Skip to content

Commit e027484

Browse files
leggetterclaude
andauthored
fix(mcp): auth-aware gateway MCP, stdio stderr, login reauth (#280)
* fix(mcp): auth-aware gateway MCP, stderr for Execute, login reauth - Skip requireGatewayProject for gateway mcp when no API key; enforce when key present - Route gateway mcp errors and login-required messages to stderr; no interactive login - argvContainsGatewayMCP skips global flags (e.g. --profile, -p) - Always register hookdeck_login with optional reauth; clear credentials then device login - Hedged list-projects failure hint suggesting reauth for 401/403-style errors - ClearMCPProfileCredentials for memory-only or persisted config - Acceptance: subprocess gateway mcp with stdin pipe; stdout JSON-RPC hygiene Made-with: Cursor * refactor(config): centralize silent credential clear for logout and MCP - Rename ClearMCPProfileCredentials to ClearActiveProfileCredentials; document disk vs memory paths - Logout uses the same helper as MCP reauth; zeroProfileCredentialFields helper - RemoveAllProfiles clears in-memory credential fields after wiping the file (parity with logout -a) - Rename config test to match new API Made-with: Cursor * Tighten error matching, improve login context handling, and tests (#281) * fix(review): tighten error matching, add safety comments, revert noise - tool_projects_errors.go: match "status code: 4xx" instead of bare "401"/"403" to avoid false positives on IDs or timestamps - tool_login.go: remove `_ = ctx` suppression, add TODO for context propagation to polling goroutine, document happens-before on loginState.err via channel close - root.go: add maintenance comment linking flagNeedsNextArg to init() - helpers.go: revert unrelated Attempt struct alignment change https://claude.ai/code/session_01EpXZqTmgybtjgmSALukH8d * fix(review): ListProjects returns *APIError, add reauth + argv tests - projects.go: use checkAndPrintError instead of manual status check so ListProjects errors are structured *APIError — the errors.As path in shouldSuggestReauthAfterListProjectsFailure now matches directly - tool_projects_errors_test.go: unit tests for reauth hint logic covering APIError 401/403, plain error fallback, and false-positive resistance - root_argv_test.go: document boolean-flag-between-subcommands limitation https://claude.ai/code/session_01EpXZqTmgybtjgmSALukH8d * fix(mcp): cancel login polling goroutine on MCP session close Thread the request context into the login polling goroutine so it stops promptly when the MCP transport closes, instead of running for up to ~4 minutes after the client disconnects. WaitForAPIKey blocks with time.Sleep and doesn't accept a context, so we run it in an inner goroutine and select on both its result channel and ctx.Done(). The inner goroutine is bounded by loginMaxAttempts. https://claude.ai/code/session_01EpXZqTmgybtjgmSALukH8d --------- Co-authored-by: Claude <noreply@anthropic.com> * fix(mcp): review fixes for auth-aware gateway MCP (#282) * fix(review): tighten error matching, add safety comments, revert noise - tool_projects_errors.go: match "status code: 4xx" instead of bare "401"/"403" to avoid false positives on IDs or timestamps - tool_login.go: remove `_ = ctx` suppression, add TODO for context propagation to polling goroutine, document happens-before on loginState.err via channel close - root.go: add maintenance comment linking flagNeedsNextArg to init() - helpers.go: revert unrelated Attempt struct alignment change https://claude.ai/code/session_01EpXZqTmgybtjgmSALukH8d * fix(mcp): cancel login polling goroutine on MCP session close Thread the request context into the login polling goroutine so it stops promptly when the MCP transport closes, instead of running for up to ~4 minutes after the client disconnects. WaitForAPIKey blocks with time.Sleep and doesn't accept a context, so we run it in an inner goroutine and select on both its result channel and ctx.Done(). The inner goroutine is bounded by loginMaxAttempts. https://claude.ai/code/session_01EpXZqTmgybtjgmSALukH8d * fix(mcp): use session-level context for login polling, not per-request The per-request ctx passed to MCP tool handlers is cancelled when the handler returns. The previous commit selected on that ctx in the login polling goroutine, which killed the poll immediately after returning the browser URL — breaking in-MCP authentication. Fix: add a sessionCtx field to Server, set it in Run() (called by RunStdio and tests), and select on that instead. The session context is only cancelled when the MCP transport closes (stdin EOF), which is the correct signal to abandon login polling. Also adds TestLoginTool_PollSurvivesAcrossToolCalls: a regression test that starts a login flow, lets the mock auth complete between tool calls, and verifies the client is authenticated on the second call. This would have caught the per-request ctx bug. https://claude.ai/code/session_01EpXZqTmgybtjgmSALukH8d --------- Co-authored-by: Claude <noreply@anthropic.com> * fix(test): MCP login poll timing, profile save guard, retry API 500 - Wait loginPollInterval before second hookdeck_login in PollSurvives test - SaveActiveProfileAfterLogin: skip disk persist when viper nil (tests) - CLIRunner: retry transient HTTP 500 like 502 for acceptance flakes Made-with: Cursor * fix(cli): validate without stale project headers; sync profile from API Omit X-Team-ID/X-Project-ID on GET /cli-auth/validate via clientForCLIAuthValidate so a valid CLI key is not rejected when config.toml has a stale project_id. After successful validate on the existing-key login path, persist project_id, project_mode, and project_type from the response. Add Profile Apply* helpers for validate, poll, and CI responses; use them from login, interactive login, and MCP hookdeck_login. requireGatewayProject now applies the full validate response (including project_id) without clearing guest_url. Tests: auth validate headers, profile apply helpers, LoadConfigFromFile, gateway resolve-from-validate integration. Made-with: Cursor * docs(agents): go test in Cursor, module cache, out-of-sandbox runs Document GOMODCACHE for agent shells, prompt-first elevated execution, and point CLAUDE.md at AGENTS.md as the single source for agent instructions. Made-with: Cursor * chore: send command flag names in CLI telemetry Include changed flag names (not values) as command_flags in X-Hookdeck-CLI-Telemetry JSON. Wire CollectChangedFlagNames from root initTelemetry. Add unit tests and acceptance test for login --api-key and --cli-key over the recording proxy. Made-with: Cursor --------- Co-authored-by: Claude <noreply@anthropic.com>
1 parent fa7cf93 commit e027484

