mirror of
https://github.com/openclaw/openclaw.git
synced 2026-03-13 11:00:50 +00:00
* add web search to onboarding flow * remove post onboarding step (now redundant) * post-onboarding nudge if no web search set up * address comments * fix test mocking * add enabled: false assertion to the no-key test * --skip-search cli flag * use provider that a user has a key for * add assertions, replace the duplicated switch blocks * test for quickstart fast-path with existing config key * address comments * cover quickstart falls through to key test * bring back key source * normalize secret inputs instead of direct string trimming * preserve enabled: false if it's already set * handle missing API keys in flow * doc updates * hasExistingKey to detect both plaintext strings and SecretRef objects * preserve enabled state only on the "keep current" paths * add test for preserving * better gate flows * guard against invalid provider values in config * Update src/commands/configure.wizard.ts Co-authored-by: greptile-apps[bot] <165735046+greptile-apps[bot]@users.noreply.github.com> * format fix * only mentions env var when it's actually available * search apiKey fields now typed as SecretInput * if no provider check if any search provider key is detectable * handle both kimi keys * remove .filter(Boolean) * do not disable web_search after user enables it * update resolveSearchProvider * fix(onboarding): skip search key prompt in ref mode * fix: add onboarding web search step (#34009) (thanks @kesku) --------- Co-authored-by: greptile-apps[bot] <165735046+greptile-apps[bot]@users.noreply.github.com> Co-authored-by: Shadow <hi@shadowing.dev>
554 lines
19 KiB
TypeScript
554 lines
19 KiB
TypeScript
import { formatCliCommand } from "../cli/command-format.js";
|
||
import type {
|
||
GatewayAuthChoice,
|
||
OnboardMode,
|
||
OnboardOptions,
|
||
ResetScope,
|
||
} from "../commands/onboard-types.js";
|
||
import type { OpenClawConfig } from "../config/config.js";
|
||
import {
|
||
DEFAULT_GATEWAY_PORT,
|
||
readConfigFileSnapshot,
|
||
resolveGatewayPort,
|
||
writeConfigFile,
|
||
} from "../config/config.js";
|
||
import { normalizeSecretInputString } from "../config/types.secrets.js";
|
||
import type { RuntimeEnv } from "../runtime.js";
|
||
import { defaultRuntime } from "../runtime.js";
|
||
import { resolveUserPath } from "../utils.js";
|
||
import { resolveOnboardingSecretInputString } from "./onboarding.secret-input.js";
|
||
import type { QuickstartGatewayDefaults, WizardFlow } from "./onboarding.types.js";
|
||
import { WizardCancelledError, type WizardPrompter } from "./prompts.js";
|
||
|
||
async function requireRiskAcknowledgement(params: {
|
||
opts: OnboardOptions;
|
||
prompter: WizardPrompter;
|
||
}) {
|
||
if (params.opts.acceptRisk === true) {
|
||
return;
|
||
}
|
||
|
||
await params.prompter.note(
|
||
[
|
||
"Security warning — please read.",
|
||
"",
|
||
"OpenClaw is a hobby project and still in beta. Expect sharp edges.",
|
||
"By default, OpenClaw is a personal agent: one trusted operator boundary.",
|
||
"This bot can read files and run actions if tools are enabled.",
|
||
"A bad prompt can trick it into doing unsafe things.",
|
||
"",
|
||
"OpenClaw is not a hostile multi-tenant boundary by default.",
|
||
