@j-schreiber/sf-cli-security-audit 0.8.4 → 0.9.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +3 -3
- package/lib/commands/org/audit/run.js +1 -1
- package/lib/commands/org/audit/run.js.map +1 -1
- package/lib/libs/conf-init/auditConfig.js +2 -1
- package/lib/libs/conf-init/auditConfig.js.map +1 -1
- package/lib/libs/conf-init/policyConfigs.d.ts +6 -0
- package/lib/libs/conf-init/policyConfigs.js +14 -0
- package/lib/libs/conf-init/policyConfigs.js.map +1 -1
- package/lib/libs/core/auditRun.d.ts +2 -0
- package/lib/libs/core/auditRun.js +6 -1
- package/lib/libs/core/auditRun.js.map +1 -1
- package/lib/libs/core/file-mgmt/schema.d.ts +1 -0
- package/lib/libs/core/file-mgmt/schema.js.map +1 -1
- package/lib/libs/core/mdapi/anySettingsMetadata.d.ts +25 -0
- package/lib/libs/core/mdapi/anySettingsMetadata.js +59 -0
- package/lib/libs/core/mdapi/anySettingsMetadata.js.map +1 -0
- package/lib/libs/core/policies/policy.d.ts +2 -1
- package/lib/libs/core/policies/policy.js +9 -4
- package/lib/libs/core/policies/policy.js.map +1 -1
- package/lib/libs/core/policies/settingsPolicy.d.ts +11 -0
- package/lib/libs/core/policies/settingsPolicy.js +81 -0
- package/lib/libs/core/policies/settingsPolicy.js.map +1 -0
- package/lib/libs/core/policyRegistry.js +5 -0
- package/lib/libs/core/policyRegistry.js.map +1 -1
- package/lib/libs/core/registries/rules/enforceSettings.d.ts +13 -0
- package/lib/libs/core/registries/rules/enforceSettings.js +57 -0
- package/lib/libs/core/registries/rules/enforceSettings.js.map +1 -0
- package/lib/libs/core/registries/settings.d.ts +8 -0
- package/lib/libs/core/registries/settings.js +51 -0
- package/lib/libs/core/registries/settings.js.map +1 -0
- package/lib/libs/core/registries/types.d.ts +1 -0
- package/lib/libs/core/registries/types.js +2 -0
- package/lib/libs/core/registries/types.js.map +1 -1
- package/lib/ux/auditRunMultiStage.d.ts +1 -1
- package/lib/ux/auditRunMultiStage.js +12 -9
- package/lib/ux/auditRunMultiStage.js.map +1 -1
- package/messages/policies.general.md +12 -0
- package/messages/rules.settings.md +7 -0
- package/oclif.lock +1407 -1802
- package/oclif.manifest.json +1 -1
- package/package.json +20 -18
|
@@ -0,0 +1,51 @@
|
|
|
1
|
+
import z from 'zod';
|
|
2
|
+
import { Messages } from '@salesforce/core';
|
|
3
|
+
import RuleRegistry from './ruleRegistry.js';
|
|
4
|
+
import EnforceSettings from './rules/enforceSettings.js';
|
|
5
|
+
Messages.importMessagesDirectoryFromMetaUrl(import.meta.url);
