@j-schreiber/sf-cli-security-audit 0.9.1 → 0.10.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +6 -6
- package/lib/commands/org/audit/init.js +7 -6
- package/lib/commands/org/audit/init.js.map +1 -1
- package/lib/libs/conf-init/auditConfig.js +9 -6
- package/lib/libs/conf-init/auditConfig.js.map +1 -1
- package/lib/libs/conf-init/permissionsClassification.d.ts +23 -3
- package/lib/libs/conf-init/permissionsClassification.js +48 -2
- package/lib/libs/conf-init/permissionsClassification.js.map +1 -1
- package/lib/libs/conf-init/policyConfigs.d.ts +9 -25
- package/lib/libs/conf-init/policyConfigs.js +17 -75
- package/lib/libs/conf-init/policyConfigs.js.map +1 -1
- package/lib/libs/conf-init/presets/loose.d.ts +2 -2
- package/lib/libs/conf-init/presets/loose.js +2 -0
- package/lib/libs/conf-init/presets/loose.js.map +1 -1
- package/lib/libs/conf-init/presets/none.d.ts +6 -6
- package/lib/libs/conf-init/presets/none.js.map +1 -1
- package/lib/libs/conf-init/presets/strict.js +2 -0
- package/lib/libs/conf-init/presets/strict.js.map +1 -1
- package/lib/libs/core/classification-types.d.ts +2 -2
- package/lib/libs/core/classification-types.js.map +1 -1
- package/lib/libs/core/file-mgmt/schema.d.ts +58 -26
- package/lib/libs/core/file-mgmt/schema.js +20 -8
- package/lib/libs/core/file-mgmt/schema.js.map +1 -1
- package/lib/libs/core/policies/permissionSetPolicy.d.ts +5 -4
- package/lib/libs/core/policies/permissionSetPolicy.js +10 -8
- package/lib/libs/core/policies/permissionSetPolicy.js.map +1 -1
- package/lib/libs/core/policies/profilePolicy.d.ts +5 -4
- package/lib/libs/core/policies/profilePolicy.js +12 -11
- package/lib/libs/core/policies/profilePolicy.js.map +1 -1
- package/lib/libs/core/policies/userPolicy.d.ts +1 -0
- package/lib/libs/core/policies/userPolicy.js +7 -5
- package/lib/libs/core/policies/userPolicy.js.map +1 -1
- package/lib/libs/core/policy-types.d.ts +3 -3
- package/lib/libs/core/policy-types.js +12 -12
- package/lib/libs/core/policyRegistry.js +14 -5
- package/lib/libs/core/policyRegistry.js.map +1 -1
- package/lib/libs/core/registries/helpers/permissionsScanning.d.ts +2 -4
- package/lib/libs/core/registries/helpers/permissionsScanning.js +3 -3
- package/lib/libs/core/registries/helpers/permissionsScanning.js.map +1 -1
- package/lib/libs/core/registries/permissionSets.d.ts +1 -1
- package/lib/libs/core/registries/profiles.d.ts +1 -1
- package/lib/libs/core/registries/ruleRegistry.js +1 -1
- package/lib/libs/core/registries/ruleRegistry.js.map +1 -1
- package/lib/libs/core/registries/rules/enforcePermissionPresets.js +6 -6
- package/lib/libs/core/registries/rules/enforcePermissionPresets.js.map +1 -1
- package/lib/libs/core/registries/rules/enforcePermissionsOnUser.js +2 -2
- package/lib/libs/core/registries/rules/enforcePermissionsOnUser.js.map +1 -1
- package/lib/libs/core/registries/rules/noOtherApexApiLogins.js +1 -1
- package/lib/libs/core/registries/rules/noOtherApexApiLogins.js.map +1 -1
- package/lib/libs/core/registries/types.d.ts +5 -5
- package/lib/libs/core/registries/types.js +5 -5
- package/lib/libs/core/registries/users.d.ts +2 -2
- package/messages/org.audit.init.md +2 -2
- package/messages/org.audit.run.md +4 -0
- package/oclif.manifest.json +1 -1
- package/package.json +3 -3
package/README.md
CHANGED
|
@@ -1,8 +1,8 @@
|
|
|
1
1
|
# @j-schreiber/sf-cli-security-audit
|
|
2
2
|
|
|
3
|
-
> This plugin is still in beta and under active development. Command signatures
|
|
3
|
+
> This plugin is still in beta and under active development. Command signatures and directory structures can change.
|
|
4
4
|
|
|
5
|
-
|
|
5
|
+
To go beyond command signatures and learn about the concepts, design decisions, and a variety of use cases [see the official docs](https://securityauditengine.org/docs).
|
|
6
6
|
|
|
7
7
|
# Installation
|
|
8
8
|
|
|
@@ -23,7 +23,7 @@ sf plugins install @j-schreiber/sf-cli-security-audit
|
|
|
23
23
|
|
|
24
24
|
# Contribute
|
|
25
25
|
|
|
26
|
-
Contributers are welcome! Please reach out on [Linkedin](https://www.linkedin.com/in/jannis-schreiber/) or via [Email](mailto:
|
|
26
|
+
Contributers are welcome! Please reach out on [Linkedin](https://www.linkedin.com/in/jannis-schreiber/) or via [Email](mailto:hello@jannis-schreiber.me).
|
|
27
27
|
|
|
28
28
|
# Documentation
|
|
29
29
|
|
|
@@ -79,7 +79,7 @@ FLAG DESCRIPTIONS
|
|
|
79
79
|
essentially control, if a permission is allowed in a certain profile / permission set.
|
|
80
80
|
```
|
|
81
81
|
|
|
82
|
-
_See code: [src/commands/org/audit/init.ts](https://github.com/j-schreiber/js-sf-cli-security-audit/blob/v0.
|
|
82
|
+
_See code: [src/commands/org/audit/init.ts](https://github.com/j-schreiber/js-sf-cli-security-audit/blob/v0.10.1/src/commands/org/audit/init.ts)_
|
|
83
83
|
|
|
84
84
|
## `sf org audit run`
|
|
85
85
|
|
|
@@ -110,7 +110,7 @@ EXAMPLES
|
|
|
110
110
|
$ sf org audit run -o MyTargetOrg -d configs/prod
|
|
111
111
|
```
|
|
112
112
|
|
|
113
|
-
_See code: [src/commands/org/audit/run.ts](https://github.com/j-schreiber/js-sf-cli-security-audit/blob/v0.
|
|
113
|
+
_See code: [src/commands/org/audit/run.ts](https://github.com/j-schreiber/js-sf-cli-security-audit/blob/v0.10.1/src/commands/org/audit/run.ts)_
|
|
114
114
|
|
|
115
115
|
## `sf org scan user-perms`
|
|
116
116
|
|
|
@@ -149,7 +149,7 @@ FLAG DESCRIPTIONS
|
|
|
149
149
|
retun 0 results).
|
|
150
150
|
```
|
|
151
151
|
|
|
152
|
-
_See code: [src/commands/org/scan/user-perms.ts](https://github.com/j-schreiber/js-sf-cli-security-audit/blob/v0.
|
|
152
|
+
_See code: [src/commands/org/scan/user-perms.ts](https://github.com/j-schreiber/js-sf-cli-security-audit/blob/v0.10.1/src/commands/org/scan/user-perms.ts)_
|
|
153
153
|
|
|
154
154
|
<!-- commandsstop -->
|
|
155
155
|
|
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
import { SfCommand, Flags } from '@salesforce/sf-plugins-core';
|
|
2
2
|
import { Messages } from '@salesforce/core';
|
|
3
3
|
import AuditConfig from '../../../libs/conf-init/auditConfig.js';
|
|
4
|
-
import {
|
|
4
|
+
import { extractEntities, isPolicyConfig, } from '../../../libs/core/file-mgmt/schema.js';
|
|
5
5
|
import { AuditInitPresets } from '../../../libs/conf-init/presets.js';
|
|
6
6
|
import { capitalize } from '../../../libs/core/utils.js';
|
|
7
7
|
Messages.importMessagesDirectoryFromMetaUrl(import.meta.url);
|
|
@@ -46,11 +46,12 @@ export default class OrgAuditInit extends SfCommand {
|
|
|
46
46
|
this.printPolicies(config.policies);
|
|
47
47
|
}
|
|
48
48
|
printClassifications(classifications) {
|
|
49
|
-
Object.
