coolify/apps/api/src/lib.ts

424 lines
20 KiB
TypeScript
Raw Normal View History

2022-10-21 21:19:30 +02:00
import cuid from "cuid";
2022-10-26 10:27:33 +02:00
import { decrypt, encrypt, fixType, generatePassword, getDomain, prisma } from "./lib/common";
2022-10-25 15:12:40 +02:00
import { getTemplates } from "./lib/services";
2022-10-18 12:51:53 +02:00
import { includeServices } from "./lib/services/common";
2022-10-25 15:12:40 +02:00
export async function migrateServicesToNewTemplate() {
2022-10-18 12:51:53 +02:00
// This function migrates old hardcoded services to the new template based services
try {
2022-10-25 15:12:40 +02:00
let templates = await getTemplates()
2022-10-21 21:19:30 +02:00
const services: any = await prisma.service.findMany({ include: includeServices })
2022-10-18 12:51:53 +02:00
for (const service of services) {
2022-10-21 21:19:30 +02:00
const { id } = service
2022-10-20 09:18:13 +02:00
if (!service.type) {
continue;
}
2022-10-26 10:27:33 +02:00
let template = templates.find(t => fixType(t.name) === fixType(service.type));
2022-10-20 16:06:33 +02:00
if (template) {
template = JSON.parse(JSON.stringify(template).replaceAll('$$id', service.id))
2022-10-21 21:19:30 +02:00
if (service.type === 'plausibleanalytics' && service.plausibleAnalytics) await plausibleAnalytics(service, template)
if (service.type === 'fider' && service.fider) await fider(service, template)
if (service.type === 'minio' && service.minio) await minio(service, template)
if (service.type === 'vscodeserver' && service.vscodeserver) await vscodeserver(service, template)
if (service.type === 'wordpress' && service.wordpress) await wordpress(service, template)
if (service.type === 'ghost' && service.ghost) await ghost(service, template)
if (service.type === 'meilisearch' && service.meiliSearch) await meilisearch(service, template)
if (service.type === 'umami' && service.umami) await umami(service, template)
if (service.type === 'hasura' && service.hasura) await hasura(service, template)
if (service.type === 'glitchTip' && service.glitchTip) await glitchtip(service, template)
if (service.type === 'searxng' && service.searxng) await searxng(service, template)
if (service.type === 'weblate' && service.weblate) await weblate(service, template)
if (service.type === 'appwrite' && service.appwrite) await appwrite(service, template)
2022-10-20 16:06:33 +02:00
await createVolumes(service, template);
2022-10-21 21:19:30 +02:00
if (template.variables.length > 0) {
for (const variable of template.variables) {
const { defaultValue } = variable;
const regex = /^\$\$.*\((\d+)\)$/g;
const length = Number(regex.exec(defaultValue)?.[1]) || undefined
if (variable.defaultValue.startsWith('$$generate_password')) {
variable.value = generatePassword({ length });
} else if (variable.defaultValue.startsWith('$$generate_hex')) {
variable.value = generatePassword({ length, isHex: true });
} else if (variable.defaultValue.startsWith('$$generate_username')) {
variable.value = cuid();
} else {
variable.value = variable.defaultValue || '';
}
}
}
for (const variable of template.variables) {
if (variable.id.startsWith('$$secret_')) {
const found = await prisma.serviceSecret.findFirst({ where: { name: variable.name, serviceId: id } })
if (!found) {
await prisma.serviceSecret.create({