33 files changed

+1264
-128
lines changed

AGENTS.md

Lines changed: 57 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -228,12 +228,21 @@ pkg/hookdeck/
228228
229229
## 5. Development Workflow
230230
231+
### Agent command execution (Cursor / AI)
232+
233+
**Strong preference:** When a command needs more than the default sandbox (network, full filesystem, real module cache, TLS to external services, `gpg-agent`, etc.), **prompt the user for permission to run that command outside the sandbox** (e.g. approve **`required_permissions: ["all"]`**, **network**, or the product’s “run outside sandbox” control)—and **execute it yourself** after approval.
234+
235+
- **Do not** default to “please run this in your terminal” or long copy-paste-only instructions when the environment can elevate the **same** command.
236+
- **Do** use copy-paste or “run locally” guidance only when elevation is **refused**, **unavailable**, or the user explicitly prefers it.
237+
238+
This applies to **`go test`**, **`go mod download`**, **`git`**, **`gh`**, builds, and acceptance tests—not only network calls.
239+
231240
### Building and Testing
232241
```bash
233242
# Build the CLI
234243
go build -o hookdeck cmd/hookdeck/main.go
235244
236-
# Run tests
245+
# Run all unit tests (default packages; run from repo root)
237246
go test ./...
238247
239248
# Run specific package tests
@@ -243,17 +252,55 @@ go test ./pkg/cmd/
243252
go test -race ./...
244253
```
245254
255+
### Running `go test` after code changes (required for agents)
256+
257+
**Whenever you change Go code in this repo, run tests from the repository root** and treat the run as failed if compilation or any test fails.
258+
259+
**Recommended command in Cursor (module cache + full permissions):**
260+
261+
```bash
262+
cd /path/to/hookdeck-cli # repo root containing go.mod
263+
GOMODCACHE="$(go env GOPATH)/pkg/mod" go test ./...
264+
```
265+
266+
**Prompt the user** to approve running that command **outside the sandbox** with **`required_permissions: ["all"]`** and **`["network"]`** when the module cache may need to fetch (first run or new dependencies). Plain `go test ./...` is fine on a normal developer machine where `GOMODCACHE` is unset or already populated.
267+
268+
**Cursor / agent environments — prompt for out-of-sandbox, fix module cache, do not skip tests**
269+
270+
1. **Prompt the user** for permission, then run `go test ./...` with **`required_permissions: ["all"]`** (disable sandbox for that command). Do **not** use the default sandbox for `go test` here.
271+
272+
2. **If you still see `no required module provides package github.com/...`**, the shell often has **`GOMODCACHE`** set to an **empty** Cursor temp directory (even with `all`). That is **not** a broken `go.mod`. **Re-run tests with an explicit cache path** (pick one):
273+
274+
```bash
275+
GOMODCACHE="$(go env GOPATH)/pkg/mod" go mod download
276+
GOMODCACHE="$(go env GOPATH)/pkg/mod" go test ./...
277+
```
278+
279+
Or unset the variable so Go uses its default (`$GOPATH/pkg/mod`):
280+
281+
```bash
282+
env -u GOMODCACHE go mod download
283+
env -u GOMODCACHE go test ./...
284+
```
285+
286+
Use **`go mod download`** with **`required_permissions: ["network"]` or `["all"]`** the first time the cache is cold (after **prompting** for that permission).
287+
288+
- **`["network"]` alone is often not enough** for `go test` because compilation still needs a **readable** module cache.
289+
- **Prompt for out-of-sandbox / full permissions**, then re-run with **`["all"]`** and the **`GOMODCACHE`** / **`env -u`** fix above—**do not** skip tests or push the user to run commands manually unless they decline elevation.
