Skip to content

Commit ed6ba1f

Browse files
Spelling: Principal, not Principle
1 parent b8ff2d3 commit ed6ba1f

File tree

16 files changed

+665
-665
lines changed

16 files changed

+665
-665
lines changed

src/Certify.Client/CertifyApiClient.cs

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -804,10 +804,10 @@ public async Task<string> RefreshAccessToken(AuthContext authContext)
804804
return _refreshToken;
805805
}
806806

807-
public async Task<List<SecurityPrinciple>> GetAccessSecurityPrinciples(AuthContext authContext)
807+
public async Task<List<SecurityPrincipal>> GetAccessSecurityPrincipals(AuthContext authContext)
808808
{
809-
var result = await FetchAsync("access/securityprinciples", authContext);
810-
return JsonToObject<List<SecurityPrinciple>>(result);
809+
var result = await FetchAsync("access/securityprincipals", authContext);
810+
return JsonToObject<List<SecurityPrincipal>>(result);
811811
}
812812

813813
public async Task<Certify.Models.Config.ActionResult> CheckApiTokenHasAccess(AccessToken token, AccessCheck check, AuthContext authContext = null)

src/Certify.Core/Management/Access/AccessControl.cs

Lines changed: 99 additions & 99 deletions
Large diffs are not rendered by default.

src/Certify.Models/Hub/AccessControl.cs

Lines changed: 15 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@
33

44
namespace Certify.Models.Hub
55
{
6-
public enum SecurityPrincipleType
6+
public enum SecurityPrincipalType
77
{
88
User = 1,
99
Application = 2,
@@ -17,9 +17,9 @@ public enum SecurityPermissionType
1717
}
1818

1919
/// <summary>
20-
/// A Security Principle is a user or service account which can be assigned roles and other permissions
20+
/// A Security Principal is a user or service account which can be assigned roles and other permissions
2121
/// </summary>
22-
public class SecurityPrinciple : ConfigurationStoreItem
22+
public class SecurityPrincipal : ConfigurationStoreItem
2323
{
2424
public string? Username { get; set; }
2525
public string? Password { get; set; }
@@ -31,11 +31,11 @@ public class SecurityPrinciple : ConfigurationStoreItem
3131
public string? Provider { get; set; }
3232

3333
/// <summary>
34-
/// If principle is externally controlled, this is the identifier from the external system
34+
/// If principal is externally controlled, this is the identifier from the external system
3535
/// </summary>
3636
public string? ExternalIdentifier { get; set; }
3737

38-
public SecurityPrincipleType PrincipleType { get; set; } = SecurityPrincipleType.User;
38+
public SecurityPrincipalType PrincipalType { get; set; } = SecurityPrincipalType.User;
3939

4040
public string? AuthKey { get; set; }
4141

@@ -44,7 +44,7 @@ public class SecurityPrinciple : ConfigurationStoreItem
4444
}
4545

4646
/// <summary>
47-
/// A role is a collection of policies which can be assigned to a security principle via AssignedRole
47+
/// A role is a collection of policies which can be assigned to a security principal via AssignedRole
4848
/// </summary>
4949
public class Role : ConfigurationStoreItem
5050
{
@@ -63,7 +63,7 @@ public Role(string id, string title, string description, List<string>? policies
6363
}
6464

6565
/// <summary>
66-
/// A role assigned to a security principle, optionally specific to a set of resources
66+
/// A role assigned to a security principal, optionally specific to a set of resources
6767
/// </summary>
6868
public class AssignedRole : ConfigurationStoreItem
6969
{
@@ -73,26 +73,26 @@ public class AssignedRole : ConfigurationStoreItem
7373
public string RoleId { get; set; } = default!;
7474

7575
/// <summary>
76-
/// Specific security principle assigned to the role
76+
/// Specific security principal assigned to the role
7777
/// </summary>
78-
public string SecurityPrincipleId { get; set; } = default!;
78+
public string SecurityPrincipalId { get; set; } = default!;
7979

8080
public List<Resource>? IncludedResources { get; set; } = [];
8181
}
8282

8383
public class AccessCheck
8484
{
85-
public string? SecurityPrincipleId { get; set; } = default!;
85+
public string? SecurityPrincipalId { get; set; } = default!;
8686
public string ResourceType { get; set; } = default!;
8787
public string ResourceActionId { get; set; } = default!;
8888
public string? Identifier { get; set; } = default!;
8989

