123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590 |
- package v1
- import (
- "context"
- "encoding/base64"
- "fmt"
- "net/http"
- "regexp"
- "slices"
- "strings"
- "time"
- "github.com/golang-jwt/jwt/v5"
- "github.com/labstack/echo/v4"
- "github.com/pkg/errors"
- "golang.org/x/crypto/bcrypt"
- "google.golang.org/genproto/googleapis/api/httpbody"
- "google.golang.org/grpc/codes"
- "google.golang.org/grpc/status"
- "google.golang.org/protobuf/types/known/emptypb"
- "google.golang.org/protobuf/types/known/timestamppb"
- "github.com/usememos/memos/internal/util"
- v1pb "github.com/usememos/memos/proto/gen/api/v1"
- storepb "github.com/usememos/memos/proto/gen/store"
- "github.com/usememos/memos/store"
- )
- func (s *APIV1Service) ListUsers(ctx context.Context, _ *v1pb.ListUsersRequest) (*v1pb.ListUsersResponse, error) {
- currentUser, err := s.GetCurrentUser(ctx)
- if err != nil {
- return nil, status.Errorf(codes.Internal, "failed to get user: %v", err)
- }
- if currentUser.Role != store.RoleHost && currentUser.Role != store.RoleAdmin {
- return nil, status.Errorf(codes.PermissionDenied, "permission denied")
- }
- users, err := s.Store.ListUsers(ctx, &store.FindUser{})
- if err != nil {
- return nil, status.Errorf(codes.Internal, "failed to list users: %v", err)
- }
- response := &v1pb.ListUsersResponse{
- Users: []*v1pb.User{},
- }
- for _, user := range users {
- response.Users = append(response.Users, convertUserFromStore(user))
- }
- return response, nil
- }
- func (s *APIV1Service) GetUser(ctx context.Context, request *v1pb.GetUserRequest) (*v1pb.User, error) {
- userID, err := ExtractUserIDFromName(request.Name)
- if err != nil {
- return nil, status.Errorf(codes.InvalidArgument, "invalid user name: %v", err)
- }
- user, err := s.Store.GetUser(ctx, &store.FindUser{
- ID: &userID,
- })
- if err != nil {
- return nil, status.Errorf(codes.Internal, "failed to get user: %v", err)
- }
- if user == nil {
- return nil, status.Errorf(codes.NotFound, "user not found")
- }
- return convertUserFromStore(user), nil
- }
- func (s *APIV1Service) GetUserByUsername(ctx context.Context, request *v1pb.GetUserByUsernameRequest) (*v1pb.User, error) {
- user, err := s.Store.GetUser(ctx, &store.FindUser{
- Username: &request.Username,
- })
- if err != nil {
- return nil, status.Errorf(codes.Internal, "failed to get user: %v", err)
- }
- if user == nil {
- return nil, status.Errorf(codes.NotFound, "user not found")
- }
- return convertUserFromStore(user), nil
- }
- func (s *APIV1Service) GetUserAvatarBinary(ctx context.Context, request *v1pb.GetUserAvatarBinaryRequest) (*httpbody.HttpBody, error) {
- userID, err := ExtractUserIDFromName(request.Name)
- if err != nil {
- return nil, status.Errorf(codes.InvalidArgument, "invalid user name: %v", err)
- }
- user, err := s.Store.GetUser(ctx, &store.FindUser{
- ID: &userID,
- })
- if err != nil {
- return nil, status.Errorf(codes.Internal, "failed to get user: %v", err)
- }
- if user == nil {
- return nil, status.Errorf(codes.NotFound, "user not found")
- }
- if user.AvatarURL == "" {
- return nil, status.Errorf(codes.NotFound, "avatar not found")
- }
- imageType, base64Data, err := extractImageInfo(user.AvatarURL)
- if err != nil {
- return nil, status.Errorf(codes.Internal, "failed to extract image info: %v", err)
- }
- imageData, err := base64.StdEncoding.DecodeString(base64Data)
- if err != nil {
- return nil, status.Errorf(codes.Internal, "failed to decode string: %v", err)
