50c0ec176c
* add scopes to service auth impl * add error to getServiceAuth * send scoped tokens from pds * clean up privileged access scopes & allow simple service auth tokens for app passwords * integration into ozone * fix up bsky tests * cleanup xrpc-server tests * fix up tests & types * one more test * fix read after write tests * fix mod auth test * convert scopes to be a single method name * add scope check callback for auth verifier * pds changes only * fix feed generation tests * use scope for ozone service profile * dont verify scopes on pds yet * tidy * tidy imports * changeset * add tests * tidy * another changeset * scope -> lxm * tidy * clean up scope references * update nonce size * pr feedback * trim trailing slash * nonce -> jti * fix xrpc-server test * allow service auth on uploadBlob * fix build error * changeset * build, tidy * xrpc-server: update lxm claim check error * appview: temporarily permit labeler service calls to omit lxm claim * xrpc-server: fix test * changeset * fix merged tests --------- Co-authored-by: Devin Ivy <devinivy@gmail.com>
176 lines
4.9 KiB
TypeScript
176 lines
4.9 KiB
TypeScript
import { AtpAgent } from '@atproto/api'
|
|
import { TestNetworkNoAppView, SeedClient } from '@atproto/dev-env'
|
|
import { Keypair, Secp256k1Keypair } from '@atproto/crypto'
|
|
import { createServiceAuthHeaders } from '@atproto/xrpc-server'
|
|
import * as plc from '@did-plc/lib'
|
|
import usersSeed from './seeds/users'
|
|
import { RepoRef } from '../src/lexicon/types/com/atproto/admin/defs'
|
|
import { ids } from '../src/lexicon/lexicons'
|
|
|
|
describe('moderator auth', () => {
|
|
let network: TestNetworkNoAppView
|
|
let agent: AtpAgent
|
|
let sc: SeedClient
|
|
|
|
let repoSubject: RepoRef
|
|
|
|
let modServiceDid: string
|
|
let altModDid: string
|
|
let modServiceKey: Secp256k1Keypair
|
|
let pdsDid: string
|
|
|
|
const opAndDid = async (handle: string, key: Keypair) => {
|
|
const op = await plc.signOperation(
|
|
{
|
|
type: 'plc_operation',
|
|
alsoKnownAs: [handle],
|
|
verificationMethods: {
|
|
atproto: key.did(),
|
|
},
|
|
rotationKeys: [key.did()],
|
|
services: {},
|
|
prev: null,
|
|
},
|
|
key,
|
|
)
|
|
const did = await plc.didForCreateOp(op)
|
|
return { op, did }
|
|
}
|
|
|
|
beforeAll(async () => {
|
|
// kinda goofy but we need to know the dids before creating the testnet for the PDS's config
|
|
modServiceKey = await Secp256k1Keypair.create()
|
|
const modServiceInfo = await opAndDid('mod.test', modServiceKey)
|
|
const altModInfo = await opAndDid('alt-mod.test', modServiceKey)
|
|
modServiceDid = modServiceInfo.did
|
|
altModDid = altModInfo.did
|
|
|
|
network = await TestNetworkNoAppView.create({
|
|
dbPostgresSchema: 'pds_moderator_auth',
|
|
pds: {
|
|
modServiceDid: modServiceInfo.did,
|
|
modServiceUrl: 'https://mod.invalid',
|
|
},
|
|
})
|
|
|
|
pdsDid = network.pds.ctx.cfg.service.did
|
|
|
|
const plcClient = network.plc.getClient()
|
|
await plcClient.sendOperation(modServiceInfo.did, modServiceInfo.op)
|
|
await plcClient.sendOperation(altModInfo.did, altModInfo.op)
|
|
|
|
agent = network.pds.getClient()
|
|
sc = network.getSeedClient()
|
|
await usersSeed(sc)
|
|
await network.processAll()
|
|
repoSubject = {
|
|
$type: 'com.atproto.admin.defs#repoRef',
|
|
did: sc.dids.bob,
|
|
}
|
|
})
|
|
|
|
afterAll(async () => {
|
|
await network.close()
|
|
})
|
|
|
|
it('allows service auth requests from the configured appview did', async () => {
|
|
const updateHeaders = await createServiceAuthHeaders({
|
|
iss: modServiceDid,
|
|
aud: pdsDid,
|
|
lxm: ids.ComAtprotoAdminUpdateSubjectStatus,
|
|
keypair: modServiceKey,
|
|
})
|
|
await agent.api.com.atproto.admin.updateSubjectStatus(
|
|
{
|
|
subject: repoSubject,
|
|
takedown: { applied: true, ref: 'test-repo' },
|
|
},
|
|
{
|
|
...updateHeaders,
|
|
encoding: 'application/json',
|
|
},
|
|
)
|
|
|
|
const getHeaders = await createServiceAuthHeaders({
|
|
iss: modServiceDid,
|
|
aud: pdsDid,
|
|
lxm: ids.ComAtprotoAdminGetSubjectStatus,
|
|
keypair: modServiceKey,
|
|
})
|
|
const res = await agent.api.com.atproto.admin.getSubjectStatus(
|
|
{
|
|
did: repoSubject.did,
|
|
},
|
|
getHeaders,
|
|
)
|
|
expect(res.data.subject.did).toBe(repoSubject.did)
|
|
expect(res.data.takedown?.applied).toBe(true)
|
|
})
|
|
|
|
it('does not allow requests from another did', async () => {
|
|
const headers = await createServiceAuthHeaders({
|
|
iss: altModDid,
|
|
aud: pdsDid,
|
|
lxm: ids.ComAtprotoAdminUpdateSubjectStatus,
|
|
keypair: modServiceKey,
|
|
})
|
|
const attempt = agent.api.com.atproto.admin.updateSubjectStatus(
|
|
{
|
|
subject: repoSubject,
|
|
takedown: { applied: true, ref: 'test-repo' },
|
|
},
|
|
{
|
|
...headers,
|
|
encoding: 'application/json',
|
|
},
|
|
)
|
|
await expect(attempt).rejects.toThrow('Untrusted issuer')
|
|
})
|
|
|
|
it('does not allow requests with a bad signature', async () => {
|
|
const badKey = await Secp256k1Keypair.create()
|
|
const headers = await createServiceAuthHeaders({
|
|
iss: modServiceDid,
|
|
aud: pdsDid,
|
|
lxm: ids.ComAtprotoAdminUpdateSubjectStatus,
|
|
keypair: badKey,
|
|
})
|
|
const attempt = agent.api.com.atproto.admin.updateSubjectStatus(
|
|
{
|
|
subject: repoSubject,
|
|
takedown: { applied: true, ref: 'test-repo' },
|
|
},
|
|
{
|
|
...headers,
|
|
encoding: 'application/json',
|
|
},
|
|
)
|
|
await expect(attempt).rejects.toThrow(
|
|
'jwt signature does not match jwt issuer',
|
|
)
|
|
})
|
|
|
|
it('does not allow requests with a bad aud', async () => {
|
|
// repo subject is bob, so we set alice as the audience
|
|
const headers = await createServiceAuthHeaders({
|
|
iss: modServiceDid,
|
|
aud: sc.dids.alice,
|
|
lxm: ids.ComAtprotoAdminUpdateSubjectStatus,
|
|
keypair: modServiceKey,
|
|
})
|
|
const attempt = agent.api.com.atproto.admin.updateSubjectStatus(
|
|
{
|
|
subject: repoSubject,
|
|
takedown: { applied: true, ref: 'test-repo' },
|
|
},
|
|
{
|
|
...headers,
|
|
encoding: 'application/json',
|
|
},
|
|
)
|
|
await expect(attempt).rejects.toThrow(
|
|
'jwt audience does not match service did',
|
|
)
|
|
})
|
|
})
|