%PDF- %PDF-
Mini Shell

Mini Shell

Direktori : /usr/lib/python2.7/site-packages/salt/modules/
Upload File :
Create Path :
Current File : //usr/lib/python2.7/site-packages/salt/modules/ipmi.pyc

�
���^c	@@sdZddlmZmZmZddlmZd+Zy$ddl	m
Z
ddlmZWn"e
k
r�Zeje�ZnXdZd�Zd�Zd	efd
��YZdefd��YZd+d,ed+d
�Zd�Zddeeedddd�Zddd�Zdd�Zdeeedd�Zdd�Zd�Zed�Z dd+d�Z!d�Z"d�Z#d�Z$d�Z%d ed!�Z&d"eed#�Z'ed$d%�Z(dd&�Z)dd'�Z*dd(�Z+deeedd)�Z,dd*�Z-d+S(-u&
Support IPMI commands over LAN. This module does not talk to the local
systems hardware through IPMI drivers. It uses a python module `pyghmi`.

:depends: Python module pyghmi.
    You can install pyghmi using pip:

    .. code-block:: bash

        pip install pyghmi

:configuration: The following configuration defaults can be
    define (pillar or config files):

    .. code-block:: python

        ipmi.config:
            api_host: 127.0.0.1
            api_user: admin
            api_pass: apassword
            api_port: 623
            api_kg: None

    Usage can override the config defaults:

    .. code-block:: bash

            salt-call ipmi.get_user api_host=myipmienabled.system
                                    api_user=admin api_pass=pass
                                    uid=1
i(tabsolute_importtprint_functiontunicode_literals(tsix(tcommand(tsessionuipmicC@stdktfS(N(t
IMPORT_ERRtNone(((s5/usr/lib/python2.7/site-packages/salt/modules/ipmi.pyt__virtual__3scK@s�idd6dd6dd6dd6dd	6d
d6}dt�krkd
jt�}|jtd|i��nx,t|�t|�@D]}||||<q�W|S(u
    Return configuration
    u	localhostuapi_hostiouapi_portuadminuapi_useruuapi_passuapi_kgiuapi_login_timeoutu__salt__u
{0}.configu
config.getN(Rtglobalstformatt__virtualname__tupdatet__salt__tset(tkwargstconfigt
config_keytk((s5/usr/lib/python2.7/site-packages/salt/modules/ipmi.pyt_get_config7s
t_IpmiCommandcB@s)eZdZd�Zd�Zd�ZRS(cK@sQt|�}tjd|dd|dd|dd|dd	|d
�|_dS(Ntbmcuapi_hosttuseriduapi_usertpassworduapi_passtportuapi_porttkguapi_kg(RRtCommandto(tselfRR((s5/usr/lib/python2.7/site-packages/salt/modules/ipmi.pyt__init__NscC@s|jS(N(R(R((s5/usr/lib/python2.7/site-packages/salt/modules/ipmi.pyt	__enter__TscC@s |jr|jjj�ndS(N(Rtipmi_sessiontlogout(Rttypetvaluet	traceback((s5/usr/lib/python2.7/site-packages/salt/modules/ipmi.pyt__exit__Ws	N(t__name__t
__module__RRRRR$(((s5/usr/lib/python2.7/site-packages/salt/modules/ipmi.pyRKs		t_IpmiSessioncB@s2eZdZd�Zd�Zd�Zd�ZRS(cC@s#d|krt|d��ndS(Nuerror(t	Exception(Rtresponse((s5/usr/lib/python2.7/site-packages/salt/modules/ipmi.pyt_onlogon_sc
K@s�t|�}tjd|dd|dd|dd|dd	|d
d|j�|_x3|jjs�|d|j_|jjd
d�qYWd|j_dS(NRuapi_hostRuapi_userRuapi_passRuapi_portRuapi_kgtonlogonuapi_login_timeoutttimeoutii(RRtSessionR*Rtloggedt
maxtimeouttwait_for_rsp(RRR((s5/usr/lib/python2.7/site-packages/salt/modules/ipmi.pyRcs



cC@s|jS(N(R(R((s5/usr/lib/python2.7/site-packages/salt/modules/ipmi.pyRqscC@s|jr|jj�ndS(N(RR (RR!R"R#((s5/usr/lib/python2.7/site-packages/salt/modules/ipmi.pyR$ts	N(R%R&RRR*RRR$(((s5/usr/lib/python2.7/site-packages/salt/modules/ipmi.pyR'\s
			c	K@sYt|��G}|jdt|�dt|�d|d|d|d|�}|SWdQXdS(u
    Send raw ipmi command

    This allows arbitrary IPMI bytes to be issued.  This is commonly used
    for certain vendor specific commands.

