solid-server 5.8.7 → 5.8.8-5fdbfa12

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (686) hide show
  1. package/CHANGELOG.md +0 -0
  2. package/CONTRIBUTING.md +0 -0
  3. package/CONTRIBUTORS.md +0 -0
  4. package/Dockerfile +0 -0
  5. package/LICENSE.md +0 -0
  6. package/README.md +0 -0
  7. package/bin/config.json +0 -0
  8. package/bin/lib/cli-utils.mjs +54 -0
  9. package/bin/lib/cli.mjs +44 -0
  10. package/bin/lib/{init.js → init.mjs} +93 -94
  11. package/bin/lib/{invalidUsernames.js → invalidUsernames.mjs} +136 -148
  12. package/bin/lib/{migrateLegacyResources.js → migrateLegacyResources.mjs} +64 -69
  13. package/bin/lib/{options.js → options.mjs} +379 -405
  14. package/bin/lib/{start.js → start.mjs} +124 -148
  15. package/bin/lib/{updateIndex.js → updateIndex.mjs} +55 -56
  16. package/bin/solid +2 -2
  17. package/bin/solid-test +0 -0
  18. package/common/css/bootstrap.min.css +6 -0
  19. package/common/css/solid.css +0 -0
  20. package/common/fonts/glyphicons-halflings-regular.eot +0 -0
  21. package/common/fonts/glyphicons-halflings-regular.svg +0 -0
  22. package/common/fonts/glyphicons-halflings-regular.ttf +0 -0
  23. package/common/fonts/glyphicons-halflings-regular.woff +0 -0
  24. package/common/fonts/glyphicons-halflings-regular.woff2 +0 -0
  25. package/common/img/solid-emblem.svg +0 -0
  26. package/common/js/auth-buttons.js +0 -0
  27. package/common/js/auth-buttons.mjs +57 -0
  28. package/common/js/index-buttons.js +0 -0
  29. package/common/js/index-buttons.mjs +38 -0
  30. package/common/js/solid.js +0 -0
  31. package/common/js/solid.mjs +456 -0
  32. package/common/well-known/security.txt +0 -0
  33. package/config/defaults.js +0 -0
  34. package/config/defaults.mjs +22 -0
  35. package/config/templates/emails/delete-account.js +49 -0
  36. package/config/templates/emails/delete-account.mjs +31 -0
  37. package/config/templates/emails/invalid-username.js +30 -0
  38. package/config/templates/emails/invalid-username.mjs +27 -0
  39. package/config/templates/emails/reset-password.js +49 -0
  40. package/config/templates/emails/reset-password.mjs +31 -0
  41. package/config/templates/emails/welcome.js +39 -0
  42. package/config/templates/emails/welcome.mjs +23 -0
  43. package/config/templates/new-account/favicon.ico +0 -0
  44. package/config/templates/new-account/favicon.ico.acl +26 -0
  45. package/config/templates/new-account/profile/card$.ttl +26 -0
  46. package/config/templates/new-account/robots.txt +3 -0
  47. package/config/templates/new-account/robots.txt.acl +26 -0
  48. package/config/templates/new-account/settings/prefs.ttl +15 -0
  49. package/config/templates/new-account/settings/privateTypeIndex.ttl +4 -0
  50. package/config/templates/new-account/settings/publicTypeIndex.ttl +4 -0
  51. package/{default-templates/new-account/.meta.acl → config/templates/new-account/settings/publicTypeIndex.ttl.acl} +4 -4
  52. package/config/templates/new-account/settings/serverSide.ttl.acl +13 -0
  53. package/config/templates/new-account/settings/serverSide.ttl.inactive +12 -0
  54. package/config/templates/server/favicon.ico +0 -0
  55. package/{.well-known/.acl → config/templates/server/favicon.ico.acl} +2 -2
  56. package/config/templates/server/index.html +54 -0
  57. package/config/templates/server/robots.txt +3 -0
  58. package/{default-templates/server/.well-known/.acl → config/templates/server/robots.txt.acl} +2 -2
  59. package/config/usernames-blacklist.json +0 -0
  60. package/config/views/account/account-deleted.hbs +17 -0
  61. package/config/views/account/delete-confirm.hbs +51 -0
  62. package/config/views/account/delete-link-sent.hbs +17 -0
  63. package/config/views/account/delete.hbs +51 -0
  64. package/config/views/account/invalid-username.hbs +22 -0
  65. package/config/views/account/register-disabled.hbs +6 -0
  66. package/config/views/account/register-form.hbs +133 -0
  67. package/config/views/account/register.hbs +24 -0
  68. package/config/views/auth/auth-hidden-fields.hbs +8 -0
  69. package/config/views/auth/change-password.hbs +58 -0
  70. package/config/views/auth/goodbye.hbs +23 -0
  71. package/config/views/auth/login-required.hbs +34 -0
  72. package/config/views/auth/login-tls.hbs +11 -0
  73. package/config/views/auth/login-username-password.hbs +28 -0
  74. package/config/views/auth/login.hbs +55 -0
  75. package/config/views/auth/no-permission.hbs +29 -0
  76. package/config/views/auth/password-changed.hbs +27 -0
  77. package/config/views/auth/reset-link-sent.hbs +21 -0
  78. package/config/views/auth/reset-password.hbs +52 -0
  79. package/config/views/auth/sharing.hbs +49 -0
  80. package/config/views/shared/create-account.hbs +8 -0
  81. package/config/views/shared/error.hbs +5 -0
  82. package/config.json-default +0 -0
  83. package/coverage/tmp/coverage-2275-1766876301000-0.json +1 -0
  84. package/coverage/tmp/coverage-2276-1766876279735-0.json +1 -0
  85. package/default-templates/emails/delete-account.js +0 -0
  86. package/default-templates/emails/delete-account.mjs +31 -0
  87. package/default-templates/emails/invalid-username.js +0 -0
  88. package/default-templates/emails/invalid-username.mjs +27 -0
  89. package/default-templates/emails/reset-password.js +0 -0
  90. package/default-templates/emails/reset-password.mjs +31 -0
  91. package/default-templates/emails/welcome.js +0 -0
  92. package/default-templates/emails/welcome.mjs +23 -0
  93. package/default-templates/new-account/favicon.ico +0 -0
  94. package/default-templates/new-account/favicon.ico.acl +0 -0
  95. package/default-templates/new-account/profile/card$.ttl +0 -0
  96. package/default-templates/new-account/robots.txt +0 -0
  97. package/default-templates/new-account/robots.txt.acl +0 -0
  98. package/default-templates/new-account/settings/prefs.ttl +0 -0
  99. package/default-templates/new-account/settings/privateTypeIndex.ttl +0 -0
  100. package/default-templates/new-account/settings/publicTypeIndex.ttl +0 -0
  101. package/default-templates/new-account/settings/publicTypeIndex.ttl.acl +0 -0
  102. package/default-templates/new-account/settings/serverSide.ttl.acl +0 -0
  103. package/default-templates/new-account/settings/serverSide.ttl.inactive +0 -0
  104. package/default-templates/server/favicon.ico +0 -0
  105. package/default-templates/server/favicon.ico.acl +0 -0
  106. package/default-templates/server/index.html +0 -0
  107. package/default-templates/server/robots.txt +0 -0
  108. package/default-templates/server/robots.txt.acl +0 -0
  109. package/default-views/account/account-deleted.hbs +0 -0
  110. package/default-views/account/delete-confirm.hbs +0 -0
  111. package/default-views/account/delete-link-sent.hbs +0 -0
  112. package/default-views/account/delete.hbs +0 -0
  113. package/default-views/account/invalid-username.hbs +0 -0
  114. package/default-views/account/register-disabled.hbs +0 -0
  115. package/default-views/account/register-form.hbs +0 -0
  116. package/default-views/account/register.hbs +0 -0
  117. package/default-views/auth/auth-hidden-fields.hbs +0 -0
  118. package/default-views/auth/change-password.hbs +0 -0
  119. package/default-views/auth/goodbye.hbs +0 -0
  120. package/default-views/auth/login-required.hbs +0 -0
  121. package/default-views/auth/login-tls.hbs +0 -0
  122. package/default-views/auth/login-username-password.hbs +0 -0
  123. package/default-views/auth/login.hbs +0 -0
  124. package/default-views/auth/no-permission.hbs +0 -0
  125. package/default-views/auth/password-changed.hbs +0 -0
  126. package/default-views/auth/reset-link-sent.hbs +0 -0
  127. package/default-views/auth/reset-password.hbs +0 -0
  128. package/default-views/auth/sharing.hbs +0 -0
  129. package/default-views/shared/create-account.hbs +0 -0
  130. package/default-views/shared/error.hbs +0 -0
  131. package/docker-compose.yml +0 -0
  132. package/docker-image/CONTRIBUTING.md +33 -0
  133. package/docker-image/Makefile +32 -0
  134. package/docker-image/README.md +65 -0
  135. package/docker-image/examples/docker-compose.all-in-one.yml +76 -0
  136. package/docker-image/examples/docker-compose.nginx.yml +51 -0
  137. package/docker-image/examples/docker-compose.simple.yml +34 -0
  138. package/docker-image/src/Dockerfile +34 -0
  139. package/docker-image/src/checks.sh +56 -0
  140. package/docker-image/src/create-temporary-cert.sh +14 -0
  141. package/docker-image/src/entrypoint.sh +8 -0
  142. package/{common/img/.gitkeep → docker-image/test/__init__.py} +0 -0
  143. package/docker-image/test/conftest.py +15 -0
  144. package/docker-image/test/test_image_foundations.py +51 -0
  145. package/docker-image/test/test_non_accessible_key_cert.py +36 -0
  146. package/docker-image/test/test_precondition_checks.py +41 -0
  147. package/docker-image/test/test_solid_default_config.py +66 -0
  148. package/docker-image/test/test_volumes.py +55 -0
  149. package/docker-image/test/wait_for_container.py +8 -0
  150. package/docs/how-to-delete-your-account.md +0 -0
  151. package/docs/login-and-grant-access-to-application.md +0 -0
  152. package/eslint.config.mjs +102 -0
  153. package/examples/custom-error-handling.js +0 -0
  154. package/examples/custom-error-handling.mjs +29 -0
  155. package/examples/ldp-with-webid.js +0 -0
  156. package/examples/ldp-with-webid.mjs +12 -0
  157. package/examples/simple-express-app.js +0 -0
  158. package/examples/simple-express-app.mjs +20 -0
  159. package/examples/simple-ldp-server.js +0 -0
  160. package/examples/simple-ldp-server.mjs +8 -0
  161. package/favicon.ico +0 -0
  162. package/favicon.ico.acl +0 -0
  163. package/index.cjs +4 -0
  164. package/index.html +0 -0
  165. package/index.mjs +23 -0
  166. package/lib/{acl-checker.js → acl-checker.mjs} +13 -17
  167. package/lib/api/accounts/{user-accounts.js → user-accounts.mjs} +17 -16
  168. package/lib/api/authn/{force-user.js → force-user.mjs} +5 -4
  169. package/lib/api/authn/index.mjs +8 -0
  170. package/lib/api/authn/{webid-oidc.js → webid-oidc.mjs} +27 -20
  171. package/lib/api/authn/{webid-tls.js → webid-tls.mjs} +12 -11
  172. package/lib/api/index.mjs +7 -0
  173. package/lib/{capability-discovery.js → capability-discovery.mjs} +3 -6
  174. package/lib/common/{fs-utils.js → fs-utils.mjs} +35 -43
  175. package/lib/common/template-utils.mjs +29 -0
  176. package/lib/common/{user-utils.js → user-utils.mjs} +24 -28
  177. package/lib/{create-app.js → create-app.mjs} +372 -361
  178. package/lib/{create-server.js → create-server.mjs} +34 -13
  179. package/lib/debug.mjs +37 -0
  180. package/lib/handlers/{allow.js → allow.mjs} +79 -83
  181. package/lib/handlers/{auth-proxy.js → auth-proxy.mjs} +8 -8
  182. package/lib/handlers/{copy.js → copy.mjs} +35 -39
  183. package/lib/handlers/{cors-proxy.js → cors-proxy.mjs} +11 -16
  184. package/lib/handlers/{delete.js → delete.mjs} +20 -22
  185. package/lib/handlers/{error-pages.js → error-pages.mjs} +144 -212
  186. package/lib/handlers/{get.js → get.mjs} +258 -252
  187. package/lib/handlers/{index.js → index.mjs} +7 -10
  188. package/lib/handlers/{notify.js → notify.mjs} +8 -10
  189. package/lib/handlers/{options.js → options.mjs} +3 -7
