Merge branch 'release/1.1.0'
commit
57a6748c00
|
@ -47,18 +47,31 @@ tags
|
|||
*.org
|
||||
|
||||
# Ignore log files and directories from tests:
|
||||
keys/*
|
||||
*keys/*
|
||||
*generated-keys*
|
||||
*.pubring
|
||||
*.secring
|
||||
*random_seed*
|
||||
*.log
|
||||
tests/doctests/*
|
||||
gnupg/test/doctests/*
|
||||
gnupg/test/logs/*
|
||||
gnupg/test/tmp/*
|
||||
gnupg/test/files/*
|
||||
|
||||
# Ignore distutils record of installed files:
|
||||
installed-files.txt
|
||||
|
||||
# Ignore maintainer setup.cfg file:
|
||||
setup.cfg
|
||||
|
||||
# Ignore PyCharm files:
|
||||
.idea/*
|
||||
|
||||
# and git-tickets and tickets:
|
||||
.tickets/*
|
||||
tickets/*
|
||||
TICKET-*
|
||||
|
||||
# Ignore virtualenv folders, if they are here:
|
||||
include/*
|
||||
|
@ -67,8 +80,9 @@ local/*
|
|||
# Ignore gpg binary symlinks:
|
||||
gpg
|
||||
|
||||
# Ignore keys generated during tests:
|
||||
*generated-keys*
|
||||
*.pubring
|
||||
*.secring
|
||||
*random_seed*
|
||||
# Ignore quilt patch directory:
|
||||
.pc/*
|
||||
|
||||
# setuptools/distribute files:
|
||||
PKG-INFO
|
||||
MANIFEST*
|
||||
|
|
|
@ -1 +0,0 @@
|
|||
patches
|
|
@ -1 +0,0 @@
|
|||
series
|
|
@ -1 +0,0 @@
|
|||
2
|
File diff suppressed because it is too large
Load Diff
|
@ -1 +0,0 @@
|
|||
0001-Make-_open_subprocess-argument-more-explicit-in-_han.patch
|
655
LICENSE
655
LICENSE
|
@ -1,655 +0,0 @@
|
|||
Copyright (c) 2013 Isis Lovecruft
|
||||
Copyright (c) 2008-2012 by Vinay Sajip.
|
||||
All rights reserved.
|
||||
|
||||
GNU AFFERO GENERAL PUBLIC LICENSE
|
||||
Version 3, 19 November 2007
|
||||
|
||||
Copyright (C) 2007 Free Software Foundation, Inc. <http://fsf.org/>
|
||||
Everyone is permitted to copy and distribute verbatim copies
|
||||
of this license document, but changing it is not allowed.
|
||||
|
||||
Preamble
|
||||
|
||||
The GNU Affero General Public License is a free, copyleft license for
|
||||
software and other kinds of works, specifically designed to ensure
|
||||
cooperation with the community in the case of network server software.
|
||||
|
||||
The licenses for most software and other practical works are designed
|
||||
to take away your freedom to share and change the works. By contrast,
|
||||
our General Public Licenses are intended to guarantee your freedom to
|
||||
share and change all versions of a program--to make sure it remains free
|
||||
software for all its users.
|
||||
|
||||
When we speak of free software, we are referring to freedom, not
|
||||
price. Our General Public Licenses are designed to make sure that you
|
||||
have the freedom to distribute copies of free software (and charge for
|
||||
them if you wish), that you receive source code or can get it if you
|
||||
want it, that you can change the software or use pieces of it in new
|
||||
free programs, and that you know you can do these things.
|
||||
|
||||
Developers that use our General Public Licenses protect your rights
|
||||
with two steps: (1) assert copyright on the software, and (2) offer
|
||||
you this License which gives you legal permission to copy, distribute
|
||||
and/or modify the software.
|
||||
|
||||
A secondary benefit of defending all users' freedom is that
|
||||
improvements made in alternate versions of the program, if they
|
||||
receive widespread use, become available for other developers to
|
||||
incorporate. Many developers of free software are heartened and
|
||||
encouraged by the resulting cooperation. However, in the case of
|
||||
software used on network servers, this result may fail to come about.
|
||||
The GNU General Public License permits making a modified version and
|
||||
letting the public access it on a server without ever releasing its
|
||||
source code to the public.
|
||||
|
||||
The GNU Affero General Public License is designed specifically to
|
||||
ensure that, in such cases, the modified source code becomes available
|
||||
to the community. It requires the operator of a network server to
|
||||
provide the source code of the modified version running there to the
|
||||
users of that server. Therefore, public use of a modified version, on
|
||||
a publicly accessible server, gives the public access to the source
|
||||
code of the modified version.
|
||||
|
||||
An older license, called the Affero General Public License and
|
||||
published by Affero, was designed to accomplish similar goals. This is
|
||||
a different license, not a version of the Affero GPL, but Affero has
|
||||
released a new version of the Affero GPL which permits relicensing under
|
||||
this license.
|
||||
|
||||
The precise terms and conditions for copying, distribution and
|
||||
modification follow.
|
||||
|
||||
TERMS AND CONDITIONS
|
||||
|
||||
0. Definitions.
|
||||
|
||||
"This License" refers to version 3 of the GNU Affero General Public License.
|
||||
|
||||
"Copyright" also means copyright-like laws that apply to other kinds of
|
||||
works, such as semiconductor masks.
|
||||
|
||||
"The Program" refers to any copyrightable work licensed under this
|
||||
License. Each licensee is addressed as "you". "Licensees" and
|
||||
"recipients" may be individuals or organizations.
|
||||
|
||||
To "modify" a work means to copy from or adapt all or part of the work
|
||||
in a fashion requiring copyright permission, other than the making of an
|
||||
exact copy. The resulting work is called a "modified version" of the
|
||||
earlier work or a work "based on" the earlier work.
|
||||
|
||||
A "covered work" means either the unmodified Program or a work based
|
||||
on the Program.
|
||||
|
||||
To "propagate" a work means to do anything with it that, without
|
||||
permission, would make you directly or secondarily liable for
|
||||
infringement under applicable copyright law, except executing it on a
|
||||
computer or modifying a private copy. Propagation includes copying,
|
||||
distribution (with or without modification), making available to the
|
||||
public, and in some countries other activities as well.
|
||||
|
||||
To "convey" a work means any kind of propagation that enables other
|
||||
parties to make or receive copies. Mere interaction with a user through
|
||||
a computer network, with no transfer of a copy, is not conveying.
|
||||
|
||||
An interactive user interface displays "Appropriate Legal Notices"
|
||||
to the extent that it includes a convenient and prominently visible
|
||||
feature that (1) displays an appropriate copyright notice, and (2)
|
||||
tells the user that there is no warranty for the work (except to the
|
||||
extent that warranties are provided), that licensees may convey the
|
||||
work under this License, and how to view a copy of this License. If
|
||||
the interface presents a list of user commands or options, such as a
|
||||
menu, a prominent item in the list meets this criterion.
|
||||
|
||||
1. Source Code.
|
||||
|
||||
The "source code" for a work means the preferred form of the work
|
||||
for making modifications to it. "Object code" means any non-source
|
||||
form of a work.
|
||||
|
||||
A "Standard Interface" means an interface that either is an official
|
||||
standard defined by a recognized standards body, or, in the case of
|
||||
interfaces specified for a particular programming language, one that
|
||||
is widely used among developers working in that language.
|
||||
|
||||
The "System Libraries" of an executable work include anything, other
|
||||
than the work as a whole, that (a) is included in the normal form of
|
||||
packaging a Major Component, but which is not part of that Major
|
||||
Component, and (b) serves only to enable use of the work with that
|
||||
Major Component, or to implement a Standard Interface for which an
|
||||
implementation is available to the public in source code form. A
|
||||
"Major Component", in this context, means a major essential component
|
||||
(kernel, window system, and so on) of the specific operating system
|
||||
(if any) on which the executable work runs, or a compiler used to
|
||||
produce the work, or an object code interpreter used to run it.
|
||||
|
||||
The "Corresponding Source" for a work in object code form means all
|
||||
the source code needed to generate, install, and (for an executable
|
||||
work) run the object code and to modify the work, including scripts to
|
||||
control those activities. However, it does not include the work's
|
||||
System Libraries, or general-purpose tools or generally available free
|
||||
programs which are used unmodified in performing those activities but
|
||||
which are not part of the work. For example, Corresponding Source
|
||||
includes interface definition files associated with source files for
|
||||
the work, and the source code for shared libraries and dynamically
|
||||
linked subprograms that the work is specifically designed to require,
|
||||
such as by intimate data communication or control flow between those
|
||||
subprograms and other parts of the work.
|
||||
|
||||
The Corresponding Source need not include anything that users
|
||||
can regenerate automatically from other parts of the Corresponding
|
||||
Source.
|
||||
|
||||
The Corresponding Source for a work in source code form is that
|
||||
same work.
|
||||
|
||||
2. Basic Permissions.
|
||||
|
||||
All rights granted under this License are granted for the term of
|
||||
copyright on the Program, and are irrevocable provided the stated
|
||||
conditions are met. This License explicitly affirms your unlimited
|
||||
permission to run the unmodified Program. The output from running a
|
||||
covered work is covered by this License only if the output, given its
|
||||
content, constitutes a covered work. This License acknowledges your
|
||||
rights of fair use or other equivalent, as provided by copyright law.
|
||||
|
||||
You may make, run and propagate covered works that you do not
|
||||
convey, without conditions so long as your license otherwise remains
|
||||
in force. You may convey covered works to others for the sole purpose
|
||||
of having them make modifications exclusively for you, or provide you
|
||||
with facilities for running those works, provided that you comply with
|
||||
the terms of this License in conveying all material for which you do
|
||||
not control copyright. Those thus making or running the covered works
|
||||
for you must do so exclusively on your behalf, under your direction
|
||||
and control, on terms that prohibit them from making any copies of
|
||||
your copyrighted material outside their relationship with you.
|
||||
|
||||
Conveying under any other circumstances is permitted solely under
|
||||
the conditions stated below. Sublicensing is not allowed; section 10
|
||||
makes it unnecessary.
|
||||
|
||||
3. Protecting Users' Legal Rights From Anti-Circumvention Law.
|
||||
|
||||
No covered work shall be deemed part of an effective technological
|
||||
measure under any applicable law fulfilling obligations under article
|
||||
11 of the WIPO copyright treaty adopted on 20 December 1996, or
|
||||
similar laws prohibiting or restricting circumvention of such
|
||||
measures.
|
||||
|
||||
When you convey a covered work, you waive any legal power to forbid
|
||||
circumvention of technological measures to the extent such circumvention
|
||||
is effected by exercising rights under this License with respect to
|
||||
the covered work, and you disclaim any intention to limit operation or
|
||||
modification of the work as a means of enforcing, against the work's
|
||||
users, your or third parties' legal rights to forbid circumvention of
|
||||
technological measures.
|
||||
|
||||
4. Conveying Verbatim Copies.
|
||||
|
||||
You may convey verbatim copies of the Program's source code as you
|
||||
receive it, in any medium, provided that you conspicuously and
|
||||
appropriately publish on each copy an appropriate copyright notice;
|
||||
keep intact all notices stating that this License and any
|
||||
non-permissive terms added in accord with section 7 apply to the code;
|
||||
keep intact all notices of the absence of any warranty; and give all
|
||||
recipients a copy of this License along with the Program.
|
||||
|
||||
You may charge any price or no price for each copy that you convey,
|
||||
and you may offer support or warranty protection for a fee.
|
||||
|
||||
5. Conveying Modified Source Versions.
|
||||
|
||||
You may convey a work based on the Program, or the modifications to
|
||||
produce it from the Program, in the form of source code under the
|
||||
terms of section 4, provided that you also meet all of these conditions:
|
||||
|
||||
a) The work must carry prominent notices stating that you modified
|
||||
it, and giving a relevant date.
|
||||
|
||||
b) The work must carry prominent notices stating that it is
|
||||
released under this License and any conditions added under section
|
||||
7. This requirement modifies the requirement in section 4 to
|
||||
"keep intact all notices".
|
||||
|
||||
c) You must license the entire work, as a whole, under this
|
||||
License to anyone who comes into possession of a copy. This
|
||||
License will therefore apply, along with any applicable section 7
|
||||
additional terms, to the whole of the work, and all its parts,
|
||||
regardless of how they are packaged. This License gives no
|
||||
permission to license the work in any other way, but it does not
|
||||
invalidate such permission if you have separately received it.
|
||||
|
||||
d) If the work has interactive user interfaces, each must display
|
||||
Appropriate Legal Notices; however, if the Program has interactive
|
||||
interfaces that do not display Appropriate Legal Notices, your
|
||||
work need not make them do so.
|
||||
|
||||
A compilation of a covered work with other separate and independent
|
||||
works, which are not by their nature extensions of the covered work,
|
||||
and which are not combined with it such as to form a larger program,
|
||||
in or on a volume of a storage or distribution medium, is called an
|
||||
"aggregate" if the compilation and its resulting copyright are not
|
||||
used to limit the access or legal rights of the compilation's users
|
||||
beyond what the individual works permit. Inclusion of a covered work
|
||||
in an aggregate does not cause this License to apply to the other
|
||||
parts of the aggregate.
|
||||
|
||||
6. Conveying Non-Source Forms.
|
||||
|
||||
You may convey a covered work in object code form under the terms
|
||||
of sections 4 and 5, provided that you also convey the
|
||||
machine-readable Corresponding Source under the terms of this License,
|
||||
in one of these ways:
|
||||
|
||||
a) Convey the object code in, or embodied in, a physical product
|
||||
(including a physical distribution medium), accompanied by the
|
||||
Corresponding Source fixed on a durable physical medium
|
||||
customarily used for software interchange.
|
||||
|
||||
b) Convey the object code in, or embodied in, a physical product
|
||||
(including a physical distribution medium), accompanied by a
|
||||
written offer, valid for at least three years and valid for as
|
||||
long as you offer spare parts or customer support for that product
|
||||
model, to give anyone who possesses the object code either (1) a
|
||||
copy of the Corresponding Source for all the software in the
|
||||
product that is covered by this License, on a durable physical
|
||||
medium customarily used for software interchange, for a price no
|
||||
more than your reasonable cost of physically performing this
|
||||
conveying of source, or (2) access to copy the
|
||||
Corresponding Source from a network server at no charge.
|
||||
|
||||
c) Convey individual copies of the object code with a copy of the
|
||||
written offer to provide the Corresponding Source. This
|
||||
alternative is allowed only occasionally and noncommercially, and
|
||||
only if you received the object code with such an offer, in accord
|
||||
with subsection 6b.
|
||||
|
||||
d) Convey the object code by offering access from a designated
|
||||
place (gratis or for a charge), and offer equivalent access to the
|
||||
Corresponding Source in the same way through the same place at no
|
||||
further charge. You need not require recipients to copy the
|
||||
Corresponding Source along with the object code. If the place to
|
||||
copy the object code is a network server, the Corresponding Source
|
||||
may be on a different server (operated by you or a third party)
|
||||
that supports equivalent copying facilities, provided you maintain
|
||||
clear directions next to the object code saying where to find the
|
||||
Corresponding Source. Regardless of what server hosts the
|
||||
Corresponding Source, you remain obligated to ensure that it is
|
||||
available for as long as needed to satisfy these requirements.
|
||||
|
||||
e) Convey the object code using peer-to-peer transmission, provided
|
||||
you inform other peers where the object code and Corresponding
|
||||
Source of the work are being offered to the general public at no
|
||||
charge under subsection 6d.
|
||||
|
||||
A separable portion of the object code, whose source code is excluded
|
||||
from the Corresponding Source as a System Library, need not be
|
||||
included in conveying the object code work.
|
||||
|
||||
A "User Product" is either (1) a "consumer product", which means any
|
||||
tangible personal property which is normally used for personal, family,
|
||||
or household purposes, or (2) anything designed or sold for incorporation
|
||||
into a dwelling. In determining whether a product is a consumer product,
|
||||
doubtful cases shall be resolved in favor of coverage. For a particular
|
||||
product received by a particular user, "normally used" refers to a
|
||||
typical or common use of that class of product, regardless of the status
|
||||
of the particular user or of the way in which the particular user
|
||||
actually uses, or expects or is expected to use, the product. A product
|
||||
is a consumer product regardless of whether the product has substantial
|
||||
commercial, industrial or non-consumer uses, unless such uses represent
|
||||
the only significant mode of use of the product.
|
||||
|
||||
"Installation Information" for a User Product means any methods,
|
||||
procedures, authorization keys, or other information required to install
|
||||
and execute modified versions of a covered work in that User Product from
|
||||
a modified version of its Corresponding Source. The information must
|
||||
suffice to ensure that the continued functioning of the modified object
|
||||
code is in no case prevented or interfered with solely because
|
||||
modification has been made.
|
||||
|
||||
If you convey an object code work under this section in, or with, or
|
||||
specifically for use in, a User Product, and the conveying occurs as
|
||||
part of a transaction in which the right of possession and use of the
|
||||
User Product is transferred to the recipient in perpetuity or for a
|
||||
fixed term (regardless of how the transaction is characterized), the
|
||||
Corresponding Source conveyed under this section must be accompanied
|
||||
by the Installation Information. But this requirement does not apply
|
||||
if neither you nor any third party retains the ability to install
|
||||
modified object code on the User Product (for example, the work has
|
||||
been installed in ROM).
|
||||
|
||||
The requirement to provide Installation Information does not include a
|
||||
requirement to continue to provide support service, warranty, or updates
|
||||
for a work that has been modified or installed by the recipient, or for
|
||||
the User Product in which it has been modified or installed. Access to a
|
||||
network may be denied when the modification itself materially and
|
||||
adversely affects the operation of the network or violates the rules and
|
||||
protocols for communication across the network.
|
||||
|
||||
Corresponding Source conveyed, and Installation Information provided,
|
||||
in accord with this section must be in a format that is publicly
|
||||
documented (and with an implementation available to the public in
|
||||
source code form), and must require no special password or key for
|
||||
unpacking, reading or copying.
|
||||
|
||||
7. Additional Terms.
|
||||
|
||||
"Additional permissions" are terms that supplement the terms of this
|
||||
License by making exceptions from one or more of its conditions.
|
||||
Additional permissions that are applicable to the entire Program shall
|
||||
be treated as though they were included in this License, to the extent
|
||||
that they are valid under applicable law. If additional permissions
|
||||
apply only to part of the Program, that part may be used separately
|
||||
under those permissions, but the entire Program remains governed by
|
||||
this License without regard to the additional permissions.
|
||||
|
||||
When you convey a copy of a covered work, you may at your option
|
||||
remove any additional permissions from that copy, or from any part of
|
||||
it. (Additional permissions may be written to require their own
|
||||
removal in certain cases when you modify the work.) You may place
|
||||
additional permissions on material, added by you to a covered work,
|
||||
for which you have or can give appropriate copyright permission.
|
||||
|
||||
Notwithstanding any other provision of this License, for material you
|
||||
add to a covered work, you may (if authorized by the copyright holders of
|
||||
that material) supplement the terms of this License with terms:
|
||||
|
||||
a) Disclaiming warranty or limiting liability differently from the
|
||||
terms of sections 15 and 16 of this License; or
|
||||
|
||||
b) Requiring preservation of specified reasonable legal notices or
|
||||
author attributions in that material or in the Appropriate Legal
|
||||
Notices displayed by works containing it; or
|
||||
|
||||
c) Prohibiting misrepresentation of the origin of that material, or
|
||||
requiring that modified versions of such material be marked in
|
||||
reasonable ways as different from the original version; or
|
||||
|
||||
d) Limiting the use for publicity purposes of names of licensors or
|
||||
authors of the material; or
|
||||
|
||||
e) Declining to grant rights under trademark law for use of some
|
||||
trade names, trademarks, or service marks; or
|
||||
|
||||
f) Requiring indemnification of licensors and authors of that
|
||||
material by anyone who conveys the material (or modified versions of
|
||||
it) with contractual assumptions of liability to the recipient, for
|
||||
any liability that these contractual assumptions directly impose on
|
||||
those licensors and authors.
|
||||
|
||||
All other non-permissive additional terms are considered "further
|
||||
restrictions" within the meaning of section 10. If the Program as you
|
||||
received it, or any part of it, contains a notice stating that it is
|
||||
governed by this License along with a term that is a further
|
||||
restriction, you may remove that term. If a license document contains
|
||||
a further restriction but permits relicensing or conveying under this
|
||||
License, you may add to a covered work material governed by the terms
|
||||
of that license document, provided that the further restriction does
|
||||
not survive such relicensing or conveying.
|
||||
|
||||
If you add terms to a covered work in accord with this section, you
|
||||
must place, in the relevant source files, a statement of the
|
||||
additional terms that apply to those files, or a notice indicating
|
||||
where to find the applicable terms.
|
||||
|
||||
Additional terms, permissive or non-permissive, may be stated in the
|
||||
form of a separately written license, or stated as exceptions;
|
||||
the above requirements apply either way.
|
||||
|
||||
8. Termination.
|
||||
|
||||
You may not propagate or modify a covered work except as expressly
|
||||
provided under this License. Any attempt otherwise to propagate or
|
||||
modify it is void, and will automatically terminate your rights under
|
||||
this License (including any patent licenses granted under the third
|
||||
paragraph of section 11).
|
||||
|
||||
However, if you cease all violation of this License, then your
|
||||
license from a particular copyright holder is reinstated (a)
|
||||
provisionally, unless and until the copyright holder explicitly and
|
||||
finally terminates your license, and (b) permanently, if the copyright
|
||||
holder fails to notify you of the violation by some reasonable means
|
||||
prior to 60 days after the cessation.
|
||||
|
||||
Moreover, your license from a particular copyright holder is
|
||||
reinstated permanently if the copyright holder notifies you of the
|
||||
violation by some reasonable means, this is the first time you have
|
||||
received notice of violation of this License (for any work) from that
|
||||
copyright holder, and you cure the violation prior to 30 days after
|
||||
your receipt of the notice.
|
||||
|
||||
Termination of your rights under this section does not terminate the
|
||||
licenses of parties who have received copies or rights from you under
|
||||
this License. If your rights have been terminated and not permanently
|
||||
reinstated, you do not qualify to receive new licenses for the same
|
||||
material under section 10.
|
||||
|
||||
9. Acceptance Not Required for Having Copies.
|
||||
|
||||
You are not required to accept this License in order to receive or
|
||||
run a copy of the Program. Ancillary propagation of a covered work
|
||||
occurring solely as a consequence of using peer-to-peer transmission
|
||||
to receive a copy likewise does not require acceptance. However,
|
||||
nothing other than this License grants you permission to propagate or
|
||||
modify any covered work. These actions infringe copyright if you do
|
||||
not accept this License. Therefore, by modifying or propagating a
|
||||
covered work, you indicate your acceptance of this License to do so.
|
||||
|
||||
10. Automatic Licensing of Downstream Recipients.
|
||||
|
||||
Each time you convey a covered work, the recipient automatically
|
||||
receives a license from the original licensors, to run, modify and
|
||||
propagate that work, subject to this License. You are not responsible
|
||||
for enforcing compliance by third parties with this License.
|
||||
|
||||
An "entity transaction" is a transaction transferring control of an
|
||||
organization, or substantially all assets of one, or subdividing an
|
||||
organization, or merging organizations. If propagation of a covered
|
||||
work results from an entity transaction, each party to that
|
||||
transaction who receives a copy of the work also receives whatever
|
||||
licenses to the work the party's predecessor in interest had or could
|
||||
give under the previous paragraph, plus a right to possession of the
|
||||
Corresponding Source of the work from the predecessor in interest, if
|
||||
the predecessor has it or can get it with reasonable efforts.
|
||||
|
||||
You may not impose any further restrictions on the exercise of the
|
||||
rights granted or affirmed under this License. For example, you may
|
||||
not impose a license fee, royalty, or other charge for exercise of
|
||||
rights granted under this License, and you may not initiate litigation
|
||||
(including a cross-claim or counterclaim in a lawsuit) alleging that
|
||||
any patent claim is infringed by making, using, selling, offering for
|
||||
sale, or importing the Program or any portion of it.
|
||||
|
||||
11. Patents.
|
||||
|
||||
A "contributor" is a copyright holder who authorizes use under this
|
||||
License of the Program or a work on which the Program is based. The
|
||||
work thus licensed is called the contributor's "contributor version".
|
||||
|
||||
A contributor's "essential patent claims" are all patent claims
|
||||
owned or controlled by the contributor, whether already acquired or
|
||||
hereafter acquired, that would be infringed by some manner, permitted
|
||||
by this License, of making, using, or selling its contributor version,
|
||||
but do not include claims that would be infringed only as a
|
||||
consequence of further modification of the contributor version. For
|
||||
purposes of this definition, "control" includes the right to grant
|
||||
patent sublicenses in a manner consistent with the requirements of
|
||||
this License.
|
||||
|
||||
Each contributor grants you a non-exclusive, worldwide, royalty-free
|
||||
patent license under the contributor's essential patent claims, to
|
||||
make, use, sell, offer for sale, import and otherwise run, modify and
|
||||
propagate the contents of its contributor version.
|
||||
|
||||
In the following three paragraphs, a "patent license" is any express
|
||||
agreement or commitment, however denominated, not to enforce a patent
|
||||
(such as an express permission to practice a patent or covenant not to
|
||||
sue for patent infringement). To "grant" such a patent license to a
|
||||
party means to make such an agreement or commitment not to enforce a
|
||||
patent against the party.
|
||||
|
||||
If you convey a covered work, knowingly relying on a patent license,
|
||||
and the Corresponding Source of the work is not available for anyone
|
||||
to copy, free of charge and under the terms of this License, through a
|
||||
publicly available network server or other readily accessible means,
|
||||
then you must either (1) cause the Corresponding Source to be so
|
||||
available, or (2) arrange to deprive yourself of the benefit of the
|
||||
patent license for this particular work, or (3) arrange, in a manner
|
||||
consistent with the requirements of this License, to extend the patent
|
||||
license to downstream recipients. "Knowingly relying" means you have
|
||||
actual knowledge that, but for the patent license, your conveying the
|
||||
covered work in a country, or your recipient's use of the covered work
|
||||
in a country, would infringe one or more identifiable patents in that
|
||||
country that you have reason to believe are valid.
|
||||
|
||||
If, pursuant to or in connection with a single transaction or
|
||||
arrangement, you convey, or propagate by procuring conveyance of, a
|
||||
covered work, and grant a patent license to some of the parties
|
||||
receiving the covered work authorizing them to use, propagate, modify
|
||||
or convey a specific copy of the covered work, then the patent license
|
||||
you grant is automatically extended to all recipients of the covered
|
||||
work and works based on it.
|
||||
|
||||
A patent license is "discriminatory" if it does not include within
|
||||
the scope of its coverage, prohibits the exercise of, or is
|
||||
conditioned on the non-exercise of one or more of the rights that are
|
||||
specifically granted under this License. You may not convey a covered
|
||||
work if you are a party to an arrangement with a third party that is
|
||||
in the business of distributing software, under which you make payment
|
||||
to the third party based on the extent of your activity of conveying
|
||||
the work, and under which the third party grants, to any of the
|
||||
parties who would receive the covered work from you, a discriminatory
|
||||
patent license (a) in connection with copies of the covered work
|
||||
conveyed by you (or copies made from those copies), or (b) primarily
|
||||
for and in connection with specific products or compilations that
|
||||
contain the covered work, unless you entered into that arrangement,
|
||||
or that patent license was granted, prior to 28 March 2007.
|
||||
|
||||
Nothing in this License shall be construed as excluding or limiting
|
||||
any implied license or other defenses to infringement that may
|
||||
otherwise be available to you under applicable patent law.
|
||||
|
||||
12. No Surrender of Others' Freedom.
|
||||
|
||||
If conditions are imposed on you (whether by court order, agreement or
|
||||
otherwise) that contradict the conditions of this License, they do not
|
||||
excuse you from the conditions of this License. If you cannot convey a
|
||||
covered work so as to satisfy simultaneously your obligations under this
|
||||
License and any other pertinent obligations, then as a consequence you may
|
||||
not convey it at all. For example, if you agree to terms that obligate you
|
||||
to collect a royalty for further conveying from those to whom you convey
|
||||
the Program, the only way you could satisfy both those terms and this
|
||||
License would be to refrain entirely from conveying the Program.
|
||||
|
||||
13. Remote Network Interaction; Use with the GNU General Public License.
|
||||
|
||||
Notwithstanding any other provision of this License, if you modify the
|
||||
Program, your modified version must prominently offer all users
|
||||
interacting with it remotely through a computer network (if your version
|
||||
supports such interaction) an opportunity to receive the Corresponding
|
||||
Source of your version by providing access to the Corresponding Source
|
||||
from a network server at no charge, through some standard or customary
|
||||
means of facilitating copying of software. This Corresponding Source
|
||||
shall include the Corresponding Source for any work covered by version 3
|
||||
of the GNU General Public License that is incorporated pursuant to the
|
||||
following paragraph.
|
||||
|
||||
Notwithstanding any other provision of this License, you have
|
||||
permission to link or combine any covered work with a work licensed
|
||||
under version 3 of the GNU General Public License into a single
|
||||
combined work, and to convey the resulting work. The terms of this
|
||||
License will continue to apply to the part which is the covered work,
|
||||
but the work with which it is combined will remain governed by version
|
||||
3 of the GNU General Public License.
