Skip to content
Alexander Bock edited this page Jan 1, 2023 · 32 revisions

The core functionality of C-Troll is split into two applications, the Tray, which is an application that has to be running on every computer that should be able to start an application. The second application is C-Troll which is the controlling application to a number of Tray applications.

The C-Troll application will create JSON messages that are sent to the Tray applications that will instruct the Tray to execute a specific command. The most common commands are to start or to exit a program. Nodes controlled by C-Troll are organized as clusters, in which a node can belong to any number of clusters. If the secret key is specified in the configuration file of the Tray or any Node of the C-Troll application, that application encrypts and decrypts all of it's traffic between the Tray and the C-Troll using that secret as a password. This means that strange error messages might arrive (mostly complaining about unknown message types), if a wrong password is being used. See below for more information.

Configuration

Communication

REST

Clone this wiki locally