mirror of
https://github.com/CommunitySolidServer/CommunitySolidServer.git
synced 2024-10-03 14:55:10 +00:00
change: Make credential extractors specialized.
This commit is contained in:
parent
0407a36490
commit
b0c50b8a7b
@ -3,10 +3,18 @@
|
|||||||
"@graph": [
|
"@graph": [
|
||||||
{
|
{
|
||||||
"@id": "urn:solid-server:default:CredentialsExtractor",
|
"@id": "urn:solid-server:default:CredentialsExtractor",
|
||||||
|
"@type": "FirstCompositeHandler",
|
||||||
|
"FirstCompositeHandler:_handlers": [
|
||||||
|
{
|
||||||
"@type": "DPoPWebIdExtractor",
|
"@type": "DPoPWebIdExtractor",
|
||||||
"DPoPWebIdExtractor:_targetExtractor": {
|
"DPoPWebIdExtractor:_targetExtractor": {
|
||||||
"@id": "urn:solid-server:default:TargetExtractor"
|
"@id": "urn:solid-server:default:TargetExtractor"
|
||||||
}
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"@type": "EmptyCredentialsExtractor"
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
1
index.ts
1
index.ts
@ -2,6 +2,7 @@
|
|||||||
export * from './src/authentication/Credentials';
|
export * from './src/authentication/Credentials';
|
||||||
export * from './src/authentication/CredentialsExtractor';
|
export * from './src/authentication/CredentialsExtractor';
|
||||||
export * from './src/authentication/DPoPWebIdExtractor';
|
export * from './src/authentication/DPoPWebIdExtractor';
|
||||||
|
export * from './src/authentication/EmptyCredentialsExtractor';
|
||||||
export * from './src/authentication/UnsecureWebIdExtractor';
|
export * from './src/authentication/UnsecureWebIdExtractor';
|
||||||
|
|
||||||
// Authorization
|
// Authorization
|
||||||
|
@ -2,6 +2,8 @@ import { verify } from 'ts-dpop';
|
|||||||
import type { TargetExtractor } from '../ldp/http/TargetExtractor';
|
import type { TargetExtractor } from '../ldp/http/TargetExtractor';
|
||||||
import { getLoggerFor } from '../logging/LogUtil';
|
import { getLoggerFor } from '../logging/LogUtil';
|
||||||
import type { HttpRequest } from '../server/HttpRequest';
|
import type { HttpRequest } from '../server/HttpRequest';
|
||||||
|
import { BadRequestHttpError } from '../util/errors/BadRequestHttpError';
|
||||||
|
import { NotImplementedHttpError } from '../util/errors/NotImplementedHttpError';
|
||||||
import type { Credentials } from './Credentials';
|
import type { Credentials } from './Credentials';
|
||||||
import { CredentialsExtractor } from './CredentialsExtractor';
|
import { CredentialsExtractor } from './CredentialsExtractor';
|
||||||
|
|
||||||
@ -17,20 +19,27 @@ export class DPoPWebIdExtractor extends CredentialsExtractor {
|
|||||||
this.targetExtractor = targetExtractor;
|
this.targetExtractor = targetExtractor;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
public async canHandle({ headers }: HttpRequest): Promise<void> {
|
||||||
|
const { authorization } = headers;
|
||||||
|
if (!authorization || !authorization.startsWith('DPoP ')) {
|
||||||
|
throw new NotImplementedHttpError('No DPoP Authorization header specified.');
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
public async handle(request: HttpRequest): Promise<Credentials> {
|
public async handle(request: HttpRequest): Promise<Credentials> {
|
||||||
let webID: string | undefined;
|
const { headers: { authorization, dpop }, method } = request;
|
||||||
const authorizationHeader = request.headers.authorization;
|
if (!dpop) {
|
||||||
const dpopHeader = request.headers.dpop as string;
|
throw new BadRequestHttpError('No DPoP token specified.');
|
||||||
