Add make targed generate-license & generate-gitignore + Update (#12682)

* Add make targed generate-license & generate-gitignore

* Update Gitignores & Licenses

Co-authored-by: techknowlogick <techknowlogick@gitea.io>
mj-v1.14.3
6543 3 years ago committed by GitHub
parent 3ecd030cd5
commit 84eac6ed6c
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23

@ -170,6 +170,8 @@ help:
@echo " - fomantic build fomantic files"
@echo " - generate run \"go generate\""
@echo " - fmt format the Go code"
@echo " - generate-license update license files"
@echo " - generate-gitignore update gitignore files"
@echo " - generate-swagger generate the swagger spec from code comments"
@echo " - swagger-validate check if the swagger spec is valid"
@echo " - golangci-lint run golangci-lint linter"
@ -668,6 +670,15 @@ update-translations:
mv ./translations/*.ini ./options/locale/
rmdir ./translations
.PHONY: generate-license
generate-license:
GO111MODULE=on $(GO) run build/generate-licenses.go
.PHONY: generate-gitignore
generate-gitignore:
GO111MODULE=on $(GO) run build/generate-gitignores.go
.PHONY: generate-images
generate-images:
npm install --no-save --no-package-lock xmldom fabric imagemin-zopfli

@ -83,3 +83,6 @@ lint/generated/
lint/outputs/
lint/tmp/
# lint/reports/
# Android Profiling
*.hprof

@ -6,6 +6,8 @@ Makefile.in
/py-compile
/test-driver
/ylwrap
.deps/
.dirstamp
# http://www.gnu.org/software/autoconf

@ -1,4 +1,21 @@
# ignore the error log and .htaccess and others
error_log
.htaccess
# concrete5 5.6 specific
config/site.php
files/cache/*
files/tmp/*
.htaccess
# concrete5 5.7 specific
# ignore everything but the index.html
/application/files/*
!/application/files/index.html
# ignore updates folder
/updates/*
# ignore sitemap.xml
/sitemap.xml

@ -31,3 +31,13 @@ lia.cache
nia.cache
nlia.cache
nra.cache
# generated timing files
*.timing.diff
*.v.after-timing
*.v.before-timing
*.v.timing
time-of-build-after.log
time-of-build-before.log
time-of-build-both.log
time-of-build-pretty.log

@ -19,3 +19,6 @@ doc/api/
*.js_
*.js.deps
*.js.map
.flutter-plugins
.flutter-plugins-dependencies

@ -23,25 +23,25 @@
# Ignore drupal core (if not versioning drupal sources)
/core
/vendor
/modules/README.txt
/profiles/README.txt
/themes/README.txt
/sites/README.txt
/sites/example.sites.php
/sites/example.settings.local.php
/sites/development.services.yml
/themes/README.txt
/vendor
/.csslintrc
/.editorconfig
/.eslintignore
/.eslintrc.json
/.gitattributes
/.ht.router.php
/.htaccess
/autoload.php
/composer.json
/composer.lock
/example.gitignore
/index.php
/INSTALL.txt
/LICENSE.txt
/README.txt
/robots.txt

@ -54,3 +54,7 @@ local.properties
.cache-main
.scala_dependencies
.worksheet
# Uncomment this line if you wish to ignore the project description file.
# Typically, this file would be tracked if it contains build/dependency configurations:
#.project

@ -1,9 +1,11 @@
# Godot-specific ignores
.import/
export.cfg
export_presets.cfg
# Imported translations (automatically generated from CSV files)
*.translation
# Mono-specific ignores
.mono/
data_*/

@ -1,5 +1,6 @@
.gradle
/build/
**/build/
!src/**/build/
# Ignore Gradle GUI config
gradle-app.setting

@ -1,25 +1,50 @@
#Learn more about Jenkins and JENKINS_HOME directory for which this file is intended.
# Learn more about Jenkins and JENKINS_HOME directory for which this file is
# intended.
#
# http://jenkins-ci.org/
# https://wiki.jenkins-ci.org/display/JENKINS/Administering+Jenkins
#
# Note: secret.key is purposefully not tracked by git. This should be backed up
# separately because configs may contain secrets which were encrypted using the
# secret.key. To back up secrets use 'tar -czf /tmp/secrets.tgz secret*' and
# save the file separate from your repository. If you want secrets backed up
# with configuration, then see the bottom of this file for an example.
#ignore all JENKINS_HOME except jobs directory, root xml config, and .gitignore file
# Ignore all JENKINS_HOME except jobs directory, root xml config, and
# .gitignore file.
/*
!/jobs
!/.gitignore
!/*.xml
#ignore all files in jobs subdirectories except for folders
#note: git doesn't track folders, only file content
# Ignore all files in jobs subdirectories except for folders.
# Note: git doesn't track folders, only file content.
jobs/**
!jobs/**/
#uncomment the following line to save next build numbers with config
# Uncomment the following line to save next build numbers with config.
#!jobs/**/nextBuildNumber
#exclude only config.xml files in repository subdirectories
# For performance reasons, we want to ignore builds in Jenkins jobs because it
# contains many tiny files on large installations. This can impact git
# performance when running even basic commands like 'git status'.
builds
indexing
# Exclude only config.xml files in repository subdirectories.
!config.xml
#don't track workspaces (when users build on the master)
# Don't track workspaces (when users build on the master).
jobs/**/*workspace
#as a result only settings and job config.xml files in JENKINS_HOME will be tracked by git
# Security warning: If secrets are included with your configuration, then an
# adversary will be able to decrypt all encrypted secrets within Jenkins
# config. Including secrets is a bad practice, but the example is included in
# case someone still wants it for convenience. Uncomment the following line to
# include secrets for decryption with repository configuration in Git.
#!/secret*
# As a result, only Jenkins settings and job config.xml files in JENKINS_HOME
# will be tracked by git.

