@j-schreiber/sf-cli-security-audit 0.11.0 → 0.11.2
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +3 -3
- package/lib/commands/org/audit/init.d.ts +5 -3
- package/lib/commands/org/audit/init.js +14 -20
- package/lib/commands/org/audit/init.js.map +1 -1
- package/lib/commands/org/audit/run.d.ts +1 -1
- package/lib/commands/org/audit/run.js +5 -3
- package/lib/commands/org/audit/run.js.map +1 -1
- package/lib/commands/org/scan/user-perms.js +1 -1
- package/lib/commands/org/scan/user-perms.js.map +1 -1
- package/lib/libs/{core → audit-engine}/auditRun.d.ts +6 -7
- package/lib/libs/{core → audit-engine}/auditRun.js +20 -16
- package/lib/libs/audit-engine/auditRun.js.map +1 -0
- package/lib/libs/audit-engine/file-manager/fileManager.d.ts +31 -0
- package/lib/libs/audit-engine/file-manager/fileManager.js +139 -0
- package/lib/libs/audit-engine/file-manager/fileManager.js.map +1 -0
- package/lib/libs/audit-engine/file-manager/fileManager.types.d.ts +30 -0
- package/lib/libs/audit-engine/file-manager/fileManager.types.js +2 -0
- package/lib/libs/audit-engine/file-manager/fileManager.types.js.map +1 -0
- package/lib/libs/audit-engine/index.d.ts +121 -0
- package/lib/libs/audit-engine/index.js +9 -0
- package/lib/libs/audit-engine/index.js.map +1 -0
- package/lib/libs/{core/registries/types.d.ts → audit-engine/registry/context.types.d.ts} +6 -10
- package/lib/libs/audit-engine/registry/context.types.js +2 -0
- package/lib/libs/audit-engine/registry/context.types.js.map +1 -0
- package/lib/libs/audit-engine/registry/definitions.d.ts +23 -0
- package/lib/libs/audit-engine/registry/definitions.js +53 -0
- package/lib/libs/audit-engine/registry/definitions.js.map +1 -0
- package/lib/libs/{core/registries → audit-engine/registry}/helpers/permissionsScanning.d.ts +12 -2
- package/lib/libs/{core/registries → audit-engine/registry}/helpers/permissionsScanning.js +15 -3
- package/lib/libs/audit-engine/registry/helpers/permissionsScanning.js.map +1 -0
- package/lib/libs/audit-engine/registry/policies/connectedApps.d.ts +12 -0
- package/lib/libs/audit-engine/registry/policies/connectedApps.js +22 -0
- package/lib/libs/audit-engine/registry/policies/connectedApps.js.map +1 -0
- package/lib/libs/audit-engine/registry/policies/permissionSets.d.ts +18 -0
- package/lib/libs/audit-engine/registry/policies/permissionSets.js +80 -0
- package/lib/libs/audit-engine/registry/policies/permissionSets.js.map +1 -0
- package/lib/libs/audit-engine/registry/policies/profiles.d.ts +18 -0
- package/lib/libs/audit-engine/registry/policies/profiles.js +76 -0
- package/lib/libs/audit-engine/registry/policies/profiles.js.map +1 -0
- package/lib/libs/audit-engine/registry/policies/settings.d.ts +18 -0
- package/lib/libs/{core/policies/settingsPolicy.js → audit-engine/registry/policies/settings.js} +48 -18
- package/lib/libs/audit-engine/registry/policies/settings.js.map +1 -0
- package/lib/libs/audit-engine/registry/policies/users.d.ts +19 -0
- package/lib/libs/audit-engine/registry/policies/users.js +76 -0
- package/lib/libs/audit-engine/registry/policies/users.js.map +1 -0
- package/lib/libs/{core/policies → audit-engine/registry}/policy.d.ts +7 -6
- package/lib/libs/{core/policies → audit-engine/registry}/policy.js +2 -0
- package/lib/libs/audit-engine/registry/policy.js.map +1 -0
- package/lib/libs/{core/result-types.d.ts → audit-engine/registry/result.types.d.ts} +2 -2
- package/lib/libs/audit-engine/registry/result.types.js +2 -0
- package/lib/libs/audit-engine/registry/result.types.js.map +1 -0
- package/lib/libs/{core/registries → audit-engine/registry}/ruleRegistry.d.ts +10 -7
- package/lib/libs/{core/registries → audit-engine/registry}/ruleRegistry.js +7 -7
- package/lib/libs/audit-engine/registry/ruleRegistry.js.map +1 -0
- package/lib/libs/audit-engine/registry/rules/allUsedAppsUnderManagement.d.ts +7 -0
- package/lib/libs/audit-engine/registry/rules/allUsedAppsUnderManagement.js.map +1 -0
- package/lib/libs/{core/registries → audit-engine/registry}/rules/enforcePermissionPresets.d.ts +4 -2
- package/lib/libs/{core/registries → audit-engine/registry}/rules/enforcePermissionPresets.js +17 -15
- package/lib/libs/audit-engine/registry/rules/enforcePermissionPresets.js.map +1 -0
- package/lib/libs/{core/registries → audit-engine/registry}/rules/enforcePermissionsOnProfileLike.d.ts +1 -1
- package/lib/libs/{core/registries → audit-engine/registry}/rules/enforcePermissionsOnProfileLike.js +3 -3
- package/lib/libs/audit-engine/registry/rules/enforcePermissionsOnProfileLike.js.map +1 -0
- package/lib/libs/{core/registries → audit-engine/registry}/rules/enforcePermissionsOnUser.d.ts +2 -2
- package/lib/libs/audit-engine/registry/rules/enforcePermissionsOnUser.js +38 -0
- package/lib/libs/audit-engine/registry/rules/enforcePermissionsOnUser.js.map +1 -0
- package/lib/libs/{core/registries → audit-engine/registry}/rules/enforceSettings.d.ts +2 -2
- package/lib/libs/audit-engine/registry/rules/enforceSettings.js.map +1 -0
- package/lib/libs/audit-engine/registry/rules/noInactiveUsers.d.ts +14 -0
- package/lib/libs/{core/registries → audit-engine/registry}/rules/noInactiveUsers.js +17 -4
- package/lib/libs/audit-engine/registry/rules/noInactiveUsers.js.map +1 -0
- package/lib/libs/{core/registries → audit-engine/registry}/rules/noOtherApexApiLogins.d.ts +2 -2
- package/lib/libs/{core/registries → audit-engine/registry}/rules/noOtherApexApiLogins.js +4 -1
- package/lib/libs/audit-engine/registry/rules/noOtherApexApiLogins.js.map +1 -0
- package/lib/libs/audit-engine/registry/rules/noUserCanSelfAuthorize.d.ts +7 -0
- package/lib/libs/audit-engine/registry/rules/noUserCanSelfAuthorize.js.map +1 -0
- package/lib/libs/{core/registries → audit-engine/registry}/rules/policyRule.d.ts +4 -6
- package/lib/libs/{core/registries → audit-engine/registry}/rules/policyRule.js +2 -12
- package/lib/libs/audit-engine/registry/rules/policyRule.js.map +1 -0
- package/lib/libs/audit-engine/registry/schema.d.ts +2 -0
- package/lib/libs/audit-engine/registry/schema.js +11 -0
- package/lib/libs/audit-engine/registry/schema.js.map +1 -0
- package/lib/libs/audit-engine/registry/shape/auditConfigShape.d.ts +122 -0
- package/lib/libs/audit-engine/registry/shape/auditConfigShape.js +54 -0
- package/lib/libs/audit-engine/registry/shape/auditConfigShape.js.map +1 -0
- package/lib/libs/audit-engine/registry/shape/schema.d.ts +96 -0
- package/lib/libs/audit-engine/registry/shape/schema.js +84 -0
- package/lib/libs/audit-engine/registry/shape/schema.js.map +1 -0
- package/lib/libs/conf-init/auditConfig.d.ts +3 -12
- package/lib/libs/conf-init/auditConfig.js +25 -25
- package/lib/libs/conf-init/auditConfig.js.map +1 -1
- package/lib/libs/conf-init/defaultClassifications.d.ts +8 -0
- package/lib/libs/conf-init/defaultClassifications.js +116 -0
- package/lib/libs/conf-init/defaultClassifications.js.map +1 -0
- package/lib/libs/conf-init/defaultPolicies.d.ts +2 -0
- package/lib/libs/conf-init/defaultPolicies.js +20 -0
- package/lib/libs/conf-init/defaultPolicies.js.map +1 -0
- package/lib/libs/conf-init/init.types.d.ts +27 -0
- package/lib/libs/conf-init/init.types.js +8 -0
- package/lib/libs/conf-init/init.types.js.map +1 -0
- package/lib/libs/conf-init/presets/loose.d.ts +1 -1
- package/lib/libs/conf-init/presets/loose.js +4 -2
- package/lib/libs/conf-init/presets/loose.js.map +1 -1
- package/lib/libs/conf-init/presets/none.d.ts +2 -7
- package/lib/libs/conf-init/presets/none.js +1 -1
- package/lib/libs/conf-init/presets/none.js.map +1 -1
- package/lib/libs/conf-init/presets/strict.js +3 -1
- package/lib/libs/conf-init/presets/strict.js.map +1 -1
- package/lib/libs/conf-init/presets.d.ts +1 -6
- package/lib/libs/conf-init/presets.js +1 -6
- package/lib/libs/conf-init/presets.js.map +1 -1
- package/lib/libs/quick-scan/userPermissionScanner.js +17 -13
- package/lib/libs/quick-scan/userPermissionScanner.js.map +1 -1
- package/lib/salesforce/index.d.ts +10 -0
- package/lib/salesforce/index.js +8 -0
- package/lib/salesforce/index.js.map +1 -0
- package/lib/salesforce/mdapi/constants.d.ts +1 -0
- package/lib/salesforce/mdapi/constants.js +3 -0
- package/lib/salesforce/mdapi/constants.js.map +1 -0
- package/lib/{libs/core/mdapi/anySettingsMetadata.d.ts → salesforce/mdapi/genericSettingsMetadata.d.ts} +3 -4
- package/lib/{libs/core/mdapi/anySettingsMetadata.js → salesforce/mdapi/genericSettingsMetadata.js} +8 -10
- package/lib/salesforce/mdapi/genericSettingsMetadata.js.map +1 -0
- package/lib/salesforce/mdapi/mdapi.d.ts +46 -0
- package/lib/{libs/core/mdapi/mdapiRetriever.js → salesforce/mdapi/mdapi.js} +19 -40
- package/lib/salesforce/mdapi/mdapi.js.map +1 -0
- package/lib/salesforce/mdapi/metadataRegistry.d.ts +26 -0
- package/lib/salesforce/mdapi/metadataRegistry.js +43 -0
- package/lib/salesforce/mdapi/metadataRegistry.js.map +1 -0
- package/lib/{libs/core → salesforce}/mdapi/metadataRegistryEntry.js +1 -1
- package/lib/salesforce/mdapi/metadataRegistryEntry.js.map +1 -0
- package/lib/{libs/core → salesforce}/mdapi/namedMetadataToolingQueryable.js +1 -1
- package/lib/{libs/core → salesforce}/mdapi/namedMetadataToolingQueryable.js.map +1 -1
- package/lib/salesforce/mdapi/namedMetadataType.js.map +1 -0
- package/lib/salesforce/mdapi/singletonMetadataType.js.map +1 -0
- package/lib/salesforce/repositories/connected-apps/connected-app.types.d.ts +28 -0
- package/lib/salesforce/repositories/connected-apps/connected-app.types.js +6 -0
- package/lib/salesforce/repositories/connected-apps/connected-app.types.js.map +1 -0
- package/lib/salesforce/repositories/connected-apps/connected-apps.d.ts +16 -0
- package/lib/salesforce/repositories/connected-apps/connected-apps.js +83 -0
- package/lib/salesforce/repositories/connected-apps/connected-apps.js.map +1 -0
- package/lib/salesforce/repositories/connected-apps/queries.d.ts +2 -0
- package/lib/salesforce/repositories/connected-apps/queries.js +3 -0
- package/lib/salesforce/repositories/connected-apps/queries.js.map +1 -0
- package/lib/salesforce/repositories/perm-sets/perm-sets.types.d.ts +29 -0
- package/lib/salesforce/repositories/perm-sets/perm-sets.types.js +10 -0
- package/lib/salesforce/repositories/perm-sets/perm-sets.types.js.map +1 -0
- package/lib/salesforce/repositories/perm-sets/permission-sets.d.ts +11 -0
- package/lib/salesforce/repositories/perm-sets/permission-sets.js +43 -0
- package/lib/salesforce/repositories/perm-sets/permission-sets.js.map +1 -0
- package/lib/salesforce/repositories/perm-sets/queries.d.ts +1 -0
- package/lib/salesforce/repositories/perm-sets/queries.js +2 -0
- package/lib/salesforce/repositories/perm-sets/queries.js.map +1 -0
- package/lib/salesforce/repositories/profiles/profile.types.d.ts +29 -0
- package/lib/salesforce/repositories/profiles/profile.types.js +8 -0
- package/lib/salesforce/repositories/profiles/profile.types.js.map +1 -0
- package/lib/salesforce/repositories/profiles/profiles.d.ts +14 -0
- package/lib/salesforce/repositories/profiles/profiles.js +38 -0
- package/lib/salesforce/repositories/profiles/profiles.js.map +1 -0
- package/lib/salesforce/repositories/profiles/queries.d.ts +2 -0
- package/lib/salesforce/repositories/profiles/queries.js +7 -0
- package/lib/salesforce/repositories/profiles/queries.js.map +1 -0
- package/lib/salesforce/repositories/users/queries.d.ts +3 -0
- package/lib/{libs/core/constants.js → salesforce/repositories/users/queries.js} +1 -11
- package/lib/salesforce/repositories/users/queries.js.map +1 -0
- package/lib/salesforce/repositories/users/user.types.d.ts +54 -0
- package/lib/salesforce/repositories/users/user.types.js +12 -0
- package/lib/salesforce/repositories/users/user.types.js.map +1 -0
- package/lib/salesforce/repositories/users/users.d.ts +22 -0
- package/lib/salesforce/repositories/users/users.js +134 -0
- package/lib/salesforce/repositories/users/users.js.map +1 -0
- package/lib/{libs/core/utils.d.ts → utils.d.ts} +2 -0
- package/lib/{libs/core/utils.js → utils.js} +26 -0
- package/lib/utils.js.map +1 -0
- package/lib/ux/auditRunMultiStage.d.ts +1 -1
- package/lib/ux/auditRunMultiStage.js +5 -5
- package/lib/ux/auditRunMultiStage.js.map +1 -1
- package/messages/policies.general.md +9 -1
- package/messages/policyclassifications.md +8 -0
- package/messages/rules.enforceClassificationPresets.md +2 -2
- package/messages/rules.users.md +1 -1
- package/oclif.manifest.json +1 -1
- package/package.json +1 -1
- package/lib/libs/conf-init/permissionsClassification.d.ts +0 -37
- package/lib/libs/conf-init/permissionsClassification.js +0 -126
- package/lib/libs/conf-init/permissionsClassification.js.map +0 -1
- package/lib/libs/conf-init/policyConfigs.d.ts +0 -21
- package/lib/libs/conf-init/policyConfigs.js +0 -47
- package/lib/libs/conf-init/policyConfigs.js.map +0 -1
- package/lib/libs/core/auditRun.js.map +0 -1
- package/lib/libs/core/classification-types.d.ts +0 -20
- package/lib/libs/core/classification-types.js +0 -23
- package/lib/libs/core/classification-types.js.map +0 -1
- package/lib/libs/core/constants.d.ts +0 -10
- package/lib/libs/core/constants.js.map +0 -1
- package/lib/libs/core/file-mgmt/auditConfigFileManager.d.ts +0 -48
- package/lib/libs/core/file-mgmt/auditConfigFileManager.js +0 -145
- package/lib/libs/core/file-mgmt/auditConfigFileManager.js.map +0 -1
- package/lib/libs/core/file-mgmt/schema.d.ts +0 -156
- package/lib/libs/core/file-mgmt/schema.js +0 -81
- package/lib/libs/core/file-mgmt/schema.js.map +0 -1
- package/lib/libs/core/mdapi/anySettingsMetadata.js.map +0 -1
- package/lib/libs/core/mdapi/mdapiRetriever.d.ts +0 -54
- package/lib/libs/core/mdapi/mdapiRetriever.js.map +0 -1
- package/lib/libs/core/mdapi/metadataRegistryEntry.js.map +0 -1
- package/lib/libs/core/mdapi/namedMetadataType.js.map +0 -1
- package/lib/libs/core/mdapi/singletonMetadataType.js.map +0 -1
- package/lib/libs/core/mdapi/usersRepository.d.ts +0 -85
- package/lib/libs/core/mdapi/usersRepository.js +0 -126
- package/lib/libs/core/mdapi/usersRepository.js.map +0 -1
- package/lib/libs/core/policies/connectedAppPolicy.d.ts +0 -10
- package/lib/libs/core/policies/connectedAppPolicy.js +0 -78
- package/lib/libs/core/policies/connectedAppPolicy.js.map +0 -1
- package/lib/libs/core/policies/permissionSetPolicy.d.ts +0 -12
- package/lib/libs/core/policies/permissionSetPolicy.js +0 -64
- package/lib/libs/core/policies/permissionSetPolicy.js.map +0 -1
- package/lib/libs/core/policies/policy.js.map +0 -1
- package/lib/libs/core/policies/profilePolicy.d.ts +0 -12
- package/lib/libs/core/policies/profilePolicy.js +0 -65
- package/lib/libs/core/policies/profilePolicy.js.map +0 -1
- package/lib/libs/core/policies/salesforceStandardTypes.d.ts +0 -58
- package/lib/libs/core/policies/salesforceStandardTypes.js +0 -2
- package/lib/libs/core/policies/salesforceStandardTypes.js.map +0 -1
- package/lib/libs/core/policies/settingsPolicy.d.ts +0 -11
- package/lib/libs/core/policies/settingsPolicy.js.map +0 -1
- package/lib/libs/core/policies/userPolicy.d.ts +0 -12
- package/lib/libs/core/policies/userPolicy.js +0 -62
- package/lib/libs/core/policies/userPolicy.js.map +0 -1
- package/lib/libs/core/policy-types.d.ts +0 -18
- package/lib/libs/core/policy-types.js +0 -28
- package/lib/libs/core/policy-types.js.map +0 -1
- package/lib/libs/core/policyRegistry.d.ts +0 -23
- package/lib/libs/core/policyRegistry.js +0 -52
- package/lib/libs/core/policyRegistry.js.map +0 -1
- package/lib/libs/core/registries/connectedApps.d.ts +0 -13
- package/lib/libs/core/registries/connectedApps.js +0 -13
- package/lib/libs/core/registries/connectedApps.js.map +0 -1
- package/lib/libs/core/registries/helpers/permissionsScanning.js.map +0 -1
- package/lib/libs/core/registries/permissionSets.d.ts +0 -11
- package/lib/libs/core/registries/permissionSets.js +0 -11
- package/lib/libs/core/registries/permissionSets.js.map +0 -1
- package/lib/libs/core/registries/profiles.d.ts +0 -11
- package/lib/libs/core/registries/profiles.js +0 -11
- package/lib/libs/core/registries/profiles.js.map +0 -1
- package/lib/libs/core/registries/ruleRegistry.js.map +0 -1
- package/lib/libs/core/registries/rules/allUsedAppsUnderManagement.d.ts +0 -7
- package/lib/libs/core/registries/rules/allUsedAppsUnderManagement.js.map +0 -1
- package/lib/libs/core/registries/rules/enforcePermissionPresets.js.map +0 -1
- package/lib/libs/core/registries/rules/enforcePermissionsOnProfileLike.js.map +0 -1
- package/lib/libs/core/registries/rules/enforcePermissionsOnUser.js +0 -42
- package/lib/libs/core/registries/rules/enforcePermissionsOnUser.js.map +0 -1
- package/lib/libs/core/registries/rules/enforceSettings.js.map +0 -1
- package/lib/libs/core/registries/rules/noInactiveUsers.d.ts +0 -9
- package/lib/libs/core/registries/rules/noInactiveUsers.js.map +0 -1
- package/lib/libs/core/registries/rules/noOtherApexApiLogins.js.map +0 -1
- package/lib/libs/core/registries/rules/noUserCanSelfAuthorize.d.ts +0 -7
- package/lib/libs/core/registries/rules/noUserCanSelfAuthorize.js.map +0 -1
- package/lib/libs/core/registries/rules/policyRule.js.map +0 -1
- package/lib/libs/core/registries/settings.d.ts +0 -8
- package/lib/libs/core/registries/settings.js +0 -51
- package/lib/libs/core/registries/settings.js.map +0 -1
- package/lib/libs/core/registries/types.js +0 -13
- package/lib/libs/core/registries/types.js.map +0 -1
- package/lib/libs/core/registries/users.d.ts +0 -10
- package/lib/libs/core/registries/users.js +0 -17
- package/lib/libs/core/registries/users.js.map +0 -1
- package/lib/libs/core/result-types.js +0 -2
- package/lib/libs/core/result-types.js.map +0 -1
- package/lib/libs/core/utils.js.map +0 -1
- /package/lib/libs/{core/registries → audit-engine/registry}/rules/allUsedAppsUnderManagement.js +0 -0
- /package/lib/libs/{core/registries → audit-engine/registry}/rules/enforceSettings.js +0 -0
- /package/lib/libs/{core/registries → audit-engine/registry}/rules/noUserCanSelfAuthorize.js +0 -0
- /package/lib/{libs/core → salesforce}/mdapi/metadataRegistryEntry.d.ts +0 -0
- /package/lib/{libs/core → salesforce}/mdapi/namedMetadataToolingQueryable.d.ts +0 -0
- /package/lib/{libs/core → salesforce}/mdapi/namedMetadataType.d.ts +0 -0
- /package/lib/{libs/core → salesforce}/mdapi/namedMetadataType.js +0 -0
- /package/lib/{libs/core → salesforce}/mdapi/singletonMetadataType.d.ts +0 -0
- /package/lib/{libs/core → salesforce}/mdapi/singletonMetadataType.js +0 -0
|
@@ -0,0 +1,121 @@
|
|
|
1
|
+
import FileManager from './file-manager/fileManager.js';
|
|
2
|
+
