├── .dockerignore ├── .github ├── dependabot.yml └── workflows │ ├── automerge.yml │ └── docker-publish.yml ├── root ├── etc │ ├── services.d │ │ └── transmission │ │ │ └── run │ └── cont-init.d │ │ └── 20-config └── defaults │ ├── blocklist-update.sh │ └── settings.json ├── patches ├── 003-random-announce.patch ├── 001-skip-hash-checking.patch └── 002-fdlimit.patch ├── Dockerfile ├── README.md └── LICENSE /.dockerignore: -------------------------------------------------------------------------------- 1 | .git 2 | .gitignore 3 | .github 4 | .gitattributes 5 | LICENSE 6 | README.md 7 | -------------------------------------------------------------------------------- /.github/dependabot.yml: -------------------------------------------------------------------------------- 1 | version: 2 2 | updates: 3 | - package-ecosystem: 'github-actions' 4 | directory: '/' 5 | schedule: 6 | interval: 'daily' 7 | -------------------------------------------------------------------------------- /.github/workflows/automerge.yml: -------------------------------------------------------------------------------- 1 | name: automerge 2 | on: pull_request 3 | 4 | jobs: 5 | automerge: 6 | runs-on: ubuntu-latest 7 | permissions: 8 | pull-requests: write 9 | contents: write 10 | steps: 11 | - uses: fastify/github-action-merge-dependabot@v3 12 | with: 13 | github-token: ${{ secrets.GITHUB_TOKEN }} 14 | -------------------------------------------------------------------------------- /root/etc/services.d/transmission/run: -------------------------------------------------------------------------------- 1 | #!/usr/bin/with-contenv bash 2 | 3 | _term() { 4 | echo "Caught SIGTERM signal!" 5 | echo "Tell the transmission session to shut down." 6 | pid=$(pidof transmission-daemon) 7 | if [ ! -z "$USER" ] && [ ! -z "$PASS" ]; then 8 | /usr/bin/transmission-remote -n "$USER":"$PASS" --exit 9 | else 10 | /usr/bin/transmission-remote --exit 11 | fi 12 | # terminate when the transmission-daemon process dies 13 | tail --pid=${pid} -f /dev/null 14 | } 15 | 16 | trap _term SIGTERM 17 | 18 | s6-setuidgid abc /usr/bin/transmission-daemon \ 19 | -g /config -c /watch -f & 20 | 21 | wait 22 | -------------------------------------------------------------------------------- /root/defaults/blocklist-update.sh: -------------------------------------------------------------------------------- 1 | #!/usr/bin/with-contenv bash 2 | 3 | BLOCKLIST_ENABLED=`jq -r '.["blocklist-enabled"]' /config/settings.json` 4 | BLOCKLIST_URL=`jq -r '.["blocklist-url"]' /config/settings.json | sed 's/\&/\&/g'` 5 | 6 | if [ $BLOCKLIST_ENABLED == true ]; then 7 | mkdir -p /tmp/blocklists 8 | rm -rf /tmp/blocklists/* 9 | cd /tmp/blocklists 10 | wget -q -O blocklist.gz "$BLOCKLIST_URL" 11 | if [ $? == 0 ]; then 12 | gunzip *.gz 13 | if [ $? == 0 ]; then 14 | chmod go+r * 15 | rm -rf /config/blocklists/* 16 | cp /tmp/blocklists/* /config/blocklists 17 | s6-svc -t /var/run/s6/services/transmission 18 | fi 19 | fi 20 | fi 21 | -------------------------------------------------------------------------------- /root/etc/cont-init.d/20-config: -------------------------------------------------------------------------------- 1 | #!/usr/bin/with-contenv bash 2 | 3 | # make folders 4 | mkdir -p \ 5 | /downloads/{complete,incomplete} /watch 6 | 7 | # copy config 8 | [[ ! -f /config/settings.json ]] && cp \ 9 | /defaults/settings.json /config/settings.json 10 | 11 | if [ ! -z "$USER" ] && [ ! -z "$PASS" ]; then 12 | sed -i '/rpc-authentication-required/c\ "rpc-authentication-required": true,' /config/settings.json 13 | sed -i "/rpc-username/c\ \"rpc-username\": \"$USER\"," /config/settings.json 14 | sed -i "/rpc-password/c\ \"rpc-password\": \"$PASS\"," /config/settings.json 15 | else 16 | sed -i '/rpc-authentication-required/c\ "rpc-authentication-required": false,' /config/settings.json 17 | sed -i "/rpc-username/c\ \"rpc-username\": \"$USER\"," /config/settings.json 18 | sed -i "/rpc-password/c\ \"rpc-password\": \"$PASS\"," /config/settings.json 19 | fi 20 | 21 | if [ ! -z "$WHITELIST" ]; then 22 | sed -i '/rpc-whitelist-enabled/c\ "rpc-whitelist-enabled": true,' /config/settings.json 23 | sed -i "/\"rpc-whitelist\"/c\ \"rpc-whitelist\": \"$WHITELIST\"," /config/settings.json 24 | else 25 | sed -i '/rpc-whitelist-enabled/c\ "rpc-whitelist-enabled": false,' /config/settings.json 26 | sed -i "/\"rpc-whitelist\"/c\ \"rpc-whitelist\": \"$WHITELIST\"," /config/settings.json 27 | fi 28 | 29 | if [ ! -z "$HOST_WHITELIST" ]; then 30 | sed -i '/rpc-host-whitelist-enabled/c\ "rpc-host-whitelist-enabled": true,' /config/settings.json 31 | sed -i "/\"rpc-host-whitelist\"/c\ \"rpc-host-whitelist\": \"$HOST_WHITELIST\"," /config/settings.json 32 | else 33 | sed -i '/rpc-host-whitelist-enabled/c\ "rpc-host-whitelist-enabled": false,' /config/settings.json 34 | sed -i "/\"rpc-host-whitelist\"/c\ \"rpc-host-whitelist\": \"$HOST_WHITELIST\"," /config/settings.json 35 | fi 36 | 37 | 38 | # permissions 39 | chown abc:abc \ 40 | /config/settings.json \ 41 | /downloads \ 42 | /downloads/complete \ 43 | /downloads/incomplete \ 44 | /watch 45 | -------------------------------------------------------------------------------- /patches/003-random-announce.patch: -------------------------------------------------------------------------------- 1 | From 86b0f3470e930bbda2b10b8188821a38cc72968c Mon Sep 17 00:00:00 2001 2 | From: lps-rocks 3 | Date: Wed, 26 Jun 2019 21:17:08 -0400 4 | Subject: [PATCH 1/2] Skew Scrape/Announce intervals +/- up to 5% 5 | Subject: [PATCH 2/2] Remove unnecessary line 6 | 7 | This will help prevent slamming trackers that may not be returning a randomized announce/scrape interval. 8 | --- 9 | libtransmission/announcer.c | 10 +++++++--- 10 | 1 file changed, 7 insertions(+), 3 deletions(-) 11 | 12 | diff --git a/libtransmission/announcer.c b/libtransmission/announcer.c 13 | index 193d716a1..96ca4534c 100644 14 | --- libtransmission/announcer.c 15 | +++ libtransmission/announcer.c 16 | @@ -1244,9 +1244,11 @@ 17 | then a separate scrape isn't needed */ 18 | if (scrape_fields >= 3 || (scrape_fields >= 1 && tracker->scrape_info == NULL)) 19 | { 20 | + i = round(tier->scrapeIntervalSec * 0.95) + 21 | + tr_rand_int_weak(round(tier->scrapeIntervalSec * 0.1)); 22 | tr_logAddTorDbg(tier->tor, "Announce response contained scrape info; " 23 | - "rescheduling next scrape to %d seconds from now.", tier->scrapeIntervalSec); 24 | - tier->scrapeAt = get_next_scrape_time(announcer->session, tier, tier->scrapeIntervalSec); 25 | + "rescheduling next scrape to %d seconds from now.", i); 26 | + tier->scrapeAt = get_next_scrape_time(announcer->session, tier, i); 27 | tier->lastScrapeTime = now; 28 | tier->lastScrapeSucceeded = true; 29 | } 30 | @@ -1271,8 +1273,9 @@ 31 | if (!isStopped && tier->announce_event_count == 0) 32 | { 33 | /* the queue is empty, so enqueue a perodic update */ 34 | - i = tier->announceIntervalSec; 35 | - dbgmsg(tier, "Sending periodic reannounce in %d seconds", i); 36 | + i = round(tier->announceIntervalSec * 0.95) + 37 | + tr_rand_int_weak(round(tier->announceIntervalSec * 0.1)); 38 | + tr_logAddTorDbg(tier->tor, "Sending periodic reannounce in %d seconds", i); 39 | tier_announce_event_push(tier, TR_ANNOUNCE_EVENT_NONE, now + i); 40 | } 41 | } 42 | -------------------------------------------------------------------------------- /root/defaults/settings.json: -------------------------------------------------------------------------------- 1 | { 2 | "alt-speed-down": 50, 3 | "alt-speed-enabled": false, 4 | "alt-speed-time-begin": 540, 5 | "alt-speed-time-day": 127, 6 | "alt-speed-time-enabled": false, 7 | "alt-speed-time-end": 1020, 8 | "alt-speed-up": 50, 9 | "bind-address-ipv4": "0.0.0.0", 10 | "bind-address-ipv6": "::", 11 | "blocklist-enabled": false, 12 | "blocklist-url": "http://www.example.com/blocklist", 13 | "cache-size-mb": 4, 14 | "dht-enabled": true, 15 | "download-dir": "/downloads/complete", 16 | "download-queue-enabled": true, 17 | "download-queue-size": 5, 18 | "encryption": 1, 19 | "idle-seeding-limit": 30, 20 | "idle-seeding-limit-enabled": false, 21 | "incomplete-dir": "/downloads/incomplete", 22 | "incomplete-dir-enabled": true, 23 | "lpd-enabled": false, 24 | "message-level": 2, 25 | "peer-congestion-algorithm": "", 26 | "peer-id-ttl-hours": 6, 27 | "peer-limit-global": 200, 28 | "peer-limit-per-torrent": 50, 29 | "peer-port": 51413, 30 | "peer-port-random-high": 65535, 31 | "peer-port-random-low": 49152, 32 | "peer-port-random-on-start": false, 33 | "peer-socket-tos": "default", 34 | "pex-enabled": true, 35 | "port-forwarding-enabled": true, 36 | "preallocation": 1, 37 | "prefetch-enabled": 1, 38 | "queue-stalled-enabled": true, 39 | "queue-stalled-minutes": 