zeus
3 years ago
commit
d481d0473c
29 changed files with 3873 additions and 0 deletions
@ -0,0 +1,614 @@ |
|||||
|
GNU AFFERO GENERAL PUBLIC LICENSE |
||||
|
|
||||
|
Version 3, 19 November 2007 |
||||
|
|
||||
|
Copyright (C) 2007 Free Software Foundation, Inc. <http s ://fsf.org/> |
||||
|
|
||||
|
Everyone is permitted to copy and distribute verbatim copies of this license |
||||
|
document, but changing it is not allowed. |
||||
|
|
||||
|
Preamble |
||||
|
|
||||
|
The GNU Affero General Public License is a free, copyleft license for software |
||||
|
and other kinds of works, specifically designed to ensure cooperation with |
||||
|
the community in the case of network server software. |
||||
|
|
||||
|
The licenses for most software and other practical works are designed to take |
||||
|
away your freedom to share and change the works. By contrast, our General |
||||
|
Public Licenses are intended to guarantee your freedom to share and change |
||||
|
all versions of a program--to make sure it remains free software for all its |
||||
|
users. |
||||
|
|
||||
|
When we speak of free software, we are referring to freedom, not price. Our |
||||
|
General Public Licenses are designed to make sure that you have the freedom |
||||
|
to distribute copies of free software (and charge for them if you wish), that |
||||
|
you receive source code or can get it if you want it, that you can change |
||||
|
the software or use pieces of it in new free programs, and that you know you |
||||
|
can do these things. |
||||
|
|
||||
|
Developers that use our General Public Licenses protect your rights with two |
||||
|
steps: (1) assert copyright on the software, and (2) offer you this License |
||||
|
which gives you legal permission to copy, distribute and/or modify the software. |
||||
|
|
||||
|
A secondary benefit of defending all users' freedom is that improvements made |
||||
|
in alternate versions of the program, if they receive widespread use, become |
||||
|
available for other developers to incorporate. Many developers of free software |
||||
|
are heartened and encouraged by the resulting cooperation. However, in the |
||||
|
case of software used on network servers, this result may fail to come about. |
||||
|
The GNU General Public License permits making a modified version and letting |
||||
|
the public access it on a server without ever releasing its source code to |
||||
|
the public. |
||||
|
|
||||
|
The GNU Affero General Public License is designed specifically to ensure that, |
||||
|
in such cases, the modified source code becomes available to the community. |
||||
|
It requires the operator of a network server to provide the source code of |
||||
|
the modified version running there to the users of that server. Therefore, |
||||
|
public use of a modified version, on a publicly accessible server, gives the |
||||
|
public access to the source code of the modified version. |
||||
|
|
||||
|
An older license, called the Affero General Public License and published by |
||||
|
Affero, was designed to accomplish similar goals. This is a different license, |
||||
|
not a version of the Affero GPL, but Affero has released a new version of |
||||
|
the Affero GPL which permits relicensing under this license. |
||||
|
|
||||
|
The precise terms and conditions for copying, distribution and modification |
||||
|
follow. |
||||
|
|
||||
|
TERMS AND CONDITIONS |
||||
|
|
||||
|
0. Definitions. |
||||
|
|
||||
|
"This License" refers to version 3 of the GNU Affero General Public License. |
||||
|
|
||||
|
"Copyright" also means copyright-like laws that apply to other kinds of works, |
||||
|
such as semiconductor masks. |
||||
|
|
||||
|
"The Program" refers to any copyrightable work licensed under this License. |
||||
|
Each licensee is addressed as "you". "Licensees" and "recipients" may be individuals |
||||
|
or organizations. |
||||
|
|
||||
|
To "modify" a work means to copy from or adapt all or part of the work in |
||||
|
a fashion requiring copyright permission, other than the making of an exact |
||||
|
copy. The resulting work is called a "modified version" of the earlier work |
||||
|
or a work "based on" the earlier work. |
||||
|
|
||||
|
A "covered work" means either the unmodified Program or a work based on the |
||||
|
Program. |
||||
|
|
||||
|
To "propagate" a work means to do anything with it that, without permission, |
||||
|
would make you directly or secondarily liable for infringement under applicable |
||||
|
copyright law, except executing it on a computer or modifying a private copy. |
||||
|
Propagation includes copying, distribution (with or without modification), |
||||
|
making available to the public, and in some countries other activities as |
||||
|
well. |
||||
|
|
||||
|
To "convey" a work means any kind of propagation that enables other parties |
||||
|
to make or receive copies. Mere interaction with a user through a computer |
||||
|
network, with no transfer of a copy, is not conveying. |
||||
|
|
||||
|
An interactive user interface displays "Appropriate Legal Notices" to the |
||||
|
extent that it includes a convenient and prominently visible feature that |
||||
|
(1) displays an appropriate copyright notice, and (2) tells the user that |
||||
|
there is no warranty for the work (except to the extent that warranties are |
||||
|
provided), that licensees may convey the work under this License, and how |
||||
|
to view a copy of this License. If the interface presents a list of user commands |
||||
|
or options, such as a menu, a prominent item in the list meets this criterion. |
||||
|
|
||||
|
1. Source Code. |
||||
|
|
||||
|
The "source code" for a work means the preferred form of the work for making |
||||
|
modifications to it. "Object code" means any non-source form of a work. |
||||
|
|
||||
|
A "Standard Interface" means an interface that either is an official standard |
||||
|
defined by a recognized standards body, or, in the case of interfaces specified |
||||
|
for a particular programming language, one that is widely used among developers |
||||
|
working in that language. |
||||
|
|
||||
|
The "System Libraries" of an executable work include anything, other than |
||||
|
the work as a whole, that (a) is included in the normal form of packaging |
||||
|
a Major Component, but which is not part of that Major Component, and (b) |
||||
|
serves only to enable use of the work with that Major Component, or to implement |
||||
|
a Standard Interface for which an implementation is available to the public |
||||
|
in source code form. A "Major Component", in this context, means a major essential |
||||
|
component (kernel, window system, and so on) of the specific operating system |
||||
|
(if any) on which the executable work runs, or a compiler used to produce |
||||
|
the work, or an object code interpreter used to run it. |
||||
|
|
||||
|
The "Corresponding Source" for a work in object code form means all the source |
||||
|
code needed to generate, install, and (for an executable work) run the object |
||||
|
code and to modify the work, including scripts to control those activities. |
||||
|
However, it does not include the work's System Libraries, or general-purpose |
||||
|
tools or generally available free programs which are used unmodified in performing |
||||
|
those activities but which are not part of the work. For example, Corresponding |
||||
|
Source includes interface definition files associated with source files for |
||||
|
the work, and the source code for shared libraries and dynamically linked |
||||
|
subprograms that the work is specifically designed to require, such as by |
||||
|
intimate data communication or control flow between those |
||||
|
|
||||
|
subprograms and other parts of the work. |
||||
|
|
||||
|
The Corresponding Source need not include anything that users can regenerate |
||||
|
automatically from other parts of the Corresponding Source. |
||||
|
|
||||
|
The Corresponding Source for a work in source code form is that same work. |
||||
|
|
||||
|
2. Basic Permissions. |
||||
|
|
||||
|
All rights granted under this License are granted for the term of copyright |
||||
|
on the Program, and are irrevocable provided the stated conditions are met. |
||||
|
This License explicitly affirms your unlimited permission to run the unmodified |
||||
|
Program. The output from running a covered work is covered by this License |
||||
|
only if the output, given its content, constitutes a covered work. This License |
||||
|
acknowledges your rights of fair use or other equivalent, as provided by copyright |
||||
|
law. |
||||
|
|
||||
|
You may make, run and propagate covered works that you do not convey, without |
||||
|
conditions so long as your license otherwise remains in force. You may convey |
||||
|
covered works to others for the sole purpose of having them make modifications |
||||
|
exclusively for you, or provide you with facilities for running those works, |
||||
|
provided that you comply with the terms of this License in conveying all material |
||||
|
for which you do not control copyright. Those thus making or running the covered |
||||
|
works for you must do so exclusively on your behalf, under your direction |
||||
|
and control, on terms that prohibit them from making any copies of your copyrighted |
||||
|
material outside their relationship with you. |
||||
|
|
||||
|
Conveying under any other circumstances is permitted solely under the conditions |
||||
|
stated below. Sublicensing is not allowed; section 10 makes it unnecessary. |
||||
|
|
||||
|
3. Protecting Users' Legal Rights From Anti-Circumvention Law. |
||||
|
|
||||
|
No covered work shall be deemed part of an effective technological measure |
||||
|
under any applicable law fulfilling obligations under article 11 of the WIPO |
||||
|
copyright treaty adopted on 20 December 1996, or similar laws prohibiting |
||||
|
or restricting circumvention of such measures. |
||||
|
|
||||
|
When you convey a covered work, you waive any legal power to forbid circumvention |
||||
|
of technological measures to the extent such circumvention is effected by |
||||
|
exercising rights under this License with respect to the covered work, and |
||||
|
you disclaim any intention to limit operation or modification of the work |
||||
|
as a means of enforcing, against the work's users, your or third parties' |
||||
|
legal rights to forbid circumvention of technological measures. |
||||
|
|
||||
|
4. Conveying Verbatim Copies. |
||||
|
|
||||
|
You may convey verbatim copies of the Program's source code as you receive |
||||
|
it, in any medium, provided that you conspicuously and appropriately publish |
||||
|
on each copy an appropriate copyright notice; keep intact all notices stating |
||||
|
that this License and any non-permissive terms added in accord with section |
||||
|
7 apply to the code; keep intact all notices of the absence of any warranty; |
||||
|
and give all recipients a copy of this License along with the Program. |
||||
|
|
||||
|
You may charge any price or no price for each copy that you convey, and you |
||||
|
may offer support or warranty protection for a fee. |
||||
|
|
||||
|
5. Conveying Modified Source Versions. |
||||
|
|
||||
|
You may convey a work based on the Program, or the modifications to produce |
||||
|
it from the Program, in the form of source code under the terms of section |
||||
|
4, provided that you also meet all of these conditions: |
||||
|
|
||||
|
a) The work must carry prominent notices stating that you modified it, and |
||||
|
giving a relevant date. |
||||
|
|
||||
|
b) The work must carry prominent notices stating that it is released under |
||||
|
this License and any conditions added under section 7. This requirement modifies |
||||
|
the requirement in section 4 to "keep intact all notices". |
||||
|
|
||||
|
c) You must license the entire work, as a whole, under this License to anyone |
||||
|
who comes into possession of a copy. This License will therefore apply, along |
||||
|
with any applicable section 7 additional terms, to the whole of the work, |
||||
|
and all its parts, regardless of how they are packaged. This License gives |
||||
|
no permission to license the work in any other way, but it does not invalidate |
||||
|
such permission if you have separately received it. |
||||
|
|
||||
|
d) If the work has interactive user interfaces, each must display Appropriate |
||||
|
Legal Notices; however, if the Program has interactive interfaces that do |
||||
|
not display Appropriate Legal Notices, your work need not make them do so. |
||||
|
|
||||
|
A compilation of a covered work with other separate and independent works, |
||||
|
which are not by their nature extensions of the covered work, and which are |
||||
|
not combined with it such as to form a larger program, in or on a volume of |
||||
|
a storage or distribution medium, is called an "aggregate" if the compilation |
||||
|
and its resulting copyright are not used to limit the access or legal rights |
||||
|
of the compilation's users beyond what the individual works permit. Inclusion |
||||
|
of a covered work in an aggregate does not cause this License to apply to |
||||
|
the other parts of the aggregate. |
||||
|
|
||||
|
6. Conveying Non-Source Forms. |
||||
|
|
||||
|
You may convey a covered work in object code form under the terms of sections |
||||
|
4 and 5, provided that you also convey the machine-readable Corresponding |
||||
|
Source under the terms of this License, in one of these ways: |
||||
|
|
||||
|
a) Convey the object code in, or embodied in, a physical product (including |
||||
|
a physical distribution medium), accompanied by the Corresponding Source fixed |
||||
|
on a durable physical medium customarily used for software interchange. |
||||
|
|
||||
|
b) Convey the object code in, or embodied in, a physical product (including |
||||
|
a physical distribution medium), accompanied by a written offer, valid for |
||||
|
at least three years and valid for as long as you offer spare parts or customer |
||||
|
support for that product model, to give anyone who possesses the object code |
||||
|
either (1) a copy of the Corresponding Source for all the software in the |
||||
|
product that is covered by this License, on a durable physical medium customarily |
||||
|
used for software interchange, for a price no more than your reasonable cost |
||||
|
of physically performing this conveying of source, or (2) access to copy the |
||||
|
Corresponding Source from a network server at no charge. |
||||
|
|
||||
|
c) Convey individual copies of the object code with a copy of the written |
||||
|
offer to provide the Corresponding Source. This alternative is allowed only |
||||
|
occasionally and noncommercially, and only if you received the object code |
||||
|
with such an offer, in accord with subsection 6b. |
||||
|
|
||||
|
d) Convey the object code by offering access from a designated place (gratis |
||||
|
or for a charge), and offer equivalent access to the Corresponding Source |
||||
|
in the same way through the same place at no further charge. You need not |
||||
|
require recipients to copy the Corresponding Source along with the object |
||||
|
code. If the place to copy the object code is a network server, the Corresponding |
||||
|
Source may be on a different server (operated by you or a third party) that |
||||
|
supports equivalent copying facilities, provided you maintain clear directions |
||||
|
next to the object code saying where to find the Corresponding Source. Regardless |
||||
|
of what server hosts the Corresponding Source, you remain obligated to ensure |
||||
|
that it is available for as long as needed to satisfy these requirements. |
||||
|
|
||||
|
e) Convey the object code using peer-to-peer transmission, provided you inform |
||||
|
other peers where the object code and Corresponding Source of the work are |
||||
|
being offered to the general public at no charge under subsection 6d. |
||||
|
|
||||
|
A separable portion of the object code, whose source code is excluded from |
||||
|
the Corresponding Source as a System Library, need not be included in conveying |
||||
|
the object code work. |
||||
|
|
||||
|
A "User Product" is either (1) a "consumer product", which means any tangible |
||||
|
personal property which is normally used for personal, family, or household |
||||
|
purposes, or (2) anything designed or sold for incorporation into a dwelling. |
||||
|
In determining whether a product is a consumer product, doubtful cases shall |
||||
|
be resolved in favor of coverage. For a particular product received by a particular |
||||
|
user, "normally used" refers to a typical or common use of that class of product, |
||||
|
regardless of the status of the particular user or of the way in which the |
||||
|
particular user actually uses, or expects or is expected to use, the product. |
||||
|
A product is a consumer product regardless of whether the product has substantial |
||||
|
commercial, industrial or non-consumer uses, unless such uses represent the |
||||
|
only significant mode of use of the product. |
||||
|
|
||||
|
"Installation Information" for a User Product means any methods, procedures, |
||||
|
authorization keys, or other information required to install and execute modified |
||||
|
versions of a covered work in that User Product from a modified version of |
||||
|
its Corresponding Source. The information must suffice to ensure that the |
||||
|
continued functioning of the modified object code is in no case prevented |
||||
|
or interfered with solely because modification has been made. |
||||
|
|
||||
|
If you convey an object code work under this section in, or with, or specifically |
||||
|
for use in, a User Product, and the conveying occurs as part of a transaction |
||||
|
in which the right of possession and use of the User Product is transferred |
