Docs HomeMongoDB Manual

db.createRole()

Definition定义

db.createRole(role, writeConcern)

Creates a role in a database. You can specify privileges for the role by explicitly listing the privileges or by having the role inherit privileges from other roles or both. The role applies to the database on which you run the method.在数据库中创建角色。您可以通过显式列出权限或让角色继承其他角色的权限或同时继承这两种权限来指定角色的权限。该角色应用于运行该方法的数据库。

Important

mongosh Method

This page documents a mongosh method. This is not the documentation for database commands or language-specific drivers, such as Node.js.

For the database command, see the createRole command.

For MongoDB API drivers, refer to the language-specific MongoDB driver documentation.

For the legacy mongo shell documentation, refer to the documentation for the corresponding MongoDB Server release:

mongo shell v4.4

The db.createRole() method accepts the following arguments:db.createRole()方法接受以下参数:

Parameter参数Type类型Description描述
roledocumentA document containing the name of the role and the role definition.包含角色名称和角色定义的文档。
writeConcerndocumentOptional.可选的。The level of write concern for the operation. 操作的写入关注级别。See Write Concern Specification. 请参阅写入关注规范

The role document has the following form:role文档具有以下形式:

{
role: "<name>",
privileges: [
{ resource: { <resource> }, actions: [ "<action>", ... ] },
...
],
roles: [
{ role: "<role>", db: "<database>" } | "<role>",
...
],
authenticationRestrictions: [
{
clientSource: ["<IP>" | "<CIDR range>", ...],
serverAddress: ["<IP>" | "<CIDR range>", ...]
},
...
]
}

The role document has the following fields:role文档包含以下字段:

Field字段Type类型Description描述
rolestringThe name of the new role.新角色的名称。
privilegesarrayThe privileges to grant the role. 授予角色的权限。A privilege consists of a resource and permitted actions. 权限由资源和允许的操作组成。For the syntax of a privilege, see the privileges array.有关权限的语法,请参阅privileges数组。
You must include the privileges field. Use an empty array to specify no privileges. 您必须包括privileges字段。使用空数组可以不指定权限。
rolesarrayAn array of roles from which this role inherits privileges.此角色从中继承权限的角色数组。
You must include the roles field. Use an empty array to specify no roles to inherit from. 您必须包括roles字段。使用空数组可以不指定要继承的角色。
authenticationRestrictionsarrayOptional.可选的。
The authentication restrictions the server enforces on the role. 服务器对角色强制执行的身份验证限制。Specifies a list of IP addresses and CIDR ranges users granted this role are allowed to connect to and/or which they can connect from. 指定允许授予此角色的用户连接到和/或可以从中连接的IP地址和CIDR范围的列表。

Roles角色

In the roles field, you can specify both built-in roles and user-defined roles.roles字段中,可以指定内置角色用户定义的角色

To specify a role that exists in the same database where db.createRole() runs, you can either specify the role with the name of the role:要指定运行db.createRole()的同一数据库中存在的角色,可以使用角色名称指定该角色:

"readWrite"

Or you can specify the role with a document, as in:或者,您可以使用文档指定角色,如中所示:

{ role: "<role>", db: "<database>" }

To specify a role that exists in a different database, specify the role with a document.若要指定其他数据库中存在的角色,请使用文档指定该角色。

Authentication Restrictions身份验证限制

The authenticationRestrictions document can contain only the following fields. The server throws an error if the authenticationRestrictions document contains an unrecognized field:authenticationRestrictions文档只能包含以下字段。如果authenticationRestrictions文档包含无法识别的字段,则服务器将引发错误:

Field Name字段名称ValueDescription描述
clientSourceArray of IP addresses and/or CIDR rangesIP地址和/或CIDR范围数组If present, when authenticating a user, the server verifies that the client's IP address is either in the given list or belongs to a CIDR range in the list. 如果存在,则在对用户进行身份验证时,服务器会验证客户端的IP地址是否在给定列表中或属于列表中的CIDR范围。If the client's IP address is not present, the server does not authenticate the user.如果客户端的IP地址不存在,则服务器不会对用户进行身份验证。
serverAddressArray of IP addresses and/or CIDR rangesIP地址和/或CIDR范围数组A list of IP addresses or CIDR ranges to which the client can connect. 客户端可以连接的IP地址或CIDR范围的列表。If present, the server will verify that the client's connection was accepted via an IP address in the given list. 如果存在,服务器将验证是否通过给定列表中的IP地址接受了客户端的连接。If the connection was accepted via an unrecognized IP address, the server does not authenticate the user.如果通过无法识别的IP地址接受连接,则服务器不会对用户进行身份验证。
Important

If a user inherits multiple roles with incompatible authentication restrictions, that user becomes unusable.如果用户继承了多个具有不兼容身份验证限制的角色,则该用户将变得不可用。

For example, if a user inherits one role in which the clientSource field is ["198.51.100.0"] and another role in which the clientSource field is ["203.0.113.0"] the server is unable to authenticate the user.例如,如果用户继承了一个角色,其中clientSource字段为["198.51.100.0"],而另一个角色的clientSource字段则为["203.0.113.0"],则服务器无法对用户进行身份验证。

For more information on authentication in MongoDB, see Authentication.有关MongoDB中身份验证的更多信息,请参阅身份验证

Behavior行为

Replica set副本集

If run on a replica set, db.createRole() is executed using "majority" write concern by default.如果在副本集上运行,db.createRole()在默认情况下使用"majority"写入关注执行。

Scope范围

Except for roles created in the admin database, a role can only include privileges that apply to its database and can only inherit from other roles in its database.除了在admin数据库中创建的角色外,角色只能包括应用于其数据库的权限,并且只能从其数据库中的其他角色继承。

A role created in the admin database can include privileges that apply to the admin database, other databases or to the cluster resource, and can inherit from roles in other databases as well as the admin database.admin数据库中创建的角色可以包括应用于admin数据库、其他数据库或集群资源的权限,并且可以继承其他数据库以及admin数据库中的角色。

The db.createRole() method returns a duplicate role error if the role already exists in the database.如果数据库中已经存在角色,则db.createRole()方法返回一个重复的角色错误。

Required Access所需访问权限

To create a role in a database, you must have:若要在数据库中创建角色,您必须具有:

Built-in roles userAdmin and userAdminAnyDatabase provide createRole and grantRole actions on their respective resources.内置角色userAdminuserAdminAnyDatabase在各自的资源上提供createRolegrantRole操作。

To create a role with authenticationRestrictions specified, you must have the setAuthenticationRestriction action on the database resource which the role is created.若要创建指定了authenticationRestrictions的角色,必须对创建该角色的数据库资源执行setAuthenticationRestriction 操作

Example实例

The following db.createRole() method creates the myClusterwideAdmin role on the admin database:以下db.createRole()方法在admin数据库上创建myClusterwideAdmin角色:

use admin
db.createRole(
{
role: "myClusterwideAdmin",
privileges: [
{ resource: { cluster: true }, actions: [ "addShard" ] },
{ resource: { db: "config", collection: "" }, actions: [ "find", "update", "insert", "remove" ] },
{ resource: { db: "users", collection: "usersCollection" }, actions: [ "update", "insert", "remove" ] },
{ resource: { db: "", collection: "" }, actions: [ "find" ] }
],
roles: [
{ role: "read", db: "admin" }
]
},
{ w: "majority" , wtimeout: 5000 }
)