├── docker
├── logo.png
├── info.txt
├── frame.py
├── sssd.conf.sh
├── startup.sh
├── test.sh
├── docker-compose.yml
├── jup-config.py
├── error.html
├── Dockerfile
└── login.html
├── cyolauthenticator
├── __init__.py
├── chkpasswd.py
├── chpasswd.py
├── useradd.py
└── cyolauthenticator.py
├── README.md
├── setup.py
└── LICENSE
/docker/logo.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/stevenrbrandt/cyolauthenticator/master/docker/logo.png
--------------------------------------------------------------------------------
/docker/info.txt:
--------------------------------------------------------------------------------
1 | US
2 | Louisiana
3 | Baton Rouge
4 | LSU
5 | CCT
6 | cyol.cct.lsu.edu
7 | sbrandt@cct.lsu.edu
8 |
--------------------------------------------------------------------------------
/cyolauthenticator/__init__.py:
--------------------------------------------------------------------------------
1 | from cyolauthenticator.cyolauthenticator import CYOLAuthenticator
2 |
3 | __all__ = [CYOLAuthenticator]
4 |
--------------------------------------------------------------------------------
/docker/frame.py:
--------------------------------------------------------------------------------
1 | with open("/usr/enable_mkuser","r") as fd:
2 | line = " The Code is: '"+fd.read().strip()+"' "
3 | print()
4 | print("+","-"*len(line),"+",sep='')
5 | print("|",line,"|",sep='')
6 | print("+","-"*len(line),"+",sep='')
7 | print()
8 |
--------------------------------------------------------------------------------
/README.md:
--------------------------------------------------------------------------------
1 | # CYOLAuthenticator: Create Your Own Login Authenticator
2 | A Jupyterhub authenticator that allows users to pick a name and password if they know a code.
3 |
4 | To enable users to create a login, place a code word in /usr/enable_mkuser. If the users provide this code word when attempting to create a login, they will succeed.
5 |
6 | To disable creation of logins, remove /usr/enable_mkuser.
7 |
8 | Note that you will also need a custom login.html page. See the docker directory for how to do this.
9 |
--------------------------------------------------------------------------------
/setup.py:
--------------------------------------------------------------------------------
1 | from setuptools import setup, find_packages
2 |
3 | setup(
4 | name='cyolauthenticator',
5 | version='1.2',
6 | description='A Jupyterhub Authenticator that allows users to pick a name and password if they know a code',
7 | long_description='A Jupyterhub Authenticator that allows users to pick a name and password if they know a code',
8 | url='http://cct.lsu.edu/~sbrandt/',
9 | author='Steven R. Brandt',
10 | author_email='steven@stevenrbrandt.com',
11 | license='LGPL',
12 | packages=['cyolauthenticator']
13 | )
14 |
--------------------------------------------------------------------------------
/docker/sssd.conf.sh:
--------------------------------------------------------------------------------
1 | mkdir -p /etc/sssd
2 |
3 | # Don't reinstall
4 | if [ -d /etc/sssd/sssd.conf ]
5 | then return
6 | fi
7 |
8 | cat > /etc/sssd/sssd.conf << EOF
9 | [sssd]
10 | config_file_version = 2
11 | domains = ${LDAP_DOMAIN}
12 | services = nss, pam
13 |
14 | [pam]
15 |
16 | [domain/${LDAP_DOMAIN}]
17 | id_provider = ldap
18 | auth_provider = ldap
19 | ldap_uri = ldap://${LDAP_HOST}
20 | cache_credentials = True
21 | ldap_search_base = ${LDAP_BASE_DN}
22 | ldap_group_search_base = ${LDAP_BASE_DN}
23 | ldap_user_search_base = ${LDAP_BASE_DN}
24 | ldap_default_bind_dn = cn=admin,${LDAP_BASE_DN}
25 | ldap_default_authtok = ${LDAP_ADMIN_PASSWORD}
26 |
27 | [nss]
28 | filter_groups = root
29 | filter_users = root
30 | entry_cache_nowait_percentage = 75
31 | EOF
32 | chmod 600 /etc/sssd/sssd.conf
33 |
--------------------------------------------------------------------------------
/cyolauthenticator/chkpasswd.py:
--------------------------------------------------------------------------------
1 | from subprocess import Popen, PIPE, call
2 | import sys, re, os
3 | from tempfile import NamedTemporaryFile
4 |
5 | LDAP_BASE_DN=os.environ["LDAP_BASE_DN"]
6 | LDAP_HOST=os.environ["LDAP_HOST"]
7 |
8 | def check_passwd(user, passwd):
9 | n = NamedTemporaryFile(mode='w')
10 | n.write(passwd)
11 | n.flush()
12 |
13 | cmd=["ldapwhoami","-x","-y",n.name,f"-D",f"uid={user},{LDAP_BASE_DN}","-H",f"ldap://{LDAP_HOST}"]
14 | p = Popen(cmd, universal_newlines=True, stdin=PIPE, stdout=PIPE, stderr=PIPE)
15 |
16 | o,e = p.communicate(passwd)
17 | print(e,end='')
18 | return p.returncode
19 |
20 | if __name__ == "__main__":
21 | for line in sys.stdin.readlines():
22 | g = re.match(r'(.*?):(.*)', line)
23 | assert g, f"Bad data '{line}'"
24 | user, passwd = g.group(1), g.group(2)
25 | r = check_passwd(user, passwd)
26 | if r != 0:
27 | exit(r)
28 |
--------------------------------------------------------------------------------
/docker/startup.sh:
--------------------------------------------------------------------------------
1 | cd /root
2 | if [ ! -d cyolauthenticator ]
3 | then
4 | git clone https://github.com/stevenrbrandt/cyolauthenticator
5 | fi
6 | cd /root/cyolauthenticator
7 | python3 setup.py install
8 |
9 | cd /
10 | randpass MND -o /usr/enable_mkuser
11 | chmod 600 /usr/enable_mkuser
12 | python /usr/local/bin/frame.py
13 |
14 | bash /usr/local/sbin/sssd.conf.sh
15 | service sssd start
16 |
17 | echo -n $LDAP_ADMIN_PASSWORD > /etc/ldap-admin-pw.txt
18 | chmod 600 /etc/ldap-admin-pw.txt
19 | echo -n $LDAP_READONLY_USER_PASSWORD > /etc/ldap-pw.txt
20 | chmod 600 /etc/ldap-pw.txt
21 | unset LDAP_READONLY_USER_PASSWORD
22 | unset LDAP_ADMIN_PASSWORD
23 |
24 | export PYTHONPATH=/usr/local/lib/python$(python3 -c 'import sys; print("%d.%d" % (sys.version_info.major, sys.version_info.minor))')/dist-packages
25 |
26 | PORT=443
27 | echo jupyterhub --ip 0.0.0.0 --port $PORT -f jup-config.py
28 | # jupyterhub --log-level=50 --ip 0.0.0.0 --port $PORT -f jup-config.py
29 | jupyterhub --ip 0.0.0.0 --port $PORT -f jup-config.py
30 | echo jupyterhub exited!
