Powerful package for handling roles and permissions in Laravel 5. Based on original package: romanbican/roles
This package is very easy to set up. There are only couple of steps.
Pull this package in through Composer (file composer.json
).
{
"require": {
"php": ">=7.1.0",
"laravel/framework": "5.3.*",
"nikolaynesov/laravel-roles": "~2.2.0"
}
}
If you are still using Laravel 5.0, you must pull in version
1.7.*
.
Run this command inside your terminal.
composer update
Add the package to your application service providers in config/app.php
file.
'providers' => [
/*
* Laravel Framework Service Providers...
*/
Illuminate\Foundation\Providers\ArtisanServiceProvider::class,
Illuminate\Auth\AuthServiceProvider::class,
...
/**
* Third Party Service Providers...
*/
Bican\Roles\RolesServiceProvider::class,
],
Publish the package config file and migrations to your application. Run these commands inside your terminal.
php artisan vendor:publish --provider="Bican\Roles\RolesServiceProvider" --tag=config
php artisan vendor:publish --provider="Bican\Roles\RolesServiceProvider" --tag=migrations
And also run migrations.
php artisan migrate
This uses the default users table which is in Laravel. You should already have the migration file for the users table available and migrated.
Include HasRoleAndPermission
trait and also implement HasRoleAndPermission
contract inside your User
model.
use Bican\Roles\Traits\HasRoleAndPermission;
use Bican\Roles\Contracts\HasRoleAndPermission as HasRoleAndPermissionContract;
class User extends Model implements AuthenticatableContract, CanResetPasswordContract, HasRoleAndPermissionContract
{
use Authenticatable, CanResetPassword, HasRoleAndPermission;
And that's it!
use Bican\Roles\Models\Role;
$adminRole = Role::create([
'name' => 'Admin',
'slug' => 'admin',
'description' => '', // optional
'level' => 1, // optional, set to 1 by default
]);
$moderatorRole = Role::create([
'name' => 'Forum Moderator',
'slug' => 'forum.moderator',
]);
Because of
Slugable
trait, if you make a mistake and for example leave a space in slug parameter, it'll be replaced with a dot automatically, because ofstr_slug
function.
It's really simple. You fetch a user from database and call attachRole
method. There is BelongsToMany
relationship between User
and Role
model.
use App\User;
$user = User::find($id);
$user->attachRole($adminRole); // you may pass whole object, or just an id
$user->detachRole($adminRole); // in case you want to detach role
$user->detachAllRoles(); // in case you want to detach all roles
You may now check if the user has required role.
if ($user->isRole('admin')) { // you may pass an id or slug
// or alternatively $user->hasRole('admin')
}
You may also do this:
if ($user->isAdmin()) {
//
}
And of course, there is a way to check for multiple roles:
if ($user->isRole('admin|moderator')) {
/*
| Or alternatively:
| $user->isRole('admin, moderator'), $user->isRole(['admin', 'moderator']),
| $user->isOne('admin|moderator'), $user->isOne('admin, moderator'), $user->isOne(['admin', 'moderator'])
*/
// if user has at least one role
}
if ($user->isRole('admin|moderator', true)) {
/*
| Or alternatively:
| $user->isRole('admin, moderator', true), $user->isRole(['admin', 'moderator'], true),
| $user->isAll('admin|moderator'), $user->isAll('admin, moderator'), $user->isAll(['admin', 'moderator'])
*/
// if user has all roles
}
When you are creating roles, there is optional parameter level
. It is set to 1
by default, but you may overwrite it and then you may do something like this:
if ($user->level() > 4) {
//
}
If user has multiple roles, method
level
returns the highest one.
Level
has also big effect on inheriting permissions. About it later.
It's very simple thanks to Permission
model.
use Bican\Roles\Models\Permission;
$createUsersPermission = Permission::create([
'name' => 'Create users',
'slug' => 'create.users',
'description' => '', // optional
]);
$deleteUsersPermission = Permission::create([
'name' => 'Delete users',
'slug' => 'delete.users',
]);
You can attach permissions to a role or directly to a specific user (and of course detach them as well).
use App\User;
use Bican\Roles\Models\Role;
$role = Role::find($roleId);
$role->attachPermission($createUsersPermission); // permission attached to a role
$user = User::find($userId);
$user->attachPermission($deleteUsersPermission); // permission attached to a user
$role->detachPermission($createUsersPermission); // in case you want to detach permission
$role->detachAllPermissions(); // in case you want to detach all permissions
$user->detachPermission($deleteUsersPermission);
$user->detachAllPermissions();
if ($user->may('create.users') { // you can pass an id or slug
//
}
if ($user->mayDeleteUsers()) {
//
}
Role with higher level is inheriting permission from roles with lower level.
