2020-06-03 22:13:17 +02:00
# Configuring Synapse to authenticate against an OpenID Connect provider
Synapse can be configured to use an OpenID Connect Provider (OP) for
authentication, instead of its own local password database.
Any OP should work with Synapse, as long as it supports the authorization code
flow. There are a few options for that:
- start a local OP. Synapse has been tested with [Hydra][hydra] and
[Dex][dex-idp]. Note that for an OP to work, it should be served under a
secure (HTTPS) origin. A certificate signed with a self-signed, locally
trusted CA should work. In that case, start Synapse with a `SSL_CERT_FILE`
environment variable set to the path of the CA.
- set up a SaaS OP, like [Google][google-idp], [Auth0][auth0] or
[Okta][okta]. Synapse has been tested with Auth0 and Google.
It may also be possible to use other OAuth2 providers which provide the
[authorization code grant type ](https://tools.ietf.org/html/rfc6749#section-4.1 ),
such as [Github][github-idp].
[google-idp]: https://developers.google.com/identity/protocols/oauth2/openid-connect
[auth0]: https://auth0.com/
2021-10-28 12:31:22 +02:00
[authentik]: https://goauthentik.io/
2021-11-05 13:08:02 +01:00
[lemonldap]: https://lemonldap-ng.org/
2020-06-03 22:13:17 +02:00
[okta]: https://www.okta.com/
[dex-idp]: https://github.com/dexidp/dex
2020-06-16 17:28:21 +02:00
[keycloak-idp]: https://www.keycloak.org/docs/latest/server_admin/#sso-protocols
2020-06-03 22:13:17 +02:00
[hydra]: https://www.ory.sh/docs/hydra/
[github-idp]: https://developer.github.com/apps/building-oauth-apps/authorizing-oauth-apps
## Preparing Synapse
The OpenID integration in Synapse uses the
[`authlib` ](https://pypi.org/project/Authlib/ ) library, which must be installed
as follows:
* The relevant libraries are included in the Docker images and Debian packages
provided by `matrix.org` so no further action is needed.
* If you installed Synapse into a virtualenv, run `/path/to/env/bin/pip
2020-10-22 19:25:58 +02:00
install matrix-synapse[oidc]` to install the necessary dependencies.
2020-06-03 22:13:17 +02:00
* For other installation mechanisms, see the documentation provided by the
maintainer.
2021-01-15 17:55:29 +01:00
To enable the OpenID integration, you should then add a section to the `oidc_providers`
setting in your configuration file (or uncomment one of the existing examples).
2021-01-27 23:57:16 +01:00
See [sample_config.yaml ](./sample_config.yaml ) for some sample settings, as well as
2021-01-15 17:55:29 +01:00
the text below for example configurations for specific providers.
2020-06-03 22:13:17 +02:00
## Sample configs
Here are a few configs for providers that should work with Synapse.
2020-10-26 18:49:55 +01:00
### Microsoft Azure Active Directory
2021-01-27 23:57:16 +01:00
Azure AD can act as an OpenID Connect Provider. Register a new application under
2020-10-26 18:49:55 +01:00
*App registrations* in the Azure AD management console. The RedirectURI for your
2021-02-01 23:56:01 +01:00
application should point to your matrix server:
`[synapse public baseurl]/_synapse/client/oidc/callback`
2020-10-26 18:49:55 +01:00
2021-01-27 23:57:16 +01:00
Go to *Certificates & secrets* and register a new client secret. Make note of your
2020-10-26 18:49:55 +01:00
Directory (tenant) ID as it will be used in the Azure links.
Edit your Synapse config file and change the `oidc_config` section:
```yaml
2021-01-15 17:55:29 +01:00
oidc_providers:
- idp_id: microsoft
idp_name: Microsoft
issuer: "https://login.microsoftonline.com/< tenant id > /v2.0"
client_id: "< client id > "
client_secret: "< client secret > "
scopes: ["openid", "profile"]
authorization_endpoint: "https://login.microsoftonline.com/< tenant id > /oauth2/v2.0/authorize"
token_endpoint: "https://login.microsoftonline.com/< tenant id > /oauth2/v2.0/token"
userinfo_endpoint: "https://graph.microsoft.com/oidc/userinfo"
user_mapping_provider:
config:
localpart_template: "{{ user.preferred_username.split('@')[0] }}"
display_name_template: "{{ user.name }}"
2020-10-26 18:49:55 +01:00
```
2021-08-23 15:58:31 +02:00
### Dex
2020-06-03 22:13:17 +02:00
2021-12-01 10:40:51 +01:00
[Dex][dex-idp] is a simple, open-source OpenID Connect Provider.