31 | sleep infinity
32 |
--------------------------------------------------------------------------------
/docker/test.sh:
--------------------------------------------------------------------------------
1 | echo -n $LDAP_ADMIN_PASSWORD > /etc/ldap-admin-pw.txt
2 | chmod 600 /etc/ldap-admin-pw.txt
3 | echo -n $LDAP_READONLY_USER_PASSWORD > /etc/ldap-pw.txt
4 | chmod 600 /etc/ldap-pw.txt
5 |
6 | cat > user.ldif << EOF
7 | # define ldif file with record arrtributes
8 | # file saved with ${LDAP_READONLY_USER_USERNAME}.lfip
9 | dn: uid=${LDAP_READONLY_USER_USERNAME},${LDAP_BASE_DN}
10 | uid: ${LDAP_READONLY_USER_USERNAME}
11 | cn: ${LDAP_READONLY_USER_USERNAME}
12 | sn: 3
13 | objectClass: top
14 | objectClass: posixAccount
15 | objectClass: inetOrgPerson
16 | loginShell: /bin/bash
17 | homeDirectory: /home/${LDAP_READONLY_USER_USERNAME}
18 | uidNumber: 1234
19 | gidNumber: 100
20 | userPassword: ${LDAP_READONLY_USER_PASSWORD}
21 | mail: ${LDAP_READONLY_USER_USERNAME}@rahasak.com
22 | gecos: ${LDAP_READONLY_USER_USERNAME} User
23 | EOF
24 |
25 | set -x
26 | ldapadd -x -H ldap://${LDAP_HOST} -D cn=admin,${LDAP_BASE_DN} -f user.ldif -y /etc/ldap-admin-pw.txt
27 | ldapsearch -x -H ldap://${LDAP_HOST} -b ${LDAP_BASE_DN} -D cn=admin,${LDAP_BASE_DN} -y /etc/ldap-admin-pw.txt
28 |
--------------------------------------------------------------------------------
/cyolauthenticator/chpasswd.py:
--------------------------------------------------------------------------------
1 | #!/usr/bin/env python3
2 | from random import randint
3 | import sys, os, re
4 | from subprocess import Popen, PIPE
5 |
6 | LDAP_BASE_DN=os.environ["LDAP_BASE_DN"]
7 | LDAP_HOST=os.environ["LDAP_HOST"]
8 |
9 | def change_passwd(user, passwd):
10 | cmd=["ldapmodify","-x","-H",f"ldap://{LDAP_HOST}","-D", f"cn=admin,{LDAP_BASE_DN}","-y","/etc/ldap-admin-pw.txt"]
11 | p = Popen(cmd,universal_newlines=True,stdout=PIPE,stderr=PIPE,stdin=PIPE)
12 | msg=f"""
13 | dn: uid={user},{LDAP_BASE_DN}
14 | changetype: modify
15 | replace: userPassword
16 | userPassword: {passwd}
17 | """
18 | o, e = p.communicate(msg)
19 | if p.returncode != 0:
20 | print(o,e)
21 | print(f"Error: ret={p.returncode}")
22 | return p.returncode
23 |
24 | if __name__ == "__main__":
25 | for line in sys.stdin.readlines():
26 | g = re.match(r'(.*?):(.*)', line)
27 | assert g, f"Bad data '{line}'"
28 | user, passwd = g.group(1), g.group(2)
29 | r = change_passwd(user, passwd)
30 | if r != 0:
31 | exit(r)
32 |
--------------------------------------------------------------------------------
/docker/docker-compose.yml:
--------------------------------------------------------------------------------
1 | version: '3'
2 |
3 | services:
4 | ldapservice:
5 | build:
6 | context: ldapserver
7 | dockerfile: Dockerfile
8 | image: stevenrbrandt/ldapimmage
9 | hostname: ldapserver.cyolauth.org
10 | container_name: ldapserver
11 | ## The following environment variables
12 | ## are required. We suggest you create
13 | ## an ldap-vars.env and configure them.
14 | #environment:
15 | # - LDAP_ORGANISATION=rahasak
16 | # - LDAP_DOMAIN=rahasak.com
17 | # - "LDAP_BASE_DN=dc=rahasak,dc=com"
18 | # - LDAP_ADMIN_PASSWORD=rahasak
19 | env_file:
20 | - ldap-vars.env
21 | volumes:
22 | - /home/sbrandt/tmp/ldap_data:/var/lib/ldap
23 | - /home/sbrandt/tmp/slapd_data:/etc/ldap/slapd.d
24 |
25 | cyolauthservice:
26 | build:
27 | context: .
