All Projects → bluebirds-blue-jay → access-control

bluebirds-blue-jay / access-control

Licence: MIT license
Simple, flexible and reliable access control for NodeJS and Typescript. Supports both RBAC and ABAC.

Programming Languages

typescript
32286 projects

Projects that are alternatives of or similar to access-control

objection-authorize
isomorphic, "magical" authorization integration with Objection.js 🎉
Stars: ✭ 71 (+144.83%)
Mutual labels:  acl, permission, rbac, role, abac
Casbin Rs
An authorization library that supports access control models like ACL, RBAC, ABAC in Rust.
Stars: ✭ 375 (+1193.1%)
Mutual labels:  acl, permission, rbac, abac
casbin-ex
An authorization library that supports access control models like ACL, RBAC, ABAC in Elixir
Stars: ✭ 37 (+27.59%)
Mutual labels:  acl, permission, rbac, abac
Casbin Cpp
An authorization library that supports access control models like ACL, RBAC, ABAC in C/C++
Stars: ✭ 113 (+289.66%)
Mutual labels:  acl, permission, rbac, abac
Node Casbin
An authorization library that supports access control models like ACL, RBAC, ABAC in Node.js and Browser
Stars: ✭ 1,757 (+5958.62%)
Mutual labels:  acl, permission, rbac, abac
lua-casbin
An authorization library that supports access control models like ACL, RBAC, ABAC in Lua (OpenResty)
Stars: ✭ 43 (+48.28%)
Mutual labels:  acl, permission, rbac, abac
Think Casbin
专为ThinkPHP定制的Casbin的扩展包,Casbin是一个功能强大,高效的开源访问控制库。
Stars: ✭ 138 (+375.86%)
Mutual labels:  acl, permission, rbac, abac
Php Casbin
An authorization library that supports access control models like ACL, RBAC, ABAC in PHP .
Stars: ✭ 865 (+2882.76%)
Mutual labels:  acl, permission, rbac, abac
sqlx-adapter
Asynchronous casbin adapter for mysql, postgres, sqlite based on sqlx-rs
Stars: ✭ 27 (-6.9%)
Mutual labels:  acl, permission, rbac, abac
Pycasbin
An authorization library that supports access control models like ACL, RBAC, ABAC in Python
Stars: ✭ 625 (+2055.17%)
Mutual labels:  acl, permission, rbac, abac
Casbin.net
An authorization library that supports access control models like ACL, RBAC, ABAC in .NET (C#)
Stars: ✭ 535 (+1744.83%)
Mutual labels:  acl, permission, rbac, abac
actix-casbin-auth
Casbin Actix-web access control middleware
Stars: ✭ 40 (+37.93%)
Mutual labels:  acl, permission, rbac, abac
Casbin
An authorization library that supports access control models like ACL, RBAC, ABAC in Golang
Stars: ✭ 10,872 (+37389.66%)
Mutual labels:  acl, permission, rbac, abac
Jcasbin
An authorization library that supports access control models like ACL, RBAC, ABAC in Java
Stars: ✭ 1,335 (+4503.45%)
Mutual labels:  acl, permission, rbac, abac
Accesscontrol
Role and Attribute based Access Control for Node.js
Stars: ✭ 1,723 (+5841.38%)
Mutual labels:  acl, rbac, abac
dart-casbin
An authorization library that supports access control models like ACL, RBAC, ABAC in Dart/Flutter
Stars: ✭ 30 (+3.45%)
Mutual labels:  acl, rbac, abac
ng2-acl
Role based permissions for Angular v2++
Stars: ✭ 15 (-48.28%)
Mutual labels:  acl, permission, role
Vakt
Attribute-based access control (ABAC) SDK for Python
Stars: ✭ 92 (+217.24%)
Mutual labels:  acl, permission, abac
Negroni Authz
negroni-authz is an authorization middleware for Negroni
Stars: ✭ 152 (+424.14%)
Mutual labels:  acl, rbac, abac
Casbin Server
Casbin as a Service (CaaS)
Stars: ✭ 171 (+489.66%)
Mutual labels:  acl, rbac, abac

AccessControl

npm npm npm

Simple, flexible and reliable RBAC / ABAC access control for NodeJS and Typescript.

