From 996fed380701e88d12c42a6e98761b07b5bbdd95 Mon Sep 17 00:00:00 2001 From: Olivier Bourgeois <3271352+bourgeoisor@users.noreply.github.com> Date: Sat, 30 Mar 2024 18:05:31 -0400 Subject: [PATCH] Change CRLF into LF for all files --- .github/CODE_OF_CONDUCT.md | 252 ++-- LICENSE | 1242 ++++++++--------- backend/Dockerfile | 46 +- frontend/.prettierrc | 4 +- .../fontawesome/webfonts/fa-brands-400.eot | Bin 134294 -> 134239 bytes .../fontawesome/webfonts/fa-brands-400.ttf | Bin 133988 -> 133933 bytes .../fontawesome/webfonts/fa-brands-400.woff | Bin 89988 -> 89987 bytes .../fontawesome/webfonts/fa-duotone-900.eot | Bin 562970 -> 562838 bytes .../fontawesome/webfonts/fa-duotone-900.ttf | Bin 562672 -> 562540 bytes .../fontawesome/webfonts/fa-duotone-900.woff | Bin 258976 -> 258974 bytes .../fontawesome/webfonts/fa-duotone-900.woff2 | Bin 182080 -> 182074 bytes .../fontawesome/webfonts/fa-light-300.eot | Bin 489274 -> 489149 bytes .../fontawesome/webfonts/fa-light-300.ttf | Bin 488992 -> 488867 bytes .../fontawesome/webfonts/fa-light-300.woff | Bin 245416 -> 245413 bytes .../fontawesome/webfonts/fa-light-300.woff2 | Bin 184204 -> 184203 bytes .../fontawesome/webfonts/fa-regular-400.eot | Bin 450238 -> 450138 bytes .../fontawesome/webfonts/fa-regular-400.ttf | Bin 449944 -> 449844 bytes .../fontawesome/webfonts/fa-regular-400.woff | Bin 224592 -> 224588 bytes .../fontawesome/webfonts/fa-regular-400.woff2 | Bin 168824 -> 168821 bytes .../fontawesome/webfonts/fa-solid-900.eot | Bin 384110 -> 383974 bytes .../fontawesome/webfonts/fa-solid-900.ttf | Bin 383828 -> 383692 bytes .../fontawesome/webfonts/fa-solid-900.woff | Bin 183368 -> 183365 bytes .../fontawesome/webfonts/fa-solid-900.woff2 | Bin 137104 -> 137102 bytes frontend/public/fonts/icomoon.eot | Bin 19852 -> 19850 bytes frontend/public/fonts/icomoon.ttf | Bin 19688 -> 19686 bytes frontend/public/fonts/icomoon.woff | Bin 19764 -> 19762 bytes frontend/public/icons/duty-dngs.png | Bin 11269 -> 11266 bytes frontend/public/icons/duty-expl.png | Bin 5682 -> 5681 bytes frontend/public/icons/duty-guild.png | Bin 6226 -> 6225 bytes frontend/public/icons/duty-high.png | Bin 10911 -> 10910 bytes frontend/public/icons/duty-raids.png | Bin 11822 -> 11821 bytes frontend/public/icons/duty-trials.png | Bin 8598 -> 8597 bytes frontend/public/icons/duty-vc.png | Bin 8577 -> 8576 bytes frontend/public/icons/gc-1-1.png | Bin 8470 -> 8469 bytes frontend/public/icons/gc-1-10.png | Bin 9734 -> 9733 bytes frontend/public/icons/gc-1-11.png | Bin 9933 -> 9932 bytes frontend/public/icons/gc-1-12.png | Bin 10955 -> 10954 bytes frontend/public/icons/gc-1-13.png | Bin 11254 -> 11253 bytes frontend/public/icons/gc-1-14.png | Bin 11534 -> 11533 bytes frontend/public/icons/gc-1-15.png | Bin 14064 -> 14063 bytes frontend/public/icons/gc-1-16.png | Bin 14318 -> 14317 bytes frontend/public/icons/gc-1-17.png | Bin 14783 -> 14782 bytes frontend/public/icons/gc-1-18.png | Bin 14920 -> 14919 bytes frontend/public/icons/gc-1-19.png | Bin 14730 -> 14729 bytes frontend/public/icons/gc-1-2.png | Bin 8702 -> 8701 bytes frontend/public/icons/gc-1-3.png | Bin 8753 -> 8752 bytes frontend/public/icons/gc-1-4.png | Bin 8861 -> 8860 bytes frontend/public/icons/gc-1-5.png | Bin 9222 -> 9221 bytes frontend/public/icons/gc-1-6.png | Bin 9268 -> 9267 bytes frontend/public/icons/gc-1-7.png | Bin 9229 -> 9228 bytes frontend/public/icons/gc-1-8.png | Bin 9352 -> 9351 bytes frontend/public/icons/gc-1-9.png | Bin 9743 -> 9742 bytes frontend/public/icons/gc-2-1.png | Bin 7533 -> 7531 bytes frontend/public/icons/gc-2-10.png | Bin 10226 -> 10224 bytes frontend/public/icons/gc-2-11.png | Bin 10670 -> 10669 bytes frontend/public/icons/gc-2-12.png | Bin 11948 -> 11947 bytes frontend/public/icons/gc-2-13.png | Bin 12085 -> 12083 bytes frontend/public/icons/gc-2-14.png | Bin 12201 -> 12200 bytes frontend/public/icons/gc-2-15.png | Bin 13209 -> 13208 bytes frontend/public/icons/gc-2-16.png | Bin 13304 -> 13303 bytes frontend/public/icons/gc-2-17.png | Bin 13661 -> 13660 bytes frontend/public/icons/gc-2-18.png | Bin 13847 -> 13846 bytes frontend/public/icons/gc-2-19.png | Bin 13893 -> 13892 bytes frontend/public/icons/gc-2-2.png | Bin 7653 -> 7652 bytes frontend/public/icons/gc-2-3.png | Bin 7660 -> 7659 bytes frontend/public/icons/gc-2-4.png | Bin 7957 -> 7955 bytes frontend/public/icons/gc-2-5.png | Bin 8984 -> 8983 bytes frontend/public/icons/gc-2-6.png | Bin 9241 -> 9240 bytes frontend/public/icons/gc-2-7.png | Bin 9466 -> 9465 bytes frontend/public/icons/gc-2-8.png | Bin 9922 -> 9921 bytes frontend/public/icons/gc-2-9.png | Bin 9872 -> 9871 bytes frontend/public/icons/gc-3-1.png | Bin 8443 -> 8442 bytes frontend/public/icons/gc-3-10.png | Bin 11318 -> 11317 bytes frontend/public/icons/gc-3-11.png | Bin 11931 -> 11930 bytes frontend/public/icons/gc-3-12.png | Bin 13039 -> 13038 bytes frontend/public/icons/gc-3-13.png | Bin 13147 -> 13145 bytes frontend/public/icons/gc-3-14.png | Bin 13780 -> 13779 bytes frontend/public/icons/gc-3-15.png | Bin 13372 -> 13371 bytes frontend/public/icons/gc-3-16.png | Bin 13625 -> 13624 bytes frontend/public/icons/gc-3-17.png | Bin 13796 -> 13795 bytes frontend/public/icons/gc-3-18.png | Bin 14461 -> 14460 bytes frontend/public/icons/gc-3-19.png | Bin 15111 -> 15110 bytes frontend/public/icons/gc-3-2.png | Bin 8880 -> 8879 bytes frontend/public/icons/gc-3-3.png | Bin 9170 -> 9169 bytes frontend/public/icons/gc-3-4.png | Bin 9357 -> 9356 bytes frontend/public/icons/gc-3-5.png | Bin 9763 -> 9762 bytes frontend/public/icons/gc-3-6.png | Bin 10425 -> 10424 bytes frontend/public/icons/gc-3-7.png | Bin 10785 -> 10784 bytes frontend/public/icons/gc-3-8.png | Bin 11365 -> 11364 bytes frontend/public/icons/gc-3-9.png | Bin 10853 -> 10852 bytes frontend/public/icons/town-1.png | Bin 5593 -> 5592 bytes frontend/public/icons/town-2.png | Bin 4828 -> 4827 bytes frontend/public/icons/town-3.png | Bin 5738 -> 5737 bytes frontend/public/index.html | 126 +- frontend/public/og_cover.png | Bin 31958 -> 31957 bytes frontend/src/assets/img/brand.png | Bin 7706 -> 7705 bytes frontend/src/assets/img/brand_grey.png | Bin 7834 -> 7833 bytes frontend/src/assets/img/hamster_avatar.png | Bin 72552 -> 72551 bytes .../src/assets/screenshots/de-encounters.png | Bin 292141 -> 292139 bytes .../src/assets/screenshots/en-checklist.png | Bin 194843 -> 194842 bytes .../src/assets/screenshots/en-encounters.png | Bin 278651 -> 278647 bytes .../src/assets/screenshots/en-questlines.png | Bin 267166 -> 267161 bytes .../src/assets/screenshots/fr-encounters.png | Bin 285316 -> 285314 bytes .../src/assets/screenshots/ja-encounters.png | Bin 604236 -> 604229 bytes godestone/core.go | 24 +- scripts/csv_to_json.py | 100 +- scripts/duty_names.py | 80 +- scripts/fetch_collect_json.py | 58 +- 108 files changed, 966 insertions(+), 966 deletions(-) diff --git a/.github/CODE_OF_CONDUCT.md b/.github/CODE_OF_CONDUCT.md index 1d8e9c47..d15711e0 100644 --- a/.github/CODE_OF_CONDUCT.md +++ b/.github/CODE_OF_CONDUCT.md @@ -1,127 +1,127 @@ -# Contributor Covenant Code of Conduct - -## Our Pledge - -We as members, contributors, and leaders pledge to make participation in our -community a harassment-free experience for everyone, regardless of age, body -size, visible or invisible disability, ethnicity, sex characteristics, gender -identity and expression, level of experience, education, socio-economic status, -nationality, personal appearance, race, religion, or sexual identity -and orientation. - -We pledge to act and interact in ways that contribute to an open, welcoming, -diverse, inclusive, and healthy community. - -## Our Standards - -Examples of behavior that contributes to a positive environment for our -community include: - -* Demonstrating empathy and kindness toward other people -* Being respectful of differing opinions, viewpoints, and experiences -* Giving and gracefully accepting constructive feedback -* Accepting responsibility and apologizing to those affected by our mistakes, - and learning from the experience -* Focusing on what is best not just for us as individuals, but for the - overall community - -Examples of unacceptable behavior include: - -* The use of sexualized language or imagery, and sexual attention or - advances of any kind -* Trolling, insulting or derogatory comments, and personal or political attacks -* Public or private harassment -* Publishing others' private information, such as a physical or email - address, without their explicit permission -* Other conduct which could reasonably be considered inappropriate in a - professional setting - -## Enforcement Responsibilities - -Community leaders are responsible for clarifying and enforcing our standards of -acceptable behavior and will take appropriate and fair corrective action in -response to any behavior that they deem inappropriate, threatening, offensive, -or harmful. - -Community leaders have the right and responsibility to remove, edit, or reject -comments, commits, code, wiki edits, issues, and other contributions that are -not aligned to this Code of Conduct, and will communicate reasons for moderation -decisions when appropriate. - -## Scope - -This Code of Conduct applies within all community spaces, and also applies when -an individual is officially representing the community in public spaces. -Examples of representing our community include using an official e-mail address, -posting via an official social media account, or acting as an appointed -representative at an online or offline event. - -## Enforcement - -Instances of abusive, harassing, or otherwise unacceptable behavior may be -reported to the community leaders responsible for enforcement. -All complaints will be reviewed and investigated promptly and fairly. - -All community leaders are obligated to respect the privacy and security of the -reporter of any incident. - -## Enforcement Guidelines - -Community leaders will follow these Community Impact Guidelines in determining -the consequences for any action they deem in violation of this Code of Conduct: - -### 1. Correction - -**Community Impact**: Use of inappropriate language or other behavior deemed -unprofessional or unwelcome in the community. - -**Consequence**: A private, written warning from community leaders, providing -clarity around the nature of the violation and an explanation of why the -behavior was inappropriate. A public apology may be requested. - -### 2. Warning - -**Community Impact**: A violation through a single incident or series -of actions. - -**Consequence**: A warning with consequences for continued behavior. No -interaction with the people involved, including unsolicited interaction with -those enforcing the Code of Conduct, for a specified period of time. This -includes avoiding interactions in community spaces as well as external channels -like social media. Violating these terms may lead to a temporary or -permanent ban. - -### 3. Temporary Ban - -**Community Impact**: A serious violation of community standards, including -sustained inappropriate behavior. - -**Consequence**: A temporary ban from any sort of interaction or public -communication with the community for a specified period of time. No public or -private interaction with the people involved, including unsolicited interaction -with those enforcing the Code of Conduct, is allowed during this period. -Violating these terms may lead to a permanent ban. - -### 4. Permanent Ban - -**Community Impact**: Demonstrating a pattern of violation of community -standards, including sustained inappropriate behavior, harassment of an -individual, or aggression toward or disparagement of classes of individuals. - -**Consequence**: A permanent ban from any sort of public interaction within -the community. - -## Attribution - -This Code of Conduct is adapted from the [Contributor Covenant][homepage], -version 2.0, available at -https://www.contributor-covenant.org/version/2/0/code_of_conduct.html. - -Community Impact Guidelines were inspired by [Mozilla's code of conduct -enforcement ladder](https://github.com/mozilla/diversity). - -[homepage]: https://www.contributor-covenant.org - -For answers to common questions about this code of conduct, see the FAQ at -https://www.contributor-covenant.org/faq. Translations are available at +# Contributor Covenant Code of Conduct + +## Our Pledge + +We as members, contributors, and leaders pledge to make participation in our +community a harassment-free experience for everyone, regardless of age, body +size, visible or invisible disability, ethnicity, sex characteristics, gender +identity and expression, level of experience, education, socio-economic status, +nationality, personal appearance, race, religion, or sexual identity +and orientation. + +We pledge to act and interact in ways that contribute to an open, welcoming, +diverse, inclusive, and healthy community. + +## Our Standards + +Examples of behavior that contributes to a positive environment for our +community include: + +* Demonstrating empathy and kindness toward other people +* Being respectful of differing opinions, viewpoints, and experiences +* Giving and gracefully accepting constructive feedback +* Accepting responsibility and apologizing to those affected by our mistakes, + and learning from the experience +* Focusing on what is best not just for us as individuals, but for the + overall community + +Examples of unacceptable behavior include: + +* The use of sexualized language or imagery, and sexual attention or + advances of any kind +* Trolling, insulting or derogatory comments, and personal or political attacks +* Public or private harassment +* Publishing others' private information, such as a physical or email + address, without their explicit permission +* Other conduct which could reasonably be considered inappropriate in a + professional setting + +## Enforcement Responsibilities + +Community leaders are responsible for clarifying and enforcing our standards of +acceptable behavior and will take appropriate and fair corrective action in +response to any behavior that they deem inappropriate, threatening, offensive, +or harmful. + +Community leaders have the right and responsibility to remove, edit, or reject +comments, commits, code, wiki edits, issues, and other contributions that are +not aligned to this Code of Conduct, and will communicate reasons for moderation +decisions when appropriate. + +## Scope + +This Code of Conduct applies within all community spaces, and also applies when +an individual is officially representing the community in public spaces. +Examples of representing our community include using an official e-mail address, +posting via an official social media account, or acting as an appointed +representative at an online or offline event. + +## Enforcement + +Instances of abusive, harassing, or otherwise unacceptable behavior may be +reported to the community leaders responsible for enforcement. +All complaints will be reviewed and investigated promptly and fairly. + +All community leaders are obligated to respect the privacy and security of the +reporter of any incident. + +## Enforcement Guidelines + +Community leaders will follow these Community Impact Guidelines in