Package Data | |
---|---|
Maintainer Username: | dlnsk |
Maintainer Contact: | dlnsk@mail.ru (Dmitry Pupinin) |
Package Create Date: | 2016-03-14 |
Package Last Update: | 2024-11-12 |
Home Page: | |
Language: | PHP |
License: | MIT |
Last Refreshed: | 2024-12-12 15:04:03 |
Package Statistics | |
---|---|
Total Downloads: | 8,000 |
Monthly Downloads: | 12 |
Daily Downloads: | 0 |
Total Stars: | 35 |
Total Watchers: | 3 |
Total Forks: | 4 |
Total Open Issues: | 0 |
Based on native Laravel's 5 abilities. Hierarchical RBAC with callbacks.
In the process of creating my own projects I have formed an opinion about the minimum required ability of RBAC. It should allow:
Keep in mind it's only for Laravel 5.1 and later.
Via Composer
$ composer require dlnsk/h-rbac
Add the service provider to config/app.php
Dlnsk\HierarchicalRBAC\HRBACServiceProvider::class,
Publish some cool stuff:
role
to users
table)with
php artisan vendor:publish --provider="Dlnsk\HierarchicalRBAC\HRBACServiceProvider"
Add roles, permissions which you need and callbacks where it needs and have fun!
This module is wrapper for authorization logic and control access to resources of Laravel 5.1 and later. Except you shouldn't define abilities, they will define automatically.
Let's describe the minimum required ability of RBAC (in my opinion).
It's clear.
Very common situation is to allow user to change only his own posts. With this package it's simple:
public function editOwnPost($user, $post) {
return $user->id === $post->user_id;
}
and use as
if (\Gate::can('editOwnPost', $post)) {
}
You can pass any number of parameters in callback as array.
As you see callbacks is very useful. But what about site manager who may edit any posts? Create separate permission? But which of it we should check?
Answer is use chained (inherited) permissions. Example:
editPost
-> editPostInCategory
-> editOwnPost
Each of this permission put in appropriate role but we always check the first (except in very rare cases):
if (\Gate::can('editPost', $post)) {
}
These permissions will be checked one by one until one of it will pass. In other case ability will be rejected for this user. So, we have many permissions with different buisnes logic but checking in code only one.
Very popular is to use database for store roles and permissions. It flexible but hard to support. Managing of roles and permissions required backend (but stil available to change directly in DB). When we start to use inheritance for permissions it becomes too difficult for direct changing.
In other case most projects aren't large. It need only few roles and permissions, so backend becomes economically inexpedient. Thus, I believe that file driven RBAC is enough for many projects. It's visual and simple for support.
Storage of roles and permissions is on another level of logic, so DB support may be added later.
As I said h-rbac
is wrapper for authorization logic of Laravel 5.1 and later. So, you can use any features of it.
if (\Gate::allows('editPost', $post)) { // do something }
...
if (\Gate::denies('editPost', $post)) { abort(403); }
...
if (\Gate::forUser($user)->allows('editPost', $post)) { // do something }
From User model:
if ($request->user()->can('editPost', $post)) { // do something }
...
if ($request->user()->cannot('editPost', $post)) { abort(403); }
In controller:
$this->authorize('editPost', $post);
Within Blade
@can('editPost', $post)
<!-- The Current User Can Update The Post -->
@else
<!-- The Current User Can't Update The Post -->
@endcan
Also in h-rbac
we add directive @role
which you can combine with @else
@role('user|manager')
<!-- The current user has any role -->
@endrole
When you publish configuration with artisan
you'll have configuration class app/Classes/Authorization/AuthorizationClass.php
where you should define permissions, roles and callbacks. You are free to move this file anywhere you want. Don't forget update config/h-rbac.php
in this case.
Structure of configuration class:
<?php
namespace App\Classes\Authorization;
use Dlnsk\HierarchicalRBAC\Authorization;
class AuthorizationClass extends Authorization
{
public function getPermissions() {
return [
'editPost' => [
'description' => 'Edit any posts', // optional property
'next' => 'editOwnPost', // used for making chain (hierarchy) of permissions
],
'editOwnPost' => [
'description' => 'Edit own post',
],
'deletePost' => [
'description' => 'Delete any posts',
],
];
}
public function getRoles() {
return [
'manager' => [
'editPost',
'deletePost',
],
'user' => [
'editOwnPost',
],
];
}
////////////// Callbacks ///////////////
public function editOwnPost($user, $post) {
$post = $this->getModel(\App\Post::class, $post); // helper method for geting model
return $user->id === $post->user_id;
}
}
You should add callback only if you need additional check for this permission. The name of callback should be camelcased name of permission.
We use next logic for checking permission: starting from the current permission, we check all of the following in chain one by one and:
Please see CHANGELOG for more information what has changed recently.
Please see CONTRIBUTING and CONDUCT for details.
The MIT License (MIT). Please see License File for more information.