export { default as AuditRun, startAuditRun } from './auditRun.js';
|
|
3
|
+
export { AuditConfigShape } from './registry/shape/auditConfigShape.js';
|
|
4
|
+
export { PermissionRiskLevel, UserPrivilegeLevel } from './registry/shape/schema.js';
|
|
5
|
+
export { default as RuleRegistry } from './registry/ruleRegistry.js';
|
|
6
|
+
export type { AuditRunConfig, Policies, Classifications } from './registry/shape/auditConfigShape.js';
|
|
7
|
+
export type { PolicyConfig } from './registry/shape/schema.js';
|
|
8
|
+
export type { EntityResolveEvent } from './auditRun.js';
|
|
9
|
+
export type { AuditResult } from './registry/result.types.js';
|
|
10
|
+
export declare const ConfigFileManager: FileManager<{
|
|
11
|
+
classifications: {
|
|
12
|
+
userPermissions: {
|
|
13
|
+
schema: import("zod").ZodObject<{
|
|
14
|
+
permissions: import("zod").ZodRecord<import("zod").ZodString, import("zod").ZodObject<{
|
|
15
|
+
label: import("zod").ZodOptional<import("zod").ZodString>;
|
|
16
|
+
reason: import("zod").ZodOptional<import("zod").ZodString>;
|
|
17
|
+
classification: import("zod").ZodEnum<typeof import("./registry/shape/schema.js").PermissionRiskLevel>;
|
|
18
|
+
}, import("zod/v4/core").$strip>>;
|
|
19
|
+
}, import("zod/v4/core").$strip>;
|
|
20
|
+
entities: string;
|
|
21
|
+
};
|
|
22
|
+
customPermissions: {
|
|
23
|
+
schema: import("zod").ZodObject<{
|
|
24
|
+
permissions: import("zod").ZodRecord<import("zod").ZodString, import("zod").ZodObject<{
|
|
25
|
+
label: import("zod").ZodOptional<import("zod").ZodString>;
|
|
26
|
+
reason: import("zod").ZodOptional<import("zod").ZodString>;
|
|
27
|
+
classification: import("zod").ZodEnum<typeof import("./registry/shape/schema.js").PermissionRiskLevel>;
|
|
28
|
+
}, import("zod/v4/core").$strip>>;
|
|
29
|
+
}, import("zod/v4/core").$strip>;
|
|
30
|
+
entities: string;
|
|
31
|
+
};
|
|
32
|
+
profiles: {
|
|
33
|
+
schema: import("zod").ZodObject<{
|
|
34
|
+
profiles: import("zod").ZodRecord<import("zod").ZodString, import("zod").ZodObject<{
|
|
35
|
+
role: import("zod").ZodEnum<typeof import("./registry/shape/schema.js").UserPrivilegeLevel>;
|
|
36
|
+
}, import("zod/v4/core").$strip>>;
|
|
37
|
+
}, import("zod/v4/core").$strip>;
|
|
38
|
+
entities: string;
|
|
39
|
+
};
|
|
40
|
+
permissionSets: {
|
|
41
|
+
schema: import("zod").ZodObject<{
|
|
42
|
+
permissionSets: import("zod").ZodRecord<import("zod").ZodString, import("zod").ZodObject<{
|
|
43
|
+
role: import("zod").ZodEnum<typeof import("./registry/shape/schema.js").UserPrivilegeLevel>;
|
|
44
|
+
}, import("zod/v4/core").$strip>>;
|
|
45
|
+
}, import("zod/v4/core").$strip>;
|
|
46
|
+
entities: string;
|
|
47
|
+
};
|
|
48
|
+
users: {
|
|
49
|
+
schema: import("zod").ZodObject<{
|
|
50
|
+
users: import("zod").ZodRecord<import("zod").ZodString, import("zod").ZodObject<{
|
|
51
|
+
role: import("zod").ZodEnum<typeof import("./registry/shape/schema.js").UserPrivilegeLevel>;
|
|
52
|
+
}, import("zod/v4/core").$strip>>;
|
|
53
|
+
}, import("zod/v4/core").$strip>;
|
|
54
|
+
entities: string;
|
|
55
|
+
};
|
|
56
|
+
};
|
|
57
|
+
policies: {
|
|
58
|
+
profiles: {
|
|
59
|
+
schema: import("zod").ZodObject<{
|
|
60
|
+
enabled: import("zod").ZodDefault<import("zod").ZodBoolean>;
|
|
61
|
+
rules: import("zod").ZodDefault<import("zod").ZodRecord<import("zod").ZodString, import("zod").ZodObject<{
|
|
62
|
+
enabled: import("zod").ZodDefault<import("zod").ZodBoolean>;
|
|
63
|
+
options: import("zod").ZodOptional<import("zod").ZodRecord<import("zod").ZodString, import("zod").ZodUnknown>>;
|
|
64
|
+
}, import("zod/v4/core").$strip>>>;
|
|
65
|
+
options: import("zod").ZodOptional<import("zod").ZodRecord<import("zod").ZodString, import("zod").ZodUnknown>>;
|
|
66
|
+
}, import("zod/v4/core").$strip>;
|
|
67
|
+
dependencies: {
|
|
68
|
+
path: string[];
|
|
69
|
+
errorName: string;
|
|
70
|
+
}[];
|
|
71
|
+
};
|
|
72
|
+
permissionSets: {
|
|
73
|
+
schema: import("zod").ZodObject<{
|
|
74
|
+
enabled: import("zod").ZodDefault<import("zod").ZodBoolean>;
|
|
75
|
+
rules: import("zod").ZodDefault<import("zod").ZodRecord<import("zod").ZodString, import("zod").ZodObject<{
|
|
76
|
+
enabled: import("zod").ZodDefault<import("zod").ZodBoolean>;
|
|
77
|
+
options: import("zod").ZodOptional<import("zod").ZodRecord<import("zod").ZodString, import("zod").ZodUnknown>>;
|
|
78
|
+
}, import("zod/v4/core").$strip>>>;
|
|
79
|
+
options: import("zod").ZodOptional<import("zod").ZodRecord<import("zod").ZodString, import("zod").ZodUnknown>>;
|
|
80
|
+
}, import("zod/v4/core").$strip>;
|
|
81
|
+
dependencies: {
|
|
82
|
+
path: string[];
|
|
83
|
+
errorName: string;
|
|
84
|
+
}[];
|
|
85
|
+
};
|
|
86
|
+
connectedApps: {
|
|
87
|
+
schema: import("zod").ZodObject<{
|
|
88
|
+
enabled: import("zod").ZodDefault<import("zod").ZodBoolean>;
|
|
89
|
+
rules: import("zod").ZodDefault<import("zod").ZodRecord<import("zod").ZodString, import("zod").ZodObject<{
|
|
90
|
+
enabled: import("zod").ZodDefault<import("zod").ZodBoolean>;
|
|
91
|
+
options: import("zod").ZodOptional<import("zod").ZodRecord<import("zod").ZodString, import("zod").ZodUnknown>>;
|
|
92
|
+
}, import("zod/v4/core").$strip>>>;
|
|
93
|
+
options: import("zod").ZodOptional<import("zod").ZodRecord<import("zod").ZodString, import("zod").ZodUnknown>>;
|
|
94
|
+
}, import("zod/v4/core").$strip>;
|
|
95
|
+
};
|
|
96
|
+
users: {
|
|
97
|
+
schema: import("zod").ZodObject<{
|
|
98
|
+
enabled: import("zod").ZodDefault<import("zod").ZodBoolean>;
|
|
99
|
+
rules: import("zod").ZodDefault<import("zod").ZodRecord<import("zod").ZodString, import("zod").ZodObject<{
|
|
100
|
+
enabled: import("zod").ZodDefault<import("zod").ZodBoolean>;
|
|
101
|
+
options: import("zod").ZodOptional<import("zod").ZodRecord<import("zod").ZodString, import("zod").ZodUnknown>>;
|
|
102
|
+
}, import("zod/v4/core").$strip>>>;
|
|
103
|
+
options: import("zod").ZodObject<{
|
|
104
|
+
defaultRoleForMissingUsers: import("zod").ZodDefault<import("zod").ZodEnum<typeof import("./registry/shape/schema.js").UserPrivilegeLevel>>;
|
|
105
|
+
analyseLastNDaysOfLoginHistory: import("zod").ZodOptional<import("zod").ZodNumber>;
|
|
106
|
+
}, import("zod/v4/core").$strict>;
|
|
107
|
+
}, import("zod/v4/core").$strip>;
|
|
108
|
+
};
|
|
109
|
+
settings: {
|
|
110
|
+
schema: import("zod").ZodObject<{
|
|
111
|
+
enabled: import("zod").ZodDefault<import("zod").ZodBoolean>;
|
|
112
|
+
rules: import("zod").ZodDefault<import("zod").ZodRecord<import("zod").ZodString, import("zod").ZodObject<{
|
|
113
|
+
enabled: import("zod").ZodDefault<import("zod").ZodBoolean>;
|
|
114
|
+
options: import("zod").ZodOptional<import("zod").ZodRecord<import("zod").ZodString, import("zod").ZodUnknown>>;
|
|
115
|
+
}, import("zod/v4/core").$strip>>>;
|
|
116
|
+
options: import("zod").ZodOptional<import("zod").ZodRecord<import("zod").ZodString, import("zod").ZodUnknown>>;
|
|
117
|
+
}, import("zod/v4/core").$strip>;
|
|
118
|
+
};
|
|
119
|
+
};
|
|
120
|
+
}>;
|
|
121
|
+
export { PolicyDefinitions, loadPolicy } from './registry/definitions.js';
|
|
@@ -0,0 +1,9 @@
|
|
|
1
|
+
import FileManager from './file-manager/fileManager.js';
|
|
2
|
+
import { AuditConfigShape } from './registry/shape/auditConfigShape.js';
|
|
3
|
+
export { default as AuditRun, startAuditRun } from './auditRun.js';
|
|
4
|
+
export { AuditConfigShape } from './registry/shape/auditConfigShape.js';
|
|
5
|
+
export { PermissionRiskLevel, UserPrivilegeLevel } from './registry/shape/schema.js';
|
|
6
|
+
export { default as RuleRegistry } from './registry/ruleRegistry.js';
|
|
7
|
+
export const ConfigFileManager = new FileManager(AuditConfigShape);
|
|
8
|
+
export { PolicyDefinitions, loadPolicy } from './registry/definitions.js';
|
|
9
|
+
//# sourceMappingURL=index.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"index.js","sourceRoot":"","sources":["../../../src/libs/audit-engine/index.ts"],"names":[],"mappings":"AAAA,OAAO,WAAW,MAAM,+BAA+B,CAAC;AACxD,OAAO,EAAE,gBAAgB,EAAE,MAAM,sCAAsC,CAAC;AAExE,OAAO,EAAE,OAAO,IAAI,QAAQ,EAAE,aAAa,EAAE,MAAM,eAAe,CAAC;AACnE,OAAO,EAAE,gBAAgB,EAAE,MAAM,sCAAsC,CAAC;AACxE,OAAO,EAAE,mBAAmB,EAAE,kBAAkB,EAAE,MAAM,4BAA4B,CAAC;AACrF,OAAO,EAAE,OAAO,IAAI,YAAY,EAAE,MAAM,4BAA4B,CAAC;AAOrE,MAAM,CAAC,MAAM,iBAAiB,GAAG,IAAI,WAAW,CAAC,gBAAgB,CAAC,CAAC;AACnE,OAAO,EAAE,iBAAiB,EAAE,UAAU,EAAE,MAAM,2BAA2B,CAAC"}
|
|
@@ -1,14 +1,6 @@
|
|
|
1
1
|
import { Connection } from '@salesforce/core';
|
|
2
|
-
import {
|
|
3
|
-
import {
|
|
4
|
-
export declare const RuleRegistries: {
|
|
5
|
-
connectedApps: import("./connectedApps.js").default;
|
|
6
|
-
profiles: import("./profiles.js").default;
|
|
7
|
-
permissionSets: import("./permissionSets.js").default;
|
|
8
|
-
users: import("./users.js").default;
|
|
9
|
-
settings: import("./settings.js").default;
|
|
10
|
-
};
|
|
11
|
-
export type Constructor<T, Args extends any[] = any[]> = new (...args: Args) => T;
|
|
2
|
+
import { Optional } from '../../../utils.js';
|
|
3
|
+
import { AuditPolicyResult, PolicyRuleExecutionResult } from './result.types.js';
|
|
12
4
|
/**
|
|
13
5
|
* A rule must only implement a subset of the rule result. All optional
|
|
14
6
|
* properties are completed by the policy.
