summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorLuke Shumaker <lukeshu@sbcglobal.net>2014-11-28 15:17:16 -0500
committerLuke Shumaker <lukeshu@sbcglobal.net>2014-11-28 15:17:16 -0500
commitd8c48a5aae8f3561cec14f7f08c35fc3619ef00a (patch)
treec0c11cefff91cb8d34deb1091d4d02a1bb71f3d0
parentc9618dfe442305531ee6cab9660333f4a697e094 (diff)
foo
-rw-r--r--COPYING518
-rw-r--r--COPYING.GPL3674
-rw-r--r--COPYING.LGPL21504
-rw-r--r--common/inotify_helpers.c92
-rw-r--r--common/inotify_helpers.h80
-rw-r--r--nslcd/common.h19
-rw-r--r--nslcd/db_pam.c258
-rw-r--r--nslcd/db_passwd.c36
-rw-r--r--nslcd/hackers_parse.c214
-rw-r--r--nslcd/hackers_parse.h32
-rw-r--r--nslcd/hackers_watch.c188
-rw-r--r--nslcd/hackers_watch.h21
-rw-r--r--nslcd/inotify_helper.c51
-rw-r--r--nslcd/inotify_iterator.h78
-rw-r--r--utils/hackers-chpassword.c0
15 files changed, 2104 insertions, 661 deletions
diff --git a/COPYING b/COPYING
index 5ab7695..6e72b31 100644
--- a/COPYING
+++ b/COPYING
@@ -1,504 +1,14 @@
- GNU LESSER GENERAL PUBLIC LICENSE
- Version 2.1, February 1999
-
- Copyright (C) 1991, 1999 Free Software Foundation, Inc.
- 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA
- Everyone is permitted to copy and distribute verbatim copies
- of this license document, but changing it is not allowed.
-
-[This is the first released version of the Lesser GPL. It also counts
- as the successor of the GNU Library Public License, version 2, hence
- the version number 2.1.]
-
- Preamble
-
- The licenses for most software are designed to take away your
-freedom to share and change it. By contrast, the GNU General Public
-Licenses are intended to guarantee your freedom to share and change
-free software--to make sure the software is free for all its users.
-
- This license, the Lesser General Public License, applies to some
-specially designated software packages--typically libraries--of the
-Free Software Foundation and other authors who decide to use it. You
-can use it too, but we suggest you first think carefully about whether
-this license or the ordinary General Public License is the better
-strategy to use in any particular case, based on the explanations below.
-
- When we speak of free software, we are referring to freedom of use,
-not price. Our General Public Licenses are designed to make sure that
-you have the freedom to distribute copies of free software (and charge
-for this service if you wish); that you receive source code or can get
-it if you want it; that you can change the software and use pieces of
-it in new free programs; and that you are informed that you can do
-these things.
-
- To protect your rights, we need to make restrictions that forbid
-distributors to deny you these rights or to ask you to surrender these
-rights. These restrictions translate to certain responsibilities for
-you if you distribute copies of the library or if you modify it.
-
- For example, if you distribute copies of the library, whether gratis
-or for a fee, you must give the recipients all the rights that we gave
-you. You must make sure that they, too, receive or can get the source
-code. If you link other code with the library, you must provide
-complete object files to the recipients, so that they can relink them
-with the library after making changes to the library and recompiling
-it. And you must show them these terms so they know their rights.
-
- We protect your rights with a two-step method: (1) we copyright the
-library, and (2) we offer you this license, which gives you legal
-permission to copy, distribute and/or modify the library.
-
- To protect each distributor, we want to make it very clear that
-there is no warranty for the free library. Also, if the library is
-modified by someone else and passed on, the recipients should know
-that what they have is not the original version, so that the original
-author's reputation will not be affected by problems that might be
-introduced by others.
-
- Finally, software patents pose a constant threat to the existence of
-any free program. We wish to make sure that a company cannot
-effectively restrict the users of a free program by obtaining a
-restrictive license from a patent holder. Therefore, we insist that
-any patent license obtained for a version of the library must be
-consistent with the full freedom of use specified in this license.
-
- Most GNU software, including some libraries, is covered by the
-ordinary GNU General Public License. This license, the GNU Lesser
-General Public License, applies to certain designated libraries, and
-is quite different from the ordinary General Public License. We use
-this license for certain libraries in order to permit linking those
-libraries into non-free programs.
-
- When a program is linked with a library, whether statically or using
-a shared library, the combination of the two is legally speaking a
-combined work, a derivative of the original library. The ordinary
-General Public License therefore permits such linking only if the
-entire combination fits its criteria of freedom. The Lesser General
-Public License permits more lax criteria for linking other code with
-the library.
-
- We call this license the "Lesser" General Public License because it
-does Less to protect the user's freedom than the ordinary General
-Public License. It also provides other free software developers Less
-of an advantage over competing non-free programs. These disadvantages
-are the reason we use the ordinary General Public License for many
-libraries. However, the Lesser license provides advantages in certain
-special circumstances.
-
- For example, on rare occasions, there may be a special need to
-encourage the widest possible use of a certain library, so that it becomes
-a de-facto standard. To achieve this, non-free programs must be
-allowed to use the library. A more frequent case is that a free
-library does the same job as widely used non-free libraries. In this
-case, there is little to gain by limiting the free library to free
-software only, so we use the Lesser General Public License.
-
- In other cases, permission to use a particular library in non-free
-programs enables a greater number of people to use a large body of
-free software. For example, permission to use the GNU C Library in
-non-free programs enables many more people to use the whole GNU
-operating system, as well as its variant, the GNU/Linux operating
-system.
-
- Although the Lesser General Public License is Less protective of the
-users' freedom, it does ensure that the user of a program that is
-linked with the Library has the freedom and the wherewithal to run
-that program using a modified version of the Library.
-
- The precise terms and conditions for copying, distribution and
-modification follow. Pay close attention to the difference between a
-"work based on the library" and a "work that uses the library". The
-former contains code derived from the library, whereas the latter must
-be combined with the library in order to run.
-
- GNU LESSER GENERAL PUBLIC LICENSE
- TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION
-
- 0. This License Agreement applies to any software library or other
-program which contains a notice placed by the copyright holder or
-other authorized party saying it may be distributed under the terms of
-this Lesser General Public License (also called "this License").
-Each licensee is addressed as "you".
-
- A "library" means a collection of software functions and/or data
-prepared so as to be conveniently linked with application programs
-(which use some of those functions and data) to form executables.
-
- The "Library", below, refers to any such software library or work
-which has been distributed under these terms. A "work based on the
-Library" means either the Library or any derivative work under
-copyright law: that is to say, a work containing the Library or a
-portion of it, either verbatim or with modifications and/or translated
-straightforwardly into another language. (Hereinafter, translation is
-included without limitation in the term "modification".)
-
- "Source code" for a work means the preferred form of the work for
-making modifications to it. For a library, complete source code means
-all the source code for all modules it contains, plus any associated
-interface definition files, plus the scripts used to control compilation
-and installation of the library.
-
- Activities other than copying, distribution and modification are not
-covered by this License; they are outside its scope. The act of
-running a program using the Library is not restricted, and output from
-such a program is covered only if its contents constitute a work based
-on the Library (independent of the use of the Library in a tool for
-writing it). Whether that is true depends on what the Library does
-and what the program that uses the Library does.
-
- 1. You may copy and distribute verbatim copies of the Library's
-complete source code as you receive it, in any medium, provided that
-you conspicuously and appropriately publish on each copy an
-appropriate copyright notice and disclaimer of warranty; keep intact
-all the notices that refer to this License and to the absence of any
-warranty; and distribute a copy of this License along with the
-Library.
-
- You may charge a fee for the physical act of transferring a copy,
-and you may at your option offer warranty protection in exchange for a
-fee.
-
- 2. You may modify your copy or copies of the Library or any portion
-of it, thus forming a work based on the Library, and copy and
-distribute such modifications or work under the terms of Section 1
-above, provided that you also meet all of these conditions:
-
- a) The modified work must itself be a software library.
-
- b) You must cause the files modified to carry prominent notices
- stating that you changed the files and the date of any change.
-
- c) You must cause the whole of the work to be licensed at no
- charge to all third parties under the terms of this License.
-
- d) If a facility in the modified Library refers to a function or a
- table of data to be supplied by an application program that uses
- the facility, other than as an argument passed when the facility
- is invoked, then you must make a good faith effort to ensure that,
- in the event an application does not supply such function or
- table, the facility still operates, and performs whatever part of
- its purpose remains meaningful.
-
- (For example, a function in a library to compute square roots has
- a purpose that is entirely well-defined independent of the
- application. Therefore, Subsection 2d requires that any
- application-supplied function or table used by this function must
- be optional: if the application does not supply it, the square
- root function must still compute square roots.)
-
-These requirements apply to the modified work as a whole. If
-identifiable sections of that work are not derived from the Library,
-and can be reasonably considered independent and separate works in
-themselves, then this License, and its terms, do not apply to those
-sections when you distribute them as separate works. But when you
-distribute the same sections as part of a whole which is a work based
-on the Library, the distribution of the whole must be on the terms of
-this License, whose permissions for other licensees extend to the
-entire whole, and thus to each and every part regardless of who wrote
-it.
-
-Thus, it is not the intent of this section to claim rights or contest
-your rights to work written entirely by you; rather, the intent is to
-exercise the right to control the distribution of derivative or
-collective works based on the Library.
-
-In addition, mere aggregation of another work not based on the Library
-with the Library (or with a work based on the Library) on a volume of
-a storage or distribution medium does not bring the other work under
-the scope of this License.
-
- 3. You may opt to apply the terms of the ordinary GNU General Public
-License instead of this License to a given copy of the Library. To do
-this, you must alter all the notices that refer to this License, so
-that they refer to the ordinary GNU General Public License, version 2,
-instead of to this License. (If a newer version than version 2 of the
-ordinary GNU General Public License has appeared, then you can specify
-that version instead if you wish.) Do not make any other change in
-these notices.
-
- Once this change is made in a given copy, it is irreversible for
-that copy, so the ordinary GNU General Public License applies to all
-subsequent copies and derivative works made from that copy.
-
- This option is useful when you wish to copy part of the code of
-the Library into a program that is not a library.
-
- 4. You may copy and distribute the Library (or a portion or
-derivative of it, under Section 2) in object code or executable form
-under the terms of Sections 1 and 2 above provided that you accompany
-it with the complete corresponding machine-readable source code, which
-must be distributed under the terms of Sections 1 and 2 above on a
-medium customarily used for software interchange.
-
- If distribution of object code is made by offering access to copy
-from a designated place, then offering equivalent access to copy the
-source code from the same place satisfies the requirement to
-distribute the source code, even though third parties are not
-compelled to copy the source along with the object code.
-
- 5. A program that contains no derivative of any portion of the
-Library, but is designed to work with the Library by being compiled or
-linked with it, is called a "work that uses the Library". Such a
-work, in isolation, is not a derivative work of the Library, and
-therefore falls outside the scope of this License.
-
- However, linking a "work that uses the Library" with the Library
-creates an executable that is a derivative of the Library (because it
-contains portions of the Library), rather than a "work that uses the
-library". The executable is therefore covered by this License.
-Section 6 states terms for distribution of such executables.
-
- When a "work that uses the Library" uses material from a header file
-that is part of the Library, the object code for the work may be a
-derivative work of the Library even though the source code is not.
-Whether this is true is especially significant if the work can be
-linked without the Library, or if the work is itself a library. The
-threshold for this to be true is not precisely defined by law.
-
- If such an object file uses only numerical parameters, data
-structure layouts and accessors, and small macros and small inline
-functions (ten lines or less in length), then the use of the object
-file is unrestricted, regardless of whether it is legally a derivative
-work. (Executables containing this object code plus portions of the
-Library will still fall under Section 6.)
-
- Otherwise, if the work is a derivative of the Library, you may
-distribute the object code for the work under the terms of Section 6.
-Any executables containing that work also fall under Section 6,
-whether or not they are linked directly with the Library itself.
-
- 6. As an exception to the Sections above, you may also combine or
-link a "work that uses the Library" with the Library to produce a
-work containing portions of the Library, and distribute that work
-under terms of your choice, provided that the terms permit
-modification of the work for the customer's own use and reverse
-engineering for debugging such modifications.
-
- You must give prominent notice with each copy of the work that the
-Library is used in it and that the Library and its use are covered by
-this License. You must supply a copy of this License. If the work
-during execution displays copyright notices, you must include the
-copyright notice for the Library among them, as well as a reference
-directing the user to the copy of this License. Also, you must do one
-of these things:
-
- a) Accompany the work with the complete corresponding
- machine-readable source code for the Library including whatever
- changes were used in the work (which must be distributed under
- Sections 1 and 2 above); and, if the work is an executable linked
- with the Library, with the complete machine-readable "work that
- uses the Library", as object code and/or source code, so that the
- user can modify the Library and then relink to produce a modified
- executable containing the modified Library. (It is understood
- that the user who changes the contents of definitions files in the
- Library will not necessarily be able to recompile the application
- to use the modified definitions.)
-
- b) Use a suitable shared library mechanism for linking with the
- Library. A suitable mechanism is one that (1) uses at run time a
- copy of the library already present on the user's computer system,
- rather than copying library functions into the executable, and (2)
- will operate properly with a modified version of the library, if
- the user installs one, as long as the modified version is
- interface-compatible with the version that the work was made with.
-
- c) Accompany the work with a written offer, valid for at
- least three years, to give the same user the materials
- specified in Subsection 6a, above, for a charge no more
- than the cost of performing this distribution.
-
- d) If distribution of the work is made by offering access to copy
- from a designated place, offer equivalent access to copy the above
- specified materials from the same place.
-
- e) Verify that the user has already received a copy of these
- materials or that you have already sent this user a copy.
-
- For an executable, the required form of the "work that uses the
-Library" must include any data and utility programs needed for
-reproducing the executable from it. However, as a special exception,
-the materials to be distributed need not include anything that is
-normally distributed (in either source or binary form) with the major
-components (compiler, kernel, and so on) of the operating system on
-which the executable runs, unless that component itself accompanies
-the executable.
-
- It may happen that this requirement contradicts the license
-restrictions of other proprietary libraries that do not normally
-accompany the operating system. Such a contradiction means you cannot
-use both them and the Library together in an executable that you
-distribute.
-
- 7. You may place library facilities that are a work based on the
-Library side-by-side in a single library together with other library
-facilities not covered by this License, and distribute such a combined
-library, provided that the separate distribution of the work based on
-the Library and of the other library facilities is otherwise
-permitted, and provided that you do these two things:
-
- a) Accompany the combined library with a copy of the same work
- based on the Library, uncombined with any other library
- facilities. This must be distributed under the terms of the
- Sections above.
