• M5_528371
  • 68.9KB
  • zip
  • 0
  • VIP专享
  • 0
  • 2022-06-04 20:53
皮卡斯宾 新闻:仍然担心如何编写正确的Casbin策略? Casbin online editor提供帮助! 请尝试: : Casbin是用于Python项目的功能强大且高效的开源访问控制库。 它为基于各种授权实施提供支持。 Casbin支持的所有语言: 卡斯宾 卡斯宾 节点卡宾 PHP的Casbin 准备生产 准备生产 准备生产 准备生产 皮卡斯宾 Casbin.NET 卡宾-CPP Casbin-RS 准备生产 准备生产 Beta测试 准备生产 目录 支持机型 这个怎么运作? 特征 安装 文献资料 在线编辑 讲解 开始吧 政策管理 政策持续性 角色经理 基准测试 例子 中间件 我们的采用者 支持机型 ACL(访问控制列表) 具有超级用户的ACL 没有用户的ACL :对于没有身份验证或用户登录的系统特别有用。 没有资源的ACL :通过使用诸如write-a
PyCasbin ==== [![GitHub Action](]( [![Coverage Status](]( [![Version](]( [![PyPI - Wheel](]( [![Pyversions](]( [![Download](]( [![Gitter](]( **News**: still worry about how to write the correct Casbin policy? ``Casbin online editor`` is coming to help! Try it at: Casbin is a powerful and efficient open-source access control library for Python projects. It provides support for enforcing authorization based on various [access control models]( ## All the languages supported by Casbin: [![golang](]( | [![java](]( | [![nodejs](]( | [![php](]( ----|----|----|---- [Casbin]( | [jCasbin]( | [node-Casbin]( | [PHP-Casbin]( production-ready | production-ready | production-ready | production-ready [![python](]( | [![dotnet](]( | [![c++](]( | [![rust](]( ----|----|----|---- [PyCasbin]( | [Casbin.NET]( | [Casbin-CPP]( | [Casbin-RS]( production-ready | production-ready | beta-test | production-ready ## Table of contents - [Supported models](#supported-models) - [How it works?](#how-it-works) - [Features](#features) - [Installation](#installation) - [Documentation](#documentation) - [Online editor](#online-editor) - [Tutorials](#tutorials) - [Get started](#get-started) - [Policy management](#policy-management) - [Policy persistence](#policy-persistence) - [Role manager](#role-manager) - [Benchmarks](#benchmarks) - [Examples](#examples) - [Middlewares](#middlewares) - [Our adopters](#our-adopters) ## Supported models 1. [**ACL (Access Control List)**]( 2. **ACL with [superuser](** 3. **ACL without users**: especially useful for systems that don't have authentication or user log-ins. 3. **ACL without resources**: some scenarios may target for a type of resources instead of an individual resource by using permissions like ``write-article``, ``read-log``. It doesn't control the access to a specific article or log. 4. **[RBAC (Role-Based Access Control)](** 5. **RBAC with resource roles**: both users and resources can have roles (or groups) at the same time. 6. **RBAC with domains/tenants**: users can have different role sets for different domains/tenants. 7. **[ABAC (Attribute-Based Access Control)](**: syntax sugar like ``resource.Owner`` can be used to get the attribute for a resource. 8. **[RESTful](**: supports paths like ``/res/*``, ``/res/:id`` and HTTP methods like ``GET``, ``POST``, ``PUT``, ``DELETE``. 9. **Deny-override**: both allow and deny authorizations are supported, deny overrides the allow. 10. **Priority**: the policy rules can be prioritized like firewall rules. ## How it works? In Casbin, an access control model is abstracted into a CONF file based on the **PERM metamodel (Policy, Effect, Request, Matchers)**. So switching or upgrading the authorization mechanism for a project is just as simple as modifying a configuration. You can customize your own access control model by combining the available models. For example, you can get RBAC roles and ABAC attributes together inside one model and share one set of policy rules. The most basic and simplest model in Casbin is ACL. ACL's model CONF is: ```ini # Request definition [request_definition] r = sub, obj, act # Policy