2014-08-27 23:10:44 +00:00
|
|
|
/*
|
|
|
|
Copyright 2014 Google Inc. All rights reserved.
|
|
|
|
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
you may not use this file except in compliance with the License.
|
|
|
|
You may obtain a copy of the License at
|
|
|
|
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
See the License for the specific language governing permissions and
|
|
|
|
limitations under the License.
|
|
|
|
*/
|
|
|
|
|
|
|
|
package apiserver
|
|
|
|
|
|
|
|
import (
|
2014-09-04 19:28:47 +00:00
|
|
|
"bytes"
|
2014-12-16 23:38:48 +00:00
|
|
|
"compress/gzip"
|
2014-08-27 23:10:44 +00:00
|
|
|
"fmt"
|
2014-12-16 23:38:48 +00:00
|
|
|
"io"
|
2014-08-27 23:10:44 +00:00
|
|
|
"io/ioutil"
|
|
|
|
"net/http"
|
|
|
|
"net/http/httptest"
|
|
|
|
"net/url"
|
|
|
|
"strings"
|
|
|
|
"testing"
|
2014-09-04 19:28:47 +00:00
|
|
|
|
2014-11-05 23:48:29 +00:00
|
|
|
"golang.org/x/net/html"
|
2015-01-08 20:41:38 +00:00
|
|
|
"golang.org/x/net/websocket"
|
2014-08-27 23:10:44 +00:00
|
|
|
)
|
|
|
|
|
2014-09-04 19:28:47 +00:00
|
|
|
func parseURLOrDie(inURL string) *url.URL {
|
|
|
|
parsed, err := url.Parse(inURL)
|
|
|
|
if err != nil {
|
|
|
|
panic(err)
|
|
|
|
}
|
|
|
|
return parsed
|
|
|
|
}
|
|
|
|
|
|
|
|
// fmtHTML parses and re-emits 'in', effectively canonicalizing it.
|
|
|
|
func fmtHTML(in string) string {
|
|
|
|
doc, err := html.Parse(strings.NewReader(in))
|
|
|
|
if err != nil {
|
|
|
|
panic(err)
|
|
|
|
}
|
|
|
|
out := &bytes.Buffer{}
|
|
|
|
if err := html.Render(out, doc); err != nil {
|
|
|
|
panic(err)
|
|
|
|
}
|
|
|
|
return string(out.Bytes())
|
|
|
|
}
|
|
|
|
|
2015-01-15 07:01:49 +00:00
|
|
|
func TestProxyTransport(t *testing.T) {
|
2014-09-04 19:28:47 +00:00
|
|
|
testTransport := &proxyTransport{
|
2014-08-27 23:10:44 +00:00
|
|
|
proxyScheme: "http",
|
|
|
|
proxyHost: "foo.com",
|
2015-01-19 21:15:41 +00:00
|
|
|
proxyPathPrepend: "/proxy/minion/minion1:10250",
|
2014-08-27 23:10:44 +00:00
|
|
|
}
|
2014-09-04 19:28:47 +00:00
|
|
|
testTransport2 := &proxyTransport{
|
|
|
|
proxyScheme: "https",
|
|
|
|
proxyHost: "foo.com",
|
2015-01-19 21:15:41 +00:00
|
|
|
proxyPathPrepend: "/proxy/minion/minion1:8080",
|
2014-08-27 23:10:44 +00:00
|
|
|
}
|
2015-02-03 23:14:28 +00:00
|
|
|
type Item struct {
|
2015-01-19 21:15:41 +00:00
|
|
|
input string
|
|
|
|
sourceURL string
|
|
|
|
transport *proxyTransport
|
|
|
|
output string
|
|
|
|
contentType string
|
|
|
|
forwardedURI string
|
2015-02-03 23:14:28 +00:00
|
|
|
redirect string
|
|
|
|
redirectWant string
|
|
|
|
}
|
|
|
|
|
|
|
|
table := map[string]Item{
|
2014-09-04 19:28:47 +00:00
|
|
|
"normal": {
|
2015-01-19 21:15:41 +00:00
|
|
|
input: `<pre><a href="kubelet.log">kubelet.log</a><a href="/google.log">google.log</a></pre>`,
