mirror of
https://github.com/portainer/portainer.git
synced 2025-07-19 21:39:40 +02:00
* feat(api): decorate Docker resource creation response with resource control * fix(api): fix a potential resource control conflict between stacks/volumes * feat(api): generate a default private resource control instead of admin only * fix(api): fix default RC value * fix(api): update RC authorizations check to support admin only flag * refactor(api): relocate access control related methods * fix(api): fix a potential conflict when fetching RC from database * refactor(api): refactor access control logic * refactor(api): remove the concept of DecoratedStack * feat(api): automatically remove RC when removing a Docker resource * refactor(api): update filter resource methods documentation * refactor(api): update proxy package structure * refactor(api): renamed proxy/misc package * feat(api): re-introduce ResourceControlDelete operation as admin restricted * refactor(api): relocate default endpoint authorizations * feat(api): migrate RBAC data * feat(app): ResourceControl management refactor * fix(api): fix access control issue on stack deletion and automatically delete RC * fix(api): fix stack filtering * fix(api): fix UpdateResourceControl operation checks * refactor(api): introduce a NewTransport builder method * refactor(api): inject endpoint in Docker transport * refactor(api): introduce Docker client into Docker transport * refactor(api): refactor http/proxy package * feat(api): inspect a Docker resource labels during access control validation * fix(api): only apply automatic resource control creation on success response * fix(api): fix stack access control check * fix(api): use StatusCreated instead of StatusOK for automatic resource control creation * fix(app): resource control fixes * fix(api): fix an issue preventing administrator to inspect a resource with a RC * refactor(api): remove useless error return * refactor(api): document DecorateStacks function * fix(api): fix invalid resource control type for container deletion * feat(api): support Docker system networks * feat(api): update Swagger docs * refactor(api): rename transport variable * refactor(api): rename transport variable * feat(networks): add system tag for system networks * feat(api): add support for resource control labels * feat(api): upgrade to DBVersion 22 * refactor(api): refactor access control management in Docker proxy * refactor(api): re-implement docker proxy taskListOperation * refactor(api): review parameters declaration * refactor(api): remove extra blank line * refactor(api): review method comments * fix(api): fix invalid ServerAddress property and review method visibility * feat(api): update error message * feat(api): update restrictedVolumeBrowserOperation method * refactor(api): refactor method parameters * refactor(api): minor refactor * refactor(api): change Azure transport visibility * refactor(api): update struct documentation * refactor(api): update struct documentation * feat(api): review restrictedResourceOperation method * refactor(api): remove unused authorization methods * feat(api): apply RBAC when enabled on stack operations * fix(api): fix invalid data migration procedure for DBVersion = 22 * fix(app): RC duplicate on private resource * feat(api): change Docker API version logic for libcompose/client factory * fix(api): update access denied error message to be Docker API compliant * fix(api): update volume browsing authorizations data migration * fix(api): fix an issue with access control in multi-node agent Swarm cluster
154 lines
5.2 KiB
Go
154 lines
5.2 KiB
Go
package portainer
|
|
|
|
// NewPrivateResourceControl will create a new private resource control associated to the resource specified by the
|
|
// identifier and type parameters. It automatically assigns it to the user specified by the userID parameter.
|
|
func NewPrivateResourceControl(resourceIdentifier string, resourceType ResourceControlType, userID UserID) *ResourceControl {
|
|
return &ResourceControl{
|
|
Type: resourceType,
|
|
ResourceID: resourceIdentifier,
|
|
SubResourceIDs: []string{},
|
|
UserAccesses: []UserResourceAccess{
|
|
{
|
|
UserID: userID,
|
|
AccessLevel: ReadWriteAccessLevel,
|
|
},
|
|
},
|
|
TeamAccesses: []TeamResourceAccess{},
|
|
AdministratorsOnly: false,
|
|
Public: false,
|
|
System: false,
|
|
}
|
|
}
|
|
|
|
// NewSystemResourceControl will create a new public resource control with the System flag set to true.
|
|
// These kind of resource control are not persisted and are created on the fly by the Portainer API.
|
|
func NewSystemResourceControl(resourceIdentifier string, resourceType ResourceControlType) *ResourceControl {
|
|
return &ResourceControl{
|
|
Type: resourceType,
|
|
ResourceID: resourceIdentifier,
|
|
SubResourceIDs: []string{},
|
|
UserAccesses: []UserResourceAccess{},
|
|
TeamAccesses: []TeamResourceAccess{},
|
|
AdministratorsOnly: false,
|
|
Public: true,
|
|
System: true,
|
|
}
|
|
}
|
|
|
|
// NewPublicResourceControl will create a new public resource control.