30, 40 | "ratio-limit": 2, 41 | "ratio-limit-enabled": false, 42 | "rename-partial-files": true, 43 | "rpc-authentication-required": false, 44 | "rpc-bind-address": "0.0.0.0", 45 | "rpc-enabled": true, 46 | "rpc-password": "{1ddd3f1f6a71d655cde7767242a23a575b44c909n5YuRT.f", 47 | "rpc-port": 9091, 48 | "rpc-url": "/transmission/", 49 | "rpc-username": "", 50 | "rpc-host-whitelist": "127.0.0.1", 51 | "rpc-host-whitelist-enabled": false, 52 | "rpc-whitelist": "127.0.0.1", 53 | "rpc-whitelist-enabled": false, 54 | "scrape-paused-torrents-enabled": true, 55 | "script-torrent-done-enabled": false, 56 | "script-torrent-done-filename": "", 57 | "seed-queue-enabled": false, 58 | "seed-queue-size": 10, 59 | "speed-limit-down": 100, 60 | "speed-limit-down-enabled": false, 61 | "speed-limit-up": 100, 62 | "speed-limit-up-enabled": false, 63 | "start-added-torrents": true, 64 | "trash-original-torrent-files": false, 65 | "umask": 2, 66 | "upload-slots-per-torrent": 14, 67 | "utp-enabled": false, 68 | "watch-dir": "/watch", 69 | "watch-dir-enabled": true 70 | } 71 | -------------------------------------------------------------------------------- /patches/001-skip-hash-checking.patch: -------------------------------------------------------------------------------- 1 | --- libtransmission/rpcimpl.c 2020-05-22 19:04:23.391804861 +0800 2 | +++ libtransmission/rpcimpl.c 2020-05-22 19:04:23.391804861 +0800 3 | @@ -32,6 +32,7 @@ 4 | #include "tr-macros.h" 5 | #include "utils.h" 6 | #include "variant.h" 7 | +#include "verify.h" 8 | #include "version.h" 9 | #include "web.h" 10 | 11 | @@ -363,6 +364,8 @@ 12 | struct tr_rpc_idle_data* idle_data UNUSED) 13 | { 14 | TR_ASSERT(idle_data == NULL); 15 | + 16 | + tr_skipHash (); 17 | 18 | int torrentCount; 19 | tr_torrent** torrents = getTorrents(session, args_in, &torrentCount); 20 | --- libtransmission/verify.h 2020-05-22 19:04:23.394804884 +0800 21 | +++ libtransmission/verify.h 2020-05-22 19:04:23.394804884 +0800 22 | @@ -17,6 +17,8 @@ 23 | * @{ 24 | */ 25 | 26 | +void tr_skipHash(void); 27 | + 28 | void tr_verifyAdd(tr_torrent* tor, tr_verify_done_func callback_func, void* callback_user_data); 29 | 30 | void tr_verifyRemove(tr_torrent* tor); 31 | --- libtransmission/verify.c 2020-05-22 19:04:23.394804884 +0800 32 | +++ libtransmission/verify.c 2020-05-22 19:04:23.394804884 +0800 33 | @@ -30,6 +30,12 @@ 34 | MSEC_TO_SLEEP_PER_SECOND_DURING_VERIFY = 100 35 | }; 36 | 37 | +static bool skipHashCheck = false; 38 | +void tr_skipHash(void) 39 | +{ 40 | + skipHashCheck = true; 41 | +} 42 | + 43 | static bool verifyTorrent(tr_torrent* tor, bool* stopFlag) 44 | { 45 | time_t end; 46 | @@ -66,7 +72,7 @@ 47 | } 48 | 49 | /* if we're starting a new file... */ 50 | - if (filePos == 0 && fd == TR_BAD_SYS_FILE && fileIndex != prevFileIndex) 51 | + if (!skipHashCheck && filePos == 0 && fd == TR_BAD_SYS_FILE && fileIndex != prevFileIndex) 52 | { 53 | char* filename = tr_torrentFindFile(tor, fileIndex); 54 | fd = filename == NULL ? TR_BAD_SYS_FILE : tr_sys_file_open(filename, TR_SYS_FILE_READ | TR_SYS_FILE_SEQUENTIAL, 0, 55 | @@ -86,7 +92,7 @@ 56 | { 57 | uint64_t numRead; 58 | 59 | - if (tr_sys_file_read_at(fd, buffer, bytesThisPass, filePos, &numRead, NULL) && numRead > 0) 60 | + if (!skipHashCheck && tr_sys_file_read_at(fd, buffer, bytesThisPass, filePos, &numRead, NULL) && numRead > 0) 61 | { 62 | bytesThisPass = numRead; 63 | tr_sha1_update(sha, buffer, bytesThisPass); 64 | @@ -108,7 +114,7 @@ 65 | uint8_t hash[SHA_DIGEST_LENGTH]; 66 | 67 | tr_sha1_final(sha, hash); 68 | - hasPiece = memcmp(hash, tor->info.pieces[pieceIndex].hash, SHA_DIGEST_LENGTH) == 0; 69 | + hasPiece = skipHashCheck || memcmp(hash, tor->info.pieces[pieceIndex].hash, SHA_DIGEST_LENGTH) == 0; 70 | 71 | if (hasPiece || hadPiece) 72 | { 73 | @@ -146,6 +152,12 @@ 74 | filePos = 0; 75 | } 76 | } 77 | + 78 | + if (skipHashCheck) 79 | + { 80 | + skipHashCheck = false; 81 | + tr_logAddTorInfo (tor, "%s", _("Skipped hash check")); 82 | + } 83 | 84 | /* cleanup */ 85 | if (fd != TR_BAD_SYS_FILE) 86 | -------------------------------------------------------------------------------- /.github/workflows/docker-publish.yml: -------------------------------------------------------------------------------- 1 | name: Publish to Docker registry 2 | 3 | # This workflow uses actions that are not certified by GitHub. 4 | # They are provided by a third-party and are governed by 5 | # separate terms of service, privacy policy, and support 6 | # documentation. 7 | 8 | on: 9 | workflow_dispatch: 10 | 11 | env: 12 | # Use docker.io for Docker Hub if empty 13 | REGISTRY: ghcr.io 14 | # github.repository as / 15 | IMAGE_NAME: transmission-skip-hash-check 16 | 17 | 18 | jobs: 19 | build: 20 | 21 | runs-on: ubuntu-latest 22 | permissions: 23 | contents: read 24 | packages: write 25 | 26 | steps: 27 | - name: Checkout repository 28 | uses: actions/checkout@v6 29 | 30 | - name: Set up QEMU 31 | uses: docker/setup-qemu-action@v3 32 | 33 | - name: Set up Docker Buildx 34 | uses: docker/setup-buildx-action@v3 35 | 36 | # Login against a Docker registry except on PR 37 | # https://github.com/docker/login-action 38 | - name: Log into DockerHub 39 | if: github.event_name != 'pull_request' 40 | uses: docker/login-action@v3 41 | with: 42 | username: ${{ secrets.DOCKER_USERNAME }} 43 | password: ${{ secrets.DOCKER_TOKEN }} 44 | 45 | # Login against a Docker registry except on PR 46 | # https://github.com/docker/login-action 47 | - name: Log into GitHub Container Registry 48 | if: github.event_name != 'pull_request' 49 | uses: docker/login-action@v3 50 | with: 51 | registry: ${{ env.REGISTRY }} 52 | username: ${{ github.repository_owner }} 53 | password: ${{ secrets.GITHUB_TOKEN }} 54 | 55 | # Extract metadata (tags, labels) for Docker 56 | # https://github.com/docker/metadata-action 57 | - name: Extract Docker metadata 58 | id: meta 59 | uses: docker/metadata-action@v5 60 | with: 61 | images: | 62 | ${{ secrets.DOCKER_USERNAME }}/${{ env.IMAGE_NAME }} 63 | ${{ env.REGISTRY }}/${{ github.repository_owner }}/${{ env.IMAGE_NAME }} 64 | tags: | 65 | type=raw,value=latest,enable=${{ endsWith(github.ref, github.event.repository.default_branch) }} 66 | type=ref,event=branch,enable=${{ !endsWith(github.ref, github.event.repository.default_branch) }} 67 | flavor: latest=false 68 | 69 | # Build and push Docker image with Buildx (don't push on PR) 70 | # https://github.com/docker/build-push-action 71 | - name: Build and push Docker image 72 | uses: docker/build-push-action@v6 73 | with: 74 | context: . 75 | push: ${{ github.event_name != 'pull_request' }} 76 | platforms: linux/amd64,linux/arm64,linux/arm/v7 77 | tags: ${{ steps.meta.outputs.tags }} 78 | labels: ${{ steps.meta.outputs.labels }} 79 | cache-from: type=gha, scope=${{ github.workflow }} 80 | cache-to: type=gha, mode=max, scope=${{ github.workflow }} 81 | 82 | - name: Docker Hub Description 83 | uses: peter-evans/dockerhub-description@v5 84 | if: github.ref == 'refs/heads/master' 85 | with: 86 | username: ${{ secrets.DOCKER_USERNAME }} 87 | password: ${{ secrets.DOCKER_PASSWORD }} 88 | repository: ${{ secrets.DOCKER_USERNAME }}/${{ env.IMAGE_NAME }} 89 | short-description: ${{ github.event.repository.description }} 90 | -------------------------------------------------------------------------------- /Dockerfile: -------------------------------------------------------------------------------- 1 | FROM ubuntu:focal AS builder 2 | 3 | # set version label 4 | ARG BUILD_DATE 5 | ARG VERSION 6 | ARG DEBIAN_FRONTEND=noninteractive 7 | LABEL build_version="transmission-skip-hash version:- ${VERSION} Build-date:- ${BUILD_DATE}" 8 | LABEL maintainer="TonyRL" 9 | 10 | COPY root/ /s6-config 11 | # install packages 12 | RUN \ 13 | echo "**** install packages ****" && \ 14 | apt update && \ 15 | apt install -qqy \ 16 | apt-utils \ 17 | build-essential \ 18 | curl \ 19 | intltool \ 20 | libcurl4-openssl-dev \ 21 | libevent-dev \ 22 | libminiupnpc-dev \ 23 | libssl-dev \ 24 | libtool \ 25 | pkg-config \ 26 | unzip \ 27 | zlib1g-dev && \ 28 | mkdir /transmission-build && \ 29 | cd /transmission-build && \ 30 | 31 | echo "**** download transmission ****" && \ 32 | curl -O https://raw.githubusercontent.com/transmission/transmission-releases/master/transmission-3.00.tar.xz && \ 33 | tar Jxf transmission-3.00.tar.xz && \ 34 | cd transmission-3.00 && \ 35 | 36 | echo "**** download patch ****" && \ 37 | mkdir patches && \ 38 | curl https://raw.githubusercontent.com/TonyRL/docker-transmission-skip-hash-check/focal/patches/001-skip-hash-checking.patch \ 39 | -o patches/001-skip-hash-checking.patch && \ 40 | curl https://raw.githubusercontent.com/TonyRL/docker-transmission-skip-hash-check/focal/patches/002-fdlimit.patch \ 41 | -o patches/002-fdlimit.patch && \ 42 | curl https://raw.githubusercontent.com/TonyRL/docker-transmission-skip-hash-check/focal/patches/003-random-announce.patch \ 43 | -o patches/003-random-announce.patch && \ 44 | 45 | echo "**** apply patch ****" && \ 46 | patch -N -p0 < patches/001-skip-hash-checking.patch && \ 47 | patch -N -p0 < patches/002-fdlimit.patch && \ 48 | patch -N -p0 < patches/003-random-announce.patch && \ 49 | 50 | echo "**** setup artifact folder ****" && \ 51 | mkdir build && \ 52 | cd build && \ 53 | 54 | echo "**** compile checks ****" && \ 55 | ../autogen.sh --enable-daemon --disable-nls && \ 56 | echo "**** compile start ****" && \ 57 | make -j$(nproc) && \ 58 | echo "**** compile finish ****" && \ 59 | make install && \ 60 | 61 | echo "**** setup default web interface + transmission-web-control ****" && \ 62 | cp -rp /usr/local/share/transmission/web /web && \ 63 | cd / && \ 64 | curl -O https://codeload.github.com/ronggang/transmission-web-control/zip/master && \ 65 | unzip -q master && \ 66 | rm master && \ 67 | mv /transmission-web-control-master/src/ /transmission-web-control/ && \ 68 | rm -rf /transmission-web-control-master/ && \ 69 | cd / && \ 70 | 71 | echo "**** cleanup ****" && \ 72 | apt clean && \ 73 | rm -rf /transmission-build && \ 74 | echo "**** finish ****" 75 | 76 | FROM lsiobase/ubuntu:focal AS build 77 | 78 | RUN \ 79 | echo "**** install packages ****" && \ 80 | apt update && \ 81 | apt install -qqy \ 82 | libcurl4 \ 83 | libevent-2.1-7 \ 84 | libminiupnpc17 \ 85 | libnatpmp1 && \ 86 | echo "**** cleanup ****" && \ 87 | apt clean 88 | 89 | # copy local files 90 | COPY --from=builder /usr/local/bin/ /usr/bin/ 91 | COPY --from=builder /web /web 92 | COPY --from=builder /transmission-web-control /transmission-web-control 93 | COPY --from=builder /s6-config / 94 | 95 | RUN \ 96 | echo "**** setup web interface ****" && \ 97 | mkdir /usr/local/share/transmission && \ 98 | ln -s /web/ /usr/local/share/transmission/web && \ 99 | ln -s /web/index.html /transmission-web-control/index.original.html && \ 100 | ln -s /web/images/ /transmission-web-control/images && \ 101 | ln -s /web/javascript/ /transmission-web-control/javascript && \ 102 | ln -s /web/style/ /transmission-web-control/style 103 | 104 | # ports and volumes 105 | EXPOSE 9091 51413 51413/udp 106 | VOLUME /config /downloads /watch 107 | -------------------------------------------------------------------------------- /README.md: -------------------------------------------------------------------------------- 1 | # docker-transmission-skip-hash 2 | 3 | A Ubuntu based container images for [Transmission](https://www.transmissionbt.com/) with [customized features](https://github.com/TonyRL/docker-transmission-skip-hash-check/#customized-features). 4 | 5 | * Compatible with well-known [linuxserver/transmission](https://hub.docker.com/r/linuxserver/transmission) 6 | * Optional feature-rich Web UI [ronggang/transmission-web-control](https://github.com/ronggang/transmission-web-control) 7 | * Weekly base OS updates from [upstream](https://github.com/linuxserver/docker-baseimage-ubuntu) 8 | 9 | ![GitHub Repo stars](https://img.shields.io/github/stars/tonyrl/docker-transmission-skip-hash-check?style=for-the-badge) 10 | [![Docker Pulls](https://img.shields.io/docker/pulls/tonyrl/transmission-skip-hash-check?style=for-the-badge)]((https://hub.docker.com/r/tonyrl/transmission-skip-hash-check/)) 11 | 12 | ## Customized Features 13 | 14 | * Skip hash check ([details](https://github.com/TonyRL/docker-transmission-skip-hash-check#how-to-skip-hash-check)) 15 | * Lift 1024 open files limit (backport [transmission/transmission#893](https://github.com/transmission/transmission/pull/893)) 16 | * Skew Scrape/Announce intervals (backport [transmission/transmission#936](https://github.com/transmission/transmission/pull/936)) 17 | 18 | ## Support Version 19 | 20 | | Transmission Release | Base OS | Tag | Size | 21 | | :--------------------: |:-------------:| :---:| :----:| 22 | | 3.00 | Ubuntu 20.04 LTS | `focal`, `latest` | ![Docker Image Size (tag)](https://img.shields.io/docker/image-size/tonyrl/transmission-skip-hash-check/focal?style=flat-square) 23 | | 3.00 | Ubuntu 18.04 LTS | `bionic-v3` | ![Docker Image Size (tag)](https://img.shields.io/docker/image-size/tonyrl/transmission-skip-hash-check/bionic-v3?style=flat-square) 24 | | 2.94 | Ubuntu 18.04 LTS | `bionic-v2.94` | ![Docker Image Size (tag)](https://img.shields.io/docker/image-size/tonyrl/transmission-skip-hash-check/bionic-v2.94?style=flat-square) 25 | 26 | ## Support Architectures 27 | 28 | `x86-64` only 29 | 30 | `linux/arm64/v8 (arm64)` and `linux/arm/v7` are provided on an as is basis. 31 | 32 | ## Usage 33 | 34 | ### docker-composer 35 | 36 | ```yaml 37 | --- 38 | version: "2.1" 39 | services: 40 | transmission: 41 | image: tonyrl/transmission-skip-hash-check 42 | container_name: transmission 43 | environment: 44 | - PUID=1000 45 | - PGID=1000 46 | - TZ=Europe/London 47 | - TRANSMISSION_WEB_HOME=/transmission-web-control/ #optional 48 | - USER=username #optional 49 | - PASS=password #optional 50 | - WHITELIST=iplist #optional 51 | volumes: 52 | - :/config 53 | - :/downloads 54 | - :/watch 55 | ports: 56 | - 9091:9091 57 | - 51413:51413 58 | - 51413:51413/udp 59 | restart: unless-stopped 60 | ``` 61 | 62 | ### docker-cli 63 | 64 | ```shell 65 | docker run -d \ 66 | --name=transmission \ 67 | -e PUID=1000 \ 68 | -e PGID=1000 \ 69 | -e TZ=Europe/London \ 70 | -e TRANSMISSION_WEB_HOME=/transmission-web-control/ `#optional` \ 71 | -e USER=username `#optional` \ 72 | -e PASS=password `#optional` \ 73 | -e WHITELIST=iplist `#optional` \ 74 | -p 9091:9091 \ 75 | -p 51413:51413 \ 76 | -p 51413:51413/udp \ 77 | -v :/config \ 78 | -v :/downloads \ 79 | -v :/watch \ 80 | --restart unless-stopped \ 81 | tonyrl/transmission-skip-hash-check 82 | ``` 83 | 84 | ### Parameters 85 | 86 | | Parameter | Function | 87 | | :----: | --- | 88 | | `-p 9091` | WebUI | 89 | | `-p 51413` | Torrent Port TCP | 90 | | `-p 51413/udp` | Torrent Port UDP | 91 | | `-e PUID=1000` | UserID | 92 | | `-e PGID=1000` | GroupID | 93 | | `-e TZ=Europe/London` | Specify a timezone. [Time Zones list](https://en.wikipedia.org/wiki/List_of_tz_database_time_zones#List) | 94 | | `-e TRANSMISSION_WEB_HOME=/transmission-web-control/` | Use [transmission-web-control](https://github.com/ronggang/transmission-web-control). (**optional**) | 95 | | `-e USER=username` | Specify an **optional** username for the interface | 96 | | `-e PASS=password` | Specify an **optional** password for the interface | 97 | | `-e WHITELIST=iplist` | Specify an **optional** list of comma separated host whitelist | 98 | | `-v /config` | Where transmission should store config files and logs. | 99 | | `-v /downloads` | Local path for downloads. | 100 | | `-v /watch` | Watch folder for torrent files. | 101 | 102 | ### How to skip hash check 103 | 104 | In the web interface http://ip:9091/transmission/web/ or [Transmission Remote GUI](https://github.com/transmission-remote-gui/transgui). Right click on ANY SEEDING torrent, choose `Ask tracker for more peers` (or tick ANY torrent and click the ![Ask tracker for more peers](https://user-images.githubusercontent.com/11386903/134805662-c52dfc85-1b80-40cf-8674-5780071a7c85.PNG) icon 105 | in the toolbar) and the CURRENT verifying torrent will be skipped for hash check. (Taken from [here](https://github.com/superlukia/transmission-2.92_skiphashcheck#how-to-use)) 106 | 107 | ## Notes 108 | 109 | Alternative Web UI such as [endor/kettu](https://github.com/endor/kettu) and [Secretmapper/combustion](https://github.com/Secretmapper/combustion) are dropped. If you want them back or want me to include other Web UI like [killemov/Shift](https://github.com/killemov/Shift), please raise an issue. 110 | 111 | Since this image is LinuxServer based, [Docker Mods](https://github.com/linuxserver/docker-mods) from [LinuxServer.io](https://github.com/linuxserver/docker-mods) are also available. 