Skip to content

Commit 07138d3

Browse files
committed
Add validation for scopes attribute for secure parameters
1 parent 1ce2320 commit 07138d3

File tree

5 files changed

+208
-11
lines changed

5 files changed

+208
-11
lines changed

config/locales/en.yml

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -281,6 +281,11 @@ en:
281281
invalid_url: '%{field} must be a valid URL, got "%{value}".'
282282
password_parameter_type_deprecated: 'Password parameter type can no longer
283283
be used. Use Secure settings instead. Learn more: %{link}.'
284+
field_requires_secure_parameter: "%{field} cannot be defined in a non-secure
285+
parameter."
286+
field_cannot_be_empty: "%{field} cannot be empty."
287+
field_contains_invalid_values: "%{field} contains invalid values: %{values}."
288+
field_contains_invalid_keys: "%{field} contains invalid keys: %{keys}."
284289
warning:
285290
app_build:
286291
deprecated_version: You are targeting a deprecated version of the framework.

config/locales/translations/zendesk_apps_support.yml

Lines changed: 16 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -633,3 +633,19 @@ parts:
633633
key: "txt.apps.admin.error.app_build.password_parameter_type_deprecated"
634634
title: "App builder job: Password parameter type is deprecated"
635635
value: "Password parameter type can no longer be used. Use Secure settings instead. Learn more: %{link}."
636+
- translation:
637+
key: "txt.apps.admin.error.app_build.field_requires_secure_parameter"
638+
title: "App builder job: scopes can be defined only on secure parameters"
639+
value: "%{field} cannot be defined in a non-secure parameter."
640+
- translation:
641+
key: "txt.apps.admin.error.app_build.field_cannot_be_empty"
642+
title: "App builder job: field cannot be empty"
643+
value: "%{field} cannot be empty."
644+
- translation:
645+
key: "txt.apps.admin.error.app_build.field_contains_invalid_values"
646+
title: "App builder job: invalid field values"
647+
value: "%{field} contains invalid values: %{values}."
648+
- translation:
649+
key: "txt.apps.admin.error.app_build.field_contains_invalid_keys"
650+
title: "App builder job: invalid field keys"
651+
value: "%{field} contains invalid keys: %{keys}."

lib/zendesk_apps_support/manifest/parameter.rb

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ module ZendeskAppsSupport
44
class Manifest
55
class Parameter
66
TYPES = %w[text password checkbox url number multiline hidden oauth].freeze
7-
ATTRIBUTES = %i[name type required secure default].freeze
7+
ATTRIBUTES = %i[name type required secure default scopes].freeze
88
attr_reader(*ATTRIBUTES)
99
def default?
1010
@has_default
@@ -17,6 +17,7 @@ def initialize(p)
1717
@secure = p['secure'] || false
1818
@has_default = p.key? 'default'
1919
@default = p['default'] if @has_default
20+
@scopes = p['scopes']
2021
end
2122
end
2223
end

lib/zendesk_apps_support/validations/manifest.rb

Lines changed: 55 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -11,9 +11,10 @@ module Manifest
1111
OAUTH_REQUIRED_FIELDS = %w[client_id client_secret authorize_uri access_token_uri].freeze
1212
PARAMETER_TYPES = ZendeskAppsSupport::Manifest::Parameter::TYPES
1313
OAUTH_MANIFEST_LINK = 'https://developer.zendesk.com/apps/docs/developer-guide/manifest#oauth'
14+
SECURE_PARAM_SCOPES = %w[header body url_host url_path jwt_secret_key jwt_claim basic_auth_username basic_auth_password].freeze
1415

1516
class << self
16-
def call(package, error_on_password_parameter: false)
17+
def call(package, error_on_password_parameter: false, validate_scopes_for_secure_parameter: false)
1718
unless package.has_file?('manifest.json')
1819
nested_manifest = package.files.find { |file| file =~ %r{\A[^/]+?/manifest\.json\Z} }
1920
if nested_manifest
@@ -24,7 +25,7 @@ def call(package, error_on_password_parameter: false)
2425

2526
package.warnings << password_parameter_warning if !error_on_password_parameter && password_param_present?(package.manifest)
2627

27-
collate_manifest_errors(package, error_on_password_parameter)
28+
collate_manifest_errors(package, error_on_password_parameter, validate_scopes_for_secure_parameter)
2829
rescue JSON::ParserError => e
2930
return [ValidationError.new(:manifest_not_json, errors: e)]
3031
rescue ZendeskAppsSupport::Manifest::OverrideError => e
@@ -37,7 +38,7 @@ def password_param_present?(manifest)
3738
manifest.parameters.any? { |p| p.type == 'password' }
3839
end
3940

