2021-08-03 09:55:21 +00:00
|
|
|
package commands
|
|
|
|
|
2021-11-25 01:56:58 +00:00
|
|
|
import (
|
|
|
|
"errors"
|
|
|
|
)
|
|
|
|
|
2022-06-14 12:40:00 +00:00
|
|
|
const (
|
|
|
|
fmtCmdAutheliaShort = "authelia %s"
|
2021-08-03 09:55:21 +00:00
|
|
|
|
2022-06-14 12:40:00 +00:00
|
|
|
fmtCmdAutheliaLong = `authelia %s
|
2021-08-03 09:55:21 +00:00
|
|
|
|
2022-06-14 12:40:00 +00:00
|
|
|
An open-source authentication and authorization server providing
|
|
|
|
two-factor authentication and single sign-on (SSO) for your
|
2021-08-03 09:55:21 +00:00
|
|
|
applications via a web portal.
|
|
|
|
|
2022-06-15 07:51:47 +00:00
|
|
|
Documentation is available at: https://www.authelia.com/`
|
2021-08-03 09:55:21 +00:00
|
|
|
|
2022-06-14 12:40:00 +00:00
|
|
|
cmdAutheliaExample = `authelia --config /etc/authelia/config.yml --config /etc/authelia/access-control.yml
|
|
|
|
authelia --config /etc/authelia/config.yml,/etc/authelia/access-control.yml
|
|
|
|
authelia --config /etc/authelia/config/`
|
|
|
|
|
|
|
|
fmtAutheliaBuild = `Last Tag: %s
|
2021-08-03 09:55:21 +00:00
|
|
|
State: %s
|
|
|
|
Branch: %s
|
|
|
|
Commit: %s
|
|
|
|
Build Number: %s
|
|
|
|
Build OS: %s
|
|
|
|
Build Arch: %s
|
|
|
|
Build Date: %s
|
|
|
|
Extra: %s
|
|
|
|
`
|
|
|
|
|
2022-06-14 12:40:00 +00:00
|
|
|
cmdAutheliaBuildInfoShort = "Show the build information of Authelia"
|
|
|
|
|
|
|
|
cmdAutheliaBuildInfoLong = `Show the build information of Authelia.
|
2021-08-03 09:55:21 +00:00
|
|
|
|
|
|
|
This outputs detailed version information about the specific version
|
|
|
|
of the Authelia binary. This information is embedded into Authelia
|
|
|
|
by the continuous integration.
|
|
|
|
|
|
|
|
This could be vital in debugging if you're not using a particular
|
|
|
|
tagged build of Authelia. It's suggested to provide it along with
|
|
|
|
your issue.
|
|
|
|
`
|
2022-06-14 12:40:00 +00:00
|
|
|
cmdAutheliaBuildInfoExample = `authelia build-info`
|
2021-08-03 09:55:21 +00:00
|
|
|
|
2022-06-14 12:40:00 +00:00
|
|
|
cmdAutheliaAccessControlShort = "Helpers for the access control system"
|
2021-08-03 09:55:21 +00:00
|
|
|
|
2022-06-14 12:40:00 +00:00
|
|
|
cmdAutheliaAccessControlLong = `Helpers for the access control system.`
|
2021-08-03 09:55:21 +00:00
|
|
|
|
2022-06-14 12:40:00 +00:00
|
|
|
cmdAutheliaAccessControlExample = `authelia access-control --help`
|
2021-08-03 09:55:21 +00:00
|
|
|
|
2022-06-14 12:40:00 +00:00
|
|
|
cmdAutheliaAccessControlCheckPolicyShort = "Checks a request against the access control rules to determine what policy would be applied"
|
2021-08-03 09:55:21 +00:00
|
|
|
|
2022-06-14 12:40:00 +00:00
|
|
|
cmdAutheliaAccessControlCheckPolicyLong = `
|
2022-02-28 03:15:01 +00:00
|
|
|
Checks a request against the access control rules to determine what policy would be applied.
|
|
|
|
|
|
|
|
Legend:
|
|
|
|
|
|
|
|
# The rule position in the configuration.
|
|
|
|
* The first fully matched rule.
|
|
|
|
~ Potential match i.e. if the user was authenticated they may match this rule.
|
|
|
|
hit The criteria in this column is a match to the request.