Requirements

Installation

npm i @bluejay/access-control

Guide

Simple role based access control

Many applications define a list of roles which are assigned to users and thus define what those users can or cannot do. This is called RBAC (Role Based Access Control) and is one of the most used access control mechanism. Below we'll take a look at how this can be implemented with Bluejay's AccessControl.

First, let's define some application context:

// Here we define 2 roles: one for regular customers, and a special admin role for internal users.
// Note that Bluejay's AccessControl doesn't require any specific role values nor the use of an enum. A role in Bluejay's world is as simple as a string.
export enum Role {
  CUSTOMER = 'customer',
  ADMIN = 'admin'
}

// This interface describes the attributes of the "post" entity, which represents blog posts in our example application.
export interface IPost {
  id: integer;
  title: string;
  content: string;
  created_by: integer;
  created_at: Date;
  updated_at: Date;
}

Next, we'll define a Subject class to hold our user's information and communicate with Bluejay's AccessControl. A subject is just a fancy security term that defines a security view of an application user. Note that a subject does not have to represent a human being and could for example be a 3rd party system that connects to your application.

For the sake of simplicity, we'll assume that all users are stored in the same database table and are uniquely identified by an id integer. We'll implement the abstract getPrincipal() method in order to let Bluejay know what attribute to use as an identifier. A principal is another security term that defines an identifying attribute for an application user.

import { Subject } from '@bluejay/access-control';

export class UserSubject extends Subject<{ id: number }> {
  public getPrincipal() {
    return this.get('id');
  }

  // Note: you can perfectly add custom methods here
}

We'll then need to tell Bluejay where to look for permissions. AccessControl comes package with a built-in MemoryStore that allows you to manage permissions in memory. We'll cover persistent stores later in this documentation.

import { MemoryStore } from '@bluejay/access-control';

const store = new MemoryStore();

Now let's create an instance of Bluejay's AccessControl to be used across the application.

import { AccessControl } from '@bluejay/access-control';

const accessControl = new AccessControl({ store });

We're now ready to declare permissions:

const customer = new UserSubject({ id: 1 });
const admin = new UserSubject({ id: 2 });

store
  .addPermissionToRole(Role.CUSTOMER, { // Limited power for customers
    id: 'CustomerPostsPolicy',
    effect: 'allow',
    resource: 'posts',
    action: ['create', 'read']
  })
  .addPermissionToRole(Role.ADMIN, { // Full power for admins
    id: 'AdminPolicy',
    effect: 'allow',
    resource: '*',
    action: '*'
  })
  .addRoleToSubject(customer, Role.CUSTOMER)
  .addRoleToSubject(admin, Role.ADMIN);

We can finally check our users permissions:

await accessControl.can(customer, 'posts', 'create'); // true
await accessControl.can(customer, 'posts', 'update'); // false
await accessControl.can(admin, 'posts', 'delete'); // true

Simple attribute based access control

ABAC (Attribute Based Access Control) provides an fine-grained control over which attributes a particular role is able to access. The following examples assume that you have already read the RBAC examples.

Let's create some more specific permission:

store
  .addPermissionToRole(Role.CUSTOMER, {
    id: 'CustomerCreatePostPolicy',
    effect: 'allow',
    resource: 'posts',
    action: 'create',
    condition: {
      stringEquals: {
        forAllValues: {
          bodyAttributes: ['title', 'content']
        }
      }
    }
  })
  .addPermissionToRole(Role.ADMIN, {
    id: 'AdminPolicy',
    effect: 'allow',
    resource: '*',
    action: '*'
  });

The condition part defines a set of rules used to evaluate whether or not the permission is applicable. Conditions are defined in a 3 levels object that can be described as follows:

  • operator (stringEquals in our case)
    • modifier (forAllValues in our case)
      • attributeName (bodyAttributes in our case)

An operator defines what type of data we're comparing and how to compare then. Example operators are dateEquals, numberGreaterThan, bool, stringNotEquals, ... A modifier defines the type of input data (single value vs. array) as well as how to interpret them. Example modifiers are forAllValues, simpleValue, simpleValueIfExists An attributeName defines an attribute that may be be present in the environment. Our example defines bodyAttributes which is meant to contain the attributes of the POST request's body.

For more about condition modifiers, see the next section.

We are essentially saying that for all values in bodyAttributes, we expect to find an equal string in the provided condition values. Stated another way, we expect the body to only contain attributes that are listed in the condition values.

