Swarmops is a necessary tool to enable any bitcoin-native or decentralized gamechanger.
Swarmops is an admin system for swarm-type organizations. It's a bureaucracy system for people who thoroughly dislike bureaucracy, so it removes all visibility of it and focuses on the ops aspects. It manages decentralized authority, volunteers, members, activists, budgets, mass communications, expenses, payroll, invoices, and complete financials/bookkeeping.
The goals of Swarmops are three:
- Become the #1 software for organizing swarm activism to effectively change policy,
- Become the #1 software to manage native-bitcoin startups' cashflow and accounting,
- Become the #1 software to run civil liberties resistances in repressive regimes.
Goal #1, organizing swarm activism: the Swedish Pirate Party used a predecessor to Swarmops in its effort to put two representatives in the European Parliament, and could literally not have succeeded without the ability to decentralize authority that Swarmops provided, pushing all the crucial decision-making out to the edges of the organization where the most information was available. It's an administration tool for people who hate paperwork, so it's built to optimize the time available to activism.
Goal #2, the primary back-end software for bitcoin-native unbanked startups: Swarmops does bookkeeping and accounting on fully automatic. Today, there are no services or packages for bitcoin-native and unbanked organizations – for startups which are unbanked by choice. Swarmops seeks to fill that role and provide automatic accounting and cashflow management for such organizations, maintaining hot and cold wallets along with automated invoice and payroll processing. (Imagine invoices being paid on fully automatic, and not needing a €100,000 software package and a fifteen-page bank contract to do so.) There is a huge void to fill here, and Swarmops fills this role in addition to all other back-end management.
Goal #3, functional software to assist civil liberties resistances in repressive regimes: With the swarm functions and the bitcoin-native cash flow in place, a “hidden branch” of organizations can be enabled, where nobody knows the identities of other people in the organization's “hidden branch” swarm except those closest to that individual, but where everybody is still working toward a common goal. Recruiting would take place face-to-face using mobile phones and BitID, and code names would be used for all other purposes. In this way, Swarmops enables large-scale change while able to protect the individuals involved in making that change come about. Lack of information even at the central level provides deniability against rubberhose attacks.
Stable releases are built every six months, at the end of every calendar half-year. Sprints (currently "betas") are built on the 5th of every month, sometimes skipping a month when bigger features are being written. Internal builds are built all the time and can be tested at http://sandbox.swarmops.com/ which doesn't require a login.
This is the plan, at least. "Stable" is a somewhat wide definition at the moment. Rather, Swarmops has a few functions to go to enter Open Beta stage.
Minimum requirements are a 2016+ Debian or Ubuntu LTS. At present (July 2018), this means that the Stretch, Xenial, and Bionic distributions are supported. Further, due to the insane lag of Mono distributions to make it into the official repositories, the most recent Mono is also required. Swarmops will install this for you if you just enable it as detailed below.
If you're daring enough to install a pilot of Swarmops, you're most welcome to do so! It requires Run these commands as root - first, fetch the signing keys for the repositories:
sudo su wget -qO- https://packages.swarmops.com/swarmops-packages.gpg.key | apt-key add - apt-key adv --keyserver hkp://keyserver.ubuntu.com:80 --recv-keys 3FA7E0328081BFF6A14DA29AA6A19B38D3D831EF
Then, add the Swarmops repository to your list of software sources, where [your_distro] is
ubuntu, and [your_distro_version] below is
bionic (Ubuntu) or
echo "deb https://packages.swarmops.com/ [your_distro_version] contrib" > /etc/apt/sources.list.d/swarmops.list echo "deb https://download.mono-project.com/repo/[your_distro] stable-[your-distro-version] main" > /etc/apt/sources.list.d/mono-official-stable.list
Make sure you can retrieve packages over secure connections:
apt install apt-transport-https
Then, run this to install the Swarmops frontend:
apt update; apt install swarmops-frontend
If you installed onto a clean server, Swarmops will offer to configure Apache to use Swarmops as the default site. If you decline this offer, you can still enable the site by an
a2ensite swarmops as a suggested configuration is provided. If you prefer to configure this entirely manually, install a new Virtual Host in Apache, a Mono host, pointing at /usr/share/swarmops/frontend as its directory. We're using /usr/bin/mod-mono-server4 as our server. Note the 4 at the end; many configurators are old and will set a 2 there. See /etc/apache2/sites-available/swarmops.conf for a template file.
