diff --git a/alpine.sh b/alpine.sh index 826b01f..3035415 100755 --- a/alpine.sh +++ b/alpine.sh @@ -85,11 +85,11 @@ chroot /mnt setup-timezone -z Europe/Prague # Install basic system apk --no-cache add apache2-utils gettext wget https://dl.dasm.cz/basic.tar -O - | tar xf - -C /mnt -chroot /mnt apk --no-cache add ca-certificates curl bridge e2fsprogs-extra gettext iptables kbd-misc libcap libressl libseccomp postfix python3 py3-bcrypt py3-cffi py3-cryptography py3-dnspython py3-jinja2 py3-requests py3-six py3-werkzeug nginx util-linux acme-sh@vm lxc@vm +chroot /mnt apk --no-cache add ca-certificates curl bridge e2fsprogs-extra gettext iptables kbd-misc libressl postfix nginx util-linux acme-sh@vm lxc@vm vmmgr@vm for SERVICE in cgroups consolefont crond iptables networking nginx ntpd postfix swap urandom vmmgr; do ln -s /etc/init.d/${SERVICE} /mnt/etc/runlevels/boot done -ADMINPWD=$(htpasswd -bnBC 10 "" "${ENCPWD}" | tr -d ':\n' | sed 's/$2y/$2b/') envsubst /mnt/srv/vm/config.json +ADMINPWD=$(htpasswd -bnBC 10 "" "${ENCPWD}" | tr -d ':\n' | sed 's/$2y/$2b/') envsubst /etc/vmmgr/config.json # Change root password echo "root:$(head -c 18 /dev/urandom | base64)" | chroot /mnt chpasswd diff --git a/app-lxc/APKBUILD b/app-lxc/APKBUILD index 5c6a32b..d2bf84f 100644 --- a/app-lxc/APKBUILD +++ b/app-lxc/APKBUILD @@ -7,7 +7,6 @@ pkgdesc="Userspace interface for the Linux kernel containment features" url="https://linuxcontainers.org/lxc/" arch="x86_64" license="GPL" -depends="gzip" options="suid !check" makedepends="automake autoconf bsd-compat-headers libcap-dev libseccomp-dev libtool linux-headers" _commit=b8ab4849432cd64d789a757e385d1d324d88a61d diff --git a/basic/etc/init.d/vmmgr b/basic/etc/init.d/vmmgr index 366d19f..f87ba86 100755 --- a/basic/etc/init.d/vmmgr +++ b/basic/etc/init.d/vmmgr @@ -1,6 +1,6 @@ #!/sbin/openrc-run -command=/srv/vm/wsgi.py +command=/usr/share/vmmgr/wsgi.py description="VM manager" pidfile=/var/run/vmmgr.pid start_stop_daemon_args="--background --make-pidfile --stderr /dev/null --stdout /dev/null" diff --git a/basic/etc/nginx/conf.d/default.conf b/basic/etc/nginx/conf.d/default.conf index 3499490..b4a6271 100644 --- a/basic/etc/nginx/conf.d/default.conf +++ b/basic/etc/nginx/conf.d/default.conf @@ -23,12 +23,12 @@ server { } location /static { - root /srv/vm; + root /usr/share/vmmgr; } error_page 502 /502.html; location = /502.html { - root /srv/vm/templates; + root /usr/share/vmmgr/templates; } location = /vm-ping { diff --git a/basic/srv/vm/config.default.json b/basic/srv/vm/config.default.json deleted file mode 100644 index 2c11b70..0000000 --- a/basic/srv/vm/config.default.json +++ /dev/null @@ -1,19 +0,0 @@ -{ - "apps": {}, - "common": { - "email": "admin@example.com", - "gmaps-api-key": "" - }, - "host": { - "adminpwd": "${ADMINPWD}", - "domain": "spotter.vm", - "firstrun": true, - "port": "443" - }, - "packages": {}, - "repo": { - "pwd": "", - "url": "https://dl.dasm.cz/spotter-repo", - "user": "" - } -} diff --git a/basic/srv/vm/mgr/__init__.py b/basic/srv/vm/mgr/__init__.py deleted file mode 100644 index 36326f5..0000000 --- a/basic/srv/vm/mgr/__init__.py +++ /dev/null @@ -1,364 +0,0 @@ -# -*- coding: utf-8 -*- - -import os -import shutil -import subprocess - -from . import tools -from . import validator -from .config import Config - -VERSION = '0.0.1' - -ISSUE_FILE = '/etc/issue' -NGINX_DIR = '/etc/nginx/conf.d' -ACME_CRON = '/etc/periodic/daily/acme-sh' -CERT_PUB_FILE = '/etc/ssl/services.pem' -CERT_KEY_FILE = '/etc/ssl/services.key' -CERT_SAN_FILE = '/etc/ssl/san.cnf' - -NGINX_TEMPLATE = '''server {{ - listen [::]:{port} ssl http2; - server_name {host}.{domain}; - - access_log /var/log/nginx/{app}.access.log; - error_log /var/log/nginx/{app}.error.log; - - location / {{ - proxy_pass http://{app}:8080; - }} - - error_page 502 /502.html; - location = /502.html {{ - root /srv/vm/templates; - }} - - location = /vm-ping {{ - add_header Content-Type text/plain; - return 200 "vm-pong"; - }} -}} -''' - -NGINX_DEFAULT_TEMPLATE = '''server {{ - listen [::]:80 default_server ipv6only=off; - - location / {{ - return 301 https://$host:{port}$request_uri; - }} - - location /.well-known/acme-challenge/ {{ - root /etc/acme.sh.d; - }} - - location = /vm-ping {{ - add_header Content-Type text/plain; - return 200 "vm-pong"; - }} -}} - -server {{ - listen [::]:{port} ssl http2 default_server ipv6only=off; - - location / {{ - proxy_pass http://127.0.0.1:8080; - }} - - location /static {{ - root /srv/vm; - }} - - error_page 502 /502.html; - location = /502.html {{ - root /srv/vm/templates; - }} - - location = /vm-ping {{ - add_header Content-Type text/plain; - return 200 "vm-pong"; - }} -}} -''' - -ISSUE_TEMPLATE = ''' -\x1b[1;32m _____ _ _ __ ____ __ - / ____| | | | | \\\\ \\\\ / / \\\\/ | - | (___ _ __ ___ | |_| |_ ___ _ _\\\\ \\\\ / /| \\\\ / | - \\\\___ \\\\| '_ \\\\ / _ \\\\| __| __/ _ \\\\ '__\\\\ \\\\/ / | |\\\\/| | - ____) | |_) | (_) | |_| || __/ | \\\\ / | | | | - |_____/| .__/ \\\\___/ \\\\__|\\\\__\\\\___|_| \\\\/ |_| |_| - | | - |_|\x1b[0m - - \x1b[1;33mUPOZORNĚNÍ:\x1b[0m Neoprávněný přístup k tomuto zařízení je zakázán. - Musíte mít výslovné oprávnění k přístupu nebo konfiguraci tohoto zařízení. - Neoprávněné pokusy a kroky k přístupu nebo používání tohoto systému mohou mít - za následek občanské nebo trestní sankce. - - \x1b[1;33mCAUTION:\x1b[0m Unauthozired access to this device is prohibited. - You must have explicit, authorized permission to access or configure this - device. Unauthorized attempts and actions to access or use this system may - result in civil or criminal penalties. - - - Pro přístup k aplikacím otevřete URL \x1b[1m{url}\x1b[0m ve Vašem - internetovém prohlížeči. - -\x1b[0;30m -''' - -ACME_CRON_TEMPLATE = '''#!/bin/sh - -[ -x /usr/bin/acme.sh ] && /usr/bin/acme.sh --cron >/dev/null -''' - -CERT_SAN = '''[ req ] -distinguished_name = dn -x509_extensions = ext -[ dn ] -[ ext ] -subjectAltName=DNS:{domain},DNS:*.{domain}" -''' - -class VMMgr: - def __init__(self): - # Load JSON configuration - self.conf = Config() - self.domain = self.conf['host']['domain'] - self.port = self.conf['host']['port'] - - def update_login(self, app, login, password): - # Update login and password for an app in the configuration - if app not in self.conf['apps']: - raise validator.InvalidValueException('app', app) - if login is not None: - self.conf['apps'][app]['login'] = login - if password is not None: - self.conf['apps'][app]['password'] = password - self.conf.save() - - def show_tiles(self, app): - # Update visibility for the app in the configuration - if app not in self.conf['apps']: - raise validator.InvalidValueException('app', app) - self.conf['apps'][app]['visible'] = True - self.conf.save() - - def hide_tiles(self, app): - # Update visibility for the app in the configuration - if app not in self.conf['apps']: - raise validator.InvalidValueException('app', app) - self.conf['apps'][app]['visible'] = False - self.conf.save() - - def start_app(self, app): - # Start the actual app service - if app not in self.conf['apps']: - raise validator.InvalidValueException('app', app) - tools.start_service(app) - - def stop_app(self, app): - # Stop the actual app service - if app not in self.conf['apps']: - raise validator.InvalidValueException('app', app) - tools.stop_service(app) - # Stop the app service's dependencies if they are not used by another running app - deps = self.build_deps_tree() - for dep in self.get_app_deps(app): - if not any([tools.is_service_started(d) for d in deps[dep]]): - tools.stop_service(dep) - - def build_deps_tree(self): - # Fisrt, build a dictionary of {app: [needs]} - needs = {} - for app in self.conf['apps']: - needs[app] = self.get_app_deps(app) - # Then reverse it to {need: [apps]} - deps = {} - for app, need in needs.items(): - for n in need: - deps.setdefault(n, []).append(app) - return deps - - def get_app_deps(self, app): - # Get "needs" line from init script and split it to list - try: - with open(os.path.join('/etc/init.d', app), 'r') as f: - for line in f.readlines(): - if line.strip().startswith('need'): - return line.split()[1:] - except: - pass - return [] - - def enable_autostart(self, app): - # Add the app to OpenRC default runlevel - if app not in self.conf['apps']: - raise validator.InvalidValueException('app', app) - subprocess.run(['/sbin/rc-update', 'add', app]) - - def disable_autostart(self, app): - # Remove the app from OpenRC default runlevel - if app not in self.conf['apps']: - raise validator.InvalidValueException('app', app) - subprocess.run(['/sbin/rc-update', 'del', app]) - - def prepare_container(self): - # Extract the variables from values given via lxc.hook.pre-start hook - app = os.environ['LXC_NAME'] - # Remove ephemeral layer data - tools.clean_ephemeral_layer(app) - # Configure host and common params used in the app - self.configure_app(app) - - def register_container(self): - # Extract the variables from values given via lxc.hook.start-host hook - app = os.environ['LXC_NAME'] - pid = os.environ['LXC_PID'] - # Lease the first unused IP to the container - ip = tools.get_unused_ip() - tools.update_hosts_lease(ip, app) - tools.set_container_ip(pid, ip) - - def unregister_container(self): - # Extract the variables from values given via lxc.hook.post-stop hook - app = os.environ['LXC_NAME'] - # Release the container IP - tools.update_hosts_lease(None, app) - # Remove ephemeral layer data - tools.clean_ephemeral_layer(app) - - def configure_app(self, app): - script = os.path.join('/srv', app, 'update-conf.sh') - if os.path.exists(script): - setup_env = os.environ.copy() - setup_env['DOMAIN'] = self.domain - setup_env['PORT'] = self.port - setup_env['EMAIL'] = self.conf['common']['email'] - setup_env['GMAPS_API_KEY'] = self.conf['common']['gmaps-api-key'] - subprocess.run([script], env=setup_env, check=True) - - def register_proxy(self, app): - # Setup proxy configuration and reload nginx - if app not in self.conf['apps']: - raise validator.InvalidValueException('app', app) - with open(os.path.join(NGINX_DIR, '{}.conf'.format(app)), 'w') as f: - f.write(NGINX_TEMPLATE.format(app=app, host=self.conf['apps'][app]['host'], domain=self.domain, port=self.port)) - tools.reload_nginx() - - def unregister_proxy(self, app): - # Remove proxy configuration and reload nginx - if app not in self.conf['apps']: - raise validator.InvalidValueException('app', app) - os.unlink(os.path.join(NGINX_DIR, '{}.conf'.format(app))) - tools.reload_nginx() - - def update_host(self, domain, port): - # Update domain and port and rebuild all configuration. Web interface calls tools.restart_nginx() in WSGI close handler - if not validator.is_valid_domain(domain): - raise validator.InvalidValueException('domain', domain) - if not validator.is_valid_port(port): - raise validator.InvalidValueException('port', port) - self.domain = self.conf['host']['domain'] = domain - self.port = self.conf['host']['port'] = port - self.conf.save() - # Restart all apps to trigger configuration refresh - for app in self.conf['apps']: - if tools.is_service_started(app): - tools.restart_service(app) - # Rebuild and restart nginx if it was requested. - self.rebuild_nginx() - - def rebuild_nginx(self): - # Rebuild nginx config for the portal app. Web interface calls tools.restart_nginx() in WSGI close handler - with open(os.path.join(NGINX_DIR, 'default.conf'), 'w') as f: - f.write(NGINX_DEFAULT_TEMPLATE.format(port=self.port)) - - def rebuild_issue(self): - # Compile the HTTPS host displayed in terminal banner - domain = self.domain - # If the dummy host is used, take an IP address of a primary interface instead - if domain == 'spotter.vm': - domain = tools.get_local_ipv4() - if not domain: - domain = tools.get_local_ipv6() - if not domain: - domain = '127.0.0.1' - # Rebuild the terminal banner - with open(ISSUE_FILE, 'w') as f: - f.write(ISSUE_TEMPLATE.format(url=tools.compile_url(domain, self.port))) - - def update_common(self, email, gmaps_api_key): - # Update common configuration values - if email != None: - # Update email - if not validator.is_valid_email(email): - raise validator.InvalidValueException('email', email) - self.conf['common']['email'] = email - if gmaps_api_key != None: - # Update Google Maps API key - self.conf['common']['gmaps-api-key'] = gmaps_api_key - # Save config to file - self.conf.save() - for app in self.conf['apps']: - # Restart currently running apps in order to update their config - if tools.is_service_started(app): - tools.restart_service(app) - - def update_password(self, oldpassword, newpassword): - # Update LUKS password and adminpwd for WSGI application - input = '{}\n{}'.format(oldpassword, newpassword).encode() - subprocess.run(['cryptsetup', 'luksChangeKey', '/dev/sda2'], input=input, check=True) - # Update bcrypt-hashed password in config - self.conf['host']['adminpwd'] = tools.adminpwd_hash(newpassword) - # Save config to file - self.conf.save() - - def create_selfsigned_cert(self): - # Remove acme.sh cronjob - if os.path.exists(ACME_CRON): - os.unlink(ACME_CRON) - # Create selfsigned certificate with wildcard alternative subject name - with open(os.path.join(CERT_SAN_FILE), 'w') as f: - f.write(CERT_SAN.format(domain=self.domain)) - subprocess.run(['openssl', 'req', '-config', CERT_SAN_FILE, '-x509', '-new', '-out', CERT_PUB_FILE, '-keyout', CERT_KEY_FILE, '-nodes', '-days', '7305', '-subj', '/CN={}'.format(self.domain)], check=True) - os.chmod(CERT_KEY_FILE, 0o640) - - def request_acme_cert(self): - # Remove all possible conflicting certificates requested in the past - certs = [i for i in os.listdir('/etc/acme.sh.d') if i not in ('account.conf', 'ca', 'http.header')] - for cert in certs: - if cert != self.domain: - subprocess.run(['/usr/bin/acme.sh', '--remove', '-d', cert]) - # Compile an acme.sh command for certificate requisition only if the certificate hasn't been requested before - if not os.path.exists(os.path.join('/etc/acme.sh.d', self.domain)): - cmd = ['/usr/bin/acme.sh', '--issue', '-d', self.domain] - for app in self.conf['apps']: - cmd += ['-d', '{}.{}'.format(self.conf['apps'][app]['host'], self.domain)] - cmd += ['-w', '/etc/acme.sh.d'] - # Request the certificate - subprocess.run(cmd, check=True) - # Otherwise just try to renew - else: - # Acme.sh returns code 2 on skipped renew - try: - subprocess.run(['/usr/bin/acme.sh', '--renew', '-d', self.domain], check=True) - except subprocess.CalledProcessError as e: - if e.returncode != 2: - raise - # Install the issued certificate - subprocess.run(['/usr/bin/acme.sh', '--install-cert', '-d', self.domain, '--key-file', CERT_KEY_FILE, '--fullchain-file', CERT_PUB_FILE, '--reloadcmd', '/sbin/service nginx reload'], check=True) - # Install acme.sh cronjob - with open(ACME_CRON, 'w') as f: - f.write(ACME_CRON_TEMPLATE) - - def install_manual_cert(self, public_file, private_file): - # Remove acme.sh cronjob - if os.path.exists(ACME_CRON): - os.unlink(ACME_CRON) - # Copy certificate files - shutil.copyfile(public_file, CERT_PUB_FILE) - shutil.copyfile(private_file, CERT_KEY_FILE) - os.chmod(CERT_KEY_FILE, 0o640) - # Reload nginx - tools.reload_nginx() diff --git a/basic/srv/vm/mgr/appmgr.py b/basic/srv/vm/mgr/appmgr.py deleted file mode 100644 index 5338097..0000000 --- a/basic/srv/vm/mgr/appmgr.py +++ /dev/null @@ -1,231 +0,0 @@ -# -*- coding: utf-8 -*- - -import hashlib -import json -import os -import requests -import shutil -import subprocess -import time -import uuid - -from cryptography.exceptions import InvalidSignature -from cryptography.hazmat.backends import default_backend -from cryptography.hazmat.primitives import hashes -from cryptography.hazmat.primitives.asymmetric import ec -from cryptography.hazmat.primitives.serialization import load_pem_public_key -from threading import Lock - -from . import tools - -PUB_FILE = '/srv/vm/packages.pub' -LXC_ROOT = '/var/lib/lxc' - -class ActionItem: - def __init__(self, action, app): - self.timestamp = int(time.time()) - self.action = action - self.app = app - self.started = False - self.finished = False - self.data = None - -class InstallItem: - def __init__(self, total): - # Stage 0 = download, 1 = deps install, 2 = app install - self.stage = 0 - self.total = total - self.downloaded = 0 - - def __str__(self): - # Limit the disaplyed percentage between 1 - 99 for aestethical and psychological reasons - return str(max(1, min(99, round(self.downloaded / self.total * 100)))) - -class AppMgr: - def __init__(self, vmmgr): - self.vmmgr = vmmgr - self.conf = vmmgr.conf - self.online_packages = {} - self.action_queue = {} - self.lock = Lock() - - def get_repo_resource(self, url, stream=False): - return requests.get('{}/{}'.format(self.conf['repo']['url'], url), auth=(self.conf['repo']['user'], self.conf['repo']['pwd']), stream=stream) - - def fetch_online_packages(self): - # Fetches and verifies online packages. Can raise InvalidSignature - online_packages = {} - packages = self.get_repo_resource('packages').content - packages_sig = self.get_repo_resource('packages.sig').content - with open(PUB_FILE, 'rb') as f: - pub_key = load_pem_public_key(f.read(), default_backend()) - pub_key.verify(packages_sig, packages, ec.ECDSA(hashes.SHA512())) - online_packages = json.loads(packages) - # Minimze the time when self.online_packages is out of sync - self.online_packages = online_packages - - def enqueue_action(self, action, app): - # Remove actions older than 1 day - for id,item in self.action_queue.items(): - if item.timestamp < time.time() - 86400: - del self.item[id] - # Enqueue action - id = '{}:{}'.format(app, uuid.uuid4()) - item = ActionItem(action, app) - self.action_queue[id] = item - return id,item - - def get_actions(self, ids): - # Return list of requested actions - result = {} - for id in ids: - result[id] = self.action_queue[id] if id in self.action_queue else None - return result - - def process_action(self, id): - # Main method for deferred queue processing called by WSGI close handler - item = self.action_queue[id] - with self.lock: - item.started = True - try: - # Call the action method inside exclusive lock - getattr(self, item.action)(item) - except BaseException as e: - item.data = e - finally: - item.finished = True - - def start_app(self, item): - if not tools.is_service_started(item.app): - self.vmmgr.start_app(item.app) - - def stop_app(self, item): - if tools.is_service_started(item.app): - self.vmmgr.stop_app(item.app) - - def install_app(self, item): - # Main installation function. Wrapper for download, registration and install script - deps = [d for d in self.get_install_deps(item.app) if d not in self.conf['packages']] - item.data = InstallItem(sum(self.online_packages[d]['size'] for d in deps)) - for dep in deps: - self.download_package(dep, item.data) - for dep in deps: - item.data.stage = 2 if dep == deps[-1] else 1 - # Purge old data before unpacking to clean previous failed installation - self.purge_package(dep) - self.unpack_package(dep) - # Run uninstall script before installation to clean previous failed installation - self.run_uninstall_script(dep) - self.register_package(dep) - self.run_install_script(dep) - - def uninstall_app(self, item): - # Main uninstallation function. Wrapper for uninstall script, filesystem purge and unregistration - self.stop_app(item) - if tools.is_service_autostarted(item.app): - self.vmmgr.disable_autostart(item.app) - deps = self.get_install_deps(item.app, False)[::-1] - for dep in deps: - if dep not in self.get_uninstall_deps(): - self.run_uninstall_script(dep) - self.purge_package(dep) - self.unregister_package(dep) - - def download_package(self, name, installitem): - tmp_archive = '/tmp/{}.tar.xz'.format(name) - r = self.get_repo_resource('{}.tar.xz'.format(name), True) - with open(tmp_archive, 'wb') as f: - for chunk in r.iter_content(chunk_size=65536): - if chunk: - installitem.downloaded += f.write(chunk) - - def unpack_package(self, name): - tmp_archive = '/tmp/{}.tar.xz'.format(name) - # Verify hash - if self.online_packages[name]['sha512'] != hash_file(tmp_archive): - raise InvalidSignature(name) - # Unpack - subprocess.run(['tar', 'xJf', tmp_archive], cwd='/', check=True) - os.unlink(tmp_archive) - - def purge_package(self, name): - # Removes package and shared data from filesystem - lxcpath = self.conf['packages'][name]['lxcpath'] if name in self.conf['packages'] else self.online_packages[name]['lxcpath'] - lxc_dir = os.path.join(LXC_ROOT, lxcpath) - if os.path.exists(lxc_dir): - shutil.rmtree(lxc_dir) - srv_dir = os.path.join('/srv/', name) - if os.path.exists(srv_dir): - shutil.rmtree(srv_dir) - lxc_log = '/var/log/lxc/{}.log'.format(name) - if os.path.exists(lxc_log): - os.unlink(lxc_log) - - def register_package(self, name): - # Registers a package in local configuration - metadata = self.online_packages[name] - self.conf['packages'][name] = { - 'deps': metadata['deps'], - 'lxcpath': metadata['lxcpath'], - 'version': metadata['version'] - } - # If host definition is present, register the package as application - if 'host' in metadata: - self.conf['apps'][name] = { - 'title': metadata['title'], - 'host': metadata['host'], - 'login': 'N/A', - 'password': 'N/A', - 'visible': False - } - self.conf.save() - - def unregister_package(self, name): - # Removes a package from local configuration - del self.conf['packages'][name] - if name in self.conf['apps']: - del self.conf['apps'][name] - self.conf.save() - - def run_install_script(self, name): - # Runs install.sh for a package, if the script is present - install_dir = os.path.join('/srv/', name, 'install') - install_script = os.path.join('/srv/', name, 'install.sh') - if os.path.exists(install_script): - subprocess.run(install_script, check=True) - os.unlink(install_script) - if os.path.exists(install_dir): - shutil.rmtree(install_dir) - - def run_uninstall_script(self, name): - # Runs uninstall.sh for a package, if the script is present - uninstall_script = os.path.join('/srv/', name, 'uninstall.sh') - if os.path.exists(uninstall_script): - subprocess.run(uninstall_script, check=True) - - def get_install_deps(self, name, online=True): - # Flatten dependency tree for a package while preserving the dependency order - packages = self.online_packages if online else self.conf['packages'] - deps = packages[name]['deps'].copy() - for dep in deps[::-1]: - deps[:0] = [d for d in self.get_install_deps(dep, online)] - deps = list(dict.fromkeys(deps + [name])) - return deps - - def get_uninstall_deps(self): - # Create reverse dependency tree for all installed packages - deps = {} - for pkg in self.conf['packages']: - for d in self.conf['packages'][pkg]['deps']: - deps.setdefault(d, []).append(pkg) - return deps - -def hash_file(file_path): - sha512 = hashlib.sha512() - with open(file_path, 'rb') as f: - while True: - data = f.read(65536) - if not data: - break - sha512.update(data) - return sha512.hexdigest() diff --git a/basic/srv/vm/mgr/config.py b/basic/srv/vm/mgr/config.py deleted file mode 100644 index 1bf0752..0000000 --- a/basic/srv/vm/mgr/config.py +++ /dev/null @@ -1,24 +0,0 @@ -# -*- coding: utf-8 -*- - -import json -from threading import Lock - -CONF_FILE = '/srv/vm/config.json' - -class Config: - def __init__(self): - self.lock = Lock() - self.load() - - def load(self): - with self.lock: - with open(CONF_FILE, 'r') as f: - self.data = json.load(f) - - def save(self): - with self.lock: - with open(CONF_FILE, 'w') as f: - json.dump(self.data, f, sort_keys=True, indent=4) - - def __getitem__(self, attr): - return self.data[attr] diff --git a/basic/srv/vm/mgr/tools.py b/basic/srv/vm/mgr/tools.py deleted file mode 100644 index 1c0e4fd..0000000 --- a/basic/srv/vm/mgr/tools.py +++ /dev/null @@ -1,159 +0,0 @@ -# -*- coding: utf-8 -*- - -import bcrypt -import dns.exception -import dns.resolver -import os -import requests -import shutil -import socket -import subprocess - -from cryptography import x509 -from cryptography.hazmat.backends import default_backend -from cryptography.x509.oid import NameOID - -def compile_url(domain, port, proto='https'): - port = '' if (proto == 'https' and port == '443') or (proto == 'http' and port == '80') else ':{}'.format(port) - return '{}://{}{}'.format(proto, domain, port) - -def get_local_ipv4(): - # Return first routable IPv4 address of the VM (container host) - try: - return subprocess.run(['/sbin/ip', 'route', 'get', '1'], check=True, stdout=subprocess.PIPE).stdout.decode().split()[-1] - except: - return None - -def get_local_ipv6(): - # Return first routable IPv6 address of the VM (container host) - try: - return subprocess.run(['/sbin/ip', 'route', 'get', '2003::'], check=True, stdout=subprocess.PIPE).stdout.decode().split()[-3] - except: - return None - -def get_external_ip(family): - # Return external IP address of given family via 3rd party service - allowed_gai_family = requests.packages.urllib3.util.connection.allowed_gai_family - try: - requests.packages.urllib3.util.connection.allowed_gai_family = lambda: family - return requests.get('https://tools.dasm.cz/myip.php', timeout=5).text - except: - return None - finally: - requests.packages.urllib3.util.connection.allowed_gai_family = allowed_gai_family - -def get_external_ipv4(): - # Return external IPv4 address - return get_external_ip(socket.AF_INET) - -def get_external_ipv6(): - # Return external IPv6 address - return get_external_ip(socket.AF_INET6) - -resolver = dns.resolver.Resolver() -resolver.timeout = 3 -resolver.lifetime = 3 -resolver.nameservers = ['8.8.8.8', '8.8.4.4', '2001:4860:4860::8888', '2001:4860:4860::8844'] - -def resolve_ip(domain, type): - # Resolve domain name using Google Public DNS - try: - return resolver.query(domain, type)[0].address - except dns.exception.Timeout: - raise - except: - return None - -def ping_url(url): - try: - return requests.get('https://tools.dasm.cz/vm-ping.php', params = {'url': url}, timeout=5).text == 'vm-pong' - except requests.exceptions.Timeout: - raise - except: - return False - -def is_service_started(app): - # Check OpenRC service status without calling any binary - return os.path.exists(os.path.join('/run/openrc/started', app)) - -def is_service_autostarted(app): - # Check OpenRC service enablement - return os.path.exists(os.path.join('/etc/runlevels/default', app)) - -def start_service(service): - subprocess.run(['/sbin/service', service, 'start'], check=True) - -def stop_service(service): - subprocess.run(['/sbin/service', service, 'stop'], check=True) - -def restart_service(service): - subprocess.run(['/sbin/service', service, 'restart']) - -def reload_nginx(): - subprocess.run(['/usr/sbin/nginx', '-s', 'reload']) - -def restart_nginx(): - restart_service('nginx') - -def get_cert_info(cert): - # Gather certificate data important for setup-host - with open(cert, 'rb') as f: - cert = x509.load_pem_x509_certificate(f.read(), default_backend()) - data = {'subject': cert.subject.get_attributes_for_oid(NameOID.COMMON_NAME)[0].value, - 'issuer': cert.issuer.get_attributes_for_oid(NameOID.COMMON_NAME)[0].value, - 'expires': '{} UTC'.format(cert.not_valid_after), - 'method': 'manual'} - if os.path.exists('/etc/periodic/daily/acme-sh'): - data['method'] = 'letsencrypt' - # This is really naive method of inferring if the cert is selfsigned and should never be used in production :) - elif data['subject'] == data['issuer']: - data['method'] = 'selfsigned' - return data - -def adminpwd_hash(password): - return bcrypt.hashpw(password.encode(), bcrypt.gensalt()).decode() - -def adminpwd_verify(password, hash): - return bcrypt.checkpw(password.encode(), hash.encode()) - -def shutdown_vm(): - subprocess.run(['/sbin/poweroff']) - -def reboot_vm(): - subprocess.run(['/sbin/reboot']) - -def get_unused_ip(): - # This is a poor man's DHCP server which uses /etc/hosts as lease database - # Leases the first unused IP from range 172.17.0.0/16 - leased = [] - with open('/etc/hosts', 'r') as f: - for line in f.read().splitlines(): - if line.startswith('172.17'): - ip = line.split()[0].split('.') - leased.append(int(ip[2]) * 256 + int(ip[3])) - for i in range(1, 65534): - if i not in leased: - break - return '172.17.{}.{}'. format(i // 256, i % 256) - -def update_hosts_lease(ip, app): - hosts = [] - with open('/etc/hosts', 'r') as f: - for line in f: - if not line.strip().endswith(' {}'.format(app)): - hosts.append(line) - if ip: - hosts.append('{} {}\n'.format(ip, app)) - with open('/etc/hosts', 'w') as f: - f.writelines(hosts) - -def set_container_ip(pid, ip): - # Set IP in container based on PID given via lxc.hook.start-host hook - cmd = 'ip addr add {}/16 broadcast 172.17.255.255 dev eth0 && ip route add default via 172.17.0.1'.format(ip) - subprocess.run(['nsenter', '-a', '-t', pid, '--', '/bin/sh', '-c', cmd]) - -def clean_ephemeral_layer(app): - layer = os.path.join('/var/lib/lxc', app, 'delta0') - if os.path.exists(layer): - for item in os.scandir(layer): - shutil.rmtree(item.path) if item.is_dir() else os.unlink(item.path) diff --git a/basic/srv/vm/mgr/validator.py b/basic/srv/vm/mgr/validator.py deleted file mode 100644 index 14571d4..0000000 --- a/basic/srv/vm/mgr/validator.py +++ /dev/null @@ -1,25 +0,0 @@ -# -*- coding: utf-8 -*- - -import re - -domain_re = re.compile(r'^(?!-)[a-z0-9-]{1,63}(? 0 and port < 65536 - except: - return False - -def is_valid_email(email): - parts = email.split('@') - if len(parts) != 2: - return False - return bool(box_re.match(parts[0])) and bool(domain_re.match(parts[1])) diff --git a/basic/srv/vm/mgr/wsgiapp.py b/basic/srv/vm/mgr/wsgiapp.py deleted file mode 100644 index f39fca1..0000000 --- a/basic/srv/vm/mgr/wsgiapp.py +++ /dev/null @@ -1,399 +0,0 @@ -# -*- coding: utf-8 -*- - -import json -import os - -from werkzeug.exceptions import BadRequest, HTTPException, NotFound -from werkzeug.routing import Map, Rule -from werkzeug.utils import redirect -from werkzeug.wrappers import Request, Response -from werkzeug.wsgi import ClosingIterator -from jinja2 import Environment, FileSystemLoader - -from . import VMMgr, CERT_PUB_FILE -from . import tools -from .appmgr import AppMgr -from .validator import InvalidValueException -from .wsgilang import WSGILang -from .wsgisession import WSGISession - -SESSION_KEY = os.urandom(26) - -class WSGIApp(object): - def __init__(self): - self.vmmgr = VMMgr() - self.appmgr = AppMgr(self.vmmgr) - self.conf = self.vmmgr.conf - self.jinja_env = Environment(loader=FileSystemLoader('/srv/vm/templates'), autoescape=True, lstrip_blocks=True, trim_blocks=True) - self.jinja_env.globals.update(is_app_visible=self.is_app_visible) - self.jinja_env.globals.update(is_service_autostarted=tools.is_service_autostarted) - self.jinja_env.globals.update(is_service_started=tools.is_service_started) - - def __call__(self, environ, start_response): - return self.wsgi_app(environ, start_response) - - def wsgi_app(self, environ, start_response): - request = Request(environ) - # Reload config in case it has changed between requests - self.conf.load() - # Enhance request - request.session = WSGISession(request.cookies, SESSION_KEY) - request.session.lang = WSGILang() - # Dispatch request - response = self.dispatch_request(request) - # Save session if changed - request.session.save(response) - return response(environ, start_response) - - def dispatch_request(self, request): - adapter = self.get_url_map(request.session).bind_to_environ(request.environ) - try: - endpoint, values = adapter.match() - return getattr(self, endpoint)(request, **values) - except NotFound as e: - # Return custom 404 page - response = self.render_template('404.html', request) - response.status_code = 404 - return response - except HTTPException as e: - return e - - def get_url_map(self, session): - rules = [ - Rule('/', endpoint='portal_view'), - Rule('/login', methods=['GET'], endpoint='login_view', defaults={'redirect': '/'}), - Rule('/login', methods=['POST'], endpoint='login_action'), - Rule('/logout', endpoint='logout_action') - ] - if session['admin']: - rules += [ - Rule('/setup-host', endpoint='setup_host_view'), - Rule('/setup-apps', endpoint='setup_apps_view'), - Rule('/update-host', endpoint='update_host_action'), - Rule('/verify-dns', endpoint='verify_dns_action'), - Rule('/verify-https', endpoint='verify_http_action', defaults={'proto': 'https'}), - Rule('/verify-http', endpoint='verify_http_action', defaults={'proto': 'http'}), - Rule('/update-cert', endpoint='update_cert_action'), - Rule('/update-common', endpoint='update_common_action'), - Rule('/update-repo', endpoint='update_repo_action'), - Rule('/update-app-visibility', endpoint='update_app_visibility_action'), - Rule('/update-app-autostart', endpoint='update_app_autostart_action'), - Rule('/start-app', endpoint='start_app_action'), - Rule('/stop-app', endpoint='stop_app_action'), - Rule('/install-app', endpoint='install_app_action'), - Rule('/get-progress', endpoint='get_progress_action'), - Rule('/uninstall-app', endpoint='uninstall_app_action'), - Rule('/update-password', endpoint='update_password_action'), - Rule('/shutdown-vm', endpoint='shutdown_vm_action'), - Rule('/reboot-vm', endpoint='reboot_vm_action'), - ] - else: - rules += [ - Rule('/setup-host', endpoint='login_view', defaults={'redirect': '/setup-host'}), - Rule('/setup-apps', endpoint='login_view', defaults={'redirect': '/setup-apps'}), - ] - return Map(rules) - - def render_template(self, template_name, request, **context): - # Enhance context - context['conf'] = self.conf - context['session'] = request.session - # Render template - t = self.jinja_env.get_template(template_name) - return Response(t.render(context), mimetype='text/html') - - def render_json(self, data): - return Response(json.dumps(data), mimetype='application/json') - - def login_view(self, request, **kwargs): - return self.render_template('login.html', request, redirect=kwargs['redirect']) - - def login_action(self, request): - password = request.form['password'] - redir_url = request.form['redirect'] - if tools.adminpwd_verify(password, self.conf['host']['adminpwd']): - request.session['admin'] = True - return redirect(redir_url) - else: - return self.render_template('login.html', request, message=request.session.lang.bad_password()) - - def logout_action(self, request): - request.session.reset() - return redirect('/') - - def portal_view(self, request): - # Default portal view. If this is the first run, perform first-run setup. - if self.conf['host']['firstrun']: - # Set user as admin - request.session['admin'] = True - # Disable and save first-run flag - self.conf['host']['firstrun'] = False - self.conf.save() - # Redirect to host setup view - return redirect('/setup-host') - host = tools.compile_url(self.conf['host']['domain'], self.conf['host']['port'])[8:] - if request.session['admin']: - return self.render_template('portal-admin.html', request, host=host) - return self.render_template('portal-user.html', request, host=host) - - def setup_host_view(self, request): - # Host setup view. - ex_ipv4 = tools.get_external_ipv4() - ex_ipv6 = tools.get_external_ipv6() - in_ipv4 = tools.get_local_ipv4() - in_ipv6 = tools.get_local_ipv6() - cert_info = tools.get_cert_info(CERT_PUB_FILE) - return self.render_template('setup-host.html', request, ex_ipv4=ex_ipv4, ex_ipv6=ex_ipv6, in_ipv4=in_ipv4, in_ipv6=in_ipv6, cert_info=cert_info) - - def setup_apps_view(self, request): - # Application manager view. - try: - self.appmgr.fetch_online_packages() - except: - pass - all_apps = sorted(set([k for k,v in self.appmgr.online_packages.items() if 'host' in v] + list(self.conf['apps'].keys()))) - return self.render_template('setup-apps.html', request, all_apps=all_apps, online_packages=self.appmgr.online_packages) - - def render_setup_apps_row(self, request, app, app_title, item): - lang = request.session.lang - actions = '
' - if item.action == 'start_app': - if not item.started: - status = 'Spouští se (ve frontě)' - elif not item.finished: - status = 'Spouští se' - elif isinstance(item.data, BaseException): - status = '{}'.format(lang.stop_start_error()) - else: - status = 'Spuštěna' - actions = 'Zastavit' - elif item.action == 'stop_app': - if not item.started: - status = 'Zastavuje se (ve frontě)' - elif not item.finished: - status = 'Zastavuje se' - elif isinstance(item.data, BaseException): - status = '{}'.format(lang.stop_start_error()) - else: - status = 'Zastavena' - actions = 'Spustit, Odinstalovat' - elif item.action == 'install_app': - if not item.started: - status = 'Stahuje se (ve frontě)' - elif not item.finished: - if item.data.stage == 0: - status = 'Stahuje se ({} %)'.format(item.data) - elif item.data.stage == 1: - status = 'Instalují se závislosti' - else: - status = 'Instaluje se' - elif isinstance(item.data, BaseException): - status = '{}'.format(lang.package_manager_error()) - else: - status = 'Zastavena' - actions = 'Spustit, Odinstalovat' - elif item.action == 'uninstall_app': - if not item.started: - status = 'Odinstalovává se (ve frontě)' - elif not item.finished: - status = 'Odinstalovává se' - elif isinstance(item.data, BaseException): - status = '{}'.format(lang.package_manager_error()) - else: - status = 'Není nainstalována' - actions = 'Instalovat' - is_error = isinstance(item.data, BaseException) - t = self.jinja_env.get_template('setup-apps-row.html') - return t.render({'conf': self.conf, 'session': request.session, 'app': app, 'app_title': app_title, 'status': status, 'actions': actions, 'is_error': is_error}) - - def update_host_action(self, request): - # Update domain and port, then restart nginx - try: - domain = request.form['domain'] - port = request.form['port'] - self.vmmgr.update_host(domain, port) - server_name = request.environ['HTTP_X_FORWARDED_SERVER_NAME'] - url = '{}/setup-host'.format(tools.compile_url(server_name, port)) - response = self.render_json({'ok': request.session.lang.host_updated(url, url)}) - response.call_on_close(tools.restart_nginx) - return response - except BadRequest: - return self.render_json({'error': request.session.lang.malformed_request()}) - except InvalidValueException as e: - if e.args[0] == 'domain': - return self.render_json({'error': request.session.lang.invalid_domain(domain)}) - if e.args[0] == 'port': - return self.render_json({'error': request.session.lang.invalid_port(port)}) - - def verify_dns_action(self, request): - # Check if all FQDNs for all applications are resolvable and point to current external IP - domains = [self.vmmgr.domain]+['{}.{}'.format(self.conf['apps'][app]['host'], self.vmmgr.domain) for app in self.conf['apps']] - ipv4 = tools.get_external_ipv4() - ipv6 = tools.get_external_ipv6() - for domain in domains: - try: - a = tools.resolve_ip(domain, 'A') - aaaa = tools.resolve_ip(domain, 'AAAA') - if not a and not aaaa: - return self.render_json({'error': request.session.lang.dns_record_does_not_exist(domain)}) - if a and a != ipv4: - return self.render_json({'error': request.session.lang.dns_record_mismatch(domain, a, ipv4)}) - if aaaa and aaaa != ipv6: - return self.render_json({'error': request.session.lang.dns_record_mismatch(domain, aaaa, ipv6)}) - except: - return self.render_json({'error': request.session.lang.dns_timeout()}) - return self.render_json({'ok': request.session.lang.dns_records_ok()}) - - def verify_http_action(self, request, **kwargs): - # Check if all applications are accessible from the internet using 3rd party ping service - proto = kwargs['proto'] - port = self.vmmgr.port if proto == 'https' else '80' - domains = [self.vmmgr.domain]+['{}.{}'.format(self.conf['apps'][app]['host'], self.vmmgr.domain) for app in self.conf['apps']] - for domain in domains: - url = tools.compile_url(domain, port, proto) - try: - if not tools.ping_url(url): - return self.render_json({'error': request.session.lang.http_host_not_reachable(url)}) - except: - return self.render_json({'error': request.session.lang.http_timeout()}) - return self.render_json({'ok': request.session.lang.http_hosts_ok(port)}) - - def update_cert_action(self, request): - # Update certificate - either request via Let's Encrypt or manually upload files - try: - if request.form['method'] not in ['selfsigned', 'automatic', 'manual']: - raise BadRequest() - if request.form['method'] == 'selfsigned': - self.vmmgr.create_selfsigned_cert() - elif request.form['method'] == 'automatic': - self.vmmgr.request_acme_cert() - else: - if not request.files['public']: - return self.render_json({'error': request.session.lang.cert_file_missing()}) - if not request.files['private']: - return self.render_json({'error': request.session.lang.key_file_missing()}) - request.files['public'].save('/tmp/public.pem') - request.files['private'].save('/tmp/private.pem') - self.vmmgr.install_manual_cert('/tmp/public.pem', '/tmp/private.pem') - os.unlink('/tmp/public.pem') - os.unlink('/tmp/private.pem') - except BadRequest: - return self.render_json({'error': request.session.lang.malformed_request()}) - except: - return self.render_json({'error': request.session.lang.cert_request_error()}) - url = tools.compile_url(self.vmmgr.domain, self.vmmgr.port) - return self.render_json({'ok': request.session.lang.cert_installed(url, url)}) - - def update_common_action(self, request): - # Update common settings shared between apps - admin e-mail address, Google Maps API key - try: - self.vmmgr.update_common(request.form['email'], request.form['gmaps-api-key']) - except BadRequest: - return self.render_json({'error': request.session.lang.malformed_request()}) - return self.render_json({'ok': request.session.lang.common_updated()}) - - def update_repo_action(self, request): - # Update repository URL and credentials - try: - self.conf['repo']['url'] = request.form['repourl'] - self.conf['repo']['user'] = request.form['repousername'] - self.conf['repo']['pwd'] = request.form['repopassword'] - self.conf.save() - except: - pass - return redirect('/setup-apps') - - def update_app_visibility_action(self, request): - # Update application visibility on portal page - try: - if request.form['value'] == 'true': - self.vmmgr.show_tiles(request.form['app']) - else: - self.vmmgr.hide_tiles(request.form['app']) - except (BadRequest, InvalidValueException): - return self.render_json({'error': request.session.lang.malformed_request()}) - return self.render_json({'ok': 'ok'}) - - def update_app_autostart_action(self, request): - # Update value determining if the app should be automatically started after VM boot - try: - if request.form['value'] == 'true': - self.vmmgr.enable_autostart(request.form['app']) - else: - self.vmmgr.disable_autostart(request.form['app']) - except (BadRequest, InvalidValueException): - return self.render_json({'error': request.session.lang.malformed_request()}) - return self.render_json({'ok': 'ok'}) - - def enqueue_action(self, request, action): - try: - app = request.form['app'] - except BadRequest: - return self.render_json({'error': request.session.lang.malformed_request()}) - app_title = self.conf['apps'][app]['title'] if app in self.conf['apps'] else self.appmgr.online_packages[app]['title'] - id,item = self.appmgr.enqueue_action(action, app) - response = self.render_json({'html': self.render_setup_apps_row(request, app, app_title, item), 'id': id}) - response.call_on_close(lambda: self.appmgr.process_action(id)) - return response - - def start_app_action(self, request): - # Queues application start along with its dependencies - return self.enqueue_action(request, 'start_app') - - def stop_app_action(self, request): - # Queues application stop along with its dependencies - return self.enqueue_action(request, 'stop_app') - - def install_app_action(self, request): - # Queues application installation - return self.enqueue_action(request, 'install_app') - - def uninstall_app_action(self, request): - # Queues application uninstallation - return self.enqueue_action(request, 'uninstall_app') - - def get_progress_action(self, request): - # Gets appmgr queue status for given ids - json = {} - try: - ids = request.form.getlist('ids[]') - except BadRequest: - return self.render_json({'error': request.session.lang.malformed_request()}) - actions = self.appmgr.get_actions(ids) - for id,item in actions.items(): - app = item.app - # In case of installation error, we need to get the name from online_packages as the app is not yet registered - app_title = self.conf['apps'][app]['title'] if app in self.conf['apps'] else self.appmgr.online_packages[app]['title'] - json[id] = {'html': self.render_setup_apps_row(request, app, app_title, item), 'last': item.finished} - return self.render_json(json) - - def update_password_action(self, request): - # Updates password for both HDD encryption (LUKS-on-LVM) and web interface admin account - try: - if request.form['newpassword'] != request.form['newpassword2']: - return self.render_json({'error': request.session.lang.password_mismatch()}) - if request.form['newpassword'] == '': - return self.render_json({'error': request.session.lang.password_empty()}) - # No need to explicitly validate old password, update_luks_password will raise exception if it's wrong - self.vmmgr.update_password(request.form['oldpassword'], request.form['newpassword']) - except: - return self.render_json({'error': request.session.lang.bad_password()}) - return self.render_json({'ok': request.session.lang.password_changed()}) - - def reboot_vm_action(self, request): - # Reboots VM - response = self.render_json({'ok': request.session.lang.reboot_initiated()}) - response.call_on_close(tools.reboot_vm) - return response - - def shutdown_vm_action(self, request): - # Shuts down VM - response = self.render_json({'ok': request.session.lang.shutdown_initiated()}) - response.call_on_close(tools.shutdown_vm) - return response - - def is_app_visible(self, app): - return app in self.conf['apps'] and self.conf['apps'][app]['visible'] and tools.is_service_started(app) - -class InvalidRecordException(Exception): - pass diff --git a/basic/srv/vm/mgr/wsgilang.py b/basic/srv/vm/mgr/wsgilang.py deleted file mode 100644 index 8785643..0000000 --- a/basic/srv/vm/mgr/wsgilang.py +++ /dev/null @@ -1,35 +0,0 @@ -# -*- coding: utf-8 -*- - -class WSGILang: - lang = { - 'malformed_request': 'Byl zaslán chybný požadavek. Obnovte stránku a zkuste akci zopakovat.', - 'invalid_domain': 'Zadaný doménový název "{}" není platný.', - 'invalid_port': 'Zadaný port "{}" není platný.', - 'host_updated': 'Nastavení hostitele bylo úspěšně změněno. Přejděte na URL {} a pokračujte následujícími kroky.', - 'dns_record_does_not_exist': 'DNS záznam pro název "{}" neexistuje.', - 'dns_record_mismatch': 'DNS záznam pro název "{}" směřuje na IP {} místo očekávané {}.', - 'dns_timeout': 'Nepodařilo se kontaktovat DNS server. Zkontrolujte, zda má virtuální stroj přístup k internetu.', - 'dns_records_ok': 'DNS záznamy jsou nastaveny správně.', - 'http_host_not_reachable': 'Adresa {} není dostupná z internetu. Zkontrolujte nastavení síťových komponent.', - 'http_timeout': 'Nepodařilo se kontaktovat ping server. Zkontrolujte, zda má virtuální stroj přístup k internetu.', - 'http_hosts_ok': 'Síť je nastavena správně. Všechny aplikace na portu {} jsou z internetu dostupné.', - 'cert_file_missing': 'Nebyl vybrán soubor s certifikátem.', - 'key_file_missing': 'Nebyl vybrán soubor se soukromým klíčem.', - 'cert_request_error': 'Došlo k chybě při žádosti o certifikát. Zkontrolujte, zda je virtuální stroj dostupný z internetu na portu 80.', - 'cert_installed': 'Certifikát byl úspěšně nainstalován. Přejděte na URL {} nebo restartujte webový prohlížeč pro jeho načtení.', - 'common_updated': 'Nastavení aplikací bylo úspěšně změněno.', - 'stop_start_error': 'Došlo k chybě při spouštění/zastavování. Zkuste akci opakovat nebo restartuje virtuální stroj.', - 'installation_in_progress': 'Probíhá instalace jiného balíku. Vyčkejte na její dokončení.', - 'package_manager_error': 'Došlo k chybě při instalaci aplikace. Zkuste akci opakovat nebo restartuje virtuální stroj.', - 'bad_password': 'Nesprávné heslo', - 'password_mismatch': 'Zadaná hesla se neshodují', - 'password_empty': 'Nové heslo nesmí být prázdné', - 'password_changed': 'Heslo úspěšně změněno', - 'reboot_initiated': 'Příkaz odeslán. Vyčkejte na restartování virtuálního stroje.', - 'shutdown_initiated': 'Příkaz odeslán. Vyčkejte na vypnutí virtuálního stroje.', - } - - def __getattr__(self, key): - def function(*args): - return self.lang[key].format(*args) - return function diff --git a/basic/srv/vm/mgr/wsgisession.py b/basic/srv/vm/mgr/wsgisession.py deleted file mode 100644 index 938ba06..0000000 --- a/basic/srv/vm/mgr/wsgisession.py +++ /dev/null @@ -1,32 +0,0 @@ -# -*- coding: utf-8 -*- - -from werkzeug.contrib.securecookie import SecureCookie - -class WSGISession: - def __init__(self, cookies, secret_key): - self.secret_key = secret_key - data = cookies.get('session') - if data: - self.sc = SecureCookie.unserialize(data, secret_key) - else: - self.reset() - if 'admin' not in self.sc: - self.reset() - - def __getitem__(self, key): - return self.sc.__getitem__(key) - def __setitem__(self, key, value): - return self.sc.__setitem__(key, value) - def __delitem__(self, key): - return self.sc.__delitem__(key) - def __contains__(self, key): - return self.sc.__contains__(key) - - def reset(self): - self.sc = SecureCookie(secret_key=self.secret_key) - self.sc['admin'] = False - - def save(self, response): - if self.sc.should_save: - data = self.sc.serialize() - response.set_cookie('session', data, httponly=True) diff --git a/basic/srv/vm/packages.pub b/basic/srv/vm/packages.pub deleted file mode 100644 index 60532d9..0000000 --- a/basic/srv/vm/packages.pub +++ /dev/null @@ -1,5 +0,0 @@ ------BEGIN PUBLIC KEY----- -MHYwEAYHKoZIzj0CAQYFK4EEACIDYgAEWJXH4Qm0kt2L86sntQH+C1zOJNQ0qMRt -0vx4krTxRs9HQTQYAy//JC92ea2aKleA8OL0JF90b1NYXcQCWdAS+vE/ng9IEAii -8C2+5nfuFeZ5YUjbQhfFblwHSM0c7hEG ------END PUBLIC KEY----- diff --git a/basic/srv/vm/static/css/style.css b/basic/srv/vm/static/css/style.css deleted file mode 100644 index 7ec9407..0000000 --- a/basic/srv/vm/static/css/style.css +++ /dev/null @@ -1,200 +0,0 @@ -body { - font-family: 'Calibri', 'Verdana', 'Tahoma', sans-serif; - background-color: #bbb; - color: #000; - line-height: 150%; - margin: 25px 30px; -} - -a { - color: #06f; - text-decoration: none; -} - -img { - border: 0px; -} - -nav { - float: right; -} - -nav #menu-button { - float: right; - cursor: pointer; -} - -nav #menu-button div { - width: 24px; - height: 4px; - background-color: #fff; - border: 1px solid #000; - margin: 2px 0px; -} - -nav ul { - display: none; - list-style: none; - border: 1px solid #000; - margin: 26px 0px 0px 0px; - position: absolute; - background-color: #fff; - padding: 10px; - right: 30px; - z-index: 1; -} - -nav a { - display: block; -} - -h1, h2 { - font-size: 150%; -} - -header { - color: #fff; -} - -header h1, -header p, -.portal-box p { - padding: 0px; - margin: 0px; -} - -.portal-box, -.setup-box { - background-color: #fff; - margin-top: 13px; - border: solid 1px #000; - padding: 10px; -} - -.portal-box { - position: relative; - margin-right: 13px; - width: 365px; - float: left; - height: 175px; -} - -.portal-box h2 { - margin: 0px; - font-weight: normal; -} - -.portal-box h2 a { - color: inherit; -} - -.portal-box h2 img { - float: right; - margin-left: 10px; - margin-bottom:10px; - width: 100px; - height: 100px; -} - -.portal-box ul { - margin: 0px; - padding-left: 30px; -} - -.portal-box:last-child:after { - clear: both; -} - -.portal-box-double-width { - width: 765px; -} - -.ico { - margin-right: 5px; - width: 20px; - height: 20px; - vertical-align: top; -} - -.setup-box h2 { - margin-top: 0px; -} - -.setup-box input[type="text"], -.setup-box input[type="password"], -.setup-box input[type="submit"], -.setup-box input[type="button"], -.setup-box input[type="file"], -.setup-box select { - box-sizing: border-box; - width: 180px; -} - -.setup-box table { - border-collapse: collapse; -} - -.setup-box thead { - font-weight: bold; -} - -.setup-box td { - padding: 1px 10px; - vertical-align: top; -} - -.setup-box td:first-child { - white-space: nowrap; -} - -.setup-box td.remark { - color: #999; - font-size: 80%; - font-style: italic; - line-height: 125%; - padding-top: 5px; -} - -#app-manager { - table-layout: fixed; -} - -.center { - text-align: center; -} - -.error { - color: #c00; - font-weight: bold; -} - -.info { - color: #090; - font-weight: bold; -} - -.loader-wrap { - display: none; -} - -.loader-wrap span:after { - clear: both; - content: ''; - display: table; -} - -.loader { - float: left; - width: 14px; - height: 14px; - border: 5px solid #eee; - border-top: 5px solid #fa3; - border-radius: 50%; - margin-right: 5px; - animation: spin 1s linear infinite; -} - -@keyframes spin { - 0% { transform: rotate(0deg); } - 100% { transform: rotate(360deg); } -} diff --git a/basic/srv/vm/static/img/CAP.png b/basic/srv/vm/static/img/CAP.png deleted file mode 100644 index e8eb9f4..0000000 Binary files a/basic/srv/vm/static/img/CAP.png and /dev/null differ diff --git a/basic/srv/vm/static/img/CKAN.png b/basic/srv/vm/static/img/CKAN.png deleted file mode 100644 index 77cfb7e..0000000 Binary files a/basic/srv/vm/static/img/CKAN.png and /dev/null differ diff --git a/basic/srv/vm/static/img/CTS.png b/basic/srv/vm/static/img/CTS.png deleted file mode 100644 index 9bd35f4..0000000 Binary files a/basic/srv/vm/static/img/CTS.png and /dev/null differ diff --git a/basic/srv/vm/static/img/Cluster_Spotter.png b/basic/srv/vm/static/img/Cluster_Spotter.png deleted file mode 100644 index dc32e20..0000000 Binary files a/basic/srv/vm/static/img/Cluster_Spotter.png and /dev/null differ diff --git a/basic/srv/vm/static/img/Crisis_Cleanup.png b/basic/srv/vm/static/img/Crisis_Cleanup.png deleted file mode 100644 index 6979185..0000000 Binary files a/basic/srv/vm/static/img/Crisis_Cleanup.png and /dev/null differ diff --git a/basic/srv/vm/static/img/Diaspora.png b/basic/srv/vm/static/img/Diaspora.png deleted file mode 100644 index ec88dca..0000000 Binary files a/basic/srv/vm/static/img/Diaspora.png and /dev/null differ diff --git a/basic/srv/vm/static/img/EDEN.png b/basic/srv/vm/static/img/EDEN.png deleted file mode 100644 index 6fd72a1..0000000 Binary files a/basic/srv/vm/static/img/EDEN.png and /dev/null differ diff --git a/basic/srv/vm/static/img/FrontlineSMS.png b/basic/srv/vm/static/img/FrontlineSMS.png deleted file mode 100644 index de2b91b..0000000 Binary files a/basic/srv/vm/static/img/FrontlineSMS.png and /dev/null differ diff --git a/basic/srv/vm/static/img/FrontlineSync.png b/basic/srv/vm/static/img/FrontlineSync.png deleted file mode 100644 index 9c6ad76..0000000 Binary files a/basic/srv/vm/static/img/FrontlineSync.png and /dev/null differ diff --git a/basic/srv/vm/static/img/GNU_Health.png b/basic/srv/vm/static/img/GNU_Health.png deleted file mode 100644 index 779ca5a..0000000 Binary files a/basic/srv/vm/static/img/GNU_Health.png and /dev/null differ diff --git a/basic/srv/vm/static/img/GeoODK_Collect.png b/basic/srv/vm/static/img/GeoODK_Collect.png deleted file mode 100644 index 8f0831d..0000000 Binary files a/basic/srv/vm/static/img/GeoODK_Collect.png and /dev/null differ diff --git a/basic/srv/vm/static/img/Kanboard.png b/basic/srv/vm/static/img/Kanboard.png deleted file mode 100644 index 969bad6..0000000 Binary files a/basic/srv/vm/static/img/Kanboard.png and /dev/null differ diff --git a/basic/srv/vm/static/img/MifosX.png b/basic/srv/vm/static/img/MifosX.png deleted file mode 100644 index 29ceb11..0000000 Binary files a/basic/srv/vm/static/img/MifosX.png and /dev/null differ diff --git a/basic/srv/vm/static/img/MifosX_Mobile.png b/basic/srv/vm/static/img/MifosX_Mobile.png deleted file mode 100644 index 5c06ab9..0000000 Binary files a/basic/srv/vm/static/img/MifosX_Mobile.png and /dev/null differ diff --git a/basic/srv/vm/static/img/Motech.png b/basic/srv/vm/static/img/Motech.png deleted file mode 100644 index 55636a8..0000000 Binary files a/basic/srv/vm/static/img/Motech.png and /dev/null differ diff --git a/basic/srv/vm/static/img/ODK.png b/basic/srv/vm/static/img/ODK.png deleted file mode 100644 index 3d48ef5..0000000 Binary files a/basic/srv/vm/static/img/ODK.png and /dev/null differ diff --git a/basic/srv/vm/static/img/ODK_Collect.png b/basic/srv/vm/static/img/ODK_Collect.png deleted file mode 100644 index 4862290..0000000 Binary files a/basic/srv/vm/static/img/ODK_Collect.png and /dev/null differ diff --git a/basic/srv/vm/static/img/OMK.png b/basic/srv/vm/static/img/OMK.png deleted file mode 100644 index fdaa652..0000000 Binary files a/basic/srv/vm/static/img/OMK.png and /dev/null differ diff --git a/basic/srv/vm/static/img/OpenID.png b/basic/srv/vm/static/img/OpenID.png deleted file mode 100644 index 8263f07..0000000 Binary files a/basic/srv/vm/static/img/OpenID.png and /dev/null differ diff --git a/basic/srv/vm/static/img/POSM.png b/basic/srv/vm/static/img/POSM.png deleted file mode 100644 index 0ed788e..0000000 Binary files a/basic/srv/vm/static/img/POSM.png and /dev/null differ diff --git a/basic/srv/vm/static/img/Pandora.png b/basic/srv/vm/static/img/Pandora.png deleted file mode 100644 index 3eb5771..0000000 Binary files a/basic/srv/vm/static/img/Pandora.png and /dev/null differ diff --git a/basic/srv/vm/static/img/PostGIS.png b/basic/srv/vm/static/img/PostGIS.png deleted file mode 100644 index 6e01af3..0000000 Binary files a/basic/srv/vm/static/img/PostGIS.png and /dev/null differ diff --git a/basic/srv/vm/static/img/SMS_Sync.png b/basic/srv/vm/static/img/SMS_Sync.png deleted file mode 100644 index 8084f12..0000000 Binary files a/basic/srv/vm/static/img/SMS_Sync.png and /dev/null differ diff --git a/basic/srv/vm/static/img/SeedDMS.png b/basic/srv/vm/static/img/SeedDMS.png deleted file mode 100644 index aec78d5..0000000 Binary files a/basic/srv/vm/static/img/SeedDMS.png and /dev/null differ diff --git a/basic/srv/vm/static/img/Sigmah.png b/basic/srv/vm/static/img/Sigmah.png deleted file mode 100644 index 8b07dbe..0000000 Binary files a/basic/srv/vm/static/img/Sigmah.png and /dev/null differ diff --git a/basic/srv/vm/static/img/Ushahidi.png b/basic/srv/vm/static/img/Ushahidi.png deleted file mode 100644 index e568cbe..0000000 Binary files a/basic/srv/vm/static/img/Ushahidi.png and /dev/null differ diff --git a/basic/srv/vm/static/img/Ushahidi_mobile.png b/basic/srv/vm/static/img/Ushahidi_mobile.png deleted file mode 100644 index 6a29201..0000000 Binary files a/basic/srv/vm/static/img/Ushahidi_mobile.png and /dev/null differ diff --git a/basic/srv/vm/static/img/icons/Android.png b/basic/srv/vm/static/img/icons/Android.png deleted file mode 100644 index f974b23..0000000 Binary files a/basic/srv/vm/static/img/icons/Android.png and /dev/null differ diff --git a/basic/srv/vm/static/img/icons/Java.png b/basic/srv/vm/static/img/icons/Java.png deleted file mode 100644 index 196c11e..0000000 Binary files a/basic/srv/vm/static/img/icons/Java.png and /dev/null differ diff --git a/basic/srv/vm/static/img/icons/Linux.png b/basic/srv/vm/static/img/icons/Linux.png deleted file mode 100644 index 5a79ac9..0000000 Binary files a/basic/srv/vm/static/img/icons/Linux.png and /dev/null differ diff --git a/basic/srv/vm/static/img/icons/MacOS.png b/basic/srv/vm/static/img/icons/MacOS.png deleted file mode 100644 index 5bfe192..0000000 Binary files a/basic/srv/vm/static/img/icons/MacOS.png and /dev/null differ diff --git a/basic/srv/vm/static/img/icons/Windows.png b/basic/srv/vm/static/img/icons/Windows.png deleted file mode 100644 index 0fc7e3f..0000000 Binary files a/basic/srv/vm/static/img/icons/Windows.png and /dev/null differ diff --git a/basic/srv/vm/static/img/icons/iOS.png b/basic/srv/vm/static/img/icons/iOS.png deleted file mode 100644 index 69f5429..0000000 Binary files a/basic/srv/vm/static/img/icons/iOS.png and /dev/null differ diff --git a/basic/srv/vm/static/js/admin.js b/basic/srv/vm/static/js/admin.js deleted file mode 100644 index 1aaa527..0000000 --- a/basic/srv/vm/static/js/admin.js +++ /dev/null @@ -1,229 +0,0 @@ -var action_queue = []; - -$(function() { - $('#update-host').on('submit', update_host); - $('#verify-dns').on('click', verify_dns); - $('#verify-https').on('click', verify_https); - $('#verify-http').on('click', verify_http); - $('#cert-method').on('change', toggle_cert_method); - $('#update-cert').on('submit', update_cert); - $('#update-common').on('submit', update_common); - $('#app-manager') - .on('click', '.app-visible', update_app_visibility) - .on('click', '.app-autostart', update_app_autostart) - .on('click', '.app-start', start_app) - .on('click', '.app-stop', stop_app) - .on('click', '.app-install', install_app) - .on('click', '.app-uninstall', uninstall_app); - $('#update-password').on('submit', update_password); - $('#reboot-vm').on('click', reboot_vm); - $('#shutdown-vm').on('click', shutdown_vm); - window.setInterval(check_progress, 1000); -}); - -function update_host() { - $('#host-submit').hide(); - $('#host-message').hide(); - $('#host-wait').show(); - $.post('/update-host', {'domain': $('#domain').val(), 'port': $('#port').val()}, function(data) { - $('#host-wait').hide(); - if (data.error) { - $('#host-message').attr('class','error').html(data.error).show(); - $('#host-submit').show(); - } else { - $('#host-message').attr('class','info').html(data.ok).show(); - $('input').prop('disabled', true); - $('.setup-box').slice(1).css('opacity', '0.5'); - } - }); - return false; -} - -function verify_dns() { - $('#verify-dns').hide(); - $('#dns-message').hide(); - $('#dns-wait').show(); - $.get('/verify-dns', function(data) { - $('#dns-wait').hide(); - if (data.error) { - $('#dns-message').attr('class','error').html(data.error).show(); - $('#verify-dns').show(); - } else { - $('#dns-message').attr('class','info').html(data.ok).show(); - } - }); - return false; -} - -function _verify_http(proto) { - $('#verify-'+proto).hide(); - $('#'+proto+'-message').hide(); - $('#'+proto+'-wait').show(); - $.get('/verify-' + proto, function(data) { - $('#'+proto+'-wait').hide(); - if (data.error) { - $('#'+proto+'-message').attr('class','error').html(data.error).show(); - $('#verify-'+proto).show(); - } else { - $('#'+proto+'-message').attr('class','info').html(data.ok).show(); - } - }); - return false; -} - -function verify_http() { - return _verify_http('http'); -} - -function verify_https() { - return _verify_http('https'); -} - -function toggle_cert_method() { - if ($('#cert-method').val() == 'manual') { - $('.cert-upload').show(); - } else { - $('.cert-upload').hide(); - } -} - -function update_cert() { - $('#cert-submit').hide(); - $('#cert-message').hide(); - $('#cert-wait').show(); - $.ajax({url: '/update-cert', type: 'POST', data: new FormData($('#update-cert')[0]), cache: false, contentType: false, processData: false, success: function(data) { - $('#cert-wait').hide(); - if (data.error) { - $('#cert-message').attr('class','error').html(data.error).show(); - $('#cert-submit').show(); - } else { - $('#cert-message').attr('class','info').html(data.ok).show(); - } - }}); - return false; -} - -function update_common() { - $('#common-submit').hide(); - $('#common-message').hide(); - $('#common-wait').show(); - $.post('/update-common', {'email': $('#email').val(), 'gmaps-api-key': $('#gmaps-api-key').val()}, function(data) { - $('#common-wait').hide(); - if (data.error) { - $('#common-message').attr('class','error').html(data.error).show(); - $('#common-submit').show(); - } else { - $('#common-message').attr('class','info').html(data.ok).show(); - $('#common-submit').show(); - } - }); - return false; -} - -function _update_app(item, ev) { - var el = $(ev.target); - var app = el.closest('tr').data('app'); - var value = el.is(':checked') ? 'true' : ''; - $.post('/update-app-'+item, {'app': app, 'value': value}, function(data) { - if (data.error) { - el.prop('checked', !value); - alert(data.error); - } - }); -} - -function update_app_visibility(ev) { - return _update_app('visibility', ev); -} - -function update_app_autostart(ev) { - return _update_app('autostart', ev); -} - -function _do_app(action, ev) { - var el = $(ev.target); - var tr = el.closest('tr'); - var td = el.closest('td'); - td.html('
'); - $.post('/'+action+'-app', {'app': tr.data('app')}, function(data) { - if (data.error) { - td.attr('class','error').html(data.error); - } else if (action) { - tr.html(data.html); - action_queue.push(data.id); - } - }); - return false; -} - -function start_app(ev) { - return _do_app('start', ev); -} - -function stop_app(ev) { - return _do_app('stop', ev); -} - -function install_app(ev) { - return _do_app('install', ev); -} - -function uninstall_app(ev) { - var app = $(ev.target).closest('tr').children().first().text() - if (confirm('Opravdu chcete odinstalovat aplikaci '+app+'?')) { - return _do_app('uninstall', ev); - } - return false; -} - -function check_progress() { - if (action_queue.length) { - $.post('/get-progress', {'ids': action_queue}, function(data) { - for (id in data) { - var app = id.split(':')[0]; - $('#app-manager tr[data-app="'+app+'"]').html(data[id].html); - if (data[id].last) { - action_queue = action_queue.filter(function(item) { - return item !== id - }); - } - } - }); - } -} - -function update_password() { - $('#password-submit').hide(); - $('#password-message').hide(); - $('#password-wait').show(); - $.post('/update-password', {'oldpassword': $('#oldpassword').val(), 'newpassword': $('#newpassword').val(), 'newpassword2': $('#newpassword2').val()}, function(data) { - $('#password-wait').hide(); - if (data.error) { - $('#password-message').attr('class','error').html(data.error).show(); - $('#password-submit').show(); - } else { - $('#password-message').attr('class','info').html(data.ok).show(); - } - }); - return false; -} - -function _do_vm(action) { - $.get('/'+action+'-vm', function(data) { - $('#vm-message').attr('class','info').html(data.ok).show(); - }); -} - -function reboot_vm() { - if (confirm('Opravdu chcete restartovat VM?')) { - _do_vm('reboot'); - } - return false; -} - -function shutdown_vm() { - if (confirm('Opravdu chcete vypnout VM?')) { - _do_vm('shutdown'); - } - return false; -} diff --git a/basic/srv/vm/static/js/jquery-3.3.1.min.js b/basic/srv/vm/static/js/jquery-3.3.1.min.js deleted file mode 100644 index 4d9b3a2..0000000 --- a/basic/srv/vm/static/js/jquery-3.3.1.min.js +++ /dev/null @@ -1,2 +0,0 @@ -/*! jQuery v3.3.1 | (c) JS Foundation and other contributors | jquery.org/license */ -!function(e,t){"use strict";"object"==typeof module&&"object"==typeof module.exports?module.exports=e.document?t(e,!0):function(e){if(!e.document)throw new Error("jQuery requires a window with a document");return t(e)}:t(e)}("undefined"!=typeof window?window:this,function(e,t){"use strict";var n=[],r=e.document,i=Object.getPrototypeOf,o=n.slice,a=n.concat,s=n.push,u=n.indexOf,l={},c=l.toString,f=l.hasOwnProperty,p=f.toString,d=p.call(Object),h={},g=function e(t){return"function"==typeof t&&"number"!=typeof t.nodeType},y=function e(t){return null!=t&&t===t.window},v={type:!0,src:!0,noModule:!0};function m(e,t,n){var i,o=(t=t||r).createElement("script");if(o.text=e,n)for(i in v)n[i]&&(o[i]=n[i]);t.head.appendChild(o).parentNode.removeChild(o)}function x(e){return null==e?e+"":"object"==typeof e||"function"==typeof e?l[c.call(e)]||"object":typeof e}var b="3.3.1",w=function(e,t){return new w.fn.init(e,t)},T=/^[\s\uFEFF\xA0]+|[\s\uFEFF\xA0]+$/g;w.fn=w.prototype={jquery:"3.3.1",constructor:w,length:0,toArray:function(){return o.call(this)},get:function(e){return null==e?o.call(this):e<0?this[e+this.length]:this[e]},pushStack:function(e){var t=w.merge(this.constructor(),e);return t.prevObject=this,t},each:function(e){return w.each(this,e)},map:function(e){return this.pushStack(w.map(this,function(t,n){return e.call(t,n,t)}))},slice:function(){return this.pushStack(o.apply(this,arguments))},first:function(){return this.eq(0)},last:function(){return this.eq(-1)},eq:function(e){var t=this.length,n=+e+(e<0?t:0);return this.pushStack(n>=0&&n0&&t-1 in e)}var E=function(e){var t,n,r,i,o,a,s,u,l,c,f,p,d,h,g,y,v,m,x,b="sizzle"+1*new Date,w=e.document,T=0,C=0,E=ae(),k=ae(),S=ae(),D=function(e,t){return e===t&&(f=!0),0},N={}.hasOwnProperty,A=[],j=A.pop,q=A.push,L=A.push,H=A.slice,O=function(e,t){for(var n=0,r=e.length;n+~]|"+M+")"+M+"*"),z=new RegExp("="+M+"*([^\\]'\"]*?)"+M+"*\\]","g"),X=new RegExp(W),U=new RegExp("^"+R+"$"),V={ID:new RegExp("^#("+R+")"),CLASS:new RegExp("^\\.("+R+")"),TAG:new RegExp("^("+R+"|[*])"),ATTR:new RegExp("^"+I),PSEUDO:new RegExp("^"+W),CHILD:new RegExp("^:(only|first|last|nth|nth-last)-(child|of-type)(?:\\("+M+"*(even|odd|(([+-]|)(\\d*)n|)"+M+"*(?:([+-]|)"+M+"*(\\d+)|))"+M+"*\\)|)","i"),bool:new RegExp("^(?:"+P+")$","i"),needsContext:new RegExp("^"+M+"*[>+~]|:(even|odd|eq|gt|lt|nth|first|last)(?:\\("+M+"*((?:-\\d)?\\d*)"+M+"*\\)|)(?=[^-]|$)","i")},G=/^(?:input|select|textarea|button)$/i,Y=/^h\d$/i,Q=/^[^{]+\{\s*\[native \w/,J=/^(?:#([\w-]+)|(\w+)|\.([\w-]+))$/,K=/[+~]/,Z=new RegExp("\\\\([\\da-f]{1,6}"+M+"?|("+M+")|.)","ig"),ee=function(e,t,n){var r="0x"+t-65536;return r!==r||n?t:r<0?String.fromCharCode(r+65536):String.fromCharCode(r>>10|55296,1023&r|56320)},te=/([\0-\x1f\x7f]|^-?\d)|^-$|[^\0-\x1f\x7f-\uFFFF\w-]/g,ne=function(e,t){return t?"\0"===e?"\ufffd":e.slice(0,-1)+"\\"+e.charCodeAt(e.length-1).toString(16)+" ":"\\"+e},re=function(){p()},ie=me(function(e){return!0===e.disabled&&("form"in e||"label"in e)},{dir:"parentNode",next:"legend"});try{L.apply(A=H.call(w.childNodes),w.childNodes),A[w.childNodes.length].nodeType}catch(e){L={apply:A.length?function(e,t){q.apply(e,H.call(t))}:function(e,t){var n=e.length,r=0;while(e[n++]=t[r++]);e.length=n-1}}}function oe(e,t,r,i){var o,s,l,c,f,h,v,m=t&&t.ownerDocument,T=t?t.nodeType:9;if(r=r||[],"string"!=typeof e||!e||1!==T&&9!==T&&11!==T)return r;if(!i&&((t?t.ownerDocument||t:w)!==d&&p(t),t=t||d,g)){if(11!==T&&(f=J.exec(e)))if(o=f[1]){if(9===T){if(!(l=t.getElementById(o)))return r;if(l.id===o)return r.push(l),r}else if(m&&(l=m.getElementById(o))&&x(t,l)&&l.id===o)return r.push(l),r}else{if(f[2])return L.apply(r,t.getElementsByTagName(e)),r;if((o=f[3])&&n.getElementsByClassName&&t.getElementsByClassName)return L.apply(r,t.getElementsByClassName(o)),r}if(n.qsa&&!S[e+" "]&&(!y||!y.test(e))){if(1!==T)m=t,v=e;else if("object"!==t.nodeName.toLowerCase()){(c=t.getAttribute("id"))?c=c.replace(te,ne):t.setAttribute("id",c=b),s=(h=a(e)).length;while(s--)h[s]="#"+c+" "+ve(h[s]);v=h.join(","),m=K.test(e)&&ge(t.parentNode)||t}if(v)try{return L.apply(r,m.querySelectorAll(v)),r}catch(e){}finally{c===b&&t.removeAttribute("id")}}}return u(e.replace(B,"$1"),t,r,i)}function ae(){var e=[];function t(n,i){return e.push(n+" ")>r.cacheLength&&delete t[e.shift()],t[n+" "]=i}return t}function se(e){return e[b]=!0,e}function ue(e){var t=d.createElement("fieldset");try{return!!e(t)}catch(e){return!1}finally{t.parentNode&&t.parentNode.removeChild(t),t=null}}function le(e,t){var n=e.split("|"),i=n.length;while(i--)r.attrHandle[n[i]]=t}function ce(e,t){var n=t&&e,r=n&&1===e.nodeType&&1===t.nodeType&&e.sourceIndex-t.sourceIndex;if(r)return r;if(n)while(n=n.nextSibling)if(n===t)return-1;return e?1:-1}function fe(e){return function(t){return"input"===t.nodeName.toLowerCase()&&t.type===e}}function pe(e){return function(t){var n=t.nodeName.toLowerCase();return("input"===n||"button"===n)&&t.type===e}}function de(e){return function(t){return"form"in t?t.parentNode&&!1===t.disabled?"label"in t?"label"in t.parentNode?t.parentNode.disabled===e:t.disabled===e:t.isDisabled===e||t.isDisabled!==!e&&ie(t)===e:t.disabled===e:"label"in t&&t.disabled===e}}function he(e){return se(function(t){return t=+t,se(function(n,r){var i,o=e([],n.length,t),a=o.length;while(a--)n[i=o[a]]&&(n[i]=!(r[i]=n[i]))})})}function ge(e){return e&&"undefined"!=typeof e.getElementsByTagName&&e}n=oe.support={},o=oe.isXML=function(e){var t=e&&(e.ownerDocument||e).documentElement;return!!t&&"HTML"!==t.nodeName},p=oe.setDocument=function(e){var t,i,a=e?e.ownerDocument||e:w;return a!==d&&9===a.nodeType&&a.documentElement?(d=a,h=d.documentElement,g=!o(d),w!==d&&(i=d.defaultView)&&i.top!==i&&(i.addEventListener?i.addEventListener("unload",re,!1):i.attachEvent&&i.attachEvent("onunload",re)),n.attributes=ue(function(e){return e.className="i",!e.getAttribute("className")}),n.getElementsByTagName=ue(function(e){return e.appendChild(d.createComment("")),!e.getElementsByTagName("*").length}),n.getElementsByClassName=Q.test(d.getElementsByClassName),n.getById=ue(function(e){return h.appendChild(e).id=b,!d.getElementsByName||!d.getElementsByName(b).length}),n.getById?(r.filter.ID=function(e){var t=e.replace(Z,ee);return function(e){return e.getAttribute("id")===t}},r.find.ID=function(e,t){if("undefined"!=typeof t.getElementById&&g){var n=t.getElementById(e);return n?[n]:[]}}):(r.filter.ID=function(e){var t=e.replace(Z,ee);return function(e){var n="undefined"!=typeof e.getAttributeNode&&e.getAttributeNode("id");return n&&n.value===t}},r.find.ID=function(e,t){if("undefined"!=typeof t.getElementById&&g){var n,r,i,o=t.getElementById(e);if(o){if((n=o.getAttributeNode("id"))&&n.value===e)return[o];i=t.getElementsByName(e),r=0;while(o=i[r++])if((n=o.getAttributeNode("id"))&&n.value===e)return[o]}return[]}}),r.find.TAG=n.getElementsByTagName?function(e,t){return"undefined"!=typeof t.getElementsByTagName?t.getElementsByTagName(e):n.qsa?t.querySelectorAll(e):void 0}:function(e,t){var n,r=[],i=0,o=t.getElementsByTagName(e);if("*"===e){while(n=o[i++])1===n.nodeType&&r.push(n);return r}return o},r.find.CLASS=n.getElementsByClassName&&function(e,t){if("undefined"!=typeof t.getElementsByClassName&&g)return t.getElementsByClassName(e)},v=[],y=[],(n.qsa=Q.test(d.querySelectorAll))&&(ue(function(e){h.appendChild(e).innerHTML="",e.querySelectorAll("[msallowcapture^='']").length&&y.push("[*^$]="+M+"*(?:''|\"\")"),e.querySelectorAll("[selected]").length||y.push("\\["+M+"*(?:value|"+P+")"),e.querySelectorAll("[id~="+b+"-]").length||y.push("~="),e.querySelectorAll(":checked").length||y.push(":checked"),e.querySelectorAll("a#"+b+"+*").length||y.push(".#.+[+~]")}),ue(function(e){e.innerHTML="";var t=d.createElement("input");t.setAttribute("type","hidden"),e.appendChild(t).setAttribute("name","D"),e.querySelectorAll("[name=d]").length&&y.push("name"+M+"*[*^$|!~]?="),2!==e.querySelectorAll(":enabled").length&&y.push(":enabled",":disabled"),h.appendChild(e).disabled=!0,2!==e.querySelectorAll(":disabled").length&&y.push(":enabled",":disabled"),e.querySelectorAll("*,:x"),y.push(",.*:")})),(n.matchesSelector=Q.test(m=h.matches||h.webkitMatchesSelector||h.mozMatchesSelector||h.oMatchesSelector||h.msMatchesSelector))&&ue(function(e){n.disconnectedMatch=m.call(e,"*"),m.call(e,"[s!='']:x"),v.push("!=",W)}),y=y.length&&new RegExp(y.join("|")),v=v.length&&new RegExp(v.join("|")),t=Q.test(h.compareDocumentPosition),x=t||Q.test(h.contains)?function(e,t){var n=9===e.nodeType?e.documentElement:e,r=t&&t.parentNode;return e===r||!(!r||1!==r.nodeType||!(n.contains?n.contains(r):e.compareDocumentPosition&&16&e.compareDocumentPosition(r)))}:function(e,t){if(t)while(t=t.parentNode)if(t===e)return!0;return!1},D=t?function(e,t){if(e===t)return f=!0,0;var r=!e.compareDocumentPosition-!t.compareDocumentPosition;return r||(1&(r=(e.ownerDocument||e)===(t.ownerDocument||t)?e.compareDocumentPosition(t):1)||!n.sortDetached&&t.compareDocumentPosition(e)===r?e===d||e.ownerDocument===w&&x(w,e)?-1:t===d||t.ownerDocument===w&&x(w,t)?1:c?O(c,e)-O(c,t):0:4&r?-1:1)}:function(e,t){if(e===t)return f=!0,0;var n,r=0,i=e.parentNode,o=t.parentNode,a=[e],s=[t];if(!i||!o)return e===d?-1:t===d?1:i?-1:o?1:c?O(c,e)-O(c,t):0;if(i===o)return ce(e,t);n=e;while(n=n.parentNode)a.unshift(n);n=t;while(n=n.parentNode)s.unshift(n);while(a[r]===s[r])r++;return r?ce(a[r],s[r]):a[r]===w?-1:s[r]===w?1:0},d):d},oe.matches=function(e,t){return oe(e,null,null,t)},oe.matchesSelector=function(e,t){if((e.ownerDocument||e)!==d&&p(e),t=t.replace(z,"='$1']"),n.matchesSelector&&g&&!S[t+" "]&&(!v||!v.test(t))&&(!y||!y.test(t)))try{var r=m.call(e,t);if(r||n.disconnectedMatch||e.document&&11!==e.document.nodeType)return r}catch(e){}return oe(t,d,null,[e]).length>0},oe.contains=function(e,t){return(e.ownerDocument||e)!==d&&p(e),x(e,t)},oe.attr=function(e,t){(e.ownerDocument||e)!==d&&p(e);var i=r.attrHandle[t.toLowerCase()],o=i&&N.call(r.attrHandle,t.toLowerCase())?i(e,t,!g):void 0;return void 0!==o?o:n.attributes||!g?e.getAttribute(t):(o=e.getAttributeNode(t))&&o.specified?o.value:null},oe.escape=function(e){return(e+"").replace(te,ne)},oe.error=function(e){throw new Error("Syntax error, unrecognized expression: "+e)},oe.uniqueSort=function(e){var t,r=[],i=0,o=0;if(f=!n.detectDuplicates,c=!n.sortStable&&e.slice(0),e.sort(D),f){while(t=e[o++])t===e[o]&&(i=r.push(o));while(i--)e.splice(r[i],1)}return c=null,e},i=oe.getText=function(e){var t,n="",r=0,o=e.nodeType;if(o){if(1===o||9===o||11===o){if("string"==typeof e.textContent)return e.textContent;for(e=e.firstChild;e;e=e.nextSibling)n+=i(e)}else if(3===o||4===o)return e.nodeValue}else while(t=e[r++])n+=i(t);return n},(r=oe.selectors={cacheLength:50,createPseudo:se,match:V,attrHandle:{},find:{},relative:{">":{dir:"parentNode",first:!0}," ":{dir:"parentNode"},"+":{dir:"previousSibling",first:!0},"~":{dir:"previousSibling"}},preFilter:{ATTR:function(e){return e[1]=e[1].replace(Z,ee),e[3]=(e[3]||e[4]||e[5]||"").replace(Z,ee),"~="===e[2]&&(e[3]=" "+e[3]+" "),e.slice(0,4)},CHILD:function(e){return e[1]=e[1].toLowerCase(),"nth"===e[1].slice(0,3)?(e[3]||oe.error(e[0]),e[4]=+(e[4]?e[5]+(e[6]||1):2*("even"===e[3]||"odd"===e[3])),e[5]=+(e[7]+e[8]||"odd"===e[3])):e[3]&&oe.error(e[0]),e},PSEUDO:function(e){var t,n=!e[6]&&e[2];return V.CHILD.test(e[0])?null:(e[3]?e[2]=e[4]||e[5]||"":n&&X.test(n)&&(t=a(n,!0))&&(t=n.indexOf(")",n.length-t)-n.length)&&(e[0]=e[0].slice(0,t),e[2]=n.slice(0,t)),e.slice(0,3))}},filter:{TAG:function(e){var t=e.replace(Z,ee).toLowerCase();return"*"===e?function(){return!0}:function(e){return e.nodeName&&e.nodeName.toLowerCase()===t}},CLASS:function(e){var t=E[e+" "];return t||(t=new RegExp("(^|"+M+")"+e+"("+M+"|$)"))&&E(e,function(e){return t.test("string"==typeof e.className&&e.className||"undefined"!=typeof e.getAttribute&&e.getAttribute("class")||"")})},ATTR:function(e,t,n){return function(r){var i=oe.attr(r,e);return null==i?"!="===t:!t||(i+="","="===t?i===n:"!="===t?i!==n:"^="===t?n&&0===i.indexOf(n):"*="===t?n&&i.indexOf(n)>-1:"$="===t?n&&i.slice(-n.length)===n:"~="===t?(" "+i.replace($," ")+" ").indexOf(n)>-1:"|="===t&&(i===n||i.slice(0,n.length+1)===n+"-"))}},CHILD:function(e,t,n,r,i){var o="nth"!==e.slice(0,3),a="last"!==e.slice(-4),s="of-type"===t;return 1===r&&0===i?function(e){return!!e.parentNode}:function(t,n,u){var l,c,f,p,d,h,g=o!==a?"nextSibling":"previousSibling",y=t.parentNode,v=s&&t.nodeName.toLowerCase(),m=!u&&!s,x=!1;if(y){if(o){while(g){p=t;while(p=p[g])if(s?p.nodeName.toLowerCase()===v:1===p.nodeType)return!1;h=g="only"===e&&!h&&"nextSibling"}return!0}if(h=[a?y.firstChild:y.lastChild],a&&m){x=(d=(l=(c=(f=(p=y)[b]||(p[b]={}))[p.uniqueID]||(f[p.uniqueID]={}))[e]||[])[0]===T&&l[1])&&l[2],p=d&&y.childNodes[d];while(p=++d&&p&&p[g]||(x=d=0)||h.pop())if(1===p.nodeType&&++x&&p===t){c[e]=[T,d,x];break}}else if(m&&(x=d=(l=(c=(f=(p=t)[b]||(p[b]={}))[p.uniqueID]||(f[p.uniqueID]={}))[e]||[])[0]===T&&l[1]),!1===x)while(p=++d&&p&&p[g]||(x=d=0)||h.pop())if((s?p.nodeName.toLowerCase()===v:1===p.nodeType)&&++x&&(m&&((c=(f=p[b]||(p[b]={}))[p.uniqueID]||(f[p.uniqueID]={}))[e]=[T,x]),p===t))break;return(x-=i)===r||x%r==0&&x/r>=0}}},PSEUDO:function(e,t){var n,i=r.pseudos[e]||r.setFilters[e.toLowerCase()]||oe.error("unsupported pseudo: "+e);return i[b]?i(t):i.length>1?(n=[e,e,"",t],r.setFilters.hasOwnProperty(e.toLowerCase())?se(function(e,n){var r,o=i(e,t),a=o.length;while(a--)e[r=O(e,o[a])]=!(n[r]=o[a])}):function(e){return i(e,0,n)}):i}},pseudos:{not:se(function(e){var t=[],n=[],r=s(e.replace(B,"$1"));return r[b]?se(function(e,t,n,i){var o,a=r(e,null,i,[]),s=e.length;while(s--)(o=a[s])&&(e[s]=!(t[s]=o))}):function(e,i,o){return t[0]=e,r(t,null,o,n),t[0]=null,!n.pop()}}),has:se(function(e){return function(t){return oe(e,t).length>0}}),contains:se(function(e){return e=e.replace(Z,ee),function(t){return(t.textContent||t.innerText||i(t)).indexOf(e)>-1}}),lang:se(function(e){return U.test(e||"")||oe.error("unsupported lang: "+e),e=e.replace(Z,ee).toLowerCase(),function(t){var n;do{if(n=g?t.lang:t.getAttribute("xml:lang")||t.getAttribute("lang"))return(n=n.toLowerCase())===e||0===n.indexOf(e+"-")}while((t=t.parentNode)&&1===t.nodeType);return!1}}),target:function(t){var n=e.location&&e.location.hash;return n&&n.slice(1)===t.id},root:function(e){return e===h},focus:function(e){return e===d.activeElement&&(!d.hasFocus||d.hasFocus())&&!!