We'll be building a simple express POST endpoint that allows consumers to create blog posts. We'll assume that the request has been authenticated and the current user stored as req.user. We'll also assume that the request's body has already been validated and contains only valid values in regards to the data model.

We will be making use of Bluejay's Keys utility, which helps performing various attribute related operations on objects and arrays, in a format that is understood by Bluejay.

import { Keys } from '@bluejay/access-control';

app.post('/posts', authenticate(), validatePostBody(), async (req: Request, res: Response) => {
  const body: Partial<IPost> = req.body;

  const subject = new UserSubject(req.user);

  // We're passing the body's attributes in the environment. Keys.list() will make sure that the resulting list of attributes
  // is understandable by Bluejay.
  const isAllowed = await accessControl.can(subject, 'posts', 'create', { bodyAttributes: Keys.list(body) });

  // For an admin user, since no attributes condition has been defined in the permission, any body will be authorized.
  // For a customer user, the access will only be authorized if all attributes in the body are listed in the permission.

  if (isAllowed) {
    await postService.create(body);
    res.status(201).end();
  } else {
    res.status(403).end();
  }
});

Condition operators

Condition operators define how environment values are compared to condition values.

Condition values are defined as strings no matter their type and further casted at runtime. This allows consumers to store permissions in a schema based storage system such a RDMS without worrying about casting values themselves or storing condition values in separate tables because of the type differences.

String operators

stringEquals
const condition = {
  stringEquals: {
    simpleValue: {
      foo: 'bar'
    }
  }
};


const ok = {
  foo: 'bar' // This will pass because foo === 'bar'
};

const nok = {
  foo: 'baz' // This won't pass because foo !== 'bar'
};

const nok2 = {
  foo: undefined // This won't pass because foo !== 'bar'
}
stringNotEquals
const condition = {
  stringNotEquals: {
    simpleValue: {
      foo: 'bar'
    }
  }
};


const ok = {
  foo: 'baz' // This will pass because foo !== 'bar'
};

const nok = {
  foo: 'bar' // This won't pass because foo === 'bar'
};

const nok2 = {
  foo: undefined // This won't pass because foo is not a string
}
stringImplies
const condition = {
  stringImplies: {
    simpleValue: {
      foo: 'bar*'
    }
  }
};


const ok = {
  foo: 'bar' // This will pass because foo matches 'bar'
};

const ok2 = {
  foo: 'barack' // This will pass because foo matches 'bar'
};

const nok = {
  foo: 'baz' // This won't pass because foo does not match 'bar'
};

const nok2 = {
  foo: undefined // This won't pass because foo is not a string
}
stringNotImplies
const condition = {
  stringNotImplies: {
    simpleValue: {
      foo: 'bar*'
    }
  }
};


const ok = {
  foo: 'baz' // This will pass because foo does not match 'bar'
};

const nok = {
  foo: 'bar' // This won't pass because foo matches 'bar'
};

const nok2 = {
  foo: 'barack' // This won't pass because foo matches 'bar'
};

const nok3 = {
  foo: undefined // This won't pass because foo is not a string
}

Number operators

numberEquals
const condition = {
  numberEquals: {
    simpleValue: {
      foo: '1'
    }
  }
};


const ok = {
  foo: 1 // This will pass because foo === 1
};

const nok = {
  foo: 2 // This won't pass because foo !== 1
};

const nok2 = {
  foo: undefined // This won't pass because foo is not a number
}
numberNotEquals
const condition = {
  numberNotEquals: {
    simpleValue: {
      foo: '0'
    }
  }
};


const ok = {
  foo: 1 // This will pass because foo !== 1
};

const nok = {
  foo: 0 // This won't pass because foo === 0
};

const nok2 = {
  foo: undefined // This won't pass because foo is not a number
}
numberGreaterThan / numberGreaterThanEquals
const condition = {
  numberGreaterThan: {
    simpleValue: {
      foo: '0'
    }
  }
};


const ok = {
  foo: 1 // This will pass because foo > 1
};

const nok = {
  foo: 0 // This won't pass because foo === 0
};

const nok2 = {
  foo: undefined // This won't pass because foo is not a number
}
numberLowerThan / numberLowerThanEquals
const condition = {
  numberLowerThan: {
    simpleValue: {
      foo: '100'
    }
  }
};


