Merge remote-tracking branch 'origin/master' into feat-settings-ui
Signed-off-by: James Elliott <james-d-elliott@users.noreply.github.com>feat-otp-verification
commit
904b659fcb
|
@ -57,23 +57,28 @@ The following YAML configuration is an example __Authelia__
|
||||||
[Apache Guacamole] which will operate with the above example:
|
[Apache Guacamole] which will operate with the above example:
|
||||||
|
|
||||||
```yaml
|
```yaml
|
||||||
- id: guacamole
|
identity_providers:
|
||||||
description: Apache Guacamole
|
oidc:
|
||||||
secret: '$pbkdf2-sha512$310000$c8p78n7pUMln0jzvd4aK4Q$JNRBzwAo0ek5qKn50cFzzvE9RXV88h1wJn5KGiHrD0YKtZaR/nCb2CJPOsKaPK0hjf.9yHxzQGZziziccp6Yng' # The digest of 'insecure_secret'.
|
## The other portions of the mandatory OpenID Connect 1.0 configuration go here.
|
||||||
public: false
|
## See: https://www.authelia.com/c/oidc
|
||||||
authorization_policy: two_factor
|
clients:
|
||||||
redirect_uris:
|
- id: guacamole
|
||||||
- https://guacamole.example.com
|
description: Apache Guacamole
|
||||||
scopes:
|
secret: '$pbkdf2-sha512$310000$c8p78n7pUMln0jzvd4aK4Q$JNRBzwAo0ek5qKn50cFzzvE9RXV88h1wJn5KGiHrD0YKtZaR/nCb2CJPOsKaPK0hjf.9yHxzQGZziziccp6Yng' # The digest of 'insecure_secret'.
|
||||||
- openid
|
public: false
|
||||||
- profile
|
authorization_policy: two_factor
|
||||||
- groups
|
redirect_uris:
|
||||||
- email
|
- https://guacamole.example.com
|
||||||
response_types:
|
scopes:
|
||||||
- id_token
|
- openid
|
||||||
grant_types:
|
- profile
|
||||||
- implicit
|
- groups
|
||||||
userinfo_signing_algorithm: none
|
- email
|
||||||
|
response_types:
|
||||||
|
- id_token
|
||||||
|
grant_types:
|
||||||
|
- implicit
|
||||||
|
userinfo_signing_algorithm: none
|
||||||
```
|
```
|
||||||
|
|
||||||
## See Also
|
## See Also
|
||||||
|
|
|
@ -60,32 +60,37 @@ The following YAML configuration is an example __Authelia__
|
||||||
which will operate with the above example:
|
which will operate with the above example:
|
||||||
|
|
||||||
```yaml
|
```yaml
|
||||||
- id: argocd
|
identity_providers:
|
||||||
description: Argo CD
|
oidc:
|
||||||
secret: '$pbkdf2-sha512$310000$c8p78n7pUMln0jzvd4aK4Q$JNRBzwAo0ek5qKn50cFzzvE9RXV88h1wJn5KGiHrD0YKtZaR/nCb2CJPOsKaPK0hjf.9yHxzQGZziziccp6Yng' # The digest of 'insecure_secret'.
|
## The other portions of the mandatory OpenID Connect 1.0 configuration go here.
|
||||||
public: false
|
## See: https://www.authelia.com/c/oidc
|
||||||
authorization_policy: two_factor
|
clients:
|
||||||
redirect_uris:
|
- id: argocd
|
||||||
- https://argocd.example.com/auth/callback
|
description: Argo CD
|
||||||
scopes:
|
secret: '$pbkdf2-sha512$310000$c8p78n7pUMln0jzvd4aK4Q$JNRBzwAo0ek5qKn50cFzzvE9RXV88h1wJn5KGiHrD0YKtZaR/nCb2CJPOsKaPK0hjf.9yHxzQGZziziccp6Yng' # The digest of 'insecure_secret'.
|
||||||
- openid
|
public: false
|
||||||
- groups
|
authorization_policy: two_factor
|
||||||
- email
|
redirect_uris:
|
||||||
- profile
|
- https://argocd.example.com/auth/callback
|
||||||
userinfo_signing_algorithm: none
|
scopes:
|
||||||
- id: argocd-cli
|
- openid
|
||||||
description: Argo CD (CLI)
|
- groups
|
||||||
public: true
|
- email
|
||||||
authorization_policy: two_factor
|
- profile
|
||||||
redirect_uris:
|
userinfo_signing_algorithm: none
|
||||||
- http://localhost:8085/auth/callback
|
- id: argocd-cli
|
||||||
scopes:
|
description: Argo CD (CLI)
|
||||||
- openid
|
public: true
|
||||||
- groups
|
authorization_policy: two_factor
|
||||||
- email
|
redirect_uris:
|
||||||
- profile
|
- http://localhost:8085/auth/callback
|
||||||
- offline_access
|
scopes:
|
||||||
userinfo_signing_algorithm: none
|
- openid
|
||||||
|
- groups
|
||||||
|
- email
|
||||||
|
- profile
|
||||||
|
- offline_access
|
||||||
|
userinfo_signing_algorithm: none
|
||||||
```
|
```
|
||||||
|
|
||||||
## See Also
|
## See Also
|
||||||
|
|
|
@ -62,18 +62,23 @@ The following YAML configuration is an example __Authelia__
|
||||||
which will operate with the above example:
|
which will operate with the above example:
|
||||||
|
|
||||||
```yaml
|
```yaml
|
||||||
- id: bookstack
|
identity_providers:
|
||||||
description: BookStack
|
oidc:
|
||||||
secret: '$pbkdf2-sha512$310000$c8p78n7pUMln0jzvd4aK4Q$JNRBzwAo0ek5qKn50cFzzvE9RXV88h1wJn5KGiHrD0YKtZaR/nCb2CJPOsKaPK0hjf.9yHxzQGZziziccp6Yng' # The digest of 'insecure_secret'.
|
## The other portions of the mandatory OpenID Connect 1.0 configuration go here.
|
||||||
public: false
|
## See: https://www.authelia.com/c/oidc
|
||||||
authorization_policy: two_factor
|
clients:
|
||||||
redirect_uris:
|
- id: bookstack
|
||||||
- https://bookstack.example.com/oidc/callback
|
description: BookStack
|
||||||
scopes:
|
secret: '$pbkdf2-sha512$310000$c8p78n7pUMln0jzvd4aK4Q$JNRBzwAo0ek5qKn50cFzzvE9RXV88h1wJn5KGiHrD0YKtZaR/nCb2CJPOsKaPK0hjf.9yHxzQGZziziccp6Yng' # The digest of 'insecure_secret'.
|
||||||
- openid
|
public: false
|
||||||
- profile
|
authorization_policy: two_factor
|
||||||
- email
|
redirect_uris:
|
||||||
userinfo_signing_algorithm: none
|
- https://bookstack.example.com/oidc/callback
|
||||||
|
scopes:
|
||||||
|
- openid
|
||||||
|
- profile
|
||||||
|
- email
|
||||||
|
userinfo_signing_algorithm: none
|
||||||
```
|
```
|
||||||
|
|
||||||
## See Also
|
## See Also
|
||||||
|
|
|
@ -70,18 +70,23 @@ The following YAML configuration is an example __Authelia__
|
||||||
which will operate with the above example:
|
which will operate with the above example:
|
||||||
|
|
||||||
```yaml
|
```yaml
|
||||||
- id: cloudflare
|
identity_providers:
|
||||||
description: Cloudflare ZeroTrust
|
oidc:
|
||||||
secret: '$pbkdf2-sha512$310000$c8p78n7pUMln0jzvd4aK4Q$JNRBzwAo0ek5qKn50cFzzvE9RXV88h1wJn5KGiHrD0YKtZaR/nCb2CJPOsKaPK0hjf.9yHxzQGZziziccp6Yng' # The digest of 'insecure_secret'.
|
## The other portions of the mandatory OpenID Connect 1.0 configuration go here.
|
||||||
public: false
|
## See: https://www.authelia.com/c/oidc
|
||||||
authorization_policy: two_factor
|
clients:
|
||||||
redirect_uris:
|
- id: cloudflare
|
||||||
- https://example-team.cloudflareaccess.com/cdn-cgi/access/callback
|
description: Cloudflare ZeroTrust
|
||||||
scopes:
|
secret: '$pbkdf2-sha512$310000$c8p78n7pUMln0jzvd4aK4Q$JNRBzwAo0ek5qKn50cFzzvE9RXV88h1wJn5KGiHrD0YKtZaR/nCb2CJPOsKaPK0hjf.9yHxzQGZziziccp6Yng' # The digest of 'insecure_secret'.
|
||||||
- openid
|
public: false
|
||||||
- profile
|
authorization_policy: two_factor
|
||||||
- email
|
redirect_uris:
|
||||||
userinfo_signing_algorithm: none
|
- https://example-team.cloudflareaccess.com/cdn-cgi/access/callback
|
||||||
|
scopes:
|
||||||
|
- openid
|
||||||
|
- profile
|
||||||
|
- email
|
||||||
|
userinfo_signing_algorithm: none
|
||||||
```
|
```
|
||||||
|
|
||||||
## See Also
|
## See Also
|
||||||
|
|
|
@ -71,20 +71,25 @@ The following YAML configuration is an example __Authelia__
|
||||||
will operate with the above example:
|
will operate with the above example:
|
||||||
|
|
||||||
```yaml
|
```yaml
|
||||||
- id: firezone
|
identity_providers:
|
||||||
description: Firezone
|
oidc:
|
||||||
secret: '$pbkdf2-sha512$310000$c8p78n7pUMln0jzvd4aK4Q$JNRBzwAo0ek5qKn50cFzzvE9RXV88h1wJn5KGiHrD0YKtZaR/nCb2CJPOsKaPK0hjf.9yHxzQGZziziccp6Yng' # The digest of 'insecure_secret'.