|
||||
|
||||
14. Revised Versions of this License.
|
||||
|
||||
The Free Software Foundation may publish revised and/or new versions of
|
||||
the GNU Affero General Public License from time to time. Such new versions
|
||||
will be similar in spirit to the present version, but may differ in detail to
|
||||
address new problems or concerns.
|
||||
|
||||
Each version is given a distinguishing version number. If the
|
||||
Program specifies that a certain numbered version of the GNU Affero General
|
||||
Public License "or any later version" applies to it, you have the
|
||||
option of following the terms and conditions either of that numbered
|
||||
version or of any later version published by the Free Software
|
||||
Foundation. If the Program does not specify a version number of the
|
||||
GNU Affero General Public License, you may choose any version ever published
|
||||
by the Free Software Foundation.
|
||||
|
||||
If the Program specifies that a proxy can decide which future
|
||||
versions of the GNU Affero General Public License can be used, that proxy's
|
||||
public statement of acceptance of a version permanently authorizes you
|
||||
to choose that version for the Program.
|
||||
|
||||
Later license versions may give you additional or different
|
||||
permissions. However, no additional obligations are imposed on any
|
||||
author or copyright holder as a result of your choosing to follow a
|
||||
later version.
|
||||
|
||||
15. Disclaimer of Warranty.
|
||||
|
||||
THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY
|
||||
APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT
|
||||
HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY
|
||||
OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO,
|
||||
THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
|
||||
PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM
|
||||
IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF
|
||||
ALL NECESSARY SERVICING, REPAIR OR CORRECTION.
|
||||
|
||||
16. Limitation of Liability.
|
||||
|
||||
IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING
|
||||
WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MODIFIES AND/OR CONVEYS
|
||||
THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY
|
||||
GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE
|
||||
USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF
|
||||
DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD
|
||||
PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS),
|
||||
EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF
|
||||
SUCH DAMAGES.
|
||||
|
||||
17. Interpretation of Sections 15 and 16.
|
||||
|
||||
If the disclaimer of warranty and limitation of liability provided
|
||||
above cannot be given local legal effect according to their terms,
|
||||
reviewing courts shall apply local law that most closely approximates
|
||||
an absolute waiver of all civil liability in connection with the
|
||||
Program, unless a warranty or assumption of liability accompanies a
|
||||
copy of the Program in return for a fee.
|
||||
|
||||
END OF TERMS AND CONDITIONS
|
||||
|
||||
|
||||
|
||||
BEGIN ORIGINAL LICENSE TEXT
|
||||
|
||||
Copyright (c) 2008-2012 by Vinay Sajip.
|
||||
All rights reserved.
|
||||
|
||||
Redistribution and use in source and binary forms, with or without
|
||||
modification, are permitted provided that the following conditions are met:
|
||||
|
||||
* Redistributions of source code must retain the above copyright notice,
|
||||
this list of conditions and the following disclaimer.
|
||||
* Redistributions in binary form must reproduce the above copyright notice,
|
||||
this list of conditions and the following disclaimer in the documentation
|
||||
and/or other materials provided with the distribution.
|
||||
* The name(s) of the copyright holder(s) may not be used to endorse or
|
||||
promote products derived from this software without specific prior
|
||||
written permission.
|
||||
|
||||
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDER(S) "AS IS" AND ANY EXPRESS OR
|
||||
IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
|
||||
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO
|
||||
EVENT SHALL THE COPYRIGHT HOLDER(S) BE LIABLE FOR ANY DIRECT, INDIRECT,
|
||||
INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
|
||||
LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
|
||||
PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
|
||||
LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
|
||||
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF
|
||||
ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
||||
|
||||
END ORIGINAL LICENSE TEXT
|
75
Makefile
75
Makefile
|
@ -1,3 +1,10 @@
|
|||
SHELL=/bin/sh
|
||||
TESTDIR=./gnupg/test
|
||||
TESTHANDLE=$(TESTDIR)/test_gnupg.py
|
||||
FILES=$(SHELL find ./gnupg/ -name "*.py" -printf "%p,")
|
||||
|
||||
.PHONY=all
|
||||
all: uninstall install test
|
||||
|
||||
ctags:
|
||||
ctags -R *.py
|
||||
|
@ -5,25 +12,18 @@ ctags:
|
|||
etags:
|
||||
find . -name "*.py" -print | xargs etags
|
||||
|
||||
cleanup-src:
|
||||
cd src && \
|
||||
rm -f \#*\# && \
|
||||
rm -f ./*.pyc && \
|
||||
rm -f ./*.pyo
|
||||
# Sanitation targets -- clean leaves libraries, executables and tags
|
||||
# files, which clobber removes as well
|
||||
pycremoval:
|
||||
find . -name '*.py[co]' -exec rm -f {} ';'
|
||||
|
||||
cleanup-tests:
|
||||
cd tests && \
|
||||
rm -f \#*\# && \
|
||||
rm -f ./*.pyc && \
|
||||
rm -f ./*.pyo
|
||||
mkdir -p tests/tmp
|
||||
mkdir -p tests/logs
|
||||
touch tests/placeholder.log
|
||||
mv tests/*.log tests/logs/
|
||||
rm tests/logs/placeholder.log
|
||||
touch placeholder.log
|
||||
rm *.log
|
||||
rm tests/random_seed
|
||||
cleanup-src: pycremoval
|
||||
cd gnupg && rm -f \#*\#
|
||||
|
||||
cleanup-tests: cleanup-src
|
||||
cd $(TESTDIR) && rm -f \#*\#
|
||||
mkdir -p gnupg/test/tmp
|
||||
mkdir -p gnupg/test/logs
|
||||
|
||||
cleanup-tests-all: cleanup-tests
|
||||
rm -rf tests/tmp
|
||||
|
@ -32,19 +32,22 @@ cleanup-build:
|
|||
mkdir buildnot
|
||||
rm -rf build*
|
||||
|
||||
test: cleanup-src cleanup-tests
|
||||
which gpg
|
||||
gpg --version
|
||||
which gpg2
|
||||
gpg2 --version
|
||||
test-before: cleanup-src cleanup-tests
|
||||
which gpg && gpg --version
|
||||
which gpg2 && gpg2 --version
|
||||
which gpg-agent
|
||||
which pinentry
|
||||
which python
|
||||
python --version
|
||||
which pip
|
||||
pip --version
|
||||
pip list
|
||||
python tests/test_gnupg.py parsers basic encodings genkey sign listkeys crypt keyrings import
|
||||
which python && python --version
|
||||
which pip && pip --version && pip list
|
||||
|
||||
test: test-before
|
||||
python $(TESTHANDLE) basic encodings parsers keyrings listkeys genkey \
|
||||
sign crypt
|
||||
touch gnupg/test/placeholder.log
|
||||
mv gnupg/test/*.log gnupg/test/logs/
|
||||
rm gnupg/test/logs/placeholder.log
|
||||
touch gnupg/test/random_seed_is_sekritly_pi
|
||||
rm gnupg/test/random_seed*
|
||||
|
||||
install:
|
||||
python setup.py install --record installed-files.txt
|
||||
|
@ -53,13 +56,13 @@ uninstall:
|
|||
touch installed-files.txt
|
||||
cat installed-files.txt | sudo xargs rm -rf
|
||||
|
||||
reinstall: uninstall install
|
||||
|
||||
cleandocs:
|
||||
sphinx-apidoc -F -A "Isis Agora Lovecruft" -H "python-gnupg" -V 0.4.0 -R 0.4.0 -o docs src/ tests/
|
||||
sphinx-apidoc -F -A "Isis Agora Lovecruft" -H "python-gnupg" \
|
||||
-o docs gnupg/ tests/
|
||||
|
||||
docs:
|
||||
cd docs
|
||||
make clean
|
||||
make html
|
||||
|
||||
venv:
|
||||
-source /usr/shared/python/ns/virtualenvwrapper.sh && mkvirtualenv -a "$PWD" --no-site-packages --unzip-setuptools --distribute python-gnupg
|
||||
cd docs && \
|
||||
make clean && \
|
||||
make html
|
||||
|
|
29
PKG-INFO
29
PKG-INFO
|
@ -1,29 +0,0 @@
|
|||
Metadata-Version: 1.1
|
||||
Name: python-gnupg
|
||||
Version: 0.3.3
|
||||
Summary: A wrapper for the Gnu Privacy Guard (GPG or GnuPG)
|
||||
Home-page: https://www.github.com/isislovecruft/python-gnupg
|
||||
Author: Isis Lovecruft
|
||||
Author-email: isis@leap.se
|
||||
Download-URL: https://github.com/isislovecruft/python-gnupg/archives/develop.zip
|
||||
Description:: This module allows easy access to GnuPG's key management, encryption and signature functionality from Python programs. It is intended for use with Python 2.6 or greater.
|
||||
Classifier:: Development Status :: 3 - Alpha
|
||||
License :: OSI Approved :: GNU Affero General Public License v3 or later (AGPLv3+)
|
||||
Operating System :: MacOS :: MacOS X
|
||||
Operating System :: Microsoft :: Windows :: Windows 7
|
||||
Operating System :: Microsoft :: Windows :: Windows XP
|
||||
Operating System :: POSIX :: BSD
|
||||
Operating System :: POSIX :: Linux
|
||||
Classifier:: Intended Audience :: Developers
|
||||
Classifier:: License :: OSI Approved :: GNU Affero General Public License v3 or later (AGPLv3+)
|
||||
Classifier:: Programming Language :: Python
|
||||
Classifier:: Programming Language :: Python :: 2
|
||||
Classifier:: Programming Language :: Python :: 3
|
||||
Classifier:: Programming Language :: Python :: 2.6
|
||||
Classifier:: Programming Language :: Python :: 2.7
|
||||
Classifier:: Programming Language :: Python :: 3.0
|
||||
Classifier:: Programming Language :: Python :: 3.1
|
||||
Classifier:: Programming Language :: Python :: 3.2
|
||||
Classifier:: Topic :: Security :: Cryptography
|
||||
Classifier:: Topic :: Software Development :: Libraries :: Python Modules
|
||||
Classifier:: Topic :: Utilities
|
60
TODO
60
TODO
|
@ -1,60 +0,0 @@
|
|||
-*- mode: org -*-
|
||||
|
||||
* Keyring separation :keyseparation:
|
||||
** TODO in GPG.gen_key() :keyseparation:gen_key:
|
||||
It would be nice to have an option for gen_key() [[gnupg.py:927]] to
|
||||
automatically switch before key generation to a new tempfile.mkdtemp()
|
||||
directory, with a new keyring and secring, and then to rename either the
|
||||
directory or the keyrings with the long keyid of the key which was freshly
|
||||
generated.
|
||||
|
||||
* I/O :io:
|
||||
** TODO in GPG.__make_args() :io:makeargs:
|
||||
It would be nice to make the file descriptors for communication with the GnuPG
|
||||
process configurable, and not the default, hard-coded 0=stdin 1=stdout
|
||||
2=stderr.
|
||||
|
||||
* Key editing :editkey:
|
||||
** TODO add '--edit-key' feature :editkey:
|
||||
see :compatibility:gen__key_input:
|
||||
|
||||
* Compatibility between GnuPG versions :compatibility:
|
||||
** TODO GnuPG>=2.1.0 won't allow key generation with preset passphrase
|
||||
*** TODO in GPG.gen__key_input() :compatibility:gen_key_input:
|
||||
In the docstring of GPG.gen__key_input() [[gnupg.py:1068]], for the parameter
|
||||
'passphrase', it is explained that:
|
||||
|
||||
:param str passphrase: The passphrase for the new key. The default is
|
||||
to not use any passphrase. Note that
|
||||
GnuPG>=2.1.x will not allow you to specify a
|
||||
passphrase for batch key generation -- GnuPG
|
||||
will ignore the ``passphrase`` parameter, stop,
|
||||
and ask the user for the new passphrase.
|
||||
However, we can put the command '%no-protection'
|
||||
into the batch key generation file to allow a
|
||||
passwordless key to be created, which can then
|
||||
have its passphrase set later with '--edit-key'.
|
||||
|
||||
If we add a GnuPG version detection feature (the version string is already
|
||||
obtained in GPG.___init___() [[gnupg.py:407]]), then we can automatically chain
|
||||
GPG.gen__key_input() to another new feature for '--edit-key'. This chaining
|
||||
would likely need to happen here [[gnupg.py:1146]].
|
||||
|
||||
*** TODO add '--edit-key' feature :editkey:
|
||||
This would be necessary for adding a passphrase to the key after passwordless
|
||||
generation in GnuPG>=2.1.0.
|
||||
|
||||
* Code cleanup :cleanup:
|
||||
** TODO in parsers.__sanitise() :cleanup:sanitise:
|
||||
Ughh...this is the ugliest code I think I've ever written. It works, but I
|
||||
worry that it is fragile, not to mention *I* have trouble reading it, and I
|
||||
fucking wrote the damn thing. There's probably not much that could be done to
|
||||
make it more Pythonic, because type checks and input validation are pretty much
|
||||
intrinsically non-Pythonic. But did i mention that it's ugly? I'm sure these
|
||||
functions would be pretty glad to get a shower, shave, and haircut.
|
||||
|
||||
** TODO in parsers.__is_allowed() :cleanup:is_allowed:
|
||||
There is a lot of madness dealing with stupid things like hyphens
|
||||
vs. underscores, and lists of options vs. strings. This can *definitely* be
|
||||
cleaned up.
|
||||
|
|
@ -0,0 +1,655 @@
|
|||
Copyright (c) 2013 Isis Lovecruft
|
||||
Copyright (c) 2008-2012 by Vinay Sajip.
|
||||
All rights reserved.
|
||||
|
||||
GNU AFFERO GENERAL PUBLIC LICENSE
|
||||
Version 3, 19 November 2007
|
||||
|
||||
Copyright (C) 2007 Free Software Foundation, Inc. <http://fsf.org/>
|
||||
Everyone is permitted to copy and distribute verbatim copies
|
||||
of this license document, but changing it is not allowed.
|
||||
|
||||
Preamble
|
||||
|
||||
The GNU Affero General Public License is a free, copyleft license for
|
||||
software and other kinds of works, specifically designed to ensure
|
||||
cooperation with the community in the case of network server software.
|
||||
|
||||
The licenses for most software and other practical works are designed
|
||||
to take away your freedom to share and change the works. By contrast,
|
||||
our General Public Licenses are intended to guarantee your freedom to
|
||||
share and change all versions of a program--to make sure it remains free
|
||||
software for all its users.
|
||||
|
||||
When we speak of free software, we are referring to freedom, not
|
||||
price. Our General Public Licenses are designed to make sure that you
|
||||
have the freedom to distribute copies of free software (and charge for
|
||||
them if you wish), that you receive source code or can get it if you
|
||||
want it, that you can change the software or use pieces of it in new
|
||||
free programs, and that you know you can do these things.
|
||||
|
||||
Developers that use our General Public Licenses protect your rights
|
||||
with two steps: (1) assert copyright on the software, and (2) offer
|
||||
you this License which gives you legal permission to copy, distribute
|
||||
and/or modify the software.
|
||||
|
||||
A secondary benefit of defending all users' freedom is that
|
||||
improvements made in alternate versions of the program, if they
|
||||
receive widespread use, become available for other developers to
|
||||
incorporate. Many developers of free software are heartened and
|
||||
encouraged by the resulting cooperation. However, in the case of
|
||||
software used on network servers, this result may fail to come about.
|
||||
The GNU General Public License permits making a modified version and
|
||||
letting the public access it on a server without ever releasing its
|
||||
source code to the public.
|
||||
|
||||
The GNU Affero General Public License is designed specifically to
|
||||
ensure that, in such cases, the modified source code becomes available
|
||||
to the community. It requires the operator of a network server to
|
||||
provide the source code of the modified version running there to the
|
||||
users of that server. Therefore, public use of a modified version, on
|
||||
a publicly accessible server, gives the public access to the source
|
||||
code of the modified version.
|
||||
|
||||
An older license, called the Affero General Public License and
|
||||
published by Affero, was designed to accomplish similar goals. This is
|
||||
a different license, not a version of the Affero GPL, but Affero has
|
||||
released a new version of the Affero GPL which permits relicensing under
|
||||
this license.
|
||||
|
||||
The precise terms and conditions for copying, distribution and
|
||||
modification follow.
|
||||
|
||||
TERMS AND CONDITIONS
|
||||
|
||||
0. Definitions.
|
||||
|
||||
"This License" refers to version 3 of the GNU Affero General Public License.
|
||||
|
||||
"Copyright" also means copyright-like laws that apply to other kinds of
|
||||
works, such as semiconductor masks.
|
||||
|
||||
"The Program" refers to any copyrightable work licensed under this
|
||||
License. Each licensee is addressed as "you". "Licensees" and
|
||||
"recipients" may be individuals or organizations.
|
||||
|
||||
To "modify" a work means to copy from or adapt all or part of the work
|
||||
in a fashion requiring copyright permission, other than the making of an
|
||||
exact copy. The resulting work is called a "modified version" of the
|
||||
earlier work or a work "based on" the earlier work.
|
||||
|
||||
A "covered work" means either the unmodified Program or a work based
|
||||
on the Program.
|
||||
|
||||
To "propagate" a work means to do anything with it that, without
|
||||
permission, would make you directly or secondarily liable for
|
||||
infringement under applicable copyright law, except executing it on a
|
||||
computer or modifying a private copy. Propagation includes copying,
|
||||
distribution (with or without modification), making available to the
|
||||
public, and in some countries other activities as well.
|
||||
|
||||
To "convey" a work means any kind of propagation that enables other
|
||||
parties to make or receive copies. Mere interaction with a user through
|
||||
a computer network, with no transfer of a copy, is not conveying.
|
||||
|
||||
An interactive user interface displays "Appropriate Legal Notices"
|
||||
to the extent that it includes a convenient and prominently visible
|
||||
feature that (1) displays an appropriate copyright notice, and (2)
|
||||
tells the user that there is no warranty for the work (except to the
|
||||
extent that warranties are provided), that licensees may convey the
|
||||
work under this License, and how to view a copy of this License. If
|
||||
the interface presents a list of user commands or options, such as a
|
||||
menu, a prominent item in the list meets this criterion.
|
||||
|
||||
1. Source Code.
|
||||
|
||||
The "source code" for a work means the preferred form of the work
|
||||
for making modifications to it. "Object code" means any non-source
|
||||
form of a work.
|
||||
|
||||
A "Standard Interface" means an interface that either is an official
|
||||
standard defined by a recognized standards body, or, in the case of
|
||||
interfaces specified for a particular programming language, one that
|
||||
is widely used among developers working in that language.
|
||||
|
||||
The "System Libraries" of an executable work include anything, other
|
||||
than the work as a whole, that (a) is included in the normal form of
|
||||
packaging a Major Component, but which is not part of that Major
|
||||
Component, and (b) serves only to enable use of the work with that
|
||||
Major Component, or to implement a Standard Interface for which an
|
||||
implementation is available to the public in source code form. A
|
||||
"Major Component", in this context, means a major essential component
|
||||
(kernel, window system, and so on) of the specific operating system
|
||||
(if any) on which the executable work runs, or a compiler used to
|
||||
produce the work, or an object code interpreter used to run it.
|
||||
|
||||
The "Corresponding Source" for a work in object code form means all
|
||||
the source code needed to generate, install, and (for an executable
|
||||
work) run the object code and to modify the work, including scripts to
|
||||
control those activities. However, it does not include the work's
|
||||
System Libraries, or general-purpose tools or generally available free
|
||||
programs which are used unmodified in performing those activities but
|
||||
which are not part of the work. For example, Corresponding Source
|
||||
includes interface definition files associated with source files for
|
||||
the work, and the source code for shared libraries and dynamically
|
||||
linked subprograms that the work is specifically designed to require,
|
||||
such as by intimate data communication or control flow between those
|
||||
subprograms and other parts of the work.
|
||||
|
||||
The Corresponding Source need not include anything that users
|
||||
can regenerate automatically from other parts of the Corresponding
|
||||
Source.
|
||||
|
||||
The Corresponding Source for a work in source code form is that
|
||||
same work.
|
||||
|
||||
2. Basic Permissions.
|
||||
|
||||
All rights granted under this License are granted for the term of
|
||||
copyright on the Program, and are irrevocable provided the stated
|
||||
conditions are met. This License explicitly affirms your unlimited
|
||||
permission to run the unmodified Program. The output from running a
|
||||
covered work is covered by this License only if the output, given its
|
||||
content, constitutes a covered work. This License acknowledges your
|
||||
rights of fair use or other equivalent, as provided by copyright law.
|
||||
|
||||
You may make, run and propagate covered works that you do not
|
||||
convey, without conditions so long as your license otherwise remains
|
||||
in force. You may convey covered works to others for the sole purpose
|
||||
of having them make modifications exclusively for you, or provide you
|
||||
with facilities for running those works, provided that you comply with
|
||||
the terms of this License in conveying all material for which you do
|
||||
not control copyright. Those thus making or running the covered works
|
||||
for you must do so exclusively on your behalf, under your direction
|
||||
and control, on terms that prohibit them from making any copies of
|
||||
your copyrighted material outside their relationship with you.
|
||||
|
||||
Conveying under any other circumstances is permitted solely under
|
||||
the conditions stated below. Sublicensing is not allowed; section 10
|
||||
makes it unnecessary.
|
||||
|
||||
3. Protecting Users' Legal Rights From Anti-Circumvention Law.
|
||||
|
||||
No covered work shall be deemed part of an effective technological
|
||||
measure under any applicable law fulfilling obligations under article
|
||||
11 of the WIPO copyright treaty adopted on 20 December 1996, or
|
||||
similar laws prohibiting or restricting circumvention of such
|
||||
measures.
|
||||
|
||||
When you convey a covered work, you waive any legal power to forbid
|
||||
circumvention of technological measures to the extent such circumvention
|
||||
is effected by exercising rights under this License with respect to
|
||||
the covered work, and you disclaim any intention to limit operation or
|
||||
modification of the work as a means of enforcing, against the work's
|
||||
users, your or third parties' legal rights to forbid circumvention of
|
||||
technological measures.
|
||||
|
||||
4. Conveying Verbatim Copies.
|
||||
|
||||
You may convey verbatim copies of the Program's source code as you
|
||||
receive it, in any medium, provided that you conspicuously and
|
||||
appropriately publish on each copy an appropriate copyright notice;
|
||||
keep intact all notices stating that this License and any
|
||||
non-permissive terms added in accord with section 7 apply to the code;
|
||||
keep intact all notices of the absence of any warranty; and give all
|
||||
recipients a copy of this License along with the Program.
|
||||
|
||||
You may charge any price or no price for each copy that you convey,
|
||||
and you may offer support or warranty protection for a fee.
|
||||
|
||||
5. Conveying Modified Source Versions.
|
||||
|
||||
You may convey a work based on the Program, or the modifications to
|
||||
produce it from the Program, in the form of source code under the
|
||||
terms of section 4, provided that you also meet all of these conditions:
|
||||
|
||||
a) The work must carry prominent notices stating that you modified
|
||||
it, and giving a relevant date.
|
||||
|
||||
b) The work must carry prominent notices stating that it is
|
||||
released under this License and any conditions added under section
|
||||
7. This requirement modifies the requirement in section 4 to
|
||||
"keep intact all notices".
|
||||
|
||||
c) You must license the entire work, as a whole, under this
|
||||
License to anyone who comes into possession of a copy. This
|
||||
License will therefore apply, along with any applicable section 7
|
||||
additional terms, to the whole of the work, and all its parts,
|
||||
regardless of how they are packaged. This License gives no
|
||||
permission to license the work in any other way, but it does not
|
||||
invalidate such permission if you have separately received it.
|
||||
|
||||
d) If the work has interactive user interfaces, each must display
|
||||
Appropriate Legal Notices; however, if the Program has interactive
|
||||
interfaces that do not display Appropriate Legal Notices, your
|
||||
work need not make them do so.
|
||||
|
||||
A compilation of a covered work with other separate and independent
|
||||
works, which are not by their nature extensions of the covered work,
|
||||
and which are not combined with it such as to form a larger program,
|
||||
in or on a volume of a storage or distribution medium, is called an
|
||||
"aggregate" if the compilation and its resulting copyright are not
|
||||
used to limit the access or legal rights of the compilation's users
|
||||
beyond what the individual works permit. Inclusion of a covered work
|
||||
in an aggregate does not cause this License to apply to the other
|
||||
parts of the aggregate.
|
||||
|
||||
6. Conveying Non-Source Forms.
|
||||
|
||||
You may convey a covered work in object code form under the terms
|
||||
of sections 4 and 5, provided that you also convey the
|
||||
machine-readable Corresponding Source under the terms of this License,
|
||||
in one of these ways:
|
||||
|
||||
a) Convey the object code in, or embodied in, a physical product
|
||||
(including a physical distribution medium), accompanied by the
|
||||
Corresponding Source fixed on a durable physical medium
|
||||
customarily used for software interchange.
|
||||
|
||||
b) Convey the object code in, or embodied in, a physical product
|
||||
(including a physical distribution medium), accompanied by a
|
||||
written offer, valid for at least three years and valid for as
|
||||
long as you offer spare parts or customer support for that product
|
||||
model, to give anyone who possesses the object code either (1) a
|
||||
copy of the Corresponding Source for all the software in the
|
||||
product that is covered by this License, on a durable physical
|
||||
medium customarily used for software interchange, for a price no
|
||||
more than your reasonable cost of physically performing this
|
||||
conveying of source, or (2) access to copy the
|
||||
Corresponding Source from a network server at no charge.
|
||||
|
||||
c) Convey individual copies of the object code with a copy of the
|
||||
written offer to provide the Corresponding Source. This
|
||||
alternative is allowed only occasionally and noncommercially, and
|
||||
only if you received the object code with such an offer, in accord
|
||||
with subsection 6b.
|
||||
|
||||
d) Convey the object code by offering access from a designated
|
||||
place (gratis or for a charge), and offer equivalent access to the
|
||||
Corresponding Source in the same way through the same place at no
|
||||
further charge. You need not require recipients to copy the
|
||||
Corresponding Source along with the object code. If the place to
|
||||
copy the object code is a network server, the Corresponding Source
|
||||
may be on a different server (operated by you or a third party)
|
||||
that supports equivalent copying facilities, provided you maintain
|
||||
clear directions next to the object code saying where to find the
|
||||
Corresponding Source. Regardless of what server hosts the
|
||||
Corresponding Source, you remain obligated to ensure that it is
|
||||
available for as long as needed to satisfy these requirements.
|
||||
|
||||
e) Convey the object code using peer-to-peer transmission, provided
|
||||
you inform other peers where the object code and Corresponding
|
||||
Source of the work are being offered to the general public at no
|
||||
charge under subsection 6d.
|
||||
|
||||
A separable portion of the object code, whose source code is excluded
|
||||
from the Corresponding Source as a System Library, need not be
|
||||
included in conveying the object code work.
|
||||
|
||||
A "User Product" is either (1) a "consumer product", which means any
|
||||
tangible personal property which is normally used for personal, family,
|
||||
or household purposes, or (2) anything designed or sold for incorporation
|
||||
into a dwelling. In determining whether a product is a consumer product,
|
||||
doubtful cases shall be resolved in favor of coverage. For a particular
|
||||
product received by a particular user, "normally used" refers to a
|
||||
typical or common use of that class of product, regardless of the status
|
||||
of the particular user or of the way in which the particular user
|
||||
actually uses, or expects or is expected to use, the product. A product
|
||||
is a consumer product regardless of whether the product has substantial
|
||||
commercial, industrial or non-consumer uses, unless such uses represent
|
||||
the only significant mode of use of the product.
|
||||
|
||||
"Installation Information" for a User Product means any methods,
|
||||
procedures, authorization keys, or other information required to install
|
||||
and execute modified versions of a covered work in that User Product from
|
||||
a modified version of its Corresponding Source. The information must
|
||||
suffice to ensure that the continued functioning of the modified object
|
||||
code is in no case prevented or interfered with solely because
|
||||
modification has been made.
|
||||
|
||||
If you convey an object code work under this section in, or with, or
|
||||
specifically for use in, a User Product, and the conveying occurs as
|
||||
part of a transaction in which the right of possession and use of the
|
||||
User Product is transferred to the recipient in perpetuity or for a
|
||||
fixed term (regardless of how the transaction is characterized), the
|
||||
Corresponding Source conveyed under this section must be accompanied
|
||||
by the Installation Information. But this requirement does not apply
|
||||
if neither you nor any third party retains the ability to install
|
||||
modified object code on the User Product (for example, the work has
|
||||
been installed in ROM).
|
||||
|
||||
The requirement to provide Installation Information does not include a
|
||||
requirement to continue to provide support service, warranty, or updates
|
||||
for a work that has been modified or installed by the recipient, or for
|
||||
the User Product in which it has been modified or installed. Access to a
|
||||
network may be denied when the modification itself materially and
|
||||
adversely affects the operation of the network or violates the rules and
|
||||
protocols for communication across the network.
|
||||
|
||||
Corresponding Source conveyed, and Installation Information provided,
|
||||
in accord with this section must be in a format that is publicly
|
||||
documented (and with an implementation available to the public in
|
||||
source code form), and must require no special password or key for
|
||||
unpacking, reading or copying.