|
|
|
|
sourceURL: "http://myminion.com/logs/log.log",
|
|
|
|
transport: testTransport,
|
2015-02-02 21:01:46 +00:00
|
|
|
output: `<pre><a href="http://foo.com/proxy/minion/minion1:10250/logs/kubelet.log">kubelet.log</a><a href="http://foo.com/proxy/minion/minion1:10250/google.log">google.log</a></pre>`,
|
|
|
|
contentType: "text/html",
|
|
|
|
forwardedURI: "/proxy/minion/minion1:10250/logs/log.log",
|
|
|
|
},
|
|
|
|
"trailing slash": {
|
|
|
|
input: `<pre><a href="kubelet.log">kubelet.log</a><a href="/google.log/">google.log</a></pre>`,
|
|
|
|
sourceURL: "http://myminion.com/logs/log.log",
|
|
|
|
transport: testTransport,
|
|
|
|
output: `<pre><a href="http://foo.com/proxy/minion/minion1:10250/logs/kubelet.log">kubelet.log</a><a href="http://foo.com/proxy/minion/minion1:10250/google.log/">google.log</a></pre>`,
|
2015-01-19 21:15:41 +00:00
|
|
|
contentType: "text/html",
|
|
|
|
forwardedURI: "/proxy/minion/minion1:10250/logs/log.log",
|
2015-01-15 07:01:49 +00:00
|
|
|
},
|
|
|
|
"content-type charset": {
|
2015-01-19 21:15:41 +00:00
|
|
|
input: `<pre><a href="kubelet.log">kubelet.log</a><a href="/google.log">google.log</a></pre>`,
|
|
|
|
sourceURL: "http://myminion.com/logs/log.log",
|
|
|
|
transport: testTransport,
|
2015-02-02 21:01:46 +00:00
|
|
|
output: `<pre><a href="http://foo.com/proxy/minion/minion1:10250/logs/kubelet.log">kubelet.log</a><a href="http://foo.com/proxy/minion/minion1:10250/google.log">google.log</a></pre>`,
|
2015-01-19 21:15:41 +00:00
|
|
|
contentType: "text/html; charset=utf-8",
|
|
|
|
forwardedURI: "/proxy/minion/minion1:10250/logs/log.log",
|
2015-01-15 07:01:49 +00:00
|
|
|
},
|
|
|
|
"content-type passthrough": {
|
2015-01-19 21:15:41 +00:00
|
|
|
input: `<pre><a href="kubelet.log">kubelet.log</a><a href="/google.log">google.log</a></pre>`,
|
|
|
|
sourceURL: "http://myminion.com/logs/log.log",
|
|
|
|
transport: testTransport,
|
|
|
|
output: `<pre><a href="kubelet.log">kubelet.log</a><a href="/google.log">google.log</a></pre>`,
|
|
|
|
contentType: "text/plain",
|
|
|
|
forwardedURI: "/proxy/minion/minion1:10250/logs/log.log",
|
2014-09-04 19:28:47 +00:00
|
|
|
},
|
|
|
|
"subdir": {
|
2015-01-19 21:15:41 +00:00
|
|
|
input: `<a href="kubelet.log">kubelet.log</a><a href="/google.log">google.log</a>`,
|
|
|
|
sourceURL: "http://myminion.com/whatever/apt/somelog.log",
|
|
|
|
transport: testTransport2,
|
2015-02-02 21:01:46 +00:00
|
|
|
output: `<a href="https://foo.com/proxy/minion/minion1:8080/whatever/apt/kubelet.log">kubelet.log</a><a href="https://foo.com/proxy/minion/minion1:8080/google.log">google.log</a>`,
|
2015-01-19 21:15:41 +00:00
|
|
|
contentType: "text/html",
|
|
|
|
forwardedURI: "/proxy/minion/minion1:8080/whatever/apt/somelog.log",
