]> jfr.im git - irc/rqf/shadowircd.git/blob - src/s_newconf.c
Add privilegeset_extend().
[irc/rqf/shadowircd.git] / src / s_newconf.c
1 /*
2 * ircd-ratbox: an advanced Internet Relay Chat Daemon(ircd).
3 * s_newconf.c - code for dealing with conf stuff
4 *
5 * Copyright (C) 2004 Lee Hardy <lee@leeh.co.uk>
6 * Copyright (C) 2004-2005 ircd-ratbox development team
7 *
8 * Redistribution and use in source and binary forms, with or without
9 * modification, are permitted provided that the following conditions are
10 * met:
11 *
12 * 1.Redistributions of source code must retain the above copyright notice,
13 * this list of conditions and the following disclaimer.
14 * 2.Redistributions in binary form must reproduce the above copyright
15 * notice, this list of conditions and the following disclaimer in the
16 * documentation and/or other materials provided with the distribution.
17 * 3.The name of the author may not be used to endorse or promote products
18 * derived from this software without specific prior written permission.
19 *
20 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
21 * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
22 * WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
23 * DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT,
24 * INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
25 * (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
26 * SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
27 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
28 * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING
29 * IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
30 * POSSIBILITY OF SUCH DAMAGE.
31 *
32 * $Id: s_newconf.c 3508 2007-06-04 16:04:49Z jilles $
33 */
34
35 #include "stdinc.h"
36 #include "ircd_defs.h"
37 #include "common.h"
38 #include "s_conf.h"
39 #include "s_newconf.h"
40 #include "client.h"
41 #include "s_serv.h"
42 #include "send.h"
43 #include "hostmask.h"
44 #include "newconf.h"
45 #include "hash.h"
46 #include "irc_dictionary.h"
47
48 rb_dlink_list shared_conf_list;
49 rb_dlink_list cluster_conf_list;
50 rb_dlink_list oper_conf_list;
51 rb_dlink_list hubleaf_conf_list;
52 rb_dlink_list server_conf_list;
53 rb_dlink_list xline_conf_list;
54 rb_dlink_list resv_conf_list; /* nicks only! */
55 rb_dlink_list nd_list; /* nick delay */
56 rb_dlink_list tgchange_list;
57
58 rb_patricia_tree_t *tgchange_tree;
59
60 static rb_bh *nd_heap = NULL;
61
62 static void expire_temp_rxlines(void *unused);
63 static void expire_nd_entries(void *unused);
64
65 struct ev_entry *expire_nd_entries_ev = NULL;
66 struct ev_entry *expire_temp_rxlines_ev = NULL;
67
68 void
69 init_s_newconf(void)
70 {
71 tgchange_tree = rb_new_patricia(PATRICIA_BITS);
72 nd_heap = rb_bh_create(sizeof(struct nd_entry), ND_HEAP_SIZE, "nd_heap");
73 expire_nd_entries_ev = rb_event_addish("expire_nd_entries", expire_nd_entries, NULL, 30);
74 expire_temp_rxlines_ev = rb_event_addish("expire_temp_rxlines", expire_temp_rxlines, NULL, 60);
75 }
76
77 void
78 clear_s_newconf(void)
79 {
80 struct server_conf *server_p;
81 rb_dlink_node *ptr;