|
||||
|
||||
7. Additional Terms.
|
||||
|
||||
"Additional permissions" are terms that supplement the terms of this
|
||||
License by making exceptions from one or more of its conditions.
|
||||
Additional permissions that are applicable to the entire Program shall
|
||||
be treated as though they were included in this License, to the extent
|
||||
that they are valid under applicable law. If additional permissions
|
||||
apply only to part of the Program, that part may be used separately
|
||||
under those permissions, but the entire Program remains governed by
|
||||
this License without regard to the additional permissions.
|
||||
|
||||
When you convey a copy of a covered work, you may at your option
|
||||
remove any additional permissions from that copy, or from any part of
|
||||
it. (Additional permissions may be written to require their own
|
||||
removal in certain cases when you modify the work.) You may place
|
||||
additional permissions on material, added by you to a covered work,
|
||||
for which you have or can give appropriate copyright permission.
|
||||
|
||||
Notwithstanding any other provision of this License, for material you
|
||||
add to a covered work, you may (if authorized by the copyright holders of
|
||||
that material) supplement the terms of this License with terms:
|
||||
|
||||
a) Disclaiming warranty or limiting liability differently from the
|
||||
terms of sections 15 and 16 of this License; or
|
||||
|
||||
b) Requiring preservation of specified reasonable legal notices or
|
||||
author attributions in that material or in the Appropriate Legal
|
||||
Notices displayed by works containing it; or
|
||||
|
||||
c) Prohibiting misrepresentation of the origin of that material, or
|
||||
requiring that modified versions of such material be marked in
|
||||
reasonable ways as different from the original version; or
|
||||
|
||||
d) Limiting the use for publicity purposes of names of licensors or
|
||||
authors of the material; or
|
||||
|
||||
e) Declining to grant rights under trademark law for use of some
|
||||
trade names, trademarks, or service marks; or
|
||||
|
||||
f) Requiring indemnification of licensors and authors of that
|
||||
material by anyone who conveys the material (or modified versions of
|
||||
it) with contractual assumptions of liability to the recipient, for
|
||||
any liability that these contractual assumptions directly impose on
|
||||
those licensors and authors.
|
||||
|
||||
All other non-permissive additional terms are considered "further
|
||||
restrictions" within the meaning of section 10. If the Program as you
|
||||
received it, or any part of it, contains a notice stating that it is
|
||||
governed by this License along with a term that is a further
|
||||
restriction, you may remove that term. If a license document contains
|
||||
a further restriction but permits relicensing or conveying under this
|
||||
License, you may add to a covered work material governed by the terms
|
||||
of that license document, provided that the further restriction does
|
||||
not survive such relicensing or conveying.
|
||||
|
||||
If you add terms to a covered work in accord with this section, you
|
||||
must place, in the relevant source files, a statement of the
|
||||
additional terms that apply to those files, or a notice indicating
|
||||
where to find the applicable terms.
|
||||
|
||||
Additional terms, permissive or non-permissive, may be stated in the
|
||||
form of a separately written license, or stated as exceptions;
|
||||
the above requirements apply either way.
|
||||
|
||||
8. Termination.
|
||||
|
||||
You may not propagate or modify a covered work except as expressly
|
||||
provided under this License. Any attempt otherwise to propagate or
|
||||
modify it is void, and will automatically terminate your rights under
|
||||
this License (including any patent licenses granted under the third
|
||||
paragraph of section 11).
|
||||
|
||||
However, if you cease all violation of this License, then your
|
||||
license from a particular copyright holder is reinstated (a)
|
||||
provisionally, unless and until the copyright holder explicitly and
|
||||
finally terminates your license, and (b) permanently, if the copyright
|
||||
holder fails to notify you of the violation by some reasonable means
|
||||
prior to 60 days after the cessation.
|
||||
|
||||
Moreover, your license from a particular copyright holder is
|
||||
reinstated permanently if the copyright holder notifies you of the
|
||||
violation by some reasonable means, this is the first time you have
|
||||
received notice of violation of this License (for any work) from that
|
||||
copyright holder, and you cure the violation prior to 30 days after
|
||||
your receipt of the notice.
|
||||
|
||||
Termination of your rights under this section does not terminate the
|
||||
licenses of parties who have received copies or rights from you under
|
||||
this License. If your rights have been terminated and not permanently
|
||||
reinstated, you do not qualify to receive new licenses for the same
|
||||
material under section 10.
|
||||
|
||||
9. Acceptance Not Required for Having Copies.
|
||||
|
||||
You are not required to accept this License in order to receive or
|
||||
run a copy of the Program. Ancillary propagation of a covered work
|
||||
occurring solely as a consequence of using peer-to-peer transmission
|
||||
to receive a copy likewise does not require acceptance. However,
|
||||
nothing other than this License grants you permission to propagate or
|
||||
modify any covered work. These actions infringe copyright if you do
|
||||
not accept this License. Therefore, by modifying or propagating a
|
||||
covered work, you indicate your acceptance of this License to do so.
|
||||
|
||||
10. Automatic Licensing of Downstream Recipients.
|
||||
|
||||
Each time you convey a covered work, the recipient automatically
|
||||
receives a license from the original licensors, to run, modify and
|
||||
propagate that work, subject to this License. You are not responsible
|
||||
for enforcing compliance by third parties with this License.
|
||||
|
||||
An "entity transaction" is a transaction transferring control of an
|
||||
organization, or substantially all assets of one, or subdividing an
|
||||
organization, or merging organizations. If propagation of a covered
|
||||
work results from an entity transaction, each party to that
|
||||
transaction who receives a copy of the work also receives whatever
|
||||
licenses to the work the party's predecessor in interest had or could
|
||||
give under the previous paragraph, plus a right to possession of the
|
||||
Corresponding Source of the work from the predecessor in interest, if
|
||||
the predecessor has it or can get it with reasonable efforts.
|
||||
|
||||
You may not impose any further restrictions on the exercise of the
|
||||
rights granted or affirmed under this License. For example, you may
|
||||
not impose a license fee, royalty, or other charge for exercise of
|
||||
rights granted under this License, and you may not initiate litigation
|
||||
(including a cross-claim or counterclaim in a lawsuit) alleging that
|
||||
any patent claim is infringed by making, using, selling, offering for
|
||||
sale, or importing the Program or any portion of it.
|
||||
|
||||
11. Patents.
|
||||
|
||||
A "contributor" is a copyright holder who authorizes use under this
|
||||
License of the Program or a work on which the Program is based. The
|
||||
work thus licensed is called the contributor's "contributor version".
|
||||
|
||||
A contributor's "essential patent claims" are all patent claims
|
||||
owned or controlled by the contributor, whether already acquired or
|
||||
hereafter acquired, that would be infringed by some manner, permitted
|
||||
by this License, of making, using, or selling its contributor version,
|
||||
but do not include claims that would be infringed only as a
|
||||
consequence of further modification of the contributor version. For
|
||||
purposes of this definition, "control" includes the right to grant
|
||||
patent sublicenses in a manner consistent with the requirements of
|
||||
this License.
|
||||
|
||||
Each contributor grants you a non-exclusive, worldwide, royalty-free
|
||||
patent license under the contributor's essential patent claims, to
|
||||
make, use, sell, offer for sale, import and otherwise run, modify and
|
||||
propagate the contents of its contributor version.
|
||||
|
||||
In the following three paragraphs, a "patent license" is any express
|
||||
agreement or commitment, however denominated, not to enforce a patent
|
||||
(such as an express permission to practice a patent or covenant not to
|
||||
sue for patent infringement). To "grant" such a patent license to a
|
||||
party means to make such an agreement or commitment not to enforce a
|
||||
patent against the party.
|
||||
|
||||
If you convey a covered work, knowingly relying on a patent license,
|
||||
and the Corresponding Source of the work is not available for anyone
|
||||
to copy, free of charge and under the terms of this License, through a
|
||||
publicly available network server or other readily accessible means,
|
||||
then you must either (1) cause the Corresponding Source to be so
|
||||
available, or (2) arrange to deprive yourself of the benefit of the
|
||||
patent license for this particular work, or (3) arrange, in a manner
|
||||
consistent with the requirements of this License, to extend the patent
|
||||
license to downstream recipients. "Knowingly relying" means you have
|
||||
actual knowledge that, but for the patent license, your conveying the
|
||||
covered work in a country, or your recipient's use of the covered work
|
||||
in a country, would infringe one or more identifiable patents in that
|
||||
country that you have reason to believe are valid.
|
||||
|
||||
If, pursuant to or in connection with a single transaction or
|
||||
arrangement, you convey, or propagate by procuring conveyance of, a
|
||||
covered work, and grant a patent license to some of the parties
|
||||
receiving the covered work authorizing them to use, propagate, modify
|
||||
or convey a specific copy of the covered work, then the patent license
|
||||
you grant is automatically extended to all recipients of the covered
|
||||
work and works based on it.
|
||||
|
||||
A patent license is "discriminatory" if it does not include within
|
||||
the scope of its coverage, prohibits the exercise of, or is
|
||||
conditioned on the non-exercise of one or more of the rights that are
|
||||
specifically granted under this License. You may not convey a covered
|
||||
work if you are a party to an arrangement with a third party that is
|
||||
in the business of distributing software, under which you make payment
|
||||
to the third party based on the extent of your activity of conveying
|
||||
the work, and under which the third party grants, to any of the
|
||||
parties who would receive the covered work from you, a discriminatory
|
||||
patent license (a) in connection with copies of the covered work
|
||||
conveyed by you (or copies made from those copies), or (b) primarily
|
||||
for and in connection with specific products or compilations that
|
||||
contain the covered work, unless you entered into that arrangement,
|
||||
or that patent license was granted, prior to 28 March 2007.
|
||||
|
||||
Nothing in this License shall be construed as excluding or limiting
|
||||
any implied license or other defenses to infringement that may
|
||||
otherwise be available to you under applicable patent law.
|
||||
|
||||
12. No Surrender of Others' Freedom.
|
||||
|
||||
If conditions are imposed on you (whether by court order, agreement or
|
||||
otherwise) that contradict the conditions of this License, they do not
|
||||
excuse you from the conditions of this License. If you cannot convey a
|
||||
covered work so as to satisfy simultaneously your obligations under this
|
||||
License and any other pertinent obligations, then as a consequence you may
|
||||
not convey it at all. For example, if you agree to terms that obligate you
|
||||
to collect a royalty for further conveying from those to whom you convey
|
||||
the Program, the only way you could satisfy both those terms and this
|
||||
License would be to refrain entirely from conveying the Program.
|
||||
|
||||
13. Remote Network Interaction; Use with the GNU General Public License.
|
||||
|
||||
Notwithstanding any other provision of this License, if you modify the
|
||||
Program, your modified version must prominently offer all users
|
||||
interacting with it remotely through a computer network (if your version
|
||||
supports such interaction) an opportunity to receive the Corresponding
|
||||
Source of your version by providing access to the Corresponding Source
|
||||
from a network server at no charge, through some standard or customary
|
||||
means of facilitating copying of software. This Corresponding Source
|
||||
shall include the Corresponding Source for any work covered by version 3
|
||||
of the GNU General Public License that is incorporated pursuant to the
|
||||
following paragraph.
|
||||
|
||||
Notwithstanding any other provision of this License, you have
|
||||
permission to link or combine any covered work with a work licensed
|
||||
under version 3 of the GNU General Public License into a single
|
||||
combined work, and to convey the resulting work. The terms of this
|
||||
License will continue to apply to the part which is the covered work,
|
||||
but the work with which it is combined will remain governed by version
|
||||
3 of the GNU General Public License.
|
||||
|
||||
14. Revised Versions of this License.
|
||||
|
||||
The Free Software Foundation may publish revised and/or new versions of
|
||||
the GNU Affero General Public License from time to time. Such new versions
|
||||
will be similar in spirit to the present version, but may differ in detail to
|
||||
address new problems or concerns.
|
||||
|
||||
Each version is given a distinguishing version number. If the
|
||||
Program specifies that a certain numbered version of the GNU Affero General
|
||||
Public License "or any later version" applies to it, you have the
|
||||
option of following the terms and conditions either of that numbered
|
||||
version or of any later version published by the Free Software
|
||||
Foundation. If the Program does not specify a version number of the
|
||||
GNU Affero General Public License, you may choose any version ever published
|
||||
by the Free Software Foundation.
|
||||
|
||||
If the Program specifies that a proxy can decide which future
|
||||
versions of the GNU Affero General Public License can be used, that proxy's
|
||||
public statement of acceptance of a version permanently authorizes you
|
||||
to choose that version for the Program.
|
||||
|
||||
Later license versions may give you additional or different
|
||||
permissions. However, no additional obligations are imposed on any
|
||||
author or copyright holder as a result of your choosing to follow a
|
||||
later version.
|
||||
|
||||
15. Disclaimer of Warranty.
|
||||
|
||||
THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY
|
||||
APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT
|
||||
HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY
|
||||
OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO,
|
||||
THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
|
||||
PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM
|
||||
IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF
|
||||
ALL NECESSARY SERVICING, REPAIR OR CORRECTION.
|
||||
|
||||
16. Limitation of Liability.
|
||||
|
||||
IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING
|
||||
WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MODIFIES AND/OR CONVEYS
|
||||
THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY
|
||||
GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE
|
||||
USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF
|
||||
DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD
|
||||
PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS),
|
||||
EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF
|
||||
SUCH DAMAGES.
|
||||
|
||||
17. Interpretation of Sections 15 and 16.
|
||||
|
||||
If the disclaimer of warranty and limitation of liability provided
|
||||
above cannot be given local legal effect according to their terms,
|
||||
reviewing courts shall apply local law that most closely approximates
|
||||
an absolute waiver of all civil liability in connection with the
|
||||
Program, unless a warranty or assumption of liability accompanies a
|
||||
copy of the Program in return for a fee.
|
||||
|
||||
END OF TERMS AND CONDITIONS
|
||||
|
||||
|
||||
|
||||
BEGIN ORIGINAL LICENSE TEXT
|
||||
|
||||
Copyright (c) 2008-2012 by Vinay Sajip.
|
||||
All rights reserved.
|
||||
|
||||
Redistribution and use in source and binary forms, with or without
|
||||
modification, are permitted provided that the following conditions are met:
|
||||
|
||||
* Redistributions of source code must retain the above copyright notice,
|
||||
this list of conditions and the following disclaimer.
|
||||
* Redistributions in binary form must reproduce the above copyright notice,
|
||||
this list of conditions and the following disclaimer in the documentation
|
||||
and/or other materials provided with the distribution.
|
||||
* The name(s) of the copyright holder(s) may not be used to endorse or
|
||||
promote products derived from this software without specific prior
|
||||
written permission.
|
||||
|
||||
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDER(S) "AS IS" AND ANY EXPRESS OR
|
||||
IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
|
||||
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO
|
||||
EVENT SHALL THE COPYRIGHT HOLDER(S) BE LIABLE FOR ANY DIRECT, INDIRECT,
|
||||
INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
|
||||
LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
|
||||
PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
|
||||
LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
|
||||
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF
|
||||
ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
||||
|
||||
END ORIGINAL LICENSE TEXT
|
Binary file not shown.
|
@ -0,0 +1,31 @@
|
|||
-*- mode: org -*-
|
||||
|
||||
* Other Python OpenPGP libraries and utilities:
|
||||
|
||||
*** pygpgme - https://launchpad.net/pygpgme
|
||||
A limited set of Python wrappers around GPGME
|
||||
http://www.gnupg.org/documentation/manuals/gpgme/
|
||||
|
||||
*** py-gnupg - https://github.com/kevinoid/py-gnupg/blob/master/GnuPGInterface.py
|
||||
Focuses mainly on using file handles to interact with GnuPG.
|
||||
|
||||
*** OpenPGP-Python - https://github.com/singpolyma/OpenPGP-Python
|
||||
The commit messages are a bit worrysome and the code has some scary
|
||||
error-prone-looking method chaining going on, a five minute glance over the
|
||||
/OpenPGP/Crypto.py file and it appears this is actually a valid OpenPGP
|
||||
implementation, built using D.Litzenberger's PyCrypto library.
|
||||
https://github.com/dlitz/pycrypto
|
||||
|
||||
This person also wrote OpenPGP-Haskell:
|
||||
https://github.com/singpolyma/OpenPGP-Haskell
|
||||
|
||||
...and OpenPGP-PHP (/horrorface): https://github.com/singpolyma/openpgp-php and
|
||||
an HTTP server as a shell script with a pretty crazy pipe hack.
|
||||
|
||||
...and kudos on this one, it's an attempt at a mnemnonic system for squaring
|
||||
Zooko's Triangle (L17 being a function named "countLeadingCrapAndZeros"):
|
||||
https://github.com/singpolyma/mnemonicode/blob/master/mnencode.c#L17
|
||||
|
||||
* GnuPG unattended key generation scripts:
|
||||
|
||||
*** mandos-keygen http://bzr.recompile.se/loggerhead/mandos/trunk/annotate/523/mandos-keygen?start_revid=616
|
|
@ -0,0 +1,114 @@
|
|||
-*- mode: org -*-
|
||||
|
||||
* Keyring separation :keyseparation:
|
||||
** TODO in GPG.gen_key() :keyseparation:gen_key:
|
||||
It would be nice to have an option for gen_key() [[gnupg.py:927]] to
|
||||
automatically switch before key generation to a new tempfile.mkdtemp()
|
||||
directory, with a new keyring and secring, and then to rename either the
|
||||
directory or the keyrings with the long keyid of the key which was freshly
|
||||
generated.
|
||||
|
||||
* I/O :io:
|
||||
** TODO in GPG.__make_args() :io:makeargs:
|
||||
It would be nice to make the file descriptors for communication with the GnuPG
|
||||
process configurable, and not the default, hard-coded 0=stdin 1=stdout
|
||||
2=stderr.
|
||||
** TODO look into RDBMS/ORM for public key storage :io:db:
|
||||
see http://stackoverflow.com/q/1235594 and http://elixir.ematia.de/trac/wiki
|
||||
|
||||
memcached and pymemcached were the first ones I looked at, then I discovered
|
||||
redis, which seemed better. At some point we should look into using elixer,
|
||||
mentioned in the above SO post, so that the backend DB can be chosen freely
|
||||
and we´re not restricting users to only memcached/cassandra/redis/sqlite/etc.
|
||||
|
||||
* Key editing :editkey:
|
||||
** TODO add '--edit-key' feature :editkey:
|
||||
see :compatibility:gen__key_input:
|
||||
|
||||
* Compatibility between GnuPG versions :compatibility:
|
||||
** TODO GnuPG>=2.1.0 won't allow key generation with preset passphrase
|
||||
*** TODO in GPG.gen__key_input() :compatibility:gen_key_input:
|
||||
In the docstring of GPG.gen__key_input() [[gnupg.py:1068]], for the parameter
|
||||
'passphrase', it is explained that:
|
||||
|
||||
:param str passphrase: The passphrase for the new key. The default is
|
||||
to not use any passphrase. Note that
|
||||
GnuPG>=2.1.x will not allow you to specify a
|
||||
passphrase for batch key generation -- GnuPG
|
||||
will ignore the ``passphrase`` parameter, stop,
|
||||
and ask the user for the new passphrase.
|
||||
However, we can put the command '%no-protection'
|
||||
into the batch key generation file to allow a
|
||||
passwordless key to be created, which can then
|
||||
have its passphrase set later with '--edit-key'.
|
||||
|
||||
If we add a GnuPG version detection feature (the version string is already
|
||||
obtained in GPG.___init___() [[gnupg.py:407]]), then we can automatically chain
|
||||
GPG.gen__key_input() to another new feature for '--edit-key'. This chaining
|
||||
would likely need to happen here [[gnupg.py:1146]].
|
||||
|
||||
*** TODO add '--edit-key' feature :editkey:
|
||||
This would be necessary for adding a passphrase to the key after passwordless
|
||||
generation in GnuPG>=2.1.0.
|
||||
|
||||
** TODO GnuPG==1.4.12 doesn't process "Key-Type: default" in batch files
|
||||
(python-gnupg)∃!isisⒶwintermute:~/code/riseup/python-gnupg ∴ ipython
|
||||
WARNING: Attempting to work in a virtualenv. If you encounter problems, please install IPython inside the virtualenv.
|
||||
|
||||
In [1]: import gnupg
|
||||
GnuPG logging disabled...
|
||||
|
||||
In [2]: gpg = gnupg.GPG(homedir='./tests/doctests')
|
||||
|
||||
In [3]: key_input = gpg.gen_key_input()
|
||||
|
||||
In [4]: print key_input
|
||||
Key-Type: default
|
||||
Key-Length: 4096
|
||||
Subkey-Type: default
|
||||
Name-Email: isis@wintermute
|
||||
Expire-Date: 2014-05-28
|
||||
Name-Real: Autogenerated Key
|
||||
%commit
|
||||
|
||||
|
||||
In [5]: key = gpg.gen_key(key_input)
|
||||
|
||||
In [6]: print key.stderr
|
||||
gpg: -:1: invalid algorithm
|
||||
[GNUPG:] KEY_NOT_CREATED
|
||||
|
||||
|
||||
In [7]: quit()
|
||||
(python-gnupg)∃!isisⒶwintermute:~/code/riseup/python-gnupg ∴ which gpg
|
||||
/usr/bin/gpg
|
||||
(python-gnupg)∃!isisⒶwintermute:~/code/riseup/python-gnupg ∴ gpg --version
|
||||
gpg (GnuPG) 1.4.12
|
||||
Copyright (C) 2012 Free Software Foundation, Inc.
|
||||
License GPLv3+: GNU GPL version 3 or later <http://gnu.org/licenses/gpl.html>
|
||||
This is free software: you are free to change and redistribute it.
|
||||
There is NO WARRANTY, to the extent permitted by law.
|
||||
|
||||
Home: ~/.gnupg
|
||||
Supported algorithms:
|
||||
Pubkey: RSA, RSA-E, RSA-S, ELG-E, DSA
|
||||
Cipher: 3DES, CAST5, BLOWFISH, AES, AES192, AES256, TWOFISH, CAMELLIA128,
|
||||
CAMELLIA192, CAMELLIA256
|
||||
Hash: MD5, SHA1, RIPEMD160, SHA256, SHA384, SHA512, SHA224
|
||||
Compression: Uncompressed, ZIP, ZLIB, BZIP2
|
||||
(python-gnupg)∃!isisⒶwintermute:~/code/riseup/python-gnupg ∴
|
||||
|
||||
* Code cleanup :cleanup:
|
||||
** TODO in parsers.__sanitise() :cleanup:sanitise:
|
||||
Ughh...this is the ugliest code I think I've ever written. It works, but I
|
||||
worry that it is fragile, not to mention *I* have trouble reading it, and I
|
||||
fucking wrote the damn thing. There's probably not much that could be done to
|
||||
make it more Pythonic, because type checks and input validation are pretty much
|
||||
intrinsically non-Pythonic. But did i mention that it's ugly? I'm sure these
|
||||
functions would be pretty glad to get a shower, shave, and haircut.
|
||||
|
||||
** TODO in parsers.__is_allowed() :cleanup:is_allowed:
|
||||
There is a lot of madness dealing with stupid things like hyphens
|
||||
vs. underscores, and lists of options vs. strings. This can *definitely* be
|
||||
cleaned up.
|
||||
|
|
@ -5,3 +5,40 @@ gnupg Module
|
|||
:members:
|
||||
:undoc-members:
|
||||
:show-inheritance:
|
||||
|
||||
Previous Authors' Documentation
|
||||
-------------------------------
|
||||
|
||||
Steve Traugott's documentation:
|
||||
|
||||
Portions of this module are derived from A.M. Kuchling's well-designed
|
||||
GPG.py, using Richard Jones' updated version 1.3, which can be found in
|
||||
the pycrypto CVS repository on Sourceforge:
|
||||
|
||||
http://pycrypto.cvs.sourceforge.net/viewvc/pycrypto/gpg/GPG.py
|
||||
|
||||
This module is *not* forward-compatible with amk's; some of the old
|
||||
interface has changed. For instance, since I've added decrypt
|
||||
functionality, I elected to initialize with a 'gpghome' argument instead
|
||||
of 'keyring', so that gpg can find both the public and secret keyrings.
|
||||
I've also altered some of the returned objects in order for the caller to
|
||||
not have to know as much about the internals of the result classes.
|
||||
|
||||
While the rest of ISconf is released under the GPL, I am releasing this
|
||||
single file under the same terms that A.M. Kuchling used for pycrypto.
|
||||
|
||||
Steve Traugott, stevegt@terraluna.org
|
||||
Thu Jun 23 21:27:20 PDT 2005
|
||||
|
||||
|
||||
Vinay Sajip's documentation:
|
||||
|
||||
This version of the module has been modified from Steve Traugott's version
|
||||
(see http://trac.t7a.org/isconf/browser/trunk/lib/python/isconf/GPG.py) by
|
||||
Vinay Sajip to make use of the subprocess module (Steve's version uses
|
||||
os.fork() and so does not work on Windows). Renamed to gnupg.py to avoid
|
||||
confusion with the previous versions.
|
||||
|
||||
A unittest harness (test_gnupg.py) has also been added.
|
||||
|
||||
Modifications Copyright (C) 2008-2012 Vinay Sajip. All rights reserved.
|
||||
|
|
|
@ -0,0 +1,46 @@
|
|||
#!/usr/bin/env python
|
||||
# -*- coding: utf-8 -*-
|
||||
#
|
||||
# This file is part of python-gnupg, a Python interface to GnuPG.
|
||||
# Copyright © 2013 Isis Lovecruft
|
||||
# © 2008-2012 Vinay Sajip
|
||||
# © 2005 Steve Traugott
|
||||
# © 2004 A.M. Kuchling
|
||||
#
|
||||
# This program is free software: you can redistribute it and/or modify
|
||||
# it under the terms of the GNU Affero General Public License as published
|
||||
# by the Free Software Foundation, either version 3 of the License, or
|
||||
# (at your option) any later version.
|
||||
#
|
||||
# This program is distributed in the hope that it will be useful,
|
||||
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||
# GNU Affero General Public License for more details.
|
||||
|
||||
from __future__ import absolute_import
|
||||
|
||||
from . import gnupg
|
||||
from . import copyleft
|
||||
from . import _ansistrm
|
||||
from . import _logger
|
||||
from . import _meta
|
||||
from . import _parsers
|
||||
from . import _util
|
||||
from .gnupg import GPG
|
||||
from ._version import get_versions
|
||||
|
||||
__version__ = get_versions()['version']
|
||||
__authors__ = copyleft.authors
|
||||
__license__ = copyleft.full_text
|
||||
__copyleft__ = copyleft.copyright
|
||||
|
||||
## do not set __package__ = "gnupg", else we will end up with
|
||||
## gnupg.<*allofthethings*>
|
||||
__all__ = ["GPG", "_util", "_parsers", "_meta", "_logger"]
|
||||
|
||||
## avoid the "from gnupg import gnupg" idiom
|
||||
del gnupg
|
||||
del absolute_import
|
||||
del copyleft
|
||||
del get_versions
|
||||
del _version
|
|
@ -20,6 +20,7 @@
|
|||
Logging module for python-gnupg.
|
||||
'''
|
||||
|
||||
from __future__ import absolute_import
|
||||
from __future__ import print_function
|
||||
from datetime import datetime
|
||||
from functools import wraps
|
||||
|
@ -28,8 +29,6 @@ import logging
|
|||
import sys
|
||||
import os
|
||||
|
||||
import _ansistrm
|
||||
|
||||
try:
|
||||
from logging import NullHandler
|
||||
except:
|
||||
|
@ -37,6 +36,7 @@ except:
|
|||
def handle(self, record):
|
||||
pass
|
||||
|
||||
from . import _ansistrm
|
||||
|
||||
GNUPG_STATUS_LEVEL = 9
|
||||
|
||||
|
@ -61,7 +61,7 @@ def create_logger(level=logging.NOTSET):
|
|||
40 ERROR Error messages and tracebacks.
|
||||
50 CRITICAL Unhandled exceptions and tracebacks.
|
||||
"""
|
||||
_test = os.path.join(os.getcwd(), 'tests')
|
||||
_test = os.path.join(os.path.join(os.getcwd(), 'gnupg'), 'test')
|
||||
_now = datetime.now().strftime("%Y-%m-%d_%H%M%S")
|
||||
_fn = os.path.join(_test, "%s_test_gnupg.log" % _now)
|
||||
_fmt = "%(relativeCreated)-4d L%(lineno)-4d:%(funcName)-18.18s %(levelname)-7.7s %(message)s"
|
|
@ -0,0 +1,794 @@
|
|||
# -*- coding: utf-8 -*-
|
||||
#
|
||||
# This file is part of python-gnupg, a Python interface to GnuPG.
|
||||
# Copyright © 2013 Isis Lovecruft
|
||||
# © 2008-2012 Vinay Sajip
|
||||
# © 2005 Steve Traugott
|
||||
# © 2004 A.M. Kuchling
|
||||
#
|
||||
# This program is free software: you can redistribute it and/or modify
|
||||
# it under the terms of the GNU Affero General Public License as published
|
||||
# by the Free Software Foundation, either version 3 of the License, or
|
||||
# (at your option) any later version.
|
||||
#
|
||||
# This program is distributed in the hope that it will be useful,
|
||||
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||
# GNU Affero General Public License for more details.
|
||||
|
||||
|
||||
from __future__ import absolute_import
|
||||
|
||||
import atexit
|
||||
import codecs
|
||||
import encodings
|
||||
## For AOS, the locale module will need to point to a wrapper around the
|
||||
## java.util.Locale class.
|
||||
## See https://code.patternsinthevoid.net/?p=android-locale-hack.git
|
||||
import locale
|
||||
import os
|
||||
import psutil
|
||||
import subprocess
|
||||
import sys
|
||||
import threading
|
||||
|
||||
from . import _parsers
|
||||
from . import _util
|
||||
|
||||
from ._parsers import _check_preferences
|
||||
from ._parsers import _sanitise_list
|
||||
from ._util import log
|
||||
|
||||
|
||||
class GPGMeta(type):
|
||||
"""Metaclass for changing the :meth:GPG.__init__ initialiser.
