欢迎来到尧图网

客户服务 关于我们

您的位置:首页 > 房产 > 建筑 > go-Casbin使用

go-Casbin使用

2025/5/9 15:31:53 来源:https://blog.csdn.net/SampsonKong/article/details/147430274  浏览:    关键词:go-Casbin使用

本次测试代码是基于单租户的RBAC鉴权

依赖

github.com/casbin/casbin/v2
github.com/casbin/gorm-adapter/v2

文件存储规则文件

model.pml

[request_definition]
r = sub, obj, act[policy_definition]
p = sub, obj, act[role_definition]
g = _, _         # 用户,角色[policy_effect]
e = some(where (p.eft == allow))[matchers]
m = g(r.sub, p.sub) && r.obj == p.obj && r.act == p.act

policy.csv

p, admin, /user, write
p, admin, /user, read
p, admin, /order, write
p, admin, /order, read
p, admin, /user, put
p, systemManager, /user/userlist, read
p, systemManager, /order/orderlist, read
g, demo, admin
g, demo1, admin
g, kongdy, admin
g, kongdy, systemManager

这里是基于单租户RBAC的鉴权模式

p 开头的为 policy

g 开头的为用户-角色

model.pml文件中matchers字段:请求 r 的 sub 与 g 的用户匹配,匹配到后,减少匹配到的角色中,是否有同时匹配 obj 和 act

可以嵌套角色,默认最多可嵌套10层,但需要注意用户与角色不要存在相同值,否则会拥有该重名角色的权限

p, userManager, /user, write
p, userManager, /user, read
p, userManager, /user, put
p, orderManager, /order, write
p, orderManager, /order, read
p, userManager, /user/userlist, read
p, orderManager, /order/orderlist, readg, admin, userManager
g, admin, orderManager
g, manage, userManagerg, demo, admin
g, demo1, manage

这里可以理解为

demo用户拥有admin角色权限,admin角色继承userManager和orderManager角色,即同时拥有这两个角色的访问控制

demo1用户拥有userManager角色

也可以理解为

demo用户拥有admin角色权限,admin角色继承userManager和orderManager角色,即同时拥有这两个角色的访问控制

demo1用户拥有userManager角色

admin用户拥有userManager、orderManager两个角色

manage拥有userManager角色

理解以上policy后,也就明白了为什么用户名要与角色名称不要重叠的原因

main.go

package mainimport ("fmt""github.com/casbin/casbin/v2"
)func main() {e, err := casbin.NewEnforcer("./model.pml", "./policy.csv")if err != nil {fmt.Println("出错啦", err)return}//基本权限设置CheckPermi(e, "demo", "/user", "read")     //CheckPermi(e, "demo", "/user", "put")CheckPermi(e, "demo", "/user", "write")CheckPermi(e, "demo", "/order", "read")CheckPermi(e, "demo", "/order", "write")CheckPermi(e, "demo", "/user/userlist", "read")CheckPermi(e, "demo", "/user/userlist", "write")CheckPermi(e, "demo", "/order/orderlist", "read")CheckPermi(e, "demo", "/order/orderlist", "write")CheckPermi(e, "demo1", "/user", "read")CheckPermi(e, "demo1", "/user", "write")CheckPermi(e, "demo1", "/user", "put")CheckPermi(e, "demo1", "/order", "read")CheckPermi(e, "demo1", "/order", "write")CheckPermi(e, "demo1", "/user/userlist", "read")CheckPermi(e, "demo1", "/user/userlist", "write")CheckPermi(e, "demo1", "/order/orderlist", "read")CheckPermi(e, "demo1", "/order/orderlist", "write")CheckPermi(e, "admin", "/user", "read")CheckPermi(e, "admin", "/user", "write")CheckPermi(e, "admin", "/user", "put")CheckPermi(e, "admin", "/order", "read")CheckPermi(e, "admin", "/order", "write")CheckPermi(e, "admin", "/user/userlist", "read")CheckPermi(e, "admin", "/user/userlist", "write")CheckPermi(e, "admin", "/order/orderlist", "read")CheckPermi(e, "admin", "/order/orderlist", "write")}func CheckPermi(e *casbin.Enforcer, sub, obj, act string) {ok, err := e.Enforce(sub, obj, act)if err != nil {return}if ok == true {fmt.Printf("%s CAN %s %s\n", sub, act, obj)} else {fmt.Printf("%s CANNOT %s %s\n", sub, act, obj)}
}

