2013-11-04 18:08:47 +01:00
|
|
|
#!/bin/sh
|
2023-03-20 19:26:23 +01:00
|
|
|
# Copyright 2013, 2016, 2017, 2023 Patrick Volkerding, Sebeka, Minnesota, USA
|
2013-11-04 18:08:47 +01:00
|
|
|
# All rights reserved.
|
|
|
|
#
|
|
|
|
# Redistribution and use of this script, with or without modification, is
|
|
|
|
# permitted provided that the following conditions are met:
|
|
|
|
#
|
|
|
|
# 1. Redistributions of this script must retain the above copyright
|
|
|
|
# notice, this list of conditions and the following disclaimer.
|
|
|
|
#
|
|
|
|
# THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR IMPLIED
|
|
|
|
# WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
|
|
|
|
# MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO
|
|
|
|
# EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
|
|
|
|
# SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
|
|
|
|
# PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS;
|
|
|
|
# OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
|
|
|
|
# WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR
|
|
|
|
# OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF
|
|
|
|
# ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
|
|
|
#
|
|
|
|
|
|
|
|
# This script installs the elilo boot loader, the kernel, and optionally
|
Fri Oct 18 22:51:09 UTC 2024
a/elilo-3.16-x86_64-17.txz: Rebuilt.
eliloconfig: adapt to new naming and lack of huge kernel. Thanks to gildbg.
ap/cups-browsed-2.1.0-x86_64-1.txz: Upgraded.
Removed support for legacy CUPS browsing and for LDAP
Legacy CUPS browsing is not needed any more and, our implementation
accepting any UDP packet on port 631, causes vulnerabilities, and
our LDAP support is does not comly with RFC 7612 and is therefore
limited. Fixes CVE-2024-47176 and CVE-2024-47850
Default `BrowseRemoteProtocols` should not include `cups` protocol
Works around CVE-2024-47176, the fix is the complete removal of
legacy CUPS Browsing functionality.
For more information, see:
https://www.cve.org/CVERecord?id=CVE-2024-47176
https://www.cve.org/CVERecord?id=CVE-2024-47850
(* Security fix *)
l/dav1d-1.5.0-x86_64-1.txz: Upgraded.
l/gvfs-1.56.1-x86_64-1.txz: Upgraded.
l/libcupsfilters-2.1.0-x86_64-1.txz: Upgraded.
`cfGetPrinterAttributes5()`: Validate response attributes before return
The IPP print destination which we are querying can be corrupted or
forged, so validate the response to strenghten security. Fixes
CVE-2024-47076.
For more information, see:
https://www.cve.org/CVERecord?id=CVE-2024-47076
(* Security fix *)
l/libppd-2.1.0-x86_64-1.txz: Upgraded.
Prevent PPD generation based on invalid IPP response
Overtaken from CUPS 2.x: Validate IPP attributes in PPD generator,
refactor make-and-model code, PPDize preset and template names,
quote PPD localized strings. Fixes CVE-2024-47175.
For more information, see:
https://www.cve.org/CVERecord?id=CVE-2024-47175
(* Security fix *)
l/python-MarkupSafe-3.0.2-x86_64-1.txz: Upgraded.
l/python-psutil-6.1.0-x86_64-1.txz: Upgraded.
x/fcitx5-qt-5.1.8-x86_64-1.txz: Upgraded.