"If multiple users can message one tool-enabled agent, they share that delegated tool authority.",
|
||
"",
|
||
"If you’re not comfortable with security hardening and access control, don’t run OpenClaw.",
|
||
"Ask someone experienced to help before enabling tools or exposing it to the internet.",
|
||
"",
|
||
"Recommended baseline:",
|
||
"- Pairing/allowlists + mention gating.",
|
||
"- Multi-user/shared inbox: split trust boundaries (separate gateway/credentials, ideally separate OS users/hosts).",
|
||
"- Sandbox + least-privilege tools.",
|
||
"- Shared inboxes: isolate DM sessions (`session.dmScope: per-channel-peer`) and keep tool access minimal.",
|
||
"- Keep secrets out of the agent’s reachable filesystem.",
|
||
"- Use the strongest available model for any bot with tools or untrusted inboxes.",
|
||
"",
|
||
"Run regularly:",
|
||
"openclaw security audit --deep",
|
||
"openclaw security audit --fix",
|
||
"",
|
||
"Must read: https://docs.openclaw.ai/gateway/security",
|
||
].join("\n"),
|
||
"Security",
|
||
);
|
||
|
||
const ok = await params.prompter.confirm({
|
||
message:
|
||
"I understand this is personal-by-default and shared/multi-user use requires lock-down. Continue?",
|
||
initialValue: false,
|
||
});
|
||
if (!ok) {
|
||
throw new WizardCancelledError("risk not accepted");
|
||
}
|
||
}
|
||
|
||
export async function runOnboardingWizard(
|
||
opts: OnboardOptions,
|
||
runtime: RuntimeEnv = defaultRuntime,
|
||
prompter: WizardPrompter,
|
||
) {
|
||
const onboardHelpers = await import("../commands/onboard-helpers.js");
|
||
onboardHelpers.printWizardHeader(runtime);
|
||
await prompter.intro("OpenClaw onboarding");
|
||
await requireRiskAcknowledgement({ opts, prompter });
|
||
|
||
const snapshot = await readConfigFileSnapshot();
|
||
let baseConfig: OpenClawConfig = snapshot.valid ? snapshot.config : {};
|
||
|
||
if (snapshot.exists && !snapshot.valid) {
|
||
await prompter.note(onboardHelpers.summarizeExistingConfig(baseConfig), "Invalid config");
|
||
if (snapshot.issues.length > 0) {
|
||
await prompter.note(
|
||
[
|
||
...snapshot.issues.map((iss) => `- ${iss.path}: ${iss.message}`),
|
||
"",
|
||
"Docs: https://docs.openclaw.ai/gateway/configuration",
|
||
].join("\n"),
|
||
"Config issues",
|
||
);
|
||
}
|
||
await prompter.outro(
|
||
`Config invalid. Run \`${formatCliCommand("openclaw doctor")}\` to repair it, then re-run onboarding.`,
|
||
);
|
||
runtime.exit(1);
|
||
return;
|
||
}
|
||
|
||
const quickstartHint = `Configure details later via ${formatCliCommand("openclaw configure")}.`;
|
||
const manualHint = "Configure port, network, Tailscale, and auth options.";
|
||
const explicitFlowRaw = opts.flow?.trim();
|
||
const normalizedExplicitFlow = explicitFlowRaw === "manual" ? "advanced" : explicitFlowRaw;
|
||
if (
|
||
normalizedExplicitFlow &&
|
||
normalizedExplicitFlow !== "quickstart" &&
|
||
normalizedExplicitFlow !== "advanced"
|
||
) {
|
||
runtime.error("Invalid --flow (use quickstart, manual, or advanced).");
|
||
runtime.exit(1);
|
||
return;
|
||
}
|
||
const explicitFlow: WizardFlow | undefined =
|
||
normalizedExplicitFlow === "quickstart" || normalizedExplicitFlow === "advanced"
|
||
? normalizedExplicitFlow
|
||
: undefined;
|
||
let flow: WizardFlow =
|
||
explicitFlow ??
