initial commit
This commit is contained in:
commit
257912a12f
176
.gitignore
vendored
Normal file
176
.gitignore
vendored
Normal file
@ -0,0 +1,176 @@
|
||||
|
||||
# Created by https://www.gitignore.io/api/linux,python,pycharm
|
||||
|
||||
### Linux ###
|
||||
*~
|
||||
|
||||
# temporary files which can be created if a process still has a handle open of a deleted file
|
||||
.fuse_hidden*
|
||||
|
||||
# KDE directory preferences
|
||||
.directory
|
||||
|
||||
# Linux trash folder which might appear on any partition or disk
|
||||
.Trash-*
|
||||
|
||||
# .nfs files are created when an open file is removed but is still being accessed
|
||||
.nfs*
|
||||
|
||||
### PyCharm ###
|
||||
# Covers JetBrains IDEs: IntelliJ, RubyMine, PhpStorm, AppCode, PyCharm, CLion, Android Studio and Webstorm
|
||||
# Reference: https://intellij-support.jetbrains.com/hc/en-us/articles/206544839
|
||||
|
||||
.idea/
|
||||
|
||||
# User-specific stuff:
|
||||
.idea/**/workspace.xml
|
||||
.idea/**/tasks.xml
|
||||
.idea/dictionaries
|
||||
|
||||
# Sensitive or high-churn files:
|
||||
.idea/**/dataSources/
|
||||
.idea/**/dataSources.ids
|
||||
.idea/**/dataSources.xml
|
||||
.idea/**/dataSources.local.xml
|
||||
.idea/**/sqlDataSources.xml
|
||||
.idea/**/dynamic.xml
|
||||
.idea/**/uiDesigner.xml
|
||||
|
||||
# Gradle:
|
||||
.idea/**/gradle.xml
|
||||
.idea/**/libraries
|
||||
|
||||
# Mongo Explorer plugin:
|
||||
.idea/**/mongoSettings.xml
|
||||
|
||||
## File-based project format:
|
||||
*.iws
|
||||
|
||||
## Plugin-specific files:
|
||||
|
||||
# IntelliJ
|
||||
/out/
|
||||
|
||||
# mpeltonen/sbt-idea plugin
|
||||
.idea_modules/
|
||||
|
||||
# JIRA plugin
|
||||
atlassian-ide-plugin.xml
|
||||
|
||||
# Cursive Clojure plugin
|
||||
.idea/replstate.xml
|
||||
|
||||
# Crashlytics plugin (for Android Studio and IntelliJ)
|
||||
com_crashlytics_export_strings.xml
|
||||
crashlytics.properties
|
||||
crashlytics-build.properties
|
||||
fabric.properties
|
||||
|
||||
### PyCharm Patch ###
|
||||
# Comment Reason: https://github.com/joeblau/gitignore.io/issues/186#issuecomment-215987721
|
||||
|
||||
# *.iml
|
||||
# modules.xml
|
||||
# .idea/misc.xml
|
||||
# *.ipr
|
||||
|
||||
# Sonarlint plugin
|
||||
.idea/sonarlint
|
||||
|
||||
### Python ###
|
||||
# Byte-compiled / optimized / DLL files
|
||||
__pycache__/
|
||||
*.py[cod]
|
||||
*$py.class
|
||||
|
||||
# C extensions
|
||||
*.so
|
||||
|
||||
# Distribution / packaging
|
||||
.Python
|
||||
env/
|
||||
build/
|
||||
develop-eggs/
|
||||
dist/
|
||||
downloads/
|
||||
eggs/
|
||||
.eggs/
|
||||
lib/
|
||||
lib64/
|
||||
parts/
|
||||
sdist/
|
||||
var/
|
||||
wheels/
|
||||
*.egg-info/
|
||||
.installed.cfg
|
||||
*.egg
|
||||
|
||||
# PyInstaller
|
||||
# Usually these files are written by a python script from a template
|
||||
# before PyInstaller builds the exe, so as to inject date/other infos into it.
|
||||
*.manifest
|
||||
*.spec
|
||||
|
||||
# Installer logs
|
||||
pip-log.txt
|
||||
pip-delete-this-directory.txt
|
||||
|
||||
# Unit test / coverage reports
|
||||
htmlcov/
|
||||
.tox/
|
||||
.coverage
|
||||
.coverage.*
|
||||
.cache
|
||||
nosetests.xml
|
||||
coverage.xml
|
||||
*,cover
|
||||
.hypothesis/
|
||||
|
||||
# Translations
|
||||
*.mo
|
||||
*.pot
|
||||
|
||||
# Django stuff:
|
||||
*.log
|
||||
local_settings.py
|
||||
|
||||
# Flask stuff:
|
||||
instance/
|
||||
.webassets-cache
|
||||
|
||||
# Scrapy stuff:
|
||||
.scrapy
|
||||
|
||||
# Sphinx documentation
|
||||
docs/_build/
|
||||
|
||||
# PyBuilder
|
||||
target/
|
||||
|
||||
# Jupyter Notebook
|
||||
.ipynb_checkpoints
|
||||
|
||||
# pyenv
|
||||
.python-version
|
||||
|
||||
# celery beat schedule file
|
||||
celerybeat-schedule
|
||||
|
||||
# SageMath parsed files
|
||||
*.sage.py
|
||||
|
||||
# dotenv
|
||||
.env
|
||||
|
||||
# virtualenv
|
||||
.venv
|
||||
venv/
|
||||
ENV/
|
||||
|
||||
# Spyder project settings
|
||||
.spyderproject
|
||||
|
||||
# Rope project settings
|
||||
.ropeproject
|
||||
|
||||
# End of https://www.gitignore.io/api/linux,python,pycharm
|
661
COPYING
Executable file
661
COPYING
Executable file
@ -0,0 +1,661 @@
|
||||
GNU AFFERO GENERAL PUBLIC LICENSE
|
||||
Version 3, 19 November 2007
|
||||
|
||||
Copyright (C) 2007 Free Software Foundation, Inc. <http://fsf.org/>
|
||||
Everyone is permitted to copy and distribute verbatim copies
|
||||
of this license document, but changing it is not allowed.
|
||||
|
||||
Preamble
|
||||
|
||||
The GNU Affero General Public License is a free, copyleft license for
|
||||
software and other kinds of works, specifically designed to ensure
|
||||
cooperation with the community in the case of network server software.
|
||||
|
||||
The licenses for most software and other practical works are designed
|
||||
to take away your freedom to share and change the works. By contrast,
|
||||
our General Public Licenses are intended to guarantee your freedom to
|
||||
share and change all versions of a program--to make sure it remains free
|
||||
software for all its users.
|
||||
|
||||
When we speak of free software, we are referring to freedom, not
|
||||
price. Our General Public Licenses are designed to make sure that you
|
||||
have the freedom to distribute copies of free software (and charge for
|
||||
them if you wish), that you receive source code or can get it if you
|
||||
want it, that you can change the software or use pieces of it in new
|
||||
free programs, and that you know you can do these things.
|
||||
|
||||
Developers that use our General Public Licenses protect your rights
|
||||
with two steps: (1) assert copyright on the software, and (2) offer
|
||||
you this License which gives you legal permission to copy, distribute
|
||||
and/or modify the software.
|
||||
|
||||
A secondary benefit of defending all users' freedom is that
|
||||
improvements made in alternate versions of the program, if they
|
||||
receive widespread use, become available for other developers to
|
||||
incorporate. Many developers of free software are heartened and
|
||||
encouraged by the resulting cooperation. However, in the case of
|
||||
software used on network servers, this result may fail to come about.
|
||||
The GNU General Public License permits making a modified version and
|
||||
letting the public access it on a server without ever releasing its
|
||||
source code to the public.
|
||||
|
||||
The GNU Affero General Public License is designed specifically to
|
||||
ensure that, in such cases, the modified source code becomes available
|
||||
to the community. It requires the operator of a network server to
|
||||
provide the source code of the modified version running there to the
|
||||
users of that server. Therefore, public use of a modified version, on
|
||||
a publicly accessible server, gives the public access to the source
|
||||
code of the modified version.
|
||||
|
||||
An older license, called the Affero General Public License and
|
||||
published by Affero, was designed to accomplish similar goals. This is
|
||||
a different license, not a version of the Affero GPL, but Affero has
|
||||
released a new version of the Affero GPL which permits relicensing under
|
||||
this license.
|
||||
|
||||
The precise terms and conditions for copying, distribution and
|
||||
modification follow.
|
||||
|
||||
TERMS AND CONDITIONS
|
||||
|
||||
0. Definitions.
|
||||
|
||||
"This License" refers to version 3 of the GNU Affero General Public License.
|
||||
|
||||
"Copyright" also means copyright-like laws that apply to other kinds of
|
||||
works, such as semiconductor masks.
|
||||
|
||||
"The Program" refers to any copyrightable work licensed under this
|
||||
License. Each licensee is addressed as "you". "Licensees" and
|
||||
"recipients" may be individuals or organizations.
|
||||
|
||||
To "modify" a work means to copy from or adapt all or part of the work
|
||||
in a fashion requiring copyright permission, other than the making of an
|
||||
exact copy. The resulting work is called a "modified version" of the
|
||||
earlier work or a work "based on" the earlier work.
|
||||
|
||||
A "covered work" means either the unmodified Program or a work based
|
||||
on the Program.
|
||||
|
||||
To "propagate" a work means to do anything with it that, without
|
||||
permission, would make you directly or secondarily liable for
|
||||
infringement under applicable copyright law, except executing it on a
|
||||
computer or modifying a private copy. Propagation includes copying,
|
||||
distribution (with or without modification), making available to the
|
||||
public, and in some countries other activities as well.
|
||||
|
||||
To "convey" a work means any kind of propagation that enables other
|
||||
parties to make or receive copies. Mere interaction with a user through
|
||||
a computer network, with no transfer of a copy, is not conveying.
|
||||
|
||||
An interactive user interface displays "Appropriate Legal Notices"
|
||||
to the extent that it includes a convenient and prominently visible
|
||||
feature that (1) displays an appropriate copyright notice, and (2)
|
||||
tells the user that there is no warranty for the work (except to the
|
||||
extent that warranties are provided), that licensees may convey the
|
||||
work under this License, and how to view a copy of this License. If
|
||||
the interface presents a list of user commands or options, such as a
|
||||
menu, a prominent item in the list meets this criterion.
|
||||
|
||||
1. Source Code.
|
||||
|
||||
The "source code" for a work means the preferred form of the work
|
||||
for making modifications to it. "Object code" means any non-source
|
||||
form of a work.
|
||||
|
||||
A "Standard Interface" means an interface that either is an official
|
||||
standard defined by a recognized standards body, or, in the case of
|
||||
interfaces specified for a particular programming language, one that
|
||||
is widely used among developers working in that language.
|
||||
|
||||
The "System Libraries" of an executable work include anything, other
|
||||
than the work as a whole, that (a) is included in the normal form of
|
||||
packaging a Major Component, but which is not part of that Major
|
||||
Component, and (b) serves only to enable use of the work with that
|
||||
Major Component, or to implement a Standard Interface for which an
|
||||
implementation is available to the public in source code form. A
|
||||
"Major Component", in this context, means a major essential component
|
||||
(kernel, window system, and so on) of the specific operating system
|
||||
(if any) on which the executable work runs, or a compiler used to
|
||||
produce the work, or an object code interpreter used to run it.
|
||||
|
||||
The "Corresponding Source" for a work in object code form means all
|
||||
the source code needed to generate, install, and (for an executable
|
||||
work) run the object code and to modify the work, including scripts to
|
||||
control those activities. However, it does not include the work's
|
||||
System Libraries, or general-purpose tools or generally available free
|
||||
programs which are used unmodified in performing those activities but
|
||||
which are not part of the work. For example, Corresponding Source
|
||||
includes interface definition files associated with source files for
|
||||
the work, and the source code for shared libraries and dynamically
|
||||
linked subprograms that the work is specifically designed to require,
|
||||
such as by intimate data communication or control flow between those
|
||||
subprograms and other parts of the work.
|
||||
|
||||
The Corresponding Source need not include anything that users
|
||||
can regenerate automatically from other parts of the Corresponding
|
||||
Source.
|
||||
|
||||
The Corresponding Source for a work in source code form is that
|
||||
same work.
|
||||
|
||||
2. Basic Permissions.
|
||||
|
||||
All rights granted under this License are granted for the term of
|
||||
copyright on the Program, and are irrevocable provided the stated
|
||||
conditions are met. This License explicitly affirms your unlimited
|
||||
permission to run the unmodified Program. The output from running a
|
||||
covered work is covered by this License only if the output, given its
|
||||
content, constitutes a covered work. This License acknowledges your
|
||||
rights of fair use or other equivalent, as provided by copyright law.
|
||||
|
||||
You may make, run and propagate covered works that you do not
|
||||
convey, without conditions so long as your license otherwise remains
|
||||
in force. You may convey covered works to others for the sole purpose
|
||||
of having them make modifications exclusively for you, or provide you
|
||||
with facilities for running those works, provided that you comply with
|
||||
the terms of this License in conveying all material for which you do
|
||||
not control copyright. Those thus making or running the covered works
|
||||
for you must do so exclusively on your behalf, under your direction
|
||||
and control, on terms that prohibit them from making any copies of
|
||||
your copyrighted material outside their relationship with you.
|
||||
|
||||
Conveying under any other circumstances is permitted solely under
|
||||
the conditions stated below. Sublicensing is not allowed; section 10
|
||||
makes it unnecessary.
|
||||
|
||||
3. Protecting Users' Legal Rights From Anti-Circumvention Law.
|
||||
|
||||
No covered work shall be deemed part of an effective technological
|
||||
measure under any applicable law fulfilling obligations under article
|
||||
11 of the WIPO copyright treaty adopted on 20 December 1996, or
|
||||
similar laws prohibiting or restricting circumvention of such
|
||||
measures.
|
||||
|
||||
When you convey a covered work, you waive any legal power to forbid
|
||||
circumvention of technological measures to the extent such circumvention
|
||||
is effected by exercising rights under this License with respect to
|
||||
the covered work, and you disclaim any intention to limit operation or
|
||||
modification of the work as a means of enforcing, against the work's
|
||||
users, your or third parties' legal rights to forbid circumvention of
|
||||
technological measures.
|
||||
|
||||
4. Conveying Verbatim Copies.
|
||||
|
||||
You may convey verbatim copies of the Program's source code as you
|
||||
receive it, in any medium, provided that you conspicuously and
|
||||
appropriately publish on each copy an appropriate copyright notice;
|
||||
keep intact all notices stating that this License and any
|
||||
non-permissive terms added in accord with section 7 apply to the code;
|
||||
keep intact all notices of the absence of any warranty; and give all
|
||||
recipients a copy of this License along with the Program.
|
||||
|
||||
You may charge any price or no price for each copy that you convey,
|
||||
and you may offer support or warranty protection for a fee.
|
||||
|
||||
5. Conveying Modified Source Versions.
|
||||
|
||||
You may convey a work based on the Program, or the modifications to
|
||||
produce it from the Program, in the form of source code under the
|
||||
terms of section 4, provided that you also meet all of these conditions:
|
||||
|
||||
a) The work must carry prominent notices stating that you modified
|
||||
it, and giving a relevant date.
|
||||
|
||||
b) The work must carry prominent notices stating that it is
|
||||
released under this License and any conditions added under section
|
||||
7. This requirement modifies the requirement in section 4 to
|
||||
"keep intact all notices".
|
||||
|
||||
c) You must license the entire work, as a whole, under this
|
||||
License to anyone who comes into possession of a copy. This
|
||||
License will therefore apply, along with any applicable section 7
|
||||
additional terms, to the whole of the work, and all its parts,
|
||||
regardless of how they are packaged. This License gives no
|
||||
permission to license the work in any other way, but it does not
|
||||
invalidate such permission if you have separately received it.
|
||||
|
||||
d) If the work has interactive user interfaces, each must display
|
||||
Appropriate Legal Notices; however, if the Program has interactive
|
||||
interfaces that do not display Appropriate Legal Notices, your
|
||||
work need not make them do so.
|
||||
|
||||
A compilation of a covered work with other separate and independent
|
||||
works, which are not by their nature extensions of the covered work,
|
||||
and which are not combined with it such as to form a larger program,
|
||||
in or on a volume of a storage or distribution medium, is called an
|
||||
"aggregate" if the compilation and its resulting copyright are not
|
||||
used to limit the access or legal rights of the compilation's users
|
||||
beyond what the individual works permit. Inclusion of a covered work
|
||||
in an aggregate does not cause this License to apply to the other
|
||||
parts of the aggregate.
|
||||
|
||||
6. Conveying Non-Source Forms.
|
||||
|
||||
You may convey a covered work in object code form under the terms
|
||||
of sections 4 and 5, provided that you also convey the
|
||||
machine-readable Corresponding Source under the terms of this License,
|
||||
in one of these ways:
|
||||
|
||||
a) Convey the object code in, or embodied in, a physical product
|
||||
(including a physical distribution medium), accompanied by the
|
||||
Corresponding Source fixed on a durable physical medium
|
||||
customarily used for software interchange.
|
||||
|
||||
b) Convey the object code in, or embodied in, a physical product
|
||||
(including a physical distribution medium), accompanied by a
|
||||
written offer, valid for at least three years and valid for as
|
||||
long as you offer spare parts or customer support for that product
|
||||
model, to give anyone who possesses the object code either (1) a
|
||||
copy of the Corresponding Source for all the software in the
|
||||
product that is covered by this License, on a durable physical
|
||||
medium customarily used for software interchange, for a price no
|
||||
more than your reasonable cost of physically performing this
|
||||
conveying of source, or (2) access to copy the
|
||||
Corresponding Source from a network server at no charge.
|
||||
|
||||
c) Convey individual copies of the object code with a copy of the
|
||||
written offer to provide the Corresponding Source. This
|
||||
alternative is allowed only occasionally and noncommercially, and
|
||||
only if you received the object code with such an offer, in accord
|
||||
with subsection 6b.
|
||||
|
||||
d) Convey the object code by offering access from a designated
|
||||
place (gratis or for a charge), and offer equivalent access to the
|
||||
Corresponding Source in the same way through the same place at no
|
||||
further charge. You need not require recipients to copy the
|
||||
Corresponding Source along with the object code. If the place to
|
||||
copy the object code is a network server, the Corresponding Source
|
||||
may be on a different server (operated by you or a third party)
|
||||
that supports equivalent copying facilities, provided you maintain
|
||||
clear directions next to the object code saying where to find the
|
||||
Corresponding Source. Regardless of what server hosts the
|
||||
Corresponding Source, you remain obligated to ensure that it is
|
||||
available for as long as needed to satisfy these requirements.
|
||||
|
||||
e) Convey the object code using peer-to-peer transmission, provided
|
||||
you inform other peers where the object code and Corresponding
|
||||
Source of the work are being offered to the general public at no
|
||||
charge under subsection 6d.
|
||||
|
||||
A separable portion of the object code, whose source code is excluded
|
||||
from the Corresponding Source as a System Library, need not be
|
||||
included in conveying the object code work.
|
||||
|
||||
A "User Product" is either (1) a "consumer product", which means any
|
||||
tangible personal property which is normally used for personal, family,
|
||||
or household purposes, or (2) anything designed or sold for incorporation
|
||||
into a dwelling. In determining whether a product is a consumer product,
|
||||
doubtful cases shall be resolved in favor of coverage. For a particular
|
||||
product received by a particular user, "normally used" refers to a
|
||||
typical or common use of that class of product, regardless of the status
|
||||
of the particular user or of the way in which the particular user
|
||||
actually uses, or expects or is expected to use, the product. A product
|
||||
is a consumer product regardless of whether the product has substantial
|
||||
commercial, industrial or non-consumer uses, unless such uses represent
|
||||
the only significant mode of use of the product.
|
||||
|
||||
"Installation Information" for a User Product means any methods,
|
||||
procedures, authorization keys, or other information required to install
|
||||
and execute modified versions of a covered work in that User Product from
|
||||
a modified version of its Corresponding Source. The information must
|
||||
suffice to ensure that the continued functioning of the modified object
|
||||
code is in no case prevented or interfered with solely because
|
||||
modification has been made.
|
||||
|
||||
If you convey an object code work under this section in, or with, or
|
||||
specifically for use in, a User Product, and the conveying occurs as
|
||||
part of a transaction in which the right of possession and use of the
|
||||
User Product is transferred to the recipient in perpetuity or for a
|
||||
fixed term (regardless of how the transaction is characterized), the
|
||||
Corresponding Source conveyed under this section must be accompanied
|
||||
by the Installation Information. But this requirement does not apply
|
||||
if neither you nor any third party retains the ability to install
|
||||
modified object code on the User Product (for example, the work has
|
||||
been installed in ROM).
|
||||
|
||||
The requirement to provide Installation Information does not include a
|
||||
requirement to continue to provide support service, warranty, or updates
|
||||
for a work that has been modified or installed by the recipient, or for
|
||||
the User Product in which it has been modified or installed. Access to a
|
||||
network may be denied when the modification itself materially and
|
||||
adversely affects the operation of the network or violates the rules and
|
||||
protocols for communication across the network.
|
||||
|
||||
Corresponding Source conveyed, and Installation Information provided,
|
||||
in accord with this section must be in a format that is publicly
|
||||
documented (and with an implementation available to the public in
|
||||
source code form), and must require no special password or key for
|
||||
unpacking, reading or copying.
|
||||
|
||||
7. Additional Terms.
|
||||
|
||||
"Additional permissions" are terms that supplement the terms of this
|
||||
License by making exceptions from one or more of its conditions.
|
||||
Additional permissions that are applicable to the entire Program shall
|
||||
be treated as though they were included in this License, to the extent
|
||||
that they are valid under applicable law. If additional permissions
|
||||
apply only to part of the Program, that part may be used separately
|
||||
under those permissions, but the entire Program remains governed by
|
||||
this License without regard to the additional permissions.
