3
0
mirror of https://github.com/ergochat/ergo.git synced 2024-11-23 04:19:25 +01:00
ergo/irc/config.go

696 lines
20 KiB
Go
Raw Normal View History

// Copyright (c) 2012-2014 Jeremy Latt
// Copyright (c) 2014-2015 Edmund Huber
2017-03-27 14:15:02 +02:00
// Copyright (c) 2016-2017 Daniel Oaks <daniel@danieloaks.net>
// released under the MIT license
2014-02-09 16:53:42 +01:00
package irc
import (
"crypto/tls"
"encoding/json"
"errors"
"fmt"
"io/ioutil"
2014-02-24 07:21:39 +01:00
"log"
2018-01-22 08:30:31 +01:00
"path/filepath"
2018-04-19 08:48:19 +02:00
"regexp"
"strings"
"time"
2017-10-05 16:03:53 +02:00
"code.cloudfoundry.org/bytefmt"
"github.com/oragono/oragono/irc/connection_limits"
2017-06-14 20:00:53 +02:00
"github.com/oragono/oragono/irc/custime"
2018-02-03 10:46:14 +01:00
"github.com/oragono/oragono/irc/languages"
2017-06-14 20:00:53 +02:00
"github.com/oragono/oragono/irc/logger"
2018-04-23 00:47:10 +02:00
"github.com/oragono/oragono/irc/modes"
2017-10-05 16:03:53 +02:00
"github.com/oragono/oragono/irc/passwd"
"github.com/oragono/oragono/irc/utils"
"gopkg.in/yaml.v2"
2014-02-09 16:53:42 +01:00
)
2017-04-16 03:31:33 +02:00
// PassConfig holds the connection password.
type PassConfig struct {
Password string
}
2017-04-16 03:31:33 +02:00
// TLSListenConfig defines configuration options for listening on TLS.
type TLSListenConfig struct {
Cert string
Key string
}
2017-04-16 03:31:33 +02:00
// Config returns the TLS contiguration assicated with this TLSListenConfig.
func (conf *TLSListenConfig) Config() (*tls.Config, error) {
cert, err := tls.LoadX509KeyPair(conf.Cert, conf.Key)
if err != nil {
2018-02-03 13:03:36 +01:00
return nil, ErrInvalidCertKeyPair
}
return &tls.Config{
Certificates: []tls.Certificate{cert},
}, err
}
2017-04-16 03:31:33 +02:00
// PasswordBytes returns the bytes represented by the password hash.
func (conf *PassConfig) PasswordBytes() []byte {
2017-10-05 16:03:53 +02:00
bytes, err := passwd.DecodePasswordHash(conf.Password)
2014-02-24 07:21:39 +01:00
if err != nil {
2014-03-06 08:07:55 +01:00
log.Fatal("decode password error: ", err)
2014-02-24 07:21:39 +01:00
}
return bytes
}
type AccountConfig struct {
Registration AccountRegistrationConfig
AuthenticationEnabled bool `yaml:"authentication-enabled"`
2018-02-27 03:44:03 +01:00
SkipServerPassword bool `yaml:"skip-server-password"`
NickReservation NickReservationConfig `yaml:"nick-reservation"`
2018-04-23 08:38:35 +02:00
VHosts VHostConfig
}
2017-04-16 03:31:33 +02:00
// AccountRegistrationConfig controls account registration.