|
||||
|
||||
Detects running gpg-agent processes and the presence of a pinentry
|
||||
program, and disables pinentry so that python-gnupg can write the
|
||||
passphrase to the controlled GnuPG process without killing the agent.
|
||||
"""
|
||||
|
||||
def __new__(cls, name, bases, attrs):
|
||||
"""Construct the initialiser for GPG"""
|
||||
log.debug("Metaclass __new__ constructor called for %r" % cls)
|
||||
if cls._find_agent():
|
||||
## call the normal GPG.__init__() initialiser:
|
||||
attrs['init'] = cls.__init__
|
||||
attrs['_remove_agent'] = True
|
||||
return super(GPGMeta, cls).__new__(cls, name, bases, attrs)
|
||||
|
||||
@classmethod
|
||||
def _find_agent(cls):
|
||||
"""Discover if a gpg-agent process for the current euid is running.
|
||||
|
||||
If there is a matching gpg-agent process, set a :class:`psutil.Process`
|
||||
instance containing the gpg-agent process' information to
|
||||
:attr:`GPG._agent_proc`.
|
||||
|
||||
:returns: True if there exists a gpg-agent process running under the
|
||||
same effective user ID as that of this program. Otherwise,
|
||||
returns None.
|
||||
"""
|
||||
identity = os.getresuid()
|
||||
for proc in psutil.process_iter():
|
||||
if (proc.name == "gpg-agent") and proc.is_running:
|
||||
log.debug("Found gpg-agent process with pid %d" % proc.pid)
|
||||
if proc.uids == identity:
|
||||
log.debug(
|
||||
"Effective UIDs of this process and gpg-agent match")
|
||||
setattr(cls, '_agent_proc', proc)
|
||||
return True
|
||||
|
||||
|
||||
class GPGBase(object):
|
||||
"""Base class for property storage and to control process initialisation."""
|
||||
|
||||
__metaclass__ = GPGMeta
|
||||
|
||||
_decode_errors = 'strict'
|
||||
_result_map = { 'crypt': _parsers.Crypt,
|
||||
'delete': _parsers.DeleteResult,
|
||||
'generate': _parsers.GenKey,
|
||||
'import': _parsers.ImportResult,
|
||||
'list': _parsers.ListKeys,
|
||||
'sign': _parsers.Sign,
|
||||
'verify': _parsers.Verify,
|
||||
'packets': _parsers.ListPackets }
|
||||
|
||||
def __init__(self, binary=None, home=None, keyring=None, secring=None,
|
||||
use_agent=False, default_preference_list=None,
|
||||
verbose=False, options=None):
|
||||
|
||||
self.binary = _util._find_binary(binary)
|
||||
self.homedir = home if home else _util._conf
|
||||
pub = _parsers._fix_unsafe(keyring) if keyring else 'pubring.gpg'
|
||||
sec = _parsers._fix_unsafe(secring) if secring else 'secring.gpg'
|
||||
self.keyring = os.path.join(self._homedir, pub)
|
||||
self.secring = os.path.join(self._homedir, sec)
|
||||
self.options = _parsers._sanitise(options) if options else None
|
||||
|
||||
if default_preference_list:
|
||||
self._prefs = _check_preferences(default_preference_list, 'all')
|
||||
else:
|
||||
self._prefs = 'SHA512 SHA384 SHA256 AES256 CAMELLIA256 TWOFISH'
|
||||
self._prefs += ' AES192 ZLIB ZIP Uncompressed'
|
||||
|
||||
encoding = locale.getpreferredencoding()
|
||||
if encoding is None: # This happens on Jython!
|
||||
encoding = sys.stdin.encoding
|
||||
self._encoding = encoding.lower().replace('-', '_')
|
||||
self._filesystemencoding = encodings.normalize_encoding(
|
||||
sys.getfilesystemencoding().lower())
|
||||
|
||||
self._keyserver = 'hkp://subkeys.pgp.net'
|
||||
self.__generated_keys = os.path.join(self.homedir, 'generated-keys')
|
||||
|
||||
try:
|
||||
assert self.binary, "Could not find binary %s" % binary
|
||||
assert isinstance(verbose, (bool, str, int)), \
|
||||
"'verbose' must be boolean, string, or 0 <= n <= 9"
|
||||
assert isinstance(use_agent, bool), "'use_agent' must be boolean"
|
||||
if self.options is not None:
|
||||
assert isinstance(self.options, str), "options not string"
|
||||
except (AssertionError, AttributeError) as ae:
|
||||
log.error("GPGBase.__init__(): %s" % ae.message)
|
||||
raise RuntimeError(ae.message)
|
||||
else:
|
||||
self.verbose = verbose
|
||||
self.use_agent = use_agent
|
||||
|
||||
if hasattr(self, '_agent_proc') \
|
||||
and getattr(self, '_remove_agent', None) is True:
|
||||
if hasattr(self, '__remove_path__'):
|
||||
self.__remove_path__('pinentry')
|
||||
|
||||
def __remove_path__(self, prog=None, at_exit=True):
|
||||
"""Remove a the directories containing a program from the system's
|
||||
``$PATH``. If :attr:`GPG.binary` is in a directory being removed, it
|
||||
is symlinked to './gpg'
|
||||
|
||||
:param str prog: The program to remove from ``$PATH``.
|
||||
|
||||
:param bool at_exit: Add the program back into the ``$PATH`` when the
|
||||
Python interpreter exits, and delete any symlinks
|
||||
to :attr:`GPG.binary` which were created.
|
||||
"""
|
||||
#: A list of ``$PATH`` entries which were removed to disable pinentry.
|
||||
self._removed_path_entries = []
|
||||
|
||||
log.debug("Attempting to remove %s from system PATH" % str(prog))
|
||||
if (prog is None) or (not isinstance(prog, str)): return
|
||||
|
||||
try:
|
||||
program = _util._which(prog)[0]
|
||||
except (OSError, IOError, IndexError) as err:
|
||||
log.err(err.message)
|
||||
log.err("Cannot find program '%s', not changing PATH." % prog)
|
||||
return
|
||||
|
||||
## __remove_path__ cannot be an @classmethod in GPGMeta, because
|
||||
## the use_agent attribute must be set by the instance.
|
||||
if not self.use_agent:
|
||||
program_base = os.path.dirname(prog)
|
||||
gnupg_base = os.path.dirname(self.binary)
|
||||
|
||||
## symlink our gpg binary into $PWD if the path we are removing is
|
||||
## the one which contains our gpg executable:
|
||||
new_gpg_location = os.path.join(os.getcwd(), 'gpg')
|
||||
if gnupg_base == program_base:
|
||||
os.symlink(self.binary, new_gpg_location)
|
||||
self.binary = new_gpg_location
|
||||
|
||||
## copy the original environment so that we can put it back later:
|
||||
env_copy = os.environ ## this one should not be touched
|
||||
path_copy = os.environ.pop('PATH')
|
||||
log.debug("Created a copy of system PATH: %r" % path_copy)
|
||||
assert not os.environ.has_key('PATH'), "OS env kept $PATH anyway!"
|
||||
|
||||
@staticmethod
|
||||
def remove_program_from_path(path, prog_base):
|
||||
"""Remove all directories which contain a program from PATH.
|
||||
|
||||
:param str path: The contents of the system environment's
|
||||
``$PATH``.
|
||||
|
||||
:param str prog_base: The directory portion of a program's
|
||||
location, without the trailing slash,
|
||||
and without the program name. For
|
||||
example, ``prog_base='/usr/bin'``.
|
||||
"""
|
||||
paths = path.split(':')
|
||||
for directory in paths:
|
||||
if directory == prog_base:
|
||||
log.debug("Found directory with target program: %s"
|
||||
% directory)
|
||||
path.remove(directory)
|
||||
self._removed_path_entries.append(directory)
|
||||
log.debug("Deleted all found instance of %s." % directory)
|
||||
log.debug("PATH is now:%s%s" % (os.linesep, path))
|
||||
new_path = ':'.join([p for p in path])
|
||||
return new_path
|
||||
|
||||
@staticmethod
|
||||
def update_path(environment, path):
|
||||
"""Add paths to the string at os.environ['PATH'].
|
||||
|
||||
:param str environment: The environment mapping to update.
|
||||
:param list path: A list of strings to update the PATH with.
|
||||
"""
|
||||
log.debug("Updating system path...")
|
||||
os.environ = environment
|
||||
new_path = ':'.join([p for p in path])
|
||||
old = ''
|
||||
if 'PATH' in os.environ:
|
||||
new_path = ':'.join([os.environ['PATH'], new_path])
|
||||
os.environ.update({'PATH': new_path})
|
||||
log.debug("System $PATH: %s" % os.environ['PATH'])
|
||||
|
||||
modified_path = remove_program_from_path(path_copy, program_base)
|
||||
update_path(env_copy, modified_path)
|
||||
|
||||
## register an _exithandler with the python interpreter:
|
||||
atexit.register(update_path, env_copy, path_copy)
|
||||
|
||||
def remove_symlinked_binary(symlink):
|
||||
if os.path.islink(symlink):
|
||||
os.unlink(symlink)
|
||||
log.debug("Removed binary symlink '%s'" % symlink)
|
||||
atexit.register(remove_symlinked_binary, new_gpg_location)
|
||||
|
||||
@property
|
||||
def default_preference_list(self):
|
||||
"""Get the default preference list."""
|
||||
return self._prefs
|
||||
|
||||
@default_preference_list.setter
|
||||
def default_preference_list(self, prefs):
|
||||
"""Set the default preference list.
|
||||
|
||||
:param str prefs: A string containing the default preferences for
|
||||
ciphers, digests, and compression algorithms.
|
||||
"""
|
||||
prefs = _check_preferences(prefs)
|
||||
if prefs is not None:
|
||||
self._prefs = prefs
|
||||
|
||||
@default_preference_list.deleter
|
||||
def default_preference_list(self):
|
||||
"""Reset the default preference list to its original state.
|
||||
|
||||
Note that "original state" does not mean the default preference
|
||||
list for whichever version of GnuPG is being used. It means the
|
||||
default preference list defined by :attr:`GPGBase._preferences`.
|
||||
|
||||
Using BZIP2 is avoided due to not interacting well with some versions
|
||||
of GnuPG>=2.0.0.
|
||||
"""
|
||||
self._prefs = 'SHA512 SHA384 SHA256 AES256 CAMELLIA256 TWOFISH ZLIB ZIP'
|
||||
|
||||
@property
|
||||
def keyserver(self):
|
||||
"""Get the current keyserver setting."""
|
||||
return self._keyserver
|
||||
|
||||
@keyserver.setter
|
||||
def keyserver(self, location):
|
||||
"""Set the default keyserver to use for sending and receiving keys.
|
||||
|
||||
The ``location`` is sent to :func:`_parsers._check_keyserver` when
|
||||
option are parsed in :meth:`gnupg.GPG._make_options`.
|
||||
|
||||
:param str location: A string containing the default keyserver. This
|
||||
should contain the desired keyserver protocol
|
||||
which is supported by the keyserver, for example,
|
||||
``'hkps://keys.mayfirst.org'``. The default
|
||||
keyserver is ``'hkp://subkeys.pgp.net'``.
|
||||
"""
|
||||
self._keyserver = location
|
||||
|
||||
@keyserver.deleter
|
||||
def keyserver(self):
|
||||
"""Reset the keyserver to the default setting."""
|
||||
self._keyserver = 'hkp://subkeys.pgp.net'
|
||||
|
||||
def _homedir_getter(self):
|
||||
"""Get the directory currently being used as GnuPG's homedir.
|
||||
|
||||
If unspecified, use :file:`~/.config/python-gnupg/`
|
||||
|
||||
:rtype: str
|
||||
:returns: The absolute path to the current GnuPG homedir.
|
||||
"""
|
||||
return self._homedir
|
||||
|
||||
def _homedir_setter(self, directory):
|
||||
"""Set the directory to use as GnuPG's homedir.
|
||||
|
||||
If unspecified, use $HOME/.config/python-gnupg. If specified, ensure
|
||||
that the ``directory`` does not contain various shell escape
|
||||
characters. If ``directory`` is not found, it will be automatically
|
||||
created. Lastly, the ``direcory`` will be checked that the EUID has
|
||||
read and write permissions for it.
|
||||
|
||||
:param str homedir: A relative or absolute path to the directory to use
|
||||
for storing/accessing GnuPG's files, including
|
||||
keyrings and the trustdb.
|
||||
:raises: :exc:`RuntimeError` if unable to find a suitable directory to
|
||||
use.
|
||||
"""
|
||||
if not directory:
|
||||
log.debug("GPGBase._homedir_setter(): Using default homedir: '%s'"
|
||||
% _util._conf)
|
||||
directory = _util._conf
|
||||
|
||||
hd = _parsers._fix_unsafe(directory)
|
||||
log.debug("GPGBase._homedir_setter(): got directory '%s'" % hd)
|
||||
|
||||
if hd:
|
||||
log.debug("GPGBase._homedir_setter(): Check existence of '%s'" % hd)
|
||||
_util._create_if_necessary(hd)
|
||||
|
||||
try:
|
||||
log.debug("GPGBase._homedir_setter(): checking permissions")
|
||||
assert _util._has_readwrite(hd), \
|
||||
"Homedir '%s' needs read/write permissions" % hd
|
||||
except AssertionError as ae:
|
||||
msg = ("Unable to set '%s' as GnuPG homedir" % directory)
|
||||
log.debug("GPGBase.homedir.setter(): %s" % msg)
|
||||
log.debug(ae.message)
|
||||
raise RuntimeError(ae.message)
|
||||
else:
|
||||
log.info("Setting homedir to '%s'" % hd)
|
||||
self._homedir = hd
|
||||
|
||||
homedir = _util.InheritableProperty(_homedir_getter, _homedir_setter)
|
||||
|
||||
def _generated_keys_getter(self):
|
||||
"""Get the ``homedir`` subdirectory for storing generated keys.
|
||||
|
||||
:rtype: str
|
||||
:returns: The absolute path to the current GnuPG homedir.
|
||||
"""
|
||||
return self.__generated_keys
|
||||
|
||||
def _generated_keys_setter(self, directory):
|
||||
"""Set the directory for storing generated keys.
|
||||
|
||||
If unspecified, use $GNUPGHOME/generated-keys. If specified, ensure
|
||||
that the ``directory`` does not contain various shell escape
|
||||
characters. If ``directory`` is not found, it will be automatically
|
||||
created. Lastly, the ``direcory`` will be checked that the EUID has
|
||||
read and write permissions for it.
|
||||
|
||||
:param str directory: A relative or absolute path to the directory to
|
||||
use for storing/accessing GnuPG's files, including keyrings and
|
||||
the trustdb.
|
||||
:raises: :exc:`RuntimeError` if unable to find a suitable directory to
|
||||
use.
|
||||
"""
|
||||
if not directory:
|
||||
directory = os.path.join(self.homedir, 'generated-keys')
|
||||
log.debug("GPGBase._generated_keys_setter(): Using '%s'"
|
||||
% directory)
|
||||
|
||||
hd = _parsers._fix_unsafe(directory)
|
||||
log.debug("GPGBase._generated_keys_setter(): got directory '%s'" % hd)
|
||||
|
||||
if hd:
|
||||
log.debug("GPGBase._generated_keys_setter(): Check exists '%s'"
|
||||
% hd)
|
||||
_util._create_if_necessary(hd)
|
||||
|
||||
try:
|
||||
log.debug("GPGBase._generated_keys_setter(): check permissions")
|
||||
assert _util._has_readwrite(hd), \
|
||||
"Keys dir '%s' needs read/write permissions" % hd
|
||||
except AssertionError as ae:
|
||||
msg = ("Unable to set '%s' as generated keys dir" % directory)
|
||||
log.debug("GPGBase._generated_keys_setter(): %s" % msg)
|
||||
log.debug(ae.message)
|
||||
raise RuntimeError(ae.message)
|
||||
else:
|
||||
log.info("Setting homedir to '%s'" % hd)
|
||||
self.__generated_keys = hd
|
||||
|
||||
_generated_keys = _util.InheritableProperty(_generated_keys_getter,
|
||||
_generated_keys_setter)
|
||||
|
||||
def _make_args(self, args, passphrase=False):
|
||||
"""Make a list of command line elements for GPG. The value of ``args``
|
||||
will be appended only if it passes the checks in
|
||||
:func:`parsers._sanitise`. The ``passphrase`` argument needs to be True
|
||||
if a passphrase will be sent to GPG, else False.
|
||||
|
||||
:param list args: A list of strings of options and flags to pass to
|
||||
``GPG.binary``. This is input safe, meaning that
|
||||
these values go through strict checks (see
|
||||
``parsers._sanitise_list``) before being passed to to
|
||||
the input file descriptor for the GnuPG process.
|
||||
Each string should be given exactly as it would be on
|
||||
the commandline interface to GnuPG,
|
||||
e.g. ["--cipher-algo AES256", "--default-key
|
||||
A3ADB67A2CDB8B35"].
|
||||
|
||||
:param bool passphrase: If True, the passphrase will be sent to the
|
||||
stdin file descriptor for the attached GnuPG
|
||||
process.
|
||||
"""
|
||||
## see TODO file, tag :io:makeargs:
|
||||
cmd = [self.binary,
|
||||
'--no-options --no-emit-version --no-tty --status-fd 2']
|
||||
|
||||
if self.homedir: cmd.append('--homedir "%s"' % self.homedir)
|
||||
|
||||
if self.keyring:
|
||||
cmd.append('--no-default-keyring --keyring %s' % self.keyring)
|
||||
if self.secring:
|
||||
cmd.append('--secret-keyring %s' % self.secring)
|
||||
|
||||
if passphrase: cmd.append('--batch --passphrase-fd 0')
|
||||
|
||||
if self.use_agent: cmd.append('--use-agent')
|
||||
else: cmd.append('--no-use-agent')
|
||||
|
||||
if self.options:
|
||||
[cmd.append(opt) for opt in iter(_sanitise_list(self.options))]
|
||||
if args:
|
||||
[cmd.append(arg) for arg in iter(_sanitise_list(args))]
|
||||
|
||||
if self.verbose:
|
||||
cmd.append('--debug-all')
|
||||
if ((isinstance(self.verbose, str) and
|
||||
self.verbose in ['basic', 'advanced', 'expert', 'guru'])
|
||||
or (isinstance(self.verbose, int) and (1<=self.verbose<=9))):
|
||||
cmd.append('--debug-level %s' % self.verbose)
|
||||
|
||||
return cmd
|
||||
|
||||
def _open_subprocess(self, args=None, passphrase=False):
|
||||
"""Open a pipe to a GPG subprocess and return the file objects for
|
||||
communicating with it.
|
||||
|
||||
:param list args: A list of strings of options and flags to pass to
|
||||
``GPG.binary``. This is input safe, meaning that
|
||||
these values go through strict checks (see
|
||||
``parsers._sanitise_list``) before being passed to to
|
||||
the input file descriptor for the GnuPG process.
|
||||
Each string should be given exactly as it would be on
|
||||
the commandline interface to GnuPG,
|
||||
e.g. ["--cipher-algo AES256", "--default-key
|
||||
A3ADB67A2CDB8B35"].
|
||||
|
||||
:param bool passphrase: If True, the passphrase will be sent to the
|
||||
stdin file descriptor for the attached GnuPG
|
||||
process.
|
||||
"""
|
||||
## see http://docs.python.org/2/library/subprocess.html#converting-an\
|
||||
## -argument-sequence-to-a-string-on-windows
|
||||
cmd = ' '.join(self._make_args(args, passphrase))
|
||||
log.debug("Sending command to GnuPG process:%s%s" % (os.linesep, cmd))
|
||||
return subprocess.Popen(cmd, shell=True, stdin=subprocess.PIPE,
|
||||
stdout=subprocess.PIPE, stderr=subprocess.PIPE)
|
||||
|
||||
def _read_response(self, stream, result):
|
||||
"""Reads all the stderr output from GPG, taking notice only of lines
|
||||
that begin with the magic [GNUPG:] prefix.
|
||||
|
||||
Calls methods on the response object for each valid token found, with
|
||||
the arg being the remainder of the status line.
|
||||
|
||||
:param stream: A byte-stream, file handle, or :class:`subprocess.PIPE`
|
||||
to parse the for status codes from the GnuPG process.
|
||||
|
||||
:param result: The result parser class from :mod:`_parsers` with which
|
||||
to call ``handle_status`` and parse the output of
|
||||
``stream``.
|
||||
"""
|
||||
lines = []
|
||||
while True:
|
||||
line = stream.readline()
|
||||
if len(line) == 0:
|
||||
break
|
||||
lines.append(line)
|
||||
line = line.rstrip()
|
||||
if line[0:9] == '[GNUPG:] ':
|
||||
# Chop off the prefix
|
||||
line = line[9:]
|
||||
log.status("%s" % line)
|
||||
L = line.split(None, 1)
|
||||
keyword = L[0]
|
||||
if len(L) > 1:
|
||||
value = L[1]
|
||||
else:
|
||||
value = ""
|
||||
result._handle_status(keyword, value)
|
||||
elif line[0:5] == 'gpg: ':
|
||||
log.warn("%s" % line)
|
||||
else:
|
||||
if self.verbose:
|
||||
log.info("%s" % line)
|
||||
else:
|
||||
log.debug("%s" % line)
|
||||
result.stderr = ''.join(lines)
|
||||
|
||||
def _read_data(self, stream, result):
|
||||
"""Read the contents of the file from GPG's stdout."""
|
||||
chunks = []
|
||||
while True:
|
||||
data = stream.read(1024)
|
||||
if len(data) == 0:
|
||||
break
|
||||
log.debug("read from stdout: %r" % data[:256])
|
||||
chunks.append(data)
|
||||
if _util._py3k:
|
||||
# Join using b'' or '', as appropriate
|
||||
result.data = type(data)().join(chunks)
|
||||
else:
|
||||
result.data = ''.join(chunks)
|
||||
|
||||
def _collect_output(self, process, result, writer=None, stdin=None):
|
||||
"""Drain the subprocesses output streams, writing the collected output
|
||||
to the result. If a writer thread (writing to the subprocess) is given,
|
||||
make sure it's joined before returning. If a stdin stream is given,
|
||||
close it before returning.
|
||||
"""
|
||||
stderr = codecs.getreader(self._encoding)(process.stderr)
|
||||
rr = threading.Thread(target=self._read_response,
|
||||
args=(stderr, result))
|
||||
rr.setDaemon(True)
|
||||
log.debug('stderr reader: %r', rr)
|
||||
rr.start()
|
||||
|
||||
stdout = process.stdout
|
||||
dr = threading.Thread(target=self._read_data, args=(stdout, result))
|
||||
dr.setDaemon(True)
|
||||
log.debug('stdout reader: %r', dr)
|
||||
dr.start()
|
||||
|
||||
dr.join()
|
||||
rr.join()
|
||||
if writer is not None:
|
||||
writer.join()
|
||||
process.wait()
|
||||
if stdin is not None:
|
||||
try:
|
||||
stdin.close()
|
||||
except IOError:
|
||||
pass
|
||||
stderr.close()
|
||||
stdout.close()
|
||||
|
||||
def _handle_io(self, args, file, result, passphrase=False, binary=False):
|
||||
"""Handle a call to GPG - pass input data, collect output data."""
|
||||
p = self._open_subprocess(args, passphrase)
|
||||
if not binary:
|
||||
stdin = codecs.getwriter(self._encoding)(p.stdin)
|
||||
else:
|
||||
stdin = p.stdin
|
||||
if passphrase:
|
||||
_util._write_passphrase(stdin, passphrase, self._encoding)
|
||||
writer = _util._threaded_copy_data(file, stdin)
|
||||
self._collect_output(p, result, writer, stdin)
|
||||
return result
|
||||
|
||||
def _recv_keys(self, keyids, keyserver=None):
|
||||
"""Import keys from a keyserver.
|
||||
|
||||
:param str keyids: A space-delimited string containing the keyids to
|
||||
request.
|
||||
:param str keyserver: The keyserver to request the ``keyids`` from;
|
||||
defaults to :property:`gnupg.GPG.keyserver`.
|
||||
"""
|
||||
if not keyserver:
|
||||
keyserver = self.keyserver
|
||||
|
||||
args = ['--keyserver {}'.format(keyserver),
|
||||
'--recv-keys {}'.format(keyids)]
|
||||
log.info('Requesting keys from %s: %s' % (keyserver, keyids))
|
||||
|
||||
result = self._result_map['import'](self)
|
||||
proc = self._open_subprocess(args)
|
||||
self._collect_output(proc, result)
|
||||
log.debug('recv_keys result: %r', result.__dict__)
|
||||
return result
|
||||
|
||||
def _sign_file(self, file, default_key=None, passphrase=None,
|
||||
clearsign=True, detach=False, binary=False):
|
||||
"""Create a signature for a file.
|
||||
|
||||
:param file: The file stream (i.e. it's already been open()'d) to sign.
|
||||
:param str keyid: The key to sign with.
|
||||
:param str passphrase: The passphrase to pipe to stdin.
|
||||
:param bool clearsign: If True, create a cleartext signature.
|
||||
:param bool detach: If True, create a detached signature.
|
||||
:param bool binary: If True, do not ascii armour the output.
|
||||
"""
|
||||
log.debug("_sign_file():")
|
||||
if binary:
|
||||
log.info("Creating binary signature for file %s" % file)
|
||||
args = ['--sign']
|
||||
else:
|
||||
log.info("Creating ascii-armoured signature for file %s" % file)
|
||||
args = ['--sign --armor']
|
||||
|
||||
if clearsign:
|
||||
args.append("--clearsign")
|
||||
if detach:
|
||||
log.warn("Cannot use both --clearsign and --detach-sign.")
|
||||
log.warn("Using default GPG behaviour: --clearsign only.")
|
||||
elif detach and not clearsign:
|
||||
args.append("--detach-sign")
|
||||
|
||||
if default_key:
|
||||
args.append(str("--default-key %s" % default_key))
|
||||
|
||||
## We could use _handle_io here except for the fact that if the
|
||||
## passphrase is bad, gpg bails and you can't write the message.
|
||||
result = self._result_map['sign'](self)
|
||||
proc = self._open_subprocess(args, passphrase is not None)
|
||||
try:
|
||||
if passphrase:
|
||||
_util._write_passphrase(proc.stdin, passphrase, self._encoding)
|
||||
writer = _util._threaded_copy_data(file, proc.stdin)
|
||||
except IOError as ioe:
|
||||
log.exception("Error writing message: %s" % ioe.message)
|
||||
writer = None
|
||||
self._collect_output(proc, result, writer, proc.stdin)
|
||||
return result
|
||||
|
||||
def _encrypt(self, data, recipients,
|
||||
default_key=None,
|
||||
passphrase=None,
|
||||
armor=True,
|
||||
encrypt=True,
|
||||
symmetric=False,
|
||||
always_trust=True,
|
||||
output=None,
|
||||
cipher_algo='AES256',
|
||||
digest_algo='SHA512',
|
||||
compress_algo='ZLIB'):
|
||||
"""Encrypt the message read from the file-like object ``data``.
|
||||
|
||||
:param str data: The file or bytestream to encrypt.
|
||||
|
||||
:param str recipients: The recipients to encrypt to. Recipients must
|
||||
be specified keyID/fingerprint. Care should be taken in Python2.x
|
||||
to make sure that the given fingerprint is in fact a string and
|
||||
not a unicode object.
|
||||
|
||||
:param str default_key: The keyID/fingerprint of the key to use for
|
||||
signing. If given, ``data`` will be encrypted and signed.
|
||||
|
||||
:param str passphrase: If given, and ``default_key`` is also given,
|
||||
use this passphrase to unlock the secret portion of the
|
||||
``default_key`` to sign the encrypted ``data``. Otherwise, if
|
||||
``default_key`` is not given, but ``symmetric=True``, then use
|
||||
this passphrase as the passphrase for symmetric
|
||||
encryption. Signing and symmetric encryption should *not* be
|
||||
combined when sending the ``data`` to other recipients, else the
|
||||
passphrase to the secret key would be shared with them.
|
||||
|
||||
:param bool armor: If True, ascii armor the output; otherwise, the
|
||||
output will be in binary format. (Default: True)
|
||||
|
||||
:param bool encrypt: If True, encrypt the ``data`` using the
|
||||
``recipients`` public keys. (Default: True)
|
||||
|
||||
:param bool symmetric: If True, encrypt the ``data`` to ``recipients``
|
||||
using a symmetric key. See the ``passphrase`` parameter. Symmetric
|
||||
encryption and public key encryption can be used simultaneously,
|
||||
and will result in a ciphertext which is decryptable with either
|
||||
the symmetric ``passphrase`` or one of the corresponding private
|
||||
keys.