(e.type||e.href||~e.tabIndex)},enabled:de(!1),disabled:de(!0),checked:function(e){var t=e.nodeName.toLowerCase();return"input"===t&&!!e.checked||"option"===t&&!!e.selected},selected:function(e){return e.parentNode&&e.parentNode.selectedIndex,!0===e.selected},empty:function(e){for(e=e.firstChild;e;e=e.nextSibling)if(e.nodeType<6)return!1;return!0},parent:function(e){return!r.pseudos.empty(e)},header:function(e){return Y.test(e.nodeName)},input:function(e){return G.test(e.nodeName)},button:function(e){var t=e.nodeName.toLowerCase();return"input"===t&&"button"===e.type||"button"===t},text:function(e){var t;return"input"===e.nodeName.toLowerCase()&&"text"===e.type&&(null==(t=e.getAttribute("type"))||"text"===t.toLowerCase())},first:he(function(){return[0]}),last:he(function(e,t){return[t-1]}),eq:he(function(e,t,n){return[n<0?n+t:n]}),even:he(function(e,t){for(var n=0;n=0;)e.push(r);return e}),gt:he(function(e,t,n){for(var r=n<0?n+t:n;++r1?function(t,n,r){var i=e.length;while(i--)if(!e[i](t,n,r))return!1;return!0}:e[0]}function be(e,t,n){for(var r=0,i=t.length;r-1&&(o[l]=!(a[l]=f))}}else v=we(v===a?v.splice(h,v.length):v),i?i(null,a,v,u):L.apply(a,v)})}function Ce(e){for(var t,n,i,o=e.length,a=r.relative[e[0].type],s=a||r.relative[" "],u=a?1:0,c=me(function(e){return e===t},s,!0),f=me(function(e){return O(t,e)>-1},s,!0),p=[function(e,n,r){var i=!a&&(r||n!==l)||((t=n).nodeType?c(e,n,r):f(e,n,r));return t=null,i}];u1&&xe(p),u>1&&ve(e.slice(0,u-1).concat({value:" "===e[u-2].type?"*":""})).replace(B,"$1"),n,u0,i=e.length>0,o=function(o,a,s,u,c){var f,h,y,v=0,m="0",x=o&&[],b=[],w=l,C=o||i&&r.find.TAG("*",c),E=T+=null==w?1:Math.random()||.1,k=C.length;for(c&&(l=a===d||a||c);m!==k&&null!=(f=C[m]);m++){if(i&&f){h=0,a||f.ownerDocument===d||(p(f),s=!g);while(y=e[h++])if(y(f,a||d,s)){u.push(f);break}c&&(T=E)}n&&((f=!y&&f)&&v--,o&&x.push(f))}if(v+=m,n&&m!==v){h=0;while(y=t[h++])y(x,b,a,s);if(o){if(v>0)while(m--)x[m]||b[m]||(b[m]=j.call(u));b=we(b)}L.apply(u,b),c&&!o&&b.length>0&&v+t.length>1&&oe.uniqueSort(u)}return c&&(T=E,l=w),x};return n?se(o):o}return s=oe.compile=function(e,t){var n,r=[],i=[],o=S[e+" "];if(!o){t||(t=a(e)),n=t.length;while(n--)(o=Ce(t[n]))[b]?r.push(o):i.push(o);(o=S(e,Ee(i,r))).selector=e}return o},u=oe.select=function(e,t,n,i){var o,u,l,c,f,p="function"==typeof e&&e,d=!i&&a(e=p.selector||e);if(n=n||[],1===d.length){if((u=d[0]=d[0].slice(0)).length>2&&"ID"===(l=u[0]).type&&9===t.nodeType&&g&&r.relative[u[1].type]){if(!(t=(r.find.ID(l.matches[0].replace(Z,ee),t)||[])[0]))return n;p&&(t=t.parentNode),e=e.slice(u.shift().value.length)}o=V.needsContext.test(e)?0:u.length;while(o--){if(l=u[o],r.relative[c=l.type])break;if((f=r.find[c])&&(i=f(l.matches[0].replace(Z,ee),K.test(u[0].type)&&ge(t.parentNode)||t))){if(u.splice(o,1),!(e=i.length&&ve(u)))return L.apply(n,i),n;break}}}return(p||s(e,d))(i,t,!g,n,!t||K.test(e)&&ge(t.parentNode)||t),n},n.sortStable=b.split("").sort(D).join("")===b,n.detectDuplicates=!!f,p(),n.sortDetached=ue(function(e){return 1&e.compareDocumentPosition(d.createElement("fieldset"))}),ue(function(e){return e.innerHTML="","#"===e.firstChild.getAttribute("href")})||le("type|href|height|width",function(e,t,n){if(!n)return e.getAttribute(t,"type"===t.toLowerCase()?1:2)}),n.attributes&&ue(function(e){return e.innerHTML="",e.firstChild.setAttribute("value",""),""===e.firstChild.getAttribute("value")})||le("value",function(e,t,n){if(!n&&"input"===e.nodeName.toLowerCase())return e.defaultValue}),ue(function(e){return null==e.getAttribute("disabled")})||le(P,function(e,t,n){var r;if(!n)return!0===e[t]?t.toLowerCase():(r=e.getAttributeNode(t))&&r.specified?r.value:null}),oe}(e);w.find=E,w.expr=E.selectors,w.expr[":"]=w.expr.pseudos,w.uniqueSort=w.unique=E.uniqueSort,w.text=E.getText,w.isXMLDoc=E.isXML,w.contains=E.contains,w.escapeSelector=E.escape;var k=function(e,t,n){var r=[],i=void 0!==n;while((e=e[t])&&9!==e.nodeType)if(1===e.nodeType){if(i&&w(e).is(n))break;r.push(e)}return r},S=function(e,t){for(var n=[];e;e=e.nextSibling)1===e.nodeType&&e!==t&&n.push(e);return n},D=w.expr.match.needsContext;function N(e,t){return e.nodeName&&e.nodeName.toLowerCase()===t.toLowerCase()}var A=/^<([a-z][^\/\0>:\x20\t\r\n\f]*)[\x20\t\r\n\f]*\/?>(?:<\/\1>|)$/i;function j(e,t,n){return g(t)?w.grep(e,function(e,r){return!!t.call(e,r,e)!==n}):t.nodeType?w.grep(e,function(e){return e===t!==n}):"string"!=typeof t?w.grep(e,function(e){return u.call(t,e)>-1!==n}):w.filter(t,e,n)}w.filter=function(e,t,n){var r=t[0];return n&&(e=":not("+e+")"),1===t.length&&1===r.nodeType?w.find.matchesSelector(r,e)?[r]:[]:w.find.matches(e,w.grep(t,function(e){return 1===e.nodeType}))},w.fn.extend({find:function(e){var t,n,r=this.length,i=this;if("string"!=typeof e)return this.pushStack(w(e).filter(function(){for(t=0;t1?w.uniqueSort(n):n},filter:function(e){return this.pushStack(j(this,e||[],!1))},not:function(e){return this.pushStack(j(this,e||[],!0))},is:function(e){return!!j(this,"string"==typeof e&&D.test(e)?w(e):e||[],!1).length}});var q,L=/^(?:\s*(<[\w\W]+>)[^>]*|#([\w-]+))$/;(w.fn.init=function(e,t,n){var i,o;if(!e)return this;if(n=n||q,"string"==typeof e){if(!(i="<"===e[0]&&">"===e[e.length-1]&&e.length>=3?[null,e,null]:L.exec(e))||!i[1]&&t)return!t||t.jquery?(t||n).find(e):this.constructor(t).find(e);if(i[1]){if(t=t instanceof w?t[0]:t,w.merge(this,w.parseHTML(i[1],t&&t.nodeType?t.ownerDocument||t:r,!0)),A.test(i[1])&&w.isPlainObject(t))for(i in t)g(this[i])?this[i](t[i]):this.attr(i,t[i]);return this}return(o=r.getElementById(i[2]))&&(this[0]=o,this.length=1),this}return e.nodeType?(this[0]=e,this.length=1,this):g(e)?void 0!==n.ready?n.ready(e):e(w):w.makeArray(e,this)}).prototype=w.fn,q=w(r);var H=/^(?:parents|prev(?:Until|All))/,O={children:!0,contents:!0,next:!0,prev:!0};w.fn.extend({has:function(e){var t=w(e,this),n=t.length;return this.filter(function(){for(var e=0;e-1:1===n.nodeType&&w.find.matchesSelector(n,e))){o.push(n);break}return this.pushStack(o.length>1?w.uniqueSort(o):o)},index:function(e){return e?"string"==typeof e?u.call(w(e),this[0]):u.call(this,e.jquery?e[0]:e):this[0]&&this[0].parentNode?this.first().prevAll().length:-1},add:function(e,t){return this.pushStack(w.uniqueSort(w.merge(this.get(),w(e,t))))},addBack:function(e){return this.add(null==e?this.prevObject:this.prevObject.filter(e))}});function P(e,t){while((e=e[t])&&1!==e.nodeType);return e}w.each({parent:function(e){var t=e.parentNode;return t&&11!==t.nodeType?t:null},parents:function(e){return k(e,"parentNode")},parentsUntil:function(e,t,n){return k(e,"parentNode",n)},next:function(e){return P(e,"nextSibling")},prev:function(e){return P(e,"previousSibling")},nextAll:function(e){return k(e,"nextSibling")},prevAll:function(e){return k(e,"previousSibling")},nextUntil:function(e,t,n){return k(e,"nextSibling",n)},prevUntil:function(e,t,n){return k(e,"previousSibling",n)},siblings:function(e){return S((e.parentNode||{}).firstChild,e)},children:function(e){return S(e.firstChild)},contents:function(e){return N(e,"iframe")?e.contentDocument:(N(e,"template")&&(e=e.content||e),w.merge([],e.childNodes))}},function(e,t){w.fn[e]=function(n,r){var i=w.map(this,t,n);return"Until"!==e.slice(-5)&&(r=n),r&&"string"==typeof r&&(i=w.filter(r,i)),this.length>1&&(O[e]||w.uniqueSort(i),H.test(e)&&i.reverse()),this.pushStack(i)}});var M=/[^\x20\t\r\n\f]+/g;function R(e){var t={};return w.each(e.match(M)||[],function(e,n){t[n]=!0}),t}w.Callbacks=function(e){e="string"==typeof e?R(e):w.extend({},e);var t,n,r,i,o=[],a=[],s=-1,u=function(){for(i=i||e.once,r=t=!0;a.length;s=-1){n=a.shift();while(++s-1)o.splice(n,1),n<=s&&s--}),this},has:function(e){return e?w.inArray(e,o)>-1:o.length>0},empty:function(){return o&&(o=[]),this},disable:function(){return i=a=[],o=n="",this},disabled:function(){return!o},lock:function(){return i=a=[],n||t||(o=n=""),this},locked:function(){return!!i},fireWith:function(e,n){return i||(n=[e,(n=n||[]).slice?n.slice():n],a.push(n),t||u()),this},fire:function(){return l.fireWith(this,arguments),this},fired:function(){return!!r}};return l};function I(e){return e}function W(e){throw e}function $(e,t,n,r){var i;try{e&&g(i=e.promise)?i.call(e).done(t).fail(n):e&&g(i=e.then)?i.call(e,t,n):t.apply(void 0,[e].slice(r))}catch(e){n.apply(void 0,[e])}}w.extend({Deferred:function(t){var n=[["notify","progress",w.Callbacks("memory"),w.Callbacks("memory"),2],["resolve","done",w.Callbacks("once memory"),w.Callbacks("once memory"),0,"resolved"],["reject","fail",w.Callbacks("once memory"),w.Callbacks("once memory"),1,"rejected"]],r="pending",i={state:function(){return r},always:function(){return o.done(arguments).fail(arguments),this},"catch":function(e){return i.then(null,e)},pipe:function(){var e=arguments;return w.Deferred(function(t){w.each(n,function(n,r){var i=g(e[r[4]])&&e[r[4]];o[r[1]](function(){var e=i&&i.apply(this,arguments);e&&g(e.promise)?e.promise().progress(t.notify).done(t.resolve).fail(t.reject):t[r[0]+"With"](this,i?[e]:arguments)})}),e=null}).promise()},then:function(t,r,i){var o=0;function a(t,n,r,i){return function(){var s=this,u=arguments,l=function(){var e,l;if(!(t=o&&(r!==W&&(s=void 0,u=[e]),n.rejectWith(s,u))}};t?c():(w.Deferred.getStackHook&&(c.stackTrace=w.Deferred.getStackHook()),e.setTimeout(c))}}return w.Deferred(function(e){n[0][3].add(a(0,e,g(i)?i:I,e.notifyWith)),n[1][3].add(a(0,e,g(t)?t:I)),n[2][3].add(a(0,e,g(r)?r:W))}).promise()},promise:function(e){return null!=e?w.extend(e,i):i}},o={};return w.each(n,function(e,t){var a=t[2],s=t[5];i[t[1]]=a.add,s&&a.add(function(){r=s},n[3-e][2].disable,n[3-e][3].disable,n[0][2].lock,n[0][3].lock),a.add(t[3].fire),o[t[0]]=function(){return o[t[0]+"With"](this===o?void 0:this,arguments),this},o[t[0]+"With"]=a.fireWith}),i.promise(o),t&&t.call(o,o),o},when:function(e){var t=arguments.length,n=t,r=Array(n),i=o.call(arguments),a=w.Deferred(),s=function(e){return function(n){r[e]=this,i[e]=arguments.length>1?o.call(arguments):n,--t||a.resolveWith(r,i)}};if(t<=1&&($(e,a.done(s(n)).resolve,a.reject,!t),"pending"===a.state()||g(i[n]&&i[n].then)))return a.then();while(n--)$(i[n],s(n),a.reject);return a.promise()}});var B=/^(Eval|Internal|Range|Reference|Syntax|Type|URI)Error$/;w.Deferred.exceptionHook=function(t,n){e.console&&e.console.warn&&t&&B.test(t.name)&&e.console.warn("jQuery.Deferred exception: "+t.message,t.stack,n)},w.readyException=function(t){e.setTimeout(function(){throw t})};var F=w.Deferred();w.fn.ready=function(e){return F.then(e)["catch"](function(e){w.readyException(e)}),this},w.extend({isReady:!1,readyWait:1,ready:function(e){(!0===e?--w.readyWait:w.isReady)||(w.isReady=!0,!0!==e&&--w.readyWait>0||F.resolveWith(r,[w]))}}),w.ready.then=F.then;function _(){r.removeEventListener("DOMContentLoaded",_),e.removeEventListener("load",_),w.ready()}"complete"===r.readyState||"loading"!==r.readyState&&!r.documentElement.doScroll?e.setTimeout(w.ready):(r.addEventListener("DOMContentLoaded",_),e.addEventListener("load",_));var z=function(e,t,n,r,i,o,a){var s=0,u=e.length,l=null==n;if("object"===x(n)){i=!0;for(s in n)z(e,t,s,n[s],!0,o,a)}else if(void 0!==r&&(i=!0,g(r)||(a=!0),l&&(a?(t.call(e,r),t=null):(l=t,t=function(e,t,n){return l.call(w(e),n)})),t))for(;s1,null,!0)},removeData:function(e){return this.each(function(){K.remove(this,e)})}}),w.extend({queue:function(e,t,n){var r;if(e)return t=(t||"fx")+"queue",r=J.get(e,t),n&&(!r||Array.isArray(n)?r=J.access(e,t,w.makeArray(n)):r.push(n)),r||[]},dequeue:function(e,t){t=t||"fx";var n=w.queue(e,t),r=n.length,i=n.shift(),o=w._queueHooks(e,t),a=function(){w.dequeue(e,t)};"inprogress"===i&&(i=n.shift(),r--),i&&("fx"===t&&n.unshift("inprogress"),delete o.stop,i.call(e,a,o)),!r&&o&&o.empty.fire()},_queueHooks:function(e,t){var n=t+"queueHooks";return J.get(e,n)||J.access(e,n,{empty:w.Callbacks("once memory").add(function(){J.remove(e,[t+"queue",n])})})}}),w.fn.extend({queue:function(e,t){var n=2;return"string"!=typeof e&&(t=e,e="fx",n--),arguments.length\x20\t\r\n\f]+)/i,he=/^$|^module$|\/(?:java|ecma)script/i,ge={option:[1,""],thead:[1,"","
"],col:[2,"","
"],tr:[2,"","
"],td:[3,"","
"],_default:[0,"",""]};ge.optgroup=ge.option,ge.tbody=ge.tfoot=ge.colgroup=ge.caption=ge.thead,ge.th=ge.td;function ye(e,t){var n;return n="undefined"!=typeof e.getElementsByTagName?e.getElementsByTagName(t||"*"):"undefined"!=typeof e.querySelectorAll?e.querySelectorAll(t||"*"):[],void 0===t||t&&N(e,t)?w.merge([e],n):n}function ve(e,t){for(var n=0,r=e.length;n-1)i&&i.push(o);else if(l=w.contains(o.ownerDocument,o),a=ye(f.appendChild(o),"script"),l&&ve(a),n){c=0;while(o=a[c++])he.test(o.type||"")&&n.push(o)}return f}!function(){var e=r.createDocumentFragment().appendChild(r.createElement("div")),t=r.createElement("input");t.setAttribute("type","radio"),t.setAttribute("checked","checked"),t.setAttribute("name","t"),e.appendChild(t),h.checkClone=e.cloneNode(!0).cloneNode(!0).lastChild.checked,e.innerHTML="",h.noCloneChecked=!!e.cloneNode(!0).lastChild.defaultValue}();var be=r.documentElement,we=/^key/,Te=/^(?:mouse|pointer|contextmenu|drag|drop)|click/,Ce=/^([^.]*)(?:\.(.+)|)/;function Ee(){return!0}function ke(){return!1}function Se(){try{return r.activeElement}catch(e){}}function De(e,t,n,r,i,o){var a,s;if("object"==typeof t){"string"!=typeof n&&(r=r||n,n=void 0);for(s in t)De(e,s,n,r,t[s],o);return e}if(null==r&&null==i?(i=n,r=n=void 0):null==i&&("string"==typeof n?(i=r,r=void 0):(i=r,r=n,n=void 0)),!1===i)i=ke;else if(!i)return e;return 1===o&&(a=i,(i=function(e){return w().off(e),a.apply(this,arguments)}).guid=a.guid||(a.guid=w.guid++)),e.each(function(){w.event.add(this,t,i,r,n)})}w.event={global:{},add:function(e,t,n,r,i){var o,a,s,u,l,c,f,p,d,h,g,y=J.get(e);if(y){n.handler&&(n=(o=n).handler,i=o.selector),i&&w.find.matchesSelector(be,i),n.guid||(n.guid=w.guid++),(u=y.events)||(u=y.events={}),(a=y.handle)||(a=y.handle=function(t){return"undefined"!=typeof w&&w.event.triggered!==t.type?w.event.dispatch.apply(e,arguments):void 0}),l=(t=(t||"").match(M)||[""]).length;while(l--)d=g=(s=Ce.exec(t[l])||[])[1],h=(s[2]||"").split(".").sort(),d&&(f=w.event.special[d]||{},d=(i?f.delegateType:f.bindType)||d,f=w.event.special[d]||{},c=w.extend({type:d,origType:g,data:r,handler:n,guid:n.guid,selector:i,needsContext:i&&w.expr.match.needsContext.test(i),namespace:h.join(".")},o),(p=u[d])||((p=u[d]=[]).delegateCount=0,f.setup&&!1!==f.setup.call(e,r,h,a)||e.addEventListener&&e.addEventListener(d,a)),f.add&&(f.add.call(e,c),c.handler.guid||(c.handler.guid=n.guid)),i?p.splice(p.delegateCount++,0,c):p.push(c),w.event.global[d]=!0)}},remove:function(e,t,n,r,i){var o,a,s,u,l,c,f,p,d,h,g,y=J.hasData(e)&&J.get(e);if(y&&(u=y.events)){l=(t=(t||"").match(M)||[""]).length;while(l--)if(s=Ce.exec(t[l])||[],d=g=s[1],h=(s[2]||"").split(".").sort(),d){f=w.event.special[d]||{},p=u[d=(r?f.delegateType:f.bindType)||d]||[],s=s[2]&&new RegExp("(^|\\.)"+h.join("\\.(?:.*\\.|)")+"(\\.|$)"),a=o=p.length;while(o--)c=p[o],!i&&g!==c.origType||n&&n.guid!==c.guid||s&&!s.test(c.namespace)||r&&r!==c.selector&&("**"!==r||!c.selector)||(p.splice(o,1),c.selector&&p.delegateCount--,f.remove&&f.remove.call(e,c));a&&!p.length&&(f.teardown&&!1!==f.teardown.call(e,h,y.handle)||w.removeEvent(e,d,y.handle),delete u[d])}else for(d in u)w.event.remove(e,d+t[l],n,r,!0);w.isEmptyObject(u)&&J.remove(e,"handle events")}},dispatch:function(e){var t=w.event.fix(e),n,r,i,o,a,s,u=new Array(arguments.length),l=(J.get(this,"events")||{})[t.type]||[],c=w.event.special[t.type]||{};for(u[0]=t,n=1;n=1))for(;l!==this;l=l.parentNode||this)if(1===l.nodeType&&("click"!==e.type||!0!==l.disabled)){for(o=[],a={},n=0;n-1:w.find(i,this,null,[l]).length),a[i]&&o.push(r);o.length&&s.push({elem:l,handlers:o})}return l=this,u\x20\t\r\n\f]*)[^>]*)\/>/gi,Ae=/\s*$/g;function Le(e,t){return N(e,"table")&&N(11!==t.nodeType?t:t.firstChild,"tr")?w(e).children("tbody")[0]||e:e}function He(e){return e.type=(null!==e.getAttribute("type"))+"/"+e.type,e}function Oe(e){return"true/"===(e.type||"").slice(0,5)?e.type=e.type.slice(5):e.removeAttribute("type"),e}function Pe(e,t){var n,r,i,o,a,s,u,l;if(1===t.nodeType){if(J.hasData(e)&&(o=J.access(e),a=J.set(t,o),l=o.events)){delete a.handle,a.events={};for(i in l)for(n=0,r=l[i].length;n1&&"string"==typeof y&&!h.checkClone&&je.test(y))return e.each(function(i){var o=e.eq(i);v&&(t[0]=y.call(this,i,o.html())),Re(o,t,n,r)});if(p&&(i=xe(t,e[0].ownerDocument,!1,e,r),o=i.firstChild,1===i.childNodes.length&&(i=o),o||r)){for(u=(s=w.map(ye(i,"script"),He)).length;f")},clone:function(e,t,n){var r,i,o,a,s=e.cloneNode(!0),u=w.contains(e.ownerDocument,e);if(!(h.noCloneChecked||1!==e.nodeType&&11!==e.nodeType||w.isXMLDoc(e)))for(a=ye(s),r=0,i=(o=ye(e)).length;r0&&ve(a,!u&&ye(e,"script")),s},cleanData:function(e){for(var t,n,r,i=w.event.special,o=0;void 0!==(n=e[o]);o++)if(Y(n)){if(t=n[J.expando]){if(t.events)for(r in t.events)i[r]?w.event.remove(n,r):w.removeEvent(n,r,t.handle);n[J.expando]=void 0}n[K.expando]&&(n[K.expando]=void 0)}}}),w.fn.extend({detach:function(e){return Ie(this,e,!0)},remove:function(e){return Ie(this,e)},text:function(e){return z(this,function(e){return void 0===e?w.text(this):this.empty().each(function(){1!==this.nodeType&&11!==this.nodeType&&9!==this.nodeType||(this.textContent=e)})},null,e,arguments.length)},append:function(){return Re(this,arguments,function(e){1!==this.nodeType&&11!==this.nodeType&&9!==this.nodeType||Le(this,e).appendChild(e)})},prepend:function(){return Re(this,arguments,function(e){if(1===this.nodeType||11===this.nodeType||9===this.nodeType){var t=Le(this,e);t.insertBefore(e,t.firstChild)}})},before:function(){return Re(this,arguments,function(e){this.parentNode&&this.parentNode.insertBefore(e,this)})},after:function(){return Re(this,arguments,function(e){this.parentNode&&this.parentNode.insertBefore(e,this.nextSibling)})},empty:function(){for(var e,t=0;null!=(e=this[t]);t++)1===e.nodeType&&(w.cleanData(ye(e,!1)),e.textContent="");return this},clone:function(e,t){return e=null!=e&&e,t=null==t?e:t,this.map(function(){return w.clone(this,e,t)})},html:function(e){return z(this,function(e){var t=this[0]||{},n=0,r=this.length;if(void 0===e&&1===t.nodeType)return t.innerHTML;if("string"==typeof e&&!Ae.test(e)&&!ge[(de.exec(e)||["",""])[1].toLowerCase()]){e=w.htmlPrefilter(e);try{for(;n=0&&(u+=Math.max(0,Math.ceil(e["offset"+t[0].toUpperCase()+t.slice(1)]-o-u-s-.5))),u}function et(e,t,n){var r=$e(e),i=Fe(e,t,r),o="border-box"===w.css(e,"boxSizing",!1,r),a=o;if(We.test(i)){if(!n)return i;i="auto"}return a=a&&(h.boxSizingReliable()||i===e.style[t]),("auto"===i||!parseFloat(i)&&"inline"===w.css(e,"display",!1,r))&&(i=e["offset"+t[0].toUpperCase()+t.slice(1)],a=!0),(i=parseFloat(i)||0)+Ze(e,t,n||(o?"border":"content"),a,r,i)+"px"}w.extend({cssHooks:{opacity:{get:function(e,t){if(t){var n=Fe(e,"opacity");return""===n?"1":n}}}},cssNumber:{animationIterationCount:!0,columnCount:!0,fillOpacity:!0,flexGrow:!0,flexShrink:!0,fontWeight:!0,lineHeight:!0,opacity:!0,order:!0,orphans:!0,widows:!0,zIndex:!0,zoom:!0},cssProps:{},style:function(e,t,n,r){if(e&&3!==e.nodeType&&8!==e.nodeType&&e.style){var i,o,a,s=G(t),u=Xe.test(t),l=e.style;if(u||(t=Je(s)),a=w.cssHooks[t]||w.cssHooks[s],void 0===n)return a&&"get"in a&&void 0!==(i=a.get(e,!1,r))?i:l[t];"string"==(o=typeof n)&&(i=ie.exec(n))&&i[1]&&(n=ue(e,t,i),o="number"),null!=n&&n===n&&("number"===o&&(n+=i&&i[3]||(w.cssNumber[s]?"":"px")),h.clearCloneStyle||""!==n||0!==t.indexOf("background")||(l[t]="inherit"),a&&"set"in a&&void 0===(n=a.set(e,n,r))||(u?l.setProperty(t,n):l[t]=n))}},css:function(e,t,n,r){var i,o,a,s=G(t);return Xe.test(t)||(t=Je(s)),(a=w.cssHooks[t]||w.cssHooks[s])&&"get"in a&&(i=a.get(e,!0,n)),void 0===i&&(i=Fe(e,t,r)),"normal"===i&&t in Ve&&(i=Ve[t]),""===n||n?