2018-06-29 19:52:40 +02:00
|
|
|
|
using System;
|
|
|
|
|
|
using System.Collections.Generic;
|
|
|
|
|
|
using System.Linq;
|
|
|
|
|
|
using System.Net;
|
2018-12-06 17:13:23 +11:00
|
|
|
|
using System.Security.Cryptography;
|
2021-02-18 11:06:02 +01:00
|
|
|
|
using Umbraco.Cms.Core.Cache;
|
|
|
|
|
|
using Umbraco.Cms.Core.IO;
|
|
|
|
|
|
using Umbraco.Cms.Core.Media;
|
|
|
|
|
|
using Umbraco.Cms.Core.Models.Entities;
|
|
|
|
|
|
using Umbraco.Cms.Core.Models.Membership;
|
|
|
|
|
|
using Umbraco.Cms.Core.Security;
|
|
|
|
|
|
using Umbraco.Cms.Core.Services;
|
|
|
|
|
|
using Umbraco.Extensions;
|
2018-06-29 19:52:40 +02:00
|
|
|
|
|
2021-02-18 11:06:02 +01:00
|
|
|
|
namespace Umbraco.Cms.Core.Models
|
2018-06-29 19:52:40 +02:00
|
|
|
|
{
|
|
|
|
|
|
public static class UserExtensions
|
|
|
|
|
|
{
|
|
|
|
|
|
/// <summary>
|
2019-01-22 18:03:39 -05:00
|
|
|
|
/// Tries to lookup the user's Gravatar to see if the endpoint can be reached, if so it returns the valid URL
|
2018-06-29 19:52:40 +02:00
|
|
|
|
/// </summary>
|
|
|
|
|
|
/// <param name="user"></param>
|
2019-01-18 15:49:54 +01:00
|
|
|
|
/// <param name="cache"></param>
|
2021-04-27 09:52:17 +02:00
|
|
|
|
/// <param name="mediaFileManager"></param>
|
2018-06-29 19:52:40 +02:00
|
|
|
|
/// <returns>
|
|
|
|
|
|
/// A list of 5 different sized avatar URLs
|
|
|
|
|
|
/// </returns>
|
2022-02-28 13:14:02 +01:00
|
|
|
|
public static string[] GetUserAvatarUrls(this IUser user, IAppCache cache, MediaFileManager mediaFileManager, IImageUrlGenerator imageUrlGenerator)
|
2018-06-29 19:52:40 +02:00
|
|
|
|
{
|
2019-11-05 12:54:22 +01:00
|
|
|
|
// If FIPS is required, never check the Gravatar service as it only supports MD5 hashing.
|
2018-12-06 17:13:23 +11:00
|
|
|
|
// Unfortunately, if the FIPS setting is enabled on Windows, using MD5 will throw an exception
|
|
|
|
|
|
// and the website will not run.
|
2019-01-22 18:03:39 -05:00
|
|
|
|
// Also, check if the user has explicitly removed all avatars including a Gravatar, this will be possible and the value will be "none"
|
2018-12-06 17:13:23 +11:00
|
|
|
|
if (user.Avatar == "none" || CryptoConfig.AllowOnlyFipsAlgorithms)
|
2018-06-29 19:52:40 +02:00
|
|
|
|
{
|
|
|
|
|
|
return new string[0];
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
if (user.Avatar.IsNullOrWhiteSpace())
|
|
|
|
|
|
{
|
2022-01-21 11:43:58 +01:00
|
|
|
|
var gravatarHash = user.Email?.GenerateHash<MD5>();
|
2018-06-29 19:52:40 +02:00
|
|
|
|
var gravatarUrl = "https://www.gravatar.com/avatar/" + gravatarHash + "?d=404";
|
|
|
|
|
|
|
2019-01-22 18:03:39 -05:00
|
|
|
|
//try Gravatar
|
2019-01-18 15:49:54 +01:00
|
|
|
|
var gravatarAccess = cache.GetCacheItem<bool>("UserAvatar" + user.Id, () =>
|
2018-06-29 19:52:40 +02:00
|
|
|
|
{
|
|
|
|
|
|
// Test if we can reach this URL, will fail when there's network or firewall errors
|
|
|
|
|
|
var request = (HttpWebRequest)WebRequest.Create(gravatarUrl);