|
|
6
|
+
const messages = Messages.loadMessages('@j-schreiber/sf-cli-security-audit', 'policies.general');
|
|
7
|
+
export default class SettingsRuleRegistry extends RuleRegistry {
|
|
8
|
+
constructor() {
|
|
9
|
+
super({});
|
|
10
|
+
}
|
|
11
|
+
// eslint-disable-next-line class-methods-use-this
|
|
12
|
+
resolveRules(ruleObjs, auditContext) {
|
|
13
|
+
const result = { enabledRules: [], skippedRules: [], resolveErrors: [] };
|
|
14
|
+
Object.entries(ruleObjs).forEach(([ruleName, ruleConfig]) => {
|
|
15
|
+
const settingName = findSettingsName(ruleName);
|
|
16
|
+
if (settingName && ruleConfig.enabled) {
|
|
17
|
+
result.enabledRules.push(new EnforceSettings({
|
|
18
|
+
auditContext,
|
|
19
|
+
ruleDisplayName: ruleName,
|
|
20
|
+
settingName,
|
|
21
|
+
ruleConfig: parseRuleConfig(ruleConfig.options),
|
|
22
|
+
}));
|
|
23
|
+
}
|
|
24
|
+
else if (!ruleConfig.enabled) {
|
|
25
|
+
result.skippedRules.push({ name: ruleName, skipReason: messages.getMessage('skip-reason.rule-not-enabled') });
|
|
26
|
+
}
|
|
27
|
+
else {
|
|
28
|
+
result.skippedRules.push({
|
|
29
|
+
name: ruleName,
|
|
30
|
+
skipReason: messages.getMessage('resolve-error.no-valid-settings-rule'),
|
|
31
|
+
});
|
|
32
|
+
}
|
|
33
|
+
});
|
|
34
|
+
return result;
|
|
35
|
+
}
|
|
36
|
+
}
|
|
37
|
+
function parseRuleConfig(ruleConfig) {
|
|
38
|
+
if (ruleConfig) {
|
|
39
|
+
return SettingsRuleConfigSchema.parse(ruleConfig);
|
|
40
|
+
}
|
|
41
|
+
else {
|
|
42
|
+
return {};
|
|
43
|
+
}
|
|
44
|
+
}
|
|
45
|
+
export function findSettingsName(ruleName) {
|
|
46
|
+
const match = /^Enforce(.+)Settings$/.exec(ruleName);
|
|
47
|
+
return match ? match[1] : null;
|
|
48
|
+
}
|
|
49
|
+
const SettingsRuleConfigSchema = z.record(z.string(), z.unknown());
|
|
50
|
+
export const SettingsRegistry = new SettingsRuleRegistry();
|
|
51
|
+
//# sourceMappingURL=settings.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"settings.js","sourceRoot":"","sources":["../../../../src/libs/core/registries/settings.ts"],"names":[],"mappings":"AAAA,OAAO,CAAC,MAAM,KAAK,CAAC;AACpB,OAAO,EAAE,QAAQ,EAAE,MAAM,kBAAkB,CAAC;AAE5C,OAAO,YAA2C,MAAM,mBAAmB,CAAC;AAC5E,OAAO,eAAe,MAAM,4BAA4B,CAAC;AAEzD,QAAQ,CAAC,kCAAkC,CAAC,MAAM,CAAC,IAAI,CAAC,GAAG,CAAC,CAAC;AAC7D,MAAM,QAAQ,GAAG,QAAQ,CAAC,YAAY,CAAC,oCAAoC,EAAE,kBAAkB,CAAC,CAAC;AAEjG,MAAM,CAAC,OAAO,OAAO,oBAAqB,SAAQ,YAAY;IAC5D;QACE,KAAK,CAAC,EAAE,CAAC,CAAC;IACZ,CAAC;IAED,kDAAkD;IAClC,YAAY,CAAC,QAAiB,EAAE,YAA4B