├── .gitignore
├── README.md
├── tinc_rollout.py
└── COPYING
/.gitignore:
--------------------------------------------------------------------------------
1 | *.tar
2 |
--------------------------------------------------------------------------------
/README.md:
--------------------------------------------------------------------------------
1 |
2 | tinc_rollout.py
3 | ============
4 |
5 | This script sets up or updates a host to connect to a tinc vpn. It
6 | allows you to start a network from scratch, join an existing network,
7 | decide which peers you will connect with, and can package up your tinc
8 | configuration so others can join the network too.
9 |
10 | This is aimed at users who just want to make a bunch of boxes talk to
11 | each other. It won't setup bridging between two segments or anything
12 | like that.
13 |
14 | You should run this script as root (or any other user who is allowed
15 | to write to /etc/tinc). This script creates files in the current
16 | directory, so you should run it from /etc/tinc (or use the --root
17 | parameter to specify that directory).
18 |
19 | Creating A New Network
20 | ----------------------
21 |
22 | If you want to make a network from scratch (as opposed to joining an
23 | existing network), use the "add" command:
24 |
25 | tinc_rollout.py --add -n network_name --hostname your_hostname --ip xxx.xxx.xxx.xxx
26 |
27 | The IP address is how your box will be known on the vpn. It should
28 | probably begin with 10. or 198.162 or 17.16. Your hostname is the
29 | name you would like to be called on your network. If you already have
30 | a hostname in /etc/hostname, you might want to just use that.
31 |
32 | Joining An Existing Network
33 | ---------------------------
34 |
35 | tinc_rollout.py --add -n network_name --ip xxx.xxx.xxx.xxx --tar path/to/tinc_rollout.tar
36 |
37 | The tinc_rollout.tar file should be provided by somebody else in the
38 | vpn. It contains some basic configuration and the host keys for peer
39 | nodes. This will create the network if needed and copy host files to
40 | it so you can accept connections with that network.
41 |
42 | Any time two machines want to talk to each other, they will need to
43 | have each other's keys.
44 |
45 | Adding Nodes To Your Network
46 | ----------------------------
47 |
48 | If in the future new machines join your vpn, simply drop their
49 | host file in /etc/tinc/network_name/hosts or do another "tinc_rollout.py
50 | --add" right on top of your existing config.
51 |
52 | Inviting Others Into the Network
53 | --------------------------------
54 |
55 | After you do the add, you might want to use the "package" command
56 | to add your host key to the tinc_rollout.tar file. Then you can give
57 | that file to other folks to configure their own tinc nodes.
58 |
59 |
60 | Bugs and Todos
61 | --------------
62 |
63 | I wrote and tested this on Debian Wheezy. Patches welcome for other
64 | systems, but fixes, or new capabilities! Grep the code for 'TODO' to
65 | get a list of future work.
66 |
67 | TODO: support ipv6
68 | TODO: auto update the package
69 | TODO: auto download the package
70 | TODO: send package back to maintainer
71 | TODO: hosts-available/hosts-enabled
72 |
73 | Import Tinc Rollout
74 | -------------------
75 |
76 | If you want to use these routines in your python script, you probably
77 | want to do something like this:
78 |
79 | from tinc_rollout import TincRollout
80 |
81 | TR=TincRollout({'root':'/etc/tinc',
82 | 'vpn_name':'freedombox'})
83 | print TR.get_host_name()
84 | print TR.get_host_file()
85 |
86 |
87 |
88 | License and Copyright
89 | ---------------------
90 |
91 | This software is Copyright (c) 2012-2013 James Vasile. It is
92 | published under the terms of the GNU General Public License, version 3
93 | or later. A copy of the latest version of that license should be
94 | available at http://www.gnu.org/licenses/gpl.html See COPYING for
95 | details.
96 |
97 | This program is distributed in the hope that it will be useful, but
98 | WITHOUT ANY WARRANTY; without even the implied warranty of
99 | MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
100 | General Public License for more details.
101 |
102 | Thanks
103 | ------
104 |
105 | Big thanks to Eben Moglen. I can't count the number of times he told
106 | me to look at tinc over the last few years and especially in the
107 | FreedomBox context. I just wish I'd gotten to it sooner.
108 |
--------------------------------------------------------------------------------
/tinc_rollout.py:
--------------------------------------------------------------------------------
1 | #!/usr/bin/env python
2 |
3 | """
4 | tinc_rollout.py
5 | ============
6 |
7 | This script sets up or updates a host to connect to a tinc vpn. It
8 | allows you to start a network from scratch, join an existing network,
9 | decide which peers you will connect with, and can package up your tinc
10 | configuration so others can join the network too.
11 |
12 | This is aimed at users who just want to make a bunch of boxes talk to
13 | each other. It won't setup bridging between two segments or anything
14 | like that.
15 |
16 | You should run this script as root (or any other user who is allowed
17 | to write to /etc/tinc). This script creates files in the current
18 | directory, so you should run it from /etc/tinc (or use the --root
19 | parameter to specify that directory).
20 |
21 | Creating A New Network
22 | ----------------------
23 |
24 | If you want to make a network from scratch (as opposed to joining an
25 | existing network), use the "add" command:
26 |
27 | tinc_rollout.py --add -n network_name --hostname your_hostname --ip xxx.xxx.xxx.xxx
28 |
29 | The IP address is how your box will be known on the vpn. It should
30 | probably begin with 10. or 198.162 or 17.16. Your hostname is the
31 | name you would like to be called on your network. If you already have
32 | a hostname in /etc/hostname, you might want to just use that.
33 |
34 | Joining An Existing Network
35 | ---------------------------
36 |
37 | tinc_rollout.py --add -n network_name --ip xxx.xxx.xxx.xxx --tar path/to/tinc_rollout.tar
38 |
39 | The tinc_rollout.tar file should be provided by somebody else in the
40 | vpn. It contains some basic configuration and the host keys for peer
41 | nodes. This will create the network if needed and copy host files to
42 | it so you can accept connections with that network.
43 |
44 | Any time two machines want to talk to each other, they will need to
45 | have each other's keys.
46 |
47 | Adding Nodes To Your Network
48 | ----------------------------
49 |
50 | If in the future new machines join your vpn, simply drop their
51 | host file in /etc/tinc/network_name/hosts or do another "tinc_rollout.py
52 | --add" right on top of your existing config.
53 |
54 | Inviting Others Into the Network
55 | --------------------------------
56 |
57 | After you do the add, you might want to use the "package" command
58 | to add your host key to the tinc_rollout.tar file. Then you can give
59 | that file to other folks to configure their own tinc nodes.
