Gemini and NTS Exit Reform API Usage Guidelines

Total Page:16

File Type:pdf, Size:1020Kb

Gemini and NTS Exit Reform API Usage Guidelines Gemini and NTS Exit Reform API Usage Guidelines ~ 1 ~ Table of Contents 1. Introduction ............................................................................................................................................6 1.1. API Technology Overview ....................................................................................................................6 2. API Client Development Guidelines .....................................................................................................8 2.1. HTTPS and SSL ...................................................................................................................................9 2.2. Authentication and Authorization ...................................................................................................... 10 2.3. Maintaining the Session .................................................................................................................... 10 2.4. Authentication / Loss of Session / Authorization Failures ................................................................. 10 2.5. Request a Compressed Response to your API Client ...................................................................... 11 3. API Configuration Details ................................................................................................................... 14 3.1. API Technology Overview ................................................................................................................. 14 3.2. Network Requirements ...................................................................................................................... 15 3.3. API Service Connectivity Confirmation ............................................................................................. 15 4. Specifications for Session Management APIs ................................................................................. 15 4.1. Login API ........................................................................................................................................... 16 4.2. Functional APIs ................................................................................................................................. 27 4.3. Logout API ......................................................................................................................................... 29 4.4. Change Password API ...................................................................................................................... 29 5. Error Handling ..................................................................................................................................... 32 5.1. Errors Reported via XML ................................................................................................................... 33 5.2. Error XML Specification .................................................................................................................... 34 5.3. Error Schema Definition .................................................................................................................... 35 5.4. Generic Error Codes ......................................................................................................................... 36 6. Functional API Specifications ........................................................................................................... 38 6.1. API Scope ......................................................................................................................................... 39 6.2. Date Formats ..................................................................................................................................... 43 7. Element Name Abbreviations ............................................................................................................ 44 7.1. Entry Capacity APIs .......................................................................................................................... 44 7.2. Entry Balancing APIs......................................................................................................................... 46 7.3. NTS Exit Capacity APIs .................................................................................................................... 54 8. Debugging for API Client Developers ............................................................................................... 56 ~ 2 ~ 9. Document Control ............................................................................................................................... 57 9.1. Superseded Documents .................................................................................................................... 57 9.2. Version History .................................................................................................................................. 57 ~ 3 ~ List of Figures Figure 1: API Client Communication with Gemini/NTS Exit Reform ..................................................................6 Figure 2: API Client Sequence of Interactions with Gemini / NTS Exit Reforms ................................................10 Figure 3: Interaction between Web Client and Web Server ............................................................................ 23 Figure 4: Interaction between Web Client and Web Server involving a redirection of 3xx status code ........... 24 Figure 5: Example Logic for Determining the Cause of Authentication/Loss of Session/ Authorization Failures .................................................................................................................................................................. 28 Figure 6: Error Handling by Severity of Error .................................................................................................. 34 List of Tables Table 1: Authentication / Loss of Session / Authorization Failures ................................................................. 13 Table 2: Password and Session Policies ......................................................................................................... 15 Table 3: Login API Request Headers .............................................................................................................. 19 Table 4: Login API Response Headers - Successful Authentication/ Authorization ....................................... 20 Table 5: Authentication/Authorization Failed ................................................................................................... 21 Table 6: Redirection Scenarios ....................................................................................................................... 26 Table 7: Scenarios not Involving a Redirection ............................................................................................... 27 Table 8: Functional API Request Headers ...................................................................................................... 29 Table 9: Functional API Request Body............................................................................................................ 30 Table 10: Functional API Response Headers ................................................................................................. 30 Table 11: HTTPS Request Headers ................................................................................................................ 31 Table 12: Change Password API Request Parameters .................................................................................. 32 Table 13: Change Password API Response Codes ........................................................................................ 33 Table 14: Error Scenarios for Query APIs ....................................................................................................... 35 Table 15: Error Scenarios for Update APIs ..................................................................................................... 36 Table 16: Error XML Specification ................................................................................................................... 36 Table 17: Generic API Error Codes ................................................................................................................. 38 Table 18: Entry Capacity ................................................................................................................................. 41 Table 19: Energy Balancing ............................................................................................................................ 41 Table 20: NTS Exit Capacity Functional APIs ................................................................................................. 43 Table 21: Entry Capacity APIs ......................................................................................................................... 44 Table 22: Energy Balancing APIs .................................................................................................................... 46 Table 23: NTS Exit Capacity APIs ................................................................................................................... 54 ~ 4 ~ List of Abbreviations Acronym Description API Application Programming Interface DOM Document Object Model BA Business Associate HTTP Hypertext Transfer Protocol HTTPS Hypertext Transfer Protocol Secure IX Information Exchange LSO Local Security Officer NG National Grid NTS National Transmission System SAX
Recommended publications
  • Bibliography of Erik Wilde
    dretbiblio dretbiblio Erik Wilde's Bibliography References [1] AFIPS Fall Joint Computer Conference, San Francisco, California, December 1968. [2] Seventeenth IEEE Conference on Computer Communication Networks, Washington, D.C., 1978. [3] ACM SIGACT-SIGMOD Symposium on Principles of Database Systems, Los Angeles, Cal- ifornia, March 1982. ACM Press. [4] First Conference on Computer-Supported Cooperative Work, 1986. [5] 1987 ACM Conference on Hypertext, Chapel Hill, North Carolina, November 1987. ACM Press. [6] 18th IEEE International Symposium on Fault-Tolerant Computing, Tokyo, Japan, 1988. IEEE Computer Society Press. [7] Conference on Computer-Supported Cooperative Work, Portland, Oregon, 1988. ACM Press. [8] Conference on Office Information Systems, Palo Alto, California, March 1988. [9] 1989 ACM Conference on Hypertext, Pittsburgh, Pennsylvania, November 1989. ACM Press. [10] UNIX | The Legend Evolves. Summer 1990 UKUUG Conference, Buntingford, UK, 1990. UKUUG. [11] Fourth ACM Symposium on User Interface Software and Technology, Hilton Head, South Carolina, November 1991. [12] GLOBECOM'91 Conference, Phoenix, Arizona, 1991. IEEE Computer Society Press. [13] IEEE INFOCOM '91 Conference on Computer Communications, Bal Harbour, Florida, 1991. IEEE Computer Society Press. [14] IEEE International Conference on Communications, Denver, Colorado, June 1991. [15] International Workshop on CSCW, Berlin, Germany, April 1991. [16] Third ACM Conference on Hypertext, San Antonio, Texas, December 1991. ACM Press. [17] 11th Symposium on Reliable Distributed Systems, Houston, Texas, 1992. IEEE Computer Society Press. [18] 3rd Joint European Networking Conference, Innsbruck, Austria, May 1992. [19] Fourth ACM Conference on Hypertext, Milano, Italy, November 1992. ACM Press. [20] GLOBECOM'92 Conference, Orlando, Florida, December 1992. IEEE Computer Society Press. http://github.com/dret/biblio (August 29, 2018) 1 dretbiblio [21] IEEE INFOCOM '92 Conference on Computer Communications, Florence, Italy, 1992.
