@j-schreiber/sf-cli-security-audit 0.3.0 → 0.4.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (134) hide show
  1. package/lib/commands/org/audit/init.d.ts +1 -1
  2. package/lib/commands/org/audit/init.js +2 -2
  3. package/lib/commands/org/audit/init.js.map +1 -1
  4. package/lib/commands/org/audit/run.d.ts +1 -1
  5. package/lib/commands/org/audit/run.js +18 -6
  6. package/lib/commands/org/audit/run.js.map +1 -1
  7. package/lib/libs/{policies/initialisation → conf-init}/auditConfig.d.ts +1 -1
  8. package/lib/libs/{policies/initialisation → conf-init}/auditConfig.js +3 -5
  9. package/lib/libs/conf-init/auditConfig.js.map +1 -0
  10. package/lib/libs/{config → conf-init}/defaultPolicyClassification.d.ts +1 -1
  11. package/lib/libs/{config → conf-init}/defaultPolicyClassification.js +15 -15
  12. package/lib/libs/conf-init/defaultPolicyClassification.js.map +1 -0
  13. package/lib/libs/{policies/initialisation → conf-init}/permissionsClassification.d.ts +1 -2
  14. package/lib/libs/{policies/initialisation → conf-init}/permissionsClassification.js +5 -6
  15. package/lib/libs/conf-init/permissionsClassification.js.map +1 -0
  16. package/lib/libs/{policies/initialisation → conf-init}/policyConfigs.d.ts +1 -1
  17. package/lib/libs/{policies/initialisation → conf-init}/policyConfigs.js +8 -10
  18. package/lib/libs/conf-init/policyConfigs.js.map +1 -0
  19. package/lib/libs/core/classification-types.d.ts +20 -0
  20. package/lib/libs/core/classification-types.js +23 -0
  21. package/lib/libs/core/classification-types.js.map +1 -0
  22. package/lib/libs/{config/queries.js → core/constants.js} +1 -1
  23. package/lib/libs/core/constants.js.map +1 -0
  24. package/lib/libs/{config/audit-run → core/file-mgmt}/auditConfigFileManager.d.ts +19 -0
  25. package/lib/libs/{config/audit-run → core/file-mgmt}/auditConfigFileManager.js +23 -7
  26. package/lib/libs/core/file-mgmt/auditConfigFileManager.js.map +1 -0
  27. package/lib/libs/{config/audit-run → core/file-mgmt}/schema.d.ts +16 -15
  28. package/lib/libs/{config/audit-run → core/file-mgmt}/schema.js +5 -4
  29. package/lib/libs/core/file-mgmt/schema.js.map +1 -0
  30. package/lib/libs/core/mdapi/mdapiRetriever.d.ts +110 -0
  31. package/lib/libs/core/mdapi/mdapiRetriever.js +193 -0
  32. package/lib/libs/core/mdapi/mdapiRetriever.js.map +1 -0
  33. package/lib/libs/core/policy-types.d.ts +18 -0
  34. package/lib/libs/core/policy-types.js +28 -0
  35. package/lib/libs/core/policy-types.js.map +1 -0
  36. package/lib/libs/core/registries/connectedApps.d.ts +13 -0
  37. package/lib/libs/{config → core}/registries/connectedApps.js +2 -2
  38. package/lib/libs/core/registries/connectedApps.js.map +1 -0
  39. package/lib/libs/{config → core}/registries/permissionSets.d.ts +6 -0
  40. package/lib/libs/{config → core}/registries/permissionSets.js +1 -1
  41. package/lib/libs/core/registries/permissionSets.js.map +1 -0
  42. package/lib/libs/{config → core}/registries/profiles.d.ts +6 -0
  43. package/lib/libs/{config → core}/registries/profiles.js +2 -2
