├── .gitignore ├── README.md ├── start └── LICENSE /.gitignore: -------------------------------------------------------------------------------- 1 | nasmount 2 | key.txt 3 | nasmount 4 | *.swp 5 | backup.log 6 | -------------------------------------------------------------------------------- /README.md: -------------------------------------------------------------------------------- 1 | # LTO-Backup-script 2 | 3 | backups your data to a multiple LTO tapes while they are encrypted and compressed. 4 | 5 | ## SETUP 6 | change the config file for your needs in the head of the start script 7 | Keep in mind to install the following software applications: 8 | 9 | 10 | ############################### 11 | # nas backup connections 12 | NAS=nas 13 | NAS_IP=192.168.178.10 14 | MOUNT_NFS="$NAS_IP:pool0" 15 | MOUNT_LOCAL="/data/pool0" 16 | 17 | ############################### 18 | # mail options 19 | MAIL_PREFRACE="[nas-backup]" 20 | 21 | ############################### 22 | # Backup dirs; relative from Mount or full path 23 | NAS_MOUNT_DIR=$PWD/nasmount 24 | BACKUP_DIRS="homes photo docs docker cloud video /etc" 25 | KEYFILE="$PWD/key.txt" 26 | 27 | ############################### 28 | # Backup Log folder 29 | LOGBASE=$PWD/backup.log 30 | LOGFILE=$LOGBASE/$NOW.backup.log 31 | FILELIST=$LOGBASE/$NOW.tar.list 32 | TAPENAMES=$LOGBASE/$NOW.backup.tapenames.txt 33 | 34 | ############################### 35 | # Tape devie name 36 | TAPE="/dev/st0" 37 | TAPESIZE="400*1000*1000*1000" 38 | TAPESPEED="70*1000*1000" 39 | BLOCKSIZE="512K" 40 | 41 | ############################### 42 | # Tar options 43 | TAR_ARGS="-b 1024" 44 | TAPE_BUFF="3g" 45 | 46 | ############################### 47 | #compression 48 | # please add the pipe in order to also diable this compression completely 49 | #COMPRESSION_CMD="pigz -3 -p 32 " 50 | #DECOMPRESSION_CMD="pigz -dc -3 -p 32" 51 | COMPRESSION_CMD="zstd -3" 52 | DECOMPRESSION_CMD="zstd -3 -d" 53 | 54 | ############################### 55 | # Path to binaries 56 | TAR=/bin/tar 57 | MT=/usr/bin/mt-st 58 | MKDIR=/bin/mkdir 59 | MBUFFER=/usr/bin/mbuffer 60 | OPENSSL=/usr/bin/openssl 61 | PIPEMETER=/usr/bin/pipemeter 62 | COMPRESSION=/usr/bin/zstd 63 | UUENCODE=/usr/bin/uuencode 64 | 65 | 66 | ### Encrytion setup 67 | 68 | For encryption aes-256-cbc is used. In order for this to work you have to generate a `key.txt` file next 69 | to the start script. 70 | I prefer openssl to generate one for me 71 | 72 | 73 | openssl rand 512 > $KEYFILE 74 | 75 | 76 | ### email setup 77 | 78 | In oder to receive emails postfix has to be configured in the way that your emails get forwarded from root to 79 | a real email address. 80 | 81 | you can test this if you received an email with the following command 82 | 83 | 84 | echo "foo" | mail root --subject="test" 85 | 86 | 87 | If this works and you did receive an email you should also receive a email via this script. 88 | 89 | ## Usage 90 | 91 | ### full backup 92 | 93 | For a full backup just run the script like this: 94 | 95 | 96 | sudo start backup-full 97 | 98 | 99 | ### Tape number estimation 100 | For estimation of time and number of tapes needed for your backup you can execute the 101 | estimation. 102 | 103 | 104 | sudo start estimate-tapes 105 | 106 | 107 | ### Tape print content 108 | If you have a backup and you want to get the content of this tapes you can execute this command: 109 | 110 | 111 | sudo start tape-list 112 | 113 | 114 | You will be asked what number tapes your backup is utilizing. 115 | 116 | 117 | 118 | ### Tape restore content 119 | If you want to recover some or all of the files you can use this command. 120 | 121 | for a special file 122 | 123 | 124 | sudo start recover-data 125 | 126 | 127 | or for all files 128 | 129 | 130 | sudo start recover-data 131 | 132 | 133 | You will be asked what number tapes your backup is utilizing. 134 | -------------------------------------------------------------------------------- /start: -------------------------------------------------------------------------------- 1 | #!/bin/bash 2 | #-x 3 | 4 | ############################### 5 | # nas backup connections 6 | NAS=nas 7 | NAS_IP=192.168.178.10 8 | MOUNT_NFS="$NAS_IP:pool0" 9 | MOUNT_LOCAL="/data/pool0" 10 | 11 | ############################### 12 | # mail options 13 | MAIL_PREFRACE="[nas-backup]" 14 | 15 | ############################### 16 | # Backup dirs; relative from Mount or full path 17 | NAS_MOUNT_DIR=$PWD/nasmount 18 | BACKUP_DIRS="homes photo docs docker cloud video /etc" 19 | KEYFILE="$PWD/key.txt" 20 | 21 | ############################### 22 | # Backup Log folder 23 | LOGBASE=$PWD/backup.log 24 | LOGFILE=$LOGBASE/$NOW.backup.log 25 | FILELIST=$LOGBASE/$NOW.tar.list 26 | TAPENAMES=$LOGBASE/$NOW.backup.tapenames.txt 27 | 28 | ############################### 29 | # Tape devie name 30 | TAPE="/dev/st0" 31 | TAPESIZE="400*1000*1000*1000" 32 | TAPESPEED="70*1000*1000" 33 | BLOCKSIZE="512K" 34 | 35 | ############################### 36 | # Tar options 37 | TAR_ARGS="-b 1024" 38 | TAPE_BUFF="3g" 39 | 40 | ############################### 41 | #compression 42 | # please add the pipe in order to also diable this compression completely 43 | #COMPRESSION_CMD="pigz -3 -p 32 " 44 | #DECOMPRESSION_CMD="pigz -dc -3 -p 32" 45 | COMPRESSION_CMD="zstd -3" 46 | DECOMPRESSION_CMD="zstd -3 -d" 47 | 48 | ############################### 49 | # Path to binaries 50 | TAR=/bin/tar 51 | MT=/usr/bin/mt-st 52 | MKDIR=/bin/mkdir 53 | MBUFFER=/usr/bin/mbuffer 54 | OPENSSL=/usr/bin/openssl 55 | PIPEMETER=/usr/bin/pipemeter 56 | COMPRESSION=/usr/bin/zstd 57 | UUENCODE=/usr/bin/uuencode 58 | 59 | #endof cfg 60 | ############################### 61 | 62 | WORKDIR=$PWD 63 | SCRIPT=$(readlink -f $0 2>/dev/null) 64 | 65 | # Get todays day like Mon, Tue and so on 66 | NOW=$(date +"%a") 67 | 68 | 69 | wait_for_next_tape() { 70 | sendmail_event NEXTTAPE 71 | eject_tape 72 | echo_log "wait for tape" 73 | while true 74 | do 75 | mt -f /dev/st0 status | grep ONLINE >/dev/null 76 | rt=$? 77 | if [[ $rt -eq 0 ]] 78 | then 79 | break; 80 | fi 81 | sleep 2 82 | done 83 | } 84 | 85 | eject_tape() { 86 | [ -e $MT ] && mt -f /dev/st0 status | grep ONLINE >/dev/null 87 | rt=$? 88 | if [[ $rt -eq 0 ]] 89 | then 90 | [ -e $MT ] && $MT -f $TAPE rewind 91 | [ -e $MT ] && $MT -f $TAPE eject 92 | fi 93 | } 94 | 95 | 96 | ############################################################################### 97 | # log helper functions 98 | LOGDELIM="###############################################################################" 99 | cleanup_log() { 100 | echo "" > $LOGFILE 101 | echo "" > $FILELIST 102 | } 103 | echo_log() { 104 | >&1 echo $@ 105 | echo $@ >> $LOGFILE 106 | } 107 | 108 | error() { 109 | error_log $@ 110 | sendmail_event FAIL 111 | #exit -1 112 | } 113 | 114 | error_log() { 115 | echo_log "$LOGDELIM" 116 | echo_log "BACKUP FAILED" 117 | echo_log "$LOGDELIM" 118 | echo_log "reason: $@" 119 | echo_log "$LOGDELIM" 120 | } 121 | 122 | ############################################################################### 123 | 124 | ############################################################################### 125 | # helper function for tape change 126 | 127 | calc_time() 128 | { 129 | seconds=$( calc "(( $1 ) % 60 )" ) 130 | minutes=$( calc "(( $1 ) / 60 ) % 60 " | sed -n "s/\([0-9]*\).*/\1/p" ) 131 | hours=$( calc "(( $1 ) / 60 ) / 60 " | sed -n "s/\([0-9]*\).*/\1/p" ) 132 | echo "$hours:$minutes:$seconds" 133 | } 134 | sendmail_for_backup_needed() 135 | { 136 | sendmail \ 137 | "please start a tapebackup" \ 138 | "A tape backup would be needed now\n" \ 139 | "$( main estimate-tapes )" 140 | } 141 | 142 | estimate_size() 143 | { 144 | cd $NAS_MOUNT_DIR > /dev/null 145 | du -sbc $BACKUP_DIRS | sed -n "s/\([0-8]*\).*/\1/p" | tail -n1 146 | cd - > /dev/null 147 | } 148 | 149 | #### Custom functions ##### 150 | sendmail_event() 151 | { 152 | case $1 in 153 | FULLSTART) 154 | export start_time=$SECONDS 155 | sendmail "Full Backup started" "Full backup started for $BACKUP_DIRS" 156 | ;; 157 | FULLEND) 158 | end_time=$SECONDS 159 | time=$(( end_time - start_time )) 160 | time_str=$( calc_time $time ) 161 | if [[ -e $FILELIST ]] 162 | then 163 | tar -cjf $FILELIST.bz2.tar $FILELIST 164 | fi 165 | 166 | sendmail \ 167 | "finished backup" \ 168 | $FILELIST.bz2.tar \ 169 | "sucessfull backuped the following dirs $BACKUP_DIRS \n" \ 170 | "Time needed was $time_str" 171 | ;; 172 | NEXTTAPE) 173 | sendmail "Next Tape please" "test" "Please change tape and not the order." 174 | ;; 175 | FAIL) 176 | end_time=$SECONDS 177 | time=$(( end_time - start_time )) 178 | time_str=$( calc_time $time ) 179 | sendmail \ 180 | "failed to backup" \ 181 | $TAPENAMES \ 182 | "failed to backup the following dirs $BACKUP_DIRS \n" \ 183 | "Time needed was $time_str" 184 | ;; 185 | *) 186 | error_log "failed invalid send event" 187 | ;; 188 | esac 189 | } 190 | 191 | sendmail() { 192 | SUBJECT=$1 193 | shift 194 | local attachments 195 | 196 | if [[ -e $LOGFILE ]] 197 | then 198 | attachments+="$UUENCODE $LOGFILE $( basename $LOGFILE) ; " 199 | fi 200 | 201 | while true 202 | do 203 | if [[ -e $1 ]] 204 | then 205 | attachments+="$UUENCODE $1 $(basename $1) ; " 206 | shift 207 | else 208 | break 209 | fi 210 | done 211 | 212 | BODY=$@ 213 | 214 | eval "( echo -e '$BODY' ; $attachments ) | mail root --subject=\"$MAIL_PREFRACE $SUBJECT\" $LOG_ATTACHMENT" 215 | echo "( echo -e '$BODY' ; $attachments ) | mail root --subject=\"$MAIL_PREFRACE $SUBJECT\" $LOG_ATTACHMENT" 216 | } 217 | 218 | ############################################################################### 219 | # mount nas directories 220 | mount_nas() { 221 | if [[ "$HOSTNAME" == "$NAS" ]] 222 | then 223 | echo_log "no need to mount nas" 224 | [[ -e $NAS_MOUNT_DIR ]] || ln -s $MOUNT_LOCAL $NAS_MOUNT_DIR 225 | else 226 | echo_log "mount nas" 227 | 228 | $MKDIR $NAS_MOUNT_DIR 229 | sudo mount.nfs $MOUNT_NFS $NAS_MOUNT_DIR 230 | fi 231 | } 232 | ############################################################################### 233 | 234 | # Make sure all dirs exits 235 | verify() { 236 | 237 | local s=0 238 | [ -d $LOGBASE ] || $MKDIR -p $LOGBASE || ( error_log "error could not create log file -> stop" && s=1) 239 | 240 | echo_log "verify programs" 241 | [ -e $TAR ] || ( error_log "tar is not installed (curr set to '$TAR' -> stop" && s=1) 242 | [ -e $MT ] || ( error_log "mt is not installed (curr set to '$MT' -> stop" && s=1) 243 | [ -e $MKDIR ] || ( error_log "mkdir is not installed (curr set to '$MKDIR' -> stop" && s=1) 244 | [ -e $MBUFFER ] || ( error_log "mbuffer is not installed (curr set to '$MBUFFER' -> stop" && s=1) 245 | [ -e $OPENSSL ] || ( error_log "opensll is not installed (curr set to '$OPENSSL' -> stop" && s=1) 246 | [ -e $PIPEMETER ] || ( error_log "pipemeter is not installed (curr set to '$PIPEMETER' -> stop" && s=1) 247 | [ -e $COMPRESSION ] || ( error_log "compression is not installed (curr set to '$COMPRESSION' -> stop" && s=1) 248 | [ -e $UUENCODE ] || ( error_log "uuencode is not installed (curr set to '$UUENCODE' -> stop" && s=1) 249 | 250 | echo_log "verify dirs" 251 | for d in $BACKUP_DIRS 252 | do 253 | local test_dir 254 | if [[ $d = /* ]] 255 | then 256 | test_dir=$d 257 | else 258 | test_dir=$NAS_MOUNT_DIR/$d 259 | fi 260 | 261 | if [ ! -d $test_dir ]; 262 | then 263 | echo_log "Error : $test_dir directory does not exits!" 264 | s=1 265 | fi 266 | done 267 | 268 | ( [ -e $MT ] && [ -e $TAPE ]) || ( error_log "tape is not present at '$TAPE' -> stop" && s=1) 269 | 270 | [ -e $KEYFILE ] || ( error_log "key file is empty please generate one with 'openssl rand 512 > $KEYFILE'" && s=1) 271 | 272 | # if not; just die 273 | [ $s -eq 1 ] && error "failed -> stop" 274 | } 275 | 276 | print_help() { 277 | echo "usage:" 278 | echo "sudo $( basename $SCRIPT ) backup-full | do a full backup of all files to the tape drive" 279 | echo "sudo $( basename $SCRIPT ) estimate-tapes | estimates the number of tapes for the backup" 280 | echo "sudo $( basename $SCRIPT ) tape-list | lists the content of the tape drive" 281 | echo "sudo $( basename $SCRIPT ) recover-data [selective file list] | recovers data from the tape drive " 282 | } 283 | 284 | #### Main logic #### 285 | 286 | # Make sure log dir exits 287 | main() { 288 | 289 | echo_log "today is $NOW" 290 | 291 | # Okay let us start backup procedure 292 | # If it is monday make a full backup; 293 | # For Tue to Fri make a partial backup 294 | # Weekend no backups 295 | case $1 in 296 | "backup-full") 297 | cleanup_log 298 | mount_nas 299 | verify 300 | backup "backup-full" 301 | ;; 302 | "tape-list") 303 | cleanup_log 304 | verify 305 | backup "tape-list" 306 | ;; 307 | "tape-restore") 308 | cleanup_log 309 | verify 310 | backup "tape-restore" $@ 311 | ;; 312 | "estimate-tapes") 313 | verify 314 | backup "estimate-tapes" 315 | ;; 316 | *) 317 | print_help 318 | ;; 319 | esac 320 | 321 | } 322 | 323 | calc() { 324 | awk "BEGIN{printf \"%.2f\", $1}" 325 | } 326 | 327 | # Make a full backup 328 | backup() { 329 | local old=$(pwd) 330 | 331 | case $1 in 332 | backup-full) 333 | cd $NAS_MOUNT_DIR 334 | echo_log "start full backup" 335 | sendmail_event FULLSTART 336 | echo_log "estimate time for $BACKUP_DIRS" 337 | echo_log "please insert tape in the mean time if not already done" 338 | size=$( estimate_size ) 339 | 340 | echo_log "estimates size is \'$size\'b" 341 | $TAR $TAR_ARGS -cvf - $BACKUP_DIRS 2> $FILELIST | \ 342 | pipemeter -s $size -a -b $BLOCKSIZE -l | \ 343 | $COMPRESSION_CMD | \ 344 | $OPENSSL enc -aes-256-cbc -pass file:$KEYFILE | \ 345 | $MBUFFER \ 346 | -A "bash -c \"source $SCRIPT; wait_for_next_tape\"" \ 347 | -P 95 \ 348 | -m $TAPE_BUFF \ 349 | -f \ 350 | -o $TAPE \ 351 | -L \ 352 | -s$BLOCKSIZE 353 | rt=$? 