|
2014-09-04 19:28:47 +00:00
|
|
|
},
|
|
|
|
"image": {
|
2015-01-19 21:15:41 +00:00
|
|
|
input: `<pre><img src="kubernetes.jpg"/></pre>`,
|
|
|
|
sourceURL: "http://myminion.com/",
|
|
|
|
transport: testTransport,
|
|
|
|
output: `<pre><img src="http://foo.com/proxy/minion/minion1:10250/kubernetes.jpg"/></pre>`,
|
|
|
|
contentType: "text/html",
|
|
|
|
forwardedURI: "/proxy/minion/minion1:10250/",
|
2014-09-04 19:28:47 +00:00
|
|
|
},
|
|
|
|
"abs": {
|
2015-01-19 21:15:41 +00:00
|
|
|
input: `<script src="http://google.com/kubernetes.js"/>`,
|
|
|
|
sourceURL: "http://myminion.com/any/path/",
|
|
|
|
transport: testTransport,
|
|
|
|
output: `<script src="http://google.com/kubernetes.js"/>`,
|
|
|
|
contentType: "text/html",
|
|
|
|
forwardedURI: "/proxy/minion/minion1:10250/any/path/",
|
2014-09-04 19:28:47 +00:00
|
|
|
},
|
|
|
|
"abs but same host": {
|
2015-01-19 21:15:41 +00:00
|
|
|
input: `<script src="http://myminion.com/kubernetes.js"/>`,
|
|
|
|
sourceURL: "http://myminion.com/any/path/",
|
|
|
|
transport: testTransport,
|
|
|
|
output: `<script src="http://foo.com/proxy/minion/minion1:10250/kubernetes.js"/>`,
|
|
|
|
contentType: "text/html",
|
|
|
|
forwardedURI: "/proxy/minion/minion1:10250/any/path/",
|
2014-08-27 23:10:44 +00:00
|
|
|
},
|
2015-02-03 23:14:28 +00:00
|
|
|
"redirect rel": {
|
|
|
|
sourceURL: "http://myminion.com/redirect",
|
|
|
|
transport: testTransport,
|
|
|
|
redirect: "/redirected/target/",
|
|
|
|
redirectWant: "http://foo.com/proxy/minion/minion1:10250/redirected/target/",
|
|
|
|
forwardedURI: "/proxy/minion/minion1:10250/redirect",
|
|
|
|
},
|
|
|
|
"redirect abs same host": {
|
|
|
|
sourceURL: "http://myminion.com/redirect",
|
|
|
|
transport: testTransport,
|
|
|
|
redirect: "http://myminion.com/redirected/target/",
|
|
|
|
redirectWant: "http://foo.com/proxy/minion/minion1:10250/redirected/target/",
|
|
|
|
forwardedURI: "/proxy/minion/minion1:10250/redirect",
|
|
|
|
},
|
|
|
|
"redirect abs other host": {
|
|
|
|
sourceURL: "http://myminion.com/redirect",
|
|
|
|
transport: testTransport,
|
|
|
|
redirect: "http://example.com/redirected/target/",
|
|
|
|
redirectWant: "http://example.com/redirected/target/",
|
|
|
|
forwardedURI: "/proxy/minion/minion1:10250/redirect",
|
|
|
|
},
|
2014-08-27 23:10:44 +00:00
|
|
|
}
|
2014-09-04 19:28:47 +00:00
|
|
|
|
2015-02-03 23:14:28 +00:00
|
|
|
testItem := func(name string, item *Item) {
|
2014-09-04 19:28:47 +00:00
|
|
|
// Canonicalize the html so we can diff.
|
|
|
|
item.input = fmtHTML(item.input)
|
|
|
|
item.output = fmtHTML(item.output)
|
2015-01-15 07:01:49 +00:00
|
|
|
|
2015-01-19 21:15:41 +00:00
|
|
|
server := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
|
|
|
// Check request headers.