|
|
|
|
miss The criteria in this column is not match to the request.
|
|
|
|
may The criteria in this column is potentially a match to the request.
|
|
|
|
|
|
|
|
Notes:
|
|
|
|
|
|
|
|
A rule that potentially matches a request will cause a redirection to occur in order to perform one-factor
|
|
|
|
authentication. This is so Authelia can adequately determine if the rule actually matches.
|
|
|
|
`
|
2022-06-14 12:40:00 +00:00
|
|
|
cmdAutheliaAccessControlCheckPolicyExample = `authelia access-control check-policy --config config.yml --url https://example.com
|
|
|
|
authelia access-control check-policy --config config.yml --url https://example.com --username john
|
|
|
|
authelia access-control check-policy --config config.yml --url https://example.com --groups admin,public
|
|
|
|
authelia access-control check-policy --config config.yml --url https://example.com --username john --method GET
|
|
|
|
authelia access-control check-policy --config config.yml --url https://example.com --username john --method GET --verbose`
|
|
|
|
|
|
|
|
cmdAutheliaStorageShort = "Manage the Authelia storage"
|
|
|
|
|
|
|
|
cmdAutheliaStorageLong = `Manage the Authelia storage.
|
|
|
|
|
|
|
|
This subcommand has several methods to interact with the Authelia SQL Database. This allows doing several advanced
|
|
|
|
operations which would be much harder to do manually.
|
|
|
|
`
|
|
|
|
|
|
|
|
cmdAutheliaStorageExample = `authelia storage --help`
|
|
|
|
|
|
|
|
cmdAutheliaStorageEncryptionShort = "Manage storage encryption"
|
|
|
|
|
|
|
|
cmdAutheliaStorageEncryptionLong = `Manage storage encryption.
|
|
|
|
|
|
|
|
This subcommand allows management of the storage encryption.`
|
|
|
|
|
|
|
|
cmdAutheliaStorageEncryptionExample = `authelia storage encryption --help`
|
|
|
|
|
|
|
|
cmdAutheliaStorageEncryptionCheckShort = "Checks the encryption key against the database data"
|
|
|
|
|
|
|
|
cmdAutheliaStorageEncryptionCheckLong = `Checks the encryption key against the database data.
|
|
|
|
|
|
|
|
This is useful for validating all data that can be encrypted is intact.`
|
|
|
|
|
|
|
|
cmdAutheliaStorageEncryptionCheckExample = `authelia storage encryption check
|
|
|
|
authelia storage encryption check --verbose
|
|
|
|
authelia storage encryption check --verbose --config config.yml
|
|
|
|
authelia storage encryption check --verbose --encryption-key b3453fde-ecc2-4a1f-9422-2707ddbed495 --postgres.host postgres --postgres.password autheliapw`
|
|
|
|
|
|
|
|
cmdAutheliaStorageEncryptionChangeKeyShort = "Changes the encryption key"
|
|
|
|
|
|
|
|
cmdAutheliaStorageEncryptionChangeKeyLong = `Changes the encryption key.
|
|
|
|
|
|
|
|
This subcommand allows you to change the encryption key of an Authelia SQL database.`
|
|
|
|
|
|
|
|
cmdAutheliaStorageEncryptionChangeKeyExample = `authelia storage encryption change-key --config config.yml --new-encryption-key 0e95cb49-5804-4ad9-be82-bb04a9ddecd8
|
|
|
|
authelia storage encryption change-key --encryption-key b3453fde-ecc2-4a1f-9422-2707ddbed495 --new-encryption-key 0e95cb49-5804-4ad9-be82-bb04a9ddecd8 --postgres.host postgres --postgres.password autheliapw`
|
|
|
|
|
|
|
|
cmdAutheliaStorageUserShort = "Manages user settings"
|
|
|
|
|
|
|
|
cmdAutheliaStorageUserLong = `Manages user settings.
|
|
|
|
|
|
|
|
This subcommand allows modifying and exporting user settings.`
|
|
|
|
|
|
|
|
cmdAutheliaStorageUserExample = `authelia storage user --help`
|
|
|
|
|
|
|
|
cmdAutheliaStorageUserIdentifiersShort = "Manage user opaque identifiers"
|
|
|
|
|
|
|
|
cmdAutheliaStorageUserIdentifiersLong = `Manage user opaque identifiers.