|
|
|
|
|
|
// Require response within 10 seconds
|
|
|
|
|
|
request.Timeout = 10000;
|
|
|
|
|
|
try
|
|
|
|
|
|
{
|
|
|
|
|
|
using ((HttpWebResponse)request.GetResponse()) { }
|
|
|
|
|
|
}
|
|
|
|
|
|
catch (Exception)
|
|
|
|
|
|
{
|
|
|
|
|
|
// There was an HTTP or other error, return an null instead
|
|
|
|
|
|
return false;
|
|
|
|
|
|
}
|
|
|
|
|
|
return true;
|
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
|
|
if (gravatarAccess)
|
|
|
|
|
|
{
|
|
|
|
|
|
return new[]
|
|
|
|
|
|
{
|
|
|
|
|
|
gravatarUrl + "&s=30",
|
|
|
|
|
|
gravatarUrl + "&s=60",
|
|
|
|
|
|
gravatarUrl + "&s=90",
|
|
|
|
|
|
gravatarUrl + "&s=150",
|
|
|
|
|
|
gravatarUrl + "&s=300"
|
|
|
|
|
|
};
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
return new string[0];
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
//use the custom avatar
|
2021-04-27 09:52:17 +02:00
|
|
|
|
var avatarUrl = mediaFileManager.FileSystem.GetUrl(user.Avatar);
|
2018-06-29 19:52:40 +02:00
|
|
|
|
return new[]
|
|
|
|
|
|
{
|
2020-05-20 17:39:07 +02:00
|
|
|
|
imageUrlGenerator.GetImageUrl(new ImageUrlGenerationOptions(avatarUrl) { ImageCropMode = ImageCropMode.Crop, Width = 30, Height = 30 }),
|
|
|
|
|
|
imageUrlGenerator.GetImageUrl(new ImageUrlGenerationOptions(avatarUrl) { ImageCropMode = ImageCropMode.Crop, Width = 60, Height = 60 }),
|
|
|
|
|
|
imageUrlGenerator.GetImageUrl(new ImageUrlGenerationOptions(avatarUrl) { ImageCropMode = ImageCropMode.Crop, Width = 90, Height = 90 }),
|
|
|
|
|
|
imageUrlGenerator.GetImageUrl(new ImageUrlGenerationOptions(avatarUrl) { ImageCropMode = ImageCropMode.Crop, Width = 150, Height = 150 }),
|
2022-02-28 13:14:02 +01:00
|
|
|
|
imageUrlGenerator.GetImageUrl(new ImageUrlGenerationOptions(avatarUrl) { ImageCropMode = ImageCropMode.Crop, Width = 300, Height = 300 }),
|
|
|
|
|
|
}.WhereNotNull().ToArray();
|
2018-06-29 19:52:40 +02:00
|
|
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
|
2019-12-18 13:05:34 +01:00
|
|
|
|
|
2021-02-09 13:43:28 +11:00
|
|
|
|
internal static bool HasContentRootAccess(this IUser user, IEntityService entityService, AppCaches appCaches)
|
2018-06-29 19:52:40 +02:00
|
|
|
|
{
|
2021-03-05 15:36:27 +01:00
|
|
|
|
return ContentPermissions.HasPathAccess(Constants.System.RootString, user.CalculateContentStartNodeIds(entityService, appCaches), Constants.System.RecycleBinContent);
|
2018-06-29 19:52:40 +02:00
|
|
|
|
}
|
|
|
|
|
|
|
2021-02-09 13:43:28 +11:00
|
|
|
|
internal static bool HasContentBinAccess(this IUser user, IEntityService entityService, AppCaches appCaches)
|
2018-06-29 19:52:40 +02:00
|
|
|
|
{
|
2021-03-05 15:36:27 +01:00
|
|
|
|
return ContentPermissions.HasPathAccess(Constants.System.RecycleBinContentString, user.CalculateContentStartNodeIds(entityService, appCaches), Constants.System.RecycleBinContent);
|
2018-06-29 19:52:40 +02:00
|
|
|
|
}
|
|
|
|
|
|
|
