This is a proposal for a permission manager for nodejs. It is based on the rbac model.
the main idea is to have a storage for roles, permissions and assignments. The storage can be any storage that implements the storage interface.
it could be a InMemory storage like Javascript DataStructure or any custom dataStructure, database, any, a file, a redis instance, etc.
async function connect(client: Client) {
await client.connect();
const res = await client.query("SELECT $1::text as message", [
"Hello world!",
]);
console.log(res.rows[0].message); // Hello world!
// await client.end();
}
async function main() {
const roleStorage = new SQLRoleStorage(client);
const admin = {
name: "admin",
description: "Admin role",
};
const author = {
name: "author",
description: "Author role",
};
await roleStorage.clear();
await roleStorage.add(admin);
await roleStorage.add(author);
console.log(await roleStorage.get("admin"));
console.log(await roleStorage.getAll());
console.log(await roleStorage.exists("admin"));
await roleStorage.remove("admin");
console.log(await roleStorage.exists("admin"));
await client.end();
}
main(); const permissionStorage = new SQLPermissionStorage(client);
const createPost = {
name: "createPost",
action: "createPost",
subject: "User",
conditions: {
isAuthor: true,
},
inverted: false,
reason: "You are not the author of the post",
};
const updatePost = {
name: "updatePost",
action: "updatePost",
subject: "User",
conditions: {
isAuthor: true,
},
inverted: false,
reason: "You are not the author of the post",
};
await permissionStorage.add(createPost);
await permissionStorage.add(updatePost);
console.log(await permissionStorage.getAll());
console.log(await permissionStorage.exists("createPost"));
await permissionStorage.remove("createPost");
console.log(await permissionStorage.exists("createPost"));
// await permissionStorage.clear();
console.log(await permissionStorage.getAll());
await client.end();
}
async function main() {
const rolePermissionsStorage = new SQLRolePermissionsStorage(client);
rolePermissionsStorage.clear("author");
const newPermission = {
name: "createPost",
action: "createPost",
subject: "User",
conditions: {
isAuthor: true,
},
inverted: false,
reason: "You are not the author of the post",
};
await rolePermissionsStorage.add("author", newPermission);
console.log(await rolePermissionsStorage.getAll("author"));
console.log(await rolePermissionsStorage.has("author", "createPost"));
await rolePermissionsStorage.add("author", {
name: "updatePost",
action: "updatePost",
subject: "Post",
conditions: {
isPublished: true,
},
inverted: false,
reason: "Post is not published",
});
console.log(await rolePermissionsStorage.getAll("author"));
await rolePermissionsStorage.remove("author", "createPost");
console.log(await rolePermissionsStorage.getAll("author"));
await client.end();
}
main();
const assignmentStorage = new AssignmentStorage();
// add new Assignment
assignmentStorage.add("admin", "1");
assignmentStorage.add("Author", "1");
// get all assignments for user
let assignments = assignmentStorage.getByUserId("1");
console.log(assignments);
let adminAssignment = assignmentStorage.get("admin", "1");
let authorAssignment = assignmentStorage.get("Author", "1");
console.log(adminAssignment);
console.log(authorAssignment);To validate Usability of this permission management system, we need to implement some of these storages types:
- InMemoryStorage(in Javascript).
- SQl Storage like Postgres.
- getting user permission should be easy.
- check if user has permission should be fast.
- NoSQL Storage like MongoDB.
- HTTP API (for usage with microservices).
Secondly We need to test integration of the API with servers:
- express.js.
- Nest.js.
import { AssignmentStorage } from "./storage/AssignmentStorage";
import { PermissionStorage } from "./storage/PermissionStorage";
import { RolePermissionsStorage } from "./storage/RolePermissionsStorage";
import { RoleStorage } from "./storage/RoleStorage";
async function main() {
// create new RoleStorage
const roleStorage = new RoleStorage();
// create new PermissionStorage
const permissionStorage = new PermissionStorage();
// create new RolePermissionStorage
const rolePermissionStorage = new RolePermissionsStorage();
// create new AssignmentStorage
const assignmentStorage = new AssignmentStorage();
// create new Role
const newRole = { name: "admin", description: "Administrator" };
await roleStorage.add(newRole);
// create new Permission
const newPermission = {
name: "UpdatePost",
action: "UpdatePost",
subject: "Post",
conditions: {
isPublished: true,
},
inverted: false,
reason: "Post is not published",
};
const permission = await permissionStorage.add(newPermission);
// create new RolePermission
await rolePermissionStorage.add(newRole.name, permission);
// create new Assignment
await assignmentStorage.add(newRole.name, "user1");
// check if Assignment has Role
console.log(await assignmentStorage.hasRole("admin"));
console.log(await assignmentStorage.get("admin", "user1"));
}
main();import { Client } from "pg";
import { SQLAssignmentStorage } from "./postgresStorage/SQLAssignmentStorage";
import { SQLPermissionStorage } from "./postgresStorage/SQLPermissionStorage";
import { SQLRolePermissionsStorage } from "./postgresStorage/SQLRolePermissionsStorage";
import { SQLRoleStorage } from "./postgresStorage/SQLRoleStorage";
async function connect(client: Client) {
await client.connect();
const res = await client.query("SELECT $1::text as message", [
"Hello world!",
]);
console.log(res.rows[0].message); // Hello world!
