mirror of
https://github.com/openclaw/openclaw.git
synced 2026-05-07 21:30:42 +00:00
Preserve contributor credit and land the narrowed sessions_spawn ACP-field handling with follow-up transcript redaction and ACP resume ownership hardening. Targeted Blacksmith validation passed for the touched sessions/ACP tests.
626 lines
19 KiB
TypeScript
626 lines
19 KiB
TypeScript
import { beforeAll, beforeEach, describe, expect, it, vi } from "vitest";
|
|
|
|
const hoisted = vi.hoisted(() => {
|
|
const spawnSubagentDirectMock = vi.fn();
|
|
const spawnAcpDirectMock = vi.fn();
|
|
const registerSubagentRunMock = vi.fn();
|
|
return {
|
|
spawnSubagentDirectMock,
|
|
spawnAcpDirectMock,
|
|
registerSubagentRunMock,
|
|
};
|
|
});
|
|
|
|
vi.mock("../subagent-spawn.js", () => ({
|
|
SUBAGENT_SPAWN_CONTEXT_MODES: ["isolated", "fork"],
|
|
SUBAGENT_SPAWN_MODES: ["run", "session"],
|
|
spawnSubagentDirect: (...args: unknown[]) => hoisted.spawnSubagentDirectMock(...args),
|
|
}));
|
|
|
|
vi.mock("../acp-spawn.js", () => ({
|
|
ACP_SPAWN_MODES: ["run", "session"],
|
|
ACP_SPAWN_STREAM_TARGETS: ["parent"],
|
|
isSpawnAcpAcceptedResult: (result: { status?: string }) => result?.status === "accepted",
|
|
spawnAcpDirect: (...args: unknown[]) => hoisted.spawnAcpDirectMock(...args),
|
|
}));
|
|
|
|
vi.mock("../subagent-registry.js", () => ({
|
|
registerSubagentRun: (...args: unknown[]) => hoisted.registerSubagentRunMock(...args),
|
|
}));
|
|
|
|
let createSessionsSpawnTool: typeof import("./sessions-spawn-tool.js").createSessionsSpawnTool;
|
|
let acpRuntimeRegistry: typeof import("../../acp/runtime/registry.js");
|
|
|
|
describe("sessions_spawn tool", () => {
|
|
beforeAll(async () => {
|
|
({ createSessionsSpawnTool } = await import("./sessions-spawn-tool.js"));
|
|
acpRuntimeRegistry = await import("../../acp/runtime/registry.js");
|
|
});
|
|
|
|
beforeEach(() => {
|
|
acpRuntimeRegistry.__testing.resetAcpRuntimeBackendsForTests();
|
|
hoisted.spawnSubagentDirectMock.mockReset().mockResolvedValue({
|
|
status: "accepted",
|
|
childSessionKey: "agent:main:subagent:1",
|
|
runId: "run-subagent",
|
|
});
|
|
hoisted.spawnAcpDirectMock.mockReset().mockResolvedValue({
|
|
status: "accepted",
|
|
childSessionKey: "agent:codex:acp:1",
|
|
runId: "run-acp",
|
|
});
|
|
hoisted.registerSubagentRunMock.mockReset();
|
|
});
|
|
|
|
function registerAcpBackendForTest() {
|
|
acpRuntimeRegistry.registerAcpRuntimeBackend({
|
|
id: "acpx",
|
|
runtime: {
|
|
ensureSession: vi.fn(async () => ({
|
|
sessionKey: "agent:codex:acp:1",
|
|
backend: "acpx",
|
|
runtimeSessionName: "codex",
|
|
})),
|
|
async *runTurn() {},
|
|
cancel: vi.fn(async () => {}),
|
|
close: vi.fn(async () => {}),
|
|
},
|
|
});
|
|
}
|
|
|
|
it("hides ACP runtime affordances when no ACP backend is loaded", () => {
|
|
const tool = createSessionsSpawnTool();
|
|
const schema = tool.parameters as {
|
|
properties?: {
|
|
runtime?: { enum?: string[] };
|
|
resumeSessionId?: { description?: string };
|
|
streamTo?: { description?: string };
|
|
};
|
|
};
|
|
|
|
expect(tool.displaySummary).toBe("Spawn sub-agent sessions.");
|
|
expect(tool.description).not.toContain("ACP");
|
|
expect(tool.description).not.toContain('runtime="acp"');
