mirror of
https://github.com/pgpainless/pgpainless.git
synced 2025-09-14 20:59:39 +02:00
Implement lookup mechanism using sqlite
This commit is contained in:
parent
c4898ed26a
commit
0e4cf1c166
12 changed files with 419 additions and 8 deletions
|
@ -38,7 +38,7 @@ allprojects {
|
|||
}
|
||||
|
||||
// For library modules, enable android api compatibility check
|
||||
if (it.name != 'pgpainless-cli' && it.name != 'pgpainless-cert-d-cli' && name != 'pgp-cert-d-java') {
|
||||
if (it.name != 'pgpainless-cli' && it.name != 'pgpainless-cert-d-cli' && name != 'pgp-cert-d-java' && name != 'pgp-cert-d-java-jdbc-sqlite-lookup') {
|
||||
// animalsniffer
|
||||
apply plugin: 'ru.vyarus.animalsniffer'
|
||||
dependencies {
|
||||
|
|
29
pgp-cert-d-java-jdbc-sqlite-lookup/build.gradle
Normal file
29
pgp-cert-d-java-jdbc-sqlite-lookup/build.gradle
Normal file
|
@ -0,0 +1,29 @@
|
|||
// SPDX-FileCopyrightText: 2022 Paul Schaub <vanitasvitae@fsfe.org>
|
||||
//
|
||||
// SPDX-License-Identifier: Apache-2.0
|
||||
|
||||
plugins {
|
||||
id 'java-library'
|
||||
}
|
||||
|
||||
group 'org.pgpainless'
|
||||
|
||||
repositories {
|
||||
mavenCentral()
|
||||
}
|
||||
|
||||
dependencies {
|
||||
testImplementation "org.junit.jupiter:junit-jupiter-api:$junitVersion"
|
||||
testImplementation "org.junit.jupiter:junit-jupiter-params:$junitVersion"
|
||||
testRuntimeOnly "org.junit.jupiter:junit-jupiter-engine:$junitVersion"
|
||||
|
||||
// Logging
|
||||
testImplementation "ch.qos.logback:logback-classic:$logbackVersion"
|
||||
|
||||
implementation project(":pgp-cert-d-java")
|
||||
api 'org.xerial:sqlite-jdbc:3.36.0.3'
|
||||
}
|
||||
|
||||
test {
|
||||
useJUnitPlatform()
|
||||
}
|
|
@ -0,0 +1,30 @@
|
|||
// SPDX-FileCopyrightText: 2022 Paul Schaub <vanitasvitae@fsfe.org>
|
||||
//
|
||||
// SPDX-License-Identifier: Apache-2.0
|
||||
|
||||
package pgp.cert_d.jdbc.sqlite;
|
||||
|
||||
public class Entry {
|
||||
|
||||
private final int id;
|
||||
private final String identifier;
|
||||
private final long subkeyId;
|
||||
|
||||
public Entry(int id, long subkeyId, String identifier) {
|
||||
this.id = id;
|
||||
this.subkeyId = subkeyId;
|
||||
this.identifier = identifier;
|
||||
}
|
||||
|
||||
public int getId() {
|
||||
return id;
|
||||
}
|
||||
|
||||
public long getSubkeyId() {
|
||||
return subkeyId;
|
||||
}
|
||||
|
||||
public String getIdentifier() {
|
||||
return identifier;
|
||||
}
|
||||
}
|
|
@ -0,0 +1,41 @@
|
|||
// SPDX-FileCopyrightText: 2022 Paul Schaub <vanitasvitae@fsfe.org>
|
||||
//
|
||||
// SPDX-License-Identifier: Apache-2.0
|
||||
|
||||
package pgp.cert_d.jdbc.sqlite;
|
||||
|
||||
import java.util.Comparator;
|
||||
|
||||
public class SpecialNameFingerprintComparator implements Comparator<String> {
|
||||
|
||||
@Override
|
||||
public int compare(String t0, String t1) {
|
||||
boolean t0f = fastIsFingerprint(t0);
|
||||
boolean t1f = fastIsFingerprint(t1);
|
||||
|
||||
return t0f ^ t1f ? // args are not of same "type", i.e. (fp, sn) / (sn, fp)
|
||||
(t0f ? 1 : -1) // fps are "larger"
|
||||
: t0.compareTo(t1); // else -> same arg type -> lexicographic comparison to not break sets
|
||||
}
|
||||
|
||||
private boolean fastIsFingerprint(String fp) {