|
||||
|
||||
When you convey a copy of a covered work, you may at your option
|
||||
remove any additional permissions from that copy, or from any part of
|
||||
it. (Additional permissions may be written to require their own
|
||||
removal in certain cases when you modify the work.) You may place
|
||||
additional permissions on material, added by you to a covered work,
|
||||
for which you have or can give appropriate copyright permission.
|
||||
|
||||
Notwithstanding any other provision of this License, for material you
|
||||
add to a covered work, you may (if authorized by the copyright holders of
|
||||
that material) supplement the terms of this License with terms:
|
||||
|
||||
a) Disclaiming warranty or limiting liability differently from the
|
||||
terms of sections 15 and 16 of this License; or
|
||||
|
||||
b) Requiring preservation of specified reasonable legal notices or
|
||||
author attributions in that material or in the Appropriate Legal
|
||||
Notices displayed by works containing it; or
|
||||
|
||||
c) Prohibiting misrepresentation of the origin of that material, or
|
||||
requiring that modified versions of such material be marked in
|
||||
reasonable ways as different from the original version; or
|
||||
|
||||
d) Limiting the use for publicity purposes of names of licensors or
|
||||
authors of the material; or
|
||||
|
||||
e) Declining to grant rights under trademark law for use of some
|
||||
trade names, trademarks, or service marks; or
|
||||
|
||||
f) Requiring indemnification of licensors and authors of that
|
||||
material by anyone who conveys the material (or modified versions of
|
||||
it) with contractual assumptions of liability to the recipient, for
|
||||
any liability that these contractual assumptions directly impose on
|
||||
those licensors and authors.
|
||||
|
||||
All other non-permissive additional terms are considered "further
|
||||
restrictions" within the meaning of section 10. If the Program as you
|
||||
received it, or any part of it, contains a notice stating that it is
|
||||
governed by this License along with a term that is a further
|
||||
restriction, you may remove that term. If a license document contains
|
||||
a further restriction but permits relicensing or conveying under this
|
||||
License, you may add to a covered work material governed by the terms
|
||||
of that license document, provided that the further restriction does
|
||||
not survive such relicensing or conveying.
|
||||
|
||||
If you add terms to a covered work in accord with this section, you
|
||||
must place, in the relevant source files, a statement of the
|
||||
additional terms that apply to those files, or a notice indicating
|
||||
where to find the applicable terms.
|
||||
|
||||
Additional terms, permissive or non-permissive, may be stated in the
|
||||
form of a separately written license, or stated as exceptions;
|
||||
the above requirements apply either way.
|
||||
|
||||
8. Termination.
|
||||
|
||||
You may not propagate or modify a covered work except as expressly
|
||||
provided under this License. Any attempt otherwise to propagate or
|
||||
modify it is void, and will automatically terminate your rights under
|
||||
this License (including any patent licenses granted under the third
|
||||
paragraph of section 11).
|
||||
|
||||
However, if you cease all violation of this License, then your
|
||||
license from a particular copyright holder is reinstated (a)
|
||||
provisionally, unless and until the copyright holder explicitly and
|
||||
finally terminates your license, and (b) permanently, if the copyright
|
||||
holder fails to notify you of the violation by some reasonable means
|
||||
prior to 60 days after the cessation.
|
||||
|
||||
Moreover, your license from a particular copyright holder is
|
||||
reinstated permanently if the copyright holder notifies you of the
|
||||
violation by some reasonable means, this is the first time you have
|
||||
received notice of violation of this License (for any work) from that
|
||||
copyright holder, and you cure the violation prior to 30 days after
|
||||
your receipt of the notice.
|
||||
|
||||
Termination of your rights under this section does not terminate the
|
||||
licenses of parties who have received copies or rights from you under
|
||||
this License. If your rights have been terminated and not permanently
|
||||
reinstated, you do not qualify to receive new licenses for the same
|
||||
material under section 10.
|
||||
|
||||
9. Acceptance Not Required for Having Copies.
|
||||
|
||||
You are not required to accept this License in order to receive or
|
||||
run a copy of the Program. Ancillary propagation of a covered work
|
||||
occurring solely as a consequence of using peer-to-peer transmission
|
||||
to receive a copy likewise does not require acceptance. However,
|
||||
nothing other than this License grants you permission to propagate or
|
||||
modify any covered work. These actions infringe copyright if you do
|
||||
not accept this License. Therefore, by modifying or propagating a
|
||||
covered work, you indicate your acceptance of this License to do so.
|
||||
|
||||
10. Automatic Licensing of Downstream Recipients.
|
||||
|
||||
Each time you convey a covered work, the recipient automatically
|
||||
receives a license from the original licensors, to run, modify and
|
||||
propagate that work, subject to this License. You are not responsible
|
||||
for enforcing compliance by third parties with this License.
|
||||
|
||||
An "entity transaction" is a transaction transferring control of an
|
||||
organization, or substantially all assets of one, or subdividing an
|
||||
organization, or merging organizations. If propagation of a covered
|
||||
work results from an entity transaction, each party to that
|
||||
transaction who receives a copy of the work also receives whatever
|
||||
licenses to the work the party's predecessor in interest had or could
|
||||
give under the previous paragraph, plus a right to possession of the
|
||||
Corresponding Source of the work from the predecessor in interest, if
|
||||
the predecessor has it or can get it with reasonable efforts.
|
||||
|
||||
You may not impose any further restrictions on the exercise of the
|
||||
rights granted or affirmed under this License. For example, you may
|
||||
not impose a license fee, royalty, or other charge for exercise of
|
||||
rights granted under this License, and you may not initiate litigation
|
||||
(including a cross-claim or counterclaim in a lawsuit) alleging that
|
||||
any patent claim is infringed by making, using, selling, offering for
|
||||
sale, or importing the Program or any portion of it.
|
||||
|
||||
11. Patents.
|
||||
|
||||
A "contributor" is a copyright holder who authorizes use under this
|
||||
License of the Program or a work on which the Program is based. The
|
||||
work thus licensed is called the contributor's "contributor version".
|
||||
|
||||
A contributor's "essential patent claims" are all patent claims
|
||||
owned or controlled by the contributor, whether already acquired or
|
||||
hereafter acquired, that would be infringed by some manner, permitted
|
||||
by this License, of making, using, or selling its contributor version,
|
||||
but do not include claims that would be infringed only as a
|
||||
consequence of further modification of the contributor version. For
|
||||
purposes of this definition, "control" includes the right to grant
|
||||
patent sublicenses in a manner consistent with the requirements of
|
||||
this License.
|
||||
|
||||
Each contributor grants you a non-exclusive, worldwide, royalty-free
|
||||
patent license under the contributor's essential patent claims, to
|
||||
make, use, sell, offer for sale, import and otherwise run, modify and
|
||||
propagate the contents of its contributor version.
|
||||
|
||||
In the following three paragraphs, a "patent license" is any express
|
||||
agreement or commitment, however denominated, not to enforce a patent
|
||||
(such as an express permission to practice a patent or covenant not to
|
||||
sue for patent infringement). To "grant" such a patent license to a
|
||||
party means to make such an agreement or commitment not to enforce a
|
||||
patent against the party.
|
||||
|
||||
If you convey a covered work, knowingly relying on a patent license,
|
||||
and the Corresponding Source of the work is not available for anyone
|
||||
to copy, free of charge and under the terms of this License, through a
|
||||
publicly available network server or other readily accessible means,
|
||||
then you must either (1) cause the Corresponding Source to be so
|
||||
available, or (2) arrange to deprive yourself of the benefit of the
|
||||
patent license for this particular work, or (3) arrange, in a manner
|
||||
consistent with the requirements of this License, to extend the patent
|
||||
license to downstream recipients. "Knowingly relying" means you have
|
||||
actual knowledge that, but for the patent license, your conveying the
|
||||
covered work in a country, or your recipient's use of the covered work
|
||||
in a country, would infringe one or more identifiable patents in that
|
||||
country that you have reason to believe are valid.
|
||||
|
||||
If, pursuant to or in connection with a single transaction or
|
||||
arrangement, you convey, or propagate by procuring conveyance of, a
|
||||
covered work, and grant a patent license to some of the parties
|
||||
receiving the covered work authorizing them to use, propagate, modify
|
||||
or convey a specific copy of the covered work, then the patent license
|
||||
you grant is automatically extended to all recipients of the covered
|
||||
work and works based on it.
|
||||
|
||||
A patent license is "discriminatory" if it does not include within
|
||||
the scope of its coverage, prohibits the exercise of, or is
|
||||
conditioned on the non-exercise of one or more of the rights that are
|
||||
specifically granted under this License. You may not convey a covered
|
||||
work if you are a party to an arrangement with a third party that is
|
||||
in the business of distributing software, under which you make payment
|
||||
to the third party based on the extent of your activity of conveying
|
||||
the work, and under which the third party grants, to any of the
|
||||
parties who would receive the covered work from you, a discriminatory
|
||||
patent license (a) in connection with copies of the covered work
|
||||
conveyed by you (or copies made from those copies), or (b) primarily
|
||||
for and in connection with specific products or compilations that
|
||||
contain the covered work, unless you entered into that arrangement,
|
||||
or that patent license was granted, prior to 28 March 2007.
|
||||
|
||||
Nothing in this License shall be construed as excluding or limiting
|
||||
any implied license or other defenses to infringement that may
|
||||
otherwise be available to you under applicable patent law.
|
||||
|
||||
12. No Surrender of Others' Freedom.
|
||||
|
||||
If conditions are imposed on you (whether by court order, agreement or
|
||||
otherwise) that contradict the conditions of this License, they do not
|
||||
excuse you from the conditions of this License. If you cannot convey a
|
||||
covered work so as to satisfy simultaneously your obligations under this
|
||||
License and any other pertinent obligations, then as a consequence you may
|
||||
not convey it at all. For example, if you agree to terms that obligate you
|
||||
to collect a royalty for further conveying from those to whom you convey
|
||||
the Program, the only way you could satisfy both those terms and this
|
||||
License would be to refrain entirely from conveying the Program.
|
||||
|
||||
13. Remote Network Interaction; Use with the GNU General Public License.
|
||||
|
||||
Notwithstanding any other provision of this License, if you modify the
|
||||
Program, your modified version must prominently offer all users
|
||||
interacting with it remotely through a computer network (if your version
|
||||
supports such interaction) an opportunity to receive the Corresponding
|
||||
Source of your version by providing access to the Corresponding Source
|
||||
from a network server at no charge, through some standard or customary
|
||||
means of facilitating copying of software. This Corresponding Source
|
||||
shall include the Corresponding Source for any work covered by version 3
|
||||
of the GNU General Public License that is incorporated pursuant to the
|
||||
following paragraph.
|
||||
|
||||
Notwithstanding any other provision of this License, you have
|
||||
permission to link or combine any covered work with a work licensed
|
||||
under version 3 of the GNU General Public License into a single
|
||||
combined work, and to convey the resulting work. The terms of this
|
||||
License will continue to apply to the part which is the covered work,
|
||||
but the work with which it is combined will remain governed by version
|
||||
3 of the GNU General Public License.
|
||||
|
||||
14. Revised Versions of this License.
|
||||
|
||||
The Free Software Foundation may publish revised and/or new versions of
|
||||
the GNU Affero General Public License from time to time. Such new versions
|
||||
will be similar in spirit to the present version, but may differ in detail to
|
||||
address new problems or concerns.
|
||||
|
||||
Each version is given a distinguishing version number. If the
|
||||
Program specifies that a certain numbered version of the GNU Affero General
|
||||
Public License "or any later version" applies to it, you have the
|
||||
option of following the terms and conditions either of that numbered
|
||||
version or of any later version published by the Free Software
|
||||
Foundation. If the Program does not specify a version number of the
|
||||
GNU Affero General Public License, you may choose any version ever published
|
||||
by the Free Software Foundation.
|
||||
|
||||
If the Program specifies that a proxy can decide which future
|
||||
versions of the GNU Affero General Public License can be used, that proxy's
|
||||
public statement of acceptance of a version permanently authorizes you
|
||||
to choose that version for the Program.
|
||||
|
||||
Later license versions may give you additional or different
|
||||
permissions. However, no additional obligations are imposed on any
|
||||
author or copyright holder as a result of your choosing to follow a
|
||||
later version.
|
||||
|
||||
15. Disclaimer of Warranty.
|
||||
|
||||
THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY
|
||||
APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT
|
||||
HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY
|
||||
OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO,
|
||||
THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
|
||||
PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM
|
||||
IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF
|
||||
ALL NECESSARY SERVICING, REPAIR OR CORRECTION.
|
||||
|
||||
16. Limitation of Liability.
|
||||
|
||||
IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING
|
||||
WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MODIFIES AND/OR CONVEYS
|
||||
THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY
|
||||
GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE
|
||||
USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF
|
||||
DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD
|
||||
PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS),
|
||||
EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF
|
||||
SUCH DAMAGES.
|
||||
|
||||
17. Interpretation of Sections 15 and 16.
|
||||
|
||||
If the disclaimer of warranty and limitation of liability provided
|
||||
above cannot be given local legal effect according to their terms,
|
||||
reviewing courts shall apply local law that most closely approximates
|
||||
an absolute waiver of all civil liability in connection with the
|
||||
Program, unless a warranty or assumption of liability accompanies a
|
||||
copy of the Program in return for a fee.
|
||||
|
||||
END OF TERMS AND CONDITIONS
|
||||
|
||||
How to Apply These Terms to Your New Programs
|
||||
|
||||
If you develop a new program, and you want it to be of the greatest
|
||||
possible use to the public, the best way to achieve this is to make it
|
||||
free software which everyone can redistribute and change under these terms.
|
||||
|
||||
To do so, attach the following notices to the program. It is safest
|
||||
to attach them to the start of each source file to most effectively
|
||||
state the exclusion of warranty; and each file should have at least
|
||||
the "copyright" line and a pointer to where the full notice is found.
|
||||
|
||||
<one line to give the program's name and a brief idea of what it does.>
|
||||
Copyright (C) <year> <name of author>
|
||||
|
||||
This program is free software: you can redistribute it and/or modify
|
||||
it under the terms of the GNU Affero General Public License as published by
|
||||
the Free Software Foundation, either version 3 of the License, or
|
||||
(at your option) any later version.
|
||||
|
||||
This program is distributed in the hope that it will be useful,
|
||||
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||
GNU Affero General Public License for more details.
|
||||
|
||||
You should have received a copy of the GNU Affero General Public License
|
||||
along with this program. If not, see <http://www.gnu.org/licenses/>.
|
||||
|
||||
Also add information on how to contact you by electronic and paper mail.
|
||||
|
||||
If your software can interact with users remotely through a computer
|
||||
network, you should also make sure that it provides a way for users to
|
||||
get its source. For example, if your program is a web application, its
|
||||
interface could display a "Source" link that leads users to an archive
|
||||
of the code. There are many ways you could offer source, and different
|
||||
solutions will be better for different programs; see section 13 for the
|
||||
specific requirements.
|
||||
|
||||
You should also get your employer (if you work as a programmer) or school,
|
||||
if any, to sign a "copyright disclaimer" for the program, if necessary.
|
||||
For more information on this, and how to apply and follow the GNU AGPL, see
|
||||
<http://www.gnu.org/licenses/>.
|
83
README.rst
Executable file
83
README.rst
Executable file
@ -0,0 +1,83 @@
|
||||
=========
|
||||
magnetico
|
||||
=========
|
||||
*Autonomous (self-hosted) BitTorrent DHT search engine suite.*
|
||||
|
||||
magnetico is the first autonomous (self-hosted) BitTorrent DHT search engine suite that is *designed for end-users*.
|
||||
The suite consists of two packages:
|
||||
|
||||
* **magneticod:** Autonomous BitTorrent DHT crawler and metadata fetcher.
|
||||
* **magneticow:** Lightweight web interface for magnetico.
|
||||
|
||||
Both programs, combined together, allows anyone with a decent Internet connection to access the vast amount of torrents
|
||||
waiting to be discovered within the BitTorrent DHT space, *without relying on any central entity*.
|
||||
|
||||
**magnetico** liberates BitTorrent from the yoke of centralised trackers & web-sites and makes it *truly
|
||||
decentralised*. Finally!
|
||||
|
||||
Features
|
||||
========
|
||||
- Easy installation & minimal requirements:
|
||||
|
||||
- Python 3.5+ and a few Python packages that is available on PyPI.
|
||||
- Root access is *not* required to install.
|
||||
- Near-zero configuration:
|
||||
|
||||
- magneticod works out of the box, and magneticow requires minimal configuration to work with the web server you choose.
|
||||
- Detailed, step-by-step manual to guide you through the installation.
|
||||
- No reliance on any centralised entity:
|
||||
|
||||
- **magneticod** crawls the BitTorrent DHT by "going" from one node to another, and fetches the metadata using the nodes without using trackers.
|
||||
- Resilience:
|
||||
|
||||
- Unlike client-server model that web applications use, P2P networks are *chaotic* and **magneticod** is designed to handle all the operational errors accordingly.
|
||||
|
||||
- High performance implementation:
|
||||
|
||||
- **magneticod** utilizes every bit of your bandwidth to discover as many infohashes & metadata as possible.
|
||||
- Built-in lightweight web interface:
|
||||
|
||||
- **magneticow** features a lightweight web interface to help you access the database without getting on your way.
|
||||
|
||||
Why?
|
||||
====
|
||||
BitTorrent, being a distributed P2P file sharing protocol, has long suffered because of the centralised entities that
|
||||
people dependent on for searching torrents (websites) and for discovering other peers (trackers). Introduction of DHT
|
||||
(distributed hash table) eliminated the need for trackers, allowing peers to discover peers through other peers and to
|
||||
fetch metadata from the leechers & seeders in the network. **magnetico** is the finishing move that allows users to
|
||||
search for torrents in the network & removes the need for torrent websites.
|
||||
|
||||
Installation Instructions
|
||||
=========================
|
||||
**WARNING:**
|
||||
|
||||
**magnetico** is still under active construction, and is considered *pre-alpha* software. Please use **magnetico**
|
||||
suite with care and follow the installation instructions carefully to install it & secure the installation. Feel
|
||||
perfectly free to send bug reports, suggestions, or whatever comes to your mind to send to us through GitHub or
|
||||
personal e-mail.
|
||||
\
|
||||
|
||||
**WARNING:**
|
||||
|
||||
**magnetico** currently does NOT have any filtering system NOR it allows individual torrents to be removed from the
|
||||
database, and BitTorrent DHT network is full of the materials that are considered illegal in many countries
|
||||
(violence, pornography, copyright infringing content, and even child-pornography). If you are afraid of the legal
|
||||
consequences, or simply morally against (indirectly) assisting those content to spread around, follow the
|
||||
**magneticow** installation instructions carefully to password-protect the web-interface from others.
|
||||
|
||||
1. Install **magneticod** first by following its
|
||||
`installation instruction <magneticod/README.rst>`_.
|
||||
2. Install **magneticow** first by following its
|
||||
`installation instruction <magneticow/README.rst>`_.
|
||||
|
||||
|
||||
License
|
||||
=======
|
||||
All the code is licensed under AGPLv3, unless otherwise stated in the source specific source. See ``COPYING`` file for
|
||||
the full license text.
|
||||
|
||||
----
|
||||
|
||||
Dedicated to Cemile Binay, in whose hands I thrived.
|
||||
|
||||
Bora M. ALPER <bora@boramalper.org>
|
147
magneticod/README.rst
Normal file
147
magneticod/README.rst
Normal file
@ -0,0 +1,147 @@
|
||||
==========
|
||||
magneticod
|
||||
==========
|
||||
*Autonomous BitTorrent DHT crawler and metadata fetcher.*
|
||||
|
||||
**magneticod** is the daemon that crawls the BitTorrent DHT network in the background to discover info hashes and
|
||||
fetches metadata from the peers. It uses SQLite 3 that is built-in your Python 3.x distribution to persist data.
|
||||
|
||||
Installation
|
||||
============
|
||||
Requirements
|
||||
------------
|
||||
- Python 3.5 or above.
|
||||
|
||||
**WARNING:**
|
||||
|
||||
Python 3.6.0 and 3.6.1 suffer from a bug (`issue #29714 <http://bugs.python.org/issue29714>`_) that causes
|
||||
magneticod to fail. As it is an interpreter bug that I have no control on, please make sure that you are not using
|
||||
any of those Python 3 versions to run magneticod.
|
||||
|
||||
- Decent Internet access (IPv4)
|
||||
|
||||
**magneticod** uses UDP protocol to communicate with the nodes in the DHT network, and TCP to communicate with the
|
||||
peers while fetching metadata. **Please make sure you have a healthy connection;** you can confirm this by checking at
|
||||
the *connection status indicator* of your BitTorrent client: if it does not indicate any error, **magneticod** should
|
||||
just work fine.
|
||||
|
||||
Instructions
|
||||
------------
|
||||
1. Download the latest version of **magneticod** from PyPI using pip3: ::
|
||||
|
||||
pip3 install magneticod
|
||||
|
||||
2. Add installation path to the ``$PATH``; append the following line to your ``~/.bashrc`` ::
|
||||
|
||||
export PATH=$PATH:~/.local/bin
|
||||
|
||||
3. Activate the changes to ``$PATH``: ::
|
||||
|
||||
source ~/.bashrc
|
||||
|
||||
4. Confirm that it is running: ::
|
||||
|
||||
magneticod
|
||||
|
||||
Within maximum 5 minutes (and usually under a minute) **magneticod** will discover a few torrents! This, of course,
|
||||
depends on your bandwidth, and your network configuration (existence of a firewall, misconfigured NAT, etc.).
