
Security News
Insecure Agents Podcast: Certified Patches, Supply Chain Security, and AI Agents
Socket CEO Feross Aboukhadijeh joins Insecure Agents to discuss CVE remediation and why supply chain attacks require a different security approach.
@trigo/atrix-acl
Advanced tools
Atrix plugin providing Access Control Lists to requests to specific routes.
Sample Configuration:
acl: {
aclDefinition: path.join(__dirname, './acls'),
allowInject: true,
tokenResourceAccessRoleKey: 'pathfinder-app',
endpoints: [
'^(?!(/alive|/reset))',
],
}
Example:
{ role: 'admin', path: '/*a', method: '*' }
Allow user with role admin to access all paths with all methods
{ role: 'editor1', path: '/pets/:petId', method: 'put' }
Allow user with role editor1 access to path /pets/:petId with PUT method
{ userId: '242', path: '/pets/123', method: 'get' }
Allow user with userId 242 access to specific resource path /pets/123 with GET method
{ userId: '242', transition: 'cancel:speaker', method: '*' }
Allow user with userId 242 to perform transition 'cancel:speaker'
{ userId: '242', transition: 'cancel:(*_)', method: '*' }
Allow user with userId 242 to perform any transition starting with 'cancel:'
The AtrixACL uses route-parser npm package, to test incoming paths against the defined routes (similar to Hapi route definition).
The user role is extracted from the JWToken via the authorization header. The AtrixACL plugin assumes the following format of a token:
credentials: {
preferred_username: "john.doe",
email: "john.doe@test.com",
name: "John Doe",
resource_access: {
voegb: { roles: ['admin'] },
ak: { roles: ['admin'] },
'pathfinder-app': { roles: ['super-admin'] },
}
}
Given a configuration with the tokenResourceAccessRoleKey set to pathfinder-app, the AtrixACL uses this value as the default-role for the user (in the example above: 'super-admin')
If a x-pathfinder-tenant-ids header field is present, all the corresponding (tenant-specific) roles are extracted from the token and also tested agains the ACLs.
The AtrixACL plugin hooks into two handlers of the hapi request-lifecycle:
The plugins checks if the current user/role has access to the requested route. If not, it returns status-code 401. The options allowInject and endpoints are taken into consideration.
The plugins checks if a _links object is present in the response (or, if response-body is an array, in every item of the array) and manipulates the response-body. If present, every link/href in the hatr-links object is tested agains the ACLs and set to false, if the user/role has no access to a specific action/transition.
FAQs
ACL for atrix http endpoints
The npm package @trigo/atrix-acl receives a total of 0 weekly downloads. As such, @trigo/atrix-acl popularity was classified as not popular.
We found that @trigo/atrix-acl demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 3 open source maintainers collaborating on the project.
Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Security News
Socket CEO Feross Aboukhadijeh joins Insecure Agents to discuss CVE remediation and why supply chain attacks require a different security approach.

Security News
Tailwind Labs laid off 75% of its engineering team after revenue dropped 80%, as LLMs redirect traffic away from documentation where developers discover paid products.

Security News
The planned feature introduces a review step before releases go live, following the Shai-Hulud attacks and a rocky migration off classic tokens that disrupted maintainer workflows.