mirror of
https://github.com/directus/directus.git
synced 2026-04-25 03:00:53 -04:00
* Typecheck across packages that are built with esbuild * Boilerplate new Errors package * No need, tsup checks with --dts * Switch to tsup * Setup dev script * Add readme * More boilerplaty things * Finish createError function * Install @directus/random * Downgrade node types * Add utility function to check if an error is a DirectusError * Use new is-error check * Install errors package * Add failed validation common error * Export common errors * Move joi convertion to utils * Export failed validation * Use new failed validation error in validate-batch * Enhance typing output of createError * Remove outdir (handled by tsup now) * Replace Exception with Error * Replace exception in test * Remove exceptions from app * Remove exceptions from app * Remove failed validation exception from users service * Remove old failed validation exception from shared * Remove exceptions package in favor of errors * Uninstall exceptions * Replace baseexception check * Migrate content too large error * Critical detail * Replace ForbiddenException * WIP remove exceptions * Add ForbiddenError to errors * HitRateLimitError * Move validation related error/helper to new validation package * Add index * Add docs * Install random * Convert TokenExpired * Convert user-suspended * Convert invalid-credentials * Move UnsupportedMediaType * Replace wrong imports for forbidden * Convert invalid-ip * Move invalid provider * Move InvalidOtp * Convert InvalidToken * Move MethodNotAllowed * Convert range not satisfiable * Move unexpect response * Move UnprocessableContent * Move IllegalAssetTransformation * Move RouteNotFound * Finalize not found * Various db errors * Move value too long * Move not null * Move record-not-unique * Move value out of range * Finish db errors * Service unavailable * GQL errors * Update packages/validation/src/errors/failed-validation.ts Co-authored-by: Azri Kahar <42867097+azrikahar@users.noreply.github.com> * Update packages/validation/src/errors/failed-validation.ts Co-authored-by: Azri Kahar <42867097+azrikahar@users.noreply.github.com> * InvalidQuery * Add test for invalid query message constructor * Invalid Payload * Finalize exceptions move * Improve type of isDirectusError * Various fixes * Fix build in api * Update websocket exceptions use * Allow optional reason for invalid config * Update errors usage in utils * Remove unused package from errors * Update lockfile * Update api/src/auth/drivers/ldap.ts Co-authored-by: Azri Kahar <42867097+azrikahar@users.noreply.github.com> * Update packages/validation/src/utils/joi-to-error-extensions.ts Co-authored-by: Azri Kahar <42867097+azrikahar@users.noreply.github.com> * Put error codes in shared enum * Replace instanceof checks in api * Fix tests I think * Tweak override names * Fix linter warnings * Set snapshots * Start fixing BB tests * Fix blackbox tests * Add changeset * Update changeset * Update extension docs to use new createError abstraction * 🙄 * Fix graphql validation error name * 🥳 * use ErrorCode.Forbidden * fix blackbox auth login test * Add license files * Rename preMutationException to preMutationError * Remove unused ms dep & sort package.json * Remove periods from error messages for consistency Co-authored-by: Azri Kahar <42867097+azrikahar@users.noreply.github.com> * Add optional code check * Use updated error code checker * Rename InvalidConfigError to InvalidProviderConfigError --------- Co-authored-by: Azri Kahar <42867097+azrikahar@users.noreply.github.com> Co-authored-by: Pascal Jufer <pascal-jufer@bluewin.ch> Co-authored-by: ian <licitdev@gmail.com>
96 lines
2.5 KiB
TypeScript
96 lines
2.5 KiB
TypeScript
import { toArray } from '@directus/utils';
|
|
import type { AuthDriver } from './auth/auth.js';
|
|
import {
|
|
LDAPAuthDriver,
|
|
LocalAuthDriver,
|
|
OAuth2AuthDriver,
|
|
OpenIDAuthDriver,
|
|
SAMLAuthDriver,
|
|
} from './auth/drivers/index.js';
|
|
import { DEFAULT_AUTH_PROVIDER } from './constants.js';
|
|
import getDatabase from './database/index.js';
|
|
import env from './env.js';
|
|
import { InvalidProviderConfigError } from './errors/index.js';
|
|
import logger from './logger.js';
|
|
import type { AuthDriverOptions } from './types/index.js';
|
|
import { getConfigFromEnv } from './utils/get-config-from-env.js';
|
|
import { getSchema } from './utils/get-schema.js';
|
|
|
|
const providerNames = toArray(env['AUTH_PROVIDERS']);
|
|
|
|
const providers: Map<string, AuthDriver> = new Map();
|
|
|
|
export function getAuthProvider(provider: string): AuthDriver {
|
|
if (!providers.has(provider)) {
|
|
logger.error('Auth provider not configured');
|
|
throw new InvalidProviderConfigError({ provider });
|
|
}
|
|
|
|
return providers.get(provider)!;
|
|
}
|
|
|
|
export async function registerAuthProviders(): Promise<void> {
|
|
const options = { knex: getDatabase(), schema: await getSchema() };
|
|
|
|
// Register default provider if not disabled
|
|
if (!env['AUTH_DISABLE_DEFAULT']) {
|
|
const defaultProvider = getProviderInstance('local', options)!;
|
|
providers.set(DEFAULT_AUTH_PROVIDER, defaultProvider);
|
|
}
|
|
|
|
if (!env['AUTH_PROVIDERS']) {
|
|
return;
|
|
}
|
|
|
|
// Register configured providers
|
|
providerNames.forEach((name: string) => {
|
|
name = name.trim();
|
|
|
|
if (name === DEFAULT_AUTH_PROVIDER) {
|
|
logger.error(`Cannot override "${DEFAULT_AUTH_PROVIDER}" auth provider.`);
|
|
process.exit(1);
|
|
}
|
|
|
|
const { driver, ...config } = getConfigFromEnv(`AUTH_${name.toUpperCase()}_`);
|
|
|
|
if (!driver) {
|
|
logger.warn(`Missing driver definition for "${name}" auth provider.`);
|
|
return;
|
|
}
|
|
|
|
const provider = getProviderInstance(driver, options, { provider: name, ...config });
|
|
|
|
if (!provider) {
|
|
logger.warn(`Invalid "${driver}" auth driver.`);
|
|
return;
|
|
}
|
|
|
|
providers.set(name, provider);
|
|
});
|
|
}
|
|
|
|
function getProviderInstance(
|
|
driver: string,
|
|
options: AuthDriverOptions,
|
|
config: Record<string, any> = {}
|
|
): AuthDriver | undefined {
|
|
switch (driver) {
|
|
case 'local':
|
|
return new LocalAuthDriver(options, config);
|
|
|
|
case 'oauth2':
|
|
return new OAuth2AuthDriver(options, config);
|
|
|
|
case 'openid':
|
|
return new OpenIDAuthDriver(options, config);
|
|
|
|
case 'ldap':
|
|
return new LDAPAuthDriver(options, config);
|
|
|
|
case 'saml':
|
|
return new SAMLAuthDriver(options, config);
|
|
}
|
|
|
|
return undefined;
|
|
}
|