|
## The other portions of the mandatory OpenID Connect 1.0 configuration go here.
|
||||||
public: false
|
## See: https://www.authelia.com/c/oidc
|
||||||
authorization_policy: two_factor
|
clients:
|
||||||
enforce_pkce: true
|
- id: firezone
|
||||||
pkce_challenge_method: S256
|
description: Firezone
|
||||||
redirect_uris:
|
secret: '$pbkdf2-sha512$310000$c8p78n7pUMln0jzvd4aK4Q$JNRBzwAo0ek5qKn50cFzzvE9RXV88h1wJn5KGiHrD0YKtZaR/nCb2CJPOsKaPK0hjf.9yHxzQGZziziccp6Yng' # The digest of 'insecure_secret'.
|
||||||
- https://firezone.example.com/auth/oidc/authelia/callback
|
public: false
|
||||||
scopes:
|
authorization_policy: two_factor
|
||||||
- openid
|
enforce_pkce: true
|
||||||
- email
|
pkce_challenge_method: S256
|
||||||
- profile
|
redirect_uris:
|
||||||
userinfo_signing_algorithm: none
|
- https://firezone.example.com/auth/oidc/authelia/callback
|
||||||
|
scopes:
|
||||||
|
- openid
|
||||||
|
- email
|
||||||
|
- profile
|
||||||
|
userinfo_signing_algorithm: none
|
||||||
```
|
```
|
||||||
|
|
||||||
## See Also
|
## See Also
|
||||||
|
|
|
@ -81,25 +81,30 @@ The following YAML configuration is an example __Authelia__
|
||||||
will operate with the above example:
|
will operate with the above example:
|
||||||
|
|
||||||
```yaml
|
```yaml
|
||||||
- id: gitea
|
identity_providers:
|
||||||
description: Gitea
|
oidc:
|
||||||
secret: '$pbkdf2-sha512$310000$c8p78n7pUMln0jzvd4aK4Q$JNRBzwAo0ek5qKn50cFzzvE9RXV88h1wJn5KGiHrD0YKtZaR/nCb2CJPOsKaPK0hjf.9yHxzQGZziziccp6Yng' # The digest of 'insecure_secret'.
|
## The other portions of the mandatory OpenID Connect 1.0 configuration go here.
|
||||||
public: false
|
## See: https://www.authelia.com/c/oidc
|
||||||
authorization_policy: two_factor
|
clients:
|
||||||
redirect_uris:
|
- id: gitea
|
||||||
- https://gitea.example.com/user/oauth2/authelia/callback
|
description: Gitea
|
||||||
scopes:
|
secret: '$pbkdf2-sha512$310000$c8p78n7pUMln0jzvd4aK4Q$JNRBzwAo0ek5qKn50cFzzvE9RXV88h1wJn5KGiHrD0YKtZaR/nCb2CJPOsKaPK0hjf.9yHxzQGZziziccp6Yng' # The digest of 'insecure_secret'.
|
||||||
- openid
|
public: false
|
||||||
- email
|
authorization_policy: two_factor
|
||||||
- profile
|
redirect_uris:
|
||||||
userinfo_signing_algorithm: none
|
- https://gitea.example.com/user/oauth2/authelia/callback
|
||||||
|
scopes:
|
||||||
|
- openid
|
||||||
|
- email
|
||||||
|
- profile
|
||||||
|
userinfo_signing_algorithm: none
|
||||||
```
|
```
|
||||||
|
|
||||||
## See Also
|
## See Also
|
||||||
|
|
||||||
- [Gitea] app.ini [Config Cheat Sheet - OpenID](https://docs.gitea.io/en-us/config-cheat-sheet/#openid-openid)
|
- [Gitea] app.ini [Config Cheat Sheet](https://docs.gitea.io/en-us/config-cheat-sheet):
|
||||||
- [Gitea] app.ini [Config Cheat Sheet - Service](https://docs.gitea.io/en-us/config-cheat-sheet/#service-service)
|
- [OpenID](https://docs.gitea.io/en-us/config-cheat-sheet/#openid-openid)
|
||||||
|
- [Service](https://docs.gitea.io/en-us/config-cheat-sheet/#service-service)
|
||||||
|
|
||||||
- [Authelia]: https://www.authelia.com
|
|
||||||
[Gitea]: https://gitea.io/
|
[Gitea]: https://gitea.io/
|
||||||
[OpenID Connect 1.0]: ../../openid-connect/introduction.md
|
[OpenID Connect 1.0]: ../../openid-connect/introduction.md
|
||||||
|
|
|
@ -73,19 +73,24 @@ The following YAML configuration is an example __Authelia__
|
||||||
which will operate with the above example:
|
which will operate with the above example:
|
||||||
|
|
||||||
```yaml
|
```yaml
|
||||||
- id: gitlab
|
identity_providers:
|
||||||
description: GitLab
|
oidc:
|
||||||
secret: '$pbkdf2-sha512$310000$c8p78n7pUMln0jzvd4aK4Q$JNRBzwAo0ek5qKn50cFzzvE9RXV88h1wJn5KGiHrD0YKtZaR/nCb2CJPOsKaPK0hjf.9yHxzQGZziziccp6Yng' # The digest of 'insecure_secret'.
|
## The other portions of the mandatory OpenID Connect 1.0 configuration go here.
|
||||||
public: false
|
## See: https://www.authelia.com/c/oidc
|
||||||
authorization_policy: two_factor
|
clients:
|
||||||
redirect_uris:
|
- id: gitlab
|
||||||
- https://gitlab.example.com/users/auth/openid_connect/callback
|
description: GitLab
|
||||||
scopes:
|
secret: '$pbkdf2-sha512$310000$c8p78n7pUMln0jzvd4aK4Q$JNRBzwAo0ek5qKn50cFzzvE9RXV88h1wJn5KGiHrD0YKtZaR/nCb2CJPOsKaPK0hjf.9yHxzQGZziziccp6Yng' # The digest of 'insecure_secret'.
|
||||||
- openid
|
public: false
|
||||||
- profile
|
authorization_policy: two_factor
|
||||||
- groups
|
redirect_uris:
|
||||||
- email
|
- https://gitlab.example.com/users/auth/openid_connect/callback
|
||||||
userinfo_signing_algorithm: none
|
scopes:
|
||||||
|
- openid
|
||||||
|
- profile
|
||||||
|
- groups
|
||||||
|
- email
|
||||||
|
userinfo_signing_algorithm: none
|
||||||
```
|
```
|
||||||
|
|
||||||
## See Also
|
## See Also
|
||||||
|
|
|
@ -91,19 +91,24 @@ The following YAML configuration is an example __Authelia__
|
||||||
which will operate with the above example:
|
which will operate with the above example:
|
||||||
|
|
||||||
```yaml
|
```yaml
|
||||||
- id: grafana
|
identity_providers:
|
||||||
description: Grafana
|
oidc:
|
||||||
secret: '$pbkdf2-sha512$310000$c8p78n7pUMln0jzvd4aK4Q$JNRBzwAo0ek5qKn50cFzzvE9RXV88h1wJn5KGiHrD0YKtZaR/nCb2CJPOsKaPK0hjf.9yHxzQGZziziccp6Yng' # The digest of 'insecure_secret'.
|
## The other portions of the mandatory OpenID Connect 1.0 configuration go here.
|
||||||
public: false
|
## See: https://www.authelia.com/c/oidc
|
||||||
authorization_policy: two_factor
|
clients:
|
||||||
redirect_uris:
|
- id: grafana
|
||||||
- https://grafana.example.com/login/generic_oauth
|
description: Grafana
|
||||||
scopes:
|
secret: '$pbkdf2-sha512$310000$c8p78n7pUMln0jzvd4aK4Q$JNRBzwAo0ek5qKn50cFzzvE9RXV88h1wJn5KGiHrD0YKtZaR/nCb2CJPOsKaPK0hjf.9yHxzQGZziziccp6Yng' # The digest of 'insecure_secret'.
|
||||||
- openid
|
public: false
|
||||||
- profile
|
authorization_policy: two_factor
|
||||||
- groups
|
redirect_uris:
|
||||||
- email
|
- https://grafana.example.com/login/generic_oauth
|
||||||
userinfo_signing_algorithm: none
|
scopes:
|
||||||
|
- openid
|
||||||
|
- profile
|
||||||
|
- groups
|
||||||
|
- email
|
||||||
|
userinfo_signing_algorithm: none
|
||||||
```
|
```
|
||||||
|
|
||||||
## See Also
|
## See Also
|
||||||
|
|
|
@ -64,19 +64,24 @@ The following YAML configuration is an example __Authelia__
|
||||||
which will operate with the above example:
|
which will operate with the above example:
|
||||||
|
|
||||||
```yaml
|
```yaml
|
||||||
- id: harbor
|
identity_providers:
|
||||||
description: Harbor
|
oidc:
|
||||||
secret: '$pbkdf2-sha512$310000$c8p78n7pUMln0jzvd4aK4Q$JNRBzwAo0ek5qKn50cFzzvE9RXV88h1wJn5KGiHrD0YKtZaR/nCb2CJPOsKaPK0hjf.9yHxzQGZziziccp6Yng' # The digest of 'insecure_secret'.
