Merge lp:~vds/usso/better_interface into lp:usso
- better_interface
- Merge into trunk
Proposed by
Vincenzo Di Somma
Status: | Superseded |
---|---|
Proposed branch: | lp:~vds/usso/better_interface |
Merge into: | lp:usso |
Diff against target: |
2128 lines (+1240/-741) 10 files modified
COPYING (+674/-0) COPYING.LESSER (+165/-0) LICENSE (+0/-683) example/usso_example.go (+41/-7) oauth.go (+127/-0) oauth_test.go (+52/-0) url.go (+41/-0) url_test.go (+84/-0) usso.go (+48/-28) usso_test.go (+8/-23) |
To merge this branch: | bzr merge lp:~vds/usso/better_interface |
Related bugs: |
Reviewer | Review Type | Date Requested | Status |
---|---|---|---|
The Go Launchpad Team | Pending | ||
Review via email: mp+144980@code.launchpad.net |
This proposal has been superseded by a proposal from 2013-01-28.
Commit message
Description of the change
Refactoring the interface and handling errors a little better. There are no unit tests for the main interface, but the example shows that they work as expected. Tests will be added in a following branch, if we decide to spend more time on this project.
To post a comment you must log in.
lp:~vds/usso/better_interface
updated
- 18. By Vincenzo Di Somma
-
Fixing comments and little code style.
- 19. By Vincenzo Di Somma
-
Commented tests.
- 20. By Vincenzo Di Somma
-
Commented tests in a more reasonable way thanks to gmb.
Unmerged revisions
Preview Diff
[H/L] Next/Prev Comment, [J/K] Next/Prev File, [N/P] Next/Prev Hunk
1 | === added file 'COPYING' |
2 | --- COPYING 1970-01-01 00:00:00 +0000 |
3 | +++ COPYING 2013-01-25 16:44:31 +0000 |
4 | @@ -0,0 +1,674 @@ |
5 | + GNU GENERAL PUBLIC LICENSE |
6 | + Version 3, 29 June 2007 |
7 | + |
8 | + Copyright (C) 2007 Free Software Foundation, Inc. <http://fsf.org/> |
9 | + Everyone is permitted to copy and distribute verbatim copies |
10 | + of this license document, but changing it is not allowed. |
11 | + |
12 | + Preamble |
13 | + |
14 | + The GNU General Public License is a free, copyleft license for |
15 | +software and other kinds of works. |
16 | + |
17 | + The licenses for most software and other practical works are designed |
18 | +to take away your freedom to share and change the works. By contrast, |
19 | +the GNU General Public License is intended to guarantee your freedom to |
20 | +share and change all versions of a program--to make sure it remains free |
21 | +software for all its users. We, the Free Software Foundation, use the |
22 | +GNU General Public License for most of our software; it applies also to |
23 | +any other work released this way by its authors. You can apply it to |
24 | +your programs, too. |
25 | + |
26 | + When we speak of free software, we are referring to freedom, not |
27 | +price. Our General Public Licenses are designed to make sure that you |
28 | +have the freedom to distribute copies of free software (and charge for |
29 | +them if you wish), that you receive source code or can get it if you |
30 | +want it, that you can change the software or use pieces of it in new |
31 | +free programs, and that you know you can do these things. |
32 | + |
33 | + To protect your rights, we need to prevent others from denying you |
34 | +these rights or asking you to surrender the rights. Therefore, you have |
35 | +certain responsibilities if you distribute copies of the software, or if |
36 | +you modify it: responsibilities to respect the freedom of others. |
37 | + |
38 | + For example, if you distribute copies of such a program, whether |
39 | +gratis or for a fee, you must pass on to the recipients the same |
40 | +freedoms that you received. You must make sure that they, too, receive |
41 | +or can get the source code. And you must show them these terms so they |
42 | +know their rights. |
43 | + |
44 | + Developers that use the GNU GPL protect your rights with two steps: |
45 | +(1) assert copyright on the software, and (2) offer you this License |
46 | +giving you legal permission to copy, distribute and/or modify it. |
47 | + |
48 | + For the developers' and authors' protection, the GPL clearly explains |
49 | +that there is no warranty for this free software. For both users' and |
50 | +authors' sake, the GPL requires that modified versions be marked as |
51 | +changed, so that their problems will not be attributed erroneously to |
52 | +authors of previous versions. |
53 | + |
54 | + Some devices are designed to deny users access to install or run |
55 | +modified versions of the software inside them, although the manufacturer |
56 | +can do so. This is fundamentally incompatible with the aim of |
57 | +protecting users' freedom to change the software. The systematic |
58 | +pattern of such abuse occurs in the area of products for individuals to |
59 | +use, which is precisely where it is most unacceptable. Therefore, we |
60 | +have designed this version of the GPL to prohibit the practice for those |
61 | +products. If such problems arise substantially in other domains, we |
62 | +stand ready to extend this provision to those domains in future versions |
63 | +of the GPL, as needed to protect the freedom of users. |
64 | + |
65 | + Finally, every program is threatened constantly by software patents. |
66 | +States should not allow patents to restrict development and use of |
67 | +software on general-purpose computers, but in those that do, we wish to |
68 | +avoid the special danger that patents applied to a free program could |
69 | +make it effectively proprietary. To prevent this, the GPL assures that |
70 | +patents cannot be used to render the program non-free. |
71 | + |
72 | + The precise terms and conditions for copying, distribution and |
73 | +modification follow. |
74 | + |
75 | + TERMS AND CONDITIONS |
76 | + |
77 | + 0. Definitions. |
78 | + |
79 | + "This License" refers to version 3 of the GNU General Public License. |
80 | + |
81 | + "Copyright" also means copyright-like laws that apply to other kinds of |
82 | +works, such as semiconductor masks. |
83 | + |
84 | + "The Program" refers to any copyrightable work licensed under this |
85 | +License. Each licensee is addressed as "you". "Licensees" and |
86 | +"recipients" may be individuals or organizations. |
87 | + |
88 | + To "modify" a work means to copy from or adapt all or part of the work |
89 | +in a fashion requiring copyright permission, other than the making of an |
90 | +exact copy. The resulting work is called a "modified version" of the |
91 | +earlier work or a work "based on" the earlier work. |
92 | + |
93 | + A "covered work" means either the unmodified Program or a work based |
94 | +on the Program. |
95 | + |
96 | + To "propagate" a work means to do anything with it that, without |
97 | +permission, would make you directly or secondarily liable for |
98 | +infringement under applicable copyright law, except executing it on a |
99 | +computer or modifying a private copy. Propagation includes copying, |
100 | +distribution (with or without modification), making available to the |
101 | +public, and in some countries other activities as well. |
102 | + |
103 | + To "convey" a work means any kind of propagation that enables other |
104 | +parties to make or receive copies. Mere interaction with a user through |
105 | +a computer network, with no transfer of a copy, is not conveying. |
106 | + |
107 | + An interactive user interface displays "Appropriate Legal Notices" |
108 | +to the extent that it includes a convenient and prominently visible |
109 | +feature that (1) displays an appropriate copyright notice, and (2) |
110 | +tells the user that there is no warranty for the work (except to the |
111 | +extent that warranties are provided), that licensees may convey the |
112 | +work under this License, and how to view a copy of this License. If |
113 | +the interface presents a list of user commands or options, such as a |
114 | +menu, a prominent item in the list meets this criterion. |
115 | + |
116 | + 1. Source Code. |
117 | + |
118 | + The "source code" for a work means the preferred form of the work |
119 | +for making modifications to it. "Object code" means any non-source |
120 | +form of a work. |
121 | + |
122 | + A "Standard Interface" means an interface that either is an official |
123 | +standard defined by a recognized standards body, or, in the case of |
124 | +interfaces specified for a particular programming language, one that |
125 | +is widely used among developers working in that language. |
126 | + |
127 | + The "System Libraries" of an executable work include anything, other |
128 | +than the work as a whole, that (a) is included in the normal form of |
129 | +packaging a Major Component, but which is not part of that Major |
130 | +Component, and (b) serves only to enable use of the work with that |
131 | +Major Component, or to implement a Standard Interface for which an |
132 | +implementation is available to the public in source code form. A |
133 | +"Major Component", in this context, means a major essential component |
134 | +(kernel, window system, and so on) of the specific operating system |
135 | +(if any) on which the executable work runs, or a compiler used to |
136 | +produce the work, or an object code interpreter used to run it. |
137 | + |
138 | + The "Corresponding Source" for a work in object code form means all |
139 | +the source code needed to generate, install, and (for an executable |
140 | +work) run the object code and to modify the work, including scripts to |
141 | +control those activities. However, it does not include the work's |
142 | +System Libraries, or general-purpose tools or generally available free |
143 | +programs which are used unmodified in performing those activities but |
144 | +which are not part of the work. For example, Corresponding Source |
145 | +includes interface definition files associated with source files for |
146 | +the work, and the source code for shared libraries and dynamically |
147 | +linked subprograms that the work is specifically designed to require, |
148 | +such as by intimate data communication or control flow between those |
149 | +subprograms and other parts of the work. |
150 | + |
151 | + The Corresponding Source need not include anything that users |
152 | +can regenerate automatically from other parts of the Corresponding |
153 | +Source. |
154 | + |
155 | + The Corresponding Source for a work in source code form is that |
156 | +same work. |
157 | + |
158 | + 2. Basic Permissions. |
159 | + |
160 | + All rights granted under this License are granted for the term of |
161 | +copyright on the Program, and are irrevocable provided the stated |
162 | +conditions are met. This License explicitly affirms your unlimited |
163 | +permission to run the unmodified Program. The output from running a |
164 | +covered work is covered by this License only if the output, given its |
165 | +content, constitutes a covered work. This License acknowledges your |
166 | +rights of fair use or other equivalent, as provided by copyright law. |
167 | + |
168 | + You may make, run and propagate covered works that you do not |
169 | +convey, without conditions so long as your license otherwise remains |
170 | +in force. You may convey covered works to others for the sole purpose |
171 | +of having them make modifications exclusively for you, or provide you |
172 | +with facilities for running those works, provided that you comply with |
173 | +the terms of this License in conveying all material for which you do |
174 | +not control copyright. Those thus making or running the covered works |
175 | +for you must do so exclusively on your behalf, under your direction |
176 | +and control, on terms that prohibit them from making any copies of |
177 | +your copyrighted material outside their relationship with you. |
178 | + |
179 | + Conveying under any other circumstances is permitted solely under |
180 | +the conditions stated below. Sublicensing is not allowed; section 10 |
181 | +makes it unnecessary. |
182 | + |
183 | + 3. Protecting Users' Legal Rights From Anti-Circumvention Law. |
184 | + |
185 | + No covered work shall be deemed part of an effective technological |
186 | +measure under any applicable law fulfilling obligations under article |
187 | +11 of the WIPO copyright treaty adopted on 20 December 1996, or |
188 | +similar laws prohibiting or restricting circumvention of such |
189 | +measures. |
190 | + |
191 | + When you convey a covered work, you waive any legal power to forbid |
192 | +circumvention of technological measures to the extent such circumvention |
193 | +is effected by exercising rights under this License with respect to |
194 | +the covered work, and you disclaim any intention to limit operation or |
195 | +modification of the work as a means of enforcing, against the work's |
196 | +users, your or third parties' legal rights to forbid circumvention of |
197 | +technological measures. |
198 | + |
199 | + 4. Conveying Verbatim Copies. |
200 | + |
201 | + You may convey verbatim copies of the Program's source code as you |
202 | +receive it, in any medium, provided that you conspicuously and |
203 | +appropriately publish on each copy an appropriate copyright notice; |
204 | +keep intact all notices stating that this License and any |
205 | +non-permissive terms added in accord with section 7 apply to the code; |
206 | +keep intact all notices of the absence of any warranty; and give all |
207 | +recipients a copy of this License along with the Program. |
208 | + |
209 | + You may charge any price or no price for each copy that you convey, |
210 | +and you may offer support or warranty protection for a fee. |
211 | + |
212 | + 5. Conveying Modified Source Versions. |
213 | + |
214 | + You may convey a work based on the Program, or the modifications to |
215 | +produce it from the Program, in the form of source code under the |
216 | +terms of section 4, provided that you also meet all of these conditions: |
217 | + |
218 | + a) The work must carry prominent notices stating that you modified |
219 | + it, and giving a relevant date. |
220 | + |
221 | + b) The work must carry prominent notices stating that it is |
222 | + released under this License and any conditions added under section |
223 | + 7. This requirement modifies the requirement in section 4 to |
224 | + "keep intact all notices". |
225 | + |
226 | + c) You must license the entire work, as a whole, under this |
227 | + License to anyone who comes into possession of a copy. This |