||||
|
to the recipient in perpetuity or for a fixed term (regardless of how the |
||||
|
transaction is characterized), the Corresponding Source conveyed under this |
||||
|
section must be accompanied by the Installation Information. But this requirement |
||||
|
does not apply if neither you nor any third party retains the ability to install |
||||
|
modified object code on the User Product (for example, the work has been installed |
||||
|
in ROM). |
||||
|
|
||||
|
The requirement to provide Installation Information does not include a requirement |
||||
|
to continue to provide support service, warranty, or updates for a work that |
||||
|
has been modified or installed by the recipient, or for the User Product in |
||||
|
which it has been modified or installed. Access to a network may be denied |
||||
|
when the modification itself materially and adversely affects the operation |
||||
|
of the network or violates the rules and protocols for communication across |
||||
|
the network. |
||||
|
|
||||
|
Corresponding Source conveyed, and Installation Information provided, in accord |
||||
|
with this section must be in a format that is publicly documented (and with |
||||
|
an implementation available to the public in source code form), and must require |
||||
|
no special password or key for unpacking, reading or copying. |
||||
|
|
||||
|
7. Additional Terms. |
||||
|
|
||||
|
"Additional permissions" are terms that supplement the terms of this License |
||||
|
by making exceptions from one or more of its conditions. Additional permissions |
||||
|
that are applicable to the entire Program shall be treated as though they |
||||
|
were included in this License, to the extent that they are valid under applicable |
||||
|
law. If additional permissions apply only to part of the Program, that part |
||||
|
may be used separately under those permissions, but the entire Program remains |
||||
|
governed by this License without regard to the additional permissions. |
||||
|
|
||||
|
When you convey a copy of a covered work, you may at your option remove any |
||||
|
additional permissions from that copy, or from any part of it. (Additional |
||||
|
permissions may be written to require their own removal in certain cases when |
||||
|
you modify the work.) You may place additional permissions on material, added |
||||
|
by you to a covered work, for which you have or can give appropriate copyright |
||||
|
permission. |
||||
|
|
||||
|
Notwithstanding any other provision of this License, for material you add |
||||
|
to a covered work, you may (if authorized by the copyright holders of that |
||||
|
material) supplement the terms of this License with terms: |
||||
|
|
||||
|
a) Disclaiming warranty or limiting liability differently from the terms of |
||||
|
sections 15 and 16 of this License; or |
||||
|
|
||||
|
b) Requiring preservation of specified reasonable legal notices or author |
||||
|
attributions in that material or in the Appropriate Legal Notices displayed |
||||
|
by works containing it; or |
||||
|
|
||||
|
c) Prohibiting misrepresentation of the origin of that material, or requiring |
||||
|
that modified versions of such material be marked in reasonable ways as different |
||||
|
from the original version; or |
||||
|
|
||||
|
d) Limiting the use for publicity purposes of names of licensors or authors |
||||
|
of the material; or |
||||
|
|
||||
|
e) Declining to grant rights under trademark law for use of some trade names, |
||||
|
trademarks, or service marks; or |
||||
|
|
||||
|
f) Requiring indemnification of licensors and authors of that material by |
||||
|
anyone who conveys the material (or modified versions of it) with contractual |
||||
|
assumptions of liability to the recipient, for any liability that these contractual |
||||
|
assumptions directly impose on those licensors and authors. |
||||
|
|
||||
|
All other non-permissive additional terms are considered "further restrictions" |
||||
|
within the meaning of section 10. If the Program as you received it, or any |
||||
|
part of it, contains a notice stating that it is governed by this License |
||||
|
along with a term that is a further restriction, you may remove that term. |
||||
|
If a license document contains a further restriction but permits relicensing |
||||
|
or conveying under this License, you may add to a covered work material governed |
||||
|
by the terms of that license document, provided that the further restriction |
||||
|
does not survive such relicensing or conveying. |
||||
|
|
||||
|
If you add terms to a covered work in accord with this section, you must place, |
||||
|
in the relevant source files, a statement of the additional terms that apply |
||||
|
to those files, or a notice indicating where to find the applicable terms. |
||||
|
|
||||
|
Additional terms, permissive or non-permissive, may be stated in the form |
||||
|
of a separately written license, or stated as exceptions; the above requirements |
||||
|
apply either way. |
||||
|
|
||||
|
8. Termination. |
||||
|
|
||||
|
You may not propagate or modify a covered work except as expressly provided |
||||
|
under this License. Any attempt otherwise to propagate or modify it is void, |
||||
|
and will automatically terminate your rights under this License (including |
||||
|
any patent licenses granted under the third paragraph of section 11). |
||||
|
|
||||
|
However, if you cease all violation of this License, then your license from |
||||
|
a particular copyright holder is reinstated (a) provisionally, unless and |
||||
|
until the copyright holder explicitly and finally terminates your license, |
||||
|
and (b) permanently, if the copyright holder fails to notify you of the violation |
||||
|
by some reasonable means prior to 60 days after the cessation. |
||||
|
|
||||
|
Moreover, your license from a particular copyright holder is reinstated permanently |
||||
|
if the copyright holder notifies you of the violation by some reasonable means, |
||||
|
this is the first time you have received notice of violation of this License |
||||
|
(for any work) from that copyright holder, and you cure the violation prior |
||||
|
to 30 days after your receipt of the notice. |
||||
|
|
||||
|
Termination of your rights under this section does not terminate the licenses |
||||
|
of parties who have received copies or rights from you under this License. |
||||
|
If your rights have been terminated and not permanently reinstated, you do |
||||
|
not qualify to receive new licenses for the same material under section 10. |
||||
|
|
||||
|
9. Acceptance Not Required for Having Copies. |
||||
|
|
||||
|
You are not required to accept this License in order to receive or run a copy |
||||
|
of the Program. Ancillary propagation of a covered work occurring solely as |
||||
|
a consequence of using peer-to-peer transmission to receive a copy likewise |
||||
|
does not require acceptance. However, nothing other than this License grants |
||||
|
you permission to propagate or modify any covered work. These actions infringe |
||||
|
copyright if you do not accept this License. Therefore, by modifying or propagating |
||||
|
a covered work, you indicate your acceptance of this License to do so. |
||||
|
|
||||
|
10. Automatic Licensing of Downstream Recipients. |
||||
|
|
||||
|
Each time you convey a covered work, the recipient automatically receives |
||||
|
a license from the original licensors, to run, modify and propagate that work, |
||||
|
subject to this License. You are not responsible for enforcing compliance |
||||
|
by third parties with this License. |
||||
|
|
||||
|
An "entity transaction" is a transaction transferring control of an organization, |
||||
|
or substantially all assets of one, or subdividing an organization, or merging |
||||
|
organizations. If propagation of a covered work results from an entity transaction, |
||||
|
each party to that transaction who receives a copy of the work also receives |
||||
|
whatever licenses to the work the party's predecessor in interest had or could |
||||
|
give under the previous paragraph, plus a right to possession of the Corresponding |
||||
|
Source of the work from the predecessor in interest, if the predecessor has |
||||
|
it or can get it with reasonable efforts. |
||||
|
|
||||
|
You may not impose any further restrictions on the exercise of the rights |
||||
|
granted or affirmed under this License. For example, you may not impose a |
||||
|
license fee, royalty, or other charge for exercise of rights granted under |
||||
|
this License, and you may not initiate litigation (including a cross-claim |
||||
|
or counterclaim in a lawsuit) alleging that any patent claim is infringed |
||||
|
by making, using, selling, offering for sale, or importing the Program or |
||||
|
any portion of it. |
||||
|
|
||||
|
11. Patents. |
||||
|
|
||||
|
A "contributor" is a copyright holder who authorizes use under this License |
||||
|
of the Program or a work on which the Program is based. The work thus licensed |
||||
|
is called the contributor's "contributor version". |
||||
|
|
||||
|
A contributor's "essential patent claims" are all patent claims owned or controlled |
||||
|
by the contributor, whether already acquired or hereafter acquired, that would |
||||
|
be infringed by some manner, permitted by this License, of making, using, |
||||
|
or selling its contributor version, but do not include claims that would be |
||||
|
infringed only as a consequence of further modification of the contributor |
||||
|
version. For purposes of this definition, "control" includes the right to |
||||
|
grant patent sublicenses in a manner consistent with the requirements of this |
||||
|
License. |
||||
|
|
||||
|
Each contributor grants you a non-exclusive, worldwide, royalty-free patent |
||||
|
license under the contributor's essential patent claims, to make, use, sell, |
||||
|
offer for sale, import and otherwise run, modify and propagate the contents |
||||
|
of its contributor version. |
||||
|
|
||||
|
In the following three paragraphs, a "patent license" is any express agreement |
||||
|
or commitment, however denominated, not to enforce a patent (such as an express |
||||
|
permission to practice a patent or covenant not to s ue for patent infringement). |
||||
|
To "grant" such a patent license to a party means to make such an agreement |
||||
|
or commitment not to enforce a patent against the party. |
||||
|
|
||||
|
If you convey a covered work, knowingly relying on a patent license, and the |
||||
|
Corresponding Source of the work is not available for anyone to copy, free |
||||
|
of charge and under the terms of this License, through a publicly available |
||||
|
network server or other readily accessible means, then you must either (1) |
||||
|
cause the Corresponding Source to be so available, or (2) arrange to deprive |
||||
|
yourself of the benefit of the patent license for this particular work, or |
||||
|
(3) arrange, in a manner consistent with the requirements of this License, |
||||
|
to extend the patent |
||||
|
|
||||
|
license to downstream recipients. "Knowingly relying" means you have actual |
||||
|
knowledge that, but for the patent license, your conveying the covered work |
||||
|
in a country, or your recipient's use of the covered work in a country, would |
||||
|
infringe one or more identifiable patents in that country that you have reason |
||||
|
to believe are valid. |
||||
|
|
||||
|
If, pursuant to or in connection with a single transaction or arrangement, |
||||
|
you convey, or propagate by procuring conveyance of, a covered work, and grant |
||||
|
a patent license to some of the parties receiving the covered work authorizing |
||||
|
them to use, propagate, modify or convey a specific copy of the covered work, |
||||
|
then the patent license you grant is automatically extended to all recipients |
||||
|
of the covered work and works based on it. |
||||
|
|
||||
|
A patent license is "discriminatory" if it does not include within the scope |
||||
|
of its coverage, prohibits the exercise of, or is conditioned on the non-exercise |
||||
|
of one or more of the rights that are specifically granted under this License. |
||||
|
You may not convey a covered work if you are a party to an arrangement with |
||||
|
a third party that is in the business of distributing software, under which |
||||
|
you make payment to the third party based on the extent of your activity of |
||||
|
conveying the work, and under which the third party grants, to any of the |
||||
|
parties who would receive the covered work from you, a discriminatory patent |
||||
|
license (a) in connection with copies of the covered work conveyed by you |
||||
|
(or copies made from those copies), or (b) primarily for and in connection |
||||
|
with specific products or compilations that contain the covered work, unless |
||||
|
you entered into that arrangement, or that patent license was granted, prior |
||||
|
to 28 March 2007. |
||||
|
|
||||
|
Nothing in this License shall be construed as excluding or limiting any implied |
||||
|
license or other defenses to infringement that may otherwise be available |
||||
|
to you under applicable patent law. |
||||
|
|
||||
|
12. No Surrender of Others' Freedom. |
||||
|
|
||||
|
If conditions are imposed on you (whether by court order, agreement or otherwise) |
||||
|
that contradict the conditions of this License, they do not excuse you from |
||||
|
the conditions of this License. If you cannot convey a covered work so as |
||||
|
to satisfy simultaneously your obligations under this License and any other |
||||
|
pertinent obligations, then as a consequence you may |
||||
|
|
||||
|
not convey it at all. For example, if you agree to terms that obligate you |
||||
|
to collect a royalty for further conveying from those to whom you convey the |
||||
|
Program, the only way you could satisfy both those terms and this License |
||||
|
would be to refrain entirely from conveying the Program. |
||||
|
|
||||
|
13. Remote Network Interaction; Use with the GNU General Public License. |
||||
|
|
||||
|
Notwithstanding any other provision of this License, if you modify the Program, |
||||
|
your modified version must prominently offer all users interacting with it |
||||
|
remotely through a computer network (if your version supports such interaction) |
||||
|
an opportunity to receive the Corresponding Source of your version by providing |
||||
|
access to the Corresponding Source from a network server at no charge, through |
||||
|
some standard or customary means of facilitating copying of software. This |
||||
|
Corresponding Source shall include the Corresponding Source for any work covered |
||||
|
by version 3 of the GNU General Public License that is incorporated pursuant |
||||
|
to the following paragraph. |
||||
|
|
||||
|
Notwithstanding any other provision of this License, you have permission to |
||||
|
link or combine any covered work with a work licensed under version 3 of the |
||||
|
GNU General Public License into a single combined work, and to convey the |
||||
|
resulting work. The terms of this License will continue to apply to the part |
||||
|
which is the covered work, but the work with which it is combined will remain |
||||
|
governed by version 3 of the GNU General Public License. |
||||
|
|
||||
|
14. Revised Versions of this License. |
||||
|
|
||||
|
The Free Software Foundation may publish revised and/or new versions of the |
||||
|
GNU Affero General Public License from time to time. Such new versions will |
||||
|
be similar in spirit to the present version, but may differ in detail to address |
||||
|
new problems or concerns. |
||||
|
|
||||
|
Each version is given a distinguishing version number. If the Program specifies |
||||
|
that a certain numbered version of the GNU Affero General Public License "or |
||||
|
any later version" applies to it, you have the option of following the terms |
||||
|
and conditions either of that numbered version or of any later version published |
||||
|
by the Free Software Foundation. If the Program does not specify a version |
||||
|
number of the GNU Affero General Public License, you may choose any version |
||||
|
ever published by the Free Software Foundation. |
||||
|
|
||||
|
If the Program specifies that a proxy can decide which future versions of |
||||
|
the GNU Affero General Public License can be used, that proxy's public statement |
||||
|
of acceptance of a version permanently authorizes you to choose that version |
||||
|
for the Program. |
||||
|
|
||||
|
Later license versions may give you additional or different permissions. However, |
||||
|
no additional obligations are imposed on any author or copyright holder as |
||||
|
a result of your choosing to follow a later version. |
||||
|
|
||||
|
15. Disclaimer of Warranty. |
||||
|
|
||||
|
THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE |
||||
|
LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR |
||||
|
OTHER PARTIES PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER |
||||
|
EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES |
||||
|
OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS |
||||
|
TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE PROGRAM |
||||
|
PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, REPAIR OR |
||||
|
CORRECTION. |
||||
|
|
||||
|
16. Limitation of Liability. |
||||
|
|
||||
|
IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL |
||||
|
ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MODIFIES AND/OR CONVEYS THE PROGRAM |
||||
|
AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY GENERAL, SPECIAL, |
||||
|
INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY TO |
||||
|
USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING RENDERED |
||||
|
INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF THE |
