solid-server 5.8.6 → 5.8.8-8d509db1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/CHANGELOG.md +0 -0
- package/CONTRIBUTING.md +0 -0
- package/CONTRIBUTORS.md +0 -0
- package/Dockerfile +0 -0
- package/LICENSE.md +0 -0
- package/README.md +0 -0
- package/bin/config.json +0 -0
- package/bin/lib/cli-utils.mjs +54 -0
- package/bin/lib/cli.mjs +44 -0
- package/bin/lib/{init.js → init.mjs} +93 -94
- package/bin/lib/{invalidUsernames.js → invalidUsernames.mjs} +136 -148
- package/bin/lib/{migrateLegacyResources.js → migrateLegacyResources.mjs} +64 -69
- package/bin/lib/{options.js → options.mjs} +379 -405
- package/bin/lib/{start.js → start.mjs} +124 -148
- package/bin/lib/{updateIndex.js → updateIndex.mjs} +55 -56
- package/bin/solid +2 -2
- package/bin/solid-test +0 -0
- package/common/css/bootstrap.min.css +6 -0
- package/common/css/solid.css +0 -0
- package/common/fonts/glyphicons-halflings-regular.eot +0 -0
- package/common/fonts/glyphicons-halflings-regular.svg +0 -0
- package/common/fonts/glyphicons-halflings-regular.ttf +0 -0
- package/common/fonts/glyphicons-halflings-regular.woff +0 -0
- package/common/fonts/glyphicons-halflings-regular.woff2 +0 -0
- package/common/img/solid-emblem.svg +0 -0
- package/common/js/auth-buttons.js +0 -0
- package/common/js/auth-buttons.mjs +57 -0
- package/common/js/index-buttons.js +0 -0
- package/common/js/index-buttons.mjs +43 -0
- package/common/js/solid.js +0 -0
- package/common/js/solid.mjs +456 -0
- package/common/well-known/security.txt +0 -0
- package/config/defaults.js +0 -0
- package/config/defaults.mjs +22 -0
- package/config/templates/emails/delete-account.js +49 -0
- package/config/templates/emails/delete-account.mjs +31 -0
- package/config/templates/emails/invalid-username.js +30 -0
- package/config/templates/emails/invalid-username.mjs +27 -0
- package/config/templates/emails/reset-password.js +49 -0
- package/config/templates/emails/reset-password.mjs +31 -0
- package/config/templates/emails/welcome.js +39 -0
- package/config/templates/emails/welcome.mjs +23 -0
- package/config/templates/new-account/favicon.ico +0 -0
- package/config/templates/new-account/favicon.ico.acl +26 -0
- package/config/templates/new-account/profile/card$.ttl +26 -0
- package/config/templates/new-account/robots.txt +3 -0
- package/config/templates/new-account/robots.txt.acl +26 -0
- package/config/templates/new-account/settings/prefs.ttl +15 -0
- package/config/templates/new-account/settings/privateTypeIndex.ttl +4 -0
- package/config/templates/new-account/settings/publicTypeIndex.ttl +4 -0
- package/{default-templates/new-account/.meta.acl → config/templates/new-account/settings/publicTypeIndex.ttl.acl} +4 -4
- package/config/templates/new-account/settings/serverSide.ttl.acl +13 -0
- package/config/templates/new-account/settings/serverSide.ttl.inactive +12 -0
- package/config/templates/server/favicon.ico +0 -0
- package/{.well-known/.acl → config/templates/server/favicon.ico.acl} +2 -2
- package/config/templates/server/index.html +54 -0
- package/config/templates/server/robots.txt +3 -0
- package/{default-templates/server/.well-known/.acl → config/templates/server/robots.txt.acl} +2 -2
- package/config/usernames-blacklist.json +0 -0
- package/config/views/account/account-deleted.hbs +17 -0
- package/config/views/account/delete-confirm.hbs +51 -0
- package/config/views/account/delete-link-sent.hbs +17 -0
- package/config/views/account/delete.hbs +51 -0
- package/config/views/account/invalid-username.hbs +22 -0
- package/config/views/account/register-disabled.hbs +6 -0
- package/config/views/account/register-form.hbs +133 -0
- package/config/views/account/register.hbs +24 -0
- package/config/views/auth/auth-hidden-fields.hbs +8 -0
- package/config/views/auth/change-password.hbs +58 -0
- package/config/views/auth/goodbye.hbs +23 -0
- package/config/views/auth/login-required.hbs +34 -0
- package/config/views/auth/login-tls.hbs +11 -0
- package/config/views/auth/login-username-password.hbs +28 -0
- package/config/views/auth/login.hbs +55 -0
- package/config/views/auth/no-permission.hbs +29 -0
- package/config/views/auth/password-changed.hbs +27 -0
- package/config/views/auth/reset-link-sent.hbs +21 -0
- package/config/views/auth/reset-password.hbs +52 -0
- package/config/views/auth/sharing.hbs +49 -0
- package/config/views/shared/create-account.hbs +8 -0
- package/config/views/shared/error.hbs +5 -0
- package/config.json-default +0 -0
- package/coverage/tmp/coverage-2254-1766613200322-0.json +1 -0
- package/coverage/tmp/coverage-2255-1766613179053-0.json +1 -0
- package/default-templates/emails/delete-account.js +0 -0
- package/default-templates/emails/delete-account.mjs +31 -0
- package/default-templates/emails/invalid-username.js +0 -0
- package/default-templates/emails/invalid-username.mjs +27 -0
- package/default-templates/emails/reset-password.js +0 -0
- package/default-templates/emails/reset-password.mjs +31 -0
- package/default-templates/emails/welcome.js +0 -0
- package/default-templates/emails/welcome.mjs +23 -0
- package/default-templates/new-account/favicon.ico +0 -0
- package/default-templates/new-account/favicon.ico.acl +0 -0
- package/default-templates/new-account/profile/card$.ttl +0 -0
- package/default-templates/new-account/robots.txt +0 -0
- package/default-templates/new-account/robots.txt.acl +0 -0
- package/default-templates/new-account/settings/prefs.ttl +0 -0
- package/default-templates/new-account/settings/privateTypeIndex.ttl +0 -0
- package/default-templates/new-account/settings/publicTypeIndex.ttl +0 -0
- package/default-templates/new-account/settings/publicTypeIndex.ttl.acl +0 -0
- package/default-templates/new-account/settings/serverSide.ttl.acl +0 -0
- package/default-templates/new-account/settings/serverSide.ttl.inactive +0 -0
- package/default-templates/server/favicon.ico +0 -0
- package/default-templates/server/favicon.ico.acl +0 -0
- package/default-templates/server/index.html +0 -0
- package/default-templates/server/robots.txt +0 -0
- package/default-templates/server/robots.txt.acl +0 -0
- package/default-views/account/account-deleted.hbs +0 -0
- package/default-views/account/delete-confirm.hbs +0 -0
- package/default-views/account/delete-link-sent.hbs +0 -0
- package/default-views/account/delete.hbs +0 -0
- package/default-views/account/invalid-username.hbs +0 -0
- package/default-views/account/register-disabled.hbs +0 -0
- package/default-views/account/register-form.hbs +0 -0
- package/default-views/account/register.hbs +0 -0
- package/default-views/auth/auth-hidden-fields.hbs +0 -0
- package/default-views/auth/change-password.hbs +0 -0
- package/default-views/auth/goodbye.hbs +0 -0
- package/default-views/auth/login-required.hbs +0 -0
- package/default-views/auth/login-tls.hbs +0 -0
- package/default-views/auth/login-username-password.hbs +0 -0
- package/default-views/auth/login.hbs +0 -0
- package/default-views/auth/no-permission.hbs +0 -0
- package/default-views/auth/password-changed.hbs +0 -0
- package/default-views/auth/reset-link-sent.hbs +0 -0
- package/default-views/auth/reset-password.hbs +0 -0
- package/default-views/auth/sharing.hbs +0 -0
- package/default-views/shared/create-account.hbs +0 -0
- package/default-views/shared/error.hbs +0 -0
- package/docker-compose.yml +0 -0
- package/docker-image/CONTRIBUTING.md +33 -0
- package/docker-image/Makefile +32 -0
- package/docker-image/README.md +65 -0
- package/docker-image/examples/docker-compose.all-in-one.yml +76 -0
- package/docker-image/examples/docker-compose.nginx.yml +51 -0
- package/docker-image/examples/docker-compose.simple.yml +34 -0
- package/docker-image/src/Dockerfile +34 -0
- package/docker-image/src/checks.sh +56 -0
- package/docker-image/src/create-temporary-cert.sh +14 -0
- package/docker-image/src/entrypoint.sh +8 -0
- package/{common/img/.gitkeep → docker-image/test/__init__.py} +0 -0
- package/docker-image/test/conftest.py +15 -0
- package/docker-image/test/test_image_foundations.py +51 -0
- package/docker-image/test/test_non_accessible_key_cert.py +36 -0
- package/docker-image/test/test_precondition_checks.py +41 -0
- package/docker-image/test/test_solid_default_config.py +66 -0
- package/docker-image/test/test_volumes.py +55 -0
- package/docker-image/test/wait_for_container.py +8 -0
- package/docs/how-to-delete-your-account.md +0 -0
- package/docs/login-and-grant-access-to-application.md +0 -0
- package/examples/custom-error-handling.js +0 -0
- package/examples/custom-error-handling.mjs +29 -0
- package/examples/ldp-with-webid.js +0 -0
- package/examples/ldp-with-webid.mjs +12 -0
- package/examples/simple-express-app.js +0 -0
- package/examples/simple-express-app.mjs +20 -0
- package/examples/simple-ldp-server.js +0 -0
- package/examples/simple-ldp-server.mjs +8 -0
- package/favicon.ico +0 -0
- package/favicon.ico.acl +0 -0
- package/index.cjs +4 -0
- package/index.html +0 -0
- package/index.mjs +23 -0
- package/lib/{acl-checker.js → acl-checker.mjs} +13 -15
- package/lib/api/accounts/{user-accounts.js → user-accounts.mjs} +17 -16
- package/lib/api/authn/{force-user.js → force-user.mjs} +5 -4
- package/lib/api/authn/index.mjs +8 -0
- package/lib/api/authn/{webid-oidc.js → webid-oidc.mjs} +27 -20
- package/lib/api/authn/{webid-tls.js → webid-tls.mjs} +12 -11
- package/lib/api/index.mjs +7 -0
- package/lib/{capability-discovery.js → capability-discovery.mjs} +3 -6
- package/lib/common/{fs-utils.js → fs-utils.mjs} +35 -43
- package/lib/common/template-utils.mjs +29 -0
- package/lib/common/{user-utils.js → user-utils.mjs} +24 -28
- package/lib/{create-app.js → create-app.mjs} +372 -361
- package/lib/{create-server.js → create-server.mjs} +32 -11
- package/lib/debug.mjs +37 -0
- package/lib/handlers/{allow.js → allow.mjs} +79 -83
- package/lib/handlers/{auth-proxy.js → auth-proxy.mjs} +4 -5
- package/lib/handlers/{copy.js → copy.mjs} +37 -39
- package/lib/handlers/{cors-proxy.js → cors-proxy.mjs} +9 -11
- package/lib/handlers/{delete.js → delete.mjs} +20 -22
- package/lib/handlers/{error-pages.js → error-pages.mjs} +144 -212
- package/lib/handlers/{get.js → get.mjs} +254 -252
- package/lib/handlers/{index.js → index.mjs} +7 -8
- package/lib/handlers/{notify.js → notify.mjs} +8 -10
- package/lib/handlers/{options.js → options.mjs} +3 -5
- package/lib/handlers/patch/{n3-patch-parser.js → n3-patch-parser.mjs} +57 -59
- package/lib/handlers/patch/{sparql-update-parser.js → sparql-update-parser.mjs} +14 -16
- package/lib/handlers/{patch.js → patch.mjs} +241 -235
- package/lib/handlers/{post.js → post.mjs} +101 -99
- package/lib/handlers/{put.js → put.mjs} +101 -105
- package/lib/handlers/{restrict-to-top-domain.js → restrict-to-top-domain.mjs} +2 -2
- package/lib/{header.js → header.mjs} +138 -143
- package/lib/{http-error.js → http-error.mjs} +35 -34
- package/lib/{ldp-container.js → ldp-container.mjs} +10 -12
- package/lib/ldp-copy.mjs +82 -0
- package/lib/ldp-middleware.mjs +38 -0
- package/lib/{ldp.js → ldp.mjs} +286 -75
- package/lib/{lock.js → lock.mjs} +10 -10
- package/lib/{metadata.js → metadata.mjs} +11 -11
- package/lib/models/account-manager.mjs +297 -0
- package/lib/models/account-template.mjs +70 -0
- package/lib/models/authenticator.mjs +161 -0
- package/lib/models/oidc-manager.mjs +23 -0
- package/lib/models/solid-host.mjs +63 -0
- package/lib/models/user-account.mjs +50 -0
- package/lib/models/webid-tls-certificate.mjs +97 -0
- package/lib/{payment-pointer-discovery.js → payment-pointer-discovery.mjs} +5 -8
- package/lib/{rdf-notification-template.js → rdf-notification-template.mjs} +3 -5
- package/lib/requests/add-cert-request.mjs +70 -0
- package/lib/requests/auth-request.mjs +151 -0