60 |
61 |
62 | Bugs and Todos
63 | --------------
64 |
65 | I wrote and tested this on Debian Wheezy. Patches welcome for other
66 | systems, but fixes, or new capabilities! Grep the code for 'TODO' to
67 | get a list of future work.
68 |
69 | TODO: support ipv6
70 | TODO: auto update the package
71 | TODO: auto download the package
72 | TODO: send package back to maintainer
73 | TODO: hosts-available/hosts-enabled
74 |
75 | Import Tinc Rollout
76 | -------------------
77 |
78 | If you want to use these routines in your python script, you probably
79 | want to do something like this:
80 |
81 | from tinc_rollout import TincRollout
82 |
83 | TR=TincRollout({'root':'/etc/tinc',
84 | 'vpn_name':'freedombox'})
85 | print TR.get_host_name()
86 | print TR.get_host_file()
87 |
88 |
89 |
90 | License and Copyright
91 | ---------------------
92 |
93 | This software is Copyright (c) 2012-2013 James Vasile. It is
94 | published under the terms of the GNU General Public License, version 3
95 | or later. A copy of the latest version of that license should be
96 | available at http://www.gnu.org/licenses/gpl.html See COPYING for
97 | details.
98 |
99 | This program is distributed in the hope that it will be useful, but
100 | WITHOUT ANY WARRANTY; without even the implied warranty of
101 | MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
102 | General Public License for more details.
103 |
104 | Thanks
105 | ------
106 |
107 | Big thanks to Eben Moglen. I can't count the number of times he told
108 | me to look at tinc over the last few years and especially in the
109 | FreedomBox context. I just wish I'd gotten to it sooner.
110 | """
111 |
112 | import sys, os, subprocess, argparse, tarfile, stat, logging, re
113 |
114 | ## This is just defaults that is used by argparse
115 | tar_file = os.path.basename(sys.argv[0])+".tar"
116 |
117 | def slurp_if_exists(fname):
118 | if os.path.exists(fname):
119 | with open(fname, 'r') as INF:
120 | return INF.read()
121 |
122 |
123 | class chdir:
124 | def __enter__(self):
125 | self.curdir = os.getcwd()
126 | os.chdir(self.direc)
127 | return None
128 | def __init__(self, direc):
129 | self.direc = direc
130 | def __exit__(self, type, value, traceback):
131 | os.chdir(self.curdir)
132 |
133 | class NoHostnameError(Exception):
134 | pass
135 | class NoVPNNameError(Exception):
136 | pass
137 |
138 | class SingleLevelFilter(logging.Filter):
139 | """Licensed under the MIT License (http://opensource.org/licenses/mit-license.php)
140 | From https://code.google.com/p/sqlalchemy-migrate/source/browse/migrate/versioning/shell.py?r=38dca475c55333aab047d65503a15c470170336d"""
141 | def __init__(self, min=None, max=None):
142 | self.min = min or 0
143 | self.max = max or 100
144 |
145 | def filter(self, record):
146 | return self.min <= record.levelno <= self.max
147 |
148 | def config_logger():
149 | global log
150 | h1 = logging.StreamHandler(sys.stdout)
151 | f1 = SingleLevelFilter(max=logging.INFO)
152 | h1.addFilter(f1)
153 | rootLogger = logging.getLogger()
154 | rootLogger.addHandler(h1)
155 | h2 = logging.StreamHandler(sys.stderr)
156 | f2 = SingleLevelFilter(min=logging.WARN)
157 | h2.addFilter(f2)
158 | rootLogger.addHandler(h2)
159 | log = logging.getLogger("my.logger")
160 | log.setLevel(logging.INFO)
161 |
162 | def parse_params(argv=None):
163 | if not argv:
164 | argv = sys.argv
165 |
166 | parser = argparse.ArgumentParser(description='Add/remove machines from your tinc vpn network.')
167 | act = parser.add_mutually_exclusive_group()
168 | act.add_argument('--add', dest='action', help='Start a new tinc vpn or install machines into an existing tinc vpn', action='store_const', const='add')
169 | #act.add_argument('--remove', dest='action', help='remove machines from the tinc vpn', action='store_const', const='remove') #TODO: implement remove
170 | act.add_argument('--package', dest='action', help='tar up the vpn configuration for export', action='store_const', const='package')
171 |
172 | # options for all actions
173 | parser.add_argument('-n', '--name', dest="vpn_name", default=None, action='store',
174 | help='the name of the vpn (maps to tincd -n)')
175 | parser.add_argument('--root', default='.', help="Where your tinc config dir is. Defaults to current dir")
176 |
177 | # options for add actions
178 | parser.add_argument('--hostname', help='Hostname of this machine on the vpn (defaults to /etc/hostname)')
179 | parser.add_argument('--ip', help="internal (vpn) IP address of this node")
180 | parser.add_argument('--peer', action='append', default=[],
181 | help='peer node to add or remove. May be specified more than once. Default is all known possible peers.')
182 | parser.add_argument('--tar', default=tar_file,
183 | help="path to tar file containing tinc.conf and host keys. If blank, we'll look for %s." % tar_file)
184 |
185 | parser.add_argument('-v', '--verbose', dest='verbose', action='store_true')
186 |
187 | args = parser.parse_args()
188 |
189 | if args.verbose:
190 | log.setLevel(logging.DEBUG)
191 |
192 | if not args.vpn_name:
193 | sys.stderr.write("Must provide the name of a vpn to operate on.\n")
194 | sys.exit()
195 | raise NoVPNNameError
196 |
197 | if not args.action:
198 | parser.print_usage()
199 |
200 | if not args.hostname:
201 | args.hostname = slurp_if_exists("/etc/hostname").strip()
202 | if not args.hostname:
203 | sys.stderr.write("Cannot figure out your hostname. Please provide one.\n")
204 | sys.exit()
205 | raise NoHostnameError
206 |
207 | if args.action == 'add':
208 | if not args.ip:
209 | sys.stderr.write("Must provide ip address of this machine on the vpn (e.g. 172.16.xx.xx).\n")
210 | sys.exit()
211 |
212 | return args
213 |
214 | class TincRollout():
215 | def __init__(o, opt=None):
216 | if isinstance(opt, dict):
217 | o.__dict__.update(opt)
218 | elif opt:
219 | o.__dict__.update(vars(opt))
220 | #log.debug("o.root = %s" % o.root)
221 | o.vpn_dir = os.path.abspath(os.path.join(o.root, o.vpn_name))
222 | #log.debug("o.vpn_dir = %s" % o.vpn_dir)
223 | o.hosts_dir = os.path.join(o.vpn_dir, 'hosts')
224 |
225 | def gen_keys(o):
226 | ## Gen keys if needed
227 | machine_file = os.path.join(o.vpn_dir, "hosts", o.hostname)
228 | key_file = os.path.join(o.vpn_dir, "rsa_key.priv")
229 | gen_keys = True
230 | if os.path.exists(key_file) and os.path.exists(machine_file):
231 | found_subnet=False
232 | found_key = False
233 | with open(machine_file, 'r') as INF:
234 | for line in INF.readlines():
235 | if line.startswith("Subnet"):
236 | found_subnet = True
237 | if line.strip() == "-----BEGIN RSA PUBLIC KEY-----":
238 | found_key = True
239 | if found_subnet and found_key:
240 | #log.info("%s already exists. No need to generate keys." % machine_file)
241 | gen_keys = False
242 | if gen_keys: # ugly ugly ugly
243 | if os.path.exists(key_file):
244 | os.unlink(key_file)
245 | with open(machine_file, 'w') as OUTF:
246 | OUTF.write("Subnet = %s/32\n" % o.ip)
247 | ret = subprocess.call('tincd -n "%s" --generate-keys' % o.vpn_name, shell=True)
248 | if ret == 127:
249 | log.error(str(ret)+"tincd not found. Please make sure that the tinc package is installed and that you are running this command as root.")
