Script xalt_file_to_db_in_py
[hide private]
[frames] | no frames]

Script xalt_file_to_db_in_py

source code

Classes [hide private]
  CmdLineOptions
Command line Options class
Functions [hide private]
 
link_json_to_db(xalt, listFn, reverseMapT, linkFnA)
Reads in each link file name and converts json to python table and sends it to be written to DB.
source code
 
run_json_to_db(xalt, listFn, reverseMapT, runFnA)
Reads in each run file name and converts json to python table and sends it to be written to DB.
source code
 
passwd_generator()
This generator walks the /etc/passwd file and returns the next user and home directory.
source code
 
main()
Walks the list of users via the passwd_generator and load the link and run files.
source code
Variables [hide private]
  logger = config_logger()
Function Details [hide private]

link_json_to_db(xalt, listFn, reverseMapT, linkFnA)

source code 

Reads in each link file name and converts json to python table and sends it to be written to DB.

Parameters:
  • xalt - An XALTdb object.
  • listFn - A flag that causes the name of the file to be written to stderr.
  • reverseMapT - The Reverse Map Table.
  • linkFnA - An array of link file names

run_json_to_db(xalt, listFn, reverseMapT, runFnA)

source code 

Reads in each run file name and converts json to python table and sends it to be written to DB.

Parameters:
  • xalt - An XALTdb object.
  • listFn - A flag that causes the name of the file to be written to stderr.
  • reverseMapT - The Reverse Map Table.
  • runFnA - An array of run file names

passwd_generator()

source code 

This generator walks the /etc/passwd file and returns the next user and home directory. If XALT_USERS is set then it used that instead. It is a colon separated list.

Super hack: if the colon separated list has a ";" in it then the first part is the user the second is the home directory. This is use in testing.