- package/lib/requests/{create-account-request.js → create-account-request.mjs} +249 -452
- package/lib/requests/delete-account-confirm-request.mjs +85 -0
- package/lib/requests/{delete-account-request.js → delete-account-request.mjs} +73 -134
- package/lib/requests/login-request.mjs +89 -0
- package/lib/requests/{password-change-request.js → password-change-request.mjs} +132 -201
- package/lib/requests/{password-reset-email-request.js → password-reset-email-request.mjs} +123 -202
- package/lib/requests/password-reset-request.mjs +47 -0
- package/lib/requests/register-request.mjs +48 -0
- package/lib/requests/{sharing-request.js → sharing-request.mjs} +174 -261
- package/lib/{resource-mapper.js → resource-mapper.mjs} +7 -6
- package/lib/{server-config.js → server-config.mjs} +15 -20
- package/lib/services/{blacklist-service.js → blacklist-service.mjs} +36 -33
- package/lib/services/email-service.mjs +76 -0
- package/lib/services/{token-service.js → token-service.mjs} +36 -44
- package/lib/{utils.js → utils.mjs} +309 -254
- package/lib/webid/{index.js → index.mjs} +9 -13
- package/lib/webid/lib/get.mjs +31 -0
- package/lib/webid/lib/{parse.js → parse.mjs} +10 -12
- package/lib/webid/lib/verify.mjs +77 -0
- package/lib/webid/tls/generate.mjs +53 -0
- package/lib/webid/tls/index.mjs +7 -0
- package/package.json +51 -31
- package/renovate.json +0 -0
- package/robots.txt +0 -0
- package/robots.txt.acl +0 -0
- package/solid-server-5.8.8.tgz +0 -0
- package/static/account-recovery.html +0 -0
- package/static/popup-redirect.html +0 -0
- package/static/signup.html +0 -0
- package/static/signup.html.acl +0 -0
- package/test/index.mjs +168 -0
- package/test/integration/account-creation-tls-test.mjs +127 -0
- package/test/integration/account-manager-test.mjs +151 -0
- package/test/integration/account-template-test.mjs +136 -0
- package/test/integration/acl-oidc-test.mjs +1048 -0
- package/test/integration/acl-tls-test.mjs +964 -0
- package/test/integration/auth-proxy-test.mjs +144 -0
- package/test/integration/authentication-oidc-test.mjs +812 -0
- package/test/integration/authentication-oidc-with-strict-origins-turned-off-test.mjs +638 -0
- package/test/integration/capability-discovery-test.mjs +116 -0
- package/test/integration/cors-proxy-test.mjs +145 -0
- package/test/integration/errors-oidc-test.mjs +109 -0
- package/test/integration/errors-test.mjs +49 -0
- package/test/integration/formats-test.mjs +136 -0
- package/test/integration/header-test.mjs +101 -0
- package/test/integration/http-copy-test.mjs +109 -0
- package/test/integration/http-test.mjs +1197 -0
- package/test/integration/ldp-test.mjs +528 -0
- package/test/integration/oidc-manager-test.mjs +42 -0
- package/test/integration/params-test.mjs +192 -0
- package/test/integration/patch-sparql-update-test.mjs +195 -0
- package/test/integration/patch-test.mjs +573 -0
- package/test/integration/payment-pointer-test.mjs +155 -0
- package/test/integration/prep-test.mjs +314 -0
- package/test/integration/quota-test.mjs +51 -0
- package/test/integration/special-root-acl-handling-test.mjs +68 -0
- package/test/integration/validate-tts-test.mjs +57 -0
- package/test/integration/www-account-creation-oidc-test.mjs +311 -0
- package/test/keys/cert.pem +21 -0
- package/test/keys/client-cert.pem +19 -0
- package/test/keys/client-key.pem +27 -0
- package/test/keys/key.pem +27 -0
- package/test/keys/user1-cert.pem +23 -0
- package/test/keys/user1-key.pem +28 -0
- package/test/keys/user2-cert.pem +23 -0
- package/test/keys/user2-key.pem +27 -0
- package/test/mocha.opts +2 -0
- package/test/resources/Makefile +146 -0
- package/test/resources/accounts/alice.localhost/profile/card +0 -0
- package/test/resources/accounts/db/oidc/op/clients/_key_30860bb5cf6ba07e80ed7b2e7178c7ad.json +1 -0
- package/test/resources/accounts/db/oidc/op/provider.json +419 -0
- package/test/resources/accounts/db/oidc/rp/clients/_key_https%3A%2F%2Flocalhost%3A3457.json +1 -0
- package/test/resources/accounts/localhost/samplePublicContainer/nicola.jpg +0 -0
- package/test/resources/accounts/tim.localhost/hello.html +9 -0
- package/test/resources/accounts/tim.localhost/profile/card +0 -0
- package/test/resources/accounts-acl/config/templates/emails/welcome-test.js +39 -0
- package/test/resources/accounts-acl/config/templates/new-account/favicon.ico +0 -0
- package/test/resources/accounts-acl/config/templates/new-account/favicon.ico.acl +26 -0
- package/test/resources/accounts-acl/config/templates/new-account/index.html +28 -0
- package/test/resources/accounts-acl/config/templates/new-account/index.html.acl +22 -0
- package/test/resources/accounts-acl/config/templates/new-account/profile/card +27 -0
- package/{default-templates/new-account/inbox/.acl → test/resources/accounts-acl/config/templates/new-account/profile/card.acl} +5 -6
- package/test/resources/accounts-acl/config/templates/new-account/settings/prefs.ttl +9 -0
- package/test/resources/accounts-acl/config/templates/new-account/settings/privateTypeIndex.ttl +4 -0
- package/test/resources/accounts-acl/config/templates/new-account/settings/publicTypeIndex.ttl +4 -0
- package/test/resources/accounts-acl/config/templates/new-account/settings/publicTypeIndex.ttl.acl +25 -0
- package/test/resources/accounts-acl/config/templates/new-account/settings/serverSide.ttl +14 -0
- package/test/resources/accounts-acl/config/templates/server/index.html +35 -0
- package/{.acl → test/resources/accounts-acl/config/templates/server/index.html.acl} +4 -3
- package/test/resources/accounts-acl/config/views/account/register.hbs +58 -0
- package/test/resources/accounts-acl/config/views/auth/consent.hbs +49 -0
- package/test/resources/accounts-acl/config/views/auth/goodbye.hbs +20 -0
- package/test/resources/accounts-acl/config/views/auth/login-required.hbs +0 -0
- package/test/resources/accounts-acl/config/views/auth/login.hbs +51 -0
- package/test/resources/accounts-acl/config/views/auth/no-permission.hbs +0 -0
- package/test/resources/accounts-acl/db/oidc/op/clients/_key_77bb3b35edb1f3f7b887c25d1211a491.json +1 -0
- package/test/resources/accounts-acl/db/oidc/op/provider.json +419 -0
- package/test/resources/accounts-acl/db/oidc/rp/clients/_key_https%3A%2F%2Flocalhost%3A7777.json +1 -0
- package/test/resources/accounts-acl/localhost/favicon.ico +0 -0
- package/test/resources/accounts-acl/localhost/index.html +35 -0
- package/{default-templates/server/.acl → test/resources/accounts-acl/localhost/index.html.acl} +4 -3
- package/test/resources/accounts-acl/nicola.localhost/index.html +1 -0
- package/test/resources/accounts-acl/nicola.localhost/index.html.acl +10 -0
- package/test/resources/accounts-acl/quota/settings/serverSide.ttl +11 -0
- package/test/resources/accounts-acl/tim.localhost/append-acl/abc.ttl +1 -0
- package/test/resources/accounts-acl/tim.localhost/append-acl/abc.ttl.acl +8 -0
- package/test/resources/accounts-acl/tim.localhost/append-acl/abc2.ttl +1 -0
- package/test/resources/accounts-acl/tim.localhost/append-acl/abc2.ttl.acl +8 -0
- package/test/resources/accounts-acl/tim.localhost/fake-account/hello.html +9 -0
- package/test/resources/accounts-acl/tim.localhost/group/test-folder/group-listing-error.ttl +1 -0
- package/test/resources/accounts-acl/tim.localhost/group/test-folder/group-listing.ttl +14 -0
- package/test/resources/accounts-acl/tim.localhost/group/test-folder/some-other-file.txt +1 -0
- package/test/resources/accounts-acl/tim.localhost/multi-server/protected.txt +1 -0
- package/test/resources/accounts-acl/tim.localhost/multi-server/protected.txt.acl +8 -0
- package/test/resources/accounts-acl/tim.localhost/no-acl/test-file.html +1 -0
- package/test/resources/accounts-acl/tim.localhost/read-acl/deeper-tree/acls-only-on-top/example.ttl +1 -0
- package/test/resources/accounts-acl/tim.localhost/write-acl/test-file$.txt +1 -0
- package/test/resources/accounts-scenario/alice/db/oidc/op/clients/_key_e46bcfe080c59f5cbb53a559d6a272cb.json +1 -0
- package/test/resources/accounts-scenario/alice/db/oidc/op/provider.json +417 -0
- package/test/resources/accounts-scenario/alice/db/oidc/rp/clients/_key_https%3A%2F%2Flocalhost%3A7000.json +1 -0
- package/test/resources/accounts-scenario/alice/private-for-alice.txt +1 -0
- package/test/resources/accounts-scenario/alice/private-for-alice.txt.acl +12 -0
- package/test/resources/accounts-scenario/alice/profile/card$.ttl +10 -0
- package/test/resources/accounts-scenario/bob/db/oidc/op/clients/_key_e7fd102ec26a3dcd5916751e01a62315.json +1 -0
- package/test/resources/accounts-scenario/bob/db/oidc/op/provider.json +417 -0
- package/test/resources/accounts-scenario/bob/db/oidc/rp/clients/_key_https%3A%2F%2Flocalhost%3A7001.json +1 -0
- package/test/resources/accounts-scenario/bob/profile/card$.ttl +5 -0
- package/test/resources/accounts-scenario/bob/shared-with-alice.txt +1 -0
- package/test/resources/accounts-scenario/bob/shared-with-alice.txt.acl +15 -0
- package/test/resources/accounts-scenario/charlie/db/oidc/op/clients/_key_0eec962830f849876695b69df76a3137.json +1 -0
- package/test/resources/accounts-scenario/charlie/db/oidc/op/provider.json +415 -0
- package/test/resources/accounts-scenario/charlie/db/oidc/rp/clients/_key_https%3A%2F%2Flocalhost%3A5002.json +1 -0
- package/test/resources/accounts-scenario/charlie/profile/card$.ttl +5 -0
- package/test/resources/accounts-strict-origin-off/alice/db/oidc/op/clients/_key_7d536a1f8c6eb86f41261e171a8af79a.json +1 -0
- package/test/resources/accounts-strict-origin-off/alice/db/oidc/op/provider.json +419 -0
- package/test/resources/accounts-strict-origin-off/alice/db/oidc/rp/clients/_key_https%3A%2F%2Flocalhost%3A7010.json +1 -0
- package/test/resources/accounts-strict-origin-off/alice/private-for-alice.txt +1 -0
- package/test/resources/accounts-strict-origin-off/alice/private-for-alice.txt.acl +12 -0
- package/test/resources/accounts-strict-origin-off/alice/profile/card$.ttl +10 -0
- package/test/resources/accounts-strict-origin-off/bob/db/oidc/op/clients/_key_0ed30b9e076814c6f6445582302487c2.json +1 -0
- package/test/resources/accounts-strict-origin-off/bob/db/oidc/op/provider.json +419 -0
- package/test/resources/accounts-strict-origin-off/bob/db/oidc/rp/clients/_key_https%3A%2F%2Flocalhost%3A7011.json +1 -0
- package/test/resources/accounts-strict-origin-off/bob/shared-with-alice.txt +1 -0
- package/test/resources/accounts-strict-origin-off/bob/shared-with-alice.txt.acl +15 -0
- package/test/resources/acl-tls/config/templates/emails/delete-account.js +49 -0
- package/test/resources/acl-tls/config/templates/emails/invalid-username.js +30 -0
- package/test/resources/acl-tls/config/templates/emails/reset-password.js +49 -0
- package/test/resources/acl-tls/config/templates/emails/welcome.js +39 -0
- package/test/resources/acl-tls/config/templates/new-account/favicon.ico +0 -0
- package/test/resources/acl-tls/config/templates/new-account/favicon.ico.acl +26 -0
- package/test/resources/acl-tls/config/templates/new-account/profile/card$.ttl +26 -0
- package/test/resources/acl-tls/config/templates/new-account/robots.txt +3 -0
- package/test/resources/acl-tls/config/templates/new-account/robots.txt.acl +26 -0
- package/test/resources/acl-tls/config/templates/new-account/settings/prefs.ttl +15 -0
- package/test/resources/acl-tls/config/templates/new-account/settings/privateTypeIndex.ttl +4 -0
- package/test/resources/acl-tls/config/templates/new-account/settings/publicTypeIndex.ttl +4 -0
- package/test/resources/acl-tls/config/templates/new-account/settings/publicTypeIndex.ttl.acl +25 -0
- package/test/resources/acl-tls/config/templates/new-account/settings/serverSide.ttl.acl +13 -0
