Prevent registry operations against disabled namespaces
Allows admins to completely wall off a namespace by disabling it Fixes https://jira.coreos.com/browse/QUAY-869
This commit is contained in:
parent
6ffafe44d3
commit
f86c087b3b
14 changed files with 102 additions and 1 deletions
|
@ -30,6 +30,16 @@ class GrantType(object):
|
||||||
WRITE_REPOSITORY = 'write'
|
WRITE_REPOSITORY = 'write'
|
||||||
|
|
||||||
|
|
||||||
|
def ensure_namespace_enabled(f):
|
||||||
|
@wraps(f)
|
||||||
|
def wrapper(namespace_name, repo_name, *args, **kwargs):
|
||||||
|
if not model.is_namespace_enabled(namespace_name):
|
||||||
|
abort(400, message='Namespace is disabled. Please contact your system administrator.')
|
||||||
|
|
||||||
|
return f(namespace_name, repo_name, *args, **kwargs)
|
||||||
|
return wrapper
|
||||||
|
|
||||||
|
|
||||||
def generate_headers(scope=GrantType.READ_REPOSITORY, add_grant_for_status=None):
|
def generate_headers(scope=GrantType.READ_REPOSITORY, add_grant_for_status=None):
|
||||||
def decorator_method(f):
|
def decorator_method(f):
|
||||||
@wraps(f)
|
@wraps(f)
|
||||||
|
@ -149,6 +159,7 @@ def update_user(username):
|
||||||
@v1_bp.route('/repositories/<repopath:repository>/', methods=['PUT'])
|
@v1_bp.route('/repositories/<repopath:repository>/', methods=['PUT'])
|
||||||
@process_auth
|
@process_auth
|
||||||
@parse_repository_name()
|
@parse_repository_name()
|
||||||
|
@ensure_namespace_enabled
|
||||||
@generate_headers(scope=GrantType.WRITE_REPOSITORY, add_grant_for_status=201)
|
@generate_headers(scope=GrantType.WRITE_REPOSITORY, add_grant_for_status=201)
|
||||||
@anon_allowed
|
@anon_allowed
|
||||||
def create_repository(namespace_name, repo_name):
|
def create_repository(namespace_name, repo_name):
|
||||||
|
@ -205,6 +216,7 @@ def create_repository(namespace_name, repo_name):
|
||||||
@v1_bp.route('/repositories/<repopath:repository>/images', methods=['PUT'])
|
@v1_bp.route('/repositories/<repopath:repository>/images', methods=['PUT'])
|
||||||
@process_auth
|
@process_auth
|
||||||
@parse_repository_name()
|
@parse_repository_name()
|
||||||
|
@ensure_namespace_enabled
|
||||||
@generate_headers(scope=GrantType.WRITE_REPOSITORY)
|
@generate_headers(scope=GrantType.WRITE_REPOSITORY)
|
||||||
@anon_allowed
|
@anon_allowed
|
||||||
def update_images(namespace_name, repo_name):
|
def update_images(namespace_name, repo_name):
|
||||||
|
@ -238,6 +250,7 @@ def update_images(namespace_name, repo_name):
|
||||||
@v1_bp.route('/repositories/<repopath:repository>/images', methods=['GET'])
|
@v1_bp.route('/repositories/<repopath:repository>/images', methods=['GET'])
|
||||||
@process_auth
|
@process_auth
|
||||||
@parse_repository_name()
|
@parse_repository_name()
|
||||||
|
@ensure_namespace_enabled
|
||||||
@generate_headers(scope=GrantType.READ_REPOSITORY)
|
@generate_headers(scope=GrantType.READ_REPOSITORY)
|
||||||
@anon_protect
|
@anon_protect
|
||||||
def get_repository_images(namespace_name, repo_name):
|
def get_repository_images(namespace_name, repo_name):
|
||||||
|
@ -268,6 +281,7 @@ def get_repository_images(namespace_name, repo_name):
|
||||||
@v1_bp.route('/repositories/<repopath:repository>/images', methods=['DELETE'])
|
@v1_bp.route('/repositories/<repopath:repository>/images', methods=['DELETE'])
|
||||||
@process_auth
|
@process_auth
|
||||||
@parse_repository_name()
|
@parse_repository_name()
|
||||||
|
@ensure_namespace_enabled
|
||||||
@generate_headers(scope=GrantType.WRITE_REPOSITORY)
|
@generate_headers(scope=GrantType.WRITE_REPOSITORY)
|
||||||
@anon_allowed
|
@anon_allowed
|
||||||
def delete_repository_images(namespace_name, repo_name):
|
def delete_repository_images(namespace_name, repo_name):
|
||||||
|
@ -276,6 +290,7 @@ def delete_repository_images(namespace_name, repo_name):
|
||||||
|
|
||||||
@v1_bp.route('/repositories/<repopath:repository>/auth', methods=['PUT'])
|
@v1_bp.route('/repositories/<repopath:repository>/auth', methods=['PUT'])
|
||||||
@parse_repository_name()
|
@parse_repository_name()
|
||||||
|
@ensure_namespace_enabled
|
||||||
@anon_allowed
|
@anon_allowed
|
||||||
def put_repository_auth(namespace_name, repo_name):
|
def put_repository_auth(namespace_name, repo_name):
|
||||||
abort(501, 'Not Implemented', issue='not-implemented')
|
abort(501, 'Not Implemented', issue='not-implemented')
|
||||||
|
|
|
@ -203,3 +203,8 @@ class DockerRegistryV1DataInterface(object):
|
||||||
Returns a sorted list of repositories matching the given search term.
|
Returns a sorted list of repositories matching the given search term.
|
||||||
"""
|
"""
|
||||||
pass
|
pass
|
||||||
|
|
||||||
|
@abstractmethod
|
||||||
|
def is_namespace_enabled(self, namespace_name):
|
||||||
|
""" Returns whether the given namespace exists and is enabled. """
|
||||||
|
pass
|
||||||
|
|
|
@ -163,6 +163,10 @@ class PreOCIModel(DockerRegistryV1DataInterface):
|
||||||
search_term, filter_username=filter_username, offset=offset, limit=limit)
|
search_term, filter_username=filter_username, offset=offset, limit=limit)
|
||||||
return [_repository_for_repo(repo) for repo in repos]
|
return [_repository_for_repo(repo) for repo in repos]
|
||||||
|
|
||||||
|
def is_namespace_enabled(self, namespace_name):
|
||||||
|
namespace = model.user.get_namespace_user(namespace_name)
|
||||||
|
return namespace is not None and namespace.enabled
|
||||||
|
|
||||||
|
|
||||||
def _repository_for_repo(repo):
|
def _repository_for_repo(repo):
|
||||||
""" Returns a Repository object representing the Pre-OCI data model instance of a repository. """
|
""" Returns a Repository object representing the Pre-OCI data model instance of a repository. """
|
||||||
|
|
|
@ -15,6 +15,7 @@ from data import model, database
|
||||||
from digest import checksums
|
from digest import checksums
|
||||||
from endpoints.v1 import v1_bp
|
from endpoints.v1 import v1_bp
|
||||||
from endpoints.v1.models_pre_oci import pre_oci_model as model
|
from endpoints.v1.models_pre_oci import pre_oci_model as model
|
||||||
|
from endpoints.v1.index import ensure_namespace_enabled
|
||||||
from endpoints.decorators import anon_protect
|
from endpoints.decorators import anon_protect
|
||||||
from util.http import abort, exact_abort
|
from util.http import abort, exact_abort
|
||||||
from util.registry.filelike import SocketReader
|
from util.registry.filelike import SocketReader
|
||||||
|
@ -75,6 +76,7 @@ def set_cache_headers(f):
|
||||||
@v1_bp.route('/images/<image_id>/layer', methods=['HEAD'])
|
@v1_bp.route('/images/<image_id>/layer', methods=['HEAD'])
|
||||||
@process_auth
|
@process_auth
|
||||||
@extract_namespace_repo_from_session
|
@extract_namespace_repo_from_session
|
||||||
|
@ensure_namespace_enabled
|
||||||
@require_completion
|
@require_completion
|
||||||
@set_cache_headers
|
@set_cache_headers
|
||||||
@anon_protect
|
@anon_protect
|
||||||
|
@ -112,6 +114,7 @@ def head_image_layer(namespace, repository, image_id, headers):
|
||||||
@v1_bp.route('/images/<image_id>/layer', methods=['GET'])
|
@v1_bp.route('/images/<image_id>/layer', methods=['GET'])
|
||||||
@process_auth
|
@process_auth
|
||||||
@extract_namespace_repo_from_session
|
@extract_namespace_repo_from_session
|
||||||
|
@ensure_namespace_enabled
|
||||||
@require_completion
|
@require_completion
|
||||||
@set_cache_headers
|
