mirror of
https://github.com/directus/directus.git
synced 2026-01-28 18:57:56 -05:00
* Moved refactoring from LDAP branch * Moved Auth into packages * Updated frontend to support custom auth providers and make implementation more flexible * Fixed exception handling and numerous bugs. Also added provider support to graphql * Updated frontend to be able to set provider and identifier * Fixed issue with setting the auth provider in app * Updated package-lock.json * Updated package-lock.json * Cleanup, adding type handling and disabled changing provider * Added title formatting to SSO links * Fixed incorrect type export * Fixed incorrect rc * Update api/src/services/authentication.ts * Updated sub-dependencies to rc87 * Fixed linting errors * Prefer sending provider name as config var * Pass clone of user info to auth provider instead of reference * Moved auth from packages into core * Removed generic login handler * Fixed graphql complaint * Moved exception back to api and cleaned up URLs * Minor tweak * Pulled across improvements from openid branch * Fixed fix that wasn't a fix * Update auth.ts * Update auth.ts * Update authentication.ts * Update login-form.vue * Regression fixes and cleanup * Minor flow improvements * Flipped if and fixed linting warning * Un-expanded object that didn't need to be expanded! * Trimmed auth interface for consistency when verifying passwords * Removed auth-manager, changed login endpoint, broke out SSO links, removed username support, disabled updating external_identifier, generate provider options as part of field generation * Cleaned up some code comments * Use named exports in local driver * Use async defaults for auth abstract class * Use JSON for auth_data field * Move session data blob to directus_sessions * Remove unused export, rename auth->authDriver * Opinionated changes * Move login route registration to driver file * Revert app changes in favor of PR #8277 * Send session token to auth provider and opinionated changes * Added missing translation * Fixed empty elements for users without email * Update api/src/auth/drivers/local.ts * Move pw verify to local driver, remove CRUD * Opinions > logical reasoning * Use session data, cleanup login method on auth serv * Remove useless null * Fixed breaking changes from refactor, and fixed build * Fixed lint warning * Ignore typescript nonsense * Update api/src/services/authentication.ts * Fix provider name passthrough Co-authored-by: Aiden Foxx <aiden.foxx@sbab.se> Co-authored-by: Rijk van Zanten <rijkvanzanten@me.com>
69 lines
1.8 KiB
TypeScript
69 lines
1.8 KiB
TypeScript
import getDatabase from './database';
|
|
import env from './env';
|
|
import logger from './logger';
|
|
import { AuthDriver } from './auth/auth';
|
|
import { LocalAuthDriver } from './auth/drivers/';
|
|
import { DEFAULT_AUTH_PROVIDER } from './constants';
|
|
import { InvalidConfigException } from './exceptions';
|
|
import { getConfigFromEnv } from './utils/get-config-from-env';
|
|
import { toArray } from '@directus/shared/utils';
|
|
|
|
const providerNames = toArray(env.AUTH_PROVIDERS);
|
|
|
|
const providers: Map<string, AuthDriver> = new Map();
|
|
|
|
export function getAuthProvider(provider: string): AuthDriver {
|
|
// When providers haven't been registered yet
|
|
if (providerNames.length !== providers.size) {
|
|
registerProviders();
|
|
}
|
|
|
|
if (!providers.has(provider)) {
|
|
throw new InvalidConfigException('Auth provider not configured', { provider });
|
|
}
|
|
|
|
return providers.get(provider)!;
|
|
}
|
|
|
|
function getProviderInstance(driver: string, config: Record<string, any>): AuthDriver | undefined {
|
|
switch (driver) {
|
|
case 'local':
|
|
return new LocalAuthDriver(getDatabase(), config);
|
|
}
|
|
}
|
|
|
|
function registerProviders() {
|
|
// Register default provider
|
|
providers.set(DEFAULT_AUTH_PROVIDER, getProviderInstance('local', {}) as AuthDriver);
|
|
|
|
if (!env.AUTH_PROVIDERS) {
|
|
return;
|
|
}
|
|
|
|
// Register configured providers
|
|
providerNames.forEach((name: string) => {
|
|
name = name.trim();
|
|
|
|
if (name === DEFAULT_AUTH_PROVIDER) {
|
|
logger.error(`Cannot override "${DEFAULT_AUTH_PROVIDER}" auth provider.`);
|
|
process.exit(1);
|
|
}
|
|
|
|
const { driver, ...config } = getConfigFromEnv(`AUTH_${name.toUpperCase()}_`);
|
|
|
|
if (!driver) {
|
|
logger.warn(`Missing driver definition for "${name}" auth provider.`);
|
|
return;
|
|
}
|
|
|
|
const provider = getProviderInstance(driver, { provider: name, ...config });
|
|
|
|
if (!provider) {
|
|
logger.warn(`Invalid "${driver}" auth driver.`);
|
|
return;
|
|
}
|
|
|
|
providers.set(name, provider);
|
|
});
|
|
}
|