summaryrefslogtreecommitdiffstats
path: root/components/congress/test-webapp/www
diff options
context:
space:
mode:
Diffstat (limited to 'components/congress/test-webapp/www')
-rw-r--r--components/congress/test-webapp/www/centos-httpd.conf353
-rw-r--r--components/congress/test-webapp/www/html/copper.css15
-rw-r--r--components/congress/test-webapp/www/html/copper.js324
-rw-r--r--components/congress/test-webapp/www/html/index.html33
-rw-r--r--components/congress/test-webapp/www/html/proxy/index.php59
-rw-r--r--components/congress/test-webapp/www/ubuntu-apache2.conf221
6 files changed, 1005 insertions, 0 deletions
diff --git a/components/congress/test-webapp/www/centos-httpd.conf b/components/congress/test-webapp/www/centos-httpd.conf
new file mode 100644
index 0000000..a7af0dc
--- /dev/null
+++ b/components/congress/test-webapp/www/centos-httpd.conf
@@ -0,0 +1,353 @@
+#
+# This is the main Apache HTTP server configuration file. It contains the
+# configuration directives that give the server its instructions.
+# See <URL:http://httpd.apache.org/docs/2.4/> for detailed information.
+# In particular, see
+# <URL:http://httpd.apache.org/docs/2.4/mod/directives.html>
+# for a discussion of each configuration directive.
+#
+# Do NOT simply read the instructions in here without understanding
+# what they do. They're here only as hints or reminders. If you are unsure
+# consult the online docs. You have been warned.
+#
+# Configuration and logfile names: If the filenames you specify for many
+# of the server's control files begin with "/" (or "drive:/" for Win32), the
+# server will use that explicit path. If the filenames do *not* begin
+# with "/", the value of ServerRoot is prepended -- so 'log/access_log'
+# with ServerRoot set to '/www' will be interpreted by the
+# server as '/www/log/access_log', where as '/log/access_log' will be
+# interpreted as '/log/access_log'.
+
+#
+# ServerRoot: The top of the directory tree under which the server's
+# configuration, error, and log files are kept.
+#
+# Do not add a slash at the end of the directory path. If you point
+# ServerRoot at a non-local disk, be sure to specify a local disk on the
+# Mutex directive, if file-based mutexes are used. If you wish to share the
+# same ServerRoot for multiple httpd daemons, you will need to change at
+# least PidFile.
+#
+ServerRoot "/etc/httpd"
+
+#
+# Listen: Allows you to bind Apache to specific IP addresses and/or
+# ports, instead of the default. See also the <VirtualHost>
+# directive.
+#
+# Change this to Listen on specific IP addresses as shown below to
+# prevent Apache from glomming onto all bound IP addresses.
+#
+#Listen 12.34.56.78:80
+Listen 80
+
+#
+# Dynamic Shared Object (DSO) Support
+#
+# To be able to use the functionality of a module which was built as a DSO you
+# have to place corresponding `LoadModule' lines at this location so the
+# directives contained in it are actually available _before_ they are used.
+# Statically compiled modules (those listed by `httpd -l') do not need
+# to be loaded here.
+#
+# Example:
+# LoadModule foo_module modules/mod_foo.so
+#
+Include conf.modules.d/*.conf
+
+#
+# If you wish httpd to run as a different user or group, you must run
+# httpd as root initially and it will switch.
+#
+# User/Group: The name (or #number) of the user/group to run httpd as.
+# It is usually good practice to create a dedicated user and group for
+# running httpd, as with most system services.
+#
+User apache
+Group apache
+
+# 'Main' server configuration
+#
+# The directives in this section set up the values used by the 'main'
+# server, which responds to any requests that aren't handled by a
+# <VirtualHost> definition. These values also provide defaults for
+# any <VirtualHost> containers you may define later in the file.
+#
+# All of these directives may appear inside <VirtualHost> containers,
+# in which case these default settings will be overridden for the
+# virtual host being defined.
+#
+
+#
+# ServerAdmin: Your address, where problems with the server should be
+# e-mailed. This address appears on some server-generated pages, such
+# as error documents. e.g. admin@your-domain.com
+#
+ServerAdmin root@localhost
+
+#
+# ServerName gives the name and port that the server uses to identify itself.
+# This can often be determined automatically, but we recommend you specify
+# it explicitly to prevent problems during startup.
+#
+# If your host doesn't have a registered DNS name, enter its IP address here.
+#
+#ServerName www.example.com:80
+
+#
+# Deny access to the entirety of your server's filesystem. You must
+# explicitly permit access to web content directories in other
+# <Directory> blocks below.
+#
+<Directory />
+ AllowOverride none
+ Require all denied
+</Directory>
+
+#
+# Note that from this point forward you must specifically allow
+# particular features to be enabled - so if something's not working as
+# you might expect, make sure that you have specifically enabled it
+# below.
+#
+
+#
+# DocumentRoot: The directory out of which you will serve your
+# documents. By default, all requests are taken from this directory, but
+# symbolic links and aliases may be used to point to other locations.
+#
+DocumentRoot "/var/www/html"
+
+#
+# Relax access to content within /var/www.
+#
+<Directory "/var/www">
+ AllowOverride None
+ # Allow open access:
+ Require all granted
+</Directory>
+
+# Further relax access to the default document root:
+<Directory "/var/www/html">
+ #
+ # Possible values for the Options directive are "None", "All",
+ # or any combination of:
+ # Indexes Includes FollowSymLinks SymLinksifOwnerMatch ExecCGI MultiViews
+ #
+ # Note that "MultiViews" must be named *explicitly* --- "Options All"
+ # doesn't give it to you.
+ #
+ # The Options directive is both complicated and important. Please see
+ # http://httpd.apache.org/docs/2.4/mod/core.html#options
+ # for more information.
+ #
+ Options Indexes FollowSymLinks
+
+ #
+ # AllowOverride controls what directives may be placed in .htaccess files.
+ # It can be "All", "None", or any combination of the keywords:
+ # Options FileInfo AuthConfig Limit
+ #
+ AllowOverride None
+
+ #
+ # Controls who can get stuff from this server.
+ #
+ Require all granted
+</Directory>
+
+#
+# DirectoryIndex: sets the file that Apache will serve if a directory
+# is requested.
+#
+<IfModule dir_module>
+ DirectoryIndex index.html
+</IfModule>
+
+#
+# The following lines prevent .htaccess and .htpasswd files from being
+# viewed by Web clients.
+#
+<Files ".ht*">
+ Require all denied
+</Files>
+
+#
+# ErrorLog: The location of the error log file.
+# If you do not specify an ErrorLog directive within a <VirtualHost>
+# container, error messages relating to that virtual host will be
+# logged here. If you *do* define an error logfile for a <VirtualHost>
+# container, that host's errors will be logged there and not here.
+#
+ErrorLog "logs/error_log"
+
+#
+# LogLevel: Control the number of messages logged to the error_log.
+# Possible values include: debug, info, notice, warn, error, crit,
+# alert, emerg.
+#
+LogLevel warn
+
+<IfModule log_config_module>
+ #
+ # The following directives define some format nicknames for use with
+ # a CustomLog directive (see below).
+ #
+ LogFormat "%h %l %u %t \"%r\" %>s %b \"%{Referer}i\" \"%{User-Agent}i\"" combined
+ LogFormat "%h %l %u %t \"%r\" %>s %b" common
+
+ <IfModule logio_module>
+ # You need to enable mod_logio.c to use %I and %O
+ LogFormat "%h %l %u %t \"%r\" %>s %b \"%{Referer}i\" \"%{User-Agent}i\" %I %O" combinedio
+ </IfModule>
+
+ #
+ # The location and format of the access logfile (Common Logfile Format).
+ # If you do not define any access logfiles within a <VirtualHost>
+ # container, they will be logged here. Contrariwise, if you *do*
+ # define per-<VirtualHost> access logfiles, transactions will be
+ # logged therein and *not* in this file.
+ #
+ #CustomLog "logs/access_log" common
+
+ #
+ # If you prefer a logfile with access, agent, and referer information
+ # (Combined Logfile Format) you can use the following directive.
+ #
+ CustomLog "logs/access_log" combined
+</IfModule>
+
+<IfModule alias_module>
+ #
+ # Redirect: Allows you to tell clients about documents that used to
+ # exist in your server's namespace, but do not anymore. The client
+ # will make a new request for the document at its new location.
+ # Example:
+ # Redirect permanent /foo http://www.example.com/bar
+
+ #
+ # Alias: Maps web paths into filesystem paths and is used to
+ # access content that does not live under the DocumentRoot.
+ # Example:
+ # Alias /webpath /full/filesystem/path
+ #
+ # If you include a trailing / on /webpath then the server will
+ # require it to be present in the URL. You will also likely
+ # need to provide a <Directory> section to allow access to
+ # the filesystem path.
+
+ #
+ # ScriptAlias: This controls which directories contain server scripts.
+ # ScriptAliases are essentially the same as Aliases, except that
+ # documents in the target directory are treated as applications and
+ # run by the server when requested rather than as documents sent to the
+ # client. The same rules about trailing "/" apply to ScriptAlias
+ # directives as to Alias.
+ #
+ ScriptAlias /cgi-bin/ "/var/www/cgi-bin/"
+
+</IfModule>
+
+#
+# "/var/www/cgi-bin" should be changed to whatever your ScriptAliased
+# CGI directory exists, if you have that configured.
+#
+<Directory "/var/www/cgi-bin">
+ AllowOverride None
+ Options None
+ Require all granted
+</Directory>
+
+<IfModule mime_module>
+ #
+ # TypesConfig points to the file containing the list of mappings from
+ # filename extension to MIME-type.
+ #
+ TypesConfig /etc/mime.types
+
+ #
+ # AddType allows you to add to or override the MIME configuration
+ # file specified in TypesConfig for specific file types.
