npm package discovery and stats viewer.

Discover Tips

  • General search

    [free text search, go nuts!]

  • Package details

    pkg:[package-name]

  • User packages

    @[username]

Sponsor

Optimize Toolset

I’ve always been into building performant and accessible sites, but lately I’ve been taking it extremely seriously. So much so that I’ve been building a tool to help me optimize and monitor the sites that I build to make sure that I’m making an attempt to offer the best experience to those who visit them. If you’re into performant, accessible and SEO friendly sites, you might like it too! You can check it out at Optimize Toolset.

About

Hi, 👋, I’m Ryan Hefner  and I built this site for me, and you! The goal of this site was to provide an easy way for me to check the stats on my npm packages, both for prioritizing issues and updates, and to give me a little kick in the pants to keep up on stuff.

As I was building it, I realized that I was actually using the tool to build the tool, and figured I might as well put this out there and hopefully others will find it to be a fast and useful way to search and browse npm packages as I have.

If you’re interested in other things I’m working on, follow me on Twitter or check out the open source projects I’ve been publishing on GitHub.

I am also working on a Twitter bot for this site to tweet the most popular, newest, random packages from npm. Please follow that account now and it will start sending out packages soon–ish.

Open Software & Tools

This site wouldn’t be possible without the immense generosity and tireless efforts from the people who make contributions to the world and share their work via open source initiatives. Thank you 🙏

© 2024 – Pkg Stats / Ryan Hefner

pandit

v0.1.1

Published

Minimal authorization for Node.js inspired by Pundit

Downloads

3

Readme

pandit

NPM Version Build Status Coverage Status

Minimal authorization for Node.js inspired by Pundit

Installation

npm install --save pandit

Policies

Pandit uses policy classes to apply authorization logic. Policy constructors receive a user and resource instance (or "record") for which authorization should be applied. Policy class methods (or "queries") define the authorization logic:

module.exports = WidgetPolicy

function WidgetPolicy (user, widget) {
  this.user = user
  this.widget = widget
}

WidgetPolicy.prototype.edit = function (done) {
  if (!this.user || !this.widget) return done(undefined, false)
  if (this.user.admin) return done(undefined, true)
  done(undefined, this.user.id === this.widget.owner)
}

Query methods should pass true or false to the callback to indicate whether an action is authorized for the given user and record.

Middleware

Pandit provides express/connect middleware for app integration:

var pandit = require('pandit')
var express = require('express')
var app = express()

// Load the pandit middleware
app.use(pandit())

By default, pandit loads policies from ./lib/policies. This may be changed by passing the policyDir option:

app.use(pandit({policyDir: './app/policies'}))

Context

The middleware adds a pandit Context instance at req.pandit. The context is responsible for loading the user and record from the request and response objects. By default, the user is loaded from req.user and the record is loaded from res.locals.<name>. The pandit.Context class may be extended to alter the default behaviour.

Authorization

To require authorization for a particular route, use the pandit.authorize() helper:

app.get('/widgets/:id/edit', pandit.authorize('widget', 'edit'), function (req, res) {
  res.render('widgets/edit')
})

In this example, the edit query of the widget policy is applied to the request. If denied, a NotAuthorizedError will be passed to the first error-handling middleware, which should respond appropriately:

app.use(function (err, req, res, next) {
  if (!(err instanceof pandit.errors.NotAuthorizedError)) return next(err)
  res.render('errors/403')
})

If a particular authorization check doesn't require a record instance, or the instance is known before the route is created, the record class or record instance may be passed to pandit.authorize() rather than the name:

var Widget = require('./models/widget.js')
app.get('/widgets/new', pandit.authorize(Widget, 'new'), function (req, res) {
  res.render('widgets/new')
})
// or
var widget = new Widget()
app.get('/widgets/global', pandit.authorize(widget, 'show'), function (req, res) {
  res.render('widgets/show', {widget: widget})
})

