|
1
|
1 |
|
import base64 |
|
2
|
1 |
|
import binascii |
|
3
|
1 |
|
import concurrent |
|
4
|
1 |
|
import json |
|
5
|
1 |
|
import logging |
|
6
|
1 |
|
import tornado.web |
|
7
|
1 |
|
from tabpy.tabpy_server.app.app_parameters import SettingsParameters |
|
8
|
1 |
|
from tabpy.tabpy_server.handlers.util import hash_password |
|
9
|
1 |
|
from tabpy.tabpy_server.handlers.util import AuthErrorStates |
|
10
|
1 |
|
import uuid |
|
11
|
|
|
|
|
12
|
|
|
|
|
13
|
1 |
|
STAGING_THREAD = concurrent.futures.ThreadPoolExecutor(max_workers=3) |
|
14
|
|
|
|
|
15
|
|
|
|
|
16
|
1 |
|
class ContextLoggerWrapper: |
|
17
|
|
|
""" |
|
18
|
|
|
This class appends request context to logged messages. |
|
19
|
|
|
""" |
|
20
|
|
|
|
|
21
|
1 |
|
@staticmethod |
|
22
|
|
|
def _generate_call_id(): |
|
23
|
1 |
|
return str(uuid.uuid4()) |
|
24
|
|
|
|
|
25
|
1 |
|
def __init__(self, request: tornado.httputil.HTTPServerRequest): |
|
26
|
1 |
|
self.call_id = self._generate_call_id() |
|
27
|
1 |
|
self.set_request(request) |
|
28
|
|
|
|
|
29
|
1 |
|
self.tabpy_username = None |
|
30
|
1 |
|
self.log_request_context = False |
|
31
|
1 |
|
self.request_context_logged = False |
|
32
|
|
|
|
|
33
|
1 |
|
def set_request(self, request: tornado.httputil.HTTPServerRequest): |
|
34
|
|
|
""" |
|
35
|
|
|
Set HTTP(S) request for logger. Headers will be used to |
|
36
|
|
|
append request data as client information, Tableau user name, etc. |
|
37
|
|
|
""" |
|
38
|
1 |
|
self.remote_ip = request.remote_ip |
|
39
|
1 |
|
self.method = request.method |
|
40
|
1 |
|
self.url = request.full_url() |
|
41
|
|
|
|
|
42
|
1 |
|
self.client = request.headers.get("TabPy-Client", None) |
|
43
|
1 |
|
self.tableau_username = request.headers.get("TabPy-User", None) |
|
44
|
|
|
|
|
45
|
1 |
|
def set_tabpy_username(self, tabpy_username: str): |
|
46
|
1 |
|
self.tabpy_username = tabpy_username |
|
47
|
|
|
|
|
48
|
1 |
|
def enable_context_logging(self, enable: bool): |
|
49
|
|
|
""" |
|
50
|
|
|
Enable/disable request context information logging. |
|
51
|
|
|
|
|
52
|
|
|
Parameters |
|
53
|
|
|
---------- |
|
54
|
|
|
enable: bool |
|
55
|
|
|
If True request context information will be logged and |
|
56
|
|
|
every log entry for a request handler will have call ID |
|
57
|
|
|
with it. |
|
58
|
|
|
""" |
|
59
|
1 |
|
self.log_request_context = enable |
|
60
|
|
|
|
|
61
|
1 |
|
def _log_context_info(self): |
|
62
|
|
|
if not self.log_request_context: |
|
63
|
|
|
return |
|
64
|
|
|
|
|
65
|
|
|
context = f"Call ID: {self.call_id}" |
|
66
|
|
|
|
|
67
|
|
|
if self.remote_ip is not None: |
|
68
|
|
|
context += f", Caller: {self.remote_ip}" |
|
69
|
|
|
|
|
70
|
|
|
if self.method is not None: |
|
71
|
|
|
context += f", Method: {self.method}" |
|
72
|
|
|
|
|
73
|
|
|
if self.url is not None: |
|
74
|
|
|
context += f", URL: {self.url}" |
|
75
|
|
|
|
|
76
|
|
|
if self.client is not None: |
|
77
|
|
|
context += f", Client: {self.client}" |
|
78
|
|
|
|
|
79
|
|
|
if self.tableau_username is not None: |
|
80
|
|
|
context += f", Tableau user: {self.tableau_username}" |
|
81
|
|
|
|
|
82
|
|
|
if self.tabpy_username is not None: |
|
83
|
