mirror of
https://github.com/0rangebananaspy/authelia.git
synced 2024-09-14 22:47:21 +07:00
a44f0cf959
* fix: redis sentinel secret missing * refactor: use consts for authentication_backend.file.password errs * fix: unit test for new default port * test: cover additional misses * test: fix windows/linux specific test error * test: more windows specific tests * test: remove superfluous url.IsAbs * test: validator 100% coverage
100 lines
2.3 KiB
Go
100 lines
2.3 KiB
Go
package configuration
|
|
|
|
import (
|
|
_ "embed" // Embed config.template.yml.
|
|
"errors"
|
|
"fmt"
|
|
"io/ioutil"
|
|
"os"
|
|
"strings"
|
|
|
|
"github.com/spf13/viper"
|
|
"gopkg.in/yaml.v2"
|
|
|
|
"github.com/authelia/authelia/internal/configuration/schema"
|
|
"github.com/authelia/authelia/internal/configuration/validator"
|
|
"github.com/authelia/authelia/internal/logging"
|
|
)
|
|
|
|
// Read a YAML configuration and create a Configuration object out of it.
|
|
func Read(configPath string) (*schema.Configuration, []error) {
|
|
logger := logging.Logger()
|
|
|
|
if configPath == "" {
|
|
return nil, []error{errors.New("No config file path provided")}
|
|
}
|
|
|
|
_, err := os.Stat(configPath)
|
|
if err != nil {
|
|
errs := []error{
|
|
fmt.Errorf("Unable to find config file: %v", configPath),
|
|
fmt.Errorf("Generating config file: %v", configPath),
|
|
}
|
|
|
|
err = generateConfigFromTemplate(configPath)
|
|
if err != nil {
|
|
errs = append(errs, err)
|
|
} else {
|
|
errs = append(errs, fmt.Errorf("Generated configuration at: %v", configPath))
|
|
}
|
|
|
|
return nil, errs
|
|
}
|
|
|
|
file, err := ioutil.ReadFile(configPath)
|
|
if err != nil {
|
|
return nil, []error{fmt.Errorf("Failed to %v", err)}
|
|
}
|
|
|
|
var data interface{}
|
|
|
|
err = yaml.Unmarshal(file, &data)
|
|
if err != nil {
|
|
return nil, []error{fmt.Errorf("Error malformed %v", err)}
|
|
}
|
|
|
|
viper.SetEnvKeyReplacer(strings.NewReplacer(".", "_"))
|
|
|
|
// Dynamically load the secret env names from the SecretNames map.
|
|
for _, secretName := range validator.SecretNames {
|
|
_ = viper.BindEnv(validator.SecretNameToEnvName(secretName))
|
|
}
|
|
|
|
viper.SetConfigFile(configPath)
|
|
|
|
_ = viper.ReadInConfig()
|
|
|
|
var configuration schema.Configuration
|
|
|
|
viper.Unmarshal(&configuration) //nolint:errcheck // TODO: Legacy code, consider refactoring time permitting.
|
|
|
|
val := schema.NewStructValidator()
|
|
validator.ValidateSecrets(&configuration, val, viper.GetViper())
|
|
validator.ValidateConfiguration(&configuration, val)
|
|
validator.ValidateKeys(val, viper.AllKeys())
|
|
|
|
if val.HasErrors() {
|
|
return nil, val.Errors()
|
|
}
|
|
|
|
if val.HasWarnings() {
|
|
for _, warn := range val.Warnings() {
|
|
logger.Warnf(warn.Error())
|
|
}
|
|
}
|
|
|
|
return &configuration, nil
|
|
}
|
|
|
|
//go:embed config.template.yml
|
|
var cfg []byte
|
|
|
|
func generateConfigFromTemplate(configPath string) error {
|
|
err := ioutil.WriteFile(configPath, cfg, 0600)
|
|
if err != nil {
|
|
return fmt.Errorf("Unable to generate %v: %v", configPath, err)
|
|
}
|
|
|
|
return nil
|
|
}
|