||||
|
PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS), EVEN IF SUCH HOLDER OR OTHER |
||||
|
PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. |
||||
|
|
||||
|
17. Interpretation of Sections 15 and 16. |
||||
|
|
||||
|
If the disclaimer of warranty and limitation of liability provided above cannot |
||||
|
be given local legal effect according to their terms, reviewing courts shall |
||||
|
apply local law that most closely approximates an absolute waiver of all civil |
||||
|
liability in connection with the Program, unless a warranty or assumption |
||||
|
of liability accompanies a copy of the Program in return for a fee. END OF |
||||
|
TERMS AND CONDITIONS |
||||
|
|
||||
|
How to Apply These Terms to Your New Programs |
||||
|
|
||||
|
If you develop a new program, and you want it to be of the greatest possible |
||||
|
use to the public, the best way to achieve this is to make it free software |
||||
|
which everyone can redistribute and change under these terms. |
||||
|
|
||||
|
To do so, attach the following notices to the program. It is safest to attach |
||||
|
them to the start of each source file to most effectively state the exclusion |
||||
|
of warranty; and each file should have at least the "copyright" line and a |
||||
|
pointer to where the full notice is found. |
||||
|
|
||||
|
<one line to give the program's name and a brief idea of what it does.> |
||||
|
|
||||
|
Copyright (C) <year> <name of author> |
||||
|
|
||||
|
This program is free software: you can redistribute it and/or modify it under |
||||
|
the terms of the GNU Affero General Public License as published by the Free |
||||
|
Software Foundation, either version 3 of the License, or (at your option) |
||||
|
any later version. |
||||
|
|
||||
|
This program is distributed in the hope that it will be useful, but WITHOUT |
||||
|
ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS |
||||
|
FOR A PARTICULAR PURPOSE. See the GNU Affero General Public License for more |
||||
|
details. |
||||
|
|
||||
|
You should have received a copy of the GNU Affero General Public License along |
||||
|
with this program. If not, see <http s ://www.gnu.org/licenses/>. |
||||
|
|
||||
|
Also add information on how to contact you by electronic and paper mail. |
||||
|
|
||||
|
If your software can interact with users remotely through a computer network, |
||||
|
you should also make sure that it provides a way for users to get its source. |
||||
|
For example, if your program is a web application, its interface could display |
||||
|
a "Source" link that leads users to an archive of the code. There are many |
||||
|
ways you could offer source, and different solutions will be better for different |
||||
|
programs; see section 13 for the specific requirements. |
||||
|
|
||||
|
You should also get your employer (if you work as a programmer) or school, |
||||
|
if any, to sign a "copyright disclaimer" for the program, if necessary. For |
||||
|
more information on this, and how to apply and follow the GNU AGPL, see <http |
||||
|
s ://www.gnu.org/licenses/>. |
@ -0,0 +1,52 @@ |
|||||
|
|
||||
|
DIR:=$(strip $(shell dirname $(realpath $(lastword $(MAKEFILE_LIST))))) |
||||
|
mkfile_path := $(abspath $(lastword $(MAKEFILE_LIST))) |
||||
|
current_dir := $(notdir $(patsubst %/,%,$(dir $(mkfile_path)))) |
||||
|
RHOST= |
||||
|
|
||||
|
SHELL := /bin/bash |
||||
|
|
||||
|
.PHONY: create help start stop list clean |
||||
|
|
||||
|
help: |
||||
|
@echo "" ; |
||||
|
@echo "" ; |
||||
|
@echo "--------------" ; |
||||
|
@echo " SwarmLab.io " ; |
||||
|
@echo "--------------" ; |
||||
|
@echo "" ; |
||||
|
@echo " USAGE: make [COMMAND]" ; |
||||
|
@echo "" ; |
||||
|
@echo " Examples of [COMMAND] can be:" ; |
||||
|
@echo "" ; |
||||
|
@echo " create: create service " ; |
||||
|
@echo "" ; |
||||
|
@echo " start: start service " ; |
||||
|
@echo "" ; |
||||
|
@echo " stop: shutdown service" ; |
||||
|
@echo "" ; |
||||
|
@echo " clean: remove images in the system" ; |
||||
|
@echo "" ; |
||||
|
@echo " list: show running containers of instance" ; |
||||
|
@echo "" ; |
||||
|
@echo " help: show this message" ; |
||||
|
@echo "" ; |
||||
|
@echo "More info:" ; |
||||
|
@echo "http://docs.swarmlab.io/SwarmLab-HowTos/swarmlab/docs/swarmlab/docs/index.html" ; |
||||
|
@echo "" ; |
||||
|
@echo "" ; |
||||
|
|
||||
|
create: |
||||
|
@./install/usr/share/swarmlab.io/sec/swarmlab-sec create 2>/dev/null ; true |
||||
|
|
||||
|
start: |
||||
|
@./install/usr/share/swarmlab.io/sec/swarmlab-sec up 2>/dev/null ; true |
||||
|
|
||||
|
list: |
||||
|
@./install/usr/share/swarmlab.io/sec/swarmlab-sec list 2>/dev/null ; true |
||||
|
|
||||
|
stop: |
||||
|
@./install/usr/share/swarmlab.io/sec/swarmlab-sec down 2>/dev/null ; true |
||||
|
|
||||
|
clean: |
||||
|
@./install/usr/share/swarmlab.io/sec/swarmlab-sec clean 2>/dev/null ; true |
@ -0,0 +1,93 @@ |
|||||
|
## Swarmlab is a collection of services that aims to |
||||
|
|
||||
|
> - provide teachers and professors with online remote tools to do their lessons |
||||
|
> |
||||
|
> - give students the opportunity to study real life examples in their chosen area of expertise |
||||
|
> |
||||
|
> - allow developers to fully test and debug their applications and provide POC’s |
||||
|
> |
||||
|
> - or you simply want to use a Application (in a microservices-based architecture) |
||||
|
> |
||||
|
> Swarmlab provides you with all the required tools, tools to teach work or try out demos in a completely virtual environment. |
||||
|
> |
||||
|
> More info: http://docs.swarmlab.io/SwarmLab-HowTos/swarmlab/docs/swarmlab/docs/index.html |
||||
|
|
||||
|
|
||||
|
|
||||
|
|
||||
|
![alt text](images/swarmlab-network.png "") |
||||
|
|
||||
|
## LabInstance julia |
||||
|
|
||||
|
Julia is a high-level, high-performance, dynamic programming language. While it is a general-purpose language and can be used to write any application, many of its features are well suited for numerical analysis and computational science |
||||
|
|
||||
|
## Quickstart |
||||
|
|
||||
|
This is a quickstart guide of howto use this |
||||
|
|
||||
|
|
||||
|
### Default Configuration |
||||
|
|
||||
|
- Working Directory |
||||
|
|
||||
|
> /home/docker/project |
||||
|
|
||||
|
- Default user |
||||
|
|
||||
|
> docker |
||||
|
|
||||
|
- Default password |
||||
|
|
||||
|
> docker |
||||
|
|
||||
|
- Default password4root |
||||
|
|
||||
|
> pass |
||||
|
|
||||
|
|
||||
|
|
||||
|
### RUN INSTANCE |
||||
|
|
||||
|
Swarmlab services can be run in different ways. |
||||
|
|
||||
|
- You can run them **through the swarmlab hybrid environment** (http://docs.swarmlab.io/SwarmLab-HowTos/swarmlab/docs/swarmlab/docs/hybrid/start-microservices.html) |
||||
|
- or use them individually at will on the **command line of your system** |
||||
|
|
||||
|
|
||||
|
|
||||
|
#### CLI |
||||
|
|
||||
|
> git clone ... |
||||
|
> |
||||
|
> cd [DIRECTORY] |
||||
|
> |
||||
|
|
||||
|
#### help |
||||
|
> |
||||
|
> make help |
||||
|
> |
||||
|
|
||||
|
#### create service |
||||
|
> |
||||
|
> make create |
||||
|
> |
||||
|
|
||||
|
#### start service |
||||
|
> |
||||
|
> make start |
||||
|
> |
||||
|
|
||||
|
#### stop service |
||||
|
> |
||||
|
> make stop |
||||
|
> |
||||
|
|
||||
|
#### list service |
||||
|
> |
||||
|
> make list |
||||
|
> |
||||
|
|
||||
|
#### clean service |
||||
|
> |
||||
|
> make clean |
||||
|
> |
@ -0,0 +1,15 @@ |
|||||
|
function EPHEMERAL_PORT() { |
||||
|
LOW_BOUND=49152 |
||||
|
RANGE=16384 |
||||
|
while true; do |
||||
|
CANDIDATE=$[$LOW_BOUND + ($RANDOM % $RANGE)] |
||||
|
(echo "" >/dev/tcp/127.0.0.1/${CANDIDATE}) >/dev/null 2>&1 |
||||
|
if [ $? -ne 0 ]; then |
||||
|
echo $CANDIDATE |
||||
|
break |
||||
|
fi |
||||
|
done |
||||
|
} |
||||
|
|
||||
|
port=$(EPHEMERAL_PORT) |
||||
|
echo $port |
After Width: | Height: | Size: 80 KiB |
@ -0,0 +1,30 @@ |
|||||
|
#/usr/bin/env bash |
||||
|
_mpi() |
||||
|
{ |
||||
|
local commands_number=${DOTHIS_COMPLETION_COMMANDS_NUMBER:-50} |
||||
|
local IFS=$'\n' |
||||
|
local suggestions=($(compgen -W "$(cat $1 | sed 's/\t//')" -- "${COMP_WORDS[1]}")) |
||||
|
local sug=1 |
||||
|
if [ "${#suggestions[@]}" == "$sug" ]; then |
||||
|
local number="${suggestions[0]/%\ */}" |
||||
|
COMPREPLY=("$number") |
||||
|
else |
||||
|
for i in "${!suggestions[@]}"; do |
||||
|
suggestions[$i]="$(printf '%*s' "-$COLUMNS" "${suggestions[$i]}")" |
||||
|
done |
||||
|
|
||||
|
COMPREPLY=("${suggestions[@]}") |
||||
|
fi |
||||
|
} |
||||
|
_mpi_completions() |
||||
|
{ |
||||
|
local LAB_files=${LAB_PATH} |
||||
|
if [ "${#COMP_WORDS[@]}" == "2" ] && [ "${#COMP_WORDS[@]}" != "3" ]; then |
||||
|
local file2="/usr/share/swarmlab.io/mpi/commands" |
||||
|
_mpi "$file2" 1 |
||||
|
fi |
||||
|
|
||||
|
|
||||
|
} |
||||
|
complete -F _mpi_completions swarmlab-mpi |
||||
|
|
@ -0,0 +1 @@ |
|||||
|
export PATH=$PATH:/usr/share/swarmlab.io/mpi |
@ -0,0 +1,127 @@ |
|||||
|
# ~/.bashrc: executed by bash(1) for non-login shells. |
||||
|
# see /usr/share/doc/bash/examples/startup-files (in the package bash-doc) |
||||
|
# for examples |
||||
|
|
||||
|
# If not running interactively, don't do anything |
||||
|
case $- in |
||||
|
*i*) ;; |
||||
|
*) return;; |
||||
|
esac |
||||
|
|
||||
|
# don't put duplicate lines or lines starting with space in the history. |
||||
|
# See bash(1) for more options |
||||
|
HISTCONTROL=ignoreboth |
||||
|
|
||||
|
# append to the history file, don't overwrite it |
||||
|
shopt -s histappend |
||||
|
|
||||
|
# for setting history length see HISTSIZE and HISTFILESIZE in bash(1) |
||||
|
HISTSIZE=1000 |
||||
|
HISTFILESIZE=2000 |
||||
|
|
||||
|
# check the window size after each command and, if necessary, |
||||
|
# update the values of LINES and COLUMNS. |
||||
|
shopt -s checkwinsize |
||||
|
|
||||
|
# If set, the pattern "**" used in a pathname expansion context will |
||||
|
# match all files and zero or more directories and subdirectories. |
||||
|
#shopt -s globstar |
||||
|
|
||||
|
# make less more friendly for non-text input files, see lesspipe(1) |
||||
|
[ -x /usr/bin/lesspipe ] && eval "$(SHELL=/bin/sh lesspipe)" |
||||
|
|
||||
|
# set variable identifying the chroot you work in (used in the prompt below) |
||||
|
if [ -z "${debian_chroot:-}" ] && [ -r /etc/debian_chroot ]; then |
||||
|
debian_chroot=$(cat /etc/debian_chroot) |
||||
|
fi |
||||
|
|
||||
|
# set a fancy prompt (non-color, unless we know we "want" color) |
||||
|
case "$TERM" in |
||||
|
xterm-color|*-256color) color_prompt=yes;; |
||||
|
esac |
||||
|
|
||||
|
# uncomment for a colored prompt, if the terminal has the capability; turned |
||||
|
# off by default to not distract the user: the focus in a terminal window |
||||
|
# should be on the output of commands, not on the prompt |
||||
|
#force_color_prompt=yes |
||||
|
|
||||
|
if [ -n "$force_color_prompt" ]; then |
||||
|
if [ -x /usr/bin/tput ] && tput setaf 1 >&/dev/null; then |
||||
|
# We have color support; assume it's compliant with Ecma-48 |
||||
|
# (ISO/IEC-6429). (Lack of such support is extremely rare, and such |
||||
|
# a case would tend to support setf rather than setaf.) |
||||
|
color_prompt=yes |
||||
|
else |
||||
|
color_prompt= |
||||
|
fi |
||||
|
fi |
||||
|
|
||||
|
if [ "$color_prompt" = yes ]; then |
||||
|
PS1='${debian_chroot:+($debian_chroot)}\[\033[01;32m\]\u@\h\[\033[00m\]:\[\033[01;34m\]\w\[\033[00m\]\$ ' |
||||
|
else |
||||
|
PS1='${debian_chroot:+($debian_chroot)}\u@\h:\w\$ ' |
||||
|
fi |
||||
|
unset color_prompt force_color_prompt |
||||
|
|
||||
|
# If this is an xterm set the title to user@host:dir |
||||
|
case "$TERM" in |
||||
|
xterm*|rxvt*) |
||||
|
PS1="\[\e]0;${debian_chroot:+($debian_chroot)}\u@\h: \w\a\]$PS1" |
||||
|
;; |
||||
|
*) |
||||
|
;; |
||||
|
esac |
||||
|
|
||||
|
# enable color support of ls and also add handy aliases |
||||
|
if [ -x /usr/bin/dircolors ]; then |
||||
|
test -r ~/.dircolors && eval "$(dircolors -b ~/.dircolors)" || eval "$(dircolors -b)" |
||||
|
alias ls='ls --color=auto' |
||||
|
#alias dir='dir --color=auto' |
||||
|
#alias vdir='vdir --color=auto' |
||||
|
|
||||
|
alias grep='grep --color=auto' |
||||
|
alias fgrep='fgrep --color=auto' |
||||
|
alias egrep='egrep --color=auto' |
||||
|
fi |
||||
|
|
||||
|
# colored GCC warnings and errors |
||||
|
#export GCC_COLORS='error=01;31:warning=01;35:note=01;36:caret=01;32:locus=01:quote=01' |
||||
|
|
||||
|
# some more ls aliases |
||||
|
alias ll='ls -alF' |
||||
|
alias la='ls -A' |
||||
|
alias l='ls -CF' |
||||
|
|
||||
|
# Add an "alert" alias for long running commands. Use like so: |
||||
|
# sleep 10; alert |
||||
|
alias alert='notify-send --urgency=low -i "$([ $? = 0 ] && echo terminal || echo error)" "$(history|tail -n1|sed -e '\''s/^\s*[0-9]\+\s*//;s/[;&|]\s*alert$//'\'')"' |
||||
|
|
||||
|
# Alias definitions. |
||||
|
# You may want to put all your additions into a separate file like |
||||
|
# ~/.bash_aliases, instead of adding them here directly. |
||||
|
# See /usr/share/doc/bash-doc/examples in the bash-doc package. |
||||
|
|
||||
|
if [ -f ~/.bash_aliases ]; then |
||||
|
. ~/.bash_aliases |
||||
|
fi |
||||
|
|
||||
|
if [ -d /etc/profile.d ]; then |
||||
|
for i in /etc/profile.d/*.sh; do |
||||
|
if [ -r $i ]; then |
||||
|
. $i |
||||
|
fi |
||||
|
done |
||||
|
unset i |
||||
|
fi |
||||
|
|
||||
|
|
||||
|
# enable programmable completion features (you don't need to enable |
||||
|
# this, if it's already enabled in /etc/bash.bashrc and /etc/profile |
||||
|
# sources /etc/bash.bashrc). |
||||
|
if ! shopt -oq posix; then |
||||
|
if [ -f /usr/share/bash-completion/bash_completion ]; then |
||||
|
. /usr/share/bash-completion/bash_completion |
||||
|
elif [ -f /etc/bash_completion ]; then |
||||
|
. /etc/bash_completion |
||||
|
fi |
||||
|
fi |
@ -0,0 +1,4 @@ |
|||||
|
REGISTRY_ADDR=localhost |
||||
|
REGISTRY_PORT=5000 |
||||
|
IMAGE_NAME=sec |
||||
|
SSH_PORT=2222 |
@ -0,0 +1,15 @@ |
|||||
|
map <C-e> :NERDTreeToggle<CR> |
||||
|
|
||||
|
autocmd BufNewFile,BufRead *.vue,*.js set syntax=verilog tabstop=2|set shiftwidth=2|set noexpandtab autoindent |
||||
|
augroup remember_folds |
||||
|
autocmd! |
||||
|
autocmd BufWinLeave * mkview |
||||
|
autocmd BufWinEnter * silent! loadview |
||||
|
augroup END |
||||
|
" Useful for my Quick Notes feature in my tmuxrc |
||||
|
augroup QuickNotes |
||||
|
au BufWrite,VimLeave NOTES.otl mkview |
||||
|
au BufRead NOTES.otl silent loadview |
||||
|
augroup END |
||||
|
set swapfile |
||||
|
set dir=~/tmp |
@ -0,0 +1,614 @@ |
|||||
|
GNU AFFERO GENERAL PUBLIC LICENSE |
||||
|
|
||||
|
Version 3, 19 November 2007 |
||||
|
|
||||
|
Copyright (C) 2007 Free Software Foundation, Inc. <http s ://fsf.org/> |
||||
|
|
||||
|
Everyone is permitted to copy and distribute verbatim copies of this license |
||||
|
document, but changing it is not allowed. |
||||
|
|
||||
|
Preamble |
||||
|
|
||||
|
The GNU Affero General Public License is a free, copyleft license for software |
||||
|
and other kinds of works, specifically designed to ensure cooperation with |
||||
|
the community in the case of network server software. |
||||
|
|
||||
|
The licenses for most software and other practical works are designed to take |
||||
|
away your freedom to share and change the works. By contrast, our General |
||||
|
Public Licenses are intended to guarantee your freedom to share and change |
||||
|
all versions of a program--to make sure it remains free software for all its |
||||
|
users. |
||||
|
|
||||
|
When we speak of free software, we are referring to freedom, not price. Our |
||||
|
General Public Licenses are designed to make sure that you have the freedom |
||||
|
to distribute copies of free software (and charge for them if you wish), that |
||||
|
you receive source code or can get it if you want it, that you can change |
||||
|
the software or use pieces of it in new free programs, and that you know you |
||||
|
can do these things. |
||||
|
|
||||
|
Developers that use our General Public Licenses protect your rights with two |
||||
|
steps: (1) assert copyright on the software, and (2) offer you this License |
||||
|
which gives you legal permission to copy, distribute and/or modify the software. |
||||
|
|
||||
|
A secondary benefit of defending all users' freedom is that improvements made |
||||
|
in alternate versions of the program, if they receive widespread use, become |
||||
|
available for other developers to incorporate. Many developers of free software |
||||
|
are heartened and encouraged by the resulting cooperation. However, in the |
||||
|
case of software used on network servers, this result may fail to come about. |
||||
|
The GNU General Public License permits making a modified version and letting |
||||
|
the public access it on a server without ever releasing its source code to |
||||
|
the public. |
||||
|
|
||||
|
The GNU Affero General Public License is designed specifically to ensure that, |
||||
|
in such cases, the modified source code becomes available to the community. |
||||
|
It requires the operator of a network server to provide the source code of |
||||
|
the modified version running there to the users of that server. Therefore, |
||||
|
public use of a modified version, on a publicly accessible server, gives the |
||||
|
public access to the source code of the modified version. |
||||
|
|
||||
|
An older license, called the Affero General Public License and published by |
||||
|
Affero, was designed to accomplish similar goals. This is a different license, |
||||
|
not a version of the Affero GPL, but Affero has released a new version of |
||||
|
the Affero GPL which permits relicensing under this license. |
||||
|
|
||||
|
The precise terms and conditions for copying, distribution and modification |
||||
|
follow. |
||||
|
|
||||
|
TERMS AND CONDITIONS |
||||
|
|
||||
|
0. Definitions. |
||||
|
|
||||
|