|
|
context += f", TabPy user: {self.tabpy_username}" |
|
84
|
|
|
|
|
85
|
|
|
logging.getLogger(__name__).log(logging.INFO, context) |
|
86
|
|
|
self.request_context_logged = True |
|
87
|
|
|
|
|
88
|
1 |
|
def log(self, level: int, msg: str): |
|
89
|
|
|
""" |
|
90
|
|
|
Log message with or without call ID. If call context is logged and |
|
91
|
|
|
call ID added to any log entry is specified by if context logging |
|
92
|
|
|
is enabled (see CallContext.enable_context_logging for more details). |
|
93
|
|
|
|
|
94
|
|
|
Parameters |
|
95
|
|
|
---------- |
|
96
|
|
|
level: int |
|
97
|
|
|
Log level: logging.CRITICAL, ERROR, WARNING, INFO, DEBUG, NOTSET. |
|
98
|
|
|
|
|
99
|
|
|
msg: str |
|
100
|
|
|
Message format string. |
|
101
|
|
|
|
|
102
|
|
|
args |
|
103
|
|
|
Same as args in Logger.debug(). |
|
104
|
|
|
|
|
105
|
|
|
kwargs |
|
106
|
|
|
Same as kwargs in Logger.debug(). |
|
107
|
|
|
""" |
|
108
|
1 |
|
extended_msg = msg |
|
109
|
1 |
|
if self.log_request_context: |
|
110
|
|
|
if not self.request_context_logged: |
|
111
|
|
|
self._log_context_info() |
|
112
|
|
|
|
|
113
|
|
|
extended_msg += f", <<call ID: {self.call_id}>>" |
|
114
|
|
|
|
|
115
|
1 |
|
logging.getLogger(__name__).log(level, extended_msg) |
|
116
|
|
|
|
|
117
|
|
|
|
|
118
|
1 |
|
class BaseHandler(tornado.web.RequestHandler): |
|
119
|
1 |
|
def initialize(self, app): |
|
120
|
1 |
|
self.tabpy_state = app.tabpy_state |
|
121
|
|
|
# set content type to application/json |
|
122
|
1 |
|
self.set_header("Content-Type", "application/json") |
|
123
|
1 |
|
self.protocol = self.settings[SettingsParameters.TransferProtocol] |
|
124
|
1 |
|
self.port = self.settings[SettingsParameters.Port] |
|
125
|
1 |
|
self.python_service = app.python_service |
|
126
|
1 |
|
self.credentials = app.credentials |
|
127
|
1 |
|
self.username = None |
|
128
|
1 |
|
self.password = None |
|
129
|
1 |
|
self.eval_timeout = self.settings[SettingsParameters.EvaluateTimeout] |
|
130
|
1 |
|
self.max_request_size = app.max_request_size |
|
131
|
|
|
|
|
132
|
1 |
|
self.logger = ContextLoggerWrapper(self.request) |
|
133
|
1 |
|
self.logger.enable_context_logging( |
|
134
|
|
|
app.settings[SettingsParameters.LogRequestContext] |
|
135
|
|
|
) |
|
136
|
1 |
|
self.logger.log(logging.DEBUG, "Checking if need to handle authentication") |
|
137
|
1 |
|
self.auth_error = self.handle_authentication("v1") |
|
138
|
|
|
|
|
139
|
1 |
|
def error_out(self, code, log_message, info=None): |
|
140
|
1 |
|
self.set_status(code) |
|
141
|
1 |
|
self.write(json.dumps({"message": log_message, "info": info or {}})) |
|
142
|
|
|
|
|
143
|
1 |
|
self.logger.log( |
|
144
|
|
|
logging.ERROR, |
|
145
|
|
|
'Responding with status={}, message="{}", info="{}"'.format( |
|
146
|
|
|
code, log_message, info |
|
147
|
|
|
), |
|
148
|
|
|
) |
|
149
|
|
|
|
|
150
|
1 |
|
def options(self): |
|
151
|
|
|
# add CORS headers if TabPy has a cors_origin specified |
|
152
|
|
|
self._add_CORS_header() |
|
153
|
|
|
self.write({}) |
|
154
|
|
|
|
|
155
|
1 |
|
def _add_CORS_header(self): |
|
156
|
|
|
""" |
|
157
|
|
|
Add CORS header if the TabPy has attribute _cors_origin |
