mirror of
https://github.com/kemko/nomad.git
synced 2026-01-01 16:05:42 +03:00
676 lines
18 KiB
Go
676 lines
18 KiB
Go
// Copyright (c) HashiCorp, Inc.
|
|
// SPDX-License-Identifier: BUSL-1.1
|
|
|
|
package command
|
|
|
|
import (
|
|
"flag"
|
|
"fmt"
|
|
"os"
|
|
"reflect"
|
|
"strconv"
|
|
"strings"
|
|
|
|
"github.com/hashicorp/cap/util"
|
|
"github.com/hashicorp/cli"
|
|
"github.com/hashicorp/nomad/api"
|
|
"github.com/hashicorp/nomad/helper/pointer"
|
|
colorable "github.com/mattn/go-colorable"
|
|
"github.com/mitchellh/colorstring"
|
|
"github.com/posener/complete"
|
|
"golang.org/x/crypto/ssh/terminal"
|
|
)
|
|
|
|
const (
|
|
// Constants for CLI identifier length
|
|
shortId = 8
|
|
fullId = 36
|
|
)
|
|
|
|
// FlagSetFlags is an enum to define what flags are present in the
|
|
// default FlagSet returned by Meta.FlagSet.
|
|
type FlagSetFlags uint
|
|
|
|
const (
|
|
FlagSetNone FlagSetFlags = 0
|
|
FlagSetClient FlagSetFlags = 1 << iota
|
|
FlagSetDefault = FlagSetClient
|
|
)
|
|
|
|
// Meta contains the meta-options and functionality that nearly every
|
|
// Nomad command inherits.
|
|
type Meta struct {
|
|
Ui cli.Ui
|
|
|
|
// These are set by the command line flags.
|
|
flagAddress string
|
|
|
|
// Whether to not-colorize output
|
|
noColor bool
|
|
|
|
// Whether to force colorized output
|
|
forceColor bool
|
|
|
|
// The value of the -region CLI flag to send with API requests
|
|
// note: does not reflect any environment variables
|
|
region string
|
|
|
|
// The value of the -namespace CLI flag to send with API requests
|
|
// note: does not reflect any environment variables
|
|
namespace string
|
|
|
|
// token is used for ACLs to access privileged information
|
|
token string
|
|
|
|
showCLIHints *bool
|
|
|
|
caCert string
|
|
caPath string
|
|
clientCert string
|
|
clientKey string
|
|
tlsServerName string
|
|
insecure bool
|
|
}
|
|
|
|
// FlagSet returns a FlagSet with the common flags that every
|
|
// command implements. The exact behavior of FlagSet can be configured
|
|
// using the flags as the second parameter, for example to disable
|
|
// server settings on the commands that don't talk to a server.
|
|
func (m *Meta) FlagSet(n string, fs FlagSetFlags) *flag.FlagSet {
|
|
f := flag.NewFlagSet(n, flag.ContinueOnError)
|
|
|
|
// FlagSetClient is used to enable the settings for specifying
|
|
// client connectivity options.
|
|
if fs&FlagSetClient != 0 {
|
|
f.StringVar(&m.flagAddress, "address", "", "")
|
|
f.StringVar(&m.region, "region", "", "")
|
|
f.StringVar(&m.namespace, "namespace", "", "")
|
|
f.BoolVar(&m.noColor, "no-color", false, "")
|
|
f.BoolVar(&m.forceColor, "force-color", false, "")
|
|
f.StringVar(&m.caCert, "ca-cert", "", "")
|
|
f.StringVar(&m.caPath, "ca-path", "", "")
|
|
f.StringVar(&m.clientCert, "client-cert", "", "")
|
|
f.StringVar(&m.clientKey, "client-key", "", "")
|
|
f.BoolVar(&m.insecure, "insecure", false, "")
|
|
f.StringVar(&m.tlsServerName, "tls-server-name", "", "")
|
|
f.BoolVar(&m.insecure, "tls-skip-verify", false, "")
|
|
f.StringVar(&m.token, "token", "", "")
|
|
|
|
}
|
|
|
|
f.SetOutput(&uiErrorWriter{ui: m.Ui})
|
|
|
|
return f
|
|
}
|
|
|
|
// AutocompleteFlags returns a set of flag completions for the given flag set.
