-
Notifications
You must be signed in to change notification settings - Fork 7
Check if Configuration is valid #70
Comments
That's a very good idea. |
On this issue, a while ago we added develop as the default branch to CryptoJWT and now requests a review before allowing a PR to go through to master. |
Ok, I'll follow this line. |
Sure, but I start to see it as a system (me :-)) error. |
Could it be out of scope here? I'd suggest two method in that Class:
A ConfigurationNodeClass could be for example this:
Could it be a starting point or would we like to spend some more words on this? |
in idpy we discussed about it |
Hello everybody, this is a long-term issue.
During the past year I lived on my skin many jwtconnect breakable upgrades and at this moment an user can still add some options in oidcendpoint configuration.yml, that do not belong anymore to the release he's currently using.
An example is
http_params
changed then inhttpc_params
and others as we seen from v0.13.0 to v1.0.1.I think that a configuration schema validator could help as newcomers users as developers to get some warnings or, in best cases, exception when service starts. This would avoid to run oidcendpoint in a inconsistent way, no more errors during oauth2/oidc sessions would happens.
in django we also use a special command called diffsettings that shows up with configuration fields that would not belong to one's well known in the system core.
A configuration object with a validation method, that starts first of all.
This code would also put a base to the documentation that could be estracted directly from the configuration schema definition.
What else?
The text was updated successfully, but these errors were encountered: