From 9eb7ca01065b6b51de65d73dd2d9879fcedc5be7 Mon Sep 17 00:00:00 2001 From: Bryan Sullivan Date: Mon, 7 Dec 2015 22:17:55 -0800 Subject: Added initial version of Congress test webapp Corrected errors in index.php, removed include.php, version.php JIRA: COPPER-4 Change-Id: Ifbcf1c274d486b52c86bf86b6e028d9cfe3c3d92 Signed-off-by: Bryan Sullivan --- components/congress/test-webapp/README.txt | 37 +++ .../congress/test-webapp/www/centos-httpd.conf | 353 +++++++++++++++++++++ .../congress/test-webapp/www/html/copper.css | 15 + components/congress/test-webapp/www/html/copper.js | 324 +++++++++++++++++++ .../congress/test-webapp/www/html/index.html | 33 ++ .../congress/test-webapp/www/html/proxy/index.php | 59 ++++ .../congress/test-webapp/www/ubuntu-apache2.conf | 221 +++++++++++++ 7 files changed, 1042 insertions(+) create mode 100644 components/congress/test-webapp/README.txt create mode 100644 components/congress/test-webapp/www/centos-httpd.conf create mode 100644 components/congress/test-webapp/www/html/copper.css create mode 100644 components/congress/test-webapp/www/html/copper.js create mode 100644 components/congress/test-webapp/www/html/index.html create mode 100644 components/congress/test-webapp/www/html/proxy/index.php create mode 100644 components/congress/test-webapp/www/ubuntu-apache2.conf diff --git a/components/congress/test-webapp/README.txt b/components/congress/test-webapp/README.txt new file mode 100644 index 0000000..dc3484f --- /dev/null +++ b/components/congress/test-webapp/README.txt @@ -0,0 +1,37 @@ +# Copyright 2015 Open Platform for NFV Project, Inc. and its contributors +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# + +# This file contains instructions for installation and use of the Copper +# project adhoc test driver for OpenStack Congress. + +# +# For Ubuntu +# +# install dependencies +sudo apt-get install lamp-server^ -y +# when prompted, set mysql root user password to "ubuntu" +sudo apt-get install php5-curl + +# get Copper test driver app +cd ~ +git clone https://gerrit.opnfv.org/gerrit/copper +sudo cp ~copper/components/congress/test-webapp/www/ubuntu-apache2.conf /etc/apache2/apache2.conf +sudo cp -R ~copper/components/congress/test-webapp/www/html /var/www +sudo chmod 755 /var/www/html -R +sudo service apache2 restart + +# Using the app: Browse to http://localhost +# Interactive options are meant to be self-explanatory given a basic +# familiarity with the Congress service and data model. diff --git a/components/congress/test-webapp/www/centos-httpd.conf b/components/congress/test-webapp/www/centos-httpd.conf new file mode 100644 index 0000000..a7af0dc --- /dev/null +++ b/components/congress/test-webapp/www/centos-httpd.conf @@ -0,0 +1,353 @@ +# +# This is the main Apache HTTP server configuration file. It contains the +# configuration directives that give the server its instructions. +# See for detailed information. +# In particular, see +# +# for a discussion of each configuration directive. +# +# Do NOT simply read the instructions in here without understanding +# what they do. They're here only as hints or reminders. If you are unsure +# consult the online docs. You have been warned. +# +# Configuration and logfile names: If the filenames you specify for many +# of the server's control files begin with "/" (or "drive:/" for Win32), the +# server will use that explicit path. If the filenames do *not* begin +# with "/", the value of ServerRoot is prepended -- so 'log/access_log' +# with ServerRoot set to '/www' will be interpreted by the +# server as '/www/log/access_log', where as '/log/access_log' will be +# interpreted as '/log/access_log'. + +# +# ServerRoot: The top of the directory tree under which the server's +# configuration, error, and log files are kept. +# +# Do not add a slash at the end of the