accplan commited on
Commit
7dca0de
1 Parent(s): 15cb08d
.dockerignore CHANGED
@@ -1,6 +1,8 @@
 
1
  .git
2
- .gitignore
3
  .github
4
- .gitattributes
5
- READMETEMPLATE.md
6
- README.md
 
 
 
1
+ .editorconfig
2
  .git
 
3
  .github
4
+ .idea
5
+ .vscode
6
+ temp
7
+ tmp
8
+ LICENSE
.editorconfig CHANGED
@@ -1,20 +1,12 @@
1
- # This file is globally distributed to all container image projects from
2
- # https://github.com/linuxserver/docker-jenkins-builder/blob/master/.editorconfig
3
-
4
- # top-most EditorConfig file
5
  root = true
6
 
7
- # Unix-style newlines with a newline ending every file
8
  [*]
 
9
  end_of_line = lf
10
  insert_final_newline = true
11
- # trim_trailing_whitespace may cause unintended issues and should not be globally set true
12
- trim_trailing_whitespace = false
13
-
14
- [{Dockerfile*,**.yml}]
15
  indent_style = space
16
  indent_size = 2
 
17
 
18
- [{**.sh,root/etc/s6-overlay/s6-rc.d/**,root/etc/cont-init.d/**,root/etc/services.d/**}]
19
- indent_style = space
20
  indent_size = 4
 
 
 
 
 
1
  root = true
2
 
 
3
  [*]
4
+ charset = utf-8
5
  end_of_line = lf
6
  insert_final_newline = true
 
 
 
 
7
  indent_style = space
8
  indent_size = 2
9
+ trim_trailing_whitespace = true
10
 
11
+ [Dockerfile]
 
12
  indent_size = 4
.github/CODEOWNERS ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ # @link <https://help.github.com/en/articles/about-code-owners>
2
+
3
+ * @tarampampam
.github/dependabot.yml ADDED
@@ -0,0 +1,16 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ # Docs: <https://docs.github.com/en/free-pro-team@latest/github/administering-a-repository/customizing-dependency-updates>
2
+
3
+ version: 2
4
+
5
+ updates:
6
+ - package-ecosystem: github-actions
7
+ directory: /
8
+ schedule: {interval: monthly}
9
+ reviewers: [tarampampam]
10
+ assignees: [tarampampam]
11
+
12
+ - package-ecosystem: docker
13
+ directory: /
14
+ schedule: {interval: monthly}
15
+ reviewers: [tarampampam]
16
+ assignees: [tarampampam]
.github/renovate.json ADDED
@@ -0,0 +1,7 @@
 
 
 
 
 
 
 
 
1
+ {
2
+ "$schema": "https://docs.renovatebot.com/renovate-schema.json",
3
+ "extends": [
4
+ "github>tarampampam/.github//renovate/default",
5
+ ":rebaseStalePrs"
6
+ ]
7
+ }
.github/workflows/documentation.yml ADDED
@@ -0,0 +1,19 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ name: documentation
2
+
3
+ on:
4
+ push:
5
+ branches: [master, main]
6
+ paths: ['README.md']
7
+
8
+ jobs:
9
+ docker-hub-description:
10
+ name: Docker Hub Description
11
+ runs-on: ubuntu-20.04
12
+ steps:
13
+ - uses: actions/checkout@v3
14
+
15
+ - uses: peter-evans/dockerhub-description@v3 # Action page: <https://github.com/peter-evans/dockerhub-description>
16
+ with:
17
+ username: ${{ secrets.DOCKER_LOGIN }}
18
+ password: ${{ secrets.DOCKER_USER_PASSWORD }}
19
+ repository: tarampampam/3proxy
.github/workflows/release.yml ADDED
@@ -0,0 +1,40 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ name: release
2
+
3
+ on:
4
+ release: # Docs: <https://git.io/JeBz1#release-event-release>
5
+ types: [published]
6
+
7
+ jobs:
8
+ docker-image:
9
+ name: Build docker image
10
+ runs-on: ubuntu-20.04
11
+ steps:
12
+ - uses: actions/checkout@v3
13
+
14
+ - {uses: gacts/github-slug@v1, id: slug}
15
+
16
+ - uses: docker/setup-qemu-action@v2
17
+
18
+ - uses: docker/setup-buildx-action@v2
19
+
20
+ - uses: docker/login-action@v2 # Action page: <https://github.com/docker/login-action>
21
+ with:
22
+ username: ${{ secrets.DOCKER_LOGIN }}
23
+ password: ${{ secrets.DOCKER_PASSWORD }}
24
+
25
+ - uses: docker/login-action@v2 # Action page: <https://github.com/docker/login-action>
26
+ with:
27
+ registry: ghcr.io
28
+ username: ${{ github.actor }}
29
+ password: ${{ secrets.GITHUB_TOKEN }}
30
+
31
+ - uses: docker/build-push-action@v4 # Action page: <https://github.com/docker/build-push-action>
32
+ with:
33
+ context: .
34
+ push: true
35
+ platforms: linux/amd64,linux/arm64
36
+ tags: |
37
+ tarampampam/3proxy:${{ steps.slug.outputs.version-semantic }}
38
+ tarampampam/3proxy:latest
39
+ ghcr.io/${{ github.actor }}/3proxy:${{ steps.slug.outputs.version-semantic }}
40
+ ghcr.io/${{ github.actor }}/3proxy:latest
.github/workflows/tests.yml ADDED
@@ -0,0 +1,121 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ name: tests
2
+
3
+ on:
4
+ push:
5
+ branches: [master, main]
6
+ tags-ignore: ['**']
7
+ pull_request: {}
8
+
9
+ concurrency:
10
+ group: ${{ github.ref }}
11
+ cancel-in-progress: true
12
+
13
+ jobs: # Docs: <https://git.io/JvxXE>
14
+ gitleaks:
15
+ name: Gitleaks
16
+ runs-on: ubuntu-20.04
17
+ steps:
18
+ - uses: actions/checkout@v3
19
+ with: {fetch-depth: 0}
20
+
21
+ - uses: gacts/gitleaks@v1
22
+
23
+ build-image:
24
+ name: Build docker image
25
+ runs-on: ubuntu-20.04
26
+ steps:
27
+ - uses: actions/checkout@v3
28
+
29
+ - name: Build docker image
30
+ run: docker build -f ./Dockerfile --tag 3proxy:local .
31
+
32
+ - name: Save docker image
33
+ run: docker save 3proxy:local > ./docker-image.tar
34
+
35
+ - name: Upload artifact
36
+ uses: actions/upload-artifact@v3
37
+ with:
38
+ name: docker-image
39
+ path: ./docker-image.tar
40
+ retention-days: 1
41
+
42
+ try-to-use:
43
+ name: Build and use docker image (auth ${{ matrix.auth }})
44
+ runs-on: ubuntu-20.04
45
+ strategy:
46
+ fail-fast: false
47
+ matrix:
48
+ auth: [yes, no]
49
+ needs: [build-image]
50
+ steps:
51
+ - name: Download built docker image
52
+ uses: actions/download-artifact@v3
53
+ with:
54
+ name: docker-image
55
+ path: .artifact
56
+
57
+ - name: Prepare image to run
58
+ working-directory: .artifact
59
+ run: docker load < docker-image.tar
60
+
61
+ - name: Start server without auth setup
62
+ if: matrix.auth != 'yes'
63
+ run: docker run --rm -d -p "3128:3128/tcp" -p "1080:1080/tcp" 3proxy:local
64
+
65
+ - name: Start server with auth setup
66
+ if: matrix.auth == 'yes'
67
+ run: docker run --rm -d -p "3128:3128/tcp" -p "1080:1080/tcp" -e "PROXY_LOGIN=evil" -e "PROXY_PASSWORD=live" -e 'EXTRA_ACCOUNTS={"foo":"bar"}' 3proxy:local
68
+
69
+ - name: Pause
70
+ run: sleep 3
71
+
72
+ - name: Try to use HTTP proxy
73
+ if: matrix.auth != 'yes'
74
+ run: |
75
+ curl -v --fail \
76
+ --proxy http://127.0.0.1:3128 \
77
+ --connect-timeout 3 \
78
+ --max-time 3 \
79
+ https://www.cloudflare.com/robots.txt
80
+
81
+ - name: Try to use SOCKS proxy
82
+ if: matrix.auth != 'yes'
83
+ run: |
84
+ curl -v --fail \
85
+ --proxy socks5://127.0.0.1:1080 \
86
+ --connect-timeout 3 \
87
+ --max-time 3 \
88
+ https://www.cloudflare.com/robots.txt
89
+
90
+ - name: Try to use HTTP proxy (with auth)
91
+ if: matrix.auth == 'yes'
92
+ run: |
93
+ curl -v --fail \
94
+ --proxy http://127.0.0.1:3128 \
95
+ --proxy-user evil:live \
96
+ --connect-timeout 3 \
97
+ --max-time 3 \
98
+ https://www.cloudflare.com/robots.txt
99
+
100
+ - name: Try to use HTTP proxy (with auth, extra user)
101
+ if: matrix.auth == 'yes'
102
+ run: |
103
+ curl -v --fail \
104
+ --proxy http://127.0.0.1:3128 \
105
+ --proxy-user foo:bar \
106
+ --connect-timeout 3 \
107
+ --max-time 3 \
108
+ https://www.cloudflare.com/robots.txt
109
+
110
+ - name: Try to use SOCKS proxy (with auth)
111
+ if: matrix.auth == 'yes'
112
+ run: |
113
+ curl -v --fail \
114
+ --proxy socks5://127.0.0.1:1080 \
115
+ --proxy-user evil:live \
116
+ --connect-timeout 3 \
117
+ --max-time 3 \
118
+ https://www.cloudflare.com/robots.txt
119
+
120
+ - name: Stop container
121
+ run: docker stop $(docker ps -a --filter ancestor=3proxy:local -q)
.gitignore CHANGED
@@ -1,44 +1,3 @@
1
- # Windows image file caches
2
- Thumbs.db
3
- ehthumbs.db
4
-
5
- # Folder config file
6
- Desktop.ini
7
-
8
- # Recycle Bin used on file shares
9
- $RECYCLE.BIN/
10
-
11
- # Windows Installer files
12
- *.cab
13
- *.msi
14
- *.msm
15
- *.msp
16
-
17
- # Windows shortcuts
18
- *.lnk
19
-
20
- # =========================
21
- # Operating System Files
22
- # =========================
23
-
24
- # OSX
25
- # =========================
26
-
27
- .DS_Store
28
- .AppleDouble
29
- .LSOverride
30
-
31
- # Thumbnails
32
- ._*
33
-
34
- # Files that might appear on external disk
35
- .Spotlight-V100
36
- .Trashes
37
-
38
- # Directories potentially created on remote AFP share
39
- .AppleDB
40
- .AppleDesktop
41
- Network Trash Folder
42
- Temporary Items
43
- .apdisk
44
- .jenkins-external
 
