aboutsummaryrefslogtreecommitdiffstats
path: root/lib/snmp/test/snmp_manager_config_test.erl
diff options
context:
space:
mode:
authorErlang/OTP <[email protected]>2009-11-20 14:54:40 +0000
committerErlang/OTP <[email protected]>2009-11-20 14:54:40 +0000
commit84adefa331c4159d432d22840663c38f155cd4c1 (patch)
treebff9a9c66adda4df2106dfd0e5c053ab182a12bd /lib/snmp/test/snmp_manager_config_test.erl
downloadotp-84adefa331c4159d432d22840663c38f155cd4c1.tar.gz
otp-84adefa331c4159d432d22840663c38f155cd4c1.tar.bz2
otp-84adefa331c4159d432d22840663c38f155cd4c1.zip
The R13B03 release.OTP_R13B03
Diffstat (limited to 'lib/snmp/test/snmp_manager_config_test.erl')
-rw-r--r--lib/snmp/test/snmp_manager_config_test.erl2535
1 files changed, 2535 insertions, 0 deletions
diff --git a/lib/snmp/test/snmp_manager_config_test.erl b/lib/snmp/test/snmp_manager_config_test.erl
new file mode 100644
index 0000000000..51325996e6
--- /dev/null
+++ b/lib/snmp/test/snmp_manager_config_test.erl
@@ -0,0 +1,2535 @@
+%%
+%% %CopyrightBegin%
+%%
+%% Copyright Ericsson AB 2004-2009. All Rights Reserved.
+%%
+%% The contents of this file are subject to the Erlang Public License,
+%% Version 1.1, (the "License"); you may not use this file except in
+%% compliance with the License. You should have received a copy of the
+%% Erlang Public License along with this software. If not, it can be
+%% retrieved online at http://www.erlang.org/.
+%%
+%% Software distributed under the License is distributed on an "AS IS"
+%% basis, WITHOUT WARRANTY OF ANY KIND, either express or implied. See
+%% the License for the specific language governing rights and limitations
+%% under the License.
+%%
+%% %CopyrightEnd%
+%%
+
+%%----------------------------------------------------------------------
+%% Purpose:
+%%
+%% Test:
+%% ts:run().
+%% ts:run(snmp, [batch]).
+%% ts:run(snmp, snmp_manager_config_test, [batch]).
+%%
+%%----------------------------------------------------------------------
+-module(snmp_manager_config_test).
+
+%%----------------------------------------------------------------------
+%% Include files
+%%----------------------------------------------------------------------
+-include("test_server.hrl").
+-include("snmp_test_lib.hrl").
+-include_lib("snmp/src/manager/snmpm_usm.hrl").
+
+
+%%----------------------------------------------------------------------
+%% External exports
+%%----------------------------------------------------------------------
+%% -compile(export_all).
+
+-export([
+ all/1,
+ init_per_testcase/2, fin_per_testcase/2,
+
+ start_and_stop/1,
+
+ simple_start_and_stop/1,
+ start_without_mandatory_opts1/1,
+ start_without_mandatory_opts2/1,
+ start_with_all_valid_opts/1,
+ start_with_unknown_opts/1,
+ start_with_incorrect_opts/1,
+ start_with_invalid_manager_conf_file1/1,
+ start_with_invalid_users_conf_file1/1,
+ start_with_invalid_agents_conf_file1/1,
+ start_with_invalid_usm_conf_file1/1,
+
+ normal_op/1,
+
+ system/1,
+ simple_system_op/1,
+
+ users/1,
+ register_user_using_file/1,
+ register_user_using_function/1,
+ register_user_failed_using_function1/1,
+
+ agents/1,
+ register_agent_using_file/1,
+ register_agent_using_function/1,
+ register_agent_failed_using_function1/1,
+
+ usm_users/1,
+ register_usm_user_using_file/1,
+ register_usm_user_using_function/1,
+ register_usm_user_failed_using_function1/1,
+ update_usm_user_info/1,
+
+ counter/1,
+ create_and_increment/1,
+
+ stats_counter/1,
+ stats_create_and_increment/1,
+
+ tickets/1,
+ otp_7219/1
+
+ ]).
+
+%%----------------------------------------------------------------------
+%% Internal exports
+%%----------------------------------------------------------------------
+-export([
+ ]).
+
+
+%%----------------------------------------------------------------------
+%% Macros
+%%----------------------------------------------------------------------
+
+
+%%----------------------------------------------------------------------
+%% Records
+%%----------------------------------------------------------------------
+
+
+%%======================================================================
+%% External functions
+%%======================================================================
+
+init_per_testcase(Case, Config) when is_list(Config) ->
+ p("init_per_testcase -> Case: ~p", [Case]),
+ SnmpPrivDir = ?config(priv_dir, Config),
+ p("init_per_testcase -> SnmpPrivDir: ~p", [SnmpPrivDir]),
+ SuiteDir = atom_to_list(?MODULE),
+ SuiteTopDir = filename:join(SnmpPrivDir, SuiteDir),
+ case file:make_dir(SuiteTopDir) of
+ ok ->
+ ok;
+ {error, eexist} ->
+ ok;
+ {error, Reason} ->
+ ?FAIL({failed_creating, SuiteTopDir, Reason})
+ end,
+ p("init_per_testcase -> SuiteTopDir: ~p", [SuiteTopDir]),
+ CaseDir = atom_to_list(Case),
+ ?line ok =
+ file:make_dir(CaseTopDir = filename:join(SuiteTopDir, CaseDir)),
+ p("init_per_testcase -> CaseTopDir: ~p", [CaseTopDir]),
+ ?line ok =
+ file:make_dir(MgrTopDir = filename:join(CaseTopDir, "manager/")),
+ ?line ok =
+ file:make_dir(MgrConfDir = filename:join(MgrTopDir, "conf/")),
+ ?line ok =
+ file:make_dir(MgrDbDir = filename:join(MgrTopDir, "db/")),
+ ?line ok =
+ file:make_dir(MgrLogDir = filename:join(MgrTopDir, "log/")),
+ [{case_top_dir, CaseTopDir},
+ {manager_dir, MgrTopDir},
+ {manager_conf_dir, MgrConfDir},
+ {manager_db_dir, MgrDbDir},
+ {manager_log_dir, MgrLogDir} | Config].
+
+
+fin_per_testcase(Case, Config) when is_list(Config) ->
+ p("fin_per_testcase -> Case: ~p", [Case]),
+ %% The cleanup is removed due to some really discusting NFS behaviour...
+ %% CaseTopDir = ?config(manager_dir, Config),
+ %% ?line ok = ?DEL_DIR(CaseTopDir),
+ Config.
+
+
+%%======================================================================
+%% Test case definitions
+%%======================================================================
+% all(doc) ->
+% "The top snmp manager config test case";
+all(suite) ->
+ [
+ start_and_stop,
+ normal_op,
+ tickets
+ ].
+
+
+%%======================================================================
+%% Test functions
+%%======================================================================
+
+start_and_stop(doc) ->
+ "A collection of start and stop tests";
+start_and_stop(suite) ->
+ [
+ simple_start_and_stop,
+ start_without_mandatory_opts1,
+ start_without_mandatory_opts2,
+ start_with_all_valid_opts,
+ start_with_unknown_opts,
+ start_with_incorrect_opts,
+ start_with_invalid_manager_conf_file1,
+ start_with_invalid_users_conf_file1,
+ start_with_invalid_agents_conf_file1,
+ start_with_invalid_usm_conf_file1
+ ].
+
+
+%%
+%% ---
+%%
+
+simple_start_and_stop(suite) -> [];
+simple_start_and_stop(doc) ->
+ "Start the snmp manager config process with the \n"
+ "minimum setof options (config dir).";
+simple_start_and_stop(Conf) when is_list(Conf) ->
+ put(tname,ssas),
+ p("start"),
+ process_flag(trap_exit, true),
+ ConfDir = ?config(manager_conf_dir, Conf),
+ DbDir = ?config(manager_db_dir, Conf),
+
+ write_manager_conf(ConfDir),
+
+ Opts = [{versions, [v1]},
+ {config, [{verbosity, trace}, {dir, ConfDir}, {db_dir, DbDir}]}],
+
+ ?line {ok, _Pid} = snmpm_config:start_link(Opts),
+ ?line ok = snmpm_config:stop(),
+
+ ok.
+
+
+%%
+%% ---
+%%
+
+start_without_mandatory_opts1(suite) -> [];
+start_without_mandatory_opts1(doc) ->
+ "Start the snmp manager config process with some of the \n"
+ "mandatory options missing.";
+start_without_mandatory_opts1(Conf) when is_list(Conf) ->
+ put(tname,swomo1),
+ put(verbosity,trace),
+ p("start"),
+ process_flag(trap_exit, true),
+ ConfDir = ?config(manager_conf_dir, Conf),
+ DbDir = ?config(manager_db_dir, Conf),
+
+ write_manager_conf(ConfDir),
+
+
+ %% config, but no dir:
+ p("config option, but no dir"),
+ Opts = [{priority, normal},
+ {config, [{verbosity, trace}, {db_dir, DbDir}]}, {mibs, []}],
+ ?line {error, {missing_mandatory,dir}} = config_start(Opts),
+
+ p("done"),
+ ok.
+
+
+%%
+%% ---
+%%
+
+start_without_mandatory_opts2(suite) -> [];
+start_without_mandatory_opts2(doc) ->
+ "Start the snmp manager config process with some of the \n"
+ "mandatory options missing.";
+start_without_mandatory_opts2(Conf) when is_list(Conf) ->
+ put(tname,swomo2),
+ put(verbosity,trace),
+ p("start"),
+ process_flag(trap_exit, true),
+ ConfDir = ?config(manager_conf_dir, Conf),
+
+ write_manager_conf(ConfDir),
+
+
+ %% Second set of options (no config):
+ p("no config option"),
+ Opts = [{priority, normal},
+ {mibs, []}],
+ ?line {error, {missing_mandatory,config,[dir, db_dir]}} =
+ config_start(Opts),
+
+ p("done"),
+ ok.
+
+
+%%
+%% ---
+%%
+
+start_with_all_valid_opts(suite) -> [];
+start_with_all_valid_opts(doc) ->
+ "Start the snmp manager config process with the \n"
+ "complete set of all the valid options.";
+start_with_all_valid_opts(Conf) when is_list(Conf) ->
+ put(tname,swavo),
+ p("start"),
+ process_flag(trap_exit, true),
+ ConfDir = ?config(manager_conf_dir, Conf),
+ DbDir = ?config(manager_db_dir, Conf),
+ LogDir = ?config(manager_log_dir, Conf),
+ StdMibDir = filename:join(code:priv_dir(snmp), "mibs") ++ "/",
+
+ write_manager_conf(ConfDir),
+
+
+ %% Third set of options (no versions):
+ p("all options"),
+ NetIfOpts = [{module, snmpm_net_if},
+ {verbosity, trace},
+ {options, [{recbuf, 30000},
+ {bind_to, false},
+ {no_reuse, false}]}],
+ ServerOpts = [{timeout, 10000}, {verbosity, trace}],
+ NoteStoreOpts = [{timeout, 20000}, {verbosity, trace}],
+ ConfigOpts = [{dir, ConfDir}, {verbosity, trace}, {db_dir, DbDir}],
+ Mibs = [join(StdMibDir, "SNMP-NOTIFICATION-MIB"),
+ join(StdMibDir, "SNMP-USER-BASED-SM-MIB")],
+ Prio = normal,
+ ATL = [{type, read_write},
+ {dir, LogDir},
+ {size, {10,10240}},
+ {repair, true}],
+ Vsns = [v1,v2,v3],
+ Opts = [{config, ConfigOpts},
+ {net_if, NetIfOpts},
+ {server, ServerOpts},
+ {note_store, NoteStoreOpts},
+ {audit_trail_log, ATL},
+ {priority, Prio},
+ {mibs, Mibs},
+ {versions, Vsns}],
+ ?line {ok, _Pid} = config_start(Opts),
+ ?line ok = config_stop(),
+
+ p("done"),
+ ok.