|
||||
|
||||
5. *(only for systemd users, skip the rest of the steps and proceed to the* `Using`_ *section if you are not a systemd
|
||||
user or want to use a different solution)*
|
||||
|
||||
Download the magneticod systemd service file (at
|
||||
`magneticod/systemd/magneticod.service <systemd/magneticod.service>`_) and change the tilde symbol with
|
||||
the path of your home directory. For example, if my username is ``bora``, this line ::
|
||||
|
||||
ExecStart=~/.local/bin/magneticod
|
||||
|
||||
should become this: ::
|
||||
|
||||
ExecStart=/home/bora/.local/bin/magneticod
|
||||
|
||||
Here, tilde (``~``) is replaced with ``/home/bora``. Run ``echo ~`` to see the path of your own home directory, if
|
||||
you do not already know.
|
||||
|
||||
6. Copy the magneticod systemd service file to your local systemd configuration directory: ::
|
||||
|
||||
cp magneticod.service ~/.config/systemd/user/
|
||||
|
||||
You might need to create intermediate directories (``.config``, ``systemd``, and ``user``) if not exists.
|
||||
|
||||
7. Start **magneticod**: ::
|
||||
|
||||
systemctl --user start magneticod
|
||||
|
||||
**magneticod** should now be running under the supervision of systemd and it should also be automatically started
|
||||
whenever you boot your machine.
|
||||
|
||||
You can check its status and most recent log entries using the following command: ::
|
||||
|
||||
systemctl --user status magneticod
|
||||
|
||||
To stop **magneticod**, issue the following: ::
|
||||
|
||||
systemctl --user stop magneticod
|
||||
\
|
||||
|
||||
**Suggestion:**
|
||||
|
||||
Keep **magneticod** running so that when you finish installing **magneticow**, database will be populated and you
|
||||
can see some results.
|
||||
|
||||
Using
|
||||
=====
|
||||
**magneticod** does not require user interference to operate, once it starts running. Hence, there is no "user manual",
|
||||
although you should beware of these points:
|
||||
|
||||
1. **Network Usage:**
|
||||
|
||||
**magneticod** does *not* have any built-in rate limiter *yet*, and it will literally suck the hell out of your
|
||||
bandwidth. Unless you are running **magneticod** on a separate machine dedicated for it, you might want to consider
|
||||
starting it manually only when network load is low (e.g. when you are at work or sleeping at night).
|
||||
|
||||
2. **Pre-Alpha Bugs:**
|
||||
|
||||
**magneticod** is *supposed* to work "just fine", but as being at pre-alpha stage, it's likely that you might find
|
||||
some bugs. It will be much appreciated if you can report those bugs, so that **magneticod** can be improved. See the
|
||||
next sub-section for how to mitigate the issue if you are *not* using systemd.
|
||||
|
||||
Automatic Restarting
|
||||
--------------------
|
||||
Due to minor bugs at this stage of its development, **magneticod** should be supervised by another program to be ensured
|
||||
that it's running, and should be restarted if not. systemd service file supplied by **magneticod** implements that,
|
||||
although (if you wish) you can also use a much more primitive approach using GNU screen (which comes pre-installed in
|
||||
many GNU/Linux distributions):
|
||||
|
||||
1. Start screen session named ``magneticod``: ::
|
||||
|
||||
screen -S magneticod
|
||||
|
||||
2. Run **magneticod** forever: ::
|
||||
|
||||
until magneticod; do echo "restarting..."; sleep 5; done;
|
||||
|
||||
This will keep restarting **magneticod** after five seconds in case if it fails.
|
||||
|
||||
3. Detach the session by pressing Ctrl+A and after Ctrl+D.
|
||||
|
||||
4. If you wish to see the logs, or to kill **magneticod**, ``screen -r magneticod`` will attach the original screen
|
||||
session back. **magneticod** will exit gracefully upon keyboard interrupt (Ctrl+C) [SIGINT].
|
||||
|
||||
Database
|
||||
--------
|
||||
**magneticod** uses SQLite 3 that is built-in by default in almost all Python distributions.
|
||||
`appdirs <https://pypi.python.org/pypi/appdirs/>`_ package is used to determine user data directory, which is often
|
||||
``~/.local/share/magneticod``. **magneticod** uses write-ahead logging for its database, so there might be multiple
|
||||
files while it is operating, but ``database.sqlite3`` is *the main database where every torrent metadata is stored*.
|
||||
|
||||
License
|
||||
=======
|
||||
All the code is licensed under AGPLv3, unless otherwise stated in the source specific source. See ``COPYING`` file
|
||||
in ``magnetico`` directory for the full license text.
|
||||
|
||||
----
|
||||
|
||||
Dedicated to Cemile Binay, in whose hands I thrived.
|
||||
|
||||
Bora M. ALPER <bora@boramalper.org>
|
15
magneticod/magneticod/__init__.py
Normal file
15
magneticod/magneticod/__init__.py
Normal file
@ -0,0 +1,15 @@
|
||||
# magneticod - Autonomous BitTorrent DHT crawler and metadata fetcher.
|
||||
# Copyright (C) 2017 Mert Bora ALPER <bora@boramalper.org>
|
||||
# Dedicated to Cemile Binay, in whose hands I thrived.
|
||||
#
|
||||
# This program is free software: you can redistribute it and/or modify it under the terms of the GNU Affero General
|
||||
# Public License as published by the Free Software Foundation, either version 3 of the License, or (at your option) any
|
||||
# later version.
|
||||
#
|
||||
# This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied
|
||||
# warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU Affero General Public License for more
|
||||
# details.
|
||||
#
|
||||
# You should have received a copy of the GNU Affero General Public License along with this program. If not, see
|
||||
# <http://www.gnu.org/licenses/>.
|
||||
__version__ = (0, 1, 0)
|
159
magneticod/magneticod/__main__.py
Normal file
159
magneticod/magneticod/__main__.py
Normal file
@ -0,0 +1,159 @@
|
||||
# magneticod - Autonomous BitTorrent DHT crawler and metadata fetcher.
|
||||
# Copyright (C) 2017 Mert Bora ALPER <bora@boramalper.org>
|
||||
# Dedicated to Cemile Binay, in whose hands I thrived.
|
||||
#
|
||||
# This program is free software: you can redistribute it and/or modify it under the terms of the GNU Affero General
|
||||
# Public License as published by the Free Software Foundation, either version 3 of the License, or (at your option) any
|
||||
# later version.
|
||||
#
|
||||
# This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied
|
||||
# warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU Affero General Public License for more
|
||||
# details.
|
||||
#
|
||||
# You should have received a copy of the GNU Affero General Public License along with this program. If not, see
|
||||
# <http://www.gnu.org/licenses/>.
|
||||
import collections
|
||||
import functools
|
||||
import logging
|
||||
import selectors
|
||||
import itertools
|
||||
import os
|
||||
import sys
|
||||
import time
|
||||
import typing
|
||||
|
||||
import appdirs
|
||||
|
||||
from . import __version__
|
||||
from . import bittorrent
|
||||
from . import dht
|
||||
from . import persistence
|
||||
|
||||
|
||||
TICK_INTERVAL = 1 # in seconds (soft constraint)
|
||||
# maximum (inclusive) number of active (disposable) peers to fetch the metadata per info hash at the same time:
|
||||
MAX_ACTIVE_PEERS_PER_INFO_HASH = 5
|
||||
|
||||
|
||||
# Global variables are bad bla bla bla, BUT these variables are used so many times that I think it is justified; else
|
||||
# the signatures of many functions are literally cluttered.
|
||||
#
|
||||
# If you are using a global variable, please always indicate that at the VERY BEGINNING of the function instead of right
|
||||
# before using the variable for the first time.
|
||||
selector = selectors.DefaultSelector()
|
||||
database = None # type: persistence.Database
|
||||
node = None
|
||||
peers = collections.defaultdict(list) # type: typing.DefaultDict[dht.InfoHash, typing.List[bittorrent.DisposablePeer]]
|
||||
# info hashes whose metadata is valid & complete (OR complete but deemed to be corrupt) so do NOT download them again:
|
||||
complete_info_hashes = set()
|
||||
|
||||
|
||||
def main():
|
||||
global complete_info_hashes, database, node, peers, selector
|
||||
|
||||
logging.basicConfig(level=logging.DEBUG, format="%(asctime)s %(levelname)8s %(message)s")
|
||||
logging.info("magneticod v%d.%d.%d started", *__version__)
|
||||
|
||||
# noinspection PyBroadException
|
||||
try:
|
||||
path = os.path.join(appdirs.user_data_dir("magneticod"), "database.sqlite3")
|
||||
database = persistence.Database(path)
|
||||
except:
|
||||
logging.exception("could NOT connect to the database!")
|
||||
return 1
|
||||
|
||||
complete_info_hashes = database.get_complete_info_hashes()
|
||||
|
||||
node = dht.SybilNode()
|
||||
node.when_peer_found = on_peer_found
|
||||
|
||||
selector.register(node, selectors.EVENT_READ)
|
||||
|
||||
try:
|
||||
loop()
|
||||
except KeyboardInterrupt:
|
||||
logging.critical("Keyboard interrupt received! Exiting gracefully...")
|
||||
pass
|
||||
finally:
|
||||
database.close()
|
||||
selector.close()
|
||||
node.shutdown()
|
||||
for peer in itertools.chain.from_iterable(peers.values()):
|
||||
peer.shutdown()
|
||||
|
||||
return 0
|
||||
|
||||
|
||||
def on_peer_found(info_hash: dht.InfoHash, peer_address) -> None:
|
||||
global selector, peers, complete_info_hashes
|
||||
|
||||
if len(peers[info_hash]) > MAX_ACTIVE_PEERS_PER_INFO_HASH or info_hash in complete_info_hashes:
|
||||
return
|
||||
|
||||
try:
|
||||
peer = bittorrent.DisposablePeer(info_hash, peer_address)
|
||||
except ConnectionError:
|
||||
return
|
||||
|
||||
selector.register(peer, selectors.EVENT_READ | selectors.EVENT_WRITE)
|
||||
peer.when_metadata_found = on_metadata_found
|
||||
peer.when_error = functools.partial(on_peer_error, peer, info_hash)
|
||||
peers[info_hash].append(peer)
|
||||
|
||||
|
||||
def on_metadata_found(info_hash: dht.InfoHash, metadata: bytes) -> None:
|
||||
global complete_info_hashes, database, peers, selector
|
||||
|
||||
succeeded = database.add_metadata(info_hash, metadata)
|
||||
if not succeeded:
|
||||
logging.info("Corrupt metadata for %s! Ignoring.", info_hash.hex())
|
||||
|
||||
# When we fetch the metadata of an info hash completely, shut down all other peers who are trying to do the same.
|
||||
for peer in peers[info_hash]:
|
||||
selector.unregister(peer)
|
||||
peer.shutdown()
|
||||
del peers[info_hash]
|
||||
|
||||
complete_info_hashes.add(info_hash)
|
||||
|
||||
|
||||
def on_peer_error(peer: bittorrent.DisposablePeer, info_hash: dht.InfoHash) -> None:
|
||||
global peers, selector
|
||||
peer.shutdown()
|
||||
peers[info_hash].remove(peer)
|
||||
selector.unregister(peer)
|
||||
|
||||
|
||||
def loop() -> None:
|
||||
global selector, node, peers
|
||||
|
||||
t0 = time.monotonic()
|
||||
while True:
|
||||
keys_and_events = selector.select(timeout=TICK_INTERVAL)
|
||||
|
||||
# Check if it is time to tick
|
||||
delta = time.monotonic() - t0
|
||||
if delta >= TICK_INTERVAL:
|
||||
if not (delta < 2 * TICK_INTERVAL):
|
||||
logging.warning("Belated TICK! (Δ = %d)", delta)
|
||||
|
||||
node.on_tick()
|
||||
|
||||
t0 = time.monotonic()
|
||||
|
||||
for key, events in keys_and_events:
|
||||
if events & selectors.EVENT_READ:
|
||||
key.fileobj.on_receivable()
|
||||
if events & selectors.EVENT_WRITE:
|
||||
key.fileobj.on_sendable()
|
||||
|
||||
# Check for entities that would like to write to their socket
|
||||
keymap = selector.get_map()
|
||||
for fd in keymap:
|
||||
fileobj = keymap[fd].fileobj
|
||||
if fileobj.would_send():
|
||||
selector.modify(fileobj, selectors.EVENT_READ | selectors.EVENT_WRITE)
|
||||
|
||||
|
||||
if __name__ == "__main__":
|
||||
sys.exit(main())
|
165
magneticod/magneticod/bencode.py
Executable file
165
magneticod/magneticod/bencode.py
Executable file
@ -0,0 +1,165 @@
|
||||
# magneticod - Autonomous BitTorrent DHT crawler and metadata fetcher.
|
||||
# Copyright (C) 2017 Mert Bora ALPER <bora@boramalper.org>
|
||||
# Dedicated to Cemile Binay, in whose hands I thrived.
|
||||
#
|
||||
# This program is free software: you can redistribute it and/or modify it under the terms of the GNU Affero General
|
||||
# Public License as published by the Free Software Foundation, either version 3 of the License, or (at your option) any
|
||||
# later version.
|
||||
#
|
||||
# This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied
|
||||
# warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU Affero General Public License for more
|
||||
# details.
|
||||
#
|
||||
# You should have received a copy of the GNU Affero General Public License along with this program. If not, see
|
||||
# <http://www.gnu.org/licenses/>.
|
||||
|
||||
|
||||
"""
|
||||
bencode
|
||||
|
||||
Warning:
|
||||
Encoders do NOT check for circular objects! (and will NEVER check due to speed concerns).
|
||||
|
||||
TODO:
|
||||
Add support for integers in scientific notation. (?)
|
||||
Please do re-write this as a shared C module so that we can gain a H U G E speed & performance gain!
|
||||
|
||||
I M P O R T A N T // U R G E N T
|
||||
Support bytearrays as well! (Currently, only bytes).
|
||||
"""
|
||||
|
||||
|
||||
import typing
|
||||
|
||||
|
||||
Types = typing.Union[int, bytes, list, "KRPCDict"]
|
||||
KRPCDict = typing.Dict[bytes, Types]
|
||||
|
||||
|
||||
def dumps(obj) -> bytes:
|
||||
try:
|
||||
return __encode[type(obj)](obj)
|
||||
except:
|
||||
raise BencodeEncodingError()
|
||||
|
||||
|
||||
def loads(bytes_object: bytes) -> Types:
|
||||
try:
|
||||
return __decoders[bytes_object[0]](bytes_object, 0)[0]
|
||||
except Exception as exc:
|
||||
raise BencodeDecodingError(exc)
|
||||
|
||||
|
||||
def loads2(bytes_object: bytes) -> typing.Tuple[Types, int]:
|
||||
"""
|
||||
Returns the bencoded object AND the index where the dump of the decoded object ends (exclusive). In less words:
|
||||
|
||||
dump = b"i12eOH YEAH"
|
||||
object, i = loads2(dump)
|
||||
print(">>>", dump[i:]) # OUTPUT: >>> b'OH YEAH'
|
||||
"""
|
||||
try:
|
||||
return __decoders[bytes_object[0]](bytes_object, 0)
|
||||
except Exception as exc:
|
||||
raise BencodeDecodingError(exc)
|
||||
|
||||
|
||||
def __encode_int(i: int) -> bytes:
|
||||
# False positive...
|
||||
return b"i%de" % i
|
||||
|
||||
|
||||
def __encode_str(s: typing.ByteString) -> bytes:
|
||||
return b"%d:%s" % (len(s), s)
|
||||
|
||||
|
||||
def __encode_list(l: typing.Sequence) -> bytes:
|
||||
""" REFERENCE IMPLEMENTATION
|
||||
s = bytearray()
|
||||
for obj in l:
|
||||
s += __encode[type(obj)](obj)
|
||||
return b"l%se" % (s,)
|
||||
"""
|
||||
return b"l%se" % b"".join(__encode[type(obj)](obj) for obj in l)
|
||||
|
||||
|
||||
def __encode_dict(d: typing.Dict[typing.ByteString, typing.Any]) -> bytes:
|
||||
s = bytearray()
|
||||
# Making sure that the keys are in lexicographical order.
|
||||
# Source: http://stackoverflow.com/a/7375703/4466589
|
||||
items = sorted(d.items(), key=lambda k: (k[0].lower(), k[0]))
|
||||
for key, value in items:
|
||||
s += __encode_str(key)
|
||||
s += __encode[type(value)](value)
|
||||
return b"d%se" % (s, )
|
||||
|
||||
|
||||
__encode = {
|
||||
int: __encode_int,
|
||||
bytes: __encode_str,
|
||||
bytearray: __encode_str,
|
||||
list: __encode_list,
|
||||
dict: __encode_dict
|
||||
}
|
||||
|
||||
|
||||
def __decode_int(b: bytes, start_i: int) -> typing.Tuple[int, int]:
|
||||
end_i = b.find(b"e", start_i)
|
||||
assert end_i != -1
|
||||
return int(b[start_i + 1: end_i]), end_i + 1
|
||||
|
||||
|
||||
def __decode_str(b: bytes, start_i: int) -> typing.Tuple[bytes, int]:
|
||||
separator_i = b.find(b":", start_i)
|
||||
assert separator_i != -1
|
||||
length = int(b[start_i: separator_i])
|
||||
return b[separator_i + 1: separator_i + 1 + length], separator_i + 1 + length
|
||||
|
||||
|
||||
def __decode_list(b: bytes, start_i: int) -> typing.Tuple[list, int]:
|
||||
list_ = []
|
||||
i = start_i + 1
|
||||
while b[i] != 101: # 101 = ord(b"e")
|
||||
item, i = __decoders[b[i]](b, i)
|
||||
list_.append(item)
|
||||
return list_, i + 1
|
||||
|
||||
|
||||
def __decode_dict(b: bytes, start_i: int) -> typing.Tuple[dict, int]:
|
||||
dict_ = {}
|
||||
|
||||
i = start_i + 1
|
||||
while b[i] != 101: # 101 = ord(b"e")
|
||||
# Making sure it's between b"0" and b"9" (incl.)
|
||||
assert 48 <= b[i] <= 57
|
||||
key, end_i = __decode_str(b, i)
|
||||
dict_[key], i = __decoders[b[end_i]](b, end_i)
|
||||
|
||||
return dict_, i + 1
|
||||
|
||||
|
||||
__decoders = {
|
||||
ord(b"i"): __decode_int,
|
||||
ord(b"0"): __decode_str,
|
||||
ord(b"1"): __decode_str,
|
||||
ord(b"2"): __decode_str,
|
||||
ord(b"3"): __decode_str,
|
||||
ord(b"4"): __decode_str,
|
||||
ord(b"5"): __decode_str,
|
||||
ord(b"6"): __decode_str,
|
||||
ord(b"7"): __decode_str,
|
||||
ord(b"8"): __decode_str,
|
||||
ord(b"9"): __decode_str,
|
||||
ord(b"l"): __decode_list,
|
||||
ord(b"d"): __decode_dict
|
||||
}
|
||||
|
||||
|
||||
class BencodeEncodingError(Exception):
|
||||
pass
|
||||
|
||||
|
||||
class BencodeDecodingError(Exception):
|
||||
def __init__(self, original_exc):
|
||||
super().__init__()
|
||||
self.original_exc = original_exc
|
288
magneticod/magneticod/bittorrent.py
Normal file
288
magneticod/magneticod/bittorrent.py
Normal file
@ -0,0 +1,288 @@
|
||||
# magneticod - Autonomous BitTorrent DHT crawler and metadata fetcher.
|
||||
# Copyright (C) 2017 Mert Bora ALPER <bora@boramalper.org>
|
||||
# Dedicated to Cemile Binay, in whose hands I thrived.
|
||||
#
|
||||
# This program is free software: you can redistribute it and/or modify it under the terms of the GNU Affero General
|
||||
# Public License as published by the Free Software Foundation, either version 3 of the License, or (at your option) any
|
||||
# later version.
|
||||
#
|
||||
# This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied
|
||||
# warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU Affero General Public License for more
|
||||
# details.
|
||||
#
|
||||
# You should have received a copy of the GNU Affero General Public License along with this program. If not, see
|
||||
# <http://www.gnu.org/licenses/>.
|
||||
import errno
|
||||
import logging
|
||||
import hashlib
|
||||
import math
|
||||
import socket
|
||||
import random
|
||||
import typing
|
||||
|
||||
from . import bencode
|
||||
|
||||
|
||||
InfoHash = bytes
|
||||
PeerAddress = typing.Tuple[str, int]
|
||||
|
||||
|
||||
class DisposablePeer:
|
||||
def __init__(self, info_hash: InfoHash, peer_addr: PeerAddress):
|
||||
self.__socket = socket.socket()
|
||||
self.__socket.setblocking(False)
|
||||
# To reduce the latency:
|
||||
self.__socket.setsockopt(socket.IPPROTO_TCP, socket.TCP_NODELAY, True)
|
||||
self.__socket.setsockopt(socket.IPPROTO_TCP, socket.TCP_QUICKACK, True)
|
||||
res = self.__socket.connect_ex(peer_addr)
|
||||
if res != errno.EINPROGRESS:
|
||||
raise ConnectionError()
|
||||
|
||||
self.__info_hash = info_hash
|
||||
|
||||
self.__incoming_buffer = bytearray()
|
||||
self.__outgoing_buffer = bytearray()
|
||||
|
||||
self.__bt_handshake_complete = False # BitTorrent Handshake
|
||||
self.__ext_handshake_complete = False # Extension Handshake
|
||||
self.__ut_metadata = None # Since we don't know ut_metadata code that remote peer uses...
|
||||
|
||||
self.__metadata_size = None
|
||||
self.__metadata_received = 0 # Amount of metadata bytes received...