228 | + License will therefore apply, along with any applicable section 7 |
229 | + additional terms, to the whole of the work, and all its parts, |
230 | + regardless of how they are packaged. This License gives no |
231 | + permission to license the work in any other way, but it does not |
232 | + invalidate such permission if you have separately received it. |
233 | + |
234 | + d) If the work has interactive user interfaces, each must display |
235 | + Appropriate Legal Notices; however, if the Program has interactive |
236 | + interfaces that do not display Appropriate Legal Notices, your |
237 | + work need not make them do so. |
238 | + |
239 | + A compilation of a covered work with other separate and independent |
240 | +works, which are not by their nature extensions of the covered work, |
241 | +and which are not combined with it such as to form a larger program, |
242 | +in or on a volume of a storage or distribution medium, is called an |
243 | +"aggregate" if the compilation and its resulting copyright are not |
244 | +used to limit the access or legal rights of the compilation's users |
245 | +beyond what the individual works permit. Inclusion of a covered work |
246 | +in an aggregate does not cause this License to apply to the other |
247 | +parts of the aggregate. |
248 | + |
249 | + 6. Conveying Non-Source Forms. |
250 | + |
251 | + You may convey a covered work in object code form under the terms |
252 | +of sections 4 and 5, provided that you also convey the |
253 | +machine-readable Corresponding Source under the terms of this License, |
254 | +in one of these ways: |
255 | + |
256 | + a) Convey the object code in, or embodied in, a physical product |
257 | + (including a physical distribution medium), accompanied by the |
258 | + Corresponding Source fixed on a durable physical medium |
259 | + customarily used for software interchange. |
260 | + |
261 | + b) Convey the object code in, or embodied in, a physical product |
262 | + (including a physical distribution medium), accompanied by a |
263 | + written offer, valid for at least three years and valid for as |
264 | + long as you offer spare parts or customer support for that product |
265 | + model, to give anyone who possesses the object code either (1) a |
266 | + copy of the Corresponding Source for all the software in the |
267 | + product that is covered by this License, on a durable physical |
268 | + medium customarily used for software interchange, for a price no |
269 | + more than your reasonable cost of physically performing this |
270 | + conveying of source, or (2) access to copy the |
271 | + Corresponding Source from a network server at no charge. |
272 | + |
273 | + c) Convey individual copies of the object code with a copy of the |
274 | + written offer to provide the Corresponding Source. This |
275 | + alternative is allowed only occasionally and noncommercially, and |
276 | + only if you received the object code with such an offer, in accord |
277 | + with subsection 6b. |
278 | + |
279 | + d) Convey the object code by offering access from a designated |
280 | + place (gratis or for a charge), and offer equivalent access to the |
281 | + Corresponding Source in the same way through the same place at no |
282 | + further charge. You need not require recipients to copy the |
283 | + Corresponding Source along with the object code. If the place to |
284 | + copy the object code is a network server, the Corresponding Source |
285 | + may be on a different server (operated by you or a third party) |
286 | + that supports equivalent copying facilities, provided you maintain |
287 | + clear directions next to the object code saying where to find the |
288 | + Corresponding Source. Regardless of what server hosts the |
289 | + Corresponding Source, you remain obligated to ensure that it is |
290 | + available for as long as needed to satisfy these requirements. |
291 | + |
292 | + e) Convey the object code using peer-to-peer transmission, provided |
293 | + you inform other peers where the object code and Corresponding |
294 | + Source of the work are being offered to the general public at no |
295 | + charge under subsection 6d. |
296 | + |
297 | + A separable portion of the object code, whose source code is excluded |
298 | +from the Corresponding Source as a System Library, need not be |
299 | +included in conveying the object code work. |
300 | + |
301 | + A "User Product" is either (1) a "consumer product", which means any |
302 | +tangible personal property which is normally used for personal, family, |
303 | +or household purposes, or (2) anything designed or sold for incorporation |
304 | +into a dwelling. In determining whether a product is a consumer product, |
305 | +doubtful cases shall be resolved in favor of coverage. For a particular |
306 | +product received by a particular user, "normally used" refers to a |
307 | +typical or common use of that class of product, regardless of the status |
308 | +of the particular user or of the way in which the particular user |
309 | +actually uses, or expects or is expected to use, the product. A product |
310 | +is a consumer product regardless of whether the product has substantial |
311 | +commercial, industrial or non-consumer uses, unless such uses represent |
312 | +the only significant mode of use of the product. |
313 | + |
314 | + "Installation Information" for a User Product means any methods, |
315 | +procedures, authorization keys, or other information required to install |
316 | +and execute modified versions of a covered work in that User Product from |
317 | +a modified version of its Corresponding Source. The information must |
318 | +suffice to ensure that the continued functioning of the modified object |
319 | +code is in no case prevented or interfered with solely because |
320 | +modification has been made. |
321 | + |
322 | + If you convey an object code work under this section in, or with, or |
323 | +specifically for use in, a User Product, and the conveying occurs as |
324 | +part of a transaction in which the right of possession and use of the |
325 | +User Product is transferred to the recipient in perpetuity or for a |
326 | +fixed term (regardless of how the transaction is characterized), the |
327 | +Corresponding Source conveyed under this section must be accompanied |
328 | +by the Installation Information. But this requirement does not apply |
329 | +if neither you nor any third party retains the ability to install |
330 | +modified object code on the User Product (for example, the work has |
331 | +been installed in ROM). |
332 | + |
333 | + The requirement to provide Installation Information does not include a |
334 | +requirement to continue to provide support service, warranty, or updates |
335 | +for a work that has been modified or installed by the recipient, or for |
336 | +the User Product in which it has been modified or installed. Access to a |
337 | +network may be denied when the modification itself materially and |
338 | +adversely affects the operation of the network or violates the rules and |
339 | +protocols for communication across the network. |
340 | + |
341 | + Corresponding Source conveyed, and Installation Information provided, |
342 | +in accord with this section must be in a format that is publicly |
343 | +documented (and with an implementation available to the public in |
344 | +source code form), and must require no special password or key for |
345 | +unpacking, reading or copying. |
346 | + |
347 | + 7. Additional Terms. |
348 | + |
349 | + "Additional permissions" are terms that supplement the terms of this |
350 | +License by making exceptions from one or more of its conditions. |
351 | +Additional permissions that are applicable to the entire Program shall |
352 | +be treated as though they were included in this License, to the extent |
353 | +that they are valid under applicable law. If additional permissions |
354 | +apply only to part of the Program, that part may be used separately |
355 | +under those permissions, but the entire Program remains governed by |
356 | +this License without regard to the additional permissions. |
357 | + |
358 | + When you convey a copy of a covered work, you may at your option |
359 | +remove any additional permissions from that copy, or from any part of |
360 | +it. (Additional permissions may be written to require their own |
361 | +removal in certain cases when you modify the work.) You may place |
362 | +additional permissions on material, added by you to a covered work, |
363 | +for which you have or can give appropriate copyright permission. |
364 | + |
365 | + Notwithstanding any other provision of this License, for material you |
366 | +add to a covered work, you may (if authorized by the copyright holders of |
367 | +that material) supplement the terms of this License with terms: |
368 | + |
369 | + a) Disclaiming warranty or limiting liability differently from the |
370 | + terms of sections 15 and 16 of this License; or |
371 | + |
372 | + b) Requiring preservation of specified reasonable legal notices or |
373 | + author attributions in that material or in the Appropriate Legal |
374 | + Notices displayed by works containing it; or |
375 | + |
376 | + c) Prohibiting misrepresentation of the origin of that material, or |
377 | + requiring that modified versions of such material be marked in |
378 | + reasonable ways as different from the original version; or |
379 | + |
380 | + d) Limiting the use for publicity purposes of names of licensors or |
381 | + authors of the material; or |
382 | + |
383 | + e) Declining to grant rights under trademark law for use of some |
384 | + trade names, trademarks, or service marks; or |
385 | + |
386 | + f) Requiring indemnification of licensors and authors of that |
387 | + material by anyone who conveys the material (or modified versions of |
388 | + it) with contractual assumptions of liability to the recipient, for |
389 | + any liability that these contractual assumptions directly impose on |
390 | + those licensors and authors. |
391 | + |
392 | + All other non-permissive additional terms are considered "further |
393 | +restrictions" within the meaning of section 10. If the Program as you |
394 | +received it, or any part of it, contains a notice stating that it is |
395 | +governed by this License along with a term that is a further |
396 | +restriction, you may remove that term. If a license document contains |
397 | +a further restriction but permits relicensing or conveying under this |
398 | +License, you may add to a covered work material governed by the terms |
399 | +of that license document, provided that the further restriction does |
400 | +not survive such relicensing or conveying. |
401 | + |
402 | + If you add terms to a covered work in accord with this section, you |
403 | +must place, in the relevant source files, a statement of the |
404 | +additional terms that apply to those files, or a notice indicating |
405 | +where to find the applicable terms. |
406 | + |
407 | + Additional terms, permissive or non-permissive, may be stated in the |
408 | +form of a separately written license, or stated as exceptions; |
409 | +the above requirements apply either way. |
410 | + |
411 | + 8. Termination. |
412 | + |
413 | + You may not propagate or modify a covered work except as expressly |
414 | +provided under this License. Any attempt otherwise to propagate or |
415 | +modify it is void, and will automatically terminate your rights under |
416 | +this License (including any patent licenses granted under the third |
417 | +paragraph of section 11). |
418 | + |
419 | + However, if you cease all violation of this License, then your |
420 | +license from a particular copyright holder is reinstated (a) |
421 | +provisionally, unless and until the copyright holder explicitly and |
422 | +finally terminates your license, and (b) permanently, if the copyright |
423 | +holder fails to notify you of the violation by some reasonable means |
424 | +prior to 60 days after the cessation. |
425 | + |
426 | + Moreover, your license from a particular copyright holder is |
427 | +reinstated permanently if the copyright holder notifies you of the |
428 | +violation by some reasonable means, this is the first time you have |
429 | +received notice of violation of this License (for any work) from that |
430 | +copyright holder, and you cure the violation prior to 30 days after |
431 | +your receipt of the notice. |
432 | + |
433 | + Termination of your rights under this section does not terminate the |
434 | +licenses of parties who have received copies or rights from you under |
435 | +this License. If your rights have been terminated and not permanently |
436 | +reinstated, you do not qualify to receive new licenses for the same |
437 | +material under section 10. |
438 | + |
439 | + 9. Acceptance Not Required for Having Copies. |
440 | + |
441 | + You are not required to accept this License in order to receive or |
442 | +run a copy of the Program. Ancillary propagation of a covered work |
443 | +occurring solely as a consequence of using peer-to-peer transmission |
444 | +to receive a copy likewise does not require acceptance. However, |
445 | +nothing other than this License grants you permission to propagate or |
446 | +modify any covered work. These actions infringe copyright if you do |
447 | +not accept this License. Therefore, by modifying or propagating a |
448 | +covered work, you indicate your acceptance of this License to do so. |
449 | + |
450 | + 10. Automatic Licensing of Downstream Recipients. |
451 | + |
452 | + Each time you convey a covered work, the recipient automatically |
453 | +receives a license from the original licensors, to run, modify and |
454 | +propagate that work, subject to this License. You are not responsible |
455 | +for enforcing compliance by third parties with this License. |
456 | + |
457 | + An "entity transaction" is a transaction transferring control of an |
458 | +organization, or substantially all assets of one, or subdividing an |
459 | +organization, or merging organizations. If propagation of a covered |
460 | +work results from an entity transaction, each party to that |
461 | +transaction who receives a copy of the work also receives whatever |
462 | +licenses to the work the party's predecessor in interest had or could |
463 | +give under the previous paragraph, plus a right to possession of the |
464 | +Corresponding Source of the work from the predecessor in interest, if |
