package parser import ( "errors" "fmt" "github.com/go-ldap/ldap/v3" ociscfg "github.com/owncloud/ocis/v2/ocis-pkg/config" defaults2 "github.com/owncloud/ocis/v2/ocis-pkg/config/defaults" "github.com/owncloud/ocis/v2/ocis-pkg/shared" "github.com/owncloud/ocis/v2/services/graph/pkg/config" "github.com/owncloud/ocis/v2/services/graph/pkg/config/defaults" "github.com/owncloud/ocis/v2/ocis-pkg/config/envdecode" ) // ParseConfig loads configuration from known paths. func ParseConfig(cfg *config.Config) error { _, err := ociscfg.BindSourcesToStructs(cfg.Service.Name, cfg) if err != nil { return err } defaults.EnsureDefaults(cfg) // load all env variables relevant to the config in the current context. if err := envdecode.Decode(cfg); err != nil { // no environment variable set for this config is an expected "error" if !errors.Is(err, envdecode.ErrNoTargetFieldsAreSet) { return err } } defaults.Sanitize(cfg) return Validate(cfg) } func Validate(cfg *config.Config) error { if cfg.TokenManager.JWTSecret == "" { return shared.MissingJWTTokenError(cfg.Service.Name) } if cfg.Identity.Backend == "ldap" { if err := validateLDAPSettings(cfg); err != nil { return err } } if cfg.Application.ID == "" { return fmt.Errorf("The application ID has not been configured for %s. "+ "Make sure your %s config contains the proper values "+ "(e.g. by running ocis init or setting it manually in "+ "the config/corresponding environment variable).", "graph", defaults2.BaseConfigPath()) } switch cfg.API.UsernameMatch { case "default", "none": default: return fmt.Errorf("The username match validator is invalid for %s. "+ "Make sure your %s config contains the proper values "+ "(e.g. by running ocis init or setting it manually in "+ "the config/corresponding environment variable).", "graph", defaults2.BaseConfigPath()) } if cfg.ServiceAccount.ServiceAccountID == "" { return shared.MissingServiceAccountID(cfg.Service.Name) } if cfg.ServiceAccount.ServiceAccountSecret == "" { return shared.MissingServiceAccountSecret(cfg.Service.Name) } return nil } func validateLDAPSettings(cfg *config.Config) error { if cfg.Identity.LDAP.BindPassword == "" { return shared.MissingLDAPBindPassword(cfg.Service.Name) } // ensure that "GroupBaseDN" is below "GroupBaseDN" if cfg.Identity.LDAP.WriteEnabled && cfg.Identity.LDAP.GroupCreateBaseDN != cfg.Identity.LDAP.GroupBaseDN { baseDN, err := ldap.ParseDN(cfg.Identity.LDAP.GroupBaseDN) if err != nil { return fmt.Errorf("Unable to parse the LDAP Group Base DN '%s': %w ", cfg.Identity.LDAP.GroupBaseDN, err) } createBaseDN, err := ldap.ParseDN(cfg.Identity.LDAP.GroupCreateBaseDN) if err != nil { return fmt.Errorf("Unable to parse the LDAP Group Create Base DN '%s': %w ", cfg.Identity.LDAP.GroupCreateBaseDN, err) } if !baseDN.AncestorOfFold(createBaseDN) { return fmt.Errorf("The LDAP Group Create Base DN (%s) must be subordinate to the LDAP Group Base DN (%s)", cfg.Identity.LDAP.GroupCreateBaseDN, cfg.Identity.LDAP.GroupBaseDN) } } return nil }