- }
- httpBody := &httpbody.HttpBody{
- ContentType: imageType,
- Data: imageData,
- }
- return httpBody, nil
- }
- func (s *APIV1Service) CreateUser(ctx context.Context, request *v1pb.CreateUserRequest) (*v1pb.User, error) {
- currentUser, err := s.GetCurrentUser(ctx)
- if err != nil {
- return nil, status.Errorf(codes.Internal, "failed to get user: %v", err)
- }
- if currentUser.Role != store.RoleHost {
- return nil, status.Errorf(codes.PermissionDenied, "permission denied")
- }
- if !util.UIDMatcher.MatchString(strings.ToLower(request.User.Username)) {
- return nil, status.Errorf(codes.InvalidArgument, "invalid username: %s", request.User.Username)
- }
- passwordHash, err := bcrypt.GenerateFromPassword([]byte(request.User.Password), bcrypt.DefaultCost)
- if err != nil {
- return nil, echo.NewHTTPError(http.StatusInternalServerError, "failed to generate password hash").SetInternal(err)
- }
- user, err := s.Store.CreateUser(ctx, &store.User{
- Username: request.User.Username,
- Role: convertUserRoleToStore(request.User.Role),
- Email: request.User.Email,
- Nickname: request.User.Nickname,
- PasswordHash: string(passwordHash),
- })
- if err != nil {
- return nil, status.Errorf(codes.Internal, "failed to create user: %v", err)
- }
- return convertUserFromStore(user), nil
- }
- func (s *APIV1Service) UpdateUser(ctx context.Context, request *v1pb.UpdateUserRequest) (*v1pb.User, error) {
- workspaceGeneralSetting, err := s.Store.GetWorkspaceGeneralSetting(ctx)
- if err != nil {
- return nil, status.Errorf(codes.Internal, "failed to get workspace general setting: %v", err)
- }
- userID, err := ExtractUserIDFromName(request.User.Name)
- if err != nil {
- return nil, status.Errorf(codes.InvalidArgument, "invalid user name: %v", err)
- }
- currentUser, err := s.GetCurrentUser(ctx)
- if err != nil {
- return nil, status.Errorf(codes.Internal, "failed to get user: %v", err)
- }
- if currentUser.ID != userID && currentUser.Role != store.RoleAdmin && currentUser.Role != store.RoleHost {
- return nil, status.Errorf(codes.PermissionDenied, "permission denied")
- }
- if request.UpdateMask == nil || len(request.UpdateMask.Paths) == 0 {
- return nil, status.Errorf(codes.InvalidArgument, "update mask is empty")
- }
- user, err := s.Store.GetUser(ctx, &store.FindUser{ID: &userID})
- if err != nil {
- return nil, status.Errorf(codes.Internal, "failed to get user: %v", err)
- }
- if user == nil {
- return nil, status.Errorf(codes.NotFound, "user not found")
- }
- currentTs := time.Now().Unix()
- update := &store.UpdateUser{
- ID: user.ID,
- UpdatedTs: ¤tTs,
- }
- for _, field := range request.UpdateMask.Paths {
- if field == "username" {
- if workspaceGeneralSetting.DisallowChangeUsername {
- return nil, status.Errorf(codes.PermissionDenied, "permission denied: disallow change username")
- }
- if !util.UIDMatcher.MatchString(strings.ToLower(request.User.Username)) {
- return nil, status.Errorf(codes.InvalidArgument, "invalid username: %s", request.User.Username)
- }
- update.Username = &request.User.Username
- } else if field == "nickname" {
- if workspaceGeneralSetting.DisallowChangeNickname {
- return nil, status.Errorf(codes.PermissionDenied, "permission denied: disallow change nickname")
- }
- update.Nickname = &request.User.Nickname
- } else if field == "email" {
- update.Email = &request.User.Email
- } else if field == "avatar_url" {
- update.AvatarURL = &request.User.AvatarUrl
