UNPKG

21.5 kBMarkdownView Raw
1<h1 align="center">Welcome to objection-authorize 👋</h1>
2
3[![CircleCI](https://circleci.com/gh/JaneJeon/objection-authorize.svg?style=shield)](https://circleci.com/gh/JaneJeon/objection-authorize)
4[![Coverage](https://codecov.io/gh/JaneJeon/objection-authorize/branch/master/graph/badge.svg)](https://codecov.io/gh/JaneJeon/objection-authorize)
5[![NPM](https://img.shields.io/npm/v/objection-authorize)](https://www.npmjs.com/package/objection-authorize)
6[![Downloads](https://img.shields.io/npm/dt/objection-authorize)](https://www.npmjs.com/package/objection-authorize)
7[![Dependencies](https://img.shields.io/david/JaneJeon/objection-authorize)](https://david-dm.org/JaneJeon/objection-authorize)
8[![Known Vulnerabilities](https://snyk.io//test/github/JaneJeon/objection-authorize/badge.svg?targetFile=package.json)](https://snyk.io//test/github/JaneJeon/objection-authorize?targetFile=package.json)
9[![Docs](https://img.shields.io/badge/docs-github-blue)](https://janejeon.github.io/objection-authorize)
10[![Prettier code style](https://img.shields.io/badge/code_style-prettier-ff69b4.svg)](https://github.com/prettier/prettier)
11
12> isomorphic, &#34;magical&#34; access control integrated with objection.js
13
14This plugin automatically takes away a lot of the manual wiring that you'd need to do if you were to implement your access control on a request/route level, including:
15
16- checking the user against the resource and the ACL
17- filtering request body according to the action and the user's access
18- figuring out _which_ resource to check the user's grants against automatically(!)
19- even filtering the result from a query according to a user's read access!
20
21Not sure why you would need this? Read below for examples or [see here](https://janejeon.dev/integrating-access-control-to-your-node-js-apps) to learn just how complex access control can be and how you can manage said complexity with this plugin!
22
23**TL;DR:**
24
25Before:
26
27```js
28class Post extends Model {}
29
30app.put('/posts/:id', (req, res, next) => {
31 // Need to handle random edge cases like the user not being signed in
32 if (!req.user) next(new Error('must be signed in'))
33
34 // Need to first fetch the post to know "can this user edit this post?"
35 Post.query()
36 .findById(req.params.id)
37 .then(post => {
38 if (req.user.id !== post.authorId || req.user.role !== 'editor')
39 return next(new Error("Cannot edit someone else's post!"))
40
41 // Prevent certain fields from being set after creation
42 const postBody = omit(req.body, ['id', 'views', 'authorId'])
43
44 // Prevent certain fields from being *changed*
45 if (
46 post.visibility === 'public' &&
47 get(postBody, 'visibility') !== post.visibility &&
48 req.user.role !== 'admin'
49 )
50 return next(
51 new Error('Cannot take down a post without admin privileges!')
52 )
53
54 req.user
55 .$relatedQuery('posts')
56 .updateAndFetchById(post.id, postBody)
57 .then(post => {
58 // filter the resulting post based on user's access before sending it over
59 if (req.user.role !== 'admin') post = omit(post, ['superSecretField'])
60
61 res.send(post)
62 })
63 .catch(err => next(err))
64 })
65 .catch(err => next(err))
66})
67
68// And you need to repeat ALL of this validation on the frontend as well...
69```
70
71After:
72
73```js
74// Use the plugin...
75class Post extends require('objection-authorize')(acl, library, opts)(Model) {}
76
77app.put('/posts/:id', (req, res, next) => {
78 // ...and the ACL is automagically hooked in for ALL queries!
79 Post.query()
80 .updateAndFetchById(req.params.id, req.body)
81 .authorize(req.user)
82 .fetchResourceContextFromDB()
83 .diffInputFromResource()
84 .then(post => {
85 res.send(post.authorizeRead(req.user))
86 })
87 .catch(err => next(err))
88})
89
90// AND you can re-use the ACL on the frontend as well *without* any changes!
