2017-11-27 14:13:55 +01:00
|
|
|
/**
|
2019-06-11 20:18:37 +02:00
|
|
|
* (C) 2016 - 2017 KISTLER INSTRUMENTE AG, Winterthur, Switzerland
|
|
|
|
|
* (C) 2016 - 2019 Stanislav Angelovic <angelovic.s@gmail.com>
|
2017-11-27 14:13:55 +01:00
|
|
|
*
|
2019-04-09 21:28:07 +02:00
|
|
|
* @file Proxy.cpp
|
2017-11-27 14:13:55 +01:00
|
|
|
*
|
|
|
|
|
* Created on: Nov 8, 2016
|
|
|
|
|
* Project: sdbus-c++
|
|
|
|
|
* Description: High-level D-Bus IPC C++ library based on sd-bus
|
|
|
|
|
*
|
|
|
|
|
* This file is part of sdbus-c++.
|
|
|
|
|
*
|
|
|
|
|
* sdbus-c++ is free software; you can redistribute it and/or modify it
|
|
|
|
|
* under the terms of the GNU Lesser General Public License as published by
|
|
|
|
|
* the Free Software Foundation, either version 2.1 of the License, or
|
|
|
|
|
* (at your option) any later version.
|
|
|
|
|
*
|
|
|
|
|
* sdbus-c++ is distributed in the hope that it will be useful,
|
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
|
* GNU Lesser General Public License for more details.
|
|
|
|
|
*
|
|
|
|
|
* You should have received a copy of the GNU Lesser General Public License
|
|
|
|
|
* along with sdbus-c++. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
|
*/
|
|
|
|
|
|
2019-04-09 21:28:07 +02:00
|
|
|
#include "Proxy.h"
|
2017-11-27 14:13:55 +01:00
|
|
|
#include "IConnection.h"
|
2019-06-10 21:38:30 +02:00
|
|
|
#include "MessageUtils.h"
|
2019-04-09 21:28:07 +02:00
|
|
|
#include "sdbus-c++/Message.h"
|
|
|
|
|
#include "sdbus-c++/IConnection.h"
|
|
|
|
|
#include "sdbus-c++/Error.h"
|
2019-04-13 21:17:37 +02:00
|
|
|
#include "ScopeGuard.h"
|
2017-11-27 14:13:55 +01:00
|
|
|
#include <systemd/sd-bus.h>
|
|
|
|
|
#include <cassert>
|
2019-03-25 16:28:31 +01:00
|
|
|
#include <chrono>
|
2021-06-03 18:53:38 +02:00
|
|
|
#include <utility>
|
2017-11-27 14:13:55 +01:00
|
|
|
|
2020-02-01 22:47:04 +01:00
|
|
|
namespace sdbus::internal {
|
2017-11-27 14:13:55 +01:00
|
|
|
|
2019-04-09 21:28:07 +02:00
|
|
|
Proxy::Proxy(sdbus::internal::IConnection& connection, std::string destination, std::string objectPath)
|
2017-11-27 14:13:55 +01:00
|
|
|
: connection_(&connection, [](sdbus::internal::IConnection *){ /* Intentionally left empty */ })
|
|
|
|
|
, destination_(std::move(destination))
|
|
|
|
|
, objectPath_(std::move(objectPath))
|
|
|
|
|
{
|
2019-04-13 21:17:37 +02:00
|
|
|
// The connection is not ours only, it is owned and managed by the user and we just reference
|
|
|
|
|
// it here, so we expect the client to manage the event loop upon this connection themselves.
|
2017-11-27 14:13:55 +01:00
|
|
|
}
|
|
|
|
|
|
2019-04-09 21:28:07 +02:00
|
|
|
Proxy::Proxy( std::unique_ptr<sdbus::internal::IConnection>&& connection
|
|
|
|
|
, std::string destination
|
|
|
|
|
, std::string objectPath )
|
2017-11-27 14:13:55 +01:00
|
|
|
: connection_(std::move(connection))
|
|
|
|
|
, destination_(std::move(destination))
|
|
|
|
|
, objectPath_(std::move(objectPath))
|
|
|
|
|
{
|
2019-04-13 21:17:37 +02:00
|
|
|
// The connection is ours only, i.e. it's us who has to manage the event loop upon this connection,
|
|
|
|
|
// in order that we get and process signals, async call replies, and other messages from D-Bus.
