mirror of
https://github.com/portainer/portainer.git
synced 2025-07-24 07:49:41 +02:00
* feat(api): decorate Docker resource creation response with resource control * fix(api): fix a potential resource control conflict between stacks/volumes * feat(api): generate a default private resource control instead of admin only * fix(api): fix default RC value * fix(api): update RC authorizations check to support admin only flag * refactor(api): relocate access control related methods * fix(api): fix a potential conflict when fetching RC from database * refactor(api): refactor access control logic * refactor(api): remove the concept of DecoratedStack * feat(api): automatically remove RC when removing a Docker resource * refactor(api): update filter resource methods documentation * refactor(api): update proxy package structure * refactor(api): renamed proxy/misc package * feat(api): re-introduce ResourceControlDelete operation as admin restricted * refactor(api): relocate default endpoint authorizations * feat(api): migrate RBAC data * feat(app): ResourceControl management refactor * fix(api): fix access control issue on stack deletion and automatically delete RC * fix(api): fix stack filtering * fix(api): fix UpdateResourceControl operation checks * refactor(api): introduce a NewTransport builder method * refactor(api): inject endpoint in Docker transport * refactor(api): introduce Docker client into Docker transport * refactor(api): refactor http/proxy package * feat(api): inspect a Docker resource labels during access control validation * fix(api): only apply automatic resource control creation on success response * fix(api): fix stack access control check * fix(api): use StatusCreated instead of StatusOK for automatic resource control creation * fix(app): resource control fixes * fix(api): fix an issue preventing administrator to inspect a resource with a RC * refactor(api): remove useless error return * refactor(api): document DecorateStacks function * fix(api): fix invalid resource control type for container deletion * feat(api): support Docker system networks * feat(api): update Swagger docs * refactor(api): rename transport variable * refactor(api): rename transport variable * feat(networks): add system tag for system networks * feat(api): add support for resource control labels * feat(api): upgrade to DBVersion 22 * refactor(api): refactor access control management in Docker proxy * refactor(api): re-implement docker proxy taskListOperation * refactor(api): review parameters declaration * refactor(api): remove extra blank line * refactor(api): review method comments * fix(api): fix invalid ServerAddress property and review method visibility * feat(api): update error message * feat(api): update restrictedVolumeBrowserOperation method * refactor(api): refactor method parameters * refactor(api): minor refactor * refactor(api): change Azure transport visibility * refactor(api): update struct documentation * refactor(api): update struct documentation * feat(api): review restrictedResourceOperation method * refactor(api): remove unused authorization methods * feat(api): apply RBAC when enabled on stack operations * fix(api): fix invalid data migration procedure for DBVersion = 22 * fix(app): RC duplicate on private resource * feat(api): change Docker API version logic for libcompose/client factory * fix(api): update access denied error message to be Docker API compliant * fix(api): update volume browsing authorizations data migration * fix(api): fix an issue with access control in multi-node agent Swarm cluster
133 lines
4.5 KiB
Go
133 lines
4.5 KiB
Go
package security
|
|
|
|
import (
|
|
"github.com/portainer/portainer/api"
|
|
)
|
|
|
|
// AuthorizedResourceControlAccess checks whether the user can alter an existing resource control.
|
|
func AuthorizedResourceControlAccess(resourceControl *portainer.ResourceControl, context *RestrictedRequestContext) bool {
|
|
if context.IsAdmin || resourceControl.Public {
|
|
return true
|
|
}
|
|
|
|
for _, access := range resourceControl.TeamAccesses {
|
|
for _, membership := range context.UserMemberships {
|
|
if membership.TeamID == access.TeamID {
|
|
return true
|
|
}
|
|
}
|
|
}
|
|
|
|
for _, access := range resourceControl.UserAccesses {
|
|
if context.UserID == access.UserID {
|
|
return true
|
|
}
|
|
}
|
|
|
|
return false
|
|
}
|
|
|
|
// AuthorizedResourceControlUpdate ensure that the user can update a resource control object.