91```
92
93### 🏠 [Homepage](https://github.com/JaneJeon/objection-authorize)
94
95> Enjoy objection-authorize? Check out my other objection plugins: [objection-hashid](https://github.com/JaneJeon/objection-hashid) and [objection-tablename](https://github.com/JaneJeon/objection-table-name)!
96
97## Installation
98
99To install the plugin itself:
100
101```sh
102yarn add objection-authorize # or
103npm i objection-authorize --save
104```
105
106Note that Objection.js v1 support was dropped on the v4 release of this plugin, so if you need support for the previous version of the ORM, use v3 of this plugin!
107
108In addition, please respect the peer dependency version of Objection.js (currently it is 2.2.5 or above) as this plugin has to account for bugfixes in the base ORM!
109
110And you can install [@casl/ability](https://github.com/stalniy/casl) as your authorization library. Note that only `@casl/ability` of version 4 or above is supported.
111
112For now, only `@casl/ability` is supported as the authorization library, but this plugin is written in an implementation-agnostic way so that any AuthZ/ACL library could be implemented as long as the library of choice supports _synchronous_ authorization checks.
113
114## Changelog
115
116Starting from the 1.0 release, all changes will be documented at the [releases page](https://github.com/JaneJeon/objection-authorize/releases).
117
118## Terminology
119
120A quick note, I use the following terms interchangeably:
121
122- `resource` and `item(s)` (both refer to model instance(s) that the query is fetching/modifying)
123- `body` and `input` and `inputItem(s)` (all of them refer to the `req.body`/`ctx.body` that you pass to the query to modify said model instances; e.g. `Model.query().findById(id).update(inputItems)`)
124
125## Usage
126
127Plugging in `objection-authorize` to work with your existing authorization setup is as easy as follows:
128
129```js
130const acl = ... // see below for defining acl
131
132const { Model } = require('objection')
133const authorize = require('objection-authorize')(acl, library[, opts])
134
135class Post extends authorize(Model) {
136 // That's it! This is just a regular objection.js model class
137}
138```
139
140### Options
141
142You can pass an _optional_ options object as the third parameter during initialization. The default values are as follows:
143
144```js
145const opts = {
146 defaultRole: 'anonymous',
147 unauthenticatedErrorCode: 401,
148 unauthorizedErrorCode: 403,
149 castDiffToModelClass: true,
150 ignoreFields: [],
151 casl: {
152 useInputItemAsResourceForRelation: false
153 }
154}
155```
156
157For explanations on what each option does, see below:
158
159<details>
160<summary>defaultRole</summary>
161
162When the user object is empty, a "default" user object will be created with the `defaultRole` (e.g. `{ role: opts.defaultRole }`).
163
164</details>
165
166<details>
167<summary>unauthenticatedErrorCode</summary>
168
169Error code thrown when an unauthenticated user is not allowed to access a resource.
170
171</details>
172
173<details>
174<summary>unauthorizedErrorCode</summary>
175
176Error code thrown when an authenticated user is not allowed to access a resource.
177
178</details>
179
180<details>
181<summary>castDiffToModelClass</summary>
182
183When you use `.diffInputFromResource()`, the resource and the inputItem are compared and a diff (an object containing the changes) is fed to your access control checker.
184
185Since the diff is produced as a plain object, we need to cast it to the appropriate model class again so that you can access that model's methods and model-specific fields.
186
187However, in some cases (such as when you're doing some bespoke field/value remapping in `Model.$parseJson()`), casting the object to the model class isn't "safe" to do, and the resulting model instance might contain different values from the raw diff object.
188
189If you want to disable it, just set `opts.castDiffToModelClass` to false and the raw diff object will be fed to the access control functions.
190
191</details>
192
193<details>
194<summary>ignoreFields</summary>
195
196When you automatically modify/include some fields (e.g. automatic timestamps) in your Objection models, as objection-authorize is typically the "last" hook to run before execution, the policies will check for those fields as well.
197
198These allow you to ignore those fields in authorization decisions. Note that you can specify the fields in dot notation as well (e.g. `timestamp.updatedAt`).
199
200</details>
201
202<details>
203<summary>casl.useInputItemAsResourceForRelation</summary>
204
205Normally, the `item` is used as "resource" since that's what the user is acting _on_.