290+
291+
**Acceptance tests** live under `test/acceptance/` with **build tags** (they are **not** included in plain `go test ./...`). See **`test/acceptance/README.md`** for tags, env vars, and CI parity. When you change CLI-facing behavior, **prompt for out-of-sandbox permissions** and run them the same way, with **`required_permissions: ["all"]`** (and network) when using an agent shell.
292+
246293
### Sandbox and permissions
247294
248295
Commands that need network (e.g. `git push`, `gh pr create`, `npm install`) or full system access often fail in the sandbox with **TLS/certificate errors** (e.g. `x509: OSStatus -26276`) or auth prompts. These are sandbox restrictions, not broken tooling.
249296
250-
**Prefer requesting elevated permissions** (e.g. `required_permissions: ["all"]` or `["network"]`) and asking the user to approve so the agent can retry the command. Do not default to prompting the user to run commands themselves when elevation is available. Only fall back to copy-pasteable commands when elevated permissions are not an option.
297+
**Prompt the user for permission to run outside the sandbox** (e.g. **`required_permissions: ["all"]`** or **`["network"]`**) and **re-run the same command** after they approve. See **Agent command execution** above. Only fall back to copy-pasteable “run this locally” instructions when elevation is refused or unavailable.
251298
252299
### Git commits (GPG)
253300
254301
**Always use GPG-signed commits** (`git commit -S`, or `commit.gpgsign=true` in git config). **Do not** use `--no-gpg-sign` to bypass signing.
255302
256-
In restricted environments, signing may fail with errors like “No agent running” or “Operation not permitted” on `~/.gnupg`. **Re-run the commit with full permissions** so `gpg-agent` is reachable, or sign from a normal local terminal. Unsigned commits should not be pushed as a shortcut.
303+
In restricted environments, signing may fail with errors like “No agent running” or “Operation not permitted” on `~/.gnupg`. **Prompt for permission to run the commit outside the sandbox** (full permissions) so `gpg-agent` is reachable; only if that still fails, suggest the user sign from a normal local terminal. Unsigned commits should not be pushed as a shortcut.
257304
258305
### Linting and Formatting
259306
```bash
@@ -277,12 +324,13 @@ go run cmd/hookdeck/main.go login --help
277324
```
278325
279326
### Sandbox and command execution
280-
- **Always run tests** when changing code: unit tests (`go test ./pkg/...`) and, for CLI-facing changes, acceptance tests (`go test ./test/acceptance/...`). Do not skip tests to avoid failures.
281-
- When running commands (build, test, acceptance tests), if you see **TLS/certificate errors** (e.g. `x509: certificate verify failed`, `tls: failed to verify certificate`), **permission errors** (e.g. `operation not permitted` when writing to the Go module cache), or similar failures that look environment-related, the command is likely running inside a **sandbox**. **Prompt the user** and **re-run the command with elevated permissions** (e.g. `required_permissions: ["network"]` for tests that need API access, or `["all"]` to disable the sandbox) so the operation can succeed. Do not treat a build or test as passed if stderr shows these errors, even when the process exit code is 0.
327+
- **Always run tests** when changing code: **`go test ./...`** from the repo root (see **Running `go test` after code changes** above), and for CLI-facing changes, acceptance tests with the appropriate **`-tags=...`** (see `test/acceptance/README.md`). Do not skip tests to avoid failures.
