feat: Add permissions extractor for acl resources

This commit is contained in:
Joachim Van Herwegen 2021-01-29 16:48:09 +01:00
parent 758f5ed083
commit 8339413ab4
8 changed files with 94 additions and 26 deletions

View File

@ -5,6 +5,12 @@
"@id": "urn:solid-server:default:PermissionsExtractor", "@id": "urn:solid-server:default:PermissionsExtractor",
"@type": "WaterfallHandler", "@type": "WaterfallHandler",
"WaterfallHandler:_handlers": [ "WaterfallHandler:_handlers": [
{
"@type": "AclPermissionsExtractor",
"AclPermissionsExtractor:_aclStrategy": {
"@id": "urn:solid-server:default:AclIdentifierStrategy"
}
},
{ {
"@type": "MethodPermissionsExtractor" "@type": "MethodPermissionsExtractor"
}, },

View File

@ -42,12 +42,7 @@ export class WebAclAuthorizer extends Authorizer {
* @param input - Relevant data needed to check if access can be granted. * @param input - Relevant data needed to check if access can be granted.
*/ */
public async handle({ identifier, permissions, credentials }: AuthorizerArgs): Promise<void> { public async handle({ identifier, permissions, credentials }: AuthorizerArgs): Promise<void> {
// Solid, §4.3.3: "To discover, read, create, or modify an ACL auxiliary resource, an acl:agent MUST const modes = (Object.keys(permissions) as (keyof PermissionSet)[]).filter((key): boolean => permissions[key]);
// have acl:Control privileges per the ACL inheritance algorithm on the resource directly associated with it."
// https://solid.github.io/specification/protocol#auxiliary-resources-reserved
const modes = this.aclStrategy.isAuxiliaryIdentifier(identifier) ?
[ 'control' ] :
(Object.keys(permissions) as (keyof PermissionSet)[]).filter((key): boolean => permissions[key]);
// Verify that all required modes are set for the given agent // Verify that all required modes are set for the given agent
this.logger.debug(`Checking if ${credentials.webId} has ${modes.join()} permissions for ${identifier.path}`); this.logger.debug(`Checking if ${credentials.webId} has ${modes.join()} permissions for ${identifier.path}`);

View File

@ -78,6 +78,7 @@ export * from './ldp/operations/PostOperationHandler';
export * from './ldp/operations/PutOperationHandler'; export * from './ldp/operations/PutOperationHandler';
// LDP/Permissions // LDP/Permissions
export * from './ldp/permissions/AclPermissionsExtractor';
export * from './ldp/permissions/PermissionSet'; export * from './ldp/permissions/PermissionSet';
export * from './ldp/permissions/PermissionsExtractor'; export * from './ldp/permissions/PermissionsExtractor';
export * from './ldp/permissions/MethodPermissionsExtractor'; export * from './ldp/permissions/MethodPermissionsExtractor';

View File

@ -0,0 +1,36 @@
import { NotImplementedHttpError } from '../../util/errors/NotImplementedHttpError';
import type { AuxiliaryIdentifierStrategy } from '../auxiliary/AuxiliaryIdentifierStrategy';
import type { Operation } from '../operations/Operation';
import type { PermissionSet } from './PermissionSet';
import { PermissionsExtractor } from './PermissionsExtractor';
/**
* PermissionsExtractor specifically for acl resources.
*
* Solid, §4.3.3: "To discover, read, create, or modify an ACL auxiliary resource, an acl:agent MUST have
* acl:Control privileges per the ACL inheritance algorithm on the resource directly associated with it."
* https://solid.github.io/specification/protocol#auxiliary-resources-reserved
*/
export class AclPermissionsExtractor extends PermissionsExtractor {
private readonly aclStrategy: AuxiliaryIdentifierStrategy;
public constructor(aclStrategy: AuxiliaryIdentifierStrategy) {
super();
this.aclStrategy = aclStrategy;
}
public async canHandle({ target }: Operation): Promise<void> {
if (!this.aclStrategy.isAuxiliaryIdentifier(target)) {
throw new NotImplementedHttpError('Can only determine permissions of acl resources');
}
}
public async handle(): Promise<PermissionSet> {
return {
read: false,
write: false,
append: false,
control: true,
};
}
}

