diff options
| author | James Elliott <james-d-elliott@users.noreply.github.com> | 2022-11-24 10:16:23 +1100 |
|---|---|---|
| committer | GitHub <noreply@github.com> | 2022-11-24 10:16:23 +1100 |
| commit | 203cb19c2f2da02eb1fdfcd1ead13f10f5f05e8f (patch) | |
| tree | 5decf92a40e6c8b727bb840cabb94fa540d63497 /internal/configuration/validator/access_control_test.go | |
| parent | b295bf55a9f2f3b7858fd9c25bfb61cf0c8aa3b2 (diff) | |
fix(configuration): missing warning about session domain (#4417)
This adds some helpful configuration warnings and fixes a few misconfiguration issues.
Diffstat (limited to 'internal/configuration/validator/access_control_test.go')
| -rw-r--r-- | internal/configuration/validator/access_control_test.go | 16 |
1 files changed, 16 insertions, 0 deletions
diff --git a/internal/configuration/validator/access_control_test.go b/internal/configuration/validator/access_control_test.go index ae7dabb18..0671455a1 100644 --- a/internal/configuration/validator/access_control_test.go +++ b/internal/configuration/validator/access_control_test.go @@ -88,6 +88,22 @@ func (suite *AccessControl) TestShouldRaiseErrorInvalidNetworkGroupNetwork() { suite.Assert().EqualError(suite.validator.Errors()[0], "access control: networks: network group 'internal' is invalid: the network 'abc.def.ghi.jkl' is not a valid IP or CIDR notation") } +func (suite *AccessControl) TestShouldRaiseWarningOnBadDomain() { + suite.config.AccessControl.Rules = []schema.ACLRule{ + { + Domains: []string{"*example.com"}, + Policy: "one_factor", + }, + } + + ValidateRules(suite.config, suite.validator) + + suite.Assert().Len(suite.validator.Warnings(), 1) + suite.Require().Len(suite.validator.Errors(), 0) + + suite.Assert().EqualError(suite.validator.Warnings()[0], "access control: rule #1: domain #1: domain '*example.com' is ineffective and should probably be '*.example.com' instead") +} + func (suite *AccessControl) TestShouldRaiseErrorWithNoRulesDefined() { suite.config.AccessControl.Rules = []schema.ACLRule{} |