28 | dockerfile: Dockerfile
29 | image: stevenrbrandt/cyolauth
30 | container_name: cyolauth
31 | hostname: cyolauthhost.cyolauth.org
32 | env_file:
33 | - ldap-vars.env
34 | ports:
35 | - 9443:443
36 | - 9080:80
37 | entrypoint: sleep infinity
38 | volumes:
39 | - /home/sbrandt/repos/cyolauthenticator:/root/cyolauthenticator
40 | - /home/brandt/tmp/home:/home
41 | - ./tls:/etc/pki/tls
42 |
--------------------------------------------------------------------------------
/docker/jup-config.py:
--------------------------------------------------------------------------------
1 | import os
2 | from traceback import print_exc
3 | from subprocess import Popen, PIPE
4 |
5 | def call(cmd, inp=None):
6 | print("Calling:",cmd)
7 | if inp is None:
8 | p = Popen(cmd, stdout=PIPE, stderr=PIPE, universal_newlines=True)
9 | else:
10 | p = Popen(cmd, stdout=PIPE, stderr=PIPE, stdin=PIPE, universal_newlines=True)
11 | out, err = p.communicate(inp)
12 | print(out,end='',flush=True)
13 | print(err,end='',flush=True)
14 |
15 | c.JupyterHub.authenticator_class = 'cyolauthenticator.CYOLAuthenticator'
16 | c.JupyterHub.template_paths = ['/jinja/templates']
17 |
18 | # openssl genrsa -out rootCA.key 2048
19 | # openssl req -x509 -new -nodes -key rootCA.key -sha256 -days 1024 -out rootCA.pem
20 |
21 | certname = os.environ.get('CERT_NAME','tutorial')
22 | cer = f'/etc/pki/tls/certs/{certname}.cer'
23 | key = f'/etc/pki/tls/private/{certname}.key'
24 |
25 | try:
26 |
27 | if not os.path.exists(key):
28 | os.makedirs(os.path.dirname(key), exist_ok=True)
29 | call(["openssl","genrsa","-out",key,"2048"])
30 |
31 | if not os.path.exists(cer):
32 | os.makedirs(os.path.dirname(cer), exist_ok=True)
33 | answers = open("info.txt").read()
34 | call(["openssl","req","-x509","-new","-nodes","-key",key,"-sha256","-days","1024","-out",cer],answers)
35 |
36 | if os.path.exists(cer) and os.path.exists(key):
37 | print("Starting with SSL")
38 | c.JupyterHub.ssl_cert = cer
39 | c.JupyterHub.ssl_key = key
40 | print("Starting with SSL")
41 | print("Cert:",cer)
42 | print("Key:",key)
43 | else:
44 | print("Starting without SSL")
45 |
46 |
47 | # Uncomment if needed
48 | #c.JupyterHub.base_url = '/somename/'
49 | except:
50 | print_exc()
51 | print(" >>> CONFIGURATION COMPLETE <<<<")
52 |
--------------------------------------------------------------------------------
/docker/error.html:
--------------------------------------------------------------------------------
1 | {% extends "page.html" %}
2 |
3 | {% block login_widget %}
4 | {% endblock %}
5 |
6 | {% block main %}
7 |
8 |
9 | {% block h1_error %}
10 |
11 | {{status_code}} : {{status_message}}
12 |
13 | {% if exception and exception.my_message %}
14 |
{{ exception.my_message }}
15 | {% endif %}
16 | {% endblock h1_error %}
17 | {% block error_detail %}
18 | {% if message %}
19 |
20 | {{message}}
21 |
22 | {% endif %}
23 | {% if message_html %}
24 |
25 | {{message_html | safe}}
26 |
27 | {% endif %}
28 | {% if extra_error_html %}
29 |
30 | {{extra_error_html | safe}}
31 |
32 | {% endif %}
33 | {% endblock error_detail %}
34 |
35 |
36 | {% endblock %}
37 |
38 | {% block script %}
39 | {{super()}}
40 |
41 |
67 | {% endblock %}
68 |
--------------------------------------------------------------------------------
/docker/Dockerfile:
--------------------------------------------------------------------------------
1 | # It is possible to use a later version of Ubuntu,
2 | # however, if one does that then a Singularity version
3 | # of the image will not run on clusters with older
4 | # linux kernels.
5 | FROM ubuntu:20.04
6 | USER root
7 |
8 | ENV DEBIAN_FRONTEND=noninteractive
9 |
10 | RUN apt-get update
11 | # python3-pam is needed for authuser.py
12 | RUN apt-get install -y python3 python3-pip openssh-client libssl-dev npm \
13 | gnupg policycoreutils python3-pam imagemagick curl vim git \
14 | ldap-utils vim sssd-ldap perl-modules-5.30 libpam-ldapd apt-file dialog ca-certificates libnss-ldap libpam-modules libpam-sss
15 |
16 | COPY sssd.conf.sh /usr/local/sbin/sssd.conf.sh
17 | #RUN bash /usr/local/sbin/sssd.conf.sh
18 |
19 | # Make python3 the default
20 | RUN update-alternatives --install /usr/bin/python python /usr/bin/python3 1
21 | RUN update-alternatives --install /usr/bin/pip pip /usr/bin/pip3 1
22 |
23 | RUN apt install -y python3-sqlalchemy
24 | RUN pip install --upgrade pip
25 |
26 | RUN pip install oauthenticator==14.1.0 jupyter==1.0.0 jupyterhub==1.4.2 tornado==6.1 python-oauth2==1.1.1 jupyterhub-dummyauthenticator
27 |
28 | RUN apt-get -y install nodejs
29 |
30 | RUN npm install -g configurable-http-proxy@4.5.0
31 |
32 | # Edit the message in the h1 tags to customize your tutorial
33 | COPY login.html /usr/local/share/jupyterhub/templates/login.html
34 | COPY error.html /usr/local/share/jupyterhub/templates/error.html
35 |
36 | # Replace logo.png with whatever logo you wish to use to brand the server
37 | COPY logo.png /usr/local/share/jupyterhub/static/images/logo.png
38 |
39 | #RUN mkdir -p /usr/local/lib/python3.5/dist-packages/cyolauthenticator
40 | #COPY cyol.py /usr/local/lib/python3.5/dist-packages/cyolauthenticator/__init__.py
41 | #COPY cyolauthenticator.py /usr/local/lib/python3.5/dist-packages/cyolauthenticator/cyolauthenticator.py
42 |
43 | RUN pip install randpass
44 | RUN pip install git+https://github.com/stevenrbrandt/cyolauthenticator
45 | #COPY cyol.tgz ./
46 | #RUN tar xzf cyol.tgz
47 | #RUN python3 setup.py install
48 |
49 |
50 | COPY startup.sh /
51 | COPY jup-config.py /
52 | COPY info.txt /
53 | COPY frame.py /usr/local/bin/
54 | COPY test.sh /
55 | CMD bash ./startup.sh
56 |
--------------------------------------------------------------------------------
/cyolauthenticator/useradd.py:
--------------------------------------------------------------------------------
1 | #!/usr/bin/env python3
2 | from random import randint
3 | import sys, os
4 | from subprocess import Popen, PIPE, call
5 | from time import sleep
6 | from pwd import getpwnam
7 | from grp import getgrgid
8 |
9 | UIDNUMBER_NOT_UNIQUE = 19
10 | USER_EXISTS = 68
11 | LDAP_BASE_DN=os.environ["LDAP_BASE_DN"]
12 | LDAP_HOST=os.environ["LDAP_HOST"]
13 |
14 | user_data = {}
15 |
16 | def get_user_data(user):
17 | if user in user_data:
18 | return user_data[user]
19 | try:
20 | return getpwnam(user)
21 | except:
22 | return None
23 |
24 | def user_add(user):
25 | uid_number = randint(1000,100000)
26 | while True:
27 | ldap_cmd=["ldapadd","-x","-H",f"ldap://{LDAP_HOST}","-D", f"cn=admin,{LDAP_BASE_DN}","-y","/etc/ldap-admin-pw.txt"]
28 | p = Popen(ldap_cmd,universal_newlines=True,stdout=PIPE,stderr=PIPE,stdin=PIPE)
29 | login_shell = "/bin/bash"
30 | home_directory = f"/home/{user}"
31 | gid_number = 100
32 | email = 'sbrandt@cct.lsu.edu'
33 | gecos = user
34 |
35 | ldap_txt=f"""
36 | # define ldif file with record arrtributes
37 | # file saved with bassa.lfip
38 | dn: uid={user},{LDAP_BASE_DN}
39 | uid: {user}
40 | cn: {user}
41 | sn: 3
42 | objectClass: top
43 | objectClass: posixAccount
44 | objectClass: inetOrgPerson
45 | loginShell: {login_shell}
46 | homeDirectory: {home_directory}
47 | uidNumber: {uid_number}
48 | gidNumber: {gid_number}
49 | mail: {email}
50 | gecos: {gecos}
51 | """
52 | o, e = p.communicate(ldap_txt)
53 | if e.strip() != "":
54 | print("error:",e)
55 |
56 | # Create a fake pwd entry because getpwnam()
57 | # doesn't see updates immedately.