|
||
(await prompter.select({
|
||
message: "Onboarding mode",
|
||
options: [
|
||
{ value: "quickstart", label: "QuickStart", hint: quickstartHint },
|
||
{ value: "advanced", label: "Manual", hint: manualHint },
|
||
],
|
||
initialValue: "quickstart",
|
||
}));
|
||
|
||
if (opts.mode === "remote" && flow === "quickstart") {
|
||
await prompter.note(
|
||
"QuickStart only supports local gateways. Switching to Manual mode.",
|
||
"QuickStart",
|
||
);
|
||
flow = "advanced";
|
||
}
|
||
|
||
if (snapshot.exists) {
|
||
await prompter.note(
|
||
onboardHelpers.summarizeExistingConfig(baseConfig),
|
||
"Existing config detected",
|
||
);
|
||
|
||
const action = await prompter.select({
|
||
message: "Config handling",
|
||
options: [
|
||
{ value: "keep", label: "Use existing values" },
|
||
{ value: "modify", label: "Update values" },
|
||
{ value: "reset", label: "Reset" },
|
||
],
|
||
});
|
||
|
||
if (action === "reset") {
|
||
const workspaceDefault =
|
||
baseConfig.agents?.defaults?.workspace ?? onboardHelpers.DEFAULT_WORKSPACE;
|
||
const resetScope = (await prompter.select({
|
||
message: "Reset scope",
|
||
options: [
|
||
{ value: "config", label: "Config only" },
|
||
{
|
||
value: "config+creds+sessions",
|
||
label: "Config + creds + sessions",
|
||
},
|
||
{
|
||
value: "full",
|
||
label: "Full reset (config + creds + sessions + workspace)",
|
||
},
|
||
],
|
||
})) as ResetScope;
|
||
await onboardHelpers.handleReset(resetScope, resolveUserPath(workspaceDefault), runtime);
|
||
baseConfig = {};
|
||
}
|
||
}
|
||
|
||
const quickstartGateway: QuickstartGatewayDefaults = (() => {
|
||
const hasExisting =
|
||
typeof baseConfig.gateway?.port === "number" ||
|
||
baseConfig.gateway?.bind !== undefined ||
|
||
baseConfig.gateway?.auth?.mode !== undefined ||
|
||
baseConfig.gateway?.auth?.token !== undefined ||
|
||
baseConfig.gateway?.auth?.password !== undefined ||
|
||
baseConfig.gateway?.customBindHost !== undefined ||
|
||
baseConfig.gateway?.tailscale?.mode !== undefined;
|
||
|
||
const bindRaw = baseConfig.gateway?.bind;
|
||
const bind =
|
||
bindRaw === "loopback" ||
|
||
bindRaw === "lan" ||
|
||
bindRaw === "auto" ||
|
||
bindRaw === "custom" ||
|
||
bindRaw === "tailnet"
|
||
? bindRaw
|
||
: "loopback";
|
||
|
||
let authMode: GatewayAuthChoice = "token";
|
||
if (
|
||
baseConfig.gateway?.auth?.mode === "token" ||
|
||
baseConfig.gateway?.auth?.mode === "password"
|
||
) {
|
||
authMode = baseConfig.gateway.auth.mode;
|
||
} else if (baseConfig.gateway?.auth?.token) {
|
||
authMode = "token";
|
||
} else if (baseConfig.gateway?.auth?.password) {
|
||
authMode = "password";
|
||
}
|
||
|
||
const tailscaleRaw = baseConfig.gateway?.tailscale?.mode;
|
||
const tailscaleMode =
|
||
tailscaleRaw === "off" || tailscaleRaw === "serve" || tailscaleRaw === "funnel"
|
||
? tailscaleRaw
|
||
: "off";
|
||
|
||
return {
|
||
hasExisting,
|
||
port: resolveGatewayPort(baseConfig),
|
||
bind,
|
||
authMode,
|
||
tailscaleMode,
|
||
token: baseConfig.gateway?.auth?.token,
|
||
password: baseConfig.gateway?.auth?.password,
|
||
customBindHost: baseConfig.gateway?.customBindHost,
|
||
tailscaleResetOnExit: baseConfig.gateway?.tailscale?.resetOnExit ?? false,
|
||
};
|
||
})();
|
||
|
||
if (flow === "quickstart") {
|
||
const formatBind = (value: "loopback" | "lan" | "auto" | "custom" | "tailnet") => {
|
||
if (value === "loopback") {
|
||
return "Loopback (127.0.0.1)";
|
||
}
|
||
if (value === "lan") {
|
||
return "LAN";
|
||
}
|
||
if (value === "custom") {
|
||
return "Custom IP";
|
||
}
|
||
if (value === "tailnet") {
|
||
return "Tailnet (Tailscale IP)";
|
||
}
|
||
return "Auto";
|
||
};
|
||
const formatAuth = (value: GatewayAuthChoice) => {
|
||
