Skip to content

Commit

Permalink
feat: check for policies attached after RaiseFault
Browse files Browse the repository at this point in the history
  • Loading branch information
DinoChiesa committed Dec 6, 2024
1 parent 12e2bdb commit 8bd4ce8
Show file tree
Hide file tree
Showing 21 changed files with 619 additions and 2 deletions.
1 change: 1 addition & 0 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -354,6 +354,7 @@ This is the current list:
|   |:white_check_mark:| ST005 | Extract Variables Step with FormParam | A check for message content should be performed before policy execution. |
|   |:white_check_mark:| ST006 | JSON Threat Protection Step | A check for message content should be performed before policy execution. |
|   |:white_check_mark:| ST007 | XML Threat Protection Step | A check for message content should be performed before policy execution. |
|   |:white_check_mark:| ST008 | Unreachable policies | Policies should not be attached after RaiseFault policies. |
| Policy |   |   |   |   |
|   |:white_check_mark:| PO006 | Policy Name & filename agreement | Policy name attribute should coincide with the policy filename. |
|   |:white_check_mark:| PO007 | Policy Naming Conventions - type indication | It is recommended that the policy name use a prefix or follow a pattern that indicates the policy type. |
Expand Down
2 changes: 1 addition & 1 deletion lib/package/Endpoint.js
Original file line number Diff line number Diff line change
Expand Up @@ -250,7 +250,7 @@ Endpoint.prototype.getAllFlows = function () {
}

allFlows.push.apply(allFlows, this.getFlows());
this.allFlows = allFlows;
this.allFlows = allFlows.filter(e => !!e);
}
debug("< getAllFlows()");
return this.allFlows;
Expand Down
4 changes: 3 additions & 1 deletion lib/package/Flow.js
Original file line number Diff line number Diff line change
Expand Up @@ -105,15 +105,17 @@ Flow.prototype.getFlowResponse = function () {
const n = xpath.select("./Response", this.element);
this.flowResponse = n && n[0] && new FlowPhase(n[0], this);
}
debug(`< getFlowResponse`);
debug(`< getFlowResponse ${this.flowResponse}`);
return this.flowResponse;
};

Flow.prototype.getSharedFlow = function () {
debug(`> getSharedFlow: ${this.getFlowName()}`);
if (this.sharedflow == null) {
const n = xpath.select("/SharedFlow", this.element);
this.sharedflow = n && n[0] && new FlowPhase(n[0], this);
}
debug(`< getSharedFlow (${this.sharedFlow})`);
return this.sharedflow;
};

Expand Down
175 changes: 175 additions & 0 deletions lib/package/plugins/ST008-unreachable-policies-after-raisefault.js
Original file line number Diff line number Diff line change
@@ -0,0 +1,175 @@
/*
Copyright 2019-2024 Google LLC
Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
You may obtain a copy of the License at
https://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing, software
distributed under the License is distributed on an "AS IS" BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
See the License for the specific language governing permissions and
limitations under the License.
*/

const ruleId = require("../lintUtil.js").getRuleId(),
debug = require("debug")("apigeelint:" + ruleId),
util = require("util"),
xpath = require("xpath");

const plugin = {
ruleId,
name: "Unreachable Steps after RaiseFault",
message: "Steps in the same flow after a RaiseFault cannot be reached.",
fatal: false,
severity: 1, //1=warning, 2=error
nodeType: "Step",
enabled: true,
};

let bundle = null;

class PolicyFlowChecker {
constructor(plugin, debug) {
debug(`PolicyFlowChecker ctor`);
this.plugin = plugin;
this.debug = debug;
}

checkSequence(stepParent, entity) {
let flagged = false;
const allSteps = stepParent.getSteps();
// get the array of indexes
const isUnconditionalRaiseFaults = allSteps.map((step) => {
if (step.getCondition()) return false;
let referredPolicy = bundle
.getPolicies()
.find((p) => p.getSteps().find((s) => s == step));
if (!referredPolicy || referredPolicy.getType() !== "RaiseFault")
return false;
let enabled = referredPolicy.select("@enabled");
enabled = enabled && enabled[0];
if (!enabled || enabled == "true") return true;
return false;
});

