Ecosyste.ms: Awesome

An open API service indexing awesome lists of open source software.

Awesome Lists | Featured Topics | Projects

https://github.com/philmander/a-seal

Access Control List library for Node.JS
https://github.com/philmander/a-seal

acl authorization expressjs middleware nodejs

Last synced: 2 months ago
JSON representation

Access Control List library for Node.JS

Awesome Lists containing this project

README

        

# A Seal

Access Control List (ACL) library for Node.JS

## Install
```
npm install a-seal
```

## Usage

Setting up an access control list consists of creating a list of rules. Each rule is composed with the process:

* **match** a resource **for** action(s) then **allow** role(s).

The **isAllowed()** function can then by used to check if a user, given their role, is authorized to access a resource.
A Seal creates a white-list of rules, so *isAllowed()* will return `false`, unless an exception has been created.

```javascript

// Get the acl instance
import acl from './index.js'

// Compose rules of a 'resource', 'actions' and 'roles' using...
// `match`, `for` and `allow` respectively:
acl.match(/^\/protected-path$/).for(['GET', 'POST']).allow(['admin']);

// Optionally label the rule with a "scope" using an `as` clause
acl.match(/^\/protected-path/).for(['GET', 'POST']).allow(['admin']).as('PROTECTED_WRITE');

//use `isAllowed(role, resource, action)`...
//to determine if a request is allowed to access the resource with a given action:
acl.isAllowed('admin', '/protected-path', 'POST') //true
acl.isAllowed('user', '/protected-path', 'POST') //false

//A Seal creates a white-list of rules, so:
acl.isAllowed('admin', '/protected-path', 'DELETE') //false
```

Although the examples on this page use HTTP, there is nothing HTTP specific about *A Seal*.

### Middleware

A Seal can be used as [Express](http://expressjs.com/) middleware to authorize requests after
authentication with tools such as [Passport](http://passportjs.org/):

```javascript
//authentication with Passport
app.use(passport.authenticate('local'));

const acl = require('a-seal')();
acl.match('/protected-path').for('GET').allow('user');
acl.match('/protected-path').for('GET', 'POST').allow('admin').as('PROTECTED_WRITE');

app.use(acl.middleware());

app.use('/protected-path', (req, res, next) => {
// the matched rule's "scope" label will be added to the request
res.send(`

Authorized ok with scope: ${req.scope}

`);
});

app.use((err, req, res) => {
if(err.status === 403) {
res.send('

Authorization failed

');
}
});
```

## API

### match(resource)

Begins a matching context given a resource to match.

Returns: `object` (matchingContext)

#### Params
##### resource

Type: `RegExp`

#### Examples:

```javascript
acl.match(/^\/my-path/) //match with regex (starting with /my-path)
```

### matchingContext.for(actions)

Returns: object (matchingContext)

Completes a matching context by adding one or more actions. When authorizing HTTP requests, for example, actions will
typically be HTTP methods.

Returns `object` (matchingContext)

#### Params
##### actions

Type: `Array`

A list of permitted actions as an array of strings.

#### Examples

```javascript
acl.match('/my-path').for(['GET', 'POST']);

//match any action
acl.match('/my-path').for([ANY]);
```

### matchingContext.allow(roles)

Adds a new ACL rule by adding one or more roles to a matching context.

Returns: `object` (rule)

#### Params
##### roles

Type: `Array`

A list of permitted roles as an array of strings or a list of strings as arguments.

#### Examples

```javascript
acl.match('/my-path').for(['GET']).allow([ 'user', 'anon' ]);

//match any role
acl.match('/public').for(['GET']).allow(ANY);
```

### rule.as(scope)

Labels this rule with a custom "scope"

#### Params

##### scope

Type: `string`

#### Examples

```javascript
acl.match('/my-path').for(['POST']).allow(['user']).as('user_create');
```

### isAllowed(role, resource, action)

Determines if a given role is authorized to access a given resource with a given action.

#### Params
##### role

Type: `string`

##### resource

Type: `string`

##### action

Type: `string`

#### Examples:

```javascript
acl.isAllowed('admin', '/my-path', 'GET');
```

### middleware(opts)

Returns an Express middleware function that accepts `req`, `res` and `next` arguments.

The role is checked against the ACL ruleset using the `isAllowed` function. If it returns `false`, it creates a 403
error; if true the routing chain is allowed to continue.

If `req.role` is not defined, and a custom anonymous role is not provided, the role value will default to `guest`.

#### Params
##### opts.anon

Type: `string`

The default role for users (anonymous users). This defaults to `'guest'`.

```javascript
app.use(acl.middleware({ anon: 'anonymous'});
```

## License

MIT © Phil Mander