|
||||
|
||||
:param bool always_trust: If True, ignore trust warnings on recipient
|
||||
keys. If False, display trust warnings. (default: True)
|
||||
|
||||
:param str output: The output file to write to. If not specified, the
|
||||
encrypted output is returned, and thus should be stored as an
|
||||
object in Python. For example:
|
||||
|
||||
>>> import shutil
|
||||
>>> import gnupg
|
||||
>>> if os.path.exists("doctests"):
|
||||
... shutil.rmtree("doctests")
|
||||
>>> gpg = gnupg.GPG(homedir="doctests")
|
||||
>>> key_settings = gpg.gen_key_input(key_type='RSA',
|
||||
... key_length=1024,
|
||||
... key_usage='ESCA',
|
||||
... passphrase='foo')
|
||||
>>> key = gpg.gen_key(key_settings)
|
||||
>>> message = "The crow flies at midnight."
|
||||
>>> encrypted = str(gpg.encrypt(message, key.printprint))
|
||||
>>> assert encrypted != message
|
||||
>>> assert not encrypted.isspace()
|
||||
>>> decrypted = str(gpg.decrypt(encrypted))
|
||||
>>> assert not decrypted.isspace()
|
||||
>>> decrypted
|
||||
'The crow flies at midnight.'
|
||||
|
||||
:param str cipher_algo: The cipher algorithm to use. To see available
|
||||
algorithms with your version of GnuPG, do:
|
||||
``$ gpg --with-colons --list-config ciphername``.
|
||||
The default ``cipher_algo``, if unspecified, is ``'AES256'``.
|
||||
|
||||
:param str digest_algo: The hash digest to use. Again, to see which
|
||||
hashes your GnuPG is capable of using, do:
|
||||
``$ gpg --with-colons --list-config digestname``.
|
||||
The default, if unspecified, is ``'SHA512'``.
|
||||
|
||||
:param str compress_algo: The compression algorithm to use. Can be one
|
||||
of ``'ZLIB'``, ``'BZIP2'``, ``'ZIP'``, or ``'Uncompressed'``.
|
||||
"""
|
||||
args = []
|
||||
|
||||
if output:
|
||||
if getattr(output, 'fileno', None) is not None:
|
||||
## avoid overwrite confirmation message
|
||||
if getattr(output, 'name', None) is None:
|
||||
if os.path.exists(output):
|
||||
os.remove(output)
|
||||
args.append('--output %s' % output)
|
||||
else:
|
||||
if os.path.exists(output.name):
|
||||
os.remove(output.name)
|
||||
args.append('--output %s' % output.name)
|
||||
|
||||
if armor: args.append('--armor')
|
||||
if always_trust: args.append('--always-trust')
|
||||
if cipher_algo: args.append('--cipher-algo %s' % cipher_algo)
|
||||
if compress_algo: args.append('--compress-algo %s' % compress_algo)
|
||||
|
||||
if default_key:
|
||||
args.append('--sign')
|
||||
args.append('--default-key %s' % default_key)
|
||||
if digest_algo:
|
||||
args.append('--digest-algo %s' % digest_algo)
|
||||
|
||||
## both can be used at the same time for an encrypted file which
|
||||
## is decryptable with a passphrase or secretkey.
|
||||
if symmetric: args.append('--symmetric')
|
||||
if encrypt: args.append('--encrypt')
|
||||
|
||||
if len(recipients) >= 1:
|
||||
log.debug("GPG.encrypt() called for recipients '%s' with type '%s'"
|
||||
% (recipients, type(recipients)))
|
||||
|
||||
if isinstance(recipients, (list, tuple)):
|
||||
for recp in recipients:
|
||||
if not _util._py3k:
|
||||
if isinstance(recp, unicode):
|
||||
try:
|
||||
assert _parsers._is_hex(str(recp))
|
||||
except AssertionError:
|
||||
log.info("Can't accept recipient string: %s"
|
||||
% recp)
|
||||
else:
|
||||
args.append('--recipient %s' % str(recp))
|
||||
continue
|
||||
## will give unicode in 2.x as '\uXXXX\uXXXX'
|
||||
args.append('--recipient %r' % recp)
|
||||
continue
|
||||
if isinstance(recp, str):
|
||||
args.append('--recipient %s' % recp)
|
||||
|
||||
elif (not _util._py3k) and isinstance(recp, basestring):
|
||||
for recp in recipients.split('\x20'):
|
||||
args.append('--recipient %s' % recp)
|
||||
|
||||
elif _util._py3k and isinstance(recp, str):
|
||||
for recp in recipients.split(' '):
|
||||
args.append('--recipient %s' % recp)
|
||||
## ...and now that we've proven py3k is better...
|
||||
|
||||
else:
|
||||
log.debug("Don't know what to do with recipients: '%s'"
|
||||
% recipients)
|
||||
|
||||
result = self._result_map['crypt'](self)
|
||||
log.debug("Got data '%s' with type '%s'."
|
||||
% (data, type(data)))
|
||||
self._handle_io(args, data, result,
|
||||
passphrase=passphrase, binary=True)
|
||||
log.debug('GPG.encrypt_file(): Result: %r', result.data)
|
||||
return result
|
File diff suppressed because it is too large
Load Diff
|
@ -15,32 +15,34 @@
|
|||
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||
# GNU Affero General Public License for more details.
|
||||
'''
|
||||
util.py
|
||||
'''util.py
|
||||
----------
|
||||
Extra utilities for python-gnupg.
|
||||
'''
|
||||
|
||||
from datetime import datetime
|
||||
from socket import gethostname
|
||||
from __future__ import absolute_import
|
||||
from datetime import datetime
|
||||
from socket import gethostname
|
||||
from time import gmtime
|
||||
from time import mktime
|
||||
|
||||
import codecs
|
||||
import encodings
|
||||
import os
|
||||
import time
|
||||
import threading
|
||||
import random
|
||||
import string
|
||||
import sys
|
||||
|
||||
import _logger
|
||||
|
||||
try:
|
||||
from io import StringIO
|
||||
from io import BytesIO
|
||||
except ImportError:
|
||||
from cStringIO import StringIO
|
||||
|
||||
from . import _logger
|
||||
|
||||
|
||||
try:
|
||||
unicode
|
||||
_py3k = False
|
||||
|
@ -48,17 +50,19 @@ try:
|
|||
isinstance(__name__, basestring)
|
||||
except NameError:
|
||||
msg = "Sorry, python-gnupg requires a Python version with proper"
|
||||
msg += " unicode support. Please upgrade to Python>=2.3."
|
||||
msg += " unicode support. Please upgrade to Python>=2.6."
|
||||
raise SystemExit(msg)
|
||||
except NameError:
|
||||
_py3k = True
|
||||
|
||||
|
||||
## Directory shortcuts:
|
||||
_here = os.getcwd()
|
||||
_test = os.path.join(os.path.join(_here, 'tests'), 'tmp') ## ./tests/tmp
|
||||
_user = os.environ.get('HOME') ## $HOME
|
||||
_ugpg = os.path.join(_user, '.gnupg') ## $HOME/.gnupg
|
||||
## we don't want to use this one because it writes to the install dir:
|
||||
#_here = getabsfile(currentframe()).rsplit(os.path.sep, 1)[0]
|
||||
_here = os.path.join(os.getcwd(), 'gnupg') ## current dir
|
||||
_test = os.path.join(os.path.join(_here, 'test'), 'tmp') ## ./tests/tmp
|
||||
_user = os.environ.get('HOME') ## $HOME
|
||||
_ugpg = os.path.join(_user, '.gnupg') ## $HOME/.gnupg
|
||||
_conf = os.path.join(os.path.join(_user, '.config'), 'python-gnupg')
|
||||
## $HOME/.config/python-gnupg
|
||||
|
||||
|
@ -100,6 +104,16 @@ def find_encodings(enc=None, system=False):
|
|||
|
||||
return coder
|
||||
|
||||
def author_info(name, contact=None, public_key=None):
|
||||
"""Easy object-oriented representation of contributor info.
|
||||
|
||||
:param str name: The contributor´s name.
|
||||
:param str contact: The contributor´s email address or contact
|
||||
information, if given.
|
||||
:param str public_key: The contributor´s public keyid, if given.
|
||||
"""
|
||||
return Storage(name=name, contact=contact, public_key=public_key)
|
||||
|
||||
def _copy_data(instream, outstream):
|
||||
"""Copy data from one stream to another.
|
||||
|
||||
|
@ -109,14 +123,6 @@ def _copy_data(instream, outstream):
|
|||
"""
|
||||
sent = 0
|
||||
|
||||
#try:
|
||||
# #assert (util._is_stream(instream)
|
||||
# # or isinstance(instream, file)), "instream not stream or file"
|
||||
# assert isinstance(outstream, file), "outstream is not a file"
|
||||
#except AssertionError as ae:
|
||||
# log.exception(ae)
|
||||
# return
|
||||
|
||||
coder = find_encodings()
|
||||
|
||||
while True:
|
||||
|
@ -139,9 +145,12 @@ def _copy_data(instream, outstream):
|
|||
except IOError:
|
||||
log.exception("Error sending data: Broken pipe")
|
||||
break
|
||||
except IOError:
|
||||
except IOError as ioe:
|
||||
# Can get 'broken pipe' errors even when all data was sent
|
||||
log.exception('Error sending data: Broken pipe')
|
||||
if 'Broken pipe' in ioe.message:
|
||||
log.error('Error sending data: Broken pipe')
|
||||
else:
|
||||
log.exception(ioe)
|
||||
break
|
||||
try:
|
||||
outstream.close()
|
||||
|
@ -321,7 +330,7 @@ def _make_passphrase(length=None, save=False, file=None):
|
|||
if save:
|
||||
ruid, euid, suid = os.getresuid()
|
||||
gid = os.getgid()
|
||||
now = time.mktime(time.gmtime())
|
||||
now = mktime(gmtime())
|
||||
|
||||
if not file:
|
||||
filename = str('passphrase-%s-%s' % uid, now)
|
||||
|
@ -379,7 +388,7 @@ def _threaded_copy_data(instream, outstream):
|
|||
|
||||
def _utc_epoch():
|
||||
"""Get the seconds since epoch for UTC."""
|
||||
return int(time.mktime(time.gmtime()))
|
||||
return int(mktime(gmtime()))
|
||||
|
||||
def _which(executable, flags=os.X_OK):
|
||||
"""Borrowed from Twisted's :mod:twisted.python.proutils .
|
||||
|
@ -468,3 +477,45 @@ class InheritableProperty(object):
|
|||
self.fdel(obj)
|
||||
else:
|
||||
getattr(obj, self.fdel.__name__)()
|
||||
|
||||
class Storage(dict):
|
||||
"""A dictionary where keys are stored as class attributes.
|
||||
|
||||
For example, ``obj.foo`` can be used in addition to ``obj['foo']``:
|
||||
|
||||
>>> o = Storage(a=1)
|
||||
>>> o.a
|
||||
1
|
||||
>>> o['a']
|
||||
1
|
||||
>>> o.a = 2
|
||||
>>> o['a']
|
||||
2
|
||||
>>> del o.a
|
||||
>>> o.a
|
||||
None
|
||||
"""
|
||||
def __getattr__(self, key):
|
||||
try:
|
||||
return self[key]
|
||||
except KeyError, k:
|
||||
return None
|
||||
|
||||
def __setattr__(self, key, value):
|
||||
self[key] = value
|
||||
|
||||
def __delattr__(self, key):
|
||||
try:
|
||||
del self[key]
|
||||
except KeyError as k:
|
||||
raise AttributeError(k.message)
|
||||
|
||||
def __repr__(self):
|
||||
return '<Storage ' + dict.__repr__(self) + '>'
|
||||
|
||||
def __getstate__(self):
|
||||
return dict(self)
|
||||
|
||||
def __setstate__(self, value):
|
||||
for (k, v) in value.items():
|
||||
self[k] = v
|
|
@ -0,0 +1,745 @@
|
|||
# -*- coding: utf-8 -*-
|
||||
#
|
||||
# This file is part of python-gnupg, a Python interface to GnuPG.
|
||||
# Copyright © 2013 Isis Lovecruft
|
||||
# © 2008-2012 Vinay Sajip
|
||||
# © 2005 Steve Traugott
|
||||
# © 2004 A.M. Kuchling
|
||||
#
|
||||
# This program is free software: you can redistribute it and/or modify
|
||||
# it under the terms of the GNU Affero General Public License as published
|
||||
# by the Free Software Foundation, either version 3 of the License, or
|
||||
# (at your option) any later version.
|
||||
#
|
||||
# This program is distributed in the hope that it will be useful,
|
||||
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||
# GNU Affero General Public License for more details.
|
||||
'''copyleft.py
|
||||
--------------
|
||||
Copyright information for python-gnupg.
|
||||
'''
|
||||
|
||||
from __future__ import absolute_import
|
||||
|
||||
from . import _util
|
||||
|
||||
|
||||
authors = { 'lovecruft_isis': _util.author_info(
|
||||
'Isis Agora Lovecruft', 'isis@leap.se', '0xA3ADB67A2CDB8B35'),
|
||||
|
||||
'sajip_vinay': _util.author_info(
|
||||
'Vinay Sajip', 'vinay.sajip@gmail.com', '0xDE6EF0B2'),
|
||||
|
||||
'traugott_steve': _util.author_info(
|
||||
'Steve Traugott', 'stevegt@terraluna.org'),
|
||||
|
||||
'kuchling_am': _util.author_info(
|
||||
'A.M. Kuchling', 'amk@amk.ca'), }
|
||||
|
||||
copyright = """\
|
||||
Copyright © 2013 Isis Lovecruft
|
||||
© 2008-2012 Vinay Sajip
|
||||
© 2005 Steve Traugott
|
||||
© 2004 A.M. Kuchling
|
||||
All rights reserved.
|
||||
See included LICENSE or ``print(gnupg.__license__)`` for full license."""
|
||||
|
||||
disclaimer = """\
|
||||
This file is part of python-gnupg, a Python wrapper around GnuPG.
|
||||
%s
|
||||
|
||||
This program is free software: you can redistribute it and/or modify
|
||||
it under the terms of the GNU Affero General Public License as
|
||||
published by the Free Software Foundation, either version 3 of the
|
||||
License, or (at your option) any later version.
|
||||
|
||||
This program is distributed in the hope that it will be useful, but
|
||||
WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
||||
Affero General Public License for more details.""" % (copyright,)
|
||||
|
||||
|
||||
txcopyright = """\
|
||||
Where stated, parts of this program were taken from Twisted, which is
|
||||
licensed as follows:
|
||||
|
||||
Twisted, the Framework of Your Internet
|
||||
Copyright © 2001-2013 Twisted Matrix Laboratories.
|
||||
See LICENSE for details.
|
||||
|
||||
Permission is hereby granted, free of charge, to any person obtaining
|
||||
a copy of this software and associated documentation files (the
|
||||
"Software"), to deal in the Software without restriction, including
|
||||
without limitation the rights to use, copy, modify, merge, publish,
|
||||
distribute, sublicense, and/or sell copies of the Software, and to
|
||||
permit persons to whom the Software is furnished to do so, subject to
|
||||
the following conditions:
|
||||
|
||||
The above copyright notice and this permission notice shall be
|
||||
included in all copies or substantial portions of the Software.
|
||||
|
||||
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
|
||||
EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
|
||||
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
|
||||
NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE
|
||||
LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION
|
||||
OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION
|
||||
WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE."""
|
||||
|
||||
|
||||
AGPLv3_text = """\
|
||||
GNU AFFERO GENERAL PUBLIC LICENSE
|
||||
Version 3, 19 November 2007
|
||||
|
||||
Copyright © 2007 Free Software Foundation, Inc. <http://fsf.org/>
|
||||
Everyone is permitted to copy and distribute verbatim copies
|
||||
of this license document, but changing it is not allowed.
|
||||
|
||||
Preamble
|
||||
|
||||
The GNU Affero General Public License is a free, copyleft license for
|
||||
software and other kinds of works, specifically designed to ensure
|
||||
cooperation with the community in the case of network server software.
|
||||
|
||||
The licenses for most software and other practical works are designed
|
||||
to take away your freedom to share and change the works. By contrast,
|
||||
our General Public Licenses are intended to guarantee your freedom to
|
||||
share and change all versions of a program--to make sure it remains free
|
||||
software for all its users.
|
||||
|
||||
When we speak of free software, we are referring to freedom, not
|
||||
price. Our General Public Licenses are designed to make sure that you
|
||||
have the freedom to distribute copies of free software (and charge for
|
||||
them if you wish), that you receive source code or can get it if you
|
||||
want it, that you can change the software or use pieces of it in new
|
||||
free programs, and that you know you can do these things.
|
||||
|
||||
Developers that use our General Public Licenses protect your rights
|
||||
with two steps: (1) assert copyright on the software, and (2) offer
|
||||
you this License which gives you legal permission to copy, distribute
|
||||
and/or modify the software.
|
||||
|
||||
A secondary benefit of defending all users' freedom is that
|
||||
improvements made in alternate versions of the program, if they
|
||||
receive widespread use, become available for other developers to
|
||||
incorporate. Many developers of free software are heartened and
|
||||
encouraged by the resulting cooperation. However, in the case of
|
||||
software used on network servers, this result may fail to come about.
|
||||
The GNU General Public License permits making a modified version and
|
||||
letting the public access it on a server without ever releasing its
|
||||
source code to the public.
|
||||
|
||||
The GNU Affero General Public License is designed specifically to
|
||||
ensure that, in such cases, the modified source code becomes available
|
||||
to the community. It requires the operator of a network server to
|
||||
provide the source code of the modified version running there to the
|
||||
users of that server. Therefore, public use of a modified version, on
|
||||
a publicly accessible server, gives the public access to the source
|
||||
code of the modified version.
|
||||
|
||||
An older license, called the Affero General Public License and
|
||||
published by Affero, was designed to accomplish similar goals. This is
|
||||
a different license, not a version of the Affero GPL, but Affero has
|
||||
released a new version of the Affero GPL which permits relicensing under
|
||||
this license.
|
||||
|
||||
The precise terms and conditions for copying, distribution and
|
||||
modification follow.
|
||||
|
||||
TERMS AND CONDITIONS
|
||||
|
||||
0. Definitions.
|
||||
|
||||
"This License" refers to version 3 of the GNU Affero General Public License.
|
||||
|
||||
"Copyright" also means copyright-like laws that apply to other kinds of
|
||||
works, such as semiconductor masks.
|
||||
|
||||
"The Program" refers to any copyrightable work licensed under this
|
||||
License. Each licensee is addressed as "you". "Licensees" and
|
||||
"recipients" may be individuals or organizations.
|
||||
|
||||
To "modify" a work means to copy from or adapt all or part of the work
|
||||
in a fashion requiring copyright permission, other than the making of an
|
||||
exact copy. The resulting work is called a "modified version" of the
|
||||
earlier work or a work "based on" the earlier work.
|
||||
|
||||
A "covered work" means either the unmodified Program or a work based
|
||||
on the Program.
|
||||
|
||||
To "propagate" a work means to do anything with it that, without
|
||||
permission, would make you directly or secondarily liable for
|
||||
infringement under applicable copyright law, except executing it on a
|
||||
computer or modifying a private copy. Propagation includes copying,
|
||||
distribution (with or without modification), making available to the
|
||||
public, and in some countries other activities as well.
|
||||
|
||||
To "convey" a work means any kind of propagation that enables other
|
||||
parties to make or receive copies. Mere interaction with a user through
|
||||
a computer network, with no transfer of a copy, is not conveying.
|
||||
|
||||
An interactive user interface displays "Appropriate Legal Notices"
|
||||
to the extent that it includes a convenient and prominently visible
|
||||
feature that (1) displays an appropriate copyright notice, and (2)
|
||||
tells the user that there is no warranty for the work (except to the
|
||||
extent that warranties are provided), that licensees may convey the
|
||||
work under this License, and how to view a copy of this License. If
|
||||
the interface presents a list of user commands or options, such as a
|
||||
menu, a prominent item in the list meets this criterion.
|
||||
|
||||
1. Source Code.
|
||||
|
||||
The "source code" for a work means the preferred form of the work
|
||||
for making modifications to it. "Object code" means any non-source
|
||||
form of a work.
|
||||
|
||||
A "Standard Interface" means an interface that either is an official
|
||||
standard defined by a recognized standards body, or, in the case of
|
||||
interfaces specified for a particular programming language, one that
|
||||
is widely used among developers working in that language.
|
||||
|
||||
The "System Libraries" of an executable work include anything, other
|
||||
than the work as a whole, that (a) is included in the normal form of
|
||||
packaging a Major Component, but which is not part of that Major
|
||||
Component, and (b) serves only to enable use of the work with that
|
||||
Major Component, or to implement a Standard Interface for which an
|
||||
implementation is available to the public in source code form. A
|
||||
"Major Component", in this context, means a major essential component
|
||||
(kernel, window system, and so on) of the specific operating system
|
||||
(if any) on which the executable work runs, or a compiler used to
|
||||
produce the work, or an object code interpreter used to run it.
|
||||
|
||||
The "Corresponding Source" for a work in object code form means all
|
||||
the source code needed to generate, install, and (for an executable
|
||||
work) run the object code and to modify the work, including scripts to
|
||||
control those activities. However, it does not include the work's
|
||||
System Libraries, or general-purpose tools or generally available free
|
||||
programs which are used unmodified in performing those activities but
|
||||
which are not part of the work. For example, Corresponding Source
|
||||
includes interface definition files associated with source files for
|
||||
the work, and the source code for shared libraries and dynamically
|
||||
linked subprograms that the work is specifically designed to require,
|
||||
such as by intimate data communication or control flow between those
|
||||
subprograms and other parts of the work.
|
||||
|
||||
The Corresponding Source need not include anything that users
|
||||
can regenerate automatically from other parts of the Corresponding
|
||||
Source.
|
||||
|
||||
The Corresponding Source for a work in source code form is that
|
||||
same work.
|
||||
|
||||
2. Basic Permissions.
|
||||
|
||||
All rights granted under this License are granted for the term of
|
||||
copyright on the Program, and are irrevocable provided the stated
|
||||
conditions are met. This License explicitly affirms your unlimited
|
||||
permission to run the unmodified Program. The output from running a
|
||||
covered work is covered by this License only if the output, given its
|
||||
content, constitutes a covered work. This License acknowledges your
|
||||
rights of fair use or other equivalent, as provided by copyright law.
|
||||
|
||||
You may make, run and propagate covered works that you do not
|
||||
convey, without conditions so long as your license otherwise remains
|
||||
in force. You may convey covered works to others for the sole purpose
|
||||
of having them make modifications exclusively for you, or provide you
|
||||
with facilities for running those works, provided that you comply with
|
||||
the terms of this License in conveying all material for which you do
|
||||
not control copyright. Those thus making or running the covered works
|
||||
for you must do so exclusively on your behalf, under your direction
|
||||
and control, on terms that prohibit them from making any copies of
|
||||
your copyrighted material outside their relationship with you.
|
||||
|
||||
Conveying under any other circumstances is permitted solely under
|
||||
the conditions stated below. Sublicensing is not allowed; section 10
|
||||
makes it unnecessary.
|
||||
|
||||
3. Protecting Users' Legal Rights From Anti-Circumvention Law.
|
||||
|
||||
No covered work shall be deemed part of an effective technological
|
||||
measure under any applicable law fulfilling obligations under article
|
||||
11 of the WIPO copyright treaty adopted on 20 December 1996, or
|
||||
similar laws prohibiting or restricting circumvention of such
|
||||
measures.
|
||||
|
||||
When you convey a covered work, you waive any legal power to forbid
|
||||
circumvention of technological measures to the extent such circumvention
|
||||
is effected by exercising rights under this License with respect to
|
||||
the covered work, and you disclaim any intention to limit operation or
|
||||
modification of the work as a means of enforcing, against the work's
|
||||
users, your or third parties' legal rights to forbid circumvention of
|
||||
technological measures.
|
||||
|
||||
4. Conveying Verbatim Copies.
|
||||
|
||||
You may convey verbatim copies of the Program's source code as you
|
||||
receive it, in any medium, provided that you conspicuously and
|
||||
appropriately publish on each copy an appropriate copyright notice;
|
||||
keep intact all notices stating that this License and any
|
||||
non-permissive terms added in accord with section 7 apply to the code;
|
||||
keep intact all notices of the absence of any warranty; and give all
|
||||
recipients a copy of this License along with the Program.
|
||||
|
||||
You may charge any price or no price for each copy that you convey,
|
||||
and you may offer support or warranty protection for a fee.
|
||||
|
||||
5. Conveying Modified Source Versions.
|
||||
|
||||
You may convey a work based on the Program, or the modifications to
|
||||
produce it from the Program, in the form of source code under the
|
||||
terms of section 4, provided that you also meet all of these conditions:
|
||||
|
||||
a) The work must carry prominent notices stating that you modified
|
||||
it, and giving a relevant date.
|
||||
|
||||
b) The work must carry prominent notices stating that it is
|
||||
released under this License and any conditions added under section
|
||||
7. This requirement modifies the requirement in section 4 to
|
||||
"keep intact all notices".
|
||||
|
||||
c) You must license the entire work, as a whole, under this
|
||||
License to anyone who comes into possession of a copy. This
|
||||
License will therefore apply, along with any applicable section 7
|
||||
additional terms, to the whole of the work, and all its parts,
|
||||
regardless of how they are packaged. This License gives no
|
||||
permission to license the work in any other way, but it does not
|
||||
invalidate such permission if you have separately received it.
|
||||
|
||||
d) If the work has interactive user interfaces, each must display
|
||||
Appropriate Legal Notices; however, if the Program has interactive
|
||||
interfaces that do not display Appropriate Legal Notices, your
|
||||
work need not make them do so.
|
||||
|
||||
A compilation of a covered work with other separate and independent
|
||||
works, which are not by their nature extensions of the covered work,
|
||||
and which are not combined with it such as to form a larger program,
|
||||
in or on a volume of a storage or distribution medium, is called an
|
||||
"aggregate" if the compilation and its resulting copyright are not
|
||||
used to limit the access or legal rights of the compilation's users
|
||||
beyond what the individual works permit. Inclusion of a covered work
|
||||
in an aggregate does not cause this License to apply to the other
|
||||
parts of the aggregate.
|
||||
|
||||
6. Conveying Non-Source Forms.
|
||||
|
||||
You may convey a covered work in object code form under the terms
|
||||
of sections 4 and 5, provided that you also convey the
|
||||
machine-readable Corresponding Source under the terms of this License,
|
||||
in one of these ways:
|
||||
|
||||
a) Convey the object code in, or embodied in, a physical product
|
||||
(including a physical distribution medium), accompanied by the
|
||||
Corresponding Source fixed on a durable physical medium
|
||||
customarily used for software interchange.
|
||||
|
||||
b) Convey the object code in, or embodied in, a physical product
|
||||
(including a physical distribution medium), accompanied by a
|
||||
written offer, valid for at least three years and valid for as
|
||||
long as you offer spare parts or customer support for that product
|
||||
model, to give anyone who possesses the object code either (1) a
|
||||
copy of the Corresponding Source for all the software in the
|
||||
product that is covered by this License, on a durable physical
|
||||
medium customarily used for software interchange, for a price no
|
||||
more than your reasonable cost of physically performing this
|
||||
conveying of source, or (2) access to copy the
|
||||
Corresponding Source from a network server at no charge.
|
||||
|
||||
c) Convey individual copies of the object code with a copy of the
|
||||
written offer to provide the Corresponding Source. This
|
||||
alternative is allowed only occasionally and noncommercially, and
|
||||
only if you received the object code with such an offer, in accord
|
||||
with subsection 6b.
|
||||
|
||||
d) Convey the object code by offering access from a designated
|
||||
place (gratis or for a charge), and offer equivalent access to the
|
||||
Corresponding Source in the same way through the same place at no
|
||||
further charge. You need not require recipients to copy the
|
||||
Corresponding Source along with the object code. If the place to
|
||||
copy the object code is a network server, the Corresponding Source
|
||||
may be on a different server (operated by you or a third party)
|
||||
that supports equivalent copying facilities, provided you maintain
|
||||
clear directions next to the object code saying where to find the
|
||||
Corresponding Source. Regardless of what server hosts the
|
||||
Corresponding Source, you remain obligated to ensure that it is
|
||||
available for as long as needed to satisfy these requirements.
|
||||
|
||||
e) Convey the object code using peer-to-peer transmission, provided
|
||||
you inform other peers where the object code and Corresponding
|
||||
Source of the work are being offered to the general public at no
|
||||
charge under subsection 6d.
|
||||
|
||||
A separable portion of the object code, whose source code is excluded
|
||||
from the Corresponding Source as a System Library, need not be
|
||||
included in conveying the object code work.
|
||||
|
||||
A "User Product" is either (1) a "consumer product", which means any
|
||||
tangible personal property which is normally used for personal, family,
|
||||
or household purposes, or (2) anything designed or sold for incorporation
|
||||
into a dwelling. In determining whether a product is a consumer product,
|
||||
doubtful cases shall be resolved in favor of coverage. For a particular
|
||||
product received by a particular user, "normally used" refers to a
|
||||
typical or common use of that class of product, regardless of the status
|
||||
of the particular user or of the way in which the particular user
|
||||
actually uses, or expects or is expected to use, the product. A product
|
||||
is a consumer product regardless of whether the product has substantial
|
||||
commercial, industrial or non-consumer uses, unless such uses represent
|
||||
the only significant mode of use of the product.
