npm package discovery and stats viewer.

Discover Tips

  • General search

    [free text search, go nuts!]

  • Package details

    pkg:[package-name]

  • User packages

    @[username]

Sponsor

Optimize Toolset

I’ve always been into building performant and accessible sites, but lately I’ve been taking it extremely seriously. So much so that I’ve been building a tool to help me optimize and monitor the sites that I build to make sure that I’m making an attempt to offer the best experience to those who visit them. If you’re into performant, accessible and SEO friendly sites, you might like it too! You can check it out at Optimize Toolset.

About

Hi, 👋, I’m Ryan Hefner  and I built this site for me, and you! The goal of this site was to provide an easy way for me to check the stats on my npm packages, both for prioritizing issues and updates, and to give me a little kick in the pants to keep up on stuff.

As I was building it, I realized that I was actually using the tool to build the tool, and figured I might as well put this out there and hopefully others will find it to be a fast and useful way to search and browse npm packages as I have.

If you’re interested in other things I’m working on, follow me on Twitter or check out the open source projects I’ve been publishing on GitHub.

I am also working on a Twitter bot for this site to tweet the most popular, newest, random packages from npm. Please follow that account now and it will start sending out packages soon–ish.

Open Software & Tools

This site wouldn’t be possible without the immense generosity and tireless efforts from the people who make contributions to the world and share their work via open source initiatives. Thank you 🙏

© 2026 – Pkg Stats / Ryan Hefner

access-control-js

v0.3.0

Published

A lightweight, type-safe access control library for TypeScript applications.

Readme

Access Control JS

A lightweight, type-safe access control library for TypeScript applications. Designed to manage UI elements and actions based on a permission policy — so you can show, hide, or restrict features declaratively without scattering permission logic across your codebase. Supports both server-side (stateless) and client-side (reactive) environments.

Installation

npm install access-control-js

Features

  • Type-Safe: Fully typed resources and actions based on your configuration.
  • Isomorphic: Works on both server (Node.js/Next.js) and client (React/Vanilla JS).
  • Reactive: Built-in subscription store for UI updates.
  • Flexible: Supports Role-Based (RBAC) and Attribute-Based (ABAC) access control.

Recommended Folder Structure

@/lib/access-control/
  resources.ts   ← your resource & action config
  policy.ts      ← policy builder
  factory.ts     ← access control instance (client or server)
  index.ts       ← barrel export

Usage

Step 1 — Define Resources & Actions

// @/lib/access-control/resources.ts
export const config = {
  posts: ['read', 'create', 'update', 'delete'],
  comments: ['create', 'delete'],
  admin: ['manage_users', 'view_logs'],
} as const;

export type AppConfig = typeof config;

Step 2 — Define Your Policy

// @/lib/access-control/policy.ts
import { definePolicy } from 'access-control-js';
import { type AppConfig } from './resources';

export const policy = definePolicy<AppConfig>()
  .allow('posts', ['read', 'create'])
  .deny('posts', ['delete'])
  .allow('comments', ['*'])
  .build();

Policy Builder API

| Method | Signature | Description | |---|---|---| | definePolicy | definePolicy<T>() | Creates a new typed PolicyBuilder | | .allow | .allow(resource, actions, contexts?) | Adds an allow statement | | .deny | .deny(resource, actions, contexts?) | Adds a deny statement | | .build | .build() | Returns the final TAccessControlPolicy<T> array |


Step 3 — Create the Factory

Pick one depending on your environment.

Client-Side (Vanilla JS / React)

Use createAccessControlStore to create a reactive store that can be updated after login.

// @/lib/access-control/factory.ts
import { createAccessControlStore } from 'access-control-js';
import { type AppConfig } from './resources';
import { policy } from './policy';

export const authStore = createAccessControlStore<AppConfig>(policy);

Check permissions:

import { authStore } from '@/lib/access-control/factory';

const { can } = authStore.getSnapshot();

can('posts', 'create'); // true | false

Update policy after login:

import { authStore } from '@/lib/access-control/factory';

async function login() {
  const user = await api.login();
  authStore.updatePolicy(user.policy);
}

Subscribe to policy changes:

import { authStore } from '@/lib/access-control/factory';

const updateUI = () => {
  const { can } = authStore.getSnapshot();
  const btn = document.getElementById('delete-btn');
  btn.style.display = can('posts', 'delete') ? 'block' : 'none';
};

updateUI();
authStore.subscribe(updateUI);

// Later, when policy updates...
authStore.updatePolicy(newPolicy); // UI updates automatically

createAccessControlStore Store API

| Method | Signature | Description | |---|---|---| | updatePolicy | updatePolicy(policy, defaultContext?, options?) | Replaces the policy, optionally updating default context and loading state | | setLoading | setLoading(boolean) | Sets isLoading state and notifies subscribers | | subscribe | subscribe(listener) | Registers a change listener; returns an unsubscribe function | | getSnapshot | getSnapshot() | Returns a stable snapshot with can, canAll, canAny, canThese, policy, isLoading |


Server-Side (API Routes / Server Components)

Use getAccessControl for stateless, per-request environments.