Navigate to the new site and continue installation from the running site. To complete the install, you will also need to install a backend process, which can (but shouldn't) run on the same machine; the frontend communicates with the backend through the database and through TCP port 10944:
apt install swarmops-backend
At one point in the installation process, you will be prompted to copy the file
/etc/swarmops/database.config from the server running swarmops-frontend to the server running swarmops-backend. This allows the backend to connect to the database as configured by the installation process. Once you do this, the installation process will detect the running backend and the installation will continue.
If you're running into trouble, or are just curious, see the "detailed install instructions" last in this document.
There's also a Slack workspace (public invite here) and a Facebook group named Swarmops Developers which you may want to join. Yes, Facebook and Slack are both private, and that is bad, but until there's a better alternative, that's where discussions happen.
Use this link to join the Swarmops project on Crowdin at the Proofreader level. There are many languages that still need translation; any one that reaches 50% or more translated with the Menu and Global sections at 100% will be enabled from the Language Selection page.
No, there isn't a "license". This code is completely in the public domain, with the exception of external libraries used. Those are marked as such. In jurisdictions where public domain doesn't exist as a legal concept, the code is under the CC-0 (Creative Commons Zero) license.
That also means that any code you commit to Swarmops, whether by checking in code to this repository or by doing so to forks and then pushing code back here, is irrevocably committed to the public domain.
Beta-6 features progress
Beta-6 will be released on September 5 with string freeze on September 2. Its focus is to increase multicurrency functionality for payouts and bank imports.
- Parameterize the bank file import procedure (big feature!)
- Make it possible to import bank files in non-presentation currency
- Rewrite payment addresses (a new name for this? Account vs. designator?)
- Enable payment destinations, with currency
Beta-7 features progress
Beta-7 will be released on October 5, with string freeze on October 2. Its tentative focus will be Shapeshift integration and possibly an open API exposure.
- Rewrite Bitcoin Cold Storage detection to handle forks, current and future
- Add blockchain-upgrade code that properly splits Core, Cash txs, hashes, accounts
- Write a Pay Invoice page for Bitcoin Cash
- Tie payment identifiers to people and suppliers
Beta-8 will focus on paying to Fiat from the Bitcoin Cash hotwallet.
Overall Beta features checklist
Here are the features still required to exit beta and declare release:
- enter ledger transactions manually
- send invoices (and receive payment in bitcoin)
- delegate budgets
- self-signup mails
- ledger-close screen
There will also be many other small improvements added along with these features, for no better reason than their absence being pain points, since the last alpha:
- Proper org settings
- HTML/Markdown mail
- Mail Resolver
- Expensify integration?
- PDF asynchronous interpreter (websocket?)
- Recurring expenses
- Char encode HTML doc
- Org descriptions (long, short) on self-signup page
- Hotwallet payments
- Tech problem box
- Donate sockify
- Live financial numbers
- Todo box to JSON
- Proper menu highlight
- Basic search
- Account edit spacing
- Alert to load hotwallet from cold
- Bitcoin Echo test page (probably needs to be Bitcoin Cash b/c fees)
- Icons for Validation page
- Favicon New
- Fix Inspect Ledger header (looks bad)
- Clean Login page
- OOBE: Wait for daemons to start
- Impersonation mode for testing
- Expense access
- Assign role geolock
- Advance line spacing
- Upload Org 16x9 logo
- Submit invoice anon interface
- Control messages for invoice progress
- Pay invoice
- Controlify financialtransaction to show on balancetx page
- Close ledger year
- Internal TX account type
- Create TX
- Download main Ledger
- Fix password reset after refactor
Detailed install instructions
This is the exact install procedure for a two-server setup. Two separate servers are strongly recommended for production use; for testing and evaluation, they can be one and the same machine.
