You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardexpand all lines: deployment/scgi/index.md
+5-2
Original file line number
Diff line number
Diff line change
@@ -196,7 +196,7 @@ Fedora, Red Hat Enterprise Linux and Centos come with SELinux enabled and with v
196
196
2019/10/17 15:17:58 [crit] 1022#0: *6 connect() to 127.0.0.1:20477 failed (13: Permission denied) while connecting to upstream, client: 192.168.0.79, server: example.fano, request: "GET / HTTP/1.1", upstream: "scgi://127.0.0.1:20477", host: "example.fano"
197
197
```
198
198
199
-
Simple solution is to run SELinux with `permissive` mode. In permissive mode, SELinux permits all operations but log operations that would have breached in `enforcing` mode.
199
+
For development, simple solution is to run SELinux with `permissive` mode. In permissive mode, SELinux permits all operations but log operations that would have breached in `enforcing` mode.
200
200
201
201
Web server such Apache or Nginx is listed in SELinux under `httpd_t` context. Run following command as root to add `httpd_t` to permissive mode.
202
202
@@ -232,7 +232,10 @@ Take a note of value `policycoreutils-python-utils-2.8-16.1.el8.noarch` and run
For setting up proper SELinux policy please consult [Writing a custom SELinux policy](https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/using_selinux/writing-a-custom-selinux-policy_using-selinux)
238
+
236
239
## Explore more
237
240
238
241
-[Deploy as FastCGI application](/deployment/fastcgi)
Copy file name to clipboardexpand all lines: documentation/index.md
+1-1
Original file line number
Diff line number
Diff line change
@@ -37,7 +37,7 @@ description: Documentation and developer's resources for Fano Framework, web app
37
37
## Security
38
38
39
39
-**[Handling CORS](/security/handling-cors)** discusses how to handle *Cross-origin Resource Sharing (CORS)* issue in Fano Framework.
40
-
-**[Form Validation](/security/form-validation)**. It explains how to validate form input data.
40
+
-**[Form Validation](/security/form-validation)**. It explains how to validate form input data including how to use [built-in validation rules](/security/form-validation/built-in-validation-rules/) or [creating your own validation rule]((/security/form-validation#writing-your-own-validation-rule)).
41
41
-**[CSRF Protection](/security/csrf-protection)** discusses how to protect application from *Cross-site request Forgery (CSRF)* attack.
42
42
-**[HTTP Verb Tunnelling](/security/http-verb-tunnelling)** explains about how to override HTTP verb such as `PUT`, `PATCH` and `DELETE`.
43
43
-**[HTTP Authentication](/security/http-authentication)** discusses authentication using basic, digest, bearer token authentication. It is also related to JSON Web Token.
Copy file name to clipboardexpand all lines: security/form-validation/built-in-validation-rules/index.md
+68-27
Original file line number
Diff line number
Diff line change
@@ -7,33 +7,35 @@ description: List of built-in validation rules in Fano Framework
7
7
8
8
This page lists all available built-in validation rules that Fano Framework provides. For information on how to use these validation rules in application, please read [Form Validation](/security/form-validation) documentation.
9
9
10
-
|[Alpha](#talphavalidator)|[Alpha Num](#talphanumvalidator)|[Alpha num space](#talphanumspacevalidator)|
|[Less or equal than](#tlessorequalthanvalidator)|[Greater or equal than](#tgreaterorequalthanvalidator)| - |
36
+
|[Less or equal than](#tlessorequalthanvalidator)|[Greater or equal than](#tgreaterorequalthanvalidator)|[At least one alpha](#tatleastonealphavalidator)|
37
+
|[At least one lower alpha](#tatleastoneloweralphavalidator)|[At least one upper alpha](#tatleastoneupperalphavalidator)|[At least one digit](#tatleastonedigitvalidator)|
38
+
|[At least one symbol](#tatleastonesymbolvalidator)|[Mixed capitalization](#tmixedcapsvalidator)| - |
Validate string contains at least one lower case and one upper case alphabet characters.
723
+
724
+
For example, following validation rules ensure that password is mandatory with minimum length of 8 characters that contains at least one lower case letter,
725
+
one upper case letter, one digit character and one symbol character.
Copy file name to clipboardexpand all lines: security/form-validation/index.md
+2-2
Original file line number
Diff line number
Diff line change
@@ -206,11 +206,11 @@ Please note that `lastValidationResult()` return last validation status so, abov
206
206
207
207
`lastValidationResult()` method is provided so developer can execute validation in middleware and later in controller inspects last validation status and act accordingly.
Fano Framework comes with several built-in validation rules, some are validation rule mentioned in above code example. Read [Built-in Validation Rules](/security/form-validation/built-in-validation-rules) for more information.
212
212
213
-
## Writing your own validation rule
213
+
## <aname="writing-your-own-validation-rule"></a>Writing your own validation rule
214
214
215
215
If built-in validation rules do not meet your requirement, you can create your own validation rule by creating class that implements `IValidator`.
0 commit comments