|
package config |
|
|
|
import ( |
|
"fmt" |
|
"net/http" |
|
"net/url" |
|
"strings" |
|
|
|
"github.com/pkg/errors" |
|
"github.com/target/goalert/validation" |
|
"github.com/target/goalert/validation/validate" |
|
) |
|
|
|
|
|
const SchemaVersion = 1 |
|
|
|
|
|
type Config struct { |
|
data []byte |
|
fallbackURL string |
|
explicitURL string |
|
|
|
intEmailDomain string |
|
|
|
General struct { |
|
ApplicationName string `public:"true" info:"The name used in messaging and page titles. Defaults to \"GoAlert\"."` |
|
PublicURL string `public:"true" info:"Publicly routable URL for UI links and API calls." deprecated:"Use --public-url flag instead, which takes precedence."` |
|
GoogleAnalyticsID string `public:"true" info:"If set, will post user metrics to the corresponding data stream in Google Analytics 4."` |
|
NotificationDisclaimer string `public:"true" info:"Disclaimer text for receiving pre-recorded notifications (appears on profile page)."` |
|
DisableMessageBundles bool `public:"true" info:"Disable bundling status updates and alert notifications."` |
|
ShortURL string `public:"true" info:"If set, messages will contain a shorter URL using this as a prefix (e.g. http://example.com). It should point to GoAlert and can be the same as the PublicURL."` |
|
DisableSMSLinks bool `public:"true" info:"If set, SMS messages will not contain a URL pointing to GoAlert."` |
|
DisableLabelCreation bool `public:"true" info:"Disables the ability to create new labels for services."` |
|
DisableCalendarSubscriptions bool `public:"true" info:"If set, disables all active calendar subscriptions as well as the ability to create new calendar subscriptions."` |
|
} |
|
|
|
Services struct { |
|
RequiredLabels []string `public:"true" info:"List of label names to require new services to define."` |
|
} |
|
|
|
Maintenance struct { |
|
AlertCleanupDays int `public:"true" info:"Closed alerts will be deleted after this many days (0 means disable cleanup)."` |
|
AlertAutoCloseDays int `public:"true" info:"Unacknowledged alerts will automatically be closed after this many days of inactivity. (0 means disable auto-close)."` |
|
AutoCloseAckedAlerts bool `public:"true" info:"If set, alerts that are acknowledged will also be automatically closed after the configured number of days of inactivity."` |
|
APIKeyExpireDays int `public:"true" info:"Unused calendar API keys will be disabled after this many days (0 means disable cleanup)."` |
|
ScheduleCleanupDays int `public:"true" info:"Schedule on-call history will be deleted after this many days (0 means disable cleanup)."` |
|
} |
|
|
|
Auth struct { |
|
RefererURLs []string `info:"Allowed referer URLs for auth and redirects." deprecated:"Use --public-url flag instead, which takes precedence."` |
|
DisableBasic bool `public:"true" info:"Disallow username/password login."` |
|
} |
|
|
|
GitHub struct { |
|
Enable bool `public:"true" info:"Enable GitHub authentication."` |
|
|
|
NewUsers bool `info:"Allow new user creation via GitHub authentication."` |
|
|
|
ClientID string |
|
ClientSecret string `password:"true"` |
|
|
|
AllowedUsers []string `info:"Allow any of the listed GitHub usernames to authenticate. Use '*' to allow any user."` |
|
AllowedOrgs []string `info:"Allow any member of any listed GitHub org (or team, using the format 'org/team') to authenticate."` |
|
|
|
EnterpriseURL string `info:"GitHub URL (without /api) when used with GitHub Enterprise."` |
|
} |
|
|
|
OIDC struct { |
|
Enable bool `public:"true" info:"Enable OpenID Connect authentication."` |
|
|
|
NewUsers bool `info:"Allow new user creation via OIDC authentication."` |
|
OverrideName string `info:"Set the name/label on the login page to something other than OIDC."` |
|
|
|
IssuerURL string |
|
ClientID string |
|
ClientSecret string `password:"true"` |
|
|
|
Scopes string `info:"Requested scopes for authentication. If left blank, openid, profile, and email will be used."` |
|
UserInfoEmailPath string `info:"JMESPath expression to find email address in UserInfo. If set, the email claim will be ignored in favor of this. (suggestion: email)."` |
|
UserInfoEmailVerifiedPath string `info:"JMESPath expression to find email verification state in UserInfo. If set, the email_verified claim will be ignored in favor of this. (suggestion: email_verified)."` |
|
UserInfoNamePath string `info:"JMESPath expression to find full name in UserInfo. If set, the name claim will be ignored in favor of this. (suggestion: name || cn || join(' ', [firstname, lastname]))"` |
|
} |
|
|
|
Mailgun struct { |
|
Enable bool `public:"true"` |
|
|
|
APIKey string `password:"true"` |
|
EmailDomain string `info:"The TO address for all incoming alerts."` |
|
} |
|
|
|
Slack struct { |
|
Enable bool `public:"true"` |
|
|
|
ClientID string |
|
ClientSecret string `password:"true"` |
|
|
|
|
|
|
|
AccessToken string `password:"true" info:"Slack app bot user OAuth access token (should start with xoxb-)."` |
|
|
|
SigningSecret string `password:"true" info:"Signing secret to verify requests from slack."` |
|
InteractiveMessages bool `info:"Enable interactive messages (e.g. buttons)."` |
|
} |
|
|
|
Twilio struct { |
|
Enable bool `public:"true" info:"Enables sending and processing of Voice and SMS messages through the Twilio notification provider."` |
|
|
|
VoiceName string `info:"The Twilio voice to use for Text To Speech for phone calls. See https://www.twilio.com/docs/voice/twiml/say/text-speech#polly-standard-and-neural-voices"` |
|
VoiceLanguage string `info:"The Twilio voice language to use for Text To Speech for phone calls. See https://www.twilio.com/docs/voice/twiml/say/text-speech#polly-standard-and-neural-voices"` |
|
|
|
AccountSID string |
|
AuthToken string `password:"true" info:"The primary Auth Token for Twilio. Must be primary unless Alternate Auth Token is set. This token is used for outgoing requests."` |
|
AlternateAuthToken string `password:"true" info:"An alternate Auth Token for validating incoming requests. During a key change, set this to the Primary, and Auth Token to the Secondary, then promote and clear this field."` |
|
|
|
FromNumber string `public:"true" info:"The Twilio number to use for outgoing notifications."` |
|
|
|
MessagingServiceSID string `public:"true" info:"If set, replaces the use of From Number for SMS notifications."` |
|
|
|
RCSSenderID string `info:"The sender ID for RCS messages. Required if RCS is enabled for the MessagingServiceSID."` |
|
|
|
DisableTwoWaySMS bool `info:"Disables SMS reply codes for alert messages."` |
|
SMSCarrierLookup bool `info:"Perform carrier lookup of SMS contact methods (required for SMSFromNumberOverride). Extra charges may apply."` |
|
SMSFromNumberOverride []string `info:"List of 'carrier=number' pairs, SMS messages to numbers of the provided carrier string (exact match) will use the alternate From Number."` |
|
} |
|
|
|
SMTP struct { |
|
Enable bool `public:"true" info:"Enables email as a contact method."` |