    [Show full text]
  • GEMINI Fixed Dome IP Network Camera, 2-Megapixel, H.265, 60Fps HFR, 4.3X Optical Zoom, IR Leds, Indoor/Outdoor
    FCS-3406 Version: 1 GEMINI Fixed Dome IP Network Camera, 2-Megapixel, H.265, 60fps HFR, 4.3X Optical Zoom, IR LEDs, Indoor/Outdoor The LevelOne FCS-3406 is a fixed-position outdoor camera offering an ultra-reliable, cost-effective solution for outdoor IP surveillance networks, and is rated at IP67 to operate within rain, extreme heat, snow, dust and humid conditions. Offering clear, sharp imagery with 2-Megapixel resolution and the versatility of 802.3af standard PoE to transfer power and data via a single Cat.5 cable, the LevelOne FCS-3406 should be an essential part of any security deployment that requires smart, reliable outdoor cameras. Key Features - 60 fps High Frame Rate (HFR) video in 1080p - Video compression: H.264, H.265 - Supports 4.3X optical zoom - Features WDR (Wide Dynamic Range) to enhance visibility under extremely bright or dark environments - Vandal-proof IK10-rated housing - Weatherproof IP67-rated housing - Built-in infrared LEDs for night viewing up to 30m - Built-in Micro SDHC/SDXC card slot for local storage Specifications System Specifications Standards: TCP/IP, ICMP, HTTP, HTTPS, FTP, DHCP, DNS, DDNS, RTP, RTSP, RTCP, PPPoE, NTP, UPnP, SMTP,SNMP,IGMP, 802.1X, QoS, IPv6, Bonjour Image Sensor: 1/1.8" Progressive Scan CMOS Lens: 2.8 to 12 mm motorization Port: 10/100Mbps (100Base-T) RJ45 Ethernet interface Power Connector Audio:In/Out I/O terminal block (1 DI/1 DO) 1 x MicroSDHC/ MicroSDXC card slot www.level1.com1 RS-485 interface Page 1 of 4 Button/Knob: Reset Button IR Cut Filter: Support IR LED: Up to 30m Shutter Time: 1 s to 1/100,000 s Angle of View: Horizontal field of view: 103°to 38° Vertical field of view: 54°to 21° Diagonal field of view: 124°to 44° Video Format: H.265/H.264/MJPEG Resolution: 50Hz: 50fps (1920 × 1080, 1280 × 960, 1280×720) 60Hz: 60fps (1920 × 1080, 1280 × 960, 1280×720) Output Video Format: MPEG-4 Audio Compression: G.711/G.722.1/G.726/MP2L2, 64 Kbps (G.711)/16 Kbps (G.722.1)/16 Kbps (G.726)/32 to 128 Kbps (MP2L2 Power Input: 12V DC±10%, PoE (802.3af) Power Consumption: With extra load: 12 VDC, 0.8 A, max.
    [Show full text]
  • Gemini Broadband Ku/Ka/C Satellite Router
    Corporate Waves Primary colors Secondary colors -C Gemini Broadband Ku/Ka/C Satellite Router Enabling High Speed Broadband Services SkyEdge II-c Gemini is a compact high-throughput VSAT, designed to enable high speed broadband services while meeting cost efficiencies required by residential customers and small businesses. Gemini enables fast web browsing, video streaming, IPTV, VoIP, and other bandwidth-intensive services. Gemini is a full-featured IP router, eliminating the need for an external router via support of enhanced IP routing features such as DHCP, NAT/PAT and IGMP. Advanced application-based QoS guarantees the performance of real-time applications such as VoIP and video streaming, while also supporting other data applications. Gemini also supports next generation IPv6 networking. Gemini includes a full set of protocol optimization and application acceleration features. TCP and HTTP protocol acceleration and payload compression ensure fast Web browsing and high user Benefits experience. Gemini provides the highest level of transmission security supporting • Fast web browsing with web acceleration AES-256 bit link layer encryption with dynamic key rotation to protect and compression all user traffic, and standard IP-Sec providing end to end network layer • High quality VoIP and video security. • Simple DIY installation and automatic service activation Simple, Do-It-Yourself Installation and Service Activation • DVB-S2 ACM and DVB-RCS adaptive transmission standards Gemini is designed to support quick and reliable installation, and automatic service activation. The process requires no prior VSAT • Central monitoring and service management installation skills or technical support. • C/Ku/Ka bands The outdoor electronics and antenna are designed to simplify the assembly and mounting, and shorten the antenna pointing procedure.