328+
- For **`go test`** in this repo, **prompt for out-of-sandbox execution** and use **`required_permissions: ["all"]`** (and **`["network"]`** when needed) so the Go module cache works (see **Running `go test` after code changes**). Same for acceptance tests that call the real API.
329+
- When you see **TLS/certificate errors**, **`no required module provides package`** during `go test`, **permission errors** on the module cache, or similar environment-related failures, **prompt for full/out-of-sandbox permissions** and **re-run** (with **`GOMODCACHE=...`** if needed)—**do not** treat the run as passed, and **do not** default to asking the user to run the command manually unless they declined elevation.
282330
283331
### GitHub CLI (`gh`)
284332
- Use the **[GitHub CLI](https://cli.github.com/) (`gh`)** to read GitHub data and perform actions from the shell: **workflow runs and job logs** (e.g. `gh run list`, `gh run view <run-id> --log-failed`, `gh run view <run-id> --job <job-id> --log`), **PRs and checks** (`gh pr view`, `gh pr checks`, `gh pr diff`), **API access** (`gh api`), and creating or updating PRs, issues, and releases.
285-
- Install and authenticate `gh` where needed (e.g. `gh auth login`). If `gh` fails with TLS, network, or permission errors, re-run with **network** or **all** permissions when the agent sandbox may be blocking access.
333+
- Install and authenticate `gh` where needed (e.g. `gh auth login`). If `gh` fails with TLS, network, or permission errors, **prompt for permission** to re-run with **network** or **all** permissions when the agent sandbox may be blocking access.
286334
287335
## 6. Documentation Standards
288336
@@ -358,7 +406,7 @@ if apiErr, ok := err.(*hookdeck.APIError); ok {
358406
359407
## 9. Testing Guidelines
360408
361-
- **Always run tests** when changing code. Run unit tests (`go test ./pkg/...`) and, for CLI-facing changes, acceptance tests (`go test ./test/acceptance/...`). If tests fail due to TLS/network/sandbox (e.g. `x509`, `operation not permitted`), prompt the user and re-run with elevated permissions (e.g. `required_permissions: ["all"]`) so tests can pass.
409+
- **Always run tests** when changing code. Run **`go test ./...`** from the repo root (see **§5 Running `go test` after code changes**). For CLI-facing changes, run acceptance tests with the correct **`-tags=...`** per `test/acceptance/README.md`. **Agents:** **prompt for out-of-sandbox / full permissions**, then run `go test` with **`required_permissions: ["all"]`** (and network if needed) so the module cache works—**do not** push the user to run tests manually unless elevation is refused.
362410
- **Create tests for new functionality.** Add unit tests for validation and business logic; add acceptance tests for flows that use the CLI as a user or agent would (success and failure paths). Acceptance tests must pass or fail—no skipping to avoid failures.
363411
364412
### Acceptance Test Setup
@@ -384,7 +432,8 @@ Acceptance tests in `test/acceptance/` are partitioned by **feature build tags**
384432
|---------|---------|
385433
| `go run cmd/hookdeck/main.go --help` | View CLI help |
386434
| `go build -o hookdeck cmd/hookdeck/main.go` | Build CLI binary |
387-
| `go test ./pkg/cmd/` | Test command implementations |
435+
| `go test ./...` | All unit tests (repo root; agents: run with `required_permissions: ["all"]`) |
436+
| `go test ./pkg/cmd/` | Test command implementations only |
388437
| `go generate ./...` | Run code generation (if used) |
389438
| `golangci-lint run` | Run comprehensive linting |
390439