  44. package/lib/libs/core/registries/profiles.js.map +1 -0
  45. package/lib/libs/{config → core}/registries/ruleRegistry.d.ts +15 -5
  46. package/lib/libs/core/registries/ruleRegistry.js.map +1 -0
  47. package/lib/libs/core/registries/rules/allUsedAppsUnderManagement.d.ts +7 -0
  48. package/lib/libs/core/registries/rules/allUsedAppsUnderManagement.js.map +1 -0
  49. package/lib/libs/core/registries/rules/enforceCustomPermsClassificationOnProfiles.d.ts +7 -0
  50. package/lib/libs/{policies → core/registries}/rules/enforceCustomPermsClassificationOnProfiles.js +4 -3
  51. package/lib/libs/core/registries/rules/enforceCustomPermsClassificationOnProfiles.js.map +1 -0
  52. package/lib/libs/core/registries/rules/enforceUserPermsClassificationOnPermSets.d.ts +7 -0
  53. package/lib/libs/{policies → core/registries}/rules/enforceUserPermsClassificationOnPermSets.js +4 -3
  54. package/lib/libs/core/registries/rules/enforceUserPermsClassificationOnPermSets.js.map +1 -0
  55. package/lib/libs/core/registries/rules/enforceUserPermsClassificationOnProfiles.d.ts +7 -0
  56. package/lib/libs/{policies → core/registries}/rules/enforceUserPermsClassificationOnProfiles.js +4 -3
  57. package/lib/libs/core/registries/rules/enforceUserPermsClassificationOnProfiles.js.map +1 -0
  58. package/lib/libs/core/registries/rules/noUserCanSelfAuthorize.d.ts +7 -0
  59. package/lib/libs/core/registries/rules/noUserCanSelfAuthorize.js.map +1 -0
  60. package/lib/libs/{policies → core/registries}/rules/policyRule.d.ts +4 -4
  61. package/lib/libs/core/registries/rules/policyRule.js.map +1 -0
  62. package/lib/libs/{policies/interfaces/policyRuleInterfaces.d.ts → core/registries/types.d.ts} +14 -6
  63. package/lib/libs/core/registries/types.js +9 -0
  64. package/lib/libs/core/registries/types.js.map +1 -0
  65. package/lib/libs/{audit/types.d.ts → core/result-types.d.ts} +17 -0
  66. package/lib/libs/core/result-types.js +2 -0
  67. package/lib/libs/core/result-types.js.map +1 -0
  68. package/lib/libs/{utils.d.ts → core/utils.d.ts} +1 -1
  69. package/lib/libs/core/utils.js +13 -0
  70. package/lib/libs/core/utils.js.map +1 -0
  71. package/lib/libs/policies/auditRun.d.ts +22 -5
  72. package/lib/libs/policies/auditRun.js +46 -20
  73. package/lib/libs/policies/auditRun.js.map +1 -1
  74. package/lib/libs/policies/connectedAppPolicy.d.ts +3 -12
  75. package/lib/libs/policies/connectedAppPolicy.js +35 -14
  76. package/lib/libs/policies/connectedAppPolicy.js.map +1 -1
  77. package/lib/libs/policies/permissionSetPolicy.d.ts +4 -10
  78. package/lib/libs/policies/permissionSetPolicy.js +30 -18
  79. package/lib/libs/policies/permissionSetPolicy.js.map +1 -1
  80. package/lib/libs/policies/policy.d.ts +14 -7
  81. package/lib/libs/policies/policy.js +21 -3
  82. package/lib/libs/policies/policy.js.map +1 -1
  83. package/lib/libs/policies/profilePolicy.d.ts +4 -10
  84. package/lib/libs/policies/profilePolicy.js +18 -7
  85. package/lib/libs/policies/profilePolicy.js.map +1 -1