|
|
expect(schema.properties?.runtime?.enum).toEqual(["subagent"]);
|
|
expect(schema.properties?.resumeSessionId).toBeUndefined();
|
|
expect(schema.properties?.streamTo).toBeUndefined();
|
|
});
|
|
|
|
it("advertises ACP runtime affordances when an ACP backend is loaded", () => {
|
|
registerAcpBackendForTest();
|
|
|
|
const tool = createSessionsSpawnTool();
|
|
const schema = tool.parameters as {
|
|
properties?: {
|
|
runtime?: { enum?: string[] };
|
|
resumeSessionId?: { description?: string };
|
|
streamTo?: { description?: string };
|
|
};
|
|
};
|
|
|
|
expect(tool.displaySummary).toBe("Spawn sub-agent or ACP sessions.");
|
|
expect(tool.description).toContain('runtime="acp"');
|
|
expect(schema.properties?.runtime?.enum).toEqual(["subagent", "acp"]);
|
|
expect(schema.properties?.resumeSessionId).toBeDefined();
|
|
expect(schema.properties?.streamTo).toBeDefined();
|
|
expect(schema.properties?.resumeSessionId?.description).toContain("ACP-only resume target");
|
|
expect(schema.properties?.resumeSessionId?.description).toContain(
|
|
'ignored for runtime="subagent"',
|
|
);
|
|
expect(schema.properties?.resumeSessionId?.description).toContain(
|
|
"already recorded for this requester",
|
|
);
|
|
expect(schema.properties?.streamTo?.description).toContain("ACP-only stream target");
|
|
expect(schema.properties?.streamTo?.description).toContain('ignored for runtime="subagent"');
|
|
});
|
|
|
|
it("hides ACP runtime affordances when the ACP backend is unhealthy", () => {
|
|
acpRuntimeRegistry.registerAcpRuntimeBackend({
|
|
id: "acpx",
|
|
healthy: () => false,
|
|
runtime: {
|
|
ensureSession: vi.fn(async () => ({
|
|
sessionKey: "agent:codex:acp:1",
|
|
backend: "acpx",
|
|
runtimeSessionName: "codex",
|
|
})),
|
|
async *runTurn() {},
|
|
cancel: vi.fn(async () => {}),
|
|
close: vi.fn(async () => {}),
|
|
},
|
|
});
|
|
|
|
const tool = createSessionsSpawnTool();
|
|
const schema = tool.parameters as { properties?: { runtime?: { enum?: string[] } } };
|
|
|
|
expect(tool.description).not.toContain("ACP");
|
|
expect(schema.properties?.runtime?.enum).toEqual(["subagent"]);
|
|
});
|
|
|
|
it("rejects stale ACP runtime calls when no ACP backend is loaded", async () => {
|
|
const tool = createSessionsSpawnTool();
|
|
|
|
const result = await tool.execute("call-acp-unavailable", {
|
|
runtime: "acp",
|
|
task: "investigate",
|
|
agentId: "codex",
|
|
});
|
|
|
|
expect(result.details).toMatchObject({
|
|
status: "error",
|
|
role: "codex",
|
|
});
|
|
expect(JSON.stringify(result.details)).toContain("no ACP runtime backend is loaded");
|
|
expect(hoisted.spawnAcpDirectMock).not.toHaveBeenCalled();
|
|
expect(hoisted.spawnSubagentDirectMock).not.toHaveBeenCalled();
|
|
});
|
|
|
|
it("hides ACP runtime affordances when ACP policy is disabled", () => {
|
|
registerAcpBackendForTest();
|
|
|
|
const tool = createSessionsSpawnTool({
|
|
config: {
|
|
acp: { enabled: false },
|
|
},
|
|
});
|
|
const schema = tool.parameters as { properties?: { runtime?: { enum?: string[] } } };
|
|
|
|
expect(tool.description).not.toContain("ACP");
|
|
expect(schema.properties?.runtime?.enum).toEqual(["subagent"]);
|
|
});
|
|
|
|
