2013-09-27 21:34:31 +02:00
|
|
|
##@file
|
|
|
|
# Google authentication backend file
|
|
|
|
|
|
|
|
##@class
|
|
|
|
# Google authentication backend class.
|
|
|
|
package Lemonldap::NG::Portal::AuthGoogle;
|
|
|
|
|
|
|
|
use strict;
|
|
|
|
use Lemonldap::NG::Portal::Simple;
|
|
|
|
use Lemonldap::NG::Common::Regexp;
|
2013-10-08 06:35:38 +02:00
|
|
|
use Lemonldap::NG::Portal::_Browser;
|
2013-09-29 09:09:32 +02:00
|
|
|
use URI::Escape;
|
2013-09-27 21:34:31 +02:00
|
|
|
|
2013-09-29 09:09:32 +02:00
|
|
|
use constant AXSPECURL => 'http://openid.net/srv/ax/1.0';
|
|
|
|
use constant GOOGLEENDPOINT => 'https://www.google.com/accounts/o8/id';
|
|
|
|
|
2013-10-08 06:35:38 +02:00
|
|
|
our @ISA = (qw(Lemonldap::NG::Portal::_Browser));
|
2014-02-19 14:56:35 +01:00
|
|
|
our $VERSION = '1.4.0';
|
2013-09-29 09:09:32 +02:00
|
|
|
our $googleEndPoint;
|
2013-09-27 21:34:31 +02:00
|
|
|
|
|
|
|
BEGIN {
|
|
|
|
eval {
|
|
|
|
require threads::shared;
|
2013-09-29 09:09:32 +02:00
|
|
|
threads::shared::share($googleEndPoint);
|
2013-09-27 21:34:31 +02:00
|
|
|
};
|
|
|
|
}
|
|
|
|
|
2013-09-29 18:26:41 +02:00
|
|
|
## @method string googleEndPoint()
|
|
|
|
# Return the Google OpenID endpoint given by
|
|
|
|
# https://www.google.com/accounts/o8/id
|
|
|
|
# @return string
|
|
|
|
sub googleEndPoint {
|
2013-09-29 09:09:32 +02:00
|
|
|
my $self = shift;
|
|
|
|
|
2013-10-11 20:59:18 +02:00
|
|
|
# First time, get and store Google endpoint
|
2013-09-29 09:09:32 +02:00
|
|
|
unless ($googleEndPoint) {
|
|
|
|
my $response =
|
2013-09-29 18:26:41 +02:00
|
|
|
$self->ua()->get( GOOGLEENDPOINT, Accept => 'application/xrds+xml' );
|
2013-09-29 09:09:32 +02:00
|
|
|
if ( $response->is_success ) {
|
|
|
|
|
|
|
|
# Dirty XML parse
|
|
|
|
# (searching for <URI>https://www.google.com/accounts/o8/ud</URI>)
|
|
|
|
my $tmp = $response->decoded_content;
|
2013-10-11 20:59:18 +02:00
|
|
|
if ( $tmp =~ m#<URI.*?>\s*(\S+)\s*</URI>#mi ) {
|
2013-09-29 09:09:32 +02:00
|
|
|
$googleEndPoint = $1;
|
|
|
|
}
|
|
|
|
else {
|
2013-10-11 20:59:18 +02:00
|
|
|
$self->lmLog(
|
|
|
|
'Here is the Google response: '
|
|
|
|
. $response->decoded_content,
|
|
|
|
'error'
|
|
|
|
);
|
|
|
|
$self->abort('Can\'t find endpoint in Google response');
|
2013-09-29 09:09:32 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
else {
|
2013-10-11 20:59:18 +02:00
|
|
|
$self->abort( 'Can\'t access to Google endpoint:',
|
|
|
|
$response->status_line );
|
2013-09-29 09:09:32 +02:00
|
|
|
}
|
|
|
|
}
|
2013-09-29 18:26:41 +02:00
|
|
|
return $googleEndPoint;