+
+
+%%
+%% ---
+%%
+
+start_with_unknown_opts(suite) -> [];
+start_with_unknown_opts(doc) ->
+ "Start the snmp manager config process when some of\n"
+ "the options are unknown.";
+start_with_unknown_opts(Conf) when is_list(Conf) ->
+ put(tname,swuo),
+ p("start"),
+ process_flag(trap_exit, true),
+ ConfDir = ?config(manager_conf_dir, Conf),
+ DbDir = ?config(manager_db_dir, Conf),
+ LogDir = ?config(manager_log_dir, Conf),
+ StdMibDir = filename:join(code:priv_dir(snmp), "mibs") ++ "/",
+
+ write_manager_conf(ConfDir),
+
+
+ %% Third set of options (no versions):
+ p("all options"),
+ NetIfOpts = [{module, snmpm_net_if},
+ {verbosity, trace},
+ {options, [{recbuf, 30000},
+ {bind_to, false},
+ {no_reuse, false}]}],
+ ServerOpts = [{timeout, 10000}, {verbosity, trace}],
+ NoteStoreOpts = [{timeout, 20000}, {verbosity, trace}],
+ ConfigOpts = [{dir, ConfDir}, {verbosity, trace}, {db_dir, DbDir}],
+ Mibs = [join(StdMibDir, "SNMP-NOTIFICATION-MIB"),
+ join(StdMibDir, "SNMP-USER-BASED-SM-MIB")],
+ Prio = normal,
+ ATL = [{type, read_write},
+ {dir, LogDir},
+ {size, {10,10240}},
+ {repair, true}],
+ Vsns = [v1,v2,v3],
+ Opts = [{config, ConfigOpts},
+ {net_if, NetIfOpts},
+ {server, ServerOpts},
+ {note_store, NoteStoreOpts},
+ {audit_trail_log, ATL},
+ {unknown_option, "dummy value"},
+ {priority, Prio},
+ {mibs, Mibs},
+ {versions, Vsns}],
+ ?line {ok, _Pid} = config_start(Opts),
+
+ p("done"),
+ ok.
+
+
+%%
+%% ---
+%%
+
+start_with_incorrect_opts(suite) -> [];
+start_with_incorrect_opts(doc) ->
+ "Start the snmp manager config process when some of\n"
+ "the options has incorrect values.";
+start_with_incorrect_opts(Conf) when is_list(Conf) ->
+ put(tname,swio),
+ p("start"),
+ process_flag(trap_exit, true),
+ ConfDir = ?config(manager_conf_dir, Conf),
+ DbDir = ?config(manager_db_dir, Conf),
+ LogDir = ?config(manager_log_dir, Conf),
+ StdMibDir = filename:join(code:priv_dir(snmp), "mibs") ++ "/",
+
+ write_manager_conf(ConfDir),
+
+ ConfigOpts = [{verbosity,trace}, {dir, ConfDir}, {db_dir, DbDir}],
+
+ p("net-if - incorrect module"),
+ NetIfOpts1 = [{module, snmpm_user}], %% Behaviour check will fail
+ Opts01 = [{config, ConfigOpts}, {versions, [v1]},
+ {net_if, NetIfOpts1}],
+ ?line {error, Reason01} = config_start(Opts01),
+ p("net-if (module) res: ~p", [Reason01]),
+
+ p("net-if - incorrect verbosity"),
+ NetIfOpts2 = [{verbosity, invalid_verbosity}],
+ Opts02 = [{config, ConfigOpts}, {versions, [v1]},
+ {net_if, NetIfOpts2}],
+ ?line {error, Reason02} = config_start(Opts02),
+ p("net-if (verbosity) res: ~p", [Reason02]),
+
+ p("net-if - incorrect options"),
+ NetIfOpts3 = [{options, invalid_options}],
+ Opts03 = [{config, ConfigOpts}, {versions, [v1]},
+ {net_if, NetIfOpts3}],
+ ?line {error, Reason03} = config_start(Opts03),
+ p("net-if (options) res: ~p", [Reason03]),
+
+ p("server - incorrect timeout (1)"),
+ ServerOpts1 = [{timeout, invalid_timeout}],
+ Opts08 = [{config, ConfigOpts}, {versions, [v1]},
+ {server, ServerOpts1}],
+ ?line {error, Reason08} = config_start(Opts08),
+ p("server (timeout) res: ~p", [Reason08]),
+
+ p("server - incorrect timeout (2)"),
+ ServerOpts2 = [{timeout, 0}],
+ Opts09 = [{config, ConfigOpts}, {versions, [v1]},
+ {server, ServerOpts2}],
+ ?line {error, Reason09} = config_start(Opts09),
+ p("server (timeout) res: ~p", [Reason09]),
+
+ p("server - incorrect timeout (3)"),
+ ServerOpts3 = [{timeout, -1000}],
+ Opts10 = [{config, ConfigOpts},
+ {versions, [v1]},
+ {server, ServerOpts3}],
+ ?line {error, Reason10} = config_start(Opts10),
+ p("server (timeout) res: ~p", [Reason10]),
+
+ p("server - incorrect verbosity"),
+ ServerOpts4 = [{verbosity, invalid_verbosity}],
+ Opts11 = [{config, ConfigOpts},
+ {versions, [v1]},
+ {server, ServerOpts4}],
+ ?line {error, Reason11} = config_start(Opts11),
+ p("server (verbosity) res: ~p", [Reason11]),
+
+ p("note-store - incorrect timeout (1)"),
+ NoteStoreOpts1 = [{timeout, invalid_timeout}],
+ Opts12 = [{config, ConfigOpts},
+ {versions, [v1]},
+ {note_store, NoteStoreOpts1}],
+ ?line {error, Reason12} = config_start(Opts12),
+ p("note-store (timeout) res: ~p", [Reason12]),
+
+ p("note-store - incorrect timeout (2)"),
+ NoteStoreOpts2 = [{timeout, 0}],
+ Opts13 = [{config, ConfigOpts},
+ {versions, [v1]},
+ {note_store, NoteStoreOpts2}],
+ ?line {error, Reason13} = config_start(Opts13),
+ p("note-store (timeout) res: ~p", [Reason13]),
+
+ p("note-store - incorrect timeout (3)"),
+ NoteStoreOpts3 = [{timeout, -2000}],
+ Opts14 = [{config, ConfigOpts},
+ {versions, [v1]},
+ {note_store, NoteStoreOpts3}],
+ ?line {error, Reason14} = config_start(Opts14),
+ p("note-store (timeout) res: ~p", [Reason14]),
+
+ p("note-store - incorrect verbosity"),
+ NoteStoreOpts4 = [{timeout, 20000}, {verbosity, invalid_verbosity}],
+ Opts15 = [{config, ConfigOpts},
+ {versions, [v1]},
+ {note_store, NoteStoreOpts4}],
+ ?line {error, Reason15} = config_start(Opts15),
+ p("note-store (verbosity) res: ~p", [Reason15]),
+
+ p("config - incorrect dir (1)"),
+ ConfigOpts1 = [{dir, invalid_dir}],
+ Opts16 = [{config, ConfigOpts1},
+ {versions, [v1]}],
+ ?line {error, Reason16} = config_start(Opts16),
+ p("config (dir) res: ~p", [Reason16]),
+
+ p("config - incorrect dir (2)"),
+ ConfigOpts2 = [{dir, "/invalid/dir"}],
+ Opts17 = [{config, ConfigOpts2},
+ {versions, [v1]}],
+ ?line {error, Reason17} = config_start(Opts17),
+ p("config (dir) res: ~p", [Reason17]),
+
+ p("config - incorrect verbosity"),
+ ConfigOpts3 = [{dir, ConfDir}, {verbosity, invalid_verbosity}],
+ Opts18 = [{config, ConfigOpts3},
+ {versions, [v1]}],
+ ?line {error, Reason18} = config_start(Opts18),
+ p("config (verbosity) res: ~p", [Reason18]),
+
+ p("mibs - incorrect mibs (1)"),
+ Mibs1 = invalid_mibs,
+ Opts19 = [{config, ConfigOpts},
+ {versions, [v1]},
+ {mibs, Mibs1}],
+ ?line {error, Reason19} = config_start(Opts19),
+ p("mibs (mibs) res: ~p", [Reason19]),
+
+ p("mibs - incorrect mibs (2)"),
+ Mibs2 = [join(StdMibDir, "INVALID-MIB")],
+ Opts20 = [{config, ConfigOpts},
+ {versions, [v1]},
+ {mibs, Mibs2}],
+ ?line {error, Reason20} = config_start(Opts20),
+ p("mibs (mibs) res: ~p", [Reason20]),
+
+ p("prio - incorrect prio"),
+ Prio1 = invalid_prio,
+ Opts21 = [{config, ConfigOpts},
+ {versions, [v1]},
+ {priority, Prio1}],
+ ?line {error, Reason21} = config_start(Opts21),
+ p("prio (prio) res: ~p", [Reason21]),
+
+ p("atl - incorrect type"),
+ ATL1 = [{type, invalid_type},
+ {dir, LogDir},
+ {size, {10,10240}},
+ {repair, true}],
+ Opts22 = [{config, ConfigOpts},
+ {versions, [v1]},
+ {audit_trail_log, ATL1}],
+ ?line {error, Reason22} = config_start(Opts22),
+ p("atl (type) res: ~p", [Reason22]),
+
+ p("atl - incorrect dir (1)"),
+ ATL2 = [{type, read_write},
+ {dir, invalid_dir},
+ {size, {10,10240}},
+ {repair, true}],
+ Opts23 = [{config, ConfigOpts},
+ {versions, [v1]},
+ {audit_trail_log, ATL2}],
+ ?line {error, Reason23} = config_start(Opts23),
+ p("atl (dir) res: ~p", [Reason23]),
+
+ p("atl - incorrect dir (2)"),
+ ATL3 = [{type, read_write},
+ {dir, "/invalid/dir"},
+ {size, {10,10240}},
+ {repair, true}],
+ Opts24 = [{config, ConfigOpts},
+ {versions, [v1]},
+ {audit_trail_log, ATL3}],
+ ?line {error, Reason24} = config_start(Opts24),
+ p("atl (dir) res: ~p", [Reason24]),
+
+ p("atl - incorrect size (1)"),
+ ATL4 = [{type, read_write},
+ {dir, LogDir},
+ {size, invalid_size},
+ {repair, true}],
+ Opts25 = [{config, ConfigOpts},
+ {versions, [v1]},
+ {audit_trail_log, ATL4}],
+ ?line {error, Reason25} = config_start(Opts25),
+ p("atl (size) res: ~p", [Reason25]),
+
+ p("atl - incorrect size (2)"),
+ ATL5 = [{type, read_write},
+ {dir, LogDir},
+ {size, {10,invalid_file_size}},
+ {repair, true}],
+ Opts26 = [{config, ConfigOpts},
+ {versions, [v1]},
+ {audit_trail_log, ATL5}],
+ ?line {error, Reason26} = config_start(Opts26),
+ p("atl (size) res: ~p", [Reason26]),
+
+ p("atl - incorrect size (3)"),
+ ATL6 = [{type, read_write},
+ {dir, LogDir},
+ {size, {invalid_file_num,10240}},
+ {repair, true}],
+ Opts27 = [{config, ConfigOpts},
+ {versions, [v1]},
+ {audit_trail_log, ATL6}],
+ ?line {error, Reason27} = config_start(Opts27),
+ p("atl (size) res: ~p", [Reason27]),
+
+ p("atl - incorrect repair"),
+ ATL7 = [{type, read_write},
+ {dir, LogDir},
+ {size, {10,10240}},
+ {repair, invalid_repair}],
+ Opts28 = [{config, ConfigOpts},
+ {versions, [v1]},
+ {audit_trail_log, ATL7}],
+ ?line {error, Reason28} = config_start(Opts28),
+ p("atl (repair) res: ~p", [Reason28]),
+
+ p("version - incorrect versions (1)"),
+ Vsns1 = invalid_vsns,
+ Opts29 = [{config, ConfigOpts},
+ {versions, Vsns1}],
+ ?line {error, Reason29} = config_start(Opts29),
+ p("versions (versions) res: ~p", [Reason29]),
+
+ p("version - incorrect versions (2)"),
+ Vsns2 = [v1,v2,v3,v9],
+ Opts30 = [{config, ConfigOpts},
+ {versions, Vsns2}],
+ ?line {error, Reason30} = config_start(Opts30),
+ p("versions (versions) res: ~p", [Reason30]),
+
+ p("done"),
+ ok.
