2020-07-03 23:36:33 +00:00
|
|
|
exports.up = async knex => {
|
2020-09-05 22:33:15 +00:00
|
|
|
// Check for users using disabled strategies
|
2020-09-06 03:47:41 +00:00
|
|
|
let protectedStrategies = []
|
2020-09-05 22:33:15 +00:00
|
|
|
const disabledStrategies = await knex('authentication').where('isEnabled', false)
|
2020-09-06 03:47:41 +00:00
|
|
|
if (disabledStrategies) {
|
|
|
|
const incompatibleUsers = await knex('users').distinct('providerKey').whereIn('providerKey', disabledStrategies.map(s => s.key))
|
|
|
|
if (incompatibleUsers && incompatibleUsers.length > 0) {
|
|
|
|
protectedStrategies = incompatibleUsers.map(u => u.providerKey)
|
|
|
|
}
|
|
|
|
}
|
2020-07-03 23:36:33 +00:00
|
|
|
|
2020-09-05 22:33:15 +00:00
|
|
|
// Delete disabled strategies
|
|
|
|
await knex('authentication').whereNotIn('key', protectedStrategies).andWhere('isEnabled', false).del()
|
|
|
|
|
|
|
|
// Update table schema
|
2020-07-03 23:36:33 +00:00
|
|
|
await knex.schema
|
|
|
|
.alterTable('authentication', table => {
|
|
|
|
table.integer('order').unsigned().notNullable().defaultTo(0)
|
|
|
|
table.string('strategyKey').notNullable().defaultTo('')
|
|
|
|
table.string('displayName').notNullable().defaultTo('')
|
|
|
|
})
|
|
|
|
|
|
|
|
// Fix pre-2.5 strategies
|
|
|
|
const strategies = await knex('authentication')
|
|
|
|
let idx = 1
|
|
|
|
for (const strategy of strategies) {
|
|
|
|
await knex('authentication').where('key', strategy.key).update({
|
|
|
|
strategyKey: strategy.key,
|
|
|
|
order: (strategy.key === 'local') ? 0 : idx++
|
|
|
|
})
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
exports.down = knex => { }
|