82 rb_dlink_node *next_ptr;
83
84 RB_DLINK_FOREACH_SAFE(ptr, next_ptr, shared_conf_list.head)
85 {
86 /* ptr here is ptr->data->node */
87 rb_dlinkDelete(ptr, &shared_conf_list);
88 free_remote_conf(ptr->data);
89 }
90
91 RB_DLINK_FOREACH_SAFE(ptr, next_ptr, cluster_conf_list.head)
92 {
93 rb_dlinkDelete(ptr, &cluster_conf_list);
94 free_remote_conf(ptr->data);
95 }
96
97 RB_DLINK_FOREACH_SAFE(ptr, next_ptr, hubleaf_conf_list.head)
98 {
99 rb_dlinkDelete(ptr, &hubleaf_conf_list);
100 free_remote_conf(ptr->data);
101 }
102
103 RB_DLINK_FOREACH_SAFE(ptr, next_ptr, oper_conf_list.head)
104 {
105 free_oper_conf(ptr->data);
106 rb_dlinkDestroy(ptr, &oper_conf_list);
107 }
108
109 RB_DLINK_FOREACH_SAFE(ptr, next_ptr, server_conf_list.head)
110 {
111 server_p = ptr->data;
112
113 if(!server_p->servers)
114 {
115 rb_dlinkDelete(ptr, &server_conf_list);
116 free_server_conf(ptr->data);
117 }
118 else
119 server_p->flags |= SERVER_ILLEGAL;
120 }
121 }
122
123 void
124 clear_s_newconf_bans(void)
125 {
126 struct ConfItem *aconf;
127 rb_dlink_node *ptr, *next_ptr;
128
129 RB_DLINK_FOREACH_SAFE(ptr, next_ptr, xline_conf_list.head)
130 {
131 aconf = ptr->data;
132
133 if(aconf->hold)
134 continue;
135
136 free_conf(aconf);
137 rb_dlinkDestroy(ptr, &xline_conf_list);
138 }
139
140 RB_DLINK_FOREACH_SAFE(ptr, next_ptr, resv_conf_list.head)
141 {
142 aconf = ptr->data;
143
144 /* temporary resv */
145 if(aconf->hold)
146 continue;
147
148 free_conf(aconf);
149 rb_dlinkDestroy(ptr, &resv_conf_list);
150 }
151
152 clear_resv_hash();
153 }
154
155 struct remote_conf *
156 make_remote_conf(void)
157 {
158 struct remote_conf *remote_p = rb_malloc(sizeof(struct remote_conf));
159 return remote_p;
160 }
161
162 void
163 free_remote_conf(struct remote_conf *remote_p)
164 {
165 s_assert(remote_p != NULL);
166 if(remote_p == NULL)
167 return;
168
169 rb_free(remote_p->username);
170 rb_free(remote_p->host);
171 rb_free(remote_p->server);
172 rb_free(remote_p);
173 }
174
175 int
176 find_shared_conf(const char *username, const char *host,
177 const char *server, int flags)
178 {
179 struct remote_conf *shared_p;
180 rb_dlink_node *ptr;
181
182 RB_DLINK_FOREACH(ptr, shared_conf_list.head)
183 {
184 shared_p = ptr->data;
185
186 if(match(shared_p->username, username) &&
187 match(shared_p->host, host) &&
188 match(shared_p->server, server))
189 {
190 if(shared_p->flags & flags)
191 return YES;
192 else
193 return NO;
194 }
195 }
196
197 return NO;
198 }
199
200 void
201 propagate_generic(struct Client *source_p, const char *command,
202 const char *target, int cap, const char *format, ...)
203 {
204 char buffer[BUFSIZE];
205 va_list args;
206
207 va_start(args, format);
208 rb_vsnprintf(buffer, sizeof(buffer), format, args);
209 va_end(args);
210
211 sendto_match_servs(source_p, target, cap, NOCAPS,
212 "%s %s %s",
213 command, target, buffer);
214 sendto_match_servs(source_p, target, CAP_ENCAP, cap,
215 "ENCAP %s %s %s",
216 target, command, buffer);
217 }
218
219 void
220 cluster_generic(struct Client *source_p, const char *command,
221 int cltype, int cap, const char *format, ...)