250 | sys.exit()
251 |
252 | def add_nets_boot(o):
253 | """Add vpn to nets.boot"""
254 | nets_file = os.path.join(o.root, "nets.boot")
255 | if not os.path.exists(nets_file):
256 | with open(nets_file, 'a') as OUTF:
257 | OUTF.write(o.vpn_name + "\n")
258 | else:
259 | with open(nets_file, 'r') as INF:
260 | lines = INF.readlines()
261 | found = False
262 | for line in lines:
263 | if line.strip() == o.vpn_name:
264 | found = True
265 | if not found:
266 | with open(nets_file, 'a') as OUTF:
267 | OUTF.write(o.vpn_name + "\n")
268 |
269 | def get_host_name(o):
270 | """Returns name of this machine in the tinc network, as
271 | specified in the tinc.conf file."""
272 | for line in slurp_if_exists(os.path.join(o.vpn_dir,"tinc.conf")).split("\n"):
273 | if not '=' in line:
274 | continue
275 | (key, val) = line.split("=")
276 | if key.strip() == "Name":
277 | return val.strip()
278 |
279 | def get_host_file(o):
280 | """Returns contents of host file for this machine. Assumes
281 | network name is freedombox and it's all in o.vpn_dir"""
282 |
283 | return slurp_if_exists(os.path.join(o.vpn_dir, "hosts", o.get_host_name()))
284 |
285 | def add_peer(o, peer_name, contents):
286 | """Adds contents as a hosts file with the given peer_name to
287 | the tinc vpn named vpn_name."""
288 | with open(os.path.join(os.path.join(o.vpn_dir, "hosts", peer_name)), 'w') as OUTF:
289 | OUTF.write(contents)
290 |
291 |
292 | class Package(TincRollout):
293 | def package(o):
294 | log.info("Packaging %s for sending to other machines." % o.vpn_name)
295 | if os.path.exists(o.tar):
296 | os.unlink(o.tar)
297 | with tarfile.open(o.tar, mode='w') as OUT:
298 | with chdir(o.vpn_dir):
299 | for f in os.listdir(o.hosts_dir):
300 | if not f.endswith("~"):
301 | fname = os.path.join('hosts', f)
302 | OUT.add(fname)
303 |
304 | class Add(TincRollout):
305 | def add_peers(o):
306 | """Add host key files for peers. Overwrites files that
307 | already exists. Doesn't write local host file."""
308 |
309 | if not os.path.exists(o.tar):
310 | log.warn("Can't find %s, which is fine if this is a new vpn installation" % o.tar)
311 | return
312 | with tarfile.open(o.tar, 'r') as TAR:
313 | for member in TAR.getmembers():
314 | (direc, fname) = os.path.split(member.name)
315 | if fname != o.hostname:
316 | if not o.peer or fname in o.peer:
317 | ## Sure, we could use TAR.extractall, but
318 | ## reading the data and then writing the host
319 | ## file protects against malicious tar files
320 | ## with absolute paths in them.
321 | contents = TAR.extractfile(member).read()
322 | o.add_peer(fname, contents)
323 |
324 | def add_connect_to(o):
325 | """Look at hosts in hosts dir, add any that have addresses to tinc.conf.
326 |
327 | We can't just look at the tar file because there might be
328 | additional hosts that were added by hand or just happen to be
329 | missing from the tar file.
330 |
331 | Assumes tinc.conf exists so we can add ConnectTo entries.
332 | """
333 |
334 | connect = []
335 | for f in os.listdir(o.hosts_dir):
336 | fname = os.path.join(o.hosts_dir, f)
337 | with open(fname, 'r') as INF:
338 | for line in INF.readlines():
339 | if line.startswith("Address = "): #TODO: this should be a regex
340 | connect.append(f)
341 |
342 | present = []
343 | with open(os.path.join(o.vpn_dir, 'tinc.conf'), 'r+') as INF:
344 | for line in INF.readlines():
345 | if line.startswith("ConnectTo = "):
346 | present.append(line.split('=')[1].strip())
347 | for host in connect:
348 | if not host in present:
349 | INF.write("ConnectTo = %s\n" % host)
350 |
351 | def add(o):
352 | log.info("Adding %s tinc files" % o.vpn_name)
353 | o.hostname = re.sub('[^0-9a-zA-Z_]+', '_', "%s" % o.hostname) # Replace invalid characters for the tinc daemon name with underscores
354 | NewVPN(o).create() # do a base install w/o overwriting keys or config
355 | o.add_peers()
356 | o.add_connect_to()
357 |
358 | log.info("\nIf this machine has a public-facing IP address, you might want to add that to %s." % os.path.join(o.root, o.vpn_name, "hosts", o.hostname)
359 | + "If your machine was not in the tar file, you might want to do `%s --package -n %s` to " % (os.path.basename(sys.argv[0]), o.vpn_name)
360 | + "put your machine in the tar file. Then you can distribute the tar to get others on to the network."
361 | + "\nYou should probably restart the tinc server now.")
362 |
363 | class Remove(TincRollout):
364 | def remove(o):
365 | log.error("Removing hosts not yet implemented.")
366 |
367 | class NewVPN(TincRollout):
368 | """Do a base install, without overwriting existing keys or hosts."""
369 | def write_config(o, fname):
370 | filespec = os.path.join(o.vpn_dir, fname)
371 | d = {
372 | "tinc-up":"#!/bin/sh\nIP=%s\nifconfig $INTERFACE $IP netmask 255.255.255.0\n" % o.ip,
373 | "tinc-down":"#!/bin/sh\nVPN_NAME=%s\nifconfig $VPN_NAME down\n" % o.vpn_name,
374 | "tinc.conf":"Name = %s\nAddressFamily = ipv4\nDevice = /dev/net/tun\nLocalDiscovery = yes\n" % o.hostname,
375 | }
376 | if os.path.exists(filespec):
377 | contents = slurp_if_exists(filespec)
378 | if d[fname] != contents:
379 | log.warn("%s already exists. Delete %s and run command again if you want to overwrite." % (filespec, filespec))
380 | return
381 | with open(filespec, 'w') as OUTF:
382 | OUTF.write(d[fname])
383 | if fname in ['tinc-up', 'tinc-down']:
384 | os.chmod(filespec, os.stat(filespec).st_mode | stat.S_IEXEC)
385 | def write_host(o):
386 | fname = os.path.join(o.hosts_dir, o.hostname)
387 | if not os.path.exists(fname):
388 | with open(fname, 'w') as OUTF:
389 | OUTF.write("Subnet = %s/32\n" % o.ip)
390 |
391 | def create(o):
392 | o.add_nets_boot()
393 | if not os.path.exists(o.vpn_dir):
394 | os.mkdir(o.vpn_dir)
395 | o.write_config('tinc.conf')
396 | o.write_config('tinc-up')
397 | o.write_config('tinc-down')
398 | if not os.path.exists(o.hosts_dir):
399 | os.mkdir(o.hosts_dir)
400 | o.write_host()
401 | o.gen_keys()
402 |
403 | def main(argv):
404 | config_logger()
405 | opt = parse_params(argv)
406 | if opt.action == "package":
407 | Package(opt).package()
408 | elif opt.action == "add":
409 | Add(opt).add()
410 | elif opt.action == "remove":
411 | Remove(opt).remove()
412 | if __name__ == "__main__":
413 | if len(sys.argv) >= 2:
414 | if sys.argv[1] == "document":
415 | with open("README.md", 'w') as OUTF:
416 | OUTF.write(__doc__)
417 | sys.exit()
418 |
419 | main(sys.argv)
420 |
--------------------------------------------------------------------------------
/COPYING:
--------------------------------------------------------------------------------
1 | LICENSING
2 | =========
3 |
4 | tinc-rollout is published under the GNU General Public License,
5 | version 3 or later, which is reproduced here. Below the GPLv3 license
6 | are license notices for other code included in tinc-rollout, if any.
7 |
8 | GPLv3
9 | -----
10 |
11 | GNU GENERAL PUBLIC LICENSE
12 | Version 3, 29 June 2007
13 |
14 | Copyright (C) 2007 Free Software Foundation, Inc.
15 | Everyone is permitted to copy and distribute verbatim copies
16 | of this license document, but changing it is not allowed.
17 |
18 | Preamble
19 |
20 | The GNU General Public License is a free, copyleft license for
21 | software and other kinds of works.
22 |
23 | The licenses for most software and other practical works are designed
24 | to take away your freedom to share and change the works. By contrast,
25 | the GNU General Public License is intended to guarantee your freedom to
26 | share and change all versions of a program--to make sure it remains free
27 | software for all its users. We, the Free Software Foundation, use the
28 | GNU General Public License for most of our software; it applies also to
29 | any other work released this way by its authors. You can apply it to
30 | your programs, too.
31 |
32 | When we speak of free software, we are referring to freedom, not
33 | price. Our General Public Licenses are designed to make sure that you
34 | have the freedom to distribute copies of free software (and charge for
35 | them if you wish), that you receive source code or can get it if you
36 | want it, that you can change the software or use pieces of it in new
37 | free programs, and that you know you can do these things.
38 |
39 | To protect your rights, we need to prevent others from denying you
40 | these rights or asking you to surrender the rights. Therefore, you have
41 | certain responsibilities if you distribute copies of the software, or if
42 | you modify it: responsibilities to respect the freedom of others.
43 |
44 | For example, if you distribute copies of such a program, whether
45 | gratis or for a fee, you must pass on to the recipients the same
46 | freedoms that you received. You must make sure that they, too, receive
47 | or can get the source code. And you must show them these terms so they
48 | know their rights.
49 |
50 | Developers that use the GNU GPL protect your rights with two steps:
51 | (1) assert copyright on the software, and (2) offer you this License
52 | giving you legal permission to copy, distribute and/or modify it.
53 |
54 | For the developers' and authors' protection, the GPL clearly explains
55 | that there is no warranty for this free software. For both users' and
56 | authors' sake, the GPL requires that modified versions be marked as
57 | changed, so that their problems will not be attributed erroneously to
58 | authors of previous versions.
59 |
60 | Some devices are designed to deny users access to install or run
61 | modified versions of the software inside them, although the manufacturer
62 | can do so. This is fundamentally incompatible with the aim of
63 | protecting users' freedom to change the software. The systematic
64 | pattern of such abuse occurs in the area of products for individuals to
65 | use, which is precisely where it is most unacceptable. Therefore, we
66 | have designed this version of the GPL to prohibit the practice for those
67 | products. If such problems arise substantially in other domains, we
68 | stand ready to extend this provision to those domains in future versions
69 | of the GPL, as needed to protect the freedom of users.
70 |
71 | Finally, every program is threatened constantly by software patents.
72 | States should not allow patents to restrict development and use of
73 | software on general-purpose computers, but in those that do, we wish to
74 | avoid the special danger that patents applied to a free program could
75 | make it effectively proprietary. To prevent this, the GPL assures that
76 | patents cannot be used to render the program non-free.
77 |
78 | The precise terms and conditions for copying, distribution and
79 | modification follow.
80 |
81 | TERMS AND CONDITIONS
82 |
83 | 0. Definitions.
84 |
85 | "This License" refers to version 3 of the GNU General Public License.
86 |
87 | "Copyright" also means copyright-like laws that apply to other kinds of
88 | works, such as semiconductor masks.
89 |
90 | "The Program" refers to any copyrightable work licensed under this
91 | License. Each licensee is addressed as "you". "Licensees" and
92 | "recipients" may be individuals or organizations.
93 |
94 | To "modify" a work means to copy from or adapt all or part of the work
95 | in a fashion requiring copyright permission, other than the making of an
96 | exact copy. The resulting work is called a "modified version" of the
97 | earlier work or a work "based on" the earlier work.
98 |
99 | A "covered work" means either the unmodified Program or a work based
100 | on the Program.
