2018-06-11 13:13:19 +00:00
|
|
|
package auth
|
|
|
|
|
|
|
|
import (
|
2020-07-07 21:57:52 +00:00
|
|
|
"errors"
|
2018-07-23 04:57:38 +00:00
|
|
|
"log"
|
2018-06-11 13:13:19 +00:00
|
|
|
"net/http"
|
2018-07-24 06:49:17 +00:00
|
|
|
"strings"
|
2018-06-11 13:13:19 +00:00
|
|
|
|
|
|
|
"github.com/asaskevich/govalidator"
|
2018-09-10 10:01:38 +00:00
|
|
|
httperror "github.com/portainer/libhttp/error"
|
|
|
|
"github.com/portainer/libhttp/request"
|
|
|
|
"github.com/portainer/libhttp/response"
|
2021-02-23 03:21:39 +00:00
|
|
|
portainer "github.com/portainer/portainer/api"
|
2020-07-07 21:57:52 +00:00
|
|
|
httperrors "github.com/portainer/portainer/api/http/errors"
|
2022-01-13 05:27:26 +00:00
|
|
|
"github.com/portainer/portainer/api/internal/authorization"
|
2018-06-11 13:13:19 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
type authenticatePayload struct {
|
2021-02-23 03:21:39 +00:00
|
|
|
// Username
|
|
|
|
Username string `example:"admin" validate:"required"`
|
|
|
|
// Password
|
|
|
|
Password string `example:"mypassword" validate:"required"`
|
2018-06-11 13:13:19 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
type authenticateResponse struct {
|
2021-02-23 03:21:39 +00:00
|
|
|
// JWT token used to authenticate against the API
|
|
|
|
JWT string `json:"jwt" example:"eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJpZCI6MSwidXNlcm5hbWUiOiJhZG1pbiIsInJvbGUiOjEsImV4cCI6MTQ5OTM3NjE1NH0.NJ6vE8FY1WG6jsRQzfMqeatJ4vh2TWAeeYfDhP71YEE"`
|
2018-06-11 13:13:19 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func (payload *authenticatePayload) Validate(r *http.Request) error {
|
|
|
|
if govalidator.IsNull(payload.Username) {
|
2020-07-07 21:57:52 +00:00
|
|
|
return errors.New("Invalid username")
|
2018-06-11 13:13:19 +00:00
|
|
|
}
|
|
|
|
if govalidator.IsNull(payload.Password) {
|
2020-07-07 21:57:52 +00:00
|
|
|
return errors.New("Invalid password")
|
2018-06-11 13:13:19 +00:00
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2021-02-23 03:21:39 +00:00
|
|
|
// @id AuthenticateUser
|
|
|
|
// @summary Authenticate
|
2021-10-11 23:12:08 +00:00
|
|
|
// @description **Access policy**: public
|
2021-09-20 00:14:22 +00:00
|
|
|
// @description Use this environment(endpoint) to authenticate against Portainer using a username and password.
