mirror of https://github.com/portainer/portainer
135 lines
5.6 KiB
Go
135 lines
5.6 KiB
Go
package proxy
|
|
|
|
import (
|
|
"net/http"
|
|
|
|
"github.com/portainer/portainer"
|
|
)
|
|
|
|
const (
|
|
// ErrDockerNetworkIdentifierNotFound defines an error raised when Portainer is unable to find a network identifier
|
|
ErrDockerNetworkIdentifierNotFound = portainer.Error("Docker network identifier not found")
|
|
networkIdentifier = "Id"
|
|
networkLabelForStackIdentifier = "com.docker.stack.namespace"
|
|
)
|
|
|
|
// networkListOperation extracts the response as a JSON object, loop through the networks array
|
|
// decorate and/or filter the networks based on resource controls before rewriting the response
|
|
func networkListOperation(response *http.Response, executor *operationExecutor) error {
|
|
var err error
|
|
// NetworkList response is a JSON array
|
|
// https://docs.docker.com/engine/api/v1.28/#operation/NetworkList
|
|
responseArray, err := getResponseAsJSONArray(response)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
if executor.operationContext.isAdmin {
|
|
responseArray, err = decorateNetworkList(responseArray, executor.operationContext.resourceControls)
|
|
} else {
|
|
responseArray, err = filterNetworkList(responseArray, executor.operationContext)
|
|
}
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
return rewriteResponse(response, responseArray, http.StatusOK)
|
|
}
|
|
|
|
// networkInspectOperation extracts the response as a JSON object, verify that the user
|
|
// has access to the network based on resource control and either rewrite an access denied response
|
|
// or a decorated network.
|
|
func networkInspectOperation(response *http.Response, executor *operationExecutor) error {
|
|
// NetworkInspect response is a JSON object
|
|
// https://docs.docker.com/engine/api/v1.28/#operation/NetworkInspect
|
|
responseObject, err := getResponseAsJSONOBject(response)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
if responseObject[networkIdentifier] == nil {
|
|
return ErrDockerNetworkIdentifierNotFound
|
|
}
|
|
|
|
networkID := responseObject[networkIdentifier].(string)
|
|
responseObject, access := applyResourceAccessControl(responseObject, networkID, executor.operationContext)
|
|
if !access {
|
|
return rewriteAccessDeniedResponse(response)
|
|
}
|
|
|
|
networkLabels := extractNetworkLabelsFromNetworkInspectObject(responseObject)
|
|
responseObject, access = applyResourceAccessControlFromLabel(networkLabels, responseObject, networkLabelForStackIdentifier, executor.operationContext)
|
|
if !access {
|
|
return rewriteAccessDeniedResponse(response)
|
|
}
|
|
|
|
return rewriteResponse(response, responseObject, http.StatusOK)
|
|
}
|
|
|
|
// extractNetworkLabelsFromNetworkInspectObject retrieve the Labels of the network if present.
|
|
// Container schema reference: https://docs.docker.com/engine/api/v1.28/#operation/NetworkInspect
|
|
func extractNetworkLabelsFromNetworkInspectObject(responseObject map[string]interface{}) map[string]interface{} {
|
|
// Labels are stored under Labels
|
|
return extractJSONField(responseObject, "Labels")
|
|
}
|
|
|
|
// extractNetworkLabelsFromNetworkListObject retrieve the Labels of the network if present.
|
|
// Network schema reference: https://docs.docker.com/engine/api/v1.28/#operation/NetworkList
|
|
func extractNetworkLabelsFromNetworkListObject(responseObject map[string]interface{}) map[string]interface{} {
|
|
// Labels are stored under Labels
|
|
return extractJSONField(responseObject, "Labels")
|
|
}
|
|
|
|
// decorateNetworkList loops through all networks and decorates any network with an existing resource control.
|
|
// Resource controls checks are based on: resource identifier, stack identifier (from label).
|
|
// Network object schema reference: https://docs.docker.com/engine/api/v1.28/#operation/NetworkList
|
|
func decorateNetworkList(networkData []interface{}, resourceControls []portainer.ResourceControl) ([]interface{}, error) {
|
|
decoratedNetworkData := make([]interface{}, 0)
|
|
|
|
for _, network := range networkData {
|
|
|
|
networkObject := network.(map[string]interface{})
|
|
if networkObject[networkIdentifier] == nil {
|
|
return nil, ErrDockerNetworkIdentifierNotFound
|
|
}
|
|
|
|
networkID := networkObject[networkIdentifier].(string)
|
|
networkObject = decorateResourceWithAccessControl(networkObject, networkID, resourceControls)
|
|
|
|
networkLabels := extractNetworkLabelsFromNetworkListObject(networkObject)
|
|
networkObject = decorateResourceWithAccessControlFromLabel(networkLabels, networkObject, networkLabelForStackIdentifier, resourceControls)
|
|
|
|
decoratedNetworkData = append(decoratedNetworkData, networkObject)
|
|
}
|
|
|
|
return decoratedNetworkData, nil
|
|
}
|
|
|
|
// filterNetworkList loops through all networks and filters public networks (no associated resource control)
|
|
// as well as authorized networks (access granted to the user based on existing resource control).
|
|
// Authorized networks are decorated during the process.
|
|
// Resource controls checks are based on: resource identifier, stack identifier (from label).
|
|
// Network object schema reference: https://docs.docker.com/engine/api/v1.28/#operation/NetworkList
|
|
func filterNetworkList(networkData []interface{}, context *restrictedOperationContext) ([]interface{}, error) {
|
|
filteredNetworkData := make([]interface{}, 0)
|
|
|
|
for _, network := range networkData {
|
|
networkObject := network.(map[string]interface{})
|
|
if networkObject[networkIdentifier] == nil {
|
|
return nil, ErrDockerNetworkIdentifierNotFound
|
|
}
|
|
|
|
networkID := networkObject[networkIdentifier].(string)
|
|
networkObject, access := applyResourceAccessControl(networkObject, networkID, context)
|
|
if access {
|
|
networkLabels := extractNetworkLabelsFromNetworkListObject(networkObject)
|
|
networkObject, access = applyResourceAccessControlFromLabel(networkLabels, networkObject, networkLabelForStackIdentifier, context)
|
|
if access {
|
|
filteredNetworkData = append(filteredNetworkData, networkObject)
|
|
}
|
|
}
|
|
}
|
|
|
|
return filteredNetworkData, nil
|
|
}
|