type AccountRegistrationConfig struct {
Enabled bool
EnabledCallbacks []string `yaml:"enabled-callbacks"`
EnabledCredentialTypes []string `yaml:"-"`
VerifyTimeout time.Duration `yaml:"verify-timeout"`
Callbacks struct {
Mailto struct {
Server string
Port int
TLS struct {
Enabled bool
InsecureSkipVerify bool `yaml:"insecure_skip_verify"`
ServerName string `yaml:"servername"`
}
Username string
Password string
Sender string
VerifyMessageSubject string `yaml:"verify-message-subject"`
VerifyMessage string `yaml:"verify-message"`
}
}
AllowMultiplePerConnection bool `yaml:"allow-multiple-per-connection"`
}
2018-04-23 08:38:35 +02:00
type VHostConfig struct {
Enabled bool
MaxLength int `yaml:"max-length"`
ValidRegexpRaw string `yaml:"valid-regexp"`
ValidRegexp *regexp.Regexp
UserRequests struct {
Enabled bool
Channel string
Cooldown time.Duration
} `yaml:"user-requests"`
2018-04-19 08:48:19 +02:00
}
type NickReservationMethod int
const (
NickReservationWithTimeout NickReservationMethod = iota
NickReservationStrict
)
func (nr *NickReservationMethod) UnmarshalYAML(unmarshal func(interface{}) error) error {
var orig, raw string
var err error
if err = unmarshal(&orig); err != nil {
return err
}
if raw, err = Casefold(orig); err != nil {
return err
}
if raw == "timeout" {
*nr = NickReservationWithTimeout
} else if raw == "strict" {
*nr = NickReservationStrict
} else {
return errors.New(fmt.Sprintf("invalid nick-reservation.method value: %s", orig))
}
return nil
}
type NickReservationConfig struct {
Enabled bool
AdditionalNickLimit int `yaml:"additional-nick-limit"`
Method NickReservationMethod
RenameTimeout time.Duration `yaml:"rename-timeout"`
RenamePrefix string `yaml:"rename-prefix"`
}
2017-04-16 03:31:33 +02:00
// ChannelRegistrationConfig controls channel registration.
type ChannelRegistrationConfig struct {
Enabled bool
}
2017-04-16 03:31:33 +02:00
// OperClassConfig defines a specific operator class.
type OperClassConfig struct {
Title string
WhoisLine string
Extends string
Capabilities []string
}
2017-04-16 03:31:33 +02:00
// OperConfig defines a specific operator's configuration.
type OperConfig struct {
Class string
Vhost string
WhoisLine string `yaml:"whois-line"`
Password string
2017-05-08 01:15:16 +02:00
Modes string
}
// PasswordBytes returns the bytes represented by the password hash.
func (conf *OperConfig) PasswordBytes() []byte {
2017-10-05 16:03:53 +02:00
bytes, err := passwd.DecodePasswordHash(conf.Password)
if err != nil {
log.Fatal("decode password error: ", err)
}
return bytes
}
2017-04-16 03:31:33 +02:00
// LineLenConfig controls line lengths.
type LineLenConfig struct {
Tags int
Rest int
}
2017-04-16 03:31:33 +02:00
// STSConfig controls the STS configuration/
type STSConfig struct {
Enabled bool
Duration time.Duration `yaml:"duration-real"`
DurationString string `yaml:"duration"`
Port int
Preload bool
}
// Value returns the STS value to advertise in CAP
func (sts *STSConfig) Value() string {
2018-01-28 01:52:07 +01:00
val := fmt.Sprintf("duration=%d", int(sts.Duration.Seconds()))
if sts.Enabled && sts.Port > 0 {
val += fmt.Sprintf(",port=%d", sts.Port)
}
if sts.Enabled && sts.Preload {
val += ",preload"
}
return val
}
2017-04-30 04:35:07 +02:00
// StackImpactConfig is the config used for StackImpact's profiling.
type StackImpactConfig struct {
Enabled bool
AgentKey string `yaml:"agent-key"`
AppName string `yaml:"app-name"`
}
2018-03-22 16:04:21 +01:00
type FakelagConfig struct {
Enabled bool
Window time.Duration
BurstLimit uint `yaml:"burst-limit"`
MessagesPerWindow uint `yaml:"messages-per-window"`
Cooldown time.Duration
2018-03-22 16:04:21 +01:00
}
2017-04-16 03:31:33 +02:00
// Config defines the overall configuration.
