mirror of
https://github.com/Infisical/infisical.git
synced 2025-08-05 07:30:33 +00:00
153 lines
4.5 KiB
TypeScript
153 lines
4.5 KiB
TypeScript
import { z } from "zod";
|
|
|
|
import { GitAppOrgSchema, SecretScanningGitRisksSchema } from "@app/db/schemas";
|
|
import { SecretScanningRiskStatus } from "@app/ee/services/secret-scanning/secret-scanning-types";
|
|
import { getConfig } from "@app/lib/config/env";
|
|
import { BadRequestError } from "@app/lib/errors";
|
|
import { readLimit, writeLimit } from "@app/server/config/rateLimiter";
|
|
import { verifyAuth } from "@app/server/plugins/auth/verify-auth";
|
|
import { AuthMode } from "@app/services/auth/auth-type";
|
|
|
|
export const registerSecretScanningRouter = async (server: FastifyZodProvider) => {
|
|
server.route({
|
|
method: "POST",
|
|
url: "/create-installation-session/organization",
|
|
config: {
|
|
rateLimit: writeLimit
|
|
},
|
|
schema: {
|
|
body: z.object({ organizationId: z.string().trim() }),
|
|
response: {
|
|
200: z.object({
|
|
sessionId: z.string()
|
|
})
|
|
}
|
|
},
|
|
onRequest: verifyAuth([AuthMode.JWT]),
|
|
handler: async (req) => {
|
|
const appCfg = getConfig();
|
|
if (!appCfg.SECRET_SCANNING_ORG_WHITELIST?.includes(req.auth.orgId)) {
|
|
throw new BadRequestError({
|
|
message: "Secret scanning is temporarily unavailable."
|
|
});
|
|
}
|
|
|
|
const session = await server.services.secretScanning.createInstallationSession({
|
|
actor: req.permission.type,
|
|
actorId: req.permission.id,
|
|
actorAuthMethod: req.permission.authMethod,
|
|
actorOrgId: req.permission.orgId,
|
|
orgId: req.body.organizationId
|
|
});
|
|
|
|
return session;
|
|
}
|
|
});
|
|
|
|
server.route({
|
|
method: "POST",
|
|
url: "/link-installation",
|
|
config: {
|
|
rateLimit: writeLimit
|
|
},
|
|
schema: {
|
|
body: z.object({
|
|
installationId: z.string(),
|
|
sessionId: z.string().trim()
|
|
}),
|
|
response: {
|
|
200: GitAppOrgSchema
|
|
}
|
|
},
|
|
onRequest: verifyAuth([AuthMode.JWT]),
|
|
handler: async (req) => {
|
|
const { installatedApp } = await server.services.secretScanning.linkInstallationToOrg({
|
|
actor: req.permission.type,
|
|
actorId: req.permission.id,
|
|
actorAuthMethod: req.permission.authMethod,
|
|
actorOrgId: req.permission.orgId,
|
|
...req.body
|
|
});
|
|
return installatedApp;
|
|
}
|
|
});
|
|
|
|
server.route({
|
|
method: "GET",
|
|
url: "/installation-status/organization/:organizationId",
|
|
config: {
|
|
rateLimit: readLimit
|
|
},
|
|
schema: {
|
|
params: z.object({ organizationId: z.string().trim() }),
|
|
response: {
|
|
200: z.object({ appInstallationCompleted: z.boolean() })
|
|
}
|
|
},
|
|
onRequest: verifyAuth([AuthMode.JWT]),
|
|
handler: async (req) => {
|
|
const appInstallationCompleted = await server.services.secretScanning.getOrgInstallationStatus({
|
|
actor: req.permission.type,
|
|
actorId: req.permission.id,
|
|
actorAuthMethod: req.permission.authMethod,
|
|
actorOrgId: req.permission.orgId,
|
|
orgId: req.params.organizationId
|
|
});
|
|
return { appInstallationCompleted };
|
|
}
|
|
});
|
|
|
|
server.route({
|
|
url: "/organization/:organizationId/risks",
|
|
method: "GET",
|
|
config: {
|
|
rateLimit: readLimit
|
|
},
|
|
schema: {
|
|
params: z.object({ organizationId: z.string().trim() }),
|
|
response: {
|
|
200: z.object({ risks: SecretScanningGitRisksSchema.array() })
|
|
}
|
|
},
|
|
onRequest: verifyAuth([AuthMode.JWT]),
|
|
handler: async (req) => {
|
|
const { risks } = await server.services.secretScanning.getRisksByOrg({
|
|
actor: req.permission.type,
|
|
actorId: req.permission.id,
|
|
actorAuthMethod: req.permission.authMethod,
|
|
actorOrgId: req.permission.orgId,
|
|
orgId: req.params.organizationId
|
|
});
|
|
return { risks };
|
|
}
|
|
});
|
|
|
|
server.route({
|
|
method: "POST",
|
|
url: "/organization/:organizationId/risks/:riskId/status",
|
|
config: {
|
|
rateLimit: writeLimit
|
|
},
|
|
schema: {
|
|
params: z.object({ organizationId: z.string().trim(), riskId: z.string().trim() }),
|
|
body: z.object({ status: z.nativeEnum(SecretScanningRiskStatus) }),
|
|
response: {
|
|
200: SecretScanningGitRisksSchema
|
|
}
|
|
},
|
|
onRequest: verifyAuth([AuthMode.JWT]),
|
|
handler: async (req) => {
|
|
const { risk } = await server.services.secretScanning.updateRiskStatus({
|
|
actor: req.permission.type,
|
|
actorId: req.permission.id,
|
|
actorAuthMethod: req.permission.authMethod,
|
|
actorOrgId: req.permission.orgId,
|
|
orgId: req.params.organizationId,
|
|
riskId: req.params.riskId,
|
|
...req.body
|
|
});
|
|
return risk;
|
|
}
|
|
});
|
|
};
|