모델(Model) 문법
모델 설정에서 다음 4가지 항목을 반드시 포함합니다:
[request_definition], [policy_definition], [policy_effect], [matchers]
.RBAC를 사용할 때는
[role_definition]
항목이 추가됩니다.모델 설정에는 주석을 넣을 수 있습니다. 주석은
#
로 시작하며,#
이후 줄의 끝까지 주석 처리됩니다.
요청(Request) 모델 정의
[request_definition]
는 접근 요청을 정의합니다. 즉 e.Enforce(...)
함수에 들어갈 매개변수를 정의합니다.
[request_definition]
r = sub, obj, act
sub, obj, act
는 각각 접근 주체(Subject), 접근 대상(Object), 그리고 접근 동작(Action) 을 나타냅니다. 요청 형식을 맞춤 정의할 수 있습니다. sub, act
와 같이 특정 리소스를 지정하지 않아도 되거나, sub, sub2, obj, act
와 같이 복수의 접근 주체를 정의할 수 있습니다.
정책(Policy) 모델 정의
[policy_definition]
항목에서 정책 모델을 정의합니다. 한 줄의 정책에서 (콤마로 구분되는) 각 속성의 의미를 정의합니다. 예를 들어, 다음과 같은 정책 모델을 정의할 수 있습니다.
[policy_definition]
p = sub, obj, act
p2 = sub, act
그리고 다음과 같은 정책 설정 파일이 있습니다.
p, alice, data1, read
p2, bob, write-all-objects
정책 설정 파일의 각 줄을 정책 규칙이라고 합니다. 각 정책 규칙은 정책 유형
으로 시작합니다. 예를 들어, p
, p2
입니다. 여러 종류의 정책 유형을 사용할 때, 어느 정책 유형에 해당하는 지를 가리킵니다. 위 정책은 아래와 같이 연결됩니다. 이 연결 관계는 [matchers] 항목에서 참조할 수 있습니다.
(alice, data1, read) -> (p.sub, p.obj, p.act)
(bob, write-all-objects) -> (p2.sub, p2.act)
tip
The elements in a policy rule are always regarded asstring
. If you have any question about this, please see the discussion at: https://github.com/casbin/casbin/issues/113
정책 Effect
[policy_effect]
is the definition for the policy effect. It defines whether the access request should be approved if multiple policy rules match the request. For example, one rule permits and the other denies.
[policy_effect]
e = some(where (p.eft == allow))
The above policy effect means if there's any matched policy rule of allow
, the final effect is allow
(aka allow-override). p.eft
is the effect for a policy, it can be allow
or deny
. It's optional and the default value is allow
. So as we didn't specify it above, it uses the default value.
Another example for policy effect is:
[policy_effect]
e = !some(where (p.eft == deny))
It means if there's no matched policy rules ofdeny
, the final effect is allow
(aka deny-override). some
means: if there exists one matched policy rule. any
means: all matched policy rules (not used here). The policy effect can even be connected with logic expressions:
[policy_effect]
e = some(where (p.eft == allow)) && !some(where (p.eft == deny))
It means at least one matched policy rule ofallow
, and there is no matched policy rule ofdeny
. So in this way, both the allow and deny authorizations are supported, and the deny overrides.
note
Although we designed the syntax of policy effect as above, the current implementations only use hard-coded policy effect, as we found there's no much need for that sort of flexibility. So for now, you must use one of the built-in policy effects instead of customizing your own one.
The supported built-in policy effects are:
정책 Effect | 의미 | 사례 |
---|---|---|
some(where (p.eft == allow)) | 허용 우선 | ACL, RBAC 등 |
!some(where (p.eft == deny)) | 거부 우선 | 거부 우선 |
some(where (p.eft == allow)) && !some(where (p.eft == deny)) | 명시적 허용 + 명시적 거부 | 명시적 허용 + 명시적 거부 |
priority(p.eft) || deny | 우선순위 | 우선순위 |
subjectPriority(p.eft) | priority base on role | Subject-Priority |
조건식
[matchers]
is the definition for policy matchers. The matchers are expressions. It defines how the policy rules are evaluated against the request.
[matchers]
m = r.sub == p.sub && r.obj == p.obj && r.act == p.act
The above matcher is the simplest, it means that the subject, object and action in a request should match the ones in a policy rule.
You can use arithmetic like +, -, *, /
and logical operators like &&, ||, !
in matchers.
Multiple sections type
If you need multiple policy definitions or multiple matcher, you can use like p2
, m2
. In fact, all of the above four sections can use multiple types and the syntax is r
+number, such as r2
, e2
. By default these four sections should correspond one to one. Such as your r2
will only use matcher m2
to match policies p2
.
You can pass in EnforceContext
as the first parameter of enforce
method to specify the types, the EnforceContext
is like this
EnforceContext{"r2","p2","e2","m2"}
type EnforceContext struct {
RType string
PType string
EType string
MType string
}
const enforceContext = new EnforceContext('r2', 'p2', 'e2', 'm2');
class EnforceContext {
constructor(rType, pType, eType, mType) {
this.pType = pType;
this.eType = eType;
this.mType = mType;
this.rType = rType;
}
}
EnforceContext enforceContext = new EnforceContext("2");
public class EnforceContext {
private String pType;
private String eType;
private String mType;
private String rType;
public EnforceContext(String suffix) {
this.pType = "p" + suffix;
this.eType = "e" + suffix;
this.mType = "m" + suffix;
this.rType = "r" + suffix;
}
}
Example usage, see model and policy, the request is as follows
// Pass in a suffix as parameter to NewEnforceContext,such as 2 or 3 and it will create r2,p2,etc..
enforceContext := NewEnforceContext("2")
// You can also specify a certain type individually
enforceContext.EType = "e"
// Don't pass in EnforceContext,the default is r,p,e,m
e.Enforce("alice", "data2", "read") // true
// pass in EnforceContext
e.Enforce(enforceContext, struct{ Age int }{Age: 70}, "/data1", "read") //false
e.Enforce(enforceContext, struct{ Age int }{Age: 30}, "/data1", "read") //true
// Pass in a suffix as parameter to NewEnforceContext,such as 2 or 3 and it will create r2,p2,etc..
const enforceContext = new NewEnforceContext('2');
// You can also specify a certain type individually
enforceContext.eType = "e"
// Don't pass in EnforceContext,the default is r,p,e,m
e.Enforce("alice", "data2", "read") // true
// pass in EnforceContext
e.Enforce(enforceContext, {Age: 70}, "/data1", "read") //false
e.Enforce(enforceContext, {Age: 30}, "/data1", "read") //true
// Pass in a suffix as parameter to NewEnforceContext,such as 2 or 3 and it will create r2, p2, etc..
EnforceContext enforceContext = new EnforceContext("2");
// You can also specify a certain type individually
enforceContext.seteType("e");
// Don't pass in EnforceContext, the default is r, p, e, m
e.enforce("alice", "data2", "read"); // true
// Pass in EnforceContext
// TestEvalRule is located in https://github.com/casbin/jcasbin/blob/master/src/test/java/org/casbin/jcasbin/main/AbacAPIUnitTest.java#L56
e.enforce(enforceContext, new AbacAPIUnitTest.TestEvalRule("alice", 70), "/data1", "read"); // false
e.enforce(enforceContext, new AbacAPIUnitTest.TestEvalRule("alice", 30), "/data1", "read"); // true
Special Grammer
You could also use in
, the only operator with a text name. This operator checks the right-hand side array to see if it contains a value that is equal to the left-side value. Equality is determined by the use of the == operator, and this library doesn't check types between the values. Any two values, when cast to interface{}, and can still be checked for equality with == will act as expected. Note that you can use a parameter for the array, but it must be an []interface{}
.
Also refer to rbac_model_matcher_using_in_op, keyget2_model and keyget_model
Example:
[request_definition]
r = sub, obj
...
[matchers]
m = r.sub.Name in (r.obj.Admins)
e.Enforce(Sub{Name: "alice"}, Obj{Name: "a book", Admins: []interface{}{"alice", "bob"}})
Expression evaluator
The matcher evaluation in Casbin is implemented by expression evaluators in each language. Casbin integrates their powers to provide the unified PERM language. Besides all the model syntax provided here, those expression evaluators may provide extra functionality, which may be not supported by another language or implementation. Use it at your own risk.
The expression evaluators used by each Casbin implementation are:
구현체 | 언어 | 표현식 평가 |
---|---|---|
Casbin | Golang | https://github.com/Knetic/govaluate |
jCasbin | Java | https://github.com/killme2008/aviator |
Node-Casbin | Node.js | https://github.com/donmccurdy/expression-eval |
PHP-Casbin | PHP | https://github.com/symfony/expression-language |
PyCasbin | Python | https://github.com/danthedeckie/simpleeval |
Casbin.NET | C# | https://github.com/davideicardi/DynamicExpresso |
Casbin4D | Delphi | https://github.com/casbin4d/Casbin4D/tree/master/SourceCode/Common/Third%20Party/TExpressionParser |
casbin-rs | Rust | https://github.com/jonathandturner/rhai |
casbin-cpp | C++ | https://github.com/ArashPartow/exprtk |
note
If you encounter performance issue about Casbin, it's probably caused by the low efficiency of the expression evaluator. You can both send issue to Casbin or the expression evaluator directly for advice to speed up. See Benchmarks section for details.