const ok = {
  foo: 1 // This will pass because foo < 100
};

const nok = {
  foo: 101 // This won't pass because foo > 0
};

const nok2 = {
  foo: undefined // This won't pass because foo is not a number
}

bool

const condition = {
  bool: {
    simpleValue: {
      foo: 'true'
    }
  }
};


const ok = {
  foo: true // This will pass because foo is true
};

const nok = {
  foo: false // This won't pass because foo is not true
};

const nok2 = {
  foo: undefined // This won't pass because foo is not a boolean
}

null

const condition = {
  null: {
    simpleValue: {
      foo: 'true'
    }
  }
};


const ok = {
  foo: null // This will pass because foo is null
};

const nok = {
  foo: true // This won't pass because foo is not null
};

const nok2 = {
  foo: undefined // This won't pass because foo is not null
}

Date operators

dateEquals
const condition = {
  dateEquals: {
    simpleValue: {
      foo: '2018-09-21T09:46:12.441Z'
    }
  }
};


const ok = {
  foo: '2018-09-21T09:46:12.441Z' // This will pass because matches the contidion value
};

const ok2 = {
  foo: new Date('2018-09-21T09:46:12.441Z') // This will pass because matches the contidion value
};

const ok2 = {
  foo: 1537523172441 // This will pass because matches the contidion value
};

const nok = {
  foo: '2017-09-21T09:46:12.441Z' // This won't pass because foo does not match the condition value
};

const nok2 = {
  foo: undefined // This won't pass because foo is not castable to a date
}
dateNotEquals
const condition = {
  dateNotEquals: {
    simpleValue: {
      foo: '2018-09-21T09:46:12.441Z'
    }
  }
};


const ok = {
  foo: '2017-09-21T09:46:12.441Z' // This will pass because is different from the contidion value
};

const ok2 = {
  foo: new Date('2017-09-21T09:46:12.441Z') // This will pass because is different from the contidion value
};

const ok2 = {
  foo: 1437523172441 // This will pass because is different from the contidion value
};

const nok = {
  foo: '2017-09-21T09:46:12.441Z' // This won't pass because foo does matches the condition value
};

const nok2 = {
  foo: undefined // This won't pass because foo is not castable to a date
}
dateGreaterThan / dateGreaterThanEquals
const condition = {
  dateGreaterThan: {
    simpleValue: {
      foo: '2018-09-21T09:46:12.441Z'
    }
  }
};


const ok = {
  foo: '2019-09-21T09:46:12.441Z' // This will pass because foo > condition value
};

const nok = {
  foo: '2017-09-21T09:46:12.441Z' // This won't pass because foo < condition value
};

const nok2 = {
  foo: undefined // This won't pass because foo is not a date
}
dateLowerThan / dateLowerThanEquals
const condition = {
  dateLowerThan: {
    simpleValue: {
      foo: '2018-09-21T09:46:12.441Z'
    }
  }
};


const ok = {
  foo: '2017-09-21T09:46:12.441Z' // This will pass because foo < condition value
};

const nok = {
  foo: '2019-09-21T09:46:12.441Z' // This won't pass because foo > condition value
};

const nok2 = {
  foo: undefined // This won't pass because foo is not a date
}

Condition modifiers

Condition modifiers are largely inspired by AWS IAM policies, with some minor additions (see https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_multi-value-conditions.html and https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_elements_condition_operators.html).

We support 6 modifiers:

  • simpleValue
  • simpleValueIfExists
  • forAllValues
  • forAllValuesIfExists
  • forAnyValue
  • forAnyValueIfExists

Modifiers that check a single value

simpleValue
const condition = {
  stringEquals: {
    simpleValue: {
      foo: 'bar'
    }
  }
};


const ok = {
  foo: 'bar' // This will pass because foo === 'bar'
};

const nok = {
  foo: 'baz' // This won't pass because foo !== 'bar'
};

const nok2 = {
  foo: undefined // This won't pass because foo !== 'bar'
}
simpleValueIfExists
const condition = {
  stringEquals: {
    simpleValueIfExists: {
      foo: 'bar'
    }
  }
};


const ok = {
  foo: 'bar' // This will pass because foo === 'bar'
};

const ok2 = {
  foo: undefined // This will pass because foo does not exist
}

const nok = {
  foo: 'baz' // This won't pass because foo !== 'bar'
};