data: { name: variable.name, value: encrypt(variable.value) || '', service: { connect: { id } } }
})
}
}
if (variable.id.startsWith('$$config_')) {
const found = await prisma.serviceSetting.findFirst({ where: { name: variable.name, serviceId: id } })
if (!found) {
await prisma.serviceSetting.create({
data: { name: variable.name, value: variable.value.toString(), variableName: variable.id, service: { connect: { id } } }
})
}
}
}
for (const service of Object.keys(template.services)) {
if (template.services[service].volumes) {
for (const volume of template.services[service].volumes) {
const [volumeName, path] = volume.split(':')
if (!volumeName.startsWith('/')) {
const found = await prisma.servicePersistentStorage.findFirst({ where: { volumeName, serviceId: id } })
if (!found) {
await prisma.servicePersistentStorage.create({
data: { volumeName, path, containerId: service, predefined: true, service: { connect: { id } } }
});
}
}
}
}
}
await prisma.service.update({ where: { id }, data: { templateVersion: template.templateVersion } })
2022-10-20 16:06:33 +02:00
}
2022-10-18 12:51:53 +02:00
}
} catch (error) {
console.log(error)
}
}
2022-10-21 21:19:30 +02:00
async function appwrite(service: any, template: any) {
2022-10-21 22:13:29 +02:00
const { opensslKeyV1, executorSecret, mariadbUser, mariadbPassword, mariadbRootUserPassword, mariadbDatabase } = service.appwrite
2022-10-21 21:19:30 +02:00
const secrets = [
`_APP_EXECUTOR_SECRET@@@${executorSecret}`,
`_APP_OPENSSL_KEY_V1@@@${opensslKeyV1}`,
`MARIADB_PASSWORD@@@${mariadbPassword}`,
`MARIADB_ROOT_PASSWORD@@@${mariadbRootUserPassword}`,
]
const settings = [
`MARIADB_USER@@@${mariadbUser}`,
`MARIADB_DATABASE@@@${mariadbDatabase}`,
]
await migrateSecrets(secrets, service);
await migrateSettings(settings, service, template);
// Remove old service data
// await prisma.service.update({ where: { id: service.id }, data: { wordpress: { delete: true } } })
}
async function weblate(service: any, template: any) {
2022-10-20 10:03:23 +02:00
const { adminPassword, postgresqlUser, postgresqlPassword, postgresqlDatabase } = service.weblate
const secrets = [
`WEBLATE_ADMIN_PASSWORD@@@${adminPassword}`,
`POSTGRES_PASSWORD@@@${postgresqlPassword}`,
]
const settings = [
`WEBLATE_SITE_DOMAIN@@@$$generate_domain`,
`POSTGRES_USER@@@${postgresqlUser}`,
`POSTGRES_DATABASE@@@${postgresqlDatabase}`,
2022-10-20 10:42:47 +02:00
`POSTGRES_DB@@@${postgresqlDatabase}`,
2022-10-20 10:03:23 +02:00
`POSTGRES_HOST@@@$$id-postgres`,
`POSTGRES_PORT@@@5432`,
`REDIS_HOST@@@$$id-redis`,
]
2022-10-21 21:19:30 +02:00
await migrateSettings(settings, service, template);
2022-10-20 10:03:23 +02:00
await migrateSecrets(secrets, service);
// Remove old service data
// await prisma.service.update({ where: { id: service.id }, data: { wordpress: { delete: true } } })
}
2022-10-21 21:19:30 +02:00
async function searxng(service: any, template: any) {
2022-10-20 09:18:13 +02:00
const { secretKey, redisPassword } = service.searxng
const secrets = [
`SECRET_KEY@@@${secretKey}`,
`REDIS_PASSWORD@@@${redisPassword}`,
]
const settings = [
`SEARXNG_BASE_URL@@@$$generate_fqdn`
]
2022-10-21 21:19:30 +02:00
await migrateSettings(settings, service, template);
2022-10-20 09:18:13 +02:00
await migrateSecrets(secrets, service);
// Remove old service data
// await prisma.service.update({ where: { id: service.id }, data: { wordpress: { delete: true } } })
