1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
|
module Oxidized
require 'asetus'
class NoConfig < OxidizedError; end
class Config
Root = File.join ENV['HOME'], '.config', 'oxidized'
Crash = File.join Root, 'crash'
InputDir = File.join Directory, %w(lib oxidized input)
OutputDir = File.join Directory, %w(lib oxidized output)
ModelDir = File.join Directory, %w(lib oxidized model)
SourceDir = File.join Directory, %w(lib oxidized source)
Sleep = 1
module Vars
# convenience method for accessing node, group or global level user variables
# nil values will be ignored
def vars name
r = @node.vars[name]
r ||= CFG.groups[@node.group].vars[name.to_s] if CFG.groups.has_key?(@node.group)
r ||= CFG.vars[name.to_s]
end
end
end
class << self
attr_accessor :mgr
end
CFGS = Asetus.new :name=>'oxidized', :load=>false, :key_to_s=>true
CFGS.default.username = 'username'
CFGS.default.password = 'password'
CFGS.default.model = 'junos'
CFGS.default.interval = 3600
CFGS.default.log = File.join Config::Root, 'log'
CFGS.default.debug = false
CFGS.default.threads = 30
CFGS.default.timeout = 30
CFGS.default.prompt = /^([\w.@-]+[#>]\s?)$/
CFGS.default.rest = '0.0.0.0:8888' # or false to disable
CFGS.default.vars = {} # could be 'enable'=>'enablePW'
CFGS.default.groups = {} # group level configuration
CFGS.default.remove_secret = false # runs cmd(:secret) blocks if true
CFGS.default.input.default = 'ssh, telnet'
CFGS.default.input.ssh.secure = false # complain about changed certs
CFGS.default.output.default = 'file' # file, git
CFGS.default.source.default = 'csv' # csv, sql
CFGS.default.model_map = {
'cisco' => 'ios',
'juniper' => 'junos',
}
CFGS.load # load system+user configs, merge to Config.cfg
CFG = CFGS.cfg # convenienence, instead of Config.cfg.password, CFG.password
Log.level = Logger::INFO unless CFG.debug
Log.file = CFG.log if CFG.log
raise NoConfig, 'edit ~/.config/oxidized/config' if CFGS.create
end
|