@salesforce/b2c-tooling-sdk 1.0.0 → 1.1.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/cjs/cli/base-command.d.ts +33 -8
- package/dist/cjs/cli/base-command.js +92 -35
- package/dist/cjs/cli/base-command.js.map +1 -1
- package/dist/cjs/clients/middleware.d.ts +15 -10
- package/dist/cjs/clients/middleware.js +22 -15
- package/dist/cjs/clients/middleware.js.map +1 -1
- package/dist/cjs/clients/webdav.d.ts +22 -0
- package/dist/cjs/clients/webdav.js +46 -0
- package/dist/cjs/clients/webdav.js.map +1 -1
- package/dist/cjs/config/dw-json.d.ts +32 -0
- package/dist/cjs/config/dw-json.js.map +1 -1
- package/dist/cjs/config/mapping.js +55 -0
- package/dist/cjs/config/mapping.js.map +1 -1
- package/dist/cjs/config/resolver.js +9 -1
- package/dist/cjs/config/resolver.js.map +1 -1
- package/dist/cjs/config/sources/env-source.js +3 -1
- package/dist/cjs/config/sources/env-source.js.map +1 -1
- package/dist/cjs/config/types.d.ts +15 -0
- package/dist/cjs/index.d.ts +3 -2
- package/dist/cjs/index.js +1 -1
- package/dist/cjs/index.js.map +1 -1
- package/dist/cjs/operations/code/deploy.d.ts +6 -2
- package/dist/cjs/operations/code/deploy.js +13 -10
- package/dist/cjs/operations/code/deploy.js.map +1 -1
- package/dist/cjs/safety/index.d.ts +7 -2
- package/dist/cjs/safety/index.js +5 -1
- package/dist/cjs/safety/index.js.map +1 -1
- package/dist/cjs/safety/safety-guard.d.ts +92 -0
- package/dist/cjs/safety/safety-guard.js +270 -0
- package/dist/cjs/safety/safety-guard.js.map +1 -0
- package/dist/cjs/safety/safety-middleware.d.ts +86 -1
- package/dist/cjs/safety/safety-middleware.js +165 -16
- package/dist/cjs/safety/safety-middleware.js.map +1 -1
- package/dist/cjs/safety/types.d.ts +81 -0
- package/dist/cjs/safety/types.js +16 -0
- package/dist/cjs/safety/types.js.map +1 -0
- package/dist/cjs/safety/with-confirmation.d.ts +58 -0
- package/dist/cjs/safety/with-confirmation.js +67 -0
- package/dist/cjs/safety/with-confirmation.js.map +1 -0
- package/dist/cjs/ux/confirm.d.ts +14 -0
- package/dist/cjs/ux/confirm.js +36 -0
- package/dist/cjs/ux/confirm.js.map +1 -0
- package/dist/esm/cli/base-command.d.ts +33 -8
- package/dist/esm/cli/base-command.js +92 -35
- package/dist/esm/cli/base-command.js.map +1 -1
- package/dist/esm/clients/middleware.d.ts +15 -10
- package/dist/esm/clients/middleware.js +22 -15
- package/dist/esm/clients/middleware.js.map +1 -1
- package/dist/esm/clients/webdav.d.ts +22 -0
- package/dist/esm/clients/webdav.js +46 -0
- package/dist/esm/clients/webdav.js.map +1 -1
- package/dist/esm/config/dw-json.d.ts +32 -0
- package/dist/esm/config/dw-json.js.map +1 -1
- package/dist/esm/config/mapping.js +55 -0
- package/dist/esm/config/mapping.js.map +1 -1
- package/dist/esm/config/resolver.js +9 -1
- package/dist/esm/config/resolver.js.map +1 -1
- package/dist/esm/config/sources/env-source.js +3 -1
- package/dist/esm/config/sources/env-source.js.map +1 -1
- package/dist/esm/config/types.d.ts +15 -0
- package/dist/esm/index.d.ts +3 -2
- package/dist/esm/index.js +1 -1
- package/dist/esm/index.js.map +1 -1
- package/dist/esm/operations/code/deploy.d.ts +6 -2
- package/dist/esm/operations/code/deploy.js +13 -10
- package/dist/esm/operations/code/deploy.js.map +1 -1
- package/dist/esm/safety/index.d.ts +7 -2
- package/dist/esm/safety/index.js +5 -1
- package/dist/esm/safety/index.js.map +1 -1
- package/dist/esm/safety/safety-guard.d.ts +92 -0
- package/dist/esm/safety/safety-guard.js +270 -0
- package/dist/esm/safety/safety-guard.js.map +1 -0
- package/dist/esm/safety/safety-middleware.d.ts +86 -1
- package/dist/esm/safety/safety-middleware.js +165 -16
- package/dist/esm/safety/safety-middleware.js.map +1 -1
- package/dist/esm/safety/types.d.ts +81 -0
- package/dist/esm/safety/types.js +16 -0
- package/dist/esm/safety/types.js.map +1 -0
- package/dist/esm/safety/with-confirmation.d.ts +58 -0
- package/dist/esm/safety/with-confirmation.js +67 -0
- package/dist/esm/safety/with-confirmation.js.map +1 -0
- package/dist/esm/ux/confirm.d.ts +14 -0
- package/dist/esm/ux/confirm.js +36 -0
- package/dist/esm/ux/confirm.js.map +1 -0
- package/package.json +1 -1
|
@@ -0,0 +1,270 @@
|
|
|
1
|
+
/*
|
|
2
|
+
* Copyright (c) 2025, Salesforce, Inc.
|
|
3
|
+
* SPDX-License-Identifier: Apache-2
|
|
4
|
+
* For full license text, see the license.txt file in the repo root or http://www.apache.org/licenses/LICENSE-2.0
|
|
5
|
+
*/
|
|
6
|
+
/**
|
|
7
|
+
* SafetyGuard: SDK-level safety evaluation engine.
|
|
8
|
+
*
|
|
9
|
+
* Evaluates operations against safety rules and levels, producing typed
|
|
10
|
+
* evaluations (allow/block/confirm). Used by both the HTTP middleware
|
|
11
|
+
* (automatic) and command-level checks (opt-in).
|
|
12
|
+
*
|
|
13
|
+
* @module safety/safety-guard
|
|
14
|
+
*/
|
|
15
|
+
import { Minimatch } from 'minimatch';
|
|
16
|
+
import { getLogger } from '../logging/index.js';
|
|
17
|
+
import { SafetyBlockedError, SafetyConfirmationRequired, checkLevelViolation, describeSafetyLevel, } from './safety-middleware.js';
|
|
18
|
+
/** Regex to extract job ID from OCAPI job execution URLs. */
|
|
19
|
+
const JOB_EXECUTION_PATTERN = /\/jobs\/([^/]+)\/executions/;
|
|
20
|
+
/**
|
|
21
|
+
* Extract a job ID from a URL path if it's a job execution endpoint.
|
|
22
|
+
*
|
|
23
|
+
* Matches patterns like:
|
|
24
|
+
* - `/s/-/dw/data/v24_5/jobs/sfcc-site-archive-import/executions`
|
|
25
|
+
* - `/jobs/sfcc-site-archive-export/executions`
|
|
26
|
+
*/
|
|
27
|
+
export function extractJobIdFromPath(path) {
|
|
28
|
+
const match = JOB_EXECUTION_PATTERN.exec(path);
|
|
29
|
+
return match?.[1];
|
|
30
|
+
}
|
|
31
|
+
/**
|
|
32
|
+
* Test whether a string matches a glob pattern.
|
|
33
|
+
* Uses minimatch with dot matching enabled.
|
|
34
|
+
*/
|
|
35
|
+
function matchGlob(value, pattern) {
|
|
36
|
+
const matcher = new Minimatch(pattern, { dot: true, nocase: true });
|
|
37
|
+
return matcher.match(value);
|
|
38
|
+
}
|
|
39
|
+
/**
|
|
40
|
+
* Check if a rule matches an operation.