directory path. If you point +# ServerRoot at a non-local disk, be sure to specify a local disk on the +# Mutex directive, if file-based mutexes are used. If you wish to share the +# same ServerRoot for multiple httpd daemons, you will need to change at +# least PidFile. +# +ServerRoot "/etc/httpd" + +# +# Listen: Allows you to bind Apache to specific IP addresses and/or +# ports, instead of the default. See also the +# directive. +# +# Change this to Listen on specific IP addresses as shown below to +# prevent Apache from glomming onto all bound IP addresses. +# +#Listen 12.34.56.78:80 +Listen 80 + +# +# Dynamic Shared Object (DSO) Support +# +# To be able to use the functionality of a module which was built as a DSO you +# have to place corresponding `LoadModule' lines at this location so the +# directives contained in it are actually available _before_ they are used. +# Statically compiled modules (those listed by `httpd -l') do not need +# to be loaded here. +# +# Example: +# LoadModule foo_module modules/mod_foo.so +# +Include conf.modules.d/*.conf + +# +# If you wish httpd to run as a different user or group, you must run +# httpd as root initially and it will switch. +# +# User/Group: The name (or #number) of the user/group to run httpd as. +# It is usually good practice to create a dedicated user and group for +# running httpd, as with most system services. +# +User apache +Group apache + +# 'Main' server configuration +# +# The directives in this section set up the values used by the 'main' +# server, which responds to any requests that aren't handled by a +# definition. These values also provide defaults for +# any containers you may define later in the file. +# +# All of these directives may appear inside containers, +# in which case these default settings will be overridden for the +# virtual host being defined. +# + +# +# ServerAdmin: Your address, where problems with the server should be +# e-mailed. This address appears on some server-generated pages, such +# as error documents. e.g. admin@your-domain.com +# +ServerAdmin root@localhost + +# +# ServerName gives the name and port that the server uses to identify itself. +# This can often be determined automatically, but we recommend you specify +# it explicitly to prevent problems during startup. +# +# If your host doesn't have a registered DNS name, enter its IP address here. +# +#ServerName www.example.com:80 + +# +# Deny access to the entirety of your server's filesystem. You must +# explicitly permit access to web content directories in other +# blocks below. +# + + AllowOverride none + Require all denied + + +# +# Note that from this point forward you must specifically allow +# particular features to be enabled - so if something's not working as +# you might expect, make sure that you have specifically enabled it +# below. +# + +# +# DocumentRoot: The directory out of which you will serve your +# documents. By default, all requests are taken from this directory, but +# symbolic links and aliases may be used to point to other locations. +# +DocumentRoot "/var/www/html" + +# +# Relax access to content within /var/www. +# + + AllowOverride None + # Allow open access: + Require all granted + + +# Further relax access to the default document root: + + # + # Possible values for the Options directive are "None", "All", + # or any combination of: + # Indexes Includes FollowSymLinks SymLinksifOwnerMatch ExecCGI MultiViews + # + # Note that "MultiViews" must be named *explicitly* --- "Options All" + # doesn't give it to you. + # + # The Options directive is both complicated and important. Please see + # http://httpd.apache.org/docs/2.4/mod/core.html#options + # for more information. + # + Options Indexes FollowSymLinks + + # + # AllowOverride controls what directives may be placed in .htaccess