%%
%% %CopyrightBegin%
%%
%% Copyright Ericsson AB 1996-2013. All Rights Reserved.
%%
%% The contents of this file are subject to the Erlang Public License,
%% Version 1.1, (the "License"); you may not use this file except in
%% compliance with the License. You should have received a copy of the
%% Erlang Public License along with this software. If not, it can be
%% retrieved online at http://www.erlang.org/.
%%
%% Software distributed under the License is distributed on an "AS IS"
%% basis, WITHOUT WARRANTY OF ANY KIND, either express or implied. See
%% the License for the specific language governing rights and limitations
%% under the License.
%%
%% %CopyrightEnd%
%%
-module(snmp_config).
-include_lib("kernel/include/file.hrl").
-include("snmp_types.hrl").
%% Avoid warning for local function error/1 clashing with autoimported BIF.
-compile({no_auto_import,[error/1]}).
-export([config/0]).
-export([write_config_file/4, append_config_file/4, read_config_file/3]).
-export([write_agent_snmp_files/7, write_agent_snmp_files/12,
write_agent_snmp_conf/5,
write_agent_snmp_context_conf/1,
write_agent_snmp_community_conf/1,
write_agent_snmp_standard_conf/2,
write_agent_snmp_target_addr_conf/4,
write_agent_snmp_target_addr_conf/6,
write_agent_snmp_target_params_conf/2,
write_agent_snmp_notify_conf/2,
write_agent_snmp_usm_conf/5,
write_agent_snmp_vacm_conf/3,
write_manager_snmp_files/8,
write_manager_snmp_conf/5,
write_manager_snmp_users_conf/2,
write_manager_snmp_agents_conf/2,
write_manager_snmp_usm_conf/2
]).
-export([write_agent_config/3,
update_agent_config/2,
write_agent_context_config/3,
update_agent_context_config/2,
write_agent_community_config/3,
update_agent_community_config/2,
write_agent_standard_config/3,
update_agent_standard_config/2,
write_agent_target_addr_config/3,
update_agent_target_addr_config/2,
write_agent_target_params_config/3,
update_agent_target_params_config/2,
write_agent_notify_config/3,
update_agent_notify_config/2,
write_agent_vacm_config/3,
update_agent_vacm_config/2,
write_agent_usm_config/3,
update_agent_usm_config/2,
write_manager_config/3,
update_manager_config/2,
write_manager_users_config/3,
update_manager_users_config/2,
write_manager_agents_config/3,
update_manager_agents_config/2,
write_manager_usm_config/3,
update_manager_usm_config/2
]).
-export_type([void/0,
verify_config_entry_function/0,
verify_config_function/0,
write_config_function/0]).
%%----------------------------------------------------------------------
-type void() :: term(). % Any value - ignored
%%----------------------------------------------------------------------
%% Handy SNMP configuration
%%----------------------------------------------------------------------
config() ->
case (catch config2()) of
ok ->
ok;
{error, Reason} ->
{error, Reason};
E ->
{error, {failed, E}}
end.
config2() ->
intro(),
SysAgentConfig =
case config_agent() of
[] ->
[];
SAC ->
[{agent, SAC}]
end,
SysMgrConfig =
case config_manager() of
[] ->
[];
SMC ->
[{manager, SMC}]
end,
config_sys(SysAgentConfig ++ SysMgrConfig),
ok.
intro() ->
i("~nSimple SNMP configuration tool (version ~s)", [?version]),
i("------------------------------------------------"),
i("Note: Non-trivial configurations still has to be"),
i(" done manually. IP addresses may be entered "),
i(" as dront.ericsson.se (UNIX only) or"),
i(" 123.12.13.23"),
i("------------------------------------------------"),
ok.
config_agent() ->
case (catch snmp_agent2()) of
ok ->
[];
{ok, SysConf} ->
SysConf;
{error, Reason} ->
error(Reason);
{'EXIT', Reason} ->
error(Reason);
E ->
error({agent_config_failed, E})
end.
snmp_agent2() ->
case ask("~nConfigure an agent (y/n)?", "y", fun verify_yes_or_no/1) of
yes ->
{Vsns, ConfigDir, SysConf} = config_agent_sys(),
config_agent_snmp(ConfigDir, Vsns),
{ok, SysConf};
no ->
ok
end.
config_manager() ->
case (catch config_manager2()) of
ok ->
[];
{ok, SysConf} ->
SysConf;
{error, Reason} ->
error(Reason);
{'EXIT', Reason} ->
error(Reason);
E ->
error({manager_config_failed, E})
end.
config_manager2() ->
case ask("~nConfigure a manager (y/n)?", "y", fun verify_yes_or_no/1) of
yes ->
{Vsns, ConfigDir, SysConf} = config_manager_sys(),
config_manager_snmp(ConfigDir, Vsns),
{ok, SysConf};
no ->
ok
end.
config_sys(SysConfig) ->
i("~n--------------------"),
{ok, DefDir} = file:get_cwd(),
ConfigDir = ask("Configuration directory for system file (absolute path)?",
DefDir, fun verify_dir/1),
write_sys_config_file(ConfigDir, SysConfig).
%% -------------------
config_agent_sys() ->
i("~nAgent system config: "
"~n--------------------"),
Prio = ask("1. Agent process priority (low/normal/high)",
"normal", fun verify_prio/1),
Vsns = ask("2. What SNMP version(s) should be used "
"(1,2,3,1&2,1&2&3,2&3)?", "3", fun verify_versions/1),
%% d("Vsns: ~p", [Vsns]),
{ok, DefDir} = file:get_cwd(),
{DefConfDir, Warning} = default_agent_dir(DefDir),
ConfQ =
if
Warning == "" ->
"3. Configuration directory (absolute path)?";
true ->
lists:flatten(
io_lib:format("3. Configuration directory (absolute path)?"
"~n ~s", [Warning]))
end,
ConfigDir = ask(ConfQ, DefConfDir, fun verify_dir/1),
ConfigVerb = ask("4. Config verbosity "
"(silence/info/log/debug/trace)?",
"silence",
fun verify_verbosity/1),
DbDir = ask("5. Database directory (absolute path)?", DefDir,
fun verify_dir/1),
MibStorageType = ask("6. Mib storage type (ets/dets/mnesia)?", "ets",
fun verify_mib_storage_type/1),
MibStorage =
case MibStorageType of
ets ->
[{module, snmpa_mib_storage_ets}];
dets ->
DetsDir = ask("6b. Mib storage directory (absolute path)?",
DbDir, fun verify_dir/1),
DetsAction = ask("6c. Mib storage [dets] database start "
"action "
"(default/clear/keep)?",
"default", fun verify_mib_storage_action/1),
case DetsAction of
default ->
[{module, snmpa_mib_storage_dets},
{options, [{dir, DetsDir}]}];
_ ->
[{module, snmpa_mib_storage_dets},
{options, [{dir, DetsDir},
{action, DetsAction}]}]
end;
mnesia ->
Nodes = [],
MnesiaAction = ask("6b. Mib storage [mnesia] database start "
"action "
"(default/clear/keep)?",
"default", fun verify_mib_storage_action/1),
case MnesiaAction of
default ->
[{module, snmpa_mib_storage_mnesia},
{options, [{nodes, Nodes}]}];
_ ->
[{module, snmpa_mib_storage_mnesia},
{options, [{nodes, Nodes},
{action, MnesiaAction}]}]
end
end,
%% Here we should ask about mib-server data module,
%% but as we only have one at the moment...
TargetCacheVerb = ask("7. Target cache verbosity "
"(silence/info/log/debug/trace)?", "silence",
fun verify_verbosity/1),
SymStoreVerb = ask("8. Symbolic store verbosity "
"(silence/info/log/debug/trace)?", "silence",
fun verify_verbosity/1),
LocalDbVerb = ask("9. Local DB verbosity "
"(silence/info/log/debug/trace)?", "silence",
fun verify_verbosity/1),
LocalDbRepair = ask("10. Local DB repair (true/false/force)?", "true",
fun verify_dets_repair/1),
LocalDbAutoSave = ask("11. Local DB auto save (infinity/milli seconds)?",
"5000", fun verify_dets_auto_save/1),
ErrorMod = ask("12. Error report module?", "snmpa_error_logger", fun verify_module/1),
Type = ask("13. Agent type (master/sub)?", "master",
fun verify_agent_type/1),
AgentConfig =
case Type of
master ->
MasterAgentVerb = ask("14. Master-agent verbosity "
"(silence/info/log/debug/trace)?",
"silence",
fun verify_verbosity/1),
ForceLoad = ask("15. Shall the agent re-read the "
"configuration files during startup ~n"
" (and ignore the configuration "
"database) (true/false)?", "true",
fun verify_bool/1),
MultiThreaded = ask("16. Multi threaded agent (true/false)?",
"false",
fun verify_bool/1),
MeOverride = ask("17. Check for duplicate mib entries when "
"installing a mib (true/false)?", "false",
fun verify_bool/1),
TrapOverride = ask("18. Check for duplicate trap names when "
"installing a mib (true/false)?", "false",
fun verify_bool/1),
MibServerVerb = ask("19. Mib server verbosity "
"(silence/info/log/debug/trace)?",
"silence",
fun verify_verbosity/1),
MibServerCache = ask("20. Mib server cache "
"(true/false)?",
"true",
fun verify_bool/1),
NoteStoreVerb = ask("21. Note store verbosity "
"(silence/info/log/debug/trace)?",
"silence",
fun verify_verbosity/1),
NoteStoreTimeout = ask("22. Note store GC timeout?", "30000",
fun verify_timeout/1),
ATL =
case ask("23. Shall the agent use an audit trail log "
"(y/n)?",
"n", fun verify_yes_or_no/1) of
yes ->
ATLType = ask("23b. Audit trail log type "
"(write/read_write)?",
"read_write", fun verify_atl_type/1),
ATLDir = ask("23c. Where to store the "
"audit trail log?",
DefDir, fun verify_dir/1),
ATLMaxFiles = ask("23d. Max number of files?",
"10",
fun verify_pos_integer/1),
ATLMaxBytes = ask("23e. Max size (in bytes) "
"of each file?",
"10240",
fun verify_pos_integer/1),
ATLSize = {ATLMaxBytes, ATLMaxFiles},
ATLRepair = ask("23f. Audit trail log repair "
"(true/false/truncate/snmp_repair)?", "true",
fun verify_atl_repair/1),
ATLSeqNo = ask("23g. Audit trail log "
"sequence-numbering (true/false)?",
"false",
fun verify_atl_seqno/1),
[{audit_trail_log, [{type, ATLType},
{dir, ATLDir},
{size, ATLSize},
{repair, ATLRepair},
{seqno, ATLSeqNo}]}];
no ->
[]
end,
NetIfVerb = ask("24. Network interface verbosity "
"(silence/info/log/debug/trace)?",
"silence",
fun verify_verbosity/1),
NetIfMod = ask("25. Which network interface module shall be used?",
"snmpa_net_if", fun verify_module/1),
NetIfOpts =
case NetIfMod of
snmpa_net_if ->
NetIfBindTo =
ask("25a. Bind the agent IP address "
"(true/false)?",
"false", fun verify_bool/1),
NetIfNoReuse =
ask("25b. Shall the agents "
"IP address "
"and port be not reusable "
"(true/false)?",
"false", fun verify_bool/1),
NetIfReqLimit =
ask("25c. Agent request limit "
"(used for flow control) "
"(infinity/pos integer)?",
"infinity",
fun verify_netif_req_limit/1),
NetIfRecbuf =
case ask("25d. Receive buffer size of the "
"agent (in bytes) "
"(default/pos integer)?",
"default",
fun verify_netif_recbuf/1) of
default ->
[];
RecBufSz ->
[{recbuf, RecBufSz}]
end,
NetIfSndbuf =
case ask("25e. Send buffer size of the agent "
"(in bytes) (default/pos integer)?",
