refactor: password requirements variables;
refactor: password validation function moved to custom validators; refactor: adjusted model's validation fields
This commit is contained in:
@@ -25,25 +25,27 @@ import (
|
||||
)
|
||||
|
||||
type Config struct {
|
||||
Hostname string `mapstructure:"HOSTNAME"`
|
||||
Port string `mapstructure:"PORT"`
|
||||
Hostname string `mapstructure:"HOSTNAME"`
|
||||
Port string `mapstructure:"PORT"`
|
||||
|
||||
DatabaseUrl string `mapstructure:"POSTGRES_URL"`
|
||||
RedisUrl string `mapstructure:"REDIS_URL"`
|
||||
MinioUrl string `mapstructure:"MINIO_URL"`
|
||||
DatabaseUrl string `mapstructure:"POSTGRES_URL"`
|
||||
RedisUrl string `mapstructure:"REDIS_URL"`
|
||||
MinioUrl string `mapstructure:"MINIO_URL"`
|
||||
|
||||
JwtAlgorithm string `mapstructure:"JWT_ALGORITHM"`
|
||||
JwtSecret string `mapstructure:"JWT_SECRET"`
|
||||
JwtIssuer string `mapstructure:"JWT_ISSUER"`
|
||||
JwtAudience string `mapstructure:"JWT_AUDIENCE"`
|
||||
JwtExpAccess int `mapstructure:"JWT_EXP_ACCESS"`
|
||||
JwtExpRefresh int `mapstructure:"JWT_EXP_REFRESH"`
|
||||
JwtAlgorithm string `mapstructure:"JWT_ALGORITHM"`
|
||||
JwtSecret string `mapstructure:"JWT_SECRET"`
|
||||
JwtIssuer string `mapstructure:"JWT_ISSUER"`
|
||||
JwtAudience string `mapstructure:"JWT_AUDIENCE"`
|
||||
JwtExpAccess int `mapstructure:"JWT_EXP_ACCESS"`
|
||||
JwtExpRefresh int `mapstructure:"JWT_EXP_REFRESH"`
|
||||
|
||||
PasswordCheckLength bool `mapstructure:"PASSWORD_CHECK_LENGTH"`
|
||||
PasswordCheckNumbers bool `mapstructure:"PASSWORD_CHECK_NUMBERS"`
|
||||
PasswordCheckCases bool `mapstructure:"PASSWORD_CHECK_CASES"`
|
||||
PasswordCheckSymbols bool `mapstructure:"PASSWORD_CHECK_SYMBOLS"`
|
||||
PasswordCheckLeaked bool `mapstructure:"PASSWORD_CHECK_LEAKED"`
|
||||
PasswordMinLength int `mapstructure:"PASSWORD_MIN_LENGTH"`
|
||||
PasswordMaxLength int `mapstructure:"PASSWORD_MIN_LENGTH"`
|
||||
PasswordCheckNumbers bool `mapstructure:"PASSWORD_CHECK_NUMBERS"`
|
||||
PasswordCheckCharacters bool `mapstructure:"PASSWORD_CHECK_CHARACTERS"`
|
||||
PasswordCheckCases bool `mapstructure:"PASSWORD_CHECK_CASES"`
|
||||
PasswordCheckSymbols bool `mapstructure:"PASSWORD_CHECK_SYMBOLS"`
|
||||
PasswordCheckLeaked bool `mapstructure:"PASSWORD_CHECK_LEAKED"`
|
||||
|
||||
Environment string `mapstructure:"ENVIRONMENT"`
|
||||
}
|
||||
@@ -60,8 +62,10 @@ func Load() (*Config, error) {
|
||||
viper.SetDefault("JWT_AUDIENCE", "easywish")
|
||||
viper.SetDefault("JWT_ISSUER", "easywish")
|
||||
|
||||
viper.SetDefault("PASSWORD_CHECK_LENGTH", true)
|
||||
viper.SetDefault("PASSWORD_MIN_LENGTH", 6)
|
||||
viper.SetDefault("PASSWORD_MAX_LENGTH", 100)
|
||||
viper.SetDefault("PASSWORD_CHECK_NUMBERS", false)
|
||||
viper.SetDefault("PASSWORD_CHECK_CHARACTERS", false)
|
||||
viper.SetDefault("PASSWORD_CHECK_CASES", false)
|
||||
viper.SetDefault("PASSWORD_CHECK_SYMBOLS", false)
|
||||
viper.SetDefault("PASSWORD_CHECK_LEAKED", false)
|
||||
@@ -89,8 +93,10 @@ func Load() (*Config, error) {
|
||||
viper.BindEnv("JWT_EXP_ACCESS")
|
||||
viper.BindEnv("JWT_EXP_REFRESH")
|
||||
|
||||
viper.BindEnv("PASSWORD_CHECK_LENGTH")
|
||||
viper.BindEnv("PASSWORD_MIN_LENGTH")
|
||||
viper.BindEnv("PASSWORD_MAX_LENGTH")
|
||||
viper.BindEnv("PASSWORD_CHECK_NUMBERS")
|
||||
viper.BindEnv("PASSWORD_CHECK_CHARACTERS")
|
||||
viper.BindEnv("PASSWORD_CHECK_CASES")
|
||||
viper.BindEnv("PASSWORD_CHECK_SYMBOLS")
|
||||
viper.BindEnv("PASSWORD_CHECK_LEAKED")
|
||||
|
||||
Reference in New Issue
Block a user