# casbin-权限管理框架
[官方文档](https://casbin.org/docs/zh-CN/overview)
thinkphp6:[think-casbin](https://github.com/php-casbin/think-casbin)
[文档](https://www.kancloud.cn/oldlei/casbin/1289453)
## 什么是验证授权
> 授权(英语:Authorization)一般是指对信息安全或计算机安全相关的资源定义与授予访问权限,尤指访问控制。动词“授权”可指定义访问策略与接受访问。
`授权`作为名词,其代表的是在计算机系统中定义的资源访问权限。而`验证授权`就是验证计算机帐户是否有资源的访问权限。
举个栗子,假设现在有一本书`book1`,其拥有`read`, `write`的操作,那么我们可以先定义以下`授权`:
1. `alice`可以`read`书籍`book1`
2. `bob`可以`write`书籍`book1`
3. `bob`可以`read`书籍`book1`
现在来了一个用户`alice`她想`write`书籍`book1`,这时调用验证授权功能模块的接口,验证授权功能模块根据上述`授权`规则可以快速判断`alice`不可以`write`书籍`book1`;过一会儿又来了一个用户`bob`他想`write`书籍`book1`,这时调用验证授权系统的接口,验证授权系统根据上述`授权`规则可以快速判断`bob`可以`write`书籍`book1`。
可以看到`身份认证系统`强调地是安全可靠地得到计算机用户的身份信息,而`验证授权`强调地是根据计算机的身份信息、访问的资源、对资源的操作等给出一个Yes/No的答复。
## 常用授权模型
### ACL
### RBAC
### ABAC
## 实现权限验证
前面提到了多种不同的权限模型,要完全自研实现不同的权限模型还是挺麻烦的。幸好`casbin`出现,它将上述不同的模型抽象为自己的`PERM metamodel`,这个`PERM metamodel`只包括`Policy`, `Effect`, `Request`, `Matchers`,只通过这几个模型对象的组合即可实现上述提到的多种权限模型,如果业务上需要切换权限模型,也只需要配置一下`PERM metamodel`,并不需要大改权限模型相关的代码,这一点真的很赞!!!
一个最简单的`ACL`权限模型即可像下面这样定义:
`acl_simple_model.conf`
```
<pre class="calibre10">```
# Request definition
<span class="token3">[</span>request_definition<span class="token3">]</span>
r <span class="token1">=</span> sub<span class="token3">,</span> obj<span class="token3">,</span> act
# Policy definition
<span class="token3">[</span>policy_definition<span class="token3">]</span>
p <span class="token1">=</span> sub<span class="token3">,</span> obj<span class="token3">,</span> act
# Policy effect
<span class="token3">[</span>policy_effect<span class="token3">]</span>
e <span class="token1">=</span> <span class="token4">some</span><span class="token3">(</span><span class="token4">where</span> <span class="token3">(</span>p<span class="token3">.</span>eft <span class="token1">==</span> allow<span class="token3">)</span><span class="token3">)</span>
# Matchers
<span class="token3">[</span>matchers<span class="token3">]</span>
m <span class="token1">=</span> r<span class="token3">.</span>sub <span class="token1">==</span> p<span class="token3">.</span>sub <span class="token1">&&</span> r<span class="token3">.</span>obj <span class="token1">==</span> p<span class="token3">.</span>obj <span class="token1">&&</span> r<span class="token3">.</span>act <span class="token1">==</span> p<span class="token3">.</span>act
```
```
相应的授权规则可以像下面这样定义:
`acl_simple_policy.csv`
```
<pre class="calibre10">```
p<span class="token3">,</span> alice<span class="token3">,</span> data1<span class="token3">,</span> read
p<span class="token3">,</span> bob<span class="token3">,</span> data2<span class="token3">,</span> write
```
```
这意味着`alice`可以`read`资源`data1`;`bob`可以`write`资源`data2`。
写一个简单的程序就可以完成该权限验证:
```
<pre class="calibre10">```
<span class="token5">package</span> main
<span class="token5">import</span> <span class="token3">(</span>
<span class="token2">"fmt"</span>
<span class="token2">"github.com/casbin/casbin/v2"</span>
<span class="token3">)</span>
func <span class="token4">main</span><span class="token3">(</span><span class="token3">)</span> <span class="token3">{</span>
e<span class="token3">,</span> _ <span class="token3">:</span><span class="token1">=</span> casbin<span class="token3">.</span><span class="token4">NewSyncedEnforcer</span><span class="token3">(</span><span class="token2">"acl_simple_model.conf"</span><span class="token3">,</span> <span class="token2">"acl_simple_policy.csv"</span><span class="token3">)</span>
sub <span class="token3">:</span><span class="token1">=</span> <span class="token2">"alice"</span> <span class="token">// the user that wants to access a resource.</span>
obj <span class="token3">:</span><span class="token1">=</span> <span class="token2">"data1"</span> <span class="token">// the resource that is going to be accessed.</span>
act <span class="token3">:</span><span class="token1">=</span> <span class="token2">"read"</span> <span class="token">// the operation that the user performs on the resource.</span>
<span class="token5">if</span> passed<span class="token3">,</span> _ <span class="token3">:</span><span class="token1">=</span> e<span class="token3">.</span><span class="token4">Enforce</span><span class="token3">(</span>sub<span class="token3">,</span> obj<span class="token3">,</span> act<span class="token3">)</span><span class="token3">;</span> passed <span class="token3">{</span>
