mirror of
https://github.com/gophish/gophish
synced 2024-11-14 16:27:23 +00:00
84096b8724
This implements the first pass for a user management API allowing users with the `ModifySystem` permission to create, modify, and delete users. In addition to this, any user is able to use the API to view or modify their own account information.
88 lines
3 KiB
Go
88 lines
3 KiB
Go
package models
|
|
|
|
/*
|
|
Design:
|
|
|
|
Gophish implements simple Role-Based-Access-Control (RBAC) to control access to
|
|
certain resources.
|
|
|
|
By default, Gophish has two separate roles, with each user being assigned to
|
|
a single role:
|
|
|
|
* Admin - Can modify all objects as well as system-level configuration
|
|
* User - Can modify all objects
|
|
|
|
It's important to note that these are global roles. In the future, we'll likely
|
|
add the concept of teams, which will include their own roles and permission
|
|
system similar to these global permissions.
|
|
|
|
Each role maps to one or more permissions, making it easy to add more granular
|
|
permissions over time.
|
|
|
|
This is supported through a simple API on a user object,
|
|
`HasPermission(Permission)`, which returns a boolean and an error.
|
|
This API checks the role associated with the user to see if that role has the
|
|
requested permission.
|
|
*/
|
|
|
|
const (
|
|
// RoleAdmin is used for Gophish system administrators. Users with this
|
|
// role have the ability to manage all objects within Gophish, as well as
|
|
// system-level configuration, such as users and URLs.
|
|
RoleAdmin = "admin"
|
|
// RoleUser is used for standard Gophish users. Users with this role can
|
|
// create, manage, and view Gophish objects and campaigns.
|
|
RoleUser = "user"
|
|
|
|
// PermissionViewObjects determines if a role can view standard Gophish
|
|
// objects such as campaigns, groups, landing pages, etc.
|
|
PermissionViewObjects = "view_objects"
|
|
// PermissionModifyObjects determines if a role can create and modify
|
|
// standard Gophish objects.
|
|
PermissionModifyObjects = "modify_objects"
|
|
// PermissionModifySystem determines if a role can manage system-level
|
|
// configuration.
|
|
PermissionModifySystem = "modify_system"
|
|
)
|
|
|
|
// Role represents a user role within Gophish. Each user has a single role
|
|
// which maps to a set of permissions.
|
|
type Role struct {
|
|
ID int64 `json:"-"`
|
|
Slug string `json:"slug"`
|
|
Name string `json:"name"`
|
|
Description string `json:"description"`
|
|
Permissions []Permission `json:"-" gorm:"many2many:role_permissions;"`
|
|
}
|
|
|
|
// Permission determines what a particular role can do. Each role may have one
|
|
// or more permissions.
|
|
type Permission struct {
|
|
ID int64 `json:"id"`
|
|
Slug string `json:"slug"`
|
|
Name string `json:"name"`
|
|
Description string `json:"description"`
|
|
}
|
|
|
|
// GetRoleBySlug returns a role that can be assigned to a user.
|
|
func GetRoleBySlug(slug string) (Role, error) {
|
|
role := Role{}
|
|
err := db.Where("slug=?", slug).First(&role).Error
|
|
return role, err
|
|
}
|
|
|
|
// HasPermission checks to see if the user has a role with the requested
|
|
// permission.
|
|
func (u *User) HasPermission(slug string) (bool, error) {
|
|
perm := []Permission{}
|
|
err := db.Model(Role{ID: u.RoleID}).Where("slug=?", slug).Association("Permissions").Find(&perm).Error
|
|
if err != nil {
|
|
return false, err
|
|
}
|
|
// Gorm doesn't return an ErrRecordNotFound whe scanning into a slice, so
|
|
// we need to check the length (ref jinzhu/gorm#228)
|
|
if len(perm) == 0 {
|
|
return false, nil
|
|
}
|
|
return true, nil
|
|
}
|