"This License" refers to version 3 of the GNU Affero General Public License. |
||||
|
|
||||
|
"Copyright" also means copyright-like laws that apply to other kinds of works, |
||||
|
such as semiconductor masks. |
||||
|
|
||||
|
"The Program" refers to any copyrightable work licensed under this License. |
||||
|
Each licensee is addressed as "you". "Licensees" and "recipients" may be individuals |
||||
|
or organizations. |
||||
|
|
||||
|
To "modify" a work means to copy from or adapt all or part of the work in |
||||
|
a fashion requiring copyright permission, other than the making of an exact |
||||
|
copy. The resulting work is called a "modified version" of the earlier work |
||||
|
or a work "based on" the earlier work. |
||||
|
|
||||
|
A "covered work" means either the unmodified Program or a work based on the |
||||
|
Program. |
||||
|
|
||||
|
To "propagate" a work means to do anything with it that, without permission, |
||||
|
would make you directly or secondarily liable for infringement under applicable |
||||
|
copyright law, except executing it on a computer or modifying a private copy. |
||||
|
Propagation includes copying, distribution (with or without modification), |
||||
|
making available to the public, and in some countries other activities as |
||||
|
well. |
||||
|
|
||||
|
To "convey" a work means any kind of propagation that enables other parties |
||||
|
to make or receive copies. Mere interaction with a user through a computer |
||||
|
network, with no transfer of a copy, is not conveying. |
||||
|
|
||||
|
An interactive user interface displays "Appropriate Legal Notices" to the |
||||
|
extent that it includes a convenient and prominently visible feature that |
||||
|
(1) displays an appropriate copyright notice, and (2) tells the user that |
||||
|
there is no warranty for the work (except to the extent that warranties are |
||||
|
provided), that licensees may convey the work under this License, and how |
||||
|
to view a copy of this License. If the interface presents a list of user commands |
||||
|
or options, such as a menu, a prominent item in the list meets this criterion. |
||||
|
|
||||
|
1. Source Code. |
||||
|
|
||||
|
The "source code" for a work means the preferred form of the work for making |
||||
|
modifications to it. "Object code" means any non-source form of a work. |
||||
|
|
||||
|
A "Standard Interface" means an interface that either is an official standard |
||||
|
defined by a recognized standards body, or, in the case of interfaces specified |
||||
|
for a particular programming language, one that is widely used among developers |
||||
|
working in that language. |
||||
|
|
||||
|
The "System Libraries" of an executable work include anything, other than |
||||
|
the work as a whole, that (a) is included in the normal form of packaging |
||||
|
a Major Component, but which is not part of that Major Component, and (b) |
||||
|
serves only to enable use of the work with that Major Component, or to implement |
||||
|
a Standard Interface for which an implementation is available to the public |
||||
|
in source code form. A "Major Component", in this context, means a major essential |
||||
|
component (kernel, window system, and so on) of the specific operating system |
||||
|
(if any) on which the executable work runs, or a compiler used to produce |
||||
|
the work, or an object code interpreter used to run it. |
||||
|
|
||||
|
The "Corresponding Source" for a work in object code form means all the source |
||||
|
code needed to generate, install, and (for an executable work) run the object |
||||
|
code and to modify the work, including scripts to control those activities. |
||||
|
However, it does not include the work's System Libraries, or general-purpose |
||||
|
tools or generally available free programs which are used unmodified in performing |
||||
|
those activities but which are not part of the work. For example, Corresponding |
||||
|
Source includes interface definition files associated with source files for |
||||
|
the work, and the source code for shared libraries and dynamically linked |
||||
|
subprograms that the work is specifically designed to require, such as by |
||||
|
intimate data communication or control flow between those |
||||
|
|
||||
|
subprograms and other parts of the work. |
||||
|
|
||||
|
The Corresponding Source need not include anything that users can regenerate |
||||
|
automatically from other parts of the Corresponding Source. |
||||
|
|
||||
|
The Corresponding Source for a work in source code form is that same work. |
||||
|
|
||||
|
2. Basic Permissions. |
||||
|
|
||||
|
All rights granted under this License are granted for the term of copyright |
||||
|
on the Program, and are irrevocable provided the stated conditions are met. |
||||
|
This License explicitly affirms your unlimited permission to run the unmodified |
||||
|
Program. The output from running a covered work is covered by this License |
||||
|
only if the output, given its content, constitutes a covered work. This License |
||||
|
acknowledges your rights of fair use or other equivalent, as provided by copyright |
||||
|
law. |
||||
|
|
||||
|
You may make, run and propagate covered works that you do not convey, without |
||||
|
conditions so long as your license otherwise remains in force. You may convey |
||||
|
covered works to others for the sole purpose of having them make modifications |
||||
|
exclusively for you, or provide you with facilities for running those works, |
||||
|
provided that you comply with the terms of this License in conveying all material |
||||
|
for which you do not control copyright. Those thus making or running the covered |
||||
|
works for you must do so exclusively on your behalf, under your direction |
||||
|
and control, on terms that prohibit them from making any copies of your copyrighted |
||||
|
material outside their relationship with you. |
||||
|
|
||||
|
Conveying under any other circumstances is permitted solely under the conditions |
||||
|
stated below. Sublicensing is not allowed; section 10 makes it unnecessary. |
||||
|
|
||||
|
3. Protecting Users' Legal Rights From Anti-Circumvention Law. |
||||
|
|
||||
|
No covered work shall be deemed part of an effective technological measure |
||||
|
under any applicable law fulfilling obligations under article 11 of the WIPO |
||||
|
copyright treaty adopted on 20 December 1996, or similar laws prohibiting |
||||
|
or restricting circumvention of such measures. |
||||
|
|
||||
|
When you convey a covered work, you waive any legal power to forbid circumvention |
||||
|
of technological measures to the extent such circumvention is effected by |
||||
|
exercising rights under this License with respect to the covered work, and |
||||
|
you disclaim any intention to limit operation or modification of the work |
||||
|
as a means of enforcing, against the work's users, your or third parties' |
||||
|
legal rights to forbid circumvention of technological measures. |
||||
|
|
||||
|
4. Conveying Verbatim Copies. |
||||
|
|
||||
|
You may convey verbatim copies of the Program's source code as you receive |
||||
|
it, in any medium, provided that you conspicuously and appropriately publish |
||||
|
on each copy an appropriate copyright notice; keep intact all notices stating |
||||
|
that this License and any non-permissive terms added in accord with section |
||||
|
7 apply to the code; keep intact all notices of the absence of any warranty; |
||||
|
and give all recipients a copy of this License along with the Program. |
||||
|
|
||||
|
You may charge any price or no price for each copy that you convey, and you |
||||
|
may offer support or warranty protection for a fee. |
||||
|
|
||||
|
5. Conveying Modified Source Versions. |
||||
|
|
||||
|
You may convey a work based on the Program, or the modifications to produce |
||||
|
it from the Program, in the form of source code under the terms of section |
||||
|
4, provided that you also meet all of these conditions: |
||||
|
|
||||
|
a) The work must carry prominent notices stating that you modified it, and |
||||
|
giving a relevant date. |
||||
|
|
||||
|
b) The work must carry prominent notices stating that it is released under |
||||
|
this License and any conditions added under section 7. This requirement modifies |
||||
|
the requirement in section 4 to "keep intact all notices". |
||||
|
|
||||
|
c) You must license the entire work, as a whole, under this License to anyone |
||||
|
who comes into possession of a copy. This License will therefore apply, along |
||||
|
with any applicable section 7 additional terms, to the whole of the work, |
||||
|
and all its parts, regardless of how they are packaged. This License gives |
||||
|
no permission to license the work in any other way, but it does not invalidate |
||||
|
such permission if you have separately received it. |
||||
|
|
||||
|
d) If the work has interactive user interfaces, each must display Appropriate |
||||
|
Legal Notices; however, if the Program has interactive interfaces that do |
||||
|
not display Appropriate Legal Notices, your work need not make them do so. |
||||
|
|
||||
|
A compilation of a covered work with other separate and independent works, |
||||
|
which are not by their nature extensions of the covered work, and which are |
||||
|
not combined with it such as to form a larger program, in or on a volume of |
||||
|
a storage or distribution medium, is called an "aggregate" if the compilation |
||||
|
and its resulting copyright are not used to limit the access or legal rights |
||||
|
of the compilation's users beyond what the individual works permit. Inclusion |
||||
|
of a covered work in an aggregate does not cause this License to apply to |
||||
|
the other parts of the aggregate. |
||||
|
|
||||
|
6. Conveying Non-Source Forms. |
||||
|
|
||||
|
You may convey a covered work in object code form under the terms of sections |
||||
|
4 and 5, provided that you also convey the machine-readable Corresponding |
||||
|
Source under the terms of this License, in one of these ways: |
||||
|
|
||||
|
a) Convey the object code in, or embodied in, a physical product (including |
||||
|
a physical distribution medium), accompanied by the Corresponding Source fixed |
||||
|
on a durable physical medium customarily used for software interchange. |
||||
|
|
||||
|
b) Convey the object code in, or embodied in, a physical product (including |
||||
|
a physical distribution medium), accompanied by a written offer, valid for |
||||
|
at least three years and valid for as long as you offer spare parts or customer |
||||
|
support for that product model, to give anyone who possesses the object code |
||||
|
either (1) a copy of the Corresponding Source for all the software in the |
||||
|
product that is covered by this License, on a durable physical medium customarily |
||||
|
used for software interchange, for a price no more than your reasonable cost |
||||
|
of physically performing this conveying of source, or (2) access to copy the |
||||
|
Corresponding Source from a network server at no charge. |
||||
|
|
||||
|
c) Convey individual copies of the object code with a copy of the written |
||||
|
offer to provide the Corresponding Source. This alternative is allowed only |
||||
|
occasionally and noncommercially, and only if you received the object code |
||||
|
with such an offer, in accord with subsection 6b. |
||||
|
|
||||
|
d) Convey the object code by offering access from a designated place (gratis |
||||
|
or for a charge), and offer equivalent access to the Corresponding Source |
||||
|
in the same way through the same place at no further charge. You need not |
||||
|
require recipients to copy the Corresponding Source along with the object |
||||
|
code. If the place to copy the object code is a network server, the Corresponding |
||||
|
Source may be on a different server (operated by you or a third party) that |
||||
|
supports equivalent copying facilities, provided you maintain clear directions |
||||
|
next to the object code saying where to find the Corresponding Source. Regardless |
||||
|
of what server hosts the Corresponding Source, you remain obligated to ensure |
||||
|
that it is available for as long as needed to satisfy these requirements. |
||||
|
|
||||
|
e) Convey the object code using peer-to-peer transmission, provided you inform |
||||
|
other peers where the object code and Corresponding Source of the work are |
||||
|
being offered to the general public at no charge under subsection 6d. |
||||
|
|
||||
|
A separable portion of the object code, whose source code is excluded from |
||||
|
the Corresponding Source as a System Library, need not be included in conveying |
||||
|
the object code work. |
||||
|
|
||||
|
A "User Product" is either (1) a "consumer product", which means any tangible |
||||
|
personal property which is normally used for personal, family, or household |
||||
|
purposes, or (2) anything designed or sold for incorporation into a dwelling. |
||||
|
In determining whether a product is a consumer product, doubtful cases shall |
||||
|
be resolved in favor of coverage. For a particular product received by a particular |
||||
|
user, "normally used" refers to a typical or common use of that class of product, |
||||
|
regardless of the status of the particular user or of the way in which the |
||||
|
particular user actually uses, or expects or is expected to use, the product. |
||||
|
A product is a consumer product regardless of whether the product has substantial |
||||
|
commercial, industrial or non-consumer uses, unless such uses represent the |
||||
|
only significant mode of use of the product. |
||||
|
|
||||
|
"Installation Information" for a User Product means any methods, procedures, |
||||
|
authorization keys, or other information required to install and execute modified |
||||
|
versions of a covered work in that User Product from a modified version of |
||||
|
its Corresponding Source. The information must suffice to ensure that the |
||||
|
continued functioning of the modified object code is in no case prevented |
||||
|
or interfered with solely because modification has been made. |
||||
|
|
||||
|
If you convey an object code work under this section in, or with, or specifically |
||||
|
for use in, a User Product, and the conveying occurs as part of a transaction |
||||
|
in which the right of possession and use of the User Product is transferred |
||||
|
to the recipient in perpetuity or for a fixed term (regardless of how the |
||||
|
transaction is characterized), the Corresponding Source conveyed under this |
||||
|
section must be accompanied by the Installation Information. But this requirement |
||||
|
does not apply if neither you nor any third party retains the ability to install |
||||
|
modified object code on the User Product (for example, the work has been installed |
||||
|
in ROM). |
||||
|
|
||||
|
The requirement to provide Installation Information does not include a requirement |
||||
|
to continue to provide support service, warranty, or updates for a work that |
||||
|
has been modified or installed by the recipient, or for the User Product in |
||||
|
which it has been modified or installed. Access to a network may be denied |
||||
|
when the modification itself materially and adversely affects the operation |
||||
|
of the network or violates the rules and protocols for communication across |
||||
|
the network. |
||||
|
|
||||
|
Corresponding Source conveyed, and Installation Information provided, in accord |
||||
|
with this section must be in a format that is publicly documented (and with |
||||
|
an implementation available to the public in source code form), and must require |
||||
|
no special password or key for unpacking, reading or copying. |
||||
|
|
||||
|
7. Additional Terms. |
||||
|
|
||||
|
"Additional permissions" are terms that supplement the terms of this License |
||||
|
by making exceptions from one or more of its conditions. Additional permissions |
||||
|
that are applicable to the entire Program shall be treated as though they |
||||
|
were included in this License, to the extent that they are valid under applicable |
||||
|
law. If additional permissions apply only to part of the Program, that part |
||||
|
may be used separately under those permissions, but the entire Program remains |
||||
|
governed by this License without regard to the additional permissions. |
||||
|
|
||||
|
When you convey a copy of a covered work, you may at your option remove any |
||||
|
additional permissions from that copy, or from any part of it. (Additional |
||||
|
permissions may be written to require their own removal in certain cases when |
||||
|
you modify the work.) You may place additional permissions on material, added |
||||
|
by you to a covered work, for which you have or can give appropriate copyright |
||||
|
permission. |
||||
|
|
||||
|
Notwithstanding any other provision of this License, for material you add |
||||
|
to a covered work, you may (if authorized by the copyright holders of that |
||||
|
material) supplement the terms of this License with terms: |
||||
|
|
||||
|
a) Disclaiming warranty or limiting liability differently from the terms of |
||||
|
sections 15 and 16 of this License; or |
||||
|
|
||||
|
b) Requiring preservation of specified reasonable legal notices or author |
||||
|
attributions in that material or in the Appropriate Legal Notices displayed |
||||
|
by works containing it; or |
||||
|
|
||||
|
c) Prohibiting misrepresentation of the origin of that material, or requiring |
||||
|
that modified versions of such material be marked in reasonable ways as different |
||||
|
from the original version; or |
||||
|
|
||||
|
d) Limiting the use for publicity purposes of names of licensors or authors |
||||
|
of the material; or |
||||
|
|
||||
|
e) Declining to grant rights under trademark law for use of some trade names, |