9090
public List<string> ScopedAssignedRoles { get; set; } = [];
9191

9292
public AccessCheck() { }
93-
public AccessCheck(string? securityPrincipleId, string resourceType, string resourceActionId, string? identifier = null)
93+
public AccessCheck(string? securityPrincipalId, string resourceType, string resourceActionId, string? identifier = null)
9494
{
95-
SecurityPrincipleId = securityPrincipleId;
95+
SecurityPrincipalId = securityPrincipalId;
9696
ResourceType = resourceType;
9797
ResourceActionId = resourceActionId;
9898
Identifier = identifier;
@@ -121,7 +121,7 @@ public class AccessToken : ConfigurationStoreItem
121121
}
122122
public class AssignedAccessToken : ConfigurationStoreItem
123123
{
124-
public string SecurityPrincipleId { get; set; } = default!;
124+
public string SecurityPrincipalId { get; set; } = default!;
125125

126126
/// <summary>
127127
/// Optional list of Assigned Roles this access token is scoped to. Note this is not the RoleID but the AssignedRoleID.
@@ -183,9 +183,9 @@ public ResourceAction(string id, string title, string resourceType)
183183

184184
public string? ResourceType { get; set; }
185185
}
186-
public class SecurityPrincipleAssignedRoleUpdate
186+
public class SecurityPrincipalAssignedRoleUpdate
187187
{
188-
public string SecurityPrincipleId { get; set; } = string.Empty;
188+
public string SecurityPrincipalId { get; set; } = string.Empty;
189189
public List<AssignedRole> AddedAssignedRoles { get; set; } = new List<AssignedRole>();
190190
public List<AssignedRole> RemovedAssignedRoles { get; set; } = new List<AssignedRole>();
191191
}

src/Certify.Models/Hub/AccessControlConfig.cs

Lines changed: 45 additions & 45 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
using System;
1+
using System;
22
using System.Collections.Generic;
33
using System.Linq;
44
using System.Threading.Tasks;
@@ -80,7 +80,7 @@ public class StandardIdentityProviders
8080
public class ResourceTypes
8181
{
8282
public static string System { get; } = "system";
83-
public static string SecurityPrinciple { get; } = "securityprinciple";
83+
public static string SecurityPrincipal { get; } = "securityprincipal";
8484
public static string Role { get; } = "role";
8585
public static string AccessToken { get; } = "accesstoken";
8686
public static string Domain { get; } = "domain";
@@ -130,14 +130,14 @@ public static class StandardResourceActions
130130
public const string StoredCredentialList = "storedcredential_list_action";
131131
public const string StoredCredentialDownload = "storedcredential_consumer_action";
132132

133-
public const string SecurityPrincipleList = "securityprinciple_list_action";
134-
public const string SecurityPrincipleAdd = "securityprinciple_add_action";
135-
public const string SecurityPrincipleUpdate = "securityprinciple_update_action";
136-
public const string SecurityPrincipleUpdateAssignedRoles = "securityprinciple_update_assignedroles_action";
137-
public const string SecurityPrincipleDelete = "securityprinciple_delete_action";
138-
public const string SecurityPrinciplePasswordUpdate = "securityprinciple_password_update_action";
139-
public const string SecurityPrinciplePasswordValidate = "securityprinciple_password_validate_action";
140-
public const string SecurityPrincipleCheckAccess = "securityprinciple_access_check_action";
133+
public const string SecurityPrincipalList = "securityprincipal_list_action";
134+
public const string SecurityPrincipalAdd = "securityprincipal_add_action";
135+
public const string SecurityPrincipalUpdate = "securityprincipal_update_action";
136+
public const string SecurityPrincipalUpdateAssignedRoles = "securityprincipal_update_assignedroles_action";
137+
public const string SecurityPrincipalDelete = "securityprincipal_delete_action";
138+
public const string SecurityPrincipalPasswordUpdate = "securityprincipal_password_update_action";
139+
public const string SecurityPrincipalPasswordValidate = "securityprincipal_password_validate_action";
140+
public const string SecurityPrincipalCheckAccess = "securityprincipal_access_check_action";
141141

142142
public const string RoleList = "role_list_action";
143143

@@ -249,14 +249,14 @@ public static List<ResourceAction> GetStandardResourceActions()
249249
new(StandardResourceActions.StoredCredentialList, "List Stored Credentials", ResourceTypes.StoredCredential),
250250
new(StandardResourceActions.StoredCredentialDownload, "Fetch Decrypted Stored Credential", ResourceTypes.StoredCredential),
251251