    :param netfn: Net function number
    :param command: Command value
    :param bridge_request: The target slave address and channel number for
                        the bridge request.
    :param data: Command data as a tuple or list
    :param kwargs:
        - api_host=127.0.0.1
        - api_user=admin
        - api_pass=example
        - api_port=623
        - api_kg=None

    :returns: dict -- The response from IPMI device

    CLI Examples:

    .. code-block:: bash

        salt-call ipmi.raw_command netfn=0x06 command=0x46 data=[0x02]
        # this will return the name of the user with id 2 in bytes
    tnetfnRtbridge_requesttdatatretryt
delay_xmitN(R'traw_commandtint(	R1RR2R3R4R5Rtstr((s5/usr/lib/python2.7/site-packages/salt/modules/ipmi.pyR6ys	cK@sQy6d|krd|d<nt|��}tSWdQXWntk
rL}tSXtS(uV
    Returns True if connection success.
    This uses an aggressive timeout value!

    :param kwargs:
        - api_host=127.0.0.1
        - api_user=admin
        - api_pass=example
        - api_port=623
        - api_kg=None

    CLI Examples:

    .. code-block:: bash

        salt-call ipmi.fast_connect_test api_host=172.168.0.9
    uapi_login_timeoutiN(R'tTrueR(tFalse(RR8te((s5/usr/lib/python2.7/site-packages/salt/modules/ipmi.pytfast_connect_test�s
iunon_volatileualwaysu
administratorc

K@s;t|��)}	|	j||||||||�SWdQXdS(u�
    Set channel access

    :param channel: number [1:7]

    :param access_update_mode:
        - 'dont_change'  = don't set or change Channel Access
        - 'non_volatile' = set non-volatile Channel Access
        - 'volatile'     = set volatile (active) setting of Channel Access

    :param alerting:
        PEF Alerting Enable/Disable

        - True  = enable PEF Alerting
        - False = disable PEF Alerting on this channel
          (Alert Immediate command can still be used to generate alerts)

    :param per_msg_auth:
        Per-message Authentication

        - True  = enable
        - False = disable Per-message Authentication. [Authentication required to
          activate any session on this channel, but authentication not
          used on subsequent packets for the session.]

    :param user_level_auth:
        User Level Authentication Enable/Disable

        - True  = enable User Level Authentication. All User Level commands are
          to be authenticated per the Authentication Type that was
          negotiated when the session was activated.
        - False = disable User Level Authentication. Allow User Level commands to
          be executed without being authenticated.
          If the option to disable User Level Command authentication is
          accepted, the BMC will accept packets with Authentication Type
          set to None if they contain user level commands.
          For outgoing packets, the BMC returns responses with the same
          Authentication Type that was used for the request.

    :param access_mode:
        Access Mode for IPMI messaging (PEF Alerting is enabled/disabled
        separately from IPMI messaging)

        - disabled = disabled for IPMI messaging
        - pre_boot = pre-boot only channel only available when system is
          in a powered down state or in BIOS prior to start of boot.
        - always   = channel always available regardless of system mode.
          BIOS typically dedicates the serial connection to the BMC.
        - shared   = same as always available, but BIOS typically leaves the
          serial port available for software use.

    :param privilege_update_mode:
        Channel Privilege Level Limit. This value sets the maximum privilege
        level that can be accepted on the specified channel.