354 | if [ ! $rt -eq 0 ] 355 | then 356 | error "tar command failed with $rt" 357 | else 358 | sendmail_event FULLEND 359 | fi 360 | eject_tape 361 | cd $old 362 | ;; 363 | 364 | tape-list) 365 | ;& 366 | tape-restore) 367 | if [[ $1 == tape-restore ]] 368 | then 369 | OPT="x" 370 | OUTPUT_DIR="-C $2" 371 | shift 372 | else 373 | OPT="t" 374 | fi 375 | shift #remove tape-restor rest is files and paths 376 | 377 | echo please enter the number of tapes to read 378 | read tapes_count 379 | 380 | $MBUFFER -n $tapes_count -i $TAPE \ 381 | -A "bash -c \"source $SCRIPT; wait_for_next_tape\"" \ 382 | -P 95 \ 383 | -m 0.5g \ 384 | -f \ 385 | -L \ 386 | -q \ 387 | -s$BLOCKSIZE | 388 | $OPENSSL enc -d -aes-256-cbc -pass file:$KEYFILE | 389 | $DECOMPRESSION_CMD | \ 390 | $TAR $TAR_ARGS -${OPT}vf - $OUTPUT_DIR $@ 2> $FILELIST 391 | ;; 392 | 393 | estimate-tapes) 394 | size=$( estimate_size ) 395 | echo $size 396 | 397 | size_str=$( numfmt --to iec --format "%8.4f" "$size" ) 398 | 399 | tapenumer=$( calc "$size/($TAPESIZE)" ) 400 | tapetime=$( calc "$size/($TAPESPEED)" ) 401 | 402 | time_str=$( calc_time $tapetime ) 403 | 404 | echo_log "estimated tapes are $tapenumer for the $size_str" 405 | echo_log "estimated time is $time_str (not counting the delay of changes)" 406 | echo_log "with the backup of the following dirs $BACKUP_DIRS" 407 | ;; 408 | 409 | *) 410 | error "unkown backup cmd" 411 | ;; 412 | esac 413 | 414 | } 415 | 416 | #### Main logic #### 417 | 418 | # Make sure log dir exits 419 | 420 | #sendmail "Full Backup started" "Full backup started for $BACKUP_DIRS" 421 | 422 | case "$0" in 423 | *start) 424 | echo "Script is a subshell" 425 | main $@ 426 | ;; 427 | *) 428 | echo "Script is being sourced" 429 | ;; 430 | esac 431 | #> $LOGFILE 2>&1 432 | #main 433 | -------------------------------------------------------------------------------- /LICENSE: -------------------------------------------------------------------------------- 1 | GNU GENERAL PUBLIC LICENSE 2 | 3 | Version 3, 29 June 2007 4 | 5 | Copyright © 2007 Free Software Foundation, Inc. 6 | 7 | Everyone is permitted to copy and distribute verbatim copies of this license 8 | document, but changing it is not allowed. 9 | 10 | Preamble 11 | 12 | The GNU General Public License is a free, copyleft license for software and 13 | other kinds of works. 14 | 15 | The licenses for most software and other practical works are designed to take 16 | away your freedom to share and change the works. By contrast, the GNU General 17 | Public License is intended to guarantee your freedom to share and change all 18 | versions of a program--to make sure it remains free software for all its users. 19 | We, the Free Software Foundation, use the GNU General Public License for most 20 | of our software; it applies also to any other work released this way by its 21 | authors. You can apply it to your programs, too. 22 | 23 | When we speak of free software, we are referring to freedom, not price. Our 24 | General Public Licenses are designed to make sure that you have the freedom 25 | to distribute copies of free software (and charge for them if you wish), that 26 | you receive source code or can get it if you want it, that you can change 27 | the software or use pieces of it in new free programs, and that you know you 28 | can do these things. 29 | 30 | To protect your rights, we need to prevent others from denying you these rights 31 | or asking you to surrender the rights. Therefore, you have certain responsibilities 32 | if you distribute copies of the software, or if you modify it: responsibilities 33 | to respect the freedom of others. 34 | 35 | For example, if you distribute copies of such a program, whether gratis or 36 | for a fee, you must pass on to the recipients the same freedoms that you received. 37 | You must make sure that they, too, receive or can get the source code. And 38 | you must show them these terms so they know their rights. 39 | 40 | Developers that use the GNU GPL protect your rights with two steps: (1) assert 41 | copyright on the software, and (2) offer you this License giving you legal 42 | permission to copy, distribute and/or modify it. 43 | 44 | For the developers' and authors' protection, the GPL clearly explains that 45 | there is no warranty for this free software. For both users' and authors' 46 | sake, the GPL requires that modified versions be marked as changed, so that 47 | their problems will not be attributed erroneously to authors of previous versions. 48 | 49 | Some devices are designed to deny users access to install or run modified 50 | versions of the software inside them, although the manufacturer can do so. 51 | This is fundamentally incompatible with the aim of protecting users' freedom 52 | to change the software. The systematic pattern of such abuse occurs in the 53 | area of products for individuals to use, which is precisely where it is most 54 | unacceptable. Therefore, we have designed this version of the GPL to prohibit 55 | the practice for those products. If such problems arise substantially in other 56 | domains, we stand ready to extend this provision to those domains in future 57 | versions of the GPL, as needed to protect the freedom of users. 58 | 59 | Finally, every program is threatened constantly by software patents. States 60 | should not allow patents to restrict development and use of software on general-purpose 61 | computers, but in those that do, we wish to avoid the special danger that 62 | patents applied to a free program could make it effectively proprietary. To 63 | prevent this, the GPL assures that patents cannot be used to render the program 64 | non-free. 65 | 66 | The precise terms and conditions for copying, distribution and modification 67 | follow. 68 | 69 | TERMS AND CONDITIONS 70 | 71 | 0. Definitions. 72 | 73 | "This License" refers to version 3 of the GNU General Public License. 74 | 75 | "Copyright" also means copyright-like laws that apply to other kinds of works, 76 | such as semiconductor masks. 77 | 78 | "The Program" refers to any copyrightable work licensed under this License. 79 | Each licensee is addressed as "you". "Licensees" and "recipients" may be individuals 80 | or organizations. 