(o=parseFloat(i),!0===n||isFinite(o)?o||0:i):i}}),w.each(["height","width"],function(e,t){w.cssHooks[t]={get:function(e,n,r){if(n)return!ze.test(w.css(e,"display"))||e.getClientRects().length&&e.getBoundingClientRect().width?et(e,t,r):se(e,Ue,function(){return et(e,t,r)})},set:function(e,n,r){var i,o=$e(e),a="border-box"===w.css(e,"boxSizing",!1,o),s=r&&Ze(e,t,r,a,o);return a&&h.scrollboxSize()===o.position&&(s-=Math.ceil(e["offset"+t[0].toUpperCase()+t.slice(1)]-parseFloat(o[t])-Ze(e,t,"border",!1,o)-.5)),s&&(i=ie.exec(n))&&"px"!==(i[3]||"px")&&(e.style[t]=n,n=w.css(e,t)),Ke(e,n,s)}}}),w.cssHooks.marginLeft=_e(h.reliableMarginLeft,function(e,t){if(t)return(parseFloat(Fe(e,"marginLeft"))||e.getBoundingClientRect().left-se(e,{marginLeft:0},function(){return e.getBoundingClientRect().left}))+"px"}),w.each({margin:"",padding:"",border:"Width"},function(e,t){w.cssHooks[e+t]={expand:function(n){for(var r=0,i={},o="string"==typeof n?n.split(" "):[n];r<4;r++)i[e+oe[r]+t]=o[r]||o[r-2]||o[0];return i}},"margin"!==e&&(w.cssHooks[e+t].set=Ke)}),w.fn.extend({css:function(e,t){return z(this,function(e,t,n){var r,i,o={},a=0;if(Array.isArray(t)){for(r=$e(e),i=t.length;a1)}});function tt(e,t,n,r,i){return new tt.prototype.init(e,t,n,r,i)}w.Tween=tt,tt.prototype={constructor:tt,init:function(e,t,n,r,i,o){this.elem=e,this.prop=n,this.easing=i||w.easing._default,this.options=t,this.start=this.now=this.cur(),this.end=r,this.unit=o||(w.cssNumber[n]?"":"px")},cur:function(){var e=tt.propHooks[this.prop];return e&&e.get?e.get(this):tt.propHooks._default.get(this)},run:function(e){var t,n=tt.propHooks[this.prop];return this.options.duration?this.pos=t=w.easing[this.easing](e,this.options.duration*e,0,1,this.options.duration):this.pos=t=e,this.now=(this.end-this.start)*t+this.start,this.options.step&&this.options.step.call(this.elem,this.now,this),n&&n.set?n.set(this):tt.propHooks._default.set(this),this}},tt.prototype.init.prototype=tt.prototype,tt.propHooks={_default:{get:function(e){var t;return 1!==e.elem.nodeType||null!=e.elem[e.prop]&&null==e.elem.style[e.prop]?e.elem[e.prop]:(t=w.css(e.elem,e.prop,""))&&"auto"!==t?t:0},set:function(e){w.fx.step[e.prop]?w.fx.step[e.prop](e):1!==e.elem.nodeType||null==e.elem.style[w.cssProps[e.prop]]&&!w.cssHooks[e.prop]?e.elem[e.prop]=e.now:w.style(e.elem,e.prop,e.now+e.unit)}}},tt.propHooks.scrollTop=tt.propHooks.scrollLeft={set:function(e){e.elem.nodeType&&e.elem.parentNode&&(e.elem[e.prop]=e.now)}},w.easing={linear:function(e){return e},swing:function(e){return.5-Math.cos(e*Math.PI)/2},_default:"swing"},w.fx=tt.prototype.init,w.fx.step={};var nt,rt,it=/^(?:toggle|show|hide)$/,ot=/queueHooks$/;function at(){rt&&(!1===r.hidden&&e.requestAnimationFrame?e.requestAnimationFrame(at):e.setTimeout(at,w.fx.interval),w.fx.tick())}function st(){return e.setTimeout(function(){nt=void 0}),nt=Date.now()}function ut(e,t){var n,r=0,i={height:e};for(t=t?1:0;r<4;r+=2-t)i["margin"+(n=oe[r])]=i["padding"+n]=e;return t&&(i.opacity=i.width=e),i}function lt(e,t,n){for(var r,i=(pt.tweeners[t]||[]).concat(pt.tweeners["*"]),o=0,a=i.length;o1)},removeAttr:function(e){return this.each(function(){w.removeAttr(this,e)})}}),w.extend({attr:function(e,t,n){var r,i,o=e.nodeType;if(3!==o&&8!==o&&2!==o)return"undefined"==typeof e.getAttribute?w.prop(e,t,n):(1===o&&w.isXMLDoc(e)||(i=w.attrHooks[t.toLowerCase()]||(w.expr.match.bool.test(t)?dt:void 0)),void 0!==n?null===n?void w.removeAttr(e,t):i&&"set"in i&&void 0!==(r=i.set(e,n,t))?r:(e.setAttribute(t,n+""),n):i&&"get"in i&&null!==(r=i.get(e,t))?r:null==(r=w.find.attr(e,t))?void 0:r)},attrHooks:{type:{set:function(e,t){if(!h.radioValue&&"radio"===t&&N(e,"input")){var n=e.value;return e.setAttribute("type",t),n&&(e.value=n),t}}}},removeAttr:function(e,t){var n,r=0,i=t&&t.match(M);if(i&&1===e.nodeType)while(n=i[r++])e.removeAttribute(n)}}),dt={set:function(e,t,n){return!1===t?w.removeAttr(e,n):e.setAttribute(n,n),n}},w.each(w.expr.match.bool.source.match(/\w+/g),function(e,t){var n=ht[t]||w.find.attr;ht[t]=function(e,t,r){var i,o,a=t.toLowerCase();return r||(o=ht[a],ht[a]=i,i=null!=n(e,t,r)?a:null,ht[a]=o),i}});var gt=/^(?:input|select|textarea|button)$/i,yt=/^(?:a|area)$/i;w.fn.extend({prop:function(e,t){return z(this,w.prop,e,t,arguments.length>1)},removeProp:function(e){return this.each(function(){delete this[w.propFix[e]||e]})}}),w.extend({prop:function(e,t,n){var r,i,o=e.nodeType;if(3!==o&&8!==o&&2!==o)return 1===o&&w.isXMLDoc(e)||(t=w.propFix[t]||t,i=w.propHooks[t]),void 0!==n?i&&"set"in i&&void 0!==(r=i.set(e,n,t))?r:e[t]=n:i&&"get"in i&&null!==(r=i.get(e,t))?r:e[t]},propHooks:{tabIndex:{get:function(e){var t=w.find.attr(e,"tabindex");return t?parseInt(t,10):gt.test(e.nodeName)||yt.test(e.nodeName)&&e.href?0:-1}}},propFix:{"for":"htmlFor","class":"className"}}),h.optSelected||(w.propHooks.selected={get:function(e){var t=e.parentNode;return t&&t.parentNode&&t.parentNode.selectedIndex,null},set:function(e){var t=e.parentNode;t&&(t.selectedIndex,t.parentNode&&t.parentNode.selectedIndex)}}),w.each(["tabIndex","readOnly","maxLength","cellSpacing","cellPadding","rowSpan","colSpan","useMap","frameBorder","contentEditable"],function(){w.propFix[this.toLowerCase()]=this});function vt(e){return(e.match(M)||[]).join(" ")}function mt(e){return e.getAttribute&&e.getAttribute("class")||""}function xt(e){return Array.isArray(e)?e:"string"==typeof e?e.match(M)||[]:[]}w.fn.extend({addClass:function(e){var t,n,r,i,o,a,s,u=0;if(g(e))return this.each(function(t){w(this).addClass(e.call(this,t,mt(this)))});if((t=xt(e)).length)while(n=this[u++])if(i=mt(n),r=1===n.nodeType&&" "+vt(i)+" "){a=0;while(o=t[a++])r.indexOf(" "+o+" ")<0&&(r+=o+" ");i!==(s=vt(r))&&n.setAttribute("class",s)}return this},removeClass:function(e){var t,n,r,i,o,a,s,u=0;if(g(e))return this.each(function(t){w(this).removeClass(e.call(this,t,mt(this)))});if(!arguments.length)return this.attr("class","");if((t=xt(e)).length)while(n=this[u++])if(i=mt(n),r=1===n.nodeType&&" "+vt(i)+" "){a=0;while(o=t[a++])while(r.indexOf(" "+o+" ")>-1)r=r.replace(" "+o+" "," ");i!==(s=vt(r))&&n.setAttribute("class",s)}return this},toggleClass:function(e,t){var n=typeof e,r="string"===n||Array.isArray(e);return"boolean"==typeof t&&r?t?this.addClass(e):this.removeClass(e):g(e)?this.each(function(n){w(this).toggleClass(e.call(this,n,mt(this),t),t)}):this.each(function(){var t,i,o,a;if(r){i=0,o=w(this),a=xt(e);while(t=a[i++])o.hasClass(t)?o.removeClass(t):o.addClass(t)}else void 0!==e&&"boolean"!==n||((t=mt(this))&&J.set(this,"__className__",t),this.setAttribute&&this.setAttribute("class",t||!1===e?"":J.get(this,"__className__")||""))})},hasClass:function(e){var t,n,r=0;t=" "+e+" ";while(n=this[r++])if(1===n.nodeType&&(" "+vt(mt(n))+" ").indexOf(t)>-1)return!0;return!1}});var bt=/\r/g;w.fn.extend({val:function(e){var t,n,r,i=this[0];{if(arguments.length)return r=g(e),this.each(function(n){var i;1===this.nodeType&&(null==(i=r?e.call(this,n,w(this).val()):e)?i="":"number"==typeof i?i+="":Array.isArray(i)&&(i=w.map(i,function(e){return null==e?"":e+""})),(t=w.valHooks[this.type]||w.valHooks[this.nodeName.toLowerCase()])&&"set"in t&&void 0!==t.set(this,i,"value")||(this.value=i))});if(i)return(t=w.valHooks[i.type]||w.valHooks[i.nodeName.toLowerCase()])&&"get"in t&&void 0!==(n=t.get(i,"value"))?n:"string"==typeof(n=i.value)?n.replace(bt,""):null==n?"":n}}}),w.extend({valHooks:{option:{get:function(e){var t=w.find.attr(e,"value");return null!=t?t:vt(w.text(e))}},select:{get:function(e){var t,n,r,i=e.options,o=e.selectedIndex,a="select-one"===e.type,s=a?null:[],u=a?o+1:i.length;for(r=o<0?u:a?o:0;r-1)&&(n=!0);return n||(e.selectedIndex=-1),o}}}}),w.each(["radio","checkbox"],function(){w.valHooks[this]={set:function(e,t){if(Array.isArray(t))return e.checked=w.inArray(w(e).val(),t)>-1}},h.checkOn||(w.valHooks[this].get=function(e){return null===e.getAttribute("value")?"on":e.value})}),h.focusin="onfocusin"in e;var wt=/^(?:focusinfocus|focusoutblur)$/,Tt=function(e){e.stopPropagation()};w.extend(w.event,{trigger:function(t,n,i,o){var a,s,u,l,c,p,d,h,v=[i||r],m=f.call(t,"type")?t.type:t,x=f.call(t,"namespace")?t.namespace.split("."):[];if(s=h=u=i=i||r,3!==i.nodeType&&8!==i.nodeType&&!wt.test(m+w.event.triggered)&&(m.indexOf(".")>-1&&(m=(x=m.split(".")).shift(),x.sort()),c=m.indexOf(":")<0&&"on"+m,t=t[w.expando]?t:new w.Event(m,"object"==typeof t&&t),t.isTrigger=o?2:3,t.namespace=x.join("."),t.rnamespace=t.namespace?new RegExp("(^|\\.)"+x.join("\\.(?:.*\\.|)")+"(\\.|$)"):null,t.result=void 0,t.target||(t.target=i),n=null==n?[t]:w.makeArray(n,[t]),d=w.event.special[m]||{},o||!d.trigger||!1!==d.trigger.apply(i,n))){if(!o&&!d.noBubble&&!y(i)){for(l=d.delegateType||m,wt.test(l+m)||(s=s.parentNode);s;s=s.parentNode)v.push(s),u=s;u===(i.ownerDocument||r)&&v.push(u.defaultView||u.parentWindow||e)}a=0;while((s=v[a++])&&!t.isPropagationStopped())h=s,t.type=a>1?l:d.bindType||m,(p=(J.get(s,"events")||{})[t.type]&&J.get(s,"handle"))&&p.apply(s,n),(p=c&&s[c])&&p.apply&&Y(s)&&(t.result=p.apply(s,n),!1===t.result&&t.preventDefault());return t.type=m,o||t.isDefaultPrevented()||d._default&&!1!==d._default.apply(v.pop(),n)||!Y(i)||c&&g(i[m])&&!y(i)&&((u=i[c])&&(i[c]=null),w.event.triggered=m,t.isPropagationStopped()&&h.addEventListener(m,Tt),i[m](),t.isPropagationStopped()&&h.removeEventListener(m,Tt),w.event.triggered=void 0,u&&(i[c]=u)),t.result}},simulate:function(e,t,n){var r=w.extend(new w.Event,n,{type:e,isSimulated:!0});w.event.trigger(r,null,t)}}),w.fn.extend({trigger:function(e,t){return this.each(function(){w.event.trigger(e,t,this)})},triggerHandler:function(e,t){var n=this[0];if(n)return w.event.trigger(e,t,n,!0)}}),h.focusin||w.each({focus:"focusin",blur:"focusout"},function(e,t){var n=function(e){w.event.simulate(t,e.target,w.event.fix(e))};w.event.special[t]={setup:function(){var r=this.ownerDocument||this,i=J.access(r,t);i||r.addEventListener(e,n,!0),J.access(r,t,(i||0)+1)},teardown:function(){var r=this.ownerDocument||this,i=J.access(r,t)-1;i?J.access(r,t,i):(r.removeEventListener(e,n,!0),J.remove(r,t))}}});var Ct=e.location,Et=Date.now(),kt=/\?/;w.parseXML=function(t){var n;if(!t||"string"!=typeof t)return null;try{n=(new e.DOMParser).parseFromString(t,"text/xml")}catch(e){n=void 0}return n&&!n.getElementsByTagName("parsererror").length||w.error("Invalid XML: "+t),n};var St=/\[\]$/,Dt=/\r?\n/g,Nt=/^(?:submit|button|image|reset|file)$/i,At=/^(?:input|select|textarea|keygen)/i;function jt(e,t,n,r){var i;if(Array.isArray(t))w.each(t,function(t,i){n||St.test(e)?r(e,i):jt(e+"["+("object"==typeof i&&null!=i?t:"")+"]",i,n,r)});else if(n||"object"!==x(t))r(e,t);else for(i in t)jt(e+"["+i+"]",t[i],n,r)}w.param=function(e,t){var n,r=[],i=function(e,t){var n=g(t)?t():t;r[r.length]=encodeURIComponent(e)+"="+encodeURIComponent(null==n?"":n)};if(Array.isArray(e)||e.jquery&&!w.isPlainObject(e))w.each(e,function(){i(this.name,this.value)});else for(n in e)jt(n,e[n],t,i);return r.join("&")},w.fn.extend({serialize:function(){return w.param(this.serializeArray())},serializeArray:function(){return this.map(function(){var e=w.prop(this,"elements");return e?w.makeArray(e):this}).filter(function(){var e=this.type;return this.name&&!w(this).is(":disabled")&&At.test(this.nodeName)&&!Nt.test(e)&&(this.checked||!pe.test(e))}).map(function(e,t){var n=w(this).val();return null==n?null:Array.isArray(n)?w.map(n,function(e){return{name:t.name,value:e.replace(Dt,"\r\n")}}):{name:t.name,value:n.replace(Dt,"\r\n")}}).get()}});var qt=/%20/g,Lt=/#.*$/,Ht=/([?&])_=[^&]*/,Ot=/^(.*?):[ \t]*([^\r\n]*)$/gm,Pt=/^(?:about|app|app-storage|.+-extension|file|res|widget):$/,Mt=/^(?:GET|HEAD)$/,Rt=/^\/\//,It={},Wt={},$t="*/".concat("*"),Bt=r.createElement("a");Bt.href=Ct.href;function Ft(e){return function(t,n){"string"!=typeof t&&(n=t,t="*");var r,i=0,o=t.toLowerCase().match(M)||[];if(g(n))while(r=o[i++])"+"===r[0]?(r=r.slice(1)||"*",(e[r]=e[r]||[]).unshift(n)):(e[r]=e[r]||[]).push(n)}}function _t(e,t,n,r){var i={},o=e===Wt;function a(s){var u;return i[s]=!0,w.each(e[s]||[],function(e,s){var l=s(t,n,r);return"string"!=typeof l||o||i[l]?o?!(u=l):void 0:(t.dataTypes.unshift(l),a(l),!1)}),u}return a(t.dataTypes[0])||!i["*"]&&a("*")}function zt(e,t){var n,r,i=w.ajaxSettings.flatOptions||{};for(n in t)void 0!==t[n]&&((i[n]?e:r||(r={}))[n]=t[n]);return r&&w.extend(!0,e,r),e}function Xt(e,t,n){var r,i,o,a,s=e.contents,u=e.dataTypes;while("*"===u[0])u.shift(),void 0===r&&(r=e.mimeType||t.getResponseHeader("Content-Type"));if(r)for(i in s)if(s[i]&&s[i].test(r)){u.unshift(i);break}if(u[0]in n)o=u[0];else{for(i in n){if(!u[0]||e.converters[i+" "+u[0]]){o=i;break}a||(a=i)}o=o||a}if(o)return o!==u[0]&&u.unshift(o),n[o]}function Ut(e,t,n,r){var i,o,a,s,u,l={},c=e.dataTypes.slice();if(c[1])for(a in e.converters)l[a.toLowerCase()]=e.converters[a];o=c.shift();while(o)if(e.responseFields[o]&&(n[e.responseFields[o]]=t),!u&&r&&e.dataFilter&&(t=e.dataFilter(t,e.dataType)),u=o,o=c.shift())if("*"===o)o=u;else if("*"!==u&&u!==o){if(!(a=l[u+" "+o]||l["* "+o]))for(i in l)if((s=i.split(" "))[1]===o&&(a=l[u+" "+s[0]]||l["* "+s[0]])){!0===a?a=l[i]:!0!==l[i]&&(o=s[0],c.unshift(s[1]));break}if(!0!==a)if(a&&e["throws"])t=a(t);else try{t=a(t)}catch(e){return{state:"parsererror",error:a?e:"No conversion from "+u+" to "+o}}}return{state:"success",data:t}}w.extend({active:0,lastModified:{},etag:{},ajaxSettings:{url:Ct.href,type:"GET",isLocal:Pt.test(Ct.protocol),global:!0,processData:!0,async:!0,contentType:"application/x-www-form-urlencoded; charset=UTF-8",accepts:{"*":$t,text:"text/plain",html:"text/html",xml:"application/xml, text/xml",json:"application/json, text/javascript"},contents:{xml:/\bxml\b/,html:/\bhtml/,json:/\bjson\b/},responseFields:{xml:"responseXML",text:"responseText",json:"responseJSON"},converters:{"* text":String,"text html":!0,"text json":JSON.parse,"text xml":w.parseXML},flatOptions:{url:!0,context:!0}},ajaxSetup:function(e,t){return t?zt(zt(e,w.ajaxSettings),t):zt(w.ajaxSettings,e)},ajaxPrefilter:Ft(It),ajaxTransport:Ft(Wt),ajax:function(t,n){"object"==typeof t&&(n=t,t=void 0),n=n||{};var i,o,a,s,u,l,c,f,p,d,h=w.ajaxSetup({},n),g=h.context||h,y=h.context&&(g.nodeType||g.jquery)?w(g):w.event,v=w.Deferred(),m=w.Callbacks("once memory"),x=h.statusCode||{},b={},T={},C="canceled",E={readyState:0,getResponseHeader:function(e){var t;if(c){if(!s){s={};while(t=Ot.exec(a))s[t[1].toLowerCase()]=t[2]}t=s[e.toLowerCase()]}return null==t?null:t},getAllResponseHeaders:function(){return c?a:null},setRequestHeader:function(e,t){return null==c&&(e=T[e.toLowerCase()]=T[e.toLowerCase()]||e,b[e]=t),this},overrideMimeType:function(e){return null==c&&(h.mimeType=e),this},statusCode:function(e){var t;if(e)if(c)E.always(e[E.status]);else for(t in e)x[t]=[x[t],e[t]];return this},abort:function(e){var t=e||C;return i&&i.abort(t),k(0,t),this}};if(v.promise(E),h.url=((t||h.url||Ct.href)+"").replace(Rt,Ct.protocol+"//"),h.type=n.method||n.type||h.method||h.type,h.dataTypes=(h.dataType||"*").toLowerCase().match(M)||[""],null==h.crossDomain){l=r.createElement("a");try{l.href=h.url,l.href=l.href,h.crossDomain=Bt.protocol+"//"+Bt.host!=l.protocol+"//"+l.host}catch(e){h.crossDomain=!0}}if(h.data&&h.processData&&"string"!=typeof h.data&&(h.data=w.param(h.data,h.traditional)),_t(It,h,n,E),c)return E;(f=w.event&&h.global)&&0==w.active++&&w.event.trigger("ajaxStart"),h.type=h.type.toUpperCase(),h.hasContent=!Mt.test(h.type),o=h.url.replace(Lt,""),h.hasContent?h.data&&h.processData&&0===(h.contentType||"").indexOf("application/x-www-form-urlencoded")&&(h.data=h.data.replace(qt,"+")):(d=h.url.slice(o.length),h.data&&(h.processData||"string"==typeof h.data)&&(o+=(kt.test(o)?"&":"?")+h.data,delete h.data),!1===h.cache&&(o=o.replace(Ht,"$1"),d=(kt.test(o)?"&":"?")+"_="+Et+++d),h.url=o+d),h.ifModified&&(w.lastModified[o]&&E.setRequestHeader("If-Modified-Since",w.lastModified[o]),w.etag[o]&&E.setRequestHeader("If-None-Match",w.etag[o])),(h.data&&h.hasContent&&!1!==h.contentType||n.contentType)&&E.setRequestHeader("Content-Type",h.contentType),E.setRequestHeader("Accept",h.dataTypes[0]&&h.accepts[h.dataTypes[0]]?h.accepts[h.dataTypes[0]]+("*"!==h.dataTypes[0]?", "+$t+"; q=0.01":""):h.accepts["*"]);for(p in h.headers)E.setRequestHeader(p,h.headers[p]);if(h.beforeSend&&(!1===h.beforeSend.call(g,E,h)||c))return E.abort();if(C="abort",m.add(h.complete),E.done(h.success),E.fail(h.error),i=_t(Wt,h,n,E)){if(E.readyState=1,f&&y.trigger("ajaxSend",[E,h]),c)return E;h.async&&h.timeout>0&&(u=e.setTimeout(function(){E.abort("timeout")},h.timeout));try{c=!1,i.send(b,k)}catch(e){if(c)throw e;k(-1,e)}}else k(-1,"No Transport");function k(t,n,r,s){var l,p,d,b,T,C=n;c||(c=!0,u&&e.clearTimeout(u),i=void 0,a=s||"",E.readyState=t>0?4:0,l=t>=200&&t<300||304===t,r&&(b=Xt(h,E,r)),b=Ut(h,b,E,l),l?(h.ifModified&&((T=E.getResponseHeader("Last-Modified"))&&(w.lastModified[o]=T),(T=E.getResponseHeader("etag"))&&(w.etag[o]=T)),204===t||"HEAD"===h.type?C="nocontent":304===t?C="notmodified":(C=b.state,p=b.data,l=!(d=b.error))):(d=C,!t&&C||(C="error",t<0&&(t=0))),E.status=t,E.statusText=(n||C)+"",l?v.resolveWith(g,[p,C,E]):v.rejectWith(g,[E,C,d]),E.statusCode(x),x=void 0,f&&y.trigger(l?"ajaxSuccess":"ajaxError",[E,h,l?p:d]),m.fireWith(g,[E,C]),f&&(y.trigger("ajaxComplete",[E,h]),--w.active||w.event.trigger("ajaxStop")))}return E},getJSON:function(e,t,n){return w.get(e,t,n,"json")},getScript:function(e,t){return w.get(e,void 0,t,"script")}}),w.each(["get","post"],function(e,t){w[t]=function(e,n,r,i){return g(n)&&(i=i||r,r=n,n=void 0),w.ajax(w.extend({url:e,type:t,dataType:i,data:n,success:r},w.isPlainObject(e)&&e))}}),w._evalUrl=function(e){return w.ajax({url:e,type:"GET",dataType:"script",cache:!0,async:!1,global:!1,"throws":!0})},w.fn.extend({wrapAll:function(e){var t;return this[0]&&(g(e)&&(e=e.call(this[0])),t=w(e,this[0].ownerDocument).eq(0).clone(!0),this[0].parentNode&&t.insertBefore(this[0]),t.map(function(){var e=this;while(e.firstElementChild)e=e.firstElementChild;return e}).append(this)),this},wrapInner:function(e){return g(e)?this.each(function(t){w(this).wrapInner(e.call(this,t))}):this.each(function(){var t=w(this),n=t.contents();n.length?n.wrapAll(e):t.append(e)})},wrap:function(e){var t=g(e);return this.each(function(n){w(this).wrapAll(t?e.call(this,n):e)})},unwrap:function(e){return this.parent(e).not("body").each(function(){w(this).replaceWith(this.childNodes)}),this}}),w.expr.pseudos.hidden=function(e){return!w.expr.pseudos.visible(e)},w.expr.pseudos.visible=function(e){return!!(e.offsetWidth||e.offsetHeight||e.getClientRects().length)},w.ajaxSettings.xhr=function(){try{return new e.XMLHttpRequest}catch(e){}};var Vt={0:200,1223:204},Gt=w.ajaxSettings.xhr();h.cors=!!Gt&&"withCredentials"in Gt,h.ajax=Gt=!!Gt,w.ajaxTransport(function(t){var n,r;if(h.cors||Gt&&!t.crossDomain)return{send:function(i,o){var a,s=t.xhr();if(s.open(t.type,t.url,t.async,t.username,t.password),t.xhrFields)for(a in t.xhrFields)s[a]=t.xhrFields[a];t.mimeType&&s.overrideMimeType&&s.overrideMimeType(t.mimeType),t.crossDomain||i["X-Requested-With"]||(i["X-Requested-With"]="XMLHttpRequest");for(a in i)s.setRequestHeader(a,i[a]);n=function(e){return function(){n&&(n=r=s.onload=s.onerror=s.onabort=s.ontimeout=s.onreadystatechange=null,"abort"===e?s.abort():"error"===e?"number"!=typeof s.status?o(0,"error"):o(s.status,s.statusText):o(Vt[s.status]||s.status,s.statusText,"text"!==(s.responseType||"text")||"string"!=typeof s.responseText?{binary:s.response}:{text:s.responseText},s.getAllResponseHeaders()))}},s.onload=n(),r=s.onerror=s.ontimeout=n("error"),void 0!==s.onabort?s.onabort=r:s.onreadystatechange=function(){4===s.readyState&&e.setTimeout(function(){n&&r()})},n=n("abort");try{s.send(t.hasContent&&t.data||null)}catch(e){if(n)throw e}},abort:function(){n&&n()}}}),w.ajaxPrefilter(function(e){e.crossDomain&&(e.contents.script=!1)}),w.ajaxSetup({accepts:{script:"text/javascript, application/javascript, application/ecmascript, application/x-ecmascript"},contents:{script:/\b(?:java|ecma)script\b/},converters:{"text script":function(e){return w.globalEval(e),e}}}),w.ajaxPrefilter("script",function(e){void 0===e.cache&&(e.cache=!1),e.crossDomain&&(e.type="GET")}),w.ajaxTransport("script",function(e){if(e.crossDomain){var t,n;return{send:function(i,o){t=w(" - - {% if session.admin %} - - {% endif %} - - - -
-