|
|
func (m *Meta) AutocompleteFlags(fs FlagSetFlags) complete.Flags {
|
|
if fs&FlagSetClient == 0 {
|
|
return nil
|
|
}
|
|
|
|
return complete.Flags{
|
|
"-address": complete.PredictAnything,
|
|
"-region": complete.PredictAnything,
|
|
"-namespace": NamespacePredictor(m.Client, nil),
|
|
"-no-color": complete.PredictNothing,
|
|
"-force-color": complete.PredictNothing,
|
|
"-ca-cert": complete.PredictFiles("*"),
|
|
"-ca-path": complete.PredictDirs("*"),
|
|
"-client-cert": complete.PredictFiles("*"),
|
|
"-client-key": complete.PredictFiles("*"),
|
|
"-insecure": complete.PredictNothing,
|
|
"-tls-server-name": complete.PredictNothing,
|
|
"-tls-skip-verify": complete.PredictNothing,
|
|
"-token": complete.PredictAnything,
|
|
}
|
|
}
|
|
|
|
// askQuestion asks question to user until they provide a valid response.
|
|
func (m *Meta) askQuestion(question string) bool {
|
|
for {
|
|
answer, err := m.Ui.Ask(m.Colorize().Color(fmt.Sprintf("[?] %s", question)))
|
|
if err != nil {
|
|
if err.Error() != "interrupted" {
|
|
m.Ui.Output(err.Error())
|
|
os.Exit(1)
|
|
}
|
|
os.Exit(0)
|
|
}
|
|
|
|
switch strings.TrimSpace(strings.ToLower(answer)) {
|
|
case "", "y", "yes":
|
|
return true
|
|
case "n", "no":
|
|
return false
|
|
default:
|
|
m.Ui.Output(fmt.Sprintf(`%q is not a valid response, please answer "yes" or "no".`, answer))
|
|
continue
|
|
}
|
|
}
|
|
}
|
|
|
|
// ApiClientFactory is the signature of a API client factory
|
|
type ApiClientFactory func() (*api.Client, error)
|
|
|
|
// Client is used to initialize and return a new API client using
|
|
// the default command line arguments and env vars.
|
|
func (m *Meta) clientConfig() *api.Config {
|
|
config := api.DefaultConfig()
|
|
|
|
if m.flagAddress != "" {
|
|
config.Address = m.flagAddress
|
|
}
|
|
if m.region != "" {
|
|
config.Region = m.region
|
|
}
|
|
if m.namespace != "" {
|
|
config.Namespace = m.namespace
|
|
}
|
|
|
|
if m.token != "" {
|
|
config.SecretID = m.token
|
|
}
|
|
|
|
// Override TLS configuration fields we may have received from env vars with
|
|
// flag arguments from the user only if they're provided.
|
|
if m.caCert != "" {
|
|
config.TLSConfig.CACert = m.caCert
|
|
}
|
|
|
|
if m.caPath != "" {
|
|
config.TLSConfig.CAPath = m.caPath
|
|
}
|
|
|
|
if m.clientCert != "" {
|
|
config.TLSConfig.ClientCert = m.clientCert
|
|
}
|
|
|
|
if m.clientKey != "" {
|
|
config.TLSConfig.ClientKey = m.clientKey
|
|
}
|
|
|
|
if m.tlsServerName != "" {
|
|
config.TLSConfig.TLSServerName = m.tlsServerName
|
|
}
|
|
|
|
if m.insecure {
|
|
config.TLSConfig.Insecure = m.insecure
|
|
}
|
|
|
|
return config
|
|
}
|
|
|
|
func (m *Meta) Client() (*api.Client, error) {
|
|
return api.NewClient(m.clientConfig())
|
|
}
|
|
|
|
// Namespace returns the Nomad namespace used for API calls,
|
|
// from either the -namespace flag, or the NOMAD_NAMESPACE env var.
|
|
func (m *Meta) Namespace() string {
|
|
return m.clientConfig().Namespace
|
|
}
|
|
|
|
// Region returns the Nomad region used for API calls,
|
|
// from either the -region flag, or the NOMAD_REGION env var.
