mirror of
https://github.com/directus/directus.git
synced 2026-01-25 08:28:09 -05:00
* Step 1 * Step 2 * False sense of confidence * Couple more before dinner * Update schema package * Update format-title * Upgrade specs file * Close * Replace ts-node-dev with tsx, and various others * Replace lodash with lodash-es * Add lodash-es types * Update knex import * More fun is had * FSE * Consolidate repos * Various tweaks and fixes * Fix specs * Remove dependency on knex-schema-inspector * Fix wrong imports of inspector * Move shared exceptions to new package * Move constants to separate module * Move types to new types package * Use directus/types * I believe this is no longer needed * [WIP] Start moving utils to esm * ESMify Shared * Move shared utils to @directus/utils * Use @directus/utils instead of @directus/shared/utils * It runs! * Use correct schemaoverview type * Fix imports * Fix the thing * Start on new update-checker lib * Use new update-check package * Swap out directus/shared in app * Pushing through the last bits now * Dangerously make extensions SDK ESM * Use @directus/types in tests * Copy util function to test * Fix linter config * Add missing import * Hot takes * Fix build * Curse these default exports * No tests in constants * Add tests * Remove tests from types * Add tests for exceptions * Fix test * Fix app tests * Fix import in test * Fix various tests * Fix specs export * Some more tests * Remove broken integration tests These were broken beyond repair.. They were also written before we really knew what we we're doing with tests, so I think it's better to say goodbye and start over with these * Regenerate lockfile * Fix imports from merge * I create my own problems * Make sharp play nice * Add vitest config * Install missing blackbox dep * Consts shouldn't be in types tsk tsk tsk tsk * Fix type/const usage in extensions-sdk * cursed.default * Reduce circular deps * Fix circular dep in items service * vvv * Trigger testing for all vendors * Add workaround for rollup * Prepend the file protocol for the ESM loader to be compatible with Windows "WARN: Only URLs with a scheme in: file and data are supported by the default ESM loader. On Windows, absolute paths must be valid file:// URLs. Received protocol 'c:'" * Fix postgres * Schema package updates Co-authored-by: Azri Kahar <42867097+azrikahar@users.noreply.github.com> * Resolve cjs/mjs extensions * Clean-up eslint config * fixed extension concatination * using string interpolation for consistency * Revert MySQL optimisation * Revert testing for all vendors * Replace tsx with esbuild-kit/esm-loader Is a bit faster and we can rely on the built-in `watch` and `inspect` functionalities of Node.js Note: The possibility to watch other files (.env in our case) might be added in the future, see https://github.com/nodejs/node/issues/45467 * Use exact version for esbuild-kit/esm-loader * Fix import --------- Co-authored-by: ian <licitdev@gmail.com> Co-authored-by: Brainslug <tim@brainslug.nl> Co-authored-by: Azri Kahar <42867097+azrikahar@users.noreply.github.com> Co-authored-by: Pascal Jufer <pascal-jufer@bluewin.ch>
95 lines
2.5 KiB
TypeScript
95 lines
2.5 KiB
TypeScript
import { toArray } from '@directus/utils';
|
|
import type { AuthDriver } from './auth/auth.js';
|
|
import {
|
|
LDAPAuthDriver,
|
|
LocalAuthDriver,
|
|
OAuth2AuthDriver,
|
|
OpenIDAuthDriver,
|
|
SAMLAuthDriver,
|
|
} from './auth/drivers/index.js';
|
|
import { DEFAULT_AUTH_PROVIDER } from './constants.js';
|
|
import getDatabase from './database/index.js';
|
|
import env from './env.js';
|
|
import { InvalidConfigException } from './exceptions/invalid-config.js';
|
|
import logger from './logger.js';
|
|
import type { AuthDriverOptions } from './types/index.js';
|
|
import { getConfigFromEnv } from './utils/get-config-from-env.js';
|
|
import { getSchema } from './utils/get-schema.js';
|
|
|
|
const providerNames = toArray(env['AUTH_PROVIDERS']);
|
|
|
|
const providers: Map<string, AuthDriver> = new Map();
|
|
|
|
export function getAuthProvider(provider: string): AuthDriver {
|
|
if (!providers.has(provider)) {
|
|
throw new InvalidConfigException('Auth provider not configured', { provider });
|
|
}
|
|
|
|
return providers.get(provider)!;
|
|
}
|
|
|
|
export async function registerAuthProviders(): Promise<void> {
|
|
const options = { knex: getDatabase(), schema: await getSchema() };
|
|
|
|
// Register default provider if not disabled
|
|
if (!env['AUTH_DISABLE_DEFAULT']) {
|
|
const defaultProvider = getProviderInstance('local', options)!;
|
|
providers.set(DEFAULT_AUTH_PROVIDER, defaultProvider);
|
|
}
|
|
|
|
if (!env['AUTH_PROVIDERS']) {
|
|
return;
|
|
}
|
|
|
|
// Register configured providers
|
|
providerNames.forEach((name: string) => {
|
|
name = name.trim();
|
|
|
|
if (name === DEFAULT_AUTH_PROVIDER) {
|
|
logger.error(`Cannot override "${DEFAULT_AUTH_PROVIDER}" auth provider.`);
|
|
process.exit(1);
|
|
}
|
|
|
|
const { driver, ...config } = getConfigFromEnv(`AUTH_${name.toUpperCase()}_`);
|
|
|
|
if (!driver) {
|
|
logger.warn(`Missing driver definition for "${name}" auth provider.`);
|
|
return;
|
|
}
|
|
|
|
const provider = getProviderInstance(driver, options, { provider: name, ...config });
|
|
|
|
if (!provider) {
|
|
logger.warn(`Invalid "${driver}" auth driver.`);
|
|
return;
|
|
}
|
|
|
|
providers.set(name, provider);
|
|
});
|
|
}
|
|
|
|
function getProviderInstance(
|
|
driver: string,
|
|
options: AuthDriverOptions,
|
|
config: Record<string, any> = {}
|
|
): AuthDriver | undefined {
|
|
switch (driver) {
|
|
case 'local':
|
|
return new LocalAuthDriver(options, config);
|
|
|
|
case 'oauth2':
|
|
return new OAuth2AuthDriver(options, config);
|
|
|
|
case 'openid':
|
|
return new OpenIDAuthDriver(options, config);
|
|
|
|
case 'ldap':
|
|
return new LDAPAuthDriver(options, config);
|
|
|
|
case 'saml':
|
|
return new SAMLAuthDriver(options, config);
|
|
}
|
|
|
|
return undefined;
|
|
}
|