diff --git a/repo/stable/ibm-cam-3.1.0.tgz b/repo/stable/ibm-cam-3.1.0.tgz new file mode 100644 index 0000000000..94868f5124 Binary files /dev/null and b/repo/stable/ibm-cam-3.1.0.tgz differ diff --git a/repo/stable/index.yaml b/repo/stable/index.yaml index 81d201cf84..6d04df9848 100755 --- a/repo/stable/index.yaml +++ b/repo/stable/index.yaml @@ -51,6 +51,25 @@ entries: - https://raw.githubusercontent.com/IBM/charts/master/repo/stable/ibm-calico-bgp-peer-1.0.0.tgz version: 1.0.0 ibm-cam: + - apiVersion: v1 + appVersion: 3.1.0.0 + created: 2018-09-28T06:39:17.658032475Z + description: IBM Cloud Automation Manager + digest: ae4116b3bd266461cc0da3eadeb91910a788334ec7948cc24a4aa00c8383db59 + icon: https://raw.githubusercontent.com/IBM-CAMHub-Open/starterlibrary/master/images/IBM_CAM_h.png + keywords: + - amd64 + - ppc64le + - Automation + - Commercial + - ICP + - IcpClusterResource + - IBM-CAM-Pak + name: ibm-cam + tillerVersion: '>=2.5.0' + urls: + - https://raw.githubusercontent.com/IBM/charts/master/repo/stable/ibm-cam-3.1.0.tgz + version: 3.1.0 - apiVersion: v1 appVersion: 2.1.0.3 created: 2018-08-09T03:20:06.114627242Z @@ -4271,4 +4290,4 @@ entries: urls: - https://raw.githubusercontent.com/IBM/charts/master/repo/stable/ibm-ws-dyn-agent-dev-1.0.0.tgz version: 1.0.0 -generated: 2018-09-28T01:16:37.720842766Z +generated: 2018-09-28T06:39:17.642609062Z diff --git a/stable/ibm-cam/Chart.yaml b/stable/ibm-cam/Chart.yaml index 1b26c6c9ac..624adf2d3a 100644 --- a/stable/ibm-cam/Chart.yaml +++ b/stable/ibm-cam/Chart.yaml @@ -10,10 +10,10 @@ apiVersion: v1 description: IBM Cloud Automation Manager name: ibm-cam -version: 1.3.1 +version: 3.1.0 tillerVersion: ">=2.5.0" icon: https://raw.githubusercontent.com/IBM-CAMHub-Open/starterlibrary/master/images/IBM_CAM_h.png -appVersion: 2.1.0.3 +appVersion: 3.1.0.0 keywords: - amd64 - ppc64le @@ -21,3 +21,4 @@ keywords: - Commercial - ICP - IcpClusterResource + - IBM-CAM-Pak diff --git a/stable/ibm-cam/LICENSES/LICENSE-LA-en b/stable/ibm-cam/LICENSES/LICENSE-LA-en index b4a7ba1ad0..951b686e6e 100644 --- a/stable/ibm-cam/LICENSES/LICENSE-LA-en +++ b/stable/ibm-cam/LICENSES/LICENSE-LA-en @@ -1,4 +1,4 @@ -The translated license terms can be viewed here: http://www.ibm.com/software/sla/sladb.nsf/searchlis/?searchview&query=(L-ESCZ-AZVGVT) +The translated license terms can be viewed here: http://www.ibm.com/software/sla/sladb.nsf/searchlis/?searchview&query=(L-MKUI-B3H7N9) IMPORTANT: READ CAREFULLY diff --git a/stable/ibm-cam/LICENSES/LICENSE-LI-en b/stable/ibm-cam/LICENSES/LICENSE-LI-en index abb27ad5a2..f1932b836c 100644 --- a/stable/ibm-cam/LICENSES/LICENSE-LI-en +++ b/stable/ibm-cam/LICENSES/LICENSE-LI-en @@ -1,4 +1,4 @@ -The translated license terms can be viewed here: http://www.ibm.com/software/sla/sladb.nsf/searchlis/?searchview&query=(L-ESCZ-AZVGVT) +The translated license terms can be viewed here: http://www.ibm.com/software/sla/sladb.nsf/searchlis/?searchview&query=(L-MKUI-B3H7N9) IMPORTANT: READ CAREFULLY @@ -26,7 +26,7 @@ LICENSE INFORMATION The Programs listed below are licensed under the following License Information terms and conditions in addition to the Program license terms previously agreed to by Client and IBM. If Client does not have previously agreed to license terms in effect for the Program, the International License Agreement for Evaluation of Programs (Z125-5543-05) applies. Program Name (Program Number): -IBM Cloud Automation Manager 2.1 (Evaluation) +IBM Cloud Automation Manager 3.1 (Evaluation) The following standard terms apply to Licensee's use of the Program. @@ -34,11 +34,15 @@ Evaluation Period The evaluation period begins on the date that Licensee agrees to the terms of this Agreement and ends after 90 days. +Prohibited Uses + +Licensee may not use or authorize others to use the Program, alone or in combination with other services or products, in support of any of the following high risk activities: design, construction, control, or maintenance of nuclear facilities, mass transit systems, air traffic control systems, automotive control systems, weapons systems, or aircraft navigation or communications, or any other activity where program failure could give rise to a material threat of death or serious personal injury. + Supporting Programs -The Program is licensed as a multi-product package and includes the Supporting Programs identified below. Licensee is authorized to install and use such Supporting Programs only to support Licensee's use of the Principal Program under this Agreement and within the limits of the Proofs of Entitlement for the Program (unless broader rights are provided elsewhere in this License Information document). The phrase "to support Licensee's use" would include only those uses that are necessary or otherwise directly related to a licensed use of the Principal Program or another Supporting or Bundled Program. The Supporting Programs may not be used for any other purpose. Licensee is not authorized to transfer or remarket the Supporting Programs separate from the Principal Program. A Supporting Program may be accompanied by license terms, and those terms, if any, apply to Licensee's use of that Supporting Program. In the event of conflict, the terms in this License Information document supersede the Supporting Program's terms. When Licensee's right to use the Program expires or terminates, Licensee must discontinue use, destroy or promptly return all copies of the Supporting Programs to the party from whom Licensee acquired the Program. If Licensee downloaded the Supporting Programs, Licensee should contact the party from whom Licensee acquired the Program. If Licensee wishes to license the Supporting Programs for any use beyond the limits set forth above, please contact an IBM Sales Representative or the party from whom Licensee acquired the Program to obtain the appropriate license. +Licensee is authorized to install and use the Supporting Programs identified below. Licensee is authorized to install and use such Supporting Programs only to support Licensee's use of the Principal Program under this Agreement. The phrase "to support Licensee's use" would only include those uses that are necessary or otherwise directly related to a licensed use of the Principal Program or another Supporting Program. The Supporting Programs may not be used for any other purpose. A Supporting Program may be accompanied by license terms, and those terms, if any, apply to Licensee's use of that Supporting Program. In the event of conflict, the terms in this License Information document supersede the Supporting Program's terms. Licensee must obtain sufficient entitlements to the Program, as a whole, to cover Licensee's installation and use of all of the Supporting Programs, unless separate entitlements are provided within this License Information document. For example, if this Program were licensed on a PVU (Processor Value Unit) basis and Licensee were to install the Principal Program or a Supporting Program on a 100 PVU machine (physical or virtual) and another Supporting Program on a second 100 PVU machine, Licensee would be required to obtain 200 PVU entitlements to the Program. -The following are Supporting Programs licensed with the Program: +Supporting Programs: IBM Cloud Private Separately Licensed Code @@ -61,9 +65,18 @@ Note: IBM may provide limited support for some Separately Licensed Code. If such The following are Separately Licensed Code: Mongo DB 3.4.4 +JCIP-ANNOTATIONS +Man pages for Knife, +opscode.css_t Sphinx stylesheet, +SPDX Standard, +spdx-exceptions spdx-exceptions:1.0.4 material-design-icons-iconfont 2.0.5 +heartbeat_test.c,Font Awesome Icons +GuardedBy.java (crc)pycrc/doc/pycrc.xml +html.erb, + libvk-hashicorp/serf (MongoDB)wiredtiger v 2.9.2 docker.initd @@ -76,10 +89,50 @@ gmain:1.0.0 chardet python-chardet-whl 2.2.1-2~ubuntu1 masterzen/xmlpath:13f4951 - -Prohibited Uses - -Licensee may not use or authorize others to use the Program, alone or in combination with other services or products, in support of any of the following high risk activities: design, construction, control, or maintenance of nuclear facilities, mass transit systems, air traffic control systems, automotive control systems, weapons systems, or aircraft navigation or communications, or any other activity where program failure could give rise to a material threat of death or serious personal injury. +(MongoDB)wiredtiger v 2.9.2, +docker.initd, +python-colorama-whl, +AXSI, +asciidoc.asciidoc, +(Supervisor)debian/*, +ax_cc_maxopt.m4, +compile, +depcomp, +mdate-sh, +missing, +config.guess, +Libtool, +knife-spork 1.7.1, +ldiff.rb, +libffi.info, +libffi.texi, +Libltdl, +ltmain, +Libtoolize, +texinfo.tex, +libtool-ldflags, +Libtoolize, +rawdeflate.js +gmock-1.7.0/aclocal.m4 +gmock-1.7.0/configure +gmock-1.7.0/gtest/configure +gmock-1.7.0/gtest/m4/libtool.m4 +gmock-1.7.0/build-aux/* + +(python-pip-whl)pip-manpage.rst, +AX_* Autoconf Macros, +ax_pthread.m4, +config.guess, +libffi test files, +libffi.texi, +ltmain.sh, +parser.tab.cpp, +rsync, +Snoopy/ruby_bundler-bundler-audit 0.5.0, +target-libpath.exp, +texinfo.tex +MongoDB +JSON-Java (1.0.0.v20101106) Export and Import Restrictions @@ -92,7 +145,7 @@ LICENSE INFORMATION The Programs listed below are licensed under the following License Information terms and conditions in addition to the Program license terms previously agreed to by Client and IBM. If Client does not have previously agreed to license terms in effect for the Program, the International Program License Agreement (Z125-3301-14) applies. Program Name (Program Number): -IBM Cloud Automation Manager 2.1 (5737-E67) +IBM Cloud Automation Manager 3.1 (5737-E67) The following standard terms apply to Licensee's use of the Program. @@ -104,11 +157,15 @@ Specifications Program's specifications can be found in the collective Description and Technical Information sections of the Program's Announcement Letters. +Prohibited Uses + +Licensee may not use or authorize others to use the Program, alone or in combination with other services or products, in support of any of the following high risk activities: design, construction, control, or maintenance of nuclear facilities, mass transit systems, air traffic control systems, automotive control systems, weapons systems, or aircraft navigation or communications, or any other activity where program failure could give rise to a material threat of death or serious personal injury. + Supporting Programs -The Program is licensed as a multi-product package and includes the Supporting Programs identified below. Licensee is authorized to install and use such Supporting Programs only to support Licensee's use of the Principal Program under this Agreement and within the limits of the Proofs of Entitlement for the Program (unless broader rights are provided elsewhere in this License Information document). The phrase "to support Licensee's use" would include only those uses that are necessary or otherwise directly related to a licensed use of the Principal Program or another Supporting or Bundled Program. The Supporting Programs may not be used for any other purpose. Licensee is not authorized to transfer or remarket the Supporting Programs separate from the Principal Program. A Supporting Program may be accompanied by license terms, and those terms, if any, apply to Licensee's use of that Supporting Program. In the event of conflict, the terms in this License Information document supersede the Supporting Program's terms. When Licensee's right to use the Program expires or terminates, Licensee must discontinue use, destroy or promptly return all copies of the Supporting Programs to the party from whom Licensee acquired the Program. If Licensee downloaded the Supporting Programs, Licensee should contact the party from whom Licensee acquired the Program. If Licensee wishes to license the Supporting Programs for any use beyond the limits set forth above, please contact an IBM Sales Representative or the party from whom Licensee acquired the Program to obtain the appropriate license. +Licensee is authorized to install and use the Supporting Programs identified below. Licensee is authorized to install and use such Supporting Programs only to support Licensee's use of the Principal Program under this Agreement. The phrase "to support Licensee's use" would only include those uses that are necessary or otherwise directly related to a licensed use of the Principal Program or another Supporting Program. The Supporting Programs may not be used for any other purpose. A Supporting Program may be accompanied by license terms, and those terms, if any, apply to Licensee's use of that Supporting Program. In the event of conflict, the terms in this License Information document supersede the Supporting Program's terms. Licensee must obtain sufficient entitlements to the Program, as a whole, to cover Licensee's installation and use of all of the Supporting Programs, unless separate entitlements are provided within this License Information document. For example, if this Program were licensed on a PVU (Processor Value Unit) basis and Licensee were to install the Principal Program or a Supporting Program on a 100 PVU machine (physical or virtual) and another Supporting Program on a second 100 PVU machine, Licensee would be required to obtain 200 PVU entitlements to the Program. -The following are Supporting Programs licensed with the Program: +Supporting Programs: IBM Cloud Private Separately Licensed Code @@ -131,9 +188,18 @@ Note: IBM may provide limited support for some Separately Licensed Code. If such The following are Separately Licensed Code: Mongo DB 3.4.4 +JCIP-ANNOTATIONS +Man pages for Knife, +opscode.css_t Sphinx stylesheet, +SPDX Standard, +spdx-exceptions spdx-exceptions:1.0.4 material-design-icons-iconfont 2.0.5 +heartbeat_test.c,Font Awesome Icons +GuardedBy.java (crc)pycrc/doc/pycrc.xml +html.erb, + libvk-hashicorp/serf (MongoDB)wiredtiger v 2.9.2 docker.initd @@ -146,10 +212,50 @@ gmain:1.0.0 chardet python-chardet-whl 2.2.1-2~ubuntu1 masterzen/xmlpath:13f4951 - -Prohibited Uses - -Licensee may not use or authorize others to use the Program, alone or in combination with other services or products, in support of any of the following high risk activities: design, construction, control, or maintenance of nuclear facilities, mass transit systems, air traffic control systems, automotive control systems, weapons systems, or aircraft navigation or communications, or any other activity where program failure could give rise to a material threat of death or serious personal injury. +(MongoDB)wiredtiger v 2.9.2, +docker.initd, +python-colorama-whl, +AXSI, +asciidoc.asciidoc, +(Supervisor)debian/*, +ax_cc_maxopt.m4, +compile, +depcomp, +mdate-sh, +missing, +config.guess, +Libtool, +knife-spork 1.7.1, +ldiff.rb, +libffi.info, +libffi.texi, +Libltdl, +ltmain, +Libtoolize, +texinfo.tex, +libtool-ldflags, +Libtoolize, +rawdeflate.js +gmock-1.7.0/aclocal.m4 +gmock-1.7.0/configure +gmock-1.7.0/gtest/configure +gmock-1.7.0/gtest/m4/libtool.m4 +gmock-1.7.0/build-aux/* + +(python-pip-whl)pip-manpage.rst, +AX_* Autoconf Macros, +ax_pthread.m4, +config.guess, +libffi test files, +libffi.texi, +ltmain.sh, +parser.tab.cpp, +rsync, +Snoopy/ruby_bundler-bundler-audit 0.5.0, +target-libpath.exp, +texinfo.tex +MongoDB +JSON-Java (1.0.0.v20101106) Export and Import Restrictions @@ -167,8 +273,8 @@ In addition to the above, the following terms apply to Licensee's use of the Pro When using IBM Cloud Private as a Supporting Program to this Program, such use is limited to only that which is necessary to manage external environments and the Supporting Program cannot be used to manage IBM Cloud Private workloads. -L/N: L-ESCZ-AZVGVT -D/N: L-ESCZ-AZVGVT -P/N: L-ESCZ-AZVGVT +L/N: L-MKUI-B3H7N9 +D/N: L-MKUI-B3H7N9 +P/N: L-MKUI-B3H7N9 diff --git a/stable/ibm-cam/LICENSES/LICENSE-notices b/stable/ibm-cam/LICENSES/LICENSE-notices index 2a2e0e7f73..b7c5971812 100644 --- a/stable/ibm-cam/LICENSES/LICENSE-notices +++ b/stable/ibm-cam/LICENSES/LICENSE-notices @@ -1,6 +1,6 @@ NOTICES AND INFORMATION -IBM Cloud Automation Manager 2.1 +IBM Cloud Automation Manager 3.1 The IBM license agreement and any applicable information on the web download page for IBM products refers Licensee to this file for details @@ -25,9 +25,10 @@ and all liability for errors and omissions or for any damages accruing from the use of this NOTICES file or its contents, including without limitation URLs or references to any third party websites. + NOTICES AND INFORMATION FOR BELOW COMPONENTS -Cloud Automation Manager +Cloud Automation Manager (sept 2018) ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ @@ -48,6 +49,8 @@ CPL EPL ICU ISC LICENSE +JTIDY +MODIFIABLE THIRD PARTY CODE MIT MIT-EQUIVALENT MPL V1.0 @@ -350,7 +353,39 @@ spork bump is based on the knife-cookbook-bump plugin by: Alalanta, thread_safe-0.1.3, thread_safe-0.3.6, Tika, timeago.js, train-1.3.0, UnixCrypt.java, uuidtools-2.1.5, varia_model-0.6.0, veil-0.3.0, WeakIdentityMap, winrm-2.2.3, winrm-fs-1.2.0, wmi-lite-1.0.0, Woodstox, -WStx-asl, ZeroClipboard.js, Zookeeper +WStx-asl, ZeroClipboard.js, Zookeeper,@google-cloud/common, @google-cloud/compute, adal-node-0.1.28, +appmetrics-3.1.3, appmetrics-dash-3.4.0, appmetrics-prometheus-1.0.1, +appmetrics-statsd-2.0.0, atob-2.1.1, base64Coder, BasicClientInfo.java, +before-after-hook-1.1.0, bson, bson-1.0.6, bson.js, CalendaryCodec.java, +Callback, carbon-components, carbon-icons-6.3.2, ceilometer-model, +cfenv-1.1.0, cloudant-1.10.0, cloudant-1.9.0, cloudant-follow-0.17.0, +cloudant-nano-6.6.0, cloudant-nano-6.7.0, cluster-key-slot-1.0.12, +Common, Commons-Compress, Commons-HttpClient, Commons-IO, +Commons-Logging, Commons-Pool, Derby, detect-libc-1.0.3, doctrine-2.1.0, +ecdsa-sig-formatter-1.0.10, eslint-visitor-keys-1.0.0, Felix Gogo +Command, Felix Gogo Runtime, Felix Gogo Shell, g11n-pipeline-2.0.5, +g11n-pipeline-2.0.6, GenericEntity.java, Geronimo JavaMail :: 1.4 +Provider, getMapData, glance-model, Globus Toolkit, google-auth-library, +google-auth-library-0.10.0, google-auth-library-1.5.0, google-gson, +graphmetrics-1.0.1, heat-model, hibernate-validator, HttpClient.Java, +IBM Plex, Jakarta Commons CLI 1.0, Jasper, Javaewah, Javax.Activation, +jclouds-core, jclouds-scriptbuilder, Jclouds_chef_api, +jersey2-connector, Jetty-Util, jetty-websocket-client, json, JSP API +library, JSTL, kew, keystone-model, less-2.7.3, log4js-2.3.12, Lucene, +mongo-tools, mongodb (node), mongodb-2.2.35, mongodb-core, +mongodb-core-2.1.19, mongodb-core-3.0.8, NekoHTML, nova-model, +oauth-sign, oltu.oauth2.client, oltu.oauth2.common, OpenAjax.js, +openstack-client, OSGi, pet-store 2.0.json, pf4j, phantomjs-prebuilt, +qpid-amqp-1-0-client-jms, qpid-client, quantum-model, Quartz, +redis.clients.util, request, request-2.47.0, request-2.85.0, +request-2.86.0, request-2.87.0, require_optional-1.0.1, resolver, +retry-axios-0.3.2, rx-lite-4.0.8, rx-lite-aggregates-4.0.8, serializer, +snakeyaml, spdx-correct-3.0.0, sshd-core, ssl-root-cas-1.2.5, +swagger-client, swagger-client-3.8.2, swagger-client-3.8.4, +swagger-client-3.8.6, Tika, Tomcat Annotations API, tomcat-catalina, +UnixCrypt.java, Utf8Appendable, validate-npm-package-license, +validate-npm-package-license-3.0.3, websocket-api, Xerces-impl, +XML11Char.java Apache License Version 2.0, January 2004 @@ -614,6 +649,27 @@ win32-service-0.8.10 (http://rubygems.org/downloads/win32-service-0.8.10.gem), windows-api-0.4.4 (http://rubygems.org/downloads/windows-api-0.4.4.gem), windows-pr-1.2.6 (http://rubygems.org/downloads/windows-pr-1.2.6.gem) +bson (Required), log4js (Required), loopback-component-passport +(http://registry.npmjs.org/loopback-component-passport/-/loopback-compon +ent-passport-3.9.0.tgz), loopback-component-passport-3.8.1 +(http://registry.npmjs.org/loopback-component-passport/-/loopback-compon +ent-passport-3.8.1.tgz), loopback-connector-cloudant-1.2.5 +(http://registry.npmjs.org/loopback-connector-cloudant/-/loopback-connec +tor-cloudant-1.2.5.tgz), loopback-connector-cloudant-1.3.0 +(http://registry.npmjs.org/loopback-connector-cloudant/-/loopback-connec +tor-cloudant-1.3.0.tgz), strong-globalize (Required), +strong-globalize-2.10.0 +(http://registry.npmjs.org/strong-globalize/-/strong-globalize-2.10.0.tg +z), strong-globalize-3.3.0 +(http://registry.npmjs.org/strong-globalize/-/strong-globalize-3.3.0.tgz +), strong-remoting +(http://registry.npmjs.org/strong-remoting/-/strong-remoting-2.35.1.tgz) +, strong-remoting-2.34.0 +(http://registry.npmjs.org/strong-remoting/-/strong-remoting-2.34.0.tgz) +, strong-remoting-3.11.0 +(http://registry.npmjs.org/strong-remoting/-/strong-remoting-3.11.0.tgz) +, strong-remoting-3.12.0 (Not Required), swagger-client (Required) + END OF ARTISTIC LICENSE 2.0 NOTICES AND INFORMATION ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ @@ -1351,6 +1407,142 @@ Hilaiel), zlib-1.0.0 (Copyright (C) 1993-2013 Yukihiro Matsumoto. All rights reserved.), function Card (Copyright 2014-2015, Facebook, Inc. All rights reserved), asm-commons (Copyright (c) 2000-2011 INRIA, France Telecom All rights reserved.) +ajv.bundle.js (Copyright 2011 Gary Court.), +analysis\common\src\resources\org\apache\lucene\analysis\ro (Author +Jacques Savoy), +analysis\common\src\resources\org\apache\lucene\analysis\snowball +(Copyright (c) 2001, Dr Martin Porter, Copyright (c) 2002, Richard +Boulton. All rights reserved), assertions (Copyright (c) 2015 The +Chromium Authors.), async-listener-0.6.9 (Copyright (c) 2013-2017 +Forrest L Norvell), async.bundle.js (No Copyright found), async.min.js +(No Copyright found), bcrypt-pbkdf (Copyright 1997 Niels Provos +Copyright (c) 2013 Ted Unangst +Copyright 2016 Joyent Inc), bundle.js (Copyright 2011 +Mozilla Foundation and contributors), cjdict.txt (Copyright (C) +2006-2008, Google Inc. All rights reserved.), cls-hooked-4.2.2 +(Copyright (c) 2013-2016 Forrest L Norvell ), +continuation-local-storage-3.2.1 (Copyright (c) 2013-2016 Forrest L +Norvell ), crypto (Copyright 2012 The Go Authors.), +d3-4.13.0 (Copyright 2010-2017 Mike Bostock), d3-array-1.2.1 (Copyright +2010-2016 Mike Bostock), d3-axis-1.0.8 (Copyright 2010-2016 Mike +Bostock), d3-collection-1.0.4 (Copyright 2010-2016 Mike Bostock), +d3-drag-1.2.1 (Copyright 2010-2016 Mike Bostock), d3-dsv-1.0.8 +(Copyright 2013-2016 Mike Bostock), d3-force-1.1.0 (Copyright 2010-2016 +Mike Bostock), d3-format-1.2.2 (Copyright 2010-2015 Mike Bostock), +d3-geo-1.9.1 (Copyright 2010-2016 Mike BostockCopyright (c) 2008-2012 +Charles Karney), d3-hierarchy-1.1.5 (Copyright 2010-2016 Mike Bostock), +d3-interpolate (Copyright 2010-2016 Mike Bostock), d3-request-1.0.6 +(Copyright 2010-2016 Mike Bostock), d3-scale-1.0.7 (Copyright 2010-2015 +Mike Bostock), d3-selection-1.3.0 (Copyright (c) 2010-2018 Michael +Bostock), d3-shape-1.2.0 (Copyright 2010-2015 Mike Bostock), +d3-time-1.0.8 (Copyright 2010-2016 Mike Bostock), d3-time-format-2.1.1 +(Copyright 2010-2017 Mike Bostock), d3-timer-1.0.7 (Copyright 2010-2016 +Mike Bostock), d3-transition-1.1.1 (Copyright (c) 2010-2015 Michael +BostockCopyright 2001 Robert Penner), d3-zoom-1.7.1 (Copyright 2010-2016 +Mike Bostock), diff-3.5.0 (Copyright (c) 2009-2015 Kevin Decker +), dijit (Copyright (c) 2005-2012, The Dojo +Foundation. All rights reserved.), Dojo (Copyright (c) 2005-2012, The +Dojo Foundation All rights reserved.), domhandler-2.4.2 (Copyright (c) +Felix BA), domutils-1.7.0 (Copyright (c) Felix Böhm), dtrace-provider +(Copyright 2012 Chris Andrews. All rights reserved.Copyright 2011 Chris +Andrews. All rights reserved.), dtrace-provider-0.8.6 (Copyright 2012 +Chris Andrews. All rights reserved.Copyright 2011 Chris Andrews. All +rights reserved.), emitter-listener-1.1.1 (By Forrest L Norvell +), escodegen (Copyright (C) 2012 [Yusuke +Suzuki](http://github.com/Constellation)), escodegen-1.10.0 (Copyright +(C) 2012 [Yusuke Suzuki](http://github.com/Constellation)), +escodegen-1.9.1 (Copyright (C) 2012 [Yusuke +Suzuki](http://github.com/Constellation)), eslint-scope-3.7.1 (Copyright +JS Foundation and other contributors https://js.foundationCopyright (C) +2012-2013 Yusuke Suzuki (twitter: @Constellation) and other +contributors.), espree-3.5.4 (Copyright JS Foundation and other +contributors https://js.foundation), esprima (Copyright (C) 2012 2011 +[Ariya Hidayat](http://ariya.ofilabs.com/about)), esquery-1.0.1 +(Copyright (c) 2013 Joel Feenstra), esrecurse-4.2.1 (Copyright (C) 2014 +[Yusuke Suzuki](https://github.com/Constellation)), estraverse +(Copyright (C) 2012 [Yusuke Suzuki](http://github.com/Constellation)), +EventEmiitter (Copyright 2015, Yahoo! Inc.), everything.js-1.0.3 +(Copyright (c) 2014, Michael Ficarra. All rights reserved.), extract-zip +(Copyright (c) 2014 Max Ogden and other contributors), Firebug +(Copyright (c) 2006-2007, Joe Hewitt All rights reserved.), +force-partner-api (Copyright (c) 2005-2012, salesforce.com, inc. All +rights reserved.), force-wsc (Copyright (c) 2005, salesforce.com, inc.), +google protobuf (Copyright 2008, Google Inc. All rights reserved.), +gopacket (Copyright 2012 Google, Inc.), http-status (Copyright (c) +2008-2010 SARL Adaltas.), http-status-1.1.0 (Copyright (c) 2008-2010 +SARL Adaltas.), http-status-1.1.2 (Copyright (c) 2008-2010 SARL +Adaltas.), ieee754 (Copyright (c) 2008 Fair Oaks Labs Inc.), +ieee754-1.1.11 (Copyright (c) 2008 Fair Oaks Labs Inc.), javax.inject +(No Copyright Statement.), JCraft (Copyright (c) 2000,2001,2002,2003 +ymnk, JCraft,Inc. All rights reserved.), JLine (Copyright (c) 2008, +Apache Software Foundation All rights reserved.), joi-6.10.1 (Copyright +(c) 2012-2014 Walmart and other contributors.), JSch (Copyright (c) +2002-2012 Atsuhiko Yamanaka, JCraft,Inc. All rights reserved.;0 ymnk, +JCraft,Inc Copyright (c) 2002-2012 ymnk, JCraft,Inc. All rights +reserved.), jsDump (Copyright (c) 2008 Ariel Flesler), jsDump 1.0.0 +(Copyright (c) 2008 Ariel Flesler – aflesler(at)gmail(dot)com.), Jython +2.0, 2.1 (Copyright (c) 2000, 2001, 2002, 2003, 2004, 2005, 2006, 2007 +Jython Developers All rights reserved.), JZLib (Copyright (c) +2000,2001,2002,2003 ymnk, JCraft,Inc. All rights reserved.), JZlib +(http://www.jcraft.com/jzlib/) com.jcraft:jzlib:jar:1.1.1 (Copyright (c) +2000-2011 ymnk, JCraft,Inc. All rights reserved.), laodict.txt +(Copyright (C) 2013 Brian Eugene Wilson, Robert Martin Campbell. All +rights reserved.), le_node (Required), MIME type information (Copyright +(c) Ian F. Darwin 1986, 1987, 1989, 1990, 1991, 1992, 1994, 1995.), +node-forge (Copyright (c) 2010 Digital Bazaar Inc. Copyright (C) 1989 +1991 Free Software Foundation Inc.), node-forge-0.7.5 (Copyright (c) +2010 Digital Bazaar Inc), nodent (Copyright (c) 2014 Michael Ficarra. +All rights reserved.), nodent-compiler (No Copyright found), +normalize-package-data-2.4.0 (Copyright (c) Meryn Stol (""Author"")), +org.eclipse.jgit (Copyright (c) 2007, Eclipse Foundation, Inc. and its +licensors.), package (Copyright (c) 2014, Facebook, Inc.), +parser-typescript.js (No Copyright found), qs-6.5.2 (Copyright (c) 2014 +Nathan LaFreniere and other contributors.), regenerator (Copyright (c) +2014, Facebook, Inc.), Services_JSON (copyright 2005 Michal Migurski), +shimmer-1.2.0 (By Forrest L Norvell ), +soap-cookie-0.10.1 (By Shane A. Stillwell), source-map-0.6.1 (Copyright +(c) 2009-2011 Mozilla Foundation and contributors), table-4.0.2 +(Copyright (c) 2016 Gajus Kuizinas (http://gajus.com/)), Timeline ((c) +Copyright The SIMILE Project 2006. All rights reserved.), topo-1.1.0 +(Copyright (c) 2012-2014 Walmart and other contributors.), tough-cookie +(Copyright (c) 2015 Salesforce.com Inc.), tough-cookie-2.3.3 (Copyright +(c) 2015 Salesforce.com Inc.), uglify-js (Copyright 2012-2018 (c) Mihai +Bazon ), uglify-js-2.8.29 (Copyright 2012-2013 +(c) Mihai Bazon ), uri-js-4.2.2 (Copyright 2011 +Gary Court. All rights reserved.), url-template-2.0.8 (Copyright (c) +2012-2014 Bram Stein), yui 2.2.1 (Copyright (c) 2007, Yahoo! Inc. All +rights reserved.) + +BSD 4-CLAUSE + +Redistribution and use in source and binary forms, with or without +modification, is permitted provided that the following conditions are +met: + +* Redistributions of source code must retain the above copyright notice, + this list of conditions and the following disclaimer. +* Redistributions in binary form must reproduce the above copyright + notice, this list of conditions and the following disclaimer in the + documentation and/or other materials provided with the distribution. +* All advertising materials mentioning features or use of this software + must display the following acknowledgement: + This product includes software developed by the . +* Neither the name of the nor the names of its + contributors may be used to endorse or promote products derived from + this software without specific prior written permission. + +THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS +IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED +TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A +PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER +OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, +EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, +PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR +PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF +LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING +NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS +SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. + BSD -3 Clause @@ -1510,6 +1702,20 @@ API 1.5.1 (/Source-0/META-INF/NOTICE.txt), javax.servlet-*.jar 31031/), Servlet-API (http://mvnrepository.com/artifact/javax.servlet/servlet-api/3.0-alpha-1 ), Servlet-api.jar (/Source-0/META-INF/NOTICE.txt) +Applicationpath.java +(http://central.maven.org/maven2/com/sun/jersey/jersey-core/1.11/jersey- +core-1.11-sources.jar), jersey-connector +(http://ob.yihecloud.com:88/nexus/content/repositories/snapshots/com/woo +rea/jersey-connector/3.2.2-SNAPSHOT/), jersey-core +(http://central.maven.org/maven2/com/sun/jersey/jersey-core/1.11/jersey- +core-1.11-sources.jar), JSP implementation library +(http://central.maven.org/maven2/org/apache/qpid/qpid-client/0.22/), JSP +Library (http://www.oracle.com/technetwork/java/index-jsp-138231.html), +JSR-250 Common Annotations +(http://repo1.maven.org/maven2/org/apache/jclouds/api/chef/1.8.0/chef-1. +8.0-sources.jar), MIMEpull +(https://mvnrepository.com/artifact/org.jvnet/mimepull/1.6), Sun +Microsofts, Inc (No Copyright Statement) END OF COMMON DEVELOPMENT AND DISTRIBUTION LICENSE VERSION 1 NOTICES AND INFORMATION ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ @@ -1527,6 +1733,8 @@ Bundles (http://download.eclipse.org/jetty/updates/jetty-bundles-8.x/8.1.14.v201 31031/), JUnit (http://junit.org/junit4/), junit-4.10 (/Source-0/META-INF/NOTICE.txt) +The Web Services Description Language for Java Toolkit (WSDL4J) +(http://central.maven.org/maven2/org/apache/qpid/qpid-client/0.22/) END OF COMMON PUBLIC LICENSE NOTICES AND INFORMATION ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ @@ -1543,6 +1751,48 @@ erlang (http://www.erlang.org/download/otp_src_#{version}.tar.gz), Jetty Bundles (http://download.eclipse.org/jetty/updates/jetty-bundles-8.x/8.1.14.v201 31031/), slf4j-api (http://www.slf4j.org/dist/) +("Disassembler") that can produce a listing of the Java assembler +mnemonics ("Assembler Mnemonics") for a Java method. +(http://central.maven.org/maven2/org/apache/qpid/qpid-client/0.22/), +about.html (http://www.eclipse.org/legal/epl-v10.html), confluence-core +(http://central.maven.org/maven2/org/fusesource/wikitext/confluence-core +/1.4/), International Components for Unicode for Java (ICU4J) +(/source-0/plugin.properties), javax-websocket-client-impl +(http://central.maven.org/maven2/org/eclipse/jetty/websocket/javax-webso +cket-client-impl/9.1.0.v20131115/), javax.xml +(http://central.maven.org/maven2/org/eclipse/birt/runtime/javax.xml/1.3. +4.v201005080400/), Jetty-io +(http://central.maven.org/maven2/org/eclipse/jetty/jetty-io/9.1.0.v20131 +115/), Jetty-Util +(http://central.maven.org/maven2/org/eclipse/jetty/jetty-util/9.1.0.v201 +31115/), JSR 166 (https://jcp.org/ja/jsr/detail?id=166), Logback +(http://logback.qos.ch/), logback-core +(http://ftp.mirrorservice.org/sites/download.eclipse.org/eclipseMirror/t +echnology/epp/logging/stable/plugins/), mediawiki-core +(http://central.maven.org/maven2/org/fusesource/wikitext/mediawiki-core/ +1.4/), MQTT-Client-Framework +(https://github.com/ckrey/MQTT-Client-Framework), +org.eclipse.equinox.http.servletbridge +(http://central.maven.org/maven2/org/eclipse/platform/org.eclipse.equino +x.http.servletbridge/1.0.300/), +org.eclipse.equinox.servletbridge.extensionbundle +(https://github.com/eclipse/rt.equinox.bundles/tree/master/bundles/org.e +clipse.equinox.servletbridge.extensionbundle), orion client +(https://github.com/eclipse/orion.client), orion server +(https://github.com/eclipse/orion.server), Protocol Buffers +(http://ftp.acc.umu.se/mirror/eclipse.org/tools/orbit/downloads/drops/R2 +0151118145958/repository/plugins/), restfuse +(http://central.maven.org/maven2/com/restfuse/com.eclipsesource.restfuse +/1.0.0/), SLF4J +(http://www.jabylon.org/maven/ch/qos/logback/slf4j/1.0.7/), textile-core +(https://mvnrepository.com/artifact/org.fusesource.wikitext/textile-core +/1.4), tracwiki-core +(https://mvnrepository.com/artifact/org.fusesource.wikitext/tracwiki-cor +e/1.4), waffle-jna +(http://central.maven.org/maven2/com/github/dblock/waffle/waffle-jna/1.5 +/waffle-jna-1.5-sources.jar), wikitext-core +(https://mvnrepository.com/artifact/org.fusesource.wikitext/wikitext-cor +e/1.4) END OF ECLIPSE PUBLIC LICENSE NOTICES AND INFORMATION ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ @@ -2230,7 +2480,42 @@ inherits 2.0.3 (Copyright (c) Isaac Z. Schlueter), json-stringify-safe (Copyright (c) Isaac Z. Schlueter and Contributors), wrappy 1.0.2 (Copyright (c) Isaac Z. Schlueter and Contributors), hitimes (Copyright (c) 2008-2015 Jeremy Hinegardner), libsodium -(Copyright (c) 2013-2014 Frank Denis ) +(Copyright (c) 2013-2014 Frank Denis ) +anymatch-1.3.2 Copyright (c) 2014 Elan Shanker +aproba-1.2.0 Copyright (c) 2015, Rebecca Turner +are-we-there-yet-1.1.5 Copyright (c) 2015, Rebecca Turner +chownr-1.0.1 Copyright (c) Isaac Z. Schlueter and Contributors +cli-width-2.2.0 Copyright (c) 2015 Ilya Radchenko +cliui-4.1.0 Copyright (c) 2015 Contributors +color-support-1.1.3 Copyright (c) Isaac Z. Schlueter and Contributors +get-caller-file Copyright 2018 Stefan Penner +gulp-sass-variables-1.2.0 By Osaton +har-validator Copyright (c) 2015, Ahmad Nassri + hosted-git-info-2.6.0 Copyright (c) 2015, Rebecca Turner +ini-1.3.5 Copyright (c) Isaac Z. Schlueter and Contributors +is-resolvable-1.1.0 Copyright 2018 Shinnosuke Watanabe +log-driver-1.2.7 Copyright (c) 2014, Gregg Caines, gregg@caines.ca +lru-cache-2.6.5 Copyright (c) Isaac Z. Schlueter and Contributors +lru-cache-4.1.3 Copyright (c) Isaac Z. Schlueter and Contributors +mute-stream-0.0.7 Copyright (c) Isaac Z. Schlueter and Contributors +natives Copyright 2018 Isaac Z. Schlueter +npmlog-4.1.2 Copyright (c) Isaac Z. Schlueter and Contributors +nutanix_prism Copyright:Not Specified +osenv-0.1.5 Copyright (c) Isaac Z. Schlueter and Contributors +phantom Copyright (c) 2016 Amir Raminfar +remove-trailing-separator-1.1.0 Copyright (c) 2017 Tomas Sardyha +request-promise-4.2.2 Copyright (c) 2017 Nicolai Kamenzky Ty Abonil and contributors +rimraf-2.6.2 Copyright (c) Isaac Z. Schlueter and Contributors +sax-1.2.4 Copyright (c) Isaac Z. Schlueter and Contributors +semver-5.5.0 Copyright (c) Isaac Z. Schlueter and Contributors +setprototypeof-1.1.0 Copyright (c) 2015 Wes Todd +stealthy-require-1.1.1 Copyright (c) 2017 Nicolai Kamenzky and contributors +which-1.3.0 Copyright (c) Isaac Z. Schlueter and Contributors +which-1.3.1 Copyright (c) Isaac Z. Schlueter and Contributors +which-module Copyright (c) 2016 Contributors +wide-align-1.1.3 Copyright (c) 2015, Rebecca Turner +yargs-parser Copyright (c) 2016 Contributors + Permission to use, copy, modify, and/or distribute this software for any @@ -2248,6 +2533,1144 @@ OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. END OF ISC LICENSE NOTICES AND INFORMATION ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ +JTIDY LICENSE + +The Program includes some or all of the following that IBM obtained +under the JTidy License: + +JTidy R7 (Copyright (c) 1998-2000 World Wide Web Consortium +(Massachusetts Institute of Technology, Institut National de Recherche +en Informatique et en Automatique, Keio University). All Rights +Reserved.) + +Java HTML Tidy - JTidy +HTML parser and pretty printer + +Copyright (c) 1998-2000 World Wide Web Consortium (Massachusetts +Institute of Technology, Institut National de Recherche en +Informatique et en Automatique, Keio University). All Rights +Reserved. + +Contributing Author(s): + +Dave Raggett +Andy Quick (translation to Java) +Gary L Peskin (Java development) +Sami Lempinen (release management) +Fabrizio Giustina + +The contributing author(s) would like to thank all those who +helped with testing, bug fixes, and patience. This wouldn't +have been possible without all of you. + +COPYRIGHT NOTICE: + +This software and documentation is provided "as is," and +the copyright holders and contributing author(s) make no +representations or warranties, express or implied, including +but not limited to, warranties of merchantability or fitness +for any particular purpose or that the use of the software or +documentation will not infringe any third party patents, +copyrights, trademarks or other rights. + +The copyright holders and contributing author(s) will not be +liable for any direct, indirect, special or consequential damages +arising out of any use of the software or documentation, even if +advised of the possibility of such damage. + +Permission is hereby granted to use, copy, modify, and distribute +this source code, or portions hereof, documentation and executables, +for any purpose, without fee, subject to the following restrictions: + +1. The origin of this source code must not be misrepresented. +2. Altered versions must be plainly marked as such and must +not be misrepresented as being the original source. +3. This Copyright notice may not be removed or altered from any +source or altered source distribution. + +The copyright holders and contributing author(s) specifically +permit, without fee, and encourage the use of this source code +as a component for supporting the Hypertext Markup Language in +commercial products. If you use this source code in a product, +acknowledgment is not required but would be appreciated. + +END OF JTIDY LICENSE NOTICES AND INFORMATION +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ + +MODIFIABLE THIRD PARTY CODE + +This Program includes some or all of the following Modifiable Third +Party Code that IBM obtained under the GNU Lesser General Public +License. For copies of the source code for this software, send an email +to identifying the IBM Program and the Modifiable Third +Party Code for which you are requesting the source code. + +morfologik + + GNU LIBRARY GENERAL PUBLIC LICENSE + Version 2, June 1991 + + Copyright (C) 1991 Free Software Foundation, Inc. + 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA + Everyone is permitted to copy and distribute verbatim copies + of this license document, but changing it is not allowed. + +[This is the first released version of the library GPL. It is + numbered 2 because it goes with version 2 of the ordinary GPL.] + + Preamble + + The licenses for most software are designed to take away your +freedom to share and change it. By contrast, the GNU General Public +Licenses are intended to guarantee your freedom to share and change +free software--to make sure the software is free for all its users. + + This license, the Library General Public License, applies to some +specially designated Free Software Foundation software, and to any +other libraries whose authors decide to use it. You can use it for +your libraries, too. + + When we speak of free software, we are referring to freedom, not +price. Our General Public Licenses are designed to make sure that you +have the freedom to distribute copies of free software (and charge for +this service if you wish), that you receive source code or can get it +if you want it, that you can change the software or use pieces of it +in new free programs; and that you know you can do these things. + + To protect your rights, we need to make restrictions that forbid +anyone to deny you these rights or to ask you to surrender the rights. +These restrictions translate to certain responsibilities for you if +you distribute copies of the library, or if you modify it. + + For example, if you distribute copies of the library, whether gratis +or for a fee, you must give the recipients all the rights that we gave +you. You must make sure that they, too, receive or can get the source +code. If you link a program with the library, you must provide +complete object files to the recipients so that they can relink them +with the library, after making changes to the library and recompiling +it. And you must show them these terms so they know their rights. + + Our method of protecting your rights has two steps: (1) copyright +the library, and (2) offer you this license which gives you legal +permission to copy, distribute and/or modify the library. + + Also, for each distributor's protection, we want to make certain +that everyone understands that there is no warranty for this free +library. If the library is modified by someone else and passed on, we +want its recipients to know that what they have is not the original +version, so that any problems introduced by others will not reflect on +the original authors' reputations. + + Finally, any free program is threatened constantly by software +patents. We wish to avoid the danger that companies distributing free +software will individually obtain patent licenses, thus in effect +transforming the program into proprietary software. To prevent this, +we have made it clear that any patent must be licensed for everyone's +free use or not licensed at all. + + Most GNU software, including some libraries, is covered by the ordinary +GNU General Public License, which was designed for utility programs. This +license, the GNU Library General Public License, applies to certain +designated libraries. This license is quite different from the ordinary +one; be sure to read it in full, and don't assume that anything in it is +the same as in the ordinary license. + + The reason we have a separate public license for some libraries is that +they blur the distinction we usually make between modifying or adding to a +program and simply using it. Linking a program with a library, without +changing the library, is in some sense simply using the library, and is +analogous to running a utility program or application program. However, in +a textual and legal sense, the linked executable is a combined work, a +derivative of the original library, and the ordinary General Public License +treats it as such. + + Because of this blurred distinction, using the ordinary General +Public License for libraries did not effectively promote software +sharing, because most developers did not use the libraries. We +concluded that weaker conditions might promote sharing better. + + However, unrestricted linking of non-free programs would deprive the +users of those programs of all benefit from the free status of the +libraries themselves. This Library General Public License is intended to +permit developers of non-free programs to use free libraries, while +preserving your freedom as a user of such programs to change the free +libraries that are incorporated in them. (We have not seen how to achieve +this as regards changes in header files, but we have achieved it as regards +changes in the actual functions of the Library.) The hope is that this +will lead to faster development of free libraries. + + The precise terms and conditions for copying, distribution and +modification follow. Pay close attention to the difference between a +"work based on the library" and a "work that uses the library". The +former contains code derived from the library, while the latter only +works together with the library. + + Note that it is possible for a library to be covered by the ordinary +General Public License rather than by this special one. + + GNU LIBRARY GENERAL PUBLIC LICENSE + TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION + + 0. This License Agreement applies to any software library which +contains a notice placed by the copyright holder or other authorized +party saying it may be distributed under the terms of this Library +General Public License (also called "this License"). Each licensee is +addressed as "you". + + A "library" means a collection of software functions and/or data +prepared so as to be conveniently linked with application programs +(which use some of those functions and data) to form executables. + + The "Library", below, refers to any such software library or work +which has been distributed under these terms. A "work based on the +Library" means either the Library or any derivative work under +copyright law: that is to say, a work containing the Library or a +portion of it, either verbatim or with modifications and/or translated +straightforwardly into another language. (Hereinafter, translation is +included without limitation in the term "modification".) + + "Source code" for a work means the preferred form of the work for +making modifications to it. For a library, complete source code means +all the source code for all modules it contains, plus any associated +interface definition files, plus the scripts used to control compilation +and installation of the library. + + Activities other than copying, distribution and modification are not +covered by this License; they are outside its scope. The act of +running a program using the Library is not restricted, and output from +such a program is covered only if its contents constitute a work based +on the Library (independent of the use of the Library in a tool for +writing it). Whether that is true depends on what the Library does +and what the program that uses the Library does. + + 1. You may copy and distribute verbatim copies of the Library's +complete source code as you receive it, in any medium, provided that +you conspicuously and appropriately publish on each copy an +appropriate copyright notice and disclaimer of warranty; keep intact +all the notices that refer to this License and to the absence of any +warranty; and distribute a copy of this License along with the +Library. + + You may charge a fee for the physical act of transferring a copy, +and you may at your option offer warranty protection in exchange for a +fee. + + 2. You may modify your copy or copies of the Library or any portion +of it, thus forming a work based on the Library, and copy and +distribute such modifications or work under the terms of Section 1 +above, provided that you also meet all of these conditions: + + a) The modified work must itself be a software library. + + b) You must cause the files modified to carry prominent notices + stating that you changed the files and the date of any change. + + c) You must cause the whole of the work to be licensed at no + charge to all third parties under the terms of this License. + + d) If a facility in the modified Library refers to a function or a + table of data to be supplied by an application program that uses + the facility, other than as an argument passed when the facility + is invoked, then you must make a good faith effort to ensure that, + in the event an application does not supply such function or + table, the facility still operates, and performs whatever part of + its purpose remains meaningful. + + (For example, a function in a library to compute square roots has + a purpose that is entirely well-defined independent of the + application. Therefore, Subsection 2d requires that any + application-supplied function or table used by this function must + be optional: if the application does not supply it, the square + root function must still compute square roots.) + +These requirements apply to the modified work as a whole. If +identifiable sections of that work are not derived from the Library, +and can be reasonably considered independent and separate works in +themselves, then this License, and its terms, do