81 | 82 | To "modify" a work means to copy from or adapt all or part of the work in 83 | a fashion requiring copyright permission, other than the making of an exact 84 | copy. The resulting work is called a "modified version" of the earlier work 85 | or a work "based on" the earlier work. 86 | 87 | A "covered work" means either the unmodified Program or a work based on the 88 | Program. 89 | 90 | To "propagate" a work means to do anything with it that, without permission, 91 | would make you directly or secondarily liable for infringement under applicable 92 | copyright law, except executing it on a computer or modifying a private copy. 93 | Propagation includes copying, distribution (with or without modification), 94 | making available to the public, and in some countries other activities as 95 | well. 96 | 97 | To "convey" a work means any kind of propagation that enables other parties 98 | to make or receive copies. Mere interaction with a user through a computer 99 | network, with no transfer of a copy, is not conveying. 100 | 101 | An interactive user interface displays "Appropriate Legal Notices" to the 102 | extent that it includes a convenient and prominently visible feature that 103 | (1) displays an appropriate copyright notice, and (2) tells the user that 104 | there is no warranty for the work (except to the extent that warranties are 105 | provided), that licensees may convey the work under this License, and how 106 | to view a copy of this License. If the interface presents a list of user commands 107 | or options, such as a menu, a prominent item in the list meets this criterion. 108 | 109 | 1. Source Code. 110 | 111 | The "source code" for a work means the preferred form of the work for making 112 | modifications to it. "Object code" means any non-source form of a work. 113 | 114 | A "Standard Interface" means an interface that either is an official standard 115 | defined by a recognized standards body, or, in the case of interfaces specified 116 | for a particular programming language, one that is widely used among developers 117 | working in that language. 118 | 119 | The "System Libraries" of an executable work include anything, other than 120 | the work as a whole, that (a) is included in the normal form of packaging 121 | a Major Component, but which is not part of that Major Component, and (b) 122 | serves only to enable use of the work with that Major Component, or to implement 123 | a Standard Interface for which an implementation is available to the public 124 | in source code form. A "Major Component", in this context, means a major essential 125 | component (kernel, window system, and so on) of the specific operating system 126 | (if any) on which the executable work runs, or a compiler used to produce 127 | the work, or an object code interpreter used to run it. 128 | 129 | The "Corresponding Source" for a work in object code form means all the source 130 | code needed to generate, install, and (for an executable work) run the object 131 | code and to modify the work, including scripts to control those activities. 132 | However, it does not include the work's System Libraries, or general-purpose 133 | tools or generally available free programs which are used unmodified in performing 134 | those activities but which are not part of the work. For example, Corresponding 135 | Source includes interface definition files associated with source files for 136 | the work, and the source code for shared libraries and dynamically linked 137 | subprograms that the work is specifically designed to require, such as by 138 | intimate data communication or control flow between those subprograms and 139 | other parts of the work. 140 | 141 | The Corresponding Source need not include anything that users can regenerate 142 | automatically from other parts of the Corresponding Source. 143 | 144 | The Corresponding Source for a work in source code form is that same work. 145 | 146 | 2. Basic Permissions. 147 | 148 | All rights granted under this License are granted for the term of copyright 149 | on the Program, and are irrevocable provided the stated conditions are met. 150 | This License explicitly affirms your unlimited permission to run the unmodified 151 | Program. The output from running a covered work is covered by this License 152 | only if the output, given its content, constitutes a covered work. This License 153 | acknowledges your rights of fair use or other equivalent, as provided by copyright 154 | law. 155 | 156 | You may make, run and propagate covered works that you do not convey, without 157 | conditions so long as your license otherwise remains in force. You may convey 158 | covered works to others for the sole purpose of having them make modifications 159 | exclusively for you, or provide you with facilities for running those works, 160 | provided that you comply with the terms of this License in conveying all material 161 | for which you do not control copyright. Those thus making or running the covered 162 | works for you must do so exclusively on your behalf, under your direction 163 | and control, on terms that prohibit them from making any copies of your copyrighted 164 | material outside their relationship with you. 165 | 166 | Conveying under any other circumstances is permitted solely under the conditions 167 | stated below. Sublicensing is not allowed; section 10 makes it unnecessary. 168 | 169 | 3. Protecting Users' Legal Rights From Anti-Circumvention Law. 170 | 171 | No covered work shall be deemed part of an effective technological measure 172 | under any applicable law fulfilling obligations under article 11 of the WIPO 173 | copyright treaty adopted on 20 December 1996, or similar laws prohibiting 174 | or restricting circumvention of such measures. 175 | 176 | When you convey a covered work, you waive any legal power to forbid circumvention 177 | of technological measures to the extent such circumvention is effected by 178 | exercising rights under this License with respect to the covered work, and 179 | you disclaim any intention to limit operation or modification of the work 180 | as a means of enforcing, against the work's users, your or third parties' 181 | legal rights to forbid circumvention of technological measures. 182 | 183 | 4. Conveying Verbatim Copies. 184 | 185 | You may convey verbatim copies of the Program's source code as you receive 186 | it, in any medium, provided that you conspicuously and appropriately publish 187 | on each copy an appropriate copyright notice; keep intact all notices stating 188 | that this License and any non-permissive terms added in accord with section 189 | 7 apply to the code; keep intact all notices of the absence of any warranty; 190 | and give all recipients a copy of this License along with the Program. 