459 lines
		
	
	
		
			15 KiB
		
	
	
	
		
			Go
		
	
	
	
			
		
		
	
	
			459 lines
		
	
	
		
			15 KiB
		
	
	
	
		
			Go
		
	
	
	
| // Copyright 2015 The Gogs Authors. All rights reserved.
 | |
| // Copyright 2018 The Gitea Authors. All rights reserved.
 | |
| // SPDX-License-Identifier: MIT
 | |
| 
 | |
| package convert
 | |
| 
 | |
| import (
 | |
| 	"context"
 | |
| 	"fmt"
 | |
| 	"strconv"
 | |
| 	"strings"
 | |
| 	"time"
 | |
| 
 | |
| 	asymkey_model "code.gitea.io/gitea/models/asymkey"
 | |
| 	"code.gitea.io/gitea/models/auth"
 | |
| 	"code.gitea.io/gitea/models/db"
 | |
| 	git_model "code.gitea.io/gitea/models/git"
 | |
| 	issues_model "code.gitea.io/gitea/models/issues"
 | |
| 	"code.gitea.io/gitea/models/organization"
 | |
| 	"code.gitea.io/gitea/models/perm"
 | |
| 	access_model "code.gitea.io/gitea/models/perm/access"
 | |
| 	repo_model "code.gitea.io/gitea/models/repo"
 | |
| 	"code.gitea.io/gitea/models/unit"
 | |
| 	user_model "code.gitea.io/gitea/models/user"
 | |
| 	"code.gitea.io/gitea/models/webhook"
 | |
| 	"code.gitea.io/gitea/modules/git"
 | |
| 	"code.gitea.io/gitea/modules/log"
 | |
| 	api "code.gitea.io/gitea/modules/structs"
 | |
| 	"code.gitea.io/gitea/modules/util"
 | |
| 	"code.gitea.io/gitea/services/gitdiff"
 | |
| 	webhook_service "code.gitea.io/gitea/services/webhook"
 | |
| )
 | |
| 
 | |
| // ToEmail convert models.EmailAddress to api.Email
 | |
| func ToEmail(email *user_model.EmailAddress) *api.Email {
 | |
| 	return &api.Email{
 | |
| 		Email:    email.Email,
 | |
| 		Verified: email.IsActivated,
 | |
| 		Primary:  email.IsPrimary,
 | |
| 	}
 | |
| }
 | |
| 
 | |
| // ToBranch convert a git.Commit and git.Branch to an api.Branch
 | |
| func ToBranch(repo *repo_model.Repository, b *git.Branch, c *git.Commit, bp *git_model.ProtectedBranch, user *user_model.User, isRepoAdmin bool) (*api.Branch, error) {
 | |
| 	if bp == nil {
 | |
| 		var hasPerm bool
 | |
| 		var canPush bool
 | |
| 		var err error
 | |
| 		if user != nil {
 | |
| 			hasPerm, err = access_model.HasAccessUnit(db.DefaultContext, user, repo, unit.TypeCode, perm.AccessModeWrite)
 | |
| 			if err != nil {
 | |
| 				return nil, err
 | |
| 			}
 | |
| 
 | |
| 			perms, err := access_model.GetUserRepoPermission(db.DefaultContext, repo, user)
 | |
| 			if err != nil {
 | |
| 				return nil, err
 | |
| 			}
 | |
| 			canPush = issues_model.CanMaintainerWriteToBranch(perms, b.Name, user)
 | |
| 		}
 | |
| 
 | |
| 		return &api.Branch{
 | |
| 			Name:                b.Name,
 | |
| 			Commit:              ToPayloadCommit(repo, c),
 | |
| 			Protected:           false,
 | |
| 			RequiredApprovals:   0,
 | |
| 			EnableStatusCheck:   false,
 | |
| 			StatusCheckContexts: []string{},
 | |
| 			UserCanPush:         canPush,
 | |
| 			UserCanMerge:        hasPerm,
 | |
| 		}, nil
 | |
| 	}
 | |
| 
 | |
| 	branch := &api.Branch{
 | |
| 		Name:                b.Name,
 | |
| 		Commit:              ToPayloadCommit(repo, c),
 | |
| 		Protected:           true,
 | |
| 		RequiredApprovals:   bp.RequiredApprovals,
 | |