58 | class _user:
59 | def __init__(self):
60 | self.pw_name = user
61 | self.pw_dir = home_directory
62 | self.pw_gid = gid_number
63 | self.pw_uid = uid_number
64 | self.pw_gecos = gecos
65 | self.pw_shell = login_shell
66 | self.pw_passwd = '*'
67 |
68 | if p.returncode == 0:
69 | uinfo = _user()
70 | user_data[user] = uinfo
71 | os.makedirs(uinfo.pw_dir, exist_ok=True)
72 | ginfo = getgrgid(uinfo.pw_gid)
73 | while True:
74 | sleep(1)
75 | r = call(["id",user])
76 | if r == 0:
77 | break
78 | call(["chown",f"{user}:{ginfo.gr_name}",uinfo.pw_dir])
79 | call(["su","-",user,"-c","cp -TRn /etc/skel/ ~/"])
80 | break
81 |
82 | uid_number = randint(1000,100000)
83 | elif p.returncode == USER_EXISTS:
84 | print(f"USER exists {user}")
85 | break
86 | else:
87 | print(f"Error: ret={p.returncode}")
88 | break
89 | return p.returncode
90 |
91 | if __name__ == "__main__":
92 | user = sys.argv[1]
93 | r = user_add(user)
94 | exit(r)
95 |
--------------------------------------------------------------------------------
/docker/login.html:
--------------------------------------------------------------------------------
1 | {% extends "page.html" %}
2 | {% if announcement_login %}
3 | {% set announcement = announcement_login %}
4 | {% endif %}
5 |
6 | {% set announcement = ' | Welcome to the Tutorial Server |
' %}
7 |
8 | {% block login_widget %}
9 | {% endblock %}
10 |
11 | {% block main %}
12 |
13 | {% block login %}
14 |
15 | {% if custom_html %}
16 | {{ custom_html | safe }}
17 | {% elif login_service %}
18 |
23 | {% else %}
24 |
99 | {% endif %}
100 |
101 | {% endblock login %}
102 |
103 | {% endblock %}
104 |
105 | {% block script %}
106 | {{ super() }}
107 |
114 |
115 | {% endblock %}
116 |
--------------------------------------------------------------------------------
/cyolauthenticator/cyolauthenticator.py:
--------------------------------------------------------------------------------
1 | from traitlets import Unicode
2 |
3 | from jupyterhub.auth import Authenticator
4 |
5 | from traceback import print_exc
6 | from subprocess import call, Popen, PIPE
7 | from tornado.httpclient import HTTPError
8 | from tornado import gen
9 | from os import stat
10 | import os
11 | import sys
12 | import re
13 | from hmac import compare_digest
14 | from crypt import crypt
15 | from .useradd import user_add, get_user_data
16 | from .chpasswd import change_passwd
17 | from .chkpasswd import check_passwd
18 |
19 | # Attempt to authenticate using PAM
20 | def authuser(user, passw):
21 | # with open("/etc/shadow", "r") as fd:
22 | # for line in fd.readlines():
23 | # cols = line.split(':')
24 | # if cols[0] == user:
25 | # if passw is None or cols[1] is None:
26 | # e = HTTPError(403)
27 | # e.my_message = f"No password for account {user}"
28 | # raise e
29 | # crypt_result = crypt(passw, cols[1])
30 | # if crypt_result is None:
31 | # e = HTTPError(403)
32 | # e.my_message = f"No password for account {user}"
33 | # raise e
34 | # if compare_digest(crypt_result , cols[1]):
35 | # return True
36 | # else:
37 | # break
38 | r = check_passwd(user, passw)
39 | if r == 0:
40 | return True
41 | e = HTTPError(403)
42 | e.my_message = "Incorrect password"
43 | raise e
44 |
45 | def mkuser(user, passw, passw2, code_check):
46 | if user == None or len(user.strip())=="":
47 | e = HTTPError(403)
48 | e.my_message = "Username is missing"
49 | raise e
50 |
51 | if len(user) < 5:
52 | e = HTTPError(403)
53 | e.my_message = "Your user name is too short"
54 | raise e
55 |
56 | if len(user) > 15:
57 | e = HTTPError(403)
58 | e.my_message = "Your user name is too long"
59 | raise e
60 |
61 | if len(passw) < 7:
62 | e = HTTPError(403)
63 | e.my_message = "Your password is too short"
64 | raise e
65 |
66 | if len(passw) > 50:
67 | e = HTTPError(403)
68 | e.my_message = "Your password is too long"
69 | raise e
70 |
71 | if passw in [user, "abc123", "abcd1234", "abc1234", "abcd123"]:
72 | e = HTTPError(403)
73 | e.my_message = "Choose a better password"
74 | raise e
75 |
76 | if re.search(r'\W',user):
77 | e = HTTPError(403)
78 | e.my_message = "Illegal character in user nmame. Only letters, numbers and the underscore are allowed."
79 | raise e
80 |
81 | if re.search(r'\W',passw):
82 | e = HTTPError(403)
83 | e.my_message = "Illegal character in password. Only letters, numbers and the underscore are allowed."