@set_cache_headers
|
||||||
@anon_protect
|
@anon_protect
|
||||||
|
@ -151,6 +154,7 @@ def get_image_layer(namespace, repository, image_id, headers):
|
||||||
@v1_bp.route('/images/<image_id>/layer', methods=['PUT'])
|
@v1_bp.route('/images/<image_id>/layer', methods=['PUT'])
|
||||||
@process_auth
|
@process_auth
|
||||||
@extract_namespace_repo_from_session
|
@extract_namespace_repo_from_session
|
||||||
|
@ensure_namespace_enabled
|
||||||
@anon_protect
|
@anon_protect
|
||||||
def put_image_layer(namespace, repository, image_id):
|
def put_image_layer(namespace, repository, image_id):
|
||||||
logger.debug('Checking repo permissions')
|
logger.debug('Checking repo permissions')
|
||||||
|
@ -259,6 +263,7 @@ def put_image_layer(namespace, repository, image_id):
|
||||||
@v1_bp.route('/images/<image_id>/checksum', methods=['PUT'])
|
@v1_bp.route('/images/<image_id>/checksum', methods=['PUT'])
|
||||||
@process_auth
|
@process_auth
|
||||||
@extract_namespace_repo_from_session
|
@extract_namespace_repo_from_session
|
||||||
|
@ensure_namespace_enabled
|
||||||
@anon_protect
|
@anon_protect
|
||||||
def put_image_checksum(namespace, repository, image_id):
|
def put_image_checksum(namespace, repository, image_id):
|
||||||
logger.debug('Checking repo permissions')
|
logger.debug('Checking repo permissions')
|
||||||
|
@ -331,6 +336,7 @@ def put_image_checksum(namespace, repository, image_id):
|
||||||
@v1_bp.route('/images/<image_id>/json', methods=['GET'])
|
@v1_bp.route('/images/<image_id>/json', methods=['GET'])
|
||||||
@process_auth
|
@process_auth
|
||||||
@extract_namespace_repo_from_session
|
@extract_namespace_repo_from_session
|
||||||
|
@ensure_namespace_enabled
|
||||||
@require_completion
|
@require_completion
|
||||||
@set_cache_headers
|
@set_cache_headers
|
||||||
@anon_protect
|
@anon_protect
|
||||||
|
@ -365,6 +371,7 @@ def get_image_json(namespace, repository, image_id, headers):
|
||||||
@v1_bp.route('/images/<image_id>/ancestry', methods=['GET'])
|
@v1_bp.route('/images/<image_id>/ancestry', methods=['GET'])
|
||||||
@process_auth
|
@process_auth
|
||||||
@extract_namespace_repo_from_session
|
@extract_namespace_repo_from_session
|
||||||
|
@ensure_namespace_enabled
|
||||||
@require_completion
|
@require_completion
|
||||||
@set_cache_headers
|
@set_cache_headers
|
||||||
@anon_protect
|
@anon_protect
|
||||||
|
@ -392,6 +399,7 @@ def get_image_ancestry(namespace, repository, image_id, headers):
|
||||||
@v1_bp.route('/images/<image_id>/json', methods=['PUT'])
|
@v1_bp.route('/images/<image_id>/json', methods=['PUT'])
|
||||||
@process_auth
|
@process_auth
|
||||||
@extract_namespace_repo_from_session
|
@extract_namespace_repo_from_session
|
||||||
|
@ensure_namespace_enabled
|
||||||
@anon_protect
|
@anon_protect
|
||||||
def put_image_json(namespace, repository, image_id):
|
def put_image_json(namespace, repository, image_id):
|
||||||
logger.debug('Checking repo permissions')
|
logger.debug('Checking repo permissions')
|
||||||
|
|
|
@ -138,3 +138,9 @@ class InvalidLogin(V2RegistryException):
|
||||||
class InvalidRequest(V2RegistryException):
|
class InvalidRequest(V2RegistryException):
|
||||||
def __init__(self, message=None):
|
def __init__(self, message=None):
|
||||||
super(InvalidRequest, self).__init__('INVALID_REQUEST', message or 'Invalid request', {}, 400)
|
super(InvalidRequest, self).__init__('INVALID_REQUEST', message or 'Invalid request', {}, 400)
|
||||||
|
|
||||||
|
|
||||||
|
class NamespaceDisabled(V2RegistryException):
|
||||||
|
def __init__(self, message=None):
|
||||||
|
message = message or 'This namespace is disabled. Please contact your system administrator.'
