2014-04-14 15:26:48 +01:00
|
|
|
{ config, lib, pkgs, ... }:
|
2009-10-12 18:27:57 +01:00
|
|
|
|
2014-04-14 15:26:48 +01:00
|
|
|
with lib;
|
2009-03-06 12:27:00 +00:00
|
|
|
|
2008-01-28 14:34:29 +00:00
|
|
|
let
|
|
|
|
|
2008-06-25 22:58:51 +01:00
|
|
|
cfg = config.services.mysql;
|
|
|
|
|
2009-12-16 15:24:15 +00:00
|
|
|
mysql = cfg.package;
|
2017-12-28 13:06:03 +00:00
|
|
|
|
|
|
|
isMariaDB =
|
2017-11-14 01:08:15 +00:00
|
|
|
let
|
|
|
|
pName = _p: (builtins.parseDrvName (_p.name)).name;
|
|
|
|
in pName mysql == pName pkgs.mariadb;
|
2018-11-18 05:25:18 +00:00
|
|
|
isMysqlAtLeast57 =
|
|
|
|
let
|
|
|
|
pName = _p: (builtins.parseDrvName (_p.name)).name;
|
|
|
|
in (pName mysql == pName pkgs.mysql57)
|
|
|
|
&& ((builtins.compareVersions mysql.version "5.7") >= 0);
|
2008-06-25 22:58:51 +01:00
|
|
|
|
|
|
|
mysqldOptions =
|
2019-05-17 13:12:52 +01:00
|
|
|
"--user=${cfg.user} --datadir=${cfg.dataDir} --basedir=${mysql}";
|
2018-11-18 05:25:18 +00:00
|
|
|
# For MySQL 5.7+, --insecure creates the root user without password
|
|
|
|
# (earlier versions and MariaDB do this by default).
|
|
|
|
installOptions =
|
2019-05-17 13:12:52 +01:00
|
|
|
"${mysqldOptions} ${lib.optionalString isMysqlAtLeast57 "--insecure"}";
|
2008-01-28 14:34:29 +00:00
|
|
|
|
|
|
|
in
|
2008-06-25 22:58:51 +01:00
|
|
|
|
2009-07-15 12:19:11 +01:00
|
|
|
{
|
|
|
|
|
|
|
|
###### interface
|
|
|
|
|
|
|
|
options = {
|
2011-09-14 19:20:50 +01:00
|
|
|
|
2009-07-15 12:19:11 +01:00
|
|
|
services.mysql = {
|
2011-09-14 19:20:50 +01:00
|
|
|
|
2009-07-15 12:19:11 +01:00
|
|
|
enable = mkOption {
|
2016-10-02 21:34:29 +01:00
|
|
|
type = types.bool;
|
2009-07-15 12:19:11 +01:00
|
|
|
default = false;
|
|
|
|
description = "
|
|
|
|
Whether to enable the MySQL server.
|
|
|
|
";
|
|
|
|
};
|
|
|
|
|
2009-12-16 15:24:15 +00:00
|
|
|
package = mkOption {
|
2014-02-26 12:54:04 +00:00
|
|
|
type = types.package;
|
2016-12-17 21:30:05 +00:00
|
|
|
example = literalExample "pkgs.mysql";
|
2009-12-16 14:54:36 +00:00
|
|
|
description = "
|
2017-11-14 01:08:15 +00:00
|
|
|
Which MySQL derivation to use. MariaDB packages are supported too.