+ #
+ #AddType application/x-gzip .tgz
+ #
+ # AddEncoding allows you to have certain browsers uncompress
+ # information on the fly. Note: Not all browsers support this.
+ #
+ #AddEncoding x-compress .Z
+ #AddEncoding x-gzip .gz .tgz
+ #
+ # If the AddEncoding directives above are commented-out, then you
+ # probably should define those extensions to indicate media types:
+ #
+ AddType application/x-compress .Z
+ AddType application/x-gzip .gz .tgz
+
+ #
+ # AddHandler allows you to map certain file extensions to "handlers":
+ # actions unrelated to filetype. These can be either built into the server
+ # or added with the Action directive (see below)
+ #
+ # To use CGI scripts outside of ScriptAliased directories:
+ # (You will also need to add "ExecCGI" to the "Options" directive.)
+ #
+ #AddHandler cgi-script .cgi
+
+ # For type maps (negotiated resources):
+ #AddHandler type-map var
+
+ #
+ # Filters allow you to process content before it is sent to the client.
+ #
+ # To parse .shtml files for server-side includes (SSI):
+ # (You will also need to add "Includes" to the "Options" directive.)
+ #
+ AddType text/html .shtml
+ AddOutputFilter INCLUDES .shtml
+</IfModule>
+
+#
+# Specify a default charset for all content served; this enables
+# interpretation of all content as UTF-8 by default. To use the
+# default browser choice (ISO-8859-1), or to allow the META tags
+# in HTML content to override this choice, comment out this
+# directive:
+#
+AddDefaultCharset UTF-8
+
+<IfModule mime_magic_module>
+ #
+ # The mod_mime_magic module allows the server to use various hints from the
+ # contents of the file itself to determine its type. The MIMEMagicFile
+ # directive tells the module where the hint definitions are located.
+ #
+ MIMEMagicFile conf/magic
+</IfModule>
+
+#
+# Customizable error responses come in three flavors:
+# 1) plain text 2) local redirects 3) external redirects
+#
+# Some examples:
+#ErrorDocument 500 "The server made a boo boo."
+#ErrorDocument 404 /missing.html
+#ErrorDocument 404 "/cgi-bin/missing_handler.pl"
+#ErrorDocument 402 http://www.example.com/subscription_info.html
+#
+
+#
+# EnableMMAP and EnableSendfile: On systems that support it,
+# memory-mapping or the sendfile syscall may be used to deliver
+# files. This usually improves server performance, but must
+# be turned off when serving from networked-mounted
+# filesystems or if support for these functions is otherwise
+# broken on your system.
+# Defaults if commented: EnableMMAP On, EnableSendfile Off
+#
+#EnableMMAP off
+EnableSendfile on
+
+# Supplemental configuration
+#
+# Load config files in the "/etc/httpd/conf.d" directory, if any.
+IncludeOptional conf.d/*.conf
diff --git a/components/congress/test-webapp/www/html/copper.css b/components/congress/test-webapp/www/html/copper.css
new file mode 100644
index 0000000..017bd89
--- /dev/null
+++ b/components/congress/test-webapp/www/html/copper.css
@@ -0,0 +1,15 @@
+body { font-family: sans-serif; }
+@media screen and (min-width: 200px) { body { font-size:100%; } }
+@media screen and (min-width: 400px) { body { font-size:120%; } }
+@media screen and (min-width: 600px) { body { font-size:150%; } }
+
+p { font-size: 100%; }
+span { font-size: inherit; }
+table { font-size: inherit; }
+td { font-size: inherit; }
+input { font-size: inherit; display: table;}
+td { font-size: inherit; }
+button { font-size: inherit; color: white; background-color:darkslategray;
+border-style:none; border-radius:10px; -moz-border-radius:10px; -webkit-border-radius:10px;
+margin-top:5px; margin-bottom:5px;}
+textarea {width: 50%; resize:both;}
diff --git a/components/congress/test-webapp/www/html/copper.js b/components/congress/test-webapp/www/html/copper.js
new file mode 100644
index 0000000..1d5d3e1
--- /dev/null
+++ b/components/congress/test-webapp/www/html/copper.js
@@ -0,0 +1,324 @@
+/*
+ Copyright 2015 Open Platform for NFV Project, Inc. and its contributors
+
+ Licensed under the Apache License, Version 2.0 (the "License");
+ you may not use this file except in compliance with the License.
+ You may obtain a copy of the License at
+
+ http://www.apache.org/licenses/LICENSE-2.0
+
+ Unless required by applicable law or agreed to in writing, software
+ distributed under the License is distributed on an "AS IS" BASIS,
+ WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ See the License for the specific language governing permissions and
+ limitations under the License.