// just look at the FIRST one, skip all subsequent unconditional RF
isUnconditionalRaiseFaults.find((found, ix) => {
if (found) {
const step = allSteps[ix];
debug(
`found an attached, unconditional RaiseFault policy, line ${step.getElement().lineNumber}`,
);
if (ix < allSteps.length - 1) {
debug(`not last in flow`);
allSteps.slice(ix + 1).forEach((unreachableStep) => {
flagged = true;
entity.addMessage({
plugin: checker.plugin,
source: unreachableStep.getElement().toString(),
line: unreachableStep.getElement().lineNumber,
column: unreachableStep.getElement().columnNumber,
message: `Step ${unreachableStep.getName()} is attached after a RaiseFault, cannot be reached.`,
});
});
}
return true;
}
return false;
});
return flagged;
}

check(sequence) {
let flagged = false;
try {
let debug = this.debug;
let bundlePolicies = bundle.getPolicies();
let checker = this;
let sequenceType = sequence.constructor.name;
debug(`thingType: ${sequenceType}`);
if (sequenceType == "Flow") {
const flow = sequence;
debug(`flow.name: ${flow.name}`);

["FlowRequest", "FlowResponse", "SharedFlow"].forEach((m) => {
const method = `get${m}`;
debug(`calling flow.${method}()`);
const flowPhase = flow[method]();
if (flowPhase) {
if (this.checkSequence(flowPhase, flow)) {
flagged = true;
}
}
});
} else {
if (this.checkSequence(sequence, sequence.getParent())) {
flagged = true;
}
}
} catch (exc1) {
flagged = true;
sequence.addMessage({
plugin: checker.plugin,
message: exc1.message + exc1.stack,
});
}

return flagged;
}
}

const checker = new PolicyFlowChecker(plugin, debug);

const checkEndpoint = function (endpoint, cb) {
let flagged = false;
try {
endpoint.getAllFlows().forEach((sequence, ix) => {
if (checker.check(sequence)) {
flagged = true;
}
});
endpoint.getFaultRules().forEach((sequence) => {
if (checker.check(sequence)) {
flagged = true;
}
});
if (endpoint.getDefaultFaultRule()) {
if (checker.check(endpoint.getDefaultFaultRule())) {
flagged = true;
}
}
} catch (exc1) {
endpoint.addMessage({
plugin: checker.plugin,
message: exc1.message + " " + exc1.stack,
});
}

if (typeof cb == "function") {
cb(null, flagged);
}
};

const onProxyEndpoint = function (endpoint, cb) {
debug("onProxyEndpoint");
checkEndpoint(endpoint, cb);
};

const onTargetEndpoint = function (endpoint, cb) {
debug("onTargetEndpoint");
checkEndpoint(endpoint, cb);
};

const onBundle = function (b, cb) {
bundle = b;
};