112 | 113 | For further documentation, you can check out [linuxserver/transmission](https://hub.docker.com/r/linuxserver/transmission) and [docs.linuxserver.io](https://docs.linuxserver.io/) 114 | 115 | ## Credits 116 | 117 | [blackyau/Transmission_SkipHashChek](https://github.com/blackyau/Transmission_SkipHashChek/) 118 | 119 | [linuxserver/docker-transmission](https://github.com/linuxserver/docker-transmission) 120 | 121 | [superlukia/transmission-2.92_skiphashcheck](https://github.com/superlukia/transmission-2.92_skiphashcheck) 122 | -------------------------------------------------------------------------------- /patches/002-fdlimit.patch: -------------------------------------------------------------------------------- 1 | From 907f368360ae8514e7d4652b999a00a3cf9c6741 Mon Sep 17 00:00:00 2001 2 | From: Vitaly Potyarkin 3 | Date: Fri, 14 Jun 2019 14:49:26 +0300 4 | Subject: [PATCH] Lift 1024 open files limit (switch to curl polling API) 5 | 6 | Backported from https://github.com/transmission/transmission/pull/893 7 | --- 8 | CMakeLists.txt | 2 +- 9 | configure.ac | 2 +- 10 | 11 | diff --git a/CMakeLists.txt b/CMakeLists.txt 12 | index da28e31..c2e4ec2 100644 13 | --- CMakeLists.txt 14 | +++ CMakeLists.txt 15 | @@ -97,7 +97,7 @@ 16 | 17 | set_property(GLOBAL PROPERTY USE_FOLDERS ON) 18 | 19 | -set(CURL_MINIMUM 7.15.4) 20 | +set(CURL_MINIMUM 7.28.0) 21 | set(EVENT2_MINIMUM 2.0.10) 22 | set(OPENSSL_MINIMUM 0.9.7) 23 | set(CYASSL_MINIMUM 3.0) 24 | diff --git a/configure.ac b/configure.ac 25 | index df8cb50..277db00 100644 26 | --- configure.ac 27 | +++ configure.ac 28 | @@ -39,7 +39,7 @@ 29 | ## 30 | ## 31 | 32 | -CURL_MINIMUM=7.15.4 33 | +CURL_MINIMUM=7.28.0 34 | AC_SUBST(CURL_MINIMUM) 35 | LIBEVENT_MINIMUM=2.0.10 36 | AC_SUBST(LIBEVENT_MINIMUM) 37 | diff --git a/libtransmission/fdlimit.c b/libtransmission/fdlimit.c 38 | index e181e53..17c28d0 100644 39 | --- libtransmission/fdlimit.c 40 | +++ libtransmission/fdlimit.c 41 | @@ -10,11 +10,6 @@ 42 | #include 43 | #include 44 | 45 | -#ifndef _WIN32 46 | -#include /* getrlimit */ 47 | -#include /* getrlimit */ 48 | -#endif 49 | - 50 | #include "transmission.h" 51 | #include "error.h" 52 | #include "error-types.h" 53 | @@ -389,27 +384,6 @@ 54 | i = tr_new0(struct tr_fdInfo, 1); 55 | fileset_construct(&i->fileset, FILE_CACHE_SIZE); 56 | session->fdInfo = i; 57 | - 58 | -#ifndef _WIN32 59 | - 60 | - /* set the open-file limit to the largest safe size wrt FD_SETSIZE */ 61 | - struct rlimit limit; 62 | - 63 | - if (getrlimit(RLIMIT_NOFILE, &limit) == 0) 64 | - { 65 | - int const old_limit = (int)limit.rlim_cur; 66 | - int const new_limit = MIN(limit.rlim_max, FD_SETSIZE); 67 | - 68 | - if (new_limit != old_limit) 69 | - { 70 | - limit.rlim_cur = new_limit; 71 | - setrlimit(RLIMIT_NOFILE, &limit); 72 | - getrlimit(RLIMIT_NOFILE, &limit); 73 | - tr_logAddInfo("Changed open file limit from %d to %d", old_limit, (int)limit.rlim_cur); 74 | - } 75 | - } 76 | - 77 | -#endif 78 | } 79 | } 80 | 81 | diff --git a/libtransmission/web.c b/libtransmission/web.c 82 | index c7f0627..65c1d09 100644 83 | --- libtransmission/web.c 84 | +++ libtransmission/web.c 85 | @@ -8,14 +8,6 @@ 86 | 87 | #include /* strlen(), strstr() */ 88 | 89 | -#ifdef _WIN32 90 | -#include 91 | -#include 92 | -#include 93 | -#else 94 | -#include 95 | -#endif 96 | - 97 | #include 98 | 99 | #include 100 | @@ -391,41 +383,6 @@ 101 | return tr_webRunImpl(tor->session, tr_torrentId(tor), url, range, NULL, done_func, done_func_user_data, buffer); 102 | } 103 | 104 | -/** 105 | - * Portability wrapper for select(). 106 | - * 107 | - * http://msdn.microsoft.com/en-us/library/ms740141%28VS.85%29.aspx 108 | - * On win32, any two of the parameters, readfds, writefds, or exceptfds, 109 | - * can be given as null. At least one must be non-null, and any non-null 110 | - * descriptor set must contain at least one handle to a socket. 111 | - */ 112 | -static void tr_select(int nfds, fd_set* r_fd_set, fd_set* w_fd_set, fd_set* c_fd_set, struct timeval* t) 113 | -{ 114 | -#ifdef _WIN32 115 | - 116 | - (void)nfds; 117 | - 118 | - if (r_fd_set->fd_count == 0 && w_fd_set->fd_count == 0 && c_fd_set->fd_count == 0) 119 | - { 120 | - long int const msec = t->tv_sec * 1000 + t->tv_usec / 1000; 121 | - tr_wait_msec(msec); 122 | - } 123 | - else if (select(0, r_fd_set->fd_count != 0 ? r_fd_set : NULL, w_fd_set->fd_count != 0 ? w_fd_set : NULL, 124 | - c_fd_set->fd_count != 0 ? c_fd_set : NULL, t) == -1) 125 | - { 126 | - char errstr[512]; 127 | - int const e = EVUTIL_SOCKET_ERROR(); 128 | - tr_net_strerror(errstr, sizeof(errstr), e); 129 | - dbgmsg("Error: select (%d) %s", e, errstr); 130 | - } 131 | - 132 | -#else 133 | - 134 | - select(nfds, r_fd_set, w_fd_set, c_fd_set, t); 135 | - 136 | -#endif 137 | -} 138 | - 139 | static void tr_webThreadFunc(void* vsession) 140 | { 141 | char* str; 142 | @@ -434,6 +391,7 @@ 143 | int taskCount = 0; 144 | struct tr_web_task* task; 145 | tr_session* session = vsession; 146 | + uint32_t repeats = 0; 147 | 148 | /* try to enable ssl for https support; but if that fails, 149 | * try a plain vanilla init */ 150 | @@ -473,6 +431,7 @@ 151 | for (;;) 152 | { 153 | long msec; 154 | + int numfds; 155 | int unused; 156 | CURLMsg* msg; 157 | CURLMcode mcode; 158 | @@ -538,28 +497,27 @@ 159 | 160 | if (msec > 0) 161 | { 162 | - int usec; 163 | - int max_fd; 164 | - struct timeval t; 165 | - fd_set r_fd_set; 166 | - fd_set w_fd_set; 167 | - fd_set c_fd_set; 168 | - 169 | - max_fd = 0; 170 | - FD_ZERO(&r_fd_set); 171 | - FD_ZERO(&w_fd_set); 172 | - FD_ZERO(&c_fd_set); 173 | - curl_multi_fdset(multi, &r_fd_set, &w_fd_set, &c_fd_set, &max_fd); 174 | - 175 | if (msec > THREADFUNC_MAX_SLEEP_MSEC) 176 | { 177 | msec = THREADFUNC_MAX_SLEEP_MSEC; 178 | } 179 | 180 | - usec = msec * 1000; 181 | - t.tv_sec = usec / 1000000; 182 | - t.tv_usec = usec % 1000000; 183 | - tr_select(max_fd + 1, &r_fd_set, &w_fd_set, &c_fd_set, &t); 184 | + curl_multi_wait(multi, NULL, 0, msec, &numfds); 185 | + if (!numfds) 186 | + { 187 | + repeats++; 188 | + if (repeats > 1) 189 | + { 190 | + /* curl_multi_wait() returns immediately if there are 191 | + * no fds to wait for, so we need an explicit wait here 192 | + * to emulate select() behavior */ 193 | + tr_wait_msec(MIN(msec, THREADFUNC_MAX_SLEEP_MSEC / 2)); 194 | + } 195 | + } 196 | + else 197 | + { 198 | + repeats = 0; 199 | + } 200 | } 201 | 202 | /* call curl_multi_perform() */ 203 | -- 204 | 2.21.0.windows.1 205 | -------------------------------------------------------------------------------- /LICENSE: -------------------------------------------------------------------------------- 1 | GNU GENERAL PUBLIC LICENSE 2 | Version 3, 29 June 2007 3 | 4 | Copyright (C) 2007 Free Software Foundation, Inc. 5 | Everyone is permitted to copy and distribute verbatim copies 6 | of this license document, but changing it is not allowed. 7 | 8 | Preamble 9 | 10 | The GNU General Public License is a free, copyleft license for 11 | software and other kinds of works. 12 | 13 | The licenses for most software and other practical works are designed 14 | to take away your freedom to share and change the works. By contrast, 15 | the GNU General Public License is intended to guarantee your freedom to 16 | share and change all versions of a program--to make sure it remains free 17 | software for all its users. We, the Free Software Foundation, use the 18 | GNU General Public License for most of our software; it applies also to 19 | any other work released this way by its authors. You can apply it to 20 | your programs, too. 21 | 22 | When we speak of free software, we are referring to freedom, not 23 | price. Our General Public Licenses are designed to make sure that you 24 | have the freedom to distribute copies of free software (and charge for 25 | them if you wish), that you receive source code or can get it if you 26 | want it, that you can change the software or use pieces of it in new 27 | free programs, and that you know you can do these things. 28 | 29 | To protect your rights, we need to prevent others from denying you 30 | these rights or asking you to surrender the rights. Therefore, you have 31 | certain responsibilities if you distribute copies of the software, or if 32 | you modify it: responsibilities to respect the freedom of others. 33 | 34 | For example, if you distribute copies of such a program, whether 35 | gratis or for a fee, you must pass on to the recipients the same 36 | freedoms that you received. You must make sure that they, too, receive 37 | or can get the source code. And you must show them these terms so they 38 | know their rights. 39 | 40 | Developers that use the GNU GPL protect your rights with two steps: 41 | (1) assert copyright on the software, and (2) offer you this License 42 | giving you legal permission to copy, distribute and/or modify it. 43 | 44 | For the developers' and authors' protection, the GPL clearly explains 45 | that there is no warranty for this free software. For both users' and 46 | authors' sake, the GPL requires that modified versions be marked as 47 | changed, so that their problems will not be attributed erroneously to 48 | authors of previous versions. 