465 | +the predecessor has it or can get it with reasonable efforts. |
466 | + |
467 | + You may not impose any further restrictions on the exercise of the |
468 | +rights granted or affirmed under this License. For example, you may |
469 | +not impose a license fee, royalty, or other charge for exercise of |
470 | +rights granted under this License, and you may not initiate litigation |
471 | +(including a cross-claim or counterclaim in a lawsuit) alleging that |
472 | +any patent claim is infringed by making, using, selling, offering for |
473 | +sale, or importing the Program or any portion of it. |
474 | + |
475 | + 11. Patents. |
476 | + |
477 | + A "contributor" is a copyright holder who authorizes use under this |
478 | +License of the Program or a work on which the Program is based. The |
479 | +work thus licensed is called the contributor's "contributor version". |
480 | + |
481 | + A contributor's "essential patent claims" are all patent claims |
482 | +owned or controlled by the contributor, whether already acquired or |
483 | +hereafter acquired, that would be infringed by some manner, permitted |
484 | +by this License, of making, using, or selling its contributor version, |
485 | +but do not include claims that would be infringed only as a |
486 | +consequence of further modification of the contributor version. For |
487 | +purposes of this definition, "control" includes the right to grant |
488 | +patent sublicenses in a manner consistent with the requirements of |
489 | +this License. |
490 | + |
491 | + Each contributor grants you a non-exclusive, worldwide, royalty-free |
492 | +patent license under the contributor's essential patent claims, to |
493 | +make, use, sell, offer for sale, import and otherwise run, modify and |
494 | +propagate the contents of its contributor version. |
495 | + |
496 | + In the following three paragraphs, a "patent license" is any express |
497 | +agreement or commitment, however denominated, not to enforce a patent |
498 | +(such as an express permission to practice a patent or covenant not to |
499 | +sue for patent infringement). To "grant" such a patent license to a |
500 | +party means to make such an agreement or commitment not to enforce a |
501 | +patent against the party. |
502 | + |
503 | + If you convey a covered work, knowingly relying on a patent license, |
504 | +and the Corresponding Source of the work is not available for anyone |
505 | +to copy, free of charge and under the terms of this License, through a |
506 | +publicly available network server or other readily accessible means, |
507 | +then you must either (1) cause the Corresponding Source to be so |
508 | +available, or (2) arrange to deprive yourself of the benefit of the |
509 | +patent license for this particular work, or (3) arrange, in a manner |
510 | +consistent with the requirements of this License, to extend the patent |
511 | +license to downstream recipients. "Knowingly relying" means you have |
512 | +actual knowledge that, but for the patent license, your conveying the |
513 | +covered work in a country, or your recipient's use of the covered work |
514 | +in a country, would infringe one or more identifiable patents in that |
515 | +country that you have reason to believe are valid. |
516 | + |
517 | + If, pursuant to or in connection with a single transaction or |
518 | +arrangement, you convey, or propagate by procuring conveyance of, a |
519 | +covered work, and grant a patent license to some of the parties |
520 | +receiving the covered work authorizing them to use, propagate, modify |
521 | +or convey a specific copy of the covered work, then the patent license |
522 | +you grant is automatically extended to all recipients of the covered |
523 | +work and works based on it. |
524 | + |
525 | + A patent license is "discriminatory" if it does not include within |
526 | +the scope of its coverage, prohibits the exercise of, or is |
527 | +conditioned on the non-exercise of one or more of the rights that are |
528 | +specifically granted under this License. You may not convey a covered |
529 | +work if you are a party to an arrangement with a third party that is |
530 | +in the business of distributing software, under which you make payment |
531 | +to the third party based on the extent of your activity of conveying |
532 | +the work, and under which the third party grants, to any of the |
533 | +parties who would receive the covered work from you, a discriminatory |
534 | +patent license (a) in connection with copies of the covered work |
535 | +conveyed by you (or copies made from those copies), or (b) primarily |
536 | +for and in connection with specific products or compilations that |
537 | +contain the covered work, unless you entered into that arrangement, |
538 | +or that patent license was granted, prior to 28 March 2007. |
539 | + |
540 | + Nothing in this License shall be construed as excluding or limiting |
541 | +any implied license or other defenses to infringement that may |
542 | +otherwise be available to you under applicable patent law. |
543 | + |
544 | + 12. No Surrender of Others' Freedom. |
545 | + |
546 | + If conditions are imposed on you (whether by court order, agreement or |
547 | +otherwise) that contradict the conditions of this License, they do not |
548 | +excuse you from the conditions of this License. If you cannot convey a |
549 | +covered work so as to satisfy simultaneously your obligations under this |
550 | +License and any other pertinent obligations, then as a consequence you may |
551 | +not convey it at all. For example, if you agree to terms that obligate you |
552 | +to collect a royalty for further conveying from those to whom you convey |
553 | +the Program, the only way you could satisfy both those terms and this |
554 | +License would be to refrain entirely from conveying the Program. |
555 | + |
556 | + 13. Use with the GNU Affero General Public License. |
557 | + |
558 | + Notwithstanding any other provision of this License, you have |
559 | +permission to link or combine any covered work with a work licensed |
560 | +under version 3 of the GNU Affero General Public License into a single |
561 | +combined work, and to convey the resulting work. The terms of this |
562 | +License will continue to apply to the part which is the covered work, |
563 | +but the special requirements of the GNU Affero General Public License, |
564 | +section 13, concerning interaction through a network will apply to the |
565 | +combination as such. |
566 | + |
567 | + 14. Revised Versions of this License. |
568 | + |
569 | + The Free Software Foundation may publish revised and/or new versions of |
570 | +the GNU General Public License from time to time. Such new versions will |
571 | +be similar in spirit to the present version, but may differ in detail to |
572 | +address new problems or concerns. |
573 | + |
574 | + Each version is given a distinguishing version number. If the |
575 | +Program specifies that a certain numbered version of the GNU General |
576 | +Public License "or any later version" applies to it, you have the |
577 | +option of following the terms and conditions either of that numbered |
578 | +version or of any later version published by the Free Software |
579 | +Foundation. If the Program does not specify a version number of the |
580 | +GNU General Public License, you may choose any version ever published |
581 | +by the Free Software Foundation. |
582 | + |
583 | + If the Program specifies that a proxy can decide which future |
584 | +versions of the GNU General Public License can be used, that proxy's |
585 | +public statement of acceptance of a version permanently authorizes you |
586 | +to choose that version for the Program. |
587 | + |
588 | + Later license versions may give you additional or different |
589 | +permissions. However, no additional obligations are imposed on any |
590 | +author or copyright holder as a result of your choosing to follow a |
591 | +later version. |
592 | + |
593 | + 15. Disclaimer of Warranty. |
594 | + |
595 | + THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY |
596 | +APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT |
597 | +HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY |
598 | +OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, |
599 | +THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR |
600 | +PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM |
601 | +IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF |
602 | +ALL NECESSARY SERVICING, REPAIR OR CORRECTION. |
603 | + |
604 | + 16. Limitation of Liability. |
605 | + |
606 | + IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING |
607 | +WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MODIFIES AND/OR CONVEYS |
608 | +THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY |
609 | +GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE |
610 | +USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF |
611 | +DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD |
612 | +PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS), |
613 | +EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF |
614 | +SUCH DAMAGES. |
615 | + |
616 | + 17. Interpretation of Sections 15 and 16. |
617 | + |
618 | + If the disclaimer of warranty and limitation of liability provided |
619 | +above cannot be given local legal effect according to their terms, |
620 | +reviewing courts shall apply local law that most closely approximates |
621 | +an absolute waiver of all civil liability in connection with the |
622 | +Program, unless a warranty or assumption of liability accompanies a |
623 | +copy of the Program in return for a fee. |
624 | + |
625 | + END OF TERMS AND CONDITIONS |
626 | + |
627 | + How to Apply These Terms to Your New Programs |
628 | + |
629 | + If you develop a new program, and you want it to be of the greatest |
630 | +possible use to the public, the best way to achieve this is to make it |
631 | +free software which everyone can redistribute and change under these terms. |
632 | + |
633 | + To do so, attach the following notices to the program. It is safest |
634 | +to attach them to the start of each source file to most effectively |
635 | +state the exclusion of warranty; and each file should have at least |
636 | +the "copyright" line and a pointer to where the full notice is found. |
637 | + |
638 | + <one line to give the program's name and a brief idea of what it does.> |
639 | + Copyright (C) <year> <name of author> |
640 | + |
641 | + This program is free software: you can redistribute it and/or modify |
642 | + it under the terms of the GNU General Public License as published by |
643 | + the Free Software Foundation, either version 3 of the License, or |
644 | + (at your option) any later version. |
645 | + |
646 | + This program is distributed in the hope that it will be useful, |
647 | + but WITHOUT ANY WARRANTY; without even the implied warranty of |
648 | + MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the |
649 | + GNU General Public License for more details. |
650 | + |
651 | + You should have received a copy of the GNU General Public License |
652 | + along with this program. If not, see <http://www.gnu.org/licenses/>. |
653 | + |
654 | +Also add information on how to contact you by electronic and paper mail. |
655 | + |
656 | + If the program does terminal interaction, make it output a short |
657 | +notice like this when it starts in an interactive mode: |
658 | + |
659 | + <program> Copyright (C) <year> <name of author> |
660 | + This program comes with ABSOLUTELY NO WARRANTY; for details type `show w'. |
661 | + This is free software, and you are welcome to redistribute it |
662 | + under certain conditions; type `show c' for details. |
663 | + |
664 | +The hypothetical commands `show w' and `show c' should show the appropriate |
665 | +parts of the General Public License. Of course, your program's commands |
666 | +might be different; for a GUI interface, you would use an "about box". |
667 | + |
668 | + You should also get your employer (if you work as a programmer) or school, |
669 | +if any, to sign a "copyright disclaimer" for the program, if necessary. |
670 | +For more information on this, and how to apply and follow the GNU GPL, see |
671 | +<http://www.gnu.org/licenses/>. |
672 | + |
673 | + The GNU General Public License does not permit incorporating your program |
674 | +into proprietary programs. If your program is a subroutine library, you |
675 | +may consider it more useful to permit linking proprietary applications with |
676 | +the library. If this is what you want to do, use the GNU Lesser General |
677 | +Public License instead of this License. But first, please read |
678 | +<http://www.gnu.org/philosophy/why-not-lgpl.html>. |
679 | |
680 | === added file 'COPYING.LESSER' |
681 | --- COPYING.LESSER 1970-01-01 00:00:00 +0000 |
682 | +++ COPYING.LESSER 2013-01-25 16:44:31 +0000 |
683 | @@ -0,0 +1,165 @@ |
684 | + GNU LESSER GENERAL PUBLIC LICENSE |
685 | + Version 3, 29 June 2007 |
686 | + |
687 | + Copyright (C) 2007 Free Software Foundation, Inc. <http://fsf.org/> |
688 | + Everyone is permitted to copy and distribute verbatim copies |
689 | + of this license document, but changing it is not allowed. |
690 | + |
691 | + |
692 | + This version of the GNU Lesser General Public License incorporates |
693 | +the terms and conditions of version 3 of the GNU General Public |
694 | +License, supplemented by the additional permissions listed below. |
695 | + |
696 | + 0. Additional Definitions. |
697 | + |
698 | + As used herein, "this License" refers to version 3 of the GNU Lesser |
699 | +General Public License, and the "GNU GPL" refers to version 3 of the GNU |
700 | +General Public License. |
701 | + |
702 | + "The Library" refers to a covered work governed by this License, |
703 | +other than an Application or a Combined Work as defined below. |
704 | + |
705 | + An "Application" is any work that makes use of an interface provided |
706 | +by the Library, but which is not otherwise based on the Library. |
707 | +Defining a subclass of a class defined by the Library is deemed a mode |
708 | +of using an interface provided by the Library. |
709 | + |
710 | + A "Combined Work" is a work produced by combining or linking an |
711 | +Application with the Library. The particular version of the Library |
712 | +with which the Combined Work was made is also called the "Linked |
