dlnsk/h-rbac

Based on native Laravel's gates and policies. Hierarchical RBAC with callbacks.

v1.2.0 2025-05-30 09:06 UTC

This package is auto-updated.

Last update: 2025-05-30 09:11:37 UTC


README

Based on native Laravel's gates and policies. Hierarchical RBAC with callbacks.

Latest Version on Packagist Software License Coverage Status Quality Score Total Downloads

In the process of creating my own projects I have formed an opinion about the minimum required ability of RBAC. It should allow:

  • roles and permissions
  • callbacks for permissions (for passing parameters in permission checking)
  • permission's inheritance (to give different abilities to different roles)
  • an optimal way to manage RBAC

Install

Supports Laravel since v5.1 to the latest (12.* and above).

Via Composer

$ composer require dlnsk/h-rbac

Publish some cool stuff:

  • config file (config/h-rbac.php) to configure role/permission
  • example policy (app/Policies/PostPolicy.php) to configure chains and callbacks

with

php artisan vendor:publish --tag=hrbac-config

Add permissions, its chains and callbacks to policies.

Add roles and its permissions to config file. That's all!

Overview

This module is a wrapper for authorization logic and control access to resources of Laravel 5.1 and later.

Let's describe the minimum required ability of RBAC (in my opinion).

Roles and permissions

It's clear.

Callbacks for permissions

Very common situation is to allow user to change only his own posts. With this package it's simple:

public function editOwnPost($authorizedUser, $post) {
    return $authorizedUser->id === $post->user_id;
}

and use as

if (\Gate::can('editOwnPost', $post)) {
}

You can pass any number of parameters in callback as array.

That's what you can do with Laravel's policies as it described in docs. But Laravel doesn't support roles. Let's see what new adds the module.

Permission's inheritance

As you see callbacks are very useful. But what about a site manager who may edit any posts? Create separate permission? But which of them we should check?

Answer is to use chained (inherited) permissions. Example:

edit -> editAnyPost -> editPostInCategory -> editOwnPost

Each of these permissions is placed into the appropriate role, but in code we always check the first (except in very rare cases):

if (\Gate::can('edit', $post)) {
}

These permissions in the chain will be checked one by one until one of them will pass. In other case the ability will be rejected for this user. So, we have many permissions with different business logic but are checking in the code only one. This is the key!

The ways to manage RBAC

It is very popular to use database to store roles and permissions. It flexible but hard to support. Managing of roles and permissions requires the backend.

Static roles

Most projects aren't large. It needs only a few roles and permissions, so backend becomes economically inexpedient. Thus, I believe that file driven RBAC is enough for many projects where users can have one or many roles simultaneously. Defining roles in config is visual and simple for support.

By default, roles applied to user store in database, so you should add an accessor to User model to get list of roles. Name of attribute you can change in config/h-rbac.php if you need.

public function getRolesAttribute() {
    return $this->roles()->pluck('name')->toArray();
}

It doesn't matter how you store roles. Just return an array from function. You also can write and bind your own RolesProvider through DI.

Static roles + overriding permissions

Some projects may suppose that administrator can override some user's permissions (include or exclude). If you have dozens of such users it's hard to make different roles for each. So overriding is a good choice.

It requires additional database table to store overrides. Publish migration with

php artisan vendor:publish --tag=hrbac-migrations

bind EloquentPermissionProvider inside your AppServiceProvider.php bindings:

public $bindings = [
    PermissionsProvider::class => EloquentPermissionProvider::class,
    ...
];

and add trait WithPermissions to your User model

<?php

class User extends Authenticatable
{
    use \Dlnsk\HierarchicalRBAC\Traits\WithPermissions;
    ...
}

Now every record in permissions table adds or removes one permission from user. You also can store additional value(s) with an overridden permission. Here is the example:

Let's add the callback in PostPolicy.

public function editPostInCategory($authorizedUser, $post, $permissions): bool {
    return $permissions && $permissions->contains('value', $post->category_id);
}

Now, if we add to permissions table next record

[
    'user_id' => 100,
    'name' => 'editPostInCategory',
    'action' => 'include',
    'value' => 5,
]

we'll allow user with id = 100 edit any post in category with id = 5.

The word exclude may also be in the action field. This takes away the ability from user. If both actions exists in database, the exclude wins.

The field value doesn't used by the module at all, so you can use any type for it or even a set of any extra fields.

Are you think it'll be quite hard to manage overrides? Just use embedded Permissions Backend UI!

Different way

Keep in mind that you can bind your own RolesProvider or/and PermissionsProvider and store roles and permissions as you wish. It's very flexible.

Usage

As we said h-rbac is a wrapper for authorization logic since Laravel 5.1 to this time. So, you can use any features of it.

if (\Gate::allows('edit', $post)) { /* do something */ }
...
if (\Gate::denies('edit', $post)) { abort(403); }
...
if (\Gate::forUser($user)->allows('edit', $post)) { /* do something */ }

From User model:

if ($request->user()->can('edit', $post)) { /* do something */ }
...
if ($request->user()->cannot('edit', $post)) { abort(403); }

In controller:

$this->authorize('edit', $post);

Within Blade

@can('edit', $post)
    <!-- The Current User Can Update The Post -->
@else
    <!-- The Current User Can't Update The Post -->
@endcan