-
- b) Give prominent notice with the combined library of the fact
- that part of it is a work based on the Library, and explaining
- where to find the accompanying uncombined form of the same work.
-
- 8. You may not copy, modify, sublicense, link with, or distribute
-the Library except as expressly provided under this License. Any
-attempt otherwise to copy, modify, sublicense, link with, or
-distribute the Library is void, and will automatically terminate your
-rights under this License. However, parties who have received copies,
-or rights, from you under this License will not have their licenses
-terminated so long as such parties remain in full compliance.
-
- 9. You are not required to accept this License, since you have not
-signed it. However, nothing else grants you permission to modify or
-distribute the Library or its derivative works. These actions are
-prohibited by law if you do not accept this License. Therefore, by
-modifying or distributing the Library (or any work based on the
-Library), you indicate your acceptance of this License to do so, and
-all its terms and conditions for copying, distributing or modifying
-the Library or works based on it.
-
- 10. Each time you redistribute the Library (or any work based on the
-Library), the recipient automatically receives a license from the
-original licensor to copy, distribute, link with or modify the Library
-subject to these terms and conditions. You may not impose any further
-restrictions on the recipients' exercise of the rights granted herein.
-You are not responsible for enforcing compliance by third parties with
-this License.
-
- 11. If, as a consequence of a court judgment or allegation of patent
-infringement or for any other reason (not limited to patent issues),
-conditions are imposed on you (whether by court order, agreement or
-otherwise) that contradict the conditions of this License, they do not
-excuse you from the conditions of this License. If you cannot
-distribute so as to satisfy simultaneously your obligations under this
-License and any other pertinent obligations, then as a consequence you
-may not distribute the Library at all. For example, if a patent
-license would not permit royalty-free redistribution of the Library by
-all those who receive copies directly or indirectly through you, then
-the only way you could satisfy both it and this License would be to
-refrain entirely from distribution of the Library.
-
-If any portion of this section is held invalid or unenforceable under any
-particular circumstance, the balance of the section is intended to apply,
-and the section as a whole is intended to apply in other circumstances.
-
-It is not the purpose of this section to induce you to infringe any
-patents or other property right claims or to contest validity of any
-such claims; this section has the sole purpose of protecting the
-integrity of the free software distribution system which is
-implemented by public license practices. Many people have made
-generous contributions to the wide range of software distributed
-through that system in reliance on consistent application of that
-system; it is up to the author/donor to decide if he or she is willing
-to distribute software through any other system and a licensee cannot
-impose that choice.
-
-This section is intended to make thoroughly clear what is believed to
-be a consequence of the rest of this License.
-
- 12. If the distribution and/or use of the Library is restricted in
-certain countries either by patents or by copyrighted interfaces, the
-original copyright holder who places the Library under this License may add
-an explicit geographical distribution limitation excluding those countries,
-so that distribution is permitted only in or among countries not thus
-excluded. In such case, this License incorporates the limitation as if
-written in the body of this License.
-
- 13. The Free Software Foundation may publish revised and/or new
-versions of the Lesser General Public License from time to time.
-Such new versions will be similar in spirit to the present version,
-but may differ in detail to address new problems or concerns.
-
-Each version is given a distinguishing version number. If the Library
-specifies a version number of this License which applies to it and
-"any later version", you have the option of following the terms and
-conditions either of that version or of any later version published by
-the Free Software Foundation. If the Library does not specify a
-license version number, you may choose any version ever published by
-the Free Software Foundation.
-
- 14. If you wish to incorporate parts of the Library into other free
-programs whose distribution conditions are incompatible with these,
-write to the author to ask for permission. For software which is
-copyrighted by the Free Software Foundation, write to the Free
-Software Foundation; we sometimes make exceptions for this. Our
-decision will be guided by the two goals of preserving the free status
-of all derivatives of our free software and of promoting the sharing
-and reuse of software generally.
-
- NO WARRANTY
-
- 15. BECAUSE THE LIBRARY IS LICENSED FREE OF CHARGE, THERE IS NO
-WARRANTY FOR THE LIBRARY, TO THE EXTENT PERMITTED BY APPLICABLE LAW.
-EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR
-OTHER PARTIES PROVIDE THE LIBRARY "AS IS" WITHOUT WARRANTY OF ANY
-KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE
-IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
-PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE
-LIBRARY IS WITH YOU. SHOULD THE LIBRARY PROVE DEFECTIVE, YOU ASSUME
-THE COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION.
-
- 16. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN
-WRITING WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY
-AND/OR REDISTRIBUTE THE LIBRARY AS PERMITTED ABOVE, BE LIABLE TO YOU
-FOR DAMAGES, INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR
-CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THE
-LIBRARY (INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING
-RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A
-FAILURE OF THE LIBRARY TO OPERATE WITH ANY OTHER SOFTWARE), EVEN IF
-SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH
-DAMAGES.
-
- END OF TERMS AND CONDITIONS
-
- How to Apply These Terms to Your New Libraries
-
- If you develop a new library, and you want it to be of the greatest
-possible use to the public, we recommend making it free software that
-everyone can redistribute and change. You can do so by permitting
-redistribution under these terms (or, alternatively, under the terms of the
-ordinary General Public License).
-
- To apply these terms, attach the following notices to the library. It is
-safest to attach them to the start of each source file to most effectively
-convey the exclusion of warranty; and each file should have at least the
-"copyright" line and a pointer to where the full notice is found.
-
- <one line to give the library's name and a brief idea of what it does.>
- Copyright (C) <year> <name of author>
-
- This library is free software; you can redistribute it and/or
- modify it under the terms of the GNU Lesser General Public
- License as published by the Free Software Foundation; either
- version 2.1 of the License, or (at your option) any later version.
-
- This library is distributed in the hope that it will be useful,
- but WITHOUT ANY WARRANTY; without even the implied warranty of
- MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
- Lesser General Public License for more details.
-
- You should have received a copy of the GNU Lesser General Public
- License along with this library; if not, write to the Free Software
- Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA
-
-Also add information on how to contact you by electronic and paper mail.
-
-You should also get your employer (if you work as a programmer) or your
-school, if any, to sign a "copyright disclaimer" for the library, if
-necessary. Here is a sample; alter the names:
-
- Yoyodyne, Inc., hereby disclaims all copyright interest in the
- library `Frob' (a library for tweaking knobs) written by James Random Hacker.
-
- <signature of Ty Coon>, 1 April 1990
- Ty Coon, President of Vice
-
-That's all there is to it!
-
-
+As a distribution, this software is effectively licensed under the GNU
+General Public License as published by the Free Software foundation;
+either version 3 of the License, or (at your option) any later version
+("GPL"). The full text of this license is in the file `COPYING.GPL3`.
+
+However, most of it is actually licensed under the GNU Lesser General
+Public License as published by the Free Software foundation; either
+version 2.1 of the License, or (at your option) any later version
+("LGPL"). The full text of this license is in the file
+`COPYING.LGPL21`.
+
+That is: When creating a derivative piece of software, if you remove
+the GPL parts, you are free to use the remaining source under the
+terms of the LGPL.
diff --git a/COPYING.GPL3 b/COPYING.GPL3
new file mode 100644
index 0000000..94a9ed0
--- /dev/null
+++ b/COPYING.GPL3
@@ -0,0 +1,674 @@
+ GNU GENERAL PUBLIC LICENSE
+ Version 3, 29 June 2007
+
+ Copyright (C) 2007 Free Software Foundation, Inc. <http://fsf.org/>
+ Everyone is permitted to copy and distribute verbatim copies
+ of this license document, but changing it is not allowed.
+
+ Preamble
+
+ The GNU General Public License is a free, copyleft license for
+software and other kinds of works.
+
+ The licenses for most software and other practical works are designed
+to take away your freedom to share and change the works. By contrast,
+the GNU General Public License is intended to guarantee your freedom to
+share and change all versions of a program--to make sure it remains free
+software for all its users. We, the Free Software Foundation, use the
+GNU General Public License for most of our software; it applies also to
+any other work released this way by its authors. You can apply it to
+your programs, too.
+
+ When we speak of free software, we are referring to freedom, not
+price. Our General Public Licenses are designed to make sure that you
+have the freedom to distribute copies of free software (and charge for
+them if you wish), that you receive source code or can get it if you
+want it, that you can change the software or use pieces of it in new
+free programs, and that you know you can do these things.
+
+ To protect your rights, we need to prevent others from denying you
+these rights or asking you to surrender the rights. Therefore, you have
+certain responsibilities if you distribute copies of the software, or if
+you modify it: responsibilities to respect the freedom of others.
+
+ For example, if you distribute copies of such a program, whether
+gratis or for a fee, you must pass on to the recipients the same
+freedoms that you received. You must make sure that they, too, receive
+or can get the source code. And you must show them these terms so they
+know their rights.
+
+ Developers that use the GNU GPL protect your rights with two steps:
+(1) assert copyright on the software, and (2) offer you this License
+giving you legal permission to copy, distribute and/or modify it.
+
+ For the developers' and authors' protection, the GPL clearly explains
+that there is no warranty for this free software. For both users' and
+authors' sake, the GPL requires that modified versions be marked as
+changed, so that their problems will not be attributed erroneously to
+authors of previous versions.
+
+ Some devices are designed to deny users access to install or run
+modified versions of the software inside them, although the manufacturer
+can do so. This is fundamentally incompatible with the aim of
+protecting users' freedom to change the software. The systematic
+pattern of such abuse occurs in the area of products for individuals to
+use, which is precisely where it is most unacceptable. Therefore, we
+have designed this version of the GPL to prohibit the practice for those
+products. If such problems arise substantially in other domains, we
+stand ready to extend this provision to those domains in future versions
+of the GPL, as needed to protect the freedom of users.
+
+ Finally, every program is threatened constantly by software patents.
+States should not allow patents to restrict development and use of
+software on general-purpose computers, but in those that do, we wish to
+avoid the special danger that patents applied to a free program could
+make it effectively proprietary. To prevent this, the GPL assures that
+patents cannot be used to render the program non-free.
+
+ The precise terms and conditions for copying, distribution and
+modification follow.
+
+ TERMS AND CONDITIONS
+
+ 0. Definitions.
+
+ "This License" refers to version 3 of the GNU General Public License.
+
+ "Copyright" also means copyright-like laws that apply to other kinds of
+works, such as semiconductor masks.
+
+ "The Program" refers to any copyrightable work licensed under this
+License. Each licensee is addressed as "you". "Licensees" and
+"recipients" may be individuals or organizations.
+
+ To "modify" a work means to copy from or adapt all or part of the work
+in a fashion requiring copyright permission, other than the making of an
+exact copy. The resulting work is called a "modified version" of the
+earlier work or a work "based on" the earlier work.
+
+ A "covered work" means either the unmodified Program or a work based
+on the Program.
+
+ To "propagate" a work means to do anything with it that, without
+permission, would make you directly or secondarily liable for
+infringement under applicable copyright law, except executing it on a
+computer or modifying a private copy. Propagation includes copying,
+distribution (with or without modification), making available to the
+public, and in some countries other activities as well.
+
+ To "convey" a work means any kind of propagation that enables other
+parties to make or receive copies. Mere interaction with a user through
+a computer network, with no transfer of a copy, is not conveying.
+
+ An interactive user interface displays "Appropriate Legal Notices"
+to the extent that it includes a convenient and prominently visible
+feature that (1) displays an appropriate copyright notice, and (2)
+tells the user that there is no warranty for the work (except to the
+extent that warranties are provided), that licensees may convey the
+work under this License, and how to view a copy of this License. If
+the interface presents a list of user commands or options, such as a
+menu, a prominent item in the list meets this criterion.
+
+ 1. Source Code.
+
+ The "source code" for a work means the preferred form of the work
+for making modifications to it. "Object code" means any non-source
+form of a work.
+
+ A "Standard Interface" means an interface that either is an official
+standard defined by a recognized standards body, or, in the case of
+interfaces specified for a particular programming language, one that
+is widely used among developers working in that language.
+
+ The "System Libraries" of an executable work include anything, other
+than the work as a whole, that (a) is included in the normal form of
+packaging a Major Component, but which is not part of that Major
+Component, and (b) serves only to enable use of the work with that
+Major Component, or to implement a Standard Interface for which an
+implementation is available to the public in source code form. A
+"Major Component", in this context, means a major essential component
+(kernel, window system, and so on) of the specific operating system
+(if any) on which the executable work runs, or a compiler used to
+produce the work, or an object code interpreter used to run it.
+
+ The "Corresponding Source" for a work in object code form means all
+the source code needed to generate, install, and (for an executable
+work) run the object code and to modify the work, including scripts to
+control those activities. However, it does not include the work's
+System Libraries, or general-purpose tools or generally available free
+programs which are used unmodified in performing those activities but
+which are not part of the work. For example, Corresponding Source
+includes interface definition files associated with source files for
+the work, and the source code for shared libraries and dynamically
+linked subprograms that the work is specifically designed to require,
+such as by intimate data communication or control flow between those
+subprograms and other parts of the work.
+
+ The Corresponding Source need not include anything that users
+can regenerate automatically from other parts of the Corresponding
+Source.
+
+ The Corresponding Source for a work in source code form is that
+same work.
+
+ 2. Basic Permissions.
+
+ All rights granted under this License are granted for the term of
+copyright on the Program, and are irrevocable provided the stated
+conditions are met. This License explicitly affirms your unlimited
+permission to run the unmodified Program. The output from running a
+covered work is covered by this License only if the output, given its
+content, constitutes a covered work. This License acknowledges your
+rights of fair use or other equivalent, as provided by copyright law.
+
+ You may make, run and propagate covered works that you do not
+convey, without conditions so long as your license otherwise remains
+in force. You may convey covered works to others for the sole purpose
+of having them make modifications exclusively for you, or provide you
+with facilities for running those works, provided that you comply with
+the terms of this License in conveying all material for which you do
+not control copyright. Those thus making or running the covered works
+for you must do so exclusively on your behalf, under your direction
+and control, on terms that prohibit them from making any copies of
+your copyrighted material outside their relationship with you.
+
+ Conveying under any other circumstances is permitted solely under
+the conditions stated below. Sublicensing is not allowed; section 10
+makes it unnecessary.
+
+ 3. Protecting Users' Legal Rights From Anti-Circumvention Law.
+
+ No covered work shall be deemed part of an effective technological
+measure under any applicable law fulfilling obligations under article
+11 of the WIPO copyright treaty adopted on 20 December 1996, or
+similar laws prohibiting or restricting circumvention of such
+measures.
+
+ When you convey a covered work, you waive any legal power to forbid
+circumvention of technological measures to the extent such circumvention
+is effected by exercising rights under this License with respect to
+the covered work, and you disclaim any intention to limit operation or
+modification of the work as a means of enforcing, against the work's
+users, your or third parties' legal rights to forbid circumvention of
+technological measures.
