2019-04-25 04:52:08 +07:00
|
|
|
package validator
|
|
|
|
|
|
|
|
import (
|
|
|
|
"fmt"
|
2021-01-04 17:28:55 +07:00
|
|
|
"os"
|
2019-04-25 04:52:08 +07:00
|
|
|
|
2021-08-11 08:04:35 +07:00
|
|
|
"github.com/authelia/authelia/v4/internal/configuration/schema"
|
|
|
|
"github.com/authelia/authelia/v4/internal/utils"
|
2019-04-25 04:52:08 +07:00
|
|
|
)
|
|
|
|
|
2020-04-23 08:11:32 +07:00
|
|
|
// ValidateConfiguration and adapt the configuration read from file.
|
|
|
|
func ValidateConfiguration(configuration *schema.Configuration, validator *schema.StructValidator) {
|
2021-01-04 17:28:55 +07:00
|
|
|
if configuration.CertificatesDirectory != "" {
|
|
|
|
info, err := os.Stat(configuration.CertificatesDirectory)
|
|
|
|
if err != nil {
|
|
|
|
validator.Push(fmt.Errorf("Error checking certificate directory: %v", err))
|
|
|
|
} else if !info.IsDir() {
|
|
|
|
validator.Push(fmt.Errorf("The path %s specified for certificate_directory is not a directory", configuration.CertificatesDirectory))
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-04-05 19:37:21 +07:00
|
|
|
if configuration.JWTSecret == "" {
|
|
|
|
validator.Push(fmt.Errorf("Provide a JWT secret using \"jwt_secret\" key"))
|
|
|
|
}
|
|
|
|
|
2020-02-01 19:54:50 +07:00
|
|
|
if configuration.DefaultRedirectionURL != "" {
|
feat(oidc): add additional config options, accurate token times, and refactoring (#1991)
* This gives admins more control over their OIDC installation exposing options that had defaults before. Things like lifespans for authorize codes, access tokens, id tokens, refresh tokens, a option to enable the debug client messages, minimum parameter entropy. It also allows admins to configure the response modes.
* Additionally this records specific values about a users session indicating when they performed a specific authz factor so this is represented in the token accurately.
* Lastly we also implemented a OIDC key manager which calculates the kid for jwk's using the SHA1 digest instead of being static, or more specifically the first 7 chars. As per https://datatracker.ietf.org/doc/html/draft-ietf-jose-json-web-key#section-8.1.1 the kid should not exceed 8 chars. While it's allowed to exceed 8 chars, it must only be done so with a compelling reason, which we do not have.
2021-07-04 06:44:30 +07:00
|
|
|
err := utils.IsStringAbsURL(configuration.DefaultRedirectionURL)
|
2020-02-01 19:54:50 +07:00
|
|
|
if err != nil {
|
feat(oidc): add additional config options, accurate token times, and refactoring (#1991)
* This gives admins more control over their OIDC installation exposing options that had defaults before. Things like lifespans for authorize codes, access tokens, id tokens, refresh tokens, a option to enable the debug client messages, minimum parameter entropy. It also allows admins to configure the response modes.
* Additionally this records specific values about a users session indicating when they performed a specific authz factor so this is represented in the token accurately.
* Lastly we also implemented a OIDC key manager which calculates the kid for jwk's using the SHA1 digest instead of being static, or more specifically the first 7 chars. As per https://datatracker.ietf.org/doc/html/draft-ietf-jose-json-web-key#section-8.1.1 the kid should not exceed 8 chars. While it's allowed to exceed 8 chars, it must only be done so with a compelling reason, which we do not have.
2021-07-04 06:44:30 +07:00
|
|
|
validator.Push(fmt.Errorf("Value for \"default_redirection_url\" is invalid: %+v", err))
|
2020-02-01 19:54:50 +07:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-01-20 19:07:40 +07:00
|
|
|
ValidateTheme(configuration, validator)
|
|
|
|
|
2020-04-05 19:37:21 +07:00
|
|
|
if configuration.TOTP == nil {
|
2020-04-30 09:03:05 +07:00
|
|
|
configuration.TOTP = &schema.DefaultTOTPConfiguration
|
2019-04-25 04:52:08 +07:00
|
|
|
}
|
2020-05-06 02:35:32 +07:00
|
|
|
|
2021-06-01 11:09:50 +07:00
|
|
|
ValidateLogging(configuration, validator)
|
|
|
|
|
2020-04-05 19:37:21 +07:00
|
|
|
ValidateTOTP(configuration.TOTP, validator)
|
2019-04-25 04:52:08 +07:00
|
|
|
|
|
|
|
ValidateAuthenticationBackend(&configuration.AuthenticationBackend, validator)
|
2020-04-05 19:37:21 +07:00
|
|
|
|
2021-06-01 11:09:50 +07:00
|
|
|
ValidateAccessControl(&configuration.AccessControl, validator)
|
2021-01-04 17:55:23 +07:00
|
|
|
|
2021-04-14 17:53:23 +07:00
|
|
|
ValidateRules(configuration.AccessControl, validator)
|
2021-01-04 17:55:23 +07:00
|
|
|
|
2019-04-25 04:52:08 +07:00
|
|
|
ValidateSession(&configuration.Session, validator)
|
|
|
|
|
2020-04-05 19:37:21 +07:00
|
|
|
if configuration.Regulation == nil {
|
2020-04-30 09:03:05 +07:00
|
|
|
configuration.Regulation = &schema.DefaultRegulationConfiguration
|
2019-04-25 04:52:08 +07:00
|
|
|
}
|
2020-05-06 02:35:32 +07:00
|
|
|
|
2020-04-05 19:37:21 +07:00
|
|
|
ValidateRegulation(configuration.Regulation, validator)
|
|
|
|
|
2021-08-02 18:55:30 +07:00
|
|
|
ValidateServer(configuration, validator)
|
2020-04-30 09:03:05 +07:00
|
|
|
|
2020-04-05 19:37:21 +07:00
|
|
|
ValidateStorage(configuration.Storage, validator)
|
2019-11-17 02:50:58 +07:00
|
|
|
|
2020-01-22 03:15:40 +07:00
|
|
|
if configuration.Notifier == nil {
|
|
|
|
validator.Push(fmt.Errorf("A notifier configuration must be provided"))
|
|
|
|
} else {
|
|
|
|
ValidateNotifier(configuration.Notifier, validator)
|
|
|
|
}
|
2021-05-05 05:06:05 +07:00
|
|
|
|
|
|
|
ValidateIdentityProviders(&configuration.IdentityProviders, validator)
|
2021-09-17 11:44:35 +07:00
|
|
|
|
|
|
|
if configuration.NTP == nil {
|
|
|
|
configuration.NTP = &schema.DefaultNTPConfiguration
|
|
|
|
}
|
|
|
|
|
|
|
|
ValidateNTP(configuration.NTP, validator)
|
2019-04-25 04:52:08 +07:00
|
|
|
}
|