|
||||
|
||||
"Installation Information" for a User Product means any methods,
|
||||
procedures, authorization keys, or other information required to install
|
||||
and execute modified versions of a covered work in that User Product from
|
||||
a modified version of its Corresponding Source. The information must
|
||||
suffice to ensure that the continued functioning of the modified object
|
||||
code is in no case prevented or interfered with solely because
|
||||
modification has been made.
|
||||
|
||||
If you convey an object code work under this section in, or with, or
|
||||
specifically for use in, a User Product, and the conveying occurs as
|
||||
part of a transaction in which the right of possession and use of the
|
||||
User Product is transferred to the recipient in perpetuity or for a
|
||||
fixed term (regardless of how the transaction is characterized), the
|
||||
Corresponding Source conveyed under this section must be accompanied
|
||||
by the Installation Information. But this requirement does not apply
|
||||
if neither you nor any third party retains the ability to install
|
||||
modified object code on the User Product (for example, the work has
|
||||
been installed in ROM).
|
||||
|
||||
The requirement to provide Installation Information does not include a
|
||||
requirement to continue to provide support service, warranty, or updates
|
||||
for a work that has been modified or installed by the recipient, or for
|
||||
the User Product in which it has been modified or installed. Access to a
|
||||
network may be denied when the modification itself materially and
|
||||
adversely affects the operation of the network or violates the rules and
|
||||
protocols for communication across the network.
|
||||
|
||||
Corresponding Source conveyed, and Installation Information provided,
|
||||
in accord with this section must be in a format that is publicly
|
||||
documented (and with an implementation available to the public in
|
||||
source code form), and must require no special password or key for
|
||||
unpacking, reading or copying.
|
||||
|
||||
7. Additional Terms.
|
||||
|
||||
"Additional permissions" are terms that supplement the terms of this
|
||||
License by making exceptions from one or more of its conditions.
|
||||
Additional permissions that are applicable to the entire Program shall
|
||||
be treated as though they were included in this License, to the extent
|
||||
that they are valid under applicable law. If additional permissions
|
||||
apply only to part of the Program, that part may be used separately
|
||||
under those permissions, but the entire Program remains governed by
|
||||
this License without regard to the additional permissions.
|
||||
|
||||
When you convey a copy of a covered work, you may at your option
|
||||
remove any additional permissions from that copy, or from any part of
|
||||
it. (Additional permissions may be written to require their own
|
||||
removal in certain cases when you modify the work.) You may place
|
||||
additional permissions on material, added by you to a covered work,
|
||||
for which you have or can give appropriate copyright permission.
|
||||
|
||||
Notwithstanding any other provision of this License, for material you
|
||||
add to a covered work, you may (if authorized by the copyright holders of
|
||||
that material) supplement the terms of this License with terms:
|
||||
|
||||
a) Disclaiming warranty or limiting liability differently from the
|
||||
terms of sections 15 and 16 of this License; or
|
||||
|
||||
b) Requiring preservation of specified reasonable legal notices or
|
||||
author attributions in that material or in the Appropriate Legal
|
||||
Notices displayed by works containing it; or
|
||||
|
||||
c) Prohibiting misrepresentation of the origin of that material, or
|
||||
requiring that modified versions of such material be marked in
|
||||
reasonable ways as different from the original version; or
|
||||
|
||||
d) Limiting the use for publicity purposes of names of licensors or
|
||||
authors of the material; or
|
||||
|
||||
e) Declining to grant rights under trademark law for use of some
|
||||
trade names, trademarks, or service marks; or
|
||||
|
||||
f) Requiring indemnification of licensors and authors of that
|
||||
material by anyone who conveys the material (or modified versions of
|
||||
it) with contractual assumptions of liability to the recipient, for
|
||||
any liability that these contractual assumptions directly impose on
|
||||
those licensors and authors.
|
||||
|
||||
All other non-permissive additional terms are considered "further
|
||||
restrictions" within the meaning of section 10. If the Program as you
|
||||
received it, or any part of it, contains a notice stating that it is
|
||||
governed by this License along with a term that is a further
|
||||
restriction, you may remove that term. If a license document contains
|
||||
a further restriction but permits relicensing or conveying under this
|
||||
License, you may add to a covered work material governed by the terms
|
||||
of that license document, provided that the further restriction does
|
||||
not survive such relicensing or conveying.
|
||||
|
||||
If you add terms to a covered work in accord with this section, you
|
||||
must place, in the relevant source files, a statement of the
|
||||
additional terms that apply to those files, or a notice indicating
|
||||
where to find the applicable terms.
|
||||
|
||||
Additional terms, permissive or non-permissive, may be stated in the
|
||||
form of a separately written license, or stated as exceptions;
|
||||
the above requirements apply either way.
|
||||
|
||||
8. Termination.
|
||||
|
||||
You may not propagate or modify a covered work except as expressly
|
||||
provided under this License. Any attempt otherwise to propagate or
|
||||
modify it is void, and will automatically terminate your rights under
|
||||
this License (including any patent licenses granted under the third
|
||||
paragraph of section 11).
|
||||
|
||||
However, if you cease all violation of this License, then your
|
||||
license from a particular copyright holder is reinstated (a)
|
||||
provisionally, unless and until the copyright holder explicitly and
|
||||
finally terminates your license, and (b) permanently, if the copyright
|
||||
holder fails to notify you of the violation by some reasonable means
|
||||
prior to 60 days after the cessation.
|
||||
|
||||
Moreover, your license from a particular copyright holder is
|
||||
reinstated permanently if the copyright holder notifies you of the
|
||||
violation by some reasonable means, this is the first time you have
|
||||
received notice of violation of this License (for any work) from that
|
||||
copyright holder, and you cure the violation prior to 30 days after
|
||||
your receipt of the notice.
|
||||
|
||||
Termination of your rights under this section does not terminate the
|
||||
licenses of parties who have received copies or rights from you under
|
||||
this License. If your rights have been terminated and not permanently
|
||||
reinstated, you do not qualify to receive new licenses for the same
|
||||
material under section 10.
|
||||
|
||||
9. Acceptance Not Required for Having Copies.
|
||||
|
||||
You are not required to accept this License in order to receive or
|
||||
run a copy of the Program. Ancillary propagation of a covered work
|
||||
occurring solely as a consequence of using peer-to-peer transmission
|
||||
to receive a copy likewise does not require acceptance. However,
|
||||
nothing other than this License grants you permission to propagate or
|
||||
modify any covered work. These actions infringe copyright if you do
|
||||
not accept this License. Therefore, by modifying or propagating a
|
||||
covered work, you indicate your acceptance of this License to do so.
|
||||
|
||||
10. Automatic Licensing of Downstream Recipients.
|
||||
|
||||
Each time you convey a covered work, the recipient automatically
|
||||
receives a license from the original licensors, to run, modify and
|
||||
propagate that work, subject to this License. You are not responsible
|
||||
for enforcing compliance by third parties with this License.
|
||||
|
||||
An "entity transaction" is a transaction transferring control of an
|
||||
organization, or substantially all assets of one, or subdividing an
|
||||
organization, or merging organizations. If propagation of a covered
|
||||
work results from an entity transaction, each party to that
|
||||
transaction who receives a copy of the work also receives whatever
|
||||
licenses to the work the party's predecessor in interest had or could
|
||||
give under the previous paragraph, plus a right to possession of the
|
||||
Corresponding Source of the work from the predecessor in interest, if
|
||||
the predecessor has it or can get it with reasonable efforts.
|
||||
|
||||
You may not impose any further restrictions on the exercise of the
|
||||
rights granted or affirmed under this License. For example, you may
|
||||
not impose a license fee, royalty, or other charge for exercise of
|
||||
rights granted under this License, and you may not initiate litigation
|
||||
(including a cross-claim or counterclaim in a lawsuit) alleging that
|
||||
any patent claim is infringed by making, using, selling, offering for
|
||||
sale, or importing the Program or any portion of it.
|
||||
|
||||
11. Patents.
|
||||
|
||||
A "contributor" is a copyright holder who authorizes use under this
|
||||
License of the Program or a work on which the Program is based. The
|
||||
work thus licensed is called the contributor's "contributor version".
|
||||
|
||||
A contributor's "essential patent claims" are all patent claims
|
||||
owned or controlled by the contributor, whether already acquired or
|
||||
hereafter acquired, that would be infringed by some manner, permitted
|
||||
by this License, of making, using, or selling its contributor version,
|
||||
but do not include claims that would be infringed only as a
|
||||
consequence of further modification of the contributor version. For
|
||||
purposes of this definition, "control" includes the right to grant
|
||||
patent sublicenses in a manner consistent with the requirements of
|
||||
this License.
|
||||
|
||||
Each contributor grants you a non-exclusive, worldwide, royalty-free
|
||||
patent license under the contributor's essential patent claims, to
|
||||
make, use, sell, offer for sale, import and otherwise run, modify and
|
||||
propagate the contents of its contributor version.
|
||||
|
||||
In the following three paragraphs, a "patent license" is any express
|
||||
agreement or commitment, however denominated, not to enforce a patent
|
||||
(such as an express permission to practice a patent or covenant not to
|
||||
sue for patent infringement). To "grant" such a patent license to a
|
||||
party means to make such an agreement or commitment not to enforce a
|
||||
patent against the party.
|
||||
|
||||
If you convey a covered work, knowingly relying on a patent license,
|
||||
and the Corresponding Source of the work is not available for anyone
|
||||
to copy, free of charge and under the terms of this License, through a
|
||||
publicly available network server or other readily accessible means,
|
||||
then you must either (1) cause the Corresponding Source to be so
|
||||
available, or (2) arrange to deprive yourself of the benefit of the
|
||||
patent license for this particular work, or (3) arrange, in a manner
|
||||
consistent with the requirements of this License, to extend the patent
|
||||
license to downstream recipients. "Knowingly relying" means you have
|
||||
actual knowledge that, but for the patent license, your conveying the
|
||||
covered work in a country, or your recipient's use of the covered work
|
||||
in a country, would infringe one or more identifiable patents in that
|
||||
country that you have reason to believe are valid.
|
||||
|
||||
If, pursuant to or in connection with a single transaction or
|
||||
arrangement, you convey, or propagate by procuring conveyance of, a
|
||||
covered work, and grant a patent license to some of the parties
|
||||
receiving the covered work authorizing them to use, propagate, modify
|
||||
or convey a specific copy of the covered work, then the patent license
|
||||
you grant is automatically extended to all recipients of the covered
|
||||
work and works based on it.
|
||||
|
||||
A patent license is "discriminatory" if it does not include within
|
||||
the scope of its coverage, prohibits the exercise of, or is
|
||||
conditioned on the non-exercise of one or more of the rights that are
|
||||
specifically granted under this License. You may not convey a covered
|
||||
work if you are a party to an arrangement with a third party that is
|
||||
in the business of distributing software, under which you make payment
|
||||
to the third party based on the extent of your activity of conveying
|
||||
the work, and under which the third party grants, to any of the
|
||||
parties who would receive the covered work from you, a discriminatory
|
||||
patent license (a) in connection with copies of the covered work
|
||||
conveyed by you (or copies made from those copies), or (b) primarily
|
||||
for and in connection with specific products or compilations that
|
||||
contain the covered work, unless you entered into that arrangement,
|
||||
or that patent license was granted, prior to 28 March 2007.
|
||||
|
||||
Nothing in this License shall be construed as excluding or limiting
|
||||
any implied license or other defenses to infringement that may
|
||||
otherwise be available to you under applicable patent law.
|
||||
|
||||
12. No Surrender of Others' Freedom.
|
||||
|
||||
If conditions are imposed on you (whether by court order, agreement or
|
||||
otherwise) that contradict the conditions of this License, they do not
|
||||
excuse you from the conditions of this License. If you cannot convey a
|
||||
covered work so as to satisfy simultaneously your obligations under this
|
||||
License and any other pertinent obligations, then as a consequence you may
|
||||
not convey it at all. For example, if you agree to terms that obligate you
|
||||
to collect a royalty for further conveying from those to whom you convey
|
||||
the Program, the only way you could satisfy both those terms and this
|
||||
License would be to refrain entirely from conveying the Program.
|
||||
|
||||
13. Remote Network Interaction; Use with the GNU General Public License.
|
||||
|
||||
Notwithstanding any other provision of this License, if you modify the
|
||||
Program, your modified version must prominently offer all users
|
||||
interacting with it remotely through a computer network (if your version
|
||||
supports such interaction) an opportunity to receive the Corresponding
|
||||
Source of your version by providing access to the Corresponding Source
|
||||
from a network server at no charge, through some standard or customary
|
||||
means of facilitating copying of software. This Corresponding Source
|
||||
shall include the Corresponding Source for any work covered by version 3
|
||||
of the GNU General Public License that is incorporated pursuant to the
|
||||
following paragraph.
|
||||
|
||||
Notwithstanding any other provision of this License, you have
|
||||
permission to link or combine any covered work with a work licensed
|
||||
under version 3 of the GNU General Public License into a single
|
||||
combined work, and to convey the resulting work. The terms of this
|
||||
License will continue to apply to the part which is the covered work,
|
||||
but the work with which it is combined will remain governed by version
|
||||
3 of the GNU General Public License.
|
||||
|
||||
14. Revised Versions of this License.
|
||||
|
||||
The Free Software Foundation may publish revised and/or new versions of
|
||||
the GNU Affero General Public License from time to time. Such new versions
|
||||
will be similar in spirit to the present version, but may differ in detail to
|
||||
address new problems or concerns.
|
||||
|
||||
Each version is given a distinguishing version number. If the
|
||||
Program specifies that a certain numbered version of the GNU Affero General
|
||||
Public License "or any later version" applies to it, you have the
|
||||
option of following the terms and conditions either of that numbered
|
||||
version or of any later version published by the Free Software
|
||||
Foundation. If the Program does not specify a version number of the
|
||||
GNU Affero General Public License, you may choose any version ever published
|
||||
by the Free Software Foundation.
|
||||
|
||||
If the Program specifies that a proxy can decide which future
|
||||
versions of the GNU Affero General Public License can be used, that proxy's
|
||||
public statement of acceptance of a version permanently authorizes you
|
||||
to choose that version for the Program.
|
||||
|
||||
Later license versions may give you additional or different
|
||||
permissions. However, no additional obligations are imposed on any
|
||||
author or copyright holder as a result of your choosing to follow a
|
||||
later version.
|
||||
|
||||
15. Disclaimer of Warranty.
|
||||
|
||||
THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY
|
||||
APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT
|
||||
HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY
|
||||
OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO,
|
||||
THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
|
||||
PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM
|
||||
IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF
|
||||
ALL NECESSARY SERVICING, REPAIR OR CORRECTION.
|
||||
|
||||
16. Limitation of Liability.
|
||||
|
||||
IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING
|
||||
WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MODIFIES AND/OR CONVEYS
|
||||
THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY
|
||||
GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE
|
||||
USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF
|
||||
DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD
|
||||
PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS),
|
||||
EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF
|
||||
SUCH DAMAGES.
|
||||
|
||||
17. Interpretation of Sections 15 and 16.
|
||||
|
||||
If the disclaimer of warranty and limitation of liability provided
|
||||
above cannot be given local legal effect according to their terms,
|
||||
reviewing courts shall apply local law that most closely approximates
|
||||
an absolute waiver of all civil liability in connection with the
|
||||
Program, unless a warranty or assumption of liability accompanies a
|
||||
copy of the Program in return for a fee.
|
||||
|
||||
END OF TERMS AND CONDITIONS
|
||||
|
||||
|
||||
|
||||
BEGIN ORIGINAL LICENSE TEXT
|
||||
|
||||
Copyright (c) 2008-2012 by Vinay Sajip.
|
||||
All rights reserved.
|
||||
|
||||
Redistribution and use in source and binary forms, with or without
|
||||
modification, are permitted provided that the following conditions are met:
|
||||
|
||||
* Redistributions of source code must retain the above copyright notice,
|
||||
this list of conditions and the following disclaimer.
|
||||
* Redistributions in binary form must reproduce the above copyright notice,
|
||||
this list of conditions and the following disclaimer in the documentation
|
||||
and/or other materials provided with the distribution.
|
||||
* The name(s) of the copyright holder(s) may not be used to endorse or
|
||||
promote products derived from this software without specific prior
|
||||
written permission.
|
||||
|
||||
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDER(S) "AS IS" AND ANY EXPRESS OR
|
||||
IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
|
||||
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO
|
||||
EVENT SHALL THE COPYRIGHT HOLDER(S) BE LIABLE FOR ANY DIRECT, INDIRECT,
|
||||
INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
|
||||
LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
|
||||
PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
|
||||
LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
|
||||
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF
|
||||
ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
||||
|
||||
END ORIGINAL LICENSE TEXT
|
||||
"""
|
||||
|
||||
full_text = "%s\n\n%s\n\n%s" % (disclaimer, txcopyright, AGPLv3_text)
|
File diff suppressed because it is too large
Load Diff
|
@ -0,0 +1,21 @@
|
|||
# -*- coding: utf-8 -*-
|
||||
#
|
||||
# This file is part of python-gnupg, a Python interface to GnuPG.
|
||||
# Copyright © 2013 Isis Lovecruft
|
||||
# © 2008-2012 Vinay Sajip
|
||||
# © 2005 Steve Traugott
|
||||
# © 2004 A.M. Kuchling
|
||||
#
|
||||
# This program is free software: you can redistribute it and/or modify
|
||||
# it under the terms of the GNU Affero General Public License as published
|
||||
# by the Free Software Foundation, either version 3 of the License, or
|
||||
# (at your option) any later version.
|
||||
#
|
||||
# This program is distributed in the hope that it will be useful,
|
||||
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||
# GNU Affero General Public License for more details.
|
||||
"""test/__init__.py
|
||||
-------------------
|
||||
Initialisation file for gnupg._test unittesting package.
|
||||
"""
|
|
@ -0,0 +1,4 @@
|
|||
This directory contains files related to doctests in python-gnupg docstrings.
|
||||
|
||||
This file is a placeholder so that this directory exists when doctests are
|
||||
executed, and is not necessary to keep. It is safe to delete this directory.
|
|
@ -0,0 +1,47 @@
|
|||
|
||||
-----BEGIN PGP PUBLIC KEY BLOCK-----
|
||||
|
||||
mQINBFGdoeIBEADD7XN3kD/TeMbGdUhOvmBRlp2nDuKx6IKm6tLNHw9PA1ShSwtS
|
||||
v9ijldhQwnggyiZZ8P3c6SJRPWrn45YyKUnMhtmRNeEhNx9eQDxCM3Ysu3PUUfVl
|
||||
7BiGF9OEdVTNu2/rfBzQ3krM+9oCpDBICRFfE5EuBkFAGa8GjTcsJJxWzJqcJqAP
|
||||
/6t6ioyD1DNzaf3V+m5Q5NaDzdbZj9Jw4Sf5pngaLs6Mbhei/GsP0Eoj+XdcSxfN
|
||||
HNJ06ZTmAY8XSn0il794aCSyXvVPaJPDGHfGwTgEXP45utqYZNIWYZvm2gpf1Yc3
|
||||
zIzopwVp1sLN/3ZXMUCvHg41Js+urzWBRbMu+Ypm7pldkhKPX6RIy5YMfr2zOLvt
|
||||
+XulIBTZ7Omfai/wARj3JAwkMR4ssbCKIha56k4RGVDUacS0Xx7h2MmSCDE/9xH0
|
||||
+lka1PN6+lJuU/Iht39vUcthSaKPyrJvcqElgEsSKg2x0rDXS/WoiFilNakBdBPd
|
||||
GWmLW89v/kNSHRJNjqwzrQBbHd3lhJUZ0nMuSud85we8SR3ZX/fIvYIBx6RcMwRp
|
||||
HCajfjsvHy3bAI0oQnp8DOXGCEDy+FWrUankrtHiOThYMcSHWlVkpXB9kEmxs+ls
|
||||
xMRzY5bWbNglu2mAGMZ4KqOEnL9VembHO9ryoASZGNFW+huq7wVqY/IA9QARAQAB
|
||||
tBVLYXQgSGFubmFoIDxrYXRAcGljcz6JAj4EEwECACgFAlGdoeICGy8FCQHg7Z4G
|
||||
CwkIBwMCBhUIAgkKCwQWAgMBAh4BAheAAAoJECkjT3+TjVfrhmQP+wRrVAWlPzQb
|
||||
pfrHr5jMYXA9AYKXz/ea6n0eTpxQ6zelxgX67abSUGyDJDakffjvB/W8fEgYPmvq
|
||||
vKm2jLDIwJeQElpIyxwTQNaiX79V5GwC9yN19oCN6S/NG9fEuDoYrWnU/WXn/8UV
|
||||
avPVZ+h/1Lq3gpAzP1NmmrAkcSqsviKk8b9B4t/U+YpptgfyM9zOiq4YzupvmKgs
|
||||
tX8u1o5gy8qsjZK/P64xyqRF2tfviU3U1vrnwPjGI6WrHUE/uII6JTQ2cmr4MNjv
|
||||
VrGRJ+qWtZcPx+36BqEtWhP+wYSkqHJBLpfdhJtJgkBI6i1iw3o66l/BgI82CMVG
|
||||
6SEsDUqIDv2KdEpnGarFoGPgz9FkOaGaGbOH1clmrhv5/jw+GQUx2FVQqFvlxNA9
|
||||
nud0Afh6wNj0gFly4k3yakzoyxBOMqEQoqONyYJEk6WjGFkFq+QMAJe7r55v0U53
|
||||
TYhtKXsHUpI5t3/4vCKvUWOczD1q2oV4HMtyLgQePURnuw2LbHEcykntkLJPq1wE
|
||||
GHTnNUVHSir4veDAnFAtSGwZ0ysQq/YDCZJYIueO8lvOY5zhbasrO7n12nMKXLKr
|
||||
or5zA2Jvp6H73BYS2hrsZRA8+AO+WpXEApPoOT3ZT05nbv7FDy0+VtHelrYhWcfc
|
||||
T34JUVHGhxx/eSvEQpLpKSNBShAXG++TuI0EUZ2h4gEEANo87LWMjNAPN7eVVxKV
|
||||
GVWCqPpkEklDxebX5OgJVXoORzmUhMCSmgpm2T9PQNOwQsI0IcZFqxnYFhdn5dQi
|
||||
icgTbW7bVhydqYaOqnMJkbh/thXL1tJuQvVtCRwAbm+BjySyPfvcIy0IZQspToT3
|
||||
LNGO5lrJv3UBlW+czXJbq4rfABEBAAGJAsMEGAECAA8FAlGdoeICGy4FCQHg7Z4A
|
||||
qAkQKSNPf5ONV+udIAQZAQIABgUCUZ2h4gAKCRDxfv/65z8woNnlBAC+RXG2VPv0
|
||||
2NwRI0f6h0fcogJQN2uJf2zbK7MoUw7KlYM8cKjHM5lVyaXtr9caLa1V+Um7d0el
|
||||
ZnifGWzrDjpu6SaRjc2RSj6wb7VKkDD3Mnm121WZWyIQEy9H9cQyBZkvfwRFgFvd
|
||||
o7OhDviGrhHrzA9TyMSUfFHplaMiXP5gj6DMD/9ocRYM05vX7siRJ9mztahfQ2Dt
|
||||
5VmLXhsNq6Ptmeuvive65IJfxr9B9KpYXgwUFqRSmi42zrKckTz7RZpifx9d1Znq
|
||||
BXUyod+t4QW4Jjf/gmywSamszSQ2SAv1SRPzgIvFon/pDfVz1tTFujVrtGnz6Gqt
|
||||
FChyf/9H5Hd3reDdLIF5Mj+qHoP5Tx8ksNDPBFGQSyEZMUdbDxdWkSSmFwi3CHrG
|
||||
/xNVbh7fqlP8PTGueqgFdqYfkwM2RDYZPJOIBtCfnDviDO8z3YwNZNMH3Yw6knRG
|
||||
VtG+sIoAxzRl0+15y3ZfJAg8Mv01RnH1CXwNhYwU5Ova+1CsQR/i82XP3f1iruZX
|
||||
jjTGYWk7HV6Fg7cgsKFD1zapBJPvb/RS0lVjRjY4htmoPC5Sdol64hQsz7kBZfiH
|
||||
MQ5fui69GSAYm+r6Zuvwljcem1e8x+qTlsxeVAV5xYuWAbmcRKRG5CuZvx0/I62I
|
||||
3aKFlv53gc24GXAoNoRvMuktxiMezk5E6NaWzpE2Z8vw0zH1IaSIrDWduslCKlyO
|
||||
CkMUyrDezJOEBFAQiqEWztKO7kcfd7PLnD2zOFoJuMQP/GRLqhecAqZLK+kqwnwZ
|
||||
d7hb2zvx0ZSrKjx1bdIUae3T/+zUy7WYv9Btn1aERe53yXABwmfkqkQ35HfeKKRi
|
||||
04PY9ENrTNnjCWTKcw==
|
||||
=hLUv
|
||||
-----END PGP PUBLIC KEY BLOCK-----
|
|
@ -1,16 +1,37 @@
|
|||
#!/usr/bin/env python
|
||||
# -*- coding: utf-8 -*-
|
||||
"""
|
||||
A test harness for gnupg.py.
|
||||
|
||||
Copyright © 2013 Isis Lovecruft.
|
||||
Copyright © 2008-2013 Vinay Sajip. All rights reserved.
|
||||
#
|
||||
# This file is part of python-gnupg, a Python interface to GnuPG.
|
||||
# Copyright © 2013 Isis Lovecruft
|
||||
# © 2008-2012 Vinay Sajip
|
||||
# © 2005 Steve Traugott
|
||||
# © 2004 A.M. Kuchling
|
||||
#
|
||||
# This program is free software: you can redistribute it and/or modify
|
||||
# it under the terms of the GNU Affero General Public License as published
|
||||
# by the Free Software Foundation, either version 3 of the License, or
|
||||
# (at your option) any later version.
|
||||
#
|
||||
# This program is distributed in the hope that it will be useful,
|
||||
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||
# GNU Affero General Public License for more details.
|
||||
"""test_gnupg.py
|
||||
----------------
|
||||
A test harness and unittests for gnupg.py.
|
||||
"""
|
||||
|
||||
from functools import wraps
|
||||
from __future__ import absolute_import
|
||||
from __future__ import print_function
|
||||
from __future__ import with_statement
|
||||
from argparse import ArgumentParser
|
||||
from codecs import open as open
|
||||
from functools import wraps
|
||||
from inspect import getabsfile
|
||||
from inspect import currentframe
|
||||
from time import gmtime
|
||||
from time import mktime
|
||||
|
||||
import argparse
|
||||
import codecs
|
||||
import encodings
|
||||
import doctest
|
||||
import io
|
||||
|
@ -19,8 +40,11 @@ import os
|
|||
import shutil
|
||||
import sys
|
||||
import tempfile
|
||||
import time
|
||||
|
||||
## This is less applicable now that we're using distribute with a bootstrap
|
||||
## script for newer versions of distribute, and pip>=1.3.1, since both of
|
||||
## these dependencies require Python>=2.6 in order to have proper SSL support.
|
||||
##
|
||||
## Use unittest2 if we're on Python2.6 or less:
|
||||
if sys.version_info.major == 2 and sys.version_info.minor <= 6:
|
||||
unittest = __import__(unittest2)
|
||||
|
@ -28,22 +52,35 @@ else:
|
|||
import unittest
|
||||
|
||||
import gnupg
|
||||
from gnupg import _parsers
|
||||
from gnupg import _util
|
||||
from gnupg import _logger
|
||||
|
||||
## see PEP-366 http://www.python.org/dev/peps/pep-0366/
|
||||
print("NAME: %r" % __name__)
|
||||
print("PACKAGE: %r" % __package__)
|
||||
if __name__ == "__main__" and __package__ is None:
|
||||
__package__ = "gnupg.test"
|
||||
print("NAME: %r" % __name__)
|
||||
print("PACKAGE: %r" % __package__)
|
||||
try:
|
||||
from .. import _util
|
||||
from .. import _parsers
|
||||
from .. import _logger
|
||||
except (ImportError, ValueError) as ierr:
|
||||
print(ierr.message)
|
||||
|
||||
|
||||
log = _util.log
|
||||
log.setLevel(9)
|
||||
|
||||
_here = os.path.join(os.getcwd(), 'tests')
|
||||
_files = os.path.join(_here, 'files')
|
||||
_tempd = os.path.join(_here, 'tmp')
|
||||
print("Current source directory: %s" % _util._here)
|
||||
print("Current os.cwd directory: %s" % os.getcwd())
|
||||
_tests = os.path.join(_util._here, 'test')
|
||||
_files = os.path.join(_tests, 'files')
|
||||
_tempd = os.path.join(_tests, 'tmp')
|
||||
|
||||
tempfile.tempdir = _tempd
|
||||
if not os.path.isdir(tempfile.gettempdir()):
|
||||
log.debug("Creating temporary testing directory: %s"
|
||||
% tempfile.gettempdir())
|
||||
% tempfile.gettempdir())
|
||||
os.makedirs(tempfile.gettempdir())
|
||||
|
||||
@wraps(tempfile.TemporaryFile)
|
||||
|
@ -138,7 +175,7 @@ class GPGTestCase(unittest.TestCase):
|
|||
|
||||
def setUp(self):
|
||||
"""This method is called once per self.test_* method."""