||||
|
trademarks, or service marks; or |
||||
|
|
||||
|
f) Requiring indemnification of licensors and authors of that material by |
||||
|
anyone who conveys the material (or modified versions of it) with contractual |
||||
|
assumptions of liability to the recipient, for any liability that these contractual |
||||
|
assumptions directly impose on those licensors and authors. |
||||
|
|
||||
|
All other non-permissive additional terms are considered "further restrictions" |
||||
|
within the meaning of section 10. If the Program as you received it, or any |
||||
|
part of it, contains a notice stating that it is governed by this License |
||||
|
along with a term that is a further restriction, you may remove that term. |
||||
|
If a license document contains a further restriction but permits relicensing |
||||
|
or conveying under this License, you may add to a covered work material governed |
||||
|
by the terms of that license document, provided that the further restriction |
||||
|
does not survive such relicensing or conveying. |
||||
|
|
||||
|
If you add terms to a covered work in accord with this section, you must place, |
||||
|
in the relevant source files, a statement of the additional terms that apply |
||||
|
to those files, or a notice indicating where to find the applicable terms. |
||||
|
|
||||
|
Additional terms, permissive or non-permissive, may be stated in the form |
||||
|
of a separately written license, or stated as exceptions; the above requirements |
||||
|
apply either way. |
||||
|
|
||||
|
8. Termination. |
||||
|
|
||||
|
You may not propagate or modify a covered work except as expressly provided |
||||
|
under this License. Any attempt otherwise to propagate or modify it is void, |
||||
|
and will automatically terminate your rights under this License (including |
||||
|
any patent licenses granted under the third paragraph of section 11). |
||||
|
|
||||
|
However, if you cease all violation of this License, then your license from |
||||
|
a particular copyright holder is reinstated (a) provisionally, unless and |
||||
|
until the copyright holder explicitly and finally terminates your license, |
||||
|
and (b) permanently, if the copyright holder fails to notify you of the violation |
||||
|
by some reasonable means prior to 60 days after the cessation. |
||||
|
|
||||
|
Moreover, your license from a particular copyright holder is reinstated permanently |
||||
|
if the copyright holder notifies you of the violation by some reasonable means, |
||||
|
this is the first time you have received notice of violation of this License |
||||
|
(for any work) from that copyright holder, and you cure the violation prior |
||||
|
to 30 days after your receipt of the notice. |
||||
|
|
||||
|
Termination of your rights under this section does not terminate the licenses |
||||
|
of parties who have received copies or rights from you under this License. |
||||
|
If your rights have been terminated and not permanently reinstated, you do |
||||
|
not qualify to receive new licenses for the same material under section 10. |
||||
|
|
||||
|
9. Acceptance Not Required for Having Copies. |
||||
|
|
||||
|
You are not required to accept this License in order to receive or run a copy |
||||
|
of the Program. Ancillary propagation of a covered work occurring solely as |
||||
|
a consequence of using peer-to-peer transmission to receive a copy likewise |
||||
|
does not require acceptance. However, nothing other than this License grants |
||||
|
you permission to propagate or modify any covered work. These actions infringe |
||||
|
copyright if you do not accept this License. Therefore, by modifying or propagating |
||||
|
a covered work, you indicate your acceptance of this License to do so. |
||||
|
|
||||
|
10. Automatic Licensing of Downstream Recipients. |
||||
|
|
||||
|
Each time you convey a covered work, the recipient automatically receives |
||||
|
a license from the original licensors, to run, modify and propagate that work, |
||||
|
subject to this License. You are not responsible for enforcing compliance |
||||
|
by third parties with this License. |
||||
|
|
||||
|
An "entity transaction" is a transaction transferring control of an organization, |
||||
|
or substantially all assets of one, or subdividing an organization, or merging |
||||
|
organizations. If propagation of a covered work results from an entity transaction, |
||||
|
each party to that transaction who receives a copy of the work also receives |
||||
|
whatever licenses to the work the party's predecessor in interest had or could |
||||
|
give under the previous paragraph, plus a right to possession of the Corresponding |
||||
|
Source of the work from the predecessor in interest, if the predecessor has |
||||
|
it or can get it with reasonable efforts. |
||||
|
|
||||
|
You may not impose any further restrictions on the exercise of the rights |
||||
|
granted or affirmed under this License. For example, you may not impose a |
||||
|
license fee, royalty, or other charge for exercise of rights granted under |
||||
|
this License, and you may not initiate litigation (including a cross-claim |
||||
|
or counterclaim in a lawsuit) alleging that any patent claim is infringed |
||||
|
by making, using, selling, offering for sale, or importing the Program or |
||||
|
any portion of it. |
||||
|
|
||||
|
11. Patents. |
||||
|
|
||||
|
A "contributor" is a copyright holder who authorizes use under this License |
||||
|
of the Program or a work on which the Program is based. The work thus licensed |
||||
|
is called the contributor's "contributor version". |
||||
|
|
||||
|
A contributor's "essential patent claims" are all patent claims owned or controlled |
||||
|
by the contributor, whether already acquired or hereafter acquired, that would |
||||
|
be infringed by some manner, permitted by this License, of making, using, |
||||
|
or selling its contributor version, but do not include claims that would be |
||||
|
infringed only as a consequence of further modification of the contributor |
||||
|
version. For purposes of this definition, "control" includes the right to |
||||
|
grant patent sublicenses in a manner consistent with the requirements of this |
||||
|
License. |
||||
|
|
||||
|
Each contributor grants you a non-exclusive, worldwide, royalty-free patent |
||||
|
license under the contributor's essential patent claims, to make, use, sell, |
||||
|
offer for sale, import and otherwise run, modify and propagate the contents |
||||
|
of its contributor version. |
||||
|
|
||||
|
In the following three paragraphs, a "patent license" is any express agreement |
||||
|
or commitment, however denominated, not to enforce a patent (such as an express |
||||
|
permission to practice a patent or covenant not to s ue for patent infringement). |
||||
|
To "grant" such a patent license to a party means to make such an agreement |
||||
|
or commitment not to enforce a patent against the party. |
||||
|
|
||||
|
If you convey a covered work, knowingly relying on a patent license, and the |
||||
|
Corresponding Source of the work is not available for anyone to copy, free |
||||
|
of charge and under the terms of this License, through a publicly available |
||||
|
network server or other readily accessible means, then you must either (1) |
||||
|
cause the Corresponding Source to be so available, or (2) arrange to deprive |
||||
|
yourself of the benefit of the patent license for this particular work, or |
||||
|
(3) arrange, in a manner consistent with the requirements of this License, |
||||
|
to extend the patent |
||||
|
|
||||
|
license to downstream recipients. "Knowingly relying" means you have actual |
||||
|
knowledge that, but for the patent license, your conveying the covered work |
||||
|
in a country, or your recipient's use of the covered work in a country, would |
||||
|
infringe one or more identifiable patents in that country that you have reason |
||||
|
to believe are valid. |
||||
|
|
||||
|
If, pursuant to or in connection with a single transaction or arrangement, |
||||
|
you convey, or propagate by procuring conveyance of, a covered work, and grant |
||||
|
a patent license to some of the parties receiving the covered work authorizing |
||||
|
them to use, propagate, modify or convey a specific copy of the covered work, |
||||
|
then the patent license you grant is automatically extended to all recipients |
||||
|
of the covered work and works based on it. |
||||
|
|
||||
|
A patent license is "discriminatory" if it does not include within the scope |
||||
|
of its coverage, prohibits the exercise of, or is conditioned on the non-exercise |
||||
|
of one or more of the rights that are specifically granted under this License. |
||||
|
You may not convey a covered work if you are a party to an arrangement with |
||||
|
a third party that is in the business of distributing software, under which |
||||
|
you make payment to the third party based on the extent of your activity of |
||||
|
conveying the work, and under which the third party grants, to any of the |
||||
|
parties who would receive the covered work from you, a discriminatory patent |
||||
|
license (a) in connection with copies of the covered work conveyed by you |
||||
|
(or copies made from those copies), or (b) primarily for and in connection |
||||
|
with specific products or compilations that contain the covered work, unless |
||||
|
you entered into that arrangement, or that patent license was granted, prior |
||||
|
to 28 March 2007. |
||||
|
|
||||
|
Nothing in this License shall be construed as excluding or limiting any implied |
||||
|
license or other defenses to infringement that may otherwise be available |
||||
|
to you under applicable patent law. |
||||
|
|
||||
|
12. No Surrender of Others' Freedom. |
||||
|
|
||||
|
If conditions are imposed on you (whether by court order, agreement or otherwise) |
||||
|
that contradict the conditions of this License, they do not excuse you from |
||||
|
the conditions of this License. If you cannot convey a covered work so as |
||||
|
to satisfy simultaneously your obligations under this License and any other |
||||
|
pertinent obligations, then as a consequence you may |
||||
|
|
||||
|
not convey it at all. For example, if you agree to terms that obligate you |
||||
|
to collect a royalty for further conveying from those to whom you convey the |
||||
|
Program, the only way you could satisfy both those terms and this License |
||||
|
would be to refrain entirely from conveying the Program. |
||||
|
|
||||
|
13. Remote Network Interaction; Use with the GNU General Public License. |
||||
|
|
||||
|
Notwithstanding any other provision of this License, if you modify the Program, |
||||
|
your modified version must prominently offer all users interacting with it |
||||
|
remotely through a computer network (if your version supports such interaction) |
||||
|
an opportunity to receive the Corresponding Source of your version by providing |
||||
|
access to the Corresponding Source from a network server at no charge, through |
||||
|
some standard or customary means of facilitating copying of software. This |
||||
|
Corresponding Source shall include the Corresponding Source for any work covered |
||||
|
by version 3 of the GNU General Public License that is incorporated pursuant |
||||
|
to the following paragraph. |
||||
|
|
||||
|
Notwithstanding any other provision of this License, you have permission to |
||||
|
link or combine any covered work with a work licensed under version 3 of the |
||||
|
GNU General Public License into a single combined work, and to convey the |
||||
|
resulting work. The terms of this License will continue to apply to the part |
||||
|
which is the covered work, but the work with which it is combined will remain |
||||
|
governed by version 3 of the GNU General Public License. |
||||
|
|
||||
|
14. Revised Versions of this License. |
||||
|
|
||||
|
The Free Software Foundation may publish revised and/or new versions of the |
||||
|
GNU Affero General Public License from time to time. Such new versions will |
||||
|
be similar in spirit to the present version, but may differ in detail to address |
||||
|
new problems or concerns. |
||||
|
|
||||
|
Each version is given a distinguishing version number. If the Program specifies |
||||
|
that a certain numbered version of the GNU Affero General Public License "or |
||||
|
any later version" applies to it, you have the option of following the terms |
||||
|
and conditions either of that numbered version or of any later version published |
||||
|
by the Free Software Foundation. If the Program does not specify a version |
||||
|
number of the GNU Affero General Public License, you may choose any version |
||||
|
ever published by the Free Software Foundation. |
||||
|
|
||||
|
If the Program specifies that a proxy can decide which future versions of |
||||
|
the GNU Affero General Public License can be used, that proxy's public statement |
||||
|
of acceptance of a version permanently authorizes you to choose that version |
||||
|
for the Program. |
||||
|
|
||||
|
Later license versions may give you additional or different permissions. However, |
||||
|
no additional obligations are imposed on any author or copyright holder as |
||||
|
a result of your choosing to follow a later version. |
||||
|
|
||||
|
15. Disclaimer of Warranty. |
||||
|
|
||||
|
THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE |
||||
|
LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR |
||||
|
OTHER PARTIES PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER |
||||
|
EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES |
||||
|
OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS |
||||
|
TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE PROGRAM |
||||
|
PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, REPAIR OR |
||||
|
CORRECTION. |
||||
|
|
||||
|
16. Limitation of Liability. |
||||
|
|
||||
|
IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL |
||||
|
ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MODIFIES AND/OR CONVEYS THE PROGRAM |
||||
|
AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY GENERAL, SPECIAL, |
||||
|
INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY TO |
||||
|
USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING RENDERED |
||||
|
INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF THE |
||||
|
PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS), EVEN IF SUCH HOLDER OR OTHER |
||||
|
PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. |
||||
|
|
||||
|
17. Interpretation of Sections 15 and 16. |
||||
|
|
||||
|
If the disclaimer of warranty and limitation of liability provided above cannot |
||||
|
be given local legal effect according to their terms, reviewing courts shall |
||||
|
apply local law that most closely approximates an absolute waiver of all civil |
||||
|
liability in connection with the Program, unless a warranty or assumption |
||||
|
of liability accompanies a copy of the Program in return for a fee. END OF |
||||
|
TERMS AND CONDITIONS |
||||
|
|
||||
|
How to Apply These Terms to Your New Programs |
||||
|
|
||||
|
If you develop a new program, and you want it to be of the greatest possible |
||||
|
use to the public, the best way to achieve this is to make it free software |
||||
|
which everyone can redistribute and change under these terms. |
||||
|
|
||||
|
To do so, attach the following notices to the program. It is safest to attach |
||||
|
them to the start of each source file to most effectively state the exclusion |
||||
|
of warranty; and each file should have at least the "copyright" line and a |
||||
|
pointer to where the full notice is found. |
||||
|
|
||||
|
<one line to give the program's name and a brief idea of what it does.> |
||||
|
|
||||
|
Copyright (C) <year> <name of author> |
||||
|
|
||||
|
This program is free software: you can redistribute it and/or modify it under |
||||
|
the terms of the GNU Affero General Public License as published by the Free |
||||
|
Software Foundation, either version 3 of the License, or (at your option) |
||||
|
any later version. |
||||
|
|
||||
|
This program is distributed in the hope that it will be useful, but WITHOUT |
||||
|
ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS |
||||
|
FOR A PARTICULAR PURPOSE. See the GNU Affero General Public License for more |
||||
|
details. |
||||
|
|
||||
|
You should have received a copy of the GNU Affero General Public License along |
||||
|
with this program. If not, see <http s ://www.gnu.org/licenses/>. |
||||
|
|
||||
|
Also add information on how to contact you by electronic and paper mail. |
||||
|
|
||||
|
If your software can interact with users remotely through a computer network, |
||||
|
you should also make sure that it provides a way for users to get its source. |
||||
|
For example, if your program is a web application, its interface could display |
||||
|
a "Source" link that leads users to an archive of the code. There are many |
||||
|
ways you could offer source, and different solutions will be better for different |
||||
|
programs; see section 13 for the specific requirements. |
||||
|
|
||||
|
You should also get your employer (if you work as a programmer) or school, |
||||
|
if any, to sign a "copyright disclaimer" for the program, if necessary. For |
||||
|
more information on this, and how to apply and follow the GNU AGPL, see <http |
||||
|
s ://www.gnu.org/licenses/>. |
@ -0,0 +1 @@ |
|||||
|
ROOT_PASSWORD="pass" |
@ -0,0 +1,11 @@ |
|||||
|
#!/bin/sh |
||||
|
|
||||
|
hosts=$(get_hosts) |
||||
|
printf "%s" "$hosts" > "$1" |
||||
|
|
||||
|
while sleep 2 |
||||
|
do |
||||
|
current_hosts=$(get_hosts) |
||||
|
[ "$hosts" != "$current_hosts" ] && printf "%s" "$current_hosts" > "$1" |
||||
|
hosts=$current_hosts |
||||
|
done |
Binary file not shown.
