├── docker ├── logo.png ├── info.txt ├── frame.py ├── sssd.conf.sh ├── startup.sh ├── test.sh ├── docker-compose.yml ├── jup-config.py ├── error.html ├── Dockerfile └── login.html ├── cyolauthenticator ├── __init__.py ├── chkpasswd.py ├── chpasswd.py ├── useradd.py └── cyolauthenticator.py ├── README.md ├── setup.py └── LICENSE /docker/logo.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/stevenrbrandt/cyolauthenticator/master/docker/logo.png -------------------------------------------------------------------------------- /docker/info.txt: -------------------------------------------------------------------------------- 1 | US 2 | Louisiana 3 | Baton Rouge 4 | LSU 5 | CCT 6 | cyol.cct.lsu.edu 7 | sbrandt@cct.lsu.edu 8 | -------------------------------------------------------------------------------- /cyolauthenticator/__init__.py: -------------------------------------------------------------------------------- 1 | from cyolauthenticator.cyolauthenticator import CYOLAuthenticator 2 | 3 | __all__ = [CYOLAuthenticator] 4 | -------------------------------------------------------------------------------- /docker/frame.py: -------------------------------------------------------------------------------- 1 | with open("/usr/enable_mkuser","r") as fd: 2 | line = " The Code is: '"+fd.read().strip()+"' " 3 | print() 4 | print("+","-"*len(line),"+",sep='') 5 | print("|",line,"|",sep='') 6 | print("+","-"*len(line),"+",sep='') 7 | print() 8 | -------------------------------------------------------------------------------- /README.md: -------------------------------------------------------------------------------- 1 | # CYOLAuthenticator: Create Your Own Login Authenticator 2 | A Jupyterhub authenticator that allows users to pick a name and password if they know a code. 3 | 4 | To enable users to create a login, place a code word in /usr/enable_mkuser. If the users provide this code word when attempting to create a login, they will succeed. 5 | 6 | To disable creation of logins, remove /usr/enable_mkuser. 7 | 8 | Note that you will also need a custom login.html page. See the docker directory for how to do this. 9 | -------------------------------------------------------------------------------- /setup.py: -------------------------------------------------------------------------------- 1 | from setuptools import setup, find_packages 2 | 3 | setup( 4 | name='cyolauthenticator', 5 | version='1.2', 6 | description='A Jupyterhub Authenticator that allows users to pick a name and password if they know a code', 7 | long_description='A Jupyterhub Authenticator that allows users to pick a name and password if they know a code', 8 | url='http://cct.lsu.edu/~sbrandt/', 9 | author='Steven R. Brandt', 10 | author_email='steven@stevenrbrandt.com', 11 | license='LGPL', 12 | packages=['cyolauthenticator'] 13 | ) 14 | -------------------------------------------------------------------------------- /docker/sssd.conf.sh: -------------------------------------------------------------------------------- 1 | mkdir -p /etc/sssd 2 | 3 | # Don't reinstall 4 | if [ -d /etc/sssd/sssd.conf ] 5 | then return 6 | fi 7 | 8 | cat > /etc/sssd/sssd.conf << EOF 9 | [sssd] 10 | config_file_version = 2 11 | domains = ${LDAP_DOMAIN} 12 | services = nss, pam 13 | 14 | [pam] 15 | 16 | [domain/${LDAP_DOMAIN}] 17 | id_provider = ldap 18 | auth_provider = ldap 19 | ldap_uri = ldap://${LDAP_HOST} 20 | cache_credentials = True 21 | ldap_search_base = ${LDAP_BASE_DN} 22 | ldap_group_search_base = ${LDAP_BASE_DN} 23 | ldap_user_search_base = ${LDAP_BASE_DN} 24 | ldap_default_bind_dn = cn=admin,${LDAP_BASE_DN} 25 | ldap_default_authtok = ${LDAP_ADMIN_PASSWORD} 26 | 27 | [nss] 28 | filter_groups = root 29 | filter_users = root 30 | entry_cache_nowait_percentage = 75 31 | EOF 32 | chmod 600 /etc/sssd/sssd.conf 33 | -------------------------------------------------------------------------------- /cyolauthenticator/chkpasswd.py: -------------------------------------------------------------------------------- 1 | from subprocess import Popen, PIPE, call 2 | import sys, re, os 3 | from tempfile import NamedTemporaryFile 4 | 5 | LDAP_BASE_DN=os.environ["LDAP_BASE_DN"] 6 | LDAP_HOST=os.environ["LDAP_HOST"] 7 | 8 | def check_passwd(user, passwd): 9 | n = NamedTemporaryFile(mode='w') 10 | n.write(passwd) 11 | n.flush() 12 | 13 | cmd=["ldapwhoami","-x","-y",n.name,f"-D",f"uid={user},{LDAP_BASE_DN}","-H",f"ldap://{LDAP_HOST}"] 14 | p = Popen(cmd, universal_newlines=True, stdin=PIPE, stdout=PIPE, stderr=PIPE) 15 | 16 | o,e = p.communicate(passwd) 17 | print(e,end='') 18 | return p.returncode 19 | 20 | if __name__ == "__main__": 21 | for line in sys.stdin.readlines(): 22 | g = re.match(r'(.*?):(.*)', line) 23 | assert g, f"Bad data '{line}'" 24 | user, passwd = g.group(1), g.group(2) 25 | r = check_passwd(user, passwd) 26 | if r != 0: 27 | exit(r) 28 | -------------------------------------------------------------------------------- /docker/startup.sh: -------------------------------------------------------------------------------- 1 | cd /root 2 | if [ ! -d cyolauthenticator ] 3 | then 4 | git clone https://github.com/stevenrbrandt/cyolauthenticator 5 | fi 6 | cd /root/cyolauthenticator 7 | python3 setup.py install 8 | 9 | cd / 10 | randpass MND -o /usr/enable_mkuser 11 | chmod 600 /usr/enable_mkuser 12 | python /usr/local/bin/frame.py 13 | 14 | bash /usr/local/sbin/sssd.conf.sh 15 | service sssd start 16 | 17 | echo -n $LDAP_ADMIN_PASSWORD > /etc/ldap-admin-pw.txt 18 | chmod 600 /etc/ldap-admin-pw.txt 19 | echo -n $LDAP_READONLY_USER_PASSWORD > /etc/ldap-pw.txt 20 | chmod 600 /etc/ldap-pw.txt 21 | unset LDAP_READONLY_USER_PASSWORD 22 | unset LDAP_ADMIN_PASSWORD 23 | 24 | export PYTHONPATH=/usr/local/lib/python$(python3 -c 'import sys; print("%d.%d" % (sys.version_info.major, sys.version_info.minor))')/dist-packages 25 | 26 | PORT=443 27 | echo jupyterhub --ip 0.0.0.0 --port $PORT -f jup-config.py 28 | # jupyterhub --log-level=50 --ip 0.0.0.0 --port $PORT -f jup-config.py 29 | jupyterhub --ip 0.0.0.0 --port $PORT -f jup-config.py 30 | echo jupyterhub exited! 