|
|
|
From string `public:"true" info:"The email address messages should be sent from."` |
|
|
|
Address string `info:"The server address to use for sending email. Port is optional and defaults to 465, or 25 if Disable TLS is set. Common ports are: 25 or 587 for STARTTLS (or unencrypted) and 465 for TLS."` |
|
DisableTLS bool `info:"Disables TLS on the connection (STARTTLS will still be used if supported)."` |
|
SkipVerify bool `info:"Disables certificate validation for TLS/STARTTLS (insecure)."` |
|
|
|
Username string `info:"Username for authentication."` |
|
Password string `password:"true" info:"Password for authentication."` |
|
} |
|
|
|
Webhook struct { |
|
Enable bool `public:"true" info:"Enables webhook as a contact method."` |
|
AllowedURLs []string `public:"true" info:"If set, allows webhooks for these domains only."` |
|
} |
|
|
|
Feedback struct { |
|
Enable bool `public:"true" info:"Enables Feedback link in nav bar."` |
|
OverrideURL string `public:"true" info:"Use a custom URL for Feedback link in nav bar."` |
|
} |
|
} |
|
|
|
|
|
func (cfg Config) EmailIngressEnabled() bool { |
|
if (cfg.Mailgun.Enable && cfg.Mailgun.EmailDomain != "") || cfg.intEmailDomain != "" { |
|
return true |
|
} |
|
return false |
|
} |
|
|
|
|
|
func (cfg Config) EmailIngressDomain() string { |
|
if cfg.intEmailDomain != "" { |
|
|
|
return cfg.intEmailDomain |
|
} |
|
if cfg.Mailgun.EmailDomain != "" { |
|
return cfg.Mailgun.EmailDomain |
|
} |
|
return "" |
|
} |
|
|
|
|
|
func (cfg Config) TwilioSMSFromNumber(carrier string) string { |
|
if carrier != "" { |
|
for _, s := range cfg.Twilio.SMSFromNumberOverride { |
|
parts := strings.SplitN(s, "=", 2) |
|
if len(parts) != 2 { |
|
continue |
|
} |
|
if parts[0] != carrier { |
|
continue |
|
} |
|
return parts[1] |
|
} |
|
} |
|
|
|
if cfg.Twilio.MessagingServiceSID != "" { |
|
return cfg.Twilio.MessagingServiceSID |
|
} |
|
|
|
return cfg.Twilio.FromNumber |
|
} |
|
|
|
|
|
func RequestURL(req *http.Request) string { |
|
cfg := FromContext(req.Context()) |
|
if !cfg.ShouldUsePublicURL() { |
|
|
|
u, err := url.ParseRequestURI(req.RequestURI) |
|
if err != nil { |
|
panic(errors.Wrap(err, "parse RequestURI")) |
|
} |
|
u.Host = req.Host |
|
u.Scheme = req.URL.Scheme |
|
return u.String() |
|
} |
|
|
|
base, err := url.Parse(cfg.PublicURL()) |
|
if err != nil { |
|
panic(errors.Wrap(err, "parse PublicURL")) |
|
} |
|
|
|
base.Path = strings.TrimSuffix(base.Path, "/") + req.URL.Path |
|
base.RawQuery = req.URL.RawQuery |
|
|
|
return base.String() |
|
} |
|
|
|
func (cfg Config) rawCallbackURL(path string, mergeParams ...url.Values) *url.URL { |
|
base, err := url.Parse(cfg.PublicURL()) |
|
if err != nil { |
|
panic(errors.Wrap(err, "parse PublicURL")) |
|
} |
|
|
|
next, err := url.Parse(path) |
|
if err != nil { |
|
panic(errors.Wrap(err, "parse path")) |
|
} |
|
|
|
base.Path = strings.TrimSuffix(base.Path, "/") + "/" + strings.TrimPrefix(next.Path, "/") |
|
|
|
params := base.Query() |
|
nx := next.Query() |
|
|
|
for name, val := range nx { |
|
params[name] = val |
|
} |
|
|
|
|
|
for _, merge := range mergeParams { |
|
for name, val := range merge { |
|
params[name] = val |
|
} |
|
} |
|
|
|
base.RawQuery = params.Encode() |
|
return base |
|
} |
|
|
|
|
|
|
|
|
|
|
|
func (cfg Config) CallbackURL(path string, mergeParams ...url.Values) string { |
|
base := cfg.rawCallbackURL(path, mergeParams...) |
|
|
|
newPath := ShortPath(base.Path) |
|