|
2020-02-02 22:22:26 +01:00
|
|
|
connection_->enterEventLoopAsync();
|
2017-11-27 14:13:55 +01:00
|
|
|
}
|
|
|
|
|
|
2019-04-09 21:28:07 +02:00
|
|
|
MethodCall Proxy::createMethodCall(const std::string& interfaceName, const std::string& methodName)
|
2017-11-27 14:13:55 +01:00
|
|
|
{
|
|
|
|
|
return connection_->createMethodCall(destination_, objectPath_, interfaceName, methodName);
|
|
|
|
|
}
|
|
|
|
|
|
2019-11-03 13:54:13 +01:00
|
|
|
MethodReply Proxy::callMethod(const MethodCall& message, uint64_t timeout)
|
2017-11-27 14:13:55 +01:00
|
|
|
{
|
2020-01-12 13:10:34 +01:00
|
|
|
// Sending method call synchronously is the only operation that blocks, waiting for the method
|
|
|
|
|
// reply message among the incoming message on the sd-bus connection socket. But typically there
|
|
|
|
|
// already is somebody that generally handles incoming D-Bus messages -- the connection event loop
|
|
|
|
|
// running typically in its own thread. We have to avoid polling on socket from several threads.
|
|
|
|
|
// So we have to branch here: either we are within the context of the event loop thread, then we
|
|
|
|
|
// can send the message simply via sd_bus_call, which blocks. Or we are in another thread, then
|
|
|
|
|
// we can perform the send operation of the method call message from here (because that is thread-
|
|
|
|
|
// safe like other sd-bus API accesses), but the incoming reply we have to get through the event
|
|
|
|
|
// loop thread, because this is be the only rightful listener on the sd-bus connection socket.
|
|
|
|
|
// So, technically, we use async means to wait here for reply received by the event loop thread.
|
|
|
|
|
|
2019-11-10 17:31:58 +01:00
|
|
|
SDBUS_THROW_ERROR_IF(!message.isValid(), "Invalid method call message provided", EINVAL);
|
|
|
|
|
|
2020-01-12 13:10:34 +01:00
|
|
|
// If we don't need to wait for any reply, we can send the message now irrespective of the context
|
|
|
|
|
if (message.doesntExpectReply())
|
|
|
|
|
return message.send(timeout);
|
|
|
|
|
|
|
|
|
|
// If we are in the context of event loop thread, we can send the D-Bus call synchronously
|
|
|
|
|
// and wait blockingly for the reply, because we are the exclusive listeners on the socket
|
|
|
|
|
auto reply = connection_->tryCallMethodSynchronously(message, timeout);
|
|
|
|
|
if (reply.isValid())
|
|
|
|
|
return reply;
|
|
|
|
|
|
|
|
|
|
// Otherwise we send the call asynchronously and do blocking wait for the reply from the event loop thread
|
|
|
|
|
return sendMethodCallMessageAndWaitForReply(message, timeout);
|
2017-11-27 14:13:55 +01:00
|
|
|
}
|
|
|
|
|
|
2020-03-29 21:43:20 +02:00
|
|
|
PendingAsyncCall Proxy::callMethod(const MethodCall& message, async_reply_handler asyncReplyCallback, uint64_t timeout)
|
2019-03-25 14:45:48 +01:00
|
|
|
{
|
2019-11-10 17:31:58 +01:00
|
|
|
SDBUS_THROW_ERROR_IF(!message.isValid(), "Invalid async method call message provided", EINVAL);
|
|
|
|
|
|
2019-04-09 21:28:07 +02:00
|