@ -0,0 +1,13 @@ |
|||||
|
create create project (swarmlab-sec create) |
||||
|
up start swarmlab-sec (swarmlab-sec up size=10) |
||||
|
scale resize swarmlab-sec (swarmlab-sec scale size=30) |
||||
|
reload rebuild image (swarmlab-sec reload size=15) |
||||
|
login login swarmlab-sec (swarmlab-sec login) |
||||
|
exec execute command (swarmlab-sec exec [SHELL COMMAND]) |
||||
|
down stop swarmlab-sec (swarmlab-sec down) |
||||
|
clean clean project (swarmlab-sec clean) |
||||
|
list show instances (swarmlab-sec list) |
||||
|
help show help (swarmlab-sec help) |
||||
|
|
||||
|
|
||||
|
|
@ -0,0 +1,8 @@ |
|||||
|
#!/bin/sh |
||||
|
|
||||
|
# Include the variables that store the Docker service names |
||||
|
# shellcheck disable=SC1091 |
||||
|
. /etc/opt/service_names |
||||
|
|
||||
|
localip=$(ip addr show dev eth0 | grep "inet " | cut -d ' ' -f 6 | cut -f 1 -d '/') |
||||
|
nmap -sP "$localip/24" | grep Nmap | cut -d' ' -f5 | grep "_$MPI_WORKER_SERVICE_NAME_" > /project/hosts |
@ -0,0 +1,74 @@ |
|||||
|
#! /usr/bin/env sh |
||||
|
|
||||
|
start_dir=$(pwd) |
||||
|
bin_string="export PATH=\"${PATH}:${HOME}/.vimpkg/bin\"" |
||||
|
|
||||
|
# Download the apt-vim files |
||||
|
curl -fSsLo ${HOME}/apt-vim/apt-vim --create-dirs \ |
||||
|
https://raw.githubusercontent.com/egalpin/apt-vim/master/apt-vim |
||||
|
|
||||
|
curl -fSsLo ${HOME}/apt-vim/vim_config.json \ |
||||
|
https://raw.githubusercontent.com/egalpin/apt-vim/master/vim_config.json |
||||
|
|
||||
|
# Add vimrc if there isn't one already |
||||
|
[ -f ${HOME}/.vimrc ] || touch ${HOME}/.vimrc |
||||
|
|
||||
|
# Make sure vimrc is using pathogen |
||||
|
if [ $(grep -c "execute pathogen#infect()" ${HOME}/.vimrc) -eq 0 ]; then |
||||
|
echo "execute pathogen#infect()" >> ${HOME}/.vimrc |
||||
|
fi |
||||
|
if [ $(grep -c "call pathogen#helptags()" ${HOME}/.vimrc) -eq 0 ]; then |
||||
|
echo "call pathogen#helptags()" >> ${HOME}/.vimrc |
||||
|
fi |
||||
|
|
||||
|
# Update path for executing shell |
||||
|
eval "$bin_string" |
||||
|
|
||||
|
added_to_profile=false |
||||
|
already_present=false |
||||
|
for rc in bashrc zshrc bash_profile; do |
||||
|
if [ -s "$HOME/.$rc" ]; then |
||||
|
if grep -q "$bin_string" "$HOME/.$rc"; then |
||||
|
already_present=true |
||||
|
else |
||||
|
printf "\n$bin_string\n" >> "$HOME/.$rc" |
||||
|
printf "== Added apt-vim PATH to '~/.$rc'\n" |
||||
|
added_to_profile=true |
||||
|
fi |
||||
|
fi |
||||
|
done |
||||
|
|
||||
|
# Execute apt-vim init |
||||
|
cd ${HOME}/apt-vim |
||||
|
python - <<EOF |
||||
|
import imp, os |
||||
|
print('apt-vim setup starting') |
||||
|
HOME = os.path.expanduser("~") |
||||
|
APT_VIM_DIR = os.path.abspath(os.path.join(HOME, 'apt-vim')) |
||||
|
SCRIPT_ROOT_DIR = os.path.abspath(os.path.join(HOME, '.vimpkg')) |
||||
|
BIN_DIR = os.path.abspath(os.path.join(SCRIPT_ROOT_DIR, 'bin')) |
||||
|
os.environ['PATH'] += os.pathsep + BIN_DIR |
||||
|
os.chdir(APT_VIM_DIR) |
||||
|
|
||||
|
aptvim = imp.load_source("aptvim", "./apt-vim") |
||||
|
av = aptvim.aptvim(ASSUME_YES=True, VIM_CONFIG='', INSTALL_TARGET='') |
||||
|
av.first_run() |
||||
|
av.handle_install(None, None, None) |
||||
|
EOF |
||||
|
python_result=$? |
||||
|
|
||||
|
cd $start_dir |
||||
|
|
||||
|
echo |
||||
|
if [ "$python_result" -ne 0 ]; then |
||||
|
echo "== Error:" |
||||
|
echo " Installation failed." |
||||
|
elif [ "$added_to_profile" = false ] && [ "$already_present" = false ]; then |
||||
|
echo "== Error:" |
||||
|
echo " Found no profile to add apt-vim PATH to." |
||||
|
echo " Add the following line to your shell profile and source it to install manually:" |
||||
|
printf " $bin_string\n" |
||||
|
else |
||||
|
echo "== apt-vim installation succeeded! Run 'source ~/.bashrc || source ~/.bash_profile' or 'source ~/.zshrc'" |
||||
|
echo " to access the executable script." |
||||
|
fi |
@ -0,0 +1,6 @@ |
|||||
|
#/bin/sh |
||||
|
|
||||
|
#ip=`nslookup hybrid-mpi_master_1.hybrid-mpi_hybrid-mpi | grep Addr | cut -d':' -f2 | grep -v 127.0.` |
||||
|
ip=`nslookup $NODENAME | grep Addr | cut -d':' -f2 | grep -v 127.0.` |
||||
|
nmap -sn -oG - $ip/24 | grep Up | grep $NODENETWORK | cut -d ' ' -f 2 |
||||
|
|
@ -0,0 +1 @@ |
|||||
|
Course examples |
@ -0,0 +1,31 @@ |
|||||
|
|
||||
|
const app = require('express')(); |
||||
|
const http = require('http').Server(app); |
||||
|
var path = require('path'); |
||||
|
|
||||
|
options = { |
||||
|
secure:true, |
||||
|
reconnect: true, |
||||
|
rejectUnauthorized : false |
||||
|
}; |
||||
|
|
||||
|
|
||||
|
var io2 = require('socket.io-client'); |
||||
|
var socket = io2.connect('http://localhost:8084', options); |
||||
|
|
||||
|
var msg2 = "c= 120"; |
||||
|
socket.emit('log', msg2); |
||||
|
|
||||
|
/* |
||||
|
var io = require('socket.io')(http); |
||||
|
|
||||
|
app.get('/log', (req, res) => { |
||||
|
socket.emit('log', 'send from get'); |
||||
|
res.send('<h1>send</h1>'); |
||||
|
}); |
||||
|
|
||||
|
http.listen(8085, () => { |
||||
|
console.log('listening on *:8085'); |
||||
|
}); |
||||
|
*/ |
||||
|
|
@ -0,0 +1,109 @@ |
|||||
|
var path = require('path'); |
||||
|
var app = require('express')(); |
||||
|
var http = require('http').Server(app); |
||||
|
var io = require('socket.io')(http); |
||||
|
const MongoClient = require('mongodb').MongoClient; |
||||
|
|
||||
|
|
||||
|
app.get('/test', (req, res) => { |
||||
|
|
||||
|
var user="swarmlab" |
||||
|
var pass="swarmlab" |
||||
|
|
||||
|
/* |
||||
|
use admin |
||||
|
db.createUser( |
||||
|
{ |
||||
|
user: "test1", |
||||
|
pwd: 'newpass', // Or "<cleartext password>"
|
||||
|
roles: [ { role: "readWrite", db: "app_swarmlab" } ], |
||||
|
authenticationRestrictions: [ { |
||||
|
clientSource: ["192.168.1.7"], |
||||
|
serverAddress: ["192.168.80.2", "192.168.80.3", "192.168.80.4"] |
||||
|
} ] |
||||
|
} |
||||
|
) |
||||
|
*/ |
||||
|
|
||||
|
var mongourl = "mongodb://"+user+":"+pass+"@swarmlabmongo1:27017,swarmlabmongo2:27017,swarmlabmongo1:27017/app_swarmlab?replicaSet=rs0&authSource=admin&w=1" |
||||
|
const OPTS = { |
||||
|
useNewUrlParser: true, |
||||
|
useUnifiedTopology: true, |
||||
|
//poolSize: 10,
|
||||
|
tls: false |
||||
|
}; |
||||
|
|
||||
|
const client = new MongoClient(mongourl,OPTS); |
||||
|
|
||||
|
client.on('serverDescriptionChanged', function(event) { |
||||
|
console.log('received serverDescriptionChanged'); |
||||
|
console.log(JSON.stringify(event, null, 2)); |
||||
|
}); |
||||
|
|
||||
|
client.on('serverHeartbeatStarted', function(event) { |
||||
|
console.log('received serverHeartbeatStarted'); |
||||
|
console.log(JSON.stringify(event, null, 2)); |
||||
|
}); |
||||
|
|
||||
|
client.on('serverHeartbeatSucceeded', function(event) { |
||||
|
console.log('received serverHeartbeatSucceeded'); |
||||
|
console.log(JSON.stringify(event, null, 2)); |
||||
|
}); |
||||
|
|
||||
|
client.on('serverHeartbeatFailed', function(event) { |
||||
|
console.log('received serverHeartbeatFailed'); |
||||
|
console.log(JSON.stringify(event, null, 2)); |
||||
|
}); |
||||
|
|
||||
|
client.on('serverOpening', function(event) { |
||||
|
console.log('received serverOpening'); |
||||
|
console.log(JSON.stringify(event, null, 2)); |
||||
|
}); |
||||
|
|
||||
|
client.on('serverClosed', function(event) { |
||||
|
console.log('received serverClosed'); |
||||
|
console.log(JSON.stringify(event, null, 2)); |
||||
|
}); |
||||
|
|
||||
|
client.on('topologyOpening', function(event) { |
||||
|
console.log('received topologyOpening'); |
||||
|
console.log(JSON.stringify(event, null, 2)); |
||||
|
}); |
||||
|
|
||||
|
client.on('topologyClosed', function(event) { |
||||
|
console.log('received topologyClosed'); |
||||
|
console.log(JSON.stringify(event, null, 2)); |
||||
|
}); |
||||
|
|
||||
|
client.on('topologyDescriptionChanged', function(event) { |
||||
|
console.log('received topologyDescriptionChanged'); |
||||
|
console.log(JSON.stringify(event, null, 2)); |
||||
|
}); |
||||
|
|
||||
|
client.connect(function(err, client) { |
||||
|
if(err) throw err; |
||||
|
|
||||
|
const db = client.db('app_swarmlab'); |
||||
|
db.collection('logs').find({}).toArray() |
||||
|
.then(item => { |
||||
|
console.log('item '+JSON.stringify(item)) |
||||
|
for (let i in item) { |
||||
|
console.log(JSON.stringify('items' + item[i])) |
||||
|
} |
||||
|
}) |
||||
|
}); |
||||
|
|
||||
|
res.send('<h1>Hello world!</h1>'); |
||||
|
}); |
||||
|
|
||||
|
io.on('connection', s => { |
||||
|
console.error('socket connection'); |
||||
|
|
||||
|
s.on('log', (data, room) => { |
||||
|
console.log('broadcast', data); |
||||
|
}); |
||||
|
|
||||
|
}); |
||||
|
|
||||
|
http.listen(8084, () => console.error('listening on http://localhost:8084/')); |
||||
|
console.error('socket.io example'); |
@ -0,0 +1,24 @@ |
|||||
|
var path = require('path'); |
||||
|
var app = require('express')(); |
||||
|
var http = require('http').Server(app); |
||||
|
var io = require('socket.io')(http); |
||||
|
|
||||
|
|
||||
|
app.get('/', (req, res) => { |
||||
|
res.send('<h1>Hello world!</h1>'); |
||||
|
}); |
||||
|
|
||||
|
|
||||
|
io.on('connection', s => { |
||||
|
console.error('socket connection'); |
||||
|
|
||||
|
s.on('log', (data, room) => { |
||||
|
console.log('broadcast', data); |
||||
|
}); |
||||
|
|
||||
|
|
||||
|
}); |
||||
|
|
||||
|
|
||||
|
http.listen(8084, () => console.error('listening on http://localhost:8084/')); |
||||
|
console.error('socket.io example'); |
@ -0,0 +1,8 @@ |
|||||
|
{ |
||||
|
"dependencies": { |
||||
|
"express": "^4.17.1", |
||||
|
"mongodb": "^3.6.5", |
||||
|
"socket.io": "^4.0.0", |
||||
|
"socket.io-client": "^4.0.0" |
||||
|
} |
||||
|
} |
@ -0,0 +1,107 @@ |
|||||
|
var express = require('express'); |
||||
|
var http = require('http'); |
||||
|
const MongoClient = require('mongodb').MongoClient; |
||||
|
|
||||
|
var PORT = 8085; |
||||
|
|
||||
|
var app = express(); |
||||
|
app.get('/', function(req, res) { |
||||
|
var RES ={} |
||||
|
var message = req.query["log"] |
||||
|
|
||||
|
// Connection URL
|
||||
|
var database = "app_swarmlab" |
||||
|
var user = "swarmlab" |
||||
|
var password = "swarmlab" |
||||
|
var collection = "logs" |
||||
|
var replica_set = "rs0" |
||||
|
var nodes = "swarmlabmongo1:27017,swarmlabmongo2:27017,swarmlabmongo3:27017" |
||||
|
//var url = `mongodb://${user}:${password}@${nodes}/${database}?replicaSet=${replica_set}&authSource=admin`
|
||||
|
|
||||
|
var mongourl = "mongodb://"+user+":"+password+"@swarmlabmongo1:27017,swarmlabmongo2:27017,swarmlabmongo3:27017/app_swarmlab?replicaSet=rs0&authSource=admin&w=1" |
||||
|
const OPTS = { |
||||
|
useNewUrlParser: true, |
||||
|
useUnifiedTopology: true, |
||||
|
//poolSize: 10,
|
||||
|
tls: false |
||||
|
}; |
||||
|
|
||||
|
const client = new MongoClient(mongourl,OPTS); |
||||
|
|
||||
|
client.on('serverDescriptionChanged', function(event) { |
||||
|
console.log('received serverDescriptionChanged'); |
||||
|
console.log(JSON.stringify(event, null, 2)); |
||||
|
}); |
||||
|
|
||||
|
client.on('serverHeartbeatStarted', function(event) { |
||||
|
console.log('received serverHeartbeatStarted'); |
||||
|
console.log(JSON.stringify(event, null, 2)); |
||||
|
}); |
||||
|
|
||||
|
client.on('serverHeartbeatSucceeded', function(event) { |
||||
|
console.log('received serverHeartbeatSucceeded'); |
||||
|
console.log(JSON.stringify(event, null, 2)); |
||||
|
}); |
||||
|
|
||||
|
client.on('serverHeartbeatFailed', function(event) { |
||||
|
console.log('received serverHeartbeatFailed'); |
||||
|
console.log(JSON.stringify(event, null, 2)); |
||||
|
}); |
||||
|
|
||||
|
client.on('serverOpening', function(event) { |
||||
|
console.log('received serverOpening'); |
||||
|
console.log(JSON.stringify(event, null, 2)); |
||||
|
}); |
||||
|
|
||||
|
client.on('serverClosed', function(event) { |
||||
|
console.log('received serverClosed'); |
||||
|
console.log(JSON.stringify(event, null, 2)); |
||||
|
}); |
||||
|
|
||||
|
client.on('topologyOpening', function(event) { |
||||
|
console.log('received topologyOpening'); |
||||
|
console.log(JSON.stringify(event, null, 2)); |
||||
|
}); |
||||
|
|
||||
|
client.on('topologyOpening', function(event) { |
||||
|
console.log('received topologyOpening'); |
||||
|
console.log(JSON.stringify(event, null, 2)); |
||||
|
}); |
||||
|
|
||||
|
client.on('topologyClosed', function(event) { |
||||
|
console.log('received topologyClosed'); |
||||
|
console.log(JSON.stringify(event, null, 2)); |
||||
|
}); |
||||
|
|
||||
|
client.on('topologyDescriptionChanged', function(event) { |
||||
|
console.log('received topologyDescriptionChanged'); |
||||
|
console.log(JSON.stringify(event, null, 2)); |
||||
|
}); |
||||
|
|
||||
|
client.connect(function(err, client) { |
||||
|
