Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/opatut/node-functional-acl
Functional ACLs (access control lists) without (!) predefined roles and users, but predicate functions instead.
https://github.com/opatut/node-functional-acl
Last synced: 15 days ago
JSON representation
Functional ACLs (access control lists) without (!) predefined roles and users, but predicate functions instead.
- Host: GitHub
- URL: https://github.com/opatut/node-functional-acl
- Owner: opatut
- Created: 2015-09-05T18:09:45.000Z (about 9 years ago)
- Default Branch: master
- Last Pushed: 2016-10-19T15:46:01.000Z (about 8 years ago)
- Last Synced: 2024-10-11T19:09:39.476Z (26 days ago)
- Language: JavaScript
- Size: 58.6 KB
- Stars: 2
- Watchers: 0
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- Changelog: CHANGELOG.md
Awesome Lists containing this project
README
# Functional Access Control Lists (node-functional-acl)
## About
From Wikipedia:
> An ACL specifies which users or system processes are granted access to
> objects, as well as what operations are allowed on given objects. Each entry
> in a typical ACL specifies a subject and an operation.Functional ACL are an implementation of this concept with functional
programming. It makes heavy use of [higher-order
functions](https://en.wikipedia.org/wiki/Higher-order_function) as
[predicates](https://en.wikipedia.org/wiki/Predicate_(mathematical_logic)) to
model user permissions.#### What it is not
* a role-based permission system (though it can model one)
* a database wrapper (you have to model that part on your own)## Installation
Get it as a node package from npm:
npm install functional-acl
Import it, and off you go!
## Terminology / Tutorial
#### Context
An object that describes the situation you are checking permissions for. This
usually contains one or more of:* the acting user (*user* / *subject*)
* the action to perform (*action* / *operation*)
* the target object (*target* / *object*)
* anything you need to identify whether or not to allow/deny the request#### Predicate
A function that checks whether the context (or part of it) matches a certain
condition. Returns true or false. Examples:* `admins = (context) => context.user.isAdmin`
* `guests = (context) => !context.user`
* `owner = (context) => context.user == context.target.owner`#### Rule
A function that returns one of `true` (allow), `false` (deny) or `null`
(proceed with next rule) for a context. These rules can be easily built from
predicates using the `allow(predicate)` and `deny(predicate)`
functions. If the predicate matches on the context, they return the appropriate
boolean value, and `null` otherwise.Multiple rules can be combined using the `combineRules(...rules)` function.
These are then tested in order, the first rule that matches decides the result
(`true` or `false`). If no rule matches, the combined rule returns `null`.## API
#### `not(predicate) => predicate`
Create a predicate that matches if the original predicate did not match.
#### `invert(rule) => rule`
Create a rule that allows if the original rule would deny, and vice versa. Does
not decide if the original rule wouldn't.#### `always() => true`
Predicate that always matches.
#### `never() => false`
Predicate that never matches.
#### `every(...predicates) => predicate`
Create a predicate that matches if all predicates match.
#### `some(...predicates) => predicate`
Create a predicate that matches if at least one of the predicates matches.
#### `none(...predicates) => predicate`
Create a predicate that matches if none of the predicates matches
#### `allow(predicate) => rule`
Create a rule that returns true if the predicate matches.
#### `deny(predicate) => rule`
Create a rule that returns false if the predicate matches.
#### `combineRules(...rules) => rule`
Create a rule that returns the result of the first matching rule, or null if
none matches#### `forceDecisionIf(predicate, rule, undecidedResult = false) => rule`
Create a rule that is triggered only if the predicate matches, and if the rule
does not decide, return the `undecidedResult`.#### `enforce(rule, context) => undefined`
Throws an `ACLRejectionError` if the `rule` rejects the `context`, or does not
decide on the `context` (i.e. returns `null`).Instead of a `try/catch` switch, you can manually check a rule simply by
calling it with a context (it is a function after all, hence this package's
name). This would look something like:const myRule = combineRules(...);
const myContext = { user: ..., operation: ..., foo: ... };if (!myRule(myContext)) {
console.warn('You are denied access.');
} else {
performSuperSecretStuff();
}## Complete example
import {combineRules, deny, allow} from '../src';
const admins = ({user}) => user && user.isAdmin;
const guests = ({user}) => !user;
const reading = ({operation}) => operation === 'read';
const writing = ({operation}) => operation === 'write';const restricted = combineRules(
deny(guests), // guests may not ever read
allow(admins), // admins may do everything
allow(reading), // everyone else may read
);// now you can check permissions simply by calling
const context = {user: myUser, operation: 'read'};
const allowed = restricted(context);// or enforce a permission (throw ACLRejectedError otherwise)
enforce(restricted, context);## Express middleware
There is a helper in `functional-acl/express` that creates a customized
middleware factory. Sounds complicated? It's not! Here we go:import aclExpress from 'functional-acl/express';
// our middleware factory is called 'applyAcl'
const applyACL = aclExpress({
deriveContext(req) { return { user: req.user; }},
createDirectContext(operation) { return { operation }},
});app.use(authMiddleware); // inject req.user
// check "myRule" with {user: req.user, operation: 'read'}
app.get('/', applyACL(myRule, 'read'), myRoute);You find a full working example in the *examples* directory.
The function `aclExpress` creates a middleware factory using the following options:
#### `deriveContext: (req, res, next) => context`
Used to derive a partial context from the request. This can for example be used
to supply the current user in the context. Make sure to plug in an
authorization middleware (such as *passport*) somewhere, so you can access the
user (e.g. `req.user`) here.#### `createDirectContext: (...args) => context`
Used to extract a partial context from the arguments passed into the resulting
middleware after the rule. In the example above, there is only one expected
argument after the rule, which is the `operation`. This is then merged into the
context at the key `operation`. You can see the value `'read'` being passed in
for the example route.#### `onDeny: (rule, context, req, res, next) => undefined`
Used by the default *applyRule* as an error handler. Defaults to throwing an
`ACLRejectionError`.#### `applyRule: (rule, directContext, extractedContext, req, res, next) => undefined`
*Advanced*: Overwrite how to apply the rule in the middleware.
By default, it builds a context from the direct and extracted partial contexts
(direct context overwrites extracted context) and applies the rule on it. If
that fails, `onDeny` is called.