if (authorizationHeader && dpopHeader) {
|
}
|
||||||
const method = request.method as any;
|
|
||||||
const resource = await this.targetExtractor.handleSafe(request);
|
const resource = await this.targetExtractor.handleSafe(request);
|
||||||
try {
|
try {
|
||||||
webID = await verify(authorizationHeader, dpopHeader, method, resource.path);
|
const webID = await verify(authorization as string, dpop as string, method as any, resource.path);
|
||||||
this.logger.info(`Extracted WebID via DPoP token: ${webID}`);
|
this.logger.info(`Verified WebID via DPoP token: ${webID}`);
|
||||||
} catch (error: unknown) {
|
|
||||||
this.logger.warn(`Error verifying WebID via DPoP token: ${(error as Error).message}`);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
return { webID };
|
return { webID };
|
||||||
|
} catch (error: unknown) {
|
||||||
|
const message = `Error verifying WebID via DPoP token: ${(error as Error).message}`;
|
||||||
|
this.logger.warn(message);
|
||||||
|
throw new BadRequestHttpError(message);
|
||||||
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
20
src/authentication/EmptyCredentialsExtractor.ts
Normal file
20
src/authentication/EmptyCredentialsExtractor.ts
Normal file
@ -0,0 +1,20 @@
|
|||||||
|
import type { HttpRequest } from '../server/HttpRequest';
|
||||||
|
import { NotImplementedHttpError } from '../util/errors/NotImplementedHttpError';
|
||||||
|
import type { Credentials } from './Credentials';
|
||||||
|
import { CredentialsExtractor } from './CredentialsExtractor';
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Extracts the empty credentials, indicating an unauthenticated agent.
|
||||||
|
*/
|
||||||
|
export class EmptyCredentialsExtractor extends CredentialsExtractor {
|
||||||
|
public async canHandle({ headers }: HttpRequest): Promise<void> {
|
||||||
|
const { authorization } = headers;
|
||||||
|
if (authorization) {
|
||||||
|
throw new NotImplementedHttpError('Unexpected Authorization scheme.');
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
public async handle(): Promise<Credentials> {
|
||||||
|
return {};
|
||||||
|
}
|
||||||
|
}
|
@ -1,4 +1,6 @@
|
|||||||
|
import { getLoggerFor } from '../logging/LogUtil';
|
||||||
import type { HttpRequest } from '../server/HttpRequest';
|
import type { HttpRequest } from '../server/HttpRequest';
|
||||||
|
import { NotImplementedHttpError } from '../util/errors/NotImplementedHttpError';
|
||||||
import type { Credentials } from './Credentials';
|
import type { Credentials } from './Credentials';
|
||||||
import { CredentialsExtractor } from './CredentialsExtractor';
|
import { CredentialsExtractor } from './CredentialsExtractor';
|
||||||
|
|
||||||
@ -6,7 +8,18 @@ import { CredentialsExtractor } from './CredentialsExtractor';
|
|||||||
* Credentials extractor which simply interprets the contents of the Authorization header as a webID.
|
* Credentials extractor which simply interprets the contents of the Authorization header as a webID.
|
||||||
*/
|
*/
|
||||||
export class UnsecureWebIdExtractor extends CredentialsExtractor {
|
export class UnsecureWebIdExtractor extends CredentialsExtractor {
|
||||||
public async handle(input: HttpRequest): Promise<Credentials> {
|
protected readonly logger = getLoggerFor(this);
|
||||||
return { webID: input.headers.authorization };
|
|
||||||
|
public async canHandle({ headers }: HttpRequest): Promise<void> {
|
||||||
|
const { authorization } = headers;
|
||||||
|
if (!authorization || !authorization.startsWith('WebID ')) {
|
||||||