31 | sleep infinity 32 | -------------------------------------------------------------------------------- /docker/test.sh: -------------------------------------------------------------------------------- 1 | echo -n $LDAP_ADMIN_PASSWORD > /etc/ldap-admin-pw.txt 2 | chmod 600 /etc/ldap-admin-pw.txt 3 | echo -n $LDAP_READONLY_USER_PASSWORD > /etc/ldap-pw.txt 4 | chmod 600 /etc/ldap-pw.txt 5 | 6 | cat > user.ldif << EOF 7 | # define ldif file with record arrtributes 8 | # file saved with ${LDAP_READONLY_USER_USERNAME}.lfip 9 | dn: uid=${LDAP_READONLY_USER_USERNAME},${LDAP_BASE_DN} 10 | uid: ${LDAP_READONLY_USER_USERNAME} 11 | cn: ${LDAP_READONLY_USER_USERNAME} 12 | sn: 3 13 | objectClass: top 14 | objectClass: posixAccount 15 | objectClass: inetOrgPerson 16 | loginShell: /bin/bash 17 | homeDirectory: /home/${LDAP_READONLY_USER_USERNAME} 18 | uidNumber: 1234 19 | gidNumber: 100 20 | userPassword: ${LDAP_READONLY_USER_PASSWORD} 21 | mail: ${LDAP_READONLY_USER_USERNAME}@rahasak.com 22 | gecos: ${LDAP_READONLY_USER_USERNAME} User 23 | EOF 24 | 25 | set -x 26 | ldapadd -x -H ldap://${LDAP_HOST} -D cn=admin,${LDAP_BASE_DN} -f user.ldif -y /etc/ldap-admin-pw.txt 27 | ldapsearch -x -H ldap://${LDAP_HOST} -b ${LDAP_BASE_DN} -D cn=admin,${LDAP_BASE_DN} -y /etc/ldap-admin-pw.txt 28 | -------------------------------------------------------------------------------- /cyolauthenticator/chpasswd.py: -------------------------------------------------------------------------------- 1 | #!/usr/bin/env python3 2 | from random import randint 3 | import sys, os, re 4 | from subprocess import Popen, PIPE 5 | 6 | LDAP_BASE_DN=os.environ["LDAP_BASE_DN"] 7 | LDAP_HOST=os.environ["LDAP_HOST"] 8 | 9 | def change_passwd(user, passwd): 10 | cmd=["ldapmodify","-x","-H",f"ldap://{LDAP_HOST}","-D", f"cn=admin,{LDAP_BASE_DN}","-y","/etc/ldap-admin-pw.txt"] 11 | p = Popen(cmd,universal_newlines=True,stdout=PIPE,stderr=PIPE,stdin=PIPE) 12 | msg=f""" 13 | dn: uid={user},{LDAP_BASE_DN} 14 | changetype: modify 15 | replace: userPassword 16 | userPassword: {passwd} 17 | """ 18 | o, e = p.communicate(msg) 19 | if p.returncode != 0: 20 | print(o,e) 21 | print(f"Error: ret={p.returncode}") 22 | return p.returncode 23 | 24 | if __name__ == "__main__": 25 | for line in sys.stdin.readlines(): 26 | g = re.match(r'(.*?):(.*)', line) 27 | assert g, f"Bad data '{line}'" 28 | user, passwd = g.group(1), g.group(2) 29 | r = change_passwd(user, passwd) 30 | if r != 0: 31 | exit(r) 32 | -------------------------------------------------------------------------------- /docker/docker-compose.yml: -------------------------------------------------------------------------------- 1 | version: '3' 2 | 3 | services: 4 | ldapservice: 5 | build: 6 | context: ldapserver 7 | dockerfile: Dockerfile 8 | image: stevenrbrandt/ldapimmage 9 | hostname: ldapserver.cyolauth.org 10 | container_name: ldapserver 11 | ## The following environment variables 12 | ## are required. We suggest you create 13 | ## an ldap-vars.env and configure them. 14 | #environment: 15 | # - LDAP_ORGANISATION=rahasak 16 | # - LDAP_DOMAIN=rahasak.com 17 | # - "LDAP_BASE_DN=dc=rahasak,dc=com" 18 | # - LDAP_ADMIN_PASSWORD=rahasak 19 | env_file: 20 | - ldap-vars.env 21 | volumes: 22 | - /home/sbrandt/tmp/ldap_data:/var/lib/ldap 23 | - /home/sbrandt/tmp/slapd_data:/etc/ldap/slapd.d 24 | 25 | cyolauthservice: 26 | build: 27 | context: . 28 | dockerfile: Dockerfile 29 | image: stevenrbrandt/cyolauth 30 | container_name: cyolauth 31 | hostname: cyolauthhost.cyolauth.org 32 | env_file: 33 | - ldap-vars.env 34 | ports: 35 | - 9443:443 36 | - 9080:80 37 | entrypoint: sleep infinity 38 | volumes: 39 | - /home/sbrandt/repos/cyolauthenticator:/root/cyolauthenticator 40 | - /home/brandt/tmp/home:/home 41 | - ./tls:/etc/pki/tls 42 | -------------------------------------------------------------------------------- /docker/jup-config.py: -------------------------------------------------------------------------------- 1 | import os 2 | from traceback import print_exc 3 | from subprocess import Popen, PIPE 4 | 5 | def call(cmd, inp=None): 6 | print("Calling:",cmd) 7 | if inp is None: 8 | p = Popen(cmd, stdout=PIPE, stderr=PIPE, universal_newlines=True) 9 | else: 10 | p = Popen(cmd, stdout=PIPE, stderr=PIPE, stdin=PIPE, universal_newlines=True) 11 | out, err = p.communicate(inp) 12 | print(out,end='',flush=True) 13 | print(err,end='',flush=True) 14 | 15 | c.JupyterHub.authenticator_class = 'cyolauthenticator.CYOLAuthenticator' 16 | c.JupyterHub.template_paths = ['/jinja/templates'] 17 | 18 | # openssl genrsa -out rootCA.key 2048 19 | # openssl req -x509 -new -nodes -key rootCA.key -sha256 -days 1024 -out rootCA.pem 20 | 21 | certname = os.environ.get('CERT_NAME','tutorial') 22 | cer = f'/etc/pki/tls/certs/{certname}.cer' 23 | key = f'/etc/pki/tls/private/{certname}.key' 24 | 25 | try: 26 | 27 | if not os.path.exists(key): 28 | os.makedirs(os.path.dirname(key), exist_ok=True) 29 | call(["openssl","genrsa","-out",key,"2048"]) 30 | 31 | if not os.path.exists(cer): 32 | os.makedirs(os.path.dirname(cer), exist_ok=True) 33 | answers = open("info.txt").read() 34 | call(["openssl","req","-x509","-new","-nodes","-key",key,"-sha256","-days","1024","-out",cer],answers) 35 | 36 | if os.path.exists(cer) and os.path.exists(key): 37 | print("Starting with SSL") 38 | c.JupyterHub.ssl_cert = cer 39 | c.JupyterHub.ssl_key = key 40 | print("Starting with SSL") 41 | print("Cert:",cer) 42 | print("Key:",key) 43 | else: 44 | print("Starting without SSL") 45 | 46 | 47 | # Uncomment if needed 48 | #c.JupyterHub.base_url = '/somename/' 49 | except: 50 | print_exc() 51 | print(" >>> CONFIGURATION COMPLETE <<<<") 52 | -------------------------------------------------------------------------------- /docker/error.html: -------------------------------------------------------------------------------- 1 | {% extends "page.html" %} 2 | 3 | {% block login_widget %} 4 | {% endblock %} 5 | 6 | {% block main %} 7 | 8 |
9 | {% block h1_error %} 10 |

