authelia/internal/configuration/validator/storage.go

67 lines
2.5 KiB
Go
Raw Normal View History

package validator
import (
"errors"
"github.com/authelia/authelia/v4/internal/configuration/schema"
)
// ValidateStorage validates storage configuration.
func ValidateStorage(configuration schema.StorageConfiguration, validator *schema.StructValidator) {
2019-11-16 19:50:58 +00:00
if configuration.Local == nil && configuration.MySQL == nil && configuration.PostgreSQL == nil {
validator.Push(errors.New("A storage configuration must be provided. It could be 'local', 'mysql' or 'postgres'"))
}
switch {
case configuration.MySQL != nil:
validateMySQLConfiguration(&configuration.MySQL.SQLStorageConfiguration, validator)
case configuration.PostgreSQL != nil:
2019-11-16 19:50:58 +00:00
validatePostgreSQLConfiguration(configuration.PostgreSQL, validator)
case configuration.Local != nil:
validateLocalStorageConfiguration(configuration.Local, validator)
}
if configuration.EncryptionKey == "" {
validator.Push(errors.New("the configuration option storage.encryption_key must be provided"))
} else if len(configuration.EncryptionKey) < 20 {
validator.Push(errors.New("the configuration option storage.encryption_key must be 20 characters or longer"))
}
}
func validateMySQLConfiguration(configuration *schema.SQLStorageConfiguration, validator *schema.StructValidator) {
if configuration.Timeout == 0 {
configuration.Timeout = schema.DefaultMySQLStorageConfiguration.Timeout
}
if configuration.Password == "" || configuration.Username == "" {
validator.Push(errors.New("the SQL username and password must be provided"))
}
if configuration.Database == "" {
validator.Push(errors.New("the SQL database must be provided"))
}
}
2019-11-16 19:50:58 +00:00
func validatePostgreSQLConfiguration(configuration *schema.PostgreSQLStorageConfiguration, validator *schema.StructValidator) {
validateMySQLConfiguration(&configuration.SQLStorageConfiguration, validator)
if configuration.Timeout == 0 {
configuration.Timeout = schema.DefaultPostgreSQLStorageConfiguration.Timeout
}
2019-11-16 19:50:58 +00:00
if configuration.SSLMode == "" {
configuration.SSLMode = testModeDisabled
2019-11-16 19:50:58 +00:00
}
if !(configuration.SSLMode == testModeDisabled || configuration.SSLMode == "require" ||
2019-11-16 19:50:58 +00:00
configuration.SSLMode == "verify-ca" || configuration.SSLMode == "verify-full") {
validator.Push(errors.New("SSL mode must be 'disable', 'require', 'verify-ca', or 'verify-full'"))
2019-11-16 19:50:58 +00:00
}
}
func validateLocalStorageConfiguration(configuration *schema.LocalStorageConfiguration, validator *schema.StructValidator) {
if configuration.Path == "" {
validator.Push(errors.New("A file path must be provided with key 'path'"))
}
}