84 | raise e
85 |
86 | #home = "/home/%s" % user
87 | #cmd = ["useradd",user,"-s","/bin/bash"]
88 | check_pass2 = False
89 | udata = get_user_data(user)
90 | if udata is not None:
91 | if len(udata.pw_passwd)==1:
92 | user_add(user)
93 | change_passwd(user, passw)
94 | print(f"get_user_data({user}) succeeded")
95 | return authuser(user, passw)
96 | # The user already exists, nothing to do
97 | #return uid
98 | else:
99 | print("No user data")
100 | check_pass2 = True
101 |
102 | if not os.path.exists("/usr/enable_mkuser"):
103 | e = HTTPError(403)
104 | e.my_message = "MkUser disabled"
105 | raise e
106 | if not code_check:
107 | e = HTTPError(403)
108 | e.my_message = "Code check failed"
109 | raise e
110 | check_pass2 = True
111 | if passw != passw2:
112 | e = HTTPError(403)
113 | e.my_message = "Password and Password2 do not match."
114 | raise e
115 | #cmd += ["-m"]
116 |
117 | if check_pass2:
118 | if passw != passw2:
119 | e = HTTPError(403)
120 | e.my_message = "Password and Password2 do not match."
121 | raise e
122 | try:
123 | #call(cmd)
124 | user_add(user)
125 | if os.path.exists("/inituser.sh"):
126 | call(["su","-",user,"-c","bash /inituser.sh"])
127 |
128 | #pipe = Popen(["chpasswd"],stdin=PIPE,universal_newlines=True)
129 | #pipe.stdin.write("%s:%s\n" % (user, passw))
130 | #pipe.stdin.close()
131 | #pipe.wait()
132 | r = change_passwd(user, passw)
133 | #print("Chpasswd called with %s:%s" % (user, passw))
134 | #call(["cp","/etc/shadow","/home/shadow"])
135 | #call(["cp","/etc/passwd","/home/passwd"])
136 | #call(["cp","/etc/group","/home/group"])
137 | except:
138 | print("An exception occurred")
139 | print_exc()
140 | return False
141 | return True
142 |
143 | class CYOLAuthenticator(Authenticator):
144 |
145 | @staticmethod
146 | def _getpwnam(name):
147 | """Wrapper function to protect against `pwd` not being available
148 | on Windows
149 | """
150 | import pwd
151 |
152 | return get_user_data(name)
153 |
154 | password = Unicode(
155 | None,
156 | allow_none=True,
157 | config=True,
158 | help="""
159 | Set a global password for all users wanting to log in.
160 |
161 | This allows users with any username to log in with the same static password.
162 | """
163 | )
164 |
165 | @gen.coroutine
166 | def authenticate(self, handler, data):
167 |
168 | # Retrieve form data
169 | username = data['username'].lower()
170 | password = data['password']
171 | password2 = data['password2']
172 | code = data['code']
173 |
174 | # If the /usr/enable_mkuser is present, read it.
175 | # This file must be present for users to create
176 | # new accounts.
177 | try:
178 | with open("/usr/enable_mkuser","r") as fd:
179 | code_check = fd.read().strip()
180 | except:
181 | # Ensure code check doesn't happen
182 | code_check = "disabled"
183 | code = ""
184 |
185 | if mkuser(username, password, password2, code == code_check):
186 | return username
187 | else:
188 | return None
189 |
--------------------------------------------------------------------------------
/LICENSE:
--------------------------------------------------------------------------------
1 | GNU LESSER GENERAL PUBLIC LICENSE
2 | Version 2.1, February 1999
3 |
4 | Copyright (C) 1991, 1999 Free Software Foundation, Inc.
5 | 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA
6 | Everyone is permitted to copy and distribute verbatim copies
7 | of this license document, but changing it is not allowed.
8 |
9 | [This is the first released version of the Lesser GPL. It also counts
10 | as the successor of the GNU Library Public License, version 2, hence
11 | the version number 2.1.]
12 |
13 | Preamble
14 |
15 | The licenses for most software are designed to take away your
16 | freedom to share and change it. By contrast, the GNU General Public
17 | Licenses are intended to guarantee your freedom to share and change
18 | free software--to make sure the software is free for all its users.
19 |
20 | This license, the Lesser General Public License, applies to some
21 | specially designated software packages--typically libraries--of the
22 | Free Software Foundation and other authors who decide to use it. You
23 | can use it too, but we suggest you first think carefully about whether
24 | this license or the ordinary General Public License is the better
25 | strategy to use in any particular case, based on the explanations below.
26 |
27 | When we speak of free software, we are referring to freedom of use,
28 | not price. Our General Public Licenses are designed to make sure that
29 | you have the freedom to distribute copies of free software (and charge
30 | for this service if you wish); that you receive source code or can get
31 | it if you want it; that you can change the software and use pieces of
32 | it in new free programs; and that you are informed that you can do
33 | these things.
34 |
35 | To protect your rights, we need to make restrictions that forbid
36 | distributors to deny you these rights or to ask you to surrender these
37 | rights. These restrictions translate to certain responsibilities for
38 | you if you distribute copies of the library or if you modify it.
39 |
40 | For example, if you distribute copies of the library, whether gratis
41 | or for a fee, you must give the recipients all the rights that we gave
42 | you. You must make sure that they, too, receive or can get the source
43 | code. If you link other code with the library, you must provide
44 | complete object files to the recipients, so that they can relink them
45 | with the library after making changes to the library and recompiling
46 | it. And you must show them these terms so they know their rights.
47 |
48 | We protect your rights with a two-step method: (1) we copyright the
49 | library, and (2) we offer you this license, which gives you legal
50 | permission to copy, distribute and/or modify the library.
51 |
52 | To protect each distributor, we want to make it very clear that
53 | there is no warranty for the free library. Also, if the library is
54 | modified by someone else and passed on, the recipients should know
55 | that what they have is not the original version, so that the original
56 | author's reputation will not be affected by problems that might be
57 | introduced by others.
58 |
59 | Finally, software patents pose a constant threat to the existence of
60 | any free program. We wish to make sure that a company cannot
61 | effectively restrict the users of a free program by obtaining a
62 | restrictive license from a patent holder. Therefore, we insist that
63 | any patent license obtained for a version of the library must be
64 | consistent with the full freedom of use specified in this license.
65 |
66 | Most GNU software, including some libraries, is covered by the
67 | ordinary GNU General Public License. This license, the GNU Lesser
68 | General Public License, applies to certain designated libraries, and
69 | is quite different from the ordinary General Public License. We use
70 | this license for certain libraries in order to permit linking those
71 | libraries into non-free programs.