not apply to those +sections when you distribute them as separate works. But when you +distribute the same sections as part of a whole which is a work based +on the Library, the distribution of the whole must be on the terms of +this License, whose permissions for other licensees extend to the +entire whole, and thus to each and every part regardless of who wrote +it. + +Thus, it is not the intent of this section to claim rights or contest +your rights to work written entirely by you; rather, the intent is to +exercise the right to control the distribution of derivative or +collective works based on the Library. + +In addition, mere aggregation of another work not based on the Library +with the Library (or with a work based on the Library) on a volume of +a storage or distribution medium does not bring the other work under +the scope of this License. + + 3. You may opt to apply the terms of the ordinary GNU General Public +License instead of this License to a given copy of the Library. To do +this, you must alter all the notices that refer to this License, so +that they refer to the ordinary GNU General Public License, version 2, +instead of to this License. (If a newer version than version 2 of the +ordinary GNU General Public License has appeared, then you can specify +that version instead if you wish.) Do not make any other change in +these notices. + + Once this change is made in a given copy, it is irreversible for +that copy, so the ordinary GNU General Public License applies to all +subsequent copies and derivative works made from that copy. + + This option is useful when you wish to copy part of the code of +the Library into a program that is not a library. + + 4. You may copy and distribute the Library (or a portion or +derivative of it, under Section 2) in object code or executable form +under the terms of Sections 1 and 2 above provided that you accompany +it with the complete corresponding machine-readable source code, which +must be distributed under the terms of Sections 1 and 2 above on a +medium customarily used for software interchange. + + If distribution of object code is made by offering access to copy +from a designated place, then offering equivalent access to copy the +source code from the same place satisfies the requirement to +distribute the source code, even though third parties are not +compelled to copy the source along with the object code. + + 5. A program that contains no derivative of any portion of the +Library, but is designed to work with the Library by being compiled or +linked with it, is called a "work that uses the Library". Such a +work, in isolation, is not a derivative work of the Library, and +therefore falls outside the scope of this License. + + However, linking a "work that uses the Library" with the Library +creates an executable that is a derivative of the Library (because it +contains portions of the Library), rather than a "work that uses the +library". The executable is therefore covered by this License. +Section 6 states terms for distribution of such executables. + + When a "work that uses the Library" uses material from a header file +that is part of the Library, the object code for the work may be a +derivative work of the Library even though the source code is not. +Whether this is true is especially significant if the work can be +linked without the Library, or if the work is itself a library. The +threshold for this to be true is not precisely defined by law. + + If such an object file uses only numerical parameters, data +structure layouts and accessors, and small macros and small inline +functions (ten lines or less in length), then the use of the object +file is unrestricted, regardless of whether it is legally a derivative +work. (Executables containing this object code plus portions of the +Library will still fall under Section 6.) + + Otherwise, if the work is a derivative of the Library, you may +distribute the object code for the work under the terms of Section 6. +Any executables containing that work also fall under Section 6, +whether or not they are linked directly with the Library itself. + + 6. As an exception to the Sections above, you may also compile or +link a "work that uses the Library" with the Library to produce a +work containing portions of the Library, and distribute that work +under terms of your choice, provided that the terms permit +modification of the work for the customer's own use and reverse +engineering for debugging such modifications. + + You must give prominent notice with each copy of the work that the +Library is used in it and that the Library and its use are covered by +this License. You must supply a copy of this License. If the work +during execution displays copyright notices, you must include the +copyright notice for the Library among them, as well as a reference +directing the user to the copy of this License. Also, you must do one +of these things: + + a) Accompany the work with the complete corresponding + machine-readable source code for the Library including whatever + changes were used in the work (which must be distributed under + Sections 1 and 2 above); and, if the work is an executable linked + with the Library, with the complete machine-readable "work that + uses the Library", as object code and/or source code, so that the + user can modify the Library and then relink to produce a modified + executable containing the modified Library. (It is understood + that the user who changes the contents of definitions files in the + Library will not necessarily be able to recompile the application + to use the modified definitions.) + + b) Accompany the work with a written offer, valid for at + least three years, to give the same user the materials + specified in Subsection 6a, above, for a charge no more + than the cost of performing this distribution. + + c) If distribution of the work is made by offering access to copy + from a designated place, offer equivalent access to copy the above + specified materials from the same place. + + d) Verify that the user has already received a copy of these + materials or that you have already sent this user a copy. + + For an executable, the required form of the "work that uses the +Library" must include any data and utility programs needed for +reproducing the executable from it. However, as a special exception, +the source code distributed need not include anything that is normally +distributed (in either source or binary form) with the major +components (compiler, kernel, and so on) of the operating system on +which the executable runs, unless that component itself accompanies +the executable. + + It may happen that this requirement contradicts the license +restrictions of other proprietary libraries that do not normally +accompany the operating system. Such a contradiction means you cannot +use both them and the Library together in an executable that you +distribute. + + 7. You may place library facilities that are a work based on the +Library side-by-side in a single library together with other library +facilities not covered by this License, and distribute such a combined +library, provided that the separate distribution of the work based on +the Library and of the other library facilities is otherwise +permitted, and provided that you do these two things: + + a) Accompany the combined library with a copy of the same work + based on the Library, uncombined with any other library + facilities. This must be distributed under the terms of the + Sections above. + + b) Give prominent notice with the combined library of the fact + that part of it is a work based on the Library, and explaining + where to find the accompanying uncombined form of the same work. + + 8. You may not copy, modify, sublicense, link with, or distribute +the Library except as expressly provided under this License. Any +attempt otherwise to copy, modify, sublicense, link with, or +distribute the Library is void, and will automatically terminate your +rights under this License. However, parties who have received copies, +or rights, from you under this License will not have their licenses +terminated so long as such parties remain in full compliance. + + 9. You are not required to accept this License, since you have not +signed it. However, nothing else grants you permission to modify or +distribute the Library or its derivative works. These actions are +prohibited by law if you do not accept this License. Therefore, by +modifying or distributing the Library (or any work based on the +Library), you indicate your acceptance of this License to do so, and +all its terms and conditions for copying, distributing or modifying +the Library or works based on it. + + 10. Each time you redistribute the Library (or any work based on the +Library), the recipient automatically receives a license from the +original licensor to copy, distribute, link with or modify the Library +subject to these terms and conditions. You may not impose any further +restrictions on the recipients' exercise of the rights granted herein. +You are not responsible for enforcing compliance by third parties to +this License. + + 11. If, as a consequence of a court judgment or allegation of patent +infringement or for any other reason (not limited to patent issues), +conditions are imposed on you (whether by court order, agreement or +otherwise) that contradict the conditions of this License, they do not +excuse you from the conditions of this License. If you cannot +distribute so as to satisfy simultaneously your obligations under this +License and any other pertinent obligations, then as a consequence you +may not distribute the Library at all. For example, if a patent +license would not permit royalty-free redistribution of the Library by +all those who receive copies directly or indirectly through you, then +the only way you could satisfy both it and this License would be to +refrain entirely from distribution of the Library. + +If any portion of this section is held invalid or unenforceable under any +particular circumstance, the balance of the section is intended to apply, +and the section as a whole is intended to apply in other circumstances. + +It is not the purpose of this section to induce you to infringe any +patents or other property right claims or to contest validity of any +such claims; this section has the sole purpose of protecting the +integrity of the free software distribution system which is +implemented by public license practices. Many people have made +generous contributions to the wide range of software distributed +through that system in reliance on consistent application of that +system; it is up to the author/donor to decide if he or she is willing +to distribute software through any other system and a licensee cannot +impose that choice. + +This section is intended to make thoroughly clear what is believed to +be a consequence of the rest of this License. + + 12. If the distribution and/or use of the Library is restricted in +certain countries either by patents or by copyrighted interfaces, the +original copyright holder who places the Library under this License may add +an explicit geographical distribution limitation excluding those countries, +so that distribution is permitted only in or among countries not thus +excluded. In such case, this License incorporates the limitation as if +written in the body of this License. + + 13. The Free Software Foundation may publish revised and/or new +versions of the Library General Public License from time to time. +Such new versions will be similar in spirit to the present version, +but may differ in detail to address new problems or concerns. + +Each version is given a distinguishing version number. If the Library +specifies a version number of this License which applies to it and +"any later version", you have the option of following the terms and +conditions either of that version or of any later version published by +the Free Software Foundation. If the Library does not specify a +license version number, you may choose any version ever published by +the Free Software Foundation. + + 14. If you wish to incorporate parts of the Library into other free +programs whose distribution conditions are incompatible with these, +write to the author to ask for permission. For software which is +copyrighted by the Free Software Foundation, write to the Free +Software Foundation; we sometimes make exceptions for this. Our +decision will be guided by the two goals of preserving the free status +of all derivatives of our free software and of promoting the sharing +and reuse of software generally. + + NO WARRANTY + + 15. BECAUSE THE LIBRARY IS LICENSED FREE OF CHARGE, THERE IS NO +WARRANTY FOR THE LIBRARY, TO THE EXTENT PERMITTED BY APPLICABLE LAW. +EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR +OTHER PARTIES PROVIDE THE LIBRARY "AS IS" WITHOUT WARRANTY OF ANY +KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE +IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR +PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE +LIBRARY IS WITH YOU. SHOULD THE LIBRARY PROVE DEFECTIVE, YOU ASSUME +THE COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION. + + 16. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN +WRITING WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY +AND/OR REDISTRIBUTE THE LIBRARY AS PERMITTED ABOVE, BE LIABLE TO YOU +FOR DAMAGES, INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR +CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THE +LIBRARY (INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING +RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A +FAILURE OF THE LIBRARY TO OPERATE WITH ANY OTHER SOFTWARE), EVEN IF +SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH +DAMAGES. + + END OF TERMS AND CONDITIONS + +END OF GNU LESSER GENERAL PUBLIC LICENSE, Version 2 NOTICES AND INFORMATION + +Base64.java,gmain:1.0.0, chardet, python-chardet-whl 2.2.1-2~ubuntu1, kgio (Ruby Gem), +mariadb-java-client, platform, raindrops (Ruby Gem), setup.rb + + + GNU LESSER GENERAL PUBLIC LICENSE + Version 2.1, February 1999 + +Copyright (C) 1991, 1999 Free Software Foundation, Inc. +51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA +Everyone is permitted to copy and distribute verbatim copies +of this license document, but changing it is not allowed. + +[This is the first released version of the Lesser GPL. It also counts + as the successor of the GNU Library Public License, version 2, hence + the version number 2.1.] + +Preamble + +The licenses for most software are designed to take away your freedom to +share and change it. By contrast, the GNU General Public Licenses are +intended to guarantee your freedom to share and change free software--to +make sure the software is free for all its users. + +This license, the Lesser General Public License, applies to some +specially designated software packages--typically libraries--of the Free +Software Foundation and other authors who decide to use it. You can use +it too, but we suggest you first think carefully about whether this +license or the ordinary General Public License is the better strategy to +use in any particular case, based on the explanations below. + +When we speak of free software, we are referring to freedom of use, not +price. Our General Public Licenses are designed to make sure that you +have the freedom to distribute copies of free software (and charge for +this service if you wish); that you receive source code or can get it if +you want it; that you can change the software and use pieces of it in +new free programs; and that you are informed that you can do these +things. + +To protect your rights, we need to make restrictions that forbid +distributors to deny you these rights or to ask you to surrender these +rights. These restrictions translate to certain responsibilities for you +if you distribute copies of the library or if you modify it. + +For example, if you distribute copies of the library, whether gratis or +for a fee, you must give the recipients all the rights that we gave you. +You must make sure that they, too, receive or can get the source code. +If you link other code with the library, you must provide complete +object files to the recipients, so that they can relink them with the +library after making changes to the library and recompiling it. And you +must show them these terms so they know their rights. + +We protect your rights with a two-step method: (1) we copyright the +library, and (2) we offer you this license, which gives you legal +permission to copy, distribute and/or modify the library. + +To protect each distributor, we want to make it very clear that there is +no warranty for the free library. Also, if the library is modified by +someone else and passed on, the recipients should know that what they +have is not the original version, so that the original author's +reputation will not be affected by problems that might be introduced by +others. + +Finally, software patents pose a constant threat to the existence of any +free program. We wish to make sure that a company cannot effectively +restrict the users of a free program by obtaining a restrictive license +from a patent holder. Therefore, we insist that any patent license +obtained for a version of the library must be consistent with the full +freedom of use specified in this license. + +Most GNU software, including some libraries, is covered by the ordinary +GNU General Public License. This license, the GNU Lesser General Public +License, applies to certain designated libraries, and is quite different +from the ordinary General Public License. We use this license for +certain libraries in order to permit linking those libraries into +non-free programs. + +When a program is linked with a library, whether statically or using a +shared library, the combination of the two is legally speaking a +combined work, a derivative of the original library. The ordinary +General Public License therefore permits such linking only if the entire +combination fits its criteria of freedom. The Lesser General Public +License permits more lax criteria for linking other code with the +library. + +We call this license the "Lesser" General Public License because it does +Less to protect the user's freedom than the ordinary General Public +License. It also provides other free software developers Less of an +advantage over competing non-free programs. These disadvantages are the +reason we use the ordinary General Public License for many libraries. +However, the Lesser license provides advantages in certain special +circumstances. + +For example, on rare occasions, there may be a special need to +encourage the widest possible use of a certain library, so that it +becomes a de-facto standard. To achieve this, non-free programs must be +allowed to use the library. A more frequent case is that a free library +does the same job as widely used non-free libraries. In this case, there +is little to gain by limiting the free library to free software only, so +we use the Lesser General Public License. + +In other cases, permission to use a particular library in non-free +programs enables a greater number of people to use a large body of free +software. For example, permission to use the GNU C Library in non-free +programs enables many more people to use the whole GNU operating system, +as well as its variant, the GNU/Linux operating system. + +Although the Lesser General Public License is Less protective of the +users' freedom, it does ensure that the user of a program that is linked +with the Library has the freedom and the wherewithal to run that program +using a modified version of the Library. + +The precise terms and conditions for copying, distribution and +modification follow. Pay close attention to the difference between a +"work based on the library" and a "work that uses the library". The +former contains code derived from the library, whereas the latter must +be combined with the library in order to run. TERMS AND CONDITIONS FOR +COPYING, DISTRIBUTION AND MODIFICATION + +0. This License Agreement applies to any software library or other +program which contains a notice placed by the copyright holder or other +authorized party saying it may be distributed under the terms of this +Lesser General Public License (also called "this License"). Each +licensee is addressed as "you". + +A "library" means a collection of software functions and/or data +prepared so as to be conveniently linked with application programs +(which use some of those functions and data) to form executables. + +The "Library", below, refers to any such software library or work which +has been distributed under these terms. A "work based on the Library" +means either the Library or any derivative work under copyright law: +that is to say, a work containing the Library or a portion of it, either +verbatim or with modifications and/or translated straightforwardly into +another language. (Hereinafter, translation is included without +limitation in the term "modification".) + +"Source code" for a work means the preferred form of the work for making +modifications to it. For a library, complete source code means all the +source code for all modules it contains, plus any associated interface +definition files, plus the scripts used to control compilation and +installation of the library. + +Activities other than copying, distribution and modification are not +covered by this License; they are outside its scope. The act of running +a program using the Library is not restricted, and output from such a +program is covered only if its contents constitute a work based on the +Library (independent of the use of the Library in a tool for writing +it). Whether that is true depends on what the Library does and what the +program that uses the Library does. + +1. You may copy and distribute verbatim copies of the Library's complete +source code as you receive it, in any medium, provided that you +conspicuously and appropriately publish on each copy an appropriate +copyright notice and disclaimer of warranty; keep intact all the notices +that refer to this License and to the absence of any warranty; and +distribute a copy of this License along with the Library. + +You may charge a fee for the physical act of transferring a copy, and +you may at your option offer warranty protection in exchange for a fee. + + +2. You may modify your copy or copies of the Library or any portion of +it, thus forming a work based on the Library, and copy and distribute +such modifications or work under the terms of Section 1 above, provided +that you also meet all of these conditions: + + a) The modified work must itself be a software library. + b) You must cause the files modified to carry prominent notices + stating that you changed the files and the date of any change. + c) You must cause the whole of the work to be licensed at no charge + to all third parties under the terms of this License. + d) If a facility in the modified Library refers to a function or a + table of data to be supplied by an application program that uses + the facility, other than as an argument passed when the facility + is invoked, then you must make a good faith effort to ensure + that, in the event an application does not supply such function + or table, the facility still operates, and performs whatever part + of its purpose remains meaningful. + + (For example, a function in a library to compute square roots has + a purpose that is entirely well-defined independent of the + application. Therefore, Subsection 2d requires that any + application-supplied function or table used by this function must + be optional: if the application does not supply it, the square + root function must still compute square roots.) + +These requirements apply to the modified work as a whole. If +identifiable sections of that work are not derived from the Library, and +can be reasonably considered independent and separate works in +themselves, then this License, and its terms, do not apply to those +sections when you distribute them as separate works. But when you +distribute the same sections as part of a whole which is a work based on +the Library, the distribution of the whole must be on the terms of this +License, whose permissions for other licensees extend to the entire +whole, and thus to each and every part regardless of who wrote it. + +Thus, it is not the intent of this section to claim rights or contest +your rights to work written entirely by you; rather, the intent is to +exercise the right to control the distribution of derivative or +collective works based on the Library. + +In addition, mere aggregation of another work not based on the Library +with the Library (or with a work based on the Library) on a volume of a +storage or distribution medium does not bring the other work under the +scope of this License. + +3. You may opt to apply the terms of the ordinary GNU General Public +License instead of this License to a given copy of the Library. To do +this, you must alter all the notices that refer to this License, so that +they refer to the ordinary GNU General Public License, version 2, +instead of to this License. (If a newer version than version 2 of the +ordinary GNU General Public License has appeared, then you can specify +that version instead if you wish.) Do not make any other change in these +notices. + +Once this change is made in a given copy, it is irreversible for that +copy, so the ordinary GNU General Public License applies to all +subsequent copies and derivative works made from that copy. + +This option is useful when you wish to copy part of the code of the +Library into a program that is not a library. + +4. You may copy and distribute the Library (or a portion or derivative +of it, under Section 2) in object code or executable form under the +terms of Sections 1 and 2 above provided that you accompany it with the +complete corresponding machine-readable source code, which must be +distributed under the terms of Sections 1 and 2 above on a medium +customarily used for software interchange. + +If distribution of object code is made by offering access to copy from a +designated place, then offering equivalent access to copy the source +code from the same place satisfies the requirement to distribute the +source code, even though third parties are not compelled to copy the +source along with the object code. + +5. A program that contains no derivative of any portion of the Library, +but is designed to work with the Library by being compiled or linked +with it, is called a "work that uses the Library". Such a work, in +isolation, is not a derivative work of the Library, and therefore falls +outside the scope of this License. + +However, linking a "work that uses the Library" with the Library creates +an executable that is a derivative of the Library (because it contains +portions of the Library), rather than a "work that uses the library". +The executable is therefore covered by this License. Section 6 states +terms for distribution of such executables. + +When a "work that uses the Library" uses material from a header file +that is part of the Library, the object code for the work may be a +derivative work of the Library even though the source code is not. +Whether this is true is especially significant if the work can be linked +without the Library, or if the work is itself a library. The threshold +for this to be true is not precisely defined by law. + +If such an object file uses only numerical parameters, data structure +layouts and accessors, and small macros and small inline functions (ten +lines or less in length), then the use of the object file is +unrestricted, regardless of whether it is legally a derivative work. +(Executables containing this object code plus portions of the Library +will still fall under Section 6.) + +Otherwise, if the work is a derivative of the Library, you may +distribute the object code for the work under the terms of Section 6. +Any executables containing that work also fall under Section 6, whether +or not they are linked directly with the Library itself. + +6. As an exception to the Sections above, you may also combine or link a +"work that uses the Library" with the Library to produce a work +containing portions of the Library, and distribute that work under terms +of your choice, provided that the terms permit modification of the work +for the customer's own use and reverse engineering for debugging such +modifications. + +You must give prominent notice with each copy of the work that the +Library is used in it and that the Library and its use are covered by +this License. You must supply a copy of this License. If the work during +execution displays copyright notices, you must include the copyright +notice for the Library among them, as well as a reference directing the +user to the copy of this License. Also, you must do one of these things: + + + a) Accompany the work with the complete corresponding + machine-readable source code for the Library including whatever + changes were used in the work (which must be distributed under + Sections 1 and 2 above); and, if the work is an executable linked + with the Library, with the complete machine-readable "work that + uses the Library", as object code and/or source code, so that the + user can modify the Library and then relink to produce a modified + executable containing the modified Library. (It is understood + that the user who changes the contents of definitions files in + the Library will not necessarily be able to recompile the + application to use the modified definitions.) + b) Use a suitable shared library mechanism for linking with the + Library. A suitable mechanism is one that (1) uses at run time a + copy of the library already present on the user's computer + system, rather than copying library functions into the + executable, and (2) will operate properly with a modified version + of the library, if the user installs one, as long as the modified + version is interface-compatible with the version that the work + was made with. + c) Accompany the work with a written offer, valid for at least three + years, to give the same user the materials specified in + Subsection 6a, above, for a charge no more than the cost of + performing this distribution. + d) If distribution of the work is made by offering access to copy + from a designated place, offer equivalent access to copy the + above specified materials from the same place. + e) Verify that the user has already received a copy of these + materials or that you have already sent this user a copy. + +For an executable, the required form of the "work that uses the Library" +must include any data and utility programs needed for reproducing the +executable from it. However, as a special exception, the materials to be +distributed need not include anything that is normally distributed (in +either source or binary form) with the major components (compiler, +kernel, and so on) of the operating system on which the executable runs, +unless that component itself accompanies the executable. + +It may happen that this requirement contradicts the license restrictions +of other proprietary libraries that do not normally accompany the +operating system. Such a contradiction means you cannot use both them +and the Library together in an executable that you distribute. + +7. You may place library facilities that are a work based on the Library +side-by-side in a single library together with other library facilities +not covered by this License, and distribute such a combined library, +provided that the separate distribution of the work based on the Library +and of the other library facilities is otherwise permitted, and provided +that you do these two things: + + a) Accompany the combined library with a copy of the same work based + on the Library, uncombined with any other library facilities. + This must be distributed under the terms of the Sections above. + b) Give prominent notice with the combined library of the fact that + part of it is a work based on the Library, and explaining where + to find the accompanying uncombined form of the same work. + +8. You may not copy, modify, sublicense, link with, or distribute the +Library except as expressly provided under this License. Any attempt +otherwise to copy, modify, sublicense, link with, or distribute the +Library is void, and will automatically terminate your rights under this +License. However, parties who have received copies, or rights, from you +under this License will not have their licenses terminated so long as +such parties remain in full compliance. + +9. You are not required to accept this License, since you have not +signed it. However, nothing else grants you permission to modify or +distribute the Library or its derivative works. These actions are +prohibited by law if you do not accept this License. Therefore, by +modifying or distributing the Library (or any work based on the +Library), you indicate your acceptance of this License to do so, and all +its terms and conditions for copying, distributing or modifying the +Library or works based on it. + +10. Each time you redistribute the Library (or any work based on the +Library), the recipient automatically receives a license from the +original licensor to copy, distribute, link with or modify the Library +subject to these terms and conditions. You may not impose any further +restrictions on the recipients' exercise of the rights granted herein. +You are not responsible for enforcing compliance by third parties with +this License. + +11. If, as a consequence of a court judgment or allegation of patent +infringement or for any other reason (not limited to patent issues), +conditions are imposed on you (whether by court order, agreement or +otherwise) that contradict the conditions of this License, they do not +excuse you from the conditions of this License. If you cannot distribute +so as to satisfy simultaneously your obligations under this License and +any other pertinent obligations, then as a consequence you may not +distribute the Library at all. For example, if a patent license would +not permit royalty-free redistribution of the Library by all those who +receive copies directly or indirectly through you, then the only way you +could satisfy both it and this License would be to refrain entirely from +distribution of the Library. + +If any portion of this section is held invalid or unenforceable under +any particular circumstance, the balance of the section is intended to +apply, and the section as a whole is intended to apply in other +circumstances. + +It is not the purpose of this section to induce you to infringe any +patents or other property right claims or to contest validity of any +such claims; this section has the sole purpose of protecting the +integrity of the free software distribution system which is implemented +by public license practices. Many people have made generous +contributions to the wide range of software distributed through that +system in reliance on consistent application of that system; it is up to +the author/donor to decide if he or she is willing to distribute +software through any other system and a licensee cannot impose that +choice. + +This section is intended to make thoroughly clear what is believed to be +a consequence of the rest of this License. + +12. If the distribution and/or use of the Library is restricted in +certain countries either by patents or by copyrighted interfaces, the +original copyright holder who places the Library under this License may +add an explicit geographical distribution limitation excluding those +countries, so that distribution is permitted only in or among countries +not thus excluded. In such case, this License incorporates the +limitation as if written in the body of this License. + +13. The Free Software Foundation may publish revised and/or new versions +of the Lesser General Public License from time to time. Such new +versions will be similar in spirit to the present version, but may +differ in detail to address new problems or concerns. + +Each version is given a distinguishing version number. If the Library +specifies a version number of this License which applies to it and "any +later version", you have the option of following the terms and +conditions either of that version or of any later version published by +the Free Software Foundation. If the Library does not specify a license +version number, you may choose any version ever published by the Free +Software Foundation. + +14. If you wish to incorporate parts of the Library into other free +programs whose distribution conditions are incompatible with these, +write to the author to ask for permission. For software which is +copyrighted by the Free Software Foundation, write to the Free Software +Foundation; we sometimes make exceptions for this. Our decision will be +guided by the two goals of preserving the free status of all derivatives +of our free software and of promoting the sharing and reuse of software +generally. + +NO WARRANTY + +15. BECAUSE THE LIBRARY IS LICENSED FREE OF CHARGE, THERE IS NO +WARRANTY FOR THE LIBRARY, TO THE EXTENT PERMITTED BY APPLICABLE LAW. +EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR +OTHER PARTIES PROVIDE THE LIBRARY "AS IS" WITHOUT WARRANTY OF ANY KIND, +EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED +WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE +ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE LIBRARY IS WITH +YOU. SHOULD THE LIBRARY PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL +NECESSARY SERVICING, REPAIR OR CORRECTION. + +16. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN +WRITING WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY +AND/OR REDISTRIBUTE THE LIBRARY AS PERMITTED ABOVE, BE LIABLE TO YOU FOR +DAMAGES, INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL +DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THE LIBRARY +(INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING RENDERED +INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF +THE LIBRARY TO OPERATE WITH ANY OTHER SOFTWARE), EVEN IF SUCH HOLDER OR +OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. + +END OF TERMS AND CONDITIONS + +END OF GNU LESSER GENERAL PUBLIC LICENSE, Version 2.1 NOTICES AND INFORMATION + +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ + +masterzen/xmlpath:13f4951, 0MQ, Carbon.java, libzmq4x-windows + + GNU LESSER GENERAL PUBLIC LICENSE + Version 3, 29 June 2007 + + Copyright (C) 2007 Free Software Foundation, Inc. + Everyone is permitted to copy and distribute verbatim copies + of this license document, but changing it is not allowed. + + + This version of the GNU Lesser General Public License incorporates +the terms and conditions of version 3 of the GNU General Public +License, supplemented by the additional permissions listed below. + + 0. Additional Definitions. + + As used herein, "this License" refers to version 3 of the GNU Lesser +General Public License, and the "GNU GPL" refers to version 3 of the GNU +General Public License. + + "The Library" refers to a covered work governed by this License, +other than an Application or a Combined Work as defined below. + + An "Application" is any work that makes use of an interface provided +by the Library, but which is not otherwise based on the Library. +Defining a subclass of a class defined by the Library is deemed a mode +of using an interface provided by the Library. + + A "Combined Work" is a work produced by combining or linking an +Application with the Library. The particular version of the Library +with which the Combined Work was made is also called the "Linked +Version". + + The "Minimal Corresponding Source" for a Combined Work means the +Corresponding Source for the Combined Work, excluding any source code +for portions of the Combined Work that, considered in isolation, are +based on the Application, and not on the Linked Version. + + The "Corresponding Application Code" for a Combined Work means the +object code and/or source code for the Application, including any data +and utility programs needed for reproducing the Combined Work from the +Application, but excluding the System Libraries of the Combined Work. + + 1. Exception to Section 3 of the GNU GPL. + + You may convey a covered work under sections 3 and 4 of this License +without being bound by section 3 of the GNU GPL. + + 2. Conveying Modified Versions. + + If you modify a copy of the Library, and, in your modifications, a +facility refers to a function or data to be supplied by an Application +that uses the facility (other than as an argument passed when the +facility is invoked), then you may convey a copy of the modified +version: + + a) under this License, provided that you make a good faith effort to + ensure that, in the event an Application does not supply the + function or data, the facility still operates, and performs + whatever part of its purpose remains meaningful, or + + b) under the GNU GPL, with none of the additional permissions of + this License applicable to that copy. + + 3. Object Code Incorporating Material from Library Header Files. + + The object code form of an Application may incorporate material from +a header file that is part of the Library. You may convey such object +code under terms of your choice, provided that, if the incorporated +material is not limited to numerical parameters, data structure +layouts and accessors, or small macros, inline functions and templates +(ten or fewer lines in length), you do both of the following: + + a) Give prominent notice with each copy of the object code that the + Library is used in it and that the Library and its use are + covered by this License. + + b) Accompany the object code with a copy of the GNU GPL and this license + document. + + 4. Combined Works. + + You may convey a Combined Work under terms of your choice that, +taken together, effectively do not restrict modification of the +portions of the Library contained in the Combined Work and reverse +engineering for debugging such modifications, if you also do each of +the following: + + a) Give prominent notice with each copy of the Combined Work that + the Library is used in it and that the Library and its use are + covered by this License. + + b) Accompany the Combined Work with a copy of the GNU GPL and this license + document. + + c) For a Combined Work that displays copyright notices during + execution, include the copyright notice for the Library among + these notices, as well as a reference directing the user to the + copies of the GNU GPL and this license document. + + d) Do one of the following: + + 0) Convey the Minimal Corresponding Source under the terms of this + License, and the Corresponding Application Code in a form + suitable for, and under terms that permit, the user to + recombine or relink the Application with a modified version of + the Linked Version to produce a modified Combined Work, in the + manner specified by section 6 of the GNU GPL for conveying + Corresponding Source. + + 1) Use a suitable shared library mechanism for linking with the + Library. A suitable mechanism is one that (a) uses at run time + a copy of the Library already present on the user's computer + system, and (b) will operate properly with a modified version + of the Library that is interface-compatible with the Linked + Version. + + e) Provide Installation Information, but only if you would otherwise + be required to provide such information under section 6 of the + GNU GPL, and only to the extent that such information is + necessary to install and execute a modified version of the + Combined Work produced by recombining or relinking the + Application with a modified version of the Linked Version. (If + you use option 4d0, the Installation Information must accompany + the Minimal Corresponding Source and Corresponding Application + Code. If you use option 4d1, you must provide the Installation + Information in the manner specified by section 6 of the GNU GPL + for conveying Corresponding Source.) + + 5. Combined Libraries. + + You may place library facilities that are a work based on the +Library side by side in a single library together with other library +facilities that are not Applications and are not covered by this +License, and convey such a combined library under terms of your +choice, if you do both of the following: + + a) Accompany the combined library with a copy of the same work based + on the Library, uncombined with any other library facilities, + conveyed under the terms of this License. + + b) Give prominent notice with the combined library that part of it + is a work based on the Library, and explaining where to find the + accompanying uncombined form of the same work. + + 6. Revised Versions of the GNU Lesser General Public License. + + The Free Software Foundation may publish revised and/or new versions +of the GNU Lesser General Public License from time to time. Such new +versions will be similar in spirit to the present version, but may +differ in detail to address new problems or concerns. + + Each version is given a distinguishing version number. If the +Library as you received it specifies that a certain numbered version +of the GNU Lesser General Public License "or any later version" +applies to it, you have the option of following the terms and +conditions either of that published version or of any later version +published by the Free Software Foundation. If the Library as you +received it does not specify a version number of the GNU Lesser +General Public License, you may choose any version of the GNU Lesser +General Public License ever published by the Free Software Foundation. + + If the Library as you received it specifies that a proxy can decide +whether future versions of the GNU Lesser General Public License shall +apply, that proxy's public statement of acceptance of any version is +permanent authorization for you to choose that version for the +Library. + +END OF GNU LESSER GENERAL PUBLIC LICENSE, Version 3 NOTICES AND INFORMATION +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ + + MIT LICENSE The Program includes some or all of the following that IBM obtained @@ -6792,6 +8215,931 @@ Normandie - Jeremie Vautard), xchar Copyright 2005-2016, Sam Ruby Ruby), yajl-ruby-1.3.1 (Copyright (c) 2014 Brian Lopez), yard-0.9.12 (Copyright (c) 2007-2016 Loren Segal), Prototype Javascript framework (Copyright © 2005-2007 Sam Stephenson) +@gimenete/type-writer (Copyright (c) 2018 Alberto Gimeno), +@kyleshockey/js-yaml (Copyright (C) 2011-2015 by Vitaly Puzrin), +@kyleshockey/object-assign-deep (No Copyright found), @octokit/rest +(Copyright (c) 2012 Cloud9 IDE Inc. (Mike de Boer)Copyright (c) +2017-2018 Octokit contributors), @types/babel-types (Copyright (c) +Microsoft Corporation. All rights reserved.), @types/babylon (Copyright +(c) Microsoft Corporation. All rights reserved.), @types/node (Copyright +(c) Microsoft Corporation. All rights reserved.), @types/uuid (Copyright +(c) Microsoft Corporation. All rights reserved.), accept-language-3.0.18 +(Copyright (c) 2014 Tingan Ho), accepts-1.3.5 (Copyright (c) 2014 +Jonathan Ong Copyright (c) 2015 Douglas Christopher +Wilson ), acorn (Copyright (C) 2012-2014 by +various contributors (see AUTHORS)), acorn-5.5.3 (Copyright (C) +2012-2018 by various contributors (see AUTHORS)), acorn-es7-plugin +(Copyright (c) 2015 2016 Matt Woolf (MatAtBread MatAtWork)), +acorn-es7-plugin-test (Copyright (c) 2015;2016 Matt Woolf (MatAtBread; +MatAtWork)), acorn-globals (Copyright (c) 2014 Forbes Lindesay), +after-0.8.2 (Copyright (c) 2011 Raynos.), agent-base (Copyright (c) 2013 +Nathan Rajlich <nathan@tootallnate.net>), ajv (Copyright (c) +2015-2017 Evgeny Poberezkin), ajv-async (Copyright (c) 2016 Evgeny +Poberezkin), ajv-async.bundle.js (Author:David Bonnet), ajv-errors +(Copyright (c) 2017 Evgeny Poberezkin), ajv-i18n (Copyright (c) 2015 +Evgeny Poberezkin), ajv-keywords (Copyright (c) 2016 Evgeny Poberezkin), +ajv-keywords-2.1.1 (Copyright (c) 2016 Evgeny Poberezkin), amqplib +(Copyright (c) 2013 2014 Michael Bridgen ), +angular (Copyright (C) 2011 by MarkLogic Corporation), angular-1.7.0 +(Copyright (c) 2016 Angular), angular-animate (Copyright (c) 2016 +Angular), angular-animate-1.7.0 (Copyright (c) 2016 Angular), +angular-aria (Copyright (c) 2016 Angular), angular-aria-1.7.0 (Copyright +(c) 2016 Angular), angular-clipboard-1.6.2 (Copyright (c) 