|
|
|
|
|
|
|
|
This subcommand allows performing various tasks related to the opaque identifiers for users.`
|
|
|
|
|
|
|
|
cmdAutheliaStorageUserIdentifiersExample = `authelia storage user identifiers --help`
|
|
|
|
|
|
|
|
cmdAutheliaStorageUserIdentifiersExportShort = "Export the identifiers to a YAML file"
|
|
|
|
|
|
|
|
cmdAutheliaStorageUserIdentifiersExportLong = `Export the identifiers to a YAML file.
|
|
|
|
|
|
|
|
This subcommand allows exporting the opaque identifiers for users in order to back them up.`
|
|
|
|
|
|
|
|
cmdAutheliaStorageUserIdentifiersExportExample = `authelia storage user identifiers export
|
|
|
|
authelia storage user identifiers export --file export.yaml
|
|
|
|
authelia storage user identifiers export --file export.yaml --config config.yml
|
|
|
|
authelia storage user identifiers export --file export.yaml --encryption-key b3453fde-ecc2-4a1f-9422-2707ddbed495 --postgres.host postgres --postgres.password autheliapw`
|
|
|
|
|
|
|
|
cmdAutheliaStorageUserIdentifiersImportShort = "Import the identifiers from a YAML file"
|
|
|
|
|
|
|
|
cmdAutheliaStorageUserIdentifiersImportLong = `Import the identifiers from a YAML file.
|
|
|
|
|
|
|
|
This subcommand allows you to import the opaque identifiers for users from a YAML file.
|
|
|
|
|
|
|
|
The YAML file can either be automatically generated using the authelia storage user identifiers export command, or
|
|
|
|
manually provided the file is in the same format.`
|
|
|
|
|
|
|
|
cmdAutheliaStorageUserIdentifiersImportExample = `authelia storage user identifiers import
|
|
|
|
authelia storage user identifiers import --file export.yaml
|
|
|
|
authelia storage user identifiers import --file export.yaml --config config.yml
|
|
|
|
authelia storage user identifiers import --file export.yaml --encryption-key b3453fde-ecc2-4a1f-9422-2707ddbed495 --postgres.host postgres --postgres.password autheliapw`
|
|
|
|
|
|
|
|
cmdAutheliaStorageUserIdentifiersGenerateShort = "Generate opaque identifiers in bulk"
|
|
|
|
|
|
|
|
cmdAutheliaStorageUserIdentifiersGenerateLong = `Generate opaque identifiers in bulk.
|
|
|
|
|
|
|
|
This subcommand allows various options for generating the opaque identifies for users in bulk.`
|
|
|
|
|
|
|
|
cmdAutheliaStorageUserIdentifiersGenerateExample = `authelia storage user identifiers generate --users john,mary
|
|
|
|
authelia storage user identifiers generate --users john,mary --services openid
|
|
|
|
authelia storage user identifiers generate --users john,mary --services openid --sectors=",example.com,test.com"
|
|
|
|
authelia storage user identifiers generate --users john,mary --services openid --sectors=",example.com,test.com" --config config.yml
|
|
|
|
authelia storage user identifiers generate --users john,mary --services openid --sectors=",example.com,test.com" --encryption-key b3453fde-ecc2-4a1f-9422-2707ddbed495 --postgres.host postgres --postgres.password autheliapw`
|
|
|
|
|
|
|
|
cmdAutheliaStorageUserIdentifiersAddShort = "Add an opaque identifier for a user to the database"
|
|
|
|
|
|
|
|
cmdAutheliaStorageUserIdentifiersAddLong = `Add an opaque identifier for a user to the database.
|
|
|
|
|
|
|
|
This subcommand allows manually adding an opaque identifier for a user to the database provided it's in the correct format.`
|
|
|
|
|
|
|
|
cmdAutheliaStorageUserIdentifiersAddExample = `authelia storage user identifiers add john --identifier f0919359-9d15-4e15-bcba-83b41620a073
|
|
|
|
authelia storage user identifiers add john --identifier f0919359-9d15-4e15-bcba-83b41620a073 --config config.yml
|
|
|
|
authelia storage user identifiers add john --identifier f0919359-9d15-4e15-bcba-83b41620a073 --encryption-key b3453fde-ecc2-4a1f-9422-2707ddbed495 --postgres.host postgres --postgres.password autheliapw`
|
|
|
|
|
|
|
|
cmdAutheliaStorageUserTOTPShort = "Manage TOTP configurations"
|
|
|
|
|
|
|
|
cmdAutheliaStorageUserTOTPLong = `Manage TOTP configurations.