|
2021-02-23 03:21:39 +00:00
|
|
|
// @tags auth
|
|
|
|
// @accept json
|
|
|
|
// @produce json
|
|
|
|
// @param body body authenticatePayload true "Credentials used for authentication"
|
|
|
|
// @success 200 {object} authenticateResponse "Success"
|
|
|
|
// @failure 400 "Invalid request"
|
|
|
|
// @failure 422 "Invalid Credentials"
|
|
|
|
// @failure 500 "Server error"
|
|
|
|
// @router /auth [post]
|
2022-01-13 05:27:26 +00:00
|
|
|
func (handler *Handler) authenticate(rw http.ResponseWriter, r *http.Request) *httperror.HandlerError {
|
2018-06-11 13:13:19 +00:00
|
|
|
var payload authenticatePayload
|
|
|
|
err := request.DecodeAndValidateJSONPayload(r, &payload)
|
|
|
|
if err != nil {
|
|
|
|
return &httperror.HandlerError{http.StatusBadRequest, "Invalid request payload", err}
|
|
|
|
}
|
|
|
|
|
2020-05-20 05:23:15 +00:00
|
|
|
settings, err := handler.DataStore.Settings().Settings()
|
2018-07-23 04:57:38 +00:00
|
|
|
if err != nil {
|
|
|
|
return &httperror.HandlerError{http.StatusInternalServerError, "Unable to retrieve settings from the database", err}
|
|
|
|
}
|
|
|
|
|
2022-01-13 05:27:26 +00:00
|
|
|
user, err := handler.DataStore.User().UserByUsername(payload.Username)
|
|
|
|
if err != nil {
|
|
|
|
if !handler.DataStore.IsErrObjectNotFound(err) {
|
|
|
|
return &httperror.HandlerError{http.StatusInternalServerError, "Unable to retrieve a user with the specified username from the database", err}
|
|
|
|
}
|
2018-06-11 13:13:19 +00:00
|
|
|
|
2022-01-13 05:27:26 +00:00
|
|
|
if settings.AuthenticationMethod == portainer.AuthenticationInternal ||
|
|
|
|
settings.AuthenticationMethod == portainer.AuthenticationOAuth ||
|
|
|
|
(settings.AuthenticationMethod == portainer.AuthenticationLDAP && !settings.LDAPSettings.AutoCreateUsers) {
|
2020-07-07 21:57:52 +00:00
|
|
|
return &httperror.HandlerError{http.StatusUnprocessableEntity, "Invalid credentials", httperrors.ErrUnauthorized}
|
2018-06-11 13:13:19 +00:00
|
|
|
}
|
2018-07-23 04:57:38 +00:00
|
|
|
}
|
|
|
|
|
2022-01-13 05:27:26 +00:00
|
|
|
if user != nil && isUserInitialAdmin(user) || settings.AuthenticationMethod == portainer.AuthenticationInternal {
|
|
|
|
return handler.authenticateInternal(rw, user, payload.Password)
|
|
|
|
}
|
2018-07-23 04:57:38 +00:00
|
|
|
|
2022-01-13 05:27:26 +00:00
|
|
|
if settings.AuthenticationMethod == portainer.AuthenticationOAuth {
|
|
|
|
return &httperror.HandlerError{http.StatusUnprocessableEntity, "Only initial admin is allowed to login without oauth", httperrors.ErrUnauthorized}
|
2018-07-23 04:57:38 +00:00
|
|
|
}
|
|
|
|
|
2022-01-13 05:27:26 +00:00
|
|
|
if settings.AuthenticationMethod == portainer.AuthenticationLDAP {
|
|
|
|
return handler.authenticateLDAP(rw, user, payload.Username, payload.Password, &settings.LDAPSettings)
|
2018-07-23 04:57:38 +00:00
|
|
|
}
|
|
|
|
|
2022-01-13 05:27:26 +00:00
|
|
|
return &httperror.HandlerError{http.StatusUnprocessableEntity, "Login method is not supported", httperrors.ErrUnauthorized}
|
|
|
|
}
|
|
|
|
|
|
|
|
func isUserInitialAdmin(user *portainer.User) bool {
|
|
|
|
return int(user.ID) == 1
|
2018-07-23 04:57:38 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func (handler *Handler) authenticateInternal(w http.ResponseWriter, user *portainer.User, password string) *httperror.HandlerError {
|
|
|
|
err := handler.CryptoService.CompareHashAndData(user.Password, password)
|
|
|
|
if err != nil {
|
2020-07-07 21:57:52 +00:00
|
|
|
return &httperror.HandlerError{http.StatusUnprocessableEntity, "Invalid credentials", httperrors.ErrUnauthorized}
|
2018-07-23 04:57:38 +00:00
|
|
|
}
|
|
|
|
|
2022-06-03 04:00:13 +00:00
|
|
|
forceChangePassword := !handler.passwordStrengthChecker.Check(password)
|
2022-04-14 01:45:54 +00:00
|
|
|
return handler.writeToken(w, user, forceChangePassword)