Also in h-rbac we have added directive @role which you can combine with @else

@role('user|manager')
    <!-- Current user has any of those roles -->
@endrole

Permission without model

Native Laravel's permissions hard linked with models. So the model object or model class are required to check ability, because it defines a right Policy that includes callbacks:

$this->authorize('edit', $post);
$this->authorize('create', Post::class);

If your permission isn't linked to model you can use policy class as a place to search the chain and callbacks:

$this->authorize('download', ReportPolicy::class);

and with additional parameters:

$this->authorize('download', [ReportPolicy::class, 'current_date' => Carbon::now()]);

The policy class should be the first element in array or it may has a key:

$this->authorize('download', ['current_date' => Carbon::now(), 'policy' => ReportPolicy::class]);

Helper

There is an helper class HRBACHelper which includes a couple of methods that make difficult things simpler.

getPermissionsPayload($user, $ability, $policyClass): Collection

gets all permissions that user has in current ability with extra information from overridden permissions.

Example:

Imagine that you need to show to user the list of posts that he allowed to edit.

// PostPolicy.php
// See more about 'chains' below
public $chains = [
    'edit' => [
        'editAnyPost',
        'editPostInCategory',
        'editOwnPost',
    ],
];

Let user has editOwnPost and editPostInCategory (the last is overridden in the DB with some specific categories). So, we can use helper in the piece of code, where we take a set of posts:

$helper = resolve(Dlnsk\HierarchicalRBAC\HRBACHelper::class);
$permissions = $helper->getPermissionsPayload($user, 'edit', PostPolicy::class)
$query = Post::query();
if ($permissions->keys()->contains('editPostInCategory')) {
    $query->orWhereIn(
        'category_id', 
        $permissions->get('editPostInCategory')->pluck('value')
    );
}
if ($permissions->keys()->contains('editOwnPost')) {
    $query->orWhere('user_id', $user->id);
}
$posts = $query->get();

The result of function won't have a permission if it "excluded" for the user.

canUserTakeAbility($user, $ability, $policyClass): bool|null

test that user has any permissions in the ability (chain) itself, but don't check permissions and them callbacks.

Example:

Let's continue with the last example. Now we need to display the menu item which will allow to show the list of posts. But only if user can edit something. It's simple:

$helper = resolve(Dlnsk\HierarchicalRBAC\HRBACHelper::class);
...
if ($helper->canUserTakeAbility($user, 'edit', PostPolicy::class)) {
    $menu->add('Posts', route('posts.index'));
}

Yes. The list of posts can be empty if there is no suitable models, but it's not an authorization problem. :)

Configuration

Permissions

Permissions and callbacks are defining in Policies as it describes in docs. Innovation is the chains of permissions.

class PostPolicy
{
    public $chains = [
        'edit' => [
            'editAnyPost',
            'editPostInCategory',
            'editOwnPost',
        ],
        'delete' => [
            'deleteAnyPost',
            'deleteOwnPost',
        ],
    ];

    ////////////// Callbacks ///////////////

    public function editOwnPost($authorizedUser, $post) {
        return $authorizedUser->id === $post->user_id;
    }

    public function editPostInCategory($authorizedUser, $post, $permissions): bool {
        return $permissions && $permissions->contains('value', $post->category_id);
    }
}

You should add callback only if you need additional check for this permission. The name of callback should be camelcased name of permission.

The logic of checking permissions

We check all permissions in chain one by one and:

  • allow if user has a permission with no callback
  • allow if user has a permission and callback return true
  • deny if user don't have all permission in chain
  • deny if callbacks of all user's permissions return false

If the check allows the user to do something, all remaining permission in chain will be pass.

Keep in mind that you can define your own PermissionChecker to change this logic.

Roles

Roles are defining in config file (config/h-rbac.php)

<?php return [
    /**
     * Built-in application roles and its permissions
     */
    'builtinRoles' => [
        'manager' => [
            'editAnyPost',
            'deleteAnyPost',
            'seeReportsInCategory',
        ],
        'user' => [
            'editOwnPost',
            'seeOwnReports',
        ],
    ],

];

If you want to store assigning permissions to roles in database, just make your own RolesProvider to change this logic.

Permissions Backend UI

Permissions Backend UI is an embedded way to manage permission overrides. Backend is configured in config/h-rbac.php:

'permissionsUI' => [
    'enabled' => true,
    'routePrefix' => '',
    'routeMiddlewares' => ['auth'],
    'baseLayout' => 'layout.app',
],

To switch on the backend set permissionsUI.enabled to true, publish and do migration to create permissions table and bind EloquentPermissionProvider as described in Static roles + overriding permissions.

Parameters

enabled - enable or disable backend UI.

routePrefix - the backend routes look like /{prefix}/{user}/permissions/{params}, so here you can choose appropriate prefix for UI.

routeMiddlewares - an array of middlewares that filter the request to backend UI.

baseLayout - the layout for backend's views. We use header and content sections.

Remember that you can totally rewrite views after publish them in your own project:

php artisan vendor:publish --tag=hrbac-backend

Do you need an own much cooler UI?

No problem. Just copy and integrate in your project next files:

src/Backend/routes.php
src/Backend/Http/PermissionController.php
src/Backend/Policies/PermissionPolicy.php
src/Backend/resources/lang/*
src/Backend/resources/views/*
src/Models/Permission.php

Change log

Please see CHANGELOG for more information what has changed recently.

Contributing

Please see CONTRIBUTING and CONDUCT for details.

Credits

License

The MIT License (MIT). Please see License File for more information.