222 {
223 char buffer[BUFSIZE];
224 struct remote_conf *shared_p;
225 va_list args;
226 rb_dlink_node *ptr;
227
228 va_start(args, format);
229 rb_vsnprintf(buffer, sizeof(buffer), format, args);
230 va_end(args);
231
232 RB_DLINK_FOREACH(ptr, cluster_conf_list.head)
233 {
234 shared_p = ptr->data;
235
236 if(!(shared_p->flags & cltype))
237 continue;
238
239 sendto_match_servs(source_p, shared_p->server, cap, NOCAPS,
240 "%s %s %s",
241 command, shared_p->server, buffer);
242 sendto_match_servs(source_p, shared_p->server, CAP_ENCAP, cap,
243 "ENCAP %s %s %s",
244 shared_p->server, command, buffer);
245 }
246 }
247
248 struct oper_conf *
249 make_oper_conf(void)
250 {
251 struct oper_conf *oper_p = rb_malloc(sizeof(struct oper_conf));
252 return oper_p;
253 }
254
255 void
256 free_oper_conf(struct oper_conf *oper_p)
257 {
258 s_assert(oper_p != NULL);
259 if(oper_p == NULL)
260 return;
261
262 rb_free(oper_p->username);
263 rb_free(oper_p->host);
264 rb_free(oper_p->name);
265
266 if(oper_p->passwd)
267 {
268 memset(oper_p->passwd, 0, strlen(oper_p->passwd));
269 rb_free(oper_p->passwd);
270 }
271
272 #ifdef HAVE_LIBCRYPTO
273 rb_free(oper_p->rsa_pubkey_file);
274
275 if(oper_p->rsa_pubkey)
276 RSA_free(oper_p->rsa_pubkey);
277 #endif
278
279 rb_free(oper_p);
280 }
281
282 struct oper_conf *
283 find_oper_conf(const char *username, const char *host, const char *locip, const char *name)
284 {
285 struct oper_conf *oper_p;
286 struct rb_sockaddr_storage ip, cip;
287 char addr[HOSTLEN+1];
288 int bits, cbits;
289 rb_dlink_node *ptr;
290
291 parse_netmask(locip, (struct sockaddr *)&cip, &cbits);
292
293 RB_DLINK_FOREACH(ptr, oper_conf_list.head)
294 {
295 oper_p = ptr->data;
296
297 /* name/username doesnt match.. */
298 if(irccmp(oper_p->name, name) || !match(oper_p->username, username))
299 continue;
300
301 rb_strlcpy(addr, oper_p->host, sizeof(addr));
302
303 if(parse_netmask(addr, (struct sockaddr *)&ip, &bits) != HM_HOST)
304 {
305 if(ip.ss_family == cip.ss_family &&
306 comp_with_mask_sock((struct sockaddr *)&ip, (struct sockaddr *)&cip, bits))
307 return oper_p;
308 }
309
310 /* we have to compare against the host as well, because its
311 * valid to set a spoof to an IP, which if we only compare
312 * in ip form to sockhost will not necessarily match --anfl
313 */
314 if(match(oper_p->host, host))
315 return oper_p;
316 }
317
318 return NULL;
319 }
320
321 struct oper_flags
322 {
323 int flag;
324 const char *name;
325 };
326 static struct oper_flags oper_flagtable[] =
327 {
328 { OPER_KLINE, "kline" },
329 { OPER_XLINE, "xline" },
330 { OPER_RESV, "resv" },
331 { OPER_GLOBKILL, "global_kill" },
332 { OPER_LOCKILL, "local_kill" },
333 { OPER_REMOTE, "remote" },
334 { OPER_UNKLINE, "unkline" },
335 { OPER_REHASH, "rehash" },
336 { OPER_DIE, "die" },
337 { OPER_ADMIN, "admin" },
338 { OPER_HADMIN, "hidden_admin" },
339 { OPER_NICKS, "nick_changes" },
340 { OPER_OPERWALL, "operwall" },
341 { OPER_SPY, "spy" },
342 { OPER_INVIS, "hidden_oper" },
343 { OPER_REMOTEBAN, "remoteban" },
344 { OPER_MASSNOTICE, "mass_notice" },
345 { 0, NULL }
346 };
347
348 const char *
349 get_oper_privs(int flags)
350 {
351 static char buf[BUFSIZE];
352 char *p;
353 int i;
354
355 p = buf;
356 *p = '\0';
357
