mirror of https://github.com/portainer/portainer
* feat(containers): Ensure users cannot create privileged containers via the API * feat(containers): add rbac check in stack creation Co-authored-by: Maxime Bajeux <max.bajeux@gmail.com>pull/4073/head
parent
4346bf95a7
commit
6f6bc24efd
|
@ -283,6 +283,7 @@ type composeStackDeploymentConfig struct {
|
||||||
dockerhub *portainer.DockerHub
|
dockerhub *portainer.DockerHub
|
||||||
registries []portainer.Registry
|
registries []portainer.Registry
|
||||||
isAdmin bool
|
isAdmin bool
|
||||||
|
user *portainer.User
|
||||||
}
|
}
|
||||||
|
|
||||||
func (handler *Handler) createComposeDeployConfig(r *http.Request, stack *portainer.Stack, endpoint *portainer.Endpoint) (*composeStackDeploymentConfig, *httperror.HandlerError) {
|
func (handler *Handler) createComposeDeployConfig(r *http.Request, stack *portainer.Stack, endpoint *portainer.Endpoint) (*composeStackDeploymentConfig, *httperror.HandlerError) {
|
||||||
|
@ -302,12 +303,18 @@ func (handler *Handler) createComposeDeployConfig(r *http.Request, stack *portai
|
||||||
}
|
}
|
||||||
filteredRegistries := security.FilterRegistries(registries, securityContext)
|
filteredRegistries := security.FilterRegistries(registries, securityContext)
|
||||||
|
|
||||||
|
user, err := handler.DataStore.User().User(securityContext.UserID)
|
||||||
|
if err != nil {
|
||||||
|
return nil, &httperror.HandlerError{http.StatusInternalServerError, "Unable to load user information from the database", err}
|
||||||
|
}
|
||||||
|
|
||||||
config := &composeStackDeploymentConfig{
|
config := &composeStackDeploymentConfig{
|
||||||
stack: stack,
|
stack: stack,
|
||||||
endpoint: endpoint,
|
endpoint: endpoint,
|
||||||
dockerhub: dockerhub,
|
dockerhub: dockerhub,
|
||||||
registries: filteredRegistries,
|
registries: filteredRegistries,
|
||||||
isAdmin: securityContext.IsAdmin,
|
isAdmin: securityContext.IsAdmin,
|
||||||
|
user: user,
|
||||||
}
|
}
|
||||||
|
|
||||||
return config, nil
|
return config, nil
|
||||||
|
@ -324,7 +331,12 @@ func (handler *Handler) deployComposeStack(config *composeStackDeploymentConfig)
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
|
|
||||||
if !settings.AllowBindMountsForRegularUsers && !config.isAdmin {
|
isAdminOrEndpointAdmin, err := handler.userIsAdminOrEndpointAdmin(config.user, config.endpoint.ID)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
if (!settings.AllowBindMountsForRegularUsers || !settings.AllowPrivilegedModeForRegularUsers) && !isAdminOrEndpointAdmin {
|
||||||
composeFilePath := path.Join(config.stack.ProjectPath, config.stack.EntryPoint)
|
composeFilePath := path.Join(config.stack.ProjectPath, config.stack.EntryPoint)
|
||||||
|
|
||||||
stackContent, err := handler.FileService.GetFileContent(composeFilePath)
|
stackContent, err := handler.FileService.GetFileContent(composeFilePath)
|
||||||
|
@ -332,13 +344,10 @@ func (handler *Handler) deployComposeStack(config *composeStackDeploymentConfig)
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
|
|
||||||
valid, err := handler.isValidStackFile(stackContent)
|
err = handler.isValidStackFile(stackContent, settings)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
if !valid {
|
|
||||||
return errors.New("bind-mount disabled for non administrator users")
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
|
|
||||||
handler.stackCreationMutex.Lock()
|
handler.stackCreationMutex.Lock()
|
||||||
|
|
|
@ -292,6 +292,7 @@ type swarmStackDeploymentConfig struct {
|
||||||
registries []portainer.Registry
|
registries []portainer.Registry
|
||||||
prune bool
|
prune bool
|
||||||
isAdmin bool
|
isAdmin bool
|
||||||
|
user *portainer.User
|
||||||
}
|
}
|
||||||
|
|
||||||