+
+ 4. Conveying Verbatim Copies.
+
+ You may convey verbatim copies of the Program's source code as you
+receive it, in any medium, provided that you conspicuously and
+appropriately publish on each copy an appropriate copyright notice;
+keep intact all notices stating that this License and any
+non-permissive terms added in accord with section 7 apply to the code;
+keep intact all notices of the absence of any warranty; and give all
+recipients a copy of this License along with the Program.
+
+ You may charge any price or no price for each copy that you convey,
+and you may offer support or warranty protection for a fee.
+
+ 5. Conveying Modified Source Versions.
+
+ You may convey a work based on the Program, or the modifications to
+produce it from the Program, in the form of source code under the
+terms of section 4, provided that you also meet all of these conditions:
+
+ a) The work must carry prominent notices stating that you modified
+ it, and giving a relevant date.
+
+ b) The work must carry prominent notices stating that it is
+ released under this License and any conditions added under section
+ 7. This requirement modifies the requirement in section 4 to
+ "keep intact all notices".
+
+ c) You must license the entire work, as a whole, under this
+ License to anyone who comes into possession of a copy. This
+ License will therefore apply, along with any applicable section 7
+ additional terms, to the whole of the work, and all its parts,
+ regardless of how they are packaged. This License gives no
+ permission to license the work in any other way, but it does not
+ invalidate such permission if you have separately received it.
+
+ d) If the work has interactive user interfaces, each must display
+ Appropriate Legal Notices; however, if the Program has interactive
+ interfaces that do not display Appropriate Legal Notices, your
+ work need not make them do so.
+
+ A compilation of a covered work with other separate and independent
+works, which are not by their nature extensions of the covered work,
+and which are not combined with it such as to form a larger program,
+in or on a volume of a storage or distribution medium, is called an
+"aggregate" if the compilation and its resulting copyright are not
+used to limit the access or legal rights of the compilation's users
+beyond what the individual works permit. Inclusion of a covered work
+in an aggregate does not cause this License to apply to the other
+parts of the aggregate.
+
+ 6. Conveying Non-Source Forms.
+
+ You may convey a covered work in object code form under the terms
+of sections 4 and 5, provided that you also convey the
+machine-readable Corresponding Source under the terms of this License,
+in one of these ways:
+
+ a) Convey the object code in, or embodied in, a physical product
+ (including a physical distribution medium), accompanied by the
+ Corresponding Source fixed on a durable physical medium
+ customarily used for software interchange.
+
+ b) Convey the object code in, or embodied in, a physical product
+ (including a physical distribution medium), accompanied by a
+ written offer, valid for at least three years and valid for as
+ long as you offer spare parts or customer support for that product
+ model, to give anyone who possesses the object code either (1) a
+ copy of the Corresponding Source for all the software in the
+ product that is covered by this License, on a durable physical
+ medium customarily used for software interchange, for a price no
+ more than your reasonable cost of physically performing this
+ conveying of source, or (2) access to copy the
+ Corresponding Source from a network server at no charge.
+
+ c) Convey individual copies of the object code with a copy of the
+ written offer to provide the Corresponding Source. This
+ alternative is allowed only occasionally and noncommercially, and
+ only if you received the object code with such an offer, in accord
+ with subsection 6b.
+
+ d) Convey the object code by offering access from a designated
+ place (gratis or for a charge), and offer equivalent access to the
+ Corresponding Source in the same way through the same place at no
+ further charge. You need not require recipients to copy the
+ Corresponding Source along with the object code. If the place to
+ copy the object code is a network server, the Corresponding Source
+ may be on a different server (operated by you or a third party)
+ that supports equivalent copying facilities, provided you maintain
+ clear directions next to the object code saying where to find the
+ Corresponding Source. Regardless of what server hosts the
+ Corresponding Source, you remain obligated to ensure that it is
+ available for as long as needed to satisfy these requirements.
+
+ e) Convey the object code using peer-to-peer transmission, provided
+ you inform other peers where the object code and Corresponding
+ Source of the work are being offered to the general public at no
+ charge under subsection 6d.
+
+ A separable portion of the object code, whose source code is excluded
+from the Corresponding Source as a System Library, need not be
+included in conveying the object code work.
+
+ A "User Product" is either (1) a "consumer product", which means any
+tangible personal property which is normally used for personal, family,
+or household purposes, or (2) anything designed or sold for incorporation
+into a dwelling. In determining whether a product is a consumer product,
+doubtful cases shall be resolved in favor of coverage. For a particular
+product received by a particular user, "normally used" refers to a
+typical or common use of that class of product, regardless of the status
+of the particular user or of the way in which the particular user
+actually uses, or expects or is expected to use, the product. A product
+is a consumer product regardless of whether the product has substantial
+commercial, industrial or non-consumer uses, unless such uses represent
+the only significant mode of use of the product.
+
+ "Installation Information" for a User Product means any methods,
+procedures, authorization keys, or other information required to install
+and execute modified versions of a covered work in that User Product from
+a modified version of its Corresponding Source. The information must
+suffice to ensure that the continued functioning of the modified object
+code is in no case prevented or interfered with solely because
+modification has been made.
+
+ If you convey an object code work under this section in, or with, or
+specifically for use in, a User Product, and the conveying occurs as
+part of a transaction in which the right of possession and use of the
+User Product is transferred to the recipient in perpetuity or for a
+fixed term (regardless of how the transaction is characterized), the
+Corresponding Source conveyed under this section must be accompanied
+by the Installation Information. But this requirement does not apply
+if neither you nor any third party retains the ability to install
+modified object code on the User Product (for example, the work has
+been installed in ROM).
+
+ The requirement to provide Installation Information does not include a
+requirement to continue to provide support service, warranty, or updates
+for a work that has been modified or installed by the recipient, or for
+the User Product in which it has been modified or installed. Access to a
+network may be denied when the modification itself materially and
+adversely affects the operation of the network or violates the rules and
+protocols for communication across the network.
+
+ Corresponding Source conveyed, and Installation Information provided,
+in accord with this section must be in a format that is publicly
+documented (and with an implementation available to the public in
+source code form), and must require no special password or key for
+unpacking, reading or copying.
+
+ 7. Additional Terms.
+
+ "Additional permissions" are terms that supplement the terms of this
+License by making exceptions from one or more of its conditions.
+Additional permissions that are applicable to the entire Program shall
+be treated as though they were included in this License, to the extent
+that they are valid under applicable law. If additional permissions
+apply only to part of the Program, that part may be used separately
+under those permissions, but the entire Program remains governed by
+this License without regard to the additional permissions.
+
+ When you convey a copy of a covered work, you may at your option
+remove any additional permissions from that copy, or from any part of
+it. (Additional permissions may be written to require their own
+removal in certain cases when you modify the work.) You may place
+additional permissions on material, added by you to a covered work,
+for which you have or can give appropriate copyright permission.
+
+ Notwithstanding any other provision of this License, for material you
+add to a covered work, you may (if authorized by the copyright holders of
+that material) supplement the terms of this License with terms:
+
+ a) Disclaiming warranty or limiting liability differently from the
+ terms of sections 15 and 16 of this License; or
+
+ b) Requiring preservation of specified reasonable legal notices or
+ author attributions in that material or in the Appropriate Legal
+ Notices displayed by works containing it; or
+
+ c) Prohibiting misrepresentation of the origin of that material, or
+ requiring that modified versions of such material be marked in
+ reasonable ways as different from the original version; or
+
+ d) Limiting the use for publicity purposes of names of licensors or
+ authors of the material; or
+
+ e) Declining to grant rights under trademark law for use of some
+ trade names, trademarks, or service marks; or
+
+ f) Requiring indemnification of licensors and authors of that
+ material by anyone who conveys the material (or modified versions of
+ it) with contractual assumptions of liability to the recipient, for
+ any liability that these contractual assumptions directly impose on
+ those licensors and authors.
+
+ All other non-permissive additional terms are considered "further
+restrictions" within the meaning of section 10. If the Program as you
+received it, or any part of it, contains a notice stating that it is
+governed by this License along with a term that is a further
+restriction, you may remove that term. If a license document contains
+a further restriction but permits relicensing or conveying under this
+License, you may add to a covered work material governed by the terms
+of that license document, provided that the further restriction does
+not survive such relicensing or conveying.
+
+ If you add terms to a covered work in accord with this section, you
+must place, in the relevant source files, a statement of the
+additional terms that apply to those files, or a notice indicating
+where to find the applicable terms.
+
+ Additional terms, permissive or non-permissive, may be stated in the
+form of a separately written license, or stated as exceptions;
+the above requirements apply either way.
+
+ 8. Termination.
+
+ You may not propagate or modify a covered work except as expressly
+provided under this License. Any attempt otherwise to propagate or
+modify it is void, and will automatically terminate your rights under
+this License (including any patent licenses granted under the third
+paragraph of section 11).
+
+ However, if you cease all violation of this License, then your
+license from a particular copyright holder is reinstated (a)
+provisionally, unless and until the copyright holder explicitly and
+finally terminates your license, and (b) permanently, if the copyright
+holder fails to notify you of the violation by some reasonable means
+prior to 60 days after the cessation.
+
+ Moreover, your license from a particular copyright holder is
+reinstated permanently if the copyright holder notifies you of the
+violation by some reasonable means, this is the first time you have
+received notice of violation of this License (for any work) from that
+copyright holder, and you cure the violation prior to 30 days after
+your receipt of the notice.
+
+ Termination of your rights under this section does not terminate the
+licenses of parties who have received copies or rights from you under
+this License. If your rights have been terminated and not permanently
+reinstated, you do not qualify to receive new licenses for the same
+material under section 10.
+
+ 9. Acceptance Not Required for Having Copies.
+
+ You are not required to accept this License in order to receive or
+run a copy of the Program. Ancillary propagation of a covered work
+occurring solely as a consequence of using peer-to-peer transmission
+to receive a copy likewise does not require acceptance. However,
+nothing other than this License grants you permission to propagate or
+modify any covered work. These actions infringe copyright if you do
+not accept this License. Therefore, by modifying or propagating a
+covered work, you indicate your acceptance of this License to do so.
+
+ 10. Automatic Licensing of Downstream Recipients.
+
+ Each time you convey a covered work, the recipient automatically
+receives a license from the original licensors, to run, modify and
+propagate that work, subject to this License. You are not responsible
+for enforcing compliance by third parties with this License.
+
+ An "entity transaction" is a transaction transferring control of an
+organization, or substantially all assets of one, or subdividing an
+organization, or merging organizations. If propagation of a covered
+work results from an entity transaction, each party to that
+transaction who receives a copy of the work also receives whatever
+licenses to the work the party's predecessor in interest had or could
+give under the previous paragraph, plus a right to possession of the
+Corresponding Source of the work from the predecessor in interest, if
+the predecessor has it or can get it with reasonable efforts.
+
+ You may not impose any further restrictions on the exercise of the
+rights granted or affirmed under this License. For example, you may
+not impose a license fee, royalty, or other charge for exercise of
+rights granted under this License, and you may not initiate litigation
+(including a cross-claim or counterclaim in a lawsuit) alleging that
+any patent claim is infringed by making, using, selling, offering for
+sale, or importing the Program or any portion of it.
+
+ 11. Patents.
+
+ A "contributor" is a copyright holder who authorizes use under this
+License of the Program or a work on which the Program is based. The
+work thus licensed is called the contributor's "contributor version".
+
+ A contributor's "essential patent claims" are all patent claims
+owned or controlled by the contributor, whether already acquired or
+hereafter acquired, that would be infringed by some manner, permitted
+by this License, of making, using, or selling its contributor version,
+but do not include claims that would be infringed only as a
+consequence of further modification of the contributor version. For
+purposes of this definition, "control" includes the right to grant
+patent sublicenses in a manner consistent with the requirements of
+this License.
+
+ Each contributor grants you a non-exclusive, worldwide, royalty-free
+patent license under the contributor's essential patent claims, to
+make, use, sell, offer for sale, import and otherwise run, modify and
+propagate the contents of its contributor version.
+
+ In the following three paragraphs, a "patent license" is any express
+agreement or commitment, however denominated, not to enforce a patent
+(such as an express permission to practice a patent or covenant not to
+sue for patent infringement). To "grant" such a patent license to a
+party means to make such an agreement or commitment not to enforce a
+patent against the party.
+
+ If you convey a covered work, knowingly relying on a patent license,
+and the Corresponding Source of the work is not available for anyone
+to copy, free of charge and under the terms of this License, through a
+publicly available network server or other readily accessible means,
+then you must either (1) cause the Corresponding Source to be so
+available, or (2) arrange to deprive yourself of the benefit of the
+patent license for this particular work, or (3) arrange, in a manner
+consistent with the requirements of this License, to extend the patent
+license to downstream recipients. "Knowingly relying" means you have
+actual knowledge that, but for the patent license, your conveying the
+covered work in a country, or your recipient's use of the covered work
+in a country, would infringe one or more identifiable patents in that
+country that you have reason to believe are valid.
+
+ If, pursuant to or in connection with a single transaction or
+arrangement, you convey, or propagate by procuring conveyance of, a
+covered work, and grant a patent license to some of the parties
+receiving the covered work authorizing them to use, propagate, modify
+or convey a specific copy of the covered work, then the patent license
+you grant is automatically extended to all recipients of the covered
+work and works based on it.
+
+ A patent license is "discriminatory" if it does not include within
+the scope of its coverage, prohibits the exercise of, or is
+conditioned on the non-exercise of one or more of the rights that are
+specifically granted under this License. You may not convey a covered
+work if you are a party to an arrangement with a third party that is
+in the business of distributing software, under which you make payment
+to the third party based on the extent of your activity of conveying
+the work, and under which the third party grants, to any of the
+parties who would receive the covered work from you, a discriminatory
+patent license (a) in connection with copies of the covered work
+conveyed by you (or copies made from those copies), or (b) primarily
+for and in connection with specific products or compilations that
+contain the covered work, unless you entered into that arrangement,
+or that patent license was granted, prior to 28 March 2007.
+
+ Nothing in this License shall be construed as excluding or limiting
+any implied license or other defenses to infringement that may
+otherwise be available to you under applicable patent law.
+
+ 12. No Surrender of Others' Freedom.
+
+ If conditions are imposed on you (whether by court order, agreement or
+otherwise) that contradict the conditions of this License, they do not
+excuse you from the conditions of this License. If you cannot convey a
+covered work so as to satisfy simultaneously your obligations under this
+License and any other pertinent obligations, then as a consequence you may
+not convey it at all. For example, if you agree to terms that obligate you
+to collect a royalty for further conveying from those to whom you convey
+the Program, the only way you could satisfy both those terms and this
+License would be to refrain entirely from conveying the Program.
+
+ 13. Use with the GNU Affero General Public License.
