mirror of
https://github.com/CommunitySolidServer/CommunitySolidServer.git
synced 2024-10-03 14:55:10 +00:00
feat: Return 404 for read/delete requests if there is no resource
This commit is contained in:
parent
9a29cc2257
commit
e86e0cf36b
@ -23,7 +23,7 @@ These changes are relevant if you wrote custom modules for the server that depen
|
|||||||
- `PermissionReader`s take an additional `modes` parameter as input.
|
- `PermissionReader`s take an additional `modes` parameter as input.
|
||||||
- The `ResourceStore` function `resourceExists` has been renamed to `hasResource`
|
- The `ResourceStore` function `resourceExists` has been renamed to `hasResource`
|
||||||
and has been moved to a separate `ResourceSet` interface.
|
and has been moved to a separate `ResourceSet` interface.
|
||||||
- Several `ModesExtractor`s now take a `ResourceSet` as constructor parameter.
|
- Several `ModesExtractor`s `PermissionBasedAuthorizer` now take a `ResourceSet` as constructor parameter.
|
||||||
|
|
||||||
## v3.0.0
|
## v3.0.0
|
||||||
### New features
|
### New features
|
||||||
|
@ -4,7 +4,8 @@
|
|||||||
{
|
{
|
||||||
"comment": "Matches requested permissions with those available.",
|
"comment": "Matches requested permissions with those available.",
|
||||||
"@id": "urn:solid-server:default:Authorizer",
|
"@id": "urn:solid-server:default:Authorizer",
|
||||||
"@type": "PermissionBasedAuthorizer"
|
"@type": "PermissionBasedAuthorizer",
|
||||||
|
"resourceSet": { "@id": "urn:solid-server:default:CachedResourceSet" }
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,10 +1,13 @@
|
|||||||
import type { CredentialSet } from '../authentication/Credentials';
|
import type { CredentialSet } from '../authentication/Credentials';
|
||||||
import { getLoggerFor } from '../logging/LogUtil';
|
import { getLoggerFor } from '../logging/LogUtil';
|
||||||
|
import type { ResourceSet } from '../storage/ResourceSet';
|
||||||
import { ForbiddenHttpError } from '../util/errors/ForbiddenHttpError';
|
import { ForbiddenHttpError } from '../util/errors/ForbiddenHttpError';
|
||||||
|
import { NotFoundHttpError } from '../util/errors/NotFoundHttpError';
|
||||||
import { UnauthorizedHttpError } from '../util/errors/UnauthorizedHttpError';
|
import { UnauthorizedHttpError } from '../util/errors/UnauthorizedHttpError';
|
||||||
import type { AuthorizerInput } from './Authorizer';
|
import type { AuthorizerInput } from './Authorizer';
|
||||||
import { Authorizer } from './Authorizer';
|
import { Authorizer } from './Authorizer';
|
||||||
import type { AccessMode, PermissionSet } from './permissions/Permissions';
|
import type { PermissionSet } from './permissions/Permissions';
|
||||||
|
import { AccessMode } from './permissions/Permissions';
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Authorizer that bases its decision on the output it gets from its PermissionReader.
|
* Authorizer that bases its decision on the output it gets from its PermissionReader.
|
||||||
@ -15,14 +18,39 @@ import type { AccessMode, PermissionSet } from './permissions/Permissions';
|
|||||||
export class PermissionBasedAuthorizer extends Authorizer {
|
export class PermissionBasedAuthorizer extends Authorizer {
|
||||||
protected readonly logger = getLoggerFor(this);
|
protected readonly logger = getLoggerFor(this);
|
||||||
|
|
||||||
|
private readonly resourceSet: ResourceSet;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* The existence of the target resource determines the output status code for certain situations.
|
||||||
|
* The provided {@link ResourceSet} will be used for that.
|
||||||
|
* @param resourceSet - {@link ResourceSet} that can verify the target resource existence.
|
||||||
|
*/
|
||||||
|
public constructor(resourceSet: ResourceSet) {
|
||||||
|
super();
|
||||||
|
this.resourceSet = resourceSet;
|
||||||
|
}
|
||||||
|
|
||||||
public async handle(input: AuthorizerInput): Promise<void> {
|
public async handle(input: AuthorizerInput): Promise<void> {
|
||||||
const { credentials, modes, identifier, permissionSet } = input;
|
const { credentials, modes, identifier, permissionSet } = input;
|
||||||
|
|
||||||
const modeString = [ ...modes ].join(',');
|
const modeString = [ ...modes ].join(',');
|
||||||
this.logger.debug(`Checking if ${credentials.agent?.webId} has ${modeString} permissions for ${identifier.path}`);
|
this.logger.debug(`Checking if ${credentials.agent?.webId} has ${modeString} permissions for ${identifier.path}`);
|
||||||
|
|
||||||
|
// Ensure all required modes are within the agent's permissions.