|
|
@@ -29,6 +21,10 @@ export type AuditContext = {
|
|
|
29
21
|
*/
|
|
30
22
|
targetOrgConnection: Connection;
|
|
31
23
|
};
|
|
24
|
+
/**
|
|
25
|
+
* Run-time context of execution, that is directly resolved
|
|
26
|
+
* from the target org.
|
|
27
|
+
*/
|
|
32
28
|
export type RuleAuditContext<T> = AuditContext & {
|
|
33
29
|
/**
|
|
34
30
|
* Resolved entities from the policy. Can be permission sets,
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"context.types.js","sourceRoot":"","sources":["../../../../src/libs/audit-engine/registry/context.types.ts"],"names":[],"mappings":""}
|
|
@@ -0,0 +1,23 @@
|
|
|
1
|
+
import ConnectedAppsPolicy from './policies/connectedApps.js';
|
|
2
|
+
import PermissionSetsPolicy from './policies/permissionSets.js';
|
|
3
|
+
import ProfilesPolicy from './policies/profiles.js';
|
|
4
|
+
import SettingsPolicy from './policies/settings.js';
|
|
5
|
+
import UsersPolicy from './policies/users.js';
|
|
6
|
+
import { RuleHandlerMap, Constructor } from './ruleRegistry.js';
|
|
7
|
+
import { AuditRunConfig, Policies } from './shape/auditConfigShape.js';
|
|
8
|
+
import { PolicyConfig, UserPolicyConfig } from './shape/schema.js';
|
|
9
|
+
type PolicyDefinition<T, C extends PolicyConfig = PolicyConfig> = {
|
|
10
|
+
handler: Constructor<T>;
|
|
11
|
+
rules?: RuleHandlerMap;
|
|
12
|
+
configType?: C;
|
|
13
|
+
};
|
|
14
|
+
type PolicyDefinitions = {
|
|
15
|
+
permissionSets: PolicyDefinition<PermissionSetsPolicy>;
|
|
16
|
+
profiles: PolicyDefinition<ProfilesPolicy>;
|
|
17
|
+
users: PolicyDefinition<UsersPolicy, UserPolicyConfig>;
|
|
18
|
+
connectedApps: PolicyDefinition<ConnectedAppsPolicy>;
|
|
19
|
+
settings: PolicyDefinition<SettingsPolicy>;
|
|
20
|
+
};
|
|
21
|
+
export declare const PolicyDefinitions: PolicyDefinitions;
|
|
22
|
+
export declare function loadPolicy<P extends Policies>(policyName: P, config: AuditRunConfig): InstanceType<PolicyDefinitions[P]['handler']>;
|
|
23
|
+
export {};
|
|
@@ -0,0 +1,53 @@
|
|
|
1
|
+
import ConnectedAppsPolicy from './policies/connectedApps.js';
|
|
2
|
+
import PermissionSetsPolicy from './policies/permissionSets.js';
|
|
3
|
+
import ProfilesPolicy from './policies/profiles.js';
|
|
4
|
+
import SettingsPolicy from './policies/settings.js';
|
|
5
|
+
import UsersPolicy from './policies/users.js';
|
|
6
|
+
import RuleRegistry from './ruleRegistry.js';
|
|
7
|
+
import AllUsedAppsUnderManagement from './rules/allUsedAppsUnderManagement.js';
|
|
8
|
+
import EnforcePermissionPresets from './rules/enforcePermissionPresets.js';
|
|
9
|
+
import EnforcePermissionsOnProfileLike from './rules/enforcePermissionsOnProfileLike.js';
|
|
10
|
+
import EnforcePermissionsOnUser from './rules/enforcePermissionsOnUser.js';
|
|
11
|
+
import NoInactiveUsers from './rules/noInactiveUsers.js';
|
|
12
|
+
import NoOtherApexApiLogins from './rules/noOtherApexApiLogins.js';
|
|
13
|
+
import NoUserCanSelfAuthorize from './rules/noUserCanSelfAuthorize.js';
|
|
14
|
+
export const PolicyDefinitions = {
|
|
15
|
+
permissionSets: {
|
|
16
|
+
handler: PermissionSetsPolicy,
|
|
17
|
+
rules: {
|
|
18
|
+
EnforcePermissionClassifications: EnforcePermissionsOnProfileLike,
|
|
19
|
+
},
|
|
20
|
+
},
|
|
21
|
+
profiles: {
|
|
22
|
+
handler: ProfilesPolicy,
|
|
23
|
+
rules: {
|
|
24
|
+
EnforcePermissionClassifications: EnforcePermissionsOnProfileLike,
|
|
25
|
+
},
|
|
26
|
+
},
|
|
27
|
+
users: {
|
|
28
|
+
handler: UsersPolicy,
|
|
29
|
+
rules: {
|
|
30
|
+
NoOtherApexApiLogins,
|
|
31
|
+
NoInactiveUsers,
|
|
32
|
+
EnforcePermissionClassifications: EnforcePermissionsOnUser,
|
|
33
|
+
EnforcePermissionPresets,
|
|
34
|
+
},
|
|
35
|
+
},
|
|
36
|
+
connectedApps: {
|
|
37
|
+
handler: ConnectedAppsPolicy,
|
|
38
|
+
rules: {
|
|
39
|
+
AllUsedAppsUnderManagement,
|
|
40
|
+
NoUserCanSelfAuthorize,
|
|
41
|
+
},
|
|
42
|
+
},
|
|
43
|
+
settings: {
|
|
44
|
+
handler: SettingsPolicy,
|
|
45
|
+
},
|
|
46
|
+
};
|
|
47
|
+
export function loadPolicy(policyName, config) {
|
|
48
|
+
const def = PolicyDefinitions[policyName];
|
|
49
|
+
const policyConfig = config.policies[policyName];
|
|
50
|
+
const policy = new def.handler(policyConfig, config, new RuleRegistry(def.rules));
|
|
51
|
+
return policy;
|
|
52
|
+
}
|
|
53
|
+
//# sourceMappingURL=definitions.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"definitions.js","sourceRoot":"","sources":["../../../../src/libs/audit-engine/registry/definitions.ts"],"names":[],"mappings":"AAAA,OAAO,mBAAmB,MAAM,6BAA6B,CAAC;AAC9D,OAAO,oBAAoB,MAAM,8BAA8B,CAAC;AAChE,OAAO,cAAc,MAAM,wBAAwB,CAAC;AACpD,OAAO,cAAc,MAAM,wBAAwB,CAAC;AACpD,OAAO,WAAW,MAAM,qBAAqB,CAAC;AAC9C,OAAO,YAA6C,MAAM,mBAAmB,CAAC;AAC9E,OAAO,0BAA0B,MAAM,uCAAuC,CAAC;AAC/E,OAAO,wBAAwB,MAAM,qCAAqC,CAAC;AAC3E,OAAO,+BAA+B,MAAM,4CAA4C,CAAC;AACzF,OAAO,wBAAwB,MAAM,qCAAqC,CAAC;AAC3E,OAAO,eAAe,MAAM,4BAA4B,CAAC;AACzD,OAAO,oBAAoB,MAAM,iCAAiC,CAAC;AACnE,OAAO,sBAAsB,MAAM,mCAAmC,CAAC;AAkBvE,MAAM,CAAC,MAAM,iBAAiB,GAAsB;IAClD,cAAc,EAAE;QACd,OAAO,EAAE,oBAAoB;QAC7B,KAAK,EAAE;YACL,gCAAgC,EAAE,+BAA+B;SAClE;KACF;IACD,QAAQ,EAAE;QACR,OAAO,EAAE,cAAc;QACvB,KAAK,EAAE;YACL,gCAAgC,EAAE,+BAA+B;SAClE;KACF;IACD,KAAK,EAAE;QACL,OAAO,EAAE,WAAW;QACpB,KAAK,EAAE;YACL,oBAAoB;YACpB,eAAe;YACf,gCAAgC,EAAE,wBAAwB;YAC1D,wBAAwB;SACzB;KACF;IACD,aAAa,EAAE;QACb,OAAO,EAAE,mBAAmB;QAC5B,KAAK,EAAE;YACL,0BAA0B;YAC1B,sBAAsB;SACvB;KACF;IACD,QAAQ,EAAE;QACR,OAAO,EAAE,cAAc;KACxB;CACF,CAAC;AAEF,MAAM,UAAU,UAAU,CACxB,UAAa,EACb,MAAsB;IAEtB,MAAM,GAAG,GAAG,iBAAiB,CAAC,UAAU,CAAC,CAAC;IAC1C,MAAM,YAAY,GAAG,MAAM,CAAC,QAAQ,CAAC,UAAU,CAAC,CAAC;IACjD,MAAM,MAAM,GAAG,IAAI,GAAG,CAAC,OAAO,CAAC,YAAY,EAAE,MAAM,EAAE,IAAI,YAAY,CAAC,GAAG,CAAC,KAAK,CAAC,CAE/E,CAAC;IACF,OAAO,MAAM,CAAC;AAChB,CAAC"}
|
|
@@ -1,6 +1,7 @@
|
|
|
1
1
|
import { Profile } from '@jsforce/jsforce-node/lib/api/metadata.js';
|
|
2
|
-
import {
|
|
3
|
-
import {
|
|
2
|
+
import { PolicyRuleViolation, RuleComponentMessage } from '../result.types.js';
|
|
3
|
+
import { AuditRunConfig } from '../shape/auditConfigShape.js';
|
|
4
|
+
import { PermissionClassifications } from '../shape/schema.js';
|
|
4
5
|
export type ResolvedProfileLike = {
|
|
5
6
|
name: string;
|
|
6
7
|
role: string;
|
|
@@ -12,6 +13,12 @@ export type ScanResult = {
|
|
|
12
13
|
};
|
|
13
14
|
export type PartialProfileLike = Pick<Profile, 'userPermissions' | 'customPermissions'>;
|
|
14
15
|
type PermissionsListKey = keyof PartialProfileLike;
|
|
16
|
+
/**
|
|
17
|
+
* Moves the "name" from the classifications map to object prop
|
|
18
|
+
*/
|
|
19
|