@ -1,4 +1,4 @@
# Covers JetBrains IDEs: IntelliJ, RubyMine, PhpStorm, AppCode, PyCharm, CLion, Android Studio and WebStorm
# Covers JetBrains IDEs: IntelliJ, RubyMine, PhpStorm, AppCode, PyCharm, CLion, Android Studio, WebStorm and Rider
# Reference: https://intellij-support.jetbrains.com/hc/en-us/articles/206544839
# User-specific stuff

@ -0,0 +1,6 @@
# gitignore template for Jigsaw Static Site Generator
#
# website - https://jigsaw.tighten.co
# Ignore build folder
build_*

@ -6,6 +6,8 @@
*.bak
*.bck
*.kicad_pcb-bak
*.kicad_sch-bak
*.kicad_prl
*.sch-bak
*~
_autosave-*

@ -0,0 +1,5 @@
# Generated Metals (Scala Language Server) files
# Reference: https://scalameta.org/metals/
.metals/
.bloop/
project/metals.sbt

@ -41,8 +41,8 @@ build/Release
node_modules/
jspm_packages/
# TypeScript v1 declaration files
typings/
# Snowpack dependency directory (https://snowpack.dev/)
web_modules/
# TypeScript cache
*.tsbuildinfo
@ -74,9 +74,11 @@ typings/
# parcel-bundler cache (https://parceljs.org/)
.cache
.parcel-cache
# Next.js build output
.next
out
# Nuxt.js build / generate output
.nuxt
@ -105,3 +107,10 @@ dist
# Stores VSCode versions used for testing VSCode extensions
.vscode-test
# yarn v2
.yarn/cache
.yarn/unplugged
.yarn/build-state.yml
.yarn/install-state.gz
.pnp.*

@ -1,34 +1,173 @@
# Private files
# The following files contain your database credentials and other personal data.
# Cache, temp and personal files
config/settings.*.php
/.htaccess
*.log
# Cache, temp and generated files
# The following files are generated by PrestaShop.
admin-dev/autoupgrade/
# Cache
/cache/*
!/cache/index.php
!/cache/*/
/cache/*/*
!/cache/.htaccess
!/cache/cachefs/index.php
!/cache/deprecated.txt
!/cache/index.php
!/cache/purifier/index.php
!/cache/push/activity
!/cache/push/index.php
!/cache/push/trends
!/cache/sandbox/index.php
!/cache/smarty/cache/index.php
!/cache/smarty/compile/index.php
!/cache/smarty/index.php
!/cache/tcpdf/index.php
config/xml/*.xml
/log/*
*sitemap.xml
themes/*/cache/
modules/*/config*.xml
# Site content
# The following folders contain product images, virtual products, CSV's, etc.
# Download
/download/*
!/download/.htaccess
!/download/index.php
admin-dev/backups/
admin-dev/export/
admin-dev/import/
download/
# Images
/img/*
upload/
!/img/.htaccess
!/img/index.php
!/img/404.gif
!/img/bg_500.png
!/img/bg_loader.png
!/img/favicon.ico
!/img/loader.gif
!/img/loadingAnimation.gif
!/img/logo.jpg
!/img/logo.png
!/img/logo_invoice.jpg
!/img/logo_stores.png
!/img/macFFBgHack.png
!/img/prestashop-avatar.png
!/img/prestashop@2x.png
!/img/preston-login-wink@2x.png
!/img/preston-login@2x.png
!/img/questionmark.png
!/img/genders/index.php
!/img/admin/index.php
!/img/c/index.php
!/img/cms/index.php
!/img/co/index.php
!/img/jquery-ui
!/img/l/index.php
!/img/m/index.php
!/img/os/index.php
!/img/p/index.php
!/img/s/index.php
!/img/scenes
!/img/st/index.php
!/img/su/index.php
!/img/t/index.php
!/img/tmp/index.php
# Upload
/upload/*
!/upload/.htaccess
/vendor/*
/docs/phpdoc-sf/
/composer.lock
*.hot-update.js
*.hot-update.json
/admin-dev/autoupgrade/*
!/admin-dev/autoupgrade/index.php
!/admin-dev/autoupgrade/backup/index.php
/admin-dev/backups/*
!/admin-dev/backups/.htaccess
/admin-dev/import/*
!/admin-dev/import/.htaccess
!/admin-dev/import/index.php
/admin-dev/export/*
!/admin-dev/export/.htaccess
!/admin-dev/export/index.php
# Downloaded RTL files
/admin-dev/themes/default/css/bundle/default_rtl.css
/admin-dev/themes/default/css/bundle/shared_rtl.css
/admin-dev/themes/default/css/font_rtl.css
/admin-dev/themes/default/css/overrides_rtl.css
/admin-dev/themes/default/css/vendor/font-awesome/font-awesome_rtl.css
/admin-dev/themes/default/css/vendor/nv.d3_rtl.css
/admin-dev/themes/default/css/vendor/titatoggle-min_rtl.css
/admin-dev/themes/default/public/theme_rtl.css
/admin-dev/themes/new-theme/css/module/drop_rtl.css
/admin-dev/themes/new-theme/css/right-sidebar_rtl.css
themes/*/cache/*
# Config
config/settings.inc.php
config/settings.old.php
config/xml/*
config/themes/*
!config/xml/themes/default.xml
themes/*/config/settings_*.json
app/config/parameters.old.yml
app/config/config.php
# Themes, modules and overrides
modules/*
override/*
themes/*/
!themes/classic
!themes/_core
!themes/_libraries
# Vendors and dependencies
bower_components/
node_modules/
composer.phar
php-cs-fixer
.grunt/*
# Translations and emails templates
translations/*
mails/*
!mails/themes/
!mails/_partials/
themes/default-bootstrap/lang/*
themes/default-bootstrap/modules/*/translations/*.php
themes/default-bootstrap/mails/*
!themes/default-bootstrap/mails/en/
themes/default-bootstrap/modules/*/mails/*
!themes/default-bootstrap/modules/*/mails/en
# MISC
*sitemap.xml
/robots.txt
# Symfony
/bin/
/app/Resources/geoip/GeoLite2-City.mmdb
/app/Resources/translations/*
!/app/Resources/translations/default
/app/config/parameters.yml
/app/config/parameters.php
/build/
/phpunit.xml
/var/*
!/var/cache
/var/cache/*
!var/cache/.gitkeep
!/var/logs
/var/logs/*
!var/logs/.gitkeep
!/var/sessions
/var/sessions/*
!var/sessions/.gitkeep
!var/SymfonyRequirements.php
/vendor/
/web/bundles/