CLUSTER NGO

-

Sada softwarových nástrojů určená pro krizový management.

-
- {% block body %}{% endblock %} - - diff --git a/basic/srv/vm/templates/login.html b/basic/srv/vm/templates/login.html deleted file mode 100644 index f739f63..0000000 --- a/basic/srv/vm/templates/login.html +++ /dev/null @@ -1,26 +0,0 @@ -{% extends 'layout.html' %} -{% block title %}Přihlášení{% endblock %} -{% block body %} -
-

Přihlášení

-
- - - - - - - - - - - - - -
Jméno:admin
Heslo
- {% if message is defined %} -

{{ message }}

- {% endif %} -
-
-{% endblock %} diff --git a/basic/srv/vm/templates/portal-admin.html b/basic/srv/vm/templates/portal-admin.html deleted file mode 100644 index 29687d9..0000000 --- a/basic/srv/vm/templates/portal-admin.html +++ /dev/null @@ -1,352 +0,0 @@ -{% extends 'layout.html' %} -{% block title %}Cluster NGO{% endblock %} -{% block body %} -{% if is_app_visible('sahana') %} -{% set app = conf['apps']['sahana'] %} -
-

Sahana EDENSahana EDEN

-

Registr kontaktů asociací, organizací, jednotek zaměstnanců, dobrovolníků, Registr prostředků, materiálních zdrojů určených pro činnost v krizových situacích, logistika krizového zboží ve skladištích, úkrytech, organizace lidských zdrojů, diobrovolníků, mapová vizualizace pro lokalizaci a popis krizové události a mnoho dalších funkcí.

-
    -
  • Login:
  • -
  • Heslo: {{ app['password'] }}
  • -
-
-{% endif %} - -{% if is_app_visible('sahana-demo') %} -{% set app = conf['apps']['sahana-demo'] %} -
-

Sahana EDEN DEMOSahana EDEN DEMO

-

Přístup určený k bezpečnému vyzkoušení aplikace. Zde můžete přidávat i mazat testovací data.

-
    -
  • Login:
  • -
  • Heslo: {{ app['password'] }}
  • -
-
-{% endif %} - -{% if is_app_visible('sambro') %} -{% set app = conf['apps']['sambro'] %} -
-

Sahana EDEN SAMBROSahana EDEN SAMBRO

-

Samostatná instance Sahana EDEN s šablonou SAMBRO.

-
    -
  • Login:
  • -
  • Heslo: {{ app['password'] }}
  • -
-
- -
-

SAMBRO MobileSAMBRO Mobile

-

Mobilní klient k aplikaci Sahana EDEN.
- IOSIOS 6.0 a vyšší
- AndroidAndroid 4.0 a vyšší -

-
    -
  • URL: https://sambro.{{ host }}/eden/
  • -
-
-{% endif %} - -{% if is_app_visible('crisiscleanup') %} -{% set app = conf['apps']['crisiscleanup'] %} -
-

Crisis CleanupCrisis Cleanup

-

Mapování krizové pomoci při odstraňování následků katastrof a koordinaci práce. Jde o majetek, ne o lidi.

-
    -
  • Login:
  • -
  • Heslo: {{ app['password'] }}
  • -
-
-{% endif %} - -{% if is_app_visible('ckan') %} -{% set app = conf['apps']['ckan'] %} -
-

CKANCKAN

-

Repository management a datová analýza pro vytváření otevřených dat.