| 		EnableStatusCheck:   bp.EnableStatusCheck,
 | |
| 		StatusCheckContexts: bp.StatusCheckContexts,
 | |
| 	}
 | |
| 
 | |
| 	if isRepoAdmin {
 | |
| 		branch.EffectiveBranchProtectionName = bp.BranchName
 | |
| 	}
 | |
| 
 | |
| 	if user != nil {
 | |
| 		permission, err := access_model.GetUserRepoPermission(db.DefaultContext, repo, user)
 | |
| 		if err != nil {
 | |
| 			return nil, err
 | |
| 		}
 | |
| 		branch.UserCanPush = bp.CanUserPush(user.ID)
 | |
| 		branch.UserCanMerge = git_model.IsUserMergeWhitelisted(db.DefaultContext, bp, user.ID, permission)
 | |
| 	}
 | |
| 
 | |
| 	return branch, nil
 | |
| }
 | |
| 
 | |
| // ToBranchProtection convert a ProtectedBranch to api.BranchProtection
 | |
| func ToBranchProtection(bp *git_model.ProtectedBranch) *api.BranchProtection {
 | |
| 	pushWhitelistUsernames, err := user_model.GetUserNamesByIDs(bp.WhitelistUserIDs)
 | |
| 	if err != nil {
 | |
| 		log.Error("GetUserNamesByIDs (WhitelistUserIDs): %v", err)
 | |
| 	}
 | |
| 	mergeWhitelistUsernames, err := user_model.GetUserNamesByIDs(bp.MergeWhitelistUserIDs)
 | |
| 	if err != nil {
 | |
| 		log.Error("GetUserNamesByIDs (MergeWhitelistUserIDs): %v", err)
 | |
| 	}
 | |
| 	approvalsWhitelistUsernames, err := user_model.GetUserNamesByIDs(bp.ApprovalsWhitelistUserIDs)
 | |
| 	if err != nil {
 | |
| 		log.Error("GetUserNamesByIDs (ApprovalsWhitelistUserIDs): %v", err)
 | |
| 	}
 | |
| 	pushWhitelistTeams, err := organization.GetTeamNamesByID(bp.WhitelistTeamIDs)
 | |
| 	if err != nil {
 | |
| 		log.Error("GetTeamNamesByID (WhitelistTeamIDs): %v", err)
 | |
| 	}
 | |
| 	mergeWhitelistTeams, err := organization.GetTeamNamesByID(bp.MergeWhitelistTeamIDs)
 | |
| 	if err != nil {
 | |
| 		log.Error("GetTeamNamesByID (MergeWhitelistTeamIDs): %v", err)
 | |
| 	}
 | |
| 	approvalsWhitelistTeams, err := organization.GetTeamNamesByID(bp.ApprovalsWhitelistTeamIDs)
 | |
| 	if err != nil {
 | |
| 		log.Error("GetTeamNamesByID (ApprovalsWhitelistTeamIDs): %v", err)
 | |
| 	}
 | |
| 
 | |
| 	return &api.BranchProtection{
 | |
| 		BranchName:                    bp.BranchName,
 | |
| 		EnablePush:                    bp.CanPush,
 | |
| 		EnablePushWhitelist:           bp.EnableWhitelist,
 | |
| 		PushWhitelistUsernames:        pushWhitelistUsernames,
 | |
| 		PushWhitelistTeams:            pushWhitelistTeams,
 | |
| 		PushWhitelistDeployKeys:       bp.WhitelistDeployKeys,
 | |
| 		EnableMergeWhitelist:          bp.EnableMergeWhitelist,
 | |
| 		MergeWhitelistUsernames:       mergeWhitelistUsernames,
 | |
| 		MergeWhitelistTeams:           mergeWhitelistTeams,
 | |
| 		EnableStatusCheck:             bp.EnableStatusCheck,
 | |
| 		StatusCheckContexts:           bp.StatusCheckContexts,
 | |
| 		RequiredApprovals:             bp.RequiredApprovals,
 | |
| 		EnableApprovalsWhitelist:      bp.EnableApprovalsWhitelist,
 | |
| 		ApprovalsWhitelistUsernames:   approvalsWhitelistUsernames,
 | |
| 		ApprovalsWhitelistTeams:       approvalsWhitelistTeams,
 | |
| 		BlockOnRejectedReviews:        bp.BlockOnRejectedReviews,
 | |
| 		BlockOnOfficialReviewRequests: bp.BlockOnOfficialReviewRequests,