191 | 192 | You may charge any price or no price for each copy that you convey, and you 193 | may offer support or warranty protection for a fee. 194 | 195 | 5. Conveying Modified Source Versions. 196 | 197 | You may convey a work based on the Program, or the modifications to produce 198 | it from the Program, in the form of source code under the terms of section 199 | 4, provided that you also meet all of these conditions: 200 | 201 | a) The work must carry prominent notices stating that you modified it, and 202 | giving a relevant date. 203 | 204 | b) The work must carry prominent notices stating that it is released under 205 | this License and any conditions added under section 7. This requirement modifies 206 | the requirement in section 4 to "keep intact all notices". 207 | 208 | c) You must license the entire work, as a whole, under this License to anyone 209 | who comes into possession of a copy. This License will therefore apply, along 210 | with any applicable section 7 additional terms, to the whole of the work, 211 | and all its parts, regardless of how they are packaged. This License gives 212 | no permission to license the work in any other way, but it does not invalidate 213 | such permission if you have separately received it. 214 | 215 | d) If the work has interactive user interfaces, each must display Appropriate 216 | Legal Notices; however, if the Program has interactive interfaces that do 217 | not display Appropriate Legal Notices, your work need not make them do so. 218 | 219 | A compilation of a covered work with other separate and independent works, 220 | which are not by their nature extensions of the covered work, and which are 221 | not combined with it such as to form a larger program, in or on a volume of 222 | a storage or distribution medium, is called an "aggregate" if the compilation 223 | and its resulting copyright are not used to limit the access or legal rights 224 | of the compilation's users beyond what the individual works permit. Inclusion 225 | of a covered work in an aggregate does not cause this License to apply to 226 | the other parts of the aggregate. 227 | 228 | 6. Conveying Non-Source Forms. 229 | 230 | You may convey a covered work in object code form under the terms of sections 231 | 4 and 5, provided that you also convey the machine-readable Corresponding 232 | Source under the terms of this License, in one of these ways: 233 | 234 | a) Convey the object code in, or embodied in, a physical product (including 235 | a physical distribution medium), accompanied by the Corresponding Source fixed 236 | on a durable physical medium customarily used for software interchange. 237 | 238 | b) Convey the object code in, or embodied in, a physical product (including 239 | a physical distribution medium), accompanied by a written offer, valid for 240 | at least three years and valid for as long as you offer spare parts or customer 241 | support for that product model, to give anyone who possesses the object code 242 | either (1) a copy of the Corresponding Source for all the software in the 243 | product that is covered by this License, on a durable physical medium customarily 244 | used for software interchange, for a price no more than your reasonable cost 245 | of physically performing this conveying of source, or (2) access to copy the 246 | Corresponding Source from a network server at no charge. 247 | 248 | c) Convey individual copies of the object code with a copy of the written 249 | offer to provide the Corresponding Source. This alternative is allowed only 250 | occasionally and noncommercially, and only if you received the object code 251 | with such an offer, in accord with subsection 6b. 252 | 253 | d) Convey the object code by offering access from a designated place (gratis 254 | or for a charge), and offer equivalent access to the Corresponding Source 255 | in the same way through the same place at no further charge. You need not 256 | require recipients to copy the Corresponding Source along with the object 257 | code. If the place to copy the object code is a network server, the Corresponding 258 | Source may be on a different server (operated by you or a third party) that 259 | supports equivalent copying facilities, provided you maintain clear directions 260 | next to the object code saying where to find the Corresponding Source. Regardless 261 | of what server hosts the Corresponding Source, you remain obligated to ensure 262 | that it is available for as long as needed to satisfy these requirements. 263 | 264 | e) Convey the object code using peer-to-peer transmission, provided you inform 265 | other peers where the object code and Corresponding Source of the work are 266 | being offered to the general public at no charge under subsection 6d. 267 | 268 | A separable portion of the object code, whose source code is excluded from 269 | the Corresponding Source as a System Library, need not be included in conveying 270 | the object code work. 271 | 272 | A "User Product" is either (1) a "consumer product", which means any tangible 273 | personal property which is normally used for personal, family, or household 274 | purposes, or (2) anything designed or sold for incorporation into a dwelling. 275 | In determining whether a product is a consumer product, doubtful cases shall 276 | be resolved in favor of coverage. For a particular product received by a particular 277 | user, "normally used" refers to a typical or common use of that class of product, 278 | regardless of the status of the particular user or of the way in which the 279 | particular user actually uses, or expects or is expected to use, the product. 280 | A product is a consumer product regardless of whether the product has substantial 281 | commercial, industrial or non-consumer uses, unless such uses represent the 282 | only significant mode of use of the product. 