72 |
73 | When a program is linked with a library, whether statically or using
74 | a shared library, the combination of the two is legally speaking a
75 | combined work, a derivative of the original library. The ordinary
76 | General Public License therefore permits such linking only if the
77 | entire combination fits its criteria of freedom. The Lesser General
78 | Public License permits more lax criteria for linking other code with
79 | the library.
80 |
81 | We call this license the "Lesser" General Public License because it
82 | does Less to protect the user's freedom than the ordinary General
83 | Public License. It also provides other free software developers Less
84 | of an advantage over competing non-free programs. These disadvantages
85 | are the reason we use the ordinary General Public License for many
86 | libraries. However, the Lesser license provides advantages in certain
87 | special circumstances.
88 |
89 | For example, on rare occasions, there may be a special need to
90 | encourage the widest possible use of a certain library, so that it becomes
91 | a de-facto standard. To achieve this, non-free programs must be
92 | allowed to use the library. A more frequent case is that a free
93 | library does the same job as widely used non-free libraries. In this
94 | case, there is little to gain by limiting the free library to free
95 | software only, so we use the Lesser General Public License.
96 |
97 | In other cases, permission to use a particular library in non-free
98 | programs enables a greater number of people to use a large body of
99 | free software. For example, permission to use the GNU C Library in
100 | non-free programs enables many more people to use the whole GNU
101 | operating system, as well as its variant, the GNU/Linux operating
102 | system.
103 |
104 | Although the Lesser General Public License is Less protective of the
105 | users' freedom, it does ensure that the user of a program that is
106 | linked with the Library has the freedom and the wherewithal to run
107 | that program using a modified version of the Library.
108 |
109 | The precise terms and conditions for copying, distribution and
110 | modification follow. Pay close attention to the difference between a
111 | "work based on the library" and a "work that uses the library". The
112 | former contains code derived from the library, whereas the latter must
113 | be combined with the library in order to run.
114 |
115 | GNU LESSER GENERAL PUBLIC LICENSE
116 | TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION
117 |
118 | 0. This License Agreement applies to any software library or other
119 | program which contains a notice placed by the copyright holder or
120 | other authorized party saying it may be distributed under the terms of
121 | this Lesser General Public License (also called "this License").
122 | Each licensee is addressed as "you".
123 |
124 | A "library" means a collection of software functions and/or data
125 | prepared so as to be conveniently linked with application programs
126 | (which use some of those functions and data) to form executables.
127 |
128 | The "Library", below, refers to any such software library or work
129 | which has been distributed under these terms. A "work based on the
130 | Library" means either the Library or any derivative work under
131 | copyright law: that is to say, a work containing the Library or a
132 | portion of it, either verbatim or with modifications and/or translated
133 | straightforwardly into another language. (Hereinafter, translation is
134 | included without limitation in the term "modification".)
135 |
136 | "Source code" for a work means the preferred form of the work for
137 | making modifications to it. For a library, complete source code means
138 | all the source code for all modules it contains, plus any associated
139 | interface definition files, plus the scripts used to control compilation
140 | and installation of the library.
141 |
142 | Activities other than copying, distribution and modification are not
143 | covered by this License; they are outside its scope. The act of
144 | running a program using the Library is not restricted, and output from
145 | such a program is covered only if its contents constitute a work based
146 | on the Library (independent of the use of the Library in a tool for
147 | writing it). Whether that is true depends on what the Library does
148 | and what the program that uses the Library does.
149 |
150 | 1. You may copy and distribute verbatim copies of the Library's
151 | complete source code as you receive it, in any medium, provided that
152 | you conspicuously and appropriately publish on each copy an
153 | appropriate copyright notice and disclaimer of warranty; keep intact
154 | all the notices that refer to this License and to the absence of any
155 | warranty; and distribute a copy of this License along with the
156 | Library.
157 |
158 | You may charge a fee for the physical act of transferring a copy,
159 | and you may at your option offer warranty protection in exchange for a
160 | fee.
161 |
162 | 2. You may modify your copy or copies of the Library or any portion
163 | of it, thus forming a work based on the Library, and copy and
164 | distribute such modifications or work under the terms of Section 1
165 | above, provided that you also meet all of these conditions:
166 |
167 | a) The modified work must itself be a software library.
168 |
169 | b) You must cause the files modified to carry prominent notices
170 | stating that you changed the files and the date of any change.
171 |
172 | c) You must cause the whole of the work to be licensed at no
173 | charge to all third parties under the terms of this License.
174 |
175 | d) If a facility in the modified Library refers to a function or a
176 | table of data to be supplied by an application program that uses
177 | the facility, other than as an argument passed when the facility
178 | is invoked, then you must make a good faith effort to ensure that,
179 | in the event an application does not supply such function or
180 | table, the facility still operates, and performs whatever part of
181 | its purpose remains meaningful.
182 |
183 | (For example, a function in a library to compute square roots has
184 | a purpose that is entirely well-defined independent of the
185 | application. Therefore, Subsection 2d requires that any
186 | application-supplied function or table used by this function must
187 | be optional: if the application does not supply it, the square
188 | root function must still compute square roots.)
189 |
190 | These requirements apply to the modified work as a whole. If
191 | identifiable sections of that work are not derived from the Library,
192 | and can be reasonably considered independent and separate works in
193 | themselves, then this License, and its terms, do not apply to those
194 | sections when you distribute them as separate works. But when you
195 | distribute the same sections as part of a whole which is a work based
196 | on the Library, the distribution of the whole must be on the terms of
197 | this License, whose permissions for other licensees extend to the
198 | entire whole, and thus to each and every part regardless of who wrote
199 | it.
200 |
201 | Thus, it is not the intent of this section to claim rights or contest
202 | your rights to work written entirely by you; rather, the intent is to
203 | exercise the right to control the distribution of derivative or
204 | collective works based on the Library.
205 |
206 | In addition, mere aggregation of another work not based on the Library
207 | with the Library (or with a work based on the Library) on a volume of
208 | a storage or distribution medium does not bring the other work under
209 | the scope of this License.
210 |
211 | 3. You may opt to apply the terms of the ordinary GNU General Public
212 | License instead of this License to a given copy of the Library. To do
213 | this, you must alter all the notices that refer to this License, so
214 | that they refer to the ordinary GNU General Public License, version 2,
215 | instead of to this License. (If a newer version than version 2 of the
216 | ordinary GNU General Public License has appeared, then you can specify
217 | that version instead if you wish.) Do not make any other change in
218 | these notices.