|
throw new NotImplementedHttpError('No WebID Authorization header specified.');
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
public async handle({ headers }: HttpRequest): Promise<Credentials> {
|
||||||
|
const webID = /^WebID\s+(.*)/u.exec(headers.authorization as string)![1];
|
||||||
|
this.logger.info(`Agent unsecurely claims to be ${webID}`);
|
||||||
|
return { webID };
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
@ -5,10 +5,10 @@ import type {
|
|||||||
} from '../../index';
|
} from '../../index';
|
||||||
import {
|
import {
|
||||||
AuthenticatedLdpHandler,
|
AuthenticatedLdpHandler,
|
||||||
|
EmptyCredentialsExtractor,
|
||||||
FirstCompositeHandler,
|
FirstCompositeHandler,
|
||||||
MethodPermissionsExtractor,
|
MethodPermissionsExtractor,
|
||||||
RdfToQuadConverter,
|
RdfToQuadConverter,
|
||||||
UnsecureWebIdExtractor,
|
|
||||||
QuadToRdfConverter,
|
QuadToRdfConverter,
|
||||||
} from '../../index';
|
} from '../../index';
|
||||||
import type { ServerConfig } from './ServerConfig';
|
import type { ServerConfig } from './ServerConfig';
|
||||||
@ -43,7 +43,7 @@ export class AuthenticatedDataAccessorBasedConfig implements ServerConfig {
|
|||||||
public getHttpHandler(): HttpHandler {
|
public getHttpHandler(): HttpHandler {
|
||||||
const requestParser = getBasicRequestParser();
|
const requestParser = getBasicRequestParser();
|
||||||
|
|
||||||
const credentialsExtractor = new UnsecureWebIdExtractor();
|
const credentialsExtractor = new EmptyCredentialsExtractor();
|
||||||
const permissionsExtractor = new FirstCompositeHandler([
|
const permissionsExtractor = new FirstCompositeHandler([
|
||||||
new MethodPermissionsExtractor(),
|
new MethodPermissionsExtractor(),
|
||||||
]);
|
]);
|
||||||
|
@ -3,8 +3,8 @@ import type { HttpHandler,
|
|||||||
import {
|
import {
|
||||||
AllowEverythingAuthorizer,
|
AllowEverythingAuthorizer,
|
||||||
AuthenticatedLdpHandler,
|
AuthenticatedLdpHandler,
|
||||||
|
EmptyCredentialsExtractor,
|
||||||
MethodPermissionsExtractor,
|
MethodPermissionsExtractor,
|
||||||
UnsecureWebIdExtractor,
|
|
||||||
} from '../../index';
|
} from '../../index';
|
||||||
import type { ServerConfig } from './ServerConfig';
|
import type { ServerConfig } from './ServerConfig';
|
||||||
import { getOperationHandler, getInMemoryResourceStore, getBasicRequestParser, getResponseWriter } from './Util';
|
import { getOperationHandler, getInMemoryResourceStore, getBasicRequestParser, getResponseWriter } from './Util';
|
||||||
@ -26,7 +26,7 @@ export class BasicConfig implements ServerConfig {
|
|||||||
public getHttpHandler(): HttpHandler {
|
public getHttpHandler(): HttpHandler {
|
||||||
const requestParser = getBasicRequestParser();
|
const requestParser = getBasicRequestParser();
|
||||||
|
|
||||||
const credentialsExtractor = new UnsecureWebIdExtractor();
|
const credentialsExtractor = new EmptyCredentialsExtractor();
|
||||||
const permissionsExtractor = new MethodPermissionsExtractor();
|
const permissionsExtractor = new MethodPermissionsExtractor();
|
||||||
const authorizer = new AllowEverythingAuthorizer();
|
const authorizer = new AllowEverythingAuthorizer();
|
||||||
|
|
||||||
|
@ -3,6 +3,7 @@ import type { HttpHandler,
|
|||||||
import {
|
import {
|
||||||
AllowEverythingAuthorizer,
|
AllowEverythingAuthorizer,
|
||||||
AuthenticatedLdpHandler,
|
AuthenticatedLdpHandler,
|
||||||
|
EmptyCredentialsExtractor,
|
||||||
FirstCompositeHandler,
|
FirstCompositeHandler,
|
||||||
MethodPermissionsExtractor,