- } else if field == "description" {
- update.Description = &request.User.Description
- } else if field == "role" {
- role := convertUserRoleToStore(request.User.Role)
- update.Role = &role
- } else if field == "password" {
- passwordHash, err := bcrypt.GenerateFromPassword([]byte(request.User.Password), bcrypt.DefaultCost)
- if err != nil {
- return nil, echo.NewHTTPError(http.StatusInternalServerError, "failed to generate password hash").SetInternal(err)
- }
- passwordHashStr := string(passwordHash)
- update.PasswordHash = &passwordHashStr
- } else if field == "state" {
- rowStatus := convertStateToStore(request.User.State)
- update.RowStatus = &rowStatus
- } else {
- return nil, status.Errorf(codes.InvalidArgument, "invalid update path: %s", field)
- }
- }
- updatedUser, err := s.Store.UpdateUser(ctx, update)
- if err != nil {
- return nil, status.Errorf(codes.Internal, "failed to update user: %v", err)
- }
- return convertUserFromStore(updatedUser), nil
- }
- func (s *APIV1Service) DeleteUser(ctx context.Context, request *v1pb.DeleteUserRequest) (*emptypb.Empty, error) {
- userID, err := ExtractUserIDFromName(request.Name)
- if err != nil {
- return nil, status.Errorf(codes.InvalidArgument, "invalid user name: %v", err)
- }
- currentUser, err := s.GetCurrentUser(ctx)
- if err != nil {
- return nil, status.Errorf(codes.Internal, "failed to get user: %v", err)
- }
- if currentUser.ID != userID && currentUser.Role != store.RoleAdmin && currentUser.Role != store.RoleHost {
- return nil, status.Errorf(codes.PermissionDenied, "permission denied")
- }
- user, err := s.Store.GetUser(ctx, &store.FindUser{ID: &userID})
- if err != nil {
- return nil, status.Errorf(codes.Internal, "failed to get user: %v", err)
- }
- if user == nil {
- return nil, status.Errorf(codes.NotFound, "user not found")
- }
- if err := s.Store.DeleteUser(ctx, &store.DeleteUser{
- ID: user.ID,
- }); err != nil {
- return nil, status.Errorf(codes.Internal, "failed to delete user: %v", err)
- }
- return &emptypb.Empty{}, nil
- }
- func getDefaultUserSetting(workspaceMemoRelatedSetting *storepb.WorkspaceMemoRelatedSetting) *v1pb.UserSetting {
- defaultVisibility := "PRIVATE"
- if workspaceMemoRelatedSetting.DefaultVisibility != "" {
- defaultVisibility = workspaceMemoRelatedSetting.DefaultVisibility
- }
- return &v1pb.UserSetting{
- Locale: "en",
- Appearance: "system",
- MemoVisibility: defaultVisibility,
- }
- }
- func (s *APIV1Service) GetUserSetting(ctx context.Context, _ *v1pb.GetUserSettingRequest) (*v1pb.UserSetting, error) {
- user, err := s.GetCurrentUser(ctx)
- if err != nil {
- return nil, status.Errorf(codes.Internal, "failed to get current user: %v", err)
- }
- workspaceMemoRelatedSetting, err := s.Store.GetWorkspaceMemoRelatedSetting(ctx)
- if err != nil {
- return nil, status.Errorf(codes.Internal, "failed to get workspace general setting: %v", err)
- }
- userSettings, err := s.Store.ListUserSettings(ctx, &store.FindUserSetting{
- UserID: &user.ID,
- })
- if err != nil {
- return nil, status.Errorf(codes.Internal, "failed to list user settings: %v", err)
- }
- // getDefaultUserSetting By workspaceSetting
- userSettingMessage := getDefaultUserSetting(workspaceMemoRelatedSetting)
- for _, setting := range userSettings {
- if setting.Key == storepb.UserSettingKey_LOCALE {
- userSettingMessage.Locale = setting.GetLocale()
- } else if setting.Key == storepb.UserSettingKey_APPEARANCE {
- userSettingMessage.Appearance = setting.GetAppearance()