2020-06-03 22:13:17 +02:00
Although it is designed to help building a full-blown provider with an
external database, it can be configured with static passwords in a config file.
2020-10-26 17:53:11 +01:00
Follow the [Getting Started guide ](https://dexidp.io/docs/getting-started/ )
2020-06-03 22:13:17 +02:00
to install Dex.
Edit `examples/config-dev.yaml` config file from the Dex repo to add a client:
```yaml
staticClients:
- id: synapse
secret: secret
redirectURIs:
2021-02-01 23:56:01 +01:00
- '[synapse public baseurl]/_synapse/client/oidc/callback'
2020-06-03 22:13:17 +02:00
name: 'Synapse'
```
2020-10-26 17:53:11 +01:00
Run with `dex serve examples/config-dev.yaml` .
2020-06-03 22:13:17 +02:00
Synapse config:
```yaml
2021-01-15 17:55:29 +01:00
oidc_providers:
- idp_id: dex
idp_name: "My Dex server"
skip_verification: true # This is needed as Dex is served on an insecure endpoint
issuer: "http://127.0.0.1:5556/dex"
client_id: "synapse"
client_secret: "secret"
scopes: ["openid", "profile"]
user_mapping_provider:
config:
localpart_template: "{{ user.name }}"
display_name_template: "{{ user.name|capitalize }}"
2020-06-03 22:13:17 +02:00
```
2021-08-23 15:58:31 +02:00
### Keycloak
2020-06-03 22:13:17 +02:00
2021-01-27 23:57:16 +01:00
[Keycloak][keycloak-idp] is an opensource IdP maintained by Red Hat.
2020-06-16 17:28:21 +02:00
Follow the [Getting Started Guide ](https://www.keycloak.org/getting-started ) to install Keycloak and set up a realm.
1. Click `Clients` in the sidebar and click `Create`
2. Fill in the fields as below:
| Field | Value |
|-----------|-----------|
| Client ID | `synapse` |
| Client Protocol | `openid-connect` |
3. Click `Save`
4. Fill in the fields as below:
| Field | Value |
|-----------|-----------|
| Client ID | `synapse` |
| Enabled | `On` |
| Client Protocol | `openid-connect` |
| Access Type | `confidential` |
2021-02-01 23:56:01 +01:00
| Valid Redirect URIs | `[synapse public baseurl]/_synapse/client/oidc/callback` |
2020-06-16 17:28:21 +02:00
5. Click `Save`
6. On the Credentials tab, update the fields:
| Field | Value |
|-------|-------|
| Client Authenticator | `Client ID and Secret` |
7. Click `Regenerate Secret`
8. Copy Secret
```yaml
2021-01-15 17:55:29 +01:00
oidc_providers:
- idp_id: keycloak
idp_name: "My KeyCloak server"
issuer: "https://127.0.0.1:8443/auth/realms/{realm_name}"
client_id: "synapse"
client_secret: "copy secret generated from above"
scopes: ["openid", "profile"]
user_mapping_provider:
config:
localpart_template: "{{ user.preferred_username }}"
display_name_template: "{{ user.name }}"
2020-06-16 17:28:21 +02:00
```
2021-08-23 15:58:31 +02:00
### Auth0
[Auth0][auth0] is a hosted SaaS IdP solution.