|
||||
self.__metadata = None
|
||||
|
||||
# To prevent double shutdown
|
||||
self.__shutdown = False
|
||||
|
||||
# Send the BitTorrent handshake message (0x13 = 19 in decimal, the length of the handshake message)
|
||||
self.__outgoing_buffer += b"\x13BitTorrent protocol%s%s%s" % (
|
||||
b"\x00\x00\x00\x00\x00\x10\x00\x01",
|
||||
self.__info_hash,
|
||||
self.__random_bytes(20)
|
||||
)
|
||||
|
||||
@staticmethod
|
||||
def when_error() -> None:
|
||||
raise NotImplementedError()
|
||||
|
||||
@staticmethod
|
||||
def when_metadata_found(info_hash: InfoHash, metadata: bytes) -> None:
|
||||
raise NotImplementedError()
|
||||
|
||||
def on_receivable(self) -> None:
|
||||
while True:
|
||||
try:
|
||||
received = self.__socket.recv(8192)
|
||||
except BlockingIOError:
|
||||
break
|
||||
except ConnectionResetError:
|
||||
self.when_error()
|
||||
return
|
||||
except ConnectionRefusedError:
|
||||
self.when_error()
|
||||
return
|
||||
except OSError: # TODO: check for "no route to host 113" error
|
||||
self.when_error()
|
||||
return
|
||||
|
||||
if not received:
|
||||
self.when_error()
|
||||
return
|
||||
|
||||
self.__incoming_buffer += received
|
||||
# Honestly speaking, BitTorrent protocol might be one of the most poorly documented and (not the most but) badly
|
||||
# designed protocols I have ever seen (I am 19 years old so what I could have seen?).
|
||||
#
|
||||
# Anyway, all the messages EXCEPT the handshake are length-prefixed by 4 bytes in network order, BUT the
|
||||
# size of the handshake message is the 1-byte length prefix + 49 bytes, but luckily, there is only one canonical
|
||||
# way of handshaking in the wild.
|
||||
if not self.__bt_handshake_complete:
|
||||
if len(self.__incoming_buffer) < 68:
|
||||
# We are still receiving the handshake...
|
||||
return
|
||||
|
||||
if self.__incoming_buffer[1:20] != b"BitTorrent protocol":
|
||||
# Erroneous handshake, possibly unknown version...
|
||||
logging.debug("Erroneous BitTorrent handshake! %s", self.__incoming_buffer[:68])
|
||||
self.when_error()
|
||||
return
|
||||
|
||||
self.__on_bt_handshake(self.__incoming_buffer[:68])
|
||||
|
||||
self.__bt_handshake_complete = True
|
||||
self.__incoming_buffer = self.__incoming_buffer[68:]
|
||||
|
||||
while len(self.__incoming_buffer) >= 4:
|
||||
# Beware that while there are still messages in the incoming queue/buffer, one of previous messages might
|
||||
# have caused an error that necessitates us to quit.
|
||||
if self.__shutdown:
|
||||
break
|
||||
|
||||
length = int.from_bytes(self.__incoming_buffer[:4], "big")
|
||||
if len(self.__incoming_buffer) - 4 < length:
|
||||
# Message is still incoming...
|
||||
return
|
||||
|
||||
self.__on_message(self.__incoming_buffer[4:4+length])
|
||||
self.__incoming_buffer = self.__incoming_buffer[4+length:]
|
||||
|
||||
def on_sendable(self) -> None:
|
||||
while self.__outgoing_buffer:
|
||||
try:
|
||||
n_sent = self.__socket.send(self.__outgoing_buffer)
|
||||
assert n_sent
|
||||
self.__outgoing_buffer = self.__outgoing_buffer[n_sent:]
|
||||
except BlockingIOError:
|
||||
break
|
||||
except OSError:
|
||||
# In case -while looping- on_sendable is called after socket is closed (mostly because of an error)
|
||||
return
|
||||
|
||||
def __on_message(self, message: bytes) -> None:
|
||||
length = len(message)
|
||||
|
||||
if length < 2:
|
||||
# An extension message has minimum length of 2.
|
||||
return
|
||||
|
||||
# Every extension message has BitTorrent Message ID = 20
|
||||
if message[0] != 20:
|
||||
# logging.debug("Message is NOT an EXTension message! %s", message[:200])
|
||||
return
|
||||
|
||||
# Extension Handshake has the Extension Message ID = 0
|
||||
if message[1] == 0:
|
||||
self.__on_ext_handshake_message(message[2:])
|
||||
return
|
||||
|
||||
# ut_metadata extension messages has the Extension Message ID = 1 (as we arbitrarily decided!)
|
||||
if message[1] != 1:
|
||||
logging.debug("Message is NOT an ut_metadata message! %s", message[:200])
|
||||
return
|
||||
|
||||
# Okay, now we are -almost- sure that this is an extension message, a kind we are most likely interested in...
|
||||
self.__on_ext_message(message[2:])
|
||||
|
||||
def __on_bt_handshake(self, message: bytes) -> None:
|
||||
""" on BitTorrent Handshake... send the extension handshake! """
|
||||
if message[25] != 16:
|
||||
logging.info("Peer does NOT support the extension protocol")
|
||||
|
||||
msg_dict_dump = bencode.dumps({
|
||||
b"m": {
|
||||
b"ut_metadata": 1
|
||||
}
|
||||
})
|
||||
# In case you cannot read_file hex:
|
||||
# 0x14 = 20 (BitTorrent ID indicating that it's an extended message)
|
||||
# 0x00 = 0 (Extension ID indicating that it's the handshake message)
|
||||
self.__outgoing_buffer += b"%s\x14\x00%s" % (
|
||||
(2 + len(msg_dict_dump)).to_bytes(4, "big"),
|
||||
msg_dict_dump
|
||||
)
|
||||
|
||||
def __on_ext_handshake_message(self, message: bytes) -> None:
|
||||
if self.__ext_handshake_complete:
|
||||
return
|
||||
|
||||
try:
|
||||
msg_dict = bencode.loads(bytes(message))
|
||||
except bencode.BencodeDecodingError:
|
||||
# One might be tempted to close the connection, but why care? Any DisposableNode will be disposed
|
||||
# automatically anyway (after a certain amount of time if the metadata is still not complete).
|
||||
logging.debug("Could NOT decode extension handshake message! %s", message[:200])
|
||||
return
|
||||
|
||||
try:
|
||||
# Just to make sure that the remote peer supports ut_metadata extension:
|
||||
ut_metadata = msg_dict[b"m"][b"ut_metadata"]
|
||||
metadata_size = msg_dict[b"metadata_size"]
|
||||
assert metadata_size > 0
|
||||
except (AssertionError, KeyError):
|
||||
self.when_error()
|
||||
return
|
||||
|
||||
self.__ut_metadata = ut_metadata
|
||||
try:
|
||||
self.__metadata = bytearray(metadata_size)
|
||||
except MemoryError:
|
||||
logging.exception("Could not allocate %.1f KiB for the metadata!", metadata_size / 1024)
|
||||
self.when_error()
|
||||
self.__metadata_size = metadata_size
|
||||
self.__ext_handshake_complete = True
|
||||
|
||||
# After the handshake is complete, request all the pieces of metadata
|
||||
n_pieces = math.ceil(self.__metadata_size / (2 ** 14))
|
||||
for piece in range(n_pieces):
|
||||
self.__request_metadata_piece(piece)
|
||||
|
||||
def __on_ext_message(self, message: bytes) -> None:
|
||||
try:
|
||||
msg_dict, i = bencode.loads2(bytes(message))
|
||||
except bencode.BencodeDecodingError:
|
||||
# One might be tempted to close the connection, but why care? Any DisposableNode will be disposed
|
||||
# automatically anyway (after a certain amount of time if the metadata is still not complete).
|
||||
logging.debug("Could NOT decode extension message! %s", message[:200])
|
||||
return
|
||||
|
||||
try:
|
||||
msg_type = msg_dict[b"msg_type"]
|
||||
piece = msg_dict[b"piece"]
|
||||
except KeyError:
|
||||
logging.debug("Missing EXT keys! %s", msg_dict)
|
||||
return
|
||||
|
||||
if msg_type == 1: # data
|
||||
metadata_piece = message[i:]
|
||||
self.__metadata[piece * 2**14: piece * 2**14 + len(metadata_piece)] = metadata_piece
|
||||
self.__metadata_received += len(metadata_piece)
|
||||
|
||||
# self.__metadata += metadata_piece
|
||||
|
||||
# logging.debug("PIECE %d RECEIVED %s", piece, metadata_piece[:200])
|
||||
|
||||
if self.__metadata_received == self.__metadata_size:
|
||||
if hashlib.sha1(self.__metadata).digest() == self.__info_hash:
|
||||
self.when_metadata_found(self.__info_hash, bytes(self.__metadata))
|
||||
else:
|
||||
logging.debug("Invalid Metadata! Ignoring.")
|
||||
|
||||
elif msg_type == 2: # reject
|
||||
logging.info("Peer rejected us.")
|
||||
self.when_error()
|
||||
|
||||
def __request_metadata_piece(self, piece: int) -> None:
|
||||
msg_dict_dump = bencode.dumps({
|
||||
b"msg_type": 0,
|
||||
b"piece": piece
|
||||
})
|
||||
# In case you cannot read_file hex:
|
||||
# 0x14 = 20 (BitTorrent ID indicating that it's an extended message)
|
||||
# 0x03 = 3 (Extension ID indicating that it's an ut_metadata message)
|
||||
self.__outgoing_buffer += b"%b\x14%s%s" % (
|
||||
(2 + len(msg_dict_dump)).to_bytes(4, "big"),
|
||||
self.__ut_metadata.to_bytes(1, "big"),
|
||||
msg_dict_dump
|
||||
)
|
||||
|
||||
def shutdown(self) -> None:
|
||||
if self.__shutdown:
|
||||
return
|
||||
try:
|
||||
self.__socket.shutdown(socket.SHUT_RDWR)
|
||||
except OSError:
|
||||
# OSError might be raised in case the connection to the remote peer fails: nevertheless, when_error should
|
||||
# be called, and the supervisor will try to shutdown the peer, and ta da: OSError!
|
||||
pass
|
||||
self.__socket.close()
|
||||
self.__shutdown = True
|
||||
|
||||
def would_send(self) -> bool:
|
||||
return bool(len(self.__outgoing_buffer))
|
||||
|
||||
def fileno(self) -> int:
|
||||
return self.__socket.fileno()
|
||||
|
||||
@staticmethod
|
||||
def __random_bytes(n: int) -> bytes:
|
||||
return random.getrandbits(n * 8).to_bytes(n, "big")
|
264
magneticod/magneticod/dht.py
Normal file
264
magneticod/magneticod/dht.py
Normal file
@ -0,0 +1,264 @@
|
||||
# magneticod - Autonomous BitTorrent DHT crawler and metadata fetcher.
|
||||
# Copyright (C) 2017 Mert Bora ALPER <bora@boramalper.org>
|
||||
# Dedicated to Cemile Binay, in whose hands I thrived.
|
||||
#
|
||||
# This program is free software: you can redistribute it and/or modify it under the terms of the GNU Affero General
|
||||
# Public License as published by the Free Software Foundation, either version 3 of the License, or (at your option) any
|
||||
# later version.
|
||||
#
|
||||
# This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied
|
||||
# warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU Affero General Public License for more
|
||||
# details.
|
||||
#
|
||||
# You should have received a copy of the GNU Affero General Public License along with this program. If not, see
|
||||
# <http://www.gnu.org/licenses/>.
|
||||
import array
|
||||
import collections
|
||||
import zlib
|
||||
import logging
|
||||
import random
|
||||
import socket
|
||||
import typing
|
||||
|
||||
from . import bencode
|
||||
|
||||
NodeID = bytes
|
||||
NodeAddress = typing.Tuple[str, int]
|
||||
PeerAddress = typing.Tuple[str, int]
|
||||
InfoHash = bytes
|
||||
|
||||
|
||||
BOOTSTRAPPING_NODES = [
|
||||
("router.bittorrent.com", 6881),
|
||||
("dht.transmissionbt.com", 6881)
|
||||
]
|
||||
|
||||
|
||||
class SybilNode:
|
||||
# Maximum number of neighbours (this is a THRESHOLD where, once reached, the search for new neighbours will stop;
|
||||
# but until then, the total number of neighbours might exceed the threshold).
|
||||
|
||||
def __init__(self):
|
||||
self.__true_id = self.__random_bytes(20)
|
||||
|
||||
self.__socket = socket.socket(type=socket.SOCK_DGRAM)
|
||||
self.__socket.bind(("0.0.0.0", 0))
|
||||
self.__socket.setblocking(False)
|
||||
|
||||
self.__incoming_buffer = array.array("B", (0 for _ in range(65536)))
|
||||
self.__outgoing_queue = collections.deque()
|
||||
|
||||
self.__routing_table = {} # type: typing.Dict[NodeID, NodeAddress]
|
||||
|
||||
self.__token_secret = self.__random_bytes(4)
|
||||
|
||||
self.__n_max_neighbours = 2000
|
||||
|
||||
logging.debug("SybilNode %s initialized!", self.__true_id.hex().upper())
|
||||
|
||||
@staticmethod
|
||||
def when_peer_found(info_hash: InfoHash, peer_addr: PeerAddress) -> None:
|
||||
raise NotImplementedError()
|
||||
|
||||
def on_tick(self) -> None:
|
||||
self.__bootstrap()
|
||||
self.__make_neighbours()
|
||||
self.__routing_table.clear()
|
||||
|
||||
def on_receivable(self) -> None:
|
||||
buffer = self.__incoming_buffer
|
||||
while True:
|
||||
try:
|
||||
_, addr = self.__socket.recvfrom_into(buffer, 65536)
|
||||
data = buffer.tobytes()
|
||||
except BlockingIOError:
|
||||
break
|
||||
|
||||
# Ignore nodes that uses port 0 (assholes).
|
||||
if addr[1] == 0:
|
||||
continue
|
||||
|
||||
try:
|
||||
message = bencode.loads(data)
|
||||
except bencode.BencodeDecodingError:
|
||||
continue
|
||||
|
||||
if type(message.get(b"r")) is dict and type(message[b"r"].get(b"nodes")) is bytes:
|
||||
self.__on_FIND_NODE_response(message)
|
||||
elif message.get(b"q") == b"get_peers":
|
||||
self.__on_GET_PEERS_query(message, addr)
|
||||
elif message.get(b"q") == b"announce_peer":
|
||||
self.__on_ANNOUNCE_PEER_query(message, addr)
|
||||
|
||||
def on_sendable(self) -> None:
|
||||
congestion = None
|
||||
while True:
|
||||
try:
|
||||
addr, data = self.__outgoing_queue.pop()
|
||||
except IndexError:
|
||||
break
|
||||
|
||||
try:
|
||||
self.__socket.sendto(data, addr)
|
||||
except BlockingIOError:
|
||||
self.__outgoing_queue.appendleft((addr, data))
|
||||
break
|
||||
except PermissionError:
|
||||
# This exception (EPERM errno: 1) is kernel's way of saying that "you are far too fast, chill".
|
||||
# It is also likely that we have received a ICMP source quench packet (meaning, that we really need to
|
||||
# slow down.
|
||||
#
|
||||
# Read more here: http://www.archivum.info/comp.protocols.tcp-ip/2009-05/00088/UDP-socket-amp-amp-sendto
|
||||
# -amp-amp-EPERM.html
|
||||
congestion = True
|
||||
break
|
||||
except OSError:
|
||||
# Pass in case of trying to send to port 0 (it is much faster to catch exceptions than using an
|
||||
# if-statement).
|
||||
pass
|
||||
|
||||
if congestion:
|
||||
self.__outgoing_queue.clear()
|
||||
# In case of congestion, decrease the maximum number of nodes to the 90% of the current value.
|
||||
if self.__n_max_neighbours < 200:
|
||||
logging.warning("Maximum number of neighbours are now less than 200 due to congestion!")
|
||||
else:
|
||||
self.__n_max_neighbours = self.__n_max_neighbours * 9 // 10
|
||||
else:
|
||||
# In case of the lack of congestion, increase the maximum number of nodes by 1%.
|
||||
self.__n_max_neighbours = self.__n_max_neighbours * 101 // 100
|
||||
|
||||
def would_send(self) -> bool:
|
||||
""" Whether node is waiting to write on its socket or not. """
|
||||
return bool(self.__outgoing_queue)
|
||||
|
||||
def shutdown(self) -> None:
|
||||
self.__socket.close()
|
||||
|
||||
def __on_FIND_NODE_response(self, message: bencode.KRPCDict) -> None:
|
||||
try:
|
||||
nodes_arg = message[b"r"][b"nodes"]
|
||||
assert type(nodes_arg) is bytes and len(nodes_arg) % 26 == 0
|
||||
except (TypeError, KeyError, AssertionError):
|
||||
return
|
||||
|
||||
try:
|
||||
nodes = self.__decode_nodes(nodes_arg)
|
||||
except AssertionError:
|
||||
return
|
||||
|
||||
# Add new found nodes to the routing table, assuring that we have no more than n_max_neighbours in total.
|
||||
if len(self.__routing_table) < self.__n_max_neighbours:
|
||||
self.__routing_table.update(nodes)
|
||||
|
||||
def __on_GET_PEERS_query(self, message: bencode.KRPCDict, addr: NodeAddress) -> None:
|
||||
try:
|
||||
transaction_id = message[b"t"]
|
||||
assert type(transaction_id) is bytes and transaction_id
|
||||
info_hash = message[b"a"][b"info_hash"]
|
||||
assert type(info_hash) is bytes and len(info_hash) == 20
|
||||
except (TypeError, KeyError, AssertionError):
|
||||
return
|
||||
|
||||
# appendleft to prioritise GET_PEERS responses as they are the most fruitful ones!
|
||||
self.__outgoing_queue.append((addr, bencode.dumps({
|
||||
b"y": b"r",
|
||||
b"t": transaction_id,
|
||||
b"r": {
|
||||
b"id": info_hash[:15] + self.__true_id[:5],
|
||||
b"nodes": b"",
|
||||
b"token": self.__calculate_token(addr, info_hash)
|
||||
}
|
||||
})))
|
||||
|
||||
def __on_ANNOUNCE_PEER_query(self, message: bencode.KRPCDict, addr: NodeAddress) -> None:
|
||||
try:
|
||||
node_id = message[b"a"][b"id"]
|
||||
assert type(node_id) is bytes and len(node_id) == 20
|
||||
transaction_id = message[b"t"]
|
||||
assert type(transaction_id) is bytes and transaction_id
|
||||
token = message[b"a"][b"token"]
|
||||
assert type(token) is bytes
|
||||
info_hash = message[b"a"][b"info_hash"]
|
||||
assert type(info_hash) is bytes and len(info_hash) == 20
|
||||
if b"implied_port" in message[b"a"]:
|
||||
implied_port = message[b"a"][b"implied_port"]
|
||||
assert implied_port in (0, 1)
|
||||
else:
|
||||
implied_port = None
|
||||
port = message[b"a"][b"port"]
|
||||
|
||||
assert type(port) is int and 0 < port < 65536
|
||||
except (TypeError, KeyError, AssertionError):
|
||||
return
|
||||
|
||||
self.__outgoing_queue.append((addr, bencode.dumps({
|
||||
b"y": b"r",
|
||||
b"t": transaction_id,
|
||||
b"r": {
|
||||
b"id": node_id[:15] + self.__true_id[:5]
|
||||
}
|
||||
})))
|
||||
|
||||
if implied_port:
|
||||
peer_addr = (addr[0], addr[1])
|
||||
else:
|
||||
peer_addr = (addr[0], port)
|
||||
|
||||
self.when_peer_found(info_hash, peer_addr)
|
||||
|
||||
def fileno(self) -> int:
|
||||
return self.__socket.fileno()
|
||||
|
||||
def __bootstrap(self) -> None:
|
||||
for addr in BOOTSTRAPPING_NODES:
|
||||
self.__outgoing_queue.append((addr, bencode.dumps({
|
||||
b"y": b"q",
|
||||
b"q": b"find_node",
|
||||
b"t": self.__random_bytes(2),
|
||||
b"a": {
|
||||
b"id": self.__true_id,
|
||||
b"target": self.__random_bytes(20)
|
||||
}
|
||||
})))
|
||||
|
||||
def __make_neighbours(self) -> None:
|
||||
for node_id, addr in self.__routing_table.items():
|
||||
self.__outgoing_queue.append((addr, bencode.dumps({
|
||||
b"y": b"q",
|
||||
b"q": b"find_node",
|
||||
b"t": self.__random_bytes(2),
|
||||
b"a": {
|
||||
b"id": node_id[:15] + self.__true_id[:5],
|
||||
b"target": self.__random_bytes(20)
|
||||
}
|
||||
})))
|
||||
|
||||
@staticmethod
|
||||
def __decode_nodes(infos: bytes) -> typing.List[typing.Tuple[NodeID, NodeAddress]]:
|
||||
""" REFERENCE IMPLEMENTATION
|
||||
nodes = []
|
||||
for i in range(0, len(infos), 26):
|
||||
info = infos[i: i + 26]
|
||||
node_id = info[:20]
|
||||
node_host = socket.inet_ntoa(info[20:24])
|
||||
node_port = int.from_bytes(info[24:], "big")
|
||||
nodes.append((node_id, (node_host, node_port)))
|
||||
return nodes
|
||||
"""
|
||||
|
||||
""" Optimized Version """
|
||||
inet_ntoa = socket.inet_ntoa
|
||||
int_from_bytes = int.from_bytes
|
||||
return [
|
||||
(infos[i:i+20], (inet_ntoa(infos[i+20:i+24]), int_from_bytes(infos[i+24:i+26], "big")))
|
||||
for i in range(0, len(infos), 26)
|
||||
]
|
||||
|
||||
def __calculate_token(self, addr: NodeAddress, info_hash: InfoHash):
|
||||
# Believe it or not, faster than using built-in hash (including conversion from int -> bytes of course)
|
||||
return zlib.adler32(b"%s%s%d%s" % (self.__token_secret, socket.inet_aton(addr[0]), addr[1], info_hash))
|
||||
|
||||
@staticmethod
|
||||
def __random_bytes(n: int) -> bytes:
|
||||
return random.getrandbits(n * 8).to_bytes(n, "big")