|
158
|
|
|
and _cors_origin is not an empty string. |
|
159
|
|
|
""" |
|
160
|
1 |
|
origin = self.tabpy_state.get_access_control_allow_origin() |
|
161
|
1 |
|
if len(origin) > 0: |
|
162
|
|
|
self.set_header("Access-Control-Allow-Origin", origin) |
|
163
|
|
|
self.logger.log(logging.DEBUG, f"Access-Control-Allow-Origin:{origin}") |
|
164
|
|
|
|
|
165
|
1 |
|
headers = self.tabpy_state.get_access_control_allow_headers() |
|
166
|
1 |
|
if len(headers) > 0: |
|
167
|
|
|
self.set_header("Access-Control-Allow-Headers", headers) |
|
168
|
|
|
self.logger.log(logging.DEBUG, f"Access-Control-Allow-Headers:{headers}") |
|
169
|
|
|
|
|
170
|
1 |
|
methods = self.tabpy_state.get_access_control_allow_methods() |
|
171
|
1 |
|
if len(methods) > 0: |
|
172
|
|
|
self.set_header("Access-Control-Allow-Methods", methods) |
|
173
|
|
|
self.logger.log(logging.DEBUG, f"Access-Control-Allow-Methods:{methods}") |
|
174
|
|
|
|
|
175
|
1 |
|
def _get_auth_method(self, api_version) -> (bool, str): |
|
176
|
|
|
""" |
|
177
|
|
|
Finds authentication method if provided. |
|
178
|
|
|
|
|
179
|
|
|
Parameters |
|
180
|
|
|
---------- |
|
181
|
|
|
api_version : str |
|
182
|
|
|
API version for authentication. |
|
183
|
|
|
|
|
184
|
|
|
Returns |
|
185
|
|
|
------- |
|
186
|
|
|
bool |
|
187
|
|
|
True if known authentication method is found. |
|
188
|
|
|
False otherwise. |
|
189
|
|
|
|
|
190
|
|
|
str |
|
191
|
|
|
Name of authentication method used by client. |
|
192
|
|
|
If empty no authentication required. |
|
193
|
|
|
|
|
194
|
|
|
(True, '') as result of this function means authentication |
|
195
|
|
|
is not needed. |
|
196
|
|
|
""" |
|
197
|
1 |
|
if api_version not in self.settings[SettingsParameters.ApiVersions]: |
|
198
|
|
|
self.logger.log(logging.CRITICAL, f'Unknown API version "{api_version}"') |
|
199
|
|
|
return False, "" |
|
200
|
|
|
|
|
201
|
1 |
|
version_settings = self.settings[SettingsParameters.ApiVersions][api_version] |
|
202
|
1 |
|
if "features" not in version_settings: |
|
203
|
|
|
self.logger.log( |
|
204
|
|
|
logging.INFO, f'No features configured for API "{api_version}"' |
|
205
|
|
|
) |
|
206
|
|
|
return True, "" |
|
207
|
|
|
|
|
208
|
1 |
|
features = version_settings["features"] |
|
209
|
1 |
|
if ( |
|
210
|
|
|
"authentication" not in features |
|
211
|
|
|
or not features["authentication"]["required"] |
|
212
|
|
|
): |
|
213
|
1 |
|
self.logger.log( |
|
214
|
|
|
logging.INFO, |
|
215
|
|
|
"Authentication is not a required feature for API " f'"{api_version}"', |
|
216
|
|
|
) |
|
217
|
1 |
|
return True, "" |
|
218
|
|
|
|
|
219
|
1 |
|
auth_feature = features["authentication"] |
|
220
|
1 |
|
if "methods" not in auth_feature: |
|
221
|
|
|
self.logger.log( |
|
222
|
|
|
logging.INFO, |
|
223
|
|
|
"Authentication method is not configured for API " f'"{api_version}"', |
|
224
|
|
|
) |
|
225
|
|
|
|
|
226
|
1 |
|
methods = auth_feature["methods"] |
|
227
|
1 |
|
if "basic-auth" in auth_feature["methods"]: |
|
228
|
1 |
|
return True, "basic-auth" |
|
229
|
|
|
# Add new methods here... |
|
230
|
|
|
|
|
231
|
|
|
# No known methods were found |
|
232
|
|
|
self.logger.log( |
