* configure.ac: Check whether ACLs are available on the host system. * gnulib.modules: Add acl * src/create.c (start_header): Store ACLs when creating a POSIX archive. (dump_file0): Handle ACLs. * src/extract.c (delayed_set_stat) <acls_a_ptr, acls_a_len> <acls_d_ptr, acls_d_len>: New members. (delayed_link): Likewise. (set_stat,delay_set_stat) (apply_nonancestor_delayed_set_stat): Set ACLs. * src/tar.c: New options: "--acls", "--no-acls" (tar_stat_destroy): Free acls_a_ptr and acls_d_ptr fields. * src/tar.h (tar_stat_info) <acls_a_ptr, acls_a_len> <acls_d_ptr, acls_d_len>: New members. * src/xattrs.c (xattrs_acls_get, xattrs_acls_set): New functions. * src/xheader.c: Support new keywors: "SCHILY.acl.access" and "SCHILY.acl.default". * tests/Makefile.am: Add new tests. * tests/testsuite.at: Likewise. * tests/acls01.at: New test. * tests/acls02.at: New test.
641 lines
17 KiB
C
641 lines
17 KiB
C
/* Support for extended attributes.
|
|
|
|
Copyright (C) 2006, 2007, 2008, 2009, 2010, 2011, 2012 Free Software
|
|
Foundation, Inc.
|
|
|
|
Written by James Antill, on 2006-07-27.
|
|
|
|
This program is free software; you can redistribute it and/or modify it
|
|
under the terms of the GNU General Public License as published by the
|
|
Free Software Foundation; either version 2, or (at your option) any later
|
|
version.
|
|
|
|
This program is distributed in the hope that it will be useful, but
|
|
WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General
|
|
Public License for more details.
|
|
|
|
You should have received a copy of the GNU General Public License along
|
|
with this program; if not, write to the Free Software Foundation, Inc.,
|
|
51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA. */
|
|
|
|
#include <config.h>
|
|
#include <system.h>
|
|
|
|
#include <fnmatch.h>
|
|
#include <quotearg.h>
|
|
|
|
#include "common.h"
|
|
|
|
#include "xattr-at.h"
|
|
|
|
struct xattrs_mask_map
|
|
{
|
|
const char **masks;
|
|
int size;
|
|
int used;
|
|
};
|
|
|
|
/* list of fnmatch patterns */
|
|
static struct
|
|
{
|
|
/* lists of fnmatch patterns */
|
|
struct xattrs_mask_map incl;
|
|
struct xattrs_mask_map excl;
|
|
} xattrs_setup;
|
|
|
|
/* disable posix acls when problem found in gnulib script m4/acl.m4 */
|
|
#if ! USE_ACL
|
|
# undef HAVE_POSIX_ACLS
|
|
#endif
|
|
|
|
#ifdef HAVE_POSIX_ACLS
|
|
# include "acl.h"
|
|
# include <sys/acl.h>
|
|
#endif
|
|
|
|
#ifdef HAVE_POSIX_ACLS
|
|
|
|
/* acl-at wrappers, TODO: move to gnulib in future? */
|
|
acl_t acl_get_file_at (int dirfd, const char *file, acl_type_t type);
|
|
int acl_set_file_at (int dirfd, const char *file, acl_type_t type, acl_t acl);
