Files
insertr/internal/config/validation.go
Joakim dc801fb26b Remove internal/content package and use engine directly
- Eliminate content.Enhancer wrapper around engine.ContentEngine
- Update cmd/enhance.go to call engine.ProcessFile/ProcessDirectory directly
- Update sites/manager.go to use engine.NewContentEngineWithAuth directly
- Remove unused EnhancementConfig and discovery configuration logic
- Simplify enhance command to use input path as site ID
- Remove CLI config dependency from config package
2025-10-23 22:32:42 +02:00

170 lines
3.7 KiB
Go

package config
import (
"fmt"
"net/url"
"os"
"path/filepath"
"slices"
"strings"
)
func validate(config *Config) error {
if err := validateDatabase(config.Database); err != nil {
return fmt.Errorf("database config: %w", err)
}
if err := validateAPI(config.API); err != nil {
return fmt.Errorf("api config: %w", err)
}
if err := validateServer(config.Server); err != nil {
return fmt.Errorf("server config: %w", err)
}
if err := validateAuth(config.Auth); err != nil {
return fmt.Errorf("auth config: %w", err)
}
return nil
}
func validateDatabase(config DatabaseConfig) error {
if config.Path == "" {
return fmt.Errorf("path is required")
}
if strings.Contains(config.Path, "postgres://") || strings.Contains(config.Path, "postgresql://") {
if _, err := url.Parse(config.Path); err != nil {
return fmt.Errorf("invalid PostgreSQL connection string: %w", err)
}
return nil
}
dir := filepath.Dir(config.Path)
if _, err := os.Stat(dir); os.IsNotExist(err) {
return fmt.Errorf("database directory does not exist: %s", dir)
}
return nil
}
func validateAPI(config APIConfig) error {
if config.URL != "" {
if _, err := url.Parse(config.URL); err != nil {
return fmt.Errorf("invalid URL: %w", err)
}
}
if config.URL != "" && config.Key == "" {
return fmt.Errorf("api key is required when api url is specified")
}
return nil
}
func validateServer(config ServerConfig) error {
if config.Port < 1 || config.Port > 65535 {
return fmt.Errorf("port must be between 1 and 65535, got %d", config.Port)
}
if config.Host == "" {
return fmt.Errorf("host is required")
}
siteIDs := make(map[string]bool)
for i, site := range config.Sites {
if err := validateSite(site); err != nil {
return fmt.Errorf("site %d: %w", i, err)
}
if siteIDs[site.SiteID] {
return fmt.Errorf("duplicate site_id: %s", site.SiteID)
}
siteIDs[site.SiteID] = true
}
return nil
}
func validateSite(config SiteConfig) error {
if config.SiteID == "" {
return fmt.Errorf("site_id is required")
}
if config.Path == "" {
return fmt.Errorf("path is required")
}
if config.SourcePath != "" {
if _, err := os.Stat(config.SourcePath); os.IsNotExist(err) {
return fmt.Errorf("source_path does not exist: %s", config.SourcePath)
}
}
if config.Discovery != nil {
if err := validateDiscovery(*config.Discovery); err != nil {
return fmt.Errorf("discovery config: %w", err)
}
}
return nil
}
func validateDiscovery(config DiscoveryConfig) error {
return nil
}
func validateAuth(config AuthConfig) error {
if config.Provider == "" {
return fmt.Errorf("provider is required")
}
validProviders := []string{"mock", "authentik"}
valid := slices.Contains(validProviders, config.Provider)
if !valid {
return fmt.Errorf("invalid provider %q, must be one of: %s", config.Provider, strings.Join(validProviders, ", "))
}
if config.Provider == "authentik" {
if config.OIDC == nil {
return fmt.Errorf("oidc config is required for authentik provider")
}
if err := validateOIDC(*config.OIDC); err != nil {
return fmt.Errorf("oidc config: %w", err)
}
}
if config.JWTSecret == "" {
return fmt.Errorf("jwt_secret is required")
}
return nil
}
func validateOIDC(config OIDCConfig) error {
if config.Endpoint == "" {
return fmt.Errorf("endpoint is required")
}
if _, err := url.Parse(config.Endpoint); err != nil {
return fmt.Errorf("invalid endpoint URL: %w", err)
}
if config.ClientID == "" {
return fmt.Errorf("client_id is required")
}
if config.ClientSecret == "" {
return fmt.Errorf("client_secret is required")
}
if config.RedirectURL != "" {
if _, err := url.Parse(config.RedirectURL); err != nil {
return fmt.Errorf("invalid redirect_url: %w", err)
}
}
return nil
}