713 | +Version". |
714 | + |
715 | + The "Minimal Corresponding Source" for a Combined Work means the |
716 | +Corresponding Source for the Combined Work, excluding any source code |
717 | +for portions of the Combined Work that, considered in isolation, are |
718 | +based on the Application, and not on the Linked Version. |
719 | + |
720 | + The "Corresponding Application Code" for a Combined Work means the |
721 | +object code and/or source code for the Application, including any data |
722 | +and utility programs needed for reproducing the Combined Work from the |
723 | +Application, but excluding the System Libraries of the Combined Work. |
724 | + |
725 | + 1. Exception to Section 3 of the GNU GPL. |
726 | + |
727 | + You may convey a covered work under sections 3 and 4 of this License |
728 | +without being bound by section 3 of the GNU GPL. |
729 | + |
730 | + 2. Conveying Modified Versions. |
731 | + |
732 | + If you modify a copy of the Library, and, in your modifications, a |
733 | +facility refers to a function or data to be supplied by an Application |
734 | +that uses the facility (other than as an argument passed when the |
735 | +facility is invoked), then you may convey a copy of the modified |
736 | +version: |
737 | + |
738 | + a) under this License, provided that you make a good faith effort to |
739 | + ensure that, in the event an Application does not supply the |
740 | + function or data, the facility still operates, and performs |
741 | + whatever part of its purpose remains meaningful, or |
742 | + |
743 | + b) under the GNU GPL, with none of the additional permissions of |
744 | + this License applicable to that copy. |
745 | + |
746 | + 3. Object Code Incorporating Material from Library Header Files. |
747 | + |
748 | + The object code form of an Application may incorporate material from |
749 | +a header file that is part of the Library. You may convey such object |
750 | +code under terms of your choice, provided that, if the incorporated |
751 | +material is not limited to numerical parameters, data structure |
752 | +layouts and accessors, or small macros, inline functions and templates |
753 | +(ten or fewer lines in length), you do both of the following: |
754 | + |
755 | + a) Give prominent notice with each copy of the object code that the |
756 | + Library is used in it and that the Library and its use are |
757 | + covered by this License. |
758 | + |
759 | + b) Accompany the object code with a copy of the GNU GPL and this license |
760 | + document. |
761 | + |
762 | + 4. Combined Works. |
763 | + |
764 | + You may convey a Combined Work under terms of your choice that, |
765 | +taken together, effectively do not restrict modification of the |
766 | +portions of the Library contained in the Combined Work and reverse |
767 | +engineering for debugging such modifications, if you also do each of |
768 | +the following: |
769 | + |
770 | + a) Give prominent notice with each copy of the Combined Work that |
771 | + the Library is used in it and that the Library and its use are |
772 | + covered by this License. |
773 | + |
774 | + b) Accompany the Combined Work with a copy of the GNU GPL and this license |
775 | + document. |
776 | + |
777 | + c) For a Combined Work that displays copyright notices during |
778 | + execution, include the copyright notice for the Library among |
779 | + these notices, as well as a reference directing the user to the |
780 | + copies of the GNU GPL and this license document. |
781 | + |
782 | + d) Do one of the following: |
783 | + |
784 | + 0) Convey the Minimal Corresponding Source under the terms of this |
785 | + License, and the Corresponding Application Code in a form |
786 | + suitable for, and under terms that permit, the user to |
787 | + recombine or relink the Application with a modified version of |
788 | + the Linked Version to produce a modified Combined Work, in the |
789 | + manner specified by section 6 of the GNU GPL for conveying |
790 | + Corresponding Source. |
791 | + |
792 | + 1) Use a suitable shared library mechanism for linking with the |
793 | + Library. A suitable mechanism is one that (a) uses at run time |
794 | + a copy of the Library already present on the user's computer |
795 | + system, and (b) will operate properly with a modified version |
796 | + of the Library that is interface-compatible with the Linked |
797 | + Version. |
798 | + |
799 | + e) Provide Installation Information, but only if you would otherwise |
800 | + be required to provide such information under section 6 of the |
801 | + GNU GPL, and only to the extent that such information is |
802 | + necessary to install and execute a modified version of the |
803 | + Combined Work produced by recombining or relinking the |
804 | + Application with a modified version of the Linked Version. (If |
805 | + you use option 4d0, the Installation Information must accompany |
806 | + the Minimal Corresponding Source and Corresponding Application |
807 | + Code. If you use option 4d1, you must provide the Installation |
808 | + Information in the manner specified by section 6 of the GNU GPL |
809 | + for conveying Corresponding Source.) |
810 | + |
811 | + 5. Combined Libraries. |
812 | + |
813 | + You may place library facilities that are a work based on the |
814 | +Library side by side in a single library together with other library |
815 | +facilities that are not Applications and are not covered by this |
816 | +License, and convey such a combined library under terms of your |
817 | +choice, if you do both of the following: |
818 | + |
819 | + a) Accompany the combined library with a copy of the same work based |
820 | + on the Library, uncombined with any other library facilities, |
821 | + conveyed under the terms of this License. |
822 | + |
823 | + b) Give prominent notice with the combined library that part of it |
824 | + is a work based on the Library, and explaining where to find the |
825 | + accompanying uncombined form of the same work. |
826 | + |
827 | + 6. Revised Versions of the GNU Lesser General Public License. |
828 | + |
829 | + The Free Software Foundation may publish revised and/or new versions |
830 | +of the GNU Lesser General Public License from time to time. Such new |
831 | +versions will be similar in spirit to the present version, but may |
832 | +differ in detail to address new problems or concerns. |
833 | + |
834 | + Each version is given a distinguishing version number. If the |
835 | +Library as you received it specifies that a certain numbered version |
836 | +of the GNU Lesser General Public License "or any later version" |
837 | +applies to it, you have the option of following the terms and |
838 | +conditions either of that published version or of any later version |
839 | +published by the Free Software Foundation. If the Library as you |
840 | +received it does not specify a version number of the GNU Lesser |
841 | +General Public License, you may choose any version of the GNU Lesser |
842 | +General Public License ever published by the Free Software Foundation. |
843 | + |
844 | + If the Library as you received it specifies that a proxy can decide |
845 | +whether future versions of the GNU Lesser General Public License shall |
846 | +apply, that proxy's public statement of acceptance of any version is |
847 | +permanent authorization for you to choose that version for the |
848 | +Library. |
849 | |
850 | === removed file 'LICENSE' |
851 | --- LICENSE 2013-01-18 11:38:24 +0000 |
852 | +++ LICENSE 1970-01-01 00:00:00 +0000 |
853 | @@ -1,683 +0,0 @@ |
854 | -USSO is Copyright 2013 Canonical Ltd. |
855 | - |
856 | -Canonical Ltd ("Canonical") distributes the source code for the |
857 | -USSO under the GNU Affero General Public |
858 | -License, version 3 ("AGPLv3"). The full text of this licence is |
859 | -given below. |
860 | - |
861 | -The image and icon files in USSO are copyright |
862 | -Canonical, and unlike the source code they are not licensed under the |
863 | -AGPLv3. Canonical grants you the right to use them for testing and |
864 | -development purposes only, but not to use them in production (commercially or |
865 | -non-commercially). |
866 | - |
867 | -Third-party copyright in this distribution is noted where applicable. |
868 | - |
869 | -All rights not expressly granted are reserved. |
870 | - |
871 | -========================================================================= |
872 | - |
873 | - GNU AFFERO GENERAL PUBLIC LICENSE |
874 | - Version 3, 19 November 2007 |
875 | - (http://www.gnu.org/licenses/agpl.html) |
876 | - |
877 | - Copyright (C) 2007 Free Software Foundation, Inc. <http://fsf.org/> |
878 | - Everyone is permitted to copy and distribute verbatim copies |
879 | - of this license document, but changing it is not allowed. |
880 | - |
881 | - Preamble |
882 | - |
883 | - The GNU Affero General Public License is a free, copyleft license for |
884 | -software and other kinds of works, specifically designed to ensure |
885 | -cooperation with the community in the case of network server software. |
886 | - |
887 | - The licenses for most software and other practical works are designed |
888 | -to take away your freedom to share and change the works. By contrast, |
889 | -our General Public Licenses are intended to guarantee your freedom to |
890 | -share and change all versions of a program--to make sure it remains free |
891 | -software for all its users. |
892 | - |
893 | - When we speak of free software, we are referring to freedom, not |
894 | -price. Our General Public Licenses are designed to make sure that you |
895 | -have the freedom to distribute copies of free software (and charge for |
896 | -them if you wish), that you receive source code or can get it if you |
897 | -want it, that you can change the software or use pieces of it in new |
898 | -free programs, and that you know you can do these things. |
899 | - |
900 | - Developers that use our General Public Licenses protect your rights |
901 | -with two steps: (1) assert copyright on the software, and (2) offer |
902 | -you this License which gives you legal permission to copy, distribute |
903 | -and/or modify the software. |
904 | - |
905 | - A secondary benefit of defending all users' freedom is that |
906 | -improvements made in alternate versions of the program, if they |
907 | -receive widespread use, become available for other developers to |
908 | -incorporate. Many developers of free software are heartened and |
909 | -encouraged by the resulting cooperation. However, in the case of |
910 | -software used on network servers, this result may fail to come about. |
911 | -The GNU General Public License permits making a modified version and |
912 | -letting the public access it on a server without ever releasing its |
913 | -source code to the public. |
914 | - |
915 | - The GNU Affero General Public License is designed specifically to |
916 | -ensure that, in such cases, the modified source code becomes available |
917 | -to the community. It requires the operator of a network server to |
918 | -provide the source code of the modified version running there to the |
919 | -users of that server. Therefore, public use of a modified version, on |
920 | -a publicly accessible server, gives the public access to the source |
921 | -code of the modified version. |
922 | - |
923 | - An older license, called the Affero General Public License and |
924 | -published by Affero, was designed to accomplish similar goals. This is |
925 | -a different license, not a version of the Affero GPL, but Affero has |
926 | -released a new version of the Affero GPL which permits relicensing under |
927 | -this license. |
928 | - |
929 | - The precise terms and conditions for copying, distribution and |
930 | -modification follow. |
931 | - |
932 | - TERMS AND CONDITIONS |
933 | - |
934 | - 0. Definitions. |
935 | - |
936 | - "This License" refers to version 3 of the GNU Affero General Public License. |
937 | - |
938 | - "Copyright" also means copyright-like laws that apply to other kinds of |
939 | -works, such as semiconductor masks. |
940 | - |
941 | - "The Program" refers to any copyrightable work licensed under this |
942 | -License. Each licensee is addressed as "you". "Licensees" and |
943 | -"recipients" may be individuals or organizations. |
944 | - |
945 | - To "modify" a work means to copy from or adapt all or part of the work |
946 | -in a fashion requiring copyright permission, other than the making of an |
947 | -exact copy. The resulting work is called a "modified version" of the |
948 | -earlier work or a work "based on" the earlier work. |
949 | - |
950 | - A "covered work" means either the unmodified Program or a work based |
951 | -on the Program. |
952 | - |
953 | - To "propagate" a work means to do anything with it that, without |
954 | -permission, would make you directly or secondarily liable for |
955 | -infringement under applicable copyright law, except executing it on a |
956 | -computer or modifying a private copy. Propagation includes copying, |
957 | -distribution (with or without modification), making available to the |
958 | -public, and in some countries other activities as well. |
959 | - |
960 | - To "convey" a work means any kind of propagation that enables other |
961 | -parties to make or receive copies. Mere interaction with a user through |
962 | -a computer network, with no transfer of a copy, is not conveying. |
963 | - |
964 | - An interactive user interface displays "Appropriate Legal Notices" |
965 | -to the extent that it includes a convenient and prominently visible |
966 | -feature that (1) displays an appropriate copyright notice, and (2) |
967 | -tells the user that there is no warranty for the work (except to the |
968 | -extent that warranties are provided), that licensees may convey the |
969 | -work under this License, and how to view a copy of this License. If |
970 | -the interface presents a list of user commands or options, such as a |
971 | -menu, a prominent item in the list meets this criterion. |
972 | - |
973 | - 1. Source Code. |
974 | - |
975 | - The "source code" for a work means the preferred form of the work |
976 | -for making modifications to it. "Object code" means any non-source |
977 | -form of a work. |
978 | - |
979 | - A "Standard Interface" means an interface that either is an official |
980 | -standard defined by a recognized standards body, or, in the case of |
981 | -interfaces specified for a particular programming language, one that |
