zeus
4 years ago
21 changed files with 1913 additions and 1 deletions
@ -0,0 +1,74 @@ |
|||
#FROM alpine:3.11 |
|||
FROM node:alpine3.13 |
|||
|
|||
# Build arguments |
|||
ARG app_version |
|||
ARG user_name='docker' |
|||
ARG user_id='1001' |
|||
ARG group_name='docker' |
|||
ARG group_id='1001' |
|||
|
|||
# Update package repositories and install packages |
|||
RUN apk add \ |
|||
--no-cache \ |
|||
--update \ |
|||
json-c --repository=http://dl-cdn.alpinelinux.org/alpine/edge/main \ |
|||
build-base \ |
|||
bash \ |
|||
curl \ |
|||
ca-certificates \ |
|||
findutils \ |
|||
font-bakoma-ttf \ |
|||
git \ |
|||
graphviz \ |
|||
inotify-tools \ |
|||
make \ |
|||
tzdata \ |
|||
unzip \ |
|||
build-base \ |
|||
libxml2-dev \ |
|||
which \ |
|||
jq \ |
|||
openssh augeas && \ |
|||
mkdir -p ~root/.ssh /etc/authorized_keys && chmod 700 ~root/.ssh/ && \ |
|||
augtool 'set /files/etc/ssh/sshd_config/AuthorizedKeysFile ".ssh/authorized_keys /etc/authorized_keys/%u"' && \ |
|||
augtool 'set /files/etc/ssh/sshd_config/PermitRootLogin yes' && \ |
|||
augtool 'set /files/etc/ssh/sshd_config/PasswordAuthentication yes' && \ |
|||
augtool 'set /files/etc/ssh/sshd_config/Port 22' && \ |
|||
cp -a /etc/ssh /etc/ssh.cache && \ |
|||
ssh-keygen -A && \ |
|||
rm -rf /var/cache/apk/* |
|||
|
|||
|
|||
|
|||
# Create non-system user |
|||
RUN addgroup \ |
|||
--gid "${group_id}" \ |
|||
"${group_name}" \ |
|||
&& adduser \ |
|||
--uid "${user_id}" \ |
|||
--disabled-password \ |
|||
--ingroup $group_name \ |
|||
"${user_name}" \ |
|||
&& mkdir -p /home/${user_name}/run \ |
|||
&& mkdir -p /home/${user_name}/logs \ |
|||
&& mkdir -p /home/${user_name}/project \ |
|||
&& mkdir -p /home/${user_name}/.npm \ |
|||
&& chown -R ${user_name}.${user_name} /home/${user_name} \ |
|||
&& chmod -R 755 /home/${user_name} \ |
|||
&& npm install pm2@latest @vue/cli @vue/cli-service-global -g |
|||
|
|||
|
|||
# Set non-system user |
|||
USER "${user_name}" |
|||
ENV USER="${user_name}" |
|||
ENV HOME="/home/${user_name}" |
|||
|
|||
|
|||
WORKDIR /home/${user_name}/project |
|||
|
|||
VOLUME /home/${user_name}/project |
|||
|
|||
EXPOSE 80 443 8080 3000 3080 |
|||
|
|||
CMD ["node"] |
@ -0,0 +1,2 @@ |
|||
#!/bin/bash |
|||
docker build -f Dockerfile -t hub.swarmlab.io:5443/hybrid-NodeVueJS . |
@ -1,2 +1,75 @@ |
|||
# hybrid-NodeVueJS |
|||
# hybrid-NodeVuejs ! |
|||
|
|||
|
|||
## LabInstance Linux |
|||
|
|||
|
|||
![alt text](images/swarmlab-network.png "") |
|||
|
|||
|
|||
|
|||
## Quickstart |
|||
|
|||
This is a quickstart guide of howto use this *LabInstance to deploy Vue js applications* |
|||
|
|||
### HowTo use it |
|||
|
|||
|
|||
### Default Configuration |
|||
|
|||
- Working Directory |
|||
|
|||
> /project |
|||
|
|||
- Default user |
|||
|
|||
> docker |
|||
|
|||
- Default password |
|||
|
|||
> docker |
|||
|
|||
- Default password4root |
|||
|
|||
> pass |
|||
|
|||
|
|||
#### Find lab workers |
|||
|
|||
|
|||
> ifconfig |
|||
> |
|||
> nmap -sP 172.130.0.0/24 |
|||
> |
|||
> or |
|||
> |
|||
> /project/bin/swarmlab-nmap |
|||
|
|||
|
|||
#### connect to workers |
|||
|
|||
```bash |
|||
ssh docker@[IP] |
|||
``` |
|||
|
|||
|
|||
#### Create hosts file |
|||
|
|||
|
|||
```bash |
|||
/project/bin/swarmlab-nmap > /project/hosts |
|||
``` |
|||
|
|||
|
|||
--- |
|||
**NOTE:** copy files to all clients |
|||
|
|||
```bash |
|||
while read -r line; |
|||
do |
|||
scp /project/file docker@$line:/some_dir/file |
|||
done < /project/hosts |
|||
``` |
|||
--- |
|||
|
|||
|
|||
|
After Width: | Height: | Size: 80 KiB |
@ -0,0 +1,30 @@ |
|||
#/usr/bin/env bash |
|||
_mpi() |
|||
{ |
|||
local commands_number=${DOTHIS_COMPLETION_COMMANDS_NUMBER:-50} |
|||
local IFS=$'\n' |
|||
local suggestions=($(compgen -W "$(cat $1 | sed 's/\t//')" -- "${COMP_WORDS[1]}")) |
|||
local sug=1 |
|||
if [ "${#suggestions[@]}" == "$sug" ]; then |
|||
local number="${suggestions[0]/%\ */}" |
|||
COMPREPLY=("$number") |
|||
else |
|||
for i in "${!suggestions[@]}"; do |
|||
suggestions[$i]="$(printf '%*s' "-$COLUMNS" "${suggestions[$i]}")" |
|||
done |
|||
|
|||
COMPREPLY=("${suggestions[@]}") |
|||
fi |
|||
} |
|||
_mpi_completions() |
|||
{ |
|||
local LAB_files=${LAB_PATH} |
|||
if [ "${#COMP_WORDS[@]}" == "2" ] && [ "${#COMP_WORDS[@]}" != "3" ]; then |
|||
local file2="/usr/share/swarmlab.io/mpi/commands" |
|||
_mpi "$file2" 1 |
|||
fi |
|||
|
|||
|
|||
} |
|||
complete -F _mpi_completions swarmlab-mpi |
|||
|
@ -0,0 +1 @@ |
|||
export PATH=$PATH:/usr/share/swarmlab.io/mpi |
@ -0,0 +1,127 @@ |
|||
# ~/.bashrc: executed by bash(1) for non-login shells. |
|||
# see /usr/share/doc/bash/examples/startup-files (in the package bash-doc) |
|||
# for examples |
|||
|
|||
# If not running interactively, don't do anything |
|||
case $- in |
|||
*i*) ;; |
|||
*) return;; |
|||
esac |
|||
|
|||
# don't put duplicate lines or lines starting with space in the history. |
|||
# See bash(1) for more options |
|||
HISTCONTROL=ignoreboth |
|||
|
|||
# append to the history file, don't overwrite it |
|||
shopt -s histappend |
|||
|
|||
# for setting history length see HISTSIZE and HISTFILESIZE in bash(1) |
|||
HISTSIZE=1000 |
|||
HISTFILESIZE=2000 |
|||
|
|||
# check the window size after each command and, if necessary, |
|||
# update the values of LINES and COLUMNS. |
|||
shopt -s checkwinsize |
|||
|
|||
# If set, the pattern "**" used in a pathname expansion context will |
|||
# match all files and zero or more directories and subdirectories. |
|||
#shopt -s globstar |
|||
|
|||
# make less more friendly for non-text input files, see lesspipe(1) |
|||
[ -x /usr/bin/lesspipe ] && eval "$(SHELL=/bin/sh lesspipe)" |
|||
|
|||
# set variable identifying the chroot you work in (used in the prompt below) |
|||
if [ -z "${debian_chroot:-}" ] && [ -r /etc/debian_chroot ]; then |
|||
debian_chroot=$(cat /etc/debian_chroot) |
|||
fi |
|||
|
|||
# set a fancy prompt (non-color, unless we know we "want" color) |
|||
case "$TERM" in |
|||
xterm-color|*-256color) color_prompt=yes;; |
|||
esac |
|||
|
|||
# uncomment for a colored prompt, if the terminal has the capability; turned |
|||
# off by default to not distract the user: the focus in a terminal window |
|||
# should be on the output of commands, not on the prompt |
|||
#force_color_prompt=yes |
|||
|
|||
if [ -n "$force_color_prompt" ]; then |
|||
if [ -x /usr/bin/tput ] && tput setaf 1 >&/dev/null; then |
|||
# We have color support; assume it's compliant with Ecma-48 |
|||
# (ISO/IEC-6429). (Lack of such support is extremely rare, and such |
|||
# a case would tend to support setf rather than setaf.) |
|||
color_prompt=yes |
|||
else |
|||
color_prompt= |
|||
fi |
|||
fi |
|||
|
|||
if [ "$color_prompt" = yes ]; then |
|||
PS1='${debian_chroot:+($debian_chroot)}\[\033[01;32m\]\u@\h\[\033[00m\]:\[\033[01;34m\]\w\[\033[00m\]\$ ' |
|||
else |
|||
PS1='${debian_chroot:+($debian_chroot)}\u@\h:\w\$ ' |
|||
fi |
|||
unset color_prompt force_color_prompt |
|||
|
|||
# If this is an xterm set the title to user@host:dir |
|||
case "$TERM" in |
|||
xterm*|rxvt*) |
|||
PS1="\[\e]0;${debian_chroot:+($debian_chroot)}\u@\h: \w\a\]$PS1" |
|||
;; |
|||
*) |
|||
;; |
|||
esac |
|||
|
|||
# enable color support of ls and also add handy aliases |
|||
if [ -x /usr/bin/dircolors ]; then |
|||
test -r ~/.dircolors && eval "$(dircolors -b ~/.dircolors)" || eval "$(dircolors -b)" |
|||
alias ls='ls --color=auto' |
|||
#alias dir='dir --color=auto' |
|||
#alias vdir='vdir --color=auto' |
|||
|
|||
alias grep='grep --color=auto' |
|||
alias fgrep='fgrep --color=auto' |
|||
alias egrep='egrep --color=auto' |
|||
fi |
|||
|
|||
# colored GCC warnings and errors |
|||
#export GCC_COLORS='error=01;31:warning=01;35:note=01;36:caret=01;32:locus=01:quote=01' |
|||
|
|||
# some more ls aliases |
|||
alias ll='ls -alF' |
|||
alias la='ls -A' |
|||
alias l='ls -CF' |
|||
|
|||
# Add an "alert" alias for long running commands. Use like so: |
|||
# sleep 10; alert |
|||
alias alert='notify-send --urgency=low -i "$([ $? = 0 ] && echo terminal || echo error)" "$(history|tail -n1|sed -e '\''s/^\s*[0-9]\+\s*//;s/[;&|]\s*alert$//'\'')"' |
|||
|
|||
# Alias definitions. |
|||
# You may want to put all your additions into a separate file like |
|||
# ~/.bash_aliases, instead of adding them here directly. |
|||
# See /usr/share/doc/bash-doc/examples in the bash-doc package. |
|||
|
|||
if [ -f ~/.bash_aliases ]; then |
|||
. ~/.bash_aliases |
|||
fi |
|||
|
|||
if [ -d /etc/profile.d ]; then |
|||
for i in /etc/profile.d/*.sh; do |
|||
if [ -r $i ]; then |
|||
. $i |
|||
fi |
|||
done |
|||
unset i |
|||
fi |
|||
|
|||
|
|||
# enable programmable completion features (you don't need to enable |
|||
# this, if it's already enabled in /etc/bash.bashrc and /etc/profile |
|||
# sources /etc/bash.bashrc). |
|||
if ! shopt -oq posix; then |
|||
if [ -f /usr/share/bash-completion/bash_completion ]; then |
|||
. /usr/share/bash-completion/bash_completion |
|||
elif [ -f /etc/bash_completion ]; then |
|||
. /etc/bash_completion |
|||
fi |
|||
fi |
@ -0,0 +1,4 @@ |
|||
REGISTRY_ADDR=localhost |
|||
REGISTRY_PORT=5000 |
|||
IMAGE_NAME=sec |
|||
SSH_PORT=2222 |
@ -0,0 +1,15 @@ |
|||
map <C-e> :NERDTreeToggle<CR> |
|||
|
|||
autocmd BufNewFile,BufRead *.vue,*.js set syntax=verilog tabstop=2|set shiftwidth=2|set noexpandtab autoindent |
|||
augroup remember_folds |
|||
autocmd! |
|||
autocmd BufWinLeave * mkview |
|||
autocmd BufWinEnter * silent! loadview |
|||
augroup END |
|||