|
|
func (m *Meta) Region() string {
|
|
return m.clientConfig().Region
|
|
}
|
|
|
|
func (m *Meta) allNamespaces() bool {
|
|
return m.clientConfig().Namespace == api.AllNamespacesNamespace
|
|
}
|
|
|
|
func (m *Meta) Colorize() *colorstring.Colorize {
|
|
ui := m.Ui
|
|
coloredUi := false
|
|
|
|
// Meta.Ui may wrap other cli.Ui instances, so unwrap them until we find a
|
|
// *cli.ColoredUi or there is nothing left to unwrap.
|
|
for {
|
|
if ui == nil {
|
|
break
|
|
}
|
|
|
|
_, coloredUi = ui.(*cli.ColoredUi)
|
|
if coloredUi {
|
|
break
|
|
}
|
|
|
|
v := reflect.ValueOf(ui)
|
|
if v.Kind() == reflect.Ptr {
|
|
v = v.Elem()
|
|
}
|
|
for i := 0; i < v.NumField(); i++ {
|
|
if !v.Field(i).CanInterface() {
|
|
continue
|
|
}
|
|
ui, _ = v.Field(i).Interface().(cli.Ui)
|
|
if ui != nil {
|
|
break
|
|
}
|
|
}
|
|
}
|
|
|
|
return &colorstring.Colorize{
|
|
Colors: colorstring.DefaultColors,
|
|
Disable: !coloredUi,
|
|
Reset: true,
|
|
}
|
|
}
|
|
|
|
func (m *Meta) SetupUi(args []string) {
|
|
noColor := os.Getenv(EnvNomadCLINoColor) != ""
|
|
forceColor := os.Getenv(EnvNomadCLIForceColor) != ""
|
|
|
|
for _, arg := range args {
|
|
// Check if color is set
|
|
if arg == "-no-color" || arg == "--no-color" {
|
|
noColor = true
|
|
} else if arg == "-force-color" || arg == "--force-color" {
|
|
forceColor = true
|
|
}
|
|
}
|
|
|
|
m.Ui = &cli.BasicUi{
|
|
Reader: os.Stdin,
|
|
Writer: colorable.NewColorableStdout(),
|
|
ErrorWriter: colorable.NewColorableStderr(),
|
|
}
|
|
|
|
// Only use colored UI if not disabled and stdout is a tty or colors are
|
|
// forced.
|
|
isTerminal := terminal.IsTerminal(int(os.Stdout.Fd()))
|
|
useColor := !noColor && (isTerminal || forceColor)
|
|
if useColor {
|
|
m.Ui = &cli.ColoredUi{
|
|
ErrorColor: cli.UiColorRed,
|
|
WarnColor: cli.UiColorYellow,
|
|
InfoColor: cli.UiColorGreen,
|
|
Ui: m.Ui,
|
|
}
|
|
}
|
|
|
|
// Check to see if the user has disabled hints via env var.
|
|
showCLIHints := os.Getenv(EnvNomadCLIShowHints)
|
|
if showCLIHints != "" {
|
|
if show, err := strconv.ParseBool(showCLIHints); err == nil {
|
|
m.showCLIHints = pointer.Of(show)
|
|
} else {
|
|
m.Ui.Warn(fmt.Sprintf("Invalid value %q for %s: %v", showCLIHints, EnvNomadCLIShowHints, err))
|
|
}
|
|
}
|
|
}
|
|
|
|
// FormatWarnings returns a string with the warnings formatted for CLI output.
|
|
func (m *Meta) FormatWarnings(header string, warnings string) string {
|
|
return m.Colorize().Color(
|
|
fmt.Sprintf("[bold][yellow]%s Warnings:\n%s[reset]\n",
|
|
header,
|
|
warnings,
|
|
))
|
|
}
|
|
|
|
// JobByPrefixFilterFunc is a function used to filter jobs when performing a
|
|
// prefix match. Only jobs that return true are included in the prefix match.
|
|
type JobByPrefixFilterFunc func(*api.JobListStub) bool
|
|
|
|
// NoJobWithPrefixError is the error returned when the job prefix doesn't
|
|
// return any matches.
|
|
type NoJobWithPrefixError struct {
|
|
Prefix string
|
|
}
|
|
|
|
func (e *NoJobWithPrefixError) Error() string {
|
|
return fmt.Sprintf("No job(s) with prefix or ID %q found", e.Prefix)
|
|
}
|
|
|
|
// JobByPrefix returns the job that best matches the given prefix. Returns an
|
|
// error if there are no matches or if there are more than one exact match
|
|
// across namespaces.
