npm package discovery and stats viewer.

Discover Tips

  • General search

    [free text search, go nuts!]

  • Package details

    pkg:[package-name]

  • User packages

    @[username]

Sponsor

Optimize Toolset

I’ve always been into building performant and accessible sites, but lately I’ve been taking it extremely seriously. So much so that I’ve been building a tool to help me optimize and monitor the sites that I build to make sure that I’m making an attempt to offer the best experience to those who visit them. If you’re into performant, accessible and SEO friendly sites, you might like it too! You can check it out at Optimize Toolset.

About

Hi, 👋, I’m Ryan Hefner  and I built this site for me, and you! The goal of this site was to provide an easy way for me to check the stats on my npm packages, both for prioritizing issues and updates, and to give me a little kick in the pants to keep up on stuff.

As I was building it, I realized that I was actually using the tool to build the tool, and figured I might as well put this out there and hopefully others will find it to be a fast and useful way to search and browse npm packages as I have.

If you’re interested in other things I’m working on, follow me on Twitter or check out the open source projects I’ve been publishing on GitHub.

I am also working on a Twitter bot for this site to tweet the most popular, newest, random packages from npm. Please follow that account now and it will start sending out packages soon–ish.

Open Software & Tools

This site wouldn’t be possible without the immense generosity and tireless efforts from the people who make contributions to the world and share their work via open source initiatives. Thank you 🙏

© 2026 – Pkg Stats / Ryan Hefner

@er-raj-aryan/react-access-policy

v0.1.2

Published

Tiny, declarative role & permission (RBAC) helper for React apps.

Readme

react-access-policy

Tiny, declarative role & permission (RBAC) helper for React apps.
Built to keep authorization logic out of JSX, easy to reason about, and enterprise-ready.

Simple for users. Powerful under the hood.


Why react-access-policy?

Most apps end up with messy permission checks like:

{user?.roles?.includes("ADMIN") && user?.permissions?.includes("EDIT_USER") && (
  <Button>Edit</Button>
)}

This package lets you write clean, declarative access rules instead.


Install

npm install react-access-policy
# or
yarn add react-access-policy
# or
pnpm add react-access-policy

Core Concepts

  • Rolesadmin, manager, viewer
  • Permissionsuser.view, user.edit, user.delete
  • Policies → map roles to permissions
  • AccessProvider → supplies access rules to your app
  • Can / useCan → check permissions anywhere

1. Define Access Policies

Create a single source of truth for all permissions.

// access-policies.ts
import { definePolicies } from "react-access-policy";

export const policies = definePolicies({
  admin: {
    can: "*", // full access
  },
  manager: {
    can: ["user.view", "user.edit"],
    inherits: ["viewer"],
  },
  viewer: {
    can: ["user.view"],
  },
});

Features supported

  • ✅ Role inheritance
  • ✅ Wildcard permissions (*)
  • ✅ Unlimited roles & permissions
  • ✅ Circular inheritance safe

2. Wrap Your Application

Provide user roles and policies once at the root.

// App.tsx / _app.tsx / layout.tsx
import { AccessProvider } from "react-access-policy";
import { policies } from "./access-policies";

export default function App({ children }: { children: React.ReactNode }) {
  const user = {
    roles: ["manager"], // from API / JWT / Keycloak
  };

  return (
    <AccessProvider policies={policies} roles={user.roles}>
      {children}
    </AccessProvider>
  );
}

3. Use <Can /> Component (Recommended)

Declarative, readable, and clean.

import { Can } from "react-access-policy";

function UserActions() {
  return (
    <>
      <Can I="user.view">
        <p>User details are visible</p>
      </Can>

      <Can I="user.edit">
        <button>Edit User</button>
      </Can>

      <Can I="user.delete" fallback={null}>
        <button style={{ color: "red" }}>Delete User</button>
      </Can>
    </>
  );
}

4. Use useCan() Hook

Perfect for conditional logic.

import { useCan } from "react-access-policy";

function Toolbar() {
  const canEdit = useCan("user.edit");
  const canViewOrEdit = useCan(["user.view", "user.edit"], "any");

  return (
    <>
      {canViewOrEdit && <button>View</button>}
      {canEdit && <button>Edit</button>}
    </>
  );
}

5. Check Multiple Permissions

Require ALL permissions (default)

<Can I={["user.view", "user.edit"]}>
  <button>View & Edit</button>
</Can>

Require ANY permission

<Can I={["user.edit", "user.delete"]} mode="any">
  <button>Edit or Delete</button>
</Can>

6. Render-Prop Pattern (Advanced)

When you need full control:

<Can I="user.edit">
  {(allowed) =>
    allowed ? <button>Edit</button> : <span>Read only</span>
  }
</Can>

API Reference

<AccessProvider />

<AccessProvider
  policies={PolicyConfig}
  roles={string[]}
>
  {children}
</AccessProvider>

<Can />

| Prop | Type | Description | | ---------- | ------------------------------------- | --------------------------- | | I | string \| string[] | Permission(s) to check | | mode | "all" \| "any" | Permission check mode | | fallback | ReactNode | Rendered when access denied | | children | ReactNode \| (allowed) => ReactNode | Content |


useCan(permission, mode?)

const allowed = useCan("user.edit");

Works Great With

  • ✅ Keycloak
  • ✅ Auth0
  • ✅ JWT-based auth
  • ✅ Django / Node / Laravel backends
  • ✅ Enterprise dashboards

Design Philosophy

  • UI should not know about roles
  • Permissions are declarative
  • No magic strings scattered across components
  • One config → entire app protected

Roadmap

  • [ ] Attribute-based access (ABAC)
  • [ ] Resource-level permissions
  • [ ] Dev warnings for missing policies
  • [ ] DevTools inspector
  • [ ] SSR helpers

License

MIT © Er Raj Aryan