2018-11-21 13:47:46 +08:00
|
|
|
package route
|
2018-06-18 11:31:49 +08:00
|
|
|
|
|
|
|
import (
|
2019-07-12 15:44:12 +08:00
|
|
|
"bytes"
|
2023-06-06 09:45:05 +08:00
|
|
|
"crypto/subtle"
|
2022-12-03 12:25:10 +08:00
|
|
|
"crypto/tls"
|
2018-06-18 11:31:49 +08:00
|
|
|
"encoding/json"
|
2023-10-06 17:44:36 +08:00
|
|
|
"net"
|
2018-06-18 11:31:49 +08:00
|
|
|
"net/http"
|
2023-02-23 23:30:53 +08:00
|
|
|
"runtime/debug"
|
2018-10-06 13:15:02 +08:00
|
|
|
"strings"
|
2018-06-18 11:31:49 +08:00
|
|
|
"time"
|
|
|
|
|
2023-11-03 21:01:45 +08:00
|
|
|
"github.com/metacubex/mihomo/adapter/inbound"
|
|
|
|
CN "github.com/metacubex/mihomo/common/net"
|
|
|
|
"github.com/metacubex/mihomo/common/utils"
|
|
|
|
C "github.com/metacubex/mihomo/constant"
|
|
|
|
"github.com/metacubex/mihomo/log"
|
|
|
|
"github.com/metacubex/mihomo/tunnel/statistic"
|
2023-06-06 10:47:50 +08:00
|
|
|
|
2021-04-03 14:59:03 +08:00
|
|
|
"github.com/go-chi/chi/v5"
|
2023-02-23 23:30:53 +08:00
|
|
|
"github.com/go-chi/chi/v5/middleware"
|
2018-07-19 09:31:53 +08:00
|
|
|
"github.com/go-chi/cors"
|
2018-06-18 11:31:49 +08:00
|
|
|
"github.com/go-chi/render"
|
2023-10-06 17:44:36 +08:00
|
|
|
"github.com/gobwas/ws"
|
|
|
|
"github.com/gobwas/ws/wsutil"
|
2018-06-18 11:31:49 +08:00
|
|
|
)
|
|
|
|
|
2018-11-21 13:47:46 +08:00
|
|
|
var (
|
|
|
|
serverSecret = ""
|
|
|
|
serverAddr = ""
|
2018-12-20 01:29:13 +08:00
|
|
|
|
|
|
|
uiPath = ""
|
2018-11-21 13:47:46 +08:00
|
|
|
)
|
2018-10-06 13:15:02 +08:00
|
|
|
|
2018-06-18 11:31:49 +08:00
|
|
|
type Traffic struct {
|
|
|
|
Up int64 `json:"up"`
|
|
|
|
Down int64 `json:"down"`
|
|
|
|
}
|
|
|
|
|
2023-04-08 00:55:25 +08:00
|
|
|
type Memory struct {
|
|
|
|
Inuse uint64 `json:"inuse"`
|
|
|
|
OSLimit uint64 `json:"oslimit"` // maybe we need it in the future
|
|
|
|
}
|
|
|
|
|
2018-12-20 01:29:13 +08:00
|
|
|
func SetUIPath(path string) {
|
2020-06-18 21:33:57 +08:00
|
|
|
uiPath = C.Path.Resolve(path)
|
2018-12-20 01:29:13 +08:00
|
|
|
}
|
|
|
|
|
2022-12-03 14:14:15 +08:00
|
|
|
func Start(addr string, tlsAddr string, secret string,
|
2023-02-23 23:30:53 +08:00
|
|
|
certificat, privateKey string, isDebug bool) {
|
2018-11-21 13:47:46 +08:00
|
|
|
if serverAddr != "" {
|
|
|
|
return
|
2018-07-26 00:04:59 +08:00
|
|
|
}
|
|
|
|
|
2018-11-21 13:47:46 +08:00
|
|
|
serverAddr = addr
|
|
|
|
serverSecret = secret
|
|
|
|
|
2018-06-18 11:31:49 +08:00
|
|
|
r := chi.NewRouter()
|
2022-04-24 02:07:57 +08:00
|
|
|
corsM := cors.New(cors.Options{
|
2018-07-19 09:31:53 +08:00
|
|
|
AllowedOrigins: []string{"*"},
|
2018-12-29 14:11:54 +08:00
|
|
|
AllowedMethods: []string{"GET", "POST", "PUT", "PATCH", "DELETE"},