|
|
auto callback = (void*)&Proxy::sdbus_async_reply_handler;
|
2020-03-29 21:43:20 +02:00
|
|
|
auto callData = std::make_shared<AsyncCalls::CallData>(AsyncCalls::CallData{*this, std::move(asyncReplyCallback), {}});
|
2020-06-16 00:02:25 +02:00
|
|
|
auto weakData = std::weak_ptr<AsyncCalls::CallData>{callData};
|
2019-03-25 16:28:31 +01:00
|
|
|
|
2019-11-03 13:54:13 +01:00
|
|
|
callData->slot = message.send(callback, callData.get(), timeout);
|
2019-04-13 21:17:37 +02:00
|
|
|
|
2020-03-29 21:43:20 +02:00
|
|
|
auto slotPtr = callData->slot.get();
|
|
|
|
|
pendingAsyncCalls_.addCall(slotPtr, std::move(callData));
|
|
|
|
|
|
|
|
|
|
return {weakData};
|
2019-03-25 14:45:48 +01:00
|
|
|
}
|
|
|
|
|
|
2020-01-12 13:10:34 +01:00
|
|
|
MethodReply Proxy::sendMethodCallMessageAndWaitForReply(const MethodCall& message, uint64_t timeout)
|
|
|
|
|
{
|
|
|
|
|
/*thread_local*/ SyncCallReplyData syncCallReplyData;
|
|
|
|
|
|
|
|
|
|
async_reply_handler asyncReplyCallback = [&syncCallReplyData](MethodReply& reply, const Error* error)
|
|
|
|
|
{
|
|
|
|
|
syncCallReplyData.sendMethodReplyToWaitingThread(reply, error);
|
|
|
|
|
};
|
|
|
|
|
auto callback = (void*)&Proxy::sdbus_async_reply_handler;
|
|
|
|
|
AsyncCalls::CallData callData{*this, std::move(asyncReplyCallback), {}};
|
|
|
|
|
|
|
|
|
|
message.send(callback, &callData, timeout, dont_request_slot);
|
|
|
|
|
|
|
|
|
|
return syncCallReplyData.waitForMethodReply();
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
void Proxy::SyncCallReplyData::sendMethodReplyToWaitingThread(MethodReply& reply, const Error* error)
|
|
|
|
|
{
|
2020-03-29 21:43:20 +02:00
|
|
|
std::unique_lock lock{mutex_};
|
2020-06-16 17:43:29 +02:00
|
|
|
SCOPE_EXIT{ cond_.notify_one(); }; // This must happen before unlocking the mutex to avoid potential data race on spurious wakeup in the waiting thread
|
2020-01-12 13:10:34 +01:00
|
|
|
SCOPE_EXIT{ arrived_ = true; };
|
|
|
|
|
|
|
|
|
|
//error_ = nullptr; // Necessary if SyncCallReplyData instance is thread_local
|
|
|
|
|
|
|
|
|
|
if (error == nullptr)
|
|
|
|
|
reply_ = std::move(reply);
|
|
|
|
|
else
|
|
|
|
|
error_ = std::make_unique<Error>(*error);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
MethodReply Proxy::SyncCallReplyData::waitForMethodReply()
|
|
|
|
|
{
|
2020-03-29 21:43:20 +02:00
|
|
|
std::unique_lock lock{mutex_};
|
2020-01-12 13:10:34 +01:00
|
|
|
cond_.wait(lock, [this](){ return arrived_; });
|
|
|
|
|
|
|
|
|
|
//arrived_ = false; // Necessary if SyncCallReplyData instance is thread_local
|
|
|
|
|
|
|
|
|
|
if (error_)
|
|
|
|
|
throw *error_;
|
|
|
|
|
|
|
|
|
|
return std::move(reply_);
|
|
|
|
|
}
|
|
|
|
|
|
2019-04-09 21:28:07 +02:00
|
|
|
void Proxy::registerSignalHandler( const std::string& interfaceName
|
|
|
|
|
, const std::string& signalName
|
|
|
|
|
, signal_handler signalHandler )
|
2017-11-27 14:13:55 +01:00
|
|
|
{
|
|
|
|
|
SDBUS_THROW_ERROR_IF(!signalHandler, "Invalid signal handler provided", EINVAL);