}
2022-10-21 21:19:30 +02:00
async function glitchtip(service: any, template: any) {
2022-10-19 14:59:38 +02:00
const { postgresqlUser, postgresqlPassword, postgresqlDatabase, secretKeyBase, defaultEmail, defaultUsername, defaultPassword, defaultEmailFrom, emailSmtpHost, emailSmtpPort, emailSmtpUser, emailSmtpPassword, emailSmtpUseTls, emailSmtpUseSsl, emailBackend, mailgunApiKey, sendgridApiKey, enableOpenUserRegistration } = service.glitchTip
const secrets = [
`POSTGRES_PASSWORD@@@${postgresqlPassword}`,
`SECRET_KEY@@@${secretKeyBase}`,
`DATABASE_URL@@@${encrypt(`postgres://${postgresqlUser}:${decrypt(postgresqlPassword)}@$$generate_fqdn:5432/${postgresqlDatabase}`)}`,
`REDIS_URL@@@${encrypt(`redis://$$generate_fqdn:6379`)}`,
`EMAIL_HOST_PASSWORD@@@${emailSmtpPassword}`,
`MAILGUN_API_KEY@@@${mailgunApiKey}`,
`SENDGRID_API_KEY@@@${sendgridApiKey}`,
`DJANGO_SUPERUSER_PASSWORD@@@${defaultPassword}`,
]
const settings = [
`POSTGRES_USER@@@${postgresqlUser}`,
`POSTGRES_DB@@@${postgresqlDatabase}`,
`DEFAULT_FROM_EMAIL@@@${defaultEmailFrom}`,
`EMAIL_HOST@@@${emailSmtpHost}`,
`EMAIL_PORT@@@${emailSmtpPort}`,
`EMAIL_HOST_USER@@@${emailSmtpUser}`,
`EMAIL_USE_TLS@@@${emailSmtpUseTls}`,
`EMAIL_USE_SSL@@@${emailSmtpUseSsl}`,
`EMAIL_BACKEND@@@${emailBackend}`,
`ENABLE_OPEN_USER_REGISTRATION@@@${enableOpenUserRegistration}`,
`DJANGO_SUPERUSER_EMAIL@@@${defaultEmail}`,
`DJANGO_SUPERUSER_USERNAME@@@${defaultUsername}`,
]
2022-10-21 21:19:30 +02:00
await migrateSettings(settings, service, template);
2022-10-19 14:59:38 +02:00
await migrateSecrets(secrets, service);
// Remove old service data
// await prisma.service.update({ where: { id: service.id }, data: { wordpress: { delete: true } } })
}
2022-10-21 21:19:30 +02:00
async function hasura(service: any, template: any) {
2022-10-19 13:14:39 +02:00
const { postgresqlUser, postgresqlPassword, postgresqlDatabase, graphQLAdminPassword } = service.hasura
const secrets = [
`HASURA_GRAPHQL_ADMIN_PASSWORD@@@${graphQLAdminPassword}`,
`HASURA_GRAPHQL_METADATA_DATABASE_URL@@@${encrypt(`postgres://${postgresqlUser}:${decrypt(postgresqlPassword)}@$$generate_fqdn:5432/${postgresqlDatabase}`)}`,
`POSTGRES_PASSWORD@@@${postgresqlPassword}`,
]
const settings = [
`POSTGRES_USER@@@${postgresqlUser}`,
`POSTGRES_DB@@@${postgresqlDatabase}`,
]
2022-10-21 21:19:30 +02:00
await migrateSettings(settings, service, template);
2022-10-19 13:14:39 +02:00
await migrateSecrets(secrets, service);
// Remove old service data
// await prisma.service.update({ where: { id: service.id }, data: { wordpress: { delete: true } } })
}
2022-10-21 21:19:30 +02:00
async function umami(service: any, template: any) {
2022-10-19 12:00:43 +02:00
const { postgresqlUser, postgresqlPassword, postgresqlDatabase, umamiAdminPassword, hashSalt } = service.umami
2022-10-19 10:29:08 +02:00
2022-10-19 11:26:27 +02:00
const secrets = [
`HASH_SALT@@@${hashSalt}`,
`POSTGRES_PASSWORD@@@${postgresqlPassword}`,
`ADMIN_PASSWORD@@@${umamiAdminPassword}`,
2022-10-19 13:14:39 +02:00
`DATABASE_URL@@@${encrypt(`postgres://${postgresqlUser}:${decrypt(postgresqlPassword)}@$$generate_fqdn:5432/${postgresqlDatabase}`)}`,
2022-10-19 11:26:27 +02:00
]
const settings = [
`POSTGRES_USER@@@${postgresqlUser}`,
`POSTGRES_DB@@@${postgresqlDatabase}`,
]
2022-10-21 21:19:30 +02:00
await migrateSettings(settings, service, template);