2024-10-19 00:51:09 +02:00
|
|
|
# an initrd into the EFI System Partition. A boot menu entry can also be
|
|
|
|
# installed using efibootmgr. The kernel used will be whatever the symlink
|
2024-10-23 01:55:03 +02:00
|
|
|
# /boot/vmlinuz-generic points to, and if /boot/initrd-generic.img (or the
|
|
|
|
# traditional /boot/initrd.gz) exists, that will be installed as the initrd.
|
2013-11-04 18:08:47 +01:00
|
|
|
#
|
|
|
|
# The EFI System Partition is expected to be mounted on /boot/efi before
|
|
|
|
# running this script.
|
|
|
|
|
|
|
|
TMP=/var/log/setup/tmp
|
|
|
|
|
|
|
|
# Set the OS root directory (called T_PX for some unknown reason).
|
|
|
|
# If an argument is given to this script and it is a directory, it
|
|
|
|
# is taken to be the root directory. First though, we check for a
|
|
|
|
# directory named $T_PX, and that gets the first priority.
|
|
|
|
if [ ! -d "$T_PX" ]; then
|
|
|
|
if [ ! "$1" = "" ]; then
|
|
|
|
if [ -d "$1" ]; then
|
|
|
|
T_PX="$1"
|
|
|
|
fi
|
|
|
|
else
|
|
|
|
# Are we on the installer image?
|
|
|
|
if [ -r /usr/lib/setup/SeTpartitions ]; then
|
|
|
|
T_PX=/mnt
|
|
|
|
# Or, are we on a running system?
|
|
|
|
elif [ -r /etc/slackware-version ]; then
|
|
|
|
T_PX=/
|
|
|
|
# One more installer-likely thing:
|
|
|
|
elif [ -r /usr/lib/setup/setup ]; then
|
|
|
|
T_PX=/mnt
|
|
|
|
else
|
|
|
|
# We will have to assume we're on an installed and running system.
|
|
|
|
T_PX=/
|
|
|
|
fi
|
|
|
|
fi
|
|
|
|
fi
|
|
|
|
|
|
|
|
# Determine the root partition (such as /dev/sda1)
|
|
|
|
ROOT_DEVICE=$2
|
|
|
|
if [ "$ROOT_DEVICE" = "" ]; then
|
|
|
|
if [ -r $TMP/SeTrootdev ]; then
|
|
|
|
ROOT_DEVICE="$(cat $TMP/SeTrootdev)"
|
|
|
|
else
|
2018-11-28 08:25:32 +01:00
|
|
|
ROOT_DEVICE="$(mount | grep ' / ' | cut -f 1 -d ' ' | head -n 1)"
|
2013-11-04 18:08:47 +01:00
|
|
|
fi
|
|
|
|
fi
|
|
|
|
|
|
|
|
# If the system is not running under EFI, skip running this script:
|
|
|
|
if [ ! -d /sys/firmware/efi ]; then
|
|
|
|
if [ "$T_PX" = "/" ]; then
|
|
|
|
echo "ERROR: System is not running under UEFI."
|
|
|
|
fi
|
|
|
|
exit
|
|
|
|
fi
|
|
|
|
|
2018-05-28 21:12:29 +02:00
|
|
|
# If there's no vfat mounted on /boot/efi or $T_PX/boot/efi, forget it:
|
2013-11-04 18:08:47 +01:00
|
|
|
if ! mount | grep vfat | grep -wq /boot/efi ; then
|
2018-05-28 21:12:29 +02:00
|
|
|
if ! mount | grep vfat | grep -wq $T_PX/boot/efi ; then
|
2013-11-04 18:08:47 +01:00
|
|
|
if [ "$T_PX" = "/" ]; then
|
|
|
|
echo "ERROR: No EFI System Partition mounted on /boot/efi."
|
|
|
|
fi
|
|
|
|
exit
|
|
|
|
fi
|
|
|
|
fi
|
|
|
|
|
|
|
|
# Figure out the device and partition number of the ESP:
|
2018-05-28 21:12:29 +02:00
|
|
|
DEVLEN=8
|
|
|
|
PARTLEN=9
|
2013-11-04 18:08:47 +01:00
|
|
|
if mount | grep vfat | grep -wq /boot/efi ; then
|
2018-05-28 21:12:29 +02:00
|
|
|
mount | grep vfat | grep -w /boot/efi | grep -q -e nvme -e mmcblk && DEVLEN=12 && PARTLEN=14
|
|
|
|
EFI_DEVICE=$(mount | grep vfat | grep -w /boot/efi | cut -b 1-${DEVLEN})
|
2018-09-12 23:19:38 +02:00
|
|
|
EFI_PARTITION=$(mount | grep vfat | grep -w /boot/efi | cut -f 1 -d ' ' | cut -b ${PARTLEN}- | sed 's/[^0-9]*//g')
|
2013-11-04 18:08:47 +01:00
|
|
|
else
|
2018-05-28 21:12:29 +02:00
|
|
|
mount | grep vfat | grep -w $T_PX/boot/efi | grep -q -e nvme -e mmcblk && DEVLEN=12 && PARTLEN=14
|
|
|
|
EFI_DEVICE=$(mount | grep vfat | grep -w $T_PX/boot/efi | cut -b 1-${DEVLEN})
|
2018-09-12 23:19:38 +02:00
|
|
|
EFI_PARTITION=$(mount | grep vfat | grep -w $T_PX/boot/efi | cut -f 1 -d ' ' | cut -b ${PARTLEN}- | sed 's/[^0-9]*//g')
|
2013-11-04 18:08:47 +01:00
|
|
|
fi
|
|
|
|
|
|
|
|
# There better be a kernel:
|
Fri Oct 18 22:51:09 UTC 2024
a/elilo-3.16-x86_64-17.txz: Rebuilt.