|
132
magneticod/magneticod/persistence.py
Normal file
132
magneticod/magneticod/persistence.py
Normal file
@ -0,0 +1,132 @@
|
||||
# magneticod - Autonomous BitTorrent DHT crawler and metadata fetcher.
|
||||
# Copyright (C) 2017 Mert Bora ALPER <bora@boramalper.org>
|
||||
# Dedicated to Cemile Binay, in whose hands I thrived.
|
||||
#
|
||||
# This program is free software: you can redistribute it and/or modify it under the terms of the GNU Affero General
|
||||
# Public License as published by the Free Software Foundation, either version 3 of the License, or (at your option) any
|
||||
# later version.
|
||||
#
|
||||
# This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied
|
||||
# warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU Affero General Public License for more
|
||||
# details.
|
||||
#
|
||||
# You should have received a copy of the GNU Affero General Public License along with this program. If not, see
|
||||
# <http://www.gnu.org/licenses/>.
|
||||
import logging
|
||||
import sqlite3
|
||||
import time
|
||||
import typing
|
||||
import os
|
||||
|
||||
from . import bencode
|
||||
|
||||
|
||||
# threshold for pending info hashes before being committed to database:
|
||||
PENDING_INFO_HASHES = 10
|
||||
|
||||
|
||||
class Database:
|
||||
def __init__(self, database) -> None:
|
||||
self.__db_conn = self.__connect(database)
|
||||
|
||||
# We buffer metadata to flush many entries at once, for performance reasons.
|
||||
# list of tuple (info_hash, name, total_size, discovered_on)
|
||||
self.__pending_metadata = [] # type: typing.List[typing.Tuple[bytes, str, int, int]]
|
||||
# list of tuple (info_hash, size, path)
|
||||
self.__pending_files = [] # type: typing.List[typing.Tuple[bytes, int, bytes]]
|
||||
|
||||
@staticmethod
|
||||
def __connect(database) -> sqlite3.Connection:
|
||||
os.makedirs(os.path.split(database)[0], exist_ok=True)
|
||||
db_conn = sqlite3.connect(database, isolation_level=None)
|
||||
|
||||
db_conn.execute("PRAGMA journal_mode=WAL;")
|
||||
db_conn.execute("PRAGMA foreign_keys=ON;")
|
||||
|
||||
with db_conn:
|
||||
db_conn.execute("CREATE TABLE IF NOT EXISTS torrents ("
|
||||
"id INTEGER PRIMARY KEY,"
|
||||
"info_hash BLOB NOT NULL UNIQUE,"
|
||||
"name TEXT NOT NULL,"
|
||||
"total_size INTEGER NOT NULL CHECK(total_size > 0),"
|
||||
"discovered_on INTEGER NOT NULL CHECK(discovered_on > 0)"
|
||||
");")
|
||||
db_conn.execute("CREATE TABLE IF NOT EXISTS files ("
|
||||
"id INTEGER PRIMARY KEY,"
|
||||
"torrent_id INTEGER REFERENCES torrents ON DELETE CASCADE ON UPDATE RESTRICT,"
|
||||
"size INTEGER NOT NULL,"
|
||||
"path TEXT NOT NULL"
|
||||
");")
|
||||
|
||||
return db_conn
|
||||
|
||||
def add_metadata(self, info_hash: bytes, metadata: bytes) -> bool:
|
||||
files = []
|
||||
discovered_on = int(time.time())
|
||||
try:
|
||||
info = bencode.loads(metadata) # type: dict
|
||||
|
||||
assert b"/" not in info[b"name"]
|
||||
name = info[b"name"].decode("utf-8")
|
||||
|
||||
if b"files" in info: # Multiple File torrent:
|
||||
for file in info[b"files"]:
|
||||
assert type(file[b"length"]) is int
|
||||
# Refuse trailing slash in any of the path items
|
||||
assert not any(b"/" in item for item in file[b"path"])
|
||||
path = "/".join(i.decode("utf-8") for i in file[b"path"])
|
||||
files.append((info_hash, file[b"length"], path))
|
||||
else: # Single File torrent:
|
||||
assert type(info[b"length"]) is int
|
||||
files.append((info_hash, info[b"length"], name))
|
||||
# TODO: Make sure this catches ALL, AND ONLY operational errors
|
||||
except (bencode.BencodeDecodingError, AssertionError, KeyError, AttributeError, UnicodeDecodeError):
|
||||
return False
|
||||
|
||||
self.__pending_metadata.append((info_hash, name, sum(f[1] for f in files), discovered_on))
|
||||
self.__pending_files += files
|
||||
|
||||
logging.info("Added: `%s`", name)
|
||||
|
||||
# Automatically check if the buffer is full, and commit to the SQLite database if so.
|
||||
if len(self.__pending_metadata) >= PENDING_INFO_HASHES:
|
||||
self.__commit_metadata()
|
||||
|
||||
return True
|
||||
|
||||
def get_complete_info_hashes(self) -> typing.Set[bytes]:
|
||||
cur = self.__db_conn.cursor()
|
||||
try:
|
||||
cur.execute("SELECT info_hash FROM torrents;")
|
||||
return set(x[0] for x in cur.fetchall())
|
||||
finally:
|
||||
cur.close()
|
||||
|
||||
def __commit_metadata(self) -> None:
|
||||
cur = self.__db_conn.cursor()
|
||||
cur.execute("BEGIN;")
|
||||
# noinspection PyBroadException
|
||||
try:
|
||||
cur.executemany(
|
||||
"INSERT INTO torrents (info_hash, name, total_size, discovered_on) VALUES (?, ?, ?, ?);",
|
||||
self.__pending_metadata
|
||||
)
|
||||
cur.executemany(
|
||||
"INSERT INTO files (torrent_id, size, path) "
|
||||
"VALUES ((SELECT id FROM torrents WHERE info_hash=?), ?, ?);",
|
||||
self.__pending_files
|
||||
)
|
||||
cur.execute("COMMIT;")
|
||||
logging.debug("%d metadata (%d files) are committed to the database.",
|
||||
len(self.__pending_metadata), len(self.__pending_files))
|
||||
self.__pending_metadata.clear()
|
||||
self.__pending_files.clear()
|
||||
except:
|
||||
cur.execute("ROLLBACK;")
|
||||
logging.exception("Could NOT commit metadata to the database! (%d metadata are pending)",
|
||||
len(self.__pending_metadata))
|
||||
finally:
|
||||
cur.close()
|
||||
|
||||
def close(self) -> None:
|
||||
self.__db_conn.close()
|
38
magneticod/setup.py
Normal file
38
magneticod/setup.py
Normal file
@ -0,0 +1,38 @@
|
||||
from setuptools import setup
|
||||
|
||||
|
||||
def read_file(path):
|
||||
with open(path) as file:
|
||||
return file.read()
|
||||
|
||||
|
||||
setup(
|
||||
name="magneticod",
|
||||
version="0.1.0",
|
||||
description="Autonomous BitTorrent DHT crawler and metadata fetcher.",
|
||||
long_description=read_file("README.rst"),
|
||||
url="http://magnetico.org",
|
||||
author="Mert Bora ALPER",
|
||||
author_email="bora@boramalper.org",
|
||||
license="GNU Affero General Public License v3 or later (AGPLv3+)",
|
||||
packages=["magneticod"],
|
||||
zip_safe=False,
|
||||
entry_points={
|
||||
"console_scripts": ["magneticod=magneticod.__main__:main"]
|
||||
},
|
||||
|
||||
install_requires=[
|
||||
"appdirs>=1.4.3"
|
||||
],
|
||||
|
||||
classifiers=[
|
||||
"Development Status :: 2 - Pre-Alpha",
|
||||
"Environment :: No Input/Output (Daemon)",
|
||||
"Intended Audience :: End Users/Desktop",
|
||||
"License :: OSI Approved :: GNU Affero General Public License v3 or later (AGPLv3+)",
|
||||
"Natural Language :: English",
|
||||
"Operating System :: POSIX :: Linux",
|
||||
"Programming Language :: Python :: 3 :: Only",
|
||||
"Programming Language :: Python :: Implementation :: CPython",
|
||||
]
|
||||
)
|
10
magneticod/systemd/magneticod.service
Normal file
10
magneticod/systemd/magneticod.service
Normal file
@ -0,0 +1,10 @@
|
||||
[Unit]
|
||||
Description=magneticod: autonomous BitTorrent DHT crawler and metadata fetcher
|
||||
|
||||
[Service]
|
||||
ExecStart=~/.local/bin/magneticod
|
||||
Restart=always
|
||||
RestartSec=5
|
||||
|
||||
[Install]
|
||||
WantedBy=multi-user.target
|
2
magneticow/MANIFEST.in
Normal file
2
magneticow/MANIFEST.in
Normal file
@ -0,0 +1,2 @@
|
||||
recursive-include magneticow/static *
|
||||
recursive-include magneticow/templates *
|
153
magneticow/README.rst
Normal file
153
magneticow/README.rst
Normal file
@ -0,0 +1,153 @@
|
||||
==========
|
||||
magneticow
|
||||
==========
|
||||
*Lightweight web interface for magnetico.*
|
||||
|
||||
**magneticow** is a lightweight web interface to search and to browse the torrents that its counterpart (**magneticod**)
|
||||
discovered. It allows fast full text search of the names of the torrents, by correctly parsing them into their elements.
|
||||
|
||||
Installation
|
||||
============
|
||||
**magneticow** uses `gevent <http://www.gevent.org/>`_ as a "standalone WSGI container" (you can think of it as an
|
||||
embedded HTTP server), and connects to the same SQLite 3 database that **magneticod** writes. Hence, **root or sudo
|
||||
access is NOT required at any stage, during or after the installation process.**
|
||||
|
||||
Requirements
|
||||
------------
|
||||
- Python 3.5 or above.
|
||||
|
||||
Instructions
|
||||
------------
|
||||
**WARNING:**
|
||||
|
||||
**magnetico** currently does NOT have any filtering system NOR it allows individual torrents to be removed from the
|
||||
database, and BitTorrent DHT network is full of the materials that are considered illegal in many countries
|
||||
(violence, pornography, copyright infringing content, and even child-pornography). If you are afraid of the legal
|
||||
consequences, or simply morally against (indirectly) assisting those content to spread around, follow the
|
||||
**magneticow** installation instructions carefully to password-protect the web-interface from others.
|
||||
\
|
||||
|
||||
**WARNING:**
|
||||
|
||||
**magneticow** is *NOT* designed to scale, and will fail miserably if you try to use it like a public torrent
|
||||
website. This is a *deliberate* technical decision, not a bug or something to be fixed; another web interface with
|
||||
more features to support such use cases and scalability *might* be developed, but **magneticow** will NEVER be the
|
||||
case.
|
||||
|
||||
1. Download the latest version of **magneticow** from PyPI: ::
|
||||
|
||||
pip3 install magneticow
|
||||
|
||||
2. Add installation path to the ``$PATH``; append the following line to your ``~/.bashrc`` *(you can skip to step 4 if
|
||||
you installed magneticod first as advised)* ::
|
||||
|
||||
export PATH=$PATH:~/.local/bin
|
||||
|
||||
3. Activate the changes to ``$PATH``: ::
|
||||
|
||||
source ~/.bashrc
|
||||
|
||||
4. Confirm that it is running: ::
|
||||
|
||||
magneticow --port 8080 --user username_1 password_1 --user username_2 password_2
|
||||
|
||||
Do not forget to actually visit the website, and run a search without any keywords (i.e. simply press the enter
|
||||
button); this should return a list of most recently discovered torrents. If **magneticod** has not been running long
|
||||
enough, database might be completely empty and you might see no results (5 minutes should suffice to discover more
|
||||
than a dozen torrents).
|
||||
|
||||
5. *(only for systemd users, skip the rest of the steps and proceed to the* `Using`_ *section if you are not a systemd
|
||||
user or want to use a different solution)*
|
||||
|
||||
Download the magneticow systemd service file (at
|
||||
`magneticow/systemd/magneticow.service <systemd/magneticow.service>`_) and expand the tilde symbol with the path of
|
||||
your home directory. Also, choose a port (> 1024) for **magneticow** to listen on, and supply username(s) and
|
||||
password(s).
|
||||
|
||||
For example, if my home directory is ``/home/bora``, and I want to create two users named ``bora`` and ``tolga`` with
|
||||
passwords ``staatsangehörigkeit`` and ``bürgerschaft``, and then **magneticow** to listen on port 8080, this line ::
|
||||
|
||||
ExecStart=~/.local/bin/magneticow --port PORT --user USERNAME PASSWORD
|
||||
|
||||
should become this: ::
|
||||
|
||||
ExecStart=/home/bora/.local/bin/magneticow --port 8080 --user bora staatsangehörigkeit --user tolga bürgerschaft
|
||||
|
||||
Run ``echo ~`` to see the path of your own home directory, if you do not already know.
|
||||
|
||||
**WARNING:**
|
||||
|
||||
**At least one username and password MUST be supplied.** This is to protect the privacy of your **magneticow**
|
||||
installation, although **beware that this does NOT encrypt the communication between your browser and the
|
||||
server!**
|
||||
|
||||
6. Copy the magneticow systemd service file to your local systemd configuration directory: ::
|
||||
|
||||
cp magneticow.service ~/.config/systemd/user/
|
||||
|
||||
7. Start **magneticow**: ::
|
||||
|
||||
systemctl --user start magneticow
|
||||
|
||||
**magneticow** should now be running under the supervision of systemd and it should also be automatically started
|
||||
whenever you boot your machine.
|
||||
|
||||
You can check its status and most recent log entries using the following command: ::
|
||||
|
||||
systemctl --user status magneticow
|
||||
|
||||
To stop **magneticow**, issue the following: ::
|
||||
|
||||
systemctl --user stop magneticow
|
||||
|
||||
Using
|
||||
=====
|
||||
**magneticow** does not require user interference to operate, once it starts running. Hence, there is no "user manual",
|
||||
although you should beware of these points:
|
||||
|
||||
1. **Resource Usage:**
|
||||
|
||||
To repeat it for the last time, **magneticow** is a lightweight web interface for magnetico and is not suitable for
|
||||
handling many users simultaneously. Misusing **magneticow** will likely to lead high processor usage and increased
|
||||
response times. If that is the case, you might consider lowering the priority of **magneticow** using ``renice``
|
||||
command.
|
||||
|
||||
2. **Pre-Alpha Bugs:**
|
||||
|
||||
**magneticow** is *supposed* to work "just fine", but as being at pre-alpha stage, it's likely that you might find
|
||||
some bugs. It will be much appreciated if you can report those bugs, so that **magneticow** can be improved. See the
|
||||
next sub-section for how to mitigate the issue if you are *not* using systemd.
|
||||
|
||||
Automatic Restarting
|
||||
--------------------
|
||||
Due to minor bugs at this stage of its development, **magneticow** should be supervised by another program to be ensured
|
||||
that it's running, and should be restarted if not. systemd service file supplied by **magneticow** implements that,
|
||||
although (if you wish) you can also use a much more primitive approach using GNU screen (which comes pre-installed in
|
||||
many GNU/Linux distributions):
|
||||
|
||||
1. Start screen session named ``magneticow``: ::
|
||||
|
||||
screen -S magneticow
|
||||
|
||||
2. Run **magneticow** forever: ::
|
||||
|
||||
until magneticow; do echo "restarting..."; sleep 5; done;
|
||||
|
||||
This will keep restarting **magneticow** after five seconds in case if it fails.
|
||||
|
||||
3. Detach the session by pressing Ctrl+A and after Ctrl+D.
|
||||
|
||||
4. If you wish to see the logs, or to kill **magneticow**, ``screen -r magneticow`` will attach the original screen
|
||||
session back. **magneticow** will exit gracefully upon keyboard interrupt (Ctrl+C) [SIGINT].
|
||||
|
||||
License
|
||||
=======
|
||||
All the code is licensed under AGPLv3, unless otherwise stated in the source specific source. See ``COPYING`` file
|
||||
in ``magnetico`` directory for the full license text.
|
||||
|
||||
|
||||
----
|
||||
|
||||
Dedicated to Cemile Binay, in whose hands I thrived.
|
||||
|
||||
Bora M. ALPER <bora@boramalper.org>
|
14
magneticow/magneticow/__init__.py
Normal file
14
magneticow/magneticow/__init__.py
Normal file
@ -0,0 +1,14 @@
|
||||
# magneticow - Lightweight web interface for magnetico.
|
||||
# Copyright (C) 2017 Mert Bora ALPER <bora@boramalper.org>
|
||||
# Dedicated to Cemile Binay, in whose hands I thrived.
|
||||
#
|
||||
# This program is free software: you can redistribute it and/or modify it under the terms of the GNU Affero General
|
||||
# Public License as published by the Free Software Foundation, either version 3 of the License, or (at your option) any
|
||||
# later version.
|
||||
#
|
||||
# This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied
|
||||
# warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU Affero General Public License for more
|
||||
# details.
|
||||
#
|
||||
# You should have received a copy of the GNU Affero General Public License along with this program. If not, see
|
||||
# <http://www.gnu.org/licenses/>.
|
74
magneticow/magneticow/__main__.py
Normal file
74
magneticow/magneticow/__main__.py
Normal file
@ -0,0 +1,74 @@
|
||||
# magneticow - Lightweight web interface for magnetico.
|
||||
# Copyright (C) 2017 Mert Bora ALPER <bora@boramalper.org>
|
||||
# Dedicated to Cemile Binay, in whose hands I thrived.
|
||||
#
|
||||
# This program is free software: you can redistribute it and/or modify it under the terms of the GNU Affero General
|
||||
# Public License as published by the Free Software Foundation, either version 3 of the License, or (at your option) any
|
||||
# later version.
|
||||
#
|
||||
# This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied
|
||||
# warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU Affero General Public License for more
|
||||
# details.
|
||||
#
|
||||
# You should have received a copy of the GNU Affero General Public License along with this program. If not, see
|
||||
# <http://www.gnu.org/licenses/>.
|
||||
|
||||
import argparse
|
||||
import sys
|
||||
import textwrap
|
||||
|
||||
import gevent.wsgi
|
||||
|
||||
from magneticow import magneticow
|
||||
|
||||
|
||||
def main() -> int:
|
||||
arguments = parse_args()
|
||||
magneticow.app.arguments = arguments
|
||||
|
||||
http_server = gevent.wsgi.WSGIServer(("", arguments.port), magneticow.app)
|
||||
|
||||
try:
|
||||
http_server.serve_forever()
|
||||
except KeyboardInterrupt:
|
||||
return 0
|
||||
|
||||
return 1
|
||||
|
||||
|
||||
def parse_args() -> dict:
|
||||
parser = argparse.ArgumentParser(
|
||||
description="Lightweight web interface for magnetico.",
|
||||
epilog=textwrap.dedent("""\
|
||||
Copyright (C) 2017 Mert Bora ALPER <bora@boramalper.org>
|
||||
Dedicated to Cemile Binay, in whose hands I thrived.
|
||||
|
||||
This program is free software: you can redistribute it and/or modify it under
|
||||
the terms of the GNU Affero General Public License as published by the Free
|
||||
Software Foundation, either version 3 of the License, or (at your option) any
|
||||
later version.
|
||||
|
||||
This program is distributed in the hope that it will be useful, but WITHOUT ANY
|
||||
WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A
|
||||
PARTICULAR PURPOSE. See the GNU Affero General Public License for more
|
||||
details.
|
||||
|
||||
You should have received a copy of the GNU Affero General Public License along
|
||||
with this program. If not, see <http://www.gnu.org/licenses/>.