2014-02-09 16:53:42 +01:00
type Config struct {
2016-04-12 07:44:00 +02:00
Network struct {
Name string
}
Server struct {
PassConfig
Password string
Name string
Listen []string
TLSListeners map[string]*TLSListenConfig `yaml:"tls-listeners"`
STS STSConfig
CheckIdent bool `yaml:"check-ident"`
MOTD string
2017-10-15 08:18:14 +02:00
MOTDFormatting bool `yaml:"motd-formatting"`
ProxyAllowedFrom []string `yaml:"proxy-allowed-from"`
WebIRC []webircConfig `yaml:"webirc"`
MaxSendQString string `yaml:"max-sendq"`
2018-03-18 02:32:12 +01:00
MaxSendQBytes int
ConnectionLimiter connection_limits.LimiterConfig `yaml:"connection-limits"`
ConnectionThrottler connection_limits.ThrottlerConfig `yaml:"connection-throttling"`
}
Languages struct {
Enabled bool
Path string
2018-01-22 08:30:31 +01:00
Default string
2018-02-03 10:46:14 +01:00
Data map[string]languages.LangData
}
Datastore struct {
Path string
2018-04-20 09:57:48 +02:00
AutoUpgrade bool
}
Accounts AccountConfig
Channels struct {
DefaultModes *string `yaml:"default-modes"`
Registration ChannelRegistrationConfig
}
OperClasses map[string]*OperClassConfig `yaml:"oper-classes"`
Opers map[string]*OperConfig
2014-03-13 09:55:46 +01:00
2017-10-02 05:31:40 +02:00
Logging []logger.LoggingConfig
2017-03-06 04:31:10 +01:00
2017-04-30 04:35:07 +02:00
Debug struct {
RecoverFromErrors *bool `yaml:"recover-from-errors"`
PprofListener *string `yaml:"pprof-listener"`
2017-10-26 10:19:01 +02:00
StackImpact StackImpactConfig
2017-04-30 04:35:07 +02:00
}
Limits struct {
AwayLen uint `yaml:"awaylen"`
ChanListModes uint `yaml:"chan-list-modes"`
ChannelLen uint `yaml:"channellen"`
KickLen uint `yaml:"kicklen"`
MonitorEntries uint `yaml:"monitor-entries"`
NickLen uint `yaml:"nicklen"`
TopicLen uint `yaml:"topiclen"`
WhowasEntries uint `yaml:"whowas-entries"`
LineLen LineLenConfig `yaml:"linelen"`
}
2017-09-28 07:30:53 +02:00
2018-03-22 16:04:21 +01:00
Fakelag FakelagConfig
2017-09-28 07:30:53 +02:00
Filename string
2014-02-24 07:21:39 +01:00
}
2017-04-16 03:31:33 +02:00
// OperClass defines an assembled operator class.
type OperClass struct {
Title string
WhoisLine string `yaml:"whois-line"`
Capabilities map[string]bool // map to make lookups much easier
}
2017-04-16 03:31:33 +02:00
// OperatorClasses returns a map of assembled operator classes from the given config.