if newPath != "" && cfg.General.ShortURL != "" { |
|
short, err := url.Parse(cfg.General.ShortURL) |
|
if err != nil { |
|
panic(errors.Wrap(err, "parse ShortURL")) |
|
} |
|
base.Path = newPath |
|
base.Host = short.Host |
|
base.Scheme = short.Scheme |
|
} |
|
|
|
return base.String() |
|
} |
|
|
|
|
|
func MatchURL(baseURL, testURL string) (bool, error) { |
|
compareQueryValues := func(baseVal, testVal url.Values) bool { |
|
for name := range baseVal { |
|
if baseVal.Get(name) == testVal.Get(name) { |
|
continue |
|
} |
|
return false |
|
} |
|
return true |
|
} |
|
|
|
addImplicitPort := func(u *url.URL) { |
|
if strings.Contains(u.Host, ":") { |
|
return |
|
} |
|
switch strings.ToLower(u.Scheme) { |
|
case "http": |
|
u.Host += ":80" |
|
case "https": |
|
u.Host += ":443" |
|
} |
|
} |
|
base, err := url.Parse(baseURL) |
|
if err != nil { |
|
return false, err |
|
} |
|
|
|
test, err := url.Parse(testURL) |
|
if err != nil { |
|
return false, err |
|
} |
|
|
|
addImplicitPort(base) |
|
addImplicitPort(test) |
|
|
|
|
|
if !strings.EqualFold(base.Host, test.Host) { |
|
return false, nil |
|
} |
|
|
|
|
|
if !strings.EqualFold(base.Scheme, test.Scheme) { |
|
return false, nil |
|
} |
|
|
|
|
|
if len(base.Path) > 1 && !strings.HasPrefix(test.Path, base.Path) { |
|
return false, nil |
|
} |
|
|
|
|
|
if !compareQueryValues(base.Query(), test.Query()) { |
|
return false, nil |
|
} |
|
|
|
return true, nil |
|
} |
|
|
|
|
|
func (cfg Config) ValidWebhookURL(testURL string) bool { |
|
if len(cfg.Webhook.AllowedURLs) == 0 { |
|
return true |
|
} |
|
for _, baseU := range cfg.Webhook.AllowedURLs { |
|
matched, err := MatchURL(baseU, testURL) |
|
if err != nil { |
|
return false |
|
} |
|
if matched { |
|
return true |
|
} |
|
} |
|
return false |
|
} |
|
|
|
|
|
|
|
func (cfg Config) ShouldUsePublicURL() bool { return cfg.explicitURL != "" } |
|
|
|
|
|
func (cfg Config) ValidReferer(reqURL, ref string) bool { |
|
|
|
if cfg.explicitURL != "" { |
|
valid, _ := MatchURL(cfg.explicitURL, ref) |
|
return valid |
|
} |
|
|
|
pubURL := cfg.PublicURL() |
|
if pubURL != "" && strings.HasPrefix(ref, pubURL) { |
|
return true |
|
} |
|
|
|
if len(cfg.Auth.RefererURLs) == 0 { |
|
u, err := url.Parse(reqURL) |
|
if err != nil { |
|
return false |
|
} |
|
|
|
u.Path = "" |
|
u.RawQuery = "" |
|
matched, err := MatchURL(u.String(), ref) |
|
if err != nil { |
|
return false |
|
} |
|
return matched |
|
} |
|
|
|
for _, u := range cfg.Auth.RefererURLs { |
|
matched, err := MatchURL(u, ref) |
|
if err != nil { |
|
return false |
|
} |
|
if matched { |
|
return true |
|
} |
|
} |
|
|
|
return false |
|
} |
|
|
|
|
|
func (cfg Config) ApplicationName() string { |
|
if cfg.General.ApplicationName == "" { |
|
return "GoAlert" |
|
} |
|
return cfg.General.ApplicationName |
|
} |
|
|
|
|
|
func (cfg Config) PublicURL() string { |
|
switch { |
|
case cfg.explicitURL != "": |
|
return strings.TrimSuffix(cfg.explicitURL, "/") |
|
case cfg.General.PublicURL != "": |
|
return strings.TrimSuffix(cfg.General.PublicURL, "/") |
|
} |
|
|
|
return strings.TrimSuffix(cfg.fallbackURL, "/") |
|
} |
|
|
|
func validateEnable(prefix string, isEnabled bool, vals ...string) error { |
|
if !isEnabled { |
|
return nil |
|
} |
|
|
|
var err error |
|
for i := 0; i < len(vals); i += 2 { |
|
if vals[i+1] != "" { |
|
continue |
|
} |
|
err = validate.Many( |
|
err, |
|
validation.NewFieldError(prefix+".Enable", fmt.Sprintf("requires %s.%s to be set ", prefix, vals[i])), |