|
|
50
|
-
|
|
51
|
-
|
|
52
|
-
|
|
53
|
-
|
|
49
|
+
Object.entries(classifications).forEach(([key, def]) => {
|
|
50
|
+
const records = extractEntities(def);
|
|
51
|
+
if (records) {
|
|
52
|
+
const recordsCount = Object.keys(records).length;
|
|
53
|
+
if (recordsCount > 0) {
|
|
54
|
+
this.logSuccess(messages.getMessage('success.classification-summary', [recordsCount ?? 0, key, def.filePath]));
|
|
54
55
|
}
|
|
55
56
|
}
|
|
56
57
|
});
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"init.js","sourceRoot":"","sources":["../../../../src/commands/org/audit/init.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,SAAS,EAAE,KAAK,EAAE,MAAM,6BAA6B,CAAC;AAC/D,OAAO,EAAE,QAAQ,EAAE,MAAM,kBAAkB,CAAC;AAC5C,OAAO,WAAW,MAAM,wCAAwC,CAAC;AACjE,OAAO,EAIL,
|
|
1
|
+
{"version":3,"file":"init.js","sourceRoot":"","sources":["../../../../src/commands/org/audit/init.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,SAAS,EAAE,KAAK,EAAE,MAAM,6BAA6B,CAAC;AAC/D,OAAO,EAAE,QAAQ,EAAE,MAAM,kBAAkB,CAAC;AAC5C,OAAO,WAAW,MAAM,wCAAwC,CAAC;AACjE,OAAO,EAIL,eAAe,EACf,cAAc,GACf,MAAM,wCAAwC,CAAC;AAChD,OAAO,EAAE,gBAAgB,EAAE,MAAM,oCAAoC,CAAC;AACtE,OAAO,EAAE,UAAU,EAAE,MAAM,6BAA6B,CAAC;AAEzD,QAAQ,CAAC,kCAAkC,CAAC,MAAM,CAAC,IAAI,CAAC,GAAG,CAAC,CAAC;AAC7D,MAAM,QAAQ,GAAG,QAAQ,CAAC,YAAY,CAAC,oCAAoC,EAAE,gBAAgB,CAAC,CAAC;AAI/F,MAAM,UAAU,GAAG,KAAK,CAAC,MAAM,CAAmB;IAChD,IAAI,EAAE,GAAG;IACT,OAAO,EAAE,QAAQ,CAAC,UAAU,CAAC,sBAAsB,CAAC;IACpD,WAAW,EAAE,QAAQ,CAAC,UAAU,CAAC,0BAA0B,CAAC;IAC5D,OAAO,EAAE,MAAM,CAAC,MAAM,CAAC,gBAAgB,CAAC;IACxC,OAAO,EAAE,gBAAgB,CAAC,MAAM;CACjC,CAAC,EAAE,CAAC;AAEL,MAAM,CAAC,OAAO,OAAO,YAAa,SAAQ,SAA6B;IAC9D,MAAM,CAAU,OAAO,GAAG,QAAQ,CAAC,UAAU,CAAC,SAAS,CAAC,CAAC;IACzD,MAAM,CAAU,WAAW,GAAG,QAAQ,CAAC,UAAU,CAAC,aAAa,CAAC,CAAC;IACjE,MAAM,CAAU,QAAQ,GAAG,QAAQ,CAAC,WAAW,CAAC,UAAU,CAAC,CAAC;IAE5D,MAAM,CAAU,KAAK,GAAG;QAC7B,YAAY,EAAE,KAAK,CAAC,WAAW,CAAC;YAC9B,OAAO,EAAE,QAAQ,CAAC,UAAU,CAAC,0BAA0B,CAAC;YACxD,IAAI,EAAE,GAAG;YACT,QAAQ,EAAE,IAAI;SACf,CAAC;QACF,YAAY,EAAE,KAAK,CAAC,SAAS,CAAC;YAC5B,QAAQ,EAAE,KAAK;YACf,IAAI,EAAE,GAAG;YACT,OAAO,EAAE,QAAQ,CAAC,UAAU,CAAC,0BAA0B,CAAC;YACxD,OAAO,EAAE,EAAE;SACZ,CAAC;QACF,MAAM,EAAE,UAAU;QAClB,aAAa,EAAE,KAAK,CAAC,aAAa,EAAE;KACrC,CAAC;IAEK,KAAK,CAAC,GAAG;QACd,MAAM,EAAE,KAAK,EAAE,GAAG,MAAM,IAAI,CAAC,KAAK,CAAC,YAAY,CAAC,CAAC;QACjD,MAAM,WAAW,GAAG,MAAM,WAAW,CAAC,IAAI,CAAC,KAAK,CAAC,YAAY,CAAC,CAAC,aAAa,CAAC,KAAK,CAAC,aAAa,CAAC,CAAC,EAAE;YAClG,SAAS,EAAE,KAAK,CAAC,YAAY,CAAC;YAC9B,MAAM,EAAE,KAAK,CAAC,MAAM;SACrB,CAAC,CAAC;QACH,IAAI,CAAC,YAAY,CAAC,WAAW,CAAC,CAAC;QAC/B,OAAO,WAAW,CAAC;IACrB,CAAC;IAEO,YAAY,CAAC,MAAsB;QACzC,IAAI,CAAC,oBAAoB,CAAC,MAAM,CAAC,eAAe,CAAC,CAAC;QAClD,IAAI,CAAC,aAAa,CAAC,MAAM,CAAC,QAAQ,CAAC,CAAC;IACtC,CAAC;IAEO,oBAAoB,CAAC,eAA8C;QACzE,MAAM,CAAC,OAAO,CAAC,eAAe,CAAC,CAAC,OAAO,CAAC,CAAC,CAAC,GAAG,EAAE,GAAG,CAAC,EAAE,EAAE;YACrD,MAAM,OAAO,GAAG,eAAe,CAAC,GAAG,CAAC,CAAC;YACrC,IAAI,OAAO,EAAE,CAAC;gBACZ,MAAM,YAAY,GAAG,MAAM,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,MAAM,CAAC;gBACjD,IAAI,YAAY,GAAG,CAAC,EAAE,CAAC;oBACrB,IAAI,CAAC,UAAU,CACb,QAAQ,CAAC,UAAU,CAAC,gCAAgC,EAAE,CAAC,YAAY,IAAI,CAAC,EAAE,GAAG,EAAE,GAAG,CAAC,QAAQ,CAAC,CAAC,CAC9F,CAAC;gBACJ,CAAC;YACH,CAAC;QACH,CAAC,CAAC,CAAC;IACL,CAAC;IAEO,aAAa,CAAC,QAAgC;QACpD,MAAM,CAAC,OAAO,CAAC,QAAQ,CAAC,CAAC,OAAO,CAAC,CAAC,CAAC,IAAI,EAAE,GAAG,CAAC,EAAE,EAAE;YAC/C,IAAI,cAAc,CAAC,GAAG,CAAC,EAAE,CAAC;gBACxB,IAAI,GAAG,CAAC,QAAQ,EAAE,CAAC;oBACjB,IAAI,CAAC,UAAU,CACb,QAAQ,CAAC,UAAU,CAAC,wBAAwB,EAAE;wBAC5C,UAAU,CAAC,IAAI,CAAC;wBAChB,MAAM,CAAC,IAAI,CAAC,GAAG,CAAC,OAAO,CAAC,KAAK,CAAC,CAAC,MAAM,IAAI,CAAC;wBAC1C,GAAG,CAAC,QAAQ;qBACb,CAAC,CACH,CAAC;gBACJ,CAAC;YACH,CAAC;QACH,CAAC,CAAC,CAAC;IACL,CAAC"}
|
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
import { DefaultFileManager } from '../core/file-mgmt/auditConfigFileManager.js';
|
|
2
|
-
import { initCustomPermissions, initUserPermissions } from './permissionsClassification.js';
|
|
3
|
-
import {
|
|
2
|
+
import { initCustomPermissions, initPermissionSets, initProfiles, initUserPermissions, initUsers, } from './permissionsClassification.js';
|
|
3
|
+
import { initDefaultPolicy, initSettings, initUserPolicy } from './policyConfigs.js';
|
|
4
4
|
/**
|
|
5
5
|
* Exposes key functionality to load an audit config as static methods. This makes
|
|
6
6
|
* it easy to mock the results during tests.
|
|
@@ -14,15 +14,18 @@ export default class AuditConfig {
|
|
|
14
14
|
*/
|
|
15
15
|
static async init(targetCon, opts) {
|
|
16
16
|
const conf = { classifications: {}, policies: {} };
|
|
17
|
+
conf.classifications.profiles = { content: await initProfiles(targetCon) };
|
|
18
|
+
conf.classifications.permissionSets = { content: await initPermissionSets(targetCon) };
|
|
19
|
+
conf.classifications.users = { content: await initUsers(targetCon) };
|
|
17
20
|
conf.classifications.userPermissions = { content: await initUserPermissions(targetCon, opts?.preset) };
|
|
18
21
|
const customPerms = await initCustomPermissions(targetCon);
|
|
19
22
|
if (customPerms) {
|
|
20
23
|
conf.classifications.customPermissions = { content: customPerms };
|
|
21
24
|
}
|
|
22
|
-
conf.policies.profiles = { content:
|
|
23
|
-
conf.policies.permissionSets = { content:
|
|
24
|
-
conf.policies.users = { content:
|
|
25
|
-
conf.policies.connectedApps = { content:
|
|
25
|
+
conf.policies.profiles = { content: initDefaultPolicy('profiles') };
|
|
26
|
+
conf.policies.permissionSets = { content: initDefaultPolicy('permissionSets') };
|
|
27
|
+
conf.policies.users = { content: initUserPolicy() };
|
|
28
|
+
conf.policies.connectedApps = { content: initDefaultPolicy('connectedApps') };
|
|
26
29
|
conf.policies.settings = { content: initSettings() };
|
|
27
30
|
// eslint-disable-next-line @typescript-eslint/prefer-nullish-coalescing
|
|
28
31
|
if (opts?.targetDir || opts?.targetDir === '') {
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"auditConfig.js","sourceRoot":"","sources":["../../../src/libs/conf-init/auditConfig.ts"],"names":[],"mappings":"AAEA,OAAO,EAAE,kBAAkB,EAAE,MAAM,6CAA6C,CAAC;AACjF,OAAO,
|
|
1
|
+
{"version":3,"file":"auditConfig.js","sourceRoot":"","sources":["../../../src/libs/conf-init/auditConfig.ts"],"names":[],"mappings":"AAEA,OAAO,EAAE,kBAAkB,EAAE,MAAM,6CAA6C,CAAC;AACjF,OAAO,EACL,qBAAqB,EACrB,kBAAkB,EAClB,YAAY,EACZ,mBAAmB,EACnB,SAAS,GACV,MAAM,gCAAgC,CAAC;AACxC,OAAO,EAAE,iBAAiB,EAAE,YAAY,EAAE,cAAc,EAAE,MAAM,oBAAoB,CAAC;AAiBrF;;;GAGG;AACH,MAAM,CAAC,OAAO,OAAO,WAAW;IAC9B;;;;;OAKG;IACI,MAAM,CAAC,KAAK,CAAC,IAAI,CAAC,SAAqB,EAAE,IAAuB;QACrE,MAAM,IAAI,GAAmB,EAAE,eAAe,EAAE,EAAE,EAAE,QAAQ,EAAE,EAAE,EAAE,CAAC;QACnE,IAAI,CAAC,eAAe,CAAC,QAAQ,GAAG,EAAE,OAAO,EAAE,MAAM,YAAY,CAAC,SAAS,CAAC,EAAE,CAAC;QAC3E,IAAI,CAAC,eAAe,CAAC,cAAc,GAAG,EAAE,OAAO,EAAE,MAAM,kBAAkB,CAAC,SAAS,CAAC,EAAE,CAAC;QACvF,IAAI,CAAC,eAAe,CAAC,KAAK,GAAG,EAAE,OAAO,EAAE,MAAM,SAAS,CAAC,SAAS,CAAC,EAAE,CAAC;QACrE,IAAI,CAAC,eAAe,CAAC,eAAe,GAAG,EAAE,OAAO,EAAE,MAAM,mBAAmB,CAAC,SAAS,EAAE,IAAI,EAAE,MAAM,CAAC,EAAE,CAAC;QACvG,MAAM,WAAW,GAAG,MAAM,qBAAqB,CAAC,SAAS,CAAC,CAAC;QAC3D,IAAI,WAAW,EAAE,CAAC;YAChB,IAAI,CAAC,eAAe,CAAC,iBAAiB,GAAG,EAAE,OAAO,EAAE,WAAW,EAAE,CAAC;QACpE,CAAC;QACD,IAAI,CAAC,QAAQ,CAAC,QAAQ,GAAG,EAAE,OAAO,EAAE,iBAAiB,CAAC,UAAU,CAAC,EAAE,CAAC;QACpE,IAAI,CAAC,QAAQ,CAAC,cAAc,GAAG,EAAE,OAAO,EAAE,iBAAiB,CAAC,gBAAgB,CAAC,EAAE,CAAC;QAChF,IAAI,CAAC,QAAQ,CAAC,KAAK,GAAG,EAAE,OAAO,EAAE,cAAc,EAAE,EAAE,CAAC;QACpD,IAAI,CAAC,QAAQ,CAAC,aAAa,GAAG,EAAE,OAAO,EAAE,iBAAiB,CAAC,eAAe,CAAC,EAAE,CAAC;QAC9E,IAAI,CAAC,QAAQ,CAAC,QAAQ,GAAG,EAAE,OAAO,EAAE,YAAY,EAAE,EAAE,CAAC;QACrD,wEAAwE;QACxE,IAAI,IAAI,EAAE,SAAS,IAAI,IAAI,EAAE,SAAS,KAAK,EAAE,EAAE,CAAC;YAC9C,kBAAkB,CAAC,IAAI,CAAC,IAAI,CAAC,SAAS,EAAE,IAAI,CAAC,CAAC;QAChD,CAAC;QACD,OAAO,IAAI,CAAC;IACd,CAAC;IAED;;;;OAIG;IACI,MAAM,CAAC,IAAI,CAAC,SAAiB;QAClC,OAAO,kBAAkB,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC;IAC7C,CAAC;CACF"}
|
|
@@ -1,5 +1,5 @@
|
|
|
1
1
|
import { Connection } from '@salesforce/core';
|
|
2
|
-
import {
|
|
2
|
+
import { PermissionsClassificationContent, PermissionSetsClassificationContent, ProfilesClassificationContent, UsersClassificationContent } from '../core/file-mgmt/schema.js';
|
|
3
3
|
import { AuditInitPresets } from './presets.js';
|
|
4
4
|
/**
|
|
5
5
|
* Initialises a fresh set of user permissions from target org connection.