files. + # It can be "All", "None", or any combination of the keywords: + # Options FileInfo AuthConfig Limit + # + AllowOverride None + + # + # Controls who can get stuff from this server. + # + Require all granted + + +# +# DirectoryIndex: sets the file that Apache will serve if a directory +# is requested. +# + + DirectoryIndex index.html + + +# +# The following lines prevent .htaccess and .htpasswd files from being +# viewed by Web clients. +# + + Require all denied + + +# +# ErrorLog: The location of the error log file. +# If you do not specify an ErrorLog directive within a +# container, error messages relating to that virtual host will be +# logged here. If you *do* define an error logfile for a +# container, that host's errors will be logged there and not here. +# +ErrorLog "logs/error_log" + +# +# LogLevel: Control the number of messages logged to the error_log. +# Possible values include: debug, info, notice, warn, error, crit, +# alert, emerg. +# +LogLevel warn + + + # + # The following directives define some format nicknames for use with + # a CustomLog directive (see below). + # + LogFormat "%h %l %u %t \"%r\" %>s %b \"%{Referer}i\" \"%{User-Agent}i\"" combined + LogFormat "%h %l %u %t \"%r\" %>s %b" common + + + # You need to enable mod_logio.c to use %I and %O + LogFormat "%h %l %u %t \"%r\" %>s %b \"%{Referer}i\" \"%{User-Agent}i\" %I %O" combinedio + + + # + # The location and format of the access logfile (Common Logfile Format). + # If you do not define any access logfiles within a + # container, they will be logged here. Contrariwise, if you *do* + # define per- access logfiles, transactions will be + # logged therein and *not* in this file. + # + #CustomLog "logs/access_log" common + + # + # If you prefer a logfile with access, agent, and referer information + # (Combined Logfile Format) you can use the following directive. + # + CustomLog "logs/access_log" combined + + + + # + # Redirect: Allows you to tell clients about documents that used to + # exist in your server's namespace, but do not anymore. The client + # will make a new request for the document at its new location. + # Example: + # Redirect permanent /foo http://www.example.com/bar + + # + # Alias: Maps web paths into filesystem paths and is used to + # access content that does not live under the DocumentRoot. + # Example: + # Alias /webpath /full/filesystem/path + # + # If you include a trailing / on /webpath then the server will + # require it to be present in the URL. You will also likely + # need to provide a section to allow access to + # the filesystem path. + + # + # ScriptAlias: This controls which directories contain server scripts. + # ScriptAliases are essentially the same as Aliases, except that + # documents in the target directory are treated as applications and + # run by the server when requested rather than as documents sent to the + # client. The same rules about trailing "/" apply to ScriptAlias + # directives as to Alias. + # + ScriptAlias /cgi-bin/ "/var/www/cgi-bin/" + + + +# +# "/var/www/cgi-bin" should be changed to whatever your ScriptAliased +# CGI directory exists, if you have that configured. +# + + AllowOverride None + Options None + Require all granted + + + + # + # TypesConfig points to the file containing the list of mappings from + # filename extension to MIME-type. + # + TypesConfig /etc/mime.types + + # + # AddType allows you to add to or override the MIME configuration + # file specified in TypesConfig for specific file types. + # + #AddType application/x-gzip .tgz + # + # AddEncoding allows you to have certain browsers uncompress + # information on the fly. Note: Not all browsers support this. + # + #AddEncoding x-compress .Z + #AddEncoding x-gzip .gz .tgz + # + # If the AddEncoding directives above are commented-out, then you + # probably