        - dont_change  = don't set or change channel Privilege Level Limit
        - non_volatile = non-volatile Privilege Level Limit according
        - volatile     = volatile setting of Privilege Level Limit

    :param privilege_level:
        Channel Privilege Level Limit

        - reserved      = unused
        - callback
        - user
        - operator
        - administrator
        - proprietary   = used by OEM

    :param kwargs:
        - api_host=127.0.0.1
        - api_user=admin
        - api_pass=example
        - api_port=623
        - api_kg=None

    CLI Examples:

    .. code-block:: bash

        salt-call ipmi.set_channel_access privilege_level='administrator'
    N(Rtset_channel_access(
tchanneltaccess_update_modetalertingtper_msg_authtuser_level_authtaccess_modetprivilege_update_modetprivilege_levelRR8((s5/usr/lib/python2.7/site-packages/salt/modules/ipmi.pyR>�sVcK@s&t|��}|j|�SWdQXdS(u�
    :param kwargs:api_host='127.0.0.1' api_user='admin' api_pass='example' api_port=623

    :param channel: number [1:7]

    :param read_mode:
        - non_volatile  = get non-volatile Channel Access
        - volatile      = get present volatile (active) setting of Channel Access

    :param kwargs:
        - api_host=127.0.0.1
        - api_user=admin
        - api_pass=example
        - api_port=623
        - api_kg=None

    Return Data

        A Python dict with the following keys/values:

        .. code-block:: python

            {
                alerting:
                per_msg_auth:
                user_level_auth:
                access_mode:{ (ONE OF)
                    0: 'disabled',
                    1: 'pre_boot',
                    2: 'always',
                    3: 'shared'
                }
                privilege_level: { (ONE OF)
                    1: 'callback',
                    2: 'user',
                    3: 'operator',
                    4: 'administrator',
                    5: 'proprietary',
                }
            }

    CLI Examples:

    .. code-block:: bash

        salt-call ipmi.get_channel_access channel=1
    N(Rtget_channel_access(R?t	read_modeRR8((s5/usr/lib/python2.7/site-packages/salt/modules/ipmi.pyRGs0cK@s&t|��}|j|�SWdQXdS(u
    Get channel info

    :param channel: number [1:7]
    :param kwargs:
        - api_host=127.0.0.1
        - api_user=admin
        - api_pass=example
        - api_port=623
        - api_kg=None

    Return Data
        channel session supports

        .. code-block:: none

                - no_session: channel is session-less
                - single: channel is single-session
                - multi: channel is multi-session
                - auto: channel is session-based (channel could alternate between
                    single- and multi-session operation, as can occur with a
                    serial/modem channel that supports connection mode auto-detect)

    CLI Examples:

    .. code-block:: bash

        salt-call ipmi.get_channel_info
    N(Rtget_channel_info(R?RR8((s5/usr/lib/python2.7/site-packages/salt/modules/ipmi.pyRILscK@s5t|��#}|j||||||�SWdQXdS(u#	
    Set user access

    :param uid: user number [1:16]

    :param channel: number [1:7]

    :param callback:
        User Restricted to Callback

        - False = User Privilege Limit is determined by the User Privilege Limit
          parameter, below, for both callback and non-callback connections.
        - True  = User Privilege Limit is determined by the User Privilege Limit
          parameter for callback connections, but is restricted to Callback
          level for non-callback connections. Thus, a user can only initiate
          a Callback when they 'call in' to the BMC, but once the callback
          connection has been made, the user could potentially establish a
          session as an Operator.

    :param link_auth: User Link authentication enable/disable (used to enable
        whether this user's name and password information will be used for link
        authentication, e.g. PPP CHAP) for the given channel. Link
        authentication itself is a global setting for the channel and is
        enabled/disabled via the serial/modem configuration parameters.

    :param ipmi_msg: User IPMI Messaging: (used to enable/disable whether
        this user's name and password information will be used for IPMI
        Messaging. In this case, 'IPMI Messaging' refers to the ability to
        execute generic IPMI commands that are not associated with a
        particular payload type. For example, if IPMI Messaging is disabled for
        a user, but that user is enabled for activating the SOL
        payload type, then IPMI commands associated with SOL and session
        management, such as Get SOL Configuration Parameters and Close Session
        are available, but generic IPMI commands such as Get SEL Time are
        unavailable.)

    :param privilege_level:
        User Privilege Limit. (Determines the maximum privilege level that the
        user is allowed to switch to on the specified channel.)