|
||||
"""),
|
||||
allow_abbrev=False,
|
||||
formatter_class=argparse.RawDescriptionHelpFormatter
|
||||
)
|
||||
parser.add_argument(
|
||||
"--port", action="store", type=int, required=True,
|
||||
help="the port number magneticow web server should listen on"
|
||||
)
|
||||
parser.add_argument(
|
||||
"--user", action="append", nargs=2, metavar=("USERNAME", "PASSWORD"), type=str, required=True,
|
||||
help="the pair(s) of username and password for basic HTTP authentication"
|
||||
)
|
||||
|
||||
return parser.parse_args(sys.argv[1:])
|
||||
|
||||
if __name__ == "__main__":
|
||||
sys.exit(main())
|
234
magneticow/magneticow/magneticow.py
Normal file
234
magneticow/magneticow/magneticow.py
Normal file
@ -0,0 +1,234 @@
|
||||
# magneticow - Lightweight web interface for magnetico.
|
||||
# Copyright (C) 2017 Mert Bora ALPER <bora@boramalper.org>
|
||||
# Dedicated to Cemile Binay, in whose hands I thrived.
|
||||
#
|
||||
# This program is free software: you can redistribute it and/or modify it under the terms of the GNU Affero General
|
||||
# Public License as published by the Free Software Foundation, either version 3 of the License, or (at your option) any
|
||||
# later version.
|
||||
#
|
||||
# This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied
|
||||
# warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU Affero General Public License for more
|
||||
# details.
|
||||
#
|
||||
# You should have received a copy of the GNU Affero General Public License along with this program. If not, see
|
||||
# <http://www.gnu.org/licenses/>.
|
||||
import collections
|
||||
import functools
|
||||
from datetime import datetime
|
||||
import sqlite3
|
||||
import os
|
||||
|
||||
import appdirs
|
||||
import flask
|
||||
|
||||
from magneticow import utils
|
||||
|
||||
|
||||
File = collections.namedtuple("file", ["path", "size"])
|
||||
Torrent = collections.namedtuple("torrent", ["info_hash", "name", "size", "discovered_on", "files"])
|
||||
|
||||
|
||||
app = flask.Flask(__name__)
|
||||
app.config.from_object(__name__)
|
||||
|
||||
|
||||
# Adapted from: http://flask.pocoo.org/snippets/8/
|
||||
# (c) Copyright 2010 - 2017 by Armin Ronacher
|
||||
# BEGINNING OF THE COPYRIGHTED CONTENT
|
||||
def check_auth(supplied_username, supplied_password):
|
||||
""" This function is called to check if a username / password combination is valid. """
|
||||
for username, password in app.arguments.user:
|
||||
if supplied_username == username and supplied_password == password:
|
||||
return True
|
||||
return False
|
||||
|
||||
|
||||
def authenticate():
|
||||
""" Sends a 401 response that enables basic auth. """
|
||||
return flask.Response(
|
||||
"Could not verify your access level for that URL.\n"
|
||||
"You have to login with proper credentials",
|
||||
401,
|
||||
{"WWW-Authenticate": 'Basic realm="Login Required"'}
|
||||
)
|
||||
|
||||
|
||||
def requires_auth(f):
|
||||
@functools.wraps(f)
|
||||
def decorated(*args, **kwargs):
|
||||
auth = flask.request.authorization
|
||||
if not auth or not check_auth(auth.username, auth.password):
|
||||
return authenticate()
|
||||
return f(*args, **kwargs)
|
||||
return decorated
|
||||
# END OF THE COPYRIGHTED CONTENT
|
||||
|
||||
|
||||
@app.route("/")
|
||||
@requires_auth
|
||||
def home_page():
|
||||
return flask.render_template("homepage.html")
|
||||
|
||||
|
||||
@app.route("/torrents/")
|
||||
@requires_auth
|
||||
def torrents():
|
||||
if flask.request.args:
|
||||
if flask.request.args["search"] == "":
|
||||
return newest_torrents()
|
||||
return search_torrents()
|
||||
else:
|
||||
return newest_torrents()
|
||||
|
||||
|
||||
def search_torrents():
|
||||
magneticod_db = get_magneticod_db()
|
||||
|
||||
search = flask.request.args["search"]
|
||||
page = int(flask.request.args.get("page", 0))
|
||||
|
||||
context = {
|
||||
"search": search,
|
||||
"page": page
|
||||
}
|
||||
|
||||
with magneticod_db:
|
||||
cur = magneticod_db.execute(
|
||||
"SELECT"
|
||||
" info_hash, "
|
||||
" name, "
|
||||
" total_size, "
|
||||
" discovered_on "
|
||||
"FROM torrents "
|
||||
"INNER JOIN ("
|
||||
" SELECT torrent_id, rank(matchinfo(fts_torrents, 'pcnxal')) AS rank "
|
||||
" FROM fts_torrents "
|
||||
" WHERE name MATCH ? "
|
||||
" ORDER BY rank ASC"
|
||||
" LIMIT 20 OFFSET ?"
|
||||
") AS ranktable ON torrents.id=ranktable.torrent_id;",
|
||||
(search, 20 * page)
|
||||
)
|
||||
context["torrents"] = [Torrent(t[0].hex(), t[1], utils.to_human_size(t[2]),
|
||||
datetime.fromtimestamp(t[3]).strftime("%d/%m/%Y"), [])
|
||||
for t in cur.fetchall()]
|
||||
|
||||
if len(context["torrents"]) < 20:
|
||||
context["next_page_exists"] = False
|
||||
else:
|
||||
context["next_page_exists"] = True
|
||||
|
||||
return flask.render_template("torrents.html", **context)
|
||||
|
||||
|
||||
def newest_torrents():
|
||||
magneticod_db = get_magneticod_db()
|
||||
|
||||
page = int(flask.request.args.get("page", 0))
|
||||
|
||||
context = {
|
||||
"page": page
|
||||
}
|
||||
|
||||
with magneticod_db:
|
||||
cur = magneticod_db.execute(
|
||||
"SELECT "
|
||||
" info_hash, "
|
||||
" name, "
|
||||
" total_size, "
|
||||
" discovered_on "
|
||||
"FROM torrents "
|
||||
"ORDER BY discovered_on DESC LIMIT 20 OFFSET ?",
|
||||
(20 * page,)
|
||||
)
|
||||
context["torrents"] = [Torrent(t[0].hex(), t[1], utils.to_human_size(t[2]), datetime.fromtimestamp(t[3]).strftime("%d/%m/%Y"), [])
|
||||
for t in cur.fetchall()]
|
||||
|
||||
# noinspection PyTypeChecker
|
||||
if len(context["torrents"]) < 20:
|
||||
context["next_page_exists"] = False
|
||||
else:
|
||||
context["next_page_exists"] = True
|
||||
|
||||
return flask.render_template("torrents.html", **context)
|
||||
|
||||
|
||||
@app.route("/torrents/<info_hash>/", defaults={"name": None})
|
||||
@requires_auth
|
||||
def torrent_redirect(**kwargs):
|
||||
magnetico_db = get_magneticod_db()
|
||||
|
||||
try:
|
||||
info_hash = bytes.fromhex(kwargs["info_hash"])
|
||||
assert len(info_hash) == 20
|
||||
except (AssertionError, ValueError): # In case info_hash variable is not a proper hex-encoded bytes
|
||||
return flask.abort(400)
|
||||
|
||||
with magnetico_db:
|
||||
cur = magnetico_db.execute("SELECT name FROM torrents WHERE info_hash=? LIMIT 1;", (info_hash,))
|
||||
try:
|
||||
name = cur.fetchone()[0]
|
||||
except TypeError: # In case no results returned, TypeError will be raised when we try to subscript None object
|
||||
return flask.abort(404)
|
||||
|
||||
return flask.redirect("/torrents/%s/%s" % (kwargs["info_hash"], name), code=301)
|
||||
|
||||
|
||||
@app.route("/torrents/<info_hash>/<name>")
|
||||
@requires_auth
|
||||
def torrent(**kwargs):
|
||||
magneticod_db = get_magneticod_db()
|
||||
context = {}
|
||||
|
||||
try:
|
||||
info_hash = bytes.fromhex(kwargs["info_hash"])
|
||||
assert len(info_hash) == 20
|
||||
except (AssertionError, ValueError): # In case info_hash variable is not a proper hex-encoded bytes
|
||||
return flask.abort(400)
|
||||
|
||||
with magneticod_db:
|
||||
cur = magneticod_db.execute("SELECT name, discovered_on FROM torrents WHERE info_hash=? LIMIT 1;", (info_hash,))
|
||||
try:
|
||||
name, discovered_on = cur.fetchone()
|
||||
except TypeError: # In case no results returned, TypeError will be raised when we try to subscript None object
|
||||
return flask.abort(404)
|
||||
|
||||
cur = magneticod_db.execute("SELECT path, size FROM files "
|
||||
"WHERE torrent_id=(SELECT id FROM torrents WHERE info_hash=? LIMIT 1);",
|
||||
(info_hash,))
|
||||
raw_files = cur.fetchall()
|
||||
size = sum(f[1] for f in raw_files)
|
||||
files = [File(f[0], utils.to_human_size(f[1])) for f in raw_files]
|
||||
|
||||
context["torrent"] = Torrent(info_hash.hex(), name, utils.to_human_size(size), datetime.fromtimestamp(discovered_on).strftime("%d/%m/%Y"), files)
|
||||
|
||||
return flask.render_template("torrent.html", **context)
|
||||
|
||||
|
||||
def get_magneticod_db():
|
||||
""" Opens a new database connection if there is none yet for the current application context. """
|
||||
if hasattr(flask.g, "magneticod_db"):
|
||||
return flask.g.magneticod_db
|
||||
|
||||
magneticod_db_path = os.path.join(appdirs.user_data_dir("magneticod"), "database.sqlite3")
|
||||
magneticod_db = flask.g.magneticod_db = sqlite3.connect(magneticod_db_path, isolation_level=None)
|
||||
|
||||
with magneticod_db:
|
||||
magneticod_db.execute("CREATE VIRTUAL TABLE temp.fts_torrents USING fts4(torrent_id INTEGER, name TEXT NOT NULL);")
|
||||
magneticod_db.execute("INSERT INTO fts_torrents (torrent_id, name) SELECT id, name FROM torrents;")
|
||||
magneticod_db.execute("INSERT INTO fts_torrents (fts_torrents) VALUES ('optimize');")
|
||||
|
||||
magneticod_db.execute("CREATE TEMPORARY TRIGGER on_torrents_insert AFTER INSERT ON torrents FOR EACH ROW BEGIN"
|
||||
" INSERT INTO fts_torrents (torrent_id, name) VALUES (NEW.id, NEW.name);"
|
||||
"END;")
|
||||
|
||||
magneticod_db.create_function("rank", 1, utils.rank)
|
||||
|
||||
return magneticod_db
|
||||
|
||||
|
||||
@app.teardown_appcontext
|
||||
def close_magneticod_db(error):
|
||||
""" Closes the database again at the end of the request. """
|
||||
if hasattr(flask.g, "magneticod_db"):
|
||||
flask.g.magneticod_db.close()
|
BIN
magneticow/magneticow/static/assets/magnet.gif
Normal file
BIN
magneticow/magneticow/static/assets/magnet.gif
Normal file
Binary file not shown.
After Width: | Height: | Size: 148 B |
92
magneticow/magneticow/static/fonts/NotoMono/LICENSE_OFL.txt
Normal file
92
magneticow/magneticow/static/fonts/NotoMono/LICENSE_OFL.txt
Normal file
@ -0,0 +1,92 @@
|
||||
This Font Software is licensed under the SIL Open Font License,
|
||||
Version 1.1.
|
||||
|
||||
This license is copied below, and is also available with a FAQ at:
|
||||
http://scripts.sil.org/OFL
|
||||
|
||||
-----------------------------------------------------------
|
||||
SIL OPEN FONT LICENSE Version 1.1 - 26 February 2007
|
||||
-----------------------------------------------------------
|
||||
|
||||
PREAMBLE
|
||||
The goals of the Open Font License (OFL) are to stimulate worldwide
|
||||
development of collaborative font projects, to support the font
|
||||
creation efforts of academic and linguistic communities, and to
|
||||
provide a free and open framework in which fonts may be shared and
|
||||
improved in partnership with others.
|
||||
|
||||
The OFL allows the licensed fonts to be used, studied, modified and
|
||||
redistributed freely as long as they are not sold by themselves. The
|
||||
fonts, including any derivative works, can be bundled, embedded,
|
||||
redistributed and/or sold with any software provided that any reserved
|
||||
names are not used by derivative works. The fonts and derivatives,
|
||||
however, cannot be released under any other type of license. The
|
||||
requirement for fonts to remain under this license does not apply to
|
||||
any document created using the fonts or their derivatives.
|
||||
|
||||
DEFINITIONS
|
||||
"Font Software" refers to the set of files released by the Copyright
|
||||
Holder(s) under this license and clearly marked as such. This may
|
||||
include source files, build scripts and documentation.
|
||||
|
||||
"Reserved Font Name" refers to any names specified as such after the
|
||||
copyright statement(s).
|
||||
|
||||
"Original Version" refers to the collection of Font Software
|
||||
components as distributed by the Copyright Holder(s).
|
||||
|
||||
"Modified Version" refers to any derivative made by adding to,
|
||||
deleting, or substituting -- in part or in whole -- any of the
|
||||
components of the Original Version, by changing formats or by porting
|
||||
the Font Software to a new environment.
|
||||
|
||||
"Author" refers to any designer, engineer, programmer, technical
|
||||
writer or other person who contributed to the Font Software.
|
||||
|
||||
PERMISSION & CONDITIONS
|
||||
Permission is hereby granted, free of charge, to any person obtaining
|
||||
a copy of the Font Software, to use, study, copy, merge, embed,
|
||||
modify, redistribute, and sell modified and unmodified copies of the
|
||||
Font Software, subject to the following conditions:
|
||||
|
||||
1) Neither the Font Software nor any of its individual components, in
|
||||
Original or Modified Versions, may be sold by itself.
|
||||
|
||||
2) Original or Modified Versions of the Font Software may be bundled,
|
||||
redistributed and/or sold with any software, provided that each copy
|
||||
contains the above copyright notice and this license. These can be
|
||||
included either as stand-alone text files, human-readable headers or
|
||||
in the appropriate machine-readable metadata fields within text or
|
||||
binary files as long as those fields can be easily viewed by the user.
|
||||
|
||||
3) No Modified Version of the Font Software may use the Reserved Font
|
||||
Name(s) unless explicit written permission is granted by the
|
||||
corresponding Copyright Holder. This restriction only applies to the
|
||||
primary font name as presented to the users.
|
||||
|
||||
4) The name(s) of the Copyright Holder(s) or the Author(s) of the Font
|
||||
Software shall not be used to promote, endorse or advertise any
|
||||
Modified Version, except to acknowledge the contribution(s) of the
|
||||
Copyright Holder(s) and the Author(s) or with their explicit written
|
||||
permission.
|
||||
|
||||
5) The Font Software, modified or unmodified, in part or in whole,
|
||||
must be distributed entirely under this license, and must not be
|
||||
distributed under any other license. The requirement for fonts to
|
||||
remain under this license does not apply to any document created using
|
||||
the Font Software.
|
||||
|
||||
TERMINATION
|
||||
This license becomes null and void if any of the above conditions are
|
||||
not met.
|
||||
|
||||
DISCLAIMER
|
||||
THE FONT SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
|
||||
EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTIES OF
|
||||
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT
|
||||
OF COPYRIGHT, PATENT, TRADEMARK, OR OTHER RIGHT. IN NO EVENT SHALL THE
|
||||
COPYRIGHT HOLDER BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY,
|
||||
INCLUDING ANY GENERAL, SPECIAL, INDIRECT, INCIDENTAL, OR CONSEQUENTIAL
|
||||
DAMAGES, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING
|
||||
FROM, OUT OF THE USE OR INABILITY TO USE THE FONT SOFTWARE OR FROM
|
||||
OTHER DEALINGS IN THE FONT SOFTWARE.
|
BIN
magneticow/magneticow/static/fonts/NotoMono/Regular.ttf
Normal file
BIN
magneticow/magneticow/static/fonts/NotoMono/Regular.ttf
Normal file
Binary file not shown.
BIN
magneticow/magneticow/static/fonts/NotoSansUI/Bold.ttf
Normal file
BIN
magneticow/magneticow/static/fonts/NotoSansUI/Bold.ttf
Normal file
Binary file not shown.
BIN
magneticow/magneticow/static/fonts/NotoSansUI/BoldItalic.ttf
Normal file
BIN
magneticow/magneticow/static/fonts/NotoSansUI/BoldItalic.ttf
Normal file
Binary file not shown.
BIN
magneticow/magneticow/static/fonts/NotoSansUI/Italic.ttf
Normal file
BIN
magneticow/magneticow/static/fonts/NotoSansUI/Italic.ttf
Normal file
Binary file not shown.
@ -0,0 +1,92 @@
|
||||
This Font Software is licensed under the SIL Open Font License,
|
||||
Version 1.1.
|
||||
|
||||
This license is copied below, and is also available with a FAQ at:
|
||||
http://scripts.sil.org/OFL
|
||||
|
||||
-----------------------------------------------------------
|
||||
SIL OPEN FONT LICENSE Version 1.1 - 26 February 2007
|
||||
-----------------------------------------------------------
|
||||
|
||||
PREAMBLE
|
||||
The goals of the Open Font License (OFL) are to stimulate worldwide
|
||||
development of collaborative font projects, to support the font
|
||||
creation efforts of academic and linguistic communities, and to
|
||||
provide a free and open framework in which fonts may be shared and
|
||||
improved in partnership with others.
|
||||
|
||||
The OFL allows the licensed fonts to be used, studied, modified and
|
||||
redistributed freely as long as they are not sold by themselves. The
|
||||
fonts, including any derivative works, can be bundled, embedded,
|
||||
redistributed and/or sold with any software provided that any reserved
|
||||
names are not used by derivative works. The fonts and derivatives,
|
||||
however, cannot be released under any other type of license. The
|
||||
requirement for fonts to remain under this license does not apply to
|
||||
any document created using the fonts or their derivatives.
|
||||
|
||||
DEFINITIONS
|
||||
"Font Software" refers to the set of files released by the Copyright
|
||||
Holder(s) under this license and clearly marked as such. This may
|
||||
include source files, build scripts and documentation.
|
||||
|
||||
"Reserved Font Name" refers to any names specified as such after the
|
||||
copyright statement(s).
|
||||
|
||||
"Original Version" refers to the collection of Font Software
|
||||
components as distributed by the Copyright Holder(s).
|
||||
|
||||
"Modified Version" refers to any derivative made by adding to,
|
||||
deleting, or substituting -- in part or in whole -- any of the
|
||||
components of the Original Version, by changing formats or by porting
|
||||
the Font Software to a new environment.
|
||||
|
||||
"Author" refers to any designer, engineer, programmer, technical
|
||||
writer or other person who contributed to the Font Software.
|
||||
|
||||
PERMISSION & CONDITIONS
|
||||
Permission is hereby granted, free of charge, to any person obtaining
|
||||
a copy of the Font Software, to use, study, copy, merge, embed,
|
||||
modify, redistribute, and sell modified and unmodified copies of the
|
||||
Font Software, subject to the following conditions:
|
||||
|
||||
1) Neither the Font Software nor any of its individual components, in
|
||||
Original or Modified Versions, may be sold by itself.
|
||||
|
||||
2) Original or Modified Versions of the Font Software may be bundled,
|
||||
redistributed and/or sold with any software, provided that each copy
|
||||
contains the above copyright notice and this license. These can be
|
||||
included either as stand-alone text files, human-readable headers or
|
||||
in the appropriate machine-readable metadata fields within text or
|
||||
binary files as long as those fields can be easily viewed by the user.
|
||||
|
||||
3) No Modified Version of the Font Software may use the Reserved Font
|
||||
Name(s) unless explicit written permission is granted by the
|
||||
corresponding Copyright Holder. This restriction only applies to the
|
||||
primary font name as presented to the users.
|
||||
|
||||
4) The name(s) of the Copyright Holder(s) or the Author(s) of the Font
|
||||
Software shall not be used to promote, endorse or advertise any
|
||||
Modified Version, except to acknowledge the contribution(s) of the
|
||||
Copyright Holder(s) and the Author(s) or with their explicit written
|
||||
permission.
|
||||
|
||||
5) The Font Software, modified or unmodified, in part or in whole,
|
||||
must be distributed entirely under this license, and must not be
|
||||
distributed under any other license. The requirement for fonts to
|
||||
remain under this license does not apply to any document created using
|
||||
the Font Software.
|
||||
|
||||
TERMINATION
|
||||
This license becomes null and void if any of the above conditions are
|
||||
not met.
|
||||
|
||||
DISCLAIMER
|
||||
THE FONT SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
|
||||
EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTIES OF
|
||||
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT
|
||||
OF COPYRIGHT, PATENT, TRADEMARK, OR OTHER RIGHT. IN NO EVENT SHALL THE
|
||||
COPYRIGHT HOLDER BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY,
|
||||
INCLUDING ANY GENERAL, SPECIAL, INDIRECT, INCIDENTAL, OR CONSEQUENTIAL
|
||||
DAMAGES, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING
|
||||
FROM, OUT OF THE USE OR INABILITY TO USE THE FONT SOFTWARE OR FROM
|
||||
OTHER DEALINGS IN THE FONT SOFTWARE.
|
BIN
magneticow/magneticow/static/fonts/NotoSansUI/Regular.ttf
Normal file
BIN
magneticow/magneticow/static/fonts/NotoSansUI/Regular.ttf
Normal file
Binary file not shown.
