* feat(api): decorate Docker resource creation response with resource control * fix(api): fix a potential resource control conflict between stacks/volumes * feat(api): generate a default private resource control instead of admin only * fix(api): fix default RC value * fix(api): update RC authorizations check to support admin only flag * refactor(api): relocate access control related methods * fix(api): fix a potential conflict when fetching RC from database * refactor(api): refactor access control logic * refactor(api): remove the concept of DecoratedStack * feat(api): automatically remove RC when removing a Docker resource * refactor(api): update filter resource methods documentation * refactor(api): update proxy package structure * refactor(api): renamed proxy/misc package * feat(api): re-introduce ResourceControlDelete operation as admin restricted * refactor(api): relocate default endpoint authorizations * feat(api): migrate RBAC data * feat(app): ResourceControl management refactor * fix(api): fix access control issue on stack deletion and automatically delete RC * fix(api): fix stack filtering * fix(api): fix UpdateResourceControl operation checks * refactor(api): introduce a NewTransport builder method * refactor(api): inject endpoint in Docker transport * refactor(api): introduce Docker client into Docker transport * refactor(api): refactor http/proxy package * feat(api): inspect a Docker resource labels during access control validation * fix(api): only apply automatic resource control creation on success response * fix(api): fix stack access control check * fix(api): use StatusCreated instead of StatusOK for automatic resource control creation * fix(app): resource control fixes * fix(api): fix an issue preventing administrator to inspect a resource with a RC * refactor(api): remove useless error return * refactor(api): document DecorateStacks function * fix(api): fix invalid resource control type for container deletion * feat(api): support Docker system networks * feat(api): update Swagger docs * refactor(api): rename transport variable * refactor(api): rename transport variable * feat(networks): add system tag for system networks * feat(api): add support for resource control labels * feat(api): upgrade to DBVersion 22 * refactor(api): refactor access control management in Docker proxy * refactor(api): re-implement docker proxy taskListOperation * refactor(api): review parameters declaration * refactor(api): remove extra blank line * refactor(api): review method comments * fix(api): fix invalid ServerAddress property and review method visibility * feat(api): update error message * feat(api): update restrictedVolumeBrowserOperation method * refactor(api): refactor method parameters * refactor(api): minor refactor * refactor(api): change Azure transport visibility * refactor(api): update struct documentation * refactor(api): update struct documentation * feat(api): review restrictedResourceOperation method * refactor(api): remove unused authorization methods * feat(api): apply RBAC when enabled on stack operations * fix(api): fix invalid data migration procedure for DBVersion = 22 * fix(app): RC duplicate on private resource * feat(api): change Docker API version logic for libcompose/client factory * fix(api): update access denied error message to be Docker API compliant * fix(api): update volume browsing authorizations data migration * fix(api): fix an issue with access control in multi-node agent Swarm cluster
76 lines
2.3 KiB
JavaScript
76 lines
2.3 KiB
JavaScript
import _ from 'lodash-es';
|
|
import { ResourceControlOwnership as RCO } from 'Portainer/models/resourceControl/resourceControlOwnership';
|
|
|
|
angular.module('portainer.app')
|
|
.controller('porAccessControlFormController', ['$q', 'UserService', 'TeamService', 'Notifications', 'Authentication', 'ResourceControlService',
|
|
function ($q, UserService, TeamService, Notifications, Authentication, ResourceControlService) {
|
|
var ctrl = this;
|
|
|
|
ctrl.RCO = RCO;
|
|
|
|
ctrl.availableTeams = [];
|
|
ctrl.availableUsers = [];
|
|
|
|
function setOwnership(resourceControl, isAdmin) {
|
|
if (isAdmin && resourceControl.Ownership === RCO.PRIVATE) {
|
|
ctrl.formData.Ownership = RCO.RESTRICTED;
|
|
} else {
|
|
ctrl.formData.Ownership = resourceControl.Ownership;
|
|
}
|
|
}
|
|
|
|
function setAuthorizedUsersAndTeams(authorizedUsers, authorizedTeams) {
|
|
angular.forEach(ctrl.availableUsers, function(user) {
|
|
var found = _.find(authorizedUsers, { Id: user.Id });
|
|
if (found) {
|
|
user.selected = true;
|
|
}
|
|
});
|
|
|
|
angular.forEach(ctrl.availableTeams, function(team) {
|
|
var found = _.find(authorizedTeams, { Id: team.Id });
|
|
if (found) {
|
|
team.selected = true;
|
|
}
|
|
});
|
|
}
|
|
|
|
function initComponent() {
|
|
var isAdmin = Authentication.isAdmin();
|
|
ctrl.isAdmin = isAdmin;
|
|
|
|
if (isAdmin) {
|
|
ctrl.formData.Ownership = ctrl.RCO.ADMINISTRATORS;
|
|
}
|
|
|
|
$q.all({
|
|
availableTeams: TeamService.teams(),
|
|
availableUsers: isAdmin ? UserService.users(false) : []
|
|
})
|
|
.then(function success(data) {
|
|
ctrl.availableUsers = data.availableUsers;
|
|
|
|
var availableTeams = data.availableTeams;
|
|
ctrl.availableTeams = availableTeams;
|
|
if (!isAdmin && availableTeams.length === 1) {
|
|
ctrl.formData.AuthorizedTeams = availableTeams;
|
|
}
|
|
|
|
return $q.when(ctrl.resourceControl && ResourceControlService.retrieveOwnershipDetails(ctrl.resourceControl));
|
|
})
|
|
.then(function success(data) {
|
|
if (data) {
|
|
var authorizedUsers = data.authorizedUsers;
|
|
var authorizedTeams = data.authorizedTeams;
|
|
setOwnership(ctrl.resourceControl, isAdmin);
|
|
setAuthorizedUsersAndTeams(authorizedUsers, authorizedTeams);
|
|
}
|
|
})
|
|
.catch(function error(err) {
|
|
Notifications.error('Failure', err, 'Unable to retrieve access control information');
|
|
});
|
|
}
|
|
|
|
initComponent();
|
|
}]);
|