2018-04-19 08:48:19 +02:00
func (conf *Config) OperatorClasses() (map[string]*OperClass, error) {
ocs := make(map[string]*OperClass)
// loop from no extends to most extended, breaking if we can't add any more
lenOfLastOcs := -1
for {
if lenOfLastOcs == len(ocs) {
2018-02-03 13:03:36 +01:00
return nil, ErrOperClassDependencies
}
lenOfLastOcs = len(ocs)
var anyMissing bool
for name, info := range conf.OperClasses {
_, exists := ocs[name]
_, extendsExists := ocs[info.Extends]
if exists {
// class already exists
continue
} else if len(info.Extends) > 0 && !extendsExists {
// class we extend on doesn't exist
_, exists := conf.OperClasses[info.Extends]
if !exists {
return nil, fmt.Errorf("Operclass [%s] extends [%s], which doesn't exist", name, info.Extends)
}
anyMissing = true
continue
}
// create new operclass
var oc OperClass
oc.Capabilities = make(map[string]bool)
// get inhereted info from other operclasses
if len(info.Extends) > 0 {
einfo, _ := ocs[info.Extends]
for capab := range einfo.Capabilities {
oc.Capabilities[capab] = true
}
}
// add our own info
oc.Title = info.Title
for _, capab := range info.Capabilities {
oc.Capabilities[capab] = true
}
if len(info.WhoisLine) > 0 {
oc.WhoisLine = info.WhoisLine
} else {
oc.WhoisLine = "is a"
if strings.Contains(strings.ToLower(string(oc.Title[0])), "aeiou") {
oc.WhoisLine += "n"
}
oc.WhoisLine += " "
oc.WhoisLine += oc.Title
}
2018-04-19 08:48:19 +02:00
ocs[name] = &oc
}
if !anyMissing {
// we've got every operclass!
break
}
}
2018-04-19 08:48:19 +02:00
return ocs, nil
}
2017-04-16 03:31:33 +02:00
// Oper represents a single assembled operator's config.
type Oper struct {
2018-04-19 08:48:19 +02:00
Name string
Class *OperClass
WhoisLine string
Vhost string
Pass []byte
2018-04-23 00:47:10 +02:00
Modes []modes.ModeChange
}
2017-04-16 03:31:33 +02:00
// Operators returns a map of operator configs from the given OperClass and config.
2018-04-19 08:48:19 +02:00
func (conf *Config) Operators(oc map[string]*OperClass) (map[string]*Oper, error) {
operators := make(map[string]*Oper)
for name, opConf := range conf.Opers {
var oper Oper
// oper name
name, err := CasefoldName(name)
if err != nil {
return nil, fmt.Errorf("Could not casefold oper name: %s", err.Error())
}
2018-04-19 08:48:19 +02:00
oper.Name = name
oper.Pass = opConf.PasswordBytes()
oper.Vhost = opConf.Vhost
2018-04-19 08:48:19 +02:00
class, exists := oc[opConf.Class]
if !exists {
return nil, fmt.Errorf("Could not load operator [%s] - they use operclass [%s] which does not exist", name, opConf.Class)
}
2018-04-19 08:48:19 +02:00
oper.Class = class
if len(opConf.WhoisLine) > 0 {
oper.WhoisLine = opConf.WhoisLine
} else {
oper.WhoisLine = class.WhoisLine
}
2018-04-23 00:47:10 +02:00
modeStr := strings.TrimSpace(opConf.Modes)
modeChanges, unknownChanges := modes.ParseUserModeChanges(strings.Split(modeStr, " ")...)
if len(unknownChanges) > 0 {
return nil, fmt.Errorf("Could not load operator [%s] due to unknown modes %v", name, unknownChanges)
}
oper.Modes = modeChanges
// successful, attach to list of opers
2018-04-19 08:48:19 +02:00
operators[name] = &oper
}
return operators, nil
}
2017-04-16 03:31:33 +02:00
// TLSListeners returns a list of TLS listeners and their configs.
func (conf *Config) TLSListeners() map[string]*tls.Config {
tlsListeners := make(map[string]*tls.Config)
for s, tlsListenersConf := range conf.Server.TLSListeners {
config, err := tlsListenersConf.Config()
if err != nil {
log.Fatal(err)
}
2018-01-28 01:52:07 +01:00
config.ClientAuth = tls.RequestClientCert
tlsListeners[s] = config
}
return tlsListeners
}
2017-04-16 03:31:33 +02:00
// LoadConfig loads the given YAML configuration file.
