GitXplorerGitXplorer
m

acl

public
83 stars
2 forks
1 issues

Commits

List of commits on branch master.
Verified
8ff4c7ecc3885549b67291dfc70ee44e3b2d6664

feat: introduce makefile to "make" things a bit simpler

mm19c committed 2 years ago
Verified
19d34a7bf51c74cb851be71204eb9ea2d66e9a4c

feat: use github actions instead of travis

mm19c committed 2 years ago
Verified
7560e08804bd66fbe0cb44474aa218502fc07134

chore: formatting

mm19c committed 2 years ago
Verified
f94b8d4e760343c62d740ab450a1d2653082451f

Create CODE_OF_CONDUCT.md

mm19c committed 6 years ago
Verified
b846d7ab63c0a8c2a42e742432297647dde1b59a

Update README.md

mm19c committed 6 years ago
Verified
88f1131609111a05e8d96278e42ce4bdb0c11cc0

Update README.md

mm19c committed 6 years ago

README

The README file for this repository.

ACL

Codacy Badge Build Status Codacy Badge Documentation

TL;DR;

acl is a lightweight acl manager for go.

Features

  • Design simple & reusable roles to empower your application.
  • Acquire the rights of other roles to build a powerful set of permissions.
  • Resolve possible roles by examine them in an unified way.

Example

type User struct {
    isAdmin bool
}

func main() {
    // first of all: create a new manager instance to register all your roles in one place
    manager := acl.NewManager()

    // now you can use `Ensure` to guarantee that the role with the passed identifier is present
    user := manager.Ensure("user").Grant("profile.edit")
    // use `Grant`, `Revoke` and `AcquireFrom` to extend the right stack
    editor := manager.Ensure("editor").Grant("news.list", "news.create", "news.edit").AcquireFrom(user)

    // you can also use NewRole to create a Role manually
    admin := acl.NewRole("admin").Grant("news.delete").AcquireFrom(editor)
    // note, that you have to register the role by yourself
    manager.Register(admin)

    // to check if a right was granted to a role you can use:
    var hasAccess bool
    hasAccess = admin.Has("some.right")

    // to check if at least one of the expected rights is present:
    hasAccess = admin.HasOneOf("news.list", "news.create")

    // ... and finally, to check that all the expected rights are present, use:
    hasAccess = admin.HasAllOf("news.delete", "news.list")

    // a role can be extended with an examiner to determine whether a role can be added
    // to a `ResultSet`
    admin.SetExaminer(func (payload interface{}) bool {
        user := payload.(User)
        return user.isAdmin
    })

    // to get a result set you can use the managers `Examine` function
    rs := manager.Examine(User{isAdmin: true})

    // a result set contains "Has", "HasOneOf" and "HasAllOf" as described above and...
    // `GetRole` to grab specific roles from the result set
    expectedRole := rs.GetRole("admin")

    // you can also check if a role was added to a result set using:
    if rs.HasRole("admin") {
        // ...
    }
}

Possible enhancements

  • Conditional IsAllowed (combine AND/OR queries into a ConditionGroup).