should define those extensions to indicate media types: + # + AddType application/x-compress .Z + AddType application/x-gzip .gz .tgz + + # + # AddHandler allows you to map certain file extensions to "handlers": + # actions unrelated to filetype. These can be either built into the server + # or added with the Action directive (see below) + # + # To use CGI scripts outside of ScriptAliased directories: + # (You will also need to add "ExecCGI" to the "Options" directive.) + # + #AddHandler cgi-script .cgi + + # For type maps (negotiated resources): + #AddHandler type-map var + + # + # Filters allow you to process content before it is sent to the client. + # + # To parse .shtml files for server-side includes (SSI): + # (You will also need to add "Includes" to the "Options" directive.) + # + AddType text/html .shtml + AddOutputFilter INCLUDES .shtml + + +# +# Specify a default charset for all content served; this enables +# interpretation of all content as UTF-8 by default. To use the +# default browser choice (ISO-8859-1), or to allow the META tags +# in HTML content to override this choice, comment out this +# directive: +# +AddDefaultCharset UTF-8 + + + # + # The mod_mime_magic module allows the server to use various hints from the + # contents of the file itself to determine its type. The MIMEMagicFile + # directive tells the module where the hint definitions are located. + # + MIMEMagicFile conf/magic + + +# +# Customizable error responses come in three flavors: +# 1) plain text 2) local redirects 3) external redirects +# +# Some examples: +#ErrorDocument 500 "The server made a boo boo." +#ErrorDocument 404 /missing.html +#ErrorDocument 404 "/cgi-bin/missing_handler.pl" +#ErrorDocument 402 http://www.example.com/subscription_info.html +# + +# +# EnableMMAP and EnableSendfile: On systems that support it, +# memory-mapping or the sendfile syscall may be used to deliver +# files. This usually improves server performance, but must +# be turned off when serving from networked-mounted +# filesystems or if support for these functions is otherwise +# broken on your system. +# Defaults if commented: EnableMMAP On, EnableSendfile Off +# +#EnableMMAP off +EnableSendfile on + +# Supplemental configuration +# +# Load config files in the "/etc/httpd/conf.d" directory, if any. +IncludeOptional conf.d/*.conf diff --git a/components/congress/test-webapp/www/html/copper.css b/components/congress/test-webapp/www/html/copper.css new file mode 100644 index 0000000..017bd89 --- /dev/null +++ b/components/congress/test-webapp/www/html/copper.css @@ -0,0 +1,15 @@ +body { font-family: sans-serif; } +@media screen and (min-width: 200px) { body { font-size:100%; } } +@media screen and (min-width: 400px) { body { font-size:120%; } } +@media screen and (min-width: 600px) { body { font-size:150%; } } + +p { font-size: 100%; } +span { font-size: inherit; } +table { font-size: inherit; } +td { font-size: inherit; } +input { font-size: inherit; display: table;} +td { font-size: inherit; } +button { font-size: inherit; color: white; background-color:darkslategray; +border-style:none; border-radius:10px; -moz-border-radius:10px; -webkit-border-radius:10px; +margin-top:5px; margin-bottom:5px;} +textarea {width: 50%; resize:both;} diff --git a/components/congress/test-webapp/www/html/copper.js b/components/congress/test-webapp/www/html/copper.js new file mode 100644 index 0000000..1d5d3e1 --- /dev/null +++ b/components/congress/test-webapp/www/html/copper.js @@ -0,0 +1,324 @@ +/* + Copyright 2015 Open Platform for NFV Project, Inc. and its contributors + + Licensed under the Apache License, Version 2.0 (the "License"); + you may not use this file except in compliance with the License. + You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 + + Unless required by applicable law or agreed to in writing, software + distributed under the License is distributed on an "AS IS" BASIS, + WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + See the License for the specific language governing permissions and + limitations under the License. +*/ +var origin = "http://localhost/proxy/?