- package/test/resources/acl-tls/config/templates/new-account/settings/serverSide.ttl.inactive +12 -0
- package/test/resources/acl-tls/config/templates/server/favicon.ico +0 -0
- package/test/resources/acl-tls/config/templates/server/favicon.ico.acl +15 -0
- package/test/resources/acl-tls/config/templates/server/index.html +55 -0
- package/test/resources/acl-tls/config/templates/server/robots.txt +3 -0
- package/test/resources/acl-tls/config/templates/server/robots.txt.acl +15 -0
- package/test/resources/acl-tls/config/views/account/account-deleted.hbs +17 -0
- package/test/resources/acl-tls/config/views/account/delete-confirm.hbs +51 -0
- package/test/resources/acl-tls/config/views/account/delete-link-sent.hbs +17 -0
- package/test/resources/acl-tls/config/views/account/delete.hbs +51 -0
- package/test/resources/acl-tls/config/views/account/invalid-username.hbs +22 -0
- package/test/resources/acl-tls/config/views/account/register-disabled.hbs +6 -0
- package/test/resources/acl-tls/config/views/account/register-form.hbs +147 -0
- package/test/resources/acl-tls/config/views/account/register.hbs +24 -0
- package/test/resources/acl-tls/config/views/auth/auth-hidden-fields.hbs +8 -0
- package/test/resources/acl-tls/config/views/auth/change-password.hbs +58 -0
- package/test/resources/acl-tls/config/views/auth/goodbye.hbs +23 -0
- package/test/resources/acl-tls/config/views/auth/login-required.hbs +34 -0
- package/test/resources/acl-tls/config/views/auth/login-tls.hbs +11 -0
- package/test/resources/acl-tls/config/views/auth/login-username-password.hbs +28 -0
- package/test/resources/acl-tls/config/views/auth/login.hbs +55 -0
- package/test/resources/acl-tls/config/views/auth/no-permission.hbs +29 -0
- package/test/resources/acl-tls/config/views/auth/password-changed.hbs +27 -0
- package/test/resources/acl-tls/config/views/auth/reset-link-sent.hbs +21 -0
- package/test/resources/acl-tls/config/views/auth/reset-password.hbs +52 -0
- package/test/resources/acl-tls/config/views/auth/sharing.hbs +49 -0
- package/test/resources/acl-tls/config/views/shared/create-account.hbs +8 -0
- package/test/resources/acl-tls/config/views/shared/error.hbs +5 -0
- package/test/resources/acl-tls/localhost/favicon.ico +0 -0
- package/test/resources/acl-tls/localhost/favicon.ico.acl +15 -0
- package/test/resources/acl-tls/localhost/index.html +48 -0
- package/test/resources/acl-tls/localhost/robots.txt +3 -0
- package/test/resources/acl-tls/localhost/robots.txt.acl +15 -0
- package/test/resources/acl-tls/tim.localhost/append-acl/abc.ttl +1 -0
- package/test/resources/acl-tls/tim.localhost/append-acl/abc.ttl.acl +8 -0
- package/test/resources/acl-tls/tim.localhost/append-acl/abc2.ttl +1 -0
- package/test/resources/acl-tls/tim.localhost/append-acl/abc2.ttl.acl +8 -0
- package/test/resources/acl-tls/tim.localhost/fake-account/hello.html +9 -0
- package/test/resources/acl-tls/tim.localhost/no-acl/test-file.html +1 -0
- package/test/resources/acl-tls/tim.localhost/profile/card$.ttl +17 -0
- package/test/resources/acl-tls/write-acl/test-file$.ttl +1 -0
- package/test/resources/auth-proxy/index.html +0 -0
- package/test/resources/auth-proxy/index.html.acl +0 -0
- package/test/resources/config/templates/emails/delete-account.js +49 -0
- package/test/resources/config/templates/emails/delete-account.mjs +31 -0
- package/test/resources/config/templates/emails/invalid-username.js +30 -0
- package/test/resources/config/templates/emails/invalid-username.mjs +27 -0
- package/test/resources/config/templates/emails/reset-password.js +49 -0
- package/test/resources/config/templates/emails/reset-password.mjs +31 -0
- package/test/resources/config/templates/emails/welcome.js +39 -0
- package/test/resources/config/templates/emails/welcome.mjs +23 -0
- package/test/resources/config/templates/new-account/favicon.ico +0 -0
- package/test/resources/config/templates/new-account/favicon.ico.acl +26 -0
- package/test/resources/config/templates/new-account/profile/card$.ttl +26 -0
- package/test/resources/config/templates/new-account/robots.txt +3 -0
- package/test/resources/config/templates/new-account/robots.txt.acl +26 -0
- package/test/resources/config/templates/new-account/settings/prefs.ttl +15 -0
- package/test/resources/config/templates/new-account/settings/privateTypeIndex.ttl +4 -0
- package/test/resources/config/templates/new-account/settings/publicTypeIndex.ttl +4 -0
- package/test/resources/config/templates/new-account/settings/publicTypeIndex.ttl.acl +25 -0
- package/test/resources/config/templates/new-account/settings/serverSide.ttl.acl +13 -0
- package/test/resources/config/templates/new-account/settings/serverSide.ttl.inactive +12 -0
- package/test/resources/config/templates/server/favicon.ico +0 -0
- package/test/resources/config/templates/server/favicon.ico.acl +15 -0
- package/test/resources/config/templates/server/index.html +54 -0
- package/test/resources/config/templates/server/robots.txt +3 -0
- package/test/resources/config/templates/server/robots.txt.acl +15 -0
- package/test/resources/config/views/account/account-deleted.hbs +17 -0
- package/test/resources/config/views/account/delete-confirm.hbs +51 -0
- package/test/resources/config/views/account/delete-link-sent.hbs +17 -0
- package/test/resources/config/views/account/delete.hbs +51 -0
- package/test/resources/config/views/account/invalid-username.hbs +22 -0
- package/test/resources/config/views/account/register-disabled.hbs +6 -0
- package/test/resources/config/views/account/register-form.hbs +133 -0
- package/test/resources/config/views/account/register.hbs +24 -0
- package/test/resources/config/views/auth/auth-hidden-fields.hbs +8 -0
- package/test/resources/config/views/auth/change-password.hbs +58 -0
- package/test/resources/config/views/auth/goodbye.hbs +23 -0
- package/test/resources/config/views/auth/login-required.hbs +34 -0
- package/test/resources/config/views/auth/login-tls.hbs +11 -0
- package/test/resources/config/views/auth/login-username-password.hbs +28 -0
- package/test/resources/config/views/auth/login.hbs +55 -0
- package/test/resources/config/views/auth/no-permission.hbs +29 -0
- package/test/resources/config/views/auth/password-changed.hbs +27 -0
- package/test/resources/config/views/auth/reset-link-sent.hbs +21 -0
- package/test/resources/config/views/auth/reset-password.hbs +52 -0
- package/test/resources/config/views/auth/sharing.hbs +49 -0
- package/test/resources/config/views/shared/create-account.hbs +8 -0
- package/test/resources/config/views/shared/error.hbs +5 -0
- package/test/resources/empty.spatch +0 -0
- package/test/resources/errorPages/401.html +5 -0
- package/test/resources/errorPages/403.html +5 -0
- package/test/resources/errorPages/404.html +5 -0
- package/test/resources/errorPages/405.html +5 -0
- package/test/resources/errorPages/415.html +5 -0
- package/test/resources/errorPages/500.html +5 -0
- package/test/resources/example_spkac.cnf +1 -0
- package/test/resources/external-servers/example.com/jwks.json +81 -0
- package/test/resources/external-servers/example.com/openid-configuration.json +53 -0
- package/test/resources/favicon.ico +0 -0
- package/test/resources/favicon.ico.acl +15 -0
- package/test/resources/headers/index.html +0 -0
- package/test/resources/headers/public-ra +0 -0
- package/test/resources/headers/public-ra.acl +7 -0
- package/test/resources/headers/user-rw-public-r +0 -0
- package/test/resources/headers/user-rw-public-r.acl +12 -0
- package/test/resources/headers/user-rwac-public-0 +0 -0
- package/test/resources/headers/user-rwac-public-0.acl +7 -0
- package/test/resources/hello.html +3 -0
- package/test/resources/invalid1.ttl +13 -0
- package/test/resources/invalid2.ttl +9 -0
- package/test/resources/ldpatch-example-final.ttl +23 -0
- package/test/resources/ldpatch-example-initial.ttl +22 -0
- package/test/resources/ldpatch-example-patch-1.spatch +8 -0
- package/test/resources/ldpatch-example-patch-2.spatch +12 -0
- package/test/resources/ldpatch-example-patch-3.spatch +14 -0
- package/test/resources/ldpatch-example-patch.ldpatch +25 -0
- package/test/resources/ldpatch-example-patch.spatch +24 -0
- package/test/resources/lennon.jsonld +7 -0
- package/test/resources/lfs-0.sparql +9 -0
- package/test/resources/lfs-1-final.json +10 -0
- package/test/resources/lfs-1.sparql +11 -0
- package/test/resources/messaging-scenario/user1.databox.me/profile/card +21 -0
- package/test/resources/nicola.jpg +0 -0
- package/test/resources/patch/append-only.ttl +2 -0
- package/test/resources/patch/append-only.ttl.acl +6 -0
- package/test/resources/patch/favicon.ico +0 -0
- package/test/resources/patch/favicon.ico.acl +15 -0
- package/test/resources/patch/index.html +0 -0
- package/test/resources/patch/read-append.ttl +2 -0
- package/test/resources/patch/read-append.ttl.acl +6 -0
- package/test/resources/patch/read-only.ttl +2 -0
- package/test/resources/patch/read-only.ttl.acl +6 -0
- package/test/resources/patch/read-write.ttl +2 -0
- package/test/resources/patch/read-write.ttl.acl +6 -0
- package/test/resources/patch/robots.txt +3 -0
- package/test/resources/patch/robots.txt.acl +15 -0
- package/test/resources/patch/write-only.ttl +2 -0
- package/test/resources/patch/write-only.ttl.acl +6 -0
- package/test/resources/patch-1-initial.ttl +3 -0
- package/test/resources/patch-2-final.ttl +2 -0
- package/test/resources/patch-2-initial.ttl +3 -0
- package/test/resources/patch-2.spatch +2 -0
- package/test/resources/patch-2n.spatch +2 -0
- package/test/resources/patch-3-final.ttl +28 -0
- package/test/resources/patch-4-final.ttl +29 -0
- package/test/resources/patch-5-final.ttl +1 -0
- package/test/resources/patch-5-initial.ttl +3 -0
- package/test/resources/patch-5.spatch +2 -0
- package/test/resources/put-input-2.html +13 -0
- package/test/resources/put-input.txt +6 -0
- package/test/resources/robots.txt +3 -0
- package/test/resources/robots.txt.acl +15 -0
- package/test/resources/sampleContainer/blank +0 -0
- package/test/resources/sampleContainer/cert.pkcs +0 -0
- package/test/resources/sampleContainer/example.ttl.old +1 -0
- package/test/resources/sampleContainer/example1.ttl +12 -0
- package/test/resources/sampleContainer/example2.ttl +3 -0
- package/test/resources/sampleContainer/example3.ttl +7 -0
- package/test/resources/sampleContainer/example4$.ttl +7 -0
- package/test/resources/sampleContainer/filename with spaces.txt +0 -0
- package/test/resources/sampleContainer/index.html +9 -0
- package/test/resources/sampleContainer/post2.ttl +6 -0
- package/test/resources/sampleContainer/put1.ttl +13 -0
- package/test/resources/sampleContainer/solid.png +0 -0
- package/test/resources/sampleContainer/user1.pfx +0 -0
- package/test/resources/sampleContainer/user2.pfx +0 -0
- package/test/resources/sampleContainer2/example1.ttl +10 -0
- package/test/resources/sampleContainer2/example2.ttl +7 -0
- package/test/resources/timbl.jpg +0 -0
- package/test/scenarios.md +23 -0
- package/test/surface/docker/cookie/Dockerfile +6 -0
- package/test/surface/docker/cookie/app/index.js +29 -0
- package/test/surface/docker/cookie/app/package-lock.json +13 -0
- package/test/surface/docker/cookie/app/package.json +14 -0
- package/test/surface/docker/server/Dockerfile +19 -0
- package/test/surface/docker/server/config/defaults.js +10 -0
- package/test/surface/docker/server/config/templates/emails/delete-account.js +49 -0
- package/test/surface/docker/server/config/templates/emails/invalid-username.js +30 -0
- package/test/surface/docker/server/config/templates/emails/reset-password.js +49 -0
- package/test/surface/docker/server/config/templates/emails/welcome.js +39 -0