|
|
|
|
|
|
|
|
This subcommand allows deleting, exporting, and creating user TOTP configurations.`
|
|
|
|
|
|
|
|
cmdAutheliaStorageUserTOTPExample = `authelia storage user totp --help`
|
|
|
|
|
|
|
|
cmdAutheliaStorageUserTOTPGenerateShort = "Generate a TOTP configuration for a user"
|
|
|
|
|
|
|
|
cmdAutheliaStorageUserTOTPGenerateLong = `Generate a TOTP configuration for a user.
|
|
|
|
|
|
|
|
This subcommand allows generating a new TOTP configuration for a user,
|
|
|
|
and overwriting the existing configuration if applicable.`
|
|
|
|
|
|
|
|
cmdAutheliaStorageUserTOTPGenerateExample = `authelia storage user totp generate john
|
|
|
|
authelia storage user totp generate john --period 90
|
|
|
|
authelia storage user totp generate john --digits 8
|
|
|
|
authelia storage user totp generate john --algorithm SHA512
|
|
|
|
authelia storage user totp generate john --algorithm SHA512 --config config.yml
|
|
|
|
authelia storage user totp generate john --algorithm SHA512 --config config.yml --path john.png`
|
|
|
|
|
|
|
|
cmdAutheliaStorageUserTOTPDeleteShort = "Delete a TOTP configuration for a user"
|
|
|
|
|
|
|
|
cmdAutheliaStorageUserTOTPDeleteLong = `Delete a TOTP configuration for a user.
|
|
|
|
|
|
|
|
This subcommand allows deleting a TOTP configuration directly from the database for a given user.`
|
|
|
|
|
|
|
|
cmdAutheliaStorageUserTOTPDeleteExample = `authelia storage user totp delete john
|
|
|
|
authelia storage user totp delete john --config config.yml
|
|
|
|
authelia storage user totp delete john --encryption-key b3453fde-ecc2-4a1f-9422-2707ddbed495 --postgres.host postgres --postgres.password autheliapw`
|
|
|
|
|
|
|
|
cmdAutheliaStorageUserTOTPExportShort = "Perform exports of the TOTP configurations"
|
|
|
|
|
|
|
|
cmdAutheliaStorageUserTOTPExportLong = `Perform exports of the TOTP configurations.
|
|
|
|
|
|
|
|
This subcommand allows exporting TOTP configurations to various formats.`
|
|
|
|
|
|
|
|
cmdAutheliaStorageUserTOTPExportExample = `authelia storage user totp export --format csv
|
|
|
|
authelia storage user totp export --format png --dir ./totp-qr
|
|
|
|
authelia storage user totp export --format png --dir ./totp-qr --config config.yml
|
|
|
|
authelia storage user totp export --format png --dir ./totp-qr --encryption-key b3453fde-ecc2-4a1f-9422-2707ddbed495 --postgres.host postgres --postgres.password autheliapw`
|
|
|
|
|
|
|
|
cmdAutheliaStorageSchemaInfoShort = "Show the storage information"
|
|
|
|
|
|
|
|
cmdAutheliaStorageSchemaInfoLong = `Show the storage information.
|
|
|
|
|
|
|
|
This subcommand shows advanced information about the storage schema useful in some diagnostic tasks.`
|
|
|
|
|
|
|
|
cmdAutheliaStorageSchemaInfoExample = `authelia storage schema-info
|
|
|
|
authelia storage schema-info --config config.yml
|
|
|
|
authelia storage schema-info --encryption-key b3453fde-ecc2-4a1f-9422-2707ddbed495 --postgres.host postgres --postgres.password autheliapw`
|
|
|
|
|
|
|
|
cmdAutheliaStorageMigrateShort = "Perform or list migrations"
|
|
|
|
|
|
|
|
cmdAutheliaStorageMigrateLong = `Perform or list migrations.
|
|
|
|
|
|
|
|
This subcommand handles schema migration tasks.`
|
|
|
|
|
|
|
|
cmdAutheliaStorageMigrateExample = `authelia storage migrate --help`
|
|
|
|
|
|
|
|
cmdAutheliaStorageMigrateHistoryShort = "Show migration history"
|
|
|
|
|
|
|
|
cmdAutheliaStorageMigrateHistoryLong = `Show migration history.