Modifiers that check multiple values

forAllValues

This modifier enforces that all values - if any - present in the environment must match a value in the condition.

const condition = {
  stringEquals: {
    forAllValues: {
      foo: ['bar', 'baz', 'boo']
    }
  }
};


const ok = {
  foo: ['bar'] // This will pass because foo is "one of" the condition's value
};

const ok2 = {
  foo: [] // This will pass because no value in foo contradicts the condition's values
};

const nok = {
  foo: ['booz', 'bar'] // This won't pass because booz is not listed in the condition's values
};

const nok2 = {
  foo: [undefined] // This won't pass because undefined is not an allowed value
}
forAllValuesIfExists

This modifier does exactly the same thing as forAllValues expect that it ignores undefined values.

const condition = {
  stringEquals: {
    forAllValuesIfExists: {
      foo: ['bar', 'baz', 'boo']
    }
  }
};


const ok = {
  foo: ['bar'] // This will pass because foo is "one of" the condition's value
};

const ok2 = {
  foo: [] // This will pass because no value in foo contradicts the condition's values
};

const ok3 = {
  foo: [undefined] // This will pass because only "existing" values are evaluated
}

const nok = {
  foo: ['booz', 'bar'] // This won't pass because booz is not listed in the condition's values
};
forAnyValue

This modifier says that the condition is met if at least one value in the environment matches the accepted values in the condition.

const condition = {
  stringEquals: {
    forAnyValue: {
      foo: ['bar', 'baz', 'boo']
    }
  }
};


const ok = {
  foo: ['bar', 'booz'] // This will pass because bar is an accepted value
};

const ok2 = {
  foo: ['bar', 'baz'] // This will pass because all values are accepted
};

const nok = {
  foo: ['booz', 'biz'] // This won't pass because no value matches the condition values
};

const nok2 = {
  foo: [] // This won't pass because no value in foo matches a condition value
};
forAnyValueIfExists

You will most likely never use this modifier unless you expect the environment values to be a mix of valid and undefined values.

const condition = {
  stringEquals: {
    forAnyValueIfExists: {
      foo: ['bar', 'baz', 'boo']
    }
  }
};


const ok = {
  foo: ['bar', 'booz', undefined] // This will pass because bar is an accepted value
};

const nok = {
  foo: ['booz', 'biz'] // This won't pass because no value matches the condition values
};

const nok2 = {
  foo: [] // This won't pass because no value in foo matches a condition value
};

const nok3 = {
  foo: [undefined] // This is equivalent to an empty array
};

Condition variables

Bluejay provides us with a powerful way of defining variables as condition values, making permissions dynamic.

Let's say that we want to expose an endpoint and allows our users to modify their information. We need to make sure that a given user can only modify their own information, and no one else's. A naive way of defining permissions would look like the following.

store
  .addPermissionToRole(Role.CUSTOMER, {
    id: 'CustomerUpdateInformationPolicy',
    effect: 'allow',
    resource: 'users',
    action: 'update',
    condition: {
      numberEquals: {
        simpleValue: {
          id: '?????' // Here we would need to create one permission per user!
        }
      }
    }
  })

Thanks to Bluejay's variables, we have a more dynamic way of doing this.

store
  .addPermissionToRole(Role.CUSTOMER, {
    id: 'CustomerUpdateInformationPolicy',
    effect: 'allow',
    resource: 'users',
    action: 'update',
    condition: {
      numberEquals: {
        simpleValue: {
          'params.id': '{{{subject.id}}}' // This will be evaluated at runtime
        }
      }
    }
  })

Now let's look at the endpoint itself.

app.patch('/users/:id', authenticate(), validatePatchBody(), async (req: Request, res: Response) => {
  const body: Partial<IPost> = req.body;

  const subject = new UserSubject(req.user);

  // We're passing both the id and the subject to the environment
  const isAllowed = await accessControl.can(subject, 'posts', 'create', { params: req.params, subject: subject.toJSON() });

  // An admin user will be allowed to update any user. The id and subject in the environment will not even be used since no condition is defined.
  // A customer, on the other side, will only be able to update their own user.

  if (isAllowed) {
    await userService.update({ id: req.params.id }, body);
    res.status(204).end();
  } else {
    res.status(403).end();
  }
});

Filtering returned attributes

It is important to understand that access control validates a request and has therefore no influence over the response that you send to your consumers.