        - callback
        - user
        - operator
        - administrator
        - proprietary
        - no_access

    :param kwargs:
        - api_host=127.0.0.1
        - api_user=admin
        - api_pass=example
        - api_port=623
        - api_kg=None

    CLI Examples:

    .. code-block:: bash

        salt-call ipmi.set_user_access uid=2 privilege_level='operator'
    N(Rtset_user_access(tuidR?tcallbackt	link_authtipmi_msgRFRR8((s5/usr/lib/python2.7/site-packages/salt/modules/ipmi.pyRJns>cK@s,t|��}|j|d|�SWdQXdS(uE
    Get user access

    :param uid: user number [1:16]
    :param channel: number [1:7]
    :param kwargs:
        - api_host=127.0.0.1
        - api_user=admin
        - api_pass=example
        - api_port=623
        - api_kg=None

    Return Data

    .. code-block:: none

        channel_info:
            - max_user_count = maximum number of user IDs on this channel
            - enabled_users = count of User ID slots presently in use
            - users_with_fixed_names = count of user IDs with fixed names
        access:
            - callback
            - link_auth
            - ipmi_msg
            - privilege_level: [reserved, callback, user, operator
                               administrator, proprietary, no_access]

    CLI Examples:

    .. code-block:: bash

        salt-call ipmi.get_user_access uid=2
    R?N(Rtget_user_access(RKR?RR8((s5/usr/lib/python2.7/site-packages/salt/modules/ipmi.pyRO�s#cK@s)t|��}|j||�SWdQXdS(ue
    Set user name

    :param uid: user number [1:16]
    :param name: username (limit of 16bytes)
    :param kwargs:
        - api_host=127.0.0.1
        - api_user=admin
        - api_pass=example
        - api_port=623
        - api_kg=None

    CLI Examples:

    .. code-block:: bash

        salt-call ipmi.set_user_name uid=2 name='steverweber'
    N(Rt
set_user_name(RKtnameRR8((s5/usr/lib/python2.7/site-packages/salt/modules/ipmi.pyRP�scK@s,t|��}|j|dt�SWdQXdS(u[
    Get user name

    :param uid: user number [1:16]
    :param return_none_on_error: return None on error
    :param kwargs:
        - api_host=127.0.0.1
        - api_user=admin
        - api_pass=example
        - api_port=623
        - api_kg=None

    CLI Examples:

    .. code-block:: bash

        salt-call ipmi.get_user_name uid=2
    treturn_none_on_errorN(Rt
get_user_nameR:(RKRRRR8((s5/usr/lib/python2.7/site-packages/salt/modules/ipmi.pyRS�suset_passwordc
K@s2t|�� }|j|ddd|�WdQXtS(u�
    Set user password and (modes)

    :param uid: id number of user.  see: get_names_uid()['name']

    :param mode:
        - disable       = disable user connections
        - enable        = enable user connections
        - set_password  = set or ensure password
        - test_password = test password is correct
    :param password: max 16 char string
        (optional when mode is [disable or enable])
    :param kwargs:
        - api_host=127.0.0.1
        - api_user=admin
        - api_pass=example
        - api_port=623
        - api_kg=None

    :return:
        True on success
        when mode = test_password, return False on bad password

    CLI Example:

    .. code-block:: bash

        salt-call ipmi.set_user_password api_host=127.0.0.1 api_user=admin api_pass=pass
                                         uid=1 password=newPass
        salt-call ipmi.set_user_password uid=1 mode=enable
    tmodeuset_passwordRN(Rtset_user_passwordR:(RKRTRRR8((s5/usr/lib/python2.7/site-packages/salt/modules/ipmi.pyRUs cK@s#t|��}|j�SWdQXdS(u
    Get Summarize health

    This provides a summary of the health of the managed system.
    It additionally provides an iterable list of reasons for
    warning, critical, or failed assessments.

    good health: {'badreadings': [], 'health': 0}

    :param kwargs:
        - api_host=127.0.0.1
        - api_user=admin
        - api_pass=example
        - api_port=623
        - api_kg=None

    CLI Example:

    .. code-block:: bash

        salt-call ipmi.get_health api_host=127.0.0.1 api_user=admin api_pass=pass
    N(Rt
get_health(RR8((s5/usr/lib/python2.7/site-packages/salt/modules/ipmi.pyRV*scK@s't|��}|j�dSWdQXdS(u�
    Get current power state

    The response, if successful, should contain 'powerstate' key and
    either 'on' or 'off' to indicate current state.