1
+ ## IDEs
2
+ /.vscode
3
+ /.idea
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
3proxy.cfg.json ADDED
@@ -0,0 +1,23 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ {
2
+ "log": {
3
+ "output": "/dev/stdout"
4
+ },
5
+ "name_servers": [
6
+ "${PRIMARY_RESOLVER:-1.0.0.1}",
7
+ "${SECONDARY_RESOLVER:-8.8.4.4}",
8
+ "1.1.1.1",
9
+ "9.9.9.9",
10
+ "8.8.8.8"
11
+ ],
12
+ "name_servers_cache": 65536,
13
+ "max_connections": "${MAX_CONNECTIONS:-1024}",
14
+ "auth": {
15
+ "login": "${PROXY_LOGIN:-}",
16
+ "password": "${PROXY_PASSWORD:-}",
17
+ "extra_accounts": ${EXTRA_ACCOUNTS:-{}}
18
+ },
19
+ "ports": {
20
+ "proxy": "${PROXY_PORT:-7860}",
21
+ "socks": "${SOCKS_PORT:-1080}"
22
+ }
23
+ }
3proxy.cfg.mustach ADDED
@@ -0,0 +1,33 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ #!/bin/3proxy
2
+ config /etc/3proxy/3proxy.cfg
3
+
4
+ # you may use system to execute some external command if proxy starts
5
+ system "echo `which 3proxy`': Starting 3proxy'"
6
+
7
+ # We can configure nservers to avoid unsafe gethostbyname() usage (max 5 servers)
8
+ {{#name_servers}}
9
+ nserver {{ . }}
10
+ {{/name_servers}}
11
+
12
+ # nscache is good to save speed, traffic and bandwidth
13
+ nscache {{ name_servers_cache }}
14
+
15
+ # Here we can change timeout values
16
+ timeouts 1 5 30 60 180 1800 15 60
17
+
18
+ # Logging docs: <https://3proxy.org/doc/howtor.html#LOGFORMAT>
19
+ log {{ log.output }}
20
+ logformat "-\""+_G{""time_unix"":%t, ""proxy"":{""type:"":""%N"", ""port"":%p}, ""error"":{""code"":""%E""}, ""auth"":{""user"":""%U""}, ""client"":{""ip"":""%C"", ""port"":%c}, ""server"":{""ip"":""%R"", ""port"":%r}, ""bytes"":{""sent"":%O, ""received"":%I}, ""request"":{""hostname"":""%n""}, ""message"":""%T""}"
21
+
22
+ maxconn {{ max_connections }}
23
+
24
+ {{^auth.login=}}{{^auth.password=}}
25
+ users {{ auth.login }}:CL:{{ auth.password }}{{#auth.extra_accounts.*}} {{ * }}:CL:{{ . }}{{/auth.extra_accounts.*}}
26
+ auth strong
27
+ allow {{ auth.login }}{{#auth.extra_accounts.*}},{{ * }}{{/auth.extra_accounts.*}}
28
+ {{/auth.password=}}{{/auth.login=}}
29
+
30
+ proxy -a -p{{ ports.proxy }}
31
+ socks -a -p{{ ports.socks }}
32
+
33
+ flush
CHANGELOG.md ADDED
@@ -0,0 +1,111 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ # Changelog
2
+
3
+ All notable changes to this package will be documented in this file.
4
+
5
+ The format is based on [Keep a Changelog][keepachangelog] and this project adheres to [Semantic Versioning][semver].
6
+
7
+ ## v1.8.2
8
+
9
+ ### Removed
10
+
11
+ - `ppc64le` architecture support
12
+
13
+ ## v1.8.1
14
+
15
+ ### Added
16
+
17
+ - Multi-arch image support (plus `arm64` and `ppc64le`) [#31]
18
+
19
+ ### Fixed
20
+
21
+ - Error page colors now depend on the theme, and the text is centered [#31]
22
+
23
+ [#31]:https://github.com/tarampampam/3proxy-docker/pull/31
24
+
25
+ ## v1.8.0
26
+
27
+ ### Added
28
+
29
+ - `EXTRA_ACCOUNTS` environment variable is supported now [#28]
30
+
31
+ [#28]:https://github.com/tarampampam/3proxy-docker/issues/28
32
+
33
+ ## v1.7.0
34
+
35
+ ### Added
36
+
37
+ - The following environment variables are supported now: `MAX_CONNECTIONS`, `PROXY_PORT`, `SOCKS_PORT`
38
+
39
+ ### Changed
40
+
41
+ - Entrypoint script (`bash`) replaced with [`mustpl`](https://github.com/tarampampam/mustpl)
42
+ - The result docker image `busybox:1.34.1-glibc` replaced with `busybox:stable-glibc`
43
+
44
+ ### Removed
45
+
46
+ - Dockerfile healthcheck
47
+
48
+ ## v1.6.0
49
+
50
+ ### Added
51
+
52
+ - Possibility of changing DNS resolvers using environment variables `PRIMARY_RESOLVER` (primary) and `SECONDARY_RESOLVER` (secondary)
53
+
54
+ ## v1.5.0
55
+
56
+ ### Fixed
57
+
58
+ - Docker image building optimized
59
+
60
+ ### Added
61
+
62
+ - Healthcheck in the dockerfile
63
+
64
+ ## v1.4.0
65
+
66
+ ### Changed
67
+
68
+ - 3proxy updated from `0.9.3` up to `0.9.4`
69
+
70
+ ## v1.3.0
71
+
72
+ ### Changed
73
+
74
+ - Logging in JSON format
75
+
76
+ ## v1.2.0
77
+
78
+ ### Changed
79
+
80
+ - 3proxy updated from `0.8.13` up to `0.9.3`
81
+
82
+ ## v1.1.0
83
+
84
+ ### Removed
85
+
86
+ - Environment variable `AUTH_REQUIRED` support
87
+
88
+ ### Changed
89
+
90
+ - Proxy error pages a little bit styled
91
+
92
+ ## v1.0.0
93
+
94
+ ### Fixed
95
+
96
+ - Dockerfile and docker entry-point script cleanup
97
+
98
+ ## v0.1.1
99
+
100
+ ### Fixed
101
+
102
+ - Docker entry-point script clean
103
+
104
+ ## v0.1.0
105
+
106
+ ### Changed
107
+
108
+ - First project release
109
+
110
+ [keepachangelog]:https://keepachangelog.com/en/1.0.0/
111
+ [semver]:https://semver.org/spec/v2.0.0.html
Dockerfile CHANGED
@@ -1,82 +1,89 @@
1
- # setup build arguments for version of dependencies to use
2
- ARG DOCKER_GEN_VERSION=0.10.3
3
- ARG FOREGO_VERSION=v0.17.0
4
-
5
- # Use a specific version of golang to build both binaries
6
- FROM golang:1.20.3 as gobuilder
7
-
8
- # Build docker-gen from scratch
9
- FROM gobuilder as dockergen
10
-
11
- ARG DOCKER_GEN_VERSION
12
-
13
- RUN git clone https://github.com/nginx-proxy/docker-gen \
14
- && cd /go/docker-gen \
15
- && git -c advice.detachedHead=false checkout $DOCKER_GEN_VERSION \
16
- && go mod download \
17
- && CGO_ENABLED=0 GOOS=linux go build -ldflags "-X main.buildVersion=${DOCKER_GEN_VERSION}" ./cmd/docker-gen \
18
- && go clean -cache \
19
- && mv docker-gen /usr/local/bin/ \
20
- && cd - \
21
- && rm -rf /go/docker-gen
22
-
23
- # Build forego from scratch
24
- FROM gobuilder as forego
25
-
26
- ARG FOREGO_VERSION
27
-
28
- RUN git clone https://github.com/nginx-proxy/forego/ \
29
- && cd /go/forego \
30
- && git -c advice.detachedHead=false checkout $FOREGO_VERSION \
31
- && go mod download \
32
- && CGO_ENABLED=0 GOOS=linux go build -o forego . \
33
- && go clean -cache \
34
- && mv forego /usr/local/bin/ \
35
- && cd - \
36
- && rm -rf /go/forego
37
-
38
- # Build the final image
39
- FROM nginx:1.23.4
40
-
41
- ARG NGINX_PROXY_VERSION
42
- # Add DOCKER_GEN_VERSION environment variable
43
- # Because some external projects rely on it
44
- ARG DOCKER_GEN_VERSION
45
- ENV NGINX_PROXY_VERSION=${NGINX_PROXY_VERSION} \
46
- DOCKER_GEN_VERSION=${DOCKER_GEN_VERSION} \
47
- DOCKER_HOST=unix:///tmp/docker.sock
48
-
49
- # Install wget and install/updates certificates
50
- RUN apt-get update \
51
- && apt-get install -y -q --no-install-recommends \
52
- ca-certificates \
53
- wget \
54
- && apt-get clean \
55
- && rm -r /var/lib/apt/lists/*
56
-
57
-
58
- # Configure Nginx
59
- RUN echo "daemon off;" >> /etc/nginx/nginx.conf \
60
- && sed -i 's/worker_processes 1/worker_processes auto/' /etc/nginx/nginx.conf \
61
- && sed -i 's/worker_connections 1024/worker_connections 10240/' /etc/nginx/nginx.conf \
62
- && mkdir -p '/etc/nginx/dhparam'
63
-
64
- # Install Forego + docker-gen
65
- COPY --from=forego /usr/local/bin/forego /usr/local/bin/forego
66
- COPY --from=dockergen /usr/local/bin/docker-gen /usr/local/bin/docker-gen
67
-
68
- COPY network_internal.conf /etc/nginx/
69
-
70
- RUN adduser -h /home/user -s /bin/sh -D user
71
- USER user
72
- ENV HOME=/home/user \
73
- PATH=/home/user/.local/bin:$PATH
74
-
75
- COPY --chown=user app nginx.tmpl $HOME/app/
76
- WORKDIR $HOME/app/
77
- RUN chmod 777 $HOME/app/docker-entrypoint.sh
78
-
79
- EXPOSE 7860
80
-
81
- ENTRYPOINT ["/home/user/app/docker-entrypoint.sh"]
82
- CMD ["forego", "start", "-r"]
 