2020-06-03 22:13:17 +02:00
1. Create a regular web application for Synapse
2021-02-01 23:56:01 +01:00
2. Set the Allowed Callback URLs to `[synapse public baseurl]/_synapse/client/oidc/callback`
2020-06-03 22:13:17 +02:00
3. Add a rule to add the `preferred_username` claim.
< details >
< summary > Code sample< / summary >
```js
function addPersistenceAttribute(user, context, callback) {
user.user_metadata = user.user_metadata || {};
user.user_metadata.preferred_username = user.user_metadata.preferred_username || user.user_id;
context.idToken.preferred_username = user.user_metadata.preferred_username;
auth0.users.updateUserMetadata(user.user_id, user.user_metadata)
.then(function(){
callback(null, user, context);
})
.catch(function(err){
callback(err);
});
}
```
< / details >
Synapse config:
```yaml
2021-01-15 17:55:29 +01:00
oidc_providers:
2021-01-27 23:57:16 +01:00
- idp_id: auth0
2021-01-15 17:55:29 +01:00
idp_name: Auth0
issuer: "https://your-tier.eu.auth0.com/" # TO BE FILLED
client_id: "your-client-id" # TO BE FILLED
client_secret: "your-client-secret" # TO BE FILLED
scopes: ["openid", "profile"]
user_mapping_provider:
config:
localpart_template: "{{ user.preferred_username }}"
display_name_template: "{{ user.name }}"
2020-06-03 22:13:17 +02:00
```
2021-10-28 12:31:22 +02:00
### Authentik
[Authentik][authentik] is an open-source IdP solution.
1. Create a provider in Authentik, with type OAuth2/OpenID.
2. The parameters are:
- Client Type: Confidential
- JWT Algorithm: RS256
- Scopes: OpenID, Email and Profile
- RSA Key: Select any available key
- Redirect URIs: `[synapse public baseurl]/_synapse/client/oidc/callback`
3. Create an application for synapse in Authentik and link it to the provider.
4. Note the slug of your application, Client ID and Client Secret.
2022-03-25 13:40:10 +01:00
Note: RSA keys must be used for signing for Authentik, ECC keys do not work.
2021-10-28 12:31:22 +02:00
Synapse config:
```yaml
oidc_providers:
- idp_id: authentik
idp_name: authentik
discover: true
issuer: "https://your.authentik.example.org/application/o/your-app-slug/" # TO BE FILLED: domain and slug
client_id: "your client id" # TO BE FILLED
client_secret: "your client secret" # TO BE FILLED
scopes:
- "openid"
- "profile"
- "email"
user_mapping_provider:
config:
2022-03-25 13:40:10 +01:00
localpart_template: "{{ user.preferred_username }}"
2021-10-28 12:31:22 +02:00
display_name_template: "{{ user.preferred_username|capitalize }}" # TO BE FILLED: If your users have names in Authentik and you want those in Synapse, this should be replaced with user.name|capitalize.
```
2021-11-05 13:08:02 +01:00
### LemonLDAP
[LemonLDAP::NG][lemonldap] is an open-source IdP solution.
1. Create an OpenID Connect Relying Parties in LemonLDAP::NG
2. The parameters are:
- Client ID under the basic menu of the new Relying Parties (`Options > Basic >
Client ID`)
- Client secret (`Options > Basic > Client secret`)
- JWT Algorithm: RS256 within the security menu of the new Relying Parties
(`Options > Security > ID Token signature algorithm` and `Options > Security >
Access Token signature algorithm`)
- Scopes: OpenID, Email and Profile
- Allowed redirection addresses for login (`Options > Basic > Allowed
redirection addresses for login` ) :
`[synapse public baseurl]/_synapse/client/oidc/callback`
Synapse config:
```yaml
oidc_providers:
- idp_id: lemonldap
idp_name: lemonldap
discover: true
issuer: "https://auth.example.org/" # TO BE FILLED: replace with your domain
client_id: "your client id" # TO BE FILLED
client_secret: "your client secret" # TO BE FILLED
scopes:
- "openid"
- "profile"
- "email"
user_mapping_provider:
config:
localpart_template: "{{ user.preferred_username }}}"
# TO BE FILLED: If your users have names in LemonLDAP::NG and you want those in Synapse, this should be replaced with user.name|capitalize or any valid filter.
display_name_template: "{{ user.preferred_username|capitalize }}"
```
2020-06-03 22:13:17 +02:00
### GitHub
2021-08-23 15:58:31 +02:00
[GitHub][github-idp] is a bit special as it is not an OpenID Connect compliant provider, but
2020-06-03 22:13:17 +02:00
just a regular OAuth2 provider.
The [`/user` API endpoint ](https://developer.github.com/v3/users/#get-the-authenticated-user )
2020-11-02 14:33:56 +01:00
can be used to retrieve information on the authenticated user. As the Synapse
2020-06-03 22:13:17 +02:00
login mechanism needs an attribute to uniquely identify users, and that endpoint
does not return a `sub` property, an alternative `subject_claim` has to be set.
1. Create a new OAuth application: https://github.com/settings/applications/new.
2021-02-01 23:56:01 +01:00
2. Set the callback URL to `[synapse public baseurl]/_synapse/client/oidc/callback` .
2020-06-03 22:13:17 +02:00
Synapse config:
```yaml
2021-01-15 17:55:29 +01:00
oidc_providers:
- idp_id: github
idp_name: Github
2021-03-16 12:21:26 +01:00
idp_brand: "github" # optional: styling hint for clients
2021-01-15 17:55:29 +01:00
discover: false
issuer: "https://github.com/"
client_id: "your-client-id" # TO BE FILLED
client_secret: "your-client-secret" # TO BE FILLED
authorization_endpoint: "https://github.com/login/oauth/authorize"
token_endpoint: "https://github.com/login/oauth/access_token"
userinfo_endpoint: "https://api.github.com/user"
scopes: ["read:user"]
user_mapping_provider:
config:
subject_claim: "id"
localpart_template: "{{ user.login }}"
display_name_template: "{{ user.name }}"
2020-06-03 22:13:17 +02:00
```
2021-08-23 15:58:31 +02:00
### Google
[Google][google-idp] is an OpenID certified authentication and authorisation provider.
2020-06-03 22:13:17 +02:00
1. Set up a project in the Google API Console (see
https://developers.google.com/identity/protocols/oauth2/openid-connect#appsetup).
2021-08-23 15:58:31 +02:00
2. Add an "OAuth Client ID" for a Web Application under "Credentials".
2020-06-03 22:13:17 +02:00
3. Copy the Client ID and Client Secret, and add the following to your synapse config:
```yaml
2021-01-15 17:55:29 +01:00
oidc_providers:
- idp_id: google
idp_name: Google
2021-03-16 12:21:26 +01:00
idp_brand: "google" # optional: styling hint for clients
2021-01-15 17:55:29 +01:00
issuer: "https://accounts.google.com/"
client_id: "your-client-id" # TO BE FILLED
client_secret: "your-client-secret" # TO BE FILLED
scopes: ["openid", "profile"]
user_mapping_provider:
config:
localpart_template: "{{ user.given_name|lower }}"
display_name_template: "{{ user.name }}"
2020-06-03 22:13:17 +02:00
```
4. Back in the Google console, add this Authorized redirect URI: `[synapse
2021-02-01 23:56:01 +01:00
public baseurl]/_synapse/client/oidc/callback`.
2020-06-03 22:13:17 +02:00
### Twitch
1. Setup a developer account on [Twitch ](https://dev.twitch.tv/ )
2. Obtain the OAuth 2.0 credentials by [creating an app ](https://dev.twitch.tv/console/apps/ )
2021-02-01 23:56:01 +01:00
3. Add this OAuth Redirect URL: `[synapse public baseurl]/_synapse/client/oidc/callback`
2020-06-03 22:13:17 +02:00
Synapse config:
```yaml
2021-01-15 17:55:29 +01:00
oidc_providers:
- idp_id: twitch
idp_name: Twitch
issuer: "https://id.twitch.tv/oauth2/"
client_id: "your-client-id" # TO BE FILLED
client_secret: "your-client-secret" # TO BE FILLED
client_auth_method: "client_secret_post"
user_mapping_provider:
config:
localpart_template: "{{ user.preferred_username }}"
display_name_template: "{{ user.name }}"
2020-10-01 19:54:35 +02:00
```
### GitLab
1. Create a [new application ](https://gitlab.com/profile/applications ).
2. Add the `read_user` and `openid` scopes.
2021-02-01 23:56:01 +01:00
3. Add this Callback URL: `[synapse public baseurl]/_synapse/client/oidc/callback`
2020-10-01 19:54:35 +02:00
Synapse config:
```yaml
2021-01-15 17:55:29 +01:00
oidc_providers:
- idp_id: gitlab
idp_name: Gitlab
2021-03-16 12:21:26 +01:00
idp_brand: "gitlab" # optional: styling hint for clients
2021-01-15 17:55:29 +01:00
issuer: "https://gitlab.com/"
client_id: "your-client-id" # TO BE FILLED
client_secret: "your-client-secret" # TO BE FILLED
client_auth_method: "client_secret_post"
scopes: ["openid", "read_user"]
user_profile_method: "userinfo_endpoint"
user_mapping_provider:
config:
localpart_template: '{{ user.nickname }}'
display_name_template: '{{ user.name }}'
2020-06-03 22:13:17 +02:00
```
2021-01-27 23:57:16 +01:00
### Facebook
0. You will need a Facebook developer account. You can register for one
[here ](https://developers.facebook.com/async/registration/ ).
