From f5972cf37eff03f7853f73671a3afd1199edb40f Mon Sep 17 00:00:00 2001 From: liewstar <2935437378@qq.com> Date: Wed, 18 Sep 2024 19:21:45 +0800 Subject: [PATCH 1/2] feat: Use "casbin" command instead of "java -jar target/casbin-java-cli.jar" command --- README.md | 10 +++++----- casbin.cmd | 5 +++++ casbin.sh | 2 ++ 3 files changed, 12 insertions(+), 5 deletions(-) create mode 100644 casbin.cmd create mode 100644 casbin.sh diff --git a/README.md b/README.md index 4c482ec..f91c9ea 100644 --- a/README.md +++ b/README.md @@ -33,32 +33,32 @@ mvn clean install - Check whether Alice has read permission on data1 ```shell - java -jar target/casbin-java-cli.jar -m "examples/rbac_model.conf" -p "examples/rbac_policy.csv" -e "alice, data1, read" + ./casbin.sh -m "examples/rbac_model.conf" -p "examples/rbac_policy.csv" -e "alice, data1, read" ``` > Allow ```shell - java -jar target/casbin-java-cli.jar -m "[request_definition]|r = sub, obj, act|[policy_definition]|p = sub, obj, act|[role_definition]|g = _, _|[policy_effect]|e = some(where (p.eft == allow))|[matchers]|m = g(r.sub, p.sub) && r.obj == p.obj && r.act == p.act" -p "p, alice, data1, read|p, bob, data2, write|p, data2_admin, data2, read|p, data2_admin, data2, write|g, alice, data2_admin" -e "alice, data1, read" + ./casbin.sh -m "[request_definition]|r = sub, obj, act|[policy_definition]|p = sub, obj, act|[role_definition]|g = _, _|[policy_effect]|e = some(where (p.eft == allow))|[matchers]|m = g(r.sub, p.sub) && r.obj == p.obj && r.act == p.act" -p "p, alice, data1, read|p, bob, data2, write|p, data2_admin, data2, read|p, data2_admin, data2, write|g, alice, data2_admin" -e "alice, data1, read" ``` > Allow - Check whether Alice has write permission for data2. If so, display the effective policy. ```shell - java -jar target/casbin-java-cli.jar -m "examples/rbac_model.conf" -p "examples/rbac_policy.csv" -ex "alice, data2, write" + ./casbin.sh -m "examples/rbac_model.conf" -p "examples/rbac_policy.csv" -ex "alice, data2, write" ``` > true Reason: [alice, data2, write] - Add a policy to the policy file ```shell - java -jar target/casbin-java-cli.jar -m "examples/rbac_model.conf" -p "examples/rbac_policy.csv" -ap "alice, data2, write" + ./casbin.sh -m "examples/rbac_model.conf" -p "examples/rbac_policy.csv" -ap "alice, data2, write" ``` > Add Success - Delete a policy from the policy file ```shell - java -jar target/casbin-java-cli.jar -m "examples/rbac_model.conf" -p "examples/rbac_policy.csv" -rp "alice,data1,read" + ./casbin.sh -m "examples/rbac_model.conf" -p "examples/rbac_policy.csv" -rp "alice,data1,read" ``` > Remove Success diff --git a/casbin.cmd b/casbin.cmd new file mode 100644 index 0000000..70124d9 --- /dev/null +++ b/casbin.cmd @@ -0,0 +1,5 @@ +@echo off +setlocal +set JAR_PATH=target\casbin-java-cli.jar +java -jar "%JAR_PATH%" %* +endlocal \ No newline at end of file diff --git a/casbin.sh b/casbin.sh new file mode 100644 index 0000000..00c2157 --- /dev/null +++ b/casbin.sh @@ -0,0 +1,2 @@ +#!/bin/sh +java -jar target/casbin-java-cli.jar "$@" \ No newline at end of file From 30701e075562d5508b86c2ff85ee23ac08b648dc Mon Sep 17 00:00:00 2001 From: liewstar <2935437378@qq.com> Date: Wed, 18 Sep 2024 23:33:27 +0800 Subject: [PATCH 2/2] fix: remove .sh suffix --- README.md | 10 +++++----- casbin.sh => casbin | 0 2 files changed, 5 insertions(+), 5 deletions(-) rename casbin.sh => casbin (100%) mode change 100644 => 100755 diff --git a/README.md b/README.md index f91c9ea..9921991 100644 --- a/README.md +++ b/README.md @@ -33,32 +33,32 @@ mvn clean install - Check whether Alice has read permission on data1 ```shell - ./casbin.sh -m "examples/rbac_model.conf" -p "examples/rbac_policy.csv" -e "alice, data1, read" + ./casbin -m "examples/rbac_model.conf" -p "examples/rbac_policy.csv" -e "alice, data1, read" ``` > Allow ```shell - ./casbin.sh -m "[request_definition]|r = sub, obj, act|[policy_definition]|p = sub, obj, act|[role_definition]|g = _, _|[policy_effect]|e = some(where (p.eft == allow))|[matchers]|m = g(r.sub, p.sub) && r.obj == p.obj && r.act == p.act" -p "p, alice, data1, read|p, bob, data2, write|p, data2_admin, data2, read|p, data2_admin, data2, write|g, alice, data2_admin" -e "alice, data1, read" + ./casbin -m "[request_definition]|r = sub, obj, act|[policy_definition]|p = sub, obj, act|[role_definition]|g = _, _|[policy_effect]|e = some(where (p.eft == allow))|[matchers]|m = g(r.sub, p.sub) && r.obj == p.obj && r.act == p.act" -p "p, alice, data1, read|p, bob, data2, write|p, data2_admin, data2, read|p, data2_admin, data2, write|g, alice, data2_admin" -e "alice, data1, read" ``` > Allow - Check whether Alice has write permission for data2. If so, display the effective policy. ```shell - ./casbin.sh -m "examples/rbac_model.conf" -p "examples/rbac_policy.csv" -ex "alice, data2, write" + ./casbin -m "examples/rbac_model.conf" -p "examples/rbac_policy.csv" -ex "alice, data2, write" ``` > true Reason: [alice, data2, write] - Add a policy to the policy file ```shell - ./casbin.sh -m "examples/rbac_model.conf" -p "examples/rbac_policy.csv" -ap "alice, data2, write" + ./casbin -m "examples/rbac_model.conf" -p "examples/rbac_policy.csv" -ap "alice, data2, write" ``` > Add Success - Delete a policy from the policy file ```shell - ./casbin.sh -m "examples/rbac_model.conf" -p "examples/rbac_policy.csv" -rp "alice,data1,read" + ./casbin -m "examples/rbac_model.conf" -p "examples/rbac_policy.csv" -rp "alice,data1,read" ``` > Remove Success diff --git a/casbin.sh b/casbin old mode 100644 new mode 100755 similarity index 100% rename from casbin.sh rename to casbin