982 | -is widely used among developers working in that language. |
983 | - |
984 | - The "System Libraries" of an executable work include anything, other |
985 | -than the work as a whole, that (a) is included in the normal form of |
986 | -packaging a Major Component, but which is not part of that Major |
987 | -Component, and (b) serves only to enable use of the work with that |
988 | -Major Component, or to implement a Standard Interface for which an |
989 | -implementation is available to the public in source code form. A |
990 | -"Major Component", in this context, means a major essential component |
991 | -(kernel, window system, and so on) of the specific operating system |
992 | -(if any) on which the executable work runs, or a compiler used to |
993 | -produce the work, or an object code interpreter used to run it. |
994 | - |
995 | - The "Corresponding Source" for a work in object code form means all |
996 | -the source code needed to generate, install, and (for an executable |
997 | -work) run the object code and to modify the work, including scripts to |
998 | -control those activities. However, it does not include the work's |
999 | -System Libraries, or general-purpose tools or generally available free |
1000 | -programs which are used unmodified in performing those activities but |
1001 | -which are not part of the work. For example, Corresponding Source |
1002 | -includes interface definition files associated with source files for |
1003 | -the work, and the source code for shared libraries and dynamically |
1004 | -linked subprograms that the work is specifically designed to require, |
1005 | -such as by intimate data communication or control flow between those |
1006 | -subprograms and other parts of the work. |
1007 | - |
1008 | - The Corresponding Source need not include anything that users |
1009 | -can regenerate automatically from other parts of the Corresponding |
1010 | -Source. |
1011 | - |
1012 | - The Corresponding Source for a work in source code form is that |
1013 | -same work. |
1014 | - |
1015 | - 2. Basic Permissions. |
1016 | - |
1017 | - All rights granted under this License are granted for the term of |
1018 | -copyright on the Program, and are irrevocable provided the stated |
1019 | -conditions are met. This License explicitly affirms your unlimited |
1020 | -permission to run the unmodified Program. The output from running a |
1021 | -covered work is covered by this License only if the output, given its |
1022 | -content, constitutes a covered work. This License acknowledges your |
1023 | -rights of fair use or other equivalent, as provided by copyright law. |
1024 | - |
1025 | - You may make, run and propagate covered works that you do not |
1026 | -convey, without conditions so long as your license otherwise remains |
1027 | -in force. You may convey covered works to others for the sole purpose |
1028 | -of having them make modifications exclusively for you, or provide you |
1029 | -with facilities for running those works, provided that you comply with |
1030 | -the terms of this License in conveying all material for which you do |
1031 | -not control copyright. Those thus making or running the covered works |
1032 | -for you must do so exclusively on your behalf, under your direction |
1033 | -and control, on terms that prohibit them from making any copies of |
1034 | -your copyrighted material outside their relationship with you. |
1035 | - |
1036 | - Conveying under any other circumstances is permitted solely under |
1037 | -the conditions stated below. Sublicensing is not allowed; section 10 |
1038 | -makes it unnecessary. |
1039 | - |
1040 | - 3. Protecting Users' Legal Rights From Anti-Circumvention Law. |
1041 | - |
1042 | - No covered work shall be deemed part of an effective technological |
1043 | -measure under any applicable law fulfilling obligations under article |
1044 | -11 of the WIPO copyright treaty adopted on 20 December 1996, or |
1045 | -similar laws prohibiting or restricting circumvention of such |
1046 | -measures. |
1047 | - |
1048 | - When you convey a covered work, you waive any legal power to forbid |
1049 | -circumvention of technological measures to the extent such circumvention |
1050 | -is effected by exercising rights under this License with respect to |
1051 | -the covered work, and you disclaim any intention to limit operation or |
1052 | -modification of the work as a means of enforcing, against the work's |
1053 | -users, your or third parties' legal rights to forbid circumvention of |
1054 | -technological measures. |
1055 | - |
1056 | - 4. Conveying Verbatim Copies. |
1057 | - |
1058 | - You may convey verbatim copies of the Program's source code as you |
1059 | -receive it, in any medium, provided that you conspicuously and |
1060 | -appropriately publish on each copy an appropriate copyright notice; |
1061 | -keep intact all notices stating that this License and any |
1062 | -non-permissive terms added in accord with section 7 apply to the code; |
1063 | -keep intact all notices of the absence of any warranty; and give all |
1064 | -recipients a copy of this License along with the Program. |
1065 | - |
1066 | - You may charge any price or no price for each copy that you convey, |
1067 | -and you may offer support or warranty protection for a fee. |
1068 | - |
1069 | - 5. Conveying Modified Source Versions. |
1070 | - |
1071 | - You may convey a work based on the Program, or the modifications to |
1072 | -produce it from the Program, in the form of source code under the |
1073 | -terms of section 4, provided that you also meet all of these conditions: |
1074 | - |
1075 | - a) The work must carry prominent notices stating that you modified |
1076 | - it, and giving a relevant date. |
1077 | - |
1078 | - b) The work must carry prominent notices stating that it is |
1079 | - released under this License and any conditions added under section |
1080 | - 7. This requirement modifies the requirement in section 4 to |
1081 | - "keep intact all notices". |
1082 | - |
1083 | - c) You must license the entire work, as a whole, under this |
1084 | - License to anyone who comes into possession of a copy. This |
1085 | - License will therefore apply, along with any applicable section 7 |
1086 | - additional terms, to the whole of the work, and all its parts, |
1087 | - regardless of how they are packaged. This License gives no |
1088 | - permission to license the work in any other way, but it does not |
1089 | - invalidate such permission if you have separately received it. |
1090 | - |
1091 | - d) If the work has interactive user interfaces, each must display |
1092 | - Appropriate Legal Notices; however, if the Program has interactive |
1093 | - interfaces that do not display Appropriate Legal Notices, your |
1094 | - work need not make them do so. |
1095 | - |
1096 | - A compilation of a covered work with other separate and independent |
1097 | -works, which are not by their nature extensions of the covered work, |
1098 | -and which are not combined with it such as to form a larger program, |
1099 | -in or on a volume of a storage or distribution medium, is called an |
1100 | -"aggregate" if the compilation and its resulting copyright are not |
1101 | -used to limit the access or legal rights of the compilation's users |
1102 | -beyond what the individual works permit. Inclusion of a covered work |
1103 | -in an aggregate does not cause this License to apply to the other |
1104 | -parts of the aggregate. |
1105 | - |
1106 | - 6. Conveying Non-Source Forms. |
1107 | - |
1108 | - You may convey a covered work in object code form under the terms |
1109 | -of sections 4 and 5, provided that you also convey the |
1110 | -machine-readable Corresponding Source under the terms of this License, |
1111 | -in one of these ways: |
1112 | - |
1113 | - a) Convey the object code in, or embodied in, a physical product |
1114 | - (including a physical distribution medium), accompanied by the |
1115 | - Corresponding Source fixed on a durable physical medium |
1116 | - customarily used for software interchange. |
1117 | - |
1118 | - b) Convey the object code in, or embodied in, a physical product |
1119 | - (including a physical distribution medium), accompanied by a |
1120 | - written offer, valid for at least three years and valid for as |
1121 | - long as you offer spare parts or customer support for that product |
1122 | - model, to give anyone who possesses the object code either (1) a |
1123 | - copy of the Corresponding Source for all the software in the |
1124 | - product that is covered by this License, on a durable physical |
1125 | - medium customarily used for software interchange, for a price no |
1126 | - more than your reasonable cost of physically performing this |
1127 | - conveying of source, or (2) access to copy the |
1128 | - Corresponding Source from a network server at no charge. |
1129 | - |
1130 | - c) Convey individual copies of the object code with a copy of the |
1131 | - written offer to provide the Corresponding Source. This |
1132 | - alternative is allowed only occasionally and noncommercially, and |
1133 | - only if you received the object code with such an offer, in accord |
1134 | - with subsection 6b. |
1135 | - |
1136 | - d) Convey the object code by offering access from a designated |
1137 | - place (gratis or for a charge), and offer equivalent access to the |
1138 | - Corresponding Source in the same way through the same place at no |
1139 | - further charge. You need not require recipients to copy the |
1140 | - Corresponding Source along with the object code. If the place to |
1141 | - copy the object code is a network server, the Corresponding Source |
1142 | - may be on a different server (operated by you or a third party) |
1143 | - that supports equivalent copying facilities, provided you maintain |
1144 | - clear directions next to the object code saying where to find the |
1145 | - Corresponding Source. Regardless of what server hosts the |
1146 | - Corresponding Source, you remain obligated to ensure that it is |
1147 | - available for as long as needed to satisfy these requirements. |
1148 | - |
1149 | - e) Convey the object code using peer-to-peer transmission, provided |
1150 | - you inform other peers where the object code and Corresponding |
1151 | - Source of the work are being offered to the general public at no |
1152 | - charge under subsection 6d. |
1153 | - |
1154 | - A separable portion of the object code, whose source code is excluded |
1155 | -from the Corresponding Source as a System Library, need not be |
1156 | -included in conveying the object code work. |
1157 | - |
1158 | - A "User Product" is either (1) a "consumer product", which means any |
1159 | -tangible personal property which is normally used for personal, family, |
1160 | -or household purposes, or (2) anything designed or sold for incorporation |
1161 | -into a dwelling. In determining whether a product is a consumer product, |
1162 | -doubtful cases shall be resolved in favor of coverage. For a particular |
1163 | -product received by a particular user, "normally used" refers to a |
1164 | -typical or common use of that class of product, regardless of the status |
1165 | -of the particular user or of the way in which the particular user |
1166 | -actually uses, or expects or is expected to use, the product. A product |
1167 | -is a consumer product regardless of whether the product has substantial |
1168 | -commercial, industrial or non-consumer uses, unless such uses represent |
1169 | -the only significant mode of use of the product. |
1170 | - |
1171 | - "Installation Information" for a User Product means any methods, |
1172 | -procedures, authorization keys, or other information required to install |
1173 | -and execute modified versions of a covered work in that User Product from |
1174 | -a modified version of its Corresponding Source. The information must |
1175 | -suffice to ensure that the continued functioning of the modified object |
1176 | -code is in no case prevented or interfered with solely because |
1177 | -modification has been made. |
1178 | - |
1179 | - If you convey an object code work under this section in, or with, or |
1180 | -specifically for use in, a User Product, and the conveying occurs as |
1181 | -part of a transaction in which the right of possession and use of the |
1182 | -User Product is transferred to the recipient in perpetuity or for a |
1183 | -fixed term (regardless of how the transaction is characterized), the |
1184 | -Corresponding Source conveyed under this section must be accompanied |
1185 | -by the Installation Information. But this requirement does not apply |
1186 | -if neither you nor any third party retains the ability to install |
1187 | -modified object code on the User Product (for example, the work has |
1188 | -been installed in ROM). |
1189 | - |
1190 | - The requirement to provide Installation Information does not include a |
1191 | -requirement to continue to provide support service, warranty, or updates |
1192 | -for a work that has been modified or installed by the recipient, or for |
1193 | -the User Product in which it has been modified or installed. Access to a |
1194 | -network may be denied when the modification itself materially and |
1195 | -adversely affects the operation of the network or violates the rules and |
1196 | -protocols for communication across the network. |
1197 | - |
1198 | - Corresponding Source conveyed, and Installation Information provided, |
1199 | -in accord with this section must be in a format that is publicly |
1200 | -documented (and with an implementation available to the public in |
1201 | -source code form), and must require no special password or key for |
1202 | -unpacking, reading or copying. |
1203 | - |
1204 | - 7. Additional Terms. |
1205 | - |
1206 | - "Additional permissions" are terms that supplement the terms of this |
1207 | -License by making exceptions from one or more of its conditions. |
1208 | -Additional permissions that are applicable to the entire Program shall |
1209 | -be treated as though they were included in this License, to the extent |
1210 | -that they are valid under applicable law. If additional permissions |
1211 | -apply only to part of the Program, that part may be used separately |
1212 | -under those permissions, but the entire Program remains governed by |
1213 | -this License without regard to the additional permissions. |