"default",
fun verify_netif_sndbuf/1) of
default ->
[];
SndBufSz ->
[{sndbuf, SndBufSz}]
end,
NetIfFilter =
case ask("25f. Do you wish to specify a "
"network interface filter module "
"(or use default)",
"default", fun verify_module/1) of
default ->
[];
NetIfFilterMod ->
[{filter, [{module, NetIfFilterMod}]}]
end,
[{bind_to, NetIfBindTo},
{no_reuse, NetIfNoReuse},
{req_limit, NetIfReqLimit}] ++
NetIfRecbuf ++ NetIfSndbuf ++ NetIfFilter;
_ ->
[]
end,
NetIf = [{module, NetIfMod},
{verbosity, NetIfVerb},
{options, NetIfOpts}],
TermDiscoEnable = ask("26a. Allow terminating discovery "
"(true/false)?", "true",
fun verify_bool/1),
TermDiscoConf =
case TermDiscoEnable of
true ->
TermDiscoStage2 =
ask("26b. Second stage behaviour "
"(discovery/plain)?", "discovery",
fun verify_term_disco_behaviour/1),
TermDiscoTrigger =
ask("26c. Trigger username "
"(default/a string)?", "default",
fun verify_term_disco_trigger_username/1),
[{enable, TermDiscoEnable},
{stage2, TermDiscoStage2},
{trigger_username, TermDiscoTrigger}];
false ->
[{enable, TermDiscoEnable},
{stage2, discovery},
{trigger_username, ""}]
end,
OrigDiscoEnable = ask("27a. Allow originating discovery "
"(true/false)?", "true",
fun verify_bool/1),
OrigDiscoConf =
[{enable, OrigDiscoEnable}],
DiscoveryConfig =
[{terminating, TermDiscoConf},
{originating, OrigDiscoConf}],
[{agent_type, master},
{agent_verbosity, MasterAgentVerb},
{discovery, DiscoveryConfig},
{config, [{dir, ConfigDir},
{force_load, ForceLoad},
{verbosity, ConfigVerb}]},
{multi_threaded, MultiThreaded},
{mib_server, [{mibentry_override, MeOverride},
{trapentry_override, TrapOverride},
{verbosity, MibServerVerb},
{cache, MibServerCache}]},
{note_store, [{timeout, NoteStoreTimeout},
{verbosity, NoteStoreVerb}]},
{net_if, NetIf}] ++ ATL;
sub ->
SubAgentVerb = ask("14. Sub-agent verbosity "
"(silence/info/log/debug/trace)?",
"silence",
fun verify_verbosity/1),
[{agent_type, sub},
{agent_verbosity, SubAgentVerb},
{config, [{dir, ConfigDir}]}]
end,
SysConfig =
[{priority, Prio},
{versions, Vsns},
{db_dir, DbDir},
{mib_storage, MibStorage},
{target_cache, [{verbosity, TargetCacheVerb}]},
{symbolic_store, [{verbosity, SymStoreVerb}]},
{local_db, [{repair, LocalDbRepair},
{auto_save, LocalDbAutoSave},
{verbosity, LocalDbVerb}]},
{error_report_module, ErrorMod}] ++ AgentConfig,
{Vsns, ConfigDir, SysConfig}.
config_agent_snmp(Dir, Vsns) ->
i("~nAgent snmp config: "
"~n------------------"),
AgentName = guess_agent_name(),
EngineName = guess_engine_name(),
SysName = ask("1. System name (sysName standard variable)",
AgentName, fun verify_system_name/1),
EngineID = ask("2. Engine ID (snmpEngineID standard variable)",
EngineName, fun verify_engine_id/1),
MMS = ask("3. Max message size?", "484",
fun verify_max_message_size/1),
AgentUDP = ask("4. The UDP port the agent listens to. "
"(standard 161)",
"4000", fun verify_port_number/1),
Host = host(),
AgentIP = ask("5. IP address for the agent (only used as id ~n"
" when sending traps)", Host, fun verify_address/1),
%% We intentionally skip TDomain...
%% If the user wish to use IPv6, the user must create an dummy entry here
%% and then manually edit these entries later.
ManagerIP = ask("6. IP address for the manager (only this manager ~n"
" will have access to the agent, traps are sent ~n"
" to this one)", Host, fun verify_address/1),
TrapUdp = ask("7. To what UDP port at the manager should traps ~n"
" be sent (standard 162)?", "5000",
fun verify_port_number/1),
SecType = ask("8. Do you want a none- minimum- or semi-secure"
" configuration? ~n"
" Note that if you chose v1 or v2, you won't get any"
" security for these~n"
" requests (none, minimum, semi_des, semi_aes)",
"minimum",
fun verify_sec_type/1),
Passwd =
case lists:member(v3, Vsns) and (SecType /= none) of
true ->
ensure_crypto_started(),
ask("8b. Give a password of at least length 8. It is used to "
"generate ~n"
" private keys for the configuration: ",
mandatory, fun verify_passwd/1);
false ->
""
end,
NotifType =
case lists:member(v1, Vsns) of
true ->
Overwrite = ask("9. Current configuration files will "
"now be overwritten. "
"Ok (y/n)?", "y", fun verify_yes_or_no/1),
case Overwrite of
no ->
error(overwrite_not_allowed);
yes ->
ok
end,
trap;
false ->
NT = ask("9. Should notifications be sent as traps or informs "
"(trap/inform)?", "trap", fun verify_notif_type/1),
Overwrite = ask("10. Current configuration files will "
"now be overwritten. "
"Ok (y/n)?", "y", fun verify_yes_or_no/1),
case Overwrite of
no ->
error(overwrite_not_allowed);
yes ->
ok
end,
NT
end,
case (catch write_agent_snmp_files(Dir,
Vsns, ManagerIP, TrapUdp,
AgentIP, AgentUDP,
SysName, NotifType, SecType,
Passwd, EngineID, MMS)) of
ok ->
i("~n- - - - - - - - - - - - -"),
i("Info: 1. SecurityName \"initial\" has noAuthNoPriv read access~n"
" and authenticated write access to the \"restricted\"~n"
" subtree."),
i(" 2. SecurityName \"all-rights\" has noAuthNoPriv "
"read/write~n"
" access to the \"internet\" subtree."),
i(" 3. Standard traps are sent to the manager."),
case lists:member(v1, Vsns) or lists:member(v2, Vsns) of
true ->
i(" 4. Community \"public\" is mapped to security name"
" \"initial\"."),
i(" 5. Community \"all-rights\" is mapped to security"
" name \"all-rights\".");
false ->
ok
end,
i("The following agent files where written: agent.conf, "
"community.conf,~n"
"standard.conf, target_addr.conf, "
"target_params.conf, ~n"
"notify.conf" ++
case lists:member(v3, Vsns) of
true -> ", vacm.conf and usm.conf";
false -> " and vacm.conf"
end),
i("- - - - - - - - - - - - -"),
ok;
E ->
error({failed_writing_files, E})
end.
%% -------------------
config_manager_sys() ->
i("~nManager system config: "
"~n----------------------"),
Prio = ask("1. Manager process priority (low/normal/high)",
"normal", fun verify_prio/1),
Vsns = ask("2. What SNMP version(s) should be used "
"(1,2,3,1&2,1&2&3,2&3)?", "3", fun verify_versions/1),
{ok, DefDir} = file:get_cwd(),
{DefConfDir, Warning} = default_manager_dir(DefDir),
ConfQ =
if
Warning == "" ->
"3. Configuration directory (absolute path)?";
true ->
lists:flatten(
io_lib:format("3. Configuration directory (absolute path)?"
"~n ~s", [Warning]))
end,
ConfigDir = ask(ConfQ, DefConfDir, fun verify_dir/1),
ConfigVerb = ask("4. Config verbosity "
"(silence/info/log/debug/trace)?",
"silence",
fun verify_verbosity/1),
ConfigDbDir = ask("5. Database directory (absolute path)?",
DefDir, fun verify_dir/1),
ConfigDbRepair = ask("6. Database repair "
"(true/false/force)?", "true",
fun verify_dets_repair/1),
ConfigDbAutoSave = ask("7. Database auto save "
"(infinity/milli seconds)?",
"5000", fun verify_dets_auto_save/1),
IRB =
case ask("8. Inform request behaviour (auto/user)?",
"auto", fun verify_irb/1) of
auto ->
auto;
user ->
case ask("8b. Use default GC timeout"
"(default/seconds)?",
"default", fun verify_irb_user/1) of
default ->
user;
IrbGcTo ->
{user, IrbGcTo}
end
end,
ServerVerb = ask("9. Server verbosity "
"(silence/info/log/debug/trace)?",
"silence",
fun verify_verbosity/1),
ServerTimeout = ask("10. Server GC timeout?", "30000",
fun verify_timeout/1),
NoteStoreVerb = ask("11. Note store verbosity "
"(silence/info/log/debug/trace)?",
"silence",
fun verify_verbosity/1),
NoteStoreTimeout = ask("12. Note store GC timeout?", "30000",
fun verify_timeout/1),
NetIfMod = ask("13. Which network interface module shall be used?",
"snmpm_net_if", fun verify_module/1),
NetIfVerb = ask("14. Network interface verbosity "
"(silence/info/log/debug/trace)?", "silence",
fun verify_verbosity/1),
NetIfBindTo = ask("15. Bind the manager IP address "
"(true/false)?",
"false", fun verify_bool/1),
NetIfNoReuse = ask("16. Shall the manager IP address and port "
"be not reusable (true/false)?",
"false", fun verify_bool/1),
NetIfRecbuf =
case ask("17. Receive buffer size of the manager (in bytes) "
"(default/pos integer)?", "default",
fun verify_netif_recbuf/1) of
default ->
[];
RecBufSz ->
[{recbuf, RecBufSz}]
end,
NetIfSndbuf =
case ask("18. Send buffer size of the manager (in bytes) "
"(default/pos integer)?", "default",
fun verify_netif_sndbuf/1) of
default ->
[];
SndBufSz ->
[{sndbuf, SndBufSz}]
end,
NetIfOpts =
[{bind_to, NetIfBindTo},
{no_reuse, NetIfNoReuse}] ++ NetIfRecbuf ++ NetIfSndbuf,
NetIf =
[{module, NetIfMod},
{verbosity, NetIfVerb},
{options, NetIfOpts}],
ATL =
case ask("19. Shall the manager use an audit trail log "
"(y/n)?",
"n", fun verify_yes_or_no/1) of
yes ->
ATLType = ask("19b. Audit trail log type "
"(write/read_write)?",
"read_write", fun verify_atl_type/1),
ATLDir = ask("19c. Where to store the "
"audit trail log?",
DefDir, fun verify_dir/1),
ATLMaxFiles = ask("19d. Max number of files?",
"10",
fun verify_pos_integer/1),
ATLMaxBytes = ask("19e. Max size (in bytes) "
"of each file?",
"10240",
fun verify_pos_integer/1),
ATLSize = {ATLMaxBytes, ATLMaxFiles},
ATLRepair = ask("19f. Audit trail log repair "
"(true/false/truncate/snmp_repair)?", "true",
fun verify_atl_repair/1),
ATLSeqNo = ask("19g. Audit trail log sequence-numbering "
"(true/false)?", "false",
fun verify_atl_seqno/1),
[{audit_trail_log, [{type, ATLType},
{dir, ATLDir},
{size, ATLSize},
{repair, ATLRepair},
{seqno, ATLSeqNo}]}];
no ->
[]
end,
DefUser =
case ask("20. Do you wish to assign a default user [yes] or use~n"
" the default settings [no] (y/n)?", "n",
fun verify_yes_or_no/1) of
yes ->
DefUserMod = ask("20b. Default user module?",
"snmpm_user_default",
fun verify_module/1),
DefUserData = ask("20c. Default user data?", "undefined",
fun verify_user_data/1),
[{def_user_mod, DefUserMod},
{def_user_data, DefUserData}];
no ->
[]
end,
SysConfig =
[{priority, Prio},
{versions, Vsns},
{config, [{dir, ConfigDir},
{verbosity, ConfigVerb},
{db_dir, ConfigDbDir},
{repair, ConfigDbRepair},
{auto_save, ConfigDbAutoSave}]},
{inform_request_behaviour, IRB},
{mibs, []},
{server, [{timeout, ServerTimeout},
{verbosity, ServerVerb}]},
{note_store, [{timeout, NoteStoreTimeout},
{verbosity, NoteStoreVerb}]},
{net_if, NetIf}] ++ ATL ++ DefUser,
{Vsns, ConfigDir, SysConfig}.