 | |
| 		BlockOnOutdatedBranch:         bp.BlockOnOutdatedBranch,
 | |
| 		DismissStaleApprovals:         bp.DismissStaleApprovals,
 | |
| 		RequireSignedCommits:          bp.RequireSignedCommits,
 | |
| 		ProtectedFilePatterns:         bp.ProtectedFilePatterns,
 | |
| 		UnprotectedFilePatterns:       bp.UnprotectedFilePatterns,
 | |
| 		Created:                       bp.CreatedUnix.AsTime(),
 | |
| 		Updated:                       bp.UpdatedUnix.AsTime(),
 | |
| 	}
 | |
| }
 | |
| 
 | |
| // ToTag convert a git.Tag to an api.Tag
 | |
| func ToTag(repo *repo_model.Repository, t *git.Tag) *api.Tag {
 | |
| 	return &api.Tag{
 | |
| 		Name:       t.Name,
 | |
| 		Message:    strings.TrimSpace(t.Message),
 | |
| 		ID:         t.ID.String(),
 | |
| 		Commit:     ToCommitMeta(repo, t),
 | |
| 		ZipballURL: util.URLJoin(repo.HTMLURL(), "archive", t.Name+".zip"),
 | |
| 		TarballURL: util.URLJoin(repo.HTMLURL(), "archive", t.Name+".tar.gz"),
 | |
| 	}
 | |
| }
 | |
| 
 | |
| // ToVerification convert a git.Commit.Signature to an api.PayloadCommitVerification
 | |
| func ToVerification(c *git.Commit) *api.PayloadCommitVerification {
 | |
| 	verif := asymkey_model.ParseCommitWithSignature(c)
 | |
| 	commitVerification := &api.PayloadCommitVerification{
 | |
| 		Verified: verif.Verified,
 | |
| 		Reason:   verif.Reason,
 | |
| 	}
 | |
| 	if c.Signature != nil {
 | |
| 		commitVerification.Signature = c.Signature.Signature
 | |
| 		commitVerification.Payload = c.Signature.Payload
 | |
| 	}
 | |
| 	if verif.SigningUser != nil {
 | |
| 		commitVerification.Signer = &api.PayloadUser{
 | |
| 			Name:  verif.SigningUser.Name,
 | |
| 			Email: verif.SigningUser.Email,
 | |
| 		}
 | |
| 	}
 | |
| 	return commitVerification
 | |
| }
 | |
| 
 | |
| // ToPublicKey convert asymkey_model.PublicKey to api.PublicKey
 | |
| func ToPublicKey(apiLink string, key *asymkey_model.PublicKey) *api.PublicKey {
 | |
| 	return &api.PublicKey{
 | |
| 		ID:          key.ID,
 | |
| 		Key:         key.Content,
 | |
| 		URL:         fmt.Sprintf("%s%d", apiLink, key.ID),
 | |
| 		Title:       key.Name,
 | |
| 		Fingerprint: key.Fingerprint,
 | |
| 		Created:     key.CreatedUnix.AsTime(),
 | |
| 	}
 | |
| }
 | |
| 
 | |
| // ToGPGKey converts models.GPGKey to api.GPGKey
 | |
| func ToGPGKey(key *asymkey_model.GPGKey) *api.GPGKey {
 | |
| 	subkeys := make([]*api.GPGKey, len(key.SubsKey))
 | |
| 	for id, k := range key.SubsKey {
 | |
| 		subkeys[id] = &api.GPGKey{
 | |
| 			ID:                k.ID,
 | |
| 			PrimaryKeyID:      k.PrimaryKeyID,
 | |
| 			KeyID:             k.KeyID,
 | |
| 			PublicKey:         k.Content,
 | |
| 			Created:           k.CreatedUnix.AsTime(),
 | |
| 			Expires:           k.ExpiredUnix.AsTime(),
 | |
| 			CanSign:           k.CanSign,
 | |
| 			CanEncryptComms:   k.CanEncryptComms,
 | |
| 			CanEncryptStorage: k.CanEncryptStorage,
 | |
| 			CanCertify:        k.CanSign,
 | |
| 			Verified:          k.Verified,
 | |
| 		}
 | |
| 	}
 | |
| 	emails := make([]*api.GPGKeyEmail, len(key.Emails))
 | |
| 	for i, e := range key.Emails {
