2.9. Using Pyarmor License

2.9.1. Prerequisite

First of all

  1. An activation file of Pyarmor License like pyarmor-regcode-xxxx.txt, refer to License Types to purchase right one

  2. Pyarmor 8.2+

  3. Internet connection

  4. Product name bind to this license, for non-commercial use, product name is non-profits

If any firewall turns on

In Windows pytransform.pyd will connect to pyarmor.dashingsoft.com port 80 to request token for online obfuscation, in other platforms it is pytransform3.so. Refer to firewall documentation to allow it to connect pyarmor.dashingsoft.com:80.

2.9.2. Using Pyarmor Basic or Pro

Basic use steps:

  1. Using activation file to initial registration, set product name bind to this license

  2. Once initial registration completed, a registration file is generated

  3. Using registration file to register Pyarmor in other devices

2.9.2.1. Initial registration

Using -p to specify product name for this license, for non-commercial use, set product name to non-profits.

Assume this license is used to protect your product XXX, initial registration by this command:

$ pyarmor reg -p "XXX" pyarmor-regcode-xxxx.txt

Pyarmor will show registration information and ask for your confirmation. If everything is fine, type yes and Enter to continue. Any other input aborts registration.

If initial registration is successful, it prints final license information in the console. And a registration file like pyarmor-regfile-xxxx.zip is generated in the current path at the same time. This file is used for subsequent registration in other machines.

Once initial registration completed, activation file pyarmor-regcode-xxxx.txt is invalid, do not use it again.

Once initial registration completed, product name can’t be changed.

Please backup registration file pyarmor-regfile-xxxx.zip carefully. If lost, Pyarmor is not responsible for keeping this license and no lost-found service.

2.9.2.2. Product name is not decided

When a product is in development, and the product name is not decided. Set product name to TBD on initial registration. For example:

$ pyarmor reg -p "TBD" pyarmor-regcode-xxxx.txt

In 6 months real product name must be set by this command:

$ pyarmor reg -p "XXX" pyarmor-regcode-xxxx.txt

If it’s not changed after 6 months, the product name will be set to non-profits automatically and can’t be changed again.

2.9.2.3. Registering in other machines

Copy registration file pyarmor-regfile-xxxx.zip to other machines, run the following command:

$ pyarmor reg pyarmor-regfile-xxxx.zip

Check the registration information:

$ pyarmor -v

After successful registration, all obfuscations will automatically apply this license, and each obfuscation requires online license verification.

2.9.2.4. Registering in Docker or CI pipeline

It’s no problem to run Pyarmor in Docker or CI pipeline to obfuscate user’s application by Pyarmor Basic or Pro license. Register pyarmor with pyarmor-regfile-xxxx.zip same as above. But It’s not allowed to distribute pyarmor self and any Pyarmor License to your customers

Don’t run too many build dockers, maximum is 100 in 24 hours. If more than 100 runs one day, please use Pyarmor Group License.

And if need run more than 3 build dockers, it’s better to start each docker container or runner every 30 seconds, too many register requests in same time may be rejected by license server.

2.9.3. Using group license

New in version 8.2.

Each Pyarmor Group could have 100 offline devices, each device has its own number, from 1 to 100.

Only the machine id of device is not changed after reboot, it could be used as group device. Most of physics machine, cloud server or VM like Qemu, Virtual box, Vmware with same disk image work with Group license. If using group in CI pipeline, the default runner doesn’t work, but something like self-host runner may work.

The allocated device No. is never free, if a device is reinstalled, it need allocate new one.

Basic steps:

  1. Using activation file pyarmor-regcode-xxxx.txt to initial registration, set product name bind to this license, and generate registration file 1

  2. Generating group device file separately on each offline device

  3. Using registration file and group device file to generate device registration file.

  4. Using device registration file to register Pyarmor on offline device 2

1

Pyarmor will review group license manually and enable it in 24 hours since activation file is sent.

2

The device registration file is bind to specified device, each device has its own device regfile

2.9.3.1. Initial registration

After purchasing Pyarmor Group, an activation file pyarmor-regcode-xxxx.txt is sent to registration email.

Initial registration need internet connection and Pyarmor 8.2+. Suppose product name is XXX, then run this command:

$ pyarmor reg -p XXX pyarmor-regcode-xxxx.txt

After initial registration completed, a registration file pyarmor-regfile-xxxx.zip will be generated.

2.9.3.2. Group device file

On each offline device, install Pyarmor 8.2+, and generate group device file. For example, on device no. 1, run this command:

$ pyarmor reg -g 1

INFO     Python 3.12.0
INFO     Pyarmor 8.4.7 (trial), 000000, non-profits
INFO     Platform darwin.x86_64
INFO     generating device file ".pyarmor/group/pyarmor-group-device.1"
INFO     current machine id is "mc92c9f22c732b482fb485aad31d789f1"
INFO     device file has been generated successfully

It will generate group device file pyarmor-group-device.1.

In order to make sure group license works for this device, reboot this device, and run this command again:

$ pyarmor reg -g 1

...
INFO     current machine id is "mc92c9f22c732b482fb485aad31d789f1"
...