11 | {{status_code}} : {{status_message}} 12 |

13 | {% if exception and exception.my_message %} 14 |

{{ exception.my_message }}

15 | {% endif %} 16 | {% endblock h1_error %} 17 | {% block error_detail %} 18 | {% if message %} 19 |

20 | {{message}} 21 |

22 | {% endif %} 23 | {% if message_html %} 24 |

25 | {{message_html | safe}} 26 |

27 | {% endif %} 28 | {% if extra_error_html %} 29 |

30 | {{extra_error_html | safe}} 31 |

32 | {% endif %} 33 | {% endblock error_detail %} 34 |
35 | 36 | {% endblock %} 37 | 38 | {% block script %} 39 | {{super()}} 40 | 41 | 67 | {% endblock %} 68 | -------------------------------------------------------------------------------- /docker/Dockerfile: -------------------------------------------------------------------------------- 1 | # It is possible to use a later version of Ubuntu, 2 | # however, if one does that then a Singularity version 3 | # of the image will not run on clusters with older 4 | # linux kernels. 5 | FROM ubuntu:20.04 6 | USER root 7 | 8 | ENV DEBIAN_FRONTEND=noninteractive 9 | 10 | RUN apt-get update 11 | # python3-pam is needed for authuser.py 12 | RUN apt-get install -y python3 python3-pip openssh-client libssl-dev npm \ 13 | gnupg policycoreutils python3-pam imagemagick curl vim git \ 14 | ldap-utils vim sssd-ldap perl-modules-5.30 libpam-ldapd apt-file dialog ca-certificates libnss-ldap libpam-modules libpam-sss 15 | 16 | COPY sssd.conf.sh /usr/local/sbin/sssd.conf.sh 17 | #RUN bash /usr/local/sbin/sssd.conf.sh 18 | 19 | # Make python3 the default 20 | RUN update-alternatives --install /usr/bin/python python /usr/bin/python3 1 21 | RUN update-alternatives --install /usr/bin/pip pip /usr/bin/pip3 1 22 | 23 | RUN apt install -y python3-sqlalchemy 24 | RUN pip install --upgrade pip 25 | 26 | RUN pip install oauthenticator==14.1.0 jupyter==1.0.0 jupyterhub==1.4.2 tornado==6.1 python-oauth2==1.1.1 jupyterhub-dummyauthenticator 27 | 28 | RUN apt-get -y install nodejs 29 | 30 | RUN npm install -g configurable-http-proxy@4.5.0 31 | 32 | # Edit the message in the h1 tags to customize your tutorial 33 | COPY login.html /usr/local/share/jupyterhub/templates/login.html 34 | COPY error.html /usr/local/share/jupyterhub/templates/error.html 35 | 36 | # Replace logo.png with whatever logo you wish to use to brand the server 37 | COPY logo.png /usr/local/share/jupyterhub/static/images/logo.png 38 | 39 | #RUN mkdir -p /usr/local/lib/python3.5/dist-packages/cyolauthenticator 40 | #COPY cyol.py /usr/local/lib/python3.5/dist-packages/cyolauthenticator/__init__.py 41 | #COPY cyolauthenticator.py /usr/local/lib/python3.5/dist-packages/cyolauthenticator/cyolauthenticator.py 42 | 43 | RUN pip install randpass 44 | RUN pip install git+https://github.com/stevenrbrandt/cyolauthenticator 45 | #COPY cyol.tgz ./ 46 | #RUN tar xzf cyol.tgz 47 | #RUN python3 setup.py install 48 | 49 | 50 | COPY startup.sh / 51 | COPY jup-config.py / 52 | COPY info.txt / 53 | COPY frame.py /usr/local/bin/ 54 | COPY test.sh / 55 | CMD bash ./startup.sh 56 | -------------------------------------------------------------------------------- /cyolauthenticator/useradd.py: -------------------------------------------------------------------------------- 1 | #!/usr/bin/env python3 2 | from random import randint 3 | import sys, os 4 | from subprocess import Popen, PIPE, call 5 | from time import sleep 6 | from pwd import getpwnam 7 | from grp import getgrgid 8 | 9 | UIDNUMBER_NOT_UNIQUE = 19 10 | USER_EXISTS = 68 11 | LDAP_BASE_DN=os.environ["LDAP_BASE_DN"] 12 | LDAP_HOST=os.environ["LDAP_HOST"] 13 | 14 | user_data = {} 15 | 16 | def get_user_data(user): 17 | if user in user_data: 18 | return user_data[user] 19 | try: 20 | return getpwnam(user) 21 | except: 22 | return None 23 | 24 | def user_add(user): 25 | uid_number = randint(1000,100000) 26 | while True: 27 | ldap_cmd=["ldapadd","-x","-H",f"ldap://{LDAP_HOST}","-D", f"cn=admin,{LDAP_BASE_DN}","-y","/etc/ldap-admin-pw.txt"] 28 | p = Popen(ldap_cmd,universal_newlines=True,stdout=PIPE,stderr=PIPE,stdin=PIPE) 29 | login_shell = "/bin/bash" 30 | home_directory = f"/home/{user}" 31 | gid_number = 100 32 | email = 'sbrandt@cct.lsu.edu' 33 | gecos = user 34 | 35 | ldap_txt=f""" 36 | # define ldif file with record arrtributes 37 | # file saved with bassa.lfip 38 | dn: uid={user},{LDAP_BASE_DN} 39 | uid: {user} 40 | cn: {user} 41 | sn: 3 42 | objectClass: top 43 | objectClass: posixAccount 44 | objectClass: inetOrgPerson 45 | loginShell: {login_shell} 46 | homeDirectory: {home_directory} 47 | uidNumber: {uid_number} 48 | gidNumber: {gid_number} 49 | mail: {email} 50 | gecos: {gecos} 51 | """ 52 | o, e = p.communicate(ldap_txt) 53 | if e.strip() != "": 54 | print("error:",e) 55 | 56 | # Create a fake pwd entry because getpwnam() 57 | # doesn't see updates immedately. 58 | class _user: 59 | def __init__(self): 60 | self.pw_name = user 61 | self.pw_dir = home_directory 62 | self.pw_gid = gid_number 63 | self.pw_uid = uid_number 64 | self.pw_gecos = gecos 65 | self.pw_shell = login_shell 66 | self.pw_passwd = '*' 67 | 68 | if p.returncode == 0: 69 | uinfo = _user() 70 | user_data[user] = uinfo 71 | os.makedirs(uinfo.pw_dir, exist_ok=True) 72 | ginfo = getgrgid(uinfo.pw_gid) 73 | while True: 74 | sleep(1) 75 | r = call(["id",user]) 76 | if r == 0: 77 | break 78 | call(["chown",f"{user}:{ginfo.gr_name}",uinfo.pw_dir]) 79 | call(["su","-",user,"-c","cp -TRn /etc/skel/ ~/"]) 80 | break 81 | 82 | uid_number = randint(1000,100000) 83 | elif p.returncode == USER_EXISTS: 84 | print(f"USER exists {user}") 85 | break 86 | else: 87 | print(f"Error: ret={p.returncode}") 88 | break 89 | return p.returncode 90 | 91 | if __name__ == "__main__": 92 | user = sys.argv[1] 93 | r = user_add(user) 94 | exit(r) 95 | -------------------------------------------------------------------------------- /docker/login.html: -------------------------------------------------------------------------------- 1 | {% extends "page.html" %} 2 | {% if announcement_login %} 3 | {% set announcement = announcement_login %} 4 | {% endif %} 5 | 6 | {% set announcement = '