283 | 284 | "Installation Information" for a User Product means any methods, procedures, 285 | authorization keys, or other information required to install and execute modified 286 | versions of a covered work in that User Product from a modified version of 287 | its Corresponding Source. The information must suffice to ensure that the 288 | continued functioning of the modified object code is in no case prevented 289 | or interfered with solely because modification has been made. 290 | 291 | If you convey an object code work under this section in, or with, or specifically 292 | for use in, a User Product, and the conveying occurs as part of a transaction 293 | in which the right of possession and use of the User Product is transferred 294 | to the recipient in perpetuity or for a fixed term (regardless of how the 295 | transaction is characterized), the Corresponding Source conveyed under this 296 | section must be accompanied by the Installation Information. But this requirement 297 | does not apply if neither you nor any third party retains the ability to install 298 | modified object code on the User Product (for example, the work has been installed 299 | in ROM). 300 | 301 | The requirement to provide Installation Information does not include a requirement 302 | to continue to provide support service, warranty, or updates for a work that 303 | has been modified or installed by the recipient, or for the User Product in 304 | which it has been modified or installed. Access to a network may be denied 305 | when the modification itself materially and adversely affects the operation 306 | of the network or violates the rules and protocols for communication across 307 | the network. 308 | 309 | Corresponding Source conveyed, and Installation Information provided, in accord 310 | with this section must be in a format that is publicly documented (and with 311 | an implementation available to the public in source code form), and must require 312 | no special password or key for unpacking, reading or copying. 313 | 314 | 7. Additional Terms. 315 | 316 | "Additional permissions" are terms that supplement the terms of this License 317 | by making exceptions from one or more of its conditions. Additional permissions 318 | that are applicable to the entire Program shall be treated as though they 319 | were included in this License, to the extent that they are valid under applicable 320 | law. If additional permissions apply only to part of the Program, that part 321 | may be used separately under those permissions, but the entire Program remains 322 | governed by this License without regard to the additional permissions. 323 | 324 | When you convey a copy of a covered work, you may at your option remove any 325 | additional permissions from that copy, or from any part of it. (Additional 326 | permissions may be written to require their own removal in certain cases when 327 | you modify the work.) You may place additional permissions on material, added 328 | by you to a covered work, for which you have or can give appropriate copyright 329 | permission. 330 | 331 | Notwithstanding any other provision of this License, for material you add 332 | to a covered work, you may (if authorized by the copyright holders of that 333 | material) supplement the terms of this License with terms: 334 | 335 | a) Disclaiming warranty or limiting liability differently from the terms of 336 | sections 15 and 16 of this License; or 337 | 338 | b) Requiring preservation of specified reasonable legal notices or author 339 | attributions in that material or in the Appropriate Legal Notices displayed 340 | by works containing it; or 341 | 342 | c) Prohibiting misrepresentation of the origin of that material, or requiring 343 | that modified versions of such material be marked in reasonable ways as different 344 | from the original version; or 345 | 346 | d) Limiting the use for publicity purposes of names of licensors or authors 347 | of the material; or 348 | 349 | e) Declining to grant rights under trademark law for use of some trade names, 350 | trademarks, or service marks; or 351 | 352 | f) Requiring indemnification of licensors and authors of that material by 353 | anyone who conveys the material (or modified versions of it) with contractual 354 | assumptions of liability to the recipient, for any liability that these contractual 355 | assumptions directly impose on those licensors and authors. 356 | 357 | All other non-permissive additional terms are considered "further restrictions" 358 | within the meaning of section 10. If the Program as you received it, or any 359 | part of it, contains a notice stating that it is governed by this License 360 | along with a term that is a further restriction, you may remove that term. 361 | If a license document contains a further restriction but permits relicensing 362 | or conveying under this License, you may add to a covered work material governed 363 | by the terms of that license document, provided that the further restriction 364 | does not survive such relicensing or conveying. 365 | 366 | If you add terms to a covered work in accord with this section, you must place, 367 | in the relevant source files, a statement of the additional terms that apply 368 | to those files, or a notice indicating where to find the applicable terms. 369 | 370 | Additional terms, permissive or non-permissive, may be stated in the form 371 | of a separately written license, or stated as exceptions; the above requirements 372 | apply either way. 373 | 374 | 8. Termination. 375 | 376 | You may not propagate or modify a covered work except as expressly provided 377 | under this License. Any attempt otherwise to propagate or modify it is void, 378 | and will automatically terminate your rights under this License (including 379 | any patent licenses granted under the third paragraph of section 11). 380 | 381 | However, if you cease all violation of this License, then your license from 382 | a particular copyright holder is reinstated (a) provisionally, unless and 383 | until the copyright holder explicitly and finally terminates your license, 384 | and (b) permanently, if the copyright holder fails to notify you of the violation 385 | by some reasonable means prior to 60 days after the cessation. 386 | 387 | Moreover, your license from a particular copyright holder is reinstated permanently 388 | if the copyright holder notifies you of the violation by some reasonable means, 389 | this is the first time you have received notice of violation of this License 390 | (for any work) from that copyright holder, and you cure the violation prior 391 | to 30 days after your receipt of the notice. 392 | 393 | Termination of your rights under this section does not terminate the licenses 394 | of parties who have received copies or rights from you under this License. 395 | If your rights have been terminated and not permanently reinstated, you do 396 | not qualify to receive new licenses for the same material under section 10. 397 | 398 | 9. Acceptance Not Required for Having Copies. 