mirror of
https://github.com/ajnart/homarr.git
synced 2026-01-30 03:09:19 +01:00
* wip: sso * feat: add ldap client and provider * feat: implement login form * feat: finish sso * fix: lint and format issue * chore: address pull request feedback * fix: build not working * fix: oidc is redirected to internal docker container hostname * fix: build not working * refactor: migrate to ldapts * fix: format and frozen lock file * fix: deepsource issues * fix: unit tests for ldap authorization not working * refactor: remove unnecessary args from dockerfile * chore: address pull request feedback * fix: use console instead of logger in auth env.mjs * fix: default value for auth provider of wrong type * fix: broken lock file * fix: format issue
96 lines
4.0 KiB
JavaScript
96 lines
4.0 KiB
JavaScript
import { createEnv } from "@t3-oss/env-nextjs";
|
|
import { z } from "zod";
|
|
|
|
const trueStrings = ["1", "yes", "t", "true"];
|
|
const falseStrings = ["0", "no", "f", "false"];
|
|
|
|
const supportedAuthProviders = ["credentials", "oidc", "ldap"];
|
|
const authProvidersSchema = z
|
|
.string()
|
|
.min(1)
|
|
.transform((providers) =>
|
|
providers
|
|
.replaceAll(" ", "")
|
|
.toLowerCase()
|
|
.split(",")
|
|
.filter((provider) => {
|
|
if (supportedAuthProviders.includes(provider)) return true;
|
|
else if (!provider)
|
|
console.log("One or more of the entries for AUTH_PROVIDER could not be parsed and/or returned null.");
|
|
else console.log(`The value entered for AUTH_PROVIDER "${provider}" is incorrect.`);
|
|
return false;
|
|
}),
|
|
)
|
|
.default("credentials");
|
|
|
|
const booleanSchema = z
|
|
.string()
|
|
.default("false")
|
|
.transform((value, ctx) => {
|
|
const normalized = value.trim().toLowerCase();
|
|
if (trueStrings.includes(normalized)) return true;
|
|
if (falseStrings.includes(normalized)) return false;
|
|
|
|
throw new Error(`Invalid boolean value for ${ctx.path.join(".")}`);
|
|
});
|
|
|
|
const skipValidation = Boolean(process.env.CI) || Boolean(process.env.SKIP_ENV_VALIDATION);
|
|
const authProviders = skipValidation ? [] : authProvidersSchema.parse(process.env.AUTH_PROVIDERS);
|
|
|
|
export const env = createEnv({
|
|
server: {
|
|
AUTH_SECRET: process.env.NODE_ENV === "production" ? z.string().min(1) : z.string().min(1).optional(),
|
|
AUTH_PROVIDERS: authProvidersSchema,
|
|
...(authProviders.includes("oidc")
|
|
? {
|
|
AUTH_OIDC_ISSUER: z.string().url(),
|
|
AUTH_OIDC_CLIENT_ID: z.string().min(1),
|
|
AUTH_OIDC_CLIENT_SECRET: z.string().min(1),
|
|
AUTH_OIDC_CLIENT_NAME: z.string().min(1).default("OIDC"),
|
|
AUTH_OIDC_AUTO_LOGIN: booleanSchema,
|
|
AUTH_OIDC_SCOPE_OVERWRITE: z.string().min(1).default("openid email profile groups"),
|
|
}
|
|
: {}),
|
|
...(authProviders.includes("ldap")
|
|
? {
|
|
AUTH_LDAP_URI: z.string().url(),
|
|
AUTH_LDAP_BIND_DN: z.string(),
|
|
AUTH_LDAP_BIND_PASSWORD: z.string(),
|
|
AUTH_LDAP_BASE: z.string(),
|
|
AUTH_LDAP_SEARCH_SCOPE: z.enum(["base", "one", "sub"]).default("base"),
|
|
AUTH_LDAP_USERNAME_ATTRIBUTE: z.string().default("uid"),
|
|
AUTH_LDAP_USER_MAIL_ATTRIBUTE: z.string().default("mail"),
|
|
AUTH_LDAP_USERNAME_FILTER_EXTRA_ARG: z.string().optional(),
|
|
AUTH_LDAP_GROUP_CLASS: z.string().default("groupOfUniqueNames"),
|
|
AUTH_LDAP_GROUP_MEMBER_ATTRIBUTE: z.string().default("member"),
|
|
AUTH_LDAP_GROUP_MEMBER_USER_ATTRIBUTE: z.string().default("dn"),
|
|
AUTH_LDAP_GROUP_FILTER_EXTRA_ARG: z.string().optional(),
|
|
}
|
|
: {}),
|
|
},
|
|
client: {},
|
|
runtimeEnv: {
|
|
AUTH_SECRET: process.env.AUTH_SECRET,
|
|
AUTH_PROVIDERS: process.env.AUTH_PROVIDERS,
|
|
AUTH_LDAP_BASE: process.env.AUTH_LDAP_BASE,
|
|
AUTH_LDAP_BIND_DN: process.env.AUTH_LDAP_BIND_DN,
|
|
AUTH_LDAP_BIND_PASSWORD: process.env.AUTH_LDAP_BIND_PASSWORD,
|
|
AUTH_LDAP_GROUP_CLASS: process.env.AUTH_LDAP_GROUP_CLASS,
|
|
AUTH_LDAP_GROUP_FILTER_EXTRA_ARG: process.env.AUTH_LDAP_GROUP_FILTER_EXTRA_ARG,
|
|
AUTH_LDAP_GROUP_MEMBER_ATTRIBUTE: process.env.AUTH_LDAP_GROUP_MEMBER_ATTRIBUTE,
|
|
AUTH_LDAP_GROUP_MEMBER_USER_ATTRIBUTE: process.env.AUTH_LDAP_GROUP_MEMBER_USER_ATTRIBUTE,
|
|
AUTH_LDAP_SEARCH_SCOPE: process.env.AUTH_LDAP_SEARCH_SCOPE,
|
|
AUTH_LDAP_URI: process.env.AUTH_LDAP_URI,
|
|
AUTH_OIDC_CLIENT_ID: process.env.AUTH_OIDC_CLIENT_ID,
|
|
AUTH_OIDC_CLIENT_NAME: process.env.AUTH_OIDC_CLIENT_NAME,
|
|
AUTH_OIDC_CLIENT_SECRET: process.env.AUTH_OIDC_CLIENT_SECRET,
|
|
AUTH_OIDC_ISSUER: process.env.AUTH_OIDC_ISSUER,
|
|
AUTH_OIDC_SCOPE_OVERWRITE: process.env.AUTH_OIDC_SCOPE_OVERWRITE,
|
|
AUTH_LDAP_USERNAME_ATTRIBUTE: process.env.AUTH_LDAP_USERNAME_ATTRIBUTE,
|
|
AUTH_LDAP_USER_MAIL_ATTRIBUTE: process.env.AUTH_LDAP_USER_MAIL_ATTRIBUTE,
|
|
AUTH_LDAP_USERNAME_FILTER_EXTRA_ARG: process.env.AUTH_LDAP_USERNAME_FILTER_EXTRA_ARG,
|
|
AUTH_OIDC_AUTO_LOGIN: process.env.AUTH_OIDC_AUTO_LOGIN,
|
|
},
|
|
skipValidation,
|
|
});
|