- package/test/surface/docker/server/config/templates/new-account/favicon.ico +0 -0
- package/test/surface/docker/server/config/templates/new-account/favicon.ico.acl +26 -0
- package/test/surface/docker/server/config/templates/new-account/profile/card$.ttl +26 -0
- package/test/surface/docker/server/config/templates/new-account/robots.txt +3 -0
- package/test/surface/docker/server/config/templates/new-account/robots.txt.acl +26 -0
- package/test/surface/docker/server/config/templates/new-account/settings/prefs.ttl +15 -0
- package/test/surface/docker/server/config/templates/new-account/settings/privateTypeIndex.ttl +4 -0
- package/test/surface/docker/server/config/templates/new-account/settings/publicTypeIndex.ttl +4 -0
- package/test/surface/docker/server/config/templates/new-account/settings/publicTypeIndex.ttl.acl +25 -0
- package/test/surface/docker/server/config/templates/new-account/settings/serverSide.ttl.acl +13 -0
- package/test/surface/docker/server/config/templates/new-account/settings/serverSide.ttl.inactive +12 -0
- package/test/surface/docker/server/config/templates/server/favicon.ico +0 -0
- package/test/surface/docker/server/config/templates/server/favicon.ico.acl +15 -0
- package/test/surface/docker/server/config/templates/server/index.html +55 -0
- package/test/surface/docker/server/config/templates/server/robots.txt +3 -0
- package/test/surface/docker/server/config/templates/server/robots.txt.acl +15 -0
- package/test/surface/docker/server/config/usernames-blacklist.json +4 -0
- package/test/surface/docker/server/config/views/account/account-deleted.hbs +17 -0
- package/test/surface/docker/server/config/views/account/delete-confirm.hbs +51 -0
- package/test/surface/docker/server/config/views/account/delete-link-sent.hbs +17 -0
- package/test/surface/docker/server/config/views/account/delete.hbs +51 -0
- package/test/surface/docker/server/config/views/account/invalid-username.hbs +22 -0
- package/test/surface/docker/server/config/views/account/register-disabled.hbs +6 -0
- package/test/surface/docker/server/config/views/account/register-form.hbs +147 -0
- package/test/surface/docker/server/config/views/account/register.hbs +24 -0
- package/test/surface/docker/server/config/views/auth/auth-hidden-fields.hbs +8 -0
- package/test/surface/docker/server/config/views/auth/change-password.hbs +58 -0
- package/test/surface/docker/server/config/views/auth/goodbye.hbs +23 -0
- package/test/surface/docker/server/config/views/auth/login-required.hbs +34 -0
- package/test/surface/docker/server/config/views/auth/login-tls.hbs +11 -0
- package/test/surface/docker/server/config/views/auth/login-username-password.hbs +28 -0
- package/test/surface/docker/server/config/views/auth/login.hbs +55 -0
- package/test/surface/docker/server/config/views/auth/no-permission.hbs +29 -0
- package/test/surface/docker/server/config/views/auth/password-changed.hbs +27 -0
- package/test/surface/docker/server/config/views/auth/reset-link-sent.hbs +21 -0
- package/test/surface/docker/server/config/views/auth/reset-password.hbs +52 -0
- package/test/surface/docker/server/config/views/auth/sharing.hbs +49 -0
- package/test/surface/docker/server/config/views/shared/create-account.hbs +8 -0
- package/test/surface/docker/server/config/views/shared/error.hbs +5 -0
- package/test/surface/docker/server/config.json +22 -0
- package/test/surface/docker/server/data/favicon.ico +0 -0
- package/test/surface/docker/server/data/favicon.ico.acl +26 -0
- package/test/surface/docker/server/data/index.html +48 -0
- package/test/surface/docker/server/data/profile/card$.ttl +31 -0
- package/test/surface/docker/server/data/robots.txt +3 -0
- package/test/surface/docker/server/data/robots.txt.acl +26 -0
- package/test/surface/docker/server/data/settings/prefs.ttl +15 -0
- package/test/surface/docker/server/data/settings/privateTypeIndex.ttl +4 -0
- package/test/surface/docker/server/data/settings/publicTypeIndex.ttl +4 -0
- package/test/surface/docker/server/data/settings/publicTypeIndex.ttl.acl +25 -0
- package/test/surface/docker/server/data/settings/serverSide.ttl +0 -0
- package/test/surface/docker/server/data/settings/serverSide.ttl.acl +13 -0
- package/test/surface/docker/server/data/settings/serverSide.ttl.inactive +12 -0
- package/test/surface/docker/server/env.list +4 -0
- package/test/surface/docker/solid-crud/Dockerfile +4 -0
- package/test/surface/docker/web-access-control/Dockerfile +1 -0
- package/test/surface/docker/webid-provider/Dockerfile +1 -0
- package/test/surface/run-solid-test-suite.sh +75 -0
- package/test/surface/server-env.list +5 -0
- package/test/surface/solid-crud-tests-env.list +5 -0
- package/test/surface/thirdparty-config.json +23 -0
- package/test/surface/thirdparty-env.list +6 -0
- package/test/surface/web-access-control-tests-env.list +6 -0
- package/test/surface/webid-provider-tests-env.list +4 -0
- package/test/test-helpers.mjs +63 -0
- package/test/unit/account-manager-test.mjs +610 -0
- package/test/unit/account-template-test.mjs +59 -0
- package/test/unit/acl-checker-test.mjs +51 -0
- package/test/unit/add-cert-request-test.mjs +120 -0
- package/test/unit/auth-handlers-test.mjs +108 -0
- package/test/unit/auth-proxy-test.mjs +224 -0
- package/test/unit/auth-request-test.mjs +96 -0
- package/test/unit/authenticator-test.mjs +34 -0
- package/test/unit/blacklist-service-test.mjs +49 -0
- package/test/unit/create-account-request-test.mjs +306 -0
- package/test/unit/delete-account-confirm-request-test.mjs +234 -0
- package/test/unit/delete-account-request-test.mjs +180 -0
- package/test/unit/email-service-test.mjs +166 -0
- package/test/unit/email-welcome-test.mjs +81 -0
- package/test/unit/error-pages-test.mjs +100 -0
- package/test/unit/esm-imports.test.mjs +149 -0
- package/test/unit/force-user-test.mjs +73 -0
- package/test/unit/getAvailableUrl-test.mjs +30 -0
- package/test/unit/getTrustedOrigins-test.mjs +20 -0
- package/test/unit/login-request-test.mjs +246 -0
- package/test/unit/oidc-manager-test.mjs +50 -0
- package/test/unit/password-authenticator-test.mjs +125 -0
- package/test/unit/password-change-request-test.mjs +259 -0
- package/test/unit/password-reset-email-request-test.mjs +234 -0
- package/test/unit/resource-mapper-test.mjs +673 -0
- package/test/unit/solid-host-test.mjs +119 -0
- package/test/unit/tls-authenticator-test.mjs +174 -0
- package/test/unit/token-service-test.mjs +82 -0
- package/test/unit/user-account-test.mjs +38 -0
- package/test/unit/user-accounts-api-test.mjs +59 -0
- package/test/unit/user-utils-test.mjs +64 -0
- package/test/unit/utils-test.mjs +114 -0
- package/test/utils/index.mjs +167 -0
- package/test/utils.mjs +205 -0
- package/test/validate-turtle.mjs +43 -0
- package/.github/workflows/ci.yml +0 -113
- package/.nvmrc +0 -1
- package/.snyk +0 -35
- package/bin/lib/cli-utils.js +0 -85
- package/bin/lib/cli.js +0 -39
- package/bin/solid.js +0 -3
- package/default-templates/new-account/.acl +0 -26
- package/default-templates/new-account/.meta +0 -5
- package/default-templates/new-account/.well-known/.acl +0 -19
- package/default-templates/new-account/private/.acl +0 -10
- package/default-templates/new-account/profile/.acl +0 -19
- package/default-templates/new-account/public/.acl +0 -19
- package/default-templates/new-account/settings/.acl +0 -20
- package/index.js +0 -3
- package/lib/api/authn/index.js +0 -5
- package/lib/api/index.js +0 -6
- package/lib/common/template-utils.js +0 -50
- package/lib/debug.js +0 -18
- package/lib/ldp-copy.js +0 -73
- package/lib/ldp-middleware.js +0 -40
- package/lib/models/account-manager.js +0 -604
- package/lib/models/account-template.js +0 -156
- package/lib/models/authenticator.js +0 -337
- package/lib/models/oidc-manager.js +0 -53
- package/lib/models/solid-host.js +0 -131
- package/lib/models/user-account.js +0 -113
- package/lib/models/webid-tls-certificate.js +0 -184
- package/lib/requests/add-cert-request.js +0 -138
- package/lib/requests/auth-request.js +0 -234
- package/lib/requests/delete-account-confirm-request.js +0 -170
- package/lib/requests/login-request.js +0 -205
- package/lib/services/email-service.js +0 -162
- package/lib/webid/lib/get.js +0 -27
- package/lib/webid/tls/index.js +0 -185
|
@@ -0,0 +1,1048 @@
|
|
|
1
|
+
import { assert } from 'chai'
|
|
2
|
+
import fs from 'fs-extra'
|
|
3
|
+
import fetch from 'node-fetch'
|
|
4
|
+
import path from 'path'
|
|
5
|
+
import { fileURLToPath } from 'url'
|
|
6
|
+
import { loadProvider, rm, checkDnsSettings, cleanDir } from '../utils.mjs'
|
|
7
|
+
import IDToken from '@solid/oidc-op/src/IDToken.js'
|
|
8
|
+
// import { clearAclCache } from '../../lib/acl-checker.js'
|
|
9
|
+
import ldnode from '../../index.mjs'
|
|
10
|
+
|
|
11
|
+
const __filename = fileURLToPath(import.meta.url)
|
|
12
|
+
const __dirname = path.dirname(__filename)
|
|
13
|
+
|
|
14
|
+
// Helper to mimic request's callback API for get, put, post, head, patch
|
|
15
|
+
function fetchRequest (method, options, callback) {
|
|
16
|
+
// options: { url, headers, body, ... }
|
|
17
|
+
const fetchOptions = {
|
|
18
|
+
method: method.toUpperCase(),
|
|
19
|
+
headers: options.headers || {},
|
|
20
|
+
body: options.body
|
|
21
|
+
}
|
|
22
|
+
// For GET/HEAD, don't send body
|
|
23
|
+
if (['GET', 'HEAD'].includes(fetchOptions.method)) {
|
|
24
|
+
delete fetchOptions.body
|
|
25
|
+
}
|
|
26
|
+
fetch(options.url, fetchOptions)
|
|
27
|
+
.then(async res => {
|
|
28
|
+
let body = await res.text()
|
|
29
|
+
// Try to parse as JSON if content-type is json
|
|
30
|
+
if (res.headers.get('content-type') && res.headers.get('content-type').includes('json')) {
|
|
31
|
+
try { body = JSON.parse(body) } catch (e) {}
|
|
32
|
+
}
|
|
33
|
+
callback(null, {
|
|
34
|
+
statusCode: res.status,
|
|
35
|
+
headers: Object.fromEntries(res.headers.entries()),
|
|
36
|
+
body: body,
|
|
37
|
+
statusMessage: res.statusText
|
|
38
|
+
}, body)
|
|
39
|
+
})
|
|
40
|
+
.catch(err => callback(err))
|
|
41
|
+
}
|
|
42
|
+
|
|
43
|
+
function request (options, cb) {
|
|
44
|
+
// Allow string URL
|
|
45
|
+
if (typeof options === 'string') options = { url: options }
|
|
46
|
+
const method = (options.method || 'GET').toLowerCase()
|
|
47
|
+
return fetchRequest(method, options, cb)
|
|
48
|
+
}
|
|
49
|
+
|
|
50
|
+
request.get = (options, cb) => fetchRequest('get', options, cb)
|
|
51
|
+
request.put = (options, cb) => fetchRequest('put', options, cb)
|
|
52
|
+
request.post = (options, cb) => fetchRequest('post', options, cb)
|
|
53
|
+
request.head = (options, cb) => fetchRequest('head', options, cb)
|
|
54
|
+
request.patch = (options, cb) => fetchRequest('patch', options, cb)
|
|
55
|
+
request.delete = (options, cb) => fetchRequest('delete', options, cb)
|
|
56
|
+
request.del = request.delete
|
|
57
|
+
|
|
58
|
+
const port = 7777
|
|
59
|
+
const serverUri = 'https://localhost:7777'
|
|
60
|
+
const rootPath = path.normalize(path.join(__dirname, '../resources/accounts-acl'))
|
|
61
|
+
const dbPath = path.join(rootPath, 'db')
|
|
62
|
+
const oidcProviderPath = path.join(dbPath, 'oidc', 'op', 'provider.json')
|
|
63
|
+
const configPath = path.join(rootPath, 'config')
|
|
64
|
+
|
|
65
|
+
const user1 = 'https://tim.localhost:7777/profile/card#me'
|
|
66
|
+
const timAccountUri = 'https://tim.localhost:7777'
|
|
67
|
+
const user2 = 'https://nicola.localhost:7777/profile/card#me'
|
|
68
|
+
|
|
69
|
+
let oidcProvider
|
|
70
|
+
|
|
71
|
+
// To be initialized in the before() block
|
|
72
|
+
const userCredentials = {
|
|
73
|
+
// idp: https://localhost:7777
|
|
74
|
+
// web id: https://tim.localhost:7777/profile/card#me
|
|
75
|
+
user1: '',
|
|
76
|
+