|
## The other portions of the mandatory OpenID Connect 1.0 configuration go here.
|
||||||
public: false
|
## See: https://www.authelia.com/c/oidc
|
||||||
authorization_policy: two_factor
|
clients:
|
||||||
redirect_uris:
|
- id: harbor
|
||||||
- https://harbor.example.com/c/oidc/callback
|
description: Harbor
|
||||||
scopes:
|
secret: '$pbkdf2-sha512$310000$c8p78n7pUMln0jzvd4aK4Q$JNRBzwAo0ek5qKn50cFzzvE9RXV88h1wJn5KGiHrD0YKtZaR/nCb2CJPOsKaPK0hjf.9yHxzQGZziziccp6Yng' # The digest of 'insecure_secret'.
|
||||||
- openid
|
public: false
|
||||||
- profile
|
authorization_policy: two_factor
|
||||||
- groups
|
redirect_uris:
|
||||||
- email
|
- https://harbor.example.com/c/oidc/callback
|
||||||
userinfo_signing_algorithm: none
|
scopes:
|
||||||
|
- openid
|
||||||
|
- profile
|
||||||
|
- groups
|
||||||
|
- email
|
||||||
|
userinfo_signing_algorithm: none
|
||||||
```
|
```
|
||||||
|
|
||||||
## See Also
|
## See Also
|
||||||
|
|
|
@ -47,20 +47,25 @@ The following YAML configuration is an example __Authelia__
|
||||||
which will operate with the above example:
|
which will operate with the above example:
|
||||||
|
|
||||||
```yaml
|
```yaml
|
||||||
- id: vault
|
identity_providers:
|
||||||
description: HashiCorp Vault
|
oidc:
|
||||||
secret: '$pbkdf2-sha512$310000$c8p78n7pUMln0jzvd4aK4Q$JNRBzwAo0ek5qKn50cFzzvE9RXV88h1wJn5KGiHrD0YKtZaR/nCb2CJPOsKaPK0hjf.9yHxzQGZziziccp6Yng' # The digest of 'insecure_secret'.
|
## The other portions of the mandatory OpenID Connect 1.0 configuration go here.
|
||||||
public: false
|
## See: https://www.authelia.com/c/oidc
|
||||||
authorization_policy: two_factor
|
clients:
|
||||||
redirect_uris:
|
- id: vault
|
||||||
- https://vault.example.com/oidc/callback
|
description: HashiCorp Vault
|
||||||
- https://vault.example.com/ui/vault/auth/oidc/oidc/callback
|
secret: '$pbkdf2-sha512$310000$c8p78n7pUMln0jzvd4aK4Q$JNRBzwAo0ek5qKn50cFzzvE9RXV88h1wJn5KGiHrD0YKtZaR/nCb2CJPOsKaPK0hjf.9yHxzQGZziziccp6Yng' # The digest of 'insecure_secret'.
|
||||||
scopes:
|
public: false
|
||||||
- openid
|
authorization_policy: two_factor
|
||||||
- profile
|
redirect_uris:
|
||||||
- groups
|
- https://vault.example.com/oidc/callback
|
||||||
- email
|
- https://vault.example.com/ui/vault/auth/oidc/oidc/callback
|
||||||
userinfo_signing_algorithm: none
|
scopes:
|
||||||
|
- openid
|
||||||
|
- profile
|
||||||
|
- groups
|
||||||
|
- email
|
||||||
|
userinfo_signing_algorithm: none
|
||||||
```
|
```
|
||||||
|
|
||||||
## See Also
|
## See Also
|
||||||
|
|
|
@ -69,20 +69,25 @@ The following YAML configuration is an example __Authelia__
|
||||||
which will operate with the above example:
|
which will operate with the above example:
|
||||||
|
|
||||||
```yaml
|
```yaml
|
||||||
- id: komga
|
identity_providers:
|
||||||
description: Komga
|
oidc:
|
||||||
secret: '$pbkdf2-sha512$310000$c8p78n7pUMln0jzvd4aK4Q$JNRBzwAo0ek5qKn50cFzzvE9RXV88h1wJn5KGiHrD0YKtZaR/nCb2CJPOsKaPK0hjf.9yHxzQGZziziccp6Yng' # The digest of 'insecure_secret'.
|
## The other portions of the mandatory OpenID Connect 1.0 configuration go here.
|
||||||
public: false
|
## See: https://www.authelia.com/c/oidc
|
||||||
authorization_policy: two_factor
|
clients:
|
||||||
redirect_uris:
|
- id: komga
|
||||||
- https://komga.example.com/login/oauth2/code/authelia
|
description: Komga
|
||||||
scopes:
|
secret: '$pbkdf2-sha512$310000$c8p78n7pUMln0jzvd4aK4Q$JNRBzwAo0ek5qKn50cFzzvE9RXV88h1wJn5KGiHrD0YKtZaR/nCb2CJPOsKaPK0hjf.9yHxzQGZziziccp6Yng' # The digest of 'insecure_secret'.
|
||||||
- openid
|
public: false
|
||||||
- profile
|
authorization_policy: two_factor
|
||||||
- email
|
redirect_uris:
|
||||||
grant_types:
|
- https://komga.example.com/login/oauth2/code/authelia
|
||||||
- authorization_code
|
scopes:
|
||||||
userinfo_signing_algorithm: none
|
- openid
|
||||||
|
- profile
|
||||||
|
- email
|
||||||
|
grant_types:
|
||||||
|
- authorization_code
|
||||||
|
userinfo_signing_algorithm: none
|
||||||
```
|
```
|
||||||
|
|
||||||
## See Also
|
## See Also
|
||||||
|
|
|
@ -67,19 +67,24 @@ The following YAML configuration is an example __Authelia__
|
||||||
which will operate with the above example:
|
which will operate with the above example:
|
||||||
|
|
||||||
```yaml
|
```yaml
|
||||||
- id: minio
|
identity_providers:
|
||||||
description: MinIO
|
oidc:
|
||||||
secret: '$pbkdf2-sha512$310000$c8p78n7pUMln0jzvd4aK4Q$JNRBzwAo0ek5qKn50cFzzvE9RXV88h1wJn5KGiHrD0YKtZaR/nCb2CJPOsKaPK0hjf.9yHxzQGZziziccp6Yng' # The digest of 'insecure_secret'.
|
## The other portions of the mandatory OpenID Connect 1.0 configuration go here.
|
||||||
public: false
|
## See: https://www.authelia.com/c/oidc
|
||||||
authorization_policy: two_factor
|
clients:
|
||||||
redirect_uris:
|
- id: minio
|
||||||
- https://minio.example.com/apps/oidc_login/oidc
|
description: MinIO
|
||||||
scopes:
|
secret: '$pbkdf2-sha512$310000$c8p78n7pUMln0jzvd4aK4Q$JNRBzwAo0ek5qKn50cFzzvE9RXV88h1wJn5KGiHrD0YKtZaR/nCb2CJPOsKaPK0hjf.9yHxzQGZziziccp6Yng' # The digest of 'insecure_secret'.
|
||||||
- openid
|
public: false
|
||||||
- profile
|
authorization_policy: two_factor
|
||||||
- email
|
redirect_uris:
|
||||||
- groups
|
- https://minio.example.com/apps/oidc_login/oidc
|
||||||
userinfo_signing_algorithm: none
|
scopes:
|
||||||
|
- openid
|
||||||
|
- profile
|
||||||
|
- email
|
||||||
|
- groups
|
||||||
|
userinfo_signing_algorithm: none
|
||||||
```
|
```
|
||||||
|
|
||||||
## See Also
|
## See Also
|
||||||
|
|
|
@ -15,10 +15,10 @@ community: true
|
||||||
|
|
||||||
## Tested Versions
|
## Tested Versions
|
||||||
|
|
||||||
- [Authelia](https://www.authelia.com)
|
* [Authelia](https://www.authelia.com)
|
||||||
- [v4.37.5](https://github.com/authelia/authelia/releases/tag/v4.37.5)
|
* [v4.37.5](https://github.com/authelia/authelia/releases/tag/v4.37.5)
|
||||||
- [Misago](https://github.com/rafalp/Misago)
|
* [Misago](https://github.com/rafalp/Misago)
|
||||||
- [misago-image v0.29.1](https://github.com/tetricky/misago-image/releases/tag/v0.29.1)
|
* [misago-image v0.29.1](https://github.com/tetricky/misago-image/releases/tag/v0.29.1)
|
||||||
|
|
||||||
## Before You Begin
|
## Before You Begin
|
||||||
|
|
||||||
|
@ -82,24 +82,28 @@ To configure [Misago] to utilize Authelia as an [OpenID Connect 1.0](https://www
|
||||||
The following YAML configuration is an example **Authelia** [client configuration](https://www.authelia.com/configuration/identity-providers/open-id-connect/#clients) for use with [Misago] which will operate with the above example:
|
The following YAML configuration is an example **Authelia** [client configuration](https://www.authelia.com/configuration/identity-providers/open-id-connect/#clients) for use with [Misago] which will operate with the above example:
|
||||||
|
|
||||||
```yaml
|
```yaml
|
||||||
|
identity_providers:
|
||||||
|
oidc:
|
||||||
|
## The other portions of the mandatory OpenID Connect 1.0 configuration go here.
|
||||||
|
## See: https://www.authelia.com/c/oidc
|
||||||
clients:
|
clients:
|
||||||
- id: misago
|
- id: misago
|
||||||
secret: '$pbkdf2-sha512$310000$c8p78n7pUMln0jzvd4aK4Q$JNRBzwAo0ek5qKn50cFzzvE9RXV88h1wJn5KGiHrD0YKtZaR/nCb2CJPOsKaPK0hjf.9yHxzQGZziziccp6Yng' # The digest of 'insecure_secret'.