|
|
|
|
}
|
|
|
|
|
|
|
|
## @method boolean checkGoogleSession()
|
|
|
|
# Search for claimed_id in persistent sessions DB.
|
|
|
|
# @return true if sessions was recovered
|
|
|
|
sub checkGoogleSession {
|
|
|
|
my $self = shift;
|
|
|
|
|
2013-09-29 20:09:38 +02:00
|
|
|
# Find in Google response for AX attributes
|
|
|
|
# See https://developers.google.com/accounts/docs/OpenID#Parameters
|
|
|
|
# for more
|
2013-09-29 18:26:41 +02:00
|
|
|
( $self->{_AXNS} ) = map {
|
|
|
|
( /^openid\.ns\.(.*)/ and $self->param($_) eq AXSPECURL )
|
|
|
|
? ($1)
|
|
|
|
: ()
|
|
|
|
} $self->param();
|
|
|
|
|
2013-09-29 20:09:38 +02:00
|
|
|
# Look at persistent database
|
2014-04-15 17:34:21 +02:00
|
|
|
my $id = $self->_md5hash( $self->param('openid.claimed_id') );
|
|
|
|
my $pSession = $self->getPersistentSession($id);
|
2013-09-29 20:09:38 +02:00
|
|
|
my $gs;
|
|
|
|
|
|
|
|
# No AX response, if datas are already shared, store them
|
2013-09-29 18:26:41 +02:00
|
|
|
unless ( $self->{_AXNS} ) {
|
2014-04-15 17:34:21 +02:00
|
|
|
if ( $pSession->data ) {
|
|
|
|
$self->{user} = $pSession->data->{email};
|
|
|
|
while ( my ( $k, $v ) = each %{ $pSession->data } ) {
|
2013-09-29 20:09:38 +02:00
|
|
|
$gs->{$k} = $v;
|
2013-09-29 18:26:41 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2013-10-11 20:59:18 +02:00
|
|
|
else { # Parse AX response
|
2013-09-29 20:09:38 +02:00
|
|
|
|
|
|
|
# First store email as user key. Note that this is the returned value
|
|
|
|
# so if it's empty, request is retried
|
2013-09-29 18:26:41 +02:00
|
|
|
$self->{user} = $self->param("openid.$self->{_AXNS}.value.email");
|
2013-09-29 20:09:38 +02:00
|
|
|
|
2013-10-11 20:59:18 +02:00
|
|
|
# Retrieve AX datas (and store them in persistent session)
|
2014-04-15 17:34:21 +02:00
|
|
|
my $infos;
|
2013-09-29 18:26:41 +02:00
|
|
|
foreach my $k ( $self->param() ) {
|
|
|
|
if ( $k =~ /^openid\.$self->{_AXNS}\.value\.(\w+)$/ ) {
|
2014-04-15 17:34:21 +02:00
|
|
|
$gs->{$1} = $infos->{$1} = $self->param($k);
|
2013-09-29 18:26:41 +02:00
|
|
|
}
|
|
|
|
}
|
2014-04-15 17:34:21 +02:00
|
|
|
$pSession->update($infos);
|
2013-09-29 18:26:41 +02:00
|
|
|
}
|
2013-09-29 20:09:38 +02:00
|
|
|
|
|
|
|
# Now store datas in session
|
2014-02-19 14:56:35 +01:00
|
|
|
my %vars = ( %{ $self->{exportedVars} }, %{ $self->{googleExportedVars} } );
|
|
|
|
while ( my ( $k, $v ) = each %vars ) {
|
2013-09-29 20:09:38 +02:00
|
|
|
my $attr = $k;
|
|
|
|
$attr =~ s/^!//;
|
|
|
|
|
|
|
|
# Value (ie AX attribute) must be one of:
|
2013-10-03 06:18:16 +02:00
|
|
|
if ( $v =~ Lemonldap::NG::Common::Regexp::GOOGLEAXATTR() ) {
|
2013-09-29 20:09:38 +02:00
|
|
|
|
2013-10-02 13:42:57 +02:00
|
|
|
# One value is missing:
|
2013-09-29 20:09:38 +02:00
|
|
|
unless ( exists( $gs->{$v} ) ) {
|
2013-10-02 13:42:57 +02:00
|
|
|
|
|
|
|
# Case 1: value was asked but not returned, set an empty value
|
|
|
|
# in persistent session (so that it's defined)
|
|
|
|
if ( $self->{_AXNS} ) {
|
2013-10-13 14:15:01 +02:00
|
|
|