|
MethodPermissionsExtractor,
|
||||||
QuadToRdfConverter,
|
QuadToRdfConverter,
|
||||||
@ -10,7 +11,6 @@ import {
|
|||||||
RdfToQuadConverter,
|
RdfToQuadConverter,
|
||||||
SparqlUpdateBodyParser,
|
SparqlUpdateBodyParser,
|
||||||
SparqlPatchPermissionsExtractor,
|
SparqlPatchPermissionsExtractor,
|
||||||
UnsecureWebIdExtractor,
|
|
||||||
} from '../../index';
|
} from '../../index';
|
||||||
|
|
||||||
import type { ServerConfig } from './ServerConfig';
|
import type { ServerConfig } from './ServerConfig';
|
||||||
@ -47,7 +47,7 @@ export class BasicHandlersConfig implements ServerConfig {
|
|||||||
new RawBodyParser(),
|
new RawBodyParser(),
|
||||||
]);
|
]);
|
||||||
|
|
||||||
const credentialsExtractor = new UnsecureWebIdExtractor();
|
const credentialsExtractor = new EmptyCredentialsExtractor();
|
||||||
const permissionsExtractor = new FirstCompositeHandler([
|
const permissionsExtractor = new FirstCompositeHandler([
|
||||||
new MethodPermissionsExtractor(),
|
new MethodPermissionsExtractor(),
|
||||||
new SparqlPatchPermissionsExtractor(),
|
new SparqlPatchPermissionsExtractor(),
|
||||||
|
@ -2,10 +2,10 @@ import type { HttpHandler,
|
|||||||
ResourceStore } from '../../index';
|
ResourceStore } from '../../index';
|
||||||
import {
|
import {
|
||||||
AuthenticatedLdpHandler,
|
AuthenticatedLdpHandler,
|
||||||
|
EmptyCredentialsExtractor,
|
||||||
FirstCompositeHandler,
|
FirstCompositeHandler,
|
||||||
MethodPermissionsExtractor,
|
MethodPermissionsExtractor,
|
||||||
RdfToQuadConverter,
|
RdfToQuadConverter,
|
||||||
UnsecureWebIdExtractor,
|
|
||||||
QuadToRdfConverter,
|
QuadToRdfConverter,
|
||||||
} from '../../index';
|
} from '../../index';
|
||||||
import type { ServerConfig } from './ServerConfig';
|
import type { ServerConfig } from './ServerConfig';
|
||||||
@ -39,7 +39,7 @@ export class BasicHandlersWithAclConfig implements ServerConfig {
|
|||||||
public getHttpHandler(): HttpHandler {
|
public getHttpHandler(): HttpHandler {
|
||||||
const requestParser = getBasicRequestParser();
|
const requestParser = getBasicRequestParser();
|
||||||
|
|
||||||
const credentialsExtractor = new UnsecureWebIdExtractor();
|
const credentialsExtractor = new EmptyCredentialsExtractor();
|
||||||
const permissionsExtractor = new FirstCompositeHandler([
|
const permissionsExtractor = new FirstCompositeHandler([
|
||||||
new MethodPermissionsExtractor(),
|
new MethodPermissionsExtractor(),
|
||||||
]);
|
]);
|
||||||
|
@ -6,12 +6,12 @@ import type {
|
|||||||
import {
|
import {
|
||||||
AllowEverythingAuthorizer,
|
AllowEverythingAuthorizer,
|
||||||
AuthenticatedLdpHandler,
|
AuthenticatedLdpHandler,
|
||||||
|
EmptyCredentialsExtractor,
|
||||||
FirstCompositeHandler,
|
FirstCompositeHandler,
|
||||||
MethodPermissionsExtractor,
|
MethodPermissionsExtractor,
|
||||||
QuadToRdfConverter,
|
QuadToRdfConverter,
|
||||||
RawBodyParser,
|
RawBodyParser,
|
||||||
RdfToQuadConverter,
|
RdfToQuadConverter,
|
||||||
UnsecureWebIdExtractor,
|
|
||||||
} from '../../index';
|
} from '../../index';
|
||||||
import type { ServerConfig } from './ServerConfig';
|
import type { ServerConfig } from './ServerConfig';
|
||||||
import {
|
import {
|
||||||
@ -43,7 +43,7 @@ export class DataAccessorBasedConfig implements ServerConfig {
|
|||||||
// This is for the sake of test coverage, as it could also be just getBasicRequestParser()
|
// This is for the sake of test coverage, as it could also be just getBasicRequestParser()
|
||||||