|
233
|
|
|
logging.CRITICAL, |
|
234
|
|
|
f'Unknown authentication method(s) "{methods}" are configured ' |
|
235
|
|
|
f'for API "{api_version}"', |
|
236
|
|
|
) |
|
237
|
|
|
return False, "" |
|
238
|
|
|
|
|
239
|
1 |
|
def _get_basic_auth_credentials(self) -> bool: |
|
240
|
|
|
""" |
|
241
|
|
|
Find credentials for basic access authentication method. Credentials if |
|
242
|
|
|
found stored in Credentials.username and Credentials.password. |
|
243
|
|
|
|
|
244
|
|
|
Returns |
|
245
|
|
|
------- |
|
246
|
|
|
bool |
|
247
|
|
|
True if valid credentials were found. |
|
248
|
|
|
False otherwise. |
|
249
|
|
|
""" |
|
250
|
1 |
|
self.logger.log( |
|
251
|
|
|
logging.DEBUG, "Checking request headers for authentication data" |
|
252
|
|
|
) |
|
253
|
1 |
|
if "Authorization" not in self.request.headers: |
|
254
|
1 |
|
self.logger.log(logging.INFO, "Authorization header not found") |
|
255
|
1 |
|
return False |
|
256
|
|
|
|
|
257
|
1 |
|
auth_header = self.request.headers["Authorization"] |
|
258
|
1 |
|
auth_header_list = auth_header.split(" ") |
|
259
|
1 |
|
if len(auth_header_list) != 2 or auth_header_list[0] != "Basic": |
|
260
|
|
|
self.logger.log( |
|
261
|
|
|
logging.ERROR, f'Unknown authentication method "{auth_header}"' |
|
262
|
|
|
) |
|
263
|
|
|
return False |
|
264
|
|
|
|
|
265
|
1 |
|
try: |
|
266
|
1 |
|
cred = base64.b64decode(auth_header_list[1]).decode("utf-8") |
|
267
|
|
|
except (binascii.Error, UnicodeDecodeError) as ex: |
|
268
|
|
|
self.logger.log(logging.CRITICAL, f"Cannot decode credentials: {str(ex)}") |
|
269
|
|
|
return False |
|
270
|
|
|
|
|
271
|
1 |
|
login_pwd = cred.split(":") |
|
272
|
1 |
|
if len(login_pwd) != 2: |
|
273
|
|
|
self.logger.log(logging.ERROR, "Invalid string in encoded credentials") |
|
274
|
|
|
return False |
|
275
|
|
|
|
|
276
|
1 |
|
self.username = login_pwd[0] |
|
277
|
1 |
|
self.logger.set_tabpy_username(self.username) |
|
278
|
1 |
|
self.password = login_pwd[1] |
|
279
|
1 |
|
return True |
|
280
|
|
|
|
|
281
|
1 |
|
def _get_credentials(self, method) -> bool: |
|
282
|
|
|
""" |
|
283
|
|
|
Find credentials for specified authentication method. Credentials if |
|
284
|
|
|
found stored in self.username and self.password. |
|
285
|
|
|
|
|
286
|
|
|
Parameters |
|
287
|
|
|
---------- |
|
288
|
|
|
method: str |
|
289
|
|
|
Authentication method name. |
|
290
|
|
|
|
|
291
|
|
|
Returns |
|
292
|
|
|
------- |
|
293
|
|
|
bool |
|
294
|
|
|
True if valid credentials were found. |
|
295
|
|
|
False otherwise. |
|
296
|
|
|
""" |
|
297
|
1 |
|
if method == "basic-auth": |
|
298
|
1 |
|
return self._get_basic_auth_credentials() |
|
299
|
|
|
# Add new methods here... |
|
300
|
|
|
|
|
301
|
|
|
# No known methods were found |
|
302
|
|
|
self.logger.log( |
|
303
|
|
|
logging.CRITICAL, |
|
304
|
|
|
f'Unknown authentication method(s) "{method}" are configured ', |
|
305
|
|
|
) |
|
306
|
|
|
return False |
|
307
|
|
|
|
|
308
|
1 |
|
def _validate_basic_auth_credentials(self) -> bool: |
|
309
|
|
|
""" |
|
310
|
|
|
Validates username:pwd if they are the same as |
|
311
|
|
|
stored credentials. |
|
312
|
|
|
|
|
313
|
|
|
Returns |
|
314
|
|
|
------- |
|
315
|
|
|
bool |
|
316
|
|
|
True if credentials has key login and |
|
317
|
|
|
credentials[login] equal SHA3(pwd), False |
|
318
|
|
|
otherwise. |
|
319
|
|
|
""" |
|
320
|
1 |
|
login = self.username.lower() |
|
321
|
1 |
|
self.logger.log( |
|
322
|
|
|
logging.DEBUG, f'Validating credentials for user name "{login}"' |
|
323
|
|
|
) |
|
324
|
1 |
|
if login not in self.credentials: |
|
325
|
1 |
|
self.logger.log(logging.ERROR, f'User name "{self.username}" not found') |
|
326
|
1 |
|
return False |
|
327
|
|
|
|
|
328
|
1 |
|
hashed_pwd = hash_password(login, self.password) |
|
329
|
1 |
|
if self.credentials[login].lower() != hashed_pwd.lower(): |
|
330
|
|
|
self.logger.log( |
|
331
|
|
|
logging.ERROR, f'Wrong password for user name "{self.username}"' |
|
332
|
|
|
) |
|
333
|
|
|
return False |
|
334
|
|
|
|
|
335
|
1 |
|
return True |
|
336
|
|
|
|
|
337
|
1 |
|
def _validate_credentials(self, method) -> bool: |
|
338
|
|
|
""" |
|
339
|
|
|
Validates credentials according to specified methods if they |
|
340
|
|
|
are what expected. |
|
341
|
|
|
|
|
342
|
|
|
Parameters |
|
343
|
|
|
---------- |
|
344
|
|
|
method: str |
|
345
|
|
|
Authentication method name. |
|
346
|
|
|
|
|
347
|
|
|
Returns |
|
348
|
|
|
------- |
|
349
|
|
|
bool |
|
350
|
|
|
True if credentials are valid. |
|
351
|
|
|
False otherwise. |
|
352
|
|
|
""" |
|
353
|
1 |
|
if method == "basic-auth": |
|
354
|
1 |
|
return self._validate_basic_auth_credentials() |
|
355
|
|
|
# Add new methods here... |
|
356
|
|
|
|
|
357
|
|
|
# No known methods were found |
|
358
|
|
|
self.logger.log( |
|
359
|
|
|
logging.CRITICAL, |
|
360
|
|
|
f'Unknown authentication method(s) "{method}" are configured ', |
|
361
|
|
|
) |
|
362
|
|
|
return False |
|
363
|
|
|
|
|
364
|
1 |
|
def handle_authentication(self, api_version): |
|
365
|
|
|
""" |
|
366
|
|
|
If authentication feature is configured checks provided |
|
367
|
|
|
credentials. |
|
368
|
|
|
|
|
369
|
|
|
Parameters |
|
370
|
|
|
---------- |
|
371
|
|
|
api_version : str |
|
372
|
|
|
API version for authentication. |
|
373
|
|
|
|
|
374
|
|
|
Returns |
|
375
|
|
|
------- |
|
376
|
|
|
String |
|
377
|
|
|
None if authentication is not required and username and password are None. |
|
378
|
|
|
None if authentication is required and valid credentials provided. |
|
379
|
|
|
NotAuthorized if authenication is required and credentials are incorrect. |
|
380
|
|
|
NotRequired if authentication is not required but credentials are provided. |
|
381
|
|
|
""" |
|
382
|
1 |
|
self.logger.log(logging.DEBUG, "Handling authentication") |
|
383
|
1 |
|
found, method = self._get_auth_method(api_version) |
|
384
|
1 |
|
if not found: |
|
385
|
|
|
return AuthErrorStates.NotAuthorized |
|
386
|
|
|
|
|
387
|
1 |
|
if method == "": |
|
388
|
1 |
|
if not self._get_basic_auth_credentials(): |
|
389
|
1 |
|
self.logger.log(logging.DEBUG, |
|
390
|
|
|
"authentication not required, username and password are none") |
|
391
|
1 |
|
return AuthErrorStates.NONE |
|
392
|
|
|
else: |
|
393
|
1 |
|
self.logger.log(logging.DEBUG, |
|
394
|
|
|