@ -1,5 +1,6 @@
# Dependencies
.psci_modules
.spago
bower_components
node_modules

@ -20,7 +20,6 @@ parts/
sdist/
var/
wheels/
pip-wheel-metadata/
share/python-wheels/
*.egg-info/
.installed.cfg
@ -50,6 +49,7 @@ coverage.xml
*.py,cover
.hypothesis/
.pytest_cache/
cover/
# Translations
*.mo
@ -72,6 +72,7 @@ instance/
docs/_build/
# PyBuilder
.pybuilder/
target/
# Jupyter Notebook
@ -82,7 +83,9 @@ profile_default/
ipython_config.py
# pyenv
.python-version
# For a library or package, you might want to ignore these files since the code is
# intended to run in multiple environments; otherwise, check them in:
# .python-version
# pipenv
# According to pypa/pipenv#598, it is recommended to include Pipfile.lock in version control.
@ -127,3 +130,9 @@ dmypy.json
# Pyre type checker
.pyre/
# pytype static type analyzer
.pytype/
# Cython debug symbols
cython_debug/

@ -50,3 +50,5 @@ compile_commands.json
# QtCreator local machine specific files for imported projects
*creator.user*
*_qmlcache.qrc

@ -37,3 +37,9 @@ vignettes/*.pdf
# R Environment Variables
.Renviron
# pkgdown site
docs/
# translation temp files
po/*~

@ -66,3 +66,4 @@ yarn-debug.log*
# Ignore uploaded files in development
/storage/*
!/storage/.keep
/public/uploads

@ -0,0 +1,7 @@
# Gitignore for Raku (https://raku.org)
# As part of https://github.com/github/gitignore
# precompiled files
.precomp
lib/.precomp

@ -1,6 +1,7 @@
# Generated by Cargo
# will have compiled files and executables
/target/
debug/
target/
# Remove Cargo.lock from gitignore if creating an executable, leave it for libraries
# More information here https://doc.rust-lang.org/cargo/guide/cargo-toml-vs-cargo-lock.html

@ -0,0 +1,5 @@
# gitignore template for AWS Serverless Application Model project
# website: https://docs.aws.amazon.com/serverless-application-model
# Ignore build folder
.aws-sam/

@ -12,6 +12,7 @@
# SFTP configuration file
sftp-config.json
sftp-config-alt*.json
# Package control specific files
Package Control.last-run

@ -135,8 +135,8 @@ acs-*.bib
# knitr
*-concordance.tex
# TODO Comment the next line if you want to keep your tikz graphics files
*.tikz
# TODO Uncomment the next line if you use knitr and want to ignore its generated tikz files
# *.tikz
*-tikzDictionary
# listings
@ -274,3 +274,11 @@ TSWLatexianTemp*
# Makeindex log files
*.lpz
# xwatermark package
*.xwm
# REVTeX puts footnotes in the bibliography by default, unless the nofootinbib
# option is specified. Footnotes are the stored in a file with suffix Notes.bib.
# Uncomment the next line to have this generated file ignored.
#*Notes.bib

@ -8,11 +8,12 @@
# Crash log files
crash.log
# Ignore any .tfvars files that are generated automatically for each Terraform run. Most
# .tfvars files are managed as part of configuration and so should be included in
# version control.
# Exclude all .tfvars files, which are likely to contain sentitive data, such as
# password, private keys, and other secrets. These should not be part of version
# control as they are data points which are potentially sensitive and subject
# to change depending on the environment.
#
# example.tfvars
*.tfvars
# Ignore override files as they are usually used to override resources locally and so
# are not checked in
@ -27,3 +28,7 @@ override.tf.json
# Include tfplan files to ignore the plan output of command: terraform plan -out=tfplan
# example: *tfplan*
# Ignore CLI configuration files
.terraformrc
terraform.rc

@ -14,10 +14,16 @@
# Ignore Umbraco content cache file
**/App_Data/umbraco.config
## this [Uu]mbraco/ folder should be created by cmd like `Install-Package UmbracoCms -Version 8.5.3`
## you can find your umbraco version at your Web.config. (i.e. <add key="Umbraco.Core.ConfigurationStatus" value="8.5.3" />)
## Uncomment this line if you think it fits the way you work on your project.
## **/[Uu]mbraco/
# Don't ignore Umbraco packages (VisualStudio.gitignore mistakes this for a NuGet packages folder)
# Make sure to include details from VisualStudio.gitignore BEFORE this
!**/App_Data/[Pp]ackages/*
!**/[Uu]mbraco/[Dd]eveloper/[Pp]ackages/*
!**/[Uu]mbraco/[Vv]iews/[Pp]ackages/*
# ImageProcessor DiskCache
**/App_Data/cache/

@ -8,6 +8,10 @@
/[Bb]uild/
/[Bb]uilds/
/[Ll]ogs/
/[Uu]ser[Ss]ettings/
# MemoryCaptures can get excessive in size.
# They also could contain extremely sensitive data
/[Mm]emoryCaptures/
# Asset meta data should only be ignored when the corresponding asset is also ignored
@ -53,8 +57,15 @@ sysinfo.txt
# Builds
*.apk
*.aab
*.unitypackage
# Crashlytics generated file
crashlytics-build.properties
# Packed Addressables
/[Aa]ssets/[Aa]ddressable[Aa]ssets[Dd]ata/*/*.bin*
# Temporary auto-generated Android Assets
/[Aa]ssets/[Ss]treamingAssets/aa.meta
/[Aa]ssets/[Ss]treamingAssets/aa/*

@ -23,6 +23,7 @@ mono_crash.*
[Rr]eleases/
x64/
x86/
[Ww][Ii][Nn]32/
[Aa][Rr][Mm]/
[Aa][Rr][Mm]64/
bld/
@ -61,6 +62,9 @@ project.lock.json
project.fragment.lock.json
artifacts/
# ASP.NET Scaffolding
ScaffoldingReadMe.txt
# StyleCop
StyleCopReport.xml
@ -138,7 +142,9 @@ _TeamCity*
!.axoCover/settings.json
# Coverlet is a free, cross platform Code Coverage Tool
coverage*[.json, .xml, .info]
coverage*.json
coverage*.xml
coverage*.info
# Visual Studio code coverage results
*.coverage
@ -351,3 +357,6 @@ MigrationBackup/
# Ionide (cross platform F# VS Code tools) working folder
.ionide/
# Fody - auto-generated XML schema
FodyWeavers.xsd

@ -4,3 +4,6 @@
!.vscode/launch.json
!.vscode/extensions.json
*.code-workspace
# Local History for Visual Studio Code
.history/