    [Show full text]
  • 1 the Internet Internet Levels of Access to the Internet
    The Internet DS 4250 - Business Data Communications Slide 1 Internet z Collection of interconnected networks with a common protocols. 4TCP/IP z The networks are linked through various high-speed backbones. z Routing method is hierarchical. z Can follow the packet movement on Gemini 4$ mu trace www.dell.com DS 4250 - Internet Slide 2 Levels of Access to The Internet NAP National Backbone Regional Network Internet Service Provider Consumer and Business Market ¾http://www.ispworld.com/isp/bb/n_america.htm DS 4250 - Internet Slide 3 1 Internet Structure Local ISP Local ISP Regional ISP National ISP Regional ISP National ISP NAP National ISP NationalNational ISP ISP Regional ISP National ISP NationalNational ISP ISP NAP NationalNational ISP ISP NationalNational ISP ISP Regional ISP Regional ISP Local ISP Regional ISP Regional ISP Regional ISP Regional ISP Regional ISP Regional ISP MAE Local ISP Regional ISP Regional ISP Local ISP Regional ISP Local ISP Local ISP Local ISP Local ISP Local ISP Local ISP Local ISP Local ISP Figure 9-1 Basic Internet Architecture DS 4250 - Internet Slide 4 Concerns in Choosing an ISP z Examine the backbone of the provider 4Does the backbone include needed areas 4Check the speed of the network 4Examine the redundancy of the network 4What power back-ups do they have 4Connections to other providers • At least three network access points 4What is the guarantee of performance DS 4250 - Internet Slide 5 Internet Addressing z Based on the software address for each device 4A unique number for each device z Used to designate
    [Show full text]
  • Bookings of Westin Diplomat Bookings
    RESTful Web Applications with Spring 3.0 Arjen Poutsma Senior Software Engineer SpringSource Speaker’s qualifications • Fifteen years of experience in Enterprise Software Development • Six years of Web service experience • Development lead of Spring Web Services • Working on Spring 3.0 • Contributor to various Open Source frameworks: (XFire, Axis2, NEO, ...) SpringSource Confidential. Do not distribute without express permission Overview • RESTful URLs • URI templates • Content negotiation • HTTP method conversion • ETag support SpringSource Confidential. Do not distribute without express permission RESTful URLs Resources • URLs are unique identifiers for Resources • Typically nouns • Customer • Orders • Shopping cart URLs [scheme:][//authority][path][?query][#fragment] http://www.springsource.com https://mybank.com http://www.google.com/search?q=arjen %20poutsma http://java.sun.com/j2se/1.4.2/docs/api/java/lang/ String.html#indexOf(int) SpringSource Confidential. Do not distribute without express permission Paths • Represents hierarchy • Represents value for consumers • Collections on higher levels SpringSource Confidential. Do not distribute without express permission Example Path Description /hotels List of all hotels /hotels/westindiplomat Details of Westin Diplomat /hotels/westindiplomat/ List of bookings of Westin Diplomat bookings /hotels/westindiplomat/ Individual booking bookings/42584 No Hierarchy? Path Description maps/24.9195,17.821 Commas maps/24.9195;17.821 Semicolons Query Variables • Input for algorithms • Get ignored by proxies
    [Show full text]
  • Gemini Quick Start Guide 70090630
    Gemini Intercom Quick Start Guide 2 Gemini Quick Start Guide Contents Contents ......................................................................................... 1 Overview ......................................................................................... 3 First Step – unpack and inspect ...................................................... 3 Network plan and IP addresses ...................................................... 4 Management PC ............................................................................. 5 Install Software ............................................................................... 6 Configure the firewall ..................................................................... 7 Gateway – the Configuration Editor ............................................... 8 Gateway – Networked DSP ............................................................ 9 File Management ............................................................................ 9 Gemini – Setting the basics .......................................................... 10 Gemini – setting the identity (EDH address) ................................ 12 Restart to apply changes .............................................................. 12 Connect to your network ............................................................. 13 Active Clients Form ....................................................................... 13 Repeat for each Gemini in your system ....................................... 14 Gemini Web Browser ..................................................................