219 |
220 | Once this change is made in a given copy, it is irreversible for
221 | that copy, so the ordinary GNU General Public License applies to all
222 | subsequent copies and derivative works made from that copy.
223 |
224 | This option is useful when you wish to copy part of the code of
225 | the Library into a program that is not a library.
226 |
227 | 4. You may copy and distribute the Library (or a portion or
228 | derivative of it, under Section 2) in object code or executable form
229 | under the terms of Sections 1 and 2 above provided that you accompany
230 | it with the complete corresponding machine-readable source code, which
231 | must be distributed under the terms of Sections 1 and 2 above on a
232 | medium customarily used for software interchange.
233 |
234 | If distribution of object code is made by offering access to copy
235 | from a designated place, then offering equivalent access to copy the
236 | source code from the same place satisfies the requirement to
237 | distribute the source code, even though third parties are not
238 | compelled to copy the source along with the object code.
239 |
240 | 5. A program that contains no derivative of any portion of the
241 | Library, but is designed to work with the Library by being compiled or
242 | linked with it, is called a "work that uses the Library". Such a
243 | work, in isolation, is not a derivative work of the Library, and
244 | therefore falls outside the scope of this License.
245 |
246 | However, linking a "work that uses the Library" with the Library
247 | creates an executable that is a derivative of the Library (because it
248 | contains portions of the Library), rather than a "work that uses the
249 | library". The executable is therefore covered by this License.
250 | Section 6 states terms for distribution of such executables.
251 |
252 | When a "work that uses the Library" uses material from a header file
253 | that is part of the Library, the object code for the work may be a
254 | derivative work of the Library even though the source code is not.
255 | Whether this is true is especially significant if the work can be
256 | linked without the Library, or if the work is itself a library. The
257 | threshold for this to be true is not precisely defined by law.
258 |
259 | If such an object file uses only numerical parameters, data
260 | structure layouts and accessors, and small macros and small inline
261 | functions (ten lines or less in length), then the use of the object
262 | file is unrestricted, regardless of whether it is legally a derivative
263 | work. (Executables containing this object code plus portions of the
264 | Library will still fall under Section 6.)
265 |
266 | Otherwise, if the work is a derivative of the Library, you may
267 | distribute the object code for the work under the terms of Section 6.
268 | Any executables containing that work also fall under Section 6,
269 | whether or not they are linked directly with the Library itself.
270 |
271 | 6. As an exception to the Sections above, you may also combine or
272 | link a "work that uses the Library" with the Library to produce a
273 | work containing portions of the Library, and distribute that work
274 | under terms of your choice, provided that the terms permit
275 | modification of the work for the customer's own use and reverse
276 | engineering for debugging such modifications.
277 |
278 | You must give prominent notice with each copy of the work that the
279 | Library is used in it and that the Library and its use are covered by
280 | this License. You must supply a copy of this License. If the work
281 | during execution displays copyright notices, you must include the
282 | copyright notice for the Library among them, as well as a reference
283 | directing the user to the copy of this License. Also, you must do one
284 | of these things:
285 |
286 | a) Accompany the work with the complete corresponding
287 | machine-readable source code for the Library including whatever
288 | changes were used in the work (which must be distributed under
289 | Sections 1 and 2 above); and, if the work is an executable linked
290 | with the Library, with the complete machine-readable "work that
291 | uses the Library", as object code and/or source code, so that the
292 | user can modify the Library and then relink to produce a modified
293 | executable containing the modified Library. (It is understood
294 | that the user who changes the contents of definitions files in the
295 | Library will not necessarily be able to recompile the application
296 | to use the modified definitions.)
297 |
298 | b) Use a suitable shared library mechanism for linking with the
299 | Library. A suitable mechanism is one that (1) uses at run time a
300 | copy of the library already present on the user's computer system,
301 | rather than copying library functions into the executable, and (2)
302 | will operate properly with a modified version of the library, if
303 | the user installs one, as long as the modified version is
304 | interface-compatible with the version that the work was made with.
305 |
306 | c) Accompany the work with a written offer, valid for at
307 | least three years, to give the same user the materials
308 | specified in Subsection 6a, above, for a charge no more
309 | than the cost of performing this distribution.
310 |
311 | d) If distribution of the work is made by offering access to copy
312 | from a designated place, offer equivalent access to copy the above
313 | specified materials from the same place.
314 |
315 | e) Verify that the user has already received a copy of these
316 | materials or that you have already sent this user a copy.
317 |
318 | For an executable, the required form of the "work that uses the
319 | Library" must include any data and utility programs needed for
320 | reproducing the executable from it. However, as a special exception,
321 | the materials to be distributed need not include anything that is
322 | normally distributed (in either source or binary form) with the major
323 | components (compiler, kernel, and so on) of the operating system on
324 | which the executable runs, unless that component itself accompanies
325 | the executable.
326 |
327 | It may happen that this requirement contradicts the license
328 | restrictions of other proprietary libraries that do not normally
329 | accompany the operating system. Such a contradiction means you cannot
330 | use both them and the Library together in an executable that you
331 | distribute.
332 |
333 | 7. You may place library facilities that are a work based on the
334 | Library side-by-side in a single library together with other library
335 | facilities not covered by this License, and distribute such a combined
336 | library, provided that the separate distribution of the work based on
337 | the Library and of the other library facilities is otherwise
338 | permitted, and provided that you do these two things:
339 |
340 | a) Accompany the combined library with a copy of the same work
341 | based on the Library, uncombined with any other library
342 | facilities. This must be distributed under the terms of the
343 | Sections above.
344 |
345 | b) Give prominent notice with the combined library of the fact
346 | that part of it is a work based on the Library, and explaining
347 | where to find the accompanying uncombined form of the same work.
348 |
349 | 8. You may not copy, modify, sublicense, link with, or distribute
350 | the Library except as expressly provided under this License. Any
351 | attempt otherwise to copy, modify, sublicense, link with, or
352 | distribute the Library is void, and will automatically terminate your
353 | rights under this License. However, parties who have received copies,
354 | or rights, from you under this License will not have their licenses
355 | terminated so long as such parties remain in full compliance.