+
+ Notwithstanding any other provision of this License, you have
+permission to link or combine any covered work with a work licensed
+under version 3 of the GNU Affero General Public License into a single
+combined work, and to convey the resulting work. The terms of this
+License will continue to apply to the part which is the covered work,
+but the special requirements of the GNU Affero General Public License,
+section 13, concerning interaction through a network will apply to the
+combination as such.
+
+ 14. Revised Versions of this License.
+
+ The Free Software Foundation may publish revised and/or new versions of
+the GNU General Public License from time to time. Such new versions will
+be similar in spirit to the present version, but may differ in detail to
+address new problems or concerns.
+
+ Each version is given a distinguishing version number. If the
+Program specifies that a certain numbered version of the GNU General
+Public License "or any later version" applies to it, you have the
+option of following the terms and conditions either of that numbered
+version or of any later version published by the Free Software
+Foundation. If the Program does not specify a version number of the
+GNU General Public License, you may choose any version ever published
+by the Free Software Foundation.
+
+ If the Program specifies that a proxy can decide which future
+versions of the GNU General Public License can be used, that proxy's
+public statement of acceptance of a version permanently authorizes you
+to choose that version for the Program.
+
+ Later license versions may give you additional or different
+permissions. However, no additional obligations are imposed on any
+author or copyright holder as a result of your choosing to follow a
+later version.
+
+ 15. Disclaimer of Warranty.
+
+ THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY
+APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT
+HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY
+OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO,
+THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
+PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM
+IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF
+ALL NECESSARY SERVICING, REPAIR OR CORRECTION.
+
+ 16. Limitation of Liability.
+
+ IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING
+WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MODIFIES AND/OR CONVEYS
+THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY
+GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE
+USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF
+DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD
+PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS),
+EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF
+SUCH DAMAGES.
+
+ 17. Interpretation of Sections 15 and 16.
+
+ If the disclaimer of warranty and limitation of liability provided
+above cannot be given local legal effect according to their terms,
+reviewing courts shall apply local law that most closely approximates
+an absolute waiver of all civil liability in connection with the
+Program, unless a warranty or assumption of liability accompanies a
+copy of the Program in return for a fee.
+
+ END OF TERMS AND CONDITIONS
+
+ How to Apply These Terms to Your New Programs
+
+ If you develop a new program, and you want it to be of the greatest
+possible use to the public, the best way to achieve this is to make it
+free software which everyone can redistribute and change under these terms.
+
+ To do so, attach the following notices to the program. It is safest
+to attach them to the start of each source file to most effectively
+state the exclusion of warranty; and each file should have at least
+the "copyright" line and a pointer to where the full notice is found.
+
+ <one line to give the program's name and a brief idea of what it does.>
+ Copyright (C) <year> <name of author>
+
+ This program is free software: you can redistribute it and/or modify
+ it under the terms of the GNU General Public License as published by
+ the Free Software Foundation, either version 3 of the License, or
+ (at your option) any later version.
+
+ This program is distributed in the hope that it will be useful,
+ but WITHOUT ANY WARRANTY; without even the implied warranty of
+ MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+ GNU General Public License for more details.
+
+ You should have received a copy of the GNU General Public License
+ along with this program. If not, see <http://www.gnu.org/licenses/>.
+
+Also add information on how to contact you by electronic and paper mail.
+
+ If the program does terminal interaction, make it output a short
+notice like this when it starts in an interactive mode:
+
+ <program> Copyright (C) <year> <name of author>
+ This program comes with ABSOLUTELY NO WARRANTY; for details type `show w'.
+ This is free software, and you are welcome to redistribute it
+ under certain conditions; type `show c' for details.
+
+The hypothetical commands `show w' and `show c' should show the appropriate
+parts of the General Public License. Of course, your program's commands
+might be different; for a GUI interface, you would use an "about box".
+
+ You should also get your employer (if you work as a programmer) or school,
+if any, to sign a "copyright disclaimer" for the program, if necessary.
+For more information on this, and how to apply and follow the GNU GPL, see
+<http://www.gnu.org/licenses/>.
+
+ The GNU General Public License does not permit incorporating your program
+into proprietary programs. If your program is a subroutine library, you
+may consider it more useful to permit linking proprietary applications with
+the library. If this is what you want to do, use the GNU Lesser General
+Public License instead of this License. But first, please read
+<http://www.gnu.org/philosophy/why-not-lgpl.html>.
diff --git a/COPYING.LGPL21 b/COPYING.LGPL21
new file mode 100644
index 0000000..5ab7695
--- /dev/null
+++ b/COPYING.LGPL21
@@ -0,0 +1,504 @@
+ GNU LESSER GENERAL PUBLIC LICENSE
+ Version 2.1, February 1999
+
+ Copyright (C) 1991, 1999 Free Software Foundation, Inc.
+ 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA
+ Everyone is permitted to copy and distribute verbatim copies
+ of this license document, but changing it is not allowed.
+
+[This is the first released version of the Lesser GPL. It also counts
+ as the successor of the GNU Library Public License, version 2, hence
+ the version number 2.1.]
+
+ Preamble
+
+ The licenses for most software are designed to take away your
+freedom to share and change it. By contrast, the GNU General Public
+Licenses are intended to guarantee your freedom to share and change
+free software--to make sure the software is free for all its users.
+
+ This license, the Lesser General Public License, applies to some
+specially designated software packages--typically libraries--of the
+Free Software Foundation and other authors who decide to use it. You
+can use it too, but we suggest you first think carefully about whether
+this license or the ordinary General Public License is the better
+strategy to use in any particular case, based on the explanations below.
+
+ When we speak of free software, we are referring to freedom of use,
+not price. Our General Public Licenses are designed to make sure that
+you have the freedom to distribute copies of free software (and charge
+for this service if you wish); that you receive source code or can get
+it if you want it; that you can change the software and use pieces of
+it in new free programs; and that you are informed that you can do
+these things.
+
+ To protect your rights, we need to make restrictions that forbid
+distributors to deny you these rights or to ask you to surrender these
+rights. These restrictions translate to certain responsibilities for
+you if you distribute copies of the library or if you modify it.
+
+ For example, if you distribute copies of the library, whether gratis
+or for a fee, you must give the recipients all the rights that we gave
+you. You must make sure that they, too, receive or can get the source
+code. If you link other code with the library, you must provide
+complete object files to the recipients, so that they can relink them
+with the library after making changes to the library and recompiling
+it. And you must show them these terms so they know their rights.
+
+ We protect your rights with a two-step method: (1) we copyright the
+library, and (2) we offer you this license, which gives you legal
+permission to copy, distribute and/or modify the library.
+
+ To protect each distributor, we want to make it very clear that
+there is no warranty for the free library. Also, if the library is
+modified by someone else and passed on, the recipients should know
+that what they have is not the original version, so that the original
+author's reputation will not be affected by problems that might be
+introduced by others.
+
+ Finally, software patents pose a constant threat to the existence of
+any free program. We wish to make sure that a company cannot
+effectively restrict the users of a free program by obtaining a
+restrictive license from a patent holder. Therefore, we insist that
+any patent license obtained for a version of the library must be
+consistent with the full freedom of use specified in this license.
+
+ Most GNU software, including some libraries, is covered by the
+ordinary GNU General Public License. This license, the GNU Lesser
+General Public License, applies to certain designated libraries, and
+is quite different from the ordinary General Public License. We use
+this license for certain libraries in order to permit linking those
+libraries into non-free programs.
+
+ When a program is linked with a library, whether statically or using
+a shared library, the combination of the two is legally speaking a
+combined work, a derivative of the original library. The ordinary
+General Public License therefore permits such linking only if the
+entire combination fits its criteria of freedom. The Lesser General
+Public License permits more lax criteria for linking other code with
+the library.
+
+ We call this license the "Lesser" General Public License because it
+does Less to protect the user's freedom than the ordinary General
+Public License. It also provides other free software developers Less
+of an advantage over competing non-free programs. These disadvantages
+are the reason we use the ordinary General Public License for many
+libraries. However, the Lesser license provides advantages in certain
+special circumstances.
+
+ For example, on rare occasions, there may be a special need to
+encourage the widest possible use of a certain library, so that it becomes
+a de-facto standard. To achieve this, non-free programs must be
+allowed to use the library. A more frequent case is that a free
+library does the same job as widely used non-free libraries. In this
+case, there is little to gain by limiting the free library to free
+software only, so we use the Lesser General Public License.
+
+ In other cases, permission to use a particular library in non-free
+programs enables a greater number of people to use a large body of
+free software. For example, permission to use the GNU C Library in
+non-free programs enables many more people to use the whole GNU
+operating system, as well as its variant, the GNU/Linux operating
+system.
+
+ Although the Lesser General Public License is Less protective of the
+users' freedom, it does ensure that the user of a program that is
+linked with the Library has the freedom and the wherewithal to run
+that program using a modified version of the Library.
+
+ The precise terms and conditions for copying, distribution and
+modification follow. Pay close attention to the difference between a
+"work based on the library" and a "work that uses the library". The
+former contains code derived from the library, whereas the latter must
+be combined with the library in order to run.
+
+ GNU LESSER GENERAL PUBLIC LICENSE
+ TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION
+
+ 0. This License Agreement applies to any software library or other
+program which contains a notice placed by the copyright holder or
+other authorized party saying it may be distributed under the terms of
+this Lesser General Public License (also called "this License").
+Each licensee is addressed as "you".
+
+ A "library" means a collection of software functions and/or data
+prepared so as to be conveniently linked with application programs
+(which use some of those functions and data) to form executables.
+
+ The "Library", below, refers to any such software library or work
+which has been distributed under these terms. A "work based on the
+Library" means either the Library or any derivative work under
+copyright law: that is to say, a work containing the Library or a
+portion of it, either verbatim or with modifications and/or translated
+straightforwardly into another language. (Hereinafter, translation is
+included without limitation in the term "modification".)
+
+ "Source code" for a work means the preferred form of the work for
+making modifications to it. For a library, complete source code means
+all the source code for all modules it contains, plus any associated
+interface definition files, plus the scripts used to control compilation
+and installation of the library.
+
+ Activities other than copying, distribution and modification are not
+covered by this License; they are outside its scope. The act of
+running a program using the Library is not restricted, and output from
+such a program is covered only if its contents constitute a work based
+on the Library (independent of the use of the Library in a tool for
+writing it). Whether that is true depends on what the Library does
+and what the program that uses the Library does.
+
+ 1. You may copy and distribute verbatim copies of the Library's
+complete source code as you receive it, in any medium, provided that
+you conspicuously and appropriately publish on each copy an
+appropriate copyright notice and disclaimer of warranty; keep intact
+all the notices that refer to this License and to the absence of any
+warranty; and distribute a copy of this License along with the
+Library.
+
+ You may charge a fee for the physical act of transferring a copy,
+and you may at your option offer warranty protection in exchange for a
+fee.
+
+ 2. You may modify your copy or copies of the Library or any portion
+of it, thus forming a work based on the Library, and copy and
+distribute such modifications or work under the terms of Section 1
+above, provided that you also meet all of these conditions:
+
+ a) The modified work must itself be a software library.
+
+ b) You must cause the files modified to carry prominent notices
+ stating that you changed the files and the date of any change.
+
+ c) You must cause the whole of the work to be licensed at no
+ charge to all third parties under the terms of this License.
+
+ d) If a facility in the modified Library refers to a function or a
+ table of data to be supplied by an application program that uses
+ the facility, other than as an argument passed when the facility
+ is invoked, then you must make a good faith effort to ensure that,
+ in the event an application does not supply such function or
+ table, the facility still operates, and performs whatever part of
+ its purpose remains meaningful.
+
+ (For example, a function in a library to compute square roots has
+ a purpose that is entirely well-defined independent of the
+ application. Therefore, Subsection 2d requires that any
+ application-supplied function or table used by this function must
+ be optional: if the application does not supply it, the square
+ root function must still compute square roots.)
+
+These requirements apply to the modified work as a whole. If
+identifiable sections of that work are not derived from the Library,
+and can be reasonably considered independent and separate works in
+themselves, then this License, and its terms, do not apply to those
+sections when you distribute them as separate works. But when you
+distribute the same sections as part of a whole which is a work based
+on the Library, the distribution of the whole must be on the terms of
+this License, whose permissions for other licensees extend to the
+entire whole, and thus to each and every part regardless of who wrote
+it.
+
+Thus, it is not the intent of this section to claim rights or contest
+your rights to work written entirely by you; rather, the intent is to
+exercise the right to control the distribution of derivative or
+collective works based on the Library.
+
+In addition, mere aggregation of another work not based on the Library
+with the Library (or with a work based on the Library) on a volume of
+a storage or distribution medium does not bring the other work under
+the scope of this License.
+
+ 3. You may opt to apply the terms of the ordinary GNU General Public
+License instead of this License to a given copy of the Library. To do
+this, you must alter all the notices that refer to this License, so
+that they refer to the ordinary GNU General Public License, version 2,
+instead of to this License. (If a newer version than version 2 of the
+ordinary GNU General Public License has appeared, then you can specify
+that version instead if you wish.) Do not make any other change in
+these notices.
+
+ Once this change is made in a given copy, it is irreversible for
+that copy, so the ordinary GNU General Public License applies to all
+subsequent copies and derivative works made from that copy.
+
+ This option is useful when you wish to copy part of the code of
+the Library into a program that is not a library.
+
+ 4. You may copy and distribute the Library (or a portion or
+derivative of it, under Section 2) in object code or executable form
+under the terms of Sections 1 and 2 above provided that you accompany
+it with the complete corresponding machine-readable source code, which
+must be distributed under the terms of Sections 1 and 2 above on a
+medium customarily used for software interchange.
+
+ If distribution of object code is made by offering access to copy
+from a designated place, then offering equivalent access to copy the
+source code from the same place satisfies the requirement to
+distribute the source code, even though third parties are not
+compelled to copy the source along with the object code.
+
+ 5. A program that contains no derivative of any portion of the
+Library, but is designed to work with the Library by being compiled or
+linked with it, is called a "work that uses the Library". Such a
+work, in isolation, is not a derivative work of the Library, and
+therefore falls outside the scope of this License.
+
+ However, linking a "work that uses the Library" with the Library
+creates an executable that is a derivative of the Library (because it
+contains portions of the Library), rather than a "work that uses the
+library". The executable is therefore covered by this License.
+Section 6 states terms for distribution of such executables.
+
+ When a "work that uses the Library" uses material from a header file
+that is part of the Library, the object code for the work may be a
+derivative work of the Library even though the source code is not.
+Whether this is true is especially significant if the work can be
+linked without the Library, or if the work is itself a library. The
+threshold for this to be true is not precisely defined by law.