|
2009-12-16 14:54:36 +00:00
|
|
|
";
|
|
|
|
};
|
|
|
|
|
2017-06-15 14:10:14 +01:00
|
|
|
bind = mkOption {
|
|
|
|
type = types.nullOr types.str;
|
|
|
|
default = null;
|
|
|
|
example = literalExample "0.0.0.0";
|
2017-11-06 21:33:37 +00:00
|
|
|
description = "Address to bind to. The default is to bind to all addresses";
|
2017-06-15 14:10:14 +01:00
|
|
|
};
|
|
|
|
|
2009-07-15 12:19:11 +01:00
|
|
|
port = mkOption {
|
2016-10-02 21:34:29 +01:00
|
|
|
type = types.int;
|
|
|
|
default = 3306;
|
2011-09-14 19:20:50 +01:00
|
|
|
description = "Port of MySQL";
|
2009-07-15 12:19:11 +01:00
|
|
|
};
|
|
|
|
|
|
|
|
user = mkOption {
|
2016-10-02 21:34:29 +01:00
|
|
|
type = types.str;
|
2009-07-15 12:19:11 +01:00
|
|
|
default = "mysql";
|
|
|
|
description = "User account under which MySQL runs";
|
|
|
|
};
|
|
|
|
|
|
|
|
dataDir = mkOption {
|
2016-10-02 21:34:29 +01:00
|
|
|
type = types.path;
|
2017-05-19 23:30:51 +01:00
|
|
|
example = "/var/lib/mysql";
|
2009-07-15 12:19:11 +01:00
|
|
|
description = "Location where MySQL stores its table files";
|
|
|
|
};
|
|
|
|
|
2013-07-14 00:47:40 +01:00
|
|
|
extraOptions = mkOption {
|
2016-10-02 21:34:29 +01:00
|
|
|
type = types.lines;
|
2013-07-14 00:47:40 +01:00
|
|
|
default = "";
|
|
|
|
example = ''
|
|
|
|
key_buffer_size = 6G
|
|
|
|
table_cache = 1600
|
|
|
|
log-error = /var/log/mysql_err.log
|
|
|
|
'';
|
|
|
|
description = ''
|
|
|
|
Provide extra options to the MySQL configuration file.
|
|
|
|
|
|
|
|
Please note, that these options are added to the
|
|
|
|
<literal>[mysqld]</literal> section so you don't need to explicitly
|
|
|
|
state it again.
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
2009-11-18 16:19:04 +00:00
|
|
|
initialDatabases = mkOption {
|
2019-03-12 17:08:23 +00:00
|
|
|
type = types.listOf (types.submodule {
|
|
|
|
options = {
|
|
|
|
name = mkOption {
|
|
|
|
type = types.str;
|
|
|
|
description = ''
|
|
|
|
The name of the database to create.
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
schema = mkOption {
|
|
|
|
type = types.nullOr types.path;
|
|
|
|
default = null;
|
|
|
|
description = ''
|
|
|
|
The initial schema of the database; if null (the default),
|
|
|
|
an empty database is created.
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
};
|
|
|
|
});
|
2009-11-18 16:19:04 +00:00
|
|
|
default = [];
|
2017-05-20 22:57:07 +01:00
|
|
|
description = ''
|
|
|
|
List of database names and their initial schemas that should be used to create databases on the first startup
|
|
|
|
of MySQL. The schema attribute is optional: If not specified, an empty database is created.
|
|
|
|
'';
|
2012-01-18 15:01:44 +00:00
|
|
|
example = [
|
2013-10-23 19:06:39 +01:00
|
|
|
{ name = "foodatabase"; schema = literalExample "./foodatabase.sql"; }
|
2017-05-20 22:57:07 +01:00
|
|
|
{ name = "bardatabase"; }
|
2012-01-18 15:01:44 +00:00
|
|
|
];
|
2009-11-18 16:19:04 +00:00
|
|
|
};
|
2011-09-14 19:20:50 +01:00
|
|
|
|
2010-04-16 19:06:23 +01:00
|
|
|
initialScript = mkOption {
|
2019-04-01 20:08:47 +01:00
|
|
|
type = types.nullOr types.path;
|
2010-04-16 19:06:23 +01:00
|
|
|
default = null;
|
2012-01-18 15:01:44 +00:00
|
|
|
description = "A file containing SQL statements to be executed on the first startup. Can be used for granting certain permissions on the database";
|
2010-04-16 19:06:23 +01:00
|
|
|
};
|
2011-09-14 19:20:50 +01:00
|
|
|
|
2017-09-10 16:58:52 +01:00
|
|
|
ensureDatabases = mkOption {
|
2019-03-12 17:08:23 +00:00
|
|
|
type = types.listOf types.str;
|
2017-09-10 16:58:52 +01:00
|
|
|
default = [];
|
|
|
|
description = ''
|
|
|
|
Ensures that the specified databases exist.
|
|
|
|
This option will never delete existing databases, especially not when the value of this
|
|
|
|
option is changed. This means that databases created once through this option or
|
|
|
|
otherwise have to be removed manually.
|
|
|
|
'';
|
|
|
|
example = [
|
|
|
|
"nextcloud"
|
2018-01-16 17:44:27 +00:00
|
|
|
"matomo"
|
2017-09-10 16:58:52 +01:00
|
|
|
];
|
|
|
|
};
|
|
|
|
|
|
|
|
ensureUsers = mkOption {
|
2019-03-12 17:08:23 +00:00
|
|
|
type = types.listOf (types.submodule {
|
|
|
|
options = {
|
|
|
|
name = mkOption {
|
|
|
|
type = types.str;
|
|
|
|
description = ''
|
|
|
|
Name of the user to ensure.