$self->_sub( 'userInfo',
|
|
|
|
"$v required attribute is missing in Google response, storing ''"
|
2013-10-02 13:42:57 +02:00
|
|
|
);
|
2014-04-15 17:34:21 +02:00
|
|
|
$gs->{$v} = '';
|
|
|
|
$pSession->update( { $v => '' } );
|
2013-10-02 13:42:57 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
# Case 2: value is not stored, probably configuration has
|
|
|
|
# changed and this value was never asked
|
|
|
|
else {
|
2013-10-13 14:15:01 +02:00
|
|
|
$self->_sub( 'userInfo',
|
|
|
|
"$v required attribute is missing in persistent session, let's ask it"
|
2013-10-02 13:42:57 +02:00
|
|
|
);
|
|
|
|
return 0;
|
|
|
|
}
|
2013-09-29 20:09:38 +02:00
|
|
|
}
|
|
|
|
$self->{sessionInfo}->{$attr} = $gs->{$v};
|
|
|
|
}
|
2013-10-11 20:59:18 +02:00
|
|
|
|
|
|
|
# If an exported variable is not AX compliant, just warn
|
2013-09-29 20:09:38 +02:00
|
|
|
else {
|
|
|
|
$self->lmLog(
|
2014-02-19 14:56:35 +01:00
|
|
|
"Ignoring attribute $v which is not a valid Google OpenID AX attribute",
|
2013-09-29 20:09:38 +02:00
|
|
|
'warn'
|
|
|
|
);
|
|
|
|
}
|
|
|
|
}
|
2013-10-11 20:59:18 +02:00
|
|
|
|
|
|
|
# Boolean value: ~false if no $user value
|
2013-09-29 18:26:41 +02:00
|
|
|
return $self->{user};
|
|
|
|
}
|
|
|
|
|
|
|
|
## @apmethod int authInit()
|
|
|
|
# @return Lemonldap::NG::Portal constant
|
|
|
|
sub authInit {
|
2013-09-27 21:34:31 +02:00
|
|
|
PE_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
## @apmethod int extractFormInfo()
|
|
|
|
# Read username return by Google authentication system.
|
|
|
|
# @return Lemonldap::NG::Portal constant
|
|
|
|
sub extractFormInfo {
|
|
|
|
my $self = shift;
|
2013-09-29 20:09:38 +02:00
|
|
|
my $ax = '';
|
2013-09-27 21:34:31 +02:00
|
|
|
|
2013-09-29 20:09:38 +02:00
|
|
|
# 1. Check Google responses
|
|
|
|
if ( $self->param('openid.mode') ) {
|
2013-09-29 09:09:32 +02:00
|
|
|
|
2013-09-29 20:09:38 +02:00
|
|
|
# 1.1 First, verify that the response isn't forged
|
2013-09-27 21:34:31 +02:00
|
|
|
|
2013-09-29 20:09:38 +02:00
|
|
|
# Build verification request
|
2013-09-29 18:26:41 +02:00
|
|
|
my $check_url = $self->googleEndPoint() . "?" . join(
|
2013-09-27 21:34:31 +02:00
|
|
|
'&',
|
|
|
|
map {
|
|
|
|
my $val = $self->param($_);
|
|
|
|
$val = 'check_authentication' if $_ eq 'openid.mode';
|
|
|
|
sprintf '%s=%s', uri_escape_utf8($_), uri_escape_utf8($val);
|
2014-06-08 12:04:50 +02:00
|
|
|
} $self->param()
|
2013-09-27 21:34:31 +02:00
|
|
|
);
|
|
|
|
|
2013-09-29 20:09:38 +02:00
|
|
|
# Launch request
|
2013-09-29 18:26:41 +02:00
|
|
|
my $response = $self->ua()->get( $check_url, Accept => 'text/plain' );
|
|
|
|
unless ( $response->is_success ) {
|
2013-10-11 20:59:18 +02:00
|
|
|
$self->abort( 'Can\'t verify Google authentication',
|
|
|
|
$response->status_line );
|
2013-09-29 18:26:41 +02:00
|
|
|
}
|
|
|
|
else {
|
2013-09-29 09:09:32 +02:00
|
|
|
my %tmp =
|
|
|
|
map { my ( $key, $value ) = split /:/, $_, 2; $key => $value }
|
|
|
|
split /\n/, $response->decoded_content;
|
2013-09-29 20:09:38 +02:00