if (value === "token") {
|
||
return "Token (default)";
|
||
}
|
||
return "Password";
|
||
};
|
||
const formatTailscale = (value: "off" | "serve" | "funnel") => {
|
||
if (value === "off") {
|
||
return "Off";
|
||
}
|
||
if (value === "serve") {
|
||
return "Serve";
|
||
}
|
||
return "Funnel";
|
||
};
|
||
const quickstartLines = quickstartGateway.hasExisting
|
||
? [
|
||
"Keeping your current gateway settings:",
|
||
`Gateway port: ${quickstartGateway.port}`,
|
||
`Gateway bind: ${formatBind(quickstartGateway.bind)}`,
|
||
...(quickstartGateway.bind === "custom" && quickstartGateway.customBindHost
|
||
? [`Gateway custom IP: ${quickstartGateway.customBindHost}`]
|
||
: []),
|
||
`Gateway auth: ${formatAuth(quickstartGateway.authMode)}`,
|
||
`Tailscale exposure: ${formatTailscale(quickstartGateway.tailscaleMode)}`,
|
||
"Direct to chat channels.",
|
||
]
|
||
: [
|
||
`Gateway port: ${DEFAULT_GATEWAY_PORT}`,
|
||
"Gateway bind: Loopback (127.0.0.1)",
|
||
"Gateway auth: Token (default)",
|
||
"Tailscale exposure: Off",
|
||
"Direct to chat channels.",
|
||
];
|
||
await prompter.note(quickstartLines.join("\n"), "QuickStart");
|
||
}
|
||
|
||
const localPort = resolveGatewayPort(baseConfig);
|
||
const localUrl = `ws://127.0.0.1:${localPort}`;
|
||
let localGatewayToken = process.env.OPENCLAW_GATEWAY_TOKEN ?? process.env.CLAWDBOT_GATEWAY_TOKEN;
|
||
try {
|
||
const resolvedGatewayToken = await resolveOnboardingSecretInputString({
|
||
config: baseConfig,
|
||
value: baseConfig.gateway?.auth?.token,
|
||
path: "gateway.auth.token",
|
||
env: process.env,
|
||
});
|
||
if (resolvedGatewayToken) {
|
||
localGatewayToken = resolvedGatewayToken;
|
||
}
|
||
} catch (error) {
|
||
await prompter.note(
|
||
[
|
||
"Could not resolve gateway.auth.token SecretRef for onboarding probe.",
|
||
error instanceof Error ? error.message : String(error),
|
||
].join("\n"),
|
||
"Gateway auth",
|
||
);
|
||
}
|
||
let localGatewayPassword =
|
||
process.env.OPENCLAW_GATEWAY_PASSWORD ?? process.env.CLAWDBOT_GATEWAY_PASSWORD;
|
||
try {
|
||
const resolvedGatewayPassword = await resolveOnboardingSecretInputString({
|
||
config: baseConfig,
|
||
value: baseConfig.gateway?.auth?.password,
|
||
path: "gateway.auth.password",
|
||
env: process.env,
|
||
});
|
||
if (resolvedGatewayPassword) {
|
||
localGatewayPassword = resolvedGatewayPassword;
|
||
}
|
||
} catch (error) {
|
||
await prompter.note(
|
||
[
|
||
"Could not resolve gateway.auth.password SecretRef for onboarding probe.",
|
||
error instanceof Error ? error.message : String(error),
|
||
].join("\n"),
|
||
"Gateway auth",
|
||
);
|
||
}
|
||
|
||
const localProbe = await onboardHelpers.probeGatewayReachable({
|
||
url: localUrl,
|
||
token: localGatewayToken,
|
||
password: localGatewayPassword,
|
||
});
|
||
const remoteUrl = baseConfig.gateway?.remote?.url?.trim() ?? "";
|
||
let remoteGatewayToken = normalizeSecretInputString(baseConfig.gateway?.remote?.token);
|
||
try {
|
||
const resolvedRemoteGatewayToken = await resolveOnboardingSecretInputString({
|
||
config: baseConfig,
|
||
value: baseConfig.gateway?.remote?.token,
|
||
path: "gateway.remote.token",
|
||
env: process.env,
|
||
});
|
||
if (resolvedRemoteGatewayToken) {
|
||
remoteGatewayToken = resolvedRemoteGatewayToken;
|
||
}
|
||
} catch (error) {
|
||
await prompter.note(
|
||
[
|
||
"Could not resolve gateway.remote.token SecretRef for onboarding probe.",
|
||
error instanceof Error ? error.message : String(error),
|
||
].join("\n"),
|
||
"Gateway auth",
|
||
);
|
||
}
|
||
const remoteProbe = remoteUrl
|
||
? await onboardHelpers.probeGatewayReachable({
|
||
url: remoteUrl,
|
||
token: remoteGatewayToken,
|
||
})
|
||
: null;
|
||
|
||
const mode =
|
||
opts.mode ??