// await client.end();
}
async function main() {
const client = new Client({
host: "localhost",
database: "casl_db",
user: "postgres_user",
password: "postgres_pass",
});
await connect(client);
// create new RoleStorage
const roleStorage = new SQLRoleStorage(client);
// create new PermissionStorage
const permissionStorage = new SQLPermissionStorage(client);
// create new RolePermissionStorage
const rolePermissionStorage = new SQLRolePermissionsStorage(client);
// create new AssignmentStorage
const assignmentStorage = new SQLAssignmentStorage(client);
// clear all tables
await assignmentStorage.clear();
await rolePermissionStorage.clear("author");
await rolePermissionStorage.clear("admin");
await roleStorage.clear();
await permissionStorage.clear();
const permissionManager = new PermissionManagerv2(
roleStorage,
permissionStorage,
rolePermissionStorage,
assignmentStorage
);
const newPermission = await permissionManager.createPermission({
name: "createPost",
action: "createPost",
subject: "User",
conditions: {
isAuthor: true,
},
inverted: false,
reason: "You are not the author of the post",
});
const newRole = await permissionManager.createRole("author");
console.log(newRole);
await permissionManager.attachPermission(newRole, newPermission);
const user = new User(1, true);
await permissionManager.assign(newRole, user);
const assignment = await permissionManager.getAssignment("author", user);
console.log(assignment); // { user_id: '1', role_name: 'author' }
const permissions = await permissionManager.getPermissions();
console.log(permissions); // [ { name: 'createPost', action: 'createPost', subject: 'User', conditions: { isAuthor: true }, inverted: false, reason: 'You are not the author of the post' } ]
// check if user has permission to createPost
console.log(await permissionManager.hasPermission("1", "createPost")); // true
await client.end();
}
main();import { Ability, AbilityBuilder } from "@casl/ability";
import { Client } from "pg";
import { PermissionType, UserType } from "./PermissionManager";
import { PermissionManagerv2 } from "./PermissionManagerv2";
import { SQLAssignmentStorage } from "./postgresStorage/SQLAssignmentStorage";
import { SQLPermissionStorage } from "./postgresStorage/SQLPermissionStorage";
import { SQLRolePermissionsStorage } from "./postgresStorage/SQLRolePermissionsStorage";
import { SQLRoleStorage } from "./postgresStorage/SQLRoleStorage";
async function connect(client: Client) {
await client.connect();
const res = await client.query("SELECT $1::text as message", [
"Connected!",
]);
console.log(res.rows[0].message); // Connected!
}
class User implements UserType {
constructor(public id: number, public isAuthor: boolean) {}
}
async function main() {
const client = new Client({
host: "localhost",
database: "casl_db",
user: "postgres_user",
password: "postgres_pass",
});
await connect(client);
// create new RoleStorage
const roleStorage = new SQLRoleStorage(client);
// create new PermissionStorage
const permissionStorage = new SQLPermissionStorage(client);
// create new RolePermissionStorage
const rolePermissionStorage = new SQLRolePermissionsStorage(client);
// create new AssignmentStorage
const assignmentStorage = new SQLAssignmentStorage(client);
// clear all tables
await assignmentStorage.clear();
await rolePermissionStorage.clear("author");
await rolePermissionStorage.clear("admin");
await roleStorage.clear();
await permissionStorage.clear();
const permissionManager = new PermissionManagerv2(
roleStorage,
permissionStorage,
rolePermissionStorage,
assignmentStorage
);
const newPermission = await permissionManager.createPermission({
name: "createPost",
action: "createPost",
subject: "User",
conditions: {
isAuthor: true,
},
inverted: false,
reason: "You are not the author of the post",
});
const newRole = await permissionManager.createRole("author");
console.log(newRole);
await permissionManager.attachPermission(newRole, newPermission);
const user = new User(1, true);
await permissionManager.assign(newRole, user);
const permissions = await permissionManager.getPermissions();
const ability = defineAbilityFor(user, permissions);
// test ability of user to CreatePost
console.log(ability.can("createPost", user)); // true
// check if user has permission to createPost
console.log(await permissionManager.hasPermission("1", "createPost")); // true
await client.end();
}
function defineAbilityFor(user: UserType, permissions: PermissionType[]) {
const { can, cannot, build } = new AbilityBuilder(Ability);
// Add permissions to the builder
permissions.forEach((permission) => {
if (permission.inverted) {
cannot(permission.name, permission.subject, permission.conditions);
} else {
can(permission.name, permission.subject, permission.conditions);
}
});
return build();
}
main();