2015), +angular-crypto-0.0.3 (By Patrick Stapleton), +angular-dirtyform-check-0.1.8 (Copyright (c) 2016 Jonas Zuberbuehler), +angular-material (Copyright (c) 2014-2018 Google Inc. +http://angularjs.org), angular-material-1.1.9 (Copyright (c) 2014-2018 +Google Inc. http://angularjs.org), +angular-material-fabTrigger-1.1.0-rc.5-master-26a5fb8 (Copyright (c) +2014-2017 Google, Inc. http://angularjs.org), +angular-material-textField-0.9.0-rc1-master-3c0ce9b (Copyright (c) +2014-2017 Google, Inc. http://angularjs.org), angular-md5-0.1.10 +(Copyright (c) 2014 PatrickJS), angular-messages (Copyright (c) 2016 +Angular), angular-messages-1.7.0 (Copyright (c) 2016 Angular), +angular-resource (Copyright (c) 2016 Angular), angular-resource-1.7.0 +(Copyright (c) 2016 Angular), angular-route (Copyright (c) 2016 +Angular), angular-route-1.7.0 (Copyright (c) 2016 Angular), +angular-sanitize (Copyright (c) 2016 Angular), angular-sanitize-1.7.0 +(Copyright (c) 2016 Angular), angular-translate-2.17.1 (Copyright (c) +2013-2017 The angular-translate team and Pascal Precht), +angular-translate-2.18.1 (Copyright (c) 2013-2017 The angular-translate +team and Pascal Precht), angular-ui-router-0.4.3 (Copyright (c) +2013-2015 The AngularUI Team Karsten Sperling), ansi-colors-1.1.0 +(Copyright (c) 2015-2017 Brian Woodward.), ansi-cyan-0.1.1 (Copyright +(c) Jon Schlinkert.), ansi-escapes-3.1.0 (Copyright (c) Sindre Sorhus + (sindresorhus.com)), ansi-gray-0.1.1 (Copyright +(c) Jon Schlinkert.), ansi-red-0.1.1 (Copyright (c) Jon Schlinkert.), +ansi-regex-3.0.0 (Copyright (c) Sindre Sorhus), ansi-styles-3.2.1 +(Copyright (c) Sindre Sorhus +(sindresorhus.com)), ansi-wrap-0.1.0 (Copyright (c) 2015 Jon +Schlinkert.), apparatus-0.0.10 (Copyright (c) 2011 Chris Umbel), +arr-diff-1.1.0 (Copyright (c) 2014-2015 Jon Schlinkert.), arr-diff-4.0.0 +(Copyright (c) 2014-2017 Jon Schlinkert.), arr-flatten-1.1.0 (Copyright +(c) 2014-2017 Jon Schlinkert.), arr-union-2.1.0 (Copyright (c) 2014-2015 +Jon Schlinkert.), arr-union-3.1.0 (Copyright (c) 2014-2016 Jon +Schlinkert.), array-buffer.js (Copyright (c) 2015-2017 Chen Fengyuan), +array-each-1.0.1 (Copyright (c) 2015-2017 Jon Schlinkert.), +array-slice-0.2.3 (Copyright (c) 2014-2015 Jon Schlinkert.Copyright (c) +2012-2015 The Dojo Foundation. Copyright (c) 2009-2015 Jeremy +Ashkenas.), array-slice-1.1.0 (Copyright (c) 2014-2017 Jon Schlinkert.), +array-unique-0.3.2 (Copyright (c) 2014-2016 Jon Schlinkert.), +arraybuffer.slice-0.0.7 (Copyright (C) 2013 Rase-), asap (Copyright +2009–2013 Contributors. All rights reserved.), asn1 (Copyright (c) 2011 +Mark Cavage All rights reserved.), assertion-error-1.1.0 (Copyright (c) +2013 Jake Luer (http://qualiancy.com)), +assign-symbols-1.0.0 (Copyright (c) 2015 Jon Schlinkert.), ast-types +(Copyright (c) 2013 Ben Newman ), ast-types-0.11.3 +(Copyright (c) 2013 Ben Newman ), async-0.2.7 +(Copyright (c) 2010 Caolan McMahon), async-2.6.0 (Copyright (c) +2010-2017 Caolan McMahon), async-2.6.1 (Copyright (c) 2010-2018 Caolan +McMahon), async-hook-jl-1.7.6 (Copyright (c) 2015 Andreas Madsen), +async-limiter-1.0.0 (Copyright (c) 2017 Samuel Reed), aws4 (Copyright +2013 Michael Hart (michael.hart.au@gmail.com)), aws4-1.7.0 (Copyright +2013 Michael Hart (michael.hart.au@gmail.com)), axios-0.15.3 (Copyright +(c) 2014 Matt Zabriskie), axios-0.18.0 (Copyright (c) 2014-present Matt +Zabriskie), azure-arm-compute (Copyright (c) 2018 Microsoft), +babel-code-frame-6.26.0 (Copyright © 2014-2018 Sebastian McKenzie +), babel-runtime (No Copyright found), +babel-runtime-6.26.0 (Copyright © 2014-2018 Sebastian McKenzie +), babel-types-6.26.0 (Copyright © 2014-2018 Sebastian +McKenzie ), babylon-6.16.2 (Copyright (C) 2012-2014 by +various contributors (see AUTHORS)), babylon-6.18.0 (Copyright (C) +2012-2014 by various contributors), backo2-1.0.2 (Copyright (c) 2014 +Mark Mokryn , Copyright (c) 2014 TJ Holowaychuk +), base-0.11.2 (Copyright (c) 2015-2017 Jon +Schlinkert.), base64-arraybuffer (Copyright (c) 2012 Niklas von +Hertzen), base64-arraybuffer-0.1.5 (Copyright (c) 2012 Niklas von +Hertzen), base64-js-1.0.2 (Copyright (c) 2014), base64-js-1.3.0 +(Copyright (c) 2014), base64id-1.0.0 (Copyright (c) 2012-2016 Kristian +Faeldt ), basic-auth-2.0.0 (Copyright +(c) 2013 TJ HolowaychukCopyright (c) 2014 Jonathan Ong +Copyright (c) 2015-2016 Douglas Christopher Wilson +), BCmail-jdk15on (Copyright (c) 2000 - 2013 The +Legion of the Bouncy Castle Inc. (https://www.bouncycastle.org)), +bcp47-1.1.2 (Copyright (c) 2015 Gabriel Llamas), better-assert-1.0.2 +(Copyright (c) 2012 TJ Holowaychuk), bin-prettier.js (Copyright (c) +2014-2018, Jon Schlinkert), binary-extensions-1.11.0 (Copyright (c) +Sindre Sorhus (sindresorhus.com)), +bindings-1.3.0 (Copyright (c) 2012 Nathan Rajlich +<nathan@tootallnate.net>), bitsyntax (Copyright (c) 2012-2014 +Michael Bridgen ), bl (Copyright (c) 2013-2018 +bl contributors), bl-1.2.2 (Copyright (c) 2013-2016 bl contributors), +blob-0.0.4 (Copyright (C) 2014 Rase), bluebird-3.5.1 (Copyright (c) +2013-2017 Petka Antonov), body-parser-1.18.2 (Copyright (c) 2014 +Jonathan Ong Copyright (c) 2014-2015 Douglas +Christopher Wilson ), body-parser-1.18.3 +(Copyright (c) 2014 Jonathan Ong Copyright (c) +2014-2015 Douglas Christopher Wilson ), +Bootstrap v3.3.7 (http://getbootstrap.com) (Copyright 2011-2016 Twitter, +Inc.), bops-0.0.7 (Author: Chris Dickinson), bops-1.0.0 (By Chris +Dickinson ), Bouncy Castle OpenPGP AP (Copyright (c) +2000 - 2018 The Legion of the Bouncy Castle Inc. +(https://www.bouncycastle.org)), braces-2.3.2 (Copyright (c) 2014-2018 +Jon Schlinkert.), browser_build (Copyright Joyent, Inc. and other Node +contributors.), bson (Author:Feross Aboukhadijeh), btoa-lite (No +Copyright found), buffer (Copyright (c) Feross Aboukhadijeh and other +contributors.), buffer-5.1.0 (Copyright (c) Feross Aboukhadijeh and +other contributors.), buffer-alloc (No Copyright found), +buffer-alloc-1.1.0 (No Copyright Statement found), buffer-alloc-unsafe +(No Copyright found), buffer-alloc-unsafe-0.1.1 (No Copyright Statement +found), buffer-fill (No Copyright found), buffer-fill-0.1.1 (No +Copyright Statement found), buffer-from (Copyright (c) 2016 2018 Linus +Unnebäck), buffer-from-1.0.0 (Copyright (c) 2016, 2018 Linus Unnebäck), +buffer-more-ints (Copyright (c) 2012 David Wragg. All rights reserved.), +bundle.js. (Author:Feross Aboukhadijeh), bunyan-1.8.12 (Copyright 2016 +Trent MickCopyright 2016 Joyent Inc.), bunyan-loggly (Copyright (c) 2016 +Maurice Butler), bunyan-loggly-1.3.4 (Copyright (c) 2016 Maurice +Butler), bunyan-rotating-file-stream-1.6.3 (Copyright 2016 Jim +TupperCopyright 2016 Trent MickCopyright 2016 Joyent Inc.), bytes-3.0.0 +(Copyright (c) 2012-2014 TJ Holowaychuk Copyright +(c) 2015 Jed Watson ), cache-base-1.0.1 (Copyright +(c) 2014-2017 Jon Schlinkert.), callsite-1.0.0 (Copyright (c) 2011, 2013 +TJ Holowaychuk ), camelcase (Copyright (c) Sindre +Sorhus (sindresorhus.com)), +capture-stack-trace-1.0.0 (Author: Vsevolod Strukchinsky), +caseless-0.12.1 (Author: Matt R. Wilson), chai (Copyright (c) 2017 +Chai.js Assertion Library), chai-3.5.0 (Copyright (c) 2011-2015 Jake +Luer ), chai-http-3.0.0 (Copyright (c) Jake +Luer jake@alogicalparadox.com), chai-http-4.0.0 (Copyright (c) Jake Luer +), chalk-2.4.1 (Copyright (c) Sindre Sorhus + (sindresorhus.com)), character-parser +(Copyright (c) 2013 Forbes Lindesay), Chartist.js 0.11.0 (Copyright © +2017 Gion Kunz), check-error (Copyright (c) 2013 Jake Luer + (http://alogicalparadox.com)), circular-json +(Copyright (C) 2013-2017 by Andrea Giammarchi - @WebReflection), +circular-json-0.3.3 (Copyright (C) 2013-2017 by Andrea Giammarchi - +@WebReflection), cjson (Copyright (c) 2015 Oleg Slobodskoi +), class-utils-0.3.6 (Copyright (c) 2015 2017-2018 +Jon Schlinkert.), CLDR JavaScript Library v0.4.4 (Copyright 2013 Rafael +Xavier de Souza), cldr-data-30.0.5 (Copyright (c) 2013 Rafael Xavier de +Souza http://rafael.xavier.blog.br), cldr-data-downloader (Copyright (c) +2013 Rafael Xavier de Souza http://rafael.xavier.blog.br), +cldr-data-downloader-0.3.2 (Copyright (c) 2013 Rafael Xavier de Souza +http://rafael.xavier.blog.br), cldr_event.js (Author:Oliver Caldwell), +cldrjs (Copyright (c) Rafael Xavier de Souza +http://rafael.xavier.blog.br), cldrjs-0.4.8 (Copyright (c) Rafael Xavier +de Souza http://rafael.xavier.blog.br), clean-css (Copyright (C) 2017 +JakubPawlowicz.com), clean-css-4.1.11 (Copyright (C) 2017 +JakubPawlowicz.com), cli-cursor-2.1.0 (Copyright (c) Sindre Sorhus + (sindresorhus.com)), cli.js (Copyright (C) 2010 +Charlie Robbins), client (Copyright (c) 2005, 2014 jQuery Foundation, +Inc.), clipboard (Author: Zeno Rocha), clone-1.0.4 (Copyright © +2011-2015 Paul Vorbach ), cluster-key-slot-1.0.9 +(Copyright (c) 2015 NodeRedis), co-3.0.6 (No Copyright Statement found), +codemirror (Copyright (C) 2017 by Marijn Haverbeke +and others), codemirror-5.38.0 (Copyright (C) 2017 by Marijn Haverbeke + and others), codependency (No Copyright found), +collection-visit-1.0.0 (Copyright (c) 2015 2017 Jon Schlinkert), +color-convert (Copyright (c) 2011-2016 Heather Arthur +), color-convert-1.9.1 (Copyright (c) 2011-2016 +Heather Arthur ), color-name (Copyright (c) 2015 +Dmitry Ivanov), color-name-1.1.3 (Copyright (c) 2015 Dmitry Ivanov), +color-string (Copyright (c) 2011 Heather Arthur ), +colornames (Required), colors (- Copyright (c) Marak Squires - Copyright +(c) Sindre Sorhus (sindresorhus.com)), +colors-1.2.5 (Copyright (c) Marak Squires - Copyright (c) Sindre Sorhus + (sindresorhus.com)), colors-1.3.0 (- Copyright +(c) Marak Squires - Copyright (c) Sindre Sorhus +(sindresorhus.com)), colors.js (Copyright (c) Sindre Sorhus + (sindresorhus.com)), colorspace (Copyright (c) +2015 Arnout Kazemier Martijn Swaagman the Contributors.), commander +(Copyright (c) 2011 TJ Holowaychuk <tj@vision-media.ca>), +commander-2.15.1 (Copyright (c) 2011 TJ Holowaychuk +), component-bind-1.0.0 (Copyright (c) 2012 TJ +Holowaychuk), component-inherit-0.0.3 (Copyright (c) 2013 TJ +Holowaychuk), compressible (Copyright (c) 2013 Jonathan Ong +Copyright (c) 2014 Jeremiah Senkpiel +Copyright (c) 2015 Douglas Christopher +Wilson ), compressible-2.0.13 (Copyright (c) +2013 Jonathan Ong Copyright (c) 2014 Jeremiah +Senkpiel Copyright (c) 2015 Douglas +Christopher Wilson ), compression (Copyright (c) +2014 Jonathan Ong Copyright (c) 2014-2015 Douglas +Christopher Wilson ), compression-1.7.2 +(Copyright (c) 2014 Jonathan Ong Copyright (c) +2014-2015 Douglas Christopher Wilson ), +concat-stream-1.6.2 (Copyright (c) 2013 Max Ogden), constantinople +(Copyright (c) 2013 Forbes Lindesay), constantinople-3.1.2 (Copyright +(c) 2013 Forbes Lindesay), content-security-policy-builder-2.0.0 +(Copyright (c) 2015-2018 Evan Hahn), content-type-1.0.4 (Copyright (c) +2015 Douglas Christopher Wilson), cookiejar (Copyright (c) 2013 Bradley +Meck), cookiejar-2.0.6 (Copyright (c) 2013 Bradley Meck), cookies-0.7.1 +(Copyright (c) 2014 Jed Schmidt http://jed.is/Copyright (c) 2015-2016 +Douglas Christopher Wilson ), +copy-descriptor-0.1.1 (Copyright (c) 2015-2016 Jon Schlinkert), core-js +(Copyright (c) 2015 Denis Pushkarev), core-js-2.5.6 (Copyright (c) +2014-2018 Denis Pushkarev), core-js-2.5.7 (Copyright (c) 2014-2018 Denis +Pushkarev), cors-2.8.4 (Copyright (c) 2013 Troy Goode +), create-error-class-2.0.1 (Copyright (c) Vsevolod +Strukchinsky ), create-error-class-3.0.2 (Copyright +(c) Vsevolod Strukchinsky (github.com/floatdrop)), +cross-fetch-0.0.8 (Copyright (c) 2017 Leonardo Quixadá), +cross-fetch-polyfill-0.0.0 (Copyright (c) 2017 Leonardo Quixadá), +cross-spawn-5.1.0 (Copyright (c) 2014 IndigoUnited), crypto-js-3.1.9-1 +(Copyright (c) 2009-2013 Jeff Mott Copyright (c) 2013-2016 Evan +Vosberg), css (Copyright (c) 2012 TJ Holowaychuk +<tj@vision-media.ca>), css-parse (Copyright (c) 2012 TJ +Holowaychuk <tj@vision-media.ca>), css-stringify (Copyright (c) +2012 TJ Holowaychuk <tj@vision-media.ca>), +data-uri-to-buffer-1.2.0 (Copyright (c) 2014 Nathan Rajlich +<nathan@tootallnate.net>), Datasource (No Copyright found), +date-format-1.2.0 (Copyright (c) 2013 Gareth Jones), dateformat +(Copyright (c) 2007-2009 Steven Levithan ), +dateformat-2.2.0 ((c) 2007-2009 Steven Levithan ), +DCO.md (Author:Jane Developer), debug-1.0.5 (Copyright (c) 2014 TJ +Holowaychuk), debug-2.6.9 (Copyright (c) 2014 TJ Holowaychuk +), debug-3.1.0 (Copyright (c) 2014 TJ Holowaychuk +), decode-uri-component-0.2.0 (Copyright (c) Sam +Verschueren (github.com/SamVerschueren)), +decompress-response-3.3.0 (Copyright (c) Sindre Sorhus + (sindresorhus.com)), deep-eql-3.0.1 (Copyright +(c) 2013 Jake Luer +(http://alogicalparadox.com)), deep-extend (Copyright (c) 2013-2018 +Viacheslav Lotsmanov), deep-extend-0.5.1 (Copyright (c) 2013-2018 +Viacheslav Lotsmanov), define-property-0.2.5 (Copyright (c) 2015 Jon +Schlinkert.), define-property-1.0.0 (Copyright (c) 2015 2017 Jon +Schlinkert), define-property-2.0.2 (Copyright (c) 2015-2018 Jon +Schlinkert.), degenerator-1.0.4 (Copyright (c) 2013 Nathan Rajlich +<nathan@tootallnate.net>), delegate (Author:Zeno Rocha), +depd-1.1.1 (Copyright (c) 2014-2017 Douglas Christopher Wilson), +depd-1.1.2 (Copyright (c) 2014-2017 Douglas Christopher Wilson), +detect-file-1.0.0 (Copyright (c) 2016-2017 Brian Woodward.), diagnostics +(Copyright (c) 2015 Arnout Kazemier Martijn Swaagman the Contributors.), +dist (Author:Marijn Haverbeke, Ingvar Stepanyan, and various +contributors), duplexify-3.6.0 (Copyright (c) 2014 Mathias Buus), +dustjs-example-amd-1.0.0 (Copyright (c) 2010 Aleksander Williams), +dustjs-example-commonjs-1.0.0 (Copyright (c) 2010 Aleksander Williams), +dustjs-example-hoffman-1.0.0 (Copyright (c) 2010 Aleksander Williams), +dustjs-example-streaming-1.0.0 (Copyright (c) 2010 Aleksander Williams), +dustjs-example-streaming-incremental-1.0.0 (Copyright (c) 2010 +Aleksander Williams), dustjs-helpers-1.7.4 (Copyright (c) 2010 +Aleksander WilliamsCopyright (c) 2010 Aleksander Williams), ebnf-parser +(No Copyright found), ecc-jsbn (Copyright (c) 2014 Jeremie Miller), +eivindfjeldstad-dot-0.0.1 (No Copyright Statement found), enabled +(Copyright (c) 2015 Arnout Kazemier Martijn Swaagman the Contributors.), +encodeurl-1.0.2 (Copyright (c) 2016 Douglas Christopher Wilson), +encoding-0.1.12 (Copyright (c) 2012-2014 Andris Reinman), +end-of-stream-1.4.1 (Copyright (c) 2014 Mathias Buus), engine.io-3.2.0 +(Copyright (c) 2014 Guillermo Rauch ), +engine.io-client-3.2.1 (Copyright (c) 2014-2015 Automattic +), engine.io-parser-2.1.2 (Copyright (c) 2016 Guillermo +Rauch (@rauchg)), ent-2.2.0 (Author: James Halliday), env-variable (No +Copyright found), error-ex (Copyright (c) 2015 JD Ballard), +es6-promise-4.2.4 (Copyright (c) 2014 Yehuda Katz Tom Dale Stefan Penner +and contributors), es6-promisify-5.0.0 (Copyright (c) 2014 Yehuda Katz, +Tom Dale, Stefan Penner and contributors), eslint-4.19.1 (Copyright JS +Foundation and other contributors https://js.foundation), +eslint-config-loopback-8.0.0 (Copyright (c) IBM Corp. 2016. All Rights +Reserved.), etag-1.8.1 (Copyright (c) 2014-2016 Douglas Christopher +Wilson), EventEmitter v4.2.7 - git.io/ee (By Oliver Caldwell), +eventemitter2-5.0.1 (Copyright (c) 2016 Paolo Fragomeni + and Contributors), eventemitter2.js +(Copyright (c) 2013 hij1nx), execa-0.7.0 (Copyright (c) Sindre Sorhus + (sindresorhus.com)), expand-brackets-2.1.4 +(Copyright (c) 2015-2016 Jon Schlinkert), expand-tilde-2.0.2 (Copyright +(c) 2015-2016 Jon Schlinkert.), expect-ct-0.1.1 (Copyright (c) 2017 2018 +Evan Hahn), express-4.16.3 (Copyright (c) 2009-2014 TJ Holowaychuk +Copyright (c) 2013-2014 Roman Shtylman +Copyright (c) 2014-2015 Douglas +Christopher Wilson ), express-session-1.15.6 +(Copyright (c) 2010 Sencha Inc.Copyright (c) 2011 TJ Holowaychuk +Copyright (c) 2014-2015 Douglas Christopher Wilson +), extend (Copyright (c) 2014 Stefan Thomas), +extend-shallow-1.1.4 (Copyright (c) 2014-2015 Jon Schlinkert.), +extend-shallow-3.0.2 (Copyright (c) 2014-2015 2017 Jon Schlinkert.), +external-editor-2.2.0 (Copyright (c) 2016 Kevin Gravier), extglob-2.0.4 +(Copyright (c) 2015-2017 Jon Schlinkert.), fancy-log-1.3.2 (Copyright +(c) 2015 Blaine Bublitz ), fast-deep-equal +(Copyright (c) 2017 Evgeny Poberezkin), fast-json-patch-2.0.6 (Copyright +(c) 2013 2014 Joachim Wester), fbjs (Copyright (c) 2013-present Facebook +Inc.), fd-slicer (Copyright (c) 2014 Andrew Kelley), figures-2.0.0 +(Copyright (c) Sindre Sorhus +(sindresorhus.com)), file-entry-cache-2.0.0 (Copyright (c) 2015 Roy +Riojas), file-uri-to-path-1.0.0 (Copyright (c) 2014 Nathan Rajlich +), fill-range-2.2.4 (Copyright (c) 2014-2018 Jon +Schlinkert.), fill-range-4.0.0 (Copyright (c) 2014-2017 Jon Schlinkert), +finalhandler-1.1.1 (Copyright (c) 2014-2017 Douglas Christopher Wilson +), find-up (Copyright (c) Sindre Sorhus + (sindresorhus.com)), findup-sync-2.0.0 +(Copyright (c) 2012-2016 "Cowboy" Ben Alman), fined-1.1.0 (Copyright (c) +2016 Blaine Bublitz Tyler Kellen and other contributors), +first-chunk-stream-0.1.0 (Copyright (c) Sindre Sorhus + (sindresorhus.com)), flagged-respawn-1.0.0 +(Copyright (c) 2014 Tyler Kellen), flat-cache-1.3.0 (Copyright (c) 2015 +Roy Riojas), follow-redirects (Copyright 2017 Olivier Lalonde + James Talmage Ruben Verborgh), +follow-redirects-1.0.0 (Copyright 2017 Olivier Lalonde +, James Talmage , Ruben Verborgh), +follow-redirects-1.5.0 (Copyright 2017 Olivier Lalonde + James Talmage Ruben Verborgh), +Font Awesome code (2018 © Fonticons, Inc.), for-own-1.0.0 (Copyright (c) +2014-2015 2017 Jon Schlinkert), form-data-2.2.1 (Copyright (c) 2012 +Felix Geisendörfer (felix@debuggable.com) and contributors), format-json +1.0.0 (Copyright (c) 2013 Johan Sundström), formidable-1.2.1 (Copyright +(C) 2011 Felix Geisendörfer), forwarded-0.1.2 (Copyright (c) 2014-2017 +Douglas Christopher Wilson), fragment-cache-0.2.1 (Copyright (c) +2016-2017 Jon Schlinkert), fresh-0.5.2 (Copyright (c) 2012 TJ +Holowaychuk Copyright (c) 2016-2017 Douglas +Christopher Wilson ), freshy-1.0.4 (Author: Erik +Toth), fs-constants-1.0.0 (Copyright (c) 2018 Mathias Buus), fs-extra +(Copyright (c) 2011-2016 JP Richardson), fs-extra-3.0.1 (Copyright (c) +2011-2017 JP Richardson), fs-sync (Copyright (c) 2013 Kael Zhang +), fsu-1.1.1 (Copyright (c) Alexey Novikov http://2dubs.com), +ftp-0.3.10 (Copyright Brian White. All rights reserved.), function +(Copyright Joyent, Inc. and other Node contributors.), +function-bind-1.1.1 (Copyright (c) 2013 Raynos.), +functional-red-black-tree-1.0.1 (Copyright (c) 2013 Mikola Lysenko), +gce-images (Copyright (c) 2015 Stephen Sawchuk), gce-images-0.3.3 +(Copyright (c) 2015 Stephen Sawchuk), gcp-metadata-0.3.1 (Copyright (c) +2016 Stephen Sawchuk), gcp-metadata-0.6.3 (Copyright (c) 2016 Stephen +Sawchuk), get-func-name (Copyright (c) 2013 Jake Luer + (http://alogicalparadox.com)), +get-stream-3.0.0 (Copyright (c) Sindre Sorhus +(sindresorhus.com)), get-uri (Copyright (c) 2014 Nathan Rajlich +<nathan@tootallnate.net>), get-uri-2.0.1 (Copyright (c) 2014 +Nathan Rajlich <nathan@tootallnate.net>), get-value-2.0.6 +(Copyright (c) 2014-2016 Jon Schlinkert.), github-from-package-0.0.0 +(Author: Nathan Rajlich), global-modules-1.0.0 (Copyright (c) 2015-2017 +Jon Schlinkert.), global-prefix-1.0.2 (Copyright (c) 2015-2017 Jon +Schlinkert.), globalize (Copyright JS Foundation and other contributors +https://js.foundationCopyright and related rights for sample code are +waived via CC0. Sample), Globalize Runtime v1.1.1 (Copyright jQuery +Foundation and other contributors), globalize(node) (Copyright JS +Foundation and other contributors,), globalize-1.3.0 (Copyright jQuery +Foundation and other contributors https://jquery.org/), globals-11.5.0 +(Copyright (c) Sindre Sorhus +(sindresorhus.com)), glogg-1.0.1 (Copyright (c) 2014 Blaine Bublitz), +goconvey (Copyright (C) 2011 by Maciej Małecki), good-listener (Author: +Zeno Rocha), google-auto-auth-0.7.2 (Copyright (c) 2015 Stephen +Sawchuk), google-auto-auth-0.9.7 (Copyright (c) 2015 Stephen Sawchuk), +google-p12-pem-0.1.2 (Copyright (c) 2014 Ryan Seys), +google-p12-pem-1.0.2 (Copyright (c) 2014 Ryan Seys), got-4.2.0 +(Copyright (c) Sindre Sorhus +(sindresorhus.com)), gtoken-1.2.3 (Copyright (c) 2014 Ryan Seys), +gtoken-2.3.0 (Copyright (c) 2014 Ryan Seys), gulp-jshint-2.1.0 +(Copyright (c) 2015 Spencer Alger), has (Copyright (c) 2013 Thiago de +Arruda), has-binary2-1.0.2 (Copyright (c) 2014 Kevin Roark), +has-binary2-1.0.3 (Copyright (c) 2014 Kevin Roark), has-cors-1.1.0 +(Author: James Halliday), has-flag-3.0.0 (Copyright (c) Sindre Sorhus + (sindresorhus.com)), has-value-0.3.1 (Copyright +(c) 2014-2016 Jon Schlinkert.), has-value-1.0.0 (Copyright (c) 2014-2017 +Jon Schlinkert), has-values-0.1.4 (Copyright (c) 2014-2016 Jon +Schlinkert.), has-values-1.0.0 (Copyright (c) 2014-2017 Jon Schlinkert), +hasha (Copyright (c) Sindre Sorhus +(sindresorhus.com)), hashcode-1.0.3 (Copyright (c) 2013 Stuart +Bannerman), he (Copyright Mathias Bynens ), +helmet (Copyright (c) 2012-2018 Evan Hahn Adam Baldwin), helmet-3.12.0 +(Copyright (c) 2012-2018 Evan Hahn Adam Baldwin), helmet-3.12.1 +(Copyright (c) 2012-2018 Evan Hahn Adam Baldwin), helmet-crossdomain +(Copyright (c) 2014-2018 Evan Hahn Adam Baldwin), helmet-csp (Copyright +(c) 2014-2018 Evan Hahn Adam Baldwin), helmet-csp-2.7.0 (Copyright (c) +2014-2018 Evan Hahn Adam Baldwin), hipchat-notifier-1.1.0 (By Brice +Burgess @iceburgBrice), hsts-2.1.0 (Copyright (c) 2014-2017 Evan Hahn +Adam Baldwin), http-errors-1.6.2 (Copyright (c) 2014 Jonathan Ong +me@jongleberry.com, Copyright (c) 2016 Douglas Christopher Wilson +doug@somethingdoug.com), http-errors-1.6.3 (Copyright (c) 2014 Jonathan +Ong me@jongleberry.comCopyright (c) 2016 Douglas Christopher Wilson +doug@somethingdoug.com), http-proxy-agent (Copyright (c) 2013 Nathan +Rajlich <nathan@tootallnate.net>), http-proxy-agent-1.0.0 +(Copyright (c) 2013 Nathan Rajlich <nathan@tootallnate.net>), +httpreq-0.4.24 (Copyright (c) 2017 Sam Decrock ), +https-proxy-agent (Copyright (c) 2013 Nathan Rajlich +<nathan@tootallnate.net>), i-0.3.6 (Author: Pavan Kumar Sunkara), +i18next-express-middleware (Copyright (c) 2015 i18next), +i18next-express-middleware (Node) (Copyright (c) 2015 i18next), +i18next-express-middleware-1.1.1 (Copyright (c) 2015 i18next), +iconv-lite-0.4.19 (Copyright (c) 2011 Alexander Shtuchkin), +iconv-lite-0.4.23 (Copyright (c) 2011 Alexander Shtuchkin), ignore-3.3.8 +(Copyright (c) 2013 Kael Zhang , contributors), indexof-0.0.1 +(Copyright (c) 2012 TJ Holowaychuk), inflection-1.3.8 (Copyright (c) +2011 dreamerslab <ben@dreamerslab.com>), inquirer-3.3.0 (Copyright +(c) 2016 Simon Boudrias (twitter: +[@vaxilart](https://twitter.com/Vaxilart))), interpret-1.1.0 (Copyright +(c) 2014 Tyler Kellen), ip-1.0.1 (Copyright Fedor Indutny 2012.), +ip-regex-2.1.0 (Copyright (c) Sindre Sorhus +(sindresorhus.com)), ipaddr.js (Copyright (C) 2011-2017 whitequark +), ipaddr.js-1.4.0 (Copyright (C) 2011 Peter +Zotov ), ipaddr.js-1.6.0 (Copyright (C) +2011-2017 whitequark ), +irregular-plurals-1.4.0 (Copyright (c) Sindre Sorhus + (sindresorhus.com)), is-3.2.1 (Copyright (c) +2013 Enrico Marino Copyright (c) 2014 Enrico Marino and Jordan Harband), +is-absolute-1.0.0 (Copyright (c) 2014-2017 Jon Schlinkert.Copyright (c) +2009-2014 TJ Holowaychuk), is-accessor-descriptor-0.1.6 (Copyright (c) +2015 Jon Schlinkert.), is-accessor-descriptor-1.0.0 (Copyright (c) +2015-2017 Jon Schlinkert.), is-array-buffer-1.0.1 (Copyright (c) +2015-present Chen Fengyuan), is-buffer-1.1.6 (Copyright (c) Feross +Aboukhadijeh), is-data-descriptor-0.1.4 (Copyright (c) 2015 Jon +Schlinkert.), is-data-descriptor-1.0.0 (Copyright (c) 2015-2017 Jon +Schlinkert.), is-descriptor-0.1.6 (Copyright (c) 2015-2017 Jon +Schlinkert.), is-descriptor-1.0.2 (Copyright (c) 2015-2017 Jon +Schlinkert.), is-extendable-1.0.1 (Copyright (c) 2015-2017 Jon +Schlinkert.), is-generator (Copyright (c) 2014 Blake Embrey +(hello@blakeembrey.com)), is-ip-2.0.0 (Copyright (c) Sindre Sorhus + (sindresorhus.com)), is-my-ip-valid-1.0.0 +(Copyright (c) 2018 Linus Unnebäck), is-my-json-valid (Copyright (c) +2014 Mathias Buus), is-my-json-valid-2.17.2 (Copyright (c) 2014 Mathias +Buus), is-number-3.0.0 (Copyright (c) 2014-2016 Jon Schlinkert), +is-number-4.0.0 (Copyright (c) 2014-2017 Jon Schlinkert.), is-odd-2.0.0 +(Copyright (c) 2015-2017 Jon Schlinkert.), is-path-in-cwd-1.0.1 +(Copyright (c) Sindre Sorhus +(sindresorhus.com)), is-path-inside-1.0.1 (Copyright (c) Sindre Sorhus + (sindresorhus.com)), is-plain-obj-1.1.0 +(Copyright (c) Sindre Sorhus +(sindresorhus.com)), is-plain-object-2.0.4 (Copyright (c) 2014-2017 Jon +Schlinkert.), is-promise (Copyright (c) 2014 Forbes Lindesay), +is-redirect-1.0.0 (Copyright (c) Sindre Sorhus +(sindresorhus.com)), is-relative-1.0.0 (Copyright (c) 2014-2017 Jon +Schlinkert.), is-stream-ended-0.1.4 (Copyright (c) 2015 Stephen +Sawchuk), is-unc-path-1.0.0 (Copyright (c) 2015-2017 Jon Schlinkert.), +is-windows-1.0.2 (Copyright (c) 2015-2018 Jon Schlinkert.), +isarray-2.0.1 (Copyright (c) 2013 Julian Gruber +<julian@juliangruber.com>), isArrayLike.js (Copyright (c) 2016 Jed +Watson), isobject-3.0.1 (Copyright (c) 2014-2017 Jon Schlinkert.), +isomorphic-fetch (Copyright (c) 2015 Matt Andrews), +isomorphic-form-data-0.0.1 (Copyright (c) 2012 Felix Geisend and +contributors), jade (Copyright (c) 2009-2014 TJ Holowaychuk +), Javascript Diff Algorithm (By John Resig +(http://ejohn.org/), Modified by Chu Alan "sprite"), jayson-2.0.6 +(Copyright (c) 2011-2012 Tedde Lundgren ), Jedis +(Copyright (c) 2011 Jonathan Leibiusky), jison (> Copyright (c) 2012 +Zachary Carter), jison-lex (No Copyright found), jQuery v3.1.1 ((c) +jQuery Foundation), JQuery, www.jquery.com is included in the Ajax +section (Copyright (c) 2008 John Resig (jquery.com)), js-tokens +(Copyright (c) 2014 2015 2016 2017 2018 Simon Lydell), js-yaml +(Copyright (C) 2011-2015 by Vitaly Puzrin), JSCS (By Kevin Parthington), +jsep-0.3.4 (Copyright (c) 2013 Stephen Oney http://jsep.from.so/), +json-query-2.2.2 (Copyright (c) 2013 Matt McKegg), json-schema-traverse +(Copyright (c) 2017 Evgeny Poberezkin), +json-stable-stringify-without-jsonify-1.0.1 (Author: James Halliday), +jsonfile (Copyright (c) 2012-2015 JP Richardson +), jsonfile-3.0.1 (Copyright (c) 2012-2015 JP +Richardson ), jsonparse-1.3.1 (Copyright (c) +2012 Tim Caswell), jsonpath (Copyright (c) 2014-2016 David Chester +), JSONSelect (Copyright (c) 2011 Lloyd Hilaiel +), JSONStream (Copyright (c) 2011 Dominic +TarrCopyright (c) 2011 Dominic Tarr), JSONStream-1.3.2 (Copyright (c) +2011 Dominic TarrCopyright (c) 2011 Dominic Tarr), JSONStream-1.3.3 +(Copyright (c) 2011 Dominic TarrCopyright (c) 2011 Dominic Tarr), +jsonwebtoken-7.4.3 (Copyright (c) 2015 Auth0 Inc. +(http://auth0.com)), jsonwebtoken-8.2.1 (Copyright (c) 2015 Auth0 Inc. + (http://auth0.com)), jstransformer (Copyright (c) +2014 Forbes Lindesay), jswebtoken (Node) (Copyright (c) 2015 Auth0, Inc. + (http://auth0.com)), jul-to-slf4j (Copyright (c) +2004-2011 QOS.ch All rights reserved.), jwa-1.1.6 (Copyright (c) 2013 +Brian J. Brennan), jws-3.1.5 (Copyright (c) 2013 Brian J. Brennan), +keygrip-1.0.2 (Copyright (c) 2011-2014 Jed Schmidt +(http://jedschmidt.com)), kind-of 1.1.0 (Copyright (c) 2014-2015 Jon +Schlinkert), kind-of-4.0.0 (Copyright (c) 2014-2017 Jon Schlinkert), +kind-of-5.1.0 (Copyright (c) 2014-2017 Jon Schlinkert.), kind-of-6.0.2 +(Copyright (c) 2014-2017 Jon Schlinkert.), kuler (No Copyright found), +ldapjs-1.0.2 (Copyright (c) 2011 Mark Cavage All rights reserved.), +letter.js (Copyright 2013-2016 Dulin Marat and other contributors), +levenshtein distance algorithm (Copyright (c) 2011 Andrei Mackenzie), +lex-parser (No Copyright found), libpam4j (Copyright (c) 2009, Sun +Microsystems, Inc.), license:prettier.js (Copyright jQuery Foundation +and other contributors), liftoff-2.5.0 (Copyright (c) 2014 Tyler +Kellen), loc-i18next (Copyright (c) 2015 i18next 2016 mthh), locate-path +(Copyright (c) Sindre Sorhus +(sindresorhus.com)), lodash (Copyright 2012-2015 The Dojo Foundation +), lodash-2.4.2 (Copyright 2012-2013 The +Dojo Foundation ), lodash-4.17.10 (Copyright +JS Foundation and other contributors ), +lodash.includes-4.3.0 (Copyright JS Foundation and other contributors +), lodash.isboolean-3.0.3 (Copyright 2012-2016 +The Dojo Foundation ), lodash.isfunction +(Copyright JS Foundation and other contributors +Copyright and related rights for sample code are +waived via CC0. Sample), lodash.isinteger-4.0.4 (Copyright JS Foundation +and other contributors ), lodash.isnumber-3.0.3 +(Copyright 2012-2016 The Dojo Foundation ), +lodash.merge-4.6.1 (Copyright JS Foundation and other contributors +), lodash.noop-3.0.1 (Copyright 2012-2016 The +Dojo Foundation ), lodash.once-4.1.1 +(Copyright jQuery Foundation and other contributors), logform (Copyright +(c) 2017 Charlie Robbins & the Contributors.), loopback (Copyright (c) +IBM Corp. 2013 2016. All Rights Reserved.), loopback-2.39.2 (Copyright +(c) IBM Corp. 2013 2016. All Rights Reserved.), loopback-3.19.0 +(Copyright (c) IBM Corp. 2013 2018. All Rights Reserved.), +loopback-3.19.1 (Copyright (c) IBM Corp. 2013 2018. All Rights +Reserved.), loopback-3.19.2 (Copyright (c) IBM Corp. 2013 2018. All +Rights Reserved.), loopback-boot-2.27.1 (Copyright (c) IBM Corp. 2014 +2016. All Rights Reserved.), loopback-cascade-delete-mixin-1.3.1 (By +Sergey Reus (reus.sergey14@gmail.com)), +loopback-component-explorer-4.3.1 (Copyright (c) IBM Corp. 2013 2016. +All Rights Reserved.), loopback-component-explorer-5.4.0 (Copyright (c) +IBM Corp. 2013 2017. All Rights Reserved.), loopback-connector +(Copyright (c) IBM Corp. 2014 2017. All Rights Reserved.), +loopback-connector-4.4.0 (Copyright (c) IBM Corp. 2014 2016. All Rights +Reserved.), loopback-connector-mongodb (Copyright (c) IBM Corp. 2012 +2017. All Rights Reserved.), loopback-connector-mongodb-3.2.1 (Copyright +(c) IBM Corp. 2012 2016. All Rights Reserved.), +loopback-connector-mongodb-3.4.3 (Copyright (c) IBM Corp. 2012 2017. All +Rights Reserved.), loopback-connector-remote (Copyright (c) IBM Corp. +2014 2018. All Rights Reserved.), loopback-connector-remote-3.3.1 +(Copyright (c) IBM Corp. 2014 2018. All Rights Reserved.), +loopback-context-3.3.0 (Copyright IBM Corp. 2015. All Rights Reserved), +loopback-datasource-juggler (Copyright (c) IBM Corp. 2011 2017. All +Rights Reserved.), loopback-datasource-juggler (node) (Copyright IBM +Corp. 2013,2016), loopback-datasource-juggler-2.57.0 (Copyright (c) IBM +Corp. 2011 2016. All Rights Reserved.), +loopback-datasource-juggler-3.20.2 (Copyright (c) IBM Corp. 2011 2017. +All Rights Reserved.), loopback-datasource-juggler-3.21.1 (Copyright (c) +IBM Corp. 2011 2017. All Rights Reserved.), loopback-filters-1.0.0 +(Copyright (c) IBM Corp. 2015 2017. All Rights Reserved.), +loopback-phase (Copyright (c) IBM Corp. 2014 2017. All Rights +Reserved.), loopback-phase-3.1.0 (Copyright (c) IBM Corp. 2014 2016. All +Rights Reserved.), loopback-swagger (Copyright (c) IBM Corp. 2014 2017. +All Rights Reserved.), loopback-swagger-5.5.0 (Copyright (c) IBM Corp. +2014 2017. All Rights Reserved.), loose-envify (Copyright (c) 2015 +Andres Suarez ), lowercase-keys-1.0.1 (Copyright (c) +Sindre Sorhus (sindresorhus.com)), mailgun-js +(Copyright (c) 2012 - 2017 OneLobby and Bojan D.), mailgun-js-0.7.15 +(Copyright (c) 2012 - 2014 OneLobby ), +make-iterator-1.0.1 (Copyright (c) 2014-2018 Jon Schlinkert.), +map-visit-1.0.0 (Copyright (c) 2015-2017 Jon Schlinkert), marked-0.3.19 +(Copyright (c) 2011-2018 Christopher Jeffrey, Copyright © 2004 John +Gruber), markup.min.js (Copyright (c) 2011 - 2013 Adam Mark), +math-random-1.0.1 (By Michael Rhodes), mem-1.1.0 (Copyright (c) Sindre +Sorhus (sindresorhus.com)), messageformat.js - +ICU PluralFormat + SelectFormat for JavaScript (copyright 2012-2015 Alex +Sexton, Eemeli Aro, and Contributors), methmeth-1.1.0 (Copyright (c) +2015 Stephen Sawchuk), methods (Copyright(c) 2013-2014 TJ Holowaychuk, +Copyright(c) 2015-2016 Douglas Christopher Wilson.), micromatch-3.1.10 +(Copyright (c) 2014-2018 Jon Schlinkert.), microtime-2.1.8 (Copyright +(c) 2011 Wade Simmons ), mime-1.4.1 (Copyright (c) 2010 +Benjamin Thomas Robert Kieffer), mime-2.3.1 (Copyright (c) 2010 Benjamin +Thomas Robert Kieffer), mime-db (Copyright (c) 2014 Jonathan Ong +me@jongleberry.com), mime-types (Copyright (c) 2014 Jonathan Ong +Copyright (c) 2015 Douglas Christopher Wilson +), mimic-fn-1.2.0 (Copyright (c) Sindre Sorhus + (sindresorhus.com)), mimic-response (Copyright +(c) Sindre Sorhus (sindresorhus.com)), +mimic-response-1.0.0 (Copyright (c) Sindre Sorhus + (sindresorhus.com)), min.js (Authors : Tim +Wood, Iskren Chernev, Moment.js contributors), mixin-deep-1.3.1 +(Copyright (c) 2014-2015 2017 Jon Schlinkert.), MobX ((c) Michel +Weststrate 2015, 2016.), mocha (Copyright (c) 2011-2017 JS Foundation +and contributors https://js.foundationCopyright (c) 2016 Segment.io Inc. +(friends@segment.com)), mochawesome-3.0.2 (Copyright (c) 2015-2017 Adam +Gruber), mochawesome-report-generator-3.1.2 (Copyright (c) 2015-2018 +Adam Gruber), modelo-4.2.3 (Copyright (C) 2013 Kevin Conway), Modernizr +3.0.0pre (Copyright (c) Faruk Ates, Paul Irish, Alex Sexton), moment +(Copyright (c) JS Foundation and other contributors), moment-2.22.1 +(Copyright (c) JS Foundation and other contributors), morgan-1.9.0 +(Copyright (c) 2014 Jonathan Ong Copyright (c) +2014-2017 Douglas Christopher Wilson ), +mqtt-packet-3.5.0 (Copyright (c) 2014-2015 mqtt-packet contributors), +ms-2.1.1 (Copyright (c) 2016 Zeit Inc.), ms-rest (Copyright (c) 2015 +Microsoft), ms-rest-2.3.3 (Copyright (c) 2015 Microsoft), ms-rest-azure +(Copyright (c) 2015 Microsoft), ms-rest-azure-2.2.3 (Copyright (c) 2015 +Microsoft), msgpack-stream-0.0.13 (Author: Dominic Tarr), msgpack5 +(Copyright (c) 2014 Matteo Collina), msgpack5-3.6.0 (Copyright (c) 2014 +Matteo Collina), mustache (Copyright (c) 2009 Chris Wanstrath +(Ruby)Copyright (c) 2010-2014 Jan Lehnardt (JavaScript)Copyright (c) +2010-2015 The mustache.js community), mustache-2.3.0 (Copyright (c) 2009 +Chris Wanstrath (Ruby)Copyright (c) 2010-2014 Jan Lehnardt +(JavaScript)Copyright (c) 2010-2015 The mustache.js community), Name for +detection of EJS. (Copyright Joyent, Inc. and other Node contributors.), +nan-2.10.0 (Copyright (c) 2018 NAN contributors), nan.h (Copyright (c) +2016 NAN contributors), nanoid (Copyright 2017 Andrey Sitnik +), nanomatch (Copyright (c) 2016-2018 Jon +Schlinkert.), nanomatch-1.2.9 (Copyright (c) 2016-2018 Jon Schlinkert.), +narwhal.js (http://narwhaljs.org) (Copyright (c) 2009 Thomas Robinson +<280north.com>), natural-compare-1.4.0 (Copyright (c) 2012-2015 Lauri +Rooden), nconf-0.10.0 (Copyright (C) 2011 Charlie Robbins and the +Contributors.), nestedtest-1.0.0 (Author: Zach Pomerantz), netmask-1.0.6 +(Copyright (c) 2011 Olivier Poitrey ), ngclipboard +(Copyright (c) 2015 Sachin N), nobject-assign ((c) Sindre Sorhus), +node-8.10.17 (Copyright Node.js contributors. All rights reserved.), +node-abi (Copyright (c) 2016 Lukas Geiger), node-abi-2.4.1 (Copyright +(c) 2016 Lukas Geiger), node-fetch (Copyright (c) 2016 David Frank), +node-fetch-1.7.3 (Copyright (c) 2016 David Frank), node-http-proxy +(Copyright (c) 2010 Charlie Robbins, Mikeal Rogers, Fedor Indutny, & +Marak Squires), node-loggly-bulk (Copyright (c) 2010 Charlie Robbins), +node-loggly-bulk-2.2.2 (Copyright (c) 2010 Charlie Robbins), +node-report-2.2.1 (Copyright (c) 2016 node-report contributors), +node-status-codes-1.0.0 (Copyright (c) Sindre Sorhus + (sindresorhus.com)), nodemailer (Copyright (c) +2011-2017 Andris Reinman), nodent-runtime-3.2.1 (Copyright (c) 2016 +Matt), nodent-transform-3.2.6 (Copyright (c) 2017 Matt), nomnom +(Copyright (c) 2010 Heather Arthur), noop-logger-0.1.1 (No Copyright +Found), normalize.css 7.0.0 (Copyright © Nicolas Gallagher and Jonathan +Neal), normalize.css v2.0.1 (Copyright © Nicolas Gallagher and Jonathan +Neal), normalize.css v3.0.3 (Copyright © Nicolas Gallagher and +Jonathan), npm-run-path-2.0.2 (Copyright (c) Sindre Sorhus + (sindresorhus.com)), object-assign (Copyright +(c) 2013-present, Facebook, Inc.), object-component-0.0.3 (Copyright (c) +2013 TJ Holowaychuk), object-copy-0.1.0 (Copyright (c) 2016 Jon +Schlinkert.), object-visit-1.0.1 (Copyright (c) 2015 2017 Jon +Schlinkert), object.defaults-1.1.0 (Copyright (c) 2014-2015 2017 Jon +Schlinkert), object.map-1.0.1 (Copyright (c) 2014-2017 Jon Schlinkert +contributors.), object.pick-1.3.0 (Copyright (c) 2014-2016 Jon +Schlinkert.), Objenesis 1.0 (Copyright (c) 2003-2006, Objenesis Team and +all contributors.), one-time (Copyright (c) 2015 Unshift.io Arnout +Kazemier the Contributors.), onetime-2.0.1 (Copyright (c) Sindre Sorhus + (sindresorhus.com)), opener (Copyright © +2012–2016 Domenic Denicola Copyright (C) 2004 Sam Hocevar +Copyright © 2012–2016 Domenic Denicola ), +openstack-wrapper-2.1.7 (Copyright (c) 2014 Go Daddy Operating Company +LLC), optimist (Copyright 2010 James Halliday (mail@substack.net)), +optional-0.1.4 (Copyright 2015), os-locale-2.1.0 (Copyright (c) Sindre +Sorhus (sindresorhus.com)), p-finally-1.0.0 +(Copyright (c) Sindre Sorhus +(sindresorhus.com)), p-limit-1.3.0 (Copyright (c) Sindre Sorhus + (sindresorhus.com)), p-locate (Copyright (c) +Sindre Sorhus (sindresorhus.com)), p-try +(Copyright (c) Sindre Sorhus +(sindresorhus.com)), pac-proxy-agent (Copyright (c) 2014 Nathan Rajlich +<nathan@tootallnate.net>), pac-proxy-agent-1.1.0 (Copyright (c) +2014 Nathan Rajlich <nathan@tootallnate.net>), pac-resolver +(Copyright (c) 2013 Nathan Rajlich <nathan@tootallnate.net>), +pac-resolver-2.0.0 (Copyright (c) 2013 Nathan Rajlich +<nathan@tootallnate.net>), package (Copyright 2014, 2015, 2016, +2017 Simon Lydell), parse-filepath-1.0.2 (Copyright (c) 2014-2015 Jon +Schlinkert.), parseqs-0.0.5 (Copyright (c) 2015 Gal Koren), Parses an +URI (By Steven Levithan ), Parses URI ((c) Steven +Levithan ), parseuri-0.0.5 (Copyright (c) 2014 Gal +Koren), parseurl-1.3.2 (Copyright (c) 2014 Jonathan Ong +Copyright (c) 2014-2017 Douglas Christopher Wilson +), pascalcase-0.1.1 (Copyright (c) 2015 Jon +Schlinkert.), passport-0.4.0 (Copyright (c) 2011-2015 Jared Hanson), +Pastel On Dark theme ported from ACE editor (copyright AtomicPages LLC +2014), pastel-on-dark.css (Copyright AtomicPages LLC 2014), path-exists +(Copyright (c) Sindre Sorhus +(sindresorhus.com)), path-key-2.0.1 (Copyright (c) Sindre Sorhus + (sindresorhus.com)), path-parse (Copyright (c) +2015 Javier Blanco), path-proxy-1.0.0 (By Jonathan Clem), pathval +(Copyright (c) 2011-2013 Jake Luer jake@alogicalparadox.com), pend +(Copyright (c) 2014 Andrew Kelley), pify-3.0.0 (Copyright (c) Sindre +Sorhus (sindresorhus.com)), pinkie-1.0.0 +(Copyright (c) Vsevolod Strukchinsky +(github.com/floatdrop)), pinkie-promise-1.0.0 (Copyright (c) Vsevolod +Strukchinsky (github.com/floatdrop)), pkginfo +(node) (Copyright (c) 2010 Charlie Robbins.), platform-1.3.5 (Copyright +2014-2018 Benjamin Tan, Copyright 2011-2013 John-David Dalton), +plugin-error-0.1.2 (Copyright (c) 2015 Jon Schlinkert.), +plugin-error-1.0.1 (Copyright (c) 2015 Blaine Bublitz + Eric Schoffstall and other +contributors), pluralize-7.0.0 (Copyright (c) 2013 Blake Embrey +(hello@blakeembrey.com)), posix-character-classes-0.1.1 (Copyright (c) +2016-2017 Jon Schlinkert), prebuild-install-2.5.3 (Copyright (c) 2015 +Mathias Buus), prepend-http-1.0.4 (Copyright (c) Sindre Sorhus + (sindresorhus.com)), prettier (Copyright +2017-2018 James Long), prettier.js (Copyright (c) 2014-present, +Facebook, Inc.), process-nextick-args-2.0.0 (Copyright (c) 2015 Calvin +Metcalf), progress-2.0.0 (Copyright (c) 2017 TJ Holowaychuk +), promise (Copyright (c) 2014 Forbes Lindesay), +promisify-call (Copyright (c) 2016 Bojan D.), prop-types (Copyright (c) +2013-present Facebook Inc.), proxy-addr (Copyright (c) 2014-2016 Douglas +Christopher Wilson), proxy-addr-1.1.5 (Copyright (c) 2014-2016 Douglas +Christopher Wilson), proxy-addr-2.0.3 (Copyright (c) 2014-2016 Douglas +Christopher Wilson), proxy-agent (Copyright (c) 2013 Nathan Rajlich +<nathan@tootallnate.net>), proxy-agent-2.0.0 (Copyright (c) 2013 +Nathan Rajlich <nathan@tootallnate.net>), proxy-from-env (No +Copyright found), psl (Copyright (c) 2017 Lupo Montero +), pug-2.0.3 (Copyright (c) 2015 Forbes +Lindesay), pug-attrs-2.0.3 (Copyright (c) 2015 Forbes Lindesay), +pug-code-gen (Copyright (c) 2015 Forbes Lindesay), pug-filters +(Copyright (c) 2015 Forbes Lindesay), pug-lexer (Copyright (c) 2014 +Forbes Lindesay), pug-linker-3.0.5 (Copyright (c) 2015 Forbes Lindesay), +pug-load-2.0.11 (Copyright (c) 2015 Forbes Lindesay), pug-parser +(Copyright (c) 2014 Forbes Lindesay), pug-runtime-2.0.4 (Copyright (c) +2015 Forbes Lindesay), pug-strip-comments-1.0.3 (Copyright (c) 2015 +Forbes Lindesay), pug-walk-1.1.7 (Copyright (c) 2015 Forbes Lindesay), +pump-1.0.3 (Copyright (c) 2014 Mathias Buus), pump-2.0.1 (Copyright (c) +2014 Mathias Buus), pumpify-1.5.0 (Copyright (c) 2014 Mathias Buus), +pumpify-1.5.1 (Copyright (c) 2014 Mathias Buus), punycode-2.1.1 +(Copyright Mathias Bynens ), q-1.5.1 +(Copyright 2009-2017 Kristopher Michael Kowal. All rights reserved.), +querystring-browser-1.0.4 (Copyright (c) 2015 Mathias Rasmussen), QUnit +(Copyright (c) 2009 John Resig, Jörn Zaefferer), QUnit v1.12.0 - A +JavaScript Unit Testing Framework (Copyright 2012 jQuery Foundation and +other contributors), RabbitMQ (Copyright © 2007-2016 Pivotal Software, +Inc. All rights reserved), randomatic (Copyright (c) 2013-2017 Jon +Schlinkert.), randomatic-3.0.0 (Copyright (c) 2013-2017 Jon +Schlinkert.), raw-body-2.3.2 (Copyright (c) 2013-2014 Jonathan Ong +Copyright (c) 2014-2015 Douglas Christopher Wilson +), raw-body-2.3.3 (Copyright (c) 2013-2014 +Jonathan Ong , Copyright (c) 2014-2015 Douglas +Christopher Wilson ), rc (Copyright (c) 2011 +Dominic TarrCopyright (c) 2011 Dominic TarrCopyright (c) 2013 Dominic +Tarr), rc-1.2.7 (Copyright (c) 2011-2013 Dominic Tarr), rc2.go (No +Copyright found), react (Copyright (c) 2013-present Facebook Inc.), +react-dom-16.4.1 (Copyright (c) 2013-present Facebook Inc.), +read-all-stream-3.1.0 (Copyright (c) Vsevolod Strukchinsky +), readable-stream-2.3.6 (Copyright Node.js +contributors. All rights reserved.), readdirp-examples-0.0.0 (Copyright +(c) 2012-2015 Thorsten Lorenz), reconnect-core (Copyright (c) 2013 +Julian Gruber <julian@juliangruber.com>), redis-2.8.0 (Copyright +(c) 2016 by NodeRedis), redis-commands-1.3.5 (Copyright (c) 2015 +NodeRedis), regenerator-runtime-0.11.1 (Copyright (c) 2014-present, +Facebook, Inc.), regex-cache-0.4.4 (Copyright (c) 2015-2017 Jon +Schlinkert.), regex-not-1.0.2 (Copyright (c) 2016 2018 Jon Schlinkert.), +regexpp-1.1.0 (Copyright (c) 2018 Toru Nagashima), request-progress +(Copyright (c) 2012 IndigoUnited), requestretry (Copyright (c) 2014 +Francois-Guillaume Ribreau), resolve (No Copyright found), resolve-1.7.1 +(By James Halliday), resolve-dir-1.0.1 (Copyright (c) 2015-2016 Jon +Schlinkert), resolve-url-0.2.1 (Copyright (c) 2013 Simon Lydell), +resources (Author:@davegandy), restore-cursor-2.0.0 (Copyright (c) +Sindre Sorhus (sindresorhus.com)), ret-0.1.15 +(Copyright (C) 2011 by Roly Fentanes), retry-request (Copyright (c) 2015 +Stephen Sawchuk), retry-request-3.3.1 (Copyright (c) 2015 Stephen +Sawchuk), run-async-2.3.0 (Copyright (c) 2014 Simon Boudrias), runewidth +(Copyright © 2013-2018 Yasuhiro Matsum), safe-buffer-5.1.2 (Copyright +(c) Feross Aboukhadijeh), safe-json-stringify-1.1.0 (Copyright (c) +2014-2017 [Debitoor](https://debitoor.com/)), safe-json-stringify-1.2.0 +(Copyright (c) 2014-2017 [Debitoor](https://debitoor.com/)), +safe-regex-1.1.0 (By James Halliday), safer-buffer-2.1.2 (Copyright (c) +2018 Nikita Skovoroda ), saslprep (Copyright (c) +2014 Dmitry Tsvettsikh), secure-keys-1.0.0 (No Copyright Found), select +(Author:Zeno Rocha), send-0.16.2 (Copyright (c) 2012 TJ Holowaychuk, +Copyright (c) 2014-2016 Douglas Christopher Wilson), sequencify-0.0.7 +(Copyright (c) 2013 [Richardson & Sons +LLC](http://richardsonandsons.com/)), serve-favicon-2.5.0 (Copyright (c) +2010 Sencha Inc.Copyright (c) 2011 LearnBoostCopyright (c) 2011 TJ +HolowaychukCopyright (c) 2014-2017 Douglas Christopher Wilson), +serve-static-1.13.2 (Copyright (c) 2010 Sencha Inc.Copyright (c) 2011 +LearnBoostCopyright (c) 2011 TJ HolowaychukCopyright (c) 2014-2016 +Douglas Christopher Wilson), set-value-0.4.3 (Copyright (c) 2014-2017 +Jon Schlinkert), set-value-2.0.0 (Copyright (c) 2014-2017 Jon +Schlinkert), setimmediate (Copyright (c) 2012 Barnesandnoble.com llc +Donavon West and Domenic Denicola), shebang-command-1.2.0 (Copyright (c) +Kevin Martensson (github.com/kevva)), +shebang-regex-1.0.0 (Copyright (c) Sindre Sorhus + (sindresorhus.com)), should-13.2.1 +(Copyright(c) 2010-2013 TJ Holowaychuk Copyright(c) +2013-2017 Denis Bardadym ), should-equal-2.0.0 +(Copyright (c) 2014), should-format-3.0.3 (Copyright (c) 2014), +should-type-1.4.0 (Copyright (c) 2014), should-type-adaptors-1.1.0 +(Copyright (c) 2016 Should.js assertion library), should-util-1.0.0 +(Copyright (c) 2016 Should.js assertion library), simple-concat-1.0.0 +(Copyright (c) Feross Aboukhadijeh), simple-get-2.8.1 (Copyright (c) +Feross Aboukhadijeh), slack-node-0.2.0 (Copyright (c) 2015 Caesar Chi), +SLF4J (Copyright (c) 2004-2005 SLF4J.ORG, Copyright (c) 2004-2005 +QOS.ch), SLF4J API Module (http://www.slf4j.org/slf4j-api) +org.slf4j:slf4j-api:jar:1.6.4:compile (Copyright (c) 2004-2017 QOS.ch +All rights reserved.), SLF4J-jcl (Copyright (c) 2004-2011 QOS.ch), +SLF4J-log4j (Copyright (c) 2004-2011 QOS.ch), slice-ansi-1.0.0 +(Copyright (c) DC ), smart-buffer (Copyright (c) +2013-2017 Josh Glazebrook), smartystreets (Copyright 08-2010 jason +frame), snapdragon-0.8.2 (Copyright (c) 2015-2016 Jon Schlinkert.), +snapdragon-node-2.1.1 (Copyright (c) 2017 Jon Schlinkert), +snapdragon-util-3.0.1 (Copyright (c) 2017 Jon Schlinkert), soap-0.8.0 +(Copyright (C) 2013 Vinay Pulim), socket.io-2.1.0 (Copyright (c) +2014-2018 Automattic ), socket.io-2.1.1 (Copyright (c) +2014-2018 Automattic ), socket.io-adapter-1.1.1 +(Copyright (c) 2014 Guillermo Rauch ), +socket.io-client-2.1.0 (Copyright (c) 2014 Guillermo Rauch), +socket.io-client-2.1.1 (Copyright (c) 2014 Guillermo Rauch), +socket.io-parser (Copyright (c) 2014 Guillermo Rauch +), socket.io-parser-3.2.0 (Copyright (c) 2014 +Guillermo Rauch ), socks (Copyright (c) 2013 +Josh Glazebrook), socks-1.1.10 (Copyright (c) 2013 Josh Glazebrook), +socks-proxy-agent (Copyright (c) 2013 Nathan Rajlich +<nathan@tootallnate.net>), socks-proxy-agent-2.1.1 (Copyright (c) +2013 Nathan Rajlich <nathan@tootallnate.net>), +sort-json-array-0.1.7 (Copyright (c) 2016 Apurva Patel), source-0 +(Copyright (c) Sindre Sorhus), source-map-resolve-0.5.2 (Copyright (c) +2014 2015 2016 2017 Simon Lydell), source-map-url-0.4.0 (Copyright (c) +2014 Simon Lydell), source. (Copyright (c) 2010-2018 Google, Inc.), +sparkles-1.0.1 (Copyright (c) 2014 Blaine Bublitz + and Eric Schoffstall ), split +(Copyright (c) 2011 Dominic Tarr), split-array-stream-1.0.3 (Copyright +(c) 2015 Stephen Sawchuk), split-string-3.1.0 (Copyright (c) 2015-2017 +Jon Schlinkert.), sse (Copyright (c) 2011 Einar Otto Stangvik +<einaros@gmail.com>), sse-0.0.8 (Copyright (c) 2011 Einar Otto +Stangvik), sshpk (Copyright Joyent Inc. All rights reserved.), +sshpk-1.14.1 (Copyright Joyent Inc. All rights reserved.), stable-0.1.8 +(Copyright (C) 2018 Angry Bytes and contributors.), static-eval (No +Copyright found), static-extend-0.1.2 (Copyright (c) 2016 Jon +Schlinkert.), statuses (Copyright (c) 2014 Jonathan Ong +Copyright (c) 2016 Douglas Christopher Wilson +), statuses-1.4.0 (Copyright (c) 2014 Jonathan +Ong Copyright (c) 2016 Douglas Christopher Wilson +), statuses-1.5.0 (Copyright (c) 2014 Jonathan +Ong Copyright (c) 2016 Douglas Christopher Wilson +), stex.js (By Constantin Jucovschi +(c.jucovschi@jacobs-university.de)), stream-consume-0.1.1 (Copyright (c) +2014 Aron Nopanen), stream-events-1.0.4 (No Copyright Found), +streamroller (Copyright (c) 2013 Gareth Jones), streamroller-0.6.0 +(Copyright (c) 2013 Gareth Jones), string-format-obj-1.1.1 (Copyright +(c) 2015 Stephen Sawchuk), string-to-json (Copyright (c) 2009-2011 TJ +Holowaychuk ), string-to-json-0.1.0 (Copyright (c) +2009-2011 TJ Holowaychuk ), string-width-2.1.1 +(Copyright (c) Sindre Sorhus +(sindresorhus.com)), string.prototype.codepointat-0.2.1 (Copyright +Mathias Bynens ), string_decoder-1.0.3 +(Copyright Node.js contributors. All rights reserved.Copyright Joyent +Inc. and other Node contributors. All rights