npm package discovery and stats viewer.

Discover Tips

  • General search

    [free text search, go nuts!]

  • Package details

    pkg:[package-name]

  • User packages

    @[username]

Sponsor

Optimize Toolset

I’ve always been into building performant and accessible sites, but lately I’ve been taking it extremely seriously. So much so that I’ve been building a tool to help me optimize and monitor the sites that I build to make sure that I’m making an attempt to offer the best experience to those who visit them. If you’re into performant, accessible and SEO friendly sites, you might like it too! You can check it out at Optimize Toolset.

About

Hi, 👋, I’m Ryan Hefner  and I built this site for me, and you! The goal of this site was to provide an easy way for me to check the stats on my npm packages, both for prioritizing issues and updates, and to give me a little kick in the pants to keep up on stuff.

As I was building it, I realized that I was actually using the tool to build the tool, and figured I might as well put this out there and hopefully others will find it to be a fast and useful way to search and browse npm packages as I have.

If you’re interested in other things I’m working on, follow me on Twitter or check out the open source projects I’ve been publishing on GitHub.

I am also working on a Twitter bot for this site to tweet the most popular, newest, random packages from npm. Please follow that account now and it will start sending out packages soon–ish.

Open Software & Tools

This site wouldn’t be possible without the immense generosity and tireless efforts from the people who make contributions to the world and share their work via open source initiatives. Thank you 🙏

© 2024 – Pkg Stats / Ryan Hefner

gatewatch

v1.7.0

Published

Verbose, readable JSON policy based Role based access control for JavaScript based applications.

Downloads

8

Readme

gatewatch

Verbose, readable and flexiable Role based access control for JavaScript based applications. It gives the freedom for the application developer to specify the operations , resources and roles. Also it allows for dynamic checks using and , or query logical operators. As will provide functionality to manage privilaged users within the application logic using grant-policy-query-or-condition.

Installation

npm install gatewatch

Motivation

There are many great libraries in npm that provide the same value. However, the motivation behind this library. Is most libraries assume a specific set of roles " user or admin", actions like "CURD". But what if your application needs to manage access and secure authorization for multiple operations ? this library may help.

As my collbrative bug bounty jounery me and colleage discovered that developers are based the point of " broken access control " with roles based on " human " interaction with the application. Which is a great point to start with. However, it is not enough. Some systems have many sub-systems that interact with each other. Therefore in this utility design nothing assumed. The developer can specify the roles, operations and resources. Which can lead to great flexibility in defining the policy. Once the policy is defined the flexiblity of the library comes in the query. The developer can query the policy using and, or. So, the flexibility starts very high then ends up very low when it comes to the query and granting access.

Things this library do not assume:

  • roles
  • operations
  • resources

Therefore, the developer can specify the roles, operations and resources. Which can lead to great flexibility in defining the policy. Once the policy is defined the flexiblity of the library comes in the query. The developer can query the policy using and, or.

Features

  • Verbose and readable
  • Flexiable
  • Dynamic checks
  • least-privilge
  • zero trust
  • risk mitigation

definations

  • Role: pre-defined entity in an application; Which is linked to a user or system, device to determine what operations can be done on what resources.
  • Resources: A specific entity that resemble data in an application that authorized users or systems can perform operations on.
  • Operations: actions the system perform on resources via authorized user, system, devices.

Grant Query types:

  • grant: returns true or false based on the query.
    • A ROLE can perform OPERATIONs on Resources -> simple query
  • grant: returns true or false based on the query and a condition.
    • ( A ROLE can perform OPERATIONs on Resources ) AND ( Boolean output of a condition ) -> complex query returns true if both the grant query and the condition are true.
  • grant: returns true or false based on the query or a condition.
    • ( A ROLE can perform OPERATIONs on Resources ) OR ( Boolean output of a condition ) -> complex query returns true if either the grant query or the condition are true.

least-privilge and zero trust:

access control will return false grant if:

  • one of the chaind methods returned false, such :
    • role()
    • can()
    • on()
  • if the condition output that is pased to and, or is not boolean.

risk mitigation:

  • some developers will grant access to specific resource based on role-name which can lead to a lot of risk, therefore this library require complete query:
    • role()
    • can()
    • on()
  • role() argument must be a non-empty string, that has policiy defined in the policy object.
  • can() argument must be a non-empty list of strings, that has policiy defined in the policy object.
  • can() argument must be a non-empty list of strings, that has policiy defined in the policy object.
  • or() argument must be a boolean. Which is output of a specific logical comparison.
  • and() argument must be a boolean. Which is output of a specific logical comparison.

important note: not all the arguments are required, however, the library will return false grant if one of the arguments is not valid.