|
secret: '$pbkdf2-sha512$310000$c8p78n7pUMln0jzvd4aK4Q$JNRBzwAo0ek5qKn50cFzzvE9RXV88h1wJn5KGiHrD0YKtZaR/nCb2CJPOsKaPK0hjf.9yHxzQGZziziccp6Yng' # The digest of 'insecure_secret'.
|
||||||
public: false
|
public: false
|
||||||
authorization_policy: two_factor
|
authorization_policy: two_factor
|
||||||
scopes:
|
scopes:
|
||||||
- openid
|
- openid
|
||||||
- profile
|
- profile
|
||||||
- email
|
- email
|
||||||
redirect_uris:
|
redirect_uris:
|
||||||
- https://misago.example.com/oauth2/complete/
|
- https://misago.example.com/oauth2/complete/
|
||||||
grant_types:
|
grant_types:
|
||||||
- authorization_code
|
- authorization_code
|
||||||
response_types:
|
response_types:
|
||||||
- code
|
- code
|
||||||
response_modes:
|
response_modes:
|
||||||
- query
|
- query
|
||||||
userinfo_signing_algorithm: none
|
userinfo_signing_algorithm: none
|
||||||
```
|
```
|
||||||
|
|
||||||
---
|
---
|
||||||
|
|
|
@ -85,19 +85,24 @@ The following YAML configuration is an example __Authelia__
|
||||||
which will operate with the above example:
|
which will operate with the above example:
|
||||||
|
|
||||||
```yaml
|
```yaml
|
||||||
- id: nextcloud
|
identity_providers:
|
||||||
description: NextCloud
|
oidc:
|
||||||
secret: '$pbkdf2-sha512$310000$c8p78n7pUMln0jzvd4aK4Q$JNRBzwAo0ek5qKn50cFzzvE9RXV88h1wJn5KGiHrD0YKtZaR/nCb2CJPOsKaPK0hjf.9yHxzQGZziziccp6Yng' # The digest of 'insecure_secret'.
|
## The other portions of the mandatory OpenID Connect 1.0 configuration go here.
|
||||||
public: false
|
## See: https://www.authelia.com/c/oidc
|
||||||
authorization_policy: two_factor
|
clients:
|
||||||
redirect_uris:
|
- id: nextcloud
|
||||||
- https://nextcloud.example.com/apps/oidc_login/oidc
|
description: NextCloud
|
||||||
scopes:
|
secret: '$pbkdf2-sha512$310000$c8p78n7pUMln0jzvd4aK4Q$JNRBzwAo0ek5qKn50cFzzvE9RXV88h1wJn5KGiHrD0YKtZaR/nCb2CJPOsKaPK0hjf.9yHxzQGZziziccp6Yng' # The digest of 'insecure_secret'.
|
||||||
- openid
|
public: false
|
||||||
- profile
|
authorization_policy: two_factor
|
||||||
- email
|
redirect_uris:
|
||||||
- groups
|
- https://nextcloud.example.com/apps/oidc_login/oidc
|
||||||
userinfo_signing_algorithm: none
|
scopes:
|
||||||
|
- openid
|
||||||
|
- profile
|
||||||
|
- email
|
||||||
|
- groups
|
||||||
|
userinfo_signing_algorithm: none
|
||||||
```
|
```
|
||||||
|
|
||||||
## See Also
|
## See Also
|
||||||
|
|
|
@ -64,19 +64,24 @@ The following YAML configuration is an example __Authelia__
|
||||||
which will operate with the above example:
|
which will operate with the above example:
|
||||||
|
|
||||||
```yaml
|
```yaml
|
||||||
- id: outline
|
identity_providers:
|
||||||
description: Outline
|
oidc:
|
||||||
secret: '$pbkdf2-sha512$310000$c8p78n7pUMln0jzvd4aK4Q$JNRBzwAo0ek5qKn50cFzzvE9RXV88h1wJn5KGiHrD0YKtZaR/nCb2CJPOsKaPK0hjf.9yHxzQGZziziccp6Yng' # The digest of 'insecure_secret'.
|
## The other portions of the mandatory OpenID Connect 1.0 configuration go here.
|
||||||
public: false
|
## See: https://www.authelia.com/c/oidc
|
||||||
authorization_policy: two_factor
|
clients:
|
||||||
redirect_uris:
|
- id: outline
|
||||||
- https://outline.example.com/auth/oidc.callback
|
description: Outline
|
||||||
scopes:
|
secret: '$pbkdf2-sha512$310000$c8p78n7pUMln0jzvd4aK4Q$JNRBzwAo0ek5qKn50cFzzvE9RXV88h1wJn5KGiHrD0YKtZaR/nCb2CJPOsKaPK0hjf.9yHxzQGZziziccp6Yng' # The digest of 'insecure_secret'.
|
||||||
- openid
|
public: false
|
||||||
- offline_access
|
authorization_policy: two_factor
|
||||||
- profile
|
redirect_uris:
|
||||||
- email
|
- https://outline.example.com/auth/oidc.callback
|
||||||
userinfo_signing_algorithm: none
|
scopes:
|
||||||
|
- openid
|
||||||
|
- offline_access
|
||||||
|
- profile
|
||||||
|
- email
|
||||||
|
userinfo_signing_algorithm: none
|
||||||
```
|
```
|
||||||
|
|
||||||
## See Also
|
## See Also
|
||||||
|
|
|
@ -65,19 +65,24 @@ The following YAML configuration is an example __Authelia__
|
||||||
which will operate with the above example:
|
which will operate with the above example:
|
||||||
|
|
||||||
```yaml
|
```yaml
|
||||||
- id: portainer
|
identity_providers:
|
||||||
description: Portainer
|
oidc:
|
||||||
secret: '$pbkdf2-sha512$310000$c8p78n7pUMln0jzvd4aK4Q$JNRBzwAo0ek5qKn50cFzzvE9RXV88h1wJn5KGiHrD0YKtZaR/nCb2CJPOsKaPK0hjf.9yHxzQGZziziccp6Yng' # The digest of 'insecure_secret'.
|
## The other portions of the mandatory OpenID Connect 1.0 configuration go here.
|
||||||
public: false
|
## See: https://www.authelia.com/c/oidc
|
||||||
authorization_policy: two_factor
|
clients:
|
||||||
redirect_uris:
|
- id: portainer
|
||||||
- https://portainer.example.com
|
description: Portainer
|
||||||
scopes:
|
secret: '$pbkdf2-sha512$310000$c8p78n7pUMln0jzvd4aK4Q$JNRBzwAo0ek5qKn50cFzzvE9RXV88h1wJn5KGiHrD0YKtZaR/nCb2CJPOsKaPK0hjf.9yHxzQGZziziccp6Yng' # The digest of 'insecure_secret'.
|
||||||
- openid
|
public: false
|
||||||
- profile
|
authorization_policy: two_factor
|
||||||
- groups
|
redirect_uris:
|
||||||
- email
|
- https://portainer.example.com
|
||||||
userinfo_signing_algorithm: none
|
scopes:
|
||||||
|
- openid
|
||||||
|
- profile
|
||||||
|
- groups
|
||||||
|
- email
|
||||||
|
userinfo_signing_algorithm: none
|
||||||
```
|
```
|
||||||
|
|
||||||
## See Also
|
## See Also
|
||||||
|
|
|
@ -22,14 +22,9 @@ aliases:
|
||||||
* [Proxmox]
|
* [Proxmox]
|
||||||
* 7.1-10
|
* 7.1-10
|
||||||
|
|
||||||
### Common Notes
|
## Before You Begin
|
||||||
|
|
||||||
1. You are *__required__* to utilize a unique client id for every client.
|
{{% oidc-common %}}
|
||||||
2. The client id on this page is merely an example and you can theoretically use any alphanumeric string.
|
|
||||||
3. You *__should not__* use the client secret in this example, We *__strongly recommend__* reading the
|
|
||||||
[Generating Client Secrets] guide instead.
|
|
||||||
|
|
||||||
[Generating Client Secrets]: ../specific-information.md#generating-client-secrets
|
|
||||||
|
|
||||||
### Specific Notes
|
### Specific Notes
|
||||||
|
|
||||||
|
@ -74,18 +69,23 @@ The following YAML configuration is an example __Authelia__
|
||||||
which will operate with the above example:
|
which will operate with the above example:
|
||||||
|
|
||||||
```yaml
|
```yaml
|
||||||
- id: proxmox
|
identity_providers:
|
||||||
description: Proxmox
|
oidc:
|
||||||
secret: '$pbkdf2-sha512$310000$c8p78n7pUMln0jzvd4aK4Q$JNRBzwAo0ek5qKn50cFzzvE9RXV88h1wJn5KGiHrD0YKtZaR/nCb2CJPOsKaPK0hjf.9yHxzQGZziziccp6Yng' # The digest of 'insecure_secret'.
|
## The other portions of the mandatory OpenID Connect 1.0 configuration go here.
|
||||||
public: false
|
## See: https://www.authelia.com/c/oidc
|
||||||
authorization_policy: two_factor
|
clients:
|
||||||
redirect_uris:
|
- id: proxmox
|
||||||
- https://proxmox.example.com
|
description: Proxmox
|
||||||
scopes:
|
secret: '$pbkdf2-sha512$310000$c8p78n7pUMln0jzvd4aK4Q$JNRBzwAo0ek5qKn50cFzzvE9RXV88h1wJn5KGiHrD0YKtZaR/nCb2CJPOsKaPK0hjf.9yHxzQGZziziccp6Yng' # The digest of 'insecure_secret'.