If you need to control which fields are exposed in the responses to your different consumers, one solution is to have them explicitly request the set of attributes that they want to see returned. If this is how your application behaves, then you can validate the attributes that a particular user is requesting using a permission that would look like this:

ac.addPermissionToRole(Role.CUSTOMER, {
  id: 'CustomerReadPostPolicy',
  effect: 'allow',
  resource: 'posts',
  action: 'read',
  condition: {
    stringEquals: {
      forAllValues: {
        fields: ['id', 'title', 'content', 'created_by']
      }
    }
  }
});

In this condition, we are essentially saying that for all values in fields, we expect to find an equal string in the permission's values.

// We'll assume that the consumers make calls that look like "GET /posts?fields=id,title,content" where the `fields` query parameter defines the fields to be returned as a response.

app.get('/posts', authenticate(), async (req: Request, res: Response) => {
  const fields = (req.query.fields || '').split(',');
  const subject = new UserSubject(req.user);

  // We're passing the fields in the environment hash so that they can be evaluated
  const access = await accessControl.authorize(subject, 'posts', 'read', { fields });

  if (access.isAllowed()) {
    // The application is responsible for only returning the fields that have been requested. The access control has made sure that only allowed attributes have been requested, so you can safely pass the fields to your service.
    const data = await postService.list({ fields });
    res.status(200).json(data);
  } else {
    res.status(403).end();
  }
});

However, in most applications, the consumer is not expected to provide the fields they want to see returned. Bluejay provides you with a convenient way of dealing with this use case by introducing a special returnedAttributes property in the permission definition. With this knowledge, we can refactor the previous permission to this one:

ac.addPermissionToRole(Role.CUSTOMER, {
  id: 'CustomerReadPostPolicy',
  effect: 'allow',
  resource: 'posts',
  action: 'read',
  returnedAttributes: ['id', 'title', 'content', 'created_by']
});

// We'll now assume that consumers make calls that look like "GET /posts".

app.get('/posts', authenticate(), async (req: Request, res: Response) => {
  const subject = new UserSubject(req.user);

  // We're not passing any environment data here since the request does not contain any attribute information that could be useful to determine access. the `returnedAttributes` are simply ignored by Bluejay.
  const access = await accessControl.authorize(subject, 'posts', 'read');

  if (access.isAllowed()) {
    // This time, instead of using the request's `fields`, we're using the fields defined in the permission and accessible through `getReturnedAttributes()` on the access.
    const data = await postService.list({ fields: access.getReturnedAttributes() || [] }); // Depending on who's calling, the returned attributes might be undefined
    res.status(200).json(data);
  } else {
    res.status(403).end();
  }
});

It is important to note that Bluejay only acts as a middleman here and never uses returnedAttributes to determine access.

Also alternatively, if you are not able to have your services only return a specific set of attributes, you can use Bluejay's Keys utility to filter the payload before responding:

import { Keys } from '@bluejay/access-control';

app.get('/posts', authenticate(), async (req: Request, res: Response) => {
  const subject = new UserSubject(req.user);

  // We're not passing any environment data here since the request does not contain any attribute information that could be useful to determine access. the `returnedAttributes` are simply ignored by the authorizer.
  const access = await accessControl.authorize(subject, 'posts', 'read');

  if (access.isAllowed()) {
    const data = await postService.list();

    // Keys.filter() accepts both objects and arrays
    const payload = Keys.filter(data, access.getReturnedAttributes())

    res.status(200).json(payload);
  } else {
    res.status(403).end();
  }
});

Stores

The default MemoryStore

By default, Bluejay comes packaged with a MemoryStore which allows you to quickly get started by storing permissions in memory.