49 | 50 | Some devices are designed to deny users access to install or run 51 | modified versions of the software inside them, although the manufacturer 52 | can do so. This is fundamentally incompatible with the aim of 53 | protecting users' freedom to change the software. The systematic 54 | pattern of such abuse occurs in the area of products for individuals to 55 | use, which is precisely where it is most unacceptable. Therefore, we 56 | have designed this version of the GPL to prohibit the practice for those 57 | products. If such problems arise substantially in other domains, we 58 | stand ready to extend this provision to those domains in future versions 59 | of the GPL, as needed to protect the freedom of users. 60 | 61 | Finally, every program is threatened constantly by software patents. 62 | States should not allow patents to restrict development and use of 63 | software on general-purpose computers, but in those that do, we wish to 64 | avoid the special danger that patents applied to a free program could 65 | make it effectively proprietary. To prevent this, the GPL assures that 66 | patents cannot be used to render the program non-free. 67 | 68 | The precise terms and conditions for copying, distribution and 69 | modification follow. 70 | 71 | TERMS AND CONDITIONS 72 | 73 | 0. Definitions. 74 | 75 | "This License" refers to version 3 of the GNU General Public License. 76 | 77 | "Copyright" also means copyright-like laws that apply to other kinds of 78 | works, such as semiconductor masks. 79 | 80 | "The Program" refers to any copyrightable work licensed under this 81 | License. Each licensee is addressed as "you". "Licensees" and 82 | "recipients" may be individuals or organizations. 83 | 84 | To "modify" a work means to copy from or adapt all or part of the work 85 | in a fashion requiring copyright permission, other than the making of an 86 | exact copy. The resulting work is called a "modified version" of the 87 | earlier work or a work "based on" the earlier work. 88 | 89 | A "covered work" means either the unmodified Program or a work based 90 | on the Program. 91 | 92 | To "propagate" a work means to do anything with it that, without 93 | permission, would make you directly or secondarily liable for 94 | infringement under applicable copyright law, except executing it on a 95 | computer or modifying a private copy. Propagation includes copying, 96 | distribution (with or without modification), making available to the 97 | public, and in some countries other activities as well. 98 | 99 | To "convey" a work means any kind of propagation that enables other 100 | parties to make or receive copies. Mere interaction with a user through 101 | a computer network, with no transfer of a copy, is not conveying. 102 | 103 | An interactive user interface displays "Appropriate Legal Notices" 104 | to the extent that it includes a convenient and prominently visible 105 | feature that (1) displays an appropriate copyright notice, and (2) 106 | tells the user that there is no warranty for the work (except to the 107 | extent that warranties are provided), that licensees may convey the 108 | work under this License, and how to view a copy of this License. If 109 | the interface presents a list of user commands or options, such as a 110 | menu, a prominent item in the list meets this criterion. 111 | 112 | 1. Source Code. 113 | 114 | The "source code" for a work means the preferred form of the work 115 | for making modifications to it. "Object code" means any non-source 116 | form of a work. 117 | 118 | A "Standard Interface" means an interface that either is an official 119 | standard defined by a recognized standards body, or, in the case of 120 | interfaces specified for a particular programming language, one that 121 | is widely used among developers working in that language. 122 | 123 | The "System Libraries" of an executable work include anything, other 124 | than the work as a whole, that (a) is included in the normal form of 125 | packaging a Major Component, but which is not part of that Major 126 | Component, and (b) serves only to enable use of the work with that 127 | Major Component, or to implement a Standard Interface for which an 128 | implementation is available to the public in source code form. A 129 | "Major Component", in this context, means a major essential component 130 | (kernel, window system, and so on) of the specific operating system 131 | (if any) on which the executable work runs, or a compiler used to 132 | produce the work, or an object code interpreter used to run it. 133 | 134 | The "Corresponding Source" for a work in object code form means all 135 | the source code needed to generate, install, and (for an executable 136 | work) run the object code and to modify the work, including scripts to 137 | control those activities. However, it does not include the work's 138 | System Libraries, or general-purpose tools or generally available free 139 | programs which are used unmodified in performing those activities but 140 | which are not part of the work. For example, Corresponding Source 141 | includes interface definition files associated with source files for 142 | the work, and the source code for shared libraries and dynamically 143 | linked subprograms that the work is specifically designed to require, 144 | such as by intimate data communication or control flow between those 145 | subprograms and other parts of the work. 146 | 147 | The Corresponding Source need not include anything that users 148 | can regenerate automatically from other parts of the Corresponding 149 | Source. 150 | 151 | The Corresponding Source for a work in source code form is that 152 | same work. 153 | 154 | 2. Basic Permissions. 155 | 156 | All rights granted under this License are granted for the term of 157 | copyright on the Program, and are irrevocable provided the stated 158 | conditions are met. This License explicitly affirms your unlimited 159 | permission to run the unmodified Program. The output from running a 160 | covered work is covered by this License only if the output, given its 161 | content, constitutes a covered work. This License acknowledges your 162 | rights of fair use or other equivalent, as provided by copyright law. 163 | 164 | You may make, run and propagate covered works that you do not 165 | convey, without conditions so long as your license otherwise remains 166 | in force. You may convey covered works to others for the sole purpose 167 | of having them make modifications exclusively for you, or provide you 168 | with facilities for running those works, provided that you comply with 169 | the terms of this License in conveying all material for which you do 170 | not control copyright. Those thus making or running the covered works 171 | for you must do so exclusively on your behalf, under your direction 172 | and control, on terms that prohibit them from making any copies of 173 | your copyrighted material outside their relationship with you. 174 | 175 | Conveying under any other circumstances is permitted solely under 176 | the conditions stated below. Sublicensing is not allowed; section 10 177 | makes it unnecessary. 178 | 179 | 3. Protecting Users' Legal Rights From Anti-Circumvention Law. 180 | 181 | No covered work shall be deemed part of an effective technological 182 | measure under any applicable law fulfilling obligations under article 183 | 11 of the WIPO copyright treaty adopted on 20 December 1996, or 184 | similar laws prohibiting or restricting circumvention of such 185 | measures. 186 | 187 | When you convey a covered work, you waive any legal power to forbid 188 | circumvention of technological measures to the extent such circumvention 189 | is effected by exercising rights under this License with respect to 190 | the covered work, and you disclaim any intention to limit operation or 191 | modification of the work as a means of enforcing, against the work's 192 | users, your or third parties' legal rights to forbid circumvention of 193 | technological measures. 194 | 195 | 4. Conveying Verbatim Copies. 196 | 197 | You may convey verbatim copies of the Program's source code as you 198 | receive it, in any medium, provided that you conspicuously and 199 | appropriately publish on each copy an appropriate copyright notice; 200 | keep intact all notices stating that this License and any 201 | non-permissive terms added in accord with section 7 apply to the code; 202 | keep intact all notices of the absence of any warranty; and give all 203 | recipients a copy of this License along with the Program. 204 | 205 | You may charge any price or no price for each copy that you convey, 206 | and you may offer support or warranty protection for a fee. 207 | 208 | 5. Conveying Modified Source Versions. 