Security News
Fluent Assertions Faces Backlash After Abandoning Open Source Licensing
Fluent Assertions is facing backlash after dropping the Apache license for a commercial model, leaving users blindsided and questioning contributor rights.
accesscontrol-decorator-extensions
Advanced tools
Control access to whole instances or individual properties on those instances with ease.
Control access to whole instances or individual properties on those instances with ease, powered by accesscontrol.
Note: I am developing this for a side-project of mine, and will add features/fix issues as I encounter them. If you have a use-case that is not yet covered, please open an issue (or better yet, a pull request).
yarn add accesscontrol-decorator-extensions
or
npm install --save accesscontrol-decorator-extensions
You will need to decorate the class you would like to control access to with the @ProtectedResource
decorator. You can further control access to individual properties with the @ProtectedProperty
decorator. For example:
import {
Action,
ProtectedProperty,
ProtectedResource,
Scope,
} from 'accesscontrol-decorator-extensions';
@ProtectedResource({
/**
* The viewer will be the identifier of the consumer, the instance will be the instance of
* the ProtectedResource decorated class that you are trying to control access to.
*
* ownershipDeterminer is a function that determines whether or not a viewer owns the instance
* roleDeterminer is either the viewer's role (string) or a function that returns the viewer's role
*/
ownershipDeterminer: (viewer: User, instance: User) => viewer.id === userResult.id,
roleDeterminer: (viewer: User) => viewer.role,
})
class User {
public id: number;
@ProtectedProperty({
permissions: {
admin: {
[Action.CREATE]: Scope.ANY,
[Action.READ]: Scope.ANY,
[Action.UPDATE]: Scope.ANY,
[Action.DELETE]: Scope.ANY,
},
user: {
[Action.CREATE]: Scope.OWN,
[Action.READ]: Scope.ANY,
[Action.UPDATE]: Scope.OWN,
[Action.DELETE]: Scope.OWN,
},
},
})
public username: string;
@ProtectedProperty({
permissions: {
admin: {
[Action.CREATE]: Scope.ANY,
[Action.READ]: Scope.ANY,
[Action.UPDATE]: Scope.ANY,
[Action.DELETE]: Scope.ANY,
},
user: {
[Action.CREATE]: '',
[Action.READ]: Scope.OWN,
[Action.UPDATE]: '',
[Action.DELETE]: '',
},
},
})
public role: string;
}
Then for actually filtering the action, you would do something like this (imagine in an Express-like context):
import { Action, filterAccess } from 'accesscontrol-decorator-extensions';
export const editUser = async (req, res) => {
// In this instance, a middleware prior to editUser running places the viewer (user) on the request object
const { body, params, user } = req;
const userToUpdate = await db.user.findOne(params.userId);
// Change the user's username based on data in the request body
userToUpdate.username = body.username;
// This will ensure that the user is only updating fields they have access to update
const filteredUserUpdates: Partial<User> = filterAccess(user, Action.UPDATE, userToUpdate);
const savedUser = await db.user.save(filteredUserUpdates);
res.json({
success: true,
user: savedUser,
});
};
To check if a role has access to any fields in the root-level resource for a given action, you could do something like the following:
import { Action, canAccess } from 'accesscontrol-decorator-extensions';
export const deletePost = async (req, res) => {
// In this instance, a middleware prior to deletePost running places the viewer (user) on the request object
const { params, user } = req;
if (!canAccess(user, Action.DELETE, new Post())) {
throw new Error('unauthorized!');
}
await db.post.deleteOne(params.id);
res.json({ success: true });
};
{
"target": "es2015", // at least
"experimentalDecorators": true
}
Feel free to contribute by forking this repository, making, testing, and building your changes, then opening a pull request. Please try to maintain a uniform code style.
FAQs
Control access to whole instances or individual properties on those instances with ease.
The npm package accesscontrol-decorator-extensions receives a total of 9 weekly downloads. As such, accesscontrol-decorator-extensions popularity was classified as not popular.
We found that accesscontrol-decorator-extensions demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
Fluent Assertions is facing backlash after dropping the Apache license for a commercial model, leaving users blindsided and questioning contributor rights.
Research
Security News
Socket researchers uncover the risks of a malicious Python package targeting Discord developers.
Security News
The UK is proposing a bold ban on ransomware payments by public entities to disrupt cybercrime, protect critical services, and lead global cybersecurity efforts.