|
|
|
|
if got, want := r.Header.Get("X-Forwarded-Uri"), item.forwardedURI; got != want {
|
|
|
|
t.Errorf("%v: X-Forwarded-Uri = %q, want %q", name, got, want)
|
|
|
|
}
|
|
|
|
if got, want := r.Header.Get("X-Forwarded-Host"), item.transport.proxyHost; got != want {
|
|
|
|
t.Errorf("%v: X-Forwarded-Host = %q, want %q", name, got, want)
|
|
|
|
}
|
|
|
|
if got, want := r.Header.Get("X-Forwarded-Proto"), item.transport.proxyScheme; got != want {
|
|
|
|
t.Errorf("%v: X-Forwarded-Proto = %q, want %q", name, got, want)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Send response.
|
2015-02-03 23:14:28 +00:00
|
|
|
if item.redirect != "" {
|
|
|
|
http.Redirect(w, r, item.redirect, http.StatusMovedPermanently)
|
|
|
|
return
|
|
|
|
}
|
2015-01-15 07:01:49 +00:00
|
|
|
w.Header().Set("Content-Type", item.contentType)
|
|
|
|
fmt.Fprint(w, item.input)
|
|
|
|
}))
|
2015-02-03 23:14:28 +00:00
|
|
|
defer server.Close()
|
|
|
|
|
2015-01-15 07:01:49 +00:00
|
|
|
// Replace source URL with our test server address.
|
|
|
|
sourceURL := parseURLOrDie(item.sourceURL)
|
|
|
|
serverURL := parseURLOrDie(server.URL)
|
|
|
|
item.input = strings.Replace(item.input, sourceURL.Host, serverURL.Host, -1)
|
2015-02-03 23:14:28 +00:00
|
|
|
item.redirect = strings.Replace(item.redirect, sourceURL.Host, serverURL.Host, -1)
|
2015-01-15 07:01:49 +00:00
|
|
|
sourceURL.Host = serverURL.Host
|
|
|
|
|
|
|
|
req, err := http.NewRequest("GET", sourceURL.String(), nil)
|
|
|
|
if err != nil {
|
|
|
|
t.Errorf("%v: Unexpected error: %v", name, err)
|
2015-02-03 23:14:28 +00:00
|
|
|
return
|
2014-09-04 19:28:47 +00:00
|
|
|
}
|
2015-01-15 07:01:49 +00:00
|
|
|
resp, err := item.transport.RoundTrip(req)
|
2014-09-04 19:28:47 +00:00
|
|
|
if err != nil {
|
|
|
|
t.Errorf("%v: Unexpected error: %v", name, err)
|
2015-02-03 23:14:28 +00:00
|
|
|
return
|
|
|
|
}
|
|
|
|
if item.redirect != "" {
|
|
|
|
// Check that redirect URLs get rewritten properly.
|
|
|
|
if got, want := resp.Header.Get("Location"), item.redirectWant; got != want {
|
|
|
|
t.Errorf("%v: Location header = %q, want %q", name, got, want)
|
|
|
|
}
|
|
|
|
return
|
2014-09-04 19:28:47 +00:00
|
|
|
}
|
2015-01-15 07:01:49 +00:00
|
|
|
body, err := ioutil.ReadAll(resp.Body)
|
2014-09-04 19:28:47 +00:00
|
|
|
if err != nil {
|
|
|
|
t.Errorf("%v: Unexpected error: %v", name, err)
|
2015-02-03 23:14:28 +00:00
|
|
|
return
|
2014-09-04 19:28:47 +00:00
|
|
|
}
|
|
|
|
if e, a := item.output, string(body); e != a {
|
|
|
|
t.Errorf("%v: expected %v, but got %v", name, e, a)
|
|
|
|
}
|
2015-02-03 23:14:28 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
for name, item := range table {
|
|
|
|
testItem(name, &item)
|
2014-08-27 23:10:44 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestProxy(t *testing.T) {
|
|
|
|
table := []struct {
|
2014-12-16 23:38:48 +00:00
|
|
|
method string
|
|
|
|
path string
|
|
|
|
reqBody string
|
|
|
|
respBody string
|
|
|
|
respContentType string
|
|
|
|
reqNamespace string
|
2014-08-27 23:10:44 +00:00