|
|
@@ -7,11 +7,31 @@ import { AuditInitPresets } from './presets.js';
|
|
|
7
7
|
* @param con
|
|
8
8
|
* @returns
|
|
9
9
|
*/
|
|
10
|
-
export declare function initUserPermissions(con: Connection, preset?: AuditInitPresets): Promise<
|
|
10
|
+
export declare function initUserPermissions(con: Connection, preset?: AuditInitPresets): Promise<PermissionsClassificationContent>;
|
|
11
11
|
/**
|
|
12
12
|
* Initialises a fresh set of custom permissions from the target org
|
|
13
13
|
*
|
|
14
14
|
* @param con
|
|
15
15
|
* @returns
|
|
16
16
|
*/
|
|
17
|
-
export declare function initCustomPermissions(con: Connection): Promise<
|
|
17
|
+
export declare function initCustomPermissions(con: Connection): Promise<PermissionsClassificationContent | undefined>;
|
|
18
|
+
/**
|
|
19
|
+
* Initialises a profiles classification with all profiles from the org.
|
|
20
|
+
*
|
|
21
|
+
* @param targetOrgCon
|
|
22
|
+
* @returns
|
|
23
|
+
*/
|
|
24
|
+
export declare function initProfiles(targetOrgCon: Connection): Promise<ProfilesClassificationContent>;
|
|
25
|
+
/**
|
|
26
|
+
* Initialises permission set classification with all perm sets
|
|
27
|
+
*
|
|
28
|
+
* @param targetOrgCon
|
|
29
|
+
* @returns
|
|
30
|
+
*/
|
|
31
|
+
export declare function initPermissionSets(targetOrgCon: Connection): Promise<PermissionSetsClassificationContent>;
|
|
32
|
+
/**
|
|
33
|
+
* Initialises users classification with all users classified as standard users.
|
|
34
|
+
*
|
|
35
|
+
* @param targetOrgCon
|
|
36
|
+
*/
|
|
37
|
+
export declare function initUsers(targetOrgCon: Connection): Promise<UsersClassificationContent>;
|
|
@@ -1,6 +1,7 @@
|
|
|
1
|
-
import { CUSTOM_PERMS_QUERY, PROFILES_QUERY } from '../core/constants.js';
|
|
1
|
+
import { ACTIVE_USERS_QUERY, CUSTOM_PERMS_QUERY, PERMISSION_SETS_QUERY, PROFILES_QUERY } from '../core/constants.js';
|
|
2
2
|
import MDAPI from '../core/mdapi/mdapiRetriever.js';
|
|
3
3
|
import { classificationSorter, PermissionRiskLevel } from '../core/classification-types.js';
|
|
4
|
+
import { UserPrivilegeLevel } from '../core/policy-types.js';
|
|
4
5
|
import { loadPreset } from './presets.js';
|
|
5
6
|
/**
|
|
6
7
|
* Initialises a fresh set of user permissions from target org connection.
|
|
@@ -46,6 +47,51 @@ export async function initCustomPermissions(con) {
|
|
|
46
47
|
}));
|
|
47
48
|
return result;
|
|
48
49
|
}
|
|
50
|
+
/**
|
|
51
|
+
* Initialises a profiles classification with all profiles from the org.
|
|
52
|
+
*
|
|
53
|
+
* @param targetOrgCon
|
|
54
|
+
* @returns
|
|
55
|
+
*/
|
|
56
|
+
export async function initProfiles(targetOrgCon) {
|
|
57
|
+
const profiles = await targetOrgCon.query(PROFILES_QUERY);
|
|
58
|
+
const content = { profiles: {} };
|
|
59
|
+
profiles.records.forEach((permsetRecord) => {
|
|
60
|
+
content.profiles[permsetRecord.Profile.Name] = { role: UserPrivilegeLevel.UNKNOWN };
|
|
61
|
+
});
|
|
62
|
+
return content;
|
|
63
|
+
}
|
|
64
|
+
/**
|
|
65
|
+
* Initialises permission set classification with all perm sets
|
|
66
|
+
*
|
|
67
|
+
* @param targetOrgCon
|
|
68
|
+
* @returns
|
|
69
|
+
*/
|
|
70
|
+
export async function initPermissionSets(targetOrgCon) {
|
|
71
|
+
const permSets = await targetOrgCon.query(PERMISSION_SETS_QUERY);
|
|
72
|
+
const content = { permissionSets: {} };
|
|
73
|
+
permSets.records
|
|
74
|
+
.filter((permsetRecord) => permsetRecord.IsCustom)
|
|
75
|
+
.forEach((permsetRecord) => {
|
|
76
|
+
content.permissionSets[permsetRecord.Name] = { role: UserPrivilegeLevel.UNKNOWN };
|
|
77
|
+
});
|
|
78
|
+
return content;
|
|
79
|
+
}
|
|
80
|
+
/**
|
|
81
|
+
* Initialises users classification with all users classified as standard users.
|
|
82
|
+
*
|
|
83
|
+
* @param targetOrgCon
|
|
84
|
+
*/
|
|
85
|
+
export async function initUsers(targetOrgCon) {
|
|
86
|
+
const users = await targetOrgCon.query(ACTIVE_USERS_QUERY);
|
|
87
|
+
const content = {
|
|
88
|
+
users: {},
|
|
89
|
+
};
|
|
90
|
+
users.records.forEach((userRecord) => {
|
|
91
|
+
content.users[userRecord.Username] = { role: UserPrivilegeLevel.STANDARD_USER };
|
|
92
|
+
});
|
|
93
|
+
return content;
|
|
94
|
+
}
|
|
49
95
|
async function parsePermsFromDescribe(con) {
|
|
50
96
|
const permSet = await con.describe('PermissionSet');
|
|
51
97
|
const describeAvailablePerms = {};
|
|
@@ -75,6 +121,6 @@ async function findAssignedPerms(con) {
|
|
|
75
121
|
return assignedPerms;
|
|
76
122
|
}
|
|
77
123
|
function sanitiseLabel(rawLabel) {
|
|
78
|
-
return rawLabel?.
|
|
124
|
+
return rawLabel?.replaceAll(/[ \t]+$|[\r\n]+/g, '');
|
|
79
125
|
}
|
|
80
126
|
//# sourceMappingURL=permissionsClassification.js.map
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"permissionsClassification.js","sourceRoot":"","sources":["../../../src/libs/conf-init/permissionsClassification.ts"],"names":[],"mappings":"
|
|
1
|
+
{"version":3,"file":"permissionsClassification.js","sourceRoot":"","sources":["../../../src/libs/conf-init/permissionsClassification.ts"],"names":[],"mappings":"AAOA,OAAO,EAAE,kBAAkB,EAAE,kBAAkB,EAAE,qBAAqB,EAAE,cAAc,EAAE,MAAM,sBAAsB,CAAC;AACrH,OAAO,KAAK,MAAM,iCAAiC,CAAC;AAEpD,OAAO,EAAE,oBAAoB,EAAE,mBAAmB,EAAE,MAAM,iCAAiC,CAAC;AAC5F,OAAO,EAAE,kBAAkB,EAAE,MAAM,yBAAyB,CAAC;AAC7D,OAAO,EAAoB,UAAU,EAAE,MAAM,cAAc,CAAC;AAG5D;;;;;GAKG;AACH,MAAM,CAAC,KAAK,UAAU,mBAAmB,CACvC,GAAe,EACf,MAAyB;IAEzB,MAAM,aAAa,GAAG,MAAM,sBAAsB,CAAC,GAAG,CAAC,CAAC;IACxD,MAAM,aAAa,GAAG,MAAM,iBAAiB,CAAC,GAAG,CAAC,CAAC;IACnD,MAAM,QAAQ,GAAG,EAAE,GAAG,aAAa,EAAE,GAAG,aAAa,EAAE,CAAC;IACxD,MAAM,UAAU,GAAG,UAAU,CAAC,MAAM,CAAC,CAAC;IACtC,MAAM,KAAK,GAAG,UAAU,CAAC,uBAAuB,CAAC,MAAM,CAAC,MAAM,CAAC,QAAQ,CAAC,CAAC,CAAC;IAC1E,KAAK,CAAC,IAAI,CAAC,oBAAoB,CAAC,CAAC;IACjC,MAAM,MAAM,GAAqC,EAAE,WAAW,EAAE,EAAE,EAAE,CAAC;IACrE,KAAK,CAAC,OAAO,CACX,CAAC,IAAI,EAAE,EAAE,CACP,CAAC,MAAM,CAAC,WAAW,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG;QAC/B,KAAK,EAAE,aAAa,CAAC,IAAI,CAAC,KAAK,CAAC;QAChC,cAAc,EAAE,IAAI,CAAC,cAAc;QACnC,MAAM,EAAE,IAAI,CAAC,MAAM;KACpB,CAAC,CACL,CAAC;IACF,OAAO,MAAM,CAAC;AAChB,CAAC;AAED;;;;;GAKG;AACH,MAAM,CAAC,KAAK,UAAU,qBAAqB,CAAC,GAAe;IACzD,MAAM,MAAM,GAAqC,EAAE,WAAW,EAAE,EAAE,EAAE,CAAC;IACrE,MAAM,WAAW,GAAG,MAAM,GAAG,CAAC,KAAK,CAAmB,kBAAkB,CAAC,CAAC;IAC1E,IAAI,WAAW,CAAC,OAAO,CAAC,MAAM,KAAK,CAAC,EAAE,CAAC;QACrC,OAAO,SAAS,CAAC;IACnB,CAAC;IACD,MAAM,KAAK,GAAG,WAAW,CAAC,OAAO,CAAC,GAAG,CAAC,CAAC,EAAE,EAAE,EAAE,CAAC,CAAC;QAC7C,IAAI,EAAE,EAAE,CAAC,aAAa;QACtB,KAAK,EAAE,EAAE,CAAC,WAAW;QACrB,cAAc,EAAE,mBAAmB,CAAC,OAAO;KAC5C,CAAC,CAAC,CAAC;IACJ,KAAK,CAAC,OAAO,CACX,CAAC,IAAI,EAAE,EAAE,CACP,CAAC,MAAM,CAAC,WAAW,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG;QAC/B,KAAK,EAAE,IAAI,CAAC,KAAK;QACjB,cAAc,EAAE,IAAI,CAAC,cAAc;KACpC,CAAC,CACL,CAAC;IACF,OAAO,MAAM,CAAC;AAChB,CAAC;AAED;;;;;GAKG;AACH,MAAM,CAAC,KAAK,UAAU,YAAY,CAAC,YAAwB;IACzD,MAAM,QAAQ,GAAG,MAAM,YAAY,CAAC,KAAK,CAAgB,cAAc,CAAC,CAAC;IACzE,MAAM,OAAO,GAAkC,EAAE,QAAQ,EAAE,EAAE,EAAE,CAAC;IAChE,QAAQ,CAAC,OAAO,CAAC,OAAO,CAAC,CAAC,aAAa,EAAE,EAAE;QACzC,OAAO,CAAC,QAAQ,CAAC,aAAa,CAAC,OAAO,CAAC,IAAI,CAAC,GAAG,EAAE,IAAI,EAAE,kBAAkB,CAAC,OAAO,EAAE,CAAC;IACtF,CAAC,CAAC,CAAC;IACH,OAAO,OAAO,CAAC;AACjB,CAAC;AAED;;;;;GAKG;AACH,MAAM,CAAC,KAAK,UAAU,kBAAkB,CAAC,YAAwB;IAC/D,MAAM,QAAQ,GAAG,MAAM,YAAY,CAAC,KAAK,CAAgB,qBAAqB,CAAC,CAAC;IAChF,MAAM,OAAO,GAAwC,EAAE,cAAc,EAAE,EAAE,EAAE,CAAC;IAC5E,QAAQ,CAAC,OAAO;SACb,MAAM,CAAC,CAAC,aAAa,EAAE,EAAE,CAAC,aAAa,CAAC,QAAQ,CAAC;SACjD,OAAO,CAAC,CAAC,aAAa,EAAE,EAAE;QACzB,OAAO,CAAC,cAAc,CAAC,aAAa,CAAC,IAAI,CAAC,GAAG,EAAE,IAAI,EAAE,kBAAkB,CAAC,OAAO,EAAE,CAAC;IACpF,CAAC,CAAC,CAAC;IACL,OAAO,OAAO,CAAC;AACjB,CAAC;AAED;;;;GAIG;AACH,MAAM,CAAC,KAAK,UAAU,SAAS,CAAC,YAAwB;IACtD,MAAM,KAAK,GAAG,MAAM,YAAY,CAAC,KAAK,CAAO,kBAAkB,CAAC,CAAC;IACjE,MAAM,OAAO,GAA+B;QAC1C,KAAK,EAAE,EAAE;KACV,CAAC;IACF,KAAK,CAAC,OAAO,CAAC,OAAO,CAAC,CAAC,UAAU,EAAE,EAAE;QACnC,OAAO,CAAC,KAAK,CAAC,UAAU,CAAC,QAAQ,CAAC,GAAG,EAAE,IAAI,EAAE,kBAAkB,CAAC,aAAa,EAAE,CAAC;IAClF,CAAC,CAAC,CAAC;IACH,OAAO,OAAO,CAAC;AACjB,CAAC;AAED,KAAK,UAAU,sBAAsB,CAAC,GAAe;IACnD,MAAM,OAAO,GAAG,MAAM,GAAG,CAAC,QAAQ,CAAC,eAAe,CAAC,CAAC;IACpD,MAAM,sBAAsB,GAAqC,EAAE,CAAC;IACpE,OAAO,CAAC,MAAM;SACX,MAAM,CAAC,CAAC,KAAK,EAAE,EAAE,CAAC,KAAK,CAAC,IAAI,CAAC,UAAU,CAAC,aAAa,CAAC,CAAC;SACvD,OAAO,CAAC,CAAC,KAAK,EAAE,EAAE;QACjB,MAAM,QAAQ,GAAG,KAAK,CAAC,IAAI,CAAC,OAAO,CAAC,aAAa,EAAE,EAAE,CAAC,CAAC;QACvD,sBAAsB,CAAC,QAAQ,CAAC,GAAG;YACjC,KAAK,EAAE,KAAK,CAAC,KAAK;YAClB,IAAI,EAAE,QAAQ;SACf,CAAC;IACJ,CAAC,CAAC,CAAC;IACL,OAAO,sBAAsB,CAAC;AAChC,CAAC;AAED,KAAK,UAAU,iBAAiB,CAAC,GAAe;IAC9C,MAAM,aAAa,GAAqC,EAAE,CAAC;IAC3D,MAAM,QAAQ,GAAG,MAAM,GAAG,CAAC,KAAK,CAAgB,cAAc,CAAC,CAAC;IAChE,IAAI,QAAQ,CAAC,OAAO,EAAE,MAAM,GAAG,CAAC,EAAE,CAAC;QACjC,MAAM,KAAK,GAAG,IAAI,KAAK,CAAC,GAAG,CAAC,CAAC;QAC7B,MAAM,gBAAgB,GAAG,MAAM,KAAK,CAAC,OAAO,CAC1C,SAAS,EACT,QAAQ,CAAC,OAAO,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,OAAO,CAAC,IAAI,CAAC,CAC5C,CAAC;QACF,MAAM,CAAC,MAAM,CAAC,gBAAgB,CAAC,CAAC,OAAO,CAAC,CAAC,OAAO,EAAE,EAAE;YAClD,OAAO,CAAC,eAAe,CAAC,OAAO,CAAC,CAAC,QAAQ,EAAE,EAAE;gBAC3C,aAAa,CAAC,QAAQ,CAAC,IAAI,CAAC,GAAG,EAAE,IAAI,EAAE,QAAQ,CAAC,IAAI,EAAE,CAAC;YACzD,CAAC,CAAC,CAAC;QACL,CAAC,CAAC,CAAC;IACL,CAAC;IACD,OAAO,aAAa,CAAC;AACvB,CAAC;AAED,SAAS,aAAa,CAAC,QAAiB;IACtC,OAAO,QAAQ,EAAE,UAAU,CAAC,kBAAkB,EAAE,EAAE,CAAC,CAAC;AACtD,CAAC"}
|
|
@@ -1,37 +1,21 @@
|
|
|
1
|
-
import {
|
|
2
|
-
import {
|
|
1
|
+
import { BasePolicyFileContent, UsersPolicyFileContent } from '../core/file-mgmt/schema.js';
|
|
2
|
+
import { PolicyNames } from '../core/policyRegistry.js';
|
|
3
3
|
/**
|
|
4
|
-
* Initialises a new
|
|
5
|
-
* profiles and all default rules enabled.
|
|
4
|
+
* Initialises a new settings policy with default rules enabled.
|
|
6
5
|
*
|
|
7
|
-
* @param targetOrgCon
|
|
8
|
-
* @param targetDir
|
|
9
6
|
* @returns
|
|
10
7
|
*/
|
|
11
|
-
export declare function
|
|
8
|
+
export declare function initSettings(): BasePolicyFileContent;
|
|
12
9
|
/**
|
|
13
|
-
* Initialises a
|
|
14
|
-
* permissions and all default rules enabled.
|
|
10
|
+
* Initialises a users policy with all users flagged as standard user
|
|
15
11
|
*
|
|
16
12
|
* @param targetOrgCon
|
|
17
|
-
* @returns
|
|
18
|
-
*/
|
|
19
|
-
export declare function initPermissionSets(targetOrgCon: Connection): Promise<PermSetsPolicyFileContent>;
|
|
20
|
-
/**
|
|
21
|
-
* Initialises a new connected apps policy with default rules enabled.
|
|
22
|
-
*
|
|
23
|
-
* @returns
|
|
24
13
|
*/
|
|
25
|
-
export declare function
|
|
14
|
+
export declare function initUserPolicy(): UsersPolicyFileContent;
|
|
26
15
|
/**
|
|
27
|
-
* Initialises a
|
|
16
|
+
* Initialises a default policy with all registered rules.
|
|
28
17
|
*
|
|
18
|
+
* @param policyName
|
|
29
19
|
* @returns
|
|
30
20
|
*/
|
|
31
|
-
export declare function
|
|
32
|
-
/**
|
|
33
|
-
* Initialises a users policy with all users flagged as standard user
|
|
34
|
-
*
|
|
35
|
-
* @param targetOrgCon
|
|
36
|
-
*/
|
|
37
|
-
export declare function initUsers(targetOrgCon: Connection): Promise<UsersPolicyFileContent>;
|
|
21
|
+
export declare function initDefaultPolicy(policyName: PolicyNames): BasePolicyFileContent;
|
|
@@ -1,101 +1,43 @@
|
|
|
1
|
-
import { ACTIVE_USERS_QUERY, PERMISSION_SETS_QUERY, PROFILES_QUERY } from '../core/constants.js';
|
|
2
|
-
import { UsersPolicyConfig, } from '../core/file-mgmt/schema.js';
|
|
3
1
|
import { RuleRegistries } from '../core/registries/types.js';
|
|
4
|
-
import {
|
|
2
|
+
import { UserPrivilegeLevel } from '../core/policy-types.js';
|
|
5
3
|
/**
|
|
6
|
-
* Initialises a new
|
|
7
|
-
* profiles and all default rules enabled.
|
|
4
|
+
* Initialises a new settings policy with default rules enabled.
|
|
8
5
|
*
|
|
9
|
-
* @param targetOrgCon
|
|
10
|
-
* @param targetDir
|
|
11
6
|
* @returns
|
|
12
7
|
*/
|
|
13
|
-
export
|
|
14
|
-
const
|
|
15
|
-
|
|
16
|
-
|
|
17
|
-
content.profiles[permsetRecord.Profile.Name] = { preset: ProfilesRiskPreset.UNKNOWN };
|
|
18
|
-
});
|
|
19
|
-
RuleRegistries.Profiles.registeredRules().forEach((ruleName) => {
|
|
20
|
-
content.rules[ruleName] = {
|
|
8
|
+
export function initSettings() {
|
|
9
|
+
const content = { enabled: true, rules: {} };
|
|
10
|
+
['Security', 'UserInterface', 'UserManagement', 'ConnectedApp'].forEach((settingName) => {
|
|
11
|
+
content.rules[`Enforce${settingName}Settings`] = {
|
|
21
12
|
enabled: true,
|
|
22
13
|
};
|
|
23
14
|
});
|
|
24
15
|
return content;
|
|
25
16
|
}
|
|
26
17
|
/**
|
|
27
|
-
* Initialises a
|
|
28
|
-
* permissions and all default rules enabled.
|
|
18
|
+
* Initialises a users policy with all users flagged as standard user
|
|
29
19
|
*
|
|
30
20
|
* @param targetOrgCon
|
|
31
|
-
* @returns
|
|
32
21
|
*/
|
|
33
|
-
export
|
|
34
|
-
const permSets = await targetOrgCon.query(PERMISSION_SETS_QUERY);
|
|
22
|
+
export function initUserPolicy() {
|
|
35
23
|
const content = {
|
|
36
|
-
|
|
37
|
-
|
|
38
|
-
|
|
24
|
+
...initDefaultPolicy('users'),
|
|
25
|
+
options: {
|
|
26
|
+
analyseLastNDaysOfLoginHistory: 30,
|
|
27
|
+
defaultRoleForMissingUsers: UserPrivilegeLevel.STANDARD_USER,
|
|
28
|
+
},
|
|
39
29
|
};
|
|
40
|
-
permSets.records
|
|
41
|
-
.filter((permsetRecord) => permsetRecord.IsCustom)
|
|
42
|
-
.forEach((permsetRecord) => {
|
|
43
|
-
content.permissionSets[permsetRecord.Name] = { preset: ProfilesRiskPreset.UNKNOWN };
|
|
44
|
-
});
|
|
45
|
-
RuleRegistries.PermissionSets.registeredRules().forEach((ruleName) => {
|
|
46
|
-
content.rules[ruleName] = {
|
|
47
|
-
enabled: true,
|
|
48
|
-
};
|
|
49
|
-
});
|
|
50
30
|
return content;
|
|
51
31
|
}
|
|
52
32
|
/**
|
|
53
|
-
* Initialises a
|
|
33
|
+
* Initialises a default policy with all registered rules.