|
|
|
|
|
|
|
|
This subcommand allows users to list previous migrations.`
|
|
|
|
|
|
|
|
cmdAutheliaStorageMigrateHistoryExample = `authelia storage migrate history
|
|
|
|
authelia storage migrate history --config config.yml
|
|
|
|
authelia storage migrate history --encryption-key b3453fde-ecc2-4a1f-9422-2707ddbed495 --postgres.host postgres --postgres.password autheliapw`
|
|
|
|
|
|
|
|
cmdAutheliaStorageMigrateListUpShort = "List the up migrations available"
|
|
|
|
|
|
|
|
cmdAutheliaStorageMigrateListUpLong = `List the up migrations available.
|
|
|
|
|
|
|
|
This subcommand lists the schema migrations available in this version of Authelia which are greater than the current
|
|
|
|
schema version of the database.`
|
|
|
|
|
|
|
|
cmdAutheliaStorageMigrateListUpExample = `authelia storage migrate list-up
|
|
|
|
authelia storage migrate list-up --config config.yml
|
|
|
|
authelia storage migrate list-up --encryption-key b3453fde-ecc2-4a1f-9422-2707ddbed495 --postgres.host postgres --postgres.password autheliapw`
|
|
|
|
|
|
|
|
cmdAutheliaStorageMigrateListDownShort = "List the down migrations available"
|
|
|
|
|
|
|
|
cmdAutheliaStorageMigrateListDownLong = `List the down migrations available.
|
|
|
|
|
|
|
|
This subcommand lists the schema migrations available in this version of Authelia which are less than the current
|
|
|
|
schema version of the database.`
|
|
|
|
|
|
|
|
cmdAutheliaStorageMigrateListDownExample = `authelia storage migrate list-down
|
|
|
|
authelia storage migrate list-down --config config.yml
|
|
|
|
authelia storage migrate list-down --encryption-key b3453fde-ecc2-4a1f-9422-2707ddbed495 --postgres.host postgres --postgres.password autheliapw`
|
|
|
|
|
|
|
|
cmdAutheliaStorageMigrateUpShort = "Perform a migration up"
|
|
|
|
|
|
|
|
cmdAutheliaStorageMigrateUpLong = `Perform a migration up.
|
|
|
|
|
|
|
|
This subcommand performs the schema migrations available in this version of Authelia which are greater than the current
|
|
|
|
schema version of the database. By default this will migrate up to the latest available, but you can customize this.`
|
|
|
|
|
|
|
|
cmdAutheliaStorageMigrateUpExample = `authelia storage migrate up
|
|
|
|
authelia storage migrate up --config config.yml
|
|
|
|
authelia storage migrate up --target 20 --config config.yml
|
|
|
|
authelia storage migrate up --encryption-key b3453fde-ecc2-4a1f-9422-2707ddbed495 --postgres.host postgres --postgres.password autheliapw`
|
|
|
|
|
|
|
|
cmdAutheliaStorageMigrateDownShort = "Perform a migration down"
|
|
|
|
|
|
|
|
cmdAutheliaStorageMigrateDownLong = `Perform a migration down.
|
|
|
|
|
|
|
|
This subcommand performs the schema migrations available in this version of Authelia which are less than the current
|
|
|
|
schema version of the database.`
|
|
|
|
|
|
|
|
cmdAutheliaStorageMigrateDownExample = `authelia storage migrate down --target 20
|
|
|
|
authelia storage migrate down --target 20 --config config.yml
|
|
|
|
authelia storage migrate down --target 20 --encryption-key b3453fde-ecc2-4a1f-9422-2707ddbed495 --postgres.host postgres --postgres.password autheliapw`
|
|
|
|
|
|
|
|
cmdAutheliaValidateConfigShort = "Check a configuration against the internal configuration validation mechanisms"
|
|
|
|
|
|
|
|
cmdAutheliaValidateConfigLong = `Check a configuration against the internal configuration validation mechanisms.