config_manager_snmp(Dir, Vsns) ->
i("~nManager snmp config: "
"~n--------------------"),
EngineName = guess_engine_name(),
EngineID = ask("1. Engine ID (snmpEngineID standard variable)",
EngineName, fun verify_engine_id/1),
MMS = ask("2. Max message size?", "484",
fun verify_max_message_size/1),
Host = host(),
IP = ask("3. IP address for the manager (only used as id ~n"
" when sending requests)",
Host, fun verify_address/1),
Port = ask("4. Port number (standard 162)?", "5000",
fun verify_port_number/1),
Users = config_manager_snmp_users([]),
Agents = config_manager_snmp_agents([]),
Usms = config_manager_snmp_usms([]),
Overwrite = ask("8. Current configuration files will now be overwritten. "
"Ok (y/n)?", "y", fun verify_yes_or_no/1),
case Overwrite of
no ->
error(overwrite_not_allowed);
yes ->
ok
end,
case (catch write_manager_snmp_files(Dir,
IP, Port, MMS, EngineID,
Users, Agents, Usms)) of
ok ->
i("~n- - - - - - - - - - - - -"),
i("The following manager files where written: "
"manager.conf, agents.conf " ++
case lists:member(v3, Vsns) of
true ->
", users.conf and usm.conf";
false ->
" and users.conf"
end),
i("- - - - - - - - - - - - -"),
ok;
E ->
error({failed_writing_files, E})
end.
config_manager_snmp_users(Users) ->
case ask("5. Configure a user of this manager (y/n)?",
"y", fun verify_yes_or_no/1) of
yes ->
User = config_manager_snmp_user(),
config_manager_snmp_users([User|Users]);
no ->
lists:reverse(Users)
end.
config_manager_snmp_user() ->
UserId = ask("5b. User id?", mandatory,
fun verify_user_id/1),
UserMod = ask("5c. User callback module?", mandatory,
fun verify_module/1),
UserData = ask("5d. User (callback) data?", "undefined",
fun verify_user_data/1),
{UserId, UserMod, UserData}.
config_manager_snmp_agents(Agents) ->
case ask("6. Configure an agent handled by this manager (y/n)?",
"y", fun verify_yes_or_no/1) of
yes ->
Agent = config_manager_snmp_agent(),
config_manager_snmp_agents([Agent|Agents]);
no ->
lists:reverse(Agents)
end.
config_manager_snmp_agent() ->
UserId = ask("6b. User id?", mandatory,
fun verify_user_id/1),
TargetName = ask("6c. Target name?", guess_agent_name(),
fun verify_system_name/1),
Version = ask("6d. Version (1/2/3)?", "1",
fun verify_version/1),
Comm = ask("6e. Community string ?", "public",
fun verify_community/1),
EngineID = ask("6f. Engine ID (snmpEngineID standard variable)",
guess_engine_name(), fun verify_engine_id/1),
IP = ask("6g. IP address for the agent", host(),
fun verify_address/1),
Port = ask("6h. The UDP port the agent listens to. "
"(standard 161)", "4000", fun verify_port_number/1),
Timeout = ask("6i. Retransmission timeout (infinity/pos integer)?",
"infinity", fun verify_retransmission_timeout/1),
MMS = ask("6j. Max message size?", "484",
fun verify_max_message_size/1),
SecModel = ask("6k. Security model (any/v1/v2c/usm)?", "any",
fun verify_sec_model/1),
SecName = ask("6l. Security name?", "\"initial\"",
fun verify_sec_name/1),
SecLevel = ask("6m. Security level (noAuthNoPriv/authNoPriv/authPriv)?",
"noAuthNoPriv", fun verify_sec_level/1),
{UserId,
TargetName, Comm, IP, Port, EngineID, Timeout, MMS,
Version, SecModel, SecName, SecLevel}.
config_manager_snmp_usms(Usms) ->
case ask("7. Configure an usm user handled by this manager (y/n)?",
"y", fun verify_yes_or_no/1) of
yes ->
Usm = config_manager_snmp_usm(),
config_manager_snmp_usms([Usm|Usms]);
no ->
lists:reverse(Usms)
end.
config_manager_snmp_usm() ->
EngineID = ask("7a. Engine ID", guess_engine_name(),
fun verify_engine_id/1),
UserName = ask("7b. User name?", mandatory, fun verify_usm_name/1),
SecName = ask("7c. Security name?", UserName,
fun verify_usm_sec_name/1),
AuthP = ask("7d. Authentication protocol (no/sha/md5)?", "no",
fun verify_usm_auth_protocol/1),
AuthKey = ask_auth_key("7e", AuthP),
PrivP = ask("7e. Priv protocol (no/des/aes)?", "no",
fun verify_usm_priv_protocol/1),
PrivKey = ask_priv_key("7f", PrivP),
{EngineID, UserName,
SecName, AuthP, AuthKey, PrivP, PrivKey}.
%% ------------------------------------------------------------------
is_members([], _Files) ->
true;
is_members([H|T], Files) ->
lists:member(H, Files) andalso is_members(T, Files).
default_agent_dir(DefDir) ->
default_dir("agent", DefDir).
default_manager_dir(DefDir) ->
default_dir("manager", DefDir).
default_dir(Component, DefDir) ->
%% Look for the component dir, if found use that as default
{ok, Files} = file:list_dir(DefDir),
case lists:member(Component, Files) of
true ->
{filename:join(DefDir, Component), ""};
false ->
%% No luck,
%% so check if cwd contains either agent and/or
%% manager config files. If it does, issue a warning
%% Check for presence of agent config files
%% If all the agent config files are present,
%% issue a warning
AgentConfs =
[
"agent.conf",
"context.conf",
"community.conf",
"notify.conf",
"standard.conf",
"target_params.conf",
"target_addr.conf",
"usm.conf",
"vacm.conf"
],
IsAgentDir = is_members(AgentConfs, Files),
%% Check for presence of manager config files
%% If all the manager config files are present,
%% issue a warning
ManagerConfs =
[
"agents.conf",
"manager.conf",
"users.conf",
"usm.conf"
],
IsManagerDir = is_members(ManagerConfs, Files),
Warning =
if
IsAgentDir and IsManagerDir ->
"Note that the default directory contains both agent and manager config files";
IsAgentDir ->
"Note that the default directory contains agent config files";
IsManagerDir ->
"Note that the default directory contains manager config files";
true ->
""
end,
{DefDir, Warning}
end.
%% ------------------------------------------------------------------
ask_auth_key(_Prefix, usmNoAuthProtocol) ->
"";
ask_auth_key(Prefix, usmHMACSHAAuthProtocol) ->
ask(Prefix ++ " Authentication [sha] key (length 0 or 20)?", "\"\"",
fun verify_usm_auth_sha_key/1);
ask_auth_key(Prefix, usmHMACMD5AuthProtocol) ->
ask(Prefix ++ " Authentication [md5] key (length 0 or 16)?", "\"\"",
fun verify_usm_auth_md5_key/1).
ask_priv_key(_Prefix, usmNoPrivProtocol) ->
"";
ask_priv_key(Prefix, usmDESPrivProtocol) ->
ask(Prefix ++ " Priv [des] key (length 0 or 16)?", "\"\"",
fun verify_usm_priv_des_key/1);
ask_priv_key(Prefix, usmAesCfb128Protocol) ->
ask(Prefix ++ " Priv [aes] key (length 0 or 16)?", "\"\"",
fun verify_usm_priv_aes_key/1).
%% ------------------------------------------------------------------
verify_yes_or_no("y") ->
{ok, yes};
verify_yes_or_no("yes") ->
{ok, yes};
verify_yes_or_no("n") ->
{ok, no};
verify_yes_or_no("no") ->
{ok, no};
verify_yes_or_no(YON) ->
{error, "invalid yes or no: " ++ YON}.
verify_prio("low") ->
{ok, low};
verify_prio("normal") ->
{ok, normal};
verify_prio("high") ->
{ok, high};
verify_prio(Prio) ->
{error, "invalid process priority: " ++ Prio}.
verify_system_name(Name) -> {ok, Name}.
verify_engine_id(Name) -> {ok, Name}.
verify_max_message_size(MMS) ->
case (catch list_to_integer(MMS)) of
I when is_integer(I) andalso (I >= 484) ->
{ok, I};
I when is_integer(I) ->
{error, "invalid max message size (must be atleast 484): " ++ MMS};
_ ->
{error, "invalid max message size: " ++ MMS}
end.
verify_port_number(P) ->
case (catch list_to_integer(P)) of
N when is_integer(N) andalso (N > 0) ->
{ok, N};
_ ->
{error, "invalid port number: " ++ P}
end.
verify_versions("1") -> {ok, [v1]};
verify_versions("2") -> {ok, [v2]};
verify_versions("3") -> {ok, [v3]};
verify_versions("1&2") -> {ok, [v1,v2]};
verify_versions("1&3") -> {ok, [v1,v3]};
verify_versions("2&3") -> {ok, [v2,v3]};
verify_versions("1&2&3") -> {ok, [v1,v2,v3]};
verify_versions(V) -> {error, "incorrect version(s): " ++ V}.
verify_version("1") -> {ok, v1};
verify_version("2") -> {ok, v2};
verify_version("3") -> {ok, v3};
verify_version(V) -> {error, "incorrect version: " ++ V}.
verify_passwd(Passwd) when length(Passwd) >= 8 ->
{ok, Passwd};
verify_passwd(_P) ->
{error, "invalid password"}.
verify_dir(Dir) ->
case filename:pathtype(Dir) of
absolute ->
case file:read_file_info(Dir) of
{ok, #file_info{type = directory}} ->
{ok, snmp_misc:ensure_trailing_dir_delimiter(Dir)};
{ok, _FileInfo} ->
{error, Dir ++ " is not a directory"};
_ ->
{error, "invalid directory: " ++ Dir}
end;
_E ->
{error, "invalid directory (not absolute): " ++ Dir}
end.