+
+
+%%
+%% ---
+%%
+
+start_with_invalid_manager_conf_file1(suite) -> [];
+start_with_invalid_manager_conf_file1(doc) ->
+ "Start with invalid manager config file (1).";
+start_with_invalid_manager_conf_file1(Conf) when is_list(Conf) ->
+ put(tname,swimcf),
+ p("start"),
+ process_flag(trap_exit, true),
+ ConfDir = ?config(manager_conf_dir, Conf),
+ DbDir = ?config(manager_db_dir, Conf),
+
+ Opts = [{versions, [v1]},
+ {config, [{verbosity, trace}, {dir, ConfDir}, {db_dir, DbDir}]}],
+
+ %% --
+ p("write manager config file with invalid IP address (1)"),
+ write_manager_conf(ConfDir,
+ "arne-anka", "4001", "500", "\"bmkEngine\""),
+ ?line {error, Reason11} = config_start(Opts),
+ p("start failed (as expected): ~p", [Reason11]),
+ ?line {failed_reading, _, _, 1, {parse_error, _}} = Reason11,
+ await_config_not_running(),
+
+ %% --
+ p("write manager config file with invalid IP address (2)"),
+ write_manager_conf(ConfDir,
+ "arne_anka", "4001", "500", "\"bmkEngine\""),
+ ?line {error, Reason12} = config_start(Opts),
+ p("start failed (as expected): ~p", [Reason12]),
+ ?line {failed_check, _, _, 2, {invalid_ip_address, _}} = Reason12,
+ await_config_not_running(),
+
+ %% --
+ p("write manager config file with invalid IP address (3)"),
+ write_manager_conf(ConfDir,
+ "9999", "4001", "500", "\"bmkEngine\""),
+ ?line {error, Reason13} = config_start(Opts),
+ p("start failed (as expected): ~p", [Reason13]),
+ ?line {failed_check, _, _, 2, {invalid_ip_address, _}} = Reason13,
+ await_config_not_running(),
+
+ %% --
+ p("write manager config file with invalid port (2)"),
+ write_manager_conf(ConfDir,
+ "[134,138,177,189]", "kalle-anka", "500", "\"bmkEngine\""),
+ ?line {error, Reason21} = config_start(Opts),
+ p("start failed (as expected): ~p", [Reason21]),
+ ?line {failed_reading, _, _, 2, {parse_error, _}} = Reason21,
+ await_config_not_running(),
+
+ %% --
+ p("write manager config file with invalid port (1)"),
+ write_manager_conf(ConfDir,
+ "[134,138,177,189]", "-1", "500", "\"bmkEngine\""),
+ ?line {error, Reason22} = config_start(Opts),
+ p("start failed (as expected): ~p", [Reason22]),
+ ?line {failed_check, _, _, 3, {invalid_integer, _}} = Reason22,
+ await_config_not_running(),
+
+ %% --
+ p("write manager config file with invalid port (3)"),
+ write_manager_conf(ConfDir,
+ "[134,138,177,189]", "\"kalle-anka\"", "500", "\"bmkEngine\""),
+ ?line {error, Reason23} = config_start(Opts),
+ p("start failed (as expected): ~p", [Reason23]),
+ ?line {failed_check, _, _, 3, {invalid_integer, _}} = Reason23,
+ await_config_not_running(),
+
+ %% --
+ p("write manager config file with invalid EngineID (1)"),
+ write_manager_conf(ConfDir,
+ "[134,138,177,189]", "4001", "500", "bmkEngine"),
+ ?line {error, Reason31} = config_start(Opts),
+ p("start failed (as expected): ~p", [Reason31]),
+ ?line {failed_check, _, _, 5, {invalid_string, _}} = Reason31,
+ await_config_not_running(),
+
+ %% --
+ p("write manager config file with invalid EngineID (2)"),
+ write_manager_conf(ConfDir,
+ "[134,138,177,189]", "4001", "500", "{1,2,3}"),
+ ?line {error, Reason32} = config_start(Opts),
+ p("start failed (as expected): ~p", [Reason32]),
+ ?line {failed_check, _, _, 5, {invalid_string, _}} = Reason32,
+ await_config_not_running(),
+
+ %% --
+ p("write manager config file with invalid EngineID (3)"),
+ write_manager_conf(ConfDir,
+ "[134,138,177,189]", "4001", "500", "10101"),
+ ?line {error, Reason33} = config_start(Opts),
+ p("start failed (as expected): ~p", [Reason33]),
+ ?line {failed_check, _, _, 5, {invalid_string, _}} = Reason33,
+ await_config_not_running(),
+
+ %% --
+ p("write manager config file with invalid MMS (1)"),
+ write_manager_conf(ConfDir,
+ "[134,138,177,189]", "4001", "483", "\"bmkEngine\""),
+ ?line {error, Reason41} = config_start(Opts),
+ p("start failed (as expected): ~p", [Reason41]),
+ ?line {failed_check, _, _, 4, {invalid_integer, _}} = Reason41,
+ await_config_not_running(),
+
+ %% --
+ p("write manager config file with invalid MMS (2)"),
+ write_manager_conf(ConfDir,
+ "[134,138,177,189]", "4001", "-1", "\"bmkEngine\""),
+ ?line {error, Reason42} = config_start(Opts),
+ p("start failed (as expected): ~p", [Reason42]),
+ ?line {failed_check, _, _, 4, {invalid_integer, _}} = Reason42,
+ await_config_not_running(),
+
+ %% --
+ p("write manager config file with invalid MMS (3)"),
+ write_manager_conf(ConfDir,
+ "[134,138,177,189]", "4001", "\"kalle-anka\"", "\"bmkEngine\""),
+ ?line {error, Reason43} = config_start(Opts),
+ p("start failed (as expected): ~p", [Reason43]),
+ ?line {failed_check, _, _, 4, {invalid_integer, _}} = Reason43,
+ await_config_not_running(),
+
+ %% --
+ p("write manager config file with invalid MMS (4)"),
+ write_manager_conf(ConfDir,
+ "[134,138,177,189]", "4001", "kalle_anka", "\"bmkEngine\""),
+ ?line {error, Reason44} = config_start(Opts),
+ p("start failed (as expected): ~p", [Reason44]),
+ ?line {failed_check, _, _, 4, {invalid_integer, _}} = Reason44,
+ await_config_not_running(),
+
+ %% --
+ p("write manager config file with unknown option"),
+ write_manager_conf(ConfDir,
+ "{kalle, anka}."),
+ ?line {error, Reason51} = config_start(Opts),
+ p("start failed (as expected): ~p", [Reason51]),
+ ?line {failed_check, _, _, 1, {unknown_config, _}} = Reason51,
+ await_config_not_running(),
+
+ %% --
+ p("write manager config file with unknown option"),
+ write_manager_conf(ConfDir,
+ "kalle_anka."),
+ ?line {error, Reason52} = config_start(Opts),
+ p("start failed (as expected): ~p", [Reason52]),
+ ?line {failed_check, _, _, 1, {unknown_config, _}} = Reason52,
+ await_config_not_running(),
+
+ p("done"),
+ ok.
+
+
+%%
+%% ---
+%%
+
+start_with_invalid_users_conf_file1(suite) -> [];
+start_with_invalid_users_conf_file1(doc) ->
+ "Start with invalid users config file.";
+start_with_invalid_users_conf_file1(Conf) when is_list(Conf) ->
+ put(tname,swiucf),
+ p("start"),
+ process_flag(trap_exit, true),
+ ConfDir = ?config(manager_conf_dir, Conf),
+ DbDir = ?config(manager_db_dir, Conf),
+
+ Opts = [{versions, [v1]},
+ {config, [{verbosity, trace}, {dir, ConfDir}, {db_dir, DbDir}]}],
+
+ write_manager_conf(ConfDir),
+
+ %% --
+ p("write users config file with invalid module (1)"),
+ write_users_conf(ConfDir, [{"kalle", "kalle", "dummy"}]),
+ ?line {error, Reason11} = config_start(Opts),
+ p("start failed (as expected): ~p", [Reason11]),
+ ?line {failed_check, _, _, _, {bad_module, kalle}} = Reason11,
+ await_config_not_running(),
+
+ %% --
+ p("write users config file with invalid module (1)"),
+ write_users_conf(ConfDir, [{"kalle", "snmpm", "dummy"}]),
+ ?line {error, Reason12} = config_start(Opts),
+ p("start failed (as expected): ~p", [Reason12]),
+ ?line {failed_check, _, _, _, {bad_module, _}} = Reason12,
+ await_config_not_running(),
+
+ %% --
+ p("write users config file with invalid module (2)"),
+ write_users_conf(ConfDir, [{"kalle1", "10101", "dummy"}]),
+ ?line {error, Reason13} = config_start(Opts),
+ p("start failed (as expected): ~p", [Reason13]),
+ ?line {failed_check, _, _, _, {bad_module, _}} = Reason13,
+ await_config_not_running(),
+
+ %% --
+ p("write users config file with invalid user tuple (1)"),
+ write_users_conf2(ConfDir, "{kalle, snmpm_user_default}."),
+ ?line {error, Reason21} = config_start(Opts),
+ p("start failed (as expected): ~p", [Reason21]),
+ ?line {failed_check, _, _, _, {bad_user_config, _}} = Reason21,
+ await_config_not_running(),
+
+ %% --
+ p("write users config file with invalid user tuple (2)"),
+ write_users_conf2(ConfDir, "{kalle, snmpm_user_default, kalle, [], olle}."),
+ ?line {error, Reason22} = config_start(Opts),
+ p("start failed (as expected): ~p", [Reason22]),
+ ?line {failed_check, _, _, _, {bad_user_config, _}} = Reason22,
+ await_config_not_running(),
+
+ %% --
+ p("write users config file with invalid user tuple (3)"),
+ write_users_conf2(ConfDir, "snmpm_user_default."),
+ ?line {error, Reason23} = config_start(Opts),
+ p("start failed (as expected): ~p", [Reason23]),
+ ?line {failed_check, _, _, _, {bad_user_config, _}} = Reason23,
+ await_config_not_running(),
+
+ %% --
+ p("write users config file with invalid user tuple (4)"),
+ write_users_conf2(ConfDir, "[kalle, snmpm_user_default, kalle]."),
+ ?line {error, Reason24} = config_start(Opts),
+ p("start failed (as expected): ~p", [Reason24]),
+ ?line {failed_check, _, _, _, {bad_user_config, _}} = Reason24,
+ await_config_not_running(),
+
+ %% --
+ p("write users config file with invalid user agent default config (1)"),
+ write_users_conf2(ConfDir, "{kalle, snmpm_user_default, kalle, olle}."),
+ ?line {error, Reason31} = config_start(Opts),
+ p("start failed (as expected): ~p", [Reason31]),
+ ?line {failed_check, _, _, _, {bad_default_agent_config, _}} = Reason31,
+ await_config_not_running(),
+
+ %% --
+ p("write users config file with invalid user agent default config (2)"),
+ write_users_conf2(ConfDir, "{kalle, snmpm_user_default, kalle, [olle]}."),
+ ?line {error, Reason32} = config_start(Opts),
+ p("start failed (as expected): ~p", [Reason32]),
+ %% ?line {failed_check, _, _, _, {bad_default_agent_config, _}} = Reason32,
+ case Reason32 of
+ {failed_check, _, _, _, {bad_default_agent_config, _}} ->
+ ok;
+ {A, B, C, D} ->
+ exit({bad_error, A, B, C, D})
+ end,
+ await_config_not_running(),
+
+ p("done"),
+ ok.