eliloconfig: adapt to new naming and lack of huge kernel. Thanks to gildbg.
ap/cups-browsed-2.1.0-x86_64-1.txz: Upgraded.
Removed support for legacy CUPS browsing and for LDAP
Legacy CUPS browsing is not needed any more and, our implementation
accepting any UDP packet on port 631, causes vulnerabilities, and
our LDAP support is does not comly with RFC 7612 and is therefore
limited. Fixes CVE-2024-47176 and CVE-2024-47850
Default `BrowseRemoteProtocols` should not include `cups` protocol
Works around CVE-2024-47176, the fix is the complete removal of
legacy CUPS Browsing functionality.
For more information, see:
https://www.cve.org/CVERecord?id=CVE-2024-47176
https://www.cve.org/CVERecord?id=CVE-2024-47850
(* Security fix *)
l/dav1d-1.5.0-x86_64-1.txz: Upgraded.
l/gvfs-1.56.1-x86_64-1.txz: Upgraded.
l/libcupsfilters-2.1.0-x86_64-1.txz: Upgraded.
`cfGetPrinterAttributes5()`: Validate response attributes before return
The IPP print destination which we are querying can be corrupted or
forged, so validate the response to strenghten security. Fixes
CVE-2024-47076.
For more information, see:
https://www.cve.org/CVERecord?id=CVE-2024-47076
(* Security fix *)
l/libppd-2.1.0-x86_64-1.txz: Upgraded.
Prevent PPD generation based on invalid IPP response
Overtaken from CUPS 2.x: Validate IPP attributes in PPD generator,
refactor make-and-model code, PPDize preset and template names,
quote PPD localized strings. Fixes CVE-2024-47175.
For more information, see:
https://www.cve.org/CVERecord?id=CVE-2024-47175
(* Security fix *)
l/python-MarkupSafe-3.0.2-x86_64-1.txz: Upgraded.
l/python-psutil-6.1.0-x86_64-1.txz: Upgraded.
x/fcitx5-qt-5.1.8-x86_64-1.txz: Upgraded.
2024-10-19 00:51:09 +02:00
|
|
|
if [ ! -r $T_PX/boot/vmlinuz-generic ]; then
|
2013-11-04 18:08:47 +01:00
|
|
|
if [ "$T_PX" = "/" ]; then
|
Fri Oct 18 22:51:09 UTC 2024
a/elilo-3.16-x86_64-17.txz: Rebuilt.
eliloconfig: adapt to new naming and lack of huge kernel. Thanks to gildbg.
ap/cups-browsed-2.1.0-x86_64-1.txz: Upgraded.
Removed support for legacy CUPS browsing and for LDAP
Legacy CUPS browsing is not needed any more and, our implementation
accepting any UDP packet on port 631, causes vulnerabilities, and
our LDAP support is does not comly with RFC 7612 and is therefore
limited. Fixes CVE-2024-47176 and CVE-2024-47850
Default `BrowseRemoteProtocols` should not include `cups` protocol
Works around CVE-2024-47176, the fix is the complete removal of
legacy CUPS Browsing functionality.