|
|
func (m *Meta) JobByPrefix(client *api.Client, prefix string, filter JobByPrefixFilterFunc) (*api.Job, error) {
|
|
jobID, namespace, err := m.JobIDByPrefix(client, prefix, filter)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
q := &api.QueryOptions{Namespace: namespace}
|
|
job, _, err := client.Jobs().Info(jobID, q)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("Error querying job %q: %s", jobID, err)
|
|
}
|
|
job.Namespace = pointer.Of(namespace)
|
|
|
|
return job, nil
|
|
}
|
|
|
|
// JobIDByPrefix provides best effort match for the given job prefix.
|
|
// Returns the prefix itself if job prefix search is not allowed and an error
|
|
// if there are no matches or if there are more than one exact match across
|
|
// namespaces.
|
|
func (m *Meta) JobIDByPrefix(client *api.Client, prefix string, filter JobByPrefixFilterFunc) (string, string, error) {
|
|
// Search job by prefix. Return an error if there is not an exact match.
|
|
jobs, _, err := client.Jobs().PrefixList(prefix)
|
|
if err != nil {
|
|
if strings.Contains(err.Error(), api.PermissionDeniedErrorContent) {
|
|
return prefix, "", nil
|
|
}
|
|
return "", "", fmt.Errorf("Error querying job prefix %q: %s", prefix, err)
|
|
}
|
|
|
|
if filter != nil {
|
|
var filtered []*api.JobListStub
|
|
for _, j := range jobs {
|
|
if filter(j) {
|
|
filtered = append(filtered, j)
|
|
}
|
|
}
|
|
jobs = filtered
|
|
}
|
|
|
|
if len(jobs) == 0 {
|
|
return "", "", &NoJobWithPrefixError{Prefix: prefix}
|
|
}
|
|
if len(jobs) > 1 {
|
|
exactMatch := prefix == jobs[0].ID
|
|
matchInMultipleNamespaces := m.allNamespaces() && jobs[0].ID == jobs[1].ID
|
|
if !exactMatch || matchInMultipleNamespaces {
|
|
return "", "", fmt.Errorf(
|
|
"Prefix %q matched multiple jobs\n\n%s",
|
|
prefix,
|
|
createStatusListOutput(jobs, m.allNamespaces()),
|
|
)
|
|
}
|
|
}
|
|
|
|
return jobs[0].ID, jobs[0].JobSummary.Namespace, nil
|
|
}
|
|
|
|
type usageOptsFlags uint8
|
|
|
|
const (
|
|
usageOptsDefault usageOptsFlags = 0
|
|
usageOptsNoNamespace = 1 << iota
|
|
)
|
|
|
|
// generalOptionsUsage returns the help string for the global options.
|
|
func generalOptionsUsage(usageOpts usageOptsFlags) string {
|
|
|
|
helpText := `
|
|
-address=<addr>
|
|
The address of the Nomad server.
|
|
Overrides the NOMAD_ADDR environment variable if set.
|
|
Default = http://127.0.0.1:4646
|
|
|
|
-region=<region>
|
|
The region of the Nomad servers to forward commands to.
|
|
Overrides the NOMAD_REGION environment variable if set.
|
|
Defaults to the Agent's local region.
|
|
`
|
|
|
|
namespaceText := `
|
|
-namespace=<namespace>
|
|
The target namespace for queries and actions bound to a namespace.
|
|
Overrides the NOMAD_NAMESPACE environment variable if set.
|
|
If set to '*', subcommands which support this functionality query
|
|
all namespaces authorized to user.
|
|
Defaults to the "default" namespace.
|
|
`
|
|
|
|
// note: that although very few commands use color explicitly, all of them
|
|
// return red-colored text on error so we want the color flags to always be
|
|
// present in the help messages.
|
|
remainingText := `
|
|
-no-color
|
|
Disables colored command output. Alternatively, NOMAD_CLI_NO_COLOR may be
|
|
set. This option takes precedence over -force-color.
|
|
|
|
-force-color
|
|
Forces colored command output. This can be used in cases where the usual
|
|
terminal detection fails. Alternatively, NOMAD_CLI_FORCE_COLOR may be set.
|
|
This option has no effect if -no-color is also used.
