summaryrefslogtreecommitdiff
path: root/internal/authorization/access_control_query.go
blob: 36b67d0507d5186c1998fb08952b24cc9ca18d40 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
package authorization

import (
	"fmt"
	"regexp"

	"github.com/authelia/authelia/v4/internal/configuration/schema"
)

// NewAccessControlQuery creates a new AccessControlQuery rule type.
func NewAccessControlQuery(config [][]schema.AccessControlRuleQuery) (rules []AccessControlQuery) {
	if len(config) == 0 {
		return nil
	}

	for i := 0; i < len(config); i++ {
		var rule []ObjectMatcher

		for j := 0; j < len(config[i]); j++ {
			subRule, err := NewAccessControlQueryObjectMatcher(config[i][j])
			if err != nil {
				continue
			}

			rule = append(rule, subRule)
		}

		rules = append(rules, AccessControlQuery{Rules: rule})
	}

	return rules
}

// AccessControlQuery represents an ACL query args rule.
type AccessControlQuery struct {
	Rules []ObjectMatcher
}

// IsMatch returns true if this rule matches the object.
func (acq AccessControlQuery) IsMatch(object Object) (isMatch bool) {
	for _, rule := range acq.Rules {
		if !rule.IsMatch(object) {
			return false
		}
	}

	return true
}

// NewAccessControlQueryObjectMatcher creates a new ObjectMatcher rule type from a schema.AccessControlRuleQuery.
func NewAccessControlQueryObjectMatcher(rule schema.AccessControlRuleQuery) (matcher ObjectMatcher, err error) {
	switch rule.Operator {
	case operatorPresent, operatorAbsent:
		return &AccessControlQueryMatcherPresent{key: rule.Key, present: rule.Operator == operatorPresent}, nil
	case operatorEqual, operatorNotEqual:
		if value, ok := rule.Value.(string); ok {
			return &AccessControlQueryMatcherEqual{key: rule.Key, value: value, equal: rule.Operator == operatorEqual}, nil
		} else {
			return nil, fmt.Errorf("rule value is not a string and is instead %T", rule.Value)
		}
	case operatorPattern, operatorNotPattern:
		if pattern, ok := rule.Value.(*regexp.Regexp); ok {
			return &AccessControlQueryMatcherPattern{key: rule.Key, pattern: pattern, match: rule.Operator == operatorPattern}, nil
		} else {
			return nil, fmt.Errorf("rule value is not a *regexp.Regexp and is instead %T", rule.Value)
		}
	default:
		return nil, fmt.Errorf("invalid operator: %s", rule.Operator)
	}
}

// AccessControlQueryMatcherEqual is a rule type that checks the equality of a query parameter.
type AccessControlQueryMatcherEqual struct {
	key, value string
	equal      bool
}

// IsMatch returns true if this rule matches the object.
func (acl AccessControlQueryMatcherEqual) IsMatch(object Object) (isMatch bool) {
	switch {
	case acl.equal:
		return object.URL.Query().Get(acl.key) == acl.value
	default:
		return object.URL.Query().Get(acl.key) != acl.value
	}
}

// AccessControlQueryMatcherPresent is a rule type that checks the presence of a query parameter.
type AccessControlQueryMatcherPresent struct {
	key     string
	present bool
}

// IsMatch returns true if this rule matches the object.
func (acl AccessControlQueryMatcherPresent) IsMatch(object Object) (isMatch bool) {
	switch {
	case acl.present:
		return object.URL.Query().Has(acl.key)
	default:
		return !object.URL.Query().Has(acl.key)
	}
}

// AccessControlQueryMatcherPattern is a rule type that checks a query parameter against regex.
type AccessControlQueryMatcherPattern struct {
	key     string
	pattern *regexp.Regexp
	match   bool
}

// IsMatch returns true if this rule matches the object.
func (acl AccessControlQueryMatcherPattern) IsMatch(object Object) (isMatch bool) {
	switch {
	case acl.match:
		return acl.pattern.MatchString(object.URL.Query().Get(acl.key))
	default:
		return !acl.pattern.MatchString(object.URL.Query().Get(acl.key))
	}
}