252-
new(StandardResourceActions.SecurityPrincipleList, "List Security Principles", ResourceTypes.SecurityPrinciple),
253-
new(StandardResourceActions.SecurityPrincipleAdd, "Add New Security Principle", ResourceTypes.SecurityPrinciple),
254-
new(StandardResourceActions.SecurityPrincipleUpdate,"Update Security Principles", ResourceTypes.SecurityPrinciple),
255-
new(StandardResourceActions.SecurityPrincipleUpdateAssignedRoles,"Update Security Principle Assigned Roles", ResourceTypes.SecurityPrinciple),
256-
new(StandardResourceActions.SecurityPrinciplePasswordUpdate, "Update Security Principle Passwords", ResourceTypes.SecurityPrinciple),
257-
new(StandardResourceActions.SecurityPrincipleDelete, "Delete Security Principle", ResourceTypes.SecurityPrinciple),
258-
new(StandardResourceActions.SecurityPrincipleCheckAccess, "Check Security Principle Access", ResourceTypes.SecurityPrinciple),
259-
new(StandardResourceActions.SecurityPrinciplePasswordValidate, "Validate Security Principle Passwords", ResourceTypes.SecurityPrinciple),
252+
new(StandardResourceActions.SecurityPrincipalList, "List Security Principals", ResourceTypes.SecurityPrincipal),
253+
new(StandardResourceActions.SecurityPrincipalAdd, "Add New Security Principal", ResourceTypes.SecurityPrincipal),
254+
new(StandardResourceActions.SecurityPrincipalUpdate,"Update Security Principals", ResourceTypes.SecurityPrincipal),
255+
new(StandardResourceActions.SecurityPrincipalUpdateAssignedRoles,"Update Security Principal Assigned Roles", ResourceTypes.SecurityPrincipal),
256+
new(StandardResourceActions.SecurityPrincipalPasswordUpdate, "Update Security Principal Passwords", ResourceTypes.SecurityPrincipal),
257+
new(StandardResourceActions.SecurityPrincipalDelete, "Delete Security Principal", ResourceTypes.SecurityPrincipal),
258+
new(StandardResourceActions.SecurityPrincipalCheckAccess, "Check Security Principal Access", ResourceTypes.SecurityPrincipal),
259+
new(StandardResourceActions.SecurityPrincipalPasswordValidate, "Validate Security Principal Passwords", ResourceTypes.SecurityPrincipal),
260260

261261
new(StandardResourceActions.AccessTokenAdd, "Add Access Token", ResourceTypes.AccessToken),
262262
new(StandardResourceActions.AccessTokenDelete, "Delete Access Token", ResourceTypes.AccessToken),
@@ -356,12 +356,12 @@ public static List<ResourcePolicy> GetStandardPolicies()
356356
Title = "Access Control Administration",
357357
SecurityPermissionType = SecurityPermissionType.ALLOW,
358358
ResourceActions = [
359-
StandardResourceActions.SecurityPrincipleList,
360-
StandardResourceActions.SecurityPrincipleAdd,
361-
StandardResourceActions.SecurityPrincipleUpdate,
362-
StandardResourceActions.SecurityPrincipleDelete,
363-
StandardResourceActions.SecurityPrinciplePasswordUpdate,
364-
StandardResourceActions.SecurityPrincipleUpdateAssignedRoles
359+
StandardResourceActions.SecurityPrincipalList,
360+
StandardResourceActions.SecurityPrincipalAdd,
361+
StandardResourceActions.SecurityPrincipalUpdate,
362+
StandardResourceActions.SecurityPrincipalDelete,
363+
StandardResourceActions.SecurityPrincipalPasswordUpdate,
364+
StandardResourceActions.SecurityPrincipalUpdateAssignedRoles
365365

366366
]
367367
},
@@ -529,8 +529,8 @@ public static List<ResourcePolicy> GetStandardPolicies()
529529
SecurityPermissionType = SecurityPermissionType.ALLOW,
530530
IsResourceSpecific = true,
531531
ResourceActions = [
532-
StandardResourceActions.SecurityPrincipleCheckAccess,
533-
StandardResourceActions.SecurityPrinciplePasswordValidate,
532+
StandardResourceActions.SecurityPrincipalCheckAccess,
533+
StandardResourceActions.SecurityPrincipalPasswordValidate,
534534
StandardResourceActions.RoleList,
535535
]
536536
},
@@ -560,13 +560,13 @@ public static async Task UpdateStandardAccessConfig(IAccessControl access)
560560
{
561561
// setup roles with policies
562562

563-
var adminSvcPrinciple = "admin_01";
563+
var adminSvcPrincipal = "admin_01";
564564

565565
var actions = Policies.GetStandardResourceActions();
566566

567567
foreach (var action in actions)
568568
{
569-
await access.AddResourceAction(adminSvcPrinciple, action, bypassIntegrityCheck: true);
569+
await access.AddResourceAction(adminSvcPrincipal, action, bypassIntegrityCheck: true);
570570
}
571571

572572
// setup policies with actions
@@ -576,7 +576,7 @@ public static async Task UpdateStandardAccessConfig(IAccessControl access)
576576
// add policies to store
577577
foreach (var r in policies)
578578
{
579-
_ = await access.AddResourcePolicy(adminSvcPrinciple, r, bypassIntegrityCheck: true);
579+
_ = await access.AddResourcePolicy(adminSvcPrincipal, r, bypassIntegrityCheck: true);
580580
}
581581

