defmodule Permit do
@moduledoc ~S"""
Permit is an extensible, DSL-less library allowing the coder to define authorization rules in plain Elixir.
It can run on its own, but is also integrated with widely used Elixir libraries and frameworks.
## Libraries and repositories
The Permit library can run on its own as a standalone library, but it can also be used alongside Ecto and Phoenix integrations.
* [`Permit`](https://github.com/curiosum-dev/permit) - provides a syntax to define permissions to perform actions (defined as atoms) on objects (structs) by a specific user (subject) using functions or keyword lists, matching against an object's attributes.
* [`Permit.Ecto`](https://github.com/curiosum-dev/permit_ecto) - provides a resolver using Ecto to build and execute singular or collection Ecto queries based on defined permissions, also extending the syntax with a possibility to define more sophisticated permissions convertible to Ecto queries.
* [`Permit.Phoenix`](https://github.com/curiosum-dev/permit_phoenix) - uses `Permit` and `Permit.Ecto` to retrieve records via loader functions or queries generated by `Permit.Ecto` (if installed), based on data accessible in current context defined by a Plug `conn` or a LiveView `socket`.
## Paradigm and Extensibility
At the core of authorization resolution, there's always the question of:
* **What action** is being performed (for Phoenix, it's most likely a controller action)
* **What subject** performs the action (usually, the current user)
* **What object** the action is performed on
Once answers to these three questions are found, authorization or lack thereof is determined based on the set of permission definitions, defined as [expressions in disjunctive normal form (DNF)](https://en.wikipedia.org/wiki/Disjunctive_normal_form) expressions - that is, a set of sufficient conditions, with each condition defined as a conjunction of predicates, for example:
```text
Subject | Action | Object
--------------------------------------------
A **user** can | **update** | an **article**
...if user's ID = article author's ID AND the article is not published,
...if user's ID = article author's ID AND the article type is a live ticker,
...if user's role is editor-in-chief AND the article is not published,
...if user's role is editor-in-chief ID AND the article type is a live ticker,
...or if the use has a super-admin role.
```
Which, in Permit syntax, is translated to the following. Note the usage of pattern matching on the current user's (subject's) attributes, which allows to create function clauses for each user role. Permit does not enforce a specific structure of the `can/1` function, but as pattern matching usage is convenient in this case, it is naturally encouraged.
```elixir
def can(%User{role: :editor_in_chief} = _current_user) do
permit()
|> update(Article, state: {:not, :published})
|> update(Article, type: :live_ticker)
end
def can(%User{id: user_id} = _current_user) do
permit()
|> update(Article, author_id: user_id, state: {:not, :published})
|> update(Article, author_id: user_id, type: :live_ticker)
end
def can(%User{id: user_id, role: :super_admin} = _current_user) do
permit()
|> update(Article)
end
```
The library is written with extensibility in mind. Analogously to Phoenix interoperatbility, the developer may define their own integration with different frameworks.
For more details on interoperability, see `Permit.ResolverBase`.
## Configuration and usage
For more details on Ecto and Phoenix usage, visit [`permit_ecto`](https://hexdocs.pm/permit_ecto) and [`permit_phoenix`](https://hexdocs.pm/permit_phoenix) documentations, respectively.
### Configure & define your permissions
```elixir
defmodule MyApp.Authorization do
use Permit, permissions_module: MyApp.Permissions
end
defmodule MyApp.Permissions do
use Permit.Permissions, actions_module: Permit.Actions.CrudActions
def can(%{role: :admin} = user) do
permit()
|> all(MyApp.Blog.Article)
end
def can(%{id: user_id} = user) do
permit()
|> all(MyApp.Blog.Article, author_id: user_id)
|> read(MyApp.Blog.Article)
end
def can(user), do: permit()
end
```
Note that in the permission definitions module the `read` function is generated based on configuration provided as the `:actions_module` option - in this case, `CrudActions` generates `create`, `read`, `update` and `delete`. For more on this, see `Permit.Actions` and `Permit.Permissions`.
### Check a user's authorization to perform an action on a resource
```elixir
iex(1)> import MyApp.Authorization
iex(2)> can(%MyApp.User{id: 1}) |> read?(%MyApp.Article{author_id: 1})
true
iex(3)> can(%MyApp.User{id: 1}) |> read?(%MyApp.Article{author_id: 2})
true
iex(4)> can(%MyApp.User{id: 1}) |> update?(%MyApp.Article{author_id: 2})
false
iex(4)> can(%MyApp.User{role: :admin}) |> delete?(%MyApp.Article{author_id: 2})
true
```
Functions such as `MyApp.Authorization.read?/2`, `MyApp.Authorization.update?/2`, etc. are also generated based on the `:actions_module` option. See more in `Permit.Actions`.
"""
alias Permit.Permissions
alias Permit.SubjectMapping
alias Permit.Types
@callback resolver_module :: Types.resolver_module()
defmacro __using__(opts) do
alias Permit.Types
permissions_module = Keyword.fetch!(opts, :permissions_module)
predicates =
Macro.expand(permissions_module, __CALLER__).actions_module()
|> Permit.Actions.list_groups()
|> Enum.map(&add_predicate_name/1)
|> Enum.map(fn {predicate, name} ->
quote do
@spec unquote(predicate)(Permit.Context.t(), Types.object_or_resource_module()) ::
boolean()
def unquote(predicate)(authorization, resource) do
Permit.verify_record(authorization, resource, unquote(name))
end
end
end)
quote do
@behaviour Permit
def permissions_module do
unquote(permissions_module)
end
require unquote(permissions_module)
def actions_module,
do: unquote(permissions_module).actions_module()
@spec can(SubjectMapping.t()) :: Permit.Context.t()
def can(nil),
do: raise("Unable to create permit authorization for nil role/user")
def can(who) do
Permit.can(who, unquote(permissions_module))
end
@impl Permit
def resolver_module, do: Permit.Resolver
defoverridable resolver_module: 0
unquote(predicates)
end
end
@doc false
def can(who, permissions_module) do
who
|> SubjectMapping.subjects()
|> Stream.map(&permissions_module.can/1)
|> Enum.reduce(&Permissions.concatenate(&1, &2))
|> then(&%Permit.Context{subject: (is_struct(who) && who) || nil, permissions: &1})
end
@doc false
@spec verify_record(Permit.Context.t(), Types.object_or_resource_module(), Types.action_group()) ::
boolean()
def verify_record(
%{
permissions: permissions,
subject: subject
} = _authorization,
record,
action
) do
Permissions.granted?(permissions, action, record, subject)
end
defp add_predicate_name(atom),
do: {(Atom.to_string(atom) <> "?") |> String.to_atom(), atom}
end