358 for(i = 0; oper_flagtable[i].flag; i++)
359 if (flags & oper_flagtable[i].flag)
360 {
361 if(*buf != '\0')
362 rb_strlcat(buf, ", ", sizeof(buf));
363
364 rb_strlcat(buf, oper_flagtable[i].name, sizeof(buf));
365 }
366
367 return buf;
368 }
369
370 struct server_conf *
371 make_server_conf(void)
372 {
373 struct server_conf *server_p = rb_malloc(sizeof(struct server_conf));
374 server_p->aftype = AF_INET;
375 return server_p;
376 }
377
378 void
379 free_server_conf(struct server_conf *server_p)
380 {
381 s_assert(server_p != NULL);
382 if(server_p == NULL)
383 return;
384
385 if(!EmptyString(server_p->passwd))
386 {
387 memset(server_p->passwd, 0, strlen(server_p->passwd));
388 rb_free(server_p->passwd);
389 }
390
391 if(!EmptyString(server_p->spasswd))
392 {
393 memset(server_p->spasswd, 0, strlen(server_p->spasswd));
394 rb_free(server_p->spasswd);
395 }
396
397 rb_free(server_p->name);
398 rb_free(server_p->host);
399 rb_free(server_p->class_name);
400 rb_free(server_p);
401 }
402
403 void
404 add_server_conf(struct server_conf *server_p)
405 {
406 if(EmptyString(server_p->class_name))
407 {
408 server_p->class_name = rb_strdup("default");
409 server_p->class = default_class;
410 return;
411 }
412
413 server_p->class = find_class(server_p->class_name);
414
415 if(server_p->class == default_class)
416 {
417 conf_report_error("Warning connect::class invalid for %s",
418 server_p->name);
419
420 rb_free(server_p->class_name);
421 server_p->class_name = rb_strdup("default");
422 }
423
424 if(strchr(server_p->host, '*') || strchr(server_p->host, '?'))
425 return;
426 }
427
428 struct server_conf *
429 find_server_conf(const char *name)
430 {
431 struct server_conf *server_p;
432 rb_dlink_node *ptr;
433
434 RB_DLINK_FOREACH(ptr, server_conf_list.head)
435 {
436 server_p = ptr->data;
437
438 if(ServerConfIllegal(server_p))
439 continue;
440
441 if(match(name, server_p->name))
442 return server_p;
443 }
444
445 return NULL;
446 }
447
448 void
449 attach_server_conf(struct Client *client_p, struct server_conf *server_p)
450 {
451 /* already have an attached conf */
452 if(client_p->localClient->att_sconf)
453 {
454 /* short circuit this special case :) */
455 if(client_p->localClient->att_sconf == server_p)
456 return;
457
458 detach_server_conf(client_p);
459 }
460
461 CurrUsers(server_p->class)++;
462
463 client_p->localClient->att_sconf = server_p;
464 server_p->servers++;
465 }
466
467 void
468 detach_server_conf(struct Client *client_p)
469 {
470 struct server_conf *server_p = client_p->localClient->att_sconf;
471
472 if(server_p == NULL)
473 return;
474
475 client_p->localClient->att_sconf = NULL;
476 server_p->servers--;
477 CurrUsers(server_p->class)--;
478
479 if(ServerConfIllegal(server_p) && !server_p->servers)
480 {
481 /* the class this one is using may need destroying too */
482 if(MaxUsers(server_p->class) < 0 && CurrUsers(server_p->class) <= 0)
483 free_class(server_p->class);
484
485 rb_dlinkDelete(&server_p->node, &server_conf_list);
486 free_server_conf(server_p);
487 }
488 }
489
490 void
491 set_server_conf_autoconn(struct Client *source_p, const char *name, int newval)
492 {
493 struct server_conf *server_p;
494
495 if((server_p = find_server_conf(name)) != NULL)
496 {
497 if(newval)