|
|
41
|
+
*/
|
|
42
|
+
function ruleMatchesOperation(rule, operation) {
|
|
43
|
+
// Command matcher
|
|
44
|
+
if (rule.command !== undefined) {
|
|
45
|
+
if (!operation.commandId)
|
|
46
|
+
return false;
|
|
47
|
+
return matchGlob(operation.commandId, rule.command);
|
|
48
|
+
}
|
|
49
|
+
// Job matcher
|
|
50
|
+
if (rule.job !== undefined) {
|
|
51
|
+
const jobId = operation.jobId ?? (operation.path ? extractJobIdFromPath(operation.path) : undefined);
|
|
52
|
+
if (!jobId)
|
|
53
|
+
return false;
|
|
54
|
+
return matchGlob(jobId, rule.job);
|
|
55
|
+
}
|
|
56
|
+
// HTTP method + path matcher
|
|
57
|
+
if (rule.path !== undefined) {
|
|
58
|
+
if (!operation.path)
|
|
59
|
+
return false;
|
|
60
|
+
if (!matchGlob(operation.path, rule.path))
|
|
61
|
+
return false;
|
|
62
|
+
// If method is specified, it must also match
|
|
63
|
+
if (rule.method !== undefined) {
|
|
64
|
+
if (!operation.method)
|
|
65
|
+
return false;
|
|
66
|
+
return matchGlob(operation.method.toUpperCase(), rule.method.toUpperCase());
|
|
67
|
+
}
|
|
68
|
+
return true;
|
|
69
|
+
}
|
|
70
|
+
// Method-only matcher (no path)
|
|
71
|
+
if (rule.method !== undefined) {
|
|
72
|
+
if (!operation.method)
|
|
73
|
+
return false;
|
|
74
|
+
return matchGlob(operation.method.toUpperCase(), rule.method.toUpperCase());
|
|
75
|
+
}
|
|
76
|
+
// Rule has no matchers — does not match anything
|
|
77
|
+
return false;
|
|
78
|
+
}
|
|
79
|
+
/**
|
|
80
|
+
* SafetyGuard evaluates operations against safety rules and levels.
|
|
81
|
+
*
|
|
82
|
+
* The guard provides three levels of API:
|
|
83
|
+
* - {@link evaluate} — returns a {@link SafetyEvaluation} describing what should happen
|
|
84
|
+
* - {@link assert} — throws {@link SafetyBlockedError} or {@link SafetyConfirmationRequired}
|
|
85
|
+
* - {@link temporarilyAllow} — creates a scoped exemption for confirmed operations
|
|
86
|
+
*
|
|
87
|
+
* The HTTP middleware uses the guard internally so all HTTP requests are
|
|
88
|
+
* evaluated automatically. CLI commands and other consumers can use the
|
|
89
|
+
* guard directly for richer safety interaction (command-level checks,
|
|
90
|
+
* confirmation flows).
|
|
91
|
+
*
|
|
92
|
+
* @example
|
|
93
|
+
* ```typescript
|
|
94
|
+
* const guard = new SafetyGuard({
|
|
95
|
+
* level: 'NO_UPDATE',
|
|
96
|
+
* confirm: true,
|
|
97
|
+
* rules: [{ job: 'sfcc-site-archive-export', action: 'allow' }],
|
|
98
|
+
* });
|
|
99
|
+
*
|
|
100
|
+
* const evaluation = guard.evaluate({ type: 'job', jobId: 'sfcc-site-archive-export' });
|
|
101
|
+
* // evaluation.action === 'allow'
|
|
102
|
+
* ```
|
|
103
|
+
*/
|
|
104
|
+
export class SafetyGuard {
|
|
105
|
+
config;
|
|
106
|
+
temporaryAllows = [];
|
|
107
|
+
logger;
|
|
108
|
+
constructor(config) {
|
|
109
|
+
this.config = config;
|
|
110
|
+
this.logger = getLogger();
|
|
111
|
+
}
|
|
112
|
+
/**
|
|
113
|
+
* Evaluate an operation against safety rules and level.
|
|
114
|
+
*
|
|
115
|
+
* Evaluation order:
|
|
116
|
+
* 1. Temporary allows (from confirmed retries) — if matched, allow
|
|
117
|
+
* 2. Config rules in order — first matching rule's action wins
|
|
118
|
+
* 3. Level-based default — confirm if `confirm: true`, otherwise block/allow
|
|
119
|
+
*
|
|
120
|
+
* All evaluations are trace-logged for diagnostics.
|
|
121
|
+
*/
|
|
122
|
+
evaluate(operation) {
|
|
123
|
+
// 1. Check temporary allows (confirmed operations)
|
|
124
|
+
for (const rule of this.temporaryAllows) {
|
|
125
|
+
if (ruleMatchesOperation(rule, operation)) {
|
|
126
|
+
const evaluation = {
|
|
127
|
+
action: 'allow',
|
|
128
|
+
reason: 'Temporarily allowed after confirmation',
|
|
129
|
+
operation,
|
|
130
|
+
rule,
|
|
131
|
+
};
|
|
132
|
+
this.logger.trace({ operation, evaluation }, '[SafetyGuard] Allowed by temporary exemption');
|
|
133
|
+
return evaluation;
|
|
134
|
+
}
|
|
135
|
+
}
|
|
136
|
+
// 2. Check config rules (first match wins)
|
|
137
|
+
if (this.config.rules) {
|
|
138
|
+
for (const rule of this.config.rules) {
|
|
139
|
+
if (ruleMatchesOperation(rule, operation)) {
|
|
140
|
+
const evaluation = {
|
|
141
|
+
action: rule.action,
|
|
142
|
+
reason: this.describeRuleMatch(rule, operation),
|
|
143
|
+
operation,
|
|
144
|
+
rule,
|
|
145
|
+
};
|
|
146
|
+
this.logger.trace({ operation, rule, action: rule.action }, '[SafetyGuard] Matched rule');
|
|
147
|
+
return evaluation;
|
|
148
|
+
}
|
|
149
|
+
}
|
|
150
|
+
}
|
|
151
|
+
// 3. Fall back to level-based evaluation
|
|
152
|
+
return this.evaluateByLevel(operation);
|
|
153
|
+
}
|
|
154
|
+
/**
|
|
155
|
+
* Assert that an operation is allowed.
|
|
156
|
+
*
|
|
157
|
+
* @throws {SafetyBlockedError} if the operation is blocked
|
|
158
|
+
* @throws {SafetyConfirmationRequired} if the operation needs confirmation
|
|
159
|
+
*/
|
|
160
|
+
assert(operation) {
|
|
161
|
+
const evaluation = this.evaluate(operation);
|
|
162
|
+
switch (evaluation.action) {
|
|
163
|
+
case 'allow':
|
|
164
|
+
return;
|
|
165
|
+
case 'block':
|
|
166
|
+
throw new SafetyBlockedError(evaluation.reason, operation.method ?? '', operation.url ?? '', this.config.level);
|
|
167
|
+
case 'confirm':
|
|
168
|
+
throw new SafetyConfirmationRequired(evaluation);
|
|
169
|
+
}
|
|
170
|
+
}
|
|
171
|
+
/**
|
|
172
|
+
* Create a temporary exemption for a confirmed operation.
|
|
173
|
+
*
|
|
174
|
+
* Returns a cleanup function that removes the exemption. Use this
|
|
175
|
+
* to retry an operation after the user has confirmed.
|
|
176
|
+
*/
|
|
177
|
+
temporarilyAllow(operation) {
|
|
178
|
+
const rule = this.operationToRule(operation);
|
|
179
|
+
return this.temporarilyAddRule(rule);
|
|
180
|
+
}
|
|
181
|
+
/**
|
|
182
|
+
* Add a temporary safety rule for a scoped exemption.
|
|
183
|
+
*
|
|
184
|
+
* Unlike {@link temporarilyAllow} which derives a rule from an operation,
|
|
185
|
+
* this accepts an arbitrary rule — useful for granting broad temporary
|
|
186
|
+
* access (e.g., allowing WebDAV DELETE on Impex paths during a job export).
|
|
187
|
+
*
|
|
188
|
+
* Returns a cleanup function that removes the rule.
|
|
189
|
+
*/
|
|
190
|
+
temporarilyAddRule(rule) {
|
|
191
|
+
this.temporaryAllows.push(rule);
|
|
192
|
+
this.logger.trace({ rule }, '[SafetyGuard] Added temporary rule');
|
|
193
|
+
return () => {
|
|
194
|
+
const idx = this.temporaryAllows.indexOf(rule);
|
|
195
|
+
if (idx >= 0) {
|
|
196
|
+
this.temporaryAllows.splice(idx, 1);
|
|
197
|
+
this.logger.trace({ rule }, '[SafetyGuard] Removed temporary rule');
|
|
198
|
+
}
|
|
199
|
+
};
|
|
200
|
+
}
|
|
201
|
+
/**
|
|
202
|
+
* Evaluate an operation using only the safety level (no rules).
|
|
203
|
+
*/
|
|
204
|
+
evaluateByLevel(operation) {
|
|
205
|
+
// For HTTP operations, check the level
|
|
206
|
+
if (operation.method && operation.path) {
|
|
207
|
+
const violation = checkLevelViolation(operation.method, operation.path, this.config.level);
|
|
208
|
+
if (violation) {
|
|
209
|
+
const action = this.config.confirm ? 'confirm' : 'block';
|
|
210
|
+
const evaluation = {
|
|
211
|
+
action,
|
|
212
|
+
reason: this.describeLevelBlock(operation),
|
|
213
|
+
operation,
|
|
214
|
+
};
|
|
215
|
+
this.logger.trace({ operation, action, level: this.config.level }, '[SafetyGuard] Level evaluation');
|
|
216
|
+
return evaluation;
|
|
217
|
+
}
|
|
218
|
+
}
|
|
219
|
+
// For command operations, no level-based blocking (levels are HTTP-level)
|
|
220
|
+
// Commands opt into safety via rules or assertDestructiveOperationAllowed()
|
|
221
|
+
const evaluation = {
|
|
222
|
+
action: 'allow',
|
|
223
|
+
reason: 'No matching rule and level allows this operation',
|
|
224
|
+
operation,
|
|
225
|
+
};
|
|
226
|
+
this.logger.trace({ operation, level: this.config.level }, '[SafetyGuard] Allowed by level');
|
|
227
|
+
return evaluation;
|
|
228
|
+
}
|
|
229
|
+
/**
|
|
230
|
+
* Convert an operation to a temporary allow rule for retry.