 | |
| 		emails[i] = ToGPGKeyEmail(e)
 | |
| 	}
 | |
| 	return &api.GPGKey{
 | |
| 		ID:                key.ID,
 | |
| 		PrimaryKeyID:      key.PrimaryKeyID,
 | |
| 		KeyID:             key.KeyID,
 | |
| 		PublicKey:         key.Content,
 | |
| 		Created:           key.CreatedUnix.AsTime(),
 | |
| 		Expires:           key.ExpiredUnix.AsTime(),
 | |
| 		Emails:            emails,
 | |
| 		SubsKey:           subkeys,
 | |
| 		CanSign:           key.CanSign,
 | |
| 		CanEncryptComms:   key.CanEncryptComms,
 | |
| 		CanEncryptStorage: key.CanEncryptStorage,
 | |
| 		CanCertify:        key.CanSign,
 | |
| 		Verified:          key.Verified,
 | |
| 	}
 | |
| }
 | |
| 
 | |
| // ToGPGKeyEmail convert models.EmailAddress to api.GPGKeyEmail
 | |
| func ToGPGKeyEmail(email *user_model.EmailAddress) *api.GPGKeyEmail {
 | |
| 	return &api.GPGKeyEmail{
 | |
| 		Email:    email.Email,
 | |
| 		Verified: email.IsActivated,
 | |
| 	}
 | |
| }
 | |
| 
 | |
| // ToHook convert models.Webhook to api.Hook
 | |
| func ToHook(repoLink string, w *webhook.Webhook) (*api.Hook, error) {
 | |
| 	config := map[string]string{
 | |
| 		"url":          w.URL,
 | |
| 		"content_type": w.ContentType.Name(),
 | |
| 	}
 | |
| 	if w.Type == webhook.SLACK {
 | |
| 		s := webhook_service.GetSlackHook(w)
 | |
| 		config["channel"] = s.Channel
 | |
| 		config["username"] = s.Username
 | |
| 		config["icon_url"] = s.IconURL
 | |
| 		config["color"] = s.Color
 | |
| 	}
 | |
| 
 | |
| 	authorizationHeader, err := w.HeaderAuthorization()
 | |
| 	if err != nil {
 | |
| 		return nil, err
 | |
| 	}
 | |
| 
 | |
| 	return &api.Hook{
 | |
| 		ID:                  w.ID,
 | |
| 		Type:                w.Type,
 | |
| 		URL:                 fmt.Sprintf("%s/settings/hooks/%d", repoLink, w.ID),
 | |
| 		Active:              w.IsActive,
 | |
| 		Config:              config,
 | |
| 		Events:              w.EventsArray(),
 | |
| 		AuthorizationHeader: authorizationHeader,
 | |
| 		Updated:             w.UpdatedUnix.AsTime(),
 | |
| 		Created:             w.CreatedUnix.AsTime(),
 | |
| 	}, nil
 | |
| }
 | |
| 
 | |
| // ToGitHook convert git.Hook to api.GitHook
 | |
| func ToGitHook(h *git.Hook) *api.GitHook {
 | |
| 	return &api.GitHook{
 | |
| 		Name:     h.Name(),
 | |
| 		IsActive: h.IsActive,
 | |
| 		Content:  h.Content,
 | |
| 	}
 | |
| }
 | |
| 
 | |
| // ToDeployKey convert asymkey_model.DeployKey to api.DeployKey
 | |
| func ToDeployKey(apiLink string, key *asymkey_model.DeployKey) *api.DeployKey {
 | |
| 	return &api.DeployKey{
 | |
| 		ID:          key.ID,
 | |
| 		KeyID:       key.KeyID,
 | |
| 		Key:         key.Content,
 | |
| 		Fingerprint: key.Fingerprint,
 | |
| 		URL:         fmt.Sprintf("%s%d", apiLink, key.ID),
 | |
| 		Title:       key.Name,
 | |
| 		Created:     key.CreatedUnix.AsTime(),
 | |
| 		ReadOnly:    key.Mode == perm.AccessModeRead, // All deploy keys are read-only.
 | |
| 	}
 | |
| }
 | |
| 
 | |
| // ToOrganization convert user_model.User to api.Organization
 | |
| func ToOrganization(org *organization.Organization) *api.Organization {