    :param kwargs:
        - api_host=127.0.0.1
        - api_user=admin
        - api_pass=example
        - api_port=623
        - api_kg=None

    CLI Example:

    .. code-block:: bash

        salt-call ipmi.get_power api_host=127.0.0.1 api_user=admin api_pass=pass
    u
powerstateN(Rt	get_power(RR8((s5/usr/lib/python2.7/site-packages/salt/modules/ipmi.pyRWEsc	K@ssddl}t|��U}i}xE|j�D]7}|r.|jt|��}|||jd�<q.q.WWdQX|S(uX
    Get sensor readings

    Iterates sensor reading objects

    :param kwargs:
        - api_host=127.0.0.1
        - api_user=admin
        - api_pass=example
        - api_port=623
        - api_kg=None

    CLI Example:

    .. code-block:: bash

        salt-call ipmi.get_sensor_data api_host=127.0.0.1 api_user=admin api_pass=pass
    iNuname(tastRtget_sensor_datatliteral_evaltreprtpop(RRXR8R3treadingR9((s5/usr/lib/python2.7/site-packages/salt/modules/ipmi.pyRY]s cK@s#t|��}|j�SWdQXdS(u9
    Get current boot device override information.

    Provides the current requested boot device.  Be aware that not all IPMI
    devices support this.  Even in BMCs that claim to, occasionally the
    BIOS or UEFI fail to honor it. This is usually only applicable to the
    next reboot.

    :param kwargs:
        - api_host=127.0.0.1
        - api_user=admin
        - api_pass=example
        - api_port=623
        - api_kg=None

    CLI Example:

    .. code-block:: bash

        salt-call ipmi.get_bootdev api_host=127.0.0.1 api_user=admin api_pass=pass
    N(Rtget_bootdev(RR8((s5/usr/lib/python2.7/site-packages/salt/modules/ipmi.pyR^zsupower_onc
K@sn|tks|dkr!d}n|tks9|dkrBd}nt|��}|j|d|�SWdQXdS(uj
    Request power state change

    :param name:
        * power_on -- system turn on
        * power_off -- system turn off (without waiting for OS)
        * shutdown -- request OS proper shutdown
        * reset -- reset (without waiting for OS)
        * boot -- If system is off, then 'on', else 'reset'

    :param ensure: If (bool True), do not return until system actually completes
                requested state change for 300 seconds.
                If a non-zero (int), adjust the wait time to the
                requested number of seconds
    :param kwargs:
        - api_host=127.0.0.1
        - api_user=admin
        - api_pass=example
        - api_port=623
        - api_kg=None

    :returns: dict -- A dict describing the response retrieved

    CLI Examples:

    .. code-block:: bash

        salt-call ipmi.set_power state=shutdown wait=True
    upower_onuonu	power_offuofftwaitN(R:R;Rt	set_power(tstateR_RR8((s5/usr/lib/python2.7/site-packages/salt/modules/ipmi.pyR`�s		udefaultcK@s&t|��}|j|�SWdQXdS(u�
    Set boot device to use on next reboot

    :param bootdev:
        - network: Request network boot
        - hd: Boot from hard drive
        - safe: Boot from hard drive, requesting 'safe mode'
        - optical: boot from CD/DVD/BD drive
        - setup: Boot into setup utility
        - default: remove any IPMI directed boot device
          request

    :param persist: If true, ask that system firmware use this device
                    beyond next boot.  Be aware many systems do not honor
                    this

    :param uefiboot: If true, request UEFI boot explicitly.  Strictly
                    speaking, the spec suggests that if not set, the system
                    should BIOS boot and offers no "don't care" option.
                    In practice, this flag not being set does not preclude
                    UEFI boot on any system I've encountered.

    :param kwargs:
        - api_host=127.0.0.1
        - api_user=admin
        - api_pass=example
        - api_port=623
        - api_kg=None

    :returns: dict or True -- If callback is not provided, the response

    CLI Examples:

    .. code-block:: bash

        salt-call ipmi.set_bootdev bootdev=network persist=True
    N(Rtset_bootdev(tbootdevtpersisttuefibootRR8((s5/usr/lib/python2.7/site-packages/salt/modules/ipmi.pyRb�s&iXc	K@s/t|��}|jd|d|�SWdQXdS(u2
    Request identify light

    Request the identify light to turn off, on for a duration,
    or on indefinitely.  Other than error exceptions,

    :param on: Set to True to force on or False to force off
    :param duration: Set if wanting to request turn on for a duration
                    in seconds, None = indefinitely.
    :param kwargs:
        - api_host=127.0.0.1
        - api_user=admin
        - api_pass=example
        - api_port=623
        - api_kg=None