|
|
|
|
|
|
|
# Reject invalid requests
|
2013-09-29 18:26:41 +02:00
|
|
|
unless ( $tmp{is_valid} eq 'true' ) {
|
|
|
|
return PE_BADCREDENTIALS;
|
|
|
|
}
|
|
|
|
|
2013-09-29 20:09:38 +02:00
|
|
|
# 1.2 Check if datas are already shared with Google
|
2013-09-29 18:26:41 +02:00
|
|
|
unless ( $self->checkGoogleSession() ) {
|
2013-09-29 20:09:38 +02:00
|
|
|
|
2013-10-11 20:59:18 +02:00
|
|
|
# Datas are missing, prepare AX query which will be added to
|
|
|
|
# the request to Google
|
2013-09-29 20:09:38 +02:00
|
|
|
|
|
|
|
# a) email is required, will be used as 'user' field
|
2013-09-29 18:26:41 +02:00
|
|
|
$ax =
|
|
|
|
'&openid.ns.ax='
|
|
|
|
. AXSPECURL
|
|
|
|
. '&openid.ax.mode=fetch_request'
|
|
|
|
. '&openid.ax.type.email=http://axschema.org/contact/email'
|
|
|
|
. '&openid.ax.required=email';
|
2013-09-29 20:09:38 +02:00
|
|
|
|
|
|
|
# b) if UserDB is Google, ask for exported variables
|
2013-09-29 18:26:41 +02:00
|
|
|
if ( $self->get_module('user') eq 'Google' ) {
|
|
|
|
my $u;
|
|
|
|
while ( my ( $v, $k ) = each %{ $self->{exportedVars} } ) {
|
|
|
|
next if ( $k eq 'email' );
|
2013-10-11 20:59:18 +02:00
|
|
|
|
|
|
|
# Check if wanted attribute is known by Google
|
2013-09-29 18:26:41 +02:00
|
|
|
if ( $k =~
|
|
|
|
/^(?:(?:la(?:nguag|stnam)|firstnam)e|country)$/ )
|
|
|
|
{
|
|
|
|
$ax .= ",$k";
|
2013-10-11 20:59:18 +02:00
|
|
|
|
|
|
|
# Note: AX type seems to be required by Google
|
|
|
|
$u .= "&openid.ax.type.$k="
|
2013-09-29 18:26:41 +02:00
|
|
|
. {
|
|
|
|
country =>
|
|
|
|
"http://axschema.org/contact/country/home",
|
|
|
|
firstname =>
|
|
|
|
"http://axschema.org/namePerson/first",
|
|
|
|
lastname =>
|
|
|
|
"http://axschema.org/namePerson/last",
|
|
|
|
language => "http://axschema.org/pref/language"
|
|
|
|
}->{$k};
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
$self->lmLog(
|
|
|
|
"Field name: $k is not exported by Google",
|
|
|
|
'warn' );
|
|
|
|
}
|
|
|
|
}
|
|
|
|
$ax .= $u;
|
2013-09-29 09:09:32 +02:00
|
|
|
}
|
2013-09-29 18:26:41 +02:00
|
|
|
}
|
2013-09-29 20:09:38 +02:00
|
|
|
|
|
|
|
# 1.3 Datas are recovered, user is authenticated
|
2013-09-29 18:26:41 +02:00
|
|
|
else {
|
2013-10-02 21:45:33 +02:00
|
|
|
$self->lmLog( 'Good Google authentication', 'debug' );
|
|
|
|
|
|
|
|
# Force redirection to avoid displaying OpenID datas
|
|
|
|
$self->{mustRedirect} = 1;
|
2013-09-29 09:09:32 +02:00
|
|
|
return PE_OK;
|
|
|
|
}
|
|
|
|
}
|
2013-09-27 21:34:31 +02:00
|
|
|
}
|
|
|
|
|
2013-09-29 20:09:38 +02:00
|
|
|
# 2. Redirect user to Google login page:
|
2013-10-11 20:59:18 +02:00
|
|
|
# => no OpenID response or missing datas
|
|
|
|
|
|
|
|
# Build request to Google
|
2013-09-29 18:26:41 +02:00
|
|
|
my $check_url =
|
|
|
|
$self->googleEndPoint()
|
|
|
|
. '?openid.mode=checkid_setup'
|
|
|
|
. '&openid.ns=http://specs.openid.net/auth/2.0'
|
|
|
|
. '&openid.claimed_id=http://specs.openid.net/auth/2.0/identifier_select'
|
|
|
|
. '&openid.identity=http://specs.openid.net/auth/2.0/identifier_select'