reserved.), +string_decoder-1.1.1 (Copyright Node.js contributors. All rights +reserved.Copyright Joyent Inc. and other Node contributors. All rights +reserved.), stringstream-0.0.6 (Copyright (c) 2012 Michael Hart +(michael.hart.au@gmail.com)), strip-ansi-4.0.0 (Copyright (c) Sindre +Sorhus (sindresorhus.com)), strip-bom +(Author:Sindre Sorhus), strip-bom-0.3.1 (© [Sindre +Sorhus](http://sindresorhus.com)), strip-eof-1.0.0 (Copyright (c) Sindre +Sorhus (sindresorhus.com)), +strong-error-handler (Copyright (c) IBM Corp. 2016 2017. All Rights +Reserved.), strong-error-handler-2.3.2 (Copyright (c) IBM Corp. 2016 +2017. All Rights Reserved.), stubs-3.0.0 (Author: Stephen Sawchuk), +superagent-3.8.3 (Copyright (c) 2014-2016 TJ Holowaychuk +), supports-color-5.4.0 (Copyright (c) Sindre Sorhus + (sindresorhus.com)), taboverride.min.js +(Copyright (c) 2014 Bill Bryant), tar-fs (Copyright (c) 2014 Mathias +Buus), tar-fs-1.16.2 (Copyright (c) 2014 Mathias Buus), tar-stream-1.6.1 +(Copyright (c) 2014 Mathias Buus), target.dehancer ((c) Michel +Weststrate 2015 – 2016), tcomb-3.2.27 (Copyright (c) 2014 Giulio Canti), +tcomb-validation-3.4.1 (Copyright (c) 2014 Giulio Canti), text-hex (No +Copyright found), The buffer module from node.js, for the browser. (By +Feross Aboukhadijeh ), throttleit +(No Copyright found), thunkify-2.1.2 (Copyright (c) 2014 TJ +Holowaychuk), timed-out-2.0.0 (Copyright (c) Vsevolod Strukchinsky +), tiny-emitter (Copyright (c) 2017 Scott Corgan), +tmp-0.0.33 (Copyright (c) 2014 KARASZI István), to-absolute-glob-2.0.2 +(Copyright (c) 2015-2016 Jon Schlinkert), to-array-0.1.4 (Copyright (c) +2012 Raynos.), to-buffer-1.1.1 (Copyright (c) 2016 Mathias Buus), +to-fast-properties-1.0.3 (Copyright (c) 2014 Petka Antonov), +to-object-path-0.3.0 (Copyright (c) 2015-2016 Jon Schlinkert.), +to-regex-3.0.2 (Copyright (c) 2016-2018 Jon Schlinkert.), +to-regex-range-2.1.1 (Copyright (c) 2015-2017 Jon Schlinkert), +transformers (No Copyright found), triple-beam (Copyright (c) 2017 +winstonjs), tsscmp (Copyright (c) 2016), tunnel-0.0.5 (Copyright (c) +2012 Koichi Kobayashi), type-detect (Copyright (c) 2013 Jake Luer + (http://alogicalparadox.com)), type-is-1.6.16 +(Copyright (c) 2014 Jonathan Ong Copyright (c) +2014-2015 Douglas Christopher Wilson ), +typecast-0.0.1 (No Copyright Statement found), ua-parser-js (Copyright © +2012-2016 Faisal Salman <>), uid-safe-2.1.5 +(Copyright (c) 2014 Jonathan Ong Copyright (c) +2015-2017 Douglas Christopher Wilson ), +ultron-1.1.1 (Copyright (c) 2015 Unshift.io Arnout Kazemier the +Contributors.), underscore (Copyright (c) 2009-2018 Jeremy Ashkenas +DocumentCloud and Investigative), underscore-1.1.7 (Copyright (c) 2011 +Jeremy Ashkenas DocumentCloud), underscore-1.9.0 (Copyright (c) +2009-2017 Jeremy Ashkenas DocumentCloud and Investigative), +underscore-x-0.1.0 (Copyright (c) 2009-2011 TJ Holowaychuk +), Underscore.js 1.8.3 (Copyright Jeremy Ashkenas, +DocumentCloud and Investigative Reporters & Editors), unicode-5.2.0 +(Author:Mathias Bynens), union-value-1.0.0 (Copyright (c) 2015-2017 Jon +Schlinkert), universalify (Copyright (c) 2017 Ryan Zimmerman +), universalify-0.1.1 (Copyright (c) 2017 Ryan +Zimmerman ), unset-value-1.0.0 (Copyright (c) 2015 +2017 Jon Schlinkert), unzip-response-1.0.2 (Copyright (c) Sindre Sorhus + (sindresorhus.com)), urix-0.1.0 (Copyright (c) +2013 Simon Lydell), use (Copyright (c) 2015-present Jon Schlinkert.), +use-3.1.0 (Copyright (c) 2015-2017 Jon Schlinkert.), utf8-bytes-0.0.1 +(Author: James Halliday), Utf8Appendable (Copyright (c) 2008-2009 Bjoern +Hoehrmann ), utfstring-2.0.0 (Copyright (c) 2016 +Cameron Dutro), util (Copyright Joyent Inc. and other Node contributors. +All rights reserved.), uuid (Copyright (c) 2010-2016 Robert Kieffer and +other contributors), UUID (Node) (Copyright (c) 2010-2012 Robert +Kieffer), uuid-2.0.30 (Copyright (c) 2010-2016 Robert Kieffer and other +contributors), uuid-3.4.3 (Copyright (c) 2010-2016 Robert Kieffer and +other contributors), validate-3.0.1 (By Eivind Fjeldstad), +validator-9.4.1 (Copyright (c) 2016 Chris O'Hara ), +vary-1.1.2 (Copyright (c) 2014-2017 Douglas Christopher Wilson), vendor +(Copyright (c) 2016 Lucas Morales), whatwg-fetch-2.0.3 (Copyright (c) +2014-2016 GitHub Inc.), which-pm-runs-1.0.0 (Copyright (c) 2017 Zoltan +Kochan), winston (Copyright (c) 2010 Charlie RobbinsCopyright (c) 2017 +winstonjsCopyright (C) 2012 Mathieu TurcotteCopyright 2012-2015 The Dojo +Foundation Copyright (c) 2015 Arnout +Kazemier Martijn Swaagman the Contributors.Copyright (c) 2016 Zeit +Inc.Copyright (c) 2011 Heather Arthur Copyright +(c) 2012 Heather ArthurCopyright (c) 2015 Dmitry IvanovCopyright (c) +2011 Felix Geisendörfer (felix@debuggable.com)Copyright (c) 2010-2018 +Caolan McMahonCopyright JS Foundation and other contributors +Copyright and related rights for sample code are +waived via CC0. SampleCopyright (c) 2015 Unshift.io Arnout Kazemier the +Contributors.Copyright (c) Sindre Sorhus +(sindresorhus.com)Copyright (c) 2014-2018 Denis PushkarevCopyright (c) +2011 Heather Arthur Copyright (c) 2015 Taylor +HakesCopyright (c) 2017 Charlie Robbins & the Contributors.Copyright (c) +2015 Charlie Robbins & the contributors.Copyright (c) Isaac Z. Schlueter +and Contributors - Copyright (c) Marak Squires - Copyright (c) Sindre +Sorhus (sindresorhus.com)Copyright (c) 2015 +Arnout Kazemier Martijn Swaagman the Contributors.Copyright (c) Isaac Z. +Schlueter and ContributorsCopyright (c) 2015 Arnout Kazemier Martijn +Swaagman the Contributors.Copyright (c) 2010 Charlie Robbins), +winston-transport (Copyright (c) 2015 Charlie Robbins & the +contributors.), with (Copyright (c) 2013 Forbes Lindesay), with-callback +(Copyright (c) 2016 David Brockman Smoliansky), ws-1.1.5 (Copyright (c) +2011 Einar Otto Stangvik <einaros@gmail.com>), ws-3.3.3 (Copyright +(c) 2011 Einar Otto Stangvik ), +x-xss-protection-1.1.0 (Copyright (c) 2014-2018 Evan Hahn Adam Baldwin), +xml2js-0.4.19 (Copyright 2010 2011 2012 2013. All rights reserved.), +xmlbuilder-9.0.7 (Copyright (c) 2013 Ozgur Ozcitak), +xmlhttprequest-ssl-1.5.5 (Copyright (c) 2010 passive.ly LLC), +xpath.js-1.1.0 (Copyright (c) 2012 Sergey Ilinsky), xq-dark.css +(Copyright (C) 2011 by MarkLogic Corporation), xregexp-2.0.0 (Copyright +(c) 2007-2012 Steven Levithan ), yamljs-0.3.0 +(Copyright (c) 2010 Jeremy FaivreCopyright (c) 2008-2011 Pivotal Labs), +yargs-10.1.2 (Copyright 2010 James Halliday (mail@substack.net)Modified +work Copyright 2014 Contributors (ben@npmjs.com)), yargs-3.32.0 +(Copyright 2010 James Halliday (mail@substack.net)), yauzl (Copyright +(c) 2014 Josh Wolfe), yeast-0.1.2 (Copyright (c) 2015 Unshift.io Arnout +Kazemier the Contributors.), zousan 2.3.3 (Copyright (c) 2016 bluejava +K.K), abbrev-1.1.1 Copyright (c) Isaac Z. Schlueter and Contributors Permission is hereby granted, free of charge, to any person obtaining a @@ -6849,6 +9197,7 @@ The Program includes some or all of the following that IBM obtained under the MIT+no-false-attribs License prr 0.0.0(Copyright 2013, Rod Vagg (the "Original Author") +shortid (Node) Copyright (c) Dylan Greene All rights reserved. Permission is hereby granted, free of charge, to any person @@ -6881,6 +9230,18 @@ WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE +Unix-crypt License + +The Program includes some or all of the following that IBM obtained +under the Unix-crypt License + +UnixCrypt.java 0.9 96/11/25 Copyright (c) 1996 Aki Yoshida + +Permission to use, copy, modify and distribute this software +for non-commercial or commercial purposes and without fee is +hereby granted provided that this copyright notice appears in +all copies. + X11 License: @@ -6988,6 +9349,11 @@ the indicated URL): msvcc.sh (https://github.com/libffi/libffi/blob/master/msvcc.sh), RabbitMQ (https://github.com/chef/chef-server/tree/12.17.33) +RabbitMQ Java Client +(http://central.maven.org/maven2/com/rabbitmq/amqp-client/3.3.5/), Rhino +1.6R1 +(http://central.maven.org/maven2/org/eclipse/birt/runtime/javax.xml/1.3. +4.v201005080400/) END OF MOZILLA PUBLIC LICENSE V1.1 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ @@ -7087,7 +9453,8 @@ under the OpenSSL license: OpenSSL 1.0.2n (Copyright (c) 1998-2011 The OpenSSL Project), apps (Copyright 2005 Nokia. All rights reserved), asm (Copyright (c) -Andy Polyakov), ECC (Copyright 2002 Sun Microsystems, Inc.) +Andy Polyakov), ECC (Copyright 2002 Sun Microsystems, Inc.), +hostname.c The OpenSSL toolkit stays under a double license, i.e. both the conditions of the OpenSSL License and the original SSLeay license apply to the toolkit. @@ -7216,7 +9583,7 @@ The Program includes some or all of the following that IBM obtained under the Python License: Some code in testtools/run.py taken from Python's unittest module, -bisect.py, textwrap.py +bisect.py, textwrap.py,Jython A. HISTORY OF THE SOFTWARE @@ -8487,6 +10854,238 @@ string-format 0.5.0, uc.micro 1.0.3 TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION 0. You just DO WHAT THE FUCK YOU WANT TO. + +com.sforce.ws.parser + +Indiana University Extreme! Lab Software License, Version 1.2 + +Copyright (C) 2004 The Trustees of Indiana University. + * All rights reserved. + * + * Redistribution and use in source and binary forms, with or without + * modification, are permitted provided that the following conditions are + * met: + * + * 1) All redistributions of source code must retain the above + * copyright notice, the list of authors in the original source + * code, this list of conditions and the disclaimer listed in this + * license; + * + * 2) All redistributions in binary form must reproduce the above + * copyright notice, this list of conditions and the disclaimer + * listed in this license in the documentation and/or other + * materials provided with the distribution; + * + * 3) Any documentation included with all redistributions must include + * the following acknowledgement: + * + * "This product includes software developed by the Indiana + * University Extreme! Lab. For further information please visit + * http://www.extreme.indiana.edu/" + * + * Alternatively, this acknowledgment may appear in the software + * itself, and wherever such third-party acknowledgments normally + * appear. + * + * 4) The name "Indiana University" or "Indiana University + * Extreme! Lab" shall not be used to endorse or promote + * products derived from this software without prior written + * permission from Indiana University. For written permission, + * please contact http://www.extreme.indiana.edu/. + * + * 5) Products derived from this software may not use "Indiana + * University" name nor may "Indiana University" appear in their name, + * without prior written permission of the Indiana University. + * + * Indiana University provides no reassurances that the source code + * provided does not infringe the patent or any other intellectual + * property rights of any other entity. Indiana University disclaims any + * liability to any recipient for claims brought by any other entity + * based on infringement of intellectual property rights or otherwise. + * + * LICENSEE UNDERSTANDS THAT SOFTWARE IS PROVIDED "AS IS" FOR WHICH + * NO WARRANTIES AS TO CAPABILITIES OR ACCURACY ARE MADE. INDIANA + * UNIVERSITY GIVES NO WARRANTIES AND MAKES NO REPRESENTATION THAT + * SOFTWARE IS FREE OF INFRINGEMENT OF THIRD PARTY PATENT, COPYRIGHT, OR + * OTHER PROPRIETARY RIGHTS. INDIANA UNIVERSITY MAKES NO WARRANTIES THAT + * SOFTWARE IS FREE FROM "BUGS", "VIRUSES", "TROJAN HORSES", "TRAP + * DOORS", "WORMS", OR OTHER HARMFUL CODE. LICENSEE ASSUMES THE ENTIRE + * RISK AS TO THE PERFORMANCE OF SOFTWARE AND/OR ASSOCIATED MATERIALS, + * AND TO THE PERFORMANCE AND VALIDITY OF INFORMATION GENERATED USING + * SOFTWARE. + +AMQP +Copyright JPMorgan Chase Bank & Co., Cisco Systems, Inc., Envoy Technologies Inc + iMatix Corporation, IONA\ufffd Technologies, Red Hat, Inc., TWIST Process Innovations, and 29West Inc. 2006. + https://www.amqp.org/ + +AMQP License + +Copyright Notice + ================ + (c) Copyright JPMorgan Chase Bank & Co., Cisco Systems, Inc., Envoy Technologies Inc., + iMatix Corporation, IONA\ufffd Technologies, Red Hat, Inc., + TWIST Process Innovations, and 29West Inc. 2006. All rights reserved. + + License + ======= + JPMorgan Chase Bank & Co., Cisco Systems, Inc., Envoy Technologies Inc., iMatix + Corporation, IONA Technologies, Red Hat, Inc., TWIST Process Innovations, and + 29West Inc. (collectively, the "Authors") each hereby grants to you a worldwide, + perpetual, royalty-free, nontransferable, nonexclusive license to + (i) copy, display, distribute and implement the Advanced Messaging Queue Protocol + ("AMQP") Specification and (ii) the Licensed Claims that are held by + the Authors, all for the purpose of implementing the Advanced Messaging + Queue Protocol Specification. Your license and any rights under this + Agreement will terminate immediately without notice from + any Author if you bring any claim, suit, demand, or action related to + the Advanced Messaging Queue Protocol Specification against any Author. + Upon termination, you shall destroy all copies of the Advanced Messaging + Queue Protocol Specification in your possession or control. + + As used hereunder, "Licensed Claims" means those claims of a patent or + patent application, throughout the world, excluding design patents and + design registrations, owned or controlled, or that can be sublicensed + without fee and in compliance with the requirements of this + Agreement, by an Author or its affiliates now or at any + future time and which would necessarily be infringed by implementation + of the Advanced Messaging Queue Protocol Specification. A claim is + necessarily infringed hereunder only when it is not possible to avoid + infringing it because there is no plausible non-infringing alternative + for implementing the required portions of the Advanced Messaging Queue + Protocol Specification. Notwithstanding the foregoing, Licensed Claims + shall not include any claims other than as set forth above even if + contained in the same patent as Licensed Claims; or that read solely + on any implementations of any portion of the Advanced Messaging Queue + Protocol Specification that are not required by the Advanced Messaging + Queue Protocol Specification, or that, if licensed, would require a + payment of royalties by the licensor to unaffiliated third parties. + Moreover, Licensed Claims shall not include (i) any enabling technologies + that may be necessary to make or use any Licensed Product but are not + themselves expressly set forth in the Advanced Messaging Queue Protocol + Specification (e.g., semiconductor manufacturing technology, compiler + technology, object oriented technology, networking technology, operating + system technology, and the like); or (ii) the implementation of other + published standards developed elsewhere and merely referred to in the + body of the Advanced Messaging Queue Protocol Specification, or + (iii) any Licensed Product and any combinations thereof the purpose or + function of which is not required for compliance with the Advanced + Messaging Queue Protocol Specification. For purposes of this definition, + the Advanced Messaging Queue Protocol Specification shall be deemed to + include both architectural and interconnection requirements essential + for interoperability and may also include supporting source code artifacts + where such architectural, interconnection requirements and source code + artifacts are expressly identified as being required or documentation to + achieve compliance with the Advanced Messaging Queue Protocol Specification. + + As used hereunder, "Licensed Products" means only those specific portions + of products (hardware, software or combinations thereof) that implement + and are compliant with all relevant portions of the Advanced Messaging + Queue Protocol Specification. + + The following disclaimers, which you hereby also acknowledge as to any + use you may make of the Advanced Messaging Queue Protocol Specification: + + THE ADVANCED MESSAGING QUEUE PROTOCOL SPECIFICATION IS PROVIDED "AS IS," + AND THE AUTHORS MAKE NO REPRESENTATIONS OR WARRANTIES, EXPRESS OR + IMPLIED, INCLUDING, BUT NOT LIMITED TO, WARRANTIES OF MERCHANTABILITY, + FITNESS FOR A PARTICULAR PURPOSE, NON-INFRINGEMENT, OR TITLE; THAT THE + CONTENTS OF THE ADVANCED MESSAGING QUEUE PROTOCOL SPECIFICATION ARE + SUITABLE FOR ANY PURPOSE; NOR THAT THE IMPLEMENTATION OF THE ADVANCED + MESSAGING QUEUE PROTOCOL SPECIFICATION WILL NOT INFRINGE ANY THIRD PARTY + PATENTS, COPYRIGHTS, TRADEMARKS OR OTHER RIGHTS. + + THE AUTHORS WILL NOT BE LIABLE FOR ANY DIRECT, INDIRECT, SPECIAL, + INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF OR RELATING TO ANY + USE, IMPLEMENTATION OR DISTRIBUTION OF THE ADVANCED MESSAGING QUEUE + PROTOCOL SPECIFICATION. + + The name and trademarks of the Authors may NOT be used in any manner, + including advertising or publicity pertaining to the Advanced Messaging + Queue Protocol Specification or its contents without specific, written + prior permission. Title to copyright in the Advanced Messaging Queue + Protocol Specification will at all times remain with the Authors. + + No other rights are granted by implication, estoppel or otherwise. + + Upon termination of your license or rights under this Agreement, you + shall destroy all copies of the Advanced Messaging Queue Protocol + Specification in your possession or control. + +Jpython 1.1 Copyright 1997 Jim Hugunin, Barry Warsaw http://www.jython.org/ + +JPython 1.1.x Software License. +______________________________________________________________________ + + 1. This LICENSE AGREEMENT is between the Corporation for National Research + Initiatives, having an office at 1895 Preston White Drive, Reston, VA + 20191 ("CNRI"), and the Individual or Organization ("Licensee") + accessing and using JPython version 1.1.x in source or binary form and + its associated documentation as provided herein ("Software"). + + 2. Subject to the terms and conditions of this License Agreement, CNRI + hereby grants Licensee a non-exclusive, non-transferable, royalty-free, + world-wide license to reproduce, analyze, test, perform and/or display + publicly, prepare derivative works, distribute, and otherwise use the + Software alone or in any derivative version, provided, however, that + CNRI's License Agreement and CNRI's notice of copyright, i.e., + "Copyright ©1996-1999 Corporation for National Research Initiatives; + All Rights Reserved" are both retained in the Software, alone or in any + derivative version prepared by Licensee. + + Alternatively, in lieu of CNRI's License Agreement, Licensee may + substitute the following text (omitting the quotes), provided, however, + that such text is displayed prominently in the Software alone or in any + derivative version prepared by Licensee: "JPython (Version 1.1.x) is + made available subject to the terms and conditions in CNRI's License + Agreement. This Agreement may be located on the Internet using the + following unique, persistent identifier (known as a handle): + 1895.22/1006. The License may also be obtained from a proxy server on + the Web using the following URL: http://hdl.handle.net/1895.22/1006." + + 3. In the event Licensee prepares a derivative work that is based on or + incorporates the Software or any part thereof, and wants to make the + derivative work available to the public as provided herein, then + Licensee hereby agrees to indicate in any such work, in a prominently + visible way, the nature of the modifications made to CNRI's Software. + + 4. Licensee may not use CNRI trademarks or trade name, including JPython + or CNRI, in a trademark sense to endorse or promote products or + services of Licensee, or any third party. Licensee may use the mark + JPython in connection with Licensee's derivative versions that are + based on or incorporate the Software, but only in the form + "JPython-based ___________________," or equivalent. + + 5. CNRI is making the Software available to Licensee on an "AS IS" basis. + CNRI MAKES NO REPRESENTATIONS OR WARRANTIES, EXPRESS OR IMPLIED. BY WAY + OF EXAMPLE, BUT NOT LIMITATION, CNRI MAKES NO AND DISCLAIMS ANY + REPRESENTATION OR WARRANTY OF MERCHANTABILITY OR FITNESS FOR ANY + PARTICULAR PURPOSE OR THAT THE USE OF THE SOFTWARE WILL NOT INFRINGE + ANY THIRD PARTY RIGHTS. + + 6. CNRI SHALL NOT BE LIABLE TO LICENSEE OR OTHER USERS OF THE SOFTWARE FOR + ANY INCIDENTAL, SPECIAL OR CONSEQUENTIAL DAMAGES OR LOSS AS A RESULT OF + USING, MODIFYING OR DISTRIBUTING THE SOFTWARE, OR ANY DERIVATIVE + THEREOF, EVEN IF ADVISED OF THE POSSIBILITY THEREOF. SOME STATES DO NOT + ALLOW THE LIMITATION OR EXCLUSION OF LIABILITY SO THE ABOVE DISCLAIMER + MAY NOT APPLY TO LICENSEE. + + 7. This License Agreement may be terminated by CNRI (i) immediately upon + written notice from CNRI of any material breach by the Licensee, if the + nature of the breach is such that it cannot be promptly remedied; or + (ii) sixty (60) days following notice from CNRI to Licensee of a + material remediable breach, if Licensee has not remedied such breach + within that sixty-day period. + + 8. This License Agreement shall be governed by and interpreted in all + respects by the law of the State of Virginia, excluding conflict of law + provisions. Nothing in this Agreement shall be deemed to create any + relationship of agency, partnership, or joint venture between CNRI and + Licensee. + + 9. By clicking on the "ACCEPT" button where indicated, or by installing, + copying or otherwise using the Software, Licensee agrees to be bound by + the terms and conditions of this License Agreement END OF UNIQUE LICENSE @@ -8497,7 +11096,7 @@ W3C SOFTWARE LICENSE The Program includes some or all of the following that IBM obtained under the W3C Software Notice and License: -xmldsig_schema.xsd +xmldsig_schema.xsd ,dom3 W3C® SOFTWARE NOTICE AND LICENSE @@ -8630,7 +11229,11 @@ END OF ZOPE PUBLIC LICENSE NOTICES AND INFORMATION ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ -IBM IBM Deploy + +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ + + +IBM Deploy ** BEGIN NOTICES ** +++++++++++++++++++++++++++++++++++++++++ @@ -9082,12 +11685,13 @@ The Program includes some or all of the following that IBM obtained under the Zo https://opensource.org/licenses/ZPL-2.0 Distribute + END OF IBM NOTICES AND INFORMATION ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ END OF NOTICE FILE ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ -L/N: L-ESCZ-AZVGVT -D/N: L-ESCZ-AZVGVT -P/N: L-ESCZ-AZVGVT \ No newline at end of file +L/N: L-MKUI-B3H7N9 +D/N: L-MKUI-B3H7N9 +P/N: L-MKUI-B3H7N9 \ No newline at end of file diff --git a/stable/ibm-cam/LICENSES/LICENSE_NON_IBM b/stable/ibm-cam/LICENSES/LICENSE_NON_IBM index b50633e3aa..ba1c4a1c35 100644 --- a/stable/ibm-cam/LICENSES/LICENSE_NON_IBM +++ b/stable/ibm-cam/LICENSES/LICENSE_NON_IBM @@ -1,6 +1,6 @@ TERMS AND CONDITIONS FOR SEPARATELY LICENSED CODE -IBM Cloud Automation Manager 2.1 +IBM Cloud Automation Manager 3.1 The IBM license agreement and any applicable information on the web download page for IBM products refers Licensee to this file for details @@ -21,9 +21,18 @@ shipped with, the Program as Licensee installed it. The following are Separately Licensed Code: Mongo DB 3.4.4 +JCIP-ANNOTATIONS +Man pages for Knife, +opscode.css_t Sphinx stylesheet, +SPDX Standard, +spdx-exceptions spdx-exceptions:1.0.4 material-design-icons-iconfont 2.0.5 +heartbeat_test.c,Font Awesome Icons +GuardedBy.java (crc)pycrc/doc/pycrc.xml +html.erb, + libvk-hashicorp/serf (MongoDB)wiredtiger v 2.9.2 docker.initd @@ -36,10 +45,55 @@ gmain:1.0.0 chardet python-chardet-whl 2.2.1-2~ubuntu1 masterzen/xmlpath:13f4951 +(MongoDB)wiredtiger v 2.9.2, +docker.initd, +python-colorama-whl, +AXSI, +asciidoc.asciidoc, +(Supervisor)debian/*, +ax_cc_maxopt.m4, +compile, +depcomp, +mdate-sh, +missing, +config.guess, +Libtool, +knife-spork 1.7.1, +ldiff.rb, +libffi.info, +libffi.texi, +Libltdl, +ltmain, +Libtoolize, +texinfo.tex, +libtool-ldflags, +Libtoolize, +rawdeflate.js +gmock-1.7.0/aclocal.m4 +gmock-1.7.0/configure +gmock-1.7.0/gtest/configure +gmock-1.7.0/gtest/m4/libtool.m4 +gmock-1.7.0/build-aux/* + +(python-pip-whl)pip-manpage.rst, +AX_* Autoconf Macros, +ax_pthread.m4, +config.guess, +libffi test files, +libffi.texi, +ltmain.sh, +parser.tab.cpp, +rsync, +Snoopy/ruby_bundler-bundler-audit 0.5.0, +target-libpath.exp, +texinfo.tex +MongoDB +JSON-Java (1.0.0.v20101106) + NOTICES AND INFORMATION FOR BELOW COMPONENTS -Cloud Automation Manager +Cloud Automation Manager (Sept 18) ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ @@ -58,10 +112,11 @@ CC-BY-SA 4.0 Debian OS & Its Components Ubuntu OS & Its components General Public License V2 -General Public License V3 +General Public License V3 LGPL V2 LGPL V2.1 LGPL V3 +JSON License SIL OFL 1.1 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ @@ -111,7 +166,7 @@ The Program includes some or all of the following that IBM obtained under the CC-BY-4.0 License. The url to the unported license is https://creativecommons.org/licenses/by/4.0/ -material-design-icons-iconfont 2.0.5, heartbeat_test.c +material-design-icons-iconfont 2.0.5, heartbeat_test.c,Font Awesome Icons END OF CC-BY-4.0 NOTICES AND INFORMATION ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ @@ -188,6 +243,12 @@ Libtoolize, texinfo.tex, libtool-ldflags, Libtoolize, +rawdeflate.js +gmock-1.7.0/aclocal.m4 +gmock-1.7.0/configure +gmock-1.7.0/gtest/configure +gmock-1.7.0/gtest/m4/libtool.m4 +gmock-1.7.0/build-aux/* END OF General Public License V2 AND INFORMATION ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ @@ -212,157 +273,185 @@ rsync, Snoopy/ruby_bundler-bundler-audit 0.5.0, target-libpath.exp, texinfo.tex +MongoDB END OF General Public License V3 AND INFORMATION ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ -MODIFIABLE THIRD PARTY CODE +JSON License + +JSON-Java (1.0.0.v20101106) + +Permission is hereby granted, free of charge, to any person obtaining a copy +of this software and associated documentation files (the "Software"), to deal +in the Software without restriction, including without limitation the rights +to use, copy, modify, merge, publish, distribute, sublicense, and/or sell +copies of the Software, and to permit persons to whom the Software is +furnished to do so, subject to the following conditions: + +The above copyright notice and this permission notice shall be included in all +copies or substantial portions of the Software. + +The Software shall be used for Good, not Evil. -This Program includes some or all of the following Modifiable Third -Party Code that IBM obtained under the GNU Library General Public -License. For copies of the source code for this software, send an email -to identifying the IBM Program and the Modifiable Third -Party Code for which you are requesting the source code. +THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR +IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, +FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE +AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER +LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, +OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE +SOFTWARE. + +END OF Json License + +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ + +MODIFIABLE THIRD PARTY CODE +This Program includes some or all of the following Modifiable Third +Party Code that IBM obtained under the GNU Library General Public +License. For copies of the source code for this software, send an email +to identifying the IBM Program and the Modifiable Third +Party Code for which you are requesting the source code. morfologik - GNU LIBRARY GENERAL PUBLIC LICENSE - Version 2, June 1991 +GNU LIBRARY GENERAL PUBLIC LICENSE +Version 2, June 1991 - Copyright (C) 1991 Free Software Foundation, Inc. - 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA - Everyone is permitted to copy and distribute verbatim copies - of this license document, but changing it is not allowed. +Copyright (C) 1991 Free Software Foundation, Inc. +51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA +Everyone is permitted to copy and distribute verbatim copies +of this license document, but changing it is not allowed. -[This is the first released version of the library GPL. It is - numbered 2 because it goes with version 2 of the ordinary GPL.] +[This is the first released version of the library GPL. It is +numbered 2 because it goes with version 2 of the ordinary GPL.] - Preamble +Preamble - The licenses for most software are designed to take away your -freedom to share and change it. By contrast, the GNU General Public +The licenses for most software are designed to take away your +freedom to share and change it. By contrast, the GNU General Public Licenses are intended to guarantee your freedom to share and change free software--to make sure the software is free for all its users. - This license, the Library General Public License, applies to some +This license, the Library General Public License, applies to some specially designated Free Software Foundation software, and to any -other libraries whose authors decide to use it. You can use it for +other libraries whose authors decide to use it. You can use it for your libraries, too. - When we speak of free software, we are referring to freedom, not -price. Our General Public Licenses are designed to make sure that you +When we speak of free software, we are referring to freedom, not +price. Our General Public Licenses are designed to make sure that you have the freedom to distribute copies of free software (and charge for this service if you wish), that you receive source code or can get it if you want it, that you can change the software or use pieces of it in new free programs; and that you know you can do these things. - To protect your rights, we need to make restrictions that forbid +To protect your rights, we need to make restrictions that forbid anyone to deny you these rights or to ask you to surrender the rights. These restrictions translate to certain responsibilities for you if you distribute copies of the library, or if you modify it. - For example, if you distribute copies of the library, whether gratis +For example, if you distribute copies of the library, whether gratis or for a fee, you must give the recipients all the rights that we gave -you. You must make sure that they, too, receive or can get the source -code. If you link a program with the library, you must provide +you. You must make sure that they, too, receive or can get the source +code. If you link a program with the library, you must provide complete object files to the recipients so that they can relink them with the library, after making changes to the library and recompiling -it. And you must show them these terms so they know their rights. +it. And you must show them these terms so they know their rights. - Our method of protecting your rights has two steps: (1) copyright +Our method of protecting your rights has two steps: (1) copyright the library, and (2) offer you this license which gives you legal permission to copy, distribute and/or modify the library. - Also, for each distributor's protection, we want to make certain +Also, for each distributor's protection, we want to make certain that everyone understands that there is no warranty for this free -library. If the library is modified by someone else and passed on, we +library. If the library is modified by someone else and passed on, we want its recipients to know that what they have is not the original version, so that any problems introduced by others will not reflect on the original authors' reputations. - Finally, any free program is threatened constantly by software -patents. We wish to avoid the danger that companies distributing free +Finally, any free program is threatened constantly by software +patents. We wish to avoid the danger that companies distributing free software will individually obtain patent licenses, thus in effect -transforming the program into proprietary software. To prevent this, +transforming the program into proprietary software. To prevent this, we have made it clear that any patent must be licensed for everyone's free use or not licensed at all. - Most GNU software, including some libraries, is covered by the ordinary -GNU General Public License, which was designed for utility programs. This +Most GNU software, including some libraries, is covered by the ordinary +GNU General Public License, which was designed for utility programs. This license, the GNU Library General Public License, applies to certain -designated libraries. This license is quite different from the ordinary +designated libraries. This license is quite different from the ordinary one; be sure to read it in full, and don't assume that anything in it is the same as in the ordinary license. - The reason we have a separate public license for some libraries is that +The reason we have a separate public license for some libraries is that they blur the distinction we usually make between modifying or adding to a -program and simply using it. Linking a program with a library, without +program and simply using it. Linking a program with a library, without changing the library, is in some sense simply using the library, and is -analogous to running a utility program or application program. However, in +analogous to running a utility program or application program. However, in a textual and legal sense, the linked executable is a combined work, a derivative of the original library, and the ordinary General Public License treats it as such. - Because of this blurred distinction, using the ordinary General +Because of this blurred distinction, using the ordinary General Public License for libraries did not effectively promote software -sharing, because most developers did not use the libraries. We +sharing, because most developers did not use the libraries. We concluded that weaker conditions might promote sharing better. - However, unrestricted linking of non-free programs would deprive the +However, unrestricted linking of non-free programs would deprive the users of those programs of all benefit from the free status of the -libraries themselves. This Library General Public License is intended to +libraries themselves. This Library General Public License is intended to permit developers of non-free programs to use free libraries, while preserving your freedom as a user of such programs to change the free -libraries that are incorporated in them. (We have not seen how to achieve +libraries that are incorporated in them. (We have not seen how to achieve this as regards changes in header files, but we have achieved it as regards -changes in the actual functions of the Library.) The hope is that this +changes in the actual functions of the Library.) The hope is that this will lead to faster development of free libraries. - The precise terms and conditions for copying, distribution and -modification follow. Pay close attention to the difference between a -"work based on the library" and a "work that uses the library". The +The precise terms and conditions for copying, distribution and +modification follow. Pay close attention to the difference between a +"work based on the library" and a "work that uses the library". The former contains code derived from the library, while the latter only works together with the library. - Note that it is possible for a library to be covered by the ordinary +Note that it is possible for a library to be covered by the ordinary General Public License rather than by this special one. - GNU LIBRARY GENERAL PUBLIC LICENSE - TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION +GNU LIBRARY GENERAL PUBLIC LICENSE +TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION - 0. This License Agreement applies to any software library which +0. This License Agreement applies to any software library which contains a notice placed by the copyright holder or other authorized party saying it may be distributed under the terms of this Library -General Public License (also called "this License"). Each licensee is +General Public License (also called "this License"). Each licensee is addressed as "you". - A "library" means a collection of software functions and/or data +A "library" means a collection of software functions and/or data prepared so as to be conveniently linked with application programs (which use some of those functions and data) to form executables. - The "Library", below, refers to any such software library or work -which has been distributed under these terms. A "work based on the +The "Library", below, refers to any such software library or work +which has been distributed under these terms. A "work based on the Library" means either the Library or any derivative work under copyright law: that is to say, a work containing the Library or a portion of it, either verbatim or with modifications and/or translated -straightforwardly into another language. (Hereinafter, translation is +straightforwardly into another language. (Hereinafter, translation is included without limitation in the term "modification".) - "Source code" for a work means the preferred form of the work for -making modifications to it. For a library, complete source code means +"Source code" for a work means the preferred form of the work for +making modifications to it. For a library, complete source code means all the source code for all modules it contains, plus any associated interface definition files, plus the scripts used to control compilation and installation of the library. - Activities other than copying, distribution and modification are not -covered by this License; they are outside its scope. The act of +Activities other than copying, distribution and modification are not +covered by this License; they are outside its scope. The act of running a program using the Library is not restricted, and output from such a program is covered only if its contents constitute a work based on the Library (independent of the use of the Library in a tool for -writing it). Whether that is true depends on what the Library does +writing it). Whether that is true depends on what the Library does and what the program that uses the Library does. - - 1. You may copy and distribute verbatim copies of the Library's + +1. You may copy and distribute verbatim copies of the Library's complete source code as you receive it, in any medium, provided that you conspicuously and appropriately publish on each copy an appropriate copyright notice and disclaimer of warranty; keep intact @@ -370,43 +459,49 @@ all the notices that refer to this License and to the absence of any warranty; and distribute a copy of this License along with the Library. - You may charge a fee for the physical act of transferring a copy, +You may charge a fee for the physical act of transferring a copy, and you may at your option offer warranty protection in exchange for a fee. - 2. You may modify your copy or copies of the Library or any portion +2. You may modify your copy or copies of the Library or any portion of it, thus forming a work based on the Library, and copy and distribute such modifications or work under the terms of Section 1 above, provided that you also meet all of these conditions: - a) The modified work must itself be a software library. +a) The modified work must itself be a software library. + + + + + - b) You must cause the files modified to carry prominent notices - stating that you changed the files and the date of any change. - c) You must cause the whole of the work to be licensed at no - charge to all third parties under the terms of this License. +b) You must cause the files modified to carry prominent notices +stating that you changed the files and the date of any change. - d) If a facility in the modified Library refers to a function or a - table of data to be supplied by an application program that uses - the facility, other than as an argument passed when the facility - is invoked, then you must make a good faith effort to ensure that, - in the event an application does not supply such function or - table, the facility still operates, and performs whatever part of - its purpose remains meaningful. +c) You must cause the whole of the work to be licensed at no +charge to all third parties under the terms of this License. - (For example, a function in a library to compute square roots has - a purpose that is entirely well-defined independent of the - application. Therefore, Subsection 2d requires that any - application-supplied function or table used by this function must - be optional: if the application does not supply it, the square - root function must still compute square roots.) +d) If a facility in the modified Library refers to a function or a +table of data to be supplied by an application program that uses +the facility, other than as an argument passed when the facility +is invoked, then you must make a good faith effort to ensure that, +in the event an application does not supply such function or +table, the facility still operates, and performs whatever part of +its purpose remains meaningful. -These requirements apply to the modified work as a whole. If +(For example, a function in a library to compute square roots has +a purpose that is entirely well-defined independent of the +application. Therefore, Subsection 2d requires that any +application-supplied function or table used by this function must +be optional: if the application does not supply it, the square +root function must still compute square roots.) + +These requirements apply to the modified work as a whole. If identifiable sections of that work are not derived from the Library, and can be reasonably considered independent and separate works in themselves, then this License, and its terms, do not apply to those -sections when you distribute them as separate works. But when you +sections when you distribute them as separate works. But when you distribute the same sections as part of a whole which is a work based on the Library, the distribution of the whole must be on the terms of this License, whose permissions for other licensees extend to the @@ -423,169 +518,169 @@ with the Library (or with a work based on the Library) on a volume of a storage or distribution medium does not bring the other work under the scope of this License. - 3. You may opt to apply the terms of the ordinary GNU General Public -License instead of this License to a given copy of the Library. To do +3. You may opt to apply the terms of the ordinary GNU General Public +License instead of this License to a given copy of the Library. To do this, you must alter all the notices that refer to this License, so that they refer to the ordinary GNU General Public License, version 2, -instead of to this License. (If a newer version than version 2 of the +instead of to this License. (If a newer version than version 2 of the ordinary GNU General Public License has appeared, then you can specify -that version instead if you wish.) Do not make any other change in +that version instead if you wish.) Do not make any other change in these notices. - Once this change is made in a given copy, it is irreversible for +Once this change is made in a given copy, it is irreversible for that copy, so the ordinary GNU General Public License applies to all subsequent copies and derivative works made from that copy. - This option is useful when you wish to copy part of the code of +This option is useful when you wish to copy part of the code of the Library into a program that is not a library. - 4. You may copy and distribute the Library (or a portion or +4. You may copy and distribute the Library (or a portion or derivative of it, under Section 2) in object code or executable form under the terms of Sections 1 and 2 above provided that you accompany it with the complete corresponding machine-readable source code, which must be distributed under the terms of Sections 1 and 2 above on a medium customarily used for software interchange. - If distribution of object code is made by offering access to copy +If distribution of object code is made by offering access to copy from a designated place, then offering equivalent access to copy the source code from the same place satisfies the requirement to distribute the source code, even though third parties are not compelled to copy the source along with the object code. - 5. A program that contains no derivative of any portion of the +5. A program that contains no derivative of any portion of the Library, but is designed to work with the Library by being compiled or -linked with it, is called a "work that uses the Library". Such a +linked with it, is called a "work that uses the Library". Such a work, in isolation, is not a derivative work of the Library, and therefore falls outside the scope of this License. - However, linking a "work that uses the Library" with the Library +However, linking a "work that uses the Library" with the Library creates an executable that is a derivative of the Library (because it contains portions of the Library), rather than a "work that uses the -library". The executable is therefore covered by this License. +library". The executable is therefore covered by this License. Section 6 states terms for distribution of such executables. - When a "work that uses the Library" uses material from a header file +When a "work that uses the Library" uses material from a header file that is part of the Library, the object code for the work may be a derivative work of the Library even though the source code is not. Whether this is true is especially significant if the work can be -linked without the Library, or if the work is itself a library. The +linked without the Library, or if the work is itself a library. The threshold for this to be true is not precisely defined by law. - If such an object file uses only numerical parameters, data +If such an object file uses only numerical parameters, data structure layouts and accessors, and small macros and small inline functions (ten lines or less in length), then the use of the object file is unrestricted, regardless of whether it is legally a derivative -work. (Executables containing this object code plus portions of the +work. (Executables containing this object code plus portions of the Library will still fall under Section 6.) - Otherwise, if the work is a derivative of the Library, you may +Otherwise, if the work is a derivative of the Library, you may distribute the object code for the work under the terms of Section 6. Any executables containing that work also fall under Section 6, whether or not they are linked directly with the Library itself. - 6. As an exception to the Sections above, you may also compile or +6. As an exception to the Sections above, you may also compile or link a "work that uses the Library" with the Library to produce a work containing portions of the Library, and distribute that work under terms of your choice, provided that the terms permit modification of the work for the customer's own use and reverse engineering for debugging such modifications. - You must give prominent notice with each copy of the work that the +You must give prominent notice with each copy of the work that the Library is used in it and that the Library and its use are covered by -this License. You must supply a copy of this License. If the work +this License. You must supply a copy of this License. If the work during execution displays copyright notices, you must include the copyright notice for the Library among them, as well as a reference -directing the user to the copy of this License. Also, you must do one +directing the user to the copy of this License. Also, you must do one of these things: - a) Accompany the work with the complete corresponding - machine-readable source code for the Library including whatever - changes were used in the work (which must be distributed under - Sections 1 and 2 above); and, if the work is an executable linked - with the Library, with the complete machine-readable "work that - uses the Library", as object code and/or source code, so that the - user can modify the Library and then relink to produce a modified - executable containing the modified Library. (It is understood - that the user who changes the contents of definitions files in the - Library will not necessarily be able to recompile the application - to use the modified definitions.) - - b) Accompany the