  190. package/lib/handlers/patch/{n3-patch-parser.js → n3-patch-parser.mjs} +57 -59
  191. package/lib/handlers/patch/{sparql-update-parser.js → sparql-update-parser.mjs} +14 -16
  192. package/lib/handlers/{patch.js → patch.mjs} +241 -235
  193. package/lib/handlers/{post.js → post.mjs} +101 -99
  194. package/lib/handlers/{put.js → put.mjs} +101 -105
  195. package/lib/handlers/{restrict-to-top-domain.js → restrict-to-top-domain.mjs} +2 -2
  196. package/lib/{header.js → header.mjs} +138 -143
  197. package/lib/{http-error.js → http-error.mjs} +35 -34
  198. package/lib/{ldp-container.js → ldp-container.mjs} +10 -12
  199. package/lib/ldp-copy.mjs +82 -0
  200. package/lib/ldp-middleware.mjs +38 -0
  201. package/lib/{ldp.js → ldp.mjs} +286 -78
  202. package/lib/{lock.js → lock.mjs} +10 -10
  203. package/lib/{metadata.js → metadata.mjs} +11 -11
  204. package/lib/models/account-manager.mjs +297 -0
  205. package/lib/models/account-template.mjs +70 -0
  206. package/lib/models/authenticator.mjs +161 -0
  207. package/lib/models/oidc-manager.mjs +22 -0
  208. package/lib/models/solid-host.mjs +63 -0
  209. package/lib/models/user-account.mjs +50 -0
  210. package/lib/models/webid-tls-certificate.mjs +97 -0
  211. package/lib/{payment-pointer-discovery.js → payment-pointer-discovery.mjs} +5 -8
  212. package/lib/{rdf-notification-template.js → rdf-notification-template.mjs} +3 -5
  213. package/lib/requests/add-cert-request.mjs +70 -0
  214. package/lib/requests/auth-request.mjs +151 -0
  215. package/lib/requests/{create-account-request.js → create-account-request.mjs} +249 -452
  216. package/lib/requests/delete-account-confirm-request.mjs +85 -0
  217. package/lib/requests/{delete-account-request.js → delete-account-request.mjs} +73 -134
  218. package/lib/requests/login-request.mjs +89 -0
  219. package/lib/requests/{password-change-request.js → password-change-request.mjs} +132 -201
  220. package/lib/requests/{password-reset-email-request.js → password-reset-email-request.mjs} +123 -202
  221. package/lib/requests/password-reset-request.mjs +47 -0
  222. package/lib/requests/register-request.mjs +48 -0
  223. package/lib/requests/{sharing-request.js → sharing-request.mjs} +174 -261
  224. package/lib/{resource-mapper.js → resource-mapper.mjs} +8 -9
  225. package/lib/{server-config.js → server-config.mjs} +15 -20
  226. package/lib/services/{blacklist-service.js → blacklist-service.mjs} +36 -33
  227. package/lib/services/email-service.mjs +76 -0
  228. package/lib/services/{token-service.js → token-service.mjs} +36 -44
  229. package/lib/{utils.js → utils.mjs} +307 -254
  230. package/lib/webid/{index.js → index.mjs} +9 -13
  231. package/lib/webid/lib/{get.js → get.mjs} +30 -35
  232. package/lib/webid/lib/{parse.js → parse.mjs} +10 -12
  233. package/lib/webid/lib/verify.mjs +77 -0
  234. package/lib/webid/tls/generate.mjs +53 -0
  235. package/lib/webid/tls/index.mjs +6 -0
  236. package/package.json +75 -67
  237. package/renovate.json +0 -0
  238. package/robots.txt +0 -0
  239. package/robots.txt.acl +0 -0
  240. package/solid-server-5.8.8.tgz +0 -0
  241. package/static/account-recovery.html +0 -0
  242. package/static/popup-redirect.html +0 -0
  243. package/static/signup.html +0 -0
  244. package/static/signup.html.acl +0 -0
  245. package/test/index.mjs +167 -0
  246. package/test/integration/account-creation-tls-test.mjs +127 -0
  247. package/test/integration/account-manager-test.mjs +150 -0
  248. package/test/integration/account-template-test.mjs +135 -0
  249. package/test/integration/acl-oidc-test.mjs +1047 -0
  250. package/test/integration/acl-tls-test.mjs +964 -0
  251. package/test/integration/auth-proxy-test.mjs +144 -0
  252. package/test/integration/authentication-oidc-test.mjs +816 -0
  253. package/test/integration/authentication-oidc-with-strict-origins-turned-off-test.mjs +643 -0
  254. package/test/integration/capability-discovery-test.mjs +115 -0
  255. package/test/integration/cors-proxy-test.mjs +145 -0
  256. package/test/integration/errors-oidc-test.mjs +109 -0
  257. package/test/integration/errors-test.mjs +49 -0
  258. package/test/integration/formats-test.mjs +136 -0
  259. package/test/integration/header-test.mjs +101 -0
  260. package/test/integration/http-copy-test.mjs +109 -0
  261. package/test/integration/http-test.mjs +1197 -0
  262. package/test/integration/ldp-test.mjs +528 -0
  263. package/test/integration/oidc-manager-test.mjs +41 -0
  264. package/test/integration/params-test.mjs +192 -0
  265. package/test/integration/patch-sparql-update-test.mjs +195 -0
  266. package/test/integration/patch-test.mjs +590 -0
  267. package/test/integration/payment-pointer-test.mjs +155 -0
  268. package/test/integration/prep-test.mjs +314 -0
  269. package/test/integration/quota-test.mjs +50 -0
  270. package/test/integration/special-root-acl-handling-test.mjs +68 -0
  271. package/test/integration/validate-tts-test.mjs +57 -0
  272. package/test/integration/www-account-creation-oidc-test.mjs +310 -0
  273. package/test/keys/cert.pem +21 -0
  274. package/test/keys/client-cert.pem +19 -0
  275. package/test/keys/client-key.pem +27 -0
  276. package/test/keys/key.pem +27 -0
  277. package/test/keys/user1-cert.pem +23 -0
  278. package/test/keys/user1-key.pem +28 -0
  279. package/test/keys/user2-cert.pem +23 -0
  280. package/test/keys/user2-key.pem +27 -0
  281. package/test/mocha.opts +2 -0
  282. package/test/resources/Makefile +146 -0
  283. package/test/resources/accounts/alice.localhost/profile/card +0 -0
  284. package/test/resources/accounts/db/oidc/op/clients/_key_abbf27de893abf7d05279547c22d9366.json +1 -0
  285. package/test/resources/accounts/db/oidc/op/provider.json +763 -0
  286. package/test/resources/accounts/db/oidc/rp/clients/_key_https%3A%2F%2Flocalhost%3A3457.json +1 -0
  287. package/test/resources/accounts/localhost/samplePublicContainer/nicola.jpg +0 -0
  288. package/test/resources/accounts/tim.localhost/hello.html +9 -0
  289. package/test/resources/accounts/tim.localhost/profile/card +0 -0
  290. package/test/resources/accounts-acl/config/templates/emails/welcome-test.js +39 -0
  291. package/test/resources/accounts-acl/config/templates/new-account/favicon.ico +0 -0
  292. package/test/resources/accounts-acl/config/templates/new-account/favicon.ico.acl +26 -0
  293. package/test/resources/accounts-acl/config/templates/new-account/index.html +28 -0
  294. package/test/resources/accounts-acl/config/templates/new-account/index.html.acl +22 -0
  295. package/test/resources/accounts-acl/config/templates/new-account/profile/card +27 -0
  296. package/{default-templates/new-account/inbox/.acl → test/resources/accounts-acl/config/templates/new-account/profile/card.acl} +5 -6
  297. package/test/resources/accounts-acl/config/templates/new-account/settings/prefs.ttl +9 -0
  298. package/test/resources/accounts-acl/config/templates/new-account/settings/privateTypeIndex.ttl +4 -0
  299. package/test/resources/accounts-acl/config/templates/new-account/settings/publicTypeIndex.ttl +4 -0
  300. package/test/resources/accounts-acl/config/templates/new-account/settings/publicTypeIndex.ttl.acl +25 -0
  301. package/test/resources/accounts-acl/config/templates/new-account/settings/serverSide.ttl +14 -0
  302. package/test/resources/accounts-acl/config/templates/server/index.html +35 -0
  303. package/{.acl → test/resources/accounts-acl/config/templates/server/index.html.acl} +4 -3
  304. package/test/resources/accounts-acl/config/views/account/register.hbs +58 -0
  305. package/test/resources/accounts-acl/config/views/auth/consent.hbs +49 -0
  306. package/test/resources/accounts-acl/config/views/auth/goodbye.hbs +20 -0
  307. package/test/resources/accounts-acl/config/views/auth/login-required.hbs +0 -0
  308. package/test/resources/accounts-acl/config/views/auth/login.hbs +51 -0
  309. package/test/resources/accounts-acl/config/views/auth/no-permission.hbs +0 -0
  310. package/test/resources/accounts-acl/db/oidc/op/clients/_key_77bb3b35edb1f3f7b887c25d1211a491.json +1 -0
  311. package/test/resources/accounts-acl/db/oidc/op/provider.json +763 -0
  312. package/test/resources/accounts-acl/db/oidc/rp/clients/_key_https%3A%2F%2Flocalhost%3A7777.json +1 -0
  313. package/test/resources/accounts-acl/localhost/favicon.ico +0 -0
  314. package/test/resources/accounts-acl/localhost/index.html +35 -0
  315. package/{default-templates/server/.acl → test/resources/accounts-acl/localhost/index.html.acl} +4 -3
  316. package/test/resources/accounts-acl/nicola.localhost/index.html +1 -0
  317. package/test/resources/accounts-acl/nicola.localhost/index.html.acl +10 -0
  318. package/test/resources/accounts-acl/quota/settings/serverSide.ttl +11 -0
  319. package/test/resources/accounts-acl/tim.localhost/append-acl/abc.ttl +1 -0
  320. package/test/resources/accounts-acl/tim.localhost/append-acl/abc.ttl.acl +8 -0
  321. package/test/resources/accounts-acl/tim.localhost/append-acl/abc2.ttl +1 -0
  322. package/test/resources/accounts-acl/tim.localhost/append-acl/abc2.ttl.acl +8 -0
  323. package/test/resources/accounts-acl/tim.localhost/fake-account/hello.html +9 -0
  324. package/test/resources/accounts-acl/tim.localhost/group/test-folder/group-listing-error.ttl +1 -0
  325. package/test/resources/accounts-acl/tim.localhost/group/test-folder/group-listing.ttl +14 -0
  326. package/test/resources/accounts-acl/tim.localhost/group/test-folder/some-other-file.txt +1 -0
  327. package/test/resources/accounts-acl/tim.localhost/multi-server/protected.txt +1 -0
  328. package/test/resources/accounts-acl/tim.localhost/multi-server/protected.txt.acl +8 -0
  329. package/test/resources/accounts-acl/tim.localhost/no-acl/test-file.html +1 -0
  330. package/test/resources/accounts-acl/tim.localhost/read-acl/deeper-tree/acls-only-on-top/example.ttl +1 -0
  331. package/test/resources/accounts-acl/tim.localhost/write-acl/test-file$.txt +1 -0
  332. package/test/resources/accounts-scenario/alice/db/oidc/op/clients/_key_931f2a0c999a8f0695573844341dde0e.json +1 -0
  333. package/test/resources/accounts-scenario/alice/db/oidc/op/provider.json +761 -0
  334. package/test/resources/accounts-scenario/alice/db/oidc/rp/clients/_key_https%3A%2F%2Flocalhost%3A7000.json +1 -0
  335. package/test/resources/accounts-scenario/alice/private-for-alice.txt +1 -0
  336. package/test/resources/accounts-scenario/alice/private-for-alice.txt.acl +12 -0
  337. package/test/resources/accounts-scenario/alice/profile/card$.ttl +10 -0
  338. package/test/resources/accounts-scenario/bob/db/oidc/op/clients/_key_8bdd350afbe0452a42fe6b3b3705d25f.json +1 -0
  339. package/test/resources/accounts-scenario/bob/db/oidc/op/provider.json +761 -0
  340. package/test/resources/accounts-scenario/bob/db/oidc/rp/clients/_key_https%3A%2F%2Flocalhost%3A7001.json +1 -0
  341. package/test/resources/accounts-scenario/bob/profile/card$.ttl +5 -0
  342. package/test/resources/accounts-scenario/bob/shared-with-alice.txt +1 -0
  343. package/test/resources/accounts-scenario/bob/shared-with-alice.txt.acl +15 -0
  344. package/test/resources/accounts-scenario/charlie/db/oidc/op/clients/_key_e4ed74eed3926d2f8d4d1d9661be7aea.json +1 -0