|
|
int file_has_acl_at (int dirfd, char const *, struct stat const *);
|
|
|
|
/* acl_get_file_at */
|
|
#define AT_FUNC_NAME acl_get_file_at
|
|
#define AT_FUNC_RESULT acl_t
|
|
#define AT_FUNC_FAIL (acl_t)NULL
|
|
#define AT_FUNC_F1 acl_get_file
|
|
#define AT_FUNC_POST_FILE_PARAM_DECLS , acl_type_t type
|
|
#define AT_FUNC_POST_FILE_ARGS , type
|
|
#include "at-func.c"
|
|
#undef AT_FUNC_NAME
|
|
#undef AT_FUNC_F1
|
|
#undef AT_FUNC_RESULT
|
|
#undef AT_FUNC_FAIL
|
|
#undef AT_FUNC_POST_FILE_PARAM_DECLS
|
|
#undef AT_FUNC_POST_FILE_ARGS
|
|
|
|
/* acl_set_file_at */
|
|
#define AT_FUNC_NAME acl_set_file_at
|
|
#define AT_FUNC_F1 acl_set_file
|
|
#define AT_FUNC_POST_FILE_PARAM_DECLS , acl_type_t type, acl_t acl
|
|
#define AT_FUNC_POST_FILE_ARGS , type, acl
|
|
#include "at-func.c"
|
|
#undef AT_FUNC_NAME
|
|
#undef AT_FUNC_F1
|
|
#undef AT_FUNC_POST_FILE_PARAM_DECLS
|
|
#undef AT_FUNC_POST_FILE_ARGS
|
|
|
|
/* gnulib file_has_acl_at */
|
|
#define AT_FUNC_NAME file_has_acl_at
|
|
#define AT_FUNC_F1 file_has_acl
|
|
#define AT_FUNC_POST_FILE_PARAM_DECLS , struct stat const *st
|
|
#define AT_FUNC_POST_FILE_ARGS , st
|
|
#include "at-func.c"
|
|
#undef AT_FUNC_NAME
|
|
#undef AT_FUNC_F1
|
|
#undef AT_FUNC_POST_FILE_PARAM_DECLS
|
|
#undef AT_FUNC_POST_FILE_ARGS
|
|
|
|
/* convert unix permissions into an ACL ... needed due to "default" ACLs */
|
|
static acl_t perms2acl (int perms)
|
|
{
|
|
char val[] = "user::---,group::---,other::---";
|
|
/* 0123456789 123456789 123456789 123456789 */
|
|
|
|
/* user */
|
|
if (perms & 0400) val[ 6] = 'r';
|
|
if (perms & 0200) val[ 7] = 'w';
|
|
if (perms & 0100) val[ 8] = 'x';
|
|
|
|
/* group */
|
|
if (perms & 0040) val[17] = 'r';
|
|
if (perms & 0020) val[18] = 'w';
|
|
if (perms & 0010) val[19] = 'x';
|
|
|
|
/* other */
|
|
if (perms & 0004) val[28] = 'r';
|
|
if (perms & 0002) val[29] = 'w';
|
|
if (perms & 0001) val[30] = 'x';
|
|
|
|
return (acl_from_text (val));
|
|
}
|
|
|
|
static char *skip_to_ext_fields (char *ptr)
|
|
{
|
|
ptr += strcspn (ptr, ":,\n"); /* skip tag name. Ie. user/group/default/mask */
|
|
|
|
if (*ptr != ':')
|
|
return (ptr); /* error? no user/group field */
|
|
++ptr;
|
|
|
|
ptr += strcspn (ptr, ":,\n"); /* skip user/group name */
|
|
|
|
if (*ptr != ':')
|
|
return (ptr); /* error? no perms field */
|
|
++ptr;
|
|
|
|
ptr += strcspn (ptr, ":,\n"); /* skip perms */
|
|
|
|
if (*ptr != ':')
|
|
return (ptr); /* no extra fields */
|
|
|
|
return (ptr);
|
|
}
|
|
|
|
/* The POSIX draft allows extra fields after the three main ones. Star
|
|
uses this to add a fourth field for user/group which is the numeric ID.