work with a written offer, valid for at - least three years, to give the same user the materials - specified in Subsection 6a, above, for a charge no more - than the cost of performing this distribution. - - c) If distribution of the work is made by offering access to copy - from a designated place, offer equivalent access to copy the above - specified materials from the same place. - - d) Verify that the user has already received a copy of these - materials or that you have already sent this user a copy. - - For an executable, the required form of the "work that uses the +a) Accompany the work with the complete corresponding +machine-readable source code for the Library including whatever +changes were used in the work (which must be distributed under +Sections 1 and 2 above); and, if the work is an executable linked +with the Library, with the complete machine-readable "work that +uses the Library", as object code and/or source code, so that the +user can modify the Library and then relink to produce a modified +executable containing the modified Library. (It is understood +that the user who changes the contents of definitions files in the +Library will not necessarily be able to recompile the application +to use the modified definitions.) + +b) Accompany the work with a written offer, valid for at +least three years, to give the same user the materials +specified in Subsection 6a, above, for a charge no more +than the cost of performing this distribution. + +c) If distribution of the work is made by offering access to copy +from a designated place, offer equivalent access to copy the above +specified materials from the same place. + +d) Verify that the user has already received a copy of these +materials or that you have already sent this user a copy. + +For an executable, the required form of the "work that uses the Library" must include any data and utility programs needed for -reproducing the executable from it. However, as a special exception, +reproducing the executable from it. However, as a special exception, the source code distributed need not include anything that is normally distributed (in either source or binary form) with the major components (compiler, kernel, and so on) of the operating system on which the executable runs, unless that component itself accompanies the executable. - It may happen that this requirement contradicts the license +It may happen that this requirement contradicts the license restrictions of other proprietary libraries that do not normally -accompany the operating system. Such a contradiction means you cannot +accompany the operating system. Such a contradiction means you cannot use both them and the Library together in an executable that you distribute. - 7. You may place library facilities that are a work based on the +7. You may place library facilities that are a work based on the Library side-by-side in a single library together with other library facilities not covered by this License, and distribute such a combined library, provided that the separate distribution of the work based on the Library and of the other library facilities is otherwise permitted, and provided that you do these two things: - a) Accompany the combined library with a copy of the same work - based on the Library, uncombined with any other library - facilities. This must be distributed under the terms of the - Sections above. +a) Accompany the combined library with a copy of the same work +based on the Library, uncombined with any other library +facilities. This must be distributed under the terms of the +Sections above. - b) Give prominent notice with the combined library of the fact - that part of it is a work based on the Library, and explaining - where to find the accompanying uncombined form of the same work. +b) Give prominent notice with the combined library of the fact +that part of it is a work based on the Library, and explaining +where to find the accompanying uncombined form of the same work. - 8. You may not copy, modify, sublicense, link with, or distribute -the Library except as expressly provided under this License. Any +8. You may not copy, modify, sublicense, link with, or distribute +the Library except as expressly provided under this License. Any attempt otherwise to copy, modify, sublicense, link with, or distribute the Library is void, and will automatically terminate your -rights under this License. However, parties who have received copies, +rights under this License. However, parties who have received copies, or rights, from you under this License will not have their licenses terminated so long as such parties remain in full compliance. - 9. You are not required to accept this License, since you have not -signed it. However, nothing else grants you permission to modify or -distribute the Library or its derivative works. These actions are -prohibited by law if you do not accept this License. Therefore, by +9. You are not required to accept this License, since you have not +signed it. However, nothing else grants you permission to modify or +distribute the Library or its derivative works. These actions are +prohibited by law if you do not accept this License. Therefore, by modifying or distributing the Library (or any work based on the Library), you indicate your acceptance of this License to do so, and all its terms and conditions for copying, distributing or modifying the Library or works based on it. - 10. Each time you redistribute the Library (or any work based on the +10. Each time you redistribute the Library (or any work based on the Library), the recipient automatically receives a license from the original licensor to copy, distribute, link with or modify the Library -subject to these terms and conditions. You may not impose any further +subject to these terms and conditions. You may not impose any further restrictions on the recipients' exercise of the rights granted herein. You are not responsible for enforcing compliance by third parties to this License. - 11. If, as a consequence of a court judgment or allegation of patent +11. If, as a consequence of a court judgment or allegation of patent infringement or for any other reason (not limited to patent issues), conditions are imposed on you (whether by court order, agreement or otherwise) that contradict the conditions of this License, they do not -excuse you from the conditions of this License. If you cannot +excuse you from the conditions of this License. If you cannot distribute so as to satisfy simultaneously your obligations under this License and any other pertinent obligations, then as a consequence you -may not distribute the Library at all. For example, if a patent +may not distribute the Library at all. For example, if a patent license would not permit royalty-free redistribution of the Library by all those who receive copies directly or indirectly through you, then the only way you could satisfy both it and this License would be to @@ -599,7 +694,7 @@ It is not the purpose of this section to induce you to infringe any patents or other property right claims or to contest validity of any such claims; this section has the sole purpose of protecting the integrity of the free software distribution system which is -implemented by public license practices. Many people have made +implemented by public license practices. Many people have made generous contributions to the wide range of software distributed through that system in reliance on consistent application of that system; it is up to the author/donor to decide if he or she is willing @@ -609,49 +704,49 @@ impose that choice. This section is intended to make thoroughly clear what is believed to be a consequence of the rest of this License. - 12. If the distribution and/or use of the Library is restricted in +12. If the distribution and/or use of the Library is restricted in certain countries either by patents or by copyrighted interfaces, the original copyright holder who places the Library under this License may add an explicit geographical distribution limitation excluding those countries, so that distribution is permitted only in or among countries not thus -excluded. In such case, this License incorporates the limitation as if +excluded. In such case, this License incorporates the limitation as if written in the body of this License. - 13. The Free Software Foundation may publish revised and/or new +13. The Free Software Foundation may publish revised and/or new versions of the Library General Public License from time to time. Such new versions will be similar in spirit to the present version, but may differ in detail to address new problems or concerns. -Each version is given a distinguishing version number. If the Library +Each version is given a distinguishing version number. If the Library specifies a version number of this License which applies to it and "any later version", you have the option of following the terms and conditions either of that version or of any later version published by -the Free Software Foundation. If the Library does not specify a +the Free Software Foundation. If the Library does not specify a license version number, you may choose any version ever published by the Free Software Foundation. - 14. If you wish to incorporate parts of the Library into other free +14. If you wish to incorporate parts of the Library into other free programs whose distribution conditions are incompatible with these, -write to the author to ask for permission. For software which is +write to the author to ask for permission. For software which is copyrighted by the Free Software Foundation, write to the Free -Software Foundation; we sometimes make exceptions for this. Our +Software Foundation; we sometimes make exceptions for this. Our decision will be guided by the two goals of preserving the free status of all derivatives of our free software and of promoting the sharing and reuse of software generally. - NO WARRANTY +NO WARRANTY - 15. BECAUSE THE LIBRARY IS LICENSED FREE OF CHARGE, THERE IS NO +15. BECAUSE THE LIBRARY IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY FOR THE LIBRARY, TO THE EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES PROVIDE THE LIBRARY "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR -PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE -LIBRARY IS WITH YOU. SHOULD THE LIBRARY PROVE DEFECTIVE, YOU ASSUME +PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE +LIBRARY IS WITH YOU. SHOULD THE LIBRARY PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION. - 16. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN +16. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR REDISTRIBUTE THE LIBRARY AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR @@ -662,631 +757,631 @@ FAILURE OF THE LIBRARY TO OPERATE WITH ANY OTHER SOFTWARE), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. - END OF TERMS AND CONDITIONS - +END OF TERMS AND CONDITIONS + END OF GNU LESSER GENERAL PUBLIC LICENSE, Version 2 NOTICES AND INFORMATION ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ MODIFIABLE THIRD PARTY CODE -This Program includes some or all of the following Modifiable Third -Party Code that IBM obtained under the GNU Lesser General Public -License version 2.1. For copies of the source code for this software, -send an email to identifying the IBM Program and the -Modifiable Third Party Code for which you are requesting the source code. +This Program includes some or all of the following Modifiable Third +Party Code that IBM obtained under the GNU Lesser General Public +License version 2.1. For copies of the source code for this software, +send an email to identifying the IBM Program and the +Modifiable Third Party Code for which you are requesting the source code. -gmain:1.0.0, chardet, python-chardet-whl 2.2.1-2~ubuntu1, kgio (Ruby Gem), +gmain:1.0.0, chardet, python-chardet-whl 2.2.1-2~ubuntu1, kgio (Ruby Gem), mariadb-java-client, platform, raindrops (Ruby Gem), setup.rb - GNU LESSER GENERAL PUBLIC LICENSE - Version 2.1, February 1999 +GNU LESSER GENERAL PUBLIC LICENSE +Version 2.1, February 1999 Copyright (C) 1991, 1999 Free Software Foundation, Inc. -51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA +51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed. -[This is the first released version of the Lesser GPL. It also counts - as the successor of the GNU Library Public License, version 2, hence - the version number 2.1.] +[This is the first released version of the Lesser GPL. It also counts +as the successor of the GNU Library Public License, version 2, hence +the version number 2.1.] Preamble -The licenses for most software are designed to take away your freedom to -share and change it. By contrast, the GNU General Public Licenses are -intended to guarantee your freedom to share and change free software--to -make sure the software is free for all its users. - -This license, the Lesser General Public License, applies to some -specially designated software packages--typically libraries--of the Free -Software Foundation and other authors who decide to use it. You can use -it too, but we suggest you first think carefully about whether this -license or the ordinary General Public License is the better strategy to -use in any particular case, based on the explanations below. - -When we speak of free software, we are referring to freedom of use, not -price. Our General Public Licenses are designed to make sure that you -have the freedom to distribute copies of free software (and charge for -this service if you wish); that you receive source code or can get it if -you want it; that you can change the software and use pieces of it in -new free programs; and that you are informed that you can do these -things. - -To protect your rights, we need to make restrictions that forbid -distributors to deny you these rights or to ask you to surrender these -rights. These restrictions translate to certain responsibilities for you -if you distribute copies of the library or if you modify it. - -For example, if you distribute copies of the library, whether gratis or -for a fee, you must give the recipients all the rights that we gave you. -You must make sure that they, too, receive or can get the source code. -If you link other code with the library, you must provide complete -object files to the recipients, so that they can relink them with the -library after making changes to the library and recompiling it. And you -must show them these terms so they know their rights. - -We protect your rights with a two-step method: (1) we copyright the -library, and (2) we offer you this license, which gives you legal -permission to copy, distribute and/or modify the library. - -To protect each distributor, we want to make it very clear that there is -no warranty for the free library. Also, if the library is modified by -someone else and passed on, the recipients should know that what they -have is not the original version, so that the original author's -reputation will not be affected by problems that might be introduced by -others. - -Finally, software patents pose a constant threat to the existence of any -free program. We wish to make sure that a company cannot effectively -restrict the users of a free program by obtaining a restrictive license -from a patent holder. Therefore, we insist that any patent license -obtained for a version of the library must be consistent with the full -freedom of use specified in this license. - -Most GNU software, including some libraries, is covered by the ordinary -GNU General Public License. This license, the GNU Lesser General Public -License, applies to certain designated libraries, and is quite different -from the ordinary General Public License. We use this license for -certain libraries in order to permit linking those libraries into -non-free programs. - -When a program is linked with a library, whether statically or using a -shared library, the combination of the two is legally speaking a -combined work, a derivative of the original library. The ordinary -General Public License therefore permits such linking only if the entire -combination fits its criteria of freedom. The Lesser General Public -License permits more lax criteria for linking other code with the -library. - -We call this license the "Lesser" General Public License because it does -Less to protect the user's freedom than the ordinary General Public -License. It also provides other free software developers Less of an -advantage over competing non-free programs. These disadvantages are the -reason we use the ordinary General Public License for many libraries. -However, the Lesser license provides advantages in certain special -circumstances. - -For example, on rare occasions, there may be a special need to -encourage the widest possible use of a certain library, so that it -becomes a de-facto standard. To achieve this, non-free programs must be -allowed to use the library. A more frequent case is that a free library -does the same job as widely used non-free libraries. In this case, there -is little to gain by limiting the free library to free software only, so -we use the Lesser General Public License. - -In other cases, permission to use a particular library in non-free -programs enables a greater number of people to use a large body of free -software. For example, permission to use the GNU C Library in non-free -programs enables many more people to use the whole GNU operating system, -as well as its variant, the GNU/Linux operating system. - -Although the Lesser General Public License is Less protective of the -users' freedom, it does ensure that the user of a program that is linked -with the Library has the freedom and the wherewithal to run that program -using a modified version of the Library. - -The precise terms and conditions for copying, distribution and -modification follow. Pay close attention to the difference between a -"work based on the library" and a "work that uses the library". The -former contains code derived from the library, whereas the latter must -be combined with the library in order to run. TERMS AND CONDITIONS FOR -COPYING, DISTRIBUTION AND MODIFICATION - -0. This License Agreement applies to any software library or other -program which contains a notice placed by the copyright holder or other -authorized party saying it may be distributed under the terms of this -Lesser General Public License (also called "this License"). Each -licensee is addressed as "you". - -A "library" means a collection of software functions and/or data -prepared so as to be conveniently linked with application programs -(which use some of those functions and data) to form executables. - -The "Library", below, refers to any such software library or work which -has been distributed under these terms. A "work based on the Library" -means either the Library or any derivative work under copyright law: -that is to say, a work containing the Library or a portion of it, either -verbatim or with modifications and/or translated straightforwardly into -another language. (Hereinafter, translation is included without -limitation in the term "modification".) - -"Source code" for a work means the preferred form of the work for making -modifications to it. For a library, complete source code means all the -source code for all modules it contains, plus any associated interface -definition files, plus the scripts used to control compilation and -installation of the library. - -Activities other than copying, distribution and modification are not -covered by this License; they are outside its scope. The act of running -a program using the Library is not restricted, and output from such a -program is covered only if its contents constitute a work based on the -Library (independent of the use of the Library in a tool for writing -it). Whether that is true depends on what the Library does and what the -program that uses the Library does. - -1. You may copy and distribute verbatim copies of the Library's complete -source code as you receive it, in any medium, provided that you -conspicuously and appropriately publish on each copy an appropriate -copyright notice and disclaimer of warranty; keep intact all the notices -that refer to this License and to the absence of any warranty; and -distribute a copy of this License along with the Library. - -You may charge a fee for the physical act of transferring a copy, and -you may at your option offer warranty protection in exchange for a fee. - - -2. You may modify your copy or copies of the Library or any portion of -it, thus forming a work based on the Library, and copy and distribute -such modifications or work under the terms of Section 1 above, provided -that you also meet all of these conditions: - - a) The modified work must itself be a software library. - b) You must cause the files modified to carry prominent notices - stating that you changed the files and the date of any change. - c) You must cause the whole of the work to be licensed at no charge - to all third parties under the terms of this License. - d) If a facility in the modified Library refers to a function or a - table of data to be supplied by an application program that uses - the facility, other than as an argument passed when the facility - is invoked, then you must make a good faith effort to ensure - that, in the event an application does not supply such function - or table, the facility still operates, and performs whatever part - of its purpose remains meaningful. - - (For example, a function in a library to compute square roots has - a purpose that is entirely well-defined independent of the - application. Therefore, Subsection 2d requires that any - application-supplied function or table used by this function must - be optional: if the application does not supply it, the square - root function must still compute square roots.) - -These requirements apply to the modified work as a whole. If -identifiable sections of that work are not derived from the Library, and -can be reasonably considered independent and separate works in -themselves, then this License, and its terms, do not apply to those -sections when you distribute them as separate works. But when you -distribute the same sections as part of a whole which is a work based on -the Library, the distribution of the whole must be on the terms of this -License, whose permissions for other licensees extend to the entire -whole, and thus to each and every part regardless of who wrote it. - -Thus, it is not the intent of this section to claim rights or contest -your rights to work written entirely by you; rather, the intent is to -exercise the right to control the distribution of derivative or -collective works based on the Library. - -In addition, mere aggregation of another work not based on the Library -with the Library (or with a work based on the Library) on a volume of a -storage or distribution medium does not bring the other work under the -scope of this License. - -3. You may opt to apply the terms of the ordinary GNU General Public -License instead of this License to a given copy of the Library. To do -this, you must alter all the notices that refer to this License, so that -they refer to the ordinary GNU General Public License, version 2, -instead of to this License. (If a newer version than version 2 of the -ordinary GNU General Public License has appeared, then you can specify -that version instead if you wish.) Do not make any other change in these -notices. - -Once this change is made in a given copy, it is irreversible for that -copy, so the ordinary GNU General Public License applies to all -subsequent copies and derivative works made from that copy. - -This option is useful when you wish to copy part of the code of the -Library into a program that is not a library. - -4. You may copy and distribute the Library (or a portion or derivative -of it, under Section 2) in object code or executable form under the -terms of Sections 1 and 2 above provided that you accompany it with the -complete corresponding machine-readable source code, which must be -distributed under the terms of Sections 1 and 2 above on a medium -customarily used for software interchange. - -If distribution of object code is made by offering access to copy from a -designated place, then offering equivalent access to copy the source -code from the same place satisfies the requirement to distribute the -source code, even though third parties are not compelled to copy the -source along with the object code. - -5. A program that contains no derivative of any portion of the Library, -but is designed to work with the Library by being compiled or linked -with it, is called a "work that uses the Library". Such a work, in -isolation, is not a derivative work of the Library, and therefore falls -outside the scope of this License. - -However, linking a "work that uses the Library" with the Library creates -an executable that is a derivative of the Library (because it contains -portions of the Library), rather than a "work that uses the library". -The executable is therefore covered by this License. Section 6 states -terms for distribution of such executables. - -When a "work that uses the Library" uses material from a header file -that is part of the Library, the object code for the work may be a -derivative work of the Library even though the source code is not. -Whether this is true is especially significant if the work can be linked -without the Library, or if the work is itself a library. The threshold -for this to be true is not precisely defined by law. - -If such an object file uses only numerical parameters, data structure -layouts and accessors, and small macros and small inline functions (ten -lines or less in length), then the use of the object file is -unrestricted, regardless of whether it is legally a derivative work. -(Executables containing this object code plus portions of the Library -will still fall under Section 6.) - -Otherwise, if the work is a derivative of the Library, you may -distribute the object code for the work under the terms of Section 6. -Any executables containing that work also fall under Section 6, whether -or not they are linked directly with the Library itself. - -6. As an exception to the Sections above, you may also combine or link a -"work that uses the Library" with the Library to produce a work -containing portions of the Library, and distribute that work under terms -of your choice, provided that the terms permit modification of the work -for the customer's own use and reverse engineering for debugging such -modifications. - -You must give prominent notice with each copy of the work that the -Library is used in it and that the Library and its use are covered by -this License. You must supply a copy of this License. If the work during -execution displays copyright notices, you must include the copyright -notice for the Library among them, as well as a reference directing the -user to the copy of this License. Also, you must do one of these things: - - - a) Accompany the work with the complete corresponding - machine-readable source code for the Library including whatever - changes were used in the work (which must be distributed under - Sections 1 and 2 above); and, if the work is an executable linked - with the Library, with the complete machine-readable "work that - uses the Library", as object code and/or source code, so that the - user can modify the Library and then relink to produce a modified - executable containing the modified Library. (It is understood - that the user who changes the contents of definitions files in - the Library will not necessarily be able to recompile the - application to use the modified definitions.) - b) Use a suitable shared library mechanism for linking with the - Library. A suitable mechanism is one that (1) uses at run time a - copy of the library already present on the user's computer - system, rather than copying library functions into the - executable, and (2) will operate properly with a modified version - of the library, if the user installs one, as long as the modified - version is interface-compatible with the version that the work - was made with. - c) Accompany the work with a written offer, valid for at least three - years, to give the same user the materials specified in - Subsection 6a, above, for a charge no more than the cost of - performing this distribution. - d) If distribution of the work is made by offering access to copy - from a designated place, offer equivalent access to copy the - above specified materials from the same place. - e) Verify that the user has already received a copy of these - materials or that you have already sent this user a copy. - -For an executable, the required form of the "work that uses the Library" -must include any data and utility programs needed for reproducing the -executable from it. However, as a special exception, the materials to be -distributed need not include anything that is normally distributed (in -either source or binary form) with the major components (compiler, -kernel, and so on) of the operating system on which the executable runs, -unless that component itself accompanies the executable. - -It may happen that this requirement contradicts the license restrictions -of other proprietary libraries that do not normally accompany the -operating system. Such a contradiction means you cannot use both them -and the Library together in an executable that you distribute. - -7. You may place library facilities that are a work based on the Library -side-by-side in a single library together with other library facilities -not covered by this License, and distribute such a combined library, -provided that the separate distribution of the work based on the Library -and of the other library facilities is otherwise permitted, and provided -that you do these two things: - - a) Accompany the combined library with a copy of the same work based - on the Library, uncombined with any other library facilities. - This must be distributed under the terms of the Sections above. - b) Give prominent notice with the combined library of the fact that - part of it is a work based on the Library, and explaining where - to find the accompanying uncombined form of the same work. - -8. You may not copy, modify, sublicense, link with, or distribute the -Library except as expressly provided under this License. Any attempt -otherwise to copy, modify, sublicense, link with, or distribute the -Library is void, and will automatically terminate your rights under this -License. However, parties who have received copies, or rights, from you -under this License will not have their licenses terminated so long as -such parties remain in full compliance. - -9. You are not required to accept this License, since you have not -signed it. However, nothing else grants you permission to modify or -distribute the Library or its derivative works. These actions are -prohibited by law if you do not accept this License. Therefore, by -modifying or distributing the Library (or any work based on the -Library), you indicate your acceptance of this License to do so, and all -its terms and conditions for copying, distributing or modifying the -Library or works based on it. - -10. Each time you redistribute the Library (or any work based on the -Library), the recipient automatically receives a license from the -original licensor to copy, distribute, link with or modify the Library -subject to these terms and conditions. You may not impose any further -restrictions on the recipients' exercise of the rights granted herein. -You are not responsible for enforcing compliance by third parties with -this License. - -11. If, as a consequence of a court judgment or allegation of patent -infringement or for any other reason (not limited to patent issues), -conditions are imposed on you (whether by court order, agreement or -otherwise) that contradict the conditions of this License, they do not -excuse you from the conditions of this License. If you cannot distribute -so as to satisfy simultaneously your obligations under this License and -any other pertinent obligations, then as a consequence you may not -distribute the Library at all. For example, if a patent license would -not permit royalty-free redistribution of the Library by all those who -receive copies directly or indirectly through you, then the only way you -could satisfy both it and this License would be to refrain entirely from -distribution of the Library. - -If any portion of this section is held invalid or unenforceable under -any particular circumstance, the balance of the section is intended to -apply, and the section as a whole is intended to apply in other -circumstances. - -It is not the purpose of this section to induce you to infringe any -patents or other property right claims or to contest validity of any -such claims; this section has the sole purpose of protecting the -integrity of the free software distribution system which is implemented -by public license practices. Many people have made generous -contributions to the wide range of software distributed through that -system in reliance on consistent application of that system; it is up to -the author/donor to decide if he or she is willing to distribute -software through any other system and a licensee cannot impose that -choice. - -This section is intended to make thoroughly clear what is believed to be -a consequence of the rest of this License. - -12. If the distribution and/or use of the Library is restricted in -certain countries either by patents or by copyrighted interfaces, the -original copyright holder who places the Library under this License may -add an explicit geographical distribution limitation excluding those -countries, so that distribution is permitted only in or among countries -not thus excluded. In such case, this License incorporates the -limitation as if written in the body of this License. - -13. The Free Software Foundation may publish revised and/or new versions -of the Lesser General Public License from time to time. Such new -versions will be similar in spirit to the present version, but may -differ in detail to address new problems or concerns. - -Each version is given a distinguishing version number. If the Library -specifies a version number of this License which applies to it and "any -later version", you have the option of following the terms and -conditions either of that version or of any later version published by -the Free Software Foundation. If the Library does not specify a license -version number, you may choose any version ever published by the Free -Software Foundation. - -14. If you wish to incorporate parts of the Library into other free -programs whose distribution conditions are incompatible with these, -write to the author to ask for permission. For software which is -copyrighted by the Free Software Foundation, write to the Free Software -Foundation; we sometimes make exceptions for this. Our decision will be -guided by the two goals of preserving the free status of all derivatives -of our free software and of promoting the sharing and reuse of software -generally. +The licenses for most software are designed to take away your freedom to +share and change it. By contrast, the GNU General Public Licenses are +intended to guarantee your freedom to share and change free software--to +make sure the software is free for all its users. + +This license, the Lesser General Public License, applies to some +specially designated software packages--typically libraries--of the Free +Software Foundation and other authors who decide to use it. You can use +it too, but we suggest you first think carefully about whether this +license or the ordinary General Public License is the better strategy to +use in any particular case, based on the explanations below. + +When we speak of free software, we are referring to freedom of use, not +price. Our General Public Licenses are designed to make sure that you +have the freedom to distribute copies of free software (and charge for +this service if you wish); that you receive source code or can get it if +you want it; that you can change the software and use pieces of it in +new free programs; and that you are informed that you can do these +things. + +To protect your rights, we need to make restrictions that forbid +distributors to deny you these rights or to ask you to surrender these +rights. These restrictions translate to certain responsibilities for you +if you distribute copies of the library or if you modify it. + +For example, if you distribute copies of the library, whether gratis or +for a fee, you must give the recipients all the rights that we gave you. +You must make sure that they, too, receive or can get the source code. +If you link other code with the library, you must provide complete +object files to the recipients, so that they can relink them with the +library after making changes to the library and recompiling it. And you +must show them these terms so they know their rights. + +We protect your rights with a two-step method: (1) we copyright the +library, and (2) we offer you this license, which gives you legal +permission to copy, distribute and/or modify the library. + +To protect each distributor, we want to make it very clear that there is +no warranty for the free library. Also, if the library is modified by +someone else and passed on, the recipients should know that what they +have is not the original version, so that the original author's +reputation will not be affected by problems that might be introduced by +others. + +Finally, software patents pose a constant threat to the existence of any +free program. We wish to make sure that a company cannot effectively +restrict the users of a free program by obtaining a restrictive license +from a patent holder. Therefore, we insist that any patent license +obtained for a version of the library must be consistent with the full +freedom of use specified in this license. + +Most GNU software, including some libraries, is covered by the ordinary +GNU General Public License. This license, the GNU Lesser General Public +License, applies to certain designated libraries, and is quite different +from the ordinary General Public License. We use this license for +certain libraries in order to permit linking those libraries into +non-free programs. + +When a program is linked with a library, whether statically or using a +shared library, the combination of the two is legally speaking a +combined work, a derivative of the original library. The ordinary +General Public License therefore permits such linking only if the entire +combination fits its criteria of freedom. The Lesser General Public +License permits more lax criteria for linking other code with the +library. + +We call this license the "Lesser" General Public License because it does +Less to protect the user's freedom than the ordinary General Public +License. It also provides other free software developers Less of an +advantage over competing non-free programs. These disadvantages are the +reason we use the ordinary General Public License for many libraries. +However, the Lesser license provides advantages in certain special +circumstances. + +For example, on rare occasions, there may be a special need to +encourage the widest possible use of a certain library, so that it +becomes a de-facto standard. To achieve this, non-free programs must be +allowed to use the library. A more frequent case is that a free library +does the same job as widely used non-free libraries. In this case, there +is little to gain by limiting the free library to free software only, so +we use the Lesser General Public License. + +In other cases, permission to use a particular library in non-free +programs enables a greater number of people to use a large body of free +software. For example, permission to use the GNU C Library in non-free +programs enables many more people to use the whole GNU operating system, +as well as its variant, the GNU/Linux operating system. + +Although the Lesser General Public License is Less protective of the +users' freedom, it does ensure that the user of a program that is linked +with the Library has the freedom and the wherewithal to run that program +using a modified version of the Library. + +The precise terms and conditions for copying, distribution and +modification follow. Pay close attention to the difference between a +"work based on the library" and a "work that uses the library". The +former contains code derived from the library, whereas the latter must +be combined with the library in order to run. TERMS AND CONDITIONS FOR +COPYING, DISTRIBUTION AND MODIFICATION + +0. This License Agreement applies to any software library or other +program which contains a notice placed by the copyright holder or other +authorized party saying it may be distributed under the terms of this +Lesser General Public License (also called "this License"). Each +licensee is addressed as "you". + +A "library" means a collection of software functions and/or data +prepared so as to be conveniently linked with application programs +(which use some of those functions and data) to form executables. + +The "Library", below, refers to any such software library or work which +has been distributed under these terms. A "work based on the Library" +means either the Library or any derivative work under copyright law: +that is to say, a work containing the Library or a portion of it, either +verbatim or with modifications and/or translated straightforwardly into +another language. (Hereinafter, translation is included without +limitation in the term "modification".) + +"Source code" for a work means the preferred form of the work for making +modifications to it. For a library, complete source code means all the +source code for all modules it contains, plus any associated interface +definition files, plus the scripts used to control compilation and +installation of the library. + +Activities other than copying, distribution and modification are not +covered by this License; they are outside its scope. The act of running +a program using the Library is not restricted, and output from such a +program is covered only if its contents constitute a work based on the +Library (independent of the use of the Library in a tool for writing +it). Whether that is true depends on what the Library does and what the +program that uses the Library does. + +1. You may copy and distribute verbatim copies of the Library's complete +source code as you receive it, in any medium, provided that you +conspicuously and appropriately publish on each copy an appropriate +copyright notice and disclaimer of warranty; keep intact all the notices +that refer to this License and to the absence of any warranty; and +distribute a copy of this License along with the Library. + +You may charge a fee for the physical act of transferring a copy, and +you may at your option offer warranty protection in exchange for a fee. + + +2. You may modify your copy or copies of the Library or any portion of +it, thus forming a work based on the Library, and copy and distribute +such modifications or work under the terms of Section 1 above, provided +that you also meet all of these conditions: + +a) The modified work must itself be a software library. +b) You must cause the files modified to carry prominent notices +stating that you changed the files and the date of any change. +c) You must cause the whole of the work to be licensed at no charge +to all third parties under the terms of this License. +d) If a facility in the modified Library refers to a function or a +table of data to be supplied by an application program that uses +the facility, other than as an argument passed when the facility +is invoked, then you must make a good faith effort to ensure +that, in the event an application does not supply such function +or table, the facility still operates, and performs whatever part +of its purpose remains meaningful. + +(For example, a function in a library to compute square roots has +a purpose that is entirely well-defined independent of the +application. Therefore, Subsection 2d requires that any +application-supplied function or table used by this function must +be optional: if the application does not supply it, the square +root function must still compute square roots.) + +These requirements apply to the modified work as a whole. If +identifiable sections of that work are not derived from the Library, and +can be reasonably considered independent and separate works in +themselves, then this License, and its terms, do not apply to those +sections when you distribute them as separate works. But when you +distribute the same sections as part of a whole which is a work based on +the Library, the distribution of the whole must be on the terms of this +License, whose permissions for other licensees extend to the entire +whole, and thus to each and every part regardless of who wrote it. + +Thus, it is not the intent of this section to claim rights or contest +your rights to work written entirely by you; rather, the intent is to +exercise the right to control the distribution of derivative or +collective works based on the Library. + +In addition, mere aggregation of another work not based on the Library +with the Library (or with a work based on the Library) on a volume of a +storage or distribution medium does not bring the other work under the +scope of this License. + +3. You may opt to apply the terms of the ordinary GNU General Public +License instead of this License to a given copy of the Library. To do +this, you must alter all the notices that refer to this License, so that +they refer to the ordinary GNU General Public License, version 2, +instead of to this License. (If a newer version than version 2 of the +ordinary GNU General Public License has appeared, then you can specify +that version instead if you wish.) Do not make any other change in these +notices. + +Once this change is made in a given copy, it is irreversible for that +copy, so the ordinary GNU General Public License applies to all +subsequent copies and derivative works made from that copy. + +This option is useful when you wish to copy part of the code of the +Library into a program that is not a library. + +4. You may copy and distribute the Library (or a portion or derivative +of it, under Section 2) in object code or executable form under the +terms of Sections 1 and 2 above provided that you accompany it with the +complete corresponding machine-readable source code, which must be +distributed under the terms of Sections 1 and 2 above on a medium +customarily used for software interchange. + +If distribution of object code is made by offering access to copy from a +designated place, then offering equivalent access to copy the source +code from the same place satisfies the requirement to distribute the +source code, even though third parties are not compelled to copy the +source along with the object code. + +5. A program that contains no derivative of any portion of the Library, +but is designed to work with the Library by being compiled or linked +with it, is called a "work that uses the Library". Such a work, in +isolation, is not a derivative work of the Library, and therefore falls +outside the scope of this License. + +However, linking a "work that uses the Library" with the Library creates +an executable that is a derivative of the Library (because it contains +portions of the Library), rather than a "work that uses the library". +The executable is therefore covered by this License. Section 6 states +terms for distribution of such executables. + +When a "work that uses the Library" uses material from a header file +that is part of the Library, the object code for the work may be a +derivative work of the Library even though the source code is not. +Whether this is true is especially significant if the work can be linked +without the Library, or if the work is itself a library. The threshold +for this to be true is not precisely defined by law. + +If such an object file uses only numerical parameters, data structure +layouts and accessors, and small macros and small inline functions (ten +lines or less in length), then the use of the object file is +unrestricted, regardless of whether it is legally a derivative work. +(Executables containing this object code plus portions of the Library +will still fall under Section 6.) + +Otherwise, if the work