@j-schreiber/sf-cli-security-audit 0.11.0 → 0.11.2

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (276) hide show
  1. package/README.md +3 -3
  2. package/lib/commands/org/audit/init.d.ts +5 -3
  3. package/lib/commands/org/audit/init.js +14 -20
  4. package/lib/commands/org/audit/init.js.map +1 -1
  5. package/lib/commands/org/audit/run.d.ts +1 -1
  6. package/lib/commands/org/audit/run.js +5 -3
  7. package/lib/commands/org/audit/run.js.map +1 -1
  8. package/lib/commands/org/scan/user-perms.js +1 -1
  9. package/lib/commands/org/scan/user-perms.js.map +1 -1
  10. package/lib/libs/{core → audit-engine}/auditRun.d.ts +6 -7
  11. package/lib/libs/{core → audit-engine}/auditRun.js +20 -16
  12. package/lib/libs/audit-engine/auditRun.js.map +1 -0
  13. package/lib/libs/audit-engine/file-manager/fileManager.d.ts +31 -0
  14. package/lib/libs/audit-engine/file-manager/fileManager.js +139 -0
  15. package/lib/libs/audit-engine/file-manager/fileManager.js.map +1 -0
  16. package/lib/libs/audit-engine/file-manager/fileManager.types.d.ts +30 -0
  17. package/lib/libs/audit-engine/file-manager/fileManager.types.js +2 -0
  18. package/lib/libs/audit-engine/file-manager/fileManager.types.js.map +1 -0
  19. package/lib/libs/audit-engine/index.d.ts +121 -0
  20. package/lib/libs/audit-engine/index.js +9 -0
  21. package/lib/libs/audit-engine/index.js.map +1 -0
  22. package/lib/libs/{core/registries/types.d.ts → audit-engine/registry/context.types.d.ts} +6 -10
  23. package/lib/libs/audit-engine/registry/context.types.js +2 -0
  24. package/lib/libs/audit-engine/registry/context.types.js.map +1 -0
  25. package/lib/libs/audit-engine/registry/definitions.d.ts +23 -0
  26. package/lib/libs/audit-engine/registry/definitions.js +53 -0
  27. package/lib/libs/audit-engine/registry/definitions.js.map +1 -0
  28. package/lib/libs/{core/registries → audit-engine/registry}/helpers/permissionsScanning.d.ts +12 -2
  29. package/lib/libs/{core/registries → audit-engine/registry}/helpers/permissionsScanning.js +15 -3
  30. package/lib/libs/audit-engine/registry/helpers/permissionsScanning.js.map +1 -0
  31. package/lib/libs/audit-engine/registry/policies/connectedApps.d.ts +12 -0
  32. package/lib/libs/audit-engine/registry/policies/connectedApps.js +22 -0
  33. package/lib/libs/audit-engine/registry/policies/connectedApps.js.map +1 -0
  34. package/lib/libs/audit-engine/registry/policies/permissionSets.d.ts +18 -0
  35. package/lib/libs/audit-engine/registry/policies/permissionSets.js +80 -0
  36. package/lib/libs/audit-engine/registry/policies/permissionSets.js.map +1 -0
  37. package/lib/libs/audit-engine/registry/policies/profiles.d.ts +18 -0
  38. package/lib/libs/audit-engine/registry/policies/profiles.js +76 -0
  39. package/lib/libs/audit-engine/registry/policies/profiles.js.map +1 -0
  40. package/lib/libs/audit-engine/registry/policies/settings.d.ts +18 -0
  41. package/lib/libs/{core/policies/settingsPolicy.js → audit-engine/registry/policies/settings.js} +48 -18
  42. package/lib/libs/audit-engine/registry/policies/settings.js.map +1 -0
  43. package/lib/libs/audit-engine/registry/policies/users.d.ts +19 -0
  44. package/lib/libs/audit-engine/registry/policies/users.js +76 -0
  45. package/lib/libs/audit-engine/registry/policies/users.js.map +1 -0
  46. package/lib/libs/{core/policies → audit-engine/registry}/policy.d.ts +7 -6
  47. package/lib/libs/{core/policies → audit-engine/registry}/policy.js +2 -0
  48. package/lib/libs/audit-engine/registry/policy.js.map +1 -0
  49. package/lib/libs/{core/result-types.d.ts → audit-engine/registry/result.types.d.ts} +2 -2
  50. package/lib/libs/audit-engine/registry/result.types.js +2 -0
  51. package/lib/libs/audit-engine/registry/result.types.js.map +1 -0
  52. package/lib/libs/{core/registries → audit-engine/registry}/ruleRegistry.d.ts +10 -7
  53. package/lib/libs/{core/registries → audit-engine/registry}/ruleRegistry.js +7 -7
  54. package/lib/libs/audit-engine/registry/ruleRegistry.js.map +1 -0
  55. package/lib/libs/audit-engine/registry/rules/allUsedAppsUnderManagement.d.ts +7 -0
  56. package/lib/libs/audit-engine/registry/rules/allUsedAppsUnderManagement.js.map +1 -0
  57. package/lib/libs/{core/registries → audit-engine/registry}/rules/enforcePermissionPresets.d.ts +4 -2
  58. package/lib/libs/{core/registries → audit-engine/registry}/rules/enforcePermissionPresets.js +17 -15
  59. package/lib/libs/audit-engine/registry/rules/enforcePermissionPresets.js.map +1 -0
  60. package/lib/libs/{core/registries → audit-engine/registry}/rules/enforcePermissionsOnProfileLike.d.ts +1 -1
  61. package/lib/libs/{core/registries → audit-engine/registry}/rules/enforcePermissionsOnProfileLike.js +3 -3
  62. package/lib/libs/audit-engine/registry/rules/enforcePermissionsOnProfileLike.js.map +1 -0
  63. package/lib/libs/{core/registries → audit-engine/registry}/rules/enforcePermissionsOnUser.d.ts +2 -2
  64. package/lib/libs/audit-engine/registry/rules/enforcePermissionsOnUser.js +38 -0
  65. package/lib/libs/audit-engine/registry/rules/enforcePermissionsOnUser.js.map +1 -0
  66. package/lib/libs/{core/registries → audit-engine/registry}/rules/enforceSettings.d.ts +2 -2
  67. package/lib/libs/audit-engine/registry/rules/enforceSettings.js.map +1 -0
  68. package/lib/libs/audit-engine/registry/rules/noInactiveUsers.d.ts +14 -0
  69. package/lib/libs/{core/registries → audit-engine/registry}/rules/noInactiveUsers.js +17 -4
  70. package/lib/libs/audit-engine/registry/rules/noInactiveUsers.js.map +1 -0
  71. package/lib/libs/{core/registries → audit-engine/registry}/rules/noOtherApexApiLogins.d.ts +2 -2
  72. package/lib/libs/{core/registries → audit-engine/registry}/rules/noOtherApexApiLogins.js +4 -1
  73. package/lib/libs/audit-engine/registry/rules/noOtherApexApiLogins.js.map +1 -0
  74. package/lib/libs/audit-engine/registry/rules/noUserCanSelfAuthorize.d.ts +7 -0
  75. package/lib/libs/audit-engine/registry/rules/noUserCanSelfAuthorize.js.map +1 -0
  76. package/lib/libs/{core/registries → audit-engine/registry}/rules/policyRule.d.ts +4 -6
  77. package/lib/libs/{core/registries → audit-engine/registry}/rules/policyRule.js +2 -12
  78. package/lib/libs/audit-engine/registry/rules/policyRule.js.map +1 -0
  79. package/lib/libs/audit-engine/registry/schema.d.ts +2 -0
  80. package/lib/libs/audit-engine/registry/schema.js +11 -0
  81. package/lib/libs/audit-engine/registry/schema.js.map +1 -0
  82. package/lib/libs/audit-engine/registry/shape/auditConfigShape.d.ts +122 -0
  83. package/lib/libs/audit-engine/registry/shape/auditConfigShape.js +54 -0
  84. package/lib/libs/audit-engine/registry/shape/auditConfigShape.js.map +1 -0
  85. package/lib/libs/audit-engine/registry/shape/schema.d.ts +96 -0
  86. package/lib/libs/audit-engine/registry/shape/schema.js +84 -0
  87. package/lib/libs/audit-engine/registry/shape/schema.js.map +1 -0
  88. package/lib/libs/conf-init/auditConfig.d.ts +3 -12
  89. package/lib/libs/conf-init/auditConfig.js +25 -25
  90. package/lib/libs/conf-init/auditConfig.js.map +1 -1
  91. package/lib/libs/conf-init/defaultClassifications.d.ts +8 -0
  92. package/lib/libs/conf-init/defaultClassifications.js +116 -0
  93. package/lib/libs/conf-init/defaultClassifications.js.map +1 -0
  94. package/lib/libs/conf-init/defaultPolicies.d.ts +2 -0
