View Source Ash.Policy.Check.Builtins (ash v2.0.0-rc.13)
The global authorization checks built into ash
Link to this section Summary
Functions
This check is true when the action name matches the provided action name
This check is true when the action type matches the provided type
This check is true when the value of the specified attribute of the actor equals the specified value
This check is true when there is an actor specified, and false when the actor is nil
This check always passes
This check is true when a field on the record matches a specific filter
This check is true when attribute changes correspond to the provided options.
This check is true when the specified relationship is changing
This check is true when the specified relationships are changing
This check is true when the value of the specified key or path in the changeset or query context equals the specified value.
This check is true when the field provided is being referenced anywhere in a filter statement.
This check is true when the field or relationship, or path to field, is being loaded and false when it is not
This check never passes.
This check passes if the data relates to the actor via the specified relationship or path of relationships
This check is true when the specified relationship is being changed to the current actor.
This check is true when the field is being selected and false when it is not
Link to this section Functions
@spec action(atom()) :: Ash.Policy.Check.ref()
This check is true when the action name matches the provided action name
This is a very common pattern, allowing action-specific policies.
@spec action_type(Ash.Resource.Actions.action_type()) :: Ash.Policy.Check.ref()
This check is true when the action type matches the provided type
This is useful for writing policies that apply to all actions of a given type.
For example:
policy action_type(:read) do
authorize_if relates_to_actor_via(:owner)
end
@spec actor_attribute_equals(atom(), any()) :: Ash.Policy.Check.ref()
This check is true when the value of the specified attribute of the actor equals the specified value
This check will never pass if the actor does not have the specified key. For example,
actor_attribute_equals(:missing_key, nil)
@spec actor_present() :: Ash.Policy.Check.ref()
This check is true when there is an actor specified, and false when the actor is nil
@spec always() :: Ash.Policy.Check.ref()
This check always passes
Can be useful for "deny-list" style authorization. For example:
policy action_type(:read) do
forbid_if actor_attribute_equals(:disabled, true)
forbid_if actor_attribute_equals(:active, false)
authorize_if always()
end
Without that last clause, the policy would never pass.
@spec attribute(atom(), any()) :: Ash.Policy.Check.ref()
This check is true when a field on the record matches a specific filter
This check is true when attribute changes correspond to the provided options.
Provide a keyword list of options or just an atom representing the attribute.
For example:
# if you are changing both first name and last name
changing_attributes([:first_name, :last_name])
# if you are changing first name to fred
changing_attributes(first_name: [to: "fred"])
# if you are changing last name from bob
changing_attributes(last_name: [from: "bob"])
# if you are changing :first_name at all, last_name from "bob" and middle name from "tom" to "george"
changing_attributes([:first_name, last_name: [from: "bob"], middle_name: [from: "tom", to: "george]])
This check is true when the specified relationship is changing
This check is true when the specified relationships are changing
This check is true when the value of the specified key or path in the changeset or query context equals the specified value.
@spec filtering_on(atom() | [atom()], atom()) :: Ash.Policy.Check.ref()
This check is true when the field provided is being referenced anywhere in a filter statement.
This applies to related filters as well. For example:
policy actor_attribute_equals(:is_admin, false) do
forbid_if filtering_on(:email)
# a path can be provided as well
forbid_if filtering_on([:owner], :email)
end
The first will return true in situations like:
Ash.Query.filter(User, email == "blah")
Ash.Query.filter(Tweet, author.email == "blah")
And the second will return true on queries like
Ash.Query.filter(Post, owner.email == "blah")
Ash.Query.filter(Comment, post.owner.email == "blah")
@spec loading(atom()) :: Ash.Policy.Check.ref()
This check is true when the field or relationship, or path to field, is being loaded and false when it is not
This is always false for create/update/destroy actions, because you cannot load fields on those action types.
@spec never() :: Ash.Policy.Check.ref()
This check never passes.
There is, generally speaking, no reason to use this, but it exists for completeness sake.
@spec relates_to_actor_via(atom()) :: Ash.Policy.Check.ref()
This check passes if the data relates to the actor via the specified relationship or path of relationships
For updates & destroys, this check will apply to the original data, i.e before the changes are applied.
For creates this check is very unlikely to apss. This is because relationships are modified after authorization happens, not before.
This check is true when the specified relationship is being changed to the current actor.
This only supports belongs_to
relationships at the moment, and will detect two cases:
- the
source_attribute
is being changed directly - the relationship is being changed with
on_lookup?: :relate
, and a single input is being provided.
@spec selecting(atom()) :: Ash.Policy.Check.ref()
This check is true when the field is being selected and false when it is not
This won't affect filters placed on this resource, so you may also want to either
- Mark the given field as
filterable? false
- Add another check for
filtering_on(:field)
For example:
policy action_type(:read) do
# The actor can read and filter on their own email
authorize_if expr(id == ^actor(:id))
# No one else can select or filter on their email
forbid_if selecting(:email)
forbid_if filtering_on(:email)
# Otherwise, the policy passes
authorize_if always()
end