You may authorize multiple policy queries at once by passing an array to pandit.authorize():

app.get('/widgets/:id/toggle', pandit.authorize('widget', ['disable', 'enable']), function (req, res) {
  res.render('widgets/toggle')
})

Scopes

A policy scope filters a list of records to only include those with which the user is authorized to interact. A scope is a class whose constructor receives a user and a list of records. The resolve() method on the scope should pass the filtered list of records to the callback. The default policy finder looks for the scope class as a Scope property on the policy class:

function WidgetScope (user, widgets) {
  this.user = user
  this.widgets = widgets
}

WidgetScope.prototype.resolve = function (done) {
  if (!this.user) return done(undefined, [])
  done(undefined, this.widgets.filter(function (widget) {
    return this.user.id === widget.owner
  }.bind(this)))
}

WidgetPolicy.Scope = WidgetScope

The pandit.scope() helper filters the records using a given scope:

app.get('/widgets', pandit.scope('widgets'), function (req, res) {
  res.render('widgets/index')
})

Permitted Attributes

Policies may specify which record attributes a user is allowed to manipulate by defining a permittedAttributes() method, which should pass a list of authorized record attributes to the callback.

WidgetPolicy.permittedAttributes = function (done) {
  if (!this.user) return done(undefined, [])
  if (this.user.admin) return done(undefined, ['name', 'gears', 'owner', 'deleted'])
  done(undefined, ['name', 'gears'])
}

The pandit context instance provides a permittedAttributes() method that filters the request body to only contain keys for which the user is authorized:

app.put('/widgets/:id', function (req, res, next) {
  // Get authorized attributes from request body
  req.pandit.permittedAttributes(res.locals.widget, function (err, attrs) {
    if (err) return next(err)
    // Update the widget with the filtered attributes and save
    res.locals.widget.update(attrs, function (err) {
      if (err) return next(err)
      res.redirect('/widgets')
    })
  })
})

The request body is retreived from req.body by default, which can be altered by extending the pandit context.

Requiring a User

If a policy requires a user in all cases, it's inconvenient to check for the user in each query method. Instead, a policy's constructor may throw a pandit.errors.NotAuthorizedError directly:

function WidgetPolicy (user, widget) {
  if (!user) throw new pandit.errors.NotAuthorizedError()
  this.user = user
  this.widget = widget
}

Retrieving Policies/Scopes

A policy instance may be retrieved by calling the policy() method on the pandit request context:

app.get('/widgets/:id', function (req, res, next) {
  req.pandit.policy(Widget, function (err, policy) {
    if (err) return next(err)
    policy.edit(function (err, allowed) {
      if (err) return next(err)
      res.render('widgets/show', {canEdit: allowed})
    })
  })
})

A policy scope may be similarly retrieved using the policyScope() context method:

var widgets = [new Widget(), new Widget(), new Widget()]
app.get('/widgets', function (req, res, next) {
  req.pandit.policyScope(widgets, function (err, scope) {
    if (err) return next(err)
    res.render('widgets/index', {widgets: scope})
  })
})

Requiring Authorization

To ensure at least one policy has been applied to a request, the pandit.verifyAuthorized() helper may be used:

app.get('/widgets/:id', pandit.verifyAuthorized(), function (req, res) {
  res.render('widgets/show')
})

If authorization has not yet been performed for a request when the pandit.verifyAuthorized() handler is called, a pandit.errors.AuthorizationNotPerformedError is passed to the error-handling middleware.

Policy scopes may be enforced with the pandit.verifyPolicyScoped() helper:

app.get('/widgets', pandit.verifyPolicyScoped(), function (req, res) {
  res.render('widgets/index')
})

A pandit.errors.PolicyScopingNotPerformedError will be passed to the error-handling middleware if a scope has not yet been applied for a request.