 | |
| 	return &api.Organization{
 | |
| 		ID:                        org.ID,
 | |
| 		AvatarURL:                 org.AsUser().AvatarLink(),
 | |
| 		Name:                      org.Name,
 | |
| 		UserName:                  org.Name,
 | |
| 		FullName:                  org.FullName,
 | |
| 		Description:               org.Description,
 | |
| 		Website:                   org.Website,
 | |
| 		Location:                  org.Location,
 | |
| 		Visibility:                org.Visibility.String(),
 | |
| 		RepoAdminChangeTeamAccess: org.RepoAdminChangeTeamAccess,
 | |
| 	}
 | |
| }
 | |
| 
 | |
| // ToTeam convert models.Team to api.Team
 | |
| func ToTeam(team *organization.Team, loadOrg ...bool) (*api.Team, error) {
 | |
| 	teams, err := ToTeams([]*organization.Team{team}, len(loadOrg) != 0 && loadOrg[0])
 | |
| 	if err != nil || len(teams) == 0 {
 | |
| 		return nil, err
 | |
| 	}
 | |
| 	return teams[0], nil
 | |
| }
 | |
| 
 | |
| // ToTeams convert models.Team list to api.Team list
 | |
| func ToTeams(teams []*organization.Team, loadOrgs bool) ([]*api.Team, error) {
 | |
| 	if len(teams) == 0 || teams[0] == nil {
 | |
| 		return nil, nil
 | |
| 	}
 | |
| 
 | |
| 	cache := make(map[int64]*api.Organization)
 | |
| 	apiTeams := make([]*api.Team, len(teams))
 | |
| 	for i := range teams {
 | |
| 		if err := teams[i].GetUnits(); err != nil {
 | |
| 			return nil, err
 | |
| 		}
 | |
| 
 | |
| 		apiTeams[i] = &api.Team{
 | |
| 			ID:                      teams[i].ID,
 | |
| 			Name:                    teams[i].Name,
 | |
| 			Description:             teams[i].Description,
 | |
| 			IncludesAllRepositories: teams[i].IncludesAllRepositories,
 | |
| 			CanCreateOrgRepo:        teams[i].CanCreateOrgRepo,
 | |
| 			Permission:              teams[i].AccessMode.String(),
 | |
| 			Units:                   teams[i].GetUnitNames(),
 | |
| 			UnitsMap:                teams[i].GetUnitsMap(),
 | |
| 		}
 | |
| 
 | |
| 		if loadOrgs {
 | |
| 			apiOrg, ok := cache[teams[i].OrgID]
 | |
| 			if !ok {
 | |
| 				org, err := organization.GetOrgByID(db.DefaultContext, teams[i].OrgID)
 | |
| 				if err != nil {
 | |
| 					return nil, err
 | |
| 				}
 | |
| 				apiOrg = ToOrganization(org)
 | |
| 				cache[teams[i].OrgID] = apiOrg
 | |
| 			}
 | |
| 			apiTeams[i].Organization = apiOrg
 | |
| 		}
 | |
| 	}
 | |
| 	return apiTeams, nil
 | |
| }
 | |
| 
 | |
| // ToAnnotatedTag convert git.Tag to api.AnnotatedTag
 | |
| func ToAnnotatedTag(repo *repo_model.Repository, t *git.Tag, c *git.Commit) *api.AnnotatedTag {
 | |
| 	return &api.AnnotatedTag{
 | |
| 		Tag:          t.Name,
 | |
| 		SHA:          t.ID.String(),
 | |
| 		Object:       ToAnnotatedTagObject(repo, c),
 | |
| 		Message:      t.Message,
 | |
| 		URL:          util.URLJoin(repo.APIURL(), "git/tags", t.ID.String()),
 | |
| 		Tagger:       ToCommitUser(t.Tagger),
 | |
| 		Verification: ToVerification(c),
 | |
| 	}
 | |
| }
 | |
| 
 | |
| // ToAnnotatedTagObject convert a git.Commit to an api.AnnotatedTagObject
 | |
| func ToAnnotatedTagObject(repo *repo_model.Repository, commit *git.Commit) *api.AnnotatedTagObject {