Make sure this machine id is same after reboot.

Because group license is bind to device, so machine id should keep same after reboot. If it’s changed after reboot, group license doesn’t work in this device.

For VM machine, WSL(Windows Subsystem Linux) or any other system, please check the documentation to configure the network and harddisk, make sure network mac address and serial number of harddisk are fixed. If they’re volatile, group license could not work in this system.

2.9.3.3. Generating offline device regfile

Generating offline device regfile needs an internet connection, Pyarmor 8.2+, group device file pyarmor-group-device.1 and group license registration file pyarmor-regfile-xxxx.zip.

Copying group device file pyarmor-group-device.1 to initial registration device or any computer which has internet connection and registration file, this file must be saved in the path .pyarmor/group/, then run the following command to generate device regfile pyarmor-device-regfile-xxxx.1.zip:

$ mkdir -p .pyarmor/group
$ cp pyarmor-group-device.1 .pyarmor/group/

$ pyarmor reg -g 1 /path/to/pyarmor-regfile-xxxx.zip

The device regfile pyarmor-device-regfile-xxxx.1.zip is bind to machine id in the device file pyarmor-group-device.1.

Note

If there are new versions which fix any bug that machine id is changed after this device reboot, it need generate new device file pyarmor-group-device.2 for this device by new Pyarmor version, and generate new device regfile pyarmor-device-regfile-xxxx.2.zip by new Pyarmor version too.

Because device no. 1 has been used, so it need use next device no. 2, that is to say, one device may occupy more than one device no. Generally it should not be problem because there are 100 device no. available.

2.9.3.4. Registering Pyarmor in offline device

Once device regfile is generated, copy it to the corresponding device, run this command to register Pyarmor:

$ pyarmor reg /path/to/pyarmor-device-regfile-xxxx.1.zip

INFO     Python 3.12.0
INFO     Pyarmor 8.4.7 (trial), 000000, non-profits
INFO     Platform darwin.x86_64
INFO     register "/path/to/pyarmor-device-regfile-xxxx.1.zip"
INFO     machine id in group license: mc92c9f22c732b482fb485aad31d789f1
INFO     got machine id: mc92c9f22c732b482fb485aad31d789f1
INFO     this machine id matchs group license
INFO     This license registration information:

License Type    : pyarmor-group
License No.     : pyarmor-vax-006000
License To      : Tester
License Product : btarmor

BCC Mode        : Yes
RFT Mode        : Yes

Notes
* Offline obfuscation

Note that this log says this device regfile is only for this machine id:

INFO     machine id in group license: mc92c9f22c732b482fb485aad31d789f1

And this log show machine id of this device:

INFO     got machine id: mc92c9f22c732b482fb485aad31d789f1

They must be matched, otherwise this device regfile doesn’t work, it may need generate new device regfile for this device.

Check registration information:

$ pyarmor -v

After successful registration, all obfuscations will automatically apply this group license, and each obfuscation need not online license verification.

2.9.3.5. Run unlimited dockers in offline device

New in version 8.3.

Group license supports unlimited dockers which uses default bridge network and not highly customized, the docker containers use same device regfile of host.

how it works

  1. Each docker host is taken as an offlice device and must be registered as above.

  2. Then start an auth-server in docker host to listen auth-request from docker container.

  3. When run Pyarmor in docker container, it will send auth-request to auth-server in docker host, and verify the result returned from docker host.

Linux Docker Host

The practice for group license with unlimited docker containers:

  • Docker host, Ubuntu x86_64, Python 3.8

  • Docker container, Ubuntu x86_64, Python 3.11

The prerequisite in docker host:

  • offline device regfile pyarmor-device-regfile-xxxx.1.zip as above

  • Pyarmor 8.4.1+

First copy the following files to docker host:

  • pyarmor-8.4.2.tar.gz

  • pyarmor.cli.core-5.4.1-cp38-none-manylinux1_x86_64.whl

  • pyarmor.cli.core-5.4.1-cp311-none-manylinux1_x86_64.whl

  • pyarmor-device-regfile-6000.1.zip

Then run the following commands in the docker host:

$ python3 --version
Python 3.8.10

$ pip install pyarmor.cli.core-5.4.1-cp38-none-manylinux1_x86_64.whl
$ pip install pyarmor-8.4.1.tar.bgz

Next start pyarmor-auth to listen the request from docker containers:

$ pyarmor-auth pyarmor-device-regfile-6000.1.zip

2023-06-24 09:43:14,939: work path: /root/.pyarmor/docker
2023-06-24 09:43:14,940: register "pyarmor-device-regfile-6000.1.zip"
2023-06-24 09:43:15,016: listen container auth request on 0.0.0.0:29092

Do not close this console, open another console to run dockers.