// @/lib/access-control/factory.ts
import { getAccessControl } from 'access-control-js';
import { type AppConfig } from './resources';
import { policy } from './policy';

export const ac = getAccessControl<AppConfig>(policy);

Use in an API route or Server Component:

import { ac } from '@/lib/access-control/factory';

export async function POST(req: Request) {
  if (!ac.can('posts', 'create')) {
    return new Response('Forbidden', { status: 403 });
  }

  // perform action...
}

getAccessControl API

| Method | Signature | Description | |---|---|---| | can | can(resource, action, context?) | Returns true if the action is allowed | | canAll | canAll(resource, actions[], context?) | Returns true if all actions are allowed | | canAny | canAny(resource, actions[], context?) | Returns true if any action is allowed | | canThese | canThese(checks[]) | Returns a Record<action, boolean> for each check | | policy | policy | The policy array the instance was created with | | isLoading | isLoading | Always false for stateless instances |


Step 4 — Merging Policies

Combine a local static policy with a remote one fetched from your backend.

// @/lib/access-control/policy.ts
import { definePolicy, mergePolicies, type TAccessControlPolicy } from 'access-control-js';
import { type AppConfig } from './resources';

// 1. Local base policy
const basePolicy = definePolicy<AppConfig>()
  .allow('posts', ['read'])
  .build();

// 2. Fetch remote policy (e.g., from DB or API)
const remotePolicy: TAccessControlPolicy<AppConfig> = await api.getPolicy();

// 3. Merge — last policy takes precedence on overlaps
export const policy = mergePolicies(basePolicy, remotePolicy);

| Function | Signature | Description | |---|---|---| | mergePolicies | mergePolicies(...policies) | Flattens multiple policy arrays into one |


Advanced

Default Context (ABAC)

Pass a default context that is automatically merged into every permission check. Useful for multi-tenant apps.

// Server-side
const ac = getAccessControl(policy, { defaultContext: { churchId: '123' } });
ac.can('posts', 'read');                     // uses { churchId: '123' }
ac.can('posts', 'read', { role: 'admin' });  // uses { churchId: '123', role: 'admin' }

// Client-side — set at creation
const authStore = createAccessControlStore<AppConfig>(policy, { defaultContext: { churchId: '123' } });

// Update context alongside policy
authStore.updatePolicy(newPolicy, { churchId: '456' });

Loading State (UI)

// Set initial loading state at creation
const store = createAccessControlStore([], { initialIsLoading: true });

// Or set it after creation
store.setLoading(true);

// In React
const { isLoading, can } = useAccessControl();
if (isLoading) return <Spinner />;

// Update policy and turn off loading in one go
store.updatePolicy(newPolicy, undefined, { isLoading: false });

Result Caching

createAccessControlStore caches can() results by default. When multiple components call the same check (e.g. can('posts', 'edit')) during the same render cycle, the result is served from an in-memory cache instead of re-evaluating the policy each time.

The cache is scoped to the current snapshot — it is discarded automatically whenever updatePolicy() or setLoading() is called, so results are always consistent with the active policy.

// Caching is on by default — no config needed
const authStore = createAccessControlStore<AppConfig>(policy);

// Explicitly disable if you need fresh evaluation on every call
const authStore = createAccessControlStore<AppConfig>(policy, { cache: false });

Note: Caching only applies to createAccessControlStore. getAccessControl is stateless and does not cache.

Conflict Resolution

By default, any deny rule at the highest specificity blocks access (denyWins). You can change this:

| Strategy | Description | |---|---| | denyWins (default) | Any deny rule at the highest specificity blocks access | | firstWins | The first matching rule in the policy array determines the result | | lastWins | The last matching rule in the policy array determines the result |

const ac = getAccessControl(policy, { conflictResolution: 'lastWins' });

AccessControlOptions

| Option | Type | Default | Description | |---|---|---|---| | defaultContext | Record<string, any> | undefined | Merged into every can() call automatically | | conflictResolution | 'denyWins' \| 'firstWins' \| 'lastWins' | 'denyWins' | Strategy for resolving conflicting allow/deny rules | | initialIsLoading | boolean | false | Initial loading state for the store (only used by createAccessControlStore) | | cache | boolean | true | Cache can() results within each snapshot; auto-invalidated on updatePolicy()/setLoading() (only used by createAccessControlStore) |


Usage with Frameworks

The examples below assume authStore is already exported from @/lib/access-control/factory.ts.

React

// @/lib/access-control/factory.ts (add to existing file)
import { useSyncExternalStore } from 'react';

export const useAccessControl = () =>
  useSyncExternalStore(authStore.subscribe, authStore.getSnapshot);
import { useAccessControl } from '@/lib/access-control/factory';

export const CreatePostButton = () => {
  const { can, isLoading } = useAccessControl();

  if (isLoading) return <Spinner />;
  if (!can('posts', 'create')) return null;

  return <button>Create Post</button>;
};

Vue

// composables/useAccessControl.ts
import { shallowRef, onUnmounted } from 'vue';
import { authStore } from '@/lib/access-control/factory';

export const useAccessControl = () => {
  const snapshot = shallowRef(authStore.getSnapshot());

  const unsubscribe = authStore.subscribe(() => {
    snapshot.value = authStore.getSnapshot();
  });

  onUnmounted(unsubscribe);

  return snapshot;
};
<!-- CreatePostButton.vue -->
<script setup lang="ts">
import { useAccessControl } from '@/composables/useAccessControl';

const ac = useAccessControl();
</script>

<template>
  <span v-if="ac.isLoading">Loading...</span>
  <button v-else-if="ac.can('posts', 'create')">Create Post</button>
</template>