|
validation.NewFieldError(fmt.Sprintf("%s.%s", prefix, vals[i]), "required to enable "+prefix), |
|
) |
|
} |
|
|
|
return err |
|
} |
|
|
|
|
|
func (cfg Config) Validate() error { |
|
var err error |
|
if cfg.General.PublicURL != "" { |
|
err = validate.Many( |
|
err, |
|
validate.AbsoluteURL("General.PublicURL", cfg.General.PublicURL), |
|
) |
|
} |
|
|
|
if cfg.General.ApplicationName != "" { |
|
err = validate.Many(err, validate.ASCII("General.ApplicationName", cfg.General.ApplicationName, 0, 32)) |
|
} |
|
|
|
validateKey := func(fname, val string) error { return validate.ASCII(fname, val, 0, 128) } |
|
validatePath := func(fname, val string) error { |
|
if val == "" { |
|
return nil |
|
} |
|
return validate.JMESPath(fname, val) |
|
} |
|
validateScopes := func(fname, val string) error { |
|
if val == "" { |
|
return nil |
|
} |
|
return validate.OAuthScope(fname, val, "openid") |
|
} |
|
validateLabels := func(fname string, vals []string) (err error) { |
|
for i, v := range vals { |
|
err = validate.Many(err, validate.LabelKey(fmt.Sprintf("%s[%d]", fname, i), v)) |
|
} |
|
return err |
|
} |
|
|
|
err = validate.Many( |
|
err, |
|
validate.Text("General.NotificationDisclaimer", cfg.General.NotificationDisclaimer, 0, 500), |
|
validateKey("Mailgun.APIKey", cfg.Mailgun.APIKey), |
|
validateKey("Slack.ClientID", cfg.Slack.ClientID), |
|
validateKey("Slack.ClientSecret", cfg.Slack.ClientSecret), |
|
validateKey("Twilio.AccountSID", cfg.Twilio.AccountSID), |
|
validateKey("Twilio.AuthToken", cfg.Twilio.AuthToken), |
|
validateLabels("Services.RequiredLabels", cfg.Services.RequiredLabels), |
|
validateKey("Twilio.AlternateAuthToken", cfg.Twilio.AlternateAuthToken), |
|
validate.ASCII("Twilio.VoiceName", cfg.Twilio.VoiceName, 0, 50), |
|
validate.ASCII("Twilio.VoiceLanguage", cfg.Twilio.VoiceLanguage, 0, 10), |
|
validateKey("GitHub.ClientID", cfg.GitHub.ClientID), |
|
validateKey("GitHub.ClientSecret", cfg.GitHub.ClientSecret), |
|
validateKey("Slack.AccessToken", cfg.Slack.AccessToken), |
|
validate.Range("Maintenance.AlertCleanupDays", cfg.Maintenance.AlertCleanupDays, 0, 9000), |
|
validate.Range("Maintenance.AlertAutoCloseDays", cfg.Maintenance.AlertAutoCloseDays, 0, 9000), |
|
validate.Range("Maintenance.APIKeyExpireDays", cfg.Maintenance.APIKeyExpireDays, 0, 9000), |
|
validate.Range("Maintenance.ScheduleCleanupDays", cfg.Maintenance.ScheduleCleanupDays, 0, 9000), |
|
validateScopes("OIDC.Scopes", cfg.OIDC.Scopes), |
|
validatePath("OIDC.UserInfoEmailPath", cfg.OIDC.UserInfoEmailPath), |
|
validatePath("OIDC.UserInfoEmailVerifiedPath", cfg.OIDC.UserInfoEmailVerifiedPath), |
|
validatePath("OIDC.UserInfoNamePath", cfg.OIDC.UserInfoNamePath), |
|
validateKey("Slack.SigningSecret", cfg.Slack.SigningSecret), |
|
) |
|
|
|
if cfg.General.GoogleAnalyticsID != "" { |
|
err = validate.Many(err, validate.MeasurementID("General.GoogleAnalyticsID", cfg.General.GoogleAnalyticsID)) |
|
} |
|
|
|
if cfg.Twilio.VoiceName != "" && cfg.Twilio.VoiceLanguage == "" { |
|
err = validate.Many(err, validation.NewFieldError("Twilio.VoiceLanguage", "required when Twilio.VoiceName is set")) |
|
} |
|
|
|
if cfg.OIDC.IssuerURL != "" { |
|
err = validate.Many(err, validate.AbsoluteURL("OIDC.IssuerURL", cfg.OIDC.IssuerURL)) |
|
} |
|
if cfg.OIDC.Scopes != "" { |
|
err = validate.Many(err, validateScopes("OIDC.Scopes", cfg.OIDC.Scopes)) |
|
} |
|
if cfg.GitHub.EnterpriseURL != "" { |
|