it("advertises ACP runtime affordances when only automatic ACP dispatch is disabled", () => {
|
|
registerAcpBackendForTest();
|
|
|
|
const tool = createSessionsSpawnTool({
|
|
config: {
|
|
acp: {
|
|
enabled: true,
|
|
dispatch: { enabled: false },
|
|
},
|
|
},
|
|
});
|
|
const schema = tool.parameters as { properties?: { runtime?: { enum?: string[] } } };
|
|
|
|
expect(tool.description).toContain('runtime="acp"');
|
|
expect(schema.properties?.runtime?.enum).toEqual(["subagent", "acp"]);
|
|
});
|
|
|
|
it("uses subagent runtime by default", async () => {
|
|
const tool = createSessionsSpawnTool({
|
|
agentSessionKey: "agent:main:main",
|
|
agentChannel: "quietchat",
|
|
agentAccountId: "default",
|
|
agentTo: "channel:123",
|
|
agentThreadId: "456",
|
|
});
|
|
|
|
const result = await tool.execute("call-1", {
|
|
task: "build feature",
|
|
agentId: "main",
|
|
model: "anthropic/claude-sonnet-4-6",
|
|
thinking: "medium",
|
|
runTimeoutSeconds: 5,
|
|
thread: true,
|
|
mode: "session",
|
|
cleanup: "keep",
|
|
});
|
|
|
|
expect(result.details).toMatchObject({
|
|
status: "accepted",
|
|
childSessionKey: "agent:main:subagent:1",
|
|
runId: "run-subagent",
|
|
});
|
|
expect(result.details).not.toHaveProperty("role");
|
|
expect(hoisted.spawnSubagentDirectMock).toHaveBeenCalledWith(
|
|
expect.objectContaining({
|
|
task: "build feature",
|
|
agentId: "main",
|
|
model: "anthropic/claude-sonnet-4-6",
|
|
thinking: "medium",
|
|
runTimeoutSeconds: 5,
|
|
thread: true,
|
|
mode: "session",
|
|
cleanup: "keep",
|
|
}),
|
|
expect.objectContaining({
|
|
agentSessionKey: "agent:main:main",
|
|
}),
|
|
);
|
|
expect(hoisted.spawnAcpDirectMock).not.toHaveBeenCalled();
|
|
});
|
|
|
|
it.each([
|
|
{ status: "error" as const, error: "spawn failed" },
|
|
{ status: "forbidden" as const, error: "not allowed" },
|
|
])("adds requested role to forwarded subagent $status results", async (spawnResult) => {
|
|
hoisted.spawnSubagentDirectMock.mockResolvedValueOnce(spawnResult);
|
|
const tool = createSessionsSpawnTool({
|
|
agentSessionKey: "agent:main:main",
|
|
});
|
|
|
|
const result = await tool.execute("call-role-error", {
|
|
task: "build feature",
|
|
agentId: "reviewer",
|
|
});
|
|
|
|
expect(result.details).toMatchObject({
|
|
...spawnResult,
|
|
role: "reviewer",
|
|
});
|
|
});
|
|
|
|
it("does not add role to forwarded failures when agentId is absent", async () => {
|
|
hoisted.spawnSubagentDirectMock.mockResolvedValueOnce({
|
|
status: "error",
|
|
error: "spawn failed",
|
|
});
|
|
const tool = createSessionsSpawnTool({
|
|
agentSessionKey: "agent:main:main",
|
|
});
|
|
|
|
const result = await tool.execute("call-no-role-error", {
|
|
task: "build feature",
|
|
});
|
|
|
|
expect(result.details).toMatchObject({
|
|
status: "error",
|
|
error: "spawn failed",
|
|
});
|
|
expect(result.details).not.toHaveProperty("role");
|
|
});
|
|
|
|
it("supports legacy timeoutSeconds alias", async () => {
|
|
const tool = createSessionsSpawnTool({
|
|
agentSessionKey: "agent:main:main",
|
|
});
|
|
|
|
await tool.execute("call-timeout-alias", {
|
|
task: "do thing",
|
|
timeoutSeconds: 2,
|
|
});
|
|
|
|
expect(hoisted.spawnSubagentDirectMock).toHaveBeenCalledWith(
|
|
expect.objectContaining({
|
|
task: "do thing",
|