determining +the consequences for any action they deem in violation of this Code of Conduct: + +### 1. Correction + +**Community Impact**: Use of inappropriate language or other behavior deemed +unprofessional or unwelcome in the community. + +**Consequence**: A private, written warning from community leaders, providing +clarity around the nature of the violation and an explanation of why the +behavior was inappropriate. A public apology may be requested. + +### 2. Warning + +**Community Impact**: A violation through a single incident or series +of actions. + +**Consequence**: A warning with consequences for continued behavior. No +interaction with the people involved, including unsolicited interaction with +those enforcing the Code of Conduct, for a specified period of time. This +includes avoiding interactions in community spaces as well as external channels +like social media. Violating these terms may lead to a temporary or +permanent ban. + +### 3. Temporary Ban + +**Community Impact**: A serious violation of community standards, including +sustained inappropriate behavior. + +**Consequence**: A temporary ban from any sort of interaction or public +communication with the community for a specified period of time. No public or +private interaction with the people involved, including unsolicited interaction +with those enforcing the Code of Conduct, is allowed during this period. +Violating these terms may lead to a permanent ban. + +### 4. Permanent Ban + +**Community Impact**: Demonstrating a pattern of violation of community +standards, including sustained inappropriate behavior, harassment of an +individual, or aggression toward or disparagement of classes of individuals. + +**Consequence**: A permanent ban from any sort of public interaction within +the community. + +## Attribution + +This Code of Conduct is adapted from the [Contributor Covenant][homepage], +version 2.0, available at +https://www.contributor-covenant.org/version/2/0/code_of_conduct.html. + +Community Impact Guidelines were inspired by [Mozilla's code of conduct +enforcement ladder](https://github.com/mozilla/diversity). + +[homepage]: https://www.contributor-covenant.org + +For answers to common questions about this code of conduct, see the FAQ at +https://www.contributor-covenant.org/faq. Translations are available at https://www.contributor-covenant.org/translations. \ No newline at end of file diff --git a/LICENSE b/LICENSE index b059d641..810fce6e 100644 --- a/LICENSE +++ b/LICENSE @@ -1,621 +1,621 @@ - GNU GENERAL PUBLIC LICENSE - Version 3, 29 June 2007 - - Copyright (C) 2007 Free Software Foundation, Inc. - Everyone is permitted to copy and distribute verbatim copies - of this license document, but changing it is not allowed. - - Preamble - - The GNU General Public License is a free, copyleft license for -software and other kinds of works. - - The licenses for most software and other practical works are designed -to take away your freedom to share and change the works. By contrast, -the GNU General Public License is intended to guarantee your freedom to -share and change all versions of a program--to make sure it remains free -software for all its users. We, the Free Software Foundation, use the -GNU General Public License for most of our software; it applies also to -any other work released this way by its authors. You can apply it to -your programs, too. - - When we speak of free software, we are referring to freedom, not -price. Our General Public Licenses are designed to make sure that you -have the freedom to distribute copies of free software (and charge for -them if you wish), that you receive source code or can get it if you -want it, that you can change the software or use pieces of it in new -free programs, and that you know you can do these things. - - To protect your rights, we need to prevent others from denying you -these rights or asking you to surrender the rights. Therefore, you have -certain responsibilities if you distribute copies of the software, or if -you modify it: responsibilities to respect the freedom of others. - - For example, if you distribute copies of such a program, whether -gratis or for a fee, you must pass on to the recipients the same -freedoms that you received. You must make sure that they, too, receive -or can get the source code. And you must show them these terms so they -know their rights. - - Developers that use the GNU GPL protect your rights with two steps: -(1) assert copyright on the software, and (2) offer you this License -giving you legal permission to copy, distribute and/or modify it. - - For the developers' and authors' protection, the GPL clearly explains -that there is no warranty for this free software. For both users' and -authors' sake, the GPL requires that modified versions be marked as -changed, so that their problems will not be attributed erroneously to -authors of previous versions. - - Some devices are designed to deny users access to install or run -modified versions of the software inside them, although the manufacturer -can do so. This is fundamentally incompatible with the aim of -protecting users' freedom to change the software. The systematic -pattern of such abuse occurs in the area of products for individuals to -use, which is precisely where it is most unacceptable. Therefore, we -have designed this version of the GPL to prohibit the practice for those -products. If such problems arise substantially in other domains, we -stand ready to extend this provision to those domains in future versions -of the GPL, as needed to protect the freedom of users. - - Finally, every program is threatened constantly by software patents. -States should not allow patents to restrict development and use of -software on general-purpose computers, but in those that do, we wish to -avoid the special danger that patents applied to a free program could -make it effectively proprietary. To prevent this, the GPL assures that -patents cannot be used to render the program non-free. - - The precise terms and conditions for copying, distribution and -modification follow. - - TERMS AND CONDITIONS - - 0. Definitions. - - "This License" refers to version 3 of the GNU General Public License. - - "Copyright" also means copyright-like laws that apply to other kinds of -works, such as semiconductor masks. - - "The Program" refers to any copyrightable work licensed under this -License. Each licensee is addressed as "you". "Licensees" and -"recipients" may be individuals or organizations. - - To "modify" a work means to copy from or adapt all or part of the work -in a fashion requiring copyright permission, other than the making of an -exact copy. The resulting work is called a "modified version" of the -earlier work or a work "based on" the earlier work. - - A "covered work" means either the unmodified Program or a work based -on the Program. - - To "propagate" a work means to do anything with it that, without -permission, would make you directly or secondarily liable for -infringement under applicable copyright law, except executing it on a -computer or modifying a private copy. Propagation includes copying, -distribution (with or without modification), making available to the -public, and in some countries other activities as well. - - To "convey" a work means any kind of propagation that enables other -parties to make or receive copies. Mere interaction with a user through -a computer network, with no transfer of a copy, is not conveying. - - An interactive user interface displays "Appropriate Legal Notices" -to the extent that it includes a convenient and prominently visible -feature that (1) displays an appropriate copyright notice, and (2) -tells the user that there is no warranty for the work (except to the -extent that warranties are provided), that licensees may convey the -work under this License, and how to view a copy of this License. If -the interface presents a list of user commands or options, such as a -menu, a prominent item in the list meets this criterion. - - 1. Source Code. - - The "source code" for a work means the preferred form of the work -for making modifications to it. "Object code" means any non-source -form of a work. - - A "Standard Interface" means an interface that either is an official -standard defined by a recognized standards body, or, in the case of -interfaces specified for a particular programming language, one that -is widely used among developers working in that language. - - The "System Libraries" of an executable work include anything, other -than the work as a whole, that (a) is included in the normal form of -packaging a Major Component, but which is not part of that Major -Component, and (b) serves only to enable use of the work with that -Major Component, or to implement a Standard Interface for which an -implementation is available to the public in source code form. A -"Major Component", in this context, means a major essential component -(kernel, window system, and so on) of the specific operating system -(if any) on which the executable work runs, or a compiler used to -produce the work, or an object code interpreter used to run it. - - The "Corresponding Source" for a work in object code form means all -the source code needed to generate, install, and (for an executable -work) run the object code and to modify the work, including scripts to -control those activities. However, it does not include the work's -System Libraries, or general-purpose tools or generally available free -programs which are used unmodified in performing those activities but -which are not part of the work. For example, Corresponding Source -includes interface definition files associated with source files for -the work, and the source code for shared libraries and dynamically -linked subprograms that the work is specifically designed to require, -such as by intimate data communication or control flow between those -subprograms and other parts of the work. - - The Corresponding Source need not include anything that users -can regenerate automatically from other parts of the Corresponding -Source. - - The Corresponding Source for a work in source code form is that -same work. - - 2. Basic Permissions. - - All rights granted under this License are granted for the term of -copyright on the Program, and are irrevocable provided the stated -conditions are met. This License explicitly affirms your unlimited -permission to run the unmodified Program. The output from running a -covered work is covered by this License only if the output, given its -content, constitutes a covered work. This License acknowledges your -rights of fair use or other equivalent, as provided by copyright law. - - You may make, run and propagate covered works that you do not -convey, without conditions so long as your license otherwise remains -in force. You may convey covered works to others for the sole purpose -of having them make modifications exclusively for you, or provide you -with facilities for running those works, provided that you comply with -the terms of this License in conveying all material for which you do -not control copyright. Those thus making or running the covered works -for you must do so exclusively on your behalf, under your direction -and control, on terms that prohibit them from making any copies of -your copyrighted material outside their relationship with you. - - Conveying under any other circumstances is permitted solely under -the conditions stated below. Sublicensing is not allowed; section 10 -makes it unnecessary. - - 3. Protecting Users' Legal Rights From Anti-Circumvention Law. - - No covered work shall be deemed part of an effective technological -measure under any applicable law fulfilling obligations under article -11 of the WIPO copyright treaty adopted on 20 December 1996, or -similar laws prohibiting or restricting circumvention of such -measures. - - When you convey a covered work, you waive any legal power to forbid -circumvention of technological measures to the extent such circumvention -is effected by exercising rights under this License with respect to -the covered work, and you disclaim any intention to limit operation or -modification of the work as a means of enforcing, against the work's -users, your or third parties' legal rights to forbid circumvention of -technological measures. - - 4. Conveying Verbatim Copies. - - You may convey verbatim copies of the Program's source code as you -receive it, in any medium, provided that you conspicuously and -appropriately publish on each copy an appropriate copyright notice; -keep intact all notices stating that this License and any -non-permissive terms added in accord with section 7 apply to the code; -keep intact all notices of the absence of any warranty; and give all -recipients a copy of this License along with the Program. - - You may charge any price or no price for each copy that you convey, -and you may offer support or warranty protection for a fee. - - 5. Conveying Modified Source Versions. - - You may convey a work based on the Program, or the modifications to -produce it from the Program, in the form of source code under the -terms of section 4, provided that you also meet all of these conditions: - - a) The work must carry prominent notices stating that you modified - it, and giving a relevant date. - - b) The work must carry prominent notices stating that it is - released under this License and any conditions added under section - 7. This requirement modifies the requirement in section 4 to - "keep intact all notices". - - c) You must license the entire work, as a whole, under this - License to anyone who comes into possession of a copy. This - License will therefore apply, along with any applicable section 7 - additional terms, to the whole of the work, and all its parts, - regardless of how they are packaged. This License gives no - permission to license the work in any other way, but it does not - invalidate such permission if you have separately received it. - - d) If the work has interactive user interfaces, each must display - Appropriate Legal Notices; however, if the Program has interactive - interfaces that do not display Appropriate Legal Notices, your - work need not make them do so. - - A compilation of a covered work with other separate and independent -works, which are not by their nature extensions of the covered work, -and which are not combined with it such as to form a larger program, -in or on a volume of a storage or distribution medium, is called an -"aggregate" if the compilation and its resulting copyright are not -used to limit the access or legal rights of the compilation's users -beyond what the individual works permit. Inclusion of a covered work -in an aggregate does not cause this License to apply to the other -parts of the aggregate. - - 6. Conveying Non-Source Forms. - - You may convey a covered work in object code form under the terms -of sections 4 and 5, provided that you also convey the -machine-readable Corresponding Source under the terms of this License, -in one of these ways: - - a) Convey the object code in, or embodied in, a physical product - (including a physical distribution