|
||||
print "%s%s%s" % (os.linesep, str("=" * 70), os.linesep)
|
||||
print("%s%s%s" % (os.linesep, str("=" * 70), os.linesep))
|
||||
hd = tempfile.mkdtemp()
|
||||
if os.path.exists(hd):
|
||||
if not RETAIN_TEST_DIRS:
|
||||
|
@ -154,6 +191,7 @@ class GPGTestCase(unittest.TestCase):
|
|||
self.keyring = self.gpg.keyring
|
||||
self.secring = self.gpg.secring
|
||||
self.insecure_prng = False
|
||||
self.gpg._keys_dir = os.path.join(_files, 'generated-keys')
|
||||
|
||||
def tearDown(self):
|
||||
"""This is called once per self.test_* method after the test run."""
|
||||
|
@ -165,18 +203,22 @@ class GPGTestCase(unittest.TestCase):
|
|||
else:
|
||||
log.warn("Can't delete homedir: '%s' not a directory"
|
||||
% self.homedir)
|
||||
log.warn("%s%s%s" % (os.linesep, str("=" * 70), os.linesep))
|
||||
|
||||
def test_parsers_fix_unsafe(self):
|
||||
"""Test that unsafe inputs are quoted out and then ignored."""
|
||||
shell_input = "\"&coproc /bin/sh\""
|
||||
fixed = _parsers._fix_unsafe(shell_input)
|
||||
print fixed
|
||||
print(fixed)
|
||||
test_file = os.path.join(_files, 'cypherpunk_manifesto')
|
||||
self.assertTrue(os.path.isfile(test_file))
|
||||
has_shell = self.gpg.verify_file(test_file, fixed)
|
||||
self.assertFalse(has_shell.valid)
|
||||
|
||||
def test_parsers_fix_unsafe_semicolon(self):
|
||||
"""Test that we can't escape into the Python interpreter."""
|
||||
shell_input = "; import antigravity ;"
|
||||
fixed = _parsers._fix_unsafe(shell_input)
|
||||
|
||||
def test_parsers_is_hex_valid(self):
|
||||
"""Test that valid hexidecimal passes the parsers._is_hex() check"""
|
||||
valid_hex = '0A6A58A14B5946ABDE18E207A3ADB67A2CDB8B35'
|
||||
|
@ -198,7 +240,7 @@ class GPGTestCase(unittest.TestCase):
|
|||
with self.assertRaises(LookupError):
|
||||
_util.find_encodings(enc)
|
||||
|
||||
def test_encodings_iso_8859_1(self):
|
||||
def test_encodings_big5(self):
|
||||
"""Test that _util.find_encodings works for Chinese Traditional."""
|
||||
enc = 'big5'
|
||||
coder = _util.find_encodings(enc)
|
||||
|
@ -261,7 +303,7 @@ class GPGTestCase(unittest.TestCase):
|
|||
|
||||
def test_gpg_binary_not_abs(self):
|
||||
"""Test that a non-absolute path to gpg results in a full path."""
|
||||
print self.gpg.binary
|
||||
print(self.gpg.binary)
|
||||
self.assertTrue(os.path.isabs(self.gpg.binary))
|
||||
|
||||
def test_make_args_drop_protected_options(self):
|
||||
|
@ -340,8 +382,8 @@ class GPGTestCase(unittest.TestCase):
|
|||
"""Generate a basic key."""
|
||||
key_input = self.generate_key_input(real_name, email_domain, **kwargs)
|
||||
key = self.gpg.gen_key(key_input)
|
||||
print "\nKEY TYPE: ", key.type
|
||||
print "KEY FINGERPRINT: ", key.fingerprint
|
||||
print("\nKEY TYPE: ", key.type)
|
||||
print("KEY FINGERPRINT: ", key.fingerprint)
|
||||
return key
|
||||
|
||||
def test_gen_key_input(self):
|
||||
|
@ -478,6 +520,20 @@ class GPGTestCase(unittest.TestCase):
|
|||
keys = self.gpg.list_keys(secret=True)
|
||||
self.assertTrue(os.path.isfile(self.gpg.secring))
|
||||
|
||||
def test_recv_keys_default(self):
|
||||
"""Testing receiving keys from a keyserver."""
|
||||
fpr = '0A6A58A14B5946ABDE18E207A3ADB67A2CDB8B35'
|
||||
key = self.gpg.recv_keys(fpr)
|
||||
self.assertIsNotNone(key)
|
||||
self.assertNotEquals(key, "")
|
||||
self.assertGreater(len(str(key)), 0)
|
||||
keyfile = os.path.join(self.gpg._keys_dir, 'test_key_3.pub')
|
||||
log.debug("Storing downloaded key as %s" % keyfile)
|
||||
with open(keyfile, 'w') as fh:
|
||||
fh.write(str(key))
|
||||
self.assertTrue(os.path.isfile(keyfile))
|
||||
self.assertGreater(os.stat(keyfile).st_size, 0)
|
||||
|
||||
def test_import_and_export(self):
|
||||
"""Test that key import and export works."""
|
||||
self.test_list_keys_initial_public()
|
||||
|
@ -526,40 +582,47 @@ class GPGTestCase(unittest.TestCase):
|
|||
log.info("now: %r", ascii)
|
||||
self.assertEqual(0, match, "Keys must match")
|
||||
|
||||
def test_signature_string(self):
|
||||
def test_signature_string_algorithm_encoding(self):
|
||||
"""Test that signing a message string works."""
|
||||
key = self.generate_key("Werner Koch", "gnupg.org")
|
||||
message = "Damn, I really wish GnuPG had ECC support."
|
||||
sig = self.gpg.sign(message, default_key=key.fingerprint,
|
||||
passphrase='wernerkoch')
|
||||
print "SIGNATURE:\n", sig.data
|
||||
print("SIGNATURE:\n", sig.data)
|
||||
self.assertIsNotNone(sig.data)
|
||||
|
||||
def test_signature_algorithm(self):
|
||||
"""Test that determining the signing algorithm works."""
|
||||
key = self.generate_key("Ron Rivest", "rsa.com")
|
||||
message = "Someone should add GCM block cipher mode to PyCrypto."
|
||||
sig = self.gpg.sign(message, default_key=key.fingerprint,
|
||||
passphrase='ronrivest')
|
||||
print "ALGORITHM:\n", sig.sig_algo
|
||||
print("ALGORITHM:\n", sig.sig_algo)
|
||||
self.assertIsNotNone(sig.sig_algo)
|
||||
|
||||
log.info("Testing signature strings with alternate encodings.")
|
||||
self.gpg._encoding = 'latin-1'
|
||||
message = "Mêle-toi de tes oignons"
|
||||
sig = self.gpg.sign(message, default_key=key.fingerprint,
|
||||
passphrase='wernerkoch')
|
||||
self.assertTrue(sig)
|
||||
print("SIGNATURE:\n", sig.data)
|
||||
self.assertIsNotNone(sig.data)
|
||||
print("ALGORITHM:\n", sig.sig_algo)
|
||||
self.assertIsNotNone(sig.sig_algo)
|
||||
|
||||
fpr = str(key.fingerprint)
|
||||
seckey = self.gpg.export_keys(fpr, secret=True, subkeys=True)
|
||||
keyfile = os.path.join(_files, 'test_key_4.sec')
|
||||
log.info("Writing generated key to %s" % keyfile)
|
||||
with open(keyfile, 'w') as fh:
|
||||
fh.write(seckey)
|
||||
self.assertTrue(os.path.isfile(keyfile))
|
||||
|
||||
def test_signature_string_bad_passphrase(self):
|
||||
"""Test that signing and verification works."""
|
||||
key = self.generate_key("Taher ElGamal", "cryto.me")
|
||||
keyfile = os.path.join(_files, 'test_key_1.sec')
|
||||
key = open(keyfile).read()
|
||||
self.gpg.import_keys(key)
|
||||
key = self.gpg.list_keys()[0]
|
||||
fpr = key['fingerprint']
|
||||
message = 'أصحاب المصالح لا يحبون الثوراتز'
|
||||
sig = self.gpg.sign(message, default_key=key.fingerprint,
|
||||
passphrase='foo')
|
||||
sig = self.gpg.sign(message, default_key=fpr, passphrase='foo')
|
||||
self.assertFalse(sig, "Bad passphrase should fail")
|
||||
|
||||
def test_signature_string_alternate_encoding(self):
|
||||
key = self.generate_key("Nos Oignons", "nos-oignons.net")
|
||||
self.gpg.encoding = 'latin-1'
|
||||
message = "Mêle-toi de tes oignons"
|
||||
sig = self.gpg.sign(message, default_key=key.fingerprint,
|
||||
passphrase='nosoignons')
|
||||
self.assertTrue(sig)
|
||||
|
||||
def test_signature_file(self):
|
||||
"""Test that signing a message file works."""
|
||||
key = self.generate_key("Leonard Adleman", "rsa.com")
|
||||
|
@ -576,7 +639,7 @@ class GPGTestCase(unittest.TestCase):
|
|||
message += '[hackers in popular culture] to push for more power'
|
||||
sig = self.gpg.sign(message, default_key=key.fingerprint,
|
||||
passphrase='bruceschneier')
|
||||
now = time.mktime(time.gmtime())
|
||||
now = mktime(gmtime())
|
||||
self.assertTrue(sig, "Good passphrase should succeed")
|
||||
verified = self.gpg.verify(sig.data)
|
||||
self.assertIsNotNone(verified.fingerprint)
|
||||
|
@ -603,7 +666,7 @@ class GPGTestCase(unittest.TestCase):
|
|||
passphrase='johanborst')
|
||||
self.assertTrue(sig, "Good passphrase should succeed")
|
||||
try:
|
||||
file = _util._make_binary_stream(sig.data, self.gpg.encoding)
|
||||
file = _util._make_binary_stream(sig.data, self.gpg._encoding)
|
||||
verified = self.gpg.verify_file(file)
|
||||
except UnicodeDecodeError: #happens in Python 2.6
|
||||
verified = self.gpg.verify_file(io.BytesIO(sig.data))
|
||||
|
@ -638,13 +701,20 @@ class GPGTestCase(unittest.TestCase):
|
|||
def test_signature_verification_detached_binary(self):
|
||||
"""Test that detached signature verification in binary mode fails."""
|
||||
key = self.generate_key("Adi Shamir", "rsa.com")
|
||||
with open(os.path.join(_files, 'cypherpunk_manifesto'), 'rb') as cm:
|
||||
datafile = os.path.join(_files, 'cypherpunk_manifesto')
|
||||
with open(datafile, 'rb') as cm:
|
||||
sig = self.gpg.sign(cm, default_key=key.fingerprint,
|
||||
passphrase='adishamir',
|
||||
detach=True, binary=True, clearsign=False)
|
||||
self.assertTrue(sig.data, "File signing should succeed")
|
||||
with open(datafile+'.sig', 'w') as bs:
|
||||
bs.write(sig.data)
|
||||
bs.flush()
|
||||
with self.assertRaises(UnicodeDecodeError):
|
||||
print "SIG=", sig
|
||||
print("SIG=%s" % sig)
|
||||
with open(datafile+'.sig', 'rb') as fsig:
|
||||
with open(datafile, 'rb') as fdata:
|
||||
self.gpg.verify_file(fdata, fsig)
|
||||
|
||||
def test_deletion(self):
|
||||
"""Test that key deletion works."""
|
||||
|
@ -677,7 +747,7 @@ authentication."""
|
|||
encrypted = str(gpg.encrypt(message, dijk))
|
||||
log.debug("Plaintext: %s" % message)
|
||||
log.debug("Encrypted: %s" % encrypted)
|
||||
self.assertNotEqual(message, encrypted)
|
||||
self.assertNotEquals(message, encrypted)
|
||||
|
||||
def test_encryption_alt_encoding(self):
|
||||
"""Test encryption with latin-1 encoding"""
|
||||
|
@ -686,12 +756,12 @@ authentication."""
|
|||
gentry = str(key.fingerprint)
|
||||
key = self.generate_key("Marten van Dijk", "xorr.ox")
|
||||
dijk = str(key.fingerprint)
|
||||
self.gpg.encoding = 'latin-1'
|
||||
self.gpg._encoding = 'latin-1'
|
||||
if _util._py3k:
|
||||
data = 'Hello, André!'
|
||||
else:
|
||||
data = unicode('Hello, André', self.gpg.encoding)
|
||||
data = data.encode(self.gpg.encoding)
|
||||
data = unicode('Hello, André', self.gpg._encoding)
|
||||
data = data.encode(self.gpg._encoding)
|
||||
encrypted = self.gpg.encrypt(data, gentry)
|
||||
edata = str(encrypted.data)
|
||||
self.assertNotEqual(data, edata)
|
||||
|
@ -699,7 +769,7 @@ authentication."""
|
|||
|
||||
def test_encryption_multi_recipient(self):
|
||||
"""Test encrypting a message for multiple recipients"""
|
||||
self.gpg.homedir = _here
|
||||
self.gpg.homedir = _util._here
|
||||
|
||||
ian = { 'name_real': 'Ian Goldberg',
|
||||
'name_email': 'gold@stein',
|
||||
|
@ -727,14 +797,17 @@ authentication."""
|
|||
'passphrase': 'overalls' }
|
||||
|
||||
ian_input = self.gpg.gen_key_input(separate_keyring=True, **ian)
|
||||
log.info("Key stored in separate keyring: %s" % self.gpg.temp_keyring)
|
||||
ian_key = self.gpg.gen_key(ian_input)
|
||||
log.debug("ian_key status: %s" % ian_key.status)
|
||||
ian_fpr = str(ian_key.fingerprint)
|
||||
self.gpg.options = ['--keyring {}'.format(ian_key.keyring)]
|
||||
|
||||
kat_input = self.gpg.gen_key_input(separate_keyring=True, **kat)
|
||||
log.info("Key stored in separate keyring: %s" % self.gpg.temp_keyring)
|
||||
kat_key = self.gpg.gen_key(kat_input)
|
||||
log.debug("kat_key status: %s" % kat_key.status)
|
||||
kat_fpr = str(kat_key.fingerprint)
|
||||
self.gpg.options.append('--keyring {}'.format(kat_key.keyring))
|
||||
self.gpg.import_keys(kat_key.data)
|
||||
|
||||
message = """
|
||||
In 2010 Riggio and Sicari presented a practical application of homomorphic
|
||||
|
@ -747,11 +820,13 @@ authentication."""
|
|||
log.debug("kat_fpr type: %s" % type(kat_fpr))
|
||||
log.debug("ian_fpr type: %s" % type(ian_fpr))
|
||||
|
||||
encrypted = self.gpg.encrypt(message, (ian_fpr, kat_fpr))
|
||||
encrypted = str(self.gpg.encrypt(message, ian_fpr, kat_fpr))
|
||||
log.debug("Plaintext: %s" % message)
|
||||
log.debug("Ciphertext: %s" % str(encrypted.data))
|
||||
log.debug("Ciphertext: %s" % encrypted)
|
||||
|
||||
self.assertNotEqual(message, str(encrypted.data))
|
||||
self.assertNotEquals(message, encrypted)
|
||||
self.assertIsNotNone(encrypted)
|
||||
self.assertGreater(len(encrypted), 0)
|
||||
|
||||
def test_decryption(self):
|
||||
"""Test decryption"""
|
||||
|
@ -830,21 +905,31 @@ authentication."""
|
|||
log.debug("encryption_decryption_multi_recipient() Ciphertext = %s"
|
||||
% encrypted)
|
||||
|
||||
self.assertNotEqual(message, encrypted)
|
||||
self.assertNotEquals(message, encrypted)
|
||||
dec_alice = self.gpg.decrypt(encrypted, passphrase="test")
|
||||
self.assertEqual(message, str(dec_alice.data))
|
||||
self.assertEquals(message, str(dec_alice.data))
|
||||
dec_bob = self.gpg.decrypt(encrypted, passphrase="test")
|
||||
self.assertEqual(message, str(dec_bob.data))
|
||||
self.assertEquals(message, str(dec_bob.data))
|
||||
|
||||
def test_symmetric_encryption_and_decryption(self):
|
||||
"""Test symmetric encryption and decryption"""
|
||||
msg = """If you have something that you don't want anyone to know,
|
||||
maybe you shouldn't be doing it in the first place. - Eric Schmidt, CEO
|
||||
of Google"""
|
||||
msg = """If you have something that you don't want anyone to
|
||||
know, maybe you shouldn't be doing it in the first place.
|
||||
-- Eric Schmidt, CEO of Google"""
|
||||
encrypted = str(self.gpg.encrypt(msg, passphrase='quiscustodiet',
|
||||
symmetric=True, encrypt=False))
|
||||
decrypted = self.gpg.decrypt(encrypted, passphrase='quiscustodiet')
|
||||
self.assertEqual(msg, str(decrypted.data))
|
||||
decrypt = self.gpg.decrypt(encrypted, passphrase='quiscustodiet')
|
||||
decrypted = str(decrypt.data)
|
||||
|
||||
log.info("Symmetrically encrypted data:\n%s" % encrypted)
|
||||
log.info("Symmetrically decrypted data:\n%s" % decrypted)
|
||||
|
||||
self.assertIsNotNone(encrypted)
|
||||
self.assertNotEquals(encrypted, "")
|
||||
self.assertNotEquals(encrypted, msg)
|
||||
self.assertIsNotNone(decrypted)
|
||||
self.assertNotEquals(decrypted, "")
|
||||
self.assertEqual(decrypted, msg)
|
||||
|
||||
def test_file_encryption_and_decryption(self):
|
||||
"""Test that encryption/decryption to/from file works."""
|
||||
|
@ -868,7 +953,7 @@ authentication."""
|
|||
fdata = enc2.read()
|
||||
ddata = str(self.gpg.decrypt(fdata, passphrase="overalls"))
|
||||
|
||||
data = data.encode(self.gpg.encoding)
|
||||
data = data.encode(self.gpg._encoding)
|
||||
if ddata != data:
|
||||
log.debug("data was: %r" % data)
|
||||
log.debug("new (from filehandle): %r" % fdata)
|
||||
|
@ -877,14 +962,14 @@ authentication."""
|
|||
|
||||
|
||||
suites = { 'parsers': set(['test_parsers_fix_unsafe',
|
||||
'test_parsers_fix_unsafe_semicolon',
|
||||
'test_parsers_is_hex_valid',
|
||||
'test_parsers_is_hex_lowercase',
|
||||
'test_parsers_is_hex_invalid',
|
||||
'test_copy_data_bytesio',]),
|
||||
'encodings': set(['test_encodings_iso_8859_1',
|
||||
'encodings': set(['test_encodings_big5',
|
||||
'test_encodings_spiteful',
|
||||
'test_encodings_non_specified',
|
||||
]),
|
||||
'test_encodings_non_specified',]),
|
||||
'basic': set(['test_homedir_creation',
|
||||
'test_binary_discovery',
|
||||
'test_gpg_binary',
|
||||
|
@ -911,10 +996,8 @@ suites = { 'parsers': set(['test_parsers_fix_unsafe',
|
|||
'test_signature_verification_detached_binary',
|
||||
'test_signature_file',
|
||||
'test_signature_string_bad_passphrase',
|
||||
'test_signature_string_alternate_encoding',
|
||||
'test_signature_string_verification',
|
||||
'test_signature_algorithm',
|
||||
'test_signature_string']),
|
||||
'test_signature_string_algorithm_encoding']),
|
||||
'crypt': set(['test_encryption',
|
||||
'test_encryption_alt_encoding',
|
||||
'test_encryption_multi_recipient',
|
||||
|
@ -926,8 +1009,9 @@ suites = { 'parsers': set(['test_parsers_fix_unsafe',
|
|||
'keyrings': set(['test_public_keyring',
|
||||
'test_secret_keyring',
|
||||
'test_import_and_export',
|
||||
'test_deletion']),
|
||||
'import': set(['test_import_only']), }
|
||||
'test_deletion',
|
||||
'test_import_only',
|
||||
'test_recv_keys_default',]), }
|
||||
|
||||
def main(args):
|
||||
if not args.quiet:
|
||||
|
@ -981,7 +1065,7 @@ if __name__ == "__main__":
|
|||
suite_names.append(name)
|
||||
setattr(GPGTestCase, name, list(methodset))
|
||||
|
||||
parser = argparse.ArgumentParser(description="Unittests for python-gnupg")
|
||||
parser = ArgumentParser(description="Unittests for python-gnupg")
|
||||
parser.add_argument('--doctest', dest='run_doctest',
|
||||
type=bool, default=False,
|
||||
help='Run example code in docstrings')
|
|
@ -1,2 +1,58 @@
|
|||
Sphinx>=1.1
|
||||
#
|
||||
# python-gnupg/requirements.txt
|
||||
# -----------------------------
|
||||
# Pip requirements.txt file. This file is also parsed for distribute to use in
|
||||
# setup.py.
|
||||
#_____________________________________________________________________________
|
||||
#
|
||||
# This file is part of python-gnupg, a Python interface to GnuPG.
|
||||
# Copyright © 2013 Isis Lovecruft
|
||||
# © 2008-2012 Vinay Sajip
|
||||
# © 2005 Steve Traugott
|
||||
# © 2004 A.M. Kuchling
|
||||
#
|
||||
# This program is free software: you can redistribute it and/or modify
|
||||
# it under the terms of the GNU Affero General Public License as published
|
||||
# by the Free Software Foundation, either version 3 of the License, or
|
||||
# (at your option) any later version.
|
||||
#
|
||||
# This program is distributed in the hope that it will be useful,
|
||||
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||
# GNU Affero General Public License for more details.
|
||||
#______________________________________________________________________________
|
||||
#
|
||||
# Force pip upgrade due to security vulnerabilities.
|
||||
#
|
||||
# This has actually has little to do with installing python-gnupg, since
|
||||
# older versions of pip would install everything just fine. except that, in
|
||||
# my opinion, using GnuPG for privacy is silly when the installation of
|
||||
# python-gnupg with an older version of pip is trivially exploitable through
|
||||
# a MITM attack. see https://github.com/pypa/pip/pull/791
|
||||
#
|
||||
# Also, note that SSL package delivery is *not* entirely fixed yet. See
|
||||
# https://github.com/TheTorProject/ooni-backend/pull/1#discussion_r4084881
|
||||
#
|
||||
#pip>=1.3.1
|
||||
#
|
||||
# NOTE: setuptools is currently (as of 27 May 2013) being merged back into its
|
||||
# parent project, distribute. By using the included distribute_setup.py
|
||||
# script, we make sure that we have a recent version of setuptools/distribute,
|
||||
# which is the *only* Python packaging framework compatible at this point with
|
||||
# both Python>=2.4 and Python3.x.
|
||||
#
|
||||
# A new version of distribute is necessary due to the merging of setuptools
|
||||
# back into its parent project, distribute. Also, the only way to package for
|
||||
# both Python 2 and 3 is to use distribute.
|
||||
#
|
||||
#distribute>=0.6.45
|
||||
#
|
||||
# Sphinx is only necessary for building documentation, so it is added in
|
||||
# setup.py under extras_require['docs'].
|
||||
#
|
||||
# If you want to build the documentation, uncomment this line:
|
||||
#Sphinx>=1.1
|
||||
#
|
||||
# And, this one is actually used in the gnupg module code:
|
||||
#
|
||||
psutil>=0.5.1
|
||||
|
|
|
@ -0,0 +1,558 @@
|
|||
#!/usr/bin/env python
|
||||
"""Bootstrap distribute installation
|
||||
|
||||
If you want to use setuptools in your package's setup.py, just include this
|
||||
file in the same directory with it, and add this to the top of your setup.py::
|
||||
|
||||
from distribute_setup import use_setuptools
|
||||
use_setuptools()
|
||||
|
||||
If you want to require a specific version of setuptools, set a download
|
||||
mirror, or use an alternate download directory, you can do so by supplying
|
||||
the appropriate options to ``use_setuptools()``.
|
||||
|
||||
This file can also be run as a script to install or upgrade setuptools.
|
||||
|
||||
This file was taken from http://nightly.ziade.org/distribute_setup.py
|
||||
on 2013-05-27.
|
||||
"""
|
||||
import os
|
||||
import shutil
|
||||
import sys
|
||||
import time
|
||||
import fnmatch
|
||||
import tempfile
|
||||
import tarfile
|
||||
import optparse
|
||||
|
||||
from distutils import log
|
||||
|
||||
try:
|
||||
from site import USER_SITE
|
||||
except ImportError:
|
||||
USER_SITE = None
|
||||
|
||||
try:
|
||||
import subprocess
|
||||
|
||||
def _python_cmd(*args):
|
||||
args = (sys.executable,) + args
|
||||
return subprocess.call(args) == 0
|
||||
|
||||
except ImportError:
|
||||
# will be used for python 2.3
|
||||
def _python_cmd(*args):
|
||||
args = (sys.executable,) + args
|
||||
# quoting arguments if windows
|
||||
if sys.platform == 'win32':
|
||||
def quote(arg):
|
||||
if ' ' in arg:
|
||||
return '"%s"' % arg
|
||||
return arg
|
||||
args = [quote(arg) for arg in args]
|
||||
return os.spawnl(os.P_WAIT, sys.executable, *args) == 0
|
||||
|
||||
DEFAULT_VERSION = "0.6.44"
|
||||
DEFAULT_URL = "http://pypi.python.org/packages/source/d/distribute/"
|
||||
SETUPTOOLS_FAKED_VERSION = "0.6c11"
|
||||
|
||||
SETUPTOOLS_PKG_INFO = """\
|
||||
Metadata-Version: 1.0
|
||||
Name: setuptools
|
||||
Version: %s
|
||||
Summary: xxxx
|
||||
Home-page: xxx
|
||||
Author: xxx
|
||||
Author-email: xxx
|
||||
License: xxx
|
||||
Description: xxx
|
||||
""" % SETUPTOOLS_FAKED_VERSION
|
||||
|
||||
|
||||
def _install(tarball, install_args=()):
|
||||
# extracting the tarball
|
||||
tmpdir = tempfile.mkdtemp()
|
||||
log.warn('Extracting in %s', tmpdir)
|
||||
old_wd = os.getcwd()
|
||||
try:
|
||||
os.chdir(tmpdir)
|
||||
tar = tarfile.open(tarball)
|
||||
_extractall(tar)
|
||||
tar.close()
|
||||
|
||||
# going in the directory
|
||||
subdir = os.path.join(tmpdir, os.listdir(tmpdir)[0])
|
||||
os.chdir(subdir)
|
||||
log.warn('Now working in %s', subdir)
|
||||
|
||||
# installing
|
||||
log.warn('Installing Distribute')
|
||||
if not _python_cmd('setup.py', 'install', *install_args):
|
||||
log.warn('Something went wrong during the installation.')
|
||||
log.warn('See the error message above.')
|
||||
# exitcode will be 2
|
||||
return 2
|
||||
finally:
|
||||
os.chdir(old_wd)
|
||||
shutil.rmtree(tmpdir)
|
||||
|
||||
|
||||
def _build_egg(egg, tarball, to_dir):
|
||||
# extracting the tarball
|
||||
tmpdir = tempfile.mkdtemp()
|
||||
log.warn('Extracting in %s', tmpdir)
|
||||
old_wd = os.getcwd()
|
||||
try:
|
||||
os.chdir(tmpdir)
|
||||
tar = tarfile.open(tarball)
|
||||
_extractall(tar)
|
||||
tar.close()
|
||||
|
||||
# going in the directory
|
||||
subdir = os.path.join(tmpdir, os.listdir(tmpdir)[0])
|
||||
os.chdir(subdir)
|
||||
log.warn('Now working in %s', subdir)
|
||||
|
||||
# building an egg
|
||||
log.warn('Building a Distribute egg in %s', to_dir)
|
||||
_python_cmd('setup.py', '-q', 'bdist_egg', '--dist-dir', to_dir)
|
||||
|
||||
finally:
|
||||
os.chdir(old_wd)
|
||||
shutil.rmtree(tmpdir)
|
||||
# returning the result
|
||||
log.warn(egg)
|
||||
if not os.path.exists(egg):
|
||||
raise IOError('Could not build the egg.')