|
2018-10-06 13:15:02 +08:00
|
|
|
AllowedHeaders: []string{"Content-Type", "Authorization"},
|
2018-07-19 09:31:53 +08:00
|
|
|
MaxAge: 300,
|
|
|
|
})
|
2022-04-24 02:07:57 +08:00
|
|
|
r.Use(corsM.Handler)
|
2023-02-23 23:30:53 +08:00
|
|
|
if isDebug {
|
|
|
|
r.Mount("/debug", func() http.Handler {
|
|
|
|
r := chi.NewRouter()
|
|
|
|
r.Put("/gc", func(w http.ResponseWriter, r *http.Request) {
|
|
|
|
debug.FreeOSMemory()
|
|
|
|
})
|
|
|
|
handler := middleware.Profiler
|
|
|
|
r.Mount("/", handler())
|
|
|
|
return r
|
|
|
|
}())
|
|
|
|
}
|
2018-12-21 17:48:29 +08:00
|
|
|
r.Group(func(r chi.Router) {
|
2019-09-21 21:28:02 +08:00
|
|
|
r.Use(authentication)
|
2020-02-21 18:00:19 +08:00
|
|
|
r.Get("/", hello)
|
2019-07-12 15:44:12 +08:00
|
|
|
r.Get("/logs", getLogs)
|
|
|
|
r.Get("/traffic", traffic)
|
2023-04-08 00:55:25 +08:00
|
|
|
r.Get("/memory", memory)
|
2019-09-13 17:44:30 +08:00
|
|
|
r.Get("/version", version)
|
2018-12-21 17:48:29 +08:00
|
|
|
r.Mount("/configs", configRouter())
|
|
|
|
r.Mount("/proxies", proxyRouter())
|
2022-05-30 21:55:09 +08:00
|
|
|
r.Mount("/group", GroupRouter())
|
2018-12-21 17:48:29 +08:00
|
|
|
r.Mount("/rules", ruleRouter())
|
2019-10-27 21:44:07 +08:00
|
|
|
r.Mount("/connections", connectionRouter())
|
2019-12-11 17:31:15 +08:00
|
|
|
r.Mount("/providers/proxies", proxyProviderRouter())
|
2021-12-02 22:56:17 +08:00
|
|
|
r.Mount("/providers/rules", ruleProviderRouter())
|
2023-12-02 17:07:36 +08:00
|
|
|
r.Mount("/lru", cacheRouter())
|
2023-01-16 15:20:39 +08:00
|
|
|
r.Mount("/dns", dnsRouter())
|
2023-03-14 22:18:55 +08:00
|
|
|
r.Mount("/restart", restartRouter())
|
2023-03-23 20:42:01 +08:00
|
|
|
r.Mount("/upgrade", upgradeRouter())
|
|
|
|
|
2018-12-21 17:48:29 +08:00
|
|
|
})
|
2018-06-18 11:31:49 +08:00
|
|
|
|
2018-12-20 01:29:13 +08:00
|
|
|
if uiPath != "" {
|
2018-12-21 17:48:29 +08:00
|
|
|
r.Group(func(r chi.Router) {
|
|
|
|
fs := http.StripPrefix("/ui", http.FileServer(http.Dir(uiPath)))
|
2019-09-08 22:33:52 +08:00
|
|
|
r.Get("/ui", http.RedirectHandler("/ui/", http.StatusTemporaryRedirect).ServeHTTP)
|
2018-12-21 17:48:29 +08:00
|
|
|
r.Get("/ui/*", func(w http.ResponseWriter, r *http.Request) {
|
|
|
|
fs.ServeHTTP(w, r)
|
|
|
|
})
|
2018-12-20 01:29:13 +08:00
|
|
|
})
|
|
|
|
}
|
2022-12-03 14:14:15 +08:00
|
|
|
|
|
|
|
if len(tlsAddr) > 0 {
|
2022-12-03 12:25:10 +08:00
|
|
|
go func() {
|
2023-10-01 12:04:34 +08:00
|
|
|
c, err := CN.ParseCert(certificat, privateKey, C.Path)
|
2022-12-03 14:14:15 +08:00
|
|
|
if err != nil {
|
|
|
|
log.Errorln("External controller tls listen error: %s", err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