  95. package/lib/libs/conf-init/defaultPolicies.js +20 -0
  96. package/lib/libs/conf-init/defaultPolicies.js.map +1 -0
  97. package/lib/libs/conf-init/init.types.d.ts +27 -0
  98. package/lib/libs/conf-init/init.types.js +8 -0
  99. package/lib/libs/conf-init/init.types.js.map +1 -0
  100. package/lib/libs/conf-init/presets/loose.d.ts +1 -1
  101. package/lib/libs/conf-init/presets/loose.js +4 -2
  102. package/lib/libs/conf-init/presets/loose.js.map +1 -1
  103. package/lib/libs/conf-init/presets/none.d.ts +2 -7
  104. package/lib/libs/conf-init/presets/none.js +1 -1
  105. package/lib/libs/conf-init/presets/none.js.map +1 -1
  106. package/lib/libs/conf-init/presets/strict.js +3 -1
  107. package/lib/libs/conf-init/presets/strict.js.map +1 -1
  108. package/lib/libs/conf-init/presets.d.ts +1 -6
  109. package/lib/libs/conf-init/presets.js +1 -6
  110. package/lib/libs/conf-init/presets.js.map +1 -1
  111. package/lib/libs/quick-scan/userPermissionScanner.js +17 -13
  112. package/lib/libs/quick-scan/userPermissionScanner.js.map +1 -1
  113. package/lib/salesforce/index.d.ts +10 -0
  114. package/lib/salesforce/index.js +8 -0
  115. package/lib/salesforce/index.js.map +1 -0
  116. package/lib/salesforce/mdapi/constants.d.ts +1 -0
  117. package/lib/salesforce/mdapi/constants.js +3 -0
  118. package/lib/salesforce/mdapi/constants.js.map +1 -0
  119. package/lib/{libs/core/mdapi/anySettingsMetadata.d.ts → salesforce/mdapi/genericSettingsMetadata.d.ts} +3 -4
  120. package/lib/{libs/core/mdapi/anySettingsMetadata.js → salesforce/mdapi/genericSettingsMetadata.js} +8 -10
  121. package/lib/salesforce/mdapi/genericSettingsMetadata.js.map +1 -0
  122. package/lib/salesforce/mdapi/mdapi.d.ts +46 -0
  123. package/lib/{libs/core/mdapi/mdapiRetriever.js → salesforce/mdapi/mdapi.js} +19 -40
  124. package/lib/salesforce/mdapi/mdapi.js.map +1 -0
  125. package/lib/salesforce/mdapi/metadataRegistry.d.ts +26 -0
  126. package/lib/salesforce/mdapi/metadataRegistry.js +43 -0
  127. package/lib/salesforce/mdapi/metadataRegistry.js.map +1 -0
  128. package/lib/{libs/core → salesforce}/mdapi/metadataRegistryEntry.js +1 -1
  129. package/lib/salesforce/mdapi/metadataRegistryEntry.js.map +1 -0
  130. package/lib/{libs/core → salesforce}/mdapi/namedMetadataToolingQueryable.js +1 -1
  131. package/lib/{libs/core → salesforce}/mdapi/namedMetadataToolingQueryable.js.map +1 -1
  132. package/lib/salesforce/mdapi/namedMetadataType.js.map +1 -0
  133. package/lib/salesforce/mdapi/singletonMetadataType.js.map +1 -0
  134. package/lib/salesforce/repositories/connected-apps/connected-app.types.d.ts +28 -0
  135. package/lib/salesforce/repositories/connected-apps/connected-app.types.js +6 -0
  136. package/lib/salesforce/repositories/connected-apps/connected-app.types.js.map +1 -0
  137. package/lib/salesforce/repositories/connected-apps/connected-apps.d.ts +16 -0
  138. package/lib/salesforce/repositories/connected-apps/connected-apps.js +83 -0
  139. package/lib/salesforce/repositories/connected-apps/connected-apps.js.map +1 -0
  140. package/lib/salesforce/repositories/connected-apps/queries.d.ts +2 -0
  141. package/lib/salesforce/repositories/connected-apps/queries.js +3 -0
  142. package/lib/salesforce/repositories/connected-apps/queries.js.map +1 -0
  143. package/lib/salesforce/repositories/perm-sets/perm-sets.types.d.ts +29 -0
  144. package/lib/salesforce/repositories/perm-sets/perm-sets.types.js +10 -0
  145. package/lib/salesforce/repositories/perm-sets/perm-sets.types.js.map +1 -0
  146. package/lib/salesforce/repositories/perm-sets/permission-sets.d.ts +11 -0
  147. package/lib/salesforce/repositories/perm-sets/permission-sets.js +43 -0
  148. package/lib/salesforce/repositories/perm-sets/permission-sets.js.map +1 -0
  149. package/lib/salesforce/repositories/perm-sets/queries.d.ts +1 -0
  150. package/lib/salesforce/repositories/perm-sets/queries.js +2 -0
  151. package/lib/salesforce/repositories/perm-sets/queries.js.map +1 -0
  152. package/lib/salesforce/repositories/profiles/profile.types.d.ts +29 -0
  153. package/lib/salesforce/repositories/profiles/profile.types.js +8 -0
  154. package/lib/salesforce/repositories/profiles/profile.types.js.map +1 -0
  155. package/lib/salesforce/repositories/profiles/profiles.d.ts +14 -0
  156. package/lib/salesforce/repositories/profiles/profiles.js +38 -0
  157. package/lib/salesforce/repositories/profiles/profiles.js.map +1 -0
  158. package/lib/salesforce/repositories/profiles/queries.d.ts +2 -0
  159. package/lib/salesforce/repositories/profiles/queries.js +7 -0
  160. package/lib/salesforce/repositories/profiles/queries.js.map +1 -0
  161. package/lib/salesforce/repositories/users/queries.d.ts +3 -0
  162. package/lib/{libs/core/constants.js → salesforce/repositories/users/queries.js} +1 -11
  163. package/lib/salesforce/repositories/users/queries.js.map +1 -0
  164. package/lib/salesforce/repositories/users/user.types.d.ts +54 -0
  165. package/lib/salesforce/repositories/users/user.types.js +12 -0
  166. package/lib/salesforce/repositories/users/user.types.js.map +1 -0
  167. package/lib/salesforce/repositories/users/users.d.ts +22 -0
  168. package/lib/salesforce/repositories/users/users.js +134 -0
  169. package/lib/salesforce/repositories/users/users.js.map +1 -0
  170. package/lib/{libs/core/utils.d.ts → utils.d.ts} +2 -0
  171. package/lib/{libs/core/utils.js → utils.js} +26 -0
  172. package/lib/utils.js.map +1 -0
  173. package/lib/ux/auditRunMultiStage.d.ts +1 -1
  174. package/lib/ux/auditRunMultiStage.js +5 -5
  175. package/lib/ux/auditRunMultiStage.js.map +1 -1
  176. package/messages/policies.general.md +9 -1
  177. package/messages/policyclassifications.md +8 -0
  178. package/messages/rules.enforceClassificationPresets.md +2 -2
  179. package/messages/rules.users.md +1 -1
  180. package/oclif.manifest.json +1 -1
  181. package/package.json +1 -1
  182. package/lib/libs/conf-init/permissionsClassification.d.ts +0 -37
  183. package/lib/libs/conf-init/permissionsClassification.js +0 -126
  184. package/lib/libs/conf-init/permissionsClassification.js.map +0 -1
  185. package/lib/libs/conf-init/policyConfigs.d.ts +0 -21
  186. package/lib/libs/conf-init/policyConfigs.js +0 -47
  187. package/lib/libs/conf-init/policyConfigs.js.map +0 -1
  188. package/lib/libs/core/auditRun.js.map +0 -1
  189. package/lib/libs/core/classification-types.d.ts +0 -20
  190. package/lib/libs/core/classification-types.js +0 -23
  191. package/lib/libs/core/classification-types.js.map +0 -1
  192. package/lib/libs/core/constants.d.ts +0 -10
  193. package/lib/libs/core/constants.js.map +0 -1
  194. package/lib/libs/core/file-mgmt/auditConfigFileManager.d.ts +0 -48
  195. package/lib/libs/core/file-mgmt/auditConfigFileManager.js +0 -145
  196. package/lib/libs/core/file-mgmt/auditConfigFileManager.js.map +0 -1
  197. package/lib/libs/core/file-mgmt/schema.d.ts +0 -156
  198. package/lib/libs/core/file-mgmt/schema.js +0 -81
  199. package/lib/libs/core/file-mgmt/schema.js.map +0 -1
  200. package/lib/libs/core/mdapi/anySettingsMetadata.js.map +0 -1
  201. package/lib/libs/core/mdapi/mdapiRetriever.d.ts +0 -54
  202. package/lib/libs/core/mdapi/mdapiRetriever.js.map +0 -1
  203. package/lib/libs/core/mdapi/metadataRegistryEntry.js.map +0 -1
  204. package/lib/libs/core/mdapi/namedMetadataType.js.map +0 -1