|
|
231
|
+
*/
|
|
232
|
+
operationToRule(operation) {
|
|
233
|
+
if (operation.commandId) {
|
|
234
|
+
return { command: operation.commandId, action: 'allow' };
|
|
235
|
+
}
|
|
236
|
+
if (operation.jobId) {
|
|
237
|
+
return { job: operation.jobId, action: 'allow' };
|
|
238
|
+
}
|
|
239
|
+
// HTTP operation — match exact method + path
|
|
240
|
+
return {
|
|
241
|
+
method: operation.method,
|
|
242
|
+
path: operation.path,
|
|
243
|
+
action: 'allow',
|
|
244
|
+
};
|
|
245
|
+
}
|
|
246
|
+
/**
|
|
247
|
+
* Describe why a rule matched, for user-facing messages.
|
|
248
|
+
*/
|
|
249
|
+
describeRuleMatch(rule, operation) {
|
|
250
|
+
if (rule.command) {
|
|
251
|
+
return `Command "${operation.commandId}" matched safety rule (command: "${rule.command}", action: ${rule.action})`;
|
|
252
|
+
}
|
|
253
|
+
if (rule.job) {
|
|
254
|
+
return `Job "${operation.jobId}" matched safety rule (job: "${rule.job}", action: ${rule.action})`;
|
|
255
|
+
}
|
|
256
|
+
const method = operation.method ?? 'unknown';
|
|
257
|
+
const path = operation.path ?? 'unknown';
|
|
258
|
+
return `${method} ${path} matched safety rule (action: ${rule.action})`;
|
|
259
|
+
}
|
|
260
|
+
/**
|
|
261
|
+
* Describe why the level blocked an operation, for user-facing messages.
|
|
262
|
+
*/
|
|
263
|
+
describeLevelBlock(operation) {
|
|
264
|
+
const method = operation.method ?? 'unknown';
|
|
265
|
+
const path = operation.path ?? 'unknown';
|
|
266
|
+
const levelDesc = describeSafetyLevel(this.config.level);
|
|
267
|
+
return `${method} ${path} blocked by safety level ${this.config.level} — ${levelDesc}`;
|
|
268
|
+
}
|
|
269
|
+
}
|
|
270
|
+
//# sourceMappingURL=safety-guard.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"safety-guard.js","sourceRoot":"","sources":["../../../src/safety/safety-guard.ts"],"names":[],"mappings":"AAAA;;;;GAIG;AAEH;;;;;;;;GAQG;AAEH,OAAO,EAAC,SAAS,EAAC,MAAM,WAAW,CAAC;AACpC,OAAO,EAAC,SAAS,EAAc,MAAM,qBAAqB,CAAC;AAE3D,OAAO,EACL,kBAAkB,EAClB,0BAA0B,EAC1B,mBAAmB,EACnB,mBAAmB,GACpB,MAAM,wBAAwB,CAAC;AAGhC,6DAA6D;AAC7D,MAAM,qBAAqB,GAAG,6BAA6B,CAAC;AAE5D;;;;;;GAMG;AACH,MAAM,UAAU,oBAAoB,CAAC,IAAY;IAC/C,MAAM,KAAK,GAAG,qBAAqB,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;IAC/C,OAAO,KAAK,EAAE,CAAC,CAAC,CAAC,CAAC;AACpB,CAAC;AAED;;;GAGG;AACH,SAAS,SAAS,CAAC,KAAa,EAAE,OAAe;IAC/C,MAAM,OAAO,GAAG,IAAI,SAAS,CAAC,OAAO,EAAE,EAAC,GAAG,EAAE,IAAI,EAAE,MAAM,EAAE,IAAI,EAAC,CAAC,CAAC;IAClE,OAAO,OAAO,CAAC,KAAK,CAAC,KAAK,CAAC,CAAC;AAC9B,CAAC;AAED;;GAEG;AACH,SAAS,oBAAoB,CAAC,IAAgB,EAAE,SAA0B;IACxE,kBAAkB;IAClB,IAAI,IAAI,CAAC,OAAO,KAAK,SAAS,EAAE,CAAC;QAC/B,IAAI,CAAC,SAAS,CAAC,SAAS;YAAE,OAAO,KAAK,CAAC;QACvC,OAAO,SAAS,CAAC,SAAS,CAAC,SAAS,EAAE,IAAI,CAAC,OAAO,CAAC,CAAC;IACtD,CAAC;IAED,cAAc;IACd,IAAI,IAAI,CAAC,GAAG,KAAK,SAAS,EAAE,CAAC;QAC3B,MAAM,KAAK,GAAG,SAAS,CAAC,KAAK,IAAI,CAAC,SAAS,CAAC,IAAI,CAAC,CAAC,CAAC,oBAAoB,CAAC,SAAS,CAAC,IAAI,CAAC,CAAC,CAAC,CAAC,SAAS,CAAC,CAAC;QACrG,IAAI,CAAC,KAAK;YAAE,OAAO,KAAK,CAAC;QACzB,OAAO,SAAS,CAAC,KAAK,EAAE,IAAI,CAAC,GAAG,CAAC,CAAC;IACpC,CAAC;IAED,6BAA6B;IAC7B,IAAI,IAAI,CAAC,IAAI,KAAK,SAAS,EAAE,CAAC;QAC5B,IAAI,CAAC,SAAS,CAAC,IAAI;YAAE,OAAO,KAAK,CAAC;QAClC,IAAI,CAAC,SAAS,CAAC,SAAS,CAAC,IAAI,EAAE,IAAI,CAAC,IAAI,CAAC;YAAE,OAAO,KAAK,CAAC;QACxD,6CAA6C;QAC7C,IAAI,IAAI,CAAC,MAAM,KAAK,SAAS,EAAE,CAAC;YAC9B,IAAI,CAAC,SAAS,CAAC,MAAM;gBAAE,OAAO,KAAK,CAAC;YACpC,OAAO,SAAS,CAAC,SAAS,CAAC,MAAM,CAAC,WAAW,EAAE,EAAE,IAAI,CAAC,MAAM,CAAC,WAAW,EAAE,CAAC,CAAC;QAC9E,CAAC;QACD,OAAO,IAAI,CAAC;IACd,CAAC;IAED,gCAAgC;IAChC,IAAI,IAAI,CAAC,MAAM,KAAK,SAAS,EAAE,CAAC;QAC9B,IAAI,CAAC,SAAS,CAAC,MAAM;YAAE,OAAO,KAAK,CAAC;QACpC,OAAO,SAAS,CAAC,SAAS,CAAC,MAAM,CAAC,WAAW,EAAE,EAAE,IAAI,CAAC,MAAM,CAAC,WAAW,EAAE,CAAC,CAAC;IAC9E,CAAC;IAED,iDAAiD;IACjD,OAAO,KAAK,CAAC;AACf,CAAC;AAED;;;;;;;;;;;;;;;;;;;;;;;;GAwBG;AACH,MAAM,OAAO,WAAW;IAIM;IAHpB,eAAe,GAAiB,EAAE,CAAC;IAC1B,MAAM,CAAS;IAEhC,YAA4B,MAAoB;QAApB,WAAM,GAAN,MAAM,CAAc;QAC9C,IAAI,CAAC,MAAM,GAAG,SAAS,EAAE,CAAC;IAC5B,CAAC;IAED;;;;;;;;;OASG;IACH,QAAQ,CAAC,SAA0B;QACjC,mDAAmD;QACnD,KAAK,MAAM,IAAI,IAAI,IAAI,CAAC,eAAe,EAAE,CAAC;YACxC,IAAI,oBAAoB,CAAC,IAAI,EAAE,SAAS,CAAC,EAAE