" Useful for my Quick Notes feature in my tmuxrc |
|||
augroup QuickNotes |
|||
au BufWrite,VimLeave NOTES.otl mkview |
|||
au BufRead NOTES.otl silent loadview |
|||
augroup END |
|||
set swapfile |
|||
set dir=~/tmp |
@ -0,0 +1,614 @@ |
|||
GNU AFFERO GENERAL PUBLIC LICENSE |
|||
|
|||
Version 3, 19 November 2007 |
|||
|
|||
Copyright (C) 2007 Free Software Foundation, Inc. <http s ://fsf.org/> |
|||
|
|||
Everyone is permitted to copy and distribute verbatim copies of this license |
|||
document, but changing it is not allowed. |
|||
|
|||
Preamble |
|||
|
|||
The GNU Affero General Public License is a free, copyleft license for software |
|||
and other kinds of works, specifically designed to ensure cooperation with |
|||
the community in the case of network server software. |
|||
|
|||
The licenses for most software and other practical works are designed to take |
|||
away your freedom to share and change the works. By contrast, our General |
|||
Public Licenses are intended to guarantee your freedom to share and change |
|||
all versions of a program--to make sure it remains free software for all its |
|||
users. |
|||
|
|||
When we speak of free software, we are referring to freedom, not price. Our |
|||
General Public Licenses are designed to make sure that you have the freedom |
|||
to distribute copies of free software (and charge for them if you wish), that |
|||
you receive source code or can get it if you want it, that you can change |
|||
the software or use pieces of it in new free programs, and that you know you |
|||
can do these things. |
|||
|
|||
Developers that use our General Public Licenses protect your rights with two |
|||
steps: (1) assert copyright on the software, and (2) offer you this License |
|||
which gives you legal permission to copy, distribute and/or modify the software. |
|||
|
|||
A secondary benefit of defending all users' freedom is that improvements made |
|||
in alternate versions of the program, if they receive widespread use, become |
|||
available for other developers to incorporate. Many developers of free software |
|||
are heartened and encouraged by the resulting cooperation. However, in the |
|||
case of software used on network servers, this result may fail to come about. |
|||
The GNU General Public License permits making a modified version and letting |
|||
the public access it on a server without ever releasing its source code to |
|||
the public. |
|||
|
|||
The GNU Affero General Public License is designed specifically to ensure that, |
|||
in such cases, the modified source code becomes available to the community. |
|||
It requires the operator of a network server to provide the source code of |
|||
the modified version running there to the users of that server. Therefore, |
|||
public use of a modified version, on a publicly accessible server, gives the |
|||
public access to the source code of the modified version. |
|||
|
|||
An older license, called the Affero General Public License and published by |
|||
Affero, was designed to accomplish similar goals. This is a different license, |
|||
not a version of the Affero GPL, but Affero has released a new version of |
|||
the Affero GPL which permits relicensing under this license. |
|||
|
|||
The precise terms and conditions for copying, distribution and modification |
|||
follow. |
|||
|
|||
TERMS AND CONDITIONS |
|||
|
|||
0. Definitions. |
|||
|
|||
"This License" refers to version 3 of the GNU Affero General Public License. |
|||
|
|||
"Copyright" also means copyright-like laws that apply to other kinds of works, |
|||
such as semiconductor masks. |
|||
|
|||
"The Program" refers to any copyrightable work licensed under this License. |
|||
Each licensee is addressed as "you". "Licensees" and "recipients" may be individuals |
|||
or organizations. |
|||
|
|||
To "modify" a work means to copy from or adapt all or part of the work in |
|||
a fashion requiring copyright permission, other than the making of an exact |
|||
copy. The resulting work is called a "modified version" of the earlier work |
|||
or a work "based on" the earlier work. |
|||
|
|||
A "covered work" means either the unmodified Program or a work based on the |
|||
Program. |
|||
|
|||
To "propagate" a work means to do anything with it that, without permission, |
|||
would make you directly or secondarily liable for infringement under applicable |
|||
copyright law, except executing it on a computer or modifying a private copy. |
|||
Propagation includes copying, distribution (with or without modification), |
|||
making available to the public, and in some countries other activities as |
|||
well. |
|||
|
|||
To "convey" a work means any kind of propagation that enables other parties |
|||
to make or receive copies. Mere interaction with a user through a computer |
|||
network, with no transfer of a copy, is not conveying. |
|||
|
|||
An interactive user interface displays "Appropriate Legal Notices" to the |
|||
extent that it includes a convenient and prominently visible feature that |
|||
(1) displays an appropriate copyright notice, and (2) tells the user that |
|||
there is no warranty for the work (except to the extent that warranties are |
|||
provided), that licensees may convey the work under this License, and how |
|||
to view a copy of this License. If the interface presents a list of user commands |
|||
or options, such as a menu, a prominent item in the list meets this criterion. |
|||
|
|||
1. Source Code. |
|||
|
|||
The "source code" for a work means the preferred form of the work for making |
|||
modifications to it. "Object code" means any non-source form of a work. |
|||
|
|||
A "Standard Interface" means an interface that either is an official standard |
|||
defined by a recognized standards body, or, in the case of interfaces specified |
|||
for a particular programming language, one that is widely used among developers |
|||
working in that language. |
|||
|
|||
The "System Libraries" of an executable work include anything, other than |
|||
the work as a whole, that (a) is included in the normal form of packaging |
|||
a Major Component, but which is not part of that Major Component, and (b) |
|||
serves only to enable use of the work with that Major Component, or to implement |
|||
a Standard Interface for which an implementation is available to the public |
|||
in source code form. A "Major Component", in this context, means a major essential |
|||
component (kernel, window system, and so on) of the specific operating system |
|||
(if any) on which the executable work runs, or a compiler used to produce |
|||
the work, or an object code interpreter used to run it. |
|||
|
|||
The "Corresponding Source" for a work in object code form means all the source |
|||
code needed to generate, install, and (for an executable work) run the object |
|||
code and to modify the work, including scripts to control those activities. |
|||
However, it does not include the work's System Libraries, or general-purpose |
|||
tools or generally available free programs which are used unmodified in performing |
|||
those activities but which are not part of the work. For example, Corresponding |
|||
Source includes interface definition files associated with source files for |
|||
the work, and the source code for shared libraries and dynamically linked |
|||
subprograms that the work is specifically designed to require, such as by |
|||
intimate data communication or control flow between those |
|||
|
|||
subprograms and other parts of the work. |
|||
|
|||
The Corresponding Source need not include anything that users can regenerate |
|||
automatically from other parts of the Corresponding Source. |
|||
|
|||
The Corresponding Source for a work in source code form is that same work. |
|||
|
|||
2. Basic Permissions. |
|||
|
|||
All rights granted under this License are granted for the term of copyright |
|||
on the Program, and are irrevocable provided the stated conditions are met. |
|||
This License explicitly affirms your unlimited permission to run the unmodified |
|||
Program. The output from running a covered work is covered by this License |
|||
only if the output, given its content, constitutes a covered work. This License |
|||
acknowledges your rights of fair use or other equivalent, as provided by copyright |
|||
law. |
|||
|
|||
You may make, run and propagate covered works that you do not convey, without |
|||
conditions so long as your license otherwise remains in force. You may convey |
|||
covered works to others for the sole purpose of having them make modifications |
|||
exclusively for you, or provide you with facilities for running those works, |
|||
provided that you comply with the terms of this License in conveying all material |
|||
for which you do not control copyright. Those thus making or running the covered |
|||
works for you must do so exclusively on your behalf, under your direction |
|||
and control, on terms that prohibit them from making any copies of your copyrighted |
|||
material outside their relationship with you. |
|||
|
|||
Conveying under any other circumstances is permitted solely under the conditions |
|||
stated below. Sublicensing is not allowed; section 10 makes it unnecessary. |
|||
|
|||
3. Protecting Users' Legal Rights From Anti-Circumvention Law. |
|||
|
|||
No covered work shall be deemed part of an effective technological measure |
|||
under any applicable law fulfilling obligations under article 11 of the WIPO |