|
|
|
|
-ca-cert=<path>
|
|
Path to a PEM encoded CA cert file to use to verify the
|
|
Nomad server SSL certificate. Overrides the NOMAD_CACERT
|
|
environment variable if set.
|
|
|
|
-ca-path=<path>
|
|
Path to a directory of PEM encoded CA cert files to verify
|
|
the Nomad server SSL certificate. If both -ca-cert and
|
|
-ca-path are specified, -ca-cert is used. Overrides the
|
|
NOMAD_CAPATH environment variable if set.
|
|
|
|
-client-cert=<path>
|
|
Path to a PEM encoded client certificate for TLS authentication
|
|
to the Nomad server. Must also specify -client-key. Overrides
|
|
the NOMAD_CLIENT_CERT environment variable if set.
|
|
|
|
-client-key=<path>
|
|
Path to an unencrypted PEM encoded private key matching the
|
|
client certificate from -client-cert. Overrides the
|
|
NOMAD_CLIENT_KEY environment variable if set.
|
|
|
|
-tls-server-name=<value>
|
|
The server name to use as the SNI host when connecting via
|
|
TLS. Overrides the NOMAD_TLS_SERVER_NAME environment variable if set.
|
|
|
|
-tls-skip-verify
|
|
Do not verify TLS certificate. This is highly not recommended. Verification
|
|
will also be skipped if NOMAD_SKIP_VERIFY is set.
|
|
|
|
-token
|
|
The SecretID of an ACL token to use to authenticate API requests with.
|
|
Overrides the NOMAD_TOKEN environment variable if set.
|
|
`
|
|
|
|
if usageOpts&usageOptsNoNamespace == 0 {
|
|
helpText = helpText + namespaceText
|
|
}
|
|
|
|
helpText = helpText + remainingText
|
|
return strings.TrimSpace(helpText)
|
|
}
|
|
|
|
// funcVar is a type of flag that accepts a function that is the string given
|
|
// by the user.
|
|
type funcVar func(s string) error
|
|
|
|
func (f funcVar) Set(s string) error { return f(s) }
|
|
func (f funcVar) String() string { return "" }
|
|
func (f funcVar) IsBoolFlag() bool { return false }
|
|
|
|
type UIRoute struct {
|
|
Path string
|
|
Description string
|
|
}
|
|
|
|
type UIHintContext struct {
|
|
Command string
|
|
PathParams map[string]string
|
|
OpenURL bool
|
|
}
|
|
|
|
const (
|
|
// Colors and styles
|
|
resetter = "\033[0m"
|
|
magenta = "\033[35m"
|
|
blue = "\033[34m"
|
|
bold = "\033[1m"
|
|
|
|
// Output formatting
|
|
uiHintDelimiter = "\n\n==> "
|
|
defaultHint = "See more in the Web UI:"
|
|
)
|
|
|
|
var CommandUIRoutes = map[string]UIRoute{
|
|
"server members": {
|
|
Path: "/servers",
|
|
Description: "View and manage Nomad servers",
|
|
},
|
|
"node status": {
|
|
Path: "/clients",
|
|
Description: "View and manage Nomad clients",
|
|
},
|
|
"node status single": {
|
|
Path: "/clients/:nodeID",
|
|
Description: "View client details and metrics",
|
|
},
|
|
"job status": {
|
|
Path: "/jobs",
|
|
Description: "View and manage Nomad jobs",
|
|
},
|
|
"job status single": {
|
|
Path: "/jobs/:jobID@:namespace",
|
|
Description: "View job details and metrics",
|
|
},
|
|
"job run": {
|
|
Path: "/jobs/:jobID@:namespace",
|
|
Description: "View this job",
|
|
},
|
|
"alloc status": {
|
|
Path: "/allocations/:allocID",
|
|
Description: "View allocation details",
|
|
},
|
|
"var list": {
|
|
Path: "/variables",
|
|
Description: "View Nomad variables",
|
|
},
|
|
"var list prefix": {
|
|
Path: "/variables/path/:prefix",
|
|
Description: "View Nomad variables at this path",
|
|
},
|
|
"var get": {
|
|