209 | 210 | You may convey a work based on the Program, or the modifications to 211 | produce it from the Program, in the form of source code under the 212 | terms of section 4, provided that you also meet all of these conditions: 213 | 214 | a) The work must carry prominent notices stating that you modified 215 | it, and giving a relevant date. 216 | 217 | b) The work must carry prominent notices stating that it is 218 | released under this License and any conditions added under section 219 | 7. This requirement modifies the requirement in section 4 to 220 | "keep intact all notices". 221 | 222 | c) You must license the entire work, as a whole, under this 223 | License to anyone who comes into possession of a copy. This 224 | License will therefore apply, along with any applicable section 7 225 | additional terms, to the whole of the work, and all its parts, 226 | regardless of how they are packaged. This License gives no 227 | permission to license the work in any other way, but it does not 228 | invalidate such permission if you have separately received it. 229 | 230 | d) If the work has interactive user interfaces, each must display 231 | Appropriate Legal Notices; however, if the Program has interactive 232 | interfaces that do not display Appropriate Legal Notices, your 233 | work need not make them do so. 234 | 235 | A compilation of a covered work with other separate and independent 236 | works, which are not by their nature extensions of the covered work, 237 | and which are not combined with it such as to form a larger program, 238 | in or on a volume of a storage or distribution medium, is called an 239 | "aggregate" if the compilation and its resulting copyright are not 240 | used to limit the access or legal rights of the compilation's users 241 | beyond what the individual works permit. Inclusion of a covered work 242 | in an aggregate does not cause this License to apply to the other 243 | parts of the aggregate. 244 | 245 | 6. Conveying Non-Source Forms. 246 | 247 | You may convey a covered work in object code form under the terms 248 | of sections 4 and 5, provided that you also convey the 249 | machine-readable Corresponding Source under the terms of this License, 250 | in one of these ways: 251 | 252 | a) Convey the object code in, or embodied in, a physical product 253 | (including a physical distribution medium), accompanied by the 254 | Corresponding Source fixed on a durable physical medium 255 | customarily used for software interchange. 256 | 257 | b) Convey the object code in, or embodied in, a physical product 258 | (including a physical distribution medium), accompanied by a 259 | written offer, valid for at least three years and valid for as 260 | long as you offer spare parts or customer support for that product 261 | model, to give anyone who possesses the object code either (1) a 262 | copy of the Corresponding Source for all the software in the 263 | product that is covered by this License, on a durable physical 264 | medium customarily used for software interchange, for a price no 265 | more than your reasonable cost of physically performing this 266 | conveying of source, or (2) access to copy the 267 | Corresponding Source from a network server at no charge. 268 | 269 | c) Convey individual copies of the object code with a copy of the 270 | written offer to provide the Corresponding Source. This 271 | alternative is allowed only occasionally and noncommercially, and 272 | only if you received the object code with such an offer, in accord 273 | with subsection 6b. 274 | 275 | d) Convey the object code by offering access from a designated 276 | place (gratis or for a charge), and offer equivalent access to the 277 | Corresponding Source in the same way through the same place at no 278 | further charge. You need not require recipients to copy the 279 | Corresponding Source along with the object code. If the place to 280 | copy the object code is a network server, the Corresponding Source 281 | may be on a different server (operated by you or a third party) 282 | that supports equivalent copying facilities, provided you maintain 283 | clear directions next to the object code saying where to find the 284 | Corresponding Source. Regardless of what server hosts the 285 | Corresponding Source, you remain obligated to ensure that it is 286 | available for as long as needed to satisfy these requirements. 287 | 288 | e) Convey the object code using peer-to-peer transmission, provided 289 | you inform other peers where the object code and Corresponding 290 | Source of the work are being offered to the general public at no 291 | charge under subsection 6d. 292 | 293 | A separable portion of the object code, whose source code is excluded 294 | from the Corresponding Source as a System Library, need not be 295 | included in conveying the object code work. 296 | 297 | A "User Product" is either (1) a "consumer product", which means any 298 | tangible personal property which is normally used for personal, family, 299 | or household purposes, or (2) anything designed or sold for incorporation 300 | into a dwelling. In determining whether a product is a consumer product, 301 | doubtful cases shall be resolved in favor of coverage. For a particular 302 | product received by a particular user, "normally used" refers to a 303 | typical or common use of that class of product, regardless of the status 304 | of the particular user or of the way in which the particular user 305 | actually uses, or expects or is expected to use, the product. A product 306 | is a consumer product regardless of whether the product has substantial 307 | commercial, industrial or non-consumer uses, unless such uses represent 308 | the only significant mode of use of the product. 309 | 310 | "Installation Information" for a User Product means any methods, 311 | procedures, authorization keys, or other information required to install 312 | and execute modified versions of a covered work in that User Product from 313 | a modified version of its Corresponding Source. The information must 314 | suffice to ensure that the continued functioning of the modified object 315 | code is in no case prevented or interfered with solely because 316 | modification has been made. 317 | 318 | If you convey an object code work under this section in, or with, or 319 | specifically for use in, a User Product, and the conveying occurs as 320 | part of a transaction in which the right of possession and use of the 321 | User Product is transferred to the recipient in perpetuity or for a 322 | fixed term (regardless of how the transaction is characterized), the 323 | Corresponding Source conveyed under this section must be accompanied 324 | by the Installation Information. But this requirement does not apply 325 | if neither you nor any third party retains the ability to install 326 | modified object code on the User Product (for example, the work has 327 | been installed in ROM). 328 | 329 | The requirement to provide Installation Information does not include a 330 | requirement to continue to provide support service, warranty, or updates 331 | for a work that has been modified or installed by the recipient, or for 332 | the User Product in which it has been modified or installed. Access to a 333 | network may be denied when the modification itself materially and 334 | adversely affects the operation of the network or violates the rules and 335 | protocols for communication across the network. 336 | 337 | Corresponding Source conveyed, and Installation Information provided, 338 | in accord with this section must be in a format that is publicly 339 | documented (and with an implementation available to the public in 340 | source code form), and must require no special password or key for 341 | unpacking, reading or copying. 342 | 343 | 7. Additional Terms. 344 | 345 | "Additional permissions" are terms that supplement the terms of this 346 | License by making exceptions from one or more of its conditions. 347 | Additional permissions that are applicable to the entire Program shall 348 | be treated as though they were included in this License, to the extent 349 | that they are valid under applicable law. If additional permissions 350 | apply only to part of the Program, that part may be used separately 351 | under those permissions, but the entire Program remains governed by 352 | this License without regard to the additional permissions. 353 | 354 | When you convey a copy of a covered work, you may at your option 355 | remove any additional permissions from that copy, or from any part of 356 | it. (Additional permissions may be written to require their own 357 | removal in certain cases when you modify the work.) You may place 358 | additional permissions on material, added by you to a covered work, 359 | for which you have or can give appropriate copyright permission. 