|||
copyright treaty adopted on 20 December 1996, or similar laws prohibiting |
|||
or restricting circumvention of such measures. |
|||
|
|||
When you convey a covered work, you waive any legal power to forbid circumvention |
|||
of technological measures to the extent such circumvention is effected by |
|||
exercising rights under this License with respect to the covered work, and |
|||
you disclaim any intention to limit operation or modification of the work |
|||
as a means of enforcing, against the work's users, your or third parties' |
|||
legal rights to forbid circumvention of technological measures. |
|||
|
|||
4. Conveying Verbatim Copies. |
|||
|
|||
You may convey verbatim copies of the Program's source code as you receive |
|||
it, in any medium, provided that you conspicuously and appropriately publish |
|||
on each copy an appropriate copyright notice; keep intact all notices stating |
|||
that this License and any non-permissive terms added in accord with section |
|||
7 apply to the code; keep intact all notices of the absence of any warranty; |
|||
and give all recipients a copy of this License along with the Program. |
|||
|
|||
You may charge any price or no price for each copy that you convey, and you |
|||
may offer support or warranty protection for a fee. |
|||
|
|||
5. Conveying Modified Source Versions. |
|||
|
|||
You may convey a work based on the Program, or the modifications to produce |
|||
it from the Program, in the form of source code under the terms of section |
|||
4, provided that you also meet all of these conditions: |
|||
|
|||
a) The work must carry prominent notices stating that you modified it, and |
|||
giving a relevant date. |
|||
|
|||
b) The work must carry prominent notices stating that it is released under |
|||
this License and any conditions added under section 7. This requirement modifies |
|||
the requirement in section 4 to "keep intact all notices". |
|||
|
|||
c) You must license the entire work, as a whole, under this License to anyone |
|||
who comes into possession of a copy. This License will therefore apply, along |
|||
with any applicable section 7 additional terms, to the whole of the work, |
|||
and all its parts, regardless of how they are packaged. This License gives |
|||
no permission to license the work in any other way, but it does not invalidate |
|||
such permission if you have separately received it. |
|||
|
|||
d) If the work has interactive user interfaces, each must display Appropriate |
|||
Legal Notices; however, if the Program has interactive interfaces that do |
|||
not display Appropriate Legal Notices, your work need not make them do so. |
|||
|
|||
A compilation of a covered work with other separate and independent works, |
|||
which are not by their nature extensions of the covered work, and which are |
|||
not combined with it such as to form a larger program, in or on a volume of |
|||
a storage or distribution medium, is called an "aggregate" if the compilation |
|||
and its resulting copyright are not used to limit the access or legal rights |
|||
of the compilation's users beyond what the individual works permit. Inclusion |
|||
of a covered work in an aggregate does not cause this License to apply to |
|||
the other parts of the aggregate. |
|||
|
|||
6. Conveying Non-Source Forms. |
|||
|
|||
You may convey a covered work in object code form under the terms of sections |
|||
4 and 5, provided that you also convey the machine-readable Corresponding |
|||
Source under the terms of this License, in one of these ways: |
|||
|
|||
a) Convey the object code in, or embodied in, a physical product (including |
|||
a physical distribution medium), accompanied by the Corresponding Source fixed |
|||
on a durable physical medium customarily used for software interchange. |
|||
|
|||
b) Convey the object code in, or embodied in, a physical product (including |
|||
a physical distribution medium), accompanied by a written offer, valid for |
|||
at least three years and valid for as long as you offer spare parts or customer |
|||
support for that product model, to give anyone who possesses the object code |
|||
either (1) a copy of the Corresponding Source for all the software in the |
|||
product that is covered by this License, on a durable physical medium customarily |
|||
used for software interchange, for a price no more than your reasonable cost |
|||
of physically performing this conveying of source, or (2) access to copy the |
|||
Corresponding Source from a network server at no charge. |
|||
|
|||
c) Convey individual copies of the object code with a copy of the written |
|||
offer to provide the Corresponding Source. This alternative is allowed only |
|||
occasionally and noncommercially, and only if you received the object code |
|||
with such an offer, in accord with subsection 6b. |
|||
|
|||
d) Convey the object code by offering access from a designated place (gratis |
|||
or for a charge), and offer equivalent access to the Corresponding Source |
|||
in the same way through the same place at no further charge. You need not |
|||
require recipients to copy the Corresponding Source along with the object |
|||
code. If the place to copy the object code is a network server, the Corresponding |
|||
Source may be on a different server (operated by you or a third party) that |
|||
supports equivalent copying facilities, provided you maintain clear directions |
|||
next to the object code saying where to find the Corresponding Source. Regardless |
|||
of what server hosts the Corresponding Source, you remain obligated to ensure |
|||
that it is available for as long as needed to satisfy these requirements. |
|||
|
|||
e) Convey the object code using peer-to-peer transmission, provided you inform |
|||
other peers where the object code and Corresponding Source of the work are |
|||
being offered to the general public at no charge under subsection 6d. |
|||
|
|||
A separable portion of the object code, whose source code is excluded from |
|||
the Corresponding Source as a System Library, need not be included in conveying |
|||
the object code work. |
|||
|
|||
A "User Product" is either (1) a "consumer product", which means any tangible |
|||
personal property which is normally used for personal, family, or household |
|||
purposes, or (2) anything designed or sold for incorporation into a dwelling. |
|||
In determining whether a product is a consumer product, doubtful cases shall |
|||
be resolved in favor of coverage. For a particular product received by a particular |
|||
user, "normally used" refers to a typical or common use of that class of product, |
|||
regardless of the status of the particular user or of the way in which the |
|||
particular user actually uses, or expects or is expected to use, the product. |
|||
A product is a consumer product regardless of whether the product has substantial |
|||
commercial, industrial or non-consumer uses, unless such uses represent the |
|||
only significant mode of use of the product. |
|||
|
|||
"Installation Information" for a User Product means any methods, procedures, |
|||
authorization keys, or other information required to install and execute modified |
|||
versions of a covered work in that User Product from a modified version of |
|||
its Corresponding Source. The information must suffice to ensure that the |
|||
continued functioning of the modified object code is in no case prevented |
|||
or interfered with solely because modification has been made. |
|||
|
|||
If you convey an object code work under this section in, or with, or specifically |
|||
for use in, a User Product, and the conveying occurs as part of a transaction |
|||
in which the right of possession and use of the User Product is transferred |
|||
to the recipient in perpetuity or for a fixed term (regardless of how the |
|||
transaction is characterized), the Corresponding Source conveyed under this |
|||
section must be accompanied by the Installation Information. But this requirement |
|||
does not apply if neither you nor any third party retains the ability to install |
|||
modified object code on the User Product (for example, the work has been installed |
|||
in ROM). |
|||
|
|||
The requirement to provide Installation Information does not include a requirement |
|||
to continue to provide support service, warranty, or updates for a work that |
|||
has been modified or installed by the recipient, or for the User Product in |
|||
which it has been modified or installed. Access to a network may be denied |
|||
when the modification itself materially and adversely affects the operation |
|||
of the network or violates the rules and protocols for communication across |
|||
the network. |
|||
|
|||
Corresponding Source conveyed, and Installation Information provided, in accord |
|||
with this section must be in a format that is publicly documented (and with |
|||
an implementation available to the public in source code form), and must require |
|||
no special password or key for unpacking, reading or copying. |
|||
|
|||
7. Additional Terms. |
|||
|
|||
"Additional permissions" are terms that supplement the terms of this License |
|||
by making exceptions from one or more of its conditions. Additional permissions |
|||
that are applicable to the entire Program shall be treated as though they |
|||
were included in this License, to the extent that they are valid under applicable |
|||