if(err) throw err; |
||||
|
|
||||
|
const db = client.db('app_swarmlab'); |
||||
|
db.collection('logs').find({}).toArray() |
||||
|
.then(item => { |
||||
|
console.log('item '+JSON.stringify(item)) |
||||
|
for (let i in item) { |
||||
|
console.log(JSON.stringify('items' + item[i])) |
||||
|
} |
||||
|
res.send({message: message, data:item}); |
||||
|
|
||||
|
}) |
||||
|
}); |
||||
|
}); |
||||
|
|
||||
|
app.post('/', function(req, res) { |
||||
|
var message = req.body["log"] |
||||
|
console.log(JSON.stringify(message)) |
||||
|
//console.log(req)
|
||||
|
res.send({message: message}); |
||||
|
}); |
||||
|
|
||||
|
http.Server(app).listen(PORT, function() { |
||||
|
console.log("HTTP server listening on port %s", PORT); |
||||
|
}); |
||||
|
|
File diff suppressed because it is too large
@ -0,0 +1,7 @@ |
|||||
|
{ |
||||
|
"main": "app.js", |
||||
|
"dependencies": { |
||||
|
"express": "^4.17.1", |
||||
|
"mongodb": "^3.6.6" |
||||
|
} |
||||
|
} |
@ -0,0 +1 @@ |
|||||
|
echo "Hello World" |
@ -0,0 +1,76 @@ |
|||||
|
#!/bin/sh |
||||
|
|
||||
|
ROLE="undefined" |
||||
|
MPI_MASTER_SERVICE_NAME="sec_masterservice" |
||||
|
MPI_WORKER_SERVICE_NAME="sec_workerservice" |
||||
|
HOSTNAMES="/etc/nethosts" |
||||
|
|
||||
|
####################### |
||||
|
# ARGUMENTS PARSER |
||||
|
|
||||
|
while [ "$1" != "" ]; |
||||
|
do |
||||
|
PARAM=$(echo "$1" | awk -F= '{print $1}') |
||||
|
VALUE=$(echo "$1" | awk -F= '{print $2}') |
||||
|
|
||||
|
case $PARAM in |
||||
|
role) |
||||
|
[ "$VALUE" ] && ROLE=$VALUE |
||||
|
;; |
||||
|
|
||||
|
sec_master_service_name) |
||||
|
[ "$VALUE" ] && MPI_MASTER_SERVICE_NAME=$VALUE |
||||
|
;; |
||||
|
|
||||
|
sec_worker_service_name) |
||||
|
[ "$VALUE" ] && MPI_WORKER_SERVICE_NAME=$VALUE |
||||
|
;; |
||||
|
*) |
||||
|
echo "ERROR: unknown parameter \"$PARAM\"" |
||||
|
exit 1 |
||||
|
;; |
||||
|
esac |
||||
|
shift |
||||
|
done |
||||
|
|
||||
|
|
||||
|
|
||||
|
cat > /etc/opt/service_names <<- EOF |
||||
|
MPI_MASTER_SERVICE_NAME=${MPI_MASTER_SERVICE_NAME} |
||||
|
MPI_WORKER_SERVICE_NAME=${MPI_WORKER_SERVICE_NAME} |
||||
|
EOF |
||||
|
|
||||
|
case $ROLE in |
||||
|
"masterservice") |
||||
|
|
||||
|
# Auto update default host file in background and dumb all output |
||||
|
auto_update_hosts "${HOSTNAMES}" > /dev/null 2>&1 & |
||||
|
|
||||
|
|
||||
|
ttyd -p 3787 sh |
||||
|
tail -f /dev/null |
||||
|
|
||||
|
# Start ssh server |
||||
|
#/usr/sbin/sshd -D |
||||
|
;; |
||||
|
|
||||
|
|
||||
|
"workerservice") |
||||
|
|
||||
|
# Start ssh server in background |
||||
|
#/usr/sbin/sshd -D & |
||||
|
|
||||
|
# Keep trying to connect to master node and stay there indefinitely so that master node can see |
||||
|
# the connected hosts that are ready for MPI work |
||||
|
#while sleep 1 |
||||
|
#do |
||||
|
# shellcheck disable=SC2086 |
||||
|
# ssh -T -o "StrictHostKeyChecking no" \ |
||||
|
# -i "${USER_HOME}/.ssh/id_rsa" \ |
||||
|
# ${USER}@${MPI_MASTER_SERVICE_NAME} \ |
||||
|
tail -f /dev/null |
||||
|
#done |
||||
|
;; |
||||
|
*) |
||||
|
echo 'role argument only accepts "masterservice" or "workerservice"' |
||||
|
esac |
@ -0,0 +1,732 @@ |
|||||
|
#!/bin/bash |
||||
|
|
||||
|
# The MIT License (MIT) |
||||
|
# |
||||
|
# rootApostolos@swarmlab.io |
||||
|
# |
||||
|
# Permission is hereby granted, free of charge, to any person obtaining a copy |
||||
|
# of this software and associated documentation files (the "Software"), to deal |
||||
|
# in the Software without restriction, including without limitation the rights |
||||
|
# to use, copy, modify, merge, publish, distribute, sublicense, and/or sell |
||||
|
# copies of the Software, and to permit persons to whom the Software is |
||||
|
# furnished to do so, subject to the following conditions: |
||||
|
# |
||||
|
# The above copyright notice and this permission notice shall be included in all |
||||
|
# copies or substantial portions of the Software. |
||||
|
# |
||||
|
# THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR |
||||
|
# IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, |
||||
|
# FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE |
||||
|
# AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER |
||||
|
# LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, |
||||
|
# OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE |
||||
|
# SOFTWARE. |
||||
|
|
||||
|
# Origin: https://github.com/NLKNguyen/alpine-mpich |
||||
|
|
||||
|
set -e |
||||
|
|
||||
|
DOCKERuser="docker" |
||||
|
PACKAGES=$(cat <<EOF |
||||
|
net-tools \ |
||||
|
tcpdump \ |
||||
|
sudo \ |
||||
|
vim |
||||
|
EOF |
||||
|
) |
||||
|
# PACKAGES enabled ths with apt-get update && apt-get $APTPARAM install -y openssh-server $PACKAGES in in RUN export DEBIAN_FRONTEND=noninteractive |
||||
|
APTPARAM=" --no-install-recommends " |
||||
|
IMAGE_local="microservice-julia" |
||||
|
HYBRID_NETWORK="microservice-julia" |
||||
|
# dont edit |
||||
|
#IMAGE_origin="hub.swarmlab.io:5480/hybrid-numpy:latest" |
||||
|
#IMAGE_origin="hub.swarmlab.io:5480/hybrid-hping3" |
||||
|
IMAGE_origin="julia:1.7-alpine3.15" |
||||
|
bootstrap="sec_bootstrap" |
||||
|
hostnames="auto_update_hosts" |
||||
|
hostnames_get="get_hosts" |
||||
|
#NODENAME=${HYBRID_NETWORK}_masterservice_1.${HYBRID_NETWORK}_${HYBRID_NETWORK} |
||||
|
NODENAME=${IMAGE_local}_masterservice_1.${IMAGE_local}_${HYBRID_NETWORK} |
||||
|
NODENETWORK=${HYBRID_NETWORK} |
||||
|
# shellcheck disable=SC1091 |
||||
|
#. ./.env |
||||
|
|
||||
|
|
||||
|
# ----------------------------------------------- |
||||
|
# |
||||
|
# Find Source path of swarmlab.io script |
||||
|
# |
||||
|
# ---------------------------------------------- |
||||
|
|
||||
|
|
||||
|
SOURCE="${BASH_SOURCE[0]}" |
||||
|
while [ -h "$SOURCE" ]; do # resolve $SOURCE until the file is no longer a symlink |
||||
|
DIR="$( cd -P "$( dirname "$SOURCE" )" >/dev/null 2>&1 && pwd )" |
||||
|
SOURCE="$(readlink "$SOURCE")" |
||||
|
[[ $SOURCE != /* ]] && SOURCE="$DIR/$SOURCE" # if $SOURCE was a relative symlink, we need to resolve it relative to the path where the symlink file was located |
||||
|
done |
||||
|
DIR="$( cd -P "$( dirname "$SOURCE" )" >/dev/null 2>&1 && pwd )" |
||||
|
|
||||
|
|
||||
|
# ----------------------------------------------- |
||||
|
# |
||||
|
# Load Default config swarmlab.io |
||||
|
# |
||||
|
# ---------------------------------------------- |
||||
|
|
||||
|
|
||||
|
#. $DIR/.env |
||||
|
|
||||
|
|
||||
|
# ----------------------------------------------- |
||||
|
# |
||||
|
# Find Working dir |
||||
|
# |
||||
|
# ---------------------------------------------- |
||||
|
|
||||
|
function EPHEMERAL_PORT() { |
||||
|
LOW_BOUND=49152 |
||||
|
RANGE=16384 |
||||
|
while true; do |
||||
|
CANDIDATE=$[$LOW_BOUND + ($RANDOM % $RANGE)] |
||||
|
(echo "" >/dev/tcp/127.0.0.1/${CANDIDATE}) >/dev/null 2>&1 |
||||
|
if [ $? -ne 0 ]; then |
||||
|
echo $CANDIDATE |
||||
|
break |
||||
|
fi |
||||
|
done |
||||
|
} |
||||
|
|
||||
|
servicesshport=$(EPHEMERAL_PORT) |
||||
|
|
||||
|
Wdir=$(pwd) |
||||
|
|
||||
|
if [ ! -f $Wdir/.env ]; then |
||||
|
cat << EOF > $Wdir/.env |
||||
|
REGISTRY_ADDR=localhost |
||||
|
REGISTRY_PORT=5000 |
||||
|
IMAGE_NAME=$HYBRID_NETWORK |
||||
|
SSH_PORT=$servicesshport |
||||
|
R_PORT1=$(EPHEMERAL_PORT) |
||||
|
R_PORT2=$(EPHEMERAL_PORT) |
||||
|
R_PORT3=$(EPHEMERAL_PORT) |
||||
|
R_PORT4=$(EPHEMERAL_PORT) |
||||
|
R_PORT5=$(EPHEMERAL_PORT) |
||||
|
EOF |
||||
|
fi |
||||
|
|
||||
|
. $Wdir/.env |
||||
|
|
||||
|
create_dockerfile () |
||||
|
{ |
||||
|
docker pull $IMAGE_origin << ANSWERS |
||||
|
yes |
||||
|
yes |
||||
|
yes |
||||
|
ANSWERS |
||||
|
|
||||
|
. $Wdir/ROOT_PASSWORD |
||||
|
if [ -d "$Wdir/project" ]; then |
||||
|
# ----------------------------------------------- |
||||
|
# |
||||
|
# create Dockerfile |
||||
|
# |
||||
|
# ---------------------------------------------- |
||||
|
|
||||
|
search='ok' |
||||
|
|
||||
|
if [ $search == 'ok' ] |
||||
|
then |
||||
|
echo "" |
||||
|
echo ">>> Load Origin " |
||||
|
cat << EOF > $Wdir/Dockerfile |
||||
|
FROM $IMAGE_origin |
||||
|
# |
||||
|
USER root |
||||
|
|
||||
|
COPY $bootstrap /usr/bin |
||||
|
COPY $hostnames_get /usr/bin |
||||
|
COPY $hostnames /usr/bin |
||||
|
COPY install-vim-plugin.sh . |
||||
|
|
||||
|
ENV NOTVISIBLE "in users profile" |
||||
|
ENV USER1 docker |
||||
|
ENV USER_HOME /home/docker |
||||
|
ENV SSHDIR \${USER_HOME}/.ssh |
||||
|
COPY ssh/ \${SSHDIR}/ |
||||
|
|
||||
|
RUN export DEBIAN_FRONTEND=noninteractive \ |
||||
|
&& rm -rf /usr/share/doc \ |
||||
|
&& rm -rf /usr/share/man \ |
||||
|
&& rm -rf /usr/share/locale \ |
||||
|
&& mkdir -p /var/run/sshd \ |
||||
|
&& echo 'root:$ROOT_PASSWORD' | chpasswd \ |
||||
|
&& echo "export VISIBLE=now" >> /etc/profile \ |
||||
|
&& addgroup -S docker && adduser -S docker -G docker \ |
||||
|
&& mkdir -p /home/docker/project \ |
||||
|
&& mkdir -p /etc/opt \ |
||||
|
&& echo "docker:docker" | chpasswd \ |
||||
|
&& echo "StrictHostKeyChecking no" > \${SSHDIR}/config \ |
||||
|
&& cat \${SSHDIR}/*.pub >> \${SSHDIR}/authorized_keys \ |
||||
|
&& chmod -R 600 \${SSHDIR}/* \ |
||||
|
&& chown -R \${USER1}:\${USER1} \${SSHDIR} \ |
||||
|
&& chown -R \${USER1}:\${USER1} \${USER_HOME} |
||||
|
|
||||
|
WORKDIR /home/docker/project |
||||
|
COPY .vimrc /home/docker |
||||
|
EXPOSE 3787 |
||||
|
USER docker |
||||
|
EOF |
||||
|
fi |
||||
|
else |
||||
|
echo "" |
||||
|
echo "Not in Project Directory" |
||||
|
echo "A project directory should look like this" |
||||
|
echo "" |
||||
|
|
||||
|
cat <<EOF |
||||
|
├── docker-compose.yml |
||||
|
├── Dockerfile |
||||
|
├── out.log |
||||
|
├── project |
||||
|
│ └── hello_world.sh |
||||
|
└── ssh |
||||
|
├── id_rsa |
||||
|
└── id_rsa.pub |
||||
|
EOF |
||||
|
echo "Change to your Project Directory And Try Again" |
||||
|
echo "" |
||||
|
exit 0 |
||||
|
fi |
||||
|
} |
||||
|
|
||||
|
create_project () |
||||
|
{ |
||||
|
|
||||
|
docker pull $IMAGE_origin << ANSWERS |
||||
|
yes |
||||
|
yes |
||||
|
yes |
||||
|
ANSWERS |
||||
|
|
||||
|
if [ "$Wdir" == "$HOME" ]; then |
||||
|
echo"" |
||||
|
echo "You are in Your Home directory" |
||||
|
echo "Please create a project directory" |
||||
|
echo "mkdir myproject; cd myproject; swarmlab-sec create" |
||||
|
echo"" |
||||
|
else |
||||
|
echo "# -----------------------------------------------" |
||||
|
echo "##### Create project #####" |
||||
|
echo "# -----------------------------------------------" |
||||
|
|
||||
|
|
||||
|
search='ok' |
||||
|
if [ $search == 'ok' ] |
||||
|
then |
||||
|
echo ">>> Load Origin " |
||||
|
cat << EOF > $Wdir/Dockerfile |
||||
|
FROM $IMAGE_origin |
||||
|
# |
||||
|
USER root |
||||
|
COPY $bootstrap /usr/bin |
||||
|
COPY $hostnames_get /usr/bin |
||||
|
COPY $hostnames /usr/bin |
||||
|
COPY install-vim-plugin.sh . |
||||
|
|
||||
|
ENV NOTVISIBLE "in users profile" |
||||
|
ENV USER1 docker |
||||
|
ENV USER_HOME /home/docker |
||||
|
ENV SSHDIR \${USER_HOME}/.ssh |
||||
|
COPY ssh/ \${SSHDIR}/ |
||||
|
|
||||
|
RUN export DEBIAN_FRONTEND=noninteractive \ |
||||
|
&& rm -rf /usr/share/doc \ |
||||
|
&& rm -rf /usr/share/man \ |
||||
|
&& rm -rf /usr/share/locale \ |
||||
|
&& mkdir -p /var/run/sshd \ |
||||
|
&& echo 'root:$ROOT_PASSWORD' | chpasswd \ |
||||
|
&& echo "export VISIBLE=now" >> /etc/profile \ |
||||
|
&& addgroup -S docker && adduser -S docker -G docker \ |
||||
|
&& mkdir -p /home/docker/project \ |
||||
|
&& mkdir -p /etc/opt \ |
||||
|
&& echo "docker:docker" | chpasswd \ |
||||
|
&& echo "StrictHostKeyChecking no" > \${SSHDIR}/config \ |
||||
|
&& cat \${SSHDIR}/*.pub >> \${SSHDIR}/authorized_keys \ |
||||
|
&& chmod -R 600 \${SSHDIR}/* \ |
||||
|
&& chown -R \${USER1}:\${USER1} \${SSHDIR} \ |
||||
|
&& chown -R \${USER1}:\${USER1} \${USER_HOME} |
||||
|
|
||||
|
COPY .vimrc /home/docker |
||||
|
WORKDIR /home/docker/project |
||||
|
EXPOSE 3787 |
||||
|
USER docker |
||||
|
EOF |
||||
|
fi |
||||
|
|
||||
|
|
||||
|
/bin/mkdir -p $Wdir/project |
||||
|
/bin/cp -rf $DIR/project/bin $Wdir/project |
||||
|
/bin/cp -rf $DIR/project/courses $Wdir/project |
||||
|
/bin/cp -f $DIR/project/hello_world.sh $Wdir/project |
||||
|
/bin/cp -f $DIR/$bootstrap $Wdir/$bootstrap |
||||
|
/bin/cp -f $DIR/$hostnames $Wdir/$hostnames |
||||
|
/bin/cp -f $DIR/$hostnames_get $Wdir/$hostnames_get |
||||
|
/bin/cp -f $DIR/ROOT_PASSWORD $Wdir/ROOT_PASSWORD |
||||
|
/bin/cp -rf $DIR/.vimrc $Wdir/.vimrc |
||||
|
/bin/cp -rf $DIR/bin $Wdir |
||||
|
/bin/cp -rf $DIR/install-vim-plugin.sh $Wdir/install-vim-plugin.sh |
||||
|
|
||||
|
|
||||
|
cat << EOF > $Wdir/docker-compose.yml |
||||
|
version: "3" |
||||
|
|
||||
|
services: |
||||
|
|
||||
|
masterservice: |
||||
|
image: $IMAGE_NAME |
||||
