mirror of
https://github.com/portainer/portainer.git
synced 2025-07-23 07:19:41 +02:00
* feat(api): decorate Docker resource creation response with resource control * fix(api): fix a potential resource control conflict between stacks/volumes * feat(api): generate a default private resource control instead of admin only * fix(api): fix default RC value * fix(api): update RC authorizations check to support admin only flag * refactor(api): relocate access control related methods * fix(api): fix a potential conflict when fetching RC from database * refactor(api): refactor access control logic * refactor(api): remove the concept of DecoratedStack * feat(api): automatically remove RC when removing a Docker resource * refactor(api): update filter resource methods documentation * refactor(api): update proxy package structure * refactor(api): renamed proxy/misc package * feat(api): re-introduce ResourceControlDelete operation as admin restricted * refactor(api): relocate default endpoint authorizations * feat(api): migrate RBAC data * feat(app): ResourceControl management refactor * fix(api): fix access control issue on stack deletion and automatically delete RC * fix(api): fix stack filtering * fix(api): fix UpdateResourceControl operation checks * refactor(api): introduce a NewTransport builder method * refactor(api): inject endpoint in Docker transport * refactor(api): introduce Docker client into Docker transport * refactor(api): refactor http/proxy package * feat(api): inspect a Docker resource labels during access control validation * fix(api): only apply automatic resource control creation on success response * fix(api): fix stack access control check * fix(api): use StatusCreated instead of StatusOK for automatic resource control creation * fix(app): resource control fixes * fix(api): fix an issue preventing administrator to inspect a resource with a RC * refactor(api): remove useless error return * refactor(api): document DecorateStacks function * fix(api): fix invalid resource control type for container deletion * feat(api): support Docker system networks * feat(api): update Swagger docs * refactor(api): rename transport variable * refactor(api): rename transport variable * feat(networks): add system tag for system networks * feat(api): add support for resource control labels * feat(api): upgrade to DBVersion 22 * refactor(api): refactor access control management in Docker proxy * refactor(api): re-implement docker proxy taskListOperation * refactor(api): review parameters declaration * refactor(api): remove extra blank line * refactor(api): review method comments * fix(api): fix invalid ServerAddress property and review method visibility * feat(api): update error message * feat(api): update restrictedVolumeBrowserOperation method * refactor(api): refactor method parameters * refactor(api): minor refactor * refactor(api): change Azure transport visibility * refactor(api): update struct documentation * refactor(api): update struct documentation * feat(api): review restrictedResourceOperation method * refactor(api): remove unused authorization methods * feat(api): apply RBAC when enabled on stack operations * fix(api): fix invalid data migration procedure for DBVersion = 22 * fix(app): RC duplicate on private resource * feat(api): change Docker API version logic for libcompose/client factory * fix(api): update access denied error message to be Docker API compliant * fix(api): update volume browsing authorizations data migration * fix(api): fix an issue with access control in multi-node agent Swarm cluster
118 lines
3.4 KiB
Go
118 lines
3.4 KiB
Go
package factory
|
|
|
|
import (
|
|
"fmt"
|
|
"io"
|
|
"log"
|
|
"net/http"
|
|