definition [policy_definition] p = sub, obj, act # Policy effect [policy_effect] e = some(where (p.eft == allow)) # Matchers [matchers] m = r.sub == p.sub && r.obj == p.obj && r.act == p.act ``` An example policy for ACL model is like: ``` p, alice, data1, read p, bob, data2, write ``` It means: - alice can read data1 - bob can write data2 We also support multi-line mode by appending '\\' in the end: ```ini # Matchers [matchers] m = r.sub == p.sub && r.obj == p.obj \ && r.act == p.act ``` Further more, if you are using ABAC, you can try operator `in` like following in Casbin **golang** edition (jCasbin and Node-Casbin are not supported yet): ```ini # Matchers [matchers] m = r.obj == p.obj && r.act == p.act || r.obj in ('data2', 'data3') ``` But you **SHOULD** make sure that the length of the array is **MORE** than **1**, otherwise there will cause it to panic. For more operators, you may take a look at [govaluate]( ## Features What Casbin does: 1. enforce the policy in the classic ``{subject, object, action}`` form or a customized form as you defined, both allow and deny authorizations are supported. 2. handle the storage of the access control model and its policy. 3. manage the role-user mappings and role-role mappings (aka role hierarchy in RBAC). 4. support built-in superuser like ``root`` or ``administrator``. A superuser can do anything without explict permissions. 5. multiple built-in operators to support the rule matching. For example, ``keyMatch`` can map a resource key ``/foo/bar`` to the pattern ``/foo*``. What Casbin does NOT do: 1. authentication (aka verify ``username`` and ``password`` when a user logs in) 2. manage the list of users or roles. I believe it's more convenient for the project itself to manage these entities. Users usually have their passwords, and Casbin is not designed as a password container. However, Casbin stores the user-role mapping for the RBAC scenario. ## Installation ``` pip install casbin ``` ## Documentation ## Online editor You can also use the online editor ( to write your Casbin model and policy in your web browser. It provides functionality such as ``syntax highlighting`` and ``code completion``, just like an IDE for a programming language. ## Tutorials ## Get started 1. New a Casbin enforcer with a model file and a policy file: ```python import casbin e = casbin.Enforcer("path/to/model.conf", "path/to/policy.csv") ``` Note: you can also initialize an enforcer with policy in DB instead of file, see [Persistence](#persistence) section for details. 2. Add an enforcement hook into your code right before the access happens: ```python sub = "alice" # the user that wants to access a resource. obj = "data1" # the resource that is going to be accessed. act = "read" # the operation that the user performs on the resource. if e.enforce(sub, obj, ac
    • google maps api v3 源码(.NET PHP 等通用)
    • Muse.Net PHP SDK-开源
      Muse.Net是媒体收藏的通用遥控器。 您可以使用WSDL直接针对我们的Web服务进行编程,也可以使用Muse.Net SDK简化编程。 该SDK用于使用PHP NuSOAP构建Muse.Net客户端。
    • google maps api 源码(.NET PHP 等通用)
      用的是Google的maps api。可以操作类似:上海市所有大众汽车4S店,之间的google地图查找、切换,以及放大、缩小、卫星视图等等(本程序以...代码很简单,纯js,适合.netphp等各类网站。本代码仅适合新手学习、交流。
    • 网银4种语言接口 支持 asp php jsp
      网银4种语言接口 支持 asp php jsp
    • java .net php .js 乱码转换器
      方便 快捷 可以直接将乱码复制到文本框中 程序将自动进行乱码转换 也可以手动进行转换。有示例!
    • 免费下载WEBIM java pushlet .net php
      免费下载 WEBIM java pushlet .net php 大家下载,测试下,能够运行,免费下载
    • .net中调用PHP原码
    • 人才网 asp php
      人才网 asp版 asp.netphp版 易想人才网V1.0 浙江人才网 新安人才网 江西人才网 深圳人才网……
    • 官方中文手册 官方中文手册 包括所有的函数和说明 还是很不错的参考手册
    • Sorry.NET PHP在线生成王境泽表情