/usr/bin/pysnmpbulkwalk is in python-pysnmp4-apps 0.3.2-1.
This file is owned by root:root, with mode 0o755.
The actual contents of the file can be viewed below.
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 | #!/usr/bin/python
#
# GETBULK command generator
#
# Copyright 1999-2012 by Ilya Etingof <ilya@glas.net>.
#
import sys, time
from pysnmp_apps.cli import main, msgmod, secmod, target, pdu, mibview, base
from pysnmp.entity import engine
from pysnmp.entity.rfc3413 import cmdgen
from pysnmp.proto import rfc1902
from pysnmp import error
def getUsage():
return "Usage: %s [OPTIONS] <AGENT> <PARAMETERS>\n\
%s%s%s%s\
GETBULK options:\n\
-C BULKOPTS: set various application specific behaviours:\n\
n<NUM> set non-repeaters to <NUM>\n\
r<NUM> set max-repetitions to <NUM>\n\
c: do not check returned OIDs are increasing\n\
t: display wall-clock time to complete the request\n\
p: print the number of variables found\n\
%s%s" % (
sys.argv[0],
main.getUsage(),
msgmod.getUsage(),
secmod.getUsage(),
mibview.getUsage(),
target.getUsage(),
pdu.getReadUsage()
)
# Construct c/l interpreter for this app
class Scanner(
msgmod.MPScannerMixIn,
secmod.SMScannerMixIn,
mibview.MibViewScannerMixIn,
target.TargetScannerMixIn,
pdu.ReadPduScannerMixIn,
main.MainScannerMixIn,
base.ScannerTemplate
):
def t_appopts(self, s):
r' -C '
self.rv.append(base.ConfigToken('appopts'))
class Parser(
msgmod.MPParserMixIn,
secmod.SMParserMixIn,
mibview.MibViewParserMixIn,
target.TargetParserMixIn,
pdu.ReadPduParserMixIn,
main.MainParserMixIn,
base.ParserTemplate
):
def p_appOptions(self, args):
'''
Option ::= ApplicationOption
ApplicationOption ::= appopts whitespace string
ApplicationOption ::= appopts string
'''
class __Generator(base.GeneratorTemplate):
def n_ApplicationOption(self, cbCtx, node):
snmpEngine, ctx = cbCtx
if len(node) > 2:
opt = node[2].attr
else:
opt = node[1].attr
p = n = r = None
for c in opt:
if c == 'n':
p = n = []
elif c == 'r':
p = r = []
elif c == 'c':
ctx['ignoreNonIncreasingOids'] = 1
p = None
elif c == 't':
ctx['displayWallClock'] = time.time()
p = None
elif c == 'p':
ctx['reportFoundVars'] = 1
p = None
elif p is not None and c >= '0' and c <= '9':
p.append(c)
else:
raise error.PySnmpError('bad -C option - "%s"' % c)
if n is not None:
ctx['nonRepeaters'] = int(''.join(n))
if r is not None:
ctx['maxRepetitions'] = int(''.join(r))
def generator(cbCtx, ast):
snmpEngine, ctx = cbCtx
return __Generator().preorder((snmpEngine, ctx), ast)
snmpEngine = engine.SnmpEngine()
try:
# Parse c/l into AST
ast = Parser().parse(
Scanner().tokenize(' '.join(sys.argv[1:]))
)
ctx = {}
# Apply configuration to SNMP entity
main.generator((snmpEngine, ctx), ast)
msgmod.generator((snmpEngine, ctx), ast)
secmod.generator((snmpEngine, ctx), ast)
mibview.generator((snmpEngine, ctx), ast)
target.generator((snmpEngine, ctx), ast)
pdu.readPduGenerator((snmpEngine, ctx), ast)
generator((snmpEngine, ctx), ast)
except error.PySnmpError:
sys.stderr.write('Error: %s\n%s' % (sys.exc_info()[1], getUsage()))
sys.exit(-1)
ctx['myHeadVars'] = [ rfc1902.ObjectName(x[0]) for x in ctx['varBinds'] ]
# Run SNMP engine
def cbFun(sendRequestHandle, errorIndication, errorStatus, errorIndex,
varBindTable, cbCtx):
if errorIndication:
if errorIndication != 'oidNotIncreasing' or \
not ctx.get('ignoreNonIncreasingOids'):
sys.stderr.write('Error: %s\n' % errorIndication)
return
if errorStatus:
sys.stderr.write(
'%s at %s\n' %
( errorStatus.prettyPrint(),
errorIndex and varBindTable[0][int(errorIndex)-1] or '?' )
)
return
for varBindRow in varBindTable:
colIdx = -1; inTableFlag = 0
for oid, val in varBindRow:
colIdx = colIdx + 1
sys.stdout.write('%s\n' % cbCtx['mibViewProxy'].getPrettyOidVal(
cbCtx['mibViewController'], oid, val
))
if cbCtx['myHeadVars'][colIdx].isPrefixOf(oid):
inTableFlag = 1
if cbCtx.get('reportFoundVars'):
cbCtx['reportFoundVars'] = cbCtx['reportFoundVars'] + len(varBindRow)
if not inTableFlag:
return # stop on end-of-table
return 1 # continue walking
cmdgen.BulkCommandGenerator().sendReq(
snmpEngine, ctx['addrName'],
ctx.get('nonRepeaters', 0), ctx.get('maxRepetitions', 25),
ctx['varBinds'], cbFun, ctx,
ctx.get('contextEngineId'), ctx.get('contextName', '')
)
try:
snmpEngine.transportDispatcher.runDispatcher()
except error.PySnmpError:
sys.stderr.write('Error: %s\n' % sys.exc_info()[1])
sys.exit(-1)
if ctx.get('reportFoundVars'):
sys.stdout.write('Variables found: %s\n' % (ctx['reportFoundVars'] - 1))
if ctx.get('displayWallClock'):
sys.stdout.write('Total traversal time = %.4f seconds\n' % (time.time() - ctx['displayWallClock']))
|