+
+
+%%
+%% ---
+%%
+
+start_with_invalid_agents_conf_file1(suite) -> [];
+start_with_invalid_agents_conf_file1(doc) ->
+ "Start with invalid agents config file.";
+start_with_invalid_agents_conf_file1(Conf) when is_list(Conf) ->
+ put(tname, swiacf),
+ p("start"),
+ process_flag(trap_exit, true),
+ ConfDir = ?config(manager_conf_dir, Conf),
+ DbDir = ?config(manager_db_dir, Conf),
+
+ Opts = [{versions, [v1]},
+ {config, [{verbosity, trace}, {dir, ConfDir}, {db_dir, DbDir}]}],
+
+ write_manager_conf(ConfDir),
+
+ write_users_conf(ConfDir, [{"swiacf", "snmpm_user_default", "dummy"}]),
+
+ Agent0 = {"swiacf", "\"targ-hobbes\"", "\"comm1\"",
+ "[192,168,0,100]", "162", "\"bmkEngine\"", "1500", "484", "v1",
+ "any", "\"initial\"", "noAuthNoPriv"},
+
+ %% --
+ p("[test 11] write agents config file with invalid user (1)"),
+ Agent11 = setelement(1, Agent0, "kalle-anka"),
+ write_agents_conf(ConfDir, [Agent11]),
+ case config_start(Opts) of
+ {error, Reason11} ->
+ p("start failed (as expected): ~p", [Reason11]),
+ ?line {failed_reading, _, _, _, {parse_error, _}} = Reason11,
+ await_config_not_running();
+ OK_11 ->
+ exit({error, {unexpected_success, "11", OK_11}})
+ end,
+
+ %% --
+ p("[test 21] write agents config file with invalid target name (1)"),
+ Agent21 = setelement(2, Agent0, "targ-hobbes"),
+ write_agents_conf(ConfDir, [Agent21]),
+ case config_start(Opts) of
+ {error, Reason21} ->
+ p("start failed (as expected): ~p", [Reason21]),
+ ?line {failed_reading, _, _, _, {parse_error, _}} = Reason21,
+ await_config_not_running();
+ OK_21 ->
+ exit({error, {unexpected_success, "21", OK_21}})
+ end,
+
+ %% --
+ p("[test 22] write agents config file with invalid target name (2)"),
+ Agent22 = setelement(2, Agent0, "targ_hobbes"),
+ write_agents_conf(ConfDir, [Agent22]),
+ case config_start(Opts) of
+ {error, Reason22} ->
+ p("start failed (as expected): ~p", [Reason22]),
+ ?line {failed_check, _, _, _, {invalid_string, _}} = Reason22,
+ await_config_not_running();
+ OK_22 ->
+ exit({error, {unexpected_success, "22", OK_22}})
+ end,
+
+ %% --
+ p("[test 23] write agents config file with invalid target name (3)"),
+ Agent23 = setelement(2, Agent0, "10101"),
+ write_agents_conf(ConfDir, [Agent23]),
+ case config_start(Opts) of
+ {error, Reason23} ->
+ p("start failed (as expected): ~p", [Reason23]),
+ ?line {failed_check, _, _, _, {invalid_string, _}} = Reason23,
+ await_config_not_running();
+ OK_23 ->
+ exit({error, {unexpected_success, "23", OK_23}})
+ end,
+
+ %% --
+ p("[test 31] write agents config file with invalid community (1)"),
+ Agent31 = setelement(3, Agent0, "targ-hobbes"),
+ write_agents_conf(ConfDir, [Agent31]),
+ case config_start(Opts) of
+ {error, Reason31} ->
+ p("start failed (as expected): ~p", [Reason31]),
+ ?line {failed_reading, _, _, _, {parse_error, _}} = Reason31,
+ await_config_not_running();
+ OK_31 ->
+ exit({error, {unexpected_success, "31", OK_31}})
+ end,
+
+ %% --
+ p("[test 32] write agents config file with invalid community (2)"),
+ Agent32 = setelement(3, Agent0, "targ_hobbes"),
+ write_agents_conf(ConfDir, [Agent32]),
+ case config_start(Opts) of
+ {error, Reason32} ->
+ p("start failed (as expected): ~p", [Reason32]),
+ ?line {failed_check, _, _, _, {invalid_string, _}} = Reason32,
+ await_config_not_running();
+ OK_32 ->
+ exit({error, {unexpected_success, "32", OK_32}})
+ end,
+
+ %% --
+ p("[test 33] write agents config file with invalid community (3)"),
+ Agent33 = setelement(3, Agent0, "10101"),
+ write_agents_conf(ConfDir, [Agent33]),
+ case config_start(Opts) of
+ {error, Reason33} ->
+ p("start failed (as expected): ~p", [Reason33]),
+ ?line {failed_check, _, _, _, {invalid_string, _}} = Reason33,
+ await_config_not_running();
+ OK_33 ->
+ exit({error, {unexpected_success, "33", OK_33}})
+ end,
+
+ %% --
+ p("[test 51] write agents config file with invalid ip (1)"),
+ Agent51 = setelement(4, Agent0, "kalle_anka"),
+ write_agents_conf(ConfDir, [Agent51]),
+ case config_start(Opts) of
+ {error, Reason51} ->
+ p("start failed (as expected): ~p", [Reason51]),
+ ?line {failed_check, _, _, _, {bad_address, _}} = Reason51,
+ await_config_not_running();
+ OK_51 ->
+ exit({error, {unexpected_success, "51", OK_51}})
+ end,
+
+ %% --
+ p("[test 52] write agents config file with invalid ip (2)"),
+ Agent52 = setelement(4, Agent0, "10101"),
+ write_agents_conf(ConfDir, [Agent52]),
+ case config_start(Opts) of
+ {error, Reason52} ->
+ p("start failed (as expected): ~p", [Reason52]),
+ ?line {failed_check, _, _, _, {bad_address, _}} = Reason52,
+ await_config_not_running();
+ OK_52 ->
+ exit({error, {unexpected_success, "52", OK_52}})
+ end,
+
+ %% --
+ p("[test 53] write agents config file with invalid ip (3)"),
+ Agent53 = setelement(4, Agent0, "[192,168,0]"),
+ write_agents_conf(ConfDir, [Agent53]),
+ case config_start(Opts) of
+ {error, Reason53} ->
+ p("start failed (as expected): ~p", [Reason53]),
+ ?line {failed_check, _, _, _, {invalid_ip_address, _}} = Reason53,
+ await_config_not_running();
+ OK_53 ->
+ exit({error, {unexpected_success, "53", OK_53}})
+ end,
+
+ %% --
+ p("[test 54] write agents config file with invalid ip (4)"),
+ Agent54 = setelement(4, Agent0, "[192,168,0,100,99]"),
+ write_agents_conf(ConfDir, [Agent54]),
+ case config_start(Opts) of
+ {error, Reason54} ->
+ p("start failed (as expected): ~p", [Reason54]),
+ ?line {failed_check, _, _, _, {invalid_ip_address, _}} = Reason54,
+ await_config_not_running();
+ OK_54 ->
+ exit({error, {unexpected_success, "54", OK_54}})
+ end,
+
+ %% --
+ p("[test 55] write agents config file with invalid ip (5)"),
+ Agent55 = setelement(4, Agent0, "[192,168,0,arne]"),
+ write_agents_conf(ConfDir, [Agent55]),
+ ?line {error, Reason55} = config_start(Opts),
+ p("start failed (as expected): ~p", [Reason55]),
+ ?line {failed_check, _, _, _, {invalid_ip_address, _}} = Reason55,
+ await_config_not_running(),
+
+ %% --
+ p("[test 61] write agents config file with invalid port (1)"),
+ Agent61 = setelement(5, Agent0, "kalle_anka"),
+ write_agents_conf(ConfDir, [Agent61]),
+ ?line {error, Reason61} = config_start(Opts),
+ p("start failed (as expected): ~p", [Reason61]),
+ ?line {failed_check, _, _, _, {invalid_integer, _}} = Reason61,
+ await_config_not_running(),
+
+ %% --
+ p("[test 62] write agents config file with invalid port (2)"),
+ Agent62 = setelement(5, Agent0, "-1"),
+ write_agents_conf(ConfDir, [Agent62]),
+ ?line {error, Reason62} = config_start(Opts),
+ p("start failed (as expected): ~p", [Reason62]),
+ ?line {failed_check, _, _, _, {invalid_integer, _}} = Reason62,
+ await_config_not_running(),
+
+ %% --
+ p("[test 63] write agents config file with invalid port (3)"),
+ Agent63 = setelement(5, Agent0, "\"100\""),
+ write_agents_conf(ConfDir, [Agent63]),
+ ?line {error, Reason63} = config_start(Opts),
+ p("start failed (as expected): ~p", [Reason63]),
+ ?line {failed_check, _, _, _, {invalid_integer, _}} = Reason63,
+ await_config_not_running(),
+
+ %% --
+ p("[test 71] write agents config file with invalid engine-id (1)"),
+ Agent71 = setelement(6, Agent0, "kalle_anka"),
+ write_agents_conf(ConfDir, [Agent71]),
+ ?line {error, Reason71} = config_start(Opts),
+ p("start failed (as expected): ~p", [Reason71]),
+ ?line {failed_check, _, _, _, {invalid_string, _}} = Reason71,
+ await_config_not_running(),
+
+ %% --
+ p("[test 72] write agents config file with invalid engine-id (2)"),
+ Agent72 = setelement(6, Agent0, "10101"),
+ write_agents_conf(ConfDir, [Agent72]),
+ ?line {error, Reason72} = config_start(Opts),
+ p("start failed (as expected): ~p", [Reason72]),
+ ?line {failed_check, _, _, _, {invalid_string, _}} = Reason72,
+ await_config_not_running(),
+
+ %% --
+ p("[test 81] write agents config file with invalid timeout (1)"),
+ Agent81 = setelement(7, Agent0, "kalle_anka"),
+ write_agents_conf(ConfDir, [Agent81]),
+ ?line {error, Reason81} = config_start(Opts),
+ p("start failed (as expected): ~p", [Reason81]),
+ ?line {failed_check, _, _, _, {invalid_timer, _}} = Reason81,
+ await_config_not_running(),
+
+ %% --
+ p("[test 82] write agents config file with invalid timeout (2)"),
+ Agent82 = setelement(7, Agent0, "-1"),
+ write_agents_conf(ConfDir, [Agent82]),
+ ?line {error, Reason82} = config_start(Opts),
+ p("start failed (as expected): ~p", [Reason82]),
+ ?line {failed_check, _, _, _, {invalid_timer, _}} = Reason82,
+ await_config_not_running(),
+
+ %% --
+ p("[test 83] write agents config file with invalid timeout (3)"),
+ Agent83 = setelement(7, Agent0, "{1000, 1, 10, kalle}"),
+ write_agents_conf(ConfDir, [Agent83]),
+ ?line {error, Reason83} = config_start(Opts),
+ p("start failed (as expected): ~p", [Reason83]),
+ ?line {failed_check, _, _, _, {invalid_timer, _}} = Reason83,
+ await_config_not_running(),
+
+ %% --
+ p("[test 84] write agents config file with invalid timeout (4)"),
+ Agent84 = setelement(7, Agent0, "{1000, -1, 10, 10}"),
+ write_agents_conf(ConfDir, [Agent84]),
+ ?line {error, Reason84} = config_start(Opts),
+ p("start failed (as expected): ~p", [Reason84]),
+ ?line {failed_check, _, _, _, {invalid_timer, _}} = Reason84,
+ await_config_not_running(),
+
+ %% --
+ p("[test 85] write agents config file with invalid timeout (5)"),
+ Agent85 = setelement(7, Agent0, "{1000, 1, -100, 10}"),
+ write_agents_conf(ConfDir, [Agent85]),
+ ?line {error, Reason85} = config_start(Opts),
+ p("start failed (as expected): ~p", [Reason85]),
+ ?line {failed_check, _, _, _, {invalid_timer, _}} = Reason85,
+ await_config_not_running(),
+
+ %% --
+ p("[test 86] write agents config file with invalid timeout (6)"),
+ Agent86 = setelement(7, Agent0, "{1000, 1, 100, -1}"),
+ write_agents_conf(ConfDir, [Agent86]),
+ ?line {error, Reason86} = config_start(Opts),
+ p("start failed (as expected): ~p", [Reason86]),
+ ?line {failed_check, _, _, _, {invalid_timer, _}} = Reason86,
+ await_config_not_running(),
+
+ %% --
+ p("[test 91] write agents config file with invalid max-message-size (1)"),
+ Agent91 = setelement(8, Agent0, "483"),
+ write_agents_conf(ConfDir, [Agent91]),
+ ?line {error, Reason91} = config_start(Opts),
+ p("start failed (as expected): ~p", [Reason91]),
+ ?line {failed_check, _, _, _, {invalid_packet_size, _}} = Reason91,
+ await_config_not_running(),
+
+ %% --
+ p("[test 92] write agents config file with invalid max-message-size (2)"),
+ Agent92 = setelement(8, Agent0, "kalle_anka"),
+ write_agents_conf(ConfDir, [Agent92]),
+ ?line {error, Reason92} = config_start(Opts),
+ p("start failed (as expected): ~p", [Reason92]),
+ ?line {failed_check, _, _, _, {invalid_packet_size, _}} = Reason92,
+ await_config_not_running(),
+
+ %% --
+ p("[test A1] write agents config file with invalid version (1)"),
+ AgentA1 = setelement(9, Agent0, "1"),
+ write_agents_conf(ConfDir, [AgentA1]),
+ ?line {error, ReasonA1} = config_start(Opts),
+ p("start failed (as expected): ~p", [ReasonA1]),
+ ?line {failed_check, _, _, _, {bad_version, _}} = ReasonA1,
+ await_config_not_running(),
+
+ %% --
+ p("[test A2] write agents config file with invalid version (2)"),
+ AgentA2 = setelement(9, Agent0, "v30"),
+ write_agents_conf(ConfDir, [AgentA2]),
+ ?line {error, ReasonA2} = config_start(Opts),
+ p("start failed (as expected): ~p", [ReasonA2]),
+ ?line {failed_check, _, _, _, {bad_version, _}} = ReasonA2,
+ await_config_not_running(),
+
+ %% --
+ p("[test B1] write agents config file with invalid sec-model (1)"),
+ AgentB1 = setelement(10, Agent0, "\"any\""),
+ write_agents_conf(ConfDir, [AgentB1]),
+ ?line {error, ReasonB1} = config_start(Opts),
+ p("start failed (as expected): ~p", [ReasonB1]),
+ ?line {failed_check, _, _, _, {invalid_sec_model, _}} = ReasonB1,
+ await_config_not_running(),
+
+ %% --
+ p("[test B2] write agents config file with invalid sec-model (2)"),
+ AgentB2 = setelement(10, Agent0, "v3"),
+ write_agents_conf(ConfDir, [AgentB2]),
+ ?line {error, ReasonB2} = config_start(Opts),
+ p("start failed (as expected): ~p", [ReasonB2]),
+ ?line {failed_check, _, _, _, {invalid_sec_model, _}} = ReasonB2,
+ await_config_not_running(),
+
+ %% --
+ p("[test C1] write agents config file with invalid sec-name (1)"),
+ AgentC1 = setelement(11, Agent0, "initial"),
+ write_agents_conf(ConfDir, [AgentC1]),
+ case config_start(Opts) of
+ {error, ReasonC1} ->
+ p("start failed (as expected): ~p", [ReasonC1]),
+ ?line {failed_check, _, _, _, {bad_sec_name, _}} = ReasonC1,
+ await_config_not_running();
+ OK_C1 ->
+ exit({error, {unexpected_success, "C1", OK_C1}})
+ end,
+
+ %% --
+ p("[test C2] write agents config file with invalid sec-name (2)"),
+ AgentC2 = setelement(11, Agent0, "10101"),
+ write_agents_conf(ConfDir, [AgentC2]),
+ case config_start(Opts) of
+ {error, ReasonC2} ->
+ p("start failed (as expected): ~p", [ReasonC2]),
+ ?line {failed_check, _, _, _, {bad_sec_name, _}} = ReasonC2,
+ await_config_not_running();
+ OK_C2 ->
+ exit({error, {unexpected_success, "C2", OK_C2}})
+ end,
+
+ %% --
+ p("[test D1] write agents config file with invalid sec-level (1)"),
+ AgentD1 = setelement(12, Agent0, "\"noAuthNoPriv\""),
+ write_agents_conf(ConfDir, [AgentD1]),
+ case config_start(Opts) of
+ {error, ReasonD1} ->
+ p("start failed (as expected): ~p", [ReasonD1]),
+ ?line {failed_check, _, _, _, {invalid_sec_level, _}} = ReasonD1,
+ await_config_not_running();
+ OK_D1 ->
+ exit({error, {unexpected_success, "D1", OK_D1}})
+ end,
+
+ %% --
+ p("[test D2] write agents config file with invalid sec-level (2)"),
+ AgentD2 = setelement(12, Agent0, "99"),
+ write_agents_conf(ConfDir, [AgentD2]),
+ case config_start(Opts) of
+ {error, ReasonD2} ->
+ p("start failed (as expected): ~p", [ReasonD2]),
+ ?line {failed_check, _, _, _, {invalid_sec_level, _}} = ReasonD2,
+ await_config_not_running();
+ OK_D2 ->
+ exit({error, {unexpected_success, "D2", OK_D2}})
+ end,
+
+ %% --
+ p("[test E1] write agents config file with invalid agent (1)"),
+ write_agents_conf2(ConfDir, "{swiacf, \"targ-hobbes\"}."),
+ case config_start(Opts) of
+ {error, ReasonE1} ->
+ p("start failed (as expected): ~p", [ReasonE1]),
+ ?line {failed_check, _, _, _, {bad_agent_config, _}} = ReasonE1,
+ await_config_not_running();
+ OK_E1 ->
+ exit({error, {unexpected_success, "E1", OK_E1}})
+ end,
+
+ p("done"),
+ ok.
