mirror of
https://github.com/0rangebananaspy/authelia.git
synced 2024-09-14 22:47:21 +07:00
8aade7f40e
* added regulation validator * made regulations find_time and ban_time values duration notation strings * added DefaultRegulationConfiguration for the validator * made session expiration and inactivity values duration notation strings * TOTP period does not need to be converted because adjustment should be discouraged * moved TOTP defaults to DefaultTOTPConfiguration and removed the consts * arranged the root config validator in configuration file order * adjusted tests for the changes * moved duration notation docs to root of configuration * added references to duration notation where applicable * project wide gofmt and goimports: * run gofmt * run goimports -local github.com/authelia/authelia -w on all files * Make jwt_secret error uniform and add tests * now at 100% coverage for internal/configuration/validator/configuration.go
43 lines
1.6 KiB
Go
43 lines
1.6 KiB
Go
package validator
|
|
|
|
import (
|
|
"errors"
|
|
"fmt"
|
|
|
|
"github.com/authelia/authelia/internal/configuration/schema"
|
|
"github.com/authelia/authelia/internal/utils"
|
|
)
|
|
|
|
// ValidateSession validates and update session configuration.
|
|
func ValidateSession(configuration *schema.SessionConfiguration, validator *schema.StructValidator) {
|
|
if configuration.Name == "" {
|
|
configuration.Name = schema.DefaultSessionConfiguration.Name
|
|
}
|
|
|
|
if configuration.Redis != nil && configuration.Secret == "" {
|
|
validator.Push(errors.New("Set secret of the session object"))
|
|
}
|
|
|
|
if configuration.Expiration == "" {
|
|
configuration.Expiration = schema.DefaultSessionConfiguration.Expiration // 1 hour
|
|
} else if _, err := utils.ParseDurationString(configuration.Expiration); err != nil {
|
|
validator.Push(errors.New(fmt.Sprintf("Error occurred parsing session expiration string: %s", err)))
|
|
}
|
|
|
|
if configuration.Inactivity == "" {
|
|
configuration.Inactivity = schema.DefaultSessionConfiguration.Inactivity // 5 min
|
|
} else if _, err := utils.ParseDurationString(configuration.Inactivity); err != nil {
|
|
validator.Push(errors.New(fmt.Sprintf("Error occurred parsing session inactivity string: %s", err)))
|
|
}
|
|
|
|
if configuration.RememberMeDuration == "" {
|
|
configuration.RememberMeDuration = schema.DefaultSessionConfiguration.RememberMeDuration // 1 month
|
|
} else if _, err := utils.ParseDurationString(configuration.RememberMeDuration); err != nil {
|
|
validator.Push(errors.New(fmt.Sprintf("Error occurred parsing session remember_me_duration string: %s", err)))
|
|
}
|
|
|
|
if configuration.Domain == "" {
|
|
validator.Push(errors.New("Set domain of the session object"))
|
|
}
|
|
}
|