For more information, see:
https://www.cve.org/CVERecord?id=CVE-2024-47176
https://www.cve.org/CVERecord?id=CVE-2024-47850
(* Security fix *)
l/dav1d-1.5.0-x86_64-1.txz: Upgraded.
l/gvfs-1.56.1-x86_64-1.txz: Upgraded.
l/libcupsfilters-2.1.0-x86_64-1.txz: Upgraded.
`cfGetPrinterAttributes5()`: Validate response attributes before return
The IPP print destination which we are querying can be corrupted or
forged, so validate the response to strenghten security. Fixes
CVE-2024-47076.
For more information, see:
https://www.cve.org/CVERecord?id=CVE-2024-47076
(* Security fix *)
l/libppd-2.1.0-x86_64-1.txz: Upgraded.
Prevent PPD generation based on invalid IPP response
Overtaken from CUPS 2.x: Validate IPP attributes in PPD generator,
refactor make-and-model code, PPDize preset and template names,
quote PPD localized strings. Fixes CVE-2024-47175.
For more information, see:
https://www.cve.org/CVERecord?id=CVE-2024-47175
(* Security fix *)
l/python-MarkupSafe-3.0.2-x86_64-1.txz: Upgraded.
l/python-psutil-6.1.0-x86_64-1.txz: Upgraded.
x/fcitx5-qt-5.1.8-x86_64-1.txz: Upgraded.
2024-10-19 00:51:09 +02:00
|
|
|
echo "ERROR: No kernel found at /boot/vmlinuz-generic."
|
2013-11-04 18:08:47 +01:00
|
|
|
fi
|
|
|
|
exit
|
|
|
|
fi
|
|
|
|
|
|
|
|
dialog --title "INSTALL ELILO" \
|
|
|
|
--backtitle "ELILO (EFI Linux Loader) installation" \
|
|
|
|
--menu "ELILO is a Linux boot loader for \
|
|
|
|
EFI based systems. Installing ELILO will allow you to boot your Linux \
|
|
|
|
system from the hard drive after selecting it from the UEFI boot menu. \
|
|
|
|
Since an EFI System Partition was detected on this machine, it is \
|
|
|
|
recommended that you install ELILO now. Please select an option:" \
|
|
|
|
13 70 2 \
|
|
|
|
"install" "Install ELILO on the EFI System Partition" \
|
|
|
|
"skip" "Do not install ELILO" 2> $TMP/reply
|
|
|
|
if [ $? = 1 -o $? = 255 ]; then
|
|
|
|
exit
|
|
|
|
fi
|
|
|
|
REPLY="`cat $TMP/reply`"
|
|
|
|
rm -f $TMP/reply
|
|
|
|
if [ "$REPLY" = "skip" ]; then
|
|
|
|
exit
|
|
|
|
fi
|
|
|
|
|
|
|
|
mkdir -p $T_PX/boot/efi/EFI/Slackware 1> /dev/null 2> /dev/null
|
|
|
|
cat << EOF > $T_PX/boot/efi/EFI/Slackware/elilo.conf
|
|
|
|
chooser=simple
|
|
|
|
delay=1
|
|
|
|
timeout=1
|
|
|
|
#
|
|
|
|
EOF
|
|
|
|
cp -a $T_PX/boot/elilo-x86_64.efi $T_PX/boot/efi/EFI/Slackware/elilo.efi 1> /dev/null 2> /dev/null
|
2024-10-23 01:55:03 +02:00
|
|
|
if [ -r $T_PX/boot/initrd-generic.img -o -r $T_PX/boot/initrd.gz ]; then
|
2019-07-30 01:17:22 +02:00
|
|
|
cp $T_PX/boot/vmlinuz-generic $T_PX/boot/efi/EFI/Slackware/vmlinuz 1> /dev/null 2> /dev/null
|
|
|
|
touch -r $T_PX/boot/vmlinuz-generic $T_PX/boot/efi/EFI/Slackware/vmlinuz
|
2024-10-23 01:55:03 +02:00
|
|
|
if [ -r $T_PX/boot/initrd-generic.img ]; then
|
|
|
|
cp $T_PX/boot/initrd-generic.img $T_PX/boot/efi/EFI/Slackware/initrd.gz 1> /dev/null 2> /dev/null
|
|
|
|
touch -r $T_PX/boot/initrd-generic.img $T_PX/boot/efi/EFI/Slackware/initrd.gz
|
|
|
|
else # we know from the previous test that /boot/initrd.gz exists:
|
|
|
|
cp $T_PX/boot/initrd.gz $T_PX/boot/efi/EFI/Slackware/initrd.gz 1> /dev/null 2> /dev/null
|
|
|
|
touch -r $T_PX/boot/initrd $T_PX/boot/efi/EFI/Slackware/initrd.gz
|
|
|
|
fi
|
2013-11-04 18:08:47 +01:00
|
|
|
cat << EOF >> $T_PX/boot/efi/EFI/Slackware/elilo.conf
|
2019-07-30 01:17:22 +02:00
|
|
|
image=vmlinuz
|
|
|
|
label=vmlinuz
|
2013-11-04 18:08:47 +01:00
|
|
|
initrd=initrd.gz
|
|
|
|
EOF
|
2019-07-30 01:17:22 +02:00
|
|
|
else
|
Fri Oct 18 22:51:09 UTC 2024
a/elilo-3.16-x86_64-17.txz: Rebuilt.