  86. package/lib/ux/auditRunMultiStage.d.ts +65 -0
  87. package/lib/ux/auditRunMultiStage.js +117 -0
  88. package/lib/ux/auditRunMultiStage.js.map +1 -0
  89. package/messages/org.audit.run.md +0 -4
  90. package/oclif.manifest.json +1 -1
  91. package/package.json +1 -1
  92. package/lib/libs/audit/types.js +0 -2
  93. package/lib/libs/audit/types.js.map +0 -1
  94. package/lib/libs/config/audit-run/auditConfigFileManager.js.map +0 -1
  95. package/lib/libs/config/audit-run/schema.js.map +0 -1
  96. package/lib/libs/config/defaultPolicyClassification.js.map +0 -1
  97. package/lib/libs/config/queries.js.map +0 -1
  98. package/lib/libs/config/registries/connectedApps.d.ts +0 -5
  99. package/lib/libs/config/registries/connectedApps.js.map +0 -1
  100. package/lib/libs/config/registries/permissionSets.js.map +0 -1
  101. package/lib/libs/config/registries/profiles.js.map +0 -1
  102. package/lib/libs/config/registries/ruleRegistry.js.map +0 -1
  103. package/lib/libs/config/registries/types.d.ts +0 -7
  104. package/lib/libs/config/registries/types.js +0 -2
  105. package/lib/libs/config/registries/types.js.map +0 -1
  106. package/lib/libs/mdapiRetriever.d.ts +0 -18
  107. package/lib/libs/mdapiRetriever.js +0 -60
  108. package/lib/libs/mdapiRetriever.js.map +0 -1
  109. package/lib/libs/policies/initialisation/auditConfig.js.map +0 -1
  110. package/lib/libs/policies/initialisation/permissionsClassification.js.map +0 -1
  111. package/lib/libs/policies/initialisation/policyConfigs.js.map +0 -1
  112. package/lib/libs/policies/interfaces/policyRuleInterfaces.js +0 -2
  113. package/lib/libs/policies/interfaces/policyRuleInterfaces.js.map +0 -1
  114. package/lib/libs/policies/rules/allUsedAppsUnderManagement.d.ts +0 -6
  115. package/lib/libs/policies/rules/allUsedAppsUnderManagement.js.map +0 -1
  116. package/lib/libs/policies/rules/enforceCustomPermsClassificationOnProfiles.d.ts +0 -6
  117. package/lib/libs/policies/rules/enforceCustomPermsClassificationOnProfiles.js.map +0 -1
  118. package/lib/libs/policies/rules/enforceUserPermsClassificationOnPermSets.d.ts +0 -6
  119. package/lib/libs/policies/rules/enforceUserPermsClassificationOnPermSets.js.map +0 -1
  120. package/lib/libs/policies/rules/enforceUserPermsClassificationOnProfiles.d.ts +0 -6
  121. package/lib/libs/policies/rules/enforceUserPermsClassificationOnProfiles.js.map +0 -1
  122. package/lib/libs/policies/rules/noUserCanSelfAuthorize.d.ts +0 -6
  123. package/lib/libs/policies/rules/noUserCanSelfAuthorize.js.map +0 -1
  124. package/lib/libs/policies/rules/policyRule.js.map +0 -1
  125. package/lib/libs/policies/types.d.ts +0 -36
  126. package/lib/libs/policies/types.js +0 -45
  127. package/lib/libs/policies/types.js.map +0 -1
  128. package/lib/libs/utils.js +0 -7
  129. package/lib/libs/utils.js.map +0 -1
  130. /package/lib/libs/{config/queries.d.ts → core/constants.d.ts} +0 -0
  131. /package/lib/libs/{config → core}/registries/ruleRegistry.js +0 -0
  132. /package/lib/libs/{policies → core/registries}/rules/allUsedAppsUnderManagement.js +0 -0