+*/
+var origin = "http://localhost/proxy/?~url=";
+var dataSources = [];
+var tables = [];
+var rows = [];
+var policies = [];
+var rules = [];
+
+function get_dataSources() {
+ dse = document.getElementById('dataSources');
+ while (dse.firstChild) dse.removeChild(dse.firstChild);
+ asyncXHR('GET',origin+'/v1/data-sources',function(xhr) {
+ obj = JSON.parse(xhr.responseText);
+ dataSources = obj.results;
+ var str = '';
+ for (i in dataSources) {
+ datasource = dataSources[i].name;
+ dhe = element('button',datasource,datasource,1);
+ de = element('div',datasource+":datasource","",1);
+ dhe.setAttribute('onclick','toggle("'+de.id+'");');
+ dse.appendChild(dhe);
+ de.style.display = 'none'
+ for (j in dataSources[i]) {
+ if (typeof dataSources[i][j] == 'object' && dataSources[i][j] != null) {
+ oe = element('button',"",j,2);
+ ae = element('p',datasource+':'+j,null,2);
+ ae.style.display = 'none'
+ oe.setAttribute('onclick','toggle("'+ae.id+'");');
+ de.appendChild(oe);
+ for (k in dataSources[i][j]) {
+ sae = element('p',"",k+':'+dataSources[i][j][k],3);
+ ae.appendChild(sae);
+ }
+ }
+ else ae = element('p',"",j+':'+dataSources[i][j],2);
+ de.appendChild(ae);
+ }
+ tb = element('button',"",'Tables',2);
+ tb.setAttribute('onclick','get_tables('+i+');');
+ de.appendChild(tb);
+ tb = element('p',datasource+':tables',"",2);
+ de.appendChild(tb);
+ dse.appendChild(de);
+ }
+ },null,null,null);
+}
+
+function get_tables(dsIndex) {
+ dsid = dataSources[dsIndex].id;
+ datasource = dataSources[dsIndex].name;
+ tb = document.getElementById(datasource+':tables');
+ if (tb.innerHTML != "" && tb.style.display != 'none') tb.style.display = 'none';
+ else {
+ while (tb.firstChild) tb.removeChild(tb.firstChild);
+ asyncXHR('GET',origin+'/v1/data-sources/'+dsid+'/tables',function(xhr) {
+ obj = JSON.parse(xhr.responseText);
+ if (obj.results.length == 0) {
+ tables[dsIndex] = [];
+ rows[dsIndex] = [];
+ tb.innerHTML = "No tables defined.";
+ }
+ else {
+ tables[dsIndex] = obj.results;
+ rows[dsIndex] = [];
+ for (i in tables[dsIndex]) {
+ rows[dsIndex][i] = [];
+ tid = tables[dsIndex][i].id;
+ te = element('button',tid,tid,3);
+ te.setAttribute('onclick','get_rows('+dsIndex+','+i+');');
+ tb.appendChild(te);
+ te = element('div',datasource+":"+tid,"",2);
+ tb.appendChild(te);
+ }
+ }
+ tb.style.display = 'block';
+ },null,null,null);
+ }
+}
+
+function get_rows(dsIndex,tableIndex) {
+ datasource = dataSources[dsIndex].name;
+ dsid = dataSources[dsIndex].id;
+ tid = tables[dsIndex][tableIndex].id;
+ tb = document.getElementById(datasource+":"+tid);
+ if (tb.innerHTML != "" && tb.style.display != 'none') tb.style.display = 'none';
+ else {
+ while (tb.firstChild) tb.removeChild(tb.firstChild);
+ asyncXHR('GET',origin+'/v1/data-sources/'+dsid+'/tables/'+tid+'/rows',function(xhr) {
+ obj = JSON.parse(xhr.responseText);
+ if (obj.results.length == 0) {
+ rows[dsIndex][tableIndex] = [];
+ tb.innerHTML = "No rows defined.";
+ }
+ else {
+ rows[dsIndex][tableIndex] = obj.results;
+ for (i in rows[dsIndex][tableIndex]) {
+ data = rows[dsIndex][tableIndex][i].data;
+ te = element('p',"",JSON.stringify(data),3);
+ tb.appendChild(te);
+ }
+ }
+ tb.style.display = 'block';
+ },null,null,null);
+ }
+}
+
+function get_policies() {
+ poe = document.getElementById('policies');
+ while (poe.firstChild) poe.removeChild(poe.firstChild);
+ asyncXHR('GET',origin+'/v1/policies',function(xhr) {
+ obj = JSON.parse(xhr.responseText);
+ policies = obj.results;
+ for (i in policies) {
+ name = policies[i].name;
+ he = element('button',"",name,1);
+ pe = element('div',name+":policies","",1);
+ he.setAttribute('onclick','toggle("'+pe.id+'");');
+ poe.appendChild(he);
+ pe.style.display = 'none'
+ for (j in policies[i]) {
+ ae = element('p',"",j+':'+policies[i][j],2);
+ pe.appendChild(ae);