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
ensurePermissions = mkOption {
|
|
|
|
type = types.attrsOf types.str;
|
|
|
|
default = {};
|
|
|
|
description = ''
|
|
|
|
Permissions to ensure for the user, specified as attribute set.
|
|
|
|
The attribute names specify the database and tables to grant the permissions for,
|
|
|
|
separated by a dot. You may use wildcards here.
|
|
|
|
The attribute values specfiy the permissions to grant.
|
|
|
|
You may specify one or multiple comma-separated SQL privileges here.
|
|
|
|
|
|
|
|
For more information on how to specify the target
|
|
|
|
and on which privileges exist, see the
|
|
|
|
<link xlink:href="https://mariadb.com/kb/en/library/grant/">GRANT syntax</link>.
|
|
|
|
The attributes are used as <code>GRANT ''${attrName} ON ''${attrValue}</code>.
|
|
|
|
'';
|
|
|
|
example = literalExample ''
|
|
|
|
{
|
|
|
|
"database.*" = "ALL PRIVILEGES";
|
|
|
|
"*.*" = "SELECT, LOCK TABLES";
|
|
|
|
}
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
};
|
|
|
|
});
|
2017-09-10 16:58:52 +01:00
|
|
|
default = [];
|
|
|
|
description = ''
|
|
|
|
Ensures that the specified users exist and have at least the ensured permissions.
|
|
|
|
The MySQL users will be identified using Unix socket authentication. This authenticates the Unix user with the
|
|
|
|
same name only, and that without the need for a password.
|
|
|
|
This option will never delete existing users or remove permissions, especially not when the value of this
|
|
|
|
option is changed. This means that users created and permissions assigned once through this option or
|
|
|
|
otherwise have to be removed manually.
|
|
|
|
'';
|
2019-03-12 17:08:23 +00:00
|
|
|
example = literalExample ''
|
|
|
|
[
|
|
|
|
{
|
|
|
|
name = "nextcloud";
|
|
|
|
ensurePermissions = {
|
|
|
|
"nextcloud.*" = "ALL PRIVILEGES";
|
|
|
|
};
|
|
|
|
}
|
|
|
|
{
|
|
|
|
name = "backup";
|
|
|
|
ensurePermissions = {
|
|
|
|
"*.*" = "SELECT, LOCK TABLES";
|
|
|
|
};
|
|
|
|
}
|
|
|
|
]
|
|
|
|
'';
|
2017-09-10 16:58:52 +01:00
|
|
|
};
|
|
|
|
|
2011-07-13 21:58:48 +01:00
|
|
|
replication = {
|
|
|
|
role = mkOption {
|
2016-10-02 21:34:29 +01:00
|
|
|
type = types.enum [ "master" "slave" "none" ];
|
2012-01-18 15:01:44 +00:00
|
|
|
default = "none";
|
2016-10-02 21:34:29 +01:00
|
|
|
description = "Role of the MySQL server instance.";
|
2012-01-18 15:01:44 +00:00
|
|
|
};
|
2011-09-14 19:20:50 +01:00
|
|
|
|
2011-07-13 21:58:48 +01:00
|
|
|
serverId = mkOption {
|
2016-10-02 21:34:29 +01:00
|
|
|
type = types.int;
|
2012-01-18 15:01:44 +00:00
|
|
|
default = 1;
|
|
|
|
description = "Id of the MySQL server instance. This number must be unique for each instance";
|
|
|
|
};
|
|
|
|
|
|
|
|
masterHost = mkOption {
|
2016-10-02 21:34:29 +01:00
|
|
|
type = types.str;
|
2012-01-18 15:01:44 +00:00
|
|
|
description = "Hostname of the MySQL master server";
|
|
|
|
};
|
|
|
|
|
2016-07-21 01:15:55 +01:00
|
|
|
slaveHost = mkOption {
|
2016-10-02 21:34:29 +01:00
|
|
|
type = types.str;
|
2016-07-21 01:15:55 +01:00
|
|
|
description = "Hostname of the MySQL slave server";
|
|
|
|
};
|
|
|
|
|
2012-01-18 15:01:44 +00:00
|
|
|
masterUser = mkOption {
|
2016-10-02 21:34:29 +01:00
|
|
|
type = types.str;
|
2012-01-18 15:01:44 +00:00
|
|
|
description = "Username of the MySQL replication user";
|
|
|
|
};
|
|
|
|
|
|
|
|
masterPassword = mkOption {
|
2016-10-02 21:34:29 +01:00
|
|
|
type = types.str;
|
2012-01-18 15:01:44 +00:00
|
|
|
description = "Password of the MySQL replication user";
|
|
|
|
};
|
|
|
|
|
|
|
|
masterPort = mkOption {
|
2016-10-02 21:34:29 +01:00
|
|
|
type = types.int;
|
2012-01-18 15:01:44 +00:00
|
|
|
default = 3306;
|
|
|
|
description = "Port number on which the MySQL master server runs";
|
|
|
|
};
|
2011-07-13 21:58:48 +01:00
|
|
|
};
|
2009-07-15 12:19:11 +01:00
|
|
|
};
|
2011-09-14 19:20:50 +01:00
|
|
|
|
2009-07-15 12:19:11 +01:00
|
|
|
};
|
|
|
|
|
2009-03-06 12:27:00 +00:00
|
|
|
|
2009-07-15 12:19:11 +01:00
|
|
|
###### implementation
|
2008-06-25 22:58:51 +01:00
|
|
|
|
2009-07-15 12:19:11 +01:00
|
|
|
config = mkIf config.services.mysql.enable {
|
|
|
|
|
2017-05-19 23:30:51 +01:00
|
|
|
services.mysql.dataDir =
|
2018-07-25 21:22:54 +01:00
|
|
|
mkDefault (if versionAtLeast config.system.stateVersion "17.09" then "/var/lib/mysql"
|
2017-05-19 23:30:51 +01:00
|
|
|
else "/var/mysql");
|
|
|
|
|
2018-06-30 00:58:35 +01:00
|
|
|
users.users.mysql = {
|
2013-08-26 14:20:25 +01:00
|
|
|
description = "MySQL server user";
|
|
|
|
group = "mysql";
|
|
|
|
uid = config.ids.uids.mysql;
|
|
|
|
};
|
|
|
|
|
2018-06-30 00:58:35 +01:00
|
|
|
users.groups.mysql.gid = config.ids.gids.mysql;
|
2009-03-06 12:27:00 +00:00
|
|
|
|
2009-07-15 12:19:11 +01:00
|
|
|
environment.systemPackages = [mysql];
|
2009-03-06 12:27:00 +00:00
|
|
|
|
2018-12-01 12:10:27 +00:00
|
|
|
environment.etc."my.cnf".text =
|
|
|
|
''
|
|
|
|
[mysqld]
|
|
|
|
port = ${toString cfg.port}
|
|
|
|
datadir = ${cfg.dataDir}
|
|
|
|
${optionalString (cfg.bind != null) "bind-address = ${cfg.bind}" }
|
|
|
|
${optionalString (cfg.replication.role == "master" || cfg.replication.role == "slave") "log-bin=mysql-bin"}
|
|
|
|
${optionalString (cfg.replication.role == "master" || cfg.replication.role == "slave") "server-id = ${toString cfg.replication.serverId}"}
|
|
|
|
${optionalString (cfg.ensureUsers != [])
|
|
|
|
''
|
|
|
|
plugin-load-add = auth_socket.so
|
|
|
|
''}
|
|
|
|
${cfg.extraOptions}
|
|
|
|
'';
|
|
|
|
|
2019-05-16 23:10:34 +01:00
|
|
|
systemd.tmpfiles.rules = [
|
|
|
|
"d '${cfg.dataDir}' 0700 ${cfg.user} mysql -"
|
|
|
|
];
|
|
|
|
|
2018-05-24 15:42:16 +01:00
|
|
|
systemd.services.mysql = let
|
|
|
|
hasNotify = (cfg.package == pkgs.mariadb);
|
|
|
|
in {
|
|
|
|
description = "MySQL Server";
|
2008-06-25 22:58:51 +01:00
|
|
|
|
2016-10-02 21:17:20 +01:00
|
|
|
after = [ "network.target" ];
|
2012-12-18 12:40:04 +00:00
|
|
|
wantedBy = [ "multi-user.target" ];
|
2019-01-22 18:05:21 +00:00
|
|
|
restartTriggers = [ config.environment.etc."my.cnf".source ];
|
2012-12-18 12:40:04 +00:00
|
|
|
|
|
|
|
unitConfig.RequiresMountsFor = "${cfg.dataDir}";