  345. package/test/resources/accounts-scenario/charlie/db/oidc/op/provider.json +759 -0
  346. package/test/resources/accounts-scenario/charlie/db/oidc/rp/clients/_key_https%3A%2F%2Flocalhost%3A5002.json +1 -0
  347. package/test/resources/accounts-scenario/charlie/profile/card$.ttl +5 -0
  348. package/test/resources/accounts-strict-origin-off/alice/db/oidc/op/clients/_key_9d6b49e3a595c4942e1105545518362d.json +1 -0
  349. package/test/resources/accounts-strict-origin-off/alice/db/oidc/op/provider.json +763 -0
  350. package/test/resources/accounts-strict-origin-off/alice/db/oidc/rp/clients/_key_https%3A%2F%2Flocalhost%3A7010.json +1 -0
  351. package/test/resources/accounts-strict-origin-off/alice/private-for-alice.txt +1 -0
  352. package/test/resources/accounts-strict-origin-off/alice/private-for-alice.txt.acl +12 -0
  353. package/test/resources/accounts-strict-origin-off/alice/profile/card$.ttl +10 -0
  354. package/test/resources/accounts-strict-origin-off/bob/db/oidc/op/clients/_key_5f68117de7511ed2b2290d81c83a2d98.json +1 -0
  355. package/test/resources/accounts-strict-origin-off/bob/db/oidc/op/provider.json +763 -0
  356. package/test/resources/accounts-strict-origin-off/bob/db/oidc/rp/clients/_key_https%3A%2F%2Flocalhost%3A7011.json +1 -0
  357. package/test/resources/accounts-strict-origin-off/bob/shared-with-alice.txt +1 -0
  358. package/test/resources/accounts-strict-origin-off/bob/shared-with-alice.txt.acl +15 -0
  359. package/test/resources/acl-tls/config/templates/emails/delete-account.js +49 -0
  360. package/test/resources/acl-tls/config/templates/emails/invalid-username.js +30 -0
  361. package/test/resources/acl-tls/config/templates/emails/reset-password.js +49 -0
  362. package/test/resources/acl-tls/config/templates/emails/welcome.js +39 -0
  363. package/test/resources/acl-tls/config/templates/new-account/favicon.ico +0 -0
  364. package/test/resources/acl-tls/config/templates/new-account/favicon.ico.acl +26 -0
  365. package/test/resources/acl-tls/config/templates/new-account/profile/card$.ttl +26 -0
  366. package/test/resources/acl-tls/config/templates/new-account/robots.txt +3 -0
  367. package/test/resources/acl-tls/config/templates/new-account/robots.txt.acl +26 -0
  368. package/test/resources/acl-tls/config/templates/new-account/settings/prefs.ttl +15 -0
  369. package/test/resources/acl-tls/config/templates/new-account/settings/privateTypeIndex.ttl +4 -0
  370. package/test/resources/acl-tls/config/templates/new-account/settings/publicTypeIndex.ttl +4 -0
  371. package/test/resources/acl-tls/config/templates/new-account/settings/publicTypeIndex.ttl.acl +25 -0
  372. package/test/resources/acl-tls/config/templates/new-account/settings/serverSide.ttl.acl +13 -0
  373. package/test/resources/acl-tls/config/templates/new-account/settings/serverSide.ttl.inactive +12 -0
  374. package/test/resources/acl-tls/config/templates/server/favicon.ico +0 -0
  375. package/test/resources/acl-tls/config/templates/server/favicon.ico.acl +15 -0
  376. package/test/resources/acl-tls/config/templates/server/index.html +55 -0
  377. package/test/resources/acl-tls/config/templates/server/robots.txt +3 -0
  378. package/test/resources/acl-tls/config/templates/server/robots.txt.acl +15 -0
  379. package/test/resources/acl-tls/config/views/account/account-deleted.hbs +17 -0
  380. package/test/resources/acl-tls/config/views/account/delete-confirm.hbs +51 -0
  381. package/test/resources/acl-tls/config/views/account/delete-link-sent.hbs +17 -0
  382. package/test/resources/acl-tls/config/views/account/delete.hbs +51 -0
  383. package/test/resources/acl-tls/config/views/account/invalid-username.hbs +22 -0
  384. package/test/resources/acl-tls/config/views/account/register-disabled.hbs +6 -0
  385. package/test/resources/acl-tls/config/views/account/register-form.hbs +147 -0
  386. package/test/resources/acl-tls/config/views/account/register.hbs +24 -0
  387. package/test/resources/acl-tls/config/views/auth/auth-hidden-fields.hbs +8 -0
  388. package/test/resources/acl-tls/config/views/auth/change-password.hbs +58 -0
  389. package/test/resources/acl-tls/config/views/auth/goodbye.hbs +23 -0
  390. package/test/resources/acl-tls/config/views/auth/login-required.hbs +34 -0
  391. package/test/resources/acl-tls/config/views/auth/login-tls.hbs +11 -0
  392. package/test/resources/acl-tls/config/views/auth/login-username-password.hbs +28 -0
  393. package/test/resources/acl-tls/config/views/auth/login.hbs +55 -0
  394. package/test/resources/acl-tls/config/views/auth/no-permission.hbs +29 -0
  395. package/test/resources/acl-tls/config/views/auth/password-changed.hbs +27 -0
  396. package/test/resources/acl-tls/config/views/auth/reset-link-sent.hbs +21 -0
  397. package/test/resources/acl-tls/config/views/auth/reset-password.hbs +52 -0
  398. package/test/resources/acl-tls/config/views/auth/sharing.hbs +49 -0
  399. package/test/resources/acl-tls/config/views/shared/create-account.hbs +8 -0
  400. package/test/resources/acl-tls/config/views/shared/error.hbs +5 -0
  401. package/test/resources/acl-tls/localhost/favicon.ico +0 -0
  402. package/test/resources/acl-tls/localhost/favicon.ico.acl +15 -0
  403. package/test/resources/acl-tls/localhost/index.html +48 -0
  404. package/test/resources/acl-tls/localhost/robots.txt +3 -0
  405. package/test/resources/acl-tls/localhost/robots.txt.acl +15 -0
  406. package/test/resources/acl-tls/tim.localhost/append-acl/abc.ttl +1 -0
  407. package/test/resources/acl-tls/tim.localhost/append-acl/abc.ttl.acl +8 -0
  408. package/test/resources/acl-tls/tim.localhost/append-acl/abc2.ttl +1 -0
  409. package/test/resources/acl-tls/tim.localhost/append-acl/abc2.ttl.acl +8 -0
  410. package/test/resources/acl-tls/tim.localhost/fake-account/hello.html +9 -0
  411. package/test/resources/acl-tls/tim.localhost/no-acl/test-file.html +1 -0
  412. package/test/resources/acl-tls/tim.localhost/profile/card$.ttl +17 -0
  413. package/test/resources/acl-tls/write-acl/test-file$.ttl +1 -0
  414. package/test/resources/auth-proxy/index.html +0 -0
  415. package/test/resources/auth-proxy/index.html.acl +0 -0
  416. package/test/resources/config/templates/emails/delete-account.js +49 -0
  417. package/test/resources/config/templates/emails/delete-account.mjs +31 -0
  418. package/test/resources/config/templates/emails/invalid-username.js +30 -0
  419. package/test/resources/config/templates/emails/invalid-username.mjs +27 -0
  420. package/test/resources/config/templates/emails/reset-password.js +49 -0
  421. package/test/resources/config/templates/emails/reset-password.mjs +31 -0
  422. package/test/resources/config/templates/emails/welcome.js +39 -0
  423. package/test/resources/config/templates/emails/welcome.mjs +23 -0
  424. package/test/resources/config/templates/new-account/favicon.ico +0 -0
  425. package/test/resources/config/templates/new-account/favicon.ico.acl +26 -0
  426. package/test/resources/config/templates/new-account/profile/card$.ttl +26 -0
  427. package/test/resources/config/templates/new-account/robots.txt +3 -0
  428. package/test/resources/config/templates/new-account/robots.txt.acl +26 -0
  429. package/test/resources/config/templates/new-account/settings/prefs.ttl +15 -0
  430. package/test/resources/config/templates/new-account/settings/privateTypeIndex.ttl +4 -0
  431. package/test/resources/config/templates/new-account/settings/publicTypeIndex.ttl +4 -0
  432. package/test/resources/config/templates/new-account/settings/publicTypeIndex.ttl.acl +25 -0
  433. package/test/resources/config/templates/new-account/settings/serverSide.ttl.acl +13 -0
  434. package/test/resources/config/templates/new-account/settings/serverSide.ttl.inactive +12 -0
  435. package/test/resources/config/templates/server/favicon.ico +0 -0
  436. package/test/resources/config/templates/server/favicon.ico.acl +15 -0
  437. package/test/resources/config/templates/server/index.html +54 -0
  438. package/test/resources/config/templates/server/robots.txt +3 -0
  439. package/test/resources/config/templates/server/robots.txt.acl +15 -0
  440. package/test/resources/config/views/account/account-deleted.hbs +17 -0
  441. package/test/resources/config/views/account/delete-confirm.hbs +51 -0
  442. package/test/resources/config/views/account/delete-link-sent.hbs +17 -0
  443. package/test/resources/config/views/account/delete.hbs +51 -0
  444. package/test/resources/config/views/account/invalid-username.hbs +22 -0
  445. package/test/resources/config/views/account/register-disabled.hbs +6 -0
  446. package/test/resources/config/views/account/register-form.hbs +133 -0
  447. package/test/resources/config/views/account/register.hbs +24 -0
  448. package/test/resources/config/views/auth/auth-hidden-fields.hbs +8 -0
  449. package/test/resources/config/views/auth/change-password.hbs +58 -0
  450. package/test/resources/config/views/auth/goodbye.hbs +23 -0
  451. package/test/resources/config/views/auth/login-required.hbs +34 -0
  452. package/test/resources/config/views/auth/login-tls.hbs +11 -0
  453. package/test/resources/config/views/auth/login-username-password.hbs +28 -0
  454. package/test/resources/config/views/auth/login.hbs +55 -0
  455. package/test/resources/config/views/auth/no-permission.hbs +29 -0
  456. package/test/resources/config/views/auth/password-changed.hbs +27 -0
  457. package/test/resources/config/views/auth/reset-link-sent.hbs +21 -0
  458. package/test/resources/config/views/auth/reset-password.hbs +52 -0
  459. package/test/resources/config/views/auth/sharing.hbs +49 -0
  460. package/test/resources/config/views/shared/create-account.hbs +8 -0
  461. package/test/resources/config/views/shared/error.hbs +5 -0
  462. package/test/resources/empty.spatch +0 -0
  463. package/test/resources/errorPages/401.html +5 -0
  464. package/test/resources/errorPages/403.html +5 -0
  465. package/test/resources/errorPages/404.html +5 -0
  466. package/test/resources/errorPages/405.html +5 -0
  467. package/test/resources/errorPages/415.html +5 -0
  468. package/test/resources/errorPages/500.html +5 -0
  469. package/test/resources/example_spkac.cnf +1 -0
  470. package/test/resources/external-servers/example.com/jwks.json +81 -0
  471. package/test/resources/external-servers/example.com/openid-configuration.json +53 -0
  472. package/test/resources/favicon.ico +0 -0
  473. package/test/resources/favicon.ico.acl +15 -0
  474. package/test/resources/headers/index.html +0 -0
  475. package/test/resources/headers/public-ra +0 -0
  476. package/test/resources/headers/public-ra.acl +7 -0
  477. package/test/resources/headers/user-rw-public-r +0 -0
  478. package/test/resources/headers/user-rw-public-r.acl +12 -0
  479. package/test/resources/headers/user-rwac-public-0 +0 -0
  480. package/test/resources/headers/user-rwac-public-0.acl +7 -0
  481. package/test/resources/hello.html +3 -0
  482. package/test/resources/invalid1.ttl +13 -0
  483. package/test/resources/invalid2.ttl +9 -0
  484. package/test/resources/ldpatch-example-final.ttl +23 -0
  485. package/test/resources/ldpatch-example-initial.ttl +22 -0