- } else if setting.Key == storepb.UserSettingKey_MEMO_VISIBILITY {
- userSettingMessage.MemoVisibility = setting.GetMemoVisibility()
- }
- }
- return userSettingMessage, nil
- }
- func (s *APIV1Service) UpdateUserSetting(ctx context.Context, request *v1pb.UpdateUserSettingRequest) (*v1pb.UserSetting, error) {
- user, err := s.GetCurrentUser(ctx)
- if err != nil {
- return nil, status.Errorf(codes.Internal, "failed to get current user: %v", err)
- }
- if request.UpdateMask == nil || len(request.UpdateMask.Paths) == 0 {
- return nil, status.Errorf(codes.InvalidArgument, "update mask is empty")
- }
- for _, field := range request.UpdateMask.Paths {
- if field == "locale" {
- if _, err := s.Store.UpsertUserSetting(ctx, &storepb.UserSetting{
- UserId: user.ID,
- Key: storepb.UserSettingKey_LOCALE,
- Value: &storepb.UserSetting_Locale{
- Locale: request.Setting.Locale,
- },
- }); err != nil {
- return nil, status.Errorf(codes.Internal, "failed to upsert user setting: %v", err)
- }
- } else if field == "appearance" {
- if _, err := s.Store.UpsertUserSetting(ctx, &storepb.UserSetting{
- UserId: user.ID,
- Key: storepb.UserSettingKey_APPEARANCE,
- Value: &storepb.UserSetting_Appearance{
- Appearance: request.Setting.Appearance,
- },
- }); err != nil {
- return nil, status.Errorf(codes.Internal, "failed to upsert user setting: %v", err)
- }
- } else if field == "memo_visibility" {
- if _, err := s.Store.UpsertUserSetting(ctx, &storepb.UserSetting{
- UserId: user.ID,
- Key: storepb.UserSettingKey_MEMO_VISIBILITY,
- Value: &storepb.UserSetting_MemoVisibility{
- MemoVisibility: request.Setting.MemoVisibility,
- },
- }); err != nil {
- return nil, status.Errorf(codes.Internal, "failed to upsert user setting: %v", err)
- }
- } else {
- return nil, status.Errorf(codes.InvalidArgument, "invalid update path: %s", field)
- }
- }
- return s.GetUserSetting(ctx, &v1pb.GetUserSettingRequest{})
- }
- func (s *APIV1Service) ListUserAccessTokens(ctx context.Context, request *v1pb.ListUserAccessTokensRequest) (*v1pb.ListUserAccessTokensResponse, error) {
- userID, err := ExtractUserIDFromName(request.Name)
- if err != nil {
- return nil, status.Errorf(codes.InvalidArgument, "invalid user name: %v", err)
- }
- currentUser, err := s.GetCurrentUser(ctx)
- if err != nil {
- return nil, status.Errorf(codes.Internal, "failed to get current user: %v", err)
- }
- if currentUser == nil {
- return nil, status.Errorf(codes.PermissionDenied, "permission denied")
- }
- if currentUser.ID != userID {
- return nil, status.Errorf(codes.PermissionDenied, "permission denied")
- }
- userAccessTokens, err := s.Store.GetUserAccessTokens(ctx, userID)
- if err != nil {
- return nil, status.Errorf(codes.Internal, "failed to list access tokens: %v", err)
- }
- accessTokens := []*v1pb.UserAccessToken{}
- for _, userAccessToken := range userAccessTokens {
- claims := &ClaimsMessage{}
- _, err := jwt.ParseWithClaims(userAccessToken.AccessToken, claims, func(t *jwt.Token) (any, error) {
- if t.Method.Alg() != jwt.SigningMethodHS256.Name {
- return nil, errors.Errorf("unexpected access token signing method=%v, expect %v", t.Header["alg"], jwt.SigningMethodHS256)
- }
- if kid, ok := t.Header["kid"].(string); ok {
- if kid == "v1" {
- return []byte(s.Secret), nil
- }
- }
- return nil, errors.Errorf("unexpected access token kid=%v", t.Header["kid"])
- })
- if err != nil {
- // If the access token is invalid or expired, just ignore it.