 
 
 
 
 
 
 
1
+ # Image page: <https://hub.docker.com/_/gcc>
2
+ FROM gcc:12.2.0 as builder
3
+
4
+ # renovate: source=github-tags name=z3APA3A/3proxy
5
+ ARG Z3PROXY_VERSION=0.9.4
6
+
7
+ # Fetch 3proxy sources
8
+ RUN set -x \
9
+ && git -c advice.detachedHead=false clone --depth 1 --branch "${Z3PROXY_VERSION}" https://github.com/z3APA3A/3proxy.git /tmp/3proxy
10
+
11
+ WORKDIR /tmp/3proxy
12
+
13
+ # Patch sources
14
+ RUN set -x \
15
+ && echo '#define ANONYMOUS 1' >> ./src/3proxy.h \
16
+ # proxy.c source: <https://github.com/z3APA3A/3proxy/blob/0.9.3/src/proxy.c>
17
+ && sed -i 's~\(<\/head>\)~<style>:root{--color-bg-primary:#fff;--color-text-primary:#131313;--color-text-secondary:#232323}\
18
+ @media (prefers-color-scheme: dark){:root{--color-bg-primary:#212121;--color-text-primary:#fafafa;--color-text-secondary:#bbb}}\
19
+ html,body{height:100%;font-family:sans-serif;background-color:var(--color-bg-primary);color:var(--color-text-primary);margin:0;\
20
+ padding:0;text-align:center}body{align-items:center;display:flex;justify-content:center;flex-direction:column;height:100vh}\
21
+ h1,h2{margin-bottom:0;font-size:2.5em}h2::before{content:'"'"'Proxy error'"'"';display:block;font-size:.4em;\
22
+ color:var(--color-text-secondary);font-weight:100}h3,p{color:var(--color-text-secondary)}</style>\1~' ./src/proxy.c \
23
+ && cat ./src/proxy.c | grep '</head>'
24
+
25
+ # And compile
26
+ RUN set -x \
27
+ && echo "" >> ./Makefile.Linux \
28
+ && echo "PLUGINS = StringsPlugin TrafficPlugin PCREPlugin TransparentPlugin SSLPlugin" >> ./Makefile.Linux \
29
+ && echo "LIBS = -l:libcrypto.a -l:libssl.a -ldl" >> ./Makefile.Linux \
30
+ && make -f Makefile.Linux \
31
+ && strip ./bin/3proxy \
32
+ && strip ./bin/StringsPlugin.ld.so \
33
+ && strip ./bin/TrafficPlugin.ld.so \
34
+ && strip ./bin/PCREPlugin.ld.so \
35
+ && strip ./bin/TransparentPlugin.ld.so \
36
+ && strip ./bin/SSLPlugin.ld.so
37
+
38
+ # Prepare filesystem for 3proxy running
39
+ FROM alpine:latest as buffer
40
+
41
+ # create a directory for the future root filesystem
42
+ WORKDIR /tmp/rootfs
43
+
44
+ # prepare the root filesystem
45
+ RUN set -x \
46
+ && mkdir -p ./etc ./bin ./usr/local/3proxy/libexec ./etc/3proxy \
47
+ && echo '3proxy:x:1000:1000::/nonexistent:/sbin/nologin' > ./etc/passwd \
48
+ && echo '3proxy:x:1000:' > ./etc/group \
49
+ && apk add --no-cache --virtual .build-deps curl ca-certificates \
50
+ && update-ca-certificates \
51
+ && curl -SsL -o ./bin/dumb-init "https://github.com/Yelp/dumb-init/releases/download/v1.2.5/dumb-init_1.2.5_$(arch)" \
52
+ && chmod +x ./bin/dumb-init \
53
+ && apk del .build-deps
54
+
55
+ COPY --from=builder /lib/*-linux-gnu/libdl.so.* ./lib/
56
+ COPY --from=builder /tmp/3proxy/bin/3proxy ./bin/3proxy
57
+ COPY --from=builder /tmp/3proxy/bin/*.ld.so ./usr/local/3proxy/libexec/
58
+ COPY --from=ghcr.io/tarampampam/mustpl:0.1.0 /bin/mustpl ./bin/mustpl
59
+ COPY 3proxy.cfg.json ./etc/3proxy/3proxy.cfg.json
60
+ COPY 3proxy.cfg.mustach ./etc/3proxy/3proxy.cfg.mustach
61
+
62
+ RUN chown -R 1000:1000 ./etc/3proxy
63
+
64
+ # Merge into a single layer
65
+ FROM busybox:stable-glibc
66
+
67
+ LABEL \
68
+ org.opencontainers.image.title="3proxy" \
69
+ org.opencontainers.image.description="Tiny free proxy server" \
70
+ org.opencontainers.image.url="https://github.com/tarampampam/3proxy-docker" \
71
+ org.opencontainers.image.source="https://github.com/tarampampam/3proxy-docker" \
72
+ org.opencontainers.image.vendor="Tarampampam" \
73
+ org.opencontainers.image.licenses="WTFPL"
74
+
75
+ # Import from builder
76
+ COPY --from=buffer /tmp/rootfs /
77
+
78
+ # Use an unprivileged user
79
+ USER 3proxy:3proxy
80
+
81
+ ENTRYPOINT [ \
82
+ "/bin/mustpl", \
83
+ "-f", "/etc/3proxy/3proxy.cfg.json", \
84
+ "-o", "/etc/3proxy/3proxy.cfg", \
85
+ "/etc/3proxy/3proxy.cfg.mustach", \
86
+ "--", "/bin/dumb-init" \
87
+ ]
88
+
89
+ CMD ["/bin/3proxy", "/etc/3proxy/3proxy.cfg"]
LICENSE CHANGED
@@ -1,674 +1,9 @@
1
- GNU GENERAL PUBLIC LICENSE
2
- Version 3, 29 June 2007
3
 
4
- Copyright (C) 2007 Free Software Foundation, Inc. <https://fsf.org/>
5
- Everyone is permitted to copy and distribute verbatim copies
6
- of this license document, but changing it is not allowed.
7
 