2021-02-09 13:43:28 +11:00
|
|
|
|
internal static bool HasMediaRootAccess(this IUser user, IEntityService entityService, AppCaches appCaches)
|
2018-06-29 19:52:40 +02:00
|
|
|
|
{
|
2021-03-05 15:36:27 +01:00
|
|
|
|
return ContentPermissions.HasPathAccess(Constants.System.RootString, user.CalculateMediaStartNodeIds(entityService, appCaches), Constants.System.RecycleBinMedia);
|
2018-06-29 19:52:40 +02:00
|
|
|
|
}
|
|
|
|
|
|
|
2021-02-09 13:43:28 +11:00
|
|
|
|
internal static bool HasMediaBinAccess(this IUser user, IEntityService entityService, AppCaches appCaches)
|
2018-06-29 19:52:40 +02:00
|
|
|
|
{
|
2021-03-05 15:36:27 +01:00
|
|
|
|
return ContentPermissions.HasPathAccess(Constants.System.RecycleBinMediaString, user.CalculateMediaStartNodeIds(entityService, appCaches), Constants.System.RecycleBinMedia);
|
2018-06-29 19:52:40 +02:00
|
|
|
|
}
|
|
|
|
|
|
|
2021-03-05 15:36:27 +01:00
|
|
|
|
public static bool HasPathAccess(this IUser user, IContent content, IEntityService entityService, AppCaches appCaches)
|
2018-06-29 19:52:40 +02:00
|
|
|
|
{
|
2018-11-15 15:24:09 +11:00
|
|
|
|
if (content == null) throw new ArgumentNullException(nameof(content));
|
2021-03-05 15:36:27 +01:00
|
|
|
|
return ContentPermissions.HasPathAccess(content.Path, user.CalculateContentStartNodeIds(entityService, appCaches), Constants.System.RecycleBinContent);
|
2018-06-29 19:52:40 +02:00
|
|
|
|
}
|
|
|
|
|
|
|
2022-02-09 13:24:35 +01:00
|
|
|
|
public static bool HasPathAccess(this IUser user, IMedia? media, IEntityService entityService, AppCaches appCaches)
|
2018-06-29 19:52:40 +02:00
|
|
|
|
{
|
2018-11-15 15:24:09 +11:00
|
|
|
|
if (media == null) throw new ArgumentNullException(nameof(media));
|
2021-03-05 15:36:27 +01:00
|
|
|
|
return ContentPermissions.HasPathAccess(media.Path, user.CalculateMediaStartNodeIds(entityService, appCaches), Constants.System.RecycleBinMedia);
|
2018-06-29 19:52:40 +02:00
|
|
|
|
}
|
|
|
|
|
|
|
2021-03-05 15:36:27 +01:00
|
|
|
|
public static bool HasContentPathAccess(this IUser user, IUmbracoEntity entity, IEntityService entityService, AppCaches appCaches)
|
2018-06-29 19:52:40 +02:00
|
|
|
|
{
|
2018-11-15 15:24:09 +11:00
|
|
|
|
if (entity == null) throw new ArgumentNullException(nameof(entity));
|
2021-03-05 15:36:27 +01:00
|
|
|
|
return ContentPermissions.HasPathAccess(entity.Path, user.CalculateContentStartNodeIds(entityService, appCaches), Constants.System.RecycleBinContent);
|
2018-06-29 19:52:40 +02:00
|
|
|
|
}
|
|
|
|
|
|
|
2021-03-05 15:36:27 +01:00
|
|
|
|
public static bool HasMediaPathAccess(this IUser user, IUmbracoEntity entity, IEntityService entityService, AppCaches appCaches)
|
2018-06-29 19:52:40 +02:00
|
|
|
|
{
|
2018-11-15 15:24:09 +11:00
|
|
|
|
if (entity == null) throw new ArgumentNullException(nameof(entity));
|
2021-03-05 15:36:27 +01:00
|
|
|
|
return ContentPermissions.HasPathAccess(entity.Path, user.CalculateMediaStartNodeIds(entityService, appCaches), Constants.System.RecycleBinMedia);
|
2018-06-29 19:52:40 +02:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
/// <summary>
|
|
|
|
|
|
/// Determines whether this user has access to view sensitive data
|
|
|
|
|
|
/// </summary>
|
|
|
|
|
|
/// <param name="user"></param>
|
|
|
|
|
|
public static bool HasAccessToSensitiveData(this IUser user)
|
|
|
|
|
|
{
|
|
|
|
|
|
if (user == null) throw new ArgumentNullException("user");
|
2019-11-05 13:45:42 +01:00
|
|
|
|
return user.Groups != null && user.Groups.Any(x => x.Alias == Constants.Security.SensitiveDataGroupAlias);
|
2018-06-29 19:52:40 +02:00
|
|
|
|
}
|
|
|
|
|
|
|
2021-02-09 13:43:28 +11:00
|
|
|
|
/// <summary>
|
|
|
|
|
|
/// Calculate start nodes, combining groups' and user's, and excluding what's in the bin
|
|
|
|
|
|
/// </summary>
|
2022-01-21 11:43:58 +01:00
|
|
|
|
public static int[]? CalculateContentStartNodeIds(this IUser user, IEntityService entityService, AppCaches appCaches)
|
2018-06-29 19:52:40 +02:00
|
|
|
|
{
|
2021-02-09 13:43:28 +11:00
|
|
|
|
var cacheKey = CacheKeys.UserAllContentStartNodesPrefix + user.Id;
|
|
|
|
|
|
var runtimeCache = appCaches.IsolatedCaches.GetOrCreate<IUser>();
|
|
|
|
|
|
var result = runtimeCache.GetCacheItem(cacheKey, () =>
|
|
|
|
|
|
{
|
2022-02-09 13:24:35 +01:00
|
|
|
|
// This returns a nullable array even though we're checking if items have value and there cannot be null
|
|
|
|
|
|
// We use Cast<int> to recast into non-nullable array
|
|
|
|
|
|
var gsn = user.Groups.Where(x => x.StartContentId is not null).Select(x => x.StartContentId).Distinct().Cast<int>().ToArray();
|
2021-02-09 13:43:28 +11:00
|
|
|
|
var usn = user.StartContentIds;
|
2022-02-09 13:24:35 +01:00
|
|
|
|
if (usn is not null)
|
|
|
|
|
|
{
|
|
|
|
|
|
var vals = CombineStartNodes(UmbracoObjectTypes.Document, gsn, usn, entityService);
|
|
|
|
|
|
return vals;
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
return null;
|
2021-02-09 13:43:28 +11:00
|
|
|
|
}, TimeSpan.FromMinutes(2), true);
|
2018-06-29 19:52:40 +02:00
|
|
|
|
|
2021-02-09 13:43:28 +11:00
|
|
|
|
return result;
|
2018-06-29 19:52:40 +02:00
|
|
|
|
}
|
|
|
|
|
|
|
2021-02-09 13:43:28 +11:00
|
|
|
|
/// <summary>
|
|
|
|
|
|
/// Calculate start nodes, combining groups' and user's, and excluding what's in the bin
|
|
|
|
|
|
/// </summary>
|
|
|
|
|
|
/// <param name="user"></param>
|
|
|
|
|
|
/// <param name="entityService"></param>
|
|
|
|
|
|
/// <param name="runtimeCache"></param>
|
|
|
|
|
|
/// <returns></returns>
|
2022-01-21 11:43:58 +01:00
|
|
|
|
public static int[]? CalculateMediaStartNodeIds(this IUser user, IEntityService entityService, AppCaches appCaches)
|
2018-06-29 19:52:40 +02:00
|
|
|
|
{
|
2021-02-09 13:43:28 +11:00
|
|
|
|
var cacheKey = CacheKeys.UserAllMediaStartNodesPrefix + user.Id;
|
|
|
|
|
|
var runtimeCache = appCaches.IsolatedCaches.GetOrCreate<IUser>();