+
type NamedPermissionClassification = PermissionClassifications['string'] & {
|
|
20
|
+
name: string;
|
|
21
|
+
};
|
|
15
22
|
/**
|
|
16
23
|
* Scan userPermissions and customPermissions of a profile or permission set and
|
|
17
24
|
* get a unified scan result with violations (risk level not allowed) and warnings
|
|
@@ -24,4 +31,7 @@ type PermissionsListKey = keyof PartialProfileLike;
|
|
|
24
31
|
*/
|
|
25
32
|
export declare function scanProfileLike(profileLike: ResolvedProfileLike, auditRun: AuditRunConfig, rootIdentifier?: string[]): ScanResult;
|
|
26
33
|
export declare function scanPermissions(profile: ResolvedProfileLike, permissionListName: PermissionsListKey, auditRun: AuditRunConfig, rootIdentifier?: string[]): ScanResult;
|
|
34
|
+
export declare function resolvePresetOrdinalValue(value: string): number;
|
|
35
|
+
export declare function permissionAllowedInPreset(permClassification: string, preset: string): boolean;
|
|
36
|
+
export declare const classificationSorter: (a: NamedPermissionClassification, b: NamedPermissionClassification) => number;
|
|
27
37
|
export {};
|
|
@@ -1,6 +1,5 @@
|
|
|
1
1
|
import { Messages } from '@salesforce/core';
|
|
2
|
-
import { PermissionRiskLevel } from '
|
|
3
|
-
import { permissionAllowedInPreset } from '../../policy-types.js';
|
|
2
|
+
import { PermissionRiskLevel, UserPrivilegeLevel } from '../shape/schema.js';
|
|
4
3
|
Messages.importMessagesDirectoryFromMetaUrl(import.meta.url);
|
|
5
4
|
const messages = Messages.loadMessages('@j-schreiber/sf-cli-security-audit', 'rules.enforceClassificationPresets');
|
|
6
5
|
/**
|
|
@@ -60,8 +59,21 @@ export function scanPermissions(profile, permissionListName, auditRun, rootIdent
|
|
|
60
59
|
}
|
|
61
60
|
return result;
|
|
62
61
|
}
|
|
62
|
+
export function resolvePresetOrdinalValue(value) {
|
|
63
|
+
return Object.keys(UserPrivilegeLevel).indexOf(value.toUpperCase().replace(' ', '_'));
|
|
64
|
+
}
|
|
65
|
+
export function permissionAllowedInPreset(permClassification, preset) {
|
|
66
|
+
// this works, as long as we are mindful when adding new risk levels and presets
|
|
67
|
+
const invertedPermValue = Object.keys(PermissionRiskLevel).length - resolveRiskLevelOrdinalValue(permClassification);
|
|
68
|
+
const invertedPresetValue = Object.keys(UserPrivilegeLevel).length - resolvePresetOrdinalValue(preset);
|
|
69
|
+
return invertedPresetValue >= invertedPermValue;
|
|
70
|
+
}
|
|
71
|
+
function resolveRiskLevelOrdinalValue(value) {
|
|
72
|
+
return Object.keys(PermissionRiskLevel).indexOf(value.toUpperCase());
|
|
73
|
+
}
|
|
74
|
+
export const classificationSorter = (a, b) => resolveRiskLevelOrdinalValue(a.classification) - resolveRiskLevelOrdinalValue(b.classification);
|
|
63
75
|
function resolvePerm(permName, auditRun, type) {
|
|
64
|
-
return nameClassification(permName, auditRun.classifications[type]?.
|
|
76
|
+
return nameClassification(permName, auditRun.classifications[type]?.permissions[permName]);
|
|
65
77
|
}
|
|
66
78
|
function nameClassification(permName, perm) {
|
|
67
79
|
return perm ? { name: permName, ...perm } : undefined;
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"permissionsScanning.js","sourceRoot":"","sources":["../../../../../src/libs/audit-engine/registry/helpers/permissionsScanning.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,QAAQ,EAAE,MAAM,kBAAkB,CAAC;AAI5C,OAAO,EAA6B,mBAAmB,EAAE,kBAAkB,EAAE,MAAM,oBAAoB,CAAC;AAExG,QAAQ,CAAC,kCAAkC,CAAC,MAAM,CAAC,IAAI,CAAC,GAAG,CAAC,CAAC;AAC7D,MAAM,QAAQ,GAAG,QAAQ,CAAC,YAAY,CAAC,oCAAoC,EAAE,oCAAoC,CAAC,CAAC;AAsBnH;;;;;;;;;GASG;AACH,MAAM,UAAU,eAAe,CAC7B,WAAgC,EAChC,QAAwB,EACxB,cAAyB;IAEzB,IAAI,CAAC,WAAW,CAAC,QAAQ,EAAE,CAAC;QAC1B,OAAO,EAAE,UAAU,EAAE,EAAE,EAAE,QAAQ,EAAE,EAAE,EAAE,CAAC;IAC1C,CAAC;IACD,MAAM,eAAe,GAAG,eAAe,CAAC,WAAW,EAAE,iBAAiB,EAAE,QAAQ,EAAE,cAAc,CAAC,CAAC;IAClG,MAAM,iBAAiB,GAAG,eAAe,CAAC,WAAW,EAAE,mBAAmB,EAAE,QAAQ,EAAE,cAAc,CAAC,CAAC;IACtG,eAAe,CAAC,UAAU,CAAC,IAAI,CAAC,GAAG,iBAAiB,CAAC,UAAU,CAAC,CAAC;IACjE,eAAe,CAAC,QAAQ,CAAC,IAAI,CAAC,GAAG,iBAAiB,CAAC,QAAQ,CAAC,CAAC;IAC7D,OAAO,eAAe,CAAC;AACzB,CAAC;AAED,MAAM,UAAU,eAAe,CAC7B,OAA4B,EAC5B,kBAAsC,EACtC,QAAwB,EACxB,cAAyB;IAEzB,MAAM,MAAM,GAAe,EAAE,QAAQ,EAAE,EAAE,EAAE,UAAU,EAAE,EAAE,EAAE,CAAC;IAC5D,KAAK,MAAM,IAAI,IAAI,OAAO,CAAC,QAAQ,CAAC,kBAAkB,CAAC,EAAE,CAAC;QACxD,MAAM,UAAU,GAAG,cAAc,CAAC,CAAC,CAAC,CAAC,GAAG,cAAc,EAAE,OAAO,CAAC,IAAI,EAAE,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,CAAC,CAAC,OAAO,CAAC,IAAI,EAAE,IAAI,CAAC,IAAI,CAAC,CAAC;QAC7G,MAAM,kBAAkB,GAAG,WAAW,CAAC,IAAI,CAAC,IAAI,EAAE,QAAQ,EAAE,kBAAkB,CAAC,CAAC;QAChF,IAAI,kBAAkB,EAAE,CAAC;YACvB,IAAI,kBAAkB,CAAC,cAAc,KAAK,mBAAmB,CAAC,OAAO,EAAE,CAAC;gBACtE,MAAM,CAAC,UAAU,CAAC,IAAI,CAAC;oBACrB,UAAU;oBACV,OAAO,EAAE,QAAQ,CAAC,UAAU,CAAC,kCAAkC,CAAC;iBACjE,CAAC,CAAC;YACL,CAAC;iBAAM,IAAI,CAAC,yBAAyB,CAAC,kBAAkB,CAAC,cAAc,EAAE,OAAO,CAAC,IAAI,CAAC,EAAE,CAAC;gBACvF,MAAM,CAAC,UAAU,CAAC,IAAI,CAAC;oBACrB,UAAU;oBACV,OAAO,EAAE,QAAQ,CAAC,UAAU,CAAC,2CAA2C,EAAE;wBACxE,kBAAkB,CAAC,cAAc;wBACjC,OAAO,CAAC,IAAI;qBACb,CAAC;iBACH,CAAC,CAAC;YACL,CAAC;iBAAM,IAAI,kBAAkB,CAAC,cAAc,KAAK,mBAAmB,CAAC,OAAO,EAAE,CAAC;gBAC7E,MAAM,CAAC,QAAQ,CAAC,IAAI,CAAC;oBACnB,UAAU;oBACV,OAAO,EAAE,QAAQ,CAAC,UAAU,CAAC,6BAA6B,CAAC;iBAC5D,CAAC,CAAC;YACL,CAAC;QACH,CAAC;aAAM,CAAC;YACN,MAAM,CAAC,QAAQ,CAAC,IAAI,CAAC;gBACnB,UAAU;gBACV,OAAO,EAAE,QAAQ,CAAC,UAAU,CAAC,oCAAoC,CAAC;aACnE,CAAC,CAAC;QACL,CAAC;IACH,CAAC;IACD,OAAO,MAAM,CAAC;AAChB,CAAC;AAED,MAAM,UAAU,yBAAyB,CAAC,KAAa;IACrD,OAAO,MAAM,CAAC,IAAI,CAAC,kBAAkB,CAAC,CAAC,OAAO,CAAC,KAAK,CAAC,WAAW,EAAE,CAAC,OAAO,CAAC,GAAG,EAAE,GAAG,CAAC,CAAC,CAAC;AACxF,CAAC;AAED,MAAM,UAAU,yBAAyB,CAAC,kBAA0B,EAAE,MAAc;IAClF,gFAAgF;IAChF,MAAM,iBAAiB,GAAG,MAAM,CAAC,IAAI,CAAC,mBAAmB,CAAC,CAAC,MAAM,GAAG,4BAA4B,CAAC,kBAAkB,CAAC,CAAC;IACrH,MAAM,mBAAmB,GAAG,MAAM,CAAC,IAAI,CAAC,kBAAkB,CAAC,CAAC,MAAM,GAAG,yBAAyB,CAAC,MAAM,CAAC,CAAC;IACvG,OAAO,mBAAmB,IAAI,iBAAiB,CAAC;AAClD,CAAC;AAED,SAAS,4BAA4B,CAAC,KAAa;IACjD,OAAO,MAAM,CAAC,IAAI,CAAC,mBAAmB,CAAC,CAAC,OAAO,CAAC,KAAK,CAAC,WAAW,EAAE,CAAC,CAAC;AACvE,CAAC;AAED,MAAM,CAAC,MAAM,oBAAoB,GAAG,CAAC,CAAgC,EAAE,CAAgC,EAAU,EAAE,CACjH,4BAA4B,CAAC,CAAC,CAAC,cAAc,CAAC,GAAG,4BAA4B,CAAC,CAAC,CAAC,cAAc,CAAC,CAAC;AAElG,SAAS,WAAW,CAClB,QAAgB,EAChB,QAAwB,EACxB,IAAwB;IAExB,OAAO,kBAAkB,CAAC,QAAQ,EAAE,QAAQ,CAAC,eAAe,CAAC,IAAI,CAAC,EAAE,WAAW,CAAC,QAAQ,CAAC,CAAC,CAAC;AAC7F,CAAC;AAED,SAAS,kBAAkB,CACzB,QAAgB,EAChB,IAA0C;IAE1C,OAAO,IAAI,CAAC,CAAC,CAAC,EAAE,IAAI,EAAE,QAAQ,EAAE,GAAG,IAAI,EAAE,CAAC,CAAC,CAAC,SAAS,CAAC;AACxD,CAAC"}
|
|
@@ -0,0 +1,12 @@
|
|
|
1
|
+
import RuleRegistry from '../ruleRegistry.js';