verify_notif_type("trap") -> {ok, trap};
verify_notif_type("inform") -> {ok, inform};
verify_notif_type(NT) -> {error, "invalid notifcation type: " ++ NT}.
verify_sec_type("none") -> {ok, none};
verify_sec_type("minimum") -> {ok, minimum};
verify_sec_type("semi_des") -> {ok, {semi, des}};
verify_sec_type("semi_aes") -> {ok, {semi, aes}};
verify_sec_type(ST) -> {error, "invalid security type: " ++ ST}.
verify_address(A) ->
verify_address(A, snmpUDPDomain).
verify_address(A, snmpUDPDomain = _Domain) ->
do_verify_address(A, inet);
verify_address(A, transportDomainUdpIpv4 = _Domain) ->
do_verify_address(A, inet);
verify_address(A, transportDomainUdpIpv6 = _Domain) ->
do_verify_address(A, inet6).
do_verify_address(A, Family) ->
case (catch snmp_misc:ip(A, Family)) of
{ok, IP} ->
{ok, tuple_to_list(IP)};
{error, _} ->
{error, "invalid address: " ++ A};
_E ->
{error, "invalid address: " ++ A}
end.
verify_mib_storage_type("m") ->
{ok, mnesia};
verify_mib_storage_type("mnesia") ->
{ok, mnesia};
verify_mib_storage_type("d") ->
{ok, dets};
verify_mib_storage_type("dets") ->
{ok, dets};
verify_mib_storage_type("e") ->
{ok, ets};
verify_mib_storage_type("ets") ->
{ok, ets};
verify_mib_storage_type(T) ->
{error, "invalid mib storage type: " ++ T}.
verify_mib_storage_action("default") ->
{ok, default};
verify_mib_storage_action("clear") ->
{ok, clear};
verify_mib_storage_action("keep") ->
{ok, keep};
verify_mib_storage_action(A) ->
{error, "invalid mib storage action: " ++ A}.
verify_verbosity("silence") ->
{ok, silence};
verify_verbosity("info") ->
{ok, info};
verify_verbosity("log") ->
{ok, log};
verify_verbosity("debug") ->
{ok, debug};
verify_verbosity("trace") ->
{ok, trace};
verify_verbosity(V) ->
{error, "invalid verbosity: " ++ V}.
verify_dets_repair("true") ->
{ok, true};
verify_dets_repair("false") ->
{ok, false};
verify_dets_repair("force") ->
{ok, force};
verify_dets_repair(R) ->
{error, "invalid repair: " ++ R}.
verify_dets_auto_save("infinity") ->
{ok, infinity};
verify_dets_auto_save(I0) ->
case (catch list_to_integer(I0)) of
I when is_integer(I) andalso (I > 0) ->
{ok, I};
_ ->
{error, "invalid auto save timeout time: " ++ I0}
end.
%% I know that this is a little of the edge, but...
verify_module(M0) ->
case (catch list_to_atom(M0)) of
M when is_atom(M) ->
{ok, M};
_ ->
{error, "invalid module: " ++ M0}
end.
verify_agent_type("master") ->
{ok, master};
verify_agent_type("sub") ->
{ok, sub};
verify_agent_type(AT) ->
{error, "invalid agent type: " ++ AT}.
verify_bool("true") ->
{ok, true};
verify_bool("false") ->
{ok, false};
verify_bool(B) ->
{error, "invalid boolean: " ++ B}.
verify_timeout(T0) ->
case (catch list_to_integer(T0)) of
T when is_integer(T) andalso (T > 0) ->
{ok, T};
_ ->
{error, "invalid timeout time: '" ++ T0 ++ "'"}
end.
verify_retransmission_timeout("infinity") ->
{ok, infinity};
verify_retransmission_timeout([${|R] = Timer) ->
case lists:reverse(R) of
[$}|R2] ->
case string:tokens(lists:reverse(R2), ", ") of
[WaitForStr, FactorStr, IncrStr, RetryStr] ->
WaitFor = incr_timer_value(WaitForStr, 1),
Factor = incr_timer_value(FactorStr, 1),
Incr = incr_timer_value(IncrStr, 0),
Retry = incr_timer_value(RetryStr, 0),
{ok, {WaitFor, Factor, Incr, Retry}};
_ ->
{error, "invalid retransmission timer: '" ++ Timer ++ "'"}
end;
_ ->
{error, "invalid retransmission timer: '" ++ Timer ++ "'"}
end;
verify_retransmission_timeout(T0) ->
case (catch list_to_integer(T0)) of
T when is_integer(T) andalso (T > 0) ->
{ok, T};
_ ->
{error, "invalid timeout time: '" ++ T0 ++ "'"}
end.
incr_timer_value(Str, Min) ->
case (catch list_to_integer(Str)) of
I when is_integer(I) andalso (I >= Min) ->
I;
I when is_integer(I) ->
E = lists:flatten(io_lib:format("invalid incremental timer value "
"(min value is ~w): " ++ Str,
[Min])),
error(E);
_ ->
error("invalid incremental timer value: " ++ Str)
end.
%% verify_atl_type("read") ->
%% {ok, read};
verify_atl_type("write") ->
{ok, write};
verify_atl_type("read_write") ->
{ok, read_write};
verify_atl_type(T) ->
{error, "invalid log type: " ++ T}.
verify_atl_repair("true") ->
{ok, true};
verify_atl_repair("false") ->
{ok, false};
verify_atl_repair("truncate") ->
{ok, truncate};
verify_atl_repair("snmp_repair") ->
{ok, snmp_repair};
verify_atl_repair(R) ->
{error, "invalid audit trail log repair: " ++ R}.
verify_atl_seqno("true") ->
{ok, true};
verify_atl_seqno("false") ->
{ok, false};
verify_atl_seqno(SN) ->
{error, "invalid audit trail log seqno: " ++ SN}.
verify_pos_integer(I0) ->
case (catch list_to_integer(I0)) of
I when is_integer(I) andalso (I > 0) ->
{ok, I};
_ ->
{error, "invalid integer value: " ++ I0}
end.
verify_netif_req_limit("infinity") ->
{ok, infinity};
verify_netif_req_limit(I0) ->
case (catch list_to_integer(I0)) of
I when is_integer(I) andalso (I > 0) ->
{ok, I};
_ ->
{error, "invalid network interface request limit: " ++ I0}
end.
verify_netif_recbuf(Val) ->
verify_netif_recbuf_or_sndbuf(Val, "recbuf").
verify_netif_sndbuf(Val) ->
verify_netif_recbuf_or_sndbuf(Val, "sndbuf").
verify_netif_recbuf_or_sndbuf("default", _) ->
{ok, default};
verify_netif_recbuf_or_sndbuf(I0, Buf) ->
case (catch list_to_integer(I0)) of
I when is_integer(I) andalso (I > 0) ->
{ok, I};
_ ->
{error, "invalid network interface " ++ Buf ++ " size: " ++ I0}
end.
verify_irb("auto") ->
{ok, auto};
verify_irb("user") ->
{ok, user};
verify_irb(IRB) ->
E = lists:flatten(io_lib:format("invalid irb: ~p", [IRB])),
{error, E}.
verify_irb_user("default") ->
{ok, default};
verify_irb_user(TO) ->
case (catch list_to_integer(TO)) of
I when is_integer(I) andalso (I > 0) ->
{ok, I*1000}; % Time is given in seconds
_ ->
{error, "invalid IRB GC time: " ++ TO}
end.
verify_term_disco_behaviour("discovery") ->
{ok, discovery};
verify_term_disco_behaviour("plain") ->
{ok, plain};
verify_term_disco_behaviour(B) ->
{error, "invalid terminating discovery behaviour: " ++ B}.
verify_term_disco_trigger_username("default") ->
{ok, ""};
verify_term_disco_trigger_username(Trigger) ->
{ok, Trigger}.
verify_user_id(UserId) when is_list(UserId) ->
case (catch list_to_atom(UserId)) of
A when is_atom(A) ->
{ok, A};
_ ->
{error, "invalid user id: " ++ UserId}
end;
verify_user_id(UserId) when is_atom(UserId) ->
{ok, UserId};
verify_user_id(UserId) ->
E = lists:flatten(io_lib:format("invalid user id: ~p", [UserId])),
{error, E}.
verify_user_data("undefined") ->
{ok, undefined};
verify_user_data(UserData) ->
{ok, UserData}.
verify_community("\"\"") ->
{ok, ""};
verify_community(Comm) ->
{ok, Comm}.
% verify_context_name("\"\"") ->
% {ok, ""};
% verify_context_name(Ctx) ->
% {ok, Ctx}.
% verify_mp_model("v1") ->
% {ok, v1};
% verify_mp_model("v2c") ->
% {ok, v2c};
% verify_mp_model("v3") ->
% {ok, v3};
% verify_mp_model(M) ->
% {error, "invalid mp model: " ++ M}.
verify_sec_model("any") ->
{ok, any};
verify_sec_model("v1") ->
{ok, v1};
verify_sec_model("v2c") ->
{ok, v2c};
verify_sec_model("usm") ->
{ok, usm};
verify_sec_model(M) ->
{error, "invalid sec model: " ++ M}.
verify_sec_name("\"initial\"") ->
{ok, "initial"};
verify_sec_name(N) ->
{ok, N}.
verify_sec_level("noAuthNoPriv") ->
{ok, noAuthNoPriv};
verify_sec_level("authNoPriv") ->
{ok, authNoPriv};
verify_sec_level("authPriv") ->
{ok, authPriv};
verify_sec_level(L) ->
{error, "invalid sec level: " ++ L}.
verify_usm_name(Name) ->
{ok, Name}.
verify_usm_sec_name(Name) ->
{ok, Name}.
verify_usm_auth_protocol("no") ->
{ok, usmNoAuthProtocol};
verify_usm_auth_protocol("sha") ->
{ok, usmHMACSHAAuthProtocol};
verify_usm_auth_protocol("md5") ->
{ok, usmHMACMD5AuthProtocol};
verify_usm_auth_protocol(AuthP) ->
{error, "invalid auth protocol: " ++ AuthP}.
verify_usm_auth_sha_key(Key) ->
verify_usm_key("auth sha", Key, 20).
verify_usm_auth_md5_key(Key) ->
verify_usm_key("auth md5", Key, 16).
verify_usm_priv_protocol("no") ->
{ok, usmNoPrivProtocol};
verify_usm_priv_protocol("des") ->
{ok, usmDESPrivProtocol};
verify_usm_priv_protocol("aes") ->
{ok, usmAesCfb128Protocol};
verify_usm_priv_protocol(AuthP) ->
{error, "invalid priv protocol: " ++ AuthP}.
verify_usm_priv_des_key(Key) ->
verify_usm_key("priv des", Key, 16).
verify_usm_priv_aes_key(Key) ->
verify_usm_key("priv aes", Key, 16).
verify_usm_key(_What, "\"\"", _ExpectLength) ->
{ok, ""};
verify_usm_key(_What, Key, ExpectLength) when length(Key) =:= ExpectLength ->
{ok, Key};
verify_usm_key(What, [$[|RestKey] = Key0, ExpectLength) ->
case lists:reverse(RestKey) of
[$]|RevRestKey] ->
Key1 = lists:reverse(RevRestKey),
verify_usm_key2(What, Key1, ExpectLength);
_ ->
%% Its not a list ([...]) and its not the correct length, ...