law. If additional permissions apply only to part of the Program, that part |
|||
may be used separately under those permissions, but the entire Program remains |
|||
governed by this License without regard to the additional permissions. |
|||
|
|||
When you convey a copy of a covered work, you may at your option remove any |
|||
additional permissions from that copy, or from any part of it. (Additional |
|||
permissions may be written to require their own removal in certain cases when |
|||
you modify the work.) You may place additional permissions on material, added |
|||
by you to a covered work, for which you have or can give appropriate copyright |
|||
permission. |
|||
|
|||
Notwithstanding any other provision of this License, for material you add |
|||
to a covered work, you may (if authorized by the copyright holders of that |
|||
material) supplement the terms of this License with terms: |
|||
|
|||
a) Disclaiming warranty or limiting liability differently from the terms of |
|||
sections 15 and 16 of this License; or |
|||
|
|||
b) Requiring preservation of specified reasonable legal notices or author |
|||
attributions in that material or in the Appropriate Legal Notices displayed |
|||
by works containing it; or |
|||
|
|||
c) Prohibiting misrepresentation of the origin of that material, or requiring |
|||
that modified versions of such material be marked in reasonable ways as different |
|||
from the original version; or |
|||
|
|||
d) Limiting the use for publicity purposes of names of licensors or authors |
|||
of the material; or |
|||
|
|||
e) Declining to grant rights under trademark law for use of some trade names, |
|||
trademarks, or service marks; or |
|||
|
|||
f) Requiring indemnification of licensors and authors of that material by |
|||
anyone who conveys the material (or modified versions of it) with contractual |
|||
assumptions of liability to the recipient, for any liability that these contractual |
|||
assumptions directly impose on those licensors and authors. |
|||
|
|||
All other non-permissive additional terms are considered "further restrictions" |
|||
within the meaning of section 10. If the Program as you received it, or any |
|||
part of it, contains a notice stating that it is governed by this License |
|||
along with a term that is a further restriction, you may remove that term. |
|||
If a license document contains a further restriction but permits relicensing |
|||
or conveying under this License, you may add to a covered work material governed |
|||
by the terms of that license document, provided that the further restriction |
|||
does not survive such relicensing or conveying. |
|||
|
|||
If you add terms to a covered work in accord with this section, you must place, |
|||
in the relevant source files, a statement of the additional terms that apply |
|||
to those files, or a notice indicating where to find the applicable terms. |
|||
|
|||
Additional terms, permissive or non-permissive, may be stated in the form |
|||
of a separately written license, or stated as exceptions; the above requirements |
|||
apply either way. |
|||
|
|||
8. Termination. |
|||
|
|||
You may not propagate or modify a covered work except as expressly provided |
|||
under this License. Any attempt otherwise to propagate or modify it is void, |
|||
and will automatically terminate your rights under this License (including |
|||
any patent licenses granted under the third paragraph of section 11). |
|||
|
|||
However, if you cease all violation of this License, then your license from |
|||
a particular copyright holder is reinstated (a) provisionally, unless and |
|||
until the copyright holder explicitly and finally terminates your license, |
|||
and (b) permanently, if the copyright holder fails to notify you of the violation |
|||
by some reasonable means prior to 60 days after the cessation. |
|||
|
|||
Moreover, your license from a particular copyright holder is reinstated permanently |
|||
if the copyright holder notifies you of the violation by some reasonable means, |
|||
this is the first time you have received notice of violation of this License |
|||
(for any work) from that copyright holder, and you cure the violation prior |
|||
to 30 days after your receipt of the notice. |
|||
|
|||
Termination of your rights under this section does not terminate the licenses |
|||
of parties who have received copies or rights from you under this License. |
|||
If your rights have been terminated and not permanently reinstated, you do |
|||
not qualify to receive new licenses for the same material under section 10. |
|||
|
|||
9. Acceptance Not Required for Having Copies. |
|||
|
|||
You are not required to accept this License in order to receive or run a copy |
|||
of the Program. Ancillary propagation of a covered work occurring solely as |
|||
a consequence of using peer-to-peer transmission to receive a copy likewise |
|||
does not require acceptance. However, nothing other than this License grants |
|||
you permission to propagate or modify any covered work. These actions infringe |
|||
copyright if you do not accept this License. Therefore, by modifying or propagating |
|||
a covered work, you indicate your acceptance of this License to do so. |
|||
|
|||
10. Automatic Licensing of Downstream Recipients. |
|||
|
|||
Each time you convey a covered work, the recipient automatically receives |
|||
a license from the original licensors, to run, modify and propagate that work, |
|||
subject to this License. You are not responsible for enforcing compliance |
|||
by third parties with this License. |
|||
|
|||
An "entity transaction" is a transaction transferring control of an organization, |
|||
or substantially all assets of one, or subdividing an organization, or merging |
|||
organizations. If propagation of a covered work results from an entity transaction, |
|||
each party to that transaction who receives a copy of the work also receives |
|||
whatever licenses to the work the party's predecessor in interest had or could |
|||
give under the previous paragraph, plus a right to possession of the Corresponding |
|||
Source of the work from the predecessor in interest, if the predecessor has |
|||
it or can get it with reasonable efforts. |
|||
|
|||
You may not impose any further restrictions on the exercise of the rights |
|||
granted or affirmed under this License. For example, you may not impose a |
|||
license fee, royalty, or other charge for exercise of rights granted under |
|||
this License, and you may not initiate litigation (including a cross-claim |
|||
or counterclaim in a lawsuit) alleging that any patent claim is infringed |
|||
by making, using, selling, offering for sale, or importing the Program or |
|||
any portion of it. |
|||
|
|||
11. Patents. |
|||
|
|||
A "contributor" is a copyright holder who authorizes use under this License |
|||
of the Program or a work on which the Program is based. The work thus licensed |
|||
is called the contributor's "contributor version". |
|||
|
|||
A contributor's "essential patent claims" are all patent claims owned or controlled |
|||
by the contributor, whether already acquired or hereafter acquired, that would |
|||
be infringed by some manner, permitted by this License, of making, using, |
|||
or selling its contributor version, but do not include claims that would be |
|||
infringed only as a consequence of further modification of the contributor |
|||
version. For purposes of this definition, "control" includes the right to |
|||
grant patent sublicenses in a manner consistent with the requirements of this |
|||
License. |
|||
|
|||
Each contributor grants you a non-exclusive, worldwide, royalty-free patent |
|||
license under the contributor's essential patent claims, to make, use, sell, |
|||
offer for sale, import and otherwise run, modify and propagate the contents |
|||
of its contributor version. |
|||
|
|||
In the following three paragraphs, a "patent license" is any express agreement |
|||
or commitment, however denominated, not to enforce a patent (such as an express |
|||
permission to practice a patent or covenant not to s ue for patent infringement). |
|||
To "grant" such a patent license to a party means to make such an agreement |
|||
or commitment not to enforce a patent against the party. |
|||
|
|||
If you convey a covered work, knowingly relying on a patent license, and the |
|||
Corresponding Source of the work is not available for anyone to copy, free |
|||
of charge and under the terms of this License, through a publicly available |
|||
network server or other readily accessible means, then you must either (1) |
|||
cause the Corresponding Source to be so available, or (2) arrange to deprive |
|||
yourself of the benefit of the patent license for this particular work, or |
|||
(3) arrange, in a manner consistent with the requirements of this License, |
|||
to extend the patent |
|||
|
|||
license to downstream recipients. "Knowingly relying" means you have actual |
|||
knowledge that, but for the patent license, your conveying the covered work |
|||
in a country, or your recipient's use of the covered work in a country, would |
|||
infringe one or more identifiable patents in that country that you have reason |
|||
to believe are valid. |
|||
|
|||
If, pursuant to or in connection with a single transaction or arrangement, |
|||
you convey, or propagate by procuring conveyance of, a covered work, and grant |
|||
a patent license to some of the parties receiving the covered work authorizing |