eliloconfig: adapt to new naming and lack of huge kernel. Thanks to gildbg.
ap/cups-browsed-2.1.0-x86_64-1.txz: Upgraded.
Removed support for legacy CUPS browsing and for LDAP
Legacy CUPS browsing is not needed any more and, our implementation
accepting any UDP packet on port 631, causes vulnerabilities, and
our LDAP support is does not comly with RFC 7612 and is therefore
limited. Fixes CVE-2024-47176 and CVE-2024-47850
Default `BrowseRemoteProtocols` should not include `cups` protocol
Works around CVE-2024-47176, the fix is the complete removal of
legacy CUPS Browsing functionality.
For more information, see:
https://www.cve.org/CVERecord?id=CVE-2024-47176
https://www.cve.org/CVERecord?id=CVE-2024-47850
(* Security fix *)
l/dav1d-1.5.0-x86_64-1.txz: Upgraded.
l/gvfs-1.56.1-x86_64-1.txz: Upgraded.
l/libcupsfilters-2.1.0-x86_64-1.txz: Upgraded.
`cfGetPrinterAttributes5()`: Validate response attributes before return
The IPP print destination which we are querying can be corrupted or
forged, so validate the response to strenghten security. Fixes
CVE-2024-47076.
For more information, see:
https://www.cve.org/CVERecord?id=CVE-2024-47076
(* Security fix *)
l/libppd-2.1.0-x86_64-1.txz: Upgraded.
Prevent PPD generation based on invalid IPP response
Overtaken from CUPS 2.x: Validate IPP attributes in PPD generator,
refactor make-and-model code, PPDize preset and template names,
quote PPD localized strings. Fixes CVE-2024-47175.
For more information, see:
https://www.cve.org/CVERecord?id=CVE-2024-47175
(* Security fix *)
l/python-MarkupSafe-3.0.2-x86_64-1.txz: Upgraded.
l/python-psutil-6.1.0-x86_64-1.txz: Upgraded.
x/fcitx5-qt-5.1.8-x86_64-1.txz: Upgraded.