常用操作

增加用户角色

e.AddRoleForUser("kongdy", "systemManager")
e.SavePolicy()e.AddRolesForUser("demo1", []string{"systemManager", "admin"})
e.SavePolicy()

增加鉴权规则

e.AddPolicy("admin", "/user", "put")
e.SavePolicy()

删除角色(会将所有拥有该角色的记录均删除)

e.DeleteRole("systemManager")
e.SavePolicy()

基于gorm的权限控制

上面的示例基于文件存储来实现的,当数量上去后,管理起来非常不方便,下面采用数据库来存储数据

import ("fmt""github.com/casbin/casbin/v2"gormadapter "github.com/casbin/gorm-adapter/v2"   // 版本注意与casbin保持一致_ "github.com/go-sql-driver/mysql""github.com/jinzhu/gorm"
)// 统一响应结构体
type Response struct {Code    int         `json:"code"`Message string      `json:"message"`Data    interface{} `json:"data"`
}var Db *gorm.DB
var PO *gormadapter.Adapter
var Enforcer *casbin.Enforcer// 数据库连接及角色规则的初始化,会检查并自动创建 casbin_rule 表
func connect() {dsn := "root:root@(127.0.0.1:3306)/gin_study?charset=utf8&parseTime=True&loc=Local"var err errorDb, err = gorm.Open("mysql", dsn)if err != nil {fmt.Println("connect DB error")panic(err)}// 将数据库连接同步给插件, 插件用来操作数据库PO, _ = gormadapter.NewAdapterByDB(Db)// 这里也可以使用原生字符串方式//Enforcer, _ = casbin.NewEnforcer("model.pml", PO)// 开启权限认证日志// Enforcer.EnableLog(true)// 加载数据库中的策略err = Enforcer.LoadPolicy()if err != nil {fmt.Println("loadPolicy error")panic(err)}
}func main() {connect()//基本权限设置CheckPermi(Enforcer, "demo", "/user", "read")CheckPermi(Enforcer, "demo", "/user", "put")CheckPermi(Enforcer, "demo", "/user", "write")CheckPermi(Enforcer, "demo", "/order", "read")CheckPermi(Enforcer, "demo", "/order", "write")CheckPermi(Enforcer, "demo", "/user/userlist", "read")CheckPermi(Enforcer, "demo", "/user/userlist", "write")CheckPermi(Enforcer, "demo", "/order/orderlist", "read")CheckPermi(Enforcer, "demo", "/order/orderlist", "write")
}func CheckPermi(e *casbin.Enforcer, sub, obj, act string) {res, err := e.Enforce(sub, obj, act)if err != nil {fmt.Printf("出错啦:e=%+v\n, err = %+v\n", e, err)return}if res == true {fmt.Printf("%s CAN %s %s\n", sub, act, obj)} else {fmt.Printf("%s CANNOT %s %s\n", sub, act, obj)}
}

中间件

// casbin middleware 权限认证中间件
func CasbinMiddleWare(enforcer *casbin.Enforcer) gin.HandlerFunc {return func(c *gin.Context) {userName := c.GetHeader("userName")if userName == "" {fmt.Println("headers invalid")c.JSON(200, gin.H{"code":    401,"message": "Unauthorized","data":    "",})c.Abort()return}// 请求的pathp := c.Request.URL.Path// 请求的方法m := c.Request.Method// 这里认证res, err := enforcer.Enforce(userName, p, m)// 这个 HasPermissionForUser 跟上面的有什么区别// EnforceSafe 会验证角色的相关的权限// 而 HasPermissionForUser 只验证用户是否有权限//res = Enforcer.HasPermissionForUser(userName,p,m)if err != nil {fmt.Println("no permission ")fmt.Println(err)c.JSON(200, gin.H{"code":    401,"message": "Unauthorized","data":    "",})c.Abort()return}if !res {fmt.Println("permission check failed")c.JSON(200, gin.H{"code":    401,"message": "Unauthorized","data":    "",})c.Abort()return}c.Next()}
}

版权声明:

本网仅为发布的内容提供存储空间,不对发表、转载的内容提供任何形式的保证。凡本网注明“来源:XXX网络”的作品,均转载自其它媒体,著作权归作者所有,商业转载请联系作者获得授权,非商业转载请注明出处。

我们尊重并感谢每一位作者,均已注明文章来源和作者。如因作品内容、版权或其它问题,请及时与我们联系,联系邮箱:809451989@qq.com,投稿邮箱:809451989@qq.com

热搜词