|
|
2
|
+
import { ConnectedApp } from '../../../../salesforce/index.js';
|
|
3
|
+
import { AuditRunConfig } from '../shape/auditConfigShape.js';
|
|
4
|
+
import { AuditContext } from '../context.types.js';
|
|
5
|
+
import { PolicyConfig } from '../shape/schema.js';
|
|
6
|
+
import Policy, { ResolveEntityResult } from './../policy.js';
|
|
7
|
+
export default class ConnectedAppsPolicy extends Policy<ConnectedApp> {
|
|
8
|
+
config: PolicyConfig;
|
|
9
|
+
auditConfig: AuditRunConfig;
|
|
10
|
+
constructor(config: PolicyConfig, auditConfig: AuditRunConfig, registry: RuleRegistry);
|
|
11
|
+
protected resolveEntities(context: AuditContext): Promise<ResolveEntityResult<ConnectedApp>>;
|
|
12
|
+
}
|
|
@@ -0,0 +1,22 @@
|
|
|
1
|
+
import { ConnectedApps } from '../../../../salesforce/index.js';
|
|
2
|
+
import Policy from './../policy.js';
|
|
3
|
+
export default class ConnectedAppsPolicy extends Policy {
|
|
4
|
+
config;
|
|
5
|
+
auditConfig;
|
|
6
|
+
constructor(config, auditConfig, registry) {
|
|
7
|
+
super(config, auditConfig, registry);
|
|
8
|
+
this.config = config;
|
|
9
|
+
this.auditConfig = auditConfig;
|
|
10
|
+
}
|
|
11
|
+
async resolveEntities(context) {
|
|
12
|
+
const resolvedEntities = {};
|
|
13
|
+
const appsRepo = new ConnectedApps(context.targetOrgConnection);
|
|
14
|
+
appsRepo.addListener('entityresolve', (resolveEvt) => this.emit('entityresolve', resolveEvt));
|
|
15
|
+
const apps = await appsRepo.resolve({ withOAuthToken: true });
|
|
16
|
+
for (const app of apps.values()) {
|
|
17
|
+
resolvedEntities[app.name] = app;
|
|
18
|
+
}
|
|
19
|
+
return { resolvedEntities, ignoredEntities: [] };
|
|
20
|
+
}
|
|
21
|
+
}
|
|
22
|
+
//# sourceMappingURL=connectedApps.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"connectedApps.js","sourceRoot":"","sources":["../../../../../src/libs/audit-engine/registry/policies/connectedApps.ts"],"names":[],"mappings":"AACA,OAAO,EAAgB,aAAa,EAAE,MAAM,iCAAiC,CAAC;AAI9E,OAAO,MAA+B,MAAM,gBAAgB,CAAC;AAE7D,MAAM,CAAC,OAAO,OAAO,mBAAoB,SAAQ,MAAoB;IACzC;IAA6B;IAAvD,YAA0B,MAAoB,EAAS,WAA2B,EAAE,QAAsB;QACxG,KAAK,CAAC,MAAM,EAAE,WAAW,EAAE,QAAQ,CAAC,CAAC;QADb,WAAM,GAAN,MAAM,CAAc;QAAS,gBAAW,GAAX,WAAW,CAAgB;IAElF,CAAC;IAES,KAAK,CAAC,eAAe,CAAC,OAAqB;QACnD,MAAM,gBAAgB,GAAiC,EAAE,CAAC;QAC1D,MAAM,QAAQ,GAAG,IAAI,aAAa,CAAC,OAAO,CAAC,mBAAmB,CAAC,CAAC;QAChE,QAAQ,CAAC,WAAW,CAAC,eAAe,EAAE,CAAC,UAAU,EAAE,EAAE,CAAC,IAAI,CAAC,IAAI,CAAC,eAAe,EAAE,UAAU,CAAC,CAAC,CAAC;QAC9F,MAAM,IAAI,GAAG,MAAM,QAAQ,CAAC,OAAO,CAAC,EAAE,cAAc,EAAE,IAAI,EAAE,CAAC,CAAC;QAC9D,KAAK,MAAM,GAAG,IAAI,IAAI,CAAC,MAAM,EAAE,EAAE,CAAC;YAChC,gBAAgB,CAAC,GAAG,CAAC,IAAI,CAAC,GAAG,GAAG,CAAC;QACnC,CAAC;QACD,OAAO,EAAE,gBAAgB,EAAE,eAAe,EAAE,EAAE,EAAE,CAAC;IACnD,CAAC;CACF"}
|
|
@@ -0,0 +1,18 @@
|
|
|
1
|
+
import { PermissionSet } from '../../../../salesforce/index.js';
|
|
2
|
+
import Policy, { ResolveEntityResult } from '../policy.js';
|
|
3
|
+
import RuleRegistry from '../ruleRegistry.js';
|
|
4
|
+
import { AuditContext } from '../context.types.js';
|
|
5
|
+
import { AuditRunConfig } from '../shape/auditConfigShape.js';
|
|
6
|
+
import { PolicyConfig, UserPrivilegeLevel } from '../shape/schema.js';
|
|
7
|
+
export type ClassifiedPermissionSet = PermissionSet & {
|
|
8
|
+
role: UserPrivilegeLevel;
|
|
9
|
+
};
|
|
10
|
+
export default class PermissionSetsPolicy extends Policy<ClassifiedPermissionSet> {
|
|
11
|
+
config: PolicyConfig;
|
|
12
|
+
auditConfig: AuditRunConfig;
|
|
13
|
+
private totalEntities;
|
|
14
|
+
private readonly classifications;
|
|
15
|
+
constructor(config: PolicyConfig, auditConfig: AuditRunConfig, registry: RuleRegistry);
|
|
16
|
+
protected resolveEntities(context: AuditContext): Promise<ResolveEntityResult<ClassifiedPermissionSet>>;
|
|
17
|
+
private buildIgnoredEntities;
|
|
18
|
+
}
|
|
@@ -0,0 +1,80 @@
|
|
|
1
|
+
import { Messages } from '@salesforce/core';
|
|
2
|
+
import { PermissionSets } from '../../../../salesforce/index.js';
|
|
3
|
+
import Policy from '../policy.js';
|
|
4
|
+
import { UserPrivilegeLevel } from '../shape/schema.js';
|
|
5
|
+
Messages.importMessagesDirectoryFromMetaUrl(import.meta.url);
|
|
6
|
+
const messages = Messages.loadMessages('@j-schreiber/sf-cli-security-audit', 'policies.general');
|
|
7
|
+
export default class PermissionSetsPolicy extends Policy {
|
|
8
|
+
config;
|
|
9
|
+
auditConfig;
|
|
10
|
+
totalEntities;
|
|
11
|
+
classifications;
|
|
12
|
+
constructor(config, auditConfig, registry) {
|
|
13
|
+
super(config, auditConfig, registry);
|
|
14
|
+
this.config = config;
|
|
15
|
+
this.auditConfig = auditConfig;
|
|
16
|
+
this.classifications = this.auditConfig.classifications.permissionSets?.permissionSets ?? {};
|
|
17
|
+
this.totalEntities = Object.keys(this.classifications).length;
|
|
18
|
+
}
|
|
19
|
+
async resolveEntities(context) {
|
|
20
|
+
const permsetsRepo = new PermissionSets(context.targetOrgConnection);
|
|
21
|
+
permsetsRepo.addListener('entityresolve', (statusEvt) => this.emit('entityresolve', statusEvt));
|
|
22
|
+
const allPermsets = await permsetsRepo.resolve();
|
|
23
|
+
const ignoredEntities = this.buildIgnoredEntities(allPermsets);
|
|
24
|
+
const classifiedPermsets = Object.keys(this.classifications).filter((permsetName) => ignoredEntities[permsetName] === undefined);
|
|
25
|
+
this.totalEntities = Object.keys(ignoredEntities).length + classifiedPermsets.length;
|
|
26
|
+
this.emit('entityresolve', {
|
|
27
|
+
total: this.totalEntities,
|
|
28
|
+
resolved: 0,
|
|
29
|
+
});
|
|
30
|
+
const resolvedPermsets = await permsetsRepo.resolve({ withMetadata: true, filterNames: classifiedPermsets });
|
|
31
|
+
const resolvedEntities = {};
|
|
32
|
+
for (const permsetName of classifiedPermsets) {
|
|
33
|
+
const metadata = resolvedPermsets.get(permsetName);
|
|
34
|
+
if (metadata) {
|
|
35
|
+
resolvedEntities[permsetName] = {
|
|
36
|
+
...metadata,
|
|
37
|
+
role: this.classifications[permsetName].role,
|
|
38
|
+
};
|
|
39
|
+
}
|
|
40
|
+
else {
|
|
41
|
+
ignoredEntities[permsetName] = {
|
|
42
|
+
name: permsetName,
|
|
43
|
+
message: messages.getMessage('permission-set-invalid-no-metadata'),
|
|
44
|
+
};
|
|
45
|
+
}
|
|
46
|
+
}
|
|
47
|
+
this.emit('entityresolve', {
|
|
48
|
+
total: this.totalEntities,
|
|
49
|
+
resolved: this.totalEntities,
|
|
50
|
+
});
|
|
51
|
+
return { resolvedEntities, ignoredEntities: Object.values(ignoredEntities) };
|
|
52
|
+
}
|
|
53
|
+
buildIgnoredEntities(allPermsets) {
|
|
54
|
+
const ignoredEntities = {};
|
|
55
|
+