@ -26,8 +26,7 @@ permission. For written permission, please contact apache@apache.org .
5. Products derived from this software may not be called "Apache" [ex. "Jakarta,"
"Apache," or "Apache Commons,"] nor may "Apache" [ex. the names] appear in
their name, without prior written permission of the Apache Software Foundation
.
their name, without prior written permission of the Apache Software Foundation.
THIS SOFTWARE IS PROVIDED ''AS IS'' AND ANY EXPRESSED OR IMPLIED WARRANTIES,
INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND

@ -0,0 +1,26 @@
Copyright (c) <year> <owner> All rights reserved.
Redistribution and use in source and binary forms, with or without modification,
are permitted provided that the following conditions are met:
1. Redistributions of source code must retain the above copyright notice,
this list of conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice,
this list of conditions and the following disclaimer in the documentation
and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE
LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE
USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
The views and conclusions contained in the software and documentation are
those of the authors and should not be interpreted as representing official
policies, either expressed or implied, of the copyright holders or contributors.

@ -1,8 +1,9 @@
Copyright (c) 2003, The Regents of the University of California, through Lawrence
Berkeley National Laboratory (subject to receipt of any required approvals
from the U.S. Dept. of Energy). All rights reserved. Redistribution and use
in source and binary forms, with or without modification, are permitted provided
that the following conditions are met:
from the U.S. Dept. of Energy). All rights reserved.
Redistribution and use in source and binary forms, with or without modification,
are permitted provided that the following conditions are met:
(1) Redistributions of source code must retain the above copyright notice,
this list of conditions and the following disclaimer.
@ -19,21 +20,20 @@ prior written permission.
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE
FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH
DAMAGE.
ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER , THE UNITED STATES
GOVERNMENT, OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS;
OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER
IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
POSSIBILITY OF SUCH DAMAGE.
You are under no obligation whatsoever to provide any bug fixes, patches,
or upgrades to the features, functionality or performance of the source code
("Enhancements") to anyone; however, if you choose to make your Enhancements
available either publicly, or directly to Lawrence Berkeley National Laboratory,
without imposing a separate written license agreement for such Enhancements,
available either publicly, or directly to Lawrence Berkeley National Laboratory
, without imposing a separate written license agreement for such Enhancements,
then you hereby grant the following license: a non-exclusive, royalty-free
perpetual license to install, use, modify, prepare derivative works, incorporate
into other computer software, distribute, and sublicense such Enhancements