2022-10-19 11:26:27 +02:00
await migrateSecrets(secrets, service);
// Remove old service data
// await prisma.service.update({ where: { id: service.id }, data: { wordpress: { delete: true } } })
}
2022-10-21 21:19:30 +02:00
async function meilisearch(service: any, template: any) {
2022-10-19 10:55:16 +02:00
const { masterKey } = service.meiliSearch
2022-10-19 10:29:08 +02:00
const secrets = [
`MEILI_MASTER_KEY@@@${masterKey}`,
]
2022-10-21 21:19:30 +02:00
// await migrateSettings(settings, service, template);
2022-10-19 10:29:08 +02:00
await migrateSecrets(secrets, service);
// Remove old service data
// await prisma.service.update({ where: { id: service.id }, data: { wordpress: { delete: true } } })
}
2022-10-21 21:19:30 +02:00
async function ghost(service: any, template: any) {
2022-10-19 10:24:53 +02:00
const { defaultEmail, defaultPassword, mariadbUser, mariadbPassword, mariadbRootUser, mariadbRootUserPassword, mariadbDatabase } = service.ghost
const { fqdn } = service
const isHttps = fqdn.startsWith('https://');
const secrets = [
`GHOST_PASSWORD@@@${defaultPassword}`,
`MARIADB_PASSWORD@@@${mariadbPassword}`,
`MARIADB_ROOT_PASSWORD@@@${mariadbRootUserPassword}`,
`GHOST_DATABASE_PASSWORD@@@${mariadbPassword}`,
]
const settings = [
`GHOST_EMAIL@@@${defaultEmail}`,
`GHOST_DATABASE_HOST@@@${service.id}-mariadb`,
`GHOST_DATABASE_USER@@@${mariadbUser}`,
`GHOST_DATABASE_NAME@@@${mariadbDatabase}`,
`GHOST_DATABASE_PORT_NUMBER@@@3306`,
`MARIADB_USER@@@${mariadbUser}`,
`MARIADB_DATABASE@@@${mariadbDatabase}`,
`MARIADB_ROOT_USER@@@${mariadbRootUser}`,
2022-10-20 10:03:23 +02:00
`GHOST_HOST@@@$$generate_domain`,
`url@@@$$generate_fqdn`,
2022-10-19 10:24:53 +02:00
`GHOST_ENABLE_HTTPS@@@${isHttps ? 'yes' : 'no'}`
]
2022-10-21 21:19:30 +02:00
await migrateSettings(settings, service, template);
2022-10-19 10:24:53 +02:00
await migrateSecrets(secrets, service);
// Remove old service data
// await prisma.service.update({ where: { id: service.id }, data: { wordpress: { delete: true } } })
}
2022-10-21 21:19:30 +02:00
async function wordpress(service: any, template: any) {
2022-10-18 15:01:18 +02:00
const { extraConfig, tablePrefix, ownMysql, mysqlHost, mysqlPort, mysqlUser, mysqlPassword, mysqlRootUser, mysqlRootUserPassword, mysqlDatabase, ftpEnabled, ftpUser, ftpPassword, ftpPublicPort, ftpHostKey, ftpHostKeyPrivate } = service.wordpress
const secrets = [
`MYSQL_ROOT_PASSWORD@@@${mysqlRootUserPassword}`,
`MYSQL_PASSWORD@@@${mysqlPassword}`,
2022-10-18 15:17:59 +02:00
ftpPassword && `COOLIFY_FTP_PASSWORD@@@${ftpPassword}`,
ftpHostKeyPrivate && `COOLIFY_FTP_HOST_KEY_PRIVATE@@@${ftpHostKeyPrivate}`,
ftpHostKey && `COOLIFY_FTP_HOST_KEY@@@${ftpHostKey}`,
2022-10-18 15:01:18 +02:00
]
const settings = [
`MYSQL_ROOT_USER@@@${mysqlRootUser}`,
`MYSQL_USER@@@${mysqlUser}`,
`MYSQL_DATABASE@@@${mysqlDatabase}`,
2022-10-18 15:17:59 +02:00
`MYSQL_HOST@@@${ownMysql ? mysqlHost : `${service.id}-mysql`}`,
2022-10-18 15:01:18 +02:00
`MYSQL_PORT@@@${mysqlPort}`,
`WORDPRESS_CONFIG_EXTRA@@@${extraConfig}`,
`WORDPRESS_TABLE_PREFIX@@@${tablePrefix}`,
2022-10-18 15:17:59 +02:00
`WORDPRESS_DB_HOST@@@${ownMysql ? mysqlHost : `${service.id}-mysql`}`,
`COOLIFY_OWN_DB@@@${ownMysql}`,
`COOLIFY_FTP_ENABLED@@@${ftpEnabled}`,
`COOLIFY_FTP_USER@@@${ftpUser}`,
`COOLIFY_FTP_PUBLIC_PORT@@@${ftpPublicPort}`,