  133. /package/lib/libs/{policies → core/registries}/rules/noUserCanSelfAuthorize.js +0 -0
  134. /package/lib/libs/{policies → core/registries}/rules/policyRule.js +0 -0
@@ -1,6 +0,0 @@
1
- import { PartialPolicyRuleResult, RuleAuditContext } from '../interfaces/policyRuleInterfaces.js';
2
- import PolicyRule, { RuleOptions } from './policyRule.js';
3
- export default class EnforceCustomPermsClassificationOnProfiles extends PolicyRule {
4
- constructor(opts: RuleOptions);
5
- run(context: RuleAuditContext): Promise<PartialPolicyRuleResult>;
6
- }
@@ -1 +0,0 @@
1
- {"version":3,"file":"enforceCustomPermsClassificationOnProfiles.js","sourceRoot":"","sources":["../../../../src/libs/policies/rules/enforceCustomPermsClassificationOnProfiles.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,QAAQ,EAAE,MAAM,kBAAkB,CAAC;AAE5C,OAAO,EAAE,yBAAyB,EAAE,eAAe,EAAE,MAAM,aAAa,CAAC;AAEzE,OAAO,UAA2B,MAAM,iBAAiB,CAAC;AAE1D,MAAM,QAAQ,GAAG,QAAQ,CAAC,YAAY,CAAC,oCAAoC,EAAE,oCAAoC,CAAC,CAAC;AAEnH,MAAM,CAAC,OAAO,OAAO,0CAA2C,SAAQ,UAAU;IAChF,YAAmB,IAAiB;QAClC,KAAK,CAAC,IAAI,CAAC,CAAC;IACd,CAAC;IAEM,GAAG,CAAC,OAAyB;QAClC,MAAM,MAAM,GAAG,IAAI,CAAC,UAAU,EAAE,CAAC;QACjC,MAAM,gBAAgB,GAAG,OAAO,CAAC,gBAAmD,CAAC;QACrF,MAAM,CAAC,MAAM,CAAC,gBAAgB,CAAC,CAAC,OAAO,CAAC,CAAC,OAAO,EAAE,EAAE;YAClD,MAAM,WAAW,GAAG,OAAO,CAAC,QAAQ,CAAC,iBAAiB,IAAI,EAAE,CAAC;YAC7D,WAAW,CAAC,OAAO,CAAC,CAAC,IAAI,EAAE,EAAE;gBAC3B,MAAM,UAAU,GAAG,CAAC,OAAO,CAAC,IAAI,EAAE,IAAI,CAAC,IAAI,CAAC,CAAC;gBAC7C,MAAM,cAAc,GAAG,IAAI,CAAC,uBAAuB,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;gBAC/D,IAAI,cAAc,EAAE,CAAC;oBACnB,IAAI,cAAc,CAAC,cAAc,KAAK,eAAe,CAAC,OAAO,EAAE,CAAC;wBAC9D,MAAM,CAAC,UAAU,CAAC,IAAI,CAAC;4BACrB,UAAU;4BACV,OAAO,EAAE,QAAQ,CAAC,UAAU,CAAC,kCAAkC,CAAC;yBACjE,CAAC,CAAC;oBACL,CAAC;yBAAM,IAAI,CAAC,yBAAyB,CAAC,cAAc,CAAC,cAAc,EAAE,OAAO,CAAC,MAAM,CAAC,EAAE,CAAC;wBACrF,MAAM,CAAC,UAAU,CAAC,IAAI,CAAC;4BACrB,UAAU;4BACV,OAAO,EAAE,QAAQ,CAAC,UAAU,CAAC,2CAA2C,EAAE;gCACxE,cAAc,CAAC,cAAc;gCAC7B,OAAO,CAAC,MAAM;6BACf,CAAC;yBACH,CAAC,CAAC;oBACL,CAAC;yBAAM,IAAI,cAAc,CAAC,cAAc,KAAK,eAAe,CAAC,OAAO,EAAE,CAAC;wBACrE,MAAM,CAAC,QAAQ,CAAC,IAAI,CAAC;4BACnB,UAAU;4BACV,OAAO,EAAE,QAAQ,CAAC,UAAU,CAAC,6BAA6B,CAAC;yBAC5D,CAAC,CAAC;oBACL,CAAC;gBACH,CAAC;qBAAM,CAAC;oBACN,MAAM,CAAC,QAAQ,CAAC,IAAI,CAAC;wBACnB,UAAU;wBACV,OAAO,EAAE,QAAQ,CAAC,UAAU,CAAC,+CAA+C,CAAC;qBAC9E,CAAC,CAAC;gBACL,CAAC;YACH,CAAC,CAAC,CAAC;QACL,CAAC,CAAC,CAAC;QACH,OAAO,OAAO,CAAC,OAAO,CAAC,MAAM,CAAC,CAAC;IACjC,CAAC;CACF"}
@@ -1,6 +0,0 @@
1
- import { PartialPolicyRuleResult, RuleAuditContext } from '../interfaces/policyRuleInterfaces.js';
2
- import PolicyRule, { RuleOptions } from './policyRule.js';
3
- export default class EnforceUserPermsClassificationOnPermSets extends PolicyRule {
4
- constructor(opts: RuleOptions);
5
- run(context: RuleAuditContext): Promise<PartialPolicyRuleResult>;
6
- }
@@ -1 +0,0 @@
1