|
|
|
}{
|
2014-12-16 23:38:48 +00:00
|
|
|
{"GET", "/some/dir", "", "answer", "text/css", "default"},
|
|
|
|
{"GET", "/some/dir", "", "<html><head></head><body>answer</body></html>", "text/html", "default"},
|
|
|
|
{"POST", "/some/other/dir", "question", "answer", "text/css", "default"},
|
|
|
|
{"PUT", "/some/dir/id", "different question", "answer", "text/css", "default"},
|
|
|
|
{"DELETE", "/some/dir/id", "", "ok", "text/css", "default"},
|
|
|
|
{"GET", "/some/dir/id", "", "answer", "text/css", "other"},
|
2015-01-15 05:42:34 +00:00
|
|
|
{"GET", "/trailing/slash/", "", "answer", "text/css", "default"},
|
2015-02-10 15:04:40 +00:00
|
|
|
{"GET", "/", "", "answer", "text/css", "default"},
|
2014-08-27 23:10:44 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
for _, item := range table {
|
|
|
|
proxyServer := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, req *http.Request) {
|
|
|
|
gotBody, err := ioutil.ReadAll(req.Body)
|
|
|
|
if err != nil {
|
|
|
|
t.Errorf("%v - unexpected error %v", item.method, err)
|
|
|
|
}
|
|
|
|
if e, a := item.reqBody, string(gotBody); e != a {
|
|
|
|
t.Errorf("%v - expected %v, got %v", item.method, e, a)
|
|
|
|
}
|
2014-12-11 18:59:51 +00:00
|
|
|
if e, a := item.path, req.URL.Path; e != a {
|
|
|
|
t.Errorf("%v - expected %v, got %v", item.method, e, a)
|
|
|
|
}
|
2014-12-16 23:38:48 +00:00
|
|
|
w.Header().Set("Content-Type", item.respContentType)
|
|
|
|
var out io.Writer = w
|
|
|
|
if strings.Contains(req.Header.Get("Accept-Encoding"), "gzip") {
|
|
|
|
// The proxier can ask for gzip'd data; we need to provide it with that
|
|
|
|
// in order to test our processing of that data.
|
|
|
|
w.Header().Set("Content-Encoding", "gzip")
|
|
|
|
gzw := gzip.NewWriter(w)
|
|
|
|
out = gzw
|
|
|
|
defer gzw.Close()
|
|
|
|
}
|
|
|
|
fmt.Fprint(out, item.respBody)
|
2014-08-27 23:10:44 +00:00
|
|
|
}))
|
2014-10-31 01:15:44 +00:00
|
|
|
defer proxyServer.Close()
|
2014-08-27 23:10:44 +00:00
|
|
|
|
|
|
|
simpleStorage := &SimpleRESTStorage{
|
2014-10-20 20:25:08 +00:00
|
|
|
errors: map[string]error{},
|
|
|
|
resourceLocation: proxyServer.URL,
|
|
|
|
expectedResourceNamespace: item.reqNamespace,
|
2014-08-27 23:10:44 +00:00
|
|
|
}
|
2015-01-31 00:08:59 +00:00
|
|
|
|
2015-03-04 20:57:05 +00:00
|
|
|
namespaceHandler := handleNamespaced(map[string]RESTStorage{"foo": simpleStorage})
|
2015-01-31 00:08:59 +00:00
|
|
|
namespaceServer := httptest.NewServer(namespaceHandler)
|
|
|
|
defer namespaceServer.Close()
|
2015-03-04 20:57:05 +00:00
|
|
|
legacyNamespaceHandler := handle(map[string]RESTStorage{"foo": simpleStorage})
|
2015-01-31 00:08:59 +00:00
|
|
|
legacyNamespaceServer := httptest.NewServer(legacyNamespaceHandler)
|
|
|
|
defer legacyNamespaceServer.Close()
|
2014-08-27 23:10:44 +00:00
|
|
|
|
2014-12-09 19:23:21 +00:00
|
|
|
// test each supported URL pattern for finding the redirection resource in the proxy in a particular namespace
|
2015-01-31 00:08:59 +00:00
|
|
|
serverPatterns := []struct {
|