"authentication not required, username and password are not none") |
|
395
|
1 |
|
return AuthErrorStates.NotRequired |
|
396
|
|
|
|
|
397
|
1 |
|
if not self._get_credentials(method): |
|
398
|
1 |
|
return AuthErrorStates.NotAuthorized |
|
399
|
|
|
|
|
400
|
1 |
|
if not self._validate_credentials(method): |
|
401
|
1 |
|
return AuthErrorStates.NotAuthorized |
|
402
|
|
|
|
|
403
|
1 |
|
return AuthErrorStates.NONE |
|
404
|
|
|
|
|
405
|
1 |
|
def should_fail_with_auth_error(self): |
|
406
|
|
|
""" |
|
407
|
|
|
Checks if authentication is required: |
|
408
|
|
|
- if it is not returns false, None |
|
409
|
|
|
- if it is required validates provided credentials |
|
410
|
|
|
|
|
411
|
|
|
Returns |
|
412
|
|
|
------- |
|
413
|
|
|
bool |
|
414
|
|
|
False if authentication is not required and username |
|
415
|
|
|
and password is None or isrequired and validation |
|
416
|
|
|
for credentials passes. |
|
417
|
|
|
True if validation for credentials failed or |
|
418
|
|
|
if authentication is not required and username and password |
|
419
|
|
|
fields are not empty. |
|
420
|
|
|
""" |
|
421
|
1 |
|
return self.auth_error |
|
422
|
|
|
|
|
423
|
1 |
|
def fail_with_auth_error(self): |
|
424
|
|
|
""" |
|
425
|
|
|
Prepares server 401 response and server 406 response depending |
|
426
|
|
|
on the value of the self.auth_error flag |
|
427
|
|
|
""" |
|
428
|
1 |
|
if self.auth_error == AuthErrorStates.NotAuthorized: |
|
429
|
1 |
|
self.logger.log(logging.ERROR, "Failing with 401 for unauthorized request") |
|
430
|
1 |
|
self.set_status(401) |
|
431
|
1 |
|
self.set_header("WWW-Authenticate", f'Basic realm="{self.tabpy_state.name}"') |
|
432
|
1 |
|
self.error_out( |
|
433
|
|
|
401, |
|
434
|
|
|
info="Unauthorized request.", |
|
435
|
|
|
log_message="Invalid credentials provided.", |
|
436
|
|
|
) |
|
437
|
|
|
else: |
|
438
|
1 |
|
self.logger.log(logging.ERROR, "Failing with 406 for Not Acceptable") |
|
439
|
1 |
|
self.set_status(406) |
|
440
|
1 |
|
self.set_header("WWW-Authenticate", f'Basic realm="{self.tabpy_state.name}"') |
|
441
|
1 |
|
self.error_out( |
|
442
|
|
|
406, |
|
443
|
|
|
info="Not Acceptable", |
|
444
|
|
|
log_message="Username or password provided when authentication not available.", |
|
445
|
|
|
) |
|
446
|
|
|
|
|
447
|
1 |
|
def request_body_size_within_limit(self): |
|
448
|
|
|
""" |
|
449
|
|
|
Determines if the request body size is within the specified limit. |
|
450
|
|
|
|
|
451
|
|
|
Returns |
|
452
|
|
|
------- |
|
453
|
|
|
bool |
|
454
|
|
|
True if the request body size is within the limit, False otherwise. |
|
455
|
|
|
""" |
|
456
|
1 |
|
if self.max_request_size is not None: |
|
457
|
1 |
|
if "Content-Length" in self.request.headers: |
|
458
|
1 |
|
content_length = int(self.request.headers["Content-Length"]) |
|
459
|
1 |
|
if content_length > self.max_request_size: |
|
460
|
1 |
|
self.error_out( |
|
461
|
|
|
413, |
|
462
|
|
|
info="Request Entity Too Large", |
|
463
|
|
|
log_message=f"Request with size {content_length} exceeded limit of {self.max_request_size} (bytes).", |
|
464
|
|
|
) |
|
465
|
1 |
|
return False |
|
466
|
|
|
|
|
467
|
|
|
return True |
|
468
|
|
|
|