2014-02-24 07:21:39 +01:00
func LoadConfig(filename string) (config *Config, err error) {
data, err := ioutil.ReadFile(filename)
2014-02-09 16:53:42 +01:00
if err != nil {
return nil, err
2014-02-09 16:53:42 +01:00
}
err = yaml.Unmarshal(data, &config)
if err != nil {
return nil, err
}
2017-09-28 07:30:53 +02:00
config.Filename = filename
2016-06-28 08:06:17 +02:00
// we need this so PasswordBytes returns the correct info
if config.Server.Password != "" {
config.Server.PassConfig.Password = config.Server.Password
}
2016-04-12 07:44:00 +02:00
if config.Network.Name == "" {
2018-02-03 13:03:36 +01:00
return nil, ErrNetworkNameMissing
2016-04-12 07:44:00 +02:00
}
if config.Server.Name == "" {
2018-02-03 13:03:36 +01:00
return nil, ErrServerNameMissing
}
if !utils.IsHostname(config.Server.Name) {
2018-02-03 13:03:36 +01:00
return nil, ErrServerNameNotHostname
}
2016-08-19 15:21:52 +02:00
if config.Datastore.Path == "" {
2018-02-03 13:03:36 +01:00
return nil, ErrDatastorePathMissing
2016-08-19 15:21:52 +02:00
}
if len(config.Server.Listen) == 0 {
2018-02-03 13:03:36 +01:00
return nil, ErrNoListenersDefined
2014-02-10 22:52:28 +01:00
}
2016-10-16 12:14:56 +02:00
if config.Limits.NickLen < 1 || config.Limits.ChannelLen < 2 || config.Limits.AwayLen < 1 || config.Limits.KickLen < 1 || config.Limits.TopicLen < 1 {
2018-02-03 13:03:36 +01:00
return nil, ErrLimitsAreInsane
}
if config.Server.STS.Enabled {
config.Server.STS.Duration, err = custime.ParseDuration(config.Server.STS.DurationString)
if err != nil {
return nil, fmt.Errorf("Could not parse STS duration: %s", err.Error())
}
if config.Server.STS.Port < 0 || config.Server.STS.Port > 65535 {
return nil, fmt.Errorf("STS port is incorrect, should be 0 if disabled: %d", config.Server.STS.Port)
}
}
if config.Server.ConnectionThrottler.Enabled {
config.Server.ConnectionThrottler.Duration, err = time.ParseDuration(config.Server.ConnectionThrottler.DurationString)
if err != nil {
return nil, fmt.Errorf("Could not parse connection-throttle duration: %s", err.Error())
}
config.Server.ConnectionThrottler.BanDuration, err = time.ParseDuration(config.Server.ConnectionThrottler.BanDurationString)
if err != nil {
return nil, fmt.Errorf("Could not parse connection-throttle ban-duration: %s", err.Error())
}
}
2017-10-15 08:18:14 +02:00
// process webirc blocks
var newWebIRC []webircConfig
for _, webirc := range config.Server.WebIRC {
// skip webirc blocks with no hosts (such as the example one)
if len(webirc.Hosts) == 0 {
2017-10-15 08:18:14 +02:00
continue
}
err = webirc.Populate()
2017-10-15 08:18:14 +02:00
if err != nil {
return nil, fmt.Errorf("Could not parse WebIRC config: %s", err.Error())
}
newWebIRC = append(newWebIRC, webirc)
}
config.Server.WebIRC = newWebIRC
// process limits
if config.Limits.LineLen.Tags < 512 || config.Limits.LineLen.Rest < 512 {
2018-02-03 13:03:36 +01:00
return nil, ErrLineLengthsTooSmall
2016-11-29 09:38:04 +01:00
}
2017-10-02 05:31:40 +02:00
var newLogConfigs []logger.LoggingConfig
2017-03-06 04:31:10 +01:00
for _, logConfig := range config.Logging {
// methods
methods := make(map[string]bool)
2017-03-06 04:31:10 +01:00
for _, method := range strings.Split(logConfig.Method, " ") {
if len(method) > 0 {
methods[strings.ToLower(method)] = true
2017-03-06 04:31:10 +01:00
}
}
if methods["file"] && logConfig.Filename == "" {
2018-02-03 13:03:36 +01:00
return nil, ErrLoggerFilenameMissing
2017-03-06 04:31:10 +01:00
}
logConfig.MethodFile = methods["file"]
2017-05-01 10:51:37 +02:00
logConfig.MethodStdout = methods["stdout"]
logConfig.MethodStderr = methods["stderr"]
2017-03-06 04:31:10 +01:00
// levels
level, exists := logger.LogLevelNames[strings.ToLower(logConfig.LevelString)]
2017-03-06 04:31:10 +01:00
if !exists {
return nil, fmt.Errorf("Could not translate log leve [%s]", logConfig.LevelString)
}
logConfig.Level = level
// types
for _, typeStr := range strings.Split(logConfig.TypeString, " ") {
if len(typeStr) == 0 {
continue
}
if typeStr == "-" {
2018-02-03 13:03:36 +01:00
return nil, ErrLoggerExcludeEmpty
2017-03-06 04:31:10 +01:00
}
if typeStr[0] == '-' {
typeStr = typeStr[1:]
logConfig.ExcludedTypes = append(logConfig.ExcludedTypes, typeStr)
2017-03-06 04:31:10 +01:00
} else {
logConfig.Types = append(logConfig.Types, typeStr)
2017-03-06 04:31:10 +01:00
}
}
if len(logConfig.Types) < 1 {
2018-02-03 13:03:36 +01:00
return nil, ErrLoggerHasNoTypes
2017-03-06 04:31:10 +01:00
}
2017-03-06 06:50:23 +01:00
newLogConfigs = append(newLogConfigs, logConfig)
2017-03-06 04:31:10 +01:00
}
2017-03-06 06:50:23 +01:00
config.Logging = newLogConfigs
// hardcode this for now
config.Accounts.Registration.EnabledCredentialTypes = []string{"passphrase", "certfp"}
for i, name := range config.Accounts.Registration.EnabledCallbacks {
if name == "none" {
// we store "none" as "*" internally
config.Accounts.Registration.EnabledCallbacks[i] = "*"
}
}
2018-04-23 08:38:35 +02:00
rawRegexp := config.Accounts.VHosts.ValidRegexpRaw
2018-04-19 08:48:19 +02:00
if rawRegexp != "" {
regexp, err := regexp.Compile(rawRegexp)
if err == nil {
2018-04-23 08:38:35 +02:00
config.Accounts.VHosts.ValidRegexp = regexp
2018-04-19 08:48:19 +02:00
} else {
log.Printf("invalid vhost regexp: %s\n", err.Error())
}
}
2018-04-23 08:38:35 +02:00
if config.Accounts.VHosts.ValidRegexp == nil {
config.Accounts.VHosts.ValidRegexp = defaultValidVhostRegex
2018-04-19 08:48:19 +02:00
}
2018-03-18 02:32:12 +01:00
maxSendQBytes, err := bytefmt.ToBytes(config.Server.MaxSendQString)
2017-03-13 23:12:39 +01:00
if err != nil {
return nil, fmt.Errorf("Could not parse maximum SendQ size (make sure it only contains whole numbers): %s", err.Error())
}
2018-03-18 02:32:12 +01:00
config.Server.MaxSendQBytes = int(maxSendQBytes)
2017-03-13 23:12:39 +01:00
2018-01-22 08:30:31 +01:00
// get language files
2018-02-03 10:46:14 +01:00
config.Languages.Data = make(map[string]languages.LangData)
2018-01-22 08:30:31 +01:00
if config.Languages.Enabled {
files, err := ioutil.ReadDir(config.Languages.Path)
if err != nil {
return nil, fmt.Errorf("Could not load language files: %s", err.Error())
}
for _, f := range files {
// skip dirs
if f.IsDir() {
continue
}
// only load core .lang.yaml files, and ignore help/irc files
2018-01-22 08:30:31 +01:00
name := f.Name()
lowerName := strings.ToLower(name)
if !strings.HasSuffix(lowerName, ".lang.yaml") {
2018-01-22 08:30:31 +01:00
continue
}
// don't load our example files in practice
if strings.HasPrefix(lowerName, "example") {