206
207However, for relation queries (e.g. add `Book` to a `Library`), the user is _really_ acting on the `Book`, not the `Library`. For cases like this, you can set this option to `true` in order to use the `inputItem` (`Book`) as "resource" instead of `item` (`Library`) **ONLY** during relation queries.
208
209</details>
210
211### Methods
212
213After initialization, the following "magic" methods are available for use:
214
215<details>
216<summary>QueryBuilder.authorize(user[, resource[, opts]])</summary>
217
218This is the bread and butter of this library. You can chain `.authorize()` to any Objection Model query (i.e. `Model.query().authorize()`) to authorize that specific ORM call/HTTP request.
219
220First, an explanation of the parameters:
221
222The `user` should be an object representation of the user; typically, you can just plug in `req.user` (express) or `ctx.user` (koa) directly, _even if the user is not signed in_ (aka `req.user === undefined`)!
223
224The `resource` object is an optional parameter, and for most queries, you won't need to manually specify the resource.
225
226The `opts` can be used to override any of the default options that you passed during initialization of this plugin (i.e. you don't have to pass the whole options object in; only the parts you want to override for this specific query).
227
228So, what are we _actually_ checking here with this function?
229
230When you chain `.authorize()` to the ORM query, the query is (typically) doing one of four things: create, read, update, or delete (CRUD) - which is the action they're trying to take. These correspond to the HTTP verbs: GET/POST/PUT/PATCH/DELETE (if you're not familiar with how this is the case, please read up on REST API design).
231
232In addition, the query already provides the following contexts: the resource/item(s) that the user is acting on (e.g. read a **user**'s email, or create a **post**), the body/inputItem(s) that the user is supplying. This is typically the `req.body` that you pass to the `.insert()/.update()/.delete()` query methods, aka _how_ you want to change the resource.
233
234So, given this information, we can just rely on the ACL (see below for how to define it) to check whether the `user` is allowed to take the specified `action` on `resource/items` with the given `body/inputItems`! Specifically, the authorization check involves the following functionalities:
235
2361. Check if the user is allowed to apply the specified `action` on the `items`, and if not, throw an `httpError` with the appropriate HTTP error code
2372. If there's `inputItems`, check if the user is allowed to modify/add the specific fields in `inputItems`. If a user tries to set/modify a property they're not allowed to, error is thrown again.
238
239That's it!
240
241The nuances of this plugin comes with how it's able to drastically simplify said ACL calls & context fetching. For example, while figuring out the `inputItems` might be simple, how does the plugin know which `items` the `action` applies to?
242
243The plugin looks at the following places to fetch the appropriate `resource(s)`:
244
2451. If the `resource` parameter is specified in the `.authorize()` call, it takes precedence and is set as the only item(s) that we check against.
2462. If the `resource` parameter is not specified, then it looks at the model instance (if you're calling `.$query()` or `.$relatedQuery()`)
2473. If you call `.fetchContextFromDB()`, then the plugin executes a pre-emptive SQL SELECT call to fetch the rows that the query would affect.
248
249And once the plugin figures out `items` and `inputItems`, it simply iterates along both arrays and checks the ACL whether the user can take `action` on `items[i]` with input `inputItems[j]`.
250
251That's it.
252
253**TIP**: the `.authorize()` call can happen _anywhere_ within the query chain!
254
255</details>
256
257<details>
258<summary>QueryBuilder.action(action)</summary>
259
260Rather than using the "default" actions (create/read/update/delete), you can override the action per query.
261
262This is useful when you have custom actions in your ACL (such as `promote`) for a specific endpoint/query. Just chain a `.action(customAction)` somewhere in the query (in this case, the `customAction` would be `"promote"`).
263
264</details>
265
266<details>
267<summary>QueryBuilder.inputItem(inputItem)</summary>
268
269For methods that don't support passing `inputItem(s)` (e.g. `.delete()`) but you still want to set the input item/resource, you can call this method to manually override the value of the resource used by the ACL.
