We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Want to prioritize this issue? Try:
What's your scenario? What do you want to achieve?
I use the RBAC model,and the environment is in k8s
i use code like this to open log
E, err = casbin.NewEnforcer(m, adp) E.EnableLog(true)
and when pod initialization succeeds, it print log like : g : [admin department api] [department user api]
g : [admin department api] [department user api]
I want to know what policy and group is allowed when my Enforcer returns a pass
like this:
req : user /api/v1/xxxx GET p [admin api /api/v1/xxxx GET Y] g [user admin api]
I looked through the issue and learned that the we had this
casbin/enforcer.go
Line 794 in c907b90
Maybe it helps me, but it doesn't actually print
help 😭
The text was updated successfully, but these errors were encountered:
@tangyang9464 @JalinWang
Sorry, something went wrong.
hsluoyz
No branches or pull requests
Want to prioritize this issue? Try:
What's your scenario? What do you want to achieve?
I use the RBAC model,and the environment is in k8s
i use code like this to open log
and when pod initialization succeeds, it print log like :
g : [admin department api] [department user api]
I want to know what policy and group is allowed when my Enforcer returns a pass
like this:
I looked through the issue and learned that the we had this
casbin/enforcer.go
Line 794 in c907b90
Maybe it helps me, but it doesn't actually print
help 😭
The text was updated successfully, but these errors were encountered: