValueSizeConstraint(0, 80))).setMaxAccess("readwrite") if mibBuilder.loadTexts: ilomCtrlAlertEmailMessagePrefix.setStatus('current') if mibBuilder.loadTexts: ilomCtrlAlertEmailMessagePrefix.setDescription('An optional string that can be added to the beginning of the message body. The prefix size can be up to 80 characters.') ilomCtrlDateAndTime = MibScalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 9, 1), DateAndTime()).setMaxAccess("readwrite") if mibBuilder.loadTexts: ilomCtrlDateAndTime.setStatus('current') if mibBuilder.loadTexts: ilomCtrlDateAndTime.setDescription('The date and time of the device.') ilomCtrlNTPEnabled = MibScalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 9, 2), TruthValue()).setMaxAccess("readwrite") if mibBuilder.loadTexts: ilomCtrlNTPEnabled.setStatus('current') if mibBuilder.loadTexts: ilomCtrlNTPEnabled.setDescription('Specifies whether or not Network Time Protocol is enabled.') ilomCtrlTimezone = MibScalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 9, 3), SnmpAdminString()).setMaxAccess("readwrite") if mibBuilder.loadTexts: ilomCtrlTimezone.setStatus('current') if mibBuilder.loadTexts: ilomCtrlTimezone.setDescription('The configured timezone string.') ilomCtrlSerialInternalPortPresent = MibScalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 10, 1), TruthValue()).setMaxAccess("readonly") if mibBuilder.loadTexts: ilomCtrlSerialInternalPortPresent.setStatus('current') if mibBuilder.loadTexts: ilomCtrlSerialInternalPortPresent.setDescription('Indicates whether the given device has an internal serial port that is configurable. The internal serial port is the connection between the host server and the service processor that allows the SP to access the host serial console.') ilomCtrlSerialInternalPortBaudRate = MibScalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 10, 2), ILOMCtrlBaudRate()).setMaxAccess("readwrite") if mibBuilder.loadTexts: ilomCtrlSerialInternalPortBaudRate.setStatus('current') if mibBuilder.loadTexts: ilomCtrlSerialInternalPortBaudRate.setDescription('Specifies the current baud rate setting for the internal serial port. This is only readable/settable if ilomCtrlSerialInternalPortPresent is true.') ilomCtrlSerialExternalPortPresent = MibScalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 10, 3), TruthValue()).setMaxAccess("readonly") if mibBuilder.loadTexts: ilomCtrlSerialExternalPortPresent.setStatus('current') if mibBuilder.loadTexts: ilomCtrlSerialExternalPortPresent.setDescription('Indicates whether the given device has an external serial port that is configurable.') ilomCtrlSerialExternalPortBaudRate = MibScalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 10, 4), ILOMCtrlBaudRate()).setMaxAccess("readwrite") if mibBuilder.loadTexts: ilomCtrlSerialExternalPortBaudRate.setStatus('current') if mibBuilder.loadTexts: ilomCtrlSerialExternalPortBaudRate.setDescription('Specifies the current baud rate setting for the external serial port. This is only readable/settable if ilomCtrlSerialExternalPortPresent is true.') ilomCtrlSerialExternalPortFlowControl = MibScalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 10, 5), ILOMCtrlFlowControl()).setMaxAccess("readonly") if mibBuilder.loadTexts: ilomCtrlSerialExternalPortFlowControl.setStatus('current') if mibBuilder.loadTexts: ilomCtrlSerialExternalPortFlowControl.setDescription('Specifies the current flowcontrol setting for the external serial port. This is only readable/settable if ilomCtrlSerialExternalPortPresent is true.') ilomCtrlPowerTable = MibTable((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 11, 1, 1), ) if mibBuilder.loadTexts: ilomCtrlPowerTable.setStatus('current') if mibBuilder.loadTexts: ilomCtrlPowerTable.setDescription('A table listing all targets whose power can be controlled.') ilomCtrlPowerEntry = MibTableRow((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 11, 1, 1, 1), ).setIndexNames((0, "SUN-ILOM-CONTROL-MIB", "ilomCtrlPowerTarget")) if mibBuilder.loadTexts: ilomCtrlPowerEntry.setStatus('current') if mibBuilder.loadTexts: ilomCtrlPowerEntry.setDescription('An entry for a power-controllable target.') ilomCtrlPowerTarget = MibTableColumn((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 11, 1, 1, 1, 1), SnmpAdminString()) if mibBuilder.loadTexts: ilomCtrlPowerTarget.setStatus('current') if mibBuilder.loadTexts: ilomCtrlPowerTarget.setDescription("This is the nomenclature name for a target which supports power control. On some systems, there are multiple targets which support power control. On a traditional, non-blade system, this table will contain only one row. The nomenclature name for a traditional server is '/SYS'. On blade systems, this table will contain multiple rows. There will be a row for '/CH' which allows for power control of the entire chassis. In addition, there will be rows for each blade. Blade nomenclature takes the form of '/CH/BL0/SYS', '/CH/BL1/SYS', and so on.") ilomCtrlPowerAction = MibTableColumn((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 11, 1, 1, 1, 2), ILOMCtrlPowerAction()).setMaxAccess("readwrite") if mibBuilder.loadTexts: ilomCtrlPowerAction.setStatus('current') if mibBuilder.loadTexts: ilomCtrlPowerAction.setDescription('The action to apply to the given power control target. The possible actions are powerOn(1), powerOff(2), powerCycle(3), and powerSoft(4). When this value is read, it returns a null value.') ilomCtrlResetTable = MibTable((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 11, 2, 1), ) if mibBuilder.loadTexts: ilomCtrlResetTable.setStatus('current') if mibBuilder.loadTexts: ilomCtrlResetTable.setDescription('A table listing all targets which can be reset.') ilomCtrlResetEntry = MibTableRow((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 11, 2, 1, 1), ).setIndexNames((0, "SUN-ILOM-CONTROL-MIB", "ilomCtrlResetTarget")) if mibBuilder.loadTexts: ilomCtrlResetEntry.setStatus('current') if mibBuilder.loadTexts: ilomCtrlResetEntry.setDescription('An entry for a target which can be reset.') ilomCtrlResetTarget = MibTableColumn((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 11, 2, 1, 1, 1), SnmpAdminString()) if mibBuilder.loadTexts: ilomCtrlResetTarget.setStatus('current') if mibBuilder.loadTexts: ilomCtrlResetTarget.setDescription("This is the nomenclature name for a target which supports reset capabilities. On some systems, there are multiple targets which support reset. On most systems, only system controllers and service processors support reset. On a traditional, non-blade system, this table will contain only one row, representing its service processor. The nomenclature name for a traditional server's service processor is '/SP'. On blade systems, this table will contain multiple rows. There will be a row for '/SC' which allows for reset of the system controller. In addition, there will be rows for each blade's service processor. For example, a blade's service processor nomenclature takes the form of '/CH/BL0/SP', '/CH/BL1/SP' and so on.") ilomCtrlResetAction = MibTableColumn((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 11, 2, 1, 1, 2), ILOMCtrlResetAction()).setMaxAccess("readwrite") if mibBuilder.loadTexts: ilomCtrlResetAction.setStatus('current') if mibBuilder.loadTexts: ilomCtrlResetAction.setDescription('The action to apply to the given reset control target. The possible actions are reset(1), which is a normal reset, resetNonMaskableInterrupt(2) which is a forced reset, and force(3) which is a forced reset for platforms that do not support NMI. When this value is read, it returns a null value.') ilomCtrlRedundancyStatus = MibScalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 12, 1), ILOMCtrlRedundancyStatus()).setMaxAccess("readonly") if mibBuilder.loadTexts: ilomCtrlRedundancyStatus.setStatus('current') if mibBuilder.loadTexts: ilomCtrlRedundancyStatus.setDescription('This property indicates the status of the device in a redundant configuration. It may be active(2) or standby(3) when configured as a redundant pair or standAlone(4) if it does not have a peer. In addition, it may be in a state called initializing(1) if it is in a transitional state.') ilomCtrlRedundancyAction = MibScalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 12, 2), ILOMCtrlRedundancyAction()).setMaxAccess("readwrite") if mibBuilder.loadTexts: ilomCtrlRedundancyAction.setStatus('current') if mibBuilder.loadTexts: ilomCtrlRedundancyAction.setDescription('This action is used to promote or demote this device from active or standy status.') ilomCtrlRedundancyFRUName = MibScalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 12, 3), DisplayString()).setMaxAccess("readonly") if mibBuilder.loadTexts: ilomCtrlRedundancyFRUName.setStatus('current') if mibBuilder.loadTexts: ilomCtrlRedundancyFRUName.setDescription('FRU Name of the CMM on which this agent is running.') ilomCtrlPolicyTable = MibTable((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 13, 1), ) if mibBuilder.loadTexts: ilomCtrlPolicyTable.setStatus('current') if mibBuilder.loadTexts: ilomCtrlPolicyTable.setDescription('A table listing all policies that can be administered.') ilomCtrlPolicyEntry = MibTableRow((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 13, 1, 1), ).setIndexNames((0, "SUN-ILOM-CONTROL-MIB", "ilomCtrlPolicyId")) if mibBuilder.loadTexts: ilomCtrlPolicyEntry.setStatus('current') if mibBuilder.loadTexts: ilomCtrlPolicyEntry.setDescription('An entry for a policy which can be enabled or disabled.') ilomCtrlPolicyId = MibTableColumn((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 13, 1, 1, 1), Integer32().subtype(subtypeSpec=ValueRangeConstraint(0, 65535))) if mibBuilder.loadTexts: ilomCtrlPolicyId.setStatus('current') if mibBuilder.loadTexts: ilomCtrlPolicyId.setDescription('An integer identifier of the policy.') ilomCtrlPolicyShortStr = MibTableColumn((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 13, 1, 1, 2), DisplayString()).setMaxAccess("readonly") if mibBuilder.loadTexts: ilomCtrlPolicyShortStr.setStatus('current') if mibBuilder.loadTexts: ilomCtrlPolicyShortStr.setDescription('A short description of the policy.') ilomCtrlPolicyLongStr = MibTableColumn((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 13, 1, 1, 3), DisplayString()).setMaxAccess("readonly") if mibBuilder.loadTexts: ilomCtrlPolicyLongStr.setStatus('current') if mibBuilder.loadTexts: ilomCtrlPolicyLongStr.setDescription('A verbose description of the policy.') ilomCtrlPolicyEnabled = MibTableColumn((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 13, 1, 1, 4), TruthValue()).setMaxAccess("readwrite") if mibBuilder.loadTexts: ilomCtrlPolicyEnabled.setStatus('current') if mibBuilder.loadTexts: ilomCtrlPolicyEnabled.setDescription('Indicates the status of the policy.') ilomCtrlResetToDefaultsAction = MibScalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 14, 1), ILOMCtrlResetToDefaultsAction()).setMaxAccess("readwrite") if mibBuilder.loadTexts: ilomCtrlResetToDefaultsAction.setStatus('current') if mibBuilder.loadTexts: ilomCtrlResetToDefaultsAction.setDescription('This property is used to initiate the action of restoring the configuration on the SP to the original factory default state.') ilomCtrlBackupAndRestoreTargetURI = MibScalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 14, 2, 1), SnmpAdminString()).setMaxAccess("readwrite") if mibBuilder.loadTexts: ilomCtrlBackupAndRestoreTargetURI.setStatus('current') if mibBuilder.loadTexts: ilomCtrlBackupAndRestoreTargetURI.setDescription('This property is used to set target destination of configuration xml file during backup and restore. The syntax is {protocol}://[user:passwword]@]host[/][path/][file] for example tftp://10.8.136.154/remotedir/config_backup.xml currently, the supported protocols are: scp, tftp. for certain protocol which needs password field, please use ilomCtrlBackupAndRestoreProtocolPassword to set password.') ilomCtrlBackupAndRestorePassphrase = MibScalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 14, 2, 2), SnmpAdminString()).setMaxAccess("readwrite") if mibBuilder.loadTexts: ilomCtrlBackupAndRestorePassphrase.setStatus('current') if mibBuilder.loadTexts: ilomCtrlBackupAndRestorePassphrase.setDescription('This property is used to set passphrase for encrypt/decrypt sensitive data during backup and restore. For snmpget, it returns null as value. ') ilomCtrlBackupAndRestoreAction = MibScalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 14, 2, 3), ILOMCtrlBackupAndRestoreAction()).setMaxAccess("readwrite") if mibBuilder.loadTexts: ilomCtrlBackupAndRestoreAction.setStatus('current') if mibBuilder.loadTexts: ilomCtrlBackupAndRestoreAction.setDescription('This property is used to issue a action, either backup or restore. ') ilomCtrlBackupAndRestoreActionStatus = MibScalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 14, 2, 4), SnmpAdminString()).setMaxAccess("readonly") if mibBuilder.loadTexts: ilomCtrlBackupAndRestoreActionStatus.setStatus('current') if mibBuilder.loadTexts: ilomCtrlBackupAndRestoreActionStatus.setDescription('This property is used to monitor the current status of backup/restore. ') ilomCtrlSPARCDiagsLevel = MibScalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 15, 1, 1), ILOMCtrlSPARCDiagsLevel()).setMaxAccess("readwrite") if mibBuilder.loadTexts: ilomCtrlSPARCDiagsLevel.setStatus('deprecated') if mibBuilder.loadTexts: ilomCtrlSPARCDiagsLevel.setDescription('Indicates the level of embedded diagnostics that should be run on the host during a boot. ***NOTE: this object is deprecated and replaced with these: ilomCtrlSPARCDiagsPowerOnLevel, ilomCtrlSPARCDiagsUserResetLevel, ilomCtrlSPARCDiagsErrorResetLevel While deprecated, this object will display advsettings(3), unless: - all 3 of the above are currently set to init(1), in which case this object will display min(1) - all 3 of the above are currently set to maximum(3), in which case this object will display max(2).') ilomCtrlSPARCDiagsTrigger = MibScalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 15, 1, 2), ILOMCtrlSPARCDiagsTrigger()).setMaxAccess("readwrite") if mibBuilder.loadTexts: ilomCtrlSPARCDiagsTrigger.setStatus('current') if mibBuilder.loadTexts: ilomCtrlSPARCDiagsTrigger.setDescription('Indicates the triggers of embedded diagnostics for the host.') ilomCtrlSPARCDiagsVerbosity = MibScalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 15, 1, 3), ILOMCtrlSPARCDiagsVerbosity()).setMaxAccess("readwrite") if mibBuilder.loadTexts: ilomCtrlSPARCDiagsVerbosity.setStatus('deprecated') if mibBuilder.loadTexts: ilomCtrlSPARCDiagsVerbosity.setDescription('Indicates the verbosity level of embedded diagnostics that should be run on the host during a boot. ***NOTE: this object is deprecated and replaced with these: ilomCtrlSPARCDiagsPowerOnVerbosity, ilomCtrlSPARCDiagsUserResetVerbosity, ilomCtrlSPARCDiagsErrorResetVerbosity. While deprecated, this object will display advsettings(3), unless: - all 3 of the above are currently set to minimum(1), in which case this object will display min(1) - all 3 of the above are currently set to maximum(3), in which case this object will display max(2).') ilomCtrlSPARCDiagsMode = MibScalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 15, 1, 4), ILOMCtrlSPARCDiagsMode()).setMaxAccess("readwrite") if mibBuilder.loadTexts: ilomCtrlSPARCDiagsMode.setStatus('current') if mibBuilder.loadTexts: ilomCtrlSPARCDiagsMode.setDescription('Indicates the modes for POST. POST will stop at the mode specified by this property.') ilomCtrlSPARCDiagsPowerOnLevel = MibScalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 15, 1, 5), ILOMCtrlSPARCDiagsLevelAdv()).setMaxAccess("readwrite") if mibBuilder.loadTexts: ilomCtrlSPARCDiagsPowerOnLevel.setStatus('current') if mibBuilder.loadTexts: ilomCtrlSPARCDiagsPowerOnLevel.setDescription('Indicates the level of embedded diagnostics that should be run on the host during a boot for the power-on-reset trigger.') ilomCtrlSPARCDiagsUserResetLevel = MibScalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 15, 1, 6), ILOMCtrlSPARCDiagsLevelAdv()).setMaxAccess("readwrite") if mibBuilder.loadTexts: ilomCtrlSPARCDiagsUserResetLevel.setStatus('current') if mibBuilder.loadTexts: ilomCtrlSPARCDiagsUserResetLevel.setDescription('Indicates the level of embedded diagnostics that should be run on the host during a boot for the user-reset trigger.') ilomCtrlSPARCDiagsErrorResetLevel = MibScalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 15, 1, 7), ILOMCtrlSPARCDiagsLevelAdv()).setMaxAccess("readwrite") if mibBuilder.loadTexts: ilomCtrlSPARCDiagsErrorResetLevel.setStatus('current') if mibBuilder.loadTexts: ilomCtrlSPARCDiagsErrorResetLevel.setDescription('Indicates the level of embedded diagnostics that should be run on the host during a boot for the error-reset trigger.') ilomCtrlSPARCDiagsPowerOnVerbosity = MibScalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 15, 1, 8), ILOMCtrlSPARCDiagsVerbosityAdv()).setMaxAccess("readwrite") if mibBuilder.loadTexts: ilomCtrlSPARCDiagsPowerOnVerbosity.setStatus('current') if mibBuilder.loadTexts: ilomCtrlSPARCDiagsPowerOnVerbosity.setDescription('Indicates the verbosity level of embedded diagnostics that should be run on the host during a boot for power-on-reset trigger.') ilomCtrlSPARCDiagsUserResetVerbosity = MibScalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 15, 1, 9), ILOMCtrlSPARCDiagsVerbosityAdv()).setMaxAccess("readwrite") if mibBuilder.loadTexts: ilomCtrlSPARCDiagsUserResetVerbosity.setStatus('current') if mibBuilder.loadTexts: ilomCtrlSPARCDiagsUserResetVerbosity.setDescription('Indicates the verbosity level of embedded diagnostics that should be run on the host during a boot for user-reset trigger.') ilomCtrlSPARCDiagsErrorResetVerbosity = MibScalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 15, 1, 10), ILOMCtrlSPARCDiagsVerbosityAdv()).setMaxAccess("readwrite") if mibBuilder.loadTexts: ilomCtrlSPARCDiagsErrorResetVerbosity.setStatus('current') if mibBuilder.loadTexts: ilomCtrlSPARCDiagsErrorResetVerbosity.setDescription('Indicates the verbosity level of embedded diagnostics that should be run on the host during a boot for error-reset trigger.') ilomCtrlSPARCDiagsStatus = MibScalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 15, 1, 11), Integer32().subtype(subtypeSpec=ValueRangeConstraint(0, 100))).setMaxAccess("readonly") if mibBuilder.loadTexts: ilomCtrlSPARCDiagsStatus.setStatus('current') if mibBuilder.loadTexts: ilomCtrlSPARCDiagsStatus.setDescription('Indicates the progress of POST diagnostics on the host, expressed as a percentage.') ilomCtrlSPARCDiagsAction = MibScalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 15, 1, 12), ILOMCtrlSPARCDiagsAction()).setMaxAccess("readwrite") if mibBuilder.loadTexts: ilomCtrlSPARCDiagsAction.setStatus('current') if mibBuilder.loadTexts: ilomCtrlSPARCDiagsAction.setDescription('An action to take to control POST running on the host.') ilomCtrlSPARCDiagsHwChangeLevel = MibScalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 15, 1, 13), ILOMCtrlSPARCDiagsLevelAdv()).setMaxAccess("readwrite") if mibBuilder.loadTexts: ilomCtrlSPARCDiagsHwChangeLevel.setStatus('current') if mibBuilder.loadTexts: ilomCtrlSPARCDiagsHwChangeLevel.setDescription('Indicates the level of embedded diagnostics that should be run on the host during a boot for the hw-change trigger.') ilomCtrlSPARCDiagsHwChangeVerbosity = MibScalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 15, 1, 14), ILOMCtrlSPARCDiagsVerbosityAdv()).setMaxAccess("readwrite") if mibBuilder.loadTexts: ilomCtrlSPARCDiagsHwChangeVerbosity.setStatus('current') if mibBuilder.loadTexts: ilomCtrlSPARCDiagsHwChangeVerbosity.setDescription('Indicates the verbosity level of embedded diagnostics that should be run on the host during a boot for hw-change trigger.') ilomCtrlSPARCHostMACAddress = MibScalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 15, 2, 1), SnmpAdminString()).setMaxAccess("readonly") if mibBuilder.loadTexts: ilomCtrlSPARCHostMACAddress.setStatus('current') if mibBuilder.loadTexts: ilomCtrlSPARCHostMACAddress.setDescription('Displays the starting MAC address for the host.') ilomCtrlSPARCHostOBPVersion = MibScalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 15, 2, 3), SnmpAdminString()).setMaxAccess("readonly") if mibBuilder.loadTexts: ilomCtrlSPARCHostOBPVersion.setStatus('current') if mibBuilder.loadTexts: ilomCtrlSPARCHostOBPVersion.setDescription('Displays the version string for OBP.') ilomCtrlSPARCHostPOSTVersion = MibScalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 15, 2, 4), SnmpAdminString()).setMaxAccess("readonly") if mibBuilder.loadTexts: ilomCtrlSPARCHostPOSTVersion.setStatus('current') if mibBuilder.loadTexts: ilomCtrlSPARCHostPOSTVersion.setDescription('Displays the version string for POST.') ilomCtrlSPARCHostAutoRunOnError = MibScalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 15, 2, 6), TruthValue()).setMaxAccess("readwrite") if mibBuilder.loadTexts: ilomCtrlSPARCHostAutoRunOnError.setStatus('current') if mibBuilder.loadTexts: ilomCtrlSPARCHostAutoRunOnError.setDescription('This option determines whether the host should continue to boot in the event of a non-fatal POST error.') ilomCtrlSPARCHostPOSTStatus = MibScalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 15, 2, 7), SnmpAdminString()).setMaxAccess("readonly") if mibBuilder.loadTexts: ilomCtrlSPARCHostPOSTStatus.setStatus('current') if mibBuilder.loadTexts: ilomCtrlSPARCHostPOSTStatus.setDescription('A string that describes the status of POST. ***NOTE: OS Boot status is ilomCtrlSPARCHostOSBootStatus.') ilomCtrlSPARCHostAutoRestartPolicy = MibScalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 15, 2, 8), ILOMCtrlSPARCHostAutoRestartPolicy()).setMaxAccess("readwrite") if mibBuilder.loadTexts: ilomCtrlSPARCHostAutoRestartPolicy.setStatus('current') if mibBuilder.loadTexts: ilomCtrlSPARCHostAutoRestartPolicy.setDescription('This determines what action the SP should take when it discovers that the host is hung.') ilomCtrlSPARCHostOSBootStatus = MibScalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 15, 2, 9), SnmpAdminString()).setMaxAccess("readonly") if mibBuilder.loadTexts: ilomCtrlSPARCHostOSBootStatus.setStatus('current') if mibBuilder.loadTexts: ilomCtrlSPARCHostOSBootStatus.setDescription('A string that describes the boot status of host OS.') ilomCtrlSPARCHostBootTimeout = MibScalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 15, 2, 10), Integer32().subtype(subtypeSpec=ValueRangeConstraint(0, 36000))).setMaxAccess("readwrite") if mibBuilder.loadTexts: ilomCtrlSPARCHostBootTimeout.setStatus('current') if mibBuilder.loadTexts: ilomCtrlSPARCHostBootTimeout.setDescription('This is the boot timer time out value.') ilomCtrlSPARCHostBootRestart = MibScalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 15, 2, 11), ILOMCtrlSPARCHostBootRestart()).setMaxAccess("readwrite") if mibBuilder.loadTexts: ilomCtrlSPARCHostBootRestart.setStatus('current') if mibBuilder.loadTexts: ilomCtrlSPARCHostBootRestart.setDescription('This determines what action the SP should take when the boot timer expires.') ilomCtrlSPARCHostMaxBootFail = MibScalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 15, 2, 12), Integer32().subtype(subtypeSpec=ValueRangeConstraint(0, 10000))).setMaxAccess("readwrite") if mibBuilder.loadTexts: ilomCtrlSPARCHostMaxBootFail.setStatus('current') if mibBuilder.loadTexts: ilomCtrlSPARCHostMaxBootFail.setDescription('This is the number of max boot failures allowed.') ilomCtrlSPARCHostBootFailRecovery = MibScalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 15, 2, 13), ILOMCtrlSPARCHostBootFailRecovery()).setMaxAccess("readwrite") if mibBuilder.loadTexts: ilomCtrlSPARCHostBootFailRecovery.setStatus('current') if mibBuilder.loadTexts: ilomCtrlSPARCHostBootFailRecovery.setDescription('This determines what action the SP should take when the max boot failures are reached.') ilomCtrlSPARCHostHypervisorVersion = MibScalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 15, 2, 14), SnmpAdminString()).setMaxAccess("readonly") if mibBuilder.loadTexts: ilomCtrlSPARCHostHypervisorVersion.setStatus('current') if mibBuilder.loadTexts: ilomCtrlSPARCHostHypervisorVersion.setDescription('Displays the version string for Hypervisor.') ilomCtrlSPARCHostSysFwVersion = MibScalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 15, 2, 15), SnmpAdminString()).setMaxAccess("readonly") if mibBuilder.loadTexts: ilomCtrlSPARCHostSysFwVersion.setStatus('current') if mibBuilder.loadTexts: ilomCtrlSPARCHostSysFwVersion.setDescription('Displays the version string for SysFw.') ilomCtrlSPARCHostSendBreakAction = MibScalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 15, 2, 16), ILOMCtrlSPARCHostSendBreakAction()).setMaxAccess("readwrite") if mibBuilder.loadTexts: ilomCtrlSPARCHostSendBreakAction.setStatus('current') if mibBuilder.loadTexts: ilomCtrlSPARCHostSendBreakAction.setDescription('Send Break Action to Host') ilomCtrlSPARCHostIoReconfigurePolicy = MibScalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 15, 2, 17), ILOMCtrlSPARCHostIoReconfigurePolicy()).setMaxAccess("readwrite") if mibBuilder.loadTexts: ilomCtrlSPARCHostIoReconfigurePolicy.setStatus('current') if mibBuilder.loadTexts: ilomCtrlSPARCHostIoReconfigurePolicy.setDescription('This determines the host IO reconfiguration policy to apply on next host power-on.') ilomCtrlSPARCHostGMVersion = MibScalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 15, 2, 18), SnmpAdminString()).setMaxAccess("readonly") if mibBuilder.loadTexts: ilomCtrlSPARCHostGMVersion.setStatus('current') if mibBuilder.loadTexts: ilomCtrlSPARCHostGMVersion.setDescription('Displays the version string for Guest Manager.') ilomCtrlSPARCBootModeState = MibScalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 15, 3, 1), ILOMCtrlSPARCBootModeState()).setMaxAccess("readwrite") if mibBuilder.loadTexts: ilomCtrlSPARCBootModeState.setStatus('current') if mibBuilder.loadTexts: ilomCtrlSPARCBootModeState.setDescription("Configures the boot mode state for the host. Specifying 'normal' means that the host retains current NVRAM variable settings. Specifying 'resetNvram' means that all NVRAM settings will be reset to their default values.") ilomCtrlSPARCBootModeScript = MibScalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 15, 3, 2), SnmpAdminString().subtype(subtypeSpec=ValueSizeConstraint(0, 255))).setMaxAccess("readwrite") if mibBuilder.loadTexts: ilomCtrlSPARCBootModeScript.setStatus('current') if mibBuilder.loadTexts: ilomCtrlSPARCBootModeScript.setDescription('Specifies the script to run when host boots.') ilomCtrlSPARCBootModeExpires = MibScalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 15, 3, 3), DateAndTime()).setMaxAccess("readonly") if mibBuilder.loadTexts: ilomCtrlSPARCBootModeExpires.setStatus('current') if mibBuilder.loadTexts: ilomCtrlSPARCBootModeExpires.setDescription('Displays the date and time for when the boot mode configuration should expire.') ilomCtrlSPARCBootModeLDOMConfig = MibScalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 15, 3, 4), SnmpAdminString().subtype(subtypeSpec=ValueSizeConstraint(0, 255))).setMaxAccess("readwrite") if mibBuilder.loadTexts: ilomCtrlSPARCBootModeLDOMConfig.setStatus('current') if mibBuilder.loadTexts: ilomCtrlSPARCBootModeLDOMConfig.setDescription("This string refers to the config name value that must either be 'default' or match a named LDOM configuration downloaded to the service processor using the LDOM Manager.") ilomCtrlSPARCKeySwitchState = MibScalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 15, 4, 1), ILOMCtrlSPARCKeySwitchState()).setMaxAccess("readwrite") if mibBuilder.loadTexts: ilomCtrlSPARCKeySwitchState.setStatus('current') if mibBuilder.loadTexts: ilomCtrlSPARCKeySwitchState.setDescription('Specifies the current state of the virtual key switch.') ilomCtrlSystemIdentifier = MibScalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 16, 1), SnmpAdminString()).setMaxAccess("readwrite") if mibBuilder.loadTexts: ilomCtrlSystemIdentifier.setStatus('current') if mibBuilder.loadTexts: ilomCtrlSystemIdentifier.setDescription('This string, which is often the host name of the server associated with ILOM, will be sent out in the varbind for all traps that ILOM generates.') ilomCtrlHostName = MibScalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 16, 2), SnmpAdminString()).setMaxAccess("readwrite") if mibBuilder.loadTexts: ilomCtrlHostName.setStatus('current') if mibBuilder.loadTexts: ilomCtrlHostName.setDescription('This string is the hostname for ILOM.') ilomCtrlActiveDirectoryEnabled = MibScalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 5, 1), TruthValue()).setMaxAccess("readwrite") if mibBuilder.loadTexts: ilomCtrlActiveDirectoryEnabled.setStatus('current') if mibBuilder.loadTexts: ilomCtrlActiveDirectoryEnabled.setDescription('Specifies whether or not the Active Directory client is enabled.') ilomCtrlActiveDirectoryIP = MibScalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 5, 2), IpAddress()).setMaxAccess("readwrite") if mibBuilder.loadTexts: ilomCtrlActiveDirectoryIP.setStatus('current') if mibBuilder.loadTexts: ilomCtrlActiveDirectoryIP.setDescription('The IP address of the Active Directory server used as a name service for user accounts.') ilomCtrlActiveDirectoryPortNumber = MibScalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 5, 3), Integer32().subtype(subtypeSpec=ValueRangeConstraint(0, 65535))).setMaxAccess("readwrite") if mibBuilder.loadTexts: ilomCtrlActiveDirectoryPortNumber.setStatus('current') if mibBuilder.loadTexts: ilomCtrlActiveDirectoryPortNumber.setDescription('Specifies the port number for the Active Directory client. Specifying 0 as the port means auto-select while specifying 1-65535 configures the actual port.') ilomCtrlActiveDirectoryDefaultRole = MibScalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 5, 4), ILOMCtrlUserRole()).setMaxAccess("readwrite") if mibBuilder.loadTexts: ilomCtrlActiveDirectoryDefaultRole.setStatus('deprecated') if mibBuilder.loadTexts: ilomCtrlActiveDirectoryDefaultRole.setDescription("Specifies the role that a user authenticated via Active Directory should have. Setting this property to 'Administrator' or 'Operator' will cause the Active Directory client to ignore the schema stored on the AD server. Setting this to 'none' clears the value and indicates that the native Active Directory schema should be used. ***NOTE: this object is deprecated and replaced with ilomCtrlActiveDirectoryDefaultRoles.") ilomCtrlActiveDirectoryCertFileURI = MibScalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 5, 5), SnmpAdminString()).setMaxAccess("readwrite") if mibBuilder.loadTexts: ilomCtrlActiveDirectoryCertFileURI.setStatus('current') if mibBuilder.loadTexts: ilomCtrlActiveDirectoryCertFileURI.setDescription('This is the URI of a certificate file needed when Strict Cert Mode is enabled. Setting the URI causes the tranfer of the file, making the certificate available immediately for certificate authentication.') ilomCtrlActiveDirectoryTimeout = MibScalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 5, 6), Integer32().subtype(subtypeSpec=ValueRangeConstraint(1, 20))).setMaxAccess("readwrite") if mibBuilder.loadTexts: ilomCtrlActiveDirectoryTimeout.setStatus('current') if mibBuilder.loadTexts: ilomCtrlActiveDirectoryTimeout.setDescription('Specifies the number of seconds to wait before timing out if the Active Directory Server is not responding.') ilomCtrlActiveDirectoryStrictCertEnabled = MibScalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 5, 7), TruthValue()).setMaxAccess("readwrite") if mibBuilder.loadTexts: ilomCtrlActiveDirectoryStrictCertEnabled.setStatus('current') if mibBuilder.loadTexts: ilomCtrlActiveDirectoryStrictCertEnabled.setDescription('Specifies whether or not the Strict Cert Mode is enabled for the Active Directory Client. If enabled, the Active Directory certificate must be uploaded to the SP so that certificate validation can be performed when communicating with the Active Directory server.') ilomCtrlActiveDirectoryCertFileStatus = MibScalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 5, 8), DisplayString()).setMaxAccess("readonly") if mibBuilder.loadTexts: ilomCtrlActiveDirectoryCertFileStatus.setStatus('current') if mibBuilder.loadTexts: ilomCtrlActiveDirectoryCertFileStatus.setDescription('A string indicating the status of the certificate file. This is useful in determining whether a certificate file is present or not.') ilomCtrlActiveDirUserDomainTable = MibTable((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 5, 9), ) if mibBuilder.loadTexts: ilomCtrlActiveDirUserDomainTable.setStatus('current') if mibBuilder.loadTexts: ilomCtrlActiveDirUserDomainTable.setDescription('This table is used to configure domain information required for configuring the Active Directory client.') ilomCtrlActiveDirUserDomainEntry = MibTableRow((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 5, 9, 1), ).setIndexNames((0, "SUN-ILOM-CONTROL-MIB", "ilomCtrlActiveDirUserDomainId")) if mibBuilder.loadTexts: ilomCtrlActiveDirUserDomainEntry.setStatus('current') if mibBuilder.loadTexts: ilomCtrlActiveDirUserDomainEntry.setDescription('An entry for an Active Directory user domain.') ilomCtrlActiveDirUserDomainId = MibTableColumn((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 5, 9, 1, 1), Integer32().subtype(subtypeSpec=ValueRangeConstraint(1, 5))) if mibBuilder.loadTexts: ilomCtrlActiveDirUserDomainId.setStatus('current') if mibBuilder.loadTexts: ilomCtrlActiveDirUserDomainId.setDescription('An integer identifier of the Active Directory domain.') ilomCtrlActiveDirUserDomain = MibTableColumn((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 5, 9, 1, 2), SnmpAdminString()).setMaxAccess("readwrite") if mibBuilder.loadTexts: ilomCtrlActiveDirUserDomain.setStatus('current') if mibBuilder.loadTexts: ilomCtrlActiveDirUserDomain.setDescription("This string should match exactly with an authentication domain on the Active Directory server. This string should contain a substitution string '<USERNAME>' which will be replaced with the user's login name during authentication. Either the principle or distinguished name format is allowed.") ilomCtrlActiveDirAdminGroupsTable = MibTable((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 5, 10), ) if mibBuilder.loadTexts: ilomCtrlActiveDirAdminGroupsTable.setStatus('current') if mibBuilder.loadTexts: ilomCtrlActiveDirAdminGroupsTable.setDescription('This table is used to configure admin group information required for configuring the Active Directory client.') ilomCtrlActiveDirAdminGroupsEntry = MibTableRow((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 5, 10, 1), ).setIndexNames((0, "SUN-ILOM-CONTROL-MIB", "ilomCtrlActiveDirAdminGroupId")) if mibBuilder.loadTexts: ilomCtrlActiveDirAdminGroupsEntry.setStatus('current') if mibBuilder.loadTexts: ilomCtrlActiveDirAdminGroupsEntry.setDescription('An entry for an Active Directory admin group.') ilomCtrlActiveDirAdminGroupId = MibTableColumn((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 5, 10, 1, 1), Integer32().subtype(subtypeSpec=ValueRangeConstraint(1, 5))) if mibBuilder.loadTexts: ilomCtrlActiveDirAdminGroupId.setStatus('current') if mibBuilder.loadTexts: ilomCtrlActiveDirAdminGroupId.setDescription('An integer identifier of the Active Directory admin group entry.') ilomCtrlActiveDirAdminGroupName = MibTableColumn((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 5, 10, 1, 2), SnmpAdminString()).setMaxAccess("readwrite") if mibBuilder.loadTexts: ilomCtrlActiveDirAdminGroupName.setStatus('current') if mibBuilder.loadTexts: ilomCtrlActiveDirAdminGroupName.setDescription('This string should contain a distinguished name that exactly matches one of the group names on the ActiveDirectory server. Any user belonging to one of these groups in this table will be assigned the ILOM role of Administrator.') ilomCtrlActiveDirOperatorGroupsTable = MibTable((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 5, 11), ) if mibBuilder.loadTexts: ilomCtrlActiveDirOperatorGroupsTable.setStatus('current') if mibBuilder.loadTexts: ilomCtrlActiveDirOperatorGroupsTable.setDescription('This table is used to configure operator group information required for configuring the Active Directory client.') ilomCtrlActiveDirOperatorGroupsEntry = MibTableRow((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 5, 11, 1), ).setIndexNames((0, "SUN-ILOM-CONTROL-MIB", "ilomCtrlActiveDirOperatorGroupId")) if mibBuilder.loadTexts: ilomCtrlActiveDirOperatorGroupsEntry.setStatus('current') if mibBuilder.loadTexts: ilomCtrlActiveDirOperatorGroupsEntry.setDescription('An entry for an Active Directory operator group.') ilomCtrlActiveDirOperatorGroupId = MibTableColumn((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 5, 11, 1, 1), Integer32().subtype(subtypeSpec=ValueRangeConstraint(1, 5))) if mibBuilder.loadTexts: ilomCtrlActiveDirOperatorGroupId.setStatus('current') if mibBuilder.loadTexts: ilomCtrlActiveDirOperatorGroupId.setDescription('An integer identifier of the Active Directory operator group entry.') ilomCtrlActiveDirOperatorGroupName = MibTableColumn((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 5, 11, 1, 2), SnmpAdminString()).setMaxAccess("readwrite") if mibBuilder.loadTexts: ilomCtrlActiveDirOperatorGroupName.setStatus('current') if mibBuilder.loadTexts: ilomCtrlActiveDirOperatorGroupName.setDescription('This string should contain a distinguished name that exactly matches one of the group names on the ActiveDirectory server. Any user belonging to one of these groups in this table will be assigned the ILOM role of Operator.') ilomCtrlActiveDirAlternateServerTable = MibTable((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 5, 12), ) if mibBuilder.loadTexts: ilomCtrlActiveDirAlternateServerTable.setStatus('current') if mibBuilder.loadTexts: ilomCtrlActiveDirAlternateServerTable.setDescription('This table is used to view and configure alternate server information for the Active Directory client.') ilomCtrlActiveDirAlternateServerEntry = MibTableRow((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 5, 12, 1), ).setIndexNames((0, "SUN-ILOM-CONTROL-MIB", "ilomCtrlActiveDirAlternateServerId")) if mibBuilder.loadTexts: ilomCtrlActiveDirAlternateServerEntry.setStatus('current') if mibBuilder.loadTexts: ilomCtrlActiveDirAlternateServerEntry.setDescription('An entry for an Active Directory alternate server.') ilomCtrlActiveDirAlternateServerId = MibTableColumn((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 5, 12, 1, 1), Integer32().subtype(subtypeSpec=ValueRangeConstraint(1, 5))) if mibBuilder.loadTexts: ilomCtrlActiveDirAlternateServerId.setStatus('current') if mibBuilder.loadTexts: ilomCtrlActiveDirAlternateServerId.setDescription('An integer identifier of the Active Directory alternate server table.') ilomCtrlActiveDirAlternateServerIp = MibTableColumn((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 5, 12, 1, 2), IpAddress()).setMaxAccess("readwrite") if mibBuilder.loadTexts: ilomCtrlActiveDirAlternateServerIp.setStatus('current') if mibBuilder.loadTexts: ilomCtrlActiveDirAlternateServerIp.setDescription('The IP address of the Active Directory alternate server used as a name service for user accounts.') ilomCtrlActiveDirAlternateServerPort = MibTableColumn((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 5, 12, 1, 3), Integer32().subtype(subtypeSpec=ValueRangeConstraint(0, 65535))).setMaxAccess("readwrite") if mibBuilder.loadTexts: ilomCtrlActiveDirAlternateServerPort.setStatus('current') if mibBuilder.loadTexts: ilomCtrlActiveDirAlternateServerPort.setDescription('Specifies the port number for the Active Directory alternate server. Specifying 0 as the port indicates that auto-select will use the well known port number. Specifying 1-65535 is used to explicitly set the port number.') ilomCtrlActiveDirAlternateServerCertStatus = MibTableColumn((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 5, 12, 1, 4), DisplayString()).setMaxAccess("readonly") if mibBuilder.loadTexts: ilomCtrlActiveDirAlternateServerCertStatus.setStatus('current') if mibBuilder.loadTexts: ilomCtrlActiveDirAlternateServerCertStatus.setDescription('A string indicating the status of the certificate file. This is useful in determining whether a certificate file is present or not.') ilomCtrlActiveDirAlternateServerCertURI = MibTableColumn((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 5, 12, 1, 5), SnmpAdminString()).setMaxAccess("readwrite") if mibBuilder.loadTexts: ilomCtrlActiveDirAlternateServerCertURI.setStatus('current') if mibBuilder.loadTexts: ilomCtrlActiveDirAlternateServerCertURI.setDescription("This is the URI of a certificate file needed when Strict Cert Mode is enabled. Setting the URI causes the tranfer of the file, making the certificate available immediately for certificate authentication. Additionally, either 'remove' or 'restore' are supported for direct certificate manipulation.") ilomCtrlActiveDirAlternateServerCertClear = MibTableColumn((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 5, 12, 1, 6), TruthValue()).setMaxAccess("readwrite") if mibBuilder.loadTexts: ilomCtrlActiveDirAlternateServerCertClear.setStatus('current') if mibBuilder.loadTexts: ilomCtrlActiveDirAlternateServerCertClear.setDescription('A variable that will clear the certificate info associated with the server when it is set to true.') ilomCtrlActiveDirAlternateServerCertVersion = MibTableColumn((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 5, 12, 1, 7), DisplayString()).setMaxAccess("readonly") if mibBuilder.loadTexts: ilomCtrlActiveDirAlternateServerCertVersion.setStatus('current') if mibBuilder.loadTexts: ilomCtrlActiveDirAlternateServerCertVersion.setDescription('A string indicating the certificate version of the alternate server certificate file.') ilomCtrlActiveDirAlternateServerCertSerialNo = MibTableColumn((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 5, 12, 1, 8), DisplayString()).setMaxAccess("readonly") if mibBuilder.loadTexts: ilomCtrlActiveDirAlternateServerCertSerialNo.setStatus('current') if mibBuilder.loadTexts: ilomCtrlActiveDirAlternateServerCertSerialNo.setDescription('A string showing the serial number of the alternate server certificate file.') ilomCtrlActiveDirAlternateServerCertIssuer = MibTableColumn((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 5, 12, 1, 9), DisplayString()).setMaxAccess("readonly") if mibBuilder.loadTexts: ilomCtrlActiveDirAlternateServerCertIssuer.setStatus('current') if mibBuilder.loadTexts: ilomCtrlActiveDirAlternateServerCertIssuer.setDescription('A string showing the issuer of the alternate server certificate file.') ilomCtrlActiveDirAlternateServerCertSubject = MibTableColumn((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 5, 12, 1, 10), DisplayString()).setMaxAccess("readonly") if mibBuilder.loadTexts: ilomCtrlActiveDirAlternateServerCertSubject.setStatus('current') if mibBuilder.loadTexts: ilomCtrlActiveDirAlternateServerCertSubject.setDescription('A string showing the subject of the alternate server certificate file.') ilomCtrlActiveDirAlternateServerCertValidBegin = MibTableColumn((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 5, 12, 1, 11), DisplayString()).setMaxAccess("readonly") if mibBuilder.loadTexts: ilomCtrlActiveDirAlternateServerCertValidBegin.setStatus('current') if mibBuilder.loadTexts: ilomCtrlActiveDirAlternateServerCertValidBegin.setDescription('A string showing the valid start date of the alternate server certificate file.') ilomCtrlActiveDirAlternateServerCertValidEnd = MibTableColumn((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 5, 12, 1, 12), DisplayString()).setMaxAccess("readonly") if mibBuilder.loadTexts: ilomCtrlActiveDirAlternateServerCertValidEnd.setStatus('current') if mibBuilder.loadTexts: ilomCtrlActiveDirAlternateServerCertValidEnd.setDescription('A string showing the valid end date of the alternate server certificate file.') ilomCtrlActiveDirectoryLogDetail = MibScalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 5, 13), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(1, 2, 3, 4, 5))).clone(namedValues=NamedValues(("none", 1), ("high", 2), ("medium", 3), ("low", 4), ("trace", 5)))).setMaxAccess("readwrite") if mibBuilder.loadTexts: ilomCtrlActiveDirectoryLogDetail.setStatus('current') if mibBuilder.loadTexts: ilomCtrlActiveDirectoryLogDetail.setDescription("Controls the amount of messages sent to the event log. The high priority has the least number of messages going to the log, while the lowest priority 'trace' has the most messages logged. When this object is set to 'none', no messages are logged.") ilomCtrlActiveDirectoryDefaultRoles = MibScalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 5, 14), ILOMCtrlUserRoles()).setMaxAccess("readwrite") if mibBuilder.loadTexts: ilomCtrlActiveDirectoryDefaultRoles.setStatus('current') if mibBuilder.loadTexts: ilomCtrlActiveDirectoryDefaultRoles.setDescription("Specifies the role that a user authenticated via Active Directory should have. Setting this property to legacy roles of 'Administrator' or 'Operator', or any of the individual role IDs of 'a', 'u', 'c', 'r', 'o' and 's' will cause the Active Directory client to ignore the schema stored on the AD server. Setting this to 'none' clears the value and indicates that the native Active Directory schema should be used. The role IDs can be joined together 'aucros' where a-admin, u-user, c-console, r-reset, s-service and o-readOnly.") ilomCtrlActiveDirCustomGroupsTable = MibTable((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 5, 15), ) if mibBuilder.loadTexts: ilomCtrlActiveDirCustomGroupsTable.setStatus('current') if mibBuilder.loadTexts: ilomCtrlActiveDirCustomGroupsTable.setDescription('This table is used to configure custom group information required for configuring the Active Directory client.') ilomCtrlActiveDirCustomGroupsEntry = MibTableRow((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 5, 15, 1), ).setIndexNames((0, "SUN-ILOM-CONTROL-MIB", "ilomCtrlActiveDirCustomGroupId")) if mibBuilder.loadTexts: ilomCtrlActiveDirCustomGroupsEntry.setStatus('current') if mibBuilder.loadTexts: ilomCtrlActiveDirCustomGroupsEntry.setDescription('An entry for an Active Directory custom group.') ilomCtrlActiveDirCustomGroupId = MibTableColumn((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 5, 15, 1, 1), Integer32().subtype(subtypeSpec=ValueRangeConstraint(1, 5))) if mibBuilder.loadTexts: ilomCtrlActiveDirCustomGroupId.setStatus('current') if mibBuilder.loadTexts: ilomCtrlActiveDirCustomGroupId.setDescription('An integer identifier of the Active Directory custom group entry.') ilomCtrlActiveDirCustomGroupName = MibTableColumn((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 5, 15, 1, 2), SnmpAdminString()).setMaxAccess("readwrite") if mibBuilder.loadTexts: ilomCtrlActiveDirCustomGroupName.setStatus('current') if mibBuilder.loadTexts: ilomCtrlActiveDirCustomGroupName.setDescription("This string should contain a distinguished name that exactly matches one of the group names on the ActiveDirectory server. Any user belonging to one of these groups in this table will be assigned the ILOM role based on the entry's configuration for roles.") ilomCtrlActiveDirCustomGroupRoles = MibTableColumn((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 5, 15, 1, 3), ILOMCtrlUserRoles()).setMaxAccess("readwrite") if mibBuilder.loadTexts: ilomCtrlActiveDirCustomGroupRoles.setStatus('current') if mibBuilder.loadTexts: ilomCtrlActiveDirCustomGroupRoles.setDescription("Specifies the role that a user authenticated via Active Directory should have. Setting this property to legacy roles of 'Administrator' or 'Operator', or any of the individual role IDs of 'a', 'u', 'c', 'r', 'o' and 's' will cause the Active Directory client to ignore the schema stored on the AD server. Setting this to 'none' clears the value and indicates that the native Active Directory schema should be used. The role IDs can be joined together 'aucros' where a-admin, u-user, c-console, r-reset, s-service and o-readOnly.") ilomCtrlActiveDirectoryCertClear = MibScalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 5, 16), TruthValue()).setMaxAccess("readwrite") if mibBuilder.loadTexts: ilomCtrlActiveDirectoryCertClear.setStatus('current') if mibBuilder.loadTexts: ilomCtrlActiveDirectoryCertClear.setDescription('A variable that will clear the certificate info associated with the server when it is set to true.') ilomCtrlActiveDirectoryCertVersion = MibScalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 5, 17), DisplayString()).setMaxAccess("readonly") if mibBuilder.loadTexts: ilomCtrlActiveDirectoryCertVersion.setStatus('current') if mibBuilder.loadTexts: ilomCtrlActiveDirectoryCertVersion.setDescription('A string indicating the certificate version of the certificate file.') ilomCtrlActiveDirectoryCertSerialNo = MibScalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 5, 18), DisplayString()).setMaxAccess("readonly") if mibBuilder.loadTexts: ilomCtrlActiveDirectoryCertSerialNo.setStatus('current') if mibBuilder.loadTexts: ilomCtrlActiveDirectoryCertSerialNo.setDescription('A string showing the serial number of the certificate file.') ilomCtrlActiveDirectoryCertIssuer = MibScalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 5, 19), DisplayString()).setMaxAccess("readonly") if mibBuilder.loadTexts: ilomCtrlActiveDirectoryCertIssuer.setStatus('current') if mibBuilder.loadTexts: ilomCtrlActiveDirectoryCertIssuer.setDescription('A string showing the issuer of the certificate file.') ilomCtrlActiveDirectoryCertSubject = MibScalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 5, 20), DisplayString()).setMaxAccess("readonly") if mibBuilder.loadTexts: ilomCtrlActiveDirectoryCertSubject.setStatus('current') if mibBuilder.loadTexts: ilomCtrlActiveDirectoryCertSubject.setDescription('A string showing the subject of the certificate file.') ilomCtrlActiveDirectoryCertValidBegin = MibScalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 5, 21), DisplayString()).setMaxAccess("readonly") if mibBuilder.loadTexts: ilomCtrlActiveDirectoryCertValidBegin.setStatus('current') if mibBuilder.loadTexts: ilomCtrlActiveDirectoryCertValidBegin.setDescription('A string showing the valid start date of the certificate file.') ilomCtrlActiveDirectoryCertValidEnd = MibScalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 5, 22), DisplayString()).setMaxAccess("readonly") if mibBuilder.loadTexts: ilomCtrlActiveDirectoryCertValidEnd.setStatus('current') if mibBuilder.loadTexts: ilomCtrlActiveDirectoryCertValidEnd.setDescription('A string showing the valid end date of the certificate file.') ilomCtrlActiveDirDnsLocatorEnabled = MibScalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 5, 23), TruthValue()).setMaxAccess("readwrite") if mibBuilder.loadTexts: ilomCtrlActiveDirDnsLocatorEnabled.setStatus('current') if mibBuilder.loadTexts: ilomCtrlActiveDirDnsLocatorEnabled.setDescription('Specifies whether or not the Active Directory DNS Locator functionality is enabled.') ilomCtrlActiveDirDnsLocatorQueryTable = MibTable((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 5, 24), ) if mibBuilder.loadTexts: ilomCtrlActiveDirDnsLocatorQueryTable.setStatus('current') if mibBuilder.loadTexts: ilomCtrlActiveDirDnsLocatorQueryTable.setDescription('This table is used to configure DNS Locator search queries used to locate the Active Directory server.') ilomCtrlActiveDirDnsLocatorQueryEntry = MibTableRow((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 5, 24, 1), ).setIndexNames((0, "SUN-ILOM-CONTROL-MIB", "ilomCtrlActiveDirDnsLocatorQueryId")) if mibBuilder.loadTexts: ilomCtrlActiveDirDnsLocatorQueryEntry.setStatus('current') if mibBuilder.loadTexts: ilomCtrlActiveDirDnsLocatorQueryEntry.setDescription('An entry for an Active Directory DNS Locator search query.') ilomCtrlActiveDirDnsLocatorQueryId = MibTableColumn((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 5, 24, 1, 1), Integer32().subtype(subtypeSpec=ValueRangeConstraint(1, 5))) if mibBuilder.loadTexts: ilomCtrlActiveDirDnsLocatorQueryId.setStatus('current') if mibBuilder.loadTexts: ilomCtrlActiveDirDnsLocatorQueryId.setDescription('An integer identifier of the Active Directory DNS Locator Query entry.') ilomCtrlActiveDirDnsLocatorQueryService = MibTableColumn((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 5, 24, 1, 2), SnmpAdminString()).setMaxAccess("readwrite") if mibBuilder.loadTexts: ilomCtrlActiveDirDnsLocatorQueryService.setStatus('current') if mibBuilder.loadTexts: ilomCtrlActiveDirDnsLocatorQueryService.setDescription("This string should contain the service name that will be used to perform the DNS query. The name may contain '<DOMAIN>' as a substitution marker, being replaced by the domain information associated for the user at the time of authentication. Also, the optional '<PORT: >' (ie <PORT:636> for standard LDAP/SSL port 636) can be used to override any learned port information if necessary.") ilomCtrlActiveDirExpSearchEnabled = MibScalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 5, 25), TruthValue()).setMaxAccess("readwrite") if mibBuilder.loadTexts: ilomCtrlActiveDirExpSearchEnabled.setStatus('current') if mibBuilder.loadTexts: ilomCtrlActiveDirExpSearchEnabled.setDescription('Specifies whether or not the Active Directory expanded search query functionality is enabled.') ilomCtrlActiveDirStrictCredentialErrorEnabled = MibScalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 5, 26), TruthValue()).setMaxAccess("readwrite") if mibBuilder.loadTexts: ilomCtrlActiveDirStrictCredentialErrorEnabled.setStatus('current') if mibBuilder.loadTexts: ilomCtrlActiveDirStrictCredentialErrorEnabled.setDescription('Specifies whether or not user credential errors for Active Directory cause the user credentials to be completely errored out, or if the credential validation is attempted using any alternate server. When the parameter is true, the first user credential violation takes effect, but when the mode is false, the same user credentionals can be presented to other servers for authentication.') ilomCtrlSMTPEnabled = MibScalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 6, 1), TruthValue()).setMaxAccess("readwrite") if mibBuilder.loadTexts: ilomCtrlSMTPEnabled.setStatus('current') if mibBuilder.loadTexts: ilomCtrlSMTPEnabled.setDescription('Specifies whether or not the SMTP client is enabled.') ilomCtrlSMTPServerIP = MibScalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 6, 2), IpAddress()).setMaxAccess("readwrite") if mibBuilder.loadTexts: ilomCtrlSMTPServerIP.setStatus('current') if mibBuilder.loadTexts: ilomCtrlSMTPServerIP.setDescription('The IP address of the SMTP server used as a name service for user accounts.') ilomCtrlSMTPPortNumber = MibScalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 6, 3), Integer32().subtype(subtypeSpec=ValueRangeConstraint(0, 65535))).setMaxAccess("readwrite") if mibBuilder.loadTexts: ilomCtrlSMTPPortNumber.setStatus('current') if mibBuilder.loadTexts: ilomCtrlSMTPPortNumber.setDescription('Specifies the port number for the SMTP client.') ilomCtrlSMTPCustomSender = MibScalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 6, 4), SnmpAdminString().subtype(subtypeSpec=ValueSizeConstraint(0, 80))).setMaxAccess("readwrite") if mibBuilder.loadTexts: ilomCtrlSMTPCustomSender.setStatus('current') if mibBuilder.loadTexts: ilomCtrlSMTPCustomSender.setDescription("An optional format to identify the sender or the 'from' address. Customizing this string allows the user to specify the exact contents (up to 80 chars) of the 'from' field in the email message. Either one of the substitution strings '<IPADDRESS>' or '<HOSTNAME>' can be used as needed. e.g., ilom-sp@sp1302.dev.sun.com, sun-ilom@[<IPADDRESS>], or ilom-alert@<HOSTNAME>.abc.com. By default, this parameter is an empty string. The 'from' field is formatted by either: 1) alert-rule custom-sender, 2) smtp custom-sender, or 3) the standard ILOM originator.") ilomCtrlThdState = MibScalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 17, 1), SnmpAdminString()).setMaxAccess("readonly") if mibBuilder.loadTexts: ilomCtrlThdState.setStatus('current') if mibBuilder.loadTexts: ilomCtrlThdState.setDescription('The state of the THD daemon.') ilomCtrlThdAction = MibScalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 17, 2), ILOMCtrlThdAction()).setMaxAccess("readwrite") if mibBuilder.loadTexts: ilomCtrlThdAction.setStatus('current') if mibBuilder.loadTexts: ilomCtrlThdAction.setDescription('Control action for THD daemon, either suspend or resume.') ilomCtrlThdModulesTable = MibTable((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 17, 3), ) if mibBuilder.loadTexts: ilomCtrlThdModulesTable.setStatus('current') if mibBuilder.loadTexts: ilomCtrlThdModulesTable.setDescription('A table listing the currently loaded THD modules.') ilomCtrlThdModulesEntry = MibTableRow((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 17, 3, 1), ).setIndexNames((0, "SUN-ILOM-CONTROL-MIB", "ilomCtrlThdModuleName")) if mibBuilder.loadTexts: ilomCtrlThdModulesEntry.setStatus('current') if mibBuilder.loadTexts: ilomCtrlThdModulesEntry.setDescription('An entry for a currently loaded THD module.') ilomCtrlThdModuleName = MibTableColumn((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 17, 3, 1, 1), ILOMCtrlTargetIndex()) if mibBuilder.loadTexts: ilomCtrlThdModuleName.setStatus('current') if mibBuilder.loadTexts: ilomCtrlThdModuleName.setDescription('The name of the THD module.') ilomCtrlThdModuleDesc = MibTableColumn((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 17, 3, 1, 2), SnmpAdminString()).setMaxAccess("readonly") if mibBuilder.loadTexts: ilomCtrlThdModuleDesc.setStatus('current') if mibBuilder.loadTexts: ilomCtrlThdModuleDesc.setDescription('The description of the THD module.') ilomCtrlThdModuleState = MibTableColumn((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 17, 3, 1, 3), SnmpAdminString()).setMaxAccess("readonly") if mibBuilder.loadTexts: ilomCtrlThdModuleState.setStatus('current') if mibBuilder.loadTexts: ilomCtrlThdModuleState.setDescription('The state of the THD module.') ilomCtrlThdModuleAction = MibTableColumn((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 17, 3, 1, 4), ILOMCtrlThdAction()).setMaxAccess("readwrite") if mibBuilder.loadTexts: ilomCtrlThdModuleAction.setStatus('current') if mibBuilder.loadTexts: ilomCtrlThdModuleAction.setDescription('The control action for the THD module.') ilomCtrlThdInstanceTable = MibTable((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 17, 4), ) if mibBuilder.loadTexts: ilomCtrlThdInstanceTable.setStatus('current') if mibBuilder.loadTexts: ilomCtrlThdInstanceTable.setDescription('A table listing instances of currently loaded THD modules.') ilomCtrlThdInstanceEntry = MibTableRow((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 17, 4, 1), ).setIndexNames((0, "SUN-ILOM-CONTROL-MIB", "ilomCtrlThdModName"), (0, "SUN-ILOM-CONTROL-MIB", "ilomCtrlThdInstanceName")) if mibBuilder.loadTexts: ilomCtrlThdInstanceEntry.setStatus('current') if mibBuilder.loadTexts: ilomCtrlThdInstanceEntry.setDescription('An entry for a currently loaded THD module.') ilomCtrlThdModName = MibTableColumn((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 17, 4, 1, 1), ILOMCtrlModTargetIndex()) if mibBuilder.loadTexts: ilomCtrlThdModName.setStatus('current') if mibBuilder.loadTexts: ilomCtrlThdModName.setDescription('The name of the THD class of the instance.') ilomCtrlThdInstanceName = MibTableColumn((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 17, 4, 1, 2), ILOMCtrlInstanceTargetIndex()) if mibBuilder.loadTexts: ilomCtrlThdInstanceName.setStatus('current') if mibBuilder.loadTexts: ilomCtrlThdInstanceName.setDescription('The name of the instance.') ilomCtrlThdInstanceState = MibTableColumn((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 17, 4, 1, 3), SnmpAdminString()).setMaxAccess("readonly") if mibBuilder.loadTexts: ilomCtrlThdInstanceState.setStatus('current') if mibBuilder.loadTexts: ilomCtrlThdInstanceState.setDescription('The state of the instance.') ilomCtrlThdInstanceAction = MibTableColumn((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 17, 4, 1, 4), ILOMCtrlThdAction()).setMaxAccess("readwrite") if mibBuilder.loadTexts: ilomCtrlThdInstanceAction.setStatus('current') if mibBuilder.loadTexts: ilomCtrlThdInstanceAction.setDescription('The control action for instance.') ilomCtrlLdapSslGlobalObj = MibIdentifier((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 7, 1)) ilomCtrlLdapSslEnabled = MibScalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 7, 1, 1), TruthValue()).setMaxAccess("readwrite") if mibBuilder.loadTexts: ilomCtrlLdapSslEnabled.setStatus('current') if mibBuilder.loadTexts: ilomCtrlLdapSslEnabled.setDescription('Specifies whether or not the LDAP/SSL client is enabled.') ilomCtrlLdapSslIP = MibScalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 7, 1, 2), IpAddress()).setMaxAccess("readwrite") if mibBuilder.loadTexts: ilomCtrlLdapSslIP.setStatus('current') if mibBuilder.loadTexts: ilomCtrlLdapSslIP.setDescription('The IP address of the LDAP/SSL server used as a directory service for user accounts.') ilomCtrlLdapSslPortNumber = MibScalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 7, 1, 3), Integer32().subtype(subtypeSpec=ValueRangeConstraint(0, 65535))).setMaxAccess("readwrite") if mibBuilder.loadTexts: ilomCtrlLdapSslPortNumber.setStatus('current') if mibBuilder.loadTexts: ilomCtrlLdapSslPortNumber.setDescription('Specifies the port number for the LDAP/SSL client. Specifying 0 as the port means auto-select while specifying 1-65535 configures the actual port value.') ilomCtrlLdapSslDefaultRole = MibScalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 7, 1, 4), ILOMCtrlUserRole()).setMaxAccess("readwrite") if mibBuilder.loadTexts: ilomCtrlLdapSslDefaultRole.setStatus('current') if mibBuilder.loadTexts: ilomCtrlLdapSslDefaultRole.setDescription("Specifies the role that a user authenticated via LDAP/SSL should have. Setting this property to 'Administrator' or 'Operator' will cause the LDAP/SSL client to ignore the schema stored on the server. The user will be granted the corresponding access level. Setting this to an empty string, or 'none' clears the value and indicates that the native LDAP/SSL schema should be used.") ilomCtrlLdapSslCertFileURI = MibScalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 7, 1, 5), SnmpAdminString()).setMaxAccess("readwrite") if mibBuilder.loadTexts: ilomCtrlLdapSslCertFileURI.setStatus('current') if mibBuilder.loadTexts: ilomCtrlLdapSslCertFileURI.setDescription("The tftp URI of the LDAP/SSL server's certificate file that should be uploaded in order to perform certificate validation. Setting the URI causes the tranfer of the specified file, making the certificate available immediately for certificate authentication. The server certificate file is needed when Strict Cert Mode is enabled. Additionally, either 'remove' or 'restore' are supported for direct certificate manipulation.") ilomCtrlLdapSslTimeout = MibScalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 7, 1, 6), Integer32().subtype(subtypeSpec=ValueRangeConstraint(1, 20))).setMaxAccess("readwrite") if mibBuilder.loadTexts: ilomCtrlLdapSslTimeout.setStatus('current') if mibBuilder.loadTexts: ilomCtrlLdapSslTimeout.setDescription('Specifies the number of seconds to wait before timing out if the LDAP/SSL Server is not responding.') ilomCtrlLdapSslStrictCertEnabled = MibScalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 7, 1, 7), TruthValue()).setMaxAccess("readwrite") if mibBuilder.loadTexts: ilomCtrlLdapSslStrictCertEnabled.setStatus('current') if mibBuilder.loadTexts: ilomCtrlLdapSslStrictCertEnabled.setDescription("Specifies whether or not the Strict Cert Mode is enabled for the LDAP/SSL Client. If enabled, the LDAP/SSL server's certificate must be uploaded to the SP so that certificate validation can be performed when communicating with the LDAP/SSL server.") ilomCtrlLdapSslCertFileStatus = MibScalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 7, 1, 8), DisplayString()).setMaxAccess("readonly") if mibBuilder.loadTexts: ilomCtrlLdapSslCertFileStatus.setStatus('current') if mibBuilder.loadTexts: ilomCtrlLdapSslCertFileStatus.setDescription('A string indicating the status of the certificate file. This is useful in determining whether a certificate file is present or not.') ilomCtrlLdapSslLogDetail = MibScalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 7, 1, 9), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(1, 2, 3, 4, 5))).clone(namedValues=NamedValues(("none", 1), ("high", 2), ("medium", 3), ("low", 4), ("trace", 5)))).setMaxAccess("readwrite") if mibBuilder.loadTexts: ilomCtrlLdapSslLogDetail.setStatus('current') if mibBuilder.loadTexts: ilomCtrlLdapSslLogDetail.setDescription("Controls the amount of messages sent to the event log. The high priority has the least number of messages going to the log, while the lowest priority 'trace' has the most messages logged. When this object is set to 'none', no messages are logged.") ilomCtrlLdapSslDefaultRoles = MibScalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 7, 1, 10), ILOMCtrlUserRoles()).setMaxAccess("readwrite") if mibBuilder.loadTexts: ilomCtrlLdapSslDefaultRoles.setStatus('current') if mibBuilder.loadTexts: ilomCtrlLdapSslDefaultRoles.setDescription("Specifies the role that a user authenticated via LDAP/SSL should have. Setting this property to legacy roles of 'Administrator' or 'Operator', or any of the individual role IDs of 'a', 'u', 'c', 'r', 'o' and 's' will cause the LDAP/SSL client to ignore the schema stored on the LDAP server. Setting this to 'none' clears the value and indicates that the native LDAP/SSL schema should be used. The role IDs can be joined together 'aucros' where a-admin, u-user, c-console, r-reset, s-service and o-readOnly.") ilomCtrlLdapSslCertFileClear = MibScalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 7, 1, 11), TruthValue()).setMaxAccess("readwrite") if mibBuilder.loadTexts: ilomCtrlLdapSslCertFileClear.setStatus('current') if mibBuilder.loadTexts: ilomCtrlLdapSslCertFileClear.setDescription('A variable that will clear the certificate info associated with the server when it is set to true.') ilomCtrlLdapSslCertFileVersion = MibScalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 7, 1, 12), DisplayString()).setMaxAccess("readonly") if mibBuilder.loadTexts: ilomCtrlLdapSslCertFileVersion.setStatus('current') if mibBuilder.loadTexts: ilomCtrlLdapSslCertFileVersion.setDescription('A string indicating the certificate version of the certificate file.') ilomCtrlLdapSslCertFileSerialNo = MibScalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 7, 1, 13), DisplayString()).setMaxAccess("readonly") if mibBuilder.loadTexts: ilomCtrlLdapSslCertFileSerialNo.setStatus('current') if mibBuilder.loadTexts: ilomCtrlLdapSslCertFileSerialNo.setDescription('A string showing the serial number of the certificate file.') ilomCtrlLdapSslCertFileIssuer = MibScalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 7, 1, 14), DisplayString()).setMaxAccess("readonly") if mibBuilder.loadTexts: ilomCtrlLdapSslCertFileIssuer.setStatus('current') if mibBuilder.loadTexts: ilomCtrlLdapSslCertFileIssuer.setDescription('A string showing the issuer of the certificate file.') ilomCtrlLdapSslCertFileSubject = MibScalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 7, 1, 15), DisplayString()).setMaxAccess("readonly") if mibBuilder.loadTexts: ilomCtrlLdapSslCertFileSubject.setStatus('current') if mibBuilder.loadTexts: ilomCtrlLdapSslCertFileSubject.setDescription('A string showing the subject of the certificate file.') ilomCtrlLdapSslCertFileValidBegin = MibScalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 7, 1, 16), DisplayString()).setMaxAccess("readonly") if mibBuilder.loadTexts: ilomCtrlLdapSslCertFileValidBegin.setStatus('current') if mibBuilder.loadTexts: ilomCtrlLdapSslCertFileValidBegin.setDescription('A string showing the valid start date of the certificate file.') ilomCtrlLdapSslCertFileValidEnd = MibScalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 7, 1, 17), DisplayString()).setMaxAccess("readonly") if mibBuilder.loadTexts: ilomCtrlLdapSslCertFileValidEnd.setStatus('current') if mibBuilder.loadTexts: ilomCtrlLdapSslCertFileValidEnd.setDescription('A string showing the valid end date of the certificate file.') ilomCtrlLdapSslOptUsrMappingEnabled = MibScalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 7, 1, 18), TruthValue()).setMaxAccess("readwrite") if mibBuilder.loadTexts: ilomCtrlLdapSslOptUsrMappingEnabled.setStatus('current') if mibBuilder.loadTexts: ilomCtrlLdapSslOptUsrMappingEnabled.setDescription("Specifies whether or not the optional UserMapping feature is enabled. When this feature is enabled, a typical Manager style ldap bind is done first using the specified credentials for the bindDn and bindPw. Then, the user's login name is used as part of the search/filter criteria defined in the attribute-info to obtain the user's official Distinguished Name.") ilomCtrlLdapSslOptUsrMappingAttrInfo = MibScalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 7, 1, 19), SnmpAdminString().subtype(subtypeSpec=ValueSizeConstraint(0, 80))).setMaxAccess("readwrite") if mibBuilder.loadTexts: ilomCtrlLdapSslOptUsrMappingAttrInfo.setStatus('current') if mibBuilder.loadTexts: ilomCtrlLdapSslOptUsrMappingAttrInfo.setDescription("The attribute information used to lookup the user login name to the user's Distinguished Name (DN). Typically, it looks very much like a standard LDAP query or filter. The <USERNAME> prefix will be replaced with the login name as part of the query eg: (&(objectclass=person)(uid=<USERNAME>)).") ilomCtrlLdapSslOptUsrMappingBindDn = MibScalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 7, 1, 20), SnmpAdminString().subtype(subtypeSpec=ValueSizeConstraint(0, 80))).setMaxAccess("readwrite") if mibBuilder.loadTexts: ilomCtrlLdapSslOptUsrMappingBindDn.setStatus('current') if mibBuilder.loadTexts: ilomCtrlLdapSslOptUsrMappingBindDn.setDescription('The Distinguished Name used for the manager style ldap bind so that user lookups can be done.') ilomCtrlLdapSslOptUsrMappingBindPw = MibScalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 7, 1, 21), SnmpAdminString().subtype(subtypeSpec=ValueSizeConstraint(0, 32))).setMaxAccess("readwrite") if mibBuilder.loadTexts: ilomCtrlLdapSslOptUsrMappingBindPw.setStatus('current') if mibBuilder.loadTexts: ilomCtrlLdapSslOptUsrMappingBindPw.setDescription('The password string used for the manager style ldap bind.') ilomCtrlLdapSslOptUsrMappingSearchBase = MibScalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 7, 1, 22), SnmpAdminString().subtype(subtypeSpec=ValueSizeConstraint(0, 80))).setMaxAccess("readwrite") if mibBuilder.loadTexts: ilomCtrlLdapSslOptUsrMappingSearchBase.setStatus('current') if mibBuilder.loadTexts: ilomCtrlLdapSslOptUsrMappingSearchBase.setDescription('The search based used to attempt the user name look up as defined in the attribute information above.') ilomCtrlLdapSslUserDomainTable = MibTable((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 7, 2), ) if mibBuilder.loadTexts: ilomCtrlLdapSslUserDomainTable.setStatus('current') if mibBuilder.loadTexts: ilomCtrlLdapSslUserDomainTable.setDescription('This table is used to configure domain information required for configuring the LDAP/SSL client.') ilomCtrlLdapSslUserDomainEntry = MibTableRow((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 7, 2, 1), ).setIndexNames((0, "SUN-ILOM-CONTROL-MIB", "ilomCtrlLdapSslUserDomainId")) if mibBuilder.loadTexts: ilomCtrlLdapSslUserDomainEntry.setStatus('current') if mibBuilder.loadTexts: ilomCtrlLdapSslUserDomainEntry.setDescription('An entry for an LDAP/SSL user domain.') ilomCtrlLdapSslUserDomainId = MibTableColumn((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 7, 2, 1, 1), Integer32().subtype(subtypeSpec=ValueRangeConstraint(1, 5))) if mibBuilder.loadTexts: ilomCtrlLdapSslUserDomainId.setStatus('current') if mibBuilder.loadTexts: ilomCtrlLdapSslUserDomainId.setDescription('An integer identifier of the LDAP/SSL domain.') ilomCtrlLdapSslUserDomain = MibTableColumn((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 7, 2, 1, 2), SnmpAdminString()).setMaxAccess("readwrite") if mibBuilder.loadTexts: ilomCtrlLdapSslUserDomain.setStatus('current') if mibBuilder.loadTexts: ilomCtrlLdapSslUserDomain.setDescription("This string should match exactly with an authentication domain on the LDAP/SSL server. This string should contain a substitution string '<USERNAME>' which will be replaced with the user's login name during authentication. Either the principle or distinguished name format is allowed.") ilomCtrlLdapSslAdminGroupsTable = MibTable((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 7, 3), ) if mibBuilder.loadTexts: ilomCtrlLdapSslAdminGroupsTable.setStatus('current') if mibBuilder.loadTexts: ilomCtrlLdapSslAdminGroupsTable.setDescription('This table is used to configure Admin Group information required for configuring the LDAP/SSL client.') ilomCtrlLdapSslAdminGroupsEntry = MibTableRow((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 7, 3, 1), ).setIndexNames((0, "SUN-ILOM-CONTROL-MIB", "ilomCtrlLdapSslAdminGroupId")) if mibBuilder.loadTexts: ilomCtrlLdapSslAdminGroupsEntry.setStatus('current') if mibBuilder.loadTexts: ilomCtrlLdapSslAdminGroupsEntry.setDescription('An entry for an LDAP/SSL Admin Group.') ilomCtrlLdapSslAdminGroupId = MibTableColumn((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 7, 3, 1, 1), Integer32().subtype(subtypeSpec=ValueRangeConstraint(1, 5))) if mibBuilder.loadTexts: ilomCtrlLdapSslAdminGroupId.setStatus('current') if mibBuilder.loadTexts: ilomCtrlLdapSslAdminGroupId.setDescription('An integer identifier of the LDAP/SSL AdminGroup entry.') ilomCtrlLdapSslAdminGroupName = MibTableColumn((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 7, 3, 1, 2), SnmpAdminString()).setMaxAccess("readwrite") if mibBuilder.loadTexts: ilomCtrlLdapSslAdminGroupName.setStatus('current') if mibBuilder.loadTexts: ilomCtrlLdapSslAdminGroupName.setDescription('This string should contain a distinguished name that exactly matches one of the group names on the LDAP/SSL server. Any user belonging to one of these groups in this table will be assigned the ILOM role of Administrator.') ilomCtrlLdapSslOperatorGroupsTable = MibTable((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 7, 4), ) if mibBuilder.loadTexts: ilomCtrlLdapSslOperatorGroupsTable.setStatus('current') if mibBuilder.loadTexts: ilomCtrlLdapSslOperatorGroupsTable.setDescription('This table is used to configure Operator Group information required for configuring the LDAP/SSL client.') ilomCtrlLdapSslOperatorGroupsEntry = MibTableRow((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 7, 4, 1), ).setIndexNames((0, "SUN-ILOM-CONTROL-MIB", "ilomCtrlLdapSslOperatorGroupId")) if mibBuilder.loadTexts: ilomCtrlLdapSslOperatorGroupsEntry.setStatus('current') if mibBuilder.loadTexts: ilomCtrlLdapSslOperatorGroupsEntry.setDescription('An entry for an LDAP/SSL Operator Group.') ilomCtrlLdapSslOperatorGroupId = MibTableColumn((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 7, 4, 1, 1), Integer32().subtype(subtypeSpec=ValueRangeConstraint(1, 5))) if mibBuilder.loadTexts: ilomCtrlLdapSslOperatorGroupId.setStatus('current') if mibBuilder.loadTexts: ilomCtrlLdapSslOperatorGroupId.setDescription('An integer identifier of the LDAP/SSL Operator Group entry.') ilomCtrlLdapSslOperatorGroupName = MibTableColumn((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 7, 4, 1, 2), SnmpAdminString()).setMaxAccess("readwrite") if mibBuilder.loadTexts: ilomCtrlLdapSslOperatorGroupName.setStatus('current') if mibBuilder.loadTexts: ilomCtrlLdapSslOperatorGroupName.setDescription('This string should contain a distinguished name that exactly matches one of the group names on the LDAP/SSL server. Any user belonging to one of these groups in this table will be assigned the ILOM role of Operator.') ilomCtrlLdapSslAlternateServerTable = MibTable((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 7, 5), ) if mibBuilder.loadTexts: ilomCtrlLdapSslAlternateServerTable.setStatus('current') if mibBuilder.loadTexts: ilomCtrlLdapSslAlternateServerTable.setDescription('This table is used to view and configure alternate server information for the LDAP/SSL client.') ilomCtrlLdapSslAlternateServerEntry = MibTableRow((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 7, 5, 1), ).setIndexNames((0, "SUN-ILOM-CONTROL-MIB", "ilomCtrlLdapSslAlternateServerId")) if mibBuilder.loadTexts: ilomCtrlLdapSslAlternateServerEntry.setStatus('current') if mibBuilder.loadTexts: ilomCtrlLdapSslAlternateServerEntry.setDescription('An entry for an LDAP/SSL alternate server table.') ilomCtrlLdapSslAlternateServerId = MibTableColumn((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 7, 5, 1, 1), Integer32().subtype(subtypeSpec=ValueRangeConstraint(1, 5))) if mibBuilder.loadTexts: ilomCtrlLdapSslAlternateServerId.setStatus('current') if mibBuilder.loadTexts: ilomCtrlLdapSslAlternateServerId.setDescription('An integer identifier of the LDAP/SSL alternate server table.') ilomCtrlLdapSslAlternateServerIp = MibTableColumn((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 7, 5, 1, 2), IpAddress()).setMaxAccess("readwrite") if mibBuilder.loadTexts: ilomCtrlLdapSslAlternateServerIp.setStatus('current') if mibBuilder.loadTexts: ilomCtrlLdapSslAlternateServerIp.setDescription('The IP address of the LDAP/SSL alternate server used as directory server for user accounts.') ilomCtrlLdapSslAlternateServerPort = MibTableColumn((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 7, 5, 1, 3), Integer32().subtype(subtypeSpec=ValueRangeConstraint(0, 65535))).setMaxAccess("readwrite") if mibBuilder.loadTexts: ilomCtrlLdapSslAlternateServerPort.setStatus('current') if mibBuilder.loadTexts: ilomCtrlLdapSslAlternateServerPort.setDescription('Specifies the port number for the LDAP/SSL alternate server. Specifying 0 as the port indicates that auto-select will use the well known port number. Specifying 1-65535 is used to explicitly set the port number.') ilomCtrlLdapSslAlternateServerCertStatus = MibTableColumn((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 7, 5, 1, 4), DisplayString()).setMaxAccess("readonly") if mibBuilder.loadTexts: ilomCtrlLdapSslAlternateServerCertStatus.setStatus('current') if mibBuilder.loadTexts: ilomCtrlLdapSslAlternateServerCertStatus.setDescription('A string indicating the status of the certificate file. This is useful in determining whether a certificate file is present or not.') ilomCtrlLdapSslAlternateServerCertURI = MibTableColumn((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 7, 5, 1, 5), SnmpAdminString()).setMaxAccess("readwrite") if mibBuilder.loadTexts: ilomCtrlLdapSslAlternateServerCertURI.setStatus('current') if mibBuilder.loadTexts: ilomCtrlLdapSslAlternateServerCertURI.setDescription("This is the URI of a certificate file needed when Strict Cert Mode is enabled. Setting the URI causes the tranfer of the file, making the certificate available immediately for certificate authentication. Additionally, either 'remove' or 'restore' are supported for direct certificate manipulation.") ilomCtrlLdapSslAlternateServerCertClear = MibTableColumn((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 7, 5, 1, 6), TruthValue()).setMaxAccess("readwrite") if mibBuilder.loadTexts: ilomCtrlLdapSslAlternateServerCertClear.setStatus('current') if mibBuilder.loadTexts: ilomCtrlLdapSslAlternateServerCertClear.setDescription('A variable that will clear the certificate info associated with the server when it is set to true.') ilomCtrlLdapSslAlternateServerCertVersion = MibTableColumn((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 7, 5, 1, 7), DisplayString()).setMaxAccess("readonly") if mibBuilder.loadTexts: ilomCtrlLdapSslAlternateServerCertVersion.setStatus('current') if mibBuilder.loadTexts: ilomCtrlLdapSslAlternateServerCertVersion.setDescription('A string indicating the certificate version of the alternate server certificate file.') ilomCtrlLdapSslAlternateServerCertSerialNo = MibTableColumn((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 7, 5, 1, 8), DisplayString()).setMaxAccess("readonly") if mibBuilder.loadTexts: ilomCtrlLdapSslAlternateServerCertSerialNo.setStatus('current') if mibBuilder.loadTexts: ilomCtrlLdapSslAlternateServerCertSerialNo.setDescription('A string showing the serial number of the alternate server certificate file.') ilomCtrlLdapSslAlternateServerCertIssuer = MibTableColumn((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 7, 5, 1, 9), DisplayString()).setMaxAccess("readonly") if mibBuilder.loadTexts: ilomCtrlLdapSslAlternateServerCertIssuer.setStatus('current') if mibBuilder.loadTexts: ilomCtrlLdapSslAlternateServerCertIssuer.setDescription('A string showing the issuer of the alternate server certificate file.') ilomCtrlLdapSslAlternateServerCertSubject = MibTableColumn((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 7, 5, 1, 10), DisplayString()).setMaxAccess("readonly") if mibBuilder.loadTexts: ilomCtrlLdapSslAlternateServerCertSubject.setStatus('current') if mibBuilder.loadTexts: ilomCtrlLdapSslAlternateServerCertSubject.setDescription('A string showing the subject of the alternate server certificate file.') ilomCtrlLdapSslAlternateServerCertValidBegin = MibTableColumn((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 7, 5, 1, 11), DisplayString()).setMaxAccess("readonly") if mibBuilder.loadTexts: ilomCtrlLdapSslAlternateServerCertValidBegin.setStatus('current') if mibBuilder.loadTexts: ilomCtrlLdapSslAlternateServerCertValidBegin.setDescription('A string showing the valid start date of the alternate server certificate file.') ilomCtrlLdapSslAlternateServerCertValidEnd = MibTableColumn((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 7, 5, 1, 12), DisplayString()).setMaxAccess("readonly") if mibBuilder.loadTexts: ilomCtrlLdapSslAlternateServerCertValidEnd.setStatus('current') if mibBuilder.loadTexts: ilomCtrlLdapSslAlternateServerCertValidEnd.setDescription('A string showing the valid end date of the alternate server certificate file.') ilomCtrlLdapSslCustomGroupsTable = MibTable((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 7, 6), ) if mibBuilder.loadTexts: ilomCtrlLdapSslCustomGroupsTable.setStatus('current') if mibBuilder.loadTexts: ilomCtrlLdapSslCustomGroupsTable.setDescription('This table is used to configure custom group information required for configuring the LDAP/SSL client.') ilomCtrlLdapSslCustomGroupsEntry = MibTableRow((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 7, 6, 1), ).setIndexNames((0, "SUN-ILOM-CONTROL-MIB", "ilomCtrlLdapSslCustomGroupId")) if mibBuilder.loadTexts: ilomCtrlLdapSslCustomGroupsEntry.setStatus('current') if mibBuilder.loadTexts: ilomCtrlLdapSslCustomGroupsEntry.setDescription('An entry for an LDAP/SSLcustom group.') ilomCtrlLdapSslCustomGroupId = MibTableColumn((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 7, 6, 1, 1), Integer32().subtype(subtypeSpec=ValueRangeConstraint(1, 5))) if mibBuilder.loadTexts: ilomCtrlLdapSslCustomGroupId.setStatus('current') if mibBuilder.loadTexts: ilomCtrlLdapSslCustomGroupId.setDescription('An integer identifier of the LDAP/SSL custom group entry.') ilomCtrlLdapSslCustomGroupName = MibTableColumn((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 7, 6, 1, 2), SnmpAdminString()).setMaxAccess("readwrite") if mibBuilder.loadTexts: ilomCtrlLdapSslCustomGroupName.setStatus('current') if mibBuilder.loadTexts: ilomCtrlLdapSslCustomGroupName.setDescription("This string should contain a distinguished name that exactly matches one of the group names on the LDAP/SSL server. Any user belonging to one of these groups in this table will be assigned the ILOM role based on the entry's configuration for roles.") ilomCtrlLdapSslCustomGroupRoles = MibTableColumn((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 7, 6, 1, 3), ILOMCtrlUserRoles()).setMaxAccess("readwrite") if mibBuilder.loadTexts: ilomCtrlLdapSslCustomGroupRoles.setStatus('current') if mibBuilder.loadTexts: ilomCtrlLdapSslCustomGroupRoles.setDescription("Specifies the role that a user authenticated via LDAP/SSL should have. Setting this property to legacy roles of 'Administrator' or 'Operator', or any of the individual role IDs of 'a', 'u', 'c', 'r', 'o' and 's' will cause the LDAP/SSL client to ignore the schema stored on the LDAP/SSL server. Setting this to 'none' clears the value and indicates that the native LDAP/SSL schema should be used. The role IDs can be joined together 'aucros' where a-admin, u-user, c-console, r-reset, s-service and o-readOnly.") ilomCtrlDNSNameServers = MibScalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 8, 1), SnmpAdminString()).setMaxAccess("readwrite") if mibBuilder.loadTexts: ilomCtrlDNSNameServers.setStatus('current') if mibBuilder.loadTexts: ilomCtrlDNSNameServers.setDescription('Specifies the nameserver for DNS.') ilomCtrlDNSSearchPath = MibScalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 8, 2), SnmpAdminString()).setMaxAccess("readwrite") if mibBuilder.loadTexts: ilomCtrlDNSSearchPath.setStatus('current') if mibBuilder.loadTexts: ilomCtrlDNSSearchPath.setDescription('Specifies the searchpath for DNS.') ilomCtrlDNSdhcpAutoDns = MibScalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 8, 3), TruthValue()).setMaxAccess("readwrite") if mibBuilder.loadTexts: ilomCtrlDNSdhcpAutoDns.setStatus('current') if mibBuilder.loadTexts: ilomCtrlDNSdhcpAutoDns.setDescription('Specifies whether or not DHCP autodns is enabled.') ilomCtrlDNSTimeout = MibScalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 8, 4), Integer32().subtype(subtypeSpec=ValueRangeConstraint(1, 10)).clone(5)).setMaxAccess("readwrite") if mibBuilder.loadTexts: ilomCtrlDNSTimeout.setStatus('current') if mibBuilder.loadTexts: ilomCtrlDNSTimeout.setDescription('Specifies the number of seconds to wait before timing out if the server does not respond.') ilomCtrlDNSRetries = MibScalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 8, 5), Integer32().subtype(subtypeSpec=ValueRangeConstraint(0, 4)).clone(1)).setMaxAccess("readwrite") if mibBuilder.loadTexts: ilomCtrlDNSRetries.setStatus('current') if mibBuilder.loadTexts: ilomCtrlDNSRetries.setDescription('Specifies the number of times a request is attempted again, after a timeout.') ilomCtrlObjectsGroup = ObjectGroup((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 18, 2, 2)).setObjects(("SUN-ILOM-CONTROL-MIB", "ilomCtrlDeviceNTPServerOneIP"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlDeviceNTPServerTwoIP"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlLdapEnabled"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlLdapServerIP"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlLdapPortNumber"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlLdapBindDn"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlLdapBindPassword"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlLdapSearchBase"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlLdapDefaultRoles"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlRadiusEnabled"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlRadiusServerIP"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlRadiusPortNumber"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlRadiusSecret"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlRadiusDefaultRoles"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlRemoteSyslogDest1"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlRemoteSyslogDest2"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlActiveDirectoryEnabled"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlActiveDirectoryIP"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlActiveDirectoryPortNumber"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlActiveDirectoryCertFileURI"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlActiveDirectoryTimeout"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlActiveDirectoryStrictCertEnabled"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlActiveDirectoryCertFileStatus"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlActiveDirUserDomain"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlActiveDirAdminGroupName"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlActiveDirOperatorGroupName"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlActiveDirCustomGroupName"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlActiveDirCustomGroupRoles"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlActiveDirAlternateServerIp"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlActiveDirAlternateServerPort"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlActiveDirAlternateServerCertStatus"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlActiveDirAlternateServerCertURI"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlActiveDirAlternateServerCertClear"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlActiveDirAlternateServerCertVersion"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlActiveDirAlternateServerCertSerialNo"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlActiveDirAlternateServerCertIssuer"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlActiveDirAlternateServerCertSubject"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlActiveDirAlternateServerCertValidBegin"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlActiveDirAlternateServerCertValidEnd"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlActiveDirectoryLogDetail"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlActiveDirectoryDefaultRoles"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlActiveDirectoryCertClear"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlActiveDirectoryCertVersion"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlActiveDirectoryCertSerialNo"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlActiveDirectoryCertIssuer"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlActiveDirectoryCertSubject"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlActiveDirectoryCertValidBegin"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlActiveDirectoryCertValidEnd"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlActiveDirDnsLocatorEnabled"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlActiveDirDnsLocatorQueryService"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlActiveDirExpSearchEnabled"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlActiveDirStrictCredentialErrorEnabled"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlSMTPEnabled"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlSMTPServerIP"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlSMTPPortNumber"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlSMTPCustomSender"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlLdapSslEnabled"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlLdapSslIP"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlLdapSslPortNumber"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlLdapSslDefaultRole"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlLdapSslCertFileURI"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlLdapSslTimeout"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlLdapSslStrictCertEnabled"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlLdapSslCertFileStatus"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlLdapSslLogDetail"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlLdapSslDefaultRoles"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlLdapSslCertFileClear"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlLdapSslCertFileVersion"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlLdapSslCertFileSerialNo"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlLdapSslCertFileIssuer"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlLdapSslCertFileSubject"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlLdapSslCertFileValidBegin"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlLdapSslCertFileValidEnd"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlLdapSslOptUsrMappingEnabled"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlLdapSslOptUsrMappingAttrInfo"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlLdapSslOptUsrMappingBindDn"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlLdapSslOptUsrMappingBindPw"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlLdapSslOptUsrMappingSearchBase"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlLdapSslUserDomain"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlLdapSslAdminGroupName"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlLdapSslOperatorGroupName"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlLdapSslCustomGroupName"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlLdapSslCustomGroupRoles"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlLdapSslAlternateServerIp"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlLdapSslAlternateServerPort"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlLdapSslAlternateServerCertStatus"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlLdapSslAlternateServerCertURI"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlLdapSslAlternateServerCertClear"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlLdapSslAlternateServerCertVersion"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlLdapSslAlternateServerCertSerialNo"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlLdapSslAlternateServerCertIssuer"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlLdapSslAlternateServerCertSubject"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlLdapSslAlternateServerCertValidBegin"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlLdapSslAlternateServerCertValidEnd"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlHttpEnabled"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlHttpPortNumber"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlHttpSecureRedirect"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlHttpsEnabled"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlHttpsPortNumber"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlSshRsaKeyFingerprint"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlSshRsaKeyLength"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlSshDsaKeyFingerprint"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlSshDsaKeyLength"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlSshGenerateNewKeyAction"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlSshGenerateNewKeyType"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlSshRestartSshdAction"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlSshEnabled"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlSingleSignonEnabled"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlNetworkMacAddress"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlNetworkIpDiscovery"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlNetworkIpAddress"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlNetworkIpGateway"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlNetworkIpNetmask"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlNetworkPendingIpDiscovery"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlNetworkPendingIpAddress"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlNetworkPendingIpGateway"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlNetworkPendingIpNetmask"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlNetworkCommitPending"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlNetworkDHCPServerAddr"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlNetworkPendingManagementPort"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlNetworkManagementPort"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlNetworkOutOfBandMacAddress"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlNetworkSidebandMacAddress"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlNetworkState"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlLocalUserPassword"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlLocalUserRoles"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlLocalUserRowStatus"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlLocalUserCLIMode"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlSessionsUsername"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlSessionsConnectionType"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlSessionsLoginTime"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlFirmwareMgmtVersion"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlFirmwareBuildNumber"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlFirmwareBuildDate"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlFirmwareTFTPServerIP"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlFirmwareTFTPFileName"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlFirmwarePreserveConfig"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlFirmwareMgmtStatus"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlFirmwareMgmtAction"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlFirmwareMgmtFilesystemVersion"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlFirmwareDelayBIOS"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlEventLogType"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlEventLogTimestamp"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlEventLogClass"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlEventLogSeverity"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlEventLogDescription"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlEventLogClear"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlAlertSeverity"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlAlertType"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlAlertDestinationIP"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlAlertDestinationPort"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlAlertDestinationEmail"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlAlertSNMPVersion"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlAlertSNMPCommunityOrUsername"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlAlertEmailEventClassFilter"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlAlertEmailEventTypeFilter"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlAlertEmailCustomSender"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlAlertEmailMessagePrefix"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlDateAndTime"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlNTPEnabled"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlTimezone"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlSerialInternalPortPresent"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlSerialInternalPortBaudRate"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlSerialExternalPortPresent"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlSerialExternalPortBaudRate"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlSerialExternalPortFlowControl"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlPowerAction"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlResetAction"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlRedundancyStatus"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlRedundancyAction"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlRedundancyFRUName"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlPolicyShortStr"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlPolicyLongStr"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlPolicyEnabled"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlResetToDefaultsAction"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlSPARCDiagsTrigger"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlSPARCDiagsMode"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlSPARCDiagsPowerOnLevel"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlSPARCDiagsUserResetLevel"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlSPARCDiagsErrorResetLevel"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlSPARCDiagsPowerOnVerbosity"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlSPARCDiagsUserResetVerbosity"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlSPARCDiagsErrorResetVerbosity"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlSPARCDiagsStatus"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlSPARCDiagsAction"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlSPARCDiagsHwChangeLevel"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlSPARCDiagsHwChangeVerbosity"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlSPARCHostMACAddress"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlSPARCHostOBPVersion"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlSPARCHostPOSTVersion"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlSPARCHostAutoRunOnError"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlSPARCHostPOSTStatus"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlSPARCHostAutoRestartPolicy"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlSPARCHostIoReconfigurePolicy"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlSPARCHostOSBootStatus"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlSPARCHostBootTimeout"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlSPARCHostBootRestart"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlSPARCHostMaxBootFail"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlSPARCHostBootFailRecovery"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlSPARCHostHypervisorVersion"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlSPARCHostSysFwVersion"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlSPARCHostGMVersion"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlSPARCHostSendBreakAction"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlSPARCBootModeState"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlSPARCBootModeScript"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlSPARCBootModeExpires"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlSPARCBootModeLDOMConfig"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlSPARCKeySwitchState"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlSystemIdentifier"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlHostName"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlThdState"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlThdAction"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlThdModuleDesc"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlThdModuleState"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlThdModuleAction"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlThdInstanceState"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlThdInstanceAction"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlBackupAndRestoreTargetURI"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlBackupAndRestorePassphrase"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlBackupAndRestoreAction"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlBackupAndRestoreActionStatus"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlDNSNameServers"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlDNSSearchPath"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlDNSdhcpAutoDns"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlDNSTimeout"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlDNSRetries")) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): ilomCtrlObjectsGroup = ilomCtrlObjectsGroup.setStatus('current') if mibBuilder.loadTexts: ilomCtrlObjectsGroup.setDescription('The group of current objects.') ilomCtrlDeprecatedObjectsGroup = ObjectGroup((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 18, 2, 1)).setObjects(("SUN-ILOM-CONTROL-MIB", "ilomCtrlLdapDefaultRole"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlRadiusDefaultRole"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlLocalUserAuthPassword"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlLocalUserAuthRole"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlLocalUserAuthRowStatus"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlLocalUserAuthCLIMode"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlSPARCDiagsLevel"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlSPARCDiagsVerbosity"), ("SUN-ILOM-CONTROL-MIB", "ilomCtrlActiveDirectoryDefaultRole")) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): ilomCtrlDeprecatedObjectsGroup = ilomCtrlDeprecatedObjectsGroup.setStatus('deprecated') if mibBuilder.loadTexts: ilomCtrlDeprecatedObjectsGroup.setDescription('The objects that have been deprecated.') mibBuilder.exportSymbols("SUN-ILOM-CONTROL-MIB", ilomCtrlNetworkOutOfBandMacAddress=ilomCtrlNetworkOutOfBandMacAddress, ilomCtrlActiveDirUserDomainEntry=ilomCtrlActiveDirUserDomainEntry, ilomCtrlAlertDestinationEmail=ilomCtrlAlertDestinationEmail, ilomCtrlLdapSslCustomGroupRoles=ilomCtrlLdapSslCustomGroupRoles, ilomCtrlAlertDestinationIP=ilomCtrlAlertDestinationIP, ilomCtrlActiveDirOperatorGroupsTable=ilomCtrlActiveDirOperatorGroupsTable, ilomCtrlRemoteSyslog=ilomCtrlRemoteSyslog, ilomCtrlActiveDirAlternateServerCertSerialNo=ilomCtrlActiveDirAlternateServerCertSerialNo, ilomCtrlSingleSignonEnabled=ilomCtrlSingleSignonEnabled, sun=sun, ilomCtrlActiveDirectoryCertValidEnd=ilomCtrlActiveDirectoryCertValidEnd, ilomCtrlSPARCHostAutoRunOnError=ilomCtrlSPARCHostAutoRunOnError, ilomCtrlActiveDirectoryCertSubject=ilomCtrlActiveDirectoryCertSubject, ilomCtrlActiveDirectoryDefaultRoles=ilomCtrlActiveDirectoryDefaultRoles, ilomCtrlNetworkPendingIpAddress=ilomCtrlNetworkPendingIpAddress, ilomCtrlActiveDirAlternateServerPort=ilomCtrlActiveDirAlternateServerPort, ilomCtrlSerialExternalPortPresent=ilomCtrlSerialExternalPortPresent, ilomCtrlActiveDirAdminGroupName=ilomCtrlActiveDirAdminGroupName, ilomCtrlActiveDirectoryCertVersion=ilomCtrlActiveDirectoryCertVersion, ilomCtrlThdModuleState=ilomCtrlThdModuleState, ilomCtrlSPARC=ilomCtrlSPARC, ilomCtrlActiveDirectoryCertClear=ilomCtrlActiveDirectoryCertClear, ilomCtrlThdState=ilomCtrlThdState, ilomCtrlActiveDirOperatorGroupName=ilomCtrlActiveDirOperatorGroupName, ilomCtrlAlertSNMPVersion=ilomCtrlAlertSNMPVersion, ilomCtrlSPARCDiagsStatus=ilomCtrlSPARCDiagsStatus, ILOMCtrlSPARCBootModeState=ILOMCtrlSPARCBootModeState, ilomCtrlSPARCBootModeExpires=ilomCtrlSPARCBootModeExpires, ilomCtrlLocalUserRowStatus=ilomCtrlLocalUserRowStatus, ilomCtrlAlertSeverity=ilomCtrlAlertSeverity, ILOMCtrlLocalUserAuthCLIMode=ILOMCtrlLocalUserAuthCLIMode, ilomCtrlPolicyShortStr=ilomCtrlPolicyShortStr, ilomCtrlConfigMgmt=ilomCtrlConfigMgmt, ilomCtrlRadiusPortNumber=ilomCtrlRadiusPortNumber, ilomCtrlSerialExternalPortFlowControl=ilomCtrlSerialExternalPortFlowControl, ilomCtrlFirmwareDelayBIOS=ilomCtrlFirmwareDelayBIOS, ilomCtrlLdapSslAlternateServerCertURI=ilomCtrlLdapSslAlternateServerCertURI, ilomCtrlSPARCDiagsPowerOnVerbosity=ilomCtrlSPARCDiagsPowerOnVerbosity, ilomCtrlSessionsLoginTime=ilomCtrlSessionsLoginTime, ilomCtrlDNS=ilomCtrlDNS, ilomCtrlLdapSslTimeout=ilomCtrlLdapSslTimeout, ilomCtrlCompliances=ilomCtrlCompliances, ilomCtrlLdapSslAlternateServerCertValidEnd=ilomCtrlLdapSslAlternateServerCertValidEnd, ilomCtrlDNSSearchPath=ilomCtrlDNSSearchPath, ILOMCtrlFirmwareUpdateAction=ILOMCtrlFirmwareUpdateAction, ilomCtrlActiveDirectoryStrictCertEnabled=ilomCtrlActiveDirectoryStrictCertEnabled, ilomCtrlSPARCDiagsErrorResetLevel=ilomCtrlSPARCDiagsErrorResetLevel, ilomCtrlFirmwareMgmtStatus=ilomCtrlFirmwareMgmtStatus, ilomCtrlActiveDirOperatorGroupId=ilomCtrlActiveDirOperatorGroupId, ilomCtrlResetTarget=ilomCtrlResetTarget, ilomCtrlBackupAndRestore=ilomCtrlBackupAndRestore, ILOMCtrlSPARCDiagsAction=ILOMCtrlSPARCDiagsAction, ilomCtrlThdInstanceAction=ilomCtrlThdInstanceAction, ilomCtrlNetworkEntry=ilomCtrlNetworkEntry, ilomCtrlActiveDirAlternateServerTable=ilomCtrlActiveDirAlternateServerTable, ilomCtrlSPARCKeySwitchState=ilomCtrlSPARCKeySwitchState, ilomCtrlSPARCDiagsAction=ilomCtrlSPARCDiagsAction, ilomCtrlSMTPPortNumber=ilomCtrlSMTPPortNumber, ilomCtrlPolicyEntry=ilomCtrlPolicyEntry, ilomCtrlSshRestartSshdAction=ilomCtrlSshRestartSshdAction, ILOMCtrlLocalUserPassword=ILOMCtrlLocalUserPassword, ilomCtrlLdapSslCertFileIssuer=ilomCtrlLdapSslCertFileIssuer, ilomCtrlNetworkTable=ilomCtrlNetworkTable, ilomCtrlLdapDefaultRole=ilomCtrlLdapDefaultRole, ilomCtrlLdapSslCustomGroupsEntry=ilomCtrlLdapSslCustomGroupsEntry, ilomCtrlNetworkIpGateway=ilomCtrlNetworkIpGateway, ilomCtrlSPARCBootModeLDOMConfig=ilomCtrlSPARCBootModeLDOMConfig, ilomCtrlNtp=ilomCtrlNtp, ilomCtrlSPARCKeySwitch=ilomCtrlSPARCKeySwitch, ilomCtrlPowerTarget=ilomCtrlPowerTarget, ilomCtrlNetworkTarget=ilomCtrlNetworkTarget, ILOMCtrlSPARCKeySwitchState=ILOMCtrlSPARCKeySwitchState, ilomCtrlLdapSslLogDetail=ilomCtrlLdapSslLogDetail, ilomCtrlActiveDirCustomGroupId=ilomCtrlActiveDirCustomGroupId, ilomCtrlActiveDirectoryCertIssuer=ilomCtrlActiveDirectoryCertIssuer, ilomCtrlDNSRetries=ilomCtrlDNSRetries, ilomCtrlActiveDirAlternateServerCertURI=ilomCtrlActiveDirAlternateServerCertURI, ilomCtrlSPARCHostSysFwVersion=ilomCtrlSPARCHostSysFwVersion, ilomCtrlLdapSslOperatorGroupId=ilomCtrlLdapSslOperatorGroupId, ILOMCtrlResetToDefaultsAction=ILOMCtrlResetToDefaultsAction, ilomCtrlRedundancyFRUName=ilomCtrlRedundancyFRUName, ilomCtrlLdapSslAdminGroupName=ilomCtrlLdapSslAdminGroupName, ilomCtrlLocalUserRoles=ilomCtrlLocalUserRoles, ilomCtrlLdapPortNumber=ilomCtrlLdapPortNumber, ilomCtrlLdapSearchBase=ilomCtrlLdapSearchBase, ilomCtrlServices=ilomCtrlServices, ilomCtrlNetwork=ilomCtrlNetwork, ilomCtrlHttps=ilomCtrlHttps, ilomCtrlActiveDirectoryCertFileStatus=ilomCtrlActiveDirectoryCertFileStatus, ILOMCtrlPowerAction=ILOMCtrlPowerAction, ilomCtrlRadiusServerIP=ilomCtrlRadiusServerIP, ilomCtrlAlertEmailCustomSender=ilomCtrlAlertEmailCustomSender, ilomCtrlLocalUserAuthEntry=ilomCtrlLocalUserAuthEntry, ilomCtrlLdapSslCertFileValidEnd=ilomCtrlLdapSslCertFileValidEnd, ilomCtrlActiveDirAlternateServerCertVersion=ilomCtrlActiveDirAlternateServerCertVersion, ilomCtrlSPARCDiagsErrorResetVerbosity=ilomCtrlSPARCDiagsErrorResetVerbosity, ILOMCtrlInstanceTargetIndex=ILOMCtrlInstanceTargetIndex, ilomCtrlAlertEmailEventClassFilter=ilomCtrlAlertEmailEventClassFilter, ilomCtrlObjectsGroup=ilomCtrlObjectsGroup, ilomCtrlAlerts=ilomCtrlAlerts, ilomCtrlLdapSslStrictCertEnabled=ilomCtrlLdapSslStrictCertEnabled, ILOMCtrlSshKeyGenType=ILOMCtrlSshKeyGenType, products=products, ilomCtrlSMTPServerIP=ilomCtrlSMTPServerIP, ilomCtrlActiveDirectoryEnabled=ilomCtrlActiveDirectoryEnabled, ilomCtrlThdInstanceName=ilomCtrlThdInstanceName, ilomCtrlRedundancy=ilomCtrlRedundancy, ilomCtrlNTPEnabled=ilomCtrlNTPEnabled, ilomCtrlHttpsPortNumber=ilomCtrlHttpsPortNumber, ilomCtrlFirmwareBuildDate=ilomCtrlFirmwareBuildDate, ilomCtrlLdapSslAlternateServerCertSerialNo=ilomCtrlLdapSslAlternateServerCertSerialNo, ilomCtrlLocalUserAuthCLIMode=ilomCtrlLocalUserAuthCLIMode, ilomCtrlLdapSslUserDomainId=ilomCtrlLdapSslUserDomainId, ilomCtrlSPARCDiagsHwChangeLevel=ilomCtrlSPARCDiagsHwChangeLevel, ilomCtrlSPARCHostAutoRestartPolicy=ilomCtrlSPARCHostAutoRestartPolicy, ilomCtrlSshDsaKeyFingerprint=ilomCtrlSshDsaKeyFingerprint, ilomCtrlPowerAction=ilomCtrlPowerAction, ilomCtrlSerialInternalPortBaudRate=ilomCtrlSerialInternalPortBaudRate, ilomCtrlAlertsEntry=ilomCtrlAlertsEntry, ilomCtrlActiveDirectoryCertFileURI=ilomCtrlActiveDirectoryCertFileURI, ilomCtrlSessionsTable=ilomCtrlSessionsTable, ilomCtrlActiveDirectoryCertSerialNo=ilomCtrlActiveDirectoryCertSerialNo, ilomCtrlLdapSslOperatorGroupName=ilomCtrlLdapSslOperatorGroupName, ilomCtrlResetControl=ilomCtrlResetControl, ilomCtrlRadiusEnabled=ilomCtrlRadiusEnabled, ilomCtrlLdapSslOptUsrMappingBindPw=ilomCtrlLdapSslOptUsrMappingBindPw, ilomCtrlActiveDirUserDomain=ilomCtrlActiveDirUserDomain, ilomCtrlActiveDirOperatorGroupsEntry=ilomCtrlActiveDirOperatorGroupsEntry, ilomCtrlLdapSslAdminGroupId=ilomCtrlLdapSslAdminGroupId, ilomCtrlLdapSslAlternateServerPort=ilomCtrlLdapSslAlternateServerPort, ilomCtrlLdapSslAdminGroupsEntry=ilomCtrlLdapSslAdminGroupsEntry, ilomCtrlRadius=ilomCtrlRadius, ilomCtrlPowerEntry=ilomCtrlPowerEntry, ilomCtrlBackupAndRestoreActionStatus=ilomCtrlBackupAndRestoreActionStatus, ilomCtrlSessions=ilomCtrlSessions, ilomCtrlActiveDirDnsLocatorQueryId=ilomCtrlActiveDirDnsLocatorQueryId, ilomCtrlThdModulesEntry=ilomCtrlThdModulesEntry, ilomCtrlSystemIdentifier=ilomCtrlSystemIdentifier, ILOMCtrlBackupAndRestoreAction=ILOMCtrlBackupAndRestoreAction, ilomCtrlPowerTable=ilomCtrlPowerTable, ilomCtrlSPARCDiagsLevel=ilomCtrlSPARCDiagsLevel, ilomCtrlLdapSsl=ilomCtrlLdapSsl, ilomCtrlLdapSslCustomGroupId=ilomCtrlLdapSslCustomGroupId, ilomCtrlActiveDirDnsLocatorQueryService=ilomCtrlActiveDirDnsLocatorQueryService, ilomCtrlThdInstanceState=ilomCtrlThdInstanceState, ilomCtrlSerialInternalPortPresent=ilomCtrlSerialInternalPortPresent, ilomCtrlAlertEmailEventTypeFilter=ilomCtrlAlertEmailEventTypeFilter, ilomCtrlEventLog=ilomCtrlEventLog, ILOMCtrlFirmwareUpdateStatus=ILOMCtrlFirmwareUpdateStatus, ilomCtrlSPARCHostBootRestart=ilomCtrlSPARCHostBootRestart, ilomCtrlLdapSslUserDomainTable=ilomCtrlLdapSslUserDomainTable, ilomCtrlBackupAndRestoreAction=ilomCtrlBackupAndRestoreAction, ilomCtrlFirmwareBuildNumber=ilomCtrlFirmwareBuildNumber, ilomCtrlSPARCHostPOSTVersion=ilomCtrlSPARCHostPOSTVersion, ilomCtrlEventLogDescription=ilomCtrlEventLogDescription, ilomCtrlLocalUserEntry=ilomCtrlLocalUserEntry, ilomCtrlConformances=ilomCtrlConformances, ilomCtrlPowerReset=ilomCtrlPowerReset, ilomCtrlSessionsUsername=ilomCtrlSessionsUsername, ilomCtrlFirmwareMgmtFilesystemVersion=ilomCtrlFirmwareMgmtFilesystemVersion, ILOMCtrlTargetIndex=ILOMCtrlTargetIndex, ilomCtrlDeprecatedObjectsGroup=ilomCtrlDeprecatedObjectsGroup, ilomCtrlActiveDirAdminGroupId=ilomCtrlActiveDirAdminGroupId, ilomCtrlActiveDirectoryCertValidBegin=ilomCtrlActiveDirectoryCertValidBegin, ilomCtrlSingleSignon=ilomCtrlSingleSignon, ilomCtrlNetworkPendingIpGateway=ilomCtrlNetworkPendingIpGateway, ilomCtrlSPARCBootMode=ilomCtrlSPARCBootMode, ilomCtrlThdModuleName=ilomCtrlThdModuleName, ilomCtrlSPARCDiags=ilomCtrlSPARCDiags, ilomCtrlEventLogTable=ilomCtrlEventLogTable, ilomCtrlUsers=ilomCtrlUsers, ilomCtrlRemoteSyslogDest2=ilomCtrlRemoteSyslogDest2, ilomCtrlSPARCHostControl=ilomCtrlSPARCHostControl, ilomCtrlSshRsaKeyLength=ilomCtrlSshRsaKeyLength, ilomCtrlDeviceNTPServerOneIP=ilomCtrlDeviceNTPServerOneIP, ilomCtrlRadiusSecret=ilomCtrlRadiusSecret, ilomCtrlSshRsaKeyFingerprint=ilomCtrlSshRsaKeyFingerprint, ilomCtrlDNSNameServers=ilomCtrlDNSNameServers, ilomCtrlNetworkState=ilomCtrlNetworkState, ilomCtrlThdInstanceTable=ilomCtrlThdInstanceTable, ilomCtrlSPARCHostSendBreakAction=ilomCtrlSPARCHostSendBreakAction, ilomCtrlActiveDirDnsLocatorEnabled=ilomCtrlActiveDirDnsLocatorEnabled, ilomCtrlPolicy=ilomCtrlPolicy, ilomCtrlFirmwareTFTPFileName=ilomCtrlFirmwareTFTPFileName, ilomCtrlSshGenerateNewKeyType=ilomCtrlSshGenerateNewKeyType, ilomCtrlLdapBindPassword=ilomCtrlLdapBindPassword, ilomCtrlRedundancyStatus=ilomCtrlRedundancyStatus, ilomCtrlSPARCHostHypervisorVersion=ilomCtrlSPARCHostHypervisorVersion, ilomCtrlLdapSslAlternateServerCertValidBegin=ilomCtrlLdapSslAlternateServerCertValidBegin, ilomCtrlSsh=ilomCtrlSsh, ilomCtrlSPARCHostMACAddress=ilomCtrlSPARCHostMACAddress, ilomCtrlLdapSslUserDomainEntry=ilomCtrlLdapSslUserDomainEntry, ilomCtrlRadiusDefaultRoles=ilomCtrlRadiusDefaultRoles, ilomCtrlNetworkCommitPending=ilomCtrlNetworkCommitPending, ilomCtrlActiveDirectoryLogDetail=ilomCtrlActiveDirectoryLogDetail, ilomCtrlActiveDirUserDomainTable=ilomCtrlActiveDirUserDomainTable, ilomCtrlSPARCHostBootFailRecovery=ilomCtrlSPARCHostBootFailRecovery, ilomCtrlActiveDirUserDomainId=ilomCtrlActiveDirUserDomainId, ilomCtrlActiveDirStrictCredentialErrorEnabled=ilomCtrlActiveDirStrictCredentialErrorEnabled, ilomCtrlSMTPCustomSender=ilomCtrlSMTPCustomSender, ilomCtrlLocalUserAuthTable=ilomCtrlLocalUserAuthTable, ilomCtrlLdapEnabled=ilomCtrlLdapEnabled, ilomCtrlThdModuleDesc=ilomCtrlThdModuleDesc, ilomCtrlLocalUserPassword=ilomCtrlLocalUserPassword, ilomCtrlAlertID=ilomCtrlAlertID, ilomCtrlLdap=ilomCtrlLdap, ILOMCtrlSPARCDiagsTrigger=ILOMCtrlSPARCDiagsTrigger, ilomCtrlAlertEmailMessagePrefix=ilomCtrlAlertEmailMessagePrefix, ILOMCtrlRedundancyAction=ILOMCtrlRedundancyAction, ilomCtrlLdapSslCertFileVersion=ilomCtrlLdapSslCertFileVersion, ilomCtrlActiveDirAlternateServerId=ilomCtrlActiveDirAlternateServerId, ILOMCtrlEventLogClass=ILOMCtrlEventLogClass, ILOMCtrlSPARCHostSendBreakAction=ILOMCtrlSPARCHostSendBreakAction, ilomCtrlAlertsTable=ilomCtrlAlertsTable, ilomCtrlActiveDirAlternateServerEntry=ilomCtrlActiveDirAlternateServerEntry, ilomCtrlResetAction=ilomCtrlResetAction, ilomCtrlThdModName=ilomCtrlThdModName, ilomCtrlActiveDirectoryDefaultRole=ilomCtrlActiveDirectoryDefaultRole, ilomCtrlLdapSslCertFileURI=ilomCtrlLdapSslCertFileURI, ilomCtrlLdapSslCustomGroupName=ilomCtrlLdapSslCustomGroupName, PYSNMP_MODULE_ID=ilomCtrlMIB, ilomCtrlSPARCHostIoReconfigurePolicy=ilomCtrlSPARCHostIoReconfigurePolicy, ilomCtrlLdapDefaultRoles=ilomCtrlLdapDefaultRoles, ilomCtrlLdapSslEnabled=ilomCtrlLdapSslEnabled, ilomCtrlActiveDirDnsLocatorQueryTable=ilomCtrlActiveDirDnsLocatorQueryTable, ILOMCtrlSPARCHostBootFailRecovery=ILOMCtrlSPARCHostBootFailRecovery, ilomCtrlThdModuleAction=ilomCtrlThdModuleAction, ilomCtrlSPARCHostMaxBootFail=ilomCtrlSPARCHostMaxBootFail, ilomCtrlActiveDirCustomGroupName=ilomCtrlActiveDirCustomGroupName, ilomCtrlSPARCHostPOSTStatus=ilomCtrlSPARCHostPOSTStatus, ilomCtrlClients=ilomCtrlClients, ilom=ilom, ilomCtrlHttpEnabled=ilomCtrlHttpEnabled, ilomCtrlSPARCHostBootTimeout=ilomCtrlSPARCHostBootTimeout, ilomCtrlLdapSslCertFileClear=ilomCtrlLdapSslCertFileClear, ilomCtrlLdapSslAlternateServerCertClear=ilomCtrlLdapSslAlternateServerCertClear, ILOMCtrlThdAction=ILOMCtrlThdAction, ilomCtrlSessionsId=ilomCtrlSessionsId, ilomCtrlLdapSslGlobalObj=ilomCtrlLdapSslGlobalObj, ILOMCtrlModTargetIndex=ILOMCtrlModTargetIndex, ILOMCtrlSPARCHostIoReconfigurePolicy=ILOMCtrlSPARCHostIoReconfigurePolicy, ilomCtrlRedundancyAction=ilomCtrlRedundancyAction, ilomCtrlSPARCDiagsVerbosity=ilomCtrlSPARCDiagsVerbosity, ilomCtrlLdapSslOperatorGroupsEntry=ilomCtrlLdapSslOperatorGroupsEntry, ilomCtrlFirmwarePreserveConfig=ilomCtrlFirmwarePreserveConfig, ilomCtrlAlertSNMPCommunityOrUsername=ilomCtrlAlertSNMPCommunityOrUsername, ilomCtrlActiveDirAlternateServerCertStatus=ilomCtrlActiveDirAlternateServerCertStatus, ilomCtrlFirmwareMgmt=ilomCtrlFirmwareMgmt, ilomCtrlSPARCDiagsHwChangeVerbosity=ilomCtrlSPARCDiagsHwChangeVerbosity, ilomCtrlLdapSslIP=ilomCtrlLdapSslIP, ILOMCtrlAlertSNMPVersion=ILOMCtrlAlertSNMPVersion, ILOMCtrlEventSeverity=ILOMCtrlEventSeverity, ilomCtrlThdModulesTable=ilomCtrlThdModulesTable, ilomCtrlActiveDirectoryPortNumber=ilomCtrlActiveDirectoryPortNumber) mibBuilder.exportSymbols("SUN-ILOM-CONTROL-MIB", ilomCtrlActiveDirectory=ilomCtrlActiveDirectory, ilomCtrlPolicyTable=ilomCtrlPolicyTable, ilomCtrlLdapSslCertFileSubject=ilomCtrlLdapSslCertFileSubject, ilomCtrlLocalUserUsername=ilomCtrlLocalUserUsername, ilomCtrlEventLogClass=ilomCtrlEventLogClass, ilomCtrlSPARCBootModeState=ilomCtrlSPARCBootModeState, ilomCtrlRemoteSyslogDest1=ilomCtrlRemoteSyslogDest1, ilomCtrlEventLogType=ilomCtrlEventLogType, ilomCtrlLdapBindDn=ilomCtrlLdapBindDn, ilomCtrlActiveDirAlternateServerIp=ilomCtrlActiveDirAlternateServerIp, ILOMCtrlNetworkIpDiscovery=ILOMCtrlNetworkIpDiscovery, ilomCtrlActiveDirectoryIP=ilomCtrlActiveDirectoryIP, ilomCtrlThdAction=ilomCtrlThdAction, ilomCtrlLdapSslAlternateServerIp=ilomCtrlLdapSslAlternateServerIp, ilomCtrlEventLogEntry=ilomCtrlEventLogEntry, ilomCtrlThd=ilomCtrlThd, ilomCtrlLdapSslAlternateServerTable=ilomCtrlLdapSslAlternateServerTable, ilomCtrlTimezone=ilomCtrlTimezone, ilomCtrlPolicyId=ilomCtrlPolicyId, ilomCtrlNetworkIpAddress=ilomCtrlNetworkIpAddress, ilomCtrlNetworkPendingIpDiscovery=ilomCtrlNetworkPendingIpDiscovery, ilomCtrlDateAndTime=ilomCtrlDateAndTime, ilomCtrlLdapSslAlternateServerCertIssuer=ilomCtrlLdapSslAlternateServerCertIssuer, ILOMCtrlSPARCDiagsVerbosityAdv=ILOMCtrlSPARCDiagsVerbosityAdv, ilomCtrlSMTPEnabled=ilomCtrlSMTPEnabled, ilomCtrlActiveDirAlternateServerCertValidEnd=ilomCtrlActiveDirAlternateServerCertValidEnd, ilomCtrlClock=ilomCtrlClock, ilomCtrlSMTP=ilomCtrlSMTP, ilomCtrlLocalUserTable=ilomCtrlLocalUserTable, ilomCtrlDNSdhcpAutoDns=ilomCtrlDNSdhcpAutoDns, ilomCtrlSPARCHostGMVersion=ilomCtrlSPARCHostGMVersion, ilomCtrlLogs=ilomCtrlLogs, ilomCtrlEventLogRecordID=ilomCtrlEventLogRecordID, ilomCtrlSPARCDiagsTrigger=ilomCtrlSPARCDiagsTrigger, ilomCtrlActiveDirAdminGroupsTable=ilomCtrlActiveDirAdminGroupsTable, ilomCtrlFirmwareTFTPServerIP=ilomCtrlFirmwareTFTPServerIP, ILOMCtrlSPARCHostBootRestart=ILOMCtrlSPARCHostBootRestart, ILOMCtrlSessionsConnectionType=ILOMCtrlSessionsConnectionType, ilomCtrlNetworkManagementPort=ilomCtrlNetworkManagementPort, ilomCtrlPolicyEnabled=ilomCtrlPolicyEnabled, ilomCtrlActiveDirCustomGroupsEntry=ilomCtrlActiveDirCustomGroupsEntry, ilomCtrlLdapServerIP=ilomCtrlLdapServerIP, ilomCtrlLdapSslAlternateServerId=ilomCtrlLdapSslAlternateServerId, ilomCtrlHttpSecureRedirect=ilomCtrlHttpSecureRedirect, ilomCtrlLdapSslCertFileStatus=ilomCtrlLdapSslCertFileStatus, ilomCtrlLdapSslDefaultRole=ilomCtrlLdapSslDefaultRole, ilomCtrlLdapSslCertFileValidBegin=ilomCtrlLdapSslCertFileValidBegin, ilomCtrlSPARCHostOSBootStatus=ilomCtrlSPARCHostOSBootStatus, ilomCtrlActiveDirAlternateServerCertValidBegin=ilomCtrlActiveDirAlternateServerCertValidBegin, ilomCtrlFirmwareMgmtAction=ilomCtrlFirmwareMgmtAction, ilomCtrlEventLogTimestamp=ilomCtrlEventLogTimestamp, ilomCtrlLdapSslAdminGroupsTable=ilomCtrlLdapSslAdminGroupsTable, ilomCtrlLdapSslOptUsrMappingAttrInfo=ilomCtrlLdapSslOptUsrMappingAttrInfo, ILOMCtrlAlertType=ILOMCtrlAlertType, ilomCtrlResetToDefaultsAction=ilomCtrlResetToDefaultsAction, ilomCtrlLdapSslOperatorGroupsTable=ilomCtrlLdapSslOperatorGroupsTable, ilomCtrlEventLogClear=ilomCtrlEventLogClear, ilomCtrlNetworkIpNetmask=ilomCtrlNetworkIpNetmask, ilomCtrlBackupAndRestoreTargetURI=ilomCtrlBackupAndRestoreTargetURI, ilomCtrlLdapSslCustomGroupsTable=ilomCtrlLdapSslCustomGroupsTable, ilomCtrlSshEnabled=ilomCtrlSshEnabled, ILOMCtrlSPARCDiagsLevelAdv=ILOMCtrlSPARCDiagsLevelAdv, ILOMCtrlSPARCDiagsLevel=ILOMCtrlSPARCDiagsLevel, ilomCtrlNetworkIpDiscovery=ilomCtrlNetworkIpDiscovery, ilomCtrlLdapSslDefaultRoles=ilomCtrlLdapSslDefaultRoles, ilomCtrlActiveDirAlternateServerCertIssuer=ilomCtrlActiveDirAlternateServerCertIssuer, ilomCtrlLdapSslUserDomain=ilomCtrlLdapSslUserDomain, ilomCtrlLocalUserAuthRowStatus=ilomCtrlLocalUserAuthRowStatus, ilomCtrlLdapSslOptUsrMappingBindDn=ilomCtrlLdapSslOptUsrMappingBindDn, ilomCtrlSshDsaKeyLength=ilomCtrlSshDsaKeyLength, ilomCtrlGroups=ilomCtrlGroups, ilomCtrlNetworkSidebandMacAddress=ilomCtrlNetworkSidebandMacAddress, ilomCtrlLdapSslPortNumber=ilomCtrlLdapSslPortNumber, ilomCtrlPowerControl=ilomCtrlPowerControl, ilomCtrlAlertDestinationPort=ilomCtrlAlertDestinationPort, ILOMCtrlSPARCDiagsVerbosity=ILOMCtrlSPARCDiagsVerbosity, ilomCtrlResetTable=ilomCtrlResetTable, ILOMCtrlUserRole=ILOMCtrlUserRole, ilomCtrlResetEntry=ilomCtrlResetEntry, ilomCtrlIdentification=ilomCtrlIdentification, ilomCtrlHostName=ilomCtrlHostName, ilomCtrlHttpPortNumber=ilomCtrlHttpPortNumber, ILOMCtrlRedundancyStatus=ILOMCtrlRedundancyStatus, ilomCtrlLdapSslAlternateServerCertVersion=ilomCtrlLdapSslAlternateServerCertVersion, ilomCtrlLdapSslOptUsrMappingSearchBase=ilomCtrlLdapSslOptUsrMappingSearchBase, ilomCtrlNetworkMacAddress=ilomCtrlNetworkMacAddress, ilomCtrlActiveDirExpSearchEnabled=ilomCtrlActiveDirExpSearchEnabled, ILOMCtrlUserRoles=ILOMCtrlUserRoles, ilomCtrlHttp=ilomCtrlHttp, ilomCtrlAlertType=ilomCtrlAlertType, ilomCtrlPolicyLongStr=ilomCtrlPolicyLongStr, ilomCtrlSPARCHostOBPVersion=ilomCtrlSPARCHostOBPVersion, ilomCtrlLocalUserCLIMode=ilomCtrlLocalUserCLIMode, ilomCtrlActiveDirCustomGroupsTable=ilomCtrlActiveDirCustomGroupsTable, ILOMCtrlFlowControl=ILOMCtrlFlowControl, ilomCtrlActiveDirAlternateServerCertClear=ilomCtrlActiveDirAlternateServerCertClear, ILOMCtrlEventLogType=ILOMCtrlEventLogType, ilomCtrlSerial=ilomCtrlSerial, ilomCtrlLdapSslAlternateServerCertSubject=ilomCtrlLdapSslAlternateServerCertSubject, ilomCtrlEventLogSeverity=ilomCtrlEventLogSeverity, ilomCtrlLocalUserAuthUsername=ilomCtrlLocalUserAuthUsername, ilomCtrlSessionsEntry=ilomCtrlSessionsEntry, ilomCtrlNetworkPendingManagementPort=ilomCtrlNetworkPendingManagementPort, ilomCtrlSessionsConnectionType=ilomCtrlSessionsConnectionType, ilomCtrlActiveDirDnsLocatorQueryEntry=ilomCtrlActiveDirDnsLocatorQueryEntry, ilomCtrlSPARCDiagsUserResetLevel=ilomCtrlSPARCDiagsUserResetLevel, ilomCtrlSshGenerateNewKeyAction=ilomCtrlSshGenerateNewKeyAction, ilomCtrlLdapSslAlternateServerEntry=ilomCtrlLdapSslAlternateServerEntry, ILOMCtrlSPARCHostAutoRestartPolicy=ILOMCtrlSPARCHostAutoRestartPolicy, ILOMCtrlBaudRate=ILOMCtrlBaudRate, ilomCtrlSPARCDiagsPowerOnLevel=ilomCtrlSPARCDiagsPowerOnLevel, ilomCtrlHttpsEnabled=ilomCtrlHttpsEnabled, ilomCtrlDeviceNTPServerTwoIP=ilomCtrlDeviceNTPServerTwoIP, ILOMCtrlResetAction=ILOMCtrlResetAction, ilomCtrlLocalUserAuthPassword=ilomCtrlLocalUserAuthPassword, ilomCtrlFirmwareMgmtVersion=ilomCtrlFirmwareMgmtVersion, ilomCtrlLdapSslCertFileSerialNo=ilomCtrlLdapSslCertFileSerialNo, ilomCtrlActiveDirCustomGroupRoles=ilomCtrlActiveDirCustomGroupRoles, ILOMCtrlLocalUserUsername=ILOMCtrlLocalUserUsername, ilomCtrlLdapSslOptUsrMappingEnabled=ilomCtrlLdapSslOptUsrMappingEnabled, ilomCtrlSPARCDiagsMode=ilomCtrlSPARCDiagsMode, ilomCtrlLocalUserAuthRole=ilomCtrlLocalUserAuthRole, ilomCtrlBackupAndRestorePassphrase=ilomCtrlBackupAndRestorePassphrase, ilomCtrlDNSTimeout=ilomCtrlDNSTimeout, ilomCtrlNetworkDHCPServerAddr=ilomCtrlNetworkDHCPServerAddr, ilomCtrlMIB=ilomCtrlMIB, ILOMCtrlSPARCDiagsMode=ILOMCtrlSPARCDiagsMode, ilomCtrlNetworkPendingIpNetmask=ilomCtrlNetworkPendingIpNetmask, ilomCtrlActiveDirectoryTimeout=ilomCtrlActiveDirectoryTimeout, ilomCtrlActiveDirAlternateServerCertSubject=ilomCtrlActiveDirAlternateServerCertSubject, ilomCtrlSPARCBootModeScript=ilomCtrlSPARCBootModeScript, ilomCtrlThdInstanceEntry=ilomCtrlThdInstanceEntry, ilomCtrlSPARCDiagsUserResetVerbosity=ilomCtrlSPARCDiagsUserResetVerbosity, ilomCtrlLdapSslAlternateServerCertStatus=ilomCtrlLdapSslAlternateServerCertStatus, ilomCtrlActiveDirAdminGroupsEntry=ilomCtrlActiveDirAdminGroupsEntry, ilomCtrlSerialExternalPortBaudRate=ilomCtrlSerialExternalPortBaudRate, ilomCtrlRadiusDefaultRole=ilomCtrlRadiusDefaultRole)
(integer, octet_string, object_identifier) = mibBuilder.importSymbols('ASN1', 'Integer', 'OctetString', 'ObjectIdentifier') (named_values,) = mibBuilder.importSymbols('ASN1-ENUMERATION', 'NamedValues') (single_value_constraint, constraints_union, value_range_constraint, constraints_intersection, value_size_constraint) = mibBuilder.importSymbols('ASN1-REFINEMENT', 'SingleValueConstraint', 'ConstraintsUnion', 'ValueRangeConstraint', 'ConstraintsIntersection', 'ValueSizeConstraint') (snmp_admin_string,) = mibBuilder.importSymbols('SNMP-FRAMEWORK-MIB', 'SnmpAdminString') (object_group, module_compliance, notification_group) = mibBuilder.importSymbols('SNMPv2-CONF', 'ObjectGroup', 'ModuleCompliance', 'NotificationGroup') (object_identity, module_identity, bits, integer32, notification_type, gauge32, counter32, mib_identifier, unsigned32, enterprises, iso, counter64, ip_address, time_ticks, mib_scalar, mib_table, mib_table_row, mib_table_column) = mibBuilder.importSymbols('SNMPv2-SMI', 'ObjectIdentity', 'ModuleIdentity', 'Bits', 'Integer32', 'NotificationType', 'Gauge32', 'Counter32', 'MibIdentifier', 'Unsigned32', 'enterprises', 'iso', 'Counter64', 'IpAddress', 'TimeTicks', 'MibScalar', 'MibTable', 'MibTableRow', 'MibTableColumn') (truth_value, row_status, date_and_time, textual_convention, display_string) = mibBuilder.importSymbols('SNMPv2-TC', 'TruthValue', 'RowStatus', 'DateAndTime', 'TextualConvention', 'DisplayString') sun = mib_identifier((1, 3, 6, 1, 4, 1, 42)) products = mib_identifier((1, 3, 6, 1, 4, 1, 42, 2)) ilom = mib_identifier((1, 3, 6, 1, 4, 1, 42, 2, 175)) ilom_ctrl_mib = module_identity((1, 3, 6, 1, 4, 1, 42, 2, 175, 102)) ilomCtrlMIB.setRevisions(('2010-06-11 00:00', '2010-06-08 00:00', '2009-03-30 00:00', '2009-03-03 00:00', '2008-05-15 00:00', '2008-04-11 00:00', '2007-02-20 00:00', '2006-12-15 00:00', '2005-12-19 00:00')) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): if mibBuilder.loadTexts: ilomCtrlMIB.setRevisionsDescriptions(("Add support for the SPARC diagnostic 'HW change' trigger", 'Add ActiveDirectory parameter ilomCtrlActiveDirStrictCredentialErrorEnabled', 'Add LdapSsl optional User Mapping parameters.', 'Add ActiveDirectory parameter ilomCtrlActiveDirExpSearchEnabled.', "Version 3.0 Released with ILOM version 3.0 Added alert event class/type filtering Added Telemetry Harness Daemon (THD) Added dns-locator objects and certificate params for ActiveDirectory Added ilomCtrlLdapSsl Unify POST knobs for Volume and Enterprise Products Added BackupAndRestore configuration XML file support Added DNS configuration support Added factory to ILOMCtrlResetToDefaultsAction Added 'other' values to several TCs Added ilomCtrlSPARCHostHypervisorVersion Added ilomCtrlSPARCHostSysFwVersion Added ilomCtrlSPARCHostSendBreakAction Added sideband management support", 'Add destinationport for use with trap type alerts. Remove range from ilomCtrlEventLogRecordID.', 'Version 2.0', 'Version: 1.1 Released with ILOM version 1.1.5', 'Version: 0.7 Initial Release')) if mibBuilder.loadTexts: ilomCtrlMIB.setLastUpdated('201006110000Z') if mibBuilder.loadTexts: ilomCtrlMIB.setOrganization('Oracle Corporation') if mibBuilder.loadTexts: ilomCtrlMIB.setContactInfo('Oracle Corporation 500 Oracle Parkway Redwood Shores, CA 95065 U.S.A. http://www.oracle.com') if mibBuilder.loadTexts: ilomCtrlMIB.setDescription('SUN-ILOM-CONTROL-MIB.mib Version 3.0 Copyright (c) 2005, 2010, Oracle and/or its affiliates. All rights reserved. This MIB controls all Sun Integrated Lights Out Management devices.') ilom_ctrl_clients = mib_identifier((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1)) ilom_ctrl_services = mib_identifier((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 2)) ilom_ctrl_network = mib_identifier((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 3)) ilom_ctrl_users = mib_identifier((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 4)) ilom_ctrl_sessions = mib_identifier((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 5)) ilom_ctrl_firmware_mgmt = mib_identifier((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 6)) ilom_ctrl_logs = mib_identifier((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 7)) ilom_ctrl_alerts = mib_identifier((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 8)) ilom_ctrl_clock = mib_identifier((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 9)) ilom_ctrl_serial = mib_identifier((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 10)) ilom_ctrl_power_reset = mib_identifier((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 11)) ilom_ctrl_redundancy = mib_identifier((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 12)) ilom_ctrl_policy = mib_identifier((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 13)) ilom_ctrl_config_mgmt = mib_identifier((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 14)) ilom_ctrl_sparc = mib_identifier((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 15)) ilom_ctrl_identification = mib_identifier((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 16)) ilom_ctrl_thd = mib_identifier((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 17)) ilom_ctrl_conformances = mib_identifier((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 18)) ilom_ctrl_ntp = mib_identifier((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 1)) ilom_ctrl_ldap = mib_identifier((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 2)) ilom_ctrl_radius = mib_identifier((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 3)) ilom_ctrl_remote_syslog = mib_identifier((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 4)) ilom_ctrl_active_directory = mib_identifier((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 5)) ilom_ctrl_smtp = mib_identifier((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 6)) ilom_ctrl_ldap_ssl = mib_identifier((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 7)) ilom_ctrl_dns = mib_identifier((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 8)) ilom_ctrl_http = mib_identifier((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 2, 1)) ilom_ctrl_https = mib_identifier((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 2, 2)) ilom_ctrl_ssh = mib_identifier((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 2, 3)) ilom_ctrl_single_signon = mib_identifier((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 2, 4)) ilom_ctrl_event_log = mib_identifier((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 7, 1)) ilom_ctrl_power_control = mib_identifier((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 11, 1)) ilom_ctrl_reset_control = mib_identifier((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 11, 2)) ilom_ctrl_backup_and_restore = mib_identifier((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 14, 2)) ilom_ctrl_sparc_diags = mib_identifier((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 15, 1)) ilom_ctrl_sparc_host_control = mib_identifier((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 15, 2)) ilom_ctrl_sparc_boot_mode = mib_identifier((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 15, 3)) ilom_ctrl_sparc_key_switch = mib_identifier((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 15, 4)) ilom_ctrl_compliances = mib_identifier((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 18, 1)) ilom_ctrl_groups = mib_identifier((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 18, 2)) class Ilomctrltargetindex(TextualConvention, OctetString): description = 'A string that is short enough to be used properly as an index without overflowing the maximum number of subOIDs.' status = 'current' subtype_spec = OctetString.subtypeSpec + value_size_constraint(0, 110) class Ilomctrlmodtargetindex(TextualConvention, OctetString): description = 'A string that is short enough to be used properly along with ILOMCtrlInstanceTargetIndex as a pair of indexes without overflowing the maximum number of subOIDs.' status = 'current' subtype_spec = OctetString.subtypeSpec + value_size_constraint(0, 12) class Ilomctrlinstancetargetindex(TextualConvention, OctetString): description = 'A string that is short enough to be used properly along with ILOMCtrlModTargetIndex as a pair of indexes without overflowing the maximum number of subOIDs.' status = 'current' subtype_spec = OctetString.subtypeSpec + value_size_constraint(0, 100) class Ilomctrlsessionsconnectiontype(TextualConvention, Integer32): description = 'An enumerated value which describes possible connection types by which a user can be log in.' status = 'current' subtype_spec = Integer32.subtypeSpec + constraints_union(single_value_constraint(1, 2, 3, 4)) named_values = named_values(('shell', 1), ('web', 2), ('other', 3), ('snmp', 4)) class Ilomctrllocaluserusername(TextualConvention, OctetString): description = "A local user username. This must start with an alphabetical letter and may contain alphabetical letters, digits, hyphens and underscores. This can not be 'password'. This can not contain spaces." status = 'current' subtype_spec = OctetString.subtypeSpec + value_size_constraint(4, 16) class Ilomctrllocaluserpassword(TextualConvention, OctetString): description = 'A local user password.' status = 'current' subtype_spec = OctetString.subtypeSpec + value_size_constraint(8, 16) class Ilomctrluserrole(TextualConvention, Integer32): description = 'An enumerated value which describes possible privilege levels (also known as roles) a user can have. ***NOTE: this textual-convention is deprecated and replaced by ILOMCtrlUserRoles.' status = 'deprecated' subtype_spec = Integer32.subtypeSpec + constraints_union(single_value_constraint(1, 2, 3, 4)) named_values = named_values(('administrator', 1), ('operator', 2), ('none', 3), ('other', 4)) class Ilomctrluserroles(TextualConvention, OctetString): description = "A set of role-IDs which describe the possible privilege levels (also known as roles) for a user. This property supports the legacy roles of 'Administrator' or 'Operator', or any of the individual role ID combinations of 'a', 'u', 'c', 'r', 'o' and 's' (like 'aucro') where a-admin, u-user, c-console, r-reset, s-service and o-readOnly." status = 'current' subtype_spec = OctetString.subtypeSpec + value_size_constraint(0, 13) class Ilomctrllocaluserauthclimode(TextualConvention, Integer32): description = "An enumerated value which describes the possible CLI modes. The 'default' mode corresponds to the ILOM DMTF CLP. The 'alom' mode corresponds to the ALOM CMT." status = 'current' subtype_spec = Integer32.subtypeSpec + constraints_union(single_value_constraint(1, 2)) named_values = named_values(('default', 1), ('alom', 2)) class Ilomctrlpoweraction(TextualConvention, Integer32): description = 'An enumerated value which describes possible actions that can applied to a power control target.' status = 'current' subtype_spec = Integer32.subtypeSpec + constraints_union(single_value_constraint(1, 2, 3, 4)) named_values = named_values(('powerOn', 1), ('powerOff', 2), ('powerCycle', 3), ('powerSoft', 4)) class Ilomctrlresetaction(TextualConvention, Integer32): description = 'An enumerated value which describes possible actions that can applied to a reset control target.' status = 'current' subtype_spec = Integer32.subtypeSpec + constraints_union(single_value_constraint(1, 2, 3)) named_values = named_values(('reset', 1), ('resetNonMaskableInterrupt', 2), ('force', 3)) class Ilomctrlnetworkipdiscovery(TextualConvention, Integer32): description = 'An enumerated value which determines whether the IP settings should static or dynamic (DHCP).' status = 'current' subtype_spec = Integer32.subtypeSpec + constraints_union(single_value_constraint(1, 2, 3)) named_values = named_values(('static', 1), ('dynamic', 2), ('other', 3)) class Ilomctrleventlogtype(TextualConvention, Integer32): description = 'An enumerated value which describes the possible event log type.' status = 'current' subtype_spec = Integer32.subtypeSpec + constraints_union(single_value_constraint(1, 2, 3, 4, 5, 6)) named_values = named_values(('log', 1), ('action', 2), ('fault', 3), ('state', 4), ('repair', 5), ('other', 6)) class Ilomctrleventlogclass(TextualConvention, Integer32): description = 'An enumerated value which describes the possible event log class.' status = 'current' subtype_spec = Integer32.subtypeSpec + constraints_union(single_value_constraint(1, 2, 3, 4, 5, 6, 7)) named_values = named_values(('audit', 1), ('ipmi', 2), ('chassis', 3), ('fma', 4), ('system', 5), ('pcm', 6), ('other', 7)) class Ilomctrleventseverity(TextualConvention, Integer32): description = 'An enumerated value which describes the possible event severities.' status = 'current' subtype_spec = Integer32.subtypeSpec + constraints_union(single_value_constraint(1, 2, 3, 4, 5, 6)) named_values = named_values(('disable', 1), ('critical', 2), ('major', 3), ('minor', 4), ('down', 5), ('other', 6)) class Ilomctrlalerttype(TextualConvention, Integer32): description = 'An enumerated value which describes the possible alert notification types.' status = 'current' subtype_spec = Integer32.subtypeSpec + constraints_union(single_value_constraint(1, 2, 3)) named_values = named_values(('email', 1), ('snmptrap', 2), ('ipmipet', 3)) class Ilomctrlalertsnmpversion(TextualConvention, Integer32): description = 'An enumeration of the possible SNMP versions for traps generated by configuring alert rules.' status = 'current' subtype_spec = Integer32.subtypeSpec + constraints_union(single_value_constraint(1, 2, 3)) named_values = named_values(('v1', 1), ('v2c', 2), ('v3', 3)) class Ilomctrlbaudrate(TextualConvention, Integer32): description = 'An enumerated value which describes the possible baud rates for serial ports.' status = 'current' subtype_spec = Integer32.subtypeSpec + constraints_union(single_value_constraint(1, 2, 3, 4, 5)) named_values = named_values(('baud9600', 1), ('baud19200', 2), ('baud38400', 3), ('baud57600', 4), ('baud115200', 5)) class Ilomctrlflowcontrol(TextualConvention, Integer32): description = 'An enumerated value which describes the possible flowcontrol settings for serial ports.' status = 'current' subtype_spec = Integer32.subtypeSpec + constraints_union(single_value_constraint(1, 2, 3, 4)) named_values = named_values(('unknown', 1), ('hardware', 2), ('software', 3), ('none', 4)) class Ilomctrlfirmwareupdatestatus(TextualConvention, Integer32): description = 'An enumerated value which contains all the possible status values during a firmware update.' status = 'current' subtype_spec = Integer32.subtypeSpec + constraints_union(single_value_constraint(1, 2, 3, 4, 5)) named_values = named_values(('tftpError', 1), ('imageVerificationFailed', 2), ('inProgress', 3), ('success', 4), ('other', 5)) class Ilomctrlfirmwareupdateaction(TextualConvention, Integer32): description = 'An enumerated value which contains all the possible firmware management actions.' status = 'current' subtype_spec = Integer32.subtypeSpec + constraints_union(single_value_constraint(1, 2)) named_values = named_values(('clearProperties', 1), ('initiate', 2)) class Ilomctrlresettodefaultsaction(TextualConvention, Integer32): description = 'An enumerated value indicating possible actions for resetting the SP back to factory defaults.' status = 'current' subtype_spec = Integer32.subtypeSpec + constraints_union(single_value_constraint(1, 2, 3)) named_values = named_values(('none', 1), ('all', 2), ('factory', 3)) class Ilomctrlredundancystatus(TextualConvention, Integer32): description = 'An enumerated value which contains all the possible states a device can have in a redundant configuration.' status = 'current' subtype_spec = Integer32.subtypeSpec + constraints_union(single_value_constraint(1, 2, 3, 4, 5)) named_values = named_values(('initializing', 1), ('active', 2), ('standby', 3), ('standAlone', 4), ('other', 5)) class Ilomctrlredundancyaction(TextualConvention, Integer32): description = 'Setting the redundancy action to initiateFailover will cause the current SC to switch mastership. i.e., it will initiate actions to become master if it is standby or to become standby if it is master. No action is taken if the SC is initializing or running in standalone mode.' status = 'current' subtype_spec = Integer32.subtypeSpec + constraints_union(single_value_constraint(1, 2)) named_values = named_values(('ready', 1), ('initiateFailover', 2)) class Ilomctrlsparcdiagslevel(TextualConvention, Integer32): description = "An enumerated value which contains all the possible states for embedded diagnostics for the host. The min value is the same as the 'enabled' value on some platforms and the max value is the same as the 'extended' value. ***NOTE: this textual-convention is deprecated and replaced with ILOMCtrlSPARCDiagsLevelAdv." status = 'deprecated' subtype_spec = Integer32.subtypeSpec + constraints_union(single_value_constraint(1, 2, 3)) named_values = named_values(('min', 1), ('max', 2), ('advsettings', 3)) class Ilomctrlsparcdiagsleveladv(TextualConvention, Integer32): description = "An enumerated value which contains all the possible states for embedded diagnostics for the host. The min value is the same as the 'enabled' value on some platforms and the max value is the same as the 'extended' value." status = 'current' subtype_spec = Integer32.subtypeSpec + constraints_union(single_value_constraint(1, 2, 3, 4, 5)) named_values = named_values(('init', 1), ('minimum', 2), ('normal', 3), ('maximum', 4), ('other', 5)) class Ilomctrlsparcdiagstrigger(TextualConvention, Integer32): description = "An enumerated value which contains all the possible states for the trigger for embedded diagnostics on the host. x64 platforms with embedded diagnostics only support 'all-resets' and 'none' as possible states." status = 'current' subtype_spec = Integer32.subtypeSpec + constraints_union(single_value_constraint(1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11)) named_values = named_values(('allResets', 1), ('none', 2), ('userReset', 3), ('powerOnReset', 4), ('errorTest', 5), ('userResetandpowerOnReset', 6), ('userResetanderrorTest', 7), ('userTestandpowerOnReset', 8), ('hwChange', 9), ('hwChangeandpowerOnReset', 10), ('hwChangeanderrorTest', 11)) class Ilomctrlsparcdiagsmode(TextualConvention, Integer32): description = 'An enumerated value which contains all the possible OPS modes specified to POST.' status = 'current' subtype_spec = Integer32.subtypeSpec + constraints_union(single_value_constraint(1, 2, 3, 4)) named_values = named_values(('off', 1), ('normal', 2), ('service', 3), ('unknown', 4)) class Ilomctrlsparcdiagsverbosity(TextualConvention, Integer32): description = 'An enumerated value which contains all the possible states for the verbosity level for embedded diagnostics on the host. ***NOTE: this textual-convention is deprecated and replaced with ILOMCtrlSPARCDiagsVerbosityAdv.' status = 'deprecated' subtype_spec = Integer32.subtypeSpec + constraints_union(single_value_constraint(1, 2, 3)) named_values = named_values(('min', 1), ('max', 2), ('advsettings', 3)) class Ilomctrlsparcdiagsverbosityadv(TextualConvention, Integer32): description = 'An enumerated value which contains all the possible states for the verbosity level for embedded diagnostics on the host.' status = 'current' subtype_spec = Integer32.subtypeSpec + constraints_union(single_value_constraint(1, 2, 3, 4, 5)) named_values = named_values(('none', 1), ('minimum', 2), ('normal', 3), ('maximum', 4), ('debug', 5)) class Ilomctrlsparchostautorestartpolicy(TextualConvention, Integer32): description = 'An enumerated value which contains all the possible actions to perform when the SP determines that the host has hung.' status = 'current' subtype_spec = Integer32.subtypeSpec + constraints_union(single_value_constraint(1, 2, 3)) named_values = named_values(('none', 1), ('reset', 2), ('dumpcore', 3)) class Ilomctrlsparchostbootrestart(TextualConvention, Integer32): description = 'An enumerated value which contains all the possible actions to perform when the boot timer expires.' status = 'current' subtype_spec = Integer32.subtypeSpec + constraints_union(single_value_constraint(1, 2)) named_values = named_values(('none', 1), ('reset', 2)) class Ilomctrlsparchostbootfailrecovery(TextualConvention, Integer32): description = 'An enumerated value which contains all the possible actions to perform when the max boot failures allowed is reached.' status = 'current' subtype_spec = Integer32.subtypeSpec + constraints_union(single_value_constraint(1, 2, 3)) named_values = named_values(('none', 1), ('powercycle', 2), ('poweroff', 3)) class Ilomctrlsparchostsendbreakaction(TextualConvention, Integer32): description = 'Send Break Action to Host.' status = 'current' subtype_spec = Integer32.subtypeSpec + constraints_union(single_value_constraint(1, 2, 3)) named_values = named_values(('nop', 1), ('break', 2), ('dumpcore', 3)) class Ilomctrlsparchostioreconfigurepolicy(TextualConvention, Integer32): description = 'An enumerated value which contains all the possible states for the host IO reconfiguration policy that is applied at next host power-on.' status = 'current' subtype_spec = Integer32.subtypeSpec + constraints_union(single_value_constraint(1, 2, 3)) named_values = named_values(('false', 1), ('nextboot', 2), ('true', 3)) class Ilomctrlsparcbootmodestate(TextualConvention, Integer32): description = 'An enumerated value which contains all the possible states for the boot mode state.' status = 'current' subtype_spec = Integer32.subtypeSpec + constraints_union(single_value_constraint(1, 2)) named_values = named_values(('normal', 1), ('resetNvram', 2)) class Ilomctrlsparckeyswitchstate(TextualConvention, Integer32): description = 'An enumerated value which contains all the possible states for the key switch.' status = 'current' subtype_spec = Integer32.subtypeSpec + constraints_union(single_value_constraint(1, 2, 3, 4)) named_values = named_values(('normal', 1), ('standby', 2), ('diag', 3), ('locked', 4)) class Ilomctrlsparcdiagsaction(TextualConvention, Integer32): description = 'An action to take to control POST running on the host.' status = 'current' subtype_spec = Integer32.subtypeSpec + constraints_union(single_value_constraint(1, 2)) named_values = named_values(('stop', 1), ('start', 2)) class Ilomctrlsshkeygentype(TextualConvention, Integer32): description = 'An enumerated value which contains all the possible key types for ssh.' status = 'current' subtype_spec = Integer32.subtypeSpec + constraints_union(single_value_constraint(1, 2, 3)) named_values = named_values(('none', 1), ('rsa', 2), ('dsa', 3)) class Ilomctrlthdaction(TextualConvention, Integer32): description = 'An enumerated value which contains all the possible control actions for a THD module.' status = 'current' subtype_spec = Integer32.subtypeSpec + constraints_union(single_value_constraint(1, 2, 3)) named_values = named_values(('suspend', 1), ('resume', 2), ('nop', 3)) class Ilomctrlbackupandrestoreaction(TextualConvention, Integer32): description = 'An action to start Backup or Restore operation.' status = 'current' subtype_spec = Integer32.subtypeSpec + constraints_union(single_value_constraint(1, 2)) named_values = named_values(('backup', 1), ('restore', 2)) ilom_ctrl_device_ntp_server_one_ip = mib_scalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 1, 1), ip_address()).setMaxAccess('readwrite') if mibBuilder.loadTexts: ilomCtrlDeviceNTPServerOneIP.setStatus('current') if mibBuilder.loadTexts: ilomCtrlDeviceNTPServerOneIP.setDescription('The IP address of the first NTP server used by the device. This property is ignored if NTP is not enabled.') ilom_ctrl_device_ntp_server_two_ip = mib_scalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 1, 2), ip_address()).setMaxAccess('readwrite') if mibBuilder.loadTexts: ilomCtrlDeviceNTPServerTwoIP.setStatus('current') if mibBuilder.loadTexts: ilomCtrlDeviceNTPServerTwoIP.setDescription('The IP address of the second NTP server used by the device. This property is ignored if NTP is not enabled.') ilom_ctrl_ldap_enabled = mib_scalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 2, 1), truth_value()).setMaxAccess('readwrite') if mibBuilder.loadTexts: ilomCtrlLdapEnabled.setStatus('current') if mibBuilder.loadTexts: ilomCtrlLdapEnabled.setDescription('Specifies whether or not the LDAP client is enabled.') ilom_ctrl_ldap_server_ip = mib_scalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 2, 2), ip_address()).setMaxAccess('readwrite') if mibBuilder.loadTexts: ilomCtrlLdapServerIP.setStatus('current') if mibBuilder.loadTexts: ilomCtrlLdapServerIP.setDescription('The IP address of the LDAP server used as a name service for user accounts.') ilom_ctrl_ldap_port_number = mib_scalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 2, 3), integer32().subtype(subtypeSpec=value_range_constraint(0, 65535))).setMaxAccess('readwrite') if mibBuilder.loadTexts: ilomCtrlLdapPortNumber.setStatus('current') if mibBuilder.loadTexts: ilomCtrlLdapPortNumber.setDescription('Specifies the port number for the LDAP client.') ilom_ctrl_ldap_bind_dn = mib_scalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 2, 4), snmp_admin_string()).setMaxAccess('readwrite') if mibBuilder.loadTexts: ilomCtrlLdapBindDn.setStatus('current') if mibBuilder.loadTexts: ilomCtrlLdapBindDn.setDescription('The distinguished name (DN) for the read-only proxy user used to bind to the LDAP server. Example: cn=proxyuser,ou=people,dc=sun,dc=com') ilom_ctrl_ldap_bind_password = mib_scalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 2, 5), snmp_admin_string()).setMaxAccess('readwrite') if mibBuilder.loadTexts: ilomCtrlLdapBindPassword.setStatus('current') if mibBuilder.loadTexts: ilomCtrlLdapBindPassword.setDescription('The password of a read-only proxy user which is used to bind to the LDAP server. This property is essentially write-only. The write-only access level is no longer supported as of SNMPv2. This property must return a null value when read.') ilom_ctrl_ldap_search_base = mib_scalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 2, 6), snmp_admin_string()).setMaxAccess('readwrite') if mibBuilder.loadTexts: ilomCtrlLdapSearchBase.setStatus('current') if mibBuilder.loadTexts: ilomCtrlLdapSearchBase.setDescription('A search base in the LDAP database below which to find users. Example: ou=people,dc=sun,dc=com') ilom_ctrl_ldap_default_role = mib_scalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 2, 7), ilom_ctrl_user_role()).setMaxAccess('readwrite') if mibBuilder.loadTexts: ilomCtrlLdapDefaultRole.setStatus('deprecated') if mibBuilder.loadTexts: ilomCtrlLdapDefaultRole.setDescription('Specifies the role that a user authenticated via LDAP should have. ***NOTE: this object is deprecated and replaced by ilomCtrlLdapDefaultRoles.') ilom_ctrl_ldap_default_roles = mib_scalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 2, 8), ilom_ctrl_user_roles()).setMaxAccess('readwrite') if mibBuilder.loadTexts: ilomCtrlLdapDefaultRoles.setStatus('current') if mibBuilder.loadTexts: ilomCtrlLdapDefaultRoles.setDescription("Specifies the role that a user authenticated via LDAP should have. This property supports the legacy roles of 'Administrator' or 'Operator', or any of the individual role ID combinations of 'a', 'u', 'c', 'r', 'o' and 's' (like 'aucro') where a-admin, u-user, c-console, r-reset, s-service and o-readOnly.") ilom_ctrl_radius_enabled = mib_scalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 3, 1), truth_value()).setMaxAccess('readwrite') if mibBuilder.loadTexts: ilomCtrlRadiusEnabled.setStatus('current') if mibBuilder.loadTexts: ilomCtrlRadiusEnabled.setDescription('Specifies whether or not the RADIUS client is enabled.') ilom_ctrl_radius_server_ip = mib_scalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 3, 2), ip_address()).setMaxAccess('readwrite') if mibBuilder.loadTexts: ilomCtrlRadiusServerIP.setStatus('current') if mibBuilder.loadTexts: ilomCtrlRadiusServerIP.setDescription('The IP address of the RADIUS server used as a name service for user accounts.') ilom_ctrl_radius_port_number = mib_scalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 3, 3), integer32().subtype(subtypeSpec=value_range_constraint(0, 65535))).setMaxAccess('readwrite') if mibBuilder.loadTexts: ilomCtrlRadiusPortNumber.setStatus('current') if mibBuilder.loadTexts: ilomCtrlRadiusPortNumber.setDescription('Specifies the port number for the RADIUS client.') ilom_ctrl_radius_secret = mib_scalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 3, 4), snmp_admin_string()).setMaxAccess('readwrite') if mibBuilder.loadTexts: ilomCtrlRadiusSecret.setStatus('current') if mibBuilder.loadTexts: ilomCtrlRadiusSecret.setDescription('The shared secret encryption key that is used to encypt traffic between the RADIUS client and server.') ilom_ctrl_radius_default_role = mib_scalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 3, 5), ilom_ctrl_user_role()).setMaxAccess('readwrite') if mibBuilder.loadTexts: ilomCtrlRadiusDefaultRole.setStatus('deprecated') if mibBuilder.loadTexts: ilomCtrlRadiusDefaultRole.setDescription('Specifies the role that a user authenticated via RADIUS should have. ***NOTE: this object is deprecated and replaced by ILOMCtrlUserRoles.') ilom_ctrl_radius_default_roles = mib_scalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 3, 6), ilom_ctrl_user_roles()).setMaxAccess('readwrite') if mibBuilder.loadTexts: ilomCtrlRadiusDefaultRoles.setStatus('current') if mibBuilder.loadTexts: ilomCtrlRadiusDefaultRoles.setDescription("Specifies the role that a user authenticated via RADIUS should have. This property supports the legacy roles of 'Administrator' or 'Operator', or any of the individual role ID combinations of 'a', 'u', 'c', 'r', 'o' and 's' (like 'aucro') where a-admin, u-user, c-console, r-reset, s-service and o-readOnly.") ilom_ctrl_remote_syslog_dest1 = mib_scalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 4, 1), ip_address()).setMaxAccess('readwrite') if mibBuilder.loadTexts: ilomCtrlRemoteSyslogDest1.setStatus('current') if mibBuilder.loadTexts: ilomCtrlRemoteSyslogDest1.setDescription('The IP address of the first remote syslog destination (log host).') ilom_ctrl_remote_syslog_dest2 = mib_scalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 4, 2), ip_address()).setMaxAccess('readwrite') if mibBuilder.loadTexts: ilomCtrlRemoteSyslogDest2.setStatus('current') if mibBuilder.loadTexts: ilomCtrlRemoteSyslogDest2.setDescription('The IP address of the second remote syslog destination (log host).') ilom_ctrl_http_enabled = mib_scalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 2, 1, 1), truth_value()).setMaxAccess('readwrite') if mibBuilder.loadTexts: ilomCtrlHttpEnabled.setStatus('current') if mibBuilder.loadTexts: ilomCtrlHttpEnabled.setDescription('Specifies whether or not the embedded web server should be running and listening on the HTTP port.') ilom_ctrl_http_port_number = mib_scalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 2, 1, 2), integer32().subtype(subtypeSpec=value_range_constraint(0, 65535))).setMaxAccess('readwrite') if mibBuilder.loadTexts: ilomCtrlHttpPortNumber.setStatus('current') if mibBuilder.loadTexts: ilomCtrlHttpPortNumber.setDescription('Specifies the port number that the embedded web server should listen to for HTTP requests.') ilom_ctrl_http_secure_redirect = mib_scalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 2, 1, 3), truth_value()).setMaxAccess('readwrite') if mibBuilder.loadTexts: ilomCtrlHttpSecureRedirect.setStatus('current') if mibBuilder.loadTexts: ilomCtrlHttpSecureRedirect.setDescription('Specifies whether or not the embedded web server should redirect HTTP connections to HTTPS.') ilom_ctrl_https_enabled = mib_scalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 2, 2, 1), truth_value()).setMaxAccess('readwrite') if mibBuilder.loadTexts: ilomCtrlHttpsEnabled.setStatus('current') if mibBuilder.loadTexts: ilomCtrlHttpsEnabled.setDescription('Specifies whether or not the embedded web server should be running and listening on the HTTPS port.') ilom_ctrl_https_port_number = mib_scalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 2, 2, 2), integer32().subtype(subtypeSpec=value_range_constraint(0, 65535))).setMaxAccess('readwrite') if mibBuilder.loadTexts: ilomCtrlHttpsPortNumber.setStatus('current') if mibBuilder.loadTexts: ilomCtrlHttpsPortNumber.setDescription('Specifies the port number that the embedded web server should listen to for HTTPS requests.') ilom_ctrl_ssh_rsa_key_fingerprint = mib_scalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 2, 3, 1), snmp_admin_string()).setMaxAccess('readonly') if mibBuilder.loadTexts: ilomCtrlSshRsaKeyFingerprint.setStatus('current') if mibBuilder.loadTexts: ilomCtrlSshRsaKeyFingerprint.setDescription('The fingerprint of the RSA key used for the SSH protocol.') ilom_ctrl_ssh_rsa_key_length = mib_scalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 2, 3, 2), integer32().subtype(subtypeSpec=value_range_constraint(0, 65535))).setMaxAccess('readonly') if mibBuilder.loadTexts: ilomCtrlSshRsaKeyLength.setStatus('current') if mibBuilder.loadTexts: ilomCtrlSshRsaKeyLength.setDescription('The length of the RSA key used for the SSH protocol.') ilom_ctrl_ssh_dsa_key_fingerprint = mib_scalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 2, 3, 3), snmp_admin_string()).setMaxAccess('readonly') if mibBuilder.loadTexts: ilomCtrlSshDsaKeyFingerprint.setStatus('current') if mibBuilder.loadTexts: ilomCtrlSshDsaKeyFingerprint.setDescription('The fingerprint of the DSA key used for the SSH protocol.') ilom_ctrl_ssh_dsa_key_length = mib_scalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 2, 3, 4), integer32().subtype(subtypeSpec=value_range_constraint(0, 65535))).setMaxAccess('readonly') if mibBuilder.loadTexts: ilomCtrlSshDsaKeyLength.setStatus('current') if mibBuilder.loadTexts: ilomCtrlSshDsaKeyLength.setDescription('The length of the DSA key used for the SSH protocol.') ilom_ctrl_ssh_generate_new_key_action = mib_scalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 2, 3, 5), truth_value()).setMaxAccess('readwrite') if mibBuilder.loadTexts: ilomCtrlSshGenerateNewKeyAction.setStatus('current') if mibBuilder.loadTexts: ilomCtrlSshGenerateNewKeyAction.setDescription('This property is used to initiate a new public key generation.') ilom_ctrl_ssh_generate_new_key_type = mib_scalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 2, 3, 6), ilom_ctrl_ssh_key_gen_type()).setMaxAccess('readwrite') if mibBuilder.loadTexts: ilomCtrlSshGenerateNewKeyType.setStatus('current') if mibBuilder.loadTexts: ilomCtrlSshGenerateNewKeyType.setDescription('SSH new key type. The possible type are rsa(2), dsa(3).') ilom_ctrl_ssh_restart_sshd_action = mib_scalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 2, 3, 7), truth_value()).setMaxAccess('readwrite') if mibBuilder.loadTexts: ilomCtrlSshRestartSshdAction.setStatus('current') if mibBuilder.loadTexts: ilomCtrlSshRestartSshdAction.setDescription('This property is used to initiate sshd restart.') ilom_ctrl_ssh_enabled = mib_scalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 2, 3, 8), truth_value()).setMaxAccess('readwrite') if mibBuilder.loadTexts: ilomCtrlSshEnabled.setStatus('current') if mibBuilder.loadTexts: ilomCtrlSshEnabled.setDescription('Speicfies whether or not the SSHD is enabled.') ilom_ctrl_single_signon_enabled = mib_scalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 2, 4, 1), truth_value()).setMaxAccess('readwrite') if mibBuilder.loadTexts: ilomCtrlSingleSignonEnabled.setStatus('current') if mibBuilder.loadTexts: ilomCtrlSingleSignonEnabled.setDescription('Specified whether single sign-on authentication should be enabled on the device. Single sign-on allows tokens to be passed around so that it is not necessary to re-enter passwords between different applications. This would allow single sign-on between the SC web interface and the SP web interface, between the SC command-line interface and the SP command-line interface, and between the SC and SP interfaces and the Java Remote Console application.') ilom_ctrl_network_table = mib_table((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 3, 1)) if mibBuilder.loadTexts: ilomCtrlNetworkTable.setStatus('current') if mibBuilder.loadTexts: ilomCtrlNetworkTable.setDescription('A table listing all targets whose networks can be controlled.') ilom_ctrl_network_entry = mib_table_row((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 3, 1, 1)).setIndexNames((0, 'SUN-ILOM-CONTROL-MIB', 'ilomCtrlNetworkTarget')) if mibBuilder.loadTexts: ilomCtrlNetworkEntry.setStatus('current') if mibBuilder.loadTexts: ilomCtrlNetworkEntry.setDescription('An entry for a target which can be reset.') ilom_ctrl_network_target = mib_table_column((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 3, 1, 1, 1), snmp_admin_string()) if mibBuilder.loadTexts: ilomCtrlNetworkTarget.setStatus('current') if mibBuilder.loadTexts: ilomCtrlNetworkTarget.setDescription("This is the nomenclature name for a target which has a configurable network. On some systems, there are multiple targets which have networks. On a traditional, non-blade system, this table will contain only one row for the network configuration of the service processor, which has a nomenclature name of '/SP'. On blade systems, this table will contain multiple rows. There will be a row for '/SC' which allows for configuration of the system controller's network settings. In addition, there will be rows for each blade's service processor. For example, a blade's service processor nomenclature takes the form of '/CH/BL0/SP', '/CH/BL1/SP' and so on. This will allow for the configuration of the service processors from the system controller. In the case of redundant system controllers, the floating master IP addressed can be configured using a name of /MASTERSC.") ilom_ctrl_network_mac_address = mib_table_column((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 3, 1, 1, 2), snmp_admin_string()).setMaxAccess('readonly') if mibBuilder.loadTexts: ilomCtrlNetworkMacAddress.setStatus('current') if mibBuilder.loadTexts: ilomCtrlNetworkMacAddress.setDescription('Specifies the MAC address of the service processor or system controller.') ilom_ctrl_network_ip_discovery = mib_table_column((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 3, 1, 1, 3), ilom_ctrl_network_ip_discovery()).setMaxAccess('readonly') if mibBuilder.loadTexts: ilomCtrlNetworkIpDiscovery.setStatus('current') if mibBuilder.loadTexts: ilomCtrlNetworkIpDiscovery.setDescription('Specifies whether the current target is configured to have static IP settings or whether these settings are retrieved dynamically from DHCP.') ilom_ctrl_network_ip_address = mib_table_column((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 3, 1, 1, 4), ip_address()).setMaxAccess('readonly') if mibBuilder.loadTexts: ilomCtrlNetworkIpAddress.setStatus('current') if mibBuilder.loadTexts: ilomCtrlNetworkIpAddress.setDescription('Indicates the current IP address for the given target.') ilom_ctrl_network_ip_gateway = mib_table_column((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 3, 1, 1, 5), ip_address()).setMaxAccess('readonly') if mibBuilder.loadTexts: ilomCtrlNetworkIpGateway.setStatus('current') if mibBuilder.loadTexts: ilomCtrlNetworkIpGateway.setDescription('Indicates the current IP gateway for the given target.') ilom_ctrl_network_ip_netmask = mib_table_column((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 3, 1, 1, 6), ip_address()).setMaxAccess('readonly') if mibBuilder.loadTexts: ilomCtrlNetworkIpNetmask.setStatus('current') if mibBuilder.loadTexts: ilomCtrlNetworkIpNetmask.setDescription('Indicates the current IP netmask for the given target.') ilom_ctrl_network_pending_ip_discovery = mib_table_column((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 3, 1, 1, 7), ilom_ctrl_network_ip_discovery()).setMaxAccess('readwrite') if mibBuilder.loadTexts: ilomCtrlNetworkPendingIpDiscovery.setStatus('current') if mibBuilder.loadTexts: ilomCtrlNetworkPendingIpDiscovery.setDescription('This property is used to set the pending value for the mode of IP discovery for the given target. The possible values are static(1) or dynamic(2). Static values can be specified by setting the other pending properties in this table: ilomCtrlNetworkPendingIpAddress, ilomCtrlNetworkPendingIpGateway, and ilomCtrlNetworkPendingIpNetmask. If dynamic is specified, the other pending properties should not be set. This property does not take effect until the ilomCtrlNetworkCommitPending property is set to true for the given row.') ilom_ctrl_network_pending_ip_address = mib_table_column((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 3, 1, 1, 8), ip_address()).setMaxAccess('readwrite') if mibBuilder.loadTexts: ilomCtrlNetworkPendingIpAddress.setStatus('current') if mibBuilder.loadTexts: ilomCtrlNetworkPendingIpAddress.setDescription('This property is used to set the pending IP address for the given target. This property does not take effect until the ilomCtrlNetworkCommitPending property is set to true for the given row.') ilom_ctrl_network_pending_ip_gateway = mib_table_column((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 3, 1, 1, 9), ip_address()).setMaxAccess('readwrite') if mibBuilder.loadTexts: ilomCtrlNetworkPendingIpGateway.setStatus('current') if mibBuilder.loadTexts: ilomCtrlNetworkPendingIpGateway.setDescription('This property is used to set the pending IP gateway for the given target. This property does not take effect until the ilomCtrlNetworkCommitPending property is set to true for the given row.') ilom_ctrl_network_pending_ip_netmask = mib_table_column((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 3, 1, 1, 10), ip_address()).setMaxAccess('readwrite') if mibBuilder.loadTexts: ilomCtrlNetworkPendingIpNetmask.setStatus('current') if mibBuilder.loadTexts: ilomCtrlNetworkPendingIpNetmask.setDescription('This property is used to set the pending IP netmask for the given target. This property does not take effect until the ilomCtrlNetworkCommitPending property is set to true for the given row.') ilom_ctrl_network_commit_pending = mib_table_column((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 3, 1, 1, 11), truth_value()).setMaxAccess('readwrite') if mibBuilder.loadTexts: ilomCtrlNetworkCommitPending.setStatus('current') if mibBuilder.loadTexts: ilomCtrlNetworkCommitPending.setDescription('This property is used to commit pending properties for the given row. Settings this property to true(1) will cause the network to be reconfigured according to the values specified in the other pending properties.') ilom_ctrl_network_out_of_band_mac_address = mib_table_column((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 3, 1, 1, 12), snmp_admin_string()).setMaxAccess('readonly') if mibBuilder.loadTexts: ilomCtrlNetworkOutOfBandMacAddress.setStatus('current') if mibBuilder.loadTexts: ilomCtrlNetworkOutOfBandMacAddress.setDescription('Specifies the MAC address of the out of band management interface (where applicable)') ilom_ctrl_network_sideband_mac_address = mib_table_column((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 3, 1, 1, 13), snmp_admin_string()).setMaxAccess('readonly') if mibBuilder.loadTexts: ilomCtrlNetworkSidebandMacAddress.setStatus('current') if mibBuilder.loadTexts: ilomCtrlNetworkSidebandMacAddress.setDescription('Specifies the MAC address of the sideband management interface (where applicable)') ilom_ctrl_network_pending_management_port = mib_table_column((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 3, 1, 1, 14), snmp_admin_string()).setMaxAccess('readwrite') if mibBuilder.loadTexts: ilomCtrlNetworkPendingManagementPort.setStatus('current') if mibBuilder.loadTexts: ilomCtrlNetworkPendingManagementPort.setDescription('This property is used to set the pending management port for the giventarget. This property does not take effect until the ilomCtrlNetworkCommitPending property is set to true for the given row.') ilom_ctrl_network_management_port = mib_table_column((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 3, 1, 1, 15), snmp_admin_string()).setMaxAccess('readwrite') if mibBuilder.loadTexts: ilomCtrlNetworkManagementPort.setStatus('current') if mibBuilder.loadTexts: ilomCtrlNetworkManagementPort.setDescription('Indicates the current managment port for the given target') ilom_ctrl_network_dhcp_server_addr = mib_table_column((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 3, 1, 1, 16), ip_address()).setMaxAccess('readonly') if mibBuilder.loadTexts: ilomCtrlNetworkDHCPServerAddr.setStatus('current') if mibBuilder.loadTexts: ilomCtrlNetworkDHCPServerAddr.setDescription('The address of the DHCP server for this row.') ilom_ctrl_network_state = mib_table_column((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 3, 1, 1, 17), truth_value()).setMaxAccess('readwrite') if mibBuilder.loadTexts: ilomCtrlNetworkState.setStatus('current') if mibBuilder.loadTexts: ilomCtrlNetworkState.setDescription('Specifies whether or not the row is enabled.') ilom_ctrl_local_user_auth_table = mib_table((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 4, 1)) if mibBuilder.loadTexts: ilomCtrlLocalUserAuthTable.setStatus('deprecated') if mibBuilder.loadTexts: ilomCtrlLocalUserAuthTable.setDescription('This table provides a listing of the current local users on a system along with their password state. ***NOTE: this table is deprecated and replaced with ilomCtrlLocalUserTable.') ilom_ctrl_local_user_auth_entry = mib_table_row((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 4, 1, 1)).setIndexNames((0, 'SUN-ILOM-CONTROL-MIB', 'ilomCtrlLocalUserAuthUsername')) if mibBuilder.loadTexts: ilomCtrlLocalUserAuthEntry.setStatus('deprecated') if mibBuilder.loadTexts: ilomCtrlLocalUserAuthEntry.setDescription('An entry containing objects for a local user in the database. ***NOTE: this object is deprecated and replaced with ilomCtrlLocalUserEntry.') ilom_ctrl_local_user_auth_username = mib_table_column((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 4, 1, 1, 1), snmp_admin_string()) if mibBuilder.loadTexts: ilomCtrlLocalUserAuthUsername.setStatus('deprecated') if mibBuilder.loadTexts: ilomCtrlLocalUserAuthUsername.setDescription('The username of a local user on the device. ***NOTE: this object is deprecated and replaced with ilomCtrlLocalUserUsername.') ilom_ctrl_local_user_auth_password = mib_table_column((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 4, 1, 1, 2), snmp_admin_string()).setMaxAccess('readcreate') if mibBuilder.loadTexts: ilomCtrlLocalUserAuthPassword.setStatus('deprecated') if mibBuilder.loadTexts: ilomCtrlLocalUserAuthPassword.setDescription('The password of a local user on the device. This property is essentially write-only. The write-only access level is no longer supported as of SNMPv2. This property must return a null value when read. ***NOTE: this object is deprecated and replaced with ilomCtrlLocalUserPassword.') ilom_ctrl_local_user_auth_role = mib_table_column((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 4, 1, 1, 3), ilom_ctrl_user_role()).setMaxAccess('readwrite') if mibBuilder.loadTexts: ilomCtrlLocalUserAuthRole.setStatus('deprecated') if mibBuilder.loadTexts: ilomCtrlLocalUserAuthRole.setDescription("Specifies whether a user's password is assigned or unassigned. ***NOTE: this object is deprecated and replaced with ilomCtrlLocalUserRoles.") ilom_ctrl_local_user_auth_row_status = mib_table_column((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 4, 1, 1, 4), row_status()).setMaxAccess('readcreate') if mibBuilder.loadTexts: ilomCtrlLocalUserAuthRowStatus.setStatus('deprecated') if mibBuilder.loadTexts: ilomCtrlLocalUserAuthRowStatus.setDescription('This object is used to create a new row or to delete an existing row in the table. This property can be set to either createAndWait(5) or destroy(6), to create and remove a user respectively. ***NOTE: this object is deprecated and replaced with ilomCtrlLocalUserRowStatus.') ilom_ctrl_local_user_auth_cli_mode = mib_table_column((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 4, 1, 1, 5), ilom_ctrl_local_user_auth_cli_mode()).setMaxAccess('readwrite') if mibBuilder.loadTexts: ilomCtrlLocalUserAuthCLIMode.setStatus('deprecated') if mibBuilder.loadTexts: ilomCtrlLocalUserAuthCLIMode.setDescription("Allows the CLI mode to be configured on a per-user basis. The CLI mode determines which shell the user will interact with. If the 'default' mode is select, the user will see the DMTF CLP after logging in via ssh or the console. If the 'alom' mode is selected, the user will see the ALOM CMT shell after logging in via ssh or the console. ***NOTE: this object is deprecated and replaced with ilomCtrlLocalUserCLIMode.") ilom_ctrl_local_user_table = mib_table((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 4, 2)) if mibBuilder.loadTexts: ilomCtrlLocalUserTable.setStatus('current') if mibBuilder.loadTexts: ilomCtrlLocalUserTable.setDescription('This table provides a listing of the current local users on a system along with their password state.') ilom_ctrl_local_user_entry = mib_table_row((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 4, 2, 1)).setIndexNames((0, 'SUN-ILOM-CONTROL-MIB', 'ilomCtrlLocalUserUsername')) if mibBuilder.loadTexts: ilomCtrlLocalUserEntry.setStatus('current') if mibBuilder.loadTexts: ilomCtrlLocalUserEntry.setDescription('An entry containing objects for a local user in the database.') ilom_ctrl_local_user_username = mib_table_column((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 4, 2, 1, 1), ilom_ctrl_local_user_username()) if mibBuilder.loadTexts: ilomCtrlLocalUserUsername.setStatus('current') if mibBuilder.loadTexts: ilomCtrlLocalUserUsername.setDescription('The username of a local user on the device.') ilom_ctrl_local_user_password = mib_table_column((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 4, 2, 1, 2), ilom_ctrl_local_user_password()).setMaxAccess('readcreate') if mibBuilder.loadTexts: ilomCtrlLocalUserPassword.setStatus('current') if mibBuilder.loadTexts: ilomCtrlLocalUserPassword.setDescription('The password of a local user on the device. This property is essentially write-only. The write-only access level is no longer supported as of SNMPv2. This property must return a null value when read.') ilom_ctrl_local_user_roles = mib_table_column((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 4, 2, 1, 3), ilom_ctrl_user_roles()).setMaxAccess('readwrite') if mibBuilder.loadTexts: ilomCtrlLocalUserRoles.setStatus('current') if mibBuilder.loadTexts: ilomCtrlLocalUserRoles.setDescription("Specifies the role that is associated with a user. The roles can be assigned for the legacy roles of 'Administrator' or 'Operator', or any of the individual role IDs of 'a', 'u', 'c', 'r', 'o' and 's'. The role IDs can be joined together 'aucros' where a-admin, u-user, c-console, r-reset, s-service and o-readOnly.") ilom_ctrl_local_user_row_status = mib_table_column((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 4, 2, 1, 4), row_status()).setMaxAccess('readcreate') if mibBuilder.loadTexts: ilomCtrlLocalUserRowStatus.setStatus('current') if mibBuilder.loadTexts: ilomCtrlLocalUserRowStatus.setDescription('This object is used to create a new row or to delete an existing row in the table. This property can be set to either createAndWait(5) or destroy(6), to create and remove a user respectively.') ilom_ctrl_local_user_cli_mode = mib_table_column((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 4, 2, 1, 5), ilom_ctrl_local_user_auth_cli_mode()).setMaxAccess('readwrite') if mibBuilder.loadTexts: ilomCtrlLocalUserCLIMode.setStatus('current') if mibBuilder.loadTexts: ilomCtrlLocalUserCLIMode.setDescription("Allows the CLI mode to be configured on a per-user basis. The CLI mode determines which shell the user will interact with. If the 'default' mode is select, the user will see the DMTF CLP after logging in via ssh or the console. If the 'alom' mode is selected, the user will see the ALOM CMT shell after logging in via ssh or the console.") ilom_ctrl_sessions_table = mib_table((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 5, 1)) if mibBuilder.loadTexts: ilomCtrlSessionsTable.setStatus('current') if mibBuilder.loadTexts: ilomCtrlSessionsTable.setDescription('A table listing the current user sessions.') ilom_ctrl_sessions_entry = mib_table_row((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 5, 1, 1)).setIndexNames((0, 'SUN-ILOM-CONTROL-MIB', 'ilomCtrlSessionsId')) if mibBuilder.loadTexts: ilomCtrlSessionsEntry.setStatus('current') if mibBuilder.loadTexts: ilomCtrlSessionsEntry.setDescription('An entry for a current session.') ilom_ctrl_sessions_id = mib_table_column((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 5, 1, 1, 1), integer32().subtype(subtypeSpec=value_range_constraint(0, 65535))) if mibBuilder.loadTexts: ilomCtrlSessionsId.setStatus('current') if mibBuilder.loadTexts: ilomCtrlSessionsId.setDescription('The instance number of a given logged-in user. This property is necessary since the same user can be logged in multiple times.') ilom_ctrl_sessions_username = mib_table_column((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 5, 1, 1, 2), snmp_admin_string()).setMaxAccess('readonly') if mibBuilder.loadTexts: ilomCtrlSessionsUsername.setStatus('current') if mibBuilder.loadTexts: ilomCtrlSessionsUsername.setDescription('The username of the user associated with the session.') ilom_ctrl_sessions_connection_type = mib_table_column((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 5, 1, 1, 3), ilom_ctrl_sessions_connection_type()).setMaxAccess('readonly') if mibBuilder.loadTexts: ilomCtrlSessionsConnectionType.setStatus('current') if mibBuilder.loadTexts: ilomCtrlSessionsConnectionType.setDescription('The type of connection that the given user is using to access the device.') ilom_ctrl_sessions_login_time = mib_table_column((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 5, 1, 1, 4), date_and_time()).setMaxAccess('readonly') if mibBuilder.loadTexts: ilomCtrlSessionsLoginTime.setStatus('current') if mibBuilder.loadTexts: ilomCtrlSessionsLoginTime.setDescription('The date and time that the logged into the device.') ilom_ctrl_firmware_mgmt_version = mib_scalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 6, 1), snmp_admin_string()).setMaxAccess('readonly') if mibBuilder.loadTexts: ilomCtrlFirmwareMgmtVersion.setStatus('current') if mibBuilder.loadTexts: ilomCtrlFirmwareMgmtVersion.setDescription('The version of the current firmware image.') ilom_ctrl_firmware_build_number = mib_scalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 6, 2), integer32().subtype(subtypeSpec=value_range_constraint(0, 65535))).setMaxAccess('readonly') if mibBuilder.loadTexts: ilomCtrlFirmwareBuildNumber.setStatus('current') if mibBuilder.loadTexts: ilomCtrlFirmwareBuildNumber.setDescription('The build number of the current firmware image.') ilom_ctrl_firmware_build_date = mib_scalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 6, 3), snmp_admin_string()).setMaxAccess('readonly') if mibBuilder.loadTexts: ilomCtrlFirmwareBuildDate.setStatus('current') if mibBuilder.loadTexts: ilomCtrlFirmwareBuildDate.setDescription('The build date and time of the current firmware image.') ilom_ctrl_firmware_tftp_server_ip = mib_scalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 6, 4), ip_address()).setMaxAccess('readwrite') if mibBuilder.loadTexts: ilomCtrlFirmwareTFTPServerIP.setStatus('current') if mibBuilder.loadTexts: ilomCtrlFirmwareTFTPServerIP.setDescription('The IP address of the TFTP server which will be used to download the the firmware image.') ilom_ctrl_firmware_tftp_file_name = mib_scalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 6, 5), snmp_admin_string()).setMaxAccess('readwrite') if mibBuilder.loadTexts: ilomCtrlFirmwareTFTPFileName.setStatus('current') if mibBuilder.loadTexts: ilomCtrlFirmwareTFTPFileName.setDescription('The relative path of the new firmware image file on the TFTP server.') ilom_ctrl_firmware_preserve_config = mib_scalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 6, 6), truth_value()).setMaxAccess('readwrite') if mibBuilder.loadTexts: ilomCtrlFirmwarePreserveConfig.setStatus('current') if mibBuilder.loadTexts: ilomCtrlFirmwarePreserveConfig.setDescription('This property determines whether the previous configuration of the device should be preserved after a firmware update. The configuration data includes all users information, configuration of clients and services, and any logs. The default value of this property is true.') ilom_ctrl_firmware_mgmt_status = mib_scalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 6, 7), ilom_ctrl_firmware_update_status()).setMaxAccess('readonly') if mibBuilder.loadTexts: ilomCtrlFirmwareMgmtStatus.setStatus('current') if mibBuilder.loadTexts: ilomCtrlFirmwareMgmtStatus.setDescription('This property indicates the status of a firmware update. If a TFTP error occurred while attempting to upload a new firmware image, the value of this property will be tftpError(1). If the image was uploaded correctly but it did not pass verification, the value of this property will be imageVerificationFailed(2). Otherwise, the status will indicate that the update is inProgress(3) or is a success(4). A firmware update could take as long as 20 minutes. During this time, no other operations should be performed on the device. Upon success, the device will be reset.') ilom_ctrl_firmware_mgmt_action = mib_scalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 6, 8), ilom_ctrl_firmware_update_action()).setMaxAccess('readwrite') if mibBuilder.loadTexts: ilomCtrlFirmwareMgmtAction.setStatus('current') if mibBuilder.loadTexts: ilomCtrlFirmwareMgmtAction.setDescription('This property is used to initiate a firmware update using the values of the other firmware management properties as parameters. It can also clear the values of those parameters. To initiate a firmware update, set the value of this property to initate(2). To clear the values of the writeable firmware management properties, set this propery to clearProperties(1). Before initiating a firmware update, the ilomCtrlFirmwareTFTPServerIP, ilomCtrlFirmwareTFTPFileName, and ilomCtrlFirmwarePreserveConfig properties must be set. After intiating a firmware update, the ilomCtrlFirmwareMgmtStatus property can be used to determine if the operation was successful. This is effectively a write-only property.') ilom_ctrl_firmware_mgmt_filesystem_version = mib_scalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 6, 9), snmp_admin_string()).setMaxAccess('readonly') if mibBuilder.loadTexts: ilomCtrlFirmwareMgmtFilesystemVersion.setStatus('current') if mibBuilder.loadTexts: ilomCtrlFirmwareMgmtFilesystemVersion.setDescription('The version of the current file system.') ilom_ctrl_firmware_delay_bios = mib_scalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 6, 10), truth_value()).setMaxAccess('readwrite') if mibBuilder.loadTexts: ilomCtrlFirmwareDelayBIOS.setStatus('current') if mibBuilder.loadTexts: ilomCtrlFirmwareDelayBIOS.setDescription("On servers that support a BIOS, this property is used to postpone the BIOS upgrade until the next server poweroff. Setting this property to 'false' will cause the server to be forced off if a BIOS upgrade is necessary. The default value of this property is false.") ilom_ctrl_event_log_table = mib_table((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 7, 1, 1)) if mibBuilder.loadTexts: ilomCtrlEventLogTable.setStatus('current') if mibBuilder.loadTexts: ilomCtrlEventLogTable.setDescription('This table provides a list of the current entries in the event log.') ilom_ctrl_event_log_entry = mib_table_row((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 7, 1, 1, 1)).setIndexNames((0, 'SUN-ILOM-CONTROL-MIB', 'ilomCtrlEventLogRecordID')) if mibBuilder.loadTexts: ilomCtrlEventLogEntry.setStatus('current') if mibBuilder.loadTexts: ilomCtrlEventLogEntry.setDescription('An entry in the event logs table.') ilom_ctrl_event_log_record_id = mib_table_column((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 7, 1, 1, 1, 1), unsigned32()) if mibBuilder.loadTexts: ilomCtrlEventLogRecordID.setStatus('current') if mibBuilder.loadTexts: ilomCtrlEventLogRecordID.setDescription('The record number for a given the event log entry.') ilom_ctrl_event_log_type = mib_table_column((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 7, 1, 1, 1, 2), ilom_ctrl_event_log_type()).setMaxAccess('readonly') if mibBuilder.loadTexts: ilomCtrlEventLogType.setStatus('current') if mibBuilder.loadTexts: ilomCtrlEventLogType.setDescription('An integer representing the type of event.') ilom_ctrl_event_log_timestamp = mib_table_column((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 7, 1, 1, 1, 3), date_and_time()).setMaxAccess('readonly') if mibBuilder.loadTexts: ilomCtrlEventLogTimestamp.setStatus('current') if mibBuilder.loadTexts: ilomCtrlEventLogTimestamp.setDescription('The date and time that the event log entry was recorded.') ilom_ctrl_event_log_class = mib_table_column((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 7, 1, 1, 1, 4), ilom_ctrl_event_log_class()).setMaxAccess('readonly') if mibBuilder.loadTexts: ilomCtrlEventLogClass.setStatus('current') if mibBuilder.loadTexts: ilomCtrlEventLogClass.setDescription('An integer representing the class of event.') ilom_ctrl_event_log_severity = mib_table_column((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 7, 1, 1, 1, 5), ilom_ctrl_event_severity()).setMaxAccess('readonly') if mibBuilder.loadTexts: ilomCtrlEventLogSeverity.setStatus('current') if mibBuilder.loadTexts: ilomCtrlEventLogSeverity.setDescription('The event severity corresponding to the given log entry.') ilom_ctrl_event_log_description = mib_table_column((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 7, 1, 1, 1, 6), snmp_admin_string()).setMaxAccess('readonly') if mibBuilder.loadTexts: ilomCtrlEventLogDescription.setStatus('current') if mibBuilder.loadTexts: ilomCtrlEventLogDescription.setDescription('A textual description of the event.') ilom_ctrl_event_log_clear = mib_scalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 7, 1, 2), truth_value()).setMaxAccess('readwrite') if mibBuilder.loadTexts: ilomCtrlEventLogClear.setStatus('current') if mibBuilder.loadTexts: ilomCtrlEventLogClear.setDescription("When set to 'true' clears the event log.") ilom_ctrl_alerts_table = mib_table((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 8, 1)) if mibBuilder.loadTexts: ilomCtrlAlertsTable.setStatus('current') if mibBuilder.loadTexts: ilomCtrlAlertsTable.setDescription('This table is used to view and add alert rules.') ilom_ctrl_alerts_entry = mib_table_row((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 8, 1, 1)).setIndexNames((0, 'SUN-ILOM-CONTROL-MIB', 'ilomCtrlAlertID')) if mibBuilder.loadTexts: ilomCtrlAlertsEntry.setStatus('current') if mibBuilder.loadTexts: ilomCtrlAlertsEntry.setDescription('An entry containing objects for an alert rule.') ilom_ctrl_alert_id = mib_table_column((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 8, 1, 1, 1), integer32().subtype(subtypeSpec=value_range_constraint(0, 65535))) if mibBuilder.loadTexts: ilomCtrlAlertID.setStatus('current') if mibBuilder.loadTexts: ilomCtrlAlertID.setDescription('An integer ID associated with a given alert rule.') ilom_ctrl_alert_severity = mib_table_column((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 8, 1, 1, 2), ilom_ctrl_event_severity()).setMaxAccess('readwrite') if mibBuilder.loadTexts: ilomCtrlAlertSeverity.setStatus('current') if mibBuilder.loadTexts: ilomCtrlAlertSeverity.setDescription('This property specifies the mininum event severity which should trigger an alert, for a given class.') ilom_ctrl_alert_type = mib_table_column((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 8, 1, 1, 3), ilom_ctrl_alert_type()).setMaxAccess('readwrite') if mibBuilder.loadTexts: ilomCtrlAlertType.setStatus('current') if mibBuilder.loadTexts: ilomCtrlAlertType.setDescription('This property specifies the type of notification for a given alert. If the type is snmptrap(2) or ipmipet(3), the ilomCtrlAlertDestinationIP must be specified. If the type is email(1), the ilomCtrlAlertDestinationEmail must be specified.') ilom_ctrl_alert_destination_ip = mib_table_column((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 8, 1, 1, 4), ip_address()).setMaxAccess('readwrite') if mibBuilder.loadTexts: ilomCtrlAlertDestinationIP.setStatus('current') if mibBuilder.loadTexts: ilomCtrlAlertDestinationIP.setDescription('This property species the IP address to send alert notifications when the alert type is snmptrap(2), ipmipet(3), or remotesyslog(4).') ilom_ctrl_alert_destination_email = mib_table_column((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 8, 1, 1, 5), snmp_admin_string()).setMaxAccess('readwrite') if mibBuilder.loadTexts: ilomCtrlAlertDestinationEmail.setStatus('current') if mibBuilder.loadTexts: ilomCtrlAlertDestinationEmail.setDescription('This property species the email address to send alert notifications when the alert type is email(1).') ilom_ctrl_alert_snmp_version = mib_table_column((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 8, 1, 1, 6), ilom_ctrl_alert_snmp_version()).setMaxAccess('readwrite') if mibBuilder.loadTexts: ilomCtrlAlertSNMPVersion.setStatus('current') if mibBuilder.loadTexts: ilomCtrlAlertSNMPVersion.setDescription('The version of SNMP trap that should be used for the given alert rule.') ilom_ctrl_alert_snmp_community_or_username = mib_table_column((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 8, 1, 1, 7), snmp_admin_string()).setMaxAccess('readwrite') if mibBuilder.loadTexts: ilomCtrlAlertSNMPCommunityOrUsername.setStatus('current') if mibBuilder.loadTexts: ilomCtrlAlertSNMPCommunityOrUsername.setDescription("This string specifies the community string to be used when the ilomCtrlAlertSNMPVersion property is set to 'v1' or 'v2c'. Alternatively, this string specifies the SNMP username to use when the ilomCtrlAlertSNMPVersion is set to 'v3'.") ilom_ctrl_alert_destination_port = mib_table_column((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 8, 1, 1, 8), integer32().subtype(subtypeSpec=value_range_constraint(0, 65535))).setMaxAccess('readwrite') if mibBuilder.loadTexts: ilomCtrlAlertDestinationPort.setStatus('current') if mibBuilder.loadTexts: ilomCtrlAlertDestinationPort.setDescription('Destination port for SNMP traps, 0 maps to the default') ilom_ctrl_alert_email_event_class_filter = mib_table_column((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 8, 1, 1, 9), snmp_admin_string()).setMaxAccess('readwrite') if mibBuilder.loadTexts: ilomCtrlAlertEmailEventClassFilter.setStatus('current') if mibBuilder.loadTexts: ilomCtrlAlertEmailEventClassFilter.setDescription("A class name or 'all' to filter emailed alerts on.") ilom_ctrl_alert_email_event_type_filter = mib_table_column((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 8, 1, 1, 10), snmp_admin_string()).setMaxAccess('readwrite') if mibBuilder.loadTexts: ilomCtrlAlertEmailEventTypeFilter.setStatus('current') if mibBuilder.loadTexts: ilomCtrlAlertEmailEventTypeFilter.setDescription("A type name or 'all' to filter emailed alerts on.") ilom_ctrl_alert_email_custom_sender = mib_table_column((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 8, 1, 1, 11), snmp_admin_string().subtype(subtypeSpec=value_size_constraint(0, 80))).setMaxAccess('readwrite') if mibBuilder.loadTexts: ilomCtrlAlertEmailCustomSender.setStatus('current') if mibBuilder.loadTexts: ilomCtrlAlertEmailCustomSender.setDescription("An optional format to identify the sender or the 'from' address. Customizing this string allows the user to specify the exact contents (up to 80 chars) of the 'from' field in the email message. Either one of the substitution strings '<IPADDRESS>' or '<HOSTNAME>' can be used as needed. By default, this parameter is an empty string, which results in the standard ILOM formatted originator for the alerts. e.g., ilom-sp@sp1302.dev.sun.com, sun-ilom@[<IPADDRESS>], or ilom-alert@<HOSTNAME>.abc.com") ilom_ctrl_alert_email_message_prefix = mib_table_column((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 8, 1, 1, 12), snmp_admin_string().subtype(subtypeSpec=value_size_constraint(0, 80))).setMaxAccess('readwrite') if mibBuilder.loadTexts: ilomCtrlAlertEmailMessagePrefix.setStatus('current') if mibBuilder.loadTexts: ilomCtrlAlertEmailMessagePrefix.setDescription('An optional string that can be added to the beginning of the message body. The prefix size can be up to 80 characters.') ilom_ctrl_date_and_time = mib_scalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 9, 1), date_and_time()).setMaxAccess('readwrite') if mibBuilder.loadTexts: ilomCtrlDateAndTime.setStatus('current') if mibBuilder.loadTexts: ilomCtrlDateAndTime.setDescription('The date and time of the device.') ilom_ctrl_ntp_enabled = mib_scalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 9, 2), truth_value()).setMaxAccess('readwrite') if mibBuilder.loadTexts: ilomCtrlNTPEnabled.setStatus('current') if mibBuilder.loadTexts: ilomCtrlNTPEnabled.setDescription('Specifies whether or not Network Time Protocol is enabled.') ilom_ctrl_timezone = mib_scalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 9, 3), snmp_admin_string()).setMaxAccess('readwrite') if mibBuilder.loadTexts: ilomCtrlTimezone.setStatus('current') if mibBuilder.loadTexts: ilomCtrlTimezone.setDescription('The configured timezone string.') ilom_ctrl_serial_internal_port_present = mib_scalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 10, 1), truth_value()).setMaxAccess('readonly') if mibBuilder.loadTexts: ilomCtrlSerialInternalPortPresent.setStatus('current') if mibBuilder.loadTexts: ilomCtrlSerialInternalPortPresent.setDescription('Indicates whether the given device has an internal serial port that is configurable. The internal serial port is the connection between the host server and the service processor that allows the SP to access the host serial console.') ilom_ctrl_serial_internal_port_baud_rate = mib_scalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 10, 2), ilom_ctrl_baud_rate()).setMaxAccess('readwrite') if mibBuilder.loadTexts: ilomCtrlSerialInternalPortBaudRate.setStatus('current') if mibBuilder.loadTexts: ilomCtrlSerialInternalPortBaudRate.setDescription('Specifies the current baud rate setting for the internal serial port. This is only readable/settable if ilomCtrlSerialInternalPortPresent is true.') ilom_ctrl_serial_external_port_present = mib_scalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 10, 3), truth_value()).setMaxAccess('readonly') if mibBuilder.loadTexts: ilomCtrlSerialExternalPortPresent.setStatus('current') if mibBuilder.loadTexts: ilomCtrlSerialExternalPortPresent.setDescription('Indicates whether the given device has an external serial port that is configurable.') ilom_ctrl_serial_external_port_baud_rate = mib_scalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 10, 4), ilom_ctrl_baud_rate()).setMaxAccess('readwrite') if mibBuilder.loadTexts: ilomCtrlSerialExternalPortBaudRate.setStatus('current') if mibBuilder.loadTexts: ilomCtrlSerialExternalPortBaudRate.setDescription('Specifies the current baud rate setting for the external serial port. This is only readable/settable if ilomCtrlSerialExternalPortPresent is true.') ilom_ctrl_serial_external_port_flow_control = mib_scalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 10, 5), ilom_ctrl_flow_control()).setMaxAccess('readonly') if mibBuilder.loadTexts: ilomCtrlSerialExternalPortFlowControl.setStatus('current') if mibBuilder.loadTexts: ilomCtrlSerialExternalPortFlowControl.setDescription('Specifies the current flowcontrol setting for the external serial port. This is only readable/settable if ilomCtrlSerialExternalPortPresent is true.') ilom_ctrl_power_table = mib_table((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 11, 1, 1)) if mibBuilder.loadTexts: ilomCtrlPowerTable.setStatus('current') if mibBuilder.loadTexts: ilomCtrlPowerTable.setDescription('A table listing all targets whose power can be controlled.') ilom_ctrl_power_entry = mib_table_row((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 11, 1, 1, 1)).setIndexNames((0, 'SUN-ILOM-CONTROL-MIB', 'ilomCtrlPowerTarget')) if mibBuilder.loadTexts: ilomCtrlPowerEntry.setStatus('current') if mibBuilder.loadTexts: ilomCtrlPowerEntry.setDescription('An entry for a power-controllable target.') ilom_ctrl_power_target = mib_table_column((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 11, 1, 1, 1, 1), snmp_admin_string()) if mibBuilder.loadTexts: ilomCtrlPowerTarget.setStatus('current') if mibBuilder.loadTexts: ilomCtrlPowerTarget.setDescription("This is the nomenclature name for a target which supports power control. On some systems, there are multiple targets which support power control. On a traditional, non-blade system, this table will contain only one row. The nomenclature name for a traditional server is '/SYS'. On blade systems, this table will contain multiple rows. There will be a row for '/CH' which allows for power control of the entire chassis. In addition, there will be rows for each blade. Blade nomenclature takes the form of '/CH/BL0/SYS', '/CH/BL1/SYS', and so on.") ilom_ctrl_power_action = mib_table_column((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 11, 1, 1, 1, 2), ilom_ctrl_power_action()).setMaxAccess('readwrite') if mibBuilder.loadTexts: ilomCtrlPowerAction.setStatus('current') if mibBuilder.loadTexts: ilomCtrlPowerAction.setDescription('The action to apply to the given power control target. The possible actions are powerOn(1), powerOff(2), powerCycle(3), and powerSoft(4). When this value is read, it returns a null value.') ilom_ctrl_reset_table = mib_table((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 11, 2, 1)) if mibBuilder.loadTexts: ilomCtrlResetTable.setStatus('current') if mibBuilder.loadTexts: ilomCtrlResetTable.setDescription('A table listing all targets which can be reset.') ilom_ctrl_reset_entry = mib_table_row((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 11, 2, 1, 1)).setIndexNames((0, 'SUN-ILOM-CONTROL-MIB', 'ilomCtrlResetTarget')) if mibBuilder.loadTexts: ilomCtrlResetEntry.setStatus('current') if mibBuilder.loadTexts: ilomCtrlResetEntry.setDescription('An entry for a target which can be reset.') ilom_ctrl_reset_target = mib_table_column((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 11, 2, 1, 1, 1), snmp_admin_string()) if mibBuilder.loadTexts: ilomCtrlResetTarget.setStatus('current') if mibBuilder.loadTexts: ilomCtrlResetTarget.setDescription("This is the nomenclature name for a target which supports reset capabilities. On some systems, there are multiple targets which support reset. On most systems, only system controllers and service processors support reset. On a traditional, non-blade system, this table will contain only one row, representing its service processor. The nomenclature name for a traditional server's service processor is '/SP'. On blade systems, this table will contain multiple rows. There will be a row for '/SC' which allows for reset of the system controller. In addition, there will be rows for each blade's service processor. For example, a blade's service processor nomenclature takes the form of '/CH/BL0/SP', '/CH/BL1/SP' and so on.") ilom_ctrl_reset_action = mib_table_column((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 11, 2, 1, 1, 2), ilom_ctrl_reset_action()).setMaxAccess('readwrite') if mibBuilder.loadTexts: ilomCtrlResetAction.setStatus('current') if mibBuilder.loadTexts: ilomCtrlResetAction.setDescription('The action to apply to the given reset control target. The possible actions are reset(1), which is a normal reset, resetNonMaskableInterrupt(2) which is a forced reset, and force(3) which is a forced reset for platforms that do not support NMI. When this value is read, it returns a null value.') ilom_ctrl_redundancy_status = mib_scalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 12, 1), ilom_ctrl_redundancy_status()).setMaxAccess('readonly') if mibBuilder.loadTexts: ilomCtrlRedundancyStatus.setStatus('current') if mibBuilder.loadTexts: ilomCtrlRedundancyStatus.setDescription('This property indicates the status of the device in a redundant configuration. It may be active(2) or standby(3) when configured as a redundant pair or standAlone(4) if it does not have a peer. In addition, it may be in a state called initializing(1) if it is in a transitional state.') ilom_ctrl_redundancy_action = mib_scalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 12, 2), ilom_ctrl_redundancy_action()).setMaxAccess('readwrite') if mibBuilder.loadTexts: ilomCtrlRedundancyAction.setStatus('current') if mibBuilder.loadTexts: ilomCtrlRedundancyAction.setDescription('This action is used to promote or demote this device from active or standy status.') ilom_ctrl_redundancy_fru_name = mib_scalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 12, 3), display_string()).setMaxAccess('readonly') if mibBuilder.loadTexts: ilomCtrlRedundancyFRUName.setStatus('current') if mibBuilder.loadTexts: ilomCtrlRedundancyFRUName.setDescription('FRU Name of the CMM on which this agent is running.') ilom_ctrl_policy_table = mib_table((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 13, 1)) if mibBuilder.loadTexts: ilomCtrlPolicyTable.setStatus('current') if mibBuilder.loadTexts: ilomCtrlPolicyTable.setDescription('A table listing all policies that can be administered.') ilom_ctrl_policy_entry = mib_table_row((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 13, 1, 1)).setIndexNames((0, 'SUN-ILOM-CONTROL-MIB', 'ilomCtrlPolicyId')) if mibBuilder.loadTexts: ilomCtrlPolicyEntry.setStatus('current') if mibBuilder.loadTexts: ilomCtrlPolicyEntry.setDescription('An entry for a policy which can be enabled or disabled.') ilom_ctrl_policy_id = mib_table_column((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 13, 1, 1, 1), integer32().subtype(subtypeSpec=value_range_constraint(0, 65535))) if mibBuilder.loadTexts: ilomCtrlPolicyId.setStatus('current') if mibBuilder.loadTexts: ilomCtrlPolicyId.setDescription('An integer identifier of the policy.') ilom_ctrl_policy_short_str = mib_table_column((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 13, 1, 1, 2), display_string()).setMaxAccess('readonly') if mibBuilder.loadTexts: ilomCtrlPolicyShortStr.setStatus('current') if mibBuilder.loadTexts: ilomCtrlPolicyShortStr.setDescription('A short description of the policy.') ilom_ctrl_policy_long_str = mib_table_column((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 13, 1, 1, 3), display_string()).setMaxAccess('readonly') if mibBuilder.loadTexts: ilomCtrlPolicyLongStr.setStatus('current') if mibBuilder.loadTexts: ilomCtrlPolicyLongStr.setDescription('A verbose description of the policy.') ilom_ctrl_policy_enabled = mib_table_column((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 13, 1, 1, 4), truth_value()).setMaxAccess('readwrite') if mibBuilder.loadTexts: ilomCtrlPolicyEnabled.setStatus('current') if mibBuilder.loadTexts: ilomCtrlPolicyEnabled.setDescription('Indicates the status of the policy.') ilom_ctrl_reset_to_defaults_action = mib_scalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 14, 1), ilom_ctrl_reset_to_defaults_action()).setMaxAccess('readwrite') if mibBuilder.loadTexts: ilomCtrlResetToDefaultsAction.setStatus('current') if mibBuilder.loadTexts: ilomCtrlResetToDefaultsAction.setDescription('This property is used to initiate the action of restoring the configuration on the SP to the original factory default state.') ilom_ctrl_backup_and_restore_target_uri = mib_scalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 14, 2, 1), snmp_admin_string()).setMaxAccess('readwrite') if mibBuilder.loadTexts: ilomCtrlBackupAndRestoreTargetURI.setStatus('current') if mibBuilder.loadTexts: ilomCtrlBackupAndRestoreTargetURI.setDescription('This property is used to set target destination of configuration xml file during backup and restore. The syntax is {protocol}://[user:passwword]@]host[/][path/][file] for example tftp://10.8.136.154/remotedir/config_backup.xml currently, the supported protocols are: scp, tftp. for certain protocol which needs password field, please use ilomCtrlBackupAndRestoreProtocolPassword to set password.') ilom_ctrl_backup_and_restore_passphrase = mib_scalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 14, 2, 2), snmp_admin_string()).setMaxAccess('readwrite') if mibBuilder.loadTexts: ilomCtrlBackupAndRestorePassphrase.setStatus('current') if mibBuilder.loadTexts: ilomCtrlBackupAndRestorePassphrase.setDescription('This property is used to set passphrase for encrypt/decrypt sensitive data during backup and restore. For snmpget, it returns null as value. ') ilom_ctrl_backup_and_restore_action = mib_scalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 14, 2, 3), ilom_ctrl_backup_and_restore_action()).setMaxAccess('readwrite') if mibBuilder.loadTexts: ilomCtrlBackupAndRestoreAction.setStatus('current') if mibBuilder.loadTexts: ilomCtrlBackupAndRestoreAction.setDescription('This property is used to issue a action, either backup or restore. ') ilom_ctrl_backup_and_restore_action_status = mib_scalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 14, 2, 4), snmp_admin_string()).setMaxAccess('readonly') if mibBuilder.loadTexts: ilomCtrlBackupAndRestoreActionStatus.setStatus('current') if mibBuilder.loadTexts: ilomCtrlBackupAndRestoreActionStatus.setDescription('This property is used to monitor the current status of backup/restore. ') ilom_ctrl_sparc_diags_level = mib_scalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 15, 1, 1), ilom_ctrl_sparc_diags_level()).setMaxAccess('readwrite') if mibBuilder.loadTexts: ilomCtrlSPARCDiagsLevel.setStatus('deprecated') if mibBuilder.loadTexts: ilomCtrlSPARCDiagsLevel.setDescription('Indicates the level of embedded diagnostics that should be run on the host during a boot. ***NOTE: this object is deprecated and replaced with these: ilomCtrlSPARCDiagsPowerOnLevel, ilomCtrlSPARCDiagsUserResetLevel, ilomCtrlSPARCDiagsErrorResetLevel While deprecated, this object will display advsettings(3), unless: - all 3 of the above are currently set to init(1), in which case this object will display min(1) - all 3 of the above are currently set to maximum(3), in which case this object will display max(2).') ilom_ctrl_sparc_diags_trigger = mib_scalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 15, 1, 2), ilom_ctrl_sparc_diags_trigger()).setMaxAccess('readwrite') if mibBuilder.loadTexts: ilomCtrlSPARCDiagsTrigger.setStatus('current') if mibBuilder.loadTexts: ilomCtrlSPARCDiagsTrigger.setDescription('Indicates the triggers of embedded diagnostics for the host.') ilom_ctrl_sparc_diags_verbosity = mib_scalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 15, 1, 3), ilom_ctrl_sparc_diags_verbosity()).setMaxAccess('readwrite') if mibBuilder.loadTexts: ilomCtrlSPARCDiagsVerbosity.setStatus('deprecated') if mibBuilder.loadTexts: ilomCtrlSPARCDiagsVerbosity.setDescription('Indicates the verbosity level of embedded diagnostics that should be run on the host during a boot. ***NOTE: this object is deprecated and replaced with these: ilomCtrlSPARCDiagsPowerOnVerbosity, ilomCtrlSPARCDiagsUserResetVerbosity, ilomCtrlSPARCDiagsErrorResetVerbosity. While deprecated, this object will display advsettings(3), unless: - all 3 of the above are currently set to minimum(1), in which case this object will display min(1) - all 3 of the above are currently set to maximum(3), in which case this object will display max(2).') ilom_ctrl_sparc_diags_mode = mib_scalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 15, 1, 4), ilom_ctrl_sparc_diags_mode()).setMaxAccess('readwrite') if mibBuilder.loadTexts: ilomCtrlSPARCDiagsMode.setStatus('current') if mibBuilder.loadTexts: ilomCtrlSPARCDiagsMode.setDescription('Indicates the modes for POST. POST will stop at the mode specified by this property.') ilom_ctrl_sparc_diags_power_on_level = mib_scalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 15, 1, 5), ilom_ctrl_sparc_diags_level_adv()).setMaxAccess('readwrite') if mibBuilder.loadTexts: ilomCtrlSPARCDiagsPowerOnLevel.setStatus('current') if mibBuilder.loadTexts: ilomCtrlSPARCDiagsPowerOnLevel.setDescription('Indicates the level of embedded diagnostics that should be run on the host during a boot for the power-on-reset trigger.') ilom_ctrl_sparc_diags_user_reset_level = mib_scalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 15, 1, 6), ilom_ctrl_sparc_diags_level_adv()).setMaxAccess('readwrite') if mibBuilder.loadTexts: ilomCtrlSPARCDiagsUserResetLevel.setStatus('current') if mibBuilder.loadTexts: ilomCtrlSPARCDiagsUserResetLevel.setDescription('Indicates the level of embedded diagnostics that should be run on the host during a boot for the user-reset trigger.') ilom_ctrl_sparc_diags_error_reset_level = mib_scalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 15, 1, 7), ilom_ctrl_sparc_diags_level_adv()).setMaxAccess('readwrite') if mibBuilder.loadTexts: ilomCtrlSPARCDiagsErrorResetLevel.setStatus('current') if mibBuilder.loadTexts: ilomCtrlSPARCDiagsErrorResetLevel.setDescription('Indicates the level of embedded diagnostics that should be run on the host during a boot for the error-reset trigger.') ilom_ctrl_sparc_diags_power_on_verbosity = mib_scalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 15, 1, 8), ilom_ctrl_sparc_diags_verbosity_adv()).setMaxAccess('readwrite') if mibBuilder.loadTexts: ilomCtrlSPARCDiagsPowerOnVerbosity.setStatus('current') if mibBuilder.loadTexts: ilomCtrlSPARCDiagsPowerOnVerbosity.setDescription('Indicates the verbosity level of embedded diagnostics that should be run on the host during a boot for power-on-reset trigger.') ilom_ctrl_sparc_diags_user_reset_verbosity = mib_scalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 15, 1, 9), ilom_ctrl_sparc_diags_verbosity_adv()).setMaxAccess('readwrite') if mibBuilder.loadTexts: ilomCtrlSPARCDiagsUserResetVerbosity.setStatus('current') if mibBuilder.loadTexts: ilomCtrlSPARCDiagsUserResetVerbosity.setDescription('Indicates the verbosity level of embedded diagnostics that should be run on the host during a boot for user-reset trigger.') ilom_ctrl_sparc_diags_error_reset_verbosity = mib_scalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 15, 1, 10), ilom_ctrl_sparc_diags_verbosity_adv()).setMaxAccess('readwrite') if mibBuilder.loadTexts: ilomCtrlSPARCDiagsErrorResetVerbosity.setStatus('current') if mibBuilder.loadTexts: ilomCtrlSPARCDiagsErrorResetVerbosity.setDescription('Indicates the verbosity level of embedded diagnostics that should be run on the host during a boot for error-reset trigger.') ilom_ctrl_sparc_diags_status = mib_scalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 15, 1, 11), integer32().subtype(subtypeSpec=value_range_constraint(0, 100))).setMaxAccess('readonly') if mibBuilder.loadTexts: ilomCtrlSPARCDiagsStatus.setStatus('current') if mibBuilder.loadTexts: ilomCtrlSPARCDiagsStatus.setDescription('Indicates the progress of POST diagnostics on the host, expressed as a percentage.') ilom_ctrl_sparc_diags_action = mib_scalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 15, 1, 12), ilom_ctrl_sparc_diags_action()).setMaxAccess('readwrite') if mibBuilder.loadTexts: ilomCtrlSPARCDiagsAction.setStatus('current') if mibBuilder.loadTexts: ilomCtrlSPARCDiagsAction.setDescription('An action to take to control POST running on the host.') ilom_ctrl_sparc_diags_hw_change_level = mib_scalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 15, 1, 13), ilom_ctrl_sparc_diags_level_adv()).setMaxAccess('readwrite') if mibBuilder.loadTexts: ilomCtrlSPARCDiagsHwChangeLevel.setStatus('current') if mibBuilder.loadTexts: ilomCtrlSPARCDiagsHwChangeLevel.setDescription('Indicates the level of embedded diagnostics that should be run on the host during a boot for the hw-change trigger.') ilom_ctrl_sparc_diags_hw_change_verbosity = mib_scalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 15, 1, 14), ilom_ctrl_sparc_diags_verbosity_adv()).setMaxAccess('readwrite') if mibBuilder.loadTexts: ilomCtrlSPARCDiagsHwChangeVerbosity.setStatus('current') if mibBuilder.loadTexts: ilomCtrlSPARCDiagsHwChangeVerbosity.setDescription('Indicates the verbosity level of embedded diagnostics that should be run on the host during a boot for hw-change trigger.') ilom_ctrl_sparc_host_mac_address = mib_scalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 15, 2, 1), snmp_admin_string()).setMaxAccess('readonly') if mibBuilder.loadTexts: ilomCtrlSPARCHostMACAddress.setStatus('current') if mibBuilder.loadTexts: ilomCtrlSPARCHostMACAddress.setDescription('Displays the starting MAC address for the host.') ilom_ctrl_sparc_host_obp_version = mib_scalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 15, 2, 3), snmp_admin_string()).setMaxAccess('readonly') if mibBuilder.loadTexts: ilomCtrlSPARCHostOBPVersion.setStatus('current') if mibBuilder.loadTexts: ilomCtrlSPARCHostOBPVersion.setDescription('Displays the version string for OBP.') ilom_ctrl_sparc_host_post_version = mib_scalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 15, 2, 4), snmp_admin_string()).setMaxAccess('readonly') if mibBuilder.loadTexts: ilomCtrlSPARCHostPOSTVersion.setStatus('current') if mibBuilder.loadTexts: ilomCtrlSPARCHostPOSTVersion.setDescription('Displays the version string for POST.') ilom_ctrl_sparc_host_auto_run_on_error = mib_scalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 15, 2, 6), truth_value()).setMaxAccess('readwrite') if mibBuilder.loadTexts: ilomCtrlSPARCHostAutoRunOnError.setStatus('current') if mibBuilder.loadTexts: ilomCtrlSPARCHostAutoRunOnError.setDescription('This option determines whether the host should continue to boot in the event of a non-fatal POST error.') ilom_ctrl_sparc_host_post_status = mib_scalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 15, 2, 7), snmp_admin_string()).setMaxAccess('readonly') if mibBuilder.loadTexts: ilomCtrlSPARCHostPOSTStatus.setStatus('current') if mibBuilder.loadTexts: ilomCtrlSPARCHostPOSTStatus.setDescription('A string that describes the status of POST. ***NOTE: OS Boot status is ilomCtrlSPARCHostOSBootStatus.') ilom_ctrl_sparc_host_auto_restart_policy = mib_scalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 15, 2, 8), ilom_ctrl_sparc_host_auto_restart_policy()).setMaxAccess('readwrite') if mibBuilder.loadTexts: ilomCtrlSPARCHostAutoRestartPolicy.setStatus('current') if mibBuilder.loadTexts: ilomCtrlSPARCHostAutoRestartPolicy.setDescription('This determines what action the SP should take when it discovers that the host is hung.') ilom_ctrl_sparc_host_os_boot_status = mib_scalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 15, 2, 9), snmp_admin_string()).setMaxAccess('readonly') if mibBuilder.loadTexts: ilomCtrlSPARCHostOSBootStatus.setStatus('current') if mibBuilder.loadTexts: ilomCtrlSPARCHostOSBootStatus.setDescription('A string that describes the boot status of host OS.') ilom_ctrl_sparc_host_boot_timeout = mib_scalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 15, 2, 10), integer32().subtype(subtypeSpec=value_range_constraint(0, 36000))).setMaxAccess('readwrite') if mibBuilder.loadTexts: ilomCtrlSPARCHostBootTimeout.setStatus('current') if mibBuilder.loadTexts: ilomCtrlSPARCHostBootTimeout.setDescription('This is the boot timer time out value.') ilom_ctrl_sparc_host_boot_restart = mib_scalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 15, 2, 11), ilom_ctrl_sparc_host_boot_restart()).setMaxAccess('readwrite') if mibBuilder.loadTexts: ilomCtrlSPARCHostBootRestart.setStatus('current') if mibBuilder.loadTexts: ilomCtrlSPARCHostBootRestart.setDescription('This determines what action the SP should take when the boot timer expires.') ilom_ctrl_sparc_host_max_boot_fail = mib_scalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 15, 2, 12), integer32().subtype(subtypeSpec=value_range_constraint(0, 10000))).setMaxAccess('readwrite') if mibBuilder.loadTexts: ilomCtrlSPARCHostMaxBootFail.setStatus('current') if mibBuilder.loadTexts: ilomCtrlSPARCHostMaxBootFail.setDescription('This is the number of max boot failures allowed.') ilom_ctrl_sparc_host_boot_fail_recovery = mib_scalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 15, 2, 13), ilom_ctrl_sparc_host_boot_fail_recovery()).setMaxAccess('readwrite') if mibBuilder.loadTexts: ilomCtrlSPARCHostBootFailRecovery.setStatus('current') if mibBuilder.loadTexts: ilomCtrlSPARCHostBootFailRecovery.setDescription('This determines what action the SP should take when the max boot failures are reached.') ilom_ctrl_sparc_host_hypervisor_version = mib_scalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 15, 2, 14), snmp_admin_string()).setMaxAccess('readonly') if mibBuilder.loadTexts: ilomCtrlSPARCHostHypervisorVersion.setStatus('current') if mibBuilder.loadTexts: ilomCtrlSPARCHostHypervisorVersion.setDescription('Displays the version string for Hypervisor.') ilom_ctrl_sparc_host_sys_fw_version = mib_scalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 15, 2, 15), snmp_admin_string()).setMaxAccess('readonly') if mibBuilder.loadTexts: ilomCtrlSPARCHostSysFwVersion.setStatus('current') if mibBuilder.loadTexts: ilomCtrlSPARCHostSysFwVersion.setDescription('Displays the version string for SysFw.') ilom_ctrl_sparc_host_send_break_action = mib_scalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 15, 2, 16), ilom_ctrl_sparc_host_send_break_action()).setMaxAccess('readwrite') if mibBuilder.loadTexts: ilomCtrlSPARCHostSendBreakAction.setStatus('current') if mibBuilder.loadTexts: ilomCtrlSPARCHostSendBreakAction.setDescription('Send Break Action to Host') ilom_ctrl_sparc_host_io_reconfigure_policy = mib_scalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 15, 2, 17), ilom_ctrl_sparc_host_io_reconfigure_policy()).setMaxAccess('readwrite') if mibBuilder.loadTexts: ilomCtrlSPARCHostIoReconfigurePolicy.setStatus('current') if mibBuilder.loadTexts: ilomCtrlSPARCHostIoReconfigurePolicy.setDescription('This determines the host IO reconfiguration policy to apply on next host power-on.') ilom_ctrl_sparc_host_gm_version = mib_scalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 15, 2, 18), snmp_admin_string()).setMaxAccess('readonly') if mibBuilder.loadTexts: ilomCtrlSPARCHostGMVersion.setStatus('current') if mibBuilder.loadTexts: ilomCtrlSPARCHostGMVersion.setDescription('Displays the version string for Guest Manager.') ilom_ctrl_sparc_boot_mode_state = mib_scalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 15, 3, 1), ilom_ctrl_sparc_boot_mode_state()).setMaxAccess('readwrite') if mibBuilder.loadTexts: ilomCtrlSPARCBootModeState.setStatus('current') if mibBuilder.loadTexts: ilomCtrlSPARCBootModeState.setDescription("Configures the boot mode state for the host. Specifying 'normal' means that the host retains current NVRAM variable settings. Specifying 'resetNvram' means that all NVRAM settings will be reset to their default values.") ilom_ctrl_sparc_boot_mode_script = mib_scalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 15, 3, 2), snmp_admin_string().subtype(subtypeSpec=value_size_constraint(0, 255))).setMaxAccess('readwrite') if mibBuilder.loadTexts: ilomCtrlSPARCBootModeScript.setStatus('current') if mibBuilder.loadTexts: ilomCtrlSPARCBootModeScript.setDescription('Specifies the script to run when host boots.') ilom_ctrl_sparc_boot_mode_expires = mib_scalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 15, 3, 3), date_and_time()).setMaxAccess('readonly') if mibBuilder.loadTexts: ilomCtrlSPARCBootModeExpires.setStatus('current') if mibBuilder.loadTexts: ilomCtrlSPARCBootModeExpires.setDescription('Displays the date and time for when the boot mode configuration should expire.') ilom_ctrl_sparc_boot_mode_ldom_config = mib_scalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 15, 3, 4), snmp_admin_string().subtype(subtypeSpec=value_size_constraint(0, 255))).setMaxAccess('readwrite') if mibBuilder.loadTexts: ilomCtrlSPARCBootModeLDOMConfig.setStatus('current') if mibBuilder.loadTexts: ilomCtrlSPARCBootModeLDOMConfig.setDescription("This string refers to the config name value that must either be 'default' or match a named LDOM configuration downloaded to the service processor using the LDOM Manager.") ilom_ctrl_sparc_key_switch_state = mib_scalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 15, 4, 1), ilom_ctrl_sparc_key_switch_state()).setMaxAccess('readwrite') if mibBuilder.loadTexts: ilomCtrlSPARCKeySwitchState.setStatus('current') if mibBuilder.loadTexts: ilomCtrlSPARCKeySwitchState.setDescription('Specifies the current state of the virtual key switch.') ilom_ctrl_system_identifier = mib_scalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 16, 1), snmp_admin_string()).setMaxAccess('readwrite') if mibBuilder.loadTexts: ilomCtrlSystemIdentifier.setStatus('current') if mibBuilder.loadTexts: ilomCtrlSystemIdentifier.setDescription('This string, which is often the host name of the server associated with ILOM, will be sent out in the varbind for all traps that ILOM generates.') ilom_ctrl_host_name = mib_scalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 16, 2), snmp_admin_string()).setMaxAccess('readwrite') if mibBuilder.loadTexts: ilomCtrlHostName.setStatus('current') if mibBuilder.loadTexts: ilomCtrlHostName.setDescription('This string is the hostname for ILOM.') ilom_ctrl_active_directory_enabled = mib_scalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 5, 1), truth_value()).setMaxAccess('readwrite') if mibBuilder.loadTexts: ilomCtrlActiveDirectoryEnabled.setStatus('current') if mibBuilder.loadTexts: ilomCtrlActiveDirectoryEnabled.setDescription('Specifies whether or not the Active Directory client is enabled.') ilom_ctrl_active_directory_ip = mib_scalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 5, 2), ip_address()).setMaxAccess('readwrite') if mibBuilder.loadTexts: ilomCtrlActiveDirectoryIP.setStatus('current') if mibBuilder.loadTexts: ilomCtrlActiveDirectoryIP.setDescription('The IP address of the Active Directory server used as a name service for user accounts.') ilom_ctrl_active_directory_port_number = mib_scalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 5, 3), integer32().subtype(subtypeSpec=value_range_constraint(0, 65535))).setMaxAccess('readwrite') if mibBuilder.loadTexts: ilomCtrlActiveDirectoryPortNumber.setStatus('current') if mibBuilder.loadTexts: ilomCtrlActiveDirectoryPortNumber.setDescription('Specifies the port number for the Active Directory client. Specifying 0 as the port means auto-select while specifying 1-65535 configures the actual port.') ilom_ctrl_active_directory_default_role = mib_scalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 5, 4), ilom_ctrl_user_role()).setMaxAccess('readwrite') if mibBuilder.loadTexts: ilomCtrlActiveDirectoryDefaultRole.setStatus('deprecated') if mibBuilder.loadTexts: ilomCtrlActiveDirectoryDefaultRole.setDescription("Specifies the role that a user authenticated via Active Directory should have. Setting this property to 'Administrator' or 'Operator' will cause the Active Directory client to ignore the schema stored on the AD server. Setting this to 'none' clears the value and indicates that the native Active Directory schema should be used. ***NOTE: this object is deprecated and replaced with ilomCtrlActiveDirectoryDefaultRoles.") ilom_ctrl_active_directory_cert_file_uri = mib_scalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 5, 5), snmp_admin_string()).setMaxAccess('readwrite') if mibBuilder.loadTexts: ilomCtrlActiveDirectoryCertFileURI.setStatus('current') if mibBuilder.loadTexts: ilomCtrlActiveDirectoryCertFileURI.setDescription('This is the URI of a certificate file needed when Strict Cert Mode is enabled. Setting the URI causes the tranfer of the file, making the certificate available immediately for certificate authentication.') ilom_ctrl_active_directory_timeout = mib_scalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 5, 6), integer32().subtype(subtypeSpec=value_range_constraint(1, 20))).setMaxAccess('readwrite') if mibBuilder.loadTexts: ilomCtrlActiveDirectoryTimeout.setStatus('current') if mibBuilder.loadTexts: ilomCtrlActiveDirectoryTimeout.setDescription('Specifies the number of seconds to wait before timing out if the Active Directory Server is not responding.') ilom_ctrl_active_directory_strict_cert_enabled = mib_scalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 5, 7), truth_value()).setMaxAccess('readwrite') if mibBuilder.loadTexts: ilomCtrlActiveDirectoryStrictCertEnabled.setStatus('current') if mibBuilder.loadTexts: ilomCtrlActiveDirectoryStrictCertEnabled.setDescription('Specifies whether or not the Strict Cert Mode is enabled for the Active Directory Client. If enabled, the Active Directory certificate must be uploaded to the SP so that certificate validation can be performed when communicating with the Active Directory server.') ilom_ctrl_active_directory_cert_file_status = mib_scalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 5, 8), display_string()).setMaxAccess('readonly') if mibBuilder.loadTexts: ilomCtrlActiveDirectoryCertFileStatus.setStatus('current') if mibBuilder.loadTexts: ilomCtrlActiveDirectoryCertFileStatus.setDescription('A string indicating the status of the certificate file. This is useful in determining whether a certificate file is present or not.') ilom_ctrl_active_dir_user_domain_table = mib_table((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 5, 9)) if mibBuilder.loadTexts: ilomCtrlActiveDirUserDomainTable.setStatus('current') if mibBuilder.loadTexts: ilomCtrlActiveDirUserDomainTable.setDescription('This table is used to configure domain information required for configuring the Active Directory client.') ilom_ctrl_active_dir_user_domain_entry = mib_table_row((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 5, 9, 1)).setIndexNames((0, 'SUN-ILOM-CONTROL-MIB', 'ilomCtrlActiveDirUserDomainId')) if mibBuilder.loadTexts: ilomCtrlActiveDirUserDomainEntry.setStatus('current') if mibBuilder.loadTexts: ilomCtrlActiveDirUserDomainEntry.setDescription('An entry for an Active Directory user domain.') ilom_ctrl_active_dir_user_domain_id = mib_table_column((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 5, 9, 1, 1), integer32().subtype(subtypeSpec=value_range_constraint(1, 5))) if mibBuilder.loadTexts: ilomCtrlActiveDirUserDomainId.setStatus('current') if mibBuilder.loadTexts: ilomCtrlActiveDirUserDomainId.setDescription('An integer identifier of the Active Directory domain.') ilom_ctrl_active_dir_user_domain = mib_table_column((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 5, 9, 1, 2), snmp_admin_string()).setMaxAccess('readwrite') if mibBuilder.loadTexts: ilomCtrlActiveDirUserDomain.setStatus('current') if mibBuilder.loadTexts: ilomCtrlActiveDirUserDomain.setDescription("This string should match exactly with an authentication domain on the Active Directory server. This string should contain a substitution string '<USERNAME>' which will be replaced with the user's login name during authentication. Either the principle or distinguished name format is allowed.") ilom_ctrl_active_dir_admin_groups_table = mib_table((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 5, 10)) if mibBuilder.loadTexts: ilomCtrlActiveDirAdminGroupsTable.setStatus('current') if mibBuilder.loadTexts: ilomCtrlActiveDirAdminGroupsTable.setDescription('This table is used to configure admin group information required for configuring the Active Directory client.') ilom_ctrl_active_dir_admin_groups_entry = mib_table_row((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 5, 10, 1)).setIndexNames((0, 'SUN-ILOM-CONTROL-MIB', 'ilomCtrlActiveDirAdminGroupId')) if mibBuilder.loadTexts: ilomCtrlActiveDirAdminGroupsEntry.setStatus('current') if mibBuilder.loadTexts: ilomCtrlActiveDirAdminGroupsEntry.setDescription('An entry for an Active Directory admin group.') ilom_ctrl_active_dir_admin_group_id = mib_table_column((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 5, 10, 1, 1), integer32().subtype(subtypeSpec=value_range_constraint(1, 5))) if mibBuilder.loadTexts: ilomCtrlActiveDirAdminGroupId.setStatus('current') if mibBuilder.loadTexts: ilomCtrlActiveDirAdminGroupId.setDescription('An integer identifier of the Active Directory admin group entry.') ilom_ctrl_active_dir_admin_group_name = mib_table_column((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 5, 10, 1, 2), snmp_admin_string()).setMaxAccess('readwrite') if mibBuilder.loadTexts: ilomCtrlActiveDirAdminGroupName.setStatus('current') if mibBuilder.loadTexts: ilomCtrlActiveDirAdminGroupName.setDescription('This string should contain a distinguished name that exactly matches one of the group names on the ActiveDirectory server. Any user belonging to one of these groups in this table will be assigned the ILOM role of Administrator.') ilom_ctrl_active_dir_operator_groups_table = mib_table((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 5, 11)) if mibBuilder.loadTexts: ilomCtrlActiveDirOperatorGroupsTable.setStatus('current') if mibBuilder.loadTexts: ilomCtrlActiveDirOperatorGroupsTable.setDescription('This table is used to configure operator group information required for configuring the Active Directory client.') ilom_ctrl_active_dir_operator_groups_entry = mib_table_row((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 5, 11, 1)).setIndexNames((0, 'SUN-ILOM-CONTROL-MIB', 'ilomCtrlActiveDirOperatorGroupId')) if mibBuilder.loadTexts: ilomCtrlActiveDirOperatorGroupsEntry.setStatus('current') if mibBuilder.loadTexts: ilomCtrlActiveDirOperatorGroupsEntry.setDescription('An entry for an Active Directory operator group.') ilom_ctrl_active_dir_operator_group_id = mib_table_column((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 5, 11, 1, 1), integer32().subtype(subtypeSpec=value_range_constraint(1, 5))) if mibBuilder.loadTexts: ilomCtrlActiveDirOperatorGroupId.setStatus('current') if mibBuilder.loadTexts: ilomCtrlActiveDirOperatorGroupId.setDescription('An integer identifier of the Active Directory operator group entry.') ilom_ctrl_active_dir_operator_group_name = mib_table_column((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 5, 11, 1, 2), snmp_admin_string()).setMaxAccess('readwrite') if mibBuilder.loadTexts: ilomCtrlActiveDirOperatorGroupName.setStatus('current') if mibBuilder.loadTexts: ilomCtrlActiveDirOperatorGroupName.setDescription('This string should contain a distinguished name that exactly matches one of the group names on the ActiveDirectory server. Any user belonging to one of these groups in this table will be assigned the ILOM role of Operator.') ilom_ctrl_active_dir_alternate_server_table = mib_table((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 5, 12)) if mibBuilder.loadTexts: ilomCtrlActiveDirAlternateServerTable.setStatus('current') if mibBuilder.loadTexts: ilomCtrlActiveDirAlternateServerTable.setDescription('This table is used to view and configure alternate server information for the Active Directory client.') ilom_ctrl_active_dir_alternate_server_entry = mib_table_row((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 5, 12, 1)).setIndexNames((0, 'SUN-ILOM-CONTROL-MIB', 'ilomCtrlActiveDirAlternateServerId')) if mibBuilder.loadTexts: ilomCtrlActiveDirAlternateServerEntry.setStatus('current') if mibBuilder.loadTexts: ilomCtrlActiveDirAlternateServerEntry.setDescription('An entry for an Active Directory alternate server.') ilom_ctrl_active_dir_alternate_server_id = mib_table_column((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 5, 12, 1, 1), integer32().subtype(subtypeSpec=value_range_constraint(1, 5))) if mibBuilder.loadTexts: ilomCtrlActiveDirAlternateServerId.setStatus('current') if mibBuilder.loadTexts: ilomCtrlActiveDirAlternateServerId.setDescription('An integer identifier of the Active Directory alternate server table.') ilom_ctrl_active_dir_alternate_server_ip = mib_table_column((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 5, 12, 1, 2), ip_address()).setMaxAccess('readwrite') if mibBuilder.loadTexts: ilomCtrlActiveDirAlternateServerIp.setStatus('current') if mibBuilder.loadTexts: ilomCtrlActiveDirAlternateServerIp.setDescription('The IP address of the Active Directory alternate server used as a name service for user accounts.') ilom_ctrl_active_dir_alternate_server_port = mib_table_column((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 5, 12, 1, 3), integer32().subtype(subtypeSpec=value_range_constraint(0, 65535))).setMaxAccess('readwrite') if mibBuilder.loadTexts: ilomCtrlActiveDirAlternateServerPort.setStatus('current') if mibBuilder.loadTexts: ilomCtrlActiveDirAlternateServerPort.setDescription('Specifies the port number for the Active Directory alternate server. Specifying 0 as the port indicates that auto-select will use the well known port number. Specifying 1-65535 is used to explicitly set the port number.') ilom_ctrl_active_dir_alternate_server_cert_status = mib_table_column((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 5, 12, 1, 4), display_string()).setMaxAccess('readonly') if mibBuilder.loadTexts: ilomCtrlActiveDirAlternateServerCertStatus.setStatus('current') if mibBuilder.loadTexts: ilomCtrlActiveDirAlternateServerCertStatus.setDescription('A string indicating the status of the certificate file. This is useful in determining whether a certificate file is present or not.') ilom_ctrl_active_dir_alternate_server_cert_uri = mib_table_column((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 5, 12, 1, 5), snmp_admin_string()).setMaxAccess('readwrite') if mibBuilder.loadTexts: ilomCtrlActiveDirAlternateServerCertURI.setStatus('current') if mibBuilder.loadTexts: ilomCtrlActiveDirAlternateServerCertURI.setDescription("This is the URI of a certificate file needed when Strict Cert Mode is enabled. Setting the URI causes the tranfer of the file, making the certificate available immediately for certificate authentication. Additionally, either 'remove' or 'restore' are supported for direct certificate manipulation.") ilom_ctrl_active_dir_alternate_server_cert_clear = mib_table_column((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 5, 12, 1, 6), truth_value()).setMaxAccess('readwrite') if mibBuilder.loadTexts: ilomCtrlActiveDirAlternateServerCertClear.setStatus('current') if mibBuilder.loadTexts: ilomCtrlActiveDirAlternateServerCertClear.setDescription('A variable that will clear the certificate info associated with the server when it is set to true.') ilom_ctrl_active_dir_alternate_server_cert_version = mib_table_column((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 5, 12, 1, 7), display_string()).setMaxAccess('readonly') if mibBuilder.loadTexts: ilomCtrlActiveDirAlternateServerCertVersion.setStatus('current') if mibBuilder.loadTexts: ilomCtrlActiveDirAlternateServerCertVersion.setDescription('A string indicating the certificate version of the alternate server certificate file.') ilom_ctrl_active_dir_alternate_server_cert_serial_no = mib_table_column((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 5, 12, 1, 8), display_string()).setMaxAccess('readonly') if mibBuilder.loadTexts: ilomCtrlActiveDirAlternateServerCertSerialNo.setStatus('current') if mibBuilder.loadTexts: ilomCtrlActiveDirAlternateServerCertSerialNo.setDescription('A string showing the serial number of the alternate server certificate file.') ilom_ctrl_active_dir_alternate_server_cert_issuer = mib_table_column((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 5, 12, 1, 9), display_string()).setMaxAccess('readonly') if mibBuilder.loadTexts: ilomCtrlActiveDirAlternateServerCertIssuer.setStatus('current') if mibBuilder.loadTexts: ilomCtrlActiveDirAlternateServerCertIssuer.setDescription('A string showing the issuer of the alternate server certificate file.') ilom_ctrl_active_dir_alternate_server_cert_subject = mib_table_column((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 5, 12, 1, 10), display_string()).setMaxAccess('readonly') if mibBuilder.loadTexts: ilomCtrlActiveDirAlternateServerCertSubject.setStatus('current') if mibBuilder.loadTexts: ilomCtrlActiveDirAlternateServerCertSubject.setDescription('A string showing the subject of the alternate server certificate file.') ilom_ctrl_active_dir_alternate_server_cert_valid_begin = mib_table_column((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 5, 12, 1, 11), display_string()).setMaxAccess('readonly') if mibBuilder.loadTexts: ilomCtrlActiveDirAlternateServerCertValidBegin.setStatus('current') if mibBuilder.loadTexts: ilomCtrlActiveDirAlternateServerCertValidBegin.setDescription('A string showing the valid start date of the alternate server certificate file.') ilom_ctrl_active_dir_alternate_server_cert_valid_end = mib_table_column((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 5, 12, 1, 12), display_string()).setMaxAccess('readonly') if mibBuilder.loadTexts: ilomCtrlActiveDirAlternateServerCertValidEnd.setStatus('current') if mibBuilder.loadTexts: ilomCtrlActiveDirAlternateServerCertValidEnd.setDescription('A string showing the valid end date of the alternate server certificate file.') ilom_ctrl_active_directory_log_detail = mib_scalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 5, 13), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(1, 2, 3, 4, 5))).clone(namedValues=named_values(('none', 1), ('high', 2), ('medium', 3), ('low', 4), ('trace', 5)))).setMaxAccess('readwrite') if mibBuilder.loadTexts: ilomCtrlActiveDirectoryLogDetail.setStatus('current') if mibBuilder.loadTexts: ilomCtrlActiveDirectoryLogDetail.setDescription("Controls the amount of messages sent to the event log. The high priority has the least number of messages going to the log, while the lowest priority 'trace' has the most messages logged. When this object is set to 'none', no messages are logged.") ilom_ctrl_active_directory_default_roles = mib_scalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 5, 14), ilom_ctrl_user_roles()).setMaxAccess('readwrite') if mibBuilder.loadTexts: ilomCtrlActiveDirectoryDefaultRoles.setStatus('current') if mibBuilder.loadTexts: ilomCtrlActiveDirectoryDefaultRoles.setDescription("Specifies the role that a user authenticated via Active Directory should have. Setting this property to legacy roles of 'Administrator' or 'Operator', or any of the individual role IDs of 'a', 'u', 'c', 'r', 'o' and 's' will cause the Active Directory client to ignore the schema stored on the AD server. Setting this to 'none' clears the value and indicates that the native Active Directory schema should be used. The role IDs can be joined together 'aucros' where a-admin, u-user, c-console, r-reset, s-service and o-readOnly.") ilom_ctrl_active_dir_custom_groups_table = mib_table((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 5, 15)) if mibBuilder.loadTexts: ilomCtrlActiveDirCustomGroupsTable.setStatus('current') if mibBuilder.loadTexts: ilomCtrlActiveDirCustomGroupsTable.setDescription('This table is used to configure custom group information required for configuring the Active Directory client.') ilom_ctrl_active_dir_custom_groups_entry = mib_table_row((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 5, 15, 1)).setIndexNames((0, 'SUN-ILOM-CONTROL-MIB', 'ilomCtrlActiveDirCustomGroupId')) if mibBuilder.loadTexts: ilomCtrlActiveDirCustomGroupsEntry.setStatus('current') if mibBuilder.loadTexts: ilomCtrlActiveDirCustomGroupsEntry.setDescription('An entry for an Active Directory custom group.') ilom_ctrl_active_dir_custom_group_id = mib_table_column((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 5, 15, 1, 1), integer32().subtype(subtypeSpec=value_range_constraint(1, 5))) if mibBuilder.loadTexts: ilomCtrlActiveDirCustomGroupId.setStatus('current') if mibBuilder.loadTexts: ilomCtrlActiveDirCustomGroupId.setDescription('An integer identifier of the Active Directory custom group entry.') ilom_ctrl_active_dir_custom_group_name = mib_table_column((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 5, 15, 1, 2), snmp_admin_string()).setMaxAccess('readwrite') if mibBuilder.loadTexts: ilomCtrlActiveDirCustomGroupName.setStatus('current') if mibBuilder.loadTexts: ilomCtrlActiveDirCustomGroupName.setDescription("This string should contain a distinguished name that exactly matches one of the group names on the ActiveDirectory server. Any user belonging to one of these groups in this table will be assigned the ILOM role based on the entry's configuration for roles.") ilom_ctrl_active_dir_custom_group_roles = mib_table_column((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 5, 15, 1, 3), ilom_ctrl_user_roles()).setMaxAccess('readwrite') if mibBuilder.loadTexts: ilomCtrlActiveDirCustomGroupRoles.setStatus('current') if mibBuilder.loadTexts: ilomCtrlActiveDirCustomGroupRoles.setDescription("Specifies the role that a user authenticated via Active Directory should have. Setting this property to legacy roles of 'Administrator' or 'Operator', or any of the individual role IDs of 'a', 'u', 'c', 'r', 'o' and 's' will cause the Active Directory client to ignore the schema stored on the AD server. Setting this to 'none' clears the value and indicates that the native Active Directory schema should be used. The role IDs can be joined together 'aucros' where a-admin, u-user, c-console, r-reset, s-service and o-readOnly.") ilom_ctrl_active_directory_cert_clear = mib_scalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 5, 16), truth_value()).setMaxAccess('readwrite') if mibBuilder.loadTexts: ilomCtrlActiveDirectoryCertClear.setStatus('current') if mibBuilder.loadTexts: ilomCtrlActiveDirectoryCertClear.setDescription('A variable that will clear the certificate info associated with the server when it is set to true.') ilom_ctrl_active_directory_cert_version = mib_scalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 5, 17), display_string()).setMaxAccess('readonly') if mibBuilder.loadTexts: ilomCtrlActiveDirectoryCertVersion.setStatus('current') if mibBuilder.loadTexts: ilomCtrlActiveDirectoryCertVersion.setDescription('A string indicating the certificate version of the certificate file.') ilom_ctrl_active_directory_cert_serial_no = mib_scalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 5, 18), display_string()).setMaxAccess('readonly') if mibBuilder.loadTexts: ilomCtrlActiveDirectoryCertSerialNo.setStatus('current') if mibBuilder.loadTexts: ilomCtrlActiveDirectoryCertSerialNo.setDescription('A string showing the serial number of the certificate file.') ilom_ctrl_active_directory_cert_issuer = mib_scalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 5, 19), display_string()).setMaxAccess('readonly') if mibBuilder.loadTexts: ilomCtrlActiveDirectoryCertIssuer.setStatus('current') if mibBuilder.loadTexts: ilomCtrlActiveDirectoryCertIssuer.setDescription('A string showing the issuer of the certificate file.') ilom_ctrl_active_directory_cert_subject = mib_scalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 5, 20), display_string()).setMaxAccess('readonly') if mibBuilder.loadTexts: ilomCtrlActiveDirectoryCertSubject.setStatus('current') if mibBuilder.loadTexts: ilomCtrlActiveDirectoryCertSubject.setDescription('A string showing the subject of the certificate file.') ilom_ctrl_active_directory_cert_valid_begin = mib_scalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 5, 21), display_string()).setMaxAccess('readonly') if mibBuilder.loadTexts: ilomCtrlActiveDirectoryCertValidBegin.setStatus('current') if mibBuilder.loadTexts: ilomCtrlActiveDirectoryCertValidBegin.setDescription('A string showing the valid start date of the certificate file.') ilom_ctrl_active_directory_cert_valid_end = mib_scalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 5, 22), display_string()).setMaxAccess('readonly') if mibBuilder.loadTexts: ilomCtrlActiveDirectoryCertValidEnd.setStatus('current') if mibBuilder.loadTexts: ilomCtrlActiveDirectoryCertValidEnd.setDescription('A string showing the valid end date of the certificate file.') ilom_ctrl_active_dir_dns_locator_enabled = mib_scalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 5, 23), truth_value()).setMaxAccess('readwrite') if mibBuilder.loadTexts: ilomCtrlActiveDirDnsLocatorEnabled.setStatus('current') if mibBuilder.loadTexts: ilomCtrlActiveDirDnsLocatorEnabled.setDescription('Specifies whether or not the Active Directory DNS Locator functionality is enabled.') ilom_ctrl_active_dir_dns_locator_query_table = mib_table((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 5, 24)) if mibBuilder.loadTexts: ilomCtrlActiveDirDnsLocatorQueryTable.setStatus('current') if mibBuilder.loadTexts: ilomCtrlActiveDirDnsLocatorQueryTable.setDescription('This table is used to configure DNS Locator search queries used to locate the Active Directory server.') ilom_ctrl_active_dir_dns_locator_query_entry = mib_table_row((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 5, 24, 1)).setIndexNames((0, 'SUN-ILOM-CONTROL-MIB', 'ilomCtrlActiveDirDnsLocatorQueryId')) if mibBuilder.loadTexts: ilomCtrlActiveDirDnsLocatorQueryEntry.setStatus('current') if mibBuilder.loadTexts: ilomCtrlActiveDirDnsLocatorQueryEntry.setDescription('An entry for an Active Directory DNS Locator search query.') ilom_ctrl_active_dir_dns_locator_query_id = mib_table_column((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 5, 24, 1, 1), integer32().subtype(subtypeSpec=value_range_constraint(1, 5))) if mibBuilder.loadTexts: ilomCtrlActiveDirDnsLocatorQueryId.setStatus('current') if mibBuilder.loadTexts: ilomCtrlActiveDirDnsLocatorQueryId.setDescription('An integer identifier of the Active Directory DNS Locator Query entry.') ilom_ctrl_active_dir_dns_locator_query_service = mib_table_column((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 5, 24, 1, 2), snmp_admin_string()).setMaxAccess('readwrite') if mibBuilder.loadTexts: ilomCtrlActiveDirDnsLocatorQueryService.setStatus('current') if mibBuilder.loadTexts: ilomCtrlActiveDirDnsLocatorQueryService.setDescription("This string should contain the service name that will be used to perform the DNS query. The name may contain '<DOMAIN>' as a substitution marker, being replaced by the domain information associated for the user at the time of authentication. Also, the optional '<PORT: >' (ie <PORT:636> for standard LDAP/SSL port 636) can be used to override any learned port information if necessary.") ilom_ctrl_active_dir_exp_search_enabled = mib_scalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 5, 25), truth_value()).setMaxAccess('readwrite') if mibBuilder.loadTexts: ilomCtrlActiveDirExpSearchEnabled.setStatus('current') if mibBuilder.loadTexts: ilomCtrlActiveDirExpSearchEnabled.setDescription('Specifies whether or not the Active Directory expanded search query functionality is enabled.') ilom_ctrl_active_dir_strict_credential_error_enabled = mib_scalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 5, 26), truth_value()).setMaxAccess('readwrite') if mibBuilder.loadTexts: ilomCtrlActiveDirStrictCredentialErrorEnabled.setStatus('current') if mibBuilder.loadTexts: ilomCtrlActiveDirStrictCredentialErrorEnabled.setDescription('Specifies whether or not user credential errors for Active Directory cause the user credentials to be completely errored out, or if the credential validation is attempted using any alternate server. When the parameter is true, the first user credential violation takes effect, but when the mode is false, the same user credentionals can be presented to other servers for authentication.') ilom_ctrl_smtp_enabled = mib_scalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 6, 1), truth_value()).setMaxAccess('readwrite') if mibBuilder.loadTexts: ilomCtrlSMTPEnabled.setStatus('current') if mibBuilder.loadTexts: ilomCtrlSMTPEnabled.setDescription('Specifies whether or not the SMTP client is enabled.') ilom_ctrl_smtp_server_ip = mib_scalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 6, 2), ip_address()).setMaxAccess('readwrite') if mibBuilder.loadTexts: ilomCtrlSMTPServerIP.setStatus('current') if mibBuilder.loadTexts: ilomCtrlSMTPServerIP.setDescription('The IP address of the SMTP server used as a name service for user accounts.') ilom_ctrl_smtp_port_number = mib_scalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 6, 3), integer32().subtype(subtypeSpec=value_range_constraint(0, 65535))).setMaxAccess('readwrite') if mibBuilder.loadTexts: ilomCtrlSMTPPortNumber.setStatus('current') if mibBuilder.loadTexts: ilomCtrlSMTPPortNumber.setDescription('Specifies the port number for the SMTP client.') ilom_ctrl_smtp_custom_sender = mib_scalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 6, 4), snmp_admin_string().subtype(subtypeSpec=value_size_constraint(0, 80))).setMaxAccess('readwrite') if mibBuilder.loadTexts: ilomCtrlSMTPCustomSender.setStatus('current') if mibBuilder.loadTexts: ilomCtrlSMTPCustomSender.setDescription("An optional format to identify the sender or the 'from' address. Customizing this string allows the user to specify the exact contents (up to 80 chars) of the 'from' field in the email message. Either one of the substitution strings '<IPADDRESS>' or '<HOSTNAME>' can be used as needed. e.g., ilom-sp@sp1302.dev.sun.com, sun-ilom@[<IPADDRESS>], or ilom-alert@<HOSTNAME>.abc.com. By default, this parameter is an empty string. The 'from' field is formatted by either: 1) alert-rule custom-sender, 2) smtp custom-sender, or 3) the standard ILOM originator.") ilom_ctrl_thd_state = mib_scalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 17, 1), snmp_admin_string()).setMaxAccess('readonly') if mibBuilder.loadTexts: ilomCtrlThdState.setStatus('current') if mibBuilder.loadTexts: ilomCtrlThdState.setDescription('The state of the THD daemon.') ilom_ctrl_thd_action = mib_scalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 17, 2), ilom_ctrl_thd_action()).setMaxAccess('readwrite') if mibBuilder.loadTexts: ilomCtrlThdAction.setStatus('current') if mibBuilder.loadTexts: ilomCtrlThdAction.setDescription('Control action for THD daemon, either suspend or resume.') ilom_ctrl_thd_modules_table = mib_table((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 17, 3)) if mibBuilder.loadTexts: ilomCtrlThdModulesTable.setStatus('current') if mibBuilder.loadTexts: ilomCtrlThdModulesTable.setDescription('A table listing the currently loaded THD modules.') ilom_ctrl_thd_modules_entry = mib_table_row((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 17, 3, 1)).setIndexNames((0, 'SUN-ILOM-CONTROL-MIB', 'ilomCtrlThdModuleName')) if mibBuilder.loadTexts: ilomCtrlThdModulesEntry.setStatus('current') if mibBuilder.loadTexts: ilomCtrlThdModulesEntry.setDescription('An entry for a currently loaded THD module.') ilom_ctrl_thd_module_name = mib_table_column((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 17, 3, 1, 1), ilom_ctrl_target_index()) if mibBuilder.loadTexts: ilomCtrlThdModuleName.setStatus('current') if mibBuilder.loadTexts: ilomCtrlThdModuleName.setDescription('The name of the THD module.') ilom_ctrl_thd_module_desc = mib_table_column((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 17, 3, 1, 2), snmp_admin_string()).setMaxAccess('readonly') if mibBuilder.loadTexts: ilomCtrlThdModuleDesc.setStatus('current') if mibBuilder.loadTexts: ilomCtrlThdModuleDesc.setDescription('The description of the THD module.') ilom_ctrl_thd_module_state = mib_table_column((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 17, 3, 1, 3), snmp_admin_string()).setMaxAccess('readonly') if mibBuilder.loadTexts: ilomCtrlThdModuleState.setStatus('current') if mibBuilder.loadTexts: ilomCtrlThdModuleState.setDescription('The state of the THD module.') ilom_ctrl_thd_module_action = mib_table_column((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 17, 3, 1, 4), ilom_ctrl_thd_action()).setMaxAccess('readwrite') if mibBuilder.loadTexts: ilomCtrlThdModuleAction.setStatus('current') if mibBuilder.loadTexts: ilomCtrlThdModuleAction.setDescription('The control action for the THD module.') ilom_ctrl_thd_instance_table = mib_table((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 17, 4)) if mibBuilder.loadTexts: ilomCtrlThdInstanceTable.setStatus('current') if mibBuilder.loadTexts: ilomCtrlThdInstanceTable.setDescription('A table listing instances of currently loaded THD modules.') ilom_ctrl_thd_instance_entry = mib_table_row((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 17, 4, 1)).setIndexNames((0, 'SUN-ILOM-CONTROL-MIB', 'ilomCtrlThdModName'), (0, 'SUN-ILOM-CONTROL-MIB', 'ilomCtrlThdInstanceName')) if mibBuilder.loadTexts: ilomCtrlThdInstanceEntry.setStatus('current') if mibBuilder.loadTexts: ilomCtrlThdInstanceEntry.setDescription('An entry for a currently loaded THD module.') ilom_ctrl_thd_mod_name = mib_table_column((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 17, 4, 1, 1), ilom_ctrl_mod_target_index()) if mibBuilder.loadTexts: ilomCtrlThdModName.setStatus('current') if mibBuilder.loadTexts: ilomCtrlThdModName.setDescription('The name of the THD class of the instance.') ilom_ctrl_thd_instance_name = mib_table_column((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 17, 4, 1, 2), ilom_ctrl_instance_target_index()) if mibBuilder.loadTexts: ilomCtrlThdInstanceName.setStatus('current') if mibBuilder.loadTexts: ilomCtrlThdInstanceName.setDescription('The name of the instance.') ilom_ctrl_thd_instance_state = mib_table_column((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 17, 4, 1, 3), snmp_admin_string()).setMaxAccess('readonly') if mibBuilder.loadTexts: ilomCtrlThdInstanceState.setStatus('current') if mibBuilder.loadTexts: ilomCtrlThdInstanceState.setDescription('The state of the instance.') ilom_ctrl_thd_instance_action = mib_table_column((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 17, 4, 1, 4), ilom_ctrl_thd_action()).setMaxAccess('readwrite') if mibBuilder.loadTexts: ilomCtrlThdInstanceAction.setStatus('current') if mibBuilder.loadTexts: ilomCtrlThdInstanceAction.setDescription('The control action for instance.') ilom_ctrl_ldap_ssl_global_obj = mib_identifier((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 7, 1)) ilom_ctrl_ldap_ssl_enabled = mib_scalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 7, 1, 1), truth_value()).setMaxAccess('readwrite') if mibBuilder.loadTexts: ilomCtrlLdapSslEnabled.setStatus('current') if mibBuilder.loadTexts: ilomCtrlLdapSslEnabled.setDescription('Specifies whether or not the LDAP/SSL client is enabled.') ilom_ctrl_ldap_ssl_ip = mib_scalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 7, 1, 2), ip_address()).setMaxAccess('readwrite') if mibBuilder.loadTexts: ilomCtrlLdapSslIP.setStatus('current') if mibBuilder.loadTexts: ilomCtrlLdapSslIP.setDescription('The IP address of the LDAP/SSL server used as a directory service for user accounts.') ilom_ctrl_ldap_ssl_port_number = mib_scalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 7, 1, 3), integer32().subtype(subtypeSpec=value_range_constraint(0, 65535))).setMaxAccess('readwrite') if mibBuilder.loadTexts: ilomCtrlLdapSslPortNumber.setStatus('current') if mibBuilder.loadTexts: ilomCtrlLdapSslPortNumber.setDescription('Specifies the port number for the LDAP/SSL client. Specifying 0 as the port means auto-select while specifying 1-65535 configures the actual port value.') ilom_ctrl_ldap_ssl_default_role = mib_scalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 7, 1, 4), ilom_ctrl_user_role()).setMaxAccess('readwrite') if mibBuilder.loadTexts: ilomCtrlLdapSslDefaultRole.setStatus('current') if mibBuilder.loadTexts: ilomCtrlLdapSslDefaultRole.setDescription("Specifies the role that a user authenticated via LDAP/SSL should have. Setting this property to 'Administrator' or 'Operator' will cause the LDAP/SSL client to ignore the schema stored on the server. The user will be granted the corresponding access level. Setting this to an empty string, or 'none' clears the value and indicates that the native LDAP/SSL schema should be used.") ilom_ctrl_ldap_ssl_cert_file_uri = mib_scalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 7, 1, 5), snmp_admin_string()).setMaxAccess('readwrite') if mibBuilder.loadTexts: ilomCtrlLdapSslCertFileURI.setStatus('current') if mibBuilder.loadTexts: ilomCtrlLdapSslCertFileURI.setDescription("The tftp URI of the LDAP/SSL server's certificate file that should be uploaded in order to perform certificate validation. Setting the URI causes the tranfer of the specified file, making the certificate available immediately for certificate authentication. The server certificate file is needed when Strict Cert Mode is enabled. Additionally, either 'remove' or 'restore' are supported for direct certificate manipulation.") ilom_ctrl_ldap_ssl_timeout = mib_scalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 7, 1, 6), integer32().subtype(subtypeSpec=value_range_constraint(1, 20))).setMaxAccess('readwrite') if mibBuilder.loadTexts: ilomCtrlLdapSslTimeout.setStatus('current') if mibBuilder.loadTexts: ilomCtrlLdapSslTimeout.setDescription('Specifies the number of seconds to wait before timing out if the LDAP/SSL Server is not responding.') ilom_ctrl_ldap_ssl_strict_cert_enabled = mib_scalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 7, 1, 7), truth_value()).setMaxAccess('readwrite') if mibBuilder.loadTexts: ilomCtrlLdapSslStrictCertEnabled.setStatus('current') if mibBuilder.loadTexts: ilomCtrlLdapSslStrictCertEnabled.setDescription("Specifies whether or not the Strict Cert Mode is enabled for the LDAP/SSL Client. If enabled, the LDAP/SSL server's certificate must be uploaded to the SP so that certificate validation can be performed when communicating with the LDAP/SSL server.") ilom_ctrl_ldap_ssl_cert_file_status = mib_scalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 7, 1, 8), display_string()).setMaxAccess('readonly') if mibBuilder.loadTexts: ilomCtrlLdapSslCertFileStatus.setStatus('current') if mibBuilder.loadTexts: ilomCtrlLdapSslCertFileStatus.setDescription('A string indicating the status of the certificate file. This is useful in determining whether a certificate file is present or not.') ilom_ctrl_ldap_ssl_log_detail = mib_scalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 7, 1, 9), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(1, 2, 3, 4, 5))).clone(namedValues=named_values(('none', 1), ('high', 2), ('medium', 3), ('low', 4), ('trace', 5)))).setMaxAccess('readwrite') if mibBuilder.loadTexts: ilomCtrlLdapSslLogDetail.setStatus('current') if mibBuilder.loadTexts: ilomCtrlLdapSslLogDetail.setDescription("Controls the amount of messages sent to the event log. The high priority has the least number of messages going to the log, while the lowest priority 'trace' has the most messages logged. When this object is set to 'none', no messages are logged.") ilom_ctrl_ldap_ssl_default_roles = mib_scalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 7, 1, 10), ilom_ctrl_user_roles()).setMaxAccess('readwrite') if mibBuilder.loadTexts: ilomCtrlLdapSslDefaultRoles.setStatus('current') if mibBuilder.loadTexts: ilomCtrlLdapSslDefaultRoles.setDescription("Specifies the role that a user authenticated via LDAP/SSL should have. Setting this property to legacy roles of 'Administrator' or 'Operator', or any of the individual role IDs of 'a', 'u', 'c', 'r', 'o' and 's' will cause the LDAP/SSL client to ignore the schema stored on the LDAP server. Setting this to 'none' clears the value and indicates that the native LDAP/SSL schema should be used. The role IDs can be joined together 'aucros' where a-admin, u-user, c-console, r-reset, s-service and o-readOnly.") ilom_ctrl_ldap_ssl_cert_file_clear = mib_scalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 7, 1, 11), truth_value()).setMaxAccess('readwrite') if mibBuilder.loadTexts: ilomCtrlLdapSslCertFileClear.setStatus('current') if mibBuilder.loadTexts: ilomCtrlLdapSslCertFileClear.setDescription('A variable that will clear the certificate info associated with the server when it is set to true.') ilom_ctrl_ldap_ssl_cert_file_version = mib_scalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 7, 1, 12), display_string()).setMaxAccess('readonly') if mibBuilder.loadTexts: ilomCtrlLdapSslCertFileVersion.setStatus('current') if mibBuilder.loadTexts: ilomCtrlLdapSslCertFileVersion.setDescription('A string indicating the certificate version of the certificate file.') ilom_ctrl_ldap_ssl_cert_file_serial_no = mib_scalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 7, 1, 13), display_string()).setMaxAccess('readonly') if mibBuilder.loadTexts: ilomCtrlLdapSslCertFileSerialNo.setStatus('current') if mibBuilder.loadTexts: ilomCtrlLdapSslCertFileSerialNo.setDescription('A string showing the serial number of the certificate file.') ilom_ctrl_ldap_ssl_cert_file_issuer = mib_scalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 7, 1, 14), display_string()).setMaxAccess('readonly') if mibBuilder.loadTexts: ilomCtrlLdapSslCertFileIssuer.setStatus('current') if mibBuilder.loadTexts: ilomCtrlLdapSslCertFileIssuer.setDescription('A string showing the issuer of the certificate file.') ilom_ctrl_ldap_ssl_cert_file_subject = mib_scalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 7, 1, 15), display_string()).setMaxAccess('readonly') if mibBuilder.loadTexts: ilomCtrlLdapSslCertFileSubject.setStatus('current') if mibBuilder.loadTexts: ilomCtrlLdapSslCertFileSubject.setDescription('A string showing the subject of the certificate file.') ilom_ctrl_ldap_ssl_cert_file_valid_begin = mib_scalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 7, 1, 16), display_string()).setMaxAccess('readonly') if mibBuilder.loadTexts: ilomCtrlLdapSslCertFileValidBegin.setStatus('current') if mibBuilder.loadTexts: ilomCtrlLdapSslCertFileValidBegin.setDescription('A string showing the valid start date of the certificate file.') ilom_ctrl_ldap_ssl_cert_file_valid_end = mib_scalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 7, 1, 17), display_string()).setMaxAccess('readonly') if mibBuilder.loadTexts: ilomCtrlLdapSslCertFileValidEnd.setStatus('current') if mibBuilder.loadTexts: ilomCtrlLdapSslCertFileValidEnd.setDescription('A string showing the valid end date of the certificate file.') ilom_ctrl_ldap_ssl_opt_usr_mapping_enabled = mib_scalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 7, 1, 18), truth_value()).setMaxAccess('readwrite') if mibBuilder.loadTexts: ilomCtrlLdapSslOptUsrMappingEnabled.setStatus('current') if mibBuilder.loadTexts: ilomCtrlLdapSslOptUsrMappingEnabled.setDescription("Specifies whether or not the optional UserMapping feature is enabled. When this feature is enabled, a typical Manager style ldap bind is done first using the specified credentials for the bindDn and bindPw. Then, the user's login name is used as part of the search/filter criteria defined in the attribute-info to obtain the user's official Distinguished Name.") ilom_ctrl_ldap_ssl_opt_usr_mapping_attr_info = mib_scalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 7, 1, 19), snmp_admin_string().subtype(subtypeSpec=value_size_constraint(0, 80))).setMaxAccess('readwrite') if mibBuilder.loadTexts: ilomCtrlLdapSslOptUsrMappingAttrInfo.setStatus('current') if mibBuilder.loadTexts: ilomCtrlLdapSslOptUsrMappingAttrInfo.setDescription("The attribute information used to lookup the user login name to the user's Distinguished Name (DN). Typically, it looks very much like a standard LDAP query or filter. The <USERNAME> prefix will be replaced with the login name as part of the query eg: (&(objectclass=person)(uid=<USERNAME>)).") ilom_ctrl_ldap_ssl_opt_usr_mapping_bind_dn = mib_scalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 7, 1, 20), snmp_admin_string().subtype(subtypeSpec=value_size_constraint(0, 80))).setMaxAccess('readwrite') if mibBuilder.loadTexts: ilomCtrlLdapSslOptUsrMappingBindDn.setStatus('current') if mibBuilder.loadTexts: ilomCtrlLdapSslOptUsrMappingBindDn.setDescription('The Distinguished Name used for the manager style ldap bind so that user lookups can be done.') ilom_ctrl_ldap_ssl_opt_usr_mapping_bind_pw = mib_scalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 7, 1, 21), snmp_admin_string().subtype(subtypeSpec=value_size_constraint(0, 32))).setMaxAccess('readwrite') if mibBuilder.loadTexts: ilomCtrlLdapSslOptUsrMappingBindPw.setStatus('current') if mibBuilder.loadTexts: ilomCtrlLdapSslOptUsrMappingBindPw.setDescription('The password string used for the manager style ldap bind.') ilom_ctrl_ldap_ssl_opt_usr_mapping_search_base = mib_scalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 7, 1, 22), snmp_admin_string().subtype(subtypeSpec=value_size_constraint(0, 80))).setMaxAccess('readwrite') if mibBuilder.loadTexts: ilomCtrlLdapSslOptUsrMappingSearchBase.setStatus('current') if mibBuilder.loadTexts: ilomCtrlLdapSslOptUsrMappingSearchBase.setDescription('The search based used to attempt the user name look up as defined in the attribute information above.') ilom_ctrl_ldap_ssl_user_domain_table = mib_table((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 7, 2)) if mibBuilder.loadTexts: ilomCtrlLdapSslUserDomainTable.setStatus('current') if mibBuilder.loadTexts: ilomCtrlLdapSslUserDomainTable.setDescription('This table is used to configure domain information required for configuring the LDAP/SSL client.') ilom_ctrl_ldap_ssl_user_domain_entry = mib_table_row((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 7, 2, 1)).setIndexNames((0, 'SUN-ILOM-CONTROL-MIB', 'ilomCtrlLdapSslUserDomainId')) if mibBuilder.loadTexts: ilomCtrlLdapSslUserDomainEntry.setStatus('current') if mibBuilder.loadTexts: ilomCtrlLdapSslUserDomainEntry.setDescription('An entry for an LDAP/SSL user domain.') ilom_ctrl_ldap_ssl_user_domain_id = mib_table_column((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 7, 2, 1, 1), integer32().subtype(subtypeSpec=value_range_constraint(1, 5))) if mibBuilder.loadTexts: ilomCtrlLdapSslUserDomainId.setStatus('current') if mibBuilder.loadTexts: ilomCtrlLdapSslUserDomainId.setDescription('An integer identifier of the LDAP/SSL domain.') ilom_ctrl_ldap_ssl_user_domain = mib_table_column((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 7, 2, 1, 2), snmp_admin_string()).setMaxAccess('readwrite') if mibBuilder.loadTexts: ilomCtrlLdapSslUserDomain.setStatus('current') if mibBuilder.loadTexts: ilomCtrlLdapSslUserDomain.setDescription("This string should match exactly with an authentication domain on the LDAP/SSL server. This string should contain a substitution string '<USERNAME>' which will be replaced with the user's login name during authentication. Either the principle or distinguished name format is allowed.") ilom_ctrl_ldap_ssl_admin_groups_table = mib_table((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 7, 3)) if mibBuilder.loadTexts: ilomCtrlLdapSslAdminGroupsTable.setStatus('current') if mibBuilder.loadTexts: ilomCtrlLdapSslAdminGroupsTable.setDescription('This table is used to configure Admin Group information required for configuring the LDAP/SSL client.') ilom_ctrl_ldap_ssl_admin_groups_entry = mib_table_row((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 7, 3, 1)).setIndexNames((0, 'SUN-ILOM-CONTROL-MIB', 'ilomCtrlLdapSslAdminGroupId')) if mibBuilder.loadTexts: ilomCtrlLdapSslAdminGroupsEntry.setStatus('current') if mibBuilder.loadTexts: ilomCtrlLdapSslAdminGroupsEntry.setDescription('An entry for an LDAP/SSL Admin Group.') ilom_ctrl_ldap_ssl_admin_group_id = mib_table_column((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 7, 3, 1, 1), integer32().subtype(subtypeSpec=value_range_constraint(1, 5))) if mibBuilder.loadTexts: ilomCtrlLdapSslAdminGroupId.setStatus('current') if mibBuilder.loadTexts: ilomCtrlLdapSslAdminGroupId.setDescription('An integer identifier of the LDAP/SSL AdminGroup entry.') ilom_ctrl_ldap_ssl_admin_group_name = mib_table_column((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 7, 3, 1, 2), snmp_admin_string()).setMaxAccess('readwrite') if mibBuilder.loadTexts: ilomCtrlLdapSslAdminGroupName.setStatus('current') if mibBuilder.loadTexts: ilomCtrlLdapSslAdminGroupName.setDescription('This string should contain a distinguished name that exactly matches one of the group names on the LDAP/SSL server. Any user belonging to one of these groups in this table will be assigned the ILOM role of Administrator.') ilom_ctrl_ldap_ssl_operator_groups_table = mib_table((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 7, 4)) if mibBuilder.loadTexts: ilomCtrlLdapSslOperatorGroupsTable.setStatus('current') if mibBuilder.loadTexts: ilomCtrlLdapSslOperatorGroupsTable.setDescription('This table is used to configure Operator Group information required for configuring the LDAP/SSL client.') ilom_ctrl_ldap_ssl_operator_groups_entry = mib_table_row((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 7, 4, 1)).setIndexNames((0, 'SUN-ILOM-CONTROL-MIB', 'ilomCtrlLdapSslOperatorGroupId')) if mibBuilder.loadTexts: ilomCtrlLdapSslOperatorGroupsEntry.setStatus('current') if mibBuilder.loadTexts: ilomCtrlLdapSslOperatorGroupsEntry.setDescription('An entry for an LDAP/SSL Operator Group.') ilom_ctrl_ldap_ssl_operator_group_id = mib_table_column((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 7, 4, 1, 1), integer32().subtype(subtypeSpec=value_range_constraint(1, 5))) if mibBuilder.loadTexts: ilomCtrlLdapSslOperatorGroupId.setStatus('current') if mibBuilder.loadTexts: ilomCtrlLdapSslOperatorGroupId.setDescription('An integer identifier of the LDAP/SSL Operator Group entry.') ilom_ctrl_ldap_ssl_operator_group_name = mib_table_column((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 7, 4, 1, 2), snmp_admin_string()).setMaxAccess('readwrite') if mibBuilder.loadTexts: ilomCtrlLdapSslOperatorGroupName.setStatus('current') if mibBuilder.loadTexts: ilomCtrlLdapSslOperatorGroupName.setDescription('This string should contain a distinguished name that exactly matches one of the group names on the LDAP/SSL server. Any user belonging to one of these groups in this table will be assigned the ILOM role of Operator.') ilom_ctrl_ldap_ssl_alternate_server_table = mib_table((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 7, 5)) if mibBuilder.loadTexts: ilomCtrlLdapSslAlternateServerTable.setStatus('current') if mibBuilder.loadTexts: ilomCtrlLdapSslAlternateServerTable.setDescription('This table is used to view and configure alternate server information for the LDAP/SSL client.') ilom_ctrl_ldap_ssl_alternate_server_entry = mib_table_row((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 7, 5, 1)).setIndexNames((0, 'SUN-ILOM-CONTROL-MIB', 'ilomCtrlLdapSslAlternateServerId')) if mibBuilder.loadTexts: ilomCtrlLdapSslAlternateServerEntry.setStatus('current') if mibBuilder.loadTexts: ilomCtrlLdapSslAlternateServerEntry.setDescription('An entry for an LDAP/SSL alternate server table.') ilom_ctrl_ldap_ssl_alternate_server_id = mib_table_column((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 7, 5, 1, 1), integer32().subtype(subtypeSpec=value_range_constraint(1, 5))) if mibBuilder.loadTexts: ilomCtrlLdapSslAlternateServerId.setStatus('current') if mibBuilder.loadTexts: ilomCtrlLdapSslAlternateServerId.setDescription('An integer identifier of the LDAP/SSL alternate server table.') ilom_ctrl_ldap_ssl_alternate_server_ip = mib_table_column((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 7, 5, 1, 2), ip_address()).setMaxAccess('readwrite') if mibBuilder.loadTexts: ilomCtrlLdapSslAlternateServerIp.setStatus('current') if mibBuilder.loadTexts: ilomCtrlLdapSslAlternateServerIp.setDescription('The IP address of the LDAP/SSL alternate server used as directory server for user accounts.') ilom_ctrl_ldap_ssl_alternate_server_port = mib_table_column((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 7, 5, 1, 3), integer32().subtype(subtypeSpec=value_range_constraint(0, 65535))).setMaxAccess('readwrite') if mibBuilder.loadTexts: ilomCtrlLdapSslAlternateServerPort.setStatus('current') if mibBuilder.loadTexts: ilomCtrlLdapSslAlternateServerPort.setDescription('Specifies the port number for the LDAP/SSL alternate server. Specifying 0 as the port indicates that auto-select will use the well known port number. Specifying 1-65535 is used to explicitly set the port number.') ilom_ctrl_ldap_ssl_alternate_server_cert_status = mib_table_column((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 7, 5, 1, 4), display_string()).setMaxAccess('readonly') if mibBuilder.loadTexts: ilomCtrlLdapSslAlternateServerCertStatus.setStatus('current') if mibBuilder.loadTexts: ilomCtrlLdapSslAlternateServerCertStatus.setDescription('A string indicating the status of the certificate file. This is useful in determining whether a certificate file is present or not.') ilom_ctrl_ldap_ssl_alternate_server_cert_uri = mib_table_column((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 7, 5, 1, 5), snmp_admin_string()).setMaxAccess('readwrite') if mibBuilder.loadTexts: ilomCtrlLdapSslAlternateServerCertURI.setStatus('current') if mibBuilder.loadTexts: ilomCtrlLdapSslAlternateServerCertURI.setDescription("This is the URI of a certificate file needed when Strict Cert Mode is enabled. Setting the URI causes the tranfer of the file, making the certificate available immediately for certificate authentication. Additionally, either 'remove' or 'restore' are supported for direct certificate manipulation.") ilom_ctrl_ldap_ssl_alternate_server_cert_clear = mib_table_column((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 7, 5, 1, 6), truth_value()).setMaxAccess('readwrite') if mibBuilder.loadTexts: ilomCtrlLdapSslAlternateServerCertClear.setStatus('current') if mibBuilder.loadTexts: ilomCtrlLdapSslAlternateServerCertClear.setDescription('A variable that will clear the certificate info associated with the server when it is set to true.') ilom_ctrl_ldap_ssl_alternate_server_cert_version = mib_table_column((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 7, 5, 1, 7), display_string()).setMaxAccess('readonly') if mibBuilder.loadTexts: ilomCtrlLdapSslAlternateServerCertVersion.setStatus('current') if mibBuilder.loadTexts: ilomCtrlLdapSslAlternateServerCertVersion.setDescription('A string indicating the certificate version of the alternate server certificate file.') ilom_ctrl_ldap_ssl_alternate_server_cert_serial_no = mib_table_column((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 7, 5, 1, 8), display_string()).setMaxAccess('readonly') if mibBuilder.loadTexts: ilomCtrlLdapSslAlternateServerCertSerialNo.setStatus('current') if mibBuilder.loadTexts: ilomCtrlLdapSslAlternateServerCertSerialNo.setDescription('A string showing the serial number of the alternate server certificate file.') ilom_ctrl_ldap_ssl_alternate_server_cert_issuer = mib_table_column((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 7, 5, 1, 9), display_string()).setMaxAccess('readonly') if mibBuilder.loadTexts: ilomCtrlLdapSslAlternateServerCertIssuer.setStatus('current') if mibBuilder.loadTexts: ilomCtrlLdapSslAlternateServerCertIssuer.setDescription('A string showing the issuer of the alternate server certificate file.') ilom_ctrl_ldap_ssl_alternate_server_cert_subject = mib_table_column((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 7, 5, 1, 10), display_string()).setMaxAccess('readonly') if mibBuilder.loadTexts: ilomCtrlLdapSslAlternateServerCertSubject.setStatus('current') if mibBuilder.loadTexts: ilomCtrlLdapSslAlternateServerCertSubject.setDescription('A string showing the subject of the alternate server certificate file.') ilom_ctrl_ldap_ssl_alternate_server_cert_valid_begin = mib_table_column((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 7, 5, 1, 11), display_string()).setMaxAccess('readonly') if mibBuilder.loadTexts: ilomCtrlLdapSslAlternateServerCertValidBegin.setStatus('current') if mibBuilder.loadTexts: ilomCtrlLdapSslAlternateServerCertValidBegin.setDescription('A string showing the valid start date of the alternate server certificate file.') ilom_ctrl_ldap_ssl_alternate_server_cert_valid_end = mib_table_column((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 7, 5, 1, 12), display_string()).setMaxAccess('readonly') if mibBuilder.loadTexts: ilomCtrlLdapSslAlternateServerCertValidEnd.setStatus('current') if mibBuilder.loadTexts: ilomCtrlLdapSslAlternateServerCertValidEnd.setDescription('A string showing the valid end date of the alternate server certificate file.') ilom_ctrl_ldap_ssl_custom_groups_table = mib_table((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 7, 6)) if mibBuilder.loadTexts: ilomCtrlLdapSslCustomGroupsTable.setStatus('current') if mibBuilder.loadTexts: ilomCtrlLdapSslCustomGroupsTable.setDescription('This table is used to configure custom group information required for configuring the LDAP/SSL client.') ilom_ctrl_ldap_ssl_custom_groups_entry = mib_table_row((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 7, 6, 1)).setIndexNames((0, 'SUN-ILOM-CONTROL-MIB', 'ilomCtrlLdapSslCustomGroupId')) if mibBuilder.loadTexts: ilomCtrlLdapSslCustomGroupsEntry.setStatus('current') if mibBuilder.loadTexts: ilomCtrlLdapSslCustomGroupsEntry.setDescription('An entry for an LDAP/SSLcustom group.') ilom_ctrl_ldap_ssl_custom_group_id = mib_table_column((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 7, 6, 1, 1), integer32().subtype(subtypeSpec=value_range_constraint(1, 5))) if mibBuilder.loadTexts: ilomCtrlLdapSslCustomGroupId.setStatus('current') if mibBuilder.loadTexts: ilomCtrlLdapSslCustomGroupId.setDescription('An integer identifier of the LDAP/SSL custom group entry.') ilom_ctrl_ldap_ssl_custom_group_name = mib_table_column((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 7, 6, 1, 2), snmp_admin_string()).setMaxAccess('readwrite') if mibBuilder.loadTexts: ilomCtrlLdapSslCustomGroupName.setStatus('current') if mibBuilder.loadTexts: ilomCtrlLdapSslCustomGroupName.setDescription("This string should contain a distinguished name that exactly matches one of the group names on the LDAP/SSL server. Any user belonging to one of these groups in this table will be assigned the ILOM role based on the entry's configuration for roles.") ilom_ctrl_ldap_ssl_custom_group_roles = mib_table_column((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 7, 6, 1, 3), ilom_ctrl_user_roles()).setMaxAccess('readwrite') if mibBuilder.loadTexts: ilomCtrlLdapSslCustomGroupRoles.setStatus('current') if mibBuilder.loadTexts: ilomCtrlLdapSslCustomGroupRoles.setDescription("Specifies the role that a user authenticated via LDAP/SSL should have. Setting this property to legacy roles of 'Administrator' or 'Operator', or any of the individual role IDs of 'a', 'u', 'c', 'r', 'o' and 's' will cause the LDAP/SSL client to ignore the schema stored on the LDAP/SSL server. Setting this to 'none' clears the value and indicates that the native LDAP/SSL schema should be used. The role IDs can be joined together 'aucros' where a-admin, u-user, c-console, r-reset, s-service and o-readOnly.") ilom_ctrl_dns_name_servers = mib_scalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 8, 1), snmp_admin_string()).setMaxAccess('readwrite') if mibBuilder.loadTexts: ilomCtrlDNSNameServers.setStatus('current') if mibBuilder.loadTexts: ilomCtrlDNSNameServers.setDescription('Specifies the nameserver for DNS.') ilom_ctrl_dns_search_path = mib_scalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 8, 2), snmp_admin_string()).setMaxAccess('readwrite') if mibBuilder.loadTexts: ilomCtrlDNSSearchPath.setStatus('current') if mibBuilder.loadTexts: ilomCtrlDNSSearchPath.setDescription('Specifies the searchpath for DNS.') ilom_ctrl_dn_sdhcp_auto_dns = mib_scalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 8, 3), truth_value()).setMaxAccess('readwrite') if mibBuilder.loadTexts: ilomCtrlDNSdhcpAutoDns.setStatus('current') if mibBuilder.loadTexts: ilomCtrlDNSdhcpAutoDns.setDescription('Specifies whether or not DHCP autodns is enabled.') ilom_ctrl_dns_timeout = mib_scalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 8, 4), integer32().subtype(subtypeSpec=value_range_constraint(1, 10)).clone(5)).setMaxAccess('readwrite') if mibBuilder.loadTexts: ilomCtrlDNSTimeout.setStatus('current') if mibBuilder.loadTexts: ilomCtrlDNSTimeout.setDescription('Specifies the number of seconds to wait before timing out if the server does not respond.') ilom_ctrl_dns_retries = mib_scalar((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 1, 8, 5), integer32().subtype(subtypeSpec=value_range_constraint(0, 4)).clone(1)).setMaxAccess('readwrite') if mibBuilder.loadTexts: ilomCtrlDNSRetries.setStatus('current') if mibBuilder.loadTexts: ilomCtrlDNSRetries.setDescription('Specifies the number of times a request is attempted again, after a timeout.') ilom_ctrl_objects_group = object_group((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 18, 2, 2)).setObjects(('SUN-ILOM-CONTROL-MIB', 'ilomCtrlDeviceNTPServerOneIP'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlDeviceNTPServerTwoIP'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlLdapEnabled'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlLdapServerIP'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlLdapPortNumber'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlLdapBindDn'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlLdapBindPassword'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlLdapSearchBase'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlLdapDefaultRoles'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlRadiusEnabled'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlRadiusServerIP'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlRadiusPortNumber'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlRadiusSecret'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlRadiusDefaultRoles'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlRemoteSyslogDest1'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlRemoteSyslogDest2'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlActiveDirectoryEnabled'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlActiveDirectoryIP'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlActiveDirectoryPortNumber'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlActiveDirectoryCertFileURI'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlActiveDirectoryTimeout'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlActiveDirectoryStrictCertEnabled'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlActiveDirectoryCertFileStatus'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlActiveDirUserDomain'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlActiveDirAdminGroupName'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlActiveDirOperatorGroupName'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlActiveDirCustomGroupName'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlActiveDirCustomGroupRoles'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlActiveDirAlternateServerIp'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlActiveDirAlternateServerPort'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlActiveDirAlternateServerCertStatus'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlActiveDirAlternateServerCertURI'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlActiveDirAlternateServerCertClear'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlActiveDirAlternateServerCertVersion'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlActiveDirAlternateServerCertSerialNo'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlActiveDirAlternateServerCertIssuer'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlActiveDirAlternateServerCertSubject'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlActiveDirAlternateServerCertValidBegin'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlActiveDirAlternateServerCertValidEnd'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlActiveDirectoryLogDetail'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlActiveDirectoryDefaultRoles'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlActiveDirectoryCertClear'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlActiveDirectoryCertVersion'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlActiveDirectoryCertSerialNo'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlActiveDirectoryCertIssuer'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlActiveDirectoryCertSubject'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlActiveDirectoryCertValidBegin'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlActiveDirectoryCertValidEnd'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlActiveDirDnsLocatorEnabled'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlActiveDirDnsLocatorQueryService'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlActiveDirExpSearchEnabled'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlActiveDirStrictCredentialErrorEnabled'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlSMTPEnabled'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlSMTPServerIP'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlSMTPPortNumber'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlSMTPCustomSender'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlLdapSslEnabled'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlLdapSslIP'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlLdapSslPortNumber'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlLdapSslDefaultRole'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlLdapSslCertFileURI'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlLdapSslTimeout'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlLdapSslStrictCertEnabled'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlLdapSslCertFileStatus'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlLdapSslLogDetail'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlLdapSslDefaultRoles'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlLdapSslCertFileClear'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlLdapSslCertFileVersion'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlLdapSslCertFileSerialNo'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlLdapSslCertFileIssuer'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlLdapSslCertFileSubject'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlLdapSslCertFileValidBegin'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlLdapSslCertFileValidEnd'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlLdapSslOptUsrMappingEnabled'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlLdapSslOptUsrMappingAttrInfo'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlLdapSslOptUsrMappingBindDn'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlLdapSslOptUsrMappingBindPw'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlLdapSslOptUsrMappingSearchBase'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlLdapSslUserDomain'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlLdapSslAdminGroupName'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlLdapSslOperatorGroupName'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlLdapSslCustomGroupName'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlLdapSslCustomGroupRoles'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlLdapSslAlternateServerIp'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlLdapSslAlternateServerPort'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlLdapSslAlternateServerCertStatus'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlLdapSslAlternateServerCertURI'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlLdapSslAlternateServerCertClear'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlLdapSslAlternateServerCertVersion'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlLdapSslAlternateServerCertSerialNo'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlLdapSslAlternateServerCertIssuer'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlLdapSslAlternateServerCertSubject'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlLdapSslAlternateServerCertValidBegin'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlLdapSslAlternateServerCertValidEnd'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlHttpEnabled'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlHttpPortNumber'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlHttpSecureRedirect'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlHttpsEnabled'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlHttpsPortNumber'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlSshRsaKeyFingerprint'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlSshRsaKeyLength'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlSshDsaKeyFingerprint'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlSshDsaKeyLength'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlSshGenerateNewKeyAction'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlSshGenerateNewKeyType'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlSshRestartSshdAction'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlSshEnabled'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlSingleSignonEnabled'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlNetworkMacAddress'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlNetworkIpDiscovery'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlNetworkIpAddress'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlNetworkIpGateway'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlNetworkIpNetmask'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlNetworkPendingIpDiscovery'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlNetworkPendingIpAddress'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlNetworkPendingIpGateway'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlNetworkPendingIpNetmask'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlNetworkCommitPending'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlNetworkDHCPServerAddr'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlNetworkPendingManagementPort'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlNetworkManagementPort'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlNetworkOutOfBandMacAddress'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlNetworkSidebandMacAddress'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlNetworkState'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlLocalUserPassword'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlLocalUserRoles'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlLocalUserRowStatus'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlLocalUserCLIMode'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlSessionsUsername'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlSessionsConnectionType'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlSessionsLoginTime'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlFirmwareMgmtVersion'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlFirmwareBuildNumber'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlFirmwareBuildDate'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlFirmwareTFTPServerIP'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlFirmwareTFTPFileName'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlFirmwarePreserveConfig'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlFirmwareMgmtStatus'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlFirmwareMgmtAction'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlFirmwareMgmtFilesystemVersion'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlFirmwareDelayBIOS'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlEventLogType'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlEventLogTimestamp'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlEventLogClass'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlEventLogSeverity'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlEventLogDescription'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlEventLogClear'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlAlertSeverity'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlAlertType'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlAlertDestinationIP'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlAlertDestinationPort'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlAlertDestinationEmail'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlAlertSNMPVersion'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlAlertSNMPCommunityOrUsername'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlAlertEmailEventClassFilter'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlAlertEmailEventTypeFilter'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlAlertEmailCustomSender'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlAlertEmailMessagePrefix'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlDateAndTime'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlNTPEnabled'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlTimezone'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlSerialInternalPortPresent'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlSerialInternalPortBaudRate'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlSerialExternalPortPresent'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlSerialExternalPortBaudRate'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlSerialExternalPortFlowControl'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlPowerAction'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlResetAction'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlRedundancyStatus'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlRedundancyAction'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlRedundancyFRUName'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlPolicyShortStr'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlPolicyLongStr'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlPolicyEnabled'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlResetToDefaultsAction'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlSPARCDiagsTrigger'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlSPARCDiagsMode'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlSPARCDiagsPowerOnLevel'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlSPARCDiagsUserResetLevel'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlSPARCDiagsErrorResetLevel'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlSPARCDiagsPowerOnVerbosity'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlSPARCDiagsUserResetVerbosity'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlSPARCDiagsErrorResetVerbosity'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlSPARCDiagsStatus'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlSPARCDiagsAction'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlSPARCDiagsHwChangeLevel'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlSPARCDiagsHwChangeVerbosity'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlSPARCHostMACAddress'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlSPARCHostOBPVersion'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlSPARCHostPOSTVersion'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlSPARCHostAutoRunOnError'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlSPARCHostPOSTStatus'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlSPARCHostAutoRestartPolicy'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlSPARCHostIoReconfigurePolicy'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlSPARCHostOSBootStatus'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlSPARCHostBootTimeout'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlSPARCHostBootRestart'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlSPARCHostMaxBootFail'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlSPARCHostBootFailRecovery'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlSPARCHostHypervisorVersion'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlSPARCHostSysFwVersion'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlSPARCHostGMVersion'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlSPARCHostSendBreakAction'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlSPARCBootModeState'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlSPARCBootModeScript'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlSPARCBootModeExpires'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlSPARCBootModeLDOMConfig'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlSPARCKeySwitchState'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlSystemIdentifier'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlHostName'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlThdState'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlThdAction'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlThdModuleDesc'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlThdModuleState'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlThdModuleAction'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlThdInstanceState'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlThdInstanceAction'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlBackupAndRestoreTargetURI'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlBackupAndRestorePassphrase'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlBackupAndRestoreAction'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlBackupAndRestoreActionStatus'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlDNSNameServers'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlDNSSearchPath'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlDNSdhcpAutoDns'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlDNSTimeout'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlDNSRetries')) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): ilom_ctrl_objects_group = ilomCtrlObjectsGroup.setStatus('current') if mibBuilder.loadTexts: ilomCtrlObjectsGroup.setDescription('The group of current objects.') ilom_ctrl_deprecated_objects_group = object_group((1, 3, 6, 1, 4, 1, 42, 2, 175, 102, 18, 2, 1)).setObjects(('SUN-ILOM-CONTROL-MIB', 'ilomCtrlLdapDefaultRole'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlRadiusDefaultRole'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlLocalUserAuthPassword'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlLocalUserAuthRole'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlLocalUserAuthRowStatus'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlLocalUserAuthCLIMode'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlSPARCDiagsLevel'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlSPARCDiagsVerbosity'), ('SUN-ILOM-CONTROL-MIB', 'ilomCtrlActiveDirectoryDefaultRole')) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): ilom_ctrl_deprecated_objects_group = ilomCtrlDeprecatedObjectsGroup.setStatus('deprecated') if mibBuilder.loadTexts: ilomCtrlDeprecatedObjectsGroup.setDescription('The objects that have been deprecated.') mibBuilder.exportSymbols('SUN-ILOM-CONTROL-MIB', ilomCtrlNetworkOutOfBandMacAddress=ilomCtrlNetworkOutOfBandMacAddress, ilomCtrlActiveDirUserDomainEntry=ilomCtrlActiveDirUserDomainEntry, ilomCtrlAlertDestinationEmail=ilomCtrlAlertDestinationEmail, ilomCtrlLdapSslCustomGroupRoles=ilomCtrlLdapSslCustomGroupRoles, ilomCtrlAlertDestinationIP=ilomCtrlAlertDestinationIP, ilomCtrlActiveDirOperatorGroupsTable=ilomCtrlActiveDirOperatorGroupsTable, ilomCtrlRemoteSyslog=ilomCtrlRemoteSyslog, ilomCtrlActiveDirAlternateServerCertSerialNo=ilomCtrlActiveDirAlternateServerCertSerialNo, ilomCtrlSingleSignonEnabled=ilomCtrlSingleSignonEnabled, sun=sun, ilomCtrlActiveDirectoryCertValidEnd=ilomCtrlActiveDirectoryCertValidEnd, ilomCtrlSPARCHostAutoRunOnError=ilomCtrlSPARCHostAutoRunOnError, ilomCtrlActiveDirectoryCertSubject=ilomCtrlActiveDirectoryCertSubject, ilomCtrlActiveDirectoryDefaultRoles=ilomCtrlActiveDirectoryDefaultRoles, ilomCtrlNetworkPendingIpAddress=ilomCtrlNetworkPendingIpAddress, ilomCtrlActiveDirAlternateServerPort=ilomCtrlActiveDirAlternateServerPort, ilomCtrlSerialExternalPortPresent=ilomCtrlSerialExternalPortPresent, ilomCtrlActiveDirAdminGroupName=ilomCtrlActiveDirAdminGroupName, ilomCtrlActiveDirectoryCertVersion=ilomCtrlActiveDirectoryCertVersion, ilomCtrlThdModuleState=ilomCtrlThdModuleState, ilomCtrlSPARC=ilomCtrlSPARC, ilomCtrlActiveDirectoryCertClear=ilomCtrlActiveDirectoryCertClear, ilomCtrlThdState=ilomCtrlThdState, ilomCtrlActiveDirOperatorGroupName=ilomCtrlActiveDirOperatorGroupName, ilomCtrlAlertSNMPVersion=ilomCtrlAlertSNMPVersion, ilomCtrlSPARCDiagsStatus=ilomCtrlSPARCDiagsStatus, ILOMCtrlSPARCBootModeState=ILOMCtrlSPARCBootModeState, ilomCtrlSPARCBootModeExpires=ilomCtrlSPARCBootModeExpires, ilomCtrlLocalUserRowStatus=ilomCtrlLocalUserRowStatus, ilomCtrlAlertSeverity=ilomCtrlAlertSeverity, ILOMCtrlLocalUserAuthCLIMode=ILOMCtrlLocalUserAuthCLIMode, ilomCtrlPolicyShortStr=ilomCtrlPolicyShortStr, ilomCtrlConfigMgmt=ilomCtrlConfigMgmt, ilomCtrlRadiusPortNumber=ilomCtrlRadiusPortNumber, ilomCtrlSerialExternalPortFlowControl=ilomCtrlSerialExternalPortFlowControl, ilomCtrlFirmwareDelayBIOS=ilomCtrlFirmwareDelayBIOS, ilomCtrlLdapSslAlternateServerCertURI=ilomCtrlLdapSslAlternateServerCertURI, ilomCtrlSPARCDiagsPowerOnVerbosity=ilomCtrlSPARCDiagsPowerOnVerbosity, ilomCtrlSessionsLoginTime=ilomCtrlSessionsLoginTime, ilomCtrlDNS=ilomCtrlDNS, ilomCtrlLdapSslTimeout=ilomCtrlLdapSslTimeout, ilomCtrlCompliances=ilomCtrlCompliances, ilomCtrlLdapSslAlternateServerCertValidEnd=ilomCtrlLdapSslAlternateServerCertValidEnd, ilomCtrlDNSSearchPath=ilomCtrlDNSSearchPath, ILOMCtrlFirmwareUpdateAction=ILOMCtrlFirmwareUpdateAction, ilomCtrlActiveDirectoryStrictCertEnabled=ilomCtrlActiveDirectoryStrictCertEnabled, ilomCtrlSPARCDiagsErrorResetLevel=ilomCtrlSPARCDiagsErrorResetLevel, ilomCtrlFirmwareMgmtStatus=ilomCtrlFirmwareMgmtStatus, ilomCtrlActiveDirOperatorGroupId=ilomCtrlActiveDirOperatorGroupId, ilomCtrlResetTarget=ilomCtrlResetTarget, ilomCtrlBackupAndRestore=ilomCtrlBackupAndRestore, ILOMCtrlSPARCDiagsAction=ILOMCtrlSPARCDiagsAction, ilomCtrlThdInstanceAction=ilomCtrlThdInstanceAction, ilomCtrlNetworkEntry=ilomCtrlNetworkEntry, ilomCtrlActiveDirAlternateServerTable=ilomCtrlActiveDirAlternateServerTable, ilomCtrlSPARCKeySwitchState=ilomCtrlSPARCKeySwitchState, ilomCtrlSPARCDiagsAction=ilomCtrlSPARCDiagsAction, ilomCtrlSMTPPortNumber=ilomCtrlSMTPPortNumber, ilomCtrlPolicyEntry=ilomCtrlPolicyEntry, ilomCtrlSshRestartSshdAction=ilomCtrlSshRestartSshdAction, ILOMCtrlLocalUserPassword=ILOMCtrlLocalUserPassword, ilomCtrlLdapSslCertFileIssuer=ilomCtrlLdapSslCertFileIssuer, ilomCtrlNetworkTable=ilomCtrlNetworkTable, ilomCtrlLdapDefaultRole=ilomCtrlLdapDefaultRole, ilomCtrlLdapSslCustomGroupsEntry=ilomCtrlLdapSslCustomGroupsEntry, ilomCtrlNetworkIpGateway=ilomCtrlNetworkIpGateway, ilomCtrlSPARCBootModeLDOMConfig=ilomCtrlSPARCBootModeLDOMConfig, ilomCtrlNtp=ilomCtrlNtp, ilomCtrlSPARCKeySwitch=ilomCtrlSPARCKeySwitch, ilomCtrlPowerTarget=ilomCtrlPowerTarget, ilomCtrlNetworkTarget=ilomCtrlNetworkTarget, ILOMCtrlSPARCKeySwitchState=ILOMCtrlSPARCKeySwitchState, ilomCtrlLdapSslLogDetail=ilomCtrlLdapSslLogDetail, ilomCtrlActiveDirCustomGroupId=ilomCtrlActiveDirCustomGroupId, ilomCtrlActiveDirectoryCertIssuer=ilomCtrlActiveDirectoryCertIssuer, ilomCtrlDNSRetries=ilomCtrlDNSRetries, ilomCtrlActiveDirAlternateServerCertURI=ilomCtrlActiveDirAlternateServerCertURI, ilomCtrlSPARCHostSysFwVersion=ilomCtrlSPARCHostSysFwVersion, ilomCtrlLdapSslOperatorGroupId=ilomCtrlLdapSslOperatorGroupId, ILOMCtrlResetToDefaultsAction=ILOMCtrlResetToDefaultsAction, ilomCtrlRedundancyFRUName=ilomCtrlRedundancyFRUName, ilomCtrlLdapSslAdminGroupName=ilomCtrlLdapSslAdminGroupName, ilomCtrlLocalUserRoles=ilomCtrlLocalUserRoles, ilomCtrlLdapPortNumber=ilomCtrlLdapPortNumber, ilomCtrlLdapSearchBase=ilomCtrlLdapSearchBase, ilomCtrlServices=ilomCtrlServices, ilomCtrlNetwork=ilomCtrlNetwork, ilomCtrlHttps=ilomCtrlHttps, ilomCtrlActiveDirectoryCertFileStatus=ilomCtrlActiveDirectoryCertFileStatus, ILOMCtrlPowerAction=ILOMCtrlPowerAction, ilomCtrlRadiusServerIP=ilomCtrlRadiusServerIP, ilomCtrlAlertEmailCustomSender=ilomCtrlAlertEmailCustomSender, ilomCtrlLocalUserAuthEntry=ilomCtrlLocalUserAuthEntry, ilomCtrlLdapSslCertFileValidEnd=ilomCtrlLdapSslCertFileValidEnd, ilomCtrlActiveDirAlternateServerCertVersion=ilomCtrlActiveDirAlternateServerCertVersion, ilomCtrlSPARCDiagsErrorResetVerbosity=ilomCtrlSPARCDiagsErrorResetVerbosity, ILOMCtrlInstanceTargetIndex=ILOMCtrlInstanceTargetIndex, ilomCtrlAlertEmailEventClassFilter=ilomCtrlAlertEmailEventClassFilter, ilomCtrlObjectsGroup=ilomCtrlObjectsGroup, ilomCtrlAlerts=ilomCtrlAlerts, ilomCtrlLdapSslStrictCertEnabled=ilomCtrlLdapSslStrictCertEnabled, ILOMCtrlSshKeyGenType=ILOMCtrlSshKeyGenType, products=products, ilomCtrlSMTPServerIP=ilomCtrlSMTPServerIP, ilomCtrlActiveDirectoryEnabled=ilomCtrlActiveDirectoryEnabled, ilomCtrlThdInstanceName=ilomCtrlThdInstanceName, ilomCtrlRedundancy=ilomCtrlRedundancy, ilomCtrlNTPEnabled=ilomCtrlNTPEnabled, ilomCtrlHttpsPortNumber=ilomCtrlHttpsPortNumber, ilomCtrlFirmwareBuildDate=ilomCtrlFirmwareBuildDate, ilomCtrlLdapSslAlternateServerCertSerialNo=ilomCtrlLdapSslAlternateServerCertSerialNo, ilomCtrlLocalUserAuthCLIMode=ilomCtrlLocalUserAuthCLIMode, ilomCtrlLdapSslUserDomainId=ilomCtrlLdapSslUserDomainId, ilomCtrlSPARCDiagsHwChangeLevel=ilomCtrlSPARCDiagsHwChangeLevel, ilomCtrlSPARCHostAutoRestartPolicy=ilomCtrlSPARCHostAutoRestartPolicy, ilomCtrlSshDsaKeyFingerprint=ilomCtrlSshDsaKeyFingerprint, ilomCtrlPowerAction=ilomCtrlPowerAction, ilomCtrlSerialInternalPortBaudRate=ilomCtrlSerialInternalPortBaudRate, ilomCtrlAlertsEntry=ilomCtrlAlertsEntry, ilomCtrlActiveDirectoryCertFileURI=ilomCtrlActiveDirectoryCertFileURI, ilomCtrlSessionsTable=ilomCtrlSessionsTable, ilomCtrlActiveDirectoryCertSerialNo=ilomCtrlActiveDirectoryCertSerialNo, ilomCtrlLdapSslOperatorGroupName=ilomCtrlLdapSslOperatorGroupName, ilomCtrlResetControl=ilomCtrlResetControl, ilomCtrlRadiusEnabled=ilomCtrlRadiusEnabled, ilomCtrlLdapSslOptUsrMappingBindPw=ilomCtrlLdapSslOptUsrMappingBindPw, ilomCtrlActiveDirUserDomain=ilomCtrlActiveDirUserDomain, ilomCtrlActiveDirOperatorGroupsEntry=ilomCtrlActiveDirOperatorGroupsEntry, ilomCtrlLdapSslAdminGroupId=ilomCtrlLdapSslAdminGroupId, ilomCtrlLdapSslAlternateServerPort=ilomCtrlLdapSslAlternateServerPort, ilomCtrlLdapSslAdminGroupsEntry=ilomCtrlLdapSslAdminGroupsEntry, ilomCtrlRadius=ilomCtrlRadius, ilomCtrlPowerEntry=ilomCtrlPowerEntry, ilomCtrlBackupAndRestoreActionStatus=ilomCtrlBackupAndRestoreActionStatus, ilomCtrlSessions=ilomCtrlSessions, ilomCtrlActiveDirDnsLocatorQueryId=ilomCtrlActiveDirDnsLocatorQueryId, ilomCtrlThdModulesEntry=ilomCtrlThdModulesEntry, ilomCtrlSystemIdentifier=ilomCtrlSystemIdentifier, ILOMCtrlBackupAndRestoreAction=ILOMCtrlBackupAndRestoreAction, ilomCtrlPowerTable=ilomCtrlPowerTable, ilomCtrlSPARCDiagsLevel=ilomCtrlSPARCDiagsLevel, ilomCtrlLdapSsl=ilomCtrlLdapSsl, ilomCtrlLdapSslCustomGroupId=ilomCtrlLdapSslCustomGroupId, ilomCtrlActiveDirDnsLocatorQueryService=ilomCtrlActiveDirDnsLocatorQueryService, ilomCtrlThdInstanceState=ilomCtrlThdInstanceState, ilomCtrlSerialInternalPortPresent=ilomCtrlSerialInternalPortPresent, ilomCtrlAlertEmailEventTypeFilter=ilomCtrlAlertEmailEventTypeFilter, ilomCtrlEventLog=ilomCtrlEventLog, ILOMCtrlFirmwareUpdateStatus=ILOMCtrlFirmwareUpdateStatus, ilomCtrlSPARCHostBootRestart=ilomCtrlSPARCHostBootRestart, ilomCtrlLdapSslUserDomainTable=ilomCtrlLdapSslUserDomainTable, ilomCtrlBackupAndRestoreAction=ilomCtrlBackupAndRestoreAction, ilomCtrlFirmwareBuildNumber=ilomCtrlFirmwareBuildNumber, ilomCtrlSPARCHostPOSTVersion=ilomCtrlSPARCHostPOSTVersion, ilomCtrlEventLogDescription=ilomCtrlEventLogDescription, ilomCtrlLocalUserEntry=ilomCtrlLocalUserEntry, ilomCtrlConformances=ilomCtrlConformances, ilomCtrlPowerReset=ilomCtrlPowerReset, ilomCtrlSessionsUsername=ilomCtrlSessionsUsername, ilomCtrlFirmwareMgmtFilesystemVersion=ilomCtrlFirmwareMgmtFilesystemVersion, ILOMCtrlTargetIndex=ILOMCtrlTargetIndex, ilomCtrlDeprecatedObjectsGroup=ilomCtrlDeprecatedObjectsGroup, ilomCtrlActiveDirAdminGroupId=ilomCtrlActiveDirAdminGroupId, ilomCtrlActiveDirectoryCertValidBegin=ilomCtrlActiveDirectoryCertValidBegin, ilomCtrlSingleSignon=ilomCtrlSingleSignon, ilomCtrlNetworkPendingIpGateway=ilomCtrlNetworkPendingIpGateway, ilomCtrlSPARCBootMode=ilomCtrlSPARCBootMode, ilomCtrlThdModuleName=ilomCtrlThdModuleName, ilomCtrlSPARCDiags=ilomCtrlSPARCDiags, ilomCtrlEventLogTable=ilomCtrlEventLogTable, ilomCtrlUsers=ilomCtrlUsers, ilomCtrlRemoteSyslogDest2=ilomCtrlRemoteSyslogDest2, ilomCtrlSPARCHostControl=ilomCtrlSPARCHostControl, ilomCtrlSshRsaKeyLength=ilomCtrlSshRsaKeyLength, ilomCtrlDeviceNTPServerOneIP=ilomCtrlDeviceNTPServerOneIP, ilomCtrlRadiusSecret=ilomCtrlRadiusSecret, ilomCtrlSshRsaKeyFingerprint=ilomCtrlSshRsaKeyFingerprint, ilomCtrlDNSNameServers=ilomCtrlDNSNameServers, ilomCtrlNetworkState=ilomCtrlNetworkState, ilomCtrlThdInstanceTable=ilomCtrlThdInstanceTable, ilomCtrlSPARCHostSendBreakAction=ilomCtrlSPARCHostSendBreakAction, ilomCtrlActiveDirDnsLocatorEnabled=ilomCtrlActiveDirDnsLocatorEnabled, ilomCtrlPolicy=ilomCtrlPolicy, ilomCtrlFirmwareTFTPFileName=ilomCtrlFirmwareTFTPFileName, ilomCtrlSshGenerateNewKeyType=ilomCtrlSshGenerateNewKeyType, ilomCtrlLdapBindPassword=ilomCtrlLdapBindPassword, ilomCtrlRedundancyStatus=ilomCtrlRedundancyStatus, ilomCtrlSPARCHostHypervisorVersion=ilomCtrlSPARCHostHypervisorVersion, ilomCtrlLdapSslAlternateServerCertValidBegin=ilomCtrlLdapSslAlternateServerCertValidBegin, ilomCtrlSsh=ilomCtrlSsh, ilomCtrlSPARCHostMACAddress=ilomCtrlSPARCHostMACAddress, ilomCtrlLdapSslUserDomainEntry=ilomCtrlLdapSslUserDomainEntry, ilomCtrlRadiusDefaultRoles=ilomCtrlRadiusDefaultRoles, ilomCtrlNetworkCommitPending=ilomCtrlNetworkCommitPending, ilomCtrlActiveDirectoryLogDetail=ilomCtrlActiveDirectoryLogDetail, ilomCtrlActiveDirUserDomainTable=ilomCtrlActiveDirUserDomainTable, ilomCtrlSPARCHostBootFailRecovery=ilomCtrlSPARCHostBootFailRecovery, ilomCtrlActiveDirUserDomainId=ilomCtrlActiveDirUserDomainId, ilomCtrlActiveDirStrictCredentialErrorEnabled=ilomCtrlActiveDirStrictCredentialErrorEnabled, ilomCtrlSMTPCustomSender=ilomCtrlSMTPCustomSender, ilomCtrlLocalUserAuthTable=ilomCtrlLocalUserAuthTable, ilomCtrlLdapEnabled=ilomCtrlLdapEnabled, ilomCtrlThdModuleDesc=ilomCtrlThdModuleDesc, ilomCtrlLocalUserPassword=ilomCtrlLocalUserPassword, ilomCtrlAlertID=ilomCtrlAlertID, ilomCtrlLdap=ilomCtrlLdap, ILOMCtrlSPARCDiagsTrigger=ILOMCtrlSPARCDiagsTrigger, ilomCtrlAlertEmailMessagePrefix=ilomCtrlAlertEmailMessagePrefix, ILOMCtrlRedundancyAction=ILOMCtrlRedundancyAction, ilomCtrlLdapSslCertFileVersion=ilomCtrlLdapSslCertFileVersion, ilomCtrlActiveDirAlternateServerId=ilomCtrlActiveDirAlternateServerId, ILOMCtrlEventLogClass=ILOMCtrlEventLogClass, ILOMCtrlSPARCHostSendBreakAction=ILOMCtrlSPARCHostSendBreakAction, ilomCtrlAlertsTable=ilomCtrlAlertsTable, ilomCtrlActiveDirAlternateServerEntry=ilomCtrlActiveDirAlternateServerEntry, ilomCtrlResetAction=ilomCtrlResetAction, ilomCtrlThdModName=ilomCtrlThdModName, ilomCtrlActiveDirectoryDefaultRole=ilomCtrlActiveDirectoryDefaultRole, ilomCtrlLdapSslCertFileURI=ilomCtrlLdapSslCertFileURI, ilomCtrlLdapSslCustomGroupName=ilomCtrlLdapSslCustomGroupName, PYSNMP_MODULE_ID=ilomCtrlMIB, ilomCtrlSPARCHostIoReconfigurePolicy=ilomCtrlSPARCHostIoReconfigurePolicy, ilomCtrlLdapDefaultRoles=ilomCtrlLdapDefaultRoles, ilomCtrlLdapSslEnabled=ilomCtrlLdapSslEnabled, ilomCtrlActiveDirDnsLocatorQueryTable=ilomCtrlActiveDirDnsLocatorQueryTable, ILOMCtrlSPARCHostBootFailRecovery=ILOMCtrlSPARCHostBootFailRecovery, ilomCtrlThdModuleAction=ilomCtrlThdModuleAction, ilomCtrlSPARCHostMaxBootFail=ilomCtrlSPARCHostMaxBootFail, ilomCtrlActiveDirCustomGroupName=ilomCtrlActiveDirCustomGroupName, ilomCtrlSPARCHostPOSTStatus=ilomCtrlSPARCHostPOSTStatus, ilomCtrlClients=ilomCtrlClients, ilom=ilom, ilomCtrlHttpEnabled=ilomCtrlHttpEnabled, ilomCtrlSPARCHostBootTimeout=ilomCtrlSPARCHostBootTimeout, ilomCtrlLdapSslCertFileClear=ilomCtrlLdapSslCertFileClear, ilomCtrlLdapSslAlternateServerCertClear=ilomCtrlLdapSslAlternateServerCertClear, ILOMCtrlThdAction=ILOMCtrlThdAction, ilomCtrlSessionsId=ilomCtrlSessionsId, ilomCtrlLdapSslGlobalObj=ilomCtrlLdapSslGlobalObj, ILOMCtrlModTargetIndex=ILOMCtrlModTargetIndex, ILOMCtrlSPARCHostIoReconfigurePolicy=ILOMCtrlSPARCHostIoReconfigurePolicy, ilomCtrlRedundancyAction=ilomCtrlRedundancyAction, ilomCtrlSPARCDiagsVerbosity=ilomCtrlSPARCDiagsVerbosity, ilomCtrlLdapSslOperatorGroupsEntry=ilomCtrlLdapSslOperatorGroupsEntry, ilomCtrlFirmwarePreserveConfig=ilomCtrlFirmwarePreserveConfig, ilomCtrlAlertSNMPCommunityOrUsername=ilomCtrlAlertSNMPCommunityOrUsername, ilomCtrlActiveDirAlternateServerCertStatus=ilomCtrlActiveDirAlternateServerCertStatus, ilomCtrlFirmwareMgmt=ilomCtrlFirmwareMgmt, ilomCtrlSPARCDiagsHwChangeVerbosity=ilomCtrlSPARCDiagsHwChangeVerbosity, ilomCtrlLdapSslIP=ilomCtrlLdapSslIP, ILOMCtrlAlertSNMPVersion=ILOMCtrlAlertSNMPVersion, ILOMCtrlEventSeverity=ILOMCtrlEventSeverity, ilomCtrlThdModulesTable=ilomCtrlThdModulesTable, ilomCtrlActiveDirectoryPortNumber=ilomCtrlActiveDirectoryPortNumber) mibBuilder.exportSymbols('SUN-ILOM-CONTROL-MIB', ilomCtrlActiveDirectory=ilomCtrlActiveDirectory, ilomCtrlPolicyTable=ilomCtrlPolicyTable, ilomCtrlLdapSslCertFileSubject=ilomCtrlLdapSslCertFileSubject, ilomCtrlLocalUserUsername=ilomCtrlLocalUserUsername, ilomCtrlEventLogClass=ilomCtrlEventLogClass, ilomCtrlSPARCBootModeState=ilomCtrlSPARCBootModeState, ilomCtrlRemoteSyslogDest1=ilomCtrlRemoteSyslogDest1, ilomCtrlEventLogType=ilomCtrlEventLogType, ilomCtrlLdapBindDn=ilomCtrlLdapBindDn, ilomCtrlActiveDirAlternateServerIp=ilomCtrlActiveDirAlternateServerIp, ILOMCtrlNetworkIpDiscovery=ILOMCtrlNetworkIpDiscovery, ilomCtrlActiveDirectoryIP=ilomCtrlActiveDirectoryIP, ilomCtrlThdAction=ilomCtrlThdAction, ilomCtrlLdapSslAlternateServerIp=ilomCtrlLdapSslAlternateServerIp, ilomCtrlEventLogEntry=ilomCtrlEventLogEntry, ilomCtrlThd=ilomCtrlThd, ilomCtrlLdapSslAlternateServerTable=ilomCtrlLdapSslAlternateServerTable, ilomCtrlTimezone=ilomCtrlTimezone, ilomCtrlPolicyId=ilomCtrlPolicyId, ilomCtrlNetworkIpAddress=ilomCtrlNetworkIpAddress, ilomCtrlNetworkPendingIpDiscovery=ilomCtrlNetworkPendingIpDiscovery, ilomCtrlDateAndTime=ilomCtrlDateAndTime, ilomCtrlLdapSslAlternateServerCertIssuer=ilomCtrlLdapSslAlternateServerCertIssuer, ILOMCtrlSPARCDiagsVerbosityAdv=ILOMCtrlSPARCDiagsVerbosityAdv, ilomCtrlSMTPEnabled=ilomCtrlSMTPEnabled, ilomCtrlActiveDirAlternateServerCertValidEnd=ilomCtrlActiveDirAlternateServerCertValidEnd, ilomCtrlClock=ilomCtrlClock, ilomCtrlSMTP=ilomCtrlSMTP, ilomCtrlLocalUserTable=ilomCtrlLocalUserTable, ilomCtrlDNSdhcpAutoDns=ilomCtrlDNSdhcpAutoDns, ilomCtrlSPARCHostGMVersion=ilomCtrlSPARCHostGMVersion, ilomCtrlLogs=ilomCtrlLogs, ilomCtrlEventLogRecordID=ilomCtrlEventLogRecordID, ilomCtrlSPARCDiagsTrigger=ilomCtrlSPARCDiagsTrigger, ilomCtrlActiveDirAdminGroupsTable=ilomCtrlActiveDirAdminGroupsTable, ilomCtrlFirmwareTFTPServerIP=ilomCtrlFirmwareTFTPServerIP, ILOMCtrlSPARCHostBootRestart=ILOMCtrlSPARCHostBootRestart, ILOMCtrlSessionsConnectionType=ILOMCtrlSessionsConnectionType, ilomCtrlNetworkManagementPort=ilomCtrlNetworkManagementPort, ilomCtrlPolicyEnabled=ilomCtrlPolicyEnabled, ilomCtrlActiveDirCustomGroupsEntry=ilomCtrlActiveDirCustomGroupsEntry, ilomCtrlLdapServerIP=ilomCtrlLdapServerIP, ilomCtrlLdapSslAlternateServerId=ilomCtrlLdapSslAlternateServerId, ilomCtrlHttpSecureRedirect=ilomCtrlHttpSecureRedirect, ilomCtrlLdapSslCertFileStatus=ilomCtrlLdapSslCertFileStatus, ilomCtrlLdapSslDefaultRole=ilomCtrlLdapSslDefaultRole, ilomCtrlLdapSslCertFileValidBegin=ilomCtrlLdapSslCertFileValidBegin, ilomCtrlSPARCHostOSBootStatus=ilomCtrlSPARCHostOSBootStatus, ilomCtrlActiveDirAlternateServerCertValidBegin=ilomCtrlActiveDirAlternateServerCertValidBegin, ilomCtrlFirmwareMgmtAction=ilomCtrlFirmwareMgmtAction, ilomCtrlEventLogTimestamp=ilomCtrlEventLogTimestamp, ilomCtrlLdapSslAdminGroupsTable=ilomCtrlLdapSslAdminGroupsTable, ilomCtrlLdapSslOptUsrMappingAttrInfo=ilomCtrlLdapSslOptUsrMappingAttrInfo, ILOMCtrlAlertType=ILOMCtrlAlertType, ilomCtrlResetToDefaultsAction=ilomCtrlResetToDefaultsAction, ilomCtrlLdapSslOperatorGroupsTable=ilomCtrlLdapSslOperatorGroupsTable, ilomCtrlEventLogClear=ilomCtrlEventLogClear, ilomCtrlNetworkIpNetmask=ilomCtrlNetworkIpNetmask, ilomCtrlBackupAndRestoreTargetURI=ilomCtrlBackupAndRestoreTargetURI, ilomCtrlLdapSslCustomGroupsTable=ilomCtrlLdapSslCustomGroupsTable, ilomCtrlSshEnabled=ilomCtrlSshEnabled, ILOMCtrlSPARCDiagsLevelAdv=ILOMCtrlSPARCDiagsLevelAdv, ILOMCtrlSPARCDiagsLevel=ILOMCtrlSPARCDiagsLevel, ilomCtrlNetworkIpDiscovery=ilomCtrlNetworkIpDiscovery, ilomCtrlLdapSslDefaultRoles=ilomCtrlLdapSslDefaultRoles, ilomCtrlActiveDirAlternateServerCertIssuer=ilomCtrlActiveDirAlternateServerCertIssuer, ilomCtrlLdapSslUserDomain=ilomCtrlLdapSslUserDomain, ilomCtrlLocalUserAuthRowStatus=ilomCtrlLocalUserAuthRowStatus, ilomCtrlLdapSslOptUsrMappingBindDn=ilomCtrlLdapSslOptUsrMappingBindDn, ilomCtrlSshDsaKeyLength=ilomCtrlSshDsaKeyLength, ilomCtrlGroups=ilomCtrlGroups, ilomCtrlNetworkSidebandMacAddress=ilomCtrlNetworkSidebandMacAddress, ilomCtrlLdapSslPortNumber=ilomCtrlLdapSslPortNumber, ilomCtrlPowerControl=ilomCtrlPowerControl, ilomCtrlAlertDestinationPort=ilomCtrlAlertDestinationPort, ILOMCtrlSPARCDiagsVerbosity=ILOMCtrlSPARCDiagsVerbosity, ilomCtrlResetTable=ilomCtrlResetTable, ILOMCtrlUserRole=ILOMCtrlUserRole, ilomCtrlResetEntry=ilomCtrlResetEntry, ilomCtrlIdentification=ilomCtrlIdentification, ilomCtrlHostName=ilomCtrlHostName, ilomCtrlHttpPortNumber=ilomCtrlHttpPortNumber, ILOMCtrlRedundancyStatus=ILOMCtrlRedundancyStatus, ilomCtrlLdapSslAlternateServerCertVersion=ilomCtrlLdapSslAlternateServerCertVersion, ilomCtrlLdapSslOptUsrMappingSearchBase=ilomCtrlLdapSslOptUsrMappingSearchBase, ilomCtrlNetworkMacAddress=ilomCtrlNetworkMacAddress, ilomCtrlActiveDirExpSearchEnabled=ilomCtrlActiveDirExpSearchEnabled, ILOMCtrlUserRoles=ILOMCtrlUserRoles, ilomCtrlHttp=ilomCtrlHttp, ilomCtrlAlertType=ilomCtrlAlertType, ilomCtrlPolicyLongStr=ilomCtrlPolicyLongStr, ilomCtrlSPARCHostOBPVersion=ilomCtrlSPARCHostOBPVersion, ilomCtrlLocalUserCLIMode=ilomCtrlLocalUserCLIMode, ilomCtrlActiveDirCustomGroupsTable=ilomCtrlActiveDirCustomGroupsTable, ILOMCtrlFlowControl=ILOMCtrlFlowControl, ilomCtrlActiveDirAlternateServerCertClear=ilomCtrlActiveDirAlternateServerCertClear, ILOMCtrlEventLogType=ILOMCtrlEventLogType, ilomCtrlSerial=ilomCtrlSerial, ilomCtrlLdapSslAlternateServerCertSubject=ilomCtrlLdapSslAlternateServerCertSubject, ilomCtrlEventLogSeverity=ilomCtrlEventLogSeverity, ilomCtrlLocalUserAuthUsername=ilomCtrlLocalUserAuthUsername, ilomCtrlSessionsEntry=ilomCtrlSessionsEntry, ilomCtrlNetworkPendingManagementPort=ilomCtrlNetworkPendingManagementPort, ilomCtrlSessionsConnectionType=ilomCtrlSessionsConnectionType, ilomCtrlActiveDirDnsLocatorQueryEntry=ilomCtrlActiveDirDnsLocatorQueryEntry, ilomCtrlSPARCDiagsUserResetLevel=ilomCtrlSPARCDiagsUserResetLevel, ilomCtrlSshGenerateNewKeyAction=ilomCtrlSshGenerateNewKeyAction, ilomCtrlLdapSslAlternateServerEntry=ilomCtrlLdapSslAlternateServerEntry, ILOMCtrlSPARCHostAutoRestartPolicy=ILOMCtrlSPARCHostAutoRestartPolicy, ILOMCtrlBaudRate=ILOMCtrlBaudRate, ilomCtrlSPARCDiagsPowerOnLevel=ilomCtrlSPARCDiagsPowerOnLevel, ilomCtrlHttpsEnabled=ilomCtrlHttpsEnabled, ilomCtrlDeviceNTPServerTwoIP=ilomCtrlDeviceNTPServerTwoIP, ILOMCtrlResetAction=ILOMCtrlResetAction, ilomCtrlLocalUserAuthPassword=ilomCtrlLocalUserAuthPassword, ilomCtrlFirmwareMgmtVersion=ilomCtrlFirmwareMgmtVersion, ilomCtrlLdapSslCertFileSerialNo=ilomCtrlLdapSslCertFileSerialNo, ilomCtrlActiveDirCustomGroupRoles=ilomCtrlActiveDirCustomGroupRoles, ILOMCtrlLocalUserUsername=ILOMCtrlLocalUserUsername, ilomCtrlLdapSslOptUsrMappingEnabled=ilomCtrlLdapSslOptUsrMappingEnabled, ilomCtrlSPARCDiagsMode=ilomCtrlSPARCDiagsMode, ilomCtrlLocalUserAuthRole=ilomCtrlLocalUserAuthRole, ilomCtrlBackupAndRestorePassphrase=ilomCtrlBackupAndRestorePassphrase, ilomCtrlDNSTimeout=ilomCtrlDNSTimeout, ilomCtrlNetworkDHCPServerAddr=ilomCtrlNetworkDHCPServerAddr, ilomCtrlMIB=ilomCtrlMIB, ILOMCtrlSPARCDiagsMode=ILOMCtrlSPARCDiagsMode, ilomCtrlNetworkPendingIpNetmask=ilomCtrlNetworkPendingIpNetmask, ilomCtrlActiveDirectoryTimeout=ilomCtrlActiveDirectoryTimeout, ilomCtrlActiveDirAlternateServerCertSubject=ilomCtrlActiveDirAlternateServerCertSubject, ilomCtrlSPARCBootModeScript=ilomCtrlSPARCBootModeScript, ilomCtrlThdInstanceEntry=ilomCtrlThdInstanceEntry, ilomCtrlSPARCDiagsUserResetVerbosity=ilomCtrlSPARCDiagsUserResetVerbosity, ilomCtrlLdapSslAlternateServerCertStatus=ilomCtrlLdapSslAlternateServerCertStatus, ilomCtrlActiveDirAdminGroupsEntry=ilomCtrlActiveDirAdminGroupsEntry, ilomCtrlSerialExternalPortBaudRate=ilomCtrlSerialExternalPortBaudRate, ilomCtrlRadiusDefaultRole=ilomCtrlRadiusDefaultRole)
def sum_squares(x, y): return add(square(x), square(y)) def print_square(x): print(square(x)) def percent_difference(x, y): difference = abs(x-y) return 100 * difference / x
def sum_squares(x, y): return add(square(x), square(y)) def print_square(x): print(square(x)) def percent_difference(x, y): difference = abs(x - y) return 100 * difference / x
class Subject: def register_observer(self, observer): raise NotImplementedError def remove_observer(self, observer): raise NotImplementedError def notify_observers(self): raise NotImplementedError class WeatherData(Subject): def __init__(self): self.humidity = None self.pressure = None self.temperature = None self.observers = [] def register_observer(self, observer): self.observers.append(observer) def remove_observer(self, observer): self.observers.remove(observer) def notify_observers(self): for observer in self.observers: observer.update(self.temperature, self.humidity, self.pressure) def get_temperature(self): pass def get_humidity(self): pass def get_pressure(self): pass def measurements_changed(self): self.notify_observers() def set_measurements(self, temperature, humidity, pressure): self.temperature = temperature self.humidity = humidity self.pressure = pressure self.measurements_changed() class Observer: def update(self, temp, humidity, pressure): raise NotImplementedError class DisplayElement: def display(self): raise NotImplementedError class CurrentConditionsDisplay(Observer, DisplayElement): def __init__(self, weather_data): self.weather_data = weather_data self.weather_data.register_observer(self) self.temperature = None self.humidity = None def update(self, temp, humidity, pressure): self.temperature = temp self.humidity = humidity self.display() def display(self): print(f"Current conditions: {self.temperature}F degrees and {self.humidity}% humidity") class StatisticsDisplay(Observer, DisplayElement): def __init__(self, weather_data): self.weather_data = weather_data self.weather_data.register_observer(self) self.max_temp = 0 self.min_temp = 200 self.temp_sum = 0 self.num_readings = 0 def update(self, temp, humidity, pressure): self.temp_sum += temp self.num_readings += 1 if temp > self.max_temp: self.max_temp = temp if temp < self.min_temp: self.min_temp = temp self.display() def display(self): print(f"Avg/Max/Min temperature = {(self.temp_sum / self.num_readings)}/{self.max_temp}/{self.min_temp}") class ForecastDisplay(Observer, DisplayElement): def __init__(self, weather_data): self.weather_data = weather_data self.weather_data.register_observer(self) self.last_pressure = 0 self.current_pressure = 0 def update(self, temp, humidity, pressure): self.last_pressure = self.current_pressure self.current_pressure = pressure self.display() def display(self): print("Forecast: ") if self.current_pressure > self.last_pressure: print("Improving weather on the way!") elif self.current_pressure == self.last_pressure: print("More of the same") elif self.current_pressure < self.last_pressure: print("Watch out for cooler, rainy weather") class ThirdPartyDisplay(Observer, DisplayElement): def update(self, temp, humidity, pressure): pass def display(self): pass wd = WeatherData() ccd = CurrentConditionsDisplay(wd) sd = StatisticsDisplay(wd) fd = ForecastDisplay(wd) wd.set_measurements(80, 65, 30.4) wd.set_measurements(82, 70, 29.2) wd.set_measurements(78, 90, 29.2)
class Subject: def register_observer(self, observer): raise NotImplementedError def remove_observer(self, observer): raise NotImplementedError def notify_observers(self): raise NotImplementedError class Weatherdata(Subject): def __init__(self): self.humidity = None self.pressure = None self.temperature = None self.observers = [] def register_observer(self, observer): self.observers.append(observer) def remove_observer(self, observer): self.observers.remove(observer) def notify_observers(self): for observer in self.observers: observer.update(self.temperature, self.humidity, self.pressure) def get_temperature(self): pass def get_humidity(self): pass def get_pressure(self): pass def measurements_changed(self): self.notify_observers() def set_measurements(self, temperature, humidity, pressure): self.temperature = temperature self.humidity = humidity self.pressure = pressure self.measurements_changed() class Observer: def update(self, temp, humidity, pressure): raise NotImplementedError class Displayelement: def display(self): raise NotImplementedError class Currentconditionsdisplay(Observer, DisplayElement): def __init__(self, weather_data): self.weather_data = weather_data self.weather_data.register_observer(self) self.temperature = None self.humidity = None def update(self, temp, humidity, pressure): self.temperature = temp self.humidity = humidity self.display() def display(self): print(f'Current conditions: {self.temperature}F degrees and {self.humidity}% humidity') class Statisticsdisplay(Observer, DisplayElement): def __init__(self, weather_data): self.weather_data = weather_data self.weather_data.register_observer(self) self.max_temp = 0 self.min_temp = 200 self.temp_sum = 0 self.num_readings = 0 def update(self, temp, humidity, pressure): self.temp_sum += temp self.num_readings += 1 if temp > self.max_temp: self.max_temp = temp if temp < self.min_temp: self.min_temp = temp self.display() def display(self): print(f'Avg/Max/Min temperature = {self.temp_sum / self.num_readings}/{self.max_temp}/{self.min_temp}') class Forecastdisplay(Observer, DisplayElement): def __init__(self, weather_data): self.weather_data = weather_data self.weather_data.register_observer(self) self.last_pressure = 0 self.current_pressure = 0 def update(self, temp, humidity, pressure): self.last_pressure = self.current_pressure self.current_pressure = pressure self.display() def display(self): print('Forecast: ') if self.current_pressure > self.last_pressure: print('Improving weather on the way!') elif self.current_pressure == self.last_pressure: print('More of the same') elif self.current_pressure < self.last_pressure: print('Watch out for cooler, rainy weather') class Thirdpartydisplay(Observer, DisplayElement): def update(self, temp, humidity, pressure): pass def display(self): pass wd = weather_data() ccd = current_conditions_display(wd) sd = statistics_display(wd) fd = forecast_display(wd) wd.set_measurements(80, 65, 30.4) wd.set_measurements(82, 70, 29.2) wd.set_measurements(78, 90, 29.2)
# ---------- # Feature extraction # ---------- class ExtendedFeatures: def __init__(self, dataset): self.feature_dic = {} self.feature_names = [] self.nr_feats = 0 self.feature_list = [] self.add_features = False self.dataset = dataset # Speed up self.node_feature_cache = {} self.initial_state_feature_cache = {} self.edge_feature_cache = {} self.final_edge_feature_cache = {} def build_features(self): self.add_features = True for seq in self.dataset.train.seq_list: seq_node_features, seq_edge_features = self.get_seq_features(seq) self.feature_list.append([seq_node_features, seq_edge_features]) self.nr_feats = len(self.feature_names) self.add_features = False def get_seq_features(self, seq): seq_node_features = [] seq_edge_features = [] # Take care of first position idx = [] idx = self.add_node_features(seq, 0, seq.y[0], idx) idx = self.add_init_state_features(seq, 0, seq.y[0], idx) seq_node_features.append(idx) seq_edge_features.append([]) for i, tag in enumerate(seq.y[1:]): idx = [] edge_idx = [] j = i + 1 # print i,j prev_tag = seq.y[j-1] edge_idx = self.add_edge_features(seq, j, tag, prev_tag, edge_idx) idx = self.add_node_features(seq, j, tag, idx) seq_node_features.append(idx) seq_edge_features.append(edge_idx) return seq_node_features, seq_edge_features # Add word tag pair def add_node_features(self, seq, pos, y, idx): x = seq.x[pos] y_name = self.dataset.int_to_pos[y] word = self.dataset.int_to_word[x] feat = "id:%s::%s" % (word, y_name) nr_feat = self.add_feature(feat) if nr_feat != -1: idx.append(nr_feat) if unicode.istitle(word): feat = "uppercased::%s" % y_name nr_feat = self.add_feature(feat) if nr_feat != -1: idx.append(nr_feat) if unicode.isdigit(word): feat = "number::%s" % y_name nr_feat = self.add_feature(feat) if nr_feat != -1: idx.append(nr_feat) if unicode.find(word, "-") != -1: feat = "hyphen::%s" % y_name nr_feat = self.add_feature(feat) if nr_feat != -1: idx.append(nr_feat) # Suffixes max_suffix = 3 for i in xrange(max_suffix): if len(word) > i+1: suffix = word[-(i+1):] feat = "suffix:%s::%s" % (suffix, y_name) nr_feat = self.add_feature(feat) if nr_feat != -1: idx.append(nr_feat) # Prefixes max_prefix = 3 for i in xrange(max_prefix): if len(word) > i+1: prefix = word[:i+1] feat = "prefix:%s::%s" % (prefix, y_name) nr_feat = self.add_feature(feat) if nr_feat != -1: idx.append(nr_feat) # if(pos > 0): # prev_word = seq.x[pos-1] # if(self.dataset.word_counts[prev_word] > 5): # prev_word_name = self.dataset.int_to_word[prev_word] # feat = "prev_word:%s:%s"%(prev_word_name,y_name) # nr_feat = self.add_feature(feat) # if(nr_feat != -1): # idx.append(nr_feat) # if(pos < len(seq.x) -1): # next_word = seq.x[pos+1] # if(self.dataset.word_counts[next_word] > 5): # next_word_name = self.dataset.int_to_word[next_word] # feat = "next_word:%s:%s"%(next_word_name,y_name) # nr_feat = self.add_feature(feat) # if(nr_feat != -1): # idx.append(nr_feat) if self.dataset.word_counts[x] <= 5: feat = "rare::%s" % y_name nr_feat = self.add_feature(feat) if nr_feat != -1: idx.append(nr_feat) return idx # f(t,y_t,X) # Add the word identity and if position is # the first also adds the tag position def get_node_features(self, seq, pos, y): all_feat = [] x = seq.x[pos] if x not in self.node_feature_cache: self.node_feature_cache[x] = {} if y not in self.node_feature_cache[x]: node_idx = [] node_idx = self.add_node_features(seq, pos, y, node_idx) # node_idx = filter (lambda a: a != -1, node_idx) self.node_feature_cache[x][y] = node_idx idx = self.node_feature_cache[x][y] all_feat = idx[:] # print idx if pos == 0: if y not in self.initial_state_feature_cache: init_idx = [] init_idx = self.add_init_state_features(seq, pos, y, init_idx) self.initial_state_feature_cache[y] = init_idx all_feat.extend(self.initial_state_feature_cache[y]) # print "before init" # print idx # print "after init" return all_feat def add_init_state_features(self, seq, pos, y, init_idx): y_name = self.dataset.int_to_pos[y] feat = "init_tag:%s" % y_name nr_feat = self.add_feature(feat) if nr_feat != -1: init_idx.append(nr_feat) return init_idx def add_edge_features(self, seq, pos, y, y_prev, edge_idx): # print "Adding edge feature for pos:%i y:%i y_prev%i seq_len:%i"%(pos,y,y_prev,len(seq.x)) y_name = self.dataset.int_to_pos[y] y_prev_name = self.dataset.int_to_pos[y_prev] if pos == len(seq.x)-1: feat = "last_prev_tag:%s::%s" % (y_prev_name, y_name) else: feat = "prev_tag:%s::%s" % (y_prev_name, y_name) nr_feat = self.add_feature(feat) if nr_feat != -1: edge_idx.append(nr_feat) return edge_idx # f(t,y_t,y_(t-1),X) # Speed up of code def get_edge_features(self, seq, pos, y, y_prev): # print "Getting edge feature for pos:%i y:%i y_prev%i seq_len:%i"%(pos,y,y_prev,len(seq.x)) # print "edge cache" # print self.edge_feature_cache # print "Final edge cache" # print self.final_edge_feature_cache if pos == len(seq.x)-1: if y not in self.final_edge_feature_cache: self.final_edge_feature_cache[y] = {} if y_prev not in self.final_edge_feature_cache[y]: edge_idx = [] edge = self.add_edge_features(seq, pos, y, y_prev, edge_idx) self.final_edge_feature_cache[y][y_prev] = edge_idx return self.final_edge_feature_cache[y][y_prev] else: if y not in self.edge_feature_cache: self.edge_feature_cache[y] = {} if y_prev not in self.edge_feature_cache[y]: edge_idx = [] edge = self.add_edge_features(seq, pos, y, y_prev, edge_idx) self.edge_feature_cache[y][y_prev] = edge_idx return self.edge_feature_cache[y][y_prev] def add_feature(self, feat): # if(self.add_features == False): # print feat if feat in self.feature_dic: return self.feature_dic[feat] if not self.add_features: return -1 nr_feat = len(self.feature_dic.keys()) # print "Adding feature %s %i"%(feat,nr_feat) self.feature_dic[feat] = nr_feat self.feature_names.append(feat) return nr_feat def get_sequence_feat_str(self, seq): seq_nr = seq.nr node_f_list = self.feature_list[seq_nr][0] edge_f_list = self.feature_list[seq_nr][1] word = seq.x[0] word_n = self.dataset.int_to_word[word] tag = seq.y[0] tag_n = self.dataset.int_to_pos[tag] txt = "" for i, tag in enumerate(seq.y): word = seq.x[i] word_n = self.dataset.int_to_word[word] tag_n = self.dataset.int_to_pos[tag] txt += "%i %s/%s NF: " % (i, word_n, tag_n) for nf in node_f_list[i]: txt += "%s " % self.feature_names[nf] if edge_f_list[i] != []: txt += "EF: " for nf in edge_f_list[i]: txt += "%s " % self.feature_names[nf] txt += "\n" return txt def print_sequence_features(self, seq): txt = "" for i, tag in enumerate(seq.y): word = seq.x[i] word_n = self.dataset.int_to_word[word] tag_n = self.dataset.int_to_pos[tag] txt += "%i %s/%s NF: " % (i, word_n, tag_n) prev_tag = seq.y[i-1] if i > 0: edge_f_list = self.get_edge_features(seq, i, tag, prev_tag) else: edge_f_list = [] node_f_list = self.get_node_features(seq, i, tag) for nf in node_f_list: txt += "%s " % self.feature_names[nf] if edge_f_list != []: txt += "EF: " for nf in edge_f_list: txt += "%s " % self.feature_names[nf] txt += "\n" return txt
class Extendedfeatures: def __init__(self, dataset): self.feature_dic = {} self.feature_names = [] self.nr_feats = 0 self.feature_list = [] self.add_features = False self.dataset = dataset self.node_feature_cache = {} self.initial_state_feature_cache = {} self.edge_feature_cache = {} self.final_edge_feature_cache = {} def build_features(self): self.add_features = True for seq in self.dataset.train.seq_list: (seq_node_features, seq_edge_features) = self.get_seq_features(seq) self.feature_list.append([seq_node_features, seq_edge_features]) self.nr_feats = len(self.feature_names) self.add_features = False def get_seq_features(self, seq): seq_node_features = [] seq_edge_features = [] idx = [] idx = self.add_node_features(seq, 0, seq.y[0], idx) idx = self.add_init_state_features(seq, 0, seq.y[0], idx) seq_node_features.append(idx) seq_edge_features.append([]) for (i, tag) in enumerate(seq.y[1:]): idx = [] edge_idx = [] j = i + 1 prev_tag = seq.y[j - 1] edge_idx = self.add_edge_features(seq, j, tag, prev_tag, edge_idx) idx = self.add_node_features(seq, j, tag, idx) seq_node_features.append(idx) seq_edge_features.append(edge_idx) return (seq_node_features, seq_edge_features) def add_node_features(self, seq, pos, y, idx): x = seq.x[pos] y_name = self.dataset.int_to_pos[y] word = self.dataset.int_to_word[x] feat = 'id:%s::%s' % (word, y_name) nr_feat = self.add_feature(feat) if nr_feat != -1: idx.append(nr_feat) if unicode.istitle(word): feat = 'uppercased::%s' % y_name nr_feat = self.add_feature(feat) if nr_feat != -1: idx.append(nr_feat) if unicode.isdigit(word): feat = 'number::%s' % y_name nr_feat = self.add_feature(feat) if nr_feat != -1: idx.append(nr_feat) if unicode.find(word, '-') != -1: feat = 'hyphen::%s' % y_name nr_feat = self.add_feature(feat) if nr_feat != -1: idx.append(nr_feat) max_suffix = 3 for i in xrange(max_suffix): if len(word) > i + 1: suffix = word[-(i + 1):] feat = 'suffix:%s::%s' % (suffix, y_name) nr_feat = self.add_feature(feat) if nr_feat != -1: idx.append(nr_feat) max_prefix = 3 for i in xrange(max_prefix): if len(word) > i + 1: prefix = word[:i + 1] feat = 'prefix:%s::%s' % (prefix, y_name) nr_feat = self.add_feature(feat) if nr_feat != -1: idx.append(nr_feat) if self.dataset.word_counts[x] <= 5: feat = 'rare::%s' % y_name nr_feat = self.add_feature(feat) if nr_feat != -1: idx.append(nr_feat) return idx def get_node_features(self, seq, pos, y): all_feat = [] x = seq.x[pos] if x not in self.node_feature_cache: self.node_feature_cache[x] = {} if y not in self.node_feature_cache[x]: node_idx = [] node_idx = self.add_node_features(seq, pos, y, node_idx) self.node_feature_cache[x][y] = node_idx idx = self.node_feature_cache[x][y] all_feat = idx[:] if pos == 0: if y not in self.initial_state_feature_cache: init_idx = [] init_idx = self.add_init_state_features(seq, pos, y, init_idx) self.initial_state_feature_cache[y] = init_idx all_feat.extend(self.initial_state_feature_cache[y]) return all_feat def add_init_state_features(self, seq, pos, y, init_idx): y_name = self.dataset.int_to_pos[y] feat = 'init_tag:%s' % y_name nr_feat = self.add_feature(feat) if nr_feat != -1: init_idx.append(nr_feat) return init_idx def add_edge_features(self, seq, pos, y, y_prev, edge_idx): y_name = self.dataset.int_to_pos[y] y_prev_name = self.dataset.int_to_pos[y_prev] if pos == len(seq.x) - 1: feat = 'last_prev_tag:%s::%s' % (y_prev_name, y_name) else: feat = 'prev_tag:%s::%s' % (y_prev_name, y_name) nr_feat = self.add_feature(feat) if nr_feat != -1: edge_idx.append(nr_feat) return edge_idx def get_edge_features(self, seq, pos, y, y_prev): if pos == len(seq.x) - 1: if y not in self.final_edge_feature_cache: self.final_edge_feature_cache[y] = {} if y_prev not in self.final_edge_feature_cache[y]: edge_idx = [] edge = self.add_edge_features(seq, pos, y, y_prev, edge_idx) self.final_edge_feature_cache[y][y_prev] = edge_idx return self.final_edge_feature_cache[y][y_prev] else: if y not in self.edge_feature_cache: self.edge_feature_cache[y] = {} if y_prev not in self.edge_feature_cache[y]: edge_idx = [] edge = self.add_edge_features(seq, pos, y, y_prev, edge_idx) self.edge_feature_cache[y][y_prev] = edge_idx return self.edge_feature_cache[y][y_prev] def add_feature(self, feat): if feat in self.feature_dic: return self.feature_dic[feat] if not self.add_features: return -1 nr_feat = len(self.feature_dic.keys()) self.feature_dic[feat] = nr_feat self.feature_names.append(feat) return nr_feat def get_sequence_feat_str(self, seq): seq_nr = seq.nr node_f_list = self.feature_list[seq_nr][0] edge_f_list = self.feature_list[seq_nr][1] word = seq.x[0] word_n = self.dataset.int_to_word[word] tag = seq.y[0] tag_n = self.dataset.int_to_pos[tag] txt = '' for (i, tag) in enumerate(seq.y): word = seq.x[i] word_n = self.dataset.int_to_word[word] tag_n = self.dataset.int_to_pos[tag] txt += '%i %s/%s NF: ' % (i, word_n, tag_n) for nf in node_f_list[i]: txt += '%s ' % self.feature_names[nf] if edge_f_list[i] != []: txt += 'EF: ' for nf in edge_f_list[i]: txt += '%s ' % self.feature_names[nf] txt += '\n' return txt def print_sequence_features(self, seq): txt = '' for (i, tag) in enumerate(seq.y): word = seq.x[i] word_n = self.dataset.int_to_word[word] tag_n = self.dataset.int_to_pos[tag] txt += '%i %s/%s NF: ' % (i, word_n, tag_n) prev_tag = seq.y[i - 1] if i > 0: edge_f_list = self.get_edge_features(seq, i, tag, prev_tag) else: edge_f_list = [] node_f_list = self.get_node_features(seq, i, tag) for nf in node_f_list: txt += '%s ' % self.feature_names[nf] if edge_f_list != []: txt += 'EF: ' for nf in edge_f_list: txt += '%s ' % self.feature_names[nf] txt += '\n' return txt
__all__ = ['search_and_vet_one'] def search_and_vet_one(ticid, sector, config, vetter_list, plot=True): """ Search and vet one TIC ID using your config and vetter list. """ # TODO: Implement me
__all__ = ['search_and_vet_one'] def search_and_vet_one(ticid, sector, config, vetter_list, plot=True): """ Search and vet one TIC ID using your config and vetter list. """
#!/usr/bin/env python3 VELOCITY_RANGE = range(1,127) VELOCITY_PPP = 16 VELOCITY_PP = 32 VELOCITY_P = 48 VELOCITY_MP = 64 VELOCITY_MF = 80 VELOCITY_F = 96 VELOCITY_FF = 112 VELOCITY_FFF = 127
velocity_range = range(1, 127) velocity_ppp = 16 velocity_pp = 32 velocity_p = 48 velocity_mp = 64 velocity_mf = 80 velocity_f = 96 velocity_ff = 112 velocity_fff = 127
def test(): assert ( "from spacy.tokens import Doc" in __solution__ ), "Are you importing the Doc class correctly?" assert doc.text == "spaCy is cool!", "Are you sure you created the Doc correctly?" assert "print(doc.text)" in __solution__, "Are you printing the Doc's text?" __msg__.good("Well done!")
def test(): assert 'from spacy.tokens import Doc' in __solution__, 'Are you importing the Doc class correctly?' assert doc.text == 'spaCy is cool!', 'Are you sure you created the Doc correctly?' assert 'print(doc.text)' in __solution__, "Are you printing the Doc's text?" __msg__.good('Well done!')
PORT = 8443 # name -> secret (32 hex chars) USERS = { "tg": "0123456789abcdef0123456789abcdef", "tg2": "ad36e2fa0de7aca0d81c7c152fb06c80", "tg3": "29075bb048ce065adf59cd67afa496e6", "tg4": "0d7eac72cac961d9645f6515cd8c1afd", "tg5": "8afbf4a2b7260e6b4ee8ee9b4c09c732", } MODES = { # Classic mode, easy to detect "classic": False, # Makes the proxy harder to detect # Can be incompatible with very old clients "secure": True, # Makes the proxy even more hard to detect # Can be incompatible with old clients "tls": True } # The domain for TLS mode, bad clients are proxied there # Use random existing domain, proxy checks it on start TLS_DOMAIN = "www.google.com" # Tag for advertising, obtainable from @MTProxybot # AD_TAG = "3c09c680b76ee91a4c25ad51f742267d"
port = 8443 users = {'tg': '0123456789abcdef0123456789abcdef', 'tg2': 'ad36e2fa0de7aca0d81c7c152fb06c80', 'tg3': '29075bb048ce065adf59cd67afa496e6', 'tg4': '0d7eac72cac961d9645f6515cd8c1afd', 'tg5': '8afbf4a2b7260e6b4ee8ee9b4c09c732'} modes = {'classic': False, 'secure': True, 'tls': True} tls_domain = 'www.google.com'
"""Loads the ipcamera library""" # Sanitize a dependency so that it works correctly from code that includes # Apollo as a submodule. def clean_dep(dep): return str(Label(dep)) def repo(): native.new_local_repository( name = "ipcamera", build_file = clean_dep("//third_party/ipcamera:ipcamera.BUILD"), path = "/opt/apollo/pkgs/ipcamera/include", )
"""Loads the ipcamera library""" def clean_dep(dep): return str(label(dep)) def repo(): native.new_local_repository(name='ipcamera', build_file=clean_dep('//third_party/ipcamera:ipcamera.BUILD'), path='/opt/apollo/pkgs/ipcamera/include')
class vehicle: def general_usage(self): print('general use: transportation') class Car(vehicle): def __init__(self): print("I am car") self.wheels = 4 self.has_roof = True def specific_usage(self): self.general_usage() print("Specific use: commute to work, vacation with family") class MotorCycle(vehicle): def __init__(self): print("I am a motorcycle") self.wheels = 2 self.has_roof = False def specific_usage(self): self.general_usage() print("specific use: road trip, racing") c = Car() c.specific_usage() m = MotorCycle() m.specific_usage() print(isinstance(c, MotorCycle)) print(issubclass(Car, MotorCycle))
class Vehicle: def general_usage(self): print('general use: transportation') class Car(vehicle): def __init__(self): print('I am car') self.wheels = 4 self.has_roof = True def specific_usage(self): self.general_usage() print('Specific use: commute to work, vacation with family') class Motorcycle(vehicle): def __init__(self): print('I am a motorcycle') self.wheels = 2 self.has_roof = False def specific_usage(self): self.general_usage() print('specific use: road trip, racing') c = car() c.specific_usage() m = motor_cycle() m.specific_usage() print(isinstance(c, MotorCycle)) print(issubclass(Car, MotorCycle))
LEGACY_TYPICAL_INPUT = { "hrDates": [ "2019-12-16 08:24:36", "2019-12-16 09:32:17", "2019-12-16 14:53:35", "2019-12-16 16:13:35", "2019-12-16 19:23:28", "2019-12-16 23:56:25", ], "hrValues": ["74", "83", "89", "157", "95", "80"], } LEGACY_INCOMPLETE_INPUT = { "hrDates": [ "2019-12-16 08:24:36", "2019-12-16 14:53:35", "2019-12-16 16:13:35", "2019-12-16 19:23:28", "2019-12-16 23:56:25", ], "hrValues": ["74", "83", "89", "157"], } HR_TYPICAL_INPUT = { "type": "Heart Rate", "dates": [ "2019-12-16 08:24:36", "2019-12-16 09:32:17", "2019-12-16 14:53:35", "2019-12-16 16:13:35", "2019-12-16 19:23:28", "2019-12-16 23:56:25", ], "values": ["74", "83", "89", "157", "95", "80"], } RESTING_HR_INPUT = { "type": "Resting Heart Rate", "dates": ["2021-04-10 09:21:56", "2021-04-11 13:45:10", "2021-04-12 08:04:01"], "values": ["60", "59", "62"], } HRV_INPUT = { "type": "Heart Rate Variability", "dates": ["2021-04-05 08:05:20", "2021-04-08 13:45:10", "2021-04-10 08:04:01"], "values": ["56.8018104501229", "55.24012710371946", "95.81946194801212"], } FLIGHTS_INPUT = { "type": "Flights Climbed", "dates": ["2021-04-05 09:21:00", "2021-04-05 09:21:00", "2021-04-05 11:20:38"], "values": ["1", "1", "2"], } STEPS_INPUT = { "type": "Steps", "dates": ["2021-04-10 09:20:10", "2021-04-10 13:14:00", "2021-04-10 23:10:59"], "values": ["34", "50", "10"], } CYCLING_INPUT = { "type": "Cycling Distance", "dates": ["2021-04-13 23:29:00"], "values": ["15.4"], } HR_ONE_ITEM_INPUT = { "type": "Heart Rate", "dates": "2019-12-16 08:24:36", "values": "74", } GENERIC_INPUT = { "type": "Memes Sent", "dates": ["2021-04-13 23:29:00"], "values": ["90"], }
legacy_typical_input = {'hrDates': ['2019-12-16 08:24:36', '2019-12-16 09:32:17', '2019-12-16 14:53:35', '2019-12-16 16:13:35', '2019-12-16 19:23:28', '2019-12-16 23:56:25'], 'hrValues': ['74', '83', '89', '157', '95', '80']} legacy_incomplete_input = {'hrDates': ['2019-12-16 08:24:36', '2019-12-16 14:53:35', '2019-12-16 16:13:35', '2019-12-16 19:23:28', '2019-12-16 23:56:25'], 'hrValues': ['74', '83', '89', '157']} hr_typical_input = {'type': 'Heart Rate', 'dates': ['2019-12-16 08:24:36', '2019-12-16 09:32:17', '2019-12-16 14:53:35', '2019-12-16 16:13:35', '2019-12-16 19:23:28', '2019-12-16 23:56:25'], 'values': ['74', '83', '89', '157', '95', '80']} resting_hr_input = {'type': 'Resting Heart Rate', 'dates': ['2021-04-10 09:21:56', '2021-04-11 13:45:10', '2021-04-12 08:04:01'], 'values': ['60', '59', '62']} hrv_input = {'type': 'Heart Rate Variability', 'dates': ['2021-04-05 08:05:20', '2021-04-08 13:45:10', '2021-04-10 08:04:01'], 'values': ['56.8018104501229', '55.24012710371946', '95.81946194801212']} flights_input = {'type': 'Flights Climbed', 'dates': ['2021-04-05 09:21:00', '2021-04-05 09:21:00', '2021-04-05 11:20:38'], 'values': ['1', '1', '2']} steps_input = {'type': 'Steps', 'dates': ['2021-04-10 09:20:10', '2021-04-10 13:14:00', '2021-04-10 23:10:59'], 'values': ['34', '50', '10']} cycling_input = {'type': 'Cycling Distance', 'dates': ['2021-04-13 23:29:00'], 'values': ['15.4']} hr_one_item_input = {'type': 'Heart Rate', 'dates': '2019-12-16 08:24:36', 'values': '74'} generic_input = {'type': 'Memes Sent', 'dates': ['2021-04-13 23:29:00'], 'values': ['90']}
""" Exception for the admin-commands-app """ class CommandError(Exception): pass
""" Exception for the admin-commands-app """ class Commanderror(Exception): pass
num1 = 10 num2 = 20 string = "Hello World" isTrue = True print(num1 + num2) print(isTrue) print(string)
num1 = 10 num2 = 20 string = 'Hello World' is_true = True print(num1 + num2) print(isTrue) print(string)
""" """ def construct_address(host, port, route, args): """ {host}:{port}{route}?{'&'.join(args)} :param str host: '172.0.0.1' :param str port: '5000' :param str route: '/store/file/here' :param list[str] args: ['a=b', 'c=d'] """ return f"http://{host}:{port}{route}?{'&'.join(args)}" # host = '172.0.0.1' # port = '5000' # route = '/store' # args = ['x=3', 'y=1'] # print(construct_address(host, port, route, args))
""" """ def construct_address(host, port, route, args): """ {host}:{port}{route}?{'&'.join(args)} :param str host: '172.0.0.1' :param str port: '5000' :param str route: '/store/file/here' :param list[str] args: ['a=b', 'c=d'] """ return f"http://{host}:{port}{route}?{'&'.join(args)}"
def find_min_max(nums): mini = maxi = nums[0] for num in nums[1:]: if num < mini: mini = num continue elif num > maxi: maxi = num return mini, maxi # Tests assert find_min_max([4, 3, 1, 2, 5]) == (1, 5)
def find_min_max(nums): mini = maxi = nums[0] for num in nums[1:]: if num < mini: mini = num continue elif num > maxi: maxi = num return (mini, maxi) assert find_min_max([4, 3, 1, 2, 5]) == (1, 5)
# Copyright (c) Facebook, Inc. and its affiliates. # # This source code is licensed under the MIT license found in the # LICENSE file in the root directory of this source tree. class ClassSink: async def sink(self, argument): pass class ClassSource: async def source(self): pass def test(class_sink: ClassSink, class_source: ClassSource): class_sink.sink(class_source.source())
class Classsink: async def sink(self, argument): pass class Classsource: async def source(self): pass def test(class_sink: ClassSink, class_source: ClassSource): class_sink.sink(class_source.source())
class Solution: def getRange(self, arr, target): left = self.bin_search(arr, 0, len(arr)-1, target, find_min=True) right = self.bin_search(arr, 0, len(arr)-1, target, find_min=False) return [left, right] def bin_search(self, arr, low, high, target, find_min): while low <= high: mid = (high + low) / 2 if arr[mid] == target: if find_min and self.is_equal_previous(arr, mid): high = mid - 1 elif not find_min and self.is_equal_next(arr, mid): low = mid + 1 else: return mid else: if arr[mid] < target: low = mid + 1 else: high = mid - 1 return -1 def is_equal_previous(self, arr, index): return (index-1 >= 0 and arr[index-1] == arr[index]) def is_equal_next(self, arr, index): return (index+1 < len(arr) and arr[index+1] == arr[index])
class Solution: def get_range(self, arr, target): left = self.bin_search(arr, 0, len(arr) - 1, target, find_min=True) right = self.bin_search(arr, 0, len(arr) - 1, target, find_min=False) return [left, right] def bin_search(self, arr, low, high, target, find_min): while low <= high: mid = (high + low) / 2 if arr[mid] == target: if find_min and self.is_equal_previous(arr, mid): high = mid - 1 elif not find_min and self.is_equal_next(arr, mid): low = mid + 1 else: return mid elif arr[mid] < target: low = mid + 1 else: high = mid - 1 return -1 def is_equal_previous(self, arr, index): return index - 1 >= 0 and arr[index - 1] == arr[index] def is_equal_next(self, arr, index): return index + 1 < len(arr) and arr[index + 1] == arr[index]
class A: def __init__(self): print('A class call ') class B(A): def __init__(self): print('B class call') A.__init__(self) class C(A): def __init__(self): print('C class call') A.__init__(self) class D(B,C): def __init__(self): print('D class call') B.__init__(self) C.__init__(self) d=D()
class A: def __init__(self): print('A class call ') class B(A): def __init__(self): print('B class call') A.__init__(self) class C(A): def __init__(self): print('C class call') A.__init__(self) class D(B, C): def __init__(self): print('D class call') B.__init__(self) C.__init__(self) d = d()
def functionA(): print("This is a testing script") if __name__ == '__main__': functionA() #functionB()
def function_a(): print('This is a testing script') if __name__ == '__main__': function_a()
""" The Module containing the Knuth-Morris-Pratt (KMP) algorithm used to find occurrences of matching substrings """ # There are two parts of this algorithm: # 1.) A function for generating the prefix tables for the given pattern to match # 2.) The function performing the main matching def get_prefix_suffix(pattern): """ The function for generating the prefix-suffix table for the given pattern string :param pattern: The string pattern to be located in the main string :return: The list (table) generated for the pattern """ tmp = [0] # initialize the tmp to a list containing just 0 # initialize the i and j pointers i = 1 j = 0 while i < len(pattern): if pattern[i] == pattern[j]: tmp.append(j + 1) i = i + 1 j = j + 1 else: if j == 0: tmp.append(tmp[j]) i = i + 1 # increment only i else: j = tmp[j - 1] return tmp # return the tmp so created def kmp_match_substrings(match_string, pattern): """ The function for computing the match occurrences of the substring in the string :param match_string: The main string for finding the occurrences :param pattern: The substring for finding the occurrence matches :return: The array (python list) containing a 1 for the start position where there is a match """ # compute the prefix table for the search pattern pre_su_tab = get_prefix_suffix(pattern) matches = [0 for _ in range(len(match_string))] # initialize the match list pat_len = len(pattern) # initialize the pointers for the algorithm i = 0 j = 0 while i < len(match_string): if match_string[i] == pattern[j]: # This is a part of a potential match if j == (pat_len - 1): # the patterns have matched matches[i - pat_len + 1] = 1 # set the place of match j = pre_su_tab[j] else: j = j + 1 i = i + 1 else: # This is not a match or a partial match if j == 0: i = i + 1 else: j = pre_su_tab[j - 1] # return the matches so created return matches # naive tester if __name__ == '__main__': # Test the get_prefix_suffix function string = "ababa" pat_pre = get_prefix_suffix(string) print(pat_pre) string = "ababcacababc" pat_pre = get_prefix_suffix(string) print(pat_pre) # Test the kmp_match_substrings function string = "ababaccabababa" pat = "ababa" print(kmp_match_substrings(string, pat))
""" The Module containing the Knuth-Morris-Pratt (KMP) algorithm used to find occurrences of matching substrings """ def get_prefix_suffix(pattern): """ The function for generating the prefix-suffix table for the given pattern string :param pattern: The string pattern to be located in the main string :return: The list (table) generated for the pattern """ tmp = [0] i = 1 j = 0 while i < len(pattern): if pattern[i] == pattern[j]: tmp.append(j + 1) i = i + 1 j = j + 1 elif j == 0: tmp.append(tmp[j]) i = i + 1 else: j = tmp[j - 1] return tmp def kmp_match_substrings(match_string, pattern): """ The function for computing the match occurrences of the substring in the string :param match_string: The main string for finding the occurrences :param pattern: The substring for finding the occurrence matches :return: The array (python list) containing a 1 for the start position where there is a match """ pre_su_tab = get_prefix_suffix(pattern) matches = [0 for _ in range(len(match_string))] pat_len = len(pattern) i = 0 j = 0 while i < len(match_string): if match_string[i] == pattern[j]: if j == pat_len - 1: matches[i - pat_len + 1] = 1 j = pre_su_tab[j] else: j = j + 1 i = i + 1 elif j == 0: i = i + 1 else: j = pre_su_tab[j - 1] return matches if __name__ == '__main__': string = 'ababa' pat_pre = get_prefix_suffix(string) print(pat_pre) string = 'ababcacababc' pat_pre = get_prefix_suffix(string) print(pat_pre) string = 'ababaccabababa' pat = 'ababa' print(kmp_match_substrings(string, pat))
''' 02 - Stacked bar chart A stacked bar chart contains bars, where the height of each bar represents values. In addition, stacked on top of the first variable may be another variable. The additional height of this bar represents the value of this variable. And you can add more bars on top of that. In this exercise, you will have access to a DataFrame called medals that contains an index that holds the names of different countries, and three columns: "Gold", "Silver" and "Bronze". You will also have a Figure, fig, and Axes, ax, that you can add data to. You will create a stacked bar chart that shows the number of gold, silver, and bronze medals won by each country, and you will add labels and create a legend that indicates which bars represent which medals. Instructions: - Call the ax.bar method to add the "Gold" medals. Call it with the label set to "Gold". - Call the ax.bar method to stack "Silver" bars on top of that, using the bottom key-word argument so the bottom of the bars will be on top of the gold medal bars, and label to add the label "Silver". - Use ax.bar to add "Bronze" bars on top of that, using the bottom key-word and label it as "Bronze". ''' # Add bars for "Gold" with the label "Gold" ax.bar(medals.index, medals['Gold'], label='Gold') # Stack bars for "Silver" on top with label "Silver" ax.bar(medals.index, medals['Silver'], bottom=medals['Gold'], label='Silver') # Stack bars for "Bronze" on top of that with label "Bronze" ax.bar(medals.index, medals['Bronze'], bottom=medals['Gold'] + medals['Silver'], label='Bronze') # Display the legend ax.legend() plt.show()
""" 02 - Stacked bar chart A stacked bar chart contains bars, where the height of each bar represents values. In addition, stacked on top of the first variable may be another variable. The additional height of this bar represents the value of this variable. And you can add more bars on top of that. In this exercise, you will have access to a DataFrame called medals that contains an index that holds the names of different countries, and three columns: "Gold", "Silver" and "Bronze". You will also have a Figure, fig, and Axes, ax, that you can add data to. You will create a stacked bar chart that shows the number of gold, silver, and bronze medals won by each country, and you will add labels and create a legend that indicates which bars represent which medals. Instructions: - Call the ax.bar method to add the "Gold" medals. Call it with the label set to "Gold". - Call the ax.bar method to stack "Silver" bars on top of that, using the bottom key-word argument so the bottom of the bars will be on top of the gold medal bars, and label to add the label "Silver". - Use ax.bar to add "Bronze" bars on top of that, using the bottom key-word and label it as "Bronze". """ ax.bar(medals.index, medals['Gold'], label='Gold') ax.bar(medals.index, medals['Silver'], bottom=medals['Gold'], label='Silver') ax.bar(medals.index, medals['Bronze'], bottom=medals['Gold'] + medals['Silver'], label='Bronze') ax.legend() plt.show()
# This program also demonstrates a simple for # loop that uses a list of numbers. print('I will display the odd numbers 1 through 9.') for num in [1, 3, 5, 7, 9]: print(num)
print('I will display the odd numbers 1 through 9.') for num in [1, 3, 5, 7, 9]: print(num)
# Q S M L # Error Class # michaelpeterswa 2020 class QSMLError(Exception): def __init__(self, message, line): self.message = message self.line = line def __str__(self): msg = self.message line = self.line return "%s at line %i" % (msg, line)
class Qsmlerror(Exception): def __init__(self, message, line): self.message = message self.line = line def __str__(self): msg = self.message line = self.line return '%s at line %i' % (msg, line)
class Solution: def search(self, nums: list[int], target: int) -> int: L, H = 0, len(nums) while L < H: M = (L+H) // 2 if (target < nums[0]) and (nums[0] < nums[M]): # -inf L = M+1 elif (target >= nums[0]) and (nums[0] > nums[M]): # +inf H = M elif nums[M] < target: L = M+1 elif nums[M] > target: H = M else: return M return -1 nums = [4, 0, 2] target = 0 s = Solution() print(s.search(nums, target)) # Very Important Idea # If nums[mid] and target are "on the same side" of nums[0], # we just take nums[mid]. Otherwise we use -infinity or +infinity as needed. # Input: nums = [4,5,6,7,0,1,2], target = 0 # Output: 4 # L = 0 and H = 7 # M = (0 + 7) // 2 = 3
class Solution: def search(self, nums: list[int], target: int) -> int: (l, h) = (0, len(nums)) while L < H: m = (L + H) // 2 if target < nums[0] and nums[0] < nums[M]: l = M + 1 elif target >= nums[0] and nums[0] > nums[M]: h = M elif nums[M] < target: l = M + 1 elif nums[M] > target: h = M else: return M return -1 nums = [4, 0, 2] target = 0 s = solution() print(s.search(nums, target))
class OperationNotSupported(Exception): def __init__(self, msg): super().__init__(msg) class CompilationError(Exception): def __init__(self, msg): super().__init__(msg)
class Operationnotsupported(Exception): def __init__(self, msg): super().__init__(msg) class Compilationerror(Exception): def __init__(self, msg): super().__init__(msg)
valor = int(input()) impar = 0 for c in range(0, valor+1): if c % 2 != 0: print(c)
valor = int(input()) impar = 0 for c in range(0, valor + 1): if c % 2 != 0: print(c)
""" A simple WSGI application for testing. """ _app_was_hit = False def success(): return _app_was_hit def simple_app(environ, start_response): """Simplest possible application object""" status = '200 OK' response_headers = [('Content-type','text/plain')] start_response(status, response_headers) global _app_was_hit _app_was_hit = True return ['WSGI intercept successful!\n'] def create_fn(): global _app_was_hit _app_was_hit = False return simple_app
""" A simple WSGI application for testing. """ _app_was_hit = False def success(): return _app_was_hit def simple_app(environ, start_response): """Simplest possible application object""" status = '200 OK' response_headers = [('Content-type', 'text/plain')] start_response(status, response_headers) global _app_was_hit _app_was_hit = True return ['WSGI intercept successful!\n'] def create_fn(): global _app_was_hit _app_was_hit = False return simple_app
D = { 'UUU' : 'F', 'CUU' : 'L', 'AUU' : 'I', 'GUU' : 'V', 'UUC' : 'F', 'CUC' : 'L', 'AUC' : 'I', 'GUC' : 'V', 'UUA' : 'L', 'CUA' : 'L', 'AUA' : 'I', 'GUA' : 'V', 'UUG' : 'L', 'CUG' : 'L', 'AUG' : 'M', 'GUG' : 'V', 'UCU' : 'S', 'CCU' : 'P', 'ACU' : 'T', 'GCU' : 'A', 'UCC' : 'S', 'CCC' : 'P', 'ACC' : 'T', 'GCC' : 'A', 'UCA' : 'S', 'CCA' : 'P', 'ACA' : 'T', 'GCA' : 'A', 'UCG' : 'S', 'CCG' : 'P', 'ACG' : 'T', 'GCG' : 'A', 'UAU' : 'Y', 'CAU' : 'H', 'AAU' : 'N', 'GAU' : 'D', 'UAC' : 'Y', 'CAC' : 'H', 'AAC' : 'N', 'GAC' : 'D', 'UAA' : 'Stop', 'CAA' : 'Q', 'AAA' : 'K', 'GAA' : 'E', 'UAG' : 'Stop', 'CAG' : 'Q', 'AAG' : 'K', 'GAG' : 'E', 'UGU' : 'C', 'CGU' : 'R', 'AGU' : 'S', 'GGU' : 'G', 'UGC' : 'C', 'CGC' : 'R', 'AGC' : 'S', 'GGC' : 'G', 'UGA' : 'Stop', 'CGA' : 'R', 'AGA' : 'R', 'GGA' : 'G', 'UGG' : 'W', 'CGG' : 'R', 'AGG' : 'R', 'GGG' : 'G' } #f=open('t.txt','r') #l = f.readlines() l='MA' f = 1 for i in range(1,len(l)): letter = l[i] c = 0 for j in D.values(): if(j==letter): c = c+1 f = f*c print((f*3)%1000000)
d = {'UUU': 'F', 'CUU': 'L', 'AUU': 'I', 'GUU': 'V', 'UUC': 'F', 'CUC': 'L', 'AUC': 'I', 'GUC': 'V', 'UUA': 'L', 'CUA': 'L', 'AUA': 'I', 'GUA': 'V', 'UUG': 'L', 'CUG': 'L', 'AUG': 'M', 'GUG': 'V', 'UCU': 'S', 'CCU': 'P', 'ACU': 'T', 'GCU': 'A', 'UCC': 'S', 'CCC': 'P', 'ACC': 'T', 'GCC': 'A', 'UCA': 'S', 'CCA': 'P', 'ACA': 'T', 'GCA': 'A', 'UCG': 'S', 'CCG': 'P', 'ACG': 'T', 'GCG': 'A', 'UAU': 'Y', 'CAU': 'H', 'AAU': 'N', 'GAU': 'D', 'UAC': 'Y', 'CAC': 'H', 'AAC': 'N', 'GAC': 'D', 'UAA': 'Stop', 'CAA': 'Q', 'AAA': 'K', 'GAA': 'E', 'UAG': 'Stop', 'CAG': 'Q', 'AAG': 'K', 'GAG': 'E', 'UGU': 'C', 'CGU': 'R', 'AGU': 'S', 'GGU': 'G', 'UGC': 'C', 'CGC': 'R', 'AGC': 'S', 'GGC': 'G', 'UGA': 'Stop', 'CGA': 'R', 'AGA': 'R', 'GGA': 'G', 'UGG': 'W', 'CGG': 'R', 'AGG': 'R', 'GGG': 'G'} l = 'MA' f = 1 for i in range(1, len(l)): letter = l[i] c = 0 for j in D.values(): if j == letter: c = c + 1 f = f * c print(f * 3 % 1000000)
# See also examples/example_track/track_meta.py for a longer, commented example track = dict( author_username='alexisbcook', course_name='Data Visualization', course_url='https://www.kaggle.com/learn/data-visualization', course_forum_url='https://www.kaggle.com/learn-forum/161291' ) lessons = [{'topic': topic_name} for topic_name in ['Hello, Seaborn', 'Line Charts', 'Bar Charts and Heatmaps', 'Scatter Plots', 'Distributions', 'Choosing Plot Types and Custom Styles', 'Final Project', 'Creating Your Own Notebooks'] ] notebooks = [ dict( filename='tut1.ipynb', lesson_idx=0, type='tutorial', ), dict( filename='ex1.ipynb', lesson_idx=0, type='exercise', scriptid=3303713 ), dict( filename='tut2.ipynb', lesson_idx=1, type='tutorial', ), dict( filename='ex2.ipynb', lesson_idx=1, type='exercise', scriptid=3303716 ), dict( filename='tut3.ipynb', lesson_idx=2, type='tutorial', ), dict( filename='ex3.ipynb', lesson_idx=2, type='exercise', scriptid=2951537 ), dict( filename='tut4.ipynb', lesson_idx=3, type='tutorial', ), dict( filename='ex4.ipynb', lesson_idx=3, type='exercise', scriptid=2951535 ), dict( filename='tut5.ipynb', lesson_idx=4, type='tutorial', ), dict( filename='ex5.ipynb', lesson_idx=4, type='exercise', scriptid=2951534 ), dict( filename='tut6.ipynb', lesson_idx=5, type='tutorial', ), dict( filename='ex6.ipynb', lesson_idx=5, type='exercise', scriptid=2959763 ), dict( filename='tut7.ipynb', lesson_idx=6, type='tutorial', ), dict( filename='ex7.ipynb', lesson_idx=6, type='exercise', scriptid=2951523 ), dict( filename='tut8.ipynb', lesson_idx=7, type='tutorial', ), ] for nb in notebooks: nb['dataset_sources'] = ["alexisbcook/data-for-datavis"] if "ex7" in nb['filename']: nb['dataset_sources'] = []
track = dict(author_username='alexisbcook', course_name='Data Visualization', course_url='https://www.kaggle.com/learn/data-visualization', course_forum_url='https://www.kaggle.com/learn-forum/161291') lessons = [{'topic': topic_name} for topic_name in ['Hello, Seaborn', 'Line Charts', 'Bar Charts and Heatmaps', 'Scatter Plots', 'Distributions', 'Choosing Plot Types and Custom Styles', 'Final Project', 'Creating Your Own Notebooks']] notebooks = [dict(filename='tut1.ipynb', lesson_idx=0, type='tutorial'), dict(filename='ex1.ipynb', lesson_idx=0, type='exercise', scriptid=3303713), dict(filename='tut2.ipynb', lesson_idx=1, type='tutorial'), dict(filename='ex2.ipynb', lesson_idx=1, type='exercise', scriptid=3303716), dict(filename='tut3.ipynb', lesson_idx=2, type='tutorial'), dict(filename='ex3.ipynb', lesson_idx=2, type='exercise', scriptid=2951537), dict(filename='tut4.ipynb', lesson_idx=3, type='tutorial'), dict(filename='ex4.ipynb', lesson_idx=3, type='exercise', scriptid=2951535), dict(filename='tut5.ipynb', lesson_idx=4, type='tutorial'), dict(filename='ex5.ipynb', lesson_idx=4, type='exercise', scriptid=2951534), dict(filename='tut6.ipynb', lesson_idx=5, type='tutorial'), dict(filename='ex6.ipynb', lesson_idx=5, type='exercise', scriptid=2959763), dict(filename='tut7.ipynb', lesson_idx=6, type='tutorial'), dict(filename='ex7.ipynb', lesson_idx=6, type='exercise', scriptid=2951523), dict(filename='tut8.ipynb', lesson_idx=7, type='tutorial')] for nb in notebooks: nb['dataset_sources'] = ['alexisbcook/data-for-datavis'] if 'ex7' in nb['filename']: nb['dataset_sources'] = []
m50 = maior = m = 0 qtd = int(input('Quantas pessoas deseja cadastrar? ')) for c in range(0, qtd): x = int(input(f'Idade {c+1}: ')) if x >= 50: m50 += 1 m = m + x if x >= maior: maior = x print(f'Qtd de pessoas +50: {m50}') print(f'Media de idades: {m/qtd:.2f}') print(f'Mais velha: {maior}')
m50 = maior = m = 0 qtd = int(input('Quantas pessoas deseja cadastrar? ')) for c in range(0, qtd): x = int(input(f'Idade {c + 1}: ')) if x >= 50: m50 += 1 m = m + x if x >= maior: maior = x print(f'Qtd de pessoas +50: {m50}') print(f'Media de idades: {m / qtd:.2f}') print(f'Mais velha: {maior}')
#!/usr/bin/env python # -*- coding: utf-8 -*- """app.py: challenge #4""" __author__ = "Carlan Calazans" __copyright__ = "Copyright 2016, Carlan Calazans" __credits__ = ["Carlan Calazans"] __license__ = "MIT" __version__ = "1.0.0" __maintainer__ = "Carlan Calazans" __email__ = "carlancalazans at gmail dot com" __status__ = "Development" class Protected(object): def __init__(self): self.auth_info = {} self.logged_in = False def load_login_and_password_from_file(self): with open('secret.txt', 'r') as file: for line in file: user, passwd = line.rstrip("\n").split(':') self.auth_info[user] = passwd def get_user_input(self): self.load_login_and_password_from_file() username = input('What\'s your username? ') password = input('What\'s your password? ') self.login(username, password) self.authorize() def login(self, username, password): if username in self.auth_info.keys(): self.logged_in = (self.auth_info[username] == password) else: self.logged_in = False def authorize(self): if(self.logged_in): print('Logged in') else: print('Not allowed to login') protected = Protected() protected.get_user_input()
"""app.py: challenge #4""" __author__ = 'Carlan Calazans' __copyright__ = 'Copyright 2016, Carlan Calazans' __credits__ = ['Carlan Calazans'] __license__ = 'MIT' __version__ = '1.0.0' __maintainer__ = 'Carlan Calazans' __email__ = 'carlancalazans at gmail dot com' __status__ = 'Development' class Protected(object): def __init__(self): self.auth_info = {} self.logged_in = False def load_login_and_password_from_file(self): with open('secret.txt', 'r') as file: for line in file: (user, passwd) = line.rstrip('\n').split(':') self.auth_info[user] = passwd def get_user_input(self): self.load_login_and_password_from_file() username = input("What's your username? ") password = input("What's your password? ") self.login(username, password) self.authorize() def login(self, username, password): if username in self.auth_info.keys(): self.logged_in = self.auth_info[username] == password else: self.logged_in = False def authorize(self): if self.logged_in: print('Logged in') else: print('Not allowed to login') protected = protected() protected.get_user_input()
# # PySNMP MIB module APPACCELERATION-SMI (http://snmplabs.com/pysmi) # ASN.1 source file:///Users/davwang4/Dev/mibs.snmplabs.com/asn1/APPACCELERATION-SMI # Produced by pysmi-0.3.4 at Wed May 1 11:23:30 2019 # On host DAVWANG4-M-1475 platform Darwin version 18.5.0 by user davwang4 # Using Python version 3.7.3 (default, Mar 27 2019, 09:23:15) # ObjectIdentifier, OctetString, Integer = mibBuilder.importSymbols("ASN1", "ObjectIdentifier", "OctetString", "Integer") NamedValues, = mibBuilder.importSymbols("ASN1-ENUMERATION", "NamedValues") ValueRangeConstraint, SingleValueConstraint, ValueSizeConstraint, ConstraintsIntersection, ConstraintsUnion = mibBuilder.importSymbols("ASN1-REFINEMENT", "ValueRangeConstraint", "SingleValueConstraint", "ValueSizeConstraint", "ConstraintsIntersection", "ConstraintsUnion") citrix, ModuleIdentity, ObjectIdentity = mibBuilder.importSymbols("CITRIX-COMMON-MIB", "citrix", "ModuleIdentity", "ObjectIdentity") NotificationGroup, ModuleCompliance = mibBuilder.importSymbols("SNMPv2-CONF", "NotificationGroup", "ModuleCompliance") Gauge32, Bits, MibScalar, MibTable, MibTableRow, MibTableColumn, Counter64, MibIdentifier, Unsigned32, NotificationType, IpAddress, ModuleIdentity, ObjectIdentity, iso, Counter32, Integer32, TimeTicks = mibBuilder.importSymbols("SNMPv2-SMI", "Gauge32", "Bits", "MibScalar", "MibTable", "MibTableRow", "MibTableColumn", "Counter64", "MibIdentifier", "Unsigned32", "NotificationType", "IpAddress", "ModuleIdentity", "ObjectIdentity", "iso", "Counter32", "Integer32", "TimeTicks") TextualConvention, DisplayString = mibBuilder.importSymbols("SNMPv2-TC", "TextualConvention", "DisplayString") appAcceleration = ModuleIdentity((1, 3, 6, 1, 4, 1, 3845, 30)) if mibBuilder.loadTexts: appAcceleration.setLastUpdated('200905110000Z') if mibBuilder.loadTexts: appAcceleration.setOrganization('www.citrix.com') if mibBuilder.loadTexts: appAcceleration.setContactInfo(' Citrix Systems, Inc. Postal: 851 West Cypress Creek Road Fort Lauderdale, Florida 33309 United States') if mibBuilder.loadTexts: appAcceleration.setDescription('The Structure of Management Information for the Citrix Systems Application Acceleration.') appAccelerationProducts = ObjectIdentity((1, 3, 6, 1, 4, 1, 3845, 30, 1)) if mibBuilder.loadTexts: appAccelerationProducts.setStatus('current') if mibBuilder.loadTexts: appAccelerationProducts.setDescription('appAccelerationProducts is the root OBJECT IDENTIFIER from which sysObjectID values are assigned. Actual values are defined in APPACCELERATION-PRODUCTS-MIB.') appAccelerationAgentCapability = ObjectIdentity((1, 3, 6, 1, 4, 1, 3845, 30, 2)) if mibBuilder.loadTexts: appAccelerationAgentCapability.setStatus('current') if mibBuilder.loadTexts: appAccelerationAgentCapability.setDescription('appAccelerationAgentCapability provides a root object identifier from which AGENT-CAPABILITIES values may be assigned.') appAccelerationModules = ObjectIdentity((1, 3, 6, 1, 4, 1, 3845, 30, 3)) if mibBuilder.loadTexts: appAccelerationModules.setStatus('current') if mibBuilder.loadTexts: appAccelerationModules.setDescription('appAccelerationModules provides a root object identifier from which MODULE-ENTITY values may be assigned.') appAccelerationMgmt = ObjectIdentity((1, 3, 6, 1, 4, 1, 3845, 30, 4)) if mibBuilder.loadTexts: appAccelerationMgmt.setStatus('current') if mibBuilder.loadTexts: appAccelerationMgmt.setDescription('appAccelerationMgmt is the main subtree for management mibs.') appAccelerationNotifications = ObjectIdentity((1, 3, 6, 1, 4, 1, 3845, 30, 5)) if mibBuilder.loadTexts: appAccelerationNotifications.setStatus('current') if mibBuilder.loadTexts: appAccelerationNotifications.setDescription('appAccelerationNotifications is the main subtree for agent notifications.') mibBuilder.exportSymbols("APPACCELERATION-SMI", appAccelerationNotifications=appAccelerationNotifications, PYSNMP_MODULE_ID=appAcceleration, appAccelerationMgmt=appAccelerationMgmt, appAccelerationProducts=appAccelerationProducts, appAccelerationModules=appAccelerationModules, appAcceleration=appAcceleration, appAccelerationAgentCapability=appAccelerationAgentCapability)
(object_identifier, octet_string, integer) = mibBuilder.importSymbols('ASN1', 'ObjectIdentifier', 'OctetString', 'Integer') (named_values,) = mibBuilder.importSymbols('ASN1-ENUMERATION', 'NamedValues') (value_range_constraint, single_value_constraint, value_size_constraint, constraints_intersection, constraints_union) = mibBuilder.importSymbols('ASN1-REFINEMENT', 'ValueRangeConstraint', 'SingleValueConstraint', 'ValueSizeConstraint', 'ConstraintsIntersection', 'ConstraintsUnion') (citrix, module_identity, object_identity) = mibBuilder.importSymbols('CITRIX-COMMON-MIB', 'citrix', 'ModuleIdentity', 'ObjectIdentity') (notification_group, module_compliance) = mibBuilder.importSymbols('SNMPv2-CONF', 'NotificationGroup', 'ModuleCompliance') (gauge32, bits, mib_scalar, mib_table, mib_table_row, mib_table_column, counter64, mib_identifier, unsigned32, notification_type, ip_address, module_identity, object_identity, iso, counter32, integer32, time_ticks) = mibBuilder.importSymbols('SNMPv2-SMI', 'Gauge32', 'Bits', 'MibScalar', 'MibTable', 'MibTableRow', 'MibTableColumn', 'Counter64', 'MibIdentifier', 'Unsigned32', 'NotificationType', 'IpAddress', 'ModuleIdentity', 'ObjectIdentity', 'iso', 'Counter32', 'Integer32', 'TimeTicks') (textual_convention, display_string) = mibBuilder.importSymbols('SNMPv2-TC', 'TextualConvention', 'DisplayString') app_acceleration = module_identity((1, 3, 6, 1, 4, 1, 3845, 30)) if mibBuilder.loadTexts: appAcceleration.setLastUpdated('200905110000Z') if mibBuilder.loadTexts: appAcceleration.setOrganization('www.citrix.com') if mibBuilder.loadTexts: appAcceleration.setContactInfo(' Citrix Systems, Inc. Postal: 851 West Cypress Creek Road Fort Lauderdale, Florida 33309 United States') if mibBuilder.loadTexts: appAcceleration.setDescription('The Structure of Management Information for the Citrix Systems Application Acceleration.') app_acceleration_products = object_identity((1, 3, 6, 1, 4, 1, 3845, 30, 1)) if mibBuilder.loadTexts: appAccelerationProducts.setStatus('current') if mibBuilder.loadTexts: appAccelerationProducts.setDescription('appAccelerationProducts is the root OBJECT IDENTIFIER from which sysObjectID values are assigned. Actual values are defined in APPACCELERATION-PRODUCTS-MIB.') app_acceleration_agent_capability = object_identity((1, 3, 6, 1, 4, 1, 3845, 30, 2)) if mibBuilder.loadTexts: appAccelerationAgentCapability.setStatus('current') if mibBuilder.loadTexts: appAccelerationAgentCapability.setDescription('appAccelerationAgentCapability provides a root object identifier from which AGENT-CAPABILITIES values may be assigned.') app_acceleration_modules = object_identity((1, 3, 6, 1, 4, 1, 3845, 30, 3)) if mibBuilder.loadTexts: appAccelerationModules.setStatus('current') if mibBuilder.loadTexts: appAccelerationModules.setDescription('appAccelerationModules provides a root object identifier from which MODULE-ENTITY values may be assigned.') app_acceleration_mgmt = object_identity((1, 3, 6, 1, 4, 1, 3845, 30, 4)) if mibBuilder.loadTexts: appAccelerationMgmt.setStatus('current') if mibBuilder.loadTexts: appAccelerationMgmt.setDescription('appAccelerationMgmt is the main subtree for management mibs.') app_acceleration_notifications = object_identity((1, 3, 6, 1, 4, 1, 3845, 30, 5)) if mibBuilder.loadTexts: appAccelerationNotifications.setStatus('current') if mibBuilder.loadTexts: appAccelerationNotifications.setDescription('appAccelerationNotifications is the main subtree for agent notifications.') mibBuilder.exportSymbols('APPACCELERATION-SMI', appAccelerationNotifications=appAccelerationNotifications, PYSNMP_MODULE_ID=appAcceleration, appAccelerationMgmt=appAccelerationMgmt, appAccelerationProducts=appAccelerationProducts, appAccelerationModules=appAccelerationModules, appAcceleration=appAcceleration, appAccelerationAgentCapability=appAccelerationAgentCapability)
""" ============================= Standard Output (second time) ============================= This example captures the stdout and includes it in the example. If output is too long it becomes automatically framed into a text area. """ print('We print something on the standard output.') print("A couple of lines.") #################################### # One line out print('one line out') #################################### # Two lines out print('one line out') print('second line out')
""" ============================= Standard Output (second time) ============================= This example captures the stdout and includes it in the example. If output is too long it becomes automatically framed into a text area. """ print('We print something on the standard output.') print('A couple of lines.') print('one line out') print('one line out') print('second line out')
# https://atcoder.jp/contests/arc016/tasks/arc016_2 N = int(input()) count = 0 fumen = [] for _ in range(N): fumen.append([s for s in input()]) for c in range(9): uncount_flag = False for r in range(N): if fumen[r][c] == 'x': count += 1 uncount_flag = False continue if fumen[r][c] == 'o' and not uncount_flag: count += 1 uncount_flag = True continue if fumen[r][c] == 'o' and uncount_flag: continue uncount_flag = False print(count)
n = int(input()) count = 0 fumen = [] for _ in range(N): fumen.append([s for s in input()]) for c in range(9): uncount_flag = False for r in range(N): if fumen[r][c] == 'x': count += 1 uncount_flag = False continue if fumen[r][c] == 'o' and (not uncount_flag): count += 1 uncount_flag = True continue if fumen[r][c] == 'o' and uncount_flag: continue uncount_flag = False print(count)
def print_matrix(m): for i in range(len(m)): print(m[i]) def m(): matrix = list() n = int(input()) for i in range(n): row = input().split() row = list(map(int, row)) matrix.append(row) get_diagonal(matrix) def get_diagonal(m): result = list() for row in range(len(m)): for j in range(len(m[row])): if row == j: result.append(m[row][j]) for i in range(len(result)): print(result[i], end = ' ') m()
def print_matrix(m): for i in range(len(m)): print(m[i]) def m(): matrix = list() n = int(input()) for i in range(n): row = input().split() row = list(map(int, row)) matrix.append(row) get_diagonal(matrix) def get_diagonal(m): result = list() for row in range(len(m)): for j in range(len(m[row])): if row == j: result.append(m[row][j]) for i in range(len(result)): print(result[i], end=' ') m()
class SimpleEvaluator: """ SimpleEvaluator is a simple class for evaluating (assigning scores to) benchmarked methods. """ def __init__(self): pass def get_score(self, proper_answer, answer, completion_time): """ Evaluates answer given by the tested method. In SimpleEvaluator's implementation this method is binary in regards to the given answer. If the method gave wrong answer, the final score will always be zero. Otherwise the score relies on the time it took to compute the answer. :param proper_answer: proper result which should be returned by tested method :param answer: result of the tested method :param completion_time: float value of tested method completion time (in seconds) :return: float score of the method (bigger value means better performance) """ completion_time = completion_time if completion_time > 0 else 1e-10 time_score = 10. ** 6 / completion_time return time_score * (1 if answer == proper_answer else 0)
class Simpleevaluator: """ SimpleEvaluator is a simple class for evaluating (assigning scores to) benchmarked methods. """ def __init__(self): pass def get_score(self, proper_answer, answer, completion_time): """ Evaluates answer given by the tested method. In SimpleEvaluator's implementation this method is binary in regards to the given answer. If the method gave wrong answer, the final score will always be zero. Otherwise the score relies on the time it took to compute the answer. :param proper_answer: proper result which should be returned by tested method :param answer: result of the tested method :param completion_time: float value of tested method completion time (in seconds) :return: float score of the method (bigger value means better performance) """ completion_time = completion_time if completion_time > 0 else 1e-10 time_score = 10.0 ** 6 / completion_time return time_score * (1 if answer == proper_answer else 0)
# help.py # Metadata NAME = 'help' ENABLE = True PATTERN = '^!help\s*(?P<module_name>.*)$' USAGE = '''Usage: !help [<module_name> | all] Either list all the modules or provide the usage message for a particular module. ''' # Command async def help(bot, message, module_name=None): responses = [] if not module_name or module_name == 'all': responses = sorted([m.NAME for m in bot.modules]) else: for module in bot.modules: if module.NAME == module_name: responses = module.USAGE.splitlines() # Suggest responses if none match if not responses: responses = sorted([m.NAME for m in bot.modules if module_name in m.NAME]) return [message.copy(body=r, notice=True) for r in responses] # Register def register(bot): return ( ('command', PATTERN, help), ) # vim: set sts=4 sw=4 ts=8 expandtab ft=python:
name = 'help' enable = True pattern = '^!help\\s*(?P<module_name>.*)$' usage = 'Usage: !help [<module_name> | all]\nEither list all the modules or provide the usage message for a particular\nmodule.\n' async def help(bot, message, module_name=None): responses = [] if not module_name or module_name == 'all': responses = sorted([m.NAME for m in bot.modules]) else: for module in bot.modules: if module.NAME == module_name: responses = module.USAGE.splitlines() if not responses: responses = sorted([m.NAME for m in bot.modules if module_name in m.NAME]) return [message.copy(body=r, notice=True) for r in responses] def register(bot): return (('command', PATTERN, help),)
k ,m= 0,0 while True: try: line = str(input()) except: break if line[0] == '+': m +=1 elif line[0] == '-': m -= 1 else: k += m*len(line[line.index(':')+1::]) print(k)
(k, m) = (0, 0) while True: try: line = str(input()) except: break if line[0] == '+': m += 1 elif line[0] == '-': m -= 1 else: k += m * len(line[line.index(':') + 1:]) print(k)
dataset_type = 'SIXrayDataset' data_root = 'datasets/sixray/' img_norm_cfg = dict( mean=[123.675, 116.28, 103.53], std=[58.395, 57.12, 57.375], to_rgb=True) albu_transforms = [ #dict(type='Equalize',mode='cv',by_channels=False) #dict(type='Blur') #dict(type='JpegCompression', quality_lower=10, quality_upper=11) ] train_pipeline = [ dict(type='LoadImageFromFile'), dict(type='LoadAnnotations', with_bbox=True), #dict(type='custom_MixUp', mixUp_prob=0.5), dict(type='custom_CutMix', cutMix_prob=0.5, class_targets={1:2, 2:1}), #dict(type='custom_bboxMixUp', mixUp_prob=0.5), dict(type='Resize', img_scale=(1333, 800), keep_ratio=True), dict(type='RandomFlip', flip_ratio=0.0), #dict(type='RandomFlip', flip_ratio=0.5), #dict(type='Albu', transforms=albu_transforms), #dict(type='custom_RandomCrop',crop_type='relative_range', crop_size=(0.75, 0.75)), #dict(type='Rotate',level=10), dict(type='Normalize', **img_norm_cfg), dict(type='Pad', size_divisor=32), dict(type='DefaultFormatBundle'), dict(type='Collect', keys=['img', 'gt_bboxes', 'gt_labels']), ] test_pipeline = [ dict(type='LoadImageFromFile'), dict( type='MultiScaleFlipAug', img_scale=(1333, 800), flip=False, transforms=[ dict(type='Resize', keep_ratio=True), dict(type='RandomFlip'), dict(type='Normalize', **img_norm_cfg), dict(type='Pad', size_divisor=32), dict(type='ImageToTensor', keys=['img']), dict(type='Collect', keys=['img']), ]) ] data = dict( samples_per_gpu=2, workers_per_gpu=2, train=dict( type=dataset_type, ann_file=data_root + 'annotations/instances_train2017.json', img_prefix=data_root + 'train2017/', pipeline=train_pipeline), val=dict( type=dataset_type, ann_file=data_root + 'annotations/instances_val2017.json', img_prefix=data_root + 'val2017/', pipeline=test_pipeline), test=dict( type=dataset_type, ann_file=data_root + 'annotations/instances_test2017.json', img_prefix=data_root + 'test2017/', pipeline=test_pipeline)) evaluation = dict(interval=1, metric='bbox')
dataset_type = 'SIXrayDataset' data_root = 'datasets/sixray/' img_norm_cfg = dict(mean=[123.675, 116.28, 103.53], std=[58.395, 57.12, 57.375], to_rgb=True) albu_transforms = [] train_pipeline = [dict(type='LoadImageFromFile'), dict(type='LoadAnnotations', with_bbox=True), dict(type='custom_CutMix', cutMix_prob=0.5, class_targets={1: 2, 2: 1}), dict(type='Resize', img_scale=(1333, 800), keep_ratio=True), dict(type='RandomFlip', flip_ratio=0.0), dict(type='Normalize', **img_norm_cfg), dict(type='Pad', size_divisor=32), dict(type='DefaultFormatBundle'), dict(type='Collect', keys=['img', 'gt_bboxes', 'gt_labels'])] test_pipeline = [dict(type='LoadImageFromFile'), dict(type='MultiScaleFlipAug', img_scale=(1333, 800), flip=False, transforms=[dict(type='Resize', keep_ratio=True), dict(type='RandomFlip'), dict(type='Normalize', **img_norm_cfg), dict(type='Pad', size_divisor=32), dict(type='ImageToTensor', keys=['img']), dict(type='Collect', keys=['img'])])] data = dict(samples_per_gpu=2, workers_per_gpu=2, train=dict(type=dataset_type, ann_file=data_root + 'annotations/instances_train2017.json', img_prefix=data_root + 'train2017/', pipeline=train_pipeline), val=dict(type=dataset_type, ann_file=data_root + 'annotations/instances_val2017.json', img_prefix=data_root + 'val2017/', pipeline=test_pipeline), test=dict(type=dataset_type, ann_file=data_root + 'annotations/instances_test2017.json', img_prefix=data_root + 'test2017/', pipeline=test_pipeline)) evaluation = dict(interval=1, metric='bbox')
def solution(yourLeft, yourRight, friendsLeft, friendsRight): ''' EXPLANATION ------------------------------------------------------------------- Since all values are in question in this problem, I sort both arrays, and then compare the resultant arrays. ------------------------------------------------------------------- ''' a = sorted([yourLeft, yourRight]) b = sorted([friendsLeft, friendsRight]) return a == b def oneline(yourLeft, yourRight, friendsLeft, friendsRight): ''' EXPLANATION ------------------------------------------------------------------- chris_l65 from the United States utilized the fact that sets are displayed as sorted to turn the problem into a one line solution. Their solution and mine vary under the hood of Python, but the end result in this context is the same. ------------------------------------------------------------------- ''' return {yourLeft, yourRight} == {friendsLeft, friendsRight}
def solution(yourLeft, yourRight, friendsLeft, friendsRight): """ EXPLANATION ------------------------------------------------------------------- Since all values are in question in this problem, I sort both arrays, and then compare the resultant arrays. ------------------------------------------------------------------- """ a = sorted([yourLeft, yourRight]) b = sorted([friendsLeft, friendsRight]) return a == b def oneline(yourLeft, yourRight, friendsLeft, friendsRight): """ EXPLANATION ------------------------------------------------------------------- chris_l65 from the United States utilized the fact that sets are displayed as sorted to turn the problem into a one line solution. Their solution and mine vary under the hood of Python, but the end result in this context is the same. ------------------------------------------------------------------- """ return {yourLeft, yourRight} == {friendsLeft, friendsRight}
# Filename:continue.py while True: s = input("Just input something:") if s != "quit": continue break
while True: s = input('Just input something:') if s != 'quit': continue break
""" Board representation of No Dice Einstein. """ COLOR = { "red": 'R', "blue": 'B' } VALUE = { 1: '1', 2: '2', 3: '3', 4: '4', 5: '5', 6: '6' } MOVE = { "U": "up", "D": "down", "L": "left", "R": "right", "X": "diagonal" } class Piece: def __init__(self, row, col, color, value): self.row = row # the piece's Y-coordinate on the board self.col = col # the piece's X-coordinate on the board self.color = color self.value = value def __str__(self): return COLOR[self.color] + VALUE[self.value] class Board: def __init__(self, num_of_rows, num_of_cols): self.NUM_OF_ROWS = num_of_rows self.NUM_OF_COLS = num_of_cols self.board = [] for _ in range(self.NUM_OF_ROWS): newRow = [None] * self.NUM_OF_COLS self.board.append(newRow) def print_board(self): print() for r in range(self.NUM_OF_ROWS): for c in range(self.NUM_OF_COLS): print(self.board[r][c], end = " ") print() print() def __str__(self): s = "" for r in range(self.NUM_OF_ROWS): for c in range(self.NUM_OF_COLS): if self.board[r][c]: s = s + str(self.board[r][c]) + ' ' else: s = s + "." + ' ' s = s + '\n' return s def addPiece(self, piece): self.board[piece.row][piece.col] = piece def movePiece(self, piece, row, col): oldRow = piece.row oldCol = piece.col self.board[row][col] = self.board[piece.row][piece.col] self.board[oldRow][oldCol] = None piece.row = row piece.col = col def removePiece(self, piece): self.board[piece.row][piece.col] = None del piece def get_piece(self, row, col): return self.board[row][col] def getRedPieces(self): numberofpieces = 0 for r in range(self.NUM_OF_ROWS): for c in range(self.NUM_OF_COLS): if self.board[r][c]: if self.board[r][c].color == "red": numberofpieces += 1 return numberofpieces def getBluePieces(self): numberofpieces = 0 for r in range(self.NUM_OF_ROWS): for c in range(self.NUM_OF_COLS): if self.board[r][c]: if self.board[r][c].color == "blue": numberofpieces += 1 return numberofpieces def getColorFromCoords(self, row, col): if row>=self.NUM_OF_ROWS or row<0 or col>=self.NUM_OF_COLS or col<0: return None # (checking boundaries!) if self.board[row][col] != None: return self.board[row][col].color return None
""" Board representation of No Dice Einstein. """ color = {'red': 'R', 'blue': 'B'} value = {1: '1', 2: '2', 3: '3', 4: '4', 5: '5', 6: '6'} move = {'U': 'up', 'D': 'down', 'L': 'left', 'R': 'right', 'X': 'diagonal'} class Piece: def __init__(self, row, col, color, value): self.row = row self.col = col self.color = color self.value = value def __str__(self): return COLOR[self.color] + VALUE[self.value] class Board: def __init__(self, num_of_rows, num_of_cols): self.NUM_OF_ROWS = num_of_rows self.NUM_OF_COLS = num_of_cols self.board = [] for _ in range(self.NUM_OF_ROWS): new_row = [None] * self.NUM_OF_COLS self.board.append(newRow) def print_board(self): print() for r in range(self.NUM_OF_ROWS): for c in range(self.NUM_OF_COLS): print(self.board[r][c], end=' ') print() print() def __str__(self): s = '' for r in range(self.NUM_OF_ROWS): for c in range(self.NUM_OF_COLS): if self.board[r][c]: s = s + str(self.board[r][c]) + ' ' else: s = s + '.' + ' ' s = s + '\n' return s def add_piece(self, piece): self.board[piece.row][piece.col] = piece def move_piece(self, piece, row, col): old_row = piece.row old_col = piece.col self.board[row][col] = self.board[piece.row][piece.col] self.board[oldRow][oldCol] = None piece.row = row piece.col = col def remove_piece(self, piece): self.board[piece.row][piece.col] = None del piece def get_piece(self, row, col): return self.board[row][col] def get_red_pieces(self): numberofpieces = 0 for r in range(self.NUM_OF_ROWS): for c in range(self.NUM_OF_COLS): if self.board[r][c]: if self.board[r][c].color == 'red': numberofpieces += 1 return numberofpieces def get_blue_pieces(self): numberofpieces = 0 for r in range(self.NUM_OF_ROWS): for c in range(self.NUM_OF_COLS): if self.board[r][c]: if self.board[r][c].color == 'blue': numberofpieces += 1 return numberofpieces def get_color_from_coords(self, row, col): if row >= self.NUM_OF_ROWS or row < 0 or col >= self.NUM_OF_COLS or (col < 0): return None if self.board[row][col] != None: return self.board[row][col].color return None
# Python - 3.6.0 Test.assert_equals(fib(1), 0, 'fib(1) failed') Test.assert_equals(fib(2), 1, 'fib(2) failed') Test.assert_equals(fib(3), 1, 'fib(3) failed') Test.assert_equals(fib(4), 2, 'fib(4) failed') Test.assert_equals(fib(5), 3, 'fib(5) failed')
Test.assert_equals(fib(1), 0, 'fib(1) failed') Test.assert_equals(fib(2), 1, 'fib(2) failed') Test.assert_equals(fib(3), 1, 'fib(3) failed') Test.assert_equals(fib(4), 2, 'fib(4) failed') Test.assert_equals(fib(5), 3, 'fib(5) failed')
class Solution: def maxCoins(self, piles: List[int]) -> int: piles.sort() n = len(piles) i, j = 0, n - 1 ans = 0 while i < j: c = piles[j - 1] j -= 2 i += 1 ans += c return ans
class Solution: def max_coins(self, piles: List[int]) -> int: piles.sort() n = len(piles) (i, j) = (0, n - 1) ans = 0 while i < j: c = piles[j - 1] j -= 2 i += 1 ans += c return ans
# Motor control DRIVE = 0 STEER = 1 # Body WAIST = 2 HEAD_SWIVEL = 3 HEAD_TILT = 4 # Right arm RIGHT_SHOULDER = 5 RIGHT_FLAP = 6 RIGHT_ELBOW = 7 RIGHT_WRIST = 8 RIGHT_TWIST = 9 RIGHT_GRIP = 10 # Left arm LEFT_SHOULDER = 12 LEFT_FLAP = 13 LEFT_ELBOW = 14 LEFT_WRIST = 15 LEFT_TWIST = 16 LEFT_GRIP = 17
drive = 0 steer = 1 waist = 2 head_swivel = 3 head_tilt = 4 right_shoulder = 5 right_flap = 6 right_elbow = 7 right_wrist = 8 right_twist = 9 right_grip = 10 left_shoulder = 12 left_flap = 13 left_elbow = 14 left_wrist = 15 left_twist = 16 left_grip = 17
__author__ = 'katharine' __version_info__ = (1, 1, 1) __version__ = '.'.join(map(str, __version_info__))
__author__ = 'katharine' __version_info__ = (1, 1, 1) __version__ = '.'.join(map(str, __version_info__))
# This program will convert given temperatures to different measuring units print("\nWelcome to the Temperature Conversion App") temp_f = float(input("What is the temperature in Fahrenheit: ")) # Temperature Conversions temp_c = (5/9) * (temp_f - 32) temp_k = temp_c + 273.15 # Round Temperatures to 2 decimal places temp_f = round(temp_f, 2) temp_c = round(temp_c, 2) temp_k = round(temp_k, 2) # Display summary in a table print("\nDegrees Fahrenheit:\t" + str(temp_f)) print("Degrees Celsius:\t" + str(temp_c)) print("Degrees Kelvin:\t\t" + str(temp_k))
print('\nWelcome to the Temperature Conversion App') temp_f = float(input('What is the temperature in Fahrenheit: ')) temp_c = 5 / 9 * (temp_f - 32) temp_k = temp_c + 273.15 temp_f = round(temp_f, 2) temp_c = round(temp_c, 2) temp_k = round(temp_k, 2) print('\nDegrees Fahrenheit:\t' + str(temp_f)) print('Degrees Celsius:\t' + str(temp_c)) print('Degrees Kelvin:\t\t' + str(temp_k))
# Those are the field names of the cargo tables of leaguepedia # Tournament tournaments_fields = { "Name", "DateStart", "Date", "Region", "League", "Rulebook", "TournamentLevel", "IsQualifier", "IsPlayoffs", "IsOfficial", "OverviewPage", } # Game game_fields = { "GameId", "MatchId", "Tournament", "Team1", "Team2", "Winner", "Gamelength_Number", "DateTime_UTC", "Team1Score", "Team2Score", "Team1Bans", "Team2Bans", "Team1Picks", "Team2Picks", "Team1Players", "Team2Players", "Team1Dragons", "Team2Dragons", "Team1Barons", "Team2Barons", "Team1Towers", "Team2Towers", "Team1RiftHeralds", "Team2RiftHeralds", "Team1Inhibitors", "Team2Inhibitors", "Patch", "MatchHistory", "VOD", "Gamename", "N_GameInMatch", "OverviewPage", } # Game Player game_players_fields = { "ScoreboardPlayers.Name=gameName", "ScoreboardPlayers.Role_Number=gameRoleNumber", "ScoreboardPlayers.Champion", "ScoreboardPlayers.Side", "Players.Name=irlName", "Players.Country", "Players.Birthdate", "Players.ID=currentGameName", # "Players.Image", # "Players.Team=currentTeam", # "Players.Role=currentRole", # "Players.SoloqueueIds", } # Ordered in the draft order for pro play as of June 2020 picks_bans_fields = [ "Team1Ban1", "Team2Ban1", "Team1Ban2", "Team2Ban2", "Team1Ban3", "Team2Ban3", "Team1Pick1", "Team2Pick1", "Team2Pick2", "Team1Pick2", "Team1Pick3", "Team2Pick3", "Team2Ban4", "Team1Ban4", "Team2Ban5", "Team1Ban5", "Team2Pick4", "Team1Pick4", "Team1Pick5", "Team2Pick5", ]
tournaments_fields = {'Name', 'DateStart', 'Date', 'Region', 'League', 'Rulebook', 'TournamentLevel', 'IsQualifier', 'IsPlayoffs', 'IsOfficial', 'OverviewPage'} game_fields = {'GameId', 'MatchId', 'Tournament', 'Team1', 'Team2', 'Winner', 'Gamelength_Number', 'DateTime_UTC', 'Team1Score', 'Team2Score', 'Team1Bans', 'Team2Bans', 'Team1Picks', 'Team2Picks', 'Team1Players', 'Team2Players', 'Team1Dragons', 'Team2Dragons', 'Team1Barons', 'Team2Barons', 'Team1Towers', 'Team2Towers', 'Team1RiftHeralds', 'Team2RiftHeralds', 'Team1Inhibitors', 'Team2Inhibitors', 'Patch', 'MatchHistory', 'VOD', 'Gamename', 'N_GameInMatch', 'OverviewPage'} game_players_fields = {'ScoreboardPlayers.Name=gameName', 'ScoreboardPlayers.Role_Number=gameRoleNumber', 'ScoreboardPlayers.Champion', 'ScoreboardPlayers.Side', 'Players.Name=irlName', 'Players.Country', 'Players.Birthdate', 'Players.ID=currentGameName'} picks_bans_fields = ['Team1Ban1', 'Team2Ban1', 'Team1Ban2', 'Team2Ban2', 'Team1Ban3', 'Team2Ban3', 'Team1Pick1', 'Team2Pick1', 'Team2Pick2', 'Team1Pick2', 'Team1Pick3', 'Team2Pick3', 'Team2Ban4', 'Team1Ban4', 'Team2Ban5', 'Team1Ban5', 'Team2Pick4', 'Team1Pick4', 'Team1Pick5', 'Team2Pick5']
# Definition for a binary tree node. # class TreeNode: # def __init__(self, val=0, left=None, right=None): # self.val = val # self.left = left # self.right = right class Solution: def countPairs(self, root: TreeNode, distance: int) -> int: # Compute all values of pairs # 1000 # compute all nodes # tree to graph graph = collections.defaultdict(list) leafs = set() def dfs(node): if node is not None: if node.left is None and node.right is None: leafs.add(node) if node.left is not None: graph[node].append(node.left) graph[node.left].append(node) dfs(node.left) if node.right is not None: graph[node].append(node.right) graph[node.right].append(node) dfs(node.right) dfs(root) # print([node.val for node in leafs]) self.cnt = 0 def bfs(node): seen = {node} frontier = [node] k = distance while frontier: next_level = [] for u in frontier: for v in graph[u]: if v not in seen: seen.add(v) next_level.append(v) self.cnt += v in leafs frontier = next_level if k == 1: break k -= 1 for node in leafs: bfs(node) return self.cnt // 2
class Solution: def count_pairs(self, root: TreeNode, distance: int) -> int: graph = collections.defaultdict(list) leafs = set() def dfs(node): if node is not None: if node.left is None and node.right is None: leafs.add(node) if node.left is not None: graph[node].append(node.left) graph[node.left].append(node) dfs(node.left) if node.right is not None: graph[node].append(node.right) graph[node.right].append(node) dfs(node.right) dfs(root) self.cnt = 0 def bfs(node): seen = {node} frontier = [node] k = distance while frontier: next_level = [] for u in frontier: for v in graph[u]: if v not in seen: seen.add(v) next_level.append(v) self.cnt += v in leafs frontier = next_level if k == 1: break k -= 1 for node in leafs: bfs(node) return self.cnt // 2
class Game(dict): def __init__(self, **kw): dict.__init__(self, kw) self.__dict__.update(kw) # Assigned via game.xml self.home_team= None self.away_team = None self.stadium = None # Assigned via ???? self.innings = [] # Assigned Via game_events.xml self.at_bats = []
class Game(dict): def __init__(self, **kw): dict.__init__(self, kw) self.__dict__.update(kw) self.home_team = None self.away_team = None self.stadium = None self.innings = [] self.at_bats = []
#!/usr/bin/env python3 # -*- coding: utf-8 -*- """ Created on Tue Sep 15 15:17:43 2020 @author: runner """ def my_addition(a, b): return a+b print('10+2=12 ?',my_addition(10,2))
""" Created on Tue Sep 15 15:17:43 2020 @author: runner """ def my_addition(a, b): return a + b print('10+2=12 ?', my_addition(10, 2))
###################################################### # schema schemaclipboard = None SCHEMA_WRITE_PREFERENCE_DEFAULTS = [ {"key":"addchild","display":"Add child","default":True}, {"key":"remove","display":"Remove","default":True}, {"key":"childsopened","display":"Childs opened","default":False}, {"key":"editenabled","display":"Edit enabled","default":True}, {"key":"editkey","display":"Edit key","default":True}, {"key":"editvalue","display":"Edit value","default":True}, {"key":"radio","display":"Radio","default":False}, {"key":"slider","display":"Slider","default":False}, {"key":"check","display":"Check","default":False}, {"key":"showhelpashtml","display":"Show help as HTML","default":True} ] class SchemaWritePreference: def __init__(self): for item in SCHEMA_WRITE_PREFERENCE_DEFAULTS: self[item["key"]] = item["default"] self.parent = None self.changecallback = None self.disabledlist = [] def setparent(self, parent): self.parent = parent return self def setchangecallback(self, changecallback): self.changecallback = changecallback return self def changed(self): if not ( self.changecallback is None ): self.changecallback() def setdisabledlist(self, disabledlist): self.disabledlist = disabledlist return self def form(self): formdiv = Div().ac("noselect") mdl = self.disabledlist if not ( self.parent is None ): if self.parent.parent is None: mdl = mdl + ["editkey"] for item in SCHEMA_WRITE_PREFERENCE_DEFAULTS: if not ( item["key"] in mdl ): formdiv.a(LabeledLinkedCheckBox(item["display"], self, item["key"], { "patchclasses":["container/a/schemawritepreferenceformsubdiv"], "changecallback": self.changed })) return formdiv def toobj(self): obj = {} for item in SCHEMA_WRITE_PREFERENCE_DEFAULTS: obj[item["key"]] = self[item["key"]] return obj DEFAULT_HELP = "No help available for this item." DEFAULT_ENABLED = True class SchemaItem(e): def parentsettask(self): pass def setparent(self, parent): self.parent = parent self.parentsettask() def getitem(self): return self def label(self): return "" def baseobj(self): obj = { "kind": self.kind, "enabled": self.enabled, "help": self.help, "writepreference": self.writepreference.toobj() } return obj def toobj(self): return self.baseobj() def topureobj(self): pureobj = {} return pureobj def enablechangedtask(): pass def enablecallback(self): self.enabled = self.enablecheckbox.getchecked() if not ( self.childparent is None ): if self.childparent.writepreference.radio: self.childparent.setradio(self) self.childparent.enablechangedtask() self.enablechangedtask() def setenabled(self, enabled): self.enabled = enabled self.enablecheckbox.setchecked(self.enabled) def helpboxclicked(self): if self.helpopen: self.helphook.x() self.helpopen = False else: self.helpdiv = Div().ac("schemahelpdiv") self.helpcontentdiv = Div().aac(["schemahelpcontentdiv","noselect"]).html(self.help) self.helpeditdiv = Div().ac("schemahelpeditdiv") self.helpedittextarea = LinkedTextarea(self, "help", {"patchclasses":["textarea/a/schemahelpedittextarea"],"text":self.help}) self.helpeditdiv.a(self.helpedittextarea) if self.writepreference.showhelpashtml: self.helpdiv.a(self.helpcontentdiv) else: self.helpdiv.a(self.helpeditdiv) self.helphook.a(self.helpdiv) self.helpopen = True def copyboxclicked(self): schemaclipboard.copy(self) def settingsboxclicked(self): if self.settingsopen: self.settingshook.x() self.settingsopen = False else: self.settingsdiv = Div().ac("schemasettingsdiv").a(self.writepreference.form()) self.settingshook.a(self.settingsdiv) self.settingsopen = True def removeboxclicked(self): self.childparent.remove(self) pass def writepreferencechangedtask(self): pass def writepreferencechanged(self): self.helpboxclicked() self.helpboxclicked() self.enablecheckbox.able(self.writepreference.editenabled) self.setchildparent(self.childparent) self.writepreferencechangedtask() if not ( self.parent is None ): self.parent.writepreferencechangedtask() def setchildparent(self, childparent): self.childparent = childparent if ( not ( self.childparent is None ) ) and self.writepreference.remove: self.schemacontainer.x().aa([self.enablebox, self.element, self.helpbox, self.copybox, self.settingsbox, self.removebox]) else: self.schemacontainer.x().aa([self.enablebox, self.element, self.helpbox, self.copybox, self.settingsbox]) def elementdragstart(self, ev): self.dragstartvect = getClientVect(ev) def elementdrag(self, ev): pass def move(self, dir): if self.childparent is None: return i = self.childparent.getitemindex(self) newi = i + dir self.childparent.movechildi(i, newi) def elementdragend(self, ev): self.dragendvect = getClientVect(ev) diff = self.dragendvect.m(self.dragstartvect) dir = int(diff.y / getglobalcssvarpxint("--schemabase")) self.move(dir) def __init__(self, args): super().__init__("div") self.parent = None self.childparent = None self.args = args self.kind = "item" self.enabled = args.get("enabled", DEFAULT_ENABLED) self.help = args.get("help", DEFAULT_HELP) self.writepreference = args.get("writepreference", SchemaWritePreference()) self.writepreference.setparent(self) self.writepreference.setchangecallback(self.writepreferencechanged) self.element = Div().ac("schemaitem") self.schemacontainer = Div().ac("schemacontainer") self.enablebox = Div().ac("schemaenablebox") self.enablecheckbox = CheckBox(self.enabled).ac("schemaenablecheckbox").ae("change", self.enablecallback) self.enablecheckbox.able(self.writepreference.editenabled) self.enablebox.a(self.enablecheckbox) self.helpbox = Div().aac(["schemahelpbox","noselect"]).ae("mousedown", self.helpboxclicked).html("?") self.copybox = Div().aac(["schemacopybox","noselect"]).ae("mousedown", self.copyboxclicked).html("C") self.settingsbox = Div().aac(["schemasettingsbox","noselect"]).ae("mousedown", self.settingsboxclicked).html("S") self.removebox = Div().aac(["schemaremovebox","noselect"]).ae("mousedown", self.removeboxclicked).html("X") self.afterelementhook = Div() self.settingsopen = args.get("settingsopen", False) self.helpopen = args.get("helpopen", False) self.settingshook = Div() self.helphook = Div() self.schemacontainer.aa([self.enablebox, self.element, self.helpbox, self.copybox, self.settingsbox]) self.itemcontainer = Div() self.itemcontainer.aa([self.schemacontainer, self.helphook, self.settingshook, self.afterelementhook]) self.a(self.itemcontainer) self.dragelement = self.copybox self.dragelement.sa("draggable", True) self.dragelement.ae("dragstart", self.elementdragstart) self.dragelement.ae("drag", self.elementdrag) self.dragelement.ae("dragend", self.elementdragend) self.dragelement.ae("dragover", lambda ev: ev.preventDefault()) class NamedSchemaItem(e): def getitem(self): return self.item def label(self): return self.key def toobj(self): return { "kind": "nameditem", "key": self.key, "item": self.item.toobj() } def writepreferencechangedtask(self): self.linkedtextinput.able(self.item.writepreference.editkey) def keychanged(self): if not ( self.keychangedcallback is None ): self.keychangedcallback() def setkeychangedcallback(self, keychangedcallback): self.keychangedcallback = keychangedcallback return self def setkey(self, key): self.key = key self.linkedtextinput.setText(self.key) return self def __init__(self, args): super().__init__("div") self.kind = "nameditem" #self.key = args.get("key", uid()) self.key = args.get("key", "") self.item = args.get("item", SchemaItem(args)) self.keychangedcallback = None self.item.setparent(self) self.namedcontainer = Div().ac("namedschemaitem") self.namediv = Div().ac("schemaitemname") self.linkedtextinput = LinkedTextInput(self, "key", { "textclass": "namedschemaitemrawtextinput", "keyupcallback": self.keychanged }) self.linkedtextinput.setText(self.key) self.linkedtextinput.able(self.item.writepreference.editkey) self.namediv.a(self.linkedtextinput) self.namedcontainer.aa([self.namediv, self.item]) self.a(self.namedcontainer) def copy(self, item): self.item = schemafromobj(item.toobj()) self.item.parent = None self.key = None if not ( item.parent is None ): self.key = item.parent.key class SchemaScalar(SchemaItem): def label(self): return self.value def toobj(self): obj = self.baseobj() obj["value"] = self.value obj["minvalue"] = self.minvalue obj["maxvalue"] = self.maxvalue return obj def topureobj(self): obj = self.value return obj def writepreferencechangedtask(self): self.build() def enablechangedtask(self): if self.writepreference.check: if self.enabled: self.value = "true" else: self.value = "false" self.linkedtextinput.setText(self.value) def build(self): if self.writepreference.slider: self.enablecheckbox.rc("schemacheckenablecheckbox") self.linkedslider = LinkedSlider(self, "value", { "containerclass": "schemalinkedslidercontainerclass", "valuetextclass": "schemalinkedslidervaluetextclass", "mintextclass": "schemalinkedslidermintextclass", "sliderclass": "schemalinkedslidersliderclass", "maxtextclass": "schemalinkedslidermaxtextclass" }) self.element.x().aa([self.linkedslider]) else: self.enablebox.arc(self.writepreference.check, "schemacheckenablecheckbox") self.linkedtextinput = LinkedTextInput(self, "value", {"textclass":"schemascalarrawtextinput"}) self.linkedtextinput.able(self.writepreference.editvalue) self.element.x().aa([self.linkedtextinput]) def __init__(self, args): super().__init__(args) self.kind = "scalar" #self.value = args.get("value", randscalarvalue(2, 8)) self.value = args.get("value", "") self.minvalue = args.get("minvalue", 1) self.maxvalue = args.get("maxvalue", 100) self.element.ac("schemascalar") self.writepreference.setdisabledlist(["addchild","childsopened","radio"]) self.build() class SchemaCollection(SchemaItem): def removechildi(self, i): newchilds = [] rchild = None for j in range(0, len(self.childs)): if ( j == i ): rchild = self.childs[j] else: newchilds.append(self.childs[j]) self.childs = newchilds self.openchilds() self.openchilds() return rchild def insertchildi(self, i, child): newchilds = [] for j in range(0, len(self.childs) + 1): if ( j == i ): newchilds.append(child) if ( j < len(self.childs) ): newchilds.append(self.childs[j]) self.childs = newchilds self.openchilds() self.openchilds() def movechildi(self, i, newi): if len(self.childs) <= 0: return if newi < 0: newi = 0 if newi >= len(self.childs): newi = len(self.childs) - 1 rchild = self.removechildi(i) if not ( rchild is None ): self.insertchildi(newi, rchild) def getitemindex(self, item): for i in range(0, len(self.childs)): if self.childs[i].getitem() == item: return i return None def parentsettask(self): self.opendiv.arc(not self.parent is None, "schemadictchildleftmargin") def enablechangedtask(self): self.openchilds() self.openchilds() def buildchilds(self): labellist = [] self.childshook.x() for child in self.childs: self.childshook.a(child) if child.getitem().enabled: labellist.append(child.label()) label = " , ".join(labellist) self.openbutton.x().a(Div().ac("schemacollectionopenbuttonlabel").html(label)) def topureobj(self): pureobj = {} if self.writepreference.radio: if self.kind == "dict": pureobj = ["", {}] for nameditem in self.childs: key = nameditem.key item = nameditem.item if item.enabled or item.writepreference.check: pureobj = [key, item.topureobj()] break elif self.kind == "list": for item in self.childs: if item.enabled or item.writepreference.check: pureobj = item.topureobj() break else: if self.kind == "dict": for nameditem in self.childs: key = nameditem.key item = nameditem.item if item.enabled or item.writepreference.check: pureobj[key] = item.topureobj() elif self.kind == "list": pureobj = [] for item in self.childs: if item.enabled or item.writepreference.check: pureobj.append(item.topureobj()) return pureobj def setradio(self, item): for child in self.childs: childitem = child.getitem() childeq = ( childitem == item ) childitem.enabled = childeq childitem.enablecheckbox.setchecked(childeq) def remove(self, item): newlist = [] for child in self.childs: childeq = False if child.kind == "nameditem": childeq = ( child.item == item ) else: childeq = ( child == item ) if not childeq: newlist.append(child) self.childs = newlist self.openchilds() self.openchilds() def getschemakinds(self): schemakinds = { "create" : "Create new", "scalar" : "Scalar", "list" : "List", "dict" : "Dict" } for nameditem in self.childs: key = nameditem.key if not ( key == None ): if len(key) > 0: schemakinds["#" + key] = key return schemakinds def updatecreatecombo(self): if not ( self.createcombo is None ): self.createcombo.setoptions(self.getschemakinds()) def getchildbykey(self, key): if not ( self.kind == "dict" ): return None for nameditem in self.childs: if nameditem.key == key: return nameditem.item return None def createcallback(self, key): self.updatecreatecombo() sch = SchemaScalar({}) if key == "list": sch = SchemaList({}) elif key == "dict": sch = SchemaDict({}) if key[0] == "#": truekey = key[1:] titem = self.getchildbykey(truekey) if titem == None: print("error, no item with key", truekey) else: sch = schemafromobj(titem.toobj()) sch.setchildparent(self) appendelement = sch if self.kind == "dict": appendelement = NamedSchemaItem({ "item": sch }).setkeychangedcallback(self.updatecreatecombo) self.childs.append(appendelement) self.buildchilds() self.updatecreatecombo() def pastebuttonclicked(self): try: sch = schemafromobj(schemaclipboard.item.toobj()) except: window.alert("No item on clipboard to paste!") return self sch.setchildparent(self) appendelement = sch if self.kind == "dict": appendelement = NamedSchemaItem({ "item": sch }).setkeychangedcallback(self.updatecreatecombo) if not ( schemaclipboard.key is None ): appendelement.setkey(schemaclipboard.key) self.childs.append(appendelement) self.buildchilds() self.updatecreatecombo() def openchilds(self): if self.opened: self.opened = False self.createhook.x() self.childshook.x() self.openbutton.rc("schemacollectionopenbuttondone") else: self.opened = True self.creatediv = Div().ac("schemaitem").ac("schemacreate") self.createcombo = ComboBox({ "changecallback": self.createcallback, "selectclass": "schemacreatecomboselect" }) self.updatecreatecombo() self.pastebutton = Button("Paste", self.pastebuttonclicked).ac("schemapastebutton") self.creatediv.aa([self.createcombo, self.pastebutton]) if self.writepreference.addchild: self.createhook.a(self.creatediv) self.openbutton.ac("schemacollectionopenbuttondone") self.buildchilds() def writepreferencechangedtask(self): self.openchilds() self.openchilds() def __init__(self, args): super().__init__(args) self.kind = "collection" self.opened = False self.childs = args.get("childs", []) self.editmode = args.get("editmode", False) self.childseditable = args.get("childseditable", True) self.element.ac("schemacollection") self.openbutton = Div().aac(["schemacollectionopenbutton","noselect"]).ae("mousedown", self.openchilds) self.element.aa([self.openbutton]) self.createcombo = None self.createhook = Div() self.childshook = Div() self.opendiv = Div().ac("schemacollectionopendiv") self.opendiv.aa([self.createhook, self.childshook]) self.afterelementhook.a(self.opendiv) self.openchilds() if not self.writepreference.childsopened: self.openchilds() class SchemaList(SchemaCollection): def getfirstselectedindex(self): i = 0 for item in self.childs: if item.enabled: return i i+=1 return None def toobj(self): listobj = [] for item in self.childs: listobj.append(item.toobj()) obj = self.baseobj() obj["items"] = listobj return obj def __init__(self, args): super().__init__(args) self.kind = "list" self.element.ac("schemalist") self.writepreference.setdisabledlist(["editvalue", "slider", "check"]) class SchemaDict(SchemaCollection): def setchildatkey(self, key, item): item.setchildparent(self) nameditem = NamedSchemaItem({ "key": key, "item": item }) i = self.getitemindexbykey(key) if i is None: self.childs.append(nameditem) else: self.childs[i] = nameditem self.openchilds() self.openchilds() def getfirstselectedindex(self): i = 0 for item in self.childs: if item.item.enabled: return i i+=1 return None def getitemindexbykey(self, key): i = 0 for item in self.childs: if item.key == key: return i i+=1 return None def toobj(self): dictobj = [] for item in self.childs: sch = { "key": item.key, "item": item.item.toobj() } dictobj.append(sch) obj = self.baseobj() obj["items"] = dictobj return obj def __init__(self, args): super().__init__(args) self.kind = "dict" self.element.ac("schemadict") self.writepreference.setdisabledlist(["editvalue", "slider", "check"]) def schemawritepreferencefromobj(obj): swp = SchemaWritePreference() for item in SCHEMA_WRITE_PREFERENCE_DEFAULTS: swp[item["key"]] = getfromobj(obj, item["key"], item["default"]) return swp def schemafromobj(obj): kind = getfromobj(obj, "kind", "dict") enabled = getfromobj(obj, "enabled", DEFAULT_ENABLED) help = getfromobj(obj, "help", DEFAULT_HELP) writepreference = schemawritepreferencefromobj(getfromobj(obj, "writepreference", {})) returnobj = {} if kind == "scalar": returnobj = SchemaScalar({ "value": obj["value"], "minvalue": obj["minvalue"], "maxvalue": obj["maxvalue"], "writepreference": writepreference }) elif kind == "list": items = obj["items"] childs = [] for item in items: sch = schemafromobj(item) childs.append(sch) returnobj = SchemaList({ "childs": childs, "writepreference": writepreference }) for child in returnobj.childs: child.setchildparent(returnobj) elif kind == "dict": items = obj["items"] childs = [] for itemobj in items: key = itemobj["key"] item = itemobj["item"] sch = schemafromobj(item) namedsch = NamedSchemaItem({ "key": key, "item": sch, "writepreference": writepreference }) childs.append(namedsch) returnobj = SchemaDict({ "childs": childs, "writepreference": writepreference }) for child in returnobj.childs: child.item.setchildparent(returnobj) child.setkeychangedcallback(returnobj.updatecreatecombo) returnobj.setenabled(enabled) returnobj.help = help return returnobj def getpathlistfromschema(sch, pathlist): if len(pathlist)<=0: return sch key = pathlist[0] pathlist = pathlist[1:] if key == "#": if sch.kind == "scalar": return None elif sch.kind == "list": i = sch.getfirstselectedindex() if i == None: return None return getpathlistfromschema(sch.childs[i], pathlist) elif sch.kind == "dict": i = sch.getfirstselectedindex() if i == None: return None return getpathlistfromschema(sch.childs[i].item, pathlist) else: if sch.kind == "scalar": return None elif sch.kind == "list": return None elif sch.kind == "dict": for child in sch.childs: if child.key == key: return getpathlistfromschema(child.item, pathlist) return None def getpathfromschema(sch, path): pathlist = path.split("/") return getpathlistfromschema(sch, pathlist) def getscalarfromschema(sch, path): found = getpathfromschema(sch, path) if not ( found is None ): if found.kind == "scalar": return found.value found = getpathfromschema(sch, path + "/#") if not ( found is None ): if found.kind == "scalar": return found.value return None def schemafromucioptionsobj(obj): ucioptions = SchemaDict({}) for opt in obj: key = opt["key"] kind = opt["kind"] default = opt["default"] min = opt["min"] max = opt["max"] options = opt["options"] item = SchemaScalar({ "value": default }) if kind == "spin": item.minvalue = min item.maxvalue = max item.writepreference.slider = True item.build() elif kind == "check": item.value = "false" if default: item.value = "true" item.writepreference.check = True item.setenabled(default) item.build() elif kind == "combo": item = SchemaList({}) item.writepreference.radio = True for comboopt in options: comboitem = SchemaScalar({ "value": comboopt }) comboitem.setenabled(comboopt == default) comboitem.setchildparent(item) item.childs.append(comboitem) item.openchilds() item.openchilds() item.setchildparent(ucioptions) nameditem = NamedSchemaItem({ "key": key, "item": item }) ucioptions.childs.append(nameditem) return ucioptions schemaclipboard = NamedSchemaItem({}) ######################################################
schemaclipboard = None schema_write_preference_defaults = [{'key': 'addchild', 'display': 'Add child', 'default': True}, {'key': 'remove', 'display': 'Remove', 'default': True}, {'key': 'childsopened', 'display': 'Childs opened', 'default': False}, {'key': 'editenabled', 'display': 'Edit enabled', 'default': True}, {'key': 'editkey', 'display': 'Edit key', 'default': True}, {'key': 'editvalue', 'display': 'Edit value', 'default': True}, {'key': 'radio', 'display': 'Radio', 'default': False}, {'key': 'slider', 'display': 'Slider', 'default': False}, {'key': 'check', 'display': 'Check', 'default': False}, {'key': 'showhelpashtml', 'display': 'Show help as HTML', 'default': True}] class Schemawritepreference: def __init__(self): for item in SCHEMA_WRITE_PREFERENCE_DEFAULTS: self[item['key']] = item['default'] self.parent = None self.changecallback = None self.disabledlist = [] def setparent(self, parent): self.parent = parent return self def setchangecallback(self, changecallback): self.changecallback = changecallback return self def changed(self): if not self.changecallback is None: self.changecallback() def setdisabledlist(self, disabledlist): self.disabledlist = disabledlist return self def form(self): formdiv = div().ac('noselect') mdl = self.disabledlist if not self.parent is None: if self.parent.parent is None: mdl = mdl + ['editkey'] for item in SCHEMA_WRITE_PREFERENCE_DEFAULTS: if not item['key'] in mdl: formdiv.a(labeled_linked_check_box(item['display'], self, item['key'], {'patchclasses': ['container/a/schemawritepreferenceformsubdiv'], 'changecallback': self.changed})) return formdiv def toobj(self): obj = {} for item in SCHEMA_WRITE_PREFERENCE_DEFAULTS: obj[item['key']] = self[item['key']] return obj default_help = 'No help available for this item.' default_enabled = True class Schemaitem(e): def parentsettask(self): pass def setparent(self, parent): self.parent = parent self.parentsettask() def getitem(self): return self def label(self): return '' def baseobj(self): obj = {'kind': self.kind, 'enabled': self.enabled, 'help': self.help, 'writepreference': self.writepreference.toobj()} return obj def toobj(self): return self.baseobj() def topureobj(self): pureobj = {} return pureobj def enablechangedtask(): pass def enablecallback(self): self.enabled = self.enablecheckbox.getchecked() if not self.childparent is None: if self.childparent.writepreference.radio: self.childparent.setradio(self) self.childparent.enablechangedtask() self.enablechangedtask() def setenabled(self, enabled): self.enabled = enabled self.enablecheckbox.setchecked(self.enabled) def helpboxclicked(self): if self.helpopen: self.helphook.x() self.helpopen = False else: self.helpdiv = div().ac('schemahelpdiv') self.helpcontentdiv = div().aac(['schemahelpcontentdiv', 'noselect']).html(self.help) self.helpeditdiv = div().ac('schemahelpeditdiv') self.helpedittextarea = linked_textarea(self, 'help', {'patchclasses': ['textarea/a/schemahelpedittextarea'], 'text': self.help}) self.helpeditdiv.a(self.helpedittextarea) if self.writepreference.showhelpashtml: self.helpdiv.a(self.helpcontentdiv) else: self.helpdiv.a(self.helpeditdiv) self.helphook.a(self.helpdiv) self.helpopen = True def copyboxclicked(self): schemaclipboard.copy(self) def settingsboxclicked(self): if self.settingsopen: self.settingshook.x() self.settingsopen = False else: self.settingsdiv = div().ac('schemasettingsdiv').a(self.writepreference.form()) self.settingshook.a(self.settingsdiv) self.settingsopen = True def removeboxclicked(self): self.childparent.remove(self) pass def writepreferencechangedtask(self): pass def writepreferencechanged(self): self.helpboxclicked() self.helpboxclicked() self.enablecheckbox.able(self.writepreference.editenabled) self.setchildparent(self.childparent) self.writepreferencechangedtask() if not self.parent is None: self.parent.writepreferencechangedtask() def setchildparent(self, childparent): self.childparent = childparent if not self.childparent is None and self.writepreference.remove: self.schemacontainer.x().aa([self.enablebox, self.element, self.helpbox, self.copybox, self.settingsbox, self.removebox]) else: self.schemacontainer.x().aa([self.enablebox, self.element, self.helpbox, self.copybox, self.settingsbox]) def elementdragstart(self, ev): self.dragstartvect = get_client_vect(ev) def elementdrag(self, ev): pass def move(self, dir): if self.childparent is None: return i = self.childparent.getitemindex(self) newi = i + dir self.childparent.movechildi(i, newi) def elementdragend(self, ev): self.dragendvect = get_client_vect(ev) diff = self.dragendvect.m(self.dragstartvect) dir = int(diff.y / getglobalcssvarpxint('--schemabase')) self.move(dir) def __init__(self, args): super().__init__('div') self.parent = None self.childparent = None self.args = args self.kind = 'item' self.enabled = args.get('enabled', DEFAULT_ENABLED) self.help = args.get('help', DEFAULT_HELP) self.writepreference = args.get('writepreference', schema_write_preference()) self.writepreference.setparent(self) self.writepreference.setchangecallback(self.writepreferencechanged) self.element = div().ac('schemaitem') self.schemacontainer = div().ac('schemacontainer') self.enablebox = div().ac('schemaenablebox') self.enablecheckbox = check_box(self.enabled).ac('schemaenablecheckbox').ae('change', self.enablecallback) self.enablecheckbox.able(self.writepreference.editenabled) self.enablebox.a(self.enablecheckbox) self.helpbox = div().aac(['schemahelpbox', 'noselect']).ae('mousedown', self.helpboxclicked).html('?') self.copybox = div().aac(['schemacopybox', 'noselect']).ae('mousedown', self.copyboxclicked).html('C') self.settingsbox = div().aac(['schemasettingsbox', 'noselect']).ae('mousedown', self.settingsboxclicked).html('S') self.removebox = div().aac(['schemaremovebox', 'noselect']).ae('mousedown', self.removeboxclicked).html('X') self.afterelementhook = div() self.settingsopen = args.get('settingsopen', False) self.helpopen = args.get('helpopen', False) self.settingshook = div() self.helphook = div() self.schemacontainer.aa([self.enablebox, self.element, self.helpbox, self.copybox, self.settingsbox]) self.itemcontainer = div() self.itemcontainer.aa([self.schemacontainer, self.helphook, self.settingshook, self.afterelementhook]) self.a(self.itemcontainer) self.dragelement = self.copybox self.dragelement.sa('draggable', True) self.dragelement.ae('dragstart', self.elementdragstart) self.dragelement.ae('drag', self.elementdrag) self.dragelement.ae('dragend', self.elementdragend) self.dragelement.ae('dragover', lambda ev: ev.preventDefault()) class Namedschemaitem(e): def getitem(self): return self.item def label(self): return self.key def toobj(self): return {'kind': 'nameditem', 'key': self.key, 'item': self.item.toobj()} def writepreferencechangedtask(self): self.linkedtextinput.able(self.item.writepreference.editkey) def keychanged(self): if not self.keychangedcallback is None: self.keychangedcallback() def setkeychangedcallback(self, keychangedcallback): self.keychangedcallback = keychangedcallback return self def setkey(self, key): self.key = key self.linkedtextinput.setText(self.key) return self def __init__(self, args): super().__init__('div') self.kind = 'nameditem' self.key = args.get('key', '') self.item = args.get('item', schema_item(args)) self.keychangedcallback = None self.item.setparent(self) self.namedcontainer = div().ac('namedschemaitem') self.namediv = div().ac('schemaitemname') self.linkedtextinput = linked_text_input(self, 'key', {'textclass': 'namedschemaitemrawtextinput', 'keyupcallback': self.keychanged}) self.linkedtextinput.setText(self.key) self.linkedtextinput.able(self.item.writepreference.editkey) self.namediv.a(self.linkedtextinput) self.namedcontainer.aa([self.namediv, self.item]) self.a(self.namedcontainer) def copy(self, item): self.item = schemafromobj(item.toobj()) self.item.parent = None self.key = None if not item.parent is None: self.key = item.parent.key class Schemascalar(SchemaItem): def label(self): return self.value def toobj(self): obj = self.baseobj() obj['value'] = self.value obj['minvalue'] = self.minvalue obj['maxvalue'] = self.maxvalue return obj def topureobj(self): obj = self.value return obj def writepreferencechangedtask(self): self.build() def enablechangedtask(self): if self.writepreference.check: if self.enabled: self.value = 'true' else: self.value = 'false' self.linkedtextinput.setText(self.value) def build(self): if self.writepreference.slider: self.enablecheckbox.rc('schemacheckenablecheckbox') self.linkedslider = linked_slider(self, 'value', {'containerclass': 'schemalinkedslidercontainerclass', 'valuetextclass': 'schemalinkedslidervaluetextclass', 'mintextclass': 'schemalinkedslidermintextclass', 'sliderclass': 'schemalinkedslidersliderclass', 'maxtextclass': 'schemalinkedslidermaxtextclass'}) self.element.x().aa([self.linkedslider]) else: self.enablebox.arc(self.writepreference.check, 'schemacheckenablecheckbox') self.linkedtextinput = linked_text_input(self, 'value', {'textclass': 'schemascalarrawtextinput'}) self.linkedtextinput.able(self.writepreference.editvalue) self.element.x().aa([self.linkedtextinput]) def __init__(self, args): super().__init__(args) self.kind = 'scalar' self.value = args.get('value', '') self.minvalue = args.get('minvalue', 1) self.maxvalue = args.get('maxvalue', 100) self.element.ac('schemascalar') self.writepreference.setdisabledlist(['addchild', 'childsopened', 'radio']) self.build() class Schemacollection(SchemaItem): def removechildi(self, i): newchilds = [] rchild = None for j in range(0, len(self.childs)): if j == i: rchild = self.childs[j] else: newchilds.append(self.childs[j]) self.childs = newchilds self.openchilds() self.openchilds() return rchild def insertchildi(self, i, child): newchilds = [] for j in range(0, len(self.childs) + 1): if j == i: newchilds.append(child) if j < len(self.childs): newchilds.append(self.childs[j]) self.childs = newchilds self.openchilds() self.openchilds() def movechildi(self, i, newi): if len(self.childs) <= 0: return if newi < 0: newi = 0 if newi >= len(self.childs): newi = len(self.childs) - 1 rchild = self.removechildi(i) if not rchild is None: self.insertchildi(newi, rchild) def getitemindex(self, item): for i in range(0, len(self.childs)): if self.childs[i].getitem() == item: return i return None def parentsettask(self): self.opendiv.arc(not self.parent is None, 'schemadictchildleftmargin') def enablechangedtask(self): self.openchilds() self.openchilds() def buildchilds(self): labellist = [] self.childshook.x() for child in self.childs: self.childshook.a(child) if child.getitem().enabled: labellist.append(child.label()) label = ' , '.join(labellist) self.openbutton.x().a(div().ac('schemacollectionopenbuttonlabel').html(label)) def topureobj(self): pureobj = {} if self.writepreference.radio: if self.kind == 'dict': pureobj = ['', {}] for nameditem in self.childs: key = nameditem.key item = nameditem.item if item.enabled or item.writepreference.check: pureobj = [key, item.topureobj()] break elif self.kind == 'list': for item in self.childs: if item.enabled or item.writepreference.check: pureobj = item.topureobj() break elif self.kind == 'dict': for nameditem in self.childs: key = nameditem.key item = nameditem.item if item.enabled or item.writepreference.check: pureobj[key] = item.topureobj() elif self.kind == 'list': pureobj = [] for item in self.childs: if item.enabled or item.writepreference.check: pureobj.append(item.topureobj()) return pureobj def setradio(self, item): for child in self.childs: childitem = child.getitem() childeq = childitem == item childitem.enabled = childeq childitem.enablecheckbox.setchecked(childeq) def remove(self, item): newlist = [] for child in self.childs: childeq = False if child.kind == 'nameditem': childeq = child.item == item else: childeq = child == item if not childeq: newlist.append(child) self.childs = newlist self.openchilds() self.openchilds() def getschemakinds(self): schemakinds = {'create': 'Create new', 'scalar': 'Scalar', 'list': 'List', 'dict': 'Dict'} for nameditem in self.childs: key = nameditem.key if not key == None: if len(key) > 0: schemakinds['#' + key] = key return schemakinds def updatecreatecombo(self): if not self.createcombo is None: self.createcombo.setoptions(self.getschemakinds()) def getchildbykey(self, key): if not self.kind == 'dict': return None for nameditem in self.childs: if nameditem.key == key: return nameditem.item return None def createcallback(self, key): self.updatecreatecombo() sch = schema_scalar({}) if key == 'list': sch = schema_list({}) elif key == 'dict': sch = schema_dict({}) if key[0] == '#': truekey = key[1:] titem = self.getchildbykey(truekey) if titem == None: print('error, no item with key', truekey) else: sch = schemafromobj(titem.toobj()) sch.setchildparent(self) appendelement = sch if self.kind == 'dict': appendelement = named_schema_item({'item': sch}).setkeychangedcallback(self.updatecreatecombo) self.childs.append(appendelement) self.buildchilds() self.updatecreatecombo() def pastebuttonclicked(self): try: sch = schemafromobj(schemaclipboard.item.toobj()) except: window.alert('No item on clipboard to paste!') return self sch.setchildparent(self) appendelement = sch if self.kind == 'dict': appendelement = named_schema_item({'item': sch}).setkeychangedcallback(self.updatecreatecombo) if not schemaclipboard.key is None: appendelement.setkey(schemaclipboard.key) self.childs.append(appendelement) self.buildchilds() self.updatecreatecombo() def openchilds(self): if self.opened: self.opened = False self.createhook.x() self.childshook.x() self.openbutton.rc('schemacollectionopenbuttondone') else: self.opened = True self.creatediv = div().ac('schemaitem').ac('schemacreate') self.createcombo = combo_box({'changecallback': self.createcallback, 'selectclass': 'schemacreatecomboselect'}) self.updatecreatecombo() self.pastebutton = button('Paste', self.pastebuttonclicked).ac('schemapastebutton') self.creatediv.aa([self.createcombo, self.pastebutton]) if self.writepreference.addchild: self.createhook.a(self.creatediv) self.openbutton.ac('schemacollectionopenbuttondone') self.buildchilds() def writepreferencechangedtask(self): self.openchilds() self.openchilds() def __init__(self, args): super().__init__(args) self.kind = 'collection' self.opened = False self.childs = args.get('childs', []) self.editmode = args.get('editmode', False) self.childseditable = args.get('childseditable', True) self.element.ac('schemacollection') self.openbutton = div().aac(['schemacollectionopenbutton', 'noselect']).ae('mousedown', self.openchilds) self.element.aa([self.openbutton]) self.createcombo = None self.createhook = div() self.childshook = div() self.opendiv = div().ac('schemacollectionopendiv') self.opendiv.aa([self.createhook, self.childshook]) self.afterelementhook.a(self.opendiv) self.openchilds() if not self.writepreference.childsopened: self.openchilds() class Schemalist(SchemaCollection): def getfirstselectedindex(self): i = 0 for item in self.childs: if item.enabled: return i i += 1 return None def toobj(self): listobj = [] for item in self.childs: listobj.append(item.toobj()) obj = self.baseobj() obj['items'] = listobj return obj def __init__(self, args): super().__init__(args) self.kind = 'list' self.element.ac('schemalist') self.writepreference.setdisabledlist(['editvalue', 'slider', 'check']) class Schemadict(SchemaCollection): def setchildatkey(self, key, item): item.setchildparent(self) nameditem = named_schema_item({'key': key, 'item': item}) i = self.getitemindexbykey(key) if i is None: self.childs.append(nameditem) else: self.childs[i] = nameditem self.openchilds() self.openchilds() def getfirstselectedindex(self): i = 0 for item in self.childs: if item.item.enabled: return i i += 1 return None def getitemindexbykey(self, key): i = 0 for item in self.childs: if item.key == key: return i i += 1 return None def toobj(self): dictobj = [] for item in self.childs: sch = {'key': item.key, 'item': item.item.toobj()} dictobj.append(sch) obj = self.baseobj() obj['items'] = dictobj return obj def __init__(self, args): super().__init__(args) self.kind = 'dict' self.element.ac('schemadict') self.writepreference.setdisabledlist(['editvalue', 'slider', 'check']) def schemawritepreferencefromobj(obj): swp = schema_write_preference() for item in SCHEMA_WRITE_PREFERENCE_DEFAULTS: swp[item['key']] = getfromobj(obj, item['key'], item['default']) return swp def schemafromobj(obj): kind = getfromobj(obj, 'kind', 'dict') enabled = getfromobj(obj, 'enabled', DEFAULT_ENABLED) help = getfromobj(obj, 'help', DEFAULT_HELP) writepreference = schemawritepreferencefromobj(getfromobj(obj, 'writepreference', {})) returnobj = {} if kind == 'scalar': returnobj = schema_scalar({'value': obj['value'], 'minvalue': obj['minvalue'], 'maxvalue': obj['maxvalue'], 'writepreference': writepreference}) elif kind == 'list': items = obj['items'] childs = [] for item in items: sch = schemafromobj(item) childs.append(sch) returnobj = schema_list({'childs': childs, 'writepreference': writepreference}) for child in returnobj.childs: child.setchildparent(returnobj) elif kind == 'dict': items = obj['items'] childs = [] for itemobj in items: key = itemobj['key'] item = itemobj['item'] sch = schemafromobj(item) namedsch = named_schema_item({'key': key, 'item': sch, 'writepreference': writepreference}) childs.append(namedsch) returnobj = schema_dict({'childs': childs, 'writepreference': writepreference}) for child in returnobj.childs: child.item.setchildparent(returnobj) child.setkeychangedcallback(returnobj.updatecreatecombo) returnobj.setenabled(enabled) returnobj.help = help return returnobj def getpathlistfromschema(sch, pathlist): if len(pathlist) <= 0: return sch key = pathlist[0] pathlist = pathlist[1:] if key == '#': if sch.kind == 'scalar': return None elif sch.kind == 'list': i = sch.getfirstselectedindex() if i == None: return None return getpathlistfromschema(sch.childs[i], pathlist) elif sch.kind == 'dict': i = sch.getfirstselectedindex() if i == None: return None return getpathlistfromschema(sch.childs[i].item, pathlist) elif sch.kind == 'scalar': return None elif sch.kind == 'list': return None elif sch.kind == 'dict': for child in sch.childs: if child.key == key: return getpathlistfromschema(child.item, pathlist) return None def getpathfromschema(sch, path): pathlist = path.split('/') return getpathlistfromschema(sch, pathlist) def getscalarfromschema(sch, path): found = getpathfromschema(sch, path) if not found is None: if found.kind == 'scalar': return found.value found = getpathfromschema(sch, path + '/#') if not found is None: if found.kind == 'scalar': return found.value return None def schemafromucioptionsobj(obj): ucioptions = schema_dict({}) for opt in obj: key = opt['key'] kind = opt['kind'] default = opt['default'] min = opt['min'] max = opt['max'] options = opt['options'] item = schema_scalar({'value': default}) if kind == 'spin': item.minvalue = min item.maxvalue = max item.writepreference.slider = True item.build() elif kind == 'check': item.value = 'false' if default: item.value = 'true' item.writepreference.check = True item.setenabled(default) item.build() elif kind == 'combo': item = schema_list({}) item.writepreference.radio = True for comboopt in options: comboitem = schema_scalar({'value': comboopt}) comboitem.setenabled(comboopt == default) comboitem.setchildparent(item) item.childs.append(comboitem) item.openchilds() item.openchilds() item.setchildparent(ucioptions) nameditem = named_schema_item({'key': key, 'item': item}) ucioptions.childs.append(nameditem) return ucioptions schemaclipboard = named_schema_item({})
# encoding: utf-8 class DummyResponse(object): status_code = 250 class DummyBackend(object): def __init__(self, **kw): pass def sendmail(self, **kw): return DummyResponse()
class Dummyresponse(object): status_code = 250 class Dummybackend(object): def __init__(self, **kw): pass def sendmail(self, **kw): return dummy_response()
class NetworkInfoEntry(object): def __init__(self): self.bytes = 0 self.packets = 0 self.error = 0 self.drop = 0 class NetworkLogEntry(object): def __init__(self): self.name = "" self.rx = NetworkInfoEntry() self.tx = NetworkInfoEntry() class DomainLogEntry(object): def __init__(self): self.name = "" self.cpu_seconds = 0 self.memory = 0 self.memory_percent = 0.0 self.max_memory = 0 self.max_memory_percent = 0.0 self.virtual_cpus = 0 self.networks = [] def __str__(self): result = self.name for network in self.networks: result += ", " + network.name + " (RX:" + str(network.rx.bytes/1024/1024/1024) +"gb, TX:" + str(network.tx.bytes/1024/1024/1024) + "gb)" return result
class Networkinfoentry(object): def __init__(self): self.bytes = 0 self.packets = 0 self.error = 0 self.drop = 0 class Networklogentry(object): def __init__(self): self.name = '' self.rx = network_info_entry() self.tx = network_info_entry() class Domainlogentry(object): def __init__(self): self.name = '' self.cpu_seconds = 0 self.memory = 0 self.memory_percent = 0.0 self.max_memory = 0 self.max_memory_percent = 0.0 self.virtual_cpus = 0 self.networks = [] def __str__(self): result = self.name for network in self.networks: result += ', ' + network.name + ' (RX:' + str(network.rx.bytes / 1024 / 1024 / 1024) + 'gb, TX:' + str(network.tx.bytes / 1024 / 1024 / 1024) + 'gb)' return result
class Ball: def __init__(self, x0, y0, r0): self.x = x0 self.y = y0 self.r = r0 return def distance(self, x0, y0): return ((self.x-x0)**2. + (self.y-y0)**2.)**(0.5) def distance_from_origin(self): return self.distance(0,0) def __str__(self): out_str = "Radius = {}\n".format(self.r) out_str += "Position = ({},{})".format(self.x, self.y) return out_str if __name__ == "__main__": ball = Ball(3, 4, 3) dist = ball.distance_from_origin() print(ball)
class Ball: def __init__(self, x0, y0, r0): self.x = x0 self.y = y0 self.r = r0 return def distance(self, x0, y0): return ((self.x - x0) ** 2.0 + (self.y - y0) ** 2.0) ** 0.5 def distance_from_origin(self): return self.distance(0, 0) def __str__(self): out_str = 'Radius = {}\n'.format(self.r) out_str += 'Position = ({},{})'.format(self.x, self.y) return out_str if __name__ == '__main__': ball = ball(3, 4, 3) dist = ball.distance_from_origin() print(ball)
# # PySNMP MIB module CABH-CDP-MIB (http://snmplabs.com/pysmi) # ASN.1 source file:///Users/davwang4/Dev/mibs.snmplabs.com/asn1/CABH-CDP-MIB # Produced by pysmi-0.3.4 at Mon Apr 29 17:26:22 2019 # On host DAVWANG4-M-1475 platform Darwin version 18.5.0 by user davwang4 # Using Python version 3.7.3 (default, Mar 27 2019, 09:23:15) # ObjectIdentifier, Integer, OctetString = mibBuilder.importSymbols("ASN1", "ObjectIdentifier", "Integer", "OctetString") NamedValues, = mibBuilder.importSymbols("ASN1-ENUMERATION", "NamedValues") SingleValueConstraint, ValueSizeConstraint, ConstraintsUnion, ConstraintsIntersection, ValueRangeConstraint = mibBuilder.importSymbols("ASN1-REFINEMENT", "SingleValueConstraint", "ValueSizeConstraint", "ConstraintsUnion", "ConstraintsIntersection", "ValueRangeConstraint") clabProjCableHome, = mibBuilder.importSymbols("CLAB-DEF-MIB", "clabProjCableHome") InetAddress, InetAddressType = mibBuilder.importSymbols("INET-ADDRESS-MIB", "InetAddress", "InetAddressType") SnmpAdminString, = mibBuilder.importSymbols("SNMP-FRAMEWORK-MIB", "SnmpAdminString") ModuleCompliance, NotificationGroup, ObjectGroup = mibBuilder.importSymbols("SNMPv2-CONF", "ModuleCompliance", "NotificationGroup", "ObjectGroup") NotificationType, Gauge32, MibScalar, MibTable, MibTableRow, MibTableColumn, TimeTicks, Counter64, MibIdentifier, Bits, ObjectIdentity, Integer32, Counter32, Unsigned32, IpAddress, ModuleIdentity, iso = mibBuilder.importSymbols("SNMPv2-SMI", "NotificationType", "Gauge32", "MibScalar", "MibTable", "MibTableRow", "MibTableColumn", "TimeTicks", "Counter64", "MibIdentifier", "Bits", "ObjectIdentity", "Integer32", "Counter32", "Unsigned32", "IpAddress", "ModuleIdentity", "iso") DisplayString, PhysAddress, TruthValue, TextualConvention, RowStatus, DateAndTime, TimeStamp = mibBuilder.importSymbols("SNMPv2-TC", "DisplayString", "PhysAddress", "TruthValue", "TextualConvention", "RowStatus", "DateAndTime", "TimeStamp") cabhCdpMib = ModuleIdentity((1, 3, 6, 1, 4, 1, 4491, 2, 4, 4)) if mibBuilder.loadTexts: cabhCdpMib.setLastUpdated('200412160000Z') if mibBuilder.loadTexts: cabhCdpMib.setOrganization('CableLabs Broadband Access Department') cabhCdpObjects = MibIdentifier((1, 3, 6, 1, 4, 1, 4491, 2, 4, 4, 1)) cabhCdpBase = MibIdentifier((1, 3, 6, 1, 4, 1, 4491, 2, 4, 4, 1, 1)) cabhCdpAddr = MibIdentifier((1, 3, 6, 1, 4, 1, 4491, 2, 4, 4, 1, 2)) cabhCdpServer = MibIdentifier((1, 3, 6, 1, 4, 1, 4491, 2, 4, 4, 1, 3)) cabhCdpSetToFactory = MibScalar((1, 3, 6, 1, 4, 1, 4491, 2, 4, 4, 1, 1, 1), TruthValue()).setMaxAccess("readwrite") if mibBuilder.loadTexts: cabhCdpSetToFactory.setStatus('current') cabhCdpLanTransCurCount = MibScalar((1, 3, 6, 1, 4, 1, 4491, 2, 4, 4, 1, 1, 2), Unsigned32()).setMaxAccess("readonly") if mibBuilder.loadTexts: cabhCdpLanTransCurCount.setStatus('current') cabhCdpLanTransThreshold = MibScalar((1, 3, 6, 1, 4, 1, 4491, 2, 4, 4, 1, 1, 3), Integer32().subtype(subtypeSpec=ValueRangeConstraint(0, 65533))).setMaxAccess("readwrite") if mibBuilder.loadTexts: cabhCdpLanTransThreshold.setStatus('current') cabhCdpLanTransAction = MibScalar((1, 3, 6, 1, 4, 1, 4491, 2, 4, 4, 1, 1, 4), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(1, 2))).clone(namedValues=NamedValues(("normal", 1), ("noAssignment", 2))).clone('normal')).setMaxAccess("readwrite") if mibBuilder.loadTexts: cabhCdpLanTransAction.setStatus('current') cabhCdpWanDataIpAddrCount = MibScalar((1, 3, 6, 1, 4, 1, 4491, 2, 4, 4, 1, 1, 5), Integer32().subtype(subtypeSpec=ValueRangeConstraint(0, 63))).setMaxAccess("readwrite") if mibBuilder.loadTexts: cabhCdpWanDataIpAddrCount.setStatus('current') cabhCdpLastSetToFactory = MibScalar((1, 3, 6, 1, 4, 1, 4491, 2, 4, 4, 1, 1, 6), TimeStamp()).setMaxAccess("readonly") if mibBuilder.loadTexts: cabhCdpLastSetToFactory.setStatus('current') cabhCdpTimeOffsetSelection = MibScalar((1, 3, 6, 1, 4, 1, 4491, 2, 4, 4, 1, 1, 7), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(1, 2))).clone(namedValues=NamedValues(("useDhcpOption2", 1), ("useSnmpSetOffset", 2))).clone('useDhcpOption2')).setMaxAccess("readwrite") if mibBuilder.loadTexts: cabhCdpTimeOffsetSelection.setStatus('current') cabhCdpSnmpSetTimeOffset = MibScalar((1, 3, 6, 1, 4, 1, 4491, 2, 4, 4, 1, 1, 8), Integer32().subtype(subtypeSpec=ValueRangeConstraint(-43200, 46800))).setUnits('seconds').setMaxAccess("readwrite") if mibBuilder.loadTexts: cabhCdpSnmpSetTimeOffset.setStatus('current') cabhCdpDaylightSavingTimeEnable = MibScalar((1, 3, 6, 1, 4, 1, 4491, 2, 4, 4, 1, 1, 9), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(1, 2))).clone(namedValues=NamedValues(("enabled", 1), ("disabled", 2))).clone('disabled')).setMaxAccess("readwrite") if mibBuilder.loadTexts: cabhCdpDaylightSavingTimeEnable.setStatus('current') cabhCdpLanAddrTable = MibTable((1, 3, 6, 1, 4, 1, 4491, 2, 4, 4, 1, 2, 1), ) if mibBuilder.loadTexts: cabhCdpLanAddrTable.setStatus('current') cabhCdpLanAddrEntry = MibTableRow((1, 3, 6, 1, 4, 1, 4491, 2, 4, 4, 1, 2, 1, 1), ).setIndexNames((0, "CABH-CDP-MIB", "cabhCdpLanAddrIpType"), (0, "CABH-CDP-MIB", "cabhCdpLanAddrIp")) if mibBuilder.loadTexts: cabhCdpLanAddrEntry.setStatus('current') cabhCdpLanAddrIpType = MibTableColumn((1, 3, 6, 1, 4, 1, 4491, 2, 4, 4, 1, 2, 1, 1, 1), InetAddressType()) if mibBuilder.loadTexts: cabhCdpLanAddrIpType.setStatus('current') cabhCdpLanAddrIp = MibTableColumn((1, 3, 6, 1, 4, 1, 4491, 2, 4, 4, 1, 2, 1, 1, 2), InetAddress()) if mibBuilder.loadTexts: cabhCdpLanAddrIp.setStatus('current') cabhCdpLanAddrClientID = MibTableColumn((1, 3, 6, 1, 4, 1, 4491, 2, 4, 4, 1, 2, 1, 1, 3), PhysAddress()).setMaxAccess("readcreate") if mibBuilder.loadTexts: cabhCdpLanAddrClientID.setStatus('current') cabhCdpLanAddrLeaseCreateTime = MibTableColumn((1, 3, 6, 1, 4, 1, 4491, 2, 4, 4, 1, 2, 1, 1, 4), DateAndTime()).setMaxAccess("readonly") if mibBuilder.loadTexts: cabhCdpLanAddrLeaseCreateTime.setStatus('current') cabhCdpLanAddrLeaseExpireTime = MibTableColumn((1, 3, 6, 1, 4, 1, 4491, 2, 4, 4, 1, 2, 1, 1, 5), DateAndTime()).setMaxAccess("readonly") if mibBuilder.loadTexts: cabhCdpLanAddrLeaseExpireTime.setStatus('current') cabhCdpLanAddrMethod = MibTableColumn((1, 3, 6, 1, 4, 1, 4491, 2, 4, 4, 1, 2, 1, 1, 6), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(1, 2, 3, 4, 5, 6))).clone(namedValues=NamedValues(("mgmtReservationInactive", 1), ("mgmtReservationActive", 2), ("dynamicInactive", 3), ("dynamicActive", 4), ("psReservationInactive", 5), ("psReservationActive", 6)))).setMaxAccess("readonly") if mibBuilder.loadTexts: cabhCdpLanAddrMethod.setStatus('current') cabhCdpLanAddrHostName = MibTableColumn((1, 3, 6, 1, 4, 1, 4491, 2, 4, 4, 1, 2, 1, 1, 7), SnmpAdminString().subtype(subtypeSpec=ValueSizeConstraint(0, 80))).setMaxAccess("readonly") if mibBuilder.loadTexts: cabhCdpLanAddrHostName.setStatus('current') cabhCdpLanAddrRowStatus = MibTableColumn((1, 3, 6, 1, 4, 1, 4491, 2, 4, 4, 1, 2, 1, 1, 8), RowStatus()).setMaxAccess("readcreate") if mibBuilder.loadTexts: cabhCdpLanAddrRowStatus.setStatus('current') cabhCdpWanDataAddrTable = MibTable((1, 3, 6, 1, 4, 1, 4491, 2, 4, 4, 1, 2, 2), ) if mibBuilder.loadTexts: cabhCdpWanDataAddrTable.setStatus('current') cabhCdpWanDataAddrEntry = MibTableRow((1, 3, 6, 1, 4, 1, 4491, 2, 4, 4, 1, 2, 2, 1), ).setIndexNames((0, "CABH-CDP-MIB", "cabhCdpWanDataAddrIndex")) if mibBuilder.loadTexts: cabhCdpWanDataAddrEntry.setStatus('current') cabhCdpWanDataAddrIndex = MibTableColumn((1, 3, 6, 1, 4, 1, 4491, 2, 4, 4, 1, 2, 2, 1, 1), Integer32().subtype(subtypeSpec=ValueRangeConstraint(1, 65535))) if mibBuilder.loadTexts: cabhCdpWanDataAddrIndex.setStatus('current') cabhCdpWanDataAddrClientId = MibTableColumn((1, 3, 6, 1, 4, 1, 4491, 2, 4, 4, 1, 2, 2, 1, 2), OctetString().subtype(subtypeSpec=ValueSizeConstraint(1, 80))).setMaxAccess("readcreate") if mibBuilder.loadTexts: cabhCdpWanDataAddrClientId.setStatus('current') cabhCdpWanDataAddrIpType = MibTableColumn((1, 3, 6, 1, 4, 1, 4491, 2, 4, 4, 1, 2, 2, 1, 3), InetAddressType().clone('ipv4')).setMaxAccess("readonly") if mibBuilder.loadTexts: cabhCdpWanDataAddrIpType.setStatus('current') cabhCdpWanDataAddrIp = MibTableColumn((1, 3, 6, 1, 4, 1, 4491, 2, 4, 4, 1, 2, 2, 1, 4), InetAddress()).setMaxAccess("readonly") if mibBuilder.loadTexts: cabhCdpWanDataAddrIp.setStatus('current') cabhCdpWanDataAddrRenewalTime = MibTableColumn((1, 3, 6, 1, 4, 1, 4491, 2, 4, 4, 1, 2, 2, 1, 5), Integer32()).setMaxAccess("readonly") if mibBuilder.loadTexts: cabhCdpWanDataAddrRenewalTime.setStatus('deprecated') cabhCdpWanDataAddrRowStatus = MibTableColumn((1, 3, 6, 1, 4, 1, 4491, 2, 4, 4, 1, 2, 2, 1, 6), RowStatus()).setMaxAccess("readcreate") if mibBuilder.loadTexts: cabhCdpWanDataAddrRowStatus.setStatus('current') cabhCdpWanDataAddrLeaseCreateTime = MibTableColumn((1, 3, 6, 1, 4, 1, 4491, 2, 4, 4, 1, 2, 2, 1, 7), DateAndTime()).setMaxAccess("readonly") if mibBuilder.loadTexts: cabhCdpWanDataAddrLeaseCreateTime.setStatus('current') cabhCdpWanDataAddrLeaseExpireTime = MibTableColumn((1, 3, 6, 1, 4, 1, 4491, 2, 4, 4, 1, 2, 2, 1, 8), DateAndTime()).setMaxAccess("readonly") if mibBuilder.loadTexts: cabhCdpWanDataAddrLeaseExpireTime.setStatus('current') cabhCdpWanDnsServerTable = MibTable((1, 3, 6, 1, 4, 1, 4491, 2, 4, 4, 1, 2, 3), ) if mibBuilder.loadTexts: cabhCdpWanDnsServerTable.setStatus('current') cabhCdpWanDnsServerEntry = MibTableRow((1, 3, 6, 1, 4, 1, 4491, 2, 4, 4, 1, 2, 3, 1), ).setIndexNames((0, "CABH-CDP-MIB", "cabhCdpWanDnsServerOrder")) if mibBuilder.loadTexts: cabhCdpWanDnsServerEntry.setStatus('current') cabhCdpWanDnsServerOrder = MibTableColumn((1, 3, 6, 1, 4, 1, 4491, 2, 4, 4, 1, 2, 3, 1, 1), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(1, 2, 3))).clone(namedValues=NamedValues(("primary", 1), ("secondary", 2), ("tertiary", 3)))) if mibBuilder.loadTexts: cabhCdpWanDnsServerOrder.setStatus('current') cabhCdpWanDnsServerIpType = MibTableColumn((1, 3, 6, 1, 4, 1, 4491, 2, 4, 4, 1, 2, 3, 1, 2), InetAddressType().clone('ipv4')).setMaxAccess("readonly") if mibBuilder.loadTexts: cabhCdpWanDnsServerIpType.setStatus('current') cabhCdpWanDnsServerIp = MibTableColumn((1, 3, 6, 1, 4, 1, 4491, 2, 4, 4, 1, 2, 3, 1, 3), InetAddress()).setMaxAccess("readonly") if mibBuilder.loadTexts: cabhCdpWanDnsServerIp.setStatus('current') cabhCdpLanPoolStartType = MibScalar((1, 3, 6, 1, 4, 1, 4491, 2, 4, 4, 1, 3, 1), InetAddressType().clone('ipv4')).setMaxAccess("readwrite") if mibBuilder.loadTexts: cabhCdpLanPoolStartType.setStatus('current') cabhCdpLanPoolStart = MibScalar((1, 3, 6, 1, 4, 1, 4491, 2, 4, 4, 1, 3, 2), InetAddress().clone(hexValue="c0a8000a")).setMaxAccess("readwrite") if mibBuilder.loadTexts: cabhCdpLanPoolStart.setStatus('current') cabhCdpLanPoolEndType = MibScalar((1, 3, 6, 1, 4, 1, 4491, 2, 4, 4, 1, 3, 3), InetAddressType().clone('ipv4')).setMaxAccess("readwrite") if mibBuilder.loadTexts: cabhCdpLanPoolEndType.setStatus('current') cabhCdpLanPoolEnd = MibScalar((1, 3, 6, 1, 4, 1, 4491, 2, 4, 4, 1, 3, 4), InetAddress().clone(hexValue="c0a800fe")).setMaxAccess("readwrite") if mibBuilder.loadTexts: cabhCdpLanPoolEnd.setStatus('current') cabhCdpServerNetworkNumberType = MibScalar((1, 3, 6, 1, 4, 1, 4491, 2, 4, 4, 1, 3, 5), InetAddressType().clone('ipv4')).setMaxAccess("readwrite") if mibBuilder.loadTexts: cabhCdpServerNetworkNumberType.setStatus('current') cabhCdpServerNetworkNumber = MibScalar((1, 3, 6, 1, 4, 1, 4491, 2, 4, 4, 1, 3, 6), InetAddress().clone(hexValue="c0a80000")).setMaxAccess("readwrite") if mibBuilder.loadTexts: cabhCdpServerNetworkNumber.setStatus('current') cabhCdpServerSubnetMaskType = MibScalar((1, 3, 6, 1, 4, 1, 4491, 2, 4, 4, 1, 3, 7), InetAddressType().clone('ipv4')).setMaxAccess("readwrite") if mibBuilder.loadTexts: cabhCdpServerSubnetMaskType.setStatus('current') cabhCdpServerSubnetMask = MibScalar((1, 3, 6, 1, 4, 1, 4491, 2, 4, 4, 1, 3, 8), InetAddress().clone(hexValue="ffffff00")).setMaxAccess("readwrite") if mibBuilder.loadTexts: cabhCdpServerSubnetMask.setStatus('current') cabhCdpServerTimeOffset = MibScalar((1, 3, 6, 1, 4, 1, 4491, 2, 4, 4, 1, 3, 9), Integer32().subtype(subtypeSpec=ValueRangeConstraint(-86400, 86400))).setUnits('seconds').setMaxAccess("readwrite") if mibBuilder.loadTexts: cabhCdpServerTimeOffset.setStatus('current') cabhCdpServerRouterType = MibScalar((1, 3, 6, 1, 4, 1, 4491, 2, 4, 4, 1, 3, 10), InetAddressType().clone('ipv4')).setMaxAccess("readwrite") if mibBuilder.loadTexts: cabhCdpServerRouterType.setStatus('current') cabhCdpServerRouter = MibScalar((1, 3, 6, 1, 4, 1, 4491, 2, 4, 4, 1, 3, 11), InetAddress().clone(hexValue="c0a80001")).setMaxAccess("readwrite") if mibBuilder.loadTexts: cabhCdpServerRouter.setStatus('current') cabhCdpServerDnsAddressType = MibScalar((1, 3, 6, 1, 4, 1, 4491, 2, 4, 4, 1, 3, 12), InetAddressType().clone('ipv4')).setMaxAccess("readwrite") if mibBuilder.loadTexts: cabhCdpServerDnsAddressType.setStatus('current') cabhCdpServerDnsAddress = MibScalar((1, 3, 6, 1, 4, 1, 4491, 2, 4, 4, 1, 3, 13), InetAddress()).setMaxAccess("readwrite") if mibBuilder.loadTexts: cabhCdpServerDnsAddress.setStatus('current') cabhCdpServerSyslogAddressType = MibScalar((1, 3, 6, 1, 4, 1, 4491, 2, 4, 4, 1, 3, 14), InetAddressType().clone('ipv4')).setMaxAccess("readwrite") if mibBuilder.loadTexts: cabhCdpServerSyslogAddressType.setStatus('current') cabhCdpServerSyslogAddress = MibScalar((1, 3, 6, 1, 4, 1, 4491, 2, 4, 4, 1, 3, 15), InetAddress().clone(hexValue="00000000")).setMaxAccess("readwrite") if mibBuilder.loadTexts: cabhCdpServerSyslogAddress.setStatus('current') cabhCdpServerDomainName = MibScalar((1, 3, 6, 1, 4, 1, 4491, 2, 4, 4, 1, 3, 16), SnmpAdminString().subtype(subtypeSpec=ValueSizeConstraint(0, 128))).setMaxAccess("readwrite") if mibBuilder.loadTexts: cabhCdpServerDomainName.setStatus('current') cabhCdpServerTTL = MibScalar((1, 3, 6, 1, 4, 1, 4491, 2, 4, 4, 1, 3, 17), Integer32().subtype(subtypeSpec=ValueRangeConstraint(1, 255)).clone(64)).setMaxAccess("readwrite") if mibBuilder.loadTexts: cabhCdpServerTTL.setStatus('current') cabhCdpServerInterfaceMTU = MibScalar((1, 3, 6, 1, 4, 1, 4491, 2, 4, 4, 1, 3, 18), Integer32().subtype(subtypeSpec=ConstraintsUnion(ValueRangeConstraint(0, 0), ValueRangeConstraint(68, 4096), ))).setMaxAccess("readwrite") if mibBuilder.loadTexts: cabhCdpServerInterfaceMTU.setStatus('current') cabhCdpServerVendorSpecific = MibScalar((1, 3, 6, 1, 4, 1, 4491, 2, 4, 4, 1, 3, 19), OctetString().subtype(subtypeSpec=ValueSizeConstraint(0, 255)).clone(hexValue="")).setMaxAccess("readwrite") if mibBuilder.loadTexts: cabhCdpServerVendorSpecific.setStatus('current') cabhCdpServerLeaseTime = MibScalar((1, 3, 6, 1, 4, 1, 4491, 2, 4, 4, 1, 3, 20), Unsigned32().clone(3600)).setUnits('seconds').setMaxAccess("readwrite") if mibBuilder.loadTexts: cabhCdpServerLeaseTime.setStatus('current') cabhCdpServerDhcpAddressType = MibScalar((1, 3, 6, 1, 4, 1, 4491, 2, 4, 4, 1, 3, 21), InetAddressType().clone('ipv4')).setMaxAccess("readonly") if mibBuilder.loadTexts: cabhCdpServerDhcpAddressType.setStatus('current') cabhCdpServerDhcpAddress = MibScalar((1, 3, 6, 1, 4, 1, 4491, 2, 4, 4, 1, 3, 22), InetAddress()).setMaxAccess("readonly") if mibBuilder.loadTexts: cabhCdpServerDhcpAddress.setStatus('current') cabhCdpServerControl = MibScalar((1, 3, 6, 1, 4, 1, 4491, 2, 4, 4, 1, 3, 23), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(1, 2))).clone(namedValues=NamedValues(("restoreConfig", 1), ("commitConfig", 2))).clone('restoreConfig')).setMaxAccess("readwrite") if mibBuilder.loadTexts: cabhCdpServerControl.setStatus('current') cabhCdpServerCommitStatus = MibScalar((1, 3, 6, 1, 4, 1, 4491, 2, 4, 4, 1, 3, 24), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(1, 2, 3))).clone(namedValues=NamedValues(("commitSucceeded", 1), ("commitNeeded", 2), ("commitFailed", 3))).clone('commitSucceeded')).setMaxAccess("readonly") if mibBuilder.loadTexts: cabhCdpServerCommitStatus.setStatus('current') cabhCdpServerUseCableDataNwDnsAddr = MibScalar((1, 3, 6, 1, 4, 1, 4491, 2, 4, 4, 1, 3, 25), TruthValue().clone('false')).setMaxAccess("readwrite") if mibBuilder.loadTexts: cabhCdpServerUseCableDataNwDnsAddr.setStatus('current') cabhCdpNotification = MibIdentifier((1, 3, 6, 1, 4, 1, 4491, 2, 4, 4, 2)) cabhCdpNotifications = MibIdentifier((1, 3, 6, 1, 4, 1, 4491, 2, 4, 4, 2, 0)) cabhCdpConformance = MibIdentifier((1, 3, 6, 1, 4, 1, 4491, 2, 4, 4, 3)) cabhCdpCompliances = MibIdentifier((1, 3, 6, 1, 4, 1, 4491, 2, 4, 4, 3, 1)) cabhCdpGroups = MibIdentifier((1, 3, 6, 1, 4, 1, 4491, 2, 4, 4, 3, 2)) cabhCdpBasicCompliance = ModuleCompliance((1, 3, 6, 1, 4, 1, 4491, 2, 4, 4, 3, 1, 3)).setObjects(("CABH-CDP-MIB", "cabhCdpGroup")) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): cabhCdpBasicCompliance = cabhCdpBasicCompliance.setStatus('current') cabhCdpGroup = ObjectGroup((1, 3, 6, 1, 4, 1, 4491, 2, 4, 4, 3, 2, 1)).setObjects(("CABH-CDP-MIB", "cabhCdpSetToFactory"), ("CABH-CDP-MIB", "cabhCdpLanTransCurCount"), ("CABH-CDP-MIB", "cabhCdpLanTransThreshold"), ("CABH-CDP-MIB", "cabhCdpLanTransAction"), ("CABH-CDP-MIB", "cabhCdpWanDataIpAddrCount"), ("CABH-CDP-MIB", "cabhCdpLastSetToFactory"), ("CABH-CDP-MIB", "cabhCdpTimeOffsetSelection"), ("CABH-CDP-MIB", "cabhCdpSnmpSetTimeOffset"), ("CABH-CDP-MIB", "cabhCdpDaylightSavingTimeEnable"), ("CABH-CDP-MIB", "cabhCdpLanAddrClientID"), ("CABH-CDP-MIB", "cabhCdpLanAddrLeaseCreateTime"), ("CABH-CDP-MIB", "cabhCdpLanAddrLeaseExpireTime"), ("CABH-CDP-MIB", "cabhCdpLanAddrMethod"), ("CABH-CDP-MIB", "cabhCdpLanAddrHostName"), ("CABH-CDP-MIB", "cabhCdpLanAddrRowStatus"), ("CABH-CDP-MIB", "cabhCdpWanDataAddrClientId"), ("CABH-CDP-MIB", "cabhCdpWanDataAddrIpType"), ("CABH-CDP-MIB", "cabhCdpWanDataAddrIp"), ("CABH-CDP-MIB", "cabhCdpWanDataAddrRowStatus"), ("CABH-CDP-MIB", "cabhCdpWanDataAddrLeaseCreateTime"), ("CABH-CDP-MIB", "cabhCdpWanDataAddrLeaseExpireTime"), ("CABH-CDP-MIB", "cabhCdpWanDnsServerIpType"), ("CABH-CDP-MIB", "cabhCdpWanDnsServerIp"), ("CABH-CDP-MIB", "cabhCdpLanPoolStartType"), ("CABH-CDP-MIB", "cabhCdpLanPoolStart"), ("CABH-CDP-MIB", "cabhCdpLanPoolEndType"), ("CABH-CDP-MIB", "cabhCdpLanPoolEnd"), ("CABH-CDP-MIB", "cabhCdpServerNetworkNumberType"), ("CABH-CDP-MIB", "cabhCdpServerNetworkNumber"), ("CABH-CDP-MIB", "cabhCdpServerSubnetMaskType"), ("CABH-CDP-MIB", "cabhCdpServerSubnetMask"), ("CABH-CDP-MIB", "cabhCdpServerTimeOffset"), ("CABH-CDP-MIB", "cabhCdpServerRouterType"), ("CABH-CDP-MIB", "cabhCdpServerRouter"), ("CABH-CDP-MIB", "cabhCdpServerDnsAddressType"), ("CABH-CDP-MIB", "cabhCdpServerDnsAddress"), ("CABH-CDP-MIB", "cabhCdpServerSyslogAddressType"), ("CABH-CDP-MIB", "cabhCdpServerSyslogAddress"), ("CABH-CDP-MIB", "cabhCdpServerDomainName"), ("CABH-CDP-MIB", "cabhCdpServerTTL"), ("CABH-CDP-MIB", "cabhCdpServerInterfaceMTU"), ("CABH-CDP-MIB", "cabhCdpServerVendorSpecific"), ("CABH-CDP-MIB", "cabhCdpServerLeaseTime"), ("CABH-CDP-MIB", "cabhCdpServerDhcpAddressType"), ("CABH-CDP-MIB", "cabhCdpServerDhcpAddress"), ("CABH-CDP-MIB", "cabhCdpServerControl"), ("CABH-CDP-MIB", "cabhCdpServerCommitStatus"), ("CABH-CDP-MIB", "cabhCdpServerUseCableDataNwDnsAddr")) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): cabhCdpGroup = cabhCdpGroup.setStatus('current') mibBuilder.exportSymbols("CABH-CDP-MIB", cabhCdpSetToFactory=cabhCdpSetToFactory, cabhCdpLanPoolStartType=cabhCdpLanPoolStartType, cabhCdpWanDataAddrLeaseExpireTime=cabhCdpWanDataAddrLeaseExpireTime, cabhCdpWanDataAddrRowStatus=cabhCdpWanDataAddrRowStatus, cabhCdpLanAddrIp=cabhCdpLanAddrIp, cabhCdpWanDnsServerTable=cabhCdpWanDnsServerTable, cabhCdpServerSyslogAddress=cabhCdpServerSyslogAddress, cabhCdpServerLeaseTime=cabhCdpServerLeaseTime, cabhCdpGroups=cabhCdpGroups, cabhCdpServerDhcpAddress=cabhCdpServerDhcpAddress, PYSNMP_MODULE_ID=cabhCdpMib, cabhCdpServerUseCableDataNwDnsAddr=cabhCdpServerUseCableDataNwDnsAddr, cabhCdpLanAddrLeaseCreateTime=cabhCdpLanAddrLeaseCreateTime, cabhCdpWanDataAddrEntry=cabhCdpWanDataAddrEntry, cabhCdpLanTransCurCount=cabhCdpLanTransCurCount, cabhCdpBasicCompliance=cabhCdpBasicCompliance, cabhCdpLanAddrHostName=cabhCdpLanAddrHostName, cabhCdpServerTimeOffset=cabhCdpServerTimeOffset, cabhCdpWanDataIpAddrCount=cabhCdpWanDataIpAddrCount, cabhCdpServerSubnetMaskType=cabhCdpServerSubnetMaskType, cabhCdpServerDhcpAddressType=cabhCdpServerDhcpAddressType, cabhCdpCompliances=cabhCdpCompliances, cabhCdpGroup=cabhCdpGroup, cabhCdpServerNetworkNumber=cabhCdpServerNetworkNumber, cabhCdpBase=cabhCdpBase, cabhCdpLanAddrRowStatus=cabhCdpLanAddrRowStatus, cabhCdpServerRouter=cabhCdpServerRouter, cabhCdpLanPoolStart=cabhCdpLanPoolStart, cabhCdpServerDnsAddressType=cabhCdpServerDnsAddressType, cabhCdpWanDnsServerIp=cabhCdpWanDnsServerIp, cabhCdpLanPoolEnd=cabhCdpLanPoolEnd, cabhCdpServerNetworkNumberType=cabhCdpServerNetworkNumberType, cabhCdpConformance=cabhCdpConformance, cabhCdpDaylightSavingTimeEnable=cabhCdpDaylightSavingTimeEnable, cabhCdpWanDnsServerOrder=cabhCdpWanDnsServerOrder, cabhCdpLanAddrEntry=cabhCdpLanAddrEntry, cabhCdpServerInterfaceMTU=cabhCdpServerInterfaceMTU, cabhCdpServerCommitStatus=cabhCdpServerCommitStatus, cabhCdpLanAddrLeaseExpireTime=cabhCdpLanAddrLeaseExpireTime, cabhCdpSnmpSetTimeOffset=cabhCdpSnmpSetTimeOffset, cabhCdpServerDnsAddress=cabhCdpServerDnsAddress, cabhCdpServerRouterType=cabhCdpServerRouterType, cabhCdpWanDataAddrClientId=cabhCdpWanDataAddrClientId, cabhCdpWanDnsServerEntry=cabhCdpWanDnsServerEntry, cabhCdpLanPoolEndType=cabhCdpLanPoolEndType, cabhCdpServerControl=cabhCdpServerControl, cabhCdpLanTransAction=cabhCdpLanTransAction, cabhCdpServerSubnetMask=cabhCdpServerSubnetMask, cabhCdpNotifications=cabhCdpNotifications, cabhCdpLanAddrIpType=cabhCdpLanAddrIpType, cabhCdpServerSyslogAddressType=cabhCdpServerSyslogAddressType, cabhCdpLanAddrTable=cabhCdpLanAddrTable, cabhCdpWanDataAddrIndex=cabhCdpWanDataAddrIndex, cabhCdpTimeOffsetSelection=cabhCdpTimeOffsetSelection, cabhCdpMib=cabhCdpMib, cabhCdpObjects=cabhCdpObjects, cabhCdpLanAddrClientID=cabhCdpLanAddrClientID, cabhCdpLanTransThreshold=cabhCdpLanTransThreshold, cabhCdpWanDataAddrIpType=cabhCdpWanDataAddrIpType, cabhCdpWanDataAddrIp=cabhCdpWanDataAddrIp, cabhCdpWanDataAddrRenewalTime=cabhCdpWanDataAddrRenewalTime, cabhCdpAddr=cabhCdpAddr, cabhCdpWanDnsServerIpType=cabhCdpWanDnsServerIpType, cabhCdpServerDomainName=cabhCdpServerDomainName, cabhCdpWanDataAddrTable=cabhCdpWanDataAddrTable, cabhCdpServerTTL=cabhCdpServerTTL, cabhCdpLanAddrMethod=cabhCdpLanAddrMethod, cabhCdpLastSetToFactory=cabhCdpLastSetToFactory, cabhCdpServerVendorSpecific=cabhCdpServerVendorSpecific, cabhCdpNotification=cabhCdpNotification, cabhCdpServer=cabhCdpServer, cabhCdpWanDataAddrLeaseCreateTime=cabhCdpWanDataAddrLeaseCreateTime)
(object_identifier, integer, octet_string) = mibBuilder.importSymbols('ASN1', 'ObjectIdentifier', 'Integer', 'OctetString') (named_values,) = mibBuilder.importSymbols('ASN1-ENUMERATION', 'NamedValues') (single_value_constraint, value_size_constraint, constraints_union, constraints_intersection, value_range_constraint) = mibBuilder.importSymbols('ASN1-REFINEMENT', 'SingleValueConstraint', 'ValueSizeConstraint', 'ConstraintsUnion', 'ConstraintsIntersection', 'ValueRangeConstraint') (clab_proj_cable_home,) = mibBuilder.importSymbols('CLAB-DEF-MIB', 'clabProjCableHome') (inet_address, inet_address_type) = mibBuilder.importSymbols('INET-ADDRESS-MIB', 'InetAddress', 'InetAddressType') (snmp_admin_string,) = mibBuilder.importSymbols('SNMP-FRAMEWORK-MIB', 'SnmpAdminString') (module_compliance, notification_group, object_group) = mibBuilder.importSymbols('SNMPv2-CONF', 'ModuleCompliance', 'NotificationGroup', 'ObjectGroup') (notification_type, gauge32, mib_scalar, mib_table, mib_table_row, mib_table_column, time_ticks, counter64, mib_identifier, bits, object_identity, integer32, counter32, unsigned32, ip_address, module_identity, iso) = mibBuilder.importSymbols('SNMPv2-SMI', 'NotificationType', 'Gauge32', 'MibScalar', 'MibTable', 'MibTableRow', 'MibTableColumn', 'TimeTicks', 'Counter64', 'MibIdentifier', 'Bits', 'ObjectIdentity', 'Integer32', 'Counter32', 'Unsigned32', 'IpAddress', 'ModuleIdentity', 'iso') (display_string, phys_address, truth_value, textual_convention, row_status, date_and_time, time_stamp) = mibBuilder.importSymbols('SNMPv2-TC', 'DisplayString', 'PhysAddress', 'TruthValue', 'TextualConvention', 'RowStatus', 'DateAndTime', 'TimeStamp') cabh_cdp_mib = module_identity((1, 3, 6, 1, 4, 1, 4491, 2, 4, 4)) if mibBuilder.loadTexts: cabhCdpMib.setLastUpdated('200412160000Z') if mibBuilder.loadTexts: cabhCdpMib.setOrganization('CableLabs Broadband Access Department') cabh_cdp_objects = mib_identifier((1, 3, 6, 1, 4, 1, 4491, 2, 4, 4, 1)) cabh_cdp_base = mib_identifier((1, 3, 6, 1, 4, 1, 4491, 2, 4, 4, 1, 1)) cabh_cdp_addr = mib_identifier((1, 3, 6, 1, 4, 1, 4491, 2, 4, 4, 1, 2)) cabh_cdp_server = mib_identifier((1, 3, 6, 1, 4, 1, 4491, 2, 4, 4, 1, 3)) cabh_cdp_set_to_factory = mib_scalar((1, 3, 6, 1, 4, 1, 4491, 2, 4, 4, 1, 1, 1), truth_value()).setMaxAccess('readwrite') if mibBuilder.loadTexts: cabhCdpSetToFactory.setStatus('current') cabh_cdp_lan_trans_cur_count = mib_scalar((1, 3, 6, 1, 4, 1, 4491, 2, 4, 4, 1, 1, 2), unsigned32()).setMaxAccess('readonly') if mibBuilder.loadTexts: cabhCdpLanTransCurCount.setStatus('current') cabh_cdp_lan_trans_threshold = mib_scalar((1, 3, 6, 1, 4, 1, 4491, 2, 4, 4, 1, 1, 3), integer32().subtype(subtypeSpec=value_range_constraint(0, 65533))).setMaxAccess('readwrite') if mibBuilder.loadTexts: cabhCdpLanTransThreshold.setStatus('current') cabh_cdp_lan_trans_action = mib_scalar((1, 3, 6, 1, 4, 1, 4491, 2, 4, 4, 1, 1, 4), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(1, 2))).clone(namedValues=named_values(('normal', 1), ('noAssignment', 2))).clone('normal')).setMaxAccess('readwrite') if mibBuilder.loadTexts: cabhCdpLanTransAction.setStatus('current') cabh_cdp_wan_data_ip_addr_count = mib_scalar((1, 3, 6, 1, 4, 1, 4491, 2, 4, 4, 1, 1, 5), integer32().subtype(subtypeSpec=value_range_constraint(0, 63))).setMaxAccess('readwrite') if mibBuilder.loadTexts: cabhCdpWanDataIpAddrCount.setStatus('current') cabh_cdp_last_set_to_factory = mib_scalar((1, 3, 6, 1, 4, 1, 4491, 2, 4, 4, 1, 1, 6), time_stamp()).setMaxAccess('readonly') if mibBuilder.loadTexts: cabhCdpLastSetToFactory.setStatus('current') cabh_cdp_time_offset_selection = mib_scalar((1, 3, 6, 1, 4, 1, 4491, 2, 4, 4, 1, 1, 7), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(1, 2))).clone(namedValues=named_values(('useDhcpOption2', 1), ('useSnmpSetOffset', 2))).clone('useDhcpOption2')).setMaxAccess('readwrite') if mibBuilder.loadTexts: cabhCdpTimeOffsetSelection.setStatus('current') cabh_cdp_snmp_set_time_offset = mib_scalar((1, 3, 6, 1, 4, 1, 4491, 2, 4, 4, 1, 1, 8), integer32().subtype(subtypeSpec=value_range_constraint(-43200, 46800))).setUnits('seconds').setMaxAccess('readwrite') if mibBuilder.loadTexts: cabhCdpSnmpSetTimeOffset.setStatus('current') cabh_cdp_daylight_saving_time_enable = mib_scalar((1, 3, 6, 1, 4, 1, 4491, 2, 4, 4, 1, 1, 9), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(1, 2))).clone(namedValues=named_values(('enabled', 1), ('disabled', 2))).clone('disabled')).setMaxAccess('readwrite') if mibBuilder.loadTexts: cabhCdpDaylightSavingTimeEnable.setStatus('current') cabh_cdp_lan_addr_table = mib_table((1, 3, 6, 1, 4, 1, 4491, 2, 4, 4, 1, 2, 1)) if mibBuilder.loadTexts: cabhCdpLanAddrTable.setStatus('current') cabh_cdp_lan_addr_entry = mib_table_row((1, 3, 6, 1, 4, 1, 4491, 2, 4, 4, 1, 2, 1, 1)).setIndexNames((0, 'CABH-CDP-MIB', 'cabhCdpLanAddrIpType'), (0, 'CABH-CDP-MIB', 'cabhCdpLanAddrIp')) if mibBuilder.loadTexts: cabhCdpLanAddrEntry.setStatus('current') cabh_cdp_lan_addr_ip_type = mib_table_column((1, 3, 6, 1, 4, 1, 4491, 2, 4, 4, 1, 2, 1, 1, 1), inet_address_type()) if mibBuilder.loadTexts: cabhCdpLanAddrIpType.setStatus('current') cabh_cdp_lan_addr_ip = mib_table_column((1, 3, 6, 1, 4, 1, 4491, 2, 4, 4, 1, 2, 1, 1, 2), inet_address()) if mibBuilder.loadTexts: cabhCdpLanAddrIp.setStatus('current') cabh_cdp_lan_addr_client_id = mib_table_column((1, 3, 6, 1, 4, 1, 4491, 2, 4, 4, 1, 2, 1, 1, 3), phys_address()).setMaxAccess('readcreate') if mibBuilder.loadTexts: cabhCdpLanAddrClientID.setStatus('current') cabh_cdp_lan_addr_lease_create_time = mib_table_column((1, 3, 6, 1, 4, 1, 4491, 2, 4, 4, 1, 2, 1, 1, 4), date_and_time()).setMaxAccess('readonly') if mibBuilder.loadTexts: cabhCdpLanAddrLeaseCreateTime.setStatus('current') cabh_cdp_lan_addr_lease_expire_time = mib_table_column((1, 3, 6, 1, 4, 1, 4491, 2, 4, 4, 1, 2, 1, 1, 5), date_and_time()).setMaxAccess('readonly') if mibBuilder.loadTexts: cabhCdpLanAddrLeaseExpireTime.setStatus('current') cabh_cdp_lan_addr_method = mib_table_column((1, 3, 6, 1, 4, 1, 4491, 2, 4, 4, 1, 2, 1, 1, 6), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(1, 2, 3, 4, 5, 6))).clone(namedValues=named_values(('mgmtReservationInactive', 1), ('mgmtReservationActive', 2), ('dynamicInactive', 3), ('dynamicActive', 4), ('psReservationInactive', 5), ('psReservationActive', 6)))).setMaxAccess('readonly') if mibBuilder.loadTexts: cabhCdpLanAddrMethod.setStatus('current') cabh_cdp_lan_addr_host_name = mib_table_column((1, 3, 6, 1, 4, 1, 4491, 2, 4, 4, 1, 2, 1, 1, 7), snmp_admin_string().subtype(subtypeSpec=value_size_constraint(0, 80))).setMaxAccess('readonly') if mibBuilder.loadTexts: cabhCdpLanAddrHostName.setStatus('current') cabh_cdp_lan_addr_row_status = mib_table_column((1, 3, 6, 1, 4, 1, 4491, 2, 4, 4, 1, 2, 1, 1, 8), row_status()).setMaxAccess('readcreate') if mibBuilder.loadTexts: cabhCdpLanAddrRowStatus.setStatus('current') cabh_cdp_wan_data_addr_table = mib_table((1, 3, 6, 1, 4, 1, 4491, 2, 4, 4, 1, 2, 2)) if mibBuilder.loadTexts: cabhCdpWanDataAddrTable.setStatus('current') cabh_cdp_wan_data_addr_entry = mib_table_row((1, 3, 6, 1, 4, 1, 4491, 2, 4, 4, 1, 2, 2, 1)).setIndexNames((0, 'CABH-CDP-MIB', 'cabhCdpWanDataAddrIndex')) if mibBuilder.loadTexts: cabhCdpWanDataAddrEntry.setStatus('current') cabh_cdp_wan_data_addr_index = mib_table_column((1, 3, 6, 1, 4, 1, 4491, 2, 4, 4, 1, 2, 2, 1, 1), integer32().subtype(subtypeSpec=value_range_constraint(1, 65535))) if mibBuilder.loadTexts: cabhCdpWanDataAddrIndex.setStatus('current') cabh_cdp_wan_data_addr_client_id = mib_table_column((1, 3, 6, 1, 4, 1, 4491, 2, 4, 4, 1, 2, 2, 1, 2), octet_string().subtype(subtypeSpec=value_size_constraint(1, 80))).setMaxAccess('readcreate') if mibBuilder.loadTexts: cabhCdpWanDataAddrClientId.setStatus('current') cabh_cdp_wan_data_addr_ip_type = mib_table_column((1, 3, 6, 1, 4, 1, 4491, 2, 4, 4, 1, 2, 2, 1, 3), inet_address_type().clone('ipv4')).setMaxAccess('readonly') if mibBuilder.loadTexts: cabhCdpWanDataAddrIpType.setStatus('current') cabh_cdp_wan_data_addr_ip = mib_table_column((1, 3, 6, 1, 4, 1, 4491, 2, 4, 4, 1, 2, 2, 1, 4), inet_address()).setMaxAccess('readonly') if mibBuilder.loadTexts: cabhCdpWanDataAddrIp.setStatus('current') cabh_cdp_wan_data_addr_renewal_time = mib_table_column((1, 3, 6, 1, 4, 1, 4491, 2, 4, 4, 1, 2, 2, 1, 5), integer32()).setMaxAccess('readonly') if mibBuilder.loadTexts: cabhCdpWanDataAddrRenewalTime.setStatus('deprecated') cabh_cdp_wan_data_addr_row_status = mib_table_column((1, 3, 6, 1, 4, 1, 4491, 2, 4, 4, 1, 2, 2, 1, 6), row_status()).setMaxAccess('readcreate') if mibBuilder.loadTexts: cabhCdpWanDataAddrRowStatus.setStatus('current') cabh_cdp_wan_data_addr_lease_create_time = mib_table_column((1, 3, 6, 1, 4, 1, 4491, 2, 4, 4, 1, 2, 2, 1, 7), date_and_time()).setMaxAccess('readonly') if mibBuilder.loadTexts: cabhCdpWanDataAddrLeaseCreateTime.setStatus('current') cabh_cdp_wan_data_addr_lease_expire_time = mib_table_column((1, 3, 6, 1, 4, 1, 4491, 2, 4, 4, 1, 2, 2, 1, 8), date_and_time()).setMaxAccess('readonly') if mibBuilder.loadTexts: cabhCdpWanDataAddrLeaseExpireTime.setStatus('current') cabh_cdp_wan_dns_server_table = mib_table((1, 3, 6, 1, 4, 1, 4491, 2, 4, 4, 1, 2, 3)) if mibBuilder.loadTexts: cabhCdpWanDnsServerTable.setStatus('current') cabh_cdp_wan_dns_server_entry = mib_table_row((1, 3, 6, 1, 4, 1, 4491, 2, 4, 4, 1, 2, 3, 1)).setIndexNames((0, 'CABH-CDP-MIB', 'cabhCdpWanDnsServerOrder')) if mibBuilder.loadTexts: cabhCdpWanDnsServerEntry.setStatus('current') cabh_cdp_wan_dns_server_order = mib_table_column((1, 3, 6, 1, 4, 1, 4491, 2, 4, 4, 1, 2, 3, 1, 1), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(1, 2, 3))).clone(namedValues=named_values(('primary', 1), ('secondary', 2), ('tertiary', 3)))) if mibBuilder.loadTexts: cabhCdpWanDnsServerOrder.setStatus('current') cabh_cdp_wan_dns_server_ip_type = mib_table_column((1, 3, 6, 1, 4, 1, 4491, 2, 4, 4, 1, 2, 3, 1, 2), inet_address_type().clone('ipv4')).setMaxAccess('readonly') if mibBuilder.loadTexts: cabhCdpWanDnsServerIpType.setStatus('current') cabh_cdp_wan_dns_server_ip = mib_table_column((1, 3, 6, 1, 4, 1, 4491, 2, 4, 4, 1, 2, 3, 1, 3), inet_address()).setMaxAccess('readonly') if mibBuilder.loadTexts: cabhCdpWanDnsServerIp.setStatus('current') cabh_cdp_lan_pool_start_type = mib_scalar((1, 3, 6, 1, 4, 1, 4491, 2, 4, 4, 1, 3, 1), inet_address_type().clone('ipv4')).setMaxAccess('readwrite') if mibBuilder.loadTexts: cabhCdpLanPoolStartType.setStatus('current') cabh_cdp_lan_pool_start = mib_scalar((1, 3, 6, 1, 4, 1, 4491, 2, 4, 4, 1, 3, 2), inet_address().clone(hexValue='c0a8000a')).setMaxAccess('readwrite') if mibBuilder.loadTexts: cabhCdpLanPoolStart.setStatus('current') cabh_cdp_lan_pool_end_type = mib_scalar((1, 3, 6, 1, 4, 1, 4491, 2, 4, 4, 1, 3, 3), inet_address_type().clone('ipv4')).setMaxAccess('readwrite') if mibBuilder.loadTexts: cabhCdpLanPoolEndType.setStatus('current') cabh_cdp_lan_pool_end = mib_scalar((1, 3, 6, 1, 4, 1, 4491, 2, 4, 4, 1, 3, 4), inet_address().clone(hexValue='c0a800fe')).setMaxAccess('readwrite') if mibBuilder.loadTexts: cabhCdpLanPoolEnd.setStatus('current') cabh_cdp_server_network_number_type = mib_scalar((1, 3, 6, 1, 4, 1, 4491, 2, 4, 4, 1, 3, 5), inet_address_type().clone('ipv4')).setMaxAccess('readwrite') if mibBuilder.loadTexts: cabhCdpServerNetworkNumberType.setStatus('current') cabh_cdp_server_network_number = mib_scalar((1, 3, 6, 1, 4, 1, 4491, 2, 4, 4, 1, 3, 6), inet_address().clone(hexValue='c0a80000')).setMaxAccess('readwrite') if mibBuilder.loadTexts: cabhCdpServerNetworkNumber.setStatus('current') cabh_cdp_server_subnet_mask_type = mib_scalar((1, 3, 6, 1, 4, 1, 4491, 2, 4, 4, 1, 3, 7), inet_address_type().clone('ipv4')).setMaxAccess('readwrite') if mibBuilder.loadTexts: cabhCdpServerSubnetMaskType.setStatus('current') cabh_cdp_server_subnet_mask = mib_scalar((1, 3, 6, 1, 4, 1, 4491, 2, 4, 4, 1, 3, 8), inet_address().clone(hexValue='ffffff00')).setMaxAccess('readwrite') if mibBuilder.loadTexts: cabhCdpServerSubnetMask.setStatus('current') cabh_cdp_server_time_offset = mib_scalar((1, 3, 6, 1, 4, 1, 4491, 2, 4, 4, 1, 3, 9), integer32().subtype(subtypeSpec=value_range_constraint(-86400, 86400))).setUnits('seconds').setMaxAccess('readwrite') if mibBuilder.loadTexts: cabhCdpServerTimeOffset.setStatus('current') cabh_cdp_server_router_type = mib_scalar((1, 3, 6, 1, 4, 1, 4491, 2, 4, 4, 1, 3, 10), inet_address_type().clone('ipv4')).setMaxAccess('readwrite') if mibBuilder.loadTexts: cabhCdpServerRouterType.setStatus('current') cabh_cdp_server_router = mib_scalar((1, 3, 6, 1, 4, 1, 4491, 2, 4, 4, 1, 3, 11), inet_address().clone(hexValue='c0a80001')).setMaxAccess('readwrite') if mibBuilder.loadTexts: cabhCdpServerRouter.setStatus('current') cabh_cdp_server_dns_address_type = mib_scalar((1, 3, 6, 1, 4, 1, 4491, 2, 4, 4, 1, 3, 12), inet_address_type().clone('ipv4')).setMaxAccess('readwrite') if mibBuilder.loadTexts: cabhCdpServerDnsAddressType.setStatus('current') cabh_cdp_server_dns_address = mib_scalar((1, 3, 6, 1, 4, 1, 4491, 2, 4, 4, 1, 3, 13), inet_address()).setMaxAccess('readwrite') if mibBuilder.loadTexts: cabhCdpServerDnsAddress.setStatus('current') cabh_cdp_server_syslog_address_type = mib_scalar((1, 3, 6, 1, 4, 1, 4491, 2, 4, 4, 1, 3, 14), inet_address_type().clone('ipv4')).setMaxAccess('readwrite') if mibBuilder.loadTexts: cabhCdpServerSyslogAddressType.setStatus('current') cabh_cdp_server_syslog_address = mib_scalar((1, 3, 6, 1, 4, 1, 4491, 2, 4, 4, 1, 3, 15), inet_address().clone(hexValue='00000000')).setMaxAccess('readwrite') if mibBuilder.loadTexts: cabhCdpServerSyslogAddress.setStatus('current') cabh_cdp_server_domain_name = mib_scalar((1, 3, 6, 1, 4, 1, 4491, 2, 4, 4, 1, 3, 16), snmp_admin_string().subtype(subtypeSpec=value_size_constraint(0, 128))).setMaxAccess('readwrite') if mibBuilder.loadTexts: cabhCdpServerDomainName.setStatus('current') cabh_cdp_server_ttl = mib_scalar((1, 3, 6, 1, 4, 1, 4491, 2, 4, 4, 1, 3, 17), integer32().subtype(subtypeSpec=value_range_constraint(1, 255)).clone(64)).setMaxAccess('readwrite') if mibBuilder.loadTexts: cabhCdpServerTTL.setStatus('current') cabh_cdp_server_interface_mtu = mib_scalar((1, 3, 6, 1, 4, 1, 4491, 2, 4, 4, 1, 3, 18), integer32().subtype(subtypeSpec=constraints_union(value_range_constraint(0, 0), value_range_constraint(68, 4096)))).setMaxAccess('readwrite') if mibBuilder.loadTexts: cabhCdpServerInterfaceMTU.setStatus('current') cabh_cdp_server_vendor_specific = mib_scalar((1, 3, 6, 1, 4, 1, 4491, 2, 4, 4, 1, 3, 19), octet_string().subtype(subtypeSpec=value_size_constraint(0, 255)).clone(hexValue='')).setMaxAccess('readwrite') if mibBuilder.loadTexts: cabhCdpServerVendorSpecific.setStatus('current') cabh_cdp_server_lease_time = mib_scalar((1, 3, 6, 1, 4, 1, 4491, 2, 4, 4, 1, 3, 20), unsigned32().clone(3600)).setUnits('seconds').setMaxAccess('readwrite') if mibBuilder.loadTexts: cabhCdpServerLeaseTime.setStatus('current') cabh_cdp_server_dhcp_address_type = mib_scalar((1, 3, 6, 1, 4, 1, 4491, 2, 4, 4, 1, 3, 21), inet_address_type().clone('ipv4')).setMaxAccess('readonly') if mibBuilder.loadTexts: cabhCdpServerDhcpAddressType.setStatus('current') cabh_cdp_server_dhcp_address = mib_scalar((1, 3, 6, 1, 4, 1, 4491, 2, 4, 4, 1, 3, 22), inet_address()).setMaxAccess('readonly') if mibBuilder.loadTexts: cabhCdpServerDhcpAddress.setStatus('current') cabh_cdp_server_control = mib_scalar((1, 3, 6, 1, 4, 1, 4491, 2, 4, 4, 1, 3, 23), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(1, 2))).clone(namedValues=named_values(('restoreConfig', 1), ('commitConfig', 2))).clone('restoreConfig')).setMaxAccess('readwrite') if mibBuilder.loadTexts: cabhCdpServerControl.setStatus('current') cabh_cdp_server_commit_status = mib_scalar((1, 3, 6, 1, 4, 1, 4491, 2, 4, 4, 1, 3, 24), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(1, 2, 3))).clone(namedValues=named_values(('commitSucceeded', 1), ('commitNeeded', 2), ('commitFailed', 3))).clone('commitSucceeded')).setMaxAccess('readonly') if mibBuilder.loadTexts: cabhCdpServerCommitStatus.setStatus('current') cabh_cdp_server_use_cable_data_nw_dns_addr = mib_scalar((1, 3, 6, 1, 4, 1, 4491, 2, 4, 4, 1, 3, 25), truth_value().clone('false')).setMaxAccess('readwrite') if mibBuilder.loadTexts: cabhCdpServerUseCableDataNwDnsAddr.setStatus('current') cabh_cdp_notification = mib_identifier((1, 3, 6, 1, 4, 1, 4491, 2, 4, 4, 2)) cabh_cdp_notifications = mib_identifier((1, 3, 6, 1, 4, 1, 4491, 2, 4, 4, 2, 0)) cabh_cdp_conformance = mib_identifier((1, 3, 6, 1, 4, 1, 4491, 2, 4, 4, 3)) cabh_cdp_compliances = mib_identifier((1, 3, 6, 1, 4, 1, 4491, 2, 4, 4, 3, 1)) cabh_cdp_groups = mib_identifier((1, 3, 6, 1, 4, 1, 4491, 2, 4, 4, 3, 2)) cabh_cdp_basic_compliance = module_compliance((1, 3, 6, 1, 4, 1, 4491, 2, 4, 4, 3, 1, 3)).setObjects(('CABH-CDP-MIB', 'cabhCdpGroup')) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): cabh_cdp_basic_compliance = cabhCdpBasicCompliance.setStatus('current') cabh_cdp_group = object_group((1, 3, 6, 1, 4, 1, 4491, 2, 4, 4, 3, 2, 1)).setObjects(('CABH-CDP-MIB', 'cabhCdpSetToFactory'), ('CABH-CDP-MIB', 'cabhCdpLanTransCurCount'), ('CABH-CDP-MIB', 'cabhCdpLanTransThreshold'), ('CABH-CDP-MIB', 'cabhCdpLanTransAction'), ('CABH-CDP-MIB', 'cabhCdpWanDataIpAddrCount'), ('CABH-CDP-MIB', 'cabhCdpLastSetToFactory'), ('CABH-CDP-MIB', 'cabhCdpTimeOffsetSelection'), ('CABH-CDP-MIB', 'cabhCdpSnmpSetTimeOffset'), ('CABH-CDP-MIB', 'cabhCdpDaylightSavingTimeEnable'), ('CABH-CDP-MIB', 'cabhCdpLanAddrClientID'), ('CABH-CDP-MIB', 'cabhCdpLanAddrLeaseCreateTime'), ('CABH-CDP-MIB', 'cabhCdpLanAddrLeaseExpireTime'), ('CABH-CDP-MIB', 'cabhCdpLanAddrMethod'), ('CABH-CDP-MIB', 'cabhCdpLanAddrHostName'), ('CABH-CDP-MIB', 'cabhCdpLanAddrRowStatus'), ('CABH-CDP-MIB', 'cabhCdpWanDataAddrClientId'), ('CABH-CDP-MIB', 'cabhCdpWanDataAddrIpType'), ('CABH-CDP-MIB', 'cabhCdpWanDataAddrIp'), ('CABH-CDP-MIB', 'cabhCdpWanDataAddrRowStatus'), ('CABH-CDP-MIB', 'cabhCdpWanDataAddrLeaseCreateTime'), ('CABH-CDP-MIB', 'cabhCdpWanDataAddrLeaseExpireTime'), ('CABH-CDP-MIB', 'cabhCdpWanDnsServerIpType'), ('CABH-CDP-MIB', 'cabhCdpWanDnsServerIp'), ('CABH-CDP-MIB', 'cabhCdpLanPoolStartType'), ('CABH-CDP-MIB', 'cabhCdpLanPoolStart'), ('CABH-CDP-MIB', 'cabhCdpLanPoolEndType'), ('CABH-CDP-MIB', 'cabhCdpLanPoolEnd'), ('CABH-CDP-MIB', 'cabhCdpServerNetworkNumberType'), ('CABH-CDP-MIB', 'cabhCdpServerNetworkNumber'), ('CABH-CDP-MIB', 'cabhCdpServerSubnetMaskType'), ('CABH-CDP-MIB', 'cabhCdpServerSubnetMask'), ('CABH-CDP-MIB', 'cabhCdpServerTimeOffset'), ('CABH-CDP-MIB', 'cabhCdpServerRouterType'), ('CABH-CDP-MIB', 'cabhCdpServerRouter'), ('CABH-CDP-MIB', 'cabhCdpServerDnsAddressType'), ('CABH-CDP-MIB', 'cabhCdpServerDnsAddress'), ('CABH-CDP-MIB', 'cabhCdpServerSyslogAddressType'), ('CABH-CDP-MIB', 'cabhCdpServerSyslogAddress'), ('CABH-CDP-MIB', 'cabhCdpServerDomainName'), ('CABH-CDP-MIB', 'cabhCdpServerTTL'), ('CABH-CDP-MIB', 'cabhCdpServerInterfaceMTU'), ('CABH-CDP-MIB', 'cabhCdpServerVendorSpecific'), ('CABH-CDP-MIB', 'cabhCdpServerLeaseTime'), ('CABH-CDP-MIB', 'cabhCdpServerDhcpAddressType'), ('CABH-CDP-MIB', 'cabhCdpServerDhcpAddress'), ('CABH-CDP-MIB', 'cabhCdpServerControl'), ('CABH-CDP-MIB', 'cabhCdpServerCommitStatus'), ('CABH-CDP-MIB', 'cabhCdpServerUseCableDataNwDnsAddr')) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): cabh_cdp_group = cabhCdpGroup.setStatus('current') mibBuilder.exportSymbols('CABH-CDP-MIB', cabhCdpSetToFactory=cabhCdpSetToFactory, cabhCdpLanPoolStartType=cabhCdpLanPoolStartType, cabhCdpWanDataAddrLeaseExpireTime=cabhCdpWanDataAddrLeaseExpireTime, cabhCdpWanDataAddrRowStatus=cabhCdpWanDataAddrRowStatus, cabhCdpLanAddrIp=cabhCdpLanAddrIp, cabhCdpWanDnsServerTable=cabhCdpWanDnsServerTable, cabhCdpServerSyslogAddress=cabhCdpServerSyslogAddress, cabhCdpServerLeaseTime=cabhCdpServerLeaseTime, cabhCdpGroups=cabhCdpGroups, cabhCdpServerDhcpAddress=cabhCdpServerDhcpAddress, PYSNMP_MODULE_ID=cabhCdpMib, cabhCdpServerUseCableDataNwDnsAddr=cabhCdpServerUseCableDataNwDnsAddr, cabhCdpLanAddrLeaseCreateTime=cabhCdpLanAddrLeaseCreateTime, cabhCdpWanDataAddrEntry=cabhCdpWanDataAddrEntry, cabhCdpLanTransCurCount=cabhCdpLanTransCurCount, cabhCdpBasicCompliance=cabhCdpBasicCompliance, cabhCdpLanAddrHostName=cabhCdpLanAddrHostName, cabhCdpServerTimeOffset=cabhCdpServerTimeOffset, cabhCdpWanDataIpAddrCount=cabhCdpWanDataIpAddrCount, cabhCdpServerSubnetMaskType=cabhCdpServerSubnetMaskType, cabhCdpServerDhcpAddressType=cabhCdpServerDhcpAddressType, cabhCdpCompliances=cabhCdpCompliances, cabhCdpGroup=cabhCdpGroup, cabhCdpServerNetworkNumber=cabhCdpServerNetworkNumber, cabhCdpBase=cabhCdpBase, cabhCdpLanAddrRowStatus=cabhCdpLanAddrRowStatus, cabhCdpServerRouter=cabhCdpServerRouter, cabhCdpLanPoolStart=cabhCdpLanPoolStart, cabhCdpServerDnsAddressType=cabhCdpServerDnsAddressType, cabhCdpWanDnsServerIp=cabhCdpWanDnsServerIp, cabhCdpLanPoolEnd=cabhCdpLanPoolEnd, cabhCdpServerNetworkNumberType=cabhCdpServerNetworkNumberType, cabhCdpConformance=cabhCdpConformance, cabhCdpDaylightSavingTimeEnable=cabhCdpDaylightSavingTimeEnable, cabhCdpWanDnsServerOrder=cabhCdpWanDnsServerOrder, cabhCdpLanAddrEntry=cabhCdpLanAddrEntry, cabhCdpServerInterfaceMTU=cabhCdpServerInterfaceMTU, cabhCdpServerCommitStatus=cabhCdpServerCommitStatus, cabhCdpLanAddrLeaseExpireTime=cabhCdpLanAddrLeaseExpireTime, cabhCdpSnmpSetTimeOffset=cabhCdpSnmpSetTimeOffset, cabhCdpServerDnsAddress=cabhCdpServerDnsAddress, cabhCdpServerRouterType=cabhCdpServerRouterType, cabhCdpWanDataAddrClientId=cabhCdpWanDataAddrClientId, cabhCdpWanDnsServerEntry=cabhCdpWanDnsServerEntry, cabhCdpLanPoolEndType=cabhCdpLanPoolEndType, cabhCdpServerControl=cabhCdpServerControl, cabhCdpLanTransAction=cabhCdpLanTransAction, cabhCdpServerSubnetMask=cabhCdpServerSubnetMask, cabhCdpNotifications=cabhCdpNotifications, cabhCdpLanAddrIpType=cabhCdpLanAddrIpType, cabhCdpServerSyslogAddressType=cabhCdpServerSyslogAddressType, cabhCdpLanAddrTable=cabhCdpLanAddrTable, cabhCdpWanDataAddrIndex=cabhCdpWanDataAddrIndex, cabhCdpTimeOffsetSelection=cabhCdpTimeOffsetSelection, cabhCdpMib=cabhCdpMib, cabhCdpObjects=cabhCdpObjects, cabhCdpLanAddrClientID=cabhCdpLanAddrClientID, cabhCdpLanTransThreshold=cabhCdpLanTransThreshold, cabhCdpWanDataAddrIpType=cabhCdpWanDataAddrIpType, cabhCdpWanDataAddrIp=cabhCdpWanDataAddrIp, cabhCdpWanDataAddrRenewalTime=cabhCdpWanDataAddrRenewalTime, cabhCdpAddr=cabhCdpAddr, cabhCdpWanDnsServerIpType=cabhCdpWanDnsServerIpType, cabhCdpServerDomainName=cabhCdpServerDomainName, cabhCdpWanDataAddrTable=cabhCdpWanDataAddrTable, cabhCdpServerTTL=cabhCdpServerTTL, cabhCdpLanAddrMethod=cabhCdpLanAddrMethod, cabhCdpLastSetToFactory=cabhCdpLastSetToFactory, cabhCdpServerVendorSpecific=cabhCdpServerVendorSpecific, cabhCdpNotification=cabhCdpNotification, cabhCdpServer=cabhCdpServer, cabhCdpWanDataAddrLeaseCreateTime=cabhCdpWanDataAddrLeaseCreateTime)
class Animal: def __init__(self,name,legs): self.name = name self.legs = legs class Bear(Animal): def __init__(self,name,legs=4,hibernate='yes'): self.name = name self.legs = legs self.hibernate = hibernate yogi = Bear('Yogi') print(yogi.name) print(yogi.legs) print(yogi.hibernate)
class Animal: def __init__(self, name, legs): self.name = name self.legs = legs class Bear(Animal): def __init__(self, name, legs=4, hibernate='yes'): self.name = name self.legs = legs self.hibernate = hibernate yogi = bear('Yogi') print(yogi.name) print(yogi.legs) print(yogi.hibernate)
# _*_ coding: utf-8 _*_ # !/usr/bin/env python3 """ Mictlantecuhtli: A Multi-Cloud Global Probe Mesh Creator. @author: Collisio-Adolebitque """ class CommandParser: def __init__(self, command_string=''): self.command = command_string def run(self): return self.command class Terraform: def __init__(self): pass def init(self): pass def plan(self): pass def apply(self): pass def destroy(self): pass def refresh(self): pass def taint(self): pass def untaint(self): pass def validate(self): pass class AWS: def __init__(self): pass class GCP: def __init__(self): pass class Azure: def __init__(self): pass class Alibaba: def __init__(self): pass def main(): print('Bout ye') if __name__ == '__main__': main()
""" Mictlantecuhtli: A Multi-Cloud Global Probe Mesh Creator. @author: Collisio-Adolebitque """ class Commandparser: def __init__(self, command_string=''): self.command = command_string def run(self): return self.command class Terraform: def __init__(self): pass def init(self): pass def plan(self): pass def apply(self): pass def destroy(self): pass def refresh(self): pass def taint(self): pass def untaint(self): pass def validate(self): pass class Aws: def __init__(self): pass class Gcp: def __init__(self): pass class Azure: def __init__(self): pass class Alibaba: def __init__(self): pass def main(): print('Bout ye') if __name__ == '__main__': main()
class Solution(object): def twoSum(self, nums, target): """ :type nums: List[int] :type target: int :rtype: List[int] """ d = {} for i, n in enumerate(nums): if target-n in d: return [d[target-n], i + 1] else: d[n] = i + 1
class Solution(object): def two_sum(self, nums, target): """ :type nums: List[int] :type target: int :rtype: List[int] """ d = {} for (i, n) in enumerate(nums): if target - n in d: return [d[target - n], i + 1] else: d[n] = i + 1
year = int(input("Enter year: ")) if year % 400 == 0: print('Entered year is a leap year.') elif year % 100 != 0 and year % 4 == 0: print('Entered year is a leap year.') else: print('Not a leap year.')
year = int(input('Enter year: ')) if year % 400 == 0: print('Entered year is a leap year.') elif year % 100 != 0 and year % 4 == 0: print('Entered year is a leap year.') else: print('Not a leap year.')
# -*- coding: utf-8 -*- # Copyright 2019 Cohesity Inc. class Type5Enum(object): """Implementation of the 'Type5' enum. Specifies the type of managed Object in a HyperFlex protection source like kServer. Examples of a HyperFlex types include 'kServer'. 'kServer' indicates HyperFlex server entity. Attributes: KSERVER: TODO: type description here. """ KSERVER = 'kServer'
class Type5Enum(object): """Implementation of the 'Type5' enum. Specifies the type of managed Object in a HyperFlex protection source like kServer. Examples of a HyperFlex types include 'kServer'. 'kServer' indicates HyperFlex server entity. Attributes: KSERVER: TODO: type description here. """ kserver = 'kServer'
def test(): class MyInt(int): pass def f(x): """ :type x: MyInt """ i = MyInt(2) f(i)
def test(): class Myint(int): pass def f(x): """ :type x: MyInt """ i = my_int(2) f(i)
# Description: Examples of a triple water pentagon. Zoom in on the selection. Edit by changing the residue number. # Source: placeHolder """ cmd.do('fetch ${1:lw9}, async=0; ') cmd.do('zoom resi ${2:313}; ') cmd.do('preset.technical(selection="all", mode=1);') """ cmd.do('fetch lw9, async=0; ') cmd.do('zoom resi 313; ') cmd.do('preset.technical(selection="all", mode=1);')
""" cmd.do('fetch ${1:lw9}, async=0; ') cmd.do('zoom resi ${2:313}; ') cmd.do('preset.technical(selection="all", mode=1);') """ cmd.do('fetch lw9, async=0; ') cmd.do('zoom resi 313; ') cmd.do('preset.technical(selection="all", mode=1);')
""" checklist: - mock req - mock resp - two ravens: - urls.py - test js req - view.py - req_file.py - test js resp - test w/o TA2 - test w/ TA2 - add tests """
""" checklist: - mock req - mock resp - two ravens: - urls.py - test js req - view.py - req_file.py - test js resp - test w/o TA2 - test w/ TA2 - add tests """
class Component(object): """Base class for components""" NAME = "base_component" def __init__(self): self.host = None self.properties = {} def on_register(self, host): self.host = host def on_unregister(self): self.host = None def round_update(self): pass def minute_update(self): pass def hours_update(self): pass def days_update(self): pass def handle_message(self, message): pass
class Component(object): """Base class for components""" name = 'base_component' def __init__(self): self.host = None self.properties = {} def on_register(self, host): self.host = host def on_unregister(self): self.host = None def round_update(self): pass def minute_update(self): pass def hours_update(self): pass def days_update(self): pass def handle_message(self, message): pass
class Solution: def nthUglyNumber(self, n: int, a: int, b: int, c: int) -> int: ab = (a * b) // math.gcd(a, b) ac = (a * c) // math.gcd(a, c) bc = (b * c) // math.gcd(b, c) abc = (ab * c) // math.gcd(ab, c) lo, hi = 1, 2 * 10 ** 9 while lo < hi: mid = (lo + hi) >> 1 count = mid // a + mid // b + mid // c - mid // ab - mid // ac - mid // bc + mid // abc; if count < n: lo = mid + 1 else: hi = mid return lo
class Solution: def nth_ugly_number(self, n: int, a: int, b: int, c: int) -> int: ab = a * b // math.gcd(a, b) ac = a * c // math.gcd(a, c) bc = b * c // math.gcd(b, c) abc = ab * c // math.gcd(ab, c) (lo, hi) = (1, 2 * 10 ** 9) while lo < hi: mid = lo + hi >> 1 count = mid // a + mid // b + mid // c - mid // ab - mid // ac - mid // bc + mid // abc if count < n: lo = mid + 1 else: hi = mid return lo
# https://leetcode.com/problems/sum-of-root-to-leaf-binary-numbers # Definition for a binary tree node. # class TreeNode: # def __init__(self, val=0, left=None, right=None): # self.val = val # self.left = left # self.right = right class Solution: def __init__(self): self.ans = 0 def traverse(self, node, cur): if not node.left and not node.right: self.ans += int("".join(cur), 2) return if node.left: cur.append(str(node.left.val)) self.traverse(node.left, cur) cur.pop() if node.right: cur.append(str(node.right.val)) self.traverse(node.right, cur) cur.pop() def sumRootToLeaf(self, root): if not root: return 0 self.traverse(root, [str(root.val)]) return self.ans
class Solution: def __init__(self): self.ans = 0 def traverse(self, node, cur): if not node.left and (not node.right): self.ans += int(''.join(cur), 2) return if node.left: cur.append(str(node.left.val)) self.traverse(node.left, cur) cur.pop() if node.right: cur.append(str(node.right.val)) self.traverse(node.right, cur) cur.pop() def sum_root_to_leaf(self, root): if not root: return 0 self.traverse(root, [str(root.val)]) return self.ans
class TimeInterval: def __init__(self, earliest, latest): self._earliest = earliest self._latest = latest @property def earliest(self): return self._earliest @property def latest(self): return self._latest
class Timeinterval: def __init__(self, earliest, latest): self._earliest = earliest self._latest = latest @property def earliest(self): return self._earliest @property def latest(self): return self._latest
# # This file contains the Python code from Program 12.2 of # "Data Structures and Algorithms # with Object-Oriented Design Patterns in Python" # by Bruno R. Preiss. # # Copyright (c) 2003 by Bruno R. Preiss, P.Eng. All rights reserved. # # http://www.brpreiss.com/books/opus7/programs/pgm12_02.txt # class SetAsArray(Set): def __init__(self, n): super(SetAsArray, self).__init__(n) self._array = Array(self._universeSize) for item in xrange(0, self._universeSize): self._array[item] = False # ...
class Setasarray(Set): def __init__(self, n): super(SetAsArray, self).__init__(n) self._array = array(self._universeSize) for item in xrange(0, self._universeSize): self._array[item] = False
#!/usr/bin/env python3 # makes the terminal know this is in python x = 9 #Set variables y = 3 #Arithmetic Operators print(x+y) # Addition print(x-y) # Subtraction print(x*y) # Multiplication print(x/y) # Division print(x%y) # Modulus (remainder) print(x**y) # Exponentiation (to the power of) x = 9.191823 # Make x into a complicated float to show the effect of floor division print(x//y) # Floor Division (divide but get rid of the decimal will ALWAYS round down) # how many whole times does y go into x # Assignment Operators x = 9 # set x back to 9. Single equal ASSIGNS the value. Double equals is boolean x += 3 # take the previous value of x and add 3. So x is now 12 print(x) x = 9 # set x back to 9. x -= 3 # take the previous value of x and subtract 3. So x is now 6 print(x) x = 9 # set x back to 9 x *= 3 # take the previous value of x and multiply by 3. x = 27 print(x) x = 9 # set x back to 9 x /= 3 # take the previous value of x and divide 3. x = 3 print(x) x = 9 # set x back to 9 x **= 3 # take the previous value of x and put it to the power of 3. x = 9^3 print(x) # Comparison Operators - Booleans x = 9 y = 3 print(x==y) # is x the same as y? In this case False print(x!=y) # is x different than y? In this case True print(x>y) # is x greater than y? In this case True print(x<y) # is x less than y? In this case False print(x>=y) # is x greater than or equal to y? In this case True print(x<=y) # is x less than or equal to y? In this case False
x = 9 y = 3 print(x + y) print(x - y) print(x * y) print(x / y) print(x % y) print(x ** y) x = 9.191823 print(x // y) x = 9 x += 3 print(x) x = 9 x -= 3 print(x) x = 9 x *= 3 print(x) x = 9 x /= 3 print(x) x = 9 x **= 3 print(x) x = 9 y = 3 print(x == y) print(x != y) print(x > y) print(x < y) print(x >= y) print(x <= y)
def convert(value, newType): try: return newType(value) except ValueError: return None
def convert(value, newType): try: return new_type(value) except ValueError: return None
""" The probability that a machine produces a defective product is 1/3. What is the probability that the 1st defect is found during the 5th inspection? """ def geometric(n, p): return p * (1 - p) ** (n - 1) def sum_geometric(n, p): total = 0 for i in range(1, n): total += geometric(i, p) return total def main(): omega, space = map(int, input().split()) n = int(input()) p = omega / space result = sum_geometric(6, p) print("{:.3f}".format(result)) if __name__ == "__main__": main()
""" The probability that a machine produces a defective product is 1/3. What is the probability that the 1st defect is found during the 5th inspection? """ def geometric(n, p): return p * (1 - p) ** (n - 1) def sum_geometric(n, p): total = 0 for i in range(1, n): total += geometric(i, p) return total def main(): (omega, space) = map(int, input().split()) n = int(input()) p = omega / space result = sum_geometric(6, p) print('{:.3f}'.format(result)) if __name__ == '__main__': main()
class Node: def __init__(self,value=None): self.value = value self.next = None class CircularSinglyLinkedList: def __init__(self): self.head = None self.tail = None def __iter__(self): '''to iterate objects of this class with "in"-keyword''' node = self.head while node: yield node.value if node.next == self.head: break node = node.next def insert(self,value,index=-1): newNode = Node(value) if self.head is None: newNode.next = newNode self.head = newNode self.tail = newNode elif index == 0: newNode.next = self.head self.head = newNode self.tail.next = newNode elif index == -1: newNode.next = self.head self.tail.next = newNode self.tail = newNode else: i = -2 flag=True temp = self.head while i<index-3: temp = temp.next if temp is None: print(f"could not insert node : length of list is {i+3} but index given was {index}") flag =False break i+=1 if flag: if temp.next == self.head: self.tail = newNode newNode.next= temp.next temp.next = newNode def traverse(self): if self.head is None: print("list is empty") else: temp = self.head while temp: print(temp.value) temp = temp.next if temp == self.head: temp = None def search(self,nodevalue): if self.head is None: print("not found, list is empty") else: temp = self.head i=0 while temp: if temp.value == nodevalue: return f"value {nodevalue} found at index {i}" i+=1 temp = temp.next if temp==self.head: return f"value {nodevalue} not found" def pop(self,index=-1): if self.head is None: print("list is empty") elif index == 0: if self.head.next is self.head: self.head = None self.tail =None else: self.head=self.head.next self.tail.next = self.head elif index == -1: temp = self.head while temp.next.next!=self.head: temp=temp.next temp.next = self.head self.tail = temp else: i = -2 flag=True temp = self.head while i<index-3: temp = temp.next if (temp is self.head) or (temp.next is self.head): print(f"could not delete node : length of list is {i+3} but index given was {index}") flag =False break i+=1 if flag: if temp.next.next == self.head: temp.next = self.head self.tail=temp else: temp.next = temp.next.next csll = CircularSinglyLinkedList() csll.insert(1) csll.insert(2) csll.insert(3) csll.insert(4) csll.insert(5) csll.insert(0,0) csll.insert(7,6) print([i for i in csll]) print(f"tail: {csll.tail.value}") print(f"tail.next: {csll.tail.next.value}") csll.traverse() print(csll.search(4)) print(csll.search(79)) print(csll.search(7)) print(f"before pop(): {[i for i in csll]}") csll.pop(3) print(f"before pop(): {[i for i in csll]}")
class Node: def __init__(self, value=None): self.value = value self.next = None class Circularsinglylinkedlist: def __init__(self): self.head = None self.tail = None def __iter__(self): """to iterate objects of this class with "in"-keyword""" node = self.head while node: yield node.value if node.next == self.head: break node = node.next def insert(self, value, index=-1): new_node = node(value) if self.head is None: newNode.next = newNode self.head = newNode self.tail = newNode elif index == 0: newNode.next = self.head self.head = newNode self.tail.next = newNode elif index == -1: newNode.next = self.head self.tail.next = newNode self.tail = newNode else: i = -2 flag = True temp = self.head while i < index - 3: temp = temp.next if temp is None: print(f'could not insert node : length of list is {i + 3} but index given was {index}') flag = False break i += 1 if flag: if temp.next == self.head: self.tail = newNode newNode.next = temp.next temp.next = newNode def traverse(self): if self.head is None: print('list is empty') else: temp = self.head while temp: print(temp.value) temp = temp.next if temp == self.head: temp = None def search(self, nodevalue): if self.head is None: print('not found, list is empty') else: temp = self.head i = 0 while temp: if temp.value == nodevalue: return f'value {nodevalue} found at index {i}' i += 1 temp = temp.next if temp == self.head: return f'value {nodevalue} not found' def pop(self, index=-1): if self.head is None: print('list is empty') elif index == 0: if self.head.next is self.head: self.head = None self.tail = None else: self.head = self.head.next self.tail.next = self.head elif index == -1: temp = self.head while temp.next.next != self.head: temp = temp.next temp.next = self.head self.tail = temp else: i = -2 flag = True temp = self.head while i < index - 3: temp = temp.next if temp is self.head or temp.next is self.head: print(f'could not delete node : length of list is {i + 3} but index given was {index}') flag = False break i += 1 if flag: if temp.next.next == self.head: temp.next = self.head self.tail = temp else: temp.next = temp.next.next csll = circular_singly_linked_list() csll.insert(1) csll.insert(2) csll.insert(3) csll.insert(4) csll.insert(5) csll.insert(0, 0) csll.insert(7, 6) print([i for i in csll]) print(f'tail: {csll.tail.value}') print(f'tail.next: {csll.tail.next.value}') csll.traverse() print(csll.search(4)) print(csll.search(79)) print(csll.search(7)) print(f'before pop(): {[i for i in csll]}') csll.pop(3) print(f'before pop(): {[i for i in csll]}')
class Solution: ans = 0 def findPathNum(self, i, j, grid: List[List[int]], curLen, pLen)->None: if(grid[i][j]==2): if(pLen-1==curLen): self.ans+=1 return elif (grid[i][j]==-1): return curLen+=1 grid[i][j]=-1 if(i-1>=0): self.findPathNum(i-1, j, grid, curLen, pLen) if(j-1>=0): self.findPathNum(i, j-1, grid, curLen, pLen) if(i+1<len(grid)): self.findPathNum(i+1, j, grid, curLen, pLen) if(j+1<len(grid[0])): self.findPathNum(i, j+1, grid, curLen, pLen) grid[i][j]=0 def uniquePathsIII(self, grid: List[List[int]]) -> int: pathLen = 0 start = (0, 0) for i in range(len(grid)): for j in range(len(grid[0])): if(grid[i][j]!=-1): pathLen+=1 if(grid[i][j]==1): start = (i, j) self.findPathNum(start[0], start[1], grid, 0, pathLen) return self.ans
class Solution: ans = 0 def find_path_num(self, i, j, grid: List[List[int]], curLen, pLen) -> None: if grid[i][j] == 2: if pLen - 1 == curLen: self.ans += 1 return elif grid[i][j] == -1: return cur_len += 1 grid[i][j] = -1 if i - 1 >= 0: self.findPathNum(i - 1, j, grid, curLen, pLen) if j - 1 >= 0: self.findPathNum(i, j - 1, grid, curLen, pLen) if i + 1 < len(grid): self.findPathNum(i + 1, j, grid, curLen, pLen) if j + 1 < len(grid[0]): self.findPathNum(i, j + 1, grid, curLen, pLen) grid[i][j] = 0 def unique_paths_iii(self, grid: List[List[int]]) -> int: path_len = 0 start = (0, 0) for i in range(len(grid)): for j in range(len(grid[0])): if grid[i][j] != -1: path_len += 1 if grid[i][j] == 1: start = (i, j) self.findPathNum(start[0], start[1], grid, 0, pathLen) return self.ans
class BoxDriveAPI(): host = None key = None secret = None access_token = None access_token_expiration = None def __init__(self, host, key, secret): # the function that is executed when # an instance of the class is created self.host = host self.key = key self.secret = secret try: self.access_token = self.get_access_token() if self.access_token is None: raise Exception("Request for access token failed.") except Exception as e: print(e) else: self.access_token_expiration = time.time() + 3500 def get_access_token(self): # the function that is # used to request the JWT try: # build the JWT and store # in the variable `token_body` # request an access token request = requests.post(self.host, data=token_body) # optional: raise exception for status code request.raise_for_status() except Exception as e: print(e) return None else: # assuming the response's structure is # {"access_token": ""} return request.json()['access_token'] class Decorators(): @staticmethod def refreshToken(decorated): # the function that is used to check # the JWT and refresh if necessary def wrapper(api, *args, **kwargs): if time.time() > api.access_token_expiration: api.get_access_token() return decorated(api,*args,**kwargs) return wrapper @Decorators.refreshToken def someRequest(): # make our API request pass
class Boxdriveapi: host = None key = None secret = None access_token = None access_token_expiration = None def __init__(self, host, key, secret): self.host = host self.key = key self.secret = secret try: self.access_token = self.get_access_token() if self.access_token is None: raise exception('Request for access token failed.') except Exception as e: print(e) else: self.access_token_expiration = time.time() + 3500 def get_access_token(self): try: request = requests.post(self.host, data=token_body) request.raise_for_status() except Exception as e: print(e) return None else: return request.json()['access_token'] class Decorators: @staticmethod def refresh_token(decorated): def wrapper(api, *args, **kwargs): if time.time() > api.access_token_expiration: api.get_access_token() return decorated(api, *args, **kwargs) return wrapper @Decorators.refreshToken def some_request(): pass
""" Quiz: Create an HTML List Write some code, including a for loop, that iterates over a list of strings and creates a single string, html_str, which is an HTML list. For example, if the list is items = ['first string', 'second string'], printing html_str should output: <ul> <li>first string</li> <li>second string</li> </ul> That is, the string's first line should be the opening tag <ul>. Following that is one line per element in the source list, surrounded by <li> and </li> tags. The final line of the string should be the closing tag </ul>. """ items = ["first string", "second string"] html_str = "<ul>\n" # "\ n" is the character that marks the end of the line, it does # the characters that are after it in html_str are on the next line # write your code here for item in items: html_str += "<li>{}</li>\n".format(item) html_str += "</ul>" print(html_str)
""" Quiz: Create an HTML List Write some code, including a for loop, that iterates over a list of strings and creates a single string, html_str, which is an HTML list. For example, if the list is items = ['first string', 'second string'], printing html_str should output: <ul> <li>first string</li> <li>second string</li> </ul> That is, the string's first line should be the opening tag <ul>. Following that is one line per element in the source list, surrounded by <li> and </li> tags. The final line of the string should be the closing tag </ul>. """ items = ['first string', 'second string'] html_str = '<ul>\n' for item in items: html_str += '<li>{}</li>\n'.format(item) html_str += '</ul>' print(html_str)
print(not None) print(not False) print(not True) print(not 0) print(not 1) print(not -1) print(not ()) print(not (1,)) print(not []) print(not [1,]) print(not {}) print(not {1:1})
print(not None) print(not False) print(not True) print(not 0) print(not 1) print(not -1) print(not ()) print(not (1,)) print(not []) print(not [1]) print(not {}) print(not {1: 1})
tot = 0 b = int(input()) for i in range(b): a = list(map(float, input().split())) if(a[0]==1001): tot+=a[1]*1.5 elif(a[0]==1002): tot+=a[1]*2.5 elif(a[0]==1003): tot+=a[1]*3.5 elif(a[0]==1004): tot+=a[1]*4.5 elif(a[0]==1005): tot+=a[1]*5.5 print("%.2f" % (tot))
tot = 0 b = int(input()) for i in range(b): a = list(map(float, input().split())) if a[0] == 1001: tot += a[1] * 1.5 elif a[0] == 1002: tot += a[1] * 2.5 elif a[0] == 1003: tot += a[1] * 3.5 elif a[0] == 1004: tot += a[1] * 4.5 elif a[0] == 1005: tot += a[1] * 5.5 print('%.2f' % tot)
def division(a, b): if a == b: return 1 if a < b: return 0 quotient = 1 temp_number = b while temp_number + b <= a: quotient += 1 temp_number += b return quotient print(division(1200, 3))
def division(a, b): if a == b: return 1 if a < b: return 0 quotient = 1 temp_number = b while temp_number + b <= a: quotient += 1 temp_number += b return quotient print(division(1200, 3))
index = [] def createIndex(): for file in ["..\data\subgraph\hop1", "..\data\subgraph\hop2", "..\data\subgraph\hop3"]: with open(file) as f: edges = [edge.rstrip() for edge in f] arr = [] for edge in edges: arr2 = [] arr3 = [] x = edge.split(',') y = x[1].split(' ') arr2.append(int(x[0])) for e in y: z = e.split('-') arr4 = [int(z[0]), int(z[1])] arr3.append(arr4) arr2.append(arr3) arr.append(arr2) index.append(arr) return index def get(hop, node): for x in index[hop]: if x[0] == node: return x[1] # # subgraph = get(2, 114) # print(subgraph)
index = [] def create_index(): for file in ['..\\data\\subgraph\\hop1', '..\\data\\subgraph\\hop2', '..\\data\\subgraph\\hop3']: with open(file) as f: edges = [edge.rstrip() for edge in f] arr = [] for edge in edges: arr2 = [] arr3 = [] x = edge.split(',') y = x[1].split(' ') arr2.append(int(x[0])) for e in y: z = e.split('-') arr4 = [int(z[0]), int(z[1])] arr3.append(arr4) arr2.append(arr3) arr.append(arr2) index.append(arr) return index def get(hop, node): for x in index[hop]: if x[0] == node: return x[1]
def gaussJordan(A): n = len(A) x = [0]*n print(f'A :\n{A}') for i in range(n): if A[i][i] == 0: print('Ora iso mbagi 0 bos') break for j in range(i+1,n): rasio = A[j][i]/A[i][i] for k in range(n+1): A[j][k] -= rasio*A[i][k] print(f'A :\n{A}') for i in range(n): rasio = A[i][i] for j in range(n+1): A[i][j] /= rasio print(f'A :\n{A}') for i in range(n-1,0,-1): for j in range(i-1,-1,-1): rasio = A[j][i] for k in range(n+1): A[j][k] -= rasio*A[i][k] print(f'A :\n{A}') for i in range(n): x[i] =A[i][n] for i,j in enumerate(x): print(f'x{i} : {j}') return x gaussJordan(A= [[2,3,-1,5],[4,4,-3,3],[-2,3,-1,1]])
def gauss_jordan(A): n = len(A) x = [0] * n print(f'A :\n{A}') for i in range(n): if A[i][i] == 0: print('Ora iso mbagi 0 bos') break for j in range(i + 1, n): rasio = A[j][i] / A[i][i] for k in range(n + 1): A[j][k] -= rasio * A[i][k] print(f'A :\n{A}') for i in range(n): rasio = A[i][i] for j in range(n + 1): A[i][j] /= rasio print(f'A :\n{A}') for i in range(n - 1, 0, -1): for j in range(i - 1, -1, -1): rasio = A[j][i] for k in range(n + 1): A[j][k] -= rasio * A[i][k] print(f'A :\n{A}') for i in range(n): x[i] = A[i][n] for (i, j) in enumerate(x): print(f'x{i} : {j}') return x gauss_jordan(A=[[2, 3, -1, 5], [4, 4, -3, 3], [-2, 3, -1, 1]])
def grade(key, submission): if submission == 'b3_car3ful_0r_y0ur_l3ak_m1ght_l3ak': return True, "You're now an elite hacker..." else: return False, "Keep digging..."
def grade(key, submission): if submission == 'b3_car3ful_0r_y0ur_l3ak_m1ght_l3ak': return (True, "You're now an elite hacker...") else: return (False, 'Keep digging...')
def ZG_rprod(X,Y): if len(X.shape) < 2: X = X[:,None] n,m = X.shape if Y.shape[0] != n or len(Y.shape) != 1: print('rprod error') return None Y = Y[:,None] Z = np.multiply(X,np.matmul(Y,np.ones((1,m)))) return Z
def zg_rprod(X, Y): if len(X.shape) < 2: x = X[:, None] (n, m) = X.shape if Y.shape[0] != n or len(Y.shape) != 1: print('rprod error') return None y = Y[:, None] z = np.multiply(X, np.matmul(Y, np.ones((1, m)))) return Z
possibles = { "A": "01000001", "B": "01000010", "C": "01000011", "D": "01000100", "E": "01000101", "F": "01000110", "G": "01000111", "H": "01001000", "I": "01001001", "J": "01001010", "K": "01001011", "L": "01001100", "M": "01001101", "N": "01001110", "O": "01001111", "P": "01010000", "Q": "01010001", "R": "01010010", "S": "01010011", "T": "01010100", "U": "01010101", "V": "01010110", "W": "01010111", "X": "01011000", "Y": "01011001", "Z": "01011010", "a": "01100001", "b": "01100010", "c": "01100011", "d": "01100100", "e": "01100101", "f": "01100110", "g": "01100111", "h": "01101000", "i": "01101001", "j": "01101010", "k": "01101011", "l": "01101100", "m": "01101101", "n": "01101110", "o": "01101111", "p": "01110000", "q": "01110001", "r": "01110010", "s": "01110011", "t": "01110100", "u": "01110101", "v": "01110110", "w": "01110111", "x": "01111000", "y": "01111001", "z": "01111010", " ": "00100000" } possibles_opposite = { "01000001": "A", "01000010": "B", "01000011": "C", "01000100": "D", "01000101": "E", "01000110": "F", "01000111": "G", "01001000": "H", "01001001": "I", "01001010": "J", "01001011": "K", "01001100": "L", "01001101": "M", "01001110": "N", "01001111": "O", "01010000": "P", "01010001": "Q", "01010010": "R", "01010011": "S", "01010100": "T", "01010101": "U", "01010110": "V", "01010111": "W", "01011000": "X", "01011001": "Y", "01011010": "Z", "01100001": "a", "01100010": "b", "01100011": "c", "01100100": "d", "01100101": "e", "01100110": "f", "01100111": "g", "01101000": "h", "01101001": "i", "01101010": "j", "01101011": "k", "01101100": "l", "01101101": "m", "01101110": "n", "01101111": "o", "01110000": "p", "01110001": "q", "01110010": "r", "01110011": "s", "01110100": "t", "01110101": "u", "01110110": "v", "01110111": "w", "01111000": "x", "01111001": "y", "01111010": "z", "00100000": " " } while True: starter = input("Enter B for converting text to Binary or T for binary to Text: ").upper() converted = "" queries = "" if starter == "B": queries = input(">_") for q in queries: converted += possibles[q] + " " print(converted) else: print("Bye") break """ elif starter == "T": queries = input(">_") for q in queries: converted += possibles_opposite[q] + " " print(converted) """
possibles = {'A': '01000001', 'B': '01000010', 'C': '01000011', 'D': '01000100', 'E': '01000101', 'F': '01000110', 'G': '01000111', 'H': '01001000', 'I': '01001001', 'J': '01001010', 'K': '01001011', 'L': '01001100', 'M': '01001101', 'N': '01001110', 'O': '01001111', 'P': '01010000', 'Q': '01010001', 'R': '01010010', 'S': '01010011', 'T': '01010100', 'U': '01010101', 'V': '01010110', 'W': '01010111', 'X': '01011000', 'Y': '01011001', 'Z': '01011010', 'a': '01100001', 'b': '01100010', 'c': '01100011', 'd': '01100100', 'e': '01100101', 'f': '01100110', 'g': '01100111', 'h': '01101000', 'i': '01101001', 'j': '01101010', 'k': '01101011', 'l': '01101100', 'm': '01101101', 'n': '01101110', 'o': '01101111', 'p': '01110000', 'q': '01110001', 'r': '01110010', 's': '01110011', 't': '01110100', 'u': '01110101', 'v': '01110110', 'w': '01110111', 'x': '01111000', 'y': '01111001', 'z': '01111010', ' ': '00100000'} possibles_opposite = {'01000001': 'A', '01000010': 'B', '01000011': 'C', '01000100': 'D', '01000101': 'E', '01000110': 'F', '01000111': 'G', '01001000': 'H', '01001001': 'I', '01001010': 'J', '01001011': 'K', '01001100': 'L', '01001101': 'M', '01001110': 'N', '01001111': 'O', '01010000': 'P', '01010001': 'Q', '01010010': 'R', '01010011': 'S', '01010100': 'T', '01010101': 'U', '01010110': 'V', '01010111': 'W', '01011000': 'X', '01011001': 'Y', '01011010': 'Z', '01100001': 'a', '01100010': 'b', '01100011': 'c', '01100100': 'd', '01100101': 'e', '01100110': 'f', '01100111': 'g', '01101000': 'h', '01101001': 'i', '01101010': 'j', '01101011': 'k', '01101100': 'l', '01101101': 'm', '01101110': 'n', '01101111': 'o', '01110000': 'p', '01110001': 'q', '01110010': 'r', '01110011': 's', '01110100': 't', '01110101': 'u', '01110110': 'v', '01110111': 'w', '01111000': 'x', '01111001': 'y', '01111010': 'z', '00100000': ' '} while True: starter = input('Enter B for converting text to Binary or T for binary to Text: ').upper() converted = '' queries = '' if starter == 'B': queries = input('>_') for q in queries: converted += possibles[q] + ' ' print(converted) else: print('Bye') break '\n elif starter == "T":\n queries = input(">_")\n for q in queries:\n converted += possibles_opposite[q] + " "\n\n print(converted)\n '
# Emulating the badge module # # The badge module is a C module with Python bindings # on the real badge, but for the emulator it's just a # plain python module. def nvs_get_u16(namespace, key, value): return value def eink_init(): "ok" def safe_mode(): return False
def nvs_get_u16(namespace, key, value): return value def eink_init(): """ok""" def safe_mode(): return False
#import In.entity class Message(In.entity.Entity): '''Message Entity class. ''' room_id = None def __init__(self, data = None, items = None, **args): super().__init__(data, items, **args) @IN.register('Message', type = 'Entitier') class MessageEntitier(In.entity.EntityEntitier): '''Base Message Entitier''' # Message needs entity insert/update/delete hooks invoke_entity_hook = True # load all is very heavy entity_load_all = False @IN.register('Message', type = 'Model') class MessageModel(In.entity.EntityModel): '''Message Model''' @IN.hook def entity_model(): return { 'Message' : { # entity name 'table' : { # table 'name' : 'message', 'columns' : { # table columns / entity attributes 'id' : {}, 'type' : {}, 'created' : {}, 'status' : {}, 'nabar_id' : {}, 'room_id' : {}, }, 'keys' : { 'primary' : 'id', }, }, }, } @IN.register('Message', type = 'Themer') class MessageThemer(In.entity.EntityThemer): '''Message themer''' def theme_attributes(self, obj, format, view_mode, args): obj.attributes['data-id'] = obj.id # needed for js super().theme_attributes(obj, format, view_mode, args) def theme(self, obj, format, view_mode, args): super().theme(obj, format, view_mode, args) def theme_process_variables(self, obj, format, view_mode, args): super().theme_process_variables(obj, format, view_mode, args) nabar = IN.entitier.load('Nabar', obj.nabar_id) args['nabar_name'] = nabar.name args['nabar_id'] = nabar.id args['nabar_picture'] = IN.nabar.nabar_profile_picture_themed(nabar) args['created'] = In.core.util.format_datetime_friendly(obj.created)
class Message(In.entity.Entity): """Message Entity class. """ room_id = None def __init__(self, data=None, items=None, **args): super().__init__(data, items, **args) @IN.register('Message', type='Entitier') class Messageentitier(In.entity.EntityEntitier): """Base Message Entitier""" invoke_entity_hook = True entity_load_all = False @IN.register('Message', type='Model') class Messagemodel(In.entity.EntityModel): """Message Model""" @IN.hook def entity_model(): return {'Message': {'table': {'name': 'message', 'columns': {'id': {}, 'type': {}, 'created': {}, 'status': {}, 'nabar_id': {}, 'room_id': {}}, 'keys': {'primary': 'id'}}}} @IN.register('Message', type='Themer') class Messagethemer(In.entity.EntityThemer): """Message themer""" def theme_attributes(self, obj, format, view_mode, args): obj.attributes['data-id'] = obj.id super().theme_attributes(obj, format, view_mode, args) def theme(self, obj, format, view_mode, args): super().theme(obj, format, view_mode, args) def theme_process_variables(self, obj, format, view_mode, args): super().theme_process_variables(obj, format, view_mode, args) nabar = IN.entitier.load('Nabar', obj.nabar_id) args['nabar_name'] = nabar.name args['nabar_id'] = nabar.id args['nabar_picture'] = IN.nabar.nabar_profile_picture_themed(nabar) args['created'] = In.core.util.format_datetime_friendly(obj.created)
x = [ 0, 2, 5, 10] y = [ 0, 3, 5] def carresgrosselistedistance(x, y): xlist = list() ylist = list() grosse_liste = list() print(len(x), len(y)) for i in range(len(x)): try: xlist.append(x[i + 1] - x[i]) except IndexError: xlist.append(x[i]) for i in range(len(y)): try: ylist.append(y[i + 1] - y[i]) except IndexError: ylist.append(y[i]) print(xlist, ylist) grosse_liste += xlist + ylist grosse_liste = xlist + list(set(ylist) - set(xlist)) print(grosse_liste) """ sol =0 for xgrosse in grosse_liste: for ygrosse in grosse_liste: if xgrosse == ygrosse: sol +=1 return sol """ return len(grosse_liste) def carreslistedescoordonnes(lstx,lsty): coordx = list() coordy = list() for lentx in range(len(lstx)): try: coordx.append(lstx[lentx]) coordx.append(lstx[lentx+1]) except IndexError: coordx.append(lstx[lentx]) #coordx.append(lstx[lentx]) for lenty in range(len(lsty)): try: coordy.append(lsty[lenty]) coordy.append(lsty[lenty+1]) except IndexError: coordy.append(lsty[lenty]) #coordy.append(lsty[lenty]) return coordx, coordy
x = [0, 2, 5, 10] y = [0, 3, 5] def carresgrosselistedistance(x, y): xlist = list() ylist = list() grosse_liste = list() print(len(x), len(y)) for i in range(len(x)): try: xlist.append(x[i + 1] - x[i]) except IndexError: xlist.append(x[i]) for i in range(len(y)): try: ylist.append(y[i + 1] - y[i]) except IndexError: ylist.append(y[i]) print(xlist, ylist) grosse_liste += xlist + ylist grosse_liste = xlist + list(set(ylist) - set(xlist)) print(grosse_liste) '\n sol =0\n for xgrosse in grosse_liste:\n for ygrosse in grosse_liste:\n if xgrosse == ygrosse: \n sol +=1 \n return sol\n ' return len(grosse_liste) def carreslistedescoordonnes(lstx, lsty): coordx = list() coordy = list() for lentx in range(len(lstx)): try: coordx.append(lstx[lentx]) coordx.append(lstx[lentx + 1]) except IndexError: coordx.append(lstx[lentx]) for lenty in range(len(lsty)): try: coordy.append(lsty[lenty]) coordy.append(lsty[lenty + 1]) except IndexError: coordy.append(lsty[lenty]) return (coordx, coordy)
# -*- coding: utf-8 -*- """ Created on Mon Feb 24 16:24:05 2020 @author: mberutti """ class Data: """ Class for managing, storing, and broadcasting data transmitted from the camera. """ def __init__(self, data_path): self.data_path = data_path self.results = None self._purge_results() def _load_results(self): """ Load data from results folder into variable """ pass def _purge_results(self): """ Delete all from results folder """ pass def _write_results(self, results): """ Write to results folder """ pass def pepare_broadcast(self): """ Prepare data for transmission """ data = self._load_results() data = self._format_for_trans(data) return data def fetch_data(self): """ Fetch data from source (camera) """ data = None self._write_results(data) pass class Broadcast: """ Class for connecting to a peer and transmitting data. """ def __init__(self, peer): self.peer = peer self._connect() def _connect(self): """ Connect to peer """ if not self._verify_connection(): raise RuntimeError("Could not connect to peer.") def _verify_connection(self): """ Check if connected to peer """ connected = False return connected def broadcast_data(self, data): """ Transmit data to peer """ if not self._verify_connection(): self._connect() pass def read_data(self): """ Accept data from peer """ pass
""" Created on Mon Feb 24 16:24:05 2020 @author: mberutti """ class Data: """ Class for managing, storing, and broadcasting data transmitted from the camera. """ def __init__(self, data_path): self.data_path = data_path self.results = None self._purge_results() def _load_results(self): """ Load data from results folder into variable """ pass def _purge_results(self): """ Delete all from results folder """ pass def _write_results(self, results): """ Write to results folder """ pass def pepare_broadcast(self): """ Prepare data for transmission """ data = self._load_results() data = self._format_for_trans(data) return data def fetch_data(self): """ Fetch data from source (camera) """ data = None self._write_results(data) pass class Broadcast: """ Class for connecting to a peer and transmitting data. """ def __init__(self, peer): self.peer = peer self._connect() def _connect(self): """ Connect to peer """ if not self._verify_connection(): raise runtime_error('Could not connect to peer.') def _verify_connection(self): """ Check if connected to peer """ connected = False return connected def broadcast_data(self, data): """ Transmit data to peer """ if not self._verify_connection(): self._connect() pass def read_data(self): """ Accept data from peer """ pass
def capitals_first(string): words = string.split() st1 = [] st2 = [] for word in words: if word[0].isalpha(): if word[0].isupper(): st1.append(word) else: st2.append(word) return " ".join(st1 + st2)
def capitals_first(string): words = string.split() st1 = [] st2 = [] for word in words: if word[0].isalpha(): if word[0].isupper(): st1.append(word) else: st2.append(word) return ' '.join(st1 + st2)
# local usage only dbconfig = { 'host' : '172.29.0.2', 'port' : 3306, 'db' : 'routing', 'user' : 'dev', 'password' : 'admin', }
dbconfig = {'host': '172.29.0.2', 'port': 3306, 'db': 'routing', 'user': 'dev', 'password': 'admin'}