|
||||
// OpenPGP v4 fingerprint is 40 hex chars
|
||||
if (fp.length() != 40) {
|
||||
return false;
|
||||
}
|
||||
|
||||
// c is hex
|
||||
for (char c : fp.toCharArray()) {
|
||||
// c < '0' || c > 'f'
|
||||
if (c < 48 || c > 102) {
|
||||
return false;
|
||||
}
|
||||
// c > '9' && c < 'a'
|
||||
if (c > 57 && c < 97) {
|
||||
return false;
|
||||
}
|
||||
}
|
||||
|
||||
return true;
|
||||
}
|
||||
}
|
|
@ -0,0 +1,116 @@
|
|||
// SPDX-FileCopyrightText: 2022 Paul Schaub <vanitasvitae@fsfe.org>
|
||||
//
|
||||
// SPDX-License-Identifier: Apache-2.0
|
||||
|
||||
package pgp.cert_d.jdbc.sqlite;
|
||||
|
||||
import java.io.File;
|
||||
import java.io.IOException;
|
||||
import java.sql.Connection;
|
||||
import java.sql.DriverManager;
|
||||
import java.sql.PreparedStatement;
|
||||
import java.sql.ResultSet;
|
||||
import java.sql.SQLException;
|
||||
import java.sql.Statement;
|
||||
import java.util.ArrayList;
|
||||
import java.util.Comparator;
|
||||
import java.util.List;
|
||||
|
||||
import org.sqlite.SQLiteErrorCode;
|
||||
import org.sqlite.SQLiteException;
|
||||
import pgp.certificate_store.SubkeyLookup;
|
||||
|
||||
public class SqliteSubkeyLookup implements SubkeyLookup {
|
||||
|
||||
private final String databaseUrl;
|
||||
|
||||
private static final String CREATE_TABLE_STMT = "" +
|
||||
"CREATE TABLE IF NOT EXISTS subkey_lookup (\n" +
|
||||
" id integer PRIMARY KEY,\n" +
|
||||
" identifier text NOT NULL,\n" +
|
||||
" subkey_id integer NOT NULL,\n" +
|
||||
" UNIQUE(identifier, subkey_id)\n" +
|
||||
")";
|
||||
|
||||
private static final String INSERT_STMT = "" +
|
||||
"INSERT INTO subkey_lookup(identifier, subkey_id) VALUES (?,?)";
|
||||
private static final String QUERY_STMT = "" +
|
||||
"SELECT * FROM subkey_lookup WHERE subkey_id=?";
|
||||
private final Comparator<Entry> entryComparator = new Comparator<Entry>() {
|
||||
final SpecialNameFingerprintComparator comparator = new SpecialNameFingerprintComparator();
|
||||
@Override
|
||||
public int compare(Entry o1, Entry o2) {
|
||||
return comparator.compare(o1.getIdentifier(), o2.getIdentifier());
|
||||
}
|
||||
};
|
||||
|
||||
public SqliteSubkeyLookup(String databaseURL) throws SQLException {
|
||||
this.databaseUrl = databaseURL;
|
||||
try (Connection connection = getConnection(); Statement statement = connection.createStatement()) {
|
||||
statement.execute(CREATE_TABLE_STMT);
|
||||
}
|
||||
}
|
||||
|
||||
public Connection getConnection() throws SQLException {
|
||||
return DriverManager.getConnection(databaseUrl);
|
||||
}
|
||||
|
||||
public static SqliteSubkeyLookup forDatabaseFile(File databaseFile) throws SQLException {
|
||||
return new SqliteSubkeyLookup("jdbc:sqlite:" + databaseFile.getAbsolutePath());
|
||||
}
|
||||
|
||||
public void insert(long subkeyId, String identifier, boolean ignoreDuplicates) throws SQLException {
|
||||
try (Connection connection = getConnection(); PreparedStatement statement = connection.prepareStatement(INSERT_STMT)) {
|
||||
statement.setString(1, identifier);
|
||||
statement.setLong(2, subkeyId);
|
||||
statement.executeUpdate();
|
||||
} catch (SQLiteException e) {
|
||||
if (ignoreDuplicates && e.getResultCode().code == SQLiteErrorCode.SQLITE_CONSTRAINT_UNIQUE.code) {
