File: firewall_rules.go

package info (click to toggle)
receptor 1.5.5-2
  • links: PTS, VCS
  • area: main
  • in suites: sid
  • size: 2,772 kB
  • sloc: python: 1,643; makefile: 305; sh: 174
file content (204 lines) | stat: -rw-r--r-- 4,658 bytes parent folder | download | duplicates (2)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
package netceptor

import (
	"fmt"
	"reflect"
	"regexp"
	"strings"
)

type FirewallRuleData map[interface{}]interface{}

type FirewallRule struct {
	Action      string
	FromNode    string
	ToNode      string
	FromService string
	ToService   string
}

func buildComp(field string, pattern string) CompareFunc {
	if pattern == "" {
		return nil
	}
	var comp CompareFunc
	if strings.HasPrefix(pattern, "/") {
		comp, _ = regexCompare(field, pattern)
	} else {
		comp, _ = stringCompare(field, pattern)
	}

	return comp
}

func (fr FirewallRule) BuildComps() []CompareFunc {
	var comps []CompareFunc
	fnc := buildComp("fromnode", fr.FromNode)
	if fnc != nil {
		comps = append(comps, fnc)
	}

	tnc := buildComp("tonode", fr.ToNode)
	if tnc != nil {
		comps = append(comps, tnc)
	}

	fsc := buildComp("fromservice", fr.FromService)
	if fsc != nil {
		comps = append(comps, fsc)
	}

	tsc := buildComp("toservice", fr.ToService)
	if tsc != nil {
		comps = append(comps, tsc)
	}

	return comps
}

// ParseFirewallRule takes a single string describing a firewall rule, and returns a FirewallRuleFunc function.
func (frd FirewallRuleData) ParseFirewallRule() (FirewallRuleFunc, error) {
	rv := reflect.ValueOf(frd)
	if rv.Kind() != reflect.Map {
		return nil, fmt.Errorf("invalid firewall rule. see documentation for syntax")
	}

	fr := FirewallRule{}
	for _, key := range rv.MapKeys() {
		mkv := rv.MapIndex(key)
		key := key.Elem().String()

		switch mkv.Interface().(type) {
		case string:
			// expected
		default:
			return nil, fmt.Errorf("invalid firewall rule. %s must be a string", key)
		}

		val := mkv.Elem().String()

		switch strings.ToLower(key) {
		case "action":
			fr.Action = val
		case "fromnode":
			fr.FromNode = val
		case "tonode":
			fr.ToNode = val
		case "fromservice":
			fr.FromService = val
		case "toservice":
			fr.ToService = val
		default:
			return nil, fmt.Errorf("invalid filewall rule. unknown key: %s", key)
		}
	}

	comps := fr.BuildComps()
	fwr, err := firewallRule(comps, fr.Action)
	if err != nil {
		return nil, err
	}

	return fwr, nil
}

// ParseFirewallRules takes a slice of string describing firewall rules, and returns a slice of FirewallRuleFunc functions.
func ParseFirewallRules(rules []FirewallRuleData) ([]FirewallRuleFunc, error) {
	results := make([]FirewallRuleFunc, 0)
	for i, rule := range rules {
		result, err := rule.ParseFirewallRule()
		if err != nil {
			return nil, fmt.Errorf("error in rule %d: %s", i, err)
		}
		results = append(results, result)
	}

	return results, nil
}

type CompareFunc func(md *MessageData) bool

func firewallRule(comparers []CompareFunc, action string) (FirewallRuleFunc, error) {
	var result FirewallResult
	switch strings.ToLower(action) {
	case "accept":
		result = FirewallResultAccept
	case "reject":
		result = FirewallResultReject
	case "drop":
		result = FirewallResultDrop
	default:
		return nil, fmt.Errorf("unknown action: %s", action)
	}
	if len(comparers) == 0 {
		return func(md *MessageData) FirewallResult {
			return result
		}, nil
	}

	return func(md *MessageData) FirewallResult {
		matched := true
		for _, comp := range comparers {
			matched = matched && comp(md)
		}
		if matched {
			return result
		}

		return FirewallResultContinue
	}, nil
}

func stringCompare(field string, value string) (CompareFunc, error) {
	switch strings.ToLower(field) {
	case "fromnode":
		return func(md *MessageData) bool {
			return md.FromNode == value
		}, nil
	case "fromservice":
		return func(md *MessageData) bool {
			return md.FromService == value
		}, nil
	case "tonode":
		return func(md *MessageData) bool {
			return md.ToNode == value
		}, nil
	case "toservice":
		return func(md *MessageData) bool {
			return md.ToService == value
		}, nil
	}

	return nil, fmt.Errorf("unknown field: %s", field)
}

func regexCompare(field string, value string) (CompareFunc, error) {
	if value[0] != '/' || value[len(value)-1] != '/' {
		return nil, fmt.Errorf("regex not enclosed in //")
	}
	value = fmt.Sprintf("^%s$", value[1:len(value)-1])
	re, err := regexp.Compile(value)
	if err != nil {
		return nil, fmt.Errorf("regex failed to compile: %s", value)
	}
	switch strings.ToLower(field) {
	case "fromnode":
		return func(md *MessageData) bool {
			return re.MatchString(md.FromNode)
		}, nil
	case "fromservice":
		return func(md *MessageData) bool {
			return re.MatchString(md.FromService)
		}, nil
	case "tonode":
		return func(md *MessageData) bool {
			return re.MatchString(md.ToNode)
		}, nil
	case "toservice":
		return func(md *MessageData) bool {
			return re.MatchString(md.ToService)
		}, nil
	}

	return nil, fmt.Errorf("unknown field: %s", field)
}