+
+
+%%
+%% ---
+%%
+
+start_with_invalid_usm_conf_file1(suite) -> [];
+start_with_invalid_usm_conf_file1(doc) ->
+ "Start with invalid usm config file.";
+start_with_invalid_usm_conf_file1(Conf) when is_list(Conf) ->
+ put(tname,swiusmcf),
+ p("start"),
+ process_flag(trap_exit, true),
+
+ case ?CRYPTO_START() of
+ ok ->
+ case ?CRYPTO_SUPPORT() of
+ {no, Reason} ->
+ ?SKIP({unsupported_encryption, Reason});
+ yes ->
+ ok
+ end;
+ {error, Reason} ->
+ ?SKIP({failed_starting_crypto, Reason})
+ end,
+
+ ConfDir = ?config(manager_conf_dir, Conf),
+ DbDir = ?config(manager_db_dir, Conf),
+
+ Opts = [{versions, [v1,v2,v3]},
+ {config, [{verbosity, trace}, {dir, ConfDir}, {db_dir, DbDir}]}],
+
+ write_manager_conf(ConfDir),
+
+ write_users_conf(ConfDir, [{"swiacf", "snmpm_user_default", "dummy"}]),
+
+ Usm0 = {"\"bmkEngine\"", "\"swiusmcf\"",
+ "usmNoAuthProtocol", "[]",
+ "usmNoPrivProtocol", "[]"},
+
+ Usm1 = {"\"bmkEngine\"", "\"swiusmcf\"", "\"kalle\"",
+ "usmNoAuthProtocol", "[]",
+ "usmNoPrivProtocol", "[]"},
+
+ %% --
+ p("[test 11] write usm config file with invalid engine-id (1)"),
+ Usm11 = setelement(1, Usm0, "kalle-anka"),
+ write_usm_conf(ConfDir, [Usm11]),
+ ?line {error, Reason11} = config_start(Opts),
+ p("start failed (as expected): ~p", [Reason11]),
+ ?line {failed_reading, _, _, _, {parse_error, _}} = Reason11,
+ await_config_not_running(),
+
+ %% --
+ p("[test 12] write usm config file with invalid engine-id (2)"),
+ Usm12 = setelement(1, Usm0, "kalle_anka"),
+ write_usm_conf(ConfDir, [Usm12]),
+ ?line {error, Reason12} = config_start(Opts),
+ p("start failed (as expected): ~p", [Reason12]),
+ ?line {failed_check, _, _, _, {bad_usm_engine_id, _}} = Reason12,
+ await_config_not_running(),
+
+ %% --
+ p("[test 13] write usm config file with invalid engine-id (3)"),
+ Usm13 = setelement(1, Usm1, "10101"),
+ write_usm_conf(ConfDir, [Usm13]),
+ ?line {error, Reason13} = config_start(Opts),
+ p("start failed (as expected): ~p", [Reason13]),
+ ?line {failed_check, _, _, _, {bad_usm_engine_id, _}} = Reason13,
+ await_config_not_running(),
+
+ %% --
+ p("[test 21] write usm config file with invalid user-name (1)"),
+ Usm21 = setelement(2, Usm0, "kalle_anka"),
+ write_usm_conf(ConfDir, [Usm21]),
+ ?line {error, Reason21} = config_start(Opts),
+ p("start failed (as expected): ~p", [Reason21]),
+ ?line {failed_check, _, _, _, {bad_usm_user_name, _}} = Reason21,
+ await_config_not_running(),
+
+ %% --
+ p("[test 22] write usm config file with invalid user-name (1)"),
+ Usm22 = setelement(2, Usm1, "10101"),
+ write_usm_conf(ConfDir, [Usm22]),
+ ?line {error, Reason22} = config_start(Opts),
+ p("start failed (as expected): ~p", [Reason22]),
+ ?line {failed_check, _, _, _, {bad_usm_user_name, _}} = Reason22,
+ await_config_not_running(),
+
+ %% --
+ p("[test 31] write usm config file with invalid sec-name (1)"),
+ Usm31 = setelement(3, Usm1, "kalle_anka"),
+ write_usm_conf(ConfDir, [Usm31]),
+ ?line {error, Reason31} = config_start(Opts),
+ p("start failed (as expected): ~p", [Reason31]),
+ ?line {failed_check, _, _, _, {bad_usm_sec_name, _}} = Reason31,
+ await_config_not_running(),
+
+ %% --
+ p("[test 32] write usm config file with invalid sec-name (2)"),
+ Usm32 = setelement(3, Usm1, "10101"),
+ write_usm_conf(ConfDir, [Usm32]),
+ ?line {error, Reason32} = config_start(Opts),
+ p("start failed (as expected): ~p", [Reason32]),
+ ?line {failed_check, _, _, _, {bad_usm_sec_name, _}} = Reason32,
+ await_config_not_running(),
+
+ %% --
+ p("[test 41] write usm config file with invalid auth-protocol (1)"),
+ Usm41 = setelement(3, Usm0, "\"usmNoAuthProtocol\""),
+ write_usm_conf(ConfDir, [Usm41]),
+ ?line {error, Reason41} = config_start(Opts),
+ p("start failed (as expected): ~p", [Reason41]),
+ ?line {failed_check, _, _, _, {invalid_auth_protocol, _}} = Reason41,
+ await_config_not_running(),
+
+ %% --
+ p("[test 42] write usm config file with invalid auth-protocol (2)"),
+ Usm42 = setelement(3, Usm0, "kalle"),
+ write_usm_conf(ConfDir, [Usm42]),
+ ?line {error, Reason42} = config_start(Opts),
+ p("start failed (as expected): ~p", [Reason42]),
+ ?line {failed_check, _, _, _, {invalid_auth_protocol, _}} = Reason42,
+ await_config_not_running(),
+
+ %% --
+ p("[test 43] write usm config file with invalid auth-protocol (3)"),
+ Usm43 = setelement(3, Usm0, "10101"),
+ write_usm_conf(ConfDir, [Usm43]),
+ ?line {error, Reason43} = config_start(Opts),
+ p("start failed (as expected): ~p", [Reason43]),
+ ?line {failed_check, _, _, _, {invalid_auth_protocol, _}} = Reason43,
+ await_config_not_running(),
+
+ %% --
+ p("[test 51] write usm config file with invalid auth-key (1)"),
+ Usm51 = setelement(3, Usm0, "usmHMACMD5AuthProtocol"),
+ write_usm_conf(ConfDir, [Usm51]),
+ ?line {error, Reason51} = config_start(Opts),
+ p("start failed (as expected): ~p", [Reason51]),
+ ?line {failed_check, _, _, _, {invalid_auth_key, _, _}} = Reason51,
+ await_config_not_running(),
+
+ %% --
+ p("[test 52] write usm config file with invalid auth-key (2)"),
+ Usm52 = setelement(4, Usm51, "[1,2,3,4,5,6,7,8,9,0,1,2,3,4,5]"),
+ write_usm_conf(ConfDir, [Usm52]),
+ ?line {error, Reason52} = config_start(Opts),
+ p("start failed (as expected): ~p", [Reason52]),
+ ?line {failed_check, _, _, _, {invalid_auth_key, _, 15}} = Reason52,
+ await_config_not_running(),
+
+ %% --
+ p("[test 53] write usm config file with invalid auth-key (3)"),
+ Usm53 = setelement(4, Usm51, "[1,2,3,4,5,6,7,8,9,0,1,2,3,4,5,6,7]"),
+ write_usm_conf(ConfDir, [Usm53]),
+ ?line {error, Reason53} = config_start(Opts),
+ p("start failed (as expected): ~p", [Reason53]),
+ ?line {failed_check, _, _, _, {invalid_auth_key, _, 17}} = Reason53,
+ await_config_not_running(),
+
+ %% --
+ p("[test 54] write usm config file with invalid auth-key (4)"),
+ Usm54 = setelement(4, Usm51, "[1,2,3,4,5,6,7,8,9,0,1,2,3,4,5,kalle]"),
+ write_usm_conf(ConfDir, [Usm54]),
+ %% ?line ok = crypto:start(), %% Varf�r k�r den redan?
+ ?line crypto:start(), %% Make sure it's started...