|
||||
// ignore
|
||||
} else {
|
||||
throw e;
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
public List<Entry> get(long subkeyId) throws SQLException {
|
||||
List<Entry> results = new ArrayList<>();
|
||||
try (Connection connection = getConnection(); PreparedStatement statement = connection.prepareStatement(QUERY_STMT)) {
|
||||
statement.setLong(1, subkeyId);
|
||||
try (ResultSet resultSet = statement.executeQuery()) {
|
||||
while (resultSet.next()) {
|
||||
Entry entry = new Entry(
|
||||
resultSet.getInt("id"),
|
||||
resultSet.getLong("subkey_id"),
|
||||
resultSet.getString("identifier"));
|
||||
results.add(entry);
|
||||
}
|
||||
}
|
||||
}
|
||||
return results;
|
||||
}
|
||||
|
||||
@Override
|
||||
public String getIdentifierForSubkeyId(long subkeyId) throws IOException {
|
||||
try {
|
||||
List<Entry> entries = get(subkeyId);
|
||||
if (entries.isEmpty()) {
|
||||
return null;
|
||||
}
|
||||
entries.sort(entryComparator);
|
||||
return entries.get(0).getIdentifier();
|
||||
} catch (SQLException e) {
|
||||
throw new IOException("Cannot query for subkey lookup entries.", e);
|
||||
}
|
||||
}
|
||||
|
||||
@Override
|
||||
public void storeIdentifierForSubkeyId(long subkeyId, String identifier)
|
||||
throws IOException {
|
||||
try {
|
||||
insert(subkeyId, identifier, true);
|
||||
} catch (SQLException e) {
|
||||
throw new IOException("Cannot store subkey lookup entry in database.", e);
|
||||
}
|
||||
}
|
||||
}
|
|
@ -0,0 +1,8 @@
|
|||
// SPDX-FileCopyrightText: 2022 Paul Schaub <vanitasvitae@fsfe.org>
|
||||
//
|
||||
// SPDX-License-Identifier: Apache-2.0
|
||||
|
||||
/**
|
||||
* Implementation of a {@link pgp.certificate_store.SubkeyLookup} mechanism using an SQLite Database.
|
||||
*/
|
||||
package pgp.cert_d.jdbc.sqlite;
|
|
@ -0,0 +1,84 @@
|
|||
// SPDX-FileCopyrightText: 2022 Paul Schaub <vanitasvitae@fsfe.org>
|
||||
//
|
||||
// SPDX-License-Identifier: Apache-2.0
|
||||
|
||||
package pgp.cert_d.jdbc.sqlite;
|
||||
|
||||
import static org.junit.jupiter.api.Assertions.assertEquals;
|
||||
import static org.junit.jupiter.api.Assertions.assertTrue;
|
||||
|
||||
import java.util.ArrayList;
|
||||
import java.util.Arrays;
|
||||
import java.util.List;
|
||||
|
||||
import org.junit.jupiter.api.Test;
|
||||
|
||||
public class SpecialNameFingerprintComparatorTest {
|
||||
|
||||
String fp1 = "eb85bb5fa33a75e15e944e63f231550c4f47e38e";
|
||||
String fp2 = "d1a66e1a23b182c9980f788cfbfcc82a015e7330";
|
||||
String specialName = "trust-root";
|
||||
String invalidButSpecialName = "invalid";
|
||||
SpecialNameFingerprintComparator comparator = new SpecialNameFingerprintComparator();
|
||||
|
||||
@Test
|
||||
public void testFingerprintGreaterThanSpecialName() {
|
||||
assertTrue(comparator.compare(fp1, specialName) > 0);
|
||||
assertTrue(comparator.compare(fp2, specialName) > 0);
|
||||
assertTrue(comparator.compare(fp1, invalidButSpecialName) > 0);
|
||||
assertTrue(comparator.compare(fp2, invalidButSpecialName) > 0);
|
||||
}
|
||||
|
||||
@Test
|
||||
public void testSpecialNameLessThanFingerprint() {
|
||||
assertTrue(comparator.compare(specialName, fp1) < 0);
|
||||
