2.0.16 • Published 12 months ago

@iamjs/express v2.0.16

Weekly downloads
-
License
MIT
Repository
github
Last release
12 months ago

@iamjs/express

Overview

The @iamjs/express package provides Express middleware for the iamjs library, enabling easy integration of role-based access control (RBAC) into your Express applications. This middleware simplifies the process of managing permissions and authorizing requests based on user roles.

Table of Contents

Installation

To use @iamjs/express, you need to install both the core library and the Express middleware:

npm install @iamjs/core @iamjs/express
# or
yarn add @iamjs/core @iamjs/express
# or
pnpm add @iamjs/core @iamjs/express
# or
bun add @iamjs/core @iamjs/express

Key Features

  • Easy integration with Express applications
  • Flexible role-based access control
  • Support for custom success and error handling
  • TypeScript support for improved type safety
  • Activity logging for auditing and monitoring

Usage

Basic Authorization

Here's a basic example of how to use the @iamjs/express middleware for authorization:

import express from 'express';
import { Role, Schema } from '@iamjs/core';
import { ExpressRoleManager } from '@iamjs/express';

// Define a role
const userRole = new Role({
  name: 'user',
  config: {
    posts: {
      base: 'crudl',
      custom: {
        publish: true
      }
    },
    comments: {
      base: 'crud-'
    }
  }
});

// Create a schema with roles
const schema = new Schema({
  roles: { user: userRole }
});

// Initialize the ExpressRoleManager
const roleManager = new ExpressRoleManager({
  schema,
  onError: (_err, _req, res) => {
    res.status(403).json({ error: 'Access denied' });
  },
  onSuccess: (_req, _res, next) => {
    next();
  }
});

const app = express();

// Use the middleware to protect a route
app.get('/posts',
  roleManager.check({
    resources: 'posts',
    actions: ['read', 'list'],
    role: 'user'
  }),
  (req, res) => {
    res.json({ message: 'Posts retrieved successfully' });
  }
);

app.listen(3000, () => {
  console.log('Server running on http://localhost:3000');
});

In this example, we define a user role with specific permissions for posts and comments resources. The ExpressRoleManager is then used to check if the user has the required permissions to access the /posts route.

Advanced Usage with Dynamic Role Construction

For more complex scenarios, you can dynamically construct roles based on request data:

import express from 'express';
import { Role, Schema } from '@iamjs/core';
import { ExpressRoleManager } from '@iamjs/express';

// ... (previous role and schema setup)

const app = express();

// Middleware to attach user permissions to the request
const attachUserPermissions = (req, res, next) => {
  // In a real app, you'd fetch this from a database or JWT
  req.userPermissions = userRole.toObject();
  next();
};

// Initialize the ExpressRoleManager
const roleManager = new ExpressRoleManager({
  schema,
  onError: (_err, _req, res) => {
    res.status(403).json({ error: 'Access denied' });
  }
});

app.get('/posts',
  attachUserPermissions,
  roleManager.check({
    resources: 'posts',
    actions: ['read', 'list'],
    strict: true,
    construct: true,
    data: async (req) => req.userPermissions
  }),
  (req, res) => {
    res.json({ message: 'Posts retrieved successfully' });
  }
);

This approach allows you to construct the role dynamically based on the user's actual permissions, which could be stored in a database or included in a JWT.

Custom Success and Error Handling

You can customize how the middleware handles successful and failed authorization attempts:

const roleManager = new ExpressRoleManager({
  schema,
  onError: (err, req, res, next) => {
    console.error('Authorization failed:', err);
    res.status(403).json({
      error: 'Access denied',
      details: err.message
    });
  },
  onSuccess: (req, res, next) => {
    console.log('Authorization successful for user:', req.userId);
    next();
  }
});

These handlers give you fine-grained control over the response sent to the client and allow for custom logging or other actions.

