nscp -- Control Port
$Header: /cvsroot/aolserver/aolserver/nscgi/nscgi.html,v 1.1 2000/10/04
 22:27:23 kriston Exp $
Theory of Operation
Known Issues
Sample Configuration
Theory of Operation
The nscp module provides remote administration through a simple tclsh-like
 interface.  The user connects to the control port, logs in with a username
 and a password, and types Tcl commands as if he was in any other tclsh. 
 All Tcl commands available to ADPs and Tcl scripts in AOLserver are available
 with this interface.  It is also a very valuable monitoring and debugging
 tool.  The interface to the Tcl interpreter is extremely simple and only
 supports limited telnet control codes and does no terminal emulation.
Known Issues
Although you can type "CTRL-C" and exit the control port, if you started
 any Tcl commands that run forever they will continue running for the live
 of the server session.  This can be useful if you need to run a long index
 process and want to log out right away.
The default installation echos the password to the screen.  If you want to
 suppress the password, set "ns_param echopassword true" in the
 config file.  This option does not work on all platforms which is why it
 is disabled by default.  The password should not be very sensitive since
 you need to connect via localhost to reach the control port on the default
 installation, anyway.
While nscp can listen on any interface, we recommend that you nscp listens
 on localhost (127.0.0.1) so that users who attempt to use the control port
 are already authenticated Unix users.
Sample Configuration
The sample-config.tcl file has logic to set the control port username and
 password at the top of the file.  The default username is "nsadmin" and
 the password is "x".  This is disabled by default but you can re-enable
 it by uncommenting the line.
To create a password, telnet to the control port with "nsadmin" and "x" and
 then type "ns_crypt password salt".  The gibberish that is returned
 goes into the "nscp_user" variable.
# nscp: Uncomment the sample password and log in with "nsadmin", password "x", 
#       type "ns_crypt newpassword salt" and put the encrypted string below. 
set nscp_port 9999 
set nscp_addr 127.0.0.1 
set nscp_user "" 
#set nscp_user "nsadmin:t2GqvvaiIUbF2:" ;# sample user="nsadmin", pw="x". 
# 
# Control port -- nscp 
# 
#  nscp does not load unless nscp_user is a valid user. 
# 
ns_section "ns/server/${servername}/module/nscp" 
ns_param   port            $nscp_port 
ns_param   address         $nscp_addr 
 
ns_section "ns/server/${servername}/module/nscp/users" 
ns_param   user            $nscp_user