498 server_p->flags |= SERVER_AUTOCONN;
499 else
500 server_p->flags &= ~SERVER_AUTOCONN;
501
502 sendto_realops_snomask(SNO_GENERAL, L_ALL,
503 "%s has changed AUTOCONN for %s to %i",
504 get_oper_name(source_p), name, newval);
505 }
506 else
507 sendto_one_notice(source_p, ":Can't find %s", name);
508 }
509
510 struct ConfItem *
511 find_xline(const char *gecos, int counter)
512 {
513 struct ConfItem *aconf;
514 rb_dlink_node *ptr;
515
516 RB_DLINK_FOREACH(ptr, xline_conf_list.head)
517 {
518 aconf = ptr->data;
519
520 if(match_esc(aconf->name, gecos))
521 {
522 if(counter)
523 aconf->port++;
524 return aconf;
525 }
526 }
527
528 return NULL;
529 }
530
531 struct ConfItem *
532 find_xline_mask(const char *gecos)
533 {
534 struct ConfItem *aconf;
535 rb_dlink_node *ptr;
536
537 RB_DLINK_FOREACH(ptr, xline_conf_list.head)
538 {
539 aconf = ptr->data;
540
541 if(!irccmp(aconf->name, gecos))
542 return aconf;
543 }
544
545 return NULL;
546 }
547
548 struct ConfItem *
549 find_nick_resv(const char *name)
550 {
551 struct ConfItem *aconf;
552 rb_dlink_node *ptr;
553
554 RB_DLINK_FOREACH(ptr, resv_conf_list.head)
555 {
556 aconf = ptr->data;
557
558 if(match_esc(aconf->name, name))
559 {
560 aconf->port++;
561 return aconf;
562 }
563 }
564
565 return NULL;
566 }
567
568 struct ConfItem *
569 find_nick_resv_mask(const char *name)
570 {
571 struct ConfItem *aconf;
572 rb_dlink_node *ptr;
573
574 RB_DLINK_FOREACH(ptr, resv_conf_list.head)
575 {
576 aconf = ptr->data;
577
578 if(!irccmp(aconf->name, name))
579 return aconf;
580 }
581
582 return NULL;
583 }
584
585 /* clean_resv_nick()
586 *
587 * inputs - nick
588 * outputs - 1 if nick is vaild resv, 0 otherwise
589 * side effects -
590 */
591 int
592 clean_resv_nick(const char *nick)
593 {
594 char tmpch;
595 int as = 0;
596 int q = 0;
597 int ch = 0;
598
599 if(*nick == '-' || IsDigit(*nick))
600 return 0;
601
602 while ((tmpch = *nick++))
603 {
604 if(tmpch == '?' || tmpch == '@' || tmpch == '#')
605 q++;
606 else if(tmpch == '*')
607 as++;
608 else if(IsNickChar(tmpch))
609 ch++;
610 else
611 return 0;
612 }
613
614 if(!ch && as)
615 return 0;
616
617 return 1;
618 }
619
620 /* valid_wild_card_simple()
621 *
622 * inputs - "thing" to test
623 * outputs - 1 if enough wildcards, else 0
624 * side effects -
625 */
626 int
627 valid_wild_card_simple(const char *data)
628 {
629 const char *p;
630 char tmpch;
631 int nonwild = 0;
632 int wild = 0;
633
634 /* check the string for minimum number of nonwildcard chars */
635 p = data;
636
637 while((tmpch = *p++))
638 {
639 /* found an escape, p points to the char after it, so skip
640 * that and move on.
641 */
642 if(tmpch == '\\' && *p)
643 {
644 p++;
645 if(++nonwild >= ConfigFileEntry.min_nonwildcard_simple)
646 return 1;
647 }
648 else if(!IsMWildChar(tmpch))
649 {
650 /* if we have enough nonwildchars, return */
651 if(++nonwild >= ConfigFileEntry.min_nonwildcard_simple)
652 return 1;
653 }
654 else
655 wild++;
656 }
657
658 /* strings without wilds are also ok */
659 return wild == 0;
660 }
661
662 time_t
663 valid_temp_time(const char *p)
664 {
665 time_t result = 0;
666
667 while(*p)
668 {
669 if(IsDigit(*p))
670 {
671 result *= 10;
672 result += ((*p) & 0xF);
673 p++;
674 }
675 else
676 return -1;
677 }
678
