Research
Security News
Threat Actor Exposes Playbook for Exploiting npm to Build Blockchain-Powered Botnets
A threat actor's playbook for exploiting the npm ecosystem was exposed on the dark web, detailing how to build a blockchain-powered botnet.
@urbaninfrastructure/api-auth-sdk
Advanced tools
@urbaninfrastructure/api-auth-sdk
> TODO: description
Import from /nestjs submodule in nestjs project, and from /express in others.
In frontend/web projects pure functions and interfaces can be imported from root module.
import { AuthorizedResource, AuthorizedAction } from '@urbaninfrastructure/api-auth-sdk/nestjs'
// Decorate a controller, preferably using typed enums
@AuthorizedResource('fleet', 'vehicle')
@Controller()
class Controller {
@Get('/edit')
// Decorate a function with the allowed action
@AuthorizedAction('update')
async editResource() { ... }
@Get('/other/edit')
// Nested resource, first argument is nested resource, second is action
@AuthorizedAction('other', 'update')
async editOtherResource() { ... }
}
import { Authorized } from '@urbaninfrastructure/api-auth-sdk/nestjs'
@Controller()
class Controller {
@Get('/edit')
// Decorate function with full acl definition
@Authorized({ product: 'fleet', resource: 'vehicle', action: 'update' })
async editResource() { ... }
}
Arbitrary combinations using AclCombination
interface can be supplied
in order to validate complex acl definitions
@Authorized({
and: [
{ is: { product: 'fleet', resource: 'vehicle', action: 'update' } },
{ is: { product: 'fleet', resource: 'trip', action: 'any' } },
{
not: [
{ is: toAcl('fleet', 'user', 'create') }
]
}
]
})
See the @Authorized
decorator function docs too.
import {
AclCandidate, Admin, Authorized, Permissions
} from '@urbaninfrastructure/api-auth-sdk/nestjs'
@Controller()
class Controller {
@Get('/path')
@Authorized({ product: 'fleet', resource: 'vehicle', action: 'any' })
async pathHandler(
@Admin() admin: AdministratorEntity,
@Permissions() permissions: AclCandidate[],
) {
console.log(admin)
// { id: 'adm_1...', email: 'my@email.com', ... }
console.log(permissions)
// [ { product: 'fleet', owner: 'oslobysykkel', resource: 'vehicle', action: 'any' } ]
}
}
If the Owner (system id) isn't in a well-known location in the request (systemId or metaSystemId),
use @AuthorizedOwner()
to help locate it. Can also be used to specify "any" owner.
import {
AuthorizedOwner, AuthorizedAction, AuthorizedResource
} from '@urbaninfrastructure/api-auth-sdk/nestjs'
@AuthorizedResource('vehicle')
@Controller
class Controller {
@Get('/path')
@AuthorizedOwner((req) => req.params.ownerId)
@AuthorizedAction('read')
async readVehicle() { ... }
}
import { reqHasAcl, toAcl, expressAuthorized } from '@urbaninfrastructure/api-auth-sdk/express'
router.use(expressAuthorized)
function hasPermission(req: Request, owner: string, resource: AclResource, action: AclAction): bool {
return reqHasAcl(req, toAcl('fleet', owner, resource, action))
}
function onRequest(req: Request) {
if (!hasPermission(req, req.systemId, 'vehicle', 'read')) {
return null
}
}
// Server (f.ex. core):
import {
authenticateExternalRequest, authorizeAdministrator, toAcl
} from '@urbaninfrastructure/api-auth-sdk/express'
function onRequest(req: Request) {
// Make sure req has cookies/headers (ie. express's cookie middleware)
/// authenticateExternalRequest throws UnauthorizedError if token is invalid
const jwtToken = authenticateExternalRequest(req)
const result = authorizeAdministrator(jwtToken.sub, toAcl('fleet', systemId, 'vehicle', 'read'))
// alternative:
const result = authorizeAdministrator(jwtToken.sub, { product: 'fleet', owner: systemId, resource: 'vehicle', action: 'read' })
// or an AclCombination:
const result = authorizeAdministrator(jwtToken.sub, { and: [ { is: toAcl(...) }, { is: toAcl(...) } ] })
if (!result.allowed) {
throw new Error('unauthorized', result.missedAcls)
}
}
// Client:
import { getRequestToken, ApiJwtAudience } from '@urbaninfrastructure/api-auth-sdk/nestjs'
const token = getRequestToken(ApiJwtAudience.CORE)
doRequest(coreUrl, headers: { Authorization: `Bearer ${token}` })
// Server (f.ex. in core):
import { authenticateInternalRequest } from '@urbaninfrastructure/api-auth-sdk/express'
function onRequest(req: Request) {
const authMetadata = authenticateInternalRequest(req)
console.log(`Requesting: ${authMetadata.requestingClient}`)
console.log(`System id: ${authMetadata.urbanSharingSystemId}`)
}
FAQs
API Auth SDK
The npm package @urbaninfrastructure/api-auth-sdk receives a total of 0 weekly downloads. As such, @urbaninfrastructure/api-auth-sdk popularity was classified as not popular.
We found that @urbaninfrastructure/api-auth-sdk demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 0 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Security News
A threat actor's playbook for exploiting the npm ecosystem was exposed on the dark web, detailing how to build a blockchain-powered botnet.
Security News
NVD’s backlog surpasses 20,000 CVEs as analysis slows and NIST announces new system updates to address ongoing delays.
Security News
Research
A malicious npm package disguised as a WhatsApp client is exploiting authentication flows with a remote kill switch to exfiltrate data and destroy files.