<span class="token">// permit alice to read data1</span>
fmt<span class="token3">.</span><span class="token4">Println</span><span class="token3">(</span><span class="token2">"Enforce policy passed."</span><span class="token3">)</span>
<span class="token3">}</span> <span class="token5">else</span> <span class="token3">{</span>
<span class="token">// deny the request, show an error</span>
fmt<span class="token3">.</span><span class="token4">Println</span><span class="token3">(</span><span class="token2">"Enforce policy denied."</span><span class="token3">)</span>
<span class="token3">}</span>
<span class="token3">}</span>
```
```
## casbin模型详解
`casbin`官方其实已经提供了多种模型的定义及示例policy定义,见这里。而且为了便于用户理解诊断模型及policy,还给了个在线的editor,修改模型或policy时可以利用此工具。
从上面的示例可以看出基于`casbin`实现权限验证,代码很简单,但`casbin`的模型定义及policy定义初看还是挺复杂的,这样详细理解一下。
`casbin`的模型定义里会出现4个部分:`[request_definition]`,`[policy_definition]`,`[policy_effect]`, `[matchers]`。
其中`[request_definition]`描述的是访问请求的定义,如下面的定义将访问请求的三个参数分别映射为`r.sub`、`r.obj`、`r.act`(注意并不是所有的访问请求一定是3个参数):
```
<pre class="calibre10">```
<span class="token3">[</span>request_definition<span class="token3">]</span>
r <span class="token1">=</span> sub<span class="token3">,</span> obj<span class="token3">,</span> act
```
```
同理`[policy_definition]`描述的是授权policy的定义,如下面的定义将每条授权policy分别映射为`p.sub`、`p.obj`、`p.act`(注意并不是所有的授权policy一定是3个参数,也不是必须只有一条授权policy定义):
```
<pre class="calibre10">```
<span class="token3">[</span>policy_definition<span class="token3">]</span>
p <span class="token1">=</span> sub<span class="token3">,</span> obj<span class="token3">,</span> act
```
```
`[matchers]`描述的是根据访问请求如何找到匹配的授权policy,如下面的定义将根据`r.sub`、`r.obj`、`r.act`、`p.sub`、`p.obj`、`p.act`找到完全匹配的授权policy:
```
<pre class="calibre10">```
<span class="token3">[</span>matchers<span class="token3">]</span>
m <span class="token1">=</span> r<span class="token3">.</span>sub <span class="token1">==</span> p<span class="token3">.</span>sub <span class="token1">&&</span> r<span class="token3">.</span>obj <span class="token1">==</span> p<span class="token3">.</span>obj <span class="token1">&&</span> r<span class="token3">.</span>act <span class="token1">==</span> p<span class="token3">.</span>act
```
```
在写`[matchers]`规则是还可以使用一些内置或自定义函数,参考[这里的文档](https://casbin.org/docs/en/syntax-for-models#functions-in-matchers)。
最后`[policy_effect]`描述如果找到匹配的多条的授权policy,最终给出的验证授权结果,如下面的定义说明只要有一条匹配的授权策略其`eft`是`allow`,则最终给出的验证授权结果就是`允许`(注意每条授权policy默认的eft就是allow)。
```
<pre class="calibre10">```
<span class="token3">[</span>policy_effect<span class="token3">]</span>
e <span class="token1">=</span> <span class="token4">some</span><span class="token3">(</span><span class="token4">where</span> <span class="token3">(</span>p<span class="token3">.</span>eft <span class="token1">==</span> allow<span class="token3">)</span><span class="token3">)</span>
```
```
如果使用`RBAC`权限模型,可能还会使用`[role_definition]`,这个`[role_definition]`算是最复杂的了,其可以描述user-role之间的映射关系或resource-role之间的映射关系。这么说比较抽象,还是举例说明:
假设模型定义如下:
```
<pre class="calibre10">```
<span class="token3">[</span>request_definition<span class="token3">]</span>
r <span class="token1">=</span> sub<span class="token3">,</span> obj<span class="token3">,</span> act
<span class="token3">[</span>policy_definition<span class="token3">]</span>
p <span class="token1">=</span> sub<span class="token3">,</span> obj<span class="token3">,</span> act
<span class="token3">[</span>role_definition<span class="token3">]</span>
g <span class="token1">=</span> _<span class="token3">,</span> _
<span class="token3">[</span>policy_effect<span class="token3">]</span>
e <span class="token1">=</span> <span class="token4">some</span><span class="token3">(</span><span class="token4">where</span> <span class="token3">(</span>p<span class="token3">.</span>eft <span class="token1">==</span> allow<span class="token3">)</span><span class="token3">)</span>
<span class="token3">[</span>matchers<span class="token3">]</span>