|
runTimeoutSeconds: 2,
|
|
}),
|
|
expect.any(Object),
|
|
);
|
|
});
|
|
|
|
it("passes inherited workspaceDir from tool context, not from tool args", async () => {
|
|
const tool = createSessionsSpawnTool({
|
|
agentSessionKey: "agent:main:main",
|
|
workspaceDir: "/parent/workspace",
|
|
});
|
|
|
|
await tool.execute("call-ws", {
|
|
task: "inspect AGENTS",
|
|
workspaceDir: "/tmp/attempted-override",
|
|
});
|
|
|
|
expect(hoisted.spawnSubagentDirectMock).toHaveBeenCalledWith(
|
|
expect.any(Object),
|
|
expect.objectContaining({
|
|
workspaceDir: "/parent/workspace",
|
|
}),
|
|
);
|
|
});
|
|
|
|
it("passes lightContext through to subagent spawns", async () => {
|
|
const tool = createSessionsSpawnTool({
|
|
agentSessionKey: "agent:main:main",
|
|
});
|
|
|
|
await tool.execute("call-light", {
|
|
task: "summarize this",
|
|
lightContext: true,
|
|
});
|
|
|
|
expect(hoisted.spawnSubagentDirectMock).toHaveBeenCalledWith(
|
|
expect.objectContaining({
|
|
task: "summarize this",
|
|
lightContext: true,
|
|
}),
|
|
expect.any(Object),
|
|
);
|
|
});
|
|
|
|
it('rejects lightContext when runtime is not "subagent"', async () => {
|
|
registerAcpBackendForTest();
|
|
const tool = createSessionsSpawnTool({
|
|
agentSessionKey: "agent:main:main",
|
|
});
|
|
|
|
await expect(
|
|
tool.execute("call-light-acp", {
|
|
runtime: "acp",
|
|
task: "summarize this",
|
|
lightContext: true,
|
|
}),
|
|
).rejects.toThrow("lightContext is only supported for runtime='subagent'.");
|
|
|
|
expect(hoisted.spawnSubagentDirectMock).not.toHaveBeenCalled();
|
|
expect(hoisted.spawnAcpDirectMock).not.toHaveBeenCalled();
|
|
});
|
|
|
|
it("routes to ACP runtime when runtime=acp", async () => {
|
|
registerAcpBackendForTest();
|
|
const tool = createSessionsSpawnTool({
|
|
agentSessionKey: "agent:main:main",
|
|
agentChannel: "quietchat",
|
|
agentAccountId: "default",
|
|
agentTo: "channel:123",
|
|
agentThreadId: "456",
|
|
});
|
|
|
|
const result = await tool.execute("call-2", {
|
|
runtime: "acp",
|
|
task: "investigate the failing CI run",
|
|
agentId: "codex",
|
|
cwd: "/workspace",
|
|
runTimeoutSeconds: 45,
|
|
thread: true,
|
|
mode: "session",
|
|
streamTo: "parent",
|
|
});
|
|
|
|
expect(result.details).toMatchObject({
|
|
status: "accepted",
|
|
childSessionKey: "agent:codex:acp:1",
|
|
runId: "run-acp",
|
|
});
|
|
expect(hoisted.spawnAcpDirectMock).toHaveBeenCalledWith(
|
|
expect.objectContaining({
|
|
task: "investigate the failing CI run",
|
|
agentId: "codex",
|
|
cwd: "/workspace",
|
|
runTimeoutSeconds: 45,
|
|
thread: true,
|
|
mode: "session",
|
|
streamTo: "parent",
|
|
}),
|
|
expect.objectContaining({
|
|
agentSessionKey: "agent:main:main",
|
|
}),
|
|
);
|
|
expect(hoisted.spawnSubagentDirectMock).not.toHaveBeenCalled();
|
|
expect(hoisted.registerSubagentRunMock).not.toHaveBeenCalled();
|
|
});
|
|
|
|
it("forwards model override to ACP runtime spawns", async () => {
|
|
registerAcpBackendForTest();
|
|
const tool = createSessionsSpawnTool({
|
|
agentSessionKey: "agent:main:main",
|
|
});
|
|
|
|
await tool.execute("call-2-model", {
|
|
runtime: "acp",
|
|
task: "investigate the failing CI run",
|
|
agentId: "codex",
|
|
model: "github-copilot/claude-sonnet-4.6",
