mirror of
https://github.com/superseriousbusiness/gotosocial
synced 2024-11-30 08:10:32 +00:00
183eaa5b29
* love like winter! wohoah, wohoah * domain allow side effects * tests! logging! unallow! * document federation modes * linty linterson * test * further adventures in documentation * finish up domain block documentation (i think) * change wording a wee little bit * docs, example * consolidate shared domainPermission code * call mode once * fetch federation mode within domain blocked func * read domain perm import in streaming manner * don't use pointer to slice for domain perms * don't bother copying blocks + allows before deleting * admonish! * change wording just a scooch * update docs
102 lines
3.3 KiB
Go
102 lines
3.3 KiB
Go
// GoToSocial
|
|
// Copyright (C) GoToSocial Authors admin@gotosocial.org
|
|
// SPDX-License-Identifier: AGPL-3.0-or-later
|
|
//
|
|
// This program is free software: you can redistribute it and/or modify
|
|
// it under the terms of the GNU Affero General Public License as published by
|
|
// the Free Software Foundation, either version 3 of the License, or
|
|
// (at your option) any later version.
|
|
//
|
|
// This program is distributed in the hope that it will be useful,
|
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
// GNU Affero General Public License for more details.
|
|
//
|
|
// You should have received a copy of the GNU Affero General Public License
|
|
// along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
package config
|
|
|
|
import (
|
|
"errors"
|
|
"fmt"
|
|
"strings"
|
|
|
|
"github.com/miekg/dns"
|
|
"github.com/superseriousbusiness/gotosocial/internal/log"
|
|
)
|
|
|
|
// Validate validates global config settings which don't have defaults, to make sure they are set sensibly.
|
|
func Validate() error {
|
|
errs := []error{}
|
|
|
|
// host
|
|
host := GetHost()
|
|
if host == "" {
|
|
errs = append(errs, fmt.Errorf("%s must be set", HostFlag()))
|
|
}
|
|
|
|
// accountDomain; only check if host was set, otherwise there's no point
|
|
if host != "" {
|
|
switch ad := GetAccountDomain(); ad {
|
|
case "":
|
|
SetAccountDomain(GetHost())
|
|
default:
|
|
if !dns.IsSubDomain(ad, host) {
|
|
errs = append(errs, fmt.Errorf("%s was %s and %s was %s, but %s is not a valid subdomain of %s", HostFlag(), host, AccountDomainFlag(), ad, host, ad))
|
|
}
|
|
}
|
|
}
|
|
|
|
// protocol
|
|
switch proto := GetProtocol(); proto {
|
|
case "https":
|
|
// no problem
|
|
break
|
|
case "http":
|
|
log.Warnf(nil, "%s was set to 'http'; this should *only* be used for debugging and tests!", ProtocolFlag())
|
|
case "":
|
|
errs = append(errs, fmt.Errorf("%s must be set", ProtocolFlag()))
|
|
default:
|
|
errs = append(errs, fmt.Errorf("%s must be set to either http or https, provided value was %s", ProtocolFlag(), proto))
|
|
}
|
|
|
|
// federation mode
|
|
switch federationMode := GetInstanceFederationMode(); federationMode {
|
|
case InstanceFederationModeBlocklist, InstanceFederationModeAllowlist:
|
|
// no problem
|
|
break
|
|
case "":
|
|
errs = append(errs, fmt.Errorf("%s must be set", InstanceFederationModeFlag()))
|
|
default:
|
|
errs = append(errs, fmt.Errorf("%s must be set to either blocklist or allowlist, provided value was %s", InstanceFederationModeFlag(), federationMode))
|
|
}
|
|
|
|
webAssetsBaseDir := GetWebAssetBaseDir()
|
|
if webAssetsBaseDir == "" {
|
|
errs = append(errs, fmt.Errorf("%s must be set", WebAssetBaseDirFlag()))
|
|
}
|
|
|
|
tlsChain := GetTLSCertificateChain()
|
|
tlsKey := GetTLSCertificateKey()
|
|
tlsChainFlag := TLSCertificateChainFlag()
|
|
tlsKeyFlag := TLSCertificateKeyFlag()
|
|
|
|
if GetLetsEncryptEnabled() && (tlsChain != "" || tlsKey != "") {
|
|
errs = append(errs, fmt.Errorf("%s cannot be enabled when %s and/or %s are also set", LetsEncryptEnabledFlag(), tlsChainFlag, tlsKeyFlag))
|
|
}
|
|
|
|
if (tlsChain != "" && tlsKey == "") || (tlsChain == "" && tlsKey != "") {
|
|
errs = append(errs, fmt.Errorf("%s and %s need to both be set or unset", tlsChainFlag, tlsKeyFlag))
|
|
}
|
|
|
|
if len(errs) > 0 {
|
|
errStrings := []string{}
|
|
for _, err := range errs {
|
|
errStrings = append(errStrings, err.Error())
|
|
}
|
|
return errors.New(strings.Join(errStrings, "; "))
|
|
}
|
|
|
|
return nil
|
|
}
|