// web id: https://nicola.localhost:7777/profile/card#me
|
|
77
|
+
user2: ''
|
|
78
|
+
}
|
|
79
|
+
|
|
80
|
+
function issueIdToken (oidcProvider, webId) {
|
|
81
|
+
return Promise.resolve().then(() => {
|
|
82
|
+
const jwt = IDToken.issue(oidcProvider, {
|
|
83
|
+
sub: webId,
|
|
84
|
+
aud: [serverUri, 'client123'],
|
|
85
|
+
azp: 'client123'
|
|
86
|
+
})
|
|
87
|
+
|
|
88
|
+
return jwt.encode()
|
|
89
|
+
})
|
|
90
|
+
}
|
|
91
|
+
|
|
92
|
+
const argv = {
|
|
93
|
+
root: rootPath,
|
|
94
|
+
serverUri,
|
|
95
|
+
dbPath,
|
|
96
|
+
port,
|
|
97
|
+
configPath,
|
|
98
|
+
sslKey: path.normalize(path.join(__dirname, '../keys/key.pem')),
|
|
99
|
+
sslCert: path.normalize(path.join(__dirname, '../keys/cert.pem')),
|
|
100
|
+
webid: true,
|
|
101
|
+
multiuser: true,
|
|
102
|
+
auth: 'oidc',
|
|
103
|
+
strictOrigin: true,
|
|
104
|
+
host: { serverUri }
|
|
105
|
+
}
|
|
106
|
+
|
|
107
|
+
// FIXME #1502
|
|
108
|
+
describe('ACL with WebID+OIDC over HTTP', function () {
|
|
109
|
+
let ldp, ldpHttpsServer
|
|
110
|
+
|
|
111
|
+
before(checkDnsSettings)
|
|
112
|
+
|
|
113
|
+
before(done => {
|
|
114
|
+
ldp = ldnode.createServer(argv)
|
|
115
|
+
|
|
116
|
+
loadProvider(oidcProviderPath).then(provider => {
|
|
117
|
+
oidcProvider = provider
|
|
118
|
+
|
|
119
|
+
return Promise.all([
|
|
120
|
+
issueIdToken(oidcProvider, user1),
|
|
121
|
+
issueIdToken(oidcProvider, user2)
|
|
122
|
+
])
|
|
123
|
+
}).then(tokens => {
|
|
124
|
+
userCredentials.user1 = tokens[0]
|
|
125
|
+
userCredentials.user2 = tokens[1]
|
|
126
|
+
}).then(() => {
|
|
127
|
+
ldpHttpsServer = ldp.listen(port, done)
|
|
128
|
+
}).catch(console.error)
|
|
129
|
+
})
|
|
130
|
+
|
|
131
|
+
/* afterEach(() => {
|
|
132
|
+
clearAclCache()
|
|
133
|
+
}) */
|
|
134
|
+
|
|
135
|
+
after(() => {
|
|
136
|
+
if (ldpHttpsServer) ldpHttpsServer.close()
|
|
137
|
+
cleanDir(rootPath)
|
|
138
|
+
})
|
|
139
|
+
|
|
140
|
+
const origin1 = 'http://example.org/'
|
|
141
|
+
const origin2 = 'http://example.com/'
|
|
142
|
+
|
|
143
|
+
function createOptions (path, user, contentType = 'text/plain') {
|
|
144
|
+
const options = {
|
|
145
|
+
url: timAccountUri + path,
|
|
146
|
+
headers: {
|
|
147
|
+
accept: 'text/turtle',
|
|
148
|
+
'content-type': contentType
|
|
149
|
+
}
|
|
150
|
+
}
|
|
151
|
+
if (user) {
|
|
152
|
+
const accessToken = userCredentials[user]
|
|
153
|
+
options.headers.Authorization = 'Bearer ' + accessToken
|
|
154
|
+
}
|
|
155
|
+
|
|
156
|
+
return options
|
|
157
|
+
}
|
|
158
|
+
|
|
159
|
+
describe('no ACL', function () {
|
|
160
|
+
it('Should return 500 since no ACL is a server misconfig', function (done) {
|
|
161
|
+
const options = createOptions('/no-acl/', 'user1')
|
|
162
|
+
request(options, function (error, response, body) {
|
|
163
|
+
assert.equal(error, null)
|
|
164
|
+
assert.equal(response.statusCode, 500)
|
|
165
|
+
done()
|
|
166
|
+
})
|
|
167
|
+
})
|
|
168
|
+
// it('should not have the `User` set in the Response Header', function (done) {
|
|
169
|
+
// var options = createOptions('/no-acl/', 'user1')
|
|
170
|
+
// request(options, function (error, response, body) {
|
|
171
|
+
// assert.equal(error, null)
|
|
172
|
+
// assert.notProperty(response.headers, 'user')
|
|
173
|
+
// done()
|
|
174
|
+
// })
|
|
175
|
+
// })
|
|
176
|
+
})
|
|
177
|
+
|
|
178
|
+
describe('empty .acl', function () {
|
|
179
|
+
describe('with no default in parent path', function () {
|
|
180
|
+
it('should give no access', function (done) {
|
|
181
|
+
const options = createOptions('/empty-acl/test-folder', 'user1')
|
|
182
|
+
options.body = ''
|
|
183
|
+
request.put(options, function (error, response, body) {
|
|
184
|
+
assert.equal(error, null)
|
|
185
|
+
assert.equal(response.statusCode, 403)
|
|
186
|
+
done()
|
|
187
|
+
})
|
|
188
|
+
})
|
|
189
|
+
it('user1 as solid:owner should let edit the .acl', function (done) {
|
|
190
|
+
const options = createOptions('/empty-acl/.acl', 'user1', 'text/turtle')
|
|
191
|
+
options.body = ''
|
|
192
|
+
request.put(options, function (error, response, body) {
|
|
193
|
+
assert.equal(error, null)
|
|
194
|
+
assert.equal(response.statusCode, 204)
|
|
195
|
+
done()
|
|
196
|
+
})
|
|
197
|
+
})
|
|
198
|
+
it('user1 as solid:owner should let read the .acl', function (done) {
|
|
199
|
+
const options = createOptions('/empty-acl/.acl', 'user1')
|
|
200
|
+
request.get(options, function (error, response, body) {
|
|
201
|
+
assert.equal(error, null)
|
|
202
|
+
assert.equal(response.statusCode, 200)
|
|
203
|
+
done()
|
|
204
|
+
})
|
|
205
|
+
})
|
|
206
|
+
it('user2 should not let edit the .acl', function (done) {
|
|
207
|
+
const options = createOptions('/empty-acl/.acl', 'user2', 'text/turtle')
|
|
208
|
+
options.body = ''
|
|
209
|
+
request.put(options, function (error, response, body) {
|
|
210
|
+
assert.equal(error, null)
|
|
211
|
+
assert.equal(response.statusCode, 403)
|
|
212
|
+
done()
|
|
213
|
+
})
|
|
214
|
+
})
|
|
215
|
+
it('user2 should not let read the .acl', function (done) {
|
|
216
|
+
const options = createOptions('/empty-acl/.acl', 'user2')
|
|
217
|
+
request.get(options, function (error, response, body) {
|
|
218
|
+
assert.equal(error, null)
|
|
219
|
+
assert.equal(response.statusCode, 403)
|
|
220
|
+
done()
|
|
221
|
+
})
|
|
222
|
+
})
|
|
223
|
+
})
|
|
224
|
+
describe('with default in parent path', function () {
|
|
225
|
+
before(function () {
|
|
226
|
+
rm('/accounts-acl/tim.localhost/write-acl/empty-acl/another-empty-folder/test-file.acl')
|
|
227
|
+
rm('/accounts-acl/tim.localhost/write-acl/empty-acl/test-folder/test-file')
|
|
228
|
+
rm('/accounts-acl/tim.localhost/write-acl/empty-acl/test-file')
|
|
229
|
+
rm('/accounts-acl/tim.localhost/write-acl/test-file')
|
|
230
|
+
rm('/accounts-acl/tim.localhost/write-acl/test-file.acl')
|
|
231
|
+
})
|
|
232
|
+
|
|
233
|
+
it('should fail to create a container', function (done) {
|
|
234
|
+
const options = createOptions('/write-acl/empty-acl/test-folder/', 'user1')
|
|
235
|
+
options.body = ''
|
|
236
|
+
request.put(options, function (error, response, body) {
|
|
237
|
+
assert.equal(error, null)
|
|
238
|
+
assert.equal(response.statusCode, 403) // TODO - why should this be a 409?
|
|
239
|
+
done()
|
|
240
|
+
})
|
|
241
|
+
})
|
|
242
|
+
it('should fail creation of new files', function (done) {
|
|
243
|
+
const options = createOptions('/write-acl/empty-acl/test-file', 'user1')
|
|
244
|
+
options.body = ''
|
|
245
|
+
request.put(options, function (error, response, body) {
|
|
246
|
+
assert.equal(error, null)
|
|
247
|
+
assert.equal(response.statusCode, 403)
|
|
248
|
+
done()
|
|
249
|
+
})
|
|
250
|
+
})
|
|
251
|
+
it('should fail creation of new files in deeper paths', function (done) {
|
|
252
|
+
const options = createOptions('/write-acl/empty-acl/test-folder/test-file', 'user1')
|
|
253
|
+
options.body = ''
|
|
254
|
+
request.put(options, function (error, response, body) {
|
|
255
|
+
assert.equal(error, null)
|
|
256
|
+
assert.equal(response.statusCode, 403)
|
|
257
|
+
done()
|
|
258
|
+
})
|
|
259
|
+
})
|
|
260
|
+
it('Should not create empty acl file', function (done) {
|
|
261
|
+
const options = createOptions('/write-acl/empty-acl/another-empty-folder/.acl', 'user1', 'text/turtle')
|
|
262
|
+
options.body = ''
|
|
263
|
+
request.put(options, function (error, response, body) {
|
|
264
|
+
assert.equal(error, null)
|
|
265
|
+
assert.equal(response.statusCode, 204) // 403) is this a must ?
|
|
266
|
+
done()
|
|
267
|
+
})
|
|
268
|
+
})
|
|
269
|
+
it('should return text/turtle for the acl file', function (done) {
|
|
270
|
+
const options = createOptions('/write-acl/.acl', 'user1')
|
|
271
|
+
request.get(options, function (error, response, body) {
|
|
272
|
+
assert.equal(error, null)
|
|
273
|
+
assert.equal(response.statusCode, 200)
|
|
274
|
+
assert.match(response.headers['content-type'], /text\/turtle/)
|
|
275
|
+
done()
|
|
276
|
+
})
|
|
277
|
+
})
|
|
278
|
+
it('should fail as acl:default is used to try to authorize', function (done) {
|
|
279
|
+
const options = createOptions('/write-acl/bad-acl-access/.acl', 'user1')
|
|
280
|
+
request.get(options, function (error, response, body) {
|
|
281
|
+
assert.equal(error, null)
|
|
282
|
+
assert.equal(response.statusCode, 200) // 403) is this a must ?
|
|
283
|
+
done()
|
|
284
|
+
})
|
|
285
|
+
})
|
|
286
|
+
it('should create test file', function (done) {
|
|
287
|
+
const options = createOptions('/write-acl/test-file', 'user1')
|
|
288
|
+
options.body = '<a> <b> <c> .'
|
|
289
|
+
request.put(options, function (error, response, body) {
|
|
290
|
+
assert.equal(error, null)
|
|
291
|
+
assert.equal(response.statusCode, 204)
|
|
292
|
+
done()
|
|
293
|
+
})
|
|
294
|
+
})
|
|
295
|
+
it('should create test file\'s acl file', function (done) {
|
|
296
|
+
const options = createOptions('/write-acl/test-file.acl', 'user1', 'text/turtle')
|
|
297
|
+
options.body = ''
|
|
298
|
+
request.put(options, function (error, response, body) {
|
|
299
|
+
assert.equal(error, null)
|
|
300
|
+
assert.equal(response.statusCode, 201)
|
|
301
|
+
done()
|
|
302
|
+
})
|
|
303
|
+
})
|
|
304
|
+
it('should not access test file\'s new empty acl file', function (done) {
|
|
305
|
+
const options = createOptions('/write-acl/test-file.acl', 'user1')
|
|
306
|
+
request.get(options, function (error, response, body) {
|
|
307
|
+
assert.equal(error, null)
|
|
308
|
+
assert.equal(response.statusCode, 200) // 403) is this a must ?
|
|
309
|
+
done()
|
|
310
|
+
})
|
|
311
|
+
})
|
|
312
|
+
|
|
313
|
+
after(function () {
|
|
314
|
+
rm('/accounts-acl/tim.localhost/write-acl/empty-acl/another-empty-folder/test-file.acl')
|
|
315
|
+
rm('/accounts-acl/tim.localhost/write-acl/empty-acl/test-folder/test-file')
|
|
316
|
+
rm('/accounts-acl/tim.localhost/write-acl/empty-acl/test-file')
|
|
317
|
+
rm('/accounts-acl/tim.localhost/write-acl/test-file')
|
|
318
|
+
rm('/accounts-acl/tim.localhost/write-acl/test-file.acl')
|
|
319
|
+
})
|
|
320
|
+
})
|
|
321
|
+
})
|
|
322
|
+
|
|
323
|
+
describe('no-control', function () {
|
|
324
|
+
it('user1 as owner should edit acl file', function (done) {
|
|
325
|
+
const options = createOptions('/no-control/.acl', 'user1', 'text/turtle')
|
|
326
|
+
options.body = '<#0>' +
|
|
327
|
+
'\n a <http://www.w3.org/ns/auth/acl#Authorization>;' +
|
|
328
|
+
'\n <http://www.w3.org/ns/auth/acl#default> <https://tim.localhost:7777/no-control/> ;' +
|
|
329
|
+
'\n <http://www.w3.org/ns/auth/acl#accessTo> <https://tim.localhost:7777/no-control/> ;' +
|
|
330
|
+
'\n <http://www.w3.org/ns/auth/acl#agent> <https://tim.localhost:7777/profile/card#me> ;' +
|
|
331
|
+
'\n <http://www.w3.org/ns/auth/acl#mode> <http://www.w3.org/ns/auth/acl#Read>.'
|
|
332
|
+
request.put(options, function (error, response, body) {
|
|
333
|
+
assert.equal(error, null)
|
|
334
|
+
assert.equal(response.statusCode, 204)
|
|
335
|
+
done()
|
|
336
|
+
})
|
|
337
|
+
})
|
|
338
|
+
it('user2 should not edit acl file', function (done) {
|
|
339
|
+
const options = createOptions('/no-control/.acl', 'user2', 'text/turtle')
|
|
340
|
+
options.body = '<#0>' +
|
|
341
|
+
'\n a <http://www.w3.org/ns/auth/acl#Authorization>;' +
|
|
342
|
+
'\n <http://www.w3.org/ns/auth/acl#default> <https://tim.localhost:7777/no-control/> ;' +
|
|
343
|
+
'\n <http://www.w3.org/ns/auth/acl#accessTo> <https://tim.localhost:7777/no-control/> ;' +
|
|
344
|
+
'\n <http://www.w3.org/ns/auth/acl#agent> <https://tim.localhost:7777/profile/card#me> ;' +
|
|
345
|
+
'\n <http://www.w3.org/ns/auth/acl#mode> <http://www.w3.org/ns/auth/acl#Read>.'