40-
def collate_manifest_errors(package, error_on_password_parameter)
41+
def collate_manifest_errors(package, error_on_password_parameter, validate_scopes_for_secure_parameter)
4142
manifest = package.manifest
4243

4344
errors = [
@@ -46,7 +47,7 @@ def collate_manifest_errors(package, error_on_password_parameter)
4647
oauth_error(manifest),
4748
default_locale_error(manifest, package),
4849
validate_urls(manifest),
49-
validate_parameters(manifest),
50+
validate_parameters(manifest, validate_scopes_for_secure_parameter),
5051
if manifest.requirements_only? || manifest.marketing_only?
5152
[ ban_location(manifest),
5253
ban_framework_version(manifest) ]
@@ -87,7 +88,7 @@ def validate_urls(manifest)
8788
errors
8889
end
8990

90-
def validate_parameters(manifest)
91+
def validate_parameters(manifest, validate_scopes_for_secure_parameter)
9192
if manifest.marketing_only?
9293
marketing_only_errors(manifest)
9394
else
@@ -97,7 +98,8 @@ def validate_parameters(manifest)
9798
invalid_type_error(manifest),
9899
too_many_oauth_parameters(manifest),
99100
oauth_cannot_be_secure(manifest),
100-
name_as_parameter_name_error(manifest)
101+
name_as_parameter_name_error(manifest),
102+
*(validate_scopes_for_secure_parameter ? invalid_secure_param_scopes_errors(manifest) : invalid_scopes_key_error(manifest)),
101103
]
102104
end
103105
end
@@ -110,6 +112,50 @@ def oauth_cannot_be_secure(manifest)
110112
end
111113
end
112114

115+
def invalid_scopes_key_error(manifest)
116+
errors = []
117+
manifest.parameters.each do |parameter|
118+
next if parameter.scopes.nil?
119+
120+
errors << ValidationError.new(:field_contains_invalid_keys,
121+
field: "parameters[name=\"#{parameter.name}\"]",
122+
keys: ['scopes'])
123+
end
124+
errors
125+
end
126+
127+
def invalid_secure_param_scopes_errors(manifest)
128+
errors = []
129+
130+
manifest.parameters.each do |parameter|
131+
next if parameter.scopes.nil?
132+
133+
unless parameter.secure
134+
errors << ValidationError.new(:field_requires_secure_parameter, field: "parameters[name=\"#{parameter.name}\"].scopes")
135+
end
136+
137+
unless parameter.scopes.is_a?(Array)
138+
errors << ValidationError.new(:unacceptable_array,
139+
field: "parameters[name=\"#{parameter.name}\"].scopes",
140+
value: parameter.scopes.class.to_s)
141+
next
142+
end
143+
144+
if parameter.scopes.empty?
145+
errors << ValidationError.new(:field_cannot_be_empty, field: "parameters[name=\"#{parameter.name}\"].scopes")
146+
end
147+
148+
invalid_scopes = parameter.scopes - SECURE_PARAM_SCOPES
149+
if invalid_scopes.any?
150+
errors << ValidationError.new(:field_contains_invalid_values,
151+
field: "parameters[name=\"#{parameter.name}\"]",
152+
values: invalid_scopes)
153+
end
154+
end
155+
156+
errors
157+
end
158+
113159
def marketing_only_errors(manifest)
114160
[
115161
ban_parameters(manifest),
@@ -131,7 +177,7 @@ def type_checks(manifest)
131177
)
132178
end
133179
whitelist = manifest.domain_whitelist
134-
unless whitelist.nil? || whitelist.is_a?(Array) && whitelist.all? { |dom| dom.is_a? String }
180+
unless whitelist.nil? || (whitelist.is_a?(Array) && whitelist.all? { |dom| dom.is_a? String })
135181
errors << ValidationError.new(:unacceptable_array_of_strings, field: 'domainWhitelist')
136182
end
137183
parameters = manifest.original_parameters
@@ -261,12 +307,12 @@ def parameters_error(manifest)
261307
end
262308

263309
invalid_required = manifest.parameters.map do |parameter|
264-
validate_boolean(parameter.required, "parameters.#{parameter.name}.required")
310+
validate_boolean(parameter.required, "parameters[name=\"#{parameter.name}\"].required")
265311
end.compact
266312
return invalid_required if invalid_required.any?
267313

268314
invalid_secure = manifest.parameters.map do |parameter|
269-
validate_boolean(parameter.secure, "parameters.#{parameter.name}.secure")
315+
validate_boolean(parameter.secure, "parameters[name=\"#{parameter.name}\"].secure")
270316
end.compact
271317
return invalid_secure if invalid_secure.any?
272318
end

spec/validations/manifest_spec.rb

Lines changed: 130 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ def create_package(parameter_hash)
2424

