summaryrefslogtreecommitdiff
path: root/internal/configuration/schema/access_control.go
diff options
context:
space:
mode:
authorAmir Zarrinkafsh <nightah@me.com>2020-05-03 02:20:40 +1000
committerGitHub <noreply@github.com>2020-05-02 18:20:40 +0200
commitbe0cc72473d30f66aabb1aab4f20e06ae6a44053 (patch)
tree7ae60e894c34da99d48aa5491c1254e5daee43e8 /internal/configuration/schema/access_control.go
parent310c5dc09b1ae00373f710a60bb63d59f5c91dbc (diff)
[CI] Add goconst linter (#961)
* [CI] Add goconst linter * Implement goconst recommendations * Rename defaultPolicy to denyPolicy * Change order for test constants Co-authored-by: Clément Michaud <clement.michaud34@gmail.com>
Diffstat (limited to 'internal/configuration/schema/access_control.go')
-rw-r--r--internal/configuration/schema/access_control.go4
1 files changed, 2 insertions, 2 deletions
diff --git a/internal/configuration/schema/access_control.go b/internal/configuration/schema/access_control.go
index 79981798e..6db5b8ce6 100644
--- a/internal/configuration/schema/access_control.go
+++ b/internal/configuration/schema/access_control.go
@@ -17,7 +17,7 @@ type ACLRule struct {
// IsPolicyValid check if policy is valid.
func IsPolicyValid(policy string) bool {
- return policy == "deny" || policy == "one_factor" || policy == "two_factor" || policy == "bypass"
+ return policy == denyPolicy || policy == "one_factor" || policy == "two_factor" || policy == "bypass"
}
// IsSubjectValid check if a subject is valid.
@@ -63,7 +63,7 @@ type AccessControlConfiguration struct {
// Validate validate the access control configuration.
func (acc *AccessControlConfiguration) Validate(validator *StructValidator) {
if acc.DefaultPolicy == "" {
- acc.DefaultPolicy = "deny"
+ acc.DefaultPolicy = denyPolicy
}
if !IsPolicyValid(acc.DefaultPolicy) {