|
|
346
|
+
request.put(options, function (error, response, body) {
|
|
347
|
+
assert.equal(error, null)
|
|
348
|
+
assert.equal(response.statusCode, 403)
|
|
349
|
+
done()
|
|
350
|
+
})
|
|
351
|
+
})
|
|
352
|
+
})
|
|
353
|
+
|
|
354
|
+
describe('Origin', function () {
|
|
355
|
+
before(function () {
|
|
356
|
+
rm('/accounts-acl/tim.localhost/origin/test-folder/.acl')
|
|
357
|
+
})
|
|
358
|
+
|
|
359
|
+
it('should PUT new ACL file', function (done) {
|
|
360
|
+
const options = createOptions('/origin/test-folder/.acl', 'user1', 'text/turtle')
|
|
361
|
+
options.body = '<#Owner> a <http://www.w3.org/ns/auth/acl#Authorization>;\n' +
|
|
362
|
+
' <http://www.w3.org/ns/auth/acl#accessTo> <https://localhost:3456/origin/test-folder/.acl>;\n' +
|
|
363
|
+
' <http://www.w3.org/ns/auth/acl#agent> <' + user1 + '>;\n' +
|
|
364
|
+
' <http://www.w3.org/ns/auth/acl#origin> <' + origin1 + '>;\n' +
|
|
365
|
+
' <http://www.w3.org/ns/auth/acl#mode> <http://www.w3.org/ns/auth/acl#Read>, <http://www.w3.org/ns/auth/acl#Write>, <http://www.w3.org/ns/auth/acl#Control> .\n' +
|
|
366
|
+
'<#Public> a <http://www.w3.org/ns/auth/acl#Authorization>;\n' +
|
|
367
|
+
' <http://www.w3.org/ns/auth/acl#accessTo> <./>;\n' +
|
|
368
|
+
' <http://www.w3.org/ns/auth/acl#agentClass> <http://xmlns.com/foaf/0.1/Agent>;\n' +
|
|
369
|
+
' <http://www.w3.org/ns/auth/acl#origin> <' + origin1 + '>;\n' +
|
|
370
|
+
' <http://www.w3.org/ns/auth/acl#mode> <http://www.w3.org/ns/auth/acl#Read> .\n' +
|
|
371
|
+
'<#Somebody> a <http://www.w3.org/ns/auth/acl#Authorization>;\n' +
|
|
372
|
+
' <http://www.w3.org/ns/auth/acl#accessTo> <./>;\n' +
|
|
373
|
+
' <http://www.w3.org/ns/auth/acl#agent> <' + user2 + '>;\n' +
|
|
374
|
+
' <http://www.w3.org/ns/auth/acl#default> <./>;\n' +
|
|
375
|
+
' <http://www.w3.org/ns/auth/acl#origin> <' + origin1 + '>;\n' +
|
|
376
|
+
' <http://www.w3.org/ns/auth/acl#mode> <http://www.w3.org/ns/auth/acl#Write> .\n'
|
|
377
|
+
request.put(options, function (error, response, body) {
|
|
378
|
+
assert.equal(error, null)
|
|
379
|
+
assert.equal(response.statusCode, 201)
|
|
380
|
+
done()
|
|
381
|
+
// TODO triple header
|
|
382
|
+
// TODO user header
|
|
383
|
+
})
|
|
384
|
+
})
|
|
385
|
+
it('user1 should be able to access test directory', function (done) {
|
|
386
|
+
const options = createOptions('/origin/test-folder/', 'user1')
|
|
387
|
+
options.headers.origin = origin1
|
|
388
|
+
|
|
389
|
+
request.head(options, function (error, response, body) {
|
|
390
|
+
assert.equal(error, null)
|
|
391
|
+
assert.equal(response.statusCode, 200)
|
|
392
|
+
done()
|
|
393
|
+
})
|
|
394
|
+
})
|
|
395
|
+
it('user2 should be able to access public test directory with wrong origin', function (done) {
|
|
396
|
+
const options = createOptions('/origin/test-folder/', 'user2')
|
|
397
|
+
options.headers.origin = origin2
|
|
398
|
+
|
|
399
|
+
request.head(options, function (error, response, body) {
|
|
400
|
+
assert.equal(error, null)
|
|
401
|
+
assert.equal(response.statusCode, 200)
|
|
402
|
+
done()
|
|
403
|
+
})
|
|
404
|
+
})
|
|
405
|
+
it('user1 should be able to access to test directory when origin is valid', function (done) {
|
|
406
|
+
const options = createOptions('/origin/test-folder/', 'user1')
|
|
407
|
+
options.headers.origin = origin1
|
|
408
|
+
|
|
409
|
+
request.head(options, function (error, response, body) {
|
|
410
|
+
assert.equal(error, null)
|
|
411
|
+
assert.equal(response.statusCode, 200)
|
|
412
|
+
done()
|
|
413
|
+
})
|
|
414
|
+
})
|
|
415
|
+
it('user1 should be able to access public test directory even when origin is invalid', function (done) {
|
|
416
|
+
const options = createOptions('/origin/test-folder/', 'user1')
|
|
417
|
+
options.headers.origin = origin2
|
|
418
|
+
|
|
419
|
+
request.head(options, function (error, response, body) {
|
|
420
|
+
assert.equal(error, null)
|
|
421
|
+
assert.equal(response.statusCode, 200)
|
|
422
|
+
done()
|
|
423
|
+
})
|
|
424
|
+
})
|
|
425
|
+
it('agent should be able to access test directory', function (done) {
|
|
426
|
+
const options = createOptions('/origin/test-folder/')
|
|
427
|
+
options.headers.origin = origin1
|
|
428
|
+
|
|
429
|
+
request.head(options, function (error, response, body) {
|
|
430
|
+
assert.equal(error, null)
|
|
431
|
+
assert.equal(response.statusCode, 200)
|
|
432
|
+
done()
|
|
433
|
+
})
|
|
434
|
+
})
|
|
435
|
+
it('agent should be able to access to test directory when origin is valid', function (done) {
|
|
436
|
+
const options = createOptions('/origin/test-folder/', 'user1')
|
|
437
|
+
options.headers.origin = origin1
|
|
438
|
+
|
|
439
|
+
request.head(options, function (error, response, body) {
|
|
440
|
+
assert.equal(error, null)
|
|
441
|
+
assert.equal(response.statusCode, 200)
|
|
442
|
+
done()
|
|
443
|
+
})
|
|
444
|
+
})
|
|
445
|
+
it('agent should be able to access public test directory even when origin is invalid', function (done) {
|
|
446
|
+
const options = createOptions('/origin/test-folder/')
|
|
447
|
+
options.headers.origin = origin2
|
|
448
|
+
|
|
449
|
+
request.head(options, function (error, response, body) {
|
|
450
|
+
assert.equal(error, null)
|
|
451
|
+
assert.equal(response.statusCode, 200)
|
|
452
|
+
done()
|
|
453
|
+
})
|
|
454
|
+
})
|
|
455
|
+
it('user2 should be able to write to test directory with correct origin', function (done) {
|
|
456
|
+
const options = createOptions('/origin/test-folder/test1.txt', 'user2', 'text/plain')
|
|
457
|
+
options.headers.origin = origin1
|
|
458
|
+
options.body = 'DAAAAAHUUUT'
|
|
459
|
+
request.put(options, function (error, response, body) {
|
|
460
|
+
assert.equal(error, null)
|
|
461
|
+
assert.equal(response.statusCode, 201)
|
|
462
|
+
done()
|
|
463
|
+
})
|
|
464
|
+
})
|
|
465
|
+
it('user2 should not be able to write to test directory with wrong origin', function (done) {
|
|
466
|
+
const options = createOptions('/origin/test-folder/test2.txt', 'user2', 'text/plain')
|
|
467
|
+
options.headers.origin = origin2
|
|
468
|
+
options.body = 'ARRRRGH'
|
|
469
|
+
request.put(options, function (error, response, body) {
|
|
470
|
+
assert.equal(error, null)
|
|
471
|
+
assert.equal(response.statusCode, 403)
|
|
472
|
+
assert.equal(response.statusMessage, 'Origin Unauthorized')
|
|
473
|
+
done()
|
|
474
|
+
})
|
|
475
|
+
})
|
|
476
|
+
|
|
477
|
+
after(function () {
|
|
478
|
+
rm('/accounts-acl/tim.localhost/origin/test-folder/.acl')
|
|
479
|
+
rm('/accounts-acl/tim.localhost/origin/test-folder/test1.txt')
|
|
480
|
+
rm('/accounts-acl/tim.localhost/origin/test-folder/test2.txt')
|
|
481
|
+
})
|
|
482
|
+
})
|
|
483
|
+
|
|
484
|
+
describe('Read-only', function () {
|
|
485
|
+
const body = fs.readFileSync(path.join(rootPath, 'tim.localhost/read-acl/.acl'))
|
|
486
|
+
it('user1 should be able to access ACL file', function (done) {
|
|
487
|
+
const options = createOptions('/read-acl/.acl', 'user1')
|
|
488
|
+
request.head(options, function (error, response, body) {
|
|
489
|
+
assert.equal(error, null)
|
|
490
|
+
assert.equal(response.statusCode, 200)
|
|
491
|
+
done()
|
|
492
|
+
})
|
|
493
|
+
})
|
|
494
|
+
it('user1 should be able to access test directory', function (done) {
|
|
495
|
+
const options = createOptions('/read-acl/', 'user1')
|
|
496
|
+
request.head(options, function (error, response, body) {
|
|
497
|
+
assert.equal(error, null)
|
|
498
|
+
assert.equal(response.statusCode, 200)
|
|
499
|
+
done()
|
|
500
|
+
})
|
|
501
|
+
})
|
|
502
|
+
it('user1 should be able to modify ACL file', function (done) {
|
|
503
|
+
const options = createOptions('/read-acl/.acl', 'user1', 'text/turtle')
|
|
504
|
+
options.body = body
|
|
505
|
+
request.put(options, function (error, response, body) {
|
|
506
|
+
assert.equal(error, null)
|
|
507
|
+
assert.equal(response.statusCode, 204)
|
|
508
|
+
done()
|
|
509
|
+
})
|
|
510
|
+
})
|
|
511
|
+
it('user2 should be able to access test directory', function (done) {
|
|
512
|
+
const options = createOptions('/read-acl/', 'user2')
|
|
513
|
+
request.head(options, function (error, response, body) {
|
|
514
|
+
assert.equal(error, null)
|
|
515
|
+
assert.equal(response.statusCode, 200)
|
|
516
|
+
done()
|
|
517
|
+
})
|
|
518
|
+
})
|
|
519
|
+
it('user2 should not be able to access ACL file', function (done) {
|
|
520
|
+
const options = createOptions('/read-acl/.acl', 'user2')
|
|
521
|
+
request.head(options, function (error, response, body) {
|
|
522
|
+
assert.equal(error, null)
|
|
523
|
+
assert.equal(response.statusCode, 403)
|
|
524
|
+
assert.equal(response.statusMessage, 'User Unauthorized')
|
|
525
|
+
done()
|
|
526
|
+
})
|
|
527
|
+
})
|
|
528
|
+
it('user2 should not be able to modify ACL file', function (done) {
|
|
529
|
+
const options = createOptions('/read-acl/.acl', 'user2', 'text/turtle')
|
|
530
|
+
options.body = '<d> <e> <f> .'
|
|
531
|
+
request.put(options, function (error, response, body) {
|
|
532
|
+
assert.equal(error, null)
|
|
533
|
+
assert.equal(response.statusCode, 403)
|
|
534
|
+
assert.equal(response.statusMessage, 'User Unauthorized')
|
|
535
|
+
done()
|
|
536
|
+
})
|
|
537
|
+
})
|
|
538
|
+
it('agent should be able to access test direcotory', function (done) {
|
|
539
|
+
const options = createOptions('/read-acl/')
|
|
540
|
+
request.head(options, function (error, response, body) {
|
|
541
|
+
assert.equal(error, null)
|
|
542
|
+
assert.equal(response.statusCode, 200)
|
|
543
|
+
done()
|
|
544
|
+
})
|
|
545
|
+
})
|
|
546
|
+
it('agent should not be able to modify ACL file', function (done) {
|
|
547
|
+
const options = createOptions('/read-acl/.acl', null, 'text/turtle')
|
|
548
|
+
options.body = '<d> <e> <f> .'