101 |
102 | To "propagate" a work means to do anything with it that, without
103 | permission, would make you directly or secondarily liable for
104 | infringement under applicable copyright law, except executing it on a
105 | computer or modifying a private copy. Propagation includes copying,
106 | distribution (with or without modification), making available to the
107 | public, and in some countries other activities as well.
108 |
109 | To "convey" a work means any kind of propagation that enables other
110 | parties to make or receive copies. Mere interaction with a user through
111 | a computer network, with no transfer of a copy, is not conveying.
112 |
113 | An interactive user interface displays "Appropriate Legal Notices"
114 | to the extent that it includes a convenient and prominently visible
115 | feature that (1) displays an appropriate copyright notice, and (2)
116 | tells the user that there is no warranty for the work (except to the
117 | extent that warranties are provided), that licensees may convey the
118 | work under this License, and how to view a copy of this License. If
119 | the interface presents a list of user commands or options, such as a
120 | menu, a prominent item in the list meets this criterion.
121 |
122 | 1. Source Code.
123 |
124 | The "source code" for a work means the preferred form of the work
125 | for making modifications to it. "Object code" means any non-source
126 | form of a work.
127 |
128 | A "Standard Interface" means an interface that either is an official
129 | standard defined by a recognized standards body, or, in the case of
130 | interfaces specified for a particular programming language, one that
131 | is widely used among developers working in that language.
132 |
133 | The "System Libraries" of an executable work include anything, other
134 | than the work as a whole, that (a) is included in the normal form of
135 | packaging a Major Component, but which is not part of that Major
136 | Component, and (b) serves only to enable use of the work with that
137 | Major Component, or to implement a Standard Interface for which an
138 | implementation is available to the public in source code form. A
139 | "Major Component", in this context, means a major essential component
140 | (kernel, window system, and so on) of the specific operating system
141 | (if any) on which the executable work runs, or a compiler used to
142 | produce the work, or an object code interpreter used to run it.
143 |
144 | The "Corresponding Source" for a work in object code form means all
145 | the source code needed to generate, install, and (for an executable
146 | work) run the object code and to modify the work, including scripts to
147 | control those activities. However, it does not include the work's
148 | System Libraries, or general-purpose tools or generally available free
149 | programs which are used unmodified in performing those activities but
150 | which are not part of the work. For example, Corresponding Source
151 | includes interface definition files associated with source files for
152 | the work, and the source code for shared libraries and dynamically
153 | linked subprograms that the work is specifically designed to require,
154 | such as by intimate data communication or control flow between those
155 | subprograms and other parts of the work.
156 |
157 | The Corresponding Source need not include anything that users
158 | can regenerate automatically from other parts of the Corresponding
159 | Source.
160 |
161 | The Corresponding Source for a work in source code form is that
162 | same work.
163 |
164 | 2. Basic Permissions.
165 |
166 | All rights granted under this License are granted for the term of
167 | copyright on the Program, and are irrevocable provided the stated
168 | conditions are met. This License explicitly affirms your unlimited
169 | permission to run the unmodified Program. The output from running a
170 | covered work is covered by this License only if the output, given its
171 | content, constitutes a covered work. This License acknowledges your
172 | rights of fair use or other equivalent, as provided by copyright law.
173 |
174 | You may make, run and propagate covered works that you do not
175 | convey, without conditions so long as your license otherwise remains
176 | in force. You may convey covered works to others for the sole purpose
177 | of having them make modifications exclusively for you, or provide you
178 | with facilities for running those works, provided that you comply with
179 | the terms of this License in conveying all material for which you do
180 | not control copyright. Those thus making or running the covered works
181 | for you must do so exclusively on your behalf, under your direction
182 | and control, on terms that prohibit them from making any copies of
183 | your copyrighted material outside their relationship with you.
184 |
185 | Conveying under any other circumstances is permitted solely under
186 | the conditions stated below. Sublicensing is not allowed; section 10
187 | makes it unnecessary.
188 |
189 | 3. Protecting Users' Legal Rights From Anti-Circumvention Law.
190 |
191 | No covered work shall be deemed part of an effective technological
192 | measure under any applicable law fulfilling obligations under article
193 | 11 of the WIPO copyright treaty adopted on 20 December 1996, or
194 | similar laws prohibiting or restricting circumvention of such
195 | measures.
196 |
197 | When you convey a covered work, you waive any legal power to forbid
198 | circumvention of technological measures to the extent such circumvention
199 | is effected by exercising rights under this License with respect to
200 | the covered work, and you disclaim any intention to limit operation or
201 | modification of the work as a means of enforcing, against the work's
202 | users, your or third parties' legal rights to forbid circumvention of
203 | technological measures.
204 |
205 | 4. Conveying Verbatim Copies.
206 |
207 | You may convey verbatim copies of the Program's source code as you
208 | receive it, in any medium, provided that you conspicuously and
209 | appropriately publish on each copy an appropriate copyright notice;
210 | keep intact all notices stating that this License and any
211 | non-permissive terms added in accord with section 7 apply to the code;
212 | keep intact all notices of the absence of any warranty; and give all
213 | recipients a copy of this License along with the Program.
214 |
215 | You may charge any price or no price for each copy that you convey,
216 | and you may offer support or warranty protection for a fee.
217 |
218 | 5. Conveying Modified Source Versions.
219 |
220 | You may convey a work based on the Program, or the modifications to
221 | produce it from the Program, in the form of source code under the
222 | terms of section 4, provided that you also meet all of these conditions:
223 |
224 | a) The work must carry prominent notices stating that you modified
225 | it, and giving a relevant date.
226 |
227 | b) The work must carry prominent notices stating that it is
228 | released under this License and any conditions added under section
229 | 7. This requirement modifies the requirement in section 4 to
230 | "keep intact all notices".
231 |
232 | c) You must license the entire work, as a whole, under this
233 | License to anyone who comes into possession of a copy. This
234 | License will therefore apply, along with any applicable section 7
235 | additional terms, to the whole of the work, and all its parts,
236 | regardless of how they are packaged. This License gives no
237 | permission to license the work in any other way, but it does not
238 | invalidate such permission if you have separately received it.
239 |
240 | d) If the work has interactive user interfaces, each must display
241 | Appropriate Legal Notices; however, if the Program has interactive
242 | interfaces that do not display Appropriate Legal Notices, your
243 | work need not make them do so.
244 |
245 | A compilation of a covered work with other separate and independent
246 | works, which are not by their nature extensions of the covered work,
247 | and which are not combined with it such as to form a larger program,
248 | in or on a volume of a storage or distribution medium, is called an
249 | "aggregate" if the compilation and its resulting copyright are not
250 | used to limit the access or legal rights of the compilation's users
251 | beyond what the individual works permit. Inclusion of a covered work
252 | in an aggregate does not cause this License to apply to the other
253 | parts of the aggregate.