|
||||||
for (const mode of modes) {
|
for (const mode of modes) {
|
||||||
|
try {
|
||||||
this.requireModePermission(credentials, permissionSet, mode);
|
this.requireModePermission(credentials, permissionSet, mode);
|
||||||
|
} catch (error: unknown) {
|
||||||
|
// If we know the operation will return a 404 regardless (= resource does not exist and is not being created),
|
||||||
|
// and the agent is allowed to know about its existence (= the agent has Read permissions),
|
||||||
|
// then immediately send the 404 here, as it makes any other agent permissions irrelevant.
|
||||||
|
const exposeExistence = this.hasModePermission(permissionSet, AccessMode.read);
|
||||||
|
if (exposeExistence && !modes.has(AccessMode.create) && !await this.resourceSet.hasResource(identifier)) {
|
||||||
|
throw new NotFoundHttpError();
|
||||||
|
}
|
||||||
|
// Otherwise, deny access based on existing grounds.
|
||||||
|
throw error;
|
||||||
|
}
|
||||||
}
|
}
|
||||||
this.logger.debug(`${JSON.stringify(credentials)} has ${modeString} permissions for ${identifier.path}`);
|
this.logger.debug(`${JSON.stringify(credentials)} has ${modeString} permissions for ${identifier.path}`);
|
||||||
}
|
}
|
||||||
|
@ -2,11 +2,14 @@ import { CredentialGroup } from '../../../src/authentication/Credentials';
|
|||||||
import type { AuthorizerInput } from '../../../src/authorization/Authorizer';
|
import type { AuthorizerInput } from '../../../src/authorization/Authorizer';
|
||||||
import { PermissionBasedAuthorizer } from '../../../src/authorization/PermissionBasedAuthorizer';
|
import { PermissionBasedAuthorizer } from '../../../src/authorization/PermissionBasedAuthorizer';
|
||||||
import { AccessMode } from '../../../src/authorization/permissions/Permissions';
|
import { AccessMode } from '../../../src/authorization/permissions/Permissions';
|
||||||
|
import type { ResourceSet } from '../../../src/storage/ResourceSet';
|
||||||
import { ForbiddenHttpError } from '../../../src/util/errors/ForbiddenHttpError';
|
import { ForbiddenHttpError } from '../../../src/util/errors/ForbiddenHttpError';
|
||||||
|
import { NotFoundHttpError } from '../../../src/util/errors/NotFoundHttpError';
|
||||||
import { UnauthorizedHttpError } from '../../../src/util/errors/UnauthorizedHttpError';
|
import { UnauthorizedHttpError } from '../../../src/util/errors/UnauthorizedHttpError';
|
||||||
|
|
||||||
describe('A PermissionBasedAuthorizer', (): void => {
|
describe('A PermissionBasedAuthorizer', (): void => {
|
||||||
let input: AuthorizerInput;
|
let input: AuthorizerInput;
|
||||||
|
let resourceSet: jest.Mocked<ResourceSet>;
|
||||||
let authorizer: PermissionBasedAuthorizer;
|
let authorizer: PermissionBasedAuthorizer;
|
||||||
|
|
||||||
beforeEach(async(): Promise<void> => {
|
beforeEach(async(): Promise<void> => {
|
||||||
@ -16,8 +19,11 @@ describe('A PermissionBasedAuthorizer', (): void => {
|
|||||||
permissionSet: {},
|
permissionSet: {},
|
||||||
credentials: {},
|
credentials: {},
|
||||||
};
|
};
|
||||||
|
resourceSet = {
|
||||||
|
hasResource: jest.fn().mockResolvedValue(true),
|
||||||
|
};
|
||||||
|
|
||||||
authorizer = new PermissionBasedAuthorizer();
|
authorizer = new PermissionBasedAuthorizer(resourceSet);
|
||||||
});
|
});
|
||||||
|
|
||||||
it('can handle any input.', async(): Promise<void> => {
|
it('can handle any input.', async(): Promise<void> => {
|
||||||
@ -53,4 +59,13 @@ describe('A PermissionBasedAuthorizer', (): void => {
|
|||||||
it('defaults to empty permissions for the Authorization.', async(): Promise<void> => {
|
it('defaults to empty permissions for the Authorization.', async(): Promise<void> => {
|
||||||
await expect(authorizer.handle(input)).resolves.toBeUndefined();
|
await expect(authorizer.handle(input)).resolves.toBeUndefined();
|
||||||
});
|
});
|
||||||
|
|
||||||
|
it('throws a 404 in case the target resource does not exist and would not be written to.', async(): Promise<void> => {
|
||||||
|
resourceSet.hasResource.mockResolvedValueOnce(false);
|
||||||
|
input.modes = new Set([ AccessMode.delete ]);
|
||||||
|
input.permissionSet = {
|
||||||
|
[CredentialGroup.public]: { read: true },
|
||||||
|
};
|
||||||
|
await expect(authorizer.handle(input)).rejects.toThrow(NotFoundHttpError);
|
||||||
|
});
|
||||||
});
|
});
|
||||||
|
Loading…
x
Reference in New Issue
Block a user