|
||||||
- openid
|
public: false
|
||||||
- profile
|
authorization_policy: two_factor
|
||||||
- email
|
redirect_uris:
|
||||||
userinfo_signing_algorithm: none
|
- https://proxmox.example.com
|
||||||
|
scopes:
|
||||||
|
- openid
|
||||||
|
- profile
|
||||||
|
- email
|
||||||
|
userinfo_signing_algorithm: none
|
||||||
```
|
```
|
||||||
|
|
||||||
## See Also
|
## See Also
|
||||||
|
|
|
@ -73,18 +73,23 @@ The following YAML configuration is an example __Authelia__
|
||||||
which will operate with the above example:
|
which will operate with the above example:
|
||||||
|
|
||||||
```yaml
|
```yaml
|
||||||
- id: seafile
|
identity_providers:
|
||||||
description: Seafile
|
oidc:
|
||||||
secret: '$pbkdf2-sha512$310000$c8p78n7pUMln0jzvd4aK4Q$JNRBzwAo0ek5qKn50cFzzvE9RXV88h1wJn5KGiHrD0YKtZaR/nCb2CJPOsKaPK0hjf.9yHxzQGZziziccp6Yng' # The digest of 'insecure_secret'.
|
## The other portions of the mandatory OpenID Connect 1.0 configuration go here.
|
||||||
public: false
|
## See: https://www.authelia.com/c/oidc
|
||||||
authorization_policy: two_factor
|
clients:
|
||||||
redirect_uris:
|
- id: seafile
|
||||||
- https://seafile.example.com/oauth/callback/
|
description: Seafile
|
||||||
scopes:
|
secret: '$pbkdf2-sha512$310000$c8p78n7pUMln0jzvd4aK4Q$JNRBzwAo0ek5qKn50cFzzvE9RXV88h1wJn5KGiHrD0YKtZaR/nCb2CJPOsKaPK0hjf.9yHxzQGZziziccp6Yng' # The digest of 'insecure_secret'.
|
||||||
- openid
|
public: false
|
||||||
- profile
|
authorization_policy: two_factor
|
||||||
- email
|
redirect_uris:
|
||||||
userinfo_signing_algorithm: none
|
- https://seafile.example.com/oauth/callback/
|
||||||
|
scopes:
|
||||||
|
- openid
|
||||||
|
- profile
|
||||||
|
- email
|
||||||
|
userinfo_signing_algorithm: none
|
||||||
```
|
```
|
||||||
|
|
||||||
## See Also
|
## See Also
|
||||||
|
|
|
@ -46,9 +46,11 @@ which case the secret should be encrypted and not be stored in plaintext. The mo
|
||||||
client configurations will be stored in the database with the secret both salted and peppered.
|
client configurations will be stored in the database with the secret both salted and peppered.
|
||||||
|
|
||||||
Authelia currently does not implement any of the specifications or protocols which require secrets being accessible in
|
Authelia currently does not implement any of the specifications or protocols which require secrets being accessible in
|
||||||
the clear and currently has no plans to implement any of these. As such it's *__strongly discouraged and heavily
|
the clear such as most notibly the `client_secret_jwt` grant and currently we no plans to implement any of these. As
|
||||||
deprecated__* and we instead recommended that users remove this from their configuration entirely and use the
|
such it's *__strongly discouraged and heavily deprecated__* and we instead recommended that users remove this from their
|
||||||
[Generating Client Secrets](#generating-client-secrets) guide.
|
configuration entirely and use the [Generating Client Secrets](#generating-client-secrets) guide. At such a time as we
|
||||||
|
support one of these protocols we will very likely only allow plaintext for clients configured expressly for this
|
||||||
|
purpose i.e. a client that only allows `client_secret_jwt` and no other grants.
|
||||||
|
|
||||||
Plaintext is either denoted by the `$plaintext$` prefix where everything after the prefix is the secret. In addition if
|
Plaintext is either denoted by the `$plaintext$` prefix where everything after the prefix is the secret. In addition if
|
||||||
the secret does not start with the `$` character it's considered as a plaintext secret for the time being but is
|
the secret does not start with the `$` character it's considered as a plaintext secret for the time being but is
|
||||||
|
|
|
@ -67,18 +67,23 @@ The following YAML configuration is an example __Authelia__
|
||||||
which will operate with the above example:
|
which will operate with the above example:
|
||||||
|
|
||||||
```yaml
|
```yaml
|
||||||
- id: synapse
|
identity_providers:
|
||||||
description: Synapse
|
oidc:
|
||||||
secret: '$pbkdf2-sha512$310000$c8p78n7pUMln0jzvd4aK4Q$JNRBzwAo0ek5qKn50cFzzvE9RXV88h1wJn5KGiHrD0YKtZaR/nCb2CJPOsKaPK0hjf.9yHxzQGZziziccp6Yng' # The digest of 'insecure_secret'.
|
## The other portions of the mandatory OpenID Connect 1.0 configuration go here.
|
||||||
public: false
|
## See: https://www.authelia.com/c/oidc
|
||||||
authorization_policy: two_factor
|
clients:
|
||||||
redirect_uris:
|
- id: synapse
|
||||||
- https://synapse.example.com/_synapse/client/oidc/callback
|
description: Synapse
|
||||||
scopes:
|
secret: '$pbkdf2-sha512$310000$c8p78n7pUMln0jzvd4aK4Q$JNRBzwAo0ek5qKn50cFzzvE9RXV88h1wJn5KGiHrD0YKtZaR/nCb2CJPOsKaPK0hjf.9yHxzQGZziziccp6Yng' # The digest of 'insecure_secret'.
|
||||||
- openid
|
public: false
|
||||||
- profile
|
authorization_policy: two_factor
|
||||||
- email
|
redirect_uris:
|
||||||
userinfo_signing_algorithm: none
|
- https://synapse.example.com/_synapse/client/oidc/callback
|
||||||
|
scopes:
|
||||||
|
- openid
|
||||||
|
- profile
|
||||||
|
- email
|
||||||
|
userinfo_signing_algorithm: none
|
||||||
```
|
```
|
||||||
|
|
||||||
## See Also
|
## See Also
|
||||||
|
|
|
@ -69,19 +69,24 @@ The following YAML configuration is an example __Authelia__
|
||||||
which will operate with the above example:
|
which will operate with the above example:
|
||||||
|
|
||||||
```yaml
|
```yaml
|
||||||
- id: synology-dsm
|
identity_providers:
|
||||||
description: Synology DSM
|
oidc:
|
||||||
secret: '$pbkdf2-sha512$310000$c8p78n7pUMln0jzvd4aK4Q$JNRBzwAo0ek5qKn50cFzzvE9RXV88h1wJn5KGiHrD0YKtZaR/nCb2CJPOsKaPK0hjf.9yHxzQGZziziccp6Yng' # The digest of 'insecure_secret'.
|
## The other portions of the mandatory OpenID Connect 1.0 configuration go here.
|
||||||
public: false
|
## See: https://www.authelia.com/c/oidc
|
||||||
authorization_policy: two_factor
|
clients:
|
||||||
redirect_uris:
|
- id: synology-dsm
|
||||||
- https://dsm.example.com
|
description: Synology DSM
|
||||||
scopes:
|
secret: '$pbkdf2-sha512$310000$c8p78n7pUMln0jzvd4aK4Q$JNRBzwAo0ek5qKn50cFzzvE9RXV88h1wJn5KGiHrD0YKtZaR/nCb2CJPOsKaPK0hjf.9yHxzQGZziziccp6Yng' # The digest of 'insecure_secret'.