399 | 400 | You are not required to accept this License in order to receive or run a copy 401 | of the Program. Ancillary propagation of a covered work occurring solely as 402 | a consequence of using peer-to-peer transmission to receive a copy likewise 403 | does not require acceptance. However, nothing other than this License grants 404 | you permission to propagate or modify any covered work. These actions infringe 405 | copyright if you do not accept this License. Therefore, by modifying or propagating 406 | a covered work, you indicate your acceptance of this License to do so. 407 | 408 | 10. Automatic Licensing of Downstream Recipients. 409 | 410 | Each time you convey a covered work, the recipient automatically receives 411 | a license from the original licensors, to run, modify and propagate that work, 412 | subject to this License. You are not responsible for enforcing compliance 413 | by third parties with this License. 414 | 415 | An "entity transaction" is a transaction transferring control of an organization, 416 | or substantially all assets of one, or subdividing an organization, or merging 417 | organizations. If propagation of a covered work results from an entity transaction, 418 | each party to that transaction who receives a copy of the work also receives 419 | whatever licenses to the work the party's predecessor in interest had or could 420 | give under the previous paragraph, plus a right to possession of the Corresponding 421 | Source of the work from the predecessor in interest, if the predecessor has 422 | it or can get it with reasonable efforts. 423 | 424 | You may not impose any further restrictions on the exercise of the rights 425 | granted or affirmed under this License. For example, you may not impose a 426 | license fee, royalty, or other charge for exercise of rights granted under 427 | this License, and you may not initiate litigation (including a cross-claim 428 | or counterclaim in a lawsuit) alleging that any patent claim is infringed 429 | by making, using, selling, offering for sale, or importing the Program or 430 | any portion of it. 431 | 432 | 11. Patents. 433 | 434 | A "contributor" is a copyright holder who authorizes use under this License 435 | of the Program or a work on which the Program is based. The work thus licensed 436 | is called the contributor's "contributor version". 437 | 438 | A contributor's "essential patent claims" are all patent claims owned or controlled 439 | by the contributor, whether already acquired or hereafter acquired, that would 440 | be infringed by some manner, permitted by this License, of making, using, 441 | or selling its contributor version, but do not include claims that would be 442 | infringed only as a consequence of further modification of the contributor 443 | version. For purposes of this definition, "control" includes the right to 444 | grant patent sublicenses in a manner consistent with the requirements of this 445 | License. 446 | 447 | Each contributor grants you a non-exclusive, worldwide, royalty-free patent 448 | license under the contributor's essential patent claims, to make, use, sell, 449 | offer for sale, import and otherwise run, modify and propagate the contents 450 | of its contributor version. 451 | 452 | In the following three paragraphs, a "patent license" is any express agreement 453 | or commitment, however denominated, not to enforce a patent (such as an express 454 | permission to practice a patent or covenant not to sue for patent infringement). 455 | To "grant" such a patent license to a party means to make such an agreement 456 | or commitment not to enforce a patent against the party. 457 | 458 | If you convey a covered work, knowingly relying on a patent license, and the 459 | Corresponding Source of the work is not available for anyone to copy, free 460 | of charge and under the terms of this License, through a publicly available 461 | network server or other readily accessible means, then you must either (1) 462 | cause the Corresponding Source to be so available, or (2) arrange to deprive 463 | yourself of the benefit of the patent license for this particular work, or 464 | (3) arrange, in a manner consistent with the requirements of this License, 465 | to extend the patent license to downstream recipients. "Knowingly relying" 466 | means you have actual knowledge that, but for the patent license, your conveying 467 | the covered work in a country, or your recipient's use of the covered work 468 | in a country, would infringe one or more identifiable patents in that country 469 | that you have reason to believe are valid. 470 | 471 | If, pursuant to or in connection with a single transaction or arrangement, 472 | you convey, or propagate by procuring conveyance of, a covered work, and grant 473 | a patent license to some of the parties receiving the covered work authorizing 474 | them to use, propagate, modify or convey a specific copy of the covered work, 475 | then the patent license you grant is automatically extended to all recipients 476 | of the covered work and works based on it. 477 | 478 | A patent license is "discriminatory" if it does not include within the scope 479 | of its coverage, prohibits the exercise of, or is conditioned on the non-exercise 480 | of one or more of the rights that are specifically granted under this License. 481 | You may not convey a covered work if you are a party to an arrangement with 482 | a third party that is in the business of distributing software, under which 483 | you make payment to the third party based on the extent of your activity of 484 | conveying the work, and under which the third party grants, to any of the 485 | parties who would receive the covered work from you, a discriminatory patent 486 | license (a) in connection with copies of the covered work conveyed by you 487 | (or copies made from those copies), or (b) primarily for and in connection 488 | with specific products or compilations that contain the covered work, unless 489 | you entered into that arrangement, or that patent license was granted, prior 490 | to 28 March 2007. 491 | 492 | Nothing in this License shall be construed as excluding or limiting any implied 493 | license or other defenses to infringement that may otherwise be available 494 | to you under applicable patent law. 495 | 496 | 12. No Surrender of Others' Freedom. 497 | 498 | If conditions are imposed on you (whether by court order, agreement or otherwise) 499 | that contradict the conditions of this License, they do not excuse you from 500 | the conditions of this License. If you cannot convey a covered work so as 501 | to satisfy simultaneously your obligations under this License and any other 502 | pertinent obligations, then as a consequence you may not convey it at all. 503 | For example, if you agree to terms that obligate you to collect a royalty 504 | for further conveying from those to whom you convey the Program, the only 505 | way you could satisfy both those terms and this License would be to refrain 506 | entirely from conveying the Program. 