270
271</details>
272
273<details>
274<summary>QueryBuilder.fetchResourceContextFromDB()</summary>
275
276Sometimes, you need to know the values of the resource(s) you're trying to access before you can make an authorization decision. So instead of loading the model instance(s) yourself and running `.$query()` on them, you can chain `.fetchResourceContextFromDB()` to your query and automatically populate the `inputs`/resources that would've been affected by the query.
277
278e.g.
279
280```js
281await Person.query()
282 .authorize(user)
283 .where('lastName', 'george')
284 .update({ lastName: 'George' }) // input item
285 .fetchResourceContextFromDB() // Loads all people that would be affected by the update,
286// and runs authorization check on *all* of those individuals against the input item.
287```
288
289</details>
290
291<details>
292<summary>QueryBuilder.diffInputFromResource()</summary>
293
294This method is particularly useful for UPDATE requests, where the client is sending the _entire_ object (rather than just the changes, like PATCH). Obviously, if you put the whole object through the AuthZ check, it will trip up (for example, the client may include the object's id as part of an UPDATE request, and you don't want the ACL to think that the client is trying to change the id)!
295
296Therefore, call this method anywhere along the query chain, and the plugin will automatically diff the input object(s) with whatever the resource is! The beauty of this method is that it also works for _nested fields_, so even if your table includes a JSON field, only the exact diff - all the way down to the nested subfields - will be passed along to the ACL.
297
298e.g.
299
300```js
301Model.query()
302 .authorize(user, { id: 1, foo: { bar: 'baz', a: 0 } })
303 .updateById(id, { id: 1, foo: { bar: 'baz', b: 0 } })
304 .diffInputFromResource() // the diff will be { foo: { b: 0 } }
305```
306
307**NOTE**: the plugin is ONLY able to detect changes to an existing field's value or an addition of a _new_ field, NOT the deletion of an existing field (see above how the implicit deletion of `foo.a` is not included in the diff).
308
309Therefore, care must be taken during UPDATE queries where fields (_especially_ nested fields) may be added/removed dynamically. Having JSON subfields doesn't mean you throw out schema Mongo-style; so if you need to monitor for _deletion_ of a field (rather than mutation or addition), I would recommend assigning all of the possible fields' value with `null`, rather than leaving it out entirely, so that deletions would show up as mutations.
310
311e.g. in the above case, if you wanted to check whether field `foo.a` was deleted or not:
312
313```js
314resource = { id: 1, foo: { bar: 'baz', a: 0, b: null } }
315input = { id: 1, foo: { bar: 'baz', a: null, b: 0 } }
316```
317
318</details>
319
320<details>
321<summary>modelInstance.authorizeRead(user, [action = 'read'[, opts]])</summary>
322
323Prior to objection-authorize v4, the plugin "automatically" filtered any resulting model instances against a user's read access, but it didn't work consistently and I found it to be too hacky, so from v4 and on, you will need to manually call the `.authorizeRead()` on your model instance to filter it according to the user's read access (which can be overridden with the `action` parameter).
324
325This call is synchronous and will return the filtered model instance directly. Note that the result is a plain object, not an instance of the model _class_ anymore, since this call is meant to be for "finalizing" the model instance for returning to the user as a raw JSON.
326
327</details>
328
329## Defining the ACL
330
331The ACL is what actually checks the validity of a request, and `objection-authorize` passes all of the necessary context in the form of function parameters (thus, you should wrap your ACL in the following function format):
332
333```js
334function acl(user, resource, action, body, opts) {
335 // your ACL definition goes here
336}
337```
338
339**NOTE**: while `user` is cast into plain object form (simply due to the fact that `req.user` could be empty, and we would need to create a "fake" user with a default role), `resource` and `body` (aka `item` and `inputItem`) are cast into their respective _Models_ - this is to maintain consistency with the internal Objection.js static hooks' behaviour.
340
341For example, in a query:
342
343```js
344await Person.relatedQuery('pets')
345 .for([1, 2])
346 .insert([{ name: 'doggo' }, { name: 'catto' }])
347 .authorize(user)
348 .fetchContextFromDB()
349```
350
351The `resource` is an instance of model `Person`, and the `body` is an instance of model `Pet`. How do I know what class to wrap it in? Magic! ;)
352
353### @casl/ability
354
355For `casl`, because it doesn't allow dynamically checking against any resource or action, we have to wrap it with a function, and that function takes in `(user, resource, action, body, opts)` and returns an _instance_ of ability.