|
|
54
34
|
*
|
|
35
|
+
* @param policyName
|
|
55
36
|
* @returns
|
|
56
37
|
*/
|
|
57
|
-
export function
|
|
38
|
+
export function initDefaultPolicy(policyName) {
|
|
58
39
|
const content = { enabled: true, rules: {} };
|
|
59
|
-
RuleRegistries.
|
|
60
|
-
content.rules[ruleName] = {
|
|
61
|
-
enabled: true,
|
|
62
|
-
};
|
|
63
|
-
});
|
|
64
|
-
return content;
|
|
65
|
-
}
|
|
66
|
-
/**
|
|
67
|
-
* Initialises a new settings policy with default rules enabled.
|
|
68
|
-
*
|
|
69
|
-
* @returns
|
|
70
|
-
*/
|
|
71
|
-
export function initSettings() {
|
|
72
|
-
const content = { enabled: true, rules: {} };
|
|
73
|
-
['Security', 'UserInterface', 'UserManagement', 'ConnectedApp'].forEach((settingName) => {
|
|
74
|
-
content.rules[`Enforce${settingName}Settings`] = {
|
|
75
|
-
enabled: true,
|
|
76
|
-
};
|
|
77
|
-
});
|
|
78
|
-
return content;
|
|
79
|
-
}
|
|
80
|
-
/**
|
|
81
|
-
* Initialises a users policy with all users flagged as standard user
|
|
82
|
-
*
|
|
83
|
-
* @param targetOrgCon
|
|
84
|
-
*/
|
|
85
|
-
export async function initUsers(targetOrgCon) {
|
|
86
|
-
const users = await targetOrgCon.query(ACTIVE_USERS_QUERY);
|
|
87
|
-
const content = {
|
|
88
|
-
enabled: true,
|
|
89
|
-
options: UsersPolicyConfig.parse({}),
|
|
90
|
-
rules: {},
|
|
91
|
-
users: {},
|
|
92
|
-
};
|
|
93
|
-
// dont parse all configs with default of 30 - but initialise a new config likle this
|
|
94
|
-
content.options.analyseLastNDaysOfLoginHistory = 30;
|
|
95
|
-
users.records.forEach((userRecord) => {
|
|
96
|
-
content.users[userRecord.Username] = { role: ProfilesRiskPreset.STANDARD_USER };
|
|
97
|
-
});
|
|
98
|
-
RuleRegistries.Users.registeredRules().forEach((ruleName) => {
|
|
40
|
+
RuleRegistries[policyName].registeredRules().forEach((ruleName) => {
|
|
99
41
|
content.rules[ruleName] = {
|
|
100
42
|
enabled: true,
|
|
101
43
|
};
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"policyConfigs.js","sourceRoot":"","sources":["../../../src/libs/conf-init/policyConfigs.ts"],"names":[],"mappings":"AACA,OAAO,EAAE,
|
|
1
|
+
{"version":3,"file":"policyConfigs.js","sourceRoot":"","sources":["../../../src/libs/conf-init/policyConfigs.ts"],"names":[],"mappings":"AACA,OAAO,EAAE,cAAc,EAAE,MAAM,6BAA6B,CAAC;AAC7D,OAAO,EAAE,kBAAkB,EAAE,MAAM,yBAAyB,CAAC;AAG7D;;;;GAIG;AACH,MAAM,UAAU,YAAY;IAC1B,MAAM,OAAO,GAA0B,EAAE,OAAO,EAAE,IAAI,EAAE,KAAK,EAAE,EAAE,EAAE,CAAC;IACpE,CAAC,UAAU,EAAE,eAAe,EAAE,gBAAgB,EAAE,cAAc,CAAC,CAAC,OAAO,CAAC,CAAC,WAAW,EAAE,EAAE;QACtF,OAAO,CAAC,KAAK,CAAC,UAAU,WAAW,UAAU,CAAC,GAAG;YAC/C,OAAO,EAAE,IAAI;SACd,CAAC;IACJ,CAAC,CAAC,CAAC;IACH,OAAO,OAAO,CAAC;AACjB,CAAC;AAED;;;;GAIG;AACH,MAAM,UAAU,cAAc;IAC5B,MAAM,OAAO,GAA2B;QACtC,GAAG,iBAAiB,CAAC,OAAO,CAAC;QAC7B,OAAO,EAAE;YACP,8BAA8B,EAAE,EAAE;YAClC,0BAA0B,EAAE,kBAAkB,CAAC,aAAa;SAC7D;KACF,CAAC;IACF,OAAO,OAAO,CAAC;AACjB,CAAC;AAED;;;;;GAKG;AACH,MAAM,UAAU,iBAAiB,CAAC,UAAuB;IACvD,MAAM,OAAO,GAA0B,EAAE,OAAO,EAAE,IAAI,EAAE,KAAK,EAAE,EAAE,EAAE,CAAC;IACpE,cAAc,CAAC,UAAU,CAAC,CAAC,eAAe,EAAE,CAAC,OAAO,CAAC,CAAC,QAAQ,EAAE,EAAE;QAChE,OAAO,CAAC,KAAK,CAAC,QAAQ,CAAC,GAAG;YACxB,OAAO,EAAE,IAAI;SACd,CAAC;IACJ,CAAC,CAAC,CAAC;IACH,OAAO,OAAO,CAAC;AACjB,CAAC"}
|
|
@@ -1,6 +1,6 @@
|
|
|
1
|
-
import {
|
|
1
|
+
import { NamedPermissionClassification } from '../../core/file-mgmt/schema.js';
|
|
2
2
|
import NonePreset from './none.js';
|
|
3
3
|
export default class LoosePreset extends NonePreset {
|
|
4
4
|
constructor();
|
|
5
|
-
initDefault(permName: string):
|
|
5
|
+
initDefault(permName: string): NamedPermissionClassification;
|
|
6
6
|
}
|
|
@@ -41,6 +41,7 @@ export default class LoosePreset extends NonePreset {
|
|
|
41
41
|
CodeBuilderUser: PermissionRiskLevel.HIGH,
|
|
42
42
|
MonitorLoginHistory: PermissionRiskLevel.HIGH,
|
|
43
43
|
ManagePackageLicenses: PermissionRiskLevel.HIGH,
|
|
44
|
+
BulkApiHardDelete: PermissionRiskLevel.HIGH,
|
|
44
45
|
ViewHealthCheck: PermissionRiskLevel.MEDIUM,
|
|
45
46
|
FreezeUsers: PermissionRiskLevel.MEDIUM,
|
|
46
47
|
ManageRoles: PermissionRiskLevel.MEDIUM,
|
|
@@ -60,6 +61,7 @@ export default class LoosePreset extends NonePreset {
|
|
|
60
61
|
ViewAllUsers: PermissionRiskLevel.MEDIUM,
|
|
61
62
|
ViewRoles: PermissionRiskLevel.MEDIUM,
|
|
62
63
|
ModerateNetworkUsers: PermissionRiskLevel.MEDIUM,
|
|
64
|
+
EmailAdministration: PermissionRiskLevel.MEDIUM,
|
|
63
65
|
ApiEnabled: PermissionRiskLevel.LOW,
|
|
64
66
|
LightningExperienceUser: PermissionRiskLevel.LOW,
|
|
65
67
|
RunReports: PermissionRiskLevel.LOW,
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"loose.js","sourceRoot":"","sources":["../../../../src/libs/conf-init/presets/loose.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,mBAAmB,EAAE,MAAM,oCAAoC,CAAC;AAEzE,OAAO,UAAU,MAAM,WAAW,CAAC;AAEnC,MAAM,CAAC,OAAO,OAAO,WAAY,SAAQ,UAAU;IACjD;QACE,KAAK,CAAC;YACJ,eAAe,EAAE,mBAAmB,CAAC,IAAI;YACzC,oBAAoB,EAAE,mBAAmB,CAAC,IAAI;YAC9C,sBAAsB,EAAE,mBAAmB,CAAC,IAAI;YAChD,eAAe,EAAE,mBAAmB,CAAC,IAAI;YACzC,kBAAkB,EAAE,mBAAmB,CAAC,IAAI;YAC5C,oBAAoB,EAAE,mBAAmB,CAAC,IAAI;YAC9C,cAAc,EAAE,mBAAmB,CAAC,IAAI;YACxC,UAAU,EAAE,mBAAmB,CAAC,IAAI;YACpC,SAAS,EAAE,mBAAmB,CAAC,IAAI;YACnC,mBAAmB,EAAE,mBAAmB,CAAC,IAAI;YAC7C,UAAU,EAAE,mBAAmB,CAAC,IAAI;YACpC,gBAAgB,EAAE,mBAAmB,CAAC,IAAI;YAC1C,wBAAwB,EAAE,mBAAmB,CAAC,IAAI;YAClD,gBAAgB,EAAE,mBAAmB,CAAC,IAAI;YAC1C,gBAAgB,EAAE,mBAAmB,CAAC,IAAI;YAC1C,eAAe,EAAE,mBAAmB,CAAC,IAAI;YACzC,kBAAkB,EAAE,mBAAmB,CAAC,IAAI;YAC5C,yBAAyB,EAAE,mBAAmB,CAAC,IAAI;YACnD,oBAAoB,EAAE,mBAAmB,CAAC,IAAI;YAC9C,iBAAiB,EAAE,mBAAmB,CAAC,IAAI;YAC3C,aAAa,EAAE,mBAAmB,CAAC,IAAI;YACvC,mBAAmB,EAAE,mBAAmB,CAAC,IAAI;YAC7C,sBAAsB,EAAE,mBAAmB,CAAC,IAAI;YAChD,yBAAyB,EAAE,mBAAmB,CAAC,IAAI;YACnD,uBAAuB,EAAE,mBAAmB,CAAC,IAAI;YACjD,kBAAkB,EAAE,mBAAmB,CAAC,IAAI;YAC5C,WAAW,EAAE,mBAAmB,CAAC,IAAI;YACrC,gBAAgB,EAAE,mBAAmB,CAAC,IAAI;YAC1C,cAAc,EAAE,mBAAmB,CAAC,IAAI;YACxC,yBAAyB,EAAE,mBAAmB,CAAC,IAAI;YACnD,iBAAiB,EAAE,mBAAmB,CAAC,IAAI;YAC3C,mBAAmB,EAAE,mBAAmB,CAAC,IAAI;YAC7C,eAAe,EAAE,mBAAmB,CAAC,IAAI;YACzC,yBAAyB,EAAE,mBAAmB,CAAC,IAAI;YACnD,sBAAsB,EAAE,mBAAmB,CAAC,IAAI;YAChD,eAAe,EAAE,mBAAmB,CAAC,IAAI;YACzC,mBAAmB,EAAE,mBAAmB,CAAC,IAAI;YAC7C,qBAAqB,EAAE,mBAAmB,CAAC,IAAI;YAC/C,eAAe,EAAE,mBAAmB,CAAC,MAAM;YAC3C,WAAW,EAAE,mBAAmB,CAAC,MAAM;YACvC,WAAW,EAAE,mBAAmB,CAAC,MAAM;YACvC,SAAS,EAAE,mBAAmB,CAAC,MAAM;YACrC,WAAW,EAAE,mBAAmB,CAAC,MAAM;YACvC,aAAa,EAAE,mBAAmB,CAAC,MAAM;YACzC,YAAY,EAAE,mBAAmB,CAAC,MAAM;YACxC,SAAS,EAAE,mBAAmB,CAAC,MAAM;YACrC,oBAAoB,EAAE,mBAAmB,CAAC,MAAM;YAChD,UAAU,EAAE,mBAAmB,CAAC,MAAM;YACtC,gBAAgB,EAAE,mBAAmB,CAAC,MAAM;YAC5C,WAAW,EAAE,mBAAmB,CAAC,MAAM;YACvC,kBAAkB,EAAE,mBAAmB,CAAC,MAAM;YAC9C,uBAAuB,EAAE,mBAAmB,CAAC,MAAM;YACnD,iBAAiB,EAAE,mBAAmB,CAAC,MAAM;YAC7C,cAAc,EAAE,mBAAmB,CAAC,MAAM;YAC1C,YAAY,EAAE,mBAAmB,CAAC,MAAM;YACxC,SAAS,EAAE,mBAAmB,CAAC,MAAM;YACrC,oBAAoB,EAAE,mBAAmB,CAAC,MAAM;YAChD,UAAU,EAAE,mBAAmB,CAAC,GAAG;YACnC,uBAAuB,EAAE,mBAAmB,CAAC,GAAG;YAChD,UAAU,EAAE,mBAAmB,CAAC,GAAG;YACnC,eAAe,EAAE,mBAAmB,CAAC,GAAG;YACxC,gBAAgB,EAAE,mBAAmB,CAAC,GAAG;YACzC,aAAa,EAAE,mBAAmB,CAAC,GAAG;YACtC,iBAAiB,EAAE,mBAAmB,CAAC,GAAG;YAC1C,oBAAoB,EAAE,mBAAmB,CAAC,GAAG;YAC7C,gBAAgB,EAAE,mBAAmB,CAAC,GAAG;YACzC,cAAc,EAAE,mBAAmB,CAAC,GAAG;YACvC,YAAY,EAAE,mBAAmB,CAAC,GAAG;YACrC,eAAe,EAAE,mBAAmB,CAAC,GAAG;SACzC,CAAC,CAAC;IACL,CAAC;IAEe,WAAW,CAAC,QAAgB;QAC1C,MAAM,QAAQ,GAAG,KAAK,CAAC,WAAW,CAAC,QAAQ,CAAC,CAAC;QAC7C,IAAI,QAAQ,CAAC,cAAc,KAAK,mBAAmB,CAAC,OAAO,EAAE,CAAC;YAC5D,QAAQ,CAAC,cAAc,GAAG,mBAAmB,CAAC,GAAG,CAAC;QACpD,CAAC;QACD,OAAO,QAAQ,CAAC;IAClB,CAAC;CACF"}
|
|
1
|
+
{"version":3,"file":"loose.js","sourceRoot":"","sources":["../../../../src/libs/conf-init/presets/loose.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,mBAAmB,EAAE,MAAM,oCAAoC,CAAC;AAEzE,OAAO,UAAU,MAAM,WAAW,CAAC;AAEnC,MAAM,CAAC,OAAO,OAAO,WAAY,SAAQ,UAAU;IACjD;QACE,KAAK,CAAC;YACJ,eAAe,EAAE,mBAAmB,CAAC,IAAI;YACzC,oBAAoB,EAAE,mBAAmB,CAAC,IAAI;YAC9C,sBAAsB,EAAE,mBAAmB,CAAC,IAAI;YAChD,eAAe,EAAE,mBAAmB,CAAC,IAAI;YACzC,kBAAkB,EAAE,mBAAmB,CAAC,IAAI;YAC5C,oBAAoB,EAAE,mBAAmB,CAAC,IAAI;YAC9C,cAAc,EAAE,mBAAmB,CAAC,IAAI;YACxC,UAAU,EAAE,mBAAmB,CAAC,IAAI;YACpC,SAAS,EAAE,mBAAmB,CAAC,IAAI;YACnC,mBAAmB,EAAE,mBAAmB,CAAC,IAAI;YAC7C,UAAU,EAAE,mBAAmB,CAAC,IAAI;YACpC,gBAAgB,EAAE,mBAAmB,CAAC,IAAI;YAC1C,wBAAwB,EAAE,mBAAmB,CAAC,IAAI;YAClD,gBAAgB,EAAE,mBAAmB,CAAC,IAAI;YAC1C,gBAAgB,EAAE,mBAAmB,CAAC,IAAI;YAC1C,eAAe,EAAE,mBAAmB,CAAC,IAAI;YACzC,kBAAkB,EAAE,mBAAmB,CAAC,IAAI;YAC5C,yBAAyB,EAAE,mBAAmB,CAAC,IAAI;YACnD,oBAAoB,EAAE,mBAAmB,CAAC,IAAI;YAC9C,iBAAiB,EAAE,mBAAmB,CAAC,IAAI;YAC3C,aAAa,EAAE,mBAAmB,CAAC,IAAI;YACvC,mBAAmB,EAAE,mBAAmB,CAAC,IAAI;YAC7C,sBAAsB,EAAE,mBAAmB,CAAC,IAAI;YAChD,yBAAyB,EAAE,mBAAmB,CAAC,IAAI;YACnD,uBAAuB,EAAE,mBAAmB,CAAC,IAAI;YACjD,kBAAkB,EAAE,mBAAmB,CAAC,IAAI;YAC5C,WAAW,EAAE,mBAAmB,CAAC,IAAI;YACrC,gBAAgB,EAAE,mBAAmB,CAAC,IAAI;YAC1C,cAAc,EAAE,mBAAmB,CAAC,IAAI;YACxC,yBAAyB,EAAE,mBAAmB,CAAC,IAAI;YACnD,iBAAiB,EAAE,mBAAmB,CAAC,IAAI;YAC3C,mBAAmB,EAAE,mBAAmB,CAAC,IAAI;YAC7C,eAAe,EAAE,mBAAmB,CAAC,IAAI;YACzC,yBAAyB,EAAE,mBAAmB,CAAC,IAAI;YACnD,sBAAsB,EAAE,mBAAmB,CAAC,IAAI;YAChD,eAAe,EAAE,mBAAmB,CAAC,IAAI;YACzC,mBAAmB,EAAE,mBAAmB,CAAC,IAAI;YAC7C,qBAAqB,EAAE,mBAAmB,CAAC,IAAI;YAC/C,iBAAiB,EAAE,mBAAmB,CAAC,IAAI;YAC3C,eAAe,EAAE,mBAAmB,CAAC,MAAM;YAC3C,WAAW,EAAE,mBAAmB,CAAC,MAAM;YACvC,WAAW,EAAE,mBAAmB,CAAC,MAAM;YACvC,SAAS,EAAE,mBAAmB,CAAC,MAAM;YACrC,WAAW,EAAE,mBAAmB,CAAC,MAAM;YACvC,aAAa,EAAE,mBAAmB,CAAC,MAAM;YACzC,YAAY,EAAE,mBAAmB,CAAC,MAAM;YACxC,SAAS,EAAE,mBAAmB,CAAC,MAAM;YACrC,oBAAoB,EAAE,mBAAmB,CAAC,MAAM;YAChD,UAAU,EAAE,mBAAmB,CAAC,MAAM;YACtC,gBAAgB,EAAE,mBAAmB,CAAC,MAAM;YAC5C,WAAW,EAAE,mBAAmB,CAAC,MAAM;YACvC,kBAAkB,EAAE,mBAAmB,CAAC,MAAM;YAC9C,uBAAuB,EAAE,mBAAmB,CAAC,MAAM;YACnD,iBAAiB,EAAE,mBAAmB,CAAC,MAAM;YAC7C,cAAc,EAAE,mBAAmB,CAAC,MAAM;YAC1C,YAAY,EAAE,mBAAmB,CAAC,MAAM;YACxC,SAAS,EAAE,mBAAmB,CAAC,MAAM;YACrC,oBAAoB,EAAE,mBAAmB,CAAC,MAAM;YAChD,mBAAmB,EAAE,mBAAmB,CAAC,MAAM;YAC/C,UAAU,EAAE,mBAAmB,CAAC,GAAG;YACnC,uBAAuB,EAAE,mBAAmB,CAAC,GAAG;YAChD,UAAU,EAAE,mBAAmB,CAAC,GAAG;YACnC,eAAe,EAAE,mBAAmB,CAAC,GAAG;YACxC,gBAAgB,EAAE,mBAAmB,CAAC,GAAG;YACzC,aAAa,EAAE,mBAAmB,CAAC,GAAG;YACtC,iBAAiB,EAAE,mBAAmB,CAAC,GAAG;YAC1C,oBAAoB,EAAE,mBAAmB,CAAC,GAAG;YAC7C,gBAAgB,EAAE,mBAAmB,CAAC,GAAG;YACzC,cAAc,EAAE,mBAAmB,CAAC,GAAG;YACvC,YAAY,EAAE,mBAAmB,CAAC,GAAG;YACrC,eAAe,EAAE,mBAAmB,CAAC,GAAG;SACzC,CAAC,CAAC;IACL,CAAC;IAEe,WAAW,CAAC,QAAgB;QAC1C,MAAM,QAAQ,GAAG,KAAK,CAAC,WAAW,CAAC,QAAQ,CAAC,CAAC;QAC7C,IAAI,QAAQ,CAAC,cAAc,KAAK,mBAAmB,CAAC,OAAO,EAAE,CAAC;YAC5D,QAAQ,CAAC,cAAc,GAAG,mBAAmB,CAAC,GAAG,CAAC;QACpD,CAAC;QACD,OAAO,QAAQ,CAAC;IAClB,CAAC;CACF"}
|
|
@@ -1,16 +1,16 @@
|
|
|
1
|
-
import {
|
|
1
|
+
import { NamedPermissionClassification } from '../../core/file-mgmt/schema.js';
|
|
2
2
|
import { PermissionRiskLevel } from '../../core/classification-types.js';
|
|
3
3
|
import { Optional } from '../../core/utils.js';
|
|
4
|
-
export type UnclassifiedPerm = Optional<
|
|
4
|
+
export type UnclassifiedPerm = Optional<NamedPermissionClassification, 'classification'>;
|
|
5
5
|
export type Preset = {
|
|
6
|
-
classifyUserPermissions(rawPerms: UnclassifiedPerm[]):
|
|
6
|
+
classifyUserPermissions(rawPerms: UnclassifiedPerm[]): NamedPermissionClassification[];
|
|
7
7
|
};
|
|
8
8
|
/**
|
|
9
9
|
* A "blank" preset that is extended by all other presets
|
|
10
10
|
* and initialises classification descriptions
|
|
11
11
|
*/
|
|
12
12
|
export default class NonePreset implements Preset {
|
|
13
|
-
protected userPermissions: Record<string, Partial<
|
|
13
|
+
protected userPermissions: Record<string, Partial<NamedPermissionClassification>>;
|
|
14
14
|
constructor(userPerms?: Record<string, PermissionRiskLevel>);
|
|
15
15
|
/**
|
|
16
16
|
* Finalises permissions for all unclassified user perms that are set
|
|
@@ -18,7 +18,7 @@ export default class NonePreset implements Preset {
|
|
|
18
18
|
*
|
|
19
19
|
* @param perms
|
|
20
20
|
*/
|
|
21
|
-
classifyUserPermissions(rawPerms: UnclassifiedPerm[]):
|
|
21
|
+
classifyUserPermissions(rawPerms: UnclassifiedPerm[]): NamedPermissionClassification[];
|
|
22
22
|
/**
|
|
23
23
|
* Initialises a default classification for a given permission name.
|
|
24
24
|
* This merges pre-configured defaults with available descriptions.
|
|
@@ -26,5 +26,5 @@ export default class NonePreset implements Preset {
|
|
|
26
26
|
* @param permName
|
|
27
27
|
* @returns
|
|
28
28
|
*/
|
|
29
|
-
initDefault(permName: string):
|
|
29
|
+
initDefault(permName: string): NamedPermissionClassification;
|
|
30
30
|
}
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"none.js","sourceRoot":"","sources":["../../../../src/libs/conf-init/presets/none.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,QAAQ,EAAE,MAAM,kBAAkB,CAAC;AAE5C,OAAO,EAAE,mBAAmB,EAAE,MAAM,oCAAoC,CAAC;AAGzE,QAAQ,CAAC,kCAAkC,CAAC,MAAM,CAAC,IAAI,CAAC,GAAG,CAAC,CAAC;AAC7D,MAAM,YAAY,GAAG,QAAQ,CAAC,YAAY,CAAC,oCAAoC,EAAE,uBAAuB,CAAC,CAAC;AAQ1G;;;GAGG;AACH,MAAM,CAAC,OAAO,OAAO,UAAU;IACnB,eAAe,
|
|
1
|
+
{"version":3,"file":"none.js","sourceRoot":"","sources":["../../../../src/libs/conf-init/presets/none.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,QAAQ,EAAE,MAAM,kBAAkB,CAAC;AAE5C,OAAO,EAAE,mBAAmB,EAAE,MAAM,oCAAoC,CAAC;AAGzE,QAAQ,CAAC,kCAAkC,CAAC,MAAM,CAAC,IAAI,CAAC,GAAG,CAAC,CAAC;AAC7D,MAAM,YAAY,GAAG,QAAQ,CAAC,YAAY,CAAC,oCAAoC,EAAE,uBAAuB,CAAC,CAAC;AAQ1G;;;GAGG;AACH,MAAM,CAAC,OAAO,OAAO,UAAU;IACnB,eAAe,CAAyD;IAElF,YAAmB,SAA+C;QAChE,IAAI,CAAC,eAAe,GAAG,EAAE,CAAC;QAC1B,IAAI,SAAS,EAAE,CAAC;YACd,MAAM,CAAC,OAAO,CAAC,SAAS,CAAC,CAAC,OAAO,CAAC,CAAC,CAAC,IAAI,EAAE,cAAc,CAAC,EAAE,EAAE;gBAC3D,IAAI,IAAI,CAAC,eAAe,CAAC,IAAI,CAAC,EAAE,CAAC;oBAC/B,IAAI,CAAC,eAAe,CAAC,IAAI,CAAC,CAAC,cAAc,GAAG,cAAc,CAAC;gBAC7D,CAAC;qBAAM,CAAC;oBACN,IAAI,CAAC,eAAe,CAAC,IAAI,CAAC,GAAG,EAAE,cAAc,EAAE,CAAC;gBAClD,CAAC;YACH,CAAC,CAAC,CAAC;QACL,CAAC;IACH,CAAC;IAED;;;;;OAKG;IACI,uBAAuB,CAAC,QAA4B;QACzD,OAAO,QAAQ,CAAC,GAAG,CAAC,CAAC,IAAI,EAAE,EAAE,CAAC,CAAC;YAC7B,GAAG,IAAI,CAAC,WAAW,CAAC,IAAI,CAAC,IAAI,CAAC;YAC9B,GAAG,IAAI;SACR,CAAC,CAAC,CAAC;IACN,CAAC;IAED;;;;;;OAMG;IACI,WAAW,CAAC,QAAgB;QACjC,MAAM,GAAG,GAAG,IAAI,CAAC,eAAe,CAAC,QAAQ,CAAC,CAAC;QAC3C,MAAM,cAAc,GAAG,YAAY,CAAC,QAAQ,CAAC,GAAG,CAAC,QAAQ,CAAC,CAAC;QAC3D,OAAO;YACL,GAAG,GAAG;YACN,IAAI,EAAE,QAAQ;YACd,cAAc,EAAE,GAAG,EAAE,cAAc,IAAI,mBAAmB,CAAC,OAAO;YAClE,MAAM,EAAE,cAAc,CAAC,CAAC,CAAC,YAAY,CAAC,UAAU,CAAC,QAAQ,CAAC,CAAC,CAAC,CAAC,SAAS;SACvE,CAAC;IACJ,CAAC;CACF"}
|
|
@@ -5,6 +5,7 @@ export default class StrictPreset extends NonePreset {
|
|
|
5
5
|
super({
|
|
6
6
|
UseAnyApiClient: PermissionRiskLevel.BLOCKED,
|
|
7
7
|
BypassMFAForUiLogins: PermissionRiskLevel.BLOCKED,
|
|
8
|
+
BulkApiHardDelete: PermissionRiskLevel.BLOCKED,
|
|
8
9
|
ManageNamedCredentials: PermissionRiskLevel.CRITICAL,
|
|
9
10
|
ImportCustomObjects: PermissionRiskLevel.CRITICAL,
|
|
10
11
|
ManageSandboxes: PermissionRiskLevel.CRITICAL,
|
|
@@ -59,6 +60,7 @@ export default class StrictPreset extends NonePreset {
|
|
|
59
60
|
ViewAllProfiles: PermissionRiskLevel.HIGH,
|
|
60
61
|
MonitorLoginHistory: PermissionRiskLevel.HIGH,
|
|
61
62
|
ManagePackageLicenses: PermissionRiskLevel.HIGH,
|
|
63
|
+
EmailAdministration: PermissionRiskLevel.HIGH,
|
|
62
64
|
ScheduleReports: PermissionRiskLevel.MEDIUM,
|
|
63
65
|
EmailMass: PermissionRiskLevel.MEDIUM,
|
|
64
66
|
DataExport: PermissionRiskLevel.MEDIUM,
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"strict.js","sourceRoot":"","sources":["../../../../src/libs/conf-init/presets/strict.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,mBAAmB,EAAE,MAAM,oCAAoC,CAAC;AACzE,OAAO,UAAU,MAAM,WAAW,CAAC;AAEnC,MAAM,CAAC,OAAO,OAAO,YAAa,SAAQ,UAAU;IAClD;QACE,KAAK,CAAC;YACJ,eAAe,EAAE,mBAAmB,CAAC,OAAO;YAC5C,oBAAoB,EAAE,mBAAmB,CAAC,OAAO;YACjD,sBAAsB,EAAE,mBAAmB,CAAC,QAAQ;YACpD,mBAAmB,EAAE,mBAAmB,CAAC,QAAQ;YACjD,eAAe,EAAE,mBAAmB,CAAC,QAAQ;YAC7C,kBAAkB,EAAE,mBAAmB,CAAC,QAAQ;YAChD,oBAAoB,EAAE,mBAAmB,CAAC,QAAQ;YAClD,cAAc,EAAE,mBAAmB,CAAC,QAAQ;YAC5C,UAAU,EAAE,mBAAmB,CAAC,QAAQ;YACxC,SAAS,EAAE,mBAAmB,CAAC,QAAQ;YACvC,mBAAmB,EAAE,mBAAmB,CAAC,QAAQ;YACjD,UAAU,EAAE,mBAAmB,CAAC,QAAQ;YACxC,gBAAgB,EAAE,mBAAmB,CAAC,QAAQ;YAC9C,wBAAwB,EAAE,mBAAmB,CAAC,QAAQ;YACtD,gBAAgB,EAAE,mBAAmB,CAAC,QAAQ;YAC9C,gBAAgB,EAAE,mBAAmB,CAAC,QAAQ;YAC9C,sBAAsB,EAAE,mBAAmB,CAAC,QAAQ;YACpD,yBAAyB,EAAE,mBAAmB,CAAC,QAAQ;YACvD,yBAAyB,EAAE,mBAAmB,CAAC,QAAQ;YACvD,eAAe,EAAE,mBAAmB,CAAC,QAAQ;YAC7C,kBAAkB,EAAE,mBAAmB,CAAC,IAAI;YAC5C,YAAY,EAAE,mBAAmB,CAAC,IAAI;YACtC,SAAS,EAAE,mBAAmB,CAAC,IAAI;YACnC,UAAU,EAAE,mBAAmB,CAAC,IAAI;YACpC,WAAW,EAAE,mBAAmB,CAAC,IAAI;YACrC,aAAa,EAAE,mBAAmB,CAAC,IAAI;YACvC,eAAe,EAAE,mBAAmB,CAAC,IAAI;YACzC,kBAAkB,EAAE,mBAAmB,CAAC,IAAI;YAC5C,yBAAyB,EAAE,mBAAmB,CAAC,IAAI;YACnD,oBAAoB,EAAE,mBAAmB,CAAC,IAAI;YAC9C,WAAW,EAAE,mBAAmB,CAAC,IAAI;YACrC,iBAAiB,EAAE,mBAAmB,CAAC,IAAI;YAC3C,aAAa,EAAE,mBAAmB,CAAC,IAAI;YACvC,mBAAmB,EAAE,mBAAmB,CAAC,IAAI;YAC7C,sBAAsB,EAAE,mBAAmB,CAAC,IAAI;YAChD,yBAAyB,EAAE,mBAAmB,CAAC,IAAI;YACnD,uBAAuB,EAAE,mBAAmB,CAAC,IAAI;YACjD,WAAW,EAAE,mBAAmB,CAAC,IAAI;YACrC,oBAAoB,EAAE,mBAAmB,CAAC,IAAI;YAC9C,gBAAgB,EAAE,mBAAmB,CAAC,IAAI;YAC1C,WAAW,EAAE,mBAAmB,CAAC,IAAI;YACrC,iBAAiB,EAAE,mBAAmB,CAAC,IAAI;YAC3C,kBAAkB,EAAE,mBAAmB,CAAC,IAAI;YAC5C,iBAAiB,EAAE,mBAAmB,CAAC,IAAI;YAC3C,gBAAgB,EAAE,mBAAmB,CAAC,IAAI;YAC1C,cAAc,EAAE,mBAAmB,CAAC,IAAI;YACxC,cAAc,EAAE,mBAAmB,CAAC,IAAI;YACxC,YAAY,EAAE,mBAAmB,CAAC,IAAI;YACtC,oBAAoB,EAAE,mBAAmB,CAAC,IAAI;YAC9C,eAAe,EAAE,mBAAmB,CAAC,IAAI;YACzC,iBAAiB,EAAE,mBAAmB,CAAC,IAAI;YAC3C,mBAAmB,EAAE,mBAAmB,CAAC,IAAI;YAC7C,SAAS,EAAE,mBAAmB,CAAC,IAAI;YACnC,eAAe,EAAE,mBAAmB,CAAC,IAAI;YACzC,mBAAmB,EAAE,mBAAmB,CAAC,IAAI;YAC7C,qBAAqB,EAAE,mBAAmB,CAAC,IAAI;YAC/C,eAAe,EAAE,mBAAmB,CAAC,MAAM;YAC3C,SAAS,EAAE,mBAAmB,CAAC,MAAM;YACrC,UAAU,EAAE,mBAAmB,CAAC,MAAM;YACtC,UAAU,EAAE,mBAAmB,CAAC,MAAM;YACtC,eAAe,EAAE,mBAAmB,CAAC,MAAM;YAC3C,gBAAgB,EAAE,mBAAmB,CAAC,MAAM;YAC5C,aAAa,EAAE,mBAAmB,CAAC,MAAM;YACzC,uBAAuB,EAAE,mBAAmB,CAAC,MAAM;YACnD,YAAY,EAAE,mBAAmB,CAAC,MAAM;YACxC,WAAW,EAAE,mBAAmB,CAAC,IAAI;YACrC,uBAAuB,EAAE,mBAAmB,CAAC,GAAG;YAChD,oBAAoB,EAAE,mBAAmB,CAAC,GAAG;YAC7C,gBAAgB,EAAE,mBAAmB,CAAC,GAAG;YACzC,cAAc,EAAE,mBAAmB,CAAC,GAAG;SACxC,CAAC,CAAC;IACL,CAAC;CACF"}
