mirror of
https://github.com/CommunitySolidServer/CommunitySolidServer.git
synced 2024-10-03 14:55:10 +00:00
refactor: Restructure source code folder
This way the location of certain classes should make more sense
This commit is contained in:
32
test/unit/authorization/access/AgentAccessChecker.test.ts
Normal file
32
test/unit/authorization/access/AgentAccessChecker.test.ts
Normal file
@@ -0,0 +1,32 @@
|
||||
import { DataFactory, Store } from 'n3';
|
||||
import type { AccessCheckerArgs } from '../../../../src/authorization/access/AccessChecker';
|
||||
import { AgentAccessChecker } from '../../../../src/authorization/access/AgentAccessChecker';
|
||||
import { ACL } from '../../../../src/util/Vocabularies';
|
||||
import namedNode = DataFactory.namedNode;
|
||||
|
||||
describe('A AgentAccessChecker', (): void => {
|
||||
const webId = 'http://test.com/alice/profile/card#me';
|
||||
const acl = new Store();
|
||||
acl.addQuad(namedNode('match'), ACL.terms.agent, namedNode(webId));
|
||||
acl.addQuad(namedNode('noMatch'), ACL.terms.agent, namedNode('http://test.com/bob'));
|
||||
const checker = new AgentAccessChecker();
|
||||
|
||||
it('can handle all requests.', async(): Promise<void> => {
|
||||
await expect(checker.canHandle(null as any)).resolves.toBeUndefined();
|
||||
});
|
||||
|
||||
it('returns true if a match is found for the given WebID.', async(): Promise<void> => {
|
||||
const input: AccessCheckerArgs = { acl, rule: namedNode('match'), credential: { webId }};
|
||||
await expect(checker.handle(input)).resolves.toBe(true);
|
||||
});
|
||||
|
||||
it('returns false if no match is found.', async(): Promise<void> => {
|
||||
const input: AccessCheckerArgs = { acl, rule: namedNode('noMatch'), credential: { webId }};
|
||||
await expect(checker.handle(input)).resolves.toBe(false);
|
||||
});
|
||||
|
||||
it('returns false if the credentials contain no WebID.', async(): Promise<void> => {
|
||||
const input: AccessCheckerArgs = { acl, rule: namedNode('match'), credential: {}};
|
||||
await expect(checker.handle(input)).resolves.toBe(false);
|
||||
});
|
||||
});
|
||||
@@ -0,0 +1,37 @@
|
||||
import { DataFactory, Store } from 'n3';
|
||||
import type { AccessCheckerArgs } from '../../../../src/authorization/access/AccessChecker';
|
||||
import { AgentClassAccessChecker } from '../../../../src/authorization/access/AgentClassAccessChecker';
|
||||
import { ACL, FOAF } from '../../../../src/util/Vocabularies';
|
||||
import namedNode = DataFactory.namedNode;
|
||||
|
||||
describe('An AgentClassAccessChecker', (): void => {
|
||||
const webId = 'http://test.com/alice/profile/card#me';
|
||||
const acl = new Store();
|
||||
acl.addQuad(namedNode('agentMatch'), ACL.terms.agentClass, FOAF.terms.Agent);
|
||||
acl.addQuad(namedNode('authenticatedMatch'), ACL.terms.agentClass, ACL.terms.AuthenticatedAgent);
|
||||
const checker = new AgentClassAccessChecker();
|
||||
|
||||
it('can handle all requests.', async(): Promise<void> => {
|
||||
await expect(checker.canHandle(null as any)).resolves.toBeUndefined();
|
||||
});
|
||||
|
||||
it('returns true if the rule contains foaf:agent as supported class.', async(): Promise<void> => {
|
||||
const input: AccessCheckerArgs = { acl, rule: namedNode('agentMatch'), credential: {}};
|
||||
await expect(checker.handle(input)).resolves.toBe(true);
|
||||
});
|
||||
|
||||
it('returns true for authenticated users with an acl:AuthenticatedAgent rule.', async(): Promise<void> => {
|
||||
const input: AccessCheckerArgs = { acl, rule: namedNode('authenticatedMatch'), credential: { webId }};
|
||||
await expect(checker.handle(input)).resolves.toBe(true);
|
||||
});
|
||||
|
||||
it('returns false for unauthenticated users with an acl:AuthenticatedAgent rule.', async(): Promise<void> => {
|
||||
const input: AccessCheckerArgs = { acl, rule: namedNode('authenticatedMatch'), credential: {}};