Usage

Take this JSON policy example of gatewatch policy for all the upcoming examples:

{
    "resources": ["post","profile", "comment"],
    "actions": ["delete", "create", "update", "read"],
    "roles": ["user", "admin", "super-admin"],
    "policies": [
        {
            "role": "user",
            "can": ["delete", "create", "update", "read"],
            "on": ["post", "profile","comment"]
        },

        {
            "role": "admin",
            "can": ["*"], 
            "on": ["post", "profile","comment"]
        },

        {
            "role": "super-admin",
            "can": ["*"], 
            "on": ["*"]
        }
        
    ]
}

Then within the server-side or client-side JavaScript based applications: We can check the permissions

  • check if user can perform delete on post
const ac = new AccessControl(policy);

const enforcedPolicy = ac.enforce();

new GrantQuery(enforcedPolicy).role("user").can(["delete"]).on(["post"]).grant(); // returns true
  • check if user can perform multiple operations on a resource:
const ac = new AccessControl(policy)

const enforcedPolicy = ac.enforce();

new GrantQuery(enforcedPolicy).role("user").can(["delete", "create", "update"]).on(["post"]).grant(); // returns true
  • example of exit false grant given operation do not exists in the policy:

const ac = new AccessControl(policy)

const enforcedPolicy = ac.enforce();

new GrantQuery(enforcedPolicy).role("user").can(["delete", "create", "random"]).on(["post"]).grant(); // returns false
  • example of checking onwership of a resource and using it to authorize with and
const ac = new AccessControl(policy);

const enforcedPolicy = ac.enforce();


// mongodb service
const user = await userService.find("_id_": req.session.userID );
const post = await postService.find("_id": req.params.postID );
new GrantQuery(enforcedPolicy).role(user.role).can(["delete", "create", "random"]).on(["post"]).and(user._id === post.creator._id).grant(); // returns true if user._id === post.creator._id returns true.

In previous example the behavior is as follow:

  • scenario 1 returns true:

    • if condition and grant query are true.
  • scenario 2 returns false:

    • if condition is true and grant query is false.
    • if condition is false and grant query is true.
    • if condition is false and grant query is false.
  • grant with or example

const ac = new AccessControl(policy);

const enforcedPolicy = ac.enforce();

// mongodb service
const user = await userService.find("_id_": req.session.userID );

const isSUperAdmin = user.role === "super-admin";
new GrantQuery(enforcedPolicy).role(user.role).can(["delete", "create", "random"]).on("post").or(isSuperAdmin); 

In previous example the behavior is as follow:

  • scenario 1: If user role is not super-admin, grant will return true if user can perform the operation on the resource.
  • scenario 2: If user role is super-admin, grant will return true thus authorizing the request.

instalation

server side

  • The purpose of using this library in the server-side is to authorize the requests and access control to APIs. Therefore, the policy should be defined in the server-side.
  • The policy can be defined in a JSON file and imported in the server-side.
  • The policy can be defined in a database and imported in the server-side.

Take the folliwng example in ExpressJS application:

const express = require("express");
const app = express();
const {AccessControl, GrantQuery} = require("gatewatch");
const policy = require("./data.json"); // same policy as above

const ac = new AccessControl(policy);

const enforcedPolicy = ac.enforce();

const userService = {
    users: [
        {
            _id: "123",
            role: "user"
        }
    ],
    find: async (query) => {
        const [foundUser] = userService.users.filter(user => user._id === query._id);
        return foundUser;
    }
}


app.get("/post/:postID", async (req, res) => {
    const user = await userService.find({"_id": "123"} );

    const isSUperAdmin = user.role === "super-admin";
    const isAuthorized = new GrantQuery(enforcedPolicy)
        .role(user.role)
        .can(["read"])
        .on(["post"])
        .or(isSUperAdmin)
        .grant(); 
    if(isAuthorized) {
        console.log("Authorized"); // Auhtorized
    } else {
        console.log("403 Forbidden");
    }
});

app.listen(3000);

also the gatewatch library functionality can be implemented as middlewares in expressjs application:

const getUserRoleFromToken = async (token) => {
    // get user id from signed jwt token
    const user = await jwt.verify(token, 'secret');
    const userRoleFromToken = user.role;
    return userRoleFromToken;
}