+ }
+ rb = element('button',"",'Rules',2);
+ rb.setAttribute('onclick','get_rules('+i+');');
+ pe.appendChild(rb);
+ pr = element('p',name+':rules',"",2);
+ pe.appendChild(pr);
+ poe.appendChild(pe);
+// {"kind":"nonrecursive","description":"default action policy","name":"action","abbreviation":"actio",
+// "id":"29196084-604d-4964-93e6-c23eb2c52990","owner_id":"user"}
+ }
+ },null,null,null);
+// document.getElementById('response').innerHTML = dumpProps(policies,'policies',false);
+}
+
+/* Example of a 1-rule array response
+{
+ "results": [
+ {
+ "comment": "",
+ "id": "056a00a3-d5a7-46c5-8a40-d02e3f72ef03",
+ "rule": "samegroup(user1, user2) :- ldap:group(user1, g), ldap:group(user2, g)",
+ "name": null
+ }
+ ]
+}
+ */
+function get_rules(policyIndex) {
+ policy = policies[policyIndex].name;
+ pid = policies[policyIndex].id;
+ pr = document.getElementById(policy+':rules');
+ while (pr.firstChild) pr.removeChild(pr.firstChild);
+ asyncXHR('GET',origin+'/v1/policies/'+policy+'/rules',function(xhr) {
+ obj = JSON.parse(xhr.responseText);
+ rules[policyIndex] = obj.results;
+ if (obj.results.length == 0) {
+ rules[policyIndex] = [];
+ pr.innerHTML = "No rules defined.";
+ }
+ else {
+ var str = '';
+// alert(JSON.stringify(rules[policyIndex]));
+ for (i in rules[policyIndex]) {
+ name = rules[policyIndex][i].name;
+ he = element('button',name,name,3);
+ re = element('div',name+"json","",4);
+ he.setAttribute('onclick','toggle("'+re.id+'");');
+ pr.appendChild(he);
+ de = element('button',"","delete",null);
+ de.setAttribute('onclick','delete_rule('+policyIndex+','+i+');');
+ pr.appendChild(de);
+ re.style.display = 'none';
+ for (j in rules[policyIndex][i]) {
+ ae = element('p',"",j+':'+rules[policyIndex][i][j],4);
+ re.appendChild(ae);
+ }
+ pr.appendChild(re);
+ }
+ }
+ cre = element('button',"cre","Create rule",3);
+ cre.setAttribute('onclick','create_rule_input('+policyIndex+');');
+ pr.appendChild(cre);
+ },null,null,null);
+}
+
+function create_rule_input(policyIndex) {
+ pr = document.getElementById(policy+':rules');
+ cre = document.getElementById('cre');
+ /*
+ * Example:
+ error :- nova:vm(vm), neutron:network(network), nova:network(vm, network), -neutron:public(network), neutron:private(network), nova:owner(vm, vm-own), neutron:owner(network, net-own), -same-group(vm-own, net-own)
+ samegroup(user1, user2) :- ldap:group(user1, g), ldap:group(user2, g)
+ */
+ nrn = element('input',"nrn","Name",3);
+ nrc = element('input',"nrc","Comment",3);
+ rte = element('textarea',"nrule",null,3);
+ pr.appendChild(nrn);
+ pr.appendChild(nrc);
+ pr.appendChild(rte);
+ cre.setAttribute('onclick','create_rule('+policyIndex+');');
+}
+
+function create_rule(policyIndex,name,comment,rule) {
+ // use policy name rather than id as the id!
+ policy = policies[policyIndex].name;
+ name = document.getElementById("nrn").value;
+ comment = document.getElementById("nrc").value;
+ rule = document.getElementById("nrule").value;
+ rid = guidGenerator();
+ body = '{"id":"'+rid+'","name":"'+name+'","comment":"'+comment+'","rule":"'+rule+'"}';
+ asyncXHR('POST',origin+'/v1/policies/'+policy+'/rules',function(xhr) {
+ obj = JSON.parse(xhr.responseText);
+ if (obj.error !== undefined) alert(xhr.responseText);
+ // BUG: Congress creates rules asyncchronously, thus a query for rules immediately after rule creation may not return the newly created rule
+ else setTimeout('get_rules('+policyIndex+');',1000);
+ },null,"application/json",body);
+}
+
+/*
+ * Deleting a rule takes the ID as resource path element, and returns a JSON copy of the rule deleted
+ */
+function delete_rule(policyIndex,ruleIndex) {
+ policy = policies[policyIndex].name;
+ name = rules[policyIndex][ruleIndex].name;
+ id = rules[policyIndex][ruleIndex].id;
+ // use policy name rather than id as the id!
+ asyncXHR('DELETE',origin+'/v1/policies/'+policy+'/rules/'+id,function(xhr) {
+ // BUG: Congress creates rules asyncchronously, thus a query for rules immediately after rule creation may not return the newly created rule
+ setTimeout('get_rules('+policyIndex+');',1000);
+ },null,null,null);
+}
+
+/*
+ * Debug feature: delete an arbitrary resource
+ */
+function delete_resource() {
+ resource = document.getElementById('resource').value;
+ asyncXHR('DELETE',origin+resource,function(xhr) {
+ obj = JSON.parse(xhr.responseText);
+ if (obj.error !== undefined) alert(xhr.responseText);
+ },null,null,null);
+}
+
+function element(type,id,value,indent) {
+ e = document.createElement(type);
+ e.id = id;
+ if (indent !== null) e.style.marginLeft = indent*15+'px';
+ if (type == "input") e.placeholder = value;
+ else if (value != null) e.innerHTML = value;
+ return(e);
+}
+
+
+function br() {
+ return (document.createElement('br'));
+}
+
+function toggle(obj) {
+ var el = document.getElementById(obj);
+ if ( el.style.display != 'none' ) {
+ el.style.display = 'none';
+ }
+ else {
+ el.style.display = '';
+ }
+}
+
+function dumpProps(obj, parent, str) {
+ if (str == false) str = '';
+ try {
+ for (var i in obj) {
+ if (typeof obj[i] != 'object' && typeof obj[i] != 'function' ) {
+ if (parent) { str += parent + '.' + i + ' = ' + obj[i] + '<br/>'; }
+ else { str += i + ' = ' + obj[i] + '<br/>'; }
+ }
+ else {
+ if (parent) { str = dumpProps(obj[i], parent + '[' + i + ']', str); }
+ else { str = dumpProps(obj[i], i, str); }
+ }
+ }
+ return(str);
+ } catch (e) { alert(e); }
+}
+
+function asyncXHR(method,url,callback,accept,contentType,body) {
+ var xhr = false;
+ try { xhr = new XMLHttpRequest(); }
+ catch(e1) {}
+ if(xhr) {
+ try {
+ xhr.onreadystatechange = function() {
+ if (xhr.readyState === 4) callback(xhr);
+ };
+ xhr.open(method, url, true);
+ if (accept !== null) xhr.setRequestHeader("Accept",accept);
+ if (contentType !== null) xhr.setRequestHeader("Content-Type",contentType);
+ if (body !== null) xhr.send(body);
+ else xhr.send();
+ }
+ catch(e4) { alert("asyncXHR: xhr send error "+e4.message+" for URL "+url); }
+ }
+}
+
+function guidGenerator() {
+ var S4 = function() {
+ return (((1+Math.random())*0x10000)|0).toString(16).substring(1);
+ };
+ return (S4()+S4()+"-"+S4()+"-"+S4()+"-"+S4()+"-"+S4()+S4()+S4());
+}
diff --git a/components/congress/test-webapp/www/html/index.html b/components/congress/test-webapp/www/html/index.html
new file mode 100644
index 0000000..a36bcd5
--- /dev/null
+++ b/components/congress/test-webapp/www/html/index.html
@@ -0,0 +1,33 @@
+<!DOCTYPE html>
+<html>
+<head>
+<title>OPNFV Congress Test</title>
+<link rel='stylesheet' type='text/css' href='copper.css'/>
+<!--
+ Copyright (c) 2015 AT&T Intellectual Property
+
+ Licensed under the Apache License, Version 2.0 (the "License");
+ you may not use this file except in compliance with the License.
+ You may obtain a copy of the License at
+
+ http://www.apache.org/licenses/LICENSE-2.0
+
+ Unless required by applicable law or agreed to in writing, software
+ distributed under the License is distributed on an "AS IS" BASIS,
+ WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ See the License for the specific language governing permissions and
+ limitations under the License.
+-->
+<script type='text/javascript' src='copper.js'></script>
+<meta name='viewport' content='width=device-width, minimum-scale=1.0, initial-scale=1.0 user-scalable=0'/>
+</head>
+<body>
+ <button onclick='delete_resource();'>Delete a resource</button>
+ <textarea id=resource default="Resource"></textarea></br>
+ <button onclick='get_policies();'>Get Policies</button>
+ <div id=policies></div>
+ <button onclick='get_dataSources();'>Get Data Sources</button>
+ <div id=dataSources></div>
+ <div id=response></div>
+</body>
+</html>
diff --git a/components/congress/test-webapp/www/html/proxy/index.php b/components/congress/test-webapp/www/html/proxy/index.php
new file mode 100644
index 0000000..93be444
--- /dev/null
+++ b/components/congress/test-webapp/www/html/proxy/index.php
@@ -0,0 +1,59 @@
+<?php
+/*
+ Copyright 2015 Open Platform for NFV Project, Inc. and its contributors
+
+ Licensed under the Apache License, Version 2.0 (the "License");
+ you may not use this file except in compliance with the License.
+ You may obtain a copy of the License at
+
+ http://www.apache.org/licenses/LICENSE-2.0
+
+ Unless required by applicable law or agreed to in writing, software
+ distributed under the License is distributed on an "AS IS" BASIS,
+ WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ See the License for the specific language governing permissions and
+ limitations under the License.