|
|
549
|
+
request.put(options, function (error, response, body) {
|
|
550
|
+
assert.equal(error, null)
|
|
551
|
+
assert.equal(response.statusCode, 401)
|
|
552
|
+
assert.equal(response.statusMessage, 'Unauthenticated')
|
|
553
|
+
done()
|
|
554
|
+
})
|
|
555
|
+
})
|
|
556
|
+
// Deep acl:accessTo inheritance is not supported yet #963
|
|
557
|
+
it.skip('user1 should be able to access deep test directory ACL', function (done) {
|
|
558
|
+
const options = createOptions('/read-acl/deeper-tree/.acl', 'user1')
|
|
559
|
+
request.head(options, function (error, response, body) {
|
|
560
|
+
assert.equal(error, null)
|
|
561
|
+
assert.equal(response.statusCode, 200)
|
|
562
|
+
done()
|
|
563
|
+
})
|
|
564
|
+
})
|
|
565
|
+
it.skip('user1 should not be able to access deep test dir', function (done) {
|
|
566
|
+
const options = createOptions('/read-acl/deeper-tree/', 'user1')
|
|
567
|
+
request.head(options, function (error, response, body) {
|
|
568
|
+
assert.equal(error, null)
|
|
569
|
+
assert.equal(response.statusCode, 403)
|
|
570
|
+
assert.equal(response.statusMessage, 'User Unauthorized')
|
|
571
|
+
done()
|
|
572
|
+
})
|
|
573
|
+
})
|
|
574
|
+
it.skip('user1 should able to access even deeper test directory', function (done) {
|
|
575
|
+
const options = createOptions('/read-acl/deeper-tree/acls-only-on-top/', 'user1')
|
|
576
|
+
request.head(options, function (error, response, body) {
|
|
577
|
+
assert.equal(error, null)
|
|
578
|
+
assert.equal(response.statusCode, 200)
|
|
579
|
+
done()
|
|
580
|
+
})
|
|
581
|
+
})
|
|
582
|
+
it.skip('user1 should able to access even deeper test file', function (done) {
|
|
583
|
+
const options = createOptions('/read-acl/deeper-tree/acls-only-on-top/example.ttl', 'user1')
|
|
584
|
+
request.head(options, function (error, response, body) {
|
|
585
|
+
assert.equal(error, null)
|
|
586
|
+
assert.equal(response.statusCode, 200)
|
|
587
|
+
done()
|
|
588
|
+
})
|
|
589
|
+
})
|
|
590
|
+
})
|
|
591
|
+
|
|
592
|
+
describe('Append-only', function () {
|
|
593
|
+
// var body = fs.readFileSync(__dirname + '/resources/append-acl/abc.ttl.acl')
|
|
594
|
+
it('user1 should be able to access test file\'s ACL file', function (done) {
|
|
595
|
+
const options = createOptions('/append-acl/abc.ttl.acl', 'user1')
|
|
596
|
+
request.head(options, function (error, response) {
|
|
597
|
+
assert.equal(error, null)
|
|
598
|
+
assert.equal(response.statusCode, 200)
|
|
599
|
+
done()
|
|
600
|
+
})
|
|
601
|
+
})
|
|
602
|
+
it('user1 should be able to PATCH a nonexistent resource (which CREATEs)', function (done) {
|
|
603
|
+
const options = createOptions('/append-inherited/test.ttl', 'user1')
|
|
604
|
+
options.body = 'INSERT DATA { :test :hello 456 .}'
|
|
605
|
+
options.headers['content-type'] = 'application/sparql-update'
|
|
606
|
+
request.patch(options, function (error, response, body) {
|
|
607
|
+
assert.equal(error, null)
|
|
608
|
+
assert.equal(response.statusCode, 201)
|
|
609
|
+
done()
|
|
610
|
+
})
|
|
611
|
+
})
|
|
612
|
+
it('user1 should be able to PATCH an existing resource', function (done) {
|
|
613
|
+
const options = createOptions('/append-inherited/test.ttl', 'user1')
|
|
614
|
+
options.body = 'INSERT DATA { :test :hello 789 .}'
|
|
615
|
+
options.headers['content-type'] = 'application/sparql-update'
|
|
616
|
+
request.patch(options, function (error, response, body) {
|
|
617
|
+
assert.equal(error, null)
|
|
618
|
+
assert.equal(response.statusCode, 200)
|
|
619
|
+
done()
|
|
620
|
+
})
|
|
621
|
+
})
|
|
622
|
+
it('user1 should be able to PUT to non existent resource (which CREATEs)', function (done) {
|
|
623
|
+
const options = createOptions('/append-inherited/test1.ttl', 'user1')
|
|
624
|
+
options.body = '<a> <b> <c> .\n'
|
|
625
|
+
options.headers['content-type'] = 'text/turtle'
|
|
626
|
+
request.put(options, function (error, response, body) {
|
|
627
|
+
assert.equal(error, null)
|
|
628
|
+
assert.equal(response.statusCode, 201)
|
|
629
|
+
done()
|
|
630
|
+
})
|
|
631
|
+
})
|
|
632
|
+
it('user2 should not be able to PUT with Append (existing resource)', function (done) {
|
|
633
|
+
const options = createOptions('/append-inherited/test1.ttl', 'user2')
|
|
634
|
+
options.body = '<a> <b> <c> .\n'
|
|
635
|
+
options.headers['content-type'] = 'text/turtle'
|
|
636
|
+
request.put(options, function (error, response, body) {
|
|
637
|
+
assert.equal(error, null)
|
|
638
|
+
assert.equal(response.statusCode, 403)
|
|
639
|
+
assert.include(response.statusMessage, 'User Unauthorized')
|
|
640
|
+
done()
|
|
641
|
+
})
|
|
642
|
+
})
|
|
643
|
+
it('user1 should be able to access test file', function (done) {
|
|
644
|
+
const options = createOptions('/append-acl/abc.ttl', 'user1')
|
|
645
|
+
request.head(options, function (error, response, body) {
|
|
646
|
+
assert.equal(error, null)
|
|
647
|
+
assert.equal(response.statusCode, 200)
|
|
648
|
+
done()
|
|
649
|
+
})
|
|
650
|
+
})
|
|
651
|
+
// TODO POST instead of PUT
|
|
652
|
+
it('user1 should be able to modify test file', function (done) {
|
|
653
|
+
const options = createOptions('/append-acl/abc.ttl', 'user1', 'text/turtle')
|
|
654
|
+
options.body = '<a> <b> <c> .\n'
|
|
655
|
+
request.put(options, function (error, response, body) {
|
|
656
|
+
assert.equal(error, null)
|
|
657
|
+
assert.equal(response.statusCode, 204)
|
|
658
|
+
done()
|
|
659
|
+
})
|
|
660
|
+
})
|
|
661
|
+
it('user2 should be able to PATCH INSERT to a nonexistent resource (which CREATEs)', function (done) {
|
|
662
|
+
const options = createOptions('/append-inherited/new.ttl', 'user2')
|
|
663
|
+
options.body = 'INSERT DATA { :test :hello 789 .}'
|
|
664
|
+
options.headers['content-type'] = 'application/sparql-update'
|
|
665
|
+
request.patch(options, function (error, response, body) {
|
|
666
|
+
assert.equal(error, null)
|
|
667
|
+
assert.equal(response.statusCode, 201)
|
|
668
|
+
done()
|
|
669
|
+
})
|
|
670
|
+
})
|
|
671
|
+
it('user2 should be able to PUT to a non existent resource (which CREATEs)', function (done) {
|
|
672
|
+
const options = createOptions('/append-inherited/new1.ttl', 'user1')
|
|
673
|
+
options.body = '<a> <b> <c> .\n'
|
|
674
|
+
options.headers['content-type'] = 'text/turtle'
|
|
675
|
+
request.put(options, function (error, response, body) {
|
|
676
|
+
assert.equal(error, null)
|
|
677
|
+
assert.equal(response.statusCode, 201)
|
|
678
|
+
done()
|
|
679
|
+
})
|
|
680
|
+
})
|
|
681
|
+
it('user2 should not be able to access test file\'s ACL file', function (done) {
|
|
682
|
+
const options = createOptions('/append-acl/abc.ttl.acl', 'user2', 'text/turtle')
|
|
683
|
+
request.head(options, function (error, response, body) {
|
|
684
|
+
assert.equal(error, null)
|
|
685
|
+
assert.equal(response.statusCode, 403)
|
|
686
|
+
assert.equal(response.statusMessage, 'User Unauthorized')
|
|
687
|
+
done()
|
|
688
|
+
})
|
|
689
|
+
})
|
|
690
|
+
it('user2 should not be able able to post an acl file', function (done) {
|
|
691
|
+
const options = createOptions('/append-acl/abc.ttl.acl', 'user2', 'text/turtle')
|
|
692
|
+
options.body = '<a> <b> <c> .\n'
|
|
693
|
+
request.put(options, function (error, response, body) {
|
|
694
|
+
assert.equal(error, null)
|
|
695
|
+
assert.equal(response.statusCode, 403)
|
|
696
|
+
assert.equal(response.statusMessage, 'User Unauthorized')
|
|
697
|
+
done()
|
|
698
|
+
})
|
|
699
|
+
})
|
|
700
|
+
it('user2 should not be able to access test file', function (done) {
|
|
701
|
+
const options = createOptions('/append-acl/abc.ttl', 'user2', 'text/turtle')
|
|
702
|
+
request.head(options, function (error, response, body) {
|
|
703
|
+
assert.equal(error, null)
|
|
704
|
+
assert.equal(response.statusCode, 403)
|
|
705
|
+
assert.equal(response.statusMessage, 'User Unauthorized')
|
|
706
|
+
done()
|
|
707
|
+
})
|
|
708
|
+
})
|
|
709
|
+
it('user2 (with append permission) cannot use PUT on an existing resource', function (done) {
|
|
710
|
+
const options = createOptions('/append-acl/abc.ttl', 'user2', 'text/turtle')
|
|
711
|
+
options.body = '<d> <e> <f> .\n'
|
|
712
|
+
request.put(options, function (error, response, body) {
|
|
713
|
+
assert.equal(error, null)
|
|
714
|
+
assert.equal(response.statusCode, 403)
|
|
715
|
+
assert.include(response.statusMessage, 'User Unauthorized')
|
|
716
|
+
done()
|
|
717
|
+
})
|
|
718
|
+
})
|
|
719
|
+
it('agent should not be able to access test file', function (done) {
|
|
720
|
+
const options = createOptions('/append-acl/abc.ttl')
|
|
721
|
+
request.head(options, function (error, response, body) {
|
|
722
|
+
assert.equal(error, null)
|
|
723
|
+
assert.equal(response.statusCode, 401)
|
|
724
|
+
assert.equal(response.statusMessage, 'Unauthenticated')
|
|
725
|
+
done()
|
|
726
|
+
})
|
|
727
|
+
})
|
|
728
|
+
it('agent (with append permissions) should not PUT', function (done) {
|
|
729
|
+
const options = createOptions('/append-acl/abc.ttl', null, 'text/turtle')
|
|
730
|
+
options.body = '<g> <h> <i> .\n'
|
|
731
|
+
request.put(options, function (error, response, body) {
|
|
732
|
+
assert.equal(error, null)
|
|
733
|
+
assert.equal(response.statusCode, 401)
|
|
734
|
+
assert.include(response.statusMessage, 'Unauthenticated')
|
|
735
|
+
done()
|
|
736
|
+
})
|
|
737
|
+
})
|
|
738
|
+
after(function () {
|
|
739
|
+
rm('/accounts-acl/tim.localhost/append-inherited/test.ttl')
|
|
740
|
+
rm('/accounts-acl/tim.localhost/append-inherited/test1.ttl')
|
|
741
|
+
rm('/accounts-acl/tim.localhost/append-inherited/new.ttl')
|
|
742
|
+
rm('/accounts-acl/tim.localhost/append-inherited/new1.ttl')
|
|
743
|
+
})
|
|
744
|
+
})
|
|
745
|
+
|
|
746
|
+
describe('Group', function () {
|
|
747
|
+
// before(function () {
|
|
748
|
+
// rm('/accounts-acl/tim.localhost/group/test-folder/.acl')
|
|
749
|
+
// })
|
|
750
|
+
|
|
751
|
+
// it('should PUT new ACL file', function (done) {
|
|
752
|
+
// var options = createOptions('/group/test-folder/.acl', 'user1')
|
|
753
|
+
// options.body = '<#Owner> a <http://www.w3.org/ns/auth/acl#Authorization>;\n' +
|
|
754
|
+
// ' <http://www.w3.org/ns/auth/acl#accessTo> <./.acl>;\n' +
|
|
755
|
+
// ' <http://www.w3.org/ns/auth/acl#agent> <' + user1 + '>;\n' +
|
|
756
|
+
// ' <http://www.w3.org/ns/auth/acl#mode> <http://www.w3.org/ns/auth/acl#Read>, <http://www.w3.org/ns/auth/acl#Write>, <http://www.w3.org/ns/auth/acl#Control> .\n' +
|
|
757
|
+
// '<#Public> a <http://www.w3.org/ns/auth/acl#Authorization>;\n' +
|
|
758
|
+
// ' <http://www.w3.org/ns/auth/acl#accessTo> <./>;\n' +
|
|
759
|
+
// ' <http://www.w3.org/ns/auth/acl#agentGroup> <group-listing#folks>;\n' +
|
|
760
|
+
// ' <http://www.w3.org/ns/auth/acl#mode> <http://www.w3.org/ns/auth/acl#Read> .\n'
|
|
761
|
+
// request.put(options, function (error, response, body) {
|
|
762
|
+
// assert.equal(error, null)
|
|
763
|
+
// assert.equal(response.statusCode, 201)
|
|
764
|
+
// done()
|
|
765
|
+
// })
|
|
766
|
+
// })
|
|
767
|
+
it('user1 should be able to access test directory', function (done) {
|
|
768
|
+
const options = createOptions('/group/test-folder/', 'user1')
|
|
769
|
+
|
|
770
|
+
request.head(options, function (error, response, body) {
|
|
771
|
+
assert.equal(error, null)
|
|
772
|
+
assert.equal(response.statusCode, 200)
|
|
773
|
+
done()
|
|
774
|
+
})
|
|
775
|
+
})
|
|
776
|
+
it('user2 should be able to access test directory', function (done) {
|
|
777
|
+
const options = createOptions('/group/test-folder/', 'user2')
|
|
778
|
+
|
|
779
|
+
request.head(options, function (error, response, body) {
|
|
780
|
+
assert.equal(error, null)
|
|
781
|
+
assert.equal(response.statusCode, 200)
|
|
782
|
+
done()
|
|
783
|
+
})
|
|
784
|
+
})
|
|
785
|
+
it('user2 should be able to write a file in the test directory', function (done) {
|
|
786
|
+
const options = createOptions('/group/test-folder/test.ttl', 'user2', 'text/turtle')
|
|
787
|
+
options.body = '<#Dahut> a <https://dbpedia.org/resource/Category:French_legendary_creatures>.\n'
|
|
788
|
+
|
|
789
|
+
request.put(options, function (error, response, body) {
|
|
790
|
+
assert.equal(error, null)
|
|
791
|
+
assert.equal(response.statusCode, 201)
|
|
792
|
+
done()
|
|
793
|
+
})
|
|
794
|
+
})
|
|
795
|
+
|
|
796
|
+
it('user1 should be able to get the file', function (done) {
|
|
797
|
+
const options = createOptions('/group/test-folder/test.ttl', 'user1', 'text/turtle')
|
|
798
|
+
|
|
799
|
+
request.get(options, function (error, response, body) {
|
|
800
|
+
assert.equal(error, null)
|
|
801
|
+
assert.equal(response.statusCode, 200)
|
|
802
|
+
done()
|
|
803
|
+
})
|
|
804
|
+
})
|
|
805
|
+
it('user2 should not be able to write to the ACL', function (done) {
|
|
806
|
+
const options = createOptions('/group/test-folder/.acl', 'user2', 'text/turtle')
|
|
807
|
+
options.body = '<#Dahut> a <https://dbpedia.org/resource/Category:French_legendary_creatures>.\n'
|
|
808
|
+
|
|
809
|
+
request.put(options, function (error, response, body) {
|
|
810
|
+
assert.equal(error, null)
|
|
811
|
+
assert.equal(response.statusCode, 403)
|
|
812
|
+
assert.equal(response.statusMessage, 'User Unauthorized')
|
|
813
|
+
done()
|
|
814
|
+
})
|
|
815
|
+
})
|
|
816
|
+
|
|
817
|
+
it('user1 should be able to delete the file', function (done) {
|
|
818
|
+
const options = createOptions('/group/test-folder/test.ttl', 'user1', 'text/turtle')
|
|
819
|
+
|
|
820
|
+
request.delete(options, function (error, response, body) {
|
|
821
|
+
assert.equal(error, null)
|
|
822
|
+
assert.equal(response.statusCode, 200) // Should be 204, right?
