|
1 | 1 | #!/usr/bin/env python3 |
2 | 2 | # -*- coding: utf-8 -*- |
3 | | -import casbin |
4 | | -import casbin_async_sqlalchemy_adapter |
5 | | - |
6 | 3 | from fastapi import Depends, Request |
7 | 4 |
|
8 | | -from backend.app.admin.model import CasbinRule |
9 | 5 | from backend.common.enums import MethodType, StatusType |
10 | 6 | from backend.common.exception.errors import AuthorizationError, TokenError |
11 | 7 | from backend.common.security.jwt import DependsJwtAuth |
12 | 8 | from backend.core.conf import settings |
13 | | -from backend.database.db import async_engine |
14 | | - |
15 | | - |
16 | | -class RBAC: |
17 | | - @staticmethod |
18 | | - async def enforcer() -> casbin.AsyncEnforcer: |
19 | | - """ |
20 | | - 获取 casbin 执行器 |
21 | | -
|
22 | | - :return: |
23 | | - """ |
24 | | - # 模型定义:https://casbin.org/zh/docs/category/model |
25 | | - _CASBIN_RBAC_MODEL_CONF_TEXT = """ |
26 | | - [request_definition] |
27 | | - r = sub, obj, act |
28 | | -
|
29 | | - [policy_definition] |
30 | | - p = sub, obj, act |
31 | | -
|
32 | | - [role_definition] |
33 | | - g = _, _ |
34 | | -
|
35 | | - [policy_effect] |
36 | | - e = some(where (p.eft == allow)) |
37 | | -
|
38 | | - [matchers] |
39 | | - m = g(r.sub, p.sub) && (keyMatch(r.obj, p.obj) || keyMatch3(r.obj, p.obj)) && (r.act == p.act || p.act == "*") |
40 | | - """ |
41 | | - adapter = casbin_async_sqlalchemy_adapter.Adapter(async_engine, db_class=CasbinRule) |
42 | | - model = casbin.AsyncEnforcer.new_model(text=_CASBIN_RBAC_MODEL_CONF_TEXT) |
43 | | - enforcer = casbin.AsyncEnforcer(model, adapter) |
44 | | - await enforcer.load_policy() |
45 | | - return enforcer |
46 | | - |
47 | | - async def rbac_verify(self, request: Request, _token: str = DependsJwtAuth) -> None: |
48 | | - """ |
49 | | - RBAC 权限校验(鉴权顺序很重要,谨慎修改) |
50 | | -
|
51 | | - :param request: |
52 | | - :param _token: |
53 | | - :return: |
54 | | - """ |
55 | | - path = request.url.path |
56 | | - |
57 | | - # API 鉴权白名单 |
58 | | - if path in settings.TOKEN_REQUEST_PATH_EXCLUDE: |
59 | | - return |
| 9 | +from backend.plugin.casbin.utils.rbac import casbin_verify |
| 10 | + |
| 11 | + |
| 12 | +async def rbac_verify(request: Request, _token: str = DependsJwtAuth) -> None: |
| 13 | + """ |
| 14 | + RBAC 权限校验(鉴权顺序很重要,谨慎修改) |
| 15 | +
|
| 16 | + :param request: |
| 17 | + :param _token: |
| 18 | + :return: |
| 19 | + """ |
| 20 | + path = request.url.path |
| 21 | + |
| 22 | + # API 鉴权白名单 |
| 23 | + if path in settings.TOKEN_REQUEST_PATH_EXCLUDE: |
| 24 | + return |
| 25 | + |
| 26 | + # JWT 授权状态强制校验 |
| 27 | + if not request.auth.scopes: |
| 28 | + raise TokenError |
| 29 | + |
| 30 | + # 超级管理员免校验 |
| 31 | + if request.user.is_superuser: |
| 32 | + return |
60 | 33 |
|
61 | | - # JWT 授权状态强制校验 |
62 | | - if not request.auth.scopes: |
63 | | - raise TokenError |
| 34 | + # 检测用户角色 |
| 35 | + user_roles = request.user.roles |
| 36 | + if not user_roles or all(status == 0 for status in user_roles): |
| 37 | + raise AuthorizationError(msg='用户未分配角色,请联系系统管理员') |
64 | 38 |
|
65 | | - # 超级管理员免校验 |
66 | | - if request.user.is_superuser: |
| 39 | + # 检测用户所属角色菜单 |
| 40 | + if not any(len(role.menus) > 0 for role in user_roles): |
| 41 | + raise AuthorizationError(msg='用户未分配菜单,请联系系统管理员') |
| 42 | + |
| 43 | + # 检测后台管理操作权限 |
| 44 | + method = request.method |
| 45 | + if method != MethodType.GET or method != MethodType.OPTIONS: |
| 46 | + if not request.user.is_staff: |
| 47 | + raise AuthorizationError(msg='用户已被禁止后台管理操作,请联系系统管理员') |
| 48 | + |
| 49 | + # RBAC 鉴权 |
| 50 | + if settings.RBAC_ROLE_MENU_MODE: |
| 51 | + path_auth_perm = getattr(request.state, 'permission', None) |
| 52 | + |
| 53 | + # 没有菜单操作权限标识不校验 |
| 54 | + if not path_auth_perm: |
67 | 55 | return |
68 | 56 |
|
69 | | - # 检测用户角色 |
70 | | - user_roles = request.user.roles |
71 | | - if not user_roles or all(status == 0 for status in user_roles): |
72 | | - raise AuthorizationError(msg='用户未分配角色,请联系系统管理员') |
73 | | - |
74 | | - # 检测用户所属角色菜单 |
75 | | - if not any(len(role.menus) > 0 for role in user_roles): |
76 | | - raise AuthorizationError(msg='用户未分配菜单,请联系系统管理员') |
77 | | - |
78 | | - # 检测后台管理操作权限 |
79 | | - method = request.method |
80 | | - if method != MethodType.GET or method != MethodType.OPTIONS: |
81 | | - if not request.user.is_staff: |
82 | | - raise AuthorizationError(msg='用户已被禁止后台管理操作,请联系系统管理员') |
83 | | - |
84 | | - # RBAC 鉴权 |
85 | | - if settings.PERMISSION_MODE == 'role-menu': |
86 | | - path_auth_perm = getattr(request.state, 'permission', None) |
87 | | - |
88 | | - # 没有菜单操作权限标识不校验 |
89 | | - if not path_auth_perm: |
90 | | - return |
91 | | - |
92 | | - # 菜单鉴权白名单 |
93 | | - if path_auth_perm in settings.RBAC_ROLE_MENU_EXCLUDE: |
94 | | - return |
95 | | - |
96 | | - # 已分配菜单权限校验 |
97 | | - allow_perms = [] |
98 | | - for role in user_roles: |
99 | | - for menu in role.menus: |
100 | | - if menu.perms and menu.status == StatusType.enable: |
101 | | - allow_perms.extend(menu.perms.split(',')) |
102 | | - if path_auth_perm not in allow_perms: |
103 | | - raise AuthorizationError |
104 | | - else: |
105 | | - # casbin 鉴权白名单 |
106 | | - if (method, path) in settings.RBAC_CASBIN_EXCLUDE: |
107 | | - return |
108 | | - |
109 | | - # casbin 权限校验 |
110 | | - # 实现机制:backend/app/admin/api/v1/sys/casbin.py |
111 | | - user_uuid = request.user.uuid |
112 | | - enforcer = await self.enforcer() |
113 | | - if not enforcer.enforce(user_uuid, path, method): |
114 | | - raise AuthorizationError |
115 | | - |
116 | | - |
117 | | -rbac: RBAC = RBAC() |
| 57 | + # 菜单鉴权白名单 |
| 58 | + if path_auth_perm in settings.RBAC_ROLE_MENU_EXCLUDE: |
| 59 | + return |
| 60 | + |
| 61 | + # 已分配菜单权限校验 |
| 62 | + allow_perms = [] |
| 63 | + for role in user_roles: |
| 64 | + for menu in role.menus: |
| 65 | + if menu.perms and menu.status == StatusType.enable: |
| 66 | + allow_perms.extend(menu.perms.split(',')) |
| 67 | + if path_auth_perm not in allow_perms: |
| 68 | + raise AuthorizationError |
| 69 | + else: |
| 70 | + await casbin_verify(request) |
| 71 | + |
| 72 | + |
118 | 73 | # RBAC 授权依赖注入 |
119 | | -DependsRBAC = Depends(rbac.rbac_verify) |
| 74 | +DependsRBAC = Depends(rbac_verify) |
0 commit comments