|||
them to use, propagate, modify or convey a specific copy of the covered work, |
|||
then the patent license you grant is automatically extended to all recipients |
|||
of the covered work and works based on it. |
|||
|
|||
A patent license is "discriminatory" if it does not include within the scope |
|||
of its coverage, prohibits the exercise of, or is conditioned on the non-exercise |
|||
of one or more of the rights that are specifically granted under this License. |
|||
You may not convey a covered work if you are a party to an arrangement with |
|||
a third party that is in the business of distributing software, under which |
|||
you make payment to the third party based on the extent of your activity of |
|||
conveying the work, and under which the third party grants, to any of the |
|||
parties who would receive the covered work from you, a discriminatory patent |
|||
license (a) in connection with copies of the covered work conveyed by you |
|||
(or copies made from those copies), or (b) primarily for and in connection |
|||
with specific products or compilations that contain the covered work, unless |
|||
you entered into that arrangement, or that patent license was granted, prior |
|||
to 28 March 2007. |
|||
|
|||
Nothing in this License shall be construed as excluding or limiting any implied |
|||
license or other defenses to infringement that may otherwise be available |
|||
to you under applicable patent law. |
|||
|
|||
12. No Surrender of Others' Freedom. |
|||
|
|||
If conditions are imposed on you (whether by court order, agreement or otherwise) |
|||
that contradict the conditions of this License, they do not excuse you from |
|||
the conditions of this License. If you cannot convey a covered work so as |
|||
to satisfy simultaneously your obligations under this License and any other |
|||
pertinent obligations, then as a consequence you may |
|||
|
|||
not convey it at all. For example, if you agree to terms that obligate you |
|||
to collect a royalty for further conveying from those to whom you convey the |
|||
Program, the only way you could satisfy both those terms and this License |
|||
would be to refrain entirely from conveying the Program. |
|||
|
|||
13. Remote Network Interaction; Use with the GNU General Public License. |
|||
|
|||
Notwithstanding any other provision of this License, if you modify the Program, |
|||
your modified version must prominently offer all users interacting with it |
|||
remotely through a computer network (if your version supports such interaction) |
|||
an opportunity to receive the Corresponding Source of your version by providing |
|||
access to the Corresponding Source from a network server at no charge, through |
|||
some standard or customary means of facilitating copying of software. This |
|||
Corresponding Source shall include the Corresponding Source for any work covered |
|||
by version 3 of the GNU General Public License that is incorporated pursuant |
|||
to the following paragraph. |
|||
|
|||
Notwithstanding any other provision of this License, you have permission to |
|||
link or combine any covered work with a work licensed under version 3 of the |
|||
GNU General Public License into a single combined work, and to convey the |
|||
resulting work. The terms of this License will continue to apply to the part |
|||
which is the covered work, but the work with which it is combined will remain |
|||
governed by version 3 of the GNU General Public License. |
|||
|
|||
14. Revised Versions of this License. |
|||
|
|||
The Free Software Foundation may publish revised and/or new versions of the |
|||
GNU Affero General Public License from time to time. Such new versions will |
|||
be similar in spirit to the present version, but may differ in detail to address |
|||
new problems or concerns. |
|||
|
|||
Each version is given a distinguishing version number. If the Program specifies |
|||
that a certain numbered version of the GNU Affero General Public License "or |
|||
any later version" applies to it, you have the option of following the terms |
|||
and conditions either of that numbered version or of any later version published |
|||
by the Free Software Foundation. If the Program does not specify a version |
|||
number of the GNU Affero General Public License, you may choose any version |
|||
ever published by the Free Software Foundation. |
|||
|
|||
If the Program specifies that a proxy can decide which future versions of |
|||
the GNU Affero General Public License can be used, that proxy's public statement |
|||
of acceptance of a version permanently authorizes you to choose that version |
|||
for the Program. |
|||
|
|||
Later license versions may give you additional or different permissions. However, |
|||
no additional obligations are imposed on any author or copyright holder as |
|||
a result of your choosing to follow a later version. |
|||
|
|||
15. Disclaimer of Warranty. |
|||
|
|||
THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE |
|||
LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR |
|||
OTHER PARTIES PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER |
|||
EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES |
|||
OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS |
|||
TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE PROGRAM |
|||
PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, REPAIR OR |
|||
CORRECTION. |
|||
|
|||
16. Limitation of Liability. |
|||
|
|||
IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL |
|||
ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MODIFIES AND/OR CONVEYS THE PROGRAM |
|||
AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY GENERAL, SPECIAL, |
|||
INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY TO |
|||
USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING RENDERED |
|||
INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF THE |
|||
PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS), EVEN IF SUCH HOLDER OR OTHER |
|||
PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. |
|||
|
|||
17. Interpretation of Sections 15 and 16. |
|||
|
|||
If the disclaimer of warranty and limitation of liability provided above cannot |
|||
be given local legal effect according to their terms, reviewing courts shall |
|||
apply local law that most closely approximates an absolute waiver of all civil |
|||
liability in connection with the Program, unless a warranty or assumption |
|||
of liability accompanies a copy of the Program in return for a fee. END OF |
|||
TERMS AND CONDITIONS |
|||
|
|||
How to Apply These Terms to Your New Programs |
|||
|
|||
If you develop a new program, and you want it to be of the greatest possible |
|||
use to the public, the best way to achieve this is to make it free software |
|||
which everyone can redistribute and change under these terms. |
|||
|
|||
To do so, attach the following notices to the program. It is safest to attach |
|||
them to the start of each source file to most effectively state the exclusion |
|||
of warranty; and each file should have at least the "copyright" line and a |
|||
pointer to where the full notice is found. |
|||
|
|||
<one line to give the program's name and a brief idea of what it does.> |
|||
|
|||
Copyright (C) <year> <name of author> |
|||
|
|||
This program is free software: you can redistribute it and/or modify it under |
|||
the terms of the GNU Affero General Public License as published by the Free |
|||
Software Foundation, either version 3 of the License, or (at your option) |
|||
any later version. |
|||
|
|||
This program is distributed in the hope that it will be useful, but WITHOUT |
|||
ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS |
|||
FOR A PARTICULAR PURPOSE. See the GNU Affero General Public License for more |
|||
details. |
|||
|
|||
You should have received a copy of the GNU Affero General Public License along |
|||
with this program. If not, see <http s ://www.gnu.org/licenses/>. |
|||
|
|||
Also add information on how to contact you by electronic and paper mail. |
|||
|
|||
If your software can interact with users remotely through a computer network, |
|||
you should also make sure that it provides a way for users to get its source. |
|||
For example, if your program is a web application, its interface could display |
|||
a "Source" link that leads users to an archive of the code. There are many |
|||
ways you could offer source, and different solutions will be better for different |
|||
programs; see section 13 for the specific requirements. |
|||
|
|||
You should also get your employer (if you work as a programmer) or school, |
|||
if any, to sign a "copyright disclaimer" for the program, if necessary. For |
|||
more information on this, and how to apply and follow the GNU AGPL, see <http |
|||
s ://www.gnu.org/licenses/>. |
@ -0,0 +1 @@ |
|||
ROOT_PASSWORD="pass" |
@ -0,0 +1,11 @@ |
|||
#!/bin/sh |
|||
|
|||
hosts=$(get_hosts) |
|||
printf "%s" "$hosts" > "$1" |
|||
|
|||
while sleep 2 |
|||
do |
|||
current_hosts=$(get_hosts) |
|||
[ "$hosts" != "$current_hosts" ] && printf "%s" "$current_hosts" > "$1" |
|||
hosts=$current_hosts |
|||
done |
@ -0,0 +1,13 @@ |
|||
create create project (swarmlab-sec create) |
|||
up start swarmlab-sec (swarmlab-sec up size=10) |
|||
scale resize swarmlab-sec (swarmlab-sec scale size=30) |
|||
reload rebuild image (swarmlab-sec reload size=15) |
|||
login login swarmlab-sec (swarmlab-sec login) |