l, err := inbound.Listen("tcp", tlsAddr)
|
|
|
|
if err != nil {
|
|
|
|
log.Errorln("External controller tls listen error: %s", err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
serverAddr = l.Addr().String()
|
|
|
|
log.Infoln("RESTful API tls listening at: %s", serverAddr)
|
|
|
|
tlsServe := &http.Server{
|
|
|
|
Handler: r,
|
|
|
|
TLSConfig: &tls.Config{
|
|
|
|
Certificates: []tls.Certificate{c},
|
|
|
|
},
|
|
|
|
}
|
|
|
|
if err = tlsServe.ServeTLS(l, "", ""); err != nil {
|
|
|
|
log.Errorln("External controller tls serve error: %s", err)
|
2022-12-03 12:25:10 +08:00
|
|
|
}
|
|
|
|
}()
|
|
|
|
}
|
2018-12-20 01:29:13 +08:00
|
|
|
|
2022-11-16 10:43:16 +08:00
|
|
|
l, err := inbound.Listen("tcp", addr)
|
2018-06-18 11:31:49 +08:00
|
|
|
if err != nil {
|
2021-07-19 14:07:51 +08:00
|
|
|
log.Errorln("External controller listen error: %s", err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
serverAddr = l.Addr().String()
|
|
|
|
log.Infoln("RESTful API listening at: %s", serverAddr)
|
2022-12-03 12:25:10 +08:00
|
|
|
|
2021-07-19 14:07:51 +08:00
|
|
|
if err = http.Serve(l, r); err != nil {
|
|
|
|
log.Errorln("External controller serve error: %s", err)
|
2018-06-18 11:31:49 +08:00
|
|
|
}
|
2022-12-03 12:25:10 +08:00
|
|
|
|
2018-06-18 11:31:49 +08:00
|
|
|
}
|
|
|
|
|
2023-06-06 09:45:05 +08:00
|
|
|
func safeEuqal(a, b string) bool {
|
2023-06-06 10:47:50 +08:00
|
|
|
aBuf := utils.ImmutableBytesFromString(a)
|
|
|
|
bBuf := utils.ImmutableBytesFromString(b)
|
2023-06-06 09:45:05 +08:00
|
|
|
return subtle.ConstantTimeCompare(aBuf, bBuf) == 1
|
|
|
|
}
|
|
|
|
|
2018-10-06 13:15:02 +08:00
|
|
|
func authentication(next http.Handler) http.Handler {
|
|
|
|
fn := func(w http.ResponseWriter, r *http.Request) {
|
2018-11-21 13:47:46 +08:00
|
|
|
if serverSecret == "" {
|
2018-10-06 13:15:02 +08:00
|
|
|
next.ServeHTTP(w, r)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2019-09-30 14:13:29 +08:00
|
|
|
// Browser websocket not support custom header
|
2023-10-06 17:44:36 +08:00
|
|
|
if r.Header.Get("Upgrade") == "websocket" && r.URL.Query().Get("token") != "" {
|
2019-09-30 14:13:29 +08:00
|
|
|
token := r.URL.Query().Get("token")
|
2023-06-06 09:45:05 +08:00
|
|
|
if !safeEuqal(token, serverSecret) {
|
2019-09-30 14:13:29 +08:00
|
|
|
render.Status(r, http.StatusUnauthorized)
|
|
|
|
render.JSON(w, r, ErrUnauthorized)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
next.ServeHTTP(w, r)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
header := r.Header.Get("Authorization")
|
2022-03-16 12:10:13 +08:00
|
|
|
bearer, token, found := strings.Cut(header, " ")
|
2019-09-30 14:13:29 +08:00