|
||||
|
||||
|
||||
def _do_download(version, download_base, to_dir, download_delay):
|
||||
egg = os.path.join(to_dir, 'distribute-%s-py%d.%d.egg'
|
||||
% (version, sys.version_info[0], sys.version_info[1]))
|
||||
if not os.path.exists(egg):
|
||||
tarball = download_setuptools(version, download_base,
|
||||
to_dir, download_delay)
|
||||
_build_egg(egg, tarball, to_dir)
|
||||
sys.path.insert(0, egg)
|
||||
import setuptools
|
||||
setuptools.bootstrap_install_from = egg
|
||||
|
||||
|
||||
def use_setuptools(version=DEFAULT_VERSION, download_base=DEFAULT_URL,
|
||||
to_dir=os.curdir, download_delay=15, no_fake=True):
|
||||
# making sure we use the absolute path
|
||||
to_dir = os.path.abspath(to_dir)
|
||||
was_imported = 'pkg_resources' in sys.modules or \
|
||||
'setuptools' in sys.modules
|
||||
try:
|
||||
try:
|
||||
import pkg_resources
|
||||
|
||||
# Setuptools 0.7b and later is a suitable (and preferable)
|
||||
# substitute for any Distribute version.
|
||||
try:
|
||||
pkg_resources.require("setuptools>=0.7b")
|
||||
return
|
||||
except pkg_resources.DistributionNotFound:
|
||||
pass
|
||||
|
||||
if not hasattr(pkg_resources, '_distribute'):
|
||||
if not no_fake:
|
||||
_fake_setuptools()
|
||||
raise ImportError
|
||||
except ImportError:
|
||||
return _do_download(version, download_base, to_dir, download_delay)
|
||||
try:
|
||||
pkg_resources.require("distribute>=" + version)
|
||||
return
|
||||
except pkg_resources.VersionConflict:
|
||||
e = sys.exc_info()[1]
|
||||
if was_imported:
|
||||
sys.stderr.write(
|
||||
"The required version of distribute (>=%s) is not available,\n"
|
||||
"and can't be installed while this script is running. Please\n"
|
||||
"install a more recent version first, using\n"
|
||||
"'easy_install -U distribute'."
|
||||
"\n\n(Currently using %r)\n" % (version, e.args[0]))
|
||||
sys.exit(2)
|
||||
else:
|
||||
del pkg_resources, sys.modules['pkg_resources'] # reload ok
|
||||
return _do_download(version, download_base, to_dir,
|
||||
download_delay)
|
||||
except pkg_resources.DistributionNotFound:
|
||||
return _do_download(version, download_base, to_dir,
|
||||
download_delay)
|
||||
finally:
|
||||
if not no_fake:
|
||||
_create_fake_setuptools_pkg_info(to_dir)
|
||||
|
||||
|
||||
def download_setuptools(version=DEFAULT_VERSION, download_base=DEFAULT_URL,
|
||||
to_dir=os.curdir, delay=15):
|
||||
"""Download distribute from a specified location and return its filename
|
||||
|
||||
`version` should be a valid distribute version number that is available
|
||||
as an egg for download under the `download_base` URL (which should end
|
||||
with a '/'). `to_dir` is the directory where the egg will be downloaded.
|
||||
`delay` is the number of seconds to pause before an actual download
|
||||
attempt.
|
||||
"""
|
||||
# making sure we use the absolute path
|
||||
to_dir = os.path.abspath(to_dir)
|
||||
try:
|
||||
from urllib.request import urlopen
|
||||
except ImportError:
|
||||
from urllib2 import urlopen
|
||||
tgz_name = "distribute-%s.tar.gz" % version
|
||||
url = download_base + tgz_name
|
||||
saveto = os.path.join(to_dir, tgz_name)
|
||||
src = dst = None
|
||||
if not os.path.exists(saveto): # Avoid repeated downloads
|
||||
try:
|
||||
log.warn("Downloading %s", url)
|
||||
src = urlopen(url)
|
||||
# Read/write all in one block, so we don't create a corrupt file
|
||||
# if the download is interrupted.
|
||||
data = src.read()
|
||||
dst = open(saveto, "wb")
|
||||
dst.write(data)
|
||||
finally:
|
||||
if src:
|
||||
src.close()
|
||||
if dst:
|
||||
dst.close()
|
||||
return os.path.realpath(saveto)
|
||||
|
||||
|
||||
def _no_sandbox(function):
|
||||
def __no_sandbox(*args, **kw):
|
||||
try:
|
||||
from setuptools.sandbox import DirectorySandbox
|
||||
if not hasattr(DirectorySandbox, '_old'):
|
||||
def violation(*args):
|
||||
pass
|
||||
DirectorySandbox._old = DirectorySandbox._violation
|
||||
DirectorySandbox._violation = violation
|
||||
patched = True
|
||||
else:
|
||||
patched = False
|
||||
except ImportError:
|
||||
patched = False
|
||||
|
||||
try:
|
||||
return function(*args, **kw)
|
||||
finally:
|
||||
if patched:
|
||||
DirectorySandbox._violation = DirectorySandbox._old
|
||||
del DirectorySandbox._old
|
||||
|
||||
return __no_sandbox
|
||||
|
||||
|
||||
def _patch_file(path, content):
|
||||
"""Will backup the file then patch it"""
|
||||
f = open(path)
|
||||
existing_content = f.read()
|
||||
f.close()
|
||||
if existing_content == content:
|
||||
# already patched
|
||||
log.warn('Already patched.')
|
||||
return False
|
||||
log.warn('Patching...')
|
||||
_rename_path(path)
|
||||
f = open(path, 'w')
|
||||
try:
|
||||
f.write(content)
|
||||
finally:
|
||||
f.close()
|
||||
return True
|
||||
|
||||
_patch_file = _no_sandbox(_patch_file)
|
||||
|
||||
|
||||
def _same_content(path, content):
|
||||
f = open(path)
|
||||
existing_content = f.read()
|
||||
f.close()
|
||||
return existing_content == content
|
||||
|
||||
|
||||
def _rename_path(path):
|
||||
new_name = path + '.OLD.%s' % time.time()
|
||||
log.warn('Renaming %s to %s', path, new_name)
|
||||
os.rename(path, new_name)
|
||||
return new_name
|
||||
|
||||
|
||||
def _remove_flat_installation(placeholder):
|
||||
if not os.path.isdir(placeholder):
|
||||
log.warn('Unkown installation at %s', placeholder)
|
||||
return False
|
||||
found = False
|
||||
for file in os.listdir(placeholder):
|
||||
if fnmatch.fnmatch(file, 'setuptools*.egg-info'):
|
||||
found = True
|
||||
break
|
||||
if not found:
|
||||
log.warn('Could not locate setuptools*.egg-info')
|
||||
return
|
||||
|
||||
log.warn('Moving elements out of the way...')
|
||||
pkg_info = os.path.join(placeholder, file)
|
||||
if os.path.isdir(pkg_info):
|
||||
patched = _patch_egg_dir(pkg_info)
|
||||
else:
|
||||
patched = _patch_file(pkg_info, SETUPTOOLS_PKG_INFO)
|
||||
|
||||
if not patched:
|
||||
log.warn('%s already patched.', pkg_info)
|
||||
return False
|
||||
# now let's move the files out of the way
|
||||
for element in ('setuptools', 'pkg_resources.py', 'site.py'):
|
||||
element = os.path.join(placeholder, element)
|
||||
if os.path.exists(element):
|
||||
_rename_path(element)
|
||||
else:
|
||||
log.warn('Could not find the %s element of the '
|
||||
'Setuptools distribution', element)
|
||||
return True
|
||||
|
||||
_remove_flat_installation = _no_sandbox(_remove_flat_installation)
|
||||
|
||||
|
||||
def _after_install(dist):
|
||||
log.warn('After install bootstrap.')
|
||||
placeholder = dist.get_command_obj('install').install_purelib
|
||||
_create_fake_setuptools_pkg_info(placeholder)
|
||||
|
||||
|
||||
def _create_fake_setuptools_pkg_info(placeholder):
|
||||
if not placeholder or not os.path.exists(placeholder):
|
||||
log.warn('Could not find the install location')
|
||||
return
|
||||
pyver = '%s.%s' % (sys.version_info[0], sys.version_info[1])
|
||||
setuptools_file = 'setuptools-%s-py%s.egg-info' % \
|
||||
(SETUPTOOLS_FAKED_VERSION, pyver)
|
||||
pkg_info = os.path.join(placeholder, setuptools_file)
|
||||
if os.path.exists(pkg_info):
|
||||
log.warn('%s already exists', pkg_info)
|
||||
return
|
||||
|
||||
log.warn('Creating %s', pkg_info)
|
||||
try:
|
||||
f = open(pkg_info, 'w')
|
||||
except EnvironmentError:
|
||||
log.warn("Don't have permissions to write %s, skipping", pkg_info)
|
||||
return
|
||||
try:
|
||||
f.write(SETUPTOOLS_PKG_INFO)
|
||||
finally:
|
||||
f.close()
|
||||
|
||||
pth_file = os.path.join(placeholder, 'setuptools.pth')
|
||||
log.warn('Creating %s', pth_file)
|
||||
f = open(pth_file, 'w')
|
||||
try:
|
||||
f.write(os.path.join(os.curdir, setuptools_file))
|
||||
finally:
|
||||
f.close()
|
||||
|
||||
_create_fake_setuptools_pkg_info = _no_sandbox(
|
||||
_create_fake_setuptools_pkg_info
|
||||
)
|
||||
|
||||
|
||||
def _patch_egg_dir(path):
|
||||
# let's check if it's already patched
|
||||
pkg_info = os.path.join(path, 'EGG-INFO', 'PKG-INFO')
|
||||
if os.path.exists(pkg_info):
|
||||
if _same_content(pkg_info, SETUPTOOLS_PKG_INFO):
|
||||
log.warn('%s already patched.', pkg_info)
|
||||
return False
|
||||
_rename_path(path)
|
||||
os.mkdir(path)
|
||||
os.mkdir(os.path.join(path, 'EGG-INFO'))
|
||||
pkg_info = os.path.join(path, 'EGG-INFO', 'PKG-INFO')
|
||||
f = open(pkg_info, 'w')
|
||||
try:
|
||||
f.write(SETUPTOOLS_PKG_INFO)
|
||||
finally:
|
||||
f.close()
|
||||
return True
|
||||
|
||||
_patch_egg_dir = _no_sandbox(_patch_egg_dir)
|
||||
|
||||
|
||||
def _before_install():
|
||||
log.warn('Before install bootstrap.')
|
||||
_fake_setuptools()
|
||||
|
||||
|
||||
def _under_prefix(location):
|
||||
if 'install' not in sys.argv:
|
||||
return True
|
||||
args = sys.argv[sys.argv.index('install') + 1:]
|
||||
for index, arg in enumerate(args):
|
||||
for option in ('--root', '--prefix'):
|
||||
if arg.startswith('%s=' % option):
|
||||
top_dir = arg.split('root=')[-1]
|
||||
return location.startswith(top_dir)
|
||||
elif arg == option:
|
||||
if len(args) > index:
|
||||
top_dir = args[index + 1]
|
||||
return location.startswith(top_dir)
|
||||
if arg == '--user' and USER_SITE is not None:
|
||||
return location.startswith(USER_SITE)
|
||||
return True
|
||||
|
||||
|
||||
def _fake_setuptools():
|
||||
log.warn('Scanning installed packages')
|
||||
try:
|
||||
import pkg_resources
|
||||
except ImportError:
|
||||
# we're cool
|
||||
log.warn('Setuptools or Distribute does not seem to be installed.')
|
||||
return
|
||||
ws = pkg_resources.working_set
|
||||
try:
|
||||
setuptools_dist = ws.find(
|
||||
pkg_resources.Requirement.parse('setuptools', replacement=False)
|
||||
)
|
||||
except TypeError:
|
||||
# old distribute API
|
||||
setuptools_dist = ws.find(
|
||||
pkg_resources.Requirement.parse('setuptools')
|
||||
)
|
||||
|
||||
if setuptools_dist is None:
|
||||
log.warn('No setuptools distribution found')
|
||||
return
|
||||
# detecting if it was already faked
|
||||
setuptools_location = setuptools_dist.location
|
||||
log.warn('Setuptools installation detected at %s', setuptools_location)
|
||||
|
||||
# if --root or --preix was provided, and if
|
||||
# setuptools is not located in them, we don't patch it
|
||||
if not _under_prefix(setuptools_location):
|
||||
log.warn('Not patching, --root or --prefix is installing Distribute'
|
||||
' in another location')
|
||||
return
|
||||
|
||||
# let's see if its an egg
|
||||
if not setuptools_location.endswith('.egg'):
|
||||
log.warn('Non-egg installation')
|
||||
res = _remove_flat_installation(setuptools_location)
|
||||
if not res:
|
||||
return
|
||||
else:
|
||||
log.warn('Egg installation')
|
||||
pkg_info = os.path.join(setuptools_location, 'EGG-INFO', 'PKG-INFO')
|
||||
if (os.path.exists(pkg_info) and
|
||||
_same_content(pkg_info, SETUPTOOLS_PKG_INFO)):
|
||||
log.warn('Already patched.')
|
||||
return
|
||||
log.warn('Patching...')
|
||||
# let's create a fake egg replacing setuptools one
|
||||
res = _patch_egg_dir(setuptools_location)
|
||||
if not res:
|
||||
return
|
||||
log.warn('Patching complete.')
|
||||
_relaunch()
|
||||
|
||||
|
||||
def _relaunch():
|
||||
log.warn('Relaunching...')
|
||||
# we have to relaunch the process
|
||||
# pip marker to avoid a relaunch bug
|
||||
_cmd1 = ['-c', 'install', '--single-version-externally-managed']
|
||||
_cmd2 = ['-c', 'install', '--record']
|
||||
if sys.argv[:3] == _cmd1 or sys.argv[:3] == _cmd2:
|
||||
sys.argv[0] = 'setup.py'
|
||||
args = [sys.executable] + sys.argv
|
||||
sys.exit(subprocess.call(args))
|
||||
|
||||
|
||||
def _extractall(self, path=".", members=None):
|
||||
"""Extract all members from the archive to the current working
|
||||
directory and set owner, modification time and permissions on
|
||||
directories afterwards. `path' specifies a different directory
|
||||
to extract to. `members' is optional and must be a subset of the
|
||||
list returned by getmembers().
|
||||
"""
|
||||
import copy
|
||||
import operator
|
||||
from tarfile import ExtractError
|
||||
directories = []
|
||||
|
||||
if members is None:
|
||||
members = self
|
||||
|
||||
for tarinfo in members:
|
||||
if tarinfo.isdir():
|
||||
# Extract directories with a safe mode.
|
||||
directories.append(tarinfo)
|
||||
tarinfo = copy.copy(tarinfo)
|
||||
tarinfo.mode = 448 # decimal for oct 0700
|
||||
self.extract(tarinfo, path)
|
||||
|
||||
# Reverse sort directories.
|
||||
if sys.version_info < (2, 4):
|
||||
def sorter(dir1, dir2):
|
||||
return cmp(dir1.name, dir2.name)
|
||||
directories.sort(sorter)
|
||||
directories.reverse()
|
||||
else:
|
||||
directories.sort(key=operator.attrgetter('name'), reverse=True)
|
||||
|
||||
# Set correct owner, mtime and filemode on directories.
|
||||
for tarinfo in directories:
|
||||
dirpath = os.path.join(path, tarinfo.name)
|
||||
try:
|
||||
self.chown(tarinfo, dirpath)
|
||||
self.utime(tarinfo, dirpath)
|
||||
self.chmod(tarinfo, dirpath)
|
||||
except ExtractError:
|
||||
e = sys.exc_info()[1]
|
||||
if self.errorlevel > 1:
|
||||
raise
|
||||
else:
|
||||
self._dbg(1, "tarfile: %s" % e)
|
||||
|
||||
|
||||
def _build_install_args(options):
|
||||
"""
|
||||
Build the arguments to 'python setup.py install' on the distribute package
|
||||
"""
|
||||
install_args = []
|
||||
if options.user_install:
|
||||
if sys.version_info < (2, 6):
|
||||
log.warn("--user requires Python 2.6 or later")
|
||||
raise SystemExit(1)
|
||||
install_args.append('--user')
|
||||
return install_args
|
||||
|
||||
def _parse_args():
|
||||
"""
|
||||
Parse the command line for options
|
||||
"""
|
||||
parser = optparse.OptionParser()
|
||||
parser.add_option(
|
||||
'--user', dest='user_install', action='store_true', default=False,
|
||||
help='install in user site package (requires Python 2.6 or later)')
|
||||
parser.add_option(
|
||||
'--download-base', dest='download_base', metavar="URL",
|
||||
default=DEFAULT_URL,
|
||||
help='alternative URL from where to download the distribute package')
|
||||
options, args = parser.parse_args()
|
||||
# positional arguments are ignored
|
||||
return options
|
||||
|
||||
def main(version=DEFAULT_VERSION):
|
||||
"""Install or upgrade setuptools and EasyInstall"""
|
||||
options = _parse_args()
|
||||
tarball = download_setuptools(download_base=options.download_base)
|
||||
return _install(tarball, _build_install_args(options))
|
||||
|
||||
if __name__ == '__main__':
|
||||
sys.exit(main())
|
File diff suppressed because it is too large
Load Diff
|
@ -0,0 +1,54 @@
|
|||
#!/bin/bash
|
||||
# -*- coding: utf-8 -*-
|
||||
#
|
||||
# This file is part of python-gnupg, a Python wrapper around GnuPG.
|
||||
# Copyright © 2013 Isis Lovecruft, Andrej B.
|
||||
# © 2008-2012 Vinay Sajip
|
||||
# © 2005 Steve Traugott
|
||||
# © 2004 A.M. Kuchling
|
||||
#
|
||||
# This program is free software: you can redistribute it and/or modify
|
||||
# it under the terms of the GNU Affero General Public License as published
|
||||
# by the Free Software Foundation, either version 3 of the License, or
|
||||
# (at your option) any later version.
|
||||
#
|
||||
# This program is distributed in the hope that it will be useful,
|
||||
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||
# GNU Affero General Public License for more details.
|
||||
|
||||
project=python-gnupg
|
||||
VENV=$(which virtualenv)
|
||||
WRPR=$(which virtualenvwrapper.sh)
|
||||
|
||||
|
||||
if ! test -n "$VENV" ; then
|
||||
printf "Couldn't find virtualenv. Are you sure it's installed?"
|
||||
exit 1
|
||||
fi
|
||||
|
||||
if ! test -n "$WRPR"; then
|
||||
printf "Couldn't find virtualenvwrapper. Are you sure it's installed?"
|
||||
exit 1
|
||||
fi
|
||||
|
||||
test -r "$WRPR" && . $WRPR
|
||||
okay=$?
|
||||
|
||||
if test "$okay" -eq 0 ; then
|
||||
printf "Using %s as WORKON_HOME for the new virtualenv...\n" $PWD
|
||||
printf "What should the name of the new virtualenv be? (default: '%s')\n" $project
|
||||
read -p"Name for this virtualenv?: " name
|
||||
if test -z "$name"; then
|
||||
name="$project"
|
||||
fi
|
||||
printf "Using '$name' as our project's name..."
|
||||
printf "Creating virtualenv..."
|
||||
mkvirtualenv -a "$PWD" --no-site-packages --unzip-setuptools \
|
||||
--distribute --prompt="(gnupg)" "$name"
|
||||
exit $?
|
||||
else
|
||||
printf "Something went wrong..."
|
||||
printf "Exit code %d from mkvirtualenv." "$okay"
|
||||
exit $okay
|
||||
fi
|
151
setup.py
151
setup.py
|
@ -1,48 +1,127 @@
|
|||
#!/usr/bin/env python
|
||||
#-*- coding: utf-8 -*-
|
||||
#
|
||||
# This file is part of python-gnupg, a Python interface to GnuPG.
|
||||
# Copyright © 2013 Isis Lovecruft
|
||||
# © 2008-2012 Vinay Sajip
|
||||
# © 2005 Steve Traugott
|
||||
# © 2004 A.M. Kuchling
|
||||
#
|
||||
# This program is free software: you can redistribute it and/or modify
|
||||
# it under the terms of the GNU Affero General Public License as published
|
||||
# by the Free Software Foundation, either version 3 of the License, or
|
||||
# (at your option) any later version.
|
||||
#
|
||||
# This program is distributed in the hope that it will be useful,
|
||||
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||
# GNU Affero General Public License for more details.
|
||||
#______________________________________________________________________________
|
||||
#
|
||||
# NOTE: setuptools is currently (as of 27 May 2013) being merged back into its
|
||||
# parent project, distribute. By using the included distribute_setup.py
|
||||
# script, we make sure that we have a recent version of setuptools/distribute,
|
||||
# which is the *only* Python packaging framework compatible at this point with
|
||||
# both Python>=2.4 and Python3.x.
|
||||
#
|
||||
|
||||
from distutils.core import setup
|
||||
from __future__ import absolute_import
|
||||
from __future__ import print_function
|
||||
|
||||
import inspect
|
||||
import os
|
||||
|
||||
## Upgrade setuptools to a version which supports Python 2 and 3
|
||||
#os.system('python ./distribute_setup.py')
|
||||
## Upgrade pip to a version with proper SSL support
|
||||
#os.system('python ./get-pip.py')
|
||||
|
||||
import setuptools
|
||||
import versioneer
|
||||
versioneer.versionfile_source = 'src/_version.py'
|
||||
versioneer.versionfile_build = 'gnupg/_version.py'
|
||||
versioneer.tag_prefix = ''
|
||||
versioneer.parentdir_prefix = 'python-gnupg-'
|
||||
versioneer.parentdir_prefix = 'gnupg-'
|
||||
|
||||
__author__ = "Isis Agora Lovecruft"
|
||||
__contact__ = 'isis@leap.se'
|
||||
__url__ = 'https://github.com/isislovecruft/python-gnupg \
|
||||
https://python-gnupg.readthedocs.org'
|
||||
|
||||
setup(name = "python-gnupg",
|
||||
description="A wrapper for the Gnu Privacy Guard (GPG or GnuPG)",
|
||||
long_description = "This module allows easy access to GnuPG's key \
|
||||
management, encryption and signature functionality from Python programs. \
|
||||
It is intended for use with Python 2.6 or greater.",
|
||||
license="""Copyright © 2013 Isis Lovecruft, et.al. see LICENSE file.""",
|
||||
version=versioneer.get_version(),
|
||||
cmdclass=versioneer.get_cmdclass(),
|
||||
author=__author__,
|
||||
author_email=__contact__,
|
||||
maintainer=__author__,
|
||||
maintainer_email=__contact__,
|
||||
url="https://github.com/isislovecruft/python-gnupg",
|
||||
package_dir={'gnupg': 'src'},
|
||||
packages=['gnupg'],
|
||||
platforms="Linux, BSD, OSX, Windows",
|
||||
download_url="https://github.com/isislovecruft/python-gnupg/archive/develop.zip",
|
||||
classifiers=[
|
||||
'Development Status :: 4 - Alpha',
|
||||
"Intended Audience :: Developers",
|
||||
'Classifier:: License :: OSI Approved :: GNU Affero General Public License v3 or later (AGPLv3+)',
|
||||
"Programming Language :: Python",
|
||||
"Programming Language :: Python :: 2",
|
||||
"Programming Language :: Python :: 3",
|
||||
"Programming Language :: Python :: 2.6",
|
||||
"Programming Language :: Python :: 2.7",
|
||||
"Programming Language :: Python :: 3.0",
|
||||
"Programming Language :: Python :: 3.1",
|
||||
"Programming Language :: Python :: 3.2",
|
||||
"Topic :: Software Development :: Libraries :: Python Modules",
|
||||
'Classifier:: Topic :: Security :: Cryptography',
|
||||
'Classifier:: Topic :: Software Development :: Libraries :: Python Modules',
|
||||
'Classifier:: Topic :: Utilities',]
|
||||
)
|
||||
def get_current_dir():
|
||||
"""Current dir of this file, regardless of where we're called from."""
|
||||
here = inspect.getabsfile(inspect.currentframe()).rsplit(os.path.sep, 1)[0]
|
||||
return here
|
||||
|
||||
def get_deps_reqs():
|
||||
"""Get dependencies from the pip requirements.txt file."""
|
||||
requirements_file = os.path.join(get_current_dir(), 'requirements.txt')
|
||||
dependency_links = []
|
||||
install_requires = []
|
||||
with open(requirements_file) as pipfile:
|
||||
for line in pipfile.readlines():
|
||||
line = line.strip()
|
||||
if not line.startswith('#'):
|
||||
if line.startswith('https'):
|
||||
dependency_links.append(line)
|
||||
continue
|
||||
else:
|
||||
install_requires.append(line)
|
||||
return dependency_links, install_requires
|
||||
deps, reqs = get_deps_reqs()
|
||||
print('%s' % deps)
|
||||
print('%s' % reqs)
|
||||
|
||||
|
||||
def run_distribute_setup_script():
|
||||
"""Run the setuptools/distribute setup script."""
|
||||
script = os.path.join(get_current_dir(), 'distribute_setup.py')
|
||||
os.system(script)
|
||||
|
||||
setuptools.setup(
|
||||
name = "gnupg",
|
||||
description="A Python wrapper for GnuPG",
|
||||
long_description = """\
|
||||
This module allows easy access to GnuPG's key management, encryption and \
|
||||
signature functionality from Python programs, by interacting with GnuPG \
|
||||
through file descriptors. Input arguments are strictly checked and sanitised, \
|
||||
and therefore this module should be safe to use in networked applications \
|
||||
requiring direct user input. It is intended for use with Python 2.6 or \
|
||||
greater.""",
|
||||
license="AGPLv3",
|
||||
|
||||
version=versioneer.get_version(),
|
||||
cmdclass=versioneer.get_cmdclass(),
|
||||
|
||||
author=__author__,
|
||||
author_email=__contact__,
|
||||
maintainer=__author__,
|
||||
maintainer_email=__contact__,
|
||||
url=__url__,
|
||||
|
||||
package_dir={'gnupg': 'gnupg'},
|
||||
packages=['gnupg'],
|
||||
|
||||
install_requires=reqs,
|
||||
dependency_links=deps,
|
||||
extras_require={'docs': ["Sphinx>=1.1", "repoze.sphinx"]},
|
||||
|
||||
platforms="Linux, BSD, OSX, Windows",
|
||||
download_url="https://github.com/isislovecruft/python-gnupg/archive/master.zip",
|
||||
classifiers=[
|
||||
'Development Status :: 4 - Alpha',
|
||||
"Intended Audience :: Developers",
|
||||
'Classifier:: License :: OSI Approved :: GNU Affero General Public License v3 or later (AGPLv3+)',
|
||||
"Programming Language :: Python",
|
||||
"Programming Language :: Python :: 2",
|
||||
"Programming Language :: Python :: 3",
|
||||
"Programming Language :: Python :: 2.6",
|
||||
"Programming Language :: Python :: 2.7",
|
||||
"Programming Language :: Python :: 3.0",
|
||||
"Programming Language :: Python :: 3.1",
|
||||
"Programming Language :: Python :: 3.2",
|
||||
"Topic :: Software Development :: Libraries :: Python Modules",
|
||||
'Classifier:: Topic :: Security :: Cryptography',
|
||||
'Classifier:: Topic :: Software Development :: Libraries :: Python Modules',
|
||||
'Classifier:: Topic :: Utilities',]
|
||||
)
|
||||
|
|
|
@ -1,21 +0,0 @@
|
|||
|
||||
import gnupg
|
||||
import copyleft
|
||||
|
||||
from gnupg import GPG
|
||||
|
||||
from ._version import get_versions
|
||||
__version__ = get_versions()['version']
|
||||
|
||||
gnupg.__version__ = __version__
|
||||
gnupg.__author__ = 'Isis Agora Lovecruft'
|
||||
gnupg.__contact__ = 'isis@leap.se'
|
||||
gnupg.__url__ = 'https://github.com/isislovecruft/python-gnupg'
|
||||
gnupg.__license__ = copyleft.disclaimer
|
||||
|
||||
__all__ = ["GPG"]
|
||||
|
||||
del gnupg
|
||||
del copyleft
|
||||
del get_versions
|
||||
del _version
|
|
@ -1,50 +0,0 @@
|
|||
#-*- encoding: utf-8 -*-
|
||||
'''
|
||||
Copyright information for python-gnupg.
|
||||
'''
|
||||
|
||||
copyright = """\
|
||||
Copyright (C) 2013 Isis Lovecruft.
|
||||
See LICENSE for details."""
|
||||
|
||||
disclaimer = """\
|
||||
This file is part of python-gnupg, a Python wrapper around GnuPG.
|
||||
%s
|
||||
|
||||
This program is free software: you can redistribute it and/or modify
|
||||
it under the terms of the GNU Affero General Public License as
|
||||
published by the Free Software Foundation, either version 3 of the
|
||||
License, or (at your option) any later version.
|
||||
|
||||
This program is distributed in the hope that it will be useful, but
|
||||
WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
||||
Affero General Public License for more details.""" % (copyright,)
|
||||
|
||||
|
||||
txcopyright = """\
|
||||
Where stated, parts of this program were taken from Twisted, which is
|
||||
licensed as follows:
|
||||
|
||||
Twisted, the Framework of Your Internet
|
||||
Copyright (c) 2001-2013 Twisted Matrix Laboratories.
|
||||
See LICENSE for details.
|
||||
|
||||
Permission is hereby granted, free of charge, to any person obtaining
|
||||
a copy of this software and associated documentation files (the
|
||||
"Software"), to deal in the Software without restriction, including
|
||||
without limitation the rights to use, copy, modify, merge, publish,
|
||||
distribute, sublicense, and/or sell copies of the Software, and to
|
||||
permit persons to whom the Software is furnished to do so, subject to
|
||||
the following conditions:
|
||||
|
||||
The above copyright notice and this permission notice shall be
|
||||
included in all copies or substantial portions of the Software.
|
||||
|
||||
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
|
||||
EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
|
||||
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
|
||||
NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE
|
||||
LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION
|
||||
OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION
|
||||
WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE."""
|
Loading…
Reference in New Issue