679 if(result > (60 * 24 * 7 * 52))
680 result = (60 * 24 * 7 * 52);
681
682 return(result * 60);
683 }
684
685 static void
686 expire_temp_rxlines(void *unused)
687 {
688 struct ConfItem *aconf;
689 rb_dlink_node *ptr;
690 rb_dlink_node *next_ptr;
691 int i;
692
693 HASH_WALK_SAFE(i, R_MAX, ptr, next_ptr, resvTable)
694 {
695 aconf = ptr->data;
696
697 if(aconf->hold && aconf->hold <= rb_current_time())
698 {
699 if(ConfigFileEntry.tkline_expire_notices)
700 sendto_realops_snomask(SNO_GENERAL, L_ALL,
701 "Temporary RESV for [%s] expired",
702 aconf->name);
703
704 free_conf(aconf);
705 rb_dlinkDestroy(ptr, &resvTable[i]);
706 }
707 }
708 HASH_WALK_END
709
710 RB_DLINK_FOREACH_SAFE(ptr, next_ptr, resv_conf_list.head)
711 {
712 aconf = ptr->data;
713
714 if(aconf->hold && aconf->hold <= rb_current_time())
715 {
716 if(ConfigFileEntry.tkline_expire_notices)
717 sendto_realops_snomask(SNO_GENERAL, L_ALL,
718 "Temporary RESV for [%s] expired",
719 aconf->name);
720 free_conf(aconf);
721 rb_dlinkDestroy(ptr, &resv_conf_list);
722 }
723 }
724
725 RB_DLINK_FOREACH_SAFE(ptr, next_ptr, xline_conf_list.head)
726 {
727 aconf = ptr->data;
728
729 if(aconf->hold && aconf->hold <= rb_current_time())
730 {
731 if(ConfigFileEntry.tkline_expire_notices)
732 sendto_realops_snomask(SNO_GENERAL, L_ALL,
733 "Temporary X-line for [%s] expired",
734 aconf->name);
735 free_conf(aconf);
736 rb_dlinkDestroy(ptr, &xline_conf_list);
737 }
738 }
739 }
740
741 unsigned long
742 get_nd_count(void)
743 {
744 return(rb_dlink_list_length(&nd_list));
745 }
746
747 void
748 add_nd_entry(const char *name)
749 {
750 struct nd_entry *nd;
751
752 if(irc_dictionary_find(nd_dict, name) != NULL)
753 return;
754
755 nd = rb_bh_alloc(nd_heap);
756
757 rb_strlcpy(nd->name, name, sizeof(nd->name));
758 nd->expire = rb_current_time() + ConfigFileEntry.nick_delay;
759
760 /* this list is ordered */
761 rb_dlinkAddTail(nd, &nd->lnode, &nd_list);
762
763 irc_dictionary_add(nd_dict, nd->name, nd);
764 }
765
766 void
767 free_nd_entry(struct nd_entry *nd)
768 {
769 irc_dictionary_delete(nd_dict, nd->name);
770
771 rb_dlinkDelete(&nd->lnode, &nd_list);
772 rb_bh_free(nd_heap, nd);
773 }
774
775 void
776 expire_nd_entries(void *unused)
777 {
778 struct nd_entry *nd;
779 rb_dlink_node *ptr;
780 rb_dlink_node *next_ptr;
781
782 RB_DLINK_FOREACH_SAFE(ptr, next_ptr, nd_list.head)
783 {
784 nd = ptr->data;
785
786 /* this list is ordered - we can stop when we hit the first
787 * entry that doesnt expire..
788 */
789 if(nd->expire > rb_current_time())
790 return;
791
792 free_nd_entry(nd);
793 }
794 }
795
796 void
797 add_tgchange(const char *host)
798 {
799 tgchange *target;
800 rb_patricia_node_t *pnode;
801
802 if(find_tgchange(host))
803 return;
804
805 target = rb_malloc(sizeof(tgchange));
806 pnode = make_and_lookup(tgchange_tree, host);
807
808 pnode->data = target;
809 target->pnode = pnode;
810
811 target->ip = rb_strdup(host);
812 target->expiry = rb_current_time() + (60*60*12);
813
814 rb_dlinkAdd(target, &target->node, &tgchange_list);
815 }
816
817 tgchange *
818 find_tgchange(const char *host)
819 {
820 rb_patricia_node_t *pnode;
821
822 if((pnode = rb_match_exact_string(tgchange_tree, host)))
823 return pnode->data;
824
825 return NULL;
826 }
827