2022-10-18 14:34:10 +02:00
2022-10-18 15:01:18 +02:00
]
2022-10-21 21:19:30 +02:00
await migrateSettings(settings, service, template);
2022-10-18 15:01:18 +02:00
await migrateSecrets(secrets, service);
// Remove old service data
// await prisma.service.update({ where: { id: service.id }, data: { wordpress: { delete: true } } })
}
2022-10-21 21:19:30 +02:00
async function vscodeserver(service: any, template: any) {
2022-10-18 14:45:30 +02:00
const { password } = service.vscodeserver
2022-10-18 14:34:10 +02:00
const secrets = [
`PASSWORD@@@${password}`,
]
await migrateSecrets(secrets, service);
// Remove old service data
// await prisma.service.update({ where: { id: service.id }, data: { vscodeserver: { delete: true } } })
2022-10-18 13:52:47 +02:00
}
2022-10-21 21:19:30 +02:00
async function minio(service: any, template: any) {
2022-10-18 14:34:10 +02:00
const { rootUser, rootUserPassword, apiFqdn } = service.minio
2022-10-18 14:12:33 +02:00
const secrets = [
`MINIO_ROOT_PASSWORD@@@${rootUserPassword}`,
]
const settings = [
`MINIO_ROOT_USER@@@${rootUser}`,
`MINIO_SERVER_URL@@@${apiFqdn}`,
`MINIO_BROWSER_REDIRECT_URL@@@$$generate_fqdn`,
`MINIO_DOMAIN@@@$$generate_domain`,
]
2022-10-21 21:19:30 +02:00
await migrateSettings(settings, service, template);
2022-10-18 14:12:33 +02:00
await migrateSecrets(secrets, service);
// Remove old service data
// await prisma.service.update({ where: { id: service.id }, data: { minio: { delete: true } } })
}
2022-10-21 21:19:30 +02:00
async function fider(service: any, template: any) {
2022-10-18 13:52:47 +02:00
const { postgresqlUser, postgresqlPassword, postgresqlDatabase, jwtSecret, emailNoreply, emailMailgunApiKey, emailMailgunDomain, emailMailgunRegion, emailSmtpHost, emailSmtpPort, emailSmtpUser, emailSmtpPassword, emailSmtpEnableStartTls } = service.fider
const secrets = [
`JWT_SECRET@@@${jwtSecret}`,
emailMailgunApiKey && `EMAIL_MAILGUN_API_KEY@@@${emailMailgunApiKey}`,
emailSmtpPassword && `EMAIL_SMTP_PASSWORD@@@${emailSmtpPassword}`,
`POSTGRES_PASSWORD@@@${postgresqlPassword}`,
]
const settings = [
`BASE_URL@@@$$generate_fqdn`,
`EMAIL_NOREPLY@@@${emailNoreply || 'noreply@example.com'}`,
`EMAIL_MAILGUN_DOMAIN@@@${emailMailgunDomain || ''}`,
`EMAIL_MAILGUN_REGION@@@${emailMailgunRegion || ''}`,
`EMAIL_SMTP_HOST@@@${emailSmtpHost || ''}`,
`EMAIL_SMTP_PORT@@@${emailSmtpPort || 587}`,
`EMAIL_SMTP_USER@@@${emailSmtpUser || ''}`,
`EMAIL_SMTP_PASSWORD@@@${emailSmtpPassword || ''}`,
`EMAIL_SMTP_ENABLE_STARTTLS@@@${emailSmtpEnableStartTls || 'false'}`,
`POSTGRES_USER@@@${postgresqlUser}`,
`POSTGRES_DB@@@${postgresqlDatabase}`,
]
2022-10-21 21:19:30 +02:00
await migrateSettings(settings, service, template);
2022-10-18 13:52:47 +02:00
await migrateSecrets(secrets, service);
// Remove old service data
2022-10-18 14:34:10 +02:00
// await prisma.service.update({ where: { id: service.id }, data: { fider: { delete: true } } })
2022-10-18 13:52:47 +02:00
2022-10-18 12:51:53 +02:00
}
2022-10-21 21:19:30 +02:00
async function plausibleAnalytics(service: any, template: any) {
2022-10-20 09:18:13 +02:00
const { email, username, password, postgresqlUser, postgresqlPassword, postgresqlDatabase, secretKeyBase, scriptName } = service.plausibleAnalytics;
2022-10-18 12:51:53 +02:00
2022-10-18 13:52:47 +02:00
const settings = [
`BASE_URL@@@$$generate_fqdn`,
