Authorization
While authentication is handled by the outer API layer, authorization can, and indeed should, be handled by our domain.
Authorization can be considered business logic, and that's what our domain is all about, business logic! Our domain describes when actions should and should not be allowed, and those decisions can depend on user attributes as well, such as id or role.
Say we have an action that creates and updates widgets. One very common bit of authorization is that regular users can only update their own widgets, where as admins can update all widgets.
Let's write this:
const actions = {
createWidget: (state, payload) => {
const { user } = payload
if (!user) throw new Error('userMissing')
return [{
type: 'WidgetCreated',
user: payload.user,
at: Date.now(),
}]
},
updateWidget: (state, payload) => {
const { user } = payload
if (!user) throw new Error('userMissing')
if (user.role !== 'admin' && user.id !== state.userId)
throw new Error('unauthorized')
// ^ authorization logic
return [{
type: 'WidgetUpdated',
user: payload.user,
at: Date.now(),
}]
},
}
module.exports = actionsconst initialState = {}
const reducer = (state, event) => {
const {
user,
at,
} = event
switch (event.type) {
case 'WidgetCreated':
return {
userId: user.id,
updatedAt: at,
}
case 'WidgetUpdated':
return {
updatedAt: at,
}
default:
return state
}
}
module.exports = (events, state=initialState) => events.reduce(reducer, state)What are we doing here?
Let's start with the
createWidgetaction. We check to make sure the payload contains a user object and if it does, we make sure to include the user in the generated event.Then in the reducer - whenever we receive a
WidgetCreatedevent, we store theuserIdso we can refer back to it later.Finally, whenever the
updateWidgetaction is called, we check to make sure that the caller's id matches theuserIdwe stored earlier (or if caller is an admin) and if not, we throw anunauthorizederror.
Very simple authorization logic and it fits very neatly into our domain.
Last updated
Was this helpful?