package security import ( "net/http" portainer "github.com/portainer/portainer/api" ) // IsAdmin returns true if the logged-in user is an admin func IsAdmin(request *http.Request) (bool, error) { tokenData, err := RetrieveTokenData(request) if err != nil { return false, err } return IsAdminRole(tokenData.Role), nil } func IsAdminRole(role portainer.UserRole) bool { return role == portainer.AdministratorRole } // AuthorizedResourceControlAccess checks whether the user can alter an existing resource control. func AuthorizedResourceControlAccess(resourceControl *portainer.ResourceControl, context *RestrictedRequestContext) bool { if context.IsAdmin || resourceControl.Public { return true } for _, access := range resourceControl.TeamAccesses { for _, membership := range context.UserMemberships { if membership.TeamID == access.TeamID { return true } } } for _, access := range resourceControl.UserAccesses { if context.UserID == access.UserID { return true } } return false } // AuthorizedResourceControlUpdate ensure that the user can update a resource control object. // A non-administrator user cannot create a resource control where: // * the Public flag is set false // * the AdministratorsOnly flag is set to true // * he wants to create a resource control without any user/team accesses // * he wants to add more than one user in the user accesses // * he wants to add a user in the user accesses that is not corresponding to its id // * he wants to add a team he is not a member of func AuthorizedResourceControlUpdate(resourceControl *portainer.ResourceControl, context *RestrictedRequestContext) bool { if context.IsAdmin || resourceControl.Public { return true } if resourceControl.AdministratorsOnly { return false } userAccessesCount := len(resourceControl.UserAccesses) teamAccessesCount := len(resourceControl.TeamAccesses) if userAccessesCount == 0 && teamAccessesCount == 0 { return false } if userAccessesCount > 1 || (userAccessesCount == 1 && teamAccessesCount == 1) { return false } if userAccessesCount == 1 { access := resourceControl.UserAccesses[0] if access.UserID == context.UserID { return true } } if teamAccessesCount > 0 { for _, access := range resourceControl.TeamAccesses { for _, membership := range context.UserMemberships { if membership.TeamID == access.TeamID { return true } } } } return false } // AuthorizedTeamManagement ensure that access to the management of the specified team is granted. // It will check if the user is either administrator or leader of that team. func AuthorizedTeamManagement(teamID portainer.TeamID, context *RestrictedRequestContext) bool { if context.IsAdmin { return true } for _, membership := range context.UserMemberships { if membership.TeamID == teamID && membership.Role == portainer.TeamLeader { return true } } return false } // AuthorizedIsTeamLeader ensure that the user is an admin or a team leader func AuthorizedIsTeamLeader(context *RestrictedRequestContext) bool { return context.IsAdmin || context.IsTeamLeader } // AuthorizedIsAdmin ensure that the user is an admin func AuthorizedIsAdmin(context *RestrictedRequestContext) bool { return context.IsAdmin } // AuthorizedEndpointAccess ensure that the user can access the specified environment(endpoint). // It will check if the user is part of the authorized users or part of a team that is // listed in the authorized teams of the environment(endpoint) and the associated group. func AuthorizedEndpointAccess(endpoint *portainer.Endpoint, endpointGroup *portainer.EndpointGroup, userID portainer.UserID, memberships []portainer.TeamMembership) bool { groupAccess := AuthorizedAccess(userID, memberships, endpointGroup.UserAccessPolicies, endpointGroup.TeamAccessPolicies) if !groupAccess { return AuthorizedAccess(userID, memberships, endpoint.UserAccessPolicies, endpoint.TeamAccessPolicies) } return true } // authorizedEndpointGroupAccess ensure that the user can access the specified environment(endpoint) group. // It will check if the user is part of the authorized users or part of a team that is // listed in the authorized teams. func authorizedEndpointGroupAccess(endpointGroup *portainer.EndpointGroup, userID portainer.UserID, memberships []portainer.TeamMembership) bool { return AuthorizedAccess(userID, memberships, endpointGroup.UserAccessPolicies, endpointGroup.TeamAccessPolicies) } // AuthorizedRegistryAccess ensure that the user can access the specified registry. // It will check if the user is part of the authorized users or part of a team that is // listed in the authorized teams for a specified environment(endpoint), func AuthorizedRegistryAccess(registry *portainer.Registry, user *portainer.User, teamMemberships []portainer.TeamMembership, endpointID portainer.EndpointID) bool { if user.Role == portainer.AdministratorRole { return true } registryEndpointAccesses := registry.RegistryAccesses[endpointID] return AuthorizedAccess(user.ID, teamMemberships, registryEndpointAccesses.UserAccessPolicies, registryEndpointAccesses.TeamAccessPolicies) } // AuthorizedAccess verifies the userID or memberships are authorized to use an object per the supplied access policies func AuthorizedAccess(userID portainer.UserID, memberships []portainer.TeamMembership, userAccessPolicies portainer.UserAccessPolicies, teamAccessPolicies portainer.TeamAccessPolicies) bool { _, userAccess := userAccessPolicies[userID] if userAccess { return true } for _, membership := range memberships { _, teamAccess := teamAccessPolicies[membership.TeamID] if teamAccess { return true } } return false }