|
||||||
- openid
|
public: false
|
||||||
- profile
|
authorization_policy: two_factor
|
||||||
- groups
|
redirect_uris:
|
||||||
- email
|
- https://dsm.example.com
|
||||||
userinfo_signing_algorithm: none
|
scopes:
|
||||||
|
- openid
|
||||||
|
- profile
|
||||||
|
- groups
|
||||||
|
- email
|
||||||
|
userinfo_signing_algorithm: none
|
||||||
```
|
```
|
||||||
|
|
||||||
## See Also
|
## See Also
|
||||||
|
|
|
@ -161,7 +161,7 @@
|
||||||
"@typescript-eslint/eslint-plugin": "5.57.0",
|
"@typescript-eslint/eslint-plugin": "5.57.0",
|
||||||
"@typescript-eslint/parser": "5.57.0",
|
"@typescript-eslint/parser": "5.57.0",
|
||||||
"@vitejs/plugin-react": "3.1.0",
|
"@vitejs/plugin-react": "3.1.0",
|
||||||
"esbuild": "0.17.14",
|
"esbuild": "0.17.15",
|
||||||
"esbuild-jest": "0.5.0",
|
"esbuild-jest": "0.5.0",
|
||||||
"eslint": "8.37.0",
|
"eslint": "8.37.0",
|
||||||
"eslint-config-prettier": "8.8.0",
|
"eslint-config-prettier": "8.8.0",
|
||||||
|
|
|
@ -121,11 +121,11 @@ devDependencies:
|
||||||
specifier: 3.1.0
|
specifier: 3.1.0
|
||||||
version: 3.1.0(vite@4.2.1)
|
version: 3.1.0(vite@4.2.1)
|
||||||
esbuild:
|
esbuild:
|
||||||
specifier: 0.17.14
|
specifier: 0.17.15
|
||||||
version: 0.17.14
|
version: 0.17.15
|
||||||
esbuild-jest:
|
esbuild-jest:
|
||||||
specifier: 0.5.0
|
specifier: 0.5.0
|
||||||
version: 0.5.0(esbuild@0.17.14)
|
version: 0.5.0(esbuild@0.17.15)
|
||||||
eslint:
|
eslint:
|
||||||
specifier: 8.37.0
|
specifier: 8.37.0
|
||||||
version: 8.37.0
|
version: 8.37.0
|
||||||
|
@ -2370,8 +2370,8 @@ packages:
|
||||||
resolution: {integrity: sha512-AHPmaAx+RYfZz0eYu6Gviiagpmiyw98ySSlQvCUhVGDRtDFe4DBS0x1bSjdF3gqUDYOczB+yYvBTtEylYSdRhg==}
|
resolution: {integrity: sha512-AHPmaAx+RYfZz0eYu6Gviiagpmiyw98ySSlQvCUhVGDRtDFe4DBS0x1bSjdF3gqUDYOczB+yYvBTtEylYSdRhg==}
|
||||||
dev: false
|
dev: false
|
||||||
|
|
||||||
/@esbuild/android-arm64@0.17.14:
|
/@esbuild/android-arm64@0.17.15:
|
||||||
resolution: {integrity: sha512-eLOpPO1RvtsP71afiFTvS7tVFShJBCT0txiv/xjFBo5a7R7Gjw7X0IgIaFoLKhqXYAXhahoXm7qAmRXhY4guJg==}
|
resolution: {integrity: sha512-0kOB6Y7Br3KDVgHeg8PRcvfLkq+AccreK///B4Z6fNZGr/tNHX0z2VywCc7PTeWp+bPvjA5WMvNXltHw5QjAIA==}
|
||||||
engines: {node: '>=12'}
|
engines: {node: '>=12'}
|
||||||
cpu: [arm64]
|
cpu: [arm64]
|
||||||
os: [android]
|
os: [android]
|
||||||
|
@ -2379,8 +2379,8 @@ packages:
|
||||||
dev: true
|
dev: true
|
||||||
optional: true
|
optional: true
|
||||||
|
|
||||||
/@esbuild/android-arm@0.17.14:
|
/@esbuild/android-arm@0.17.15:
|
||||||
resolution: {integrity: sha512-0CnlwnjDU8cks0yJLXfkaU/uoLyRf9VZJs4p1PskBr2AlAHeEsFEwJEo0of/Z3g+ilw5mpyDwThlxzNEIxOE4g==}
|
resolution: {integrity: sha512-sRSOVlLawAktpMvDyJIkdLI/c/kdRTOqo8t6ImVxg8yT7LQDUYV5Rp2FKeEosLr6ZCja9UjYAzyRSxGteSJPYg==}
|
||||||
engines: {node: '>=12'}
|
engines: {node: '>=12'}
|
||||||
cpu: [arm]
|
cpu: [arm]
|
||||||
os: [android]
|
os: [android]
|
||||||
|
@ -2388,8 +2388,8 @@ packages:
|
||||||
dev: true
|
dev: true
|
||||||
optional: true
|
optional: true
|
||||||
|
|
||||||
/@esbuild/android-x64@0.17.14:
|
/@esbuild/android-x64@0.17.15:
|
||||||
resolution: {integrity: sha512-nrfQYWBfLGfSGLvRVlt6xi63B5IbfHm3tZCdu/82zuFPQ7zez4XjmRtF/wIRYbJQ/DsZrxJdEvYFE67avYXyng==}
|
resolution: {integrity: sha512-MzDqnNajQZ63YkaUWVl9uuhcWyEyh69HGpMIrf+acR4otMkfLJ4sUCxqwbCyPGicE9dVlrysI3lMcDBjGiBBcQ==}
|
||||||
engines: {node: '>=12'}
|
engines: {node: '>=12'}
|
||||||
cpu: [x64]
|
cpu: [x64]
|
||||||
os: [android]
|
os: [android]
|
||||||
|
@ -2397,8 +2397,8 @@ packages:
|
||||||
dev: true
|
dev: true
|
||||||
optional: true
|
optional: true
|
||||||
|
|
||||||
/@esbuild/darwin-arm64@0.17.14:
|
/@esbuild/darwin-arm64@0.17.15:
|
||||||
resolution: {integrity: sha512-eoSjEuDsU1ROwgBH/c+fZzuSyJUVXQTOIN9xuLs9dE/9HbV/A5IqdXHU1p2OfIMwBwOYJ9SFVGGldxeRCUJFyw==}
|
resolution: {integrity: sha512-7siLjBc88Z4+6qkMDxPT2juf2e8SJxmsbNVKFY2ifWCDT72v5YJz9arlvBw5oB4W/e61H1+HDB/jnu8nNg0rLA==}
|
||||||
engines: {node: '>=12'}
|
engines: {node: '>=12'}
|
||||||
cpu: [arm64]
|
cpu: [arm64]
|
||||||
os: [darwin]
|
os: [darwin]
|
||||||
|
@ -2406,8 +2406,8 @@ packages:
|
||||||
dev: true
|
dev: true
|
||||||
optional: true
|
optional: true
|
||||||
|
|
||||||
/@esbuild/darwin-x64@0.17.14:
|
/@esbuild/darwin-x64@0.17.15:
|
||||||
resolution: {integrity: sha512-zN0U8RWfrDttdFNkHqFYZtOH8hdi22z0pFm0aIJPsNC4QQZv7je8DWCX5iA4Zx6tRhS0CCc0XC2m7wKsbWEo5g==}
|
resolution: {integrity: sha512-NbImBas2rXwYI52BOKTW342Tm3LTeVlaOQ4QPZ7XuWNKiO226DisFk/RyPk3T0CKZkKMuU69yOvlapJEmax7cg==}
|
||||||
engines: {node: '>=12'}
|
engines: {node: '>=12'}
|
||||||
cpu: [x64]
|
cpu: [x64]
|
||||||
os: [darwin]
|
os: [darwin]
|
||||||
|
@ -2415,8 +2415,8 @@ packages:
|
||||||
dev: true
|
dev: true
|
||||||
optional: true
|
optional: true
|
||||||
|
|
||||||
/@esbuild/freebsd-arm64@0.17.14:
|
/@esbuild/freebsd-arm64@0.17.15:
|
||||||
resolution: {integrity: sha512-z0VcD4ibeZWVQCW1O7szaLxGsx54gcCnajEJMdYoYjLiq4g1jrP2lMq6pk71dbS5+7op/L2Aod+erw+EUr28/A==}
|
resolution: {integrity: sha512-Xk9xMDjBVG6CfgoqlVczHAdJnCs0/oeFOspFap5NkYAmRCT2qTn1vJWA2f419iMtsHSLm+O8B6SLV/HlY5cYKg==}
|
||||||
engines: {node: '>=12'}
|
engines: {node: '>=12'}
|
||||||
cpu: [arm64]
|
cpu: [arm64]
|
||||||
os: [freebsd]
|
os: [freebsd]
|
||||||
|
@ -2424,8 +2424,8 @@ packages:
|
||||||
dev: true
|
dev: true
|
||||||
optional: true
|
optional: true
|
||||||
|
|
||||||
/@esbuild/freebsd-x64@0.17.14:
|
/@esbuild/freebsd-x64@0.17.15:
|
||||||
resolution: {integrity: sha512-hd9mPcxfTgJlolrPlcXkQk9BMwNBvNBsVaUe5eNUqXut6weDQH8whcNaKNF2RO8NbpT6GY8rHOK2A9y++s+ehw==}
|
resolution: {integrity: sha512-3TWAnnEOdclvb2pnfsTWtdwthPfOz7qAfcwDLcfZyGJwm1SRZIMOeB5FODVhnM93mFSPsHB9b/PmxNNbSnd0RQ==}
|
||||||
engines: {node: '>=12'}
|
engines: {node: '>=12'}
|
||||||
cpu: [x64]
|
cpu: [x64]
|
||||||
os: [freebsd]
|
os: [freebsd]
|
||||||
|
@ -2433,8 +2433,8 @@ packages:
|
||||||
dev: true
|
dev: true
|
||||||
optional: true
|
optional: true
|
||||||
|
|
||||||
/@esbuild/linux-arm64@0.17.14:
|
/@esbuild/linux-arm64@0.17.15:
|
||||||
