mirror of
https://github.com/0rangebananaspy/authelia.git
synced 2024-09-14 22:47:21 +07:00
8aade7f40e
* added regulation validator * made regulations find_time and ban_time values duration notation strings * added DefaultRegulationConfiguration for the validator * made session expiration and inactivity values duration notation strings * TOTP period does not need to be converted because adjustment should be discouraged * moved TOTP defaults to DefaultTOTPConfiguration and removed the consts * arranged the root config validator in configuration file order * adjusted tests for the changes * moved duration notation docs to root of configuration * added references to duration notation where applicable * project wide gofmt and goimports: * run gofmt * run goimports -local github.com/authelia/authelia -w on all files * Make jwt_secret error uniform and add tests * now at 100% coverage for internal/configuration/validator/configuration.go
26 lines
748 B
Go
26 lines
748 B
Go
package validator
|
|
|
|
import (
|
|
"fmt"
|
|
|
|
"github.com/authelia/authelia/internal/configuration/schema"
|
|
)
|
|
|
|
// ValidateTOTP validates and update TOTP configuration.
|
|
func ValidateTOTP(configuration *schema.TOTPConfiguration, validator *schema.StructValidator) {
|
|
if configuration.Issuer == "" {
|
|
configuration.Issuer = schema.DefaultTOTPConfiguration.Issuer
|
|
}
|
|
if configuration.Period == 0 {
|
|
configuration.Period = schema.DefaultTOTPConfiguration.Period
|
|
} else if configuration.Period < 0 {
|
|
validator.Push(fmt.Errorf("TOTP Period must be 1 or more"))
|
|
}
|
|
|
|
if configuration.Skew == nil {
|
|
configuration.Skew = schema.DefaultTOTPConfiguration.Skew
|
|
} else if *configuration.Skew < 0 {
|
|
validator.Push(fmt.Errorf("TOTP Skew must be 0 or more"))
|
|
}
|
|
}
|