254 |
255 | 6. Conveying Non-Source Forms.
256 |
257 | You may convey a covered work in object code form under the terms
258 | of sections 4 and 5, provided that you also convey the
259 | machine-readable Corresponding Source under the terms of this License,
260 | in one of these ways:
261 |
262 | a) Convey the object code in, or embodied in, a physical product
263 | (including a physical distribution medium), accompanied by the
264 | Corresponding Source fixed on a durable physical medium
265 | customarily used for software interchange.
266 |
267 | b) Convey the object code in, or embodied in, a physical product
268 | (including a physical distribution medium), accompanied by a
269 | written offer, valid for at least three years and valid for as
270 | long as you offer spare parts or customer support for that product
271 | model, to give anyone who possesses the object code either (1) a
272 | copy of the Corresponding Source for all the software in the
273 | product that is covered by this License, on a durable physical
274 | medium customarily used for software interchange, for a price no
275 | more than your reasonable cost of physically performing this
276 | conveying of source, or (2) access to copy the
277 | Corresponding Source from a network server at no charge.
278 |
279 | c) Convey individual copies of the object code with a copy of the
280 | written offer to provide the Corresponding Source. This
281 | alternative is allowed only occasionally and noncommercially, and
282 | only if you received the object code with such an offer, in accord
283 | with subsection 6b.
284 |
285 | d) Convey the object code by offering access from a designated
286 | place (gratis or for a charge), and offer equivalent access to the
287 | Corresponding Source in the same way through the same place at no
288 | further charge. You need not require recipients to copy the
289 | Corresponding Source along with the object code. If the place to
290 | copy the object code is a network server, the Corresponding Source
291 | may be on a different server (operated by you or a third party)
292 | that supports equivalent copying facilities, provided you maintain
293 | clear directions next to the object code saying where to find the
294 | Corresponding Source. Regardless of what server hosts the
295 | Corresponding Source, you remain obligated to ensure that it is
296 | available for as long as needed to satisfy these requirements.
297 |
298 | e) Convey the object code using peer-to-peer transmission, provided
299 | you inform other peers where the object code and Corresponding
300 | Source of the work are being offered to the general public at no
301 | charge under subsection 6d.
302 |
303 | A separable portion of the object code, whose source code is excluded
304 | from the Corresponding Source as a System Library, need not be
305 | included in conveying the object code work.
306 |
307 | A "User Product" is either (1) a "consumer product", which means any
308 | tangible personal property which is normally used for personal, family,
309 | or household purposes, or (2) anything designed or sold for incorporation
310 | into a dwelling. In determining whether a product is a consumer product,
311 | doubtful cases shall be resolved in favor of coverage. For a particular
312 | product received by a particular user, "normally used" refers to a
313 | typical or common use of that class of product, regardless of the status
314 | of the particular user or of the way in which the particular user
315 | actually uses, or expects or is expected to use, the product. A product
316 | is a consumer product regardless of whether the product has substantial
317 | commercial, industrial or non-consumer uses, unless such uses represent
318 | the only significant mode of use of the product.
319 |
320 | "Installation Information" for a User Product means any methods,
321 | procedures, authorization keys, or other information required to install
322 | and execute modified versions of a covered work in that User Product from
323 | a modified version of its Corresponding Source. The information must
324 | suffice to ensure that the continued functioning of the modified object
325 | code is in no case prevented or interfered with solely because
326 | modification has been made.
327 |
328 | If you convey an object code work under this section in, or with, or
329 | specifically for use in, a User Product, and the conveying occurs as
330 | part of a transaction in which the right of possession and use of the
331 | User Product is transferred to the recipient in perpetuity or for a
332 | fixed term (regardless of how the transaction is characterized), the
333 | Corresponding Source conveyed under this section must be accompanied
334 | by the Installation Information. But this requirement does not apply
335 | if neither you nor any third party retains the ability to install
336 | modified object code on the User Product (for example, the work has
337 | been installed in ROM).
338 |
339 | The requirement to provide Installation Information does not include a
340 | requirement to continue to provide support service, warranty, or updates
341 | for a work that has been modified or installed by the recipient, or for
342 | the User Product in which it has been modified or installed. Access to a
343 | network may be denied when the modification itself materially and
344 | adversely affects the operation of the network or violates the rules and
345 | protocols for communication across the network.
346 |
347 | Corresponding Source conveyed, and Installation Information provided,
348 | in accord with this section must be in a format that is publicly
349 | documented (and with an implementation available to the public in
350 | source code form), and must require no special password or key for
351 | unpacking, reading or copying.
352 |
353 | 7. Additional Terms.
354 |
355 | "Additional permissions" are terms that supplement the terms of this
356 | License by making exceptions from one or more of its conditions.
357 | Additional permissions that are applicable to the entire Program shall
358 | be treated as though they were included in this License, to the extent
359 | that they are valid under applicable law. If additional permissions
360 | apply only to part of the Program, that part may be used separately
361 | under those permissions, but the entire Program remains governed by
362 | this License without regard to the additional permissions.
363 |
364 | When you convey a copy of a covered work, you may at your option
365 | remove any additional permissions from that copy, or from any part of
366 | it. (Additional permissions may be written to require their own
367 | removal in certain cases when you modify the work.) You may place
368 | additional permissions on material, added by you to a covered work,
369 | for which you have or can give appropriate copyright permission.
370 |
371 | Notwithstanding any other provision of this License, for material you
372 | add to a covered work, you may (if authorized by the copyright holders of
373 | that material) supplement the terms of this License with terms:
374 |
375 | a) Disclaiming warranty or limiting liability differently from the
376 | terms of sections 15 and 16 of this License; or
377 |
378 | b) Requiring preservation of specified reasonable legal notices or
379 | author attributions in that material or in the Appropriate Legal
380 | Notices displayed by works containing it; or
381 |
382 | c) Prohibiting misrepresentation of the origin of that material, or
383 | requiring that modified versions of such material be marked in
384 | reasonable ways as different from the original version; or
385 |
386 | d) Limiting the use for publicity purposes of names of licensors or
387 | authors of the material; or
388 |
389 | e) Declining to grant rights under trademark law for use of some
390 | trade names, trademarks, or service marks; or
391 |
392 | f) Requiring indemnification of licensors and authors of that
393 | material by anyone who conveys the material (or modified versions of
394 | it) with contractual assumptions of liability to the recipient, for
395 | any liability that these contractual assumptions directly impose on
396 | those licensors and authors.
