db.createRole()
On this page本页内容
Definition定义
db.createRole(role, writeConcern)
-
Creates a role in a database. You can specify privileges for the role by explicitly listing the privileges or by having the role inherit privileges from other roles or both. The role applies to the database on which you run the method.在数据库中创建角色。您可以通过显式列出权限或让角色继承其他角色的权限或同时继承这两种权限来指定角色的权限。该角色应用于运行该方法的数据库。Importantmongosh Method
This page documents a
mongosh
method. This is not the documentation for database commands or language-specific drivers, such as Node.js.For the database command, see the
createRole
command.For MongoDB API drivers, refer to the language-specific MongoDB driver documentation.
For the legacy
mongo
shell documentation, refer to the documentation for the corresponding MongoDB Server release:Thedb.createRole()
method accepts the following arguments:db.createRole()
方法接受以下参数:Parameter参数Type类型Description描述role
document A document containing the name of the role and the role definition.包含角色名称和角色定义的文档。writeConcern
document Optional.可选的。The level of write concern for the operation.操作的写入关注级别。See Write Concern Specification.请参阅写入关注规范。Therole
document has the following form:role
文档具有以下形式:{
role: "<name>",
privileges: [
{ resource: { <resource> }, actions: [ "<action>", ... ] },
...
],
roles: [
{ role: "<role>", db: "<database>" } | "<role>",
...
],
authenticationRestrictions: [
{
clientSource: ["<IP>" | "<CIDR range>", ...],
serverAddress: ["<IP>" | "<CIDR range>", ...]
},
...
]
}Therole
document has the following fields:role
文档包含以下字段:Field字段Type类型Description描述role
string The name of the new role.新角色的名称。privileges
array The privileges to grant the role.授予角色的权限。A privilege consists of a resource and permitted actions.权限由资源和允许的操作组成。For the syntax of a privilege, see the有关权限的语法,请参阅privileges
array.privileges
数组。
You must include the您必须包括privileges
field. Use an empty array to specify no privileges.privileges
字段。使用空数组可以不指定权限。roles
array An array of roles from which this role inherits privileges.此角色从中继承权限的角色数组。
You must include the您必须包括roles
field. Use an empty array to specify no roles to inherit from.roles
字段。使用空数组可以不指定要继承的角色。authenticationRestrictions
array Optional.可选的。
The authentication restrictions the server enforces on the role.服务器对角色强制执行的身份验证限制。Specifies a list of IP addresses and CIDR ranges users granted this role are allowed to connect to and/or which they can connect from.指定允许授予此角色的用户连接到和/或可以从中连接的IP地址和CIDR范围的列表。
Roles角色
In the 在roles
field, you can specify both built-in roles and user-defined roles.roles
字段中,可以指定内置角色和用户定义的角色。
To specify a role that exists in the same database where 要指定运行db.createRole()
runs, you can either specify the role with the name of the role:db.createRole()
的同一数据库中存在的角色,可以使用角色名称指定该角色:
"readWrite"
Or you can specify the role with a document, as in:或者,您可以使用文档指定角色,如中所示:
{ role: "<role>", db: "<database>" }
To specify a role that exists in a different database, specify the role with a document.若要指定其他数据库中存在的角色,请使用文档指定该角色。
Authentication Restrictions身份验证限制
The authenticationRestrictions
document can contain only the following fields. The server throws an error if the authenticationRestrictions
document contains an unrecognized field:authenticationRestrictions
文档只能包含以下字段。如果authenticationRestrictions
文档包含无法识别的字段,则服务器将引发错误:
clientSource | ||
serverAddress |
If a user inherits multiple roles with incompatible authentication restrictions, that user becomes unusable.如果用户继承了多个具有不兼容身份验证限制的角色,则该用户将变得不可用。
For example, if a user inherits one role in which the 例如,如果用户继承了一个角色,其中clientSource
field is ["198.51.100.0"]
and another role in which the clientSource
field is ["203.0.113.0"]
the server is unable to authenticate the user.clientSource
字段为["198.51.100.0"]
,而另一个角色的clientSource
字段则为["203.0.113.0"]
,则服务器无法对用户进行身份验证。
For more information on authentication in MongoDB, see Authentication.有关MongoDB中身份验证的更多信息,请参阅身份验证。
Behavior行为
Replica set副本集
If run on a replica set, 如果在副本集上运行,db.createRole()
is executed using "majority"
write concern by default.db.createRole()
在默认情况下使用"majority"
写入关注执行。
Scope范围
Except for roles created in the 除了在admin
database, a role can only include privileges that apply to its database and can only inherit from other roles in its database.admin
数据库中创建的角色外,角色只能包括应用于其数据库的权限,并且只能从其数据库中的其他角色继承。
A role created in the 在admin
database can include privileges that apply to the admin
database, other databases or to the cluster resource, and can inherit from roles in other databases as well as the admin
database.admin
数据库中创建的角色可以包括应用于admin
数据库、其他数据库或集群资源的权限,并且可以继承其他数据库以及admin
数据库中的角色。
The 如果数据库中已经存在角色,则db.createRole()
method returns a duplicate role error if the role already exists in the database.db.createRole()
方法返回一个重复的角色错误。
Required Access所需访问权限
To create a role in a database, you must have:若要在数据库中创建角色,您必须具有:
the该数据库资源上的createRole
action on that database resource.createRole
操作。the该数据库上的grantRole
action on that database to specify privileges for the new role as well as to specify roles to inherit from.grantRole
操作,用于指定新角色的权限以及指定要继承的角色。
Built-in roles 内置角色userAdmin
and userAdminAnyDatabase
provide createRole
and grantRole
actions on their respective resources.userAdmin
和userAdminAnyDatabase
在各自的资源上提供createRole
和grantRole
操作。
To create a role with 若要创建指定了authenticationRestrictions
specified, you must have the setAuthenticationRestriction
action on the database resource which the role is created.authenticationRestrictions
的角色,必须对创建该角色的数据库资源执行setAuthenticationRestriction
操作。
Example实例
The following 以下db.createRole()
method creates the myClusterwideAdmin
role on the admin
database:db.createRole()
方法在admin
数据库上创建myClusterwideAdmin
角色:
use admin
db.createRole(
{
role: "myClusterwideAdmin",
privileges: [
{ resource: { cluster: true }, actions: [ "addShard" ] },
{ resource: { db: "config", collection: "" }, actions: [ "find", "update", "insert", "remove" ] },
{ resource: { db: "users", collection: "usersCollection" }, actions: [ "update", "insert", "remove" ] },
{ resource: { db: "", collection: "" }, actions: [ "find" ] }
],
roles: [
{ role: "read", db: "admin" }
]
},
{ w: "majority" , wtimeout: 5000 }
)