medium), accompanied by the - Corresponding Source fixed on a durable physical medium - customarily used for software interchange. - - b) Convey the object code in, or embodied in, a physical product - (including a physical distribution medium), accompanied by a - written offer, valid for at least three years and valid for as - long as you offer spare parts or customer support for that product - model, to give anyone who possesses the object code either (1) a - copy of the Corresponding Source for all the software in the - product that is covered by this License, on a durable physical - medium customarily used for software interchange, for a price no - more than your reasonable cost of physically performing this - conveying of source, or (2) access to copy the - Corresponding Source from a network server at no charge. - - c) Convey individual copies of the object code with a copy of the - written offer to provide the Corresponding Source. This - alternative is allowed only occasionally and noncommercially, and - only if you received the object code with such an offer, in accord - with subsection 6b. - - d) Convey the object code by offering access from a designated - place (gratis or for a charge), and offer equivalent access to the - Corresponding Source in the same way through the same place at no - further charge. You need not require recipients to copy the - Corresponding Source along with the object code. If the place to - copy the object code is a network server, the Corresponding Source - may be on a different server (operated by you or a third party) - that supports equivalent copying facilities, provided you maintain - clear directions next to the object code saying where to find the - Corresponding Source. Regardless of what server hosts the - Corresponding Source, you remain obligated to ensure that it is - available for as long as needed to satisfy these requirements. - - e) Convey the object code using peer-to-peer transmission, provided - you inform other peers where the object code and Corresponding - Source of the work are being offered to the general public at no - charge under subsection 6d. - - A separable portion of the object code, whose source code is excluded -from the Corresponding Source as a System Library, need not be -included in conveying the object code work. - - A "User Product" is either (1) a "consumer product", which means any -tangible personal property which is normally used for personal, family, -or household purposes, or (2) anything designed or sold for incorporation -into a dwelling. In determining whether a product is a consumer product, -doubtful cases shall be resolved in favor of coverage. For a particular -product received by a particular user, "normally used" refers to a -typical or common use of that class of product, regardless of the status -of the particular user or of the way in which the particular user -actually uses, or expects or is expected to use, the product. A product -is a consumer product regardless of whether the product has substantial -commercial, industrial or non-consumer uses, unless such uses represent -the only significant mode of use of the product. - - "Installation Information" for a User Product means any methods, -procedures, authorization keys, or other information required to install -and execute modified versions of a covered work in that User Product from -a modified version of its Corresponding Source. The information must -suffice to ensure that the continued functioning of the modified object -code is in no case prevented or interfered with solely because -modification has been made. - - If you convey an object code work under this section in, or with, or -specifically for use in, a User Product, and the conveying occurs as -part of a transaction in which the right of possession and use of the -User Product is transferred to the recipient in perpetuity or for a -fixed term (regardless of how the transaction is characterized), the -Corresponding Source conveyed under this section must be accompanied -by the Installation Information. But this requirement does not apply -if neither you nor any third party retains the ability to install -modified object code on the User Product (for example, the work has -been installed in ROM). - - The requirement to provide Installation Information does not include a -requirement to continue to provide support service, warranty, or updates -for a work that has been modified or installed by the recipient, or for -the User Product in which it has been modified or installed. Access to a -network may be denied when the modification itself materially and -adversely affects the operation of the network or violates the rules and -protocols for communication across the network. - - Corresponding Source conveyed, and Installation Information provided, -in accord with this section must be in a format that is publicly -documented (and with an implementation available to the public in -source code form), and must require no special password or key for -unpacking, reading or copying. - - 7. Additional Terms. - - "Additional permissions" are terms that supplement the terms of this -License by making exceptions from one or more of its conditions. -Additional permissions that are applicable to the entire Program shall -be treated as though they were included in this License, to the extent -that they are valid under applicable law. If additional permissions -apply only to part of the Program, that part may be used separately -under those permissions, but the entire Program remains governed by -this License without regard to the additional permissions. - - When you convey a copy of a covered work, you may at your option -remove any additional permissions from that copy, or from any part of -it. (Additional permissions may be written to require their own -removal in certain cases when you modify the work.) You may place -additional permissions on material, added by you to a covered work, -for which you have or can give appropriate copyright permission. - - Notwithstanding any other provision of this License, for material you -add to a covered work, you may (if authorized by the copyright holders of -that material) supplement the terms of this License with terms: - - a) Disclaiming warranty or limiting liability differently from the - terms of sections 15 and 16 of this License; or - - b) Requiring preservation of specified reasonable legal notices or - author attributions in that material or in the Appropriate Legal - Notices displayed by works containing it; or - - c) Prohibiting misrepresentation of the origin of that material, or - requiring that modified versions of such material be marked in - reasonable ways as different from the original version; or - - d) Limiting the use for publicity purposes of names of licensors or - authors of the material; or - - e) Declining to grant rights under trademark law for use of some - trade names, trademarks, or service marks; or - - f) Requiring indemnification of licensors and authors of that - material by anyone who conveys the material (or modified versions of - it) with contractual assumptions of liability to the recipient, for - any liability that these contractual assumptions directly impose on - those licensors and authors. - - All other non-permissive additional terms are considered "further -restrictions" within the meaning of section 10. If the Program as you -received it, or any part of it, contains a notice stating that it is -governed by this License along with a term that is a further -restriction, you may remove that term. If a license document contains -a further restriction but permits relicensing or conveying under this -License, you may add to a covered work material governed by the terms -of that license document, provided that the further restriction does -not survive such relicensing or conveying. - - If you add terms to a covered work in accord with this section, you -must place, in the relevant source files, a statement of the -additional terms that apply to those files, or a notice indicating -where to find the applicable terms. - - Additional terms, permissive or non-permissive, may be stated in the -form of a separately written license, or stated as exceptions; -the above requirements apply either way. - - 8. Termination. - - You may not propagate or modify a covered work except as expressly -provided under this License. Any attempt otherwise to propagate or -modify it is void, and will automatically terminate your rights under -this License (including any patent licenses granted under the third -paragraph of section 11). - - However, if you cease all violation of this License, then your -license from a particular copyright holder is reinstated (a) -provisionally, unless and until the copyright holder explicitly and -finally terminates your license, and (b) permanently, if the copyright -holder fails to notify you of the violation by some reasonable means -prior to 60 days after the cessation. - - Moreover, your license from a particular copyright holder is -reinstated permanently if the copyright holder notifies you of the -violation by some reasonable means, this is the first time you have -received notice of violation of this License (for any work) from that -copyright holder, and you cure the violation prior to 30 days after -your receipt of the notice. - - Termination of your rights under this section does not terminate the -licenses of parties who have received copies or rights from you under -this License. If your rights have been terminated and not permanently -reinstated, you do not qualify to receive new licenses for the same -material under section 10. - - 9. Acceptance Not Required for Having Copies. - - You are not required to accept this License in order to receive or -run a copy of the Program. Ancillary propagation of a covered work -occurring solely as a consequence of using peer-to-peer transmission -to receive a copy likewise does not require acceptance. However, -nothing other than this License grants you permission to propagate or -modify any covered work. These actions infringe copyright if you do -not accept this License. Therefore, by modifying or propagating a -covered work, you indicate your acceptance of this License to do so. - - 10. Automatic Licensing of Downstream Recipients. - - Each time you convey a covered work, the recipient automatically -receives a license from the original licensors, to run, modify and -propagate that work, subject to this License. You are not responsible -for enforcing compliance by third parties with this License. - - An "entity transaction" is a transaction transferring control of an -organization, or substantially all assets of one, or subdividing an -organization, or merging organizations. If propagation of a covered -work results from an entity transaction, each party to that -transaction who receives a copy of the work also receives whatever -licenses to the work the party's predecessor in interest had or could -give under the previous paragraph, plus a right to possession of the -Corresponding Source of the work from the predecessor in interest, if -the predecessor has it or can get it with reasonable efforts. - - You may not impose any further restrictions on the exercise of the -rights granted or affirmed under this License. For example, you may -not impose a license fee, royalty, or other charge for exercise of -rights granted under this License, and you may not initiate litigation -(including a cross-claim or counterclaim in a lawsuit) alleging that -any patent claim is infringed by making, using, selling, offering for -sale, or importing the Program or any portion of it. - - 11. Patents. - - A "contributor" is a copyright holder who authorizes use under this -License of the Program or a work on which the Program is based. The -work thus licensed is called the contributor's "contributor version". - - A contributor's "essential patent claims" are all patent claims -owned or controlled by the contributor, whether already acquired or -hereafter acquired, that would be infringed by some manner, permitted -by this License, of making, using, or selling its contributor version, -but do not include claims that would be infringed only as a -consequence of further modification of the contributor version. For -purposes of this definition, "control" includes the right to grant -patent sublicenses in a manner consistent with the requirements of -this License. - - Each contributor grants you a non-exclusive, worldwide, royalty-free -patent license under the contributor's essential patent claims, to -make, use, sell, offer for sale, import and otherwise run, modify and -propagate the contents of its contributor version. - - In the following three paragraphs, a "patent license" is any express -agreement or commitment, however denominated, not to enforce a patent -(such as an express permission to practice a patent or covenant not to -sue for patent infringement). To "grant" such a patent license to a -party means to make such an agreement or commitment not to enforce a -patent against the party. - - If you convey a covered work, knowingly relying on a patent license, -and the Corresponding Source of the work is not available for anyone -to copy, free of charge and under the terms of this License, through a -publicly available network server or other readily accessible means, -then you must either (1) cause the Corresponding Source to be so -available, or (2) arrange to deprive yourself of the benefit of the -patent license for this particular work, or (3) arrange, in a manner -consistent with the requirements of this License, to extend the patent -license to downstream recipients. "Knowingly relying" means you have -actual knowledge that, but for the patent license, your conveying the -covered work in a country, or your recipient's use of the covered work -in a country, would infringe one or more identifiable patents in that -country that you have reason to believe are valid. - - If, pursuant to or in connection with a single transaction or -arrangement, you convey, or propagate by procuring conveyance of, a -covered work, and grant a patent license to some of the parties -receiving the covered work authorizing them to use, propagate, modify -or convey a specific copy of the covered work, then the patent license -you grant is automatically extended to all recipients of the covered -work and works based on it. - - A patent license is "discriminatory" if it does not include within -the scope of its coverage, prohibits the exercise of, or is -conditioned on the non-exercise of one or more of the rights that are -specifically granted under this License. You may not convey a covered -work if you are a party to an arrangement with a third party that is -in the business of distributing software, under which you make payment -to the third party based on the extent of your activity of conveying -the work, and under which the third party grants, to any of the -parties who would receive the covered work from you, a discriminatory -patent license (a) in connection with copies of the covered work -conveyed by you (or copies made from those