|
|
We just skip all extra fields atm. */
|
|
static const char *fixup_extra_acl_fields (const char *ptr)
|
|
{
|
|
char *src = (char *)ptr;
|
|
char *dst = (char *)ptr;
|
|
|
|
while (*src)
|
|
{
|
|
const char *old = src;
|
|
size_t len = 0;
|
|
|
|
src = skip_to_ext_fields (src);
|
|
len = src - old;
|
|
if (old != dst) memmove (dst, old, len);
|
|
dst += len;
|
|
|
|
if (*src == ':') /* We have extra fields, skip them all */
|
|
src += strcspn (src, "\n,");
|
|
|
|
if ((*src == '\n') || (*src == ','))
|
|
*dst++ = *src++; /* also done when dst == src, but that's ok */
|
|
}
|
|
if (src != dst)
|
|
*dst = 0;
|
|
|
|
return ptr;
|
|
}
|
|
|
|
static void xattrs__acls_set (struct tar_stat_info const *st,
|
|
char const *file_name, int type,
|
|
const char *ptr, size_t len, bool def)
|
|
{ /* "system.posix_acl_access" */
|
|
acl_t acl;
|
|
|
|
if (ptr)
|
|
{
|
|
/* assert (strlen (ptr) == len); */
|
|
ptr = fixup_extra_acl_fields (ptr);
|
|
|
|
acl = acl_from_text (ptr);
|
|
acls_option = 1;
|
|
}
|
|
else if (acls_option > 0)
|
|
acl = perms2acl (st->stat.st_mode);
|
|
else
|
|
return; /* don't call acl functions unless we first hit an ACL, or
|
|
--acls was passed explicitly */
|
|
|
|
if (acl == (acl_t)NULL)
|
|
{
|
|
call_arg_warn ("acl_from_text", file_name);
|
|
return;
|
|
}
|
|
|
|
if (acl_set_file_at (chdir_fd, file_name, type, acl) == -1)
|
|
/* warn even if filesystem does not support acls */
|
|
WARNOPT (WARN_XATTR_WRITE, (0, errno,
|
|
_("acl_set_file_at: Cannot set POSIX ACLs for file '%s'"), file_name));
|
|
|
|
acl_free (acl);
|
|
}
|
|
|
|
static void xattrs__acls_get_a (int parentfd, const char *file_name,
|
|
struct tar_stat_info *st,
|
|
char **ret_ptr, size_t *ret_len)
|
|
{ /* "system.posix_acl_access" */
|
|
char *val = NULL;
|
|
ssize_t len;
|
|
acl_t acl;
|
|
|
|
if ((acl = acl_get_file_at (parentfd, file_name, ACL_TYPE_ACCESS))
|
|
== (acl_t)NULL)
|
|
{
|
|
if (errno != ENOTSUP)
|
|
call_arg_warn ("acl_get_file_at", file_name);
|
|
return;
|
|
}
|
|
|
|
val = acl_to_text (acl, &len);
|
|
acl_free (acl);
|
|
|
|
if (val == NULL)
|
|
{
|
|
call_arg_warn ("acl_to_text", file_name);
|
|
return;
|
|
}
|
|
|
|
*ret_ptr = xstrdup (val);
|
|
*ret_len = len;
|
|
|
|
acl_free (val);
|
|
}
|
|
|
|
static void xattrs__acls_get_d (int parentfd, char const *file_name,
|
|
struct tar_stat_info *st,
|
|
char **ret_ptr, size_t *ret_len)
|
|
{ /* "system.posix_acl_default" */
|
|
char *val = NULL;
|
|
ssize_t len;
|
|
acl_t acl;
|
|
|
|
if ((acl = acl_get_file_at (parentfd, file_name, ACL_TYPE_DEFAULT))
|
|
== (acl_t)NULL)
|
|
{
|
|
if (errno != ENOTSUP)
|
|
call_arg_warn ("acl_get_file_at", file_name);
|
|
return;
|
|
}
|
|
|
|
val = acl_to_text (acl, &len);
|
|
acl_free (acl);
|
|
|
|
if (val == NULL)
|
|
{
|
|
call_arg_warn ("acl_to_text", file_name);
|
|
return;
|
|
}
|
|
|
|
*ret_ptr = xstrdup (val);
|
|
*ret_len = len;
|
|
|
|
acl_free (val);
|
|
}
|
|
#endif /* HAVE_POSIX_ACLS */
|
|
|
|
static void acls_one_line (const char *prefix, char delim,
|
|
const char *aclstring, size_t len)
|
|
{
|
|
/* support both long and short text representation of posix acls */
|
|
struct obstack stk;
|
|
obstack_init (&stk);
|
|
int pref_len = strlen (prefix);
|
|
const char *oldstring = aclstring;
|
|
|
|
if (!aclstring || !len)
|
|
return;
|
|
|
|
int pos = 0;
|
|
while (pos <= len)
|
|
{
|
|