"net/url"
|
|
"strings"
|
|
|
|
httperror "github.com/portainer/libhttp/error"
|
|
portainer "github.com/portainer/portainer/api"
|
|
"github.com/portainer/portainer/api/crypto"
|
|
"github.com/portainer/portainer/api/http/proxy/factory/docker"
|
|
)
|
|
|
|
func (factory *ProxyFactory) newDockerProxy(endpoint *portainer.Endpoint) (http.Handler, error) {
|
|
if strings.HasPrefix(endpoint.URL, "unix://") || strings.HasPrefix(endpoint.URL, "npipe://") {
|
|
return factory.newDockerLocalProxy(endpoint)
|
|
}
|
|
|
|
return factory.newDockerHTTPProxy(endpoint)
|
|
}
|
|
|
|
func (factory *ProxyFactory) newDockerLocalProxy(endpoint *portainer.Endpoint) (http.Handler, error) {
|
|
endpointURL, err := url.Parse(endpoint.URL)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
return factory.newOSBasedLocalProxy(endpointURL.Path, endpoint)
|
|
}
|
|
|
|
func (factory *ProxyFactory) newDockerHTTPProxy(endpoint *portainer.Endpoint) (http.Handler, error) {
|
|
if endpoint.Type == portainer.EdgeAgentEnvironment {
|
|
tunnel := factory.reverseTunnelService.GetTunnelDetails(endpoint.ID)
|
|
endpoint.URL = fmt.Sprintf("http://localhost:%d", tunnel.Port)
|
|
}
|
|
|
|
endpointURL, err := url.Parse(endpoint.URL)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
endpointURL.Scheme = "http"
|
|
httpTransport := &http.Transport{}
|
|
|
|
if endpoint.TLSConfig.TLS || endpoint.TLSConfig.TLSSkipVerify {
|
|
config, err := crypto.CreateTLSConfigurationFromDisk(endpoint.TLSConfig.TLSCACertPath, endpoint.TLSConfig.TLSCertPath, endpoint.TLSConfig.TLSKeyPath, endpoint.TLSConfig.TLSSkipVerify)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
httpTransport.TLSClientConfig = config
|
|
endpointURL.Scheme = "https"
|
|
}
|
|
|
|
transportParameters := &docker.TransportParameters{
|
|
Endpoint: endpoint,
|
|
ResourceControlService: factory.resourceControlService,
|
|
UserService: factory.userService,
|
|
TeamService: factory.teamService,
|
|
TeamMembershipService: factory.teamMembershipService,
|
|
RegistryService: factory.registryService,
|
|
DockerHubService: factory.dockerHubService,
|
|
SettingsService: factory.settingsService,
|
|
ReverseTunnelService: factory.reverseTunnelService,
|
|
ExtensionService: factory.extensionService,
|
|
SignatureService: factory.signatureService,
|
|
DockerClientFactory: factory.dockerClientFactory,
|
|
}
|
|
|
|
dockerTransport, err := docker.NewTransport(transportParameters, httpTransport)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
proxy := newSingleHostReverseProxyWithHostHeader(endpointURL)
|
|
proxy.Transport = dockerTransport
|
|
return proxy, nil
|
|
}
|
|
|
|
type dockerLocalProxy struct {
|
|
transport *docker.Transport
|
|
}
|
|
|
|
// ServeHTTP is the http.Handler interface implementation
|
|
// for a local (Unix socket or Windows named pipe) Docker proxy.
|
|
func (proxy *dockerLocalProxy) ServeHTTP(w http.ResponseWriter, r *http.Request) {
|
|
// Force URL/domain to http/unixsocket to be able to
|
|
// use http.transport RoundTrip to do the requests via the socket
|
|
r.URL.Scheme = "http"
|
|
r.URL.Host = "unixsocket"
|
|
|
|
res, err := proxy.transport.ProxyDockerRequest(r)
|
|
if err != nil {
|
|
code := http.StatusInternalServerError
|
|
if res != nil && res.StatusCode != 0 {
|
|
code = res.StatusCode
|
|
}
|
|
|
|
httperror.WriteError(w, code, "Unable to proxy the request via the Docker socket", err)
|
|
return
|
|
}
|
|
defer res.Body.Close()
|
|
|
|
for k, vv := range res.Header {
|
|
for _, v := range vv {
|
|
w.Header().Add(k, v)
|
|
}
|
|
}
|
|
|
|
w.WriteHeader(res.StatusCode)
|
|
|
|
if _, err := io.Copy(w, res.Body); err != nil {
|
|
log.Printf("proxy error: %s\n", err)
|
|
}
|
|
}
|