copies), or (b) primarily -for and in connection with specific products or compilations that -contain the covered work, unless you entered into that arrangement, -or that patent license was granted, prior to 28 March 2007. - - Nothing in this License shall be construed as excluding or limiting -any implied license or other defenses to infringement that may -otherwise be available to you under applicable patent law. - - 12. No Surrender of Others' Freedom. - - If conditions are imposed on you (whether by court order, agreement or -otherwise) that contradict the conditions of this License, they do not -excuse you from the conditions of this License. If you cannot convey a -covered work so as to satisfy simultaneously your obligations under this -License and any other pertinent obligations, then as a consequence you may -not convey it at all. For example, if you agree to terms that obligate you -to collect a royalty for further conveying from those to whom you convey -the Program, the only way you could satisfy both those terms and this -License would be to refrain entirely from conveying the Program. - - 13. Use with the GNU Affero General Public License. - - Notwithstanding any other provision of this License, you have -permission to link or combine any covered work with a work licensed -under version 3 of the GNU Affero General Public License into a single -combined work, and to convey the resulting work. The terms of this -License will continue to apply to the part which is the covered work, -but the special requirements of the GNU Affero General Public License, -section 13, concerning interaction through a network will apply to the -combination as such. - - 14. Revised Versions of this License. - - The Free Software Foundation may publish revised and/or new versions of -the GNU General Public License from time to time. Such new versions will -be similar in spirit to the present version, but may differ in detail to -address new problems or concerns. - - Each version is given a distinguishing version number. If the -Program specifies that a certain numbered version of the GNU General -Public License "or any later version" applies to it, you have the -option of following the terms and conditions either of that numbered -version or of any later version published by the Free Software -Foundation. If the Program does not specify a version number of the -GNU General Public License, you may choose any version ever published -by the Free Software Foundation. - - If the Program specifies that a proxy can decide which future -versions of the GNU General Public License can be used, that proxy's -public statement of acceptance of a version permanently authorizes you -to choose that version for the Program. - - Later license versions may give you additional or different -permissions. However, no additional obligations are imposed on any -author or copyright holder as a result of your choosing to follow a -later version. - - 15. Disclaimer of Warranty. - - THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY -APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT -HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY -OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, -THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR -PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM -IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF -ALL NECESSARY SERVICING, REPAIR OR CORRECTION. - - 16. Limitation of Liability. - - IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING -WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MODIFIES AND/OR CONVEYS -THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY -GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE -USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF -DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD -PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS), -EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF -SUCH DAMAGES. - - 17. Interpretation of Sections 15 and 16. - - If the disclaimer of warranty and limitation of liability provided -above cannot be given local legal effect according to their terms, -reviewing courts shall apply local law that most closely approximates -an absolute waiver of all civil liability in connection with the -Program, unless a warranty or assumption of liability accompanies a -copy of the Program in return for a fee. - - END OF TERMS AND CONDITIONS + GNU GENERAL PUBLIC LICENSE + Version 3, 29 June 2007 + + Copyright (C) 2007 Free Software Foundation, Inc. + Everyone is permitted to copy and distribute verbatim copies + of this license document, but changing it is not allowed. + + Preamble + + The GNU General Public License is a free, copyleft license for +software and other kinds of works. + + The licenses for most software and other practical works are designed +to take away your freedom to share and change the works. By contrast, +the GNU General Public License is intended to guarantee your freedom to +share and change all versions of a program--to make sure it remains free +software for all its users. We, the Free Software Foundation, use the +GNU General Public License for most of our software; it applies also to +any other work released this way by its authors. You can apply it to +your programs, too. + + When we speak of free software, we are referring to freedom, not +price. Our General Public Licenses are designed to make sure that you +have the freedom to distribute copies of free software (and charge for +them if you wish), that you receive source code or can get it if you +want it, that you can change the software or use pieces of it in new +free programs, and that you know you can do these things. + + To protect your rights, we need to prevent others from denying you +these rights or asking you to surrender the rights. Therefore, you have +certain responsibilities if you distribute copies of the software, or if +you modify it: responsibilities to respect the freedom of others. + + For example, if you distribute copies of such a program, whether +gratis or for a fee, you must pass on to the recipients the same +freedoms that you received. You must make sure that they, too, receive +or can get the source code. And you must show them these terms so they +know their rights. + + Developers that use the GNU GPL protect your rights with two steps: +(1) assert copyright on the software, and (2) offer you this License +giving you legal permission to copy, distribute and/or modify it. + + For the developers' and authors' protection, the GPL clearly explains +that there is no warranty for this free software. For both users' and +authors' sake, the GPL requires that modified versions be marked as +changed, so that their problems will not be attributed erroneously to +authors of previous versions. + + Some devices are designed to deny users access to install or run +modified versions of the software inside them, although the manufacturer +can do so. This is fundamentally incompatible with the aim of +protecting users' freedom to change the software. The systematic +pattern of such abuse occurs in the area of products for individuals to +use, which is precisely where it is most unacceptable. Therefore, we +have designed this version of the GPL to prohibit the practice for those +products. If such problems arise substantially in other domains, we +stand ready to extend this provision to those domains in future versions +of the GPL, as needed to protect the freedom of users. + + Finally, every program is threatened constantly by software patents. +States should not allow patents to restrict development and use of +software on general-purpose computers, but in those that do, we wish to +avoid the special danger that patents applied to a free program could +make it effectively proprietary. To prevent this, the GPL assures that +patents cannot be used to render the program non-free. + + The precise terms and conditions for copying, distribution and +modification follow. + + TERMS AND CONDITIONS + + 0. Definitions. + + "This License" refers to version 3 of the GNU General Public License. + + "Copyright" also means copyright-like laws that apply to other kinds of +works, such as semiconductor masks. + + "The Program" refers to any copyrightable work licensed under this +License. Each licensee is addressed as "you". "Licensees" and +"recipients" may be individuals or organizations. + + To "modify" a work means to copy from or adapt all or part of the work +in a fashion requiring copyright permission, other than the making of an +exact copy. The resulting work is called a "modified version" of the +earlier work or a work "based on" the earlier work. + + A "covered work" means either the unmodified Program or a work based +on the Program. + + To "propagate" a work means to do anything with it that, without +permission, would make you directly or secondarily liable for +infringement under applicable copyright law, except executing it on a +computer or modifying a private copy. Propagation includes copying, +distribution (with or without modification), making available to the +public, and in some countries other activities as well. + + To "convey" a work means any kind of propagation that enables other +parties to make or receive copies. Mere interaction with a user through +a computer network, with no transfer of a copy, is not conveying. + + An interactive user interface displays "Appropriate Legal Notices" +to the extent that it includes a convenient and prominently visible +feature that (1) displays an appropriate copyright notice, and (2) +tells the user that there is no warranty for the work (except to the +extent that warranties are provided), that licensees may convey the +work under this License, and how to view a copy of this License. If +the interface presents a list of user commands or options, such as a +menu, a prominent item in the list meets this criterion. + + 1. Source Code. + + The "source code" for a work means the preferred form of the work +for making modifications to it. "Object code" means any non-source +form of a work. + + A "Standard Interface" means an interface that either is an official +standard defined by a recognized standards body, or, in the case of +interfaces specified for a particular programming language, one that +is widely used among developers working in that language. + + The "System Libraries" of an executable work include anything, other +than the work as a whole, that (a) is included in the normal form of +packaging a Major Component, but which is not part of that Major +Component, and (b) serves only to enable use of the work with that +Major Component, or to implement a Standard Interface for which an +implementation is available to the public in source code form. A +"Major Component", in this context, means a major essential component +(kernel, window system, and so on) of the specific operating system +(if any) on which the executable work runs, or a compiler used to +produce the work, or an object code interpreter used to run it. + + The "Corresponding Source" for a work in object code form means all +the source code needed to generate, install, and (for an executable +work) run the object code and to modify the work, including scripts to +control those activities. However, it does not include the work's +System Libraries, or general-purpose tools or generally available free +programs which are used unmodified in performing those activities but +which are not part of the work. For example, Corresponding Source +includes interface definition files associated with source files for +the work, and the source code for shared libraries and dynamically +linked subprograms that the work is specifically designed to require, +such as by intimate data communication or control flow between those +subprograms and other parts of the work. + + The Corresponding Source need not include anything that users +can regenerate automatically from other parts of the Corresponding +Source. + + The Corresponding Source for a work in source code form is that +same work. + + 2. Basic Permissions. + + All rights granted under this License are granted for the term of +copyright on the Program, and are irrevocable provided the stated +conditions are met. This License explicitly affirms your unlimited +permission to run the unmodified Program. The output from running a +covered work is covered by this License only if the output, given its +content, constitutes a covered work. This License acknowledges your +rights of fair use or other equivalent, as provided by copyright law. + + You may make, run and propagate covered works that you do not +convey, without conditions so long as your license otherwise remains +in force. You may convey covered works to others for the sole purpose +of having them make modifications exclusively for you, or provide you +with facilities for running those works, provided that you comply with +the terms of this License in conveying all material for which you do +not control copyright. Those thus making or running the covered works +for you must do so exclusively on your behalf, under your direction +and control, on terms that prohibit them from making any copies of +your copyrighted material outside their relationship with you. + + Conveying under any other circumstances is permitted solely under +the conditions stated below. Sublicensing is not allowed; section 10 +makes it unnecessary. + + 3. Protecting Users' Legal Rights From Anti-Circumvention Law. + + No covered work shall be deemed part of an effective technological +measure under any applicable law fulfilling obligations under article +11 of the WIPO copyright treaty adopted on 20 December 1996, or +similar laws prohibiting or restricting circumvention of such +measures. + + When you convey a covered work, you waive any legal power to forbid +circumvention of technological measures to the extent such circumvention +is effected by exercising rights under this License with respect to +the covered work, and you disclaim any intention to limit operation or +modification of the work as a means of enforcing, against the work's +users, your or third parties' legal rights to forbid circumvention of +technological measures. + + 4. Conveying Verbatim Copies. + + You may convey verbatim copies of the Program's source code as you +receive it, in any medium, provided that you conspicuously and +appropriately publish on each copy an appropriate copyright notice; +keep intact all notices stating that this License and any +non-permissive terms added in accord with section 7 apply to the code; +keep intact all notices of the absence of any warranty; and give all +recipients a copy of this License along with the Program. + + You may charge any price or no price for each copy that you convey, +and you may offer support or warranty protection for a fee. + + 5. Conveying Modified Source Versions. + + You may convey a work based on the Program, or the modifications to +produce it from the Program, in the form of source code under the +terms of section 4, provided that you also meet all of these conditions: + + a) The work must carry prominent notices stating that you modified + it, and giving a relevant date. + + b) The work must carry prominent notices stating that it is + released under this License and any conditions added under section + 7. This requirement modifies the requirement in section 4 to + "keep intact all notices". + + c) You must license the entire work, as a whole, under this + License to anyone who comes into possession of a copy. This + License will therefore apply, along with any applicable section 7 + additional terms, to the whole of the work, and all its parts, + regardless of how they are packaged. This License gives no + permission to license the work in any other way, but it does not + invalidate such permission if you have separately received it. + + d) If the work has interactive user interfaces, each must display + Appropriate Legal Notices; however, if the Program has interactive + interfaces that do not display Appropriate Legal Notices, your + work need not make them do so. + + A compilation of a covered work with other separate and independent +works, which are not by their nature extensions of the covered work, +and which are not combined with it such as to form a larger program, +in or on a volume of a storage or distribution medium, is called an +"aggregate" if the compilation and its resulting copyright are not +used to limit the access or legal rights of the compilation's users +beyond what the individual works permit. Inclusion of a covered work +in an aggregate does not cause this License to apply to the other +parts of the aggregate. + + 6. Conveying Non-Source Forms. + + You may convey a covered work in object code form under the terms +of sections 4 and 5, provided that you also convey the +machine-readable Corresponding Source under the terms of this License, +in one of these ways: + + a) Convey the object code in, or embodied in, a physical product + (including a physical distribution medium), accompanied by the + Corresponding Source fixed on a durable physical medium + customarily used for software interchange. + + b) Convey the object code in, or embodied in, a physical product + (including a physical distribution medium), accompanied by a + written offer, valid for at least three years and valid for as + long as you offer spare parts or customer support for that product + model, to give anyone who possesses the object code either (1) a + copy of the Corresponding Source for all the software in the + product that is covered by this License, on a durable physical + medium customarily used for software interchange, for a price no + more than your reasonable cost of physically performing this + conveying of source, or (2) access to copy the + Corresponding Source from a network server at no charge. + + c) Convey individual copies of the object code with a copy of the + written offer to provide the Corresponding Source. This + alternative is allowed only occasionally and noncommercially, and + only if you received the object code with such an offer, in accord + with subsection 6b. + + d) Convey the object code by offering access from a designated + place (gratis or for a charge), and offer equivalent access to the + Corresponding Source in the same way through the same place at no + further charge. You need not require recipients to copy the + Corresponding Source along with the object code. If the place to + copy the object code is a network server, the Corresponding Source + may be on a different server (operated by you or a third party) + that supports equivalent copying facilities, provided you maintain + clear directions next to the object code saying where to find the + Corresponding Source. Regardless of what server hosts the + Corresponding Source, you remain obligated to ensure that it is + available for as long as needed to satisfy these requirements. + + e) Convey the object code using peer-to-peer transmission, provided + you inform other peers where the object code and Corresponding + Source of the work are being offered to the general public at no + charge under subsection 6d. + + A separable portion of the object code, whose source code is excluded +from the Corresponding Source as a System Library, need not be +included in conveying the object code work. + + A "User Product" is either (1) a "consumer product", which means any +tangible personal property which is normally used for personal, family, +or household purposes, or (2) anything designed or sold for incorporation +into a dwelling. In determining whether a product is a consumer product, +doubtful cases shall be resolved in favor of coverage. For a particular +product received by a particular user, "normally used" refers to a +typical or common use of that class of product, regardless of the status +of the particular user or of the way in which the particular user +actually uses, or expects or is expected to use, the product. A product +is a consumer product regardless of whether the product has substantial +commercial, industrial or non-consumer uses, unless such uses represent +the only significant mode of use of the product. + + "Installation Information" for a User Product means any methods, +procedures, authorization keys, or other information required to install +and execute modified versions of a covered work in that User Product from +a modified version of its Corresponding Source. The information must +suffice to ensure that the continued functioning of the modified object +code is in no case prevented or interfered with solely because +modification has been made. + + If you convey an object code work under this section in, or with, or +specifically for use in, a User Product, and the conveying occurs as +part of a transaction in which the right of possession and use of the +User Product is transferred to the recipient in perpetuity or for a +fixed term (regardless of how the transaction is characterized), the +Corresponding Source conveyed under this section must be accompanied +by the Installation Information. But this requirement does not apply +if neither you nor any third party retains the ability to install +modified object code on the User Product (for example, the work has +been installed in ROM). + + The requirement to provide Installation Information does not include a +requirement to continue to provide support service, warranty, or updates +for a work that has been modified or installed by the recipient, or for +the User Product in which it has been modified or installed. Access to a +network may be denied when the modification itself materially and +adversely affects the operation of the network or violates the rules and +protocols for communication across the network. + + Corresponding Source conveyed, and Installation Information provided, +in accord with this section must be in a format that is publicly +documented (and with an implementation available to the public in +source code form), and must require no special password or key for +unpacking, reading or copying. + + 7. Additional Terms. + + "Additional permissions" are terms that supplement the terms of this +License by making exceptions from one or more of its conditions. +Additional permissions that are applicable to the entire Program shall +be treated as though they were included in this License, to the extent +that they are valid under applicable law. If additional permissions +apply only to part of the Program, that part may be used separately +under those permissions, but the entire Program remains governed by +this License without regard to the additional permissions. + + When you convey a copy of a covered work, you may at your option +remove any additional permissions from that copy, or from any part of +it. (Additional permissions may be written to require their own +removal in certain cases when you modify the work.) You may place +additional permissions on material, added by you to a covered work, +for which you have or can give appropriate copyright permission. + + Notwithstanding any other provision of this License, for material you +add to a covered work, you may (if authorized by the copyright holders of +that material) supplement the terms of this License with terms: + + a) Disclaiming warranty or limiting liability differently from the + terms of sections 15 and 16 of this License; or + + b) Requiring preservation of specified reasonable legal notices or + author attributions in that material or in the Appropriate Legal + Notices displayed by works containing it; or + + c) Prohibiting misrepresentation of the origin of that material, or + requiring that modified versions of such material be marked in + reasonable ways as different from the original version; or + + d) Limiting the use for publicity purposes of names of licensors or + authors of the material; or + + e) Declining to grant rights under trademark law for use of some + trade names, trademarks, or service marks; or + + f) Requiring indemnification of licensors and authors of that + material by anyone who conveys the material (or modified versions of + it) with contractual assumptions of liability to the recipient, for + any liability that these contractual assumptions directly impose on + those licensors and authors. + + All other non-permissive additional terms are considered "further +restrictions" within the meaning of section 10. If the Program as you +received it, or any part of it, contains a notice stating that it is +governed by this License along with a term that is a further +restriction, you may remove that term. If a license document contains +a further restriction but permits relicensing or conveying under this +License, you may add to a covered work material governed by the terms +of that license document, provided that the further restriction does +not survive such relicensing or conveying. + + If you add terms to a covered work in accord with this section, you +must place, in the relevant source files, a statement of the +additional terms that apply to those files, or a notice indicating +where to find the applicable terms. + + Additional terms, permissive or non-permissive, may be stated in the +form of a separately written license, or stated as exceptions; +the above requirements apply either way. + + 8. Termination. + + You may not propagate or modify a covered work except as expressly +provided under this License. Any attempt otherwise to propagate or +modify it is void, and will automatically terminate your rights under +this License (including any patent licenses granted under the third +paragraph of section 11). + + However, if you cease all violation of this License, then your +license from a particular copyright holder is reinstated (a) +provisionally, unless and until the copyright holder explicitly and +finally terminates your license, and (b) permanently, if the copyright +holder fails to notify you of the violation by some reasonable means +prior to 60 days after the cessation. + + Moreover, your license from a particular copyright holder is +reinstated permanently if the copyright holder notifies you of the +violation by some reasonable means, this is the first time you have +received notice of violation of this License (for any work) from that +copyright holder, and you cure the violation prior to 30 days after +your receipt of the notice. + + Termination of your rights under this section does not terminate the +licenses of parties who have received copies or rights from you under +this License. If your rights have been terminated and not permanently +reinstated, you do not qualify to receive new licenses for the same +material under section 10. + + 9. Acceptance Not Required for Having Copies. + + You are not required to accept this License in order to receive or +run a copy of the Program. Ancillary propagation of a covered work +occurring solely as a consequence of using peer-to-peer transmission +to receive a copy likewise does not require acceptance. However, +nothing other than this License grants you permission to propagate or +modify any covered work. These actions infringe copyright if you do +not accept this License. Therefore, by modifying or propagating a +covered work, you indicate your acceptance of this License to do so. + + 10. Automatic Licensing of Downstream Recipients. + + Each time you convey a covered work, the recipient automatically +receives a license from the original licensors, to run, modify and +propagate that work, subject to this License. You are not responsible +for enforcing compliance by third parties with this License. + + An "entity transaction" is a transaction transferring control of an +organization, or substantially all assets of one, or subdividing an +organization, or merging organizations. If propagation of a covered +work results from an entity transaction, each party to that +transaction who receives a copy of the work also receives whatever +licenses to the work the party's predecessor in interest had or could +give under the previous paragraph, plus a right to possession of the +Corresponding Source of the work from the predecessor in interest, if +the predecessor has it or can get it with reasonable efforts. + + You may not impose any further restrictions on the exercise of the +rights granted or affirmed under this License. For example, you may +not impose a license fee, royalty, or other charge for exercise of +rights granted under this License, and you may not initiate litigation +(including a cross-claim or counterclaim in a lawsuit) alleging that +any patent claim is infringed by making, using, selling, offering for +sale, or importing the Program or any portion of it. + + 11. Patents. + + A "contributor" is a copyright holder who authorizes use under this +License of the Program or a work on which the Program is based. The +work thus licensed is called the contributor's "contributor version". + + A contributor's "essential patent claims" are all patent claims +owned or controlled by the contributor, whether already acquired or +hereafter acquired, that would be infringed by some manner, permitted +by this License, of making, using, or selling its contributor version, +but do not include claims that would be infringed only as a +consequence of further modification of the contributor version. For +purposes of this definition, "control" includes the right to grant +patent sublicenses in a manner consistent with the requirements of +this License. + + Each contributor grants you a non-exclusive, worldwide, royalty-free +patent license under the contributor's essential patent claims, to +make, use, sell, offer for sale, import and otherwise run, modify and +propagate the contents of its contributor version. + + In the following three paragraphs, a "patent license" is any express +agreement or commitment, however denominated, not to enforce a patent +(such as an express permission to practice a patent or covenant not to +sue for patent infringement). To "grant" such a patent license to a +party means to make such an agreement or commitment not to enforce a +patent against the party. + + If you convey a covered work, knowingly relying on a patent license, +and the Corresponding Source of the work is not available for anyone +to copy, free