Path: "/variables/var/:path@:namespace",
|
|
Description: "View variable details",
|
|
},
|
|
"var put": {
|
|
Path: "/variables/var/:path@:namespace",
|
|
Description: "View variable details",
|
|
},
|
|
"job dispatch": {
|
|
Path: "/jobs/:dispatchID@:namespace",
|
|
Description: "View this job",
|
|
},
|
|
"eval list": {
|
|
Path: "/evaluations",
|
|
Description: "View evaluations",
|
|
},
|
|
"eval status": {
|
|
Path: "/evaluations?currentEval=:evalID",
|
|
Description: "View evaluation details",
|
|
},
|
|
"deployment status": {
|
|
Path: "/jobs/:jobID/deployments",
|
|
Description: "View all deployments for this job",
|
|
},
|
|
}
|
|
|
|
func (m *Meta) formatUIHint(url string, description string) string {
|
|
if description == "" {
|
|
description = defaultHint
|
|
}
|
|
|
|
description = fmt.Sprintf("%s in the Web UI:", description)
|
|
|
|
// Basic version without colors
|
|
hint := fmt.Sprintf("%s%s %s", uiHintDelimiter, description, url)
|
|
|
|
// If colors are disabled, return basic version
|
|
_, coloredUi := m.Ui.(*cli.ColoredUi)
|
|
if m.noColor || !coloredUi {
|
|
return hint
|
|
}
|
|
|
|
return fmt.Sprintf("%[1]s%[2]s%[3]s%[4]s%[5]s %[6]s%[7]s%[8]s",
|
|
bold,
|
|
magenta,
|
|
uiHintDelimiter[1:], // "==> "
|
|
description,
|
|
resetter,
|
|
blue,
|
|
url,
|
|
resetter,
|
|
)
|
|
}
|
|
|
|
func (m *Meta) buildUIPath(route UIRoute, params map[string]string) (string, error) {
|
|
client, err := m.Client()
|
|
if err != nil {
|
|
return "", fmt.Errorf("error getting client config: %v", err)
|
|
}
|
|
|
|
path := route.Path
|
|
for k, v := range params {
|
|
path = strings.ReplaceAll(path, fmt.Sprintf(":%s", k), v)
|
|
}
|
|
|
|
return fmt.Sprintf("%s/ui%s", client.Address(), path), nil
|
|
}
|
|
|
|
func (m *Meta) showUIPath(ctx UIHintContext) (string, error) {
|
|
route, exists := CommandUIRoutes[ctx.Command]
|
|
if !exists {
|
|
return "", nil
|
|
}
|
|
|
|
url, err := m.buildUIPath(route, ctx.PathParams)
|
|
if err != nil {
|
|
return "", err
|
|
}
|
|
|
|
if ctx.OpenURL {
|
|
if err := util.OpenURL(url); err != nil {
|
|
m.Ui.Warn(fmt.Sprintf("Failed to open browser: %v", err))
|
|
}
|
|
}
|
|
|
|
if m.uiHintsDisabled() {
|
|
return "", nil
|
|
}
|
|
|
|
return m.formatUIHint(url, route.Description), nil
|
|
}
|
|
|
|
func (m *Meta) uiHintsDisabled() bool {
|
|
// Either the local env var is set to false,
|
|
// or the agent config is set to false nad the local config isn't set to true
|
|
|
|
// First check if the user/env var is set to false. If it is, return early.
|
|
if m.showCLIHints != nil && !*m.showCLIHints {
|
|
return true
|
|
}
|
|
|
|
// Next, check if the agent config is set to false. If it is, return early.
|
|
client, err := m.Client()
|
|
if err != nil {
|
|
return true
|
|
}
|
|
|
|
agent, err := client.Agent().Self()
|
|
if err != nil {
|
|
return true
|
|
}
|
|
|
|
agentConfig := agent.Config
|
|
agentUIConfig, ok := agentConfig["UI"].(map[string]any)
|
|
if !ok {
|
|
return false
|
|
}
|
|
|
|
agentShowCLIHints, ok := agentUIConfig["ShowCLIHints"].(bool)
|
|
if !ok {
|
|
return false
|
|
}
|
|
|
|
if !agentShowCLIHints {
|
|
// check to see if env var is set to true, overriding the agent setting
|
|
if m.showCLIHints != nil && *m.showCLIHints {
|
|
return false
|
|
}
|
|
return true
|
|
}
|
|
|
|
return false
|
|
}
|