356 |
357 | 9. You are not required to accept this License, since you have not
358 | signed it. However, nothing else grants you permission to modify or
359 | distribute the Library or its derivative works. These actions are
360 | prohibited by law if you do not accept this License. Therefore, by
361 | modifying or distributing the Library (or any work based on the
362 | Library), you indicate your acceptance of this License to do so, and
363 | all its terms and conditions for copying, distributing or modifying
364 | the Library or works based on it.
365 |
366 | 10. Each time you redistribute the Library (or any work based on the
367 | Library), the recipient automatically receives a license from the
368 | original licensor to copy, distribute, link with or modify the Library
369 | subject to these terms and conditions. You may not impose any further
370 | restrictions on the recipients' exercise of the rights granted herein.
371 | You are not responsible for enforcing compliance by third parties with
372 | this License.
373 |
374 | 11. If, as a consequence of a court judgment or allegation of patent
375 | infringement or for any other reason (not limited to patent issues),
376 | conditions are imposed on you (whether by court order, agreement or
377 | otherwise) that contradict the conditions of this License, they do not
378 | excuse you from the conditions of this License. If you cannot
379 | distribute so as to satisfy simultaneously your obligations under this
380 | License and any other pertinent obligations, then as a consequence you
381 | may not distribute the Library at all. For example, if a patent
382 | license would not permit royalty-free redistribution of the Library by
383 | all those who receive copies directly or indirectly through you, then
384 | the only way you could satisfy both it and this License would be to
385 | refrain entirely from distribution of the Library.
386 |
387 | If any portion of this section is held invalid or unenforceable under any
388 | particular circumstance, the balance of the section is intended to apply,
389 | and the section as a whole is intended to apply in other circumstances.
390 |
391 | It is not the purpose of this section to induce you to infringe any
392 | patents or other property right claims or to contest validity of any
393 | such claims; this section has the sole purpose of protecting the
394 | integrity of the free software distribution system which is
395 | implemented by public license practices. Many people have made
396 | generous contributions to the wide range of software distributed
397 | through that system in reliance on consistent application of that
398 | system; it is up to the author/donor to decide if he or she is willing
399 | to distribute software through any other system and a licensee cannot
400 | impose that choice.
401 |
402 | This section is intended to make thoroughly clear what is believed to
403 | be a consequence of the rest of this License.
404 |
405 | 12. If the distribution and/or use of the Library is restricted in
406 | certain countries either by patents or by copyrighted interfaces, the
407 | original copyright holder who places the Library under this License may add
408 | an explicit geographical distribution limitation excluding those countries,
409 | so that distribution is permitted only in or among countries not thus
410 | excluded. In such case, this License incorporates the limitation as if
411 | written in the body of this License.
412 |
413 | 13. The Free Software Foundation may publish revised and/or new
414 | versions of the Lesser General Public License from time to time.
415 | Such new versions will be similar in spirit to the present version,
416 | but may differ in detail to address new problems or concerns.
417 |
418 | Each version is given a distinguishing version number. If the Library
419 | specifies a version number of this License which applies to it and
420 | "any later version", you have the option of following the terms and
421 | conditions either of that version or of any later version published by
422 | the Free Software Foundation. If the Library does not specify a
423 | license version number, you may choose any version ever published by
424 | the Free Software Foundation.
425 |
426 | 14. If you wish to incorporate parts of the Library into other free
427 | programs whose distribution conditions are incompatible with these,
428 | write to the author to ask for permission. For software which is
429 | copyrighted by the Free Software Foundation, write to the Free
430 | Software Foundation; we sometimes make exceptions for this. Our
431 | decision will be guided by the two goals of preserving the free status
432 | of all derivatives of our free software and of promoting the sharing
433 | and reuse of software generally.
434 |
435 | NO WARRANTY
436 |
437 | 15. BECAUSE THE LIBRARY IS LICENSED FREE OF CHARGE, THERE IS NO
438 | WARRANTY FOR THE LIBRARY, TO THE EXTENT PERMITTED BY APPLICABLE LAW.
439 | EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR
440 | OTHER PARTIES PROVIDE THE LIBRARY "AS IS" WITHOUT WARRANTY OF ANY
441 | KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE
442 | IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
443 | PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE
444 | LIBRARY IS WITH YOU. SHOULD THE LIBRARY PROVE DEFECTIVE, YOU ASSUME
445 | THE COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION.
446 |
447 | 16. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN
448 | WRITING WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY
449 | AND/OR REDISTRIBUTE THE LIBRARY AS PERMITTED ABOVE, BE LIABLE TO YOU
450 | FOR DAMAGES, INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR
451 | CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THE
452 | LIBRARY (INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING
453 | RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A
454 | FAILURE OF THE LIBRARY TO OPERATE WITH ANY OTHER SOFTWARE), EVEN IF
455 | SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH
456 | DAMAGES.
457 |
458 | END OF TERMS AND CONDITIONS
459 |
460 | How to Apply These Terms to Your New Libraries
461 |
462 | If you develop a new library, and you want it to be of the greatest
463 | possible use to the public, we recommend making it free software that
464 | everyone can redistribute and change. You can do so by permitting
465 | redistribution under these terms (or, alternatively, under the terms of the
466 | ordinary General Public License).
467 |
468 | To apply these terms, attach the following notices to the library. It is
469 | safest to attach them to the start of each source file to most effectively
470 | convey the exclusion of warranty; and each file should have at least the
471 | "copyright" line and a pointer to where the full notice is found.
472 |
473 |
474 | Copyright (C)
475 |
476 | This library is free software; you can redistribute it and/or
477 | modify it under the terms of the GNU Lesser General Public
478 | License as published by the Free Software Foundation; either
479 | version 2.1 of the License, or (at your option) any later version.
480 |
481 | This library is distributed in the hope that it will be useful,
482 | but WITHOUT ANY WARRANTY; without even the implied warranty of
483 | MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
484 | Lesser General Public License for more details.
485 |
486 | You should have received a copy of the GNU Lesser General Public
487 | License along with this library; if not, write to the Free Software
488 | Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301
489 | USA
490 |
491 | Also add information on how to contact you by electronic and paper mail.
492 |
493 | You should also get your employer (if you work as a programmer) or your
494 | school, if any, to sign a "copyright disclaimer" for the library, if
495 | necessary. Here is a sample; alter the names:
496 |
497 | Yoyodyne, Inc., hereby disclaims all copyright interest in the
498 | library `Frob' (a library for tweaking knobs) written by James Random
499 | Hacker.
500 |
501 | , 1 April 1990
502 | Ty Coon, President of Vice
503 |
504 | That's all there is to it!
505 |
--------------------------------------------------------------------------------