package validator import ( "fmt" "github.com/authelia/authelia/v4/internal/configuration/schema" "github.com/authelia/authelia/v4/internal/utils" ) // ValidatePasswordPolicy validates and update Password Policy configuration. func ValidatePasswordPolicy(config *schema.PasswordPolicyConfiguration, validator *schema.StructValidator) { if !utils.IsBoolCountLessThanN(1, true, config.Standard.Enabled, config.ZXCVBN.Enabled) { validator.Push(fmt.Errorf(errPasswordPolicyMultipleDefined)) } if config.Standard.Enabled { if config.Standard.MinLength == 0 { config.Standard.MinLength = schema.DefaultPasswordPolicyConfiguration.Standard.MinLength } else if config.Standard.MinLength < 0 { validator.Push(fmt.Errorf(errFmtPasswordPolicyStandardMinLengthNotGreaterThanZero, config.Standard.MinLength)) } if config.Standard.MaxLength == 0 { config.Standard.MaxLength = schema.DefaultPasswordPolicyConfiguration.Standard.MaxLength } } if config.ZXCVBN.Enabled { switch { case config.ZXCVBN.MinScore == 0: config.ZXCVBN.MinScore = schema.DefaultPasswordPolicyConfiguration.ZXCVBN.MinScore case config.ZXCVBN.MinScore < 0, config.ZXCVBN.MinScore > 4: validator.Push(fmt.Errorf(errFmtPasswordPolicyZXCVBNMinScoreInvalid, config.ZXCVBN.MinScore)) } } }