for (const [permsetName, permsetDef] of Object.entries(this.classifications)) {
|
|
56
|
+
if (permsetDef.role === UserPrivilegeLevel.UNKNOWN) {
|
|
57
|
+
ignoredEntities[permsetName] = {
|
|
58
|
+
name: permsetName,
|
|
59
|
+
message: messages.getMessage('preset-unknown', ['Permission Set']),
|
|
60
|
+
};
|
|
61
|
+
}
|
|
62
|
+
else if (!allPermsets.has(permsetName)) {
|
|
63
|
+
ignoredEntities[permsetName] = {
|
|
64
|
+
name: permsetName,
|
|
65
|
+
message: messages.getMessage('entity-not-found'),
|
|
66
|
+
};
|
|
67
|
+
}
|
|
68
|
+
}
|
|
69
|
+
for (const permset of allPermsets.values()) {
|
|
70
|
+
if (this.classifications[permset.name] === undefined) {
|
|
71
|
+
ignoredEntities[permset.name] = {
|
|
72
|
+
name: permset.name,
|
|
73
|
+
message: messages.getMessage('entity-not-classified'),
|
|
74
|
+
};
|
|
75
|
+
}
|
|
76
|
+
}
|
|
77
|
+
return ignoredEntities;
|
|
78
|
+
}
|
|
79
|
+
}
|
|
80
|
+
//# sourceMappingURL=permissionSets.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"permissionSets.js","sourceRoot":"","sources":["../../../../../src/libs/audit-engine/registry/policies/permissionSets.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,QAAQ,EAAE,MAAM,kBAAkB,CAAC;AAC5C,OAAO,EAAiB,cAAc,EAAE,MAAM,iCAAiC,CAAC;AAChF,OAAO,MAA+B,MAAM,cAAc,CAAC;AAK3D,OAAO,EAA8C,kBAAkB,EAAE,MAAM,oBAAoB,CAAC;AAEpG,QAAQ,CAAC,kCAAkC,CAAC,MAAM,CAAC,IAAI,CAAC,GAAG,CAAC,CAAC;AAC7D,MAAM,QAAQ,GAAG,QAAQ,CAAC,YAAY,CAAC,oCAAoC,EAAE,kBAAkB,CAAC,CAAC;AAMjG,MAAM,CAAC,OAAO,OAAO,oBAAqB,SAAQ,MAA+B;IAIrD;IAA6B;IAH/C,aAAa,CAAS;IACb,eAAe,CAA+B;IAE/D,YAA0B,MAAoB,EAAS,WAA2B,EAAE,QAAsB;QACxG,KAAK,CAAC,MAAM,EAAE,WAAW,EAAE,QAAQ,CAAC,CAAC;QADb,WAAM,GAAN,MAAM,CAAc;QAAS,gBAAW,GAAX,WAAW,CAAgB;QAEhF,IAAI,CAAC,eAAe,GAAG,IAAI,CAAC,WAAW,CAAC,eAAe,CAAC,cAAc,EAAE,cAAc,IAAI,EAAE,CAAC;QAC7F,IAAI,CAAC,aAAa,GAAG,MAAM,CAAC,IAAI,CAAC,IAAI,CAAC,eAAe,CAAC,CAAC,MAAM,CAAC;IAChE,CAAC;IAES,KAAK,CAAC,eAAe,CAAC,OAAqB;QACnD,MAAM,YAAY,GAAG,IAAI,cAAc,CAAC,OAAO,CAAC,mBAAmB,CAAC,CAAC;QACrE,YAAY,CAAC,WAAW,CAAC,eAAe,EAAE,CAAC,SAAS,EAAE,EAAE,CAAC,IAAI,CAAC,IAAI,CAAC,eAAe,EAAE,SAAS,CAAC,CAAC,CAAC;QAChG,MAAM,WAAW,GAAG,MAAM,YAAY,CAAC,OAAO,EAAE,CAAC;QACjD,MAAM,eAAe,GAAG,IAAI,CAAC,oBAAoB,CAAC,WAAW,CAAC,CAAC;QAC/D,MAAM,kBAAkB,GAAG,MAAM,CAAC,IAAI,CAAC,IAAI,CAAC,eAAe,CAAC,CAAC,MAAM,CACjE,CAAC,WAAW,EAAE,EAAE,CAAC,eAAe,CAAC,WAAW,CAAC,KAAK,SAAS,CAC5D,CAAC;QACF,IAAI,CAAC,aAAa,GAAG,MAAM,CAAC,IAAI,CAAC,eAAe,CAAC,CAAC,MAAM,GAAG,kBAAkB,CAAC,MAAM,CAAC;QACrF,IAAI,CAAC,IAAI,CAAC,eAAe,EAAE;YACzB,KAAK,EAAE,IAAI,CAAC,aAAa;YACzB,QAAQ,EAAE,CAAC;SACZ,CAAC,CAAC;QACH,MAAM,gBAAgB,GAAG,MAAM,YAAY,CAAC,OAAO,CAAC,EAAE,YAAY,EAAE,IAAI,EAAE,WAAW,EAAE,kBAAkB,EAAE,CAAC,CAAC;QAC7G,MAAM,gBAAgB,GAA4C,EAAE,CAAC;QACrE,KAAK,MAAM,WAAW,IAAI,kBAAkB,EAAE,CAAC;YAC7C,MAAM,QAAQ,GAAG,gBAAgB,CAAC,GAAG,CAAC,WAAW,CAAC,CAAC;YACnD,IAAI,QAAQ,EAAE,CAAC;gBACb,gBAAgB,CAAC,WAAW,CAAC,GAAG;oBAC9B,GAAG,QAAQ;oBACX,IAAI,EAAE,IAAI,CAAC,eAAe,CAAC,WAAW,CAAC,CAAC,IAAI;iBAC7C,CAAC;YACJ,CAAC;iBAAM,CAAC;gBACN,eAAe,CAAC,WAAW,CAAC,GAAG;oBAC7B,IAAI,EAAE,WAAW;oBACjB,OAAO,EAAE,QAAQ,CAAC,UAAU,CAAC,oCAAoC,CAAC;iBACnE,CAAC;YACJ,CAAC;QACH,CAAC;QACD,IAAI,CAAC,IAAI,CAAC,eAAe,EAAE;YACzB,KAAK,EAAE,IAAI,CAAC,aAAa;YACzB,QAAQ,EAAE,IAAI,CAAC,aAAa;SAC7B,CAAC,CAAC;QACH,OAAO,EAAE,gBAAgB,EAAE,eAAe,EAAE,MAAM,CAAC,MAAM,CAAC,eAAe,CAAC,EAAE,CAAC;IAC/E,CAAC;IAEO,oBAAoB,CAAC,WAAuC;QAClE,MAAM,eAAe,GAAuC,EAAE,CAAC;QAC/D,KAAK,MAAM,CAAC,WAAW,EAAE,UAAU,CAAC,IAAI,MAAM,CAAC,OAAO,CAAC,IAAI,CAAC,eAAe,CAAC,EAAE,CAAC;YAC7E,IAAI,UAAU,CAAC,IAAI,KAAK,kBAAkB,CAAC,OAAO,EAAE,CAAC;gBACnD,eAAe,CAAC,WAAW,CAAC,GAAG;oBAC7B,IAAI,EAAE,WAAW;oBACjB,OAAO,EAAE,QAAQ,CAAC,UAAU,CAAC,gBAAgB,EAAE,CAAC,gBAAgB,CAAC,CAAC;iBACnE,CAAC;YACJ,CAAC;iBAAM,IAAI,CAAC,WAAW,CAAC,GAAG,CAAC,WAAW,CAAC,EAAE,CAAC;gBACzC,eAAe,CAAC,WAAW,CAAC,GAAG;oBAC7B,IAAI,EAAE,WAAW;oBACjB,OAAO,EAAE,QAAQ,CAAC,UAAU,CAAC,kBAAkB,CAAC;iBACjD,CAAC;YACJ,CAAC;QACH,CAAC;QACD,KAAK,MAAM,OAAO,IAAI,WAAW,CAAC,MAAM,EAAE,EAAE,CAAC;YAC3C,IAAI,IAAI,CAAC,eAAe,CAAC,OAAO,CAAC,IAAI,CAAC,KAAK,SAAS,EAAE,CAAC;gBACrD,eAAe,CAAC,OAAO,CAAC,IAAI,CAAC,GAAG;oBAC9B,IAAI,EAAE,OAAO,CAAC,IAAI;oBAClB,OAAO,EAAE,QAAQ,CAAC,UAAU,CAAC,uBAAuB,CAAC;iBACtD,CAAC;YACJ,CAAC;QACH,CAAC;QACD,OAAO,eAAe,CAAC;IACzB,CAAC;CACF"}
|
|
@@ -0,0 +1,18 @@
|
|
|
1
|
+
import { Profile } from '../../../../salesforce/index.js';
|
|
2
|
+
import { AuditContext } from '../context.types.js';
|
|
3
|
+
import Policy, { ResolveEntityResult } from '../policy.js';
|
|
4
|
+
import RuleRegistry from '../ruleRegistry.js';
|
|
5
|
+
import { AuditRunConfig } from '../shape/auditConfigShape.js';
|
|
6
|
+
import { PolicyConfig } from '../shape/schema.js';
|
|
7
|
+
export type ResolvedProfile = Profile & {
|
|
8
|
+
role: string;
|
|
9
|
+
};
|
|
10
|
+
export default class ProfilesPolicy extends Policy<ResolvedProfile> {
|
|
11
|
+
config: PolicyConfig;
|
|
12
|
+
auditConfig: AuditRunConfig;
|
|
13
|
+
private resolveState;
|
|
14
|
+
private readonly classifications;
|
|
15
|
+
constructor(config: PolicyConfig, auditConfig: AuditRunConfig, registry: RuleRegistry);
|
|
16
|
+
protected resolveEntities(context: AuditContext): Promise<ResolveEntityResult<ResolvedProfile>>;
|
|
17
|
+
private updateResolveState;
|
|
18
|
+
}
|
|
@@ -0,0 +1,76 @@
|
|
|
1
|
+
import { Messages } from '@salesforce/core';
|
|
2
|
+
import { Profiles } from '../../../../salesforce/index.js';
|
|
3
|
+
import Policy, { getTotal } from '../policy.js';
|
|
4
|
+
import { UserPrivilegeLevel } from '../shape/schema.js';
|
|
5
|
+
Messages.importMessagesDirectoryFromMetaUrl(import.meta.url);
|
|
6
|
+
const messages = Messages.loadMessages('@j-schreiber/sf-cli-security-audit', 'policies.general');
|
|
7
|
+
export default class ProfilesPolicy extends Policy {
|
|
8
|
+
config;
|
|
9
|
+
auditConfig;
|
|
10
|
+
resolveState = { total: 0, resolved: 0 };
|
|
11
|
+
classifications;
|
|
12
|
+
constructor(config, auditConfig, registry) {
|
|
13
|
+
super(config, auditConfig, registry);
|
|
14
|
+
this.config = config;
|
|
15
|
+
this.auditConfig = auditConfig;
|
|
16
|
+
this.classifications = this.auditConfig.classifications.profiles?.profiles ?? {};
|
|
17
|
+
this.updateResolveState({ total: Object.keys(this.classifications).length });
|
|
18
|
+
}
|
|
19
|
+
async resolveEntities(context) {
|
|
20
|
+
this.updateResolveState({ resolved: 0 });
|
|
21
|
+
const profilesRepo = new Profiles(context.targetOrgConnection);
|
|
22
|
+
const allProfiles = await profilesRepo.resolve();
|
|
23
|
+
const ignoredEntities = {};
|
|
24
|
+
const classifiedProfiles = [];
|
|
25
|
+
for (const [profileName, profileDef] of Object.entries(this.classifications)) {