397 |
398 | All other non-permissive additional terms are considered "further
399 | restrictions" within the meaning of section 10. If the Program as you
400 | received it, or any part of it, contains a notice stating that it is
401 | governed by this License along with a term that is a further
402 | restriction, you may remove that term. If a license document contains
403 | a further restriction but permits relicensing or conveying under this
404 | License, you may add to a covered work material governed by the terms
405 | of that license document, provided that the further restriction does
406 | not survive such relicensing or conveying.
407 |
408 | If you add terms to a covered work in accord with this section, you
409 | must place, in the relevant source files, a statement of the
410 | additional terms that apply to those files, or a notice indicating
411 | where to find the applicable terms.
412 |
413 | Additional terms, permissive or non-permissive, may be stated in the
414 | form of a separately written license, or stated as exceptions;
415 | the above requirements apply either way.
416 |
417 | 8. Termination.
418 |
419 | You may not propagate or modify a covered work except as expressly
420 | provided under this License. Any attempt otherwise to propagate or
421 | modify it is void, and will automatically terminate your rights under
422 | this License (including any patent licenses granted under the third
423 | paragraph of section 11).
424 |
425 | However, if you cease all violation of this License, then your
426 | license from a particular copyright holder is reinstated (a)
427 | provisionally, unless and until the copyright holder explicitly and
428 | finally terminates your license, and (b) permanently, if the copyright
429 | holder fails to notify you of the violation by some reasonable means
430 | prior to 60 days after the cessation.
431 |
432 | Moreover, your license from a particular copyright holder is
433 | reinstated permanently if the copyright holder notifies you of the
434 | violation by some reasonable means, this is the first time you have
435 | received notice of violation of this License (for any work) from that
436 | copyright holder, and you cure the violation prior to 30 days after
437 | your receipt of the notice.
438 |
439 | Termination of your rights under this section does not terminate the
440 | licenses of parties who have received copies or rights from you under
441 | this License. If your rights have been terminated and not permanently
442 | reinstated, you do not qualify to receive new licenses for the same
443 | material under section 10.
444 |
445 | 9. Acceptance Not Required for Having Copies.
446 |
447 | You are not required to accept this License in order to receive or
448 | run a copy of the Program. Ancillary propagation of a covered work
449 | occurring solely as a consequence of using peer-to-peer transmission
450 | to receive a copy likewise does not require acceptance. However,
451 | nothing other than this License grants you permission to propagate or
452 | modify any covered work. These actions infringe copyright if you do
453 | not accept this License. Therefore, by modifying or propagating a
454 | covered work, you indicate your acceptance of this License to do so.
455 |
456 | 10. Automatic Licensing of Downstream Recipients.
457 |
458 | Each time you convey a covered work, the recipient automatically
459 | receives a license from the original licensors, to run, modify and
460 | propagate that work, subject to this License. You are not responsible
461 | for enforcing compliance by third parties with this License.
462 |
463 | An "entity transaction" is a transaction transferring control of an
464 | organization, or substantially all assets of one, or subdividing an
465 | organization, or merging organizations. If propagation of a covered
466 | work results from an entity transaction, each party to that
467 | transaction who receives a copy of the work also receives whatever
468 | licenses to the work the party's predecessor in interest had or could
469 | give under the previous paragraph, plus a right to possession of the
470 | Corresponding Source of the work from the predecessor in interest, if
471 | the predecessor has it or can get it with reasonable efforts.
472 |
473 | You may not impose any further restrictions on the exercise of the
474 | rights granted or affirmed under this License. For example, you may
475 | not impose a license fee, royalty, or other charge for exercise of
476 | rights granted under this License, and you may not initiate litigation
477 | (including a cross-claim or counterclaim in a lawsuit) alleging that
478 | any patent claim is infringed by making, using, selling, offering for
479 | sale, or importing the Program or any portion of it.
480 |
481 | 11. Patents.
482 |
483 | A "contributor" is a copyright holder who authorizes use under this
484 | License of the Program or a work on which the Program is based. The
485 | work thus licensed is called the contributor's "contributor version".
486 |
487 | A contributor's "essential patent claims" are all patent claims
488 | owned or controlled by the contributor, whether already acquired or
489 | hereafter acquired, that would be infringed by some manner, permitted
490 | by this License, of making, using, or selling its contributor version,
491 | but do not include claims that would be infringed only as a
492 | consequence of further modification of the contributor version. For
493 | purposes of this definition, "control" includes the right to grant
494 | patent sublicenses in a manner consistent with the requirements of
495 | this License.
496 |
497 | Each contributor grants you a non-exclusive, worldwide, royalty-free
498 | patent license under the contributor's essential patent claims, to
499 | make, use, sell, offer for sale, import and otherwise run, modify and
500 | propagate the contents of its contributor version.
501 |
502 | In the following three paragraphs, a "patent license" is any express
503 | agreement or commitment, however denominated, not to enforce a patent
504 | (such as an express permission to practice a patent or covenant not to
505 | sue for patent infringement). To "grant" such a patent license to a
506 | party means to make such an agreement or commitment not to enforce a
507 | patent against the party.
508 |
509 | If you convey a covered work, knowingly relying on a patent license,
510 | and the Corresponding Source of the work is not available for anyone
511 | to copy, free of charge and under the terms of this License, through a
512 | publicly available network server or other readily accessible means,
513 | then you must either (1) cause the Corresponding Source to be so
514 | available, or (2) arrange to deprive yourself of the benefit of the
515 | patent license for this particular work, or (3) arrange, in a manner
516 | consistent with the requirements of this License, to extend the patent
517 | license to downstream recipients. "Knowingly relying" means you have
518 | actual knowledge that, but for the patent license, your conveying the
519 | covered work in a country, or your recipient's use of the covered work
520 | in a country, would infringe one or more identifiable patents in that
521 | country that you have reason to believe are valid.
522 |
523 | If, pursuant to or in connection with a single transaction or
524 | arrangement, you convey, or propagate by procuring conveyance of, a
525 | covered work, and grant a patent license to some of the parties
526 | receiving the covered work authorizing them to use, propagate, modify
527 | or convey a specific copy of the covered work, then the patent license
528 | you grant is automatically extended to all recipients of the covered
529 | work and works based on it.
530 |
531 | A patent license is "discriminatory" if it does not include within
532 | the scope of its coverage, prohibits the exercise of, or is
533 | conditioned on the non-exercise of one or more of the rights that are
534 | specifically granted under this License. You may not convey a covered
535 | work if you are a party to an arrangement with a third party that is
536 | in the business of distributing software, under which you make payment
537 | to the third party based on the extent of your activity of conveying
538 | the work, and under which the third party grants, to any of the
539 | parties who would receive the covered work from you, a discriminatory
540 | patent license (a) in connection with copies of the covered work
541 | conveyed by you (or copies made from those copies), or (b) primarily
542 | for and in connection with specific products or compilations that
543 | contain the covered work, unless you entered into that arrangement,
544 | or that patent license was granted, prior to 28 March 2007.