|
||||
await expect(checker.handle(input)).resolves.toBe(false);
|
||||
});
|
||||
|
||||
it('returns false if no class rule is found.', async(): Promise<void> => {
|
||||
const input: AccessCheckerArgs = { acl, rule: namedNode('noMatch'), credential: {}};
|
||||
await expect(checker.handle(input)).resolves.toBe(false);
|
||||
});
|
||||
});
|
||||
@@ -0,0 +1,62 @@
|
||||
import { DataFactory, Store } from 'n3';
|
||||
import type { AccessCheckerArgs } from '../../../../src/authorization/access/AccessChecker';
|
||||
import { AgentGroupAccessChecker } from '../../../../src/authorization/access/AgentGroupAccessChecker';
|
||||
import { BasicRepresentation } from '../../../../src/http/representation/BasicRepresentation';
|
||||
import type { Representation } from '../../../../src/http/representation/Representation';
|
||||
import type { RepresentationConverter } from '../../../../src/storage/conversion/RepresentationConverter';
|
||||
import type { ExpiringStorage } from '../../../../src/storage/keyvalue/ExpiringStorage';
|
||||
import { INTERNAL_QUADS } from '../../../../src/util/ContentTypes';
|
||||
import * as fetchUtil from '../../../../src/util/FetchUtil';
|
||||
import { ACL, VCARD } from '../../../../src/util/Vocabularies';
|
||||
const { namedNode, quad } = DataFactory;
|
||||
|
||||
describe('An AgentGroupAccessChecker', (): void => {
|
||||
const webId = 'http://test.com/alice/profile/card#me';
|
||||
const groupId = 'http://test.com/group';
|
||||
const acl = new Store();
|
||||
acl.addQuad(namedNode('groupMatch'), ACL.terms.agentGroup, namedNode(groupId));
|
||||
acl.addQuad(namedNode('noMatch'), ACL.terms.agentGroup, namedNode('badGroup'));
|
||||
let fetchMock: jest.SpyInstance;
|
||||
let representation: Representation;
|
||||
const converter: RepresentationConverter = {} as any;
|
||||
let cache: ExpiringStorage<string, Promise<Store>>;
|
||||
let checker: AgentGroupAccessChecker;
|
||||
|
||||
beforeEach(async(): Promise<void> => {
|
||||
const groupQuads = [ quad(namedNode(groupId), VCARD.terms.hasMember, namedNode(webId)) ];
|
||||
representation = new BasicRepresentation(groupQuads, INTERNAL_QUADS, false);
|
||||
fetchMock = jest.spyOn(fetchUtil, 'fetchDataset');
|
||||
fetchMock.mockResolvedValue(representation);
|
||||
fetchMock.mockClear();
|
||||
|
||||
cache = new Map() as any;
|
||||
|
||||
checker = new AgentGroupAccessChecker(converter, cache);
|
||||
});
|
||||
|
||||
it('can handle all requests.', async(): Promise<void> => {
|
||||
await expect(checker.canHandle(null as any)).resolves.toBeUndefined();
|
||||
});
|
||||
|
||||
it('returns true if the WebID is a valid group member.', async(): Promise<void> => {
|
||||
const input: AccessCheckerArgs = { acl, rule: namedNode('groupMatch'), credential: { webId }};
|
||||
await expect(checker.handle(input)).resolves.toBe(true);
|
||||
});
|
||||
|
||||
it('returns false if the WebID is not a valid group member.', async(): Promise<void> => {
|
||||
const input: AccessCheckerArgs = { acl, rule: namedNode('noMatch'), credential: { webId }};
|
||||
await expect(checker.handle(input)).resolves.toBe(false);
|
||||
});
|
||||
|
||||
it('returns false if there are no WebID credentials.', async(): Promise<void> => {
|
||||
const input: AccessCheckerArgs = { acl, rule: namedNode('groupMatch'), credential: {}};
|
||||
await expect(checker.handle(input)).resolves.toBe(false);
|
||||
});
|
||||
|
||||
it('caches fetched results.', async(): Promise<void> => {
|
||||
const input: AccessCheckerArgs = { acl, rule: namedNode('groupMatch'), credential: { webId }};
|
||||
await expect(checker.handle(input)).resolves.toBe(true);
|
||||
await expect(checker.handle(input)).resolves.toBe(true);
|
||||
expect(fetchMock).toHaveBeenCalledTimes(1);
|
||||
});
|
||||
});
|
||||
Reference in New Issue
Block a user