,CAAC;gBAC1C,MAAM,UAAU,GAAqB;oBACnC,MAAM,EAAE,OAAO;oBACf,MAAM,EAAE,wCAAwC;oBAChD,SAAS;oBACT,IAAI;iBACL,CAAC;gBACF,IAAI,CAAC,MAAM,CAAC,KAAK,CAAC,EAAC,SAAS,EAAE,UAAU,EAAC,EAAE,8CAA8C,CAAC,CAAC;gBAC3F,OAAO,UAAU,CAAC;YACpB,CAAC;QACH,CAAC;QAED,2CAA2C;QAC3C,IAAI,IAAI,CAAC,MAAM,CAAC,KAAK,EAAE,CAAC;YACtB,KAAK,MAAM,IAAI,IAAI,IAAI,CAAC,MAAM,CAAC,KAAK,EAAE,CAAC;gBACrC,IAAI,oBAAoB,CAAC,IAAI,EAAE,SAAS,CAAC,EAAE,CAAC;oBAC1C,MAAM,UAAU,GAAqB;wBACnC,MAAM,EAAE,IAAI,CAAC,MAAM;wBACnB,MAAM,EAAE,IAAI,CAAC,iBAAiB,CAAC,IAAI,EAAE,SAAS,CAAC;wBAC/C,SAAS;wBACT,IAAI;qBACL,CAAC;oBACF,IAAI,CAAC,MAAM,CAAC,KAAK,CAAC,EAAC,SAAS,EAAE,IAAI,EAAE,MAAM,EAAE,IAAI,CAAC,MAAM,EAAC,EAAE,4BAA4B,CAAC,CAAC;oBACxF,OAAO,UAAU,CAAC;gBACpB,CAAC;YACH,CAAC;QACH,CAAC;QAED,yCAAyC;QACzC,OAAO,IAAI,CAAC,eAAe,CAAC,SAAS,CAAC,CAAC;IACzC,CAAC;IAED;;;;;OAKG;IACH,MAAM,CAAC,SAA0B;QAC/B,MAAM,UAAU,GAAG,IAAI,CAAC,QAAQ,CAAC,SAAS,CAAC,CAAC;QAC5C,QAAQ,UAAU,CAAC,MAAM,EAAE,CAAC;YAC1B,KAAK,OAAO;gBACV,OAAO;YACT,KAAK,OAAO;gBACV,MAAM,IAAI,kBAAkB,CAAC,UAAU,CAAC,MAAM,EAAE,SAAS,CAAC,MAAM,IAAI,EAAE,EAAE,SAAS,CAAC,GAAG,IAAI,EAAE,EAAE,IAAI,CAAC,MAAM,CAAC,KAAK,CAAC,CAAC;YAClH,KAAK,SAAS;gBACZ,MAAM,IAAI,0BAA0B,CAAC,UAAU,CAAC,CAAC;QACrD,CAAC;IACH,CAAC;IAED;;;;;OAKG;IACH,gBAAgB,CAAC,SAA0B;QACzC,MAAM,IAAI,GAAG,IAAI,CAAC,eAAe,CAAC,SAAS,CAAC,CAAC;QAC7C,OAAO,IAAI,CAAC,kBAAkB,CAAC,IAAI,CAAC,CAAC;IACvC,CAAC;IAED;;;;;;;;OAQG;IACH,kBAAkB,CAAC,IAAgB;QACjC,IAAI,CAAC,eAAe,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;QAChC,IAAI,CAAC,MAAM,CAAC,KAAK,CAAC,EAAC,IAAI,EAAC,EAAE,oCAAoC,CAAC,CAAC;QAEhE,OAAO,GAAG,EAAE;YACV,MAAM,GAAG,GAAG,IAAI,CAAC,eAAe,CAAC,OAAO,CAAC,IAAI,CAAC,CAAC;YAC/C,IAAI,GAAG,IAAI,CAAC,EAAE,CAAC;gBACb,IAAI,CAAC,eAAe,CAAC,MAAM,CAAC,GAAG,EAAE,CAAC,CAAC,CAAC;gBACpC,IAAI,CAAC,MAAM,CAAC,KAAK,CAAC,EAAC,IAAI,EAAC,EAAE,sCAAsC,CAAC,CAAC;YACpE,CAAC;QACH,CAAC,CAAC;IACJ,CAAC;IAED;;OAEG;IACK,eAAe,CAAC,SAA0B;QAChD,uCAAuC;QACvC,IAAI,SAAS,CAAC,MAAM,IAAI,SAAS,CAAC,IAAI,EAAE,CAAC;YACvC,MAAM,SAAS,GAAG,mBAAmB,CAAC,SAAS,CAAC,MAAM,EAAE,SAAS,CAAC,IAAI,EAAE,IAAI,CAAC,MAAM,CAAC,KAAK,CAAC,CAAC;YAC3F,IAAI,SAAS,EAAE,CAAC;gBACd,MAAM,MAAM,GAAiB,IAAI,CAAC,MAAM,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC,CAAC,CAAC,OAAO,CAAC;gBACvE,MAAM,UAAU,GAAqB;oBACnC,MAAM;oBACN,MAAM,EAAE,IAAI,CAAC,kBAAkB,CAAC,SAAS,CAAC;oBAC1C,SAAS;iBACV,CAAC;gBACF,IAAI,CAAC,MAAM,CAAC,KAAK,CAAC,EAAC,SAAS,EAAE,MAAM,EAAE,KAAK,EAAE,IAAI,CAAC,MAAM,CAAC,KAAK,EAAC,EAAE,gCAAgC,CAAC,CAAC;gBACnG,OAAO,UAAU,CAAC;YACpB,CAAC;QACH,CAAC;QAED,0EAA0E;QAC1E,4EAA4E;QAC5E,MAAM,UAAU,GAAqB;YACnC,MAAM,EAAE,OAAO;YACf,MAAM,EAAE,kDAAkD;YAC1D,SAAS;SACV,CAAC;QACF,IAAI,CAAC,MAAM,CAAC,KAAK,CAAC,EAAC,SAAS,EAAE,KAAK,EAAE,IAAI,CAAC,MAAM,CAAC,KAAK,EAAC,EAAE,gCAAgC,CAAC,CAAC;QAC3F,OAAO,UAAU,CAAC;IACpB,CAAC;IAED;;OAEG;IACK,eAAe,CAAC,SAA0B;QAChD,IAAI,SAAS,CAAC,SAAS,EAAE,CAAC;YACxB,OAAO,EAAC,OAAO,EAAE,SAAS,CAAC,SAAS,EAAE,MAAM,EAAE,OAAO,EAAC,CAAC;QACzD,CAAC;QACD,IAAI,SAAS,CAAC,KAAK,EAAE,CAAC;YACpB,OAAO,EAAC,GAAG,EAAE,SAAS,CAAC,KAAK,EAAE,MAAM,EAAE,OAAO,EAAC,CAAC;QACjD,CAAC;QACD,6CAA6C;QAC7C,OAAO;YACL,MAAM,EAAE,SAAS,CAAC,MAAM;YACxB,IAAI,EAAE,SAAS,CAAC,IAAI;YACpB,MAAM,EAAE,OAAO;SAChB,CAAC;IACJ,CAAC;IAED;;OAEG;IACK,iBAAiB,CAAC,IAAgB,EAAE,SAA0B;QACpE,IAAI,IAAI,CAAC,OAAO,EAAE,CAAC;YACjB,OAAO,YAAY,SAAS,CAAC,SAAS,oCAAoC,IAAI,CAAC,OAAO,cAAc,IAAI,CAAC,MAAM,GAAG,CAAC;QACrH,CAAC;QACD,IAAI,IAAI,CAAC,GAAG,EAAE,CAAC;YACb,OAAO,QAAQ,SAAS,CAAC,KAAK,gCAAgC,IAAI,CAAC,GAAG,cAAc,IAAI,CAAC,MAAM,GAAG,CAAC;QACrG,CAAC;QACD,MAAM,MAAM,GAAG,SAAS,CAAC,MAAM,IAAI,SAAS,CAAC;QAC7C,MAAM,IAAI,GAAG,SAAS,CAAC,IAAI,IAAI,SAAS,CAAC;QACzC,OAAO,GAAG,MAAM,IAAI,IAAI,iCAAiC,IAAI,CAAC,MAAM,GAAG,CAAC;IAC1E,CAAC;IAED;;OAEG;IACK,kBAAkB,CAAC,SAA0B;QACnD,MAAM,MAAM,GAAG,SAAS,CAAC,MAAM,IAAI,SAAS,CAAC;QAC7C,MAAM,IAAI,GAAG,SAAS,CAAC,IAAI,IAAI,SAAS,CAAC;QACzC,MAAM,SAAS,GAAG,mBAAmB,CAAC,IAAI,CAAC,MAAM,CAAC,KAAK,CAAC,CAAC;QACzD,OAAO,GAAG,MAAM,IAAI,IAAI,4BAA4B,IAAI,CAAC,MAAM,CAAC,KAAK,MAAM,SAAS,EAAE,CAAC;IACzF,CAAC;CACF"}
|
|
@@ -1,3 +1,5 @@
|
|
|
1
|
+
import type { SafetyRule } from './types.js';
|
|
2
|
+
import type { SafetyEvaluation } from './types.js';
|
|
1
3
|
/**
|
|
2
4
|
* Safety levels for preventing destructive operations.
|
|
3
5
|
*
|
|
@@ -7,11 +9,34 @@
|
|
|
7
9
|
* - READ_ONLY: Block all write operations (only GET allowed)
|
|
8
10
|
*/
|
|
9
11
|
export type SafetyLevel = 'NONE' | 'NO_DELETE' | 'NO_UPDATE' | 'READ_ONLY';
|
|
12
|
+
/**
|
|
13
|
+
* Safety configuration.
|
|
14
|
+
*
|
|
15
|
+
* Supports both simple level-based blocking and granular per-rule actions.
|
|
16
|
+
*/
|
|
10
17
|
export interface SafetyConfig {
|
|
18
|
+
/** The base safety level. */
|
|
11
19
|
level: SafetyLevel;
|
|
20
|
+
/** When true, operations that the level would block require confirmation instead of hard-blocking. */
|
|
21
|
+
confirm?: boolean;
|
|
22
|
+
/** Ordered list of rules. First matching rule wins. */
|
|
23
|
+
rules?: SafetyRule[];
|
|
12
24
|
}
|
|
13
25
|
/**
|
|
14
|
-
*
|
|
26
|
+
* Returns the more restrictive of two safety levels.
|
|
27
|
+
*/
|
|
28
|
+
export declare function maxSafetyLevel(a: SafetyLevel, b: SafetyLevel): SafetyLevel;
|
|
29
|
+
/**
|
|
30
|
+
* Check if a string is a valid SafetyLevel.
|
|
31
|
+
*/
|
|
32
|
+
export declare function isValidSafetyLevel(value: string): value is SafetyLevel;
|
|
33
|
+
/**
|
|
34
|
+
* Parse a string to a SafetyLevel, returning undefined for invalid values.
|
|
35
|
+
* Accepts case-insensitive input and converts dashes to underscores.
|
|
36
|
+
*/
|
|
37
|
+
export declare function parseSafetyLevelString(value: string | undefined): SafetyLevel | undefined;
|
|
38
|
+
/**
|
|
39
|
+
* Safety error thrown when an operation is blocked by safety configuration.
|
|
15
40
|
*/
|
|
16
41
|
export declare class SafetyBlockedError extends Error {
|
|
17
42
|
readonly method: string;
|
|
@@ -19,6 +44,28 @@ export declare class SafetyBlockedError extends Error {
|
|
|
19
44
|
readonly safetyLevel: SafetyLevel;
|
|
20
45
|
constructor(message: string, method: string, url: string, safetyLevel: SafetyLevel);
|
|
21
46
|
}
|
|
47
|
+
/**
|
|
48
|
+
* Error thrown when an operation requires interactive confirmation.
|
|
49
|
+
*
|
|
50
|
+
* Callers can catch this error, prompt the user, and retry the operation
|
|
51
|
+
* using {@link withSafetyConfirmation}.
|
|
52
|
+
*/
|
|
53
|
+
export declare class SafetyConfirmationRequired extends Error {
|
|
54
|
+
readonly evaluation: SafetyEvaluation;
|
|
55
|
+
constructor(evaluation: SafetyEvaluation);
|
|
56
|
+
}
|
|
57
|
+
/**
|
|
58
|
+
* Checks if an HTTP operation should be blocked based on a safety level.
|
|
59
|
+
*
|
|
60
|
+
* This is the low-level level check. For full rule-based evaluation,
|
|
61
|
+
* use {@link SafetyGuard.evaluate}.
|
|
62
|
+
*
|
|
63
|
+
* @param method - HTTP method (GET, POST, PUT, PATCH, DELETE)
|
|
64
|
+
* @param path - URL pathname
|
|
65
|
+
* @param level - Safety level to check against
|
|
66
|
+
* @returns Error message if blocked, undefined if allowed
|
|
67
|
+
*/
|
|
68
|
+
export declare function checkLevelViolation(method: string, path: string, level: SafetyLevel): string | undefined;
|
|
22
69
|
/**
|
|
23
70
|
* Checks if an HTTP operation should be blocked based on safety configuration.
|
|
24
71
|
*
|
|
@@ -26,6 +73,7 @@ export declare class SafetyBlockedError extends Error {
|
|
|
26
73
|
* @param url - Request URL
|
|
27
74
|
* @param config - Safety configuration
|
|
28
75
|
* @returns Error message if blocked, undefined if allowed
|
|
76
|
+
* @deprecated Use {@link SafetyGuard.evaluate} for full rule-based evaluation.
|
|
29
77
|
*/
|
|
30
78
|
export declare function checkSafetyViolation(method: string, url: string, config: SafetyConfig): string | undefined;
|
|
31
79
|
/**
|
|
@@ -43,3 +91,40 @@ export declare function getSafetyLevel(defaultLevel?: SafetyLevel): SafetyLevel;
|
|
|
43
91
|
* Get a user-friendly description of the safety level.
|
|
44
92
|
*/
|
|
45
93
|
export declare function describeSafetyLevel(level: SafetyLevel): string;
|
|
94
|
+
/** Validated safety config fragment (shared by global and per-instance). */
|
|
95
|
+
export interface SafetyConfigFragment {
|
|
96
|
+
level?: SafetyLevel;
|
|
97
|
+
confirm?: boolean;
|
|
98
|
+
rules?: SafetyRule[];
|
|
99
|
+
}
|
|
100
|
+
/**
|
|
101
|
+
* Load global safety configuration from a JSON file.
|
|
102
|
+
*
|
|
103
|
+
* Resolution order:
|
|
104
|
+
* 1. `SFCC_SAFETY_CONFIG` env var — explicit path to a safety config file
|
|
105
|
+
* 2. `{configDir}/safety.json` — oclif config directory (e.g., `~/.config/b2c/safety.json`)
|
|
106
|
+
*
|
|
107
|
+
* The file has the same shape as the `safety` object in dw.json:
|
|
108
|
+
* ```json
|
|
109
|
+
* { "level": "NO_DELETE", "confirm": true, "rules": [...] }
|
|
110
|
+
* ```
|
|
111
|
+
*
|
|
112
|
+
* @param configDir - oclif config directory path (e.g., `this.config.configDir`)
|
|
113
|
+
* @returns Validated safety config fragment, or undefined if no file found
|
|
114
|
+
*/
|
|
115
|
+
export declare function loadGlobalSafetyConfig(configDir?: string): SafetyConfigFragment | undefined;
|
|
116
|
+
/**
|
|
117
|
+
* Compute effective safety config by merging environment variables, global
|
|
118
|
+
* safety config, and per-instance config.
|
|
119
|
+
*
|
|
120
|
+
* Merge strategy:
|
|
121
|
+
* - **Level**: `max(env, global, instance)` — most restrictive wins
|
|
122
|
+
* - **Confirm**: OR across all sources
|
|
123
|
+
* - **Rules**: instance rules first, then global rules (first-match-wins,
|
|
124
|
+
* so instance rules can override global policy)
|
|
125
|
+
*
|
|
126
|
+
* @param instanceSafety - Per-instance safety config from dw.json
|
|
127
|
+
* @param globalSafety - Global safety config from safety.json
|
|
128
|
+
* @returns Merged SafetyConfig
|
|
129
|
+
*/
|
|
130
|
+
export declare function resolveEffectiveSafetyConfig(instanceSafety?: SafetyConfigFragment, globalSafety?: SafetyConfigFragment): SafetyConfig;
|
|
@@ -3,9 +3,47 @@
|
|
|
3
3
|
* SPDX-License-Identifier: Apache-2
|
|
4
4
|
* For full license text, see the license.txt file in the repo root or http://www.apache.org/licenses/LICENSE-2.0
|
|
5
5
|
*/
|
|
6
|
+
import { existsSync, readFileSync } from 'node:fs';
|
|
7
|
+
import { join } from 'node:path';
|
|
6
8
|
import { getLogger } from '../logging/logger.js';
|
|
9
|
+
import { isValidSafetyAction } from './types.js';
|
|
7
10
|
/**
|
|
8
|
-
*
|
|
11
|
+
* Ordering of safety levels from least to most restrictive.
|
|
12
|
+
*/
|
|
13
|
+
const LEVEL_ORDER = {
|
|
14
|
+
NONE: 0,
|
|
15
|
+
NO_DELETE: 1,
|
|
16
|
+
NO_UPDATE: 2,
|
|
17
|
+
READ_ONLY: 3,
|
|
18
|
+
};
|
|
19
|
+
/**
|
|
20
|
+
* Valid safety level strings.
|
|
21
|
+
*/
|
|
22
|
+
const VALID_LEVELS = ['NONE', 'NO_DELETE', 'NO_UPDATE', 'READ_ONLY'];
|
|
23
|
+
/**
|
|
24
|
+
* Returns the more restrictive of two safety levels.
|
|
25
|
+
*/
|
|
26
|
+
export function maxSafetyLevel(a, b) {
|
|
27
|
+
return LEVEL_ORDER[a] >= LEVEL_ORDER[b] ? a : b;
|
|
28
|
+
}
|
|
29
|
+
/**
|
|
30
|
+
* Check if a string is a valid SafetyLevel.
|
|
31
|
+
*/
|
|
32
|
+
export function isValidSafetyLevel(value) {
|
|
33
|
+
return VALID_LEVELS.includes(value);
|
|
34
|
+
}
|
|
35
|
+
/**
|
|
36
|
+
* Parse a string to a SafetyLevel, returning undefined for invalid values.
|
|
37
|
+
* Accepts case-insensitive input and converts dashes to underscores.
|
|
38
|
+
*/
|
|
39
|
+
export function parseSafetyLevelString(value) {
|
|
40
|
+
if (!value)
|
|
41
|
+
return undefined;
|
|
42
|
+
const normalized = value.toUpperCase().replace(/-/g, '_');
|
|
43
|
+
return isValidSafetyLevel(normalized) ? normalized : undefined;
|
|
44
|
+
}
|
|
45
|
+
/**
|
|
46
|
+
* Safety error thrown when an operation is blocked by safety configuration.
|
|
9
47
|
*/
|
|
10
48
|
export class SafetyBlockedError extends Error {
|
|
11
49
|
method;
|
|
@@ -20,35 +58,50 @@ export class SafetyBlockedError extends Error {
|
|
|
20
58
|
}
|
|
21
59
|
}
|
|
22
60
|
/**
|
|
23
|
-
*
|
|
61
|
+
* Error thrown when an operation requires interactive confirmation.
|
|
62
|
+
*
|
|
63
|
+
* Callers can catch this error, prompt the user, and retry the operation
|
|
64
|
+
* using {@link withSafetyConfirmation}.
|
|
65
|
+
*/
|
|
66
|
+
export class SafetyConfirmationRequired extends Error {
|
|
67
|
+
evaluation;
|
|
68
|
+
constructor(evaluation) {
|
|
69
|
+
super(`Confirmation required: ${evaluation.reason}`);
|
|
70
|
+
this.evaluation = evaluation;
|
|
71
|
+
this.name = 'SafetyConfirmationRequired';
|
|
72
|
+
}
|
|
73
|
+
}
|
|
74
|
+
/**
|
|
75
|
+
* Checks if an HTTP operation should be blocked based on a safety level.
|
|
76
|
+
*
|
|
77
|
+
* This is the low-level level check. For full rule-based evaluation,
|
|
78
|
+
* use {@link SafetyGuard.evaluate}.
|
|
24
79
|
*
|
|
25
80
|
* @param method - HTTP method (GET, POST, PUT, PATCH, DELETE)
|
|
26
|
-
* @param
|
|
27
|
-
* @param
|
|
81
|
+
* @param path - URL pathname
|
|
82
|
+
* @param level - Safety level to check against
|
|
28
83
|
* @returns Error message if blocked, undefined if allowed
|
|
29
84
|
*/
|
|
30
|
-
export function
|
|
85
|
+
export function checkLevelViolation(method, path, level) {
|
|
31
86
|
const upperMethod = method.toUpperCase();
|
|
32
|
-
|
|
33
|
-
switch (config.level) {
|
|
87
|
+
switch (level) {
|
|
34
88
|
case 'NONE':
|
|
35
|
-
return undefined;
|
|
89
|
+
return undefined;
|
|
36
90
|
case 'NO_DELETE':
|
|
37
91
|
if (upperMethod === 'DELETE') {
|
|
38
92
|
return `Delete operation blocked: DELETE ${path} (NO_DELETE mode prevents deletions)`;
|
|
39
93
|
}
|
|
40
94
|
return undefined;
|
|
41
|
-
case 'NO_UPDATE':
|
|
42
|
-
// Block DELETE operations
|
|
95
|
+
case 'NO_UPDATE': {
|
|
43
96
|
if (upperMethod === 'DELETE') {
|
|
44
97
|
return `Delete operation blocked: DELETE ${path} (NO_UPDATE mode prevents deletions)`;
|
|
45
98
|
}
|
|
46
|
-
// Block operations that contain reset, stop, restart in path or might be destructive
|
|
47
99
|
const destructivePatterns = ['/reset', '/stop', '/restart', '/operations'];
|
|
48
100
|
if (destructivePatterns.some((pattern) => path.includes(pattern)) && upperMethod === 'POST') {
|
|
49
101
|
return `Destructive operation blocked: POST ${path} (NO_UPDATE mode prevents reset/stop/restart)`;
|
|
50
102
|
}
|
|
51
103
|
return undefined;
|
|
104
|
+
}
|
|
52
105
|
case 'READ_ONLY':
|
|
53
106
|
if (['POST', 'PUT', 'PATCH', 'DELETE'].includes(upperMethod)) {
|
|
54
107
|
return `Write operation blocked: ${upperMethod} ${path} (READ_ONLY mode prevents all modifications)`;
|
|
@@ -58,6 +111,19 @@ export function checkSafetyViolation(method, url, config) {
|
|
|
58
111
|
return undefined;
|
|
59
112
|
}
|
|
60
113
|
}
|
|
114
|
+
/**
|
|
115
|
+
* Checks if an HTTP operation should be blocked based on safety configuration.
|
|
116
|
+
*
|
|
117
|
+
* @param method - HTTP method (GET, POST, PUT, PATCH, DELETE)
|
|
118
|
+
* @param url - Request URL
|
|
119
|
+
* @param config - Safety configuration
|
|
120
|
+
* @returns Error message if blocked, undefined if allowed
|
|
121
|
+
* @deprecated Use {@link SafetyGuard.evaluate} for full rule-based evaluation.
|
|
122
|
+
*/
|
|
123
|
+
export function checkSafetyViolation(method, url, config) {
|
|
124
|
+
const path = new URL(url, 'http://dummy').pathname;
|
|
125
|
+
return checkLevelViolation(method, path, config.level);
|
|
126
|
+
}
|
|
61
127
|
/**
|
|
62
128
|
* Parse safety level from environment variable.
|
|
63
129
|
*
|
|
@@ -71,11 +137,10 @@ export function checkSafetyViolation(method, url, config) {
|
|
|
71
137
|
export function getSafetyLevel(defaultLevel = 'NONE') {
|
|
72
138
|
const safetyLevelEnv = process.env['SFCC_SAFETY_LEVEL'];
|
|
73
139
|
if (safetyLevelEnv) {
|
|
74
|
-
const
|
|
75
|
-
if (
|
|
76
|
-
return
|
|
77
|
-
}
|
|
78
|
-
getLogger().warn({ envValue: safetyLevelEnv, validValues: ['NONE', 'NO_DELETE', 'NO_UPDATE', 'READ_ONLY'] }, 'SFCC_SAFETY_LEVEL has an invalid value; using default safety level');
|
|
140
|
+
const parsed = parseSafetyLevelString(safetyLevelEnv);
|
|
141
|
+
if (parsed)
|
|
142
|
+
return parsed;
|
|
143
|
+
getLogger().warn({ envValue: safetyLevelEnv, validValues: VALID_LEVELS }, 'SFCC_SAFETY_LEVEL has an invalid value; using default safety level');
|
|
79
144
|
}
|
|
80
145
|
return defaultLevel;
|
|
81
146
|
}
|
|
@@ -96,4 +161,88 @@ export function describeSafetyLevel(level) {
|
|
|
96
161
|
return 'Unknown safety level';
|
|
97
162
|
}
|
|
98
163
|
}
|
|
164
|
+
/**
|
|
165
|
+
* Load global safety configuration from a JSON file.