545 |
546 | Nothing in this License shall be construed as excluding or limiting
547 | any implied license or other defenses to infringement that may
548 | otherwise be available to you under applicable patent law.
549 |
550 | 12. No Surrender of Others' Freedom.
551 |
552 | If conditions are imposed on you (whether by court order, agreement or
553 | otherwise) that contradict the conditions of this License, they do not
554 | excuse you from the conditions of this License. If you cannot convey a
555 | covered work so as to satisfy simultaneously your obligations under this
556 | License and any other pertinent obligations, then as a consequence you may
557 | not convey it at all. For example, if you agree to terms that obligate you
558 | to collect a royalty for further conveying from those to whom you convey
559 | the Program, the only way you could satisfy both those terms and this
560 | License would be to refrain entirely from conveying the Program.
561 |
562 | 13. Use with the GNU Affero General Public License.
563 |
564 | Notwithstanding any other provision of this License, you have
565 | permission to link or combine any covered work with a work licensed
566 | under version 3 of the GNU Affero General Public License into a single
567 | combined work, and to convey the resulting work. The terms of this
568 | License will continue to apply to the part which is the covered work,
569 | but the special requirements of the GNU Affero General Public License,
570 | section 13, concerning interaction through a network will apply to the
571 | combination as such.
572 |
573 | 14. Revised Versions of this License.
574 |
575 | The Free Software Foundation may publish revised and/or new versions of
576 | the GNU General Public License from time to time. Such new versions will
577 | be similar in spirit to the present version, but may differ in detail to
578 | address new problems or concerns.
579 |
580 | Each version is given a distinguishing version number. If the
581 | Program specifies that a certain numbered version of the GNU General
582 | Public License "or any later version" applies to it, you have the
583 | option of following the terms and conditions either of that numbered
584 | version or of any later version published by the Free Software
585 | Foundation. If the Program does not specify a version number of the
586 | GNU General Public License, you may choose any version ever published
587 | by the Free Software Foundation.
588 |
589 | If the Program specifies that a proxy can decide which future
590 | versions of the GNU General Public License can be used, that proxy's
591 | public statement of acceptance of a version permanently authorizes you
592 | to choose that version for the Program.
593 |
594 | Later license versions may give you additional or different
595 | permissions. However, no additional obligations are imposed on any
596 | author or copyright holder as a result of your choosing to follow a
597 | later version.
598 |
599 | 15. Disclaimer of Warranty.
600 |
601 | THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY
602 | APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT
603 | HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY
604 | OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO,
605 | THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
606 | PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM
607 | IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF
608 | ALL NECESSARY SERVICING, REPAIR OR CORRECTION.
609 |
610 | 16. Limitation of Liability.
611 |
612 | IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING
613 | WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MODIFIES AND/OR CONVEYS
614 | THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY
615 | GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE
616 | USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF
617 | DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD
618 | PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS),
619 | EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF
620 | SUCH DAMAGES.
621 |
622 | 17. Interpretation of Sections 15 and 16.
623 |
624 | If the disclaimer of warranty and limitation of liability provided
625 | above cannot be given local legal effect according to their terms,
626 | reviewing courts shall apply local law that most closely approximates
627 | an absolute waiver of all civil liability in connection with the
628 | Program, unless a warranty or assumption of liability accompanies a
629 | copy of the Program in return for a fee.
630 |
631 | END OF TERMS AND CONDITIONS
632 |
633 | How to Apply These Terms to Your New Programs
634 |
635 | If you develop a new program, and you want it to be of the greatest
636 | possible use to the public, the best way to achieve this is to make it
637 | free software which everyone can redistribute and change under these terms.
638 |
639 | To do so, attach the following notices to the program. It is safest
640 | to attach them to the start of each source file to most effectively
641 | state the exclusion of warranty; and each file should have at least
642 | the "copyright" line and a pointer to where the full notice is found.
643 |
644 |
645 | Copyright (C)
646 |
647 | This program is free software: you can redistribute it and/or modify
648 | it under the terms of the GNU General Public License as published by
649 | the Free Software Foundation, either version 3 of the License, or
650 | (at your option) any later version.
651 |
652 | This program is distributed in the hope that it will be useful,
653 | but WITHOUT ANY WARRANTY; without even the implied warranty of
654 | MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
655 | GNU General Public License for more details.
656 |
657 | You should have received a copy of the GNU General Public License
658 | along with this program. If not, see .
659 |
660 | Also add information on how to contact you by electronic and paper mail.
661 |
662 | If the program does terminal interaction, make it output a short
663 | notice like this when it starts in an interactive mode:
664 |
665 | Copyright (C)
666 | This program comes with ABSOLUTELY NO WARRANTY; for details type `show w'.
667 | This is free software, and you are welcome to redistribute it
668 | under certain conditions; type `show c' for details.
669 |
670 | The hypothetical commands `show w' and `show c' should show the appropriate
671 | parts of the General Public License. Of course, your program's commands
672 | might be different; for a GUI interface, you would use an "about box".
673 |
674 | You should also get your employer (if you work as a programmer) or school,
675 | if any, to sign a "copyright disclaimer" for the program, if necessary.
676 | For more information on this, and how to apply and follow the GNU GPL, see
677 | .
678 |
679 | The GNU General Public License does not permit incorporating your program
680 | into proprietary programs. If your program is a subroutine library, you
681 | may consider it more useful to permit linking proprietary applications with
682 | the library. If this is what you want to do, use the GNU Lesser General
683 | Public License instead of this License. But first, please read
684 | .
685 |
686 |
687 | SQLAlchemy Migrate
688 | ------------------
689 |
690 | We took a log filtering class from SQLAlchemy-Migrate. It's license is:
691 |
692 | The MIT License
693 |
694 | Copyright (c) 2009 Evan Rosson, Jan Dittberner, Domen Kožar
695 |
696 | Permission is hereby granted, free of charge, to any person obtaining a copy
697 | of this software and associated documentation files (the "Software"), to deal
698 | in the Software without restriction, including without limitation the rights
699 | to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
700 | copies of the Software, and to permit persons to whom the Software is
701 | furnished to do so, subject to the following conditions:
702 |
703 | The above copyright notice and this permission notice shall be included in
704 | all copies or substantial portions of the Software.
705 |
706 | THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
707 | IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
708 | FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
709 | AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
710 | LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
711 | OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
712 | THE SOFTWARE.
713 |
714 |
--------------------------------------------------------------------------------