|||
exec execute command (swarmlab-sec exec [SHELL COMMAND]) |
|||
down stop swarmlab-sec (swarmlab-sec down) |
|||
clean clean project (swarmlab-sec clean) |
|||
list show instances (swarmlab-sec list) |
|||
help show help (swarmlab-sec help) |
|||
|
|||
|
|||
|
@ -0,0 +1,8 @@ |
|||
#!/bin/sh |
|||
|
|||
# Include the variables that store the Docker service names |
|||
# shellcheck disable=SC1091 |
|||
. /etc/opt/service_names |
|||
|
|||
localip=$(ip addr show dev eth0 | grep "inet " | cut -d ' ' -f 6 | cut -f 1 -d '/') |
|||
nmap -sP "$localip/24" | grep Nmap | cut -d' ' -f5 | grep "_$MPI_WORKER_SERVICE_NAME_" > /project/hosts |
@ -0,0 +1,74 @@ |
|||
#! /usr/bin/env sh |
|||
|
|||
start_dir=$(pwd) |
|||
bin_string="export PATH=\"${PATH}:${HOME}/.vimpkg/bin\"" |
|||
|
|||
# Download the apt-vim files |
|||
curl -fSsLo ${HOME}/apt-vim/apt-vim --create-dirs \ |
|||
https://raw.githubusercontent.com/egalpin/apt-vim/master/apt-vim |
|||
|
|||
curl -fSsLo ${HOME}/apt-vim/vim_config.json \ |
|||
https://raw.githubusercontent.com/egalpin/apt-vim/master/vim_config.json |
|||
|
|||
# Add vimrc if there isn't one already |
|||
[ -f ${HOME}/.vimrc ] || touch ${HOME}/.vimrc |
|||
|
|||
# Make sure vimrc is using pathogen |
|||
if [ $(grep -c "execute pathogen#infect()" ${HOME}/.vimrc) -eq 0 ]; then |
|||
echo "execute pathogen#infect()" >> ${HOME}/.vimrc |
|||
fi |
|||
if [ $(grep -c "call pathogen#helptags()" ${HOME}/.vimrc) -eq 0 ]; then |
|||
echo "call pathogen#helptags()" >> ${HOME}/.vimrc |
|||
fi |
|||
|
|||
# Update path for executing shell |
|||
eval "$bin_string" |
|||
|
|||
added_to_profile=false |
|||
already_present=false |
|||
for rc in bashrc zshrc bash_profile; do |
|||
if [ -s "$HOME/.$rc" ]; then |
|||
if grep -q "$bin_string" "$HOME/.$rc"; then |
|||
already_present=true |
|||
else |
|||
printf "\n$bin_string\n" >> "$HOME/.$rc" |
|||
printf "== Added apt-vim PATH to '~/.$rc'\n" |
|||
added_to_profile=true |
|||
fi |
|||
fi |
|||
done |
|||
|
|||
# Execute apt-vim init |
|||
cd ${HOME}/apt-vim |
|||
python - <<EOF |
|||
import imp, os |
|||
print('apt-vim setup starting') |
|||
HOME = os.path.expanduser("~") |
|||
APT_VIM_DIR = os.path.abspath(os.path.join(HOME, 'apt-vim')) |
|||
SCRIPT_ROOT_DIR = os.path.abspath(os.path.join(HOME, '.vimpkg')) |
|||
BIN_DIR = os.path.abspath(os.path.join(SCRIPT_ROOT_DIR, 'bin')) |
|||
os.environ['PATH'] += os.pathsep + BIN_DIR |
|||
os.chdir(APT_VIM_DIR) |
|||
|
|||
aptvim = imp.load_source("aptvim", "./apt-vim") |
|||
av = aptvim.aptvim(ASSUME_YES=True, VIM_CONFIG='', INSTALL_TARGET='') |
|||
av.first_run() |
|||
av.handle_install(None, None, None) |
|||
EOF |
|||
python_result=$? |
|||
|
|||
cd $start_dir |
|||
|
|||
echo |
|||
if [ "$python_result" -ne 0 ]; then |
|||
echo "== Error:" |
|||
echo " Installation failed." |
|||
elif [ "$added_to_profile" = false ] && [ "$already_present" = false ]; then |
|||
echo "== Error:" |
|||
echo " Found no profile to add apt-vim PATH to." |
|||
echo " Add the following line to your shell profile and source it to install manually:" |
|||
printf " $bin_string\n" |
|||
else |
|||
echo "== apt-vim installation succeeded! Run 'source ~/.bashrc || source ~/.bash_profile' or 'source ~/.zshrc'" |
|||
echo " to access the executable script." |
|||
fi |
@ -0,0 +1,6 @@ |
|||
#/bin/sh |
|||
|
|||
#ip=`nslookup hybrid-mpi_master_1.hybrid-mpi_hybrid-mpi | grep Addr | cut -d':' -f2 | grep -v 127.0.` |
|||
ip=`nslookup $NODENAME | grep Addr | cut -d':' -f2 | grep -v 127.0.` |
|||
nmap -sn -oG - $ip/24 | grep Up | grep $NODENETWORK | cut -d ' ' -f 2 |
|||
|
@ -0,0 +1 @@ |
|||
echo "Hello World" |
@ -0,0 +1,72 @@ |
|||
#!/bin/sh |
|||
|
|||
ROLE="undefined" |
|||
MPI_MASTER_SERVICE_NAME="sec_master" |
|||
MPI_WORKER_SERVICE_NAME="sec_worker" |
|||
HOSTNAMES="/etc/nethosts" |
|||
|
|||
####################### |
|||
# ARGUMENTS PARSER |
|||
|
|||
while [ "$1" != "" ]; |
|||
do |
|||
PARAM=$(echo "$1" | awk -F= '{print $1}') |
|||
VALUE=$(echo "$1" | awk -F= '{print $2}') |
|||
|
|||
case $PARAM in |
|||
role) |
|||
[ "$VALUE" ] && ROLE=$VALUE |
|||
;; |
|||
|
|||
sec_master_service_name) |
|||
[ "$VALUE" ] && MPI_MASTER_SERVICE_NAME=$VALUE |
|||
;; |
|||
|
|||
sec_worker_service_name) |
|||
[ "$VALUE" ] && MPI_WORKER_SERVICE_NAME=$VALUE |
|||
;; |
|||
*) |
|||
echo "ERROR: unknown parameter \"$PARAM\"" |
|||
exit 1 |
|||
;; |
|||
esac |
|||
shift |
|||
done |
|||
|
|||
|
|||
|
|||
cat > /etc/opt/service_names <<- EOF |
|||
MPI_MASTER_SERVICE_NAME=${MPI_MASTER_SERVICE_NAME} |
|||
MPI_WORKER_SERVICE_NAME=${MPI_WORKER_SERVICE_NAME} |
|||
EOF |
|||
|
|||
case $ROLE in |
|||
"master") |
|||
|
|||
# Auto update default host file in background and dumb all output |
|||
auto_update_hosts "${HOSTNAMES}" > /dev/null 2>&1 & |
|||
|
|||
# Start ssh server |
|||
/usr/sbin/sshd -D |
|||
;; |
|||
|
|||
|
|||
"worker") |
|||
|
|||
# Start ssh server in background |
|||
/usr/sbin/sshd -D & |
|||
|
|||
# Keep trying to connect to master node and stay there indefinitely so that master node can see |
|||
# the connected hosts that are ready for MPI work |
|||
while sleep 1 |
|||
do |
|||
# shellcheck disable=SC2086 |
|||
ssh -T -o "StrictHostKeyChecking no" \ |
|||
-i "${USER_HOME}/.ssh/id_rsa" \ |
|||
${USER}@${MPI_MASTER_SERVICE_NAME} \ |
|||
"tail -f /dev/null" |
|||
done |
|||
;; |
|||
*) |
|||
echo 'role argument only accepts "master" or "worker"' |
|||
esac |
@ -0,0 +1,27 @@ |
|||
-----BEGIN RSA PRIVATE KEY----- |
|||
MIIEpQIBAAKCAQEAoKG1DtjMXHDJfF59Y5nO7Yl38fkjRL1LQhF7RZKbGScWBNIW |
|||
foAS0wrd3wUnd5YMtIeiBj98H+V8IEn0ChAAxGfHXqqmmYlU6ABESINob+h70Bnm |
|||
UwiRbRnA64o3d9+cz2T8YLf+1p7///Z8LA8U+7rS+kvKvtYCQ9llDAxtbe39CxCs |
|||
2HASam3U6VArq9SdSqph5MudBaYhaxx4V8VDdXEhG2pimlh8e7zdPZ8AYbYLLDhq |
|||
Ytd+wn9azLXPQ3w/vC+Pn4taUBYnlERDY45vaVsPdnR+ao9ckMLUS6EwJVQmgMzB |
|||
2yyNCbPQYvRPL0rxoGstfCmmjY3EzOh6kEA6wwIDAQABAoIBAHqrAxnTdj0h5LyV |
|||
bCwjyWKdGHwxRj24UUCjGQCIdOlAcBA+X+863yVLpyQpS3qHnCxBZ/pdgOza02/V |
|||
CgilL/DNT/N7Xr7hoXWKvpqhv5+2atcA8GN4p5YplKpLYxCoM5guBo3V9UbxJY7T |
|||
LQB4hA25HmUGfE5AIHqwCfqpgufvIO1enhe1Vh/6l1FJqJuNj2pBGeXOyOMV95GN |
|||
xC5/BVytJIx2Rts5qtwpt5iPE3pKdsrWc71qACxk3dG8h9OZnuE3vuCg/Wp8jdwk |
|||
NHZ6nWlt0BbST3wN0pyTp6cqtZ0qqfSpZCVRegeQW5ENR9NaigDX6RADKRnms46J |
|||
ziDSZAECgYEA0WBDY47CA9Ej0Y2zBcV3x03cznSnxr7BVty32xbnNgxGF5jNUDdU |
|||
E2JwJs86sV75VV0fpgrbN45lBV/2ImefrPr4kJAIL2J4eyVdOTTT/DO9Tuw6NP8R |
|||
AYMZOzOlgFjx3arnjlOK5AicFseWFCXvezuAMPcGpImgw7xHHM3RcFcCgYEAxGa2 |
|||
T+J119HWf15kN7bx5RaUl9J4DvvE5oHtA7zsMPO2fRpfwXAb8yKwIXfZ7186frPb |
|||
jo3ZQykcPuJ3MldvTWEuUhY5W1HSF1sBJOPZHuRfQicv8Uj4Y1kWltQf4Ikb3Uyh |
|||
T0fZJul4HkPAo/Q65zIAtJ9tWukAP/lmnwO9VXUCgYEAiY62F4WmH/3ai4WOFX+b |
|||
5xxXsmhgBiozOc8/F7jfZNoBfuVMFqSTHz0wM784b2nXY+cPsPY2+jQaWMKoIgh0 |
|||
lqA4iDmotwD56OYubjQwBeU0PdLjlwfw805fWE7hMAa/uQPcp9xpRtIFQs4T4t7d |
|||
jNgVq5XQDm/BaHedPOZX8HcCgYEAuKpu31vqO7wUt/vTtUMx3JpHqxz9P/FgqPAf |
|||
H/WiC0EMJEMJKAO2c/z4qO9dHiJnCL0qQraDQw/DfClJtC7b+2DVwd8dnQyowscR |
|||
o1MNUmueWcAo5vEag6c/gx/+vQuOBJ1JyxaeSmUZSTOhTUeVns64NRz2IJWWY5Cn |
|||
+fn1KwUCgYEAjYYeQX/W+2r8SFipPQQi/36EqLPwko58C/sbJR0gySP6El7hNQRt |
|||
Sdmd9hfMXRR+VCZWmmzb6T4fc80XxteI9eANkZ7xhNuQe11EDvPqmc9WSF0s+l1T |
|||
eQnkt+an7Qv2prDSU6d1KlOrOuCXU8IhbkuffvRSYXwK9T79bTG8iIQ= |
|||
-----END RSA PRIVATE KEY----- |
@ -0,0 +1 @@ |
|||
ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCgobUO2MxccMl8Xn1jmc7tiXfx+SNEvUtCEXtFkpsZJxYE0hZ+gBLTCt3fBSd3lgy0h6IGP3wf5XwgSfQKEADEZ8deqqaZiVToAERIg2hv6HvQGeZTCJFtGcDrijd335zPZPxgt/7Wnv//9nwsDxT7utL6S8q+1gJD2WUMDG1t7f0LEKzYcBJqbdTpUCur1J1KqmHky50FpiFrHHhXxUN1cSEbamKaWHx7vN09nwBhtgssOGpi137Cf1rMtc9DfD+8L4+fi1pQFieURENjjm9pWw92dH5qj1yQwtRLoTAlVCaAzMHbLI0Js9Bi9E8vSvGgay18KaaNjcTM6HqQQDrD nlknguyen@NN-Ubuntu |
@ -0,0 +1,758 @@ |
|||
#!/bin/bash |
|||
|
|||
# The MIT License (MIT) |
|||
# |
|||
# rootApostolos@swarmlab.io |
|||
# |
|||
# Permission is hereby granted, free of charge, to any person obtaining a copy |
|||
# of this software and associated documentation files (the "Software"), to deal |
|||
# in the Software without restriction, including without limitation the rights |
|||
# to use, copy, modify, merge, publish, distribute, sublicense, and/or sell |
|||
# copies of the Software, and to permit persons to whom the Software is |
|||
# furnished to do so, subject to the following conditions: |
|||
# |
|||
# The above copyright notice and this permission notice shall be included in all |
|||
# copies or substantial portions of the Software. |
|||
# |
|||
# THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR |
|||
# IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, |
|||
# FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE |
|||
# AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER |
|||
# LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, |
|||
# OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE |
|||
# SOFTWARE. |
|||
|
|||
# Origin: https://github.com/NLKNguyen/alpine-mpich |
|||
|
|||
set -e |
|||
|
|||
DOCKERuser="docker" |
|||
PACKAGES=$(cat <<EOF |
|||
net-tools \ |
|||
tcpdump \ |
|||
sudo \ |
|||
vim |
|||
EOF |
|||
) |
|||
|
|||
APTPARAM=" --no-install-recommends " |
|||
IMAGE_local="hybrid-gimp" |
|||
HYBRID_NETWORK="hybrid-gimp" |
|||
# dont edit |
|||
IMAGE_origin="hub.swarmlab.io:5480/hybrid-gimp:latest" |
|||
bootstrap="sec_bootstrap" |
|||
hostnames="auto_update_hosts" |
|||
hostnames_get="get_hosts" |
|||
NODENAME=${HYBRID_NETWORK}_master_1.${HYBRID_NETWORK}_${HYBRID_NETWORK} |
|||
NODENETWORK=${HYBRID_NETWORK} |