|
||||||
|
super(NamespaceDisabled, self).__init__('NAMESPACE_DISABLED', message, {}, 400)
|
||||||
|
|
|
@ -270,3 +270,9 @@ class DockerRegistryV2DataInterface(object):
|
||||||
Looks up all blobs with the matching digests under the given repository.
|
Looks up all blobs with the matching digests under the given repository.
|
||||||
"""
|
"""
|
||||||
pass
|
pass
|
||||||
|
|
||||||
|
@abstractmethod
|
||||||
|
def is_namespace_enabled(self, namespace_name):
|
||||||
|
""" Returns whether the given namespace is enabled. If the namespace doesn't exist,
|
||||||
|
returns True. """
|
||||||
|
pass
|
||||||
|
|
|
@ -258,6 +258,10 @@ class PreOCIModel(DockerRegistryV2DataInterface):
|
||||||
except model.InvalidManifestException:
|
except model.InvalidManifestException:
|
||||||
return
|
return
|
||||||
|
|
||||||
|
def is_namespace_enabled(self, namespace_name):
|
||||||
|
namespace = model.user.get_namespace_user(namespace_name)
|
||||||
|
return namespace is None or namespace.enabled
|
||||||
|
|
||||||
|
|
||||||
def _docker_v1_metadata(namespace_name, repo_name, repo_image):
|
def _docker_v1_metadata(namespace_name, repo_name, repo_image):
|
||||||
"""
|
"""
|
||||||
|
|
|
@ -54,6 +54,11 @@ from test.fixtures import *
|
||||||
('repository:somenamespace/unknownrepo:pull,push', 'devtable', 'password', 200,
|
('repository:somenamespace/unknownrepo:pull,push', 'devtable', 'password', 200,
|
||||||
['somenamespace/unknownrepo:']),
|
['somenamespace/unknownrepo:']),
|
||||||
|
|
||||||
|
# Disabled namespace.
|
||||||
|
(['repository:devtable/simple:pull,push', 'repository:disabled/complex:pull'],
|
||||||
|
'devtable', 'password', 400,
|
||||||
|
[]),
|
||||||
|
|
||||||
# Multiple scopes.
|
# Multiple scopes.
|
||||||
(['repository:devtable/simple:pull,push', 'repository:devtable/complex:pull'],
|
(['repository:devtable/simple:pull,push', 'repository:devtable/complex:pull'],
|
||||||
'devtable', 'password', 200,
|
'devtable', 'password', 200,
|
||||||
|
|
|
@ -13,7 +13,8 @@ from auth.permissions import (ModifyRepositoryPermission, ReadRepositoryPermissi
|
||||||
CreateRepositoryPermission, AdministerRepositoryPermission)
|
CreateRepositoryPermission, AdministerRepositoryPermission)
|
||||||
from endpoints.decorators import anon_protect
|
from endpoints.decorators import anon_protect
|
||||||
from endpoints.v2 import v2_bp
|
from endpoints.v2 import v2_bp
|
||||||
from endpoints.v2.errors import InvalidLogin, NameInvalid, InvalidRequest, Unsupported, Unauthorized
|
from endpoints.v2.errors import (InvalidLogin, NameInvalid, InvalidRequest, Unsupported,
|
||||||
|
Unauthorized, NamespaceDisabled)
|
||||||
from endpoints.v2.models_pre_oci import data_model as model
|
from endpoints.v2.models_pre_oci import data_model as model
|
||||||
from util.cache import no_cache
|
from util.cache import no_cache
|
||||||
from util.names import parse_namespace_repository, REPOSITORY_NAME_REGEX
|
from util.names import parse_namespace_repository, REPOSITORY_NAME_REGEX
|
||||||
|
@ -160,6 +161,11 @@ def _authorize_or_downscope_request(scope_param, has_valid_auth_context):
|
||||||
|
|
||||||
raise NameInvalid(message='Invalid repository name: %s' % namespace_and_repo)
|
raise NameInvalid(message='Invalid repository name: %s' % namespace_and_repo)