continue
}
2018-01-22 08:30:31 +01:00
// load core info file
2018-01-22 08:30:31 +01:00
data, err = ioutil.ReadFile(filepath.Join(config.Languages.Path, name))
if err != nil {
return nil, fmt.Errorf("Could not load language file [%s]: %s", name, err.Error())
}
2018-02-03 10:46:14 +01:00
var langInfo languages.LangData
2018-01-22 08:30:31 +01:00
err = yaml.Unmarshal(data, &langInfo)
if err != nil {
return nil, fmt.Errorf("Could not parse language file [%s]: %s", name, err.Error())
}
langInfo.Translations = make(map[string]string)
// load actual translation files
var tlList map[string]string
// load irc strings file
ircName := strings.TrimSuffix(name, ".lang.yaml") + "-irc.lang.json"
data, err = ioutil.ReadFile(filepath.Join(config.Languages.Path, ircName))
if err != nil {
return nil, fmt.Errorf("Could not load language's irc file [%s]: %s", ircName, err.Error())
}
err = json.Unmarshal(data, &tlList)
if err != nil {
return nil, fmt.Errorf("Could not parse language's irc file [%s]: %s", ircName, err.Error())
}
for key, value := range tlList {
// because of how crowdin works, this is how we skip untranslated lines
if key == value || value == "" {
continue
}
langInfo.Translations[key] = value
}
// load help strings file
helpName := strings.TrimSuffix(name, ".lang.yaml") + "-help.lang.json"
data, err = ioutil.ReadFile(filepath.Join(config.Languages.Path, helpName))
if err != nil {
return nil, fmt.Errorf("Could not load language's help file [%s]: %s", helpName, err.Error())
}
err = json.Unmarshal(data, &tlList)
if err != nil {
return nil, fmt.Errorf("Could not parse language's help file [%s]: %s", helpName, err.Error())
}
for key, value := range tlList {
// because of how crowdin works, this is how we skip untranslated lines
if key == value || value == "" {
continue
}
langInfo.Translations[key] = value
}
2018-01-22 08:30:31 +01:00
// confirm that values are correct
if langInfo.Code == "en" {
return nil, fmt.Errorf("Cannot have language file with code 'en' (this is the default language using strings inside the server code). If you're making an English variant, name it with a more specific code")
}
2018-01-23 07:50:19 +01:00
if langInfo.Code == "" || langInfo.Name == "" || langInfo.Contributors == "" {
return nil, fmt.Errorf("Code, name or contributors is empty in language file [%s]", name)
2018-01-22 08:30:31 +01:00
}
if len(langInfo.Translations) == 0 {
return nil, fmt.Errorf("Language [%s / %s] contains no translations", langInfo.Code, langInfo.Name)
2018-01-22 08:30:31 +01:00
}
// check for duplicate languages
_, exists := config.Languages.Data[strings.ToLower(langInfo.Code)]
if exists {
return nil, fmt.Errorf("Language code [%s] defined twice", langInfo.Code)
}
// and insert into lang info
config.Languages.Data[strings.ToLower(langInfo.Code)] = langInfo
}
// confirm that default language exists
if config.Languages.Default == "" {
config.Languages.Default = "en"
} else {
config.Languages.Default = strings.ToLower(config.Languages.Default)
}
_, exists := config.Languages.Data[config.Languages.Default]
if config.Languages.Default != "en" && !exists {
return nil, fmt.Errorf("Cannot find default language [%s]", config.Languages.Default)
}
}
return config, nil
2014-02-09 16:53:42 +01:00
}