There is an example of this magic
:
You have three roles: user
, moderator
and admin
. User has a permission to read articles, moderator can manage comments and admin can create articles. User has a level 1, moderator level 2 and admin level 3. It means, moderator and administrator has also permission to read articles, but administrator may manage comments as well.
If you don't want permissions inheriting feature in you application, simply ignore
level
parameter when you're creating roles.
Let's say you have an article and you want to edit it. This article belongs to a user (there is a column user_id
in articles table).
use App\Article;
use Bican\Roles\Models\Permission;
$editArticlesPermission = Permission::create([
'name' => 'Edit articles',
'slug' => 'edit.articles',
'model' => 'App\Article',
]);
$user->attachPermission($editArticlesPermission);
$article = Article::find(1);
if ($user->allowed('edit.articles', $article)) { // $user->allowedEditArticles($article)
//
}
This condition checks if the current user is the owner of article. If not, it will be looking inside user permissions for a row we created before.
if ($user->allowed('edit.articles', $article, false)) { // now owner check is disabled
//
}
There are four Blade extensions. Basically, it is replacement for classic if statements.
@role('admin') // @if(Auth::check() && Auth::user()->isRole('admin'))
// user is admin
@endrole
@permission('edit.articles') // @if(Auth::check() && Auth::user()->may('edit.articles'))
// user may edit articles
@endpermission
@level(2) // @if(Auth::check() && Auth::user()->level() >= 2)
// user has level 2 or higher
@endlevel
@allowed('edit', $article) // @if(Auth::check() && Auth::user()->allowed('edit', $article))
// show edit button
@endallowed
@role('admin|moderator', 'all') // @if(Auth::check() && Auth::user()->isRole('admin|moderator', 'all'))
// user is admin and also moderator
@else
// something else
@endrole
This package comes with VerifyRole
, VerifyPermission
and VerifyLevel
middleware. You must add them inside your app/Http/Kernel.php
file.
/**
* The application's route middleware.
*
* @var array
*/
protected $routeMiddleware = [
'auth' => \App\Http\Middleware\Authenticate::class,
'auth.basic' => \Illuminate\Auth\Middleware\AuthenticateWithBasicAuth::class,
'guest' => \App\Http\Middleware\RedirectIfAuthenticated::class,
'role' => \Bican\Roles\Middleware\VerifyRole::class,
'permission' => \Bican\Roles\Middleware\VerifyPermission::class,
'level' => \Bican\Roles\Middleware\VerifyLevel::class,
];
Now you may easily protect your routes.
$router->get('/example', [
'as' => 'example',
'middleware' => 'role:admin',
'uses' => 'ExampleController@index',
]);
$router->post('/example', [
'as' => 'example',
'middleware' => 'permission:edit.articles',
'uses' => 'ExampleController@index',
]);
$router->get('/example', [
'as' => 'example',
'middleware' => 'level:2', // level >= 2
'uses' => 'ExampleController@index',
]);
It throws \Bican\Roles\Exceptions\RoleDeniedException
, \Bican\Roles\Exceptions\PermissionDeniedException
or \Bican\Roles\Exceptions\LevelDeniedException
exceptions if it goes wrong.
You may catch these exceptions inside app/Exceptions/Handler.php
file and do whatever you want.
/**
* Render an exception into an HTTP response.
*
* @param \Illuminate\Http\Request $request
* @param \Exception $e
* @return \Illuminate\Http\Response
*/
public function render($request, Exception $e)
{
if ($e instanceof \Bican\Roles\Exceptions\RoleDeniedException) {
// you may for example flash message, redirect...
return redirect()->back();
}
return parent::render($request, $e);
}
You may change connection for models, slug separator, models path and there is also a handy pretend feature. Have a look at config file for more information.
For more information, please have a look at HasRoleAndPermission contract.
This package is free software distributed under the terms of the MIT license.