int move = strcspn (aclstring, ",\n");
|
|
if (!move)
|
|
break;
|
|
|
|
if (oldstring != aclstring)
|
|
obstack_1grow (&stk, delim);
|
|
|
|
obstack_grow (&stk, prefix, pref_len);
|
|
obstack_grow (&stk, aclstring, move);
|
|
|
|
aclstring += move + 1;
|
|
}
|
|
|
|
obstack_1grow (&stk, '\0');
|
|
const char *toprint = obstack_finish (&stk);
|
|
|
|
fprintf (stdlis, "%s", toprint);
|
|
|
|
obstack_free (&stk, NULL);
|
|
}
|
|
|
|
void xattrs_acls_get (int parentfd, char const *file_name,
|
|
struct tar_stat_info *st, int fd, int xisfile)
|
|
{
|
|
if (acls_option > 0)
|
|
{
|
|
#ifndef HAVE_POSIX_ACLS
|
|
static int done = 0;
|
|
if (!done)
|
|
WARN ((0, 0, _("POSIX ACL support is not available")));
|
|
done = 1;
|
|
#else
|
|
int err = file_has_acl_at (parentfd, file_name, &st->stat);
|
|
if (err == 0)
|
|
return;
|
|
if (err == -1)
|
|
{
|
|
call_arg_warn ("file_has_acl_at", file_name);
|
|
return;
|
|
}
|
|
|
|
xattrs__acls_get_a (parentfd, file_name, st,
|
|
&st->acls_a_ptr, &st->acls_a_len);
|
|
if (!xisfile)
|
|
xattrs__acls_get_d (parentfd, file_name, st,
|
|
&st->acls_d_ptr, &st->acls_d_len);
|
|
#endif
|
|
}
|
|
}
|
|
|
|
void xattrs_acls_set (struct tar_stat_info const *st,
|
|
char const *file_name, char typeflag)
|
|
{
|
|
if ((acls_option > 0) && (typeflag != SYMTYPE))
|
|
{
|
|
#ifndef HAVE_POSIX_ACLS
|
|
static int done = 0;
|
|
if (!done)
|
|
WARN ((0, 0, _("POSIX ACL support is not available")));
|
|
done = 1;
|
|
#else
|
|
xattrs__acls_set (st, file_name, ACL_TYPE_ACCESS,
|
|
st->acls_a_ptr, st->acls_a_len, false);
|
|
if ((typeflag == DIRTYPE) || (typeflag == GNUTYPE_DUMPDIR))
|
|
xattrs__acls_set (st, file_name, ACL_TYPE_DEFAULT,
|
|
st->acls_d_ptr, st->acls_d_len, true);
|
|
#endif
|
|
}
|
|
}
|
|
|
|
static void mask_map_realloc (struct xattrs_mask_map *map)
|
|
{
|
|
if (map->size == 0)
|
|
{
|
|
map->size = 4;
|
|
map->masks = xmalloc (16 * sizeof (char *));
|
|
return;
|
|
}
|
|
|
|
if (map->size <= map->used)
|
|
{
|
|
map->size *= 2;
|
|
map->masks = xrealloc (map->masks, map->size * sizeof (char *));
|
|
return;
|
|
}
|
|
}
|
|
|
|
void xattrs_mask_add (const char *mask, bool incl)
|
|
{
|
|
struct xattrs_mask_map *mask_map = incl ? &xattrs_setup.incl
|
|
: &xattrs_setup.excl;
|
|
/* ensure there is enough space */
|
|
mask_map_realloc (mask_map);
|
|
/* just assign pointers -- we silently expect that pointer "mask" is valid
|
|
through the whole program (pointer to argv array) */
|
|
mask_map->masks[mask_map->used++] = mask;
|
|
}
|
|
|
|
static void clear_mask_map (struct xattrs_mask_map *mask_map)
|
|
{
|
|
if (mask_map->size)
|
|
free (mask_map->masks);
|
|
}
|
|
|
|
void xattrs_clear_setup ()
|
|
{
|
|
clear_mask_map (&xattrs_setup.incl);
|
|
clear_mask_map (&xattrs_setup.excl);
|
|
}
|
|
|
|
/* get all xattrs from file given by FILE_NAME or FD (when non-zero). This
|
|
includes all the user.*, security.*, system.*, etc. available domains */
|
|
void xattrs_xattrs_get (int parentfd, char const *file_name,
|
|
struct tar_stat_info *st, int fd)
|
|
{
|
|
if (xattrs_option > 0)
|
|
{
|
|
#ifndef HAVE_XATTRS
|
|
static int done = 0;
|
|
if (!done)
|
|
WARN ((0, 0, _("XATTR support is not available")));
|
|
done = 1;
|
|
#else
|
|
static ssize_t xsz = 1024;
|
|
static char *xatrs = NULL;
|
|
ssize_t xret = -1;
|
|
|
|
if (!xatrs) xatrs = xmalloc (xsz);
|
|
|
|
while (((fd == 0) ?