Welcome to the Tutorial Server

' %} 7 | 8 | {% block login_widget %} 9 | {% endblock %} 10 | 11 | {% block main %} 12 | 13 | {% block login %} 14 |
15 | {% if custom_html %} 16 | {{ custom_html | safe }} 17 | {% elif login_service %} 18 |
19 | 20 | Sign in with {{login_service}} 21 | 22 |
23 | {% else %} 24 |
25 |
26 | Sign in 27 |
28 |
29 | 30 |

To create a new user, use the 31 | same password and password2, fill in the value for 32 | 'code' supplied by the tutorial presenter, and click the create button. 33 | If it is available, your username 34 | will be created.

35 | 36 |

For subsequent logins, it is not necessary to 37 | fill in the password2 field.

38 | 39 | {% if login_error %} 40 | 43 | {% endif %} 44 | 45 | 56 | 57 | 64 | 65 | 72 |
73 | 74 | 81 | 82 | 89 | 90 | 97 |
98 |
99 | {% endif %} 100 |
101 | {% endblock login %} 102 | 103 | {% endblock %} 104 | 105 | {% block script %} 106 | {{ super() }} 107 | 114 | 115 | {% endblock %} 116 | -------------------------------------------------------------------------------- /cyolauthenticator/cyolauthenticator.py: -------------------------------------------------------------------------------- 1 | from traitlets import Unicode 2 | 3 | from jupyterhub.auth import Authenticator 4 | 5 | from traceback import print_exc 6 | from subprocess import call, Popen, PIPE 7 | from tornado.httpclient import HTTPError 8 | from tornado import gen 9 | from os import stat 10 | import os 11 | import sys 12 | import re 13 | from hmac import compare_digest 14 | from crypt import crypt 15 | from .useradd import user_add, get_user_data 16 | from .chpasswd import change_passwd 17 | from .chkpasswd import check_passwd 18 | 19 | # Attempt to authenticate using PAM 20 | def authuser(user, passw): 21 | # with open("/etc/shadow", "r") as fd: 22 | # for line in fd.readlines(): 23 | # cols = line.split(':') 24 | # if cols[0] == user: 25 | # if passw is None or cols[1] is None: 26 | # e = HTTPError(403) 27 | # e.my_message = f"No password for account {user}" 28 | # raise e 29 | # crypt_result = crypt(passw, cols[1]) 30 | # if crypt_result is None: 31 | # e = HTTPError(403) 32 | # e.my_message = f"No password for account {user}" 33 | # raise e 34 | # if compare_digest(crypt_result , cols[1]): 35 | # return True 36 | # else: 37 | # break 38 | r = check_passwd(user, passw) 39 | if r == 0: 40 | return True 41 | e = HTTPError(403) 42 | e.my_message = "Incorrect password" 43 | raise e 44 | 45 | def mkuser(user, passw, passw2, code_check): 46 | if user == None or len(user.strip())=="": 47 | e = HTTPError(403) 48 | e.my_message = "Username is missing" 49 | raise e 50 | 51 | if len(user) < 5: 52 | e = HTTPError(403) 53 | e.my_message = "Your user name is too short" 54 | raise e 55 | 56 | if len(user) > 15: 57 | e = HTTPError(403) 58 | e.my_message = "Your user name is too long" 59 | raise e 60 | 61 | if len(passw) < 7: 62 | e = HTTPError(403) 63 | e.my_message = "Your password is too short" 64 | raise e 65 | 66 | if len(passw) > 50: 67 | e = HTTPError(403) 68 | e.my_message = "Your password is too long" 69 | raise e 70 | 71 | if passw in [user, "abc123", "abcd1234", "abc1234", "abcd123"]: 72 | e = HTTPError(403) 73 | e.my_message = "Choose a better password" 74 | raise e 75 | 76 | if re.search(r'\W',user): 77 | e = HTTPError(403) 78 | e.my_message = "Illegal character in user nmame. Only letters, numbers and the underscore are allowed." 79 | raise e 80 | 81 | if re.search(r'\W',passw): 82 | e = HTTPError(403) 83 | e.my_message = "Illegal character in password. Only letters, numbers and the underscore are allowed." 84 | raise e 85 | 86 | #home = "/home/%s" % user 87 | #cmd = ["useradd",user,"-s","/bin/bash"] 88 | check_pass2 = False 89 | udata = get_user_data(user) 90 | if udata is not None: 91 | if len(udata.pw_passwd)==1: 92 | user_add(user) 93 | change_passwd(user, passw) 94 | print(f"get_user_data({user}) succeeded") 95 | return authuser(user, passw) 96 | # The user already exists, nothing to do 97 | #return uid 98 | else: 99 | print("No user data") 100 | check_pass2 = True 101 | 102 | if not os.path.exists("/usr/enable_mkuser"): 103 | e = HTTPError(403) 104 | e.my_message = "MkUser disabled" 105 | raise e 106 | if not code_check: 107 | e = HTTPError(403) 108 | e.my_message = "Code check failed" 109 | raise e 110 | check_pass2 = True 111 | if passw != passw2: 112 | e = HTTPError(403) 113 | e.my_message = "Password and Password2 do not match." 114 | raise e 115 | #cmd += ["-m"] 116 | 117 | if check_pass2: 118 | if passw != passw2: 119 | e = HTTPError(403) 120 | e.my_message = "Password and Password2 do not match." 121 | raise e 122 | try: 123 | #call(cmd) 124 | user_add(user) 125 | if os.path.exists("/inituser.sh"): 126 | call(["su","-",user,"-c","bash /inituser.sh"]) 127 | 128 | #pipe = Popen(["chpasswd"],stdin=PIPE,universal_newlines=True) 129 | #pipe.stdin.write("%s:%s\n" % (user, passw)) 130 | #pipe.stdin.close() 131 | #pipe.wait() 132 | r = change_passwd(user, passw) 133 | #print("Chpasswd called with %s:%s" % (user, passw)) 134 | #call(["cp","/etc/shadow","/home/shadow"]) 135 | #call(["cp","/etc/passwd","/home/passwd"]) 136 | #call(["cp","/etc/group","/home/group"]) 137 | except: 138 | print("An exception occurred") 139 | print_exc() 140 | return False 141 | return True 142 | 143 | class CYOLAuthenticator(Authenticator): 144 | 145 | @staticmethod 146 | def _getpwnam(name): 147 | """Wrapper function to protect against `pwd` not being available 148 | on Windows 149 | """ 150 | import pwd 151 | 152 | return get_user_data(name) 153 | 154 | password = Unicode( 155 | None, 156 | allow_none=True, 157 | config=True, 158 | help=""" 159 | Set a global password for all users wanting to log in. 160 | 161 | This allows users with any username to log in with the same static password. 162 | """ 163 | ) 164 | 165 | @gen.coroutine 166 | def authenticate(self, handler, data): 167 | 168 | # Retrieve form data 169 | username = data['username'].lower() 170 | password = data['password'] 171 | password2 = data['password2'] 172 | code = data['code'] 173 | 174 | # If the /usr/enable_mkuser is present, read it. 175 | # This file must be present for users to create 176 | # new accounts. 177 | try: 178 | with open("/usr/enable_mkuser","r") as fd: 179 | code_check = fd.read().strip() 180 | except: 181 | # Ensure code check doesn't happen 182 | code_check = "disabled" 183 | code = "" 184 | 185 | if mkuser(username, password, password2, code == code_check): 186 | return username 187 | else: 188 | return None 189 | -------------------------------------------------------------------------------- /LICENSE: -------------------------------------------------------------------------------- 1 | GNU LESSER GENERAL PUBLIC LICENSE 2 | Version 2.1, February 1999 3 | 4 | Copyright (C) 1991, 1999 Free Software Foundation, Inc. 5 | 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA 6 | Everyone is permitted to copy and distribute verbatim copies 7 | of this license document, but changing it is not allowed. 