8
- Preamble
 
9
 
10
- The GNU General Public License is a free, copyleft license for
11
- software and other kinds of works.
12
-
13
- The licenses for most software and other practical works are designed
14
- to take away your freedom to share and change the works. By contrast,
15
- the GNU General Public License is intended to guarantee your freedom to
16
- share and change all versions of a program--to make sure it remains free
17
- software for all its users. We, the Free Software Foundation, use the
18
- GNU General Public License for most of our software; it applies also to
19
- any other work released this way by its authors. You can apply it to
20
- your programs, too.
21
-
22
- When we speak of free software, we are referring to freedom, not
23
- price. Our General Public Licenses are designed to make sure that you
24
- have the freedom to distribute copies of free software (and charge for
25
- them if you wish), that you receive source code or can get it if you
26
- want it, that you can change the software or use pieces of it in new
27
- free programs, and that you know you can do these things.
28
-
29
- To protect your rights, we need to prevent others from denying you
30
- these rights or asking you to surrender the rights. Therefore, you have
31
- certain responsibilities if you distribute copies of the software, or if
32
- you modify it: responsibilities to respect the freedom of others.
33
-
34
- For example, if you distribute copies of such a program, whether
35
- gratis or for a fee, you must pass on to the recipients the same
36
- freedoms that you received. You must make sure that they, too, receive
37
- or can get the source code. And you must show them these terms so they
38
- know their rights.
39
-
40
- Developers that use the GNU GPL protect your rights with two steps:
41
- (1) assert copyright on the software, and (2) offer you this License
42
- giving you legal permission to copy, distribute and/or modify it.
43
-
44
- For the developers' and authors' protection, the GPL clearly explains
45
- that there is no warranty for this free software. For both users' and
46
- authors' sake, the GPL requires that modified versions be marked as
47
- changed, so that their problems will not be attributed erroneously to
48
- authors of previous versions.
49
-
50
- Some devices are designed to deny users access to install or run
51
- modified versions of the software inside them, although the manufacturer
52
- can do so. This is fundamentally incompatible with the aim of
53
- protecting users' freedom to change the software. The systematic
54
- pattern of such abuse occurs in the area of products for individuals to
55
- use, which is precisely where it is most unacceptable. Therefore, we
56
- have designed this version of the GPL to prohibit the practice for those
57
- products. If such problems arise substantially in other domains, we
58
- stand ready to extend this provision to those domains in future versions
59
- of the GPL, as needed to protect the freedom of users.
60
-
61
- Finally, every program is threatened constantly by software patents.
62
- States should not allow patents to restrict development and use of
63
- software on general-purpose computers, but in those that do, we wish to
64
- avoid the special danger that patents applied to a free program could
65
- make it effectively proprietary. To prevent this, the GPL assures that
66
- patents cannot be used to render the program non-free.
67
-
68
- The precise terms and conditions for copying, distribution and
69
- modification follow.
70
-
71
- TERMS AND CONDITIONS
72
-
73
- 0. Definitions.
74
-
75
- "This License" refers to version 3 of the GNU General Public License.
76
-
77
- "Copyright" also means copyright-like laws that apply to other kinds of
78
- works, such as semiconductor masks.
79
-
80
- "The Program" refers to any copyrightable work licensed under this
81
- License. Each licensee is addressed as "you". "Licensees" and
82
- "recipients" may be individuals or organizations.
83
-
84
- To "modify" a work means to copy from or adapt all or part of the work
85
- in a fashion requiring copyright permission, other than the making of an
86
- exact copy. The resulting work is called a "modified version" of the
87
- earlier work or a work "based on" the earlier work.
88
-
89
- A "covered work" means either the unmodified Program or a work based
90
- on the Program.
91
-
92
- To "propagate" a work means to do anything with it that, without
93
- permission, would make you directly or secondarily liable for
94
- infringement under applicable copyright law, except executing it on a
95
- computer or modifying a private copy. Propagation includes copying,
96
- distribution (with or without modification), making available to the
97
- public, and in some countries other activities as well.
98
-
99
- To "convey" a work means any kind of propagation that enables other
100
- parties to make or receive copies. Mere interaction with a user through
101
- a computer network, with no transfer of a copy, is not conveying.
102
-
103
- An interactive user interface displays "Appropriate Legal Notices"
104
- to the extent that it includes a convenient and prominently visible
105
- feature that (1) displays an appropriate copyright notice, and (2)
106
- tells the user that there is no warranty for the work (except to the
107
- extent that warranties are provided), that licensees may convey the
108
- work under this License, and how to view a copy of this License. If
109
- the interface presents a list of user commands or options, such as a
110
- menu, a prominent item in the list meets this criterion.
111
-
112
- 1. Source Code.
113
-
114
- The "source code" for a work means the preferred form of the work
115
- for making modifications to it. "Object code" means any non-source
116
- form of a work.
117
-
118
- A "Standard Interface" means an interface that either is an official
119
- standard defined by a recognized standards body, or, in the case of
120
- interfaces specified for a particular programming language, one that
121
- is widely used among developers working in that language.
122
-
123
- The "System Libraries" of an executable work include anything, other
124
- than the work as a whole, that (a) is included in the normal form of
125
- packaging a Major Component, but which is not part of that Major
126
- Component, and (b) serves only to enable use of the work with that
127
- Major Component, or to implement a Standard Interface for which an
128
- implementation is available to the public in source code form. A
129
- "Major Component", in this context, means a major essential component
130
- (kernel, window system, and so on) of the specific operating system
131
- (if any) on which the executable work runs, or a compiler used to
132
- produce the work, or an object code interpreter used to run it.
133
-
134
- The "Corresponding Source" for a work in object code form means all
135
- the source code needed to generate, install, and (for an executable
136
- work) run the object code and to modify the work, including scripts to
137
- control those activities. However, it does not include the work's
138
- System Libraries, or general-purpose tools or generally available free
139
- programs which are used unmodified in performing those activities but
140
- which are not part of the work. For example, Corresponding Source
141
- includes interface definition files associated with source files for
142
- the work, and the source code for shared libraries and dynamically
143
- linked subprograms that the work is specifically designed to require,
144
- such as by intimate data communication or control flow between those
145
- subprograms and other parts of the work.
146
-
147
- The Corresponding Source need not include anything that users
148
- can regenerate automatically from other parts of the Corresponding
149
- Source.
150
-
151
- The Corresponding Source for a work in source code form is that
152
- same work.
153
-
154
- 2. Basic Permissions.
155
-
156
- All rights granted under this License are granted for the term of
157
- copyright on the Program, and are irrevocable provided the stated
158
- conditions are met. This License explicitly affirms your unlimited
159
- permission to run the unmodified Program. The output from running a
160
- covered work is covered by this License only if the output, given its
161
- content, constitutes a covered work. This License acknowledges your
162
- rights of fair use or other equivalent, as provided by copyright law.
163
-
164
- You may make, run and propagate covered works that you do not
165
- convey, without conditions so long as your license otherwise remains
166
- in force. You may convey covered works to others for the sole purpose
167
- of having them make modifications exclusively for you, or provide you
168
- with facilities for running those works, provided that you comply with
169
- the terms of this License in conveying all material for which you do
170
- not control copyright. Those thus making or running the covered works
171
- for you must do so exclusively on your behalf, under your direction
172
- and control, on terms that prohibit them from making any copies of
173
- your copyrighted material outside their relationship with you.
174
-
175
- Conveying under any other circumstances is permitted solely under
176
- the conditions stated below. Sublicensing is not allowed; section 10
177
- makes it unnecessary.
178
-
179
- 3. Protecting Users' Legal Rights From Anti-Circumvention Law.
180
-
181
- No covered work shall be deemed part of an effective technological
182
- measure under any applicable law fulfilling obligations under article
183
- 11 of the WIPO copyright treaty adopted on 20 December 1996, or
184
- similar laws prohibiting or restricting circumvention of such
185
- measures.
186
-
187
- When you convey a covered work, you waive any legal power to forbid
188
- circumvention of technological measures to the extent such circumvention
189
- is effected by exercising rights under this License with respect to
190
- the covered work, and you disclaim any intention to limit operation or
191
- modification of the work as a means of enforcing, against the work's
192
- users, your or third parties' legal rights to forbid circumvention of
193
- technological measures.
194
-
195
- 4. Conveying Verbatim Copies.
196
-
197
- You may convey verbatim copies of the Program's source code as you
198
- receive it, in any medium, provided that you conspicuously and
199
- appropriately publish on each copy an appropriate copyright notice;
200
- keep intact all notices stating that this License and any
201
- non-permissive terms added in accord with section 7 apply to the code;
202
- keep intact all notices of the absence of any warranty; and give all
203
- recipients a copy of this License along with the Program.
204
-
205
- You may charge any price or no price for each copy that you convey,
206
- and you may offer support or warranty protection for a fee.
207
-
208
- 5. Conveying Modified Source Versions.
209
-
210
- You may convey a work based on the Program, or the modifications to
211
- produce it from the Program, in the form of source code under the
212
- terms of section 4, provided that you also meet all of these conditions:
213
-
214
- a) The work must carry prominent notices stating that you modified
215
- it, and giving a relevant date.
216
-
217
- b) The work must carry prominent notices stating that it is
218
- released under this License and any conditions added under section
219
- 7. This requirement modifies the requirement in section 4 to
220
- "keep intact all notices".
221
-
222
- c) You must license the entire work, as a whole, under this
223
- License to anyone who comes into possession of a copy. This
224
- License will therefore apply, along with any applicable section 7
225
- additional terms, to the whole of the work, and all its parts,
226
- regardless of how they are packaged. This License gives no
227
- permission to license the work in any other way, but it does not
228
- invalidate such permission if you have separately received it.
229
-
230
- d) If the work has interactive user interfaces, each must display
231
- Appropriate Legal Notices; however, if the Program has interactive
232
- interfaces that do not display Appropriate Legal Notices, your
233
- work need not make them do so.
234
-
235
- A compilation of a covered work with other separate and independent
236
- works, which are not by their nature extensions of the covered work,
237
- and which are not combined with it such as to form a larger program,
238
- in or on a volume of a storage or distribution medium, is called an
239
- "aggregate" if the compilation and its resulting copyright are not
240
- used to limit the access or legal rights of the compilation's users
241
- beyond what the individual works permit. Inclusion of a covered work
242
- in an aggregate does not cause this License to apply to the other
243
- parts of the aggregate.
244
-
245
- 6. Conveying Non-Source Forms.
246
-
247
- You may convey a covered work in object code form under the terms
248
- of sections 4 and 5, provided that you also convey the
249
- machine-readable Corresponding Source under the terms of this License,
250
- in one of these ways:
251
-
252
- a) Convey the object code in, or embodied in, a physical product
253
- (including a physical distribution medium), accompanied by the
254
- Corresponding Source fixed on a durable physical medium
255
- customarily used for software interchange.
256
-
257
- b) Convey the object code in, or embodied in, a physical product
258
- (including a physical distribution medium), accompanied by a
259
- written offer, valid for at least three years and valid for as
260
- long as you offer spare parts or customer support for that product
261
- model, to give anyone who possesses the object code either (1) a
262
- copy of the Corresponding Source for all the software in the
263
- product that is covered by this License, on a durable physical
264
- medium customarily used for software interchange, for a price no
265
- more than your reasonable cost of physically performing this
266
- conveying of source, or (2) access to copy the
267
- Corresponding Source from a network server at no charge.
268
-
269
- c) Convey individual copies of the object code with a copy of the
270
- written offer to provide the Corresponding Source. This
271
- alternative is allowed only occasionally and noncommercially, and
272
- only if you received the object code with such an offer, in accord
273
- with subsection 6b.
274
-
275
- d) Convey the object code by offering access from a designated
276
- place (gratis or for a charge), and offer equivalent access to the
277
- Corresponding Source in the same way through the same place at no
278
- further charge. You need not require recipients to copy the
279
- Corresponding Source along with the object code. If the place to
280
- copy the object code is a network server, the Corresponding Source
281
- may be on a different server (operated by you or a third party)
282
- that supports equivalent copying facilities, provided you maintain
283
- clear directions next to the object code saying where to find the
284
- Corresponding Source. Regardless of what server hosts the
285
- Corresponding Source, you remain obligated to ensure that it is
286
- available for as long as needed to satisfy these requirements.
287
-
288
- e) Convey the object code using peer-to-peer transmission, provided
289
- you inform other peers where the object code and Corresponding
290
- Source of the work are being offered to the general public at no
291
- charge under subsection 6d.
292
-
293
- A separable portion of the object code, whose source code is excluded
294
- from the Corresponding Source as a System Library, need not be
295
- included in conveying the object code work.
296
-
297
- A "User Product" is either (1) a "consumer product", which means any
298
- tangible personal property which is normally used for personal, family,
299
- or household purposes, or (2) anything designed or sold for incorporation
300
- into a dwelling. In determining whether a product is a consumer product,
301
- doubtful cases shall be resolved in favor of coverage. For a particular
302
- product received by a particular user, "normally used" refers to a
303
- typical or common use of that class of product, regardless of the status
304
- of the particular user or of the way in which the particular user
305
- actually uses, or expects or is expected to use, the product. A product
306
- is a consumer product regardless of whether the product has substantial
307
- commercial, industrial or non-consumer uses, unless such uses represent
308
- the only significant mode of use of the product.
309
-
310
- "Installation Information" for a User Product means any methods,
311
- procedures, authorization keys, or other information required to install
312
- and execute modified versions of a covered work in that User Product from
313
- a modified version of its Corresponding Source. The information must
314
- suffice to ensure that the continued functioning of the modified object
315
- code is in no case prevented or interfered with solely because
316
- modification has been made.
317
-
318
- If you convey an object code work under this section in, or with, or
319
- specifically for use in, a User Product, and the conveying occurs as
320
- part of a transaction in which the right of possession and use of the
321
- User Product is transferred to the recipient in perpetuity or for a
322
- fixed term (regardless of how the transaction is characterized), the
323
- Corresponding Source conveyed under this section must be accompanied
324
- by the Installation Information. But this requirement does not apply
325
- if neither you nor any third party retains the ability to install
326
- modified object code on the User Product (for example, the work has
327
- been installed in ROM).
328
-
329
- The requirement to provide Installation Information does not include a
330
- requirement to continue to provide support service, warranty, or updates
331
- for a work that has been modified or installed by the recipient, or for
332
- the User Product in which it has been modified or installed. Access to a
333
- network may be denied when the modification itself materially and
334
- adversely affects the operation of the network or violates the rules and
335
- protocols for communication across the network.
336
-
337
- Corresponding Source conveyed, and Installation Information provided,
338
- in accord with this section must be in a format that is publicly
339
- documented (and with an implementation available to the public in
340
- source code form), and must require no special password or key for
341
- unpacking, reading or copying.
342
-
343
- 7. Additional Terms.
344
-
345
- "Additional permissions" are terms that supplement the terms of this