582582
// setup roles with policies
@@ -585,7 +585,7 @@ public static async Task UpdateStandardAccessConfig(IAccessControl access)
585585
foreach (var r in roles)
586586
{
587587
// add roles and policy assignments to store
588-
await access.AddRole(adminSvcPrinciple, r, bypassIntegrityCheck: true);
588+
await access.AddRole(adminSvcPrincipal, r, bypassIntegrityCheck: true);
589589
}
590590
}
591591

@@ -594,40 +594,40 @@ public static async Task ConfigureStandardUsersAndRoles(IAccessControl access, I
594594
// setup roles with policies
595595
await UpdateStandardAccessConfig(access);
596596

597-
// setup standard security principles
597+
// setup standard security principals
598598

599599
// admin user
600600
var adminSpId = "admin_01";
601601
var managedInstanceSpId = "managedinstance_sp_01";
602602

603-
var users = await access.GetSecurityPrinciples(adminSpId);
603+
var users = await access.GetSecurityPrincipals(adminSpId);
604604

605605
// add admin user if not already present
606606
if (!users.Any(u => u.Id == adminSpId))
607607
{
608-
var adminSp = new SecurityPrinciple
608+
var adminSp = new SecurityPrincipal
609609
{
610610
Id = adminSpId,
611611
Description = "Primary default admin",
612-
PrincipleType = SecurityPrincipleType.User,
612+
PrincipalType = SecurityPrincipalType.User,
613613
Username = Environment.GetEnvironmentVariable("CERTIFY_ADMIN_DEFAULTUSERNAME") ?? "admin",
614614
Password = Environment.GetEnvironmentVariable("CERTIFY_ADMIN_DEFAULTPWD") ?? "changeme!",
615615
Provider = StandardIdentityProviders.INTERNAL,
616616
IsBuiltIn = true
617617
};
618618

619-
await access.AddSecurityPrinciple(adminSp.Id, adminSp, bypassIntegrityCheck: true);
619+
await access.AddSecurityPrincipal(adminSp.Id, adminSp, bypassIntegrityCheck: true);
620620
}
621621
// get assigned roles for admin and update any missing roles
622622
var assignedRolesForAdmin = await access.GetAssignedRoles(adminSpId, adminSpId);
623623

624-
// assign admin role to admin security principle
624+
// assign admin role to admin security principal
625625
var toBeAssignedRoles = new List<AssignedRole> {
626626
// administrator
627627
new AssignedRole{
628628
Id= Guid.NewGuid().ToString(),
629629
RoleId=StandardRoles.Administrator.Id,
630-
SecurityPrincipleId=adminSpId
630+
SecurityPrincipalId=adminSpId
631631
}
632632
};
633633

@@ -640,27 +640,27 @@ public static async Task ConfigureStandardUsersAndRoles(IAccessControl access, I
640640
}
641641
}
642642

643-
// add managed instance service principle if not already present
643+
// add managed instance service principal if not already present
644644
if (!users.Any(u => u.Id == managedInstanceSpId))
645645
{
646-
var managedInstanceServicePrinciple = new SecurityPrinciple
646+
var managedInstanceServicePrincipal = new SecurityPrincipal
647647
{
648648
Id = managedInstanceSpId,
649-
Title = "Managed Instances Service Principle",
650-
PrincipleType = SecurityPrincipleType.Application,
649+
Title = "Managed Instances Service Principal",
650+
PrincipalType = SecurityPrincipalType.Application,
651651
Provider = StandardIdentityProviders.INTERNAL,
652652
IsBuiltIn = true
653653
};
654654

655-
await access.AddSecurityPrinciple(adminSpId, managedInstanceServicePrinciple, bypassIntegrityCheck: true);
655+
await access.AddSecurityPrincipal(adminSpId, managedInstanceServicePrincipal, bypassIntegrityCheck: true);
656656

657-
// assign managed instance role to security principle
657+
// assign managed instance role to security principal
658658
var assignedRoles = new List<AssignedRole> {
659659

660660
new AssignedRole{
661661
Id= Guid.NewGuid().ToString(),
662662
RoleId=StandardRoles.ManagedInstance.Id,
663-
SecurityPrincipleId=managedInstanceSpId
663+
SecurityPrincipalId=managedInstanceSpId
664664
}
665665
};
666666

@@ -674,7 +674,7 @@ public static async Task ConfigureStandardUsersAndRoles(IAccessControl access, I
674674
var assignedApiAccessToken = new AssignedAccessToken
675675
{
676676
Id = Guid.NewGuid().ToString(),
677-
SecurityPrincipleId = managedInstanceSpId,
677+
SecurityPrincipalId = managedInstanceSpId,
678678
Title = "Managed Instance Hub Joining Key",
679679
AccessTokens = [
680680
new AccessToken {

0 commit comments

Comments
 (0)