+
+ If such an object file uses only numerical parameters, data
+structure layouts and accessors, and small macros and small inline
+functions (ten lines or less in length), then the use of the object
+file is unrestricted, regardless of whether it is legally a derivative
+work. (Executables containing this object code plus portions of the
+Library will still fall under Section 6.)
+
+ Otherwise, if the work is a derivative of the Library, you may
+distribute the object code for the work under the terms of Section 6.
+Any executables containing that work also fall under Section 6,
+whether or not they are linked directly with the Library itself.
+
+ 6. As an exception to the Sections above, you may also combine or
+link a "work that uses the Library" with the Library to produce a
+work containing portions of the Library, and distribute that work
+under terms of your choice, provided that the terms permit
+modification of the work for the customer's own use and reverse
+engineering for debugging such modifications.
+
+ You must give prominent notice with each copy of the work that the
+Library is used in it and that the Library and its use are covered by
+this License. You must supply a copy of this License. If the work
+during execution displays copyright notices, you must include the
+copyright notice for the Library among them, as well as a reference
+directing the user to the copy of this License. Also, you must do one
+of these things:
+
+ a) Accompany the work with the complete corresponding
+ machine-readable source code for the Library including whatever
+ changes were used in the work (which must be distributed under
+ Sections 1 and 2 above); and, if the work is an executable linked
+ with the Library, with the complete machine-readable "work that
+ uses the Library", as object code and/or source code, so that the
+ user can modify the Library and then relink to produce a modified
+ executable containing the modified Library. (It is understood
+ that the user who changes the contents of definitions files in the
+ Library will not necessarily be able to recompile the application
+ to use the modified definitions.)
+
+ b) Use a suitable shared library mechanism for linking with the
+ Library. A suitable mechanism is one that (1) uses at run time a
+ copy of the library already present on the user's computer system,
+ rather than copying library functions into the executable, and (2)
+ will operate properly with a modified version of the library, if
+ the user installs one, as long as the modified version is
+ interface-compatible with the version that the work was made with.
+
+ c) Accompany the work with a written offer, valid for at
+ least three years, to give the same user the materials
+ specified in Subsection 6a, above, for a charge no more
+ than the cost of performing this distribution.
+
+ d) If distribution of the work is made by offering access to copy
+ from a designated place, offer equivalent access to copy the above
+ specified materials from the same place.
+
+ e) Verify that the user has already received a copy of these
+ materials or that you have already sent this user a copy.
+
+ For an executable, the required form of the "work that uses the
+Library" must include any data and utility programs needed for
+reproducing the executable from it. However, as a special exception,
+the materials to be distributed need not include anything that is
+normally distributed (in either source or binary form) with the major
+components (compiler, kernel, and so on) of the operating system on
+which the executable runs, unless that component itself accompanies
+the executable.
+
+ It may happen that this requirement contradicts the license
+restrictions of other proprietary libraries that do not normally
+accompany the operating system. Such a contradiction means you cannot
+use both them and the Library together in an executable that you
+distribute.
+
+ 7. You may place library facilities that are a work based on the
+Library side-by-side in a single library together with other library
+facilities not covered by this License, and distribute such a combined
+library, provided that the separate distribution of the work based on
+the Library and of the other library facilities is otherwise
+permitted, and provided that you do these two things:
+
+ a) Accompany the combined library with a copy of the same work
+ based on the Library, uncombined with any other library
+ facilities. This must be distributed under the terms of the
+ Sections above.
+
+ b) Give prominent notice with the combined library of the fact
+ that part of it is a work based on the Library, and explaining
+ where to find the accompanying uncombined form of the same work.
+
+ 8. You may not copy, modify, sublicense, link with, or distribute
+the Library except as expressly provided under this License. Any
+attempt otherwise to copy, modify, sublicense, link with, or
+distribute the Library is void, and will automatically terminate your
+rights under this License. However, parties who have received copies,
+or rights, from you under this License will not have their licenses
+terminated so long as such parties remain in full compliance.
+
+ 9. You are not required to accept this License, since you have not
+signed it. However, nothing else grants you permission to modify or
+distribute the Library or its derivative works. These actions are
+prohibited by law if you do not accept this License. Therefore, by
+modifying or distributing the Library (or any work based on the
+Library), you indicate your acceptance of this License to do so, and
+all its terms and conditions for copying, distributing or modifying
+the Library or works based on it.
+
+ 10. Each time you redistribute the Library (or any work based on the
+Library), the recipient automatically receives a license from the
+original licensor to copy, distribute, link with or modify the Library
+subject to these terms and conditions. You may not impose any further
+restrictions on the recipients' exercise of the rights granted herein.
+You are not responsible for enforcing compliance by third parties with
+this License.
+
+ 11. If, as a consequence of a court judgment or allegation of patent
+infringement or for any other reason (not limited to patent issues),
+conditions are imposed on you (whether by court order, agreement or
+otherwise) that contradict the conditions of this License, they do not
+excuse you from the conditions of this License. If you cannot
+distribute so as to satisfy simultaneously your obligations under this
+License and any other pertinent obligations, then as a consequence you
+may not distribute the Library at all. For example, if a patent
+license would not permit royalty-free redistribution of the Library by
+all those who receive copies directly or indirectly through you, then
+the only way you could satisfy both it and this License would be to
+refrain entirely from distribution of the Library.
+
+If any portion of this section is held invalid or unenforceable under any
+particular circumstance, the balance of the section is intended to apply,
+and the section as a whole is intended to apply in other circumstances.
+
+It is not the purpose of this section to induce you to infringe any
+patents or other property right claims or to contest validity of any
+such claims; this section has the sole purpose of protecting the
+integrity of the free software distribution system which is
+implemented by public license practices. Many people have made
+generous contributions to the wide range of software distributed
+through that system in reliance on consistent application of that
+system; it is up to the author/donor to decide if he or she is willing
+to distribute software through any other system and a licensee cannot
+impose that choice.
+
+This section is intended to make thoroughly clear what is believed to
+be a consequence of the rest of this License.
+
+ 12. If the distribution and/or use of the Library is restricted in
+certain countries either by patents or by copyrighted interfaces, the
+original copyright holder who places the Library under this License may add
+an explicit geographical distribution limitation excluding those countries,
+so that distribution is permitted only in or among countries not thus
+excluded. In such case, this License incorporates the limitation as if
+written in the body of this License.
+
+ 13. The Free Software Foundation may publish revised and/or new
+versions of the Lesser General Public License from time to time.
+Such new versions will be similar in spirit to the present version,
+but may differ in detail to address new problems or concerns.
+
+Each version is given a distinguishing version number. If the Library
+specifies a version number of this License which applies to it and
+"any later version", you have the option of following the terms and
+conditions either of that version or of any later version published by
+the Free Software Foundation. If the Library does not specify a
+license version number, you may choose any version ever published by
+the Free Software Foundation.
+
+ 14. If you wish to incorporate parts of the Library into other free
+programs whose distribution conditions are incompatible with these,
+write to the author to ask for permission. For software which is
+copyrighted by the Free Software Foundation, write to the Free
+Software Foundation; we sometimes make exceptions for this. Our
+decision will be guided by the two goals of preserving the free status
+of all derivatives of our free software and of promoting the sharing
+and reuse of software generally.
+
+ NO WARRANTY
+
+ 15. BECAUSE THE LIBRARY IS LICENSED FREE OF CHARGE, THERE IS NO
+WARRANTY FOR THE LIBRARY, TO THE EXTENT PERMITTED BY APPLICABLE LAW.
+EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR
+OTHER PARTIES PROVIDE THE LIBRARY "AS IS" WITHOUT WARRANTY OF ANY
+KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE
+IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
+PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE
+LIBRARY IS WITH YOU. SHOULD THE LIBRARY PROVE DEFECTIVE, YOU ASSUME
+THE COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION.
+
+ 16. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN
+WRITING WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY
+AND/OR REDISTRIBUTE THE LIBRARY AS PERMITTED ABOVE, BE LIABLE TO YOU
+FOR DAMAGES, INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR
+CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THE
+LIBRARY (INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING
+RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A
+FAILURE OF THE LIBRARY TO OPERATE WITH ANY OTHER SOFTWARE), EVEN IF
+SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH
+DAMAGES.
+
+ END OF TERMS AND CONDITIONS
+
+ How to Apply These Terms to Your New Libraries
+
+ If you develop a new library, and you want it to be of the greatest
+possible use to the public, we recommend making it free software that
+everyone can redistribute and change. You can do so by permitting
+redistribution under these terms (or, alternatively, under the terms of the
+ordinary General Public License).
+
+ To apply these terms, attach the following notices to the library. It is
+safest to attach them to the start of each source file to most effectively
+convey the exclusion of warranty; and each file should have at least the
+"copyright" line and a pointer to where the full notice is found.
+
+ <one line to give the library's name and a brief idea of what it does.>
+ Copyright (C) <year> <name of author>
+
+ This library is free software; you can redistribute it and/or
+ modify it under the terms of the GNU Lesser General Public
+ License as published by the Free Software Foundation; either
+ version 2.1 of the License, or (at your option) any later version.
+
+ This library is distributed in the hope that it will be useful,
+ but WITHOUT ANY WARRANTY; without even the implied warranty of
+ MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
+ Lesser General Public License for more details.
+
+ You should have received a copy of the GNU Lesser General Public
+ License along with this library; if not, write to the Free Software
+ Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA
+
+Also add information on how to contact you by electronic and paper mail.
+
+You should also get your employer (if you work as a programmer) or your
+school, if any, to sign a "copyright disclaimer" for the library, if
+necessary. Here is a sample; alter the names:
+
+ Yoyodyne, Inc., hereby disclaims all copyright interest in the
+ library `Frob' (a library for tweaking knobs) written by James Random Hacker.
+
+ <signature of Ty Coon>, 1 April 1990
+ Ty Coon, President of Vice
+
+That's all there is to it!
+
+
diff --git a/common/inotify_helpers.c b/common/inotify_helpers.c
new file mode 100644
index 0000000..0aac023
--- /dev/null
+++ b/common/inotify_helpers.c
@@ -0,0 +1,92 @@
+#include <stdio.h>
+#include <stdlib.h>
+
+#include "inotify_helpers.h"
+
+static
+const char *in_bits[] = {
+ /* main */
+ "IN_ACCESS", // 0
+ "IN_MODIFY", // 1
+ "IN_ATTRIB", // 2
+ "IN_CLOSE_WRITE", // 3
+ "IN_CLOSE_NOWRITE", // 4
+ "IN_OPEN", // 5
+ "IN_MOVED_FROM", // 6
+ "IN_MOVED_TO", // 7
+ "IN_CREATE", // 8
+ "IN_DELETE", // 9
+ "IN_DELETE_SELF", // 10
+ "IN_MOVE_SELF", // 11
+ /* gap */
+ "<invalid-12>", // 12
+ /* events sent by the kernel */
+ "IN_UNMOUNT", // 13
+ "IN_Q_OVERFLOW", // 14
+ "IN_IGNORED", // 15
+ /* gap */
+ "<invalid-16>", // 16
+ "<invalid-17>", // 17
+ "<invalid-18>", // 18
+ "<invalid-19>", // 19
+ "<invalid-20>", // 20
+ "<invalid-21>", // 21
+ "<invalid-22>", // 22
+ "<invalid-23>", // 23
+ /* special flags */
+ "IN_ONLYDIR", // 24
+ "IN_DONT_FOLLOW", // 25
+ "IN_EXCL_UNLINK", // 26
+ "<invalid-27>", // 27
+ "<invalid-28>", // 28
+ "IN_MASK_ADD", // 29
+ "IN_ISDIR", // 30
+ "IN_ONESHOT", // 31
+};
+
+char *inotify_mask2str(uint32 mask);
+int inotify_print_event(FILE *file, struct inotify_event *event);
+
+
+struct strbuf {
+ char *str;
+ size_t len;
+ size_t cap;
+};
+
+static
+void strbufcat(struct strbuf *a, const char *b) {
+ size_t blen = strlen(b);
+ while (a->cap <= (a->len + blen)) {
+ a->cap += 256;
+ a->str = realloc(a->str, a->cap);
+ }
+ memcpy(&(a->str[a->len]), b, blen+1);
+ a->len += blen;
+}
+
+
+char *inotify_mask2str(uint32_t mask) {
+ struct strbuf out = { NULL, 0, 0 };
+ for (size_t i = 0; i < sizeof(in_bits)/sizeof(in_bits[0]); i++) {
+ if (mask & (1 << i)) {
+ if (out.len > 0)
+ strbufcat(&out, ", ");
+ strbufcat(&out, in_bits[i]);
+ }
+ }
+ return out.str;
+}
+
+int inotify_print_event(struct inotify_event *event) {
+ return printf("wd:%d\n"
+ "\tmask:[%s]\n"
+ "\tcookie:%u\n"
+ "\tlen:%u\n"
+ "\tname:%s\n",
+ event->wd,
+ mask2str(event->mask),
+ event->cookie,
+ event->len,
+ event->len > 0 ? event->name : "");
+}
diff --git a/common/inotify_helpers.h b/common/inotify_helpers.h
new file mode 100644
index 0000000..5bb7647
--- /dev/null
+++ b/common/inotify_helpers.h
@@ -0,0 +1,80 @@
+/* inotify_helper.h - Simple iteration for inotify events
+ *
+ * Copyright (C) 2014 Luke Shumaker
+ *
+ * This program is free software: you can redistribute it and/or modify
+ * it under the terms of the GNU General Public License as published by
+ * the Free Software Foundation, either version 3 of the License, or
+ * (at your option) any later version.
+ *
+ * This program is distributed in the hope that it will be useful,
+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+ * GNU General Public License for more details.
+ *
+ * You should have received a copy of the GNU General Public License
+ * along with this program. If not, see <http://www.gnu.org/licenses/>.
+ */
+
+/* The usage is pretty simple:
+ *
+ * int my_filedesc = inotify_init();
+ * ...
+ * struct inotify_event *my_event;
+ * for (INOTIFY_ITR(my_filedesc, my_event)) {
+ * ...
+ * }
+ *
+ * Easy, right?
