
Product
Introducing the Alert Details Page: A Better Way to Explore Alerts
Socket's new Alert Details page is designed to surface more context, with a clearer layout, reachability dependency chains, and structured review.
@trigo/atrix-acl
Advanced tools
Atrix plugin providing Access Control Lists to requests to specific routes.
Sample Configuration:
acl: {
aclDefinition: path.join(__dirname, './acls'),
allowInject: true,
tokenResourceAccessRoleKey: 'pathfinder-app',
endpoints: [
'^(?!(/alive|/reset))',
],
}
Example:
{ role: 'admin', path: '/*a', method: '*' }
Allow user with role admin to access all paths with all methods
{ role: 'editor1', path: '/pets/:petId', method: 'put' }
Allow user with role editor1 access to path /pets/:petId with PUT method
{ userId: '242', path: '/pets/123', method: 'get' }
Allow user with userId 242 access to specific resource path /pets/123 with GET method
{ userId: '242', transition: 'cancel:speaker', method: '*' }
Allow user with userId 242 to perform transition 'cancel:speaker'
{ userId: '242', transition: 'cancel:(*_)', method: '*' }
Allow user with userId 242 to perform any transition starting with 'cancel:'
The AtrixACL uses route-parser npm package, to test incoming paths against the defined routes (similar to Hapi route definition).
The user role is extracted from the JWToken via the authorization header. The AtrixACL plugin assumes the following format of a token:
credentials: {
preferred_username: "john.doe",
email: "john.doe@test.com",
name: "John Doe",
resource_access: {
voegb: { roles: ['admin'] },
ak: { roles: ['admin'] },
'pathfinder-app': { roles: ['super-admin'] },
}
}
Given a configuration with the tokenResourceAccessRoleKey set to pathfinder-app, the AtrixACL uses this value as the default-role for the user (in the example above: 'super-admin')
If a x-pathfinder-tenant-ids header field is present, all the corresponding (tenant-specific) roles are extracted from the token and also tested agains the ACLs.
The AtrixACL plugin hooks into two handlers of the hapi request-lifecycle:
The plugins checks if the current user/role has access to the requested route. If not, it returns status-code 401. The options allowInject and endpoints are taken into consideration.
The plugins checks if a _links object is present in the response (or, if response-body is an array, in every item of the array) and manipulates the response-body. If present, every link/href in the hatr-links object is tested agains the ACLs and set to false, if the user/role has no access to a specific action/transition.
FAQs
ACL for atrix http endpoints
We found that @trigo/atrix-acl demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 3 open source maintainers collaborating on the project.
Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Product
Socket's new Alert Details page is designed to surface more context, with a clearer layout, reachability dependency chains, and structured review.

Product
Campaign-level threat intelligence in Socket now shows when active supply chain attacks affect your repositories and packages.

Research
Malicious PyPI package sympy-dev targets SymPy users, a Python symbolic math library with 85 million monthly downloads.