of charge and under the terms of this License, through a +publicly available network server or other readily accessible means, +then you must either (1) cause the Corresponding Source to be so +available, or (2) arrange to deprive yourself of the benefit of the +patent license for this particular work, or (3) arrange, in a manner +consistent with the requirements of this License, to extend the patent +license to downstream recipients. "Knowingly relying" means you have +actual knowledge that, but for the patent license, your conveying the +covered work in a country, or your recipient's use of the covered work +in a country, would infringe one or more identifiable patents in that +country that you have reason to believe are valid. + + If, pursuant to or in connection with a single transaction or +arrangement, you convey, or propagate by procuring conveyance of, a +covered work, and grant a patent license to some of the parties +receiving the covered work authorizing them to use, propagate, modify +or convey a specific copy of the covered work, then the patent license +you grant is automatically extended to all recipients of the covered +work and works based on it. + + A patent license is "discriminatory" if it does not include within +the scope of its coverage, prohibits the exercise of, or is +conditioned on the non-exercise of one or more of the rights that are +specifically granted under this License. You may not convey a covered +work if you are a party to an arrangement with a third party that is +in the business of distributing software, under which you make payment +to the third party based on the extent of your activity of conveying +the work, and under which the third party grants, to any of the +parties who would receive the covered work from you, a discriminatory +patent license (a) in connection with copies of the covered work +conveyed by you (or copies made from those copies), or (b) primarily +for and in connection with specific products or compilations that +contain the covered work, unless you entered into that arrangement, +or that patent license was granted, prior to 28 March 2007. + + Nothing in this License shall be construed as excluding or limiting +any implied license or other defenses to infringement that may +otherwise be available to you under applicable patent law. + + 12. No Surrender of Others' Freedom. + + If conditions are imposed on you (whether by court order, agreement or +otherwise) that contradict the conditions of this License, they do not +excuse you from the conditions of this License. If you cannot convey a +covered work so as to satisfy simultaneously your obligations under this +License and any other pertinent obligations, then as a consequence you may +not convey it at all. For example, if you agree to terms that obligate you +to collect a royalty for further conveying from those to whom you convey +the Program, the only way you could satisfy both those terms and this +License would be to refrain entirely from conveying the Program. + + 13. Use with the GNU Affero General Public License. + + Notwithstanding any other provision of this License, you have +permission to link or combine any covered work with a work licensed +under version 3 of the GNU Affero General Public License into a single +combined work, and to convey the resulting work. The terms of this +License will continue to apply to the part which is the covered work, +but the special requirements of the GNU Affero General Public License, +section 13, concerning interaction through a network will apply to the +combination as such. + + 14. Revised Versions of this License. + + The Free Software Foundation may publish revised and/or new versions of +the GNU General Public License from time to time. Such new versions will +be similar in spirit to the present version, but may differ in detail to +address new problems or concerns. + + Each version is given a distinguishing version number. If the +Program specifies that a certain numbered version of the GNU General +Public License "or any later version" applies to it, you have the +option of following the terms and conditions either of that numbered +version or of any later version published by the Free Software +Foundation. If the Program does not specify a version number of the +GNU General Public License, you may choose any version ever published +by the Free Software Foundation. + + If the Program specifies that a proxy can decide which future +versions of the GNU General Public License can be used, that proxy's +public statement of acceptance of a version permanently authorizes you +to choose that version for the Program. + + Later license versions may give you additional or different +permissions. However, no additional obligations are imposed on any +author or copyright holder as a result of your choosing to follow a +later version. + + 15. Disclaimer of Warranty. + + THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY +APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT +HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY +OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, +THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR +PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM +IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF +ALL NECESSARY SERVICING, REPAIR OR CORRECTION. + + 16. Limitation of Liability. + + IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING +WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MODIFIES AND/OR CONVEYS +THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY +GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE +USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF +DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD +PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS), +EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF +SUCH DAMAGES. + + 17. Interpretation of Sections 15 and 16. + + If the disclaimer of warranty and limitation of liability provided +above cannot be given local legal effect according to their terms, +reviewing courts shall apply local law that most closely approximates +an absolute waiver of all civil liability in connection with the +Program, unless a warranty or assumption of liability accompanies a +copy of the Program in return for a fee. + + END OF TERMS AND CONDITIONS diff --git a/backend/Dockerfile b/backend/Dockerfile index 5506bad9..4c562752 100644 --- a/backend/Dockerfile +++ b/backend/Dockerfile @@ -1,23 +1,23 @@ -## Build -FROM golang:1.22-buster AS build - -WORKDIR /app - -COPY . ./ - -RUN go mod download - -RUN go build -o /xivtodo-server - -## Deploy -FROM gcr.io/distroless/base-debian10 - -WORKDIR / - -COPY --from=build /xivtodo-server /xivtodo-server - -EXPOSE 8181 - -USER nonroot:nonroot - -ENTRYPOINT ["/xivtodo-server"] +## Build +FROM golang:1.22-buster AS build + +WORKDIR /app + +COPY . ./ + +RUN go mod download + +RUN go build -o /xivtodo-server + +## Deploy +FROM gcr.io/distroless/base-debian10 + +WORKDIR / + +COPY --from=build /xivtodo-server /xivtodo-server + +EXPOSE 8181 + +USER nonroot:nonroot + +ENTRYPOINT ["/xivtodo-server"] diff --git a/frontend/.prettierrc b/frontend/.prettierrc index c77f1da5..94d737c3 100644 --- a/frontend/.prettierrc +++ b/frontend/.prettierrc @@ -1,3 +1,3 @@ -{ - "printWidth": 120 +{ + "printWidth": 120 } \ No newline at end of file diff --git a/frontend/public/fontawesome/webfonts/fa-brands-400.eot b/frontend/public/fontawesome/webfonts/fa-brands-400.eot index 1ee7a5648ee5dde33b12482002a8fd9bc076e292..d8cd6f97ef006f157be00b225bf9a296fe0c5401 100644 GIT binary patch delta 364 zcmV~$ODF_!90%~ev$NCee`jWQW#pONJcmUdArT?kBnpKj2?w;U9F(*hn{Xhzlmm|P zX#euNiJ~Yu$iYS_ z**tPSX6Bx&sLJc^i)4YV@QLRGJJ0|9$)vPotck%RCk%-(MPZD-oQRm{A{}iKrQ{+P z3I;HsZ{01 zj7Vnz6x%2o!kb8s>nIZ`aT6NI*g~94HQPuNXkZ7Gpp9MFWeOkSh0*E>7VMOLjb2}a(@r$hCCoS&fwIDpj7xHGIksx{>b8<2|3 zUd#lf{^Yjs3-EGD^KtQsa`ACFaq)3V@^0>{eQ5%eEZ?+U5J>4A>0}Y(<>KUV%Ms<_ z782#<@fYRg;N(`-;N5)sL_Ww+t8+g=wj19u;$Y$Bn#Q|1{mB*qpn&w(FKUdu+xcY} zXR$EyPG70OsL8?0#l^$J#l^e*h63YFW}xgw6~lWXuB5+r1gr18v%#7Qh%K z3ZxIDGDgS)X^B?Gc98h|PDW#XAbn{D;|maf*IY((5dCo>BOl0?|BD#KfPuALbTy+g z$UKX+j5Z+gl68y%An}%MjL*1$bk;$}KA;D;|G3EL%O=mu#h9iZ6B4P)FKVcxrKw{m z#&?NZK}AYmQc;nam3Mm54aPj6;tMwz8$gBz+-6+J2MmsnFBuO2sg17~HG!hHUNN>R F0ss)4fcF3Z diff --git a/frontend/public/fontawesome/webfonts/fa-brands-400.ttf b/frontend/public/fontawesome/webfonts/fa-brands-400.ttf index 032f907e25da97293aaf56a7682c90458a866194..df40b357ccbf81aa2a1eb70ddf8219719816b7db 100644 GIT binary patch delta 364 zcmV~$O(=tL90%~ek7rNM{(JV{CXd%Ni(v@c6o+x}o)WRVEJ}z%Tpb)72!)H|+Ix{G4h$zRtpp3jX)vOS`R+55 z=HNnk91lKKVqsDDbYK^MAD`LumWpNBn0LaXFs5mY(UB8(ab#qoRiRf8 z@h^Ava!`L!h@E43)a<%%;Iy|);pt6NM;)N+qCZhS@&F%Dz!&|?hK Fu79lDevkkF delta 460 zcmWmAUr5tY6bEp=`^Rs0zw_G)exq&B8fG>V*V>{9KMEF;5JJ#Bq$mhQ4{O!q2m*r| z+CzH@HWndD5Cx6W8TZlQLxWHViAF^bOk}@T^(9E~+@}xcdoJhPdmB}4x2k=zbWqdM z_Y=&pb?+4DWj#O4MLXZpn1$IbH#2$ryN4Mlym2sJi_iQ45)nffrZ7ZS7~T*yXCB*W zZsu0y3FiOib61drS062!y6>b(`nXA&*VliZn)UWWHB{UFM+|;n(p)5})V$nX4{%@~ z9G(NoKViIbfoi2F;u;B|>q3xx8^up2cjx;s$ybs)aa;gERM|0XdFIg-L7m9C}n z!pmN}iVUxmrR$h;$R9c6_#HBG0|jMy3?F%uOpjyQWGi=YE6VOY#e&N3FCyhKbp;*l6rrO009`NC%4xXr?r+;C^;P2Szp~cMGh;#bRMmcs2 DkWqi! diff --git a/frontend/public/fontawesome/webfonts/fa-brands-400.woff b/frontend/public/fontawesome/webfonts/fa-brands-400.woff index e6a44f83ee9241e6b9ab844a170c7f18692a7f52..3470fc9b59ce92160d447f84ee240a5843d52a41 100644 GIT binary patch delta 14 VcmZqK&)U47bwm8C%?YnmN&z&82Oj_c delta 16 XcmZqP&)Tw|bwm6sM&8ZwuT)9_J?IB4 diff --git a/frontend/public/fontawesome/webfonts/fa-duotone-900.eot b/frontend/public/fontawesome/webfonts/fa-duotone-900.eot index b4a9aa8b2222616df5b69fde338f3e743ccecfd8..d6f9c46350b7330819174f104aaf76c311a86d95 100644 GIT binary patch delta 913 zcmaKpX-HII6o&b>yL`?a&B?LGYNlyY$<)e_Y#~~tv=l55GHNO?l0c({f}*;O zm(rLPD+;%|)k&k&&@qD%36nM=h%(9+DjL(aNgC@{f8O()!&%_G$7}3m)%LpVi;Nqo zP1KiPyp8@~RMiHoyJ}`q_1@)p9qVzDKKVv7!aPiC#>AvcH;-feOydu#x;++krH87` zEtVm6dmOs8H4+617S8105OcXvmW^`CpdRv5bg;zK63-aj?a9Ia>3tUH4cz*@zo`8# z3CyUgyb(j}_JpgtcfD%uNT!@kqUySi68%lbTt$z2vOGjT(A#FvGrw{NtQ?J!F`Toa ziddMJhMwBNz6n{dHfu9F3(q$rEWyj|sMrXr_n`~JG($Pc($LYjHm5)>md8JkM z6WhO!hk<^Q!U7dnK6M1xAH%OU(k-HvAko-CW1v8yJtCxs(6Uf?VW$>$Et>9`411T+ z#ktURg}Ml=yG{=nps$6dBUs>}r#Zatq-Bv%>Z3bywVz9v3tUUt;}me7U~40^N7vbR z?Lj>&gN+Srs#)aivS<@!sOn_XmqO1t;aDh?CJG}Nl+O^X9Bw2F&R~em6uM#nmkRw1 zzV8v*6|L>4Pz76ELXZFBr-UbAkOac5FcW76Dn!}BM+DTwz~B|qB*?ihq$iH#NrUH1 tO2}_2`I|y(kT?(p%?aXLtkoupi{V?MxH}$p7KnXpZ*idr#f6f4!Y?(hLn#0N delta 1140 zcmaKsYfMx}6vs1n=Fa6_oZYS4U2s7jixrfx(5j?pQ)wecR0#C}H6^wtG-)N2E@{$; zAt6mltLcLj*cF9fj18#~tDugeVr>g$6P6G|_|OvjNC|#GOKan*sQ4dbP1B_PGQWGy zoHKLg{7-J6%X{#I_hi{ILs&MJVu+sdW8ab|M%wWzjfkGc6E83#nufZwVa#;h| z=aBzNYK$f|RSzUZb2Ml^h-2nE+U##78<4VNq9|RIN^yAY`jO~np(q^@U!6p zj@omWXet`6$D_i-FAKmvzS99zP5rO{Sb5i4LWF#AF)7gG2g#&83s!Owx#k5QR1=RX zFRq4s3G-qN(aMLSok$r zxdE(;kW8QKd`9cdfVHbwTj2(qE3`X)@RKpE1t-eX>)IdciH<2P9%jar_L4g6?Z36F z99%P_eFlAGXja?g7Q(Vbo~hPsQ*m(PaqvYM5?MS%l86 zV>WZGAB*m1!g@{@CR?Wq`P~ibRK<<`NkfQ{ZswVEZP2UGbZqq?{4@78NRC(|G zh;?y8IP*PA^H1fKmb{z2%yq!^Fa0I-eM847YBGsvu`!4@Z=5M%`wdt>8Z2vGco`eR zCgGER*;!yA__3FHkS>p;vxaBEj2&$AYv6mQSqu6t&2#KiOoa@5&x%#;zxT5vs#^^s zEU*+zjIcVy2V1x3Eiips^`8nsvt55n4Wa*>{s4IAydIFWS6}6ZDk0NIF-#%Xj_9km zB6d$2Z&jr%%;k$zDVb|{vbthp0r%U%3)}c;Ciri;D9Q|xRq0*}! z-_m@}?Q@DcTYIOtJv!hoDDt?36ox0$*X}k9w^5tI@x+yMk`bOfoY8@$A(1v>F}FtGo1}%=QEt*xD25ppVUz7C?Fjr$gLy41rh&%_^GlY+IXqHq=4ED>GH#v8Gxn|)y-tC#&{DtC+(sRc1M+mimgY0{T% zy)-i@e1%P+e6Nm=V(jgJPl{^pHr|LNKt#AK6Q;qd1@1mz7Ds%X4HNwIJ3C9&&Iz_f zO-!&M^iHyl^f+qU6BhXQI@uU~!fMkitE%TL^xr`AIr~sohR#b;TVSEi@9PM8cVFnOmFW+uYAM(2aJgJ>DaGpd^|<)7F|4C8?Aky3 E1$`|$4gdfE delta 1092 zcmY+DYiv|S6vs1n9=CVe*==ceE0;=_rJ);|Z4oJiMuSR;lxJZhm`F+jNJs_h#uy}~ zfiDQrK!R&~Q_wU4(G(F%HaN8e0;z;H-3U`{)ppqBK|CHO5J4RsTa_B_|}!v|8E)X?xQ2g;?$UtGf5RD8d7h-znq#S z@S#aeCB~;WW5&JdmlSaGa$PPk^Ow^(fE<)1MCpPeGRxAhjwPQ&;SJ0s*TUer^~A*t z-mhjVAUNLwD#9W7)D;M+yIfeX9HQY53hi894id&x}+79S*2 zW`nW&q^w*wmROw;c+=)v&j!KzmDXS!TyfrNLQDPEE$escDk64N)Nmp)&DyL{| zr{nB&l+OHYy=dCc_|rNoz`O_64k(~oGuGUo!bLURF}A`{pWiE>*+|_hrpvGZT^pq* zurQrlLob-gZpG+2!&n{dUj)uWyg4$&I^IO6@7q0nvkbwG6e{6qSdjb`nFMTd3QKL~ak zG2QKB&7;7&am+;v{mumT-ZNlkDVz5iI48-P@SODZuh@1x3ca?AEiiL-e#7>d%`7{^ znkRsF2UsKOy@o}+2`*dAuhf9ock?w^sQ0qw{{qz=yjfrB;FUor(Bs%48+rxK@TwSU z7luWP8Re%bVze2BREc8qiBPqO`@x+t(N_k(zDYbV`Q=+gj}ak~5C`D)CB$u`<pAaqvWgHN5{=i26U0M|1QpVd0?KXvLezyJUM diff --git a/frontend/public/fontawesome/webfonts/fa-duotone-900.woff b/frontend/public/fontawesome/webfonts/fa-duotone-900.woff index 09cc0ba54ff7d0a00dcbfbeab549b277769a44b9..02c61c8ca5e5a68fbe3bac49533316bc9933e5bb 100644 GIT binary patch delta 32 mcmZ4RoPXYP{teUgny2e+pRUJP711u#&IrUz+lAVh`*Hy4wG74p delta 36 pcmbRDoPWV{{teUg71_wnRS}H5?E>wLK+LpVpq;rd2LJ{|4B7wy diff --git a/frontend/public/fontawesome/webfonts/fa-duotone-900.woff2 b/frontend/public/fontawesome/webfonts/fa-duotone-900.woff2 index ac0d45be6dbf955f77327757cad3490f61a299d6..6847bc85a75b8256805fbd00c79291a9a99ff243 100644 GIT binary patch delta 43 zcmV+`0M!4$jtjbu3$U_ev$JGao3#u9uBx}YssR~px78Q|AX~Tga{>@Pw+FHUITgLk B5fw8vQ70MEVin6q{D9S7_ ztjQ)ZC}T^Z$Y^xGTokp3$cMCuq70;m>Y>OWx|@|+_Rzz3&d2$khZ7ui_Plf6{NXjm zz5AF^vF?~?jBP3MSa|j>%IPl3Oj1}rH8xyG#76DKnaH?)=>XP}{dbJF{?k^>MXDX{ zjQQ(|cDr+%78i&y76lgJX{hzjG8oB-7<^P~vtG<8eU%@@d zkd`^rKscR8jG>`?WGD~Y;*6dTXF`lszn~bktx)hJiX-%%{McboQRZa5ig=fFoWuU(l^3%rPl;eRK`W(o=mbN-y-WCjEtv zrTw9^OW5kE51LEZaC|7Ynk30&mCO>#bBLlNPl6LQtSv-$pJa*QoU@-nQ5+P-&x)!h jtE$B;NwDK2JI3MDS@v=k4EM75SQsB+EE33P<~jTu*^LZ4 delta 971 zcmZXST}TvB6vvslbMNlVde`0Dbkp6|4|3H$G|^QbOrta+3c+%<52^=)LP$w0QcI;$ z9|~i$$qGskm5P$KoZPasUJA;BzyvE0>ZM2}umX+x-wFhKncqF<{O|d=X9mBxLzC{l zxe|#7=SmJU;LxsK7D1ps8|DE)qoeMA9 zhwWki=?Y)y3v{TM9B2qBfuxaXgq$zi7{*9bc<{!{^`i6XSG{o(*W-L7E;#VDDh#fa zU*mR(8`LgYtzd*ldIqKOHdgW!g0uUiTdCl+^HQ|~TzXwP?Kg2P(dSjU(I?AOCM3L~ z$(s=Tq{%zH7Ot5Ra+0&1Zl_5vDwbl51L^XhhOjqRuGkL-y5&pJ;HqJ{eFgaBi#)4> z55LQPC$hnxXKb~R0`zBexJbcb@cn9H$EzDt86;gah#7nq(7%=pD4?y7+!pc28;Q0Y zd|pj@u~DPCo;ZZArG@Nsfs{4-gi{#0sOVfD6q0ld5YjnowB3|w7yUtSi-sHh;?~oYn0pTk{#T5Gp4kQR24Hy zB7KIjwk&8Gz77mWM=za=j#nU~DKs|$=S_`^sXgl=!?IUzE%wI=n zju$L6mRFcNsIAw8wc;u4Pxg0yR-yvrH6$m zS`%;@`5}5iyx-VEnkh7Vh<0oQyH(Z{2`0s|GO_r^3^pZ}SeeIqgg>f;Wy|`OQWhgV zOZ3K4ma7kzvS@v@lwCyj$}*PvH-4{-ZToXF61TJQcn8;PCRH`rRIWRB&(*6+8nL|~$oiLHNYWhX_|+H>qf3b^|bi}x4}@0lseI5oqv8h-;M%?_sk diff --git a/frontend/public/fontawesome/webfonts/fa-light-300.ttf b/frontend/public/fontawesome/webfonts/fa-light-300.ttf index ea1f36c79bace0aed13506a42760bac155dbd6db..714bccb3ea367f2944727e654eb08959f9e650a7 100644 GIT binary patch delta 773 zcmY+4ZAg<*9L2fMeeT_!yE(VD`8u61wG%(e=vKHuR!!F0=dmYS42jV zMY($@6Uo0`w@1rff1_HqEsW_vuSFUSL`R~R2&T-)yd6{}s3Qp;d(bHZB;QAuoP@>M zED}6J!i<7<_&6=hNih0DaE9cLFz;F*orE=>eeh1PQ9JwCW=tZjuiW9{)8_>hzh=G5q6x(>+ zIq^L&t`c8>#U+O3K>DEgL>0gcQ6`I^368Ls1Ouo?M2`t>&x%1R-nS^ub$64?0%T(1 zkf1?L&If{IBBg{Ut|eAzk0$YY7)~Lz=}>r@cm(dRAiKeSmTXZ$2e6nbQ`1HnQU*(aKqLc<8f8YU?e64R^*4N(dw`beh;vHiq~ zpkRR9*a_d2^gs}PjB$& z`84St)fLdaOAV?E=xB_dX%&*B&`JRk$_P^`!!jf|=A!Lt9#T)^xV@elA+Mg+Fc@>w V$#vlCr!i)j_&{kee4C}V>fc>n2`B&n delta 1017 zcmZvae`u9e7{@v1yyv_>?mc(A?QVB&@AYn)o8?Sx?52>;aPtRZgmd>g8YD`6(AZ`Hw>H%!!qTbU!KK4@aADecHC$$@kCriHHy@ux zfc+<$SwK1#rGa3fK?2^jbkr+LcOmsn`jcFgT3mXK1JfU^T6$ZE^hSrG-d_VIL4b7n~wbtIE&GYbjGYWr=cIs>6idgGIm1rmInO&8DxGgL4+pF$a_{(rsJ8 zou}#1BFH8~tXkC#(qsjKXYSHT8$2~ZQ-vUsAEQCFyO`DHgI~{QVN5~&RLP####*zb zYIYUN43HmbBJ`kc|70Q)x?zeFH9ywm6g7Jp#e1oE1Vt4NMC8`E9^$GkqwX+)|^KO3F;sI}up0q*zT`rDW!