507 | 508 | 13. Use with the GNU Affero General Public License. 509 | 510 | Notwithstanding any other provision of this License, you have permission to 511 | link or combine any covered work with a work licensed under version 3 of the 512 | GNU Affero General Public License into a single combined work, and to convey 513 | the resulting work. The terms of this License will continue to apply to the 514 | part which is the covered work, but the special requirements of the GNU Affero 515 | General Public License, section 13, concerning interaction through a network 516 | will apply to the combination as such. 517 | 518 | 14. Revised Versions of this License. 519 | 520 | The Free Software Foundation may publish revised and/or new versions of the 521 | GNU General Public License from time to time. Such new versions will be similar 522 | in spirit to the present version, but may differ in detail to address new 523 | problems or concerns. 524 | 525 | Each version is given a distinguishing version number. If the Program specifies 526 | that a certain numbered version of the GNU General Public License "or any 527 | later version" applies to it, you have the option of following the terms and 528 | conditions either of that numbered version or of any later version published 529 | by the Free Software Foundation. If the Program does not specify a version 530 | number of the GNU General Public License, you may choose any version ever 531 | published by the Free Software Foundation. 532 | 533 | If the Program specifies that a proxy can decide which future versions of 534 | the GNU General Public License can be used, that proxy's public statement 535 | of acceptance of a version permanently authorizes you to choose that version 536 | for the Program. 537 | 538 | Later license versions may give you additional or different permissions. However, 539 | no additional obligations are imposed on any author or copyright holder as 540 | a result of your choosing to follow a later version. 541 | 542 | 15. Disclaimer of Warranty. 543 | 544 | THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE 545 | LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR 546 | OTHER PARTIES PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER 547 | EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES 548 | OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS 549 | TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE PROGRAM 550 | PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, REPAIR OR 551 | CORRECTION. 552 | 553 | 16. Limitation of Liability. 554 | 555 | IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL 556 | ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MODIFIES AND/OR CONVEYS THE PROGRAM 557 | AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY GENERAL, SPECIAL, 558 | INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY TO 559 | USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING RENDERED 560 | INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF THE 561 | PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS), EVEN IF SUCH HOLDER OR OTHER 562 | PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. 563 | 564 | 17. Interpretation of Sections 15 and 16. 565 | 566 | If the disclaimer of warranty and limitation of liability provided above cannot 567 | be given local legal effect according to their terms, reviewing courts shall 568 | apply local law that most closely approximates an absolute waiver of all civil 569 | liability in connection with the Program, unless a warranty or assumption 570 | of liability accompanies a copy of the Program in return for a fee. END OF 571 | TERMS AND CONDITIONS 572 | 573 | How to Apply These Terms to Your New Programs 574 | 575 | If you develop a new program, and you want it to be of the greatest possible 576 | use to the public, the best way to achieve this is to make it free software 577 | which everyone can redistribute and change under these terms. 578 | 579 | To do so, attach the following notices to the program. It is safest to attach 580 | them to the start of each source file to most effectively state the exclusion 581 | of warranty; and each file should have at least the "copyright" line and a 582 | pointer to where the full notice is found. 583 | 584 | 585 | 586 | Copyright (C) 587 | 588 | This program is free software: you can redistribute it and/or modify it under 589 | the terms of the GNU General Public License as published by the Free Software 590 | Foundation, either version 3 of the License, or (at your option) any later 591 | version. 592 | 593 | This program is distributed in the hope that it will be useful, but WITHOUT 594 | ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS 595 | FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. 596 | 597 | You should have received a copy of the GNU General Public License along with 598 | this program. If not, see . 599 | 600 | Also add information on how to contact you by electronic and paper mail. 601 | 602 | If the program does terminal interaction, make it output a short notice like 603 | this when it starts in an interactive mode: 604 | 605 | Copyright (C) 606 | 607 | This program comes with ABSOLUTELY NO WARRANTY; for details type `show w'. 608 | 609 | This is free software, and you are welcome to redistribute it under certain 610 | conditions; type `show c' for details. 611 | 612 | The hypothetical commands `show w' and `show c' should show the appropriate 613 | parts of the General Public License. Of course, your program's commands might 614 | be different; for a GUI interface, you would use an "about box". 615 | 616 | You should also get your employer (if you work as a programmer) or school, 617 | if any, to sign a "copyright disclaimer" for the program, if necessary. For 618 | more information on this, and how to apply and follow the GNU GPL, see . 619 | 620 | The GNU General Public License does not permit incorporating your program 621 | into proprietary programs. If your program is a subroutine library, you may 622 | consider it more useful to permit linking proprietary applications with the 623 | library. If this is what you want to do, use the GNU Lesser General Public 624 | License instead of this License. But first, please read . 626 | --------------------------------------------------------------------------------