+*/
+$method = $_SERVER['REQUEST_METHOD'];
+if ($method == 'OPTIONS') {
+ header("Content-Type: application/json");
+ header("Access-Control-Allow-Origin: *");
+ header("Access-Control-Allow-Methods: GET, POST, DELETE");
+ exit();
+}
+
+$url = "http://192.168.10.117:1789".$_GET['~url'];
+$curlop = curl_init();
+curl_setopt($curlop, CURLOPT_URL, $url);
+curl_setopt($curlop, CURLOPT_CUSTOMREQUEST, $method);
+//curl_setopt($curlop, CURLOPT_HEADER, 0);
+//curl_setopt($curlop, CURLINFO_HEADER_OUT, 0);
+curl_setopt($curlop, CURLOPT_RETURNTRANSFER, 1);
+curl_setopt($curlop, CURLOPT_SSL_VERIFYPEER, false);
+curl_setopt($curlop, CURLINFO_HEADER_OUT, true);
+
+if ($method == "POST") {
+ curl_setopt($curlop, CURLOPT_HTTPHEADER, array("Content-Type: application/json"));
+ $body = file_get_contents('php://input');
+ curl_setopt($curlop, CURLOPT_POSTFIELDS, $body);
+}
+
+$response = curl_exec($curlop);
+$req_time=time();
+
+$info = curl_getinfo($curlop);
+$result = file_put_contents("/home/ubuntu/logs/".date('ymd').".log", "proxy.php, ".$req_time.", ".$url.", ".$type.", ".$body."\n",FILE_APPEND);
+if ($result === false) $response = "PHP error in index.php";
+$responseCode=curl_getinfo($curlop,CURLINFO_HTTP_CODE);
+$header_size = curl_getinfo($response, CURLINFO_HEADER_SIZE);
+$header = substr($response, 0, $header_size);
+$type = curl_getinfo($curlop,CURLINFO_CONTENT_TYPE);
+$body = substr($response, $header_size);
+$result = file_put_contents("/home/ubuntu/logs/".date('ymd').".log", "proxy.php, ".$req_time.", ".$responseCode.", ".$type.", ".$header.", ".$body."\n",FILE_APPEND);
+if ($result === false) $response = "PHP error in index.php";
+
+// header("Location: ".$url);
+header("Content-Type: ".$type);
+header("Access-Control-Allow-Origin: *");
+echo $response;
+curl_close($curlop);
diff --git a/components/congress/test-webapp/www/ubuntu-apache2.conf b/components/congress/test-webapp/www/ubuntu-apache2.conf
new file mode 100644
index 0000000..f5d5408
--- /dev/null
+++ b/components/congress/test-webapp/www/ubuntu-apache2.conf
@@ -0,0 +1,221 @@
+# This is the main Apache server configuration file. It contains the
+# configuration directives that give the server its instructions.
+# See http://httpd.apache.org/docs/2.4/ for detailed information about
+# the directives and /usr/share/doc/apache2/README.Debian about Debian specific
+# hints.
+#
+#
+# Summary of how the Apache 2 configuration works in Debian:
+# The Apache 2 web server configuration in Debian is quite different to
+# upstream's suggested way to configure the web server. This is because Debian's
+# default Apache2 installation attempts to make adding and removing modules,
+# virtual hosts, and extra configuration directives as flexible as possible, in
+# order to make automating the changes and administering the server as easy as
+# possible.
+
+# It is split into several files forming the configuration hierarchy outlined
+# below, all located in the /etc/apache2/ directory:
+#
+# /etc/apache2/
+# |-- apache2.conf
+# | `-- ports.conf
+# |-- mods-enabled
+# | |-- *.load
+# | `-- *.conf
+# |-- conf-enabled
+# | `-- *.conf
+# `-- sites-enabled
+# `-- *.conf
+#
+#
+# * apache2.conf is the main configuration file (this file). It puts the pieces
+# together by including all remaining configuration files when starting up the
+# web server.
+#
+# * ports.conf is always included from the main configuration file. It is
+# supposed to determine listening ports for incoming connections which can be
+# customized anytime.
+#
+# * Configuration files in the mods-enabled/, conf-enabled/ and sites-enabled/
+# directories contain particular configuration snippets which manage modules,
+# global configuration fragments, or virtual host configurations,
+# respectively.
+#
+# They are activated by symlinking available configuration files from their
+# respective *-available/ counterparts. These should be managed by using our
+# helpers a2enmod/a2dismod, a2ensite/a2dissite and a2enconf/a2disconf. See
+# their respective man pages for detailed information.
+#
+# * The binary is called apache2. Due to the use of environment variables, in
+# the default configuration, apache2 needs to be started/stopped with
+# /etc/init.d/apache2 or apache2ctl. Calling /usr/bin/apache2 directly will not
+# work with the default configuration.
+
+
+# Global configuration
+#
+
+#
+# ServerRoot: The top of the directory tree under which the server's
+# configuration, error, and log files are kept.
+#
+# NOTE! If you intend to place this on an NFS (or otherwise network)
+# mounted filesystem then please read the Mutex documentation (available
+# at <URL:http://httpd.apache.org/docs/2.4/mod/core.html#mutex>);
+# you will save yourself a lot of trouble.