|
|
1
|
+
{"version":3,"file":"strict.js","sourceRoot":"","sources":["../../../../src/libs/conf-init/presets/strict.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,mBAAmB,EAAE,MAAM,oCAAoC,CAAC;AACzE,OAAO,UAAU,MAAM,WAAW,CAAC;AAEnC,MAAM,CAAC,OAAO,OAAO,YAAa,SAAQ,UAAU;IAClD;QACE,KAAK,CAAC;YACJ,eAAe,EAAE,mBAAmB,CAAC,OAAO;YAC5C,oBAAoB,EAAE,mBAAmB,CAAC,OAAO;YACjD,iBAAiB,EAAE,mBAAmB,CAAC,OAAO;YAC9C,sBAAsB,EAAE,mBAAmB,CAAC,QAAQ;YACpD,mBAAmB,EAAE,mBAAmB,CAAC,QAAQ;YACjD,eAAe,EAAE,mBAAmB,CAAC,QAAQ;YAC7C,kBAAkB,EAAE,mBAAmB,CAAC,QAAQ;YAChD,oBAAoB,EAAE,mBAAmB,CAAC,QAAQ;YAClD,cAAc,EAAE,mBAAmB,CAAC,QAAQ;YAC5C,UAAU,EAAE,mBAAmB,CAAC,QAAQ;YACxC,SAAS,EAAE,mBAAmB,CAAC,QAAQ;YACvC,mBAAmB,EAAE,mBAAmB,CAAC,QAAQ;YACjD,UAAU,EAAE,mBAAmB,CAAC,QAAQ;YACxC,gBAAgB,EAAE,mBAAmB,CAAC,QAAQ;YAC9C,wBAAwB,EAAE,mBAAmB,CAAC,QAAQ;YACtD,gBAAgB,EAAE,mBAAmB,CAAC,QAAQ;YAC9C,gBAAgB,EAAE,mBAAmB,CAAC,QAAQ;YAC9C,sBAAsB,EAAE,mBAAmB,CAAC,QAAQ;YACpD,yBAAyB,EAAE,mBAAmB,CAAC,QAAQ;YACvD,yBAAyB,EAAE,mBAAmB,CAAC,QAAQ;YACvD,eAAe,EAAE,mBAAmB,CAAC,QAAQ;YAC7C,kBAAkB,EAAE,mBAAmB,CAAC,IAAI;YAC5C,YAAY,EAAE,mBAAmB,CAAC,IAAI;YACtC,SAAS,EAAE,mBAAmB,CAAC,IAAI;YACnC,UAAU,EAAE,mBAAmB,CAAC,IAAI;YACpC,WAAW,EAAE,mBAAmB,CAAC,IAAI;YACrC,aAAa,EAAE,mBAAmB,CAAC,IAAI;YACvC,eAAe,EAAE,mBAAmB,CAAC,IAAI;YACzC,kBAAkB,EAAE,mBAAmB,CAAC,IAAI;YAC5C,yBAAyB,EAAE,mBAAmB,CAAC,IAAI;YACnD,oBAAoB,EAAE,mBAAmB,CAAC,IAAI;YAC9C,WAAW,EAAE,mBAAmB,CAAC,IAAI;YACrC,iBAAiB,EAAE,mBAAmB,CAAC,IAAI;YAC3C,aAAa,EAAE,mBAAmB,CAAC,IAAI;YACvC,mBAAmB,EAAE,mBAAmB,CAAC,IAAI;YAC7C,sBAAsB,EAAE,mBAAmB,CAAC,IAAI;YAChD,yBAAyB,EAAE,mBAAmB,CAAC,IAAI;YACnD,uBAAuB,EAAE,mBAAmB,CAAC,IAAI;YACjD,WAAW,EAAE,mBAAmB,CAAC,IAAI;YACrC,oBAAoB,EAAE,mBAAmB,CAAC,IAAI;YAC9C,gBAAgB,EAAE,mBAAmB,CAAC,IAAI;YAC1C,WAAW,EAAE,mBAAmB,CAAC,IAAI;YACrC,iBAAiB,EAAE,mBAAmB,CAAC,IAAI;YAC3C,kBAAkB,EAAE,mBAAmB,CAAC,IAAI;YAC5C,iBAAiB,EAAE,mBAAmB,CAAC,IAAI;YAC3C,gBAAgB,EAAE,mBAAmB,CAAC,IAAI;YAC1C,cAAc,EAAE,mBAAmB,CAAC,IAAI;YACxC,cAAc,EAAE,mBAAmB,CAAC,IAAI;YACxC,YAAY,EAAE,mBAAmB,CAAC,IAAI;YACtC,oBAAoB,EAAE,mBAAmB,CAAC,IAAI;YAC9C,eAAe,EAAE,mBAAmB,CAAC,IAAI;YACzC,iBAAiB,EAAE,mBAAmB,CAAC,IAAI;YAC3C,mBAAmB,EAAE,mBAAmB,CAAC,IAAI;YAC7C,SAAS,EAAE,mBAAmB,CAAC,IAAI;YACnC,eAAe,EAAE,mBAAmB,CAAC,IAAI;YACzC,mBAAmB,EAAE,mBAAmB,CAAC,IAAI;YAC7C,qBAAqB,EAAE,mBAAmB,CAAC,IAAI;YAC/C,mBAAmB,EAAE,mBAAmB,CAAC,IAAI;YAC7C,eAAe,EAAE,mBAAmB,CAAC,MAAM;YAC3C,SAAS,EAAE,mBAAmB,CAAC,MAAM;YACrC,UAAU,EAAE,mBAAmB,CAAC,MAAM;YACtC,UAAU,EAAE,mBAAmB,CAAC,MAAM;YACtC,eAAe,EAAE,mBAAmB,CAAC,MAAM;YAC3C,gBAAgB,EAAE,mBAAmB,CAAC,MAAM;YAC5C,aAAa,EAAE,mBAAmB,CAAC,MAAM;YACzC,uBAAuB,EAAE,mBAAmB,CAAC,MAAM;YACnD,YAAY,EAAE,mBAAmB,CAAC,MAAM;YACxC,WAAW,EAAE,mBAAmB,CAAC,IAAI;YACrC,uBAAuB,EAAE,mBAAmB,CAAC,GAAG;YAChD,oBAAoB,EAAE,mBAAmB,CAAC,GAAG;YAC7C,gBAAgB,EAAE,mBAAmB,CAAC,GAAG;YACzC,cAAc,EAAE,mBAAmB,CAAC,GAAG;SACxC,CAAC,CAAC;IACL,CAAC;CACF"}
|
|
@@ -1,4 +1,4 @@
|
|
|
1
|
-
import {
|
|
1
|
+
import { NamedPermissionClassification } from './file-mgmt/schema.js';
|
|
2
2
|
/**
|
|
3
3
|
* Enum to classify user and custom permissions.
|
|
4
4
|
*/
|
|
@@ -17,4 +17,4 @@ export declare enum PermissionRiskLevel {
|
|
|
17
17
|
UNKNOWN = "Unknown"
|
|
18
18
|
}
|
|
19
19
|
export declare function resolveRiskLevelOrdinalValue(value: string): number;
|
|
20
|
-
export declare const classificationSorter: (a:
|
|
20
|
+
export declare const classificationSorter: (a: NamedPermissionClassification, b: NamedPermissionClassification) => number;
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"classification-types.js","sourceRoot":"","sources":["../../../src/libs/core/classification-types.ts"],"names":[],"mappings":"AAEA;;GAEG;AACH,MAAM,CAAN,IAAY,mBAaX;AAbD,WAAY,mBAAmB;IAC7B,+EAA+E;IAC/E,0CAAmB,CAAA;IACnB,6DAA6D;IAC7D,4CAAqB,CAAA;IACrB,sEAAsE;IACtE,oCAAa,CAAA;IACb,yDAAyD;IACzD,wCAAiB,CAAA;IACjB,qEAAqE;IACrE,kCAAW,CAAA;IACX,kFAAkF;IAClF,0CAAmB,CAAA;AACrB,CAAC,EAbW,mBAAmB,KAAnB,mBAAmB,QAa9B;AAED,MAAM,UAAU,4BAA4B,CAAC,KAAa;IACxD,OAAO,MAAM,CAAC,IAAI,CAAC,mBAAmB,CAAC,CAAC,OAAO,CAAC,KAAK,CAAC,WAAW,EAAE,CAAC,CAAC;AACvE,CAAC;AAED,MAAM,CAAC,MAAM,oBAAoB,GAAG,CAAC,
|
|
1
|
+
{"version":3,"file":"classification-types.js","sourceRoot":"","sources":["../../../src/libs/core/classification-types.ts"],"names":[],"mappings":"AAEA;;GAEG;AACH,MAAM,CAAN,IAAY,mBAaX;AAbD,WAAY,mBAAmB;IAC7B,+EAA+E;IAC/E,0CAAmB,CAAA;IACnB,6DAA6D;IAC7D,4CAAqB,CAAA;IACrB,sEAAsE;IACtE,oCAAa,CAAA;IACb,yDAAyD;IACzD,wCAAiB,CAAA;IACjB,qEAAqE;IACrE,kCAAW,CAAA;IACX,kFAAkF;IAClF,0CAAmB,CAAA;AACrB,CAAC,EAbW,mBAAmB,KAAnB,mBAAmB,QAa9B;AAED,MAAM,UAAU,4BAA4B,CAAC,KAAa;IACxD,OAAO,MAAM,CAAC,IAAI,CAAC,mBAAmB,CAAC,CAAC,OAAO,CAAC,KAAK,CAAC,WAAW,EAAE,CAAC,CAAC;AACvE,CAAC;AAED,MAAM,CAAC,MAAM,oBAAoB,GAAG,CAAC,CAAgC,EAAE,CAAgC,EAAU,EAAE,CACjH,4BAA4B,CAAC,CAAC,CAAC,cAAc,CAAC,GAAG,4BAA4B,CAAC,CAAC,CAAC,cAAc,CAAC,CAAC"}
|