|
||||||
|
|
||||||
|
# Ensure the namespace is enabled.
|
||||||
|
if not model.is_namespace_enabled(namespace):
|
||||||
|
msg = 'Namespace %s has been disabled. Please contact a system administrator.' % namespace
|
||||||
|
raise NamespaceDisabled(message=msg)
|
||||||
|
|
||||||
final_actions = []
|
final_actions = []
|
||||||
|
|
||||||
repo = model.get_repository(namespace, reponame)
|
repo = model.get_repository(namespace, reponame)
|
||||||
|
|
|
@ -99,6 +99,12 @@ def registry_server_executor(app):
|
||||||
model.repository.create_repository(namespace, name, user, repo_kind='application')
|
model.repository.create_repository(namespace, name, user, repo_kind='application')
|
||||||
return 'OK'
|
return 'OK'
|
||||||
|
|
||||||
|
def disable_namespace(namespace):
|
||||||
|
namespace_obj = model.user.get_namespace_user(namespace)
|
||||||
|
namespace_obj.enabled = False
|
||||||
|
namespace_obj.save()
|
||||||
|
return 'OK'
|
||||||
|
|
||||||
executor = LiveServerExecutor()
|
executor = LiveServerExecutor()
|
||||||
executor.register('generate_csrf', generate_csrf)
|
executor.register('generate_csrf', generate_csrf)
|
||||||
executor.register('set_supports_direct_download', set_supports_direct_download)
|
executor.register('set_supports_direct_download', set_supports_direct_download)
|
||||||
|
@ -111,6 +117,7 @@ def registry_server_executor(app):
|
||||||
executor.register('break_database', break_database)
|
executor.register('break_database', break_database)
|
||||||
executor.register('reload_app', reload_app)
|
executor.register('reload_app', reload_app)
|
||||||
executor.register('create_app_repository', create_app_repository)
|
executor.register('create_app_repository', create_app_repository)
|
||||||
|
executor.register('disable_namespace', disable_namespace)
|
||||||
return executor
|
return executor
|
||||||
|
|
||||||
|
|
||||||
|
|
|
@ -23,6 +23,7 @@ class V1Protocol(RegistryProtocol):
|
||||||
Failures.APP_REPOSITORY: 405,
|
Failures.APP_REPOSITORY: 405,
|
||||||
Failures.INVALID_REPOSITORY: 404,
|
Failures.INVALID_REPOSITORY: 404,
|
||||||
Failures.DISALLOWED_LIBRARY_NAMESPACE: 400,
|
Failures.DISALLOWED_LIBRARY_NAMESPACE: 400,
|
||||||
|
Failures.NAMESPACE_DISABLED: 400,
|
||||||
},
|
},
|
||||||
V1ProtocolSteps.GET_IMAGES: {
|
V1ProtocolSteps.GET_IMAGES: {
|
||||||
Failures.UNAUTHENTICATED: 403,
|
Failures.UNAUTHENTICATED: 403,
|
||||||
|
@ -30,11 +31,13 @@ class V1Protocol(RegistryProtocol):
|
||||||
Failures.APP_REPOSITORY: 405,
|
Failures.APP_REPOSITORY: 405,
|
||||||
Failures.ANONYMOUS_NOT_ALLOWED: 401,
|
Failures.ANONYMOUS_NOT_ALLOWED: 401,
|
||||||
Failures.DISALLOWED_LIBRARY_NAMESPACE: 400,
|
Failures.DISALLOWED_LIBRARY_NAMESPACE: 400,
|
||||||
|
Failures.NAMESPACE_DISABLED: 400,
|
||||||
},
|
},
|
||||||
V1ProtocolSteps.PUT_TAG: {
|
V1ProtocolSteps.PUT_TAG: {
|
||||||
Failures.MISSING_TAG: 404,
|
Failures.MISSING_TAG: 404,
|
||||||
Failures.INVALID_TAG: 400,
|
Failures.INVALID_TAG: 400,
|
||||||
Failures.INVALID_IMAGES: 400,
|
Failures.INVALID_IMAGES: 400,
|
||||||
|
Failures.NAMESPACE_DISABLED: 400,
|
||||||
},
|
},
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