The verification methods are also available on the request context:

app.get('/widgets/:id', function (req, res, next) {
  req.pandit.verifyAuthorized(function (err) {
    if (err) return next(err)
    res.render('widgets/show')
  })
})
// and
app.get('/widgets', function (req, res, next) {
  req.pandit.verifyPolicyScoped(function (err) {
    if (err) return next(err)
    res.render('widgets/index')
  })
})

Both verification methods may be skipped for a particular request, allowing global authorization requirements that should be bypassed in certain cases:

app.get('/widgets/:id', function (req, res, next) {
  if (process.env.NODE_ENV === 'test') req.pandit.skipAuthorization()
  next()
}, pandit.verifyAuthorized(), function (req, res) {
  res.render('widgets/show')
})
// and
app.get('/widgets', function (req, res, next) {
  if (process.env.NODE_ENV === 'test') req.pandit.skipPolicyScope()
  next()
}, pandit.verifyPolicyScoped(), function (req, res)
  res.render('widgets/index')
})

Extending the Context

Pandit context methods may be overridden to customize behaviour. To globally override the context, add a custom context class to the pandit.Pandit class:

var util = require('util')
var User = require('./models/user.js')
var Context = pandit.Context

function CustomContext () {
  Context.apply(this, arguments)
}

util.inherits(CustomContext, Context)

CustomContext.prototype.policyUser = function (done) {
  // Find the user from a session rather than `req.user`
  User.findById(req.session.userId, done)
}

CustomContext.prototype.policyRecord = function (name, done) {
  // Allow passing a record or record class directly rather than a name
  if (typeof name !== 'string') return done(undefined, name)
  // Load the record from `req.models` rather than `res.locals`
  done(undefined, this.req.models[name])
}

CustomContext.prototype.policyBody = function (done) {
  // Load the request body from `req.query` rather than `req.body`
  done(undefined, this.req.query)
}

// Set the global pandit context class
pandit.Pandit.Context = CustomContext

// Add middleware *after* setting the context class
app.use(pandit())

The context class may be overridden per-request by using a custom middleware:

app.use(function (req, res, next) {
  if (req.pandit) return next(new pandit.errors.MiddlewareAlreadyUsedError())
  req.pandit = new CustomContext(new pandit.Pandit(), req, res)
  next()
})

Policy Finder

To determine the appropriate policy for a record, record class or scope, the default policy finder attempts to find the name of the record type by looking in a few predefined places:

  • object.policyClass - Explicitly set policy for a record class
  • object.constructor.policyClass - Explicitly set policy for a record instance
  • object.modelName - For Mongoose models
  • object.model.modelName - For Mongoose queries
  • object.constructor.modelName - For Mongoose document instances

If the object is a list of records, the first object in the list is used for name lookup. If the name is found and it is not a string, the name itself is assumed to be the policy class. If the name is a string, the policy finder converts it from camel/Pascal case into a lowercase hyphenated filename, ie WidgetCategory becomes widget-category.js. The file is then loaded from the policy dir.

The policy finder logic may altered by using a custom policy finder class:

var util = require('util')
var PolicyFinder = pandit.PolicyFinder

function CustomPolicyFinder () {
  PolicyFinder.apply(this, arguments)
}

util.inherits(CustomPolicyFinder, PolicyFinder)

CustomPolicyFinder.prototype.find = function () {
  // Find the policy via `_pandit` property on the record
  return this.object._pandit
}

CustomPolicyFinder.prototype.loadPolicy = function (name, done) {
  // Load policy from custom location
  try {
    var policy = require('./policies/' + name + '/policy.js')
  } catch (err) {
    if (err && err.code === 'MODULE_NOT_FOUND') {
      return done(new pandit.errors.NotDefinedError('Unable to find policy'))
    }
    return done(err)
  }
  done(undefined, policy)
}

// Set the global pandit policy finder class
pandit.Pandit.PolicyFinder = CustomPolicyFinder

// Add middleware *after* setting the policy finder class
app.use(pandit())

BKON Powered

Developed at BKON