|
|
166
|
+
*
|
|
167
|
+
* Resolution order:
|
|
168
|
+
* 1. `SFCC_SAFETY_CONFIG` env var — explicit path to a safety config file
|
|
169
|
+
* 2. `{configDir}/safety.json` — oclif config directory (e.g., `~/.config/b2c/safety.json`)
|
|
170
|
+
*
|
|
171
|
+
* The file has the same shape as the `safety` object in dw.json:
|
|
172
|
+
* ```json
|
|
173
|
+
* { "level": "NO_DELETE", "confirm": true, "rules": [...] }
|
|
174
|
+
* ```
|
|
175
|
+
*
|
|
176
|
+
* @param configDir - oclif config directory path (e.g., `this.config.configDir`)
|
|
177
|
+
* @returns Validated safety config fragment, or undefined if no file found
|
|
178
|
+
*/
|
|
179
|
+
export function loadGlobalSafetyConfig(configDir) {
|
|
180
|
+
const logger = getLogger();
|
|
181
|
+
// 1. Check SFCC_SAFETY_CONFIG env var
|
|
182
|
+
const envPath = process.env['SFCC_SAFETY_CONFIG'];
|
|
183
|
+
const filePath = envPath || (configDir ? join(configDir, 'safety.json') : undefined);
|
|
184
|
+
if (!filePath || !existsSync(filePath)) {
|
|
185
|
+
return undefined;
|
|
186
|
+
}
|
|
187
|
+
try {
|
|
188
|
+
const raw = JSON.parse(readFileSync(filePath, 'utf-8'));
|
|
189
|
+
const result = {};
|
|
190
|
+
if (raw.level) {
|
|
191
|
+
const parsed = parseSafetyLevelString(raw.level);
|
|
192
|
+
if (parsed) {
|
|
193
|
+
result.level = parsed;
|
|
194
|
+
}
|
|
195
|
+
else {
|
|
196
|
+
logger.warn({ level: raw.level, file: filePath }, 'Invalid safety level in global safety config; ignoring');
|
|
197
|
+
}
|
|
198
|
+
}
|
|
199
|
+
if (raw.confirm !== undefined) {
|
|
200
|
+
result.confirm = raw.confirm === true;
|
|
201
|
+
}
|
|
202
|
+
if (raw.rules && Array.isArray(raw.rules)) {
|
|
203
|
+
result.rules = raw.rules.filter((r) => {
|
|
204
|
+
if (!isValidSafetyAction(r.action)) {
|
|
205
|
+
logger.warn({ rule: r, file: filePath }, 'Invalid safety rule action in global safety config; skipping rule');
|
|
206
|
+
return false;
|
|
207
|
+
}
|
|
208
|
+
return true;
|
|
209
|
+
});
|
|
210
|
+
}
|
|
211
|
+
logger.trace({ filePath, level: result.level, ruleCount: result.rules?.length }, 'Loaded global safety config');
|
|
212
|
+
return result;
|
|
213
|
+
}
|
|
214
|
+
catch (error) {
|
|
215
|
+
logger.warn({ error, file: filePath }, 'Failed to load global safety config; ignoring');
|
|
216
|
+
return undefined;
|
|
217
|
+
}
|
|
218
|
+
}
|
|
219
|
+
/**
|
|
220
|
+
* Compute effective safety config by merging environment variables, global
|
|
221
|
+
* safety config, and per-instance config.
|
|
222
|
+
*
|
|
223
|
+
* Merge strategy:
|
|
224
|
+
* - **Level**: `max(env, global, instance)` — most restrictive wins
|
|
225
|
+
* - **Confirm**: OR across all sources
|
|
226
|
+
* - **Rules**: instance rules first, then global rules (first-match-wins,
|
|
227
|
+
* so instance rules can override global policy)
|
|
228
|
+
*
|
|
229
|
+
* @param instanceSafety - Per-instance safety config from dw.json
|
|
230
|
+
* @param globalSafety - Global safety config from safety.json
|
|
231
|
+
* @returns Merged SafetyConfig
|
|
232
|
+
*/
|
|
233
|
+
export function resolveEffectiveSafetyConfig(instanceSafety, globalSafety) {
|
|
234
|
+
const envLevel = getSafetyLevel('NONE');
|
|
235
|
+
const envConfirm = process.env['SFCC_SAFETY_CONFIRM'] === 'true' || process.env['SFCC_SAFETY_CONFIRM'] === '1';
|
|
236
|
+
const instanceLevel = instanceSafety?.level ?? 'NONE';
|
|
237
|
+
const globalLevel = globalSafety?.level ?? 'NONE';
|
|
238
|
+
// Merge rules: instance first, then global (first-match-wins)
|
|
239
|
+
const instanceRules = instanceSafety?.rules ?? [];
|
|
240
|
+
const globalRules = globalSafety?.rules ?? [];
|
|
241
|
+
const mergedRules = [...instanceRules, ...globalRules];
|
|
242
|
+
return {
|
|
243
|
+
level: maxSafetyLevel(envLevel, maxSafetyLevel(globalLevel, instanceLevel)),
|
|
244
|
+
confirm: envConfirm || instanceSafety?.confirm === true || globalSafety?.confirm === true,
|
|
245
|
+
rules: mergedRules.length > 0 ? mergedRules : undefined,
|
|
246
|
+
};
|
|
247
|
+
}
|
|
99
248
|
//# sourceMappingURL=safety-middleware.js.map
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"safety-middleware.js","sourceRoot":"","sources":["../../../src/safety/safety-middleware.ts"],"names":[],"mappings":"AAAA;;;;GAIG;AAEH,OAAO,EAAC,SAAS,EAAC,MAAM,sBAAsB,CAAC;
|
|
1
|
+
{"version":3,"file":"safety-middleware.js","sourceRoot":"","sources":["../../../src/safety/safety-middleware.ts"],"names":[],"mappings":"AAAA;;;;GAIG;AAEH,OAAO,EAAC,UAAU,EAAE,YAAY,EAAC,MAAM,SAAS,CAAC;AACjD,OAAO,EAAC,IAAI,EAAC,MAAM,WAAW,CAAC;AAC/B,OAAO,EAAC,SAAS,EAAC,MAAM,sBAAsB,CAAC;AAE/C,OAAO,EAAC,mBAAmB,EAAC,MAAM,YAAY,CAAC;AA2B/C;;GAEG;AACH,MAAM,WAAW,GAAgC;IAC/C,IAAI,EAAE,CAAC;IACP,SAAS,EAAE,CAAC;IACZ,SAAS,EAAE,CAAC;IACZ,SAAS,EAAE,CAAC;CACb,CAAC;AAEF;;GAEG;AACH,MAAM,YAAY,GAA2B,CAAC,MAAM,EAAE,WAAW,EAAE,WAAW,EAAE,WAAW,CAAU,CAAC;AAEtG;;GAEG;AACH,MAAM,UAAU,cAAc,CAAC,CAAc,EAAE,CAAc;IAC3D,OAAO,WAAW,CAAC,CAAC,CAAC,IAAI,WAAW,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC;AAClD,CAAC;AAED;;GAEG;AACH,MAAM,UAAU,kBAAkB,CAAC,KAAa;IAC9C,OAAO,YAAY,CAAC,QAAQ,CAAC,KAAoB,CAAC,CAAC;AACrD,CAAC;AAED;;;GAGG;AACH,MAAM,UAAU,sBAAsB,CAAC,KAAyB;IAC9D,IAAI,CAAC,KAAK;QAAE,OAAO,SAAS,CAAC;IAC7B,MAAM,UAAU,GAAG,KAAK,CAAC,WAAW,EAAE,CAAC,OAAO,CAAC,IAAI,EAAE,GAAG,CAAC,CAAC;IAC1D,OAAO,kBAAkB,CAAC,UAAU,CAAC,CAAC,CAAC,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;AACjE,CAAC;AAED;;GAEG;AACH,MAAM,OAAO,kBAAmB,SAAQ,KAAK;IAGzB;IACA;IACA;IAJlB,YACE,OAAe,EACC,MAAc,EACd,GAAW,EACX,WAAwB;QAExC,KAAK,CAAC,OAAO,CAAC,CAAC;QAJC,WAAM,GAAN,MAAM,CAAQ;QACd,QAAG,GAAH,GAAG,CAAQ;QACX,gBAAW,GAAX,WAAW,CAAa;QAGxC,IAAI,CAAC,IAAI,GAAG,oBAAoB,CAAC;IACnC,CAAC;CACF;AAED;;;;;GAKG;AACH,MAAM,OAAO,0BAA2B,SAAQ,KAAK;IACvB;IAA5B,YAA4B,UAA4B;QACtD,KAAK,CAAC,0BAA0B,UAAU,CAAC,MAAM,EAAE,CAAC,CAAC;QAD3B,eAAU,GAAV,UAAU,CAAkB;QAEtD,IAAI,CAAC,IAAI,GAAG,4BAA4B,CAAC;IAC3C,CAAC;CACF;AAED;;;;;;;;;;GAUG;AACH,MAAM,UAAU,mBAAmB,CAAC,MAAc,EAAE,IAAY,EAAE,KAAkB;IAClF,MAAM,WAAW,GAAG,MAAM,CAAC,WAAW,EAAE,CAAC;IAEzC,QAAQ,KAAK,EAAE,CAAC;QACd,KAAK,MAAM;YACT,OAAO,SAAS,CAAC;QAEnB,KAAK,WAAW;YACd,IAAI,WAAW,KAAK,QAAQ,EAAE,CAAC;gBAC7B,OAAO,oCAAoC,IAAI,sCAAsC,CAAC;YACxF,CAAC;YACD,OAAO,SAAS,CAAC;QAEnB,KAAK,WAAW,CAAC,CAAC,CAAC;YACjB,IAAI,WAAW,KAAK,QAAQ,EAAE,CAAC;gBAC7B,OAAO,oCAAoC,IAAI,sCAAsC,CAAC;YACxF,CAAC;YACD,MAAM,mBAAmB,GAAG,CAAC,QAAQ,EAAE,OAAO,EAAE,UAAU,EAAE,aAAa,CAAC,CAAC;YAC3E,IAAI,mBAAmB,CAAC,IAAI,CAAC,CAAC,OAAO,EAAE,EAAE,CAAC,IAAI,CAAC,QAAQ,CAAC,OAAO,CAAC,CAAC,IAAI,WAAW,KAAK,MAAM,EAAE,CAAC;gBAC5F,OAAO,uCAAuC,IAAI,+CAA+C,CAAC;YACpG,CAAC;YACD,OAAO,SAAS,CAAC;QACnB,CAAC;QAED,KAAK,WAAW;YACd,IAAI,CAAC,MAAM,EAAE,KAAK,EAAE,OAAO,EAAE,QAAQ,CAAC,CAAC,QAAQ,CAAC,WAAW,CAAC,EAAE,CAAC;gBAC7D,OAAO,4BAA4B,WAAW,IAAI,IAAI,8CAA8C,CAAC;YACvG,CAAC;YACD,OAAO,SAAS,CAAC;QAEnB;YACE,OAAO,SAAS,CAAC;IACrB,CAAC;AACH,CAAC;AAED;;;;;;;;GAQG;AACH,MAAM,UAAU,oBAAoB,CAAC,MAAc,EAAE,GAAW,EAAE,MAAoB;IACpF,MAAM,IAAI,GAAG,IAAI,GAAG,CAAC,GAAG,EAAE,cAAc,CAAC,CAAC,QAAQ,CAAC;IACnD,OAAO,mBAAmB,CAAC,MAAM,EAAE,IAAI,EAAE,MAAM,CAAC,KAAK,CAAC,CAAC;AACzD,CAAC;AAED;;;;;;;;;GASG;AACH,MAAM,UAAU,cAAc,CAAC,eAA4B,MAAM;IAC/D,MAAM,cAAc,GAAG,OAAO,CAAC,GAAG,CAAC,mBAAmB,CAAC,CAAC;IACxD,IAAI,cAAc,EAAE,CAAC;QACnB,MAAM,MAAM,GAAG,sBAAsB,CAAC,cAAc,CAAC,CAAC;QACtD,IAAI,MAAM;YAAE,OAAO,MAAM,CAAC;QAE1B,SAAS,EAAE,CAAC,IAAI,CACd,EAAC,QAAQ,EAAE,cAAc,EAAE,WAAW,EAAE,YAAY,EAAC,EACrD,oEAAoE,CACrE,CAAC;IACJ,CAAC;IAED,OAAO,YAAY,CAAC;AACtB,CAAC;AAED;;GAEG;AACH,MAAM,UAAU,mBAAmB,CAAC,KAAkB;IACpD,QAAQ,KAAK,EAAE,CAAC;QACd,KAAK,MAAM;YACT,OAAO,wBAAwB,CAAC;QAClC,KAAK,WAAW;YACd,OAAO,2BAA2B,CAAC;QACrC,KAAK,WAAW;YACd,OAAO,+DAA+D,CAAC;QACzE,KAAK,WAAW;YACd,OAAO,+CAA+C,CAAC;QACzD;YACE,OAAO,sBAAsB,CAAC;IAClC,CAAC;AACH,CAAC;AAgBD;;;;;;;;;;;;;;GAcG;AACH,MAAM,UAAU,sBAAsB,CAAC,SAAkB;IACvD,MAAM,MAAM,GAAG,SAAS,EAAE,CAAC;IAE3B,sCAAsC;IACtC,MAAM,OAAO,GAAG,OAAO,CAAC,GAAG,CAAC,oBAAoB,CAAC,CAAC;IAClD,MAAM,QAAQ,GAAG,OAAO,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,EAAE,aAAa,CAAC,CAAC,CAAC,CAAC,SAAS,CAAC,CAAC;IAErF,IAAI,CAAC,QAAQ,IAAI,CAAC,UAAU,CAAC,QAAQ,CAAC,EAAE,CAAC;QACvC,OAAO,SAAS,CAAC;IACnB,CAAC;IAED,IAAI,CAAC;QACH,MAAM,GAAG,GAAG,IAAI,CAAC,KAAK,CAAC,YAAY,CAAC,QAAQ,EAAE,OAAO,CAAC,CAAoB,CAAC;QAC3E,MAAM,MAAM,GAAyB,EAAE,CAAC;QAExC,IAAI,GAAG,CAAC,KAAK,EAAE,CAAC;YACd,MAAM,MAAM,GAAG,sBAAsB,CAAC,GAAG,CAAC,KAAK,CAAC,CAAC;YACjD,IAAI,MAAM,EAAE,CAAC;gBACX,MAAM,CAAC,KAAK,GAAG,MAAM,CAAC;YACxB,CAAC;iBAAM,CAAC;gBACN,MAAM,CAAC,IAAI,CAAC,EAAC,KAAK,EAAE,GAAG,CAAC,KAAK,EAAE,IAAI,EAAE,QAAQ,EAAC,EAAE,wDAAwD,CAAC,CAAC;YAC5G,CAAC;QACH,CAAC;QAED,IAAI,GAAG,CAAC,OAAO,KAAK,SAAS,EAAE,CAAC;YAC9B,MAAM,CAAC,OAAO,GAAG,GAAG,CAAC,OAAO,KAAK,IAAI,CAAC;QACxC,CAAC;QAED,IAAI,GAAG,CAAC,KAAK,IAAI,KAAK,CAAC,OAAO,CAAC,GAAG,CAAC,KAAK,CAAC,EAAE,CAAC;YAC1C,MAAM,CAAC,KAAK,GAAG,GAAG,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,EAAE,EAAE;gBACpC,IAAI,CAAC,mBAAmB,CAAC,CAAC,CAAC,MAAM,CAAC,EAAE,CAAC;oBACnC,MAAM,CAAC,IAAI,CAAC,EAAC,IAAI,EAAE,CAAC,EAAE,IAAI,EAAE,QAAQ,EAAC,EAAE,mEAAmE,CAAC,CAAC;oBAC5G,OAAO,KAAK,CAAC;gBACf,CAAC;gBACD,OAAO,IAAI,CAAC;YACd,CAAC,CAAiB,CAAC;QACrB,CAAC;QAED,MAAM,CAAC,KAAK,CAAC,EAAC,QAAQ,EAAE,KAAK,EAAE,MAAM,CAAC,KAAK,EAAE,SAAS,EAAE,MAAM,CAAC,KAAK,EAAE,MAAM,EAAC,EAAE,6BAA6B,CAAC,CAAC;QAC9G,OAAO,MAAM,CAAC;IAChB,CAAC;IAAC,OAAO,KAAK,EAAE,CAAC;QACf,MAAM,CAAC,IAAI,CAAC,EAAC,KAAK,EAAE,IAAI,EAAE,QAAQ,EAAC,EAAE,+CAA+C,CAAC,CAAC;QACtF,OAAO,SAAS,CAAC;IACnB,CAAC;AACH,CAAC;AAED;;;;;;;;;;;;;GAaG;AACH,MAAM,UAAU,4BAA4B,CAC1C,cAAqC,EACrC,YAAmC;IAEnC,MAAM,QAAQ,GAAG,cAAc,CAAC,MAAM,CAAC,CAAC;IACxC,MAAM,UAAU,GAAG,OAAO,CAAC,GAAG,CAAC,qBAAqB,CAAC,KAAK,MAAM,IAAI,OAAO,CAAC,GAAG,CAAC,qBAAqB,CAAC,KAAK,GAAG,CAAC;IAE/G,MAAM,aAAa,GAAG,cAAc,EAAE,KAAK,IAAI,MAAM,CAAC;IACtD,MAAM,WAAW,GAAG,YAAY,EAAE,KAAK,IAAI,MAAM,CAAC;IAElD,8DAA8D;IAC9D,MAAM,aAAa,GAAG,cAAc,EAAE,KAAK,IAAI,EAAE,CAAC;IAClD,MAAM,WAAW,GAAG,YAAY,EAAE,KAAK,IAAI,EAAE,CAAC;IAC9C,MAAM,WAAW,GAAG,CAAC,GAAG,aAAa,EAAE,GAAG,WAAW,CAAC,CAAC;IAEvD,OAAO;QACL,KAAK,EAAE,cAAc,CAAC,QAAQ,EAAE,cAAc,CAAC,WAAW,EAAE,aAAa,CAAC,CAAC;QAC3E,OAAO,EAAE,UAAU,IAAI,cAAc,EAAE,OAAO,KAAK,IAAI,IAAI,YAAY,EAAE,OAAO,KAAK,IAAI;QACzF,KAAK,EAAE,WAAW,CAAC,MAAM,GAAG,CAAC,CAAC,CAAC,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS;KACxD,CAAC;AACJ,CAAC"}
|