 | |
| 	return &api.AnnotatedTagObject{
 | |
| 		SHA:  commit.ID.String(),
 | |
| 		Type: string(git.ObjectCommit),
 | |
| 		URL:  util.URLJoin(repo.APIURL(), "git/commits", commit.ID.String()),
 | |
| 	}
 | |
| }
 | |
| 
 | |
| // ToTopicResponse convert from models.Topic to api.TopicResponse
 | |
| func ToTopicResponse(topic *repo_model.Topic) *api.TopicResponse {
 | |
| 	return &api.TopicResponse{
 | |
| 		ID:        topic.ID,
 | |
| 		Name:      topic.Name,
 | |
| 		RepoCount: topic.RepoCount,
 | |
| 		Created:   topic.CreatedUnix.AsTime(),
 | |
| 		Updated:   topic.UpdatedUnix.AsTime(),
 | |
| 	}
 | |
| }
 | |
| 
 | |
| // ToOAuth2Application convert from auth.OAuth2Application to api.OAuth2Application
 | |
| func ToOAuth2Application(app *auth.OAuth2Application) *api.OAuth2Application {
 | |
| 	return &api.OAuth2Application{
 | |
| 		ID:                 app.ID,
 | |
| 		Name:               app.Name,
 | |
| 		ClientID:           app.ClientID,
 | |
| 		ClientSecret:       app.ClientSecret,
 | |
| 		ConfidentialClient: app.ConfidentialClient,
 | |
| 		RedirectURIs:       app.RedirectURIs,
 | |
| 		Created:            app.CreatedUnix.AsTime(),
 | |
| 	}
 | |
| }
 | |
| 
 | |
| // ToLFSLock convert a LFSLock to api.LFSLock
 | |
| func ToLFSLock(ctx context.Context, l *git_model.LFSLock) *api.LFSLock {
 | |
| 	u, err := user_model.GetUserByID(ctx, l.OwnerID)
 | |
| 	if err != nil {
 | |
| 		return nil
 | |
| 	}
 | |
| 	return &api.LFSLock{
 | |
| 		ID:       strconv.FormatInt(l.ID, 10),
 | |
| 		Path:     l.Path,
 | |
| 		LockedAt: l.Created.Round(time.Second),
 | |
| 		Owner: &api.LFSLockOwner{
 | |
| 			Name: u.Name,
 | |
| 		},
 | |
| 	}
 | |
| }
 | |
| 
 | |
| // ToChangedFile convert a gitdiff.DiffFile to api.ChangedFile
 | |
| func ToChangedFile(f *gitdiff.DiffFile, repo *repo_model.Repository, commit string) *api.ChangedFile {
 | |
| 	status := "changed"
 | |
| 	if f.IsDeleted {
 | |
| 		status = "deleted"
 | |
| 	} else if f.IsCreated {
 | |
| 		status = "added"
 | |
| 	} else if f.IsRenamed && f.Type == gitdiff.DiffFileCopy {
 | |
| 		status = "copied"
 | |
| 	} else if f.IsRenamed && f.Type == gitdiff.DiffFileRename {
 | |
| 		status = "renamed"
 | |
| 	} else if f.Addition == 0 && f.Deletion == 0 {
 | |
| 		status = "unchanged"
 | |
| 	}
 | |
| 
 | |
| 	file := &api.ChangedFile{
 | |
| 		Filename:    f.GetDiffFileName(),
 | |
| 		Status:      status,
 | |
| 		Additions:   f.Addition,
 | |
| 		Deletions:   f.Deletion,
 | |
| 		Changes:     f.Addition + f.Deletion,
 | |
| 		HTMLURL:     fmt.Sprint(repo.HTMLURL(), "/src/commit/", commit, "/", util.PathEscapeSegments(f.GetDiffFileName())),
 | |
| 		ContentsURL: fmt.Sprint(repo.APIURL(), "/contents/", util.PathEscapeSegments(f.GetDiffFileName()), "?ref=", commit),
 | |
| 		RawURL:      fmt.Sprint(repo.HTMLURL(), "/raw/commit/", commit, "/", util.PathEscapeSegments(f.GetDiffFileName())),
 | |
| 	}
 | |
| 
 | |
| 	if status == "rename" {
 | |
| 		file.PreviousFilename = f.OldName
 | |
| 	}
 | |
| 
 | |
| 	return file
 | |
| }
 |