|
2018-07-23 04:57:38 +00:00
|
|
|
}
|
|
|
|
|
2022-01-13 05:27:26 +00:00
|
|
|
func (handler *Handler) authenticateLDAP(w http.ResponseWriter, user *portainer.User, username, password string, ldapSettings *portainer.LDAPSettings) *httperror.HandlerError {
|
2018-07-23 04:57:38 +00:00
|
|
|
err := handler.LDAPService.AuthenticateUser(username, password, ldapSettings)
|
|
|
|
if err != nil {
|
2022-01-13 05:27:26 +00:00
|
|
|
return &httperror.HandlerError{
|
|
|
|
StatusCode: http.StatusForbidden,
|
|
|
|
Message: "Only initial admin is allowed to login without oauth",
|
|
|
|
Err: err,
|
|
|
|
}
|
2018-07-23 04:57:38 +00:00
|
|
|
}
|
|
|
|
|
2022-01-13 05:27:26 +00:00
|
|
|
if user == nil {
|
|
|
|
user = &portainer.User{
|
|
|
|
Username: username,
|
|
|
|
Role: portainer.StandardUserRole,
|
|
|
|
PortainerAuthorizations: authorization.DefaultPortainerAuthorizations(),
|
|
|
|
}
|
2018-07-23 04:57:38 +00:00
|
|
|
|
2022-01-13 05:27:26 +00:00
|
|
|
err = handler.DataStore.User().Create(user)
|
|
|
|
if err != nil {
|
|
|
|
return &httperror.HandlerError{http.StatusInternalServerError, "Unable to persist user inside the database", err}
|
|
|
|
}
|
2018-07-23 04:57:38 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
err = handler.addUserIntoTeams(user, ldapSettings)
|
|
|
|
if err != nil {
|
|
|
|
log.Printf("Warning: unable to automatically add user into teams: %s\n", err.Error())
|
2018-06-11 13:13:19 +00:00
|
|
|
}
|
|
|
|
|
2022-04-14 01:45:54 +00:00
|
|
|
return handler.writeToken(w, user, false)
|
2018-07-23 04:57:38 +00:00
|
|
|
}
|
|
|
|
|
2022-04-14 01:45:54 +00:00
|
|
|
func (handler *Handler) writeToken(w http.ResponseWriter, user *portainer.User, forceChangePassword bool) *httperror.HandlerError {
|
|
|
|
tokenData := composeTokenData(user, forceChangePassword)
|
2022-01-13 05:27:26 +00:00
|
|
|
|
|
|
|
return handler.persistAndWriteToken(w, tokenData)
|
2021-06-10 22:09:04 +00:00
|
|
|
}
|
2018-06-11 13:13:19 +00:00
|
|
|
|
2019-05-24 06:04:58 +00:00
|
|
|
func (handler *Handler) persistAndWriteToken(w http.ResponseWriter, tokenData *portainer.TokenData) *httperror.HandlerError {
|
2018-06-11 13:13:19 +00:00
|
|
|
token, err := handler.JWTService.GenerateToken(tokenData)
|
|
|
|
if err != nil {
|
2021-06-10 22:09:04 +00:00
|
|
|
return &httperror.HandlerError{StatusCode: http.StatusInternalServerError, Message: "Unable to generate JWT token", Err: err}
|
2018-06-11 13:13:19 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
return response.JSON(w, &authenticateResponse{JWT: token})
|
|
|
|
}
|
2018-07-23 04:57:38 +00:00
|
|
|
|
|
|
|
func (handler *Handler) addUserIntoTeams(user *portainer.User, settings *portainer.LDAPSettings) error {
|
2020-05-20 05:23:15 +00:00
|
|
|
teams, err := handler.DataStore.Team().Teams()
|
2018-07-23 04:57:38 +00:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
userGroups, err := handler.LDAPService.GetUserGroups(user.Username, settings)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2020-05-20 05:23:15 +00:00
|
|
|
userMemberships, err := handler.DataStore.TeamMembership().TeamMembershipsByUserID(user.ID)
|
2018-07-23 04:57:38 +00:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
for _, team := range teams {
|
|
|
|
if teamExists(team.Name, userGroups) {
|
|
|
|
|
|
|
|
if teamMembershipExists(team.ID, userMemberships) {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
|
|
|
membership := &portainer.TeamMembership{
|
|
|
|
UserID: user.ID,
|
|
|
|
TeamID: team.ID,
|
|
|
|
Role: portainer.TeamMember,
|
|
|
|
}
|
|
|
|
|
chore(store) EE-1981: Refactor/store/error checking, and other refactoring (#6173)
* use the Store interface IsErrObjectNotFound() to avoid revealing internal errors
Signed-off-by: Sven Dowideit <sven.dowideit@portainer.io>