1214 | - |
1215 | - When you convey a copy of a covered work, you may at your option |
1216 | -remove any additional permissions from that copy, or from any part of |
1217 | -it. (Additional permissions may be written to require their own |
1218 | -removal in certain cases when you modify the work.) You may place |
1219 | -additional permissions on material, added by you to a covered work, |
1220 | -for which you have or can give appropriate copyright permission. |
1221 | - |
1222 | - Notwithstanding any other provision of this License, for material you |
1223 | -add to a covered work, you may (if authorized by the copyright holders of |
1224 | -that material) supplement the terms of this License with terms: |
1225 | - |
1226 | - a) Disclaiming warranty or limiting liability differently from the |
1227 | - terms of sections 15 and 16 of this License; or |
1228 | - |
1229 | - b) Requiring preservation of specified reasonable legal notices or |
1230 | - author attributions in that material or in the Appropriate Legal |
1231 | - Notices displayed by works containing it; or |
1232 | - |
1233 | - c) Prohibiting misrepresentation of the origin of that material, or |
1234 | - requiring that modified versions of such material be marked in |
1235 | - reasonable ways as different from the original version; or |
1236 | - |
1237 | - d) Limiting the use for publicity purposes of names of licensors or |
1238 | - authors of the material; or |
1239 | - |
1240 | - e) Declining to grant rights under trademark law for use of some |
1241 | - trade names, trademarks, or service marks; or |
1242 | - |
1243 | - f) Requiring indemnification of licensors and authors of that |
1244 | - material by anyone who conveys the material (or modified versions of |
1245 | - it) with contractual assumptions of liability to the recipient, for |
1246 | - any liability that these contractual assumptions directly impose on |
1247 | - those licensors and authors. |
1248 | - |
1249 | - All other non-permissive additional terms are considered "further |
1250 | -restrictions" within the meaning of section 10. If the Program as you |
1251 | -received it, or any part of it, contains a notice stating that it is |
1252 | -governed by this License along with a term that is a further |
1253 | -restriction, you may remove that term. If a license document contains |
1254 | -a further restriction but permits relicensing or conveying under this |
1255 | -License, you may add to a covered work material governed by the terms |
1256 | -of that license document, provided that the further restriction does |
1257 | -not survive such relicensing or conveying. |
1258 | - |
1259 | - If you add terms to a covered work in accord with this section, you |
1260 | -must place, in the relevant source files, a statement of the |
1261 | -additional terms that apply to those files, or a notice indicating |
1262 | -where to find the applicable terms. |
1263 | - |
1264 | - Additional terms, permissive or non-permissive, may be stated in the |
1265 | -form of a separately written license, or stated as exceptions; |
1266 | -the above requirements apply either way. |
1267 | - |
1268 | - 8. Termination. |
1269 | - |
1270 | - You may not propagate or modify a covered work except as expressly |
1271 | -provided under this License. Any attempt otherwise to propagate or |
1272 | -modify it is void, and will automatically terminate your rights under |
1273 | -this License (including any patent licenses granted under the third |
1274 | -paragraph of section 11). |
1275 | - |
1276 | - However, if you cease all violation of this License, then your |
1277 | -license from a particular copyright holder is reinstated (a) |
1278 | -provisionally, unless and until the copyright holder explicitly and |
1279 | -finally terminates your license, and (b) permanently, if the copyright |
1280 | -holder fails to notify you of the violation by some reasonable means |
1281 | -prior to 60 days after the cessation. |
1282 | - |
1283 | - Moreover, your license from a particular copyright holder is |
1284 | -reinstated permanently if the copyright holder notifies you of the |
1285 | -violation by some reasonable means, this is the first time you have |
1286 | -received notice of violation of this License (for any work) from that |
1287 | -copyright holder, and you cure the violation prior to 30 days after |
1288 | -your receipt of the notice. |
1289 | - |
1290 | - Termination of your rights under this section does not terminate the |
1291 | -licenses of parties who have received copies or rights from you under |
1292 | -this License. If your rights have been terminated and not permanently |
1293 | -reinstated, you do not qualify to receive new licenses for the same |
1294 | -material under section 10. |
1295 | - |
1296 | - 9. Acceptance Not Required for Having Copies. |
1297 | - |
1298 | - You are not required to accept this License in order to receive or |
1299 | -run a copy of the Program. Ancillary propagation of a covered work |
1300 | -occurring solely as a consequence of using peer-to-peer transmission |
1301 | -to receive a copy likewise does not require acceptance. However, |
1302 | -nothing other than this License grants you permission to propagate or |
1303 | -modify any covered work. These actions infringe copyright if you do |
1304 | -not accept this License. Therefore, by modifying or propagating a |
1305 | -covered work, you indicate your acceptance of this License to do so. |
1306 | - |
1307 | - 10. Automatic Licensing of Downstream Recipients. |
1308 | - |
1309 | - Each time you convey a covered work, the recipient automatically |
1310 | -receives a license from the original licensors, to run, modify and |
1311 | -propagate that work, subject to this License. You are not responsible |
1312 | -for enforcing compliance by third parties with this License. |
1313 | - |
1314 | - An "entity transaction" is a transaction transferring control of an |
1315 | -organization, or substantially all assets of one, or subdividing an |
1316 | -organization, or merging organizations. If propagation of a covered |
1317 | -work results from an entity transaction, each party to that |
1318 | -transaction who receives a copy of the work also receives whatever |
1319 | -licenses to the work the party's predecessor in interest had or could |
1320 | -give under the previous paragraph, plus a right to possession of the |
1321 | -Corresponding Source of the work from the predecessor in interest, if |
1322 | -the predecessor has it or can get it with reasonable efforts. |
1323 | - |
1324 | - You may not impose any further restrictions on the exercise of the |
1325 | -rights granted or affirmed under this License. For example, you may |
1326 | -not impose a license fee, royalty, or other charge for exercise of |
1327 | -rights granted under this License, and you may not initiate litigation |
1328 | -(including a cross-claim or counterclaim in a lawsuit) alleging that |
1329 | -any patent claim is infringed by making, using, selling, offering for |
1330 | -sale, or importing the Program or any portion of it. |
1331 | - |
1332 | - 11. Patents. |
1333 | - |
1334 | - A "contributor" is a copyright holder who authorizes use under this |
1335 | -License of the Program or a work on which the Program is based. The |
1336 | -work thus licensed is called the contributor's "contributor version". |
1337 | - |
1338 | - A contributor's "essential patent claims" are all patent claims |
1339 | -owned or controlled by the contributor, whether already acquired or |
1340 | -hereafter acquired, that would be infringed by some manner, permitted |
1341 | -by this License, of making, using, or selling its contributor version, |
1342 | -but do not include claims that would be infringed only as a |
1343 | -consequence of further modification of the contributor version. For |
1344 | -purposes of this definition, "control" includes the right to grant |
1345 | -patent sublicenses in a manner consistent with the requirements of |
1346 | -this License. |
1347 | - |
1348 | - Each contributor grants you a non-exclusive, worldwide, royalty-free |
1349 | -patent license under the contributor's essential patent claims, to |
1350 | -make, use, sell, offer for sale, import and otherwise run, modify and |
1351 | -propagate the contents of its contributor version. |
1352 | - |
1353 | - In the following three paragraphs, a "patent license" is any express |
1354 | -agreement or commitment, however denominated, not to enforce a patent |
1355 | -(such as an express permission to practice a patent or covenant not to |
1356 | -sue for patent infringement). To "grant" such a patent license to a |
1357 | -party means to make such an agreement or commitment not to enforce a |
1358 | -patent against the party. |
1359 | - |
1360 | - If you convey a covered work, knowingly relying on a patent license, |
1361 | -and the Corresponding Source of the work is not available for anyone |
1362 | -to copy, free of charge and under the terms of this License, through a |
1363 | -publicly available network server or other readily accessible means, |
1364 | -then you must either (1) cause the Corresponding Source to be so |
1365 | -available, or (2) arrange to deprive yourself of the benefit of the |
1366 | -patent license for this particular work, or (3) arrange, in a manner |
1367 | -consistent with the requirements of this License, to extend the patent |
1368 | -license to downstream recipients. "Knowingly relying" means you have |
1369 | -actual knowledge that, but for the patent license, your conveying the |
1370 | -covered work in a country, or your recipient's use of the covered work |
1371 | -in a country, would infringe one or more identifiable patents in that |
1372 | -country that you have reason to believe are valid. |
1373 | - |
1374 | - If, pursuant to or in connection with a single transaction or |
1375 | -arrangement, you convey, or propagate by procuring conveyance of, a |
1376 | -covered work, and grant a patent license to some of the parties |
1377 | -receiving the covered work authorizing them to use, propagate, modify |
1378 | -or convey a specific copy of the covered work, then the patent license |
1379 | -you grant is automatically extended to all recipients of the covered |
1380 | -work and works based on it. |
1381 | - |
1382 | - A patent license is "discriminatory" if it does not include within |
1383 | -the scope of its coverage, prohibits the exercise of, or is |
1384 | -conditioned on the non-exercise of one or more of the rights that are |
1385 | -specifically granted under this License. You may not convey a covered |
1386 | -work if you are a party to an arrangement with a third party that is |
1387 | -in the business of distributing software, under which you make payment |
1388 | -to the third party based on the extent of your activity of conveying |
1389 | -the work, and under which the third party grants, to any of the |
1390 | -parties who would receive the covered work from you, a discriminatory |
1391 | -patent license (a) in connection with copies of the covered work |
1392 | -conveyed by you (or copies made from those copies), or (b) primarily |
1393 | -for and in connection with specific products or compilations that |
1394 | -contain the covered work, unless you entered into that arrangement, |
1395 | -or that patent license was granted, prior to 28 March 2007. |
1396 | - |
1397 | - Nothing in this License shall be construed as excluding or limiting |
1398 | -any implied license or other defenses to infringement that may |
1399 | -otherwise be available to you under applicable patent law. |
1400 | - |
1401 | - 12. No Surrender of Others' Freedom. |
1402 | - |
1403 | - If conditions are imposed on you (whether by court order, agreement or |
1404 | -otherwise) that contradict the conditions of this License, they do not |
1405 | -excuse you from the conditions of this License. If you cannot convey a |
1406 | -covered work so as to satisfy simultaneously your obligations under this |
1407 | -License and any other pertinent obligations, then as a consequence you may |
1408 | -not convey it at all. For example, if you agree to terms that obligate you |
1409 | -to collect a royalty for further conveying from those to whom you convey |
1410 | -the Program, the only way you could satisfy both those terms and this |
1411 | -License would be to refrain entirely from conveying the Program. |
1412 | - |
1413 | - 13. Remote Network Interaction; Use with the GNU General Public License. |
1414 | - |
1415 | - Notwithstanding any other provision of this License, if you modify the |
1416 | -Program, your modified version must prominently offer all users |
1417 | -interacting with it remotely through a computer network (if your version |
1418 | -supports such interaction) an opportunity to receive the Corresponding |
1419 | -Source of your version by providing access to the Corresponding Source |
1420 | -from a network server at no charge, through some standard or customary |
1421 | -means of facilitating copying of software. This Corresponding Source |
1422 | -shall include the Corresponding Source for any work covered by version 3 |
1423 | -of the GNU General Public License that is incorporated pursuant to the |
1424 | -following paragraph. |
1425 | - |
1426 | - Notwithstanding any other provision of this License, you have |
1427 | -permission to link or combine any covered work with a work licensed |
1428 | -under version 3 of the GNU General Public License into a single |
1429 | -combined work, and to convey the resulting work. The terms of this |
1430 | -License will continue to apply to the part which is the covered work, |
1431 | -but the work with which it is combined will remain governed by version |
1432 | -3 of the GNU General Public License. |
1433 | - |
1434 | - 14. Revised Versions of this License. |
1435 | - |
1436 | - The Free Software Foundation may publish revised and/or new versions of |
1437 | -the GNU Affero General Public License from time to time. Such new versions |
1438 | -will be similar in spirit to the present version, but may differ in detail to |
1439 | -address new problems or concerns. |
1440 | - |
1441 | - Each version is given a distinguishing version number. If the |
1442 | -Program specifies that a certain numbered version of the GNU Affero General |
1443 | -Public License "or any later version" applies to it, you have the |
1444 | -option of following the terms and conditions either of that numbered |