2525
RSpec::Matchers.define :have_error do |error|
2626
match do |package|
27-
errors = ZendeskAppsSupport::Validations::Manifest.call(package)
27+
errors = ZendeskAppsSupport::Validations::Manifest.call(package, validate_scopes_for_secure_parameter: true)
2828
errors.map!(&:to_s) unless error.is_a? Symbol
2929
@actual = errors.compact
3030

@@ -864,4 +864,133 @@ def create_package(parameter_hash)
864864
end
865865
end
866866
end
867+
868+
context 'scope parameter validations' do
869+
context 'when validate_scopes_for_secure_parameter is false' do
870+
it 'should have an invalid_keys error when scopes key is present' do
871+
@manifest_hash = {
872+
'parameters' => [
873+
{
874+
'name' => 'api_token',
875+
'type' => 'text',
876+
'secure' => true,
877+
'scopes' => ['header']
878+
}
879+
]
880+
}
881+
package = create_package(@manifest_hash)
882+
errors = ZendeskAppsSupport::Validations::Manifest.call(package, validate_scopes_for_secure_parameter: false)
883+
expect(errors.map(&:to_s)).to include('parameters[name="api_token"] contains invalid keys: ["scopes"].')
884+
end
885+
end
886+
887+
context 'when validate_scopes_for_secure_parameter is true' do
888+
context 'when a parameter has scopes but is not secure' do
889+
it 'should have an error requiring secure parameter for scopes' do
890+
@manifest_hash = {
891+
'parameters' => [
892+
{
893+
'name' => 'api_token',
894+
'type' => 'text',
895+
'secure' => false,
896+
'scopes' => ['header']
897+
}
898+
]
899+
}
900+
expect(create_package(@manifest_hash)).to have_error('parameters[name="api_token"].scopes cannot be defined in a non-secure parameter.')
901+
end
902+
end
903+
904+
context 'when a parameter has scopes and is secure' do
905+
it 'should not have an error for valid scope values' do
906+
@manifest_hash = {
907+
'defaultLocale' => 'en',
908+
'location' => {
909+
'support' => {
910+
'ticket_sidebar' => 'https://example.com/app'
911+
}
912+
},
913+
'parameters' => [
914+
{
915+
'name' => 'api_token',
916+
'type' => 'text',
917+
'secure' => true,
918+
'scopes' => %w[header body]
919+
}
920+
]
921+
}
922+
package = create_package(@manifest_hash)
923+
translation_files = double('AppFile', relative_path: 'translations/en.json')
924+
allow(package).to receive_messages(translation_files: [translation_files])
925+
expect(package).not_to have_error
926+
end
927+
928+
it 'should have an error for invalid scope values with all invalid scopes in the error' do
929+
@manifest_hash = {
930+
'parameters' => [
931+
{
932+
'name' => 'api_token',
933+
'type' => 'text',
934+
'secure' => true,
935+
'scopes' => %w[invalid_scope1 header invalid_scope2 body invalid_scope3]
936+
}
937+
]
938+
}
939+
expect(create_package(@manifest_hash)).to have_error('parameters[name="api_token"] contains invalid values: ["invalid_scope1", "invalid_scope2", "invalid_scope3"].')
940+
end
941+
942+
it 'should have an error when scopes are empty' do
943+
@manifest_hash = {
944+
'parameters' => [
945+
{
946+
'name' => 'api_token',
947+
'type' => 'text',
948+
'secure' => true,
949+
'scopes' => []
950+
}
951+
]
952+
}
953+
expect(create_package(@manifest_hash)).to have_error('parameters[name="api_token"].scopes cannot be empty.')
954+
end
955+
956+
it 'should have an error when scopes is not an array' do
957+
@manifest_hash = {
958+
'parameters' => [
959+
{
960+
'name' => 'api_token',
961+
'type' => 'text',
962+
'secure' => true,
963+
'scopes' => 'header'
964+
}
965+
]
966+
}
967+
expect(create_package(@manifest_hash)).to have_error('The manifest field parameters[name="api_token"].scopes needs to be an array, but it was String')
968+
end
969+
end
970+
971+
context 'when a parameter has no scopes' do
972+
it 'should not have any scope-related errors' do
973+
@manifest_hash = {
974+
'defaultLocale' => 'en',
975+
'location' => {
976+
'support' => {
977+
'ticket_sidebar' => 'https://example.com/app'
978+
}
979+
},
980+
'parameters' => [
981+
{
982+
'name' => 'api_token',
983+
'type' => 'text',
984+
'secure' => true
985+
}
986+
]
987+
}
988+
package = create_package(@manifest_hash)
989+
translation_files = double('AppFile', relative_path: 'translations/en.json')
990+
allow(package).to receive_messages(translation_files: [translation_files])
991+
expect(package).not_to have_error
992+
end
993+
end
994+
end
995+
end
867996
end

0 commit comments

Comments
 (0)