* what happens when you extract the datastore interfaces into their own package
Signed-off-by: Sven Dowideit <sven.dowideit@portainer.io>
* Start renaming Storage methods
Signed-off-by: Sven Dowideit <sven.dowideit@portainer.io>
* extract the boltdb specific code from the Portainer storage code (example, the others need the same)
Signed-off-by: Sven Dowideit <sven.dowideit@portainer.io>
* more extract bolt.Tx from datastore code
Signed-off-by: Sven Dowideit <sven.dowideit@portainer.io>
* minimise imports by putting moving the struct definition into the file that needs the Service imports
Signed-off-by: Sven Dowideit <sven.dowideit@portainer.io>
* more extraction of boltdb.Tx
Signed-off-by: Sven Dowideit <sven.dowideit@portainer.io>
* extract the use of bucket.SetSequence
Signed-off-by: Sven Dowideit <sven.dowideit@portainer.io>
* almost done - just endpoint.Synchonise :/
Signed-off-by: Sven Dowideit <sven.dowideit@portainer.io>
* so, endpoint.Synchonize looks hard, but i can't find where we use it, so 'delete first refactoring'
Signed-off-by: Sven Dowideit <sven.dowideit@portainer.io>
* fix test compile errors
Signed-off-by: Sven Dowideit <sven.dowideit@portainer.io>
* test compile fixes after rebase
Signed-off-by: Sven Dowideit <sven.dowideit@portainer.io>
* fix a mis-remembering I had wrt deserialisation - last time i used AnyData - jsoniter's bindTo looks interesting for the same reason
Signed-off-by: Sven Dowideit <sven.dowideit@portainer.io>
* set us up to make the connection an interface
Signed-off-by: Sven Dowideit <sven.dowideit@portainer.io>
* make the db connection a datastore interface, and separate out our datastore services from the bolt ones
Signed-off-by: Sven Dowideit <sven.dowideit@portainer.io>
* rename methods to something less oltdb internals specific
Signed-off-by: Sven Dowideit <sven.dowideit@portainer.io>
* these errors are not boltdb secific
Signed-off-by: Sven Dowideit <sven.dowideit@portainer.io>
* start using the db-backend factory method too
Signed-off-by: Sven Dowideit <sven.dowideit@portainer.io>
* export boltdb raw in case we can't export from the service layer
Signed-off-by: Sven Dowideit <sven.dowideit@portainer.io>
* add a raw export from boltdb to yaml for broken db's, and an export services to yaml in backup
Signed-off-by: Sven Dowideit <sven.dowideit@portainer.io>
* add the version info by hand for now
Signed-off-by: Sven Dowideit <sven.dowideit@portainer.io>
* actually, the export from services can be fully typed - its the import that needs to do more work
Signed-off-by: Sven Dowideit <sven.dowideit@portainer.io>
* redo raw export, and make import capable of using it
Signed-off-by: Sven Dowideit <sven.dowideit@portainer.io>
* add DockerHub
Signed-off-by: Sven Dowideit <sven.dowideit@portainer.io>
* migration from anything older than v1.21.0 has been broken for quite a while, deleting the un-tested code
Signed-off-by: Sven Dowideit <sven.dowideit@portainer.io>
* fix go test ./... again
Signed-off-by: Sven Dowideit <sven.dowideit@portainer.io>
* my goland wasn't setup to gofmt
Signed-off-by: Sven Dowideit <sven.dowideit@portainer.io>
* move the two extremely dubious migration tests down into store, so they can use the test store code
Signed-off-by: Sven Dowideit <sven.dowideit@portainer.io>
* the migrator is now free of boltdb
Signed-off-by: Sven Dowideit <sven.dowideit@portainer.io>
* reverse goland overzealous replcement of internal with boltdb
Signed-off-by: Sven Dowideit <sven.dowideit@portainer.io>
* more undo over-zealous goland internal->boltdb
Signed-off-by: Sven Dowideit <sven.dowideit@portainer.io>
* yay, now bolt is only mentioned inside the api/database/ dir
Signed-off-by: Sven Dowideit <sven.dowideit@portainer.io>
* and this might be the last of the boltdb references?