+ */
+
+#ifndef _INOTIFY_HELPER_H
+#define _INOTIFY_HELPER_H
+
+#include <sys/inotify.h>
+#include <limits.h> /* for NAME_MAX */
+#include <string.h> /* for memset(3) */
+#include <unistd.h> /* for read(3) */
+
+struct _inotify_buffer {
+ ssize_t len;
+ ssize_t pos;
+ char dat[sizeof(struct inotify_event)+NAME_MAX+1];
+};
+
+#define _INOTIFY_ITR_EVENT(BUF) \
+ ((struct inotify_event *)&((BUF).dat[(BUF).pos]))
+#define _INOTIFY_ITR_EVENT_SIZE(BUF) \
+ (sizeof(struct inotify_event) + _INOTIFY_ITR_EVENT(BUF)->len)
+
+#define _INOTIFY_ITR_INIT(FD, BUF, EVENT) \
+ struct _inotify_buffer BUF = ({ \
+ struct _inotify_buffer tmp; \
+ memset(&tmp, 0, sizeof(tmp)); \
+ do { \
+ tmp.len = read(FD, tmp.dat, sizeof(tmp.dat)); \
+ } while (tmp.len == 0); \
+ EVENT = (struct inotify_event *)&BUF; \
+ tmp; \
+ })
+#define _INOTIFY_ITR_CHECK(FD, BUF, EVENT) \
+ BUF.len > -1
+#define _INOTIFY_ITR_UPDATE(FD, BUF, EVENT) \
+ EVENT = ({ \
+ if (BUF.len-(BUF.pos+_INOTIFY_ITR_EVENT_SIZE(BUF)) < 1) { \
+ do { \
+ BUF.len = read(FD, BUF.dat, sizeof(BUF.dat)); \
+ } while (BUF.len == 0); \
+ BUF.pos = 0; \
+ } else { \
+ BUF.pos += _INOTIFY_ITR_EVENT_SIZE(BUF); \
+ } \
+ _INOTIFY_ITR_EVENT(BUF); \
+ })
+
+#define INOTIFY_ITR(FD, EVENT) \
+ _INOTIFY_ITR_INIT(FD, _buf, EVENT); \
+ _INOTIFY_ITR_CHECK(FD, _buf, EVENT); \
+ _INOTIFY_ITR_UPDATE(FD, _buf, EVENT)
+
+#endif
diff --git a/nslcd/common.h b/nslcd/common.h
index ce87b09..1893698 100644
--- a/nslcd/common.h
+++ b/nslcd/common.h
@@ -256,20 +256,20 @@ int nslcd_pam_pwmod(TFILE *fp, MYLDAP_SESSION *session, uid_t calleruid);
int nslcd_usermod(TFILE *fp, MYLDAP_SESSION *session, uid_t calleruid);
/* macros for generating service handling code */
-#define NSLCD_HANDLE(db, fn, action, fndecls, fnread, fncheck, fnsearch, fnwrite) \
+#define NSLCD_HANDLE(db, fn, action, fndecls, fnread, fncheck, tentry, fnsearch, fnwrite, fnclean) \
int nslcd_##db##_##fn(TFILE *fp, MYLDAP_SESSION *session) \
- NSLCD_HANDLE_BODY(db, fn, action, fndecls, fnread, fncheck, fnsearch, fnwrite)
-#define NSLCD_HANDLE_UID(db, fn, action, fndecls, fnread, fncheck, fnsearch, fnwrite) \
+ NSLCD_HANDLE_BODY(db, fn, action, fndecls, fnread, fncheck, tentry, fnsearch, fnwrite, fnclean)
+#define NSLCD_HANDLE_UID(db, fn, action, fndecls, fnread, fncheck, tentry, fnsearch, fnwrite, fnclean) \
int nslcd_##db##_##fn(TFILE *fp, MYLDAP_SESSION *session, uid_t calleruid) \
- NSLCD_HANDLE_BODY(db, fn, action, fndecls, fnread, fncheck, fnsearch, fnwrite)
-#define NSLCD_HANDLE_BODY(db, fn, action, fndecls, fnread, fncheck, fnsearch, fnwrite) \
+ NSLCD_HANDLE_BODY(db, fn, action, fndecls, fnread, fncheck, tentry, fnsearch, fnwrite, fnclean)
+#define NSLCD_HANDLE_BODY(db, fn, action, fndecls, fnread, fncheck, tentry, fnsearch, fnwrite, fnclean) \
{ \
/* define common variables */ \
int32_t tmpint32; \
- void *entry = NULL; \
+ tentry *entry = NULL; \
int rc = 1; \
fndecls \
- MYLDAP_ENTRY *search(int *rcp) { fnsearch } \
+ tentry *search(int *rcp) { fnsearch } \
/* read request parameters */ \
fnread \
/* validate request parameters */ \
@@ -280,14 +280,17 @@ int nslcd_usermod(TFILE *fp, MYLDAP_SESSION *session, uid_t calleruid);
/* go over results */ \
while ((entry = search(&rc)) != NULL) \
{ \
- if ( ({ fnwrite }) ) \
+ if ( ({ fnwrite }) ) { \
+ fnclean \
return -1; \
+ } \
} \
/* write the final result code */ \
if (rc == 0) \
{ \
WRITE_INT32(fp, NSLCD_RESULT_END); \
} \
+ fnclean \
return 0; \
}
diff --git a/nslcd/db_pam.c b/nslcd/db_pam.c
index 0eff71b..f47b331 100644
--- a/nslcd/db_pam.c
+++ b/nslcd/db_pam.c
@@ -39,6 +39,17 @@
#include "common/dict.h"
#include "common/expr.h"
+struct authc {
+ int authc_rc;
+ int authz_rc;
+ char authz_msg[BUFLEN_MESSAGE];
+};
+
+struct authz {
+ int authz_rc;
+ char authz_msg[BUFLEN_MESSAGE];
+};
+
/* set up a connection and try to bind with the specified DN and password,
returns an LDAP result code */
static int try_bind(const char *userdn, const char *password,
@@ -94,32 +105,6 @@ static int try_bind(const char *userdn, const char *password,
return rc;
}
-/* ensure that both userdn and username are filled in from the entry,
- returns an LDAP result code */
-static MYLDAP_ENTRY *validate_user(MYLDAP_SESSION *session,
- char *username, int *rcp)
-{
- int rc;
- MYLDAP_ENTRY *entry = NULL;
- /* check username for validity */
- if (!isvalidname(username))
- {
- log_log(LOG_WARNING, "request denied by validnames option");
- *rcp = LDAP_NO_SUCH_OBJECT;
- return NULL;
- }
- /* get the user entry based on the username */
- entry = uid2entry(session, username, &rc);
- if (entry == NULL)
- {
- if (rc == LDAP_SUCCESS)
- rc = LDAP_NO_SUCH_OBJECT;
- log_log(LOG_DEBUG, "\"%s\": user not found: %s", username, ldap_err2string(rc));
- *rcp = rc;
- }
- return entry;
-}
-
/* update the username value from the entry if needed */
static void update_username(MYLDAP_ENTRY *entry, char *username,
size_t username_len)
@@ -156,6 +141,16 @@ static void update_username(MYLDAP_ENTRY *entry, char *username,
}
}
+static int check_password(const char *password, const char *hash)
+{
+ int ret;
+ struct crypt_data data;
+ data.initialized = 0;
+ ret = (strcmp(crypt_r(password, hash, &data), hash) == 0);
+ memset(&data, 0, sizeof(data));
+ return ret;
+}
+
static int check_shadow(MYLDAP_SESSION *session, const char *username,
char *authzmsg, size_t authzmsgsz,
int check_maxdays, int check_mindays)
@@ -260,95 +255,73 @@ static int check_shadow(MYLDAP_SESSION *session, const char *username,
}
/* check authentication credentials of the user */
-int nslcd_pam_authc(TFILE *fp, MYLDAP_SESSION *session, uid_t calleruid)
-{
- int32_t tmpint32;
- int rc;
- char username[BUFLEN_NAME], service[BUFLEN_NAME], ruser[BUFLEN_NAME], rhost[BUFLEN_HOSTNAME], tty[64];
- char password[BUFLEN_PASSWORD];
- const char *userdn;
- MYLDAP_ENTRY *entry;
- int authzrc = NSLCD_PAM_SUCCESS;
- char authzmsg[BUFLEN_MESSAGE];
- authzmsg[0] = '\0';
- /* read request parameters */
+NSLCD_HANDLE_UID(
+ pam, authc, NSLCD_ACTION_PAM_AUTHC
+ ,/* decls */
+ char username[BUFLEN_NAME],
+ service[BUFLEN_NAME],
+ ruser[BUFLEN_NAME],
+ rhost[BUFLEN_HOSTNAME],
+ tty[64],
+ password[BUFLEN_PASSWORD];
+ struct authc _entry;
+ ,/* read */
READ_STRING(fp, username);
READ_STRING(fp, service);
READ_STRING(fp, ruser);
READ_STRING(fp, rhost);
READ_STRING(fp, tty);
READ_STRING(fp, password);
- /* log call */
log_setrequest("authc=\"%s\"", username);
log_log(LOG_DEBUG, "nslcd_pam_authc(\"%s\",\"%s\",\"%s\")",
username, service, *password ? "***" : "");
- /* write the response header */
- WRITE_INT32(fp, NSLCD_VERSION);
- WRITE_INT32(fp, NSLCD_ACTION_PAM_AUTHC);
- /* if the username is blank and rootpwmoddn is configured, try to
- authenticate as administrator, otherwise validate request as usual */
- if (*username == '\0')
+ ,/* check */
+ if (!isvalidname(username))
{
- if (nslcd_cfg->rootpwmoddn == NULL)
- {
- log_log(LOG_NOTICE, "rootpwmoddn not configured");
- /* we break the protocol */
- memset(password, 0, sizeof(password));
- return -1;
- }
- userdn = nslcd_cfg->rootpwmoddn;
- /* if the caller is root we will allow the use of the rootpwmodpw option */
- if ((*password == '\0') && (calleruid == 0) && (nslcd_cfg->rootpwmodpw != NULL))
- {
- if (strlen(nslcd_cfg->rootpwmodpw) >= sizeof(password))
- {
- log_log(LOG_ERR, "nslcd_pam_authc(): rootpwmodpw will not fit in password");
- memset(password, 0, sizeof(password));
- return -1;
- }
- strcpy(password, nslcd_cfg->rootpwmodpw);
- }
+ log_log(LOG_WARNING, "request denied by validnames option");
+ return -1;
}
- else
+ ,/* search(int *rcp) */
+ struct authc,
+ static size_t i = 0;
+ struct passwd *user = NULL;
+ struct authc *entry = &_entry;
+
+ *rcp = 0;
+
+ for (; i < session->cnt; i++)
{
- /* try normal authentication, lookup the user entry */
- entry = validate_user(session, username, &rc);
- if (entry == NULL)
- {
- /* for user not found we just say no result */
- if (rc == LDAP_NO_SUCH_OBJECT)
- {
- WRITE_INT32(fp, NSLCD_RESULT_END);
- }
- memset(password, 0, sizeof(password));
- return -1;
+ if (strcmp(username, session->users[i].pw_name)==0) {
+ *rcp = 0;
+ i = session->cnt;
+ user = &(session->users[i]);
}
- userdn = myldap_get_dn(entry);
- update_username(entry, username, sizeof(username));
}
+ if (user == NULL)
+ return NULL;
+
+ entry->authz_msg[0] = '\0';
+
/* try authentication */
- rc = try_bind(userdn, password, &authzrc, authzmsg, sizeof(authzmsg));
- if (rc == LDAP_SUCCESS)
- log_log(LOG_DEBUG, "bind successful");
- /* map result code */
- switch (rc)
- {
- case LDAP_SUCCESS: rc = NSLCD_PAM_SUCCESS; break;
- case LDAP_INVALID_CREDENTIALS: rc = NSLCD_PAM_AUTH_ERR; break;
- default: rc = NSLCD_PAM_AUTH_ERR;
- }
+ entry->authc_rc = check_password(password, hash)
+ ? NSLCD_PAM_SUCCESS
+ : NSLCD_PAM_AUTH_ERR;
+ entry->authz_rc = entry->authc_rc;
+ myldap_get_policy_response(session, &(entry->authz_rc), &(entry->authz_msg))
+
/* perform shadow attribute checks */
- if ((*username != '\0') && (authzrc == NSLCD_PAM_SUCCESS))
- authzrc = check_shadow(session, username, authzmsg, sizeof(authzmsg), 1, 0);
- /* write response */
+ if (entry->authz_rc == NSLCD_PAM_SUCCESS)
+ entry->authz_rc = check_shadow(session, username, entry->authz_msg, sizeof(entry->authz_msg), 1, 0);
+
+ return entry;
+ ,/* write */
WRITE_INT32(fp, NSLCD_RESULT_BEGIN);
- WRITE_INT32(fp, rc);
+ WRITE_INT32( fp, entry->authc_rc);
WRITE_STRING(fp, username);
- WRITE_INT32(fp, authzrc);
- WRITE_STRING(fp, authzmsg);
- WRITE_INT32(fp, NSLCD_RESULT_END);
+ WRITE_INT32( fp, entry->authz_rc);
+ WRITE_STRING(fp, entry->authz_msg);
+ ,/* cleanup */
memset(password, 0, sizeof(password));
- return 0;
}
static void autzsearch_var_add(DICT *dict, const char *name,
@@ -501,15 +474,16 @@ static int try_autzsearch(MYLDAP_SESSION *session, const char *dn,
}
/* check authorisation of the user */
-int nslcd_pam_authz(TFILE *fp, MYLDAP_SESSION *session)
-{
- int32_t tmpint32;
- int rc;
- char username[BUFLEN_NAME], service[BUFLEN_NAME], ruser[BUFLEN_NAME], rhost[BUFLEN_HOSTNAME], tty[64];
- MYLDAP_ENTRY *entry;
- char authzmsg[BUFLEN_MESSAGE];
- authzmsg[0] = '\0';
- /* read request parameters */
+NSLCD_HANDLE(
+ pam, authz, NSLCD_ACTION_PAM_AUTHZ
+ ,/* decls */
+ char username[BUFLEN_NAME],
+ service[BUFLEN_NAME],
+ ruser[BUFLEN_NAME],
+ rhost[BUFLEN_HOSTNAME],
+ tty[64];
+ struct authz _entry;
+ ,/* read */
READ_STRING(fp, username);
READ_STRING(fp, service);
READ_STRING(fp, ruser);
@@ -519,46 +493,54 @@ int nslcd_pam_authz(TFILE *fp, MYLDAP_SESSION *session)
log_setrequest("authz=\"%s\"", username);
log_log(LOG_DEBUG, "nslcd_pam_authz(\"%s\",\"%s\",\"%s\",\"%s\",\"%s\")",
username, service, ruser, rhost, tty);
- /* write the response header */
- WRITE_INT32(fp, NSLCD_VERSION);
- WRITE_INT32(fp, NSLCD_ACTION_PAM_AUTHZ);
- /* validate request */
- entry = validate_user(session, username, &rc);
- if (entry == NULL)
+ ,/* search(int *rcp) */
+ struct authz,
+ static size_t i = 0;
+ struct passwd *user = NULL;
+ struct authz *entry = &_entry;
+
+ *rcp = 0;
+
+ for (; i < session->cnt; i++)
{
- /* for user not found we just say no result */
- if (rc == LDAP_NO_SUCH_OBJECT)
- {
- WRITE_INT32(fp, NSLCD_RESULT_END);