- {"version":3,"file":"enforceUserPermsClassificationOnPermSets.js","sourceRoot":"","sources":["../../../../src/libs/policies/rules/enforceUserPermsClassificationOnPermSets.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,QAAQ,EAAE,MAAM,kBAAkB,CAAC;AAE5C,OAAO,EAAE,yBAAyB,EAAE,eAAe,EAAE,MAAM,aAAa,CAAC;AAEzE,OAAO,UAA2B,MAAM,iBAAiB,CAAC;AAE1D,MAAM,QAAQ,GAAG,QAAQ,CAAC,YAAY,CAAC,oCAAoC,EAAE,oCAAoC,CAAC,CAAC;AAEnH,MAAM,CAAC,OAAO,OAAO,wCAAyC,SAAQ,UAAU;IAC9E,YAAmB,IAAiB;QAClC,KAAK,CAAC,IAAI,CAAC,CAAC;IACd,CAAC;IAEM,GAAG,CAAC,OAAyB;QAClC,MAAM,MAAM,GAAG,IAAI,CAAC,UAAU,EAAE,CAAC;QACjC,MAAM,gBAAgB,GAAG,OAAO,CAAC,gBAAyD,CAAC;QAC3F,MAAM,CAAC,MAAM,CAAC,gBAAgB,CAAC,CAAC,OAAO,CAAC,CAAC,OAAO,EAAE,EAAE;YAClD,MAAM,SAAS,GAAG,OAAO,CAAC,QAAQ,CAAC,eAAe,IAAI,EAAE,CAAC;YACzD,SAAS,CAAC,OAAO,CAAC,CAAC,QAAQ,EAAE,EAAE;gBAC7B,MAAM,UAAU,GAAG,CAAC,OAAO,CAAC,IAAI,EAAE,QAAQ,CAAC,IAAI,CAAC,CAAC;gBACjD,MAAM,kBAAkB,GAAG,IAAI,CAAC,qBAAqB,CAAC,QAAQ,CAAC,IAAI,CAAC,CAAC;gBACrE,IAAI,kBAAkB,EAAE,CAAC;oBACvB,IAAI,kBAAkB,CAAC,cAAc,KAAK,eAAe,CAAC,OAAO,EAAE,CAAC;wBAClE,MAAM,CAAC,UAAU,CAAC,IAAI,CAAC;4BACrB,UAAU;4BACV,OAAO,EAAE,QAAQ,CAAC,UAAU,CAAC,kCAAkC,CAAC;yBACjE,CAAC,CAAC;oBACL,CAAC;yBAAM,IAAI,CAAC,yBAAyB,CAAC,kBAAkB,CAAC,cAAc,EAAE,OAAO,CAAC,MAAM,CAAC,EAAE,CAAC;wBACzF,MAAM,CAAC,UAAU,CAAC,IAAI,CAAC;4BACrB,UAAU;4BACV,OAAO,EAAE,QAAQ,CAAC,UAAU,CAAC,2CAA2C,EAAE;gCACxE,kBAAkB,CAAC,cAAc;gCACjC,OAAO,CAAC,MAAM;6BACf,CAAC;yBACH,CAAC,CAAC;oBACL,CAAC;yBAAM,IAAI,kBAAkB,CAAC,cAAc,KAAK,eAAe,CAAC,OAAO,EAAE,CAAC;wBACzE,MAAM,CAAC,QAAQ,CAAC,IAAI,CAAC;4BACnB,UAAU;4BACV,OAAO,EAAE,QAAQ,CAAC,UAAU,CAAC,6BAA6B,CAAC;yBAC5D,CAAC,CAAC;oBACL,CAAC;gBACH,CAAC;qBAAM,CAAC;oBACN,MAAM,CAAC,QAAQ,CAAC,IAAI,CAAC;wBACnB,UAAU;wBACV,OAAO,EAAE,QAAQ,CAAC,UAAU,CAAC,sDAAsD,CAAC;qBACrF,CAAC,CAAC;gBACL,CAAC;YACH,CAAC,CAAC,CAAC;QACL,CAAC,CAAC,CAAC;QACH,OAAO,OAAO,CAAC,OAAO,CAAC,MAAM,CAAC,CAAC;IACjC,CAAC;CACF"}
@@ -1,6 +0,0 @@
1
- import { PartialPolicyRuleResult, RuleAuditContext } from '../interfaces/policyRuleInterfaces.js';
2
- import PolicyRule, { RuleOptions } from './policyRule.js';
3
- export default class EnforceUserPermsClassificationOnProfiles extends PolicyRule {
4
- constructor(opts: RuleOptions);
5
- run(context: RuleAuditContext): Promise<PartialPolicyRuleResult>;
6
- }
@@ -1 +0,0 @@
1
- {"version":3,"file":"enforceUserPermsClassificationOnProfiles.js","sourceRoot":"","sources":["../../../../src/libs/policies/rules/enforceUserPermsClassificationOnProfiles.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,QAAQ,EAAE,MAAM,kBAAkB,CAAC;AAC5C,OAAO,EAAE,SAAS,EAAE,MAAM,gBAAgB,CAAC;AAE3C,OAAO,EAAE,yBAAyB,EAAE,eAAe,EAAE,MAAM,aAAa,CAAC;AAEzE,OAAO,UAA2B,MAAM,iBAAiB,CAAC;AAE1D,MAAM,QAAQ,GAAG,QAAQ,CAAC,YAAY,CAAC,oCAAoC,EAAE,oCAAoC,CAAC,CAAC;AAEnH,MAAM,CAAC,OAAO,OAAO,wCAAyC,SAAQ,UAAU;IAC9E,YAAmB,IAAiB;QAClC,KAAK,CAAC,IAAI,CAAC,CAAC;IACd,CAAC;IAEM,GAAG,CAAC,OAAyB;QAClC,MAAM,MAAM,GAAG,IAAI,CAAC,UAAU,EAAE,CAAC;QACjC,MAAM,gBAAgB,GAAG,OAAO,CAAC,gBAAmD,CAAC;QACrF,MAAM,CAAC,MAAM,CAAC,gBAAgB,CAAC,CAAC,OAAO,CAAC,CAAC,OAAO,EAAE,EAAE;YAClD,IAAI,CAAC,SAAS,CAAC,OAAO,CAAC,QAAQ,CAAC,eAAe,CAAC,EAAE,CAAC;gBACjD,OAAO,CAAC,QAAQ,CAAC,eAAe,CAAC,OAAO,CAAC,CAAC,QAAQ,EAAE,EAAE;oBACpD,MAAM,UAAU,GAAG,CAAC,OAAO,CAAC,IAAI,EAAE,QAAQ,CAAC,IAAI,CAAC,CAAC;oBACjD,MAAM,kBAAkB,GAAG,IAAI,CAAC,qBAAqB,CAAC,QAAQ,CAAC,IAAI,CAAC,CAAC;oBACrE,IAAI,kBAAkB,EAAE,CAAC;wBACvB,IAAI,kBAAkB,CAAC,cAAc,KAAK,eAAe,CAAC,OAAO,EAAE,CAAC;4BAClE,MAAM,CAAC,UAAU,CAAC,IAAI,CAAC;gCACrB,UAAU;gCACV,OAAO,EAAE,QAAQ,CAAC,UAAU,CAAC,kCAAkC,CAAC;6BACjE,CAAC,CAAC;wBACL,CAAC;6BAAM,IAAI,CAAC,yBAAyB,CAAC,kBAAkB,CAAC,cAAc,EAAE,OAAO,CAAC,MAAM,CAAC,EAAE,CAAC;4BACzF,MAAM,CAAC,UAAU,CAAC,IAAI,CAAC;gCACrB,UAAU;gCACV,OAAO,EAAE,QAAQ,CAAC,UAAU,CAAC,2CAA2C,EAAE;oCACxE,kBAAkB,CAAC,cAAc;oCACjC,OAAO,CAAC,MAAM;iCACf,CAAC;6BACH,CAAC,CAAC;wBACL,CAAC;6BAAM,IAAI,kBAAkB,CAAC,cAAc,KAAK,eAAe,CAAC,OAAO,EAAE,CAAC;4BACzE,MAAM,CAAC,QAAQ,CAAC,IAAI,CAAC;gCACnB,UAAU;gCACV,OAAO,EAAE,QAAQ,CAAC,UAAU,CAAC,6BAA6B,CAAC;6BAC5D,CAAC,CAAC;wBACL,CAAC;oBACH,CAAC;yBAAM,CAAC;wBACN,MAAM,CAAC,QAAQ,CAAC,IAAI,CAAC;4BACnB,UAAU;4BACV,OAAO,EAAE,QAAQ,CAAC,UAAU,CAAC,+CAA+C,CAAC;yBAC9E,CAAC,CAAC;oBACL,CAAC;gBACH,CAAC,CAAC,CAAC;YACL,CAAC;QACH,CAAC,CAAC,CAAC;QACH,OAAO,OAAO,CAAC,OAAO,CAAC,MAAM,CAAC,CAAC;IACjC,CAAC;CACF"}
@@ -1,6 +0,0 @@
1
- import { PartialPolicyRuleResult, RuleAuditContext } from '../interfaces/policyRuleInterfaces.js';
2
- import PolicyRule, { RuleOptions } from './policyRule.js';
3
- export default class NoUserCanSelfAuthorize extends PolicyRule {
4
- constructor(opts: RuleOptions);
5
- run(context: RuleAuditContext): Promise<PartialPolicyRuleResult>;
6
- }
@@ -1 +0,0 @@
1
- {"version":3,"file":"noUserCanSelfAuthorize.js","sourceRoot":"","sources":["../../../../src/libs/policies/rules/noUserCanSelfAuthorize.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,QAAQ,EAAE,MAAM,kBAAkB,CAAC;AAG5C,OAAO,UAA2B,MAAM,iBAAiB,CAAC;AAE1D,QAAQ,CAAC,kCAAkC,CAAC,MAAM,CAAC,IAAI,CAAC,GAAG,CAAC,CAAC;AAC7D,MAAM,QAAQ,GAAG,QAAQ,CAAC,YAAY,CAAC,oCAAoC,EAAE,qBAAqB,CAAC,CAAC;AAEpG,MAAM,CAAC,OAAO,OAAO,sBAAuB,SAAQ,UAAU;IAC5D,YAAmB,IAAiB;QAClC,KAAK,CAAC,IAAI,CAAC,CAAC;IACd,CAAC;IAEM,GAAG,CAAC,OAAyB;QAClC,MAAM,MAAM,GAAG,IAAI,CAAC,UAAU,EAAE,CAAC;QACjC,MAAM,qBAAqB,GAAG,OAAO,CAAC,gBAAwD,CAAC;QAC/F,MAAM,CAAC,MAAM,CAAC,qBAAqB,CAAC,CAAC,OAAO,CAAC,CAAC,GAAG,EAAE,EAAE;YACnD,IAAI,CAAC,GAAG,CAAC,6BAA6B,EAAE,CAAC;gBACvC,IAAI,GAAG,CAAC,2BAA2B,EAAE,CAAC;oBACpC,MAAM,CAAC,QAAQ,CAAC,IAAI,CAAC;wBACnB,UAAU,EAAE,CAAC,GAAG,CAAC,IAAI,CAAC;wBACtB,OAAO,EAAE,QAAQ,CAAC,UAAU,CAAC,yDAAyD,CAAC;qBACxF,CAAC,CAAC;gBACL,CAAC;qBAAM,CAAC;oBACN,MAAM,CAAC,UAAU,CAAC,IAAI,CAAC;wBACrB,UAAU,EAAE,CAAC,GAAG,CAAC,IAAI,CAAC;wBACtB,OAAO,EAAE,QAAQ,CAAC,UAAU,CAAC,qCAAqC,CAAC;qBACpE,CAAC,CAAC;gBACL,CAAC;YACH,CAAC;QACH,CAAC,CAAC,CAAC;QACH,OAAO,OAAO,CAAC,OAAO,CAAC,MAAM,CAAC,CAAC;IACjC,CAAC;CACF"}
@@ -1 +0,0 @@
1
- {"version":3,"file":"policyRule.js","sourceRoot":"","sources":["../../../../src/libs/policies/rules/policyRule.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,QAAQ,EAAE,MAAM,kBAAkB,CAAC;AAS5C,QAAQ,CAAC,kCAAkC,CAAC,MAAM,CAAC,IAAI,CAAC,GAAG,CAAC,CAAC;AAQ7D,MAAM,CAAC,OAAO,OAAgB,UAAU;IAC/B,YAAY,CAAiB;IAC7B,eAAe,CAAS;IAE/B,YAAmB,IAAiB;QAClC,IAAI,CAAC,YAAY,GAAG,IAAI,CAAC,YAAY,CAAC;QACtC,IAAI,CAAC,eAAe,GAAG,IAAI,CAAC,eAAe,CAAC;IAC9C,CAAC;IAES,UAAU;QAClB,OAAO;YACL,QAAQ,EAAE,IAAI,CAAC,eAAe;YAC9B,UAAU,EAAE,IAAI,KAAK,EAAuB;YAC5C,eAAe,EAAE,IAAI,KAAK,EAA2B;YACrD,QAAQ,EAAE,IAAI,KAAK,EAAwB;YAC3C,MAAM,EAAE,IAAI,KAAK,EAAwB;SAC1C,CAAC;IACJ,CAAC;IAES,qBAAqB,CAAC,QAAgB;QAC9C,OAAO,kBAAkB,CACvB,QAAQ,EACR,IAAI,CAAC,YAAY,CAAC,eAAe,CAAC,eAAe,EAAE,OAAO,CAAC,WAAW,CAAC,QAAQ,CAAC,CACjF,CAAC;IACJ,CAAC;IAES,uBAAuB,CAAC,QAAgB;QAChD,OAAO,kBAAkB,CACvB,QAAQ,EACR,IAAI,CAAC,YAAY,CAAC,eAAe,CAAC,iBAAiB,EAAE,OAAO,CAAC,WAAW,CAAC,QAAQ,CAAC,CACnF,CAAC;IACJ,CAAC;CAGF;AAED,SAAS,kBAAkB,CACzB,QAAgB,EAChB,IAAgC;IAEhC,OAAO,IAAI,CAAC,CAAC,CAAC,EAAE,IAAI,EAAE,QAAQ,EAAE,GAAG,IAAI,EAAE,CAAC,CAAC,CAAC,SAAS,CAAC;AACxD,CAAC"}
@@ -1,36 +0,0 @@
1
- export declare enum PolicyRiskLevel {
2
- /** Blacklisted permissions that are considered too critical and not allowed */
3
- BLOCKED = "Blocked",
4
- /** Developer permissions, allow to modify the application */
5
- CRITICAL = "Critical",
6
- /** Admin permissions, allow to manage users and change permissions */
7
- HIGH = "High",
8
- /** Elevated business permissions for privileged users */
9
- MEDIUM = "Medium",
10
- /** Regular user permissions, typically needed for day-to-day work */
11
- LOW = "Low",
12
- /** Not categorized or unknown permission */
13
- UNKNOWN = "Unknown"
14
- }
15
- /**
16
- * Presets can be assigned to profiles and permission sets.
17
- * A preset allows permissions up to a fixed risk level.
18
- */
19
- export declare enum PermissionRiskLevelPresets {
20
- /** Allows up to "Critical" permissions */
21
- DEVELOPER = "Developer",
22
- /** Allows up to "High" permissions */
23
- ADMIN = "Admin",
24
- /** Allows up to "Medium" permissions */
25
- POWER_USER = "Power User",
26
- /** Allows only "Low" permissions */
27
- STANDARD_USER = "Standard User",
28
- /** Disables the profile for audit */
29
- UNKNOWN = "Unknown"
30
- }
31
- export type PolicyWriteResult = {
32
- paths: Record<string, string>;
33
- };
34
- export declare function resolveRiskLevelOrdinalValue(value: string): number;
35
- export declare function resolvePresetOrdinalValue(value: string): number;
36
- export declare function permissionAllowedInPreset(permClassification: string, preset: string): boolean;
@@ -1,45 +0,0 @@
1
- export var PolicyRiskLevel;
2
- (function (PolicyRiskLevel) {
3
- /** Blacklisted permissions that are considered too critical and not allowed */
4
- PolicyRiskLevel["BLOCKED"] = "Blocked";
5
- /** Developer permissions, allow to modify the application */
6
- PolicyRiskLevel["CRITICAL"] = "Critical";
7
- /** Admin permissions, allow to manage users and change permissions */
8
- PolicyRiskLevel["HIGH"] = "High";
9
- /** Elevated business permissions for privileged users */
10
- PolicyRiskLevel["MEDIUM"] = "Medium";
11
- /** Regular user permissions, typically needed for day-to-day work */
12
- PolicyRiskLevel["LOW"] = "Low";
13
- /** Not categorized or unknown permission */
14
- PolicyRiskLevel["UNKNOWN"] = "Unknown";
15
- })(PolicyRiskLevel || (PolicyRiskLevel = {}));
16
- /**
17
- * Presets can be assigned to profiles and permission sets.
18
- * A preset allows permissions up to a fixed risk level.