59
magneticow/magneticow/static/scripts/torrent.js
Normal file
59
magneticow/magneticow/static/scripts/torrent.js
Normal file
@ -0,0 +1,59 @@
|
||||
// Derived from the Source: http://stackoverflow.com/a/17141374
|
||||
// Copyright (c) 2013 'icktoofay' on stackoverflow.com
|
||||
// Licensed under Creative Commons Attribution-ShareAlike 3.0 Unported (CC BY-SA 3.0)
|
||||
// See https://creativecommons.org/licenses/by-sa/3.0/ for details of the license.
|
||||
// See https://meta.stackexchange.com/questions/271080/the-mit-license-clarity-on-using-code-on-stack-overflow-and-stack-exchange
|
||||
// for legal concerns "on using code on Stack Overflow and Stack Exchange".
|
||||
|
||||
"use strict";
|
||||
|
||||
|
||||
window.onload = function() {
|
||||
var pre_element = document.getElementsByTagName("pre")[0];
|
||||
var paths = pre_element.textContent.replace(/\s+$/, "").split("\n");
|
||||
paths = paths.map(function(path) { return path.split('/'); });
|
||||
pre_element.textContent = stringify(structurise(paths)).join("\n");
|
||||
};
|
||||
|
||||
|
||||
function structurise(paths) {
|
||||
var items = [];
|
||||
for(var i = 0, l = paths.length; i < l; i++) {
|
||||
var path = paths[i];
|
||||
var name = path[0];
|
||||
var rest = path.slice(1);
|
||||
var item = null;
|
||||
for(var j = 0, m = items.length; j < m; j++) {
|
||||
if(items[j].name === name) {
|
||||
item = items[j];
|
||||
break;
|
||||
}
|
||||
}
|
||||
if(item === null) {
|
||||
item = {name: name, children: []};
|
||||
items.push(item);
|
||||
}
|
||||
if(rest.length > 0) {
|
||||
item.children.push(rest);
|
||||
}
|
||||
}
|
||||
for(i = 0, l = items.length; i < l; i++) {
|
||||
item = items[i];
|
||||
item.children = structurise(item.children);
|
||||
}
|
||||
return items;
|
||||
}
|
||||
|
||||
|
||||
function stringify(items) {
|
||||
var lines = [];
|
||||
for(var i = 0, l = items.length; i < l; i++) {
|
||||
var item = items[i];
|
||||
lines.push(item.name);
|
||||
var subLines = stringify(item.children);
|
||||
for(var j = 0, m = subLines.length; j < m; j++) {
|
||||
lines.push(" " + subLines[j]);
|
||||
}
|
||||
}
|
||||
return lines;
|
||||
}
|
121
magneticow/magneticow/static/styles/essential.css
Normal file
121
magneticow/magneticow/static/styles/essential.css
Normal file
@ -0,0 +1,121 @@
|
||||
@font-face {
|
||||
font-family: 'Noto Sans';
|
||||
src: url('../fonts/NotoSansUI/Regular.ttf');
|
||||
font-weight: normal;
|
||||
font-style: normal;
|
||||
}
|
||||
|
||||
@font-face {
|
||||
font-family: 'Noto Sans';
|
||||
src: url('../fonts/NotoSansUI/Bold.ttf');
|
||||
font-weight: bold;
|
||||
font-style: normal;
|
||||
}
|
||||
|
||||
@font-face {
|
||||
font-family: 'Noto Sans';
|
||||
src: url('../fonts/NotoSansUI/Italic.ttf');
|
||||
font-weight: normal;
|
||||
font-style: italic;
|
||||
}
|
||||
|
||||
@font-face {
|
||||
font-family: 'Noto Sans';
|
||||
src: url('../fonts/NotoSansUI/BoldItalic.ttf');
|
||||
font-weight: bold;
|
||||
font-style: italic;
|
||||
}
|
||||
|
||||
@font-face {
|
||||
font-family: 'Noto Mono';
|
||||
src: url('../fonts/NotoMono/Regular.ttf');
|
||||
font-weight: normal;
|
||||
font-style: monospace;
|
||||
}
|
||||
|
||||
|
||||
html {
|
||||
font-family: 'Noto Sans', sans-serif;
|
||||
}
|
||||
|
||||
pre {
|
||||
font-family: 'Noto Mono';
|
||||
line-height: 1.2em;
|
||||
}
|
||||
|
||||
body {
|
||||
padding: 1em 3em 1em 3em;
|
||||
font-weight: 400;
|
||||
line-height: 1.45;
|
||||
}
|
||||
|
||||
b {
|
||||
font-weight: bold;
|
||||
}
|
||||
|
||||
/* Source: http://type-scale.com/ (using 1.200 - Minor Third Scale) */
|
||||
html {
|
||||
font-size: 1em;
|
||||
}
|
||||
|
||||
p {
|
||||
margin-bottom: 1.3em;
|
||||
}
|
||||
|
||||
h1, h2, h3, h4 {
|
||||
margin: 1.414em 0 0.5em;
|
||||
font-weight: inherit;
|
||||
line-height: 1.2;
|
||||
}
|
||||
|
||||
h1 {
|
||||
margin-top: 0;
|
||||
font-size: 2.074em;
|
||||
}
|
||||
|
||||
h2 {
|
||||
font-size: 1.728em;
|
||||
}
|
||||
|
||||
h3 {
|
||||
font-size: 1.44em;
|
||||
}
|
||||
|
||||
h4 {
|
||||
font-size: 1.2em;
|
||||
}
|
||||
|
||||
small {
|
||||
font-size: 0.833em;
|
||||
}
|
||||
|
||||
|
||||
/* Source: https://gist.github.com/unruthless/413930 */
|
||||
sub, sup {
|
||||
/* Specified in % so that the sup/sup is the
|
||||
right size relative to the surrounding text */
|
||||
font-size: 75%;
|
||||
|
||||
/* Zero out the line-height so that it doesn't
|
||||
interfere with the positioning that follows */
|
||||
line-height: 0;
|
||||
|
||||
/* Where the magic happens: makes all browsers position
|
||||
the sup/sup properly, relative to the surrounding text */
|
||||
position: relative;
|
||||
|
||||
/* Note that if you're using Eric Meyer's reset.css, this
|
||||
is already set and you can remove this rule */
|
||||
vertical-align: baseline;
|
||||
}
|
||||
|
||||
sup {
|
||||
/* Move the superscripted text up */
|
||||
top: -0.5em;
|
||||
}
|
||||
|
||||
sub {
|
||||
/* Move the subscripted text down, but only
|
||||
half as far down as the superscript moved up */
|
||||
bottom: -0.25em;
|
||||
}
|
23
magneticow/magneticow/static/styles/homepage.css
Normal file
23
magneticow/magneticow/static/styles/homepage.css
Normal file
@ -0,0 +1,23 @@
|
||||
main {
|
||||
display: flex;
|
||||
align-items: center;
|
||||
align-content: center;
|
||||
|
||||
height: calc(100vh - 2 * 3em);
|
||||
width: calc(100vw - 2 * 3em);
|
||||
}
|
||||
|
||||
main form {
|
||||
max-width: 600px;
|
||||
width: 100%;
|
||||
|
||||
margin-left: 0.5em;
|
||||
}
|
||||
|
||||
main form input {
|
||||
width: 100%;
|
||||
}
|
||||
|
||||
main > div {
|
||||
margin-right: 0.5em;
|
||||
}
|
48
magneticow/magneticow/static/styles/reset.css
Normal file
48
magneticow/magneticow/static/styles/reset.css
Normal file
@ -0,0 +1,48 @@
|
||||
/* http://meyerweb.com/eric/tools/css/reset/
|
||||
v2.0 | 20110126
|
||||
License: none (public domain)
|
||||
*/
|
||||
|
||||
html, body, div, span, applet, object, iframe,
|
||||
h1, h2, h3, h4, h5, h6, p, blockquote, pre,
|
||||
a, abbr, acronym, address, big, cite, code,
|
||||
del, dfn, em, img, ins, kbd, q, s, samp,
|
||||
small, strike, strong, sub, sup, tt, var,
|
||||
b, u, i, center,
|
||||
dl, dt, dd, ol, ul, li,
|
||||
fieldset, form, label, legend,
|
||||
table, caption, tbody, tfoot, thead, tr, th, td,
|
||||
article, aside, canvas, details, embed,
|
||||
figure, figcaption, footer, header, hgroup,
|
||||
menu, nav, output, ruby, section, summary,
|
||||
time, mark, audio, video {
|
||||
margin: 0;
|
||||
padding: 0;
|
||||
border: 0;
|
||||
font-size: 100%;
|
||||
font: inherit;
|
||||
vertical-align: baseline;
|
||||
}
|
||||
/* HTML5 display-role reset for older browsers */
|
||||
article, aside, details, figcaption, figure,
|
||||
footer, header, hgroup, menu, nav, section {
|
||||
display: block;
|
||||
}
|
||||
body {
|
||||
line-height: 1;
|
||||
}
|
||||
ol, ul {
|
||||
list-style: none;
|
||||
}
|
||||
blockquote, q {
|
||||
quotes: none;
|
||||
}
|
||||
blockquote:before, blockquote:after,
|
||||
q:before, q:after {
|
||||
content: '';
|
||||
content: none;
|
||||
}
|
||||
table {
|
||||
border-collapse: collapse;
|
||||
border-spacing: 0;
|
||||
}
|
74
magneticow/magneticow/static/styles/torrent.css
Normal file
74
magneticow/magneticow/static/styles/torrent.css
Normal file
@ -0,0 +1,74 @@
|
||||
header {
|
||||
display: flex;
|
||||
align-items: center;
|
||||
align-content: center;
|
||||
|
||||
width: 100%;
|
||||
|
||||
padding-bottom: 0.833em;
|
||||
border-bottom: 1px solid;
|
||||
margin-bottom: 0.833em;
|
||||
}
|
||||
|
||||
header div a {
|
||||
text-decoration: none;
|
||||
color: inherit;
|
||||
}
|
||||
|
||||
header form {
|
||||
max-width: 600px;
|
||||
width: 100%;
|
||||
|
||||
margin-left: 0.5em;
|
||||
}
|
||||
|
||||
header form input {
|
||||
width: 100%;
|
||||
}
|
||||
|
||||
header > div {
|
||||
margin-right: 0.5em;
|
||||
}
|
||||
|
||||
#title h2 {
|
||||
margin-bottom: 0px;
|
||||
}
|
||||
|
||||
#title {
|
||||
margin-bottom: 0.833em;
|
||||
}
|
||||
|
||||
#title a {
|
||||
text-decoration: none;
|
||||
color: inherit;
|
||||
}
|
||||
|
||||
pre {
|
||||
background-color: black;
|
||||
color: white;
|
||||
overflow: auto;
|
||||
}
|
||||
|
||||
table {
|
||||
max-width: 700px;
|
||||
width: 700px;
|
||||
}
|
||||
|
||||
th {
|
||||
padding-right: 0.833em;
|
||||
}
|
||||
|
||||
td {
|
||||
padding-left: 0.833em;
|
||||
}
|
||||
|
||||
td, th {
|
||||
white-space: nowrap;
|
||||
}
|
||||
|
||||
th {
|
||||
font-weight: bold;
|
||||
text-align: left;
|
||||
|
||||
width: 1%;
|
||||
}
|
142
magneticow/magneticow/static/styles/torrents.css
Normal file
142
magneticow/magneticow/static/styles/torrents.css
Normal file
@ -0,0 +1,142 @@
|
||||
header {
|
||||
display: flex;
|
||||
align-items: center;
|
||||
align-content: center;
|
||||
|
||||
width: 100%;
|
||||
|
||||
padding-bottom: 0.833em;
|
||||
border-bottom: 1px solid;
|
||||
margin-bottom: 0.833em;
|
||||
}
|
||||
|
||||
|
||||
header div a {
|
||||
text-decoration: none;
|
||||
color: inherit;
|
||||
}
|
||||
|
||||
|
||||
header form {
|
||||
max-width: 600px;
|
||||
width: 100%;
|
||||
|
||||
margin-left: 0.5em;
|
||||
}
|
||||
|
||||
|
||||
header form input {
|
||||
width: 100%;
|
||||
}
|
||||
|
||||
|
||||
header > div {
|
||||
margin-right: 0.5em;
|
||||
}
|
||||
|
||||
footer {
|
||||
margin-top: 0.833em;
|
||||
|
||||
display: flex;
|
||||
justify-content: space-between;
|
||||
}
|
||||
|
||||
|
||||
footer form {
|
||||
display: inline;
|
||||
}
|
||||
|
||||
|
||||
footer button {
|
||||
font-size: 0.833em;
|
||||
}
|
||||
|
||||
|
||||
footer button:nth-child(1) {
|
||||
margin-right: 0.833em;
|
||||
}
|
||||
|
||||
|
||||
footer button:nth-child(2) {
|
||||
margin-left: 0.833em;
|
||||
}
|
||||
|
||||
|
||||
table {
|
||||
width: 100%;
|
||||
}
|
||||
|
||||
|
||||
th {
|
||||
font-weight: bold;
|
||||
text-align: left;
|
||||
}
|
||||
|
||||
|
||||
tbody td, thead th {
|
||||
padding-left: 0.833em;
|
||||
padding-right: 0.833em;
|
||||
|
||||
white-space: nowrap;
|
||||
}
|
||||
|
||||
|
||||
thead th:nth-child(1) { /* magnet link */
|
||||
width: 12px;
|
||||
}
|
||||
|
||||
|
||||
thead th:nth-child(2) { /* name */
|
||||
max-width: 0;
|
||||
text-overflow: ellipsis;
|
||||
overflow: hidden;
|
||||
}
|
||||
|
||||
|
||||
thead th:nth-child(3) { /* size */
|
||||
width: 75px;
|
||||
}
|
||||
|
||||
|
||||
tbody td:nth-child(3n+0) {
|
||||
text-align: right;
|
||||
}
|
||||
|
||||
|
||||
thead th:nth-child(4) { /* discovered on */
|
||||
width: 120px;
|
||||
}
|
||||
|
||||
tbody tr:nth-child(2n+2) {
|
||||
background-color: #efefef;
|
||||
}
|
||||
|
||||
|
||||
/* table in-borders */
|
||||
table {
|
||||
border-collapse: collapse;
|
||||
}
|
||||
|
||||
table td, table th {
|
||||
border-right: 1px solid black;
|
||||
}
|
||||
|
||||
table tr:first-child th {
|
||||
border-top: 0;
|
||||
}
|
||||
|
||||
table tr:last-child td {
|
||||
border-bottom: 0;
|
||||
}
|
||||
|
||||
table tr td:first-child,
|
||||
table tr th:first-child {
|
||||
border-left: 0;
|
||||
}
|
||||
|
||||
table tr td:last-child,
|
||||
table tr th:last-child {
|
||||
border-right: 0;
|
||||
}
|
||||
|
||||
|
19
magneticow/magneticow/templates/homepage.html
Normal file
19
magneticow/magneticow/templates/homepage.html
Normal file
@ -0,0 +1,19 @@
|
||||
<!DOCTYPE html>
|
||||
<html lang="en">
|
||||
<head>
|
||||
<meta charset="utf-8">
|
||||
<title>magneticow</title>
|
||||
<link rel="stylesheet" href=" {{ url_for('static', filename='styles/reset.css') }} ">
|
||||
<link rel="stylesheet" href=" {{ url_for('static', filename='styles/essential.css') }} ">
|
||||
<link rel="stylesheet" href=" {{ url_for('static', filename='styles/homepage.css') }} ">
|
||||
<!-- <script src="script.js"></script> -->
|
||||
</head>
|
||||
<body>
|
||||
<main>
|
||||
<div><b>magnetico<sup>w</sup></b>​<sub>(pre-alpha)</sub></div>
|
||||
<form action="/torrents" method="get" autocomplete="off" role="search">
|
||||
<input type="search" name="search" placeholder="Search the BitTorrent DHT" autofocus>
|
||||
</form>
|
||||
</main>
|
||||
</body>
|
||||
</html>
|
55
magneticow/magneticow/templates/torrent.html
Normal file
55
magneticow/magneticow/templates/torrent.html
Normal file
@ -0,0 +1,55 @@
|
||||
<!DOCTYPE html>
|
||||
<html lang="en">
|
||||
<head>
|
||||
<meta charset="utf-8">
|
||||
<title>{{ torrent.name }} - magnetico</title>
|
||||
<link rel="stylesheet" href="{{ url_for('static', filename='styles/reset.css') }}">
|
||||
<link rel="stylesheet" href="{{ url_for('static', filename='styles/essential.css') }}">
|
||||
<link rel="stylesheet" href="{{ url_for('static', filename='styles/torrent.css') }}">
|
||||
<script defer src="{{ url_for('static', filename='scripts/torrent.js') }}"></script>
|
||||
</head>
|
||||
<body>
|
||||
<header>
|
||||
<div><a href="/"><b>magnetico<sup>w</sup></b></a>​<sub>(pre-alpha)</sub></div>
|
||||
<form action="/torrents" method="get" autocomplete="off" role="search">
|
||||
<input type="search" name="search" placeholder="Search the BitTorrent DHT">
|
||||
</form>
|
||||
</header>
|
||||
<main>
|
||||
<div id="title">
|
||||
<h2>{{ torrent.name }}</h2>
|
||||
<a href="magnet:?xt=urn:btih:{{ torrent.info_hash }}&dn={{ torrent.name }}">
|
||||
<img src="{{ url_for('static', filename='assets/magnet.gif') }}" alt="Magnet link"
|
||||
title="Download this torrent using magnet" />
|
||||
<small>{{ torrent.info_hash }}</small>
|
||||
</a>
|
||||
</div>
|
||||
|
||||
<table>
|
||||
<tr>
|
||||
<th scope="row">Size</th>
|
||||
<td>{{ torrent.size }}</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<th scope="row">Discovered on</th>
|
||||
<td>{{ torrent.discovered_on }}</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<th scope="row">Files</th>
|
||||
<td>{{ torrent.files|length }}</td>
|
||||
</tr>
|
||||
</table>
|
||||
|
||||
<h3>Contents</h3>
|
||||
<noscript>
|
||||
<pre>
|
||||
{% for file in torrent.files -%}
|
||||
{{ file.path }}{{ "\n" }}
|
||||
{%- endfor %}
|
||||
</pre>
|
||||
</noscript>
|
||||
<!-- Content of this element will be overwritten by the script -->
|
||||
<pre>{% for file in torrent.files -%}{{ file.path }}{{ "\t" + file.size }}{{ "\n" }}{%- endfor %}</pre>
|
||||
</main>
|
||||
</body>
|
||||
</html>
|
56
magneticow/magneticow/templates/torrents.html
Normal file
56
magneticow/magneticow/templates/torrents.html
Normal file
@ -0,0 +1,56 @@
|
||||
<!DOCTYPE html>
|
||||
<html lang="en">
|
||||
<head>
|
||||
<meta charset="utf-8">
|
||||
<title>{% if search %}"{{search}}"{% else %}Most recent torrents{% endif %} - magneticow</title>
|
||||
<link rel="stylesheet" href=" {{ url_for('static', filename='styles/reset.css') }} ">
|
||||
<link rel="stylesheet" href=" {{ url_for('static', filename='styles/essential.css') }} ">
|
||||
<link rel="stylesheet" href=" {{ url_for('static', filename='styles/torrents.css') }} ">
|
||||
<!-- <script src="script.js"></script> -->
|
||||
</head>
|
||||
<body>
|
||||
<header>
|
||||
<div><a href="/"><b>magnetico<sup>w</sup></b></a>​<sub>(pre-alpha)</sub></div>
|
||||
<form action="/torrents" method="get" autocomplete="off" role="search">
|
||||
<input type="search" name="search" placeholder="Search the BitTorrent DHT" value="{{ search }}">
|
||||
</form>
|
||||
</header>
|
||||
<main>
|
||||
<table>
|
||||
<thead>
|
||||
<tr>
|
||||
<th><!-- Magnet link --></th>
|
||||
<th>Name</th>
|
||||
<th>Size</th>
|
||||
<th>Discovered on</th>
|
||||
</tr>
|
||||
</thead>
|
||||
<tbody>
|
||||
{% for torrent in torrents %}
|
||||
<tr>
|
||||
<td><a href="magnet:?xt=urn:btih:{{ torrent.info_hash }}&dn={{ torrent.name }}">
|
||||
<img src="{{ url_for('static', filename='assets/magnet.gif') }}" alt="Magnet link"
|
||||
title="Download this torrent using magnet" /></a></td>
|
||||
<td><a href="/torrents/{{ torrent.info_hash }}/{{ torrent.name }}">{{ torrent.name }}</a></td>
|
||||
<td>{{ torrent.size }}</td>
|
||||
<td>{{ torrent.discovered_on }}</td>
|
||||
</tr>
|
||||
{% endfor %}
|
||||
</tbody>
|
||||
</table>
|
||||
</main>
|
||||
<footer>
|
||||
|
||||
<form action="/torrents" method="get">
|
||||
<button {% if page == 0 %}disabled{% endif %}>Previous</button>
|
||||
<input type="text" name="search" value="{{ search }}" hidden>
|
||||
<input type="number" name="page" value="{{ page - 1 }}" hidden>
|
||||
</form>
|
||||
<form action="/torrents" method="get">
|
||||
<button {% if not next_page_exists %}disabled{% endif %}>Next</button>
|
||||
<input type="text" name="search" value="{{ search }}" hidden>
|
||||
<input type="number" name="page" value="{{ page + 1 }}" hidden>
|
||||
</form>
|
||||
</footer>
|
||||
</body>
|
||||
</html>
|
69
magneticow/magneticow/utils.py
Normal file
69
magneticow/magneticow/utils.py
Normal file
@ -0,0 +1,69 @@
|
||||
# magneticow - Lightweight web interface for magnetico.
|
||||
# Copyright (C) 2017 Mert Bora ALPER <bora@boramalper.org>
|
||||
# Dedicated to Cemile Binay, in whose hands I thrived.
|
||||
#
|
||||
# This program is free software: you can redistribute it and/or modify it under the terms of the GNU Affero General
|
||||
# Public License as published by the Free Software Foundation, either version 3 of the License, or (at your option) any
|
||||
# later version.
|
||||
#
|
||||
# This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied
|
||||
# warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU Affero General Public License for more
|
||||
# details.
|
||||
#
|
||||
# You should have received a copy of the GNU Affero General Public License along with this program. If not, see
|
||||
# <http://www.gnu.org/licenses/>.
|
||||
from math import log10
|
||||
from struct import unpack_from
|
||||
|
||||
|
||||
# Source: http://stackoverflow.com/a/1094933
|
||||
# (primarily: https://web.archive.org/web/20111010015624/http://blogmag.net/blog/read/38/Print_human_readable_file_size)
|
||||
def to_human_size(num, suffix='B'):
|
||||
for unit in ['', 'Ki', 'Mi', 'Gi', 'Ti', 'Pi', 'Ei', 'Zi']:
|
||||
if abs(num) < 1024:
|
||||
return "%3.1f %s%s" % (num, unit, suffix)
|
||||
num /= 1024
|
||||
return "%.1f %s%s" % (num, 'Yi', suffix)
|
||||
|
||||
|
||||
def rank(blob):
|
||||
# TODO: is there a way to futher optimize this?
|
||||
p, c, n = unpack_from("=LLL", blob, 0)
|
||||
|
||||
x = [] # list of tuples
|
||||
for i in range(12, 12 + 3*c*p*4, 3*4):
|
||||
x0, x1, x2 = unpack_from("=LLL", blob, i)
|
||||
if x1 != 0: # skip if it's index column
|
||||
x.append((x0, x1, x2))
|
||||
|
||||
# Ignore the first column (torrent_id)
|
||||
_, avgdl = unpack_from("=LL", blob, 12 + 3*c*p*4)
|
||||
|
||||
# Ignore the first column (torrent_id)
|
||||
_, l = unpack_from("=LL", blob, (12 + 3*c*p*4) + 4*c)
|
||||
|
||||
# Multiply by -1 so that sorting in the ASC order would yield the best match first
|
||||
return -1 * okapi_bm25(term_frequencies=[X[0] for X in x], dl=l, avgdl=avgdl, N=n, nq=[X[2] for X in x])
|
||||
|
||||
|
||||
# TODO: check if I got it right =)
|
||||
def okapi_bm25(term_frequencies, dl, avgdl, N, nq, k1=1.2, b=0.75):
|
||||
"""
|
||||
|
||||
:param term_frequencies: List of frequencies of each term in the document.
