/
policy_checks.go
100 lines (88 loc) · 3.12 KB
/
policy_checks.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
package policy
import (
"github.com/Azure/azure-sdk-for-go/sdk/resourcemanager/frontdoor/armfrontdoor"
"github.com/sirupsen/logrus"
)
// TODO: reintroduce this function once all the rule types are covered
// func HasDefaultDeny(p *armfrontdoor.WebApplicationFirewallPolicy) (defaultDeny bool, err error) {
// if p.Properties == nil || p.Properties.CustomRules == nil || p.Properties.CustomRules.Rules == nil {
// return false, errors.New("no custom rules defined")
// }
//
// // if Policy has "if not... then deny" then they do
// // if Policy has "if ip 0.0.0.0/0 then deny" then true
// for _, cr := range p.Properties.CustomRules.Rules {
// if *cr.EnabledState != "CustomRuleEnabledStateEnabled" {
// if CustomRuleHasDefaultDeny(cr) {
// return true, err
// }
// }
// }
//
// return
// }
func HasRuleSets(p *armfrontdoor.WebApplicationFirewallPolicy) (ok bool, noRuleSets int) {
funcName := GetFunctionName()
switch {
case p == nil:
logrus.Debugf("%s | policy undefined", funcName)
return false, 0
case p.Properties == nil:
logrus.Debugf("%s | policy %s has no properties", dashIfEmptyString(p.Name), funcName)
return false, 0
case p.Properties.ManagedRules == nil:
logrus.Debugf("%s | policy %s has no managed rules", dashIfEmptyString(p.Name), funcName)
return false, 0
case len(p.Properties.ManagedRules.ManagedRuleSets) == 0:
logrus.Debugf("%s | policy %s has no managed rule sets", dashIfEmptyString(p.Name), funcName)
return false, 0
default:
return true, len(p.Properties.ManagedRules.ManagedRuleSets)
}
}
func HaveEqualRuleSets(one, two *armfrontdoor.WebApplicationFirewallPolicy) bool {
funcName := GetFunctionName()
oneOK, oneNumRuleSets := HasRuleSets(one)
twoOK, twoNumRuleSets := HasRuleSets(two)
switch {
case !oneOK:
logrus.Debugf("%s | first policy hasn't got any rulesets", funcName)
return false
case !twoOK:
logrus.Debugf("%s | second policy hasn't got any rulesets", funcName)
return false
case oneNumRuleSets != twoNumRuleSets:
logrus.Debugf("%s | policies don't have same number of rulesets", funcName)
}
var matches int
for _, rsOne := range one.Properties.ManagedRules.ManagedRuleSets {
for _, rsTwo := range two.Properties.ManagedRules.ManagedRuleSets {
if *rsOne.RuleSetType == *rsTwo.RuleSetType && *rsOne.RuleSetVersion == *rsTwo.RuleSetVersion {
matches++
if matches == oneNumRuleSets {
return true
}
}
}
}
return false
}
func HasCustomRules(p *armfrontdoor.WebApplicationFirewallPolicy) (ok bool, noRuleSets int) {
funcName := GetFunctionName()
switch {
case p == nil:
logrus.Debugf("%s | policy undefined", funcName)
return false, 0
case p.Properties == nil:
logrus.Debugf("%s | policy %s has no properties", dashIfEmptyString(p.Name), funcName)
return false, 0
case p.Properties.CustomRules == nil:
logrus.Debugf("%s | policy %s has no custom rules", dashIfEmptyString(p.Name), funcName)
return false, 0
case len(p.Properties.CustomRules.Rules) == 0:
logrus.Debugf("%s | policy %s has no custom rules", dashIfEmptyString(p.Name), funcName)
return false, 0
default:
return true, len(p.Properties.CustomRules.Rules)
}
}