346
- License by making exceptions from one or more of its conditions.
347
- Additional permissions that are applicable to the entire Program shall
348
- be treated as though they were included in this License, to the extent
349
- that they are valid under applicable law. If additional permissions
350
- apply only to part of the Program, that part may be used separately
351
- under those permissions, but the entire Program remains governed by
352
- this License without regard to the additional permissions.
353
-
354
- When you convey a copy of a covered work, you may at your option
355
- remove any additional permissions from that copy, or from any part of
356
- it. (Additional permissions may be written to require their own
357
- removal in certain cases when you modify the work.) You may place
358
- additional permissions on material, added by you to a covered work,
359
- for which you have or can give appropriate copyright permission.
360
-
361
- Notwithstanding any other provision of this License, for material you
362
- add to a covered work, you may (if authorized by the copyright holders of
363
- that material) supplement the terms of this License with terms:
364
-
365
- a) Disclaiming warranty or limiting liability differently from the
366
- terms of sections 15 and 16 of this License; or
367
-
368
- b) Requiring preservation of specified reasonable legal notices or
369
- author attributions in that material or in the Appropriate Legal
370
- Notices displayed by works containing it; or
371
-
372
- c) Prohibiting misrepresentation of the origin of that material, or
373
- requiring that modified versions of such material be marked in
374
- reasonable ways as different from the original version; or
375
-
376
- d) Limiting the use for publicity purposes of names of licensors or
377
- authors of the material; or
378
-
379
- e) Declining to grant rights under trademark law for use of some
380
- trade names, trademarks, or service marks; or
381
-
382
- f) Requiring indemnification of licensors and authors of that
383
- material by anyone who conveys the material (or modified versions of
384
- it) with contractual assumptions of liability to the recipient, for
385
- any liability that these contractual assumptions directly impose on
386
- those licensors and authors.
387
-
388
- All other non-permissive additional terms are considered "further
389
- restrictions" within the meaning of section 10. If the Program as you
390
- received it, or any part of it, contains a notice stating that it is
391
- governed by this License along with a term that is a further
392
- restriction, you may remove that term. If a license document contains
393
- a further restriction but permits relicensing or conveying under this
394
- License, you may add to a covered work material governed by the terms
395
- of that license document, provided that the further restriction does
396
- not survive such relicensing or conveying.
397
-
398
- If you add terms to a covered work in accord with this section, you
399
- must place, in the relevant source files, a statement of the
400
- additional terms that apply to those files, or a notice indicating
401
- where to find the applicable terms.
402
-
403
- Additional terms, permissive or non-permissive, may be stated in the
404
- form of a separately written license, or stated as exceptions;
405
- the above requirements apply either way.
406
-
407
- 8. Termination.
408
-
409
- You may not propagate or modify a covered work except as expressly
410
- provided under this License. Any attempt otherwise to propagate or
411
- modify it is void, and will automatically terminate your rights under
412
- this License (including any patent licenses granted under the third
413
- paragraph of section 11).
414
-
415
- However, if you cease all violation of this License, then your
416
- license from a particular copyright holder is reinstated (a)
417
- provisionally, unless and until the copyright holder explicitly and
418
- finally terminates your license, and (b) permanently, if the copyright
419
- holder fails to notify you of the violation by some reasonable means
420
- prior to 60 days after the cessation.
421
-
422
- Moreover, your license from a particular copyright holder is
423
- reinstated permanently if the copyright holder notifies you of the
424
- violation by some reasonable means, this is the first time you have
425
- received notice of violation of this License (for any work) from that
426
- copyright holder, and you cure the violation prior to 30 days after
427
- your receipt of the notice.
428
-
429
- Termination of your rights under this section does not terminate the
430
- licenses of parties who have received copies or rights from you under
431
- this License. If your rights have been terminated and not permanently
432
- reinstated, you do not qualify to receive new licenses for the same
433
- material under section 10.
434
-
435
- 9. Acceptance Not Required for Having Copies.
436
-
437
- You are not required to accept this License in order to receive or
438
- run a copy of the Program. Ancillary propagation of a covered work
439
- occurring solely as a consequence of using peer-to-peer transmission
440
- to receive a copy likewise does not require acceptance. However,
441
- nothing other than this License grants you permission to propagate or
442
- modify any covered work. These actions infringe copyright if you do
443
- not accept this License. Therefore, by modifying or propagating a
444
- covered work, you indicate your acceptance of this License to do so.
445
-
446
- 10. Automatic Licensing of Downstream Recipients.
447
-
448
- Each time you convey a covered work, the recipient automatically
449
- receives a license from the original licensors, to run, modify and
450
- propagate that work, subject to this License. You are not responsible
451
- for enforcing compliance by third parties with this License.
452
-
453
- An "entity transaction" is a transaction transferring control of an
454
- organization, or substantially all assets of one, or subdividing an
455
- organization, or merging organizations. If propagation of a covered
456
- work results from an entity transaction, each party to that
457
- transaction who receives a copy of the work also receives whatever
458
- licenses to the work the party's predecessor in interest had or could
459
- give under the previous paragraph, plus a right to possession of the
460
- Corresponding Source of the work from the predecessor in interest, if
461
- the predecessor has it or can get it with reasonable efforts.
462
-
463
- You may not impose any further restrictions on the exercise of the
464
- rights granted or affirmed under this License. For example, you may
465
- not impose a license fee, royalty, or other charge for exercise of
466
- rights granted under this License, and you may not initiate litigation
467
- (including a cross-claim or counterclaim in a lawsuit) alleging that
468
- any patent claim is infringed by making, using, selling, offering for
469
- sale, or importing the Program or any portion of it.
470
-
471
- 11. Patents.
472
-
473
- A "contributor" is a copyright holder who authorizes use under this
474
- License of the Program or a work on which the Program is based. The
475
- work thus licensed is called the contributor's "contributor version".
476
-
477
- A contributor's "essential patent claims" are all patent claims
478
- owned or controlled by the contributor, whether already acquired or
479
- hereafter acquired, that would be infringed by some manner, permitted
480
- by this License, of making, using, or selling its contributor version,
481
- but do not include claims that would be infringed only as a
482
- consequence of further modification of the contributor version. For
483
- purposes of this definition, "control" includes the right to grant
484
- patent sublicenses in a manner consistent with the requirements of
485
- this License.
486
-
487
- Each contributor grants you a non-exclusive, worldwide, royalty-free
488
- patent license under the contributor's essential patent claims, to
489
- make, use, sell, offer for sale, import and otherwise run, modify and
490
- propagate the contents of its contributor version.
491
-
492
- In the following three paragraphs, a "patent license" is any express
493
- agreement or commitment, however denominated, not to enforce a patent
494
- (such as an express permission to practice a patent or covenant not to
495
- sue for patent infringement). To "grant" such a patent license to a
496
- party means to make such an agreement or commitment not to enforce a
497
- patent against the party.
498
-
499
- If you convey a covered work, knowingly relying on a patent license,
500
- and the Corresponding Source of the work is not available for anyone
501
- to copy, free of charge and under the terms of this License, through a
502
- publicly available network server or other readily accessible means,
503
- then you must either (1) cause the Corresponding Source to be so
504
- available, or (2) arrange to deprive yourself of the benefit of the
505
- patent license for this particular work, or (3) arrange, in a manner
506
- consistent with the requirements of this License, to extend the patent
507
- license to downstream recipients. "Knowingly relying" means you have
508
- actual knowledge that, but for the patent license, your conveying the
509
- covered work in a country, or your recipient's use of the covered work
510
- in a country, would infringe one or more identifiable patents in that
511
- country that you have reason to believe are valid.
512
-
513
- If, pursuant to or in connection with a single transaction or
514
- arrangement, you convey, or propagate by procuring conveyance of, a
515
- covered work, and grant a patent license to some of the parties
516
- receiving the covered work authorizing them to use, propagate, modify
517
- or convey a specific copy of the covered work, then the patent license
518
- you grant is automatically extended to all recipients of the covered
519
- work and works based on it.
520
-
521
- A patent license is "discriminatory" if it does not include within
522
- the scope of its coverage, prohibits the exercise of, or is
523
- conditioned on the non-exercise of one or more of the rights that are
524
- specifically granted under this License. You may not convey a covered
525
- work if you are a party to an arrangement with a third party that is
526
- in the business of distributing software, under which you make payment
527
- to the third party based on the extent of your activity of conveying
528
- the work, and under which the third party grants, to any of the
529
- parties who would receive the covered work from you, a discriminatory
530
- patent license (a) in connection with copies of the covered work
531
- conveyed by you (or copies made from those copies), or (b) primarily
532
- for and in connection with specific products or compilations that
533
- contain the covered work, unless you entered into that arrangement,
534
- or that patent license was granted, prior to 28 March 2007.
535
-
536
- Nothing in this License shall be construed as excluding or limiting
537
- any implied license or other defenses to infringement that may
538
- otherwise be available to you under applicable patent law.
539
-
540
- 12. No Surrender of Others' Freedom.
541
-
542
- If conditions are imposed on you (whether by court order, agreement or
543
- otherwise) that contradict the conditions of this License, they do not
544
- excuse you from the conditions of this License. If you cannot convey a
545
- covered work so as to satisfy simultaneously your obligations under this
546
- License and any other pertinent obligations, then as a consequence you may
547
- not convey it at all. For example, if you agree to terms that obligate you
548
- to collect a royalty for further conveying from those to whom you convey
549
- the Program, the only way you could satisfy both those terms and this
550
- License would be to refrain entirely from conveying the Program.
551
-
552
- 13. Use with the GNU Affero General Public License.
553
-
554
- Notwithstanding any other provision of this License, you have
555
- permission to link or combine any covered work with a work licensed
556
- under version 3 of the GNU Affero General Public License into a single
557
- combined work, and to convey the resulting work. The terms of this
558
- License will continue to apply to the part which is the covered work,
559
- but the special requirements of the GNU Affero General Public License,
560
- section 13, concerning interaction through a network will apply to the
561
- combination as such.
562
-
563
- 14. Revised Versions of this License.
564
-
565
- The Free Software Foundation may publish revised and/or new versions of
566
- the GNU General Public License from time to time. Such new versions will
567
- be similar in spirit to the present version, but may differ in detail to
568
- address new problems or concerns.
569
-
570
- Each version is given a distinguishing version number. If the
571
- Program specifies that a certain numbered version of the GNU General
572
- Public License "or any later version" applies to it, you have the
573
- option of following the terms and conditions either of that numbered
574
- version or of any later version published by the Free Software
575
- Foundation. If the Program does not specify a version number of the
576
- GNU General Public License, you may choose any version ever published
577
- by the Free Software Foundation.
578
-
579
- If the Program specifies that a proxy can decide which future
580
- versions of the GNU General Public License can be used, that proxy's
581
- public statement of acceptance of a version permanently authorizes you
582
- to choose that version for the Program.
583
-
584
- Later license versions may give you additional or different
585
- permissions. However, no additional obligations are imposed on any
586
- author or copyright holder as a result of your choosing to follow a
587
- later version.
588
-
589
- 15. Disclaimer of Warranty.
590
-
591
- THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY
592
- APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT
593
- HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY
594
- OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO,
595
- THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
596
- PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM
597
- IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF
598
- ALL NECESSARY SERVICING, REPAIR OR CORRECTION.
599
-
600
- 16. Limitation of Liability.
601
-
602
- IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING
603
- WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MODIFIES AND/OR CONVEYS
604
- THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY
605
- GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE
606
- USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF
607
- DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD
608
- PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS),
609
- EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF
610
- SUCH DAMAGES.
611
-
612
- 17. Interpretation of Sections 15 and 16.
613
-
614
- If the disclaimer of warranty and limitation of liability provided
615
- above cannot be given local legal effect according to their terms,
616
- reviewing courts shall apply local law that most closely approximates
617
- an absolute waiver of all civil liability in connection with the
618
- Program, unless a warranty or assumption of liability accompanies a
619
- copy of the Program in return for a fee.
620
-
621
- END OF TERMS AND CONDITIONS
622
-
623
- How to Apply These Terms to Your New Programs
624
-
625
- If you develop a new program, and you want it to be of the greatest
626
- possible use to the public, the best way to achieve this is to make it
627
- free software which everyone can redistribute and change under these terms.
628
-
629
- To do so, attach the following notices to the program. It is safest
630
- to attach them to the start of each source file to most effectively
631
- state the exclusion of warranty; and each file should have at least
632
- the "copyright" line and a pointer to where the full notice is found.
633
-
634
- <one line to give the program's name and a brief idea of what it does.>
635
- Copyright (C) <year> <name of author>
636
-
637
- This program is free software: you can redistribute it and/or modify
638
- it under the terms of the GNU General Public License as published by
639
- the Free Software Foundation, either version 3 of the License, or
640
- (at your option) any later version.
641
-
642
- This program is distributed in the hope that it will be useful,
643
- but WITHOUT ANY WARRANTY; without even the implied warranty of
644
- MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
645
- GNU General Public License for more details.
646
-
647
- You should have received a copy of the GNU General Public License
648
- along with this program. If not, see <https://www.gnu.org/licenses/>.
649
-
650
- Also add information on how to contact you by electronic and paper mail.
651
-
652
- If the program does terminal interaction, make it output a short
653
- notice like this when it starts in an interactive mode:
654
-
655
- <program> Copyright (C) <year> <name of author>
656
- This program comes with ABSOLUTELY NO WARRANTY; for details type `show w'.
657
- This is free software, and you are welcome to redistribute it
658
- under certain conditions; type `show c' for details.
659
-
660
- The hypothetical commands `show w' and `show c' should show the appropriate
661
- parts of the General Public License. Of course, your program's commands
662
- might be different; for a GUI interface, you would use an "about box".
663
-
664
- You should also get your employer (if you work as a programmer) or school,
665
- if any, to sign a "copyright disclaimer" for the program, if necessary.
666
- For more information on this, and how to apply and follow the GNU GPL, see
667
- <https://www.gnu.org/licenses/>.
668
-
669
- The GNU General Public License does not permit incorporating your program
670
- into proprietary programs. If your program is a subroutine library, you
671
- may consider it more useful to permit linking proprietary applications with
672
- the library. If this is what you want to do, use the GNU Lesser General
673
- Public License instead of this License. But first, please read
674
- <https://www.gnu.org/licenses/why-not-lgpl.html>.
 
1
+ Copyright (C) tarampampam <github.com/tarampampam>
 
2
 
3
+ Everyone is permitted to copy and distribute verbatim or modified copies of this license
4
+ document, and changing it is allowed as long as the name is changed.
 
5
 
6
+ DO WHAT THE FUCK YOU WANT TO PUBLIC LICENSE TERMS AND CONDITIONS FOR COPYING,
7
+ DISTRIBUTION AND MODIFICATION
8
 
9
+ 0. You just DO WHAT THE FUCK YOU WANT TO.