    CLI Examples:

    .. code-block:: bash

        salt-call ipmi.set_identify
    tontdurationN(Rtset_identify(RfRgRR8((s5/usr/lib/python2.7/site-packages/salt/modules/ipmi.pyRh�scK@s$td|dd|�}|ddS(uR
    Get max users in channel

    :param channel: number [1:7]
    :param kwargs:
        - api_host=127.0.0.1
        - api_user=admin
        - api_pass=example
        - api_port=623
        - api_kg=None
    :return: int -- often 16

    CLI Examples:

    .. code-block:: bash

        salt-call ipmi.get_channel_max_user_count
    R?RKiuchannel_infoumax_user_count(RO(R?Rtaccess((s5/usr/lib/python2.7/site-packages/salt/modules/ipmi.pytget_channel_max_user_count�scK@sKt||�}t|||�}i|d6|d6|d6|dd6}|S(u�
    Get user from uid and access on channel

    :param uid: user number [1:16]
    :param channel: number [1:7]
    :param kwargs:
        - api_host=127.0.0.1
        - api_user=admin
        - api_pass=example
        - api_port=623
        - api_kg=None

    Return Data

    .. code-block:: none

        name: (str)
        uid: (int)
        channel: (int)
        access:
            - callback (bool)
            - link_auth (bool)
            - ipmi_msg (bool)
            - privilege_level: (str)[callback, user, operatorm administrator,
                                    proprietary, no_access]

    CLI Examples:

    .. code-block:: bash

        salt-call ipmi.get_user uid=2
    unameuuiduchanneluaccess(RSRO(RKR?RRQRiR3((s5/usr/lib/python2.7/site-packages/salt/modules/ipmi.pytget_users!&cK@s&t|��}|j|�SWdQXdS(u}
    get list of users and access information

    :param channel: number [1:7]

    :param kwargs:
        - api_host=127.0.0.1
        - api_user=admin
        - api_pass=example
        - api_port=623
        - api_kg=None

    :return:
        - name: (str)
        - uid: (int)
        - channel: (int)
        - access:
            - callback (bool)
            - link_auth (bool)
            - ipmi_msg (bool)
            - privilege_level: (str)[callback, user, operatorm administrator,
              proprietary, no_access]

    CLI Examples:

    .. code-block:: bash

        salt-call ipmi.get_users api_host=172.168.0.7
    N(Rt	get_users(R?Rtc((s5/usr/lib/python2.7/site-packages/salt/modules/ipmi.pyRl=sc

K@s;t|��)}	|	j||||||||�SWdQXdS(u�
    create/ensure a user is created with provided settings.

    :param privilege_level:
        User Privilege Limit. (Determines the maximum privilege level that
        the user is allowed to switch to on the specified channel.)
        * callback
        * user
        * operator
        * administrator
        * proprietary
        * no_access
    :param kwargs:
        - api_host=127.0.0.1
        - api_user=admin
        - api_pass=example
        - api_port=623
        - api_kg=None

    CLI Examples:

    .. code-block:: bash

        salt-call ipmi.create_user uid=2 name=steverweber api_host=172.168.0.7 api_pass=nevertell
    N(Rtcreate_user(
RKRQRR?RLRMRNRFRRm((s5/usr/lib/python2.7/site-packages/salt/modules/ipmi.pyRn_scK@s)t|��}|j||�SWdQXdS(uK
    Delete user (helper)

    :param uid: user number [1:16]
    :param channel: number [1:7]
    :param kwargs:
        - api_host=127.0.0.1
        - api_user=admin
        - api_pass=example
        - api_port=623
        - api_kg=None

    CLI Examples:

    .. code-block:: bash

        salt-call ipmi.user_delete uid=2
    N(Rtuser_delete(RKR?RRm((s5/usr/lib/python2.7/site-packages/salt/modules/ipmi.pyRosN((.t__doc__t
__future__RRRtsalt.extRRRtpyghmi.ipmiRtpyghmi.ipmi.privateRR(text	text_typeRRRtobjectRR'R:R6R=R;R>RGRIRJRORPRSRURVRWRYR^R`RbRhRjRkRlRnRo(((s5/usr/lib/python2.7/site-packages/salt/modules/ipmi.pyt<module> sP		&		X4"A'	%				&*'"

Zerion Mini Shell 1.0