Signed-off-by: Sven Dowideit <sven.dowideit@portainer.io>
* add todo
Signed-off-by: Sven Dowideit <sven.dowideit@portainer.io>
* extract the store code into a separate module too
Signed-off-by: Sven Dowideit <sven.dowideit@portainer.io>
* don't need the fileService in boltdb anymore
Signed-off-by: Sven Dowideit <sven.dowideit@portainer.io>
* use IsErrObjectNotFound()
Signed-off-by: Sven Dowideit <sven.dowideit@portainer.io>
* use a string to select what database backend we use
Signed-off-by: Sven Dowideit <sven.dowideit@portainer.io>
* make isNew store an ephemeral bool that doesn't stay true after we've initialised it
Signed-off-by: Sven Dowideit <sven.dowideit@portainer.io>
* move the import.json wip to a separate file so its more obvious - we'll be using it for testing, emergency fixups, and in the next part of the store work, when we improve migrations and data model lifecycles
Signed-off-by: Sven Dowideit <sven.dowideit@portainer.io>
* undo vscode formatting html
Signed-off-by: Sven Dowideit <sven.dowideit@portainer.io>
* fix app templates symbol (#6221)
* feat(webhook) EE-2125 send registry auth haeder when update swarms service via webhook (#6220)
* feat(webhook) EE-2125 add some helpers to registry utils
* feat(webhook) EE-2125 persist registryID when creating a webhook
* feat(webhook) EE-2125 send registry auth header when executing a webhook
* feat(webhook) EE-2125 send registryID to backend when creating a service with webhook
* feat(webhook) EE-2125 use the initial registry ID to create webhook on editing service screen
* feat(webhook) EE-2125 update webhook when update registry
* feat(webhook) EE-2125 add endpoint of update webhook
* feat(webhook) EE-2125 code cleanup
* feat(webhook) EE-2125 fix a typo
* feat(webhook) EE-2125 fix circle import issue with unit test
Co-authored-by: Simon Meng <simon.meng@portainer.io>
* fix(kubeconfig): show kubeconfig download button for non admin users [EE-2123] (#6204)
Co-authored-by: Simon Meng <simon.meng@portainer.io>
* fix data-cy for k8s cluster menu (#6226)
LGTM
* feat(stack): make stack created from app template editable EE-1941 (#6104)
feat(stack): make stack from app template editable
* fix(container):disable Duplicate/Edit button when the container is portainer (#6223)
* fix/ee-1909/show-pull-image-error (#6195)
Co-authored-by: sunportainer <ericsun@SG1.local>
* feat(cy): add data-cy to helm install button (#6241)
* feat(cy): add data-cy to add registry button (#6242)
* refactor(app): convert root folder files to es6 (#4159)
* refactor(app): duplicate constants as es6 exports (#4158)
* fix(docker): provide workaround to save network name variable (#6080)
* fix/EE-1862/unable-to-stop-or-remove-stack workaround for var without default value in yaml file
* fix/EE-1862/unable-to-stop-or-remove-stack check yaml file
* fixed func and var names
* wrapper error and used bool for stringset
* UT case for createNetworkEnvFile
* UT case for %s=%s
* powerful StringSet
* wrapper error for extract network name
* wrapper all the return err
* store more env
* put to env file
* make default value None
* feat: gzip static resources (#6258)
* fix(ssl)//handle --sslcert and --sslkey ee-2106 (#6203)
* fix/ee-2106/handle-sslcert-sslkey
Co-authored-by: sunportainer <ericsun@SG1.local>
* fix(server):support disable https only ee-2068 (#6232)
* fix/ee-2068/disable-forcely-https
* feat(store): implement store tests EE-2112 (#6224)
* add store tests
* add some more tests
* Update missing helm user repo methods
* remove redundant comments
* add webhook export
* update webhooks
* use the Store interface IsErrObjectNotFound() to avoid revealing internal errors
Signed-off-by: Sven Dowideit <sven.dowideit@portainer.io>