356
357This is essentially the same as the `defineAbilitiesFor(user)` method described [in the casl docs](https://stalniy.github.io/casl/abilities/2017/07/20/define-abilities.html), but obviously with a lot more context.
358
359So you might define your ability like this (and it doesn't matter if you use `AbilityBuilder` or `Ability`):
360
361```js
362const { AbilityBuilder } = require('@casl/ability')
363
364function acl(user, resource, action, body, opts) {
365 return AbilityBuilder.define((allow, forbid) => {
366 if (user.isAdmin()) {
367 allow('manage', 'all')
368 } else {
369 allow('read', 'all')
370 }
371 })
372}
373```
374
375**TIP**: If you want to cut down on the time it takes to check access, one thing you might want to do is to use the `resource` parameter to ONLY define rules relevant to that resource:
376
377```js
378function acl(user, resource, action, body, opts) {
379 return AbilityBuilder.define((allow, forbid) => {
380 switch (resource.constructor.name) {
381 case 'User':
382 allow('read', 'User')
383 forbid('read', 'User', ['email'])
384 break
385 case 'Post':
386 allow('create', 'Post')
387 forbid('read', 'Post', { private: true })
388 }
389 })
390}
391```
392
393### Note on Resource Names
394
395_For both libraries_, note that the resource name IS the corresponding model's name. So if you have a model class `Post`, you should be referring to that resource as `Post` and not `post` in your ACL definition.
396
397### Note on Sharing the ACL between frontend and the backend
398
399The resources that are passed to this plugin in the backend are typically going to be wrapped in their respective model classes: e.g. `req.user` typically will be an instance of the `User` class, and the resource will _always_ be wrapped with its respective class.
400
401So if you want to share your ACL between frontend and the backend, as the frontend doesn't have access to Objection models, any transformation you have on your models should be _symmetric_.
402
403For example, if you have `user.id` and `post.creatorId` and you hash ID's when you export it to JSON, you want to make sure if `user.id = post.creatorId = 1`, the transformed values are _also_ the same (`user.id = post.creatorId = XYZ`, for example).
404
405This also means that you _shouldn't_ rely on virtuals and asymmetrically-transformed fields on your ACL (if you want to use your ACL on the frontend, that is). For an example of symmetric transformation out in the wild, see https://github.com/JaneJeon/objection-hashid.
406
407## Relation support
408
409With objection-authorize v4, I added _experimental_ relation support, so on your ACL wrapper (the function that takes in 5 parameters - I really should just wrap them in an object but that would break compatibility), now there is an optional, 6th parameter called `relation`:
410
411```js
412function acl(user, resource, action, body, opts, relation) {
413 // your ACL definition goes here
414}
415```
416
417And that `relation` property is simply a string representation of the relation between `item` and `inputItem` that you specified in the resource model's `relationMappings`. So you can use that `relation` key to detect relations and do fancy things with it.
418
419In reality, most of the relation support is well-tested and already proven to be working, as the hardest part was to wrap the `inputItem` in the appropriate related class (rather than using the same class for both the `item` and `inputItem`); it's just that I can't test the `relation` string itself due to some... Objection finnickyness.
420
421## Run tests
422
423```sh
424npm test
425```
426
427## Author
428
429👤 **Jane Jeon**
430
431- Github: [@JaneJeon](https://github.com/JaneJeon)
432
433## 🤝 Contributing
434
435Contributions, issues and feature requests are welcome!<br />Feel free to check [issues page](https://github.com/JaneJeon/objection-authorize/issues).
436
437## Show your support
438
439Give a ⭐️ if this project helped you!
440
441## 📝 License
442
443Copyright © 2021 [Jane Jeon](https://github.com/JaneJeon).<br />
444This project is [LGPL](https://github.com/JaneJeon/objection-authorize/blob/master/LICENSE) licensed (TL;DR: please contribute back any improvements to this library).