|
|
func NewPublicResourceControl(resourceIdentifier string, resourceType ResourceControlType) *ResourceControl {
|
|
return &ResourceControl{
|
|
Type: resourceType,
|
|
ResourceID: resourceIdentifier,
|
|
SubResourceIDs: []string{},
|
|
UserAccesses: []UserResourceAccess{},
|
|
TeamAccesses: []TeamResourceAccess{},
|
|
AdministratorsOnly: false,
|
|
Public: true,
|
|
System: false,
|
|
}
|
|
}
|
|
|
|
// NewRestrictedResourceControl will create a new resource control with user and team accesses restrictions.
|
|
func NewRestrictedResourceControl(resourceIdentifier string, resourceType ResourceControlType, userIDs []UserID, teamIDs []TeamID) *ResourceControl {
|
|
userAccesses := make([]UserResourceAccess, 0)
|
|
teamAccesses := make([]TeamResourceAccess, 0)
|
|
|
|
for _, id := range userIDs {
|
|
access := UserResourceAccess{
|
|
UserID: id,
|
|
AccessLevel: ReadWriteAccessLevel,
|
|
}
|
|
|
|
userAccesses = append(userAccesses, access)
|
|
}
|
|
|
|
for _, id := range teamIDs {
|
|
access := TeamResourceAccess{
|
|
TeamID: id,
|
|
AccessLevel: ReadWriteAccessLevel,
|
|
}
|
|
|
|
teamAccesses = append(teamAccesses, access)
|
|
}
|
|
|
|
return &ResourceControl{
|
|
Type: resourceType,
|
|
ResourceID: resourceIdentifier,
|
|
SubResourceIDs: []string{},
|
|
UserAccesses: userAccesses,
|
|
TeamAccesses: teamAccesses,
|
|
AdministratorsOnly: false,
|
|
Public: false,
|
|
System: false,
|
|
}
|
|
}
|
|
|
|
// DecorateStacks will iterate through a list of stacks, check for an associated resource control for each
|
|
// stack and decorate the stack element if a resource control is found.
|
|
func DecorateStacks(stacks []Stack, resourceControls []ResourceControl) []Stack {
|
|
for idx, stack := range stacks {
|
|
|
|
resourceControl := GetResourceControlByResourceIDAndType(stack.Name, StackResourceControl, resourceControls)
|
|
if resourceControl != nil {
|
|
stacks[idx].ResourceControl = resourceControl
|
|
}
|
|
}
|
|
|
|
return stacks
|
|
}
|
|
|
|
// FilterAuthorizedStacks returns a list of decorated stacks filtered through resource control access checks.
|
|
func FilterAuthorizedStacks(stacks []Stack, user *User, userTeamIDs []TeamID, rbacEnabled bool) []Stack {
|
|
authorizedStacks := make([]Stack, 0)
|
|
|
|
for _, stack := range stacks {
|
|
_, ok := user.EndpointAuthorizations[stack.EndpointID][EndpointResourcesAccess]
|
|
if rbacEnabled && ok {
|
|
authorizedStacks = append(authorizedStacks, stack)
|
|
continue
|
|
}
|
|
|
|
if stack.ResourceControl != nil && UserCanAccessResource(user.ID, userTeamIDs, stack.ResourceControl) {
|
|
authorizedStacks = append(authorizedStacks, stack)
|
|
}
|
|
}
|
|
|
|
return authorizedStacks
|
|
}
|
|
|
|
// UserCanAccessResource will valide that a user has permissions defined in the specified resource control
|
|
// based on its identifier and the team(s) he is part of.
|
|
func UserCanAccessResource(userID UserID, userTeamIDs []TeamID, resourceControl *ResourceControl) bool {
|
|
for _, authorizedUserAccess := range resourceControl.UserAccesses {
|
|
if userID == authorizedUserAccess.UserID {
|
|
return true
|
|
}
|
|
}
|
|
|
|
for _, authorizedTeamAccess := range resourceControl.TeamAccesses {
|
|
for _, userTeamID := range userTeamIDs {
|
|
if userTeamID == authorizedTeamAccess.TeamID {
|
|
return true
|
|
}
|
|
}
|
|
}
|
|
|
|
return resourceControl.Public
|
|
}
|
|
|
|
// GetResourceControlByResourceIDAndType retrieves the first matching resource control in a set of resource controls
|
|
// based on the specified id and resource type parameters.
|
|
func GetResourceControlByResourceIDAndType(resourceID string, resourceType ResourceControlType, resourceControls []ResourceControl) *ResourceControl {
|
|
for _, resourceControl := range resourceControls {
|
|
if resourceID == resourceControl.ResourceID && resourceType == resourceControl.Type {
|
|
return &resourceControl
|
|
}
|
|
for _, subResourceID := range resourceControl.SubResourceIDs {
|
|
if resourceID == subResourceID {
|
|
return &resourceControl
|
|
}
|
|
}
|
|
}
|
|
return nil
|
|
}
|