For Linux container run it with extra --add-host=host.docker.internal:host-gateway:

$ docker run -it --add-host=host.docker.internal:host-gateway python bash

root@86b180b28a50:/# python --version
Python 3.11.4
root@86b180b28a50:/#

In docker host open third console to copy files to container:

$ docker cp pyarmor-8.4.1.tar.gz 86b180b28a50:/
$ docker cp pyarmor.cli.core-5.4.1-cp311-none-manylinux1_x86_64.whl 86b180b28a50:/
$ docker cp pyarmor-device-regfile-6000.1.zip 86b180b28a50:/

In docker container, register Pyarmor with same device regfile. For example:

root@86b180b28a50:/# pip install pyarmor.cli.core-5.4.1-cp311-none-manylinux1_x86_64.whl
root@86b180b28a50:/# pip install pyarmor-8.4.1.tar.gz
root@86b180b28a50:/# pyarmor reg pyarmor-device-regfile-6000.1.zip
root@86b180b28a50:/# pyarmor -v

If everything is fine, it should print group license information. And then test it with simple script:

root@86b180b28a50:/# echo "print('hello world')" > foo.py
root@86b180b28a50:/# pyarmor gen --enable-rft foo.py

When need to verify license, the docker container will send request to docker host. The pyarmor-auth console should print auth request from docker container, if there is no any request, please check docker network configuration, make sure IPv4 addresses of docker host and container are in the same network. For example, in docker container:

root@86b180b28a50:/# ifconfig -a

eth0: flags=4163<UP,BROADCAST,RUNNING,MULTICAST>  mtu 1500
      inet 172.17.0.2  netmask 255.255.0.0  broadcast 172.17.255.255
...

In docker host:

$ ifconig -a
docker0: flags=4099<UP,BROADCAST,MULTICAST>  mtu 1500
         inet 172.17.0.1  netmask 255.255.0.0  broadcast 172.17.255.255
...

MacOS Docker Host

There is a little difference when docker host is MacOS, because docker container is running in Linux VM, not in MacOS directly.

So one solution is running pyarmor-auth in Linux VM, in this case, it should take this Linux VM as offline device, and generate device regfile for this Linux VM, not for MacOS, and start docker container with extra options:

$ docker run --add-host=host.docker.internal:172.17.0.1 ...

In this case, it may need some extra configuration for Linux VM to make sure the machine id could be fixed.

Refer to issue 1542 for more information.

Windows Docker Host

For Windows docker host, first check Windows network configuration:

C:> ipconfig

Ethernet adapter vEthernet (WSL):

     Connection-specific DNS Suffix  . :
     Link-local IPv6 Address . . . . . : fe80::8984:457:2335:588e%28
     IPv4 Address. . . . . . . . . . . : 172.22.32.1
     Subnet Mask . . . . . . . . . . . : 255.255.240.0
     Default Gateway . . . . . . . . . :

If there is IPv4 Address, for example 172.22.32.1, which is in the same network as docker container, it’s simple. Just take this Windows as offline device, and run pyarmor-auth on it, then start docker container with extra options:

$ docker run --add-host=host.docker.internal:172.22.32.1 ...

Anyway, pyarmor-auth must listen on any IPv4 address which is in the same network as docker container.

If there is no available IPv4 address in Windows, the other solution is running pyarmor-auth in WSL, in this case, WSL should be taken as offline device.

When something is wrong

  1. Check docker container network:

root@86b180b28a50:/# ifconfig -a

eth0: flags=4163<UP,BROADCAST,RUNNING,MULTICAST>  mtu 1500
      inet 172.17.0.2  netmask 255.255.0.0  broadcast 172.17.255.255
...

root@86b180b28a50:/# ping host.docker.internal
PING host.docker.internal (172.17.0.1) 56(84) bytes of data.
64 bytes from host.docker.internal (172.17.0.1): icmp_seq=1 ttl=64 time=0.048 ms
...

If ping doesn’t works, please check docker host network. If docker host is MacOS, it also checks Linux VM network. If docker host is Windows, also check WSL network.

And make sure IPv4 address of host.docker.internal is in same network as eth0 which IPv4 address is 172.17.0.2. In above example, it’s 172.17.0.1, so it’s OK.

If not, also check docker host network. If docker host is MacOS, it may need run pyarmor-auth in Linux VM, not MacOS. If docker host is Windows, it may need run pyarmor-auth in WSL, not Windows.

Anyway, please configure the docker host/container network so that pyarmor-auth could listen in any IPv4 address which is in the same network as docker container.

  1. Check docker host to make sure group license works:

    $ pyarmor -d reg pyarmor-device-regfile-6000.1.zip
    $ pyarmor -v
    

If run pyarmor-auth in Linux VM or WSL, please check group license could work in Linux VM or WSL. It may need generate new device regfile for Linux VM or WSL.

2.9.3.6. Using group license in CI pipeline

Pyarmor group license could not be used in CI pipeline with default runners, but it may work on something like self-host runner, please check CI documentation for more information.

The other workaround is that first obfuscating scripts in docker container like above, then create a new branch to store obfuscated scripts in VC server.

CI pipeline could get obfuscated scripts from this new branch, and start workflow as they’re normal Python scripts.

2.9.4. Upgrading old Pyarmor license

Refer to upgrade old license