* what happens when you extract the datastore interfaces into their own package
Signed-off-by: Sven Dowideit <sven.dowideit@portainer.io>
* Start renaming Storage methods
Signed-off-by: Sven Dowideit <sven.dowideit@portainer.io>
* extract the boltdb specific code from the Portainer storage code (example, the others need the same)
Signed-off-by: Sven Dowideit <sven.dowideit@portainer.io>
* more extract bolt.Tx from datastore code
Signed-off-by: Sven Dowideit <sven.dowideit@portainer.io>
* minimise imports by putting moving the struct definition into the file that needs the Service imports
Signed-off-by: Sven Dowideit <sven.dowideit@portainer.io>
* more extraction of boltdb.Tx
Signed-off-by: Sven Dowideit <sven.dowideit@portainer.io>
* extract the use of bucket.SetSequence
Signed-off-by: Sven Dowideit <sven.dowideit@portainer.io>
* almost done - just endpoint.Synchonise :/
Signed-off-by: Sven Dowideit <sven.dowideit@portainer.io>
* so, endpoint.Synchonize looks hard, but i can't find where we use it, so 'delete first refactoring'
Signed-off-by: Sven Dowideit <sven.dowideit@portainer.io>
* fix test compile errors
Signed-off-by: Sven Dowideit <sven.dowideit@portainer.io>
* test compile fixes after rebase
Signed-off-by: Sven Dowideit <sven.dowideit@portainer.io>
* fix a mis-remembering I had wrt deserialisation - last time i used AnyData - jsoniter's bindTo looks interesting for the same reason
Signed-off-by: Sven Dowideit <sven.dowideit@portainer.io>
* set us up to make the connection an interface
Signed-off-by: Sven Dowideit <sven.dowideit@portainer.io>
* make the db connection a datastore interface, and separate out our datastore services from the bolt ones
Signed-off-by: Sven Dowideit <sven.dowideit@portainer.io>
* rename methods to something less oltdb internals specific
Signed-off-by: Sven Dowideit <sven.dowideit@portainer.io>
* these errors are not boltdb secific
Signed-off-by: Sven Dowideit <sven.dowideit@portainer.io>
* start using the db-backend factory method too
Signed-off-by: Sven Dowideit <sven.dowideit@portainer.io>
* export boltdb raw in case we can't export from the service layer
Signed-off-by: Sven Dowideit <sven.dowideit@portainer.io>
* add a raw export from boltdb to yaml for broken db's, and an export services to yaml in backup
Signed-off-by: Sven Dowideit <sven.dowideit@portainer.io>
* add the version info by hand for now
Signed-off-by: Sven Dowideit <sven.dowideit@portainer.io>
* actually, the export from services can be fully typed - its the import that needs to do more work
Signed-off-by: Sven Dowideit <sven.dowideit@portainer.io>
* redo raw export, and make import capable of using it
Signed-off-by: Sven Dowideit <sven.dowideit@portainer.io>
* add DockerHub
Signed-off-by: Sven Dowideit <sven.dowideit@portainer.io>
* migration from anything older than v1.21.0 has been broken for quite a while, deleting the un-tested code
Signed-off-by: Sven Dowideit <sven.dowideit@portainer.io>
* fix go test ./... again
Signed-off-by: Sven Dowideit <sven.dowideit@portainer.io>
* my goland wasn't setup to gofmt
Signed-off-by: Sven Dowideit <sven.dowideit@portainer.io>
* move the two extremely dubious migration tests down into store, so they can use the test store code
Signed-off-by: Sven Dowideit <sven.dowideit@portainer.io>
* the migrator is now free of boltdb
Signed-off-by: Sven Dowideit <sven.dowideit@portainer.io>
* reverse goland overzealous replcement of internal with boltdb
Signed-off-by: Sven Dowideit <sven.dowideit@portainer.io>
* more undo over-zealous goland internal->boltdb
Signed-off-by: Sven Dowideit <sven.dowideit@portainer.io>
* yay, now bolt is only mentioned inside the api/database/ dir
Signed-off-by: Sven Dowideit <sven.dowideit@portainer.io>
* and this might be the last of the boltdb references?