TypeScript Support

The @iamjs/express package provides strong TypeScript support. You can use generics to specify the types of your request and response objects:

import { Request, Response, NextFunction } from 'express';

interface CustomRequest extends Request {
  userId: string;
}

const roleManager = new ExpressRoleManager({
  schema,
  onSuccess: <CustomRequest, Response>((req, res, next) => {
    console.log('Authorized user:', req.userId);
    next();
  }),
  onError: <CustomRequest, Response>((err, req, res, next) => {
    console.error(`User ${req.userId} unauthorized:`, err);
    res.status(403).json({ error: 'Access denied' });
  })
});

app.get('/posts',
  roleManager.check<CustomRequest, Response>({
    resources: 'posts',
    actions: ['read'],
    role: 'user'
  }),
  (req: CustomRequest, res: Response) => {
    res.json({ message: `Posts retrieved for user ${req.userId}` });
  }
);

This ensures type safety throughout your application, reducing the likelihood of runtime errors.

Logging User Activity

The ExpressRoleManager allows you to log user activity, which can be useful for auditing and monitoring:

const roleManager = new ExpressRoleManager({
  schema,
  onError: (_err, _req, res) => {
    res.status(403).json({ error: 'Access denied' });
  },
  async onActivity(data) {
    console.log('User activity:', data);
    // In a real application, you might want to save this to a database
    await saveActivityLog(data);
  }
});

The onActivity handler receives an object with the following properties:

PropertyDescription
actionsThe action(s) that were authorized
resourcesThe resource(s) that were accessed
roleThe role used for authorization
successWhether the authorization was successful
reqThe Express request object (for additional context)

API Reference

ExpressRoleManager

  • constructor(options: ExpressRoleManagerOptions)
  • check(options: CheckOptions): express.RequestHandler

ExpressRoleManagerOptions

  • schema: Schema - The iamjs Schema containing role definitions
  • onError?: (err: Error, req: Request, res: Response, next: NextFunction) => void
  • onSuccess?: (req: Request, res: Response, next: NextFunction) => void
  • onActivity?: (data: ActivityData) => Promise<void> | void

CheckOptions

  • resources: string | string[] - The resource(s) being accessed
  • actions: string[] - The action(s) being performed
  • role?: string - The role to check against (if not using construct)
  • strict?: boolean - Whether to require all specified permissions
  • construct?: boolean - Whether to construct the role dynamically
  • data?: (req: Request) => Promise<object> | object - Function to retrieve role data (if construct is true)

Best Practices

  1. Use Environment-Specific Schemas: Create different schemas for different environments (development, staging, production) to manage permissions effectively across your deployment pipeline.

  2. Implement Role Hierarchies: Utilize role inheritance to create a hierarchy, reducing duplication and simplifying management.

  3. Granular Permissions: Define permissions at a granular level for fine-tuned access control.

  4. Cache Role Data: For improved performance, consider caching role data, especially if you're constructing roles dynamically.

  5. Audit Logs: Implement comprehensive logging using the onActivity handler to maintain an audit trail of all authorization decisions.

  6. Error Handling: Provide clear, informative error messages in your onError handler to aid in debugging and improve user experience.

  7. Regular Reviews: Periodically review and update your role definitions and permissions to ensure they align with your application's evolving security requirements.

Troubleshooting

  • Authorization Always Fails: Ensure that the role name in check() matches the role defined in your schema.
  • TypeScript Errors: Make sure you're using the correct types for your request and response objects.
  • Performance Issues: If you're seeing slow response times, consider caching role data or optimizing your data function in dynamic role construction.

Contributing

We welcome contributions to @iamjs/express! If you'd like to contribute, please:

  1. Fork the repository
  2. Create a new branch for your feature or bug fix
  3. Make your changes and write tests if applicable
  4. Submit a pull request with a clear description of your changes

Please see our Contributing Guide for more detailed information.

License

@iamjs/express is released under the MIT License. See the LICENSE file for more details.

2.0.16

12 months ago

2.0.13

1 year ago

2.0.14

1 year ago

2.0.11

1 year ago

2.0.12

1 year ago

1.0.2

2 years ago

1.0.1

2 years ago

1.0.0

2 years ago

1.0.6

2 years ago

1.0.5

2 years ago

1.0.4

2 years ago

1.0.3

2 years ago

2.0.7

2 years ago

2.0.9

2 years ago

2.0.8

2 years ago

0.4.0

2 years ago

0.3.2

2 years ago

0.3.1

2 years ago

0.3.0

2 years ago

0.2.8

2 years ago

0.2.7

2 years ago

0.2.6

2 years ago

0.2.5

2 years ago

0.2.4

2 years ago

0.2.2

2 years ago

0.2.1

2 years ago

0.2.0

2 years ago