assertTrue(comparator.compare(specialName,fp2) < 0);
|
||||
assertTrue(comparator.compare(invalidButSpecialName, fp1) < 0);
|
||||
assertTrue(comparator.compare(invalidButSpecialName, fp2) < 0);
|
||||
}
|
||||
|
||||
@Test
|
||||
public void testSortingList() {
|
||||
// Expected: special names first, fingerprints after that
|
||||
List<String> expected = Arrays.asList(invalidButSpecialName, specialName, fp2, fp1, fp1);
|
||||
List<String> list = new ArrayList<>();
|
||||
list.add(fp1);
|
||||
list.add(specialName);
|
||||
list.add(fp1);
|
||||
list.add(fp2);
|
||||
list.add(invalidButSpecialName);
|
||||
|
||||
list.sort(new SpecialNameFingerprintComparator());
|
||||
|
||||
assertEquals(expected, list);
|
||||
}
|
||||
|
||||
@Test
|
||||
public void fingerprintsAreSortedLexicographically() {
|
||||
assertTrue(comparator.compare(fp1, fp2) > 0);
|
||||
assertEquals(0, comparator.compare(fp1, fp1));
|
||||
assertTrue(comparator.compare(fp2, fp1) < 0);
|
||||
}
|
||||
|
||||
@Test
|
||||
public void specialNamesAreSortedLexicographically() {
|
||||
assertTrue(comparator.compare(invalidButSpecialName, specialName) < 0);
|
||||
assertEquals(0, comparator.compare(invalidButSpecialName, invalidButSpecialName));
|
||||
assertEquals(0, comparator.compare(specialName, specialName));
|
||||
assertTrue(comparator.compare(specialName, invalidButSpecialName) > 0);
|
||||
}
|
||||
|
||||
@Test
|
||||
public void specialNamesAreAlwaysSmallerFingerprints() {
|
||||
assertTrue(comparator.compare(invalidButSpecialName, fp1) < 0);
|
||||
assertTrue(comparator.compare(specialName, fp1) < 0);
|
||||
assertTrue(comparator.compare(fp2, specialName) > 0);
|
||||
|
||||
// upper case fingerprint is considered special name, since fingerprints are expected to be lower case
|
||||
assertTrue(comparator.compare("D1A66E1A23B182C9980F788CFBFCC82A015E7330", fp1) < 0);
|
||||
assertTrue(comparator.compare("D1A66E1A23B182C9980F788CFBFCC82A015E7330", fp2) < 0);
|
||||
|
||||
assertTrue(comparator.compare("-1A66E1A23B182C9980F788CFBFCC82A015E7330", fp1) < 0);
|
||||
assertTrue(comparator.compare(":1A66E1A23B182C9980F788CFBFCC82A015E7330", fp1) < 0);
|
||||
}
|
||||
}
|
|
@ -0,0 +1,85 @@
|
|||
// SPDX-FileCopyrightText: 2022 Paul Schaub <vanitasvitae@fsfe.org>
|
||||
//
|
||||
// SPDX-License-Identifier: Apache-2.0
|
||||
|
||||
package pgp.cert_d.jdbc.sqlite;
|
||||
|
||||
import org.junit.jupiter.api.BeforeEach;
|
||||
import org.junit.jupiter.api.Test;
|
||||
|
||||
import java.io.File;
|
||||
import java.io.IOException;
|
||||
import java.nio.file.Files;
|
||||
import java.sql.SQLException;
|
||||
import java.util.List;
|
||||
|
||||
import static org.junit.jupiter.api.Assertions.assertEquals;
|
||||
import static org.junit.jupiter.api.Assertions.assertNull;
|
||||
import static org.junit.jupiter.api.Assertions.assertThrows;
|
||||
import static org.junit.jupiter.api.Assertions.assertTrue;
|
||||
|
||||
public class SqliteSubkeyLookupTest {
|
||||
|
||||
private File databaseFile;
|
||||
private SqliteSubkeyLookup lookup;
|
||||
|
||||
@BeforeEach
|
||||
public void setupLookup() throws IOException, SQLException {
|
||||
databaseFile = Files.createTempFile("pgp.cert.d-", "lookup.db").toFile();
|
||||
databaseFile.createNewFile();