Signed-off-by: Sven Dowideit <sven.dowideit@portainer.io>
* add todo
Signed-off-by: Sven Dowideit <sven.dowideit@portainer.io>
* extract the store code into a separate module too
Signed-off-by: Sven Dowideit <sven.dowideit@portainer.io>
* don't need the fileService in boltdb anymore
Signed-off-by: Sven Dowideit <sven.dowideit@portainer.io>
* use IsErrObjectNotFound()
Signed-off-by: Sven Dowideit <sven.dowideit@portainer.io>
* use a string to select what database backend we use
Signed-off-by: Sven Dowideit <sven.dowideit@portainer.io>
* make isNew store an ephemeral bool that doesn't stay true after we've initialised it
Signed-off-by: Sven Dowideit <sven.dowideit@portainer.io>
* move the import.json wip to a separate file so its more obvious - we'll be using it for testing, emergency fixups, and in the next part of the store work, when we improve migrations and data model lifecycles
Signed-off-by: Sven Dowideit <sven.dowideit@portainer.io>
* undo vscode formatting html
Signed-off-by: Sven Dowideit <sven.dowideit@portainer.io>
* Update missing helm user repo methods
* feat(store): implement store tests EE-2112 (#6224)
* add store tests
* add some more tests
* remove redundant comments
* add webhook export
* update webhooks
* fix build issues after rebasing
* move migratorparams
* remove unneeded integer type conversions
* disable the db import/export for now
Co-authored-by: Richard Wei <54336863+WaysonWei@users.noreply.github.com>
Co-authored-by: cong meng <mcpacino@gmail.com>
Co-authored-by: Simon Meng <simon.meng@portainer.io>
Co-authored-by: Marcelo Rydel <marcelorydel26@gmail.com>
Co-authored-by: Hao Zhang <hao.zhang@portainer.io>
Co-authored-by: sunportainer <93502624+sunportainer@users.noreply.github.com>
Co-authored-by: sunportainer <ericsun@SG1.local>
Co-authored-by: wheresolivia <78844659+wheresolivia@users.noreply.github.com>
Co-authored-by: Chaim Lev-Ari <chiptus@users.noreply.github.com>
Co-authored-by: Chao Geng <93526589+chaogeng77977@users.noreply.github.com>
Co-authored-by: Dmitry Salakhov <to@dimasalakhov.com>
Co-authored-by: Matt Hook <hookenz@gmail.com>
2021-12-15 02:26:09 +00:00
|
|
|
err := handler.DataStore.TeamMembership().Create(membership)
|
2018-07-23 04:57:38 +00:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2020-02-25 05:54:32 +00:00
|
|
|
|
2018-07-23 04:57:38 +00:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func teamExists(teamName string, ldapGroups []string) bool {
|
|
|
|
for _, group := range ldapGroups {
|
2018-07-24 06:49:17 +00:00
|
|
|
if strings.ToLower(group) == strings.ToLower(teamName) {
|
2018-07-23 04:57:38 +00:00
|
|
|
return true
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
|
|
|
func teamMembershipExists(teamID portainer.TeamID, memberships []portainer.TeamMembership) bool {
|
|
|
|
for _, membership := range memberships {
|
|
|
|
if membership.TeamID == teamID {
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return false
|
|
|
|
}
|
2021-06-10 22:09:04 +00:00
|
|
|
|
2022-04-14 01:45:54 +00:00
|
|
|
func composeTokenData(user *portainer.User, forceChangePassword bool) *portainer.TokenData {
|
2021-06-10 22:09:04 +00:00
|
|
|
return &portainer.TokenData{
|
2022-04-14 01:45:54 +00:00
|
|
|
ID: user.ID,
|
|
|
|
Username: user.Username,
|
|
|
|
Role: user.Role,
|
|
|
|
ForceChangePassword: forceChangePassword,
|
2021-06-10 22:09:04 +00:00
|
|
|
}
|
|
|
|
}
|