8 | 9 | [This is the first released version of the Lesser GPL. It also counts 10 | as the successor of the GNU Library Public License, version 2, hence 11 | the version number 2.1.] 12 | 13 | Preamble 14 | 15 | The licenses for most software are designed to take away your 16 | freedom to share and change it. By contrast, the GNU General Public 17 | Licenses are intended to guarantee your freedom to share and change 18 | free software--to make sure the software is free for all its users. 19 | 20 | This license, the Lesser General Public License, applies to some 21 | specially designated software packages--typically libraries--of the 22 | Free Software Foundation and other authors who decide to use it. You 23 | can use it too, but we suggest you first think carefully about whether 24 | this license or the ordinary General Public License is the better 25 | strategy to use in any particular case, based on the explanations below. 26 | 27 | When we speak of free software, we are referring to freedom of use, 28 | not price. Our General Public Licenses are designed to make sure that 29 | you have the freedom to distribute copies of free software (and charge 30 | for this service if you wish); that you receive source code or can get 31 | it if you want it; that you can change the software and use pieces of 32 | it in new free programs; and that you are informed that you can do 33 | these things. 34 | 35 | To protect your rights, we need to make restrictions that forbid 36 | distributors to deny you these rights or to ask you to surrender these 37 | rights. These restrictions translate to certain responsibilities for 38 | you if you distribute copies of the library or if you modify it. 39 | 40 | For example, if you distribute copies of the library, whether gratis 41 | or for a fee, you must give the recipients all the rights that we gave 42 | you. You must make sure that they, too, receive or can get the source 43 | code. If you link other code with the library, you must provide 44 | complete object files to the recipients, so that they can relink them 45 | with the library after making changes to the library and recompiling 46 | it. And you must show them these terms so they know their rights. 47 | 48 | We protect your rights with a two-step method: (1) we copyright the 49 | library, and (2) we offer you this license, which gives you legal 50 | permission to copy, distribute and/or modify the library. 51 | 52 | To protect each distributor, we want to make it very clear that 53 | there is no warranty for the free library. Also, if the library is 54 | modified by someone else and passed on, the recipients should know 55 | that what they have is not the original version, so that the original 56 | author's reputation will not be affected by problems that might be 57 | introduced by others. 58 | 59 | Finally, software patents pose a constant threat to the existence of 60 | any free program. We wish to make sure that a company cannot 61 | effectively restrict the users of a free program by obtaining a 62 | restrictive license from a patent holder. Therefore, we insist that 63 | any patent license obtained for a version of the library must be 64 | consistent with the full freedom of use specified in this license. 65 | 66 | Most GNU software, including some libraries, is covered by the 67 | ordinary GNU General Public License. This license, the GNU Lesser 68 | General Public License, applies to certain designated libraries, and 69 | is quite different from the ordinary General Public License. We use 70 | this license for certain libraries in order to permit linking those 71 | libraries into non-free programs. 72 | 73 | When a program is linked with a library, whether statically or using 74 | a shared library, the combination of the two is legally speaking a 75 | combined work, a derivative of the original library. The ordinary 76 | General Public License therefore permits such linking only if the 77 | entire combination fits its criteria of freedom. The Lesser General 78 | Public License permits more lax criteria for linking other code with 79 | the library. 80 | 81 | We call this license the "Lesser" General Public License because it 82 | does Less to protect the user's freedom than the ordinary General 83 | Public License. It also provides other free software developers Less 84 | of an advantage over competing non-free programs. These disadvantages 85 | are the reason we use the ordinary General Public License for many 86 | libraries. However, the Lesser license provides advantages in certain 87 | special circumstances. 88 | 89 | For example, on rare occasions, there may be a special need to 90 | encourage the widest possible use of a certain library, so that it becomes 91 | a de-facto standard. To achieve this, non-free programs must be 92 | allowed to use the library. A more frequent case is that a free 93 | library does the same job as widely used non-free libraries. In this 94 | case, there is little to gain by limiting the free library to free 95 | software only, so we use the Lesser General Public License. 96 | 97 | In other cases, permission to use a particular library in non-free 98 | programs enables a greater number of people to use a large body of 99 | free software. For example, permission to use the GNU C Library in 100 | non-free programs enables many more people to use the whole GNU 101 | operating system, as well as its variant, the GNU/Linux operating 102 | system. 103 | 104 | Although the Lesser General Public License is Less protective of the 105 | users' freedom, it does ensure that the user of a program that is 106 | linked with the Library has the freedom and the wherewithal to run 107 | that program using a modified version of the Library. 108 | 109 | The precise terms and conditions for copying, distribution and 110 | modification follow. Pay close attention to the difference between a 111 | "work based on the library" and a "work that uses the library". The 112 | former contains code derived from the library, whereas the latter must 113 | be combined with the library in order to run. 114 | 115 | GNU LESSER GENERAL PUBLIC LICENSE 116 | TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION 117 | 118 | 0. This License Agreement applies to any software library or other 119 | program which contains a notice placed by the copyright holder or 120 | other authorized party saying it may be distributed under the terms of 121 | this Lesser General Public License (also called "this License"). 122 | Each licensee is addressed as "you". 123 | 124 | A "library" means a collection of software functions and/or data 125 | prepared so as to be conveniently linked with application programs 126 | (which use some of those functions and data) to form executables. 127 | 128 | The "Library", below, refers to any such software library or work 129 | which has been distributed under these terms. A "work based on the 130 | Library" means either the Library or any derivative work under 131 | copyright law: that is to say, a work containing the Library or a 132 | portion of it, either verbatim or with modifications and/or translated 133 | straightforwardly into another language. (Hereinafter, translation is 134 | included without limitation in the term "modification".) 135 | 136 | "Source code" for a work means the preferred form of the work for 137 | making modifications to it. For a library, complete source code means 138 | all the source code for all modules it contains, plus any associated 139 | interface definition files, plus the scripts used to control compilation 140 | and installation of the library. 141 | 142 | Activities other than copying, distribution and modification are not 143 | covered by this License; they are outside its scope. The act of 144 | running a program using the Library is not restricted, and output from 145 | such a program is covered only if its contents constitute a work based 146 | on the Library (independent of the use of the Library in a tool for 147 | writing it). Whether that is true depends on what the Library does 148 | and what the program that uses the Library does. 149 | 150 | 1. You may copy and distribute verbatim copies of the Library's 151 | complete source code as you receive it, in any medium, provided that 152 | you conspicuously and appropriately publish on each copy an 153 | appropriate copyright notice and disclaimer of warranty; keep intact 154 | all the notices that refer to this License and to the absence of any 155 | warranty; and distribute a copy of this License along with the 156 | Library. 157 | 158 | You may charge a fee for the physical act of transferring a copy, 159 | and you may at your option offer warranty protection in exchange for a 160 | fee. 161 | 162 | 2. You may modify your copy or copies of the Library or any portion 163 | of it, thus forming a work based on the Library, and copy and 164 | distribute such modifications or work under the terms of Section 1 165 | above, provided that you also meet all of these conditions: 166 | 167 | a) The modified work must itself be a software library. 168 | 169 | b) You must cause the files modified to carry prominent notices 170 | stating that you changed the files and the date of any change. 171 | 172 | c) You must cause the whole of the work to be licensed at no 173 | charge to all third parties under the terms of this License. 174 | 175 | d) If a facility in the modified Library refers to a function or a 176 | table of data to be supplied by an application program that uses 177 | the facility, other than as an argument passed when the facility 178 | is invoked, then you must make a good faith effort to ensure that, 179 | in the event an application does not supply such function or 180 | table, the facility still operates, and performs whatever part of 181 | its purpose remains meaningful. 182 | 183 | (For example, a function in a library to compute square roots has 184 | a purpose that is entirely well-defined independent of the 185 | application. Therefore, Subsection 2d requires that any 186 | application-supplied function or table used by this function must 187 | be optional: if the application does not supply it, the square 188 | root function must still compute square roots.) 189 | 190 | These requirements apply to the modified work as a whole. If 191 | identifiable sections of that work are not derived from the Library, 192 | and can be reasonably considered independent and separate works in 193 | themselves, then this License, and its terms, do not apply to those 194 | sections when you distribute them as separate works. But when you 195 | distribute the same sections as part of a whole which is a work based 196 | on the Library, the distribution of the whole must be on the terms of 197 | this License, whose permissions for other licensees extend to the 198 | entire whole, and thus to each and every part regardless of who wrote 199 | it. 200 | 201 | Thus, it is not the intent of this section to claim rights or contest 202 | your rights to work written entirely by you; rather, the intent is to 203 | exercise the right to control the distribution of derivative or 204 | collective works based on the Library. 205 | 206 | In addition, mere aggregation of another work not based on the Library 207 | with the Library (or with a work based on the Library) on a volume of 208 | a storage or distribution medium does not bring the other work under 209 | the scope of this License. 210 | 211 | 3. You may opt to apply the terms of the ordinary GNU General Public 212 | License instead of this License to a given copy of the Library. To do 213 | this, you must alter all the notices that refer to this License, so 214 | that they refer to the ordinary GNU General Public License, version 2, 215 | instead of to this License. (If a newer version than version 2 of the 216 | ordinary GNU General Public License has appeared, then you can specify 217 | that version instead if you wish.) Do not make any other change in 218 | these notices. 219 | 220 | Once this change is made in a given copy, it is irreversible for 221 | that copy, so the ordinary GNU General Public License applies to all 222 | subsequent copies and derivative works made from that copy. 223 | 224 | This option is useful when you wish to copy part of the code of 225 | the Library into a program that is not a library. 226 | 227 | 4. You may copy and distribute the Library (or a portion or 228 | derivative of it, under Section 2) in object code or executable form 229 | under the terms of Sections 1 and 2 above provided that you accompany 230 | it with the complete corresponding machine-readable source code, which 231 | must be distributed under the terms of Sections 1 and 2 above on a 232 | medium customarily used for software interchange. 233 | 234 | If distribution of object code is made by offering access to copy 235 | from a designated place, then offering equivalent access to copy the 236 | source code from the same place satisfies the requirement to 237 | distribute the source code, even though third parties are not 238 | compelled to copy the source along with the object code. 239 | 240 | 5. A program that contains no derivative of any portion of the 241 | Library, but is designed to work with the Library by being compiled or 242 | linked with it, is called a "work that uses the Library". Such a 243 | work, in isolation, is not a derivative work of the Library, and 244 | therefore falls outside the scope of this License. 245 | 246 | However, linking a "work that uses the Library" with the Library 247 | creates an executable that is a derivative of the Library (because it 248 | contains portions of the Library), rather than a "work that uses the 249 | library". The executable is therefore covered by this License. 250 | Section 6 states terms for distribution of such executables. 