|
|
|
|
|
|
|
|
This subcommand allows validation of the YAML and Environment configurations so that a configuration can be checked
|
|
|
|
prior to deploying it.`
|
|
|
|
|
|
|
|
cmdAutheliaValidateConfigExample = `authelia validate-config
|
|
|
|
authelia validate-config --config config.yml`
|
|
|
|
|
|
|
|
cmdAutheliaCertificatesShort = "Commands related to certificate generation"
|
|
|
|
|
|
|
|
cmdAutheliaCertificatesLong = `Commands related to certificate generation.
|
|
|
|
|
|
|
|
This subcommand allows preforming X509 certificate tasks.`
|
|
|
|
|
|
|
|
cmdAutheliaCertificatesExample = `authelia certificates --help`
|
|
|
|
|
|
|
|
cmdAutheliaCertificatesGenerateShort = "Generate a self-signed certificate"
|
|
|
|
|
|
|
|
cmdAutheliaCertificatesGenerateLong = `Generate a self-signed certificate.
|
|
|
|
|
|
|
|
This subcommand allows generating self-signed certificates.`
|
|
|
|
|
|
|
|
cmdAutheliaCertificatesGenerateExample = `authelia certificates generate
|
|
|
|
authelia certificates generate --dir ./out`
|
|
|
|
|
|
|
|
cmdAutheliaRSAShort = "Commands related to rsa keypair generation"
|
|
|
|
|
|
|
|
cmdAutheliaRSALong = `Commands related to rsa keypair generation.
|
|
|
|
|
|
|
|
This subcommand allows performing RSA keypair tasks.`
|
|
|
|
|
|
|
|
cmdAutheliaRSAExample = `authelia rsa --help`
|
|
|
|
|
|
|
|
cmdAutheliaRSAGenerateShort = "Generate a RSA keypair"
|
|
|
|
|
|
|
|
cmdAutheliaRSAGenerateLong = `Generate a RSA keypair.
|
|
|
|
|
|
|
|
This subcommand allows generating an RSA keypair.`
|
|
|
|
|
|
|
|
cmdAutheliaRSAGenerateExample = `authelia rsa generate
|
|
|
|
authelia rsa generate --dir ./out`
|
|
|
|
|
|
|
|
cmdAutheliaHashPasswordShort = "Hash a password to be used in file-based users database."
|
|
|
|
|
|
|
|
cmdAutheliaHashPasswordLong = `Hash a password to be used in file-based users database.`
|
|
|
|
|
|
|
|
//nolint:gosec // This is an example.
|
|
|
|
cmdAutheliaHashPasswordExample = `authelia hash-password -- 'mypass'
|
|
|
|
authelia hash-password --sha512 -- 'mypass'
|
|
|
|
authelia hash-password --iterations=4 -- 'mypass'
|
|
|
|
authelia hash-password --memory=128 -- 'mypass'
|
|
|
|
authelia hash-password --parallelism=1 -- 'mypass'
|
|
|
|
authelia hash-password --key-length=64 -- 'mypass'`
|
|
|
|
)
|
|
|
|
|
2021-11-23 09:45:38 +00:00
|
|
|
const (
|
|
|
|
storageMigrateDirectionUp = "up"
|
|
|
|
storageMigrateDirectionDown = "down"
|
|
|
|
)
|
2021-11-25 01:56:58 +00:00
|
|
|
|
|
|
|
const (
|
2022-06-14 12:40:00 +00:00
|
|
|
storageTOTPExportFormatCSV = "csv"
|
|
|
|
storageTOTPExportFormatURI = "uri"
|
|
|
|
storageTOTPExportFormatPNG = "png"
|
|
|
|
)
|
|
|
|
|
|
|
|
var (
|
|
|
|
validStorageTOTPExportFormats = []string{storageTOTPExportFormatCSV, storageTOTPExportFormatURI, storageTOTPExportFormatPNG}
|
2021-11-25 01:56:58 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
var (
|
|
|
|
errNoStorageProvider = errors.New("no storage provider configured")
|
|
|
|
)
|
2022-04-09 07:13:19 +00:00
|
|
|
|
|
|
|
const (
|
2022-04-25 08:49:18 +00:00
|
|
|
identifierServiceOpenIDConnect = "openid"
|
|
|
|
)
|
|
|
|
|
|
|
|
var (
|
|
|
|
validIdentifierServices = []string{identifierServiceOpenIDConnect}
|
2022-04-09 07:13:19 +00:00
|
|
|
)
|