const requestParser = getBasicRequestParser([ new RawBodyParser() ]);
|
const requestParser = getBasicRequestParser([ new RawBodyParser() ]);
|
||||||
|
|
||||||
const credentialsExtractor = new UnsecureWebIdExtractor();
|
const credentialsExtractor = new EmptyCredentialsExtractor();
|
||||||
const permissionsExtractor = new FirstCompositeHandler([
|
const permissionsExtractor = new FirstCompositeHandler([
|
||||||
new MethodPermissionsExtractor(),
|
new MethodPermissionsExtractor(),
|
||||||
]);
|
]);
|
||||||
|
@ -1,17 +1,12 @@
|
|||||||
import { verify } from 'ts-dpop';
|
import { verify } from 'ts-dpop';
|
||||||
import { DPoPWebIdExtractor } from '../../../src/authentication/DPoPWebIdExtractor';
|
import { DPoPWebIdExtractor } from '../../../src/authentication/DPoPWebIdExtractor';
|
||||||
import { TargetExtractor } from '../../../src/ldp/http/TargetExtractor';
|
|
||||||
import type { ResourceIdentifier } from '../../../src/ldp/representation/ResourceIdentifier';
|
|
||||||
import type { HttpRequest } from '../../../src/server/HttpRequest';
|
import type { HttpRequest } from '../../../src/server/HttpRequest';
|
||||||
|
import { BadRequestHttpError } from '../../../src/util/errors/BadRequestHttpError';
|
||||||
class DummyTargetExtractor extends TargetExtractor {
|
import { NotImplementedHttpError } from '../../../src/util/errors/NotImplementedHttpError';
|
||||||
public async handle(): Promise<ResourceIdentifier> {
|
import { StaticAsyncHandler } from '../../util/StaticAsyncHandler';
|
||||||
return { path: 'http://example.org/foo/bar' };
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
describe('A DPoPWebIdExtractor', (): void => {
|
describe('A DPoPWebIdExtractor', (): void => {
|
||||||
const targetExtractor = new DummyTargetExtractor();
|
const targetExtractor = new StaticAsyncHandler(true, { path: 'http://example.org/foo/bar' });
|
||||||
const webIdExtractor = new DPoPWebIdExtractor(targetExtractor);
|
const webIdExtractor = new DPoPWebIdExtractor(targetExtractor);
|
||||||
|
|
||||||
beforeEach((): void => {
|
beforeEach((): void => {
|
||||||
@ -27,8 +22,26 @@ describe('A DPoPWebIdExtractor', (): void => {
|
|||||||
},
|
},
|
||||||
} as any as HttpRequest;
|
} as any as HttpRequest;
|
||||||
|
|
||||||
it('returns empty credentials.', async(): Promise<void> => {
|
it('throws an error.', async(): Promise<void> => {
|
||||||
await expect(webIdExtractor.handle(request)).resolves.toEqual({});
|
const result = webIdExtractor.handleSafe(request);
|
||||||
|
await expect(result).rejects.toThrow(NotImplementedHttpError);
|
||||||
|
await expect(result).rejects.toThrow('No DPoP Authorization header specified.');
|
||||||
|
});
|
||||||
|
});
|
||||||
|
|
||||||
|
describe('on a request with an Authorization header that does not start with DPoP', (): void => {
|
||||||
|
const request = {
|
||||||
|
method: 'GET',
|
||||||
|
headers: {
|
||||||
|
authorization: 'Other token-1234',
|
||||||
|
dpop: 'token-5678',
|
||||||
|
},
|
||||||
|
} as any as HttpRequest;
|
||||||
|
|
||||||
|
it('throws an error.', async(): Promise<void> => {
|
||||||
|
const result = webIdExtractor.handleSafe(request);
|
||||||
|
await expect(result).rejects.toThrow(NotImplementedHttpError);
|
||||||
|
await expect(result).rejects.toThrow('No DPoP Authorization header specified.');
|
||||||
});
|
});
|
||||||
});
|
});
|
||||||
|
|
||||||
@ -40,8 +53,10 @@ describe('A DPoPWebIdExtractor', (): void => {
|
|||||||
},
|
},
|
||||||
} as any as HttpRequest;
|
} as any as HttpRequest;
|
||||||
|
|
||||||