~url="; +var dataSources = []; +var tables = []; +var rows = []; +var policies = []; +var rules = []; + +function get_dataSources() { + dse = document.getElementById('dataSources'); + while (dse.firstChild) dse.removeChild(dse.firstChild); + asyncXHR('GET',origin+'/v1/data-sources',function(xhr) { + obj = JSON.parse(xhr.responseText); + dataSources = obj.results; + var str = ''; + for (i in dataSources) { + datasource = dataSources[i].name; + dhe = element('button',datasource,datasource,1); + de = element('div',datasource+":datasource","",1); + dhe.setAttribute('onclick','toggle("'+de.id+'");'); + dse.appendChild(dhe); + de.style.display = 'none' + for (j in dataSources[i]) { + if (typeof dataSources[i][j] == 'object' && dataSources[i][j] != null) { + oe = element('button',"",j,2); + ae = element('p',datasource+':'+j,null,2); + ae.style.display = 'none' + oe.setAttribute('onclick','toggle("'+ae.id+'");'); + de.appendChild(oe); + for (k in dataSources[i][j]) { + sae = element('p',"",k+':'+dataSources[i][j][k],3); + ae.appendChild(sae); + } + } + else ae = element('p',"",j+':'+dataSources[i][j],2); + de.appendChild(ae); + } + tb = element('button',"",'Tables',2); + tb.setAttribute('onclick','get_tables('+i+');'); + de.appendChild(tb); + tb = element('p',datasource+':tables',"",2); + de.appendChild(tb); + dse.appendChild(de); + } + },null,null,null); +} + +function get_tables(dsIndex) { + dsid = dataSources[dsIndex].id; + datasource = dataSources[dsIndex].name; + tb = document.getElementById(datasource+':tables'); + if (tb.innerHTML != "" && tb.style.display != 'none') tb.style.display = 'none'; + else { + while (tb.firstChild) tb.removeChild(tb.firstChild); + asyncXHR('GET',origin+'/v1/data-sources/'+dsid+'/tables',function(xhr) { + obj = JSON.parse(xhr.responseText); + if (obj.results.length == 0) { + tables[dsIndex] = []; + rows[dsIndex] = []; + tb.innerHTML = "No tables defined."; + } + else { + tables[dsIndex] = obj.results; + rows[dsIndex] = []; + for (i in tables[dsIndex]) { + rows[dsIndex][i] = []; + tid = tables[dsIndex][i].id; + te = element('button',tid,tid,3); + te.setAttribute('onclick','get_rows('+dsIndex+','+i+');'); + tb.appendChild(te); + te = element('div',datasource+":"+tid,"",2); + tb.appendChild(te); + } + } + tb.style.display = 'block'; + },null,null,null); + } +} + +function get_rows(dsIndex,tableIndex) { + datasource = dataSources[dsIndex].name; + dsid = dataSources[dsIndex].id; + tid = tables[dsIndex][tableIndex].id; + tb = document.getElementById(datasource+":"+tid); + if (tb.innerHTML != "" && tb.style.display != 'none') tb.style.display = 'none'; + else { + while (tb.firstChild) tb.removeChild(tb.firstChild); + asyncXHR('GET',origin+'/v1/data-sources/'+dsid+'/tables/'+tid+'/rows',function(xhr) { + obj = JSON.parse(xhr.responseText); + if (obj.results.length == 0) { + rows[dsIndex][tableIndex] = []; + tb.innerHTML = "No rows defined."; + } + else { + rows[dsIndex][tableIndex] = obj.results; + for (i in rows[dsIndex][tableIndex]) { + data = rows[dsIndex][tableIndex][i].data; + te = element('p',"",JSON.stringify(data),3); + tb.appendChild(te); + } + } + tb.style.display = 'block'; + },null,null,null); + } +} + +function get_policies() { + poe = document.getElementById('policies'); + while (poe.firstChild) poe.removeChild(poe.firstChild); + asyncXHR('GET',origin+'/v1/policies',function(xhr) { + obj = JSON.parse(xhr.responseText); + policies = obj.results; + for (i in policies) { + name = policies[i].name; + he = element('button',"",name,1); + pe = element('div',name+":policies","",1); + he.setAttribute('onclick','toggle("'+pe.id+'");'); + poe.appendChild(he); + pe.style.display = 'none' + for (j in policies[i]) { + ae = element('p',"",j+':'+policies[i][j],2); + pe.appendChild(ae); + } + rb = element('button',"",'Rules',2); + rb.setAttribute('onclick','get_rules('+i+');'); + pe.appendChild(rb); + pr = element('p',name+':rules',"",2); + pe.appendChild(pr); + poe.appendChild(pe); +// {"kind":"nonrecursive","description":"default action policy","name":"action","abbreviation":"actio", +// "id":"29196084-604d-4964-93e6-c23eb2c52990","owner_id":"user"} + } + },null,null,null); +// document.getElementById('response').innerHTML = dumpProps(policies,'policies',false); +} + +/* Example of a 1-rule array response +{ + "results": [ + { + "comment": "", + "id": "056a00a3-d5a7-46c5-8a40-d02e3f72ef03", + "rule": "samegroup(user1, user2) :- ldap:group(user1, g), ldap:group(user2, g)", + "name": null + } + ] +} + */ +function get_rules(policyIndex) { + policy = policies[policyIndex].name; + pid = policies[policyIndex].id; + pr = document.getElementById(policy+':rules'); + while (pr.firstChild) pr.removeChild(pr.firstChild); + asyncXHR('GET',origin+'/v1/policies/'+policy+'/rules',function(xhr) { + obj = JSON.parse(xhr.responseText); + rules[policyIndex] = obj.results; + if (obj.results.length == 0) { + rules[policyIndex] = []; + pr.innerHTML = "No rules defined."; + } + else { + var str = ''; +// alert(JSON.stringify(rules[policyIndex])); + for (i in rules[policyIndex]) { + name = rules[policyIndex][i].name; + he = element('button',name,name,3); + re = element('div',name+"json","",4); + he.setAttribute('onclick','toggle("'+re.id+'");'); + pr.appendChild(he); + de = element('button',"","delete",null); + de.setAttribute('onclick','delete_rule('+policyIndex+','+i+');'); + pr.appendChild(de); + re.style.display = 'none'; + for (j in rules[policyIndex][i]) { + ae = element('p',"",j+':'+rules[policyIndex][i][j],4); + re.appendChild(ae); + } + pr.appendChild(re); + } + } + cre = element('button',"cre","Create rule",3); + cre.setAttribute('onclick','create_rule_input('+policyIndex+');'); + pr.appendChild(cre); + },null,null,null); +} + +function create_rule_input(policyIndex) { + pr = document.getElementById(policy+':rules'); + cre = document.getElementById('cre'); + /* + * Example: + error :- nova:vm(vm), neutron:network(network), nova:network(vm, network), -neutron:public(network), neutron:private(network), nova:owner(vm, vm-own), neutron:owner(network, net-own), -same-group(vm-own, net-own) + samegroup(user1, user2) :- ldap:group(user1, g), ldap:group(user2, g) + */ + nrn = element('input',"nrn","Name",3); + nrc = element('input',"nrc","Comment",3); + rte = element('textarea',"nrule",null,3); + pr.appendChild(nrn); + pr.appendChild(nrc); + pr.appendChild(rte); + cre.setAttribute('onclick','create_rule('+policyIndex+');'); +} + +function create_rule(policyIndex,name,comment,rule) { + // use policy name rather than id as the id! + policy = policies[policyIndex].name; + name = document.getElementById("nrn").value; + comment = document.getElementById("nrc").value; + rule = document.getElementById("nrule").value; + rid = guidGenerator(); + body = '{"id":"'+rid+'","name":"'+name+'","comment":"'+comment+'","rule":"'+rule+'"}'; + asyncXHR('POST',origin+'/v1/policies/'+policy+'/rules',function(xhr) { + obj = JSON.parse(xhr.responseText); + if (obj.error !