1. On the [apps ](https://developers.facebook.com/apps/ ) page of the developer
console, "Create App", and choose "Build Connected Experiences".
2. Once the app is created, add "Facebook Login" and choose "Web". You don't
need to go through the whole form here.
3. In the left-hand menu, open "Products"/"Facebook Login"/"Settings".
2021-02-01 23:56:01 +01:00
* Add `[synapse public baseurl]/_synapse/client/oidc/callback` as an OAuth Redirect
2021-01-27 23:57:16 +01:00
URL.
4. In the left-hand menu, open "Settings/Basic". Here you can copy the "App ID"
and "App Secret" for use below.
Synapse config:
```yaml
- idp_id: facebook
idp_name: Facebook
2021-03-16 12:21:26 +01:00
idp_brand: "facebook" # optional: styling hint for clients
2021-01-27 23:57:16 +01:00
discover: false
2022-01-17 13:35:00 +01:00
issuer: "https://www.facebook.com"
2021-01-27 23:57:16 +01:00
client_id: "your-client-id" # TO BE FILLED
client_secret: "your-client-secret" # TO BE FILLED
scopes: ["openid", "email"]
2022-01-17 13:35:00 +01:00
authorization_endpoint: "https://facebook.com/dialog/oauth"
token_endpoint: "https://graph.facebook.com/v9.0/oauth/access_token"
jwks_uri: "https://www.facebook.com/.well-known/oauth/openid/jwks/"
2021-01-27 23:57:16 +01:00
user_mapping_provider:
config:
display_name_template: "{{ user.name }}"
2022-01-17 13:35:00 +01:00
email_template: "{{ '{{ user.email }}' }}"
2021-01-27 23:57:16 +01:00
```
Relevant documents:
2022-01-17 13:35:00 +01:00
* [Manually Build a Login Flow ](https://developers.facebook.com/docs/facebook-login/manually-build-a-login-flow )
* [Using Facebook's Graph API ](https://developers.facebook.com/docs/graph-api/using-graph-api/ )
* [Reference to the User endpoint ](https://developers.facebook.com/docs/graph-api/reference/user )
Facebook do have an [OIDC discovery endpoint ](https://www.facebook.com/.well-known/openid-configuration ),
but it has a `response_types_supported` which excludes "code" (which we rely on, and
is even mentioned in their [documentation ](https://developers.facebook.com/docs/facebook-login/manually-build-a-login-flow#login )),
so we have to disable discovery and configure the URIs manually.
2021-02-01 22:21:09 +01:00
### Gitea
Gitea is, like Github, not an OpenID provider, but just an OAuth2 provider.
The [`/user` API endpoint ](https://try.gitea.io/api/swagger#/user/userGetCurrent )
can be used to retrieve information on the authenticated user. As the Synapse
login mechanism needs an attribute to uniquely identify users, and that endpoint
does not return a `sub` property, an alternative `subject_claim` has to be set.
1. Create a new application.
2021-02-16 20:06:55 +01:00
2. Add this Callback URL: `[synapse public baseurl]/_synapse/client/oidc/callback`
2021-02-01 22:21:09 +01:00
Synapse config:
```yaml
oidc_providers:
- idp_id: gitea
idp_name: Gitea
discover: false
issuer: "https://your-gitea.com/"
client_id: "your-client-id" # TO BE FILLED
client_secret: "your-client-secret" # TO BE FILLED
client_auth_method: client_secret_post
scopes: [] # Gitea doesn't support Scopes
authorization_endpoint: "https://your-gitea.com/login/oauth/authorize"
token_endpoint: "https://your-gitea.com/login/oauth/access_token"
userinfo_endpoint: "https://your-gitea.com/api/v1/user"
user_mapping_provider:
config:
subject_claim: "id"
localpart_template: "{{ user.login }}"
2021-03-09 16:03:37 +01:00
display_name_template: "{{ user.full_name }}"
2021-02-01 22:21:09 +01:00
```
2021-02-09 17:54:52 +01:00
### XWiki
Install [OpenID Connect Provider ](https://extensions.xwiki.org/xwiki/bin/view/Extension/OpenID%20Connect/OpenID%20Connect%20Provider/ ) extension in your [XWiki ](https://www.xwiki.org ) instance.