module.exports = {
plugin,
onBundle,
onProxyEndpoint,
onTargetEndpoint,
};
Original file line number Diff line number Diff line change
@@ -0,0 +1,11 @@
<AssignMessage name='AM-CleanResponseHeaders' enabled='false'>
<!--
This policy is not enabled. Using it with CORS on a loopback
policy, even as the first policy in the response preflow, will
erase the response headers that the cORS policy sets.
-->
<Remove>
<Headers/>
</Remove>
<IgnoreUnresolvedVariables>false</IgnoreUnresolvedVariables>
</AssignMessage>
Original file line number Diff line number Diff line change
@@ -0,0 +1,7 @@
<AssignMessage name="AM-Extra-Header">
<Set>
<Headers>
<Header name='extra'>{messageid}</Header>
</Headers>
</Set>
</AssignMessage>
Original file line number Diff line number Diff line change
@@ -0,0 +1,7 @@
<AssignMessage name="AM-InjectProxyVersionHeader">
<Set>
<Headers>
<Header name="APIProxy">{apiproxy.name} r{apiproxy.revision}</Header>
</Headers>
</Set>
</AssignMessage>
Original file line number Diff line number Diff line change
@@ -0,0 +1,9 @@
<AssignMessage name="AM-Response">
<Set>
<Payload contentType="text/plain">
request verb: {request.verb}
</Payload>
<StatusCode>200</StatusCode>
<ReasonPhrase>OK</ReasonPhrase>
</Set>
</AssignMessage>
Original file line number Diff line number Diff line change
@@ -0,0 +1,13 @@
<Javascript name="JS-RemoveCopiedHeaders" enabled='true'>
<!--
This policy removes the request headers that Apigee
implicitly copies to the response, on a oopback proxy.
-->
<Source>
var names = String(context.getVariable('request.headers.names'));
names = names.substring(1, names.length-1);
names.split(',').forEach(function(name) {
context.removeVariable('response.header.' + name.trim());
});
</Source>
</Javascript>
Original file line number Diff line number Diff line change
@@ -0,0 +1,9 @@
<RaiseFault enabled="false" name="RF-Error-Not-Enabled">
<FaultResponse>
<Set>
<Payload contentType="text/plain">Error</Payload>
<StatusCode>500</StatusCode>
</Set>
</FaultResponse>
<IgnoreUnresolvedVariables>true</IgnoreUnresolvedVariables>
</RaiseFault>
Original file line number Diff line number Diff line change
@@ -0,0 +1,9 @@
<RaiseFault name="RF-Error">
<FaultResponse>
<Set>
<Payload contentType="text/plain">Error</Payload>
<StatusCode>500</StatusCode>
</Set>
</FaultResponse>
<IgnoreUnresolvedVariables>true</IgnoreUnresolvedVariables>
</RaiseFault>
Original file line number Diff line number Diff line change
@@ -0,0 +1,10 @@
<RaiseFault name="RF-Invalid-Request">
<FaultResponse>
<Set>
<Payload contentType="text/plain">Bad Request</Payload>
<StatusCode>400</StatusCode>
<ReasonPhrase>Bad Request</ReasonPhrase>
</Set>
</FaultResponse>
<IgnoreUnresolvedVariables>true</IgnoreUnresolvedVariables>
</RaiseFault>
Original file line number Diff line number Diff line change
@@ -0,0 +1,98 @@
<ProxyEndpoint name="endpoint1">
<HTTPProxyConnection>
<BasePath>/unreached-policies</BasePath>
</HTTPProxyConnection>

<DefaultFaultRule name="default-fault-rule">
<Step>
<Name>AM-InjectProxyVersionHeader</Name>
</Step>
<AlwaysEnforce>true</AlwaysEnforce>
</DefaultFaultRule>

<FaultRules>
<FaultRule name='rule1'>
<Step>
<Name>RF-Error</Name>
</Step>
<!-- error -->
<Step>
<Name>AM-CleanResponseHeaders</Name>
</Step>
<Step>
<Name>AM-Extra-Header</Name>
</Step>
<Condition>conditional_statement</Condition>
</FaultRule>
</FaultRules>


<PreFlow name="PreFlow">
<Request>
</Request>
<Response>
<Step>
<Name>AM-CleanResponseHeaders</Name>
</Step>
<Step>
<Name>JS-RemoveCopiedHeaders</Name>
</Step>
<Step>
<Name>AM-InjectProxyVersionHeader</Name>
</Step>
</Response>
</PreFlow>

<Flows>
<Flow name="f1">
<Description>a contrived response</Description>
<Request>
</Request>
<Response>
</Response>
<Condition>proxy.pathsuffix MatchesPath "/f1"</Condition>
</Flow>

<Flow name="f2">
<Description>possibly a contrived response, possibly a fault</Description>
<Request>
<Step>
<Condition>request.header.accept = "*/*"</Condition>
<Name>RF-Invalid-Request</Name>
</Step>
<!-- not an error -->
<Step>
<Name>AM-Extra-Header</Name>
</Step>
</Request>
<Response/>
<Condition>proxy.pathsuffix MatchesPath "/f2"</Condition>
</Flow>

<Flow name="f3">
<Description>unknown request - raise a fault</Description>
<Request>
<Step>
<Name>RF-Invalid-Request</Name>
</Step>
<!-- error: unreachable -->
<Step>
<Name>AM-Extra-Header</Name>
</Step>
</Request>
<Response/>
</Flow>
</Flows>

<PostFlow name="PostFlow">
<Request/>
<Response>
<Step>
<Name>AM-Response</Name>
<Condition>request.verb != "OPTIONS"</Condition>
</Step>
</Response>
</PostFlow>

<RouteRule name="noroute"/>
</ProxyEndpoint>
Loading

0 comments on commit 8bd4ce8

Please sign in to comment.