^86e8AVoAwd98Mw2=dk(u(z0R zCw$+RXHicrncSi`w}{Y>%|_l%8bP=Uv)! z$4S0jzaRaA*Wrt+`V3#8Js<1kNxYRG>f?o+3=1I@mS^?z^qY&)8x?F2BQqk>$u(`;%(bOWmK9l6(K39j2hE}fX8f*wqAV&M xM@(I?tYOQVh`8=-*9}P~Jf&c&j delta 36 ucmV+<0Neki{SK)84zOOx0S&WW$jbWx4TmVi0k z=s}N=wdjLjP>o*j4>9egOCi&Ykc_kpghD9``fhgD#RI?R`8^Zk&bg>F5?>)~6)F-b zmBb>_4j!?H-lOf3iEGp)b8S`s+T;=WEmcSlp7<5dpKuGx{CxwRT9>hh7;HT*i$ABI zCptLuQBB$JV-|(_7*B4CHP%MO$NmFIln!K3y=|yopB|bwbCnQTHLDCGO?Mfo`m5o> z|3=|5`jEIc(m^nnjPhxmEJ{WvExIjSCr*anGkq$O5{pB>9NDwZVkMHP5^h=-8+B_` z`N!U9Kp%^yh}o!$^o8+i%2_TIg%etuD0$FKj*ZQiP!hcDMlL7No9Oy>xb*^6tMGXN)r5?_ zL7YkW!)#-olT9!f#NKL{nZlX|i?6X)0{0U3Si!%Bn-U<(N!SgI9umMXpG%6fAfcA* zL(q7L3~V#L^^j8V_L3F~_xnht0zZaGxeTS(h`Sq(xoMsTqj|J!2fS;hyJbjkrvk%V zfYu<$IYS>SuyTQ>BCvMRyUfWmGPuR8G^9~(mL=x*Gf6gcyrn@g!%Pn?lz?BMx4H3P zgnD6hg!(WPT&2SWlov58Je#85^I?**mnz(eW5IOTTEtfD;HYGcsnFTXzQ_=0XG;`n z&$8|$SR7#I5Y+3;?*I{IhgGnRu^FmxYO~rgGHI~-i0vwZoKGyY6P|jckP}+VrH*)5 Ju9arH{sO%M-HQMK delta 823 zcmZ9JT}TvB6vw$U_s;Iz**m)~o13leN`kp1i&Cx<85)w%8jASQhsE}gJ*b7IqC!in zu`6Me4Z0Hf5fqWVEKPO8Rx|J=D6kBvpfu1P>>-5hMNB#q_R`Dw-SaW${Lh)s3D@+L zE1nWSOiu|Y2#{VbGJxmAIi~kEv`HpLRh(gB`bJX-@>=(W-wsA+DMQ}PanuHxt$g3b zCKG&^?D(*K2cx7Et8#5AVKN3o(_6qLEtu(xH;yC9sI@9sAFQe_jFr5>+w__N3x?ij z2ZLZ=4SrD>RYcLGSQH{4m1#=MqrD#T{}C()h(x@Fm}T1>KRvZ!`hCX^AgHCtBYY%7%O zj}yj`w5h2I32Jj;AKSFL3+B0(oDM*KGOrLZ-jIXJj-@gxnI*+;v)dJTP%C59q%c0y zg*IT@SR#acP`esJ6r}QGFB%ifj0#SK971gE8cO4O1ZB7&H-8t6?gzFkpbCY*{Dx}A zpn)SScp+F67J?PPkvTzCfseil#S-wxvf#6VSohLS?oSHksSxX-;zTAe$0xQ6z`MC( z;U3_plVT+-#=Z68z+PxQ85NHp_N-5A2Bo~YUo4mT^Fc8Hf0&CSVrB%Gm5K9=d3AZX z>;Q1I5tkVG#a65vy>GSSYQ$GM@Qe)J{VUjGOqdPh2e59eF^Y}NB2nxruedlbUK zVO$LE_%JRtdMw|@L-}y(0%B!6G>6ysL9i2(j|#BTM#5RZcYg8{j?ZTT$=m5EFNWdDYasq27$Qh&0lc!`JD~w{h)gd6W%J|Jma;Sj6T_fWM VA>Zti##~%EDs`vutEZ%eo+sOa` diff --git a/frontend/public/fontawesome/webfonts/fa-regular-400.ttf b/frontend/public/fontawesome/webfonts/fa-regular-400.ttf index 2d03c198bbd58a63e9dcd01c206ede970972839e..722837cb0b43d252766f0d7b22f06614635d9d38 100644 GIT binary patch delta 625 zcmY+4TS!z<7=_tq|NG3GeLQD$vZkDJL?KYol=6Z^Xbj0r#zaVEQb-_{XrQU(!=MR` zMHbptPjnj}qOuZ$E&kM4Js5^U7?@BGX3zyHA1eDYfY_I#Y-#mU=v5 zxF`3&Q7-j#5ZP`uQ%SCUHN@QA!_wdXnThPd#AsZiYH;T&%kjZfopSrCSSw;8+CNT+ zG>XnhVl*x>7WpY6BLUzn3uNpQGg*3OUGXw+F*_fRr<3A6Yq)Axb!V*8sYii33~tkL z>@-;hYcxnQ@kfwwhAV9(tl*8aq|lA;`pC^~7@Q^n9bdjDrC}?%RY}E?R;40<1Cxqr z;>e6rsN%{8CDS21vzySjsFbY3UX9*M!J-V>s32~k`Dr*`M)wjdDyLoP)>Me@!i08O z3wZ7VEzxkgoBC~-be*Pz(3=d|CN^b3aREN9h9cW=JxB$I8laS*)&$Qq9B%;+!7r_F zhgn@AaN|G-a#j4;0k^ny-hx7$u)wRJ<0|y#0MBC%ygvy`Tk$q!Z***Nurr&HXGe6L8)8$Sad0}~6=FAW;t|`C ZhuQ)QZ^!-&HS9*8Pi>CF(L?HV+h22o+c^LL delta 826 zcmZ9JTS$~a6vvrwX1?8>Z)aB*ajW$b8sR0)rMzGfTS%KXjK#_>iiJ{$3JY$Tv1o$( zl8E-LZYro?V0OXilLlR>9_&pt$ifOG2zy8{!4i#%&L{QK%lVx%=gc|(Gc!KvxD$3f zUdcyXTgg`tV50zYz}A^+u9a6e$c!@!*=+#3rp{bR*9^7AP^OmF{fgpjnsJo;dk8gb z7wBc$rTSU}+@JN$@7To|%_A1m={(9!1PqJuLP))YYZD!1`n1T-6aw821uG$IU`Evy z%vIk72Q8c_7#kF`LM3G3>T-9yI^3Q0-?6sb-L7}>hOT4GnH*YuCB?62 z{fL1mG24m;C170}ayfvHhS0!4VBs57qKMv)=+q!wT5Xn+31?6Ch5RNQE3#W8R|ynd zo0BXSVB4bPl7TNjN$FM)y15i9BG#p%XgIrI!uJz_avJvOgKq4{IVnKxEItYECh&RO zl?o$*0el?7_W@i7GKKpVE;5PRL0kwwDHi*2VgT`{3B;+-b7l~CF0iqN9M#hkUZUx} zYa2)@63>0)g$bhOW)iPY7-%6QG?ufZB*x9AsszH!2AO(1R5qBIw5Q5s=Atq{vh)pl z+R0r8YH~xw1z}T&8Q><)Unk{5SxI9!wV$V2YLA+zWh=Nx#Bxh`s`P zIUa~==yzS+hLpSwbVsDc3{RRtvW2nZJkv0I%l} A$p8QV diff --git a/frontend/public/fontawesome/webfonts/fa-regular-400.woff2 b/frontend/public/fontawesome/webfonts/fa-regular-400.woff2 index 70fc754f4c42c2bfcf220d02af01f125d011b144..ef5f9ba4c4bc723d9b3f18df75de321f50edd4aa 100644 GIT binary patch delta 30 ocmV+(0O9}mrV90@3b2~YgPY8^o6G@3R=40H0xJ)<3^D?2VfvH}zyJUM delta 36 pcmeymjO)iTt_`!!F!DCfIL)koHL#QyZBBVo$B7zPovoa0YZVI!lFcr&3 z{!%HZAkBn|Up7%{s1VtSWkFIRQW|-5Qd9`-ZbpC1%=djW%rNkc-LegW?b`26nxd$3 zy6n&Md?5>U^ESj36OEF@q1>f-0`}w;F|n{9%b@F?1)|pzV-n*fElAw<4p9AU={hl9 zig8tWvwpL@OB7eMVlnrm3F(VZJrMS)S45AliPX*2iGdnjV-ue0CLAE?HARsMlQpw7 zSdwKa*lN~frl`!Q#mgo+UNbWPnD|taLId*|=aMFtI7HJqCI?7&{n`o9rsp>FQ-vi_ zJ-ad5@cb|ITz)CC8sk*46F!ED^^cwzMC$WPMD)HKw2JnTlra8{p_zQT0nO&Q29ykE z45$`CsuAs(!i#?*E40U=hXg8|C@B%zmLo?Pyvj$^&HFAOCm1fG#}s<%(S}HH-$NNP z?0briOyT1n&@t{EMn(L`Fj~Pw#*mF~96_sj>j*l|=a2dtw?@$_@HGm9{@$tniN0!Z zLdI$YoSBBdNW9F2qoB!!RXd-z8^^+%1-QT!fV^-Q?gpPIV?U3B!oB#q#G{Mx7YIF! zg#+%_;g!})g!=tlbu_qy;{;s38+* p*?$Fs?JUv_2}@WNg0`iMV&0j}j>4iGHY*ek=dwBk5qT`z^9LfYC$azl delta 1131 zcmZ`&TWnNS6wN;8+_^Is_DtzxZaV}R+J^DbbZ9X{O2kLeVyI19G4?~P(TD{_D5QvD zP*bXDfkxUX+&&_S{pdg?NW7TC2PR6zSfo(_G5Q6@v_@JRt1+=P!F8v0{`@&>?Z@3` z?S0Q4*Y@#!EXR~E-;DJCI9s~`rYi)UvOtyk5YO?#<3$-F+jBVX*5WDy9sP+*j z54Kdn_@<>W2$*R-Pk_^HKPiNcbUXuNx6^m3z0%2aAud&hV~O#65i6 z2xJ@|rW!LGWs{XBZWwGCt5x#O;g$ZYD$O}rbMiU_6%7|NV56SS1tczCLAS2|>JU`A zr>~Fa0eU9O3y7UB47vv}YtX%bgpbOIb(4?!(VZqg?OkfK)oX^AnPIcn;!sv&RwRNW z#JaPHzLL5jMrCMNw{NBh3hKe_q!K7KG)OU+V}mq?4t0Nuo<-Ao?jlv9DZTz{IAG9l~An_>nxeEybjBfz}_;)%R4TWi*GP7b$Lk9k1$V-^>% zzIjHZFd5xGA=cv$=!^e|LrYMjE+|`_Z-a6leAOYTJ?UbFto8$IV)E=FyzS9|88ri} z{cGg5jqvZv9^i)CU~-6@423GbJ5{47WC1ofj6@>(`9 zIxBziiulk;s47;?h!f-Z0g72yXVPHm{}c3)TA}_O`1cy<>5xXf0R! zp-!)hAdO&_S)tUNsD#mX0p+W8A-j={R&yb=bM8Eam_y74o0)+?Jmss?R?}2xT;llQob&tt^Z#&e za&CX8`O5{f{g3qyAq@Q!J=$kSN>@+TmjM@c=GD}Ojh~Y@c&W6UtDG%Cn^jpcPlYRd zb~Sk53aGP({$#p{BP2e-#f0^!%CwrQK30QOgjhr0U9jqp-c*~auM(AU+z!_C6Svg= zCmv8uaNUuZnqd7?Z(2`JX2)tZr?#8K8dheg+&UFXkM-33PyvfItf>w8u{wsGs-}VK zF@|Yj^P2bcjFzWXPHPquJfB&sTJI}=TZW-lbUsd2^Lp>ul>1&YRpEi56xA|P;Fb>= zd?+0pX32#d{J4)p9iUr-T@&T^K1jh9AM{eJ$b|fCJXZo9H(vV+SU~nPLKcoT!fl3^ znqh4^rd@|39lyK-hbATnJ!DI?g>+$j;g#*f;F8)ftdnKKP%eKPhGj-f0M5QntQ>)$ zY#M=Y<+RaA?93>v#PL!1I{x(@d;Wzd4%`+;j7hlf12U$`?K#AYH95p^N&hY~1-s{x zt+}sIF5f}=qLhKbo#ZdT2o7jc+fT;u`F^52c)pITNJ$pcXBtkYaWHs0I>0Ouh8sQY zq$Pk|L*%2B&i}~KBw20HgVJHAm3YKX(SftmX)q3tWzvp#P2AKqucqUI0=oG#?5Ly; zz@FWdrs0hr=)-B))I|?#IQ157bz|Qk?Iu_|MEfUT*)#fg94;knGc&~GPqSTtfa|z0 za&u*`jSXO<#twTh)5jVkCoPP^=t<}4*zae1ldxnC^BB0LnB}En!zQKy{#eS!3D%df zEFbn%Grxx87Wv*g7#_841#V$Tzuf+sLrme+K>?M{w(nGw#T zzo!txVb-DH&KvA>0Fz#@pUpH;`0A-nBk>ItzjJUbm8VC7i+Byhi}^*Xi;8mHW@=dW gdAJwvF6IwFwiWYlFmDN;nT(|y`Ds8}%9reT33E0&2><{9 delta 1133 zcmY*YeN2^A7~gZwdGFR7nZ_xyg(^FHtM zJm);;PT7}x?PJ5$snW8f`J$PCr7%tD{aL-4{L%`DuwQy>H?C&?6K~TNgQPe2y>cH( zr=jr`klx0e0O0D!KM`PG%MAh7`>kt123r{e`TdJiINNp)KzhCHG$b!|PXN(Qc<-+u zBYUrLkd#i_X^8t_4e!gJ!r}4C+Iw`a$)M@6E#TW@vnN&WhggyR`(%)HXz>)TGu0nT zGN*{`@pq>1l+M2lX&H-!6YS1T`b{Kk=@fTeL9u3ct^^eH-kSl)I(rF|@WwC3Ig^%C zdd2p71}~&TY91|`Nz&~R^c-MF&O331IPb`b$^n7BF}kgNP#*>U~x z_uJWh_>O$UyiDNR2iP0w8PY0VBGc03&hqmb$gZ^HOsV>hvQA7u)!k;LdQRW|!*-`2 zM^y5iu9CbNS|q@gF7nPSUY-Ojp2ts4!>b-J{b9c;)p&&0E{9(A0T1fY*EDmU1+4v= zUtb7(sgLhMU8;Y8cj>9u-{ilbXjOEZUrq)3{^oad-fhMFbT_B7MMp4MuT)85u@)sx_gEE6S34qNBZ^nI%0wm}lKOA8Sd;-QtPy@) z*z=pjL;d50n?+s@u(C}=bYU%y7{czk)%(Tgpkw<*AJ)$Ou1h$8rQPD*W3bioBjRRq zIv(wG;mZr#p{Hk>Ayw&*f*Dw6EP9Dl%YGIob?%9NaWJaB`d9SXVQG~lMwTYgz+|PH5brT6g delta 27 gcmeBM&oN;=N5dAzS*eV?+kr$T6Od-kVC-HG0F8DDTmS$7 diff --git a/frontend/public/fonts/icomoon.eot b/frontend/public/fonts/icomoon.eot index 5c94ea1c79a87665e7ee1733bc8fdc7ba6aa13c5..dca77f5a0df72b5cd3d43a00edd7de30c6fa3f9d 100644 GIT binary patch delta 19 bcmeB~&Db@Yal;a|%}dozacwRzl#u}dQ&tD3 delta 23 dcmeC0&Db-Wal;ZdM&8X!)J|~$sXRj&831Sz2fzRT diff --git a/frontend/public/fonts/icomoon.ttf b/frontend/public/fonts/icomoon.ttf index 7ee9cc18c667edeec9157fb429a8c747a4599629..2ca82e112a55b9e6acc6056f5ab1d74637d2de65 100644 GIT binary patch delta 18 acmaDclkwS1#szAd8P!g4Z9ZclBLe_WE(cx! delta 21 dcmaDhlkvq&#szAOyqnZcaWV34K4l;y0{~tO2X+7e diff --git a/frontend/public/fonts/icomoon.woff b/frontend/public/fonts/icomoon.woff index 8ddca17d981b42a98fbd32be2ba68108a108ad12..cc78b73f4eb677db69b7516fb0f385c8eeea12e3 100644 GIT binary patch delta 19 bcmdloi*eH|#tlAdn|;+zac!0`l#u}dP!$I4 delta 23 dcmdlqi*d^=#tlAdjJ%tD)J|~$DKSGC831GW2L=ED diff --git a/frontend/public/icons/duty-dngs.png b/frontend/public/icons/duty-dngs.png index 1fad25625344bcc335bc6290444d0f4e64c990b7..bc62d91f5966f870af04b0efccb5ef6d4c6cb7bc 100644 GIT binary patch delta 23 ecmZpTXo_Iz4DfT`$oi0J^K+&s#?4MFht&aTG|JAZ5>TSRDX`>j=RB diff --git a/frontend/public/icons/duty-expl.png b/frontend/public/icons/duty-expl.png index ae11fddcdaa11385a8f173db96b1f719835b4f57..b23ba3392b2733204c207a6a5dcd495d50e4fefa 100644 GIT binary patch delta 13 Ucmdm_vr&hoGr-S%Bde|$03nbBCjbBd delta 14 Vcmdm}vq^`wGr-TCcO#3g7yu;%1T+8u diff --git a/frontend/public/icons/duty-guild.png b/frontend/public/icons/duty-guild.png index 9f022bf7aa6afe17b1bfa26276618dd638a073ae..c0b0caef318040bb104c6aff960478bac1444148 100644 GIT binary patch delta 13 Ucmca)aM6IJGr-S%Bdf0j03|8}kpKVy delta 14 Vcmca;aLItRGr-TCcO#3h1OO=J1fBo@ diff --git a/frontend/public/icons/duty-high.png b/frontend/public/icons/duty-high.png index b04850da8f01cb3c329b89e17ed4f82d7af636cc..bb929a80369541d35806dd3844fada53126f958b 100644 GIT binary patch delta 13 UcmbOqIxm!^Gr-S%BkL?J03%Gr-TCcO#3SA^;>01Q!4R diff --git a/frontend/public/icons/gc-1-10.png b/frontend/public/icons/gc-1-10.png index 14ceb823af5b8eab0b214771eec22a5227747d65..bca3bfb8f47a0e815ccd1b2f9d2063557908be80 100644 GIT binary patch delta 13 UcmZqkY4u_04DfT`$jYb&03YZB^8f$< delta 14 VcmZqmY4c(24DfU3-N?eI1^^>O1ONa4 diff --git a/frontend/public/icons/gc-1-11.png b/frontend/public/icons/gc-1-11.png index 604ad4fecb4d6211734ff65a7123662b0081da6d..9587f11e397e0c502328f4e9c367d7ab1296d660 100644 GIT binary patch delta 13 UcmX@>d&ZZgGr-S%BkKt@04OvCN&o-= delta 14 VcmX@(d)Ak=Gr-TCcO%OQH2^Fi1y=w7 diff --git a/frontend/public/icons/gc-1-12.png b/frontend/public/icons/gc-1-12.png index 33c6db77d79a829187a2f17519e66088758a3127..dc586e77d1b2134f6a13d2d43987d8441aed1a7a 100644 GIT binary patch delta 13 UcmX>ddMcEqGr-S%BkM6O04THtSO5S3 delta 14 VcmX>VdODP~Gr-TCcO%O&EdVU61!VvL diff --git a/frontend/public/icons/gc-1-13.png b/frontend/public/icons/gc-1-13.png index 068fbf01b66e8dcf12c156a11ca6b56eb38a4716..24652641e60cd4e27495c2cd5ceef3536028abd7 100644 GIT binary patch delta 13 Ucmews{xzJXGr-S%BkMWyOQ4DfT`$jYe;03q`PE&u=k delta 14 VcmeB;>WgCS4DfU3-N?eJ3jig11Umo# diff --git a/frontend/public/icons/gc-1-15.png b/frontend/public/icons/gc-1-15.png index 1d7ab11beaf87ab324f8b73685c7f054b1b23d67..0c27fc218d873556fb53ed4445b7a2737c7a1615 100644 GIT binary patch delta 13 Ucmey6`#zVYGr-S%BkOB304|aS0{{R3 delta 14 VcmaE#`yrRLGr-TCcO%PdGXOIL1`q%M diff --git a/frontend/public/icons/gc-1-16.png b/frontend/public/icons/gc-1-16.png index ab485464a658e7e66167acc2cb566cc621d06047..c421fe5a86054c71a9b41cfdfab21cfcc2b31272 100644 GIT binary patch delta 13 UcmaEt|2ChcGr-S%BkN0Z04|FL0ssI2 delta 14 VcmaEx|1O`kGr-TCcO%P7a{w~^1`hxL diff --git a/frontend/public/icons/gc-1-17.png b/frontend/public/icons/gc-1-17.png index d3e758a738287e5f723938024fac3b23e95cf389..8be93a17bd05c88d4a8bfff363a2eb29591c8677 100644 GIT binary patch delta 13 UcmdmAyswz0Gr-S%BkL|p04g5^e*gdg delta 14 Vcmdm2yuX;WGr-TCcO%O#O8_oA1&jay diff --git a/frontend/public/icons/gc-1-18.png b/frontend/public/icons/gc-1-18.png index 5ed7fe8dd03fdd09c3413944bd18a1d6fc8bb456..251009094b96dbf6f3fdc02b8e66eb346e2d00a3 100644 GIT binary patch delta 13 UcmX?6a=e74Gr-S%BdfC&04g8_9RL6T delta 14 VcmX?Ja-xK_Gr-TCcO#3l6#y>W>1nmF- diff --git a/frontend/public/icons/gc-1-2.png b/frontend/public/icons/gc-1-2.png index a1ab5a4a84ce680c01c44c853b6899a4552719c8..58f8c670d325280d98a4bac1cedbedc0740e4ae3 100644 GIT binary patch delta 13 Ucmez8{MVVKGr-S%BkNB^04z-f!~g&Q delta 14 VcmezC{Lh)SGr-TCcO%PBMF22|1(izGr-S%BkK$$03x6SrT_o{ delta 14 VcmbQ^I@gu8Gr-TCcO%OTB>*NI1hW7D diff --git a/frontend/public/icons/gc-1-5.png b/frontend/public/icons/gc-1-5.png index dcabb02987dc86f93646665c9159a3e4752c254b..afb4dcb2d9a1b5c34f8266f15f2392640ef4e0e6 100644 GIT binary patch delta 13 UcmZqkX!T&}4DfT`$jYb!03VJ6=>Px# delta 14 VcmZqmX!Bt04DfU3-N?eI0stc71NHy_ diff --git a/frontend/public/icons/gc-1-6.png b/frontend/public/icons/gc-1-6.png index 40601cf23e1c0e19b0a340a4f8d4ce787a2f4ba4..70b99e346d32bf0ad351494d3df86d8fb3389f09 100644 GIT binary patch delta 13 UcmdnuvDt&AGr-S%Bdfj&03GNUf4DfT`$jYS#03gx?4gdfE delta 14 VcmeD4>Gxsn4DfU3-N?eF1^^^L1RDSV diff --git a/frontend/public/icons/gc-2-1.png b/frontend/public/icons/gc-2-1.png index 2c26e53ad2dc6c110f06904481c015e785bf9787..f0ab2d6bf5475dd32abb51b33be676aaf3bcb913 100644 GIT binary patch delta 18 ZcmaEB_1cQ1Gr-S%BWo^m0AE=LeEMoGr-S%BkOWK0472O4*&oF delta 14 VcmZ1-yC#;kGr-TCcO%PkJpd{U1snhX diff --git a/frontend/public/icons/gc-2-13.png b/frontend/public/icons/gc-2-13.png index 10c04a9c7f93bb6574d2bcec5183f00a045a3610..2901a6153fac1c3ac12a3a43c25dec04cf700ae4 100644 GIT binary patch delta 18 ZcmdlQw>gfbGr-S%Bda#YW6HnGr-TCcO#272P5xheGV3N08W$zumAu6 diff --git a/frontend/public/icons/gc-2-14.png b/frontend/public/icons/gc-2-14.png index d1768ac97221dc9f3c8dd358d27076d9b4dd218b..f51e8b3eb5df57596fd95debf32320a542f3bf32 100644 GIT binary patch delta 13 UcmZ1(zapNcGr-S%BkK}<045;?3jhEB delta 14 VcmZ1xzcQY+Gr-TCcO%OZeE=!x1sDJT diff --git a/frontend/public/icons/gc-2-15.png b/frontend/public/icons/gc-2-15.png index bdf6aa8861c7b99c7842917e1c0fff8326a70efa..cdcbc2f9f1a22efa76b17988b10eeee1cba53c5d 100644 GIT binary patch delta 13 UcmbQ4J|mr_Gr-S%BkL4n03|g9?*IS* delta 14 VcmbP{J~N%QGr-TCcO%ObV*n`a1pEL1 diff --git a/frontend/public/icons/gc-2-16.png b/frontend/public/icons/gc-2-16.png index 9aeee5bd28fb0b99fbca901e4da379f6bc30dd45..88afd45e256ed94904369bcdbf217194a4f394a2 100644 GIT binary patch delta 13 Ucmey7{ym+gGr-S%BkN~l0501G3;+NC delta 14 VcmeyK{v(~WGr-TCcO%PZV*oQz1{nYV diff --git a/frontend/public/icons/gc-2-17.png b/frontend/public/icons/gc-2-17.png index 68c74dd22f872f934a24e5e2a0dba8d1a2737f3a..ce3cb5cb505ca8c389adb369a331daaf3a27571e 100644 GIT binary patch delta 13 Ucmcbcbtj9ZGr-S%BWr{y04reyLjV8( delta 14 VcmcbUbvKK(Gr-TCcOy%LDF8301yBG0 diff --git a/frontend/public/icons/gc-2-18.png b/frontend/public/icons/gc-2-18.png index 488bc328f27dd65990ca75f62b9fa44ccc407c09..f6ce676656553b8b42b18af5511ed80b0adfbf28 100644 GIT binary patch delta 13 UcmbQ9GcAXuGr-S%Bdd@Z03>n*b^rhX delta 14 VcmbQ1Gd+j3Gr-TCcO#3C82~6S1cLwo diff --git a/frontend/public/icons/gc-2-19.png b/frontend/public/icons/gc-2-19.png index 4d4ea826d9fd237f3209d69444e0f3b85a07d9cb..f967fe94221ea7fae2af7eed5eabe693b2371128 100644 GIT binary patch delta 13 UcmX?_b0mkQGr-S%BddcM04W{?00000 delta 14 VcmX?-b2NvwGr-TCcO#2~82~Lf1q}cI diff --git a/frontend/public/icons/gc-2-2.png b/frontend/public/icons/gc-2-2.png index 807138244d910c15eefe0d39c20a9ef9b54427a3..1aa11b7f683df2f1f6c26e99a2c159062c8af735 100644 GIT binary patch delta 13 UcmaEA{luE3Gr-S%BkKcM04WazWdHyG delta 14 VcmaE2{nVPZGr-TCcO%OKSpY2u1#$oY diff --git a/frontend/public/icons/gc-2-3.png b/frontend/public/icons/gc-2-3.png index 061cb1b895b480b09ed96e8c16eaccd438c8cf16..37cdce2732bca34869705da633bd861d7bde52f7 100644 GIT binary patch delta 13 UcmaE3{o0zPGr-S%BkOZn04c=_KO25+waTL8Q|x>k+oY503reelK=n! delta 14 VcmeD8o#4yb8Q|y6yOE_^4FDx{1fT!_ diff --git a/frontend/public/icons/gc-3-1.png b/frontend/public/icons/gc-3-1.png index 63edb16b3201bacd49b5a69b5998e09c110584fe..2c3eb5ac9929ae13c389d80e4bad501c198bde41 100644 GIT binary patch delta 13 UcmezE_{)){Gr-S%BkMN>04vf3wg3PC delta 14 Vcmez6_}h`SGr-TCcO%O;1pqJt1;YRU diff --git a/frontend/public/icons/gc-3-10.png b/frontend/public/icons/gc-3-10.png index cf852088ce966e15dc281f1d2910a89ceb6e957c..8f7453405c62c2054fa2b0ce6ba7d606a466e67c 100644 GIT binary patch delta 13 UcmdlMu{DCFGr-S%Bdehf043H0p#T5? delta 14 VcmdlQu`PnNGr-TCcO#3T4ge{t1g-!8 diff --git a/frontend/public/icons/gc-3-11.png b/frontend/public/icons/gc-3-11.png index 48998ecdf965769d580667487359a31f88abe8b6..3ba7490f405b8b27c62c87700c2b0f928878a5b1 100644 GIT binary patch delta 13 UcmbOoJ1dr@Gr-S%BkMFh03?V6+yDRo delta 14 VcmbOgJ3E%OGr-TCcO%O*Jpd>$1nB?( diff --git a/frontend/public/icons/gc-3-12.png b/frontend/public/icons/gc-3-12.png index 1b4a9d170e66bd45657e5120f93c1628945f554f..c91919593831213b0f5590b9c250ef559ad502e9 100644 GIT binary patch delta 13 UcmaE#`Yx5FGr-S%BkL<804>A?>;M1& delta 14 VcmaEt`aYGlGr-TCcO%OyBLFfa1^EB~ diff --git a/frontend/public/icons/gc-3-13.png b/frontend/public/icons/gc-3-13.png index d54407e3d5c62c7d1fe3dc1ef2903ebafa4a2986..7cc5e6e32f503ce2f08c8b3d4d1b25d7cba5939b 100644 GIT binary patch delta 18 Zcmcbeb~BBoGr-S%BWt|==2ZP}%m7Sy2X_Df delta 21 ccmcbab~}x=Gr-TCcOy%@J|pkuWc_c<09(ZekN^Mx diff --git a/frontend/public/icons/gc-3-14.png b/frontend/public/icons/gc-3-14.png index 291c6eec6d6d0ac8ba4ea62cb2b9af808639b5a3..c8d99f7cc38d6a6456fdcd7e43b56a966fab229c 100644 GIT binary patch delta 13 UcmcbTeL0(@Gr-S%BkOrn04t3JssI20 delta 14 VcmcbdeI=W>hF1n2+& diff --git a/frontend/public/icons/gc-3-16.png b/frontend/public/icons/gc-3-16.png index ed1c0761434c3e5ffb62dc79b58c7303f4cf50f6..b6ede365be9c92c50a4e9835cbf86fe783ab8844 100644 GIT binary patch delta 13 Ucmdm)wIhqAGr-S%Bddui04KQw*8l(j delta 14 VcmdmywKI#gGr-TCcO#35DF7?C1mpk! diff --git a/frontend/public/icons/gc-3-17.png b/frontend/public/icons/gc-3-17.png index f8032b816af8255387be6444d1f0ce87fb4fb679..ffc28d1581e3f11c398c6171b601a646eecd9fbe 100644 GIT binary patch delta 13 UcmaEo{WzPYGr-S%BkO%r04*&A+5i9m delta 14 VcmaEy{Un>UGr-TCcO%PvQvfl81?K<& diff --git a/frontend/public/icons/gc-3-18.png b/frontend/public/icons/gc-3-18.png index e65c82616a128473990c7467105075623d327071..832e05b51a806df5852c9a0c8e6f992bcc3d359e 100644 GIT binary patch delta 13 Ucmexc@TY*KGr-S%BWr~P052#7vH$=8 delta 14 VcmexU@V9`qGr-TCcOy%M1pqU;1-}3Q diff --git a/frontend/public/icons/gc-3-19.png b/frontend/public/icons/gc-3-19.png index 2b4c7b1b1c1b1907bad5a266132f12d81b69f2c9..a987523775d172c68d36e34f81b74225400af1c5 100644 GIT binary patch delta 13 UcmZoKYb#^v4DfT`$jW3503)*mUjP6A delta 14 VcmZoGYcFH%4DfU3-N?dZ4FD%)1Z)5R diff --git a/frontend/public/icons/gc-3-2.png b/frontend/public/icons/gc-3-2.png index 1bbd7da4f45f0f9e9c961fd5765e037dd84d4be5..83746456adec811ed7a27fe2dba5f0533c7d5567 100644 GIT binary patch delta 13 Ucmdnsy55zgGr-S%BkO7<03?nC-v9sr delta 14 VcmZ4Qy1|vTGr-TCcO%PcB>*Te1nd9+ diff --git a/frontend/public/icons/gc-3-3.png b/frontend/public/icons/gc-3-3.png index cd765b5a249b4a18c418deb53d528dc47b894384..c444ad642819286d2dc64df3169e5ae0ec04593f 100644 GIT binary patch delta 13 UcmccQe$kz!Gr-S%BkNgZ04Og7N&o-= delta 14 VcmccUe#xD+Gr-TCcO%PLWdJN01y=w7 diff --git a/frontend/public/icons/gc-3-4.png b/frontend/public/icons/gc-3-4.png index 59dc695301abc17e6ed157d6870016a5588c22e0..f24fc313177023374e85de8f02227206c624e88f 100644 GIT binary patch delta 13 UcmeD6?D1sj4DfT`$l9R-03ligfB*mh delta 14 VcmeD2?Db^r4DfU3-N@3R0sthw1dRXy diff --git a/frontend/public/icons/gc-3-5.png b/frontend/public/icons/gc-3-5.png index 5bd9b35a7dfa1ecfbb0cfcb43b9377c7164c950a..b87e925eee7c5acd9e52a6142fde940120a2abd9 100644 GIT binary patch delta 13 UcmZ4Nv&e^~Gr-S%BdeSm03zB1N&o-= delta 14 VcmZ4Fv)G5VGr-TCcO#3O8UQA61Xln6 diff --git a/frontend/public/icons/gc-3-6.png b/frontend/public/icons/gc-3-6.png index c187830afd996a2ebba238592e057efcf5f6f261..e4f40564bdeebe6f8d3795f4c476839cca8a56d6 100644 GIT binary patch delta 13 UcmdlPxFe9IGr-S%BkL9o049b77ytkO delta 14 VcmdlHxHFKoGr-TCcO%Od4FD=q1tkCg diff --git a/frontend/public/icons/gc-3-7.png b/frontend/public/icons/gc-3-7.png index 955b1ee537534b7c252ae7ae7f79eb6f5dee43b4..e60c1a140eba0c7b5444602c772fc3ff204b8f27 100644 GIT binary patch delta 13 UcmZ1&vLJ+|Gr-S%Bdd%S03%uiSO5S3 delta 14 VcmZ1wvM_|TGr-TCcO#38762yv1Z4mK diff --git a/frontend/public/icons/gc-3-8.png b/frontend/public/icons/gc-3-8.png index a8cf5b3cd9fb51f2e9cf68d6c76846598c7c37f4..8b9fa2063a139b7c818f03e314e2356d3bc1d99f 100644 GIT binary patch delta 13 UcmaDF@g#z!Gr-S%BWr>V04kgXE&u=k delta 14 VcmaD7@ic<9Gr-TCcOy%J4gfCB1v>x$ diff --git a/frontend/public/icons/gc-3-9.png b/frontend/public/icons/gc-3-9.png index 82e44eeddbebb939fb60b35906ed4cb2cfc3121e..14dd8caf0238d96790cd5e43ef845f8f26d1d0c2 100644 GIT binary patch delta 13 UcmaDF@+5?%Gr-S%BWr>d04hQSBme*a delta 14 VcmaD7@-&3CGr-TCcOy%J762}61u*~s diff --git a/frontend/public/icons/town-1.png b/frontend/public/icons/town-1.png index 5b06ce4f1cd23ce14c548b38fdcfe56921f346f7..7408e2b1f528a38db467a59a4ca64b10c9ce919d 100644 GIT binary patch delta 13 UcmcbqeM6h2Gr-S%BkL7W048q*82|tP delta 14 VcmcbieN&sYGr-TCcO%OcQ2;701ttIh diff --git a/frontend/public/icons/town-2.png b/frontend/public/icons/town-2.png index 9bfe3df57cdb73da1c5918038191a4a90c0d77cf..4c25b8b64c73ecac7dea06d11325038140cc97bd 100644 GIT binary patch delta 13 UcmcbkdRvvHGr-S%BkOe`046pC6951J delta 14 VcmcbudPkMDGr-TCcO%PnApj}x1t0(b diff --git a/frontend/public/icons/town-3.png b/frontend/public/icons/town-3.png index 364a0e0bbdd35deece0620cbeec65a3617bdcc82..f8f70d8b1c0e7aa3b8225a3e5da63aa12c14ae16 100644 GIT binary patch delta 13 UcmaE*^HPVUGr-S%BWtP{04G2M&j0`b delta 14 VcmaE<^Gb)cGr-TCcOy%x7yv6I1l#}s diff --git a/frontend/public/index.html b/frontend/public/index.html index 1a8df5ce..a13888fa 100644 --- a/frontend/public/index.html +++ b/frontend/public/index.html @@ -1,63 +1,63 @@ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - XIV ToDo: Dashboards, checklists, and tools for FFXIV - - - -
-
-

XIV ToDo

-

- XIV ToDo provides useful dashboards, tailored checklists, and tools for Final Fantasy XIV; - whether you are a new player to the game or more experienced. In its current form, XIV ToDo - offers customizable daily and weekly checklists as well as automated completion trackers of - duties and questlines, with much more to come! -

-
-
- - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + XIV ToDo: Dashboards, checklists, and tools for FFXIV + + + +
+
+

XIV ToDo

+

+ XIV ToDo provides useful dashboards, tailored checklists, and tools for Final Fantasy XIV; + whether you are a new player to the game or more experienced. In its current form, XIV ToDo + offers customizable daily and weekly checklists as well as automated completion trackers of + duties and questlines, with much more to come! +

+
+
+ + + + diff --git a/frontend/public/og_cover.png b/frontend/public/og_cover.png index ebaf4341cc8fedc77baaf969726d714c57ac6635..d94175ba20dae0fd2dc12c51b432478321e41b9f 100644 GIT binary patch delta 15 Wcmccilkw_LMwZS1KlhES7i$1L!3Pxp delta 16 XcmccmlkwV5M%K;%KX=}ZEEj74Ll_4l diff --git a/frontend/src/assets/img/brand.png b/frontend/src/assets/img/brand.png index 1b44f82c565f2f3304f69a3f20553cc66f69ae98..856c5b3c89e9d26f4e16111b40d7c811b3a002ac 100644 GIT binary patch delta 13 UcmbPbGt-8pGr-S%Bde$!03e722LJ#7 delta 14 VcmbPfGs}jxGr-TCcO#3a8~`Ki1QY-O diff --git a/frontend/src/assets/img/brand_grey.png b/frontend/src/assets/img/brand_grey.png index edf96a29df173875a1c1855e0e2076b31c1f7d7a..9bef86b6f2ebd96ba16989c641d92d38a9c20605 100644 GIT binary patch delta 13 UcmbPbJJXh>Gr-S%BkNQ-03n_Pi2wiq delta 14 VcmbPfJIj`}Gr-TCcO%PGIRGUD1eO2* diff --git a/frontend/src/assets/img/hamster_avatar.png b/frontend/src/assets/img/hamster_avatar.png index 36afdc47fc27eff8925069b7d44ec5487c6c495e..feabd49edcde4539a647cc49c35a39aa538f7691 100644 GIT binary patch delta 18 ZcmaE{jpg|^7M9KcKlet~t*ng6(f~@h26X@c delta 19 acmaF9jpfBQ7S_%HKX=|nmaQy|$d1UoXS;A7bH*hAE0zxo delta 46 zcmey~Ao#mMkhL?w&z-lCrIm$oD+`m)L`L520TY=Xtq0OZj?8y;fHZ#|bH*hAa0CxH diff --git a/frontend/src/assets/screenshots/en-questlines.png b/frontend/src/assets/screenshots/en-questlines.png index cca04f4a38f35348f0306785997627785ed3357b..7dd8adadb511823f02d918bdc10f1cc58121aa1d 100644 GIT binary patch delta 46 zcmV+}0MY-Rrx2N^5Cn-(PDgsWu9o+x` delta 84 zcmX^5LFLQ`71quGKX=|nmR1(VRu-mK7Ur!iEEAO(dACnhW_fSQ$lKl$$+EpAlJ)N| lpjcxF+iyW2U6aN(^8k<*RcAjwAE@TeG4}0uj&Wob0szE89u)up diff --git a/godestone/core.go b/godestone/core.go index 78df7b5c..9b3f1fad 100644 --- a/godestone/core.go +++ b/godestone/core.go @@ -1,12 +1,12 @@ -package lodestone - -import ( - "github.com/karashiiro/bingode" - "github.com/xivapi/godestone/v2" -) - -var scraper *godestone.Scraper - -func init() { - scraper = godestone.NewScraper(bingode.New(), godestone.EN) -} +package lodestone + +import ( + "github.com/karashiiro/bingode" + "github.com/xivapi/godestone/v2" +) + +var scraper *godestone.Scraper + +func init() { + scraper = godestone.NewScraper(bingode.New(), godestone.EN) +} diff --git a/scripts/csv_to_json.py b/scripts/csv_to_json.py index ea3bad8d..68ab493c 100644 --- a/scripts/csv_to_json.py +++ b/scripts/csv_to_json.py @@ -1,50 +1,50 @@ -import csv -import json -import sys - -# This script converts multiple CSV files to a JSON file, grouping entries -# together that has a same 'Category' field. -# --> Usage: python3 csv_to_json.py db.json *.csv - -def loadInput(csvFilePath, jsonObject): - with open(csvFilePath, encoding='utf-8') as csvf: - csvReader = csv.DictReader(csvf) - - for row in csvReader: - rowRef = row.copy() - for key in rowRef.keys(): - if row[key] == 'TRUE' or row[key] == 'true': - row[key] = True - elif row[key] == 'FALSE' or row[key] == 'false': - row[key] = False - elif row[key] == '': - row.pop(key) - elif key in ['ID', 'MinID', 'SpoilersUntil']: - row[key] = int(row[key]) - elif key in ['MaxIDOneOf', 'MaxIDAllOf']: - idSplit = row[key].split(' ') - ids = [] - for id in idSplit: - ids.append(int(id)) - row[key] = ids - - if len(row) > 0: - if row['Category'] not in jsonObject: - jsonObject[row['Category']] = [] - jsonObject[row['Category']].append(row) - - return jsonObject - -def saveOutput(jsonFilePath, jsonObject, minified=True): - with open(jsonFilePath, 'w', encoding='utf-8') as jsonf: - if minified: - jsonString = json.dumps(jsonObject, separators=(',', ':')) - else: - jsonString = json.dumps(jsonObject, indent=4) - jsonf.write(jsonString) - -jsonObject = {} -for i in range(2, len(sys.argv)): - jsonObject = loadInput(sys.argv[i], jsonObject) - -saveOutput(sys.argv[1], jsonObject) +import csv +import json +import sys + +# This script converts multiple CSV files to a JSON file, grouping entries +# together that has a same 'Category' field. +# --> Usage: python3 csv_to_json.py db.json *.csv + +def loadInput(csvFilePath, jsonObject): + with open(csvFilePath, encoding='utf-8') as csvf: + csvReader = csv.DictReader(csvf) + + for row in csvReader: + rowRef = row.copy() + for key in rowRef.keys(): + if row[key] == 'TRUE' or row[key] == 'true': + row[key] = True + elif row[key] == 'FALSE' or row[key] == 'false': + row[key] = False + elif row[key] == '': + row.pop(key) + elif key in ['ID', 'MinID', 'SpoilersUntil']: + row[key] = int(row[key]) + elif key in ['MaxIDOneOf', 'MaxIDAllOf']: + idSplit = row[key].split(' ') + ids = [] + for id in idSplit: + ids.append(int(id)) + row[key] = ids + + if len(row) > 0: + if row['Category'] not in jsonObject: + jsonObject[row['Category']] = [] + jsonObject[row['Category']].append(row) + + return jsonObject + +def saveOutput(jsonFilePath, jsonObject, minified=True): + with open(jsonFilePath, 'w', encoding='utf-8') as jsonf: + if minified: + jsonString = json.dumps(jsonObject, separators=(',', ':')) + else: + jsonString = json.dumps(jsonObject, indent=4) + jsonf.write(jsonString) + +jsonObject = {} +for i in range(2, len(sys.argv)): + jsonObject = loadInput(sys.argv[i], jsonObject) + +saveOutput(sys.argv[1], jsonObject) diff --git a/scripts/duty_names.py b/scripts/duty_names.py index fa714fa8..2bf66d0e 100644 --- a/scripts/duty_names.py +++ b/scripts/duty_names.py @@ -1,41 +1,41 @@ -import csv -import requests -import time -from bs4 import BeautifulSoup - -# This script takes the duties CSV file and generate text files -# containing the duty names in each language. -# --> Usage: python3 duty_names.py - -names = { - "fr": [], - "de": [], - "jp": [] -} - -with open("duties.csv", encoding='utf-8') as csvf: - csvReader = csv.DictReader(csvf) - - for row in csvReader: - lodestoneID = row["LodestoneID"] - for locale in names: - if (lodestoneID == ""): - names[locale].append("") - continue - - url = "https://" + locale + ".finalfantasyxiv.com/lodestone/playguide/db/duty/" + row["LodestoneID"] - page = requests.get(url) - - soup = BeautifulSoup(page.content, "html.parser") - results = soup.find("h2", class_="db-view__detail__lname_name") - - name = results.text.strip() - names[locale].append(name) - print(name) - - time.sleep(1) - - for locale in names: - with open("duty_names_" + locale + ".txt", "w", encoding='utf-8') as f: - for name in names[locale]: +import csv +import requests +import time +from bs4 import BeautifulSoup + +# This script takes the duties CSV file and generate text files +# containing the duty names in each language. +# --> Usage: python3 duty_names.py + +names = { + "fr": [], + "de": [], + "jp": [] +} + +with open("duties.csv", encoding='utf-8') as csvf: + csvReader = csv.DictReader(csvf) + + for row in csvReader: + lodestoneID = row["LodestoneID"] + for locale in names: + if (lodestoneID == ""): + names[locale].append("") + continue + + url = "https://" + locale + ".finalfantasyxiv.com/lodestone/playguide/db/duty/" + row["LodestoneID"] + page = requests.get(url) + + soup = BeautifulSoup(page.content, "html.parser") + results = soup.find("h2", class_="db-view__detail__lname_name") + + name = results.text.strip() + names[locale].append(name) + print(name) + + time.sleep(1) + + for locale in names: + with open("duty_names_" + locale + ".txt", "w", encoding='utf-8') as f: + for name in names[locale]: f.write(name + "\n") \ No newline at end of file diff --git a/scripts/fetch_collect_json.py b/scripts/fetch_collect_json.py index 4bb07aa2..d9343259 100644 --- a/scripts/fetch_collect_json.py +++ b/scripts/fetch_collect_json.py @@ -1,30 +1,30 @@ -import json -import time -import requests - -for lang in ['en', 'fr', 'de', 'ja']: - for page in [ - 'achievements', - 'armoires', - 'bardings', - 'emotes', - 'fashions', - 'frames', - 'hairstyles', - 'mounts', - 'minions', - 'orchestrions', - 'records', - 'relics', - 'spells', - 'survey_records', - 'titles' - ]: - url = f'https://ffxivcollect.com/api/{page}?language={lang}' - print(url) - response = requests.get(url) - response_json = response.json() - with open(f'../frontend/src/assets/dbs/{lang}/{page}.json', 'w') as f: - json.dump(response_json, f) - f.write('\n') +import json +import time +import requests + +for lang in ['en', 'fr', 'de', 'ja']: + for page in [ + 'achievements', + 'armoires', + 'bardings', + 'emotes', + 'fashions', + 'frames', + 'hairstyles', + 'mounts', + 'minions', + 'orchestrions', + 'records', + 'relics', + 'spells', + 'survey_records', + 'titles' + ]: + url = f'https://ffxivcollect.com/api/{page}?language={lang}' + print(url) + response = requests.get(url) + response_json = response.json() + with open(f'../frontend/src/assets/dbs/{lang}/{page}.json', 'w') as f: + json.dump(response_json, f) + f.write('\n') time.sleep(1) \ No newline at end of file