func (handler *Handler) createSwarmDeployConfig(r *http.Request, stack *portainer.Stack, endpoint *portainer.Endpoint, prune bool) (*swarmStackDeploymentConfig, *httperror.HandlerError) {
|
func (handler *Handler) createSwarmDeployConfig(r *http.Request, stack *portainer.Stack, endpoint *portainer.Endpoint, prune bool) (*swarmStackDeploymentConfig, *httperror.HandlerError) {
|
||||||
|
@ -311,6 +312,11 @@ func (handler *Handler) createSwarmDeployConfig(r *http.Request, stack *portaine
|
||||||
}
|
}
|
||||||
filteredRegistries := security.FilterRegistries(registries, securityContext)
|
filteredRegistries := security.FilterRegistries(registries, securityContext)
|
||||||
|
|
||||||
|
user, err := handler.DataStore.User().User(securityContext.UserID)
|
||||||
|
if err != nil {
|
||||||
|
return nil, &httperror.HandlerError{http.StatusInternalServerError, "Unable to load user information from the database", err}
|
||||||
|
}
|
||||||
|
|
||||||
config := &swarmStackDeploymentConfig{
|
config := &swarmStackDeploymentConfig{
|
||||||
stack: stack,
|
stack: stack,
|
||||||
endpoint: endpoint,
|
endpoint: endpoint,
|
||||||
|
@ -318,6 +324,7 @@ func (handler *Handler) createSwarmDeployConfig(r *http.Request, stack *portaine
|
||||||
registries: filteredRegistries,
|
registries: filteredRegistries,
|
||||||
prune: prune,
|
prune: prune,
|
||||||
isAdmin: securityContext.IsAdmin,
|
isAdmin: securityContext.IsAdmin,
|
||||||
|
user: user,
|
||||||
}
|
}
|
||||||
|
|
||||||
return config, nil
|
return config, nil
|
||||||
|
@ -329,7 +336,12 @@ func (handler *Handler) deploySwarmStack(config *swarmStackDeploymentConfig) err
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
|
|
||||||
if !settings.AllowBindMountsForRegularUsers && !config.isAdmin {
|
isAdminOrEndpointAdmin, err := handler.userIsAdminOrEndpointAdmin(config.user, config.endpoint.ID)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
if !settings.AllowBindMountsForRegularUsers && !isAdminOrEndpointAdmin {
|
||||||
composeFilePath := path.Join(config.stack.ProjectPath, config.stack.EntryPoint)
|
composeFilePath := path.Join(config.stack.ProjectPath, config.stack.EntryPoint)
|
||||||
|
|
||||||
stackContent, err := handler.FileService.GetFileContent(composeFilePath)
|
stackContent, err := handler.FileService.GetFileContent(composeFilePath)
|
||||||
|
@ -337,13 +349,10 @@ func (handler *Handler) deploySwarmStack(config *swarmStackDeploymentConfig) err
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
|
|
||||||
valid, err := handler.isValidStackFile(stackContent)
|
err = handler.isValidStackFile(stackContent, settings)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
if !valid {
|
|
||||||
return errors.New("bind-mount disabled for non administrator users")
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
|
|
||||||
handler.stackCreationMutex.Lock()
|
handler.stackCreationMutex.Lock()
|
||||||
|
|
|
@ -89,3 +89,23 @@ func (handler *Handler) userCanAccessStack(securityContext *security.RestrictedR
|
||||||
}
|
}
|
||||||
return false, nil
|
return false, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func (handler *Handler) userIsAdminOrEndpointAdmin(user *portainer.User, endpointID portainer.EndpointID) (bool, error) {
|
||||||
|
isAdmin := user.Role == portainer.AdministratorRole
|
||||||
|
if isAdmin {
|
||||||
|
return true, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
rbacExtension, err := handler.DataStore.Extension().Extension(portainer.RBACExtension)
|
||||||
|
if err != nil && err != bolterrors.ErrObjectNotFound {
|
||||||
|
return false, errors.New("Unable to verify if RBAC extension is loaded")
|
||||||
|
}
|
||||||
|
|
||||||
|
if rbacExtension == nil {
|
||||||
|
return false, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