  486. package/test/resources/ldpatch-example-patch-1.spatch +8 -0
  487. package/test/resources/ldpatch-example-patch-2.spatch +12 -0
  488. package/test/resources/ldpatch-example-patch-3.spatch +14 -0
  489. package/test/resources/ldpatch-example-patch.ldpatch +25 -0
  490. package/test/resources/ldpatch-example-patch.spatch +24 -0
  491. package/test/resources/lennon.jsonld +7 -0
  492. package/test/resources/lfs-0.sparql +9 -0
  493. package/test/resources/lfs-1-final.json +10 -0
  494. package/test/resources/lfs-1.sparql +11 -0
  495. package/test/resources/messaging-scenario/user1.databox.me/profile/card +21 -0
  496. package/test/resources/nicola.jpg +0 -0
  497. package/test/resources/patch/append-only.ttl +2 -0
  498. package/test/resources/patch/append-only.ttl.acl +6 -0
  499. package/test/resources/patch/favicon.ico +0 -0
  500. package/test/resources/patch/favicon.ico.acl +15 -0
  501. package/test/resources/patch/index.html +0 -0
  502. package/test/resources/patch/read-append.ttl +2 -0
  503. package/test/resources/patch/read-append.ttl.acl +6 -0
  504. package/test/resources/patch/read-only.ttl +2 -0
  505. package/test/resources/patch/read-only.ttl.acl +6 -0
  506. package/test/resources/patch/read-write.ttl +2 -0
  507. package/test/resources/patch/read-write.ttl.acl +6 -0
  508. package/test/resources/patch/robots.txt +3 -0
  509. package/test/resources/patch/robots.txt.acl +15 -0
  510. package/test/resources/patch/write-only.ttl +2 -0
  511. package/test/resources/patch/write-only.ttl.acl +6 -0
  512. package/test/resources/patch-1-initial.ttl +3 -0
  513. package/test/resources/patch-2-final.ttl +2 -0
  514. package/test/resources/patch-2-initial.ttl +3 -0
  515. package/test/resources/patch-2.spatch +2 -0
  516. package/test/resources/patch-2n.spatch +2 -0
  517. package/test/resources/patch-3-final.ttl +28 -0
  518. package/test/resources/patch-4-final.ttl +29 -0
  519. package/test/resources/patch-5-final.ttl +1 -0
  520. package/test/resources/patch-5-initial.ttl +3 -0
  521. package/test/resources/patch-5.spatch +2 -0
  522. package/test/resources/put-input-2.html +13 -0
  523. package/test/resources/put-input.txt +6 -0
  524. package/test/resources/robots.txt +3 -0
  525. package/test/resources/robots.txt.acl +15 -0
  526. package/test/resources/sampleContainer/blank +0 -0
  527. package/test/resources/sampleContainer/cert.pkcs +0 -0
  528. package/test/resources/sampleContainer/example.ttl.old +1 -0
  529. package/test/resources/sampleContainer/example1.ttl +12 -0
  530. package/test/resources/sampleContainer/example2.ttl +3 -0
  531. package/test/resources/sampleContainer/example3.ttl +7 -0
  532. package/test/resources/sampleContainer/example4$.ttl +7 -0
  533. package/test/resources/sampleContainer/filename with spaces.txt +0 -0
  534. package/test/resources/sampleContainer/index.html +9 -0
  535. package/test/resources/sampleContainer/post2.ttl +6 -0
  536. package/test/resources/sampleContainer/put1.ttl +13 -0
  537. package/test/resources/sampleContainer/solid.png +0 -0
  538. package/test/resources/sampleContainer/user1.pfx +0 -0
  539. package/test/resources/sampleContainer/user2.pfx +0 -0
  540. package/test/resources/sampleContainer2/example1.ttl +10 -0
  541. package/test/resources/sampleContainer2/example2.ttl +7 -0
  542. package/test/resources/timbl.jpg +0 -0
  543. package/test/scenarios.md +23 -0
  544. package/test/surface/docker/cookie/Dockerfile +6 -0
  545. package/test/surface/docker/cookie/app/index.js +29 -0
  546. package/test/surface/docker/cookie/app/package-lock.json +13 -0
  547. package/test/surface/docker/cookie/app/package.json +14 -0
  548. package/test/surface/docker/server/Dockerfile +19 -0
  549. package/test/surface/docker/server/config/defaults.js +10 -0
  550. package/test/surface/docker/server/config/templates/emails/delete-account.js +49 -0
  551. package/test/surface/docker/server/config/templates/emails/invalid-username.js +30 -0
  552. package/test/surface/docker/server/config/templates/emails/reset-password.js +49 -0
  553. package/test/surface/docker/server/config/templates/emails/welcome.js +39 -0
  554. package/test/surface/docker/server/config/templates/new-account/favicon.ico +0 -0
  555. package/test/surface/docker/server/config/templates/new-account/favicon.ico.acl +26 -0
  556. package/test/surface/docker/server/config/templates/new-account/profile/card$.ttl +26 -0
  557. package/test/surface/docker/server/config/templates/new-account/robots.txt +3 -0
  558. package/test/surface/docker/server/config/templates/new-account/robots.txt.acl +26 -0
  559. package/test/surface/docker/server/config/templates/new-account/settings/prefs.ttl +15 -0
  560. package/test/surface/docker/server/config/templates/new-account/settings/privateTypeIndex.ttl +4 -0
  561. package/test/surface/docker/server/config/templates/new-account/settings/publicTypeIndex.ttl +4 -0
  562. package/test/surface/docker/server/config/templates/new-account/settings/publicTypeIndex.ttl.acl +25 -0
  563. package/test/surface/docker/server/config/templates/new-account/settings/serverSide.ttl.acl +13 -0
  564. package/test/surface/docker/server/config/templates/new-account/settings/serverSide.ttl.inactive +12 -0
  565. package/test/surface/docker/server/config/templates/server/favicon.ico +0 -0
  566. package/test/surface/docker/server/config/templates/server/favicon.ico.acl +15 -0
  567. package/test/surface/docker/server/config/templates/server/index.html +55 -0
  568. package/test/surface/docker/server/config/templates/server/robots.txt +3 -0
  569. package/test/surface/docker/server/config/templates/server/robots.txt.acl +15 -0
  570. package/test/surface/docker/server/config/usernames-blacklist.json +4 -0
  571. package/test/surface/docker/server/config/views/account/account-deleted.hbs +17 -0
  572. package/test/surface/docker/server/config/views/account/delete-confirm.hbs +51 -0
  573. package/test/surface/docker/server/config/views/account/delete-link-sent.hbs +17 -0
  574. package/test/surface/docker/server/config/views/account/delete.hbs +51 -0
  575. package/test/surface/docker/server/config/views/account/invalid-username.hbs +22 -0
  576. package/test/surface/docker/server/config/views/account/register-disabled.hbs +6 -0
  577. package/test/surface/docker/server/config/views/account/register-form.hbs +147 -0
  578. package/test/surface/docker/server/config/views/account/register.hbs +24 -0
  579. package/test/surface/docker/server/config/views/auth/auth-hidden-fields.hbs +8 -0
  580. package/test/surface/docker/server/config/views/auth/change-password.hbs +58 -0
  581. package/test/surface/docker/server/config/views/auth/goodbye.hbs +23 -0
  582. package/test/surface/docker/server/config/views/auth/login-required.hbs +34 -0
  583. package/test/surface/docker/server/config/views/auth/login-tls.hbs +11 -0
  584. package/test/surface/docker/server/config/views/auth/login-username-password.hbs +28 -0
  585. package/test/surface/docker/server/config/views/auth/login.hbs +55 -0
  586. package/test/surface/docker/server/config/views/auth/no-permission.hbs +29 -0
  587. package/test/surface/docker/server/config/views/auth/password-changed.hbs +27 -0
  588. package/test/surface/docker/server/config/views/auth/reset-link-sent.hbs +21 -0
  589. package/test/surface/docker/server/config/views/auth/reset-password.hbs +52 -0
  590. package/test/surface/docker/server/config/views/auth/sharing.hbs +49 -0
  591. package/test/surface/docker/server/config/views/shared/create-account.hbs +8 -0
  592. package/test/surface/docker/server/config/views/shared/error.hbs +5 -0
  593. package/test/surface/docker/server/config.json +22 -0
  594. package/test/surface/docker/server/data/favicon.ico +0 -0
  595. package/test/surface/docker/server/data/favicon.ico.acl +26 -0
  596. package/test/surface/docker/server/data/index.html +48 -0
  597. package/test/surface/docker/server/data/profile/card$.ttl +31 -0
  598. package/test/surface/docker/server/data/robots.txt +3 -0
  599. package/test/surface/docker/server/data/robots.txt.acl +26 -0
  600. package/test/surface/docker/server/data/settings/prefs.ttl +15 -0
  601. package/test/surface/docker/server/data/settings/privateTypeIndex.ttl +4 -0
  602. package/test/surface/docker/server/data/settings/publicTypeIndex.ttl +4 -0
  603. package/test/surface/docker/server/data/settings/publicTypeIndex.ttl.acl +25 -0
  604. package/test/surface/docker/server/data/settings/serverSide.ttl +0 -0
  605. package/test/surface/docker/server/data/settings/serverSide.ttl.acl +13 -0
  606. package/test/surface/docker/server/data/settings/serverSide.ttl.inactive +12 -0
  607. package/test/surface/docker/server/env.list +4 -0
  608. package/test/surface/docker/solid-crud/Dockerfile +4 -0
  609. package/test/surface/docker/web-access-control/Dockerfile +1 -0
  610. package/test/surface/docker/webid-provider/Dockerfile +1 -0
  611. package/test/surface/run-solid-test-suite.sh +75 -0
  612. package/test/surface/server-env.list +5 -0
  613. package/test/surface/solid-crud-tests-env.list +5 -0
  614. package/test/surface/thirdparty-config.json +23 -0
  615. package/test/surface/thirdparty-env.list +6 -0
  616. package/test/surface/web-access-control-tests-env.list +6 -0
  617. package/test/surface/webid-provider-tests-env.list +4 -0
  618. package/test/test-helpers.mjs +63 -0
  619. package/test/unit/account-manager-test.mjs +610 -0
  620. package/test/unit/account-template-test.mjs +58 -0
  621. package/test/unit/acl-checker-test.mjs +51 -0
  622. package/test/unit/add-cert-request-test.mjs +119 -0
  623. package/test/unit/auth-handlers-test.mjs +108 -0
  624. package/test/unit/auth-proxy-test.mjs +224 -0
  625. package/test/unit/auth-request-test.mjs +96 -0
  626. package/test/unit/authenticator-test.mjs +34 -0
  627. package/test/unit/blacklist-service-test.mjs +49 -0
  628. package/test/unit/create-account-request-test.mjs +306 -0
  629. package/test/unit/delete-account-confirm-request-test.mjs +234 -0
  630. package/test/unit/delete-account-request-test.mjs +180 -0
  631. package/test/unit/email-service-test.mjs +165 -0
  632. package/test/unit/email-welcome-test.mjs +80 -0
  633. package/test/unit/error-pages-test.mjs +100 -0
  634. package/test/unit/esm-imports.test.mjs +148 -0
  635. package/test/unit/force-user-test.mjs +73 -0
  636. package/test/unit/getAvailableUrl-test.mjs +30 -0
  637. package/test/unit/getTrustedOrigins-test.mjs +20 -0
  638. package/test/unit/login-request-test.mjs +246 -0
  639. package/test/unit/oidc-manager-test.mjs +49 -0
  640. package/test/unit/password-authenticator-test.mjs +125 -0
  641. package/test/unit/password-change-request-test.mjs +259 -0
  642. package/test/unit/password-reset-email-request-test.mjs +234 -0
  643. package/test/unit/resource-mapper-test.mjs +673 -0
  644. package/test/unit/solid-host-test.mjs +118 -0
  645. package/test/unit/tls-authenticator-test.mjs +174 -0
  646. package/test/unit/token-service-test.mjs +82 -0
  647. package/test/unit/user-account-test.mjs +37 -0
  648. package/test/unit/user-accounts-api-test.mjs +59 -0