|
|
});
|
|
|
|
expect(hoisted.spawnAcpDirectMock).toHaveBeenCalledWith(
|
|
expect.objectContaining({
|
|
task: "investigate the failing CI run",
|
|
agentId: "codex",
|
|
model: "github-copilot/claude-sonnet-4.6",
|
|
}),
|
|
expect.any(Object),
|
|
);
|
|
});
|
|
|
|
it("adds requested role to forwarded ACP failures", async () => {
|
|
registerAcpBackendForTest();
|
|
hoisted.spawnAcpDirectMock.mockResolvedValueOnce({
|
|
status: "forbidden",
|
|
error: "ACP disabled",
|
|
errorCode: "acp_disabled",
|
|
});
|
|
const tool = createSessionsSpawnTool({
|
|
agentSessionKey: "agent:main:main",
|
|
});
|
|
|
|
const result = await tool.execute("call-acp-role-error", {
|
|
runtime: "acp",
|
|
task: "investigate",
|
|
agentId: "codex",
|
|
});
|
|
|
|
expect(result.details).toMatchObject({
|
|
status: "forbidden",
|
|
error: "ACP disabled",
|
|
errorCode: "acp_disabled",
|
|
role: "codex",
|
|
});
|
|
});
|
|
|
|
it("forwards ACP sandbox options", async () => {
|
|
registerAcpBackendForTest();
|
|
const tool = createSessionsSpawnTool({
|
|
agentSessionKey: "agent:main:subagent:parent",
|
|
});
|
|
|
|
await tool.execute("call-2b", {
|
|
runtime: "acp",
|
|
task: "investigate",
|
|
agentId: "codex",
|
|
sandbox: "require",
|
|
});
|
|
|
|
expect(hoisted.spawnAcpDirectMock).toHaveBeenCalledWith(
|
|
expect.objectContaining({
|
|
task: "investigate",
|
|
sandbox: "require",
|
|
}),
|
|
expect.objectContaining({
|
|
agentSessionKey: "agent:main:subagent:parent",
|
|
}),
|
|
);
|
|
expect(hoisted.registerSubagentRunMock).toHaveBeenCalledWith(
|
|
expect.objectContaining({
|
|
runId: "run-acp",
|
|
childSessionKey: "agent:codex:acp:1",
|
|
requesterSessionKey: "agent:main:subagent:parent",
|
|
task: "investigate",
|
|
cleanup: "keep",
|
|
spawnMode: "run",
|
|
}),
|
|
);
|
|
});
|
|
|
|
it("rejects ACP runtime calls from sandboxed requester sessions", async () => {
|
|
registerAcpBackendForTest();
|
|
const tool = createSessionsSpawnTool({
|
|
agentSessionKey: "agent:main:subagent:parent",
|
|
sandboxed: true,
|
|
});
|
|
|
|
const result = await tool.execute("call-sandboxed-acp", {
|
|
runtime: "acp",
|
|
task: "investigate",
|
|
agentId: "codex",
|
|
});
|
|
|
|
expect(result.details).toMatchObject({
|
|
status: "error",
|
|
role: "codex",
|
|
});
|
|
expect(JSON.stringify(result.details)).toContain("sandboxed sessions");
|
|
expect(hoisted.spawnAcpDirectMock).not.toHaveBeenCalled();
|
|
});
|
|
|
|
it("passes resumeSessionId through to ACP spawns", async () => {
|
|
registerAcpBackendForTest();
|
|
const tool = createSessionsSpawnTool({
|
|
agentSessionKey: "agent:main:main",
|
|
});
|
|
|
|
await tool.execute("call-2c", {
|
|
runtime: "acp",
|
|
task: "resume prior work",
|
|
agentId: "codex",
|
|
resumeSessionId: "7f4a78e0-f6be-43fe-855c-c1c4fd229bc4",
|
|
});
|
|
|
|
expect(hoisted.spawnAcpDirectMock).toHaveBeenCalledWith(
|
|
expect.objectContaining({
|
|
task: "resume prior work",
|
|
agentId: "codex",
|
|
resumeSessionId: "7f4a78e0-f6be-43fe-855c-c1c4fd229bc4",
|
|
}),
|
|
expect.any(Object),
|
|
);
|
|
});
|
|
|
|
it("ignores ACP-only fields for subagent spawns", async () => {
|
|
const tool = createSessionsSpawnTool({
|
|
agentSessionKey: "agent:main:main",
|
|
});