360 | 361 | Notwithstanding any other provision of this License, for material you 362 | add to a covered work, you may (if authorized by the copyright holders of 363 | that material) supplement the terms of this License with terms: 364 | 365 | a) Disclaiming warranty or limiting liability differently from the 366 | terms of sections 15 and 16 of this License; or 367 | 368 | b) Requiring preservation of specified reasonable legal notices or 369 | author attributions in that material or in the Appropriate Legal 370 | Notices displayed by works containing it; or 371 | 372 | c) Prohibiting misrepresentation of the origin of that material, or 373 | requiring that modified versions of such material be marked in 374 | reasonable ways as different from the original version; or 375 | 376 | d) Limiting the use for publicity purposes of names of licensors or 377 | authors of the material; or 378 | 379 | e) Declining to grant rights under trademark law for use of some 380 | trade names, trademarks, or service marks; or 381 | 382 | f) Requiring indemnification of licensors and authors of that 383 | material by anyone who conveys the material (or modified versions of 384 | it) with contractual assumptions of liability to the recipient, for 385 | any liability that these contractual assumptions directly impose on 386 | those licensors and authors. 387 | 388 | All other non-permissive additional terms are considered "further 389 | restrictions" within the meaning of section 10. If the Program as you 390 | received it, or any part of it, contains a notice stating that it is 391 | governed by this License along with a term that is a further 392 | restriction, you may remove that term. If a license document contains 393 | a further restriction but permits relicensing or conveying under this 394 | License, you may add to a covered work material governed by the terms 395 | of that license document, provided that the further restriction does 396 | not survive such relicensing or conveying. 397 | 398 | If you add terms to a covered work in accord with this section, you 399 | must place, in the relevant source files, a statement of the 400 | additional terms that apply to those files, or a notice indicating 401 | where to find the applicable terms. 402 | 403 | Additional terms, permissive or non-permissive, may be stated in the 404 | form of a separately written license, or stated as exceptions; 405 | the above requirements apply either way. 406 | 407 | 8. Termination. 408 | 409 | You may not propagate or modify a covered work except as expressly 410 | provided under this License. Any attempt otherwise to propagate or 411 | modify it is void, and will automatically terminate your rights under 412 | this License (including any patent licenses granted under the third 413 | paragraph of section 11). 414 | 415 | However, if you cease all violation of this License, then your 416 | license from a particular copyright holder is reinstated (a) 417 | provisionally, unless and until the copyright holder explicitly and 418 | finally terminates your license, and (b) permanently, if the copyright 419 | holder fails to notify you of the violation by some reasonable means 420 | prior to 60 days after the cessation. 421 | 422 | Moreover, your license from a particular copyright holder is 423 | reinstated permanently if the copyright holder notifies you of the 424 | violation by some reasonable means, this is the first time you have 425 | received notice of violation of this License (for any work) from that 426 | copyright holder, and you cure the violation prior to 30 days after 427 | your receipt of the notice. 428 | 429 | Termination of your rights under this section does not terminate the 430 | licenses of parties who have received copies or rights from you under 431 | this License. If your rights have been terminated and not permanently 432 | reinstated, you do not qualify to receive new licenses for the same 433 | material under section 10. 434 | 435 | 9. Acceptance Not Required for Having Copies. 436 | 437 | You are not required to accept this License in order to receive or 438 | run a copy of the Program. Ancillary propagation of a covered work 439 | occurring solely as a consequence of using peer-to-peer transmission 440 | to receive a copy likewise does not require acceptance. However, 441 | nothing other than this License grants you permission to propagate or 442 | modify any covered work. These actions infringe copyright if you do 443 | not accept this License. Therefore, by modifying or propagating a 444 | covered work, you indicate your acceptance of this License to do so. 445 | 446 | 10. Automatic Licensing of Downstream Recipients. 447 | 448 | Each time you convey a covered work, the recipient automatically 449 | receives a license from the original licensors, to run, modify and 450 | propagate that work, subject to this License. You are not responsible 451 | for enforcing compliance by third parties with this License. 452 | 453 | An "entity transaction" is a transaction transferring control of an 454 | organization, or substantially all assets of one, or subdividing an 455 | organization, or merging organizations. If propagation of a covered 456 | work results from an entity transaction, each party to that 457 | transaction who receives a copy of the work also receives whatever 458 | licenses to the work the party's predecessor in interest had or could 459 | give under the previous paragraph, plus a right to possession of the 460 | Corresponding Source of the work from the predecessor in interest, if 461 | the predecessor has it or can get it with reasonable efforts. 462 | 463 | You may not impose any further restrictions on the exercise of the 464 | rights granted or affirmed under this License. For example, you may 465 | not impose a license fee, royalty, or other charge for exercise of 466 | rights granted under this License, and you may not initiate litigation 467 | (including a cross-claim or counterclaim in a lawsuit) alleging that 468 | any patent claim is infringed by making, using, selling, offering for 469 | sale, or importing the Program or any portion of it. 470 | 471 | 11. Patents. 472 | 473 | A "contributor" is a copyright holder who authorizes use under this 474 | License of the Program or a work on which the Program is based. The 475 | work thus licensed is called the contributor's "contributor version". 476 | 477 | A contributor's "essential patent claims" are all patent claims 478 | owned or controlled by the contributor, whether already acquired or 479 | hereafter acquired, that would be infringed by some manner, permitted 480 | by this License, of making, using, or selling its contributor version, 481 | but do not include claims that would be infringed only as a 482 | consequence of further modification of the contributor version. For 483 | purposes of this definition, "control" includes the right to grant 484 | patent sublicenses in a manner consistent with the requirements of 485 | this License. 486 | 487 | Each contributor grants you a non-exclusive, worldwide, royalty-free 488 | patent license under the contributor's essential patent claims, to 489 | make, use, sell, offer for sale, import and otherwise run, modify and 490 | propagate the contents of its contributor version. 491 | 492 | In the following three paragraphs, a "patent license" is any express 493 | agreement or commitment, however denominated, not to enforce a patent 494 | (such as an express permission to practice a patent or covenant not to 495 | sue for patent infringement). To "grant" such a patent license to a 496 | party means to make such an agreement or commitment not to enforce a 497 | patent against the party. 498 | 499 | If you convey a covered work, knowingly relying on a patent license, 500 | and the Corresponding Source of the work is not available for anyone 501 | to copy, free of charge and under the terms of this License, through a 502 | publicly available network server or other readily accessible means, 503 | then you must either (1) cause the Corresponding Source to be so 504 | available, or (2) arrange to deprive yourself of the benefit of the 505 | patent license for this particular work, or (3) arrange, in a manner 506 | consistent with the requirements of this License, to extend the patent 507 | license to downstream recipients. "Knowingly relying" means you have 508 | actual knowledge that, but for the patent license, your conveying the 509 | covered work in a country, or your recipient's use of the covered work 510 | in a country, would infringe one or more identifiable patents in that 511 | country that you have reason to believe are valid. 