|
||||
:param dl: Length of the document in words.
|
||||
:param avgdl: Average document length in the collection.
|
||||
:param N: Total number of documents in the collection.
|
||||
:param nq: List of each numbers of documents containing term[i] for each term.
|
||||
:param k1: Adjustable constant; = 1.2 in FTS5 extension of SQLite3.
|
||||
:param b: Adjustable constant; = 0.75 in FTS5 extension of SQLite3.
|
||||
:return:
|
||||
"""
|
||||
return sum(
|
||||
log10((N - nq[i] + 0.5) / (nq[i] + 0.5)) *
|
||||
(
|
||||
(term_frequencies[i] * (k1 + 1)) /
|
||||
(term_frequencies[i] + k1 * (1 - b + b * dl / avgdl))
|
||||
)
|
||||
for i in range(len(term_frequencies))
|
||||
)
|
41
magneticow/setup.py
Normal file
41
magneticow/setup.py
Normal file
@ -0,0 +1,41 @@
|
||||
from setuptools import setup
|
||||
|
||||
|
||||
def read_file(path):
|
||||
with open(path) as file:
|
||||
return file.read()
|
||||
|
||||
|
||||
setup(
|
||||
name="magneticow",
|
||||
version="0.1.0",
|
||||
description="Lightweight web interface for magnetico.",
|
||||
long_description=read_file("README.rst"),
|
||||
url="http://magnetico.org",
|
||||
author="Mert Bora ALPER",
|
||||
author_email="bora@boramalper.org",
|
||||
license="GNU Affero General Public License v3 or later (AGPLv3+)",
|
||||
packages=["magneticow"],
|
||||
include_package_data=True,
|
||||
zip_safe=False,
|
||||
entry_points={
|
||||
"console_scripts": ["magneticow=magneticow.__main__:main"]
|
||||
},
|
||||
|
||||
install_requires=[
|
||||
"appdirs>=1.4.3",
|
||||
"flask>=0.12.1",
|
||||
"gevent>=1.2.1"
|
||||
],
|
||||
|
||||
classifiers=[
|
||||
"Development Status :: 2 - Pre-Alpha",
|
||||
"Environment :: Web Environment",
|
||||
"Intended Audience :: End Users/Desktop",
|
||||
"License :: OSI Approved :: GNU Affero General Public License v3 or later (AGPLv3+)",
|
||||
"Natural Language :: English",
|
||||
"Operating System :: POSIX :: Linux",
|
||||
"Programming Language :: Python :: 3 :: Only",
|
||||
"Programming Language :: Python :: Implementation :: CPython"
|
||||
]
|
||||
)
|
10
magneticow/systemd/magneticow.service
Normal file
10
magneticow/systemd/magneticow.service
Normal file
@ -0,0 +1,10 @@
|
||||
[Unit]
|
||||
Description=magneticow: lightweight web interface for magnetico
|
||||
|
||||
[Service]
|
||||
ExecStart=~/.local/bin/magneticow --port PORT --user USERNAME PASSWORD
|
||||
Restart=always
|
||||
RestartSec=5
|
||||
|
||||
[Install]
|
||||
WantedBy=multi-user.target
|
407
pylintrc
Normal file
407
pylintrc
Normal file
@ -0,0 +1,407 @@
|
||||
[MASTER]
|
||||
|
||||
# Specify a configuration file.
|
||||
#rcfile=
|
||||
|
||||
# Python code to execute, usually for sys.path manipulation such as
|
||||
# pygtk.require().
|
||||
#init-hook=
|
||||
|
||||
# Add files or directories to the blacklist. They should be base names, not
|
||||
# paths.
|
||||
ignore=.git
|
||||
|
||||
# Add files or directories matching the regex patterns to the blacklist. The
|
||||
# regex matches against base names, not paths.
|
||||
ignore-patterns=
|
||||
|
||||
# Pickle collected data for later comparisons.
|
||||
persistent=no
|
||||
|
||||
# List of plugins (as comma separated values of python modules names) to load,
|
||||
# usually to register additional checkers.
|
||||
load-plugins=
|
||||
|
||||
# Use multiple processes to speed up Pylint.
|
||||
jobs=4
|
||||
|
||||
# Allow loading of arbitrary C extensions. Extensions are imported into the
|
||||
# active Python interpreter and may run arbitrary code.
|
||||
unsafe-load-any-extension=no
|
||||
|
||||
# A comma-separated list of package or module names from where C extensions may
|
||||
# be loaded. Extensions are loading into the active Python interpreter and may
|
||||
# run arbitrary code
|
||||
extension-pkg-whitelist=
|
||||
|
||||
# Allow optimization of some AST trees. This will activate a peephole AST
|
||||
# optimizer, which will apply various small optimizations. For instance, it can
|
||||
# be used to obtain the result of joining multiple strings with the addition
|
||||
# operator. Joining a lot of strings can lead to a maximum recursion error in
|
||||
# Pylint and this flag can prevent that. It has one side effect, the resulting
|
||||
# AST will be different than the one from reality. This option is deprecated
|
||||
# and it will be removed in Pylint 2.0.
|
||||
optimize-ast=no
|
||||
|
||||
|
||||
[MESSAGES CONTROL]
|
||||
|
||||
# Only show warnings with the listed confidence levels. Leave empty to show
|
||||
# all. Valid levels: HIGH, INFERENCE, INFERENCE_FAILURE, UNDEFINED
|
||||
confidence=INFERENCE
|
||||
|
||||
# Enable the message, report, category or checker with the given id(s). You can
|
||||
# either give multiple identifier separated by comma (,) or put this option
|
||||
# multiple time (only on the command line, not in the configuration file where
|
||||
# it should appear only once). See also the "--disable" option for examples.
|
||||
#enable=
|
||||
|
||||
# Disable the message, report, category or checker with the given id(s). You
|
||||
# can either give multiple identifiers separated by comma (,) or put this
|
||||
# option multiple times (only on the command line, not in the configuration
|
||||
# file where it should appear only once).You can also use "--disable=all" to
|
||||
# disable everything first and then reenable specific checks. For example, if
|
||||
# you want to run only the similarities checker, you can use "--disable=all
|
||||
# --enable=similarities". If you want to run only the classes checker, but have
|
||||
# no Warning level messages displayed, use"--disable=all --enable=classes
|
||||
# --disable=W"
|
||||
disable=range-builtin-not-iterating,coerce-builtin,old-ne-operator,reduce-builtin,suppressed-message,parameter-unpacking,unichr-builtin,round-builtin,hex-method,dict-iter-method,basestring-builtin,no-absolute-import,using-cmp-argument,buffer-builtin,raw_input-builtin,delslice-method,filter-builtin-not-iterating,setslice-method,nonzero-method,import-star-module-level,useless-suppression,map-builtin-not-iterating,raising-string,file-builtin,dict-view-method,standarderror-builtin,long-suffix,print-statement,xrange-builtin,intern-builtin,input-builtin,metaclass-assignment,cmp-method,unpacking-in-except,cmp-builtin,next-method-called,coerce-method,apply-builtin,long-builtin,getslice-method,zip-builtin-not-iterating,backtick,execfile-builtin,unicode-builtin,old-division,indexing-exception,old-raise-syntax,oct-method,reload-builtin,old-octal-literal
|
||||
|
||||
|
||||
[REPORTS]
|
||||
|
||||
# Set the output format. Available formats are text, parseable, colorized, msvs
|
||||
# (visual studio) and html. You can also give a reporter class, eg
|
||||
# mypackage.mymodule.MyReporterClass.
|
||||
output-format=colorized
|
||||
|
||||
# Put messages in a separate file for each module / package specified on the
|
||||
# command line instead of printing them on stdout. Reports (if any) will be
|
||||
# written in a file name "pylint_global.[txt|html]". This option is deprecated
|
||||
# and it will be removed in Pylint 2.0.
|
||||
files-output=no
|
||||
|
||||
# Tells whether to display a full report or only the messages
|
||||
reports=yes
|
||||
|
||||
# Python expression which should return a note less than 10 (10 is the highest
|
||||
# note). You have access to the variables errors warning, statement which
|
||||
# respectively contain the number of errors / warnings messages and the total
|
||||
# number of statements analyzed. This is used by the global evaluation report
|
||||
# (RP0004).
|
||||
evaluation=10.0 - ((float(5 * error + warning + refactor + convention) / statement) * 10)
|
||||
|
||||
# Template used to display messages. This is a python new-style format string
|
||||
# used to format the message information. See doc for all details
|
||||
#msg-template=
|
||||
|
||||
|
||||
[SIMILARITIES]
|
||||
|
||||
# Minimum lines number of a similarity.
|
||||
min-similarity-lines=4
|
||||
|
||||
# Ignore comments when computing similarities.
|
||||
ignore-comments=yes
|
||||
|
||||
# Ignore docstrings when computing similarities.
|
||||
ignore-docstrings=yes
|
||||
|
||||
# Ignore imports when computing similarities.
|
||||
ignore-imports=no
|
||||
|
||||
|
||||
[MISCELLANEOUS]
|
||||
|
||||
# List of note tags to take in consideration, separated by a comma.
|
||||
notes=FIXME,XXX,TODO
|
||||
|
||||
|
||||
[VARIABLES]
|
||||
|
||||
# Tells whether we should check for unused import in __init__ files.
|
||||
init-import=no
|
||||
|
||||
# A regular expression matching the name of dummy variables (i.e. expectedly
|
||||
# not used).
|
||||
dummy-variables-rgx=(_+[a-zA-Z0-9]*?$)|dummy
|
||||
|
||||
# List of additional names supposed to be defined in builtins. Remember that
|
||||
# you should avoid to define new builtins when possible.
|
||||
additional-builtins=
|
||||
|
||||
# List of strings which can identify a callback function by name. A callback
|
||||
# name must start or end with one of those strings.
|
||||
callbacks=cb_,_cb
|
||||
|
||||
# List of qualified module names which can have objects that can redefine
|
||||
# builtins.
|
||||
redefining-builtins-modules=six.moves,future.builtins
|
||||
|
||||
|
||||
[FORMAT]
|
||||
|
||||
# Maximum number of characters on a single line.
|
||||
max-line-length=120
|
||||
|
||||
# Regexp for a line that is allowed to be longer than the limit.
|
||||
ignore-long-lines=^\s*(# )?<?https?://\S+>?$
|
||||
|
||||
# Allow the body of an if to be on the same line as the test if there is no
|
||||
# else.
|
||||
single-line-if-stmt=no
|
||||
|
||||
# List of optional constructs for which whitespace checking is disabled. `dict-
|
||||
# separator` is used to allow tabulation in dicts, etc.: {1 : 1,\n222: 2}.
|
||||
# `trailing-comma` allows a space between comma and closing bracket: (a, ).
|
||||
# `empty-line` allows space-only lines.
|
||||
no-space-check=trailing-comma,dict-separator
|
||||
|
||||
# Maximum number of lines in a module
|
||||
max-module-lines=1000
|
||||
|
||||
# String used as indentation unit. This is usually " " (4 spaces) or "\t" (1
|
||||
# tab).
|
||||
indent-string=' '
|
||||
|
||||
# Number of spaces of indent required inside a hanging or continued line.
|
||||
indent-after-paren=4
|
||||
|
||||
# Expected format of line ending, e.g. empty (any line ending), LF or CRLF.
|
||||
expected-line-ending-format=
|
||||
|
||||
|
||||
[LOGGING]
|
||||
|
||||
# Logging modules to check that the string format arguments are in logging
|
||||
# function parameter format
|
||||
logging-modules=logging
|
||||
|
||||
|
||||
[TYPECHECK]
|
||||
|
||||
# Tells whether missing members accessed in mixin class should be ignored. A
|
||||
# mixin class is detected if its name ends with "mixin" (case insensitive).
|
||||
ignore-mixin-members=yes
|
||||
|
||||
# List of module names for which member attributes should not be checked
|
||||
# (useful for modules/projects where namespaces are manipulated during runtime
|
||||
# and thus existing member attributes cannot be deduced by static analysis. It
|
||||
# supports qualified module names, as well as Unix pattern matching.
|
||||
ignored-modules=
|
||||
|
||||
# List of class names for which member attributes should not be checked (useful
|
||||
# for classes with dynamically set attributes). This supports the use of
|
||||
# qualified names.
|
||||
ignored-classes=optparse.Values,thread._local,_thread._local
|
||||
|
||||
# List of members which are set dynamically and missed by pylint inference
|
||||
# system, and so shouldn't trigger E1101 when accessed. Python regular
|
||||
# expressions are accepted.
|
||||
generated-members=
|
||||
|
||||
# List of decorators that produce context managers, such as
|
||||
# contextlib.contextmanager. Add to this list to register other decorators that
|
||||
# produce valid context managers.
|
||||
contextmanager-decorators=contextlib.contextmanager
|
||||
|
||||
|
||||
[BASIC]
|
||||
|
||||
# Good variable names which should always be accepted, separated by a comma
|
||||
good-names=i,j,k,ex,Run,_
|
||||
|
||||
# Bad variable names which should always be refused, separated by a comma
|
||||
bad-names=foo,bar,baz,toto,tutu,tata
|
||||
|
||||
# Colon-delimited sets of names that determine each other's naming style when
|
||||
# the name regexes allow several styles.
|
||||
name-group=
|
||||
|
||||
# Include a hint for the correct naming format with invalid-name
|
||||
include-naming-hint=no
|
||||
|
||||
# List of decorators that produce properties, such as abc.abstractproperty. Add
|
||||
# to this list to register other decorators that produce valid properties.
|
||||
property-classes=abc.abstractproperty
|
||||
|
||||
# Regular expression matching correct constant names
|
||||
const-rgx=(([A-Z_][A-Z0-9_]*)|(__.*__))$
|
||||
|
||||
# Naming hint for constant names
|
||||
const-name-hint=(([A-Z_][A-Z0-9_]*)|(__.*__))$
|
||||
|
||||
# Regular expression matching correct method names
|
||||
method-rgx=[a-z_][a-z0-9_]{2,30}$
|
||||
|
||||
# Naming hint for method names
|
||||
method-name-hint=[a-z_][a-z0-9_]{2,30}$
|
||||
|
||||
# Regular expression matching correct attribute names
|
||||
attr-rgx=[a-z_][a-z0-9_]{2,30}$
|
||||
|
||||
# Naming hint for attribute names
|
||||
attr-name-hint=[a-z_][a-z0-9_]{2,30}$
|
||||
|
||||
# Regular expression matching correct class names
|
||||
class-rgx=[A-Z_][a-zA-Z0-9]+$
|
||||
|
||||
# Naming hint for class names
|
||||
class-name-hint=[A-Z_][a-zA-Z0-9]+$
|
||||
|
||||
# Regular expression matching correct function names
|
||||
function-rgx=[a-z_][a-z0-9_]{2,30}$
|
||||
|
||||
# Naming hint for function names
|
||||
function-name-hint=[a-z_][a-z0-9_]{2,30}$
|
||||
|
||||
# Regular expression matching correct variable names
|
||||
variable-rgx=[a-z_][a-z0-9_]{2,30}$
|
||||
|
||||
# Naming hint for variable names
|
||||
variable-name-hint=[a-z_][a-z0-9_]{2,30}$
|
||||
|
||||
# Regular expression matching correct inline iteration names
|
||||
inlinevar-rgx=[A-Za-z_][A-Za-z0-9_]*$
|
||||
|
||||
# Naming hint for inline iteration names
|
||||
inlinevar-name-hint=[A-Za-z_][A-Za-z0-9_]*$
|
||||
|
||||
# Regular expression matching correct module names
|
||||
module-rgx=(([a-z_][a-z0-9_]*)|([A-Z][a-zA-Z0-9]+))$
|
||||
|
||||
# Naming hint for module names
|
||||
module-name-hint=(([a-z_][a-z0-9_]*)|([A-Z][a-zA-Z0-9]+))$
|
||||
|
||||
# Regular expression matching correct class attribute names
|
||||
class-attribute-rgx=([A-Za-z_][A-Za-z0-9_]{2,30}|(__.*__))$
|
||||
|
||||
# Naming hint for class attribute names
|
||||
class-attribute-name-hint=([A-Za-z_][A-Za-z0-9_]{2,30}|(__.*__))$
|
||||
|
||||
# Regular expression matching correct argument names
|
||||
argument-rgx=[a-z_][a-z0-9_]{2,30}$
|
||||
|
||||
# Naming hint for argument names
|
||||
argument-name-hint=[a-z_][a-z0-9_]{2,30}$
|
||||
|
||||
# Regular expression which should only match function or class names that do
|
||||
# not require a docstring.
|
||||
no-docstring-rgx=^_
|
||||
|
||||
# Minimum line length for functions/classes that require docstrings, shorter
|
||||
# ones are exempt.
|
||||
docstring-min-length=-1
|
||||
|
||||
|
||||
[ELIF]
|
||||
|
||||
# Maximum number of nested blocks for function / method body
|
||||
max-nested-blocks=5
|
||||
|
||||
|
||||
[SPELLING]
|
||||
|
||||
# Spelling dictionary name. Available dictionaries: none. To make it working
|
||||
# install python-enchant package.
|
||||
spelling-dict=
|
||||
|
||||
# List of comma separated words that should not be checked.
|
||||
spelling-ignore-words=
|
||||
|
||||
# A path to a file that contains private dictionary; one word per line.
|
||||
spelling-private-dict-file=
|
||||
|
||||
# Tells whether to store unknown words to indicated private dictionary in
|
||||
# --spelling-private-dict-file option instead of raising a message.
|
||||
spelling-store-unknown-words=no
|
||||
|
||||
|
||||
[CLASSES]
|
||||
|
||||
# List of method names used to declare (i.e. assign) instance attributes.
|
||||
defining-attr-methods=__init__,__new__,setUp
|
||||
|
||||
# List of valid names for the first argument in a class method.
|
||||
valid-classmethod-first-arg=cls
|
||||
|
||||
# List of valid names for the first argument in a metaclass class method.
|
||||
valid-metaclass-classmethod-first-arg=mcs
|
||||
|
||||
# List of member names, which should be excluded from the protected access
|
||||
# warning.
|
||||
exclude-protected=_asdict,_fields,_replace,_source,_make
|
||||
|
||||
|
||||
[IMPORTS]
|
||||
|
||||
# Deprecated modules which should not be used, separated by a comma
|
||||
deprecated-modules=optparse
|
||||
|
||||
# Create a graph of every (i.e. internal and external) dependencies in the
|
||||
# given file (report RP0402 must not be disabled)
|
||||
import-graph=
|
||||
|
||||
# Create a graph of external dependencies in the given file (report RP0402 must
|
||||
# not be disabled)
|
||||
ext-import-graph=
|
||||
|
||||
# Create a graph of internal dependencies in the given file (report RP0402 must
|
||||
# not be disabled)
|
||||
int-import-graph=
|
||||
|
||||
# Force import order to recognize a module as part of the standard
|
||||
# compatibility libraries.
|
||||
known-standard-library=
|
||||
|
||||
# Force import order to recognize a module as part of a third party library.
|
||||
known-third-party=enchant
|
||||
|
||||
# Analyse import fallback blocks. This can be used to support both Python 2 and
|
||||
# 3 compatible code, which means that the block might have code that exists
|
||||
# only in one or another interpreter, leading to false positives when analysed.
|
||||
analyse-fallback-blocks=no
|
||||
|
||||
|
||||
[DESIGN]
|
||||
|
||||
# Maximum number of arguments for function / method
|
||||
max-args=5
|
||||
|
||||
# Argument names that match this expression will be ignored. Default to name
|
||||
# with leading underscore
|
||||
ignored-argument-names=_.*
|
||||
|
||||
# Maximum number of locals for function / method body
|
||||
max-locals=15
|
||||
|
||||
# Maximum number of return / yield for function / method body
|
||||
max-returns=6
|
||||
|
||||
# Maximum number of branch for function / method body
|
||||
max-branches=12
|
||||
|
||||
# Maximum number of statements in function / method body
|
||||
max-statements=50
|
||||
|
||||
# Maximum number of parents for a class (see R0901).
|
||||
max-parents=7
|
||||
|
||||
# Maximum number of attributes for a class (see R0902).
|
||||
max-attributes=7
|
||||
|
||||
# Minimum number of public methods for a class (see R0903).
|
||||
min-public-methods=2
|
||||
|
||||
# Maximum number of public methods for a class (see R0904).
|
||||
max-public-methods=20
|
||||
|
||||
# Maximum number of boolean expressions in a if statement
|
||||
max-bool-expr=5
|
||||
|
||||
|
||||
[EXCEPTIONS]
|
||||
|
||||
# Exceptions that will emit a warning when being caught. Defaults to
|
||||
# "Exception"
|
||||
overgeneral-exceptions=Exception
|
Loading…
Reference in New Issue
Block a user