|
|
26
|
+
if (profileDef.role === UserPrivilegeLevel.UNKNOWN) {
|
|
27
|
+
ignoredEntities[profileName] = {
|
|
28
|
+
name: profileName,
|
|
29
|
+
message: messages.getMessage('preset-unknown', ['Profile']),
|
|
30
|
+
};
|
|
31
|
+
}
|
|
32
|
+
else if (!allProfiles.has(profileName)) {
|
|
33
|
+
ignoredEntities[profileName] = {
|
|
34
|
+
name: profileName,
|
|
35
|
+
message: messages.getMessage('entity-not-found'),
|
|
36
|
+
};
|
|
37
|
+
}
|
|
38
|
+
else {
|
|
39
|
+
classifiedProfiles.push(profileName);
|
|
40
|
+
}
|
|
41
|
+
}
|
|
42
|
+
for (const profile of allProfiles.values()) {
|
|
43
|
+
if (this.classifications[profile.name] === undefined) {
|
|
44
|
+
ignoredEntities[profile.name] = {
|
|
45
|
+
name: profile.name,
|
|
46
|
+
message: messages.getMessage('entity-not-classified'),
|
|
47
|
+
};
|
|
48
|
+
}
|
|
49
|
+
}
|
|
50
|
+
this.updateResolveState({ total: Object.keys(ignoredEntities).length + classifiedProfiles.length });
|
|
51
|
+
const profiles = await profilesRepo.resolve({ withMetadata: true, filterNames: classifiedProfiles });
|
|
52
|
+
const resolvedEntities = {};
|
|
53
|
+
classifiedProfiles.forEach((profileName) => {
|
|
54
|
+
if (profiles.has(profileName) && profiles.get(profileName)) {
|
|
55
|
+
resolvedEntities[profileName] = {
|
|
56
|
+
...profiles.get(profileName),
|
|
57
|
+
role: this.classifications[profileName].role,
|
|
58
|
+
};
|
|
59
|
+
}
|
|
60
|
+
else {
|
|
61
|
+
ignoredEntities[profileName] = {
|
|
62
|
+
name: profileName,
|
|
63
|
+
message: messages.getMessage('profile-invalid-no-metadata'),
|
|
64
|
+
};
|
|
65
|
+
}
|
|
66
|
+
});
|
|
67
|
+
const result = { resolvedEntities, ignoredEntities: Object.values(ignoredEntities) };
|
|
68
|
+
this.updateResolveState({ resolved: getTotal(result) });
|
|
69
|
+
return result;
|
|
70
|
+
}
|
|
71
|
+
updateResolveState(update) {
|
|
72
|
+
this.resolveState = { ...this.resolveState, ...update };
|
|
73
|
+
this.emit('entityresolve', this.resolveState);
|
|
74
|
+
}
|
|
75
|
+
}
|
|
76
|
+
//# sourceMappingURL=profiles.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"profiles.js","sourceRoot":"","sources":["../../../../../src/libs/audit-engine/registry/policies/profiles.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,QAAQ,EAAE,MAAM,kBAAkB,CAAC;AAC5C,OAAO,EAAW,QAAQ,EAAE,MAAM,iCAAiC,CAAC;AAEpE,OAAO,MAAM,EAAE,EAAE,QAAQ,EAAuB,MAAM,cAAc,CAAC;AAIrE,OAAO,EAAwC,kBAAkB,EAAE,MAAM,oBAAoB,CAAC;AAE9F,QAAQ,CAAC,kCAAkC,CAAC,MAAM,CAAC,IAAI,CAAC,GAAG,CAAC,CAAC;AAC7D,MAAM,QAAQ,GAAG,QAAQ,CAAC,YAAY,CAAC,oCAAoC,EAAE,kBAAkB,CAAC,CAAC;AAWjG,MAAM,CAAC,OAAO,OAAO,cAAe,SAAQ,MAAuB;IAIvC;IAA6B;IAH/C,YAAY,GAAiB,EAAE,KAAK,EAAE,CAAC,EAAE,QAAQ,EAAE,CAAC,EAAE,CAAC;IAC9C,eAAe,CAAyB;IAEzD,YAA0B,MAAoB,EAAS,WAA2B,EAAE,QAAsB;QACxG,KAAK,CAAC,MAAM,EAAE,WAAW,EAAE,QAAQ,CAAC,CAAC;QADb,WAAM,GAAN,MAAM,CAAc;QAAS,gBAAW,GAAX,WAAW,CAAgB;QAEhF,IAAI,CAAC,eAAe,GAAG,IAAI,CAAC,WAAW,CAAC,eAAe,CAAC,QAAQ,EAAE,QAAQ,IAAI,EAAE,CAAC;QACjF,IAAI,CAAC,kBAAkB,CAAC,EAAE,KAAK,EAAE,MAAM,CAAC,IAAI,CAAC,IAAI,CAAC,eAAe,CAAC,CAAC,MAAM,EAAE,CAAC,CAAC;IAC/E,CAAC;IAES,KAAK,CAAC,eAAe,CAAC,OAAqB;QACnD,IAAI,CAAC,kBAAkB,CAAC,EAAE,QAAQ,EAAE,CAAC,EAAE,CAAC,CAAC;QACzC,MAAM,YAAY,GAAG,IAAI,QAAQ,CAAC,OAAO,CAAC,mBAAmB,CAAC,CAAC;QAC/D,MAAM,WAAW,GAAG,MAAM,YAAY,CAAC,OAAO,EAAE,CAAC;QACjD,MAAM,eAAe,GAAuC,EAAE,CAAC;QAC/D,MAAM,kBAAkB,GAAa,EAAE,CAAC;QACxC,KAAK,MAAM,CAAC,WAAW,EAAE,UAAU,CAAC,IAAI,MAAM,CAAC,OAAO,CAAC,IAAI,CAAC,eAAe,CAAC,EAAE,CAAC;YAC7E,IAAI,UAAU,CAAC,IAAI,KAAK,kBAAkB,CAAC,OAAO,EAAE,CAAC;gBACnD,eAAe,CAAC,WAAW,CAAC,GAAG;oBAC7B,IAAI,EAAE,WAAW;oBACjB,OAAO,EAAE,QAAQ,CAAC,UAAU,CAAC,gBAAgB,EAAE,CAAC,SAAS,CAAC,CAAC;iBAC5D,CAAC;YACJ,CAAC;iBAAM,IAAI,CAAC,WAAW,CAAC,GAAG,CAAC,WAAW,CAAC,EAAE,CAAC;gBACzC,eAAe,CAAC,WAAW,CAAC,GAAG;oBAC7B,IAAI,EAAE,WAAW;oBACjB,OAAO,EAAE,QAAQ,CAAC,UAAU,CAAC,kBAAkB,CAAC;iBACjD,CAAC;YACJ,CAAC;iBAAM,CAAC;gBACN,kBAAkB,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC;YACvC,CAAC;QACH,CAAC;QACD,KAAK,MAAM,OAAO,IAAI,WAAW,CAAC,MAAM,EAAE,EAAE,CAAC;YAC3C,IAAI,IAAI,CAAC,eAAe,CAAC,OAAO,CAAC,IAAI,CAAC,KAAK,SAAS,EAAE,CAAC;gBACrD,eAAe,CAAC,OAAO,CAAC,IAAI,CAAC,GAAG;oBAC9B,IAAI,EAAE,OAAO,CAAC,IAAI;oBAClB,OAAO,EAAE,QAAQ,CAAC,UAAU,CAAC,uBAAuB,CAAC;iBACtD,CAAC;YACJ,CAAC;QACH,CAAC;QACD,IAAI,CAAC,kBAAkB,CAAC,EAAE,KAAK,EAAE,MAAM,CAAC,IAAI,CAAC,eAAe,CAAC,CAAC,MAAM,GAAG,kBAAkB,CAAC,MAAM,EAAE,CAAC,CAAC;QACpG,MAAM,QAAQ,GAAG,MAAM,YAAY,CAAC,OAAO,CAAC,EAAE,YAAY,EAAE,IAAI,EAAE,WAAW,EAAE,kBAAkB,EAAE,CAAC,CAAC;QACrG,MAAM,gBAAgB,GAAoC,EAAE,CAAC;QAC7D,kBAAkB,CAAC,OAAO,CAAC,CAAC,WAAW,EAAE,EAAE;YACzC,IAAI,QAAQ,CAAC,GAAG,CAAC,WAAW,CAAC,IAAI,QAAQ,CAAC,GAAG,CAAC,WAAW,CAAC,EAAE,CAAC;gBAC3D,gBAAgB,CAAC,WAAW,CAAC,GAAG;oBAC9B,GAAG,QAAQ,CAAC,GAAG,CAAC,WAAW,CAAE;oBAC7B,IAAI,EAAE,IAAI,CAAC,eAAe,CAAC,WAAW,CAAC,CAAC,IAAI;iBAC7C,CAAC;YACJ,CAAC;iBAAM,CAAC;gBACN,eAAe,CAAC,WAAW,CAAC,GAAG;oBAC7B,IAAI,EAAE,WAAW;oBACjB,OAAO,EAAE,QAAQ,CAAC,UAAU,CAAC,6BAA6B,CAAC;iBAC5D,CAAC;YACJ,CAAC;QACH,CAAC,CAAC,CAAC;QACH,MAAM,MAAM,GAAG,EAAE,gBAAgB,EAAE,eAAe,EAAE,MAAM,CAAC,MAAM,CAAC,eAAe,CAAC,EAAE,CAAC;QACrF,IAAI,CAAC,kBAAkB,CAAC,EAAE,QAAQ,EAAE,QAAQ,CAAC,MAAM,CAAC,EAAE,CAAC,CAAC;QACxD,OAAO,MAAM,CAAC;IAChB,CAAC;IAEO,kBAAkB,CAAC,MAA6B;QACtD,IAAI,CAAC,YAAY,GAAG,EAAE,GAAG,IAAI,CAAC,YAAY,EAAE,GAAG,MAAM,EAAE,CAAC;QACxD,IAAI,CAAC,IAAI,CAAC,eAAe,EAAE,IAAI,CAAC,YAAY,CAAC,CAAC;IAChD,CAAC;CACF"}
|
|
@@ -0,0 +1,18 @@
|
|
|
1
|
+
import RuleRegistry, { RegistryRuleResolveResult } from '../ruleRegistry.js';
|
|
2
|
+
import { MdapiRegistry } from '../../../../salesforce/index.js';
|
|
3
|
+
import Policy, { ResolveEntityResult } from '../policy.js';
|
|
4
|
+
import { AuditContext } from '../context.types.js';
|
|
5
|
+
import { AuditRunConfig } from '../shape/auditConfigShape.js';
|
|
6
|
+
import { PolicyConfig } from '../shape/schema.js';
|
|
7
|
+
export type SalesforceSetting = Awaited<ReturnType<MdapiRegistry['namedTypes']['Settings']['resolve']>>['string'];
|
|
8
|
+
export declare class SettingsRuleRegistry extends RuleRegistry {
|
|
9
|
+
constructor();
|
|
10
|
+
resolveRules(ruleObjs: PolicyConfig['rules'], auditContext: AuditRunConfig): RegistryRuleResolveResult;
|
|
11
|
+
}
|
|
12
|
+
export default class SettingsPolicy extends Policy<SalesforceSetting> {
|
|
13
|
+
config: PolicyConfig;
|
|
14
|
+
auditConfig: AuditRunConfig;
|
|
15
|
+
constructor(config: PolicyConfig, auditConfig: AuditRunConfig);
|
|
16
|
+
protected resolveEntities(context: AuditContext): Promise<ResolveEntityResult<SalesforceSetting>>;
|
|
17
|
+
private removeInvalidSettingsFromResolvedRules;
|
|
18
|
+
}
|