err = validate.Many(err, validate.AbsoluteURL("GitHub.EnterpriseURL", cfg.GitHub.EnterpriseURL)) |
|
} |
|
if cfg.Twilio.FromNumber != "" { |
|
err = validate.Many(err, validate.Phone("Twilio.FromNumber", cfg.Twilio.FromNumber)) |
|
} |
|
if cfg.Twilio.MessagingServiceSID != "" { |
|
err = validate.Many(err, validate.TwilioSID("Twilio.MessagingServiceSID", "MG", cfg.Twilio.MessagingServiceSID)) |
|
} |
|
if cfg.Twilio.RCSSenderID != "" { |
|
err = validate.Many(err, validate.ASCII("Twilio.RCSSenderSID", cfg.Twilio.RCSSenderID, 1, 255)) |
|
if cfg.Twilio.MessagingServiceSID == "" { |
|
err = validate.Many(err, validation.NewFieldError("Twilio.MessagingServiceSID", "required when Twilio.RCSSenderID is set")) |
|
} |
|
} |
|
|
|
if cfg.Mailgun.EmailDomain != "" { |
|
err = validate.Many(err, validate.Email("Mailgun.EmailDomain", "example@"+cfg.Mailgun.EmailDomain)) |
|
} |
|
if cfg.SMTP.From != "" { |
|
err = validate.Many(err, validate.Email("SMTP.From", cfg.SMTP.From)) |
|
} |
|
if cfg.Slack.InteractiveMessages && cfg.Slack.SigningSecret == "" { |
|
err = validate.Many(err, validation.NewFieldError("Slack.SigningSecret", "required to enable Slack interactive messages")) |
|
} |
|
|
|
err = validate.Many( |
|
err, |
|
|
|
validateEnable("Mailgun", cfg.Mailgun.Enable, |
|
"APIKey", cfg.Mailgun.APIKey, |
|
"EmailDomain", cfg.Mailgun.EmailDomain, |
|
), |
|
|
|
validateEnable("Slack", cfg.Slack.Enable, |
|
"ClientID", cfg.Slack.ClientID, |
|
"ClientSecret", cfg.Slack.ClientSecret, |
|
), |
|
|
|
validateEnable("Twilio", cfg.Twilio.Enable, |
|
"AccountSID", cfg.Twilio.AccountSID, |
|
"AuthToken", cfg.Twilio.AuthToken, |
|
"FromNumber", cfg.Twilio.FromNumber, |
|
), |
|
|
|
validateEnable("GitHub", cfg.GitHub.Enable, |
|
"ClientID", cfg.GitHub.ClientID, |
|
"ClientSecret", cfg.GitHub.ClientSecret, |
|
), |
|
|
|
validateEnable("OIDC", cfg.OIDC.Enable, |
|
"IssuerURL", cfg.OIDC.IssuerURL, |
|
"ClientID", cfg.OIDC.ClientID, |
|
"ClientSecret", cfg.OIDC.ClientSecret, |
|
), |
|
validateEnable("SMTP", cfg.SMTP.Enable, |
|
"From", cfg.SMTP.From, |
|
"Address", cfg.SMTP.Address, |
|
), |
|
) |
|
|
|
if cfg.Feedback.OverrideURL != "" { |
|
err = validate.Many( |
|
err, |
|
validate.AbsoluteURL("Feedback.OverrideURL", cfg.Feedback.OverrideURL), |
|
) |
|
} |
|
|
|
if cfg.General.ShortURL != "" { |
|
err = validate.Many( |
|
err, |
|
validate.AbsoluteURL("General.ShortURL", cfg.General.ShortURL), |
|
) |
|
} |
|
|
|
for i, urlStr := range cfg.Auth.RefererURLs { |
|
field := fmt.Sprintf("Auth.RefererURLs[%d]", i) |
|
err = validate.Many( |
|
err, |
|
validate.AbsoluteURL(field, urlStr), |
|
) |
|
} |
|
|
|
for i, urlStr := range cfg.Webhook.AllowedURLs { |
|
field := fmt.Sprintf("Webhook.AllowedURLs[%d]", i) |
|
err = validate.Many(err, validate.AbsoluteURL(field, urlStr)) |
|
} |
|
|
|
m := make(map[string]bool) |
|
for i, str := range cfg.Twilio.SMSFromNumberOverride { |
|
parts := strings.SplitN(str, "=", 2) |
|
fname := fmt.Sprintf("Twilio.SMSFromNumberOverride[%d]", i) |
|
if len(parts) != 2 { |
|
err = validate.Many(err, validation.NewFieldError( |
|
fname, |
|
"must be in the format 'carrier=number'", |
|
)) |
|
continue |
|
} |
|
err = validate.Many(err, |
|
validate.ASCII(fname+".Carrier", parts[0], 1, 255), |
|
validate.Phone(fname+".Phone", parts[1]), |
|
) |
|
if m[parts[0]] { |
|
err = validate.Many(err, validation.NewFieldError(fname, fmt.Sprintf("carrier override '%s' already set", parts[0]))) |
|
} |
|
m[parts[0]] = true |
|
} |
|
|
|
return err |
|
} |
|
|