resolution: {integrity: sha512-FhAMNYOq3Iblcj9i+K0l1Fp/MHt+zBeRu/Qkf0LtrcFu3T45jcwB6A1iMsemQ42vR3GBhjNZJZTaCe3VFPbn9g==}
|
resolution: {integrity: sha512-T0MVnYw9KT6b83/SqyznTs/3Jg2ODWrZfNccg11XjDehIved2oQfrX/wVuev9N936BpMRaTR9I1J0tdGgUgpJA==}
|
||||||
engines: {node: '>=12'}
|
engines: {node: '>=12'}
|
||||||
cpu: [arm64]
|
cpu: [arm64]
|
||||||
os: [linux]
|
os: [linux]
|
||||||
|
@ -2442,8 +2442,8 @@ packages:
|
||||||
dev: true
|
dev: true
|
||||||
optional: true
|
optional: true
|
||||||
|
|
||||||
/@esbuild/linux-arm@0.17.14:
|
/@esbuild/linux-arm@0.17.15:
|
||||||
resolution: {integrity: sha512-BNTl+wSJ1omsH8s3TkQmIIIQHwvwJrU9u1ggb9XU2KTVM4TmthRIVyxSp2qxROJHhZuW/r8fht46/QE8hU8Qvg==}
|
resolution: {integrity: sha512-MLTgiXWEMAMr8nmS9Gigx43zPRmEfeBfGCwxFQEMgJ5MC53QKajaclW6XDPjwJvhbebv+RzK05TQjvH3/aM4Xw==}
|
||||||
engines: {node: '>=12'}
|
engines: {node: '>=12'}
|
||||||
cpu: [arm]
|
cpu: [arm]
|
||||||
os: [linux]
|
os: [linux]
|
||||||
|
@ -2451,8 +2451,8 @@ packages:
|
||||||
dev: true
|
dev: true
|
||||||
optional: true
|
optional: true
|
||||||
|
|
||||||
/@esbuild/linux-ia32@0.17.14:
|
/@esbuild/linux-ia32@0.17.15:
|
||||||
resolution: {integrity: sha512-91OK/lQ5y2v7AsmnFT+0EyxdPTNhov3y2CWMdizyMfxSxRqHazXdzgBKtlmkU2KYIc+9ZK3Vwp2KyXogEATYxQ==}
|
resolution: {integrity: sha512-wp02sHs015T23zsQtU4Cj57WiteiuASHlD7rXjKUyAGYzlOKDAjqK6bk5dMi2QEl/KVOcsjwL36kD+WW7vJt8Q==}
|
||||||
engines: {node: '>=12'}
|
engines: {node: '>=12'}
|
||||||
cpu: [ia32]
|
cpu: [ia32]
|
||||||
os: [linux]
|
os: [linux]
|
||||||
|
@ -2460,8 +2460,8 @@ packages:
|
||||||
dev: true
|
dev: true
|
||||||
optional: true
|
optional: true
|
||||||
|
|
||||||
/@esbuild/linux-loong64@0.17.14:
|
/@esbuild/linux-loong64@0.17.15:
|
||||||
resolution: {integrity: sha512-vp15H+5NR6hubNgMluqqKza85HcGJgq7t6rMH7O3Y6ApiOWPkvW2AJfNojUQimfTp6OUrACUXfR4hmpcENXoMQ==}
|
resolution: {integrity: sha512-k7FsUJjGGSxwnBmMh8d7IbObWu+sF/qbwc+xKZkBe/lTAF16RqxRCnNHA7QTd3oS2AfGBAnHlXL67shV5bBThQ==}
|
||||||
engines: {node: '>=12'}
|
engines: {node: '>=12'}
|
||||||
cpu: [loong64]
|
cpu: [loong64]
|
||||||
os: [linux]
|
os: [linux]
|
||||||
|
@ -2469,8 +2469,8 @@ packages:
|
||||||
dev: true
|
dev: true
|
||||||
optional: true
|
optional: true
|
||||||
|
|
||||||
/@esbuild/linux-mips64el@0.17.14:
|
/@esbuild/linux-mips64el@0.17.15:
|
||||||
resolution: {integrity: sha512-90TOdFV7N+fgi6c2+GO9ochEkmm9kBAKnuD5e08GQMgMINOdOFHuYLPQ91RYVrnWwQ5683sJKuLi9l4SsbJ7Hg==}
|
resolution: {integrity: sha512-ZLWk6czDdog+Q9kE/Jfbilu24vEe/iW/Sj2d8EVsmiixQ1rM2RKH2n36qfxK4e8tVcaXkvuV3mU5zTZviE+NVQ==}
|
||||||
engines: {node: '>=12'}
|
engines: {node: '>=12'}
|
||||||
cpu: [mips64el]
|
cpu: [mips64el]
|
||||||
os: [linux]
|
os: [linux]
|
||||||
|
@ -2478,8 +2478,8 @@ packages:
|
||||||
dev: true
|
dev: true
|
||||||
optional: true
|
optional: true
|
||||||
|
|
||||||
/@esbuild/linux-ppc64@0.17.14:
|
/@esbuild/linux-ppc64@0.17.15:
|
||||||
resolution: {integrity: sha512-NnBGeoqKkTugpBOBZZoktQQ1Yqb7aHKmHxsw43NddPB2YWLAlpb7THZIzsRsTr0Xw3nqiPxbA1H31ZMOG+VVPQ==}
|
resolution: {integrity: sha512-mY6dPkIRAiFHRsGfOYZC8Q9rmr8vOBZBme0/j15zFUKM99d4ILY4WpOC7i/LqoY+RE7KaMaSfvY8CqjJtuO4xg==}
|
||||||
engines: {node: '>=12'}
|
engines: {node: '>=12'}
|
||||||
cpu: [ppc64]
|
cpu: [ppc64]
|
||||||
os: [linux]
|
os: [linux]
|
||||||
|
@ -2487,8 +2487,8 @@ packages:
|
||||||
dev: true
|
dev: true
|
||||||
optional: true
|
optional: true
|
||||||
|
|
||||||
/@esbuild/linux-riscv64@0.17.14:
|
/@esbuild/linux-riscv64@0.17.15:
|
||||||
resolution: {integrity: sha512-0qdlKScLXA8MGVy21JUKvMzCYWovctuP8KKqhtE5A6IVPq4onxXhSuhwDd2g5sRCzNDlDjitc5sX31BzDoL5Fw==}
|
resolution: {integrity: sha512-EcyUtxffdDtWjjwIH8sKzpDRLcVtqANooMNASO59y+xmqqRYBBM7xVLQhqF7nksIbm2yHABptoioS9RAbVMWVA==}
|
||||||
engines: {node: '>=12'}
|
engines: {node: '>=12'}
|
||||||
cpu: [riscv64]
|
cpu: [riscv64]
|
||||||
os: [linux]
|
os: [linux]
|
||||||
|
@ -2496,8 +2496,8 @@ packages:
|
||||||
dev: true
|
dev: true
|
||||||
optional: true
|
optional: true
|
||||||
|
|
||||||
/@esbuild/linux-s390x@0.17.14:
|
/@esbuild/linux-s390x@0.17.15:
|
||||||
resolution: {integrity: sha512-Hdm2Jo1yaaOro4v3+6/zJk6ygCqIZuSDJHdHaf8nVH/tfOuoEX5Riv03Ka15LmQBYJObUTNS1UdyoMk0WUn9Ww==}
|
resolution: {integrity: sha512-BuS6Jx/ezxFuHxgsfvz7T4g4YlVrmCmg7UAwboeyNNg0OzNzKsIZXpr3Sb/ZREDXWgt48RO4UQRDBxJN3B9Rbg==}
|
||||||
engines: {node: '>=12'}
|
engines: {node: '>=12'}
|
||||||
cpu: [s390x]
|
cpu: [s390x]
|
||||||
os: [linux]
|
os: [linux]
|
||||||
|
@ -2505,8 +2505,8 @@ packages:
|
||||||
dev: true
|
dev: true
|
||||||
optional: true
|
optional: true
|
||||||
|
|
||||||
/@esbuild/linux-x64@0.17.14:
|
/@esbuild/linux-x64@0.17.15:
|
||||||
resolution: {integrity: sha512-8KHF17OstlK4DuzeF/KmSgzrTWQrkWj5boluiiq7kvJCiQVzUrmSkaBvcLB2UgHpKENO2i6BthPkmUhNDaJsVw==}
|
resolution: {integrity: sha512-JsdS0EgEViwuKsw5tiJQo9UdQdUJYuB+Mf6HxtJSPN35vez1hlrNb1KajvKWF5Sa35j17+rW1ECEO9iNrIXbNg==}
|
||||||
engines: {node: '>=12'}
|
engines: {node: '>=12'}
|
||||||
cpu: [x64]
|
cpu: [x64]
|
||||||
os: [linux]
|
os: [linux]
|
||||||
|
@ -2514,8 +2514,8 @@ packages:
|
||||||
dev: true
|
dev: true
|
||||||
optional: true
|
optional: true
|
||||||
|
|
||||||
/@esbuild/netbsd-x64@0.17.14:
|
/@esbuild/netbsd-x64@0.17.15:
|
||||||
resolution: {integrity: sha512-nVwpqvb3yyXztxIT2+VsxJhB5GCgzPdk1n0HHSnchRAcxqKO6ghXwHhJnr0j/B+5FSyEqSxF4q03rbA2fKXtUQ==}
|
resolution: {integrity: sha512-R6fKjtUysYGym6uXf6qyNephVUQAGtf3n2RCsOST/neIwPqRWcnc3ogcielOd6pT+J0RDR1RGcy0ZY7d3uHVLA==}
|
||||||
engines: {node: '>=12'}
|
engines: {node: '>=12'}
|
||||||
cpu: [x64]
|
cpu: [x64]
|
||||||
os: [netbsd]
|
os: [netbsd]
|
||||||
|
@ -2523,8 +2523,8 @@ packages:
|
||||||
dev: true
|
dev: true
|
||||||
optional: true
|
optional: true
|
||||||
|
|
||||||
/@esbuild/openbsd-x64@0.17.14:
|
/@esbuild/openbsd-x64@0.17.15:
|
||||||
resolution: {integrity: sha512-1RZ7uQQ9zcy/GSAJL1xPdN7NDdOOtNEGiJalg/MOzeakZeTrgH/DoCkbq7TaPDiPhWqnDF+4bnydxRqQD7il6g==}
|
resolution: {integrity: sha512-mVD4PGc26b8PI60QaPUltYKeSX0wxuy0AltC+WCTFwvKCq2+OgLP4+fFd+hZXzO2xW1HPKcytZBdjqL6FQFa7w==}
|
||||||
engines: {node: '>=12'}
|
engines: {node: '>=12'}
|