19
- */
20
- export var PermissionRiskLevelPresets;
21
- (function (PermissionRiskLevelPresets) {
22
- /** Allows up to "Critical" permissions */
23
- PermissionRiskLevelPresets["DEVELOPER"] = "Developer";
24
- /** Allows up to "High" permissions */
25
- PermissionRiskLevelPresets["ADMIN"] = "Admin";
26
- /** Allows up to "Medium" permissions */
27
- PermissionRiskLevelPresets["POWER_USER"] = "Power User";
28
- /** Allows only "Low" permissions */
29
- PermissionRiskLevelPresets["STANDARD_USER"] = "Standard User";
30
- /** Disables the profile for audit */
31
- PermissionRiskLevelPresets["UNKNOWN"] = "Unknown";
32
- })(PermissionRiskLevelPresets || (PermissionRiskLevelPresets = {}));
33
- export function resolveRiskLevelOrdinalValue(value) {
34
- return Object.keys(PolicyRiskLevel).indexOf(value.toUpperCase());
35
- }
36
- export function resolvePresetOrdinalValue(value) {
37
- return Object.keys(PermissionRiskLevelPresets).indexOf(value.toUpperCase().replace(' ', '_'));
38
- }
39
- export function permissionAllowedInPreset(permClassification, preset) {
40
- // this works, as long as we are mindful when adding new risk levels and presets
41
- const invertedPermValue = Object.keys(PolicyRiskLevel).length - resolveRiskLevelOrdinalValue(permClassification);
42
- const invertedPresetValue = Object.keys(PermissionRiskLevelPresets).length - resolvePresetOrdinalValue(preset);
43
- return invertedPresetValue >= invertedPermValue;
44
- }
45
- //# sourceMappingURL=types.js.map
@@ -1 +0,0 @@
1
- {"version":3,"file":"types.js","sourceRoot":"","sources":["../../../src/libs/policies/types.ts"],"names":[],"mappings":"AAAA,MAAM,CAAN,IAAY,eAaX;AAbD,WAAY,eAAe;IACzB,+EAA+E;IAC/E,sCAAmB,CAAA;IACnB,6DAA6D;IAC7D,wCAAqB,CAAA;IACrB,sEAAsE;IACtE,gCAAa,CAAA;IACb,yDAAyD;IACzD,oCAAiB,CAAA;IACjB,qEAAqE;IACrE,8BAAW,CAAA;IACX,4CAA4C;IAC5C,sCAAmB,CAAA;AACrB,CAAC,EAbW,eAAe,KAAf,eAAe,QAa1B;AAED;;;GAGG;AACH,MAAM,CAAN,IAAY,0BAWX;AAXD,WAAY,0BAA0B;IACpC,0CAA0C;IAC1C,qDAAuB,CAAA;IACvB,sCAAsC;IACtC,6CAAe,CAAA;IACf,wCAAwC;IACxC,uDAAyB,CAAA;IACzB,oCAAoC;IACpC,6DAA+B,CAAA;IAC/B,qCAAqC;IACrC,iDAAmB,CAAA;AACrB,CAAC,EAXW,0BAA0B,KAA1B,0BAA0B,QAWrC;AAMD,MAAM,UAAU,4BAA4B,CAAC,KAAa;IACxD,OAAO,MAAM,CAAC,IAAI,CAAC,eAAe,CAAC,CAAC,OAAO,CAAC,KAAK,CAAC,WAAW,EAAE,CAAC,CAAC;AACnE,CAAC;AAED,MAAM,UAAU,yBAAyB,CAAC,KAAa;IACrD,OAAO,MAAM,CAAC,IAAI,CAAC,0BAA0B,CAAC,CAAC,OAAO,CAAC,KAAK,CAAC,WAAW,EAAE,CAAC,OAAO,CAAC,GAAG,EAAE,GAAG,CAAC,CAAC,CAAC;AAChG,CAAC;AAED,MAAM,UAAU,yBAAyB,CAAC,kBAA0B,EAAE,MAAc;IAClF,gFAAgF;IAChF,MAAM,iBAAiB,GAAG,MAAM,CAAC,IAAI,CAAC,eAAe,CAAC,CAAC,MAAM,GAAG,4BAA4B,CAAC,kBAAkB,CAAC,CAAC;IACjH,MAAM,mBAAmB,GAAG,MAAM,CAAC,IAAI,CAAC,0BAA0B,CAAC,CAAC,MAAM,GAAG,yBAAyB,CAAC,MAAM,CAAC,CAAC;IAC/G,OAAO,mBAAmB,IAAI,iBAAiB,CAAC;AAClD,CAAC"}
package/lib/libs/utils.js DELETED
@@ -1,7 +0,0 @@
1
- export function isEmpty(anyRecord) {
2
- return isNullish(anyRecord) || Object.entries(anyRecord).length === 0;
3
- }
4
- export function isNullish(anything) {
5
- return !(Boolean(anything) && anything !== null);
6
- }
7
- //# sourceMappingURL=utils.js.map
@@ -1 +0,0 @@
1
- {"version":3,"file":"utils.js","sourceRoot":"","sources":["../../src/libs/utils.ts"],"names":[],"mappings":"AAAA,MAAM,UAAU,OAAO,CAAC,SAAmC;IACzD,OAAO,SAAS,CAAC,SAAS,CAAC,IAAI,MAAM,CAAC,OAAO,CAAC,SAAU,CAAC,CAAC,MAAM,KAAK,CAAC,CAAC;AACzE,CAAC;AAED,MAAM,UAAU,SAAS,CAAC,QAAiB;IACzC,OAAO,CAAC,CAAC,OAAO,CAAC,QAAQ,CAAC,IAAI,QAAQ,KAAK,IAAI,CAAC,CAAC;AACnD,CAAC"}