1445 | -version or of any later version published by the Free Software |
1446 | -Foundation. If the Program does not specify a version number of the |
1447 | -GNU Affero General Public License, you may choose any version ever published |
1448 | -by the Free Software Foundation. |
1449 | - |
1450 | - If the Program specifies that a proxy can decide which future |
1451 | -versions of the GNU Affero General Public License can be used, that proxy's |
1452 | -public statement of acceptance of a version permanently authorizes you |
1453 | -to choose that version for the Program. |
1454 | - |
1455 | - Later license versions may give you additional or different |
1456 | -permissions. However, no additional obligations are imposed on any |
1457 | -author or copyright holder as a result of your choosing to follow a |
1458 | -later version. |
1459 | - |
1460 | - 15. Disclaimer of Warranty. |
1461 | - |
1462 | - THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY |
1463 | -APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT |
1464 | -HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY |
1465 | -OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, |
1466 | -THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR |
1467 | -PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM |
1468 | -IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF |
1469 | -ALL NECESSARY SERVICING, REPAIR OR CORRECTION. |
1470 | - |
1471 | - 16. Limitation of Liability. |
1472 | - |
1473 | - IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING |
1474 | -WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MODIFIES AND/OR CONVEYS |
1475 | -THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY |
1476 | -GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE |
1477 | -USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF |
1478 | -DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD |
1479 | -PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS), |
1480 | -EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF |
1481 | -SUCH DAMAGES. |
1482 | - |
1483 | - 17. Interpretation of Sections 15 and 16. |
1484 | - |
1485 | - If the disclaimer of warranty and limitation of liability provided |
1486 | -above cannot be given local legal effect according to their terms, |
1487 | -reviewing courts shall apply local law that most closely approximates |
1488 | -an absolute waiver of all civil liability in connection with the |
1489 | -Program, unless a warranty or assumption of liability accompanies a |
1490 | -copy of the Program in return for a fee. |
1491 | - |
1492 | - END OF TERMS AND CONDITIONS |
1493 | - |
1494 | - How to Apply These Terms to Your New Programs |
1495 | - |
1496 | - If you develop a new program, and you want it to be of the greatest |
1497 | -possible use to the public, the best way to achieve this is to make it |
1498 | -free software which everyone can redistribute and change under these terms. |
1499 | - |
1500 | - To do so, attach the following notices to the program. It is safest |
1501 | -to attach them to the start of each source file to most effectively |
1502 | -state the exclusion of warranty; and each file should have at least |
1503 | -the "copyright" line and a pointer to where the full notice is found. |
1504 | - |
1505 | - <one line to give the program's name and a brief idea of what it does.> |
1506 | - Copyright (C) <year> <name of author> |
1507 | - |
1508 | - This program is free software: you can redistribute it and/or modify |
1509 | - it under the terms of the GNU Affero General Public License as published by |
1510 | - the Free Software Foundation, either version 3 of the License, or |
1511 | - (at your option) any later version. |
1512 | - |
1513 | - This program is distributed in the hope that it will be useful, |
1514 | - but WITHOUT ANY WARRANTY; without even the implied warranty of |
1515 | - MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the |
1516 | - GNU Affero General Public License for more details. |
1517 | - |
1518 | - You should have received a copy of the GNU Affero General Public License |
1519 | - along with this program. If not, see <http://www.gnu.org/licenses/>. |
1520 | - |
1521 | -Also add information on how to contact you by electronic and paper mail. |
1522 | - |
1523 | - If your software can interact with users remotely through a computer |
1524 | -network, you should also make sure that it provides a way for users to |
1525 | -get its source. For example, if your program is a web application, its |
1526 | -interface could display a "Source" link that leads users to an archive |
1527 | -of the code. There are many ways you could offer source, and different |
1528 | -solutions will be better for different programs; see section 13 for the |
1529 | -specific requirements. |
1530 | - |
1531 | - You should also get your employer (if you work as a programmer) or school, |
1532 | -if any, to sign a "copyright disclaimer" for the program, if necessary. |
1533 | -For more information on this, and how to apply and follow the GNU AGPL, see |
1534 | -<http://www.gnu.org/licenses/>. |
1535 | - |
1536 | -========================================================================= |
1537 | |
1538 | === modified file 'example/usso_example.go' |
1539 | --- example/usso_example.go 2013-01-21 16:57:31 +0000 |
1540 | +++ example/usso_example.go 2013-01-25 16:44:31 +0000 |
1541 | @@ -1,23 +1,27 @@ |
1542 | package main |
1543 | |
1544 | import ( |
1545 | + "bytes" |
1546 | "encoding/json" |
1547 | "fmt" |
1548 | + "io/ioutil" |
1549 | "launchpad.net/usso" |
1550 | + "net/http" |
1551 | ) |
1552 | |
1553 | -var email string |
1554 | -var password string |
1555 | -var tokenName string |
1556 | +var email, password, tokenName, signature_method string |
1557 | |
1558 | func inputParams() { |
1559 | - fmt.Println("This application will query the staging Ubuntu SSO Server to fetch authorisation tokens.") |
1560 | + fmt.Println("This application will query the staging Ubuntu SSO Server" + |
1561 | + " to fetch authorisation tokens.") |
1562 | fmt.Print("Enter email: ") |
1563 | fmt.Scanf("%s", &email) |
1564 | fmt.Print("Enter password: ") |
1565 | fmt.Scanf("%s", &password) |
1566 | fmt.Print("Enter token name: ") |
1567 | fmt.Scanf("%s", &tokenName) |
1568 | + fmt.Print("Enter signature method (PLAINTEXT or HMAC-SHA1): ") |
1569 | + fmt.Scanf("%s", &signature_method) |
1570 | } |
1571 | |
1572 | func main() { |
1573 | @@ -26,16 +30,46 @@ |
1574 | // Fetch the tokens using usso.GetToken. |
1575 | fmt.Println("Fetching tokens from staging server...") |
1576 | server := usso.StagingUbuntuSSOServer |
1577 | - // One would use server := usso.ProductionUbuntuSSOServer to use the production Ubuntu SSO Server. |
1578 | - token, err := server.GetToken(email, password, tokenName) |
1579 | + // One would use server := usso.ProductionUbuntuSSOServer |
1580 | + // to use the production Ubuntu SSO Server. |
1581 | + ssodata, err := server.GetToken(email, password, tokenName) |
1582 | if err != nil { |
1583 | panic(err) |
1584 | } |
1585 | // Format the result as json for displaying it: |
1586 | - json_token, err := json.Marshal(token) |
1587 | + json_token, err := json.Marshal(ssodata) |
1588 | if err != nil { |
1589 | panic(err) |
1590 | } |
1591 | fmt.Printf("Got tokens: %s\n", json_token) |
1592 | |
1593 | + // This would be the easiest way to get the account data. |
1594 | + //accounts, _ := server.GetAccounts(ssodata) |
1595 | + //fmt.Printf("Got accounts info: %s\n", accounts) |
1596 | + |
1597 | + // But this shows how to sign a generic request. |
1598 | + ssodata.BaseURL = fmt.Sprintf( |
1599 | + "https://login.staging.ubuntu.com/api/v2/accounts/%s", |
1600 | + ssodata.ConsumerKey) |
1601 | + ssodata.HTTPMethod = "GET" |
1602 | + ssodata.SignatureMethod = signature_method |
1603 | + request, _ := http.NewRequest(ssodata.HTTPMethod, ssodata.BaseURL, nil) |
1604 | + usso.SignRequest(ssodata, request) |
1605 | + |
1606 | + if err != nil { |
1607 | + fmt.Printf("Error: %s\n", err) |
1608 | + } |
1609 | + // run the request |
1610 | + client := &http.Client{} |
1611 | + response, err := client.Do(request) |
1612 | + if err != nil { |
1613 | + fmt.Printf("Error: %s\n", err) |
1614 | + } |
1615 | + body, err := ioutil.ReadAll(response.Body) |
1616 | + if err != nil { |
1617 | + fmt.Println(err) |
1618 | + } |
1619 | + var b bytes.Buffer |
1620 | + b.Write(body) |
1621 | + fmt.Printf("response: %+v\n", b.String()) |
1622 | } |
1623 | |
1624 | === added file 'oauth.go' |
1625 | --- oauth.go 1970-01-01 00:00:00 +0000 |
1626 | +++ oauth.go 2013-01-25 16:44:31 +0000 |
1627 | @@ -0,0 +1,127 @@ |
1628 | +package usso |
1629 | + |
1630 | +import ( |
1631 | + "crypto/hmac" |
1632 | + "crypto/sha1" |
1633 | + "encoding/base64" |
1634 | + "errors" |
1635 | + "fmt" |
1636 | + "math/rand" |
1637 | + "net/http" |
1638 | + "net/url" |
1639 | + "strconv" |
1640 | + "time" |
1641 | +) |
1642 | + |
1643 | +func init() { |
1644 | + // Initialize the random generator. |
1645 | + rand.Seed(time.Now().UTC().UnixNano()) |
1646 | +} |
1647 | + |
1648 | +func timestamp() string { |
1649 | + // Create a timestamp used in authorization header. |
1650 | + return strconv.Itoa(int(time.Now().Unix())) |
1651 | +} |
1652 | + |
1653 | +func nonce() string { |
1654 | + // Create a nonce used in authorization header. |
1655 | + return strconv.Itoa(rand.Intn(100000000)) |
1656 | +} |
1657 | + |
1658 | +type SSOData struct { |
1659 | + // Contains the oauth data to perform a request. |
1660 | + HTTPMethod string `json:"-"` |
1661 | + BaseURL string `json:"-"` |
1662 | + Params url.Values `json:"-"` |
1663 | + Nonce string `json:"-"` |
1664 | + Timestamp string `json:"-"` |
1665 | + SignatureMethod string `json:"-"` |
1666 | + ConsumerKey string `json:"consumer_key"` |
1667 | + ConsumerSecret string `json:"consumer_secret"` |
1668 | + TokenKey string `json:"token_key"` |
1669 | + TokenName string `json:"token_name"` |
1670 | + TokenSecret string `json:"token_secret"` |
1671 | +} |
1672 | + |
1673 | +func (oauth *SSOData) signature() (string, error) { |
1674 | + // Depending on the signature method, create the signature from the |
1675 | + // consumer secret, the token secret and, if required, the URL. |
1676 | + // Supported signature methods are PLAINTEXT and HMAC-SHA1. |
1677 | + |
1678 | + switch oauth.SignatureMethod { |
1679 | + case "PLAINTEXT": |
1680 | + return fmt.Sprintf( |
1681 | + `%s%%26%s`, |
1682 | + oauth.ConsumerSecret, |
1683 | + oauth.TokenSecret), nil |
1684 | + case "HMAC-SHA1": |
1685 | + base_url, err := NormalizeURL(oauth.BaseURL) |
1686 | + if err != nil { |
1687 | + return "", err |
1688 | + } |
1689 | + params, err := NormalizeParameters(oauth.Params) |
1690 | + if err != nil { |
1691 | + return "", err |
1692 | + } |
1693 | + base_string := fmt.Sprintf(`%s&%s&%s%s%s%s%s%s%s`, |
1694 | + oauth.HTTPMethod, |
1695 | + url.QueryEscape(base_url), |
1696 | + url.QueryEscape(params), |
1697 | + url.QueryEscape("oauth_consumer_key="+oauth.ConsumerKey), |
1698 | + url.QueryEscape("&oauth_nonce="+oauth.Nonce), |
1699 | + url.QueryEscape("&oauth_signature_method="+oauth.SignatureMethod), |
1700 | + url.QueryEscape("&oauth_timestamp="+oauth.Timestamp), |
1701 | + url.QueryEscape("&oauth_token="+oauth.TokenKey), |
1702 | + url.QueryEscape("&oauth_version=1.0")) |
1703 | + hashfun := hmac.New(sha1.New, []byte( |
1704 | + oauth.ConsumerSecret+"&"+oauth.TokenSecret)) |
1705 | + hashfun.Write([]byte(base_string)) |
1706 | + rawsignature := hashfun.Sum(nil) |
1707 | + base64signature := make( |
1708 | + []byte, base64.StdEncoding.EncodedLen(len(rawsignature))) |
1709 | + base64.StdEncoding.Encode(base64signature, rawsignature) |
1710 | + return string(base64signature), nil |
1711 | + default: |
1712 | + return "", errors.New( |
1713 | + "usso/oauth: Oauth Signature Method not supported.") |
1714 | + } |
1715 | + return "", nil |
1716 | +} |
1717 | + |
1718 | +func (oauth *SSOData) GetAuthorizationHeader() (string, error) { |
1719 | + // Sign the provided request. |
1720 | + if oauth.Nonce == "" { |
1721 | + oauth.Nonce = nonce() |
1722 | + } |
1723 | + if oauth.Timestamp == "" { |
1724 | + oauth.Timestamp = timestamp() |
1725 | + } |
1726 | + signature, err := oauth.signature() |
1727 | + if err != nil { |
1728 | + return "", err |
1729 | + } |
1730 | + auth := fmt.Sprintf( |
1731 | + `OAuth realm="API", `+ |
1732 | + `oauth_consumer_key="%s", `+ |
1733 | + `oauth_token="%s", `+ |
1734 | + `oauth_signature_method="%s", `+ |
1735 | + `oauth_signature="%s", `+ |
1736 | + `oauth_timestamp="%s", `+ |
1737 | + `oauth_nonce="%s", `+ |
1738 | + `oauth_version="1.0"`, |
1739 | + url.QueryEscape(oauth.ConsumerKey), |
1740 | + url.QueryEscape(oauth.TokenKey), |
1741 | + oauth.SignatureMethod, |
1742 | + signature, |
1743 | + url.QueryEscape(oauth.Timestamp), |
1744 | + url.QueryEscape(oauth.Nonce)) |
1745 | + |
1746 | + return auth, nil |
1747 | +} |
1748 | + |
1749 | +func (oauth *SSOData) SignRequest(req *http.Request) error { |
1750 | + // Sign the provided request. |
1751 | + auth, error := oauth.GetAuthorizationHeader() |
1752 | + req.Header.Add("Authorization", auth) |
1753 | + return error |
1754 | +} |
1755 | |
1756 | === added file 'oauth_test.go' |
1757 | --- oauth_test.go 1970-01-01 00:00:00 +0000 |
1758 | +++ oauth_test.go 2013-01-25 16:44:31 +0000 |
1759 | @@ -0,0 +1,52 @@ |
1760 | +package usso |
1761 | + |
1762 | +import ( |
1763 | + . "launchpad.net/gocheck" |
1764 | + "net/http" |
1765 | + "net/url" |
1766 | +) |
1767 | + |
1768 | +func (suite *USSOTestSuite) TestSignRequestPlainText(c *C) { |
1769 | + baseUrl := "https://localhost" |
1770 | + ssodata := SSOData{BaseURL: baseUrl, ConsumerKey: consumerKey, |
1771 | + ConsumerSecret: consumerSecret, TokenKey: tokenKey, |
1772 | + TokenName: tokenName, TokenSecret: tokenSecret} |
1773 | + request, _ := http.NewRequest("GET", baseUrl, nil) |
1774 | + ssodata.HTTPMethod = "GET" |
1775 | + ssodata.SignatureMethod = "PLAINTEXT" |
1776 | + err := ssodata.SignRequest(request) |
1777 | + c.Assert(err, IsNil) |
1778 | + authHeader := request.Header["Authorization"][0] |
1779 | + c.Assert(authHeader, Matches, `^OAuth.*`) |
1780 | + c.Assert(authHeader, Matches, `.*realm="API".*`) |
1781 | + c.Assert(authHeader, Matches, |
1782 | + `.*oauth_consumer_key="`+url.QueryEscape(ssodata.ConsumerKey)+`".*`) |
1783 | + c.Assert(authHeader, Matches, |
1784 | + `.*oauth_token="`+url.QueryEscape(ssodata.TokenKey)+`".*`) |