  649. package/test/unit/user-utils-test.mjs +64 -0
  650. package/test/unit/utils-test.mjs +112 -0
  651. package/test/utils/index.mjs +166 -0
  652. package/test/utils.mjs +204 -0
  653. package/test/validate-turtle.mjs +42 -0
  654. package/.github/workflows/ci.yml +0 -113
  655. package/.nvmrc +0 -1
  656. package/.snyk +0 -35
  657. package/bin/lib/cli-utils.js +0 -85
  658. package/bin/lib/cli.js +0 -39
  659. package/bin/solid.js +0 -3
  660. package/default-templates/new-account/.acl +0 -26
  661. package/default-templates/new-account/.meta +0 -5
  662. package/default-templates/new-account/.well-known/.acl +0 -19
  663. package/default-templates/new-account/private/.acl +0 -10
  664. package/default-templates/new-account/profile/.acl +0 -19
  665. package/default-templates/new-account/public/.acl +0 -19
  666. package/default-templates/new-account/settings/.acl +0 -20
  667. package/index.js +0 -3
  668. package/lib/api/authn/index.js +0 -5
  669. package/lib/api/index.js +0 -6
  670. package/lib/common/template-utils.js +0 -50
  671. package/lib/debug.js +0 -18
  672. package/lib/ldp-copy.js +0 -73
  673. package/lib/ldp-middleware.js +0 -40
  674. package/lib/models/account-manager.js +0 -604
  675. package/lib/models/account-template.js +0 -156
  676. package/lib/models/authenticator.js +0 -337
  677. package/lib/models/oidc-manager.js +0 -53
  678. package/lib/models/solid-host.js +0 -131
  679. package/lib/models/user-account.js +0 -113
  680. package/lib/models/webid-tls-certificate.js +0 -184
  681. package/lib/requests/add-cert-request.js +0 -138
  682. package/lib/requests/auth-request.js +0 -234
  683. package/lib/requests/delete-account-confirm-request.js +0 -170
  684. package/lib/requests/login-request.js +0 -205
  685. package/lib/services/email-service.js +0 -162
  686. package/lib/webid/tls/index.js +0 -185
@@ -0,0 +1,1047 @@
1
+ import { assert } from 'chai'
2
+ import fs from 'fs-extra'
3
+ import path from 'path'
4
+ import { fileURLToPath } from 'url'
5
+ import { loadProvider, rm, checkDnsSettings, cleanDir } from '../utils.mjs'
6
+ import IDToken from '@solid/oidc-op/src/IDToken.js'
7
+ // import { clearAclCache } from '../../lib/acl-checker.js'
8
+ import ldnode from '../../index.mjs'
9
+
10
+ const __filename = fileURLToPath(import.meta.url)
11
+ const __dirname = path.dirname(__filename)
12
+
13
+ // Helper to mimic request's callback API for get, put, post, head, patch
14
+ function fetchRequest (method, options, callback) {
15
+ // options: { url, headers, body, ... }
16
+ const fetchOptions = {
17
+ method: method.toUpperCase(),
18
+ headers: options.headers || {},
19
+ body: options.body
20
+ }
21
+ // For GET/HEAD, don't send body
22
+ if (['GET', 'HEAD'].includes(fetchOptions.method)) {
23
+ delete fetchOptions.body
24
+ }
25
+ fetch(options.url, fetchOptions)
26
+ .then(async res => {
27
+ let body = await res.text()
28
+ // Try to parse as JSON if content-type is json
29
+ if (res.headers.get('content-type') && res.headers.get('content-type').includes('json')) {
30
+ try { body = JSON.parse(body) } catch (e) {}
31
+ }
32
+ callback(null, {
33
+ statusCode: res.status,
34
+ headers: Object.fromEntries(res.headers.entries()),
35
+ body,
36
+ statusMessage: res.statusText
37
+ }, body)
38
+ })
39
+ .catch(err => callback(err))
40
+ }
41
+
42
+ function request (options, cb) {
43
+ // Allow string URL
44
+ if (typeof options === 'string') options = { url: options }
45
+ const method = (options.method || 'GET').toLowerCase()
46
+ return fetchRequest(method, options, cb)
47
+ }
48
+
49
+ request.get = (options, cb) => fetchRequest('get', options, cb)
50
+ request.put = (options, cb) => fetchRequest('put', options, cb)
51
+ request.post = (options, cb) => fetchRequest('post', options, cb)
52
+ request.head = (options, cb) => fetchRequest('head', options, cb)
53
+ request.patch = (options, cb) => fetchRequest('patch', options, cb)
54
+ request.delete = (options, cb) => fetchRequest('delete', options, cb)
55
+ request.del = request.delete
56
+
57
+ const port = 7777
58
+ const serverUri = 'https://localhost:7777'
59
+ const rootPath = path.normalize(path.join(__dirname, '../resources/accounts-acl'))
60
+ const dbPath = path.join(rootPath, 'db')
61
+ const oidcProviderPath = path.join(dbPath, 'oidc', 'op', 'provider.json')
62
+ const configPath = path.join(rootPath, 'config')
63
+
64
+ const user1 = 'https://tim.localhost:7777/profile/card#me'
65
+ const timAccountUri = 'https://tim.localhost:7777'
66
+ const user2 = 'https://nicola.localhost:7777/profile/card#me'
67
+
68
+ let oidcProvider
69
+
70
+ // To be initialized in the before() block
71
+ const userCredentials = {
72
+ // idp: https://localhost:7777
73
+ // web id: https://tim.localhost:7777/profile/card#me
74
+ user1: '',
75
+ // web id: https://nicola.localhost:7777/profile/card#me
76
+ user2: ''
77
+ }
78
+
79
+ function issueIdToken (oidcProvider, webId) {
80
+ return Promise.resolve().then(() => {
81
+ const jwt = IDToken.issue(oidcProvider, {
82
+ sub: webId,
83
+ aud: [serverUri, 'client123'],
84
+ azp: 'client123'
85
+ })
86
+
87
+ return jwt.encode()
88
+ })
89
+ }
90
+
91
+ const argv = {
92
+ root: rootPath,
93
+ serverUri,
94
+ dbPath,
95
+ port,
96
+ configPath,
97
+ sslKey: path.normalize(path.join(__dirname, '../keys/key.pem')),
98
+ sslCert: path.normalize(path.join(__dirname, '../keys/cert.pem')),
99
+ webid: true,
100
+ multiuser: true,
101
+ auth: 'oidc',
102
+ strictOrigin: true,
103
+ host: { serverUri }
104
+ }
105
+
106
+ // FIXME #1502
107
+ describe('ACL with WebID+OIDC over HTTP', function () {
108
+ let ldp, ldpHttpsServer
109
+
110
+ before(checkDnsSettings)
111
+
112
+ before(done => {
113
+ ldp = ldnode.createServer(argv)
114
+
115
+ loadProvider(oidcProviderPath).then(provider => {
116
+ oidcProvider = provider
117
+
118
+ return Promise.all([
119
+ issueIdToken(oidcProvider, user1),
120
+ issueIdToken(oidcProvider, user2)
121
+ ])
122
+ }).then(tokens => {
123
+ userCredentials.user1 = tokens[0]
124
+ userCredentials.user2 = tokens[1]
125
+ }).then(() => {
126
+ ldpHttpsServer = ldp.listen(port, done)
127
+ }).catch(console.error)
128
+ })
129
+
130
+ /* afterEach(() => {
131
+ clearAclCache()
132
+ }) */
133
+
134
+ after(() => {
135
+ if (ldpHttpsServer) ldpHttpsServer.close()
136
+ cleanDir(rootPath)
137
+ })
138
+
139
+ const origin1 = 'http://example.org/'
140
+ const origin2 = 'http://example.com/'
141
+
142
+ function createOptions (path, user, contentType = 'text/plain') {
143
+ const options = {
144
+ url: timAccountUri + path,
145
+ headers: {
146
+ accept: 'text/turtle',
147
+ 'content-type': contentType
148
+ }
149
+ }
150
+ if (user) {
151
+ const accessToken = userCredentials[user]
152
+ options.headers.Authorization = 'Bearer ' + accessToken
153
+ }
154
+
155
+ return options
156
+ }
157
+
158
+ describe('no ACL', function () {
159
+ it('Should return 500 since no ACL is a server misconfig', function (done) {
160
+ const options = createOptions('/no-acl/', 'user1')
161
+ request(options, function (error, response, body) {
162
+ assert.equal(error, null)
163
+ assert.equal(response.statusCode, 500)
164
+ done()
165
+ })
166
+ })
167
+ // it('should not have the `User` set in the Response Header', function (done) {
168
+ // var options = createOptions('/no-acl/', 'user1')
169
+ // request(options, function (error, response, body) {
170
+ // assert.equal(error, null)
171
+ // assert.notProperty(response.headers, 'user')
172
+ // done()
173
+ // })
174
+ // })
175
+ })
176
+
177
+ describe('empty .acl', function () {
178
+ describe('with no default in parent path', function () {
179
+ it('should give no access', function (done) {
180
+ const options = createOptions('/empty-acl/test-folder', 'user1')
181
+ options.body = ''
182
+ request.put(options, function (error, response, body) {
183
+ assert.equal(error, null)
184
+ assert.equal(response.statusCode, 403)
185
+ done()
186
+ })
187
+ })
188
+ it('user1 as solid:owner should let edit the .acl', function (done) {
189
+ const options = createOptions('/empty-acl/.acl', 'user1', 'text/turtle')
190
+ options.body = ''
191
+ request.put(options, function (error, response, body) {
192
+ assert.equal(error, null)
193
+ assert.equal(response.statusCode, 204)
194
+ done()
195
+ })
196
+ })
197
+ it('user1 as solid:owner should let read the .acl', function (done) {
198
+ const options = createOptions('/empty-acl/.acl', 'user1')
199
+ request.get(options, function (error, response, body) {
200
+ assert.equal(error, null)
201
+ assert.equal(response.statusCode, 200)
202
+ done()
203
+ })
204
+ })
205
+ it('user2 should not let edit the .acl', function (done) {
206
+ const options = createOptions('/empty-acl/.acl', 'user2', 'text/turtle')
207
+ options.body = ''
208
+ request.put(options, function (error, response, body) {
209
+ assert.equal(error, null)
210
+ assert.equal(response.statusCode, 403)
211
+ done()
212
+ })
213
+ })
214
+ it('user2 should not let read the .acl', function (done) {
215
+ const options = createOptions('/empty-acl/.acl', 'user2')
216
+ request.get(options, function (error, response, body) {
217
+ assert.equal(error, null)
218
+ assert.equal(response.statusCode, 403)
219
+ done()
220
+ })
221
+ })
222
+ })
223
+ describe('with default in parent path', function () {
224
+ before(function () {
225
+ rm('/accounts-acl/tim.localhost/write-acl/empty-acl/another-empty-folder/test-file.acl')
226
+ rm('/accounts-acl/tim.localhost/write-acl/empty-acl/test-folder/test-file')
227
+ rm('/accounts-acl/tim.localhost/write-acl/empty-acl/test-file')
228
+ rm('/accounts-acl/tim.localhost/write-acl/test-file')
229
+ rm('/accounts-acl/tim.localhost/write-acl/test-file.acl')
230
+ })
231
+
232
+ it('should fail to create a container', function (done) {
233
+ const options = createOptions('/write-acl/empty-acl/test-folder/', 'user1')
234
+ options.body = ''
235
+ request.put(options, function (error, response, body) {
236
+ assert.equal(error, null)
237
+ assert.equal(response.statusCode, 403) // TODO - why should this be a 409?
238
+ done()
239
+ })
240
+ })
241
+ it('should fail creation of new files', function (done) {
242
+ const options = createOptions('/write-acl/empty-acl/test-file', 'user1')
243
+ options.body = ''
244
+ request.put(options, function (error, response, body) {
245
+ assert.equal(error, null)
246
+ assert.equal(response.statusCode, 403)
247
+ done()
248
+ })
249
+ })
250
+ it('should fail creation of new files in deeper paths', function (done) {
251
+ const options = createOptions('/write-acl/empty-acl/test-folder/test-file', 'user1')
252
+ options.body = ''
253
+ request.put(options, function (error, response, body) {
254
+ assert.equal(error, null)
255
+ assert.equal(response.statusCode, 403)
256
+ done()
257
+ })
258
+ })
259
+ it('Should not create empty acl file', function (done) {
260
+ const options = createOptions('/write-acl/empty-acl/another-empty-folder/.acl', 'user1', 'text/turtle')
261
+ options.body = ''
262
+ request.put(options, function (error, response, body) {
263
+ assert.equal(error, null)
264
+ assert.equal(response.statusCode, 204) // 403) is this a must ?