CLAUDE.md

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,3 @@
11
# Hookdeck CLI — Claude / agent context
22

3-
Read **[AGENTS.md](AGENTS.md)** first for project structure, testing, and CLI conventions.
4-
5-
Repo-specific agent workflows (e.g. releases) live under **[skills/](skills/)** — see `skills/hookdeck-cli-release/` for cutting GitHub releases and drafting release notes.
3+
Read **[AGENTS.md](AGENTS.md)** for all agent instructions (project structure, testing, sandbox permissions, CLI conventions, **`skills/`** workflows, and releases).

pkg/cmd/gateway.go

Lines changed: 25 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -13,6 +13,26 @@ type gatewayCmd struct {
1313
cmd *cobra.Command
1414
}
1515

16+
// isGatewayMCPLeafCommand reports whether cmd is the gateway mcp subcommand.
17+
// MCP uses JSON-RPC on stdout; when there is no API key yet, requireGatewayProject
18+
// must not run so the server can start and expose hookdeck_login.
19+
func isGatewayMCPLeafCommand(cmd *cobra.Command) bool {
20+
return cmd != nil && cmd.Name() == "mcp" && cmd.Parent() != nil && cmd.Parent().Name() == "gateway"
21+
}
22+
23+
// gatewayPersistentPreRunE runs before gateway subcommands. MCP may start without credentials
24+
// (JSON-RPC on stdout; hookdeck_login supplies auth). Once logged in, gateway MCP uses the
25+
// same Gateway project rules as other gateway commands.
26+
func gatewayPersistentPreRunE(cmd *cobra.Command, args []string) error {
27+
initTelemetry(cmd)
28+
if isGatewayMCPLeafCommand(cmd) {
29+
if err := Config.Profile.ValidateAPIKey(); err != nil {
30+
return nil
31+
}
32+
}
33+
return requireGatewayProject(nil)
34+
}
35+
1636
// requireGatewayProject ensures the current project is a Gateway project (inbound or console).
1737
// It runs API key validation, resolves project type from config or API, and returns an error if not Gateway.
1838
// cfg is optional; when nil, the global Config is used (for production).
@@ -31,14 +51,14 @@ func requireGatewayProject(cfg *config.Config) error {
3151
projectType = config.ModeToProjectType(cfg.Profile.ProjectMode)
3252
}
3353
if projectType == "" {
34-
// Resolve from API
54+
// Resolve team/project/mode/type from API (authoritative for the key). Do not clear
55+
// guest_url here — gateway PreRun may run for users who still have a guest upgrade link.
3556
response, err := cfg.GetAPIClient().ValidateAPIKey()
3657
if err != nil {
3758
return err
3859
}
39-
projectType = config.ModeToProjectType(response.ProjectMode)
40-
cfg.Profile.ProjectType = projectType
41-
cfg.Profile.ProjectMode = response.ProjectMode
60+
cfg.Profile.ApplyValidateAPIKeyResponse(response, false)
61+
projectType = cfg.Profile.ProjectType
4262
_ = cfg.Profile.SaveProfile()
4363
}
4464
if !config.IsGatewayProject(projectType) {
@@ -69,10 +89,7 @@ The gateway command group provides full access to all Event Gateway resources.`,
6989
7090
# Start the MCP server for AI agent access
7191
hookdeck gateway mcp`,
72-
PersistentPreRunE: func(cmd *cobra.Command, args []string) error {
73-
initTelemetry(cmd)
74-
return requireGatewayProject(nil)
75-
},
92+
PersistentPreRunE: gatewayPersistentPreRunE,
7693
}
7794

7895
// Register resource subcommands (same factory as root backward-compat registration)

pkg/cmd/gateway_test.go

Lines changed: 72 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,16 @@
11
package cmd
22

33
import (
4+
"encoding/json"
5+
"net/http"
6+
"net/http/httptest"
7+
"os"
8+
"path/filepath"
49
"strings"
510
"testing"
611