;QAC1E,MAAM,MAAM,GAA8B,EAAE,YAAY,EAAE,EAAE,EAAE,YAAY,EAAE,EAAE,EAAE,aAAa,EAAE,EAAE,EAAE,CAAC;QACpG,MAAM,CAAC,OAAO,CAAC,QAAQ,CAAC,CAAC,OAAO,CAAC,CAAC,CAAC,QAAQ,EAAE,UAAU,CAAC,EAAE,EAAE;YAC1D,MAAM,WAAW,GAAG,gBAAgB,CAAC,QAAQ,CAAC,CAAC;YAC/C,IAAI,WAAW,IAAI,UAAU,CAAC,OAAO,EAAE,CAAC;gBACtC,MAAM,CAAC,YAAY,CAAC,IAAI,CACtB,IAAI,eAAe,CAAC;oBAClB,YAAY;oBACZ,eAAe,EAAE,QAAQ;oBACzB,WAAW;oBACX,UAAU,EAAE,eAAe,CAAC,UAAU,CAAC,OAAO,CAAC;iBAChD,CAAC,CACH,CAAC;YACJ,CAAC;iBAAM,IAAI,CAAC,UAAU,CAAC,OAAO,EAAE,CAAC;gBAC/B,MAAM,CAAC,YAAY,CAAC,IAAI,CAAC,EAAE,IAAI,EAAE,QAAQ,EAAE,UAAU,EAAE,QAAQ,CAAC,UAAU,CAAC,8BAA8B,CAAC,EAAE,CAAC,CAAC;YAChH,CAAC;iBAAM,CAAC;gBACN,MAAM,CAAC,YAAY,CAAC,IAAI,CAAC;oBACvB,IAAI,EAAE,QAAQ;oBACd,UAAU,EAAE,QAAQ,CAAC,UAAU,CAAC,sCAAsC,CAAC;iBACxE,CAAC,CAAC;YACL,CAAC;QACH,CAAC,CAAC,CAAC;QACH,OAAO,MAAM,CAAC;IAChB,CAAC;CACF;AAED,SAAS,eAAe,CAAC,UAAoB;IAC3C,IAAI,UAAU,EAAE,CAAC;QACf,OAAO,wBAAwB,CAAC,KAAK,CAAC,UAAU,CAAC,CAAC;IACpD,CAAC;SAAM,CAAC;QACN,OAAO,EAAE,CAAC;IACZ,CAAC;AACH,CAAC;AAED,MAAM,UAAU,gBAAgB,CAAC,QAAgB;IAC/C,MAAM,KAAK,GAAG,uBAAuB,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC;IACrD,OAAO,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,IAAI,CAAC;AACjC,CAAC;AAED,MAAM,wBAAwB,GAAG,CAAC,CAAC,MAAM,CAAC,CAAC,CAAC,MAAM,EAAE,EAAE,CAAC,CAAC,OAAO,EAAE,CAAC,CAAC;AAEnE,MAAM,CAAC,MAAM,gBAAgB,GAAG,IAAI,oBAAoB,EAAE,CAAC"}
|
|
@@ -6,6 +6,7 @@ export declare const RuleRegistries: {
|
|
|
6
6
|
Profiles: import("./profiles.js").default;
|
|
7
7
|
PermissionSets: import("./permissionSets.js").default;
|
|
8
8
|
Users: import("./users.js").default;
|
|
9
|
+
Settings: import("./settings.js").default;
|
|
9
10
|
};
|
|
10
11
|
export type Constructor<T, Args extends any[] = any[]> = new (...args: Args) => T;
|
|
11
12
|
/**
|
|
@@ -2,10 +2,12 @@ import { ConnectedAppsRegistry } from './connectedApps.js';
|
|
|
2
2
|
import { PermissionSetsRegistry } from './permissionSets.js';
|
|
3
3
|
import { ProfilesRegistry } from './profiles.js';
|
|
4
4
|
import { UsersRegistry } from './users.js';
|
|
5
|
+
import { SettingsRegistry } from './settings.js';
|
|
5
6
|
export const RuleRegistries = {
|
|
6
7
|
ConnectedApps: ConnectedAppsRegistry,
|
|
7
8
|
Profiles: ProfilesRegistry,
|
|
8
9
|
PermissionSets: PermissionSetsRegistry,
|
|
9
10
|
Users: UsersRegistry,
|
|
11
|
+
Settings: SettingsRegistry,
|
|
10
12
|
};
|
|
11
13
|
//# sourceMappingURL=types.js.map