+ if (strcmp(username, session->users[i].pw_name)==0) {
+ *rcp = 0;
+ i = session->cnt;
+ user = &(session->users[i]);
}
- return -1;
}
+ if (user == NULL)
+ return NULL;
+
/* check authorisation search */
- rc = try_autzsearch(session, myldap_get_dn(entry), username, service, ruser,
- rhost, tty);
+ int rc = try_autzsearch(session, myldap_get_dn(entry),
+ username, service, ruser, rhost, tty);
if (rc != LDAP_SUCCESS)
{
- WRITE_INT32(fp, NSLCD_RESULT_BEGIN);
- WRITE_INT32(fp, NSLCD_PAM_PERM_DENIED);
- WRITE_STRING(fp, "LDAP authorisation check failed");
- WRITE_INT32(fp, NSLCD_RESULT_END);
- return 0;
+ entry->authz_rc = NSLCD_PAM_PERM_DENIED);
+ strcpy(entry->authz_msg, "LDAP authorisation check failed");
+ return entry;
}
+
/* perform shadow attribute checks */
- rc = check_shadow(session, username, authzmsg, sizeof(authzmsg), 0, 0);
- /* write response */
+ entry->authz_rc = check_shadow(session, username, entry->authz_msg, sizeof(entry->authz_msg), 0, 0);
+
+ ,/* write response */
WRITE_INT32(fp, NSLCD_RESULT_BEGIN);
- WRITE_INT32(fp, rc);
- WRITE_STRING(fp, authzmsg);
- WRITE_INT32(fp, NSLCD_RESULT_END);
- return 0;
+ WRITE_INT32( fp, entry->authz_rc);
+ WRITE_STRING(fp, entry->authz_msg);
+ ,/* cleanup */
}
int nslcd_pam_sess_o(TFILE *fp, MYLDAP_SESSION UNUSED(*session))
{
int32_t tmpint32;
- char username[BUFLEN_NAME], service[BUFLEN_NAME], ruser[BUFLEN_NAME], rhost[BUFLEN_HOSTNAME], tty[64];
- char sessionid[25];
+ char username[BUFLEN_NAME],
+ service[BUFLEN_NAME],
+ ruser[BUFLEN_NAME],
+ rhost[BUFLEN_HOSTNAME],
+ tty[64],
+ sessionid[25];
static const char alphabet[] = "ABCDEFGHIJKLMNOPQRSTUVWXYZ"
"abcdefghijklmnopqrstuvwxyz"
"01234567890";
@@ -590,8 +572,12 @@ int nslcd_pam_sess_o(TFILE *fp, MYLDAP_SESSION UNUSED(*session))
int nslcd_pam_sess_c(TFILE *fp, MYLDAP_SESSION UNUSED(*session))
{
int32_t tmpint32;
- char username[BUFLEN_NAME], service[BUFLEN_NAME], ruser[BUFLEN_NAME], rhost[BUFLEN_HOSTNAME], tty[64];
- char sessionid[64];
+ char username[BUFLEN_NAME],
+ service[BUFLEN_NAME],
+ ruser[BUFLEN_NAME],
+ rhost[BUFLEN_HOSTNAME],
+ tty[64],
+ sessionid[64];
/* read request parameters */
READ_STRING(fp, username);
READ_STRING(fp, service);
@@ -735,7 +721,11 @@ int nslcd_pam_pwmod(TFILE *fp, MYLDAP_SESSION *session, uid_t calleruid)
{
int32_t tmpint32;
int rc;
- char username[BUFLEN_NAME], service[BUFLEN_NAME], ruser[BUFLEN_NAME], rhost[BUFLEN_HOSTNAME], tty[64];
+ char username[BUFLEN_NAME],
+ service[BUFLEN_NAME],
+ ruser[BUFLEN_NAME],
+ rhost[BUFLEN_HOSTNAME],
+ tty[64];
int asroot;
char oldpassword[BUFLEN_PASSWORD];
char newpassword[BUFLEN_PASSWORD];
diff --git a/nslcd/db_passwd.c b/nslcd/db_passwd.c
index 12cdea8..17b7781 100644
--- a/nslcd/db_passwd.c
+++ b/nslcd/db_passwd.c
@@ -49,10 +49,10 @@
/* Note that the resulting password value should be one of:
<empty> - no password set, allow login without password
- * - often used to prevent logins
+ ! - used to prevent logins
x - "valid" encrypted password that does not match any valid password
often used to indicate that the password is defined elsewhere
- other - encrypted password, usually in crypt(3) format */
+ other - encrypted password, in crypt(3) format */
static int write_passwd(TFILE *fp, struct passwd *entry, uid_t calleruid)
{
@@ -96,20 +96,22 @@ NSLCD_HANDLE_UID(
log_log(LOG_WARNING, "request denied by validnames option");
return -1;
}
- nsswitch_check_reload();,
- /* search */
+ nsswitch_check_reload();
+ ,/* search */
+ struct passwd,
static size_t i = 0;
for (; i < session->cnt; i++)
{
- if (strcmp(name, session->users[i].pw_name)==0) {
- *rcp = 0;
- i = session->cnt;
- return &(session->users[i]);
- }
+ if (strcmp(name, session->users[i].pw_name)==0) {
+ *rcp = 0;
+ i = session->cnt;
+ return &(session->users[i]);
+ }
}
return NULL;
- /* write */
+ ,/* write */
write_passwd(fp, entry, calleruid)
+ ,/* cleanup */
)
NSLCD_HANDLE_UID(
@@ -130,18 +132,20 @@ NSLCD_HANDLE_UID(
}
nsswitch_check_reload();
,/* search */
+ struct passwd,
static size_t i = 0;
for (; i < session->cnt; i++)
{
- if (uid == session->users[i].pw_uid) {
- *rcp = 0;
- i = session->cnt;
- return &(session->users[i]);
- }
+ if (uid == session->users[i].pw_uid) {
+ *rcp = 0;
+ i = session->cnt;
+ return &(session->users[i]);
+ }
}
return NULL;
,/* write */
write_passwd(fp, entry, calleruid)
+ ,/* cleanup */
)
NSLCD_HANDLE_UID(
@@ -152,6 +156,7 @@ NSLCD_HANDLE_UID(
,/* check */
nsswitch_check_reload();
,/* search */
+ struct passwd,
static size_t i = 0;
for (; i < session->cnt; i++)
{
@@ -160,4 +165,5 @@ NSLCD_HANDLE_UID(
return NULL;
,/* write */
write_passwd(fp, entry, calleruid);
+ ,/* cleanup */
)
diff --git a/nslcd/hackers_parse.c b/nslcd/hackers_parse.c
new file mode 100644
index 0000000..0146197
--- /dev/null
+++ b/nslcd/hackers_parse.c
@@ -0,0 +1,214 @@
+/* hackers_parse.c - load user data from hackers.git
+ *
+ * Copyright (C) 2014 Luke Shumaker
+ *
+ * This program is free software: you can redistribute it and/or modify
+ * it under the terms of the GNU General Public License as published by
+ * the Free Software Foundation, either version 3 of the License, or
+ * (at your option) any later version.
+ *
+ * This program is distributed in the hope that it will be useful,
+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+ * GNU General Public License for more details.
+ *
+ * You should have received a copy of the GNU General Public License
+ * along with this program. If not, see <http://www.gnu.org/licenses/>.
+ */
+#define _GNU_SOURCE
+
+#include <stdbool.h>
+#include <stdio.h>
+#include <yaml.h>
+
+/* These three are just for name2gid, which is surprisingly
+ * complicated. */
+#include <errno.h>
+#include <grp.h>
+#include <unistd.h> /* for sysconf(3) */
+
+#include "hackers_parse.h"
+
+/* None of the malloc-ish calls are error checked. Bite me. */
+
+#define DEFAULT_PASSWORD "!"
+
+#define ASSERT(expr) if (!(expr)) goto error
+
+/* Get a string value from a YAML scalar node */
+#define STR_VALUE(node) \
+ ({ \
+ ASSERT((node)->type == YAML_SCALAR_NODE); \
+ ((char*)(node)->data.scalar.value); \
+ })
+
+/* Bitmask flags for the completion of the fields in
+ * 'struct passwd' (which is defined in <pwd.h>) */
+#define PW_NAME (1 << 0)
+#define PW_PASSWD (1 << 1)
+#define PW_UID (1 << 2)
+#define PW_GID (1 << 3)
+#define PW_GECOS (1 << 4)
+#define PW_DIR (1 << 5)
+#define PW_SHELL (1 << 6)
+#define PW_ALL ((1 << 7) - 1)
+
+static
+gid_t
+name2gid(const char *name) {
+ gid_t gid;
+ ssize_t buflen = sysconf(_SC_GETGR_R_SIZE_MAX);
+ if (buflen < 1)
+ buflen = 256;
+ char *buf = malloc(buflen);
+ struct group grp;
+ struct group *ret;
+ while (getgrnam_r(name, &grp, buf, (size_t)buflen, &ret) < 0) {
+ if (errno == ERANGE) {
+ buflen += 256;
+ buf = realloc(buf, buflen);
+ } else {
+ gid = 0;
+ goto end;
+ }
+ }
+ if (ret == NULL) {
+ gid = 0;
+ goto end;
+ }
+ gid = ret->gr_gid;
+ end:
+ free(buf);
+ return gid;
+}
+
+static
+bool
+is_numeric(const char *str) {
+ size_t i;
+ for (i = 0; str[i] != '\0'; i++) {
+ if ('0' > str[i] || str[i] > '9')
+ return false;
+ }
+ return (i > 0);
+}
+
+uid_t
+filename2uid(const char *filename) {
+ if (filename == NULL)
+ return 0;
+
+ char *tmp = strdupa(filename);
+ char *bname = basename(tmp);
+ char *ext = strchr(bname, '.');
+ if ((strcmp(ext, ".yml") != 0) || (ext != &bname[4]))
+ return 0;
+ ext[0] = '\0';
+ uid_t uid = is_numeric(bname) ? atoi(bname) : 0;
+ return uid;
+}
+
+int
+load_user_password(struct passwd *user) {
+ char *filename = NULL;
+ FILE *file;
+ char *line = NULL;
+ ssize_t line_len;
+ size_t line_cap = 0;
+
+ asprintf(&filename, "%s/.password", user->pw_dir);
+ if ((file = fopen(filename, "r")) == NULL)
+ goto nopassword;
+ // TODO: check permissions on 'file'
+ if ((line_len = getline(&line, &line_cap, file)) < 1)
+ goto nopassword;
+ if (line[line_len-1] == '\n')
+ line[--line_len] = '\0';
+ free(filename);
+ fclose(file);
+ user->pw_passwd = line;
+ return 0;
+ nopassword:
+ free(filename);
+ free(line);
+ user->pw_passwd = strdup("!");
+ return 0;
+}
+
+#define NODE(id) yaml_document_get_node(&yaml_document, id)
+int
+load_user_yaml(const char *filename, struct passwd *user) {
+ int ret = -1;
+ unsigned char flags = 0;
+
+ PASSWD_FREE(*user);
+
+ FILE *yaml_file;
+ yaml_parser_t yaml_parser; ZERO(yaml_parser);
+ yaml_document_t yaml_document; ZERO(yaml_document);
+
+ uid_t uid;
+ ASSERT((uid = user->pw_uid = filename2uid(filename)) > 0);
+ flags |= PW_UID;
+
+ ASSERT((yaml_file = fopen(filename, "r")) != NULL);
+ ASSERT(yaml_parser_initialize(&yaml_parser));
+ yaml_parser_set_input_file(&yaml_parser, yaml_file);
+ ASSERT(yaml_parser_load(&yaml_parser, &yaml_document));
+ yaml_node_t *root = yaml_document_get_root_node(&yaml_document);
+
+ ASSERT(root->type == YAML_MAPPING_NODE);
+ for (yaml_node_pair_t *pair = root->data.mapping.pairs.start;
+ pair < root->data.mapping.pairs.top;
+ pair++) {
+ yaml_node_t *key = NODE(pair->key);
+ yaml_node_t *val = NODE(pair->value);
+ if (strcmp("username", STR_VALUE(key))==0) {
+ user->pw_name = strdup(STR_VALUE(val));
+ asprintf(&(user->pw_dir), "/home/%s", user->pw_name);
+ flags |= PW_NAME | PW_DIR;
+ }
+ if (strcmp("fullname", STR_VALUE(key))==0) {
+ user->pw_gecos = strdup(STR_VALUE(val));
+ flags |= PW_GECOS;
+ }
+ if (strcmp("shell", STR_VALUE(key))==0) {
+ user->pw_shell = strdup(STR_VALUE(val));
+ flags |= PW_SHELL;
+ }
+ if (strcmp("groups", STR_VALUE(key))==0) {
+ if (val->type != YAML_SEQUENCE_NODE)
+ goto error;
+ for (yaml_node_item_t *itemp = val->data.sequence.items.start;
+ itemp < val->data.sequence.items.top;
+ itemp++) {
+ yaml_node_t *item = NODE(*itemp);
+ if (itemp == val->data.sequence.items.start) {
+ /* primary group */
+ char *grp_name = STR_VALUE(item);
+ ASSERT((user->pw_gid = name2gid(grp_name)) > 0);
+ flags |= PW_GID;
+ } else {
+ /* secondary group */
+ // TODO: do something here
+ }
+ }
+ }
+ }
+ if (flags & PW_DIR) {
+ if (load_user_password(user) < 0)
+ goto error;
+ flags |= PW_PASSWD;
+ }
+ ASSERT(flags == PW_ALL);
+ ret = 0;
+ goto end;
+ error:
+ PASSWD_FREE(*user);
+ user->pw_uid = uid;
+ end:
+ yaml_document_delete(&yaml_document);
+ yaml_parser_delete(&yaml_parser);
+ fclose(yaml_file);
+ return ret;
+}
diff --git a/nslcd/hackers_parse.h b/nslcd/hackers_parse.h
new file mode 100644
index 0000000..e1df21d
--- /dev/null
+++ b/nslcd/hackers_parse.h
@@ -0,0 +1,32 @@
+#ifndef _HACKERS_PARSE_H
+#define _HACKERS_PARSE_H
+
+#include <string.h> /* for memset(3) */
+#include <stdlib.h> /* for free(3) */
+#include <pwd.h> /* for 'struct passwd' */
+
+#define ZERO(var) memset(&(var), 0, sizeof(var))
+
+/* Free+zero a 'struct passwd' */
+#define PASSWD_FREE(user) \
+ ({ \
+ free((user).pw_name); \
+ free((user).pw_passwd); \
+ free((user).pw_gecos); \
+ free((user).pw_dir); \
+ free((user).pw_shell); \
+ ZERO(user); \
+ })
+
+/** Returns 0 on error, or the UID on success. Only handles "normal
+ * user" UIDs; that is in the range [1000,9999]. */
+uid_t filename2uid(const char *filename);
+
+/** Returns 0 on success, < 0 on failure. Sets
+ userp->pw_passwd. */
+int load_user_password(struct passwd *userp);
+/** Returns 0 on success, non-zero on failere.