- continue
- }
- userAccessToken := &v1pb.UserAccessToken{
- AccessToken: userAccessToken.AccessToken,
- Description: userAccessToken.Description,
- IssuedAt: timestamppb.New(claims.IssuedAt.Time),
- }
- if claims.ExpiresAt != nil {
- userAccessToken.ExpiresAt = timestamppb.New(claims.ExpiresAt.Time)
- }
- accessTokens = append(accessTokens, userAccessToken)
- }
- // Sort by issued time in descending order.
- slices.SortFunc(accessTokens, func(i, j *v1pb.UserAccessToken) int {
- return int(i.IssuedAt.Seconds - j.IssuedAt.Seconds)
- })
- response := &v1pb.ListUserAccessTokensResponse{
- AccessTokens: accessTokens,
- }
- return response, nil
- }
- func (s *APIV1Service) CreateUserAccessToken(ctx context.Context, request *v1pb.CreateUserAccessTokenRequest) (*v1pb.UserAccessToken, error) {
- userID, err := ExtractUserIDFromName(request.Name)
- if err != nil {
- return nil, status.Errorf(codes.InvalidArgument, "invalid user name: %v", err)
- }
- currentUser, err := s.GetCurrentUser(ctx)
- if err != nil {
- return nil, status.Errorf(codes.Internal, "failed to get current user: %v", err)
- }
- if currentUser == nil {
- return nil, status.Errorf(codes.PermissionDenied, "permission denied")
- }
- if currentUser.ID != userID {
- return nil, status.Errorf(codes.PermissionDenied, "permission denied")
- }
- expiresAt := time.Time{}
- if request.ExpiresAt != nil {
- expiresAt = request.ExpiresAt.AsTime()
- }
- accessToken, err := GenerateAccessToken(currentUser.Username, currentUser.ID, expiresAt, []byte(s.Secret))
- if err != nil {
- return nil, status.Errorf(codes.Internal, "failed to generate access token: %v", err)
- }
- claims := &ClaimsMessage{}
- _, err = jwt.ParseWithClaims(accessToken, claims, func(t *jwt.Token) (any, error) {
- if t.Method.Alg() != jwt.SigningMethodHS256.Name {
- return nil, errors.Errorf("unexpected access token signing method=%v, expect %v", t.Header["alg"], jwt.SigningMethodHS256)
- }
- if kid, ok := t.Header["kid"].(string); ok {
- if kid == "v1" {
- return []byte(s.Secret), nil
- }
- }
- return nil, errors.Errorf("unexpected access token kid=%v", t.Header["kid"])
- })
- if err != nil {
- return nil, status.Errorf(codes.Internal, "failed to parse access token: %v", err)
- }
- // Upsert the access token to user setting store.
- if err := s.UpsertAccessTokenToStore(ctx, currentUser, accessToken, request.Description); err != nil {
- return nil, status.Errorf(codes.Internal, "failed to upsert access token to store: %v", err)
- }
- userAccessToken := &v1pb.UserAccessToken{
- AccessToken: accessToken,
- Description: request.Description,
- IssuedAt: timestamppb.New(claims.IssuedAt.Time),
- }
- if claims.ExpiresAt != nil {
- userAccessToken.ExpiresAt = timestamppb.New(claims.ExpiresAt.Time)
- }
- return userAccessToken, nil
- }
- func (s *APIV1Service) DeleteUserAccessToken(ctx context.Context, request *v1pb.DeleteUserAccessTokenRequest) (*emptypb.Empty, error) {
- userID, err := ExtractUserIDFromName(request.Name)
- if err != nil {
- return nil, status.Errorf(codes.InvalidArgument, "invalid user name: %v", err)
- }
- currentUser, err := s.GetCurrentUser(ctx)
- if err != nil {
- return nil, status.Errorf(codes.Internal, "failed to get current user: %v", err)
- }
- if currentUser == nil {
- return nil, status.Errorf(codes.PermissionDenied, "permission denied")
- }
- if currentUser.ID != userID {
