Movatterモバイル変換


[0]ホーム

URL:


Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up
Appearance settings

An authorization library that supports access control models like ACL, RBAC, ABAC in Laravel.

License

NotificationsYou must be signed in to change notification settings

php-casbin/laravel-authz

Repository files navigation

Laravel-authz is an authorization library for the laravel framework.

PHPUnit StatusCoverage StatusLatest Stable VersionTotal DownloadsLicense

It's based onCasbin, an authorization library that supports access control models like ACL, RBAC, ABAC.

All you need to learn to useCasbin first.

Installation

Require this package in thecomposer.json of your Laravel project. This will download the package.

composer require casbin/laravel-authz

TheLauthz\LauthzServiceProvider isauto-discovered and registered by default, but if you want to register it yourself:

Add the ServiceProvider inconfig/app.php

'providers' => [/*     * Package Service Providers...     */Lauthz\LauthzServiceProvider::class,]

The Enforcer facade is alsoauto-discovered, but if you want to add it manually:

Add the Facade inconfig/app.php

'aliases' => [// ...'Enforcer' =>Lauthz\Facades\Enforcer::class,]

To publish the config, run the vendor publish command:

php artisan vendor:publish

This will create a new model config file namedconfig/lauthz-rbac-model.conf and a new lauthz config file namedconfig/lauthz.php.

To migrate the migrations, run the migrate command:

php artisan migrate

This will create a new table namedrules

Usage

Quick start

Once installed you can do stuff like this:

useEnforcer;// adds permissions to a userEnforcer::addPermissionForUser('eve','articles','read');// adds a role for a user.Enforcer::addRoleForUser('eve','writer');// adds permissions to a roleEnforcer::addPolicy('writer','articles','edit');

You can check if a user has a permission like this:

// to check if a user has permissionif (Enforcer::enforce("eve","articles","edit")) {// permit eve to edit articles}else {// deny the request, show an error}

By default,Gate checks will be automatically intercepted. You can check if a user has a permission with Laravel's defaultcan function:

$user->can('articles,read');

Using Enforcer Api

It provides a very rich api to facilitate various operations on the Policy:

Gets all roles:

Enforcer::getAllRoles();// ['writer', 'reader']

Gets all the authorization rules in the policy.:

Enforcer::getPolicy();

Gets the roles that a user has.

Enforcer::getRolesForUser('eve');// ['writer']

Gets the users that has a role.

Enforcer::getUsersForRole('writer');// ['eve']

Determines whether a user has a role.

Enforcer::hasRoleForUser('eve','writer');// true or false

Adds a role for a user.

Enforcer::addRoleForUser('eve','writer');

Adds a permission for a user or role.

// to userEnforcer::addPermissionForUser('eve','articles','read');// to roleEnforcer::addPermissionForUser('writer','articles','edit');

Deletes a role for a user.

Enforcer::deleteRoleForUser('eve','writer');

Deletes all roles for a user.

Enforcer::deleteRolesForUser('eve');

Deletes a role.

Enforcer::deleteRole('writer');

Deletes a permission.

Enforcer::deletePermission('articles','read');// returns false if the permission does not exist (aka not affected).

Deletes a permission for a user or role.

Enforcer::deletePermissionForUser('eve','articles','read');

Deletes permissions for a user or role.

// to userEnforcer::deletePermissionsForUser('eve');// to roleEnforcer::deletePermissionsForUser('writer');

Gets permissions for a user or role.

Enforcer::getPermissionsForUser('eve');// return array

Determines whether a user has a permission.

Enforcer::hasPermissionForUser('eve','articles','read');// true or false

SeeCasbin API for more APIs.

Using a middleware

This package comes withEnforcerMiddleware,RequestMiddleware middlewares. You can add them inside yourapp/Http/Kernel.php file.

protected$routeMiddleware = [// ...// a basic Enforcer Middleware'enforcer' => \Lauthz\Middlewares\EnforcerMiddleware::class,// an HTTP Request Middleware'http_request' => \Lauthz\Middlewares\RequestMiddleware::class,];

basic Enforcer Middleware

Then you can protect your routes using middleware rules:

Route::group(['middleware' => ['enforcer:articles,read']],function () {// pass});

HTTP Request Middleware ( RESTful is also supported )

If you need to authorize a Request,you need to define the model configuration first inconfig/lauthz-rbac-model.conf:

[request_definition]r = sub, obj, act[policy_definition]p = sub, obj, act[role_definition]g = _, _[policy_effect]e = some(where (p.eft == allow))[matchers]m = g(r.sub, p.sub) && keyMatch2(r.obj, p.obj) && regexMatch(r.act, p.act)

Then, using middleware rules:

Route::group(['middleware' => ['http_request']],function () {    Route::resource('photo','PhotoController');});

Using Gates

You can use Laravel Gates to check if a user has a permission, provided that you have set an existing user instance as the currently authenticated user.

$user->can('articles,read');// For multiple enforcers$user->can('articles,read','second');// The methods cant, cannot, canAny, etc. also work

If you require custom Laravel Gates, you can disable the automatic registration by settingenabled_register_at_gates tofalse in the lauthz file. After that, you can useGates::before orGates::after in your ServiceProvider to register custom Gates. SeeGates for more details.

Multiple enforcers

If you need multiple permission controls in your project, you can configure multiple enforcers.

In the lauthz file, it should be like this:

return ['default' =>'basic','basic' => ['model' => [// ...        ],'adapter' =>Lauthz\Adapters\DatabaseAdapter::class,// ...    ],'second' => ['model' => [// ...        ],'adapter' =>Lauthz\Adapters\DatabaseAdapter::class,// ...    ],];

Then you can choose which enforcers to use.

Enforcer::guard('second')->enforce("eve","articles","edit");

Using artisan commands

You can create a policy from a console with artisan commands.

To user:

php artisan policy:add eve,articles,read

To Role:

php artisan policy:add writer,articles,edit

Adds a role for a user:

php artisan role:assign eve writer# Specify the ptype of the role assignment by using the --ptype option.php artisan role:assign eve writer --ptype=g2

Using cache

Authorization rules are cached to speed up performance. The default is off.

Sets your own cache configs in Laravel'sconfig/lauthz.php.

'cache' => [// changes whether Lauthz will cache the rules.'enabled' =>false,// cache store'store' =>'default',// cache Key'key' =>'rules',// ttl \DateTimeInterface|\DateInterval|int|null'ttl' =>24 *60,],

Thinks

Casbin in Laravel. You can find the full documentation of Casbinon the website.

License

This project is licensed under theApache 2.0 license.

About

An authorization library that supports access control models like ACL, RBAC, ABAC in Laravel.

Topics

Resources

License

Stars

Watchers

Forks

Packages

No packages published

Contributors12

Languages


[8]ページ先頭

©2009-2025 Movatter.jp