|
@ -25,6 +25,7 @@ class V2Protocol(RegistryProtocol):
|
||||||
Failures.APP_REPOSITORY: 405,
|
Failures.APP_REPOSITORY: 405,
|
||||||
Failures.ANONYMOUS_NOT_ALLOWED: 401,
|
Failures.ANONYMOUS_NOT_ALLOWED: 401,
|
||||||
Failures.INVALID_REPOSITORY: 400,
|
Failures.INVALID_REPOSITORY: 400,
|
||||||
|
Failures.NAMESPACE_DISABLED: 400,
|
||||||
},
|
},
|
||||||
V2ProtocolSteps.GET_MANIFEST: {
|
V2ProtocolSteps.GET_MANIFEST: {
|
||||||
Failures.UNKNOWN_TAG: 404,
|
Failures.UNKNOWN_TAG: 404,
|
||||||
|
|
|
@ -50,6 +50,7 @@ class Failures(Enum):
|
||||||
INVALID_IMAGES = 'invalid-images'
|
INVALID_IMAGES = 'invalid-images'
|
||||||
UNSUPPORTED_CONTENT_TYPE = 'unsupported-content-type'
|
UNSUPPORTED_CONTENT_TYPE = 'unsupported-content-type'
|
||||||
INVALID_BLOB = 'invalid-blob'
|
INVALID_BLOB = 'invalid-blob'
|
||||||
|
NAMESPACE_DISABLED = 'namespace-disabled'
|
||||||
|
|
||||||
|
|
||||||
class ProtocolOptions(object):
|
class ProtocolOptions(object):
|
||||||
|
|
|
@ -644,6 +644,36 @@ def test_chunked_uploading_mismatched_chunks(manifest_protocol, random_layer_dat
|
||||||
images, credentials=credentials, options=options)
|
images, credentials=credentials, options=options)
|
||||||
|
|
||||||
|
|
||||||
|
def test_pull_disabled_namespace(pusher, puller, basic_images, liveserver_session,
|
||||||
|
app_reloader, liveserver, registry_server_executor):
|
||||||
|
""" Test: Attempt to pull a repository from a disabled namespace results in an error. """
|
||||||
|
credentials = ('devtable', 'password')
|
||||||
|
|
||||||
|
# Push a new repository.
|
||||||
|
pusher.push(liveserver_session, 'buynlarge', 'someneworgrepo', 'latest', basic_images,
|
||||||
|
credentials=credentials)
|
||||||
|
|
||||||
|
# Disable the namespace.
|
||||||
|
registry_server_executor.on(liveserver).disable_namespace('buynlarge')
|
||||||
|
|
||||||
|
# Attempt to pull, which should fail.
|
||||||
|
puller.pull(liveserver_session, 'buynlarge', 'someneworgrepo', 'latest', basic_images,
|
||||||
|
credentials=credentials, expected_failure=Failures.NAMESPACE_DISABLED)
|
||||||
|
|
||||||
|
|
||||||
|
def test_push_disabled_namespace(pusher, basic_images, liveserver_session,
|
||||||
|
app_reloader, liveserver, registry_server_executor):
|
||||||
|
""" Test: Attempt to push a repository from a disabled namespace results in an error. """
|
||||||
|
credentials = ('devtable', 'password')
|
||||||
|
|
||||||
|
# Disable the namespace.
|
||||||
|
registry_server_executor.on(liveserver).disable_namespace('buynlarge')
|
||||||
|
|
||||||
|
# Attempt to push, which should fail.
|
||||||
|
pusher.push(liveserver_session, 'buynlarge', 'someneworgrepo', 'latest', basic_images,
|
||||||
|
credentials=credentials, expected_failure=Failures.NAMESPACE_DISABLED)
|
||||||
|
|
||||||
|
|
||||||
@pytest.mark.parametrize('public_catalog, credentials, expected_repos', [
|
@pytest.mark.parametrize('public_catalog, credentials, expected_repos', [
|
||||||
# No public access and no credentials => No results.
|
# No public access and no credentials => No results.
|
||||||
(False, None, None),
|
(False, None, None),
|
||||||
|
|
Reference in a new issue