Declarative access policies/permissions modeled after AWS' IAM policies.
Project description
drf-permission-rules
permission rules for DRF base on drf access policy
Usage
ViewSet permissions
class UserViewSet(ModelViewSet, PermissionsActionMixin):
...
@action(methods=["GET", "POST"], detail=False)
def some_action(self, request, *args, **kwargs):
...
GET /api/users/permissions
Response:
{
"create": true,
"list": true,
"some_action": false
}
Multiple ViewSet permissions
# views.py
class UserViewSet(ModelViewSet, PermissionsActionMixin):
...
class BookViewSet(ModelViewSet, PermissionsActionMixin):
...
class AuthorViewSet(ModelViewSet, PermissionsActionMixin):
...
# urls.py
urlpatterns = [
...
path("api/", include("permission_rules.urls")),
]
GET /api/users/permissions
Response:
{
"User": {
"create": true
"list": true,
"some_action": false
}
"Book": {
"create": true,
"list": true
},
"Author": {
"create": false,
"list": true
}
}
Speedup
You can get permissions from a file instead of a database.
# settings.py
PERMISSION_RULES_SETTINGS = {
"use_file_instead_db": true,
"permission_rules_file_path": "/path/to/permissions.json"
}
Project details
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
drf_permission_rules-0.4.2.tar.gz
(10.3 kB
view hashes)
Built Distribution
Close
Hashes for drf_permission_rules-0.4.2.tar.gz
Algorithm | Hash digest | |
---|---|---|
SHA256 | b7ea35b765d0d83cc89a561638f75669ae96e73af284eee3dbe134b289be6cd0 |
|
MD5 | e7a807a57f1f0b2464e84303010c4f37 |
|
BLAKE2b-256 | 1163ab33b39295b00c8dca1a4c031740a18b9e3784a39446466056aa8d9f6c3f |
Close
Hashes for drf_permission_rules-0.4.2-py3-none-any.whl
Algorithm | Hash digest | |
---|---|---|
SHA256 | b67a8994ed73dc59b1a3a54ea01c1f078fe03e93265a875ec1de034876a1a629 |
|
MD5 | 30711befa21fe433c7f1889fbfa63993 |
|
BLAKE2b-256 | 91784b7cafdcb3768c069483ddf948fbdd44249ce7319e600de22d1b9d5c270a |