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"types.js","sourceRoot":"","sources":["../../../../src/libs/core/registries/types.ts"],"names":[],"mappings":"AAGA,OAAO,EAAE,qBAAqB,EAAE,MAAM,oBAAoB,CAAC;AAC3D,OAAO,EAAE,sBAAsB,EAAE,MAAM,qBAAqB,CAAC;AAC7D,OAAO,EAAE,gBAAgB,EAAE,MAAM,eAAe,CAAC;AACjD,OAAO,EAAE,aAAa,EAAE,MAAM,YAAY,CAAC;
|
|
1
|
+
{"version":3,"file":"types.js","sourceRoot":"","sources":["../../../../src/libs/core/registries/types.ts"],"names":[],"mappings":"AAGA,OAAO,EAAE,qBAAqB,EAAE,MAAM,oBAAoB,CAAC;AAC3D,OAAO,EAAE,sBAAsB,EAAE,MAAM,qBAAqB,CAAC;AAC7D,OAAO,EAAE,gBAAgB,EAAE,MAAM,eAAe,CAAC;AACjD,OAAO,EAAE,aAAa,EAAE,MAAM,YAAY,CAAC;AAC3C,OAAO,EAAE,gBAAgB,EAAE,MAAM,eAAe,CAAC;AAEjD,MAAM,CAAC,MAAM,cAAc,GAAG;IAC5B,aAAa,EAAE,qBAAqB;IACpC,QAAQ,EAAE,gBAAgB;IAC1B,cAAc,EAAE,sBAAsB;IACtC,KAAK,EAAE,aAAa;IACpB,QAAQ,EAAE,gBAAgB;CAC3B,CAAC"}
|
|
@@ -47,7 +47,7 @@ export default class AuditRunMultiStageOutput {
|
|
|
47
47
|
static create(opts: AuditRunStageOptions): AuditRunMultiStageOutput;
|
|
48
48
|
start(): void;
|
|
49
49
|
startPolicyResolve(runInstance: AuditRun): void;
|
|
50
|
-
startRuleExecution(): void;
|
|
50
|
+
startRuleExecution(runInstance: AuditRun): void;
|
|
51
51
|
finish(): void;
|
|
52
52
|
private addPolicyStatsListener;
|
|
53
53
|
}
|
|
@@ -77,20 +77,23 @@ export default class AuditRunMultiStageOutput {
|
|
|
77
77
|
}
|
|
78
78
|
},
|
|
79
79
|
});
|
|
80
|
-
if (policy.content.rules && Object.keys(policy.content.rules).length > 0) {
|
|
81
|
-
const enabledRules = Object.values(policy.content.rules).filter((ruleConfig) => ruleConfig.enabled).length;
|
|
82
|
-
this.stageSpecificBlocks.push({
|
|
83
|
-
stage: EXECUTE_RULES,
|
|
84
|
-
type: 'message',
|
|
85
|
-
get: () => `Execute ${enabledRules} rule(s) for ${policyName}`,
|
|
86
|
-
});
|
|
87
|
-
}
|
|
88
80
|
}
|
|
89
81
|
});
|
|
90
82
|
this.mso.updateData({});
|
|
91
83
|
}
|
|
92
|
-
startRuleExecution() {
|
|
84
|
+
startRuleExecution(runInstance) {
|
|
93
85
|
this.mso.goto(EXECUTE_RULES, { currentStatus: 'Executing' });
|
|
86
|
+
Object.entries(runInstance.configs.policies).forEach(([policyName, policy]) => {
|
|
87
|
+
if (policy.content.enabled) {
|
|
88
|
+
const enabledRules = runInstance.getExecutableRulesCount(policyName);
|
|
89
|
+
this.stageSpecificBlocks.push({
|
|
90
|
+
stage: EXECUTE_RULES,
|
|
91
|
+
type: 'message',
|
|
92
|
+
get: () => `${enabledRules} rule(s) for ${capitalize(policyName)}`,
|
|
93
|
+
});
|
|
94
|
+
}
|
|
95
|
+
});
|
|
96
|
+
this.mso.updateData({});
|
|
94
97
|
}
|
|
95
98
|
finish() {
|
|
96
99
|
this.mso.goto(FINALISE, { currentStatus: 'Completed' });
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"auditRunMultiStage.js","sourceRoot":"","sources":["../../src/ux/auditRunMultiStage.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,gBAAgB,EAA2B,MAAM,2BAA2B,CAAC;AAEtF,OAAO,EAAE,UAAU,EAAE,MAAM,uBAAuB,CAAC;
|
|
1
|
+
{"version":3,"file":"auditRunMultiStage.js","sourceRoot":"","sources":["../../src/ux/auditRunMultiStage.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,gBAAgB,EAA2B,MAAM,2BAA2B,CAAC;AAEtF,OAAO,EAAE,UAAU,EAAE,MAAM,uBAAuB,CAAC;AAGnD,MAAM,CAAC,MAAM,iBAAiB,GAAG,sBAAsB,CAAC;AACxD,MAAM,CAAC,MAAM,gBAAgB,GAAG,oBAAoB,CAAC;AACrD,MAAM,CAAC,MAAM,aAAa,GAAG,iBAAiB,CAAC;AAC/C,MAAM,CAAC,MAAM,QAAQ,GAAG,oBAAoB,CAAC;AAmB7C,MAAM,CAAC,OAAO,OAAO,wBAAwB;IACpC,GAAG,CAAiC;IACpC,mBAAmB,CAAsC;IACxD,QAAQ,CAAmB;IAEnC,YAAmB,IAA2C;QAC5D,IAAI,CAAC,mBAAmB,GAAG,IAAI,CAAC,kBAAyD,CAAC;QAC1F,IAAI,CAAC,GAAG,GAAG,wBAAwB,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC;QACjD,IAAI,CAAC,QAAQ,GAAG,EAAE,CAAC;IACrB,CAAC;IAED;;;;;OAKG;IACI,MAAM,CAAC,MAAM,CAAC,IAA2C;QAC9D,OAAO,IAAI,gBAAgB,CAAe,IAAI,CAAC,CAAC;IAClD,CAAC;IAED;;;;;;;;;;;;OAYG;IACI,MAAM,CAAC,MAAM,CAAC,IAA0B;QAC7C,OAAO,IAAI,wBAAwB,CAAC;YAClC,WAAW,EAAE,IAAI,CAAC,WAAW,IAAI,KAAK;YACtC,MAAM,EAAE,CAAC,iBAAiB,EAAE,gBAAgB,EAAE,aAAa,EAAE,QAAQ,CAAC;YACtE,KAAK,EAAE,cAAc;YACrB,cAAc,EAAE;gBACd;oBACE,IAAI,EAAE,SAAS;oBACf,GAAG,EAAE,GAAG,EAAE,CAAC,YAAY,IAAI,CAAC,SAAS,qBAAqB,IAAI,CAAC,iBAAiB,EAAE;iBACnF;aACF;YACD,eAAe,EAAE;gBACf;oBACE,IAAI,EAAE,kBAAkB;oBACxB,KAAK,EAAE,QAAQ;oBACf,GAAG,EAAE,CAAC,IAAI,EAAE,EAAE,CAAC,IAAI,EAAE,aAAa;iBACnC;aACF;YACD,kBAAkB,EAAE,EAAE;SACvB,CAAC,CAAC;IACL,CAAC;IAEM,KAAK;QACV,IAAI,CAAC,GAAG,CAAC,IAAI,CAAC,iBAAiB,EAAE,EAAE,aAAa,EAAE,cAAc,EAAE,CAAC,CAAC;IACtE,CAAC;IAEM,kBAAkB,CAAC,WAAqB;QAC7C,IAAI,CAAC,GAAG,CAAC,IAAI,CAAC,gBAAgB,EAAE,EAAE,aAAa,EAAE,WAAW,EAAE,CAAC,CAAC;QAChE,MAAM,CAAC,OAAO,CAAC,WAAW,CAAC,OAAO,CAAC,QAAQ,CAAC,CAAC,OAAO,CAAC,CAAC,CAAC,UAAU,EAAE,MAAM,CAAC,EAAE,EAAE;YAC5E,IAAI,MAAM,CAAC,OAAO,CAAC,OAAO,EAAE,CAAC;gBAC3B,IAAI,CAAC,sBAAsB,CAAC,UAAU,EAAE,WAAW,CAAC,CAAC;gBACrD,IAAI,CAAC,mBAAmB,CAAC,IAAI,CAAC;oBAC5B,KAAK,EAAE,gBAAgB;oBACvB,IAAI,EAAE,mBAAmB;oBACzB,KAAK,EAAE,UAAU,CAAC,UAAU,CAAC;oBAC7B,GAAG,EAAE,CAAC,IAAkB,EAAU,EAAE;wBAClC,IAAI,IAAI,EAAE,QAAQ,EAAE,CAAC,UAAU,CAAC,EAAE,CAAC;4BACjC,OAAO,GAAG,IAAI,CAAC,QAAQ,CAAC,UAAU,CAAC,CAAC,QAAQ,IAAI,CAAC,IAAI,IAAI,CAAC,QAAQ,CAAC,UAAU,CAAC,CAAC,KAAK,IAAI,CAAC,EAAE,CAAC;wBAC9F,CAAC;6BAAM,CAAC;4BACN,OAAO,EAAE,CAAC;wBACZ,CAAC;oBACH,CAAC;iBACF,CAAC,CAAC;YACL,CAAC;QACH,CAAC,CAAC,CAAC;QACH,IAAI,CAAC,GAAG,CAAC,UAAU,CAAC,EAAE,CAAC,CAAC;IAC1B,CAAC;IAEM,kBAAkB,CAAC,WAAqB;QAC7C,IAAI,CAAC,GAAG,CAAC,IAAI,CAAC,aAAa,EAAE,EAAE,aAAa,EAAE,WAAW,EAAE,CAAC,CAAC;QAC7D,MAAM,CAAC,OAAO,CAAC,WAAW,CAAC,OAAO,CAAC,QAAQ,CAAC,CAAC,OAAO,CAAC,CAAC,CAAC,UAAU,EAAE,MAAM,CAAC,EAAE,EAAE;YAC5E,IAAI,MAAM,CAAC,OAAO,CAAC,OAAO,EAAE,CAAC;gBAC3B,MAAM,YAAY,GAAG,WAAW,CAAC,uBAAuB,CAAC,UAAyB,CAAC,CAAC;gBACpF,IAAI,CAAC,mBAAmB,CAAC,IAAI,CAAC;oBAC5B,KAAK,EAAE,aAAa;oBACpB,IAAI,EAAE,SAAS;oBACf,GAAG,EAAE,GAAG,EAAE,CAAC,GAAG,YAAY,gBAAgB,UAAU,CAAC,UAAU,CAAC,EAAE;iBACnE,CAAC,CAAC;YACL,CAAC;QACH,CAAC,CAAC,CAAC;QACH,IAAI,CAAC,GAAG,CAAC,UAAU,CAAC,EAAE,CAAC,CAAC;IAC1B,CAAC;IAEM,MAAM;QACX,IAAI,CAAC,GAAG,CAAC,IAAI,CAAC,QAAQ,EAAE,EAAE,aAAa,EAAE,WAAW,EAAE,CAAC,CAAC;QACxD,IAAI,CAAC,GAAG,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC;IAC7B,CAAC;IAEO,sBAAsB,GAAG,CAAC,UAAkB,EAAE,WAAqB,EAAQ,EAAE;QACnF,2EAA2E;QAC3E,oEAAoE;QACpE,qFAAqF;QACrF,4DAA4D;QAC5D,WAAW,CAAC,WAAW,CAAC,iBAAiB,UAAU,EAAE,EAAE,CAAC,IAAwB,EAAE,EAAE;YAClF,IAAI,IAAI,CAAC,QAAQ,CAAC,UAAU,CAAC,EAAE,CAAC;gBAC9B,IAAI,IAAI,CAAC,QAAQ,EAAE,CAAC;oBAClB,IAAI,CAAC,QAAQ,CAAC,UAAU,CAAC,CAAC,QAAQ,GAAG,IAAI,CAAC,QAAQ,CAAC;gBACrD,CAAC;gBACD,IAAI,IAAI,CAAC,KAAK,EAAE,CAAC;oBACf,IAAI,CAAC,QAAQ,CAAC,UAAU,CAAC,CAAC,KAAK,GAAG,IAAI,CAAC,KAAK,CAAC;gBAC/C,CAAC;YACH,CAAC;iBAAM,CAAC;gBACN,IAAI,CAAC,QAAQ,CAAC,UAAU,CAAC,GAAG,EAAE,QAAQ,EAAE,IAAI,CAAC,QAAQ,IAAI,CAAC,EAAE,KAAK,EAAE,IAAI,CAAC,KAAK,IAAI,CAAC,EAAE,CAAC;YACvF,CAAC;YACD,IAAI,CAAC,GAAG,CAAC,UAAU,CAAC,EAAE,QAAQ,EAAE,eAAe,CAAC,IAAI,CAAC,QAAQ,CAAC,EAAE,CAAC,CAAC;QACpE,CAAC,CAAC,CAAC;IACL,CAAC,CAAC;CACH"}
|
|
@@ -18,6 +18,18 @@ Users with role UNKNOWN are ignored. To apply the default role, remove them from
|
|
|
18
18
|
|
|
19
19
|
Rule was disabled in policy config.
|
|
20
20
|
|
|
21
|
+
# skip-reason.failed-to-resolve-setting
|
|
22
|
+
|
|
23
|
+
Rule name resolved to setting "%s" which is not a valid setting on the target org.
|
|
24
|
+
|
|
21
25
|
# resolve-error.rule-not-registered
|
|
22
26
|
|
|
23
27
|
Rule was not available in registry.
|
|
28
|
+
|
|
29
|
+
# resolve-error.no-valid-settings-rule
|
|
30
|
+
|
|
31
|
+
Invalid name for rule. Must follow naming convention "Enforce<SettingsName>Settings" (e.g. EnforceSecuritySettings, EnforceApexSettings).
|
|
32
|
+
|
|
33
|
+
# resolve-error.failed-to-resolve-setting
|
|
34
|
+
|
|
35
|
+
Failed to resolve a valid setting from extracted setting name.
|