package configuration import ( "os" "strings" "github.com/authelia/authelia/v4/internal/utils" ) func getEnvConfigMap(keys []string, prefix, delimiter string) (keyMap map[string]string, ignoredKeys []string) { keyMap = make(map[string]string) for _, key := range keys { if strings.Contains(key, delimiter) { keyMap[ToEnvironmentKey(key, prefix, delimiter)] = key } // Secret envs should be ignored by the env parser. if IsSecretKey(key) { ignoredKeys = append(ignoredKeys, ToEnvironmentSecretKey(key, prefix, delimiter)) } } for _, deprecation := range deprecations { if !deprecation.AutoMap { continue } keyMap[ToEnvironmentKey(deprecation.Key, prefix, delimiter)] = deprecation.Key } return keyMap, ignoredKeys } func getSecretConfigMap(keys []string, prefix, delimiter string) (keyMap map[string]string) { keyMap = make(map[string]string) for _, key := range keys { if IsSecretKey(key) { originalKey := strings.ToUpper(strings.ReplaceAll(key, constDelimiter, delimiter)) + constSecretSuffix keyMap[prefix+originalKey] = key } } return keyMap } // ToEnvironmentKey converts a key into the environment variable name. func ToEnvironmentKey(key, prefix, delimiter string) string { return prefix + strings.ToUpper(strings.ReplaceAll(key, constDelimiter, delimiter)) } // ToEnvironmentSecretKey converts a key into the environment variable name. func ToEnvironmentSecretKey(key, prefix, delimiter string) string { return prefix + strings.ToUpper(strings.ReplaceAll(key, constDelimiter, delimiter)) + constSecretSuffix } // IsSecretKey returns true if the provided key is a secret enabled key. func IsSecretKey(key string) (isSecretKey bool) { if strings.Contains(key, "[]") { return false } return utils.IsStringInSliceSuffix(key, secretSuffixes) } func loadSecret(path string) (value string, err error) { content, err := os.ReadFile(path) if err != nil { return "", err } return strings.TrimRight(string(content), "\n"), err }