@ -0,0 +1,352 @@
# The Cryptographic Autonomy License, v. 1.0
*This Cryptographic Autonomy License (the "License") applies to any Work whose
owner has marked it with any of the following notices, or a similar demonstration
of intent: *
SPDX-License-Identifier: CAL-1.0
Licensed under the Cryptographic Autonomy License version 1.0
*or*
SPDX-License-Identifier: CAL-1.0-Combined-Work-Exception
Licensed under the Cryptographic Autonomy License version 1.0, with Combined
Work Exception
______________________________________________________________________
## 1. Purpose
This License gives You unlimited permission to use and modify the software
to which it applies (the "Work"), either as-is or in modified form, for Your
private purposes, while protecting the owners and contributors to the software
from liability.
This License also strives to protect the freedom and autonomy of third parties
who receive the Work from you. If any non-affiliated third party receives
any part, aspect, or element of the Work from You, this License requires that
You provide that third party all the permissions and materials needed to independently
use and modify the Work without that third party having a loss of data or
capability due to your actions.
The full permissions, conditions, and other terms are laid out below.
## 2. Receiving a License
In order to receive this License, You must agree to its rules. The rules of
this License are both obligations of Your agreement with the Licensor and
conditions to your License. You must not do anything with the Work that triggers
a rule You cannot or will not follow.
### 2.1. Application
The terms of this License apply to the Work as you receive it from Licensor,
as well as to any modifications, elaborations, or implementations created
by You that contain any licensable portion of the Work (a "Modified Work").
Unless specified, any reference to the Work also applies to a Modified Work.
### 2.2. Offer and Acceptance
This License is automatically offered to every person and organization. You
show that you accept this License and agree to its conditions by taking any
action with the Work that, absent this License, would infringe any intellectual
property right held by Licensor.
### 2.3. Compliance and Remedies
Any failure to act according to the terms and conditions of this License places
Your use of the Work outside the scope of the License and infringes the intellectual
property rights of the Licensor. In the event of infringement, the terms and
conditions of this License may be enforced by Licensor under the intellectual
property laws of any jurisdiction to which You are subject. You also agree
that either the Licensor or a Recipient (as an intended third-party beneficiary)
may enforce the terms and conditions of this License against You via specific
performance.
## 3. Permissions
### 3.1. Permissions Granted
Conditioned on compliance with section 4, and subject to the limitations of
section 3.2, Licensor grants You the world-wide, royalty-free, non-exclusive
permission to:
+ a) Take any action with the Work that would infringe the non-patent intellectual
property laws of any jurisdiction to which You are subject; and
+ b) claims that Licensor can license or becomes able to license, to the extent
that those claims are embodied in the Work as distributed by Licensor.
### 3.2. Limitations on Permissions Granted
The following limitations apply to the permissions granted in section 3.1:
+ a) Licensor does not grant any patent license for claims that are only infringed
due to modification of the Work as provided by Licensor, or the combination
of the Work as provided by Licensor, directly or indirectly, with any other
component, including other software or hardware.
+ b) Licensor does not grant any license to the trademarks, service marks,
or logos of Licensor, except to the extent necessary to comply with the attribution
conditions in section 4.1 of this License.
## 4. Conditions
If You exercise any permission granted by this License, such that the Work,
or any part, aspect, or element of the Work, is distributed, communicated,
made available, or made perceptible to a non-Affiliate third party (a "Recipient"),
either via physical delivery or via a network connection to the Recipient,
You must comply with the following conditions:
### 4.1. Provide Access to Source Code
Subject to the exception in section 4.4, You must provide to each Recipient
a copy of, or no-charge unrestricted network access to, the Source Code corresponding
to the Work ("Access").
The "Source Code" of the Work means the form of the Work preferred for making
modifications, including any comments, configuration information, documentation,
help materials, installation instructions, cryptographic seeds or keys, and
any information reasonably necessary for the Recipient to independently compile
and use the Source Code and to have full access to the functionality contained
in the Work.
#### 4.1.1. Providing Network Access to the Source Code
Network Access to the Notices and Source Code may be provided by You or by
a third party, such as a public software repository, and must persist during
the same period in which You exercise any of the permissions granted to You
under this License and for at least one year thereafter.
#### 4.1.2. Source Code for a Modified Work
Subject to the exception in section 4.5, You must provide to each Recipient
of a Modified Work Access to Source Code corresponding to those portions of
the Work remaining in the Modified Work as well as the modifications used
by You to create the Modified Work. The Source Code corresponding to the modifications
in the Modified Work must be provided to the Recipient either a) under this
License, or b) under a Compatible Open Source License.
#### 4.1.3. Coordinated Disclosure of Security Vulnerabilities
You may delay providing the Source Code corresponding to a particular modification
of the Work for up to ninety (90) days (the "Embargo Period") if:
+ a) the modification is intended to address a newly-identified vulnerability
or a security flaw in the Work,
+ b) disclosure of the vulnerability or security flaw before the end of the
Embargo Period would put the data, identity, or autonomy of one or more Recipients
of the Work at significant risk,
+ c) You are participating in a coordinated disclosure of the vulnerability
or security flaw with one or more additional Licensees, and
+ d) Access to the Source Code pertaining to the modification is provided
to all Recipients at the end of the Embargo Period.
### 4.2. Maintain User Autonomy
In addition to providing each Recipient the opportunity to have Access to
the Source Code, You cannot use the permissions given under this License to
interfere with a Recipient's ability to fully use an independent copy of the
Work generated from the Source Code You provide with the Recipient's own User
Data.
"User Data" means any data that is an input to or an output from the Work,
where the presence of the data is necessary for substantially identical use
of the Work in an equivalent context chosen by the Recipient, and where the
Recipient has an existing ownership interest, an existing right to possess,
or where the data has been generated by, for, or has been assigned to the
Recipient.
#### 4.2.1. No Withholding User Data
Throughout any period in which You exercise any of the permissions granted
to You under this License, You must also provide to any Recipient to whom
you provide services via the Work, a no-charge copy, provided in a commonly
used electronic form, of the Recipient's User Data in your possession, to
the extent that such User Data is available to You for use in conjunction
with the Work.
#### 4.2.2. No Technical Measures that Limit Access
You may not, by means of the use cryptographic methods applied to anything
provided to the Recipient, by possession or control of cryptographic keys,
seeds, hashes, by any other technological protection measures, or by any other
method, limit a Recipient's ability to access any functionality present in
Recipient's independent copy of the Work, or to deny a Recipient full control
of the Recipient's User Data.
#### 4.2.3. No Legal or Contractual Measures that Limit Access
You may not contractually restrict a Recipient's ability to independently
exercise the permissions granted under this License. You waive any legal power
to forbid circumvention of technical protection measures that include use
of the Work, and You waive any claim that the capabilities of the Work were
limited or modified as a means of enforcing the legal rights of third parties
against Recipients.
### 4.3. Provide Notices and Attribution
You must retain all licensing, authorship, or attribution notices contained
in the Source Code (the "Notices"), and provide all such Notices to each Recipient,
together with a statement acknowledging the use of the Work. Notices may be
provided directly to a Recipient or via an easy-to-find hyperlink to an Internet
location also providing Access to Source Code.
### 4.4. Scope of Conditions in this License
You are required to uphold the conditions of this License only relative to
those who are Recipients of the Work from You. Other than providing Recipients
with the applicable Notices, Access to Source Code, and a copy of and full
control of their User Data, nothing in this License requires You to provide
processing services to or engage in network interactions with anyone.
### 4.5. Combined Work Exception
As an exception to condition that You provide Recipients Access to Source
Code, any Source Code files marked by the Licensor as having the "Combined
Work Exception," or any object code exclusively resulting from Source Code
files so marked, may be combined with other Software into a "Larger Work."
So long as you comply with the requirements to provide Recipients the applicable
Notices and Access to the Source Code provided to You by Licensor, and you
provide Recipients access to their User Data and do not limit Recipient's
ability to independently work with their User Data, any other Software in
the Larger Work as well as the Larger Work as a whole may be licensed under
the terms of your choice.
## 5. Term and Termination
The term of this License begins when You receive the Work, and continues until
terminated for any of the reasons described herein, or until all Licensor's
intellectual property rights in the Software expire, whichever comes first
("Term"). This License cannot be revoked, only terminated for the reasons
listed below.
### 5.1. Effect of Termination
If this License is terminated for any reason, all permissions granted to You
under Section 3 by any Licensor automatically terminate. You will immediately
cease exercising any permissions granted in this License relative to the Work,
including as part of any Modified Work.
### 5.2. Termination for Non-Compliance; Reinstatement
This License terminates automatically if You fail to comply with any of the
conditions in section 4. As a special exception to termination for non-compliance,
Your permissions for the Work under this License will automatically be reinstated
if You come into compliance with all the conditions in section 2 within sixty
(60) days of being notified by Licensor or an intended third-party beneficiary
of Your noncompliance. You are eligible for reinstatement of permissions for
the Work one time only, and only for the sixty days immediately after becoming
aware of noncompliance. Loss of permissions granted for the Work under this
License due to either a) sustained noncompliance lasting more than sixty days
or b) subsequent termination for noncompliance after reinstatement, is permanent,
unless rights are specifically restored by Licensor in writing.
### 5.3. Termination Due to Litigation
If You initiate litigation against Licensor, or any Recipient of the Work,
either direct or indirect, asserting that the Work directly or indirectly
infringes any patent, then all permissions granted to You by this License
shall terminate. In the event of termination due to litigation, all permissions
validly granted by You under this License, directly or indirectly, shall survive
termination. Administrative review procedures, declaratory judgment actions,
counterclaims in response to patent litigation, and enforcement actions against
former Licensees terminated under this section do not cause termination due
to litigation.
## 6. Disclaimer of Warranty and Limit on Liability
As far as the law allows, the Work comes AS-IS, without any warranty of any
kind, and no Licensor or contributor will be liable to anyone for any damages
related to this software or this license, under any kind of legal claim, or
for any type of damages, including indirect, special, incidental, or consequential
damages of any type arising as a result of this License or the use of the
Work including, without limitation, damages for loss of goodwill, work stoppage,
computer failure or malfunction, loss of profits, revenue, or any and all
other commercial damages or losses.
## 7. Other Provisions
### 7.1. Affiliates
An "Affiliate" means any other entity that, directly or indirectly through
one or more intermediaries, controls, is controlled by, or is under common
control with, the Licensee. Employees of a Licensee and natural persons acting
as contractors exclusively providing services to Licensee are also Affiliates.
### 7.2. Choice of Jurisdiction and Governing Law
A Licensor may require that any action or suit by a Licensee relating to a
Work provided by Licensor under this License may be brought only in the courts
of a particular jurisdiction and under the laws of a particular jurisdiction
(excluding its conflict-of-law provisions), if Licensor provides conspicuous
notice of the particular jurisdiction to all Licensees.
### 7.3. No Sublicensing
This License is not sublicensable. Each time You provide the Work or a Modified
Work to a Recipient, the Recipient automatically receives a license under
the terms described in this License. You may not impose any further reservations,
conditions, or other provisions on any Recipients' exercise of the permissions
granted herein.
### 7.4. Attorneys' Fees
In any action to enforce the terms of this License, or seeking damages relating
thereto, including by an intended third-party beneficiary, the prevailing
party shall be entitled to recover its costs and expenses, including, without
limitation, reasonable attorneys' fees and costs incurred in connection with
such action, including any appeal of such action. A "prevailing party" is
the party that achieves, or avoids, compliance with this License, including
through settlement. This section shall survive the termination of this License.
### 7.5. No Waiver
Any failure by Licensor to enforce any provision of this License will not
constitute a present or future waiver of such provision nor limit Licensor's
ability to enforce such provision at a later time.
### 7.6. Severability
If any provision of this License is held to be unenforceable, such provision
shall be reformed only to the extent necessary to make it enforceable. Any
invalid or unenforceable portion will be interpreted to the effect and intent
of the original portion. If such a construction is not possible, the invalid
or unenforceable portion will be severed from this License but the rest of
this License will remain in full force and effect.
### 7.7. License for the Text of this License
The text of this license is released under the Creative Commons Attribution-ShareAlike
4.0 International License, with the caveat that any modifications of this
license may not use the name "Cryptographic Autonomy License" or any name
confusingly similar thereto to describe any derived work of this License.

@ -0,0 +1,352 @@
# The Cryptographic Autonomy License, v. 1.0
*This Cryptographic Autonomy License (the "License") applies to any Work whose
owner has marked it with any of the following notices, or a similar demonstration
of intent: *
SPDX-License-Identifier: CAL-1.0
Licensed under the Cryptographic Autonomy License version 1.0
*or*
SPDX-License-Identifier: CAL-1.0-Combined-Work-Exception
Licensed under the Cryptographic Autonomy License version 1.0, with Combined
Work Exception
______________________________________________________________________
## 1. Purpose
This License gives You unlimited permission to use and modify the software
to which it applies (the "Work"), either as-is or in modified form, for Your
private purposes, while protecting the owners and contributors to the software
from liability.
This License also strives to protect the freedom and autonomy of third parties
who receive the Work from you. If any non-affiliated third party receives
any part, aspect, or element of the Work from You, this License requires that
You provide that third party all the permissions and materials needed to independently
use and modify the Work without that third party having a loss of data or
capability due to your actions.
The full permissions, conditions, and other terms are laid out below.
## 2. Receiving a License
In order to receive this License, You must agree to its rules. The rules of
this License are both obligations of Your agreement with the Licensor and
conditions to your License. You must not do anything with the Work that triggers
a rule You cannot or will not follow.
### 2.1. Application
The terms of this License apply to the Work as you receive it from Licensor,
as well as to any modifications, elaborations, or implementations created
by You that contain any licensable portion of the Work (a "Modified Work").
Unless specified, any reference to the Work also applies to a Modified Work.
### 2.2. Offer and Acceptance
This License is automatically offered to every person and organization. You
show that you accept this License and agree to its conditions by taking any
action with the Work that, absent this License, would infringe any intellectual
property right held by Licensor.
### 2.3. Compliance and Remedies
Any failure to act according to the terms and conditions of this License places
Your use of the Work outside the scope of the License and infringes the intellectual
property rights of the Licensor. In the event of infringement, the terms and
conditions of this License may be enforced by Licensor under the intellectual
property laws of any jurisdiction to which You are subject. You also agree
that either the Licensor or a Recipient (as an intended third-party beneficiary)
may enforce the terms and conditions of this License against You via specific
performance.
## 3. Permissions
### 3.1. Permissions Granted
Conditioned on compliance with section 4, and subject to the limitations of
section 3.2, Licensor grants You the world-wide, royalty-free, non-exclusive
permission to:
+ a) Take any action with the Work that would infringe the non-patent intellectual
property laws of any jurisdiction to which You are subject; and
+ b) claims that Licensor can license or becomes able to license, to the extent
that those claims are embodied in the Work as distributed by Licensor.
### 3.2. Limitations on Permissions Granted
The following limitations apply to the permissions granted in section 3.1:
+ a) Licensor does not grant any patent license for claims that are only infringed
due to modification of the Work as provided by Licensor, or the combination
of the Work as provided by Licensor, directly or indirectly, with any other
component, including other software or hardware.
+ b) Licensor does not grant any license to the trademarks, service marks,
or logos of Licensor, except to the extent necessary to comply with the attribution
conditions in section 4.1 of this License.
## 4. Conditions
If You exercise any permission granted by this License, such that the Work,
or any part, aspect, or element of the Work, is distributed, communicated,
made available, or made perceptible to a non-Affiliate third party (a "Recipient"),
either via physical delivery or via a network connection to the Recipient,
You must comply with the following conditions:
### 4.1. Provide Access to Source Code
Subject to the exception in section 4.4, You must provide to each Recipient
a copy of, or no-charge unrestricted network access to, the Source Code corresponding
to the Work ("Access").
The "Source Code" of the Work means the form of the Work preferred for making
modifications, including any comments, configuration information, documentation,
help materials, installation instructions, cryptographic seeds or keys, and
any information reasonably necessary for the Recipient to independently compile
and use the Source Code and to have full access to the functionality contained
in the Work.
#### 4.1.1. Providing Network Access to the Source Code
Network Access to the Notices and Source Code may be provided by You or by
a third party, such as a public software repository, and must persist during
the same period in which You exercise any of the permissions granted to You
under this License and for at least one year thereafter.
#### 4.1.2. Source Code for a Modified Work
Subject to the exception in section 4.5, You must provide to each Recipient
of a Modified Work Access to Source Code corresponding to those portions of
the Work remaining in the Modified Work as well as the modifications used
by You to create the Modified Work. The Source Code corresponding to the modifications
in the Modified Work must be provided to the Recipient either a) under this
License, or b) under a Compatible Open Source License.
#### 4.1.3. Coordinated Disclosure of Security Vulnerabilities
You may delay providing the Source Code corresponding to a particular modification
of the Work for up to ninety (90) days (the "Embargo Period") if:
+ a) the modification is intended to address a newly-identified vulnerability
or a security flaw in the Work,
+ b) disclosure of the vulnerability or security flaw before the end of the
Embargo Period would put the data, identity, or autonomy of one or more Recipients
of the Work at significant risk,
+ c) You are participating in a coordinated disclosure of the vulnerability
or security flaw with one or more additional Licensees, and
+ d) Access to the Source Code pertaining to the modification is provided
to all Recipients at the end of the Embargo Period.
### 4.2. Maintain User Autonomy
In addition to providing each Recipient the opportunity to have Access to
the Source Code, You cannot use the permissions given under this License to
interfere with a Recipient's ability to fully use an independent copy of the
Work generated from the Source Code You provide with the Recipient's own User
Data.
"User Data" means any data that is an input to or an output from the Work,
where the presence of the data is necessary for substantially identical use
of the Work in an equivalent context chosen by the Recipient, and where the
Recipient has an existing ownership interest, an existing right to possess,
or where the data has been generated by, for, or has been assigned to the
Recipient.
#### 4.2.1. No Withholding User Data
Throughout any period in which You exercise any of the permissions granted
to You under this License, You must also provide to any Recipient to whom
you provide services via the Work, a no-charge copy, provided in a commonly
used electronic form, of the Recipient's User Data in your possession, to
the extent that such User Data is available to You for use in conjunction
with the Work.
#### 4.2.2. No Technical Measures that Limit Access
You may not, by means of the use cryptographic methods applied to anything
provided to the Recipient, by possession or control of cryptographic keys,
seeds, hashes, by any other technological protection measures, or by any other
method, limit a Recipient's ability to access any functionality present in
Recipient's independent copy of the Work, or to deny a Recipient full control
of the Recipient's User Data.
#### 4.2.3. No Legal or Contractual Measures that Limit Access
You may not contractually restrict a Recipient's ability to independently
exercise the permissions granted under this License. You waive any legal power
to forbid circumvention of technical protection measures that include use
of the Work, and You waive any claim that the capabilities of the Work were
limited or modified as a means of enforcing the legal rights of third parties
against Recipients.
### 4.3. Provide Notices and Attribution
You must retain all licensing, authorship, or attribution notices contained
in the Source Code (the "Notices"), and provide all such Notices to each Recipient,
together with a statement acknowledging the use of the Work. Notices may be
provided directly to a Recipient or via an easy-to-find hyperlink to an Internet
location also providing Access to Source Code.
### 4.4. Scope of Conditions in this License
You are required to uphold the conditions of this License only relative to
those who are Recipients of the Work from You. Other than providing Recipients
with the applicable Notices, Access to Source Code, and a copy of and full
control of their User Data, nothing in this License requires You to provide
processing services to or engage in network interactions with anyone.
### 4.5. Combined Work Exception
As an exception to condition that You provide Recipients Access to Source
Code, any Source Code files marked by the Licensor as having the "Combined
Work Exception," or any object code exclusively resulting from Source Code
files so marked, may be combined with other Software into a "Larger Work."
So long as you comply with the requirements to provide Recipients the applicable
Notices and Access to the Source Code provided to You by Licensor, and you
provide Recipients access to their User Data and do not limit Recipient's
ability to independently work with their User Data, any other Software in
the Larger Work as well as the Larger Work as a whole may be licensed under
the terms of your choice.
## 5. Term and Termination
The term of this License begins when You receive the Work, and continues until
terminated for any of the reasons described herein, or until all Licensor's
intellectual property rights in the Software expire, whichever comes first
("Term"). This License cannot be revoked, only terminated for the reasons
listed below.
### 5.1. Effect of Termination
If this License is terminated for any reason, all permissions granted to You
under Section 3 by any Licensor automatically terminate. You will immediately
cease exercising any permissions granted in this License relative to the Work,
including as part of any Modified Work.
### 5.2. Termination for Non-Compliance; Reinstatement
This License terminates automatically if You fail to comply with any of the
conditions in section 4. As a special exception to termination for non-compliance,
Your permissions for the Work under this License will automatically be reinstated
if You come into compliance with all the conditions in section 2 within sixty
(60) days of being notified by Licensor or an intended third-party beneficiary
of Your noncompliance. You are eligible for reinstatement of permissions for
the Work one time only, and only for the sixty days immediately after becoming
aware of noncompliance. Loss of permissions granted for the Work under this
License due to either a) sustained noncompliance lasting more than sixty days
or b) subsequent termination for noncompliance after reinstatement, is permanent,
unless rights are specifically restored by Licensor in writing.
### 5.3. Termination Due to Litigation
If You initiate litigation against Licensor, or any Recipient of the Work,
either direct or indirect, asserting that the Work directly or indirectly
infringes any patent, then all permissions granted to You by this License
shall terminate. In the event of termination due to litigation, all permissions
validly granted by You under this License, directly or indirectly, shall survive
termination. Administrative review procedures, declaratory judgment actions,
counterclaims in response to patent litigation, and enforcement actions against
former Licensees terminated under this section do not cause termination due
to litigation.
## 6. Disclaimer of Warranty and Limit on Liability
As far as the law allows, the Work comes AS-IS, without any warranty of any
kind, and no Licensor or contributor will be liable to anyone for any damages
related to this software or this license, under any kind of legal claim, or
for any type of damages, including indirect, special, incidental, or consequential
damages of any type arising as a result of this License or the use of the
Work including, without limitation, damages for loss of goodwill, work stoppage,
computer failure or malfunction, loss of profits, revenue, or any and all
other commercial damages or losses.
## 7. Other Provisions
### 7.1. Affiliates
An "Affiliate" means any other entity that, directly or indirectly through
one or more intermediaries, controls, is controlled by, or is under common
control with, the Licensee. Employees of a Licensee and natural persons acting
as contractors exclusively providing services to Licensee are also Affiliates.
### 7.2. Choice of Jurisdiction and Governing Law
A Licensor may require that any action or suit by a Licensee relating to a
Work provided by Licensor under this License may be brought only in the courts
of a particular jurisdiction and under the laws of a particular jurisdiction
(excluding its conflict-of-law provisions), if Licensor provides conspicuous
notice of the particular jurisdiction to all Licensees.
### 7.3. No Sublicensing
This License is not sublicensable. Each time You provide the Work or a Modified
Work to a Recipient, the Recipient automatically receives a license under
the terms described in this License. You may not impose any further reservations,
conditions, or other provisions on any Recipients' exercise of the permissions
granted herein.
### 7.4. Attorneys' Fees
In any action to enforce the terms of this License, or seeking damages relating
thereto, including by an intended third-party beneficiary, the prevailing
party shall be entitled to recover its costs and expenses, including, without
limitation, reasonable attorneys' fees and costs incurred in connection with
such action, including any appeal of such action. A "prevailing party" is
the party that achieves, or avoids, compliance with this License, including
through settlement. This section shall survive the termination of this License.
### 7.5. No Waiver
Any failure by Licensor to enforce any provision of this License will not
constitute a present or future waiver of such provision nor limit Licensor's
ability to enforce such provision at a later time.
### 7.6. Severability
If any provision of this License is held to be unenforceable, such provision
shall be reformed only to the extent necessary to make it enforceable. Any
invalid or unenforceable portion will be interpreted to the effect and intent
of the original portion. If such a construction is not possible, the invalid
or unenforceable portion will be severed from this License but the rest of
this License will remain in full force and effect.
### 7.7. License for the Text of this License
The text of this license is released under the Creative Commons Attribution-ShareAlike
4.0 International License, with the caveat that any modifications of this
license may not use the name "Cryptographic Autonomy License" or any name
confusingly similar thereto to describe any derived work of this License.