|
|
|
|
|
|
var result = runtimeCache.GetCacheItem(cacheKey, () =>
|
|
|
|
|
|
{
|
2022-02-09 13:24:35 +01:00
|
|
|
|
var gsn = user.Groups.Where(x => x.StartMediaId.HasValue).Select(x => x.StartMediaId!.Value).Distinct().ToArray();
|
2021-02-09 13:43:28 +11:00
|
|
|
|
var usn = user.StartMediaIds;
|
2022-02-09 13:24:35 +01:00
|
|
|
|
if (usn is not null)
|
|
|
|
|
|
{
|
|
|
|
|
|
var vals = CombineStartNodes(UmbracoObjectTypes.Media, gsn, usn, entityService);
|
|
|
|
|
|
return vals;
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
return null;
|
2021-02-09 13:43:28 +11:00
|
|
|
|
}, TimeSpan.FromMinutes(2), true);
|
2018-06-29 19:52:40 +02:00
|
|
|
|
|
2021-02-09 13:43:28 +11:00
|
|
|
|
return result;
|
2018-06-29 19:52:40 +02:00
|
|
|
|
}
|
|
|
|
|
|
|
2022-01-21 11:43:58 +01:00
|
|
|
|
public static string[]? GetMediaStartNodePaths(this IUser user, IEntityService entityService, AppCaches appCaches)
|
2018-06-29 19:52:40 +02:00
|
|
|
|
{
|
2021-02-09 13:43:28 +11:00
|
|
|
|
var cacheKey = CacheKeys.UserMediaStartNodePathsPrefix + user.Id;
|
|
|
|
|
|
var runtimeCache = appCaches.IsolatedCaches.GetOrCreate<IUser>();
|
|
|
|
|
|
var result = runtimeCache.GetCacheItem(cacheKey, () =>
|
|
|
|
|
|
{
|
|
|
|
|
|
var startNodeIds = user.CalculateMediaStartNodeIds(entityService, appCaches);
|
|
|
|
|
|
var vals = entityService.GetAllPaths(UmbracoObjectTypes.Media, startNodeIds).Select(x => x.Path).ToArray();
|
|
|
|
|
|
return vals;
|
|
|
|
|
|
}, TimeSpan.FromMinutes(2), true);
|
2018-06-29 19:52:40 +02:00
|
|
|
|
|
2021-02-09 13:43:28 +11:00
|
|
|
|
return result;
|
2018-06-29 19:52:40 +02:00
|
|
|
|
}
|
|
|
|
|
|
|
2022-01-21 11:43:58 +01:00
|
|
|
|
public static string[]? GetContentStartNodePaths(this IUser user, IEntityService entityService, AppCaches appCaches)
|
2018-06-29 19:52:40 +02:00
|
|
|
|
{
|
2021-02-09 13:43:28 +11:00
|
|
|
|
var cacheKey = CacheKeys.UserContentStartNodePathsPrefix + user.Id;
|
|
|
|
|
|
var runtimeCache = appCaches.IsolatedCaches.GetOrCreate<IUser>();
|
|
|
|
|
|
var result = runtimeCache.GetCacheItem(cacheKey, () =>
|
2018-06-29 19:52:40 +02:00
|
|
|
|
{
|
2021-02-09 13:43:28 +11:00
|
|
|
|
var startNodeIds = user.CalculateContentStartNodeIds(entityService, appCaches);
|
|
|
|
|
|
var vals = entityService.GetAllPaths(UmbracoObjectTypes.Document, startNodeIds).Select(x => x.Path).ToArray();
|
|
|
|
|
|
return vals;
|
|
|
|
|
|
}, TimeSpan.FromMinutes(2), true);
|
2018-06-29 19:52:40 +02:00
|
|
|
|
|
2021-02-09 13:43:28 +11:00
|
|
|
|
return result;
|
2018-06-29 19:52:40 +02:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
private static bool StartsWithPath(string test, string path)
|
|
|
|
|
|
{
|
|
|
|
|
|
return test.StartsWith(path) && test.Length > path.Length && test[path.Length] == ',';
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
private static string GetBinPath(UmbracoObjectTypes objectType)
|
|
|
|
|
|
{
|
2021-09-24 17:42:31 +02:00
|
|
|
|
var binPath = Constants.System.RootString + ",";
|
2018-06-29 19:52:40 +02:00
|
|
|
|
switch (objectType)
|
|
|
|
|
|
{
|
|
|
|
|
|
case UmbracoObjectTypes.Document:
|
2021-09-24 17:42:31 +02:00
|
|
|
|
binPath += Constants.System.RecycleBinContentString;
|
2018-06-29 19:52:40 +02:00
|
|
|
|
break;
|
|
|
|
|
|
case UmbracoObjectTypes.Media:
|
2021-09-24 17:42:31 +02:00
|
|
|
|
binPath += Constants.System.RecycleBinMediaString;
|
2018-06-29 19:52:40 +02:00
|
|
|
|
break;
|
|
|
|
|
|
default:
|
|
|
|
|
|
throw new ArgumentOutOfRangeException(nameof(objectType));
|
|
|
|
|
|
}
|
|
|
|
|
|
return binPath;
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
internal static int[] CombineStartNodes(UmbracoObjectTypes objectType, int[] groupSn, int[] userSn, IEntityService entityService)
|
|
|
|
|
|
{
|
|
|
|
|
|
// assume groupSn and userSn each don't contain duplicates
|
|
|
|
|
|
|
|
|
|
|
|
var asn = groupSn.Concat(userSn).Distinct().ToArray();
|
|
|
|
|
|
var paths = asn.Length > 0
|
|
|
|
|
|
? entityService.GetAllPaths(objectType, asn).ToDictionary(x => x.Id, x => x.Path)
|
|
|
|
|
|
: new Dictionary<int, string>();
|
|
|
|
|
|
|
2019-11-05 13:45:42 +01:00
|
|
|
|
paths[Constants.System.Root] = Constants.System.RootString; // entityService does not get that one
|
2018-06-29 19:52:40 +02:00
|
|
|
|
|
|
|
|
|
|
var binPath = GetBinPath(objectType);
|
|
|
|
|
|
|
|
|
|
|
|
var lsn = new List<int>();
|
|
|
|
|
|
foreach (var sn in groupSn)
|
|
|
|
|
|
{
|
|
|
|
|
|
if (paths.TryGetValue(sn, out var snp) == false) continue; // ignore rogue node (no path)
|
|
|
|
|
|
|
|
|
|
|
|
if (StartsWithPath(snp, binPath)) continue; // ignore bin
|
|
|
|
|
|
|
|
|
|
|
|
if (lsn.Any(x => StartsWithPath(snp, paths[x]))) continue; // skip if something above this sn
|
|
|
|
|
|
lsn.RemoveAll(x => StartsWithPath(paths[x], snp)); // remove anything below this sn
|
|
|
|
|
|
lsn.Add(sn);
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
var usn = new List<int>();
|
|
|
|
|
|
foreach (var sn in userSn)
|
|
|
|
|
|
{
|
|
|
|
|
|
if (paths.TryGetValue(sn, out var snp) == false) continue; // ignore rogue node (no path)
|
|
|
|
|
|
|
|
|
|
|
|
if (StartsWithPath(snp, binPath)) continue; // ignore bin
|
|
|
|
|
|
|
|
|
|
|
|
if (usn.Any(x => StartsWithPath(paths[x], snp))) continue; // skip if something below this sn
|
|
|
|
|
|
usn.RemoveAll(x => StartsWithPath(snp, paths[x])); // remove anything above this sn
|
|
|
|
|
|
usn.Add(sn);
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
foreach (var sn in usn)
|
|
|
|
|
|
{
|
|
|
|
|
|
var snp = paths[sn]; // has to be here now
|
|
|
|
|
|
lsn.RemoveAll(x => StartsWithPath(snp, paths[x]) || StartsWithPath(paths[x], snp)); // remove anything above or below this sn
|
|
|
|
|
|
lsn.Add(sn);
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
return lsn.ToArray();
|
|
|
|
|
|
}
|
|
|
|
|
|
}
|
|
|
|
|
|
}
|