_, endpointResourceAccess := user.EndpointAuthorizations[portainer.EndpointID(endpointID)][portainer.EndpointResourcesAccess]
|
||||||
|
|
||||||
|
return endpointResourceAccess, nil
|
||||||
|
}
|
||||||
|
|
|
@ -106,10 +106,10 @@ func (handler *Handler) createSwarmStack(w http.ResponseWriter, r *http.Request,
|
||||||
return &httperror.HandlerError{http.StatusBadRequest, "Invalid value for query parameter: method. Value must be one of: string, repository or file", errors.New(request.ErrInvalidQueryParameter)}
|
return &httperror.HandlerError{http.StatusBadRequest, "Invalid value for query parameter: method. Value must be one of: string, repository or file", errors.New(request.ErrInvalidQueryParameter)}
|
||||||
}
|
}
|
||||||
|
|
||||||
func (handler *Handler) isValidStackFile(stackFileContent []byte) (bool, error) {
|
func (handler *Handler) isValidStackFile(stackFileContent []byte, settings *portainer.Settings) error {
|
||||||
composeConfigYAML, err := loader.ParseYAML(stackFileContent)
|
composeConfigYAML, err := loader.ParseYAML(stackFileContent)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return false, err
|
return err
|
||||||
}
|
}
|
||||||
|
|
||||||
composeConfigFile := types.ConfigFile{
|
composeConfigFile := types.ConfigFile{
|
||||||
|
@ -126,19 +126,25 @@ func (handler *Handler) isValidStackFile(stackFileContent []byte) (bool, error)
|
||||||
options.SkipInterpolation = true
|
options.SkipInterpolation = true
|
||||||
})
|
})
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return false, err
|
return err
|
||||||
}
|
}
|
||||||
|
|
||||||
for key := range composeConfig.Services {
|
for key := range composeConfig.Services {
|
||||||
service := composeConfig.Services[key]
|
service := composeConfig.Services[key]
|
||||||
|
if !settings.AllowBindMountsForRegularUsers {
|
||||||
for _, volume := range service.Volumes {
|
for _, volume := range service.Volumes {
|
||||||
if volume.Type == "bind" {
|
if volume.Type == "bind" {
|
||||||
return false, nil
|
return errors.New("bind-mount disabled for non administrator users")
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
return true, nil
|
if !settings.AllowPrivilegedModeForRegularUsers && service.Privileged == true {
|
||||||
|
return errors.New("privileged mode disabled for non administrator users")
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
func (handler *Handler) decorateStackResponse(w http.ResponseWriter, stack *portainer.Stack, userID portainer.UserID) *httperror.HandlerError {
|
func (handler *Handler) decorateStackResponse(w http.ResponseWriter, stack *portainer.Stack, userID portainer.UserID) *httperror.HandlerError {
|
||||||
|
|
|
@ -1,12 +1,18 @@
|
||||||
package docker
|
package docker
|
||||||
|
|
||||||
import (
|
import (
|
||||||
|
"bytes"
|
||||||
"context"
|
"context"
|
||||||
|
"encoding/json"
|
||||||
|
"errors"
|
||||||
|
"io/ioutil"
|
||||||
"net/http"
|
"net/http"
|
||||||
|
|
||||||
"github.com/docker/docker/client"
|
"github.com/docker/docker/client"
|
||||||
portainer "github.com/portainer/portainer/api"
|
portainer "github.com/portainer/portainer/api"
|
||||||
|
bolterrors "github.com/portainer/portainer/api/bolt/errors"
|
||||||
"github.com/portainer/portainer/api/http/proxy/factory/responseutils"
|
"github.com/portainer/portainer/api/http/proxy/factory/responseutils"
|
||||||
|
"github.com/portainer/portainer/api/http/security"
|
||||||
"github.com/portainer/portainer/api/internal/authorization"
|
"github.com/portainer/portainer/api/internal/authorization"
|
||||||
)
|
)
|
||||||
|
|
||||||
|
@ -148,3 +154,69 @@ func containerHasBlackListedLabel(containerLabels map[string]interface{}, labelB
|
||||||
|
|
||||||
return false
|
return false