is a derivative of the Library, you may +distribute the object code for the work under the terms of Section 6. +Any executables containing that work also fall under Section 6, whether +or not they are linked directly with the Library itself. + +6. As an exception to the Sections above, you may also combine or link a +"work that uses the Library" with the Library to produce a work +containing portions of the Library, and distribute that work under terms +of your choice, provided that the terms permit modification of the work +for the customer's own use and reverse engineering for debugging such +modifications. + +You must give prominent notice with each copy of the work that the +Library is used in it and that the Library and its use are covered by +this License. You must supply a copy of this License. If the work during +execution displays copyright notices, you must include the copyright +notice for the Library among them, as well as a reference directing the +user to the copy of this License. Also, you must do one of these things: + + +a) Accompany the work with the complete corresponding +machine-readable source code for the Library including whatever +changes were used in the work (which must be distributed under +Sections 1 and 2 above); and, if the work is an executable linked +with the Library, with the complete machine-readable "work that +uses the Library", as object code and/or source code, so that the +user can modify the Library and then relink to produce a modified +executable containing the modified Library. (It is understood +that the user who changes the contents of definitions files in +the Library will not necessarily be able to recompile the +application to use the modified definitions.) +b) Use a suitable shared library mechanism for linking with the +Library. A suitable mechanism is one that (1) uses at run time a +copy of the library already present on the user's computer +system, rather than copying library functions into the +executable, and (2) will operate properly with a modified version +of the library, if the user installs one, as long as the modified +version is interface-compatible with the version that the work +was made with. +c) Accompany the work with a written offer, valid for at least three +years, to give the same user the materials specified in +Subsection 6a, above, for a charge no more than the cost of +performing this distribution. +d) If distribution of the work is made by offering access to copy +from a designated place, offer equivalent access to copy the +above specified materials from the same place. +e) Verify that the user has already received a copy of these +materials or that you have already sent this user a copy. + +For an executable, the required form of the "work that uses the Library" +must include any data and utility programs needed for reproducing the +executable from it. However, as a special exception, the materials to be +distributed need not include anything that is normally distributed (in +either source or binary form) with the major components (compiler, +kernel, and so on) of the operating system on which the executable runs, +unless that component itself accompanies the executable. + +It may happen that this requirement contradicts the license restrictions +of other proprietary libraries that do not normally accompany the +operating system. Such a contradiction means you cannot use both them +and the Library together in an executable that you distribute. + +7. You may place library facilities that are a work based on the Library +side-by-side in a single library together with other library facilities +not covered by this License, and distribute such a combined library, +provided that the separate distribution of the work based on the Library +and of the other library facilities is otherwise permitted, and provided +that you do these two things: + +a) Accompany the combined library with a copy of the same work based +on the Library, uncombined with any other library facilities. +This must be distributed under the terms of the Sections above. +b) Give prominent notice with the combined library of the fact that +part of it is a work based on the Library, and explaining where +to find the accompanying uncombined form of the same work. + +8. You may not copy, modify, sublicense, link with, or distribute the +Library except as expressly provided under this License. Any attempt +otherwise to copy, modify, sublicense, link with, or distribute the +Library is void, and will automatically terminate your rights under this +License. However, parties who have received copies, or rights, from you +under this License will not have their licenses terminated so long as +such parties remain in full compliance. + +9. You are not required to accept this License, since you have not +signed it. However, nothing else grants you permission to modify or +distribute the Library or its derivative works. These actions are +prohibited by law if you do not accept this License. Therefore, by +modifying or distributing the Library (or any work based on the +Library), you indicate your acceptance of this License to do so, and all +its terms and conditions for copying, distributing or modifying the +Library or works based on it. + +10. Each time you redistribute the Library (or any work based on the +Library), the recipient automatically receives a license from the +original licensor to copy, distribute, link with or modify the Library +subject to these terms and conditions. You may not impose any further +restrictions on the recipients' exercise of the rights granted herein. +You are not responsible for enforcing compliance by third parties with +this License. + +11. If, as a consequence of a court judgment or allegation of patent +infringement or for any other reason (not limited to patent issues), +conditions are imposed on you (whether by court order, agreement or +otherwise) that contradict the conditions of this License, they do not +excuse you from the conditions of this License. If you cannot distribute +so as to satisfy simultaneously your obligations under this License and +any other pertinent obligations, then as a consequence you may not +distribute the Library at all. For example, if a patent license would +not permit royalty-free redistribution of the Library by all those who +receive copies directly or indirectly through you, then the only way you +could satisfy both it and this License would be to refrain entirely from +distribution of the Library. + +If any portion of this section is held invalid or unenforceable under +any particular circumstance, the balance of the section is intended to +apply, and the section as a whole is intended to apply in other +circumstances. + +It is not the purpose of this section to induce you to infringe any +patents or other property right claims or to contest validity of any +such claims; this section has the sole purpose of protecting the +integrity of the free software distribution system which is implemented +by public license practices. Many people have made generous +contributions to the wide range of software distributed through that +system in reliance on consistent application of that system; it is up to +the author/donor to decide if he or she is willing to distribute +software through any other system and a licensee cannot impose that +choice. + +This section is intended to make thoroughly clear what is believed to be +a consequence of the rest of this License. + +12. If the distribution and/or use of the Library is restricted in +certain countries either by patents or by copyrighted interfaces, the +original copyright holder who places the Library under this License may +add an explicit geographical distribution limitation excluding those +countries, so that distribution is permitted only in or among countries +not thus excluded. In such case, this License incorporates the +limitation as if written in the body of this License. + +13. The Free Software Foundation may publish revised and/or new versions +of the Lesser General Public License from time to time. Such new +versions will be similar in spirit to the present version, but may +differ in detail to address new problems or concerns. + +Each version is given a distinguishing version number. If the Library +specifies a version number of this License which applies to it and "any +later version", you have the option of following the terms and +conditions either of that version or of any later version published by +the Free Software Foundation. If the Library does not specify a license +version number, you may choose any version ever published by the Free +Software Foundation. + +14. If you wish to incorporate parts of the Library into other free +programs whose distribution conditions are incompatible with these, +write to the author to ask for permission. For software which is +copyrighted by the Free Software Foundation, write to the Free Software +Foundation; we sometimes make exceptions for this. Our decision will be +guided by the two goals of preserving the free status of all derivatives +of our free software and of promoting the sharing and reuse of software +generally. NO WARRANTY -15. BECAUSE THE LIBRARY IS LICENSED FREE OF CHARGE, THERE IS NO -WARRANTY FOR THE LIBRARY, TO THE EXTENT PERMITTED BY APPLICABLE LAW. -EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR -OTHER PARTIES PROVIDE THE LIBRARY "AS IS" WITHOUT WARRANTY OF ANY KIND, -EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED -WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE -ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE LIBRARY IS WITH -YOU. SHOULD THE LIBRARY PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL -NECESSARY SERVICING, REPAIR OR CORRECTION. - -16. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN -WRITING WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY -AND/OR REDISTRIBUTE THE LIBRARY AS PERMITTED ABOVE, BE LIABLE TO YOU FOR -DAMAGES, INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL -DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THE LIBRARY -(INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING RENDERED -INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF -THE LIBRARY TO OPERATE WITH ANY OTHER SOFTWARE), EVEN IF SUCH HOLDER OR -OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. - -END OF TERMS AND CONDITIONS +15. BECAUSE THE LIBRARY IS LICENSED FREE OF CHARGE, THERE IS NO +WARRANTY FOR THE LIBRARY, TO THE EXTENT PERMITTED BY APPLICABLE LAW. +EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR +OTHER PARTIES PROVIDE THE LIBRARY "AS IS" WITHOUT WARRANTY OF ANY KIND, +EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED +WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE +ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE LIBRARY IS WITH +YOU. SHOULD THE LIBRARY PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL +NECESSARY SERVICING, REPAIR OR CORRECTION. + +16. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN +WRITING WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY +AND/OR REDISTRIBUTE THE LIBRARY AS PERMITTED ABOVE, BE LIABLE TO YOU FOR +DAMAGES, INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL +DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THE LIBRARY +(INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING RENDERED +INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF +THE LIBRARY TO OPERATE WITH ANY OTHER SOFTWARE), EVEN IF SUCH HOLDER OR +OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. + +END OF TERMS AND CONDITIONS END OF GNU LESSER GENERAL PUBLIC LICENSE, Version 2.1 NOTICES AND INFORMATION ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ MODIFIABLE THIRD PARTY CODE -This Program includes some or all of the following Modifiable Third -Party Code that IBM obtained under the GNU Lesser General Public -License version 3. For copies of the source code for this software, send -an email to identifying the IBM Program and the -Modifiable Third Party Code for which you are requesting the source code. +This Program includes some or all of the following Modifiable Third +Party Code that IBM obtained under the GNU Lesser General Public +License version 3. For copies of the source code for this software, send +an email to identifying the IBM Program and the +Modifiable Third Party Code for which you are requesting the source code. masterzen/xmlpath:13f4951, 0MQ, Carbon.java, libzmq4x-windows - GNU LESSER GENERAL PUBLIC LICENSE - Version 3, 29 June 2007 +GNU LESSER GENERAL PUBLIC LICENSE +Version 3, 29 June 2007 - Copyright (C) 2007 Free Software Foundation, Inc. - Everyone is permitted to copy and distribute verbatim copies - of this license document, but changing it is not allowed. +Copyright (C) 2007 Free Software Foundation, Inc. +Everyone is permitted to copy and distribute verbatim copies +of this license document, but changing it is not allowed. - This version of the GNU Lesser General Public License incorporates +This version of the GNU Lesser General Public License incorporates the terms and conditions of version 3 of the GNU General Public License, supplemented by the additional permissions listed below. - 0. Additional Definitions. +0. Additional Definitions. - As used herein, "this License" refers to version 3 of the GNU Lesser +As used herein, "this License" refers to version 3 of the GNU Lesser General Public License, and the "GNU GPL" refers to version 3 of the GNU General Public License. - "The Library" refers to a covered work governed by this License, +"The Library" refers to a covered work governed by this License, other than an Application or a Combined Work as defined below. - An "Application" is any work that makes use of an interface provided +An "Application" is any work that makes use of an interface provided by the Library, but which is not otherwise based on the Library. Defining a subclass of a class defined by the Library is deemed a mode of using an interface provided by the Library. - A "Combined Work" is a work produced by combining or linking an -Application with the Library. The particular version of the Library +A "Combined Work" is a work produced by combining or linking an +Application with the Library. The particular version of the Library with which the Combined Work was made is also called the "Linked Version". - The "Minimal Corresponding Source" for a Combined Work means the +The "Minimal Corresponding Source" for a Combined Work means the Corresponding Source for the Combined Work, excluding any source code for portions of the Combined Work that, considered in isolation, are based on the Application, and not on the Linked Version. - The "Corresponding Application Code" for a Combined Work means the +The "Corresponding Application Code" for a Combined Work means the object code and/or source code for the Application, including any data and utility programs needed for reproducing the Combined Work from the Application, but excluding the System Libraries of the Combined Work. - 1. Exception to Section 3 of the GNU GPL. +1. Exception to Section 3 of the GNU GPL. - You may convey a covered work under sections 3 and 4 of this License +You may convey a covered work under sections 3 and 4 of this License without being bound by section 3 of the GNU GPL. - 2. Conveying Modified Versions. +2. Conveying Modified Versions. - If you modify a copy of the Library, and, in your modifications, a +If you modify a copy of the Library, and, in your modifications, a facility refers to a function or data to be supplied by an Application that uses the facility (other than as an argument passed when the facility is invoked), then you may convey a copy of the modified version: - a) under this License, provided that you make a good faith effort to - ensure that, in the event an Application does not supply the - function or data, the facility still operates, and performs - whatever part of its purpose remains meaningful, or +a) under this License, provided that you make a good faith effort to +ensure that, in the event an Application does not supply the +function or data, the facility still operates, and performs +whatever part of its purpose remains meaningful, or - b) under the GNU GPL, with none of the additional permissions of - this License applicable to that copy. +b) under the GNU GPL, with none of the additional permissions of +this License applicable to that copy. - 3. Object Code Incorporating Material from Library Header Files. +3. Object Code Incorporating Material from Library Header Files. - The object code form of an Application may incorporate material from -a header file that is part of the Library. You may convey such object +The object code form of an Application may incorporate material from +a header file that is part of the Library. You may convey such object code under terms of your choice, provided that, if the incorporated material is not limited to numerical parameters, data structure layouts and accessors, or small macros, inline functions and templates (ten or fewer lines in length), you do both of the following: - a) Give prominent notice with each copy of the object code that the - Library is used in it and that the Library and its use are - covered by this License. +a) Give prominent notice with each copy of the object code that the +Library is used in it and that the Library and its use are +covered by this License. - b) Accompany the object code with a copy of the GNU GPL and this license - document. +b) Accompany the object code with a copy of the GNU GPL and this license +document. - 4. Combined Works. +4. Combined Works. - You may convey a Combined Work under terms of your choice that, +You may convey a Combined Work under terms of your choice that, taken together, effectively do not restrict modification of the portions of the Library contained in the Combined Work and reverse engineering for debugging such modifications, if you also do each of the following: - a) Give prominent notice with each copy of the Combined Work that - the Library is used in it and that the Library and its use are - covered by this License. - - b) Accompany the Combined Work with a copy of the GNU GPL and this license - document. - - c) For a Combined Work that displays copyright notices during - execution, include the copyright notice for the Library among - these notices, as well as a reference directing the user to the - copies of the GNU GPL and this license document. - - d) Do one of the following: - - 0) Convey the Minimal Corresponding Source under the terms of this - License, and the Corresponding Application Code in a form - suitable for, and under terms that permit, the user to - recombine or relink the Application with a modified version of - the Linked Version to produce a modified Combined Work, in the - manner specified by section 6 of the GNU GPL for conveying - Corresponding Source. - - 1) Use a suitable shared library mechanism for linking with the - Library. A suitable mechanism is one that (a) uses at run time - a copy of the Library already present on the user's computer - system, and (b) will operate properly with a modified version - of the Library that is interface-compatible with the Linked - Version. - - e) Provide Installation Information, but only if you would otherwise - be required to provide such information under section 6 of the - GNU GPL, and only to the extent that such information is - necessary to install and execute a modified version of the - Combined Work produced by recombining or relinking the - Application with a modified version of the Linked Version. (If - you use option 4d0, the Installation Information must accompany - the Minimal Corresponding Source and Corresponding Application - Code. If you use option 4d1, you must provide the Installation - Information in the manner specified by section 6 of the GNU GPL - for conveying Corresponding Source.) - - 5. Combined Libraries. - - You may place library facilities that are a work based on the +a) Give prominent notice with each copy of the Combined Work that +the Library is used in it and that the Library and its use are +covered by this License. + +b) Accompany the Combined Work with a copy of the GNU GPL and this license +document. + +c) For a Combined Work that displays copyright notices during +execution, include the copyright notice for the Library among +these notices, as well as a reference directing the user to the +copies of the GNU GPL and this license document. + +d) Do one of the following: + +0) Convey the Minimal Corresponding Source under the terms of this +License, and the Corresponding Application Code in a form +suitable for, and under terms that permit, the user to +recombine or relink the Application with a modified version of +the Linked Version to produce a modified Combined Work, in the +manner specified by section 6 of the GNU GPL for conveying +Corresponding Source. + +1) Use a suitable shared library mechanism for linking with the +Library. A suitable mechanism is one that (a) uses at run time +a copy of the Library already present on the user's computer +system, and (b) will operate properly with a modified version +of the Library that is interface-compatible with the Linked +Version. + +e) Provide Installation Information, but only if you would otherwise +be required to provide such information under section 6 of the +GNU GPL, and only to the extent that such information is +necessary to install and execute a modified version of the +Combined Work produced by recombining or relinking the +Application with a modified version of the Linked Version. (If +you use option 4d0, the Installation Information must accompany +the Minimal Corresponding Source and Corresponding Application +Code. If you use option 4d1, you must provide the Installation +Information in the manner specified by section 6 of the GNU GPL +for conveying Corresponding Source.) + +5. Combined Libraries. + +You may place library facilities that are a work based on the Library side by side in a single library together with other library facilities that are not Applications and are not covered by this License, and convey such a combined library under terms of your choice, if you do both of the following: - a) Accompany the combined library with a copy of the same work based - on the Library, uncombined with any other library facilities, - conveyed under the terms of this License. +a) Accompany the combined library with a copy of the same work based +on the Library, uncombined with any other library facilities, +conveyed under the terms of this License. - b) Give prominent notice with the combined library that part of it - is a work based on the Library, and explaining where to find the - accompanying uncombined form of the same work. +b) Give prominent notice with the combined library that part of it +is a work based on the Library, and explaining where to find the +accompanying uncombined form of the same work. - 6. Revised Versions of the GNU Lesser General Public License. +6. Revised Versions of the GNU Lesser General Public License. - The Free Software Foundation may publish revised and/or new versions +The Free Software Foundation may publish revised and/or new versions of the GNU Lesser General Public License from time to time. Such new versions will be similar in spirit to the present version, but may differ in detail to address new problems or concerns. - Each version is given a distinguishing version number. If the +Each version is given a distinguishing version number. If the Library as you received it specifies that a certain numbered version of the GNU Lesser General Public License "or any later version" applies to it, you have the option of following the terms and @@ -1296,13 +1391,14 @@ received it does not specify a version number of the GNU Lesser General Public License, you may choose any version of the GNU Lesser General Public License ever published by the Free Software Foundation. - If the Library as you received it specifies that a proxy can decide +If the Library as you received it specifies that a proxy can decide whether future versions of the GNU Lesser General Public License shall apply, that proxy's public statement of acceptance of any version is permanent authorization for you to choose that version for the Library. END OF GNU LESSER GENERAL PUBLIC LICENSE, Version 3 NOTICES AND INFORMATION + ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ SIL OFL 1.1 @@ -1312,15 +1408,16 @@ SIL Open Font Liceses version 1.1: darkfish/css/fonts.css (Copyright 2010, 2012 Adobe Systems Incorporated (http://www.adobe.com/), with Reserved Font Name "Source". All Rights -Reserved.), IBM Plex 1.0.2 (Copyright � 2017 IBM Corp. with Reserved -Font Name "Plex"), IBM Plex Typeface (Copyright � 2017 IBM Corp. with +Reserved.), IBM Plex 1.0.2 (Copyright 2017 IBM Corp. with Reserved +Font Name "Plex"), IBM Plex Typeface (Copyright 2017 IBM Corp. with Reserved Font Name "Plex"), Lato font (Copyright 2010, 2012 Adobe Systems Incorporated (http://www.adobe.com/), with Reserved Font Name "Source". All Rights Reserved.), font.css (Copyright (c) 2010, Lukasz Dziedzic (dziedzic@typoland.com), with Reserved Font Name Lato.), -(MongoDB) - Font Awesome (Copyright Dave Gandy), (RDoc) - Fonts.css +Font Awesome (Copyright Dave Gandy), (RDoc) - Fonts.css (Copyright 2010, 2012 Adobe Systems Incorporated (http://www.adobe.com/), -with Reserved Font Name "Source". All Rights Reserved.) +with Reserved Font Name "Source". All Rights Reserved.),Orbitron +Copyright (c) 2009, Matt McInerney https://www.fontsquirrel.com SIL Open Font License 1.1 @@ -1418,6 +1515,7 @@ END OF IBM NOTICES AND INFORMATION END OF NOTICE FILE ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ -L/N: L-ESCZ-AZVGVT -D/N: L-ESCZ-AZVGVT -P/N: L-ESCZ-AZVGVT \ No newline at end of file + +L/N: L-MKUI-B3H7N9 +D/N: L-MKUI-B3H7N9 +P/N: L-MKUI-B3H7N9 \ No newline at end of file diff --git a/stable/ibm-cam/README.md b/stable/ibm-cam/README.md index e5d65b67b9..d1a1d2c210 100644 --- a/stable/ibm-cam/README.md +++ b/stable/ibm-cam/README.md @@ -29,17 +29,19 @@ IBM Cloud Automation Manager is only supported to run in IBM Cloud Private. ## Resources Required * The minimum hardware requirements for IBM Cloud Automation Manager is a single worker node with at least 4 vCPU and 16GB of memory. -For a full list of hardware requirements go to: https://www.ibm.com/support/knowledgecenter/SS2L37_2.1.0.3/cam_requirements.html +For a full list of hardware requirements see: https://www.ibm.com/support/knowledgecenter/SS2L37_3.1.0.0/cam_requirements.html -* Persistent Volumes are required to be pre-created. For details see: https://www.ibm.com/support/knowledgecenter/SS2L37_2.1.0.3/cam_create_pv.html +* Persistent Volumes are required to be pre-created. For details see: https://www.ibm.com/support/knowledgecenter/SS2L37_3.1.0.0/cam_create_pv.html + +* This chart requires elevated privileges to run. For details see: https://www.ibm.com/support/knowledgecenter/SS2L37_3.1.0.0/cam_requirements.html ## Installing the Chart -This chart supports various installation options. For complete details please see: https://www.ibm.com/support/knowledgecenter/SS2L37_2.1.0.3/cam_planning.html +This chart supports various installation options. For complete details please see: https://www.ibm.com/support/knowledgecenter/SS2L37_3.1.0.0/cam_planning.html ## Configuration -For the full list of configuration options supporte by this chart see: https://www.ibm.com/support/knowledgecenter/SS2L37_2.1.0.3/cam_installation_parameters.html +For the full list of configuration options supported by this chart see: https://www.ibm.com/support/knowledgecenter/SS2L37_3.1.0.0/cam_installation_parameters.html ## Limitations diff --git a/stable/ibm-cam/RELEASENOTES.md b/stable/ibm-cam/RELEASENOTES.md index 6d33b7a16c..986f23c3eb 100644 --- a/stable/ibm-cam/RELEASENOTES.md +++ b/stable/ibm-cam/RELEASENOTES.md @@ -4,23 +4,24 @@ [//]: # (US Government Users Restricted Rights - Use, duplication or) [//]: # (disclosure restricted by GSA ADP Schedule Contract with IBM Corp.) -# What’s new in Chart Version 1.3.0 +# What’s new in Chart Version 3.1.0 -The 1.3.1 version of the Chart installs version 2.1.0.3 fix pack 1 of IBM Cloud Automation Manager. The primary feature of this release is better support for installation and running Cloud Automation Manager in an air gapped network or an environment which requires an HTTP proxy. +The 3.1.0 version of the Chart installs version 3.1.0.0 of IBM Cloud Automation Manager. For a complete list of what's new in this release go to https://www.ibm.com/support/knowledgecenter/SS2L37_3.1.0.0/cam_whatisnew.html # Prerequisites 1. IBM Cloud Automation Manager is required to run on IBM Cloud Private # Documentation -For detailed upgrade instructions go to https://www.ibm.com/support/knowledgecenter/SS2L37_2.1.0.3/cam_upgrade_cam.html +For detailed upgrade instructions go to https://www.ibm.com/support/knowledgecenter/SS2L37_3.1.0.0/cam_upgrade_cam.html # Fixes -None +Various bug fixes # Version History | Chart | Date | IBM Cloud Automation Manager version | Kubernetes Required | Details | | ----- | ---- | ------------------------------------ | ------------------- | ------- | +| 3.1.0 | Sept 28, 2018| 3.1.0.0 | >=1.9.0 | 3Q18 release | | 1.3.1 | August 8, 2018| 2.1.0.3 FP1 | >=1.9.0 | Outbound Proxy Support | | 1.3.0 | June 29, 2018| 2.1.0.3 | >=1.9.0 | 2Q18 release | | 1.2.1 | May 25, 2018| 2.1.0.2 FP1 | >=1.9.0 | GDPR compliance | diff --git a/stable/ibm-cam/ibm_cloud_pak/manifest.yaml b/stable/ibm-cam/ibm_cloud_pak/manifest.yaml new file mode 100644 index 0000000000..2e7c2a910c --- /dev/null +++ b/stable/ibm-cam/ibm_cloud_pak/manifest.yaml @@ -0,0 +1,402 @@ +charts: + - archive: file:ibm-cam-3.1.0.tgz + repository-keys: + - image.repository + +images: +- image: icam-bpd-cds:3.1.0.0-x86_64 + references: + - repository : icam-bpd-cds:3.1.0.0-x86_64 + pull-repository: store/ibmcorp/icam-cds:3.1.0.0-x86_64 + pull-authorization: + username: + env: ARTIFACTORY_USERNAME + password: + env: ARTIFACTORY_PASSWORD +- image: icam-bpd-mariadb:3.1.0.0-x86_64 + references: + - repository : icam-bpd-mariadb:3.1.0.0-x86_64 + pull-repository: store/ibmcorp/icam-bpd-mariadb:3.1.0.0-x86_64 + pull-authorization: + username: + env: ARTIFACTORY_USERNAME + password: + env: ARTIFACTORY_PASSWORD +- image: icam-bpd-mds:3.1.0.0-x86_64 + references: + - repository : icam-bpd-mds:3.1.0.0-x86_64 + pull-repository: store/ibmcorp/icam-mds:3.1.0.0-x86_64 + pull-authorization: + username: + env: ARTIFACTORY_USERNAME + password: + env: ARTIFACTORY_PASSWORD +- image: icam-bpd-ui:3.1.0.0-x86_64 + references: + - repository : icam-bpd-ui:3.1.0.0-x86_64 + pull-repository: store/ibmcorp/icam-bpd-ui:3.1.0.0-x86_64 + pull-authorization: + username: + env: ARTIFACTORY_USERNAME + password: + env: ARTIFACTORY_PASSWORD +- image: icam-broker:3.1.0.0-x86_64 + references: + - repository : icam-broker:3.1.0.0-x86_64 + pull-repository: store/ibmcorp/icam-broker:3.1.0.0-x86_64 + pull-authorization: + username: + env: ARTIFACTORY_USERNAME + password: + env: ARTIFACTORY_PASSWORD +- image: icam-busybox:3.1.0.0-x86_64 + references: + - repository : icam-busybox:3.1.0.0-x86_64 + pull-repository: store/ibmcorp/icam-busybox:3.1.0.0-x86_64 + pull-authorization: + username: + env: ARTIFACTORY_USERNAME + password: + env: ARTIFACTORY_PASSWORD +- image: icam-iaas:3.1.0.0-x86_64 + references: + - repository : icam-iaas:3.1.0.0-x86_64 + pull-repository: store/ibmcorp/icam-iaas:3.1.0.0-x86_64 + pull-authorization: + username: + env: ARTIFACTORY_USERNAME + password: + env: ARTIFACTORY_PASSWORD +- image: icam-mongo:3.1.0.0-x86_64 + references: + - repository : icam-mongo:3.1.0.0-x86_64 + pull-repository: store/ibmcorp/icam-mongo:3.1.0.0-x86_64 + pull-authorization: + username: + env: ARTIFACTORY_USERNAME + password: + env: ARTIFACTORY_PASSWORD +- image: icam-orchestration:3.1.0.0-x86_64 + references: + - repository : icam-orchestration:3.1.0.0-x86_64 + pull-repository: store/ibmcorp/icam-orchestration:3.1.0.0-x86_64 + pull-authorization: + username: + env: ARTIFACTORY_USERNAME + password: + env: ARTIFACTORY_PASSWORD +- image: icam-portal-ui:3.1.0.0-x86_64 + references: + - repository : icam-portal-ui:3.1.0.0-x86_64 + pull-repository: store/ibmcorp/icam-portal-ui:3.1.0.0-x86_64 + pull-authorization: + username: + env: ARTIFACTORY_USERNAME + password: + env: ARTIFACTORY_PASSWORD +- image: icam-provider-helm:3.1.0.0-x86_64 + references: + - repository : icam-provider-helm:3.1.0.0-x86_64 + pull-repository: store/ibmcorp/icam-provider-helm:3.1.0.0-x86_64 + pull-authorization: + username: + env: ARTIFACTORY_USERNAME + password: + env: ARTIFACTORY_PASSWORD +- image: icam-provider-terraform:3.1.0.0-x86_64 + references: + - repository : icam-provider-terraform:3.1.0.0-x86_64 + pull-repository: store/ibmcorp/icam-provider-terraform:3.1.0.0-x86_64 + pull-authorization: + username: + env: ARTIFACTORY_USERNAME + password: + env: ARTIFACTORY_PASSWORD +- image: icam-proxy:3.1.0.0-x86_64 + references: + - repository : icam-proxy:3.1.0.0-x86_64 + pull-repository: store/ibmcorp/icam-proxy:3.1.0.0-x86_64 + pull-authorization: + username: + env: ARTIFACTORY_USERNAME + password: + env: ARTIFACTORY_PASSWORD +- image: icam-redis:3.1.0.0-x86_64 + references: + - repository : icam-redis:3.1.0.0-x86_64 + pull-repository: store/ibmcorp/icam-redis:3.1.0.0-x86_64 + pull-authorization: + username: + env: ARTIFACTORY_USERNAME + password: + env: ARTIFACTORY_PASSWORD +- image: icam-service-composer-api:3.1.0.0-x86_64 + references: + - repository : icam-service-composer-api:3.1.0.0-x86_64 + pull-repository: store/ibmcorp/icam-service-composer-api:3.1.0.0-x86_64 + pull-authorization: + username: + env: ARTIFACTORY_USERNAME + password: + env: ARTIFACTORY_PASSWORD +- image: icam-service-composer-ui:3.1.0.0-x86_64 + references: + - repository : icam-service-composer-ui:3.1.0.0-x86_64 + pull-repository: store/ibmcorp/icam-service-composer-ui:3.1.0.0-x86_64 + pull-authorization: + username: + env: ARTIFACTORY_USERNAME + password: + env: ARTIFACTORY_PASSWORD +- image: icam-tenant-api:3.1.0.0-x86_64 + references: + - repository : icam-tenant-api:3.1.0.0-x86_64 + pull-repository: store/ibmcorp/icam-tenant-api:3.1.0.0-x86_64 + pull-authorization: + username: + env: ARTIFACTORY_USERNAME + password: + env: ARTIFACTORY_PASSWORD +- image: icam-toolbox:3.1.0.0-x86_64 + references: + - repository : icam-toolbox:3.1.0.0-x86_64 + pull-repository: store/ibmcorp/icam-toolbox:3.1.0.0-x86_64 + pull-authorization: + username: + env: ARTIFACTORY_USERNAME + password: + env: ARTIFACTORY_PASSWORD +- image: icam-ui-basic:3.1.0.0-x86_64 + references: + - repository : icam-ui-basic:3.1.0.0-x86_64 + pull-repository: store/ibmcorp/icam-ui-basic:3.1.0.0-x86_64 + pull-authorization: + username: + env: ARTIFACTORY_USERNAME + password: + env: ARTIFACTORY_PASSWORD +- image: icam-ui-connections:3.1.0.0-x86_64 + references: + - repository : icam-ui-connections:3.1.0.0-x86_64 + pull-repository: store/ibmcorp/icam-ui-connections:3.1.0.0-x86_64 + pull-authorization: + username: + env: ARTIFACTORY_USERNAME + password: + env: ARTIFACTORY_PASSWORD +- image: icam-ui-instances:3.1.0.0-x86_64 + references: + - repository : icam-ui-instances:3.1.0.0-x86_64 + pull-repository: store/ibmcorp/icam-ui-instances:3.1.0.0-x86_64 + pull-authorization: + username: + env: ARTIFACTORY_USERNAME + password: + env: ARTIFACTORY_PASSWORD +- image: icam-ui-templates:3.1.0.0-x86_64 + references: + - repository : icam-ui-templates:3.1.0.0-x86_64 + pull-repository: store/ibmcorp/icam-ui-templates:3.1.0.0-x86_64 + pull-authorization: + username: + env: ARTIFACTORY_USERNAME + password: + env: ARTIFACTORY_PASSWORD +- image: icam-bpd-cds:3.1.0.0-ppc64le + references: + - repository : icam-bpd-cds:3.1.0.0-ppc64le + pull-repository: store/ibmcorp/icam-cds:3.1.0.0-ppc64le + pull-authorization: + username: + env: ARTIFACTORY_USERNAME + password: + env: ARTIFACTORY_PASSWORD +- image: icam-bpd-mariadb:3.1.0.0-ppc64le + references: + - repository : icam-bpd-mariadb:3.1.0.0-ppc64le + pull-repository: store/ibmcorp/icam-bpd-mariadb:3.1.0.0-ppc64le + pull-authorization: + username: + env: ARTIFACTORY_USERNAME + password: + env: ARTIFACTORY_PASSWORD +- image: icam-bpd-mds:3.1.0.0-ppc64le + references: + - repository : icam-bpd-mds:3.1.0.0-ppc64le + pull-repository: store/ibmcorp/icam-mds:3.1.0.0-ppc64le + pull-authorization: + username: + env: ARTIFACTORY_USERNAME + password: + env: ARTIFACTORY_PASSWORD +- image: icam-bpd-ui:3.1.0.0-ppc64le + references: + - repository : icam-bpd-ui:3.1.0.0-ppc64le + pull-repository: store/ibmcorp/icam-bpd-ui:3.1.0.0-ppc64le + pull-authorization: + username: + env: ARTIFACTORY_USERNAME + password: + env: ARTIFACTORY_PASSWORD +- image: icam-broker:3.1.0.0-ppc64le + references: + - repository : icam-broker:3.1.0.0-ppc64le + pull-repository: store/ibmcorp/icam-broker:3.1.0.0-ppc64le + pull-authorization: + username: + env: ARTIFACTORY_USERNAME + password: + env: ARTIFACTORY_PASSWORD +- image: icam-busybox:3.1.0.0-ppc64le + references: + - repository : icam-busybox:3.1.0.0-ppc64le + pull-repository: store/ibmcorp/icam-busybox:3.1.0.0-ppc64le + pull-authorization: + username: + env: ARTIFACTORY_USERNAME + password: + env: ARTIFACTORY_PASSWORD +- image: icam-iaas:3.1.0.0-ppc64le + references: + - repository : icam-iaas:3.1.0.0-ppc64le + pull-repository: store/ibmcorp/icam-iaas:3.1.0.0-ppc64le + pull-authorization: + username: + env: ARTIFACTORY_USERNAME + password: + env: ARTIFACTORY_PASSWORD +- image: icam-mongo:3.1.0.0-ppc64le + references: + - repository : icam-mongo:3.1.0.0-ppc64le + pull-repository: store/ibmcorp/icam-mongo:3.1.0.0-ppc64le + pull-authorization: + username: + env: ARTIFACTORY_USERNAME + password: + env: ARTIFACTORY_PASSWORD +- image: icam-orchestration:3.1.0.0-ppc64le + references: + - repository : icam-orchestration:3.1.0.0-ppc64le + pull-repository: store/ibmcorp/icam-orchestration:3.1.0.0-ppc64le + pull-authorization: + username: + env: ARTIFACTORY_USERNAME + password: + env: ARTIFACTORY_PASSWORD +- image: icam-portal-ui:3.1.0.0-ppc64le + references: + - repository : icam-portal-ui:3.1.0.0-ppc64le + pull-repository: store/ibmcorp/icam-portal-ui:3.1.0.0-ppc64le + pull-authorization: + username: + env: ARTIFACTORY_USERNAME + password: + env: ARTIFACTORY_PASSWORD +- image: icam-provider-helm:3.1.0.0-ppc64le + references: + - repository : icam-provider-helm:3.1.0.0-ppc64le + pull-repository: store/ibmcorp/icam-provider-helm:3.1.0.0-ppc64le + pull-authorization: + username: + env: ARTIFACTORY_USERNAME + password: + env: ARTIFACTORY_PASSWORD +- image: icam-provider-terraform:3.1.0.0-ppc64le + references: + - repository : icam-provider-terraform:3.1.0.0-ppc64le + pull-repository: store/ibmcorp/icam-provider-terraform:3.1.0.0-ppc64le + pull-authorization: + username: + env: ARTIFACTORY_USERNAME + password: + env: ARTIFACTORY_PASSWORD +- image: icam-proxy:3.1.0.0-ppc64le + references: + - repository : icam-proxy:3.1.0.0-ppc64le + pull-repository: store/ibmcorp/icam-proxy:3.1.0.0-ppc64le + pull-authorization: + username: + env: ARTIFACTORY_USERNAME + password: + env: ARTIFACTORY_PASSWORD +- image: icam-redis:3.1.0.0-ppc64le + references: + - repository : icam-redis:3.1.0.0-ppc64le + pull-repository: store/ibmcorp/icam-redis:3.1.0.0-ppc64le + pull-authorization: + username: + env: ARTIFACTORY_USERNAME + password: + env: ARTIFACTORY_PASSWORD +- image: icam-service-composer-api:3.1.0.0-ppc64le + references: + - repository : icam-service-composer-api:3.1.0.0-ppc64le + pull-repository: store/ibmcorp/icam-service-composer-api:3.1.0.0-ppc64le + pull-authorization: + username: + env: ARTIFACTORY_USERNAME + password: + env: ARTIFACTORY_PASSWORD +- image: icam-service-composer-ui:3.1.0.0-ppc64le + references: + - repository : icam-service-composer-ui:3.1.0.0-ppc64le + pull-repository: store/ibmcorp/icam-service-composer-ui:3.1.0.0-ppc64le + pull-authorization: + username: + env: ARTIFACTORY_USERNAME + password: + env: ARTIFACTORY_PASSWORD +- image: icam-tenant-api:3.1.0.0-ppc64le + references: + - repository : icam-tenant-api:3.1.0.0-ppc64le + pull-repository: store/ibmcorp/icam-tenant-api:3.1.0.0-ppc64le + pull-authorization: + username: + env: ARTIFACTORY_USERNAME + password: + env: ARTIFACTORY_PASSWORD +- image: icam-toolbox:3.1.0.0-ppc64le + references: + - repository : icam-toolbox:3.1.0.0-ppc64le + pull-repository: store/ibmcorp/icam-toolbox:3.1.0.0-ppc64le + pull-authorization: + username: + env: ARTIFACTORY_USERNAME + password: + env: ARTIFACTORY_PASSWORD +- image: icam-ui-basic:3.1.0.0-ppc64le + references: + - repository : icam-ui-basic:3.1.0.0-ppc64le + pull-repository: store/ibmcorp/icam-ui-basic:3.1.0.0-ppc64le + pull-authorization: + username: + env: ARTIFACTORY_USERNAME + password: + env: ARTIFACTORY_PASSWORD +- image: icam-ui-connections:3.1.0.0-ppc64le + references: + - repository : icam-ui-connections:3.1.0.0-ppc64le + pull-repository: store/ibmcorp/icam-ui-connections:3.1.0.0-ppc64le + pull-authorization: + username: + env: ARTIFACTORY_USERNAME + password: + env: ARTIFACTORY_PASSWORD +- image: icam-ui-instances:3.1.0.0-ppc64le + references: + - repository : icam-ui-instances:3.1.0.0-ppc64le + pull-repository: store/ibmcorp/icam-ui-instances:3.1.0.0-ppc64le + pull-authorization: + username: + env: ARTIFACTORY_USERNAME + password: + env: ARTIFACTORY_PASSWORD +- image: icam-ui-templates:3.1.0.0-ppc64le + references: + - repository : icam-ui-templates:3.1.0.0-ppc64le + pull-repository: store/ibmcorp/icam-ui-templates:3.1.0.0-ppc64le + pull-authorization: + username: + env: ARTIFACTORY_USERNAME + password: + env: ARTIFACTORY_PASSWORD \ No newline at end of file diff --git a/stable/ibm-cam/ibm_cloud_pak/qualification.yaml b/stable/ibm-cam/ibm_cloud_pak/qualification.yaml new file mode 100644 index 0000000000..c201328e4d --- /dev/null +++ b/stable/ibm-cam/ibm_cloud_pak/qualification.yaml @@ -0,0 +1,6 @@ +qualification: + levelName: "ibm-cloud-pak" + levelDescription: "IBM Cloud Pak" + issueDate: "09/2018" + duration: "6M" + terms: "Valid from date of issue. Security vulnerability management and enhancements are delivered on the latest version of the chart and images." diff --git a/stable/ibm-cam/pre-install/cam-secure-values-secret.yaml b/stable/ibm-cam/pre-install/cam-secure-values-secret.yaml new file mode 100644 index 0000000000..506d18076a --- /dev/null +++ b/stable/ibm-cam/pre-install/cam-secure-values-secret.yaml @@ -0,0 +1,26 @@ +############################################################################### +# Licensed Materials - Property of IBM. +# Copyright IBM Corporation 2017. All Rights Reserved. +# U.S. Government Users Restricted Rights - Use, duplication or disclosure +# restricted by GSA ADP Schedule Contract with IBM Corp. +# +# Contributors: +# IBM Corporation - initial API and implementation +############################################################################### + apiVersion: v1 + kind: Secret + metadata: + name: cam-secure-values-secret + namespace: services + labels: + app: cam + data: + httpProxy: aHR0cDovL3VzZXJuYW1lOnBhc3N3b3JkQHByb3h5X2hvc3Q6cHJveHlfcG9ydA== + httpsProxy: aHR0cDovL3VzZXJuYW1lOnBhc3N3b3JkQHByb3h5X2hvc3Q6cHJveHlfcG9ydA== + noProxy: + mongoDbPassword: ZkZDWGI1WjlSNlg3TGhr + mongoDbUrl: bW9uZ29kYjovL2NhbXVzZXI6ZkZDWGI1WjlSNlg3TGhrQGNhbS1tb25nbzoyNzAxNy9jYW0= + encryptionPassword: ZkZDWGI1WjlSNlg3TGhr + mariaDbUsername: dWNkcGFkbWlu + mariaDbPassword: YmNiMTllZTNkZWUw + redisPassword: ZkZDWGI1WjlSNlg3TGhr diff --git a/stable/ibm-cam/scripts/camCollector.sh b/stable/ibm-cam/scripts/camCollector.sh index 2ed86e0f2d..721fbf1b5a 100755 --- a/stable/ibm-cam/scripts/camCollector.sh +++ b/stable/ibm-cam/scripts/camCollector.sh @@ -101,9 +101,15 @@ collectDiagnosticsData() { echo -e "\n" echo "**********************************************************" - echo "GET Persistent Volumes in Services namespace" + echo "GET CAM Persistent Volumes" echo "**********************************************************" - kubectl get persistentvolume + kubectl get persistentvolume -l 'type in (cam-terraform, cam-logs, cam-mongo, cam-bpd-appdata)' + echo -e "\n" + + echo "**********************************************************" + echo "DESCRIBE CAM Persistent Volumes" + echo "**********************************************************" + kubectl describe persistentvolume -l 'type in (cam-terraform, cam-logs, cam-mongo, cam-bpd-appdata)' echo -e "\n" echo "**********************************************************" diff --git a/stable/ibm-cam/scripts/cleanup.sh b/stable/ibm-cam/scripts/cleanup.sh index 40b9fec7db..b7060d996c 100755 --- a/stable/ibm-cam/scripts/cleanup.sh +++ b/stable/ibm-cam/scripts/cleanup.sh @@ -6,7 +6,7 @@ #US Government Users Restricted Rights - Use, duplication or #disclosure restricted by GSA ADP Schedule Contract with IBM Corp. # -export tiller_version=$(docker images | grep tiller | head -1 | awk '{print $2}' | sed 's|v||g') +export tiller_version=$(docker images | grep icp | grep tiller | head -1 | awk '{print $2}' | sed 's|v||g') export tiller_icp=$(echo $tiller_version | awk -F'[.]' '{print $3}' | awk -F'[-]' '{print $2}') if [ ! -z $tiller_icp ]; then @@ -17,6 +17,9 @@ else helm del cam --purge fi +echo kubectl -n services delete -l release=cam job +kubectl -n services delete -l release=cam job + echo "Waiting for Pods to terminate" kubectl -n services get -l release=cam pod pods=$(kubectl -n services get -l release=cam pods | grep -) @@ -27,18 +30,6 @@ while [ "${pods}" ]; do done echo "All pods terminated" -echo kubectl delete pv cam-logs-pv -kubectl delete pv cam-logs-pv - -echo kubectl delete pv cam-mongo-pv -kubectl delete pv cam-mongo-pv - -echo kubectl delete pv cam-terraform-pv -kubectl delete pv cam-terraform-pv - -echo kubectl delete pv cam-bpd-appdata-pv -kubectl delete pv cam-bpd-appdata-pv - echo kubectl delete -n services pvc cam-logs-pv kubectl delete -n services pvc cam-logs-pv @@ -51,5 +42,17 @@ kubectl delete -n services pvc cam-terraform-pv echo kubectl delete -n services pvc cam-bpd-appdata-pv kubectl delete -n services pvc cam-bpd-appdata-pv +echo kubectl delete pv cam-logs-pv +kubectl delete pv cam-logs-pv + +echo kubectl delete pv cam-mongo-pv +kubectl delete pv cam-mongo-pv + +echo kubectl delete pv cam-terraform-pv +kubectl delete pv cam-terraform-pv + +echo kubectl delete pv cam-bpd-appdata-pv +kubectl delete pv cam-bpd-appdata-pv + echo sleep 15, waiting for things to settle down sleep 15 diff --git a/stable/ibm-cam/scripts/dbpassword/mariadb_changepasswords.sh b/stable/ibm-cam/scripts/dbpassword/mariadb_changepasswords.sh new file mode 100755 index 0000000000..4f46cca067 --- /dev/null +++ b/stable/ibm-cam/scripts/dbpassword/mariadb_changepasswords.sh @@ -0,0 +1,37 @@ +#!/bin/bash +# +# This script will change the root and user passwords +# +date +echo "mariadb_changepasswords.sh starting" + +PASSWORD_NEW=$1 + +# Current info (MYSQL_USER, MYSQL_PASSWORDK, MYSQL_ROOT_PASSWORD) should already be set as env vars in the container +if [ -z "${MYSQL_USER}" ] || [ -z "${MYSQL_PASSWORD}" ] || [ -z "${MYSQL_ROOT_PASSWORD}" ] || [ -z "${PASSWORD_NEW}" ]; then + echo "MariaDB - Error, no password change, possibly new password is not passed in." + exit 1 +fi + +echo "Changing passwords for mariadb users..." + +# Change root password +mysqladmin -u root -p$MYSQL_ROOT_PASSWORD password $PASSWORD_NEW + +if [ $? -ne 0 ]; then + echo "Unable to change mariadb root password, exiting with ERROR" + exit -1 +fi +echo "Successfully changed mariadb root password" + +# Change user password +mysql -u $MYSQL_USER -p$MYSQL_PASSWORD -e "set password=password('${PASSWORD_NEW}');" + +if [ $? -ne 0 ]; then + echo "Unable to change mariadb user password, exiting with ERROR" + exit -1 +fi +echo "Successfully changed mariadb user password" + +echo "MariaDB password changes all successful" +exit 0 \ No newline at end of file diff --git a/stable/ibm-cam/scripts/dbpassword/mongodb_changepasswords.sh b/stable/ibm-cam/scripts/dbpassword/mongodb_changepasswords.sh new file mode 100755 index 0000000000..1a0dab7fef --- /dev/null +++ b/stable/ibm-cam/scripts/dbpassword/mongodb_changepasswords.sh @@ -0,0 +1,42 @@ +#!