it('returns empty credentials.', async(): Promise<void> => {
|
it('throws an error.', async(): Promise<void> => {
|
||||||
await expect(webIdExtractor.handle(request)).resolves.toEqual({});
|
const result = webIdExtractor.handleSafe(request);
|
||||||
|
await expect(result).rejects.toThrow(BadRequestHttpError);
|
||||||
|
await expect(result).rejects.toThrow('No DPoP token specified.');
|
||||||
});
|
});
|
||||||
});
|
});
|
||||||
|
|
||||||
@ -55,20 +70,20 @@ describe('A DPoPWebIdExtractor', (): void => {
|
|||||||
} as any as HttpRequest;
|
} as any as HttpRequest;
|
||||||
|
|
||||||
it('calls the target extractor with the correct parameters.', async(): Promise<void> => {
|
it('calls the target extractor with the correct parameters.', async(): Promise<void> => {
|
||||||
await webIdExtractor.handle(request);
|
await webIdExtractor.handleSafe(request);
|
||||||
expect(targetExtractor.handle).toHaveBeenCalledTimes(1);
|
expect(targetExtractor.handle).toHaveBeenCalledTimes(1);
|
||||||
expect(targetExtractor.handle).toHaveBeenCalledWith(request);
|
expect(targetExtractor.handle).toHaveBeenCalledWith(request);
|
||||||
});
|
});
|
||||||
|
|
||||||
it('calls the DPoP verifier with the correct parameters.', async(): Promise<void> => {
|
it('calls the DPoP verifier with the correct parameters.', async(): Promise<void> => {
|
||||||
await webIdExtractor.handle(request);
|
await webIdExtractor.handleSafe(request);
|
||||||
expect(verify).toHaveBeenCalledTimes(1);
|
expect(verify).toHaveBeenCalledTimes(1);
|
||||||
expect(verify).toHaveBeenCalledWith('DPoP token-1234', 'token-5678', 'GET', 'http://example.org/foo/bar');
|
expect(verify).toHaveBeenCalledWith('DPoP token-1234', 'token-5678', 'GET', 'http://example.org/foo/bar');
|
||||||
});
|
});
|
||||||
|
|
||||||
it('returns the extracted WebID.', async(): Promise<void> => {
|
it('returns the extracted WebID.', async(): Promise<void> => {
|
||||||
await expect(webIdExtractor.handle(request)).resolves
|
const result = webIdExtractor.handleSafe(request);
|
||||||
.toEqual({ webID: 'http://alice.example/card#me' });
|
await expect(result).resolves.toEqual({ webID: 'http://alice.example/card#me' });
|
||||||
});
|
});
|
||||||
});
|
});
|
||||||
|
|
||||||
@ -87,8 +102,10 @@ describe('A DPoPWebIdExtractor', (): void => {
|
|||||||
});
|
});
|
||||||
});
|
});
|
||||||
|
|
||||||
it('returns empty credentials.', async(): Promise<void> => {
|
it('throws an error.', async(): Promise<void> => {
|
||||||
await expect(webIdExtractor.handle(request)).resolves.toEqual({});
|
const result = webIdExtractor.handleSafe(request);
|
||||||
|
await expect(result).rejects.toThrow(BadRequestHttpError);
|
||||||
|
await expect(result).rejects.toThrow('Error verifying WebID via DPoP token: invalid');
|
||||||
});
|
});
|
||||||
});
|
});
|
||||||
});
|
});
|
||||||
|
20
test/unit/authentication/EmptyCredentialsExtractor.test.ts
Normal file
20
test/unit/authentication/EmptyCredentialsExtractor.test.ts
Normal file
@ -0,0 +1,20 @@
|
|||||||
|
import { EmptyCredentialsExtractor } from '../../../src/authentication/EmptyCredentialsExtractor';
|
||||||
|
import type { HttpRequest } from '../../../src/server/HttpRequest';
|
||||||
|
import { NotImplementedHttpError } from '../../../src/util/errors/NotImplementedHttpError';
|
||||||
|
|
||||||
|
describe('An EmptyCredentialsExtractor', (): void => {
|
||||||
|
const extractor = new EmptyCredentialsExtractor();
|
||||||
|
|
||||||
|
it('throws an error if an Authorization header is specified.', async(): Promise<void> => {