  205. package/lib/libs/core/mdapi/singletonMetadataType.js.map +0 -1
  206. package/lib/libs/core/mdapi/usersRepository.d.ts +0 -85
  207. package/lib/libs/core/mdapi/usersRepository.js +0 -126
  208. package/lib/libs/core/mdapi/usersRepository.js.map +0 -1
  209. package/lib/libs/core/policies/connectedAppPolicy.d.ts +0 -10
  210. package/lib/libs/core/policies/connectedAppPolicy.js +0 -78
  211. package/lib/libs/core/policies/connectedAppPolicy.js.map +0 -1
  212. package/lib/libs/core/policies/permissionSetPolicy.d.ts +0 -12
  213. package/lib/libs/core/policies/permissionSetPolicy.js +0 -64
  214. package/lib/libs/core/policies/permissionSetPolicy.js.map +0 -1
  215. package/lib/libs/core/policies/policy.js.map +0 -1
  216. package/lib/libs/core/policies/profilePolicy.d.ts +0 -12
  217. package/lib/libs/core/policies/profilePolicy.js +0 -65
  218. package/lib/libs/core/policies/profilePolicy.js.map +0 -1
  219. package/lib/libs/core/policies/salesforceStandardTypes.d.ts +0 -58
  220. package/lib/libs/core/policies/salesforceStandardTypes.js +0 -2
  221. package/lib/libs/core/policies/salesforceStandardTypes.js.map +0 -1
  222. package/lib/libs/core/policies/settingsPolicy.d.ts +0 -11
  223. package/lib/libs/core/policies/settingsPolicy.js.map +0 -1
  224. package/lib/libs/core/policies/userPolicy.d.ts +0 -12
  225. package/lib/libs/core/policies/userPolicy.js +0 -62
  226. package/lib/libs/core/policies/userPolicy.js.map +0 -1
  227. package/lib/libs/core/policy-types.d.ts +0 -18
  228. package/lib/libs/core/policy-types.js +0 -28
  229. package/lib/libs/core/policy-types.js.map +0 -1
  230. package/lib/libs/core/policyRegistry.d.ts +0 -23
  231. package/lib/libs/core/policyRegistry.js +0 -52
  232. package/lib/libs/core/policyRegistry.js.map +0 -1
  233. package/lib/libs/core/registries/connectedApps.d.ts +0 -13
  234. package/lib/libs/core/registries/connectedApps.js +0 -13
  235. package/lib/libs/core/registries/connectedApps.js.map +0 -1
  236. package/lib/libs/core/registries/helpers/permissionsScanning.js.map +0 -1
  237. package/lib/libs/core/registries/permissionSets.d.ts +0 -11
  238. package/lib/libs/core/registries/permissionSets.js +0 -11
  239. package/lib/libs/core/registries/permissionSets.js.map +0 -1
  240. package/lib/libs/core/registries/profiles.d.ts +0 -11
  241. package/lib/libs/core/registries/profiles.js +0 -11
  242. package/lib/libs/core/registries/profiles.js.map +0 -1
  243. package/lib/libs/core/registries/ruleRegistry.js.map +0 -1
  244. package/lib/libs/core/registries/rules/allUsedAppsUnderManagement.d.ts +0 -7
  245. package/lib/libs/core/registries/rules/allUsedAppsUnderManagement.js.map +0 -1
  246. package/lib/libs/core/registries/rules/enforcePermissionPresets.js.map +0 -1
  247. package/lib/libs/core/registries/rules/enforcePermissionsOnProfileLike.js.map +0 -1
  248. package/lib/libs/core/registries/rules/enforcePermissionsOnUser.js +0 -42
  249. package/lib/libs/core/registries/rules/enforcePermissionsOnUser.js.map +0 -1
  250. package/lib/libs/core/registries/rules/enforceSettings.js.map +0 -1
  251. package/lib/libs/core/registries/rules/noInactiveUsers.d.ts +0 -9
  252. package/lib/libs/core/registries/rules/noInactiveUsers.js.map +0 -1
  253. package/lib/libs/core/registries/rules/noOtherApexApiLogins.js.map +0 -1
  254. package/lib/libs/core/registries/rules/noUserCanSelfAuthorize.d.ts +0 -7
  255. package/lib/libs/core/registries/rules/noUserCanSelfAuthorize.js.map +0 -1
  256. package/lib/libs/core/registries/rules/policyRule.js.map +0 -1
  257. package/lib/libs/core/registries/settings.d.ts +0 -8
  258. package/lib/libs/core/registries/settings.js +0 -51
  259. package/lib/libs/core/registries/settings.js.map +0 -1
  260. package/lib/libs/core/registries/types.js +0 -13
  261. package/lib/libs/core/registries/types.js.map +0 -1
  262. package/lib/libs/core/registries/users.d.ts +0 -10
  263. package/lib/libs/core/registries/users.js +0 -17
  264. package/lib/libs/core/registries/users.js.map +0 -1
  265. package/lib/libs/core/result-types.js +0 -2
  266. package/lib/libs/core/result-types.js.map +0 -1
  267. package/lib/libs/core/utils.js.map +0 -1
  268. /package/lib/libs/{core/registries → audit-engine/registry}/rules/allUsedAppsUnderManagement.js +0 -0
  269. /package/lib/libs/{core/registries → audit-engine/registry}/rules/enforceSettings.js +0 -0
  270. /package/lib/libs/{core/registries → audit-engine/registry}/rules/noUserCanSelfAuthorize.js +0 -0
  271. /package/lib/{libs/core → salesforce}/mdapi/metadataRegistryEntry.d.ts +0 -0
  272. /package/lib/{libs/core → salesforce}/mdapi/namedMetadataToolingQueryable.d.ts +0 -0
  273. /package/lib/{libs/core → salesforce}/mdapi/namedMetadataType.d.ts +0 -0
  274. /package/lib/{libs/core → salesforce}/mdapi/namedMetadataType.js +0 -0
  275. /package/lib/{libs/core → salesforce}/mdapi/singletonMetadataType.d.ts +0 -0
  276. /package/lib/{libs/core → salesforce}/mdapi/singletonMetadataType.js +0 -0
@@ -0,0 +1,121 @@
1
+ import FileManager from './file-manager/fileManager.js';
2
+ export { default as AuditRun, startAuditRun } from './auditRun.js';
3
+ export { AuditConfigShape } from './registry/shape/auditConfigShape.js';
4
+ export { PermissionRiskLevel, UserPrivilegeLevel } from './registry/shape/schema.js';
5
+ export { default as RuleRegistry } from './registry/ruleRegistry.js';
6
+ export type { AuditRunConfig, Policies, Classifications } from './registry/shape/auditConfigShape.js';
7
+ export type { PolicyConfig } from './registry/shape/schema.js';
8
+ export type { EntityResolveEvent } from './auditRun.js';
9
+ export type { AuditResult } from './registry/result.types.js';
10
+ export declare const ConfigFileManager: FileManager<{
11
+ classifications: {
12
+ userPermissions: {
13
+ schema: import("zod").ZodObject<{
14
+ permissions: import("zod").ZodRecord<import("zod").ZodString, import("zod").ZodObject<{
15
+ label: import("zod").ZodOptional<import("zod").ZodString>;
16
+ reason: import("zod").ZodOptional<import("zod").ZodString>;
17
+ classification: import("zod").ZodEnum<typeof import("./registry/shape/schema.js").PermissionRiskLevel>;
18
+ }, import("zod/v4/core").$strip>>;
19
+ }, import("zod/v4/core").$strip>;
20
+ entities: string;
21
+ };
22
+ customPermissions: {
23
+ schema: import("zod").ZodObject<{
24
+ permissions: import("zod").ZodRecord<import("zod").ZodString, import("zod").ZodObject<{
25
+ label: import("zod").ZodOptional<import("zod").ZodString>;
26
+ reason: import("zod").ZodOptional<import("zod").ZodString>;
27
+ classification: import("zod").ZodEnum<typeof import("./registry/shape/schema.js").PermissionRiskLevel>;
28
+ }, import("zod/v4/core").$strip>>;
29
+ }, import("zod/v4/core").$strip>;
30
+ entities: string;
31
+ };
32
+ profiles: {
33
+ schema: import("zod").ZodObject<{
34
+ profiles: import("zod").ZodRecord<import("zod").ZodString, import("zod").ZodObject<{
35
+ role: import("zod").ZodEnum<typeof import("./registry/shape/schema.js").UserPrivilegeLevel>;
36
+ }, import("zod/v4/core").$strip>>;
37
+ }, import("zod/v4/core").$strip>;
38
+ entities: string;
39
+ };
40
+ permissionSets: {
41
+ schema: import("zod").ZodObject<{
42
+ permissionSets: import("zod").ZodRecord<import("zod").ZodString, import("zod").ZodObject<{
43