-
    -
  • Login:
  • -
  • Heslo: {{ app['password'] }}
  • -
-
-{% endif %} - -{% if is_app_visible('opendatakit-build') %} -{% set app = conf['apps']['opendatakit-build'] %} -
-

Open Data KitODK Build

-

Sběr dat s pomocí smartphone.
Aplikace pro návrh formulářů
-

XLSForm - online konverter XLS.
- ODK Form UploaderODK Form Uploader
- ODK ValidateODK Validate

-
-{% endif %} - -{% if is_app_visible('opendatakit') %} -{% set app = conf['apps']['opendatakit'] %} -
-

Open Data KitODK Collect

-

Mobilní aplikace
- ODK CollectODK Collect pro Android
- ODK BriefcaseODK Briefcase
-

-
    -
  • URL: https://odk.{{ host }}
  • -
-
- -
-

Open Data KitODK Aggregate

-

Sběr dat s pomocí smartphone.
- GeoODK Collect - náhrada papírových dotazníků smartphonem. -

-
    -
  • Login:
  • -
  • Heslo: {{ app['password'] }}
  • -
-
-{% endif %} - -{% if is_app_visible('openmapkit') %} -{% set app = conf['apps']['openmapkit'] %} -
-

Open Map KitOpenMapKit Server

-

Sběr dat s pomocí smartphone.
-

    -
  • Login:
  • -
  • Heslo: {{ app['password'] }}
  • -
-
- -
-

GeoODK CollectGeoODK Collect

-

Mobilní aplikace
- GeoODK CollectGeoODK Collect pro Android -

-
    -
  • URL: https://omk.{{ host }}
  • -
-
- -
-

Open Map KitOpenMapKit

-

Mobilní aplikace
- ODK CollectODK Collect pro Android
- AndroidOpenMapKit pro Android 4.1 a vyšší -

-
    -
  • URL: https://omk.{{ host }}
  • -
-
-{% endif %} - -{% if is_app_visible('frontlinesms') %} -{% set app = conf['apps']['frontlinesms'] %} -
-

FrontlineSMSFrontlineSMS

-

SMS messaging přes veřejné datové brány

-
    -
  • Login:
  • -
  • Heslo: {{ app['password'] }}
  • -
-
- -
-

FrontlineSyncFrontlineSync

-

Mobilní aplikace pro
- AndroidAndroid 2.3 a vyšší -

-
-{% endif %} - -{% if is_app_visible('seeddms') %} -{% set app = conf['apps']['seeddms'] %} -
-

SeedDMSSeedDMS

-

Dokument management na dokumentaci a projektovou dokumentaci

-
    -
  • Login:
  • -
  • Heslo: {{ app['password'] }}
  • -
-
-{% endif %} - -{% if is_app_visible('pandora') %} -{% set app = conf['apps']['pandora'] %} -
-

Pan.do/raPan.do/ra

-

Media management na foto a video z krizové události. Tvorba metadat, komentářů, lokalizace v čase a na mapě.

-
    -
  • Login:
  • -
  • Heslo: {{ app['password'] }}
  • -
-
-{% endif %} - -{% if is_app_visible('ushahidi') %} -{% set app = conf['apps']['ushahidi'] %} -
-

UshahidiUshahidi

-

Reakce na krizovou událost. Shromažďujte zprávy od obětí a pracovníků v terénu prostřednictvím SMS, e-mailu, webu, Twitteru.

-
    -
  • Login:
  • -
  • Heslo: {{ app['password'] }}
  • -
-
- -
-

UshahidiUshahidi Mobile

-

Mobilní aplikace Ushahidi pro
- IOSIOS 9.0 a vyšší
- AndroidAndroid 4.4 a vyšší -

-
    -
  • URL: ush.{{ host }}
  • -
-
- -
-

SMS Sync GatewaySMS Sync Gateway

-

Mobilní aplikace pro
- AndroidAndroid 2.3 a vyšší -

-
-{% endif %} - -{% if is_app_visible('kanboard') %} -{% set app = conf['apps']['kanboard'] %} -
-

KanboardKanboard

-

Usnadňuje tvorbu a řízení projektů s pomocí Kanban metodiky.

-
    -
  • Login:
  • -
  • Heslo: {{ app['password'] }}
  • -
-
- -
-

KanboardKanboard Mobile

-

Mobilní aplikace
- KanBoardKanBoard client pro Android 4.1 a vyšší
- AndroidKandroid pro Android 4.2 a vyšší -

-
    -
  • URL: https://kb.{{ host }}
  • -
-
-{% endif %} - -{% if is_app_visible('cts') %} -{% set app = conf['apps']['cts'] %} -
-

CTSCTS

-

Logistika hmotné pomoci pro humanitární potřeby.

-
    -
  • Login:
  • -
  • Heslo: {{ app['password'] }}
  • -
-
-{% endif %} - -{% if is_app_visible('gnuhealth') %} -{% set app = conf['apps']['gnuhealth'] %} -
-

GNU HealthGNU Health

-

Zdravotní a nemocniční informační systém.

-
    -
  • Login:
  • -
  • Heslo: {{ app['password'] }}
  • -
  • Heslo k demu: gnusolidario
  • -
-
- -
-

GNU HealthGNU Health klienti

-

Klientské aplikace platformy Tryton GNU Health pro
- WindowsWindows
- MacOSMacOS
- LinuxLinux -

-
    -
  • URL: gh.{{ host }}
  • -
-
-{% endif %} - -{% if is_app_visible('sigmah') %} -{% set app = conf['apps']['sigmah'] %} -
-

SigmahSigmah

-

Rozpočtování získávání finančních prostředků.

-
    -
  • Login:
  • -
  • Heslo: {{ app['password'] }}
  • -
-
-{% endif %} - -{% if is_app_visible('motech') %} -{% set app = conf['apps']['motech'] %} -
-

MotechMotech

-

Integrace zdravotnických a komunikačních služeb.

-
    -
  • Login:
  • -
  • Heslo: {{ app['password'] }}
  • -
-
-{% endif %} - -{% if is_app_visible('mifosx') %} -{% set app = conf['apps']['mifosx'] %} -
-

Mifos XMifos X

-

Nástroj na rozvojovou, humanitární pomoc a mikrofinancování.

-
    -
  • Login:
  • -
  • Heslo: {{ app['password'] }}
  • -
-
- -
-

Mifos XMifos X

-

Mobilní aplikace
- Mifos XMifos X client pro Android 3.0 a vyšší
-

-
    -
  • URL: mifosx.{{ host }}
  • -
  • Tenant ID: default
  • -
-
-{% endif %} - -{% if false %} -{% set app = conf['apps']['diaspora'] %} -
-

diaspora*diaspora*

-

Autonomní sociání síť s možností propojení do cizích sociálních sítí.

-
    -
  • Login:
  • -
  • Heslo: {{ app['password'] }}
  • -
-
- -
-

OpenIDOpenID

-

Pro ověření identity budete potřebovat účet OpenID. Zaregistrujte se. Registraci využijete v software Sahana EDEN.

-
- -
-

POSMPOSM

-

Portable Open Street Map - softwarový balík na offline používání OpenStreet Map v samostatné virtuální image.

-
-{% endif %} - -
-

Cluster SpotterCluster Spotter

-

Info o Misi a Vizi projektu, včetně kontaktu. Zachovejte data bezpečná a neposkytujte je nepovolaným osobám.
- CC 4.0 CZ by TS. Content is based on PD, CC, GNU/GPL. Brand names, trademarks belong to their respective holders. -

-
-{% endblock %} diff --git a/basic/srv/vm/templates/portal-user.html b/basic/srv/vm/templates/portal-user.html deleted file mode 100644 index 98b9094..0000000 --- a/basic/srv/vm/templates/portal-user.html +++ /dev/null @@ -1,122 +0,0 @@ -{% extends 'layout.html' %} -{% block title %}Cluster NGO{% endblock %} -{% block body %} -{% if is_app_visible('sahana-demo') %} -
-

Řízení humanítární činnosti

-

Přístup určený k bezpečnému vyzkoušení aplikace. Zde můžete přidávat i mazat testovací data.

-
-{% endif %} - -{% if is_app_visible('sambro') %} -
-

Centrum hlášení a výstrah

-

Samostatná instance s šablonou pro centrum hlášení a výstrah.

-
-{% endif %} - -{% if is_app_visible('crisiscleanup') %} -
-

Mapování následků katastrof

-

Mapování krizové pomoci při odstraňování následků katastrof a koordinaci práce. Jde o majetek, ne o lidi.

-
-{% endif %} - -{% if is_app_visible('ckan') %} -
-

Datový sklad

-

Repository management a datová analýza pro vytváření otevřených dat.

-
-{% endif %} - -{% if is_app_visible('opendatakit-build') %} -
-

Sběr formulářových dat

-

Sběr dat s pomocí smartphone.
Aplikace pro návrh formulářů

-
-{% endif %} - -{% if is_app_visible('opendatakit') %} -
-

Sběr formulářových dat

-

Sběr dat s pomocí smartphone.

-
-{% endif %} - -{% if is_app_visible('openmapkit') %} -
-

Sběr mapových dat

-

Sběr dat s pomocí smartphone.
-

-{% endif %} - -{% if is_app_visible('frontlinesms') %} -
-

Hromadné odesílání zpráv

-

SMS messaging přes veřejné datové brány

-
-{% endif %} - -{% if is_app_visible('seeddms') %} -
-

Archiv dokumentace

-

Dokument management na dokumentaci a projektovou dokumentaci

-
-{% endif %} - -{% if is_app_visible('pandora') %} -
-

Archiv medií

-

Media management na foto a video z krizové události. Tvorba metadat, komentářů, lokalizace v čase a na mapě.

-
-{% endif %} - -{% if is_app_visible('ushahidi') %} -
-

Skupinová reakce na události

-

Reakce na krizovou událost. Shromažďujte zprávy od obětí a pracovníků v terénu prostřednictvím SMS, e-mailu, webu, Twitteru.

-
-{% endif %} - -{% if is_app_visible('kanboard') %} -
-

Kanban řízení projektů

-

Usnadňuje tvorbu a řízení projektů s pomocí Kanban metodiky.

-
-{% endif %} - -{% if is_app_visible('gnuhealth') %} -
-

Lékařské záznamy pacientů

-

Zdravotní a nemocniční informační systém.

-
-{% endif %} - -{% if is_app_visible('sigmah') %} -
-

Finanční řízení sbírek

-

Rozpočtování získávání finančních prostředků.

-
-{% endif %} - -{% if is_app_visible('motech') %} -
-

Automatizace komunikace

-

Integrace zdravotnických a komunikačních služeb.

-
-{% endif %} - -{% if is_app_visible('mifosx') %} -
-

Mikrofinancování rozvojových projektů

-

Nástroj na rozvojovou, humanitární pomoc a mikrofinancování.

-
-{% endif %} - -
-

Cluster SpotterCluster Spotter

-

Info o Misi a Vizi projektu, včetně kontaktu. Zachovejte data bezpečná a neposkytujte je nepovolaným osobám.
- CC 4.0 CZ by TS. Content is based on PD, CC, GNU/GPL. Brand names, trademarks belong to their respective holders. -

-
-{% endblock %} diff --git a/basic/srv/vm/templates/setup-apps-row.html b/basic/srv/vm/templates/setup-apps-row.html deleted file mode 100644 index 520baa7..0000000 --- a/basic/srv/vm/templates/setup-apps-row.html +++ /dev/null @@ -1,23 +0,0 @@ -{% set not_installed = app not in conf['apps'] %} -{% if not status %} - {% if not_installed: %} - {% set status = 'Není nainstalována' %} - {% set actions = 'Instalovat' %} - {% elif is_service_started(app): %} - {% set status = 'Spuštěna' %} - {% set actions = 'Zastavit' %} - {% else: %} - {% set status = 'Zastavena' %} - {% set actions = 'Spustit, Odinstalovat' %} - {% endif %} -{% endif %} - -{{ app_title }} - - -{% if is_error %} -{{ status|safe }} -{% else %} -{{ status|safe }} -{{ actions|safe }} -{% endif %} diff --git a/basic/srv/vm/templates/setup-apps.html b/basic/srv/vm/templates/setup-apps.html deleted file mode 100644 index 651a285..0000000 --- a/basic/srv/vm/templates/setup-apps.html +++ /dev/null @@ -1,119 +0,0 @@ -{% extends 'layout.html' %} -{% block title %}Nastavení aplikací{% endblock %} -{% block body %} -
-

Správce aplikací

-

Vyberte které aplikace mají být nainstalovány, které se mají zobrazovat na hlavní straně portálu a které mají být automaticky spuštěny při startu virtuálního stroje.

- - - - - - - - - - - - {% for app in all_apps %} - {% set app_title = conf['apps'][app]['title'] if app in conf['apps'] else online_packages[app]['title'] %} - - {% include 'setup-apps-row.html' %} - - {% endfor %} - -
AplikaceZobrazenaAutostartStavAkce
- {% if not online_packages %} -

Připojení k distribučnímu serveru se nezdařilo. Zkontrolujte přístupové údaje a připojení k síti.

- {% endif %} -

Přístupové údaje k distribučnímu serveru:

-
- - - - - - - - - - - - - - - - - -
URL serveru:
Uživatelské jméno:
Heslo:
  - -
-
-
- -
-

Nastavení aplikací

-

Společné nastavení sdílené některými aplikacemi.

-
- - - - - - - - - - - - - - - -
E-mailAdministrativní e-mail na který budou doručovány zprávy a upozornění z aplikací. Stejná e-mailová adresa bude také využita některými aplikacemi pro odesílání zpráv uživatelům.
Google Maps API klíčAPI klíč pro službu Google Maps, která je využita některými aplikacemi.
  - -
-
-
- Provádí se změna nastavení, prosím čekejte... -
-
-
-
- -
-

Správce virtuálního stroje

-

Změna hesla k šifrovanému diskovému oddílu a administračnímu rozhraní.

-
- - - - - - - - - - - - - - - - - -
Stávající heslo:
Nové heslo:
Kontrola nového hesla:
  - -
-
-
- Provádí se změna hesla, prosím čekejte... -
-
-
-

Restartování nebo vypnutí virtuálního stroje.

- - -
-
-{% endblock %} diff --git a/basic/srv/vm/templates/setup-host.html b/basic/srv/vm/templates/setup-host.html deleted file mode 100644 index 96bbfcd..0000000 --- a/basic/srv/vm/templates/setup-host.html +++ /dev/null @@ -1,118 +0,0 @@ -{% extends 'layout.html' %} -{% block title %}Nastavení hostitele{% endblock %} -{% block body %} -
-

HTTPS Hostitel

-

Základní doménové jméno a HTTPS port na kterých budou přístupny všechny aplikace.

-
- - - - - - - - - - - - - - - -
DoménaPlně kvalifikovaný doménový název, na kterém bude dostupný aplikační portál. Jednotlivé aplikace budou dostupné na subdoménách této domény.
PortHTTPS port na kterém budou dostupné aplikace. Výchozí HTTPS port je 443.
  - -
-
-
- Provádí se změna nastavení, prosím čekejte... -
-
-
-
- -
-

DNS záznamy

-

Na jmenném serveru domény nastavené v sekci HTTPS Hostitel nastavte DNS záznamy typu A, případně i AAAA pro následující doménové názvy a nasměrujte je na vnější (tj. dostupnou z internetu) IP adresu tohoto virtuální stroje. Toto nastavení lze obvykle provést skrze webové rozhraní registrátora domény.

-

Vnější IPv4 {% if ex_ipv4 %}je {{ ex_ipv4 }}{% else %}nebyla zjištěna{% endif %} a IPv6 {% if ex_ipv6 %}je {{ ex_ipv6 }}{% else %}nebyla zjištěna{% endif %}.

-
    -
  • {{ conf['host']['domain'] }}
  • -
  • *.{{ conf['host']['domain'] }}
  • -
-

Pokud jmenný server nepodporuje wildcard záznamy nebo pokud nemůžete či nechcete dedikovat virtuálnímu stroji všechny subdomény, nastavte místo toho záznamy pro následující doménové názvy

-
    -
  • {{ conf['host']['domain'] }}
  • - {% for app in conf['apps']|sort %} -
  • {{ conf['apps'][app]['host'] }}.{{ conf['host']['domain'] }}
  • - {% endfor %} -
- -
-
-
- Ověřuje se nastavení DNS, prosím čekejte... -
-
- -
-

Firewall a NAT

-

Pokud je stávající připojení k internetu zprostředkováno routerem s NAT, na hypervizoru je nastaven firewall nebo existují jiné restrikce síťového provozu, je nutno upravit nastavení příslušných komponent, aby byl provoz na portu {{ conf['host']['port'] }} (nastaveném v sekci HTTPS Hostitel) z internetu korektně nasměrován na místní adresu virtuálního stroje.

-

Pokud bude využit systém automatického vyžádání a obnovy certifikátu (sekce HTTPS certifikát), je nutno aby byl na místní adresu virtuálního stroje nasměrován i port 80, případně byla nastavena HTTP proxy přesměrovávající doménová jména zmíněná v sekci DNS záznamy.

-

Místní IPv4 {% if in_ipv4 %}je {{ in_ipv4 }}{% else %}nebyla zjištěna{% endif %} a IPv6 {% if in_ipv6 %}je {{ in_ipv6 }}{% else %}nebyla zjištěna{% endif %}.

- -
-
-
- Ověřuje se nastavení firewallu a NAT pro port {{ conf['host']['port'] }}, prosím čekejte... -
- -
-
-
- Ověřuje se nastavení firewallu a NAT pro port 80, prosím čekejte... -
-
- -
-

HTTPS certifikát

-

Stávající certifikát je vystaven na jméno {{ cert_info['subject'] }} vystavitelem {{ cert_info['issuer'] }} a jeho platnost vyprší {{ cert_info['expires'] }}.

-
- - - - - - - - - - - - - - - - - - - - -
Způsob správy - - Volba "Self-signed" vygeneruje certifikát s vlastním podpisem a platností 20 let. Tento certifikát je použitelný pro testovací účely, ale většina mobilních aplikací s ním odmítne fungovat. -
Volba "Automaticky" způsobí, že systém automaticky zažádá o certifikát certifikační autority Let's Encrypt pro všechny plně kvalifikované doménové názvy (tj. nikoliv wildcard) zmíněné v sekci DNS záznamy. Počet žádostí o certifikát se stejným doménovým jménem je omezený na 5 týdně, proto je vhodné tento typ certifikátu nastavovat až po instalaci aplikací. Zároveň bude nainstalována úloha pro automatickou obnovu. Proces vyžádání tohoto typu certifikátu může trvat několik minut. -
Volba "Ručně" znamená, že soubory certifikátu a jeho soukromého klíče je nutno nahrát a následně obnovovat ručně skrze formulář na této stránce.
  - -
-
-
- Provádí se změna nastavení, prosím čekejte... -
-
-
-
-{% endblock %} diff --git a/basic/srv/vm/wsgi.py b/basic/srv/vm/wsgi.py deleted file mode 100755 index 4f5c9a8..0000000 --- a/basic/srv/vm/wsgi.py +++ /dev/null @@ -1,16 +0,0 @@ -#!/usr/bin/python3 -# -*- coding: utf-8 -*- - -import sys - -sys.path.append('/srv/vm') -from mgr.wsgiapp import WSGIApp - -application = WSGIApp() - -if __name__ == '__main__': - import os - from werkzeug.contrib.fixers import ProxyFix - from werkzeug.serving import run_simple - - run_simple('127.0.0.1', 8080, ProxyFix(application), threaded=True) diff --git a/basic/usr/bin/vmmgr b/basic/usr/bin/vmmgr deleted file mode 100755 index 342d453..0000000 --- a/basic/usr/bin/vmmgr +++ /dev/null @@ -1,64 +0,0 @@ -#!/usr/bin/python3 -# -*- coding: utf-8 -*- - -import argparse -import sys -sys.path.append('/srv/vm') - -from mgr import VMMgr - -parser = argparse.ArgumentParser(description='VM application manager') -subparsers = parser.add_subparsers() - -parser_update_login = subparsers.add_parser('update-login') -parser_update_login.set_defaults(action='update-login') -parser_update_login.add_argument('app', help='Application name') -parser_update_login.add_argument('login', help='Administrative login') -parser_update_login.add_argument('password', help='Administrative password') - -parser_rebuild_issue = subparsers.add_parser('rebuild-issue') -parser_rebuild_issue.set_defaults(action='rebuild-issue') - -parser_prepare_container = subparsers.add_parser('prepare-container') -parser_prepare_container.add_argument('lxc', nargs=argparse.REMAINDER) -parser_prepare_container.set_defaults(action='prepare-container') - -parser_register_container = subparsers.add_parser('register-container') -parser_register_container.add_argument('lxc', nargs=argparse.REMAINDER) -parser_register_container.set_defaults(action='register-container') - -parser_unregister_container = subparsers.add_parser('unregister-container') -parser_unregister_container.add_argument('lxc', nargs=argparse.REMAINDER) -parser_unregister_container.set_defaults(action='unregister-container') - -parser_register_proxy = subparsers.add_parser('register-proxy') -parser_register_proxy.set_defaults(action='register-proxy') -parser_register_proxy.add_argument('app', help='Application name') - -parser_unregister_proxy = subparsers.add_parser('unregister-proxy') -parser_unregister_proxy.set_defaults(action='unregister-proxy') -parser_unregister_proxy.add_argument('app', help='Application name') - -args = parser.parse_args() -mgr = VMMgr() -if args.action == 'update-login': - # Used by app install scripts - mgr.update_login(args.app, args.login, args.password) -elif args.action == 'rebuild-issue': - # Used on VM startup - mgr.rebuild_issue() -elif args.action == 'prepare-container': - # Used with LXC hooks - mgr.prepare_container() -elif args.action == 'register-container': - # Used with LXC hooks - mgr.register_container() -elif args.action == 'unregister-container': - # Used with LXC hooks - mgr.unregister_container() -elif args.action == 'register-proxy': - # Used in init scripts - mgr.register_proxy(args.app) -elif args.action == 'unregister-proxy': - # Used in init scripts - mgr.unregister_proxy(args.app) diff --git a/zz-build/build-all.sh b/zz-build/build-all.sh index 92dde85..777bb7b 100755 --- a/zz-build/build-all.sh +++ b/zz-build/build-all.sh @@ -12,6 +12,8 @@ cd ../app-acme-sh abuild -F cd ../app-lxc su -c 'abuild -Fr' +cd ../app-vmmgr +abuild -F # Build basic Alpine LXC image mkdir -p /var/lib/lxc/shared/alpine