|
privileged: true |
||||
|
environment: |
||||
|
- NODENAME=${NODENAME} |
||||
|
- NODENETWORK=${NODENETWORK} |
||||
|
- DISPLAY=\${DISPLAY} |
||||
|
cap_add: |
||||
|
- NET_ADMIN |
||||
|
user: root |
||||
|
entrypoint: ["sec_bootstrap", "role=masterservice", "sec_master_service_name=masterservice", "sec_worker_service_name=workerservice"] |
||||
|
ports: |
||||
|
- "\${SSH_PORT}:22" |
||||
|
- "\${R_PORT1}:3787" # console |
||||
|
networks: |
||||
|
- ${HYBRID_NETWORK} |
||||
|
volumes: |
||||
|
- $Wdir/project:/home/docker/project |
||||
|
- $Wdir/bin/ttyd.x86_64:/usr/bin/ttyd |
||||
|
|
||||
|
|
||||
|
# workerservice: |
||||
|
# image: $IMAGE_NAME |
||||
|
# privileged: true |
||||
|
# environment: |
||||
|
# - NODENAME=${NODENAME} |
||||
|
# - NODENETWORK=${NODENETWORK} |
||||
|
# - DISPLAY=\${DISPLAY} |
||||
|
# cap_add: |
||||
|
# - NET_ADMIN |
||||
|
# user: root |
||||
|
# entrypoint: ["sec_bootstrap", "role=workerservice", "sec_master_service_name=masterservice", "sec_worker_service_name=workerservice"] |
||||
|
# #ports: |
||||
|
# # - "\${SSH_PORT}:22" |
||||
|
# networks: |
||||
|
# - ${HYBRID_NETWORK} |
||||
|
# volumes: |
||||
|
# - $Wdir/project:/home/docker/project |
||||
|
|
||||
|
networks: |
||||
|
${HYBRID_NETWORK}: |
||||
|
EOF |
||||
|
|
||||
|
#/bin/cp -rf $DIR/ssh $Wdir |
||||
|
|
||||
|
cat << EOF > $Wdir/stop.sh |
||||
|
../install/usr/share/swarmlab.io/sec/swarmlab-sec down |
||||
|
EOF |
||||
|
|
||||
|
cat << EOF > $Wdir/container-stop.sh |
||||
|
docker stop \$1 |
||||
|
docker container rm \$1 |
||||
|
EOF |
||||
|
|
||||
|
cat <<EOF |
||||
|
|
||||
|
Project is Ready |
||||
|
├── docker-compose.yml |
||||
|
├── Dockerfile |
||||
|
├── out.log |
||||
|
├── project |
||||
|
│ └── hello_world.sh |
||||
|
└── ssh |
||||
|
├── id_rsa |
||||
|
└── id_rsa.pub |
||||
|
|
||||
|
Run: make start |
||||
|
|
||||
|
or run swarmlab-sec help for USAGE |
||||
|
|
||||
|
EOF |
||||
|
|
||||
|
/bin/chmod -R 777 $Wdir |
||||
|
|
||||
|
fi |
||||
|
} |
||||
|
|
||||
|
####################### |
||||
|
# TASK INDICATORS |
||||
|
COMMAND_UP=0 |
||||
|
COMMAND_CREATE=0 |
||||
|
COMMAND_DOWN=0 |
||||
|
COMMAND_RELOAD=0 |
||||
|
COMMAND_SCALE=0 |
||||
|
COMMAND_LOGIN=0 |
||||
|
COMMAND_EXEC=0 |
||||
|
COMMAND_LIST=0 |
||||
|
COMMAND_CLEAN=0 |
||||
|
|
||||
|
# Default values if providing empty |
||||
|
SIZE=4 |
||||
|
|
||||
|
############################################# |
||||
|
usage () |
||||
|
{ |
||||
|
echo "" |
||||
|
echo "--------------" |
||||
|
echo " SwarmLab.io " |
||||
|
echo "--------------" |
||||
|
echo "" |
||||
|
echo " USAGE: ./swarmlab-sec [COMMAND] [OPTIONS]" |
||||
|
echo "" |
||||
|
echo " Examples of [COMMAND] can be:" |
||||
|
echo " create: create swarmlab-sec " |
||||
|
echo " mkdir WORKdir; cd WORKdir; swarmlab-sec create" |
||||
|
echo "" |
||||
|
echo " up: start swarmlab-sec" |
||||
|
echo " swarmlab-sec up size=10" |
||||
|
echo "" |
||||
|
echo " scale: resize the swarmlab-sec" |
||||
|
echo " swarmlab-sec scale size=30" |
||||
|
echo "" |
||||
|
echo " reload: rebuild image and distribute to nodes" |
||||
|
echo " swarmlab-sec reload size=15" |
||||
|
echo "" |
||||
|
echo " login: login to Docker container of MPI master node for interactive usage" |
||||
|
echo " swarmlab-sec login" |
||||
|
echo "" |
||||
|
echo " exec: execute shell command at the MPI master node" |
||||
|
echo " swarmlab-sec exec [SHELL COMMAND]" |
||||
|
echo "" |
||||
|
echo " down: shutdown swarmlab-sec" |
||||
|
echo " swarmlab-sec down" |
||||
|
echo "" |
||||
|
echo " clean: remove images in the system" |
||||
|
echo " swarmlab-sec clean" |
||||
|
echo "" |
||||
|
echo " list: show running containers of swarmlab-sec" |
||||
|
echo " swarmlab-sec list" |
||||
|
echo "" |
||||
|
echo " help: show this message" |
||||
|
echo " swarmlab-sec help" |
||||
|
echo "" |
||||
|
echo " " |
||||
|
} |
||||
|
|
||||
|
HEADER=" |
||||
|
SwarmLab.io" |
||||
|
|
||||
|
clear_all () |
||||
|
{ |
||||
|
$(docker stop $(docker ps -a | grep "${IMAGE_local}_masterservice_" | awk '{print $1}')) || true |
||||
|
$(docker stop $(docker ps -a | grep "${IMAGE_local}_workerservice_" | awk '{print $1}')) || true |
||||
|
|
||||
|
#$(docker stop $(docker ps -a | grep "_registry_" | awk '{print $1}')) || true # remove for microservices |
||||
|
#docker ps -a | grep "_registry_" | awk '{print $1}' | xargs docker container rm || true # remove for microservices |
||||
|
docker ps -a | grep "${IMAGE_local}_workerservice_" | awk '{print $1}' | xargs docker container rm || true |
||||
|
docker ps -a | grep "${IMAGE_local}_masterservice_" | awk '{print $1}' | xargs docker container rm || true |
||||
|
} |
||||
|
|
||||
|
down_all () |
||||
|
{ |
||||
|
printf "\\n\\n===> CLEAN UP SWARMLAB" |
||||
|
|
||||
|
printf "\\n%s\\n" "$HEADER" |
||||
|
echo "$ docker-compose down" |
||||
|
printf "\\n" |
||||
|
|
||||
|
docker-compose down |
||||
|
} |
||||
|
|
||||
|
up_registry () |
||||
|
{ |
||||
|
printf "\\n\\n===> SPIN UP REGISTRY" |
||||
|
|
||||
|
printf "\\n%s\\n" "$HEADER" |
||||
|
echo "$ docker-compose up -d registry" |
||||
|
printf "\\n" |
||||
|
|
||||
|
#docker stop swarmlab-registry || true && docker rm swarmlab-registry || true # remove for microservices |
||||
|
docker container prune --force |
||||
|
docker-compose up --no-recreate -d registry |
||||
|
} |
||||
|
|
||||
|
generate_ssh_keys () |
||||
|
{ |
||||
|
if [ -f ssh/id_rsa ] && [ -f ssh/id_rsa.pub ]; then |
||||
|
return 0 |
||||
|
fi |
||||
|
|
||||
|
printf "\\n\\n===> GENERATE SSH KEYS \\n\\n" |
||||
|
|
||||
|
echo "$ mkdir -p ssh/ " |
||||
|
printf "\\n" |
||||
|
mkdir -p ssh/ |
||||
|
|
||||
|
echo "$ ssh-keygen -f ssh/id_rsa -t rsa -N ''" |
||||
|
printf "\\n" |
||||
|
ssh-keygen -f ssh/id_rsa -t rsa -N '' |
||||
|
} |
||||
|
|
||||
|
build_and_push_image () |
||||
|
{ |
||||
|
printf "\\n\\n===> BUILD IMAGE" |
||||
|
printf "\\n%s\\n" "$HEADER" |
||||
|
echo "$ docker build -t \"$IMAGE_NAME\" ." |
||||
|
printf "\\n" |
||||
|
#docker build -t "$REGISTRY_ADDR:$REGISTRY_PORT/$IMAGE_NAME" . |
||||
|
docker build -t "$IMAGE_NAME" . |
||||
|
|
||||
|
} |
||||
|
|
||||
|
up_master () |
||||
|
{ |
||||
|
printf "\\n\\n===> SPIN UP MASTER NODE" |
||||
|
printf "\\n%s\\n" "$HEADER" |
||||
|
echo "$ docker-compose up -d masterservice" |
||||
|
printf "\\n" |
||||
|
#docker-compose rm -f |
||||
|
#docker-compose up --build -d masterservice |
||||
|
#docker-compose up --force-recreate -d masterservice |
||||
|
|
||||
|
docker-compose rm -f -s -v |
||||
|
docker-compose up --build --remove-orphans -d masterservice << ANSWERS |
||||
|
yes |
||||
|
yes |
||||
|
yes |
||||
|
ANSWERS |
||||
|
|
||||
|
} |
||||
|
|
||||
|
|
||||
|
up_workers () |
||||
|
{ |
||||
|
printf "\\n\\n===> SPIN UP WORKER NODES" |
||||
|
printf "\\n%s\\n" "$HEADER" |
||||
|
echo "$ docker-compose up -d worker" |
||||
|
printf "\\n" |
||||
|
docker-compose rm -f |
||||
|
docker-compose up --build -d workerservice |
||||
|
#docker-compose up --force-recreate -d workerservice |
||||
|
|
||||
|
printf "\\n" |
||||
|
printf "\\n%s\\n" "$HEADER" |
||||
|
|
||||
|
NUM_WORKER=$((SIZE - 1)) |
||||
|
echo "$ docker-compose scale workerservice=$NUM_WORKER" |
||||
|
printf "\\n" |
||||
|
docker-compose scale workerservice=${NUM_WORKER} |
||||
|
} |
||||
|
|
||||
|
down_master () |
||||
|
{ |
||||
|
printf "\\n\\n===> TORN DOWN MASTER NODE" |
||||
|
printf "\\n%s\\n" "$HEADER" |
||||
|
|
||||
|
echo "$ docker-compose stop masterservice && docker-compose rm -f masterservice" |
||||
|
printf "\\n" |
||||
|
docker-compose stop masterservice && docker-compose rm -f masterservice |
||||
|
} |
||||
|
|
||||
|
down_workers () |
||||
|
{ |
||||
|
printf "\\n\\n===> TORN DOWN WORKER NODES" |
||||
|
printf "\\n%s\\n" "$HEADER" |
||||
|
echo "$ docker-compose stop worker && docker-compose rm -f worker" |
||||
|
printf "\\n" |
||||
|
docker-compose stop workerservice && docker-compose rm -f workerservice |
||||
|
} |
||||
|
|
||||
|
list () |
||||
|
{ |
||||
|
printf "\\n\\n===> LIST CONTAINERS" |
||||
|
printf "\\n%s\\n" "$HEADER" |
||||
|
echo "$ docker-compose ps" |
||||
|
printf "\\n" |
||||
|
docker-compose ps |
||||
|
} |
||||
|
|
||||
|
|
||||
|
exec_on_mpi_master_container () |
||||
|
{ |
||||
|
# shellcheck disable=SC2046 |
||||
|
docker exec -it -u $DOCKERuser $(docker-compose ps | grep 'masterservice'| awk 'NR==1{print $1}') "$@" |
||||
|
} |
||||
|
|
||||
|
prompt_ready () |
||||
|
{ |
||||
|
printf "\\n\\n===> SWARMLAB READY \\n\\n" |
||||
|
} |
||||
|
|
||||
|
show_instruction () |
||||
|
{ |
||||
|
echo ' ## . ' |
||||
|
echo ' ## ## ## == ' |
||||
|
echo ' ## ## ## ## ## === ' |
||||
|
echo ' /"""""""""""""""""\___/ === ' |
||||
|
echo ' ~~~ {~~ ~~~~ ~~~ ~~~~ ~~~ ~ / ===- ~~~ ' |
||||
|
echo ' \______ o __/ ' |
||||
|
echo ' \ \ __/ ' |
||||
|
echo ' \____\_______/ ' |
||||
|
echo ' ' |
||||
|
echo ' Swarmlab.io Hybrid ' |
||||
|
echo '' |
||||
|
echo '==============================================================' |
||||
|
echo '' |
||||
|
|
||||
|
echo "To run SEC programs in an interative shell:" |
||||
|
echo " 1. Login to masterservice node:" |
||||
|
echo " Using Container->connect Menou:" |
||||
|
echo " copy/paste and Run command" |
||||
|
echo "" |
||||
|
echo " Or using SSH with keys through exposed port:" |
||||
|
echo " $ ssh -o \"StrictHostKeyChecking no\" -i ssh/id_rsa -p $SSH_PORT docker@localhost" |
||||
|
echo ' where [localhost] could be changed to the host IP of masterservice node' |
||||
|
echo "" |
||||
|
echo " 2. Execute programs inside masterservice node, for example:" |
||||
|
echo " $ sudo su" |
||||
|
echo " # apk update" |
||||
|
echo " *----------------------------------------------------*" |
||||
|
echo " | Default hostfile of connected nodes in the swarmlab |" |
||||
|
echo " | To obtain hostfile manually: $ ./bin/swarmlab-nmap: > hosts |" |
||||
|
echo " * ---------------------------------------------------*" |
||||
|
echo "" |
||||
|
echo "" |
||||
|
} |
||||
|
|
||||
|
|
||||
|
|
||||
|
############################################# |
||||
|
|
||||
|
while [ "$1" != "" ]; |
||||
|
do |
||||
|
PARAM=$(echo "$1" | awk -F= '{print $1}') |
||||
|
VALUE=$(echo "$1" | awk -F= '{print $2}') |
||||
|
|
||||
|
case $PARAM in |
||||
|
help) |
||||
|
usage |
||||
|
exit |
||||
|
;; |
||||
|
-i) |
||||
|
show_instruction |
||||
|
exit |
||||
|
;; |
||||
|
|
||||
|
login) |
||||
|
COMMAND_LOGIN=1 |
||||
|
;; |
||||
|
|
||||
|
exec) |
||||
|
COMMAND_EXEC=1 |
||||
|
shift # the rest is the shell command to run in the node |
||||
|
SHELL_COMMAND="$*" |
||||
|
break # end while loop |
||||
|
;; |
||||
|
|
||||
|
up) |
||||
|
COMMAND_UP=1 |
||||
|
;; |
||||
|
|
||||
|
create) |
||||
|
COMMAND_CREATE=1 |
||||
|
;; |
||||
|
|
||||
|
down) |
||||
|
COMMAND_DOWN=1 |
||||
|
;; |
||||
|
|
||||
|
reload) |
||||
|
COMMAND_RELOAD=1 |
||||
|
;; |
||||
|
|
||||
|
scale) |
||||
|
COMMAND_SCALE=1 |
||||
|
;; |
||||
|
|
||||
|
list) |
||||
|
COMMAND_LIST=1 |
||||
|
;; |
||||
|
|
||||
|
clean) |
||||
|
COMMAND_CLEAN=1 |
||||
|
;; |
||||
|
|
||||
|
size) |
||||
|
[ "$VALUE" ] && SIZE=$VALUE |
||||
|
;; |
||||
|
|
||||
|
*) |
||||
|
echo "ERROR: unknown parameter \"$PARAM\"" |
||||
|
usage |
||||
|
exit 1 |
||||
|
;; |
||||
|
esac |
||||
|
shift |
||||
|
done |
||||
|
|
||||
|
|
||||
|
if [ $COMMAND_UP -eq 1 ]; then |
||||
|
create_dockerfile |
||||
|
down_all |
||||
|
clear_all |
||||
|
#up_registry # remove for microservices |
||||
|
generate_ssh_keys |
||||
|
build_and_push_image # remove for microservices |
||||
|
up_master |
||||
|
#up_workers |
||||
|
|
||||
|
prompt_ready |
||||
|
show_instruction |
||||
|
|
||||
|
elif [ $COMMAND_CREATE -eq 1 ]; then |
||||
|
create_project |
||||
|
|
||||
|
elif [ $COMMAND_DOWN -eq 1 ]; then |
||||
|
down_all |
||||
|
clear_all |
||||
|
|
||||
|
elif [ $COMMAND_CLEAN -eq 1 ]; then |
||||
|
clear_all |
||||
|
|
||||
|
|
||||
|
elif [ $COMMAND_SCALE -eq 1 ]; then |
||||
|
create_dockerfile |
||||
|
down_master |
||||
|
down_workers |
||||
|
up_master |
||||
|
#up_workers |
||||
|
|
||||
|
prompt_ready |
||||
|
show_instruction |
||||
|
|
||||
|
elif [ $COMMAND_RELOAD -eq 1 ]; then |
||||
|
create_dockerfile |
||||
|
down_master |
||||
|
down_workers |
||||
|
build_and_push_image |
||||
|
up_master |
||||
|
#up_workers |
||||
|
|
||||
|
prompt_ready |
||||
|
show_instruction |
||||
|
|
||||
|
elif [ $COMMAND_LOGIN -eq 1 ]; then |
||||
|
exec_on_mpi_master_container /bin/bash |
||||
|
|
||||
|
elif [ $COMMAND_EXEC -eq 1 ]; then |
||||
|
create_dockerfile |
||||
|
exec_on_mpi_master_container ash -c "${SHELL_COMMAND}" |
||||
|
|
||||
|
elif [ $COMMAND_LIST -eq 1 ]; then |
||||
|
list |
||||
|
else |
||||
|
usage |
||||
|
fi |
||||
|
|
Loading…
Reference in new issue