Rouaaba opened a new issue, #11962: URL: https://github.com/apache/apisix/issues/11962
### Description Hello, I have a user backend route which integrates the key-auth plugin, that works fine so i have a consumer with his username and token. But if I try to also use casbin, it always gives me access denied even though the user has the role and should have access, is apisix able to identify the username based on the token and then pass it to casbin? ***** with just key-auth plugin works fine: ****** curl -X GET "http://localhost:9080/user/project-users/Project1?userId=33" \ -H "Content-Type: application/json" \ -H "apikey: 595d8167-8725-442d-95f2-b87433c03ca4" [{"id":33,"userName":"rouaa","email":"","rolesAndProjects":[{"roleName":"PROJECT_ADMINISTRATOR","projectName":"Project1"}],"globalRoles":[]}] ***** route config with casbin **** curl -X PUT http://127.0.0.1:9180/apisix/admin/routes/UserBackend \ -H "X-API-KEY: <key>" \ -d ' { "uri": "/user/*", "priority": 0, "methods": ["GET", "POST", "PUT", "DELETE", "OPTIONS"], "status": 1, "upstream": { "type": "roundrobin", "nodes": { "rbac-service:8082": 1 }, "scheme": "http", "pass_host": "pass", "hash_on": "vars" }, "plugins": { "cors": { "allow_origins": "*", "allow_methods": "GET, POST, PUT, DELETE, OPTIONS", "allow_headers": "*", "expose_headers": "*", "max_age": 3600, "allow_credentials": true }, "key-auth": {}, "authz-casbin": { "username": "$consumer_name" } } }' ***** casbin config (directly on the metadata so no config files) ***** curl -X GET http://127.0.0.1:9180/apisix/admin/plugin_metadata/authz-casbin -H "X-API-KEY: <key>" {"value":{"value":{"model":"[request_definition]\nr = sub, obj, act\n\n[policy_definition]\np = sub, obj, act\n\n[role_definition]\ng = _, _\n\n[policy_effect]\ne = some(where (p.eft == allow))\n\n[matchers]\nm = (g(r.sub, p.sub) || keyMatch(r.sub, p.sub)) && keyMatch(r.obj, p.obj) && keyMatch(r.act, p.act)","id":"authz-casbin","policy":"p, GLOBAL_ADMINISTRATOR, /admin/create-user, POST\np, GLOBAL_ADMINISTRATOR, /admin/createadmin, POST\np, GLOBAL_ADMINISTRATOR, /admin/list-users, GET\np, GLOBAL_ADMINISTRATOR, /admin/delete-user, POST\np, GLOBAL_ADMINISTRATOR, /admin/projectusers, GET\np, GLOBAL_ADMINISTRATOR, /admin/user-byrole, GET\np, GLOBAL_ADMINISTRATOR, /admin/role-byuser, GET\np, GLOBAL_ADMINISTRATOR, /admin/userprojects, GET\np, GLOBAL_ADMINISTRATOR, /admin/assign-role, POST\np, GLOBAL_ADMINISTRATOR, /admin/createproject, POST\np, GLOBAL_ADMINISTRATOR, /admin/list-projects, GET\np, PROJECT_ADMINISTRATOR_{projectName}, /user/project-users/{projectName}, GET\np, PROJECT_ADMI NISTRATOR_{projectName}, /user/create-userrole, POST\np, PROJECT_MANAGER_{projectName}, /user/project-users/{projectName}, GET\np, PROJECT_USER_{projectName}, /user/project-users/{projectName}, GET\np, PROJECT_VIEWER_{projectName}, /user/project-users/{projectName}, GET\np, *, /user/changecredentials, POST\np, *, /user/login, POST\np, *, /user/updateprofile, PUT\np, *, /user/forgotpassword, POST\np, *, /user/resetpassword, POST\ng, root, GLOBAL_ADMINISTRATOR"},"id":"authz-casbin","createdIndex":305,"key":"/apisix/plugin_metadata/authz-casbin","modifiedIndex":440,"model":"[request_definition]\nr = sub, obj, act\n\n[policy_definition]\np = sub, obj, act\n\n[role_definition]\ng = _, _\n\n[policy_effect]\ne = some(where (p.eft == allow))\n\n[matchers]\nm = (g(r.sub, p.sub) || keyMatch(r.sub, p.sub)) && keyMatch(r.obj, p.obj) && keyMatch(r.act, p.act)","policy":"**g, rouaa, PROJECT_ADMINISTRATOR_Project1**"},"modifiedIndex":441,"key":"/apisix/plugin_metadata/authz-casbin","createdIndex": 305} **** consumer list **** curl -X GET http://127.0.0.1:9180/apisix/admin/consumers -H "X-API-KEY: <key>" {"total":2,"list":[{"value":{"create_time":1738917958,"update_time":1739180980,"plugins":{"key-auth":{"key":"24a5ff7f-d742-40f6-b13d-9b842b5ef463"}},"username":"root"},"modifiedIndex":416,"key":"/apisix/consumers/root","createdIndex":347},{"value":{"create_time":1739180966,"update_time":1739182611,"plugins":{"key-auth":{**"key":"595d8167-8725-442d-95f2-b87433c03ca4"}},"username":"rouaa"**},"modifiedIndex":421,"key":"/apisix/consumers/rouaa","createdIndex":414}]} how to make it identify the username based on the token) ### Environment - APISIX version (run `apisix version`): - Operating system (run `uname -a`): - OpenResty / Nginx version (run `openresty -V` or `nginx -V`): - etcd version, if relevant (run `curl http://127.0.0.1:9090/v1/server_info`): - APISIX Dashboard version, if relevant: - Plugin runner version, for issues related to plugin runners: - LuaRocks version, for installation issues (run `luarocks --version`): -- This is an automated message from the Apache Git Service. To respond to the message, please log on to GitHub and use the URL above to go to the specific comment. To unsubscribe, e-mail: [email protected] For queries about this service, please contact Infrastructure at: [email protected]