1785 | + c.Assert(authHeader, Matches, |
1786 | + `.*oauth_signature="`+url.QueryEscape( |
1787 | + ssodata.ConsumerSecret+`&`+ssodata.TokenSecret)+`.*`) |
1788 | +} |
1789 | + |
1790 | +func (suite *USSOTestSuite) TestSignRequestSHA1(c *C) { |
1791 | + // Test the request signing with oauth_signature_method = SHA1 |
1792 | + baseUrl := "https://localhost" |
1793 | + ssodata := SSOData{BaseURL: baseUrl, ConsumerKey: consumerKey, |
1794 | + ConsumerSecret: consumerSecret, TokenKey: tokenKey, |
1795 | + TokenName: tokenName, TokenSecret: tokenSecret, |
1796 | + Nonce: "10888885", Timestamp: "1358853126"} |
1797 | + request, _ := http.NewRequest("GET", baseUrl, nil) |
1798 | + ssodata.HTTPMethod = "GET" |
1799 | + ssodata.SignatureMethod = "HMAC-SHA1" |
1800 | + err := ssodata.SignRequest(request) |
1801 | + c.Assert(err, IsNil) |
1802 | + authHeader := request.Header["Authorization"][0] |
1803 | + c.Assert(authHeader, Matches, `^OAuth.*`) |
1804 | + c.Assert(authHeader, Matches, `.*realm="API".*`) |
1805 | + c.Assert(authHeader, Matches, |
1806 | + `.*oauth_consumer_key="`+url.QueryEscape(ssodata.ConsumerKey)+`".*`) |
1807 | + c.Assert(authHeader, Matches, |
1808 | + `.*oauth_token="`+url.QueryEscape(ssodata.TokenKey)+`".*`) |
1809 | + c.Assert(authHeader, Matches, |
1810 | + `.*oauth_signature="`+"amJnYeek4G9ObTgTiE2y6cwTyPg="+`.*`) |
1811 | +} |
1812 | |
1813 | === added file 'url.go' |
1814 | --- url.go 1970-01-01 00:00:00 +0000 |
1815 | +++ url.go 2013-01-25 16:44:31 +0000 |
1816 | @@ -0,0 +1,41 @@ |
1817 | +package usso |
1818 | + |
1819 | +import ( |
1820 | + "fmt" |
1821 | + "net/url" |
1822 | + "strings" |
1823 | +) |
1824 | + |
1825 | +func normalizeHost(scheme, host_spec string) string { |
1826 | + standard_ports := map[string]string{ |
1827 | + "http": "80", |
1828 | + "https": "443", |
1829 | + } |
1830 | + host_parts := strings.Split(host_spec, ":") |
1831 | + if len(host_parts) == 2 && host_parts[1] == standard_ports[scheme] { |
1832 | + // There's a port, but it's the default one. Leave it out. |
1833 | + return host_parts[0] |
1834 | + } |
1835 | + return host_spec |
1836 | +} |
1837 | + |
1838 | +func NormalizeURL(input_url string) (string, error) { |
1839 | + parsed_url, err := url.Parse(input_url) |
1840 | + if err != nil { |
1841 | + return "", err |
1842 | + } |
1843 | + |
1844 | + host := normalizeHost(parsed_url.Scheme, parsed_url.Host) |
1845 | + normalized_url := fmt.Sprintf("%v://%v%v", parsed_url.Scheme, host, parsed_url.Path) |
1846 | + return normalized_url, nil |
1847 | +} |
1848 | + |
1849 | +func NormalizeParameters(parameters url.Values) (string, error) { |
1850 | + filtered_map := make(url.Values, len(parameters)) |
1851 | + for param, value := range parameters { |
1852 | + if param != "oauth_signature" { |
1853 | + filtered_map[param] = value |
1854 | + } |
1855 | + } |
1856 | + return filtered_map.Encode(), nil |
1857 | +} |
1858 | |
1859 | === added file 'url_test.go' |
1860 | --- url_test.go 1970-01-01 00:00:00 +0000 |
1861 | +++ url_test.go 2013-01-25 16:44:31 +0000 |
1862 | @@ -0,0 +1,84 @@ |
1863 | +package usso |
1864 | + |
1865 | +import ( |
1866 | + "launchpad.net/gocheck" |
1867 | + "net/url" |
1868 | +) |
1869 | + |
1870 | +func (suite *USSOTestSuite) TestNormalizeURLReturnsBasicURL(c *gocheck.C) { |
1871 | + output, err := NormalizeURL("http://example.com/path") |
1872 | + c.Check(err, gocheck.Equals, nil) |
1873 | + c.Check(output, gocheck.Equals, "http://example.com/path") |
1874 | +} |
1875 | + |
1876 | +func (suite *USSOTestSuite) TestNormalizeURLStripsStandardHTTPPort( |
1877 | + c *gocheck.C) { |
1878 | + output, err := NormalizeURL("http://example.com:80/path") |
1879 | + c.Check(err, gocheck.Equals, nil) |
1880 | + c.Check(output, gocheck.Equals, "http://example.com/path") |
1881 | +} |
1882 | + |
1883 | +func (suite *USSOTestSuite) TestNormalizeURLStripsStandardHTTPSPort( |
1884 | + c *gocheck.C) { |
1885 | + output, err := NormalizeURL("https://example.com:443/path") |
1886 | + c.Check(err, gocheck.Equals, nil) |
1887 | + c.Check(output, gocheck.Equals, "https://example.com/path") |
1888 | +} |
1889 | + |
1890 | +func (suite *USSOTestSuite) TestNormalizeURLLeavesNonstandardPort( |
1891 | + c *gocheck.C) { |
1892 | + output, err := NormalizeURL("http://example.com:8080/") |
1893 | + c.Check(err, gocheck.Equals, nil) |
1894 | + c.Check(output, gocheck.Equals, "http://example.com:8080/") |
1895 | +} |
1896 | + |
1897 | +func (suite *USSOTestSuite) TestNormalizeURLStripsParameters(c *gocheck.C) { |
1898 | + output, err := NormalizeURL("http://example.com/path?query=value¶m=arg") |
1899 | + c.Check(err, gocheck.Equals, nil) |
1900 | + c.Check(output, gocheck.Equals, "http://example.com/path") |
1901 | +} |
1902 | + |
1903 | +func (suite *USSOTestSuite) TestNormalizeParametersReturnsParameters( |
1904 | + c *gocheck.C) { |
1905 | + output, err := NormalizeParameters(url.Values{"param": []string{"value"}}) |
1906 | + c.Check(err, gocheck.Equals, nil) |
1907 | + c.Check(output, gocheck.Equals, "param=value") |
1908 | +} |
1909 | + |
1910 | +func (suite *USSOTestSuite) TestNormalizeParametersConcatenatesParameters( |
1911 | + c *gocheck.C) { |
1912 | + output, err := NormalizeParameters( |
1913 | + url.Values{"a": []string{"1"}, "b": []string{"2"}}) |
1914 | + c.Check(err, gocheck.Equals, nil) |
1915 | + c.Check(output, gocheck.Matches, "(a=1&b=2|b=2&a=1)") |
1916 | +} |
1917 | + |
1918 | +func (suite *USSOTestSuite) TestNormalizeParametersSortsParameters( |
1919 | + c *gocheck.C) { |
1920 | + params := url.Values{ |
1921 | + "b": []string{"x"}, |
1922 | + "a": []string{"y"}, |
1923 | + } |
1924 | + output, err := NormalizeParameters(params) |
1925 | + c.Check(err, gocheck.Equals, nil) |
1926 | + c.Check(output, gocheck.Matches, "(a=y&b=x|b=x&a=y)") |
1927 | +} |
1928 | + |
1929 | +func (suite *USSOTestSuite) TestNormalizeParametersEscapesParameters( |
1930 | + c *gocheck.C) { |
1931 | + output, err := NormalizeParameters(url.Values{"a&b": []string{"1"}}) |
1932 | + c.Check(err, gocheck.Equals, nil) |
1933 | + c.Check(output, gocheck.Equals, "a%26b=1") |
1934 | +} |
1935 | + |
1936 | +func (suite *USSOTestSuite) TestNormalizeParametersOmitsOAuthSignature( |
1937 | + c *gocheck.C) { |
1938 | + params := url.Values{ |
1939 | + "a": []string{"1"}, |
1940 | + "oauth_signature": []string{"foobarsplatszot"}, |
1941 | + "z": []string{"26"}, |
1942 | + } |
1943 | + output, err := NormalizeParameters(params) |
1944 | + c.Check(err, gocheck.Equals, nil) |
1945 | + c.Check(output, gocheck.Matches, "(a=1&z=26|z=26&a=1)") |
1946 | +} |
1947 | |
1948 | === modified file 'usso.go' |
1949 | --- usso.go 2013-01-22 10:39:12 +0000 |
1950 | +++ usso.go 2013-01-25 16:44:31 +0000 |
1951 | @@ -1,16 +1,13 @@ |
1952 | -// Copyright 2013 Canonical Ltd. This software is licensed under the |
1953 | -// GNU Affero General Public License version 3 (see the file LICENSE). |
1954 | - |
1955 | package usso |
1956 | |
1957 | import ( |
1958 | + "bytes" |
1959 | "encoding/json" |
1960 | + "fmt" |
1961 | "io/ioutil" |
1962 | "log" |
1963 | "math/rand" |
1964 | "net/http" |
1965 | - "net/url" |
1966 | - "strconv" |
1967 | "strings" |
1968 | "time" |
1969 | ) |
1970 | @@ -29,6 +26,12 @@ |
1971 | return server.baseUrl + "/api/v2/tokens" |
1972 | } |
1973 | |
1974 | +// AccountURL returns the URL where the Ubuntu SSO account information can be |
1975 | +// requested. |
1976 | +func (server UbuntuSSOServer) AccountsURL() string { |
1977 | + return server.baseUrl + "/api/v2/accounts/" |
1978 | +} |
1979 | + |
1980 | // ProductionUbuntuSSOServer represents the production Ubuntu SSO server |
1981 | // located at https://login.ubuntu.com. |
1982 | var ProductionUbuntuSSOServer = UbuntuSSOServer{"https://login.ubuntu.com"} |
1983 | @@ -37,16 +40,10 @@ |
1984 | // at https://login.staging.ubuntu.com. Use it for testing. |
1985 | var StagingUbuntuSSOServer = UbuntuSSOServer{"https://login.staging.ubuntu.com"} |
1986 | |
1987 | -type SSOData struct { |
1988 | - BaseURL string |
1989 | - ConsumerKey string `json:"consumer_key"` |
1990 | - ConsumerSecret string `json:"consumer_secret"` |
1991 | - TokenKey string `json:"token_key"` |
1992 | - TokenName string `json:"token_name"` |
1993 | - TokenSecret string `json:"token_secret"` |
1994 | -} |
1995 | - |
1996 | -func (server UbuntuSSOServer) GetToken(email string, password string, tokenName string) (*SSOData, error) { |
1997 | +func (server UbuntuSSOServer) GetToken( |
1998 | + // Giving user credentials and token name, retrieves oauth credentials |
1999 | + // for the users, the oauth credentials can be used later to sign requests. |
2000 | + email string, password string, tokenName string) (*SSOData, error) { |
2001 | credentials := map[string]string{ |
2002 | "email": email, |
2003 | "password": password, |
2004 | @@ -78,17 +75,40 @@ |
2005 | return &ssodata, nil |
2006 | } |
2007 | |
2008 | -func (oauth *SSOData) Sign(req *http.Request) error { |
2009 | - // Sign the provided request. |
2010 | - auth := `OAuth realm="API", ` + |
2011 | - `oauth_consumer_key="` + url.QueryEscape(oauth.ConsumerKey) + `", ` + |
2012 | - `oauth_token="` + url.QueryEscape(oauth.TokenKey) + `", ` + |
2013 | - `oauth_signature_method="PLAINTEXT", ` + |
2014 | - `oauth_signature="` + url.QueryEscape( |
2015 | - oauth.ConsumerSecret+`&`+oauth.TokenSecret) + `", ` + |
2016 | - `oauth_timestamp="` + strconv.FormatInt(time.Now().Unix(), 10) + `", ` + |
2017 | - `oauth_nonce="` + strconv.Itoa(int(rand.Intn(99999999))) + `", ` + |
2018 | - `oauth_version="1.0"` |
2019 | - req.Header.Add("Authorization", auth) |
2020 | - return nil |
2021 | +func (server UbuntuSSOServer) GetAccounts(ssodata *SSOData) (string, error) { |
2022 | + // Returns all the Ubuntu SSO information related to this account. |
2023 | + ssodata.BaseURL = server.AccountsURL() + ssodata.ConsumerKey |
2024 | + ssodata.HTTPMethod = "GET" |
2025 | + ssodata.SignatureMethod = "HMAC-SHA1" |
2026 | + request, err := http.NewRequest(ssodata.HTTPMethod, ssodata.BaseURL, nil) |
2027 | + if err != nil { |
2028 | + return "", err |
2029 | + } |
2030 | + err = SignRequest(ssodata, request) |
2031 | + if err != nil { |
2032 | + return "", err |
2033 | + } |
2034 | + client := &http.Client{} |
2035 | + response, err := client.Do(request) |
2036 | + if err != nil { |
2037 | + fmt.Printf("Error: %s\n", err) |
2038 | + } |
2039 | + body, err := ioutil.ReadAll(response.Body) |
2040 | + if err != nil { |
2041 | + fmt.Println(err) |
2042 | + } |
2043 | + var b bytes.Buffer |
2044 | + b.Write(body) |
2045 | + return fmt.Sprint(b.String()), nil |
2046 | +} |
2047 | + |
2048 | +func SignRequest(ssodata *SSOData, request *http.Request) error { |
2049 | + // Given oauth credentials and a request, return it signed. |
2050 | + return ssodata.SignRequest(request) |
2051 | +} |
2052 | + |
2053 | +func GetAuthorizationHeader(ssodata *SSOData) (string, error) { |
2054 | + // Given oauth credentials return a valid http authorization header. |
2055 | + header, err := ssodata.GetAuthorizationHeader() |
2056 | + return header, err |
2057 | } |
2058 | |
2059 | === modified file 'usso_test.go' |
2060 | --- usso_test.go 2013-01-22 10:39:12 +0000 |
2061 | +++ usso_test.go 2013-01-25 16:44:31 +0000 |
2062 | @@ -1,6 +1,3 @@ |
2063 | -// Copyright 2013 Canonical Ltd. This software is licensed under the |
2064 | -// GNU Affero General Public License version 3 (see the file LICENSE). |
2065 | - |
2066 | package usso |
2067 | |
2068 | import ( |
2069 | @@ -10,7 +7,6 @@ |
2070 | . "launchpad.net/gocheck" |
2071 | "net/http" |
2072 | "net/http/httptest" |
2073 | - "net/url" |
2074 | "testing" |
2075 | ) |
2076 | |
2077 | @@ -49,7 +45,8 @@ |
2078 | |
2079 | // newSingleServingServer create a single-serving test http server which will |
2080 | // return only one response as defined by the passed arguments. |
2081 | -func newSingleServingServer(uri string, response string, code int) *SingleServingServer { |
2082 | +func newSingleServingServer( |
2083 | + uri string, response string, code int) *SingleServingServer { |
2084 | var requestContent string |
2085 | var requested bool |
2086 | handler := func(w http.ResponseWriter, r *http.Request) { |
2087 | @@ -89,16 +86,19 @@ |
2088 | if err != nil { |
2089 | panic(err) |
2090 | } |
2091 | - server := newSingleServingServer("/api/v2/tokens", string(jsonServerResponseData), 200) |
2092 | + server := newSingleServingServer("/api/v2/tokens", |
2093 | + string(jsonServerResponseData), 200) |
2094 | var testSSOServer = &UbuntuSSOServer{server.URL} |
2095 | defer server.Close() |
2096 | |
2097 | // The returned information is correct. |
2098 | ssodata, err := testSSOServer.GetToken(email, password, tokenName) |
2099 | c.Assert(err, IsNil) |
2100 | - expectedSSOData := &SSOData{ConsumerKey: consumerKey, ConsumerSecret: consumerSecret, TokenKey: tokenKey, TokenSecret: tokenSecret, TokenName: tokenName} |
2101 | + expectedSSOData := &SSOData{ConsumerKey: consumerKey, |
2102 | + ConsumerSecret: consumerSecret, TokenKey: tokenKey, |
2103 | + TokenSecret: tokenSecret, TokenName: tokenName} |
2104 | c.Assert(ssodata, DeepEquals, expectedSSOData) |
2105 | - // The request that the fake Ubuntu SSO Server got contained the credentials. |
2106 | + //The request that the fake Ubuntu SSO Server got contained the credentials. |
2107 | credentials := map[string]string{ |
2108 | "email": email, |
2109 | "password": password, |
2110 | @@ -110,18 +110,3 @@ |
2111 | } |
2112 | c.Assert(*server.requestContent, Equals, string(expectedRequestContent)) |
2113 | } |
2114 | - |
2115 | -func (suite *USSOTestSuite) TestSignRequestPlainText(c *C) { |
2116 | - baseUrl := "https://localhost" |
2117 | - ssoData := SSOData{BaseURL: baseUrl, ConsumerKey: consumerKey, ConsumerSecret: consumerSecret, TokenKey: tokenKey, TokenName: tokenName, TokenSecret: tokenSecret} |
2118 | - request, _ := http.NewRequest("GET", baseUrl, nil) |
2119 | - |
2120 | - err := ssoData.Sign(request) |
2121 | - |
2122 | - c.Assert(err, IsNil) |
2123 | - authHeader := request.Header["Authorization"][0] |
2124 | - c.Assert(authHeader, Matches, `.*OAuth realm="API".*`) |
2125 | - c.Assert(authHeader, Matches, `.*oauth_consumer_key="`+url.QueryEscape(ssoData.ConsumerKey)+`".*`) |
2126 | - c.Assert(authHeader, Matches, `.*oauth_token="`+url.QueryEscape(ssoData.TokenKey)+`".*`) |
2127 | - c.Assert(authHeader, Matches, `.*oauth_signature="`+url.QueryEscape(ssoData.ConsumerSecret+`&`+ssoData.TokenSecret)+`.*`) |
2128 | -} |