||||||
cpu: [x64]
|
cpu: [x64]
|
||||||
os: [openbsd]
|
os: [openbsd]
|
||||||
|
@ -2532,8 +2532,8 @@ packages:
|
||||||
dev: true
|
dev: true
|
||||||
optional: true
|
optional: true
|
||||||
|
|
||||||
/@esbuild/sunos-x64@0.17.14:
|
/@esbuild/sunos-x64@0.17.15:
|
||||||
resolution: {integrity: sha512-nqMjDsFwv7vp7msrwWRysnM38Sd44PKmW8EzV01YzDBTcTWUpczQg6mGao9VLicXSgW/iookNK6AxeogNVNDZA==}
|
resolution: {integrity: sha512-U6tYPovOkw3459t2CBwGcFYfFRjivcJJc1WC8Q3funIwX8x4fP+R6xL/QuTPNGOblbq/EUDxj9GU+dWKX0oWlQ==}
|
||||||
engines: {node: '>=12'}
|
engines: {node: '>=12'}
|
||||||
cpu: [x64]
|
cpu: [x64]
|
||||||
os: [sunos]
|
os: [sunos]
|
||||||
|
@ -2541,8 +2541,8 @@ packages:
|
||||||
dev: true
|
dev: true
|
||||||
optional: true
|
optional: true
|
||||||
|
|
||||||
/@esbuild/win32-arm64@0.17.14:
|
/@esbuild/win32-arm64@0.17.15:
|
||||||
resolution: {integrity: sha512-xrD0mccTKRBBIotrITV7WVQAwNJ5+1va6L0H9zN92v2yEdjfAN7864cUaZwJS7JPEs53bDTzKFbfqVlG2HhyKQ==}
|
resolution: {integrity: sha512-W+Z5F++wgKAleDABemiyXVnzXgvRFs+GVKThSI+mGgleLWluv0D7Diz4oQpgdpNzh4i2nNDzQtWbjJiqutRp6Q==}
|
||||||
engines: {node: '>=12'}
|
engines: {node: '>=12'}
|
||||||
cpu: [arm64]
|
cpu: [arm64]
|
||||||
os: [win32]
|
os: [win32]
|
||||||
|
@ -2550,8 +2550,8 @@ packages:
|
||||||
dev: true
|
dev: true
|
||||||
optional: true
|
optional: true
|
||||||
|
|
||||||
/@esbuild/win32-ia32@0.17.14:
|
/@esbuild/win32-ia32@0.17.15:
|
||||||
resolution: {integrity: sha512-nXpkz9bbJrLLyUTYtRotSS3t5b+FOuljg8LgLdINWFs3FfqZMtbnBCZFUmBzQPyxqU87F8Av+3Nco/M3hEcu1w==}
|
resolution: {integrity: sha512-Muz/+uGgheShKGqSVS1KsHtCyEzcdOn/W/Xbh6H91Etm+wiIfwZaBn1W58MeGtfI8WA961YMHFYTthBdQs4t+w==}
|
||||||
engines: {node: '>=12'}
|
engines: {node: '>=12'}
|
||||||
cpu: [ia32]
|
cpu: [ia32]
|
||||||
os: [win32]
|
os: [win32]
|
||||||
|
@ -2559,8 +2559,8 @@ packages:
|
||||||
dev: true
|
dev: true
|
||||||
optional: true
|
optional: true
|
||||||
|
|
||||||
/@esbuild/win32-x64@0.17.14:
|
/@esbuild/win32-x64@0.17.15:
|
||||||
resolution: {integrity: sha512-gPQmsi2DKTaEgG14hc3CHXHp62k8g6qr0Pas+I4lUxRMugGSATh/Bi8Dgusoz9IQ0IfdrvLpco6kujEIBoaogA==}
|
resolution: {integrity: sha512-DjDa9ywLUUmjhV2Y9wUTIF+1XsmuFGvZoCmOWkli1XcNAh5t25cc7fgsCx4Zi/Uurep3TTLyDiKATgGEg61pkA==}
|
||||||
engines: {node: '>=12'}
|
engines: {node: '>=12'}
|
||||||
cpu: [x64]
|
cpu: [x64]
|
||||||
os: [win32]
|
os: [win32]
|
||||||
|
@ -5150,7 +5150,7 @@ packages:
|
||||||
is-symbol: 1.0.4
|
is-symbol: 1.0.4
|
||||||
dev: true
|
dev: true
|
||||||
|
|
||||||
/esbuild-jest@0.5.0(esbuild@0.17.14):
|
/esbuild-jest@0.5.0(esbuild@0.17.15):
|
||||||
resolution: {integrity: sha512-AMZZCdEpXfNVOIDvURlqYyHwC8qC1/BFjgsrOiSL1eyiIArVtHL8YAC83Shhn16cYYoAWEW17yZn0W/RJKJKHQ==}
|
resolution: {integrity: sha512-AMZZCdEpXfNVOIDvURlqYyHwC8qC1/BFjgsrOiSL1eyiIArVtHL8YAC83Shhn16cYYoAWEW17yZn0W/RJKJKHQ==}
|
||||||
peerDependencies:
|
peerDependencies:
|
||||||
esbuild: '>=0.8.50'
|
esbuild: '>=0.8.50'
|
||||||
|
@ -5158,38 +5158,38 @@ packages:
|
||||||
'@babel/core': 7.18.6
|
'@babel/core': 7.18.6
|
||||||
'@babel/plugin-transform-modules-commonjs': 7.18.6(@babel/core@7.18.6)
|
'@babel/plugin-transform-modules-commonjs': 7.18.6(@babel/core@7.18.6)
|
||||||
babel-jest: 26.6.3(@babel/core@7.18.6)
|
babel-jest: 26.6.3(@babel/core@7.18.6)
|
||||||
esbuild: 0.17.14
|
esbuild: 0.17.15
|
||||||
transitivePeerDependencies:
|
transitivePeerDependencies:
|
||||||
- supports-color
|
- supports-color
|
||||||
dev: true
|
dev: true
|
||||||
|
|
||||||
/esbuild@0.17.14:
|
/esbuild@0.17.15:
|
||||||
resolution: {integrity: sha512-vOO5XhmVj/1XQR9NQ1UPq6qvMYL7QFJU57J5fKBKBKxp17uDt5PgxFDb4A2nEiXhr1qQs4x0F5+66hVVw4ruNw==}
|
resolution: {integrity: sha512-LBUV2VsUIc/iD9ME75qhT4aJj0r75abCVS0jakhFzOtR7TQsqQA5w0tZ+KTKnwl3kXE0MhskNdHDh/I5aCR1Zw==}
|
||||||
engines: {node: '>=12'}
|
engines: {node: '>=12'}
|
||||||
requiresBuild: true
|
requiresBuild: true
|
||||||
optionalDependencies:
|
optionalDependencies:
|
||||||
'@esbuild/android-arm': 0.17.14
|
'@esbuild/android-arm': 0.17.15
|
||||||
'@esbuild/android-arm64': 0.17.14
|
'@esbuild/android-arm64': 0.17.15
|
||||||
'@esbuild/android-x64': 0.17.14
|
'@esbuild/android-x64': 0.17.15
|
||||||
'@esbuild/darwin-arm64': 0.17.14
|
'@esbuild/darwin-arm64': 0.17.15
|
||||||
'@esbuild/darwin-x64': 0.17.14
|
'@esbuild/darwin-x64': 0.17.15
|
||||||
'@esbuild/freebsd-arm64': 0.17.14
|
'@esbuild/freebsd-arm64': 0.17.15
|
||||||
'@esbuild/freebsd-x64': 0.17.14
|
'@esbuild/freebsd-x64': 0.17.15
|
||||||
'@esbuild/linux-arm': 0.17.14
|
'@esbuild/linux-arm': 0.17.15
|
||||||
'@esbuild/linux-arm64': 0.17.14
|
'@esbuild/linux-arm64': 0.17.15
|
||||||
'@esbuild/linux-ia32': 0.17.14
|
'@esbuild/linux-ia32': 0.17.15
|
||||||
'@esbuild/linux-loong64': 0.17.14
|
'@esbuild/linux-loong64': 0.17.15
|
||||||
'@esbuild/linux-mips64el': 0.17.14
|
'@esbuild/linux-mips64el': 0.17.15
|
||||||
'@esbuild/linux-ppc64': 0.17.14
|
'@esbuild/linux-ppc64': 0.17.15
|
||||||
'@esbuild/linux-riscv64': 0.17.14
|
'@esbuild/linux-riscv64': 0.17.15
|
||||||
'@esbuild/linux-s390x': 0.17.14
|
'@esbuild/linux-s390x': 0.17.15
|
||||||
'@esbuild/linux-x64': 0.17.14
|
'@esbuild/linux-x64': 0.17.15
|
||||||
'@esbuild/netbsd-x64': 0.17.14
|
'@esbuild/netbsd-x64': 0.17.15
|
||||||
'@esbuild/openbsd-x64': 0.17.14
|
'@esbuild/openbsd-x64': 0.17.15
|
||||||
'@esbuild/sunos-x64': 0.17.14
|
'@esbuild/sunos-x64': 0.17.15
|
||||||
'@esbuild/win32-arm64': 0.17.14
|
'@esbuild/win32-arm64': 0.17.15
|
||||||
'@esbuild/win32-ia32': 0.17.14
|
'@esbuild/win32-ia32': 0.17.15
|
||||||
'@esbuild/win32-x64': 0.17.14
|
'@esbuild/win32-x64': 0.17.15
|
||||||
dev: true
|
dev: true
|
||||||
|
|
||||||
/escalade@3.1.1:
|
/escalade@3.1.1:
|
||||||
|
@ -9318,7 +9318,7 @@ packages:
|
||||||
optional: true
|
optional: true
|
||||||
dependencies:
|
dependencies:
|
||||||
'@types/node': 18.15.11
|
'@types/node': 18.15.11
|
||||||
esbuild: 0.17.14
|
esbuild: 0.17.15
|
||||||
postcss: 8.4.21
|
postcss: 8.4.21
|
||||||
resolve: 1.22.1
|
resolve: 1.22.1
|
||||||
rollup: 3.19.1
|
rollup: 3.19.1
|
||||||
|
|
Loading…
Reference in New Issue