Resource & Data permissions
Check if an action is allowed on a Sequelize object, based on roles
define
Auth settings can be defined on Sequelize models and on attributes (fields) of these models.
If auth is not defined on a field the auth of the model is used.
If no auth setting is found the role 'admin' is used as default.
actions
Five standard actions are recognized: list, view, create, update, delete. Note: list is dubious and will probably may be removed
Extra actions can be defined in the auth; see overrides.
roles
Roles are for now hardcoded. This is done in one file and can easily by upgraded to a more flexible and configurable solution.
For now the role model is:
users
Any parsed user (see mixins) is supposed to have a field role
that is one of the above roles.
If no user or role is found the role 'all' is checked.
mixins
On each model three extra functions are added as mixins
can
can(action, user)
Will check if the user has the role that is required for the action
can will dispatch the check to a function on the model for that action (i.e. a call to can('view', user) will call Model.canView(user)) if it exists. This allows for specific implementations and for non-default actions; see overrides.
If that function is not defined the role is automagically checked on the Models settings.
authorizeData
authorizeData(action, data, user)
Filter the incoming data against the users action rights
toAuthorizedJSON
toJSON(user)
Overwrites the default toJSON. Will return a JSON object that contains only the fields that this user can view.
Add a viewableBy entry to the model nd/or field definition to make this work.
middleware
For convenience these functions exist as express middleware.
can(modelname, action)
Will call the can function on the model with the content of req.user
as the user.
useReqUser()
Will add req.user
as the user to all instances in req.results
. This will then be used by can
and toJSON
to validate
toAuthorizedJSON
Will call the toViewableJSON function on all instances in req.results
with the content of req.user
as the user. I think I will remove this middleware
Overwrites
The auth model allows for some functions to be overwritten.
On a model new actions can be defined after which these can be used in the standard can functions. The example below allows for Argument.can('vote') to be used.
On a field the function authorizeData is used by Model.authorizeData() and model.toAuthorizedJSON(). The OpenStad Ecosystem uses this override for Idea.extraData.
Last updated