|||
# shellcheck disable=SC1091 |
|||
#. ./.env |
|||
|
|||
|
|||
# ----------------------------------------------- |
|||
# |
|||
# Find Source path of swarmlab.io script |
|||
# |
|||
# ---------------------------------------------- |
|||
|
|||
|
|||
SOURCE="${BASH_SOURCE[0]}" |
|||
while [ -h "$SOURCE" ]; do # resolve $SOURCE until the file is no longer a symlink |
|||
DIR="$( cd -P "$( dirname "$SOURCE" )" >/dev/null 2>&1 && pwd )" |
|||
SOURCE="$(readlink "$SOURCE")" |
|||
[[ $SOURCE != /* ]] && SOURCE="$DIR/$SOURCE" # if $SOURCE was a relative symlink, we need to resolve it relative to the path where the symlink file was located |
|||
done |
|||
DIR="$( cd -P "$( dirname "$SOURCE" )" >/dev/null 2>&1 && pwd )" |
|||
|
|||
|
|||
# ----------------------------------------------- |
|||
# |
|||
# Load Default config swarmlab.io |
|||
# |
|||
# ---------------------------------------------- |
|||
|
|||
|
|||
#. $DIR/.env |
|||
|
|||
|
|||
# ----------------------------------------------- |
|||
# |
|||
# Find Working dir |
|||
# |
|||
# ---------------------------------------------- |
|||
|
|||
|
|||
Wdir=$(pwd) |
|||
|
|||
if [ ! -f $Wdir/.env ]; then |
|||
cat << EOF > $Wdir/.env |
|||
REGISTRY_ADDR=localhost |
|||
REGISTRY_PORT=5000 |
|||
IMAGE_NAME=$HYBRID_NETWORK |
|||
SSH_PORT= |
|||
EOF |
|||
fi |
|||
|
|||
. $Wdir/.env |
|||
|
|||
create_dockerfile () |
|||
{ |
|||
. $Wdir/ROOT_PASSWORD |
|||
if [ -d "$Wdir/project" ]; then |
|||
# ----------------------------------------------- |
|||
# |
|||
# create Dockerfile |
|||
# |
|||
# ---------------------------------------------- |
|||
|
|||
rm -f $Wdir/out.log 2> /dev/null |
|||
|
|||
error="Error:"; |
|||
IMAGE=$(docker inspect --type=image $REGISTRY_ADDR:$REGISTRY_PORT/$IMAGE_NAME:latest 2>&1 | tee $Wdir/out.log) |
|||
if search=$(grep "$error" $Wdir/out.log) |
|||
then |
|||
echo "" |
|||
echo ">>> Load Origin " |
|||
cat << EOF > $Wdir/Dockerfile |
|||
FROM $IMAGE_origin |
|||
# |
|||
USER root |
|||
|
|||
COPY $bootstrap /usr/bin |
|||
COPY $hostnames_get /usr/bin |
|||
COPY $hostnames /usr/bin |
|||
COPY install-vim-plugin.sh . |
|||
|
|||
ENV NOTVISIBLE "in users profile" |
|||
ENV USER1 docker |
|||
ENV USER_HOME /home/docker |
|||
ENV SSHDIR \${USER_HOME}/.ssh |
|||
COPY ssh/ \${SSHDIR}/ |
|||
|
|||
RUN export DEBIAN_FRONTEND=noninteractive \ |
|||
&& rm -rf /usr/share/doc \ |
|||
&& rm -rf /usr/share/man \ |
|||
&& rm -rf /usr/share/locale \ |
|||
&& mkdir -p /var/run/sshd \ |
|||
&& echo 'root:$ROOT_PASSWORD' | chpasswd \ |
|||
&& echo "export VISIBLE=now" >> /etc/profile \ |
|||
&& mkdir -p /project \ |
|||
&& mkdir -p /etc/opt \ |
|||
&& echo "docker:docker" | chpasswd \ |
|||
&& echo "StrictHostKeyChecking no" > \${SSHDIR}/config \ |
|||
&& cat \${SSHDIR}/*.pub >> \${SSHDIR}/authorized_keys \ |
|||
&& chmod -R 600 \${SSHDIR}/* \ |
|||
&& chown -R \${USER1}:\${USER1} \${SSHDIR} |
|||
|
|||
WORKDIR /project |
|||
COPY .vimrc /home/docker |
|||
USER docker |
|||
EOF |
|||
else |
|||
echo ">>> Load Local " |
|||
cat << EOF > $Wdir/Dockerfile |
|||
FROM localhost:5000/$IMAGE_local |
|||
# |
|||
USER root |
|||
COPY $bootstrap /usr/bin |
|||
COPY $hostnames_get /usr/bin |
|||
COPY $hostnames /usr/bin |
|||
COPY install-vim-plugin.sh . |
|||
ENV NOTVISIBLE "in users profile" |
|||
ENV USER1 docker |
|||
|
|||
ENV USER_HOME /home/docker |
|||
ENV SSHDIR \${USER_HOME}/.ssh |
|||
COPY ssh/ \${SSHDIR}/ |
|||
|
|||
RUN mkdir -p /var/run/sshd \ |
|||
&& echo 'root:$ROOT_PASSWORD' | chpasswd \ |
|||
&& echo "export VISIBLE=now" >> /etc/profile \ |
|||
&& mkdir -p /etc/opt \ |
|||
&& mkdir -p /project \ |
|||
&& echo "docker:docker" | chpasswd \ |
|||
&& echo "StrictHostKeyChecking no" > \${SSHDIR}/config \ |
|||
&& cat \${SSHDIR}/*.pub >> \${SSHDIR}/authorized_keys \ |
|||
&& chmod -R 600 \${SSHDIR}/* \ |
|||
&& chown -R \${USER1}:\${USER1} \${SSHDIR} |
|||
|
|||
WORKDIR /project |
|||
COPY .vimrc /home/docker |
|||
USER docker |
|||
EOF |
|||
fi |
|||
else |
|||
echo "" |
|||
echo "Not in Project Directory" |
|||
echo "A project directory should look like this" |
|||
echo "" |
|||
|
|||
cat <<EOF |
|||
├── docker-compose.yml |
|||
├── Dockerfile |
|||
├── out.log |
|||
├── project |
|||
│ └── hello_world.sh |
|||
└── ssh |
|||
├── id_rsa |
|||
└── id_rsa.pub |
|||
EOF |
|||
echo "Change to your Project Directory And Try Again" |
|||
echo "" |
|||
exit 0 |
|||
fi |
|||
} |
|||
|
|||
create_project () |
|||
{ |
|||
|
|||
if [ "$Wdir" == "$HOME" ]; then |
|||
echo"" |
|||
echo "You are in Your Home directory" |
|||
echo "Please create a project directory" |
|||
echo "mkdir myproject; cd myproject; swarmlab-sec create" |
|||
echo"" |
|||
else |
|||
echo "# -----------------------------------------------" |
|||
echo "##### Create project #####" |
|||
echo "# -----------------------------------------------" |
|||
|
|||
# clean old images |
|||
#docker rmi $(docker images -f "dangling=true" -q) |
|||
|
|||
rm -f $Wdir/out.log 2> /dev/null |
|||
|
|||
error="Error:"; |
|||
IMAGE=$(docker inspect --type=image $REGISTRY_ADDR:$REGISTRY_PORT/$IMAGE_NAME:latest 2>&1 | tee $Wdir/out.log) |
|||
if search=$(grep "$error" $Wdir/out.log) |
|||
then |
|||
echo ">>> Load Origin " |
|||
cat << EOF > $Wdir/Dockerfile |
|||
FROM $IMAGE_origin |
|||
# |
|||
USER root |
|||
COPY $bootstrap /usr/bin |
|||
COPY $hostnames_get /usr/bin |
|||
COPY $hostnames /usr/bin |
|||
COPY install-vim-plugin.sh . |
|||
|
|||
ENV NOTVISIBLE "in users profile" |
|||
ENV USER1 docker |
|||
ENV USER_HOME /home/docker |
|||
ENV SSHDIR \${USER_HOME}/.ssh |
|||
COPY ssh/ \${SSHDIR}/ |
|||
|
|||
RUN export DEBIAN_FRONTEND=noninteractive \ |
|||
&& rm -rf /usr/share/doc \ |
|||
&& rm -rf /usr/share/man \ |
|||
&& rm -rf /usr/share/locale \ |
|||
&& mkdir -p /var/run/sshd \ |
|||
&& echo 'root:$ROOT_PASSWORD' | chpasswd \ |
|||
&& echo "export VISIBLE=now" >> /etc/profile \ |
|||
&& mkdir -p /project \ |
|||
&& mkdir -p /etc/opt \ |
|||
&& echo "docker:docker" | chpasswd \ |
|||
&& echo "StrictHostKeyChecking no" > \${SSHDIR}/config \ |
|||
&& cat \${SSHDIR}/*.pub >> \${SSHDIR}/authorized_keys \ |
|||
&& chmod -R 600 \${SSHDIR}/* \ |
|||
&& chown -R \${USER1}:\${USER1} \${SSHDIR} |
|||
|
|||
COPY .vimrc /home/docker |
|||
WORKDIR /project |
|||
USER docker |
|||
EOF |
|||
else |
|||
echo ">>> Load Local " |
|||
cat << EOF > $Wdir/Dockerfile |
|||
FROM localhost:5000/$IMAGE_local |
|||
# |
|||
USER root |
|||
COPY $bootstrap /usr/bin |
|||
COPY $hostnames_get /usr/bin |
|||
COPY $hostnames /usr/bin |
|||
COPY install-vim-plugin.sh . |
|||
COPY .vimrc /home/docker |
|||
ENV NOTVISIBLE "in users profile" |
|||
ENV USER1 docker |
|||
ENV USER_HOME /home/docker |
|||
ENV SSHDIR \${USER_HOME}/.ssh |
|||
COPY ssh/ \${SSHDIR}/ |
|||
|
|||
RUN mkdir -p /var/run/sshd \ |
|||
&& echo 'root:$ROOT_PASSWORD' | chpasswd \ |
|||
&& echo "export VISIBLE=now" >> /etc/profile \ |
|||
&& mkdir -p /etc/opt \ |
|||
&& mkdir -p /project \ |
|||
&& echo "docker:docker" | chpasswd \ |
|||
&& echo "StrictHostKeyChecking no" > \${SSHDIR}/config \ |
|||
&& cat \${SSHDIR}/*.pub >> \${SSHDIR}/authorized_keys \ |
|||
&& chmod -R 600 \${SSHDIR}/* \ |
|||
&& chown -R \${USER1}:\${USER1} \${SSHDIR} |
|||
|
|||
COPY .vimrc /home/docker |
|||
WORKDIR /project |
|||
USER docker |
|||
EOF |
|||
fi |
|||
|
|||
|
|||
/bin/mkdir -p $Wdir/project |
|||
/bin/cp -rf $DIR/project/bin $Wdir/project |
|||
/bin/cp -f $DIR/project/hello_world.sh $Wdir/project |
|||
/bin/cp -f $DIR/$bootstrap $Wdir/$bootstrap |
|||
/bin/cp -f $DIR/$hostnames $Wdir/$hostnames |
|||
/bin/cp -f $DIR/$hostnames_get $Wdir/$hostnames_get |
|||
/bin/cp -f $DIR/ROOT_PASSWORD $Wdir/ROOT_PASSWORD |
|||
/bin/cp -rf $DIR/.vimrc $Wdir/.vimrc |
|||
/bin/cp -rf $DIR/install-vim-plugin.sh $Wdir/install-vim-plugin.sh |
|||
|
|||
|
|||
cat << EOF > $Wdir/docker-compose.yml |
|||
version: "2" |
|||
|
|||
services: |
|||
registry: |
|||
image: registry |
|||
ports: |
|||
- "${REGISTRY_PORT}:5000" |
|||
|
|||
master: |
|||
image: $REGISTRY_ADDR:$REGISTRY_PORT/$IMAGE_NAME |
|||
privileged: true |
|||
environment: |
|||
- NODENAME=${NODENAME} |
|||
- NODENETWORK=${NODENETWORK} |
|||
- DISPLAY=\${DISPLAY} |
|||
cap_add: |
|||
- NET_ADMIN |
|||
user: root |
|||
entrypoint: ["sec_bootstrap", "role=master", "sec_master_service_name=master", "sec_worker_service_name=worker"] |
|||
ports: |
|||
- "\${SSH_PORT}:22" |
|||
networks: |
|||
- ${HYBRID_NETWORK} |
|||
volumes: |
|||
- $Wdir/project:/project |
|||
- '/tmp/.X11-unix:/tmp/.X11-unix' |
|||
|
|||
|
|||
worker: |
|||
image: $REGISTRY_ADDR:$REGISTRY_PORT/$IMAGE_NAME |
|||
privileged: true |
|||
environment: |
|||
- NODENAME=${NODENAME} |
|||
- NODENETWORK=${NODENETWORK} |
|||
- DISPLAY=\${DISPLAY} |
|||
cap_add: |
|||
- NET_ADMIN |
|||
user: root |
|||
entrypoint: ["sec_bootstrap", "role=worker", "sec_master_service_name=master", "sec_worker_service_name=worker"] |
|||
networks: |
|||
- ${HYBRID_NETWORK} |
|||
volumes: |
|||
- $Wdir/project:/project |
|||
- '/tmp/.X11-unix:/tmp/.X11-unix' |
|||
|
|||
networks: |
|||
${HYBRID_NETWORK}: |
|||
EOF |
|||
|
|||
/bin/cp -rf $DIR/ssh $Wdir |
|||
|
|||
cat << EOF > $Wdir/stop.sh |
|||
../install/usr/share/swarmlab.io/sec/swarmlab-sec down |
|||
EOF |
|||
|
|||
cat << EOF > $Wdir/container-stop.sh |
|||
docker stop \$1 |
|||
docker container rm \$1 |
|||
EOF |
|||
|
|||
cat <<EOF |
|||
|
|||
Project is Ready |
|||
├── docker-compose.yml |
|||
├── Dockerfile |
|||
├── out.log |
|||
├── project |
|||
│ └── hello_world.sh |