|
||
(flow === "quickstart"
|
||
? "local"
|
||
: ((await prompter.select({
|
||
message: "What do you want to set up?",
|
||
options: [
|
||
{
|
||
value: "local",
|
||
label: "Local gateway (this machine)",
|
||
hint: localProbe.ok
|
||
? `Gateway reachable (${localUrl})`
|
||
: `No gateway detected (${localUrl})`,
|
||
},
|
||
{
|
||
value: "remote",
|
||
label: "Remote gateway (info-only)",
|
||
hint: !remoteUrl
|
||
? "No remote URL configured yet"
|
||
: remoteProbe?.ok
|
||
? `Gateway reachable (${remoteUrl})`
|
||
: `Configured but unreachable (${remoteUrl})`,
|
||
},
|
||
],
|
||
})) as OnboardMode));
|
||
|
||
if (mode === "remote") {
|
||
const { promptRemoteGatewayConfig } = await import("../commands/onboard-remote.js");
|
||
const { logConfigUpdated } = await import("../config/logging.js");
|
||
let nextConfig = await promptRemoteGatewayConfig(baseConfig, prompter, {
|
||
secretInputMode: opts.secretInputMode,
|
||
});
|
||
nextConfig = onboardHelpers.applyWizardMetadata(nextConfig, { command: "onboard", mode });
|
||
await writeConfigFile(nextConfig);
|
||
logConfigUpdated(runtime);
|
||
await prompter.outro("Remote gateway configured.");
|
||
return;
|
||
}
|
||
|
||
const workspaceInput =
|
||
opts.workspace ??
|
||
(flow === "quickstart"
|
||
? (baseConfig.agents?.defaults?.workspace ?? onboardHelpers.DEFAULT_WORKSPACE)
|
||
: await prompter.text({
|
||
message: "Workspace directory",
|
||
initialValue: baseConfig.agents?.defaults?.workspace ?? onboardHelpers.DEFAULT_WORKSPACE,
|
||
}));
|
||
|
||
const workspaceDir = resolveUserPath(workspaceInput.trim() || onboardHelpers.DEFAULT_WORKSPACE);
|
||
|
||
const { applyOnboardingLocalWorkspaceConfig } = await import("../commands/onboard-config.js");
|
||
let nextConfig: OpenClawConfig = applyOnboardingLocalWorkspaceConfig(baseConfig, workspaceDir);
|
||
|
||
const { ensureAuthProfileStore } = await import("../agents/auth-profiles.js");
|
||
const { promptAuthChoiceGrouped } = await import("../commands/auth-choice-prompt.js");
|
||
const { promptCustomApiConfig } = await import("../commands/onboard-custom.js");
|
||
const { applyAuthChoice, resolvePreferredProviderForAuthChoice, warnIfModelConfigLooksOff } =
|
||
await import("../commands/auth-choice.js");
|
||
const { applyPrimaryModel, promptDefaultModel } = await import("../commands/model-picker.js");
|
||
|
||
const authStore = ensureAuthProfileStore(undefined, {
|
||
allowKeychainPrompt: false,
|
||
});
|
||
const authChoiceFromPrompt = opts.authChoice === undefined;
|
||
const authChoice =
|
||
opts.authChoice ??