{error, "invalid " ++ What ++ " key length: " ++ Key0}
end;
verify_usm_key(What, Key, ExpectLength) ->
verify_usm_key2(What, Key, ExpectLength).
verify_usm_key2(What, Key0, ExpectLength) ->
case string:tokens(Key0, [$,]) of
Key when length(Key) =:= ExpectLength ->
convert_usm_key(Key, []);
_ ->
{error, "invalid " ++ What ++ " key length: " ++ Key0}
end.
convert_usm_key([], Acc) ->
{ok, lists:reverse(Acc)};
convert_usm_key([I|Is], Acc) ->
case (catch list_to_integer(I)) of
Int when is_integer(Int) ->
convert_usm_key(Is, [Int|Acc]);
_Err ->
{error, "invalid key number: " ++ I}
end.
% ip(Host) ->
% case catch snmp_misc:ip(Host) of
% {ok, IPtuple} -> tuple_to_list(IPtuple);
% {error, Reason} -> throw({error, Reason});
% _Q -> throw({error, {"ip conversion failed", Host}})
% end.
% make_ip(Str) ->
% case catch snmp_misc:ip(Str) of
% {ok, IPtuple} -> tuple_to_list(IPtuple);
% _Q -> ip(Str)
% end.
print_q(Q, mandatory) ->
io:format(Q ++ " ",[]);
print_q(Q, Default) when is_list(Default) ->
io:format(Q ++ " [~s] ",[Default]).
%% Defval = string() | mandatory
ask(Q, Default, Verify) when is_list(Q) andalso is_function(Verify) ->
print_q(Q, Default),
PrelAnsw = io:get_line(''),
Answer =
case remove_newline(PrelAnsw) of
"" when Default =/= mandatory -> Default;
"" -> ask(Q, Default, Verify);
A -> A
end,
case (catch Verify(Answer)) of
{ok, Answer2} ->
Answer2;
{error, ReasonStr} ->
i("ERROR: " ++ ReasonStr),
ask(Q, Default, Verify)
end.
host() ->
case (catch inet:gethostname()) of
{ok, Name} ->
case (catch inet:getaddr(Name, inet)) of
{ok, Addr} when is_tuple(Addr) ->
lists:flatten(
io_lib:format("~w.~w.~w.~w", tuple_to_list(Addr)));
_ ->
"127.0.0.1"
end;
_ ->
"127.0.0.1"
end.
guess_agent_name() ->
case os:type() of
{unix, _} ->
lists:append(remove_newline(os:cmd("echo $USER")), "'s agent");
{_,_} -> "my agent"
end.
guess_engine_name() ->
case os:type() of
{unix, _} ->
lists:append(remove_newline(os:cmd("echo $USER")), "'s engine");
{_,_} -> "my engine"
end.
% guess_user_id() ->
% case os:type() of
% {unix, _} ->
% lists:append(remove_newline(os:cmd("echo $USER")), "'s user");
% {_,_} -> "user_id"
% end.
remove_newline(Str) ->
lists:delete($\n, Str).
%%======================================================================
%% File generation
%%======================================================================
%%----------------------------------------------------------------------
%% Dir: string() (ex: "../conf/")
%% ManagerIP, AgentIP: [int(),int(),int(),int()]
%% TrapUdp, AgentUDP: integer()
%% SysName: string()
%%----------------------------------------------------------------------
write_agent_snmp_files(Dir, Vsns, ManagerIP, TrapUdp,
AgentIP, AgentUDP, SysName)
when is_list(Dir) andalso
is_list(Vsns) andalso
is_list(ManagerIP) andalso
is_integer(TrapUdp) andalso
is_list(AgentIP) andalso
is_integer(AgentUDP) andalso
is_list(SysName) ->
write_agent_snmp_files(Dir, Vsns, ManagerIP, TrapUdp, AgentIP, AgentUDP,
SysName, "trap", none, "", "agentEngine", 484).
%%
%% ----- Agent config files generator functions -----
%%
write_agent_snmp_files(Dir, Vsns, ManagerIP, TrapUdp, AgentIP, AgentUDP,
SysName, NotifType, SecType, Passwd, EngineID, MMS) ->
write_agent_snmp_conf(Dir, AgentIP, AgentUDP, EngineID, MMS),
write_agent_snmp_context_conf(Dir),
write_agent_snmp_community_conf(Dir),
write_agent_snmp_standard_conf(Dir, SysName),
write_agent_snmp_target_addr_conf(Dir, ManagerIP, TrapUdp, Vsns),
write_agent_snmp_target_params_conf(Dir, Vsns),
write_agent_snmp_notify_conf(Dir, NotifType),
write_agent_snmp_usm_conf(Dir, Vsns, EngineID, SecType, Passwd),
write_agent_snmp_vacm_conf(Dir, Vsns, SecType),
ok.
%%
%% ------ [agent] agent.conf ------
%%
write_agent_snmp_conf(Dir, AgentIP, AgentUDP, EngineID, MMS) ->
Comment =
"%% This file defines the Agent local configuration info\n"
"%% The data is inserted into the snmpEngine* variables defined\n"
"%% in SNMP-FRAMEWORK-MIB, and the intAgent* variables defined\n"
"%% in OTP-SNMPEA-MIB.\n"
"%% Each row is a 2-tuple:\n"
"%% {AgentVariable, Value}.\n"
"%% For example\n"
"%% {intAgentUDPPort, 4000}.\n"
"%% The ip address for the agent is sent as id in traps.\n"
"%% {intAgentIpAddress, [127,42,17,5]}.\n"
"%% {snmpEngineID, \"agentEngine\"}.\n"
"%% {snmpEngineMaxMessageSize, 484}.\n"
"%%\n\n",
Hdr = header() ++ Comment,
Conf = [{intAgentUDPPort, AgentUDP},
{intAgentIpAddress, AgentIP},
{snmpEngineID, EngineID},
{snmpEngineMaxMessageSize, MMS}],
write_agent_config(Dir, Hdr, Conf).
write_agent_config(Dir, Hdr, Conf) ->
snmpa_conf:write_agent_config(Dir, Hdr, Conf).
update_agent_config(Dir, Conf) ->
snmpa_conf:append_agent_config(Dir, Conf).
%%
%% ------ [agent] context.conf ------
%%
write_agent_snmp_context_conf(Dir) ->
Comment =
"%% This file defines the contexts known to the agent.\n"
"%% The data is inserted into the vacmContextTable defined\n"
"%% in SNMP-VIEW-BASED-ACM-MIB.\n"
"%% Each row is a string:\n"
"%% ContextName.\n"
"%%\n"
"%% The empty string is the default context.\n"
"%% For example\n"
"%% \"bridge1\".\n"
"%% \"bridge2\".\n"
"%%\n\n",
Hdr = header() ++ Comment,
Conf = [""],
write_agent_context_config(Dir, Hdr, Conf).
write_agent_context_config(Dir, Hdr, Conf) ->
snmpa_conf:write_context_config(Dir, Hdr, Conf).
update_agent_context_config(Dir, Conf) ->
snmpa_conf:append_context_config(Dir, Conf).
%%
%% ------ community.conf ------
%%
write_agent_snmp_community_conf(Dir) ->
Comment =
"%% This file defines the community info which maps to VACM parameters.\n"
"%% The data is inserted into the snmpCommunityTable defined\n"
"%% in SNMP-COMMUNITY-MIB.\n"
"%% Each row is a 5-tuple:\n"
"%% {CommunityIndex, CommunityName, SecurityName, ContextName, TransportTag}.\n"
"%% For example\n"
"%% {\"1\", \"public\", \"initial\", \"\", \"\"}.\n"
"%% {\"2\", \"secret\", \"secret_name\", \"\", \"tag\"}.\n"
"%% {\"3\", \"bridge1\", \"initial\", \"bridge1\", \"\"}.\n"
"%%\n\n",
Hdr = header() ++ Comment,
Conf = [{"public", "public", "initial", "", ""},
{"all-rights", "all-rights", "all-rights", "", ""},
{"standard trap", "standard trap", "initial", "", ""}],
write_agent_community_config(Dir, Hdr, Conf).
write_agent_community_config(Dir, Hdr, Conf) ->
snmpa_conf:write_community_config(Dir, Hdr, Conf).
update_agent_community_config(Dir, Conf) ->
snmpa_conf:append_community_config(Dir, Conf).
%%
%% ------ standard.conf ------
%%
write_agent_snmp_standard_conf(Dir, SysName) ->
Comment =
"%% This file defines the STANDARD-MIB info.\n"
"%% Each row is a 2-tuple:\n"
"%% {StandardVariable, Value}.\n"
"%% For example\n"
"%% {sysDescr, \"Erlang SNMP agent\"}.\n"
"%% {sysObjectID, [1,2,3]}.\n"
"%% {sysContact, \"{mbj,eklas}@erlang.ericsson.se\"}.\n"
"%% {sysName, \"test\"}.\n"
"%% {sysLocation, \"erlang\"}.\n"
"%% {sysServices, 72}.\n"
"%% {snmpEnableAuthenTraps, enabled}.\n"
"%%\n\n",
Hdr = header() ++ Comment,
Conf = [{sysDescr, "Erlang SNMP agent"},
{sysObjectID, [1,2,3]},
{sysContact, "{mbj,eklas}@erlang.ericsson.se"},
{sysLocation, "erlang"},
{sysServices, 72},
{snmpEnableAuthenTraps, enabled},
{sysName, SysName}],
write_agent_standard_config(Dir, Hdr, Conf).
write_agent_standard_config(Dir, Hdr, Conf) ->
snmpa_conf:write_standard_config(Dir, Hdr, Conf).
update_agent_standard_config(Dir, Conf) ->
snmpa_conf:append_standard_config(Dir, Conf).
%%
%% ------ target_addr.conf ------
%%
write_agent_snmp_target_addr_conf(Dir, ManagerIp, UDP, Vsns) ->
Timeout = 1500,
RetryCount = 3,
write_agent_snmp_target_addr_conf(Dir, ManagerIp, UDP,
Timeout, RetryCount,
Vsns).
write_agent_snmp_target_addr_conf(Dir, ManagerIp, UDP,
Timeout, RetryCount,
Vsns) ->
Comment =
"%% This file defines the target address parameters.\n"
"%% The data is inserted into the snmpTargetAddrTable defined\n"
"%% in SNMP-TARGET-MIB, and in the snmpTargetAddrExtTable defined\n"
"%% in SNMP-COMMUNITY-MIB.\n"
"%% Each row is a 10-tuple:\n"
"%% {Name, Ip, Udp, Timeout, RetryCount, TagList, ParamsName, EngineId,\n"
"%% TMask, MaxMessageSize}.\n"
"%% The EngineId value is only used if Inform-Requests are sent to this\n"
"%% target. If Informs are not sent, this value is ignored, and can be\n"
"%% e.g. an empty string. However, if Informs are sent, it is essential\n"
"%% that the value of EngineId matches the value of the target's\n"
"%% actual snmpEngineID.\n"
"%% For example\n"
"%% {\"1.2.3.4 v1\", [1,2,3,4], 162, \n"
"%% 1500, 3, \"std_inform\", \"otp_v2\", \"\",\n"
"%% [127,0,0,0], 2048}.\n"
"%%\n\n",
Hdr = header() ++ Comment,
F = fun(v1 = Vsn, Acc) ->
[{mk_ip(ManagerIp, Vsn),
snmp_target_mib:default_domain(),
ManagerIp, UDP, Timeout, RetryCount,
"std_trap", mk_param(Vsn), "", [], 2048}| Acc];
(v2 = Vsn, Acc) ->
[{mk_ip(ManagerIp, Vsn),
snmp_target_mib:default_domain(),
ManagerIp, UDP, Timeout, RetryCount,
"std_trap", mk_param(Vsn), "", [], 2048},
{lists:flatten(io_lib:format("~s.2",[mk_ip(ManagerIp, Vsn)])),
ManagerIp, UDP, Timeout, RetryCount,
"std_inform", mk_param(Vsn), "", [], 2048}| Acc];
(v3 = Vsn, Acc) ->
[{mk_ip(ManagerIp, Vsn),
snmp_target_mib:default_domain(),
ManagerIp, UDP, Timeout, RetryCount,
"std_trap", mk_param(Vsn), "", [], 2048},
{lists:flatten(io_lib:format("~s.3",[mk_ip(ManagerIp, Vsn)])),
ManagerIp, UDP, Timeout, RetryCount,
"std_inform", mk_param(Vsn), "mgrEngine", [], 2048}| Acc]
end,
Conf = lists:foldl(F, [], Vsns),
write_agent_target_addr_config(Dir, Hdr, Conf).
mk_param(Vsn) ->
lists:flatten(io_lib:format("target_~w", [Vsn])).
mk_ip([A,B,C,D], Vsn) ->
lists:flatten(io_lib:format("~w.~w.~w.~w ~w", [A,B,C,D,Vsn])).
write_agent_target_addr_config(Dir, Hdr, Conf) ->
snmpa_conf:write_target_addr_config(Dir, Hdr, Conf).
update_agent_target_addr_config(Dir, Conf) ->
snmpa_conf:append_target_addr_config(Dir, Conf).