    [Show full text]
  • Early Use of the Gemini Observatory Archive
    1 Director’s Message 45 On the Horizon Markus Kissler-Patig Gemini staff contributions 3 Gemini South Explores the 55 A Transition Comes to an End Growth of Massive Galaxy Clusters Inger Jørgensen Sarah Sweet, Rodrigo Carrasco, and 59 Gemini Harnesses the Sun from Fernanda Urrutia Both Hemispheres 7 A Gemini Spectrum of a World Alexis Ann Acohido Colder than a Night on Maunakea Gemini Connections Andy Skemer 61 Peter Michaud 11 A Case of Warped Space: Confirming Strong Gravitational 64 A New Look for Gemini’s Legacy Lenses Found in the Dark Energy Images Survey 66 Observatory Careers: New Brian Nord and Elizabeth Buckley-Geer Resources for Students, Teachers, and Parents 16 Dusting the Universe with Supernovae 68 Journey Through the Universe: Jennifer Andrews Twelve Years, and Counting! Alexis Ann Acohido 20 Science Highlights Gemini staff contributions 71 Viaje al Universo 2016: Empowering Students with Science News for Users 31 Maunel Paredes Gemini staff contributions ON THE COVER: GeminiFocus Color composite image January 2017 / 2016 Year in Review of the galaxy cluster GeminiFocus is a quarterly publication SPT-CL J0546-5345, of the Gemini Observatory comprised of Gemini 670 N. A‘ohoku Place, Hilo, Hawai‘i 96720, USA GeMS/GSAOI and HST Phone: (808) 974-2500 Fax: (808) 974-2589 data. White inset at right bottom shows Online viewing address: www.gemini.edu/geminifocus Gemini Ks image of the region. The article on Managing Editor: Peter Michaud this work begins on Associate Editor: Stephen James O’Meara page 3. Also shown Designer: Eve Furchgott/Blue Heron Multimedia are the covers from Any opinions, findings, and conclusions or April, July, and October recommendations expressed in this material are those of issues of GeminiFocus.
    [Show full text]
  • UK Research Data Registry Mapping Schemes
    UK Research Data Registry Mapping Schemes Project Information Project Identifier PID TBC Project Title UK Research Data (Metadata) Registry Pilot Project Hashtag #jiscrdr Start Date 1 October 2013 End Date 31 March 2014 Lead Institution Jisc Project Director Rachel Bruce Project Manager — Contact Email — Partner Institutions Digital Curation Centre (Universities of Edinburgh, Glasgow, Bath); UKDA (University of Essex) Project Webpage URL TBC Programme Name Jisc Capital Programme Document Information Author(s) and Role(s) Alex Ball (Metadata Coordinator) Date 12 February 2014 Project Refs T3.1; D3.1 Filename uk-rdr-mapping-v06.pdf URL TBD Access This report is for general dissemination Document History Version Date Comments 01 29 November 2013 Summary of RIF-CS. First draft of DDI mapping. 02 8 January 2014 Second draft of DDI mapping. First draft of DataCite mapping. 03 22 January 2014 New introduction. Expanded summary of RIF-CS. First draft of EPrints ReCollect, NERC Discovery, and OAI-PMH Dublin Core mappings. 04 23 January 2014 Section on tips for contributors. 05 31 January 2014 Second draft of NERC Discovery (UK GEMINI), EPrints mappings. 06 12 February 2014 Third draft of DDI mapping. 1 Contents 1 Introduction 3 1.1 Typographical conventions . 3 2 RIF-CS 4 2.1 Elements . 4 2.2 Controlled vocabularies . 8 3 Internally managed RIF-CS elements 20 4 Mapping from DDI to RIF-CS 21 4.1 Related Objects . 22 5 Mapping from UK GEMINI 2 to RIF-CS 24 5.1 Related Objects . 26 6 Mapping from DataCite to RIF-CS 27 6.1 Related Objects .
    [Show full text]
  • Cellular Communications Commercial Security Fire Alarms & Devices
    CELLULAR COMMUNICATIONS COMMERCIAL SECURITY FIRE ALARMS & DEVICES CONNECTED HOME & BUSINESS TECH, VIDEO & ACCESS ADD-ONS Table of Contents At Napco, we appreciate the continued loyalty of our security professional customers and hearing from you – what you like about our products &/or what you’d like to see next. Included here is some of that feedback along with some fast market facts. Thanks for the support. COMMERCIAL FIRE SYSTEMS Firewolf Fire Alarm Systems, Devices, Configurations & Diagram...................................................1 & 2 FireLink FACP with Cellular Built-in ..............................................................................................................3 COMMERCIAL INTEGRATED SECURITY SYSTEMS Napco Commercial GEMC-Series Integrated Security/Fire/Access Control Platform, Configurations & Diagram .....................................................................................................................4 & 5 Napco Commercial Systems and Firewolf & FireLink Fire Alarms Ordering Info. ...............................6 CELLULAR COMMUNICATION SOLUTIONS StarLink Fire Sole & Dual Path Cell/IP Communicators & Ordering Info. ........................................7 & 8 StarLink Line Model Comparison & Ordering, Commercial Fire, Intrusion & Connected Home/Business Applications ........................................................................................................................9 StarLink Intrusion Cellular Communicators & Ordering Info. ...............................................................
