pomerium/config/policy_ppl.go
Joe Kralicky d06a101f79
ppl: fix empty/no-op allow block added in some cases to converted PPL policies (#5289)
Fix empty/no-op allow block added in some cases to converted PPL policies
2024-09-16 18:52:54 -04:00

92 lines
2 KiB
Go

package config
import (
"bytes"
"encoding/json"
"sort"
"github.com/pomerium/pomerium/pkg/policy/parser"
)
// ToPPL converts a policy into Pomerium Policy Language.
func (p *Policy) ToPPL() *parser.Policy {
ppl := &parser.Policy{}
allowRule := parser.Rule{Action: parser.ActionAllow}
if p.AllowPublicUnauthenticatedAccess {
allowRule.Or = append(allowRule.Or,
parser.Criterion{
Name: "accept",
Data: parser.Boolean(true),
})
}
if p.CORSAllowPreflight {
allowRule.Or = append(allowRule.Or,
parser.Criterion{
Name: "cors_preflight",
Data: parser.Boolean(true),
})
}
if p.AllowAnyAuthenticatedUser {
allowRule.Or = append(allowRule.Or,
parser.Criterion{
Name: "authenticated_user",
Data: parser.Boolean(true),
})
}
for _, ad := range p.AllAllowedDomains() {
allowRule.Or = append(allowRule.Or,
parser.Criterion{
Name: "domain",
Data: parser.Object{
"is": parser.String(ad),
},
})
}
for _, aic := range p.AllAllowedIDPClaims() {
var ks []string
for k := range aic {
ks = append(ks, k)
}
sort.Strings(ks)
for _, k := range ks {
for _, v := range aic[k] {
bs, _ := json.Marshal(v)
data, _ := parser.ParseValue(bytes.NewReader(bs))
allowRule.Or = append(allowRule.Or,
parser.Criterion{
Name: "claim",
SubPath: k,
Data: data,
})
}
}
}
for _, au := range p.AllAllowedUsers() {
allowRule.Or = append(allowRule.Or,
parser.Criterion{
Name: "user",
Data: parser.Object{
"is": parser.String(au),
},
},
parser.Criterion{
Name: "email",
Data: parser.Object{
"is": parser.String(au),
},
})
}
hasEmbeddedPolicy := (p.Policy != nil && p.Policy.Policy != nil)
// omit the default allow rule if it is empty and there is an embedded policy
if len(allowRule.Or) > 0 || !hasEmbeddedPolicy {
ppl.Rules = append(ppl.Rules, allowRule)
}
// append embedded PPL policy rules
if hasEmbeddedPolicy {
ppl.Rules = append(ppl.Rules, p.Policy.Policy.Rules...)
}
return ppl
}