|
||
(await promptAuthChoiceGrouped({
|
||
prompter,
|
||
store: authStore,
|
||
includeSkip: true,
|
||
}));
|
||
|
||
if (authChoice === "custom-api-key") {
|
||
const customResult = await promptCustomApiConfig({
|
||
prompter,
|
||
runtime,
|
||
config: nextConfig,
|
||
secretInputMode: opts.secretInputMode,
|
||
});
|
||
nextConfig = customResult.config;
|
||
} else {
|
||
const authResult = await applyAuthChoice({
|
||
authChoice,
|
||
config: nextConfig,
|
||
prompter,
|
||
runtime,
|
||
setDefaultModel: true,
|
||
opts: {
|
||
tokenProvider: opts.tokenProvider,
|
||
token: opts.authChoice === "apiKey" && opts.token ? opts.token : undefined,
|
||
},
|
||
});
|
||
nextConfig = authResult.config;
|
||
}
|
||
|
||
if (authChoiceFromPrompt && authChoice !== "custom-api-key") {
|
||
const modelSelection = await promptDefaultModel({
|
||
config: nextConfig,
|
||
prompter,
|
||
allowKeep: true,
|
||
ignoreAllowlist: true,
|
||
includeVllm: true,
|
||
preferredProvider: resolvePreferredProviderForAuthChoice(authChoice),
|
||
});
|
||
if (modelSelection.config) {
|
||
nextConfig = modelSelection.config;
|
||
}
|
||
if (modelSelection.model) {
|
||
nextConfig = applyPrimaryModel(nextConfig, modelSelection.model);
|
||
}
|
||
}
|
||
|
||
await warnIfModelConfigLooksOff(nextConfig, prompter);
|
||
|
||
const { configureGatewayForOnboarding } = await import("./onboarding.gateway-config.js");
|
||
const gateway = await configureGatewayForOnboarding({
|
||
flow,
|
||
baseConfig,
|
||
nextConfig,
|
||
localPort,
|
||
quickstartGateway,
|
||
secretInputMode: opts.secretInputMode,
|
||
prompter,
|
||
runtime,
|
||
});
|
||
nextConfig = gateway.nextConfig;
|
||
const settings = gateway.settings;
|
||
|
||
if (opts.skipChannels ?? opts.skipProviders) {
|
||
await prompter.note("Skipping channel setup.", "Channels");
|
||
} else {
|
||
const { listChannelPlugins } = await import("../channels/plugins/index.js");
|
||
const { setupChannels } = await import("../commands/onboard-channels.js");
|
||
const quickstartAllowFromChannels =
|
||
flow === "quickstart"
|
||
? listChannelPlugins()
|
||
.filter((plugin) => plugin.meta.quickstartAllowFrom)
|
||
.map((plugin) => plugin.id)
|
||
: [];
|
||
nextConfig = await setupChannels(nextConfig, runtime, prompter, {
|
||
allowSignalInstall: true,
|
||
forceAllowFromChannels: quickstartAllowFromChannels,
|
||
skipDmPolicyPrompt: flow === "quickstart",
|
||
skipConfirm: flow === "quickstart",
|
||
quickstartDefaults: flow === "quickstart",
|
||
secretInputMode: opts.secretInputMode,
|
||
});
|
||
}
|
||
|
||
await writeConfigFile(nextConfig);
|
||
const { logConfigUpdated } = await import("../config/logging.js");
|
||
logConfigUpdated(runtime);
|
||
await onboardHelpers.ensureWorkspaceAndSessions(workspaceDir, runtime, {
|
||
skipBootstrap: Boolean(nextConfig.agents?.defaults?.skipBootstrap),
|
||
});
|
||
|
||
if (opts.skipSearch) {
|
||
await prompter.note("Skipping search setup.", "Search");
|
||
} else {
|
||
const { setupSearch } = await import("../commands/onboard-search.js");
|
||
nextConfig = await setupSearch(nextConfig, runtime, prompter, {
|
||
quickstartDefaults: flow === "quickstart",
|
||
secretInputMode: opts.secretInputMode,
|
||
});
|
||
}
|
||
|
||
if (opts.skipSkills) {
|
||
await prompter.note("Skipping skills setup.", "Skills");
|
||
} else {
|
||
const { setupSkills } = await import("../commands/onboard-skills.js");
|
||
nextConfig = await setupSkills(nextConfig, workspaceDir, runtime, prompter);
|
||
}
|
||
|
||
// Setup hooks (session memory on /new)
|
||
const { setupInternalHooks } = await import("../commands/onboard-hooks.js");
|
||
nextConfig = await setupInternalHooks(nextConfig, runtime, prompter);
|
||
|
||
nextConfig = onboardHelpers.applyWizardMetadata(nextConfig, { command: "onboard", mode });
|
||
await writeConfigFile(nextConfig);
|
||
|
||
const { finalizeOnboardingWizard } = await import("./onboarding.finalize.js");
|
||
const { launchedTui } = await finalizeOnboardingWizard({
|
||
flow,
|
||
opts,
|
||
baseConfig,
|
||
nextConfig,
|
||
workspaceDir,
|
||
settings,
|
||
prompter,
|
||
runtime,
|
||
});
|
||
if (launchedTui) {
|
||
return;
|
||
}
|
||
}
|