mirror of
https://github.com/CommunitySolidServer/CommunitySolidServer.git
synced 2024-10-03 14:55:10 +00:00
72 lines
3.0 KiB
TypeScript
72 lines
3.0 KiB
TypeScript
import { CredentialGroup } from '../../../src/authentication/Credentials';
|
|
import type { AuthorizerInput } from '../../../src/authorization/Authorizer';
|
|
import { PermissionBasedAuthorizer } from '../../../src/authorization/PermissionBasedAuthorizer';
|
|
import { AccessMode } from '../../../src/authorization/permissions/Permissions';
|
|
import type { ResourceSet } from '../../../src/storage/ResourceSet';
|
|
import { ForbiddenHttpError } from '../../../src/util/errors/ForbiddenHttpError';
|
|
import { NotFoundHttpError } from '../../../src/util/errors/NotFoundHttpError';
|
|
import { UnauthorizedHttpError } from '../../../src/util/errors/UnauthorizedHttpError';
|
|
|
|
describe('A PermissionBasedAuthorizer', (): void => {
|
|
let input: AuthorizerInput;
|
|
let resourceSet: jest.Mocked<ResourceSet>;
|
|
let authorizer: PermissionBasedAuthorizer;
|
|
|
|
beforeEach(async(): Promise<void> => {
|
|
input = {
|
|
identifier: { path: 'http://test.com/foo' },
|
|
modes: new Set<AccessMode>(),
|
|
permissionSet: {},
|
|
credentials: {},
|
|
};
|
|
resourceSet = {
|
|
hasResource: jest.fn().mockResolvedValue(true),
|
|
};
|
|
|
|
authorizer = new PermissionBasedAuthorizer(resourceSet);
|
|
});
|
|
|
|
it('can handle any input.', async(): Promise<void> => {
|
|
await expect(authorizer.canHandle(input)).resolves.toBeUndefined();
|
|
});
|
|
|
|
it('allows access if the permissions are matched by the reader output.', async(): Promise<void> => {
|
|
input.modes = new Set([ AccessMode.read, AccessMode.write ]);
|
|
input.permissionSet = {
|
|
[CredentialGroup.public]: { read: true, write: false },
|
|
[CredentialGroup.agent]: { write: true },
|
|
};
|
|
await expect(authorizer.handle(input)).resolves.toBeUndefined();
|
|
});
|
|
|
|
it('throws an UnauthorizedHttpError when an unauthenticated request has no access.', async(): Promise<void> => {
|
|
input.modes = new Set([ AccessMode.read, AccessMode.write ]);
|
|
input.permissionSet = {
|
|
[CredentialGroup.public]: { read: true, write: false },
|
|
};
|
|
await expect(authorizer.handle(input)).rejects.toThrow(UnauthorizedHttpError);
|
|
});
|
|
|
|
it('throws a ForbiddenHttpError when an authenticated request has no access.', async(): Promise<void> => {
|
|
input.credentials = { agent: { webId: 'http://test.com/#me' }};
|
|
input.modes = new Set([ AccessMode.read, AccessMode.write ]);
|
|
input.permissionSet = {
|
|
[CredentialGroup.public]: { read: true, write: false },
|
|
};
|
|
await expect(authorizer.handle(input)).rejects.toThrow(ForbiddenHttpError);
|
|
});
|
|
|
|
it('defaults to empty permissions for the Authorization.', async(): Promise<void> => {
|
|
await expect(authorizer.handle(input)).resolves.toBeUndefined();
|
|
});
|
|
|
|
it('throws a 404 in case the target resource does not exist and would not be written to.', async(): Promise<void> => {
|
|
resourceSet.hasResource.mockResolvedValueOnce(false);
|
|
input.modes = new Set([ AccessMode.delete ]);
|
|
input.permissionSet = {
|
|
[CredentialGroup.public]: { read: true },
|
|
};
|
|
await expect(authorizer.handle(input)).rejects.toThrow(NotFoundHttpError);
|
|
});
|
|
});
|