|
|
|
|
const result = await tool.execute("call-guard", {
|
|
runtime: "subagent",
|
|
task: "resume prior work",
|
|
resumeSessionId: "7f4a78e0-f6be-43fe-855c-c1c4fd229bc4",
|
|
streamTo: "parent",
|
|
});
|
|
|
|
expect(result.details).toMatchObject({
|
|
status: "accepted",
|
|
childSessionKey: "agent:main:subagent:1",
|
|
runId: "run-subagent",
|
|
});
|
|
expect(hoisted.spawnSubagentDirectMock).toHaveBeenCalledWith(
|
|
expect.objectContaining({
|
|
task: "resume prior work",
|
|
}),
|
|
expect.objectContaining({
|
|
agentSessionKey: "agent:main:main",
|
|
}),
|
|
);
|
|
expect(hoisted.spawnSubagentDirectMock.mock.calls[0]?.[0]).not.toHaveProperty(
|
|
"resumeSessionId",
|
|
);
|
|
expect(hoisted.spawnSubagentDirectMock.mock.calls[0]?.[0]).not.toHaveProperty("streamTo");
|
|
expect(hoisted.spawnAcpDirectMock).not.toHaveBeenCalled();
|
|
});
|
|
|
|
it("rejects attachments for ACP runtime", async () => {
|
|
registerAcpBackendForTest();
|
|
const tool = createSessionsSpawnTool({
|
|
agentSessionKey: "agent:main:main",
|
|
agentChannel: "quietchat",
|
|
agentAccountId: "default",
|
|
agentTo: "channel:123",
|
|
agentThreadId: "456",
|
|
});
|
|
|
|
const result = await tool.execute("call-3", {
|
|
runtime: "acp",
|
|
task: "analyze file",
|
|
attachments: [{ name: "a.txt", content: "hello", encoding: "utf8" }],
|
|
});
|
|
|
|
expect(result.details).toMatchObject({
|
|
status: "error",
|
|
});
|
|
const details = result.details as { error?: string };
|
|
expect(details.error).toContain("attachments are currently unsupported for runtime=acp");
|
|
expect(hoisted.spawnAcpDirectMock).not.toHaveBeenCalled();
|
|
expect(hoisted.spawnSubagentDirectMock).not.toHaveBeenCalled();
|
|
});
|
|
|
|
it('ignores streamTo when runtime is omitted and defaults to "subagent"', async () => {
|
|
const tool = createSessionsSpawnTool({
|
|
agentSessionKey: "agent:main:main",
|
|
});
|
|
|
|
const result = await tool.execute("call-3b", {
|
|
task: "analyze file",
|
|
resumeSessionId: "7f4a78e0-f6be-43fe-855c-c1c4fd229bc4",
|
|
streamTo: "parent",
|
|
});
|
|
|
|
expect(result.details).toMatchObject({
|
|
status: "accepted",
|
|
childSessionKey: "agent:main:subagent:1",
|
|
runId: "run-subagent",
|
|
});
|
|
expect(hoisted.spawnAcpDirectMock).not.toHaveBeenCalled();
|
|
expect(hoisted.spawnSubagentDirectMock).toHaveBeenCalledWith(
|
|
expect.objectContaining({
|
|
task: "analyze file",
|
|
}),
|
|
expect.any(Object),
|
|
);
|
|
expect(hoisted.spawnSubagentDirectMock.mock.calls[0]?.[0]).not.toHaveProperty(
|
|
"resumeSessionId",
|
|
);
|
|
expect(hoisted.spawnSubagentDirectMock.mock.calls[0]?.[0]).not.toHaveProperty("streamTo");
|
|
});
|
|
|
|
it("keeps attachment content schema unconstrained for llama.cpp grammar safety", () => {
|
|
const tool = createSessionsSpawnTool();
|
|
const schema = tool.parameters as {
|
|
properties?: {
|
|
attachments?: {
|
|
items?: {
|
|
properties?: {
|
|
content?: {
|
|
type?: string;
|
|
maxLength?: number;
|
|
};
|
|
};
|
|
};
|
|
};
|
|
};
|
|
};
|
|
|
|
const contentSchema = schema.properties?.attachments?.items?.properties?.content;
|
|
expect(contentSchema?.type).toBe("string");
|
|
expect(contentSchema?.maxLength).toBeUndefined();
|
|
});
|
|
});
|