2024-10-19 00:51:09 +02:00
|
|
|
cp $T_PX/boot/vmlinuz-generic $T_PX/boot/efi/EFI/Slackware/vmlinuz 1> /dev/null 2> /dev/null
|
|
|
|
touch -r $T_PX/boot/vmlinuz-generic $T_PX/boot/efi/EFI/Slackware/vmlinuz
|
2019-07-30 01:17:22 +02:00
|
|
|
cat << EOF >> $T_PX/boot/efi/EFI/Slackware/elilo.conf
|
|
|
|
image=vmlinuz
|
|
|
|
label=vmlinuz
|
|
|
|
EOF
|
2013-11-04 18:08:47 +01:00
|
|
|
fi
|
|
|
|
cat << EOF >> $T_PX/boot/efi/EFI/Slackware/elilo.conf
|
|
|
|
read-only
|
|
|
|
append="root=$ROOT_DEVICE vga=normal ro"
|
|
|
|
EOF
|
|
|
|
|
|
|
|
dialog --title "INSTALL BOOT MENU ENTRY?" \
|
|
|
|
--backtitle "ELILO (EFI Linux Loader) installation" \
|
|
|
|
--menu "Would you like to install \
|
|
|
|
a boot menu entry so that you can easily select Slackware when you boot your \
|
|
|
|
machine? WARNING: DO NOT install a boot menu entry on Apple hardware. \
|
|
|
|
Apple computers use a different type of EFI firmware, and efibootmgr has \
|
|
|
|
been known to damage them. On all other computers, it is recommended to add \
|
|
|
|
a boot menu entry. Please select an option:" \
|
|
|
|
14 70 2 \
|
|
|
|
"install" "Install a boot menu entry" \
|
|
|
|
"skip" "Do not install a boot menu entry" 2> $TMP/reply
|
|
|
|
if [ $? = 1 -o $? = 255 ]; then
|
|
|
|
exit
|
|
|
|
fi
|
|
|
|
REPLY="`cat $TMP/reply`"
|
|
|
|
rm -f $TMP/reply
|
|
|
|
if [ "$REPLY" = "skip" ]; then
|
|
|
|
exit
|
|
|
|
fi
|
|
|
|
|
|
|
|
efibootmgr -v | rev | cut -f 2- | rev | grep Boot0 | grep Slackware | while read line ; do
|
|
|
|
# Reject entries that don't exactly match as not our business
|
|
|
|
if [ ! "$(echo $line | cut -f 2- -d ' ')" = "Slackware" ]; then
|
|
|
|
continue
|
|
|
|
fi
|
|
|
|
ENTRY="$(efibootmgr -v | grep "^$(echo $line | cut -b1-8)")"
|
|
|
|
dialog --title "REMOVE OLD \"Slackware\" EFI BOOT ENTRY?" \
|
|
|
|
--backtitle "ELILO (EFI Linux Loader) installation" \
|
|
|
|
--yesno "An old Slackware boot entry has been found in your EFI boot menu. \
|
|
|
|
Would you like to remove this before installing the new Slackware boot \
|
|
|
|
entry? This is recommended.\n\nOld EFI boot menu entry:\n$ENTRY" 13 70
|
|
|
|
if [ ! $? = 0 ]; then
|
|
|
|
continue
|
|
|
|
fi
|
|
|
|
# Remove the boot entry:
|
|
|
|
efibootmgr -q -B -b $(echo $line | cut -b5-8)
|
2018-11-28 08:25:32 +01:00
|
|
|
sleep 1
|
2013-11-04 18:08:47 +01:00
|
|
|
done
|
|
|
|
|
|
|
|
efibootmgr -q -c -d $EFI_DEVICE -p $EFI_PARTITION -l "\\EFI\\Slackware\\elilo.efi" -L "Slackware"
|
2018-11-28 08:25:32 +01:00
|
|
|
sleep 1
|
2013-11-04 18:08:47 +01:00
|
|
|
|
|
|
|
efibootmgr -v | rev | cut -f 2- | rev | grep Boot0 | grep Slackware | while read line ; do
|
|
|
|
# Reject entries that don't exactly match as not our business
|
|
|
|
if [ ! "$(echo $line | cut -f 2- -d ' ')" = "Slackware" ]; then
|
|
|
|
continue
|
|
|
|
fi
|
|
|
|
ENTRY="$(efibootmgr -v | grep "^$(echo $line | cut -b1-8)")"
|
|
|
|
if echo $ENTRY | grep -q -F "\EFI\Slackware\elilo.efi" ; then
|
|
|
|
dialog --title "EFI BOOT ENTRY INSTALLED" \
|
|
|
|
--backtitle "ELILO (EFI Linux Loader) installation" \
|
|
|
|
--msgbox "A Slackware boot entry has been installed to your EFI boot
|
|
|
|
menu.\n\nEFI boot menu entry:\n$ENTRY" 11 70
|
|
|
|
fi
|
|
|
|
done
|
|
|
|
|
|
|
|
# Done.
|