|||
└── ssh |
|||
├── id_rsa |
|||
└── id_rsa.pub |
|||
|
|||
Run: swarmlab-sec up size=5 |
|||
|
|||
or run swarmlab-sec help for USAGE |
|||
|
|||
EOF |
|||
|
|||
/bin/chmod -R 777 $Wdir |
|||
/bin/chown -R sec.sec $Wdir |
|||
|
|||
fi |
|||
} |
|||
|
|||
####################### |
|||
# TASK INDICATORS |
|||
COMMAND_UP=0 |
|||
COMMAND_CREATE=0 |
|||
COMMAND_DOWN=0 |
|||
COMMAND_RELOAD=0 |
|||
COMMAND_SCALE=0 |
|||
COMMAND_LOGIN=0 |
|||
COMMAND_EXEC=0 |
|||
COMMAND_LIST=0 |
|||
COMMAND_CLEAN=0 |
|||
|
|||
# Default values if providing empty |
|||
SIZE=4 |
|||
|
|||
############################################# |
|||
usage () |
|||
{ |
|||
echo "" |
|||
echo "--------------" |
|||
echo " SwarmLab.io " |
|||
echo "--------------" |
|||
echo "" |
|||
echo " USAGE: ./swarmlab-sec [COMMAND] [OPTIONS]" |
|||
echo "" |
|||
echo " Examples of [COMMAND] can be:" |
|||
echo " create: create swarmlab-sec " |
|||
echo " mkdir WORKdir; cd WORKdir; swarmlab-sec create" |
|||
echo "" |
|||
echo " up: start swarmlab-sec" |
|||
echo " swarmlab-sec up size=10" |
|||
echo "" |
|||
echo " scale: resize the swarmlab-sec" |
|||
echo " swarmlab-sec scale size=30" |
|||
echo "" |
|||
echo " reload: rebuild image and distribute to nodes" |
|||
echo " swarmlab-sec reload size=15" |
|||
echo "" |
|||
echo " login: login to Docker container of MPI master node for interactive usage" |
|||
echo " swarmlab-sec login" |
|||
echo "" |
|||
echo " exec: execute shell command at the MPI master node" |
|||
echo " swarmlab-sec exec [SHELL COMMAND]" |
|||
echo "" |
|||
echo " down: shutdown swarmlab-sec" |
|||
echo " swarmlab-sec down" |
|||
echo "" |
|||
echo " clean: remove images in the system" |
|||
echo " swarmlab-sec clean" |
|||
echo "" |
|||
echo " list: show running containers of swarmlab-sec" |
|||
echo " swarmlab-sec list" |
|||
echo "" |
|||
echo " help: show this message" |
|||
echo " swarmlab-sec help" |
|||
echo "" |
|||
echo " " |
|||
} |
|||
|
|||
HEADER=" |
|||
SwarmLab.io" |
|||
|
|||
clear_all () |
|||
{ |
|||
$(docker stop $(docker ps -a | grep "_master_" | awk '{print $1}')) || true |
|||
$(docker stop $(docker ps -a | grep "_worker_" | awk '{print $1}')) || true |
|||
$(docker stop $(docker ps -a | grep "_registry_" | awk '{print $1}')) || true |
|||
docker ps -a | grep "_registry_" | awk '{print $1}' | xargs docker container rm || true |
|||
docker ps -a | grep "_worker_" | awk '{print $1}' | xargs docker container rm || true |
|||
docker ps -a | grep "_master_" | awk '{print $1}' | xargs docker container rm || true |
|||
} |
|||
|
|||
down_all () |
|||
{ |
|||
printf "\\n\\n===> CLEAN UP SWARMLAB" |
|||
|
|||
printf "\\n%s\\n" "$HEADER" |
|||
echo "$ docker-compose down" |
|||
printf "\\n" |
|||
|
|||
docker-compose down |
|||
} |
|||
|
|||
up_registry () |
|||
{ |
|||
printf "\\n\\n===> SPIN UP REGISTRY" |
|||
|
|||
printf "\\n%s\\n" "$HEADER" |
|||
echo "$ docker-compose up -d registry" |
|||
printf "\\n" |
|||
|
|||
#docker stop swarmlab-registry || true && docker rm swarmlab-registry || true |
|||
docker container prune --force |
|||
docker-compose up --no-recreate -d registry |
|||
} |
|||
|
|||
generate_ssh_keys () |
|||
{ |
|||
if [ -f ssh/id_rsa ] && [ -f ssh/id_rsa.pub ]; then |
|||
return 0 |
|||
fi |
|||
|
|||
printf "\\n\\n===> GENERATE SSH KEYS \\n\\n" |
|||
|
|||
echo "$ mkdir -p ssh/ " |
|||
printf "\\n" |
|||
mkdir -p ssh/ |
|||
|
|||
echo "$ ssh-keygen -f ssh/id_rsa -t rsa -N ''" |
|||
printf "\\n" |
|||
ssh-keygen -f ssh/id_rsa -t rsa -N '' |
|||
} |
|||
|
|||
build_and_push_image () |
|||
{ |
|||
printf "\\n\\n===> BUILD IMAGE" |
|||
printf "\\n%s\\n" "$HEADER" |
|||
echo "$ docker build -t \"$REGISTRY_ADDR:$REGISTRY_PORT/$IMAGE_NAME\" ." |
|||
printf "\\n" |
|||
docker build -t "$REGISTRY_ADDR:$REGISTRY_PORT/$IMAGE_NAME" . |
|||
|
|||
printf "\\n" |
|||
|
|||
printf "\\n\\n===> PUSH IMAGE TO REGISTRY" |
|||
printf "\\n%s\\n" "$HEADER" |
|||
echo "$ docker push \"$REGISTRY_ADDR:$REGISTRY_PORT/$IMAGE_NAME\"" |
|||
printf "\\n" |
|||
docker push "$REGISTRY_ADDR:$REGISTRY_PORT/$IMAGE_NAME" |
|||
} |
|||
|
|||
up_master () |
|||
{ |
|||
printf "\\n\\n===> SPIN UP MASTER NODE" |
|||
printf "\\n%s\\n" "$HEADER" |
|||
echo "$ docker-compose up -d master" |
|||
printf "\\n" |
|||
docker-compose up -d master |
|||
} |
|||
|
|||
|
|||
up_workers () |
|||
{ |
|||
printf "\\n\\n===> SPIN UP WORKER NODES" |
|||
printf "\\n%s\\n" "$HEADER" |
|||
echo "$ docker-compose up -d worker" |
|||
printf "\\n" |
|||
docker-compose up -d worker |
|||
|
|||
printf "\\n" |
|||
printf "\\n%s\\n" "$HEADER" |
|||
|
|||
NUM_WORKER=$((SIZE - 1)) |
|||
echo "$ docker-compose scale worker=$NUM_WORKER" |
|||
printf "\\n" |
|||
docker-compose scale worker=${NUM_WORKER} |
|||
} |
|||
|
|||
down_master () |
|||
{ |
|||
printf "\\n\\n===> TORN DOWN MASTER NODE" |
|||
printf "\\n%s\\n" "$HEADER" |
|||
|
|||
echo "$ docker-compose stop master && docker-compose rm -f master" |
|||
printf "\\n" |
|||
docker-compose stop master && docker-compose rm -f master |
|||
} |
|||
|
|||
down_workers () |
|||
{ |
|||
printf "\\n\\n===> TORN DOWN WORKER NODES" |
|||
printf "\\n%s\\n" "$HEADER" |
|||
echo "$ docker-compose stop worker && docker-compose rm -f worker" |
|||
printf "\\n" |
|||
docker-compose stop worker && docker-compose rm -f worker |
|||
} |
|||
|
|||
list () |
|||
{ |
|||
printf "\\n\\n===> LIST CONTAINERS" |
|||
printf "\\n%s\\n" "$HEADER" |
|||
echo "$ docker-compose ps" |
|||
printf "\\n" |
|||
docker-compose ps |
|||
} |
|||
|
|||
|
|||
exec_on_mpi_master_container () |
|||
{ |
|||
# shellcheck disable=SC2046 |
|||
docker exec -it -u $DOCKERuser $(docker-compose ps | grep 'master'| awk 'NR==1{print $1}') "$@" |
|||
} |
|||
|
|||
prompt_ready () |
|||
{ |
|||
printf "\\n\\n===> SWARMLAB READY \\n\\n" |
|||
} |
|||
|
|||
show_instruction () |
|||
{ |
|||
echo ' ## . ' |
|||
echo ' ## ## ## == ' |
|||
echo ' ## ## ## ## ## === ' |
|||
echo ' /"""""""""""""""""\___/ === ' |
|||
echo ' ~~~ {~~ ~~~~ ~~~ ~~~~ ~~~ ~ / ===- ~~~ ' |
|||
echo ' \______ o __/ ' |
|||
echo ' \ \ __/ ' |
|||
echo ' \____\_______/ ' |
|||
echo ' ' |
|||
echo ' Swarmlab.io Hybrid ' |
|||
echo '' |
|||
echo '==============================================================' |
|||
echo '' |
|||
|
|||
echo "To run SEC programs in an interative shell:" |
|||
echo " 1. Login to master node:" |
|||
echo " Using Docker through command wrapper:" |
|||
echo " $ swarmlab-sec login" |
|||
echo "" |
|||
echo " Or using SSH with keys through exposed port:" |
|||
echo " $ ssh -o \"StrictHostKeyChecking no\" -i ssh/id_rsa -p $SSH_PORT docker@localhost" |
|||
echo ' where [localhost] could be changed to the host IP of master node' |
|||
echo "" |
|||
echo " 2. Execute programs inside master node, for example:" |
|||
echo " $ sudo su" |
|||
echo " # apk update" |
|||
echo " *----------------------------------------------------*" |
|||
echo " | Default hostfile of connected nodes in the swarmlab |" |
|||
echo " | is automatically updated at /etc/opt/hosts |" |
|||
echo " | To obtain hostfile manually: $ get_hosts > hosts |" |
|||
echo " * ---------------------------------------------------*" |
|||
echo "" |
|||
echo "" |
|||
} |
|||
|
|||
|
|||
|
|||
############################################# |
|||
|
|||
while [ "$1" != "" ]; |
|||
do |
|||
PARAM=$(echo "$1" | awk -F= '{print $1}') |
|||
VALUE=$(echo "$1" | awk -F= '{print $2}') |
|||
|
|||
case $PARAM in |
|||
help) |
|||
usage |
|||
exit |
|||
;; |
|||
-i) |
|||
show_instruction |
|||
exit |
|||
;; |
|||
|
|||
login) |
|||
COMMAND_LOGIN=1 |
|||
;; |
|||
|
|||
exec) |
|||
COMMAND_EXEC=1 |
|||
shift # the rest is the shell command to run in the node |
|||
SHELL_COMMAND="$*" |
|||
break # end while loop |
|||
;; |
|||
|
|||
up) |
|||
COMMAND_UP=1 |
|||
;; |
|||
|
|||
create) |
|||
COMMAND_CREATE=1 |
|||
;; |
|||
|
|||
down) |
|||
COMMAND_DOWN=1 |
|||
;; |
|||
|
|||
reload) |
|||
COMMAND_RELOAD=1 |
|||
;; |
|||
|
|||
scale) |
|||
COMMAND_SCALE=1 |
|||
;; |
|||
|
|||
list) |
|||
COMMAND_LIST=1 |
|||
;; |
|||
|
|||
clean) |
|||
COMMAND_CLEAN=1 |
|||
;; |
|||
|
|||
size) |
|||
[ "$VALUE" ] && SIZE=$VALUE |
|||
;; |
|||
|
|||
*) |
|||
echo "ERROR: unknown parameter \"$PARAM\"" |
|||
usage |
|||
exit 1 |
|||
;; |
|||
esac |
|||
shift |
|||
done |
|||
|
|||
|
|||
if [ $COMMAND_UP -eq 1 ]; then |
|||
create_dockerfile |
|||
down_all |
|||
clear_all |
|||
up_registry |
|||
generate_ssh_keys |
|||
build_and_push_image |
|||
up_master |
|||
up_workers |
|||
|
|||
prompt_ready |
|||
show_instruction |
|||
|
|||
elif [ $COMMAND_CREATE -eq 1 ]; then |
|||
create_project |
|||
|
|||
elif [ $COMMAND_DOWN -eq 1 ]; then |
|||
down_all |
|||
clear_all |
|||
|
|||
elif [ $COMMAND_CLEAN -eq 1 ]; then |
|||
clear_all |
|||
|
|||
|
|||
elif [ $COMMAND_SCALE -eq 1 ]; then |
|||
create_dockerfile |
|||
down_master |
|||
down_workers |
|||
up_master |
|||
up_workers |
|||
|
|||
prompt_ready |
|||
show_instruction |
|||
|
|||
elif [ $COMMAND_RELOAD -eq 1 ]; then |
|||
create_dockerfile |
|||
down_master |
|||
down_workers |
|||
build_and_push_image |
|||
up_master |
|||
up_workers |
|||
|
|||
prompt_ready |
|||
show_instruction |
|||
|
|||
elif [ $COMMAND_LOGIN -eq 1 ]; then |
|||
exec_on_mpi_master_container /bin/bash |
|||
|
|||
elif [ $COMMAND_EXEC -eq 1 ]; then |
|||
create_dockerfile |
|||
exec_on_mpi_master_container ash -c "${SHELL_COMMAND}" |
|||
|
|||
elif [ $COMMAND_LIST -eq 1 ]; then |
|||
list |
|||
else |
|||
usage |
|||
fi |
|||
|
Loading…
Reference in new issue