|
||||
databaseFile.deleteOnExit();
|
||||
lookup = SqliteSubkeyLookup.forDatabaseFile(databaseFile);
|
||||
}
|
||||
|
||||
@Test
|
||||
public void simpleInsertAndGet() throws IOException {
|
||||
lookup.storeIdentifierForSubkeyId(123L, "trust-root");
|
||||
lookup.storeIdentifierForSubkeyId(234L, "trust-root");
|
||||
assertEquals("trust-root", lookup.getIdentifierForSubkeyId(123L));
|
||||
assertEquals("trust-root", lookup.getIdentifierForSubkeyId(234L));
|
||||
}
|
||||
|
||||
@Test
|
||||
public void getNonExistingSubkeyYieldsNull() throws IOException, SQLException {
|
||||
assertTrue(lookup.get(6666666).isEmpty());
|
||||
assertNull(lookup.getIdentifierForSubkeyId(6666666));
|
||||
}
|
||||
|
||||
@Test
|
||||
public void secondInstanceLookupTest() throws IOException, SQLException {
|
||||
lookup.storeIdentifierForSubkeyId(1337, "eb85bb5fa33a75e15e944e63f231550c4f47e38e");
|
||||
assertEquals("eb85bb5fa33a75e15e944e63f231550c4f47e38e", lookup.getIdentifierForSubkeyId(1337));
|
||||
|
||||
// do the lookup using a second db instance on the same file
|
||||
SqliteSubkeyLookup secondInstance = SqliteSubkeyLookup.forDatabaseFile(databaseFile);
|
||||
assertEquals("eb85bb5fa33a75e15e944e63f231550c4f47e38e", secondInstance.getIdentifierForSubkeyId(1337));
|
||||
}
|
||||
|
||||
@Test
|
||||
public void specialNamesAreFavoured() throws IOException, SQLException {
|
||||
// insert 3 different entries for subkey 1234L
|
||||
lookup.storeIdentifierForSubkeyId(1234L, "eb85bb5fa33a75e15e944e63f231550c4f47e38e");
|
||||
lookup.storeIdentifierForSubkeyId(1234L, "trust-root");
|
||||
lookup.storeIdentifierForSubkeyId(1234L, "d1a66e1a23b182c9980f788cfbfcc82a015e7330");
|
||||
|
||||
List<Entry> allEntries = lookup.get(1234L);
|
||||
assertEquals(3, allEntries.size());
|
||||
for (Entry e : allEntries) {
|
||||
assertEquals(1234L, e.getSubkeyId());
|
||||
}
|
||||
|
||||
// we always expect the special name to be favoured
|
||||
assertEquals("trust-root", lookup.getIdentifierForSubkeyId(1234L));
|
||||
}
|
||||
|
||||
@Test
|
||||
public void ignoreInsertDuplicates() throws IOException {
|
||||
lookup.storeIdentifierForSubkeyId(123L, "d1a66e1a23b182c9980f788cfbfcc82a015e7330");
|
||||
// per default we ignore duplicates
|
||||
lookup.storeIdentifierForSubkeyId(123L, "d1a66e1a23b182c9980f788cfbfcc82a015e7330");
|
||||
|
||||
// if we choose not to ignore duplicates, we raise an exception
|
||||
assertThrows(SQLException.class, () ->
|
||||
lookup.insert(123L, "d1a66e1a23b182c9980f788cfbfcc82a015e7330", false));
|
||||
}
|
||||
}
|
|
@ -20,6 +20,8 @@ dependencies {
|
|||
// Logging
|
||||
testImplementation "ch.qos.logback:logback-classic:$logbackVersion"
|
||||
|
||||
testImplementation project(":pgp-cert-d-java-jdbc-sqlite-lookup")
|
||||
|
||||
api project(":pgp-certificate-store")
|
||||
}
|
||||
|
||||
|
|
|
@ -4,6 +4,10 @@
|
|||
|
||||
package pgp.cert_d;
|
||||
|
||||
import java.io.File;
|
||||
import java.io.IOException;
|
||||
import java.nio.file.Files;
|
||||
import java.sql.SQLException;
|
||||
import java.util.ArrayList;
|
||||
import java.util.List;
|
||||
import java.util.stream.Stream;
|
||||
|
@ -12,6 +16,7 @@ import org.junit.jupiter.api.AfterAll;