== undefined) alert(xhr.responseText); + // BUG: Congress creates rules asyncchronously, thus a query for rules immediately after rule creation may not return the newly created rule + else setTimeout('get_rules('+policyIndex+');',1000); + },null,"application/json",body); +} + +/* + * Deleting a rule takes the ID as resource path element, and returns a JSON copy of the rule deleted + */ +function delete_rule(policyIndex,ruleIndex) { + policy = policies[policyIndex].name; + name = rules[policyIndex][ruleIndex].name; + id = rules[policyIndex][ruleIndex].id; + // use policy name rather than id as the id! + asyncXHR('DELETE',origin+'/v1/policies/'+policy+'/rules/'+id,function(xhr) { + // BUG: Congress creates rules asyncchronously, thus a query for rules immediately after rule creation may not return the newly created rule + setTimeout('get_rules('+policyIndex+');',1000); + },null,null,null); +} + +/* + * Debug feature: delete an arbitrary resource + */ +function delete_resource() { + resource = document.getElementById('resource').value; + asyncXHR('DELETE',origin+resource,function(xhr) { + obj = JSON.parse(xhr.responseText); + if (obj.error !== undefined) alert(xhr.responseText); + },null,null,null); +} + +function element(type,id,value,indent) { + e = document.createElement(type); + e.id = id; + if (indent !== null) e.style.marginLeft = indent*15+'px'; + if (type == "input") e.placeholder = value; + else if (value != null) e.innerHTML = value; + return(e); +} + + +function br() { + return (document.createElement('br')); +} + +function toggle(obj) { + var el = document.getElementById(obj); + if ( el.style.display != 'none' ) { + el.style.display = 'none'; + } + else { + el.style.display = ''; + } +} + +function dumpProps(obj, parent, str) { + if (str == false) str = ''; + try { + for (var i in obj) { + if (typeof obj[i] != 'object' && typeof obj[i] != 'function' ) { + if (parent) { str += parent + '.' + i + ' = ' + obj[i] + '
'; } + else { str += i + ' = ' + obj[i] + '
'; } + } + else { + if (parent) { str = dumpProps(obj[i], parent + '[' + i + ']', str); } + else { str = dumpProps(obj[i], i, str); } + } + } + return(str); + } catch (e) { alert(e); } +} + +function asyncXHR(method,url,callback,accept,contentType,body) { + var xhr = false; + try { xhr = new XMLHttpRequest(); } + catch(e1) {} + if(xhr) { + try { + xhr.onreadystatechange = function() { + if (xhr.readyState === 4) callback(xhr); + }; + xhr.open(method, url, true); + if (accept !== null) xhr.setRequestHeader("Accept",accept); + if (contentType !== null) xhr.setRequestHeader("Content-Type",contentType); + if (body !== null) xhr.send(body); + else xhr.send(); + } + catch(e4) { alert("asyncXHR: xhr send error "+e4.message+" for URL "+url); } + } +} + +function guidGenerator() { + var S4 = function() { + return (((1+Math.random())*0x10000)|0).toString(16).substring(1); + }; + return (S4()+S4()+"-"+S4()+"-"+S4()+"-"+S4()+"-"+S4()+S4()+S4()); +} diff --git a/components/congress/test-webapp/www/html/index.html b/components/congress/test-webapp/www/html/index.html new file mode 100644 index 0000000..a36bcd5 --- /dev/null +++ b/components/congress/test-webapp/www/html/index.html @@ -0,0 +1,33 @@ + + + +OPNFV Congress Test + + + + + + + +
+ +
+ +
+
+ + diff --git a/components/congress/test-webapp/www/html/proxy/index.php b/components/congress/test-webapp/www/html/proxy/index.php new file mode 100644 index 0000000..93be444 --- /dev/null +++ b/components/congress/test-webapp/www/html/proxy/index.php @@ -0,0 +1,59 @@ +); +# you will save yourself a lot of trouble. +# +# Do NOT add a slash at the end of the directory path. +# +ServerRoot "/etc/apache2" + +# +# The accept serialization lock file MUST BE STORED ON A LOCAL DISK. +# +Mutex file:${APACHE_LOCK_DIR} default + +# +# PidFile: The file in which the server should record its process +# identification number when it starts. +# This needs to be set in /etc/apache2/envvars +# +PidFile ${APACHE_PID_FILE} + +# +# Timeout: The number of seconds before receives and sends time out. +# +Timeout 300 + +# +# KeepAlive: Whether or not to allow persistent connections (more than +# one request per connection). Set to "Off" to deactivate. +# +KeepAlive