%%
%% ------ target_params.conf ------
%%
write_agent_snmp_target_params_conf(Dir, Vsns) ->
Comment =
"%% This file defines the target parameters.\n"
"%% The data is inserted into the snmpTargetParamsTable defined\n"
"%% in SNMP-TARGET-MIB.\n"
"%% Each row is a 5-tuple:\n"
"%% {Name, MPModel, SecurityModel, SecurityName, SecurityLevel}.\n"
"%% For example\n"
"%% {\"target_v3\", v3, usm, \"\", noAuthNoPriv}.\n"
"%%\n\n",
Hdr = header() ++ Comment,
Conf = [fun(V) ->
MP = if V == v1 -> v1;
V == v2 -> v2c;
V == v3 -> v3
end,
SM = if V == v1 -> v1;
V == v2 -> v2c;
V == v3 -> usm
end,
Name = lists:flatten(
io_lib:format("target_~w", [V])),
{Name, MP, SM, "initial", noAuthNoPriv}
end(Vsn) || Vsn <- Vsns],
write_agent_target_params_config(Dir, Hdr, Conf).
write_agent_target_params_config(Dir, Hdr, Conf) ->
snmpa_conf:write_target_params_config(Dir, Hdr, Conf).
update_agent_target_params_config(Dir, Conf) ->
snmpa_conf:append_target_params_config(Dir, Conf).
%%
%% ------ notify.conf ------
%%
write_agent_snmp_notify_conf(Dir, NotifyType) ->
Comment =
"%% This file defines the notification parameters.\n"
"%% The data is inserted into the snmpNotifyTable defined\n"
"%% in SNMP-NOTIFICATION-MIB.\n"
"%% The Name is used as CommunityString for v1 and v2c.\n"
"%% Each row is a 3-tuple:\n"
"%% {Name, Tag, Type}.\n"
"%% For example\n"
"%% {\"standard trap\", \"std_trap\", trap}.\n"
"%% {\"standard inform\", \"std_inform\", inform}.\n"
"%%\n\n",
Hdr = header() ++ Comment,
Conf = [{"standard trap", "std_trap", NotifyType}],
write_agent_notify_config(Dir, Hdr, Conf).
write_agent_notify_config(Dir, Hdr, Conf) ->
snmpa_conf:write_notify_config(Dir, Hdr, Conf).
update_agent_notify_config(Dir, Conf) ->
snmpa_conf:append_notify_config(Dir, Conf).
%%
%% ------ usm.conf ------
%%
write_agent_snmp_usm_conf(Dir, Vsns, EngineID, SecType, Passwd) ->
case lists:member(v3, Vsns) of
false -> ok;
true -> write_agent_snmp_usm_conf(Dir, EngineID, SecType, Passwd)
end.
write_agent_snmp_usm_conf(Dir, EngineID, SecType, Passwd) ->
Comment =
"%% This file defines the security parameters for the user-based\n"
"%% security model.\n"
"%% The data is inserted into the usmUserTable defined\n"
"%% in SNMP-USER-BASED-SM-MIB.\n"
"%% Each row is a 14-tuple:\n"
"%% {EngineID, UserName, SecName, Clone, AuthP, AuthKeyC, OwnAuthKeyC,\n"
"%% PrivP, PrivKeyC, OwnPrivKeyC, Public, AuthKey, PrivKey}.\n"
"%% For example\n"
"%% {\"agentEngine\", \"initial\", \"initial\", zeroDotZero,\n"
"%% usmNoAuthProtocol, \"\", \"\", usmNoPrivProtocol, \"\", \"\", \"\",\n"
"%% \"\", \"\"}.\n"
"%%\n\n",
Hdr = header() ++ Comment,
Conf = write_agent_snmp_usm_conf2(EngineID, SecType, Passwd),
write_agent_usm_config(Dir, Hdr, Conf).
write_agent_snmp_usm_conf2(EngineID, none, _Passwd) ->
[{EngineID, "initial", "initial", zeroDotZero,
usmNoAuthProtocol, "", "",
usmNoPrivProtocol, "", "",
"", "", ""}];
write_agent_snmp_usm_conf2(EngineID, SecType, Passwd) ->
Secret16 = agent_snmp_mk_secret(md5, Passwd, EngineID),
Secret20 = agent_snmp_mk_secret(sha, Passwd, EngineID),
{PrivProt, PrivSecret} =
case SecType of
minimum ->
{usmNoPrivProtocol, ""};
{semi, des} ->
{usmDESPrivProtocol, Secret16};
{semi, aes} ->
{usmAesCfb128Protocol, Secret16}
end,
[{EngineID, "initial", "initial", zeroDotZero,
usmHMACMD5AuthProtocol, "", "",
PrivProt, "", "",
"", Secret16, PrivSecret},
{EngineID, "templateMD5", "templateMD5", zeroDotZero,
usmHMACMD5AuthProtocol, "", "",
PrivProt, "", "",
"", Secret16, PrivSecret},
{EngineID, "templateSHA", "templateSHA", zeroDotZero,
usmHMACSHAAuthProtocol, "", "",
PrivProt, "", "",
"", Secret20, PrivSecret}].
write_agent_usm_config(Dir, Hdr, Conf) ->
snmpa_conf:write_usm_config(Dir, Hdr, Conf).
update_agent_usm_config(Dir, Conf) ->
snmpa_conf:append_usm_config(Dir, Conf).
%%
%% ------ vacm.conf ------
%%
write_agent_snmp_vacm_conf(Dir, Vsns, SecType) ->
Comment =
"%% This file defines the Mib Views.\n"
"%% The data is inserted into the vacm* tables defined\n"
"%% in SNMP-VIEW-BASED-ACM-MIB.\n"
"%% Each row is one of 3 tuples; one for each table in the MIB:\n"
"%% {vacmSecurityToGroup, SecModel, SecName, GroupName}.\n"
"%% {vacmAccess, GroupName, Prefix, SecModel, SecLevel, Match, RV, WV, NV}.\n"
"%% {vacmViewTreeFamily, ViewIndex, ViewSubtree, ViewStatus, ViewMask}.\n"
"%% For example\n"
"%% {vacmSecurityToGroup, v2c, \"initial\", \"initial\"}.\n"
"%% {vacmSecurityToGroup, usm, \"initial\", \"initial\"}.\n"
"%% read/notify access to system\n"
"%% {vacmAccess, \"initial\", \"\", any, noAuthNoPriv, exact,\n"
"%% \"system\", \"\", \"system\"}.\n"
"%% {vacmViewTreeFamily, \"system\", [1,3,6,1,2,1,1], included, null}.\n"
"%% {vacmViewTreeFamily, \"exmib\", [1,3,6,1,3], included, null}."
" % for EX1-MIB\n"
"%% {vacmViewTreeFamily, \"internet\", [1,3,6,1], included, null}.\n"
"%%\n\n",
Hdr = lists:flatten(header()) ++ Comment,
Groups =
lists:foldl(
fun(V, Acc) ->
[{vacmSecurityToGroup, vacm_ver(V),
"initial", "initial"},
{vacmSecurityToGroup, vacm_ver(V),
"all-rights", "all-rights"}|
Acc]
end, [], Vsns),
Acc =
[{vacmAccess, "initial", "", any, noAuthNoPriv, exact,
"restricted", "", "restricted"},
{vacmAccess, "initial", "", usm, authNoPriv, exact,
"internet", "internet", "internet"},
{vacmAccess, "initial", "", usm, authPriv, exact,
"internet", "internet", "internet"},
{vacmAccess, "all-rights", "", any, noAuthNoPriv, exact,
"internet", "internet", "internet"}],
VTF0 =
case SecType of
none ->
[{vacmViewTreeFamily,
"restricted", [1,3,6,1], included, null}];
minimum ->
[{vacmViewTreeFamily,
"restricted", [1,3,6,1], included, null}];
{semi, _} ->
[{vacmViewTreeFamily,
"restricted", [1,3,6,1,2,1,1], included, null},
{vacmViewTreeFamily,
"restricted", [1,3,6,1,2,1,11], included, null},
{vacmViewTreeFamily,
"restricted", [1,3,6,1,6,3,10,2,1], included, null},
{vacmViewTreeFamily,
"restricted", [1,3,6,1,6,3,11,2,1], included, null},
{vacmViewTreeFamily,
"restricted", [1,3,6,1,6,3,15,1,1], included, null}]
end,
VTF = VTF0 ++ [{vacmViewTreeFamily,"internet",[1,3,6,1],included,null}],
write_agent_vacm_config(Dir, Hdr, Groups ++ Acc ++ VTF).
vacm_ver(v1) -> v1;
vacm_ver(v2) -> v2c;
vacm_ver(v3) -> usm.
write_agent_vacm_config(Dir, Hdr, Conf) ->
snmpa_conf:write_vacm_config(Dir, Hdr, Conf).
update_agent_vacm_config(Dir, Conf) ->
snmpa_conf:append_vacm_config(Dir, Conf).
%%
%% ----- Manager config files generator functions -----
%%
write_manager_snmp_files(Dir, IP, Port, MMS, EngineID,
Users, Agents, Usms) ->
write_manager_snmp_conf(Dir, IP, Port, MMS, EngineID),
write_manager_snmp_users_conf(Dir, Users),
write_manager_snmp_agents_conf(Dir, Agents),
write_manager_snmp_usm_conf(Dir, Usms),
ok.
%%
%% ------ manager.conf ------
%%
write_manager_snmp_conf(Dir, IP, Port, MMS, EngineID) ->
Comment =
"%% This file defines the Manager local configuration info\n"
"%% Each row is a 2-tuple:\n"
"%% {Variable, Value}.\n"
"%% For example\n"
"%% {port, 5000}.\n"
"%% {address, [127,42,17,5]}.\n"
"%% {engine_id, \"managerEngine\"}.\n"
"%% {max_message_size, 484}.\n"
"%%\n\n",
Hdr = header() ++ Comment,
Conf = [{port, Port},
{address, IP},
{engine_id, EngineID},
{max_message_size, MMS}],
write_manager_config(Dir, Hdr, Conf).
write_manager_config(Dir, Hdr, Conf) ->
snmpm_conf:write_manager_config(Dir, Hdr, Conf).
update_manager_config(Dir, Conf) ->
snmpm_conf:append_manager_config(Dir, Conf).