|
|
|
|
2022-03-16 12:10:13 +08:00
|
|
|
hasInvalidHeader := bearer != "Bearer"
|
2023-06-06 09:45:05 +08:00
|
|
|
hasInvalidSecret := !found || !safeEuqal(token, serverSecret)
|
2020-04-24 23:49:35 +08:00
|
|
|
if hasInvalidHeader || hasInvalidSecret {
|
2018-12-10 11:33:37 +08:00
|
|
|
render.Status(r, http.StatusUnauthorized)
|
|
|
|
render.JSON(w, r, ErrUnauthorized)
|
2018-10-06 13:15:02 +08:00
|
|
|
return
|
|
|
|
}
|
|
|
|
next.ServeHTTP(w, r)
|
|
|
|
}
|
|
|
|
return http.HandlerFunc(fn)
|
|
|
|
}
|
|
|
|
|
2018-12-29 14:11:54 +08:00
|
|
|
func hello(w http.ResponseWriter, r *http.Request) {
|
2023-11-03 21:01:45 +08:00
|
|
|
render.JSON(w, r, render.M{"hello": "mihomo"})
|
2018-12-29 14:11:54 +08:00
|
|
|
}
|
|
|
|
|
2018-06-18 11:31:49 +08:00
|
|
|
func traffic(w http.ResponseWriter, r *http.Request) {
|
2023-10-06 17:44:36 +08:00
|
|
|
var wsConn net.Conn
|
|
|
|
if r.Header.Get("Upgrade") == "websocket" {
|
2019-07-12 15:44:12 +08:00
|
|
|
var err error
|
2023-10-06 17:44:36 +08:00
|
|
|
wsConn, _, _, err = ws.UpgradeHTTP(r, w)
|
2019-07-12 15:44:12 +08:00
|
|
|
if err != nil {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if wsConn == nil {
|
|
|
|
w.Header().Set("Content-Type", "application/json")
|
|
|
|
render.Status(r, http.StatusOK)
|
|
|
|
}
|
2018-06-18 11:31:49 +08:00
|
|
|
|
|
|
|
tick := time.NewTicker(time.Second)
|
2020-07-13 00:25:54 +08:00
|
|
|
defer tick.Stop()
|
2021-01-23 14:49:46 +08:00
|
|
|
t := statistic.DefaultManager
|
2019-07-12 15:44:12 +08:00
|
|
|
buf := &bytes.Buffer{}
|
|
|
|
var err error
|
2018-06-18 11:31:49 +08:00
|
|
|
for range tick.C {
|
2019-07-12 15:44:12 +08:00
|
|
|
buf.Reset()
|
2018-06-18 11:31:49 +08:00
|
|
|
up, down := t.Now()
|
2019-07-12 15:44:12 +08:00
|
|
|
if err := json.NewEncoder(buf).Encode(Traffic{
|
2018-06-18 11:31:49 +08:00
|
|
|
Up: up,
|
|
|
|
Down: down,
|
|
|
|
}); err != nil {
|
|
|
|
break
|
|
|
|
}
|
2019-07-12 15:44:12 +08:00
|
|
|
|
|
|
|
if wsConn == nil {
|
|
|
|
_, err = w.Write(buf.Bytes())
|
|
|
|
w.(http.Flusher).Flush()
|
|
|
|
} else {
|
2023-10-06 17:44:36 +08:00
|
|
|
err = wsutil.WriteMessage(wsConn, ws.StateServerSide, ws.OpText, buf.Bytes())
|
2019-07-12 15:44:12 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
if err != nil {
|
|
|
|
break
|
|
|
|
}
|
2018-06-18 11:31:49 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2023-04-08 00:55:25 +08:00
|
|
|
func memory(w http.ResponseWriter, r *http.Request) {
|
2023-10-06 17:44:36 +08:00
|
|
|
var wsConn net.Conn
|
|
|
|
if r.Header.Get("Upgrade") == "websocket" {
|
2023-04-08 00:55:25 +08:00
|
|
|
var err error
|
2023-10-06 17:44:36 +08:00
|
|
|