On + +# +# MaxKeepAliveRequests: The maximum number of requests to allow +# during a persistent connection. Set to 0 to allow an unlimited amount. +# We recommend you leave this number high, for maximum performance. +# +MaxKeepAliveRequests 100 + +# +# KeepAliveTimeout: Number of seconds to wait for the next request from the +# same client on the same connection. +# +KeepAliveTimeout 5 + + +# These need to be set in /etc/apache2/envvars +User ${APACHE_RUN_USER} +Group ${APACHE_RUN_GROUP} + +# +# HostnameLookups: Log the names of clients or just their IP addresses +# e.g., www.apache.org (on) or 204.62.129.132 (off). +# The default is off because it'd be overall better for the net if people +# had to knowingly turn this feature on, since enabling it means that +# each client request will result in AT LEAST one lookup request to the +# nameserver. +# +HostnameLookups Off + +# ErrorLog: The location of the error log file. +# If you do not specify an ErrorLog directive within a +# container, error messages relating to that virtual host will be +# logged here. If you *do* define an error logfile for a +# container, that host's errors will be logged there and not here. +# +ErrorLog ${APACHE_LOG_DIR}/error.log + +# +# LogLevel: Control the severity of messages logged to the error_log. +# Available values: trace8, ..., trace1, debug, info, notice, warn, +# error, crit, alert, emerg. +# It is also possible to configure the log level for particular modules, e.g. +# "LogLevel info ssl:warn" +# +LogLevel warn + +# Include module configuration: +IncludeOptional mods-enabled/*.load +IncludeOptional mods-enabled/*.conf + +# Include list of ports to listen on +Include ports.conf + + +# Sets the default security model of the Apache2 HTTPD server. It does +# not allow access to the root filesystem outside of /usr/share and /var/www. +# The former is used by web applications packaged in Debian, +# the latter may be used for local directories served by the web server. If +# your system is serving content from a sub-directory in /srv you must allow +# access here, or in any related virtual host. + + Options FollowSymLinks + AllowOverride None + Require all denied + + + + AllowOverride None + Require all granted + + + + Options Indexes FollowSymLinks + AllowOverride None + Require all granted + + +# +# Options Indexes FollowSymLinks +# AllowOverride None +# Require all granted +# + + + + +# AccessFileName: The name of the file to look for in each directory +# for additional configuration directives. See also the AllowOverride +# directive. +# +AccessFileName .htaccess + +# +# The following lines prevent .htaccess and .htpasswd files from being +# viewed by Web clients. +# + + Require all denied + + + +# +# The following directives define some format nicknames for use with +# a CustomLog directive. +# +# These deviate from the Common Log Format definitions in that they use %O +# (the actual bytes sent including headers) instead of %b (the size of the +# requested file), because the latter makes it impossible to detect partial +# requests. +# +# Note that the use of %{X-Forwarded-For}i instead of %h is not recommended. +# Use mod_remoteip instead. +# +LogFormat "%v:%p %h %l %u %t \"%r\" %>s %O \"%{Referer}i\" \"%{User-Agent}i\"" vhost_combined +LogFormat "%h %l %u %t \"%r\" %>s %O \"%{Referer}i\" \"%{User-Agent}i\"" combined +LogFormat "%h %l %u %t \"%r\" %>s %O" common +LogFormat "%{Referer}i -> %U" referer +LogFormat "%{User-agent}i" agent + +# Include of directories ignores editors' and dpkg's backup files, +# see README.Debian for details. + +# Include generic snippets of statements +IncludeOptional conf-enabled/*.conf + +# Include the virtual host configurations: +IncludeOptional sites-enabled/*.conf + +# vim: syntax=apache ts=4 sw=4 sts=4 sr noet -- cgit 1.2.3-korg