512 | 513 | If, pursuant to or in connection with a single transaction or 514 | arrangement, you convey, or propagate by procuring conveyance of, a 515 | covered work, and grant a patent license to some of the parties 516 | receiving the covered work authorizing them to use, propagate, modify 517 | or convey a specific copy of the covered work, then the patent license 518 | you grant is automatically extended to all recipients of the covered 519 | work and works based on it. 520 | 521 | A patent license is "discriminatory" if it does not include within 522 | the scope of its coverage, prohibits the exercise of, or is 523 | conditioned on the non-exercise of one or more of the rights that are 524 | specifically granted under this License. You may not convey a covered 525 | work if you are a party to an arrangement with a third party that is 526 | in the business of distributing software, under which you make payment 527 | to the third party based on the extent of your activity of conveying 528 | the work, and under which the third party grants, to any of the 529 | parties who would receive the covered work from you, a discriminatory 530 | patent license (a) in connection with copies of the covered work 531 | conveyed by you (or copies made from those copies), or (b) primarily 532 | for and in connection with specific products or compilations that 533 | contain the covered work, unless you entered into that arrangement, 534 | or that patent license was granted, prior to 28 March 2007. 535 | 536 | Nothing in this License shall be construed as excluding or limiting 537 | any implied license or other defenses to infringement that may 538 | otherwise be available to you under applicable patent law. 539 | 540 | 12. No Surrender of Others' Freedom. 541 | 542 | If conditions are imposed on you (whether by court order, agreement or 543 | otherwise) that contradict the conditions of this License, they do not 544 | excuse you from the conditions of this License. If you cannot convey a 545 | covered work so as to satisfy simultaneously your obligations under this 546 | License and any other pertinent obligations, then as a consequence you may 547 | not convey it at all. For example, if you agree to terms that obligate you 548 | to collect a royalty for further conveying from those to whom you convey 549 | the Program, the only way you could satisfy both those terms and this 550 | License would be to refrain entirely from conveying the Program. 551 | 552 | 13. Use with the GNU Affero General Public License. 553 | 554 | Notwithstanding any other provision of this License, you have 555 | permission to link or combine any covered work with a work licensed 556 | under version 3 of the GNU Affero General Public License into a single 557 | combined work, and to convey the resulting work. The terms of this 558 | License will continue to apply to the part which is the covered work, 559 | but the special requirements of the GNU Affero General Public License, 560 | section 13, concerning interaction through a network will apply to the 561 | combination as such. 562 | 563 | 14. Revised Versions of this License. 564 | 565 | The Free Software Foundation may publish revised and/or new versions of 566 | the GNU General Public License from time to time. Such new versions will 567 | be similar in spirit to the present version, but may differ in detail to 568 | address new problems or concerns. 569 | 570 | Each version is given a distinguishing version number. If the 571 | Program specifies that a certain numbered version of the GNU General 572 | Public License "or any later version" applies to it, you have the 573 | option of following the terms and conditions either of that numbered 574 | version or of any later version published by the Free Software 575 | Foundation. If the Program does not specify a version number of the 576 | GNU General Public License, you may choose any version ever published 577 | by the Free Software Foundation. 578 | 579 | If the Program specifies that a proxy can decide which future 580 | versions of the GNU General Public License can be used, that proxy's 581 | public statement of acceptance of a version permanently authorizes you 582 | to choose that version for the Program. 583 | 584 | Later license versions may give you additional or different 585 | permissions. However, no additional obligations are imposed on any 586 | author or copyright holder as a result of your choosing to follow a 587 | later version. 588 | 589 | 15. Disclaimer of Warranty. 590 | 591 | THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY 592 | APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT 593 | HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY 594 | OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, 595 | THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR 596 | PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM 597 | IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF 598 | ALL NECESSARY SERVICING, REPAIR OR CORRECTION. 599 | 600 | 16. Limitation of Liability. 601 | 602 | IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING 603 | WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MODIFIES AND/OR CONVEYS 604 | THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY 605 | GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE 606 | USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF 607 | DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD 608 | PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS), 609 | EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF 610 | SUCH DAMAGES. 611 | 612 | 17. Interpretation of Sections 15 and 16. 613 | 614 | If the disclaimer of warranty and limitation of liability provided 615 | above cannot be given local legal effect according to their terms, 616 | reviewing courts shall apply local law that most closely approximates 617 | an absolute waiver of all civil liability in connection with the 618 | Program, unless a warranty or assumption of liability accompanies a 619 | copy of the Program in return for a fee. 620 | 621 | END OF TERMS AND CONDITIONS 622 | 623 | How to Apply These Terms to Your New Programs 624 | 625 | If you develop a new program, and you want it to be of the greatest 626 | possible use to the public, the best way to achieve this is to make it 627 | free software which everyone can redistribute and change under these terms. 628 | 629 | To do so, attach the following notices to the program. It is safest 630 | to attach them to the start of each source file to most effectively 631 | state the exclusion of warranty; and each file should have at least 632 | the "copyright" line and a pointer to where the full notice is found. 633 | 634 | 635 | Copyright (C) 636 | 637 | This program is free software: you can redistribute it and/or modify 638 | it under the terms of the GNU General Public License as published by 639 | the Free Software Foundation, either version 3 of the License, or 640 | (at your option) any later version. 641 | 642 | This program is distributed in the hope that it will be useful, 643 | but WITHOUT ANY WARRANTY; without even the implied warranty of 644 | MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the 645 | GNU General Public License for more details. 646 | 647 | You should have received a copy of the GNU General Public License 648 | along with this program. If not, see . 649 | 650 | Also add information on how to contact you by electronic and paper mail. 651 | 652 | If the program does terminal interaction, make it output a short 653 | notice like this when it starts in an interactive mode: 654 | 655 | Copyright (C) 656 | This program comes with ABSOLUTELY NO WARRANTY; for details type `show w'. 657 | This is free software, and you are welcome to redistribute it 658 | under certain conditions; type `show c' for details. 659 | 660 | The hypothetical commands `show w' and `show c' should show the appropriate 661 | parts of the General Public License. Of course, your program's commands 662 | might be different; for a GUI interface, you would use an "about box". 663 | 664 | You should also get your employer (if you work as a programmer) or school, 665 | if any, to sign a "copyright disclaimer" for the program, if necessary. 666 | For more information on this, and how to apply and follow the GNU GPL, see 667 | . 668 | 669 | The GNU General Public License does not permit incorporating your program 670 | into proprietary programs. If your program is a subroutine library, you 671 | may consider it more useful to permit linking proprietary applications with 672 | the library. If this is what you want to do, use the GNU Lesser General 673 | Public License instead of this License. But first, please read 674 | . 675 | --------------------------------------------------------------------------------