712
"github.com/hookdeck/hookdeck-cli/pkg/config"
13+
"github.com/hookdeck/hookdeck-cli/pkg/hookdeck"
814
"github.com/stretchr/testify/assert"
915
"github.com/stretchr/testify/require"
1016
)
@@ -86,3 +92,69 @@ func TestRequireGatewayProject(t *testing.T) {
8692
assert.True(t, strings.Contains(err.Error(), "requires a Gateway project") || strings.Contains(err.Error(), "Outpost"))
8793
})
8894
}
95+
96+
func TestRequireGatewayProject_resolveFromValidate(t *testing.T) {
97+
config.ResetAPIClientForTesting()
98+
t.Cleanup(config.ResetAPIClientForTesting)
99+
100+
server := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
101+
if r.URL.Path != hookdeck.APIPathPrefix+"/cli-auth/validate" {
102+
http.NotFound(w, r)
103+
return
104+
}
105+
w.Header().Set("Content-Type", "application/json")
106+
_ = json.NewEncoder(w).Encode(hookdeck.ValidateAPIKeyResponse{
107+
ProjectID: "team_from_validate",
108+
ProjectMode: "inbound",
109+
})
110+
}))
111+
t.Cleanup(server.Close)
112+
113+
dir := t.TempDir()
114+
path := filepath.Join(dir, "config.toml")
115+
toml := `profile = "default"
116+
117+
[default]
118+
api_key = "sk_test_123456789012"
119+
project_id = "stale_team_should_be_replaced"
120+
guest_url = "https://guest.example/keep-me"
121+
`
122+
require.NoError(t, os.WriteFile(path, []byte(toml), 0600))
123+
124+
cfg, err := config.LoadConfigFromFile(path)
125+
require.NoError(t, err)
126+
cfg.APIBaseURL = server.URL
127+
128+
err = requireGatewayProject(cfg)
129+
require.NoError(t, err)
130+
require.Equal(t, "team_from_validate", cfg.Profile.ProjectId)
131+
require.Equal(t, config.ProjectTypeGateway, cfg.Profile.ProjectType)
132+
require.Equal(t, "inbound", cfg.Profile.ProjectMode)
133+
require.Equal(t, "https://guest.example/keep-me", cfg.Profile.GuestURL, "gateway validate path must not clear guest_url")
134+
}
135+
136+
func TestGatewayPersistentPreRunE_MCP(t *testing.T) {
137+
old := Config
138+
t.Cleanup(func() { Config = old })
139+
140+
gw := newGatewayCmd().cmd
141+
mcpLeaf, _, err := gw.Find([]string{"mcp"})
142+
require.NoError(t, err)
143+
require.True(t, isGatewayMCPLeafCommand(mcpLeaf))
144+
145+
t.Run("no API key skips requireGatewayProject", func(t *testing.T) {
146+
Config = config.Config{}
147+
Config.Profile.ProjectId = ""
148+
err := gatewayPersistentPreRunE(mcpLeaf, nil)
149+
assert.NoError(t, err)
150+
})
151+
152+
t.Run("with API key and no project fails", func(t *testing.T) {
153+
Config = config.Config{}
154+
Config.Profile.APIKey = "sk_test_123456789012"
155+
Config.Profile.ProjectId = ""
156+
err := gatewayPersistentPreRunE(mcpLeaf, nil)
157+
require.Error(t, err)
158+
assert.Contains(t, err.Error(), "no project selected")
159+
})
160+
}

pkg/cmd/mcp.go

Lines changed: 7 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -25,8 +25,13 @@ destinations, events, requests, and more — as MCP tools that AI agents and
2525
LLM-based clients can invoke.
2626
2727
If the CLI is already authenticated, all tools are available immediately.
28-
If not, a hookdeck_login tool is provided that initiates browser-based
29-
authentication so the user can log in without leaving the MCP session.`),
28+
If not, gateway MCP still starts: project selection is skipped until you
29+
authenticate, and hookdeck_login initiates browser-based sign-in. Protocol
30+
traffic uses stdout only (JSON-RPC); status and errors from the CLI before
31+
the server runs go to stderr.
32+
33+
hookdeck_login stays registered after sign-in so you can call it with reauth: true
34+
to replace credentials (e.g. when project listing fails with a narrow API key).`),
3035
Example: ` # Start the MCP server (stdio transport)
3136
hookdeck gateway mcp
3237

0 commit comments

Comments
 (0)