|
|
|
|
|
|
|
|
|
|
auto& interface = interfaces_[interfaceName];
|
|
|
|
|
|
2021-06-03 18:53:38 +02:00
|
|
|
auto signalData = std::make_unique<InterfaceData::SignalData>(*this, std::move(signalHandler), nullptr);
|
2017-11-27 14:13:55 +01:00
|
|
|
auto insertionResult = interface.signals_.emplace(signalName, std::move(signalData));
|
|
|
|
|
|
|
|
|
|
auto inserted = insertionResult.second;
|
|
|
|
|
SDBUS_THROW_ERROR_IF(!inserted, "Failed to register signal handler: handler already exists", EINVAL);
|
|
|
|
|
}
|
|
|
|
|
|
2019-04-09 21:28:07 +02:00
|
|
|
void Proxy::finishRegistration()
|
2017-11-27 14:13:55 +01:00
|
|
|
{
|
2019-03-25 16:28:31 +01:00
|
|
|
registerSignalHandlers(*connection_);
|
2017-11-27 14:13:55 +01:00
|
|
|
}
|
|
|
|
|
|
2019-04-09 21:28:07 +02:00
|
|
|
void Proxy::registerSignalHandlers(sdbus::internal::IConnection& connection)
|
2017-11-27 14:13:55 +01:00
|
|
|
{
|
|
|
|
|
for (auto& interfaceItem : interfaces_)
|
|
|
|
|
{
|
|
|
|
|
const auto& interfaceName = interfaceItem.first;
|
|
|
|
|
auto& signalsOnInterface = interfaceItem.second.signals_;
|
|
|
|
|
|
|
|
|
|
for (auto& signalItem : signalsOnInterface)
|
|
|
|
|
{
|
|
|
|
|
const auto& signalName = signalItem.first;
|
2021-06-03 18:53:38 +02:00
|
|
|
auto* signalData = signalItem.second.get();
|
|
|
|
|
signalData->slot = connection.registerSignalHandler( destination_
|
|
|
|
|
, objectPath_
|
|
|
|
|
, interfaceName
|
|
|
|
|
, signalName
|
|
|
|
|
, &Proxy::sdbus_signal_handler
|
|
|
|
|
, signalData);
|
2017-11-27 14:13:55 +01:00
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2019-04-13 21:17:37 +02:00
|
|
|
void Proxy::unregister()
|
|
|
|
|
{
|
|
|
|
|
pendingAsyncCalls_.clear();
|
|
|
|
|
interfaces_.clear();
|
|
|
|
|
}
|
|
|
|
|
|
2021-05-06 07:52:02 -07:00
|
|
|
sdbus::IConnection& Proxy::getConnection() const
|
|
|
|
|
{
|
|
|
|
|
return dynamic_cast<sdbus::IConnection&>(*connection_);
|
|
|
|
|
}
|
|
|
|
|
|
2020-05-28 15:36:58 +02:00
|
|
|
const std::string& Proxy::getObjectPath() const
|
|
|
|
|
{
|
|
|
|
|
return objectPath_;
|
|
|
|
|
}
|
|
|
|
|
|
2021-06-02 15:17:20 +00:00
|
|
|
const Message* Proxy::getCurrentlyProcessedMessage() const
|
|
|
|
|
{
|
|
|
|
|
return m_CurrentlyProcessedMessage.load(std::memory_order_relaxed);
|
|
|
|
|
}
|
|
|
|
|
|
2019-04-12 22:39:14 +02:00
|
|
|
int Proxy::sdbus_async_reply_handler(sd_bus_message *sdbusMessage, void *userData, sd_bus_error */*retError*/)
|
2019-03-25 14:45:48 +01:00
|
|
|
{
|
2019-04-13 21:17:37 +02:00
|
|
|
auto* asyncCallData = static_cast<AsyncCalls::CallData*>(userData);
|
|
|
|
|
assert(asyncCallData != nullptr);
|
|
|
|
|
assert(asyncCallData->callback);
|
|
|
|
|
auto& proxy = asyncCallData->proxy;
|
2020-04-02 20:46:38 +02:00
|
|
|
auto slot = asyncCallData->slot.get();
|
2019-04-13 21:17:37 +02:00
|
|
|
|
2020-03-29 21:43:20 +02:00
|
|
|
// We are removing the CallData item at the complete scope exit, after the callback has been invoked.
|
|
|
|
|
// We can't do it earlier (before callback invocation for example), because CallBack data (slot release)
|
|
|
|
|
// is the synchronization point between callback invocation and Proxy::unregister.
|
2020-01-12 13:10:34 +01:00
|
|
|
SCOPE_EXIT
|
|
|
|
|
{
|
2020-03-29 21:43:20 +02:00
|
|
|
// Remove call meta-data if it's a real async call (a sync call done in terms of async has slot == nullptr)
|
2020-04-02 20:46:38 +02:00
|
|
|
if (slot)
|
|
|
|
|
proxy.pendingAsyncCalls_.removeCall(slot);
|
2020-01-12 13:10:34 +01:00
|
|
|
};
|
2019-03-25 14:45:48 +01:00
|
|
|
|
2019-06-10 21:38:30 +02:00
|
|
|
auto message = Message::Factory::create<MethodReply>(sdbusMessage, &proxy.connection_->getSdBusInterface());
|
2019-03-25 16:28:31 +01:00
|
|
|
|
2021-06-02 15:17:20 +00:00
|
|
|
proxy.m_CurrentlyProcessedMessage.store(&message, std::memory_order_relaxed);
|
|
|
|
|
SCOPE_EXIT
|
|
|
|
|
{
|
|
|
|
|
proxy.m_CurrentlyProcessedMessage.store(nullptr, std::memory_order_relaxed);
|
|
|
|
|
};
|
|
|
|
|
|
2019-03-25 16:28:31 +01:00
|
|
|
const auto* error = sd_bus_message_get_error(sdbusMessage);
|
|
|
|
|
if (error == nullptr)
|
2019-03-25 14:45:48 +01:00
|
|
|
{
|
2019-04-13 21:17:37 +02:00
|
|
|
asyncCallData->callback(message, nullptr);
|
2019-03-25 14:45:48 +01:00
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
{
|
2019-03-25 16:28:31 +01:00
|
|
|
sdbus::Error exception(error->name, error->message);
|
2019-04-13 21:17:37 +02:00
|
|
|
asyncCallData->callback(message, &exception);
|
2019-03-25 14:45:48 +01:00
|
|
|
}
|
2019-04-12 22:39:14 +02:00
|
|
|
|
|
|
|
|
return 1;
|
2019-03-25 14:45:48 +01:00
|
|
|
}
|
|
|
|
|
|
2020-01-12 13:10:34 +01:00
|
|
|
int Proxy::sdbus_signal_handler(sd_bus_message *sdbusMessage, void *userData, sd_bus_error */*retError*/)
|
2017-11-27 14:13:55 +01:00
|
|
|
{
|
2021-06-03 18:53:38 +02:00
|
|
|
auto* signalData = static_cast<InterfaceData::SignalData*>(userData);
|
|
|
|
|
assert(signalData != nullptr);
|
|
|
|
|
assert(signalData->callback);
|
2017-11-27 14:13:55 +01:00
|
|
|
|
2021-06-03 18:53:38 +02:00
|
|
|
auto message = Message::Factory::create<Signal>(sdbusMessage, &signalData->proxy.connection_->getSdBusInterface());
|
2021-06-02 15:17:20 +00:00
|
|
|
|
|
|
|
|
signalData->proxy.m_CurrentlyProcessedMessage.store(&message, std::memory_order_relaxed);
|
|
|
|
|
SCOPE_EXIT
|
|
|
|
|
{
|
|
|
|
|
signalData->proxy.m_CurrentlyProcessedMessage.store(nullptr, std::memory_order_relaxed);
|
|
|
|
|
};
|
|
|
|
|
|
2021-06-03 18:53:38 +02:00
|
|
|
signalData->callback(message);
|
2020-03-23 17:43:25 +01:00
|
|
|
return 0;
|
2017-11-27 14:13:55 +01:00
|
|
|
}
|
|
|
|
|
|
2020-02-01 22:47:04 +01:00
|
|
|
}
|
2017-11-27 14:13:55 +01:00
|
|
|
|
|
|
|
|
namespace sdbus {
|
|
|
|
|
|
2020-03-29 21:43:20 +02:00
|
|
|
PendingAsyncCall::PendingAsyncCall(std::weak_ptr<void> callData)
|
|
|
|
|
: callData_(std::move(callData))
|
|
|
|
|
{
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
void PendingAsyncCall::cancel()
|
|
|
|
|
{
|
|
|
|
|
if (auto ptr = callData_.lock(); ptr != nullptr)
|
|
|
|
|
{
|
|
|
|
|
auto* callData = static_cast<internal::Proxy::AsyncCalls::CallData*>(ptr.get());
|
|
|
|
|
callData->proxy.pendingAsyncCalls_.removeCall(callData->slot.get());
|
|
|
|
|
|
|
|
|
|
// At this point, the callData item is being deleted, leading to the release of the
|
|
|
|
|
// sd-bus slot pointer. This release locks the global sd-bus mutex. If the async
|
|
|
|
|
// callback is currently being processed, the sd-bus mutex is locked by the event
|
|
|
|
|
// loop thread, thus access to the callData item is synchronized and thread-safe.