Synapse config:
```yaml
oidc_providers:
- idp_id: xwiki
idp_name: "XWiki"
issuer: "https://myxwikihost/xwiki/oidc/"
client_id: "your-client-id" # TO BE FILLED
2021-03-09 16:03:37 +01:00
client_auth_method: none
2021-02-09 17:54:52 +01:00
scopes: ["openid", "profile"]
user_profile_method: "userinfo_endpoint"
user_mapping_provider:
config:
localpart_template: "{{ user.preferred_username }}"
display_name_template: "{{ user.name }}"
```
2021-03-09 16:03:37 +01:00
2021-07-21 19:48:06 +02:00
### Apple
2021-03-09 16:03:37 +01:00
Configuring "Sign in with Apple" (SiWA) requires an Apple Developer account.
You will need to create a new "Services ID" for SiWA, and create and download a
private key with "SiWA" enabled.
As well as the private key file, you will need:
* Client ID: the "identifier" you gave the "Services ID"
* Team ID: a 10-character ID associated with your developer account.
* Key ID: the 10-character identifier for the key.
https://help.apple.com/developer-account/?lang=en#/dev77c875b7e has more
documentation on setting up SiWA.
The synapse config will look like this:
```yaml
- idp_id: apple
idp_name: Apple
issuer: "https://appleid.apple.com"
client_id: "your-client-id" # Set to the "identifier" for your "ServicesID"
client_auth_method: "client_secret_post"
client_secret_jwt_key:
key_file: "/path/to/AuthKey_KEYIDCODE.p8" # point to your key file
jwt_header:
alg: ES256
kid: "KEYIDCODE" # Set to the 10-char Key ID
jwt_payload:
iss: TEAMIDCODE # Set to the 10-char Team ID
scopes: ["name", "email", "openid"]
authorization_endpoint: https://appleid.apple.com/auth/authorize?response_mode=form_post
user_mapping_provider:
config:
email_template: "{{ user.email }}"
```
2021-08-23 19:12:36 +02:00
2021-12-01 11:57:55 +01:00
### Django OAuth Toolkit
2021-08-23 19:12:36 +02:00
[django-oauth-toolkit ](https://github.com/jazzband/django-oauth-toolkit ) is a
Django application providing out of the box all the endpoints, data and logic
needed to add OAuth2 capabilities to your Django projects. It supports
[OpenID Connect too ](https://django-oauth-toolkit.readthedocs.io/en/latest/oidc.html ).
Configuration on Django's side:
1. Add an application: https://example.com/admin/oauth2_provider/application/add/ and choose parameters like this:
* `Redirect uris` : https://synapse.example.com/_synapse/client/oidc/callback
* `Client type` : `Confidential`
* `Authorization grant type` : `Authorization code`
* `Algorithm` : `HMAC with SHA-2 256`
2. You can [customize the claims ](https://django-oauth-toolkit.readthedocs.io/en/latest/oidc.html#customizing-the-oidc-responses ) Django gives to synapse (optional):
< details >
< summary > Code sample< / summary >
```python
class CustomOAuth2Validator(OAuth2Validator):
def get_additional_claims(self, request):
return {
"sub": request.user.email,
"email": request.user.email,
"first_name": request.user.first_name,
"last_name": request.user.last_name,
}
```
< / details >
Your synapse config is then:
```yaml
oidc_providers:
- idp_id: django_example
idp_name: "Django Example"
issuer: "https://example.com/o/"
client_id: "your-client-id" # CHANGE ME
client_secret: "your-client-secret" # CHANGE ME
scopes: ["openid"]
user_profile_method: "userinfo_endpoint" # needed because oauth-toolkit does not include user information in the authorization response
user_mapping_provider:
config:
localpart_template: "{{ user.email.split('@')[0] }}"
display_name_template: "{{ user.first_name }} {{ user.last_name }}"
email_template: "{{ user.email }}"
```