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func (transport *Transport) decorateContainerCreationOperation(request *http.Request, resourceIdentifierAttribute string, resourceType portainer.ResourceControlType) (*http.Response, error) {
|
||||||
|
type PartialContainer struct {
|
||||||
|
HostConfig struct {
|
||||||
|
Privileged bool `json:"Privileged"`
|
||||||
|
} `json:"HostConfig"`
|
||||||
|
}
|
||||||
|
|
||||||
|
tokenData, err := security.RetrieveTokenData(request)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
|
||||||
|
user, err := transport.dataStore.User().User(tokenData.ID)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
|
||||||
|
rbacExtension, err := transport.dataStore.Extension().Extension(portainer.RBACExtension)
|
||||||
|
if err != nil && err != bolterrors.ErrObjectNotFound {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
|
||||||
|
endpointResourceAccess := false
|
||||||
|
_, ok := user.EndpointAuthorizations[portainer.EndpointID(transport.endpoint.ID)][portainer.EndpointResourcesAccess]
|
||||||
|
if ok {
|
||||||
|
endpointResourceAccess = true
|
||||||
|
}
|
||||||
|
|
||||||
|
if (rbacExtension != nil && !endpointResourceAccess && tokenData.Role != portainer.AdministratorRole) || (rbacExtension == nil && tokenData.Role != portainer.AdministratorRole) {
|
||||||
|
settings, err := transport.dataStore.Settings().Settings()
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
|
||||||
|
if !settings.AllowPrivilegedModeForRegularUsers {
|
||||||
|
body, err := ioutil.ReadAll(request.Body)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
|
||||||
|
partialContainer := &PartialContainer{}
|
||||||
|
err = json.Unmarshal(body, partialContainer)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
|
||||||
|
if partialContainer.HostConfig.Privileged {
|
||||||
|
return nil, errors.New("forbidden to use privileged mode")
|
||||||
|
}
|
||||||
|
|
||||||
|
request.Body = ioutil.NopCloser(bytes.NewBuffer(body))
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
response, err := transport.executeDockerRequest(request)
|
||||||
|
if err != nil {
|
||||||
|
return response, err
|
||||||
|
}
|
||||||
|
|
||||||
|
if response.StatusCode == http.StatusCreated {
|
||||||
|
err = transport.decorateGenericResourceCreationResponse(response, resourceIdentifierAttribute, resourceType, tokenData.ID)
|
||||||
|
}
|
||||||
|
|
||||||
|
return response, err
|
||||||
|
}
|
||||||
|
|
|
@ -189,7 +189,7 @@ func (transport *Transport) proxyConfigRequest(request *http.Request) (*http.Res
|
||||||
func (transport *Transport) proxyContainerRequest(request *http.Request) (*http.Response, error) {
|
func (transport *Transport) proxyContainerRequest(request *http.Request) (*http.Response, error) {
|
||||||
switch requestPath := request.URL.Path; requestPath {
|
switch requestPath := request.URL.Path; requestPath {
|
||||||
case "/containers/create":
|
case "/containers/create":
|
||||||
return transport.decorateGenericResourceCreationOperation(request, containerObjectIdentifier, portainer.ContainerResourceControl)
|
return transport.decorateContainerCreationOperation(request, containerObjectIdentifier, portainer.ContainerResourceControl)
|
||||||
|
|
||||||
case "/containers/prune":
|
case "/containers/prune":
|
||||||
return transport.administratorOperation(request)
|
return transport.administratorOperation(request)
|
||||||
|
@ -629,6 +629,7 @@ func (transport *Transport) createRegistryAccessContext(request *http.Request) (
|
||||||
return nil, err
|
return nil, err
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
accessContext := ®istryAccessContext{
|
accessContext := ®istryAccessContext{
|
||||||
isAdmin: true,
|
isAdmin: true,
|
||||||
userID: tokenData.ID,
|
userID: tokenData.ID,
|
||||||
|
|
Loading…
Reference in New Issue