    [Show full text]
  • Skyedge Ii-C Gemini-I
    SKYEDGE II-C GEMINI-I Consumer Broadband Internet VSAT ENABLING HIGH-SPEED BROADBAND SERVICES BENEFITS SkyEdge II-c Gemini-i is a high-throughput VSAT, designed to Fast web browsing with web acceleration and compression enable high-speed consumer broadband Internet services while meeting cost efficiencies required by residential customers. Enables high-quality VoIP and video Gemini-i facilitates fast web browsing, video streaming, IPTV, VoIP, and other bandwidth-intensive services. Simple installation and service activation By acting as a home router, Gemini-i also supports multiple devices through its integrated DHCP server, NAT/PAT and IGMP. Advanced QoS guarantees the performance of real- Forward and return adaptive transmission technologies time applications such as VoIP and video streaming while simultaneously enabling additional data applications. Gemini-i also Central monitoring and service management supports next-generation IPv6 networking. To ensure fast web browsing and a high-quality user experience, Supports C, Ku and Ka bands Gemini-i contains a full set of protocol optimization and application acceleration features, including TCP and HTTP protocol acceleration and payload compression. Gemini-i provides the highest level of transmission security, supporting X.509 terminal authentication and AES-256 bit link layer encryption with dynamic key rotation to protect all user traffic. SIMPLE, DO-IT-YOURSELF INSTALLATION AND SERVICE ACTIVATION Gemini-i is designed to enable quick and reliable installation and automatic service activation. The process requires no prior VSAT installation skills or technical support. The outdoor electronics and antenna are designed to simplify the assembly and mounting while shortening the antenna-pointing procedure. The outdoor unit includes an audio device to guide and provide feedback during the antenna-pointing process.
    [Show full text]
  • HTTPAPI S. Dalal Internet-Draft Intended Status: Standards Track E
    HTTPAPI S. Dalal Internet-Draft Intended status: Standards Track E. Wilde Expires: January 11, 2022 July 10, 2021 The Deprecation HTTP Header Field draft-ietf-httpapi-deprecation-header-02 Abstract The HTTP Deprecation Response Header Field can be used to signal to consumers of a URI-identified resource that the resource has been deprecated. Additionally, the deprecation link relation can be used to link to a resource that provides additional context for the deprecation, and possibly ways in which clients can find a replacement for the deprecated resource. Status of This Memo This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79. Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet- Drafts is at https://datatracker.ietf.org/drafts/current/. Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress." This Internet-Draft will expire on January 11, 2022. Copyright Notice Copyright (c) 2021 IETF Trust and the persons identified as the document authors. All rights reserved. This document is subject to BCP 78 and the IETF Trust’s Legal Provisions Relating to IETF Documents (https://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document.
    [Show full text]
  • Gemini 720Im
    Gemini 720im Gemini 720im Product Manual Document: 0729-SOM-00002, Issue: 4 Document: 0729-SOM-00002, Issue: 4 1 © Tritech International Ltd. Gemini 720im © Tritech International Ltd The copyright in this document is the property of Tritech International Ltd. The document is supplied by Tritech International Ltd on the understanding that it may not be copied, used, or disclosed to others except as authorised in writing by Tritech International Ltd. Tritech International Ltd reserves the right to change, modify and update designs and specifications as part of their ongoing product development programme. All product names are trademarks of their respective companies. Open Source License Statement: This product includes software code developed by third parties, including software code subject to the GNU General Public License Version 2 ("GPLv2"). We will provide upon request the applicable GPL source code files via CD-ROM or similar storage medium for a nominal cost to cover shipping and media charges as allowed under the GPL. This offer is valid for a 3 year period from first manufacture of this product. General Public License ("GPLv2") Inquiries: Please direct all GPL inquiries to the following address: Tritech International Ltd Peregrine Road Westhill Business Park Westhill, Aberdeenshire AB32 6JL, UK Document: 0729-SOM-00002, Issue: 4 2 © Tritech International Ltd. Gemini 720im Table of Contents Warning Symbols ........................................................................................................ 4 1. Introduction ............................................................................................................
    [Show full text]