  • createPermission(): Create/store a new permission. Overrides any existing permission with the same ID. If no id property is set, one will be created
  • deletePermission(): Delete a single permission
  • replacePermission(): Replaces a permission by ID
  • addPermissionToRole(): Assigns a permission to a role. If the permission does not exist yet, it will be created
  • removePermissionFromRole(): Unassigns a permission from a role
  • addRoleToSubject(): Assigns a role to a subject
  • removeRoleFromSubject(): Unassigns a role from a subject
  • getRolesForSubject(): Lists roles assigned to a subject
  • getPermissionsForRole(): Lists permissions assigned to a role
  • getPermissionsForSubject(): Lists permissions assigned to a subject, that is, all permissions attached to the subject's roles
  • createSubject(): Creates/stores a subject
  • deleteSubject(): Deletes a subject
  • getPermissions(): Lists all permissions
  • getPermissionById(): Retrieve a permission by ID
  • getSubjects(): Lists all subjects
  • getSubjectByPrincipal(): Retrieve a subject by principal

Creating your own store by implementing the IStore interface

While the MemoryStore is a convenient way to get started, you will maybe feel the need of storing your permissions in a more persistent storage at some point. A store, as required by the AccessControl constructor, is nothing more than an implementation of the IStore interface, which looks like this:

export interface IStore {
  getPermissionsForSubject(subject: ISubject<{}>): TPermission[] | Promise<TPermission[]>;
}

This interface defines a single method that will allow Bluejay to retrieve the permissions assigned to a given subject. It can be either synchronous and return a simple array of permissions or asynchronous by returning a promise that resolves with the list.

No matter how permissions are stored, Bluejay expects a permission to look like this:

type TPermission = {
  id: string | number;              // A unique identifier for this permission
  effect: 'allow' | 'deny';         // Whether this permission allows or denies access
  resource: string | string[];      // Either a list or a single resource
  action: string | string[]];       // Either a list or a single action
  returnedAttributes?: string[];    // A list of attributes to return
  condition?: TPermissionCondition; // A condition that defines whether or not the permission is applicable
}

Example store implementations

While Bluejay does not provide other stores than the memory based one out of the box, we're going to take a little time in this documentation and provide some guidance.

MongoDB

Because of its native JSON support, it is very simple to store permissions in MongoDB. We could create a collection permissions with a schema that directly maps to the TPermission type. In addition, and in order to store the association between roles and permissions, we'd add a roles property to permissions and end up with a schema that looks like this:

type TMongoPermission = {
  _id: string;
  effect: 'allow' | 'deny';
  resource: string | string[];
  action: string | string[]];
  returnedAttributes?: string[];
  condition?: TPermissionCondition;
  roles: string[]; // Here we store the roles that get assigned the permission
}

In our application, we probably already have a users collection, which maybe looks like this:

type TUser = {
  _id: string;
  email: string;
  first_name: string;
  last_name: string;
  roles: string[]; // Here we store the user's roles
}

Then we can write a simple class to implement the IStore interface.

import { Db } from 'mongodb';
import { IStore } from './interfaces/store';
import { ISubject } from './interfaces/subject';
import { TPermission } from './types/permission';

// This should be defined somewhere else in your project.
export interface IApplicationSubject extends ISubject<{ _id: string; }> {

}

// This is your custom permission schema.
export type TApplicationPermission = TPermission & {
  _id: string;
  roles: string[];
};

/**
 * Store implementation for Bluejay access control.
 */
export class MongoStore implements IStore {
  private db: Db;

  public constructor(db: Db) {
    this.db = db;
  }

  public async getPermissionsForSubject(subject: IApplicationSubject): Promise<TApplicationPermission[]> {
    const userId = subject.get('_id');

    // First we find the user in order to get their roles.
    const user = await this.db.collection('users').findOne<{ roles: string[] }>({
      _id: userId
    }, {
      projection: { roles: 1 }
    });

    if (!user) {
      throw new Error(`Unknown user: ${userId}.`);
    }

    // Then we find the permissions that correspond to those roles.
    const permissionsCursor = await this.db.collection('permissions').find<TApplicationPermission>({
      role: { in: user.roles }
    });

    // That's it!
    return permissionsCursor.toArray();
  }

}

Then to use the store:

import { db } from './db'; // We'll assume that you already have an instance exported.

const store = new MongoStore(db);
const accessControl = new AccessControl({ store });

That's it! Now each time Bluejay needs to know which permissions are associated with a user, it will fetch the data from your Mongo store.

Note: We do not detail advanced methods to manage (create/update) your permissions as this is something you should control. If you're looking for inspiration though, have a look at the MemoryStore.

MySQL

TODO

Returned attributes in depth: pattern matching and the Keys utility

The following examples apply to systems where the returned attributes are manually filtered using the Keys.filter() utility.

Bluejay uses a proprietary syntax for describing returnedAttributes in combination with Keys. The reason is that we want to offer a custom-fit experience when dealing with those attributes as well as make sure that we only perform necessary operations in order to obtain the best possible performance.

The examples below use a data structure that describes a blog post with various attributes.

type BlogPost = {
  id: number:
  title: string;
  content: string;
  author: {
    id: number;
    username: string;
    email: string;
    hobbies: string[];
  },
  comments: {
    id: number;
    content: string;
    author: {
      id: number;
      username: string;
      email: string;
      hobbies: string[];
    }
  }[];
}

Whitelist approach

Whitelisting is the recommended way to describe your returned attributes, because it offers you the peace of mind and clarity of knowing what exactly is being returned to your user.

Let's say we want the author of a blog post to receive all information about a blog post except the email addresses of the comments authors. We would write the returned attributes as such:

const permission: TPermission = {
  id: 'User:BlogPost:GetItem',
  resource: 'blog-posts',
  action: 'get-item',
  effect: PermissionEffect.ALLOW,
  returnedAttributes: [
    'id',
    'title',
    'content',
    'author.id',
    'author.username',
    'author.email',
    'author.hobbies',
    'comments.[].id',
    'comments.[].content',
    'comments.[].author.id',
    'comments.[].author.username',
    'comments.[].author.hobbies',
 ]
};

Because we omitted comments.[].author.email, the user won't see the commenters emails, assuming that we filtered the payload using Keys.filter().

The ! (bang) operator or the blacklist approach

While the whitelist approach provides the most security, there are times where you will prefer to not describe all fields but rather exclude particular fields from the payload. Here comes the ! operator. In order to obtain the exact same result as previously, we could rewrite the permission as such:

const permission: TPermission = {
  id: 'User:BlogPost:GetItem',
  resource: 'blog-posts',
  action: 'get-item',
  effect: PermissionEffect.ALLOW,
  returnedAttributes: [
    '!comments.[].author.email',
  ]
};

Magic!

Note: It is not possible to combine the whitelist and blacklist approaches in a given returnedAttributes array

The * (wild card) operator

The simplest and most permissive returnedAttributes can be written as such:

const permission: TPermission = {
  id: 'User:BlogPost:GetItem',
  resource: 'blog-posts',
  action: 'get-item',
  effect: PermissionEffect.ALLOW,
  returnedAttributes: '*'
};

This basically means: return everything.

We could also want to simplify part of the returned attributes by combining the whitelist approach and the wild cards. We could for example rewrite the initial example as such:

const permission: TPermission = {
  id: 'User:BlogPost:GetItem',
  resource: 'blog-posts',
  action: 'get-item',
  effect: PermissionEffect.ALLOW,
  returnedAttributes: [
    'id',
    'title',
    'content',
    'author.*',
    'comments.[].id',
    'comments.[].content',
    'comments.[].author.id',
    'comments.[].author.username',
    'comments.[].author.hobbies',
 ]
};

Notice the author.* that basically says: returned everything in the nested author object. Note that this doesn't have any influence over the nested author objects in the comments, but exclusively at the root of the object.

Info: When you use the blacklist approach, a returnedAttributes with a value of ['!comments.[].author.email'] is essentially equivalent to ['*', '!comments.[].author.email']

Arrays and the [] (unwind) operator

You may have noticed the particular syntax for the comments array in the previous examples. This operator allows us to say "for each element in the array, apply the following pattern". It is particularly useful when dealing with lists of objects with no predefined length.

When dealing with tuples though, each element in the array can be referenced by its index. Let's say, for example, that we only want users to receive the first comment from the comments array. We would write the permission as such:

const permission: TPermission = {
  id: 'User:BlogPost:GetItem',
  resource: 'blog-posts',
  action: 'get-item',
  effect: PermissionEffect.ALLOW,
  returnedAttributes: [
    'id',
    'title',
    'content',
    'author.*',
    'comments.0.id',
    'comments.0.content',
    'comments.0.author.id',
    'comments.0.author.username',
    'comments.0.author.hobbies',
 ]
};

This will ensure that only the first comment is returned.

Inspirations

Special heads up to the following modules and their creators for the precious inspiration:

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].