251 | 252 | When a "work that uses the Library" uses material from a header file 253 | that is part of the Library, the object code for the work may be a 254 | derivative work of the Library even though the source code is not. 255 | Whether this is true is especially significant if the work can be 256 | linked without the Library, or if the work is itself a library. The 257 | threshold for this to be true is not precisely defined by law. 258 | 259 | If such an object file uses only numerical parameters, data 260 | structure layouts and accessors, and small macros and small inline 261 | functions (ten lines or less in length), then the use of the object 262 | file is unrestricted, regardless of whether it is legally a derivative 263 | work. (Executables containing this object code plus portions of the 264 | Library will still fall under Section 6.) 265 | 266 | Otherwise, if the work is a derivative of the Library, you may 267 | distribute the object code for the work under the terms of Section 6. 268 | Any executables containing that work also fall under Section 6, 269 | whether or not they are linked directly with the Library itself. 270 | 271 | 6. As an exception to the Sections above, you may also combine or 272 | link a "work that uses the Library" with the Library to produce a 273 | work containing portions of the Library, and distribute that work 274 | under terms of your choice, provided that the terms permit 275 | modification of the work for the customer's own use and reverse 276 | engineering for debugging such modifications. 277 | 278 | You must give prominent notice with each copy of the work that the 279 | Library is used in it and that the Library and its use are covered by 280 | this License. You must supply a copy of this License. If the work 281 | during execution displays copyright notices, you must include the 282 | copyright notice for the Library among them, as well as a reference 283 | directing the user to the copy of this License. Also, you must do one 284 | of these things: 285 | 286 | a) Accompany the work with the complete corresponding 287 | machine-readable source code for the Library including whatever 288 | changes were used in the work (which must be distributed under 289 | Sections 1 and 2 above); and, if the work is an executable linked 290 | with the Library, with the complete machine-readable "work that 291 | uses the Library", as object code and/or source code, so that the 292 | user can modify the Library and then relink to produce a modified 293 | executable containing the modified Library. (It is understood 294 | that the user who changes the contents of definitions files in the 295 | Library will not necessarily be able to recompile the application 296 | to use the modified definitions.) 297 | 298 | b) Use a suitable shared library mechanism for linking with the 299 | Library. A suitable mechanism is one that (1) uses at run time a 300 | copy of the library already present on the user's computer system, 301 | rather than copying library functions into the executable, and (2) 302 | will operate properly with a modified version of the library, if 303 | the user installs one, as long as the modified version is 304 | interface-compatible with the version that the work was made with. 305 | 306 | c) Accompany the work with a written offer, valid for at 307 | least three years, to give the same user the materials 308 | specified in Subsection 6a, above, for a charge no more 309 | than the cost of performing this distribution. 310 | 311 | d) If distribution of the work is made by offering access to copy 312 | from a designated place, offer equivalent access to copy the above 313 | specified materials from the same place. 314 | 315 | e) Verify that the user has already received a copy of these 316 | materials or that you have already sent this user a copy. 317 | 318 | For an executable, the required form of the "work that uses the 319 | Library" must include any data and utility programs needed for 320 | reproducing the executable from it. However, as a special exception, 321 | the materials to be distributed need not include anything that is 322 | normally distributed (in either source or binary form) with the major 323 | components (compiler, kernel, and so on) of the operating system on 324 | which the executable runs, unless that component itself accompanies 325 | the executable. 326 | 327 | It may happen that this requirement contradicts the license 328 | restrictions of other proprietary libraries that do not normally 329 | accompany the operating system. Such a contradiction means you cannot 330 | use both them and the Library together in an executable that you 331 | distribute. 332 | 333 | 7. You may place library facilities that are a work based on the 334 | Library side-by-side in a single library together with other library 335 | facilities not covered by this License, and distribute such a combined 336 | library, provided that the separate distribution of the work based on 337 | the Library and of the other library facilities is otherwise 338 | permitted, and provided that you do these two things: 339 | 340 | a) Accompany the combined library with a copy of the same work 341 | based on the Library, uncombined with any other library 342 | facilities. This must be distributed under the terms of the 343 | Sections above. 344 | 345 | b) Give prominent notice with the combined library of the fact 346 | that part of it is a work based on the Library, and explaining 347 | where to find the accompanying uncombined form of the same work. 348 | 349 | 8. You may not copy, modify, sublicense, link with, or distribute 350 | the Library except as expressly provided under this License. Any 351 | attempt otherwise to copy, modify, sublicense, link with, or 352 | distribute the Library is void, and will automatically terminate your 353 | rights under this License. However, parties who have received copies, 354 | or rights, from you under this License will not have their licenses 355 | terminated so long as such parties remain in full compliance. 356 | 357 | 9. You are not required to accept this License, since you have not 358 | signed it. However, nothing else grants you permission to modify or 359 | distribute the Library or its derivative works. These actions are 360 | prohibited by law if you do not accept this License. Therefore, by 361 | modifying or distributing the Library (or any work based on the 362 | Library), you indicate your acceptance of this License to do so, and 363 | all its terms and conditions for copying, distributing or modifying 364 | the Library or works based on it. 365 | 366 | 10. Each time you redistribute the Library (or any work based on the 367 | Library), the recipient automatically receives a license from the 368 | original licensor to copy, distribute, link with or modify the Library 369 | subject to these terms and conditions. You may not impose any further 370 | restrictions on the recipients' exercise of the rights granted herein. 371 | You are not responsible for enforcing compliance by third parties with 372 | this License. 