wsConn, _, _, err = ws.UpgradeHTTP(r, w)
|
2023-04-08 00:55:25 +08:00
|
|
|
if err != nil {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if wsConn == nil {
|
|
|
|
w.Header().Set("Content-Type", "application/json")
|
|
|
|
render.Status(r, http.StatusOK)
|
|
|
|
}
|
|
|
|
|
|
|
|
tick := time.NewTicker(time.Second)
|
|
|
|
defer tick.Stop()
|
|
|
|
t := statistic.DefaultManager
|
|
|
|
buf := &bytes.Buffer{}
|
|
|
|
var err error
|
2023-04-08 01:39:48 +08:00
|
|
|
first := true
|
2023-04-08 00:55:25 +08:00
|
|
|
for range tick.C {
|
|
|
|
buf.Reset()
|
|
|
|
|
2023-04-08 01:39:48 +08:00
|
|
|
inuse := t.Memory()
|
|
|
|
// make chat.js begin with zero
|
|
|
|
// this is shit var,but we need output 0 for first time
|
|
|
|
if first {
|
|
|
|
inuse = 0
|
|
|
|
first = false
|
|
|
|
}
|
2023-04-08 00:55:25 +08:00
|
|
|
if err := json.NewEncoder(buf).Encode(Memory{
|
2023-04-08 01:39:48 +08:00
|
|
|
Inuse: inuse,
|
2023-04-08 00:55:25 +08:00
|
|
|
OSLimit: 0,
|
|
|
|
}); err != nil {
|
|
|
|
break
|
|
|
|
}
|
|
|
|
if wsConn == nil {
|
|
|
|
_, err = w.Write(buf.Bytes())
|
|
|
|
w.(http.Flusher).Flush()
|
|
|
|
} else {
|
2023-10-06 17:44:36 +08:00
|
|
|
err = wsutil.WriteMessage(wsConn, ws.StateServerSide, ws.OpText, buf.Bytes())
|
2023-04-08 00:55:25 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
if err != nil {
|
|
|
|
break
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-06-22 13:15:20 +08:00
|
|
|
type Log struct {
|
|
|
|
Type string `json:"type"`
|
|
|
|
Payload string `json:"payload"`
|
|
|
|
}
|
2023-09-29 08:50:50 +08:00
|
|
|
type LogStructuredField struct {
|
|
|
|
Key string `json:"key"`
|
|
|
|
Value string `json:"value"`
|
|
|
|
}
|
|
|
|
type LogStructured struct {
|
|
|
|
Time string `json:"time"`
|
|
|
|
Level string `json:"level"`
|
|
|
|
Message string `json:"message"`
|
|
|
|
Fields []LogStructuredField `json:"fields"`
|
|
|
|
}
|
2018-06-22 13:15:20 +08:00
|
|
|
|
2018-06-18 11:31:49 +08:00
|
|
|
func getLogs(w http.ResponseWriter, r *http.Request) {
|
2018-08-12 19:35:13 +08:00
|
|
|
levelText := r.URL.Query().Get("level")
|
|
|
|
if levelText == "" {
|
|
|
|
levelText = "info"
|
2018-06-22 13:15:20 +08:00
|
|
|
}
|
|
|
|
|
2023-09-29 08:50:50 +08:00
|
|
|
formatText := r.URL.Query().Get("format")
|
|
|
|
isStructured := false
|
|
|
|
if formatText == "structured" {
|
|
|
|
isStructured = true
|
|
|
|
}
|
|
|
|
|
2018-11-21 13:47:46 +08:00
|
|
|
level, ok := log.LogLevelMapping[levelText]
|
2018-06-22 13:15:20 +08:00
|
|
|
if !ok {
|
2018-12-10 11:33:37 +08:00
|
|
|
render.Status(r, http.StatusBadRequest)
|
|
|
|
render.JSON(w, r, ErrBadRequest)
|