%%
%% ------ users.conf ------
%%
write_manager_snmp_users_conf(Dir, Users) ->
Comment =
"%% This file defines the users the manager handles\n"
"%% Each row is a 3-tuple:\n"
"%% {UserId, UserMod, UserData}.\n"
"%% For example\n"
"%% {kalle, kalle_callback_user_mod, \"dummy\"}.\n"
"%%\n\n",
Hdr = header() ++ Comment,
write_manager_users_config(Dir, Hdr, Users).
write_manager_users_config(Dir, Hdr, Users) ->
snmpm_conf:write_users_config(Dir, Hdr, Users).
update_manager_users_config(Dir, Users) ->
snmpm_conf:append_users_config(Dir, Users).
%%
%% ------ agents.conf ------
%%
write_manager_snmp_agents_conf(Dir, Agents) ->
Comment =
"%% This file defines the agents the manager handles\n"
"%% Each row is a 12-tuple:\n"
"%% {UserId, \n"
"%% TargetName, Comm, Ip, Port, EngineID, Timeout, \n"
"%% MaxMessageSize, Version, SecModel, SecName, SecLevel}\n"
"%%\n\n",
Hdr = header() ++ Comment,
write_manager_agents_config(Dir, Hdr, Agents).
write_manager_agents_config(Dir, Hdr, Agents) ->
snmpm_conf:write_agents_config(Dir, Hdr, Agents).
update_manager_agents_config(Dir, Agents) ->
snmpm_conf:append_agents_config(Dir, Agents).
%%
%% ------ usm.conf -----
%%
write_manager_snmp_usm_conf(Dir, Usms) ->
Comment =
"%% This file defines the usm users the manager handles\n"
"%% Each row is a 6 or 7-tuple:\n"
"%% {EngineID, UserName, AuthP, AuthKey, PrivP, PrivKey}\n"
"%% {EngineID, UserName, SecName, AuthP, AuthKey, PrivP, PrivKey}\n"
"%%\n\n",
Hdr = header() ++ Comment,
write_manager_usm_config(Dir, Hdr, Usms).
write_manager_usm_config(Dir, Hdr, Usms) ->
snmpm_conf:write_usm_config(Dir, Hdr, Usms).
update_manager_usm_config(Dir, Usms) ->
snmpm_conf:append_usm_config(Dir, Usms).
%%
%% -------------------------------------------------------------------------
%%
write_sys_config_file(Dir, Services) ->
{ok, Fid} = file:open(filename:join(Dir,"sys.config"), [write]),
ok = io:format(Fid, "~s", [header()]),
ok = io:format(Fid, "[{snmp, ~n", []),
ok = io:format(Fid, " [~n", []),
write_sys_config_file_services(Fid, Services),
ok = io:format(Fid, " ]~n", []),
ok = io:format(Fid, " }~n", []),
ok = io:format(Fid, "].~n", []),
ok.
write_sys_config_file_services(Fid, [Service]) ->
write_sys_config_file_service(Fid, Service),
ok = io:format(Fid, "~n", []),
ok;
write_sys_config_file_services(Fid, [Service|Services]) ->
write_sys_config_file_service(Fid, Service),
ok = io:format(Fid, ", ~n", []),
write_sys_config_file_services(Fid, Services).
write_sys_config_file_service(Fid, {Service, Opts}) ->
ok = io:format(Fid, " {~w,~n", [Service]),
ok = io:format(Fid, " [~n", []),
write_sys_config_file_service_opts(Fid, Service, Opts),
ok = io:format(Fid, " ]~n", []),
ok = io:format(Fid, " }", []),
true.
write_sys_config_file_service_opts(Fid, agent, Opts) ->
write_sys_config_file_agent_opts(Fid, Opts);
write_sys_config_file_service_opts(Fid, manager, Opts) ->
write_sys_config_file_manager_opts(Fid, Opts).
write_sys_config_file_agent_opts(Fid, [Opt]) ->
write_sys_config_file_agent_opt(Fid, Opt),
ok = io:format(Fid, "~n", []),
ok;
write_sys_config_file_agent_opts(Fid, [Opt|Opts]) ->
write_sys_config_file_agent_opt(Fid, Opt),
ok = io:format(Fid, ", ~n", []),
write_sys_config_file_agent_opts(Fid, Opts).
write_sys_config_file_agent_opt(Fid, {mibs, []}) ->
ok = io:format(Fid, " {mibs, []}", []);
write_sys_config_file_agent_opt(Fid, {priority, Prio}) ->
ok = io:format(Fid, " {priority, ~w}", [Prio]);
write_sys_config_file_agent_opt(Fid, {error_report_mod, Mod}) ->
ok = io:format(Fid, " {error_report_mod, ~w}", [Mod]);
write_sys_config_file_agent_opt(Fid, {versions, Vsns}) ->
ok = io:format(Fid, " {versions, ~w}", [Vsns]);
write_sys_config_file_agent_opt(Fid, {multi_threaded, B}) ->
ok = io:format(Fid, " {multi_threaded, ~w}", [B]);
write_sys_config_file_agent_opt(Fid, {config, Opts}) ->
ok = io:format(Fid, " {config, [", []),
write_sys_config_file_agent_config_opts(Fid, Opts),
ok = io:format(Fid, "}", []);
write_sys_config_file_agent_opt(Fid, {db_dir, Dir}) ->
ok = io:format(Fid, " {db_dir, \"~s\"}", [Dir]);
write_sys_config_file_agent_opt(Fid, {mib_storage, ets}) ->
ok = io:format(Fid, " {mib_storage, ets}", []);
write_sys_config_file_agent_opt(Fid, {mib_storage, {dets, Dir}}) ->
ok = io:format(Fid, " {mib_storage, {dets, \"~s\"}}", [Dir]);
write_sys_config_file_agent_opt(Fid, {mib_storage, {dets, Dir, Act}}) ->
ok = io:format(Fid, " {mib_storage, {dets, \"~s\", ~w}}",
[Dir, Act]);
write_sys_config_file_agent_opt(Fid, {mib_storage, {mnesia, Nodes}}) ->
ok = io:format(Fid, " {mib_storage, {mnesia, ~w}}", [Nodes]);
write_sys_config_file_agent_opt(Fid, {mib_storage, {mnesia, Nodes, Act}}) ->
ok = io:format(Fid, " {mib_storage, {mnesia, ~w, ~w}}",
[Nodes, Act]);
write_sys_config_file_agent_opt(Fid, {target_cache, Opts}) ->
ok = io:format(Fid, " {target_cache, ~w}", [Opts]);
write_sys_config_file_agent_opt(Fid, {local_db, Opts}) ->
ok = io:format(Fid, " {local_db, ~w}", [Opts]);
write_sys_config_file_agent_opt(Fid, {note_store, Opts}) ->
ok = io:format(Fid, " {note_store, ~w}", [Opts]);
write_sys_config_file_agent_opt(Fid, {symbolic_store, Opts}) ->
ok = io:format(Fid, " {symbolic_store, ~w}", [Opts]);
write_sys_config_file_agent_opt(Fid, {agent_type, Type}) ->
ok = io:format(Fid, " {agent_type, ~w}", [Type]);
write_sys_config_file_agent_opt(Fid, {agent_verbosity, Verb}) ->
ok = io:format(Fid, " {agent_verbosity, ~w}", [Verb]);
write_sys_config_file_agent_opt(Fid, {audit_trail_log, Opts}) ->
ok = io:format(Fid, " {audit_trail_log, [", []),
write_sys_config_file_agent_atl_opts(Fid, Opts),
ok = io:format(Fid, "}", []);
write_sys_config_file_agent_opt(Fid, {discovery, Opts}) ->
ok = io:format(Fid, " {discovery, [", []),
write_sys_config_file_agent_disco_opts(Fid, Opts),
ok = io:format(Fid, "}", []);
write_sys_config_file_agent_opt(Fid, {net_if, Opts}) ->
ok = io:format(Fid, " {net_if, ~w}", [Opts]);
write_sys_config_file_agent_opt(Fid, {mib_server, Opts}) ->
ok = io:format(Fid, " {mib_server, ~w}", [Opts]);
write_sys_config_file_agent_opt(Fid, {Key, Val}) ->
ok = io:format(Fid, " {~w, ~w}", [Key, Val]).
%% Mandatory option dir, means that this is never empty:
write_sys_config_file_agent_config_opts(Fid, [Opt]) ->
write_sys_config_file_agent_config_opt(Fid, Opt),
ok = io:format(Fid, "]", []),
ok;
write_sys_config_file_agent_config_opts(Fid, [Opt|Opts]) ->
write_sys_config_file_agent_config_opt(Fid, Opt),
ok = io:format(Fid, ", ", []),
write_sys_config_file_agent_config_opts(Fid, Opts).
write_sys_config_file_agent_config_opt(Fid, {dir, Dir}) ->
ok = io:format(Fid, "{dir, \"~s\"}", [Dir]);
write_sys_config_file_agent_config_opt(Fid, {force_load, Bool}) ->
ok = io:format(Fid, "{force_load, ~w}", [Bool]);
write_sys_config_file_agent_config_opt(Fid, {verbosity, Verb}) ->
ok = io:format(Fid, "{verbosity, ~w}", [Verb]).
%% This is only present if there is atleast one option
write_sys_config_file_agent_atl_opts(Fid, [Opt]) ->
write_sys_config_file_agent_atl_opt(Fid, Opt),
ok = io:format(Fid, "]", []),
ok;
write_sys_config_file_agent_atl_opts(Fid, [Opt|Opts]) ->
write_sys_config_file_agent_atl_opt(Fid, Opt),
ok = io:format(Fid, ", ", []),
write_sys_config_file_agent_atl_opts(Fid, Opts).
write_sys_config_file_agent_atl_opt(Fid, {dir, Dir}) ->
ok = io:format(Fid, "{dir, \"~s\"}", [Dir]);
write_sys_config_file_agent_atl_opt(Fid, {type, Type}) ->
ok = io:format(Fid, "{type, ~w}", [Type]);
write_sys_config_file_agent_atl_opt(Fid, {size, Size}) ->
ok = io:format(Fid, "{size, ~w}", [Size]);
write_sys_config_file_agent_atl_opt(Fid, {repair, Rep}) ->
ok = io:format(Fid, "{repair, ~w}", [Rep]);
write_sys_config_file_agent_atl_opt(Fid, {seqno, SeqNo}) ->
ok = io:format(Fid, "{seqno, ~w}", [SeqNo]).