|
||||||
|
const headers = { authorization: 'Other http://alice.example/card#me' };
|
||||||
|
const result = extractor.handleSafe({ headers } as HttpRequest);
|
||||||
|
await expect(result).rejects.toThrow(NotImplementedHttpError);
|
||||||
|
await expect(result).rejects.toThrow('Unexpected Authorization scheme.');
|
||||||
|
});
|
||||||
|
|
||||||
|
it('returns the empty credentials.', async(): Promise<void> => {
|
||||||
|
const headers = {};
|
||||||
|
const result = extractor.handleSafe({ headers } as HttpRequest);
|
||||||
|
await expect(result).resolves.toEqual({});
|
||||||
|
});
|
||||||
|
});
|
27
test/unit/authentication/UnsecureWebIdExtractor.test.ts
Normal file
27
test/unit/authentication/UnsecureWebIdExtractor.test.ts
Normal file
@ -0,0 +1,27 @@
|
|||||||
|
import { UnsecureWebIdExtractor } from '../../../src/authentication/UnsecureWebIdExtractor';
|
||||||
|
import type { HttpRequest } from '../../../src/server/HttpRequest';
|
||||||
|
import { NotImplementedHttpError } from '../../../src/util/errors/NotImplementedHttpError';
|
||||||
|
|
||||||
|
describe('An UnsecureWebIdExtractor', (): void => {
|
||||||
|
const extractor = new UnsecureWebIdExtractor();
|
||||||
|
|
||||||
|
it('throws an error if no Authorization header is specified.', async(): Promise<void> => {
|
||||||
|
const headers = {};
|
||||||
|
const result = extractor.handleSafe({ headers } as HttpRequest);
|
||||||
|
await expect(result).rejects.toThrow(NotImplementedHttpError);
|
||||||
|
await expect(result).rejects.toThrow('No WebID Authorization header specified.');
|
||||||
|
});
|
||||||
|
|
||||||
|
it('throws an error if a non-WebID Authorization header is specified.', async(): Promise<void> => {
|
||||||
|
const headers = { authorization: 'Other http://alice.example/card#me' };
|
||||||
|
const result = extractor.handleSafe({ headers } as HttpRequest);
|
||||||
|
await expect(result).rejects.toThrow(NotImplementedHttpError);
|
||||||
|
await expect(result).rejects.toThrow('No WebID Authorization header specified.');
|
||||||
|
});
|
||||||
|
|
||||||
|
it('returns the authorization header as WebID if there is one.', async(): Promise<void> => {
|
||||||
|
const headers = { authorization: 'WebID http://alice.example/card#me' };
|
||||||
|
const result = extractor.handleSafe({ headers } as HttpRequest);
|
||||||
|
await expect(result).resolves.toEqual({ webID: 'http://alice.example/card#me' });
|
||||||
|
});
|
||||||
|
});
|
@ -1,19 +0,0 @@
|
|||||||
import { UnsecureWebIdExtractor } from '../../../src/authentication/UnsecureWebIdExtractor';
|
|
||||||
import type { HttpRequest } from '../../../src/server/HttpRequest';
|
|
||||||
|
|
||||||
describe('An UnsecureWebIdExtractor', (): void => {
|
|
||||||
const extractor = new UnsecureWebIdExtractor();
|
|
||||||
|
|
||||||
it('can handle all input.', async(): Promise<void> => {
|
|
||||||
await expect(extractor.canHandle({} as HttpRequest)).resolves.toBeUndefined();
|
|
||||||
});
|
|
||||||
|
|
||||||
it('returns undefined if there is no input.', async(): Promise<void> => {
|
|
||||||
await expect(extractor.handle({ headers: {}} as HttpRequest)).resolves.toEqual({});
|
|
||||||
});
|
|
||||||
|
|
||||||
it('returns the authorization header as webID if there is one.', async(): Promise<void> => {
|
|
||||||
await expect(extractor.handle({ headers: { authorization: 'test' }} as HttpRequest))
|
|
||||||
.resolves.toEqual({ webID: 'test' });
|
|
||||||
});
|
|
||||||
});
|
|
Loading…
x
Reference in New Issue
Block a user