// middleware 
const authorization = (resources, actions) => {
    return async (req, res, next) => {

    
        // get user id from signed jwt token
        const token = req.headers.authorization.split(" ")[1];
        const userRoleFromToken = await getUserRoleFromToken(token);
        if(!userRoleFromToken) {
            res.status(403).send("unauthorized");
        }
        const isAuthorized = new GrantQuery(enforcedPolicy)
            .role(userRoleFromToken)
            .can(actions)
            .on(resources)
            .grant(); 

        if(isAuthorized) {
            next();
        } else {
            res.status(403).send("unauthorized");
        }
    }

};

// sample usage given  postRouters is exporess router in the app 

postRouters.get("/", authorization(["post"], ["read"]), postFetchController);

Client-side:

  • The purpose of using this library in the client-side is unlike the server-side. The goal of using this library in the client-side is to manage the UI and the user experience. Therefore, the policy should be defined in the client-side. With resources and operations that are related to the UI and the user experience.

Take the folliwng example in ReactJS application:

import React from "react";
import { AccessControl, GrantQuery } from "gatewatch";
import policy from "./policy.json"; // same policy as above

const ac = new AccessControl(policy);

const enforcedPolicy = ac.enforce();

const Post = () => {
    const user = await userService.find("_id_": req.session.userID );
    const post = await postService.find("_id": req.params.postID );
    const isSUperAdmin = user.role === "super-admin";
    const isAuthorized = new GrantQuery(enforcedPolicy).role(user.role).can(["delete", "create", "random"]).on(["post"]).or(isSuperAdmin).grant(); 
    if(isAuthorized) {
        return (
            <div>
                <h1>Post</h1>
                <p>Post content</p>
            </div>
        )
    } else {
        return (
            <div>
                <h1>Post</h1>
                <p>Post content</p>
                <p>you are not authorized to perform this action</p>
            </div>
        )
    }
}

also the gatewatch library functionality can be implemented as custom hooks in reactjs application:


// custom hook

const useGrant = (role, operations, resources, condition) => {
    const isAuthorized = new GrantQuery(enforcedPolicy).role(role).can(operations).on(resources).or(condition).grant(); 
    return isAuthorized;
}

// component

const Post = () => {
    const isAuthorized = useGrant(user.role, ["delete", "create", "update"], ["post"], user._id === post.creator._id);
    if(isAuthorized) {
        return (
            <div>
                <h1>Post</h1>
                <p>Post content</p>
            </div>
        )
    } else {
        return (
            <div>
                <h1>Post</h1>
                <p>Post content</p>
                <p>you are not authorized to perform this action</p>
            </div>
        )
    }

}

custom hook and omit higher order component:

import React from "react";
import data from "./data.json";
import { AccessControl, GrantQuery } from "gatewatch";

const ac = new AccessControl(data);

const enforcedPolicy = ac.enforce();


const useGrant = (role, operations, resources) => {
    const isAuthorized = new GrantQuery(enforcedPolicy).role(role).can(operations).on(resources).grant(); 
    return isAuthorized;
}

const WithGrant = (WrappedComponent, role, operations, resources) => {
    const isAuthorized = useGrant(role, operations, resources);
    return (props) => {
        if(isAuthorized) {
            return <WrappedComponent {...props} />
        } else {
            return <p>you are not authorized to perform this action</p>
        }
    }
}


const Post = () => {
    return (
        <div>
            <h1>Post</h1>
            <p>Post content</p>
        </div>
    )
}

// get user role from global or local state
const user = {
    _id: "123",
    role: "user"
}

const PostWithGrant = WithGrant(Post, user.role, ["delete", "create", "update"], ["post"]);

export default PostWithGrant;