Security News
Research
Data Theft Repackaged: A Case Study in Malicious Wrapper Packages on npm
The Socket Research Team breaks down a malicious wrapper package that uses obfuscation to harvest credentials and exfiltrate sensitive data.
This is the GNS3 server repository.
The GNS3 server manages emulators such as Dynamips, VirtualBox or Qemu/KVM. Clients like the GNS3 GUI and the GNS3 Web UI control the server using an HTTP REST API.
In addition of Python dependencies listed in a section below, other software may be required, recommended or optional.
Docker support needs the script program (bsdutils or util-linux package), when running a docker VM and a static busybox during installation (python3 setup.py install / pip3 install / package creation).
master is the next stable release, you can test it in your day to day activities. Bug fixes or small improvements pull requests go here.
Next major release
Never use this branch for production. Pull requests for major new features go here.
GNS3 is perhaps packaged for your distribution:
The following instructions have been tested with Ubuntu and Mint. You must be connected to the Internet in order to install the dependencies.
Dependencies:
The following commands will install some of these dependencies:
sudo apt-get install python3-setuptools python3-pip
Finally, these commands will install the server as well as the rest of the dependencies:
cd gns3-server-master
python3 -m pip install -r requirements.txt
python3 -m pip install .
gns3server
To run tests use:
python3 -m pytest tests
For development, you can run the GNS3 server in a container
bash scripts/docker_dev_server.sh
You will find init sample scripts for various systems inside the init directory.
Useful options:
--daemon
: start process as a daemon--log logfile
: store output in a logfile--pid pidfile
: store the pid of the running process in a file and
prevent double executionAll init scripts require the creation of a GNS3 user. You can change it to another user.
sudo adduser gns3
For ubuntu < 15.04
You need to copy init/gns3.conf.upstart to /etc/init/gns3.conf
sudo chown root /etc/init/gns3.conf
sudo service gns3 start
You need to copy init/gns3.service.systemd to /lib/systemd/system/gns3.service
sudo chown root /lib/systemd/system/gns3.service
sudo systemctl start gns3
Please use our all-in-one installer to install the stable build.
If you install via source you need to first install:
Then you can call
python setup.py install
to install the remaining dependencies.
To run the tests, you also need to call
pip install pytest pytest-capturelog
before actually running the tests with
python setup.py test
or with
py.test -v
Please use our DMG package for a simple installation.
If you want to test the current git version or contribute to the project, you can follow these instructions with virtualenvwrapper: http://virtualenvwrapper.readthedocs.org/ and homebrew: http://brew.sh/.
brew install python3
mkvirtualenv gns3-server --python=/usr/local/bin/python3.5
python3 setup.py install
gns3server
If you want enable SSL support on GNS3 you can generate a self signed certificate:
bash gns3server/cert_utils/create_cert.sh
This command will put the files in ~/.config/GNS3/ssl
After you can start the server in SSL mode with:
python gns3server/main.py --certfile ~/.config/GNS3/ssl/server.cert --certkey ~/.config/GNS3/ssl/server.key --ssl
Or in your gns3_server.conf by adding in the Server section:
[Server]
certfile=/Users/noplay/.config/GNS3/ssl/server.cert
certkey=/Users/noplay/.config/GNS3/ssl/server.key
ssl=True
Just run:
py.test -vv
If you want test coverage:
py.test --cov-report term-missing --cov=gns3server
Please contact us using contact form available here: http://docs.gns3.com/1ON9JBXSeR7Nt2-Qum2o3ZX0GU86BZwlmNSUgvmqNWGY/index.html
FAQs
GNS3 server
We found that gns3-server demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 2 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
Research
The Socket Research Team breaks down a malicious wrapper package that uses obfuscation to harvest credentials and exfiltrate sensitive data.
Research
Security News
Attackers used a malicious npm package typosquatting a popular ESLint plugin to steal sensitive data, execute commands, and exploit developer systems.
Security News
The Ultralytics' PyPI Package was compromised four times in one weekend through GitHub Actions cache poisoning and failure to rotate previously compromised API tokens.