@ -0,0 +1,318 @@
CREATIVE COMMONS IST KEINE RECHTSANWALTSKANZLEI UND LEISTET KEINE RECHTSBERATUNG.
DIE BEREITSTELLUNG DIESER LIZENZ FÜHRT ZU KEINEM MANDATSVERHÄLTNIS. CREATIVE
COMMONS STELLT DIESE INFORMATIONEN OHNE GEWÄHR ZUR VERFÜGUNG. CREATIVE COMMONS
ÜBERNIMMT KEINE GEWÄHRLEISTUNG FÜR DIE GELIEFERTEN INFORMATIONEN UND SCHLIEßT
DIE HAFTUNG FÜR SCHÄDEN AUS, DIE SICH AUS DEREN GEBRAUCH ERGEBEN. Lizenz
DER GEGENSTAND DIESER LIZENZ (WIE UNTER "SCHUTZGEGENSTAND" DEFINIERT) WIRD
UNTER DEN BEDINGUNGEN DIESER CREATIVE COMMONS PUBLIC LICENSE ("CCPL", "LIZENZ"
ODER "LIZENZVERTRAG") ZUR VERFÜGUNG GESTELLT. DER SCHUTZGEGENSTAND IST DURCH
DAS URHEBERRECHT UND/ODER ANDERE GESETZE GESCHÜTZT. JEDE FORM DER NUTZUNG
DES SCHUTZGEGENSTANDES, DIE NICHT AUFGRUND DIESER LIZENZ ODER DURCH GESETZE
GESTATTET IST, IST UNZULÄSSIG.
DURCH DIE AUSÜBUNG EINES DURCH DIESE LIZENZ GEWÄHRTEN RECHTS AN DEM SCHUTZGEGENSTAND
ERKLÄREN SIE SICH MIT DEN LIZENZBEDINGUNGEN RECHTSVERBINDLICH EINVERSTANDEN.
SOWEIT DIESE LIZENZ ALS LIZENZVERTRAG ANZUSEHEN IST, GEWÄHRT IHNEN DER LIZENZGEBER
DIE IN DER LIZENZ GENANNTEN RECHTE UNENTGELTLICH UND IM AUSTAUSCH DAFÜR, DASS
SIE DAS GEBUNDENSEIN AN DIE LIZENZBEDINGUNGEN AKZEPTIEREN.
1. Definitionen
a. Der Begriff "Bearbeitung" im Sinne dieser Lizenz bezeichnet das Ergebnis
jeglicher Art von Veränderung des Schutzgegenstandes, solange dieses erkennbar
vom Schutzgegenstand abgeleitet wurde. Dies kann insbesondere auch eine Umgestaltung,
Änderung, Anpassung, Übersetzung oder Heranziehung des Schutzgegenstandes
zur Vertonung von Laufbildern sein. Nicht als Bearbeitung des Schutzgegenstandes
gelten seine Aufnahme in eine Sammlung oder ein Sammelwerk und die freie Nutzung
des Schutzgegenstandes.
b. Der Begriff "Sammelwerk" im Sinne dieser Lizenz meint eine Zusammenstellung
von literarischen, künstlerischen oder wissenschaftlichen Inhalten zu einem
einheitlichen Ganzen, sofern diese Zusammenstellung aufgrund von Auswahl und
Anordnung der darin enthaltenen selbständigen Elemente eine eigentümliche
geistige Schöpfung darstellt, unabhängig davon, ob die Elemente systematisch
oder methodisch angelegt und dadurch einzeln zugänglich sind oder nicht.
c. "Verbreiten" im Sinne dieser Lizenz bedeutet, den Schutzgegenstand oder
Bearbeitungen im Original oder in Form von Vervielfältigungsstücken, mithin
in körperlich fixierter Form der Öffentlichkeit zugänglich zu machen oder
in Verkehr zu bringen.
d. Der "Lizenzgeber" im Sinne dieser Lizenz ist diejenige natürliche oder
juristische Person oder Gruppe, die den Schutzgegenstand unter den Bedingungen
dieser Lizenz anbietet und insoweit als Rechteinhaberin auftritt.
e. "Rechteinhaber" im Sinne dieser Lizenz ist der Urheber des Schutzgegenstandes
oder jede andere natürliche oder juristische Person, die am Schutzgegenstand
ein Immaterialgüterrecht erlangt hat, welches die in Abschnitt 3 genannten