Create two clean Ubuntu Xenial or Debian Stretch machines. Call them backend and frontend. They can be in different firewall zones. Install mysql-server on the backend (or on a third server).
Install the repository and its key on both machines. In the commands below, replace the "[xenial/bionic/stretch]" with just xenial, bionic, or stretch, as per your distribution. Same for "[ubuntu/debian]".
sudo su wget -qO- http://packages.swarmops.com/swarmops-packages.gpg.key | apt-key add - apt-key adv --keyserver hkp://keyserver.ubuntu.com:80 --recv-keys 3FA7E0328081BFF6A14DA29AA6A19B38D3D831EF echo deb http://packages.swarmops.com/ [xenial/stretch] contrib > /etc/apt/sources.list.d/swarmops.list echo "deb https://download.mono-project.com/repo/[ubuntu/debian] stable-[xenial/bionic/stretch] main" > /etc/apt/sources.list.d/mono-official-stable.list apt update
- Install the packages "swarmops-frontend" and "swarmops-backend", respectively, on the frontend and backend machine. Make use of as much automation on installing swarmops-frontend as you like, up to and including the autoconfiguration of Apache.
apt install swarmops-frontend
Open a browser and navigate to the swarmops-frontend machine, pass the first no-bot check in the install wizards, and enter database server root credentials. This will create a database and provision it with initial data, which takes a couple of minutes.
If you're not comfortable entering the root credentials into a random app, (optional step) run these commands as root instead at the MySQL/MariaDB prompt to create the database users with the right permissions. Replace the passwords with something of your own choosing:
CREATE DATABASE `Swarmops`; CREATE USER `Swarmops-R` IDENTIFIED BY 'readpassword'; CREATE USER `Swarmops-W` IDENTIFIED BY 'writepassword'; CREATE USER `Swarmops-A` IDENTIFIED BY 'adminpassword'; GRANT SELECT ON mysql.proc TO `Swarmops-W`; GRANT SELECT ON mysql.proc TO `Swarmops-A`; USE `Swarmops`; GRANT ALL ON `Swarmops`.* TO `Swarmops-A`; GRANT SELECT ON `Swarmops`.* TO `Swarmops-W`; GRANT EXECUTE ON `Swarmops`.* TO `Swarmops-W`; GRANT SELECT ON `Swarmops`.* TO `Swarmops-R`; FLUSH PRIVILEGES;
We're using three different users with different privilege sets (read, write, admin) for security purposes; most operations are made using the read-only user, and only database maintenance is done using the account with all privileges. Do note the granting of
select privileges on
mysql.proc for the write and admin user accounts; this is necessary to execute stored procedures because of a design decision way back in MySQL's history.
This will allow you to use the manual account settings in the setup, which is more complicated as you need to fill in twelve fields instead of two, but also doesn't require you to give the webpage the database root password.
The installation will pause here and wait for the backend to come online. This is done by manually copying the now-created
/etc/swarmops/database.configfile from the frontend to the same location on the backend machine.
As the backend daemon detects the presence of a valid
/etc/swarmops/database.configfile, it will open the database (using the credentials of the file - make sure they're also valid for the backend machine, if you're using machine-level permissions!) and write its presence into the database.
The installing frontend process will detect this new entry in the database and proceed to a prompt to create the first user. On entering the credentials, it will login as that user into the Sandbox organization, and the Swarmops instance is operational.
From the Dashboard, the Apache will open a websocket to a daemon running on its own machine on port 12172, and that daemon will in turn open a websocket to the backend daemon on port 10944 (configurable in Admin / System-Wide Settings).
From there, one can play around with the Sandbox organization, or create one or more live organizations.
If one of these steps fails, in particular if the frontend doesn't get to provision the entire database and bring the first user logged in to the Swarmops Desktop, it is currently recommended to restart from two blank servers. Future code will handle more failure scenarios.