+ role: import("zod").ZodEnum<typeof import("./registry/shape/schema.js").UserPrivilegeLevel>;
44
+ }, import("zod/v4/core").$strip>>;
45
+ }, import("zod/v4/core").$strip>;
46
+ entities: string;
47
+ };
48
+ users: {
49
+ schema: import("zod").ZodObject<{
50
+ users: import("zod").ZodRecord<import("zod").ZodString, import("zod").ZodObject<{
51
+ role: import("zod").ZodEnum<typeof import("./registry/shape/schema.js").UserPrivilegeLevel>;
52
+ }, import("zod/v4/core").$strip>>;
53
+ }, import("zod/v4/core").$strip>;
54
+ entities: string;
55
+ };
56
+ };
57
+ policies: {
58
+ profiles: {
59
+ schema: import("zod").ZodObject<{
60
+ enabled: import("zod").ZodDefault<import("zod").ZodBoolean>;
61
+ rules: import("zod").ZodDefault<import("zod").ZodRecord<import("zod").ZodString, import("zod").ZodObject<{
62
+ enabled: import("zod").ZodDefault<import("zod").ZodBoolean>;
63
+ options: import("zod").ZodOptional<import("zod").ZodRecord<import("zod").ZodString, import("zod").ZodUnknown>>;
64
+ }, import("zod/v4/core").$strip>>>;
65
+ options: import("zod").ZodOptional<import("zod").ZodRecord<import("zod").ZodString, import("zod").ZodUnknown>>;
66
+ }, import("zod/v4/core").$strip>;
67
+ dependencies: {
68
+ path: string[];
69
+ errorName: string;
70
+ }[];
71
+ };
72
+ permissionSets: {
73
+ schema: import("zod").ZodObject<{
74
+ enabled: import("zod").ZodDefault<import("zod").ZodBoolean>;
75
+ rules: import("zod").ZodDefault<import("zod").ZodRecord<import("zod").ZodString, import("zod").ZodObject<{
76
+ enabled: import("zod").ZodDefault<import("zod").ZodBoolean>;
77
+ options: import("zod").ZodOptional<import("zod").ZodRecord<import("zod").ZodString, import("zod").ZodUnknown>>;
78
+ }, import("zod/v4/core").$strip>>>;
79
+ options: import("zod").ZodOptional<import("zod").ZodRecord<import("zod").ZodString, import("zod").ZodUnknown>>;
80
+ }, import("zod/v4/core").$strip>;
81
+ dependencies: {
82
+ path: string[];
83
+ errorName: string;
84
+ }[];
85
+ };
86
+ connectedApps: {
87
+ schema: import("zod").ZodObject<{
88
+ enabled: import("zod").ZodDefault<import("zod").ZodBoolean>;
89
+ rules: import("zod").ZodDefault<import("zod").ZodRecord<import("zod").ZodString, import("zod").ZodObject<{
90
+ enabled: import("zod").ZodDefault<import("zod").ZodBoolean>;
91
+ options: import("zod").ZodOptional<import("zod").ZodRecord<import("zod").ZodString, import("zod").ZodUnknown>>;
92
+ }, import("zod/v4/core").$strip>>>;
93
+ options: import("zod").ZodOptional<import("zod").ZodRecord<import("zod").ZodString, import("zod").ZodUnknown>>;
94
+ }, import("zod/v4/core").$strip>;
95
+ };
96
+ users: {
97
+ schema: import("zod").ZodObject<{
98
+ enabled: import("zod").ZodDefault<import("zod").ZodBoolean>;
99
+ rules: import("zod").ZodDefault<import("zod").ZodRecord<import("zod").ZodString, import("zod").ZodObject<{
100
+ enabled: import("zod").ZodDefault<import("zod").ZodBoolean>;
101
+ options: import("zod").ZodOptional<import("zod").ZodRecord<import("zod").ZodString, import("zod").ZodUnknown>>;
102
+ }, import("zod/v4/core").$strip>>>;
103
+ options: import("zod").ZodObject<{
104
+ defaultRoleForMissingUsers: import("zod").ZodDefault<import("zod").ZodEnum<typeof import("./registry/shape/schema.js").UserPrivilegeLevel>>;
105
+ analyseLastNDaysOfLoginHistory: import("zod").ZodOptional<import("zod").ZodNumber>;
106
+ }, import("zod/v4/core").$strict>;
107
+ }, import("zod/v4/core").$strip>;
108
+ };
109
+ settings: {
110
+ schema: import("zod").ZodObject<{
111
+ enabled: import("zod").ZodDefault<import("zod").ZodBoolean>;
112
+ rules: import("zod").ZodDefault<import("zod").ZodRecord<import("zod").ZodString, import("zod").ZodObject<{
113
+ enabled: import("zod").ZodDefault<import("zod").ZodBoolean>;
114
+ options: import("zod").ZodOptional<import("zod").ZodRecord<import("zod").ZodString, import("zod").ZodUnknown>>;
115
+ }, import("zod/v4/core").$strip>>>;
116
+ options: import("zod").ZodOptional<import("zod").ZodRecord<import("zod").ZodString, import("zod").ZodUnknown>>;
117
+ }, import("zod/v4/core").$strip>;
118
+ };
119
+ };
120
+ }>;
121
+ export { PolicyDefinitions, loadPolicy } from './registry/definitions.js';
@@ -0,0 +1,9 @@
1
+ import FileManager from './file-manager/fileManager.js';
2
+ import { AuditConfigShape } from './registry/shape/auditConfigShape.js';
3
+ export { default as AuditRun, startAuditRun } from './auditRun.js';
4
+ export { AuditConfigShape } from './registry/shape/auditConfigShape.js';
5
+ export { PermissionRiskLevel, UserPrivilegeLevel } from './registry/shape/schema.js';
6
+ export { default as RuleRegistry } from './registry/ruleRegistry.js';
7
+ export const ConfigFileManager = new FileManager(AuditConfigShape);
8
+ export { PolicyDefinitions, loadPolicy } from './registry/definitions.js';
9
+ //# sourceMappingURL=index.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"index.js","sourceRoot":"","sources":["../../../src/libs/audit-engine/index.ts"],"names":[],"mappings":"AAAA,OAAO,WAAW,MAAM,+BAA+B,CAAC;AACxD,OAAO,EAAE,gBAAgB,EAAE,MAAM,sCAAsC,CAAC;AAExE,OAAO,EAAE,OAAO,IAAI,QAAQ,EAAE,aAAa,EAAE,MAAM,eAAe,CAAC;AACnE,OAAO,EAAE,gBAAgB,EAAE,MAAM,sCAAsC,CAAC;AACxE,OAAO,EAAE,mBAAmB,EAAE,kBAAkB,EAAE,MAAM,4BAA4B,CAAC;AACrF,OAAO,EAAE,OAAO,IAAI,YAAY,EAAE,MAAM,4BAA4B,CAAC;AAOrE,MAAM,CAAC,MAAM,iBAAiB,GAAG,IAAI,WAAW,CAAC,gBAAgB,CAAC,CAAC;AACnE,OAAO,EAAE,iBAAiB,EAAE,UAAU,EAAE,MAAM,2BAA2B,CAAC"}
@@ -1,14 +1,6 @@
1
1
  import { Connection } from '@salesforce/core';
2
- import { AuditPolicyResult, PolicyRuleExecutionResult } from '../result-types.js';
3
- import { Optional } from '../utils.js';
4
- export declare const RuleRegistries: {
5
- connectedApps: import("./connectedApps.js").default;
6
- profiles: import("./profiles.js").default;
7
- permissionSets: import("./permissionSets.js").default;
8
- users: import("./users.js").default;
9
- settings: import("./settings.js").default;
10
- };
11
- export type Constructor<T, Args extends any[] = any[]> = new (...args: Args) => T;
2
+ import { Optional } from '../../../utils.js';
3
+ import { AuditPolicyResult, PolicyRuleExecutionResult } from './result.types.js';
12
4
  /**
13
5
  * A rule must only implement a subset of the rule result. All optional
14
6
  * properties are completed by the policy.
@@ -29,6 +21,10 @@ export type AuditContext = {
29
21
  */
30
22
  targetOrgConnection: Connection;
31
23
  };
24
+ /**
25
+ * Run-time context of execution, that is directly resolved
26
+ * from the target org.
27
+ */
32
28
  export type RuleAuditContext<T> = AuditContext & {
33
29
  /**
34
30
  * Resolved entities from the policy. Can be permission sets,
@@ -0,0 +1,2 @@
1
+ export {};
2
+ //# sourceMappingURL=context.types.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"context.types.js","sourceRoot":"","sources":["../../../../src/libs/audit-engine/registry/context.types.ts"],"names":[],"mappings":""}
@@ -0,0 +1,23 @@
1
+ import ConnectedAppsPolicy from './policies/connectedApps.js';
2
+ import PermissionSetsPolicy from './policies/permissionSets.js';
3
+ import ProfilesPolicy from './policies/profiles.js';
4
+ import SettingsPolicy from './policies/settings.js';
5
+ import UsersPolicy from './policies/users.js';
6
+ import { RuleHandlerMap, Constructor } from './ruleRegistry.js';
7
+ import { AuditRunConfig, Policies } from './shape/auditConfigShape.js';
8
+ import { PolicyConfig, UserPolicyConfig } from './shape/schema.js';
9
+ type PolicyDefinition<T, C extends PolicyConfig = PolicyConfig> = {
10
+ handler: Constructor<T>;
11
+ rules?: RuleHandlerMap;
12
+ configType?: C;
13
+ };
14
+ type PolicyDefinitions = {
15
+ permissionSets: PolicyDefinition<PermissionSetsPolicy>;
16
+ profiles: PolicyDefinition<ProfilesPolicy>;
17
+ users: PolicyDefinition<UsersPolicy, UserPolicyConfig>;
18
+ connectedApps: PolicyDefinition<ConnectedAppsPolicy>;
19
+ settings: PolicyDefinition<SettingsPolicy>;
20
+ };
21
+ export declare const PolicyDefinitions: PolicyDefinitions;
22
+ export declare function loadPolicy<P extends Policies>(policyName: P, config: AuditRunConfig): InstanceType<PolicyDefinitions[P]['handler']>;
23
+ export {};
@@ -0,0 +1,53 @@
1
+ import ConnectedAppsPolicy from './policies/connectedApps.js';
2
+ import PermissionSetsPolicy from './policies/permissionSets.js';
3
+ import ProfilesPolicy from './policies/profiles.js';
4
+ import SettingsPolicy from './policies/settings.js';
5
+ import UsersPolicy from './policies/users.js';
6
+ import RuleRegistry from './ruleRegistry.js';
7
+ import AllUsedAppsUnderManagement from './rules/allUsedAppsUnderManagement.js';
8
+ import EnforcePermissionPresets from './rules/enforcePermissionPresets.js';
9
+ import EnforcePermissionsOnProfileLike from './rules/enforcePermissionsOnProfileLike.js';
10
+ import EnforcePermissionsOnUser from './rules/enforcePermissionsOnUser.js';
11
+ import NoInactiveUsers from './rules/noInactiveUsers.js';
12
+ import NoOtherApexApiLogins from './rules/noOtherApexApiLogins.js';
13
+ import NoUserCanSelfAuthorize from './rules/noUserCanSelfAuthorize.js';
14
+ export const PolicyDefinitions = {
15
+ permissionSets: {
16
+ handler: PermissionSetsPolicy,
17
+ rules: {
18
+ EnforcePermissionClassifications: EnforcePermissionsOnProfileLike,
19
+ },
20
+ },
21
+ profiles: {
22
+ handler: ProfilesPolicy,
23
+ rules: {
24
+ EnforcePermissionClassifications: EnforcePermissionsOnProfileLike,
25
+ },
26
+ },
27
+ users: {
28
+ handler: UsersPolicy,
29
+ rules: {
30
+ NoOtherApexApiLogins,
31
+ NoInactiveUsers,
32
+ EnforcePermissionClassifications: EnforcePermissionsOnUser,
33
+ EnforcePermissionPresets,
34
+ },
35
+ },
36
+ connectedApps: {
37
+ handler: ConnectedAppsPolicy,
38
+ rules: {
39
+ AllUsedAppsUnderManagement,
40
+ NoUserCanSelfAuthorize,
41
+ },
42
+ },
43
+ settings: {
44
+ handler: SettingsPolicy,
45
+ },
46
+ };
47
+ export function loadPolicy(policyName, config) {
48
+ const def = PolicyDefinitions[policyName];
49
+ const policyConfig = config.policies[policyName];
50
+ const policy = new def.handler(policyConfig, config, new RuleRegistry(def.rules));
51
+ return policy;
52
+ }
53
+ //# sourceMappingURL=definitions.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"definitions.js","sourceRoot":"","sources":["../../../../src/libs/audit-engine/registry/definitions.ts"],"names":[],"mappings":"AAAA,OAAO,mBAAmB,MAAM,6BAA6B,CAAC;AAC9D,OAAO,oBAAoB,MAAM,8BAA8B,CAAC;AAChE,OAAO,cAAc,MAAM,wBAAwB,CAAC;AACpD,OAAO,cAAc,MAAM,wBAAwB,CAAC;AACpD,OAAO,WAAW,MAAM,qBAAqB,CAAC;AAC9C,OAAO,YAA6C,MAAM,mBAAmB,CAAC;AAC9E,OAAO,0BAA0B,MAAM,uCAAuC,CAAC;AAC/E,OAAO,wBAAwB,MAAM,qCAAqC,CAAC;AAC3E,OAAO,+BAA+B,MAAM,4CAA4C,CAAC;AACzF,OAAO,wBAAwB,MAAM,qCAAqC,CAAC;AAC3E,OAAO,eAAe,MAAM,4BAA4B,CAAC;AACzD,OAAO,oBAAoB,MAAM,iCAAiC,CAAC;AACnE,OAAO,sBAAsB,MAAM,mCAAmC,CAAC;AAkBvE,MAAM,CAAC,MAAM,iBAAiB,GAAsB;IAClD,cAAc,EAAE;QACd,OAAO,EAAE,oBAAoB;QAC7B,KAAK,EAAE;YACL,gCAAgC,EAAE,+BAA+B;SAClE;KACF;IACD,QAAQ,EAAE;QACR,OAAO,EAAE,cAAc;QACvB,KAAK,EAAE;YACL,gCAAgC,EAAE,+BAA+B;SAClE;KACF;IACD,KAAK,EAAE;QACL,OAAO,EAAE,WAAW;QACpB,KAAK,EAAE;YACL,oBAAoB;YACpB,eAAe;YACf,gCAAgC,EAAE,wBAAwB;YAC1D,wBAAwB;SACzB;KACF;IACD,aAAa,EAAE;QACb,OAAO,EAAE,mBAAmB;QAC5B,KAAK,EAAE;YACL,0BAA0B;YAC1B,sBAAsB;SACvB;KACF;IACD,QAAQ,EAAE;QACR,OAAO,EAAE,cAAc;KACxB;CACF,CAAC;AAEF,MAAM,UAAU,UAAU,CACxB,UAAa,EACb,MAAsB;IAEtB,MAAM,GAAG,GAAG,iBAAiB,CAAC,UAAU,CAAC,CAAC;IAC1C,MAAM,YAAY,GAAG,MAAM,CAAC,QAAQ,CAAC,UAAU,CAAC,CAAC;IACjD,MAAM,MAAM,GAAG,IAAI,GAAG,CAAC,OAAO,CAAC,YAAY,EAAE,MAAM,EAAE,IAAI,YAAY,CAAC,GAAG,CAAC,KAAK,CAAC,CAE/E,CAAC;IACF,OAAO,MAAM,CAAC;AAChB,CAAC"}
@@ -1,6 +1,7 @@
1
1
  import { Profile } from '@jsforce/jsforce-node/lib/api/metadata.js';
2
- import { AuditRunConfig } from '../../file-mgmt/schema.js';
3
- import { PolicyRuleViolation, RuleComponentMessage } from '../../result-types.js';
2
+ import { PolicyRuleViolation, RuleComponentMessage } from '../result.types.js';
3
+ import { AuditRunConfig } from '../shape/auditConfigShape.js';
4
+ import { PermissionClassifications } from '../shape/schema.js';
4
5
  export type ResolvedProfileLike = {
5
6
  name: string;
6
7
  role: string;
@@ -12,6 +13,12 @@ export type ScanResult = {
12
13
  };
13
14
  export type PartialProfileLike = Pick<Profile, 'userPermissions' | 'customPermissions'>;
14
15
  type PermissionsListKey = keyof PartialProfileLike;
16
+ /**
17
+ * Moves the "name" from the classifications map to object prop
18
+ */
19
+ type NamedPermissionClassification = PermissionClassifications['string'] & {
20
+ name: string;
21
+ };
15
22
  /**
16
23
  * Scan userPermissions and customPermissions of a profile or permission set and
17
24
  * get a unified scan result with violations (risk level not allowed) and warnings
@@ -24,4 +31,7 @@ type PermissionsListKey = keyof PartialProfileLike;
24
31
  */
25
32
  export declare function scanProfileLike(profileLike: ResolvedProfileLike, auditRun: AuditRunConfig, rootIdentifier?: string[]): ScanResult;
26
33
  export declare function scanPermissions(profile: ResolvedProfileLike, permissionListName: PermissionsListKey, auditRun: AuditRunConfig, rootIdentifier?: string[]): ScanResult;
34
+ export declare function resolvePresetOrdinalValue(value: string): number;
35
+ export declare function permissionAllowedInPreset(permClassification: string, preset: string): boolean;
36
+ export declare const classificationSorter: (a: NamedPermissionClassification, b: NamedPermissionClassification) => number;
27
37
  export {};
@@ -1,6 +1,5 @@
1
1
  import { Messages } from '@salesforce/core';
2
- import { PermissionRiskLevel } from '../../classification-types.js';
3
- import { permissionAllowedInPreset } from '../../policy-types.js';
2
+ import { PermissionRiskLevel, UserPrivilegeLevel } from '../shape/schema.js';
4
3
  Messages.importMessagesDirectoryFromMetaUrl(import.meta.url);
5
4
  const messages = Messages.loadMessages('@j-schreiber/sf-cli-security-audit', 'rules.enforceClassificationPresets');
6
5
  /**
@@ -60,8 +59,21 @@ export function scanPermissions(profile, permissionListName, auditRun, rootIdent
60
59
  }
61
60
  return result;
62
61
  }
62
+ export function resolvePresetOrdinalValue(value) {
63
+ return Object.keys(UserPrivilegeLevel).indexOf(value.toUpperCase().replace(' ', '_'));
64
+ }
65
+ export function permissionAllowedInPreset(permClassification, preset) {
66
+ // this works, as long as we are mindful when adding new risk levels and presets
67
+ const invertedPermValue = Object.keys(PermissionRiskLevel).length - resolveRiskLevelOrdinalValue(permClassification);
68
+ const invertedPresetValue = Object.keys(UserPrivilegeLevel).length - resolvePresetOrdinalValue(preset);
69
+ return invertedPresetValue >= invertedPermValue;
70
+ }
71
+ function resolveRiskLevelOrdinalValue(value) {
72
+ return Object.keys(PermissionRiskLevel).indexOf(value.toUpperCase());
73
+ }
74
+ export const classificationSorter = (a, b) => resolveRiskLevelOrdinalValue(a.classification) - resolveRiskLevelOrdinalValue(b.classification);
63
75
  function resolvePerm(permName, auditRun, type) {
64
- return nameClassification(permName, auditRun.classifications[type]?.content.permissions[permName]);
76
+ return nameClassification(permName, auditRun.classifications[type]?.permissions[permName]);
65
77
  }
66
78
  function nameClassification(permName, perm) {
67
79
  return perm ? { name: permName, ...perm } : undefined;
@@ -0,0 +1 @@
1
+ {"version":3,"file":"permissionsScanning.js","sourceRoot":"","sources":["../../../../../src/libs/audit-engine/registry/helpers/permissionsScanning.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,QAAQ,EAAE,MAAM,kBAAkB,CAAC;AAI5C,OAAO,EAA6B,mBAAmB,EAAE,kBAAkB,EAAE,MAAM,oBAAoB,CAAC;AAExG,QAAQ,CAAC,kCAAkC,CAAC,MAAM,CAAC,IAAI,CAAC,GAAG,CAAC,CAAC;AAC7D,MAAM,QAAQ,GAAG,QAAQ,CAAC,YAAY,CAAC,oCAAoC,EAAE,oCAAoC,CAAC,CAAC;AAsBnH;;;;;;;;;GASG;AACH,MAAM,UAAU,eAAe,CAC7B,WAAgC,EAChC,QAAwB,EACxB,cAAyB;IAEzB,IAAI,CAAC,WAAW,CAAC,QAAQ,EAAE,CAAC;QAC1B,OAAO,EAAE,UAAU,EAAE,EAAE,EAAE,QAAQ,EAAE,EAAE,EAAE,CAAC;IAC1C,CAAC;IACD,MAAM,eAAe,GAAG,eAAe,CAAC,WAAW,EAAE,iBAAiB,EAAE,QAAQ,EAAE,cAAc,CAAC,CAAC;IAClG,MAAM,iBAAiB,GAAG,eAAe,CAAC,WAAW,EAAE,mBAAmB,EAAE,QAAQ,EAAE,cAAc,CAAC,CAAC;IACtG,eAAe,CAAC,UAAU,CAAC,IAAI,CAAC,GAAG,iBAAiB,CAAC,UAAU,CAAC,CAAC;IACjE,eAAe,CAAC,QAAQ,CAAC,IAAI,CAAC,GAAG,iBAAiB,CAAC,QAAQ,CAAC,CAAC;IAC7D,OAAO,eAAe,CAAC;AACzB,CAAC;AAED,MAAM,UAAU,eAAe,CAC7B,OAA4B,EAC5B,kBAAsC,EACtC,QAAwB,EACxB,cAAyB;IAEzB,MAAM,MAAM,GAAe,EAAE,QAAQ,EAAE,EAAE,EAAE,UAAU,EAAE,EAAE,EAAE,CAAC;IAC5D,KAAK,MAAM,IAAI,IAAI,OAAO,CAAC,QAAQ,CAAC,kBAAkB,CAAC,EAAE,CAAC;QACxD,MAAM,UAAU,GAAG,cAAc,CAAC,CAAC,CAAC,CAAC,GAAG,cAAc,EAAE,OAAO,CAAC,IAAI,EAAE,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,CAAC,CAAC,OAAO,CAAC,IAAI,EAAE,IAAI,CAAC,IAAI,CAAC,CAAC;QAC7G,MAAM,kBAAkB,GAAG,WAAW,CAAC,IAAI,CAAC,IAAI,EAAE,QAAQ,EAAE,kBAAkB,CAAC,CAAC;QAChF,IAAI,kBAAkB,EAAE,CAAC;YACvB,IAAI,kBAAkB,CAAC,cAAc,KAAK,mBAAmB,CAAC,OAAO,EAAE,CAAC;gBACtE,MAAM,CAAC,UAAU,CAAC,IAAI,CAAC;oBACrB,UAAU;oBACV,OAAO,EAAE,QAAQ,CAAC,UAAU,CAAC,kCAAkC,CAAC;iBACjE,CAAC,CAAC;YACL,CAAC;iBAAM,IAAI,CAAC,yBAAyB,CAAC,kBAAkB,CAAC,cAAc,EAAE,OAAO,CAAC,IAAI,CAAC,EAAE,CAAC;gBACvF,MAAM,CAAC,UAAU,CAAC,IAAI,CAAC;oBACrB,UAAU;oBACV,OAAO,EAAE,QAAQ,CAAC,UAAU,CAAC,2CAA2C,EAAE;wBACxE,kBAAkB,CAAC,cAAc;wBACjC,OAAO,CAAC,IAAI;qBACb,CAAC;iBACH,CAAC,CAAC;YACL,CAAC;iBAAM,IAAI,kBAAkB,CAAC,cAAc,KAAK,mBAAmB,CAAC,OAAO,EAAE,CAAC;gBAC7E,MAAM,CAAC,QAAQ,CAAC,IAAI,CAAC;oBACnB,UAAU;oBACV,OAAO,EAAE,QAAQ,CAAC,UAAU,CAAC,6BAA6B,CAAC;iBAC5D,CAAC,CAAC;YACL,CAAC;QACH,CAAC;aAAM,CAAC;YACN,MAAM,CAAC,QAAQ,CAAC,IAAI,CAAC;gBACnB,UAAU;gBACV,OAAO,EAAE,QAAQ,CAAC,UAAU,CAAC,oCAAoC,CAAC;aACnE,CAAC,CAAC;QACL,CAAC;IACH,CAAC;IACD,OAAO,MAAM,CAAC;AAChB,CAAC;AAED,MAAM,UAAU,yBAAyB,CAAC,KAAa;IACrD,OAAO,MAAM,CAAC,IAAI,CAAC,kBAAkB,CAAC,CAAC,OAAO,CAAC,KAAK,CAAC,WAAW,EAAE,CAAC,OAAO,CAAC,GAAG,EAAE,GAAG,CAAC,CAAC,CAAC;AACxF,CAAC;AAED,MAAM,UAAU,yBAAyB,CAAC,kBAA0B,EAAE,MAAc;IAClF,gFAAgF;IAChF,MAAM,iBAAiB,GAAG,MAAM,CAAC,IAAI,CAAC,mBAAmB,CAAC,CAAC,MAAM,GAAG,4BAA4B,CAAC,kBAAkB,CAAC,CAAC;IACrH,MAAM,mBAAmB,GAAG,MAAM,CAAC,IAAI,CAAC,kBAAkB,CAAC,CAAC,MAAM,GAAG,yBAAyB,CAAC,MAAM,CAAC,CAAC;IACvG,OAAO,mBAAmB,IAAI,iBAAiB,CAAC;AAClD,CAAC;AAED,SAAS,4BAA4B,CAAC,KAAa;IACjD,OAAO,MAAM,CAAC,IAAI,CAAC,mBAAmB,CAAC,CAAC,OAAO,CAAC,KAAK,CAAC,WAAW,EAAE,CAAC,CAAC;AACvE,CAAC;AAED,MAAM,CAAC,MAAM,oBAAoB,GAAG,CAAC,CAAgC,EAAE,CAAgC,EAAU,EAAE,CACjH,4BAA4B,CAAC,CAAC,CAAC,cAAc,CAAC,GAAG,4BAA4B,CAAC,CAAC,CAAC,cAAc,CAAC,CAAC;AAElG,SAAS,WAAW,CAClB,QAAgB,EAChB,QAAwB,EACxB,IAAwB;IAExB,OAAO,kBAAkB,CAAC,QAAQ,EAAE,QAAQ,CAAC,eAAe,CAAC,IAAI,CAAC,EAAE,WAAW,CAAC,QAAQ,CAAC,CAAC,CAAC;AAC7F,CAAC;AAED,SAAS,kBAAkB,CACzB,QAAgB,EAChB,IAA0C;IAE1C,OAAO,IAAI,CAAC,CAAC,CAAC,EAAE,IAAI,EAAE,QAAQ,EAAE,GAAG,IAAI,EAAE,CAAC,CAAC,CAAC,SAAS,CAAC;AACxD,CAAC"}
@@ -0,0 +1,12 @@
1
+ import RuleRegistry from '../ruleRegistry.js';
2
+ import { ConnectedApp } from '../../../../salesforce/index.js';
3
+ import { AuditRunConfig } from '../shape/auditConfigShape.js';
4
+ import { AuditContext } from '../context.types.js';
5
+ import { PolicyConfig } from '../shape/schema.js';
6
+ import Policy, { ResolveEntityResult } from './../policy.js';
7
+ export default class ConnectedAppsPolicy extends Policy<ConnectedApp> {
8
+ config: PolicyConfig;
9
+ auditConfig: AuditRunConfig;
10
+ constructor(config: PolicyConfig, auditConfig: AuditRunConfig, registry: RuleRegistry);
11
+ protected resolveEntities(context: AuditContext): Promise<ResolveEntityResult<ConnectedApp>>;
12
+ }
@@ -0,0 +1,22 @@
1
+ import { ConnectedApps } from '../../../../salesforce/index.js';
2
+ import Policy from './../policy.js';
3
+ export default class ConnectedAppsPolicy extends Policy {
4
+ config;
5
+ auditConfig;
6
+ constructor(config, auditConfig, registry) {
7
+ super(config, auditConfig, registry);
8
+ this.config = config;
9
+ this.auditConfig = auditConfig;
10
+ }
11
+ async resolveEntities(context) {
12
+ const resolvedEntities = {};
13
+ const appsRepo = new ConnectedApps(context.targetOrgConnection);
14
+ appsRepo.addListener('entityresolve', (resolveEvt) => this.emit('entityresolve', resolveEvt));
15
+ const apps = await appsRepo.resolve({ withOAuthToken: true });
16
+ for (const app of apps.values()) {
17
+ resolvedEntities[app.name] = app;
18
+ }
19
+ return { resolvedEntities, ignoredEntities: [] };
20
+ }
21
+ }
22
+ //# sourceMappingURL=connectedApps.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"connectedApps.js","sourceRoot":"","sources":["../../../../../src/libs/audit-engine/registry/policies/connectedApps.ts"],"names":[],"mappings":"AACA,OAAO,EAAgB,aAAa,EAAE,MAAM,iCAAiC,CAAC;AAI9E,OAAO,MAA+B,MAAM,gBAAgB,CAAC;AAE7D,MAAM,CAAC,OAAO,OAAO,mBAAoB,SAAQ,MAAoB;IACzC;IAA6B;IAAvD,YAA0B,MAAoB,EAAS,WAA2B,EAAE,QAAsB;QACxG,KAAK,CAAC,MAAM,EAAE,WAAW,EAAE,QAAQ,CAAC,CAAC;QADb,WAAM,GAAN,MAAM,CAAc;QAAS,gBAAW,GAAX,WAAW,CAAgB;IAElF,CAAC;IAES,KAAK,CAAC,eAAe,CAAC,OAAqB;QACnD,MAAM,gBAAgB,GAAiC,EAAE,CAAC;QAC1D,MAAM,QAAQ,GAAG,IAAI,aAAa,CAAC,OAAO,CAAC,mBAAmB,CAAC,CAAC;QAChE,QAAQ,CAAC,WAAW,CAAC,eAAe,EAAE,CAAC,UAAU,EAAE,EAAE,CAAC,IAAI,CAAC,IAAI,CAAC,eAAe,EAAE,UAAU,CAAC,CAAC,CAAC;QAC9F,MAAM,IAAI,GAAG,MAAM,QAAQ,CAAC,OAAO,CAAC,EAAE,cAAc,EAAE,IAAI,EAAE,CAAC,CAAC;QAC9D,KAAK,MAAM,GAAG,IAAI,IAAI,CAAC,MAAM,EAAE,EAAE,CAAC;YAChC,gBAAgB,CAAC,GAAG,CAAC,IAAI,CAAC,GAAG,GAAG,CAAC;QACnC,CAAC;QACD,OAAO,EAAE,gBAAgB,EAAE,eAAe,EAAE,EAAE,EAAE,CAAC;IACnD,CAAC;CACF"}
@@ -0,0 +1,18 @@
1
+ import { PermissionSet } from '../../../../salesforce/index.js';
2
+ import Policy, { ResolveEntityResult } from '../policy.js';
3
+ import RuleRegistry from '../ruleRegistry.js';
4
+ import { AuditContext } from '../context.types.js';
5
+ import { AuditRunConfig } from '../shape/auditConfigShape.js';
6
+ import { PolicyConfig, UserPrivilegeLevel } from '../shape/schema.js';
7
+ export type ClassifiedPermissionSet = PermissionSet & {
8
+ role: UserPrivilegeLevel;
9
+ };
10
+ export default class PermissionSetsPolicy extends Policy<ClassifiedPermissionSet> {
11
+ config: PolicyConfig;
12
+ auditConfig: AuditRunConfig;
13
+ private totalEntities;
14
+ private readonly classifications;
15
+ constructor(config: PolicyConfig, auditConfig: AuditRunConfig, registry: RuleRegistry);
16
+ protected resolveEntities(context: AuditContext): Promise<ResolveEntityResult<ClassifiedPermissionSet>>;
17
+ private buildIgnoredEntities;
18
+ }
@@ -0,0 +1,80 @@
1
+ import { Messages } from '@salesforce/core';
2
+ import { PermissionSets } from '../../../../salesforce/index.js';
3
+ import Policy from '../policy.js';
4
+ import { UserPrivilegeLevel } from '../shape/schema.js';
5
+ Messages.importMessagesDirectoryFromMetaUrl(import.meta.url);
6
+ const messages = Messages.loadMessages('@j-schreiber/sf-cli-security-audit', 'policies.general');
7
+ export default class PermissionSetsPolicy extends Policy {
8
+ config;
9
+ auditConfig;
10
+ totalEntities;
11
+ classifications;
12
+ constructor(config, auditConfig, registry) {
13
+ super(config, auditConfig, registry);
14
+ this.config = config;
15
+ this.auditConfig = auditConfig;
16
+ this.classifications = this.auditConfig.classifications.permissionSets?.permissionSets ?? {};
17
+ this.totalEntities = Object.keys(this.classifications).length;
18
+ }
19
+ async resolveEntities(context) {
20
+ const permsetsRepo = new PermissionSets(context.targetOrgConnection);
21
+ permsetsRepo.addListener('entityresolve', (statusEvt) => this.emit('entityresolve', statusEvt));
22
+ const allPermsets = await permsetsRepo.resolve();
23
+ const ignoredEntities = this.buildIgnoredEntities(allPermsets);
24
+ const classifiedPermsets = Object.keys(this.classifications).filter((permsetName) => ignoredEntities[permsetName] === undefined);
25
+ this.totalEntities = Object.keys(ignoredEntities).length + classifiedPermsets.length;
26
+ this.emit('entityresolve', {
27
+ total: this.totalEntities,
28
+ resolved: 0,
29
+ });
30
+ const resolvedPermsets = await permsetsRepo.resolve({ withMetadata: true, filterNames: classifiedPermsets });
31
+ const resolvedEntities = {};
32
+ for (const permsetName of classifiedPermsets) {
33
+ const metadata = resolvedPermsets.get(permsetName);
34
+ if (metadata) {
35
+ resolvedEntities[permsetName] = {
36
+ ...metadata,
37
+ role: this.classifications[permsetName].role,
38
+ };
39
+ }
40
+ else {
41
+ ignoredEntities[permsetName] = {
42
+ name: permsetName,
43
+ message: messages.getMessage('permission-set-invalid-no-metadata'),
44
+ };
45
+ }
46
+ }
47
+ this.emit('entityresolve', {
48
+ total: this.totalEntities,
49
+ resolved: this.totalEntities,
50
+ });
51
+ return { resolvedEntities, ignoredEntities: Object.values(ignoredEntities) };
52
+ }
53
+ buildIgnoredEntities(allPermsets) {
54
+ const ignoredEntities = {};
55
+ for (const [permsetName, permsetDef] of Object.entries(this.classifications)) {
56
+ if (permsetDef.role === UserPrivilegeLevel.UNKNOWN) {
57
+ ignoredEntities[permsetName] = {
58
+ name: permsetName,
59
+ message: messages.getMessage('preset-unknown', ['Permission Set']),
60
+ };
61
+ }
62
+ else if (!allPermsets.has(permsetName)) {
63
+ ignoredEntities[permsetName] = {
64
+ name: permsetName,
65
+ message: messages.getMessage('entity-not-found'),
66
+ };
67
+ }
68
+ }
69
+ for (const permset of allPermsets.values()) {
70
+ if (this.classifications[permset.name] === undefined) {
71
+ ignoredEntities[permset.name] = {
72
+ name: permset.name,
73
+ message: messages.getMessage('entity-not-classified'),
74
+ };
75
+ }
76
+ }
77
+ return ignoredEntities;
78
+ }
79
+ }
80
+ //# sourceMappingURL=permissionSets.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"permissionSets.js","sourceRoot":"","sources":["../../../../../src/libs/audit-engine/registry/policies/permissionSets.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,QAAQ,EAAE,MAAM,kBAAkB,CAAC;AAC5C,OAAO,EAAiB,cAAc,EAAE,MAAM,iCAAiC,CAAC;AAChF,OAAO,MAA+B,MAAM,cAAc,CAAC;AAK3D,OAAO,EAA8C,kBAAkB,EAAE,MAAM,oBAAoB,CAAC;AAEpG,QAAQ,CAAC,kCAAkC,CAAC,MAAM,CAAC,IAAI,CAAC,GAAG,CAAC,CAAC;AAC7D,MAAM,QAAQ,GAAG,QAAQ,CAAC,YAAY,CAAC,oCAAoC,EAAE,kBAAkB,CAAC,CAAC;AAMjG,MAAM,CAAC,OAAO,OAAO,oBAAqB,SAAQ,MAA+B;IAIrD;IAA6B;IAH/C,aAAa,CAAS;IACb,eAAe,CAA+B;IAE/D,YAA0B,MAAoB,EAAS,WAA2B,EAAE,QAAsB;QACxG,KAAK,CAAC,MAAM,EAAE,WAAW,EAAE,QAAQ,CAAC,CAAC;QADb,WAAM,GAAN,MAAM,CAAc;QAAS,gBAAW,GAAX,WAAW,CAAgB;QAEhF,IAAI,CAAC,eAAe,GAAG,IAAI,CAAC,WAAW,CAAC,eAAe,CAAC,cAAc,EAAE,cAAc,IAAI,EAAE,CAAC;QAC7F,IAAI,CAAC,aAAa,GAAG,MAAM,CAAC,IAAI,CAAC,IAAI,CAAC,eAAe,CAAC,CAAC,MAAM,CAAC;IAChE,CAAC;IAES,KAAK,CAAC,eAAe,CAAC,OAAqB;QACnD,MAAM,YAAY,GAAG,IAAI,cAAc,CAAC,OAAO,CAAC,mBAAmB,CAAC,CAAC;QACrE,YAAY,CAAC,WAAW,CAAC,eAAe,EAAE,CAAC,SAAS,EAAE,EAAE,CAAC,IAAI,CAAC,IAAI,CAAC,eAAe,EAAE,SAAS,CAAC,CAAC,CAAC;QAChG,MAAM,WAAW,GAAG,MAAM,YAAY,CAAC,OAAO,EAAE,CAAC;QACjD,MAAM,eAAe,GAAG,IAAI,CAAC,oBAAoB,CAAC,WAAW,CAAC,CAAC;QAC/D,MAAM,kBAAkB,GAAG,MAAM,CAAC,IAAI,CAAC,IAAI,CAAC,eAAe,CAAC,CAAC,MAAM,CACjE,CAAC,WAAW,EAAE,EAAE,CAAC,eAAe,CAAC,WAAW,CAAC,KAAK,SAAS,CAC5D,CAAC;QACF,IAAI,CAAC,aAAa,GAAG,MAAM,CAAC,IAAI,CAAC,eAAe,CAAC,CAAC,MAAM,GAAG,kBAAkB,CAAC,MAAM,CAAC;QACrF,IAAI,CAAC,IAAI,CAAC,eAAe,EAAE;YACzB,KAAK,EAAE,IAAI,CAAC,aAAa;YACzB,QAAQ,EAAE,CAAC;SACZ,CAAC,CAAC;QACH,MAAM,gBAAgB,GAAG,MAAM,YAAY,CAAC,OAAO,CAAC,EAAE,YAAY,EAAE,IAAI,EAAE,WAAW,EAAE,kBAAkB,EAAE,CAAC,CAAC;QAC7G,MAAM,gBAAgB,GAA4C,EAAE,CAAC;QACrE,KAAK,MAAM,WAAW,IAAI,kBAAkB,EAAE,CAAC;YAC7C,MAAM,QAAQ,GAAG,gBAAgB,CAAC,GAAG,CAAC,WAAW,CAAC,CAAC;YACnD,IAAI,QAAQ,EAAE,CAAC;gBACb,gBAAgB,CAAC,WAAW,CAAC,GAAG;oBAC9B,GAAG,QAAQ;oBACX,IAAI,EAAE,IAAI,CAAC,eAAe,CAAC,WAAW,CAAC,CAAC,IAAI;iBAC7C,CAAC;YACJ,CAAC;iBAAM,CAAC;gBACN,eAAe,CAAC,WAAW,CAAC,GAAG;oBAC7B,IAAI,EAAE,WAAW;oBACjB,OAAO,EAAE,QAAQ,CAAC,UAAU,CAAC,oCAAoC,CAAC;iBACnE,CAAC;YACJ,CAAC;QACH,CAAC;QACD,IAAI,CAAC,IAAI,CAAC,eAAe,EAAE;YACzB,KAAK,EAAE,IAAI,CAAC,aAAa;YACzB,QAAQ,EAAE,IAAI,CAAC,aAAa;SAC7B,CAAC,CAAC;QACH,OAAO,EAAE,gBAAgB,EAAE,eAAe,EAAE,MAAM,CAAC,MAAM,CAAC,eAAe,CAAC,EAAE,CAAC;IAC/E,CAAC;IAEO,oBAAoB,CAAC,WAAuC;QAClE,MAAM,eAAe,GAAuC,EAAE,CAAC;QAC/D,KAAK,MAAM,CAAC,WAAW,EAAE,UAAU,CAAC,IAAI,MAAM,CAAC,OAAO,CAAC,IAAI,CAAC,eAAe,CAAC,EAAE,CAAC;YAC7E,IAAI,UAAU,CAAC,IAAI,KAAK,kBAAkB,CAAC,OAAO,EAAE,CAAC;gBACnD,eAAe,CAAC,WAAW,CAAC,GAAG;oBAC7B,IAAI,EAAE,WAAW;oBACjB,OAAO,EAAE,QAAQ,CAAC,UAAU,CAAC,gBAAgB,EAAE,CAAC,gBAAgB,CAAC,CAAC;iBACnE,CAAC;YACJ,CAAC;iBAAM,IAAI,CAAC,WAAW,CAAC,GAAG,CAAC,WAAW,CAAC,EAAE,CAAC;gBACzC,eAAe,CAAC,WAAW,CAAC,GAAG;oBAC7B,IAAI,EAAE,WAAW;oBACjB,OAAO,EAAE,QAAQ,CAAC,UAAU,CAAC,kBAAkB,CAAC;iBACjD,CAAC;YACJ,CAAC;QACH,CAAC;QACD,KAAK,MAAM,OAAO,IAAI,WAAW,CAAC,MAAM,EAAE,EAAE,CAAC;YAC3C,IAAI,IAAI,CAAC,eAAe,CAAC,OAAO,CAAC,IAAI,CAAC,KAAK,SAAS,EAAE,CAAC;gBACrD,eAAe,CAAC,OAAO,CAAC,IAAI,CAAC,GAAG;oBAC9B,IAAI,EAAE,OAAO,CAAC,IAAI;oBAClB,OAAO,EAAE,QAAQ,CAAC,UAAU,CAAC,uBAAuB,CAAC;iBACtD,CAAC;YACJ,CAAC;QACH,CAAC;QACD,OAAO,eAAe,CAAC;IACzB,CAAC;CACF"}
@@ -0,0 +1,18 @@
1
+ import { Profile } from '../../../../salesforce/index.js';
2
+ import { AuditContext } from '../context.types.js';
3
+ import Policy, { ResolveEntityResult } from '../policy.js';
4
+ import RuleRegistry from '../ruleRegistry.js';
5
+ import { AuditRunConfig } from '../shape/auditConfigShape.js';
6
+ import { PolicyConfig } from '../shape/schema.js';
7
+ export type ResolvedProfile = Profile & {
8
+ role: string;
9
+ };
10
+ export default class ProfilesPolicy extends Policy<ResolvedProfile> {
11
+ config: PolicyConfig;
12
+ auditConfig: AuditRunConfig;
13
+ private resolveState;
14
+ private readonly classifications;
15
+ constructor(config: PolicyConfig, auditConfig: AuditRunConfig, registry: RuleRegistry);
16
+ protected resolveEntities(context: AuditContext): Promise<ResolveEntityResult<ResolvedProfile>>;
17
+ private updateResolveState;
18
+ }
@@ -0,0 +1,76 @@
1
+ import { Messages } from '@salesforce/core';
2
+ import { Profiles } from '../../../../salesforce/index.js';
3
+ import Policy, { getTotal } from '../policy.js';
4
+ import { UserPrivilegeLevel } from '../shape/schema.js';
5
+ Messages.importMessagesDirectoryFromMetaUrl(import.meta.url);
6
+ const messages = Messages.loadMessages('@j-schreiber/sf-cli-security-audit', 'policies.general');
7
+ export default class ProfilesPolicy extends Policy {
8
+ config;
9
+ auditConfig;
10
+ resolveState = { total: 0, resolved: 0 };
11
+ classifications;
12
+ constructor(config, auditConfig, registry) {
13
+ super(config, auditConfig, registry);
14
+ this.config = config;
15
+ this.auditConfig = auditConfig;
16
+ this.classifications = this.auditConfig.classifications.profiles?.profiles ?? {};
17
+ this.updateResolveState({ total: Object.keys(this.classifications).length });
18
+ }
19
+ async resolveEntities(context) {
20
+ this.updateResolveState({ resolved: 0 });
21
+ const profilesRepo = new Profiles(context.targetOrgConnection);
22
+ const allProfiles = await profilesRepo.resolve();
23
+ const ignoredEntities = {};
24
+ const classifiedProfiles = [];
25
+ for (const [profileName, profileDef] of Object.entries(this.classifications)) {
26
+ if (profileDef.role === UserPrivilegeLevel.UNKNOWN) {
27
+ ignoredEntities[profileName] = {
28
+ name: profileName,
29
+ message: messages.getMessage('preset-unknown', ['Profile']),
30
+ };
31
+ }
32
+ else if (!allProfiles.has(profileName)) {
33
+ ignoredEntities[profileName] = {
34
+ name: profileName,
35
+ message: messages.getMessage('entity-not-found'),
36
+ };
37
+ }
38
+ else {
39
+ classifiedProfiles.push(profileName);
40
+ }
41
+ }
42
+ for (const profile of allProfiles.values()) {
43
+ if (this.classifications[profile.name] === undefined) {
44
+ ignoredEntities[profile.name] = {
45
+ name: profile.name,
46
+ message: messages.getMessage('entity-not-classified'),
47
+ };
48
+ }
49
+ }
50
+ this.updateResolveState({ total: Object.keys(ignoredEntities).length + classifiedProfiles.length });
51
+ const profiles = await profilesRepo.resolve({ withMetadata: true, filterNames: classifiedProfiles });
52
+ const resolvedEntities = {};
53
+ classifiedProfiles.forEach((profileName) => {
54
+ if (profiles.has(profileName) && profiles.get(profileName)) {
55
+ resolvedEntities[profileName] = {
56
+ ...profiles.get(profileName),
57
+ role: this.classifications[profileName].role,
58
+ };
59
+ }
60
+ else {
61
+ ignoredEntities[profileName] = {
62
+ name: profileName,
63
+ message: messages.getMessage('profile-invalid-no-metadata'),
64
+ };
65
+ }
66
+ });
67
+ const result = { resolvedEntities, ignoredEntities: Object.values(ignoredEntities) };
68
+ this.updateResolveState({ resolved: getTotal(result) });
69
+ return result;
70
+ }
71
+ updateResolveState(update) {
72
+ this.resolveState = { ...this.resolveState, ...update };
73
+ this.emit('entityresolve', this.resolveState);
74
+ }
75
+ }
76
+ //# sourceMappingURL=profiles.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"profiles.js","sourceRoot":"","sources":["../../../../../src/libs/audit-engine/registry/policies/profiles.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,QAAQ,EAAE,MAAM,kBAAkB,CAAC;AAC5C,OAAO,EAAW,QAAQ,EAAE,MAAM,iCAAiC,CAAC;AAEpE,OAAO,MAAM,EAAE,EAAE,QAAQ,EAAuB,MAAM,cAAc,CAAC;AAIrE,OAAO,EAAwC,kBAAkB,EAAE,MAAM,oBAAoB,CAAC;AAE9F,QAAQ,CAAC,kCAAkC,CAAC,MAAM,CAAC,IAAI,CAAC,GAAG,CAAC,CAAC;AAC7D,MAAM,QAAQ,GAAG,QAAQ,CAAC,YAAY,CAAC,oCAAoC,EAAE,kBAAkB,CAAC,CAAC;AAWjG,MAAM,CAAC,OAAO,OAAO,cAAe,SAAQ,MAAuB;IAIvC;IAA6B;IAH/C,YAAY,GAAiB,EAAE,KAAK,EAAE,CAAC,EAAE,QAAQ,EAAE,CAAC,EAAE,CAAC;IAC9C,eAAe,CAAyB;IAEzD,YAA0B,MAAoB,EAAS,WAA2B,EAAE,QAAsB;QACxG,KAAK,CAAC,MAAM,EAAE,WAAW,EAAE,QAAQ,CAAC,CAAC;QADb,WAAM,GAAN,MAAM,CAAc;QAAS,gBAAW,GAAX,WAAW,CAAgB;QAEhF,IAAI,CAAC,eAAe,GAAG,IAAI,CAAC,WAAW,CAAC,eAAe,CAAC,QAAQ,EAAE,QAAQ,IAAI,EAAE,CAAC;QACjF,IAAI,CAAC,kBAAkB,CAAC,EAAE,KAAK,EAAE,MAAM,CAAC,IAAI,CAAC,IAAI,CAAC,eAAe,CAAC,CAAC,MAAM,EAAE,CAAC,CAAC;IAC/E,CAAC;IAES,KAAK,CAAC,eAAe,CAAC,OAAqB;QACnD,IAAI,CAAC,kBAAkB,CAAC,EAAE,QAAQ,EAAE,CAAC,EAAE,CAAC,CAAC;QACzC,MAAM,YAAY,GAAG,IAAI,QAAQ,CAAC,OAAO,CAAC,mBAAmB,CAAC,CAAC;QAC/D,MAAM,WAAW,GAAG,MAAM,YAAY,CAAC,OAAO,EAAE,CAAC;QACjD,MAAM,eAAe,GAAuC,EAAE,CAAC;QAC/D,MAAM,kBAAkB,GAAa,EAAE,CAAC;QACxC,KAAK,MAAM,CAAC,WAAW,EAAE,UAAU,CAAC,IAAI,MAAM,CAAC,OAAO,CAAC,IAAI,CAAC,eAAe,CAAC,EAAE,CAAC;YAC7E,IAAI,UAAU,CAAC,IAAI,KAAK,kBAAkB,CAAC,OAAO,EAAE,CAAC;gBACnD,eAAe,CAAC,WAAW,CAAC,GAAG;oBAC7B,IAAI,EAAE,WAAW;oBACjB,OAAO,EAAE,QAAQ,CAAC,UAAU,CAAC,gBAAgB,EAAE,CAAC,SAAS,CAAC,CAAC;iBAC5D,CAAC;YACJ,CAAC;iBAAM,IAAI,CAAC,WAAW,CAAC,GAAG,CAAC,WAAW,CAAC,EAAE,CAAC;gBACzC,eAAe,CAAC,WAAW,CAAC,GAAG;oBAC7B,IAAI,EAAE,WAAW;oBACjB,OAAO,EAAE,QAAQ,CAAC,UAAU,CAAC,kBAAkB,CAAC;iBACjD,CAAC;YACJ,CAAC;iBAAM,CAAC;gBACN,kBAAkB,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC;YACvC,CAAC;QACH,CAAC;QACD,KAAK,MAAM,OAAO,IAAI,WAAW,CAAC,MAAM,EAAE,EAAE,CAAC;YAC3C,IAAI,IAAI,CAAC,eAAe,CAAC,OAAO,CAAC,IAAI,CAAC,KAAK,SAAS,EAAE,CAAC;gBACrD,eAAe,CAAC,OAAO,CAAC,IAAI,CAAC,GAAG;oBAC9B,IAAI,EAAE,OAAO,CAAC,IAAI;oBAClB,OAAO,EAAE,QAAQ,CAAC,UAAU,CAAC,uBAAuB,CAAC;iBACtD,CAAC;YACJ,CAAC;QACH,CAAC;QACD,IAAI,CAAC,kBAAkB,CAAC,EAAE,KAAK,EAAE,MAAM,CAAC,IAAI,CAAC,eAAe,CAAC,CAAC,MAAM,GAAG,kBAAkB,CAAC,MAAM,EAAE,CAAC,CAAC;QACpG,MAAM,QAAQ,GAAG,MAAM,YAAY,CAAC,OAAO,CAAC,EAAE,YAAY,EAAE,IAAI,EAAE,WAAW,EAAE,kBAAkB,EAAE,CAAC,CAAC;QACrG,MAAM,gBAAgB,GAAoC,EAAE,CAAC;QAC7D,kBAAkB,CAAC,OAAO,CAAC,CAAC,WAAW,EAAE,EAAE;YACzC,IAAI,QAAQ,CAAC,GAAG,CAAC,WAAW,CAAC,IAAI,QAAQ,CAAC,GAAG,CAAC,WAAW,CAAC,EAAE,CAAC;gBAC3D,gBAAgB,CAAC,WAAW,CAAC,GAAG;oBAC9B,GAAG,QAAQ,CAAC,GAAG,CAAC,WAAW,CAAE;oBAC7B,IAAI,EAAE,IAAI,CAAC,eAAe,CAAC,WAAW,CAAC,CAAC,IAAI;iBAC7C,CAAC;YACJ,CAAC;iBAAM,CAAC;gBACN,eAAe,CAAC,WAAW,CAAC,GAAG;oBAC7B,IAAI,EAAE,WAAW;oBACjB,OAAO,EAAE,QAAQ,CAAC,UAAU,CAAC,6BAA6B,CAAC;iBAC5D,CAAC;YACJ,CAAC;QACH,CAAC,CAAC,CAAC;QACH,MAAM,MAAM,GAAG,EAAE,gBAAgB,EAAE,eAAe,EAAE,MAAM,CAAC,MAAM,CAAC,eAAe,CAAC,EAAE,CAAC;QACrF,IAAI,CAAC,kBAAkB,CAAC,EAAE,QAAQ,EAAE,QAAQ,CAAC,MAAM,CAAC,EAAE,CAAC,CAAC;QACxD,OAAO,MAAM,CAAC;IAChB,CAAC;IAEO,kBAAkB,CAAC,MAA6B;QACtD,IAAI,CAAC,YAAY,GAAG,EAAE,GAAG,IAAI,CAAC,YAAY,EAAE,GAAG,MAAM,EAAE,CAAC;QACxD,IAAI,CAAC,IAAI,CAAC,eAAe,EAAE,IAAI,CAAC,YAAY,CAAC,CAAC;IAChD,CAAC;CACF"}
@@ -0,0 +1,18 @@
1
+ import RuleRegistry, { RegistryRuleResolveResult } from '../ruleRegistry.js';
2
+ import { MdapiRegistry } from '../../../../salesforce/index.js';
3
+ import Policy, { ResolveEntityResult } from '../policy.js';
4
+ import { AuditContext } from '../context.types.js';
5
+ import { AuditRunConfig } from '../shape/auditConfigShape.js';
6
+ import { PolicyConfig } from '../shape/schema.js';
7
+ export type SalesforceSetting = Awaited<ReturnType<MdapiRegistry['namedTypes']['Settings']['resolve']>>['string'];
8
+ export declare class SettingsRuleRegistry extends RuleRegistry {
9
+ constructor();
10
+ resolveRules(ruleObjs: PolicyConfig['rules'], auditContext: AuditRunConfig): RegistryRuleResolveResult;
11
+ }
12
+ export default class SettingsPolicy extends Policy<SalesforceSetting> {
13
+ config: PolicyConfig;
14
+ auditConfig: AuditRunConfig;
15
+ constructor(config: PolicyConfig, auditConfig: AuditRunConfig);
16
+ protected resolveEntities(context: AuditContext): Promise<ResolveEntityResult<SalesforceSetting>>;
17
+ private removeInvalidSettingsFromResolvedRules;
18
+ }