|
|
((xret = llistxattrat (parentfd, file_name, xatrs, xsz)) == -1) :
|
|
((xret = flistxattr (fd, xatrs, xsz)) == -1)) &&
|
|
(errno == ERANGE))
|
|
{
|
|
xsz <<= 1;
|
|
xatrs = xrealloc (xatrs, xsz);
|
|
}
|
|
|
|
if (xret == -1)
|
|
call_arg_warn ((fd == 0) ? "llistxattrat" : "flistxattr", file_name);
|
|
else
|
|
{
|
|
const char *attr = xatrs;
|
|
static ssize_t asz = 1024;
|
|
static char *val = NULL;
|
|
|
|
if (!val) val = xmalloc (asz);
|
|
|
|
while (xret > 0)
|
|
{
|
|
size_t len = strlen (attr);
|
|
ssize_t aret = 0;
|
|
|
|
/* Archive all xattrs during creation, decide at extraction time
|
|
* which ones are of interest/use for the target filesystem. */
|
|
while (((fd == 0)
|
|
? ((aret = lgetxattrat (parentfd, file_name, attr,
|
|
val, asz)) == -1)
|
|
: ((aret = fgetxattr (fd, attr, val, asz)) == -1))
|
|
&& (errno == ERANGE))
|
|
{
|
|
asz <<= 1;
|
|
val = xrealloc (val, asz);
|
|
}
|
|
|
|
if (aret != -1)
|
|
xheader_xattr_add (st, attr, val, aret);
|
|
else if (errno != ENOATTR)
|
|
call_arg_warn ((fd == 0) ? "lgetxattrat"
|
|
: "fgetxattr", file_name);
|
|
|
|
attr += len + 1;
|
|
xret -= len + 1;
|
|
}
|
|
}
|
|
#endif
|
|
}
|
|
}
|
|
|
|
static void xattrs__fd_set (struct tar_stat_info const *st,
|
|
char const *file_name, char typeflag,
|
|
const char *attr,
|
|
const char *ptr, size_t len)
|
|
{
|
|
if (ptr)
|
|
{
|
|
const char *sysname = "setxattrat";
|
|
int ret = -1;
|
|
|
|
if (typeflag != SYMTYPE)
|
|
ret = setxattrat (chdir_fd, file_name, attr, ptr, len, 0);
|
|
else
|
|
{
|
|
sysname = "lsetxattr";
|
|
ret = lsetxattrat (chdir_fd, file_name, attr, ptr, len, 0);
|
|
}
|
|
|
|
if (ret == -1)
|
|
WARNOPT (WARN_XATTR_WRITE, (0, errno,
|
|
_("%s: Cannot set '%s' extended attribute for file '%s'"),
|
|
sysname, attr, file_name));
|
|
}
|
|
}
|
|
|
|
static bool xattrs_matches_mask (const char *kw, struct xattrs_mask_map *mm)
|
|
{
|
|
int i;
|
|
|
|
if (!mm->size)
|
|
return false;
|
|
|
|
for (i = 0; i < mm->used; i++)
|
|
if (fnmatch (mm->masks[i], kw, 0) == 0)
|
|
return true;
|
|
|
|
return false;
|
|
}
|
|
|
|
static bool xattrs_kw_included (const char *kw, bool archiving)
|
|
{
|
|
if (xattrs_setup.incl.size)
|
|
return xattrs_matches_mask (kw, &xattrs_setup.incl);
|
|
else
|
|
{
|
|
if (archiving)
|
|
return true;
|
|
else
|
|
return strncmp (kw, "user.", strlen ("user.")) == 0;
|
|
}
|
|
}
|
|
|
|
static bool xattrs_kw_excluded (const char *kw, bool archiving)
|
|
{
|
|
if (!xattrs_setup.excl.size)
|
|
return false;
|
|
|
|
return xattrs_matches_mask (kw, &xattrs_setup.excl);
|
|
}
|
|
|
|
/* Check whether the xattr with keyword KW should be discarded from list of
|
|
attributes that are going to be archived/excluded (set ARCHIVING=true for
|
|
archiving, false for excluding) */
|
|
static bool xattrs_masked_out (const char *kw, bool archiving)
|
|
{
|
|
