Skip to content
Use Casbin in Django, Casbin is a powerful and efficient open-source access control library.
Branch: master
Clone or download
Latest commit 692b941 May 11, 2019
Permalink
Type Name Latest commit message Commit time
Failed to load latest commit information.
casbin_middleware Improve the comment. May 11, 2019
django_example Add Casbin middleware. May 10, 2019
.gitignore Ignore IDEA files. May 10, 2019
LICENSE Initial commit Jan 15, 2019
README.md Fix the Gitter link. May 11, 2019
manage.py Add example project. May 10, 2019
requirements.txt Add requirements.txt May 11, 2019

README.md

django-casbin

Gitter

django-casbin is an authorization middleware for Django, it's based on PyCasbin.

Installation

pip install django-casbin

Simple Example

This repo is just a working Django app that shows the usage of django-casbin. To use it in your existing Django app, you need:

  • Add the middleware to your Django app's settings.py:
MIDDLEWARE = [
    'django.middleware.security.SecurityMiddleware',
    'django.contrib.sessions.middleware.SessionMiddleware',
    'django.middleware.common.CommonMiddleware',
    'django.middleware.csrf.CsrfViewMiddleware',
    'django.contrib.auth.middleware.AuthenticationMiddleware',
    'django.contrib.messages.middleware.MessageMiddleware',
    'django.middleware.clickjacking.XFrameOptionsMiddleware',
    'casbin_middleware.middleware.CasbinMiddleware', # Add this line, must after AuthenticationMiddleware.
]
  • Copy casbin_middleware folder to your Django's top folder, modify casbin_middleware/middleware.py if you need:
import casbin

    def __init__(self, get_response):
        self.get_response = get_response
        # load the casbin model and policy from files.
        # change the 2nd arg to use a database.
        self.enforcer = casbin.Enforcer("casbin_middleware/authz_model.conf", "casbin_middleware/authz_policy.csv")

    def check_permission(self, request):
        # change the user, path, method as you need.
        user = request.user.username
        if request.user.is_anonymous:
            user = 'anonymous'
        path = request.path
        method = request.method
        return self.enforcer.enforce(user, path, method)
  • The default policy authz_policy.csv is:
p, anonymous, /, GET
p, admin, *, *
g, alice, admin

It means anonymous user can only access homepage /. Admin users like alice can access any pages. Currently all accesses are regarded as anonymous. Add your authentication to let a user log in.

Documentation

The authorization determines a request based on {subject, object, action}, which means what subject can perform what action on what object. In this plugin, the meanings are:

  1. subject: the logged-in user name
  2. object: the URL path for the web resource like "dataset1/item1"
  3. action: HTTP method like GET, POST, PUT, DELETE, or the high-level actions you defined like "read-file", "write-blog"

For how to write authorization policy and other details, please refer to the Casbin's documentation.

Getting Help

License

This project is under Apache 2.0 License. See the LICENSE file for the full license text.

You can’t perform that action at this time.