|
|
823
|
+
done()
|
|
824
|
+
})
|
|
825
|
+
})
|
|
826
|
+
it('We should have a 406 with invalid group listings', function (done) {
|
|
827
|
+
const options = createOptions('/group/test-folder/some-other-file.txt', 'user2')
|
|
828
|
+
|
|
829
|
+
request.get(options, function (error, response, body) {
|
|
830
|
+
assert.equal(error, null)
|
|
831
|
+
assert.equal(response.statusCode, 406)
|
|
832
|
+
done()
|
|
833
|
+
})
|
|
834
|
+
})
|
|
835
|
+
it('We should have a 404 for non-existent file', function (done) {
|
|
836
|
+
const options = createOptions('/group/test-folder/nothere.txt', 'user2')
|
|
837
|
+
|
|
838
|
+
request.get(options, function (error, response, body) {
|
|
839
|
+
assert.equal(error, null)
|
|
840
|
+
assert.equal(response.statusCode, 404)
|
|
841
|
+
done()
|
|
842
|
+
})
|
|
843
|
+
})
|
|
844
|
+
})
|
|
845
|
+
|
|
846
|
+
describe('Restricted', function () {
|
|
847
|
+
const body = '<#Owner> a <http://www.w3.org/ns/auth/acl#Authorization>;\n' +
|
|
848
|
+
' <http://www.w3.org/ns/auth/acl#accessTo> <./abc2.ttl>;\n' +
|
|
849
|
+
' <http://www.w3.org/ns/auth/acl#agent> <' + user1 + '>;\n' +
|
|
850
|
+
' <http://www.w3.org/ns/auth/acl#mode> <http://www.w3.org/ns/auth/acl#Read>, <http://www.w3.org/ns/auth/acl#Write>, <http://www.w3.org/ns/auth/acl#Control> .\n' +
|
|
851
|
+
'<#Restricted> a <http://www.w3.org/ns/auth/acl#Authorization>;\n' +
|
|
852
|
+
' <http://www.w3.org/ns/auth/acl#accessTo> <./abc2.ttl>;\n' +
|
|
853
|
+
' <http://www.w3.org/ns/auth/acl#agent> <' + user2 + '>;\n' +
|
|
854
|
+
' <http://www.w3.org/ns/auth/acl#mode> <http://www.w3.org/ns/auth/acl#Read>, <http://www.w3.org/ns/auth/acl#Write>.\n'
|
|
855
|
+
it('user1 should be able to modify test file\'s ACL file', function (done) {
|
|
856
|
+
const options = createOptions('/append-acl/abc2.ttl.acl', 'user1', 'text/turtle')
|
|
857
|
+
options.body = body
|
|
858
|
+
request.put(options, function (error, response, body) {
|
|
859
|
+
assert.equal(error, null)
|
|
860
|
+
assert.equal(response.statusCode, 204)
|
|
861
|
+
done()
|
|
862
|
+
})
|
|
863
|
+
})
|
|
864
|
+
it('user1 should be able to access test file\'s ACL file', function (done) {
|
|
865
|
+
const options = createOptions('/append-acl/abc2.ttl.acl', 'user1', 'text/turtle')
|
|
866
|
+
request.head(options, function (error, response, body) {
|
|
867
|
+
assert.equal(error, null)
|
|
868
|
+
assert.equal(response.statusCode, 200)
|
|
869
|
+
done()
|
|
870
|
+
})
|
|
871
|
+
})
|
|
872
|
+
it('user1 should be able to access test file', function (done) {
|
|
873
|
+
const options = createOptions('/append-acl/abc2.ttl', 'user1', 'text/turtle')
|
|
874
|
+
request.head(options, function (error, response, body) {
|
|
875
|
+
assert.equal(error, null)
|
|
876
|
+
assert.equal(response.statusCode, 200)
|
|
877
|
+
done()
|
|
878
|
+
})
|
|
879
|
+
})
|
|
880
|
+
it('user1 should be able to modify test file', function (done) {
|
|
881
|
+
const options = createOptions('/append-acl/abc2.ttl', 'user1', 'text/turtle')
|
|
882
|
+
options.body = '<a> <b> <c> .\n'
|
|
883
|
+
request.put(options, function (error, response, body) {
|
|
884
|
+
assert.equal(error, null)
|
|
885
|
+
assert.equal(response.statusCode, 204)
|
|
886
|
+
done()
|
|
887
|
+
})
|
|
888
|
+
})
|
|
889
|
+
it('user2 should be able to access test file', function (done) {
|
|
890
|
+
const options = createOptions('/append-acl/abc2.ttl', 'user2')
|
|
891
|
+
request.head(options, function (error, response, body) {
|
|
892
|
+
assert.equal(error, null)
|
|
893
|
+
assert.equal(response.statusCode, 200)
|
|
894
|
+
done()
|
|
895
|
+
})
|
|
896
|
+
})
|
|
897
|
+
it('user2 should not be able to access test file\'s ACL file', function (done) {
|
|
898
|
+
const options = createOptions('/append-acl/abc2.ttl.acl', 'user2')
|
|
899
|
+
request.head(options, function (error, response, body) {
|
|
900
|
+
assert.equal(error, null)
|
|
901
|
+
assert.equal(response.statusCode, 403)
|
|
902
|
+
assert.equal(response.statusMessage, 'User Unauthorized')
|
|
903
|
+
done()
|
|
904
|
+
})
|
|
905
|
+
})
|
|
906
|
+
it('user2 should be able to modify test file', function (done) {
|
|
907
|
+
const options = createOptions('/append-acl/abc2.ttl', 'user2', 'text/turtle')
|
|
908
|
+
options.body = '<d> <e> <f> .\n'
|
|
909
|
+
request.put(options, function (error, response, body) {
|
|
910
|
+
assert.equal(error, null)
|
|
911
|
+
assert.equal(response.statusCode, 204)
|
|
912
|
+
done()
|
|
913
|
+
})
|
|
914
|
+
})
|
|
915
|
+
it('agent should not be able to access test file', function (done) {
|
|
916
|
+
const options = createOptions('/append-acl/abc2.ttl')
|
|
917
|
+
request.head(options, function (error, response, body) {
|
|
918
|
+
assert.equal(error, null)
|
|
919
|
+
assert.equal(response.statusCode, 401)
|
|
920
|
+
assert.equal(response.statusMessage, 'Unauthenticated')
|
|
921
|
+
done()
|
|
922
|
+
})
|
|
923
|
+
})
|
|
924
|
+
it('agent should not be able to modify test file', function (done) {
|
|
925
|
+
const options = createOptions('/append-acl/abc2.ttl', null, 'text/turtle')
|
|
926
|
+
options.body = '<d> <e> <f> .\n'
|
|
927
|
+
request.put(options, function (error, response, body) {
|
|
928
|
+
assert.equal(error, null)
|
|
929
|
+
assert.equal(response.statusCode, 401)
|
|
930
|
+
assert.equal(response.statusMessage, 'Unauthenticated')
|
|
931
|
+
done()
|
|
932
|
+
})
|
|
933
|
+
})
|
|
934
|
+
})
|
|
935
|
+
|
|
936
|
+
describe('default', function () {
|
|
937
|
+
before(function () {
|
|
938
|
+
rm('/accounts-acl/tim.localhost/write-acl/default-for-new/.acl')
|
|
939
|
+
rm('/accounts-acl/tim.localhost/write-acl/default-for-new/test-file.ttl')
|
|
940
|
+
})
|
|
941
|
+
|
|
942
|
+
const body = '<#Owner> a <http://www.w3.org/ns/auth/acl#Authorization>;\n' +
|
|
943
|
+
' <http://www.w3.org/ns/auth/acl#accessTo> <./>;\n' +
|
|
944
|
+
' <http://www.w3.org/ns/auth/acl#agent> <' + user1 + '>;\n' +
|
|
945
|
+
' <http://www.w3.org/ns/auth/acl#default> <./>;\n' +
|
|
946
|
+
' <http://www.w3.org/ns/auth/acl#mode> <http://www.w3.org/ns/auth/acl#Read>, <http://www.w3.org/ns/auth/acl#Write>, <http://www.w3.org/ns/auth/acl#Control> .\n' +
|
|
947
|
+
'<#Default> a <http://www.w3.org/ns/auth/acl#Authorization>;\n' +
|
|
948
|
+
' <http://www.w3.org/ns/auth/acl#accessTo> <./>;\n' +
|
|
949
|
+
' <http://www.w3.org/ns/auth/acl#default> <./>;\n' +
|
|
950
|
+
' <http://www.w3.org/ns/auth/acl#agentClass> <http://xmlns.com/foaf/0.1/Agent>;\n' +
|
|
951
|
+
' <http://www.w3.org/ns/auth/acl#mode> <http://www.w3.org/ns/auth/acl#Read> .\n'
|
|
952
|
+
it('user1 should be able to modify test directory\'s ACL file', function (done) {
|
|
953
|
+
const options = createOptions('/write-acl/default-for-new/.acl', 'user1', 'text/turtle')
|
|
954
|
+
options.body = body
|
|
955
|
+
request.put(options, function (error, response, body) {
|
|
956
|
+
assert.equal(error, null)
|
|
957
|
+
assert.equal(response.statusCode, 201)
|
|
958
|
+
done()
|
|
959
|
+
})
|
|
960
|
+
})
|
|
961
|
+
it('user1 should be able to access test direcotory\'s ACL file', function (done) {
|
|
962
|
+
const options = createOptions('/write-acl/default-for-new/.acl', 'user1')
|
|
963
|
+
request.head(options, function (error, response, body) {
|
|
964
|
+
assert.equal(error, null)
|
|
965
|
+
assert.equal(response.statusCode, 200)
|
|
966
|
+
done()
|
|
967
|
+
})
|
|
968
|
+
})
|
|
969
|
+
it('user1 should be able to create new test file', function (done) {
|
|
970
|
+
const options = createOptions('/write-acl/default-for-new/test-file.ttl', 'user1', 'text/turtle')
|
|
971
|
+
options.body = '<a> <b> <c> .\n'
|
|
972
|
+
request.put(options, function (error, response, body) {
|
|
973
|
+
assert.equal(error, null)
|
|
974
|
+
assert.equal(response.statusCode, 201)
|
|
975
|
+
done()
|
|
976
|
+
})
|
|
977
|
+
})
|
|
978
|
+
it('user1 should be able to access new test file', function (done) {
|
|
979
|
+
const options = createOptions('/write-acl/default-for-new/test-file.ttl', 'user1')
|
|
980
|
+
request.head(options, function (error, response, body) {
|
|
981
|
+
assert.equal(error, null)
|
|
982
|
+
assert.equal(response.statusCode, 200)
|
|
983
|
+
done()
|
|
984
|
+
})
|
|
985
|
+
})
|
|
986
|
+
it('user2 should not be able to access test direcotory\'s ACL file', function (done) {
|
|
987
|
+
const options = createOptions('/write-acl/default-for-new/.acl', 'user2')
|
|
988
|
+
request.head(options, function (error, response, body) {
|
|
989
|
+
assert.equal(error, null)
|
|
990
|
+
assert.equal(response.statusCode, 403)
|
|
991
|
+
assert.equal(response.statusMessage, 'User Unauthorized')
|
|
992
|
+
done()
|
|
993
|
+
})
|
|
994
|
+
})
|
|
995
|
+
it('user2 should be able to access new test file', function (done) {
|
|
996
|
+
const options = createOptions('/write-acl/default-for-new/test-file.ttl', 'user2')
|
|
997
|
+
request.head(options, function (error, response, body) {
|
|
998
|
+
assert.equal(error, null)
|
|
999
|
+
assert.equal(response.statusCode, 200)
|
|
1000
|
+
done()
|
|
1001
|
+
})
|
|
1002
|
+
})
|
|
1003
|
+
it('user2 should not be able to modify new test file', function (done) {
|
|
1004
|
+
const options = createOptions('/write-acl/default-for-new/test-file.ttl', 'user2', 'text/turtle')
|
|
1005
|
+
options.body = '<d> <e> <f> .\n'
|
|
1006
|
+
request.put(options, function (error, response, body) {
|
|
1007
|
+
assert.equal(error, null)
|
|
1008
|
+
assert.equal(response.statusCode, 403)
|
|
1009
|
+
assert.equal(response.statusMessage, 'User Unauthorized')
|
|
1010
|
+
done()
|
|
1011
|
+
})
|
|
1012
|
+
})
|
|
1013
|
+
it('agent should be able to access new test file', function (done) {
|
|
1014
|
+
const options = createOptions('/write-acl/default-for-new/test-file.ttl')
|
|
1015
|
+
request.head(options, function (error, response, body) {
|
|
1016
|
+
assert.equal(error, null)
|
|
1017
|
+
assert.equal(response.statusCode, 200)
|
|
1018
|
+
done()
|
|
1019
|
+
})
|
|
1020
|
+
})
|
|
1021
|
+
it('agent should not be able to modify new test file', function (done) {
|
|
1022
|
+
const options = createOptions('/write-acl/default-for-new/test-file.ttl', null, 'text/turtle')
|
|
1023
|
+
options.body = '<d> <e> <f> .\n'
|
|
1024
|
+
request.put(options, function (error, response, body) {
|
|
1025
|
+
assert.equal(error, null)
|
|
1026
|
+
assert.equal(response.statusCode, 401)
|
|
1027
|
+
assert.equal(response.statusMessage, 'Unauthenticated')
|
|
1028
|
+
done()
|
|
1029
|
+
})
|
|
1030
|
+
})
|
|
1031
|
+
|
|
1032
|
+
after(function () {
|
|
1033
|
+
rm('/accounts-acl/tim.localhost/write-acl/default-for-new/.acl')
|
|
1034
|
+
rm('/accounts-acl/tim.localhost/write-acl/default-for-new/test-file.ttl')
|
|
1035
|
+
})
|
|
1036
|
+
})
|
|
1037
|
+
|
|
1038
|
+
describe('Wrongly set accessTo', function () {
|
|
1039
|
+
it('user1 should be able to access test directory', function (done) {
|
|
1040
|
+
const options = createOptions('/dot-acl/', 'user1')
|
|
1041
|
+
request.head(options, function (error, response, body) {
|
|
1042
|
+
assert.equal(error, null)
|
|
1043
|
+
assert.equal(response.statusCode, 403)
|
|
1044
|
+
done()
|
|
1045
|
+
})
|
|
1046
|
+
})
|
|
1047
|
+
})
|
|
1048
|
+
})
|