if (!xattrs_kw_included (kw, archiving))
|
|
return true;
|
|
|
|
return xattrs_kw_excluded (kw, archiving);
|
|
}
|
|
|
|
void xattrs_xattrs_set (struct tar_stat_info const *st,
|
|
char const *file_name, char typeflag,
|
|
int later_run)
|
|
{
|
|
if (xattrs_option > 0)
|
|
{
|
|
#ifndef HAVE_XATTRS
|
|
static int done = 0;
|
|
if (!done)
|
|
WARN ((0, 0, _("XATTR support is not available")));
|
|
done = 1;
|
|
#else
|
|
size_t scan = 0;
|
|
|
|
if (!st->xattr_map_size)
|
|
return;
|
|
|
|
for (; scan < st->xattr_map_size; ++scan)
|
|
{
|
|
char *keyword = st->xattr_map[scan].xkey;
|
|
keyword += strlen ("SCHILY.xattr.");
|
|
|
|
/* TODO: this 'later_run' workaround is temporary solution -> once
|
|
capabilities should become fully supported by it's API and there
|
|
should exist something like xattrs_capabilities_set() call.
|
|
For a regular files: all extended attributes are restored during
|
|
the first run except 'security.capability' which is restored in
|
|
'later_run == 1'. */
|
|
if (typeflag == REGTYPE
|
|
&& later_run == !!strcmp (keyword, "security.capability"))
|
|
continue;
|
|
|
|
if (xattrs_masked_out (keyword, false /* extracting */ ))
|
|
/* we don't want to restore this keyword */
|
|
continue;
|
|
|
|
xattrs__fd_set (st, file_name, typeflag, keyword,
|
|
st->xattr_map[scan].xval_ptr,
|
|
st->xattr_map[scan].xval_len);
|
|
}
|
|
#endif
|
|
}
|
|
}
|
|
|
|
void xattrs_print_char (struct tar_stat_info const *st, char *output)
|
|
{
|
|
int i;
|
|
if (verbose_option < 2)
|
|
{
|
|
*output = 0;
|
|
return;
|
|
}
|
|
|
|
if (xattrs_option > 0 || acls_option > 0)
|
|
{
|
|
/* placeholders */
|
|
*output = ' ';
|
|
*(output + 1) = 0;
|
|
}
|
|
|
|
if (xattrs_option > 0 && st->xattr_map_size)
|
|
for (i = 0; i < st->xattr_map_size; ++i)
|
|
{
|
|
char *keyword = st->xattr_map[i].xkey + strlen ("SCHILY.xattr.");
|
|
if (xattrs_masked_out (keyword, false /* like extracting */ ))
|
|
continue;
|
|
*output = '*';
|
|
break;
|
|
}
|
|
|
|
if (acls_option && (st->acls_a_len || st->acls_d_len))
|
|
*output = '+';
|
|
}
|
|
|
|
void xattrs_print (struct tar_stat_info const *st)
|
|
{
|
|
if (verbose_option < 3)
|
|
return;
|
|
|
|
/* acls */
|
|
if (acls_option && (st->acls_a_len || st->acls_d_len))
|
|
{
|
|
fprintf (stdlis, " a: ");
|
|
acls_one_line ("", ',', st->acls_a_ptr, st->acls_a_len);
|
|
acls_one_line ("default:", ',', st->acls_d_ptr, st->acls_d_len);
|
|
fprintf (stdlis, "\n");
|
|
}
|
|
|
|
/* xattrs */
|
|
if (xattrs_option && st->xattr_map_size)
|
|
{
|
|
int i;
|
|
for (i = 0; i < st->xattr_map_size; ++i)
|
|
{
|
|
char *keyword = st->xattr_map[i].xkey + strlen ("SCHILY.xattr.");
|
|
if (xattrs_masked_out (keyword, false /* like extracting */ ))
|
|
continue;
|
|
fprintf (stdlis, " x: %lu %s\n",
|
|
(unsigned long) st->xattr_map[i].xval_len, keyword);
|
|
}
|
|
}
|
|
}
|