- return nil, status.Errorf(codes.PermissionDenied, "permission denied")
- }
- userAccessTokens, err := s.Store.GetUserAccessTokens(ctx, currentUser.ID)
- if err != nil {
- return nil, status.Errorf(codes.Internal, "failed to list access tokens: %v", err)
- }
- updatedUserAccessTokens := []*storepb.AccessTokensUserSetting_AccessToken{}
- for _, userAccessToken := range userAccessTokens {
- if userAccessToken.AccessToken == request.AccessToken {
- continue
- }
- updatedUserAccessTokens = append(updatedUserAccessTokens, userAccessToken)
- }
- if _, err := s.Store.UpsertUserSetting(ctx, &storepb.UserSetting{
- UserId: currentUser.ID,
- Key: storepb.UserSettingKey_ACCESS_TOKENS,
- Value: &storepb.UserSetting_AccessTokens{
- AccessTokens: &storepb.AccessTokensUserSetting{
- AccessTokens: updatedUserAccessTokens,
- },
- },
- }); err != nil {
- return nil, status.Errorf(codes.Internal, "failed to upsert user setting: %v", err)
- }
- return &emptypb.Empty{}, nil
- }
- func (s *APIV1Service) UpsertAccessTokenToStore(ctx context.Context, user *store.User, accessToken, description string) error {
- userAccessTokens, err := s.Store.GetUserAccessTokens(ctx, user.ID)
- if err != nil {
- return errors.Wrap(err, "failed to get user access tokens")
- }
- userAccessToken := storepb.AccessTokensUserSetting_AccessToken{
- AccessToken: accessToken,
- Description: description,
- }
- userAccessTokens = append(userAccessTokens, &userAccessToken)
- if _, err := s.Store.UpsertUserSetting(ctx, &storepb.UserSetting{
- UserId: user.ID,
- Key: storepb.UserSettingKey_ACCESS_TOKENS,
- Value: &storepb.UserSetting_AccessTokens{
- AccessTokens: &storepb.AccessTokensUserSetting{
- AccessTokens: userAccessTokens,
- },
- },
- }); err != nil {
- return errors.Wrap(err, "failed to upsert user setting")
- }
- return nil
- }
- func convertUserFromStore(user *store.User) *v1pb.User {
- userpb := &v1pb.User{
- Name: fmt.Sprintf("%s%d", UserNamePrefix, user.ID),
- State: convertStateFromStore(user.RowStatus),
- CreateTime: timestamppb.New(time.Unix(user.CreatedTs, 0)),
- UpdateTime: timestamppb.New(time.Unix(user.UpdatedTs, 0)),
- Role: convertUserRoleFromStore(user.Role),
- Username: user.Username,
- Email: user.Email,
- Nickname: user.Nickname,
- AvatarUrl: user.AvatarURL,
- Description: user.Description,
- }
- // Use the avatar URL instead of raw base64 image data to reduce the response size.
- if user.AvatarURL != "" {
- userpb.AvatarUrl = fmt.Sprintf("/file/%s/avatar", userpb.Name)
- }
- return userpb
- }
- func convertUserRoleFromStore(role store.Role) v1pb.User_Role {
- switch role {
- case store.RoleHost:
- return v1pb.User_HOST
- case store.RoleAdmin:
- return v1pb.User_ADMIN
- case store.RoleUser:
- return v1pb.User_USER
- default:
- return v1pb.User_ROLE_UNSPECIFIED
- }
- }
- func convertUserRoleToStore(role v1pb.User_Role) store.Role {
- switch role {
- case v1pb.User_HOST:
- return store.RoleHost
- case v1pb.User_ADMIN:
- return store.RoleAdmin
- case v1pb.User_USER:
- return store.RoleUser
- default:
- return store.RoleUser
- }
- }
- func extractImageInfo(dataURI string) (string, string, error) {
- dataURIRegex := regexp.MustCompile(`^data:(?P<type>.+);base64,(?P<base64>.+)`)
- matches := dataURIRegex.FindStringSubmatch(dataURI)
- if len(matches) != 3 {
- return "", "", errors.New("Invalid data URI format")
- }
- imageType := matches[1]
- base64Data := matches[2]
- return imageType, base64Data, nil
- }
|