|
2013-10-11 20:59:18 +02:00
|
|
|
. $ax; # Requested attributes if set
|
|
|
|
|
|
|
|
# Build portal URI...
|
|
|
|
my $sep = '?';
|
|
|
|
my $returnTo = $self->{portal};
|
2013-09-29 18:26:41 +02:00
|
|
|
foreach my $v (
|
|
|
|
[ $self->{_url}, "url" ],
|
|
|
|
[ $self->param( $self->{authChoiceParam} ), $self->{authChoiceParam} ]
|
|
|
|
)
|
|
|
|
{
|
|
|
|
if ( $v->[0] ) {
|
2013-10-11 20:59:18 +02:00
|
|
|
$returnTo .= "$sep$v->[1]=$v->[0]";
|
2013-09-29 18:26:41 +02:00
|
|
|
$sep = '&';
|
2013-09-29 09:09:32 +02:00
|
|
|
}
|
2013-09-27 21:34:31 +02:00
|
|
|
}
|
2013-10-11 20:59:18 +02:00
|
|
|
|
|
|
|
# ... and add it
|
|
|
|
$check_url .= '&openid.return_to=' . uri_escape_utf8($returnTo);
|
|
|
|
|
|
|
|
# Now redirect user
|
2013-09-29 18:26:41 +02:00
|
|
|
print $self->redirect($check_url);
|
|
|
|
$self->quit();
|
2013-09-27 21:34:31 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
## @apmethod int setAuthSessionInfo()
|
|
|
|
# Set _user and authenticationLevel.
|
|
|
|
# @return Lemonldap::NG::Portal constant
|
|
|
|
sub setAuthSessionInfo {
|
|
|
|
my $self = shift;
|
|
|
|
|
|
|
|
$self->{sessionInfo}->{'_user'} = $self->{user};
|
|
|
|
|
|
|
|
$self->{sessionInfo}->{authenticationLevel} = $self->{googleAuthnLevel};
|
|
|
|
|
|
|
|
PE_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
## @apmethod int authenticate()
|
|
|
|
# Does nothing.
|
|
|
|
# @return Lemonldap::NG::Portal constant
|
|
|
|
sub authenticate {
|
|
|
|
PE_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
## @apmethod int authFinish()
|
|
|
|
# Does nothing.
|
|
|
|
# @return Lemonldap::NG::Portal constant
|
|
|
|
sub authFinish {
|
|
|
|
PE_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
## @apmethod int authLogout()
|
|
|
|
# Does nothing
|
|
|
|
# @return Lemonldap::NG::Portal constant
|
|
|
|
sub authLogout {
|
|
|
|
PE_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
## @apmethod boolean authForce()
|
|
|
|
# Does nothing
|
|
|
|
# @return result
|
|
|
|
sub authForce {
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
## @method string getDisplayType
|
|
|
|
# @return display type
|
|
|
|
sub getDisplayType {
|
2013-09-30 16:33:38 +02:00
|
|
|
return "logo";
|
2013-09-27 21:34:31 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
1;
|
|
|
|
__END__
|
|
|
|
|
|
|
|
=head1 NAME
|
|
|
|
|
|
|
|
=encoding utf8
|
|
|
|
|
2013-09-29 09:09:32 +02:00
|
|
|
Lemonldap::NG::Portal::AuthGoogle - Perl extension for building Lemonldap::NG
|
|
|
|
compatible portals with Google authentication.
