Package Data | |
---|---|
Maintainer Username: | leeqvip |
Maintainer Contact: | techlee@qq.com (TechLee) |
Package Create Date: | 2019-03-06 |
Package Last Update: | 2024-10-29 |
Home Page: | |
Language: | PHP |
License: | Apache-2.0 |
Last Refreshed: | 2024-11-25 15:01:26 |
Package Statistics | |
---|---|
Total Downloads: | 179,925 |
Monthly Downloads: | 10,130 |
Daily Downloads: | 369 |
Total Stars: | 289 |
Total Watchers: | 12 |
Total Forks: | 47 |
Total Open Issues: | 0 |
It's based on Casbin, an authorization library that supports access control models like ACL, RBAC, ABAC.
All you need to learn to use Casbin
first.
Require this package in the composer.json
of your Laravel project. This will download the package.
composer require casbin/laravel-authz
The Lauthz\LauthzServiceProvider
is auto-discovered
and registered by default, but if you want to register it yourself:
Add the ServiceProvider in config/app.php
'providers' => [
/*
* Package Service Providers...
*/
Lauthz\LauthzServiceProvider::class,
]
The Enforcer facade is also auto-discovered
, but if you want to add it manually:
Add the Facade in config/app.php
'aliases' => [
// ...
'Enforcer' => Lauthz\Facades\Enforcer::class,
]
To publish the config, run the vendor publish command:
php artisan vendor:publish
This will create a new model config file named config/lauthz-rbac-model.conf
and a new lauthz config file named config/lauthz.php
.
To migrate the migrations, run the migrate command:
php artisan migrate
This will create a new table named rules
Once installed you can do stuff like this:
use Enforcer;
// adds permissions to a user
Enforcer::addPermissionForUser('eve', 'articles', 'read');
// adds a role for a user.
Enforcer::addRoleForUser('eve', 'writer');
// adds permissions to a rule
Enforcer::addPolicy('writer', 'articles','edit');
You can check if a user has a permission like this:
// to check if a user has permission
if (Enforcer::enforce("eve", "articles", "edit")) {
// permit eve to edit articles
} else {
// deny the request, show an error
}
It provides a very rich api to facilitate various operations on the Policy:
Gets all roles:
Enforcer::getAllRoles(); // ['writer', 'reader']
Gets all the authorization rules in the policy.:
Enforcer::getPolicy();
Gets the roles that a user has.
Enforcer::getRolesForUser('eve'); // ['writer']
Gets the users that has a role.
Enforcer::getUsersForRole('writer'); // ['eve']
Determines whether a user has a role.
Enforcer::hasRoleForUser('eve', 'writer'); // true or false
Adds a role for a user.
Enforcer::addRoleForUser('eve', 'writer');
Adds a permission for a user or role.
// to user
Enforcer::addPermissionForUser('eve', 'articles', 'read');
// to role
Enforcer::addPermissionForUser('writer', 'articles','edit');
Deletes a role for a user.
Enforcer::deleteRoleForUser('eve', 'writer');
Deletes all roles for a user.
Enforcer::deleteRolesForUser('eve');
Deletes a role.
Enforcer::deleteRole('writer');
Deletes a permission.
Enforcer::deletePermission('articles', 'read'); // returns false if the permission does not exist (aka not affected).
Deletes a permission for a user or role.
Enforcer::deletePermissionForUser('eve', 'articles', 'read');
Deletes permissions for a user or role.
// to user
Enforcer::deletePermissionsForUser('eve');
// to role
Enforcer::deletePermissionsForUser('writer');
Gets permissions for a user or role.
Enforcer::getPermissionsForUser('eve'); // return array
Determines whether a user has a permission.
Enforcer::hasPermissionForUser('eve', 'articles', 'read'); // true or false
See Casbin API for more APIs.
This package comes with EnforcerMiddleware
, RequestMiddleware
middlewares. You can add them inside your app/Http/Kernel.php
file.
protected $routeMiddleware = [
// ...
// a basic Enforcer Middleware
'enforcer' => \Lauthz\Middlewares\EnforcerMiddleware::class,
// an HTTP Request Middleware
'http_request' => \Lauthz\Middlewares\RequestMiddleware::class,
];
Then you can protect your routes using middleware rules:
Route::group(['middleware' => ['enforcer:articles,read']], function () {
// pass
});
If you need to authorize a Request,you need to define the model configuration first in config/lauthz-rbac-model.conf
:
[request_definition]
r = sub, obj, act
[policy_definition]
p = sub, obj, act
[role_definition]
g = _, _
[policy_effect]
e = some(where (p.eft == allow))
[matchers]
m = g(r.sub, p.sub) && keyMatch2(r.obj, p.obj) && regexMatch(r.act, p.act)
Then, using middleware rules:
Route::group(['middleware' => ['http_request']], function () {
Route::resource('photo', 'PhotoController');
});
If you need multiple permission controls in your project, you can configure multiple enforcers.
In the lauthz file, it should be like this:
return [
'default' => 'basic',
'basic' => [
'model' => [
// ...
],
'adapter' => Lauthz\Adapters\DatabaseAdapter::class,
// ...
],
'second' => [
'model' => [
// ...
],
'adapter' => Lauthz\Adapters\DatabaseAdapter::class,
// ...
],
];
Then you can choose which enforcers to use.
Enforcer::guard('second')->enforce("eve", "articles", "edit");
You can create a policy from a console with artisan commands.
To user:
php artisan policy:add eve,articles,read
To Role:
php artisan policy:add writer,articles,edit
Adds a role for a user:
php artisan role:assign eve writer
Authorization rules are cached to speed up performance. The default is off.
Sets your own cache configs in Laravel's config/lauthz.php
.
'cache' => [
// changes whether Lauthz will cache the rules.
'enabled' => false,
// cache store
'store' => 'default',
// cache Key
'key' => 'rules',
// ttl \DateTimeInterface|\DateInterval|int|null
'ttl' => 24 * 60,
],
Casbin in Laravel. You can find the full documentation of Casbin on the website.
This project is licensed under the Apache 2.0 license.