|
|||
import org.junit.jupiter.api.BeforeAll;
|
||||
import org.junit.jupiter.params.ParameterizedTest;
|
||||
import org.junit.jupiter.params.provider.MethodSource;
|
||||
import pgp.cert_d.jdbc.sqlite.SqliteSubkeyLookup;
|
||||
import pgp.certificate_store.SubkeyLookup;
|
||||
|
||||
import static org.junit.jupiter.api.Assertions.assertEquals;
|
||||
|
@ -22,8 +27,15 @@ public class SubkeyLookupTest {
|
|||
private static final List<SubkeyLookup> testSubjects = new ArrayList<>();
|
||||
|
||||
@BeforeAll
|
||||
public static void setupLookupTestSubjects() {
|
||||
testSubjects.add(new InMemorySubkeyLookup());
|
||||
public static void setupLookupTestSubjects() throws IOException, SQLException {
|
||||
InMemorySubkeyLookup inMemorySubkeyLookup = new InMemorySubkeyLookup();
|
||||
testSubjects.add(inMemorySubkeyLookup);
|
||||
|
||||
File sqliteDatabase = Files.createTempFile("subkeyLookupTest", ".db").toFile();
|
||||
sqliteDatabase.createNewFile();
|
||||
sqliteDatabase.deleteOnExit();
|
||||
SqliteSubkeyLookup sqliteSubkeyLookup = SqliteSubkeyLookup.forDatabaseFile(sqliteDatabase);
|
||||
testSubjects.add(sqliteSubkeyLookup);
|
||||
}
|
||||
|
||||
@AfterAll
|
||||
|
@ -37,7 +49,7 @@ public class SubkeyLookupTest {
|
|||
|
||||
@ParameterizedTest
|
||||
@MethodSource("provideSubkeyLookupsForTest")
|
||||
public void testInsertGet(SubkeyLookup subject) {
|
||||
public void testInsertGet(SubkeyLookup subject) throws IOException {
|
||||
// Initially all null
|
||||
|
||||
assertNull(subject.getIdentifierForSubkeyId(123));
|
||||
|
@ -65,6 +77,7 @@ public class SubkeyLookupTest {
|
|||
|
||||
subject.storeIdentifierForSubkeyId(123, "d1a66e1a23b182c9980f788cfbfcc82a015e7330");
|
||||
|
||||
assertEquals("d1a66e1a23b182c9980f788cfbfcc82a015e7330", subject.getIdentifierForSubkeyId(123));
|
||||
// TODO: Decide on expected result and fix test
|
||||
// assertEquals("d1a66e1a23b182c9980f788cfbfcc82a015e7330", subject.getIdentifierForSubkeyId(123));
|
||||
}
|
||||
}
|
||||
|
|
|
@ -4,6 +4,8 @@
|
|||
|
||||
package pgp.certificate_store;
|
||||
|
||||
import java.io.IOException;
|
||||
|
||||
public interface SubkeyLookup {
|
||||
|
||||
/**
|
||||
|
@ -13,7 +15,7 @@ public interface SubkeyLookup {
|
|||
* @param subkeyId subkey id
|
||||
* @return identifier (fingerprint or special name) of the certificate
|
||||
*/
|
||||
String getIdentifierForSubkeyId(long subkeyId);
|
||||
String getIdentifierForSubkeyId(long subkeyId) throws IOException;
|
||||
|
||||
/**
|
||||
* Store a record of the subkey id that points to the identifier.
|
||||
|
@ -21,5 +23,5 @@ public interface SubkeyLookup {
|
|||
* @param subkeyId subkey id
|
||||
* @param identifier fingerprint or special name of the certificate
|
||||
*/
|
||||
void storeIdentifierForSubkeyId(long subkeyId, String identifier);
|
||||
void storeIdentifierForSubkeyId(long subkeyId, String identifier) throws IOException;
|
||||
}
|
||||
|
|
|
@ -10,5 +10,6 @@ include 'pgpainless-core',
|
|||
'pgpainless-cert-d',
|
||||
'pgpainless-cert-d-cli',
|
||||
'pgp-certificate-store',
|
||||
'pgp-cert-d-java'
|
||||
'pgp-cert-d-java',
|
||||
'pgp-cert-d-java-jdbc-sqlite-lookup'
|
||||
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue