diff options
| author | Amir Zarrinkafsh <nightah@me.com> | 2020-05-03 02:20:40 +1000 |
|---|---|---|
| committer | GitHub <noreply@github.com> | 2020-05-02 18:20:40 +0200 |
| commit | be0cc72473d30f66aabb1aab4f20e06ae6a44053 (patch) | |
| tree | 7ae60e894c34da99d48aa5491c1254e5daee43e8 /internal/configuration/schema/access_control.go | |
| parent | 310c5dc09b1ae00373f710a60bb63d59f5c91dbc (diff) | |
[CI] Add goconst linter (#961)
* [CI] Add goconst linter
* Implement goconst recommendations
* Rename defaultPolicy to denyPolicy
* Change order for test constants
Co-authored-by: Clément Michaud <clement.michaud34@gmail.com>
Diffstat (limited to 'internal/configuration/schema/access_control.go')
| -rw-r--r-- | internal/configuration/schema/access_control.go | 4 |
1 files changed, 2 insertions, 2 deletions
diff --git a/internal/configuration/schema/access_control.go b/internal/configuration/schema/access_control.go index 79981798e..6db5b8ce6 100644 --- a/internal/configuration/schema/access_control.go +++ b/internal/configuration/schema/access_control.go @@ -17,7 +17,7 @@ type ACLRule struct { // IsPolicyValid check if policy is valid. func IsPolicyValid(policy string) bool { - return policy == "deny" || policy == "one_factor" || policy == "two_factor" || policy == "bypass" + return policy == denyPolicy || policy == "one_factor" || policy == "two_factor" || policy == "bypass" } // IsSubjectValid check if a subject is valid. @@ -63,7 +63,7 @@ type AccessControlConfiguration struct { // Validate validate the access control configuration. func (acc *AccessControlConfiguration) Validate(validator *StructValidator) { if acc.DefaultPolicy == "" { - acc.DefaultPolicy = "deny" + acc.DefaultPolicy = denyPolicy } if !IsPolicyValid(acc.DefaultPolicy) { |