|
|
// A non-administrator user cannot create a resource control where:
|
|
// * the Public flag is set false
|
|
// * the AdministatorsOnly flag is set to true
|
|
// * he wants to create a resource control without any user/team accesses
|
|
// * he wants to add more than one user in the user accesses
|
|
// * he wants to add a user in the user accesses that is not corresponding to its id
|
|
// * he wants to add a team he is not a member of
|
|
func AuthorizedResourceControlUpdate(resourceControl *portainer.ResourceControl, context *RestrictedRequestContext) bool {
|
|
if context.IsAdmin || resourceControl.Public {
|
|
return true
|
|
}
|
|
|
|
if resourceControl.AdministratorsOnly {
|
|
return false
|
|
}
|
|
|
|
userAccessesCount := len(resourceControl.UserAccesses)
|
|
teamAccessesCount := len(resourceControl.TeamAccesses)
|
|
|
|
if userAccessesCount == 0 && teamAccessesCount == 0 {
|
|
return false
|
|
}
|
|
|
|
if userAccessesCount > 1 || (userAccessesCount == 1 && teamAccessesCount == 1) {
|
|
return false
|
|
}
|
|
|
|
if userAccessesCount == 1 {
|
|
access := resourceControl.UserAccesses[0]
|
|
if access.UserID == context.UserID {
|
|
return true
|
|
}
|
|
}
|
|
|
|
if teamAccessesCount > 0 {
|
|
for _, access := range resourceControl.TeamAccesses {
|
|
for _, membership := range context.UserMemberships {
|
|
if membership.TeamID == access.TeamID {
|
|
return true
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
return false
|
|
}
|
|
|
|
// AuthorizedTeamManagement ensure that access to the management of the specified team is granted.
|
|
// It will check if the user is either administrator or leader of that team.
|
|
func AuthorizedTeamManagement(teamID portainer.TeamID, context *RestrictedRequestContext) bool {
|
|
if context.IsAdmin {
|
|
return true
|
|
}
|
|
|
|
for _, membership := range context.UserMemberships {
|
|
if membership.TeamID == teamID && membership.Role == portainer.TeamLeader {
|
|
return true
|
|
}
|
|
}
|
|
|
|
return false
|
|
}
|
|
|
|
// authorizedEndpointAccess ensure that the user can access the specified endpoint.
|
|
// It will check if the user is part of the authorized users or part of a team that is
|
|
// listed in the authorized teams of the endpoint and the associated group.
|
|
func authorizedEndpointAccess(endpoint *portainer.Endpoint, endpointGroup *portainer.EndpointGroup, userID portainer.UserID, memberships []portainer.TeamMembership) bool {
|
|
groupAccess := authorizedAccess(userID, memberships, endpointGroup.UserAccessPolicies, endpointGroup.TeamAccessPolicies)
|
|
if !groupAccess {
|
|
return authorizedAccess(userID, memberships, endpoint.UserAccessPolicies, endpoint.TeamAccessPolicies)
|
|
}
|
|
return true
|
|
}
|
|
|
|
// authorizedEndpointGroupAccess ensure that the user can access the specified endpoint group.
|
|
// It will check if the user is part of the authorized users or part of a team that is
|
|
// listed in the authorized teams.
|
|
func authorizedEndpointGroupAccess(endpointGroup *portainer.EndpointGroup, userID portainer.UserID, memberships []portainer.TeamMembership) bool {
|
|
return authorizedAccess(userID, memberships, endpointGroup.UserAccessPolicies, endpointGroup.TeamAccessPolicies)
|
|
}
|
|
|
|
// AuthorizedRegistryAccess ensure that the user can access the specified registry.
|
|
// It will check if the user is part of the authorized users or part of a team that is
|
|
// listed in the authorized teams.
|
|
func AuthorizedRegistryAccess(registry *portainer.Registry, userID portainer.UserID, memberships []portainer.TeamMembership) bool {
|
|
return authorizedAccess(userID, memberships, registry.UserAccessPolicies, registry.TeamAccessPolicies)
|
|
}
|
|
|
|
func authorizedAccess(userID portainer.UserID, memberships []portainer.TeamMembership, userAccessPolicies portainer.UserAccessPolicies, teamAccessPolicies portainer.TeamAccessPolicies) bool {
|
|
_, userAccess := userAccessPolicies[userID]
|
|
if userAccess {
|
|
return true
|
|
}
|
|
|
|
for _, membership := range memberships {
|
|
_, teamAccess := teamAccessPolicies[membership.TeamID]
|
|
if teamAccess {
|
|
return true
|
|
}
|
|
}
|
|
|
|
return false
|
|
}
|