|
|
|
server *httptest.Server
|
|
|
|
proxyTestPattern string
|
|
|
|
}{
|
2015-03-04 20:57:05 +00:00
|
|
|
{namespaceServer, "/api/version/proxy/namespaces/" + item.reqNamespace + "/foo/id" + item.path},
|
|
|
|
{legacyNamespaceServer, "/api/version/proxy/foo/id" + item.path + "?namespace=" + item.reqNamespace},
|
2014-08-27 23:10:44 +00:00
|
|
|
}
|
2015-01-31 00:08:59 +00:00
|
|
|
|
|
|
|
for _, serverPattern := range serverPatterns {
|
|
|
|
server := serverPattern.server
|
|
|
|
proxyTestPattern := serverPattern.proxyTestPattern
|
2014-12-09 19:23:21 +00:00
|
|
|
req, err := http.NewRequest(
|
|
|
|
item.method,
|
|
|
|
server.URL+proxyTestPattern,
|
|
|
|
strings.NewReader(item.reqBody),
|
|
|
|
)
|
|
|
|
if err != nil {
|
|
|
|
t.Errorf("%v - unexpected error %v", item.method, err)
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
resp, err := http.DefaultClient.Do(req)
|
|
|
|
if err != nil {
|
|
|
|
t.Errorf("%v - unexpected error %v", item.method, err)
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
gotResp, err := ioutil.ReadAll(resp.Body)
|
|
|
|
if err != nil {
|
|
|
|
t.Errorf("%v - unexpected error %v", item.method, err)
|
|
|
|
}
|
|
|
|
resp.Body.Close()
|
|
|
|
if e, a := item.respBody, string(gotResp); e != a {
|
2015-01-31 00:08:59 +00:00
|
|
|
t.Errorf("%v - expected %v, got %v. url: %#v", item.method, e, a, req.URL)
|
2014-12-09 19:23:21 +00:00
|
|
|
}
|
2014-08-27 23:10:44 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2015-01-08 20:41:38 +00:00
|
|
|
|
|
|
|
func TestProxyUpgrade(t *testing.T) {
|
|
|
|
backendServer := httptest.NewServer(websocket.Handler(func(ws *websocket.Conn) {
|
|
|
|
defer ws.Close()
|
|
|
|
body := make([]byte, 5)
|
|
|
|
ws.Read(body)
|
|
|
|
ws.Write([]byte("hello " + string(body)))
|
|
|
|
}))
|
|
|
|
defer backendServer.Close()
|
|
|
|
|
|
|
|
simpleStorage := &SimpleRESTStorage{
|
|
|
|
errors: map[string]error{},
|
|
|
|
resourceLocation: backendServer.URL,
|
|
|
|
expectedResourceNamespace: "myns",
|
|
|
|
}
|
|
|
|
|
2015-03-04 20:57:05 +00:00
|
|
|
namespaceHandler := handleNamespaced(map[string]RESTStorage{"foo": simpleStorage})
|
2015-01-08 20:41:38 +00:00
|
|
|
|
|
|
|
server := httptest.NewServer(namespaceHandler)
|
|
|
|
defer server.Close()
|
|
|
|
|
2015-03-04 20:57:05 +00:00
|
|
|
ws, err := websocket.Dial("ws://"+server.Listener.Addr().String()+"/api/version/proxy/namespaces/myns/foo/123", "", "http://127.0.0.1/")
|
2015-01-08 20:41:38 +00:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("websocket dial err: %s", err)
|
|
|
|
}
|
|
|
|
defer ws.Close()
|
|
|
|
|
|
|
|
if _, err := ws.Write([]byte("world")); err != nil {
|
|
|
|
t.Fatalf("write err: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
response := make([]byte, 20)
|
|
|
|
n, err := ws.Read(response)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("read err: %s", err)
|
|
|
|
}
|
|
|
|
if e, a := "hello world", string(response[0:n]); e != a {
|
|
|
|
t.Fatalf("expected '%#v', got '%#v'", e, a)
|
|
|
|
}
|
|
|
|
}
|