m <span class="token1">=</span> <span class="token4">g</span><span class="token3">(</span>r<span class="token3">.</span>sub<span class="token3">,</span> p<span class="token3">.</span>sub<span class="token3">)</span> <span class="token1">&&</span> r<span class="token3">.</span>obj <span class="token1">==</span> p<span class="token3">.</span>obj <span class="token1">&&</span> r<span class="token3">.</span>act <span class="token1">==</span> p<span class="token3">.</span>act
```
```
授权policy文件如下:
```
<pre class="calibre10">```
p<span class="token3">,</span> data2_admin<span class="token3">,</span> data2<span class="token3">,</span> read
p<span class="token3">,</span> data2_admin<span class="token3">,</span> data2<span class="token3">,</span> write
g<span class="token3">,</span> alice<span class="token3">,</span> data2_admin
```
```
现在收到了授权请求`alice, data2, read`,这时`r.sub`为`alice`,根据`g = _, _`及`g(r.sub, p.sub)`,我们可以得出对应的`p.sub`可以为`data2_admin`,接下来再根据`r.obj == p.obj && r.act == p.act`,最终找到匹配的授权policy规则为`p, data2_admin, data2, read`,最后根据`some(where (p.eft == allow))`规则,此时验证授权的结果就应该是`allow`。
这里`casbin`根据`r.sub`查找对应`p.sub`的过程还会考虑角色继承。考虑以下授权policy文件:
```
<pre class="calibre10">```
p<span class="token3">,</span> reader<span class="token3">,</span> data2<span class="token3">,</span> read
p<span class="token3">,</span> writer<span class="token3">,</span> data2<span class="token3">,</span> write
g<span class="token3">,</span> admin<span class="token3">,</span> reader
g<span class="token3">,</span> admin<span class="token3">,</span> writer
g<span class="token3">,</span> alice<span class="token3">,</span> admin
```
```
现在收到了授权请求`alice, data2, read`,这时`r.sub`为`alice`,根据`g = _, _`及`g(r.sub, p.sub)`,我们可以得出对应的`p.sub`可以为`admin`,`reader`,`writer`,接下来再根据`r.obj == p.obj && r.act == p.act`,最终找到匹配的授权policy规则为`p, reader, data2, read`,最后根据`some(where (p.eft == allow))`规则,此时验证授权的结果就应该是`allow`。
通过`[role_definition]`还可以定义resource-role之间的映射关系,见[示例](https://github.com/casbin/casbin/blob/master/examples/rbac_with_resource_roles_model.conf)。
`casbin`的模型大概就是上面描述的了,很多概念理解起来可能比较费劲,结合示例及在[editor](https://casbin.org/en/editor)上做些实验应该理解得更快一些。
## casbin相关事项
1. `casbin`的模型定义及授权policy定义还可以选择保存在其它存储中,见[Model Storage](https://casbin.org/docs/en/model-storage)、[Policy Storage](https://casbin.org/docs/en/policy-storage)、[Adapters](https://casbin.org/docs/en/adapters)。
2. `casbin`的`Enforcer`对象还提供了一系列API接口管理授权policy规则,见[Management API](https://casbin.org/docs/en/management-api)、[RBAC API](https://casbin.org/docs/en/rbac-api)。
3. 可以修改授权policy规则,那么当多个验证授权服务分布式部署时,必然要考虑某个服务修改了授权规则后,其它服务示例必须进行规则的同步。`casbin`也考虑到了这个需求,提供了Watchers机制,用于在观察到授权规则发生变更时进行必要的回调,见[Watchers](https://casbin.org/docs/en/watchers)。
4. 在多线程环境下使用`Enforcer`对象的接口,必须使用`casbin.NewSyncedEnforcer`创建`Enforcer`,另外还支持授权policy`AutoLoad`特性,见[这里](https://casbin.org/docs/en/multi-threading)。
5. `casbin`默认是从授权policy文件中加载角色及角色的继承信息的,也可以从其它外部数据源获取这些信息,见[这里](https://casbin.org/docs/en/role-managers)。
## casbin代码分析
`casbin`整体代码很简单,很多代码都是模型定义及授权policy定义加载的逻辑,关键代码只有一个方法[Enforce](https://github.com/casbin/casbin/blob/master/enforcer.go#L329),见下面:
```
<pre class="calibre10">```
<span class="token5">if</span> <span class="token1">!</span>e<span class="token3">.</span>enabled <span class="token3">{</span>
<span class="token5">return</span> <span class="token6">true</span><span class="token3">,</span> nil
<span class="token3">}</span>
functions <span class="token3">:</span><span class="token1">=</span> <span class="token4">make</span><span class="token3">(</span>map<span class="token3">[</span>string<span class="token3">]</span>govaluate<span class="token3">.</span>ExpressionFunction<span class="token3">)</span>
<span class="token5">for</span> key<span class="token3">,</span> <span class="token5">function</span> <span class="token3">:</span><span class="token1">=</span> range e<span class="token3">.</span>fm <span class="token3">{</span>
functions<span class="token3">[</span>key<span class="token3">]</span> <span class="token1">=</span> <span class="token5">function</span>
<span class="token3">}</span>
<span class="token5">if</span> _<span class="token3">,</span> ok <span class="token3">:</span><span class="token1">=</span> e<span class="token3">.</span>model<span class="token3">[</span><span class="token2">"g"</span><span class="token3">]</span><span class="token3">;</span> ok <span class="token3">{</span>
<span class="token5">for</span> key<span class="token3">,</span> ast <span class="token3">:</span><span class="token1">=</span> range e<span class="token3">.</span>model<span class="token3">[</span><span class="token2">"g"</span><span class="token3">]</span> <span class="token3">{</span>
rm <span class="token3">:</span><span class="token1">=</span> ast<span class="token3">.</span><span class="token6">RM</span>
functions<span class="token3">[</span>key<span class="token3">]</span> <span class="token1">=</span> util<span class="token3">.</span><span class="token4">GenerateGFunction</span><span class="token3">(</span>rm<span class="token3">)</span>
<span class="token3">}</span>
<span class="token3">}</span>
expString <span class="token3">:</span><span class="token1">=</span> e<span class="token3">.</span>model<span class="token3">[</span><span class="token2">"m"</span><span class="token3">]</span><span class="token3">[</span><span class="token2">"m"</span><span class="token3">]</span><span class="token3">.</span>Value
expression<span class="token3">,</span> err <span class="token3">:</span><span class="token1">=</span> govaluate<span class="token3">.</span><span class="token4">NewEvaluableExpressionWithFunctions</span><span class="token3">(</span>expString<span class="token3">,</span> functions<span class="token3">)</span>
<span class="token5">if</span> err <span class="token1">!=</span> nil <span class="token3">{</span>
<span class="token5">return</span> <span class="token6">false</span><span class="token3">,</span> err
<span class="token3">}</span>
rTokens <span class="token3">:</span><span class="token1">=</span> <span class="token4">make</span><span class="token3">(</span>map<span class="token3">[</span>string<span class="token3">]</span>int<span class="token3">,</span> <span class="token4">len</span><span class="token3">(</span>e<span class="token3">.</span>model<span class="token3">[</span><span class="token2">"r"</span><span class="token3">]</span><span class="token3">[</span><span class="token2">"r"</span><span class="token3">]</span><span class="token3">.</span>Tokens<span class="token3">)</span><span class="token3">)</span>
<span class="token5">for</span> i<span class="token3">,</span> token <span class="token3">:</span><span class="token1">=</span> range e<span class="token3">.</span>model<span class="token3">[</span><span class="token2">"r"</span><span class="token3">]</span><span class="token3">[</span><span class="token2">"r"</span><span class="token3">]</span><span class="token3">.</span>Tokens <span class="token3">{</span>
rTokens<span class="token3">[</span>token<span class="token3">]</span> <span class="token1">=</span> i
<span class="token3">}</span>
pTokens <span class="token3">:</span><span class="token1">=</span> <span class="token4">make</span><span class="token3">(</span>map<span class="token3">[</span>string<span class="token3">]</span>int<span class="token3">,</span> <span class="token4">len</span><span class="token3">(</span>e<span class="token3">.</span>model<span class="token3">[</span><span class="token2">"p"</span><span class="token3">]</span><span class="token3">[</span><span class="token2">"p"</span><span class="token3">]</span><span class="token3">.</span>Tokens<span class="token3">)</span><span class="token3">)</span>
<span class="token5">for</span> i<span class="token3">,</span> token <span class="token3">:</span><span class="token1">=</span> range e<span class="token3">.</span>model<span class="token3">[</span><span class="token2">"p"</span><span class="token3">]</span><span class="token3">[</span><span class="token2">"p"</span><span class="token3">]</span><span class="token3">.</span>Tokens <span class="token3">{</span>
pTokens<span class="token3">[</span>token<span class="token3">]</span> <span class="token1">=</span> i
<span class="token3">}</span>
parameters <span class="token3">:</span><span class="token1">=</span> enforceParameters<span class="token3">{</span>
rTokens<span class="token3">:</span> rTokens<span class="token3">,</span>
rVals<span class="token3">:</span> rvals<span class="token3">,</span>
pTokens<span class="token3">:</span> pTokens<span class="token3">,</span>
<span class="token3">}</span>
<span class="token5">if</span> policyLen <span class="token3">:</span><span class="token1">=</span> <span class="token4">len</span><span class="token3">(</span>e<span class="token3">.</span>model<span class="token3">[</span><span class="token2">"p"</span><span class="token3">]</span><span class="token3">[</span><span class="token2">"p"</span><span class="token3">]</span><span class="token3">.</span>Policy<span class="token3">)</span><span class="token3">;</span> policyLen <span class="token1">!=</span> <span class="token6">0</span> <span class="token3">{</span>
policyEffects <span class="token1">=</span> <span class="token4">make</span><span class="token3">(</span><span class="token3">[</span><span class="token3">]</span>effect<span class="token3">.</span>Effect<span class="token3">,</span> policyLen<span class="token3">)</span>
matcherResults <span class="token1">=</span> <span class="token4">make</span><span class="token3">(</span><span class="token3">[</span><span class="token3">]</span>float64<span class="token3">,</span> policyLen<span class="token3">)</span>
<span class="token5">if</span> <span class="token4">len</span><span class="token3">(</span>e<span class="token3">.</span>model<span class="token3">[</span><span class="token2">"r"</span><span class="token3">]</span><span class="token3">[</span><span class="token2">"r"</span><span class="token3">]</span><span class="token3">.</span>Tokens<span class="token3">)</span> <span class="token1">!=</span> <span class="token4">len</span><span class="token3">(</span>rvals<span class="token3">)</span> <span class="token3">{</span>
<span class="token5">return</span> <span class="token6">false</span><span class="token3">,</span> errors<span class="token3">.</span><span class="token4">New</span><span class="token3">(</span>
fmt<span class="token3">.</span><span class="token4">Sprintf</span><span class="token3">(</span>
<span class="token2">"invalid request size: expected %d, got %d, rvals: %v"</span><span class="token3">,</span>
<span class="token4">len</span><span class="token3">(</span>e<span class="token3">.</span>model<span class="token3">[</span><span class="token2">"r"</span><span class="token3">]</span><span class="token3">[</span><span class="token2">"r"</span><span class="token3">]</span><span class="token3">.</span>Tokens<span class="token3">)</span><span class="token3">,</span>
<span class="token4">len</span><span class="token3">(</span>rvals<span class="token3">)</span><span class="token3">,</span>
rvals<span class="token3">)</span><span class="token3">)</span>
<span class="token3">}</span>
<span class="token5">for</span> i<span class="token3">,</span> pvals <span class="token3">:</span><span class="token1">=</span> range e<span class="token3">.</span>model<span class="token3">[</span><span class="token2">"p"</span><span class="token3">]</span><span class="token3">[</span><span class="token2">"p"</span><span class="token3">]</span><span class="token3">.</span>Policy <span class="token3">{</span>
<span class="token">// log.LogPrint("Policy Rule: ", pvals)</span>
<span class="token5">if</span> <span class="token4">len</span><span class="token3">(</span>e<span class="token3">.</span>model<span class="token3">[</span><span class="token2">"p"</span><span class="token3">]</span><span class="token3">[</span><span class="token2">"p"</span><span class="token3">]</span><span class="token3">.</span>Tokens<span class="token3">)</span> <span class="token1">!=</span> <span class="token4">len</span><span class="token3">(</span>pvals<span class="token3">)</span> <span class="token3">{</span>
<span class="token5">return</span> <span class="token6">false</span><span class="token3">,</span> errors<span class="token3">.</span><span class="token4">New</span><span class="token3">(</span>
fmt<span class="token3">.</span><span class="token4">Sprintf</span><span class="token3">(</span>
<span class="token2">"invalid policy size: expected %d, got %d, pvals: %v"</span><span class="token3">,</span>
<span class="token4">len</span><span class="token3">(</span>e<span class="token3">.</span>model<span class="token3">[</span><span class="token2">"p"</span><span class="token3">]</span><span class="token3">[</span><span class="token2">"p"</span><span class="token3">]</span><span class="token3">.</span>Tokens<span class="token3">)</span><span class="token3">,</span>