%% These options are allways there
write_sys_config_file_agent_disco_opts(Fid, [Opt]) ->
write_sys_config_file_agent_disco_opt(Fid, Opt),
ok = io:format(Fid, "]", []),
ok;
write_sys_config_file_agent_disco_opts(Fid, [Opt|Opts]) ->
write_sys_config_file_agent_disco_opt(Fid, Opt),
ok = io:format(Fid, ", ", []),
write_sys_config_file_agent_disco_opts(Fid, Opts).
write_sys_config_file_agent_disco_opt(Fid, {terminating, Opts}) ->
ok = io:format(Fid, "{terminating, [", []),
write_sys_config_file_agent_term_disco_opts(Fid, Opts),
ok = io:format(Fid, "}", []);
write_sys_config_file_agent_disco_opt(Fid, {originating, Opts}) ->
ok = io:format(Fid, "{originating, [", []),
write_sys_config_file_agent_orig_disco_opts(Fid, Opts),
ok = io:format(Fid, "}", []).
write_sys_config_file_agent_term_disco_opts(Fid, [Opt]) ->
write_sys_config_file_agent_term_disco_opt(Fid, Opt),
ok = io:format(Fid, "]", []),
ok;
write_sys_config_file_agent_term_disco_opts(Fid, [Opt|Opts]) ->
write_sys_config_file_agent_term_disco_opt(Fid, Opt),
ok = io:format(Fid, ", ", []),
write_sys_config_file_agent_term_disco_opts(Fid, Opts).
write_sys_config_file_agent_term_disco_opt(Fid, {enable, Enable}) ->
ok = io:format(Fid, "{enable, ~w}", [Enable]);
write_sys_config_file_agent_term_disco_opt(Fid, {stage2, Stage2}) ->
ok = io:format(Fid, "{stage2, ~w}", [Stage2]);
write_sys_config_file_agent_term_disco_opt(Fid, {trigger_username, Trigger}) ->
ok = io:format(Fid, "{trigger_username, \"~s\"}", [Trigger]).
write_sys_config_file_agent_orig_disco_opts(Fid, [Opt]) ->
write_sys_config_file_agent_orig_disco_opt(Fid, Opt),
ok = io:format(Fid, "]", []),
ok;
write_sys_config_file_agent_orig_disco_opts(Fid, [Opt|Opts]) ->
write_sys_config_file_agent_orig_disco_opt(Fid, Opt),
ok = io:format(Fid, ", ", []),
write_sys_config_file_agent_orig_disco_opts(Fid, Opts).
write_sys_config_file_agent_orig_disco_opt(Fid, {enable, Enable}) ->
ok = io:format(Fid, "{enable, ~w}", [Enable]).
write_sys_config_file_manager_opts(Fid, [Opt]) ->
write_sys_config_file_manager_opt(Fid, Opt),
ok = io:format(Fid, "~n", []),
ok;
write_sys_config_file_manager_opts(Fid, [Opt|Opts]) ->
write_sys_config_file_manager_opt(Fid, Opt),
ok = io:format(Fid, ", ~n", []),
write_sys_config_file_manager_opts(Fid, Opts).
write_sys_config_file_manager_opt(Fid, {mibs, []}) ->
ok = io:format(Fid, " {mibs, []}", []);
write_sys_config_file_manager_opt(Fid, {priority, Prio}) ->
ok = io:format(Fid, " {priority, ~w}", [Prio]);
write_sys_config_file_manager_opt(Fid, {versions, Vsns}) ->
ok = io:format(Fid, " {versions, ~w}", [Vsns]);
write_sys_config_file_manager_opt(Fid, {config, Opts}) ->
ok = io:format(Fid, " {config, [", []),
write_sys_config_file_manager_config_opts(Fid, Opts),
ok = io:format(Fid, "}", []);
write_sys_config_file_manager_opt(Fid, {server, Opts}) ->
ok = io:format(Fid, " {server, ~w}", [Opts]);
write_sys_config_file_manager_opt(Fid, {note_store, Opts}) ->
ok = io:format(Fid, " {note_store, ~w}", [Opts]);
write_sys_config_file_manager_opt(Fid, {audit_trail_log, Opts}) ->
ok = io:format(Fid, " {audit_trail_log, [", []),
write_sys_config_file_manager_atl_opts(Fid, Opts),
ok = io:format(Fid, "}", []);
write_sys_config_file_manager_opt(Fid, {net_if, Opts}) ->
ok = io:format(Fid, " {net_if, ~w}", [Opts]);
write_sys_config_file_manager_opt(Fid, {Key, Val}) ->
ok = io:format(Fid, " {~w, ~w}", [Key, Val]).
%% Mandatory option dir, means that this is never empty:
write_sys_config_file_manager_config_opts(Fid, [Opt]) ->
write_sys_config_file_manager_config_opt(Fid, Opt),
ok = io:format(Fid, "]", []),
ok;
write_sys_config_file_manager_config_opts(Fid, [Opt|Opts]) ->
write_sys_config_file_manager_config_opt(Fid, Opt),
ok = io:format(Fid, ", ", []),
write_sys_config_file_manager_config_opts(Fid, Opts).
write_sys_config_file_manager_config_opt(Fid, {dir, Dir}) ->
ok = io:format(Fid, "{dir, \"~s\"}", [Dir]);
write_sys_config_file_manager_config_opt(Fid, {db_dir, Dir}) ->
ok = io:format(Fid, "{db_dir, \"~s\"}", [Dir]);
write_sys_config_file_manager_config_opt(Fid, {repair, Rep}) ->
ok = io:format(Fid, "{repair, ~w}", [Rep]);
write_sys_config_file_manager_config_opt(Fid, {auto_save, As}) ->
ok = io:format(Fid, "{auto_save, ~w}", [As]);
write_sys_config_file_manager_config_opt(Fid, {verbosity, Verb}) ->
ok = io:format(Fid, "{verbosity, ~w}", [Verb]).
%% This is only present if there is atleast one option
write_sys_config_file_manager_atl_opts(Fid, [Opt]) ->
write_sys_config_file_manager_atl_opt(Fid, Opt),
ok = io:format(Fid, "]", []),
ok;
write_sys_config_file_manager_atl_opts(Fid, [Opt|Opts]) ->
write_sys_config_file_manager_atl_opt(Fid, Opt),
ok = io:format(Fid, ", ", []),
write_sys_config_file_manager_atl_opts(Fid, Opts).
write_sys_config_file_manager_atl_opt(Fid, {dir, Dir}) ->
ok = io:format(Fid, "{dir, \"~s\"}", [Dir]);
write_sys_config_file_manager_atl_opt(Fid, {type, Type}) ->
ok = io:format(Fid, "{type, ~w}", [Type]);
write_sys_config_file_manager_atl_opt(Fid, {size, Size}) ->
ok = io:format(Fid, "{size, ~w}", [Size]);
write_sys_config_file_manager_atl_opt(Fid, {repair, Rep}) ->
ok = io:format(Fid, "{repair, ~w}", [Rep]);
write_sys_config_file_manager_atl_opt(Fid, {seqno, SeqNo}) ->
ok = io:format(Fid, "{seqno, ~w}", [SeqNo]).
header() ->
{Y, Mo, D} = date(),
{H, Mi, S} = time(),
io_lib:format("%% This file was generated by "
"~w (version-~s) ~w-~2.2.0w-~2.2.0w "
"~2.2.0w:~2.2.0w:~2.2.0w\n",
[?MODULE, ?version, Y, Mo, D, H, Mi, S]).
%% *If* these functions are successfull, they successfully return anything
%% (which is ignored), but they fail with either a throw or an exit or
%% something similar.
%% Verification of one config entry read from a file
-type(verify_config_entry_function() ::
fun((Entry :: term()) -> ok | {error, Reason :: term()})).
%% Verification of config to be written
-type(verify_config_function() ::
fun(() -> void())).
%% Write config to file (as defined by Fd)
-type(write_config_function() ::
fun((Fd :: file:io_device()) -> void())).
-spec write_config_file(Dir :: string(),
FileName :: string(),
Verify :: verify_config_function(),
Write :: write_config_function()) ->
ok | {error, Reason :: term()}.
write_config_file(Dir, FileName, Verify, Write)
when (is_list(Dir) andalso
is_list(FileName) andalso
is_function(Verify) andalso
is_function(Write)) ->
try
begin
do_write_config_file(Dir, FileName, Verify, Write)
end
catch
throw:Error ->
Error;
T:E ->
{error, {failed_write, Dir, FileName, T, E}}
end.
do_write_config_file(Dir, FileName, Verify, Write) ->
Verify(),
case file:open(filename:join(Dir, FileName), [write]) of
{ok, Fd} ->
file_write_and_close(Write, Fd, Dir, FileName);
Error ->
Error
end.
append_config_file(Dir, FileName, Verify, Write)
when (is_list(Dir) andalso
is_list(FileName) andalso
is_function(Verify) andalso
is_function(Write)) ->
try
begin
do_append_config_file(Dir, FileName, Verify, Write)
end
catch
throw:Error ->
Error;
T:E ->
{error, {failed_append, Dir, FileName, T, E}}
end.
do_append_config_file(Dir, FileName, Verify, Write) ->
Verify(),
case file:open(filename:join(Dir, FileName), [read, write]) of
{ok, Fd} ->
file:position(Fd, eof),
file_write_and_close(Write, Fd, Dir, FileName);
Error ->
Error
end.
file_write_and_close(Write, Fd, Dir, FileName) ->
ok = Write(Fd),
case file:sync(Fd) of
ok ->
case file:close(Fd) of
ok ->
ok;
{error, Reason} ->
{error, {failed_closing, Dir, FileName, Reason}}
end;
{error, Reason} ->
{error, {failed_syncing, Dir, FileName, Reason}}
end.
-spec read_config_file(Dir :: string(),
FileName :: string(),
Verify :: verify_config_entry_function()) ->
{ok, Config :: list()} | {error, Reason :: term()}.
read_config_file(Dir, FileName, Verify)
when is_list(Dir) andalso is_list(FileName) andalso is_function(Verify) ->
(catch do_read_config_file(Dir, FileName, Verify)).
do_read_config_file(Dir, FileName, Verify) ->
case file:open(filename:join(Dir, FileName), [read]) of
{ok, Fd} ->
Result = read_loop(Fd, [], Verify, 1),
file:close(Fd),
Result;
{error, Reason} ->
{error, {Reason, FileName}}
end.
read_loop(Fd, Acc, Check, StartLine) ->
case read_term(Fd, StartLine) of
{ok, Term, EndLine} ->
case (catch Check(Term)) of
ok ->
read_loop(Fd, [Term | Acc], Check, EndLine);
{error, Reason} ->
{error, {failed_check, StartLine, EndLine, Reason}};
Error ->
{error, {failed_check, StartLine, EndLine, Error}}
end;
{error, EndLine, Error} ->
{error, {failed_reading, StartLine, EndLine, Error}};
eof ->
{ok, lists:reverse(Acc)}
end.
read_term(Fd, StartLine) ->
case io:request(Fd, {get_until, "", erl_scan, tokens, [StartLine]}) of
{ok, Tokens, EndLine} ->
case erl_parse:parse_term(Tokens) of
{ok, Term} ->
{ok, Term, EndLine};
{error, {Line, erl_parse, Error}} ->
{error, Line, {parse_error, Error}}
end;
{error, E, EndLine} ->
{error, EndLine, E};
{eof, _EndLine} ->
eof;
Other ->
Other
end.
agent_snmp_mk_secret(Alg, Passwd, EngineID) ->
snmp_usm:passwd2localized_key(Alg, Passwd, EngineID).
ensure_crypto_started() ->
i("making sure crypto server is started..."),
ensure_started(crypto).
ensure_started(App) ->
case (catch App:start()) of
ok ->
ok;
{error, {already_started, App}} ->
ok;
E ->
error({failed_starting, App, E})
end.
%% -------------------------------------------------------------------------
% d(F, A) ->
% i("DBG: " ++ F, A).
i(F) ->
i(F, []).
i(F, A) ->
io:format(F ++ "~n", A).
error(R) ->
throw({error, R}).