|
2008-06-25 22:58:51 +01:00
|
|
|
|
2015-09-07 16:05:56 +01:00
|
|
|
path = [
|
|
|
|
# Needed for the mysql_install_db command in the preStart script
|
|
|
|
# which calls the hostname command.
|
|
|
|
pkgs.nettools
|
|
|
|
];
|
|
|
|
|
2019-05-16 23:12:20 +01:00
|
|
|
preStart = ''
|
|
|
|
if ! test -e ${cfg.dataDir}/mysql; then
|
|
|
|
${mysql}/bin/mysql_install_db --defaults-file=/etc/my.cnf ${installOptions}
|
|
|
|
touch /tmp/mysql_init
|
|
|
|
fi
|
|
|
|
'';
|
2011-09-14 19:20:50 +01:00
|
|
|
|
2018-05-24 15:42:16 +01:00
|
|
|
serviceConfig = {
|
2019-05-16 23:13:29 +01:00
|
|
|
User = cfg.user;
|
|
|
|
Group = "mysql";
|
2018-05-24 15:42:16 +01:00
|
|
|
Type = if hasNotify then "notify" else "simple";
|
|
|
|
RuntimeDirectory = "mysqld";
|
2019-05-16 23:10:34 +01:00
|
|
|
RuntimeDirectoryMode = "0755";
|
2018-10-30 23:02:27 +00:00
|
|
|
# The last two environment variables are used for starting Galera clusters
|
|
|
|
ExecStart = "${mysql}/bin/mysqld --defaults-file=/etc/my.cnf ${mysqldOptions} $_WSREP_NEW_CLUSTER $_WSREP_START_POSITION";
|
2019-07-01 02:58:27 +01:00
|
|
|
ExecStartPost =
|
|
|
|
let
|
|
|
|
setupScript = pkgs.writeShellScript "mysql-setup" ''
|
|
|
|
${optionalString (!hasNotify) ''
|
|
|
|
# Wait until the MySQL server is available for use
|
|
|
|
count=0
|
|
|
|
while [ ! -e /run/mysqld/mysqld.sock ]
|
|
|
|
do
|
|
|
|
if [ $count -eq 30 ]
|
|
|
|
then
|
|
|
|
echo "Tried 30 times, giving up..."
|
|
|
|
exit 1
|
|
|
|
fi
|
|
|
|
|
|
|
|
echo "MySQL daemon not yet started. Waiting for 1 second..."
|
|
|
|
count=$((count++))
|
|
|
|
sleep 1
|
|
|
|
done
|
|
|
|
''}
|
|
|
|
|
|
|
|
if [ -f /tmp/mysql_init ]
|
|
|
|
then
|
|
|
|
${concatMapStrings (database: ''
|
|
|
|
# Create initial databases
|
|
|
|
if ! test -e "${cfg.dataDir}/${database.name}"; then
|
|
|
|
echo "Creating initial database: ${database.name}"
|
|
|
|
( echo 'create database `${database.name}`;'
|
|
|
|
|
|
|
|
${optionalString (database.schema != null) ''
|
|
|
|
echo 'use `${database.name}`;'
|
|
|
|
|
|
|
|
# TODO: this silently falls through if database.schema does not exist,
|
|
|
|
# we should catch this somehow and exit, but can't do it here because we're in a subshell.
|
|
|
|
if [ -f "${database.schema}" ]
|
|
|
|
then
|
|
|
|
cat ${database.schema}
|
|
|
|
elif [ -d "${database.schema}" ]
|
|
|
|
then
|
|
|
|
cat ${database.schema}/mysql-databases/*.sql
|
|
|
|
fi
|
|
|
|
''}
|
|
|
|
) | ${mysql}/bin/mysql -u root -N
|
|
|
|
fi
|
|
|
|
'') cfg.initialDatabases}
|
|
|
|
|
|
|
|
${optionalString (cfg.replication.role == "master")
|
|
|
|
''
|
|
|
|
# Set up the replication master
|
|
|
|
|
|
|
|
( echo "use mysql;"
|
|
|
|
echo "CREATE USER '${cfg.replication.masterUser}'@'${cfg.replication.slaveHost}' IDENTIFIED WITH mysql_native_password;"
|
|
|
|
echo "SET PASSWORD FOR '${cfg.replication.masterUser}'@'${cfg.replication.slaveHost}' = PASSWORD('${cfg.replication.masterPassword}');"
|
|
|
|
echo "GRANT REPLICATION SLAVE ON *.* TO '${cfg.replication.masterUser}'@'${cfg.replication.slaveHost}';"
|
|
|
|
) | ${mysql}/bin/mysql -u root -N
|
|
|
|
''}
|
|
|
|
|
|
|
|
${optionalString (cfg.replication.role == "slave")
|
|
|
|
''
|
|
|
|
# Set up the replication slave
|
|
|
|
|
|
|
|
( echo "stop slave;"
|
|
|
|
echo "change master to master_host='${cfg.replication.masterHost}', master_user='${cfg.replication.masterUser}', master_password='${cfg.replication.masterPassword}';"
|
|
|
|
echo "start slave;"
|
|
|
|
) | ${mysql}/bin/mysql -u root -N
|
|
|
|
''}
|
|
|
|
|
|
|
|
${optionalString (cfg.initialScript != null)
|
|
|
|
''
|
|
|
|
# Execute initial script
|
|
|
|
# using toString to avoid copying the file to nix store if given as path instead of string,
|
|
|
|
# as it might contain credentials
|
|
|
|
cat ${toString cfg.initialScript} | ${mysql}/bin/mysql -u root -N
|
|
|
|
''}
|
|
|
|
|
|
|
|
rm /tmp/mysql_init
|
|
|
|
fi
|
|
|
|
|
|
|
|
${optionalString (cfg.ensureDatabases != []) ''
|
|
|
|
(
|
|
|
|
${concatMapStrings (database: ''
|
|
|
|
echo "CREATE DATABASE IF NOT EXISTS \`${database}\`;"
|
|
|
|
'') cfg.ensureDatabases}
|
2019-05-16 23:12:20 +01:00
|
|
|
) | ${mysql}/bin/mysql -u root -N
|
2019-07-01 02:58:27 +01:00
|
|
|
''}
|
2016-07-21 01:15:55 +01:00
|
|
|
|
2019-07-01 02:58:27 +01:00
|
|
|
${concatMapStrings (user:
|
2016-07-21 01:15:55 +01:00
|
|
|
''
|
2019-07-01 02:58:27 +01:00
|
|
|
( echo "CREATE USER IF NOT EXISTS '${user.name}'@'localhost' IDENTIFIED WITH ${if isMariaDB then "unix_socket" else "auth_socket"};"
|
|
|
|
${concatStringsSep "\n" (mapAttrsToList (database: permission: ''
|
|
|
|
echo "GRANT ${permission} ON ${database} TO '${user.name}'@'localhost';"
|
|
|
|
'') user.ensurePermissions)}
|
2014-02-26 12:54:04 +00:00
|
|
|
) | ${mysql}/bin/mysql -u root -N
|
2019-07-01 02:58:27 +01:00
|
|
|
'') cfg.ensureUsers}
|
|
|
|
'';
|
|
|
|
in
|
2019-07-01 02:59:47 +01:00
|
|
|
# ensureDatbases & ensureUsers depends on this script being run as root
|
|
|
|
# when the user has secured their mysql install
|
|
|
|
"+${setupScript}";
|
2019-07-01 02:58:27 +01:00
|
|
|
};
|
2009-10-12 12:30:43 +01:00
|
|
|
};
|
2009-07-15 12:19:11 +01:00
|
|
|
|
2009-03-06 12:27:00 +00:00
|
|
|
};
|
2009-07-15 12:19:11 +01:00
|
|
|
|
2008-01-28 14:34:29 +00:00
|
|
|
}
|