+#
+# Do NOT add a slash at the end of the directory path.
+#
+ServerRoot "/etc/apache2"
+
+#
+# The accept serialization lock file MUST BE STORED ON A LOCAL DISK.
+#
+Mutex file:${APACHE_LOCK_DIR} default
+
+#
+# PidFile: The file in which the server should record its process
+# identification number when it starts.
+# This needs to be set in /etc/apache2/envvars
+#
+PidFile ${APACHE_PID_FILE}
+
+#
+# Timeout: The number of seconds before receives and sends time out.
+#
+Timeout 300
+
+#
+# KeepAlive: Whether or not to allow persistent connections (more than
+# one request per connection). Set to "Off" to deactivate.
+#
+KeepAlive On
+
+#
+# MaxKeepAliveRequests: The maximum number of requests to allow
+# during a persistent connection. Set to 0 to allow an unlimited amount.
+# We recommend you leave this number high, for maximum performance.
+#
+MaxKeepAliveRequests 100
+
+#
+# KeepAliveTimeout: Number of seconds to wait for the next request from the
+# same client on the same connection.
+#
+KeepAliveTimeout 5
+
+
+# These need to be set in /etc/apache2/envvars
+User ${APACHE_RUN_USER}
+Group ${APACHE_RUN_GROUP}
+
+#
+# HostnameLookups: Log the names of clients or just their IP addresses
+# e.g., www.apache.org (on) or 204.62.129.132 (off).
+# The default is off because it'd be overall better for the net if people
+# had to knowingly turn this feature on, since enabling it means that
+# each client request will result in AT LEAST one lookup request to the
+# nameserver.
+#
+HostnameLookups Off
+
+# ErrorLog: The location of the error log file.
+# If you do not specify an ErrorLog directive within a <VirtualHost>
+# container, error messages relating to that virtual host will be
+# logged here. If you *do* define an error logfile for a <VirtualHost>
+# container, that host's errors will be logged there and not here.
+#
+ErrorLog ${APACHE_LOG_DIR}/error.log
+
+#
+# LogLevel: Control the severity of messages logged to the error_log.
+# Available values: trace8, ..., trace1, debug, info, notice, warn,
+# error, crit, alert, emerg.
+# It is also possible to configure the log level for particular modules, e.g.
+# "LogLevel info ssl:warn"
+#
+LogLevel warn
+
+# Include module configuration:
+IncludeOptional mods-enabled/*.load
+IncludeOptional mods-enabled/*.conf
+
+# Include list of ports to listen on
+Include ports.conf
+
+
+# Sets the default security model of the Apache2 HTTPD server. It does
+# not allow access to the root filesystem outside of /usr/share and /var/www.
+# The former is used by web applications packaged in Debian,
+# the latter may be used for local directories served by the web server. If
+# your system is serving content from a sub-directory in /srv you must allow
+# access here, or in any related virtual host.
+<Directory />
+ Options FollowSymLinks
+ AllowOverride None
+ Require all denied
+</Directory>
+
+<Directory /usr/share>
+ AllowOverride None
+ Require all granted
+</Directory>
+
+<Directory /var/www/>
+ Options Indexes FollowSymLinks
+ AllowOverride None
+ Require all granted
+</Directory>
+
+#<Directory /srv/>
+# Options Indexes FollowSymLinks
+# AllowOverride None
+# Require all granted
+#</Directory>
+
+
+
+
+# AccessFileName: The name of the file to look for in each directory
+# for additional configuration directives. See also the AllowOverride
+# directive.
+#
+AccessFileName .htaccess
+
+#
+# The following lines prevent .htaccess and .htpasswd files from being
+# viewed by Web clients.
+#
+<FilesMatch "^\.ht">
+ Require all denied
+</FilesMatch>
+
+
+#
+# The following directives define some format nicknames for use with
+# a CustomLog directive.
+#
+# These deviate from the Common Log Format definitions in that they use %O
+# (the actual bytes sent including headers) instead of %b (the size of the
+# requested file), because the latter makes it impossible to detect partial
+# requests.
+#
+# Note that the use of %{X-Forwarded-For}i instead of %h is not recommended.
+# Use mod_remoteip instead.
+#
+LogFormat "%v:%p %h %l %u %t \"%r\" %>s %O \"%{Referer}i\" \"%{User-Agent}i\"" vhost_combined
+LogFormat "%h %l %u %t \"%r\" %>s %O \"%{Referer}i\" \"%{User-Agent}i\"" combined
+LogFormat "%h %l %u %t \"%r\" %>s %O" common
+LogFormat "%{Referer}i -> %U" referer
+LogFormat "%{User-agent}i" agent
+
+# Include of directories ignores editors' and dpkg's backup files,
+# see README.Debian for details.
+
+# Include generic snippets of statements
+IncludeOptional conf-enabled/*.conf
+
+# Include the virtual host configurations:
+IncludeOptional sites-enabled/*.conf
+
+# vim: syntax=apache ts=4 sw=4 sts=4 sr noet