/bin/bash +# +# This script will change the admin and camuser passwords +# +date +echo "mongodb_changepasswords.sh starting" + +MONGODB_PASSWORD_NEW=$1 + +# Current info (MONGO_INITDB_ROOT_USERNAME, MONGO_INITDB_ROOT_PASSWORD) should already be set as env vars in the container +if [ -z "${MONGO_INITDB_ROOT_USERNAME}" ] || [ -z "${MONGO_INITDB_ROOT_PASSWORD}" ] || [ -z "${MONGODB_PASSWORD_NEW}" ]; then + echo "MongoDB - Error, no password change, possibly new password is not passed in." + exit 1 +fi + +echo "Changing passwords for mongo users..." + +# Set defaults if other vars are not set +MONGODB_DATABASE=${MONGODB_DATABASE:-cam} +MONGODB_USERNAME=${MONGODB_USERNAME:-camuser} +MONGODB_PASSWORD=${MONGODB_PASSWORD:-$MONGO_INITDB_ROOT_PASSWORD} + +# Change admin password +mongo admin --host localhost -u $MONGO_INITDB_ROOT_USERNAME -p $MONGO_INITDB_ROOT_PASSWORD --eval "db.changeUserPassword('$MONGO_INITDB_ROOT_USERNAME', '$MONGODB_PASSWORD_NEW');" + +if [ $? -ne 0 ]; then + echo "Unable to change admin password, exiting with ERROR" + exit 1 +fi +echo "MongoDB - Successfully changed admin password" + +# Change cam user password +mongo admin --host localhost -u $MONGO_INITDB_ROOT_USERNAME -p $MONGODB_PASSWORD_NEW --eval "db=db.getSiblingDB('$MONGODB_DATABASE');db.changeUserPassword('$MONGODB_USERNAME', '$MONGODB_PASSWORD_NEW');" + +if [ $? -ne 0 ]; then + echo "MongoDB - Unable to change cam user password, exiting with ERROR" + exit 1 +fi +echo "MongoDB - Successfully changed cam user password" + +echo "MongoDB - Password changes all successful" +exit 0 diff --git a/stable/ibm-cam/scripts/passwordMigration.sh b/stable/ibm-cam/scripts/passwordMigration.sh new file mode 100755 index 0000000000..3cec8b2e0e --- /dev/null +++ b/stable/ibm-cam/scripts/passwordMigration.sh @@ -0,0 +1,550 @@ +#!/bin/bash +# +#Licensed Materials - Property of IBM +#5737-E67 +#(C) Copyright IBM Corporation 2016, 2018 All Rights Reserved. +#US Government Users Restricted Rights - Use, duplication or +#disclosure restricted by GSA ADP Schedule Contract with IBM Corp. +# + +usage() { + echo "Usage: $0 [ -e ] [ -d ] [ -m ] [ -s ] [ -n ] [ -r ] [ -c ]" 1>&2; + echo " -e = new encryption password for CAM (Backup your mongodb prior to using this)" 1>&2; + echo " -d = new mongodb password for CAM (Backup your mongodb prior to using this - only applies to bundled mongodb)" 1>&2; + echo " -m = new mariadb password (Backup your mariadb prior to using this - only applies to bundled mariadb)" 1>&2; + echo " -s = name of CAM secret (default is cam-secure-values-secret)" 1>&2; + echo " -n = namespace for CAM (default is services)" 1>&2; + echo " -r = helm release name for CAM" 1>&2; + echo " -c = migration loop count to override the default timeout (count = 300 by default)" 1>&2; + exit 1; + } + +while getopts ":e:d:m:s:n:r:c:" opt; do + case ${opt} in + e) + NEW_ENCRYPTION_PASSWORD=$OPTARG + ;; + d) + NEW_MONGODB_PASSWORD=$OPTARG + ;; + m) + NEW_MARIADB_PASSWORD=$OPTARG + ;; + s) + CAM_SECRET=$OPTARG + ;; + n) + NAMESPACE=$OPTARG + ;; + r) + HELM_RELEASE=$OPTARG + ;; + c) + echo "-c was triggered! parameter is $OPTARG" >&2 + MONITOR_COUNT=$OPTARG + ;; + \?) + echo "Invalid option: -$OPTARG" >&2 + usage + exit 1 + ;; + :) + echo "Invalid Option: -$OPTARG requires an argument" 1>&2 + usage + exit 1 + ;; + esac +done +shift $((OPTIND-1)) + + +CHANGE_ENCRYPTION=false +if [ -n "$NEW_ENCRYPTION_PASSWORD" ]; then + CHANGE_ENCRYPTION=true +fi + +CHANGE_MONGODB=false +if [ -n "$NEW_MONGODB_PASSWORD" ]; then + CHANGE_MONGODB=true +fi + +CHANGE_MARIADB=false +if [ -n "$NEW_MARIADB_PASSWORD" ]; then + CHANGE_MARIADB=true +fi + +CAM_SECRET=${CAM_SECRET:-cam-secure-values-secret} + +NAMESPACE=${NAMESPACE:-services} + +MONITOR_COUNT=${MONITOR_COUNT:-300} # Default to 300 if not specified with -c. 300 x ~10 seconds = 50 mins before timeout + + + +# +# Constants +# +MIGRATION_SECRET=cam-cipher-migration-secret + +DEPLOYMENT_IAAS=cam-iaas +DEPLOYMENT_PT=cam-provider-terraform +DEPLOYMENT_MONGODB=cam-mongo +DEPLOYMENT_MARIADB=cam-bpd-mariadb +DEPLOYMENT_REDIS=redis + + +# +# Validations +# +# Check that the cam secret exists +kubectl -n $NAMESPACE get secret $CAM_SECRET +if [ $? -ne 0 ]; then + echo "Unable to find CAM secret: $CAM_SECRET in namespace $NAMESPACE, unable to perform password migration." + usage + exit 1 +fi + + +# Check for numeric value for MONITOR_COUNT +if [ "$MONITOR_COUNT" -eq "$MONITOR_COUNT" ]; then + echo "" +else + echo "-c must be an int value" + usage + exit 1 +fi + + +base64 --version > /dev/null +if [ $? -ne 0 ]; then + echo "Error, base64 utility is not available, unable to run password migration." + exit 1; +fi + +DIR="$( cd "$( dirname "${BASH_SOURCE[0]}" )" && pwd )" + +if [ $HELM_RELEASE ]; then + foundCam=$(helm list $HELM_RELEASE --tls | grep ibm-cam ) + if [ -n "$foundCam" ]; then + camRelease=$HELM_RELEASE + else + echo "Error: Specified helm release is not found, or is not a CAM release" + usage + exit 1 + fi +else + camRelease=$(helm list --tls | grep ibm-cam | awk '{ print $1 }') +fi + +if [ -n "$camRelease" ]; then + echo "" + echo "Starting password migration for CAM release: $camRelease in namespace: $NAMESPACE ..." + echo "" +else + echo "Error: Unable to find CAM release" + usage + exit 1 +fi + + +# Check if mongo, mariadb and redis are bundled or not +BUNDLED_MONGODB=true +BUNDLED_MARIADB=true +BUNDLED_REDIS=true + +kubectl -n $NAMESPACE get deploy -l release=$camRelease -l name=$DEPLOYMENT_MONGODB | grep -q $DEPLOYMENT_MONGODB +if [ $? -ne 0 ]; then + BUNDLED_MONGODB=false +fi +echo "MongoDB bundled: $BUNDLED_MONGODB" + +kubectl -n $NAMESPACE get deploy -l release=$camRelease -l name=$DEPLOYMENT_MARIADB | grep -q $DEPLOYMENT_MARIADB +if [ $? -ne 0 ]; then + BUNDLED_MARIADB=false +fi +echo "MariaDB bundled: $BUNDLED_MARIADB" + +kubectl -n $NAMESPACE get deploy -l release=$camRelease -l name=$DEPLOYMENT_REDIS | grep -q $DEPLOYMENT_REDIS +if [ $? -ne 0 ]; then + BUNDLED_REDIS=false +fi +echo "Redis bundled: $BUNDLED_REDIS" + + +# +# Figure out which parts we will do and display +# +echo "" +echo "##################################################" +echo "Password migration Steps to perform: " +echo "" +if [ "$CHANGE_ENCRYPTION" = true ]; then + echo "Will perform encryption password change" +fi + +if [ "$CHANGE_MONGODB" = true ]; then + if [ "$BUNDLED_MONGODB" = true ]; then + echo "Will perform mongodb password change" + else + # Only perform the change if mongodb was bundled + CHANGE_MONGODB=false + echo "Not performing mongodb password change as mongodb is external." + fi +fi + +if [ "$CHANGE_MARIADB" = true ]; then + if [ "$BUNDLED_MARIADB" = true ]; then + echo "Will perform mariadb password change" + else + # Only perform the change if mariadb was bundled + CHANGE_MARIADB=false + echo "Not performing mariadb password change as mariadb is external." + fi +fi + +if [ "$CHANGE_ENCRYPTION" = false ] && [ "$CHANGE_MONGODB" = false ] && [ "$CHANGE_MARIADB" = false ]; then + echo "" + echo "No passwords to change, exiting." + usage + exit 1 +fi +echo "##################################################" +echo "" + +# +# STOP CAM if it is running +# +CAMRUNNING_BEFOREMIGRATION=false + +runningPods=$(kubectl -n $NAMESPACE get pod -l release=$camRelease -o name) +if [ -n "$runningPods" ]; then + CAMRUNNING_BEFOREMIGRATION=true + + echo "CAM pods are running, stopping before starting password migration ..." + + # Stop CAM + $DIR/stopCAM.sh $camRelease + if [ "$?" -ne 0 ]; then + echo "Error: unable to stop CAM" + exit 1; + fi +fi + + +# +# Save existing secrets before any migration +# +if [ "$CHANGE_ENCRYPTION" = true ]; then + CURRENT_ENCRYPTION_SECRET_BASE64=$(kubectl -n $NAMESPACE get secret $CAM_SECRET -o yaml | grep "encryptionPassword:" | awk '{print $2}') + if [ -z "$CURRENT_ENCRYPTION_SECRET_BASE64" ]; then + echo "Error, unable to get current encryption secret before migration" + exit 1 + fi +fi + +if [ "$CHANGE_MONGODB" = true ]; then + CURRENT_MONGODB_URL_BASE64=$(kubectl -n $NAMESPACE get secret $CAM_SECRET -o yaml | grep "mongoDbUrl:" | awk '{print $2}') + if [ -z "$CURRENT_MONGODB_URL_BASE64" ]; then + echo "Error, unable to get current mongoDbUrl before migration" + exit 1 + fi + CURRENT_MONGODB_PASSWORD_BASE64=$(kubectl -n $NAMESPACE get secret $CAM_SECRET -o yaml | grep "mongoDbPassword:" | awk '{print $2}') + if [ -z "$CURRENT_MONGODB_PASSWORD_BASE64" ]; then + echo "Error, unable to get current mongoDbPassword before migration" + exit 1 + fi +fi + +# secret will be set only if mariadb is bundled +if [ "$CHANGE_MARIADB" = true ]; then + CURRENT_MARIADB_PASSWORD_BASE64=$(kubectl -n $NAMESPACE get secret $CAM_SECRET -o yaml | grep "mariaDbPassword:" | awk '{print $2}') + if [ -z "$CURRENT_MARIADB_PASSWORD_BASE64" ]; then + echo "Error, unable to get current mariaDbPassword before migration" + exit 1 + fi +fi + +migration_secret_rollback() { + if [ "$CHANGE_ENCRYPTION" = true ]; then + echo "Rolling back secret $MIGRATION_SECRET ..." + kubectl -n $NAMESPACE patch secret $MIGRATION_SECRET -p "{\"data\": {\"newpassword\": \"\", \"timestampfile\": \"\"}}" + fi +} + +# +# Rollback if failure +# - Rollback migration secret +# - Stop CAM +rollback1() { + migration_secret_rollback + $DIR/stopCAM.sh $camRelease +} + +secret_rollback() { + if [ "$CHANGE_ENCRYPTION" = true ]; then + echo "Rolling back secret encryptionPassword ..." + kubectl -n $NAMESPACE patch secret $CAM_SECRET -p "{\"data\": {\"encryptionPassword\": \"$CURRENT_ENCRYPTION_SECRET_BASE64\"}}" + fi + + if [ "$CHANGE_MONGODB" = true ]; then + echo "Rolling back secret mongoDbUrl ..." + kubectl -n $NAMESPACE patch secret $CAM_SECRET -p "{\"data\": {\"mongoDbUrl\": \"$CURRENT_MONGODB_URL_BASE64\", \"mongoDbPassword\": \"$CURRENT_MONGODB_PASSWORD_BASE64\"}}" + fi + + if [ "$CHANGE_MARIADB" = true ]; then + echo "Rolling back secret mariaDbPassword ..." + kubectl -n $NAMESPACE patch secret $CAM_SECRET -p "{\"data\": {\"mariaDbPassword\": \"$CURRENT_MARIADB_PASSWORD_BASE64\"}}" + fi +} + +# +# Rollback if failure (after changing secrets to new password) +# - Rollback migration secret +# - Rollback other secrets too +# - Stop CAM +# +rollback2() { + migration_secret_rollback + secret_rollback + $DIR/stopCAM.sh $camRelease +} + + +if [ "$CHANGE_ENCRYPTION" = true ]; then + DATESTR=$(date +"%Y-%m-%d-%H-%M-%S") + TIMESTAMPFILENAME="/var/camlog/cipherMigration-$DATESTR" + echo "timestampfilename for cipher migration is $TIMESTAMPFILENAME" + TIMESTAMPFILENAMEBASE64=$(echo -n "$TIMESTAMPFILENAME" | base64) + + NEW_ENCRYPTION_PASSWORD_BASE64=$(echo -n "$NEW_ENCRYPTION_PASSWORD" | base64) + kubectl -n $NAMESPACE patch secret $MIGRATION_SECRET -p "{\"data\": {\"newpassword\": \"$NEW_ENCRYPTION_PASSWORD_BASE64\", \"timestampfile\": \"$TIMESTAMPFILENAMEBASE64\"}}" + if [ $? -ne 0 ]; then + echo "Error, unable to update secret before migration" + exit 1 + fi + + # Need mongo up to run these migrations + if [ "$BUNDLED_MONGODB" = true ]; then + echo "Starting bundled mongo container ..." + kubectl scale -n $NAMESPACE deployment $DEPLOYMENT_MONGODB --replicas=1 + if [ $? -ne 0 ]; then + echo "Error, unable to start bundled mongo container before migration. Exiting." + rollback1 + exit 1 + fi + sleep 30 + fi + + # Need redis up to run these migrations + if [ "$BUNDLED_REDIS" = true ]; then + echo "Starting bundled redis container ..." + kubectl scale -n $NAMESPACE deployment $DEPLOYMENT_REDIS --replicas=1 + if [ $? -ne 0 ]; then + echo "Error, unable to start bundled redis container before migration. Exiting." + rollback1 + exit 1 + fi + sleep 20 + fi + + # start iaas to run cipher migration + echo "Starting iaas container in cipher migration mode ..." + kubectl scale -n $NAMESPACE deployment $DEPLOYMENT_IAAS --replicas=1 + + # start p-t to run cipher migration + echo "Starting provider-terraform in cipher migration mode ..." + kubectl scale -n $NAMESPACE deployment $DEPLOYMENT_PT --replicas=1 + + sleep 20 + + # Get pod ids + iaaspod=$(kubectl -n $NAMESPACE get pod -l release=$camRelease | grep $DEPLOYMENT_IAAS | awk '{print $1}') + ptpod=$(kubectl -n $NAMESPACE get pod -l release=$camRelease | grep $DEPLOYMENT_PT | awk '{print $1}') + + if [ -z "$iaaspod" ] || [ -z "$ptpod" ]; then + echo "Error, Unable to start iaas or provider-terraform in cipher migration mode. Exiting password migration." + rollback1 + echo "Error, Password migration failed. Restoring mongodb from a backup will be required." + exit 1 + fi + + # Loop (with timeout) and use curl to check on ciphermigration status for p-t and iaas + count=0 + iaasstatus="IN_PROGRESS" + ptstatus="IN_PROGRESS" + while [ "$count" -lt "$MONITOR_COUNT" ] && [ "$iaasstatus" = "IN_PROGRESS" -o "$ptstatus" = "IN_PROGRESS" ]; do + count=$((count+1)) + sleep 10 + + if [ "$iaasstatus" = "IN_PROGRESS" ]; then + echo "Monitoring iaas migration ..." + iaascheck=$(kubectl -n $NAMESPACE exec -ti $iaaspod -- curl -G http://localhost:4000/api/v1/ciphermigration) + echo " IaaS - check: $iaascheck" + case "$iaascheck" in + *SUCCESS*) + iaasstatus="SUCCESS" + ;; + *FAILED*) + iaasstatus="FAILED" + ;; + esac + fi + + if [ "$ptstatus" = "IN_PROGRESS" ]; then + echo "Monitoring provider-terraform migration ..." + ptcheck=$(kubectl -n $NAMESPACE exec -ti $ptpod -- curl -G http://localhost:7000/api/ciphermigration) + echo " PT - check: $ptcheck" + case "$ptcheck" in + *SUCCESS*) + ptstatus="SUCCESS" + ;; + *FAILED*) + ptstatus="FAILED" + ;; + esac + fi + + echo "iaas status is currently: $iaasstatus" + echo "pt status is currently: $ptstatus" + done + + if [ "$iaasstatus" != "SUCCESS" ] || [ "$ptstatus" != "SUCCESS" ]; then + echo "Error, migration for iaas or provider-terraform failed or did not complete on time. Exiting password migration." + rollback1 + echo "Error, Password migration failed or did not complete on time. Restoring mongodb from a backup will be required." + exit 1 + fi + + echo "Stopping pods after successful iaas and provider-terraform cipher migration ..." + $DIR/stopCAM.sh $camRelease + if [ "$?" -ne 0 ]; then + echo "Error: unable to stop CAM" + rollback1 + echo "Error during password migration. Restoring mongodb from a backup will be required." + exit 1; + fi + + # Rollback migration secret so subsequent starts will not attempt to migrate + migration_secret_rollback + + # Update secrets to the new password + echo "Updating secret encryptionPassword to new password..." + kubectl -n $NAMESPACE patch secret $CAM_SECRET -p "{\"data\": {\"encryptionPassword\": \"$NEW_ENCRYPTION_PASSWORD_BASE64\"}}" + if [ $? -ne 0 ]; then + echo "Unable to update encryptionPassword new password, exiting" + rollback1 + echo "Error, Password migration failed. Restoring mongodb (and mariadb if bundled) from a backup will be required." + exit 1 + fi + echo "Secret encryptionPassword successfully updated" +fi + + +# +# migrate mongodb passwords - need to start mongodb pod +# +if [ "$CHANGE_MONGODB" = true ]; then + echo "Starting mongodb container before changing passwords ..." + kubectl scale -n $NAMESPACE deployment $DEPLOYMENT_MONGODB --replicas=1 + sleep 10 + + mongodbpod=$(kubectl -n $NAMESPACE get pod -l release=$camRelease | grep $DEPLOYMENT_MONGODB | awk '{print $1}') + + if [ -z "$mongodbpod" ]; then + echo "Error, Unable to start mongodb pod to change password. Exiting password migration." + rollback1 + echo "Error, Password migration failed. Restoring mongodb from a backup will be required." + exit 1 + fi +fi + +# +# migrate mariadb passwords - need to start mariadb pod +# +if [ "$CHANGE_MARIADB" = true ]; then + echo "Starting mariadb container before changing passwords ..." + kubectl scale -n $NAMESPACE deployment $DEPLOYMENT_MARIADB --replicas=1 + sleep 10 + + mariadbpod=$(kubectl -n $NAMESPACE get pod -l release=$camRelease | grep $DEPLOYMENT_MARIADB | awk '{print $1}') + + if [ -z "$mariadbpod" ]; then + echo "Error, Unable to start mariadb pod to change password. Exiting password migration." + rollback1 + echo "Error, Password migration failed. Restoring mongodb from a backup will be required if encryption pwd was changed." + exit 1 + fi +fi + +if [ "$CHANGE_MONGODB" = true ] || [ "$CHANGE_MARIADB" = true ]; then + # wait for the pods we started to come up + pods=$(kubectl -n $NAMESPACE get -l release=$camRelease pods --no-headers | grep Running -v) + while [ "${pods}" ]; do + echo "Waiting for db pod(s) to be in Running state" + kubectl -n $NAMESPACE get -l release=$camRelease pod + sleep 5 + pods=$(kubectl -n $NAMESPACE get -l release=$camRelease pods --no-headers | grep Running -v) + done + echo "db pod(s) for migration Running" +fi + +if [ "$CHANGE_MONGODB" = true ]; then + echo "Changing passwords of mongodb ..." + kubectl -n $NAMESPACE cp dbpassword/mongodb_changepasswords.sh $mongodbpod:/tmp/mongodb_changepasswords.sh + kubectl -n $NAMESPACE exec -ti $mongodbpod /tmp/mongodb_changepasswords.sh $NEW_MONGODB_PASSWORD + if [ $? -ne 0 ]; then + echo "Error, unable to change mongodb passwords, exiting" + rollback1 + echo "Error, Password migration failed. Restoring mongodb from a backup will be required." + exit 1 + fi + + echo "Updating secret mongoDbUrl and mongoDbPassword ..." + NEW_MONGODB_PASSWORD_BASE64=$(echo -n "$NEW_MONGODB_PASSWORD" | base64) + NEW_MONGODB_URL_BASE64=$(echo -n "mongodb://camuser:$NEW_MONGODB_PASSWORD@cam-mongo:27017/cam" | base64) + kubectl -n $NAMESPACE patch secret $CAM_SECRET -p "{\"data\": {\"mongoDbUrl\": \"$NEW_MONGODB_URL_BASE64\", \"mongoDbPassword\": \"$NEW_MONGODB_PASSWORD_BASE64\"}}" + if [ $? -ne 0 ]; then + echo "Unable to update mongoDbUrl or mongoDbPassword to new password, exiting" + rollback2 + echo "Error, Password migration failed. Restoring mongodb from a backup will be required." + exit 1 + fi + echo "Secrets mongoDbUrl and mongoDbPassword successfully updated" +fi + +if [ "$CHANGE_MARIADB" = true ]; then + echo "Changing passwords of mariadb ..." + kubectl -n $NAMESPACE cp dbpassword/mariadb_changepasswords.sh $mariadbpod:/tmp/mariadb_changepasswords.sh + kubectl -n $NAMESPACE exec -ti $mariadbpod /tmp/mariadb_changepasswords.sh $NEW_MARIADB_PASSWORD + if [ $? -ne 0 ]; then + echo "Error, unable to change mariadb passwords, exiting" + rollback2 + echo "Error, Password migration failed. Restoring mariadb (and mongodb if encryption or mongo password was changed) from a backup will be required." + exit 1 + fi + + echo "Updating secret mariaDbPassword ..." + NEW_MARIADB_PASSWORD_BASE64=$(echo -n "$NEW_MARIADB_PASSWORD" | base64) + kubectl -n $NAMESPACE patch secret $CAM_SECRET -p "{\"data\": {\"mariaDbPassword\": \"$NEW_MARIADB_PASSWORD_BASE64\"}}" + if [ $? -ne 0 ]; then + echo "Unable to update mariaDbPassword to new password, exiting" + rollback2 + echo "Error, Password migration failed. Restoring mariadb (and mongodb if encryption or mongo password was changed) from a backup will be required." + exit 1 + fi + echo "Secret mariaDbPassword successfully updated" +fi + +if [ "$CHANGE_MONGODB" = true ] || [ "$CHANGE_MARIADB" = true ]; then + echo "Stopping db pod(s) after successful migration" + $DIR/stopCAM.sh $camRelease +fi + + +if [ "$CAMRUNNING_BEFOREMIGRATION" = true ]; then + echo "Starting CAM after successful password migration" + $DIR/startCAM.sh $camRelease +fi + +echo "Password migration completed successfully." +exit 0 diff --git a/stable/ibm-cam/scripts/startCAM.sh b/stable/ibm-cam/scripts/startCAM.sh index c3b70c0939..b23b192ff8 100755 --- a/stable/ibm-cam/scripts/startCAM.sh +++ b/stable/ibm-cam/scripts/startCAM.sh @@ -1,4 +1,4 @@ -# /bin/sh +#!/bin/bash # #Licensed Materials - Property of IBM #5737-E67 @@ -7,6 +7,28 @@ #disclosure restricted by GSA ADP Schedule Contract with IBM Corp. # +NAMESPACE=services + +# Determine helm release name for CAM; auto-detected by default, but can be overriden by user +if [ $1 ]; then + foundCam=$(helm list $1 --tls | grep ibm-cam ) + if [ -n "$foundCam" ]; then + camRelease=$1 + else + echo "Error: Specified helm release is not found, or is not a CAM release" + exit 1; + fi +else + camRelease=$(helm list --tls | grep ibm-cam | awk '{ print $1 }') +fi + +if [ -n "$camRelease" ]; then + echo "Starting CAM release: $camRelease" +else + echo "Error: Unable to find CAM release" + exit 1; +fi + # Read any saved replica count values generated from the stop command DIR="$( cd "$( dirname "${BASH_SOURCE[0]}" )" && pwd )" if [ -f $DIR/saved_replicas.txt ]; then @@ -14,7 +36,7 @@ if [ -f $DIR/saved_replicas.txt ]; then deployments=$(cat $DIR/saved_replicas.txt) else echo 'Unable to find saved replica counts; will default to a value of 1' - deployments=$(kubectl get deployments -n services -l release=cam -o custom-columns=NAME:.metadata.name) + deployments=$(kubectl get deployments -n $NAMESPACE -l release=$camRelease -o custom-columns=NAME:.metadata.name) fi # Set internal field separator to newline, so we loop over each line in the output @@ -30,18 +52,18 @@ for deployment in $deployments; do count=1 fi echo "Starting $name with replica count of $count" - kubectl scale -n services deployment $name --replicas=$count 1>/dev/null & + kubectl scale -n $NAMESPACE deployment $name --replicas=$count 1>/dev/null & done # Wait for all pods to start echo "Waiting for pods to be in Running state" sleep 15 -pods=$(kubectl -n services get -l release=cam pods --no-headers | grep Running -v) +pods=$(kubectl -n $NAMESPACE get -l release=$camRelease pods --no-headers | grep Running -v) while [ "${pods}" ]; do echo "Waiting for pods to be in Running state" - kubectl -n services get -l release=cam pod + kubectl -n $NAMESPACE get -l release=$camRelease pod sleep 5 - pods=$(kubectl -n services get -l release=cam pods --no-headers | grep Running -v) + pods=$(kubectl -n $NAMESPACE get -l release=$camRelease pods --no-headers | grep Running -v) done echo "All pods Running" diff --git a/stable/ibm-cam/scripts/stopCAM.sh b/stable/ibm-cam/scripts/stopCAM.sh index 7f61cc4914..26a4f1da44 100755 --- a/stable/ibm-cam/scripts/stopCAM.sh +++ b/stable/ibm-cam/scripts/stopCAM.sh @@ -1,4 +1,4 @@ -# /bin/sh +#!/bin/bash # #Licensed Materials - Property of IBM #5737-E67 @@ -7,35 +7,57 @@ #disclosure restricted by GSA ADP Schedule Contract with IBM Corp. # +NAMESPACE=services + +# Determine helm release name for CAM; auto-detected by default, but can be overriden by user +if [ $1 ]; then + foundCam=$(helm list $1 --tls | grep ibm-cam ) + if [ -n "$foundCam" ]; then + camRelease=$1 + else + echo "Error: Specified helm release is not found, or is not a CAM release" + exit 1; + fi +else + camRelease=$(helm list --tls | grep ibm-cam | awk '{ print $1 }') +fi + +if [ -n "$camRelease" ]; then + echo "Stopping CAM release: $camRelease" +else + echo "Error: Unable to find CAM release" + exit 1; +fi + # Save the current replica counts, so that we can start the same number later # Protect against overwritting the counts if stop is run more than once in a row. DIR="$( cd "$( dirname "${BASH_SOURCE[0]}" )" && pwd )" -some_stopped=$(kubectl get -n services deploy -l release=cam -o custom-columns=NAME:.metadata.name,DESIRED:spec.replicas --no-headers | grep 0) +some_stopped=$(kubectl get -n $NAMESPACE deploy -l release=$camRelease -o custom-columns=NAME:.metadata.name,DESIRED:spec.replicas --no-headers | grep 0) if [ -n "$some_stopped" -a -f "saved_replicas.txt" ]; then echo 'At least one pod is already stopped and a saved_replicas.txt file already exists; will not overwrite' else - kubectl get -n services deploy -l release=cam -o custom-columns=NAME:.metadata.name,DESIRED:spec.replicas --no-headers > $DIR/saved_replicas.txt + kubectl get -n $NAMESPACE deploy -l release=$camRelease -o custom-columns=NAME:.metadata.name,DESIRED:spec.replicas --no-headers > $DIR/saved_replicas.txt fi # Set the field separator to newline so the loop will process a full line at a time IFS=$'\n' -for deployment in $(kubectl get deployments -n services -l release=cam -o custom-columns=NAME:.metadata.name,DESIRED:spec.replicas --no-headers); do +for deployment in $(kubectl get deployments -n $NAMESPACE -l release=$camRelease -o custom-columns=NAME:.metadata.name,DESIRED:spec.replicas --no-headers); do name=$(echo $deployment | awk '{print $1}') count=$(echo $deployment | awk '{print $2}') if [ $count == 0 ]; then echo "$name already stopped" else echo "Stopping $name" - kubectl scale -n services deployment $name --replicas=0 1>/dev/null & + kubectl scale -n $NAMESPACE deployment $name --replicas=0 1>/dev/null & fi done # Wait for all CAM pods to terminate -pods=$(kubectl get -n services -l release=cam pod -o name) +pods=$(kubectl get -n $NAMESPACE -l release=$camRelease pod -o name) while [ "${pods}" ]; do echo 'Waiting for pods to terminate' - kubectl get -n services -l release=cam pod + kubectl get -n $NAMESPACE -l release=$camRelease pod sleep 2 - pods=$(kubectl get -n services -l release=cam pod -o name) + pods=$(kubectl get -n $NAMESPACE -l release=$camRelease pod -o name) done echo "All pods terminated" diff --git a/stable/ibm-cam/templates/NOTES.txt b/stable/ibm-cam/templates/NOTES.txt index 07a651205f..8d24719fb3 100644 --- a/stable/ibm-cam/templates/NOTES.txt +++ b/stable/ibm-cam/templates/NOTES.txt @@ -6,5 +6,5 @@ Once all the pods are running, you can run the helm tests: helm test {{ .Release.Name }} --tls To access the UI: - export SERVICE_IP=$(kubectl get ingress -n services cam-ingress -o jsonpath='{.status.loadBalancer.ingress[0].ip}') - echo https://$SERVICE_IP:30000/cam + export SERVICE_PORT=$(kubectl get service -n services cam-proxy -o jsonpath='{.spec.ports[0].nodePort}') + echo https://\:$SERVICE_PORT/cam diff --git a/stable/ibm-cam/templates/cam_secret.yaml b/stable/ibm-cam/templates/cam-api-secret.yaml similarity index 100% rename from stable/ibm-cam/templates/cam_secret.yaml rename to stable/ibm-cam/templates/cam-api-secret.yaml diff --git a/stable/ibm-cam/templates/cam-bpd-cds-deployment.yaml b/stable/ibm-cam/templates/cam-bpd-cds-deployment.yaml index a57aaec538..3f9ae4a337 100644 --- a/stable/ibm-cam/templates/cam-bpd-cds-deployment.yaml +++ b/stable/ibm-cam/templates/cam-bpd-cds-deployment.yaml @@ -116,3 +116,15 @@ spec: {{- end }} {{- end }} {{- end }} + initContainers: + - name: cam-bpd-cds-init + image: "{{ .Values.image.repository }}icam-busybox:{{ .Values.image.tag }}{{ template "platform" . }}" + imagePullPolicy: {{ .Values.image.pullPolicy }} + securityContext: + runAsUser: 0 + command: ["/bin/sh", "-c"] + args: + - mkdir -p /var/camlog/cam-bpd-cds && chown -R 1000:1000 /var/camlog/cam-bpd-cds; + volumeMounts: + - name: {{ .Values.camLogsPV.name }} + mountPath: /var/camlog diff --git a/stable/ibm-cam/templates/cam-bpd-mariadb-deployment.yaml b/stable/ibm-cam/templates/cam-bpd-mariadb-deployment.yaml index dfc68316bc..8a72c5da10 100644 --- a/stable/ibm-cam/templates/cam-bpd-mariadb-deployment.yaml +++ b/stable/ibm-cam/templates/cam-bpd-mariadb-deployment.yaml @@ -55,24 +55,38 @@ spec: - name: cam-bpd-mariadb image: "{{ .Values.image.repository }}icam-bpd-mariadb:{{ .Values.image.tag }}{{ template "platform" . }}" imagePullPolicy: {{ .Values.image.pullPolicy | quote }} + securityContext: + runAsUser: 0 resources: {{ toYaml .Values.camBPDDatabase.resources | indent 10 }} env: - name: MYSQL_ROOT_PASSWORD valueFrom: secretKeyRef: - name: cam-bpd-mariadb-secret - key: password + {{- if .Values.secureValues.secretName }} + name: {{ .Values.secureValues.secretName }} + {{- else }} + name: cam-secure-values-secret + {{- end }} + key: mariaDbPassword - name: MYSQL_PASSWORD valueFrom: secretKeyRef: - name: cam-bpd-mariadb-secret - key: password + {{- if .Values.secureValues.secretName }} + name: {{ .Values.secureValues.secretName }} + {{- else }} + name: cam-secure-values-secret + {{- end }} + key: mariaDbPassword - name: MYSQL_USER valueFrom: secretKeyRef: - name: cam-bpd-mariadb-secret - key: username + {{- if .Values.secureValues.secretName }} + name: {{ .Values.secureValues.secretName }} + {{- else }} + name: cam-secure-values-secret + {{- end }} + key: mariaDbUsername - name: MYSQL_DATABASE value: ibm_ucdp ports: diff --git a/stable/ibm-cam/templates/cam-bpd-mariadb-secret.yaml b/stable/ibm-cam/templates/cam-bpd-mariadb-secret.yaml deleted file mode 100644 index 1f7aa732b8..0000000000 --- a/stable/ibm-cam/templates/cam-bpd-mariadb-secret.yaml +++ /dev/null @@ -1,29 +0,0 @@ -############################################################################### -# Licensed Materials - Property of IBM. -# Copyright IBM Corporation 2017. All Rights Reserved. -# U.S. Government Users Restricted Rights - Use, duplication or disclosure -# restricted by GSA ADP Schedule Contract with IBM Corp. -# -# Contributors: -# IBM Corporation - initial API and implementation -############################################################################### -{{- if and .Values.camBPDUI.bundled .Values.camBPDDatabase.bundled }} -apiVersion: v1 -kind: Secret -metadata: - name: cam-bpd-mariadb-secret - labels: - app: {{ template "fullname" . }} - chart: "{{ .Chart.Name }}-{{ .Chart.Version }}" - release: "{{ .Release.Name }}" - heritage: "{{ .Release.Service }}" - namespace: {{ .Values.service.namespace }} -type: Opaque -data: - username: {{ b64enc "ucdpadmin" }} - {{- if and .Values.database.password (ne .Values.camBPDDatabase.options "legacyauth") }} - password: {{ .Values.database.password | b64enc | quote }} - {{- else }} - password: {{ b64enc "bcb19ee3dee0" }} - {{- end }} -{{- end }} diff --git a/stable/ibm-cam/templates/cam-bpd-mds-deployment.yaml b/stable/ibm-cam/templates/cam-bpd-mds-deployment.yaml index 1941f835db..9376f3c46e 100644 --- a/stable/ibm-cam/templates/cam-bpd-mds-deployment.yaml +++ b/stable/ibm-cam/templates/cam-bpd-mds-deployment.yaml @@ -64,11 +64,24 @@ spec: - configMapRef: name: common-config env: + - name: MONGODB_PASSWORD + valueFrom: + secretKeyRef: + {{- if .Values.secureValues.secretName }} + name: {{ .Values.secureValues.secretName }} + {{- else }} + name: cam-secure-values-secret + {{- end }} + key: mongoDbPassword - name: DB_URL valueFrom: secretKeyRef: - name: cam-database-secret - key: dburl + {{- if .Values.secureValues.secretName }} + name: {{ .Values.secureValues.secretName }} + {{- else }} + name: cam-secure-values-secret + {{- end }} + key: mongoDbUrl - name: LICENSE value: "accept" - name: CAM_ENABLED @@ -77,6 +90,62 @@ spec: valueFrom: fieldRef: fieldPath: metadata.name +{{- if .Values.proxy.useProxy }} + - name: HTTPS_PROXY + valueFrom: + secretKeyRef: + {{- if .Values.secureValues.secretName }} + name: {{ .Values.secureValues.secretName }} + {{- else }} + name: cam-secure-values-secret + {{- end }} + key: httpsProxy + - name: https_proxy + valueFrom: + secretKeyRef: + {{- if .Values.secureValues.secretName }} + name: {{ .Values.secureValues.secretName }} + {{- else }} + name: cam-secure-values-secret + {{- end }} + key: httpsProxy + - name: HTTP_PROXY + valueFrom: + secretKeyRef: + {{- if .Values.secureValues.secretName }} + name: {{ .Values.secureValues.secretName }} + {{- else }} + name: cam-secure-values-secret + {{- end }} + key: httpProxy + - name: http_proxy + valueFrom: + secretKeyRef: + {{- if .Values.secureValues.secretName }} + name: {{ .Values.secureValues.secretName }} + {{- else }} + name: cam-secure-values-secret + {{- end }} + key: httpProxy + - name: NO_PROXY + valueFrom: + secretKeyRef: + {{- if .Values.secureValues.secretName }} + name: {{ .Values.secureValues.secretName }} + {{- else }} + name: cam-secure-values-secret + {{- end }} + key: noProxy + - name: no_proxy + valueFrom: + secretKeyRef: + {{- if .Values.secureValues.secretName }} + name: {{ .Values.secureValues.secretName }} + {{- else }} + name: cam-secure-values-secret + {{- end }} + key: noProxy +{{- end }} livenessProbe: httpGet: path: / @@ -113,4 +182,16 @@ spec: - name: {{ .Values.global.image.secretName }} {{- end }} {{- end }} -{{- end }} \ No newline at end of file +{{- end }} + initContainers: + - name: cam-bpd-mds-init + image: "{{ .Values.image.repository }}icam-busybox:{{ .Values.image.tag }}{{ template "platform" . }}" + imagePullPolicy: {{ .Values.image.pullPolicy }} + securityContext: + runAsUser: 0 + command: ["/bin/sh", "-c"] + args: + - mkdir -p /var/camlog/cam-bpd-mds && chown -R 1000:1000 /var/camlog/cam-bpd-mds; + volumeMounts: + - name: {{ .Values.camLogsPV.name }} + mountPath: /var/camlog diff --git a/stable/ibm-cam/templates/cam-bpd-ui-deployment.yaml b/stable/ibm-cam/templates/cam-bpd-ui-deployment.yaml index df940fdae9..5798c235e5 100644 --- a/stable/ibm-cam/templates/cam-bpd-ui-deployment.yaml +++ b/stable/ibm-cam/templates/cam-bpd-ui-deployment.yaml @@ -99,13 +99,21 @@ spec: - name: DB_USER valueFrom: secretKeyRef: - name: cam-bpd-mariadb-secret - key: username + {{- if .Values.secureValues.secretName }} + name: {{ .Values.secureValues.secretName }} + {{- else }} + name: cam-secure-values-secret + {{- end }} + key: mariaDbUsername - name: DB_PASSWORD valueFrom: secretKeyRef: - name: cam-bpd-mariadb-secret - key: password + {{- if .Values.secureValues.secretName }} + name: {{ .Values.secureValues.secretName }} + {{- else }} + name: cam-secure-values-secret + {{- end }} + key: mariaDbPassword - name: DB_TCP_PORT value: "3306" - name: DB_TCP_URL @@ -120,8 +128,6 @@ spec: configMapKeyRef: name: oauth-client-map key: PROXY_IP - - name: UCDP_PORT - value: "30000" - name: DISCOVERY_SERVER_URL value: http://cam-bpd-cds:7575 - name: MODULE_SERVICE_URL @@ -157,9 +163,65 @@ spec: name: oauth-client-map key: PROXY_IP - name: wlpCallbackUrl - value: https://$(ICP_PROXY_IP):30000/auth/liberty/callback + value: /cam/auth/liberty/callback - name: bpdCallbackUrl - value: https://$(ICP_PROXY_IP):30000/landscaper/oauth/callback + value: /landscaper/oauth/callback +{{- if .Values.proxy.useProxy }} + - name: HTTPS_PROXY + valueFrom: + secretKeyRef: + {{- if .Values.secureValues.secretName }} + name: {{ .Values.secureValues.secretName }} + {{- else }} + name: cam-secure-values-secret + {{- end }} + key: httpsProxy + - name: https_proxy + valueFrom: + secretKeyRef: + {{- if .Values.secureValues.secretName }} + name: {{ .Values.secureValues.secretName }} + {{- else }} + name: cam-secure-values-secret + {{- end }} + key: httpsProxy + - name: HTTP_PROXY + valueFrom: + secretKeyRef: + {{- if .Values.secureValues.secretName }} + name: {{ .Values.secureValues.secretName }} + {{- else }} + name: cam-secure-values-secret + {{- end }} + key: httpProxy + - name: http_proxy + valueFrom: + secretKeyRef: + {{- if .Values.secureValues.secretName }} + name: {{ .Values.secureValues.secretName }} + {{- else }} + name: cam-secure-values-secret + {{- end }} + key: httpProxy + - name: NO_PROXY + valueFrom: + secretKeyRef: + {{- if .Values.secureValues.secretName }} + name: {{ .Values.secureValues.secretName }} + {{- else }} + name: cam-secure-values-secret + {{- end }} + key: noProxy + - name: no_proxy + valueFrom: + secretKeyRef: + {{- if .Values.secureValues.secretName }} + name: {{ .Values.secureValues.secretName }} + {{- else }} + name: cam-secure-values-secret + {{- end }} + key: noProxy +{{- end }} volumeMounts: {{- if not .Values.camBPDDatabase.bundled }} - name: ext-lib @@ -211,3 +273,15 @@ spec: emptyDir: {} {{- end }} {{- end }} + initContainers: + - name: cam-bpd-ui-init + image: "{{ .Values.image.repository }}icam-busybox:{{ .Values.image.tag }}{{ template "platform" . }}" + imagePullPolicy: {{ .Values.image.pullPolicy }} + securityContext: + runAsUser: 0 + command: ["/bin/sh", "-c"] + args: + - mkdir -p /var/camlog/cam-bpd-ui && chown -R 1000:1000 /var/camlog/cam-bpd-ui; + volumeMounts: + - name: {{ .Values.camLogsPV.name }} + mountPath: /var/camlog diff --git a/stable/ibm-cam/templates/cam-broker-deployment.yaml b/stable/ibm-cam/templates/cam-broker-deployment.yaml index 92c520a1c0..757761e49c 100644 --- a/stable/ibm-cam/templates/cam-broker-deployment.yaml +++ b/stable/ibm-cam/templates/cam-broker-deployment.yaml @@ -102,11 +102,24 @@ spec: - configMapRef: name: redis-config env: + - name: MONGODB_PASSWORD + valueFrom: + secretKeyRef: + {{- if .Values.secureValues.secretName }} + name: {{ .Values.secureValues.secretName }} + {{- else }} + name: cam-secure-values-secret + {{- end }} + key: mongoDbPassword - name: DB_URL valueFrom: secretKeyRef: - name: cam-database-secret - key: dburl + {{- if .Values.secureValues.secretName }} + name: {{ .Values.secureValues.secretName }} + {{- else }} + name: cam-secure-values-secret + {{- end }} + key: mongoDbUrl - name: CAM_TOKEN valueFrom: secretKeyRef: @@ -122,8 +135,6 @@ spec: configMapKeyRef: name: oauth-client-map key: PROXY_IP - - name: SERVICE_DASHBOARD - value: https://$(ICP_PROXY_IP):30000/cam - name: ICP_ENDPOINT value: https://$(ICP_MASTER_IP):8443 - name: ORPHEUS_IDENTITY_API_URL @@ -134,3 +145,15 @@ spec: valueFrom: fieldRef: fieldPath: metadata.name + initContainers: + - name: cam-broker-init + image: "{{ .Values.image.repository }}icam-busybox:{{ .Values.image.tag }}{{ template "platform" . }}" + imagePullPolicy: {{ .Values.image.pullPolicy }} + securityContext: + runAsUser: 0 + command: ["/bin/sh", "-c"] + args: + - mkdir -p /var/camlog/cam-broker && chown -R 1000:1000 /var/camlog/cam-broker; + volumeMounts: + - name: {{ .Values.camLogsPV.name }} + mountPath: /var/camlog diff --git a/stable/ibm-cam/templates/cam-broker.yaml b/stable/ibm-cam/templates/cam-broker.yaml index 6dfdfdbf73..4d5e5a61e8 100644 --- a/stable/ibm-cam/templates/cam-broker.yaml +++ b/stable/ibm-cam/templates/cam-broker.yaml @@ -9,6 +9,8 @@ metadata: heritage: "{{ .Release.Service }}" spec: url: http://cam-broker.{{ .Values.service.namespace }}.svc.cluster.local:4000/api + relistBehavior: Duration + relistDuration: 3m0s authInfo: bearer: secretRef: diff --git a/stable/ibm-cam/templates/cam_encrypt_secret.yaml b/stable/ibm-cam/templates/cam-cipher-migration-secret.yaml similarity index 76% rename from stable/ibm-cam/templates/cam_encrypt_secret.yaml rename to stable/ibm-cam/templates/cam-cipher-migration-secret.yaml index fd82a8e6c3..4af033b02d 100644 --- a/stable/ibm-cam/templates/cam_encrypt_secret.yaml +++ b/stable/ibm-cam/templates/cam-cipher-migration-secret.yaml @@ -10,7 +10,7 @@ apiVersion: v1 kind: Secret metadata: - name: cam-encryption-secret + name: cam-cipher-migration-secret namespace: {{ .Values.service.namespace }} labels: app: {{ template "fullname" . }} @@ -18,9 +18,5 @@ release: "{{ .Release.Name }}" heritage: "{{ .Release.Service }}" data: - {{- if .Values.database.password }} - password: {{ .Values.database.password | b64enc | quote }} - {{- else }} - password: {{ "fFCXb5Z9R6X7Lhk" | b64enc | quote }} - {{- end }} - + newpassword: "" + timestampfile: "" diff --git a/stable/ibm-cam/templates/cam-configmap-audit.yaml b/stable/ibm-cam/templates/cam-configmap-audit.yaml new file mode 100644 index 0000000000..fbe305d6ee --- /dev/null +++ b/stable/ibm-cam/templates/cam-configmap-audit.yaml @@ -0,0 +1,30 @@ +############################################################################### +# Licensed Materials - Property of IBM. +# Copyright IBM Corporation 2017. All Rights Reserved. +# U.S. Government Users Restricted Rights - Use, duplication or disclosure +# restricted by GSA ADP Schedule Contract with IBM Corp. +# +# Contributors: +# IBM Corporation - initial API and implementation +############################################################################### + +apiVersion: v1 +kind: ConfigMap +metadata: + name: audit-config + namespace: {{ .Values.service.namespace }} + labels: + app: {{ template "fullname" . }} + chart: "{{ .Chart.Name }}-{{ .Chart.Version }}" + release: "{{ .Release.Name }}" + heritage: "{{ .Release.Service }}" +data: + JOURNAL_PATH: {{ .Values.auditService.config.journalPath }} + logrotate-conf: "\n # rotate log files weekly\ndaily\n\n# use the syslog group by + default, since this is the owning group # of /var/log/syslog.\n#su root syslog\n\n# + keep 4 weeks worth of backlogs\nrotate 4\n\n# create new (empty) log files after + rotating old ones \ncreate\n\n# uncomment this if you want your log files compressed\n + #compress\n\n# packages drop log rotation information into this directory\n include + /etc/logrotate.d\n# no packages own wtmp, or btmp -- we'll rotate them here\n" + logrotate: "/var/log/audit/*.log {\n su root root\n + copytruncate\n rotate 24\n hourly\n missingok\n notifempty\n}" diff --git a/stable/ibm-cam/templates/cam-database-secret.yaml b/stable/ibm-cam/templates/cam-database-secret.yaml deleted file mode 100644 index 4f9b723cb0..0000000000 --- a/stable/ibm-cam/templates/cam-database-secret.yaml +++ /dev/null @@ -1,29 +0,0 @@ -############################################################################### -# Licensed Materials - Property of IBM. -# Copyright IBM Corporation 2018. All Rights Reserved. -# U.S. Government Users Restricted Rights - Use, duplication or disclosure -# restricted by GSA ADP Schedule Contract with IBM Corp. -# -# Contributors: -# IBM Corporation - initial API and implementation -############################################################################### - apiVersion: v1 - kind: Secret - metadata: - name: cam-database-secret - namespace: {{ .Values.service.namespace }} - labels: - app: {{ template "fullname" . }} - chart: "{{ .Chart.Name }}-{{ .Chart.Version }}" - release: "{{ .Release.Name }}" - heritage: "{{ .Release.Service }}" - data: - {{- if .Values.database.bundled }} - {{- if .Values.database.password }} - dburl: {{ (printf "mongodb://camuser:%s@cam-mongo:27017/cam" .Values.database.password) | b64enc | quote }} - {{- else }} - dburl: {{ "mongodb://camuser:fFCXb5Z9R6X7Lhk@cam-mongo:27017/cam" | b64enc | quote }} - {{- end }} - {{- else }} - dburl: {{ .Values.database.url | b64enc | quote }} - {{- end }} diff --git a/stable/ibm-cam/templates/cam-iaas-deployment.yaml b/stable/ibm-cam/templates/cam-iaas-deployment.yaml index cbaaabdc22..5ea507ba8a 100644 --- a/stable/ibm-cam/templates/cam-iaas-deployment.yaml +++ b/stable/ibm-cam/templates/cam-iaas-deployment.yaml @@ -54,6 +54,27 @@ spec: - {{ .Values.arch }} hostname: cam-iaas volumes: +{{- if .Values.global.audit }} + - name: shared + emptyDir: {} + - name: journal + hostPath: + path: {{ .Values.auditService.config.journalPath }} + - name: logrotate + configMap: + name: audit-config + defaultMode: 420 + items: + - key: logrotate + path: audit + - name: logrotate-conf + configMap: + name: audit-config + defaultMode: 420 + items: + - key: logrotate-conf + path: logrotate.conf +{{- end }} - name: {{ .Values.camLogsPV.name }} {{- if .Values.camLogsPV.persistence.enabled }} persistentVolumeClaim: @@ -96,22 +117,53 @@ spec: - name: {{ .Values.camLogsPV.name }} mountPath: /var/camlog subPath: cam-iaas +{{- if .Values.global.audit }} + - name: shared + mountPath: /var/audit +{{- end }} envFrom: - configMapRef: name: common-config - configMapRef: name: redis-config env: + - name: MONGODB_PASSWORD + valueFrom: + secretKeyRef: + {{- if .Values.secureValues.secretName }} + name: {{ .Values.secureValues.secretName }} + {{- else }} + name: cam-secure-values-secret + {{- end }} + key: mongoDbPassword - name: DB_URL valueFrom: secretKeyRef: - name: cam-database-secret - key: dburl + {{- if .Values.secureValues.secretName }} + name: {{ .Values.secureValues.secretName }} + {{- else }} + name: cam-secure-values-secret + {{- end }} + key: mongoDbUrl - name: CIPHER_PWD valueFrom: secretKeyRef: - name: cam-encryption-secret - key: password + {{- if .Values.secureValues.secretName }} + name: {{ .Values.secureValues.secretName }} + {{- else }} + name: cam-secure-values-secret + {{- end }} + key: encryptionPassword + - name: CIPHER_PWD_NEW + valueFrom: + secretKeyRef: + name: cam-cipher-migration-secret + key: newpassword + - name: CIPHER_MIGRATION_TIMESTAMP_FILE + valueFrom: + secretKeyRef: + name: cam-cipher-migration-secret + key: timestampfile - name: CAM_TOKEN valueFrom: secretKeyRef: @@ -136,6 +188,10 @@ spec: valueFrom: fieldRef: fieldPath: metadata.name + - name: POD_NAMESPACE + valueFrom: + fieldRef: + fieldPath: metadata.namespace - name: WLP_CLIENT_ID valueFrom: secretKeyRef: @@ -168,13 +224,121 @@ spec: secretKeyRef: name: oauth-client-secret key: DEFAULT_ADMIN_USER + - name: AUDIT_ENABLED + value: "{{ .Values.global.audit }}" + - name: AUDIT_LOG_PATH + value: /var/audit/cam-iaas-audit.log + - name: SERVICE_NAME + value: cam-iaas {{- if .Values.proxy.useProxy }} - name: HTTPS_PROXY - value: {{ .Values.proxy.httpsProxy }} + valueFrom: + secretKeyRef: + {{- if .Values.secureValues.secretName }} + name: {{ .Values.secureValues.secretName }} + {{- else }} + name: cam-secure-values-secret + {{- end }} + key: httpsProxy + - name: https_proxy + valueFrom: + secretKeyRef: + {{- if .Values.secureValues.secretName }} + name: {{ .Values.secureValues.secretName }} + {{- else }} + name: cam-secure-values-secret + {{- end }} + key: httpsProxy - name: HTTP_PROXY - value: {{ .Values.proxy.httpProxy }} + valueFrom: + secretKeyRef: + {{- if .Values.secureValues.secretName }} + name: {{ .Values.secureValues.secretName }} + {{- else }} + name: cam-secure-values-secret + {{- end }} + key: httpProxy + - name: http_proxy + valueFrom: + secretKeyRef: + {{- if .Values.secureValues.secretName }} + name: {{ .Values.secureValues.secretName }} + {{- else }} + name: cam-secure-values-secret + {{- end }} + key: httpProxy - name: NO_PROXY - value: "{{ .Values.proxy.noProxy }}" + valueFrom: + secretKeyRef: + {{- if .Values.secureValues.secretName }} + name: {{ .Values.secureValues.secretName }} + {{- else }} + name: cam-secure-values-secret + {{- end }} + key: noProxy + - name: no_proxy + valueFrom: + secretKeyRef: + {{- if .Values.secureValues.secretName }} + name: {{ .Values.secureValues.secretName }} + {{- else }} + name: cam-secure-values-secret + {{- end }} + key: noProxy {{- end }} - name: CAM_OFFLINE value: "{{ .Values.global.offline }}" +{{- if .Values.global.audit }} + - name: cam-iaas-audit + image: "{{ .Values.auditService.image.repository }}icp-audit-service:{{ .Values.auditService.image.tag }}" + imagePullPolicy: {{ .Values.auditService.image.pullPolicy }} + resources: +{{ toYaml .Values.auditService.resources | indent 10 }} + env: + - name: POD_NAME + valueFrom: + fieldRef: + fieldPath: metadata.name + volumeMounts: + - name: {{ .Values.camLogsPV.name }} + mountPath: /var/camlog + subPath: cam-iaas + - name: shared + mountPath: "/var/log/audit" + - name: journal + mountPath: {{ .Values.auditService.config.journalPath }} + - name: logrotate + mountPath: "/etc/logrotate.d/audit" + subPath: audit + - name: logrotate-conf + mountPath: "/etc/logrotate.conf" + subPath: logrotate.conf + livenessProbe: + exec: + command: + - sh + - -c + - "service cron status" + initialDelaySeconds: 30 + timeoutSeconds: 5 + readinessProbe: + exec: + command: + - sh + - -c + - "service cron status" + initialDelaySeconds: 5 + timeoutSeconds: 1 +{{- end }} + initContainers: + - name: cam-iaas-init + image: "{{ .Values.image.repository }}icam-busybox:{{ .Values.image.tag }}{{ template "platform" . }}" + imagePullPolicy: {{ .Values.image.pullPolicy }} + securityContext: + runAsUser: 0 + command: ["/bin/sh", "-c"] + args: + - mkdir -p /var/camlog/cam-iaas && chown -R 1000:1000 /var/camlog/cam-iaas; + volumeMounts: + - name: {{ .Values.camLogsPV.name }} + mountPath: /var/camlog diff --git a/stable/ibm-cam/templates/cam-ingress.yaml b/stable/ibm-cam/templates/cam-ingress.yaml deleted file mode 100644 index 3cf8a22f4b..0000000000 --- a/stable/ibm-cam/templates/cam-ingress.yaml +++ /dev/null @@ -1,22 +0,0 @@ -apiVersion: extensions/v1beta1 -kind: Ingress -metadata: - annotations: - ingress.kubernetes.io/rewrite-target: / - kubernetes.io/ingress.class: nginx - generation: 1 - labels: - app: {{ template "fullname" . }} - chart: "{{ .Chart.Name }}-{{ .Chart.Version }}" - release: "{{ .Release.Name }}" - heritage: "{{ .Release.Service }}" - name: cam-ingress - namespace: {{ .Values.service.namespace }} -spec: - rules: - - http: - paths: - - backend: - serviceName: cam-proxy - servicePort: 30000 - path: /cam diff --git a/stable/ibm-cam/templates/cam-log-rotation-cronjob.yaml b/stable/ibm-cam/templates/cam-log-rotation-cronjob.yaml new file mode 100644 index 0000000000..f71757c8b4 --- /dev/null +++ b/stable/ibm-cam/templates/cam-log-rotation-cronjob.yaml @@ -0,0 +1,73 @@ +############################################################################### +# Licensed Materials - Property of IBM. +# Copyright IBM Corporation 2017. All Rights Reserved. +# U.S. Government Users Restricted Rights - Use, duplication or disclosure +# restricted by GSA ADP Schedule Contract with IBM Corp. +# +# Contributors: +# IBM Corporation - initial API and implementation +############################################################################### +apiVersion: batch/v1beta1 +kind: CronJob +metadata: + name: cam-log-rotation + labels: + name: cam-log-rotation + app: {{ template "fullname" . }} + chart: "{{ .Chart.Name }}-{{ .Chart.Version }}" + release: "{{ .Release.Name }}" + heritage: "{{ .Release.Service }}" + namespace: {{ .Values.service.namespace }} +spec: + schedule: "*/5 * * * *" + concurrencyPolicy: Forbid + successfulJobsHistoryLimit: 0 + failedJobsHistoryLimit: 0 + jobTemplate: + spec: + template: + metadata: + labels: + name: cam-log-rotation + app: {{ template "fullname" . }} + chart: "{{ .Chart.Name }}-{{ .Chart.Version }}" + release: "{{ .Release.Name }}" + heritage: "{{ .Release.Service }}" + annotations: + productName: "Cloud Automation Manager" + productID: "{{ .Values.global.id.productID }}" + productVersion: "{{ .Chart.AppVersion }}" + spec: + containers: + - name: cam-log-rotation + image: "{{ .Values.image.repository }}icam-toolbox:{{ .Values.image.tag }}{{ template "platform" . }}" + imagePullPolicy: {{ .Values.image.pullPolicy }} + securityContext: + runAsUser: 0 + args: + - /bin/bash + - -c + - logrotate -v /home/cam/logrotate.conf + volumeMounts: + - name: {{ .Values.camLogsPV.name }} + mountPath: /var/camlog + restartPolicy: OnFailure + {{- if .Values.global.image.secretName }} + {{- if ne .Values.global.image.secretName "default"}} + imagePullSecrets: + - name: {{ .Values.global.image.secretName }} + {{- end }} + {{- end }} + volumes: + - name: {{ .Values.camLogsPV.name }} + {{- if .Values.camLogsPV.persistence.enabled }} + persistentVolumeClaim: + {{- if .Values.camLogsPV.persistence.existingClaimName }} + claimName: {{ .Values.camLogsPV.persistence.existingClaimName }} + {{- else }} + claimName: {{ .Values.camLogsPV.name }} + {{- end }} + {{- else }} + emptyDir: {} + {{- end }} + diff --git a/stable/ibm-cam/templates/cam-mongo-deployment.yaml b/stable/ibm-cam/templates/cam-mongo-deployment.yaml index f13d4e860a..8484ca9994 100644 --- a/stable/ibm-cam/templates/cam-mongo-deployment.yaml +++ b/stable/ibm-cam/templates/cam-mongo-deployment.yaml @@ -75,21 +75,31 @@ spec: - name: cam-mongo image: "{{ .Values.image.repository }}icam-mongo:{{ .Values.image.tag }}{{ template "platform" . }}" imagePullPolicy: {{ .Values.image.pullPolicy }} + securityContext: + runAsUser: 0 env: - name: MONGO_INITDB_ROOT_USERNAME value: 'root' - name: MONGO_INITDB_ROOT_PASSWORD valueFrom: secretKeyRef: - name: cam-encryption-secret - key: password + {{- if .Values.secureValues.secretName }} + name: {{ .Values.secureValues.secretName }} + {{- else }} + name: cam-secure-values-secret + {{- end }} + key: mongoDbPassword - name: MONGODB_USERNAME value: 'camuser' - name: MONGODB_PASSWORD valueFrom: secretKeyRef: - name: cam-encryption-secret - key: password + {{- if .Values.secureValues.secretName }} + name: {{ .Values.secureValues.secretName }} + {{- else }} + name: cam-secure-values-secret + {{- end }} + key: mongoDbPassword - name: MONGODB_DATABASE value: 'cam' ports: diff --git a/stable/ibm-cam/templates/cam-orchestration-deployment.yaml b/stable/ibm-cam/templates/cam-orchestration-deployment.yaml index 2528cf13a4..343cc7d635 100644 --- a/stable/ibm-cam/templates/cam-orchestration-deployment.yaml +++ b/stable/ibm-cam/templates/cam-orchestration-deployment.yaml @@ -102,11 +102,24 @@ spec: - configMapRef: name: redis-config env: + - name: MONGODB_PASSWORD + valueFrom: + secretKeyRef: + {{- if .Values.secureValues.secretName }} + name: {{ .Values.secureValues.secretName }} + {{- else }} + name: cam-secure-values-secret + {{- end }} + key: mongoDbPassword - name: DB_URL valueFrom: secretKeyRef: - name: cam-database-secret - key: dburl + {{- if .Values.secureValues.secretName }} + name: {{ .Values.secureValues.secretName }} + {{- else }} + name: cam-secure-values-secret + {{- end }} + key: mongoDbUrl - name: CAM_TOKEN valueFrom: secretKeyRef: @@ -127,3 +140,15 @@ spec: valueFrom: fieldRef: fieldPath: metadata.name + initContainers: + - name: cam-orchestration-init + image: "{{ .Values.image.repository }}icam-busybox:{{ .Values.image.tag }}{{ template "platform" . }}" + imagePullPolicy: {{ .Values.image.pullPolicy }} + securityContext: + runAsUser: 0 + command: ["/bin/sh", "-c"] + args: + - mkdir -p /var/camlog/cam-orchestration && chown -R 1000:1000 /var/camlog/cam-orchestration; + volumeMounts: + - name: {{ .Values.camLogsPV.name }} + mountPath: /var/camlog diff --git a/stable/ibm-cam/templates/cam-portal-ui-deployment.yaml b/stable/ibm-cam/templates/cam-portal-ui-deployment.yaml index da8159b345..056a8543a8 100644 --- a/stable/ibm-cam/templates/cam-portal-ui-deployment.yaml +++ b/stable/ibm-cam/templates/cam-portal-ui-deployment.yaml @@ -102,11 +102,24 @@ spec: - configMapRef: name: redis-config env: + - name: MONGODB_PASSWORD + valueFrom: + secretKeyRef: + {{- if .Values.secureValues.secretName }} + name: {{ .Values.secureValues.secretName }} + {{- else }} + name: cam-secure-values-secret + {{- end }} + key: mongoDbPassword - name: DB_URL valueFrom: secretKeyRef: - name: cam-database-secret - key: dburl + {{- if .Values.secureValues.secretName }} + name: {{ .Values.secureValues.secretName }} + {{- else }} + name: cam-secure-values-secret + {{- end }} + key: mongoDbUrl - name: APP_CONTEXT value: /portal - name: sessionKey @@ -147,9 +160,19 @@ spec: configMapKeyRef: name: oauth-client-map key: PROXY_IP - - name: wlpCallbackUrl - value: https://$(ICP_PROXY_IP):30000/auth/liberty/callback - name: POD_NAME valueFrom: fieldRef: fieldPath: metadata.name + initContainers: + - name: cam-portal-ui-init + image: "{{ .Values.image.repository }}icam-busybox:{{ .Values.image.tag }}{{ template "platform" . }}" + imagePullPolicy: {{ .Values.image.pullPolicy }} + securityContext: + runAsUser: 0 + command: ["/bin/sh", "-c"] + args: + - mkdir -p /var/camlog/cam-portal-ui && chown -R 1000:1000 /var/camlog/cam-portal-ui; + volumeMounts: + - name: {{ .Values.camLogsPV.name }} + mountPath: /var/camlog \ No newline at end of file diff --git a/stable/ibm-cam/templates/cam-provider-helm-deployment.yaml b/stable/ibm-cam/templates/cam-provider-helm-deployment.yaml index af39ea6da3..7368218ad8 100644 --- a/stable/ibm-cam/templates/cam-provider-helm-deployment.yaml +++ b/stable/ibm-cam/templates/cam-provider-helm-deployment.yaml @@ -106,11 +106,24 @@ spec: - configMapRef: name: redis-config env: + - name: MONGODB_PASSWORD + valueFrom: + secretKeyRef: + {{- if .Values.secureValues.secretName }} + name: {{ .Values.secureValues.secretName }} + {{- else }} + name: cam-secure-values-secret + {{- end }} + key: mongoDbPassword - name: DB_URL valueFrom: secretKeyRef: - name: cam-database-secret - key: dburl + {{- if .Values.secureValues.secretName }} + name: {{ .Values.secureValues.secretName }} + {{- else }} + name: cam-secure-values-secret + {{- end }} + key: mongoDbUrl - name: CAM_TOKEN valueFrom: secretKeyRef: @@ -142,3 +155,20 @@ spec: valueFrom: fieldRef: fieldPath: metadata.name + initContainers: + - name: cam-provider-helm-init + image: "{{ .Values.image.repository }}icam-busybox:{{ .Values.image.tag }}{{ template "platform" . }}" + imagePullPolicy: {{ .Values.image.pullPolicy }} + securityContext: + runAsUser: 0 + command: ["/bin/sh", "-c"] + args: + - mkdir -p /var/camlog/cam-provider-helm/${POD_NAME} && touch /var/camlog/cam-provider-helm/${POD_NAME}/cam_out.log && touch /var/camlog/cam-provider-helm/${POD_NAME}/cam_err.log && chown -R 1000:1000 /var/camlog/cam-provider-helm; + volumeMounts: + - name: {{ .Values.camLogsPV.name }} + mountPath: /var/camlog + env: + - name: POD_NAME + valueFrom: + fieldRef: + fieldPath: metadata.name \ No newline at end of file diff --git a/stable/ibm-cam/templates/cam-provider-terraform-deployment.yaml b/stable/ibm-cam/templates/cam-provider-terraform-deployment.yaml index 2cc3fcf679..30f3fca3b3 100644 --- a/stable/ibm-cam/templates/cam-provider-terraform-deployment.yaml +++ b/stable/ibm-cam/templates/cam-provider-terraform-deployment.yaml @@ -116,16 +116,43 @@ spec: - configMapRef: name: redis-config env: + - name: MONGODB_PASSWORD + valueFrom: + secretKeyRef: + {{- if .Values.secureValues.secretName }} + name: {{ .Values.secureValues.secretName }} + {{- else }} + name: cam-secure-values-secret + {{- end }} + key: mongoDbPassword - name: DB_URL valueFrom: secretKeyRef: - name: cam-database-secret - key: dburl + {{- if .Values.secureValues.secretName }} + name: {{ .Values.secureValues.secretName }} + {{- else }} + name: cam-secure-values-secret + {{- end }} + key: mongoDbUrl - name: CIPHER_PWD valueFrom: secretKeyRef: - name: cam-encryption-secret - key: password + {{- if .Values.secureValues.secretName }} + name: {{ .Values.secureValues.secretName }} + {{- else }} + name: cam-secure-values-secret + {{- end }} + key: encryptionPassword + - name: CIPHER_PWD_NEW + valueFrom: + secretKeyRef: + name: cam-cipher-migration-secret + key: newpassword + - name: CIPHER_MIGRATION_TIMESTAMP_FILE + valueFrom: + secretKeyRef: + name: cam-cipher-migration-secret + key: timestampfile - name: IAM_CLIENT_ID - name: IAM_CLIENT_ID_STAGE1 - name: IAM_SECRET @@ -163,9 +190,76 @@ spec: fieldPath: metadata.name {{- if .Values.proxy.useProxy }} - name: HTTPS_PROXY - value: {{ .Values.proxy.httpsProxy }} + valueFrom: + secretKeyRef: + {{- if .Values.secureValues.secretName }} + name: {{ .Values.secureValues.secretName }} + {{- else }} + name: cam-secure-values-secret + {{- end }} + key: httpsProxy + - name: https_proxy + valueFrom: + secretKeyRef: + {{- if .Values.secureValues.secretName }} + name: {{ .Values.secureValues.secretName }} + {{- else }} + name: cam-secure-values-secret + {{- end }} + key: httpsProxy - name: HTTP_PROXY - value: {{ .Values.proxy.httpProxy }} + valueFrom: + secretKeyRef: + {{- if .Values.secureValues.secretName }} + name: {{ .Values.secureValues.secretName }} + {{- else }} + name: cam-secure-values-secret + {{- end }} + key: httpProxy + - name: http_proxy + valueFrom: + secretKeyRef: + {{- if .Values.secureValues.secretName }} + name: {{ .Values.secureValues.secretName }} + {{- else }} + name: cam-secure-values-secret + {{- end }} + key: httpProxy - name: NO_PROXY - value: "{{ .Values.proxy.noProxy }}" + valueFrom: + secretKeyRef: + {{- if .Values.secureValues.secretName }} + name: {{ .Values.secureValues.secretName }} + {{- else }} + name: cam-secure-values-secret + {{- end }} + key: noProxy + - name: no_proxy + valueFrom: + secretKeyRef: + {{- if .Values.secureValues.secretName }} + name: {{ .Values.secureValues.secretName }} + {{- else }} + name: cam-secure-values-secret + {{- end }} + key: noProxy {{- end }} + initContainers: + - name: cam-provider-terraform-init + image: "{{ .Values.image.repository }}icam-busybox:{{ .Values.image.tag }}{{ template "platform" . }}" + imagePullPolicy: {{ .Values.image.pullPolicy }} + securityContext: + runAsUser: 0 + command: ["/bin/sh", "-c"] + args: + - mkdir -p /var/camlog/cam-provider-terraform/${POD_NAME} && touch /var/camlog/cam-provider-terraform/${POD_NAME}/cam_out.log && touch /var/camlog/cam-provider-terraform/${POD_NAME}/cam_err.log && chown -R 1000:1000 /var/camlog/cam-provider-terraform && mkdir -p /home/terraform/cam-provider-terraform && chown -R 1111:1111 /home/terraform/cam-provider-terraform && chmod -R g+w /home/terraform/cam-provider-terraform; + volumeMounts: + - name: {{ .Values.camLogsPV.name }} + mountPath: /var/camlog + - name: {{ .Values.camTerraformPV.name }} + mountPath: /home/terraform + env: + - name: POD_NAME + valueFrom: + fieldRef: + fieldPath: metadata.name diff --git a/stable/ibm-cam/templates/cam-proxy-deployment.yaml b/stable/ibm-cam/templates/cam-proxy-deployment.yaml index d3a728a2a7..6d31654703 100644 --- a/stable/ibm-cam/templates/cam-proxy-deployment.yaml +++ b/stable/ibm-cam/templates/cam-proxy-deployment.yaml @@ -104,11 +104,24 @@ spec: - configMapRef: name: redis-config env: + - name: MONGODB_PASSWORD + valueFrom: + secretKeyRef: + {{- if .Values.secureValues.secretName }} + name: {{ .Values.secureValues.secretName }} + {{- else }} + name: cam-secure-values-secret + {{- end }} + key: mongoDbPassword - name: DB_URL valueFrom: secretKeyRef: - name: cam-database-secret - key: dburl + {{- if .Values.secureValues.secretName }} + name: {{ .Values.secureValues.secretName }} + {{- else }} + name: cam-secure-values-secret + {{- end }} + key: mongoDbUrl - name: ICP_MASTER_IP valueFrom: configMapKeyRef: @@ -124,3 +137,15 @@ spec: valueFrom: fieldRef: fieldPath: metadata.name + initContainers: + - name: cam-proxy-init + image: "{{ .Values.image.repository }}icam-busybox:{{ .Values.image.tag }}{{ template "platform" . }}" + imagePullPolicy: {{ .Values.image.pullPolicy }} + securityContext: + runAsUser: 0 + command: ["/bin/sh", "-c"] + args: + - mkdir -p /var/camlog/cam-proxy && chown -R 1000:1000 /var/camlog/cam-proxy; + volumeMounts: + - name: {{ .Values.camLogsPV.name }} + mountPath: /var/camlog \ No newline at end of file diff --git a/stable/ibm-cam/templates/cam-proxy-service.yaml b/stable/ibm-cam/templates/cam-proxy-service.yaml index 4458727d9c..a3699f0ab9 100644 --- a/stable/ibm-cam/templates/cam-proxy-service.yaml +++ b/stable/ibm-cam/templates/cam-proxy-service.yaml @@ -26,7 +26,11 @@ spec: ports: - port: 30000 targetPort: 30000 - nodePort: 30000 - name: cam-proxy + {{- if .Values.managementConsole.port }} + {{- if eq (printf "%T" .Values.managementConsole.port) "float64" }} + nodePort: {{ .Values.managementConsole.port }} + {{- end }} + {{- end }} + name: cam-proxy-https selector: name: cam-proxy diff --git a/stable/ibm-cam/templates/cam-redis-deployment.yaml b/stable/ibm-cam/templates/cam-redis-deployment.yaml index 76f3fb67cf..5b8b244186 100644 --- a/stable/ibm-cam/templates/cam-redis-deployment.yaml +++ b/stable/ibm-cam/templates/cam-redis-deployment.yaml @@ -39,6 +39,8 @@ spec: productID: "{{ .Values.global.id.productID }}" productVersion: "{{ .Chart.AppVersion }}" spec: + securityContext: + runAsUser: 0 affinity: nodeAffinity: requiredDuringSchedulingIgnoredDuringExecution: diff --git a/stable/ibm-cam/templates/cam-secure-values-secret.yaml b/stable/ibm-cam/templates/cam-secure-values-secret.yaml new file mode 100644 index 0000000000..5c911c327d --- /dev/null +++ b/stable/ibm-cam/templates/cam-secure-values-secret.yaml @@ -0,0 +1,31 @@ +############################################################################### +# Licensed Materials - Property of IBM. +# Copyright IBM Corporation 2017. All Rights Reserved. +# U.S. Government Users Restricted Rights - Use, duplication or disclosure +# restricted by GSA ADP Schedule Contract with IBM Corp. +# +# Contributors: +# IBM Corporation - initial API and implementation +############################################################################### +{{- if eq .Values.secureValues.secretName ""}} + apiVersion: v1 + kind: Secret + metadata: + name: cam-secure-values-secret + namespace: {{ .Values.service.namespace }} + labels: + app: {{ template "fullname" . }} + chart: "{{ .Chart.Name }}-{{ .Chart.Version }}" + release: "{{ .Release.Name }}" + heritage: "{{ .Release.Service }}" + data: + httpProxy: {{ "http://username:password@proxy_host:proxy_port" | b64enc | quote }} + httpsProxy: {{ "http://username:password@proxy_host:proxy_port" | b64enc | quote }} + noProxy: {{ "" | b64enc | quote }} + mongoDbPassword: {{ "fFCXb5Z9R6X7Lhk" | b64enc | quote }} + mongoDbUrl: {{ "mongodb://camuser:fFCXb5Z9R6X7Lhk@cam-mongo:27017/cam" | b64enc | quote }} + encryptionPassword: {{ "fFCXb5Z9R6X7Lhk" | b64enc | quote }} + mariaDbUsername: {{ "ucdpadmin" | b64enc | quote }} + mariaDbPassword: {{ "bcb19ee3dee0" | b64enc | quote }} + redisPassword: {{ "fFCXb5Z9R6X7Lhk" | b64enc | quote }} +{{- end }} diff --git a/stable/ibm-cam/templates/cam-service-composer-api-deployment.yaml b/stable/ibm-cam/templates/cam-service-composer-api-deployment.yaml index 6cac452345..6400bb5cd6 100644 --- a/stable/ibm-cam/templates/cam-service-composer-api-deployment.yaml +++ b/stable/ibm-cam/templates/cam-service-composer-api-deployment.yaml @@ -54,6 +54,27 @@ spec: - {{ .Values.arch }} hostname: cam-service-composer-api volumes: +{{- if .Values.global.audit }} + - name: shared + emptyDir: {} + - name: journal + hostPath: + path: {{ .Values.auditService.config.journalPath }} + - name: logrotate + configMap: + name: audit-config + defaultMode: 420 + items: + - key: logrotate + path: audit + - name: logrotate-conf + configMap: + name: audit-config + defaultMode: 420 + items: + - key: logrotate-conf + path: logrotate.conf +{{- end }} - name: {{ .Values.camLogsPV.name }} {{- if .Values.camLogsPV.persistence.enabled }} persistentVolumeClaim: @@ -86,7 +107,7 @@ spec: periodSeconds: 20 readinessProbe: httpGet: - path: /api/v1/health + path: /api/v1/ready port: liveness-port initialDelaySeconds: 5 periodSeconds: 20 @@ -96,17 +117,34 @@ spec: - name: {{ .Values.camLogsPV.name }} mountPath: /var/camlog subPath: cam-service-composer-api +{{- if .Values.global.audit }} + - name: shared + mountPath: /var/audit +{{- end }} envFrom: - configMapRef: name: common-config - configMapRef: name: redis-config env: + - name: MONGODB_PASSWORD + valueFrom: + secretKeyRef: + {{- if .Values.secureValues.secretName }} + name: {{ .Values.secureValues.secretName }} + {{- else }} + name: cam-secure-values-secret + {{- end }} + key: mongoDbPassword - name: DB_URL valueFrom: secretKeyRef: - name: cam-database-secret - key: dburl + {{- if .Values.secureValues.secretName }} + name: {{ .Values.secureValues.secretName }} + {{- else }} + name: cam-secure-values-secret + {{- end }} + key: mongoDbUrl - name: CAM_TOKEN valueFrom: secretKeyRef: @@ -122,6 +160,62 @@ spec: secretKeyRef: name: oauth-client-secret key: DEFAULT_ADMIN_USER +{{- if .Values.proxy.useProxy }} + - name: HTTPS_PROXY + valueFrom: + secretKeyRef: + {{- if .Values.secureValues.secretName }} + name: {{ .Values.secureValues.secretName }} + {{- else }} + name: cam-secure-values-secret + {{- end }} + key: httpsProxy + - name: https_proxy + valueFrom: + secretKeyRef: + {{- if .Values.secureValues.secretName }} + name: {{ .Values.secureValues.secretName }} + {{- else }} + name: cam-secure-values-secret + {{- end }} + key: httpsProxy + - name: HTTP_PROXY + valueFrom: + secretKeyRef: + {{- if .Values.secureValues.secretName }} + name: {{ .Values.secureValues.secretName }} + {{- else }} + name: cam-secure-values-secret + {{- end }} + key: httpProxy + - name: http_proxy + valueFrom: + secretKeyRef: + {{- if .Values.secureValues.secretName }} + name: {{ .Values.secureValues.secretName }} + {{- else }} + name: cam-secure-values-secret + {{- end }} + key: httpProxy + - name: NO_PROXY + valueFrom: + secretKeyRef: + {{- if .Values.secureValues.secretName }} + name: {{ .Values.secureValues.secretName }} + {{- else }} + name: cam-secure-values-secret + {{- end }} + key: noProxy + - name: no_proxy + valueFrom: + secretKeyRef: + {{- if .Values.secureValues.secretName }} + name: {{ .Values.secureValues.secretName }} + {{- else }} + name: cam-secure-values-secret + {{- end }} + key: noProxy +{{- end }} - name: ICP_ENDPOINT value: https://$(ICP_MASTER_IP):8443 - name: ORPHEUS_IDENTITY_API_URL @@ -134,3 +228,70 @@ spec: valueFrom: fieldRef: fieldPath: metadata.name + - name: SCL_MIGRATION_REQUIRED + value: "true" + - name: POD_NAMESPACE + valueFrom: + fieldRef: + fieldPath: metadata.namespace + - name: SERVICE_NAME + value: cam-service-composer-api + - name: AUDIT_ENABLED + value: "{{ .Values.global.audit }}" + - name: AUDIT_LOG_PATH + value: /var/audit/cam-service-composer-api-audit.log +{{- if .Values.global.audit }} + - name: cam-service-composer-api-audit + image: "{{ .Values.auditService.image.repository }}icp-audit-service:{{ .Values.auditService.image.tag }}" + imagePullPolicy: {{ .Values.auditService.image.pullPolicy }} + resources: +{{ toYaml .Values.auditService.resources | indent 10 }} + env: + - name: POD_NAME + valueFrom: + fieldRef: + fieldPath: metadata.name + volumeMounts: + - name: {{ .Values.camLogsPV.name }} + mountPath: /var/camlog + subPath: cam-iaas + - name: shared + mountPath: "/var/log/audit" + - name: journal + mountPath: {{ .Values.auditService.config.journalPath }} + - name: logrotate + mountPath: "/etc/logrotate.d/audit" + subPath: audit + - name: logrotate-conf + mountPath: "/etc/logrotate.conf" + subPath: logrotate.conf + livenessProbe: + exec: + command: + - sh + - -c + - "service cron status" + initialDelaySeconds: 30 + timeoutSeconds: 5 + readinessProbe: + exec: + command: + - sh + - -c + - "service cron status" + initialDelaySeconds: 5 + timeoutSeconds: 1 + value: "true" +{{- end }} + initContainers: + - name: cam-service-composer-api-init + image: "{{ .Values.image.repository }}icam-busybox:{{ .Values.image.tag }}{{ template "platform" . }}" + imagePullPolicy: {{ .Values.image.pullPolicy }} + securityContext: + runAsUser: 0 + command: ["/bin/sh", "-c"] + args: + - mkdir -p /var/camlog/cam-service-composer-api && chown -R 1000:1000 /var/camlog/cam-service-composer-api; + volumeMounts: + - name: {{ .Values.camLogsPV.name }} + mountPath: /var/camlog diff --git a/stable/ibm-cam/templates/cam-service-composer-ui-deployment.yaml b/stable/ibm-cam/templates/cam-service-composer-ui-deployment.yaml index 2e9ec67b44..1737a57d2a 100644 --- a/stable/ibm-cam/templates/cam-service-composer-ui-deployment.yaml +++ b/stable/ibm-cam/templates/cam-service-composer-ui-deployment.yaml @@ -102,11 +102,24 @@ spec: - configMapRef: name: redis-config env: + - name: MONGODB_PASSWORD + valueFrom: + secretKeyRef: + {{- if .Values.secureValues.secretName }} + name: {{ .Values.secureValues.secretName }} + {{- else }} + name: cam-secure-values-secret + {{- end }} + key: mongoDbPassword - name: DB_URL valueFrom: secretKeyRef: - name: cam-database-secret - key: dburl + {{- if .Values.secureValues.secretName }} + name: {{ .Values.secureValues.secretName }} + {{- else }} + name: cam-secure-values-secret + {{- end }} + key: mongoDbUrl - name: APP_CONTEXT value: /servicecomposer - name: sessionKey @@ -149,9 +162,19 @@ spec: configMapKeyRef: name: oauth-client-map key: PROXY_IP - - name: wlpCallbackUrl - value: https://$(ICP_PROXY_IP):30000/auth/liberty/callback - name: POD_NAME valueFrom: fieldRef: fieldPath: metadata.name + initContainers: + - name: cam-service-composer-ui-init + image: "{{ .Values.image.repository }}icam-busybox:{{ .Values.image.tag }}{{ template "platform" . }}" + imagePullPolicy: {{ .Values.image.pullPolicy }} + securityContext: + runAsUser: 0 + command: ["/bin/sh", "-c"] + args: + - mkdir -p /var/camlog/cam-service-composer-ui && chown -R 1000:1000 /var/camlog/cam-service-composer-ui; + volumeMounts: + - name: {{ .Values.camLogsPV.name }} + mountPath: /var/camlog \ No newline at end of file diff --git a/stable/ibm-cam/templates/cam-services-psp.yaml b/stable/ibm-cam/templates/cam-services-psp.yaml new file mode 100644 index 0000000000..b39a62cf5d --- /dev/null +++ b/stable/ibm-cam/templates/cam-services-psp.yaml @@ -0,0 +1,44 @@ +apiVersion: extensions/v1beta1 +kind: PodSecurityPolicy +metadata: + labels: + name: cam-services-ps + app: {{ template "fullname" . }} + chart: "{{ .Chart.Name }}-{{ .Chart.Version }}" + release: "{{ .Release.Name }}" + heritage: "{{ .Release.Service }}" + name: cam-services-psp +spec: + privileged: false + allowPrivilegeEscalation: true + hostPID: false + hostIPC: false + hostNetwork: false + allowedHostPaths: + - pathPrefix: {{ .Values.auditService.config.journalPath }} + readOnly: false + allowedCapabilities: + - "*" + readOnlyRootFilesystem: false + fsGroup: + ranges: + - max: 65535 + min: 1 + rule: MustRunAs + runAsUser: + rule: RunAsAny + seLinux: + rule: RunAsAny + supplementalGroups: + ranges: + - max: 65535 + min: 1 + rule: MustRunAs + volumes: + - configMap + - emptyDir + - secret + - persistentVolumeClaim + - nfs + - downwardAPI + - projected diff --git a/stable/ibm-cam/templates/cam-services-sa-psp-rb.yaml b/stable/ibm-cam/templates/cam-services-sa-psp-rb.yaml new file mode 100644 index 0000000000..cf6f3497a7 --- /dev/null +++ b/stable/ibm-cam/templates/cam-services-sa-psp-rb.yaml @@ -0,0 +1,19 @@ +apiVersion: rbac.authorization.k8s.io/v1 +kind: RoleBinding +metadata: + name: cam-services-sa-psp-rb + namespace: services + labels: + name: cam-services-sa-psp-rb + app: {{ template "fullname" . }} + chart: "{{ .Chart.Name }}-{{ .Chart.Version }}" + release: "{{ .Release.Name }}" + heritage: "{{ .Release.Service }}" +roleRef: + apiGroup: rbac.authorization.k8s.io + kind: Role + name: cam-services-sa-psp +subjects: +- kind: ServiceAccount + name: default + namespace: services diff --git a/stable/ibm-cam/templates/cam-services-sa-psp.yaml b/stable/ibm-cam/templates/cam-services-sa-psp.yaml new file mode 100644 index 0000000000..20fbf923d7 --- /dev/null +++ b/stable/ibm-cam/templates/cam-services-sa-psp.yaml @@ -0,0 +1,17 @@ +apiVersion: rbac.authorization.k8s.io/v1 +kind: Role +metadata: + name: cam-services-sa-psp + namespace: services + labels: + name: cam-services-sa-psp + app: {{ template "fullname" . }} + chart: "{{ .Chart.Name }}-{{ .Chart.Version }}" + release: "{{ .Release.Name }}" + heritage: "{{ .Release.Service }}" +rules: +- apiGroups: ["extensions"] + resources: ["podsecuritypolicies"] + verbs: ["use"] + resourceNames: + - cam-services-psp diff --git a/stable/ibm-cam/templates/cam-services-sa-view-rb.yaml b/stable/ibm-cam/templates/cam-services-sa-view-rb.yaml new file mode 100644 index 0000000000..59912249de --- /dev/null +++ b/stable/ibm-cam/templates/cam-services-sa-view-rb.yaml @@ -0,0 +1,19 @@ +apiVersion: rbac.authorization.k8s.io/v1 +kind: RoleBinding +metadata: + name: cam-services-sa-view-rb + namespace: services + labels: + name: cam-services-sa-view-rb + app: {{ template "fullname" . }} + chart: "{{ .Chart.Name }}-{{ .Chart.Version }}" + release: "{{ .Release.Name }}" + heritage: "{{ .Release.Service }}" +roleRef: + apiGroup: rbac.authorization.k8s.io + kind: Role + name: cam-services-sa-view +subjects: +- kind: ServiceAccount + name: default + namespace: services diff --git a/stable/ibm-cam/templates/cam-services-sa-view.yaml b/stable/ibm-cam/templates/cam-services-sa-view.yaml new file mode 100644 index 0000000000..adf1c079d3 --- /dev/null +++ b/stable/ibm-cam/templates/cam-services-sa-view.yaml @@ -0,0 +1,16 @@ +apiVersion: rbac.authorization.k8s.io/v1 +kind: Role +metadata: + name: cam-services-sa-view + namespace: services + labels: + name: cam-services-sa-view + app: {{ template "fullname" . }} + chart: "{{ .Chart.Name }}-{{ .Chart.Version }}" + release: "{{ .Release.Name }}" + heritage: "{{ .Release.Service }}" +rules: +- apiGroups: [""] + resources: + - services + verbs: ["get", "list", "watch"] diff --git a/stable/ibm-cam/templates/cam-tenant-api-deployment.yaml b/stable/ibm-cam/templates/cam-tenant-api-deployment.yaml index bd3b7f393d..4320150275 100644 --- a/stable/ibm-cam/templates/cam-tenant-api-deployment.yaml +++ b/stable/ibm-cam/templates/cam-tenant-api-deployment.yaml @@ -102,11 +102,24 @@ spec: - configMapRef: name: redis-config env: + - name: MONGODB_PASSWORD + valueFrom: + secretKeyRef: + {{- if .Values.secureValues.secretName }} + name: {{ .Values.secureValues.secretName }} + {{- else }} + name: cam-secure-values-secret + {{- end }} + key: mongoDbPassword - name: DB_URL valueFrom: secretKeyRef: - name: cam-database-secret - key: dburl + {{- if .Values.secureValues.secretName }} + name: {{ .Values.secureValues.secretName }} + {{- else }} + name: cam-secure-values-secret + {{- end }} + key: mongoDbUrl - name: CAM_TOKEN valueFrom: secretKeyRef: @@ -134,3 +147,15 @@ spec: valueFrom: fieldRef: fieldPath: metadata.name + initContainers: + - name: cam-tenant-api-init + image: "{{ .Values.image.repository }}icam-busybox:{{ .Values.image.tag }}{{ template "platform" . }}" + imagePullPolicy: {{ .Values.image.pullPolicy }} + securityContext: + runAsUser: 0 + command: ["/bin/sh", "-c"] + args: + - mkdir -p /var/camlog/cam-tenant-api && chown -R 1000:1000 /var/camlog/cam-tenant-api; + volumeMounts: + - name: {{ .Values.camLogsPV.name }} + mountPath: /var/camlog \ No newline at end of file diff --git a/stable/ibm-cam/templates/cam-ui-basic-deployment.yaml b/stable/ibm-cam/templates/cam-ui-basic-deployment.yaml index ba70812f96..fffb0a7ebf 100644 --- a/stable/ibm-cam/templates/cam-ui-basic-deployment.yaml +++ b/stable/ibm-cam/templates/cam-ui-basic-deployment.yaml @@ -54,6 +54,27 @@ spec: - {{ .Values.arch }} hostname: cam-ui-basic volumes: +{{- if .Values.global.audit }} + - name: shared + emptyDir: {} + - name: journal + hostPath: + path: {{ .Values.auditService.config.journalPath }} + - name: logrotate + configMap: + name: audit-config + defaultMode: 420 + items: + - key: logrotate + path: audit + - name: logrotate-conf + configMap: + name: audit-config + defaultMode: 420 + items: + - key: logrotate-conf + path: logrotate.conf +{{- end }} - name: {{ .Values.camLogsPV.name }} {{- if .Values.camLogsPV.persistence.enabled }} persistentVolumeClaim: @@ -96,17 +117,34 @@ spec: - name: {{ .Values.camLogsPV.name }} mountPath: /var/camlog subPath: cam-ui-basic +{{- if .Values.global.audit }} + - name: shared + mountPath: /var/audit +{{- end }} envFrom: - configMapRef: name: common-config - configMapRef: name: redis-config env: + - name: MONGODB_PASSWORD + valueFrom: + secretKeyRef: + {{- if .Values.secureValues.secretName }} + name: {{ .Values.secureValues.secretName }} + {{- else }} + name: cam-secure-values-secret + {{- end }} + key: mongoDbPassword - name: DB_URL valueFrom: secretKeyRef: - name: cam-database-secret - key: dburl + {{- if .Values.secureValues.secretName }} + name: {{ .Values.secureValues.secretName }} + {{- else }} + name: cam-secure-values-secret + {{- end }} + key: mongoDbUrl - name: APP_CONTEXT value: /ui - name: sessionKey @@ -148,10 +186,74 @@ spec: name: oauth-client-map key: PROXY_IP - name: wlpCallbackUrl - value: https://$(ICP_PROXY_IP):30000/auth/liberty/callback + value: /cam/auth/liberty/callback - name: disableSectionIds value: '["monitor","servicecomposer"]' - name: POD_NAME valueFrom: fieldRef: fieldPath: metadata.name + - name: POD_NAMESPACE + valueFrom: + fieldRef: + fieldPath: metadata.namespace + - name: SERVICE_NAME + value: cam-ui-basic + - name: AUDIT_ENABLED + value: "{{ .Values.global.audit }}" + - name: AUDIT_LOG_PATH + value: /var/audit/cam-ui-basic-audit.log +{{- if .Values.global.audit }} + - name: cam-ui-basic-audit + image: "{{ .Values.auditService.image.repository }}icp-audit-service:{{ .Values.auditService.image.tag }}" + imagePullPolicy: {{ .Values.auditService.image.pullPolicy }} + resources: +{{ toYaml .Values.auditService.resources | indent 10 }} + env: + - name: POD_NAME + valueFrom: + fieldRef: + fieldPath: metadata.name + volumeMounts: + - name: {{ .Values.camLogsPV.name }} + mountPath: /var/camlog + subPath: cam-iaas + - name: shared + mountPath: "/var/log/audit" + - name: journal + mountPath: {{ .Values.auditService.config.journalPath }} + - name: logrotate + mountPath: "/etc/logrotate.d/audit" + subPath: audit + - name: logrotate-conf + mountPath: "/etc/logrotate.conf" + subPath: logrotate.conf + livenessProbe: + exec: + command: + - sh + - -c + - "service cron status" + initialDelaySeconds: 30 + timeoutSeconds: 5 + readinessProbe: + exec: + command: + - sh + - -c + - "service cron status" + initialDelaySeconds: 5 + timeoutSeconds: 1 +{{- end }} + initContainers: + - name: cam-ui-basic-init + image: "{{ .Values.image.repository }}icam-busybox:{{ .Values.image.tag }}{{ template "platform" . }}" + imagePullPolicy: {{ .Values.image.pullPolicy }} + securityContext: + runAsUser: 0 + command: ["/bin/sh", "-c"] + args: + - mkdir -p /var/camlog/cam-ui-basic && chown -R 1000:1000 /var/camlog/cam-ui-basic; + volumeMounts: + - name: {{ .Values.camLogsPV.name }} + mountPath: /var/camlog diff --git a/stable/ibm-cam/templates/cam-ui-connections-deployment.yaml b/stable/ibm-cam/templates/cam-ui-connections-deployment.yaml index 3071adc3d4..b65872f0ef 100644 --- a/stable/ibm-cam/templates/cam-ui-connections-deployment.yaml +++ b/stable/ibm-cam/templates/cam-ui-connections-deployment.yaml @@ -102,11 +102,24 @@ spec: - configMapRef: name: redis-config env: + - name: MONGODB_PASSWORD + valueFrom: + secretKeyRef: + {{- if .Values.secureValues.secretName }} + name: {{ .Values.secureValues.secretName }} + {{- else }} + name: cam-secure-values-secret + {{- end }} + key: mongoDbPassword - name: DB_URL valueFrom: secretKeyRef: - name: cam-database-secret - key: dburl + {{- if .Values.secureValues.secretName }} + name: {{ .Values.secureValues.secretName }} + {{- else }} + name: cam-secure-values-secret + {{- end }} + key: mongoDbUrl - name: APP_CONTEXT value: /connections - name: sessionKey @@ -147,9 +160,19 @@ spec: configMapKeyRef: name: oauth-client-map key: PROXY_IP - - name: wlpCallbackUrl - value: https://$(ICP_PROXY_IP):30000/auth/liberty/callback - name: POD_NAME valueFrom: fieldRef: fieldPath: metadata.name + initContainers: + - name: cam-ui-connections-init + image: "{{ .Values.image.repository }}icam-busybox:{{ .Values.image.tag }}{{ template "platform" . }}" + imagePullPolicy: {{ .Values.image.pullPolicy }} + securityContext: + runAsUser: 0 + command: ["/bin/sh", "-c"] + args: + - mkdir -p /var/camlog/cam-ui-connections && chown -R 1000:1000 /var/camlog/cam-ui-connections; + volumeMounts: + - name: {{ .Values.camLogsPV.name }} + mountPath: /var/camlog \ No newline at end of file diff --git a/stable/ibm-cam/templates/cam-ui-instances-deployment.yaml b/stable/ibm-cam/templates/cam-ui-instances-deployment.yaml index 8b0403fd87..9405acfc16 100644 --- a/stable/ibm-cam/templates/cam-ui-instances-deployment.yaml +++ b/stable/ibm-cam/templates/cam-ui-instances-deployment.yaml @@ -102,11 +102,24 @@ spec: - configMapRef: name: redis-config env: + - name: MONGODB_PASSWORD + valueFrom: + secretKeyRef: + {{- if .Values.secureValues.secretName }} + name: {{ .Values.secureValues.secretName }} + {{- else }} + name: cam-secure-values-secret + {{- end }} + key: mongoDbPassword - name: DB_URL valueFrom: secretKeyRef: - name: cam-database-secret - key: dburl + {{- if .Values.secureValues.secretName }} + name: {{ .Values.secureValues.secretName }} + {{- else }} + name: cam-secure-values-secret + {{- end }} + key: mongoDbUrl - name: APP_CONTEXT value: /instances - name: sessionKey @@ -147,9 +160,19 @@ spec: configMapKeyRef: name: oauth-client-map key: PROXY_IP - - name: wlpCallbackUrl - value: https://$(ICP_PROXY_IP):30000/auth/liberty/callback - name: POD_NAME valueFrom: fieldRef: fieldPath: metadata.name + initContainers: + - name: cam-ui-instances-init + image: "{{ .Values.image.repository }}icam-busybox:{{ .Values.image.tag }}{{ template "platform" . }}" + imagePullPolicy: {{ .Values.image.pullPolicy }} + securityContext: + runAsUser: 0 + command: ["/bin/sh", "-c"] + args: + - mkdir -p /var/camlog/cam-ui-instances && chown -R 1000:1000 /var/camlog/cam-ui-instances; + volumeMounts: + - name: {{ .Values.camLogsPV.name }} + mountPath: /var/camlog \ No newline at end of file diff --git a/stable/ibm-cam/templates/cam_ui_secret.yaml b/stable/ibm-cam/templates/cam-ui-secret.yaml similarity index 100% rename from stable/ibm-cam/templates/cam_ui_secret.yaml rename to stable/ibm-cam/templates/cam-ui-secret.yaml diff --git a/stable/ibm-cam/templates/cam-ui-templates-deployment.yaml b/stable/ibm-cam/templates/cam-ui-templates-deployment.yaml index c66559fa99..86dcbd7e1b 100644 --- a/stable/ibm-cam/templates/cam-ui-templates-deployment.yaml +++ b/stable/ibm-cam/templates/cam-ui-templates-deployment.yaml @@ -102,11 +102,24 @@ spec: - configMapRef: name: redis-config env: + - name: MONGODB_PASSWORD + valueFrom: + secretKeyRef: + {{- if .Values.secureValues.secretName }} + name: {{ .Values.secureValues.secretName }} + {{- else }} + name: cam-secure-values-secret + {{- end }} + key: mongoDbPassword - name: DB_URL valueFrom: secretKeyRef: - name: cam-database-secret - key: dburl + {{- if .Values.secureValues.secretName }} + name: {{ .Values.secureValues.secretName }} + {{- else }} + name: cam-secure-values-secret + {{- end }} + key: mongoDbUrl - name: APP_CONTEXT value: /templates - name: sessionKey @@ -147,9 +160,19 @@ spec: configMapKeyRef: name: oauth-client-map key: PROXY_IP - - name: wlpCallbackUrl - value: https://$(ICP_PROXY_IP):30000/auth/liberty/callback - name: POD_NAME valueFrom: fieldRef: fieldPath: metadata.name + initContainers: + - name: cam-ui-templates-init + image: "{{ .Values.image.repository }}icam-busybox:{{ .Values.image.tag }}{{ template "platform" . }}" + imagePullPolicy: {{ .Values.image.pullPolicy }} + securityContext: + runAsUser: 0 + command: ["/bin/sh", "-c"] + args: + - mkdir -p /var/camlog/cam-ui-templates && chown -R 1000:1000 /var/camlog/cam-ui-templates; + volumeMounts: + - name: {{ .Values.camLogsPV.name }} + mountPath: /var/camlog \ No newline at end of file diff --git a/stable/ibm-cam/values-metadata.yaml b/stable/ibm-cam/values-metadata.yaml index ac77937d47..202cbc0819 100644 --- a/stable/ibm-cam/values-metadata.yaml +++ b/stable/ibm-cam/values-metadata.yaml @@ -1,14 +1,17 @@ ## Metadata for Cloud Automation Manager configuration ## This metadata is used to augment the value.yaml to drive ICP UI for configuration of the Helm chart installation -## Global image parameters +## Global parameters global: + __metadata: + label: "Global" + description: "" image: secretName: __metadata: name: "Image pull secret name" label: "Image pull secret name (see help -->)" - description: "global.image.secretname: Type `default` to use your namespace default service account image pull secret or enter your image pull secret name here. See the 'Add ImagePullSecrets to a service account' kubernetes documentation for more information on generating image pull secrets and how to patch the namespace default service account with an image pull secret." + description: "global.image.secretname: Type `default` to use your namespace default service account image pull secret or enter your image pull secret name here. See the 'Add ImagePullSecrets to a service account' kubernetes documentation for more information on generating image pull secrets and how to patch the namespace default service account with an image pull secret. See install instructions for more details." type: "string" immutable: false required: true @@ -26,7 +29,7 @@ global: __metadata: name: "Deploy API key" label: "Deploy API key (see help -->)" - description: "global.iam.deployApiKey: Deploy API Key used by CAM to generate CAM specific Service ID and API Key. CAM API Key is used to interact with the Platform authorization." + description: "global.iam.deployApiKey: Deploy API Key used by CAM to generate CAM specific Service ID and API Key for platform authorization. See install instructions for more details." type: "string" immutable: false required: true @@ -35,7 +38,13 @@ global: label: "Optimize for offline install" description: "Select to optimize the installation for offline. For example, skip attempting to access the internet for public starter templates" type: "boolean" - required: true + required: true + audit: + __metadata: + label: "Enable audit" + description: "Select to enable the audit feature. It requires the management logging service to be installed." + type: "boolean" + required: true ## Arch example metadata for ppa charts arch: @@ -44,7 +53,7 @@ arch: label: "Worker node architecture" description: "arch: Worker node architecture to deploy to. amd64 = intel (default), ppc64le = power" type: "string" - immutable: "false" + immutable: false required: false options: - label: "amd64" @@ -54,6 +63,9 @@ arch: ## Namespace for CAM installation service: + __metadata: + label: "Service" + description: "" namespace: __metadata: name: "namespace" @@ -63,33 +75,52 @@ service: immutable: false required: true +## CAM management console configuration +managementConsole: + __metadata: + label: "Management Console" + description: "" + port: + __metadata: + name: "port" + label: "Port" + description: "managementConsole.port: Port for CAM management console (default is `30000` and valid range is `30000-32767`). If this field is left blank a random valid port will be chosen." + type: "number" + immutable: false + required: false + validation: "^$|3[0-1][0-9][0-9][0-9]|32[0-6][0-9][0-9]|327[0-5][0-9]|3276[0-7]" + +## Optionally use a secret to set secrue values +secureValues: + __metadata: + label: "Secure Values" + description: "" + secretName: + __metadata: + name: "secretName" + label: "Secret name" + description: "secureValues.secretName: Name of a secret created by the user prior to the installation of CAM that contains secure values such as proxy, database and encryption passwords." + type: "string" + immutable: false + required: false + ## Optionally use an external MongoDB database: + __metadata: + label: "Database" + description: "" bundled: __metadata: label: "Use the internal MongoDB" description: "database.bundled: Use internal MongoDB. Set to false for external. For more information, see Using an external MongoDB in the IBM Knowledge Center" type: "boolean" required: true - url: - __metadata: - name: "URL" - label: "External MongoDB URL" - description: "database.url: External MongoDB endpoint (when `Use the internal MongoDB` is false)" - type: "string" - immutable: false - required: false - password: - __metadata: - name: "Custom password" - label: "Custom password" - description: "database.password: Overrides the default password used to store data in CAM. Save this password for future CAM installs or restores using existing CAM data. If this install is using data from a previous CAM install this password must match the previous CAM install's encryption password. A password can only be set during the first install of CAM. If this field is left blank (default password) during first install then it must remain blank for subsequent installs or upgrades." - type: "string" - immutable: false - required: false ## Optionally use an external Redis redis: + __metadata: + label: "Redis" + description: "" bundled: __metadata: label: "Use the internal Redis" @@ -117,6 +148,7 @@ redis: image: __metadata: label: "Image" + description: "" repository: __metadata: label: "Repository" @@ -148,41 +180,21 @@ image: ## Proxy parameters proxy: + __metadata: + label: "Proxy" + description: "" useProxy: __metadata: label: "Use a proxy" description: "Select to use a proxy with CAM and fill out the following proxy fields" type: "boolean" required: true - httpsProxy: - __metadata: - name: "httpsProxy" - label: "HTTPS proxy URL" - description: "https_proxy: HTTPS Proxy URL with optional authentication" - type: "string" - immutable: false - required: false - httpProxy: - __metadata: - name: "httpProxy" - label: "HTTP proxy URL" - description: "http_proxy: HTTP Proxy URL with optional authentication" - type: "string" - immutable: false - required: false - noProxy: - __metadata: - name: "noProxy" - label: "No proxy URLs" - description: "no_proxy: This variable should contain a comma-separated list of domain extensions or addresses the proxy should NOT be used for. For instance, if the value of `no_proxy' is `.ibm.com', proxy will not be used to retrieve data from IBM." - type: "string" - immutable: false - required: false ## MongoDB Persistant Storage camMongoPV: __metadata: label: "MongoDB Volume" + description: "" name: __metadata: label: "MongoDB Volume Name" @@ -234,6 +246,7 @@ camMongoPV: camLogsPV: __metadata: label: "Logs Volume" + description: "" name: __metadata: label: "Logs Volume Name" @@ -285,6 +298,7 @@ camLogsPV: camTerraformPV: __metadata: label: "Terrafom Volume" + description: "" name: __metadata: label: "Terrafom Volume Name" @@ -336,6 +350,7 @@ camTerraformPV: camBPDAppDataPV: __metadata: label: "Template Designer Volume" + description: "" name: __metadata: label: "Template Designer Volume Name" @@ -387,6 +402,7 @@ camBPDAppDataPV: camBroker: __metadata: label: "Broker" + description: "" replicaCount: __metadata: label: "Replica Count" @@ -398,6 +414,7 @@ camBroker: camProxy: __metadata: label: "Proxy" + description: "" replicaCount: __metadata: label: "Replica Count" @@ -409,6 +426,7 @@ camProxy: camAPI: __metadata: label: "APIs" + description: "" replicaCount: __metadata: label: "Replica Count" @@ -429,6 +447,7 @@ camAPI: camUI: __metadata: label: "UI" + description: "" replicaCount: __metadata: label: "Replica Count" @@ -455,6 +474,7 @@ camUI: resources: __metadata: label: "Resources" + description: "" requests: memory: __metadata: @@ -486,6 +506,7 @@ resources: camBPDUI: __metadata: label: "Template Designer UI" + description: "" bundled: __metadata: label: "Use the internal Template Designer" @@ -497,6 +518,7 @@ camBPDUI: camBPDCDS: __metadata: label: "Template Designer CDS" + description: "" replicaCount: __metadata: label: "Replica Count" @@ -553,6 +575,7 @@ camBPDCDS: camBPDMDS: __metadata: label: "Template Designer MDS" + description: "" replicaCount: __metadata: label: "Replica Count" @@ -593,6 +616,7 @@ camBPDMDS: camBPDDatabase: __metadata: label: "Template Designer Database" + description: "" bundled: __metadata: label: "Use the internal MariaDB Database for Template Designer" @@ -615,17 +639,12 @@ camBPDDatabase: description: "camBPDDatabase.resources.cpu: The requested CPU" type: "string" required: true - options: - __metadata: - label: "Additional options" - description: "camBPDDatabase.options: Additional configuration options for Template Designer Database" - type: "string" - required: false ## Template Designer External Database Config camBPDExternalDatabase: __metadata: label: "Template Designer External Database" + description: "" type: __metadata: label: "Type" @@ -668,6 +687,7 @@ camBPDExternalDatabase: camBPDResources: __metadata: label: "Template Designer Resources" + description: "" requests: memory: __metadata: @@ -694,3 +714,71 @@ camBPDResources: description: "camBPDResources.limits.cpu: The CPU limit" type: "string" required: true + +# Audit Service Configuration +auditService: + __metadata: + label: "Audit service parameters" + description: "" + image: + __metadata: + label: "Audit image" + repository: + __metadata: + label: "Repository" + description: "auditService.image.repository: Repository for the audit image" + type: "string" + immutable: false + required: true + tag: + __metadata: + label: "Tag" + description: "auditService.image.tag: Tag for the audit image" + type: "string" + immutable: false + required: true + pullPolicy: + __metadata: + label: "Pull Policy" + description: "auditService.image.pullPolicy: Pull Policy for the audit image" + type: "string" + immutable: false + required: true + resources: + __metadata: + label: "Resources" + requests: + memory: + __metadata: + label: "Memory request" + description: "auditService.resources.requests.memory: The memory request" + type: "string" + required: true + cpu: + __metadata: + label: "CPU request" + description: "auditService.resources.requests.cpu: The requested CPU" + type: "string" + required: true + limits: + memory: + __metadata: + label: "Memory limit" + description: "auditService.resources.limits.memory: The memory limit" + type: "string" + required: true + cpu: + __metadata: + label: "CPU limit" + description: "auditService.resources.limits.cpu: The CPU limit" + type: "string" + required: true + config: + __metadata: + label: "Configuration" + journalPath: + __metadata: + label: "Journal path " + description: "auditService.config.journalPath: The journal path" + type: "string" + required: true diff --git a/stable/ibm-cam/values.yaml b/stable/ibm-cam/values.yaml index 3f42c77ef0..cecc42b015 100644 --- a/stable/ibm-cam/values.yaml +++ b/stable/ibm-cam/values.yaml @@ -11,10 +11,11 @@ global: image: secretName: "" id: - productID: "IBMCloudAutomationManager_5737E67_2103_CE_000" + productID: "IBMCloudAutomationManager_5737E67_3100_CE_000" iam: deployApiKey: "" offline: false + audit: false #arch: ppc64le arch: amd64 @@ -22,10 +23,14 @@ arch: amd64 service: namespace: services +managementConsole: + port: 30000 + +secureValues: + secretName: "" + database: bundled: true - url: "" - password: "" redis: bundled: true @@ -34,15 +39,12 @@ redis: image: repository: "store/ibmcorp/" - tag: 2.1.0.3_fp1 + tag: 3.1.0.0 pullPolicy: IfNotPresent dockerconfig: "" proxy: useProxy: false - httpsProxy: "http://username:password@proxy_host:proxy_port" - httpProxy: "http://username:password@proxy_host:proxy_port" - noProxy: "" camMongoPV: name: "cam-mongo-pv" @@ -117,7 +119,7 @@ camProxy: camAPI: replicaCount: 1 camSecret: - secretName: cam-secret + secretName: cam-api-secret camUI: replicaCount: 1 @@ -166,7 +168,6 @@ camBPDDatabase: requests: memory: 256Mi cpu: 100m - options: "" camBPDExternalDatabase: type: "" @@ -184,3 +185,22 @@ camBPDResources: limits: cpu: 2000m memory: 2Gi + +auditService: + image: + repository: "mycluster.icp:8500/ibmcom/" + tag: 3.1.0 + pullPolicy: IfNotPresent + + resources: + limits: + cpu: 200m + memory: 512Mi + requests: + cpu: 100m + memory: 256Mi + + extraArgs: {} + + config: + journalPath: '/run/systemd/journal'