373 | 374 | 11. If, as a consequence of a court judgment or allegation of patent 375 | infringement or for any other reason (not limited to patent issues), 376 | conditions are imposed on you (whether by court order, agreement or 377 | otherwise) that contradict the conditions of this License, they do not 378 | excuse you from the conditions of this License. If you cannot 379 | distribute so as to satisfy simultaneously your obligations under this 380 | License and any other pertinent obligations, then as a consequence you 381 | may not distribute the Library at all. For example, if a patent 382 | license would not permit royalty-free redistribution of the Library by 383 | all those who receive copies directly or indirectly through you, then 384 | the only way you could satisfy both it and this License would be to 385 | refrain entirely from distribution of the Library. 386 | 387 | If any portion of this section is held invalid or unenforceable under any 388 | particular circumstance, the balance of the section is intended to apply, 389 | and the section as a whole is intended to apply in other circumstances. 390 | 391 | It is not the purpose of this section to induce you to infringe any 392 | patents or other property right claims or to contest validity of any 393 | such claims; this section has the sole purpose of protecting the 394 | integrity of the free software distribution system which is 395 | implemented by public license practices. Many people have made 396 | generous contributions to the wide range of software distributed 397 | through that system in reliance on consistent application of that 398 | system; it is up to the author/donor to decide if he or she is willing 399 | to distribute software through any other system and a licensee cannot 400 | impose that choice. 401 | 402 | This section is intended to make thoroughly clear what is believed to 403 | be a consequence of the rest of this License. 404 | 405 | 12. If the distribution and/or use of the Library is restricted in 406 | certain countries either by patents or by copyrighted interfaces, the 407 | original copyright holder who places the Library under this License may add 408 | an explicit geographical distribution limitation excluding those countries, 409 | so that distribution is permitted only in or among countries not thus 410 | excluded. In such case, this License incorporates the limitation as if 411 | written in the body of this License. 412 | 413 | 13. The Free Software Foundation may publish revised and/or new 414 | versions of the Lesser General Public License from time to time. 415 | Such new versions will be similar in spirit to the present version, 416 | but may differ in detail to address new problems or concerns. 417 | 418 | Each version is given a distinguishing version number. If the Library 419 | specifies a version number of this License which applies to it and 420 | "any later version", you have the option of following the terms and 421 | conditions either of that version or of any later version published by 422 | the Free Software Foundation. If the Library does not specify a 423 | license version number, you may choose any version ever published by 424 | the Free Software Foundation. 425 | 426 | 14. If you wish to incorporate parts of the Library into other free 427 | programs whose distribution conditions are incompatible with these, 428 | write to the author to ask for permission. For software which is 429 | copyrighted by the Free Software Foundation, write to the Free 430 | Software Foundation; we sometimes make exceptions for this. Our 431 | decision will be guided by the two goals of preserving the free status 432 | of all derivatives of our free software and of promoting the sharing 433 | and reuse of software generally. 434 | 435 | NO WARRANTY 436 | 437 | 15. BECAUSE THE LIBRARY IS LICENSED FREE OF CHARGE, THERE IS NO 438 | WARRANTY FOR THE LIBRARY, TO THE EXTENT PERMITTED BY APPLICABLE LAW. 439 | EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR 440 | OTHER PARTIES PROVIDE THE LIBRARY "AS IS" WITHOUT WARRANTY OF ANY 441 | KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE 442 | IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR 443 | PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE 444 | LIBRARY IS WITH YOU. SHOULD THE LIBRARY PROVE DEFECTIVE, YOU ASSUME 445 | THE COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION. 446 | 447 | 16. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN 448 | WRITING WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY 449 | AND/OR REDISTRIBUTE THE LIBRARY AS PERMITTED ABOVE, BE LIABLE TO YOU 450 | FOR DAMAGES, INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR 451 | CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THE 452 | LIBRARY (INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING 453 | RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A 454 | FAILURE OF THE LIBRARY TO OPERATE WITH ANY OTHER SOFTWARE), EVEN IF 455 | SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH 456 | DAMAGES. 457 | 458 | END OF TERMS AND CONDITIONS 459 | 460 | How to Apply These Terms to Your New Libraries 461 | 462 | If you develop a new library, and you want it to be of the greatest 463 | possible use to the public, we recommend making it free software that 464 | everyone can redistribute and change. You can do so by permitting 465 | redistribution under these terms (or, alternatively, under the terms of the 466 | ordinary General Public License). 467 | 468 | To apply these terms, attach the following notices to the library. It is 469 | safest to attach them to the start of each source file to most effectively 470 | convey the exclusion of warranty; and each file should have at least the 471 | "copyright" line and a pointer to where the full notice is found. 472 | 473 | 474 | Copyright (C) 475 | 476 | This library is free software; you can redistribute it and/or 477 | modify it under the terms of the GNU Lesser General Public 478 | License as published by the Free Software Foundation; either 479 | version 2.1 of the License, or (at your option) any later version. 480 | 481 | This library is distributed in the hope that it will be useful, 482 | but WITHOUT ANY WARRANTY; without even the implied warranty of 483 | MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU 484 | Lesser General Public License for more details. 485 | 486 | You should have received a copy of the GNU Lesser General Public 487 | License along with this library; if not, write to the Free Software 488 | Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 489 | USA 490 | 491 | Also add information on how to contact you by electronic and paper mail. 492 | 493 | You should also get your employer (if you work as a programmer) or your 494 | school, if any, to sign a "copyright disclaimer" for the library, if 495 | necessary. Here is a sample; alter the names: 496 | 497 | Yoyodyne, Inc., hereby disclaims all copyright interest in the 498 | library `Frob' (a library for tweaking knobs) written by James Random 499 | Hacker. 500 | 501 | , 1 April 1990 502 | Ty Coon, President of Vice 503 | 504 | That's all there is to it! 505 | --------------------------------------------------------------------------------