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
bool PendingAsyncCall::isPending() const
|
|
|
|
|
{
|
|
|
|
|
return !callData_.expired();
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
namespace sdbus {
|
|
|
|
|
|
2019-04-09 21:28:07 +02:00
|
|
|
std::unique_ptr<sdbus::IProxy> createProxy( IConnection& connection
|
|
|
|
|
, std::string destination
|
|
|
|
|
, std::string objectPath )
|
2017-11-27 14:13:55 +01:00
|
|
|
{
|
|
|
|
|
auto* sdbusConnection = dynamic_cast<sdbus::internal::IConnection*>(&connection);
|
|
|
|
|
SDBUS_THROW_ERROR_IF(!sdbusConnection, "Connection is not a real sdbus-c++ connection", EINVAL);
|
|
|
|
|
|
2019-04-09 21:28:07 +02:00
|
|
|
return std::make_unique<sdbus::internal::Proxy>( *sdbusConnection
|
|
|
|
|
, std::move(destination)
|
|
|
|
|
, std::move(objectPath) );
|
2017-11-27 14:13:55 +01:00
|
|
|
}
|
|
|
|
|
|
2019-04-09 21:28:07 +02:00
|
|
|
std::unique_ptr<sdbus::IProxy> createProxy( std::unique_ptr<IConnection>&& connection
|
|
|
|
|
, std::string destination
|
|
|
|
|
, std::string objectPath )
|
2018-03-15 17:03:49 +01:00
|
|
|
{
|
|
|
|
|
auto* sdbusConnection = dynamic_cast<sdbus::internal::IConnection*>(connection.get());
|
|
|
|
|
SDBUS_THROW_ERROR_IF(!sdbusConnection, "Connection is not a real sdbus-c++ connection", EINVAL);
|
|
|
|
|
|
|
|
|
|
connection.release();
|
|
|
|
|
|
2019-04-09 21:28:07 +02:00
|
|
|
return std::make_unique<sdbus::internal::Proxy>( std::unique_ptr<sdbus::internal::IConnection>(sdbusConnection)
|
|
|
|
|
, std::move(destination)
|
|
|
|
|
, std::move(objectPath) );
|
2018-03-15 17:03:49 +01:00
|
|
|
}
|
|
|
|
|
|
2019-04-09 21:28:07 +02:00
|
|
|
std::unique_ptr<sdbus::IProxy> createProxy( std::string destination
|
|
|
|
|
, std::string objectPath )
|
2017-11-27 14:13:55 +01:00
|
|
|
{
|
|
|
|
|
auto connection = sdbus::createConnection();
|
|
|
|
|
|
|
|
|
|
auto sdbusConnection = std::unique_ptr<sdbus::internal::IConnection>(dynamic_cast<sdbus::internal::IConnection*>(connection.release()));
|
|
|
|
|
assert(sdbusConnection != nullptr);
|
|
|
|
|
|
2019-04-09 21:28:07 +02:00
|
|
|
return std::make_unique<sdbus::internal::Proxy>( std::move(sdbusConnection)
|
|
|
|
|
, std::move(destination)
|
|
|
|
|
, std::move(objectPath) );
|
2017-11-27 14:13:55 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
}
|