`ADMIN_USER_EMAIL@@@${email}`,
`ADMIN_USER_NAME@@@${username}`,
`DISABLE_AUTH@@@false`,
`DISABLE_REGISTRATION@@@true`,
`POSTGRESQL_USER@@@${postgresqlUser}`,
`POSTGRESQL_DATABASE@@@${postgresqlDatabase}`,
`SCRIPT_NAME@@@${scriptName}`,
]
const secrets = [
`ADMIN_USER_PWD@@@${password}`,
`SECRET_KEY_BASE@@@${secretKeyBase}`,
`POSTGRES_PASSWORD@@@${postgresqlPassword}`,
`DATABASE_URL@@@${encrypt(`postgres://${postgresqlUser}:${decrypt(postgresqlPassword)}@$$generate_fqdn:5432/${postgresqlDatabase}`)}`,
]
2022-10-21 21:19:30 +02:00
await migrateSettings(settings, service, template);
2022-10-18 13:52:47 +02:00
await migrateSecrets(secrets, service);
2022-10-18 12:51:53 +02:00
// Remove old service data
2022-10-18 14:34:10 +02:00
// await prisma.service.update({ where: { id: service.id }, data: { plausibleAnalytics: { delete: true } } })
}
2022-10-21 21:19:30 +02:00
async function migrateSettings(settings: any[], service: any, template: any) {
2022-10-18 14:34:10 +02:00
for (const setting of settings) {
if (!setting) continue;
2022-10-20 09:18:13 +02:00
let [name, value] = setting.split('@@@')
if (!value || value === 'null') {
continue;
}
2022-10-19 10:55:16 +02:00
// console.log('Migrating setting', name, value, 'for service', service.id, ', service name:', service.name)
2022-10-21 21:19:30 +02:00
const variableName = template.variables.find((v: any) => v.name === name)?.id
await prisma.serviceSetting.findFirst({ where: { name, serviceId: service.id } }) || await prisma.serviceSetting.create({ data: { name, value, variableName, service: { connect: { id: service.id } } } })
2022-10-18 14:34:10 +02:00
}
}
async function migrateSecrets(secrets: any[], service: any) {
for (const secret of secrets) {
if (!secret) continue;
2022-10-20 09:18:13 +02:00
let [name, value] = secret.split('@@@')
if (!value || value === 'null') {
continue
}
2022-10-19 10:55:16 +02:00
// console.log('Migrating secret', name, value, 'for service', service.id, ', service name:', service.name)
2022-10-18 14:34:10 +02:00
await prisma.serviceSecret.findFirst({ where: { name, serviceId: service.id } }) || await prisma.serviceSecret.create({ data: { name, value, service: { connect: { id: service.id } } } })
}
}
2022-10-20 16:06:33 +02:00
async function createVolumes(service: any, template: any) {
2022-10-19 10:55:16 +02:00
const volumes = [];
2022-10-20 16:06:33 +02:00
for (const s of Object.keys(template.services)) {
if (template.services[s].volumes && template.services[s].volumes.length > 0) {
for (const volume of template.services[s].volumes) {
const volumeName = volume.split(':')[0]
const volumePath = volume.split(':')[1]
const volumeService = service.id
volumes.push(`${volumeName}@@@${volumePath}@@@${volumeService}`)
2022-10-19 10:55:16 +02:00
}
}
}
2022-10-18 14:34:10 +02:00
for (const volume of volumes) {
const [volumeName, path, containerId] = volume.split('@@@')
2022-10-19 10:55:16 +02:00
// console.log('Creating volume', volumeName, path, containerId, 'for service', service.id, ', service name:', service.name)
2022-10-18 14:34:10 +02:00
await prisma.servicePersistentStorage.findFirst({ where: { volumeName, serviceId: service.id } }) || await prisma.servicePersistentStorage.create({ data: { volumeName, path, containerId, predefined: true, service: { connect: { id: service.id } } } })
}
2022-10-18 12:51:53 +02:00
}