+ May set userp->pw_uid even on failure. */
+int load_user_yaml(const char *filename, struct passwd *userp);
+
+#endif
diff --git a/nslcd/hackers_watch.c b/nslcd/hackers_watch.c
new file mode 100644
index 0000000..5217163
--- /dev/null
+++ b/nslcd/hackers_watch.c
@@ -0,0 +1,188 @@
+/* hackers_watch.c - watch for changes in hackers.git
+ *
+ * Copyright (C) 2014 Luke Shumaker
+ *
+ * This program is free software: you can redistribute it and/or modify
+ * it under the terms of the GNU General Public License as published by
+ * the Free Software Foundation, either version 3 of the License, or
+ * (at your option) any later version.
+ *
+ * This program is distributed in the hope that it will be useful,
+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+ * GNU General Public License for more details.
+ *
+ * You should have received a copy of the GNU General Public License
+ * along with this program. If not, see <http://www.gnu.org/licenses/>.
+ */
+#define _GNU_SOURCE
+
+#include <glob.h>
+#include <stdio.h> /* for asprintf(3) */
+#include <unistd.h> /* for chdir(3) */
+
+#include "inotify_iterator.h"
+#include "hackers_parse.h"
+#include "hackers_watch.h"
+
+#define EVENT_FILE_IS(event, str) \
+ (((event)->len == sizeof(str)) && (strcmp((event)->name, str) == 0))
+#define EVENT_CHILD_ADD (IN_CREATE | IN_MOVED_TO)
+#define EVENT_CHILD_DEL (IN_DELETE | IN_MOVED_FROM)
+#define EVENT_CHILD_MOD (IN_CLOSE_WRITE | IN_MOVED_TO)
+#define EVENT_CHILD_ANY (EVENT_CHILD_ADD | EVENT_CHILD_DEL | EVENT_CHILD_MOD)
+
+#define WATCH_HOMEDIR(session, i) \
+ session->in_user_wds[i] = \
+ inotify_add_watch(session->in_fd, \
+ session->users[i].pw_dir, \
+ EVENT_CHILD_ANY | IN_MOVE_SELF)
+
+int
+hackers_init(const char *yamldir, struct session *sess) {
+ char *glob_pattern;
+ glob_t glob_results;
+ char *filename;
+
+ sess->yamldir = strdup(yamldir);
+ pthread_rwlock_init(&(sess->lock), NULL);
+ sess->in_fd = inotify_init();
+ sess->in_wd_yaml = inotify_add_watch(sess->in_fd, yamldir, EVENT_CHILD_ANY);
+ sess->in_wd_home = inotify_add_watch(sess->in_fd, "/home" , EVENT_CHILD_ADD);
+
+ asprintf(&glob_pattern, "%s/*.yml", yamldir);
+ glob(glob_pattern, 0, NULL, &glob_results);
+ free(glob_pattern);
+
+ sess->cnt = glob_results.gl_pathc - glob_results.gl_offs;
+ sess->users = calloc(sess->cnt, sizeof(struct passwd));
+ sess->in_user_wds = calloc(sess->cnt, sizeof(int));
+
+ for (size_t i = 0; i < sess->cnt; i++) {
+ filename = glob_results.gl_pathv[glob_results.gl_offs+i];
+ if (load_user_yaml(filename, &(sess->users[i]))==0) {
+ WATCH_HOMEDIR(sess, i);
+ } else {
+ sess->users[i].pw_uid = 0;
+ sess->in_user_wds[i] = -1;
+ }
+ }
+
+ globfree(&glob_results);
+
+ return 0;
+}
+
+static
+void
+worker_watch_homedirs(struct session *sess) {
+ pthread_rwlock_wrlock(&(sess->lock));
+ for (size_t i = 0; i < sess->cnt; i++) {
+ if (sess->users[i].pw_uid > 0) {
+ int oldwd = sess->in_user_wds[i];
+ WATCH_HOMEDIR(sess, i);
+ if (oldwd != sess->in_user_wds[i]) {
+ if (oldwd != -1)
+ inotify_rm_watch(sess->in_fd, oldwd);
+ load_user_password(&(sess->users[i]));
+ }
+ }
+ }
+ pthread_rwlock_unlock(&(sess->lock));
+}
+
+static
+void
+worker_handle_add_yaml(struct session *sess, struct passwd *newdata) {
+ /* We have to first see if this is for an existing UID, then
+ * if it's not, we need to find an empty slot, potentially
+ * realloc()ing the array.
+ */
+ pthread_rwlock_wrlock(&(sess->lock));
+ ssize_t spot = -1;
+ for (size_t i = 0; i < sess->cnt; i++) {
+ if (spot < 0 && sess->users[i].pw_uid == 0) {
+ spot = i;
+ }
+ if (sess->users[i].pw_uid == newdata->pw_uid) {
+ spot = i;
+ break;
+ }
+ }
+ if (spot < 0) {
+ /* must grow the array */
+ spot = sess->cnt++;
+ sess->users = realloc(sess->users , sess->cnt * sizeof(struct passwd));
+ sess->in_user_wds = realloc(sess->in_user_wds, sess->cnt * sizeof(int));
+ ZERO(sess->users[spot]);
+ } else if (sess->users[spot].pw_uid != 0) {
+ PASSWD_FREE(sess->users[spot]);
+ }
+ sess->users[spot] = *newdata;
+ pthread_rwlock_unlock(&(sess->lock));
+}
+
+static
+void
+worker_handle_del_yaml(struct session *sess, uid_t uid) {
+ pthread_rwlock_wrlock(&(sess->lock));
+ for (size_t i = 0; i < sess->cnt; i++) {
+ if (sess->users[i].pw_uid == uid) {
+ PASSWD_FREE(sess->users[i]);
+ inotify_rm_watch(sess->in_fd, sess->in_user_wds[i]);
+ break;
+ }
+ }
+ pthread_rwlock_unlock(&(sess->lock));
+}
+
+int
+hackers_worker(struct session *sess) {
+ chdir(sess->yamldir);
+ struct inotify_event *event;
+ for (INOTIFY_ITERATOR(sess->in_fd, event)) {
+ if (event->wd == sess->in_wd_yaml) {
+ /* handle updates to yaml files */
+ if (event->mask & (EVENT_CHILD_ADD | EVENT_CHILD_MOD)) {
+ struct passwd user; ZERO(user);
+ if (load_user_yaml(event->name, &user)==0) {
+ /* User added/updated */
+ worker_handle_add_yaml(sess, &user);
+ } else if (user.pw_uid > 0) {
+ /* User became invalid */
+ worker_handle_del_yaml(sess,
+ user.pw_uid);
+ }
+ } else if (event->mask & EVENT_CHILD_DEL) {
+ uid_t uid = filename2uid(event->name);
+ if (uid > 0) {
+ worker_handle_del_yaml(sess, uid);
+ }
+ }
+ } else if ((event->wd == sess->in_wd_home)
+ && (event->mask & IN_ISDIR)) {
+ /* handle added home directory */
+ worker_watch_homedirs(sess);
+ } else {
+ /* handle a change to someone's password */
+ if (event->mask & IN_MOVE_SELF) {
+ inotify_rm_watch(sess->in_fd, event->wd);
+ worker_watch_homedirs(sess);
+ }
+ if ((event->mask & IN_IGNORED)
+ || EVENT_FILE_IS(event, ".password")) {
+ pthread_rwlock_wrlock(&(sess->lock));
+ for (size_t i = 0; i < sess->cnt; i++) {
+ if (sess->in_user_wds[i] == event->wd) {
+ if (event->mask & IN_IGNORED)
+ sess->in_user_wds[i] = -1;
+ load_user_password(&(sess->users[i]));
+ break;
+ }
+ }
+ pthread_rwlock_unlock(&(sess->lock));
+ }
+ }
+ }
+ return -1;
+}
diff --git a/nslcd/hackers_watch.h b/nslcd/hackers_watch.h
new file mode 100644
index 0000000..156813e
--- /dev/null
+++ b/nslcd/hackers_watch.h
@@ -0,0 +1,21 @@
+#ifndef _HACKERS_WATCH_H
+#define _HACKERS_WATCH_H
+
+#include <pthread.h>
+
+struct session {
+ pthread_rwlock_t lock;
+ size_t cnt;
+ struct passwd *users;
+ /* The following are only for writers */
+ char *yamldir;
+ int *in_user_wds;
+ int in_fd;
+ int in_wd_home;
+ int in_wd_yaml;
+};
+
+int hackers_init(const char *yamldir, struct session *session);
+int hackers_worker(struct session *session);
+
+#endif
diff --git a/nslcd/inotify_helper.c b/nslcd/inotify_helper.c
new file mode 100644
index 0000000..dc1ae63
--- /dev/null
+++ b/nslcd/inotify_helper.c
@@ -0,0 +1,51 @@
+/* helper.h */
+#include <sys/inotify.h> /* for 'struct inotify_event' */
+#include <limits.h> /* for 'NAME_MAX' */
+
+struct inotify_buffer {
+ ssize_t len;
+ ssize_t pos;
+ char dat[sizeof(struct inotify_event)+NAME_MAX+1];
+};
+
+struct inotify_event *inotify_next_event_r(int fd, struct inotify_buffer *buf);
+struct inotify_event *inotify_next_event(int fd);
+
+#define INOTIFY_ITERATOR(FD, EVENT) \
+ struct inotify_event *EVENT = inotify_next_event(FD); \
+ EVENT != NULL; \
+ EVENT = inotify_next_event(FD)
+
+#define INOTIFY_ITERATOR_R(FD, EVENT, BUF) \
+ struct inotify_event *EVENT = inotify_next_event_r(FD, BUF); \
+ EVENT != NULL; \
+ EVENT = inotify_next_event_r(FD, BUF)
+
+/* helper.c */
+#include <unistd.h> /* for read(3) */
+
+#define EVENT_PTR(BUF) ((struct inotify_event *)&((BUF)->dat[(BUF)->pos]))
+#define EVENT_SIZE(BUF) (sizeof(struct inotify_event) + EVENT_PTR(BUF)->len)
+
+struct inotify_event *
+inotify_next_event_r(int fd, struct inotify_buffer *buf) {
+ if ((buf->len - buf->pos > sizeof(struct inotify_event))
+ && (buf->len - buf->pos > EVENT_SIZE(buf))) {
+ buf->pos += EVENT_SIZE(buf);
+ } else {
+ do {
+ buf->len = read(FD, buf->dat, sizeof(buf->dat));
+ } while (buf->len == 0);
+ BUF.pos = 0;
+ if (buf->len < 0) {
+ return NULL;
+ }
+ }
+ return EVENT_PTR(buf);
+}
+
+struct inotify_event *
+inotify_next_event(int fd) {
+ static struct inotify_buffer buf = { 0 };
+ return inotify_next_event_r(fd, &buf);
+}
diff --git a/nslcd/inotify_iterator.h b/nslcd/inotify_iterator.h
new file mode 100644
index 0000000..0fa5829
--- /dev/null
+++ b/nslcd/inotify_iterator.h
@@ -0,0 +1,78 @@
+/* inotify_helper.h - Simple iteration for inotify events
+ *
+ * Copyright (C) 2014 Luke Shumaker
+ *
+ * This program is free software: you can redistribute it and/or modify
+ * it under the terms of the GNU General Public License as published by
+ * the Free Software Foundation, either version 3 of the License, or
+ * (at your option) any later version.
+ *
+ * This program is distributed in the hope that it will be useful,
+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+ * GNU General Public License for more details.
+ *
+ * You should have received a copy of the GNU General Public License
+ * along with this program. If not, see <http://www.gnu.org/licenses/>.
+ */
+
+/* The usage is pretty simple:
+ *
+ * int my_filedesc = inotify_init();
+ * ...
+ * struct inotify_event *my_event;
+ * for (INOTIFY_ITERATOR(my_filedesc, my_event)) {
+ * ...
+ * }
+ *
+ * Easy, right?
+ */
+
+#ifndef _INOTIFY_ITERATOR_H
+#define _INOTIFY_ITERATOR_H
+
+#include <sys/inotify.h>
+#include <limits.h> /* for NAME_MAX */
+#include <string.h> /* for memset(3) */
+#include <unistd.h> /* for read(3) */
+
+struct _inotify_buffer {
+ ssize_t len;
+ ssize_t pos;
+ char dat[sizeof(struct inotify_event)+NAME_MAX+1];
+};
+
+#define _INOTIFY_ITERATOR_EVENT(BUF) \
+ ((struct inotify_event *)&((BUF).dat[(BUF).pos]))
+#define _INOTIFY_ITERATOR_EVENT_SIZE(BUF) \
+ (sizeof(struct inotify_event) + _INOTIFY_ITERATOR_EVENT(BUF)->len)
+#define _INOTIFY_ITERATOR_CHECK(FD, BUF, EVENT) \
+ BUF.len > -1
+#define _INOTIFY_ITERATOR_UPDATE(FD, BUF, EVENT) \
+ EVENT = ({ \
+ if (BUF.len-(BUF.pos+_INOTIFY_ITERATOR_EVENT_SIZE(BUF)) < 1) { \
+ do { \
+ BUF.len = read(FD, BUF.dat, sizeof(BUF.dat)); \
+ } while (BUF.len == 0); \
+ BUF.pos = 0; \
+ } else { \
+ BUF.pos += _INOTIFY_ITERATOR_EVENT_SIZE(BUF); \
+ } \
+ _INOTIFY_ITERATOR_EVENT(BUF); \
+ })
+#define _INOTIFY_ITERATOR_INIT(FD, BUF, EVENT) \
+ struct _inotify_buffer BUF = ({ \
+ struct _inotify_buffer tmp; \
+ memset(&tmp, 0, sizeof(tmp)); \
+ do { \
+ tmp.len = read(FD, tmp.dat, sizeof(tmp.dat)); \
+ } while (tmp.len == 0); \
+ EVENT = (struct inotify_event *)&BUF; \
+ tmp; \
+ })
+#define INOTIFY_ITERATOR(FD, EVENT) \
+ _INOTIFY_ITERATOR_INIT(FD, _buf, EVENT); \
+ _INOTIFY_ITERATOR_CHECK(FD, _buf, EVENT); \
+ _INOTIFY_ITERATOR_UPDATE(FD, _buf, EVENT)
+
+#endif
diff --git a/utils/hackers-chpassword.c b/utils/hackers-chpassword.c
new file mode 100644
index 0000000..e69de29
--- /dev/null
+++ b/utils/hackers-chpassword.c