2018-06-22 13:15:20 +08:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2023-10-06 17:44:36 +08:00
|
|
|
var wsConn net.Conn
|
|
|
|
if r.Header.Get("Upgrade") == "websocket" {
|
2019-07-12 15:44:12 +08:00
|
|
|
var err error
|
2023-10-06 17:44:36 +08:00
|
|
|
wsConn, _, _, err = ws.UpgradeHTTP(r, w)
|
2019-07-12 15:44:12 +08:00
|
|
|
if err != nil {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if wsConn == nil {
|
|
|
|
w.Header().Set("Content-Type", "application/json")
|
|
|
|
render.Status(r, http.StatusOK)
|
|
|
|
}
|
|
|
|
|
2022-04-25 23:22:58 +08:00
|
|
|
ch := make(chan log.Event, 1024)
|
2018-11-21 13:47:46 +08:00
|
|
|
sub := log.Subscribe()
|
2019-07-12 15:44:12 +08:00
|
|
|
defer log.UnSubscribe(sub)
|
|
|
|
buf := &bytes.Buffer{}
|
2022-04-25 23:22:58 +08:00
|
|
|
|
|
|
|
go func() {
|
2022-11-12 20:43:48 +08:00
|
|
|
for logM := range sub {
|
2022-04-25 23:22:58 +08:00
|
|
|
select {
|
2022-11-12 20:43:48 +08:00
|
|
|
case ch <- logM:
|
2022-04-25 23:22:58 +08:00
|
|
|
default:
|
|
|
|
}
|
|
|
|
}
|
|
|
|
close(ch)
|
|
|
|
}()
|
|
|
|
|
2022-11-12 20:43:48 +08:00
|
|
|
for logM := range ch {
|
2022-04-24 02:07:57 +08:00
|
|
|
if logM.LogLevel < level {
|
2018-06-22 13:15:20 +08:00
|
|
|
continue
|
|
|
|
}
|
2022-04-25 23:22:58 +08:00
|
|
|
buf.Reset()
|
2018-06-22 13:15:20 +08:00
|
|
|
|
2023-09-29 08:50:50 +08:00
|
|
|
if !isStructured {
|
|
|
|
if err := json.NewEncoder(buf).Encode(Log{
|
|
|
|
Type: logM.Type(),
|
|
|
|
Payload: logM.Payload,
|
|
|
|
}); err != nil {
|
|
|
|
break
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
newLevel := logM.Type()
|
|
|
|
if newLevel == "warning" {
|
|
|
|
newLevel = "warn"
|
|
|
|
}
|
|
|
|
if err := json.NewEncoder(buf).Encode(LogStructured{
|
|
|
|
Time: time.Now().Format(time.TimeOnly),
|
|
|
|
Level: newLevel,
|
|
|
|
Message: logM.Payload,
|
|
|
|
Fields: []LogStructuredField{},
|
|
|
|
}); err != nil {
|
|
|
|
break
|
|
|
|
}
|
2018-06-18 11:31:49 +08:00
|
|
|
}
|
2019-07-12 15:44:12 +08:00
|
|
|
|
2022-04-25 23:22:58 +08:00
|
|
|
var err error
|
2019-07-12 15:44:12 +08:00
|
|
|
if wsConn == nil {
|
|
|
|
_, err = w.Write(buf.Bytes())
|
|
|
|
w.(http.Flusher).Flush()
|
|
|
|
} else {
|
2023-10-06 17:44:36 +08:00
|
|
|
err = wsutil.WriteMessage(wsConn, ws.StateServerSide, ws.OpText, buf.Bytes())
|
2019-07-12 15:44:12 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
if err != nil {
|
|
|
|
break
|
|
|
|
}
|
2018-06-18 11:31:49 +08:00
|
|
|
}
|
|
|
|
}
|
2019-09-13 17:44:30 +08:00
|
|
|
|
|
|
|
func version(w http.ResponseWriter, r *http.Request) {
|
2021-12-03 21:54:45 +08:00
|
|
|
render.JSON(w, r, render.M{"meta": C.Meta, "version": C.Version})
|
2019-09-13 17:44:30 +08:00
|
|
|
}
|