<span class="token4">len</span><span class="token3">(</span>pvals<span class="token3">)</span><span class="token3">,</span>
pvals<span class="token3">)</span><span class="token3">)</span>
<span class="token3">}</span>
parameters<span class="token3">.</span>pVals <span class="token1">=</span> pvals
result<span class="token3">,</span> err <span class="token3">:</span><span class="token1">=</span> expression<span class="token3">.</span><span class="token4">Eval</span><span class="token3">(</span>parameters<span class="token3">)</span>
<span class="token">// log.LogPrint("Result: ", result)</span>
<span class="token5">if</span> err <span class="token1">!=</span> nil <span class="token3">{</span>
<span class="token5">return</span> <span class="token6">false</span><span class="token3">,</span> err
<span class="token3">}</span>
<span class="token5">switch</span> result <span class="token3">:</span><span class="token1">=</span> result<span class="token3">.</span><span class="token3">(</span>type<span class="token3">)</span> <span class="token3">{</span>
<span class="token5">case</span> bool<span class="token3">:</span>
<span class="token5">if</span> <span class="token1">!</span>result <span class="token3">{</span>
policyEffects<span class="token3">[</span>i<span class="token3">]</span> <span class="token1">=</span> effect<span class="token3">.</span>Indeterminate
<span class="token5">continue</span>
<span class="token3">}</span>
<span class="token5">case</span> float64<span class="token3">:</span>
<span class="token5">if</span> result <span class="token1">==</span> <span class="token6">0</span> <span class="token3">{</span>
policyEffects<span class="token3">[</span>i<span class="token3">]</span> <span class="token1">=</span> effect<span class="token3">.</span>Indeterminate
<span class="token5">continue</span>
<span class="token3">}</span> <span class="token5">else</span> <span class="token3">{</span>
matcherResults<span class="token3">[</span>i<span class="token3">]</span> <span class="token1">=</span> result
<span class="token3">}</span>
<span class="token5">default</span><span class="token3">:</span>
<span class="token5">return</span> <span class="token6">false</span><span class="token3">,</span> errors<span class="token3">.</span><span class="token4">New</span><span class="token3">(</span><span class="token2">"matcher result should be bool, int or float"</span><span class="token3">)</span>
<span class="token3">}</span>
<span class="token5">if</span> j<span class="token3">,</span> ok <span class="token3">:</span><span class="token1">=</span> parameters<span class="token3">.</span>pTokens<span class="token3">[</span><span class="token2">"p_eft"</span><span class="token3">]</span><span class="token3">;</span> ok <span class="token3">{</span>
eft <span class="token3">:</span><span class="token1">=</span> parameters<span class="token3">.</span>pVals<span class="token3">[</span>j<span class="token3">]</span>
<span class="token5">if</span> eft <span class="token1">==</span> <span class="token2">"allow"</span> <span class="token3">{</span>
policyEffects<span class="token3">[</span>i<span class="token3">]</span> <span class="token1">=</span> effect<span class="token3">.</span>Allow
<span class="token3">}</span> <span class="token5">else</span> <span class="token5">if</span> eft <span class="token1">==</span> <span class="token2">"deny"</span> <span class="token3">{</span>
policyEffects<span class="token3">[</span>i<span class="token3">]</span> <span class="token1">=</span> effect<span class="token3">.</span>Deny
<span class="token3">}</span> <span class="token5">else</span> <span class="token3">{</span>
policyEffects<span class="token3">[</span>i<span class="token3">]</span> <span class="token1">=</span> effect<span class="token3">.</span>Indeterminate
<span class="token3">}</span>
<span class="token3">}</span> <span class="token5">else</span> <span class="token3">{</span>
policyEffects<span class="token3">[</span>i<span class="token3">]</span> <span class="token1">=</span> effect<span class="token3">.</span>Allow
<span class="token3">}</span>
<span class="token5">if</span> e<span class="token3">.</span>model<span class="token3">[</span><span class="token2">"e"</span><span class="token3">]</span><span class="token3">[</span><span class="token2">"e"</span><span class="token3">]</span><span class="token3">.</span>Value <span class="token1">==</span> <span class="token2">"priority(p_eft) || deny"</span> <span class="token3">{</span>
<span class="token5">break</span>
<span class="token3">}</span>
<span class="token3">}</span>
<span class="token3">}</span>
```
```
这个代码逻辑很清楚了,就是根据`[matchers]`、`[request_definition]`、`[policy_definition]`找到匹配的`[policy_definition]`,再根据`[policy_effect]`最后得出最终的验证授权结果。可以看到该处理逻辑里大量地遍历了`e.model["r"]["r"].Tokens`、`e.model["p"]["p"].Tokens`、`e.model["p"]["p"].Policy`,当授权policy规则条数较多时,估计性能不会太好。但官方给了个[性能测试报告](https://casbin.org/docs/en/benchmark),据说性能还可以,这个后面还须再验证下。
为了优化性能,其实是可以将验证授权操作的结果进行缓存,官方也提供了[CachedEnforcer](https://github.com/casbin/casbin/blob/master/enforcer_cached.go),目测逻辑没问题,如果确实遇到性能瓶颈,可以考虑采用。
## 其它外部支援
一些开源爱好者为`casbin`贡献了[很多中间件组件](https://casbin.org/docs/en/middlewares),便于在多个编程语言中集成`casbin`进行权限验证。
还有一些开源爱好者为`casbin`贡献了[模型管理及授权策略管理的web前端](https://casbin.org/docs/en/admin-portal),如果觉得手工修改授权策略文件不直观的话,可以考虑采用。
还可以看到目前[很多开源项目](https://casbin.org/docs/en/adopters)的权限验证部分都是采用了`casbin`来实现的,例如[harbor里的rbac权限验证](https://github.com/goharbor/harbor/tree/master/src/common/rbac)。
还发现一个基于`casbin`实现的身份认证及验证授权服务,[这个例子](https://github.com/Soontao/go-simple-api-gateway)以后可以好好参考一下。
- php更新内容
- 其他
- empty、isset、is_null
- echo 输出bool值
- if真假情况
- 常量
- define与const(php5.3) 类常量
- 递归
- 单元测试
- 面向对象
- 全局变量域超全局变量
- php网络相关
- 支持的协议和封装协议(如http,php://input)
- 上下文(Context)选项和参数
- 过滤器
- http请求及模拟登录
- socket
- streams
- swoole
- 超全局变量
- $_ENV :存储了一些系统的环境变量
- $_COOKIE
- $_SESSION
- $_FILES
- $_SERVER
- 正则
- php正则函数
- 去除文本中的html、xml的标签
- 特殊符号
- \r\n
- 模式修正符
- 分组
- 断言
- 条件表达式
- 递归表达式 (?R)
- 固化分组
- 正则例子
- 框架
- 自动加载spl_autoload_register
- 时间函数
- 文件操作
- 文件的上传下载
- 常见的mimi类型
- 文件断点续传
- 下载文件防盗链
- 破解防盗链
- 无限分类
- 短信验证码
- 短信宝
- 视频分段加载
- phpDoc注释
- 流程控制代替语法
- 三元运算
- @错误抑制符
- 字符编码
- PHP CLI模式开发
- 配置可修改范围
- CGI、FastCGI和PHP-FPM关系图解
- No input file specified的解决方法
- SAPI(PHP常见的四种运行模式)
- assert断言
- 类基础
- 类的三大特性:封装,继承,多态
- 魔术方法
- 辅助查询(*)
- extends继承
- abstract 抽象类
- interface 接口(需要implements实现)
- 抽象类和接口的区别
- 多态
- static
- final
- serialize与unserialize
- instanceof 判断后代子类
- 类型约束
- clone克隆
- ::的用法
- new self()与new static()
- this、self、static、parent、super
- self、static、parent:后期静态绑定
- PHP的静态变量
- php导入
- trait
- 动态调用类方法
- 参数及类型申明
- 方法的重载覆盖
- return $a && $b
- 设计思想
- 依赖注入与依赖倒置
- 创建型模式(创建类对象)
- (*)单例模式
- (*)工厂模式
- 原型模式(在方法里克隆this)
- 创建者模式
- 结构型模式
- 适配器模式(Adapter)
- 桥接模式
- 装饰模式
- 组合模式
- 外观模式(门面(Facade)模式)
- 享元模式
- 代理模式
- 行为型模式
- (*)观察者模式
- (*)迭代器模式(Iterator)
- 模板方法模式 Template
- 命令模式(Command)
- 中介者模式(Mediator)
- 状态模式(State)
- 职责链模式 (Chainof Responsibility)
- 策略模式(Strategy)
- 已知模式-备忘录模式(Memento)
- 深度模式-解释器模式(Interpreter)
- 深度模式-访问者模式(Visitor)
- (*)注册树(注射器、注册表)模式
- 函数参考
- 影响 PHP 行为的扩展
- APC扩展(过时)
- APCu扩展
- APD扩展(过时)
- bcompiler扩展(过时)
- BLENC扩展 (代码加密 实验型)
- Componere扩展(7.1+)
- 错误处理扩展(PHP 核心)
- FFI扩展
- htscanner扩展
- inclued扩展
- Memtrack扩展
- OPcache扩展(5.5.0内部集成)
- Output Control扩展(核心)
- PHP Options/Info扩展(核心)
- phpdbg扩展(5.6+内部集成)
- runkit扩展
- runkit7扩展
- scream扩展
- uopz扩展
- Weakref扩展
- WinCache扩展
- Xhprof扩展
- 音频格式操作
- ID3
- KTaglib
- oggvorbis
- OpenAL
- 身份认证服务
- KADM5
- Radius
- 针对命令行的扩展
- Ncurses(暂无人维护)
- Newt(暂无人维护)
- Readline
- 压缩与归档扩展
- Bzip2
- LZF
- Phar
- Rar
- Zip
- Zlib
- 信用卡处理
- 加密扩展
- Crack(停止维护)
- CSPRNG(核心)
- Hash扩展(4.2内置默认开启、7.4核心)
- Mcrypt(7.2移除)
- Mhash(过时)
- OpenSSL(*)
- 密码散列算法(核心)
- Sodium(+)
- 数据库扩展
- 数据库抽象层
- 针对各数据库系统对应的扩展
- 日期与时间相关扩展
- Calendar
- 日期/时间(核心)
- HRTime(*)
- 文件系统相关扩展
- Direct IO
- 目录(核心)
- Fileinfo(内置)
- 文件系统(核心)
- Inotify
- Mimetype(过时)
- Phdfs
- Proctitle
- xattr
- xdiff
- 国际化与字符编码支持
- Enchant
- FriBiDi
- Gender
- Gettext
- iconv(内置默认开启)
- intl
- 多字节字符串(mbstring)
- Pspell
- Recode(将要过时)
- 图像生成和处理
- Cairo
- Exif
- GD(内置)
- Gmagick
- ImageMagick
- 邮件相关扩展
- Cyrus
- IMAP
- Mail(核心)
- Mailparse
- vpopmail(实验性 )
- 数学扩展
- BC Math
- GMP
- Lapack
- Math(核心)
- Statistics
- Trader
- 非文本内容的 MIME 输出
- FDF
- GnuPG
- haru(实验性)
- Ming(实验性)
- wkhtmltox(*)
- PS
- RPM Reader(停止维护)
- RpmInfo
- XLSWriter Excel操作(*)
- 进程控制扩展
- Eio
- Ev
- Expect
- Libevent
- PCNTL
- POSIX
- 程序执行扩展(核心)
- parallel
- pthreads(*)
- pht
- Semaphore
- Shared Memory
- Sync
- 其它基本扩展
- FANN
- GeoIP(*)
- JSON(内置)
- Judy
- Lua
- LuaSandbox
- Misc(核心)
- Parsekit
- SeasLog(-)
- SPL(核心)
- SPL Types(实验性)
- Streams(核心)
- Swoole(*)
- Tidy扩展
- Tokenizer
- URLs(核心)
- V8js(*)
- Yaml
- Yaf
- Yaconf(核心)
- Taint(检测xss字符串等)
- Data Structures
- 其它服务
- 网络(核心)
- cURL(*)
- Event(*)
- chdb
- FAM
- FTP
- Gearman
- Gopher
- Gupnp
- Hyperwave API(过时)
- LDAP(+)
- Memcache
- Memcached(+)
- mqseries
- RRD
- SAM
- ScoutAPM
- SNMP
- Sockets
- SSH2
- Stomp
- SVM
- SVN(试验性的)
- TCP扩展
- Varnish
- YAZ
- YP/NIS
- 0MQ(ZeroMQ、ZMQ)消息系统
- ZooKeeper
- 搜索引擎扩展
- mnoGoSearch
- Solr
- Sphinx
- Swish(实验性)
- 针对服务器的扩展
- Apache
- FastCGI 进程管理器
- IIS
- NSAPI
- Session 扩展
- Msession
- Sessions
- Session PgSQL
- 文本处理
- BBCode
- CommonMark(markdown解析)
- Parle
- PCRE( 核心)
- POSIX Regex
- ssdeep
- 字符串(核心)
- 变量与类型相关扩展
- 数组(核心)
- 类/对象(核心)
- Classkit(未维护)
- Ctype
- Filter扩展
- 函数处理(核心)
- quickhash扩展
- 反射扩展(核心)
- Variable handling(核心)
- Web 服务
- OAuth
- SCA(实验性)
- SOAP
- Yar
- XML-RPC(实验性)
- Windows 专用扩展
- COM
- win32ps
- win32service
- XML 操作
- DOM(内置,默认开启)
- libxml(内置 默认开启)
- SDO(停止维护)
- SDO-DAS-Relational(试验性的)
- SDO DAS XML
- SimpleXML(内置,5.12+默认开启)
- WDDX
- XMLDiff
- XML 解析器(Expat 解析器 默认开启)
- XMLReader(5.1+内置默认开启)
- XMLWriter(5.1+内置默认开启)
- XSL(内置)
- 图形用户界面(GUI) 扩展
- UI
- 预定义类
- PHP SPL(PHP 标准库)
- 数据结构
- SplDoublyLinkedList(双向链表)
- SplStack(栈 先进后出)
- SplQueue(队列)
- SplHeap(堆)
- SplMaxHeap(最大堆)
- SplMinHeap(最小堆)
- SplPriorityQueue(堆之优先队列)
- SplFixedArray(阵列【数组】)
- SplObjectStorage(映射【对象存储】)
- 迭代器
- DirectoryIterator类
- 文件处理
- SplFileInfo
- SplFileObject
- SplTempFileObject
- 接口 interface
- Countable
- OuterIterator
- RecursiveIterator
- SeekableIterator
- 异常
- 各种类及接口
- SplSubject
- SplObserver
- ArrayObject(将数组作为对象操作)
- SPL 函数
- 预定义接口
- Traversable(遍历)接口
- Iterator(迭代器)接口
- IteratorAggregate(聚合式迭代器)接口
- ArrayAccess(数组式访问)接口
- Serializable 序列化接口
- JsonSerializable
- Closure 匿名函数(闭包)类
- Generator生成器类
- 生成器(php5.5+)
- 反射
- 一、反射(reflection)类
- 二、Reflector 接口
- ReflectionClass 类报告了一个类的有关信息。
- ReflectionFunctionAbstract
- ReflectionParameter 获取函数或方法参数的相关信息
- ReflectionProperty 类报告了类的属性的相关信息。
- ReflectionClassConstant类报告有关类常量的信息。
- ReflectionZendExtension 类返回Zend扩展相关信息
- ReflectionExtension 报告了一个扩展(extension)的有关信息。
- 三、ReflectionGenerator类用于获取生成器的信息
- 四、ReflectionType 类用于获取函数、类方法的参数或者返回值的类型。
- 五、反射的应用场景
- git
- Git代码同时上传到GitHub和Gitee(码云)
- Git - 多人协同开发利器,团队协作流程规范与注意事项
- 删除远程仓库的文件
- 创建composer项目
- composer安装及设置
- composer自动加载讲解
- phpsdudy的composer操作
- swoole笔记
- 安装及常用Cli操作
- TCP
- 4种回调函数的写法
- phpRedis
- API
- API详细
- redis DB 概念:
- 通用命令:rawCommand
- Connection
- Server
- List
- Set
- Zset
- Hash
- string
- Keys
- 事物
- 发布订阅
- 流streams
- Geocoding 地理位置
- lua脚本
- Introspection 自我检测
- biMap
- 原生
- php-redis 操作类 封装
- redis 队列解决秒杀解决超卖:
- Linux
- Centos8(Liunx) 中安装PHP7.4 的三种方法和删除它的三种方法
- 权限设计
- ACL
- RBAC
- RBAC0
- RBAC1
- RBAC2
- RBAC3
- 例子
- ABAC 基于属性的访问控制
- 总结:SAAS后台权限设计案例分析
- casbin-权限管理框架
- 开始使用
- casbinAPI
- Think-Casbin
- 单点登录(SSO)
- OAuth授权
- OAuth 2.0 的四种方式
- 更新令牌
- 例子:第三方登录
- 微服务架构下的统一身份认证和授权
- 杂项
- SSL证书
- sublime Emmet的快捷语法
- 免费翻译接口
- 免费空间
- xss过滤
- HTML Purifier文档
- xss例子
- 实用小函数
- PHP操作Excel
- 架构师必须知道的26项PHP安全实践
- 模版布局
- smarty模版
- blade
- twig
- 大佬博客
- 优化
- 缓存
- opcache
- memcache
- 数据库
- 主从分布
- 数据库设计
- 笔记
- 配置
- nginx 主从配置
- nginx 负载均衡的配置
- 手动搭建Redis集群和MySQL主从同步(非Docker)
- Redis Cluster集群
- mysql主从同步
- 用安卓手机搭建 web 服务器
- 软件选择
- 扩展库列表
- 代码审计
- 漏洞挖掘的思路
- 命令注入
- 代码注入
- XSS 反射型漏洞
- XSS 存储型漏洞
- 本地包含与远程包含
- sql注入
- 函数
- 注释
- 步骤
- information_schema
- sql注入的分类
- 实战
- 防御
- CSRF 跨站请求伪造
- 计动态函数执行与匿名函数执行
- unserialize反序列化漏洞
- 覆盖变量漏洞
- 文件管理漏洞
- 文件上传漏洞
- 跳过登录
- URL编码对照表
- 浏览器插件开发
- 插件推荐
- 扩展文件manifest.json
- 不可视的background(常驻)页面
- 可视页面browser actions与page actions及八种展示方式
- 使用chrome.xxx API
- Google Chrome扩展与Web页面/服务器之间的交互
- Google Chrome扩展中的页面之间的数据通信
- inject-script
- chromeAPI
- pageAction
- alarms
- chrome.tabs
- chrome.runtime
- chrome.webRequest
- chrome.window
- chrome.storage
- chrome.contextMenus
- chrome.devtools
- chrome.extension
- 分类
- homepage_url 开发者或者插件主页
- 5种类型的JS对比及消息通信
- 其它补充
- 前端、移动端
- html5
- meta标签
- flex布局
- javascript
- 获取js对象所有方法
- dom加载
- ES6函数写法
- ES6中如何导入和导出模块
- 数组的 交集 差集 补集 并集
- bootstrap
- class速查
- 常见data属性
- 开源项目
- 会员 数据库表设计
- 程序执行
- 开发总结
- API接口
- API接口设计
- json转化
- app接口
