在线时间:8:00-16:00
迪恩网络APP
随时随地掌握行业动态
扫描二维码
关注迪恩网络微信公众号
开源软件名称(OpenSource Name):php-casbin/laravel-authz开源软件地址(OpenSource Url):https://github.com/php-casbin/laravel-authz开源编程语言(OpenSource Language):PHP 100.0%开源软件介绍(OpenSource Introduction):Laravel AuthorizationLaravel-authz is an authorization library for the laravel framework. It's based on Casbin, an authorization library that supports access control models like ACL, RBAC, ABAC. All you need to learn to use InstallationRequire this package in the
The Add the ServiceProvider in 'providers' => [
/*
* Package Service Providers...
*/
Lauthz\LauthzServiceProvider::class,
] The Enforcer facade is also Add the Facade in 'aliases' => [
// ...
'Enforcer' => Lauthz\Facades\Enforcer::class,
] To publish the config, run the vendor publish command:
This will create a new model config file named To migrate the migrations, run the migrate command:
This will create a new table named UsageQuick startOnce installed you can do stuff like this: use Enforcer;
// adds permissions to a user
Enforcer::addPermissionForUser('eve', 'articles', 'read');
// adds a role for a user.
Enforcer::addRoleForUser('eve', 'writer');
// adds permissions to a rule
Enforcer::addPolicy('writer', 'articles','edit'); You can check if a user has a permission like this: // to check if a user has permission
if (Enforcer::enforce("eve", "articles", "edit")) {
// permit eve to edit articles
} else {
// deny the request, show an error
} Using Enforcer ApiIt provides a very rich api to facilitate various operations on the Policy: Gets all roles: Enforcer::getAllRoles(); // ['writer', 'reader'] Gets all the authorization rules in the policy.: Enforcer::getPolicy(); Gets the roles that a user has. Enforcer::getRolesForUser('eve'); // ['writer'] Gets the users that has a role. Enforcer::getUsersForRole('writer'); // ['eve'] Determines whether a user has a role. Enforcer::hasRoleForUser('eve', 'writer'); // true or false Adds a role for a user. Enforcer::addRoleForUser('eve', 'writer'); Adds a permission for a user or role. // to user
Enforcer::addPermissionForUser('eve', 'articles', 'read');
// to role
Enforcer::addPermissionForUser('writer', 'articles','edit'); Deletes a role for a user. Enforcer::deleteRoleForUser('eve', 'writer'); Deletes all roles for a user. Enforcer::deleteRolesForUser('eve'); Deletes a role. Enforcer::deleteRole('writer'); Deletes a permission. Enforcer::deletePermission('articles', 'read'); // returns false if the permission does not exist (aka not affected). Deletes a permission for a user or role. Enforcer::deletePermissionForUser('eve', 'articles', 'read'); Deletes permissions for a user or role. // to user
Enforcer::deletePermissionsForUser('eve');
// to role
Enforcer::deletePermissionsForUser('writer'); Gets permissions for a user or role. Enforcer::getPermissionsForUser('eve'); // return array Determines whether a user has a permission. Enforcer::hasPermissionForUser('eve', 'articles', 'read'); // true or false See Casbin API for more APIs. Using a middlewareThis package comes with protected $routeMiddleware = [
// ...
// a basic Enforcer Middleware
'enforcer' => \Lauthz\Middlewares\EnforcerMiddleware::class,
// an HTTP Request Middleware
'http_request' => \Lauthz\Middlewares\RequestMiddleware::class,
]; basic Enforcer MiddlewareThen you can protect your routes using middleware rules: Route::group(['middleware' => ['enforcer:articles,read']], function () {
// pass
}); HTTP Request Middleware ( RESTful is also supported )If you need to authorize a Request,you need to define the model configuration first in [request_definition]
r = sub, obj, act
[policy_definition]
p = sub, obj, act
[role_definition]
g = _, _
[policy_effect]
e = some(where (p.eft == allow))
[matchers]
m = g(r.sub, p.sub) && keyMatch2(r.obj, p.obj) && regexMatch(r.act, p.act) Then, using middleware rules: Route::group(['middleware' => ['http_request']], function () {
Route::resource('photo', 'PhotoController');
}); Multiple enforcersIf you need multiple permission controls in your project, you can configure multiple enforcers. In the lauthz file, it should be like this: return [
'default' => 'basic',
'basic' => [
'model' => [
// ...
],
'adapter' => Lauthz\Adapters\DatabaseAdapter::class,
// ...
],
'second' => [
'model' => [
// ...
],
'adapter' => Lauthz\Adapters\DatabaseAdapter::class,
// ...
],
]; Then you can choose which enforcers to use. Enforcer::guard('second')->enforce("eve", "articles", "edit"); Using artisan commandsYou can create a policy from a console with artisan commands. To user: php artisan policy:add eve,articles,read To Role: php artisan policy:add writer,articles,edit Adds a role for a user: php artisan role:assign eve writer Using cacheAuthorization rules are cached to speed up performance. The default is off. Sets your own cache configs in Laravel's 'cache' => [
// changes whether Lauthz will cache the rules.
'enabled' => false,
// cache store
'store' => 'default',
// cache Key
'key' => 'rules',
// ttl \DateTimeInterface|\DateInterval|int|null
'ttl' => 24 * 60,
], ThinksCasbin in Laravel. You can find the full documentation of Casbin on the website. LicenseThis project is licensed under the Apache 2.0 license. |
2023-10-27
2022-08-15
2022-08-17
2022-09-23
2022-08-13
请发表评论