View File

@ -59,8 +59,7 @@ describe.each(stores)('An LDP handler with auth using %s', (name, { storeUrn, te
await teardown(); await teardown();
}); });
it('can add a file to the store, read it and delete it if allowed.', async(): it('can add a file to the store, read it and delete it if allowed.', async(): Promise<void> => {
Promise<void> => {
// Set acl // Set acl
await aclHelper.setSimpleAcl({ read: true, write: true, append: true, control: false }, 'agent'); await aclHelper.setSimpleAcl({ read: true, write: true, append: true, control: false }, 'agent');
@ -82,8 +81,7 @@ describe.each(stores)('An LDP handler with auth using %s', (name, { storeUrn, te
await resourceHelper.shouldNotExist(id); await resourceHelper.shouldNotExist(id);
}); });
it('can not add a file to the store if not allowed.', async(): it('can not add a file to the store if not allowed.', async(): Promise<void> => {
Promise<void> => {
// Set acl // Set acl
await aclHelper.setSimpleAcl({ read: true, write: true, append: true, control: false }, 'authenticated'); await aclHelper.setSimpleAcl({ read: true, write: true, append: true, control: false }, 'authenticated');
@ -94,8 +92,7 @@ describe.each(stores)('An LDP handler with auth using %s', (name, { storeUrn, te
expect(response.statusCode).toBe(401); expect(response.statusCode).toBe(401);
}); });
it('can not add/delete, but only read files if allowed.', async(): it('can not add/delete, but only read files if allowed.', async(): Promise<void> => {
Promise<void> => {
// Set acl // Set acl
await aclHelper.setSimpleAcl({ read: true, write: false, append: false, control: false }, 'agent'); await aclHelper.setSimpleAcl({ read: true, write: false, append: false, control: false }, 'agent');
@ -135,4 +132,20 @@ describe.each(stores)('An LDP handler with auth using %s', (name, { storeUrn, te
); );
expect(response.statusCode).toBe(401); expect(response.statusCode).toBe(401);
}); });
it('can not access an acl file if no control rights are provided.', async(): Promise<void> => {
// Set acl
await aclHelper.setSimpleAcl({ read: true, write: true, append: true, control: false }, 'agent');
const response = await resourceHelper.performRequest(new URL('http://test.com/.acl'), 'GET', { accept: '*/*' });
expect(response.statusCode).toBe(401);
});
it('can only access an acl file if control rights are provided.', async(): Promise<void> => {
// Set acl
await aclHelper.setSimpleAcl({ read: false, write: false, append: false, control: true }, 'agent');
const response = await resourceHelper.performRequest(new URL('http://test.com/.acl'), 'GET', { accept: '*/*' });
expect(response.statusCode).toBe(200);
});
}); });

View File

@ -120,18 +120,6 @@ describe('A WebAclAuthorizer', (): void => {
await expect(authorizer.handle({ identifier, permissions, credentials })).rejects.toThrow(ForbiddenHttpError); await expect(authorizer.handle({ identifier, permissions, credentials })).rejects.toThrow(ForbiddenHttpError);
}); });
it('allows access to the acl file if control is allowed.', async(): Promise<void> => {
credentials.webId = 'http://test.com/user';
identifier.path = 'http://test.com/foo';
store.getRepresentation = async(): Promise<Representation> => ({ data: streamifyArray([
quad(nn('auth'), nn(`${acl}agent`), nn(credentials.webId!)),
quad(nn('auth'), nn(`${acl}accessTo`), nn(identifier.path)),
quad(nn('auth'), nn(`${acl}mode`), nn(`${acl}Control`)),
]) } as Representation);
const aclIdentifier = aclStrategy.getAuxiliaryIdentifier(identifier);
await expect(authorizer.handle({ identifier: aclIdentifier, permissions, credentials })).resolves.toBeUndefined();
});
it('errors if an agent tries to edit the acl file without control permissions.', async(): Promise<void> => { it('errors if an agent tries to edit the acl file without control permissions.', async(): Promise<void> => {
credentials.webId = 'http://test.com/user'; credentials.webId = 'http://test.com/user';
identifier.path = 'http://test.com/foo'; identifier.path = 'http://test.com/foo';

View File

@ -0,0 +1,30 @@
import type { AuxiliaryIdentifierStrategy } from '../../../../src/ldp/auxiliary/AuxiliaryIdentifierStrategy';
import { AclPermissionsExtractor } from '../../../../src/ldp/permissions/AclPermissionsExtractor';
import { NotImplementedHttpError } from '../../../../src/util/errors/NotImplementedHttpError';
describe('An AclPermissionsExtractor', (): void => {
let extractor: AclPermissionsExtractor;
beforeEach(async(): Promise<void> => {
const aclStrategy = {
isAuxiliaryIdentifier: (id): boolean => id.path.endsWith('.acl'),
} as AuxiliaryIdentifierStrategy;
extractor = new AclPermissionsExtractor(aclStrategy);
});
it('can only handle acl files.', async(): Promise<void> => {
await expect(extractor.canHandle({ target: { path: 'http://test.com/foo' }} as any))
.rejects.toThrow(NotImplementedHttpError);
await expect(extractor.canHandle({ target: { path: 'http://test.com/foo.acl' }} as any))
.resolves.toBeUndefined();
});
it('returns control permissions.', async(): Promise<void> => {
await expect(extractor.handle()).resolves.toEqual({
read: false,
write: false,
append: false,
control: true,
});
});
});

View File

@ -29,12 +29,11 @@ export class AclHelper {
'<http://test.com/#auth> a acl:Authorization', '<http://test.com/#auth> a acl:Authorization',
]; ];
for (const perm of [ 'Read', 'Append', 'Write', 'Delete' ]) { for (const perm of [ 'Read', 'Append', 'Write', 'Control' ]) {
if (permissions[perm.toLowerCase() as keyof PermissionSet]) { if (permissions[perm.toLowerCase() as keyof PermissionSet]) {
acl.push(`;\n acl:mode acl:${perm}`); acl.push(`;\n acl:mode acl:${perm}`);
} }
} }
acl.push(';\n acl:mode acl:Control');
acl.push(`;\n acl:accessTo <${this.id}>`); acl.push(`;\n acl:accessTo <${this.id}>`);
acl.push(`;\n acl:default <${this.id}>`); acl.push(`;\n acl:default <${this.id}>`);
acl.push( acl.push(