|
2013-09-27 21:34:31 +02:00
|
|
|
|
|
|
|
=head1 SYNOPSIS
|
|
|
|
|
|
|
|
use Lemonldap::NG::Portal::SharedConf;
|
|
|
|
my $portal = new Lemonldap::NG::Portal::Simple(
|
|
|
|
configStorage => {...}, # See Lemonldap::NG::Portal
|
2013-09-29 09:09:32 +02:00
|
|
|
authentication => 'Google',
|
2013-09-27 21:34:31 +02:00
|
|
|
);
|
|
|
|
|
|
|
|
if($portal->process()) {
|
|
|
|
# Write here the menu with CGI methods. This page is displayed ONLY IF
|
|
|
|
# the user was not redirected here.
|
2013-10-17 21:21:45 +02:00
|
|
|
print $portal->header('text/html; charset=utf-8'); # DON'T FORGET THIS (see CGI(3))
|
2013-09-27 21:34:31 +02:00
|
|
|
print "...";
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
# If the user enters here, IT MEANS THAT CAS REDIRECTION DOES NOT WORK
|
2013-10-17 21:21:45 +02:00
|
|
|
print $portal->header('text/html; charset=utf-8'); # DON'T FORGET THIS (see CGI(3))
|
2013-09-27 21:34:31 +02:00
|
|
|
print "<html><body><h1>Unable to work</h1>";
|
|
|
|
print "This server isn't well configured. Contact your administrator.";
|
|
|
|
print "</body></html>";
|
|
|
|
}
|
|
|
|
|
|
|
|
=head1 DESCRIPTION
|
|
|
|
|
|
|
|
This library just overload few methods of Lemonldap::NG::Portal::Simple to use
|
2013-09-29 09:09:32 +02:00
|
|
|
Google authentication mechanism.
|
2013-09-27 21:34:31 +02:00
|
|
|
|
|
|
|
See L<Lemonldap::NG::Portal::Simple> for usage and other methods.
|
|
|
|
|
|
|
|
=head1 SEE ALSO
|
|
|
|
|
|
|
|
L<Lemonldap::NG::Portal>, L<Lemonldap::NG::Portal::Simple>,
|
2013-09-29 20:09:38 +02:00
|
|
|
L<http://lemonldap-ng.org/>,
|
|
|
|
L<https://developers.google.com/accounts/docs/OpenID>
|
2013-09-27 21:34:31 +02:00
|
|
|
|
|
|
|
=head1 AUTHOR
|
|
|
|
|
|
|
|
=over
|
|
|
|
|
|
|
|
=item Clement Oudot, E<lt>clem.oudot@gmail.comE<gt>
|
|
|
|
|
|
|
|
=item Xavier Guimard, E<lt>x.guimard@free.frE<gt>
|
|
|
|
|
|
|
|
=back
|
|
|
|
|
|
|
|
=head1 BUG REPORT
|
|
|
|
|
|
|
|
Use OW2 system to report bug or ask for features:
|
|
|
|
L<http://jira.ow2.org>
|
|
|
|
|
|
|
|
=head1 DOWNLOAD
|
|
|
|
|
|
|
|
Lemonldap::NG is available at
|
|
|
|
L<http://forge.objectweb.org/project/showfiles.php?group_id=274>
|
|
|
|
|
|
|
|
=head1 COPYRIGHT AND LICENSE
|
|
|
|
|
|
|
|
=over
|
|
|
|
|
2013-09-29 20:09:38 +02:00
|
|
|
=item Copyright (C) 2013 by Xavier Guimard, E<lt>x.guimard@free.frE<gt>
|
2013-09-27 21:34:31 +02:00
|
|
|
|
2013-09-29 20:09:38 +02:00
|
|
|
=item Copyright (C) 2013 by Clement Oudot, E<lt>clem.oudot@gmail.comE<gt>
|
2013-09-27 21:34:31 +02:00
|
|
|
|
|
|
|
=back
|
|
|
|
|
|
|
|
This library is free software; you can redistribute it and/or modify
|
|
|
|
it under the terms of the GNU General Public License as published by
|
|
|
|
the Free Software Foundation; either version 2, or (at your option)
|
|
|
|
any later version.
|
|
|
|
|
|
|
|
This program is distributed in the hope that it will be useful,
|
|
|
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
GNU General Public License for more details.
|
|
|
|
|
|
|
|
You should have received a copy of the GNU General Public License
|
|
|
|
along with this program. If not, see L<http://www.gnu.org/licenses/>.
|
|
|
|
|
|
|
|
=cut
|
|
|
|
|