+ ?line {error, Reason54} = config_start(Opts),
+ ?line ok = crypto:stop(),
+ p("start failed (as expected): ~p", [Reason54]),
+ ?line {failed_check, _, _, _, {invalid_auth_key, _}} = Reason54,
+ await_config_not_running(),
+
+ %% --
+ p("[test 55] write usm config file with invalid auth-key (5)"),
+ Usm55 = setelement(4, Usm51, "arne_anka"),
+ write_usm_conf(ConfDir, [Usm55]),
+ ?line {error, Reason55} = config_start(Opts),
+ p("start failed (as expected): ~p", [Reason55]),
+ ?line {failed_check, _, _, _, {invalid_auth_key, _}} = Reason55,
+ await_config_not_running(),
+
+ %% --
+ p("[test 56] write usm config file with invalid auth-key (6)"),
+ Usm56 = setelement(4, Usm51, "10101"),
+ write_usm_conf(ConfDir, [Usm56]),
+ ?line {error, Reason56} = config_start(Opts),
+ p("start failed (as expected): ~p", [Reason56]),
+ ?line {failed_check, _, _, _, {invalid_auth_key, _}} = Reason56,
+ await_config_not_running(),
+
+ %% --
+ p("[test 57] write usm config file with invalid auth-key (7)"),
+ Usm57 = setelement(3, Usm0, "usmHMACSHAAuthProtocol"),
+ write_usm_conf(ConfDir, [Usm57]),
+ ?line {error, Reason57} = config_start(Opts),
+ p("start failed (as expected): ~p", [Reason57]),
+ ?line {failed_check, _, _, _, {invalid_auth_key, _, _}} = Reason57,
+ await_config_not_running(),
+
+ %% --
+ p("[test 58] write usm config file with invalid auth-key (8)"),
+ Usm58 = setelement(4, Usm57, "[1,2,3,4,5,6,7,8,9,0,1,2,3,4,5,6]"),
+ write_usm_conf(ConfDir, [Usm58]),
+ ?line {error, Reason58} = config_start(Opts),
+ p("start failed (as expected): ~p", [Reason58]),
+ ?line {failed_check, _, _, _, {invalid_auth_key, _, 16}} = Reason58,
+ await_config_not_running(),
+
+ %% --
+ p("[test 59] write usm config file with invalid auth-key (9)"),
+ Usm59 = setelement(4, Usm57, "[1,2,3,4,5,6,7,8,9,0,1,2,3,4,5,6,7,8,9,ka]"),
+ write_usm_conf(ConfDir, [Usm59]),
+ ?line ok = crypto:start(),
+ ?line {error, Reason59} = config_start(Opts),
+ ?line ok = crypto:stop(),
+ p("start failed (as expected): ~p", [Reason59]),
+ ?line {failed_check, _, _, _, {invalid_auth_key, _}} = Reason59,
+ await_config_not_running(),
+
+ %% --
+ p("[test 5A] write usm config file with valid auth-key when crypto not started (10)"),
+ Usm5A = setelement(4, Usm57, "[1,2,3,4,5,6,7,8,9,0,1,2,3,4,5,6,7,8,9,0]"),
+ write_usm_conf(ConfDir, [Usm5A]),
+ ?line {error, Reason5A} = config_start(Opts),
+ p("start failed (as expected): ~p", [Reason5A]),
+ ?line {failed_check, _, _, _, {unsupported_crypto, _}} = Reason5A,
+ await_config_not_running(),
+
+ %% --
+ p("[test 61] write usm config file with invalid priv-protocol (1)"),
+ Usm61 = setelement(5, Usm0, "\"usmNoPrivProtocol\""),
+ write_usm_conf(ConfDir, [Usm61]),
+ ?line {error, Reason61} = config_start(Opts),
+ p("start failed (as expected): ~p", [Reason61]),
+ ?line {failed_check, _, _, _, {invalid_priv_protocol, _}} = Reason61,
+ await_config_not_running(),
+
+ %% --
+ p("[test 62] write usm config file with invalid priv-protocol (2)"),
+ Usm62 = setelement(5, Usm0, "kalle"),
+ write_usm_conf(ConfDir, [Usm62]),
+ ?line {error, Reason62} = config_start(Opts),
+ p("start failed (as expected): ~p", [Reason62]),
+ ?line {failed_check, _, _, _, {invalid_priv_protocol, _}} = Reason62,
+ await_config_not_running(),
+
+ %% --
+ p("[test 63] write usm config file with invalid priv-protocol (3)"),
+ Usm63 = setelement(5, Usm0, "10101"),
+ write_usm_conf(ConfDir, [Usm63]),
+ ?line {error, Reason63} = config_start(Opts),
+ p("start failed (as expected): ~p", [Reason63]),
+ ?line {failed_check, _, _, _, {invalid_priv_protocol, _}} = Reason63,
+ await_config_not_running(),
+
+ %% --
+ p("[test 71] write usm config file with invalid priv-key (1)"),
+ Usm71 = setelement(5, Usm0, "usmDESPrivProtocol"),
+ write_usm_conf(ConfDir, [Usm71]),
+ ?line {error, Reason71} = config_start(Opts),
+ p("start failed (as expected): ~p", [Reason71]),
+ ?line {failed_check, _, _, _, {invalid_priv_key, _, _}} = Reason71,
+ await_config_not_running(),
+
+ %% --
+ p("[test 72] write usm config file with invalid priv-key (2)"),
+ Usm72 = setelement(6, Usm71, "[1,2,3,4,5,6,7,8,9,0,1,2,3,4,5]"),
+ write_usm_conf(ConfDir, [Usm72]),
+ ?line {error, Reason72} = config_start(Opts),
+ p("start failed (as expected): ~p", [Reason72]),
+ ?line {failed_check, _, _, _, {invalid_priv_key, _, 15}} = Reason72,
+ await_config_not_running(),
+
+ %% --
+ p("[test 73] write usm config file with invalid priv-key (3)"),
+ Usm73 = setelement(6, Usm71, "[1,2,3,4,5,6,7,8,9,0,1,2,3,4,5,6,7]"),
+ write_usm_conf(ConfDir, [Usm73]),
+ ?line {error, Reason73} = config_start(Opts),
+ p("start failed (as expected): ~p", [Reason73]),
+ ?line {failed_check, _, _, _, {invalid_priv_key, _, 17}} = Reason73,
+ await_config_not_running(),
+
+ %% --
+ p("[test 74] write usm config file with invalid priv-key (4)"),
+ Usm74 = setelement(6, Usm71, "[1,2,3,4,5,6,7,8,9,0,1,2,3,4,5,kalle]"),
+ write_usm_conf(ConfDir, [Usm74]),
+ ?line ok = crypto:start(),
+ ?line {error, Reason74} = config_start(Opts),
+ ?line ok = crypto:stop(),
+ p("start failed (as expected): ~p", [Reason74]),
+ ?line {failed_check, _, _, _, {invalid_priv_key, _}} = Reason74,
+ await_config_not_running(),
+
+ %% --
+ p("[test 75] write usm config file with invalid priv-key (5)"),
+ Usm75 = setelement(6, Usm71, "arne_anka"),
+ write_usm_conf(ConfDir, [Usm75]),
+ ?line {error, Reason75} = config_start(Opts),
+ p("start failed (as expected): ~p", [Reason75]),
+ ?line {failed_check, _, _, _, {invalid_priv_key, _}} = Reason75,
+ await_config_not_running(),
+
+ %% --
+ p("[test 76] write usm config file with invalid priv-key (6)"),
+ Usm76 = setelement(6, Usm71, "10101"),
+ write_usm_conf(ConfDir, [Usm76]),
+ ?line {error, Reason76} = config_start(Opts),
+ p("start failed (as expected): ~p", [Reason76]),
+ ?line {failed_check, _, _, _, {invalid_priv_key, _}} = Reason76,
+ await_config_not_running(),
+
+ %% --
+ p("[test 77] write usm config file with valid priv-key when crypto not started (7)"),
+ Usm77 = setelement(6, Usm71, "[1,2,3,4,5,6,7,8,9,0,1,2,3,4,5,6]"),
+ write_usm_conf(ConfDir, [Usm77]),
+ ?line {error, Reason77} = config_start(Opts),
+ p("start failed (as expected): ~p", [Reason77]),
+ ?line {failed_check, _, _, _, {unsupported_crypto, _}} = Reason77,
+ await_config_not_running(),
+
+ %% --
+ p("[test 78] write usm config file with invalid usm (1)"),
+ write_usm_conf2(ConfDir, "{\"bmkEngine\", \"swiusmcf\"}."),
+ ?line {error, Reason81} = config_start(Opts),
+ p("start failed (as expected): ~p", [Reason81]),
+ ?line {failed_check, _, _, _, {bad_usm_config, _}} = Reason81,
+ await_config_not_running(),
+
+ p("done"),
+ ok.
+
+
+%%
+%% ---
+%%
+
+normal_op(doc) ->
+ "A collection of tests for normal operation";
+normal_op(suite) ->
+ [
+ system,
+ agents,
+ users,
+ usm_users,
+ counter,
+ stats_counter
+ ].
+
+
+%%
+%% ---
+%%
+
+system(doc) ->
+ "Various system related operations with the snmp manager config";
+system(suite) ->
+ [
+ simple_system_op
+ ].
+
+simple_system_op(suite) -> [];
+simple_system_op(doc) ->
+ "Access some of the known system info and some \n"
+ "system info that does not exist.";
+simple_system_op(Conf) when is_list(Conf) ->
+ put(tname,sso),
+ p("start"),
+ ConfDir = ?config(manager_conf_dir, Conf),
+ DbDir = ?config(manager_db_dir, Conf),
+
+ write_manager_conf(ConfDir),
+
+ Opts = [{versions, [v1]},
+ {config, [{verbosity, trace}, {dir, ConfDir}, {db_dir, DbDir}]}],
+
+ p("start config"),
+ ?line {ok, _Pid} = config_start(Opts),
+
+ p("retreive various configs"),
+ ?line {ok, _Time} = snmpm_config:system_start_time(),
+ ?line {ok, _EngineId} = snmpm_config:get_engine_id(),
+ ?line {ok, _MMS} = snmpm_config:get_engine_max_message_size(),
+
+ p("attempt to retreive nonexisting"),
+ ?line {error, not_found} = snmpm_config:system_info(kalle),
+
+ ?line ok = config_stop(),
+ await_config_not_running(),
+
+ p("done"),
+ ok.
+
+
+%%
+%% ---
+%%
+
+users(doc) ->
+ "Various users related operations with the snmp manager config";
+users(suite) ->
+ [
+ register_user_using_file,
+ register_user_using_function,
+ register_user_failed_using_function1
+ ].
+
+
+%%
+%% ---
+%%
+
+register_user_using_file(suite) -> [];
+register_user_using_file(doc) ->
+ "Register user using the 'users.conf' file.";
+register_user_using_file(Conf) when is_list(Conf) ->
+ put(tname,ruufi),
+ p("start"),
+ process_flag(trap_exit, true),
+ _ConfDir = ?config(manager_conf_dir, Conf),
+ _DbDir = ?config(manager_db_dir, Conf),
+ ?SKIP(not_yet_implemented).
+
+
+%%
+%% ---
+%%
+
+register_user_using_function(suite) -> [];
+register_user_using_function(doc) ->
+ "Register user using the API (function).";
+register_user_using_function(Conf) when is_list(Conf) ->
+ put(tname,ruufu),
+ p("start"),
+ process_flag(trap_exit, true),
+ _ConfDir = ?config(manager_conf_dir, Conf),
+ _DbDir = ?config(manager_db_dir, Conf),
+ ?SKIP(not_yet_implemented).
+
+
+%%
+%% ---
+%%
+
+register_user_failed_using_function1(suite) -> [];
+register_user_failed_using_function1(doc) ->
+ "Register user failed using incorrect arguments to API (function).";
+register_user_failed_using_function1(Conf) when is_list(Conf) ->
+ put(tname,rufufu1),
+ p("start"),
+ process_flag(trap_exit, true),
+ _ConfDir = ?config(manager_conf_dir, Conf),
+ _DbDir = ?config(manager_db_dir, Conf),
+ ?SKIP(not_yet_implemented).
+
+
+%%
+%% ---
+%%
+
+agents(doc) ->
+ "Various agents related operations with the snmp manager config";
+agents(suite) ->
+ [
+ register_agent_using_file,
+ register_agent_using_function,
+ register_agent_failed_using_function1
+ ].
+
+
+%%
+%% ---
+%%
+
+register_agent_using_file(suite) -> [];
+register_agent_using_file(doc) ->
+ "Register agents using the 'agents'conf' file.";
+register_agent_using_file(Conf) when is_list(Conf) ->
+ put(tname,raufi),
+ p("start"),
+ process_flag(trap_exit, true),
+ ConfDir = ?config(manager_conf_dir, Conf),
+ DbDir = ?config(manager_db_dir, Conf),
+
+ Opts = [{versions, [v1]},
+ {config, [{verbosity, trace}, {dir, ConfDir}, {db_dir, DbDir}]}],
+
+
+ %% --
+ p("write manager config file"),
+ write_manager_conf(ConfDir),
+
+ %% --
+ p("write users config file"),
+ UserId1 = raufi1,
+ UserId1Str = str(UserId1),
+ UserId2 = raufi2,
+ UserId2Str = str(UserId2),
+ User1 = {UserId1Str, "snmpm_user_default", "dummy1"},
+ User2 = {UserId2Str, "snmpm_user_default", "dummy2", "[{version, v1}]"},
+ write_users_conf(ConfDir, [User1, User2]),
+
+ %% --
+ p("write agents config file"),
+ AgentAddr1 = [192,168,0,101],
+ AgentAddr1Str = str(AgentAddr1),
+ AgentPort1 = 162,
+ AgentPort1Str = str(AgentPort1),
+ EngineID1 = "bmkEngine1",
+ EngineID1Str = str(EngineID1),
+ MMS1 = 1024,
+ MMS1Str = str(MMS1),
+ AgentAddr2 = [192,168,0,102],
+ AgentAddr2Str = str(AgentAddr2),
+ AgentPort2 = 162,
+ AgentPort2Str = str(AgentPort2),
+ EngineID2 = "bmkEngine2",
+ EngineID2Str = str(EngineID2),
+ MMS2 = 512,
+ MMS2Str = str(MMS2),
+ Agent1Str = {UserId1Str, "\"targ-hobbes1\"", "\"comm\"",
+ AgentAddr1Str, AgentPort1Str, EngineID1Str,
+ "1000", MMS1Str, "v1",
+ "any", "\"initial\"", "noAuthNoPriv"},
+ Agent2Str = {UserId2Str, "\"targ-hobbes2\"", "\"comm\"",
+ AgentAddr2Str, AgentPort2Str, EngineID2Str,
+ "1500", MMS2Str, "v1",
+ "any", "\"initial\"", "noAuthNoPriv"},
+ write_agents_conf(ConfDir, [Agent1Str, Agent2Str]),
+
+ %% --
+ p("start the config process"),
+ ?line {ok, _Pid} = config_start(Opts),
+
+ %% --
+ p("which agents"),
+ ?line [_, _] = All = snmpm_config:which_agents(),
+ p("all agents: ~n ~p", [All]),
+ ?line [A1] = snmpm_config:which_agents(UserId1),
+ p("agents belonging to ~w: ~n ~p", [UserId1, A1]),
+ ?line [A2] = snmpm_config:which_agents(UserId2),
+ p("agents belonging to ~w: ~n ~p", [UserId2, A2]),
+
+ %% --
+ p("All info for agent <~w,~w>", [AgentAddr1, AgentPort1]),
+ ?line {ok, AllInfo1} =
+ snmpm_config:agent_info(AgentAddr1, AgentPort1, all),
+ p("all agent info for agent: ~n ~p", [AllInfo1]),
+
+ %% --
+ p("EngineID (~p) for agent <~w,~w>", [EngineID1, AgentAddr1, AgentPort1]),
+ ?line {ok, EngineID1} =
+ snmpm_config:agent_info(AgentAddr1, AgentPort1, engine_id),
+
+
+ %% --
+ p("All info for agent <~w,~w>", [AgentAddr2, AgentPort2]),
+ ?line {ok, AllInfo2} =
+ snmpm_config:agent_info(AgentAddr2, AgentPort2, all),
+ p("all agent info for agent: ~n ~p", [AllInfo2]),
+
+ %% --
+ p("EngineID (~p) for agent <~w,~w>", [EngineID2, AgentAddr2, AgentPort2]),
+ ?line {ok, EngineID2} =
+ snmpm_config:agent_info(AgentAddr2, AgentPort2, engine_id),
+
+ %% --
+ ?line {ok, MMS2} =
+ snmpm_config:agent_info(AgentAddr2, AgentPort2, max_message_size),
+ NewMMS21 = 2048,
+ p("try update agent info max-message-size to ~w for agent <~w,~w>",
+ [NewMMS21, AgentAddr2, AgentPort2]),
+ ?line ok = snmpm_config:update_agent_info(UserId2, AgentAddr2, AgentPort2,
+ max_message_size, NewMMS21),
+ ?line {ok, NewMMS21} =
+ snmpm_config:agent_info(AgentAddr2, AgentPort2, max_message_size),
+
+ %% --
+ p("try (and fail) to update agent info max-message-size to ~w "
+ "for agent <~w,~w> "
+ "with user ~w (not owner)",
+ [NewMMS21, AgentAddr2, AgentPort2, UserId1]),
+ ?line {error, Reason01} =
+ snmpm_config:update_agent_info(UserId1, AgentAddr2, AgentPort2,
+ max_message_size, NewMMS21),
+ p("expected failure. Reason01: ~p", [Reason01]),
+ ?line {ok, NewMMS21} =
+ snmpm_config:agent_info(AgentAddr2, AgentPort2, max_message_size),
+
+ %% --
+ NewMMS22 = 400,
+ p("try (and fail) to update agent info max-message-size to ~w "
+ "for agent <~w,~w>",
+ [NewMMS22, AgentAddr2, AgentPort2]),
+ ?line {error, Reason02} =
+ snmpm_config:update_agent_info(UserId1, AgentAddr2, AgentPort2,
+ max_message_size, NewMMS22),
+ p("expected failure. Reason02: ~p", [Reason02]),
+
+ %% --
+ p("stop config process"),
+ ?line ok = snmpm_config:stop(),
+ await_config_not_running(),
+
+ %% --
+ p("done"),
+ ok.
+
+
+%%
+%% ---
+%%
+
+register_agent_using_function(suite) -> [];
+register_agent_using_function(doc) ->
+ "Register agents using the API (function).";
+register_agent_using_function(Conf) when is_list(Conf) ->
+ put(tname,raufu),
+ p("start"),
+ process_flag(trap_exit, true),
+ _ConfDir = ?config(manager_conf_dir, Conf),
+ _DbDir = ?config(manager_db_dir, Conf),
+ ?SKIP(not_yet_implemented).
+
+
+%%
+%% ---
+%%
+
+register_agent_failed_using_function1(suite) -> [];
+register_agent_failed_using_function1(doc) ->
+ "Register agents failng using the API (function) with incorrect "
+ "config (1).";
+register_agent_failed_using_function1(Conf) when is_list(Conf) ->
+ put(tname,rafuf1),
+ p("start"),
+ process_flag(trap_exit, true),
+ _ConfDir = ?config(manager_conf_dir, Conf),
+ _DbDir = ?config(manager_db_dir, Conf),
+ ?SKIP(not_yet_implemented).
+
+
+%%
+%% ---
+%%
+
+usm_users(doc) ->
+ "Various USM users related operations with the snmp manager config";
+usm_users(suite) ->
+ [
+ register_usm_user_using_file,
+ register_usm_user_using_function,
+ register_usm_user_failed_using_function1,
+ update_usm_user_info
+ ].
+
+
+%%
+%% ---
+%%
+
+register_usm_user_using_file(suite) -> [];
+register_usm_user_using_file(doc) ->
+ "Register usm user using the 'usm.conf' file.";
+register_usm_user_using_file(Conf) when is_list(Conf) ->
+ put(tname,ruuufi),
+ p("start"),
+ process_flag(trap_exit, true),
+
+ case ?CRYPTO_START() of
+ ok ->
+ case ?CRYPTO_SUPPORT() of
+ {no, Reason} ->
+ ?SKIP({unsupported_encryption, Reason});
+ yes ->
+ ok
+ end;
+ {error, Reason} ->
+ ?SKIP({failed_starting_crypto, Reason})
+ end,
+
+ ConfDir = ?config(manager_conf_dir, Conf),
+ DbDir = ?config(manager_db_dir, Conf),
+
+ Opts = [{versions, [v3]},
+ {config, [{verbosity, trace}, {dir, ConfDir}, {db_dir, DbDir}]}],
+
+ %% --
+ p("write manager config file"),
+ write_manager_conf(ConfDir),
+
+ %% --
+ p("write usm user config file"),
+ SecEngineID = "loctzp's engine",
+ SecName1 = "samu_auth1",
+ UserName1 = SecName1,
+ UsmUser1 = {"\"" ++ SecEngineID ++ "\"",
+ "\"" ++ UserName1 ++ "\"",
+ "\"" ++ SecName1 ++ "\"",
+ "usmHMACMD5AuthProtocol", "[1,2,3,4,5,6,7,8,9,0,1,2,3,4,5,6]",
+ "usmNoPrivProtocol", "[]"},
+
+ SecName2 = "samu_auth2",
+ UserName2 = "samu",
+ UsmUser2 = {"\"" ++ SecEngineID ++ "\"",
+ "\"" ++ UserName2 ++ "\"",
+ "\"" ++ SecName2 ++ "\"",
+ "usmHMACMD5AuthProtocol", "[1,2,3,4,5,6,7,8,9,0,1,2,3,4,5,6]",
+ "usmNoPrivProtocol", "[]"},
+ write_usm_conf(ConfDir, [UsmUser1, UsmUser2]),
+
+ %% --
+ p("start the config process"),
+ ?line {ok, _Pid} = config_start(Opts),
+
+ %% --
+ p("lookup 1 (ok)"),
+ ?line {ok, #usm_user{name = UserName1} = User1} =
+ snmpm_config:get_usm_user_from_sec_name(SecEngineID, SecName1),
+ p("User: ~p", [User1]),
+
+ p("lookup 2 (ok)"),
+ ?line {ok, #usm_user{name = UserName2} = User2} =
+ snmpm_config:get_usm_user_from_sec_name(SecEngineID, SecName2),
+ p("User: ~p", [User2]),
+
+ p("lookup 3 (error)"),
+ ?line {error, not_found} =
+ snmpm_config:get_usm_user_from_sec_name(SecEngineID, SecName2 ++ "_1"),
+
+ %% --
+ p("stop config process"),
+ ?line ok = snmpm_config:stop(),
+ await_config_not_running(),
+
+ %% --
+ p("done"),
+ ok.
+%% ?SKIP(not_yet_implemented).
+
+
+%%
+%% ---
+%%
+
+register_usm_user_using_function(suite) -> [];
+register_usm_user_using_function(doc) ->
+ "Register usm user using the API (function).";
+register_usm_user_using_function(Conf) when is_list(Conf) ->
+ put(tname,ruuufu),
+ p("start"),
+ process_flag(trap_exit, true),
+
+ case ?CRYPTO_START() of
+ ok ->
+ case ?CRYPTO_SUPPORT() of
+ {no, Reason} ->
+ ?SKIP({unsupported_encryption, Reason});
+ yes ->
+ ok
+ end;
+ {error, Reason} ->
+ ?SKIP({failed_starting_crypto, Reason})
+ end,
+
+ ConfDir = ?config(manager_conf_dir, Conf),
+ DbDir = ?config(manager_db_dir, Conf),
+
+ Opts = [{versions, [v3]},
+ {config, [{verbosity, trace}, {dir, ConfDir}, {db_dir, DbDir}]}],
+
+ %% --
+ p("write manager config file"),
+ write_manager_conf(ConfDir),
+
+ %% --
+ p("start the config process"),
+ ?line {ok, _Pid} = config_start(Opts),
+
+ %% --
+ p("register usm user's"),
+ EngineID = "loctzp's engine",
+
+ p("register user 1 (ok)"),
+ UserName1 = "samu_auth1",
+ SecName1 = UserName1,
+ UsmConfig1 = [{sec_name, SecName1},
+ {auth, usmHMACMD5AuthProtocol},
+ {auth_key, [1,2,3,4,5,6,7,8,9,0,1,2,3,4,5,6]},
+ {priv, usmNoPrivProtocol}],
+ ?line ok = snmpm_config:register_usm_user(EngineID, UserName1, UsmConfig1),
+ p("try register user 1 again (error)"),
+ ?line {error, {already_registered, EngineID, UserName1}} =
+ snmpm_config:register_usm_user(EngineID, UserName1, UsmConfig1),
+
+ p("register user 2 (ok)"),
+ UserName2 = "samu_auth2",
+ SecName2 = UserName2,
+ UsmConfig2 = [{auth, usmHMACMD5AuthProtocol},
+ {auth_key, [1,2,3,4,5,6,7,8,9,0,1,2,3,4,5,6]},
+ {priv, usmNoPrivProtocol}],
+ ?line ok = snmpm_config:register_usm_user(EngineID, UserName2, UsmConfig2),
+
+ p("register user 3 (ok)"),
+ UserName3 = "samu3",
+ SecName3 = "samu_auth3",
+ UsmConfig3 = [{sec_name, SecName3},
+ {auth, usmHMACMD5AuthProtocol},
+ {auth_key, [1,2,3,4,5,6,7,8,9,0,1,2,3,4,5,6]},
+ {priv, usmNoPrivProtocol}],
+ ?line ok = snmpm_config:register_usm_user(EngineID, UserName3, UsmConfig3),
+
+ p("lookup 1 (ok)"),
+ ?line {ok, #usm_user{name = UserName1} = User1} =
+ snmpm_config:get_usm_user_from_sec_name(EngineID, SecName1),
+ p("User: ~p", [User1]),
+
+ p("lookup 2 (ok)"),
+ ?line {ok, #usm_user{name = UserName2} = User2} =
+ snmpm_config:get_usm_user_from_sec_name(EngineID, SecName2),
+ p("User: ~p", [User2]),
+
+ p("lookup 3 (ok)"),
+ ?line {ok, #usm_user{name = UserName3} = User3} =
+ snmpm_config:get_usm_user_from_sec_name(EngineID, SecName3),
+ p("User: ~p", [User3]),
+
+ p("lookup 4 (error)"),
+ ?line {error, not_found} =
+ snmpm_config:get_usm_user_from_sec_name(EngineID, SecName3 ++ "_1"),
+
+ %% --
+ p("stop config process"),
+ ?line ok = snmpm_config:stop(),
+ await_config_not_running(),
+
+ %% --
+ p("done"),
+ ok.
+%% ?SKIP(not_yet_implemented).
+
+
+%%
+%% ---
+%%
+
+register_usm_user_failed_using_function1(suite) -> [];
+register_usm_user_failed_using_function1(doc) ->
+ "Register usm user failed using incorrect arguments to API (function).";
+register_usm_user_failed_using_function1(Conf) when is_list(Conf) ->
+ put(tname,ruufufu1),
+ p("start"),
+ process_flag(trap_exit, true),
+
+ case ?CRYPTO_START() of
+ ok ->
+ case ?CRYPTO_SUPPORT() of
+ {no, Reason} ->
+ ?SKIP({unsupported_encryption, Reason});
+ yes ->
+ ok
+ end;
+ {error, Reason} ->
+ ?SKIP({failed_starting_crypto, Reason})
+ end,
+
+ _ConfDir = ?config(manager_conf_dir, Conf),
+ _DbDir = ?config(manager_db_dir, Conf),
+ ?SKIP(not_yet_implemented).
+
+
+%%
+%% ---
+%%
+
+update_usm_user_info(suite) -> [];
+update_usm_user_info(doc) ->
+ "Update usm user info.";
+update_usm_user_info(Conf) when is_list(Conf) ->
+ put(tname,ruufufu1),
+ p("start"),
+ process_flag(trap_exit, true),
+
+ case ?CRYPTO_START() of
+ ok ->
+ case ?CRYPTO_SUPPORT() of
+ {no, Reason} ->
+ ?SKIP({unsupported_encryption, Reason});
+ yes ->
+ ok
+ end;
+ {error, Reason} ->
+ ?SKIP({failed_starting_crypto, Reason})
+ end,
+
+ _ConfDir = ?config(manager_conf_dir, Conf),
+ _DbDir = ?config(manager_db_dir, Conf),
+ ?SKIP(not_yet_implemented).
+
+
+%%
+%% ---
+%%
+
+counter(doc) ->
+ "Various counter related operations with the snmp manager config";
+counter(suite) ->
+ [
+ create_and_increment
+ ].
+
+
+%%
+%% ---
+%%
+
+create_and_increment(suite) -> [];
+create_and_increment(doc) ->
+ "Craete and increment counters.";
+create_and_increment(Conf) when is_list(Conf) ->
+ put(tname,cai),
+ p("start"),
+ process_flag(trap_exit, true),
+
+ ConfDir = ?config(manager_conf_dir, Conf),
+ DbDir = ?config(manager_db_dir, Conf),
+
+ write_manager_conf(ConfDir),
+
+ Opts = [{versions, [v1]},
+ {config, [{verbosity, trace}, {dir, ConfDir}, {db_dir, DbDir}]}],
+
+ ?line {ok, _Pid} = snmpm_config:start_link(Opts),
+
+ %% Random init
+ {A,B,C} = erlang:now(),
+ random:seed(A,B,C),
+
+ StartVal = random:uniform(2147483647),
+ IncVal = 42,
+ EndVal = StartVal + IncVal,
+
+ ?line StartVal = snmpm_config:cre_counter(test_id, StartVal),
+ ?line EndVal = snmpm_config:incr_counter(test_id, IncVal),
+
+ ?line ok = snmpm_config:stop(),
+ await_config_not_running(),
+ ok.
+
+
+%%
+%% ---
+%%
+
+stats_counter(doc) ->
+ "Various statistic counter related operations with the "
+ "snmp manager config";
+stats_counter(suite) ->
+ [
+ stats_create_and_increment
+ ].
+
+
+%%
+%% ---
+%%
+
+stats_create_and_increment(suite) -> [];
+stats_create_and_increment(doc) ->
+ "Create and increment statistics counters.";
+stats_create_and_increment(Conf) when is_list(Conf) ->
+ put(tname,scai),
+ p("start"),
+ process_flag(trap_exit, true),
+
+ ConfDir = ?config(manager_conf_dir, Conf),
+ DbDir = ?config(manager_db_dir, Conf),
+
+ write_manager_conf(ConfDir),
+
+ Opts = [{versions, [v1]},
+ {config, [{verbosity, trace}, {dir, ConfDir}, {db_dir, DbDir}]}],
+
+ ?line {ok, _Pid} = snmpm_config:start_link(Opts),
+
+ p("stats table (1): ~p", [ets:tab2list(snmpm_stats_table)]),
+ ?line 0 = snmpm_config:maybe_cre_stats_counter(stats1, 0),
+ p("stats table (2): ~p", [ets:tab2list(snmpm_stats_table)]),
+ ?line ok = snmpm_config:maybe_cre_stats_counter(stats1, 0),
+ p("stats table (3): ~p", [ets:tab2list(snmpm_stats_table)]),
+ ?line 1 = snmpm_config:maybe_cre_stats_counter(stats2, 1),
+ p("stats table (4): ~p", [ets:tab2list(snmpm_stats_table)]),
+ ?line 10 = snmpm_config:cre_stats_counter(stats3, 10),
+ p("stats table (5): ~p", [ets:tab2list(snmpm_stats_table)]),
+
+ Stats1Inc = fun() -> snmpm_config:incr_stats_counter(stats1, 1) end,
+ ?line 10 = loop(10, -1, Stats1Inc),
+ p("stats table (6): ~p", [ets:tab2list(snmpm_stats_table)]),
+
+ ?line ok = snmpm_config:reset_stats_counter(stats1),
+
+ ?line 10 = loop(10, -1, Stats1Inc),
+
+ ?line ok = snmpm_config:stop(),
+ await_config_not_running(),
+ ok.
+
+
+loop(0, Acc, _) ->
+ Acc;
+loop(N, _, F) when (N > 0) andalso is_function(F) ->
+ Acc = F(),
+ loop(N-1, Acc, F).
+
+
+%%======================================================================
+%% Ticket test-cases
+%%======================================================================
+
+tickets(suite) ->
+ [
+ otp_7219
+ ].
+
+
+otp_7219(suite) ->
+ [];
+otp_7219(doc) ->
+ "Test-case for ticket OTP-7219";
+otp_7219(Config) when is_list(Config) ->
+ put(tname, otp7219),
+ p("start"),
+ process_flag(trap_exit, true),
+
+ ConfDir = ?config(manager_conf_dir, Config),
+ DbDir = ?config(manager_db_dir, Config),
+
+ p("write manager configuration"),
+ write_manager_conf(ConfDir),
+
+ Opts1 = [{versions, [v1]},
+ {inform_request_behaviour, user},
+ {config, [{verbosity, trace}, {dir, ConfDir}, {db_dir, DbDir}]}],
+
+ p("start manager config"),
+ ?line {ok, _Pid1} = snmpm_config:start_link(Opts1),
+
+ p("get some manager config"),
+ {ok, {user, _}} = snmpm_config:system_info(net_if_irb),
+
+ p("stop manager config"),
+ ?line ok = snmpm_config:stop(),
+ await_config_not_running(),
+
+ IRB_TO = 15322,
+ Opts2 = [{versions, [v1]},
+ {inform_request_behaviour, {user, IRB_TO}},
+ {config, [{verbosity, trace}, {dir, ConfDir}, {db_dir, DbDir}]}],
+
+ p("start manager config"),
+ ?line {ok, _Pid2} = snmpm_config:start_link(Opts2),
+
+ p("get some manager config"),
+ {ok, {user, IRB_TO}} = snmpm_config:system_info(net_if_irb),
+
+ p("stop manager config"),
+ ?line ok = snmpm_config:stop(),
+ await_config_not_running(),
+
+ p("done"),
+ ok.
+
+
+%%======================================================================
+%% Internal functions
+%%======================================================================
+
+await_config_not_running() ->
+ await_not_running(snmpm_config, 5).
+
+await_not_running(Name, 0) ->
+ p("await_not_running -> done waiting for ~w to die - try kill it", [Name]),
+ %% Ok, we tried it the nice way, now use brute force
+ await_killed(Name, 5);
+await_not_running(Name, N) when N > 0 ->
+ p("await_not_running -> is process ~w still running (~w)", [Name, N]),
+ case erlang:whereis(Name) of
+ undefined ->
+ p("await_not_running -> no such (~w) process - sleep some",[Name]),
+ ?SLEEP(1000),
+ p("await_not_running -> no such (~w) process - done", [Name]),
+ ok;
+ Pid when is_pid(Pid) ->
+ p("~w process still running", [Name]),
+ ?SLEEP(500),
+ await_not_running(Name, N-1)
+ end.
+
+await_killed(Name, 0) ->
+ p("await_killed -> could not kill ~w => giving up", [Name]),
+ exit({error, {failed_terminating, Name}});
+await_killed(Name, N) when N > 0 ->
+ p("await_killed -> is process ~w still running (~w)", [Name, N]),
+ case whereis(Name) of
+ undefined ->
+ p("await_killed -> no such (~w) process - sleep some", [Name]),
+ ?SLEEP(1000),
+ p("await_killed -> no such (~w) process - done", [Name]),
+ ok;
+ Pid when is_pid(Pid) ->
+ p("await_killed -> ~w still running - try kill it", [Name]),
+ exit(Pid, kill),
+ ?SLEEP(1000),
+ await_killed(Name, N-1)
+ end.
+
+
+config_start(Opts) ->
+ (catch snmpm_config:start_link(Opts)).
+
+config_stop() ->
+ (catch snmpm_config:stop()).
+
+
+%% ------
+
+join(Dir, File) ->
+ filename:join(Dir, File).
+
+
+%% ------
+
+write_manager_conf(Dir) ->
+ Port = "5000",
+ MMS = "484",
+ EngineID = "\"mgrEngine\"",
+ Str = lists:flatten(
+ io_lib:format("%% Minimum manager config file\n"
+ "{port, ~s}.\n"
+ "{max_message_size, ~s}.\n"
+ "{engine_id, ~s}.\n",
+ [Port, MMS, EngineID])),
+ write_manager_conf(Dir, Str).
+
+write_manager_conf(Dir, IP, Port, MMS, EngineID) ->
+ Str = lists:flatten(
+ io_lib:format("{address, ~s}.\n"
+ "{port, ~s}.\n"
+ "{max_message_size, ~s}.\n"
+ "{engine_id, ~s}.\n",
+ [IP, Port, MMS, EngineID])),
+ write_manager_conf(Dir, Str).
+
+write_manager_conf(Dir, Str) ->
+ write_conf_file(Dir, "manager.conf", Str).
+
+
+write_users_conf(Dir, Users) ->
+ F = fun({UserId, UserMod, UserData}) -> %% Old format
+ lists:flatten(
+ io_lib:format("{~s, ~s, ~s, ~s}.~n",
+ [UserId, UserMod, UserData, "[]"]));
+ ({UserId, UserMod, UserData, DefaultAgentConfig}) -> %% New format
+ lists:flatten(
+ io_lib:format("{~s, ~s, ~s, ~s}.~n",
+ [UserId, UserMod, UserData, DefaultAgentConfig]))
+ end,
+ Str = lists:flatten([F(User) || User <- Users]),
+ write_conf_file(Dir, "users.conf", Str).
+
+write_users_conf2(Dir, Str) ->
+ write_conf_file(Dir, "users.conf", Str).
+
+
+write_agents_conf(Dir, Agents) ->
+ F = fun({UserId,
+ TargetName, Comm,
+ Ip, Port, EngineID,
+ Timeout, MMS,
+ Version, SecModel, SecName, SecLevel}) ->
+ lists:flatten(
+ io_lib:format("{~s, ~n"
+ " ~s, ~s, ~n"
+ " ~s, ~s, ~s, ~n"
+ " ~s, ~s, ~n"
+ " ~s, ~s, ~s, ~s}.~n",
+ [UserId,
+ TargetName, Comm,
+ Ip, Port, EngineID,
+ Timeout, MMS,
+ Version, SecModel, SecName, SecLevel]))
+ end,
+ Str = lists:flatten([F(Agent) || Agent <- Agents]),
+ write_conf_file(Dir, "agents.conf", Str).
+
+write_agents_conf2(Dir, Str) ->
+ write_conf_file(Dir, "agents.conf", Str).
+
+
+write_usm_conf(Dir, Usms) ->
+ F = fun({EngineID, UserName, SecName, AuthP, AuthKey, PrivP, PrivKey}) ->
+ lists:flatten(
+ io_lib:format("{~s, ~s, ~s, ~n"
+ " ~s, ~s, ~n"
+ " ~s, ~s}.~n",
+ [EngineID, UserName, SecName,
+ AuthP, AuthKey,
+ PrivP, PrivKey]));
+ ({EngineID, UserName, AuthP, AuthKey, PrivP, PrivKey}) ->
+ lists:flatten(
+ io_lib:format("{~s, ~s, ~n"
+ " ~s, ~s, ~n"
+ " ~s, ~s}.~n",
+ [EngineID, UserName,
+ AuthP, AuthKey,
+ PrivP, PrivKey]));
+ (Usm) ->
+ exit({invalid_usm, Usm})
+ end,
+ Str = lists:flatten([F(Usm) || Usm <- Usms]),
+ write_conf_file(Dir, "usm.conf", Str).
+
+write_usm_conf2(Dir, Str) ->
+ write_conf_file(Dir, "usm.conf", Str).
+
+
+write_conf_file(Dir, File, Str) ->
+ ?line {ok, Fd} = file:open(filename:join(Dir, File), write),
+ ?line ok = io:format(Fd, "~s", [Str]),
+ file:close(Fd).
+
+
+%% ------
+
+str(X) ->
+ lists:flatten(io_lib:format("~w", [X])).
+
+
+%% ------
+
+p(F) ->
+ p(F, []).
+
+p(F, A) ->
+ p(get(tname), F, A).
+
+p(TName, F, A) ->
+ io:format("*** [~s] ***"
+ " ~w -> " ++ F ++ "~n", [format_timestamp(now()),TName|A]).
+
+format_timestamp({_N1, _N2, N3} = Now) ->
+ {Date, Time} = calendar:now_to_datetime(Now),
+ {YYYY,MM,DD} = Date,
+ {Hour,Min,Sec} = Time,
+ FormatDate =
+ io_lib:format("~.4w:~.2.0w:~.2.0w ~.2.0w:~.2.0w:~.2.0w 4~w",
+ [YYYY,MM,DD,Hour,Min,Sec,round(N3/1000)]),
+ lists:flatten(FormatDate).
+