265
+ done()
266
+ })
267
+ })
268
+ it('should return text/turtle for the acl file', function (done) {
269
+ const options = createOptions('/write-acl/.acl', 'user1')
270
+ request.get(options, function (error, response, body) {
271
+ assert.equal(error, null)
272
+ assert.equal(response.statusCode, 200)
273
+ assert.match(response.headers['content-type'], /text\/turtle/)
274
+ done()
275
+ })
276
+ })
277
+ it('should fail as acl:default is used to try to authorize', function (done) {
278
+ const options = createOptions('/write-acl/bad-acl-access/.acl', 'user1')
279
+ request.get(options, function (error, response, body) {
280
+ assert.equal(error, null)
281
+ assert.equal(response.statusCode, 200) // 403) is this a must ?
282
+ done()
283
+ })
284
+ })
285
+ it('should create test file', function (done) {
286
+ const options = createOptions('/write-acl/test-file', 'user1')
287
+ options.body = '<a> <b> <c> .'
288
+ request.put(options, function (error, response, body) {
289
+ assert.equal(error, null)
290
+ assert.equal(response.statusCode, 204)
291
+ done()
292
+ })
293
+ })
294
+ it('should create test file\'s acl file', function (done) {
295
+ const options = createOptions('/write-acl/test-file.acl', 'user1', 'text/turtle')
296
+ options.body = ''
297
+ request.put(options, function (error, response, body) {
298
+ assert.equal(error, null)
299
+ assert.equal(response.statusCode, 201)
300
+ done()
301
+ })
302
+ })
303
+ it('should not access test file\'s new empty acl file', function (done) {
304
+ const options = createOptions('/write-acl/test-file.acl', 'user1')
305
+ request.get(options, function (error, response, body) {
306
+ assert.equal(error, null)
307
+ assert.equal(response.statusCode, 200) // 403) is this a must ?
308
+ done()
309
+ })
310
+ })
311
+
312
+ after(function () {
313
+ rm('/accounts-acl/tim.localhost/write-acl/empty-acl/another-empty-folder/test-file.acl')
314
+ rm('/accounts-acl/tim.localhost/write-acl/empty-acl/test-folder/test-file')
315
+ rm('/accounts-acl/tim.localhost/write-acl/empty-acl/test-file')
316
+ rm('/accounts-acl/tim.localhost/write-acl/test-file')
317
+ rm('/accounts-acl/tim.localhost/write-acl/test-file.acl')
318
+ })
319
+ })
320
+ })
321
+
322
+ describe('no-control', function () {
323
+ it('user1 as owner should edit acl file', function (done) {
324
+ const options = createOptions('/no-control/.acl', 'user1', 'text/turtle')
325
+ options.body = '<#0>' +
326
+ '\n a <http://www.w3.org/ns/auth/acl#Authorization>;' +
327
+ '\n <http://www.w3.org/ns/auth/acl#default> <https://tim.localhost:7777/no-control/> ;' +
328
+ '\n <http://www.w3.org/ns/auth/acl#accessTo> <https://tim.localhost:7777/no-control/> ;' +
329
+ '\n <http://www.w3.org/ns/auth/acl#agent> <https://tim.localhost:7777/profile/card#me> ;' +
330
+ '\n <http://www.w3.org/ns/auth/acl#mode> <http://www.w3.org/ns/auth/acl#Read>.'
331
+ request.put(options, function (error, response, body) {
332
+ assert.equal(error, null)
333
+ assert.equal(response.statusCode, 204)
334
+ done()
335
+ })
336
+ })
337
+ it('user2 should not edit acl file', function (done) {
338
+ const options = createOptions('/no-control/.acl', 'user2', 'text/turtle')
339
+ options.body = '<#0>' +
340
+ '\n a <http://www.w3.org/ns/auth/acl#Authorization>;' +
341
+ '\n <http://www.w3.org/ns/auth/acl#default> <https://tim.localhost:7777/no-control/> ;' +
342
+ '\n <http://www.w3.org/ns/auth/acl#accessTo> <https://tim.localhost:7777/no-control/> ;' +
343
+ '\n <http://www.w3.org/ns/auth/acl#agent> <https://tim.localhost:7777/profile/card#me> ;' +
344
+ '\n <http://www.w3.org/ns/auth/acl#mode> <http://www.w3.org/ns/auth/acl#Read>.'
345
+ request.put(options, function (error, response, body) {
346
+ assert.equal(error, null)
347
+ assert.equal(response.statusCode, 403)
348
+ done()
349
+ })
350
+ })
351
+ })
352
+
353
+ describe('Origin', function () {
354
+ before(function () {
355
+ rm('/accounts-acl/tim.localhost/origin/test-folder/.acl')
356
+ })
357
+
358
+ it('should PUT new ACL file', function (done) {
359
+ const options = createOptions('/origin/test-folder/.acl', 'user1', 'text/turtle')
360
+ options.body = '<#Owner> a <http://www.w3.org/ns/auth/acl#Authorization>;\n' +
361
+ ' <http://www.w3.org/ns/auth/acl#accessTo> <https://localhost:3456/origin/test-folder/.acl>;\n' +
362
+ ' <http://www.w3.org/ns/auth/acl#agent> <' + user1 + '>;\n' +
363
+ ' <http://www.w3.org/ns/auth/acl#origin> <' + origin1 + '>;\n' +
364
+ ' <http://www.w3.org/ns/auth/acl#mode> <http://www.w3.org/ns/auth/acl#Read>, <http://www.w3.org/ns/auth/acl#Write>, <http://www.w3.org/ns/auth/acl#Control> .\n' +
365
+ '<#Public> a <http://www.w3.org/ns/auth/acl#Authorization>;\n' +
366
+ ' <http://www.w3.org/ns/auth/acl#accessTo> <./>;\n' +
367
+ ' <http://www.w3.org/ns/auth/acl#agentClass> <http://xmlns.com/foaf/0.1/Agent>;\n' +
368
+ ' <http://www.w3.org/ns/auth/acl#origin> <' + origin1 + '>;\n' +
369
+ ' <http://www.w3.org/ns/auth/acl#mode> <http://www.w3.org/ns/auth/acl#Read> .\n' +
370
+ '<#Somebody> a <http://www.w3.org/ns/auth/acl#Authorization>;\n' +
371
+ ' <http://www.w3.org/ns/auth/acl#accessTo> <./>;\n' +
372
+ ' <http://www.w3.org/ns/auth/acl#agent> <' + user2 + '>;\n' +
373
+ ' <http://www.w3.org/ns/auth/acl#default> <./>;\n' +
374
+ ' <http://www.w3.org/ns/auth/acl#origin> <' + origin1 + '>;\n' +
375
+ ' <http://www.w3.org/ns/auth/acl#mode> <http://www.w3.org/ns/auth/acl#Write> .\n'
376
+ request.put(options, function (error, response, body) {
377
+ assert.equal(error, null)
378
+ assert.equal(response.statusCode, 201)
379
+ done()
380
+ // TODO triple header
381
+ // TODO user header
382
+ })
383
+ })
384
+ it('user1 should be able to access test directory', function (done) {
385
+ const options = createOptions('/origin/test-folder/', 'user1')
386
+ options.headers.origin = origin1
387
+
388
+ request.head(options, function (error, response, body) {
389
+ assert.equal(error, null)
390
+ assert.equal(response.statusCode, 200)
391
+ done()
392
+ })
393
+ })
394
+ it('user2 should be able to access public test directory with wrong origin', function (done) {
395
+ const options = createOptions('/origin/test-folder/', 'user2')
396
+ options.headers.origin = origin2
397
+
398
+ request.head(options, function (error, response, body) {
399
+ assert.equal(error, null)
400
+ assert.equal(response.statusCode, 200)
401
+ done()
402
+ })
403
+ })
404
+ it('user1 should be able to access to test directory when origin is valid', function (done) {
405
+ const options = createOptions('/origin/test-folder/', 'user1')
406
+ options.headers.origin = origin1
407
+
408
+ request.head(options, function (error, response, body) {
409
+ assert.equal(error, null)
410
+ assert.equal(response.statusCode, 200)
411
+ done()
412
+ })
413
+ })
414
+ it('user1 should be able to access public test directory even when origin is invalid', function (done) {
415
+ const options = createOptions('/origin/test-folder/', 'user1')
416
+ options.headers.origin = origin2
417
+
418
+ request.head(options, function (error, response, body) {
419
+ assert.equal(error, null)
420
+ assert.equal(response.statusCode, 200)
421
+ done()
422
+ })
423
+ })
424
+ it('agent should be able to access test directory', function (done) {
425
+ const options = createOptions('/origin/test-folder/')
426
+ options.headers.origin = origin1
427
+
428
+ request.head(options, function (error, response, body) {
429
+ assert.equal(error, null)
430
+ assert.equal(response.statusCode, 200)
431
+ done()
432
+ })
433
+ })
434
+ it('agent should be able to access to test directory when origin is valid', function (done) {
435
+ const options = createOptions('/origin/test-folder/', 'user1')
436
+ options.headers.origin = origin1
437
+
438
+ request.head(options, function (error, response, body) {
439
+ assert.equal(error, null)
440
+ assert.equal(response.statusCode, 200)
441
+ done()
442
+ })
443
+ })
444
+ it('agent should be able to access public test directory even when origin is invalid', function (done) {
445
+ const options = createOptions('/origin/test-folder/')
446
+ options.headers.origin = origin2
447
+
448
+ request.head(options, function (error, response, body) {
449
+ assert.equal(error, null)
450
+ assert.equal(response.statusCode, 200)
451
+ done()
452
+ })
453
+ })
454
+ it('user2 should be able to write to test directory with correct origin', function (done) {
455
+ const options = createOptions('/origin/test-folder/test1.txt', 'user2', 'text/plain')
456
+ options.headers.origin = origin1
457
+ options.body = 'DAAAAAHUUUT'
458
+ request.put(options, function (error, response, body) {
459
+ assert.equal(error, null)
460
+ assert.equal(response.statusCode, 201)
461
+ done()
462
+ })
463
+ })
464
+ it('user2 should not be able to write to test directory with wrong origin', function (done) {
465
+ const options = createOptions('/origin/test-folder/test2.txt', 'user2', 'text/plain')
466
+ options.headers.origin = origin2
467
+ options.body = 'ARRRRGH'
468
+ request.put(options, function (error, response, body) {
469
+ assert.equal(error, null)
470
+ assert.equal(response.statusCode, 403)
471
+ assert.equal(response.statusMessage, 'Origin Unauthorized')
472
+ done()
473
+ })
474
+ })
475
+
476
+ after(function () {
477
+ rm('/accounts-acl/tim.localhost/origin/test-folder/.acl')
478
+ rm('/accounts-acl/tim.localhost/origin/test-folder/test1.txt')
479
+ rm('/accounts-acl/tim.localhost/origin/test-folder/test2.txt')
480
+ })
481
+ })
482
+
483
+ describe('Read-only', function () {
484
+ const body = fs.readFileSync(path.join(rootPath, 'tim.localhost/read-acl/.acl'))
485
+ it('user1 should be able to access ACL file', function (done) {
486
+ const options = createOptions('/read-acl/.acl', 'user1')
487
+ request.head(options, function (error, response, body) {
488
+ assert.equal(error, null)
489
+ assert.equal(response.statusCode, 200)
490
+ done()
491
+ })
492
+ })
493
+ it('user1 should be able to access test directory', function (done) {
494
+ const options = createOptions('/read-acl/', 'user1')
495
+ request.head(options, function (error, response, body) {
496
+ assert.equal(error, null)
497
+ assert.equal(response.statusCode, 200)
498
+ done()
499
+ })
500
+ })
501
+ it('user1 should be able to modify ACL file', function (done) {
502
+ const options = createOptions('/read-acl/.acl', 'user1', 'text/turtle')
503
+ options.body = body
504
+ request.put(options, function (error, response, body) {
505
+ assert.equal(error, null)
506
+ assert.equal(response.statusCode, 204)
507
+ done()
508
+ })
509
+ })
510
+ it('user2 should be able to access test directory', function (done) {
511
+ const options = createOptions('/read-acl/', 'user2')
512
+ request.head(options, function (error, response, body) {
513
+ assert.equal(error, null)
514
+ assert.equal(response.statusCode, 200)
515
+ done()
516
+ })
517
+ })
518
+ it('user2 should not be able to access ACL file', function (done) {
519
+ const options = createOptions('/read-acl/.acl', 'user2')
520
+ request.head(options, function (error, response, body) {
521
+ assert.equal(error, null)
522
+ assert.equal(response.statusCode, 403)
523
+ assert.equal(response.statusMessage, 'User Unauthorized')
524
+ done()
525
+ })
526
+ })
527
+ it('user2 should not be able to modify ACL file', function (done) {
528
+ const options = createOptions('/read-acl/.acl', 'user2', 'text/turtle')
529
+ options.body = '<d> <e> <f> .'
530
+ request.put(options, function (error, response, body) {
531
+ assert.equal(error, null)
532
+ assert.equal(response.statusCode, 403)
533
+ assert.equal(response.statusMessage, 'User Unauthorized')
534
+ done()
535
+ })
536
+ })
537
+ it('agent should be able to access test direcotory', function (done) {
538
+ const options = createOptions('/read-acl/')
539
+ request.head(options, function (error, response, body) {
540
+ assert.equal(error, null)
541
+ assert.equal(response.statusCode, 200)
542
+ done()
543
+ })
544
+ })
545
+ it('agent should not be able to modify ACL file', function (done) {
546
+ const options = createOptions('/read-acl/.acl', null, 'text/turtle')
547
+ options.body = '<d> <e> <f> .'
548
+ request.put(options, function (error, response, body) {
549
+ assert.equal(error, null)
550
+ assert.equal(response.statusCode, 401)
551
+ assert.equal(response.statusMessage, 'Unauthenticated')
552
+ done()
553
+ })
554
+ })
555
+ // Deep acl:accessTo inheritance is not supported yet #963
556
+ it.skip('user1 should be able to access deep test directory ACL', function (done) {
557
+ const options = createOptions('/read-acl/deeper-tree/.acl', 'user1')
558
+ request.head(options, function (error, response, body) {
559
+ assert.equal(error, null)
560
+ assert.equal(response.statusCode, 200)
561
+ done()
562
+ })
563
+ })
564
+ it.skip('user1 should not be able to access deep test dir', function (done) {
565
+ const options = createOptions('/read-acl/deeper-tree/', 'user1')
566
+ request.head(options, function (error, response, body) {
567
+ assert.equal(error, null)
568
+ assert.equal(response.statusCode, 403)
569
+ assert.equal(response.statusMessage, 'User Unauthorized')
570
+ done()
571
+ })
572
+ })
573
+ it.skip('user1 should able to access even deeper test directory', function (done) {
574
+ const options = createOptions('/read-acl/deeper-tree/acls-only-on-top/', 'user1')
575
+ request.head(options, function (error, response, body) {
576
+ assert.equal(error, null)
577
+ assert.equal(response.statusCode, 200)
578
+ done()
579
+ })
580
+ })
581
+ it.skip('user1 should able to access even deeper test file', function (done) {
582
+ const options = createOptions('/read-acl/deeper-tree/acls-only-on-top/example.ttl', 'user1')
583
+ request.head(options, function (error, response, body) {
584
+ assert.equal(error, null)
585
+ assert.equal(response.statusCode, 200)
586
+ done()
587
+ })
588
+ })
589
+ })
590
+
591
+ describe('Append-only', function () {
592
+ // var body = fs.readFileSync(__dirname + '/resources/append-acl/abc.ttl.acl')
593
+ it('user1 should be able to access test file\'s ACL file', function (done) {
594
+ const options = createOptions('/append-acl/abc.ttl.acl', 'user1')
595
+ request.head(options, function (error, response) {
596
+ assert.equal(error, null)
597
+ assert.equal(response.statusCode, 200)
598
+ done()
599
+ })
600
+ })
601
+ it('user1 should be able to PATCH a nonexistent resource (which CREATEs)', function (done) {
602
+ const options = createOptions('/append-inherited/test.ttl', 'user1')
603
+ options.body = 'INSERT DATA { :test :hello 456 .}'
604
+ options.headers['content-type'] = 'application/sparql-update'
605
+ request.patch(options, function (error, response, body) {
606
+ assert.equal(error, null)
607
+ assert.equal(response.statusCode, 201)
608
+ done()
609
+ })
610
+ })
611
+ it('user1 should be able to PATCH an existing resource', function (done) {
612
+ const options = createOptions('/append-inherited/test.ttl', 'user1')
613
+ options.body = 'INSERT DATA { :test :hello 789 .}'
614
+ options.headers['content-type'] = 'application/sparql-update'
615
+ request.patch(options, function (error, response, body) {
616
+ assert.equal(error, null)
617
+ assert.equal(response.statusCode, 200)
618
+ done()
619
+ })
620
+ })
621
+ it('user1 should be able to PUT to non existent resource (which CREATEs)', function (done) {
622
+ const options = createOptions('/append-inherited/test1.ttl', 'user1')
623
+ options.body = '<a> <b> <c> .\n'
624
+ options.headers['content-type'] = 'text/turtle'
625
+ request.put(options, function (error, response, body) {
626
+ assert.equal(error, null)
627
+ assert.equal(response.statusCode, 201)
628
+ done()
629
+ })
630
+ })
631
+ it('user2 should not be able to PUT with Append (existing resource)', function (done) {
632
+ const options = createOptions('/append-inherited/test1.ttl', 'user2')
633
+ options.body = '<a> <b> <c> .\n'
634
+ options.headers['content-type'] = 'text/turtle'
635
+ request.put(options, function (error, response, body) {
636
+ assert.equal(error, null)
637
+ assert.equal(response.statusCode, 403)
638
+ assert.include(response.statusMessage, 'User Unauthorized')
639
+ done()
640
+ })
641
+ })
642
+ it('user1 should be able to access test file', function (done) {
643
+ const options = createOptions('/append-acl/abc.ttl', 'user1')
644
+ request.head(options, function (error, response, body) {
645
+ assert.equal(error, null)
646
+ assert.equal(response.statusCode, 200)
647
+ done()
648
+ })
649
+ })
650
+ // TODO POST instead of PUT
651
+ it('user1 should be able to modify test file', function (done) {
652
+ const options = createOptions('/append-acl/abc.ttl', 'user1', 'text/turtle')
653
+ options.body = '<a> <b> <c> .\n'
654
+ request.put(options, function (error, response, body) {
655
+ assert.equal(error, null)
656
+ assert.equal(response.statusCode, 204)
657
+ done()
658
+ })
659
+ })
660
+ it('user2 should be able to PATCH INSERT to a nonexistent resource (which CREATEs)', function (done) {
661
+ const options = createOptions('/append-inherited/new.ttl', 'user2')
662
+ options.body = 'INSERT DATA { :test :hello 789 .}'
663
+ options.headers['content-type'] = 'application/sparql-update'
664
+ request.patch(options, function (error, response, body) {
665
+ assert.equal(error, null)
666
+ assert.equal(response.statusCode, 201)
667
+ done()
668
+ })
669
+ })
670
+ it('user2 should be able to PUT to a non existent resource (which CREATEs)', function (done) {
671
+ const options = createOptions('/append-inherited/new1.ttl', 'user1')
672
+ options.body = '<a> <b> <c> .\n'
673
+ options.headers['content-type'] = 'text/turtle'
674
+ request.put(options, function (error, response, body) {
675
+ assert.equal(error, null)
676
+ assert.equal(response.statusCode, 201)
677
+ done()
678
+ })
679
+ })
680
+ it('user2 should not be able to access test file\'s ACL file', function (done) {
681
+ const options = createOptions('/append-acl/abc.ttl.acl', 'user2', 'text/turtle')
682
+ request.head(options, function (error, response, body) {
683
+ assert.equal(error, null)
684
+ assert.equal(response.statusCode, 403)
685
+ assert.equal(response.statusMessage, 'User Unauthorized')
686
+ done()
687
+ })
688
+ })
689
+ it('user2 should not be able able to post an acl file', function (done) {
690
+ const options = createOptions('/append-acl/abc.ttl.acl', 'user2', 'text/turtle')
691
+ options.body = '<a> <b> <c> .\n'
692
+ request.put(options, function (error, response, body) {
693
+ assert.equal(error, null)
694
+ assert.equal(response.statusCode, 403)
695
+ assert.equal(response.statusMessage, 'User Unauthorized')
696
+ done()
697
+ })
698
+ })
699
+ it('user2 should not be able to access test file', function (done) {
700
+ const options = createOptions('/append-acl/abc.ttl', 'user2', 'text/turtle')
701
+ request.head(options, function (error, response, body) {
702
+ assert.equal(error, null)
703
+ assert.equal(response.statusCode, 403)
704
+ assert.equal(response.statusMessage, 'User Unauthorized')
705
+ done()
706
+ })
707
+ })
708
+ it('user2 (with append permission) cannot use PUT on an existing resource', function (done) {
709
+ const options = createOptions('/append-acl/abc.ttl', 'user2', 'text/turtle')
710
+ options.body = '<d> <e> <f> .\n'
711
+ request.put(options, function (error, response, body) {
712
+ assert.equal(error, null)
713
+ assert.equal(response.statusCode, 403)
714
+ assert.include(response.statusMessage, 'User Unauthorized')
715
+ done()
716
+ })
717
+ })
718
+ it('agent should not be able to access test file', function (done) {
719
+ const options = createOptions('/append-acl/abc.ttl')
720
+ request.head(options, function (error, response, body) {
721
+ assert.equal(error, null)
722
+ assert.equal(response.statusCode, 401)
723
+ assert.equal(response.statusMessage, 'Unauthenticated')
724
+ done()
725
+ })
726
+ })
727
+ it('agent (with append permissions) should not PUT', function (done) {
728
+ const options = createOptions('/append-acl/abc.ttl', null, 'text/turtle')
729
+ options.body = '<g> <h> <i> .\n'
730
+ request.put(options, function (error, response, body) {
731
+ assert.equal(error, null)
732
+ assert.equal(response.statusCode, 401)
733
+ assert.include(response.statusMessage, 'Unauthenticated')
734
+ done()
735
+ })
736
+ })
737
+ after(function () {
738
+ rm('/accounts-acl/tim.localhost/append-inherited/test.ttl')
739
+ rm('/accounts-acl/tim.localhost/append-inherited/test1.ttl')
740
+ rm('/accounts-acl/tim.localhost/append-inherited/new.ttl')
741
+ rm('/accounts-acl/tim.localhost/append-inherited/new1.ttl')
742
+ })
743
+ })
744
+
745
+ describe('Group', function () {
746
+ // before(function () {
747
+ // rm('/accounts-acl/tim.localhost/group/test-folder/.acl')
748
+ // })
749
+
750
+ // it('should PUT new ACL file', function (done) {
751
+ // var options = createOptions('/group/test-folder/.acl', 'user1')
752
+ // options.body = '<#Owner> a <http://www.w3.org/ns/auth/acl#Authorization>;\n' +
753
+ // ' <http://www.w3.org/ns/auth/acl#accessTo> <./.acl>;\n' +
754
+ // ' <http://www.w3.org/ns/auth/acl#agent> <' + user1 + '>;\n' +
755
+ // ' <http://www.w3.org/ns/auth/acl#mode> <http://www.w3.org/ns/auth/acl#Read>, <http://www.w3.org/ns/auth/acl#Write>, <http://www.w3.org/ns/auth/acl#Control> .\n' +
756
+ // '<#Public> a <http://www.w3.org/ns/auth/acl#Authorization>;\n' +
757
+ // ' <http://www.w3.org/ns/auth/acl#accessTo> <./>;\n' +
758
+ // ' <http://www.w3.org/ns/auth/acl#agentGroup> <group-listing#folks>;\n' +
759
+ // ' <http://www.w3.org/ns/auth/acl#mode> <http://www.w3.org/ns/auth/acl#Read> .\n'
760
+ // request.put(options, function (error, response, body) {
761
+ // assert.equal(error, null)
762
+ // assert.equal(response.statusCode, 201)
763
+ // done()
764
+ // })
765
+ // })
766
+ it('user1 should be able to access test directory', function (done) {
767
+ const options = createOptions('/group/test-folder/', 'user1')
768
+
769
+ request.head(options, function (error, response, body) {
770
+ assert.equal(error, null)
771
+ assert.equal(response.statusCode, 200)
772
+ done()
773
+ })
774
+ })
775
+ it('user2 should be able to access test directory', function (done) {
776
+ const options = createOptions('/group/test-folder/', 'user2')
777
+
778
+ request.head(options, function (error, response, body) {
779
+ assert.equal(error, null)
780
+ assert.equal(response.statusCode, 200)
781
+ done()
782
+ })
783
+ })
784
+ it('user2 should be able to write a file in the test directory', function (done) {
785
+ const options = createOptions('/group/test-folder/test.ttl', 'user2', 'text/turtle')
786
+ options.body = '<#Dahut> a <https://dbpedia.org/resource/Category:French_legendary_creatures>.\n'
787
+
788
+ request.put(options, function (error, response, body) {
789
+ assert.equal(error, null)
790
+ assert.equal(response.statusCode, 201)
791
+ done()
792
+ })
793
+ })
794
+
795
+ it('user1 should be able to get the file', function (done) {
796
+ const options = createOptions('/group/test-folder/test.ttl', 'user1', 'text/turtle')
797
+
798
+ request.get(options, function (error, response, body) {
799
+ assert.equal(error, null)
800
+ assert.equal(response.statusCode, 200)
801
+ done()
802
+ })
803
+ })
804
+ it('user2 should not be able to write to the ACL', function (done) {
805
+ const options = createOptions('/group/test-folder/.acl', 'user2', 'text/turtle')
806
+ options.body = '<#Dahut> a <https://dbpedia.org/resource/Category:French_legendary_creatures>.\n'
807
+
808
+ request.put(options, function (error, response, body) {
809
+ assert.equal(error, null)
810
+ assert.equal(response.statusCode, 403)
811
+ assert.equal(response.statusMessage, 'User Unauthorized')
812
+ done()
813
+ })
814
+ })
815
+
816
+ it('user1 should be able to delete the file', function (done) {
817
+ const options = createOptions('/group/test-folder/test.ttl', 'user1', 'text/turtle')
818
+
819
+ request.delete(options, function (error, response, body) {
820
+ assert.equal(error, null)
821
+ assert.equal(response.statusCode, 200) // Should be 204, right?
822
+ done()
823
+ })
824
+ })
825
+ it('We should have a 406 with invalid group listings', function (done) {
826
+ const options = createOptions('/group/test-folder/some-other-file.txt', 'user2')
827
+
828
+ request.get(options, function (error, response, body) {
829
+ assert.equal(error, null)
830
+ assert.equal(response.statusCode, 406)
831
+ done()
832
+ })
833
+ })
834
+ it('We should have a 404 for non-existent file', function (done) {
835
+ const options = createOptions('/group/test-folder/nothere.txt', 'user2')
836
+
837
+ request.get(options, function (error, response, body) {
838
+ assert.equal(error, null)
839
+ assert.equal(response.statusCode, 404)
840
+ done()
841
+ })
842
+ })
843
+ })
844
+
845
+ describe('Restricted', function () {
846
+ const body = '<#Owner> a <http://www.w3.org/ns/auth/acl#Authorization>;\n' +
847
+ ' <http://www.w3.org/ns/auth/acl#accessTo> <./abc2.ttl>;\n' +
848
+ ' <http://www.w3.org/ns/auth/acl#agent> <' + user1 + '>;\n' +
849
+ ' <http://www.w3.org/ns/auth/acl#mode> <http://www.w3.org/ns/auth/acl#Read>, <http://www.w3.org/ns/auth/acl#Write>, <http://www.w3.org/ns/auth/acl#Control> .\n' +
850
+ '<#Restricted> a <http://www.w3.org/ns/auth/acl#Authorization>;\n' +
851
+ ' <http://www.w3.org/ns/auth/acl#accessTo> <./abc2.ttl>;\n' +
852
+ ' <http://www.w3.org/ns/auth/acl#agent> <' + user2 + '>;\n' +
853
+ ' <http://www.w3.org/ns/auth/acl#mode> <http://www.w3.org/ns/auth/acl#Read>, <http://www.w3.org/ns/auth/acl#Write>.\n'
854
+ it('user1 should be able to modify test file\'s ACL file', function (done) {
855
+ const options = createOptions('/append-acl/abc2.ttl.acl', 'user1', 'text/turtle')
856
+ options.body = body
857
+ request.put(options, function (error, response, body) {
858
+ assert.equal(error, null)
859
+ assert.equal(response.statusCode, 204)
860
+ done()
861
+ })
862
+ })
863
+ it('user1 should be able to access test file\'s ACL file', function (done) {
864
+ const options = createOptions('/append-acl/abc2.ttl.acl', 'user1', 'text/turtle')
865
+ request.head(options, function (error, response, body) {
866
+ assert.equal(error, null)
867
+ assert.equal(response.statusCode, 200)
868
+ done()
869
+ })
870
+ })
871
+ it('user1 should be able to access test file', function (done) {
872
+ const options = createOptions('/append-acl/abc2.ttl', 'user1', 'text/turtle')
873
+ request.head(options, function (error, response, body) {
874
+ assert.equal(error, null)
875
+ assert.equal(response.statusCode, 200)
876
+ done()
877
+ })
878
+ })
879
+ it('user1 should be able to modify test file', function (done) {
880
+ const options = createOptions('/append-acl/abc2.ttl', 'user1', 'text/turtle')
881
+ options.body = '<a> <b> <c> .\n'
882
+ request.put(options, function (error, response, body) {
883
+ assert.equal(error, null)
884
+ assert.equal(response.statusCode, 204)
885
+ done()
886
+ })
887
+ })
888
+ it('user2 should be able to access test file', function (done) {
889
+ const options = createOptions('/append-acl/abc2.ttl', 'user2')
890
+ request.head(options, function (error, response, body) {
891
+ assert.equal(error, null)
892
+ assert.equal(response.statusCode, 200)
893
+ done()
894
+ })
895
+ })
896
+ it('user2 should not be able to access test file\'s ACL file', function (done) {
897
+ const options = createOptions('/append-acl/abc2.ttl.acl', 'user2')
898
+ request.head(options, function (error, response, body) {
899
+ assert.equal(error, null)
900
+ assert.equal(response.statusCode, 403)
901
+ assert.equal(response.statusMessage, 'User Unauthorized')
902
+ done()
903
+ })
904
+ })
905
+ it('user2 should be able to modify test file', function (done) {
906
+ const options = createOptions('/append-acl/abc2.ttl', 'user2', 'text/turtle')
907
+ options.body = '<d> <e> <f> .\n'
908
+ request.put(options, function (error, response, body) {
909
+ assert.equal(error, null)
910
+ assert.equal(response.statusCode, 204)
911
+ done()
912
+ })
913
+ })
914
+ it('agent should not be able to access test file', function (done) {
915
+ const options = createOptions('/append-acl/abc2.ttl')
916
+ request.head(options, function (error, response, body) {
917
+ assert.equal(error, null)
918
+ assert.equal(response.statusCode, 401)
919
+ assert.equal(response.statusMessage, 'Unauthenticated')
920
+ done()
921
+ })
922
+ })
923
+ it('agent should not be able to modify test file', function (done) {
924
+ const options = createOptions('/append-acl/abc2.ttl', null, 'text/turtle')
925
+ options.body = '<d> <e> <f> .\n'
926
+ request.put(options, function (error, response, body) {
927
+ assert.equal(error, null)
928
+ assert.equal(response.statusCode, 401)
929
+ assert.equal(response.statusMessage, 'Unauthenticated')
930
+ done()
931
+ })
932
+ })
933
+ })
934
+
935
+ describe('default', function () {
936
+ before(function () {
937
+ rm('/accounts-acl/tim.localhost/write-acl/default-for-new/.acl')
938
+ rm('/accounts-acl/tim.localhost/write-acl/default-for-new/test-file.ttl')
939
+ })
940
+
941
+ const body = '<#Owner> a <http://www.w3.org/ns/auth/acl#Authorization>;\n' +
942
+ ' <http://www.w3.org/ns/auth/acl#accessTo> <./>;\n' +
943
+ ' <http://www.w3.org/ns/auth/acl#agent> <' + user1 + '>;\n' +
944
+ ' <http://www.w3.org/ns/auth/acl#default> <./>;\n' +
945
+ ' <http://www.w3.org/ns/auth/acl#mode> <http://www.w3.org/ns/auth/acl#Read>, <http://www.w3.org/ns/auth/acl#Write>, <http://www.w3.org/ns/auth/acl#Control> .\n' +
946
+ '<#Default> a <http://www.w3.org/ns/auth/acl#Authorization>;\n' +
947
+ ' <http://www.w3.org/ns/auth/acl#accessTo> <./>;\n' +
948
+ ' <http://www.w3.org/ns/auth/acl#default> <./>;\n' +
949
+ ' <http://www.w3.org/ns/auth/acl#agentClass> <http://xmlns.com/foaf/0.1/Agent>;\n' +
950
+ ' <http://www.w3.org/ns/auth/acl#mode> <http://www.w3.org/ns/auth/acl#Read> .\n'
951
+ it('user1 should be able to modify test directory\'s ACL file', function (done) {
952
+ const options = createOptions('/write-acl/default-for-new/.acl', 'user1', 'text/turtle')
953
+ options.body = body
954
+ request.put(options, function (error, response, body) {
955
+ assert.equal(error, null)
956
+ assert.equal(response.statusCode, 201)
957
+ done()
958
+ })
959
+ })
960
+ it('user1 should be able to access test direcotory\'s ACL file', function (done) {
961
+ const options = createOptions('/write-acl/default-for-new/.acl', 'user1')
962
+ request.head(options, function (error, response, body) {
963
+ assert.equal(error, null)
964
+ assert.equal(response.statusCode, 200)
965
+ done()
966
+ })
967
+ })
968
+ it('user1 should be able to create new test file', function (done) {
969
+ const options = createOptions('/write-acl/default-for-new/test-file.ttl', 'user1', 'text/turtle')
970
+ options.body = '<a> <b> <c> .\n'
971
+ request.put(options, function (error, response, body) {
972
+ assert.equal(error, null)
973
+ assert.equal(response.statusCode, 201)
974
+ done()
975
+ })
976
+ })
977
+ it('user1 should be able to access new test file', function (done) {
978
+ const options = createOptions('/write-acl/default-for-new/test-file.ttl', 'user1')
979
+ request.head(options, function (error, response, body) {
980
+ assert.equal(error, null)
981
+ assert.equal(response.statusCode, 200)
982
+ done()
983
+ })
984
+ })
985
+ it('user2 should not be able to access test direcotory\'s ACL file', function (done) {
986
+ const options = createOptions('/write-acl/default-for-new/.acl', 'user2')
987
+ request.head(options, function (error, response, body) {
988
+ assert.equal(error, null)
989
+ assert.equal(response.statusCode, 403)
990
+ assert.equal(response.statusMessage, 'User Unauthorized')
991
+ done()
992
+ })
993
+ })
994
+ it('user2 should be able to access new test file', function (done) {
995
+ const options = createOptions('/write-acl/default-for-new/test-file.ttl', 'user2')
996
+ request.head(options, function (error, response, body) {
997
+ assert.equal(error, null)
998
+ assert.equal(response.statusCode, 200)
999
+ done()
1000
+ })
1001
+ })
1002
+ it('user2 should not be able to modify new test file', function (done) {
1003
+ const options = createOptions('/write-acl/default-for-new/test-file.ttl', 'user2', 'text/turtle')
1004
+ options.body = '<d> <e> <f> .\n'
1005
+ request.put(options, function (error, response, body) {
1006
+ assert.equal(error, null)
1007
+ assert.equal(response.statusCode, 403)
1008
+ assert.equal(response.statusMessage, 'User Unauthorized')
1009
+ done()
1010
+ })
1011
+ })
1012
+ it('agent should be able to access new test file', function (done) {
1013
+ const options = createOptions('/write-acl/default-for-new/test-file.ttl')
1014
+ request.head(options, function (error, response, body) {
1015
+ assert.equal(error, null)
1016
+ assert.equal(response.statusCode, 200)
1017
+ done()
1018
+ })
1019
+ })
1020
+ it('agent should not be able to modify new test file', function (done) {
1021
+ const options = createOptions('/write-acl/default-for-new/test-file.ttl', null, 'text/turtle')
1022
+ options.body = '<d> <e> <f> .\n'
1023
+ request.put(options, function (error, response, body) {
1024
+ assert.equal(error, null)
1025
+ assert.equal(response.statusCode, 401)
1026
+ assert.equal(response.statusMessage, 'Unauthenticated')
1027
+ done()
1028
+ })
1029
+ })
1030
+
1031
+ after(function () {
1032
+ rm('/accounts-acl/tim.localhost/write-acl/default-for-new/.acl')
1033
+ rm('/accounts-acl/tim.localhost/write-acl/default-for-new/test-file.ttl')
1034
+ })
1035
+ })
1036
+
1037
+ describe('Wrongly set accessTo', function () {
1038
+ it('user1 should be able to access test directory', function (done) {
1039
+ const options = createOptions('/dot-acl/', 'user1')
1040
+ request.head(options, function (error, response, body) {
1041
+ assert.equal(error, null)
1042
+ assert.equal(response.statusCode, 403)
1043
+ done()
1044
+ })
1045
+ })
1046
+ })
1047
+ })